-
@ b6dcdddf:dfee5ee7
2024-09-06 17:46:11Hey Frens,
This is the Geyser team, coming at you with a spicy idea: a grant for proper journalism.
Issue: Journalism is broken. Independent journalism is emerging with the work of The Rage, Whitney Webb and so forth. They deal with issues like privacy, political corruption, economics, ESG, medicine and many other issues that are not discussed by mainstream media.
The problem is that not many people know about their work and there are very few grant programs that support their work.
Proposed Solution: Geyser would like to host a Grant supporting independent journalists using 'community voting mechanism'. See here for how Community Voting Grants work.
However, we need more companies to partner up and sponsor this initiative with us. Ideas of more sponsors: - Stacker news: SN has become a great repository of independent/indie journalism. I think they'd fit in great as sponsors for this type of grant. cc: @k00b - Bitesize media: A new independent media house that wants to focus on the signal Bitcoin brings to our world. They expressed interest already. - Bitcoin Magazine: might be interested as well in this effort.
Would love the community's feedback on this idea and propose additional thoughts!
originally posted at https://stacker.news/items/674951
-
@ cb8f3c8e:c10ec329
2024-06-14 17:53:20WRITTEN BY: ALEX MREMA
Europe awaits for 24 of its best nations to kick off her headline football tournament on the 14th of June. This edition of the tournament promises to showcase some spectacular football filled with style, flair and a uniqueness that is only found in Europe. Surprises, thrillers and fierceness is promised throughout the Euros- not to forget the wonderful and warm German hosts who are promised to provide the vibes in and around the country.On that note, I present my second article on the best games Germany has to offer throughout the group stages!
GROUP D GAME: POLAND VS NETHERLANDS DATE: 16th June 2024 TIME: 14:00 BST
Poland look to prove themselves on the European stage again after a shocking Euro 2020 that saw them finish last in their group with one point and six goals conceded. Coach Michal Probierz will look to the strength of his young and powerful midfield featuring Brighton’s Jakub Moder and Roma’s Nicola Zalewski while the experienced head of Piotr Zielenski is expected to be the headlight to this midfield’s vision. Robert Lewandowski and Wojciech Szczeny are expected to play with an extra chip on their shoulder as this is likely to be their last international tournament for Poland. However, this Dutch side is one lethal side on their day. They can make teams suffer both offensively and defensively plus they can control the midfield appropriately if the backs are not against the walls. Plus the Netherlands put on an impressive run in the 2022 World Cup only to crash out in devastating fashion. Under Ronald Koeman, they have put on some very impressive performances but the only hiccups have come in games against that are “better” than them (in terms of player quality) where they perform poorly. With Netherlands being wishy-washy, can they do enough to beat Poland? We’ll see!
GAME: NETHERLANDS VS FRANCE DATE: 21st June 2024 TIME: 20:00 BST
France are certainly THE side to fear in this tournament. They have everything and they ooze in class with all that they have from the keepers all the way down to the manager. This French side has the potential to win every game in this tournament. Undoubtedly, the return of the engine that is N’golo Kante is vital to this French squad as they look to make their midfield a well-oiled machine with the never-expiring and youthful trio of Rabiot, Tchuoameni and Camavinga partnering working with the experienced Kante. The only problem, is how Deschamps will intergrate Kante in the French in a manner that is smooth and equally provides an immediate click. This is what the Dutch will look to pounce on. Regardless of the result of their first game against Poland, this game is what will make or break their tournament as a loss will be possibly detrimental to their progress while a win will probably make progression ever so likely. Can Koeman’s squad pounce on Les Bleus gamble?
GAME: NETHERLANDS VS AUSTRIA DATE: 25th June 2024 TIME: 17:00 BST
Austria are a side that are able to do their bits. Ralf Ragnick has enforced a hustling and fighting spirit that makes his squad work to the very end-which credits why they have qualified as one of the 24 nations certain to rock Europe this summer. They play progressive,fun,attacking football and are a side that are fearless. The experienced figures of Marko Arnautovic,Michael Gregoristch and Konrad Laimer are key to the leadership of Das Team this summer as the status on main figurehead David Alaba remains unclear as he is out with an injury. Holland’s approach to this game will be interesting. Particularly on how they will view the aerial battle between van Dijk and Gregoristch and how direct Arnautovic is towards the rest of the defence. Les Oranjes also have the capabilites to throw a tactical masterclass that can throw Ragnick and his men overboard. Let’s not forget that this is the final group game, so alll can be to play for...tactics may be thrown out the window and it might just be a full on dog fight between the two nations- what we need!
GROUP E GAME: UKRAINE VS BELGIUM DATE: 26th June 2024 TIME: 17:00
Group E is probably the weakest one in the tournament (alongside Group C).But, that does not take away from some of the talent displayed in the group. As expected to be showcased when the fiery Red Devils of Belgium face off against The Blues and Yellows of Ukraine. This will be Belgium’s first tournament without the legendary Eden Hazard in their camp, however this squad has seen the rise of some extremely talented players namely, Amadou Onana, Charles de Ketelaere and Jeremy Doku that all -coincidently- reside from the English Premier League. Head coach Domenico Tedesco has managed to fit in a blend of youth and experience as Belgium says goodbye to their “first phase” golden generation players and welcome new generation players to renovate the aging squad.On the other side of the dugout, coach Sergiy Rebrov has brought a squad that is extremely pacey,physical,daring and fearless. These aspects are best described in players such as Matviyenko,Zincheko, Mykola Shaparenko,Mudryk,Yaremchuk plus La Liga top scorer and Round of 16 hero in Euro 2020- Artem Dobvyk. This Ukraine squad can bring the heat at any point in the game, even against the run of play- they did not play their best football in Euro 2020 but somehow ended as quarter-finalists, just let it sink in when they start playing their best football...
GROUP F GAME: PORTUGAL VS CZECH REPUBLIC DATE: 18th June 2024 TIME: 20:00 BST
Portugal are a squad that is star-studded throughout and are led by the man, the myth, the legend that is Cristiano Ronaldo who has the same drive to win as when he first landed in this tournament 2004. He is the all-time Euros top scorer and you should expect more goals from within the next four weeks of football. The somewhat fear-factor that strikes opponents is that this is a Portugal squad that can snatch goals from anywhere, even when Ronaldo has a silent game, they can get results from Goncalo Ramos, Bernado Silva, Rafael Leao, Bruno Fernandes... and the list goes on! Truly scary what Seleção das Quinas has in store. But the Lokomotiva has something to say and boy on their day can they make a statement, this squad’s physicality, progressive football and never-say-die attitude is what has gotten them results throughout their journey to the tournament. Players such as Schick,Hlozek,Soucek and Antonin Barak are vital for the Czech Republic and when they are called upon, they deliver- just ask the Dutch.
GAME: CZECH REPUBLIC VS TURKEY DATE: 26th June 2024 TIME: 20:00 BST
Turkey have underperformed in recent tournaments- with group stage exists in Euro 2016 as well as Euro 2020. They do appear to be a better organized squad nowdays and do not settle for less when it comes to working for a positive result. The Crescent Stars are a joyful side that carry an immense amount of pride for the badge on their jerseys and wear their hearts on their sleeves for every game, this passion can be a huge motivating factor as to how far they progress through the tournament. The talent that the Czech Republic possesses however, can kill off the Turkish party. They are side that comes in to take results like the way a bully eould steal candy from a baby, they just simply play their football and move on quietly but equally deadly. Can they be the party poopers against Turkey in their final group game?
-
@ d78dcc29:aa242350
2024-04-13 06:42:03Opinion about ZBD: Bitcoin, Games, Rewards (iphone)
zbd is a centralised platfom. they have power over users wallets and can deactivate them even with balances, hence making your account pretty much useless. in the times that we are heading , this is definetely not the way. since zbd is A Play to Earn platform, such kind of activity is robbing from users who invested their time to stack sats. just to be kicked out . it's a 0 out of 10 for zbd
WalletScrutiny #nostrOpinion
-
@ ef1a1108:d2bb31da
2024-01-26 16:36:211 000 000 satoshis
2 days before the Grand finale, we can proudly annouce we hit the first milestone - 1 million satoshis!
Huge warm thank you to all supportes of The Great Orchestra of Christmas Charity!
Join #orchestrathon on the Grand Finale day
We'd like to invite you to a special type of event we are organising on Nostr - #orchestrathon!
Rules are simple:
``` 1. This Sunday at 18.00 - 19.00 we all connect to nostr relays to join the #orchestrathon
-
For the whole hour - we zap this profile, posts or comments as crazy!
-
At 19.00 it's culmination of both #orchestrathon and Grand Finale ```
We're planning to stream some of The Great Orchestra concerts on zap.stream on that day.
Join the stream, where you can also zap!
Hopefully we can engage a bit Nostr community to support the cause with having fun and zapping during the last hour of Grand Finale
Every Nostr zap to our profile, comment or post will be counted as a contribution and displayed on our Geyser page.
Those contributions will be also rewarded with Nostr badges :)
Rewards
We added several rewards to the project! They look absolutely fabulous with the new Geyser update.
The rarer the badge is, the more expensive it is, but also the more real Proof of Work in computation it took to mine. Epic badge took several hours to be mined...
You can purchase beautiful and unique Nostr badges or choose a physical item, like merchandise or ticket to European Halving Party.
This is a great occasion to buy a very cool t-shirt, hat or ticket to a great event with supporting supply of state-of-the-art, saving lives medical equipment children and adults.
-
-
@ cbaa0c82:e9313245
2025-02-01 15:07:16TheWholeGrain - #January2025
This January we really got to start the story telling of our first adventure series painted by Dakota Jernigan a.k.a. The Bitcoin Painter! The typical Singles of the month were released on Sunday along with a special Single released on the first to celebrate the New Year! Here we go, 2025! And, even with all that the monthly Concept Art, Bitcoin Art, and the newest Cover Art from Toast's Comic Collection were all still released! Not only was the first month of 2025 quite packed full of fun content, but the Bread and Toast website got a makeover! Did you notice all the explanation points!? We're all so excited we just can't help ourselves from using them!
January Sunday Singles 2025-01-01 | Sunday Single 73 Title: Happy New Year 2025 Happy New Year! What a year 2024 has been! We can’t wait to see what 2025 has in store for us! https://i.nostr.build/QFTmeR5p2FthPMXp.png
2025-01-05 | Sunday Single 074 Title: Snowflake It’s the most beautiful snowflake Toast has ever seen… until this one melts then it’s on to the next one! https://i.nostr.build/YHGeOcYv8WEP1fAf.png
2025-01-12 | Sunday Single 075 Title: Weight Lifting End-Piece has been working out since last year’s resolution. Now, time for heavy lifting! https://i.nostr.build/8lxeovAr5aK598Ze.png
2025-01-19 | Sunday Single 076 Title: Good Morning GM, Everybody! https://i.nostr.build/9jn2D2if4sFfNXzU.png
2025-01-26 | Sunday Single 077 Title: Chess When it comes to the chessboard, Bread is King. https://i.nostr.build/LZq57iL7tOWbHAKc.png
Adventure Series: Questline Bread, Toast, and End-Piece have started their journey in Grain Valley, and they have already found themselves in what used to be a village that is now been burnt to a crisp!
Writer: Daniel David (dan 🍞) Artist: Dakota Jernigan (The Bitcoin Painter)
2025-01-14 | Questline 001 - The Adventure Begins Our heroes take their first steps upon one of the oldest paths in all of Grain Valley. They can see the mountains in the background of the landscape before them. As they walk, they see in the distance ahead of them large amounts of black smoke rising until it disappears into the sky. https://i.nostr.build/ygjmYlWAZ4uPfPCn.png
2025-01-28 | Questline 002 - A Village Burned The source of smoke surrounds our heroes as their path brings them to the center of what used to be a village. It seems to be completely abandoned with no signs of life. Yet, all the remains of the village appear to have only recently burned to a crisp. What could have possibly happened here? https://i.nostr.build/BJ4L1shKh5YERzWc.png
Other Content Released in January 2025 2025-01-01 | Toast's Comic Collection Title: Iron Bread #9 "I am Iron Bread." - Tony Starch https://i.nostr.build/QJKkDCbfgc6Vqzcq.png
2025-01-08 | Concept Art Title: Second Bread Sketch A second sketch of the character Bread. Remade and cleaned up. https://i.nostr.build/4TXIRSUGA6viEaJx.png
2025-01-15 | Bitcoin Art Title: Stack Sats Toast is constantly stacking sats! https://i.nostr.build/txxkux0oJqyjNcSL.png
Thanks for checking out the fifth issue of The Whole Grain. The Whole Grain is released on the first of every month and covers all of the content released by Bread and Toast in the previous month. For all Bread and Toast content visit BreadandToast.com!
Thanks for helping us kick off 2025! Bread, Toast, and End-Piece
BreadandToast #SundaySingle #Questline #ToastsComicCollection #ConceptArt #BitcoinArt #Bread #Toast #EndPiece #Artstr #Comic #Cartoon #NostrOnly #🖼️
List of nPubs Mentioned: The Bitcoin Painter: npub1tx5ccpregnm9afq0xaj42hh93xl4qd3lfa7u74v5cdvyhwcnlanqplhd8g
dan 🍞: npub16e3vzr7dk2uepjcnl85nfare3kdapxge08gr42s99n9kg7xs8xhs90y9v6
-
@ 9e69e420:d12360c2
2025-02-01 11:16:04Federal employees must remove pronouns from email signatures by the end of the day. This directive comes from internal memos tied to two executive orders signed by Donald Trump. The orders target diversity and equity programs within the government.
CDC, Department of Transportation, and Department of Energy employees were affected. Staff were instructed to make changes in line with revised policy prohibiting certain language.
One CDC employee shared frustration, stating, “In my decade-plus years at CDC, I've never been told what I can and can't put in my email signature.” The directive is part of a broader effort to eliminate DEI initiatives from federal discourse.
-
@ 9e69e420:d12360c2
2025-01-25 22:16:54President Trump plans to withdraw 20,000 U.S. troops from Europe and expects European allies to contribute financially to the remaining military presence. Reported by ANSA, Trump aims to deliver this message to European leaders since taking office. A European diplomat noted, “the costs cannot be borne solely by American taxpayers.”
The Pentagon hasn't commented yet. Trump has previously sought lower troop levels in Europe and had ordered cuts during his first term. The U.S. currently maintains around 65,000 troops in Europe, with total forces reaching 100,000 since the Ukraine invasion. Trump's new approach may shift military focus to the Pacific amid growing concerns about China.
-
@ ef1a1108:d2bb31da
2024-01-23 15:34:05Nostr for The Great Orchestra of Christmas Charity
This Sunday, 28.01.2024 at 18:00 - 19:00 UTC we're inviting you to take pare in a very unique #zapathon
Nostrians taking part in this special zapathon that will play in tune with thousands of people playing together with The Great Orchestra of Christmas Charity on their 32nd Grand Finale! Hence the name #orchestrathon
The goal of #orchestrathon is to support the goal of this years Grand Finale, which is: funding equipment for diagnosing, monitoring and rehabilitating lung diseases of patients in pulmonology wards for children and adults in Poland
That means all bitcoin from zaps will be converted to PLN and donated to The Great of Christmas Charity foundation.
What's The Great Orchestra of Christmas Charity? What is the 32nd Grand Finale?! You'll find all of those answers on Geyser project story, or a few paragraphs below 👇 Now coming back to #orchestrathon...
What Is #Orchesthrathon
This Nostr account is a was generated on Geyser and is tied to Geyser project: Bitcoiners support The Great Orchestra of Christmas Charity
That means all zaps sent to this account are at the same time funding Geyser campaing.
So not only you will contribute to the goal in the project, also all the zap comments will be visable there.
Ain't that crazy? We can use this campaign as one giant #orchestrathon client!
Rules are simple:
- On Sunday at 18.00 - 19.00 we all connect to our relays to join the #orchestrathon
- For the whole hour - you can zap this profile, our posts or comments as crazy!
- At 19.00 it's culmination of both #orchestrathon and Grand Finale
All Nostrians who zap will receive special badges, depending on the zapped amount (in total):
On Sunday there will be lot's of concerts and events happening all day, culminating with Grand Finale closing at 19.00. We will try to launch a stream on zap.stream, so we can enjoy Grand Finale and concerts together!
This #orchestrathon and Geyser fundraise is organised by Dwadzieścia Jeden, a community of polish Bitcoiners. More about us and Proof of Work in the project story 👇
We're not only Bitcoiners, are also Nostrians, follow us: Dwadzieścia Jeden account: @npub1cpmvpsqtzxl4px44dp4544xwgu0ryv2lscl3qexq42dfakuza02s4fsapc Saunter: @npub1m0sxqk5uwvtjhtt4yw3j0v3k6402fd35aq8832gp8kmer78atvkq9vgcru Fmar: @npub1xpuz4qerklyck9evtg40wgrthq5rce2mumwuuygnxcg6q02lz9ms275ams JesterHodl: @npub18s59mqct7se3xkhxr3epkagvuydwtvhpsacj67shrta8eknynegqttz5c3 Tomek K: @npub14wxtsrj7g2jugh70pfkzjln43vgn4p7655pgky9j9w9d75u465pqvagcye Tom Chojnacki: @npub1m0sxqk5uwvtjhtt4yw3j0v3k6402fd35aq8832gp8kmer78atvkq9vgcru Gracjan Pietras: @npub1trkudtnp7jg3tmy4sz8mepmgs5wdxk9x2esgts25mgkyecrse7js6ptss5 Tomek Waszczyk @npub1ah8phwmfyl2lakr23kt95kea3yavpt4m3cvppawuwkatllnrm4eqtuwdmk
Original Geyser project story
Saving Lives and Preserving Health
Dwadzieścia Jeden a polish node in decentralised bitcoin communities network Twenty One, is proud to facilitate bitcoin fundraising for the biggest, non-governmental, non-profit, charity in Poland — The Great Orchestra of Christmas Charity.
For the past 31 years, GOCC continuously fundraises money for pediatric and elderly care in Poland. Each year, a culmination of the raise occurs during the last Sunday of January in the shape of The Grand Finale — a joyful day that when tens of thousands volunteers worldwide, especially kids and teenagers, go on the streets to gather money for the cause, giving donors hear-shaped stickers with logo of the foundation. If you're in Poland on that day, basically every person you'll meet on the street will proudly wear GOCC heart.
The same hear-shaped stickers can be seen in every hospital in Poland on thousands of high quality medical equipment bought by The Great Orchestra. There is not a single polish family that hasn't benefited in some way from this equipment, and it saved thousands of lives, especially the little ones.
32nd Grand Finale Goal
This year, 32rd Grand Finale will take place on 28th of January. The aim of the 32nd Grand Finale is post-pandemic lung diseases — the raised funds will be used to purchase equipment for children's and adults' respiratory units.
The Foundation plans to purchase:
-
equipment for diagnostic imaging, i.a. MRI and ultrasound equipment,
-
equipment for functional diagnosis, i.a. polysomnographs and portable spirometers,
-
equipment for endoscopic diagnosis, i.a. navigational bronchoscopy systems and bronchoscopes
-
equipment for rehabilitation - equipment for pulmonary rehabilitation used in the treatment of patients after lung transplantation
-
equipment for thoracic surgery, e.g. electrocoagulation systems and cryoprobes.
The Great Orchestra of Proof of Work
-
31 years of non-stop fundraising for state-of-the-art saving life equipment, running medical and educational programmes and humanitarian aid
-
2 billion PLN or ~11,781 BTC raised in total
-
Areas of help: children's cardiac surgery, oncology, geriatrics, neonatology, children's nephrology, children's and young people's mental health services, ambulances for children's hospitals, volunteer firefighters & search & rescue units
-
Last year Grand Finale raised over PLN 240 million (1,410 BTC) for a goal to fight sepsis
-
You can check how money from 2022 report (224 376 706 PLN or ~1,321.69 BTC) raise were spent here (although it's in polish)
-
In addition to work focused on Poland, GOCC fundraised money for hospitals in Ukraine and provided substantial humanitarian aid for Ukrainian refugees, Polish-Belarusian border crisis, Turkey earthquake victims and more
-
GOCC is the most-trusted Polish organization and is at the top of the list as the most trusted public entities in Poland
What We'll Do With Gathered Funds
Gathered bitcoin will be converted to PLN by a polish exchange Quark and donated to The Great Orchestra of Christmas Charity after The Grand Finale which takes place on January 28th.
Dwadzieścia Jeden Proof of Work
We're a group of polish pleb Bitcoiners that started organising ourselves about 2 years ago.
Our activities include:
-
organising regular bitcoin meetups in several cities in Poland, also Nostr meetup in Warsaw
-
organising Bitcoin FilmFest and European Halving Party in Warsaw
-
orangepilling and maintaining map of polish bitcoin merchants in Poland on btcmap.org
-
giving talks on bitcoin
-
volounteering for helping with bitcoin payments and running bitcoin workshops on non-conferences (eg. Weekend of Capitalism)
-
working in human rights centered NGOs and promoting bitcoin as a tool for protecting human rights
-
...and we're just starting!
Find Out More
Gallery
-
@ b17fccdf:b7211155
2025-01-21 17:02:21The past 26 August, Tor introduced officially a proof-of-work (PoW) defense for onion services designed to prioritize verified network traffic as a deterrent against denial of service (DoS) attacks.
~ > This feature at the moment, is deactivate by default, so you need to follow these steps to activate this on a MiniBolt node:
- Make sure you have the latest version of Tor installed, at the time of writing this post, which is v0.4.8.6. Check your current version by typing
tor --version
Example of expected output:
Tor version 0.4.8.6. This build of Tor is covered by the GNU General Public License (https://www.gnu.org/licenses/gpl-3.0.en.html) Tor is running on Linux with Libevent 2.1.12-stable, OpenSSL 3.0.9, Zlib 1.2.13, Liblzma 5.4.1, Libzstd N/A and Glibc 2.36 as libc. Tor compiled with GCC version 12.2.0
~ > If you have v0.4.8.X, you are OK, if not, type
sudo apt update && sudo apt upgrade
and confirm to update.- Basic PoW support can be checked by running this command:
tor --list-modules
Expected output:
relay: yes dirauth: yes dircache: yes pow: **yes**
~ > If you have
pow: yes
, you are OK- Now go to the torrc file of your MiniBolt and add the parameter to enable PoW for each hidden service added
sudo nano /etc/tor/torrc
Example:
```
Hidden Service BTC RPC Explorer
HiddenServiceDir /var/lib/tor/hidden_service_btcrpcexplorer/ HiddenServiceVersion 3 HiddenServicePoWDefensesEnabled 1 HiddenServicePort 80 127.0.0.1:3002 ```
~ > Bitcoin Core and LND use the Tor control port to automatically create the hidden service, requiring no action from the user. We have submitted a feature request in the official GitHub repositories to explore the need for the integration of Tor's PoW defense into the automatic creation process of the hidden service. You can follow them at the following links:
- Bitcoin Core: https://github.com/lightningnetwork/lnd/issues/8002
- LND: https://github.com/bitcoin/bitcoin/issues/28499
More info:
- https://blog.torproject.org/introducing-proof-of-work-defense-for-onion-services/
- https://gitlab.torproject.org/tpo/onion-services/onion-support/-/wikis/Documentation/PoW-FAQ
Enjoy it MiniBolter! 💙
-
@ cb8f3c8e:c10ec329
2024-01-13 09:25:01Written by ALEX MREMA @npub1w4zrulscqraej2570gkazt0e7j0q3xq4437hnxjqfvcs59hq86fs9vnn4x
From the 13th of January 2024 the football world’s eyes will all converge on the Ivory Coast as 24 of Africa’s best football nations look to take each other on for the title of Africa’s best come 11th February. Though there is only going to be one winner, that doesn’t mean we aren’t promised exceptional football, shocks and players showcasing their razzle dazzle throughout the next 29 days. This article will focus on the players from each of the 24 competing nations who don’t get the spotlight they deserve but are certain to cause trouble.
IVORY COAST Name: Simon Adingra Age: 21 Club: Brighton and Hove Albion(England) Position: Winger The bright orange Ivorian jerseys are not the only thing that will catch your eye from this squad as the youthful, electrifying and pacey Brighton winger Simon Adingra is certainly bound to catch the interest of some during the tournament. His eye for goal and his turbo speed is bound to give trouble to any defender.
EQUATORIAL GUINEA Name: Saúl Coco Age: 24 Club: UD Las Palmas(Spain) Position: Center-Back Equatorial Guinea are not newcomers to the competition and are not going to be a pushover in a group that contains hosts Ivory Coast and the star-studded Nigeria. A player one must recognize from the Central African country is none other than Saul Coco. 6-foot-2 and a menace at the back, he will catch the eye of many particularly in his match up with the towering Bissau-Guinean players and of course Nigeria’s Victor Osimhen.
GUINEA-BISSAU Name: Fali Candé Age: 24 Club: FC Metz(France) Position: Centre-Back Like Equatorial Guinea, Guinea- Bissau come to the tournament with a familiar idea of what is expected. This is a nation known for putting up a challenge no matter what and are able to even pull a shock or two. If they are going to attract any wins in the tournament they will need a solid defense in their attack-heavy group, luckily for Guinea Bissau, they have Fali Cande who is one of the rocks at the back that Africa should have an eye on as he is aggressive and committed to keeping a clean sheet.
NIGERIA Name: Moses Simon Age: 28 Club: FC Nantes(France) Position: Winger Nigeria come in as one of the favourites to win it all and with a squad that has the African player of the year (Victor Osimhen) it’s hard to disagree that they are capable of delivering the cup back to Nigeria for the first time since 2013. A player that is sure to electrify the tournament is FC Nantes winger Moses Simon who shone in the last edition but had his time cut short after the Super Eagles shock defeat to Tunisia in the Round of 16. Now with their other attacking star (Victor Boniface) officially out of the tournament, will the Simon-Osimhen-Boniface attacking duo bear fruit for Nigeria?
CAPE VERDE Name: Jamiro Monteiro Age: 30 Club: San Jose Earthquakes(USA) Position: Center Midfield A man of experience and flair, Jamiro Monteiro is going to be a man lighting up the highlight reels throughout his time in the Ivory Coast. With a flair like Alex de Souza and an awareness equal to that of David Silva, Monteiro instantly sets himself as a man to watch in Cape Verde’s conquest to spice up the tournament.
EGYPT Name: Ahmed Fatouh Age: 25 Club: Zamalek(Egypt) Position: Left Back Fatouh has been described as the “Egyptian Marcelo” for his ability to excel in the attacking third of the pitch despite being a left back. His skill and drive towards making an impact upfront shall not blindside viewers that he can also do it defensively. This man is pivotal for the Egyptians in their quest for glory.
GHANA Name: Salis Abdul Samed Age: 23 Club: RC Lens(France) Position: Central Defensive Midfielder Entering AFCON 2023, the Black Stars of Ghana are a nation booming with talent mixed with just the right amount of experience. Looking to put away the demons of their last AFCON appearance and deliver their first trophy since 1980, Ghana are likely to turn to their midfield to take them all the way. Yes, Mohammed Kudus is in that midfield but a player that goes unnoticed in that midfield is Salis Abdul Samed. He is magnificent at stealing the ball from opponents in a clean manner, further, he is able to put Ghana in promising positions when he moves the ball up. He truly is the new generation player that Ghana needed to make their midfield a threat to opponents.
MOZAMBIQUE Name: Geny Catamo Age: 22 Club: Sporting CP (Portugal) Position: Winger The scouts should keep an eye out for this young talent. He manages to wriggle through spaces with his dribbling and also leave defenders in the dust when going one on one with them. Catamo carries forward the game easily and with purpose and a lucid hunger. Head coach Chiquinho Conde should put his trust in this young man to make Mozambique a threat in the tournament.
CAMEROON Name: François-Régis Mughe Age: 19 Club: Olympique de Marseille(France) Position: Winger The youngest player on this list is a special prospect. His strength and pace is bound to make any defender have a difficult time when going up against him. He can create something out of nothing when given playing time, Cameroon coach Rigobert Song should make him have a taste of the competition and he will be wowed by the talent he has in his hands.
THE GAMBIA Name: Ablie Jallow Age: 25 Club: FC Metz(France) Position: Winger Classy, calm and collected. These are the three words that can best be used to describe Gambia’s top scorer during qualifiers. He carries an aura that is simply impossible to ignore and he comes at defenders like a high speed train. He will look to be the main influence in The Gambia’s drive towards making another quarter final run like in the last edition of the tournament. Oh, don’t give him time and space to shoot because he will punish the keeper.
GUINEA Name: Amadou Diawara Age: 26 Club: RSC Anderlecht(Belgium) Position: Defensive Midfielder Composure must be this man's middle name. Once he has the ball it is not getting lost with him, he keeps the ball until he releases a pass -which on occasion are mighty sensational- despite being a defensive midfielder,he is capable of bringing up the ball to threatening positions; when Guinea are in trouble at the back he is there to clean up the mess. He is the real deal. He is Amadou Diawara.
SENEGAL Name: Ismail Jakobs Age: 26 Club: AS Monaco(France) Position: Left Back Senegal will look to make it to their third final in as many tournaments and at the same time retain their crown. A new feature to the Lions of Teranga side is left back Ismail Jakobs who is very quick and tends to join the attack. He does have a left foot capable of finding the back of the net but it’s his defensive recovery and ethic that magnifies him above some of the other modern day defenders. He is one the Senegal camp must protect from any injuries or suspensions as he is key for their progression in the Ivory Coast.
ALGERIA Name: Ramiz Zerrouki Age: 25 Club: Feyenoord(Netherlands) Position: Defensive Midfielder Africa should be proud to have this man playing in the upcoming AFCON tournament as he is the epitome of athleticism and command on the pitch. Based in the Netherlands, Zerrouki will stop at nothing to get the ball back on his feet and once he has the ball he is at peace again and can run the Algerian midfield operations with ease. He will look to make the Algerian midfield gel and spearhead The Desert Foxes into the knockout rounds after a disappointing run in the 2021 edition of the tournament.
ANGOLA Name: Gelson Dala Age: 27 Club: Al Wakrah(Qatar) Position: Center Forward This man ended qualifiers as Angola’s top scorer and is an electrifying center forward. He hustles for the ball every time one of his wingers has the ball on their feet or alternatively when the ball is in the box he will make use of it no matter what. He is Angola’s main man and should be on every manager’s list of the most dangerous players in the tournament.
BURKINA FASO Name: Stephane Aziz Ki Age: 27 Club: Young Africans(Tanzania) Position: Attacking Midfielder The Stallions are a nation capable of causing havoc in Ivory Coast with the snap of a finger, they have an impressive defensive foundation and contain plenty of attacking threats. A diamond within this attack is none other than Young Africans midfielder; Aziz Ki. He is strong on the ball, influential on the pitch and when given time and space to unleash a shot,he will make the opposing team pay. He hopes to get some playing time while at Ivory Coast and light up the tournament for his country.
MAURITANIA ** Name: Khadim Diaw Age: 25 Club: Horoya(Guinea) Position:** Left Back Khadim Diaw is more than your typical left back that is able to do it all on defense, he is a joy for attackers to use for the link up play. He has an excellent passing ability that can pick out any of the Mauritanian strikers in the box. He is certainly bound to be on coach Amir Abdou’s starting eleven.
MALI Name: Kamory Doumbia Age: 20 Club: Stade Brestois 29(France Position: Attacking Midfielder Fresh off scoring four goals(yes you read that right) four goals against FC Lorient in France, it looks impossible for young starlet Kamory Doumbia to not feature in the tournament. He is pacey, attentive and has an eye for goal which only adds to Mali’s firepower. Many should watch out for this Mali squad as they might go all the way due to their attacking firepower.
NAMIBIA Name: Peter Shalulile Age: 30 Club: Mamelodi Sundowns(South Africa) Position: Centre Forward One of Africa’s most dangerous strikers in recent years is Namibia’s very own.Shalulile stands at only five-foot-seven but he can leave a defense in shambles in little to no time as he is best friends with the net. He carries a variety of methods to make the net rifle and has done so a staggering 110 times in the Premier Soccer League in South Africa. Watch out for this man Africa.
SOUTH AFRICA Name: Teboho Mokoena Age: 26 Club: Mamelodi Sundowns(South Africa) Position: Center Midfielder A long-range specialist and a maestro in the midfield, Teboho Mokoena can impact the state of a game at any point he decides to do so. He has the game at the palm of his hands at all times and dictates it with his calm demeanour. In the dying seconds of the match, every opponent should make sure the ball doesn’t find him because if it does, it will probably be in the back of the net within the blink of an eye.
TUNISIA Name: Elias Achouri Age: 24 Club: FC Kobenhavn(Denmark) Position: Winger A confident winger who is capable of taking two to three defenders with him and will still come out of that situation with the ball still on his feet. Taking into account that he is 24, it appears to be the perfect time for Achouri to make a name for himself and the Eagles of Carthage in the Ivory Coast.
DR CONGO Name: Fiston Kalala Mayele Age: 29 Club: Pyramids FC(Egypt) Position: Center Forward The DR Congo attack line is heavily loaded with players hungry to make a name for themselves. One of them is Fiston Mayele who is based in Egypt. He spells trouble for defenders as he charges at them with nothing else in his mind but hitting the back of the net, he tends to catch others out with his ability to head the ball in a way that troubles the keeper greatly. If he manages to link correctly with the other strikers that Les Leopards have in their squad, then they will certainly be a team to watch in the tournament.
MOROCCO Name: Ismael Saibari Age: 22 Club: PSV Eindhoven(Netherlands) Position: Central Midfielder Part of the undefeated PSV squad that is yet to drop a point, Ismael Saibari has made his name known on the squad. His flair carries him through as a standout amongst the crowd. In this Moroccan team that is looking to build off their historic World Cup run, head coach Walid Regragui’s decision to grant this young prospect some time in the tournament is simply genius.
ZAMBIA Name: Clatous Chama Age: 32 Club: Simba Sports Club(Tanzania) Position: Central Midfielder The Chipolopolo look to run back their miracle of 2012 in this edition of the competition and will mostly play through their midfield. One of their key midfielders is Clatous Chama who is nicknamed “Mwamba wa Lusaka” which is Swahili for Rock of Lusaka. He is a machine in the frontline for his club and carries a great work ethic towards creating goals every time he plays. Beyond his goal scoring ability, Chama is very technically gifted and makes every situation count when he has the ball. Zambia are blessed to have him on their side.
TANZANIA Name: Tarryn Allarakhia Age: 26 Club: Wealdstone(England) Position: Central Midfielder The Taifa Stars look to shock the African continent in their AFCON 2023 campaign after disappointing campaigns in 1980 and 2019. Tanzania aims to use their hidden gem of a midfielder to the best of his ability to work on progressing the ball up the pitch. Though the Tanzanian stands at five-foot-seven, he is capable of keeping his balance every time he makes a darting run and more importantly,he is able to progress the ball up the field and win fouls in promising positions.In addition, he has sensational flair in his arsenal plus a great shot power and accuracy to his name. Keep your eyes out for this gem Africa!
-
@ cb8f3c8e:c10ec329
2024-01-10 21:35:26WRITTEN BY: ALEX MREMA @npub1w4zrulscqraej2570gkazt0e7j0q3xq4437hnxjqfvcs59hq86fs9vnn4x
The whole of Africa anxiously waits for the continent’s headline tournament to kick off at the Olympic Stadium Ebimpé. This edition of AFCON features teams with talent, flair and a bottled-up hunger ready to fight for their nation to the very end. Like my most recent article that served as “part one” of the must watch games from groups A through C, this essay will look through groups D through F and what juicy encounters these groups have in store for Africa!
GROUP D
GAME: ALGERIA VS ANGOLA DATE: 15th January 2024 TIME: 20:00 BST Group D kicks off with an exciting encounter in which both sides are not entirely familiar with each other. With that, Les Fennecs are looking to put in a firm statement to show the whole of Africa that they are not the same lacklustre team that showed up to Cameroon in 2021.While Angola are looking to make it known that they are not a pushover in this tournament.
GAME: ALGERIA VS BURKINA FASO DATE: 20th January 2024 TIME: 14:00 BST The standout game of this group is one that can go both ways. Burkina Faso have a squad that is capable of going all the way to the finals, they’ve sent out the message several times in previous editions of the tournament that they are not underdogs and nothing close to that, rather they are confident and fearless squad ready to snatch a win from you with ease. Algeria on the other hand are looking to stop Les Étalons attacking threat from harming them while they also do what they do best- attack, attack, attack. Exciting encounter!
GROUP E
GAME: MALI VS SOUTH AFRICA DATE: 16th January 2024 TIME: 20:00 BST Mali have one of the most underrated squads coming to the Ivory Coast. They have a strong attacking unit and a solid midfield led by Tottenham Hotspurs star; Yves Bissouma, they are going to give the South African defence some trouble in this encounter. However, Bafana Bafana are also able to be a nuisance to the Mali defence as their no-joke attacking unit is designed to catch defences lacking especially with Percy Tau on the pitch.
GAME: TUNISIA VS MALI DATE: 20th January 2024 TIME: 20:00 BST A mouth-watering encounter that has some history after a blunder from the Zambian referee in their last AFCON encounter in Cameroon saw Janny Sikazwe blow the whistle for full time in the 86th minute! Nevermind that, Mali managed to collect the win and top their group. Tunisia are looking to set the record straight against the Malians in their quest to match their successes of AFCON 2004, which they won on home soil. If the Tunisians are looking to go all the way then this game is a must win for them to prove that they can take on the continent’ big dogs.
GAME: SOUTH AFRICA VS TUNISIA DATE: 24th January 2024 TIME: 17:00 BST Considering that this is the last game of the group stage, the Tunisians are bound to attack as much as they can against the Bafana Bafana defence that can be leaky at times. Though it must be said Tunisia’s attacking unit is an ageing one but has some sprinkles of youth here and there with the likes of Elias Achouri and Sayfallah Ltaief. With this, if South Africa do manage to stop the Tunisian attack, they are more than likely able to steal the game from them. And so this makes the clash a pretty unpredictable game on who’s going to take the three points .
GROUP F
GAME: D.R.C VS ZAMBIA DATE: 17th January 2024 TIME: 20:00 BST Zambia look to repeat their miracle of 2012 and go all the way. The Chipolopolo have a midfield unit that is able to keep the ball safely and also have an attacking unit that can score goals from nowhere, having put 3 past the Ivory Coast during qualifiers, this team is heavily underrated.Their first hurdle is none other than the Democratic Republic of Congo that carries a heavy loaded attacking unit ready to make defences regret for even trying to cope against them, Les Léopards are definitely a team to watch throughout the tournament because of their confident and exciting attacking element in their gameplay.
GAME: ZAMBIA VS TANZANIA DATE: 21st January 2024 TIME: 17:00 BST There is nothing better than a clash between two neighbours in the group stage. Stade de San Pedro is bound to cook up something sensational. The Taifa Stars squad frustrated opponents in the qualifiers with their concentrated defence plus having an attacking unit that would score and immediately join the defence in squeezing in narrow victories which eventually made them one of Africa’s 24 competing nations in the tournament. I mean, they only scored three goals during the qualifiers but are somehow in the tournament…Remarkable! But, Zambia’s attacking force during qualifiers was on fire raking 12 goals in their favour and having Leicester City star Patson Daka to lead the line, he already has 4 goals and 2 assists in 7 appearances all season and will look to carry this form to the Ivory Coast. This is a classic game of attack versus defence, keep your eye out for this game Africa!
GAME: MOROCCO VS D.R.C DATE: 21st January 2024 TIME: 14:00 BST The game of the group promises back and forth attacking football throughout. The history-making Morocco are tipped as one of the top sides to win the tournament come February 11th all due to being a well oiled machine with power in all sectors on the pitch and even on the bench! Star attackers like En-Nesyri, Ezzalzouli and Boufal aim to show the Congolese who is boss when they clash. However, Les Léopards are an established side and are not a side to mess with as their attacking options are there to make Hakimi and the rest of the Moroccan backline feel their wrath.
-
@ 9e69e420:d12360c2
2025-01-19 04:48:31A new report from the National Sports Shooting Foundation (NSSF) shows that civilian firearm possession exceeded 490 million in 2022. The total from 1990 to 2022 is estimated at 491.3 million firearms. In 2022, over ten million firearms were domestically produced, leading to a total of 16,045,911 firearms available in the U.S. market.
Of these, 9,873,136 were handguns, 4,195,192 were rifles, and 1,977,583 were shotguns. Handgun availability aligns with the concealed carry and self-defense market, as all states allow concealed carry, with 29 having constitutional carry laws.
-
@ 154ee9a3:14840b27
2024-01-10 17:46:26Hello NOSTR Community!
We are thrilled to introduce ourselves – The Learning Orchard, based in the vibrant city of Arusha, Tanzania. Our mission is clear: to become a center of excellence in supporting children with learning differences and to be a leading advocate for specialized education in Tanzania.
Our Journey Begins: The GEYSER Page Launch and NOSTR
Exciting news! We've officially launched our GEYSER page and NOSTR, and we're thrilled to be part of the dynamic Bitcoin and NOSTR space. This marks the beginning of a journey where we aim to make a meaningful impact in the lives of children in Tanzania with unique learning needs.
A Glimpse into Our Vision
At The Learning Orchard, we envision a future where every child, regardless of their learning differences, receives the support they need to thrive. Our commitment to excellence and advocacy drives us to create a positive change in the landscape of education in Tanzania.
Stay Tuned for More Updates!
We can't wait to share more about our initiatives, progress, and the incredible stories that unfold on this journey. Your support means the world to us, and we're grateful to be a part of the NOSTR community.
Thank you for joining us on this exciting adventure!
Warm regards,
The Learning Orchard Team
-
@ d9e9fb27:d5fe5e1a
2025-01-17 13:00:58Every 16th of January, the city of Varese, a small town at the feet of the Prealpine region, stops to participate in one of the most important ceremonies of the city: The Falò of Sant'Antonio. A Falò is the Italian word for bonfire. Imagine a 5-meters tall pyre of wood burning in the center of the city. For sure, an unmissable event!
The pyre is built by the so-called "Monelli della Motta". A Monello in Italian is a child that misbehaves. This nickname come from the fact that in the past, the pyre was created using wood stolen from the city, usually from tools, doors and shutters.
This event takes place at the eve of the day of Sant'Antonio Abate in front of the homonymous church in the area called "La Motta", which stands for small hill, and comes from a several century old tradition. Thousands of people from all over the province come to the city to look at the bonfire created in honor of the Saint.
At 9PM the big event starts. The wood is set on fire!
An important tradition of this celebration is burning small pieces of paper containing wishes. People whish for health, love, friendship and luck. To make wishes come true, people have to give these pieces of paper to a firefighter or a "Monello" whom will launch it into the Falò.
The show goes on for a couple of ours, during which thousands of Varesinians in awe contemplate the raging fire and try to receive some heat to fight the glacial cold of January.
-
@ 3bf0c63f:aefa459d
2024-01-15 11:15:06Pequenos problemas que o Estado cria para a sociedade e que não são sempre lembrados
- **vale-transporte**: transferir o custo com o transporte do funcionário para um terceiro o estimula a morar longe de onde trabalha, já que morar perto é normalmente mais caro e a economia com transporte é inexistente. - **atestado médico**: o direito a faltar o trabalho com atestado médico cria a exigência desse atestado para todas as situações, substituindo o livre acordo entre patrão e empregado e sobrecarregando os médicos e postos de saúde com visitas desnecessárias de assalariados resfriados. - **prisões**: com dinheiro mal-administrado, burocracia e péssima alocação de recursos -- problemas que empresas privadas em competição (ou mesmo sem qualquer competição) saberiam resolver muito melhor -- o Estado fica sem presídios, com os poucos existentes entupidos, muito acima de sua alocação máxima, e com isto, segundo a bizarra corrente de responsabilidades que culpa o juiz que condenou o criminoso por sua morte na cadeia, juízes deixam de condenar à prisão os bandidos, soltando-os na rua. - **justiça**: entrar com processos é grátis e isto faz proliferar a atividade dos advogados que se dedicam a criar problemas judiciais onde não seria necessário e a entupir os tribunais, impedindo-os de fazer o que mais deveriam fazer. - **justiça**: como a justiça só obedece às leis e ignora acordos pessoais, escritos ou não, as pessoas não fazem acordos, recorrem sempre à justiça estatal, e entopem-na de assuntos que seriam muito melhor resolvidos entre vizinhos. - **leis civis**: as leis criadas pelos parlamentares ignoram os costumes da sociedade e são um incentivo a que as pessoas não respeitem nem criem normas sociais -- que seriam maneiras mais rápidas, baratas e satisfatórias de resolver problemas. - **leis de trãnsito**: quanto mais leis de trânsito, mais serviço de fiscalização são delegados aos policiais, que deixam de combater crimes por isto (afinal de contas, eles não querem de fato arriscar suas vidas combatendo o crime, a fiscalização é uma excelente desculpa para se esquivarem a esta responsabilidade). - **financiamento educacional**: é uma espécie de subsídio às faculdades privadas que faz com que se criem cursos e mais cursos que são cada vez menos recheados de algum conhecimento ou técnica útil e cada vez mais inúteis. - **leis de tombamento**: são um incentivo a que o dono de qualquer área ou construção "histórica" destrua todo e qualquer vestígio de história que houver nele antes que as autoridades descubram, o que poderia não acontecer se ele pudesse, por exemplo, usar, mostrar e se beneficiar da história daquele local sem correr o risco de perder, de fato, a sua propriedade. - **zoneamento urbano**: torna as cidades mais espalhadas, criando uma necessidade gigantesca de carros, ônibus e outros meios de transporte para as pessoas se locomoverem das zonas de moradia para as zonas de trabalho. - **zoneamento urbano**: faz com que as pessoas percam horas no trânsito todos os dias, o que é, além de um desperdício, um atentado contra a sua saúde, que estaria muito melhor servida numa caminhada diária entre a casa e o trabalho. - **zoneamento urbano**: torna ruas e as casas menos seguras criando zonas enormes, tanto de residências quanto de indústrias, onde não há movimento de gente alguma. - **escola obrigatória + currículo escolar nacional**: emburrece todas as crianças. - **leis contra trabalho infantil**: tira das crianças a oportunidade de aprender ofícios úteis e levar um dinheiro para ajudar a família. - **licitações**: como não existem os critérios do mercado para decidir qual é o melhor prestador de serviço, criam-se comissões de pessoas que vão decidir coisas. isto incentiva os prestadores de serviço que estão concorrendo na licitação a tentar comprar os membros dessas comissões. isto, fora a corrupção, gera problemas reais: __(i)__ a escolha dos serviços acaba sendo a pior possível, já que a empresa prestadora que vence está claramente mais dedicada a comprar comissões do que a fazer um bom trabalho (este problema afeta tantas áreas, desde a construção de estradas até a qualidade da merenda escolar, que é impossível listar aqui); __(ii)__ o processo corruptor acaba, no longo prazo, eliminando as empresas que prestavam e deixando para competir apenas as corruptas, e a qualidade tende a piorar progressivamente. - **cartéis**: o Estado em geral cria e depois fica refém de vários grupos de interesse. o caso dos taxistas contra o Uber é o que está na moda hoje (e o que mostra como os Estados se comportam da mesma forma no mundo todo). - **multas**: quando algum indivíduo ou empresa comete uma fraude financeira, ou causa algum dano material involuntário, as vítimas do caso são as pessoas que sofreram o dano ou perderam dinheiro, mas o Estado tem sempre leis que prevêem multas para os responsáveis. A justiça estatal é sempre muito rígida e rápida na aplicação dessas multas, mas relapsa e vaga no que diz respeito à indenização das vítimas. O que em geral acontece é que o Estado aplica uma enorme multa ao responsável pelo mal, retirando deste os recursos que dispunha para indenizar as vítimas, e se retira do caso, deixando estas desamparadas. - **desapropriação**: o Estado pode pegar qualquer propriedade de qualquer pessoa mediante uma indenização que é necessariamente inferior ao valor da propriedade para o seu presente dono (caso contrário ele a teria vendido voluntariamente). - **seguro-desemprego**: se há, por exemplo, um prazo mínimo de 1 ano para o sujeito ter direito a receber seguro-desemprego, isto o incentiva a planejar ficar apenas 1 ano em cada emprego (ano este que será sucedido por um período de desemprego remunerado), matando todas as possibilidades de aprendizado ou aquisição de experiência naquela empresa específica ou ascensão hierárquica. - **previdência**: a previdência social tem todos os defeitos de cálculo do mundo, e não importa muito ela ser uma forma horrível de poupar dinheiro, porque ela tem garantias bizarras de longevidade fornecidas pelo Estado, além de ser compulsória. Isso serve para criar no imaginário geral a idéia da __aposentadoria__, uma época mágica em que todos os dias serão finais de semana. A idéia da aposentadoria influencia o sujeito a não se preocupar em ter um emprego que faça sentido, mas sim em ter um trabalho qualquer, que o permita se aposentar. - **regulamentação impossível**: milhares de coisas são proibidas, há regulamentações sobre os aspectos mais mínimos de cada empreendimento ou construção ou espaço. se todas essas regulamentações fossem exigidas não haveria condições de produção e todos morreriam. portanto, elas não são exigidas. porém, o Estado, ou um agente individual imbuído do poder estatal pode, se desejar, exigi-las todas de um cidadão inimigo seu. qualquer pessoa pode viver a vida inteira sem cumprir nem 10% das regulamentações estatais, mas viverá também todo esse tempo com medo de se tornar um alvo de sua exigência, num estado de terror psicológico. - **perversão de critérios**: para muitas coisas sobre as quais a sociedade normalmente chegaria a um valor ou comportamento "razoável" espontaneamente, o Estado dita regras. estas regras muitas vezes não são obrigatórias, são mais "sugestões" ou limites, como o salário mínimo, ou as 44 horas semanais de trabalho. a sociedade, porém, passa a usar esses valores como se fossem o normal. são raras, por exemplo, as ofertas de emprego que fogem à regra das 44h semanais. - **inflação**: subir os preços é difícil e constrangedor para as empresas, pedir aumento de salário é difícil e constrangedor para o funcionário. a inflação força as pessoas a fazer isso, mas o aumento não é automático, como alguns economistas podem pensar (enquanto alguns outros ficam muito satisfeitos de que esse processo seja demorado e difícil). - **inflação**: a inflação destrói a capacidade das pessoas de julgar preços entre concorrentes usando a própria memória. - **inflação**: a inflação destrói os cálculos de lucro/prejuízo das empresas e prejudica enormemente as decisões empresariais que seriam baseadas neles. - **inflação**: a inflação redistribui a riqueza dos mais pobres e mais afastados do sistema financeiro para os mais ricos, os bancos e as megaempresas. - **inflação**: a inflação estimula o endividamento e o consumismo. - **lixo:** ao prover coleta e armazenamento de lixo "grátis para todos" o Estado incentiva a criação de lixo. se tivessem que pagar para que recolhessem o seu lixo, as pessoas (e conseqüentemente as empresas) se empenhariam mais em produzir coisas usando menos plástico, menos embalagens, menos sacolas. - **leis contra crimes financeiros:** ao criar legislação para dificultar acesso ao sistema financeiro por parte de criminosos a dificuldade e os custos para acesso a esse mesmo sistema pelas pessoas de bem cresce absurdamente, levando a um percentual enorme de gente incapaz de usá-lo, para detrimento de todos -- e no final das contas os grandes criminosos ainda conseguem burlar tudo.
-
@ cb8f3c8e:c10ec329
2024-01-07 00:18:20WRITTEN BY: ALEX MREMA NOSTR @npub1w4zrulscqraej2570gkazt0e7j0q3xq4437hnxjqfvcs59hq86fs9vnn4x
AFCON 2023 kicks off in a couple days with 24 of Africa’s best taking each other on for the coveted prize. The journey will be long for some while others will have to cancel some of their hotel reservations in the Ivory Coast as their journey will end earlier than expected. Looking at the participating nations, we are assured of great games throughout the competition and even looking at the group stage itself, they’re games that are simply a must-watch. This article will deep dive into the games in the first three groups that promise to provide entertainment.
GROUP A
GAME: NIGERIA VS EQUATORIAL GUINEA DATE: 14th January 2024 TIME: 14:00 BST Equatorial Guinea are a side that carries no fear within their hearts and are always ready for a challenge. They are not newcomers at punishing a team for poor play and will look to catch the loaded Super Eagles squad lacking in order to pull off an early tournament surprise.
GAME: IVORY COAST VS NIGERIA DATE: 18th January 2024 TIME: 17:00 BST A clash of the heavyweights comes early on in the tournament with the Super Eagles taking on Les Éléphants at the Olympic Stadium of Ebimpé. The hosts have to be in tip top shape to not disappoint their home fans against their West African rivals. Nigeria on the other hand are expected to go all the way in the tournament and will use this as a test for what to expect in the knockout rounds should they progress.
GAME: EQUATORIAL GUINEA VS IVORY COAST DATE: 22nd January 2024 TIME: 17:00 BST The last round of group games doesn’t get more important than this. Depending on the situation in the group, this could be a win or go home situation for both nations involved. Expect hard, back-and-forth, old school fearless African football as each country will aim to send a message to the rest of the continent that their football is one not to mess with!
GROUP B
GAME: GHANA VS CAPE VERDE DATE: 14th January 2024 TIME: 20:00 BST This will be Ghana’s first AFCON game since their shambolic campaign in Cameroon. They will look to express themselves as a new and reformed nation with a fresh style capable of taking them deep into the tournament. Cape Verde on the other hand are not going to make it easy for the Ghanaians as they are capable of creating a mountain load of chances to trouble the Ghanaian defence and keeper.
GAME: EGYPT VS GHANA DATE: 18th January 2024 TIME: 20:00 BST The Pharaohs are a red hot squad who are capable of taking on any of the other 23 nations involved in the competition and Ghana is no exception to this. Egypt’s defensive excellence will be a task that is capable of frustrating the Ghanaians but will be able to provide a great game of high tactical brilliance. Tune in to this one!
GROUP C
GAME: SENEGAL VS GAMBIA DATE: 15th January 2024 TIME: 14:00 BST The Group of Death consists of nations that are capable of providing games that will leave us on the edge of our seats by the final whistle and this clash of West African neighbours is no exception. The Gambians were one of the surprise packages of the 2021 edition of the last tournament making it all the way to the quarter-finals. However, this is one huge hurdle The Scorpions have to overcome in their first game as they take on the defending champions in their first game. Senegal will be looking to make it to their third final in as many tournaments. This match is simply a must watch!
GAME: CAMEROON VS GUINEA DATE: 15th January 2024 TIME: 17:00 BST Cameroon look to get to the finals after falling short on home soil in the last edition,which they hosted. They start off their campaign against a Guinea side that plays with purpose and pride. Guinea don’t hold anything back when they step on the AFCON stage- no matter the circumstances against them they will show up and show out against any opponent. This confidence coupled with Cameroon’s determination to take the trophy home makes the perfect potion for a juicy first round encounter in Group C.
GAME: SENEGAL VS CAMEROON DATE: 19th January 2024 TIME: 17:00 BST The clash of the lions is undoubtedly the game of the group stage. The Lions of Teranga take on The Indomitable Lions looking to take revenge for their heartbreaking semi-final exit from the last edition via penalty shootouts that left the whole nation in tears. This game will have the Cameroonians carrying extra motivation in their hearts to take down the Senegalese with their blistering attack led by their skipper, the goal scoring machine: Vincent Aboubakar.
GAME: GUINEA VS GAMBIA DATE: 19th January 2024 TIME: 20:00 BST
This will likely be a must-win game for both of the nations in order to secure comfortability in matchday 3 which is essential for a group of this magnitude. Both nations have a desire for scoring goals and attacking fearlessly, almost making it a given that this game will be a back and forth encounter that will see each country put their blood, sweat and tears for the three points.
GAME: GAMBIA VS CAMEROON DATE: 23rd January 2024 TIME: 17:00 This clash can possibly determine both nations' fate in the tournament. The Scorpions of Gambia carry an attacking sting that can leave the Cameroonian defence in conflict once they get going, they really can take on Cameroon and even leave with all three points here. But, this is Cameroon we are talking about, they will be determined to give their all to assure fans that they are not going to slip up even once in their quest to the trophy.
GAME: GUINEA VS SENEGAL DATE: 23rd January 2024 TIME: 17:00 BST Like the Gambia v Cameroon encounter, this game will be the determining factor for both these nations in their chase for the trophy. Senegal’s chase to retain the trophy has to go through the resilient Guineans. This sets up for a mouth-watering tie that will make both camps play with their hearts on their sleeves.
-
@ cb8f3c8e:c10ec329
2024-01-05 18:33:59SPORTSTR IS HERE...
Since my earliest days, sports has been my lifeblood. At just six years old, my mother introduced me to the world of swimming—a decision that set the course for an incredible journey. By the age of eleven, I proudly held the title of a national champion in the UK. That achievement ignited a fire within me—a passion for sports that has burned ever brighter as the years passed.
Throughout my career in sports, I've been blessed with experiences that have shaped me profoundly. But now, my focus is turning towards nurturing the talents of the next generation.
As my journey in Bitcoin continues to evolve, I've eagerly awaited the perfect opportunity to unite it with my love for Africa, sports and the next generation. That moment has arrived.
I see an incredible prospect—an opportunity to empower grassroots, amateur, and professional athletes from around the world, particularly those hailing from East Africa. With the fusion of #NOSTR and #Bitcoin, I envision SPORTSTR as a place where these remarkable talents can showcase their abilities and connect with a global audience.
One individual who embodies this passion for sports and the transformative power of Bitcoin is my nephew, Alex Mrema (⚡️alexmrema@blink.sv). He's not just a talented athlete; he's a writer whose passion for sports knows no bounds. He's witnessed my journey through the world of sports and seen how Bitcoin has seamlessly woven its way into my life. We have partnered to launch SPORTSTR as a place for him and I to create content about sport on NOSTR and receive value in the form of Bitcoin.
Today marks the launch of SPORTSTR—an initiative aimed at sharing compelling articles by young writers, sporting news, and exclusive interviews with athletes. Our ultimate goal? To introduce them and our audience to the world of Bitcoin and NOSTR, seamlessly integrating these innovative technologies into the realm of sports.
This, however, is just the beginning—a starting point for something truly orange, purple and remarkable.
MAN LIKE WHO?
MAN LIKE KWEKS!
🇹🇿⚡️💜🏔
sportstr #sports #bitcoin #nostr
-
@ 6389be64:ef439d32
2025-01-16 15:44:06Black Locust can grow up to 170 ft tall
Grows 3-4 ft. per year
Native to North America
Cold hardy in zones 3 to 8
Firewood
- BLT wood, on a pound for pound basis is roughly half that of Anthracite Coal
- Since its growth is fast, firewood can be plentiful
Timber
- Rot resistant due to a naturally produced robinin in the wood
- 100 year life span in full soil contact! (better than cedar performance)
- Fence posts
- Outdoor furniture
- Outdoor decking
- Sustainable due to its fast growth and spread
- Can be coppiced (cut to the ground)
- Can be pollarded (cut above ground)
- Its dense wood makes durable tool handles, boxes (tool), and furniture
- The wood is tougher than hickory, which is tougher than hard maple, which is tougher than oak.
- A very low rate of expansion and contraction
- Hardwood flooring
- The highest tensile beam strength of any American tree
- The wood is beautiful
Legume
- Nitrogen fixer
- Fixes the same amount of nitrogen per acre as is needed for 200-bushel/acre corn
- Black walnuts inter-planted with locust as “nurse” trees were shown to rapidly increase their growth [[Clark, Paul M., and Robert D. Williams. (1978) Black walnut growth increased when interplanted with nitrogen-fixing shrubs and trees. Proceedings of the Indiana Academy of Science, vol. 88, pp. 88-91.]]
Bees
- The edible flower clusters are also a top food source for honey bees
Shade Provider
- Its light, airy overstory provides dappled shade
- Planted on the west side of a garden it provides relief during the hottest part of the day
- (nitrogen provider)
- Planted on the west side of a house, its quick growth soon shades that side from the sun
Wind-break
- Fast growth plus it's feathery foliage reduces wind for animals, crops, and shelters
Fodder
- Over 20% crude protein
- 4.1 kcal/g of energy
- Baertsche, S.R, M.T. Yokoyama, and J.W. Hanover (1986) Short rotation, hardwood tree biomass as potential ruminant feed-chemical composition, nylon bag ruminal degradation and ensilement of selected species. J. Animal Sci. 63 2028-2043
-
@ 97c70a44:ad98e322
2025-01-30 17:15:37There was a slight dust up recently over a website someone runs removing a listing for an app someone built based on entirely arbitrary criteria. I'm not to going to attempt to speak for either wounded party, but I would like to share my own personal definition for what constitutes a "nostr app" in an effort to help clarify what might be an otherwise confusing and opaque purity test.
In this post, I will be committing the "no true Scotsman" fallacy, in which I start with the most liberal definition I can come up with, and gradually refine it until all that is left is the purest, gleamingest, most imaginary and unattainable nostr app imaginable. As I write this, I wonder if anything built yet will actually qualify. In any case, here we go.
It uses nostr
The lowest bar for what a "nostr app" might be is an app ("application" - i.e. software, not necessarily a native app of any kind) that has some nostr-specific code in it, but which doesn't take any advantage of what makes nostr distinctive as a protocol.
Examples might include a scraper of some kind which fulfills its charter by fetching data from relays (regardless of whether it validates or retains signatures). Another might be a regular web 2.0 app which provides an option to "log in with nostr" by requesting and storing the user's public key.
In either case, the fact that nostr is involved is entirely neutral. A scraper can scrape html, pdfs, jsonl, whatever data source - nostr relays are just another target. Likewise, a user's key in this scenario is treated merely as an opaque identifier, with no appreciation for the super powers it brings along.
In most cases, this kind of app only exists as a marketing ploy, or less cynically, because it wants to get in on the hype of being a "nostr app", without the developer quite understanding what that means, or having the budget to execute properly on the claim.
It leverages nostr
Some of you might be wondering, "isn't 'leverage' a synonym for 'use'?" And you would be right, but for one connotative difference. It's possible to "use" something improperly, but by definition leverage gives you a mechanical advantage that you wouldn't otherwise have. This is the second category of "nostr app".
This kind of app gets some benefit out of the nostr protocol and network, but in an entirely selfish fashion. The intention of this kind of app is not to augment the nostr network, but to augment its own UX by borrowing some nifty thing from the protocol without really contributing anything back.
Some examples might include:
- Using nostr signers to encrypt or sign data, and then store that data on a proprietary server.
- Using nostr relays as a kind of low-code backend, but using proprietary event payloads.
- Using nostr event kinds to represent data (why), but not leveraging the trustlessness that buys you.
An application in this category might even communicate to its users via nostr DMs - but this doesn't make it a "nostr app" any more than a website that emails you hot deals on herbal supplements is an "email app". These apps are purely parasitic on the nostr ecosystem.
In the long-term, that's not necessarily a bad thing. Email's ubiquity is self-reinforcing. But in the short term, this kind of "nostr app" can actually do damage to nostr's reputation by over-promising and under-delivering.
It complements nostr
Next up, we have apps that get some benefit out of nostr as above, but give back by providing a unique value proposition to nostr users as nostr users. This is a bit of a fine distinction, but for me this category is for apps which focus on solving problems that nostr isn't good at solving, leaving the nostr integration in a secondary or supporting role.
One example of this kind of app was Mutiny (RIP), which not only allowed users to sign in with nostr, but also pulled those users' social graphs so that users could send money to people they knew and trusted. Mutiny was doing a great job of leveraging nostr, as well as providing value to users with nostr identities - but it was still primarily a bitcoin wallet, not a "nostr app" in the purest sense.
Other examples are things like Nostr Nests and Zap.stream, whose core value proposition is streaming video or audio content. Both make great use of nostr identities, data formats, and relays, but they're primarily streaming apps. A good litmus test for things like this is: if you got rid of nostr, would it be the same product (even if inferior in certain ways)?
A similar category is infrastructure providers that benefit nostr by their existence (and may in fact be targeted explicitly at nostr users), but do things in a centralized, old-web way; for example: media hosts, DNS registrars, hosting providers, and CDNs.
To be clear here, I'm not casting aspersions (I don't even know what those are, or where to buy them). All the apps mentioned above use nostr to great effect, and are a real benefit to nostr users. But they are not True Scotsmen.
It embodies nostr
Ok, here we go. This is the crème de la crème, the top du top, the meilleur du meilleur, the bee's knees. The purest, holiest, most chaste category of nostr app out there. The apps which are, indeed, nostr indigitate.
This category of nostr app (see, no quotes this time) can be defined by the converse of the previous category. If nostr was removed from this type of application, would it be impossible to create the same product?
To tease this apart a bit, apps that leverage the technical aspects of nostr are dependent on nostr the protocol, while apps that benefit nostr exclusively via network effect are integrated into nostr the network. An app that does both things is working in symbiosis with nostr as a whole.
An app that embraces both nostr's protocol and its network becomes an organic extension of every other nostr app out there, multiplying both its competitive moat and its contribution to the ecosystem:
- In contrast to apps that only borrow from nostr on the technical level but continue to operate in their own silos, an application integrated into the nostr network comes pre-packaged with existing users, and is able to provide more value to those users because of other nostr products. On nostr, it's a good thing to advertise your competitors.
- In contrast to apps that only market themselves to nostr users without building out a deep integration on the protocol level, a deeply integrated app becomes an asset to every other nostr app by becoming an organic extension of them through interoperability. This results in increased traffic to the app as other developers and users refer people to it instead of solving their problem on their own. This is the "micro-apps" utopia we've all been waiting for.
Credible exit doesn't matter if there aren't alternative services. Interoperability is pointless if other applications don't offer something your app doesn't. Marketing to nostr users doesn't matter if you don't augment their agency as nostr users.
If I had to choose a single NIP that represents the mindset behind this kind of app, it would be NIP 89 A.K.A. "Recommended Application Handlers", which states:
Nostr's discoverability and transparent event interaction is one of its most interesting/novel mechanics. This NIP provides a simple way for clients to discover applications that handle events of a specific kind to ensure smooth cross-client and cross-kind interactions.
These handlers are the glue that holds nostr apps together. A single event, signed by the developer of an application (or by the application's own account) tells anyone who wants to know 1. what event kinds the app supports, 2. how to link to the app (if it's a client), and (if the pubkey also publishes a kind 10002), 3. which relays the app prefers.
As a sidenote, NIP 89 is currently focused more on clients, leaving DVMs, relays, signers, etc somewhat out in the cold. Updating 89 to include tailored listings for each kind of supporting app would be a huge improvement to the protocol. This, plus a good front end for navigating these listings (sorry nostrapp.link, close but no cigar) would obviate the evil centralized websites that curate apps based on arbitrary criteria.
Examples of this kind of app obviously include many kind 1 clients, as well as clients that attempt to bring the benefits of the nostr protocol and network to new use cases - whether long form content, video, image posts, music, emojis, recipes, project management, or any other "content type".
To drill down into one example, let's think for a moment about forms. What's so great about a forms app that is built on nostr? Well,
- There is a spec for forms and responses, which means that...
- Multiple clients can implement the same data format, allowing for credible exit and user choice, even of...
- Other products not focused on forms, which can still view, respond to, or embed forms, and which can send their users via NIP 89 to a client that does...
- Cryptographically sign forms and responses, which means they are self-authenticating and can be sent to...
- Multiple relays, which reduces the amount of trust necessary to be confident results haven't been deliberately "lost".
Show me a forms product that does all of those things, and isn't built on nostr. You can't, because it doesn't exist. Meanwhile, there are plenty of image hosts with APIs, streaming services, and bitcoin wallets which have basically the same levels of censorship resistance, interoperability, and network effect as if they weren't built on nostr.
It supports nostr
Notice I haven't said anything about whether relays, signers, blossom servers, software libraries, DVMs, and the accumulated addenda of the nostr ecosystem are nostr apps. Well, they are (usually).
This is the category of nostr app that gets none of the credit for doing all of the work. There's no question that they qualify as beautiful nostrcorns, because their value propositions are entirely meaningless outside of the context of nostr. Who needs a signer if you don't have a cryptographic identity you need to protect? DVMs are literally impossible to use without relays. How are you going to find the blossom server that will serve a given hash if you don't know which servers the publishing user has selected to store their content?
In addition to being entirely contextualized by nostr architecture, this type of nostr app is valuable because it does things "the nostr way". By that I mean that they don't simply try to replicate existing internet functionality into a nostr context; instead, they create entirely new ways of putting the basic building blocks of the internet back together.
A great example of this is how Nostr Connect, Nostr Wallet Connect, and DVMs all use relays as brokers, which allows service providers to avoid having to accept incoming network connections. This opens up really interesting possibilities all on its own.
So while I might hesitate to call many of these things "apps", they are certainly "nostr".
Appendix: it smells like a NINO
So, let's say you've created an app, but when you show it to people they politely smile, nod, and call it a NINO (Nostr In Name Only). What's a hacker to do? Well, here's your handy-dandy guide on how to wash that NINO stench off and Become a Nostr.
You app might be a NINO if:
- There's no NIP for your data format (or you're abusing NIP 78, 32, etc by inventing a sub-protocol inside an existing event kind)
- There's a NIP, but no one knows about it because it's in a text file on your hard drive (or buried in your project's repository)
- Your NIP imposes an incompatible/centralized/legacy web paradigm onto nostr
- Your NIP relies on trusted third (or first) parties
- There's only one implementation of your NIP (yours)
- Your core value proposition doesn't depend on relays, events, or nostr identities
- One or more relay urls are hard-coded into the source code
- Your app depends on a specific relay implementation to work (ahem, relay29)
- You don't validate event signatures
- You don't publish events to relays you don't control
- You don't read events from relays you don't control
- You use legacy web services to solve problems, rather than nostr-native solutions
- You use nostr-native solutions, but you've hardcoded their pubkeys or URLs into your app
- You don't use NIP 89 to discover clients and services
- You haven't published a NIP 89 listing for your app
- You don't leverage your users' web of trust for filtering out spam
- You don't respect your users' mute lists
- You try to "own" your users' data
Now let me just re-iterate - it's ok to be a NINO. We need NINOs, because nostr can't (and shouldn't) tackle every problem. You just need to decide whether your app, as a NINO, is actually contributing to the nostr ecosystem, or whether you're just using buzzwords to whitewash a legacy web software product.
If you're in the former camp, great! If you're in the latter, what are you waiting for? Only you can fix your NINO problem. And there are lots of ways to do this, depending on your own unique situation:
- Drop nostr support if it's not doing anyone any good. If you want to build a normal company and make some money, that's perfectly fine.
- Build out your nostr integration - start taking advantage of webs of trust, self-authenticating data, event handlers, etc.
- Work around the problem. Think you need a special relay feature for your app to work? Guess again. Consider encryption, AUTH, DVMs, or better data formats.
- Think your idea is a good one? Talk to other devs or open a PR to the nips repo. No one can adopt your NIP if they don't know about it.
- Keep going. It can sometimes be hard to distinguish a research project from a NINO. New ideas have to be built out before they can be fully appreciated.
- Listen to advice. Nostr developers are friendly and happy to help. If you're not sure why you're getting traction, ask!
I sincerely hope this article is useful for all of you out there in NINO land. Maybe this made you feel better about not passing the totally optional nostr app purity test. Or maybe it gave you some actionable next steps towards making a great NINON (Nostr In Not Only Name) app. In either case, GM and PV.
-
@ 5a261a61:2ebd4480
2025-01-30 09:37:26The idea of the Bean Bag Game is quite ingenious. I read about it on a BDSM-positive blog. Here’s how it works:
-
Setup:
-
Take a small cloth bag and add 10 white beans (rewards/pleasure) and 10 black beans (punishment/discomfort).
-
When it’s time to play, draw two beans:
-
First bean (the tone): Determines if the activity will be pleasant (white) or uncomfortable (black).
-
Second bean (the task): Decides whether you get a reward (white) or punishment (black).
-
Combination Interpretations:
-
Black + Black\ "No fun, just work."
-
Boring/challenging tasks you’d normally postpone: window cleaning, scrubbing bathroom tiles, polishing shoes.
-
Could also mean no playtime (e.g., "Go straight to bed"). Pure duty – no pleasure, only discipline.
-
White + Black\ "Work with a twist."
-
Punishment or chores, but with a kinky edge:
-
Clean the bathroom wearing a vibrating butt plug.
-
Wash dishes with nipple clamps; add a clothespin to your body for every minute over the time limit.
-
-
Still no orgasms – the black bean ensures denial.
-
Black + White\ "Pleasure with pain (or humiliation)."
-
Mix stimulation and discomfort:
-
Ride a dildo with weighted nipple clamps.
-
Give a "lap dance" to a teddy bear with a strapon.
-
Chat online as a "perfect plaything" for others without touching yourself.
-
-
Again, no orgasms – the black bean overrules the white.
-
White + White\ "Lucky draw… but denial is optional."
-
Freedom to indulge, though I often choose self-denial anyway. Examples:
-
Edge for 30 minutes, then ask permission to climax (50% chance).
-
Use toys freely, but end the session frustrated.
-
The Dynamic Ratio Twist:
-
The starting 10:10 ratio isn’t fixed. Adjust it based on behavior:
-
Good deeds? Swap a black bean for a white one.
-
Mistakes? Replace a white bean with a black one.
-
Single beans can also decide smaller stakes, like:
-
"Should this edge turn into a ruined orgasm?"
-
"Do I deserve dessert tonight?"
Why It Works:
-
Control: The beans dictate your fate, but you tweak the odds through obedience.
-
Flexibility: Use pairs for major tasks, single beans for quick decisions.
-
Psychological tease: Even "white + white" can mean denial – because you choose the rules.
-
-
@ 0fa80bd3:ea7325de
2025-01-30 04:28:30"Degeneration" or "Вырождение" ![[photo_2025-01-29 23.23.15.jpeg]]
A once-functional object, now eroded by time and human intervention, stripped of its original purpose. Layers of presence accumulate—marks, alterations, traces of intent—until the very essence is obscured. Restoration is paradoxical: to reclaim, one must erase. Yet erasure is an impossibility, for to remove these imprints is to deny the existence of those who shaped them.
The work stands as a meditation on entropy, memory, and the irreversible dialogue between creation and decay.
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28Músicas grudentas e conversas
Uma vez que você ouviu uma música grudenta e ela volta, inteira, com toda a melodia e a harmonia, muitos dias depois, contra a sua vontade. Mas uma conversa é impossível de lembrar. Por quê?
-
@ 0fa80bd3:ea7325de
2025-01-29 15:43:42Lyn Alden - биткойн евангелист или евангелистка, я пока не понял
npub1a2cww4kn9wqte4ry70vyfwqyqvpswksna27rtxd8vty6c74era8sdcw83a
Thomas Pacchia - PubKey owner - X - @tpacchia
npub1xy6exlg37pw84cpyj05c2pdgv86hr25cxn0g7aa8g8a6v97mhduqeuhgpl
calvadev - Shopstr
npub16dhgpql60vmd4mnydjut87vla23a38j689jssaqlqqlzrtqtd0kqex0nkq
Calle - Cashu founder
npub12rv5lskctqxxs2c8rf2zlzc7xx3qpvzs3w4etgemauy9thegr43sf485vg
Джек Дорси
npub1sg6plzptd64u62a878hep2kev88swjh3tw00gjsfl8f237lmu63q0uf63m
21 ideas
npub1lm3f47nzyf0rjp6fsl4qlnkmzed4uj4h2gnf2vhe3l3mrj85vqks6z3c7l
Много адресов. Хз кто надо сортировать
https://github.com/aitechguy/nostr-address-book
ФиатДжеф - создатель Ностр - https://github.com/fiatjaf
npub180cvv07tjdrrgpa0j7j7tmnyl2yr6yr7l8j4s3evf6u64th6gkwsyjh6w6
EVAN KALOUDIS Zues wallet
npub19kv88vjm7tw6v9qksn2y6h4hdt6e79nh3zjcud36k9n3lmlwsleqwte2qd
Программер Коди https://github.com/CodyTseng/nostr-relay
npub1syjmjy0dp62dhccq3g97fr87tngvpvzey08llyt6ul58m2zqpzps9wf6wl
Anna Chekhovich - Managing Bitcoin at The Anti-Corruption Foundation https://x.com/AnyaChekhovich
npub1y2st7rp54277hyd2usw6shy3kxprnmpvhkezmldp7vhl7hp920aq9cfyr7
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28Bluesky is a scam
Bluesky advertises itself as an open network, they say people won't lose followers or their identity, they advertise themselves as a protocol ("atproto") and because of that they are tricking a lot of people into using them. These three claims are false.
protocolness
Bluesky is a company. "atproto" is the protocol. Supposedly they are two different things, right? Bluesky just releases software that implements the protocol, but others can also do that, it's open!
And yet, the protocol has an official webpage with a waitlist and a private beta? Why is the protocol advertised as a company product? Because it is. The "protocol" is just a description of whatever the Bluesky app and servers do, it can and does change anytime the Bluesky developers decide they want to change it, and it will keep changing for as long as Bluesky apps and servers control the biggest part of the network.
Oh, so there is the possibility of other players stepping in and then it becomes an actual interoperable open protocol? Yes, but what is the likelihood of that happening? It is very low. No serious competitor is likely to step in and build serious apps using a protocol that is directly controlled by Bluesky. All we will ever see are small "community" apps made by users and small satellite small businesses -- not unlike the people and companies that write plugins, addons and alternative clients for popular third-party centralized platforms.
And last, even if it happens that someone makes an app so good that it displaces the canonical official Bluesky app, then that company may overtake the protocol itself -- not because they're evil, but because there is no way it cannot be like this.
identity
According to their own documentation, the Bluesky people were looking for an identity system that provided global ids, key rotation and human-readable names.
They must have realized that such properties are not possible in an open and decentralized system, but instead of accepting a tradeoff they decided they wanted all their desired features and threw away the "decentralized" part, quite literally and explicitly (although they make sure to hide that piece in the middle of a bunch of code and text that very few will read).
The "DID Placeholder" method they decided to use for their global identities is nothing more than a normal old boring trusted server controlled by Bluesky that keeps track of who is who and can, at all times, decide to ban a person and deprive them from their identity (they dismissively call a "denial of service attack").
They decided to adopt this method as a placeholder until someone else doesn't invent the impossible alternative that would provide all their desired properties in a decentralized manner -- which is nothing more than a very good excuse: "yes, it's not great now, but it will improve!".
openness
Months after launching their product with an aura of decentralization and openness and getting a bunch of people inside that believed, falsely, they were joining an actually open network, Bluesky has decided to publish a part of their idea of how other people will be able to join their open network.
When I first saw their app and how they were very prominently things like follower counts, like counts and other things that are typical of centralized networks and can't be reliable or exact on truly open networks (like Nostr), I asked myself how were they going to do that once they became and open "federated" network as they were expected to be.
Turns out their decentralization plan is to just allow you, as a writer, to host your own posts on "personal data stores", but not really have any control over the distribution of the posts. All posts go through the Bluesky central server, called BGS, and they decide what to do with it. And you, as a reader, doesn't have any control of what you're reading from either, all you can do is connect to the BGS and ask for posts. If the BGS decides to ban, shadow ban, reorder, miscount, hide, deprioritize, trick or maybe even to serve ads, then you are out of luck.
Oh, but anyone can run their own BGS!, they will say. Even in their own blog post announcing the architecture they assert that "it’s a fairly resource-demanding service" and "there may be a few large full-network providers". But I fail to see why even more than one network provider will exist, if Bluesky is already doing that job, and considering the fact there are very little incentives for anyone to switch providers -- because the app does not seem to be at all made to talk to multiple providers, one would have to stop using the reliable, fast and beefy official BGS and start using some half-baked alternative and risk losing access to things.
When asked about the possibility of switching, one of Bluesky overlords said: "it would look something like this: bluesky has gone evil. there's a new alternative called freesky that people are rushing to. I'm switching to freesky".
The quote is very naïve and sounds like something that could be said about Twitter itself: "if Twitter is evil you can just run your own social network". Both are fallacies because they ignore the network-effect and the fact that people will never fully agree that something is "evil". In fact these two are the fundamental reasons why -- for social networks specifically (and not for other things like commerce) -- we need truly open protocols with no owners and no committees.
-
@ 0fa80bd3:ea7325de
2025-01-29 14:44:48![[yedinaya-rossiya-bear.png]]
1️⃣ Be where the bear roams. Stay in its territory, where it hunts for food. No point setting a trap in your backyard if the bear’s chilling in the forest.
2️⃣ Set a well-hidden trap. Bury it, disguise it, and place the bait right in the center. Bears are omnivores—just like secret police KGB agents. And what’s the tastiest bait for them? Money.
3️⃣ Wait for the bear to take the bait. When it reaches in, the trap will snap shut around its paw. It’ll be alive, but stuck. No escape.
Now, what you do with a trapped bear is another question... 😏
-
@ 0fa80bd3:ea7325de
2025-01-29 05:55:02The land that belongs to the indigenous peoples of Russia has been seized by a gang of killers who have unleashed a war of extermination. They wipe out anyone who refuses to conform to their rules. Those who disagree and stay behind are tortured and killed in prisons and labor camps. Those who flee lose their homeland, dissolve into foreign cultures, and fade away. And those who stand up to protect their people are attacked by the misled and deceived. The deceived die for the unchecked greed of a single dictator—thousands from both sides, people who just wanted to live, raise their kids, and build a future.
Now, they are forced to make an impossible choice: abandon their homeland or die. Some perish on the battlefield, others lose themselves in exile, stripped of their identity, scattered in a world that isn’t theirs.
There’s been endless debate about how to fix this, how to clear the field of the weeds that choke out every new sprout, every attempt at change. But the real problem? We can’t play by their rules. We can’t speak their language or use their weapons. We stand for humanity, and no matter how righteous our cause, we will not multiply suffering. Victory doesn’t come from matching the enemy—it comes from staying ahead, from using tools they haven’t mastered yet. That’s how wars are won.
Our only resource is the will of the people to rewrite the order of things. Historian Timothy Snyder once said that a nation cannot exist without a city. A city is where the most active part of a nation thrives. But the cities are occupied. The streets are watched. Gatherings are impossible. They control the money. They control the mail. They control the media. And any dissent is crushed before it can take root.
So I started asking myself: How do we stop this fragmentation? How do we create a space where people can rebuild their connections when they’re ready? How do we build a self-sustaining network, where everyone contributes and benefits proportionally, while keeping their freedom to leave intact? And more importantly—how do we make it spread, even in occupied territory?
In 2009, something historic happened: the internet got its own money. Thanks to Satoshi Nakamoto, the world took a massive leap forward. Bitcoin and decentralized ledgers shattered the idea that money must be controlled by the state. Now, to move or store value, all you need is an address and a key. A tiny string of text, easy to carry, impossible to seize.
That was the year money broke free. The state lost its grip. Its biggest weapon—physical currency—became irrelevant. Money became purely digital.
The internet was already a sanctuary for information, a place where people could connect and organize. But with Bitcoin, it evolved. Now, value itself could flow freely, beyond the reach of authorities.
Think about it: when seedlings are grown in controlled environments before being planted outside, they get stronger, survive longer, and bear fruit faster. That’s how we handle crops in harsh climates—nurture them until they’re ready for the wild.
Now, picture the internet as that controlled environment for ideas. Bitcoin? It’s the fertile soil that lets them grow. A testing ground for new models of interaction, where concepts can take root before they move into the real world. If nation-states are a battlefield, locked in a brutal war for territory, the internet is boundless. It can absorb any number of ideas, any number of people, and it doesn’t run out of space.
But for this ecosystem to thrive, people need safe ways to communicate, to share ideas, to build something real—without surveillance, without censorship, without the constant fear of being erased.
This is where Nostr comes in.
Nostr—"Notes and Other Stuff Transmitted by Relays"—is more than just a messaging protocol. It’s a new kind of city. One that no dictator can seize, no corporation can own, no government can shut down.
It’s built on decentralization, encryption, and individual control. Messages don’t pass through central servers—they are relayed through independent nodes, and users choose which ones to trust. There’s no master switch to shut it all down. Every person owns their identity, their data, their connections. And no one—no state, no tech giant, no algorithm—can silence them.
In a world where cities fall and governments fail, Nostr is a city that cannot be occupied. A place for ideas, for networks, for freedom. A city that grows stronger the more people build within it.
-
@ 9e69e420:d12360c2
2025-01-26 15:26:44Secretary of State Marco Rubio issued new guidance halting spending on most foreign aid grants for 90 days, including military assistance to Ukraine. This immediate order shocked State Department officials and mandates “stop-work orders” on nearly all existing foreign assistance awards.
While it allows exceptions for military financing to Egypt and Israel, as well as emergency food assistance, it restricts aid to key allies like Ukraine, Jordan, and Taiwan. The guidance raises potential liability risks for the government due to unfulfilled contracts.
A report will be prepared within 85 days to recommend which programs to continue or discontinue.
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28Jofer
Jofer era um jogador diferente. À primeira vista não, parecia igual, um volante combativo, perseguia os atacantes adversários implacavelmente, um bom jogador. Mas não era essa a característica que diferenciava Jofer. Jofer era, digamos, um chutador.
Começou numa semifinal de um torneio de juniores. O time de Jofer precisava do empate e estava sofrendo uma baita pressão do adversário, mas o jogo estava 1 a 1 e parecia que ia ficar assim mesmo, daquele jeito futebolístico que parece, parece mesmo. Só que aos 46 do segundo tempo tomaram um gol espírita, Ruizinho do outro time saiu correndo pela esquerda e, mesmo sendo canhoto, foi cortando para o meio, os zagueiros meio que achando que já tinha acabado mesmo, devia ter só mais aquele lance, o árbitro tinha dado dois minutos, Ruizinho chutou, marcou e o goleiro, que só pulou depois que já tinha visto que não ia ter jeito, ficou xingando.
A bola saiu do meio e tocaram para Jofer, ninguém nem veio marcá-lo, o outro time já estava comemorando, e com razão, o juiz estava de sacanagem em fazer o jogo continuar, já estava tudo acabado mesmo. Mas não, estava certo, mais um minuto de acréscimo, justo. Em um minuto dá pra fazer um gol. Mas como? Jofer pensou nas partidas da NBA em que com alguns centésimos de segundo faltando o armador jogava de qualquer jeito para a cesta e às vezes acertava. De trás do meio de campo, será? Não vou ter nem força pra fazer chegar no gol. Vou virar piada, melhor tocar pro Fumaça ali do lado e a gente perde sem essa humilhação no final. Mas, poxa, e daí? Vou tentar mesmo assim, qualquer coisa eu falo que foi um lançamento e daqui a uns dias todo mundo esquece. Olhou para o próprio pé, virou ele de ladinho, pra fora e depois pra dentro (bom, se eu pegar daqui, direitinho, quem sabe?), jogou a bola pro lado e bateu. A bola subiu escandalosamente, muito alta mesmo, deve ter subido uns 200 metros. Jofer não tinha como ter a menor noção. Depois foi descendo, o goleirão voltando correndo para debaixo da trave e olhando pra bola, foi chegando e pulando já só pra acompanhar, para ver, dependurado no travessão, a bola sair ainda bem alta, ela bateu na rede lateral interna antes de bater no chão, quicar violentamente e estufar a rede no alto do lado direito de quem olhava.
Mas isso tudo foi sonho do Jofer. Sonhou acordado, numa noite em que demorou pra dormir, deitado na sua cama. Ficou pensando se não seria fácil, se ele treinasse bastante, acertar o gol bem de longe, tipo no sonho, e se não dava pra fazer gol assim. No dia seguinte perguntou a Brunildinho, o treinador de goleiros. Era difícil defender essas bolas, ainda mais se elas subissem muito, o goleiro ficava sem perspectiva, o vento alterava a trajetória a cada instante, tinha efeito, ela cairia rápido, mas claro que não valia à pena treinar isso, a chance de acertar o gol era minúscula. Mas Jofer só ia tentar depois que treinasse bastante e comprovasse o que na sua imaginação parecia uma excelente idéia.
Começou a treinar todos os dias. Primeiro escondido, por vergonha dos colegas, chegava um pouco antes e ficava lá, chutando do círculo central. Ao menor sinal de gente se aproximando, parava e ia catar as bolas. Depois, quando começou a acertar, perdeu a vergonha. O pessoal do clube todo achava engraçado quando via Jofer treinando e depois ouvia a explicação da boca de alguém, ninguém levava muito a sério, mas também não achava de todo ridículo. O pessoal ria, mas no fundo torcia praquilo dar certo, mesmo.
Aconteceu que num jogo que não valia muita coisa, empatezinho feio, aos 40 do segundo tempo, a marcação dos adversários já não estava mais pressionando, todo mundo contente com o empate e com vontade de parar de jogar já, o Henrique, meia-esquerdo, humilde, mas ainda assim um pouco intimidante para Jofer (jogava demais), tocou pra ele. Vai lá, tenta sua loucura aí. Assumiu a responsabilidade do nosso volante introspectivo. Seria mais verossímil se Jofer tivesse errado, primeira vez que tentou, restava muito tempo ainda pra ele ter a chance de ser herói, ninguém acerta de primeira, mas ele acertou. Quase como no sonho, Lucas, o goleiro, não esperava, depois que viu o lance, riu-se, adiantou-se para pegar a bola que ele julgava que quicaria na área, mas ela foi mais pra frente, mais e mais, daí Lucas já estava correndo, só que começou a pensar que ela ia pra fora, e ele ia só se dependurar no travessão e fazer seu papel de estar na bola. Acabou que por conta daquele gol eles terminaram em segundo no grupo daquele torneiozinho, ao invés de terceiro, e não fez diferença nenhuma.
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28O caso da Grêmio TV
enquanto vinha se conduzindo pela plataforma superior daquela arena que se pensava totalmente preenchida por adeptos da famosa equipe do Grêmio de Porto Alegre, viu-se, como por obra de algum nigromante - dos muitos que existem e estão a todo momento a fazer más obras e a colocar-se no caminhos dos que procuram, se não fazer o bem acima de todas as coisas, a pelo menos não fazer o mal no curso da realização dos seus interesses -, o discretíssimo jornalista a ser xingado e moído em palavras por uma horda de malandrinos a cinco ou seis passos dele surgida que cantavam e moviam seus braços em movimentos que não se pode classificar senão como bárbaros, e assim cantavam:
Grêmio TV pior que o SBT !
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28Replacing the web with something saner
This is a simplification, but let's say that basically there are just 3 kinds of websites:
- Websites with content: text, images, videos;
- Websites that run full apps that do a ton of interactive stuff;
- Websites with some interactive content that uses JavaScript, or "mini-apps";
In a saner world we would have 3 different ways of serving and using these. 1 would be "the web" (and it was for a while, although I'm not claiming here that the past is always better and wanting to get back to the glorious old days).
1 would stay as "the web", just static sites, styled with CSS, no JavaScript whatsoever, but designers can still thrive and make they look pretty. Or it could also be something like Gemini. Maybe the two protocols could coexist.
2 would be downloadable native apps, much easier to write and maintain for developers (considering that multi-platform and cross-compilation is easy today and getting easier), faster, more polished experience for users, more powerful, integrates better with the computer.
(Remember that since no one would be striving to make the same app run both on browsers and natively no one would have any need for Electron or other inefficient bloated solutions, just pure native UI, like the Telegram app, have you seen that? It's fast.)
But 2 is mostly for apps that people use every day, something like Google Docs, email (although email is also broken technology), Netflix, Twitter, Trello and so on, and all those hundreds of niche SaaS that people pay monthly fees to use, each tailored to a different industry (although most of functions they all implement are the same everywhere). What do we do with dynamic open websites like StackOverflow, for example, where one needs to not only read, but also search and interact in multiple ways? What about that website that asks you a bunch of questions and then discovers the name of the person you're thinking about? What about that mini-app that calculates the hash of your provided content or shrinks your video, or that one that hosts your image without asking any questions?
All these and tons of others would fall into category 3, that of instantly loaded apps that you don't have to install, and yet they run in a sandbox.
The key for making category 3 worth investing time into is coming up with some solid grounds, simple enough that anyone can implement in multiple different ways, but not giving the app too much choices.
Telegram or Discord bots are super powerful platforms that can accomodate most kinds of app in them. They can't beat a native app specifically made with one purpose, but they allow anyone to provide instantly usable apps with very low overhead, and since the experience is so simple, intuitive and fast, users tend to like it and sometimes even pay for their services. There could exist a protocol that brings apps like that to the open world of (I won't say "web") domains and the websockets protocol -- with multiple different clients, each making their own decisions on how to display the content sent by the servers that are powering these apps.
Another idea is that of Alan Kay: to design a nice little OS/virtual machine that can load these apps and run them. Kinda like browsers are today, but providing a more well-thought, native-like experience and framework, but still sandboxed. And I add: abstracting away details about design, content disposition and so on.
These 3 kinds of programs could coexist peacefully. 2 are just standalone programs, they can do anything and each will be its own thing. 1 and 3, however, are still similar to browsers of today in the sense that you need clients to interact with servers and show to the user what they are asking. But by simplifying everything and separating the scopes properly these clients would be easy to write, efficient, small, the environment would be open and the internet would be saved.
See also
-
@ 6389be64:ef439d32
2025-01-14 01:31:12Bitcoin is more than money, more than an asset, and more than a store of value. Bitcoin is a Prime Mover, an enabler and it ignites imaginations. It certainly fueled an idea in my mind. The idea integrates sensors, computational prowess, actuated machinery, power conversion, and electronic communications to form an autonomous, machined creature roaming forests and harvesting the most widespread and least energy-dense fuel source available. I call it the Forest Walker and it eats wood, and mines Bitcoin.
I know what you're thinking. Why not just put Bitcoin mining rigs where they belong: in a hosted facility sporting electricity from energy-dense fuels like natural gas, climate-controlled with excellent data piping in and out? Why go to all the trouble building a robot that digests wood creating flammable gasses fueling an engine to run a generator powering Bitcoin miners? It's all about synergy.
Bitcoin mining enables the realization of multiple, seemingly unrelated, yet useful activities. Activities considered un-profitable if not for Bitcoin as the Prime Mover. This is much more than simply mining the greatest asset ever conceived by humankind. It’s about the power of synergy, which Bitcoin plays only one of many roles. The synergy created by this system can stabilize forests' fire ecology while generating multiple income streams. That’s the realistic goal here and requires a brief history of American Forest management before continuing.
Smokey The Bear
In 1944, the Smokey Bear Wildfire Prevention Campaign began in the United States. “Only YOU can prevent forest fires” remains the refrain of the Ad Council’s longest running campaign. The Ad Council is a U.S. non-profit set up by the American Association of Advertising Agencies and the Association of National Advertisers in 1942. It would seem that the U.S. Department of the Interior was concerned about pesky forest fires and wanted them to stop. So, alongside a national policy of extreme fire suppression they enlisted the entire U.S. population to get onboard via the Ad Council and it worked. Forest fires were almost obliterated and everyone was happy, right? Wrong.
Smokey is a fantastically successful bear so forest fires became so few for so long that the fuel load - dead wood - in forests has become very heavy. So heavy that when a fire happens (and they always happen) it destroys everything in its path because the more fuel there is the hotter that fire becomes. Trees, bushes, shrubs, and all other plant life cannot escape destruction (not to mention homes and businesses). The soil microbiology doesn’t escape either as it is burned away even in deeper soils. To add insult to injury, hydrophobic waxy residues condense on the soil surface, forcing water to travel over the ground rather than through it eroding forest soils. Good job, Smokey. Well done, Sir!
Most terrestrial ecologies are “fire ecologies”. Fire is a part of these systems’ fuel load and pest management. Before we pretended to “manage” millions of acres of forest, fires raged over the world, rarely damaging forests. The fuel load was always too light to generate fires hot enough to moonscape mountainsides. Fires simply burned off the minor amounts of fuel accumulated since the fire before. The lighter heat, smoke, and other combustion gasses suppressed pests, keeping them in check and the smoke condensed into a plant growth accelerant called wood vinegar, not a waxy cap on the soil. These fires also cleared out weak undergrowth, cycled minerals, and thinned the forest canopy, allowing sunlight to penetrate to the forest floor. Without a fire’s heat, many pine tree species can’t sow their seed. The heat is required to open the cones (the seed bearing structure) of Spruce, Cypress, Sequoia, Jack Pine, Lodgepole Pine and many more. Without fire forests can’t have babies. The idea was to protect the forests, and it isn't working.
So, in a world of fire, what does an ally look like and what does it do?
Meet The Forest Walker
For the Forest Walker to work as a mobile, autonomous unit, a solid platform that can carry several hundred pounds is required. It so happens this chassis already exists but shelved.
Introducing the Legged Squad Support System (LS3). A joint project between Boston Dynamics, DARPA, and the United States Marine Corps, the quadrupedal robot is the size of a cow, can carry 400 pounds (180 kg) of equipment, negotiate challenging terrain, and operate for 24 hours before needing to refuel. Yes, it had an engine. Abandoned in 2015, the thing was too noisy for military deployment and maintenance "under fire" is never a high-quality idea. However, we can rebuild it to act as a platform for the Forest Walker; albeit with serious alterations. It would need to be bigger, probably. Carry more weight? Definitely. Maybe replace structural metal with carbon fiber and redesign much as 3D printable parts for more effective maintenance.
The original system has a top operational speed of 8 miles per hour. For our purposes, it only needs to move about as fast as a grazing ruminant. Without the hammering vibrations of galloping into battle, shocks of exploding mortars, and drunken soldiers playing "Wrangler of Steel Machines", time between failures should be much longer and the overall energy consumption much lower. The LS3 is a solid platform to build upon. Now it just needs to be pulled out of the mothballs, and completely refitted with outboard equipment.
The Small Branch Chipper
When I say “Forest fuel load” I mean the dead, carbon containing litter on the forest floor. Duff (leaves), fine-woody debris (small branches), and coarse woody debris (logs) are the fuel that feeds forest fires. Walk through any forest in the United States today and you will see quite a lot of these materials. Too much, as I have described. Some of these fuel loads can be 8 tons per acre in pine and hardwood forests and up to 16 tons per acre at active logging sites. That’s some big wood and the more that collects, the more combustible danger to the forest it represents. It also provides a technically unlimited fuel supply for the Forest Walker system.
The problem is that this detritus has to be chewed into pieces that are easily ingestible by the system for the gasification process (we’ll get to that step in a minute). What we need is a wood chipper attached to the chassis (the LS3); its “mouth”.
A small wood chipper handling material up to 2.5 - 3.0 inches (6.3 - 7.6 cm) in diameter would eliminate a substantial amount of fuel. There is no reason for Forest Walker to remove fallen trees. It wouldn’t have to in order to make a real difference. It need only identify appropriately sized branches and grab them. Once loaded into the chipper’s intake hopper for further processing, the beast can immediately look for more “food”. This is essentially kindling that would help ignite larger logs. If it’s all consumed by Forest Walker, then it’s not present to promote an aggravated conflagration.
I have glossed over an obvious question: How does Forest Walker see and identify branches and such? LiDaR (Light Detection and Ranging) attached to Forest Walker images the local area and feed those data to onboard computers for processing. Maybe AI plays a role. Maybe simple machine learning can do the trick. One thing is for certain: being able to identify a stick and cause robotic appendages to pick it up is not impossible.
Great! We now have a quadrupedal robot autonomously identifying and “eating” dead branches and other light, combustible materials. Whilst strolling through the forest, depleting future fires of combustibles, Forest Walker has already performed a major function of this system: making the forest safer. It's time to convert this low-density fuel into a high-density fuel Forest Walker can leverage. Enter the gasification process.
The Gassifier
The gasifier is the heart of the entire system; it’s where low-density fuel becomes the high-density fuel that powers the entire system. Biochar and wood vinegar are process wastes and I’ll discuss why both are powerful soil amendments in a moment, but first, what’s gasification?
Reacting shredded carbonaceous material at high temperatures in a low or no oxygen environment converts the biomass into biochar, wood vinegar, heat, and Synthesis Gas (Syngas). Syngas consists primarily of hydrogen, carbon monoxide, and methane. All of which are extremely useful fuels in a gaseous state. Part of this gas is used to heat the input biomass and keep the reaction temperature constant while the internal combustion engine that drives the generator to produce electrical power consumes the rest.
Critically, this gasification process is “continuous feed”. Forest Walker must intake biomass from the chipper, process it to fuel, and dump the waste (CO2, heat, biochar, and wood vinegar) continuously. It cannot stop. Everything about this system depends upon this continual grazing, digestion, and excretion of wastes just as a ruminal does. And, like a ruminant, all waste products enhance the local environment.
When I first heard of gasification, I didn’t believe that it was real. Running an electric generator from burning wood seemed more akin to “conspiracy fantasy” than science. Not only is gasification real, it’s ancient technology. A man named Dean Clayton first started experiments on gasification in 1699 and in 1901 gasification was used to power a vehicle. By the end of World War II, there were 500,000 Syngas powered vehicles in Germany alone because of fossil fuel rationing during the war. The global gasification market was $480 billion in 2022 and projected to be as much as $700 billion by 2030 (Vantage Market Research). Gasification technology is the best choice to power the Forest Walker because it’s self-contained and we want its waste products.
Biochar: The Waste
Biochar (AKA agricultural charcoal) is fairly simple: it’s almost pure, solid carbon that resembles charcoal. Its porous nature packs large surface areas into small, 3 dimensional nuggets. Devoid of most other chemistry, like hydrocarbons (methane) and ash (minerals), biochar is extremely lightweight. Do not confuse it with the charcoal you buy for your grill. Biochar doesn’t make good grilling charcoal because it would burn too rapidly as it does not contain the multitude of flammable components that charcoal does. Biochar has several other good use cases. Water filtration, water retention, nutrient retention, providing habitat for microscopic soil organisms, and carbon sequestration are the main ones that we are concerned with here.
Carbon has an amazing ability to adsorb (substances stick to and accumulate on the surface of an object) manifold chemistries. Water, nutrients, and pollutants tightly bind to carbon in this format. So, biochar makes a respectable filter and acts as a “battery” of water and nutrients in soils. Biochar adsorbs and holds on to seven times its weight in water. Soil containing biochar is more drought resilient than soil without it. Adsorbed nutrients, tightly sequestered alongside water, get released only as plants need them. Plants must excrete protons (H+) from their roots to disgorge water or positively charged nutrients from the biochar's surface; it's an active process.
Biochar’s surface area (where adsorption happens) can be 500 square meters per gram or more. That is 10% larger than an official NBA basketball court for every gram of biochar. Biochar’s abundant surface area builds protective habitats for soil microbes like fungi and bacteria and many are critical for the health and productivity of the soil itself.
The “carbon sequestration” component of biochar comes into play where “carbon credits” are concerned. There is a financial market for carbon. Not leveraging that market for revenue is foolish. I am climate agnostic. All I care about is that once solid carbon is inside the soil, it will stay there for thousands of years, imparting drought resiliency, fertility collection, nutrient buffering, and release for that time span. I simply want as much solid carbon in the soil because of the undeniably positive effects it has, regardless of any climactic considerations.
Wood Vinegar: More Waste
Another by-product of the gasification process is wood vinegar (Pyroligneous acid). If you have ever seen Liquid Smoke in the grocery store, then you have seen wood vinegar. Principally composed of acetic acid, acetone, and methanol wood vinegar also contains ~200 other organic compounds. It would seem intuitive that condensed, liquefied wood smoke would at least be bad for the health of all living things if not downright carcinogenic. The counter intuition wins the day, however. Wood vinegar has been used by humans for a very long time to promote digestion, bowel, and liver health; combat diarrhea and vomiting; calm peptic ulcers and regulate cholesterol levels; and a host of other benefits.
For centuries humans have annually burned off hundreds of thousands of square miles of pasture, grassland, forest, and every other conceivable terrestrial ecosystem. Why is this done? After every burn, one thing becomes obvious: the almost supernatural growth these ecosystems exhibit after the burn. How? Wood vinegar is a component of this growth. Even in open burns, smoke condenses and infiltrates the soil. That is when wood vinegar shows its quality.
This stuff beefs up not only general plant growth but seed germination as well and possesses many other qualities that are beneficial to plants. It’s a pesticide, fungicide, promotes beneficial soil microorganisms, enhances nutrient uptake, and imparts disease resistance. I am barely touching a long list of attributes here, but you want wood vinegar in your soil (alongside biochar because it adsorbs wood vinegar as well).
The Internal Combustion Engine
Conversion of grazed forage to chemical, then mechanical, and then electrical energy completes the cycle. The ICE (Internal Combustion Engine) converts the gaseous fuel output from the gasifier to mechanical energy, heat, water vapor, and CO2. It’s the mechanical energy of a rotating drive shaft that we want. That rotation drives the electric generator, which is the heartbeat we need to bring this monster to life. Luckily for us, combined internal combustion engine and generator packages are ubiquitous, delivering a defined energy output given a constant fuel input. It’s the simplest part of the system.
The obvious question here is whether the amount of syngas provided by the gasification process will provide enough energy to generate enough electrons to run the entire system or not. While I have no doubt the energy produced will run Forest Walker's main systems the question is really about the electrons left over. Will it be enough to run the Bitcoin mining aspect of the system? Everything is a budget.
CO2 Production For Growth
Plants are lollipops. No matter if it’s a tree or a bush or a shrubbery, the entire thing is mostly sugar in various formats but mostly long chain carbohydrates like lignin and cellulose. Plants need three things to make sugar: CO2, H2O and light. In a forest, where tree densities can be quite high, CO2 availability becomes a limiting growth factor. It’d be in the forest interests to have more available CO2 providing for various sugar formation providing the organism with food and structure.
An odd thing about tree leaves, the openings that allow gasses like the ever searched for CO2 are on the bottom of the leaf (these are called stomata). Not many stomata are topside. This suggests that trees and bushes have evolved to find gasses like CO2 from below, not above and this further suggests CO2 might be in higher concentrations nearer the soil.
The soil life (bacterial, fungi etc.) is constantly producing enormous amounts of CO2 and it would stay in the soil forever (eventually killing the very soil life that produces it) if not for tidal forces. Water is everywhere and whether in pools, lakes, oceans or distributed in “moist” soils water moves towards to the moon. The water in the soil and also in the water tables below the soil rise toward the surface every day. When the water rises, it expels the accumulated gasses in the soil into the atmosphere and it’s mostly CO2. It’s a good bet on how leaves developed high populations of stomata on the underside of leaves. As the water relaxes (the tide goes out) it sucks oxygenated air back into the soil to continue the functions of soil life respiration. The soil “breathes” albeit slowly.
The gasses produced by the Forest Walker’s internal combustion engine consist primarily of CO2 and H2O. Combusting sugars produce the same gasses that are needed to construct the sugars because the universe is funny like that. The Forest Walker is constantly laying down these critical construction elements right where the trees need them: close to the ground to be gobbled up by the trees.
The Branch Drones
During the last ice age, giant mammals populated North America - forests and otherwise. Mastodons, woolly mammoths, rhinos, short-faced bears, steppe bison, caribou, musk ox, giant beavers, camels, gigantic ground-dwelling sloths, glyptodons, and dire wolves were everywhere. Many were ten to fifteen feet tall. As they crashed through forests, they would effectively cleave off dead side-branches of trees, halting the spread of a ground-based fire migrating into the tree crown ("laddering") which is a death knell for a forest.
These animals are all extinct now and forests no longer have any manner of pruning services. But, if we build drones fitted with cutting implements like saws and loppers, optical cameras and AI trained to discern dead branches from living ones, these drones could effectively take over pruning services by identifying, cutting, and dropping to the forest floor, dead branches. The dropped branches simply get collected by the Forest Walker as part of its continual mission.
The drones dock on the back of the Forest Walker to recharge their batteries when low. The whole scene would look like a grazing cow with some flies bothering it. This activity breaks the link between a relatively cool ground based fire and the tree crowns and is a vital element in forest fire control.
The Bitcoin Miner
Mining is one of four monetary incentive models, making this system a possibility for development. The other three are US Dept. of the Interior, township, county, and electrical utility company easement contracts for fuel load management, global carbon credits trading, and data set sales. All the above depends on obvious questions getting answered. I will list some obvious ones, but this is not an engineering document and is not the place for spreadsheets. How much Bitcoin one Forest Walker can mine depends on everything else. What amount of biomass can we process? Will that biomass flow enough Syngas to keep the lights on? Can the chassis support enough mining ASICs and supporting infrastructure? What does that weigh and will it affect field performance? How much power can the AC generator produce?
Other questions that are more philosophical persist. Even if a single Forest Walker can only mine scant amounts of BTC per day, that pales to how much fuel material it can process into biochar. We are talking about millions upon millions of forested acres in need of fuel load management. What can a single Forest Walker do? I am not thinking in singular terms. The Forest Walker must operate as a fleet. What could 50 do? 500?
What is it worth providing a service to the world by managing forest fuel loads? Providing proof of work to the global monetary system? Seeding soil with drought and nutrient resilience by the excretion, over time, of carbon by the ton? What did the last forest fire cost?
The Mesh Network
What could be better than one bitcoin mining, carbon sequestering, forest fire squelching, soil amending behemoth? Thousands of them, but then they would need to be able to talk to each other to coordinate position, data handling, etc. Fitted with a mesh networking device, like goTenna or Meshtastic LoRa equipment enables each Forest Walker to communicate with each other.
Now we have an interconnected fleet of Forest Walkers relaying data to each other and more importantly, aggregating all of that to the last link in the chain for uplink. Well, at least Bitcoin mining data. Since block data is lightweight, transmission of these data via mesh networking in fairly close quartered environs is more than doable. So, how does data transmit to the Bitcoin Network? How do the Forest Walkers get the previous block data necessary to execute on mining?
Back To The Chain
Getting Bitcoin block data to and from the network is the last puzzle piece. The standing presumption here is that wherever a Forest Walker fleet is operating, it is NOT within cell tower range. We further presume that the nearest Walmart Wi-Fi is hours away. Enter the Blockstream Satellite or something like it.
A separate, ground-based drone will have two jobs: To stay as close to the nearest Forest Walker as it can and to provide an antennae for either terrestrial or orbital data uplink. Bitcoin-centric data is transmitted to the "uplink drone" via the mesh networked transmitters and then sent on to the uplink and the whole flow goes in the opposite direction as well; many to one and one to many.
We cannot transmit data to the Blockstream satellite, and it will be up to Blockstream and companies like it to provide uplink capabilities in the future and I don't doubt they will. Starlink you say? What’s stopping that company from filtering out block data? Nothing because it’s Starlink’s system and they could decide to censor these data. It seems we may have a problem sending and receiving Bitcoin data in back country environs.
But, then again, the utility of this system in staunching the fuel load that creates forest fires is extremely useful around forested communities and many have fiber, Wi-Fi and cell towers. These communities could be a welcoming ground zero for first deployments of the Forest Walker system by the home and business owners seeking fire repression. In the best way, Bitcoin subsidizes the safety of the communities.
Sensor Packages
LiDaR
The benefit of having a Forest Walker fleet strolling through the forest is the never ending opportunity for data gathering. A plethora of deployable sensors gathering hyper-accurate data on everything from temperature to topography is yet another revenue generator. Data is valuable and the Forest Walker could generate data sales to various government entities and private concerns.
LiDaR (Light Detection and Ranging) can map topography, perform biomass assessment, comparative soil erosion analysis, etc. It so happens that the Forest Walker’s ability to “see,” to navigate about its surroundings, is LiDaR driven and since it’s already being used, we can get double duty by harvesting that data for later use. By using a laser to send out light pulses and measuring the time it takes for the reflection of those pulses to return, very detailed data sets incrementally build up. Eventually, as enough data about a certain area becomes available, the data becomes useful and valuable.
Forestry concerns, both private and public, often use LiDaR to build 3D models of tree stands to assess the amount of harvest-able lumber in entire sections of forest. Consulting companies offering these services charge anywhere from several hundred to several thousand dollars per square kilometer for such services. A Forest Walker generating such assessments on the fly while performing its other functions is a multi-disciplinary approach to revenue generation.
pH, Soil Moisture, and Cation Exchange Sensing
The Forest Walker is quadrupedal, so there are four contact points to the soil. Why not get a pH data point for every step it takes? We can also gather soil moisture data and cation exchange capacities at unheard of densities because of sampling occurring on the fly during commission of the system’s other duties. No one is going to build a machine to do pH testing of vast tracts of forest soils, but that doesn’t make the data collected from such an endeavor valueless. Since the Forest Walker serves many functions at once, a multitude of data products can add to the return on investment component.
Weather Data
Temperature, humidity, pressure, and even data like evapotranspiration gathered at high densities on broad acre scales have untold value and because the sensors are lightweight and don’t require large power budgets, they come along for the ride at little cost. But, just like the old mantra, “gas, grass, or ass, nobody rides for free”, these sensors provide potential revenue benefits just by them being present.
I’ve touched on just a few data genres here. In fact, the question for universities, governmental bodies, and other institutions becomes, “How much will you pay us to attach your sensor payload to the Forest Walker?”
Noise Suppression
Only you can prevent Metallica filling the surrounds with 120 dB of sound. Easy enough, just turn the car stereo off. But what of a fleet of 50 Forest Walkers operating in the backcountry or near a township? 500? 5000? Each one has a wood chipper, an internal combustion engine, hydraulic pumps, actuators, and more cooling fans than you can shake a stick at. It’s a walking, screaming fire-breathing dragon operating continuously, day and night, twenty-four hours a day, three hundred sixty-five days a year. The sound will negatively affect all living things and that impacts behaviors. Serious engineering consideration and prowess must deliver a silencing blow to the major issue of noise.
It would be foolish to think that a fleet of Forest Walkers could be silent, but if not a major design consideration, then the entire idea is dead on arrival. Townships would not allow them to operate even if they solved the problem of widespread fuel load and neither would governmental entities, and rightly so. Nothing, not man nor beast, would want to be subjected to an eternal, infernal scream even if it were to end within days as the fleet moved further away after consuming what it could. Noise and heat are the only real pollutants of this system; taking noise seriously from the beginning is paramount.
Fire Safety
A “fire-breathing dragon” is not the worst description of the Forest Walker. It eats wood, combusts it at very high temperatures and excretes carbon; and it does so in an extremely flammable environment. Bad mix for one Forest Walker, worse for many. One must take extreme pains to ensure that during normal operation, a Forest Walker could fall over, walk through tinder dry brush, or get pounded into the ground by a meteorite from Krypton and it wouldn’t destroy epic swaths of trees and baby deer. I envision an ultimate test of a prototype to include dowsing it in grain alcohol while it’s wrapped up in toilet paper like a pledge at a fraternity party. If it runs for 72 hours and doesn’t set everything on fire, then maybe outside entities won’t be fearful of something that walks around forests with a constant fire in its belly.
The Wrap
How we think about what can be done with and adjacent to Bitcoin is at least as important as Bitcoin’s economic standing itself. For those who will tell me that this entire idea is without merit, I say, “OK, fine. You can come up with something, too.” What can we plug Bitcoin into that, like a battery, makes something that does not work, work? That’s the lesson I get from this entire exercise. No one was ever going to hire teams of humans to go out and "clean the forest". There's no money in that. The data collection and sales from such an endeavor might provide revenues over the break-even point but investment demands Alpha in this day and age. But, plug Bitcoin into an almost viable system and, voilà! We tip the scales to achieve lift-off.
Let’s face it, we haven’t scratched the surface of Bitcoin’s forcing function on our minds. Not because it’s Bitcoin, but because of what that invention means. The question that pushes me to approach things this way is, “what can we create that one system’s waste is another system’s feedstock?” The Forest Walker system’s only real waste is the conversion of low entropy energy (wood and syngas) into high entropy energy (heat and noise). All other output is beneficial to humanity.
Bitcoin, I believe, is the first product of a new mode of human imagination. An imagination newly forged over the past few millennia of being lied to, stolen from, distracted and otherwise mis-allocated to a black hole of the nonsensical. We are waking up.
What I have presented is not science fiction. Everything I have described here is well within the realm of possibility. The question is one of viability, at least in terms of the detritus of the old world we find ourselves departing from. This system would take a non-trivial amount of time and resources to develop. I think the system would garner extensive long-term contracts from those who have the most to lose from wildfires, the most to gain from hyperaccurate data sets, and, of course, securing the most precious asset in the world. Many may not see it that way, for they seek Alpha and are therefore blind to other possibilities. Others will see only the possibilities; of thinking in a new way, of looking at things differently, and dreaming of what comes next.
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28IPFS problems: General confusion
Most IPFS open-source projects, libraries and apps (excluding Ethereum stuff) are things that rely heavily on dynamic data and temporary links. The most common projects you'll see when following the IPFS communities are chat rooms and similar things. I've seen dozens of these chat-rooms. There's also a famous IPFS-powered database. How can you do these things with content-addressing is a mistery. Of course they probably rely on IPNS or other external address system.
There's also a bunch of "file-sharing" on IPFS. The kind of thing people use for temporary making a file available for a third-party. There's image sharing on IPFS, pastebins on IPFS and so on. People don't seem to share the preoccupation with broken links here.
-
@ 599f67f7:21fb3ea9
2025-01-26 11:01:05¿Qué es Blossom?
nostr:nevent1qqspttj39n6ld4plhn4e2mq3utxpju93u4k7w33l3ehxyf0g9lh3f0qpzpmhxue69uhkummnw3ezuamfdejsygzenanl0hmkjnrq8fksvdhpt67xzrdh0h8agltwt5znsmvzr7e74ywgmr72
Blossom significa Blobs Simply Stored on Media Servers (Blobs Simplemente Almacenados en Servidores de Medios). Blobs son fragmentos de datos binarios, como archivos pero sin nombres. En lugar de nombres, se identifican por su hash sha256. La ventaja de usar hashes sha256 en lugar de nombres es que los hashes son IDs universales que se pueden calcular a partir del archivo mismo utilizando el algoritmo de hash sha256.
💡 archivo -> sha256 -> hash
Blossom es, por lo tanto, un conjunto de puntos finales HTTP que permiten a los usuarios almacenar y recuperar blobs almacenados en servidores utilizando su identidad nostr.
¿Por qué Blossom?
Como mencionamos hace un momento, al usar claves nostr como su identidad, Blossom permite que los datos sean "propiedad" del usuario. Esto simplifica enormemente la cuestión de "qué es spam" para el alojamiento de servidores. Por ejemplo, en nuestro Blossom solo permitimos cargas por miembros de la comunidad verificados que tengan un NIP-05 con nosotros.
Los usuarios pueden subir en múltiples servidores de blossom, por ejemplo, uno alojado por su comunidad, uno de pago, otro público y gratuito, para establecer redundancia de sus datos. Los blobs pueden ser espejados entre servidores de blossom, de manera similar a cómo los relays nostr pueden transmitir eventos entre sí. Esto mejora la resistencia a la censura de blossom.
A continuación se muestra una breve tabla de comparación entre torrents, Blossom y servidores CDN centralizados. (Suponiendo que hay muchos seeders para torrents y se utilizan múltiples servidores con Blossom).
| | Torrents | Blossom | CDN Centralizado | | --------------------------------------------------------------- | -------- | ------- | ---------------- | | Descentralizado | ✅ | ✅ | ❌ | | Resistencia a la censura | ✅ | ✅ | ❌ | | ¿Puedo usarlo para publicar fotos de gatitos en redes sociales? | ❌ | ✅ | ✅ |
¿Cómo funciona?
Blossom utiliza varios tipos de eventos nostr para comunicarse con el servidor de medios.
| kind | descripción | BUD | | ----- | ------------------------------- | ------------------------------------------------------------------ | | 24242 | Evento de autorización | BUD01 | | 10063 | Lista de Servidores de Usuarios | BUD03 |
kind:24242 - Autorización
Esto es esencialmente lo que ya describimos al usar claves nostr como IDs de usuario. En el evento, el usuario le dice al servidor que quiere subir o eliminar un archivo y lo firma con sus claves nostr. El servidor realiza algunas verificaciones en este evento y luego ejecuta el comando del usuario si todo parece estar bien.
kind:10063 - Lista de Servidores de Usuarios
Esto es utilizado por el usuario para anunciar a qué servidores de medios está subiendo. De esta manera, cuando el cliente ve esta lista, sabe dónde subir los archivos del usuario. También puede subir en múltiples servidores definidos en la lista para asegurar redundancia. En el lado de recuperación, si por alguna razón uno de los servidores en la lista del usuario está fuera de servicio, o el archivo ya no se puede encontrar allí, el cliente puede usar esta lista para intentar recuperar el archivo de otros servidores en la lista. Dado que los blobs se identifican por sus hashes, el mismo blob tendrá el mismo hash en cualquier servidor de medios. Todo lo que el cliente necesita hacer es cambiar la URL por la de un servidor diferente.
Ahora, además de los conceptos básicos de cómo funciona Blossom, también hay otros tipos de eventos que hacen que Blossom sea aún más interesante.
| kind | descripción | | ----- | --------------------- | | 30563 | Blossom Drives | | 36363 | Listado de Servidores | | 31963 | Reseña de Servidores |
kind:30563 - Blossom Drives
Este tipo de evento facilita la organización de blobs en carpetas, como estamos acostumbrados con los drives (piensa en Google Drive, iCloud, Proton Drive, etc.). El evento contiene información sobre la estructura de carpetas y los metadatos del drive.
kind:36363 y kind:31963 - Listado y Reseña
Estos tipos de eventos permiten a los usuarios descubrir y reseñar servidores de medios a través de nostr. kind:36363 es un listado de servidores que contiene la URL del servidor. kind:31963 es una reseña, donde los usuarios pueden calificar servidores.
¿Cómo lo uso?
Encuentra un servidor
Primero necesitarás elegir un servidor Blossom donde subirás tus archivos. Puedes navegar por los públicos en blossomservers.com. Algunos de ellos son de pago, otros pueden requerir que tus claves nostr estén en una lista blanca.
Luego, puedes ir a la URL de su servidor y probar a subir un archivo pequeño, como una foto. Si estás satisfecho con el servidor (es rápido y aún no te ha fallado), puedes agregarlo a tu Lista de Servidores de Usuarios. Cubriremos brevemente cómo hacer esto en noStrudel y Amethyst (pero solo necesitas hacer esto una vez, una vez que tu lista actualizada esté publicada, los clientes pueden simplemente recuperarla de nostr).
noStrudel
- Encuentra Relays en la barra lateral, luego elige Servidores de Medios.
- Agrega un servidor de medios, o mejor aún, varios.
- Publica tu lista de servidores. ✅
Amethyst
- En la barra lateral, encuentra Servidores multimedia.
- Bajo Servidores Blossom, agrega tus servidores de medios.
- Firma y publica. ✅
Ahora, cuando vayas a hacer una publicación y adjuntar una foto, por ejemplo, se subirá en tu servidor blossom.
⚠️ Ten en cuenta que debes suponer que los archivos que subas serán públicos. Aunque puedes proteger un archivo con contraseña, esto no ha sido auditado.
Blossom Drive
Como mencionamos anteriormente, podemos publicar eventos para organizar nuestros blobs en carpetas. Esto puede ser excelente para compartir archivos con tu equipo, o simplemente para mantener las cosas organizadas.
Para probarlo, ve a blossom.hzrd149.com (o nuestra instancia comunitaria en blossom.bitcointxoko.com) e inicia sesión con tu método preferido.
Puedes crear una nueva unidad y agregar blobs desde allí.
Bouquet
Si usas múltiples servidores para darte redundancia, Bouquet es una buena manera de obtener una visión general de todos tus archivos. Úsalo para subir y navegar por tus medios en diferentes servidores y sincronizar blobs entre ellos.
Cherry Tree
nostr:nevent1qvzqqqqqqypzqfngzhsvjggdlgeycm96x4emzjlwf8dyyzdfg4hefp89zpkdgz99qyghwumn8ghj7mn0wd68ytnhd9hx2tcpzfmhxue69uhkummnw3e82efwvdhk6tcqyp3065hj9zellakecetfflkgudm5n6xcc9dnetfeacnq90y3yxa5z5gk2q6
Cherry Tree te permite dividir un archivo en fragmentos y luego subirlos en múltiples servidores blossom, y más tarde reensamblarlos en otro lugar.
Conclusión
Blossom aún está en desarrollo, pero ya hay muchas cosas interesantes que puedes hacer con él para hacerte a ti y a tu comunidad más soberanos. ¡Pruébalo!
Si deseas mantenerte al día sobre el desarrollo de Blossom, sigue a nostr:nprofile1qyghwumn8ghj7mn0wd68ytnhd9hx2tcpzfmhxue69uhkummnw3e82efwvdhk6tcqyqnxs90qeyssm73jf3kt5dtnk997ujw6ggy6j3t0jjzw2yrv6sy22ysu5ka y dale un gran zap por su excelente trabajo.
Referencias
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28Scala is such a great language
Scala is amazing. The type system has the perfect balance between flexibility and powerfulness.
match
statements are great. You can write imperative code that looks very nice and expressive (and I haven't tried writing purely functional things yet). Everything is easy to write and cheap and neovim integration works great.But Java is not great. And the fact that Scala is a JVM language doesn't help because over the years people have written stuff that depends on Java libraries -- and these Java libraries are not as safe as the Scala libraries, they contain reflection, slowness, runtime errors, all kinds of horrors.
Scala is also very tightly associated with Akka, the actor framework, and Akka is a giant collection of anti-patterns. Untyped stuff, reflection, dependency on JVM, basically a lot of javisms. I just arrived and I don't know anything about the Scala history or ecosystem or community, but I have the impression that Akka has prevent more adoption of Scala from decent people that aren't Java programmers.
But luckily there is a solution -- or two solutions: ScalaJS is a great thing that exists. It transpiles Scala code into JavaScript and it runs on NodeJS or in a browser!
Scala Native is a much better deal, though, it compiles to LLVM and then to binary code and you can have single binaries that run directly without a JVM -- not that the single JARs are that bad though, they are great and everybody has Java so I'll take that anytime over C libraries or NPM-distributed software, but direct executables even better. Scala Native just needs a little more love and some libraries and it will be the greatest thing in a couple of years.
-
@ 6389be64:ef439d32
2025-01-13 21:50:59Bitcoin is more than money, more than an asset, and more than a store of value. Bitcoin is a Prime Mover, an enabler and it ignites imaginations. It certainly fueled an idea in my mind. The idea integrates sensors, computational prowess, actuated machinery, power conversion, and electronic communications to form an autonomous, machined creature roaming forests and harvesting the most widespread and least energy-dense fuel source available. I call it the Forest Walker and it eats wood, and mines Bitcoin.
I know what you're thinking. Why not just put Bitcoin mining rigs where they belong: in a hosted facility sporting electricity from energy-dense fuels like natural gas, climate-controlled with excellent data piping in and out? Why go to all the trouble building a robot that digests wood creating flammable gasses fueling an engine to run a generator powering Bitcoin miners? It's all about synergy.
Bitcoin mining enables the realization of multiple, seemingly unrelated, yet useful activities. Activities considered un-profitable if not for Bitcoin as the Prime Mover. This is much more than simply mining the greatest asset ever conceived by humankind. It’s about the power of synergy, which Bitcoin plays only one of many roles. The synergy created by this system can stabilize forests' fire ecology while generating multiple income streams. That’s the realistic goal here and requires a brief history of American Forest management before continuing.
Smokey The Bear
In 1944, the Smokey Bear Wildfire Prevention Campaign began in the United States. “Only YOU can prevent forest fires” remains the refrain of the Ad Council’s longest running campaign. The Ad Council is a U.S. non-profit set up by the American Association of Advertising Agencies and the Association of National Advertisers in 1942. It would seem that the U.S. Department of the Interior was concerned about pesky forest fires and wanted them to stop. So, alongside a national policy of extreme fire suppression they enlisted the entire U.S. population to get onboard via the Ad Council and it worked. Forest fires were almost obliterated and everyone was happy, right? Wrong.
Smokey is a fantastically successful bear so forest fires became so few for so long that the fuel load - dead wood - in forests has become very heavy. So heavy that when a fire happens (and they always happen) it destroys everything in its path because the more fuel there is the hotter that fire becomes. Trees, bushes, shrubs, and all other plant life cannot escape destruction (not to mention homes and businesses). The soil microbiology doesn’t escape either as it is burned away even in deeper soils. To add insult to injury, hydrophobic waxy residues condense on the soil surface, forcing water to travel over the ground rather than through it eroding forest soils. Good job, Smokey. Well done, Sir!
Most terrestrial ecologies are “fire ecologies”. Fire is a part of these systems’ fuel load and pest management. Before we pretended to “manage” millions of acres of forest, fires raged over the world, rarely damaging forests. The fuel load was always too light to generate fires hot enough to moonscape mountainsides. Fires simply burned off the minor amounts of fuel accumulated since the fire before. The lighter heat, smoke, and other combustion gasses suppressed pests, keeping them in check and the smoke condensed into a plant growth accelerant called wood vinegar, not a waxy cap on the soil. These fires also cleared out weak undergrowth, cycled minerals, and thinned the forest canopy, allowing sunlight to penetrate to the forest floor. Without a fire’s heat, many pine tree species can’t sow their seed. The heat is required to open the cones (the seed bearing structure) of Spruce, Cypress, Sequoia, Jack Pine, Lodgepole Pine and many more. Without fire forests can’t have babies. The idea was to protect the forests, and it isn't working.
So, in a world of fire, what does an ally look like and what does it do?
Meet The Forest Walker
For the Forest Walker to work as a mobile, autonomous unit, a solid platform that can carry several hundred pounds is required. It so happens this chassis already exists but shelved.
Introducing the Legged Squad Support System (LS3). A joint project between Boston Dynamics, DARPA, and the United States Marine Corps, the quadrupedal robot is the size of a cow, can carry 400 pounds (180 kg) of equipment, negotiate challenging terrain, and operate for 24 hours before needing to refuel. Yes, it had an engine. Abandoned in 2015, the thing was too noisy for military deployment and maintenance "under fire" is never a high-quality idea. However, we can rebuild it to act as a platform for the Forest Walker; albeit with serious alterations. It would need to be bigger, probably. Carry more weight? Definitely. Maybe replace structural metal with carbon fiber and redesign much as 3D printable parts for more effective maintenance.
The original system has a top operational speed of 8 miles per hour. For our purposes, it only needs to move about as fast as a grazing ruminant. Without the hammering vibrations of galloping into battle, shocks of exploding mortars, and drunken soldiers playing "Wrangler of Steel Machines", time between failures should be much longer and the overall energy consumption much lower. The LS3 is a solid platform to build upon. Now it just needs to be pulled out of the mothballs, and completely refitted with outboard equipment.
The Small Branch Chipper
When I say “Forest fuel load” I mean the dead, carbon containing litter on the forest floor. Duff (leaves), fine-woody debris (small branches), and coarse woody debris (logs) are the fuel that feeds forest fires. Walk through any forest in the United States today and you will see quite a lot of these materials. Too much, as I have described. Some of these fuel loads can be 8 tons per acre in pine and hardwood forests and up to 16 tons per acre at active logging sites. That’s some big wood and the more that collects, the more combustible danger to the forest it represents. It also provides a technically unlimited fuel supply for the Forest Walker system.
The problem is that this detritus has to be chewed into pieces that are easily ingestible by the system for the gasification process (we’ll get to that step in a minute). What we need is a wood chipper attached to the chassis (the LS3); its “mouth”.
A small wood chipper handling material up to 2.5 - 3.0 inches (6.3 - 7.6 cm) in diameter would eliminate a substantial amount of fuel. There is no reason for Forest Walker to remove fallen trees. It wouldn’t have to in order to make a real difference. It need only identify appropriately sized branches and grab them. Once loaded into the chipper’s intake hopper for further processing, the beast can immediately look for more “food”. This is essentially kindling that would help ignite larger logs. If it’s all consumed by Forest Walker, then it’s not present to promote an aggravated conflagration.
I have glossed over an obvious question: How does Forest Walker see and identify branches and such? LiDaR (Light Detection and Ranging) attached to Forest Walker images the local area and feed those data to onboard computers for processing. Maybe AI plays a role. Maybe simple machine learning can do the trick. One thing is for certain: being able to identify a stick and cause robotic appendages to pick it up is not impossible.
Great! We now have a quadrupedal robot autonomously identifying and “eating” dead branches and other light, combustible materials. Whilst strolling through the forest, depleting future fires of combustibles, Forest Walker has already performed a major function of this system: making the forest safer. It's time to convert this low-density fuel into a high-density fuel Forest Walker can leverage. Enter the gasification process.
The Gassifier
The gasifier is the heart of the entire system; it’s where low-density fuel becomes the high-density fuel that powers the entire system. Biochar and wood vinegar are process wastes and I’ll discuss why both are powerful soil amendments in a moment, but first, what’s gasification?
Reacting shredded carbonaceous material at high temperatures in a low or no oxygen environment converts the biomass into biochar, wood vinegar, heat, and Synthesis Gas (Syngas). Syngas consists primarily of hydrogen, carbon monoxide, and methane. All of which are extremely useful fuels in a gaseous state. Part of this gas is used to heat the input biomass and keep the reaction temperature constant while the internal combustion engine that drives the generator to produce electrical power consumes the rest.
Critically, this gasification process is “continuous feed”. Forest Walker must intake biomass from the chipper, process it to fuel, and dump the waste (CO2, heat, biochar, and wood vinegar) continuously. It cannot stop. Everything about this system depends upon this continual grazing, digestion, and excretion of wastes just as a ruminal does. And, like a ruminant, all waste products enhance the local environment.
When I first heard of gasification, I didn’t believe that it was real. Running an electric generator from burning wood seemed more akin to “conspiracy fantasy” than science. Not only is gasification real, it’s ancient technology. A man named Dean Clayton first started experiments on gasification in 1699 and in 1901 gasification was used to power a vehicle. By the end of World War II, there were 500,000 Syngas powered vehicles in Germany alone because of fossil fuel rationing during the war. The global gasification market was $480 billion in 2022 and projected to be as much as $700 billion by 2030 (Vantage Market Research). Gasification technology is the best choice to power the Forest Walker because it’s self-contained and we want its waste products.
Biochar: The Waste
Biochar (AKA agricultural charcoal) is fairly simple: it’s almost pure, solid carbon that resembles charcoal. Its porous nature packs large surface areas into small, 3 dimensional nuggets. Devoid of most other chemistry, like hydrocarbons (methane) and ash (minerals), biochar is extremely lightweight. Do not confuse it with the charcoal you buy for your grill. Biochar doesn’t make good grilling charcoal because it would burn too rapidly as it does not contain the multitude of flammable components that charcoal does. Biochar has several other good use cases. Water filtration, water retention, nutrient retention, providing habitat for microscopic soil organisms, and carbon sequestration are the main ones that we are concerned with here.
Carbon has an amazing ability to adsorb (substances stick to and accumulate on the surface of an object) manifold chemistries. Water, nutrients, and pollutants tightly bind to carbon in this format. So, biochar makes a respectable filter and acts as a “battery” of water and nutrients in soils. Biochar adsorbs and holds on to seven times its weight in water. Soil containing biochar is more drought resilient than soil without it. Adsorbed nutrients, tightly sequestered alongside water, get released only as plants need them. Plants must excrete protons (H+) from their roots to disgorge water or positively charged nutrients from the biochar's surface; it's an active process.
Biochar’s surface area (where adsorption happens) can be 500 square meters per gram or more. That is 10% larger than an official NBA basketball court for every gram of biochar. Biochar’s abundant surface area builds protective habitats for soil microbes like fungi and bacteria and many are critical for the health and productivity of the soil itself.
The “carbon sequestration” component of biochar comes into play where “carbon credits” are concerned. There is a financial market for carbon. Not leveraging that market for revenue is foolish. I am climate agnostic. All I care about is that once solid carbon is inside the soil, it will stay there for thousands of years, imparting drought resiliency, fertility collection, nutrient buffering, and release for that time span. I simply want as much solid carbon in the soil because of the undeniably positive effects it has, regardless of any climactic considerations.
Wood Vinegar: More Waste
Another by-product of the gasification process is wood vinegar (Pyroligneous acid). If you have ever seen Liquid Smoke in the grocery store, then you have seen wood vinegar. Principally composed of acetic acid, acetone, and methanol wood vinegar also contains ~200 other organic compounds. It would seem intuitive that condensed, liquefied wood smoke would at least be bad for the health of all living things if not downright carcinogenic. The counter intuition wins the day, however. Wood vinegar has been used by humans for a very long time to promote digestion, bowel, and liver health; combat diarrhea and vomiting; calm peptic ulcers and regulate cholesterol levels; and a host of other benefits.
For centuries humans have annually burned off hundreds of thousands of square miles of pasture, grassland, forest, and every other conceivable terrestrial ecosystem. Why is this done? After every burn, one thing becomes obvious: the almost supernatural growth these ecosystems exhibit after the burn. How? Wood vinegar is a component of this growth. Even in open burns, smoke condenses and infiltrates the soil. That is when wood vinegar shows its quality.
This stuff beefs up not only general plant growth but seed germination as well and possesses many other qualities that are beneficial to plants. It’s a pesticide, fungicide, promotes beneficial soil microorganisms, enhances nutrient uptake, and imparts disease resistance. I am barely touching a long list of attributes here, but you want wood vinegar in your soil (alongside biochar because it adsorbs wood vinegar as well).
The Internal Combustion Engine
Conversion of grazed forage to chemical, then mechanical, and then electrical energy completes the cycle. The ICE (Internal Combustion Engine) converts the gaseous fuel output from the gasifier to mechanical energy, heat, water vapor, and CO2. It’s the mechanical energy of a rotating drive shaft that we want. That rotation drives the electric generator, which is the heartbeat we need to bring this monster to life. Luckily for us, combined internal combustion engine and generator packages are ubiquitous, delivering a defined energy output given a constant fuel input. It’s the simplest part of the system.
The obvious question here is whether the amount of syngas provided by the gasification process will provide enough energy to generate enough electrons to run the entire system or not. While I have no doubt the energy produced will run Forest Walker's main systems the question is really about the electrons left over. Will it be enough to run the Bitcoin mining aspect of the system? Everything is a budget.
CO2 Production For Growth
Plants are lollipops. No matter if it’s a tree or a bush or a shrubbery, the entire thing is mostly sugar in various formats but mostly long chain carbohydrates like lignin and cellulose. Plants need three things to make sugar: CO2, H2O and light. In a forest, where tree densities can be quite high, CO2 availability becomes a limiting growth factor. It’d be in the forest interests to have more available CO2 providing for various sugar formation providing the organism with food and structure.
An odd thing about tree leaves, the openings that allow gasses like the ever searched for CO2 are on the bottom of the leaf (these are called stomata). Not many stomata are topside. This suggests that trees and bushes have evolved to find gasses like CO2 from below, not above and this further suggests CO2 might be in higher concentrations nearer the soil.
The soil life (bacterial, fungi etc.) is constantly producing enormous amounts of CO2 and it would stay in the soil forever (eventually killing the very soil life that produces it) if not for tidal forces. Water is everywhere and whether in pools, lakes, oceans or distributed in “moist” soils water moves towards to the moon. The water in the soil and also in the water tables below the soil rise toward the surface every day. When the water rises, it expels the accumulated gasses in the soil into the atmosphere and it’s mostly CO2. It’s a good bet on how leaves developed high populations of stomata on the underside of leaves. As the water relaxes (the tide goes out) it sucks oxygenated air back into the soil to continue the functions of soil life respiration. The soil “breathes” albeit slowly.
The gasses produced by the Forest Walker’s internal combustion engine consist primarily of CO2 and H2O. Combusting sugars produce the same gasses that are needed to construct the sugars because the universe is funny like that. The Forest Walker is constantly laying down these critical construction elements right where the trees need them: close to the ground to be gobbled up by the trees.
The Branch Drones
During the last ice age, giant mammals populated North America - forests and otherwise. Mastodons, woolly mammoths, rhinos, short-faced bears, steppe bison, caribou, musk ox, giant beavers, camels, gigantic ground-dwelling sloths, glyptodons, and dire wolves were everywhere. Many were ten to fifteen feet tall. As they crashed through forests, they would effectively cleave off dead side-branches of trees, halting the spread of a ground-based fire migrating into the tree crown ("laddering") which is a death knell for a forest.
These animals are all extinct now and forests no longer have any manner of pruning services. But, if we build drones fitted with cutting implements like saws and loppers, optical cameras and AI trained to discern dead branches from living ones, these drones could effectively take over pruning services by identifying, cutting, and dropping to the forest floor, dead branches. The dropped branches simply get collected by the Forest Walker as part of its continual mission.
The drones dock on the back of the Forest Walker to recharge their batteries when low. The whole scene would look like a grazing cow with some flies bothering it. This activity breaks the link between a relatively cool ground based fire and the tree crowns and is a vital element in forest fire control.
The Bitcoin Miner
Mining is one of four monetary incentive models, making this system a possibility for development. The other three are US Dept. of the Interior, township, county, and electrical utility company easement contracts for fuel load management, global carbon credits trading, and data set sales. All the above depends on obvious questions getting answered. I will list some obvious ones, but this is not an engineering document and is not the place for spreadsheets. How much Bitcoin one Forest Walker can mine depends on everything else. What amount of biomass can we process? Will that biomass flow enough Syngas to keep the lights on? Can the chassis support enough mining ASICs and supporting infrastructure? What does that weigh and will it affect field performance? How much power can the AC generator produce?
Other questions that are more philosophical persist. Even if a single Forest Walker can only mine scant amounts of BTC per day, that pales to how much fuel material it can process into biochar. We are talking about millions upon millions of forested acres in need of fuel load management. What can a single Forest Walker do? I am not thinking in singular terms. The Forest Walker must operate as a fleet. What could 50 do? 500?
What is it worth providing a service to the world by managing forest fuel loads? Providing proof of work to the global monetary system? Seeding soil with drought and nutrient resilience by the excretion, over time, of carbon by the ton? What did the last forest fire cost?
The Mesh Network
What could be better than one bitcoin mining, carbon sequestering, forest fire squelching, soil amending behemoth? Thousands of them, but then they would need to be able to talk to each other to coordinate position, data handling, etc. Fitted with a mesh networking device, like goTenna or Meshtastic LoRa equipment enables each Forest Walker to communicate with each other.
Now we have an interconnected fleet of Forest Walkers relaying data to each other and more importantly, aggregating all of that to the last link in the chain for uplink. Well, at least Bitcoin mining data. Since block data is lightweight, transmission of these data via mesh networking in fairly close quartered environs is more than doable. So, how does data transmit to the Bitcoin Network? How do the Forest Walkers get the previous block data necessary to execute on mining?
Back To The Chain
Getting Bitcoin block data to and from the network is the last puzzle piece. The standing presumption here is that wherever a Forest Walker fleet is operating, it is NOT within cell tower range. We further presume that the nearest Walmart Wi-Fi is hours away. Enter the Blockstream Satellite or something like it.
A separate, ground-based drone will have two jobs: To stay as close to the nearest Forest Walker as it can and to provide an antennae for either terrestrial or orbital data uplink. Bitcoin-centric data is transmitted to the "uplink drone" via the mesh networked transmitters and then sent on to the uplink and the whole flow goes in the opposite direction as well; many to one and one to many.
We cannot transmit data to the Blockstream satellite, and it will be up to Blockstream and companies like it to provide uplink capabilities in the future and I don't doubt they will. Starlink you say? What’s stopping that company from filtering out block data? Nothing because it’s Starlink’s system and they could decide to censor these data. It seems we may have a problem sending and receiving Bitcoin data in back country environs.
But, then again, the utility of this system in staunching the fuel load that creates forest fires is extremely useful around forested communities and many have fiber, Wi-Fi and cell towers. These communities could be a welcoming ground zero for first deployments of the Forest Walker system by the home and business owners seeking fire repression. In the best way, Bitcoin subsidizes the safety of the communities.
Sensor Packages
LiDaR
The benefit of having a Forest Walker fleet strolling through the forest is the never ending opportunity for data gathering. A plethora of deployable sensors gathering hyper-accurate data on everything from temperature to topography is yet another revenue generator. Data is valuable and the Forest Walker could generate data sales to various government entities and private concerns.
LiDaR (Light Detection and Ranging) can map topography, perform biomass assessment, comparative soil erosion analysis, etc. It so happens that the Forest Walker’s ability to “see,” to navigate about its surroundings, is LiDaR driven and since it’s already being used, we can get double duty by harvesting that data for later use. By using a laser to send out light pulses and measuring the time it takes for the reflection of those pulses to return, very detailed data sets incrementally build up. Eventually, as enough data about a certain area becomes available, the data becomes useful and valuable.
Forestry concerns, both private and public, often use LiDaR to build 3D models of tree stands to assess the amount of harvest-able lumber in entire sections of forest. Consulting companies offering these services charge anywhere from several hundred to several thousand dollars per square kilometer for such services. A Forest Walker generating such assessments on the fly while performing its other functions is a multi-disciplinary approach to revenue generation.
pH, Soil Moisture, and Cation Exchange Sensing
The Forest Walker is quadrupedal, so there are four contact points to the soil. Why not get a pH data point for every step it takes? We can also gather soil moisture data and cation exchange capacities at unheard of densities because of sampling occurring on the fly during commission of the system’s other duties. No one is going to build a machine to do pH testing of vast tracts of forest soils, but that doesn’t make the data collected from such an endeavor valueless. Since the Forest Walker serves many functions at once, a multitude of data products can add to the return on investment component.
Weather Data
Temperature, humidity, pressure, and even data like evapotranspiration gathered at high densities on broad acre scales have untold value and because the sensors are lightweight and don’t require large power budgets, they come along for the ride at little cost. But, just like the old mantra, “gas, grass, or ass, nobody rides for free”, these sensors provide potential revenue benefits just by them being present.
I’ve touched on just a few data genres here. In fact, the question for universities, governmental bodies, and other institutions becomes, “How much will you pay us to attach your sensor payload to the Forest Walker?”
Noise Suppression
Only you can prevent Metallica filling the surrounds with 120 dB of sound. Easy enough, just turn the car stereo off. But what of a fleet of 50 Forest Walkers operating in the backcountry or near a township? 500? 5000? Each one has a wood chipper, an internal combustion engine, hydraulic pumps, actuators, and more cooling fans than you can shake a stick at. It’s a walking, screaming fire-breathing dragon operating continuously, day and night, twenty-four hours a day, three hundred sixty-five days a year. The sound will negatively affect all living things and that impacts behaviors. Serious engineering consideration and prowess must deliver a silencing blow to the major issue of noise.
It would be foolish to think that a fleet of Forest Walkers could be silent, but if not a major design consideration, then the entire idea is dead on arrival. Townships would not allow them to operate even if they solved the problem of widespread fuel load and neither would governmental entities, and rightly so. Nothing, not man nor beast, would want to be subjected to an eternal, infernal scream even if it were to end within days as the fleet moved further away after consuming what it could. Noise and heat are the only real pollutants of this system; taking noise seriously from the beginning is paramount.
Fire Safety
A “fire-breathing dragon” is not the worst description of the Forest Walker. It eats wood, combusts it at very high temperatures and excretes carbon; and it does so in an extremely flammable environment. Bad mix for one Forest Walker, worse for many. One must take extreme pains to ensure that during normal operation, a Forest Walker could fall over, walk through tinder dry brush, or get pounded into the ground by a meteorite from Krypton and it wouldn’t destroy epic swaths of trees and baby deer. I envision an ultimate test of a prototype to include dowsing it in grain alcohol while it’s wrapped up in toilet paper like a pledge at a fraternity party. If it runs for 72 hours and doesn’t set everything on fire, then maybe outside entities won’t be fearful of something that walks around forests with a constant fire in its belly.
The Wrap
How we think about what can be done with and adjacent to Bitcoin is at least as important as Bitcoin’s economic standing itself. For those who will tell me that this entire idea is without merit, I say, “OK, fine. You can come up with something, too.” What can we plug Bitcoin into that, like a battery, makes something that does not work, work? That’s the lesson I get from this entire exercise. No one was ever going to hire teams of humans to go out and "clean the forest". There's no money in that. The data collection and sales from such an endeavor might provide revenues over the break-even point but investment demands Alpha in this day and age. But, plug Bitcoin into an almost viable system and, voilà! We tip the scales to achieve lift-off.
Let’s face it, we haven’t scratched the surface of Bitcoin’s forcing function on our minds. Not because it’s Bitcoin, but because of what that invention means. The question that pushes me to approach things this way is, “what can we create that one system’s waste is another system’s feedstock?” The Forest Walker system’s only real waste is the conversion of low entropy energy (wood and syngas) into high entropy energy (heat and noise). All other output is beneficial to humanity.
Bitcoin, I believe, is the first product of a new mode of human imagination. An imagination newly forged over the past few millennia of being lied to, stolen from, distracted and otherwise mis-allocated to a black hole of the nonsensical. We are waking up.
What I have presented is not science fiction. Everything I have described here is well within the realm of possibility. The question is one of viability, at least in terms of the detritus of the old world we find ourselves departing from. This system would take a non-trivial amount of time and resources to develop. I think the system would garner extensive long-term contracts from those who have the most to lose from wildfires, the most to gain from hyperaccurate data sets, and, of course, securing the most precious asset in the world. Many may not see it that way, for they seek Alpha and are therefore blind to other possibilities. Others will see only the possibilities; of thinking in a new way, of looking at things differently, and dreaming of what comes next.
-
@ 2fb77d26:c47a6ee1
2025-02-01 14:40:02In H. G. Wells’ Roman Die Zeitmaschine und den diversen Verfilmungen werden sie als »ausschweifend, langsam und naiv« dargestellt. Von »untermenschlicher Intelligenz« gezeichnet. Für Dan Simmons sind sie »faul, ungebildet und unkultiviert«. Die Eloi. Die als Nahrungsquelle der Morlocks gehaltenen Nachfahren des Homo sapiens. »Sie entwickeln sich rückläufig und verlernen Jahrtausende von Kultur, Denken und Vernunft, bis sie sich mit dem Vergnügen des bloßen Daseins zufrieden geben«. Ertönt das Schlüsselsignal, auf das sie von ihren Züchtern konditioniert wurden – eine umgebaute Zivilschutzsirene – trotten sie freiwillig und in hypnotischer Apathie zur Schlachtbank.
Ein ähnlichen Eindruck hatten viele Maßnahmenkritiker von den Unterstützern der mittlerweile in allen Punkten widerlegten Covid-Propaganda. Zurecht. Das Gefolge von Drosten, Lauterbach und Co. war blind für Fakten und ist ins offene Messer gelaufen. Bedauerlicherweise verhalten sich viele Maßnahmenkritiker aber nun in weiten Teilen genauso. Sie haben Idole gefunden. Wollen glauben. Sie ignorieren Informationen, Fakten und Daten und werden Opfer einer neu justierten, gut geölten Propagandamaschine. Nur, um die in ihre neuen Helden gesetzten Hoffnungen nicht aufgeben und der wenig erbaulichen Realität nicht ins Auge blicken zu müssen.
Sie glauben an Donald Trump, Javier Milei, Alice Weidel, Peter Thiel und vor allem Elon Musk. Daran, dass der supranationale Nachhaltigkeitskorporatismus am Ende sei, das Finanzsystem gerettet und Gerechtigkeit hergestellt wird. Die Widerständler von gestern sind die »Schlafschafe« von heute. Sie scheinen vergessen zu haben, wie Propaganda funktioniert. Aus diesem Grund – und weil es ein so schön griffiges Wort ist, bei dem man nur einen Buchstaben verändern muss, um daraus den Vornamen eines vermeintlichen Heilsbringers zu basteln – erlaube ich mir, die Anhänger des MAGA-Kults im Zuge der folgenden Seiten mokant als Eloi zu bezeichnen. Ein bisschen Spaß muss sein.
Kurskorrektur mit Ansage
Lynn Forester de Rothschild, in der finanzoligarchischen Hackordnung mindestens eine Ebene über BlackRock und Co. anzusiedeln, kündigte den aktuellen Narrativwechsel bereits am 30. August 2023 an, als sie bei Bloomberg sagte, der Begriff »ESG gehöre in die Tonne«. Er sei verbrannt. Auch BlackRock-CEO Larry Fink, der Marktteilnehmer zur Unterstützung von ESG »zwingen« wollte, teilte seinen Investoren bereits am 26. März 2023 mit, das in Verruf gekommene Label ESG durch den Begriff »Energiepragmatismus« zu ersetzen.
Sowohl Rothschild als auch Fink räumten aber gleichzeitig ein, dass sich die übergeordnete Agenda nicht ändern und man die »Green Economy« weiter vorantreiben werde, man diese aber besser vermarkten müsse, um konservative Kreise nicht weiter gegen sich aufzubringen. Ein simpler Marketing-Trick. Wenig überraschend also, dass sowohl BlackRock als auch sechs amerikanische Großbanken Anfang 2025 die Net Zero Initiative verließen. Zum »perfekten Zeitpunkt«, wie die New York Post bemerkt, um nicht von der negativen, anti-woken Berichterstattung rund um die verheerenden Feuersbrünste in Los Angeles tangiert zu werden.
Es scheint, als hätten die Eloi bereits wieder verdrängt, dass die WEF-Meetings 2021 und 2024 unter Arbeitstiteln wie »The Great Narrative« und »Rebuilding Trust« liefen. Artikuliertes Ziel der Davoser PR-Abteilung für Globalisierungsfragen war nämlich, sich den zunehmend echauffierten, misstrauischen Pöbel vom Hals zu halten. Durch neue Narrative und vertrauensbildende Maßnahmen. Und das hat, zumindest vorerst, ausgezeichnet funktioniert.
In den USA stieg das Vertrauen in ordnungsgemäß durchgeführte Präsidentschaftswahlen 2024 zum ersten Mal seit Jahren wieder etwas an. In Europa macht sich ebenfalls Zuversicht breit. Schließlich haben die sogenannten »Rechtspopulisten« nicht mehr nur in Italien und Ungarn, sondern auch in Finnland, der Slowakei und den Niederlanden Oberwasser. Von den Erfolgen der AFD ganz zu schweigen. Diese führen, wie zuletzt in Thüringen, trotz klarem Wählervotum zwar nicht zur Regierungsbeteiligung, weil »demokratische Prozesse« und »Brandmauern« das zu verhindern wissen – aber dabei sein ist ja bekanntlich alles. Dass Friedenstreiberin Alice Weidel den bundesdeutschen Rüstungsetat auf knapp 200 Milliarden verdoppeln will, scheint die euphorisierten Kritiker dunkelgrüner Militarisierung auch nicht auszubremsen. Hauptsache nicht grün. Oder woke.
Überstaatliche Sphären
Dabei scheint Euphorie in Anbetracht der Tatsachen alles andere als angebracht. So hat Milei nach Angaben von Global Finance zwar das argentinische »Staatsdefizit nach 123 Jahren beendet«, dafür leben heute 53 Prozent der 45 Millionen Argentinier in Armut. Der höchste Wert seit 20 Jahren. Ende 2023 waren es noch 41,7 Prozent. Daran ändert auch semantische Schützenhilfe von libertären Denkfabriken wie der Hoover Institution nichts. Die radikalen Privatisierungsfeldzüge von »El Loco« haben einen hohen Preis. Ob Aerolineas Argentinas, die staatliche Fluglinie, der Stahlproduzent IMPSA oder das Transportunternehmen Trenes Argentinos Cargas, das 7.800 Kilometer Bahnstrecke betreibt – das Volksvermögen wird an die Meistbietenden verscherbelt. Wer das ist, kann sich wohl jeder ausmalen. Denn sein Schlachtruf »Afuera!« (Raus hier!) gilt augenscheinlich nicht für BlackRock und Co. – schließlich sei Argentinien »ziemlich billig« zu haben, wie es Rick Rieder, Top-Bond-Manager des Unternehmens schon 2019 formulierte.
Man muss allerdings nicht in die Ferne schweifen, um sich der realen Gefahren für die Freiheit bewusst zu werden. Jener Gefahren, die von Personalien gänzlich unberührt bleiben. So arbeitet die Europäische Union weiter an der eID, der Grundlage des technokratisch-totalitären Kontroll-Grids. Ihre Einführung ist beschlossene Sache. Offen ist lediglich, ab wann sie zum Obligatorium wird. Auch das persönliche CO2-Budget ist auf Kurs. Mit ETS2 (EU Emissions Trading System) nimmt die EPA (Environmental Protection Agency) seit dem 1. Januar 2025 nach der Konzernwirtschaft nun kleine und mittlere Unternehmen in den Fokus und verpflichtet diese, CO2-Kompensationsabgaben auf ihren Gas-, Benzin- und Mineralölverbrauch zu entrichten. Das dürfte Heiz-, Fracht- und folglich die Lebenshaltungskosten des Bürgers in neue Höhen treiben. Bis der Sonntagsausflug mit dem Familienauto nicht mehr nur Zeit, Benzin und Nerven, sondern auch CO2-Gebühren kostet, dauert es also wohl nicht mehr allzu lange.
Dieser überparteilichen, supranational koordinierten Überwachungs- und Enteignungsagenda ist weder durch die Wahl des geringeren Übels noch durch Auswandern zu entkommen. Denn wie sich der Internetpräsenz des »Global Governance Forum« (GGF) entnehmen lässt, wird bereits eifrig an »Global Government« gearbeitet. Die UN-nahe Nichtregierungsorganisation hat sich nämlich zum Ziel gesetzt, die Charta der Vereinten Nationen bis 2028 zu aktualisieren und den allseits bekannten »Herausforderungen unserer Zeit« anzupassen. Pünktlich ab 2030 soll das neue Vertragswerk ratifiziert werden und neben neuen Befugnissen für den Internationalen Gerichtshof sowie einer UN-Streitmacht auch eine Regierungsstruktur analog der Europäischen Union ermöglichen. Sprich, eine Weltregierung. Ganz demokratisch selbstverständlich.
Neben eID und CO2-Budget sind natürlich auch die Ausweispflicht fürs Internet und die automatisierte Zensur unliebsamer Inhalte weiter auf Kurs. Nachdem die Vereinten Nationen im September 2024 bereits dem totalitären »Pakt für die Zukunft« zustimmten, wurde am Heiligabend 2024 noch rasch die neue »Konvention gegen Onlineverbrechen« durchgewunken. Und seit Januar 2025 treibt die UN die Umsetzung eines noch weitreichenderen Abkommens namens »Global Digital Compact« voran. Ein Papier, vor dem ich bereits im Juli 2023 gewarnt habe. Was all das für den Bürger bedeutet, zeigt sich in Griechenland, wo die Regierung seit Anfang des Jahres Social-Media-Konten mit Steuer-Identifikationsnummern verknüpft, um eine Alterskontrolle fürs Internet einzuführen. Damit folgt die von der EU in Kreditsklaverei gehaltene Regierung in Athen dem Vorbild Australiens, wo der Zugang so Social-Media-Plattformen künftig erst ab einem Alter von 16 Jahren erlaubt werden soll – wofür man schlussendlich jeden Nutzer kontrollieren muss, der online geht.
Auch das von vielen noch immer als Mythos abgetane Geoengineering wird derweil munter weitergeführt. Obwohl Berichte des US-Kongress und mittlerweile sogar wissenschaftliche Berater der EU-Kommission vor großflächigem Solar Radiation Management warnen. Im Rahmen eines offiziellen, 54 Seiten umfassenden Reports an die EU-Kommission sowie eines Artikels des britischen Guardian vom 9. Dezember 2024 verwies das siebenköpfige Forscherteam auf die unabschätzbaren Konsequenzen solcher Eingriffe und forderte ein EU-weites Moratorium.
Wie genau Trump, Musk, Milei, Meloni, Weidel und Co. die Welt vor diesem Sammelsurium an totalitären Übergriffigkeiten retten wollen, konnte mir bislang keiner der Eloi sagen.
DJ Trump
Warum die in Donald Trump, den »Vater der Impfung«, und sein zionistisches Kriegstreiberkabinett gesetzten Hoffnungen bald bitterer Enttäuschung weichen dürften, habe ich bereits am 14. November 2024 ausführlich beschrieben. Dass auch die beiden Hauptargumente seiner Befürworter – dass er die mRNA-Kampagne mittlerweile bereue und in seiner ersten Amtsperiode Friedenspolitik betrieben habe – schlichtweg falsch sind, ebenfalls. Denn anhand der nackten Zahlen lässt sich eindeutig belegen, dass Trump »der kriegslüsternste Präsident der jüngeren Geschichte« war. Und wie stolz er auf »Operation Warp Speed« ist, die unzählige Amerikaner Gesundheit oder Leben kostete, ließ er die Welt zuletzt am 17. November 2024 auf seinem Social-Media-Netzwerk Truth Social wissen.
Trumps Interesse gilt nicht Frieden und Freiheit, sondern Donald Trump. So war es sein ganzes Leben lang. Wenn sich »The Donald« jemandem verpflichtet fühlt, ist es vielleicht Wilbur Ross, der ehemalige Chef von Rothschild Inc. Bankruptcy Advising. Denn wie das Forbes Magazine am 8. Dezember 2016 korrekt erläuterte, rette das Bankhaus vor gut 30 Jahren nicht nur Trumps bankrotte Casinos, sondern damit auch seine ganze Karriere. Nicht weil man in Trumps Geschäften und Immobilien einen besonderen Wert sah, sondern weil man die Person Donald Trump als »Anlage« betrachtete. Trotzdem ist es sicher nur Zufall, dass Ross von 2017 bis 2021 Handelsminister der Vereinigten Staaten war.
Elon Musk
Auch über den PayPal-Mafioso, CIA-Handlanger und Bilderberg-Executive Peter Thiel, dessen Protegé JD Vance nun US-Vizepräsident ist, habe ich bereits im September 2024 einen ausführlichen Artikel geschrieben. Gleiches gilt für Elon Musk, dessen trügerisches Image als Genius, Erfinder und Entrepreneur ich sogar schon im Oktober 2022 durchleuchtet habe. Zitat:
»Dass Elon Musk nicht rein zufällig zur liberal-coolen Ikone avancierte, legt ein Blick in seine Anfangsjahre als Unternehmer nahe. Denn während im sagenumwobenen Silicon Valley Ende der 1990er-Jahre eine Vielzahl an erfolgreicheren Tech-Entrepreneuren existierte, war es ausgerechnet Elon Musk, der für einen absolut inhaltsleeren Gastauftritt bei CNN gefilmt wurde, sodass zum ersten Mal eine breitere Öffentlichkeit von ihm Notiz nehmen musste. Dabei war sein erstes Unternehmen – Zip2 –, das er im Jahre 1995 mit seinem Bruder sowie einem weiteren Partner gegründet und im Februar 1999 für circa 300 Millionen US-Dollar an Compaq veräußert hatte, nicht das revolutionärste Unterfangen im kalifornischen IT-Mekka dieser Tage. Es handelte sich um ein simples Telefonbuch fürs Internet. Wenig mehr als eine Datenbank, in die sich Unternehmen eintragen konnten, um ihre Adresse im Netz zu hinterlegen.«
Meine fast zweieinhalb Jahre alte Analyse bedarf allerdings dringend einer Aktualisierung. Denn was Musk in der Zwischenzeit trieb – und für die Zukunft plant – hat so gar nichts mit dem zu tun, was seine geradezu fanatisierten Anhänger in ihm sehen wollen.
Fangen wir der Vollständigkeit halber aber noch mal vorne an: Elon Musk hat weder PayPal gegründet noch den Tesla erfunden. Auch wenn er das gerne so darstellt. Dafür fertigte Tesla unter seiner Ägide dann aber »RNA Mikrofabriken« für das deutsche Unternehmen CureVac, das zusammen mit Bayer mRNA-Injektionen gegen Corona auf den Markt brachte. Und während Musk gegenüber der New York Post am 30. September 2020 sagte, sich nicht gegen Covid impfen lassen zu wollen, erklärte er dem TIME Magazine am 13. Dezember 2021, bereits geimpft zu sein. Zeitgeistig flexibel ist er also. Wer behauptet, Musk hätte seine Meinung zur mRNA-Technologie seit dem Covid-Fiasko signifikant geändert und sehe das Produkt nun kritisch, ist schlecht informiert. Noch am 12. April 2023 erklärte er bei Twitter, dass er mRNA für eine »medizinische Revolution« hält. Vergleichbar mit dem Schritt »von analog zu digital«.
Was Musk mit digitaler Revolution meint, zeigte sich 2017 mit Hurricane Irma. Damals gab das Unternehmen für Besitzer von Fahrzeugen mit 75 kWh ein Softwareupdate heraus, das die Reichweite von 338 auf 400 Kilometer steigerte – was im Umkehrschluss bedeutet, dass Tesla-Besitzer um eine eigentlich abrufbare Leistung ihres eigenen Fahrzeugs betrogen werden, wenn gerade keine Naturkatastrophe wütet. Dass Tesla-Kunden darüber hinaus permanent überwacht werden, zeigte sich unlängst im Rahmen der Explosion eines Cybertrucks in Las Vegas. Augenbewegungen, Mimik, Geschlecht, Hautfarbe, Körpertemperatur, Gepäckanordnung, Route, Ladestopps, Bezahlvorgänge, Telefonbuch, Musik-Playlist, Online-Abos, et cetera. Was von Sensoren und Verbindungen zu erfassen ist, wird erfasst, wie eine Untersuchung von Mozilla im Herbst 2023 feststellte. Das gilt im Übrigen nicht nur für Tesla, sondern für praktisch alle modernen Autos. Ein Tesla hat es dabei nur am leichtesten. Die gesammelten Daten werden entweder zum Schleuderpreis verkauft und/oder gegen uns verwendet.
Doch zurück zu Musk, der Twitter nicht übernahm, um Meinungsfreiheit herzustellen, sondern um die Plattform zur »Alles-App« zu machen. Sein erklärtes Vorbild: die chinesische Spionage-App WeChat. Deswegen will er alle Nutzer »als echte Menschen identifizieren«. Biometrisch versteht sich. Dafür arbeitet man bei Twitter bevorzugt mit israelischen Unternehmen zusammen, die von ehemaligen Mossad-Agenten gegründet wurden. Vielleicht stellte ja Doppelagent Jeffrey Epstein den Kontakt zum Mossad her, nachdem er Musk als regelmäßigen Teilnehmer seiner Edge-Foundation Seminare zum Thema Nudging schätzen gelernt hatte. Epstein war nämlich der einzige nennenswerte Sponsor von Edge.
Twitter kaufte Musk übrigens nicht von seinem eigenen Geld, sondern mit Hilfe von 94 Investoren, deren Namen ein US-Bundesrichter erst im August 2024 veröffentlichte, weil Jacob Silverman (Reporters Committee for Freedom of the Press) sie einklagte. Die Liste umfasst so illustre Namen wie Fidelity Investments, Sequoia Capital, Andreessen Horowitz, Bandera Fund, Binance Capital Management, Sean Combs (alias Diddy) Capital, Jack Dorsey (Twitter Gründer), Baron Opportunity Fund oder Prinz Alwaleed bin Talal al Saud von der saudischen Königsfamilie. Da wird also offenbar »der Sumpf« mit mehr Sumpf »trockengelegt«. Von der Nominierung des WEF Executive Chair Linda Yaccarino als neuer Twitter-CEO und »Freedom of Speech« versus »Freedom of Reach« mal ganz abgesehen.
Auch die von den Eloi als sensationelle Enthüllung gefeierten Twitter Files sind leider nicht ernst zu nehmen. Denn sie offenbarten nichts, was man nicht schon wusste. Zudem ist bis heute unklar, woher die veröffentlichten Informationen kamen, wer den Zugriff darauf gesteuert hat, was dort noch gespeichert war, warum praktisch nur ein von Elon ausgewählter Journalist Zugriff darauf hatte und dieser nur Screenshots, anstelle ganzer Dokumente veröffentlichen durfte. Ein echter Leak besteht aus einem Archiv, das man selbst durchsuchen kann – nicht aus ein paar handverlesenen Screenshots.
Fehlt noch Space X. Ein Unternehmen, das Musk zwar selbst gegründet hat, dessen Erfolge aber in weiten Teilen anderen Umständen zu verdanken sind. So schreibt beispielsweise inside Tesla am 22. März 2022:
»Schon Anfang der 2000er-Jahre hatte die NASA erkannt, dass ihr bald die Möglichkeit fehlen würde, selbst Astronauten und Material ins All und zur ISS zu bringen. Man machte sich also auf die Suche nach Partnern aus der Privatwirtschaft und wurde unter anderem bei Elon Musks Space X fündig. Bereits 2006, also noch in der Entwicklungsphase der Falcon 1, erhielt Musks Unternehmen fast 400 Millionen US-Dollar Startfinanzierung unter dem COTS-Programm.«
Space X war von Beginn an als verlängerte Werkbank der NASA gedacht, weil der US-Weltraumbehörde immer mehr Mittel gestrichen wurden. Die Öffentlichkeit hatte nämlich das Interesse an ziviler Raumfahrt verloren. Daher setzte man in Washington immer öfter den Rotstift an. Doch seit Musk die Menschen öffentlichkeitswirksam zum Mars befördern will – »let’s build Marsian Technocracy« – steigt das Interesse wieder. Leider muss ich die Vorfreude auf eine planetare Kolonie aber etwas dämpfen. Denn Space X wird nicht betrieben, um Menschen auf den Mars zu bringen, sondern um das »weltgrösste Netzwerk an Spionagesatelliten aufzubauen«.
Musks Weltraumagentur ist Handlanger des militärisch-industriellen Komplexes und einer der wichtigsten Vertragspartner des Pentagon. Das konnte man 2017 schon im Observer nachlesen. Oder am 9. Januar 2018 bei CNBC, die vom (missglückten) Transport eines streng geheimen US-Spionagesatelliten berichtete. Am 15. April 2022 kommentierte Tech Unwrapped zwei weitere Spionagesatelliten des US-Militärs, die Space X in die Umlaufbahn beförderte. Seit Jahren erhält das Unternehmen Milliarden von US-Regierung und Geheimdiensten. Siehe Los Angeles Times vom 30. Mai 2015: 4,9 Milliarden. Oder ein Artikel des Wall Street Journal vom 23. Februar 2024: 1,8 Milliarden. Oder eine lange Liste von staatlichen Zuwendungen, die Business Insider am 15. Dezember 2021 veröffentlichte. Damit basiert der Erfolg von Space X nicht primär auf Musks genialem Unternehmergeist, sondern auf Subventionen. Auf Steuergeldern.
Nicht zu vergessen: Starlink. Das von Space X betriebene, weltumspannende Satellitennetzwerk. Es mag den Vorteil haben, dass damit auch Menschen in entlegenen Regionen des Planeten oder Katastrophengebieten Zugriff auf das Internet haben. Dabei sollte allerdings nicht unterschlagen werden, dass Starlink in seiner finalen Ausbaustufe circa 42.000 Satelliten umfassen und damit ein permanentes Strahlungsfeld erzeugen wird. Gesundheitliche Risiken für den Homo sapiens: unklar. Darüber hinaus haben die Orbiter Zugriff auf das NORAD-Datenbanksystem, um Weltraumschrott ausweichen zu können. Sprich, sie sind permanent mit Systemen des US-Militär verbunden. Aus diesem Grund ermöglicht Starlink auch die Steuerung von Kampfdrohnen – siehe Ukraine-Konflikt – sowie 30 mal schnelleres Senden von Daten an und von US-Kampfflugzeugen. Während die Öffentlichkeit Musks Satellitennetzwerk vor allem als ziviles Produkt betrachtet, ist Starlink primär von militärischem Interesse. Nicht umsonst wird parallel Starshield aufgebaut, das dem geheimdienstlich-militärischen Komplex unter anderem die diskrete Echtzeitüberwachung der ganzen Welt erlaubt. Auch von DEW-Fähigkeiten (Directed Energy Weapon) ist die Rede. Ende 2024 befanden sich bereits 98 solcher Satelliten in erdnaher Umlaufbahn.
In Anbetracht dieser Informationen ist es also kaum verwunderlich, dass Musk seit Jahren offen für Technokratie wirbt. Für ein zentralistisches, faschistoides Herrschaftsmodell, das schon sein Großvater Joshua Haldemann als führender Kopf in den USA und Kanada vertrat. Der Familientradition folgend empfiehlt Musk eine CO2-Steuer zum Kampf gegen den Klimawandel, ein universelles Grundeinkommen, um die von der KI ausgelösten Disruptionen abzufangen und sein Neuralink Gehirnimplantat, um dem drohenden Transhumanismus etwas Transhumanismus entgegenzusetzen.
Futurum Technologicus
Für Kunden, denen Chips im Kopf irgendwie zu altbacken sind, entwickelt Musks Unternehmen in Zusammenarbeit mit iota Biosciences natürlich ein zeitgemäßeres Premiumprodukt: Neural Dust. Intelligente Nanopartikel in Staubkorngröße, die sich im Gehirn anreichern. Die lassen sich dann wahrscheinlich – wie die in Indien bereits zugelassene Nasal-Impfung gegen Covid – durch die Nase ziehen. Oder durch Luftschächte öffentlicher Gebäude pumpen. Man kann die neue Freiheit also förmlich riechen.
Ganz wie es der 44 Seiten starke »National Nanotechnology Initiative Strategic Plan« (NNI Plan) des Weißen Hauses im Oktober 2021 vorsah: »Die Öffentlichkeit einbeziehen und Mitarbeiterzahlen im Bereich Nanotechnologie erhöhen«. Nicht umsonst hat Donald Trump der entsprechenden Behörde in seiner ersten Amtszeit zusätzliche Mittel genehmigt. Genau wie Joe Biden nach ihm.
Das von der Technokratie-Bewegung vor fast einem Jahrhundert definierte nordamerikanische Technate – sprich, der amerikanische Verantwortungsbereich einer weltweiten Technokratie – sieht der von Trump und Musk reanimierten Vision einer »nordamerikanischen Union« übrigens verblüffend ähnlich. Wen interessiert bei all der Make-Great-Euphorie schon noch, dass Imperialismus scheisse, Dänemark ein souveräner Staat und der Panamakanal ein strategisches Nadelöhr der internationalen Handelsschifffahrt ist. Oder, dass die »nordamerikanische Union« nicht nur bei Trump-Cheerleadern wie Alex Jones vor ein paar Jahren noch als »böser Globalisten-Plan« galt.
Schauen wir nach vorne. In Richtung »goldenes Zeitalter«, wie Trump es nennt. Dieses dürfte für den Normalbürger nämlich sehr ungemütlich werden. Denn es wird dominiert von Algorithmen. Von Künstlicher Intelligenz. Für die Eloi also primär von Grok, dem auf Twitter (und Teslas) integrierten Chatbot. Dieser basiert auf Technologie des Unternehmens xAI – laut Wikipedia gegründet von Elon Musk im März 2023. Das mag zwar so im Handelsregister stehen, ist wohl aber nur die halbe Wahrheit. Denn xAI dürfte die Fortführung eines DARPA-Projekts darstellen, das bereits 2015 unter dem Titel »Explainable Artificial Intelligence« (XAI) gestartet wurde und 2021 auslief. Als die Finanzierung seitens DARPA eingestellt wurde, machte XAI die Forschungsergebnisse auf einem Server zugänglich. Circa 18 Monate Jahre später engagierte Elon Musk Igor Babuschkin als Chefingenieur für xAI. Babuschkin hatte zuvor acht Jahre lang für Googles DeepMind-Projekt gearbeitet und nutzte aller Wahrscheinlichkeit nach die DARPA-Ergebnisse um xAI, beziehungsweise Grok zu entwickeln.
Im Juli 2023 verkündete Musk, xAI sei im Gegensatz zu den Konkurrenzprodukten von Google, Microsoft und OpenAI eine »gute« KI. Erstaunlich, wenn die gleichen Ingenieure am Werk sind und die KI auf Basis eines Militärprojekts entsteht. Zudem sprechen auch die Top-Sponsoren von xAI nicht unbedingt für das »Gute«. Denn unter den größten Geldgebern der letzten Finanzierungsrunde vom 23. Dezember 2024 befinden sich so illustre Namen wie BlackRock, AMD, Nvidia und Fidelity, die zusammen weitere sechs Milliarden Dollar für Musks KI-Unternehmen zur Verfügung stellten.
Genug Liquidität, um xAI für die »Alles-App« weiterzuentwickeln, wo Grok seit einer Weile automatisch Kurzbeschreibungen für Profile erstellt, die man weder abschalten noch ändern kann. Twitter-Nutzer müssen nun also nicht mehr selbst das Profil eines Accounts durchstöbern, um sich einen ersten Eindruck von der Person zu machen, sondern bekommen diesen von Elon Musks KI geliefert. Vorurteil auf Knopfdruck sozusagen. Vergleichbar mit einem Sozialkreditsystem. Denn die täglich neu generierte Zusammenfassung basiert auf dem Nutzerverhalten.
»Die neuen, KI-generierten Grok-Kurzprofile unter jedem X-Nutzerprofil SIND de facto ein Social Credit System nach chinesischem Vorbild für den Westen. Das Profil jedes Nutzers wird tagesaktuell neu berechnet. Äußert man sich zu verschiedenen Themen, nennt die KI das schnell mal »verheddern«. Grok gibt zu, das Profil wird erstellt aus dem eigenen Nutzerverhalten des Tages, seinen eigenen Berechnungen und nicht näher definierten Anweisungen«, kommentierte Journalistin Aya Velázquez die Neuerung am 14. Januar 2025.
Andere Nutzer werden als »leicht erregbar« beschrieben, »verzetteln« sich oder »glauben an Wettermanipulation zur Klimakontrolle«. Offener wird ein Debattenraum dank solcher Adjektive und Zusammenfassungen sicher nicht. Wer möchte schon das Profil von leicht erregbaren Chemtrail-Gläubigen anschauen oder gar mit diesen assoziiert werden. Gegen solch eine automatisierte, herablassend daherkommende Einordnung durch intransparent operierende KI war die Faktencheck-Industrie geradezu harmlos. Wer also annimmt, die Abschaffung der Faktenchecker bei Facebook und Co. bedeute ein Ende der Zensur, irrt. Sie wird im Gegenteil deutlich raffinierter und weitreichender werden.
Details zum persönlichen Punktestand im Grok-Sozialkreditsystem oder Information über das Zustandekommen der Bewertung erhält man auf Anfrage natürlich nicht. Twitter wird die daraus entstehende Hierarchie aber mit Sicherheit für Reichweitensteuerung, Nudging-Kampagnen und weitere sozialarchitektonische Funktionen nutzen. Vor allem, wenn 2025 das Bezahlsystem »X Money« eingeführt wird. Dann werden die Eloi bald nicht mehr nur um Reichweite, Follower und Re-Tweets buhlen, sondern auch um Geld – das als Folge unliebsamer Postings zu Genozid X, Krieg Y oder Person Z künftig schneller eingefroren werden dürfte als jedes Bankkonto. De-Banking der nächsten Generation. Und irgendwann trifft das jeden. Außer, man schwimmt immer mit dem Strom.
Doch damit nicht genug. Am 13. Dezember 2024 gab das wohl den wenigsten bekannte Unternehmen WISeSat bekannt, künftig mit Space X zusammenzuarbeiten, um »verschiedene Produkte und Systeme zu kombinieren«. Die WISeSat AG ist eine Tochterfirma der in Genf (Schweiz) ansässigen WISeKey International Holding AG, die im Bereich Cybersicherheit, KI und IoT (Internet of Things) tätig ist. Die Ankündigung dieser Kollaboration ließ die WISeKey-Aktie kurzfristig um 107,73 Prozent steigen. Ein erster gemeinsamer Start zum Transport sogenannter Picosatelliten fand am 14. Januar 2025 von der Vandenberg Space Force Base in Kalifornien statt.
Aber was genau macht WISeSat? Einer Presseerklärung des Unternehmens vom 15. September 2023 lässt sich entnehmen:
»WISeSAT AG zeichnet sich dank ihrer Konstellation von ultra-sicheren Picosatelliten und Infrastruktur durch sichere und effektive Kommunikationsstrategien für vernetzte Geräte aus. Die Expertise des Unternehmens in kryptografischer Technologie und sicherem Datenmanagement hat die sichere IoT-Implementierung in zahlreichen Bereichen neu definiert, von städtischen Innovationen in Smart Cities bis hin zu modernster industrieller Automatisierung. (…) WISeSAT steht an vorderster Front bei der Entwicklung von ultra-sicheren Picosatelliten-Lösungen in Zusammenarbeit mit ihrem Verbündeten FOSSA Systems. Es setzt sich für sichere IoT-Kommunikation über raumbasierte Netzwerke ein und nutzt die neuesten kryptografischen Innovationen, um sichere und sofortige Datenaustausche in verschiedenen Bereichen zu gewährleisten (…).«
Im Klartext: WISeSat bringt Satelliten von der Größe einer Tupperdose ins All. Diese Mini-Orbiter umkreisen den Planeten in niedrigen Umlaufbahnen und etablieren dort ein Netzwerk für kryptografierte Echtzeitdatenübertragung. Fliegende 5G-Masten sozusagen. Oder WLAN-Router. Nur viel schneller. Für das Internet der Dinge – und Smart Cities.
»In dieser Woche startet WISeSat einen Satelliten der neuen Generation und markiert damit einen wichtigen Meilenstein in der Entwicklung einer globalen Satellitenkonstellation, die eine umfassende Erdabdeckung mit ultraniedriger Latenzzeit ermöglicht. Entwickelt, um Billionen von IoT-Geräten in Echtzeit zu verfolgen und aufzuspüren.« (Carlos Creus Moreira, WISeKEy CEO, 12. Januar 2025)
Welche Datenträger dieses Picosatelliten-Netzwerk künftig verfolgen und aufspüren soll, zeigt sich bei einem Blick auf das Produktportfolio der Holding-Gesellschaft WISeKey – einem »weltweit führenden Anbieter von Cybersicherheit, digitaler Identität und Internet der Dinge (IoT) Lösungen«. Denn die Holding existiert seit 24 Jahren, besteht aus fünf Unternehmen, hat mehr als eineinhalb Milliarden Chips und über fünf Milliarden »Roots of Trust« installiert, residiert an sechs internationalen Standorten und hat gut 3.000 Kunden in Staat und Wirtschaft beglückt. Einen Wikipedia-Eintrag gibt es für das bei NASDAQ und SIX gelistete Unternehmen erstaunlicherweise trotzdem nicht.
Dafür aber für den seit Mai 2021 amtierenden »Chief Digital Transformation Officer« Pierre Maudet. Der war ab Juni 2012 Mitglied des Genfer Staatsrats, 2013 bei den Young Global Leaders des Weltwirtschaftsforums und 2015 bei der Bilderberger Konferenz in Telfs-Buchen (Österreich). Nachdem er im Februar 2021 vom Genfer Polizeigericht wegen Vorteilsnahme verurteilt wurde, trat er als Staatsrat zurück – und drei Monate später bei WISeKey an. Am 30. April 2023 wurde er, ungeachtet seiner kriminellen Vergangenheit, zusätzlich wieder in den Genfer Staatsrat gewählt. Wie praktisch. Solch eine schamlose Unverfrorenheit scheint Maudet perfekt für das zu qualifizieren, was bei WISeKey unter dem Deckmantel der »Quantensicherheit« entwickelt wird – ein raumbasiertes eID-Ökosystem.
»Quantensicherheit nutzt Prinzipien der Quantenmechanik, um den Datenschutz und die sichere Informationsübertragung zu revolutionieren. Kernstück ist die Quantenschlüsselverteilung (Quantum Key Distribution, QKD), eine Spitzentechnologie, die mithilfe der Quantenmechanik vernetzte Teilchen für den sicheren Austausch von Verschlüsselungskennwerten erzeugt.«
Ob digitale Identität, Unterschrift, Cloud oder Software – von der Know-Your-Customer-Biometrie bis hin zur Unternehmenslösung für die Mitarbeiteridentifikation. WISeKey hilft. Anmelden kann sich jeder. Während die Produktpalette für den privaten Sektor noch nach Lieferketten-Management, Sendungsverfolgung, Login-Lösung für eBanking oder Face ID auf dem Smartphone klingt – aber deutlich weitreichender ist, schauen sie sich die Homepage an – sprechen die WISeKey-Angebote im Bereich Regierungen eine ganz andere Sprache. Denn unter diesem Menüpunkt bewirbt der diskret operierende Konzern seine »CertifyID Trust Center Platform«:
»Die CertifyID Trust Center Platform ist eine industrialisierte eID-Verwaltungslösung für Bürger, die Benutzer und ihre Anmeldeinformationen verwaltet, insbesondere digitale IDs und digitale Zertifikate für groß angelegte Anwendungen wie landesweite E-Government-Dienste. Es handelt sich um eine vollständige industrielle Public Key Infrastruktur- und ID-Verwaltungslösung, die Regierungsdienste rund um die Uhr unterstützt.
Die CertifyID Trust Center Plattform wird in einer Reihe von Anwendungen der Regierung und des öffentlichen Sektors verwendet, zum Beispiel: Personalausweis, ePassport (ICAO-konform), Führerschein, Gesundheit, Wahlen/Abstimmen.
Die CertifyID Plattform wurde unter Verwendung der Sicherheits- und Public Key Infrastruktur-Expertise von WISeKey entwickelt und kann vollständig in E-Government-Frameworks, kommerzielle Frameworks (…) und in das Bereitstellungsframework für E-Government-Dienste eines Landes integriert werden.«
Da passt es doch wunderbar ins Bild, dass WISeKey am 13. Oktober 2022 eine »Partnerschaftsvereinbarung zur Zusammenarbeit bei der Entwicklung weltraumbezogener Aktivitäten« mit der Schweizer Armee bekannt gab – schließlich residieren in der Alpenrepublik nicht nur UN, GAVI, WEF, Club of Rome und jede Menge NGOs, sondern auch die Bank für Internationalen Zahlungsausgleich (BIZ), die ganz sicher Verwendung für ein quantengesichertes Echtzeit-Picosatellitennetzwerk findet, wenn ihr »Unified Ledger« (Zentrales Hauptbuch) für das Blockchain-Weltfinanzsystem von morgen zum Einsatz kommt. In Anbetracht der »allumfassenden Marktblase« (D. Webb, 2024) ist damit wohl in absehbarer Zeit zu rechnen.
Das also sind die Projekte, Pläne und neuen Partner von Elon. Auf mich machen ja speziell die korrupten Genfer Quantenspezialisten mit ihren Picosatelliten und schlüsselfertigen eID-Lösungen nicht unbedingt den Eindruck von Freiheitskämpfern. Und auch die am 22. Januar 2024 bei einer Pressekonferenz im Weißen Haus angekündigten »personalisierten mRNA-Injektionen gegen Krebs« lassen mich eher skeptisch zurück.
Genau wie der Umstand, dass diese binnen 48 Stunden »personalisierte mRNA« durch die Rechenleistung von OpenAI ermöglicht werden soll. Denn das von Elon Musk mitgegründete Unternehmen des WEF- und Bilderberg-affinen Sam Altman steht im berechtigten Verdacht, für den Tod eines Whistleblowers im Dezember 2024 verantwortlich zu sein. Während Polizei und Medien den Tod des OpenAI-Forschers Suchir Balaji als Selbstmord deklarieren, sprechen sowohl die Umstände am Fundort seiner Leiche als auch Balajis Eltern von »eiskaltem Mord«. Nicht zu vergessen, dass Altman von seiner eigenen Schwester des jahrelangen Missbrauchs beschuldigt wird und sich dafür demnächst vor Gericht verantworten muss. Selbst The Economist räumte am 10. Dezember 2024 ein, dass »die PayPal Mafia die amerikanische Regierung übernimmt«. Und das mit der »Mafia« scheint man in Washington mittlerweile wörtlich zu nehmen.
Aber die von einigen aus der Hüfte geschossenen Präsidialdekreten euphorisierten Eloi werden sicher Gründe finden, das alles zu ihren Gunsten auszulegen. Immerhin hat Trump ein paar Leute begnadigt und will aus der WHO austreten. Wie seine Fanbase es bewerkstelligt, auszublenden, dass »The Donald« schon in seiner ersten Amtszeit aus der WHO austreten wollte und es unterließ, erschließt sich mir aber leider nicht. Genau wie die Begeisterung für ein Gespräch zwischen Musk und Weidel. Man stelle sich nur mal vor, George Soros, Bill Gates oder Eric Schmitt konferierten mit deutschen Politikern. Oder bekämen Sendezeit im ÖRR. Nicht auszudenken.
Wie heißt es so schön: »Eine schmerzliche Wahrheit ist besser als eine Lüge« (Thomas Mann). Stimmt. Nur fällt es relativ schwer, eine Lüge einzugestehen, wenn der, dem man sie beichten muss, der Lügner ist.
So bleibt nur zu hoffen, dass möglichst viele Eloi diesen Schritt trotzdem möglichst bald hinter sich bringen. Im eigenen Interesse. Denn wie schon Ernst Freiherr von Feuchtersleben feststellte, ist »Reue der Verstand, der zu spät kommt«. Und das kann in diesen Tagen verheerende Folgen haben.
-
@ 83279ad2:bd49240d
2025-01-24 09:15:37備忘録として書きます。意外と時間がかかりました。全体で1時間くらいかかるので気長にやりましょう。 仮想通貨取引所(販売所ではないので、玄人が使えばお得らしい)かつBitcoinの送金手数料が無料(全ての取引所が無料ではない、例えばbitbankは0.0006bitcoinかかる)なので送金元はGMOコインを使います。(注意:GMOコインは0.02ビットコイン以下は全額送金になってしまいます) 今回はカストディアルウォレットのWallet of Satoshiに送金します。 以下手順 1. GMOコインでbitcoinを買います。 2. GMOコインの左のタブから入出金 暗号資産を選択します。 3. 送付のタブを開いて、+新しい宛先を追加するを選択します。 4. 送付先:GMOコイン以外、送付先ウォレット:プライベートウォレット(MetaMaskなど)、受取人:ご本人さま を選んで宛先情報の登録を選ぶと次の画面になります。
5. 宛先名称にwallet of satoshi(これはなんでも良いです わかりやすい名称にしましょう) wallet of satoshiを開いて、受信→Bitcoin On-Chainからアドレスをコピーして、ビットコインアドレスに貼り付けます。
6. 登録するを押します。これで送金先の登録ができました。GMOコインの審査がありますがすぐ終わると思います。 7. ここから送金をします。送付のタブから登録したビットコインの宛先リストwallet of satoshiを選択し、送付数量と送付目的を選択して、2段階認証をします。
8. 実行を押せば終わりです。もうあなたがやることはありません。送金が終わるのを40分くらい眺めるだけです。
8. 取引履歴のタブから今の送金のステータスが見れます。
9. 15分くらい待つとステータスが受付に変わります。
10. 20分くらい待つとトランザクションIDが表示されます。
この時点からwallet of satoshiにも送金されていることが表示されます。(まだ完了はしていない)
11. ステータスが完了になったら送金終わりです。
wallet of satoshiにも反映されます。
お疲れ様でした!
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28Que vença o melhor
Nos esportes e jogos em geral, existe uma constante preocupação em balancear os incentivos e atributos do jogo, as regras do esporte em si e as regras das competições para que o melhor vença, ou, em outras palavras, para que sejam minimizados os outros fatores exceto a habilidade mais pura quanto possível no jogo em questão.
O mundo fora dos jogos, porém, nem sempre pode ter suas regras mudadas por um ente que as controla e está imbuído da vontade e dos meios para escolher as melhores regras possíveis para a obtenção dos resultados acima. Aliás, é muitas vezes essa possibilidade é até impensável. Mesmo quando ela é pensável e levada em conta os fatores que operam no mundo real não são facilmente identificáveis, eles são muitos, e mudam o tempo todo.
Mais do que isso, ao contrário de um jogo em que o objetivo é praticamente o mesmo para todo mundo, os objetivos de cada agente no mundo real são diferentes e incontáveis, e as "competições" que cada um está disputando são diferentes e muitas, cada minúsculo ato de suas vidas compreendendo várias delas simultaneamente.
Da mesma forma, é impossível conceber até mesmo o conceito de "melhor" para que se deseje que ele vença.
Mesmo assim é comum encontrarmos em várias situações gente que parte do princípio de que se Fulano está num certo lugar (por exemplo, um emprego muito bom) e Beltrano não isso se deve ao fato de Fulano ter sido melhor que Beltrano.
Está aí uma crítica à idéia da meritocracia (eu tinha me esquecido que essa palavra existia).
-
@ 4fe4a528:3ff6bf06
2025-02-01 13:41:28In my last article I wrote about NOSTR. I found another local bitcoiner via NOSTR last week so here is why it is important to join / use NOSTR — start telling people “Look me up on NOSTR”
Self-sovereign identity (SSI) is a revolutionary approach to digital identity that puts individuals in control of their own identity and personal data. Unlike traditional digital identity models, which rely on third-party organizations to manage and authenticate identities, SSI empowers individuals to own and manage their digital identity.
This approach is made possible by emerging technologies such as secure public / private key pairs. Decentralized identifiers, conceived and developed by nostr:npub180cvv07tjdrrgpa0j7j7tmnyl2yr6yr7l8j4s3evf6u64th6gkwsyjh6w6 is an attempt to create a global technical standard around cryptographically secured identifiers - a secure, universal, and sovereign form of digital ID. This technology uses peer-to-peer technology to remove the need for intermediaries to own and authenticate ID information.
Notably, NOSTR, a decentralized protocol, has already begun to utilize decentralized IDs, demonstrating the potential of this technology in real-world applications. Via NOSTR, users can be sure that the person or computer publishing to a particular npub knows their nsec (password for your npub), highlighting the secure and decentralized nature of this approach.
With SSI, individuals can decide how their personal data is used, shared, and protected, giving them greater control and agency over their digital lives.
The benefits of SSI are numerous, including:
Enhanced security and protection of personal data. Reduced risk of identity theft and fraud Increased autonomy and agency over one's digital identity. Improved scalability and flexibility in digital identity management
challenges:
Ensuring the security and integrity of decentralized identity systems. Developing standards and protocols for interoperability and compatibility. Addressing concerns around ownership and control of personal data. Balancing individual autonomy with the need for verification and authentication in various contexts.
Overall, self-sovereign identity has the potential to transform the way we think about digital identity and provide individuals with greater control and agency over their personal data. Without people in control of their bitcoin seed words no freedom loving people would be able to exchange their money with others. Yes, keep enjoying using the only free market on the planet BITCOIN. Long live FREEDOM!
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28Token-Curated Registries
So you want to build a TCR?
TCRs (Token Curated Registries) are a construct for maintaining registries on Ethereum. Imagine you have lots of scissor brands and you want a list with only the good scissors. You want to make sure only the good scissors make into that list and not the bad scissors. For that, people will tell you, you can just create a TCR of the best scissors!
It works like this: some people have the token, let's call it Scissor Token. Some other person, let's say it's a scissor manufacturer, wants to put his scissor on the list, this guy must acquire some Scissor Tokens and "stake" it. Holders of the Scissor Tokens are allowed to vote on "yes" or "no". If "no", the manufactures loses his tokens to the holders, if "yes" then its tokens are kept in deposit, but his scissor brand gets accepted into the registry.
Such a simple process, they say, have strong incentives for being the best possible way of curating a registry of scissors: consumers have the incentive to consult the list because of its high quality; manufacturers have the incentive to buy tokens and apply to join the list because the list is so well-curated and consumers always consult it; token holders want the registry to accept good and reject bad scissors because that good decisions will make the list good for consumers and thus their tokens more valuable, bad decisions will do the contrary. It doesn't make sense, to reject everybody just to grab their tokens, because that would create an incentive against people trying to enter the list.
Amazing! How come such a simple system of voting has such enourmous features? Now we can have lists of everything so well-curated, and for that we just need Ethereum tokens!
Now let's imagine a different proposal, of my own creation: SPCR, Single-person curated registries.
Single-person Curated Registries are equal to TCR, except they don't use Ethereum tokens, it's just a list in a text file kept by a single person. People can apply to join, and they will have to give the single person some amount of money, the single person can reject or accept the proposal and so on.
Now let's look at the incentives of SPCR: people will want to consult the registry because it is so well curated; vendors will want to enter the registry because people are consulting it; the single person will want to accept the good and reject the bad applicants because these good decisions are what will make the list valuable.
Amazing! How such a single proposal has such enourmous features! SPCR are going to take over the internet!
What TCR enthusiasts get wrong?
TCR people think they can just list a set of incentives for something to work and assume that something will work. Mix that with Ethereum hype and they think theyve found something unique and revolutionary, while in fact they're just making a poor implementation of "democracy" systems that fail almost everywhere.
The life is not about listing a set of "incentives" and then considering the problems solved. Almost everybody on the Earth has the incentive for being rich: being rich has a lot of advantages over being poor, however not all people get rich! Why are the incentives failing?
Curating lists is a hard problem, it involves a lot of knowledge about the problem that just holding a token won't give you, it involves personal preferences, politics, it involves knowing where is the real limit between "good" and "bad". The Single Person list may have a good result if the single person doing the curation is knowledgeable and honest (yes, you can game the system to accept your uncle's scissors and not their competitor that is much better, for example, without losing the entire list reputation), same thing for TCRs, but it can also fail miserably, and it can appear to be good but be in fact not so good. In all cases, the list entries will reflect the preferences of people choosing and other things that aren't taken into the incentives equation of TCR enthusiasts.
We don't need lists
The most important point to be made, although unrelated to the incentive story, is that we don't need lists. Imagine you're looking for a scissor. You don't want someone to tell if scissor A or B are "good" or "bad", or if A is "better" than B. You want to know if, for your specific situation, or for a class of situations, A will serve well, and do that considering A's price and if A is being sold near you and all that.
Scissors are the worst example ever to make this point, but I hope you get it. If you don't, try imagining the same example with schools, doctors, plumbers, food, whatever.
Recommendation systems are badly needed in our world, and TCRs don't solve these at all.
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28Precautionary Principle
The precautionary principle that people, including Nassim Nicholas Taleb, love and treat as some form of wisdom, is actually just a justification for arbitrary acts.
In a given situation for which there's no sufficient knowledge, either A or B can be seen as risky or precautionary measures, there's no way to know except if you have sufficient knowledge.
Someone could reply saying, for example, that the known risk of A is tolerable to the unknown, probably magnitudes bigger, risk of B. Unless you know better or at least have a logical explanation for the risks of B (a thing "scientists" don't have because they notoriously dislike making logical claims), in which case you do know something and is not invoking the precautionary principle anymore, just relying on your logical reasoning – and that can be discussed and questioned by others, undermining your intended usage of the label "precautionary principle" as a magic cover for your actions.
-
@ e3ba5e1a:5e433365
2025-01-13 16:47:27My blog posts and reading material have both been on a decidedly economics-heavy slant recently. The topic today, incentives, squarely falls into the category of economics. However, when I say economics, I’m not talking about “analyzing supply and demand curves.” I’m talking about the true basis of economics: understanding how human beings make decisions in a world of scarcity.
A fair definition of incentive is “a reward or punishment that motivates behavior to achieve a desired outcome.” When most people think about economic incentives, they’re thinking of money. If I offer my son $5 if he washes the dishes, I’m incentivizing certain behavior. We can’t guarantee that he’ll do what I want him to do, but we can agree that the incentive structure itself will guide and ultimately determine what outcome will occur.
The great thing about monetary incentives is how easy they are to talk about and compare. “Would I rather make $5 washing the dishes or $10 cleaning the gutters?” But much of the world is incentivized in non-monetary ways too. For example, using the “punishment” half of the definition above, I might threaten my son with losing Nintendo Switch access if he doesn’t wash the dishes. No money is involved, but I’m still incentivizing behavior.
And there are plenty of incentives beyond our direct control! My son is also incentivized to not wash dishes because it’s boring, or because he has some friends over that he wants to hang out with, or dozens of other things. Ultimately, the conflicting array of different incentive structures placed on him will ultimately determine what actions he chooses to take.
Why incentives matter
A phrase I see often in discussions—whether they are political, parenting, economic, or business—is “if they could just do…” Each time I see that phrase, I cringe a bit internally. Usually, the underlying assumption of the statement is “if people would behave contrary to their incentivized behavior then things would be better.” For example:
- If my kids would just go to bed when I tell them, they wouldn’t be so cranky in the morning.
- If people would just use the recycling bin, we wouldn’t have such a landfill problem.
- If people would just stop being lazy, our team would deliver our project on time.
In all these cases, the speakers are seemingly flummoxed as to why the people in question don’t behave more rationally. The problem is: each group is behaving perfectly rationally.
- The kids have a high time preference, and care more about the joy of staying up now than the crankiness in the morning. Plus, they don’t really suffer the consequences of morning crankiness, their parents do.
- No individual suffers much from their individual contribution to a landfill. If they stopped growing the size of the landfill, it would make an insignificant difference versus the amount of effort they need to engage in to properly recycle.
- If a team doesn’t properly account for the productivity of individuals on a project, each individual receives less harm from their own inaction. Sure, the project may be delayed, company revenue may be down, and they may even risk losing their job when the company goes out of business. But their laziness individually won’t determine the entirety of that outcome. By contrast, they greatly benefit from being lazy by getting to relax at work, go on social media, read a book, or do whatever else they do when they’re supposed to be working.
My point here is that, as long as you ignore the reality of how incentives drive human behavior, you’ll fail at getting the outcomes you want.
If everything I wrote up until now made perfect sense, you understand the premise of this blog post. The rest of it will focus on a bunch of real-world examples to hammer home the point, and demonstrate how versatile this mental model is.
Running a company
Let’s say I run my own company, with myself as the only employee. My personal revenue will be 100% determined by my own actions. If I decide to take Tuesday afternoon off and go fishing, I’ve chosen to lose that afternoon’s revenue. Implicitly, I’ve decided that the enjoyment I get from an afternoon of fishing is greater than the potential revenue. You may think I’m being lazy, but it’s my decision to make. In this situation, the incentive–money–is perfectly aligned with my actions.
Compare this to a typical company/employee relationship. I might have a bank of Paid Time Off (PTO) days, in which case once again my incentives are relatively aligned. I know that I can take off 15 days throughout the year, and I’ve chosen to use half a day for the fishing trip. All is still good.
What about unlimited time off? Suddenly incentives are starting to misalign. I don’t directly pay a price for not showing up to work on Tuesday. Or Wednesday as well, for that matter. I might ultimately be fired for not doing my job, but that will take longer to work its way through the system than simply not making any money for the day taken off.
Compensation overall falls into this misaligned incentive structure. Let’s forget about taking time off. Instead, I work full time on a software project I’m assigned. But instead of using the normal toolchain we’re all used to at work, I play around with a new programming language. I get the fun and joy of playing with new technology, and potentially get to pad my resume a bit when I’m ready to look for a new job. But my current company gets slower results, less productivity, and is forced to subsidize my extracurricular learning.
When a CEO has a bonus structure based on profitability, he’ll do everything he can to make the company profitable. This might include things that actually benefit the company, like improving product quality, reducing internal red tape, or finding cheaper vendors. But it might also include destructive practices, like slashing the R\&D budget to show massive profits this year, in exchange for a catastrophe next year when the next version of the product fails to ship.
Or my favorite example. My parents owned a business when I was growing up. They had a back office where they ran operations like accounting. All of the furniture was old couches from our house. After all, any money they spent on furniture came right out of their paychecks! But in a large corporate environment, each department is generally given a budget for office furniture, a budget which doesn’t roll over year-to-year. The result? Executives make sure to spend the entire budget each year, often buying furniture far more expensive than they would choose if it was their own money.
There are plenty of details you can quibble with above. It’s in a company’s best interest to give people downtime so that they can come back recharged. Having good ergonomic furniture can in fact increase productivity in excess of the money spent on it. But overall, the picture is pretty clear: in large corporate structures, you’re guaranteed to have mismatches between the company’s goals and the incentive structure placed on individuals.
Using our model from above, we can lament how lazy, greedy, and unethical the employees are for doing what they’re incentivized to do instead of what’s right. But that’s simply ignoring the reality of human nature.
Moral hazard
Moral hazard is a situation where one party is incentivized to take on more risk because another party will bear the consequences. Suppose I tell my son when he turns 21 (or whatever legal gambling age is) that I’ll cover all his losses for a day at the casino, but he gets to keep all the winnings.
What do you think he’s going to do? The most logical course of action is to place the largest possible bets for as long as possible, asking me to cover each time he loses, and taking money off the table and into his bank account each time he wins.
But let’s look at a slightly more nuanced example. I go to a bathroom in the mall. As I’m leaving, I wash my hands. It will take me an extra 1 second to turn off the water when I’m done washing. That’s a trivial price to pay. If I don’t turn off the water, the mall will have to pay for many liters of wasted water, benefiting no one. But I won’t suffer any consequences at all.
This is also a moral hazard, but most people will still turn off the water. Why? Usually due to some combination of other reasons such as:
- We’re so habituated to turning off the water that we don’t even consider not turning it off. Put differently, the mental effort needed to not turn off the water is more expensive than the 1 second of time to turn it off.
- Many of us have been brought up with a deep guilt about wasting resources like water. We have an internal incentive structure that makes the 1 second to turn off the water much less costly than the mental anguish of the waste we created.
- We’re afraid we’ll be caught by someone else and face some kind of social repercussions. (Or maybe more than social. Are you sure there isn’t a law against leaving the water tap on?)
Even with all that in place, you may notice that many public bathrooms use automatic water dispensers. Sure, there’s a sanitation reason for that, but it’s also to avoid this moral hazard.
A common denominator in both of these is that the person taking the action that causes the liability (either the gambling or leaving the water on) is not the person who bears the responsibility for that liability (the father or the mall owner). Generally speaking, the closer together the person making the decision and the person incurring the liability are, the smaller the moral hazard.
It’s easy to demonstrate that by extending the casino example a bit. I said it was the father who was covering the losses of the gambler. Many children (though not all) would want to avoid totally bankrupting their parents, or at least financially hurting them. Instead, imagine that someone from the IRS shows up at your door, hands you a credit card, and tells you you can use it at a casino all day, taking home all the chips you want. The money is coming from the government. How many people would put any restriction on how much they spend?
And since we’re talking about the government already…
Government moral hazards
As I was preparing to write this blog post, the California wildfires hit. The discussions around those wildfires gave a huge number of examples of moral hazards. I decided to cherry-pick a few for this post.
The first and most obvious one: California is asking for disaster relief funds from the federal government. That sounds wonderful. These fires were a natural disaster, so why shouldn’t the federal government pitch in and help take care of people?
The problem is, once again, a moral hazard. In the case of the wildfires, California and Los Angeles both had ample actions they could have taken to mitigate the destruction of this fire: better forest management, larger fire department, keeping the water reservoirs filled, and probably much more that hasn’t come to light yet.
If the federal government bails out California, it will be a clear message for the future: your mistakes will be fixed by others. You know what kind of behavior that incentivizes? More risky behavior! Why spend state funds on forest management and extra firefighters—activities that don’t win politicians a lot of votes in general—when you could instead spend it on a football stadium, higher unemployment payments, or anything else, and then let the feds cover the cost of screw-ups.
You may notice that this is virtually identical to the 2008 “too big to fail” bail-outs. Wall Street took insanely risky behavior, reaped huge profits for years, and when they eventually got caught with their pants down, the rest of us bailed them out. “Privatizing profits, socializing losses.”
And here’s the absolute best part of this: I can’t even truly blame either California or Wall Street. (I mean, I do blame them, I think their behavior is reprehensible, but you’ll see what I mean.) In a world where the rules of the game implicitly include the bail-out mentality, you would be harming your citizens/shareholders/investors if you didn’t engage in that risky behavior. Since everyone is on the hook for those socialized losses, your best bet is to maximize those privatized profits.
There’s a lot more to government and moral hazard, but I think these two cases demonstrate the crux pretty solidly. But let’s leave moral hazard behind for a bit and get to general incentivization discussions.
Non-monetary competition
At least 50% of the economics knowledge I have comes from the very first econ course I took in college. That professor was amazing, and had some very colorful stories. I can’t vouch for the veracity of the two I’m about to share, but they definitely drive the point home.
In the 1970s, the US had an oil shortage. To “fix” this problem, they instituted price caps on gasoline, which of course resulted in insufficient gasoline. To “fix” this problem, they instituted policies where, depending on your license plate number, you could only fill up gas on certain days of the week. (Irrelevant detail for our point here, but this just resulted in people filling up their tanks more often, no reduction in gas usage.)
Anyway, my professor’s wife had a friend. My professor described in great detail how attractive this woman was. I’ll skip those details here since this is a PG-rated blog. In any event, she never had any trouble filling up her gas tank any day of the week. She would drive up, be told she couldn’t fill up gas today, bat her eyes at the attendant, explain how helpless she was, and was always allowed to fill up gas.
This is a demonstration of non-monetary compensation. Most of the time in a free market, capitalist economy, people are compensated through money. When price caps come into play, there’s a limit to how much monetary compensation someone can receive. And in that case, people find other ways of competing. Like this woman’s case: through using flirtatious behavior to compensate the gas station workers to let her cheat the rules.
The other example was much more insidious. Santa Monica had a problem: it was predominantly wealthy and white. They wanted to fix this problem, and decided to put in place rent controls. After some time, they discovered that Santa Monica had become wealthier and whiter, the exact opposite of their desired outcome. Why would that happen?
Someone investigated, and ended up interviewing a landlady that demonstrated the reason. She was an older white woman, and admittedly racist. Prior to the rent controls, she would list her apartments in the newspaper, and would be legally obligated to rent to anyone who could afford it. Once rent controls were in place, she took a different tact. She knew that she would only get a certain amount for the apartment, and that the demand for apartments was higher than the supply. That meant she could be picky.
She ended up finding tenants through friends-of-friends. Since it wasn’t an official advertisement, she wasn’t legally required to rent it out if someone could afford to pay. Instead, she got to interview people individually and then make them an offer. Normally, that would have resulted in receiving a lower rental price, but not under rent controls.
So who did she choose? A young, unmarried, wealthy, white woman. It made perfect sense. Women were less intimidating and more likely to maintain the apartment better. Wealthy people, she determined, would be better tenants. (I have no idea if this is true in practice or not, I’m not a landlord myself.) Unmarried, because no kids running around meant less damage to the property. And, of course, white. Because she was racist, and her incentive structure made her prefer whites.
You can deride her for being racist, I won’t disagree with you. But it’s simply the reality. Under the non-rent-control scenario, her profit motive for money outweighed her racism motive. But under rent control, the monetary competition was removed, and she was free to play into her racist tendencies without facing any negative consequences.
Bureaucracy
These were the two examples I remember for that course. But non-monetary compensation pops up in many more places. One highly pertinent example is bureaucracies. Imagine you have a government office, or a large corporation’s acquisition department, or the team that apportions grants at a university. In all these cases, you have a group of people making decisions about handing out money that has no monetary impact on them. If they give to the best qualified recipients, they receive no raises. If they spend the money recklessly on frivolous projects, they face no consequences.
Under such an incentivization scheme, there’s little to encourage the bureaucrats to make intelligent funding decisions. Instead, they’ll be incentivized to spend the money where they recognize non-monetary benefits. This is why it’s so common to hear about expensive meals, gift bags at conferences, and even more inappropriate ways of trying to curry favor with those that hold the purse strings.
Compare that ever so briefly with the purchases made by a small mom-and-pop store like my parents owned. Could my dad take a bribe to buy from a vendor who’s ripping him off? Absolutely he could! But he’d lose more on the deal than he’d make on the bribe, since he’s directly incentivized by the deal itself. It would make much more sense for him to go with the better vendor, save $5,000 on the deal, and then treat himself to a lavish $400 meal to celebrate.
Government incentivized behavior
This post is getting longer in the tooth than I’d intended, so I’ll finish off with this section and make it a bit briefer. Beyond all the methods mentioned above, government has another mechanism for modifying behavior: through directly changing incentives via legislation, regulation, and monetary policy. Let’s see some examples:
- Artificial modification of interest rates encourages people to take on more debt than they would in a free capital market, leading to malinvestment and a consumer debt crisis, and causing the boom-bust cycle we all painfully experience.
- Going along with that, giving tax breaks on interest payments further artificially incentivizes people to take on debt that they wouldn’t otherwise.
- During COVID-19, at some points unemployment benefits were greater than minimum wage, incentivizing people to rather stay home and not work than get a job, leading to reduced overall productivity in the economy and more printed dollars for benefits. In other words, it was a perfect recipe for inflation.
- The tax code gives deductions to “help” people. That might be true, but the real impact is incentivizing people to make decisions they wouldn’t have otherwise. For example, giving out tax deductions on children encourages having more kids. Tax deductions on childcare and preschools incentivizes dual-income households. Whether or not you like the outcomes, it’s clear that it’s government that’s encouraging these outcomes to happen.
- Tax incentives cause people to engage in behavior they wouldn’t otherwise (daycare+working mother, for example).
- Inflation means that the value of your money goes down over time, which encourages people to spend more today, when their money has a larger impact. (Milton Friedman described this as high living.)
Conclusion
The idea here is simple, and fully encapsulated in the title: incentives determine outcomes. If you want to know how to get a certain outcome from others, incentivize them to want that to happen. If you want to understand why people act in seemingly irrational ways, check their incentives. If you’re confused why leaders (and especially politicians) seem to engage in destructive behavior, check their incentives.
We can bemoan these realities all we want, but they are realities. While there are some people who have a solid internal moral and ethical code, and that internal code incentivizes them to behave against their externally-incentivized interests, those people are rare. And frankly, those people are self-defeating. People should take advantage of the incentives around them. Because if they don’t, someone else will.
(If you want a literary example of that last comment, see the horse in Animal Farm.)
How do we improve the world under these conditions? Make sure the incentives align well with the overall goals of society. To me, it’s a simple formula:
- Focus on free trade, value for value, as the basis of a society. In that system, people are always incentivized to provide value to other people.
- Reduce the size of bureaucracies and large groups of all kinds. The larger an organization becomes, the farther the consequences of decisions are from those who make them.
- And since the nature of human beings will be to try and create areas where they can control the incentive systems to their own benefits, make that as difficult as possible. That comes in the form of strict limits on government power, for example.
And even if you don’t want to buy in to this conclusion, I hope the rest of the content was educational, and maybe a bit entertaining!
-
@ 6be5cc06:5259daf0
2025-01-21 23:17:29A seguir, veja como instalar e configurar o Privoxy no Pop!_OS.
1. Instalar o Tor e o Privoxy
Abra o terminal e execute:
bash sudo apt update sudo apt install tor privoxy
Explicação:
- Tor: Roteia o tráfego pela rede Tor.
- Privoxy: Proxy avançado que intermedia a conexão entre aplicativos e o Tor.
2. Configurar o Privoxy
Abra o arquivo de configuração do Privoxy:
bash sudo nano /etc/privoxy/config
Navegue até a última linha (atalho:
Ctrl
+/
depoisCtrl
+V
para navegar diretamente até a última linha) e insira:bash forward-socks5 / 127.0.0.1:9050 .
Isso faz com que o Privoxy envie todo o tráfego para o Tor através da porta 9050.
Salve (
CTRL
+O
eEnter
) e feche (CTRL
+X
) o arquivo.
3. Iniciar o Tor e o Privoxy
Agora, inicie e habilite os serviços:
bash sudo systemctl start tor sudo systemctl start privoxy sudo systemctl enable tor sudo systemctl enable privoxy
Explicação:
- start: Inicia os serviços.
- enable: Faz com que iniciem automaticamente ao ligar o PC.
4. Configurar o Navegador Firefox
Para usar a rede Tor com o Firefox:
- Abra o Firefox.
- Acesse Configurações → Configurar conexão.
- Selecione Configuração manual de proxy.
- Configure assim:
- Proxy HTTP:
127.0.0.1
- Porta:
8118
(porta padrão do Privoxy) - Domínio SOCKS (v5):
127.0.0.1
- Porta:
9050
- Proxy HTTP:
- Marque a opção "Usar este proxy também em HTTPS".
- Clique em OK.
5. Verificar a Conexão com o Tor
Abra o navegador e acesse:
text https://check.torproject.org/
Se aparecer a mensagem "Congratulations. This browser is configured to use Tor.", a configuração está correta.
Dicas Extras
- Privoxy pode ser ajustado para bloquear anúncios e rastreadores.
- Outros aplicativos também podem ser configurados para usar o Privoxy.
-
@ eff2631b:4732bd7e
2025-02-01 11:40:14This is a test. Trying to use Obsidian for everything. Nostr works out of the box? First try failed, this is my second try.
-
@ eff2631b:4732bd7e
2025-02-01 11:28:43This is a test. Trying to use Obsidian for everything. Nostr works out of the box?
-
@ 3f770d65:7a745b24
2025-01-12 21:03:36I’ve been using Notedeck for several months, starting with its extremely early and experimental alpha versions, all the way to its current, more stable alpha releases. The journey has been fascinating, as I’ve had the privilege of watching it evolve from a concept into a functional and promising tool.
In its earliest stages, Notedeck was raw—offering glimpses of its potential but still far from practical for daily use. Even then, the vision behind it was clear: a platform designed to redefine how we interact with Nostr by offering flexibility and power for all users.
I'm very bullish on Notedeck. Why? Because Will Casarin is making it! Duh! 😂
Seriously though, if we’re reimagining the web and rebuilding portions of the Internet, it’s important to recognize the potential of Notedeck. If Nostr is reimagining the web, then Notedeck is reimagining the Nostr client.
Notedeck isn’t just another Nostr app—it’s more a Nostr browser that functions more like an operating system with micro-apps. How cool is that?
Much like how Google's Chrome evolved from being a web browser with a task manager into ChromeOS, a full blown operating system, Notedeck aims to transform how we interact with the Nostr. It goes beyond individual apps, offering a foundation for a fully integrated ecosystem built around Nostr.
As a Nostr evangelist, I love to scream INTEROPERABILITY and tout every application's integrations. Well, Notedeck has the potential to be one of the best platforms to showcase these integrations in entirely new and exciting ways.
Do you want an Olas feed of images? Add the media column.
Do you want a feed of live video events? Add the zap.stream column.
Do you want Nostr Nests or audio chats? Add that column to your Notedeck.
Git? Email? Books? Chat and DMs? It's all possible.
Not everyone wants a super app though, and that’s okay. As with most things in the Nostr ecosystem, flexibility is key. Notedeck gives users the freedom to choose how they engage with it—whether it’s simply following hashtags or managing straightforward feeds. You'll be able to tailor Notedeck to fit your needs, using it as extensively or minimally as you prefer.
Notedeck is designed with a local-first approach, utilizing Nostr content stored directly on your device via the local nostrdb. This will enable a plethora of advanced tools such as search and filtering, the creation of custom feeds, and the ability to develop personalized algorithms across multiple Notedeck micro-applications—all with unparalleled flexibility.
Notedeck also supports multicast. Let's geek out for a second. Multicast is a method of communication where data is sent from one source to multiple destinations simultaneously, but only to devices that wish to receive the data. Unlike broadcast, which sends data to all devices on a network, multicast targets specific receivers, reducing network traffic. This is commonly used for efficient data distribution in scenarios like streaming, conferencing, or large-scale data synchronization between devices.
In a local first world where each device holds local copies of your nostr nodes, and each device transparently syncs with each other on the local network, each node becomes a backup. Your data becomes antifragile automatically. When a node goes down it can resync and recover from other nodes. Even if not all nodes have a complete collection, negentropy can pull down only what is needed from each device. All this can be done without internet.
-Will Casarin
In the context of Notedeck, multicast would allow multiple devices to sync their Nostr nodes with each other over a local network without needing an internet connection. Wild.
Notedeck aims to offer full customization too, including the ability to design and share custom skins, much like Winamp. Users will also be able to create personalized columns and, in the future, share their setups with others. This opens the door for power users to craft tailored Nostr experiences, leveraging their expertise in the protocol and applications. By sharing these configurations as "Starter Decks," they can simplify onboarding and showcase the best of Nostr’s ecosystem.
Nostr’s “Other Stuff” can often be difficult to discover, use, or understand. Many users doesn't understand or know how to use web browser extensions to login to applications. Let's not even get started with nsecbunkers. Notedeck will address this challenge by providing a native experience that brings these lesser-known applications, tools, and content into a user-friendly and accessible interface, making exploration seamless. However, that doesn't mean Notedeck should disregard power users that want to use nsecbunkers though - hint hint.
For anyone interested in watching Nostr be developed live, right before your very eyes, Notedeck’s progress serves as a reminder of what’s possible when innovation meets dedication. The current alpha is already demonstrating its ability to handle complex use cases, and I’m excited to see how it continues to grow as it moves toward a full release later this year.
-
@ 16d11430:61640947
2025-01-21 20:40:22In a world drowning in Monopoly money, where people celebrate government-mandated inflation as "economic growth," it takes a special kind of clarity—nay, cynicism—to rise above the fiat circus. This is your guide to shedding your fiat f**ks and embracing the serene chaos of sound money, all while laughing at the absurdity of a world gone fiat-mad.
- Don’t Feed the Clowns
You know the clowns I’m talking about: central bankers in their tailored suits and smug smirks, wielding "tools" like interest rates and quantitative easing. Their tools are as real as a magician's wand, conjuring trillions of dollars out of thin air to keep their Ponzi economy afloat.
Rule #1: Don’t engage. If a clown offers you a hot take about the "strength of the dollar," smile, nod, and silently wonder how many cups of coffee their paycheck buys this month. Spoiler: fewer than last month.
- Turn Off the Fiat News
Do you really need another breathless headline about the next trillion-dollar deficit? Or the latest clickbait on why you should care about the stock market's emotional rollercoaster? Mainstream media exists to distract you, to keep you tethered to their illusion of importance.
Turn it off. Replace it with something sound, like the Bitcoin whitepaper. Or Nietzsche. At least Nietzsche knew we were doomed.
- Mock Their Inflationary Gospel
Fiat apologists will tell you that inflation is "necessary" and that 2% a year is a "healthy target." Sure, because a little robbery every year keeps society functioning, right? Ask them this: "If 2% is healthy, why not 20%? Why not 200%? Why not Venezuela?"
Fiat logic is like a bad acid trip: entertaining at first, but it quickly spirals into existential horror.
- Celebrate the Fiat Freakshow
Sometimes, the best way to resist the fiat clown show is to revel in its absurdity. Watch politicians print money like teenagers running up a credit card bill at Hot Topic, then watch the economists applaud it as "stimulus." It’s performance art, really. Andy Warhol could never.
- Build in the Chaos
While the fiat world burns, Bitcoiners build. This is the ultimate "not giving a fiat f**k" move: creating a parallel economy, one satoshi at a time. Run your Lightning node, stack sats, and laugh as the fiat circus consumes itself in a flaming pile of its own debt.
Let them argue about who gets to rearrange the deck chairs on the Titanic. You’re busy designing lifeboats.
- Adopt a Fiat-Free Lifestyle
Fiat-free living means minimizing your entanglement with their clown currency. Buy meat, not ETFs. Trade skills, not IOUs. Tip your barber in Bitcoin and ask if your landlord accepts Lightning. If they say no, chuckle and say, “You’ll learn soon enough.”
Every satoshi spent in the real economy is a slap in the face to the fiat overlords.
- Find the Humor in Collapse
Here’s the thing: the fiat system is unsustainable. You know it, I know it, even the clowns know it. The whole charade is destined to collapse under its own weight. When it does, find solace in the absurdity of it all.
Imagine the central bankers explaining hyperinflation to the public: "Turns out we can't print infinity after all." Pure comedy gold.
- Stay Ruthlessly Optimistic
Despite the doom and gloom, there’s hope. Bitcoin is hope. It’s the lifeboat for humanity, the cheat code to escape the fiat matrix. Cynicism doesn’t mean nihilism; it means seeing the rot for what it is and choosing to build something better.
So, don’t just reject the fiat clown show—replace it. Create a world where money is sound, transactions are sovereign, and wealth is measured in energy, not debt.
Final Thought: Burn the Tent Down
Aldous Huxley once envisioned a dystopia where people are so distracted by their own hedonistic consumption that they don’t realize they’re enslaved. Sound familiar? The fiat clown show is Brave New World on steroids, a spectacle designed to keep you pacified while your wealth evaporates.
But here’s the punchline: they can only enslave you if you care. By rejecting their system, you strip them of their power. So let them juggle their debts, inflate their bubbles, and print their trillions. You’ve got Bitcoin, and Bitcoin doesn’t give a fiat f**k.
Welcome to the satirical resistance. Now go stack some sats.
-
@ d9e9fb27:d5fe5e1a
2025-01-02 16:31:34Colmar is a well known city in the region of Alsace, France. Its characteristic buildings, the narrow streets and the small river flowing through are worldwide famous.
However, it is during Christmas that the city gets the most attention. Thousands of people from all over Europe decide to spend one of the Advent weekends to wander around this beautiful city and hundreds of little wooden huts.
In fact, this town becomes a small Christmas village, with decorations and lights on every building and the famous Christmas market covering every possible inch of it.
Walking around this city really makes you feel the Christmas Spirit!
Of course, it can get really cold during this time of the year. That is why Alsatians wander around drinking the Vin Chaud (literally "Hot Wine"). This beverage is prepared by mixing sugar, various spices, such as cinnamon and cloves, and red wine. They are served in a plastic glass, which can be reused multpiple time or returned for a couple of Euros. However, every year the glass is designed differently, so many people keep it with them as a collectible!
Here is 2024 version:
This is the first time I try to do a photography reportage of the places I visit. I really hope you enjoyed it!Let me know what you think, every feedback is appreciated.
I will try to create more of them during my trips, so stay tuned!
Tuma
-
@ 3f770d65:7a745b24
2024-12-31 17:03:46Here are my predictions for Nostr in 2025:
Decentralization: The outbox and inbox communication models, sometimes referred to as the Gossip model, will become the standard across the ecosystem. By the end of 2025, all major clients will support these models, providing seamless communication and enhanced decentralization. Clients that do not adopt outbox/inbox by then will be regarded as outdated or legacy systems.
Privacy Standards: Major clients such as Damus and Primal will move away from NIP-04 DMs, adopting more secure protocol possibilities like NIP-17 or NIP-104. These upgrades will ensure enhanced encryption and metadata protection. Additionally, NIP-104 MLS tools will drive the development of new clients and features, providing users with unprecedented control over the privacy of their communications.
Interoperability: Nostr's ecosystem will become even more interconnected. Platforms like the Olas image-sharing service will expand into prominent clients such as Primal, Damus, Coracle, and Snort, alongside existing integrations with Amethyst, Nostur, and Nostrudel. Similarly, audio and video tools like Nostr Nests and Zap.stream will gain seamless integration into major clients, enabling easy participation in live events across the ecosystem.
Adoption and Migration: Inspired by early pioneers like Fountain and Orange Pill App, more platforms will adopt Nostr for authentication, login, and social systems. In 2025, a significant migration from a high-profile application platform with hundreds of thousands of users will transpire, doubling Nostr’s daily activity and establishing it as a cornerstone of decentralized technologies.
-
@ 9e69e420:d12360c2
2025-01-21 19:31:48Oregano oil is a potent natural compound that offers numerous scientifically-supported health benefits.
Active Compounds
The oil's therapeutic properties stem from its key bioactive components: - Carvacrol and thymol (primary active compounds) - Polyphenols and other antioxidant
Antimicrobial Properties
Bacterial Protection The oil demonstrates powerful antibacterial effects, even against antibiotic-resistant strains like MRSA and other harmful bacteria. Studies show it effectively inactivates various pathogenic bacteria without developing resistance.
Antifungal Effects It effectively combats fungal infections, particularly Candida-related conditions like oral thrush, athlete's foot, and nail infections.
Digestive Health Benefits
Oregano oil supports digestive wellness by: - Promoting gastric juice secretion and enzyme production - Helping treat Small Intestinal Bacterial Overgrowth (SIBO) - Managing digestive discomfort, bloating, and IBS symptoms
Anti-inflammatory and Antioxidant Effects
The oil provides significant protective benefits through: - Powerful antioxidant activity that fights free radicals - Reduction of inflammatory markers in the body - Protection against oxidative stress-related conditions
Respiratory Support
It aids respiratory health by: - Loosening mucus and phlegm - Suppressing coughs and throat irritation - Supporting overall respiratory tract function
Additional Benefits
Skin Health - Improves conditions like psoriasis, acne, and eczema - Supports wound healing through antibacterial action - Provides anti-aging benefits through antioxidant properties
Cardiovascular Health Studies show oregano oil may help: - Reduce LDL (bad) cholesterol levels - Support overall heart health
Pain Management The oil demonstrates effectiveness in: - Reducing inflammation-related pain - Managing muscle discomfort - Providing topical pain relief
Safety Note
While oregano oil is generally safe, it's highly concentrated and should be properly diluted before use Consult a healthcare provider before starting supplementation, especially if taking other medications.
-
@ a367f9eb:0633efea
2024-12-22 21:35:22I’ll admit that I was wrong about Bitcoin. Perhaps in 2013. Definitely 2017. Probably in 2018-2019. And maybe even today.
Being wrong about Bitcoin is part of finally understanding it. It will test you, make you question everything, and in the words of BTC educator and privacy advocate Matt Odell, “Bitcoin will humble you”.
I’ve had my own stumbles on the way.
In a very public fashion in 2017, after years of using Bitcoin, trying to start a company with it, using it as my primary exchange vehicle between currencies, and generally being annoying about it at parties, I let out the bear.
In an article published in my own literary magazine Devolution Review in September 2017, I had a breaking point. The article was titled “Going Bearish on Bitcoin: Cryptocurrencies are the tulip mania of the 21st century”.
It was later republished in Huffington Post and across dozens of financial and crypto blogs at the time with another, more appropriate title: “Bitcoin Has Become About The Payday, Not Its Potential”.
As I laid out, my newfound bearishness had little to do with the technology itself or the promise of Bitcoin, and more to do with the cynical industry forming around it:
In the beginning, Bitcoin was something of a revolution to me. The digital currency represented everything from my rebellious youth.
It was a decentralized, denationalized, and digital currency operating outside the traditional banking and governmental system. It used tools of cryptography and connected buyers and sellers across national borders at minimal transaction costs.
…
The 21st-century version (of Tulip mania) has welcomed a plethora of slick consultants, hazy schemes dressed up as investor possibilities, and too much wishy-washy language for anything to really make sense to anyone who wants to use a digital currency to make purchases.
While I called out Bitcoin by name at the time, on reflection, I was really talking about the ICO craze, the wishy-washy consultants, and the altcoin ponzis.
What I was articulating — without knowing it — was the frame of NgU, or “numbers go up”. Rather than advocating for Bitcoin because of its uncensorability, proof-of-work, or immutability, the common mentality among newbies and the dollar-obsessed was that Bitcoin mattered because its price was a rocket ship.
And because Bitcoin was gaining in price, affinity tokens and projects that were imperfect forks of Bitcoin took off as well.
The price alone — rather than its qualities — were the reasons why you’d hear Uber drivers, finance bros, or your gym buddy mention Bitcoin. As someone who came to Bitcoin for philosophical reasons, that just sat wrong with me.
Maybe I had too many projects thrown in my face, or maybe I was too frustrated with the UX of Bitcoin apps and sites at the time. No matter what, I’ve since learned something.
I was at least somewhat wrong.
My own journey began in early 2011. One of my favorite radio programs, Free Talk Live, began interviewing guests and having discussions on the potential of Bitcoin. They tied it directly to a libertarian vision of the world: free markets, free people, and free banking. That was me, and I was in. Bitcoin was at about $5 back then (NgU).
I followed every article I could, talked about it with guests on my college radio show, and became a devoted redditor on r/Bitcoin. At that time, at least to my knowledge, there was no possible way to buy Bitcoin where I was living. Very weak.
I was probably wrong. And very wrong for not trying to acquire by mining or otherwise.
The next year, after moving to Florida, Bitcoin was a heavy topic with a friend of mine who shared the same vision (and still does, according to the Celsius bankruptcy documents). We talked about it with passionate leftists at Occupy Tampa in 2012, all the while trying to explain the ills of Keynesian central banking, and figuring out how to use Coinbase.
I began writing more about Bitcoin in 2013, writing a guide on “How to Avoid Bank Fees Using Bitcoin,” discussing its potential legalization in Germany, and interviewing Jeremy Hansen, one of the first political candidates in the U.S. to accept Bitcoin donations.
Even up until that point, I thought Bitcoin was an interesting protocol for sending and receiving money quickly, and converting it into fiat. The global connectedness of it, plus this cypherpunk mentality divorced from government control was both useful and attractive. I thought it was the perfect go-between.
But I was wrong.
When I gave my first public speech on Bitcoin in Vienna, Austria in December 2013, I had grown obsessed with Bitcoin’s adoption on dark net markets like Silk Road.
My theory, at the time, was the number and price were irrelevant. The tech was interesting, and a novel attempt. It was unlike anything before. But what was happening on the dark net markets, which I viewed as the true free market powered by Bitcoin, was even more interesting. I thought these markets would grow exponentially and anonymous commerce via BTC would become the norm.
While the price was irrelevant, it was all about buying and selling goods without permission or license.
Now I understand I was wrong.
Just because Bitcoin was this revolutionary technology that embraced pseudonymity did not mean that all commerce would decentralize as well. It did not mean that anonymous markets were intended to be the most powerful layer in the Bitcoin stack.
What I did not even anticipate is something articulated very well by noted Bitcoin OG Pierre Rochard: Bitcoin as a savings technology.
The ability to maintain long-term savings, practice self-discipline while stacking stats, and embrace a low-time preference was just not something on the mind of the Bitcoiners I knew at the time.
Perhaps I was reading into the hype while outwardly opposing it. Or perhaps I wasn’t humble enough to understand the true value proposition that many of us have learned years later.
In the years that followed, I bought and sold more times than I can count, and I did everything to integrate it into passion projects. I tried to set up a company using Bitcoin while at my university in Prague.
My business model depended on university students being technologically advanced enough to have a mobile wallet, own their keys, and be able to make transactions on a consistent basis. Even though I was surrounded by philosophically aligned people, those who would advance that to actually put Bitcoin into practice were sparse.
This is what led me to proclaim that “Technological Literacy is Doomed” in 2016.
And I was wrong again.
Indeed, since that time, the UX of Bitcoin-only applications, wallets, and supporting tech has vastly improved and onboarded millions more people than anyone thought possible. The entrepreneurship, coding excellence, and vision offered by Bitcoiners of all stripes have renewed a sense in me that this project is something built for us all — friends and enemies alike.
While many of us were likely distracted by flashy and pumpy altcoins over the years (me too, champs), most of us have returned to the Bitcoin stable.
Fast forward to today, there are entire ecosystems of creators, activists, and developers who are wholly reliant on the magic of Bitcoin’s protocol for their life and livelihood. The options are endless. The FUD is still present, but real proof of work stands powerfully against those forces.
In addition, there are now dozens of ways to use Bitcoin privately — still without custodians or intermediaries — that make it one of the most important assets for global humanity, especially in dictatorships.
This is all toward a positive arc of innovation, freedom, and pure independence. Did I see that coming? Absolutely not.
Of course, there are probably other shots you’ve missed on Bitcoin. Price predictions (ouch), the short-term inflation hedge, or the amount of institutional investment. While all of these may be erroneous predictions in the short term, we have to realize that Bitcoin is a long arc. It will outlive all of us on the planet, and it will continue in its present form for the next generation.
Being wrong about the evolution of Bitcoin is no fault, and is indeed part of the learning curve to finally understanding it all.
When your family or friends ask you about Bitcoin after your endless sessions explaining market dynamics, nodes, how mining works, and the genius of cryptographic signatures, try to accept that there is still so much we have to learn about this decentralized digital cash.
There are still some things you’ve gotten wrong about Bitcoin, and plenty more you’ll underestimate or get wrong in the future. That’s what makes it a beautiful journey. It’s a long road, but one that remains worth it.
-
@ edeb837b:ac664163
2025-02-01 10:51:33In today’s fast-paced financial markets, having quick access to real-time data, trade insights, and the ability to share trades with a like-minded community is invaluable. That’s where NVSTly’s Discord bot comes in. It’s more than just a bot — it’s a powerful tool for social trading, designed to help traders and investors track their trades, share insights, and collaborate with others in real-time, all within Discord.
What the NVSTly Discord Bot Does
NVSTly’s Discord bot is built with the goal of making financial data and trading insights easily accessible to the entire trading community on Discord. Whether you’re a seasoned trader or just starting, the bot helps you stay on top of your trades and market trends. Some of the key features of the bot include:
- Real-Time Trade Tracking & Sharing: The bot tracks your trades and allows you to share them with others. Whether you’re trading stocks, options, forex, or cryptocurrencies, your trades are instantly shared with your followers and can be posted to social media or sent through Discord DMs or webhooks, fostering a transparent and collaborative environment.
- Trader Stats & Performance Recaps: The bot generates visual reports of your trading performance, including win rates, total gains, and individual trade stats. You can view a trader’s daily, weekly, or monthly recaps, complete with details on stock tickers, options info, and profit/loss calculations.
- Market Data & Charts: Get instant access to live market data, stock charts, and detailed information on tickers. The bot provides a variety of commands for stock price movements, charts, and other data, with plans to expand this to cover more markets in the future.
- Comprehensive Coverage: The bot currently supports stocks, options, forex, and crypto for trade tracking and sharing. Futures markets are also planned for the future. While the bot supports these markets for trade tracking, data-related features like market sentiment analysis or earnings reports will be available in the future.
How the Bot Integrates with NVSTly’s Social Trading App
The NVSTly Discord bot is fully integrated with the NVSTly social trading app, creating a seamless experience for users across platforms. Traders can track their trades on the app, and the bot will automatically share those trades directly with their followers, via DMs, social media, or webhooks. This integration means that everything you do on the NVSTly app can be easily shared with your community in real-time via Discord, making it simple to stay connected with your trading network.
The bot doesn’t just show trades — it also gives users insights into their trading performance and connects them with other traders for discussions, tips, and strategies. With NVSTly’s unique social features, traders can collaborate, share strategies, and learn from each other in a dynamic and interactive environment.
What’s Next for the NVSTly Discord Bot?
The future of the NVSTly Discord bot is incredibly exciting, with plans to add even more features designed to elevate the trading experience. Some of the upcoming features include:
- Expanded Market Coverage for Data Commands: In addition to stocks, the bot will soon offer data-related commands for crypto, forex, and futures markets. This will allow users to access even more comprehensive market data, including earnings reports, options flow, and more.
- AI & Machine Learning Integration: NVSTly plans to integrate AI and machine learning to generate trade signals, analyze market trends, and even offer personalized trading tips. This will help traders refine their strategies and make more informed decisions.
- Real-Time Alerts & Notifications: Users can already receive trade alerts sent directly to their DMs from traders they follow. In the future, users will also be able to set more customized alerts based on price targets or specific market activity.
Why the NVSTly Discord Bot is Perfect for Trading Communities
Discord has become a hub for traders and investors, and the NVSTly Discord bot takes full advantage of this by providing a platform where traders can interact, share trades, and learn from one another. The bot’s ability to instantly share trade recaps and stats creates an environment of transparency and collaboration. Traders can discuss strategies, ask questions, and even challenge each other to improve their performance.
By integrating market data, charts, and trade performance tracking, the bot offers a complete package for traders on Discord. It’s not just a tool for sharing trades — it’s a vital part of a thriving trading community.
Why NVSTly’s Discord Bot is the Fastest Growing Finance Bot on Discord
With its comprehensive features and seamless integration with the NVSTly app, the NVSTly Discord bot has quickly become the go-to tool for traders on Discord. What sets it apart from other finance bots is its focus on user engagement. The bot is not just about providing data — it’s about building a community of traders who can share their experiences, insights, and successes.
Traders have flocked to the NVSTly Discord bot because it provides real-time data, easy trade tracking, and powerful analytics — all in a user-friendly format. It’s no wonder it’s quickly becoming the fastest-growing finance bot on Discord.
On Track to be the Greatest Finance Bot on Discord
NVSTly is on track to become the greatest finance bot on Discord, if it’s not already. With plans for expanding market coverage, adding advanced AI-driven features, and constantly improving its user experience, the bot is poised to revolutionize the way traders use Discord.
By offering a comprehensive set of tools that integrate seamlessly with the NVSTly app, the bot is becoming an essential resource for traders who want to stay informed, track their performance, and engage with the trading community.
NVSTly is available for free on web, mobile devices (iOS & Google Play), and is fully integrated with Discord via a unique bot- the only of it’s kind and available to any server or trading community on Discord. Or feel free to join a community of over 45,000 investors & traders on our Discod server.
-
@ 6be5cc06:5259daf0
2025-01-21 01:51:46Bitcoin: Um sistema de dinheiro eletrônico direto entre pessoas.
Satoshi Nakamoto
satoshin@gmx.com
www.bitcoin.org
Resumo
O Bitcoin é uma forma de dinheiro digital que permite pagamentos diretos entre pessoas, sem a necessidade de um banco ou instituição financeira. Ele resolve um problema chamado gasto duplo, que ocorre quando alguém tenta gastar o mesmo dinheiro duas vezes. Para evitar isso, o Bitcoin usa uma rede descentralizada onde todos trabalham juntos para verificar e registrar as transações.
As transações são registradas em um livro público chamado blockchain, protegido por uma técnica chamada Prova de Trabalho. Essa técnica cria uma cadeia de registros que não pode ser alterada sem refazer todo o trabalho já feito. Essa cadeia é mantida pelos computadores que participam da rede, e a mais longa é considerada a verdadeira.
Enquanto a maior parte do poder computacional da rede for controlada por participantes honestos, o sistema continuará funcionando de forma segura. A rede é flexível, permitindo que qualquer pessoa entre ou saia a qualquer momento, sempre confiando na cadeia mais longa como prova do que aconteceu.
1. Introdução
Hoje, quase todos os pagamentos feitos pela internet dependem de bancos ou empresas como processadores de pagamento (cartões de crédito, por exemplo) para funcionar. Embora esse sistema seja útil, ele tem problemas importantes porque é baseado em confiança.
Primeiro, essas empresas podem reverter pagamentos, o que é útil em caso de erros, mas cria custos e incertezas. Isso faz com que pequenas transações, como pagar centavos por um serviço, se tornem inviáveis. Além disso, os comerciantes são obrigados a desconfiar dos clientes, pedindo informações extras e aceitando fraudes como algo inevitável.
Esses problemas não existem no dinheiro físico, como o papel-moeda, onde o pagamento é final e direto entre as partes. No entanto, não temos como enviar dinheiro físico pela internet sem depender de um intermediário confiável.
O que precisamos é de um sistema de pagamento eletrônico baseado em provas matemáticas, não em confiança. Esse sistema permitiria que qualquer pessoa enviasse dinheiro diretamente para outra, sem depender de bancos ou processadores de pagamento. Além disso, as transações seriam irreversíveis, protegendo vendedores contra fraudes, mas mantendo a possibilidade de soluções para disputas legítimas.
Neste documento, apresentamos o Bitcoin, que resolve o problema do gasto duplo usando uma rede descentralizada. Essa rede cria um registro público e protegido por cálculos matemáticos, que garante a ordem das transações. Enquanto a maior parte da rede for controlada por pessoas honestas, o sistema será seguro contra ataques.
2. Transações
Para entender como funciona o Bitcoin, é importante saber como as transações são realizadas. Imagine que você quer transferir uma "moeda digital" para outra pessoa. No sistema do Bitcoin, essa "moeda" é representada por uma sequência de registros que mostram quem é o atual dono. Para transferi-la, você adiciona um novo registro comprovando que agora ela pertence ao próximo dono. Esse registro é protegido por um tipo especial de assinatura digital.
O que é uma assinatura digital?
Uma assinatura digital é como uma senha secreta, mas muito mais segura. No Bitcoin, cada usuário tem duas chaves: uma "chave privada", que é secreta e serve para criar a assinatura, e uma "chave pública", que pode ser compartilhada com todos e é usada para verificar se a assinatura é válida. Quando você transfere uma moeda, usa sua chave privada para assinar a transação, provando que você é o dono. A próxima pessoa pode usar sua chave pública para confirmar isso.
Como funciona na prática?
Cada "moeda" no Bitcoin é, na verdade, uma cadeia de assinaturas digitais. Vamos imaginar o seguinte cenário:
- A moeda está com o Dono 0 (você). Para transferi-la ao Dono 1, você assina digitalmente a transação com sua chave privada. Essa assinatura inclui o código da transação anterior (chamado de "hash") e a chave pública do Dono 1.
- Quando o Dono 1 quiser transferir a moeda ao Dono 2, ele assinará a transação seguinte com sua própria chave privada, incluindo também o hash da transação anterior e a chave pública do Dono 2.
- Esse processo continua, formando uma "cadeia" de transações. Qualquer pessoa pode verificar essa cadeia para confirmar quem é o atual dono da moeda.
Resolvendo o problema do gasto duplo
Um grande desafio com moedas digitais é o "gasto duplo", que é quando uma mesma moeda é usada em mais de uma transação. Para evitar isso, muitos sistemas antigos dependiam de uma entidade central confiável, como uma casa da moeda, que verificava todas as transações. No entanto, isso criava um ponto único de falha e centralizava o controle do dinheiro.
O Bitcoin resolve esse problema de forma inovadora: ele usa uma rede descentralizada onde todos os participantes (os "nós") têm acesso a um registro completo de todas as transações. Cada nó verifica se as transações são válidas e se a moeda não foi gasta duas vezes. Quando a maioria dos nós concorda com a validade de uma transação, ela é registrada permanentemente na blockchain.
Por que isso é importante?
Essa solução elimina a necessidade de confiar em uma única entidade para gerenciar o dinheiro, permitindo que qualquer pessoa no mundo use o Bitcoin sem precisar de permissão de terceiros. Além disso, ela garante que o sistema seja seguro e resistente a fraudes.
3. Servidor Timestamp
Para assegurar que as transações sejam realizadas de forma segura e transparente, o sistema Bitcoin utiliza algo chamado de "servidor de registro de tempo" (timestamp). Esse servidor funciona como um registro público que organiza as transações em uma ordem específica.
Ele faz isso agrupando várias transações em blocos e criando um código único chamado "hash". Esse hash é como uma impressão digital que representa todo o conteúdo do bloco. O hash de cada bloco é amplamente divulgado, como se fosse publicado em um jornal ou em um fórum público.
Esse processo garante que cada bloco de transações tenha um registro de quando foi criado e que ele existia naquele momento. Além disso, cada novo bloco criado contém o hash do bloco anterior, formando uma cadeia contínua de blocos conectados — conhecida como blockchain.
Com isso, se alguém tentar alterar qualquer informação em um bloco anterior, o hash desse bloco mudará e não corresponderá ao hash armazenado no bloco seguinte. Essa característica torna a cadeia muito segura, pois qualquer tentativa de fraude seria imediatamente detectada.
O sistema de timestamps é essencial para provar a ordem cronológica das transações e garantir que cada uma delas seja única e autêntica. Dessa forma, ele reforça a segurança e a confiança na rede Bitcoin.
4. Prova-de-Trabalho
Para implementar o registro de tempo distribuído no sistema Bitcoin, utilizamos um mecanismo chamado prova-de-trabalho. Esse sistema é semelhante ao Hashcash, desenvolvido por Adam Back, e baseia-se na criação de um código único, o "hash", por meio de um processo computacionalmente exigente.
A prova-de-trabalho envolve encontrar um valor especial que, quando processado junto com as informações do bloco, gere um hash que comece com uma quantidade específica de zeros. Esse valor especial é chamado de "nonce". Encontrar o nonce correto exige um esforço significativo do computador, porque envolve tentativas repetidas até que a condição seja satisfeita.
Esse processo é importante porque torna extremamente difícil alterar qualquer informação registrada em um bloco. Se alguém tentar mudar algo em um bloco, seria necessário refazer o trabalho de computação não apenas para aquele bloco, mas também para todos os blocos que vêm depois dele. Isso garante a segurança e a imutabilidade da blockchain.
A prova-de-trabalho também resolve o problema de decidir qual cadeia de blocos é a válida quando há múltiplas cadeias competindo. A decisão é feita pela cadeia mais longa, pois ela representa o maior esforço computacional já realizado. Isso impede que qualquer indivíduo ou grupo controle a rede, desde que a maioria do poder de processamento seja mantida por participantes honestos.
Para garantir que o sistema permaneça eficiente e equilibrado, a dificuldade da prova-de-trabalho é ajustada automaticamente ao longo do tempo. Se novos blocos estiverem sendo gerados rapidamente, a dificuldade aumenta; se estiverem sendo gerados muito lentamente, a dificuldade diminui. Esse ajuste assegura que novos blocos sejam criados aproximadamente a cada 10 minutos, mantendo o sistema estável e funcional.
5. Rede
A rede Bitcoin é o coração do sistema e funciona de maneira distribuída, conectando vários participantes (ou nós) para garantir o registro e a validação das transações. Os passos para operar essa rede são:
-
Transmissão de Transações: Quando alguém realiza uma nova transação, ela é enviada para todos os nós da rede. Isso é feito para garantir que todos estejam cientes da operação e possam validá-la.
-
Coleta de Transações em Blocos: Cada nó agrupa as novas transações recebidas em um "bloco". Este bloco será preparado para ser adicionado à cadeia de blocos (a blockchain).
-
Prova-de-Trabalho: Os nós competem para resolver a prova-de-trabalho do bloco, utilizando poder computacional para encontrar um hash válido. Esse processo é como resolver um quebra-cabeça matemático difícil.
-
Envio do Bloco Resolvido: Quando um nó encontra a solução para o bloco (a prova-de-trabalho), ele compartilha esse bloco com todos os outros nós na rede.
-
Validação do Bloco: Cada nó verifica o bloco recebido para garantir que todas as transações nele contidas sejam válidas e que nenhuma moeda tenha sido gasta duas vezes. Apenas blocos válidos são aceitos.
-
Construção do Próximo Bloco: Os nós que aceitaram o bloco começam a trabalhar na criação do próximo bloco, utilizando o hash do bloco aceito como base (hash anterior). Isso mantém a continuidade da cadeia.
Resolução de Conflitos e Escolha da Cadeia Mais Longa
Os nós sempre priorizam a cadeia mais longa, pois ela representa o maior esforço computacional já realizado, garantindo maior segurança. Se dois blocos diferentes forem compartilhados simultaneamente, os nós trabalharão no primeiro bloco recebido, mas guardarão o outro como uma alternativa. Caso o segundo bloco eventualmente forme uma cadeia mais longa (ou seja, tenha mais blocos subsequentes), os nós mudarão para essa nova cadeia.
Tolerância a Falhas
A rede é robusta e pode lidar com mensagens que não chegam a todos os nós. Uma transação não precisa alcançar todos os nós de imediato; basta que chegue a um número suficiente deles para ser incluída em um bloco. Da mesma forma, se um nó não receber um bloco em tempo hábil, ele pode solicitá-lo ao perceber que está faltando quando o próximo bloco é recebido.
Esse mecanismo descentralizado permite que a rede Bitcoin funcione de maneira segura, confiável e resiliente, sem depender de uma autoridade central.
6. Incentivo
O incentivo é um dos pilares fundamentais que sustenta o funcionamento da rede Bitcoin, garantindo que os participantes (nós) continuem operando de forma honesta e contribuindo com recursos computacionais. Ele é estruturado em duas partes principais: a recompensa por mineração e as taxas de transação.
Recompensa por Mineração
Por convenção, o primeiro registro em cada bloco é uma transação especial que cria novas moedas e as atribui ao criador do bloco. Essa recompensa incentiva os mineradores a dedicarem poder computacional para apoiar a rede. Como não há uma autoridade central para emitir moedas, essa é a maneira pela qual novas moedas entram em circulação. Esse processo pode ser comparado ao trabalho de garimpeiros, que utilizam recursos para colocar mais ouro em circulação. No caso do Bitcoin, o "recurso" consiste no tempo de CPU e na energia elétrica consumida para resolver a prova-de-trabalho.
Taxas de Transação
Além da recompensa por mineração, os mineradores também podem ser incentivados pelas taxas de transação. Se uma transação utiliza menos valor de saída do que o valor de entrada, a diferença é tratada como uma taxa, que é adicionada à recompensa do bloco contendo essa transação. Com o passar do tempo e à medida que o número de moedas em circulação atinge o limite predeterminado, essas taxas de transação se tornam a principal fonte de incentivo, substituindo gradualmente a emissão de novas moedas. Isso permite que o sistema opere sem inflação, uma vez que o número total de moedas permanece fixo.
Incentivo à Honestidade
O design do incentivo também busca garantir que os participantes da rede mantenham um comportamento honesto. Para um atacante que consiga reunir mais poder computacional do que o restante da rede, ele enfrentaria duas escolhas:
- Usar esse poder para fraudar o sistema, como reverter transações e roubar pagamentos.
- Seguir as regras do sistema, criando novos blocos e recebendo recompensas legítimas.
A lógica econômica favorece a segunda opção, pois um comportamento desonesto prejudicaria a confiança no sistema, diminuindo o valor de todas as moedas, incluindo aquelas que o próprio atacante possui. Jogar dentro das regras não apenas maximiza o retorno financeiro, mas também preserva a validade e a integridade do sistema.
Esse mecanismo garante que os incentivos econômicos estejam alinhados com o objetivo de manter a rede segura, descentralizada e funcional ao longo do tempo.
7. Recuperação do Espaço em Disco
Depois que uma moeda passa a estar protegida por muitos blocos na cadeia, as informações sobre as transações antigas que a geraram podem ser descartadas para economizar espaço em disco. Para que isso seja possível sem comprometer a segurança, as transações são organizadas em uma estrutura chamada "árvore de Merkle". Essa árvore funciona como um resumo das transações: em vez de armazenar todas elas, guarda apenas um "hash raiz", que é como uma assinatura compacta que representa todo o grupo de transações.
Os blocos antigos podem, então, ser simplificados, removendo as partes desnecessárias dessa árvore. Apenas a raiz do hash precisa ser mantida no cabeçalho do bloco, garantindo que a integridade dos dados seja preservada, mesmo que detalhes específicos sejam descartados.
Para exemplificar: imagine que você tenha vários recibos de compra. Em vez de guardar todos os recibos, você cria um documento e lista apenas o valor total de cada um. Mesmo que os recibos originais sejam descartados, ainda é possível verificar a soma com base nos valores armazenados.
Além disso, o espaço ocupado pelos blocos em si é muito pequeno. Cada bloco sem transações ocupa apenas cerca de 80 bytes. Isso significa que, mesmo com blocos sendo gerados a cada 10 minutos, o crescimento anual em espaço necessário é insignificante: apenas 4,2 MB por ano. Com a capacidade de armazenamento dos computadores crescendo a cada ano, esse espaço continuará sendo trivial, garantindo que a rede possa operar de forma eficiente sem problemas de armazenamento, mesmo a longo prazo.
8. Verificação de Pagamento Simplificada
É possível confirmar pagamentos sem a necessidade de operar um nó completo da rede. Para isso, o usuário precisa apenas de uma cópia dos cabeçalhos dos blocos da cadeia mais longa (ou seja, a cadeia com maior esforço de trabalho acumulado). Ele pode verificar a validade de uma transação ao consultar os nós da rede até obter a confirmação de que tem a cadeia mais longa. Para isso, utiliza-se o ramo Merkle, que conecta a transação ao bloco em que ela foi registrada.
Entretanto, o método simplificado possui limitações: ele não pode confirmar uma transação isoladamente, mas sim assegurar que ela ocupa um lugar específico na cadeia mais longa. Dessa forma, se um nó da rede aprova a transação, os blocos subsequentes reforçam essa aceitação.
A verificação simplificada é confiável enquanto a maioria dos nós da rede for honesta. Contudo, ela se torna vulnerável caso a rede seja dominada por um invasor. Nesse cenário, um atacante poderia fabricar transações fraudulentas que enganariam o usuário temporariamente até que o invasor obtivesse controle completo da rede.
Uma estratégia para mitigar esse risco é configurar alertas nos softwares de nós completos. Esses alertas identificam blocos inválidos, sugerindo ao usuário baixar o bloco completo para confirmar qualquer inconsistência. Para maior segurança, empresas que realizam pagamentos frequentes podem preferir operar seus próprios nós, reduzindo riscos e permitindo uma verificação mais direta e confiável.
9. Combinando e Dividindo Valor
No sistema Bitcoin, cada unidade de valor é tratada como uma "moeda" individual, mas gerenciar cada centavo como uma transação separada seria impraticável. Para resolver isso, o Bitcoin permite que valores sejam combinados ou divididos em transações, facilitando pagamentos de qualquer valor.
Entradas e Saídas
Cada transação no Bitcoin é composta por:
- Entradas: Representam os valores recebidos em transações anteriores.
- Saídas: Correspondem aos valores enviados, divididos entre os destinatários e, eventualmente, o troco para o remetente.
Normalmente, uma transação contém:
- Uma única entrada com valor suficiente para cobrir o pagamento.
- Ou várias entradas combinadas para atingir o valor necessário.
O valor total das saídas nunca excede o das entradas, e a diferença (se houver) pode ser retornada ao remetente como troco.
Exemplo Prático
Imagine que você tem duas entradas:
- 0,03 BTC
- 0,07 BTC
Se deseja enviar 0,08 BTC para alguém, a transação terá:
- Entrada: As duas entradas combinadas (0,03 + 0,07 BTC = 0,10 BTC).
- Saídas: Uma para o destinatário (0,08 BTC) e outra como troco para você (0,02 BTC).
Essa flexibilidade permite que o sistema funcione sem precisar manipular cada unidade mínima individualmente.
Difusão e Simplificação
A difusão de transações, onde uma depende de várias anteriores e assim por diante, não representa um problema. Não é necessário armazenar ou verificar o histórico completo de uma transação para utilizá-la, já que o registro na blockchain garante sua integridade.
10. Privacidade
O modelo bancário tradicional oferece um certo nível de privacidade, limitando o acesso às informações financeiras apenas às partes envolvidas e a um terceiro confiável (como bancos ou instituições financeiras). No entanto, o Bitcoin opera de forma diferente, pois todas as transações são publicamente registradas na blockchain. Apesar disso, a privacidade pode ser mantida utilizando chaves públicas anônimas, que desvinculam diretamente as transações das identidades das partes envolvidas.
Fluxo de Informação
- No modelo tradicional, as transações passam por um terceiro confiável que conhece tanto o remetente quanto o destinatário.
- No Bitcoin, as transações são anunciadas publicamente, mas sem revelar diretamente as identidades das partes. Isso é comparável a dados divulgados por bolsas de valores, onde informações como o tempo e o tamanho das negociações (a "fita") são públicas, mas as identidades das partes não.
Protegendo a Privacidade
Para aumentar a privacidade no Bitcoin, são adotadas as seguintes práticas:
- Chaves Públicas Anônimas: Cada transação utiliza um par de chaves diferentes, dificultando a associação com um proprietário único.
- Prevenção de Ligação: Ao usar chaves novas para cada transação, reduz-se a possibilidade de links evidentes entre múltiplas transações realizadas pelo mesmo usuário.
Riscos de Ligação
Embora a privacidade seja fortalecida, alguns riscos permanecem:
- Transações multi-entrada podem revelar que todas as entradas pertencem ao mesmo proprietário, caso sejam necessárias para somar o valor total.
- O proprietário da chave pode ser identificado indiretamente por transações anteriores que estejam conectadas.
11. Cálculos
Imagine que temos um sistema onde as pessoas (ou computadores) competem para adicionar informações novas (blocos) a um grande registro público (a cadeia de blocos ou blockchain). Este registro é como um livro contábil compartilhado, onde todos podem verificar o que está escrito.
Agora, vamos pensar em um cenário: um atacante quer enganar o sistema. Ele quer mudar informações já registradas para beneficiar a si mesmo, por exemplo, desfazendo um pagamento que já fez. Para isso, ele precisa criar uma versão alternativa do livro contábil (a cadeia de blocos dele) e convencer todos os outros participantes de que essa versão é a verdadeira.
Mas isso é extremamente difícil.
Como o Ataque Funciona
Quando um novo bloco é adicionado à cadeia, ele depende de cálculos complexos que levam tempo e esforço. Esses cálculos são como um grande quebra-cabeça que precisa ser resolvido.
- Os “bons jogadores” (nós honestos) estão sempre trabalhando juntos para resolver esses quebra-cabeças e adicionar novos blocos à cadeia verdadeira.
- O atacante, por outro lado, precisa resolver quebra-cabeças sozinho, tentando “alcançar” a cadeia honesta para que sua versão alternativa pareça válida.
Se a cadeia honesta já está vários blocos à frente, o atacante começa em desvantagem, e o sistema está projetado para que a dificuldade de alcançá-los aumente rapidamente.
A Corrida Entre Cadeias
Você pode imaginar isso como uma corrida. A cada bloco novo que os jogadores honestos adicionam à cadeia verdadeira, eles se distanciam mais do atacante. Para vencer, o atacante teria que resolver os quebra-cabeças mais rápido que todos os outros jogadores honestos juntos.
Suponha que:
- A rede honesta tem 80% do poder computacional (ou seja, resolve 8 de cada 10 quebra-cabeças).
- O atacante tem 20% do poder computacional (ou seja, resolve 2 de cada 10 quebra-cabeças).
Cada vez que a rede honesta adiciona um bloco, o atacante tem que "correr atrás" e resolver mais quebra-cabeças para alcançar.
Por Que o Ataque Fica Cada Vez Mais Improvável?
Vamos usar uma fórmula simples para mostrar como as chances de sucesso do atacante diminuem conforme ele precisa "alcançar" mais blocos:
P = (q/p)^z
- q é o poder computacional do atacante (20%, ou 0,2).
- p é o poder computacional da rede honesta (80%, ou 0,8).
- z é a diferença de blocos entre a cadeia honesta e a cadeia do atacante.
Se o atacante está 5 blocos atrás (z = 5):
P = (0,2 / 0,8)^5 = (0,25)^5 = 0,00098, (ou, 0,098%)
Isso significa que o atacante tem menos de 0,1% de chance de sucesso — ou seja, é muito improvável.
Se ele estiver 10 blocos atrás (z = 10):
P = (0,2 / 0,8)^10 = (0,25)^10 = 0,000000095, (ou, 0,0000095%).
Neste caso, as chances de sucesso são praticamente nulas.
Um Exemplo Simples
Se você jogar uma moeda, a chance de cair “cara” é de 50%. Mas se precisar de 10 caras seguidas, sua chance já é bem menor. Se precisar de 20 caras seguidas, é quase impossível.
No caso do Bitcoin, o atacante precisa de muito mais do que 20 caras seguidas. Ele precisa resolver quebra-cabeças extremamente difíceis e alcançar os jogadores honestos que estão sempre à frente. Isso faz com que o ataque seja inviável na prática.
Por Que Tudo Isso é Seguro?
- A probabilidade de sucesso do atacante diminui exponencialmente. Isso significa que, quanto mais tempo passa, menor é a chance de ele conseguir enganar o sistema.
- A cadeia verdadeira (honesta) está protegida pela força da rede. Cada novo bloco que os jogadores honestos adicionam à cadeia torna mais difícil para o atacante alcançar.
E Se o Atacante Tentar Continuar?
O atacante poderia continuar tentando indefinidamente, mas ele estaria gastando muito tempo e energia sem conseguir nada. Enquanto isso, os jogadores honestos estão sempre adicionando novos blocos, tornando o trabalho do atacante ainda mais inútil.
Assim, o sistema garante que a cadeia verdadeira seja extremamente segura e que ataques sejam, na prática, impossíveis de ter sucesso.
12. Conclusão
Propusemos um sistema de transações eletrônicas que elimina a necessidade de confiança, baseando-se em assinaturas digitais e em uma rede peer-to-peer que utiliza prova de trabalho. Isso resolve o problema do gasto duplo, criando um histórico público de transações imutável, desde que a maioria do poder computacional permaneça sob controle dos participantes honestos. A rede funciona de forma simples e descentralizada, com nós independentes que não precisam de identificação ou coordenação direta. Eles entram e saem livremente, aceitando a cadeia de prova de trabalho como registro do que ocorreu durante sua ausência. As decisões são tomadas por meio do poder de CPU, validando blocos legítimos, estendendo a cadeia e rejeitando os inválidos. Com este mecanismo de consenso, todas as regras e incentivos necessários para o funcionamento seguro e eficiente do sistema são garantidos.
Faça o download do whitepaper original em português: https://bitcoin.org/files/bitcoin-paper/bitcoin_pt_br.pdf
-
@ edeb837b:ac664163
2025-02-01 10:43:46Join Benzinga as they sit down with NVSTly, the cutting-edge platform revolutionizing social trading and investing. In this exclusive interview, NVSTly shares insights on empowering retail traders, fostering transparency, and building a thriving community for investors of all levels. Discover how NVSTly is shaping the future of trading with innovative features, real-time trade tracking, and global collaboration.
NVSTly Web: https://nvstly.com
iOS: https://nvstly.com/go/ios
Google Play: https://nvstly.com/go/android -
@ 6389be64:ef439d32
2024-12-09 23:50:41Resilience is the ability to withstand shocks, adapt, and bounce back. It’s an essential quality in nature and in life. But what if we could take resilience a step further? What if, instead of merely surviving, a system could improve when faced with stress? This concept, known as anti-fragility, is not just theoretical—it’s practical. Combining two highly resilient natural tools, comfrey and biochar, reveals how we can create systems that thrive under pressure and grow stronger with each challenge.
Comfrey: Nature’s Champion of Resilience
Comfrey is a plant that refuses to fail. Once its deep roots take hold, it thrives in poor soils, withstands drought, and regenerates even after being cut down repeatedly. It’s a hardy survivor, but comfrey doesn’t just endure—it contributes. Known as a dynamic accumulator, it mines nutrients from deep within the earth and brings them to the surface, making them available for other plants.
Beyond its ecological role, comfrey has centuries of medicinal use, earning the nickname "knitbone." Its leaves can heal wounds and restore health, a perfect metaphor for resilience. But as impressive as comfrey is, its true potential is unlocked when paired with another resilient force: biochar.
Biochar: The Silent Powerhouse of Soil Regeneration
Biochar, a carbon-rich material made by burning organic matter in low-oxygen conditions, is a game-changer for soil health. Its unique porous structure retains water, holds nutrients, and provides a haven for beneficial microbes. Soil enriched with biochar becomes drought-resistant, nutrient-rich, and biologically active—qualities that scream resilience.
Historically, ancient civilizations in the Amazon used biochar to transform barren soils into fertile agricultural hubs. Known as terra preta, these soils remain productive centuries later, highlighting biochar’s remarkable staying power.
Yet, like comfrey, biochar’s potential is magnified when it’s part of a larger system.
The Synergy: Comfrey and Biochar Together
Resilience turns into anti-fragility when systems go beyond mere survival and start improving under stress. Combining comfrey and biochar achieves exactly that.
-
Nutrient Cycling and Retention\ Comfrey’s leaves, rich in nitrogen, potassium, and phosphorus, make an excellent mulch when cut and dropped onto the soil. However, these nutrients can wash away in heavy rains. Enter biochar. Its porous structure locks in the nutrients from comfrey, preventing runoff and keeping them available for plants. Together, they create a system that not only recycles nutrients but amplifies their effectiveness.
-
Water Management\ Biochar holds onto water making soil not just drought-resistant but actively water-efficient, improving over time with each rain and dry spell.
-
Microbial Ecosystems\ Comfrey enriches soil with organic matter, feeding microbial life. Biochar provides a home for these microbes, protecting them and creating a stable environment for them to multiply. Together, they build a thriving soil ecosystem that becomes more fertile and resilient with each passing season.
Resilient systems can withstand shocks, but anti-fragile systems actively use those shocks to grow stronger. Comfrey and biochar together form an anti-fragile system. Each addition of biochar enhances water and nutrient retention, while comfrey regenerates biomass and enriches the soil. Over time, the system becomes more productive, less dependent on external inputs, and better equipped to handle challenges.
This synergy demonstrates the power of designing systems that don’t just survive—they thrive.
Lessons Beyond the Soil
The partnership of comfrey and biochar offers a valuable lesson for our own lives. Resilience is an admirable trait, but anti-fragility takes us further. By combining complementary strengths and leveraging stress as an opportunity, we can create systems—whether in soil, business, or society—that improve under pressure.
Nature shows us that resilience isn’t the end goal. When we pair resilient tools like comfrey and biochar, we unlock a system that evolves, regenerates, and becomes anti-fragile. By designing with anti-fragility in mind, we don’t just bounce back, we bounce forward.
By designing with anti-fragility in mind, we don’t just bounce back, we bounce forward.
-
-
@ 592295cf:413a0db9
2024-12-07 07:21:39Week 02-11
- Nsite zap by hzrd149 Support page
Content creator want more users. They can go to Bluesky.
Great that Nostr is a Echo Chambers. As stated by Rabble during NostRiga, Nostr is a bitcoin meetup. And it is very difficult as said several times, to subvert this fact. It seems that many bitcoiners don't like this, but they can't do anything, leave Nostr and migrate to other lids.
I'm reading Nostr adventar calendar of Japanese Nostr users.
The first two Don and Jun speak of a Mahjong game and the other of how possibly to count the followers of a given account, countfollowed. - Adventar calendar continue until Christmas 🎅
-
Even Bluesky is looking at MLS , is not a soccer league, is a protocol for message by groups, "circles" Post on Bluesky
-
Relays chakany is introduce sunday. link
I've never seen such dead animals as in Nostr. Something reminds me facebook. The carnivore folks
Hivemind podcast by Max, the kilometric comment on fountain under the podcast is the most appetizing thing of all. Just one comment, little one.
He interviewed Kagi's and searched for a brownie pill, perhaps caused a little headache. ( Brownie pill is orange plus purple)
Loss dog on Nostr this week 😔😔 Pam and Derek family dog
conspiracy theory: Fiatjaf was the reply guy!!!
I tried to download voyage, from zapstore but nothing does not work even the 17.1 does not go. Too bad.
I hear so much about notedeck that I want to make a notedeck do it yourself.
Cherry tree, stuck hzrd149 is making an app a day, Chunked blobs on blossom.
A like is used to send your writing Relays
Announcement of a possible wallet in Damus, this could make things better, zap and whatnot.
- Or I'm posting a song here, a musical interlude. song on wavlake
There seems to be a good buzz on Nostr, maybe it's already a Christmassy atmosphere.
- Backup di Bluesky cool things Bluesky post
On another rssfeed thing.
nostr:nevent1qvzqqqqqqypzq9h35qgq6n8ll0xyyv8gurjzjrx9sjwp4hry6ejnlks8cqcmzp6tqqs93j2remdw2pxnctasa9vlsaerrrsl7p5csx5wj88kk0yq977rtdqxt7glp
It's the same thing as following a cross de bridge, but if they do 3 bridge, I say something is wrong. A bot is attached to a Relay. The Relay goes down and so much greetings, then I can look for RSS feeds in my computer without need of Nostr. I can share a particular opml file on Nostr, but I don't know how to do it I asked Fiatjaf but didn't answer it was taken by dichotomie.
Nip19 really Easy to do filter query.
You have events_id pubkey Relay Instead with Nostr:note you only have the event_id.
- Sebastix says he has to implement it in his library, discover the latest weekly report. nostr-php-helper-library
Oh no Pablo has become super Saiyan 🤣
There is a way to make a podcast starting from a long text, blog. With artificial intelligence. But then I thought, but if one does not have time could not have the text of the article summarized, perhaps we like generating content. It can be an option, either you read or you listen. But if you do not have time perhaps it is better to just summarize, dear chatgpt summarize this text, done. Essential points and make a thread for the social network and do what you want.
- Homemade Traditional Boozy Mincemeat, I didn't even know that existed 🤙 link to shopstr
Hodlbod news on bunker burrow
nostr:nevent1qqs84na25g6mdelvl0408nnq8m29j5070dm9mvjrzxyc6yrx2udjyuczyztuwzjyxe4x2dwpgken87tna2rdlhpd02
- In case you don't see the note burrow on github
Once you have the email what do you do with your encrypted key? No Enterprise user maybe. Rember the article of Hodlbod in "Is Always a political move". ✅
List of artists on Nostr nostr:naddr1qvzqqqr4xqpzqfngzhsvjggdlgeycm96x4emzjlwf8dyyzdfg4hefp89zpkdgz99qyghwumn8ghj7mn0wd68ytnhd9hx2tcpzfmhxue69uhkummnw3e82efwvdhk6tcqp9qku6tdv96x7unng9grdr
- An article for food recipe on Nostr Article link
I don't know if they'll ever be there. You can write a recipe book. Or to put recipes on wiki, there doesn't seem to be that attention or that desire. One more relay is always better
- Olas has a website 🥊 Olas app
Oh i see cool Hodlbod bot A summary bot
nostr:nevent1qqs0v88uc2u3he3lm3mpm5h3gr8cuht5wv9g0tk0x9hzvamgvpdjwvspzemhxue69uhhyetvv9ujumn0wd68ytnzv9hxgq3qjlrs53pkdfjnts29kveljul2sm0actt6n8dxrrzqcersttvcuv3qu0ltyv
That's all!!
-
@ edeb837b:ac664163
2025-02-01 10:40:42We’re thrilled to announce that NVSTly has been honored with the People's Choice Award at the prestigious Benzinga FinTech Awards 2024! This recognition is a testament to the trust, support, and enthusiasm of our growing community of retail traders, investors, and financial enthusiasts.
A Milestone in Social Investing
Winning the People's Choice Award is more than just a moment of celebration for NVSTly—it reflects the incredible journey we’ve shared with our users. NVSTly was built with one mission in mind: to redefine social investing by empowering traders of all experience levels to share, track, and learn from one another.
In the competitive world of fintech, being selected as the People's Choice means we’ve created something that resonates deeply with our audience. It’s your votes, feedback, and passion that have propelled us to this achievement.
What Makes NVSTly Unique?
NVSTly stands out for offering a platform that’s entirely free while delivering a comprehensive suite of features for traders, such as:
- Global Leaderboard: Recognizing top-performing traders across stocks, options, futures, forex, and cryptocurrency.
- Trade Insights UI: Providing detailed analytics on trades, including market data validation and unique event visualizations.
- Broker Integration (Optional): Automating trade tracking and sharing with real-time updates.
- Discord Integration: A first-of-its-kind bot that brings NVSTly’s full functionality to one of the fastest-growing social platforms in finance.
- Education and Community: Enabling beginners to learn from experienced traders and find actionable insights.
Unlike traditional trading platforms, NVSTly focuses solely on trade tracking, sharing, and performance validation. It’s not about buying or selling real assets but fostering transparency, collaboration, and growth among traders.
Powered by the Community
The People's Choice Award is special because it comes directly from you—our community. Whether you’re an experienced trader gaining recognition through our leaderboard or a beginner exploring NVSTly to learn from top traders, this award proves that NVSTly isn’t just a platform; it’s a movement.
Your votes affirm our commitment to delivering cutting-edge features, unmatched usability, and an ecosystem that connects traders across all markets.
Looking Ahead
Winning this award fuels our determination to push boundaries even further. In the months to come, we’re excited to roll out new features, expand our broker integrations, and enhance the tools that make NVSTly the go-to platform for retail traders worldwide.
Thank You
We couldn’t have achieved this milestone without your unwavering support. From everyone at the NVSTly team, thank you for believing in our vision and making NVSTly the People’s Choice for 2024. This award is as much yours as it is ours.
If you haven’t joined the movement yet, there’s never been a better time. Discover, share, and track trades with NVSTly today—because the best way to grow in the markets is together.
Join NVSTly:
- Website: nvstly.com
- Mobile App: Available on Google Play and iOS App Store
- Discord Community: Join Now
Let’s continue shaping the future of social investing, one trade at a time.
-
@ edeb837b:ac664163
2025-02-01 10:36:38At NVSTly, we embrace the concept of “building in public.” This approach shapes how we develop, test, and roll out features, with the goal of making NVSTly the best social trading platform for our users. But what exactly does building in public mean for NVSTly? Let’s break it down.
Updates as They’re Finished
Instead of waiting to bundle new features and fixes into big, infrequent releases, we push updates as they’re completed. This ensures users benefit from improvements as soon as possible. However, our agile development style means you might notice subtle changes before they’re officially included in a published changelog. These incremental updates allow us to iterate and enhance the platform quickly.
Internal Testing, Real-World Feedback
Before any update reaches the production environment, our team conducts internal testing to ensure the new feature or fix works as intended. For example, a recent update to allow stats and daily/weekly recap commands to function with usernames containing spaces was thoroughly tested internally. Unfortunately, this change inadvertently broke compatibility with Discord IDs, highlighting the challenges of anticipating every edge case.
This is where building in public comes into play: while we strive for thorough testing, some issues only emerge when updates meet real-world usage. That’s why we rely on our vibrant user base to help us identify bugs, unintended behaviors, and areas for improvement.
The Role of Our User Community
Our users play a critical role in the development process. By using NVSTly in their daily trading workflows, they encounter scenarios that internal testing might miss. When users report bugs, glitches, or other issues, it provides us with invaluable insights into how the platform performs under various conditions.
If you ever experience something on NVSTly that doesn’t seem to work as expected, we encourage you to report it to us. Unlike platforms that may identify and resolve issues passively over time, NVSTly relies directly on user feedback to detect and prioritize fixes. Every report helps us improve.
Changelogs: A Snapshot of Progress
Given our frequent updates, we publish changelogs only after accumulating several changes or introducing major features. This means that when you see a changelog, many of the updates listed might have been implemented days or even weeks earlier. While this approach helps us focus on building and refining the platform, it’s another example of how building in public keeps the development process transparent.
Why Building in Public Matters
By building in public, we:
- Accelerate innovation: Continuous updates ensure the platform evolves rapidly.
- Foster transparency: Users gain insight into what’s changing and how issues are addressed.
- Strengthen collaboration: Feedback from users directly informs our priorities and solutions.
This approach isn’t without its challenges, but we believe the benefits far outweigh the risks. Building in public allows us to create a platform that truly meets the needs of our community — a community we’re proud to involve in the journey.
How You Can Help
If you notice a bug, glitch, or unintended behavior, please let us know right away. Your feedback is essential to making NVSTly better every day. Together, we’re not just building a platform; we’re building a community-driven experience that reflects the collective expertise and passion of its users.
Thank you for being part of the NVSTly journey. Let’s keep building — together.
NVSTly is available for free on web, mobile devices (iOS & Google Play), and is fully integrated with Discord via a unique bot- the only of it’s kind and available to any server or trading community on Discord. Or feel free to join a community of over 45,000 investors & traders on our Discod server.
-
@ da0b9bc3:4e30a4a9
2025-02-01 09:45:00Hello Stackers!
Welcome on into the ~Music Corner of the Saloon!
A place where we Talk Music. Share Tracks. Zap Sats.
So stay a while and listen.
🚨Don't forget to check out the pinned items in the territory homepage! You can always find the latest weeklies there!🚨
🚨Subscribe to the territory to ensure you never miss a post! 🚨
originally posted at https://stacker.news/items/872135
-
@ a849beb6:b327e6d2
2024-11-23 15:03:47\ \ It was another historic week for both bitcoin and the Ten31 portfolio, as the world’s oldest, largest, most battle-tested cryptocurrency climbed to new all-time highs each day to close out the week just shy of the $100,000 mark. Along the way, bitcoin continued to accumulate institutional and regulatory wins, including the much-anticipated approval and launch of spot bitcoin ETF options and the appointment of several additional pro-bitcoin Presidential cabinet officials. The timing for this momentum was poetic, as this week marked the second anniversary of the pico-bottom of the 2022 bear market, a level that bitcoin has now hurdled to the tune of more than 6x despite the litany of bitcoin obituaries published at the time. The entirety of 2024 and especially the past month have further cemented our view that bitcoin is rapidly gaining a sense of legitimacy among institutions, fiduciaries, and governments, and we remain optimistic that this trend is set to accelerate even more into 2025.
Several Ten31 portfolio companies made exciting announcements this week that should serve to further entrench bitcoin’s institutional adoption. AnchorWatch, a first of its kind bitcoin insurance provider offering 1:1 coverage with its innovative use of bitcoin’s native properties, announced it has been designated a Lloyd’s of London Coverholder, giving the company unique, blue-chip status as it begins to write bitcoin insurance policies of up to $100 million per policy starting next month. Meanwhile, Battery Finance Founder and CEO Andrew Hohns appeared on CNBC to delve into the launch of Battery’s pioneering private credit strategy which fuses bitcoin and conventional tangible assets in a dual-collateralized structure that offers a compelling risk/return profile to both lenders and borrowers. Both companies are clearing a path for substantially greater bitcoin adoption in massive, untapped pools of capital, and Ten31 is proud to have served as lead investor for AnchorWatch’s Seed round and as exclusive capital partner for Battery.
As the world’s largest investor focused entirely on bitcoin, Ten31 has deployed nearly $150 million across two funds into more than 30 of the most promising and innovative companies in the ecosystem like AnchorWatch and Battery, and we expect 2025 to be the best year yet for both bitcoin and our portfolio. Ten31 will hold a first close for its third fund at the end of this year, and investors in that close will benefit from attractive incentives and a strong initial portfolio. Visit ten31.vc/funds to learn more and get in touch to discuss participating.\ \ Portfolio Company Spotlight
Primal is a first of its kind application for the Nostr protocol that combines a client, caching service, analytics tools, and more to address several unmet needs in the nascent Nostr ecosystem. Through the combination of its sleek client application and its caching service (built on a completely open source stack), Primal seeks to offer an end-user experience as smooth and easy as that of legacy social media platforms like Twitter and eventually many other applications, unlocking the vast potential of Nostr for the next billion people. Primal also offers an integrated wallet (powered by Strike BLACK) that substantially reduces onboarding and UX frictions for both Nostr and the lightning network while highlighting bitcoin’s unique power as internet-native, open-source money.
Selected Portfolio News
AnchorWatch announced it has achieved Llody’s Coverholder status, allowing the company to provide unique 1:1 bitcoin insurance offerings starting in December.\ \ Battery Finance Founder and CEO Andrew Hohns appeared on CNBC to delve into the company’s unique bitcoin-backed private credit strategy.
Primal launched version 2.0, a landmark update that adds a feed marketplace, robust advanced search capabilities, premium-tier offerings, and many more new features.
Debifi launched its new iOS app for Apple users seeking non-custodial bitcoin-collateralized loans.
Media
Strike Founder and CEO Jack Mallers joined Bloomberg TV to discuss the strong volumes the company has seen over the past year and the potential for a US bitcoin strategic reserve.
Primal Founder and CEO Miljan Braticevic joined The Bitcoin Podcast to discuss the rollout of Primal 2.0 and the future of Nostr.
Ten31 Managing Partner Marty Bent appeared on BlazeTV to discuss recent changes in the regulatory environment for bitcoin.
Zaprite published a customer testimonial video highlighting the popularity of its offerings across the bitcoin ecosystem.
Market Updates
Continuing its recent momentum, bitcoin reached another new all-time high this week, clocking in just below $100,000 on Friday. Bitcoin has now reached a market cap of nearly $2 trillion, putting it within 3% of the market caps of Amazon and Google.
After receiving SEC and CFTC approval over the past month, long-awaited options on spot bitcoin ETFs were fully approved and launched this week. These options should help further expand bitcoin’s institutional liquidity profile, with potentially significant implications for price action over time.
The new derivatives showed strong performance out of the gate, with volumes on options for BlackRock’s IBIT reaching nearly $2 billion on just the first day of trading despite surprisingly tight position limits for the vehicles.
Meanwhile, the underlying spot bitcoin ETF complex had yet another banner week, pulling in $3.4 billion in net inflows.
New reports suggested President-elect Donald Trump’s social media company is in advanced talks to acquire crypto trading platform Bakkt, potentially the latest indication of the incoming administration’s stance toward the broader “crypto” ecosystem.
On the macro front, US housing starts declined M/M again in October on persistently high mortgage rates and weather impacts. The metric remains well below pre-COVID levels.
Pockets of the US commercial real estate market remain challenged, as the CEO of large Florida developer Related indicated that developers need further rate cuts “badly” to maintain project viability.
US Manufacturing PMI increased slightly M/M, but has now been in contraction territory (<50) for well over two years.
The latest iteration of the University of Michigan’s popular consumer sentiment survey ticked up following this month’s election results, though so did five-year inflation expectations, which now sit comfortably north of 3%.
Regulatory Update
After weeks of speculation, the incoming Trump administration appointed hedge fund manager Scott Bessent to head up the US Treasury. Like many of Trump’s cabinet selections so far, Bessent has been a public advocate for bitcoin.
Trump also appointed Cantor Fitzgerald CEO Howard Lutnick – another outspoken bitcoin bull – as Secretary of the Commerce Department.
Meanwhile, the Trump team is reportedly considering creating a new “crypto czar” role to sit within the administration. While it’s unclear at this point what that role would entail, one report indicated that the administration’s broader “crypto council” is expected to move forward with plans for a strategic bitcoin reserve.
Various government lawyers suggested this week that the Trump administration is likely to be less aggressive in seeking adversarial enforcement actions against bitcoin and “crypto” in general, as regulatory bodies appear poised to shift resources and focus elsewhere.
Other updates from the regulatory apparatus were also directionally positive for bitcoin, most notably FDIC Chairman Martin Gruenberg’s confirmation that he plans to resign from his post at the end of President Biden’s term.
Many critics have alleged Gruenberg was an architect of “Operation Chokepoint 2.0,” which has created banking headwinds for bitcoin companies over the past several years, so a change of leadership at the department is likely yet another positive for the space.
SEC Chairman Gary Gensler also officially announced he plans to resign at the start of the new administration. Gensler has been the target of much ire from the broader “crypto” space, though we expect many projects outside bitcoin may continue to struggle with questions around the Howey Test.
Overseas, a Chinese court ruled that it is not illegal for individuals to hold cryptocurrency, even though the country is still ostensibly enforcing a ban on crypto transactions.
Noteworthy
The incoming CEO of Charles Schwab – which administers over $9 trillion in client assets – suggested the platform is preparing to “get into” spot bitcoin offerings and that he “feels silly” for having waited this long. As this attitude becomes more common among traditional finance players, we continue to believe that the number of acquirers coming to market for bitcoin infrastructure capabilities will far outstrip the number of available high quality assets.
BlackRock’s 2025 Thematic Outlook notes a “renewed sense of optimism” on bitcoin among the asset manager’s client base due to macro tailwinds and the improving regulatory environment. Elsewhere, BlackRock’s head of digital assets indicated the firm does not view bitcoin as a “risk-on” asset.
MicroStrategy, which was a sub-$1 billion market cap company less than five years ago, briefly breached a $100 billion equity value this week as it continues to aggressively acquire bitcoin. The company now holds nearly 350,000 bitcoin on its balance sheet.
Notably, Allianz SE, Germany’s largest insurer, spoke for 25% of MicroStrategy’s latest $3 billion convertible note offering this week, suggesting growing appetite for bitcoin proxy exposure among more restricted pools of capital.
The ongoing meltdown of fintech middleware provider Synapse has left tens of thousands of customers with nearly 100% deposit haircuts as hundreds of millions in funds remain missing, the latest unfortunate case study in the fragility of much of the US’s legacy banking stack.
Travel
-
BitcoinMENA, Dec 9-10
-
Nashville BitDevs, Dec 10
-
Austin BitDevs, Dec 19
-
-
@ 1bda7e1f:bb97c4d9
2024-11-21 04:17:08Tldr
- Nostr is an open protocol which is interoperable with all kinds of other technologies
- You can use this interoperability to create custom solutions
- Nostr apps define a custom URI scheme handler "nostr:"
- In this blog I use this to integrate Nostr with NFC cards
- I create a Nostr NFC "login card" which allows me to log into Amethyst client
- I create a Nostr NFC "business card" which allows anyone to find my profile with a tap
Inter-Op All The Things!
Nostr is a new open social protocol for the internet. This open nature is very exciting because it means Nostr can add new capabilities to all other internet-connected technologies, from browsers to web applications. In my view, it achieves this through three core capabilities.
- A lightweight decentralised identity (Nostr keys, "npubs" and "nsecs"),
- A lightweight data distribution network (Nostr relays),
- A set of data interoperability standards (The Nostr Improvement Protocols "NIPs"), including the "nostr:" URI which we'll use in this post.
The lightweight nature is its core strength. Very little is required to interoperate with Nostr, which means many existing technologies can be easily used with the network.
Over the next few blog posts, I'll explore different Nostr inter-op ideas, and also deliver my first small open source projects to the community. I'll cover–
- NFC cards integrated with Nostr (in this post),
- Workflow Automations integrated with Nostr,
- AI LLMs integrated with Nostr.
The "Nostr:" URI
One feature of Nostr is it defines a custom URI scheme handler "nostr:". What is that?
A URI is used to identify a resource in a system. A system will have a protocol handler registry used to store such URI's, and if a system has a URI registered, then it knows what to do when it sees it. You are probably already familiar with some URI schemes such as "http:" and "mailto:". For example, when you click an http link, the system knows that it describes an http resource and opens a web browser to fetch the content from the internet.
A nostr: link operates in the same way. The nostr: prefix indicates a custom URI scheme specifically designed for the Nostr protocol. If a system has a Nostr application installed, that application may have registered "nostr:" in the protocol handler registry. On that system when a "nostr:" URI is clicked, the system will know that it describes a nostr resource and open the Nostr client to fetch the content from the nostr relay network.
This inter-op with the protocol handler registry gives us the power to do nice and exciting things with other technologies.
Nostr and NFC
Another technology that uses URIs is NFC cards. NFC (Near Field Communication) is a wireless technology that enables devices to exchange data over a few centimeters. It’s widely used in contactless payments, access control, and information sharing.
NFC tags are small chips embedded in cards or stickers which can store data like plain text, URLs, or custom URIs. They are very cheap (cents each) and widely available (Amazon with next day delivery).
When an NFC tag contains a URI, such as a http: (or nostr:) link, it acts as a trigger. Tapping the tag with an NFC-enabled device launches the associated application and processes the URI. For example, tapping a tag with "nostr:..." could open a Nostr client, directing it to a specific login page, public profile, or event.
This inter-op allows us to bridge the physical world to Nostr with just a tap.
Many useful ideas
There are many interesting ways to use this. Too many for me to explore. Perhaps some of these are interesting for your next side hustle?
- Nostr NFC "login cards" – tap to log into Amethyst on Android,
- Nostr NFC "business cards" – give to connections so they can tap to load your npub,
- Nostr NFC "payment cards" – integrating lightning network or ecash,
- Nostr NFC "doorbells", "punch cards", "drop boxes", or "dead drops" – put a tag in a specific place and tap to open a location-specific message or chat,
- Integrations with other access control systems,
- Integrations with other home automation systems,
- Many more ...
To start with I have built and use the "login card" and "business card" solutions. This blog post will show you how to do the same.
Nostr Login Card
You can use an NFC card to log into your Nostr client.
Most Nostr clients accept a variety of login methods, from posting your nsec into the app (insecure) to using a remote signer (more secure). A less known but more secure method is to sign into a session with a tap of a specially-configured NFC card. Amethyst is a Nostr client on Android which supports this type of login.
- A secure method for logging in
- Optionally keeps no log in history on the device after logout
- Does not require users to know or understand how keys work
- Keys are kept secure on a physically-separated card to reduce risk of compromise
Nostr devs think that this is useful for anti-establishment actors–Fair enough. For me, I am interested in this login card pattern as it could be useful for rolling out identities within an organisation context with less training (office workers are already familiar with door access cards). This pattern potentially abstracts away key management to the IT or ops team who provision the cards.
I first discovered this when Kohei demonstrated it in his video.
Here's how you set it up at a high level–
- Buy yourself some NFC cards
- Get your Nostr key ready in an encrypted, password protected format called "nencryptsec"
- Write the nencryptsec to the NFC card as a custom URI
- Tap to load the login screen, and enter your password to login
Here it is in detail–
Buy yourself some NFC cards
I found no specific requirements. As usual with Nostr so far, I tried to the cheapest possible route and it worked. Generic brand NFC cards shipped from China, I believe it was 50X for $15 from Amazon. Your mileage may vary.
Get your Nostr key ready
Your key will be saved to the NFC card in an encrypted password-protected format called "nencryptsec". Several applications support this. As we'll be using this to login to Amethyst, we will use Amethyst to output the nencryptsec for us.
- Login to Amethyst with your nsec,
- Open the sidebar and click "Backup Keys",
- Enter a password, and click "Encrypt and my secret key",
- It will add the password-protected key to your clipboard in the format "ncryptsec1...",
- Remember to backup your password.
Write the ncryptsec to the NFC card
- Download the free NFC Tools app to your device, and open it,
- Click "Write" and "Add a record", then click "Custom URL / URI",
- Paste your nencryptsec with the nostr URI in front, i.e. "nostr:ncryptsec1..." and click OK,
- Click "Write". NFC Tools will prompt you to "Approach an NFC tag",
- Place your NFC card against your phone, and it will write to the card,
- Your card is ready.
Tap to load the login screen
Tap the card against your phone again, and your phone should open the login screen of Amethyst and prompt you for your password.
Once you enter your password, Amethyst will decrypt your nsec and log you in.
Optionally, you can also set the app to forget you once you log out.
You have created a Nostr NFC "login card".
Nostr Business Card
You can use another NFC card to give anyone you meet a link straight to your Nostr profile.
I attended Peter McCormack's #CheatCode conference in Sydney and gave a few of these out following the Nostr panel, notably to Preston Pysh where it got some cut through and found me my first 100 followers. You can do the same.
To create your Nostr NFC "business card" is even easier than your NFC "login card".
- Buy yourself some NFC cards,
- Download the free NFC Tools app to your device, and open it,
- Click "Write" and "Add a record", then click "Custom URL / URI",
- Write your npub to the NFC card as a custom URI in the format "nostr:npub1..." (e.g. for me this is "nostr:npub1r0d8u8mnj6769500nypnm28a9hpk9qg8jr0ehe30tygr3wuhcnvs4rfsft"),
- Your card is ready.
Give the card to someone who is a Nostr user, and when they tap the card against their phone it will open their preferred Nostr client and go directly to your Nostr profile page.
You have created a Nostr NFC "business card".
What I Did Wrong
I like to share what I did wrong so you don't have to make the same mistakes. This time, this was very easy, and little went wrong. In general
- When password-protecting your nsec, don't forget the password!
- When writing to the NFC card, make sure to use "Custom URI/URL" as this accepts your "nostr:" URI scheme. If you use generic "URI/URL" it won't work.
What's Next
Over my first four blogs I have explored creating a good Nostr setup
- Mined a Nostr pubkey and backed up the mnemonic
- Set up Nostr payments with a Lightning wallet plus all the bells and whistles
- Set up NIP-05 and Lighting Address at my own domain
- Set up a Personal Relay at my own domain
Over the next few blogs I will be exploring different types of Nostr inter-op
- NFC cards integrated with Nostr (this post)
- Workflow Automations integrated with Nostr
- AI LLMs integrated with Nostr
Please be sure to let me know if you think there's another Nostr topic you'd like to see me tackle.
GM Nostr.
-
@ 3f770d65:7a745b24
2025-01-19 21:48:49The recent shutdown of TikTok in the United States due to a potential government ban serves as a stark reminder how fragile centralized platforms truly are under the surface. While these platforms offer convenience, a more polished user experience, and connectivity, they are ultimately beholden to governments, corporations, and other authorities. This makes them vulnerable to censorship, regulation, and outright bans. In contrast, Nostr represents a shift in how we approach online communication and content sharing. Built on the principles of decentralization and user choice, Nostr cannot be banned, because it is not a platform—it is a protocol.
PROTOCOLS, NOT PLATFORMS.
At the heart of Nostr's philosophy is user choice, a feature that fundamentally sets it apart from legacy platforms. In centralized systems, the user experience is dictated by a single person or governing entity. If the platform decides to filter, censor, or ban specific users or content, individuals are left with little action to rectify the situation. They must either accept the changes or abandon the platform entirely, often at the cost of losing their social connections, their data, and their identity.
What's happening with TikTok could never happen on Nostr. With Nostr, the dynamics are completely different. Because it is a protocol, not a platform, no single entity controls the ecosystem. Instead, the protocol enables a network of applications and relays that users can freely choose from. If a particular application or relay implements policies that a user disagrees with, such as censorship, filtering, or even government enforced banning, they are not trapped or abandoned. They have the freedom to move to another application or relay with minimal effort.
THIS IS POWERFUL.
Take, for example, the case of a relay that decides to censor specific content. On a legacy platform, this would result in frustration and a loss of access for users. On Nostr, however, users can simply connect to a different relay that does not impose such restrictions. Similarly, if an application introduces features or policies that users dislike, they can migrate to a different application that better suits their preferences, all while retaining their identity and social connections.
The same principles apply to government bans and censorship. A government can ban a specific application or even multiple applications, just as it can block one relay or several relays. China has implemented both tactics, yet Chinese users continue to exist and actively participate on Nostr, demonstrating Nostr's ability to resistant censorship.
How? Simply, it turns into a game of whack-a-mole. When one relay is censored, another quickly takes its place. When one application is banned, another emerges. Users can also bypass these obstacles by running their own relays and applications directly from their homes or personal devices, eliminating reliance on larger entities or organizations and ensuring continuous access.
AGAIN, THIS IS POWERUFL.
Nostr's open and decentralized design makes it resistant to the kinds of government intervention that led to TikTok's outages this weekend and potential future ban in the next 90 days. There is no central server to target, no company to regulate, and no single point of failure. (Insert your CEO jokes here). As long as there are individuals running relays and applications, users continue creating notes and sending zaps.
Platforms like TikTok can be silenced with the stroke of a pen, leaving millions of users disconnected and abandoned. Social communication should not be silenced so incredibly easily. No one should have that much power over social interactions.
Will we on-board a massive wave of TikTokers in the coming hours or days? I don't know.
TikTokers may not be ready for Nostr yet, and honestly, Nostr may not be ready for them either. The ecosystem still lacks the completely polished applications, tools, and services they’re accustomed to. This is where we say "we're still early". They may not be early adopters like the current Nostr user base. Until we bridge that gap, they’ll likely move to the next centralized platform, only to face another government ban or round of censorship in the future. But eventually, there will come a tipping point, a moment when they’ve had enough. When that time comes, I hope we’re prepared. If we’re not, we risk missing a tremendous opportunity to onboard people who genuinely need Nostr’s freedom.
Until then, to all of the Nostr developers out there, keep up the great work and keep building. Your hard work and determination is needed.
-
@ cff1720e:15c7e2b2
2025-01-19 17:48:02Einleitung\ \ Schwierige Dinge einfach zu erklären ist der Anspruch von ELI5 (explain me like I'm 5). Das ist in unserer hoch technisierten Welt dringend erforderlich, denn nur mit dem Verständnis der Technologien können wir sie richtig einsetzen und weiter entwickeln.\ Ich starte meine Serie mit Nostr, einem relativ neuen Internet-Protokoll. Was zum Teufel ist ein Internet-Protokoll? Formal beschrieben sind es internationale Standards, die dafür sorgen, dass das Internet seit über 30 Jahren ziemlich gut funktioniert. Es ist die Sprache, in der sich die Rechner miteinander unterhalten und die auch Sie täglich nutzen, vermutlich ohne es bewusst wahrzunehmen. http(s) transportiert ihre Anfrage an einen Server (z.B. Amazon), und html sorgt dafür, dass aus den gelieferten Daten eine schöne Seite auf ihrem Bildschirm entsteht. Eine Mail wird mit smtp an den Mailserver gesendet und mit imap von ihm abgerufen, und da alle den Standard verwenden, funktioniert das mit jeder App auf jedem Betriebssystem und mit jedem Mail-Provider. Und mit einer Mail-Adresse wie roland@pareto.space können sie sogar jederzeit umziehen, egal wohin. Cool, das ist state of the art! Aber warum funktioniert das z.B. bei Chat nicht, gibt es da kein Protokoll? Doch, es heißt IRC (Internet Relay Chat → merken sie sich den Namen), aber es wird so gut wie nicht verwendet. Die Gründe dafür sind nicht technischer Natur, vielmehr wurden mit Apps wie Facebook, Twitter, WhatsApp, Telegram, Instagram, TikTok u.a. bewusst Inkompatibilitäten und Nutzerabhängigkeiten geschaffen um Profite zu maximieren.
Warum Nostr?
Da das Standard-Protokoll nicht genutzt wird, hat jede App ihr eigenes, und wir brauchen eine handvoll Apps um uns mit allen Bekannten auszutauschen. Eine Mobilfunknummer ist Voraussetzung für jedes Konto, damit können die App-Hersteller die Nutzer umfassend tracken und mit dem Verkauf der Informationen bis zu 30 USD je Konto und Monat verdienen. Der Nutzer ist nicht mehr Kunde, er ist das Produkt! Der Werbe-SPAM ist noch das kleinste Problem bei diesem Geschäftsmodell. Server mit Millionen von Nutzerdaten sind ein “honey pot”, dementsprechend oft werden sie gehackt und die Zugangsdaten verkauft. 2024 wurde auch der Twitter-Account vom damaligen Präsidenten Joe Biden gehackt, niemand wusste mehr wer die Nachrichten verfasst hat (vorher auch nicht), d.h. die Authentizität der Inhalte ist bei keinem dieser Anbieter gewährleistet. Im selben Jahr wurde der Telegram-Gründer in Frankreich in Beugehaft genommen, weil er sich geweigert hatte Hintertüren in seine Software einzubauen. Nun kann zum Schutz "unserer Demokratie” praktisch jeder mitlesen, was sie mit wem an Informationen austauschen, z.B. darüber welches Shampoo bestimmte Politiker verwenden.
Und wer tatsächlich glaubt er könne Meinungsfreiheit auf sozialen Medien praktizieren, findet sich schnell in der Situation von Donald Trump wieder (seinerzeit amtierender Präsident), dem sein Twitter-Konto 2021 abgeschaltet wurde (Cancel-Culture). Die Nutzerdaten, also ihr Profil, ihre Kontakte, Dokumente, Bilder, Videos und Audiofiles - gehören ihnen ohnehin nicht mehr sondern sind Eigentum des Plattform-Betreibers; lesen sie sich mal die AGB's durch. Aber nein, keine gute Idee, das sind hunderte Seiten und sie werden permanent geändert. Alle nutzen also Apps, deren Technik sie nicht verstehen, deren Regeln sie nicht kennen, wo sie keine Rechte haben und die ihnen die Resultate ihres Handelns stehlen. Was würde wohl der Fünfjährige sagen, wenn ihm seine ältere Schwester anbieten würde, alle seine Spielzeuge zu “verwalten” und dann auszuhändigen wenn er brav ist? “Du spinnst wohl”, und damit beweist der Knirps mehr Vernunft als die Mehrzahl der Erwachsenen. \ \ Resümee: keine Standards, keine Daten, keine Rechte = keine Zukunft!
\ Wie funktioniert Nostr?
Die Entwickler von Nostr haben erkannt dass sich das Server-Client-Konzept in ein Master-Slave-Konzept verwandelt hatte. Der Master ist ein Synonym für Zentralisierung und wird zum “single point of failure”, der zwangsläufig Systeme dysfunktional macht. In einem verteilten Peer2Peer-System gibt es keine Master mehr sondern nur gleichberechtigte Knoten (Relays), auf denen die Informationen gespeichert werden. Indem man Informationen auf mehreren Relays redundant speichert, ist das System in jeglicher Hinsicht resilienter. Nicht nur die Natur verwendet dieses Prinzip seit Jahrmillionen erfolgreich, auch das Internet wurde so konzipiert (das ARPAnet wurde vom US-Militär für den Einsatz in Kriegsfällen unter massiven Störungen entwickelt). Alle Nostr-Daten liegen auf Relays und der Nutzer kann wählen zwischen öffentlichen (zumeist kostenlosen) und privaten Relays, z.B. für geschlossene Gruppen oder zum Zwecke von Daten-Archivierung. Da Dokumente auf mehreren Relays gespeichert sind, werden statt URL's (Locator) eindeutige Dokumentnamen (URI's = Identifier) verwendet, broken Links sind damit Vergangenheit und Löschungen / Verluste ebenfalls.\ \ Jedes Dokument (Event genannt) wird vom Besitzer signiert, es ist damit authentisch und fälschungssicher und kann nur vom Ersteller gelöscht werden. Dafür wird ein Schlüsselpaar verwendet bestehend aus privatem (nsec) und öffentlichem Schlüssel (npub) wie aus der Mailverschlüsselung (PGP) bekannt. Das repräsentiert eine Nostr-Identität, die um Bild, Namen, Bio und eine lesbare Nostr-Adresse ergänzt werden kann (z.B. roland@pareto.space ), mehr braucht es nicht um alle Ressourcen des Nostr-Ökosystems zu nutzen. Und das besteht inzwischen aus über hundert Apps mit unterschiedlichen Fokussierungen, z.B. für persönliche verschlüsselte Nachrichten (DM → OxChat), Kurznachrichten (Damus, Primal), Blogbeiträge (Pareto), Meetups (Joinstr), Gruppen (Groups), Bilder (Olas), Videos (Amethyst), Audio-Chat (Nostr Nests), Audio-Streams (Tunestr), Video-Streams (Zap.Stream), Marktplätze (Shopstr) u.v.a.m. Die Anmeldung erfolgt mit einem Klick (single sign on) und den Apps stehen ALLE Nutzerdaten zur Verfügung (Profil, Daten, Kontakte, Social Graph → Follower, Bookmarks, Comments, etc.), im Gegensatz zu den fragmentierten Datensilos der Gegenwart.\ \ Resümee: ein offener Standard, alle Daten, alle Rechte = große Zukunft!
\ Warum ist Nostr die Zukunft des Internet?
“Baue Dein Haus nicht auf einem fremden Grundstück” gilt auch im Internet - für alle App-Entwickler, Künstler, Journalisten und Nutzer, denn auch ihre Daten sind werthaltig. Nostr garantiert das Eigentum an den Daten, und überwindet ihre Fragmentierung. Weder die Nutzung noch die kreativen Freiheiten werden durch maßlose Lizenz- und Nutzungsbedingungen eingeschränkt. Aus passiven Nutzern werden durch Interaktion aktive Teilnehmer, Co-Creatoren in einer Sharing-Ökonomie (Value4Value). OpenSource schafft endlich wieder Vertrauen in die Software und ihre Anbieter. Offene Standards ermöglichen den Entwicklern mehr Kooperation und schnellere Entwicklung, für die Anwender garantieren sie Wahlfreiheit. Womit wir letztmalig zu unserem Fünfjährigen zurückkehren. Kinder lieben Lego über alles, am meisten die Maxi-Box “Classic”, weil sie damit ihre Phantasie im Kombinieren voll ausleben können. Erwachsene schenken ihnen dann die viel zu teuren Themenpakete, mit denen man nur eine Lösung nach Anleitung bauen kann. “Was stimmt nur mit meinen Eltern nicht, wann sind die denn falsch abgebogen?" fragt sich der Nachwuchs zu Recht. Das Image lässt sich aber wieder aufpolieren, wenn sie ihren Kindern Nostr zeigen, denn die Vorteile verstehen sogar Fünfjährige.
\ Das neue Internet ist dezentral. Das neue Internet ist selbstbestimmt. Nostr ist das neue Internet.
https://nostr.net/ \ https://start.njump.me/
Hier das Interview zum Thema mit Radio Berliner Morgenröte
-
@ 1bda7e1f:bb97c4d9
2024-11-21 00:54:54Tldr
- Nostr is an open protocol which is interoperable with all kinds of other technologies
- You can use this interoperability to create custom solutions
- Nostr apps define the a custom URI scheme handler "nostr:"
- In this blog I use this to integrate Nostr with NFC cards
- I create a Nostr NFC "login card" which allows me to log into Amethyst client
- I create a Nostr NFC "business card" which allows anyone to find my profile with a tap
Inter-Op All The Things!
Nostr is a new open social protocol for the internet. This open nature is very exciting because it means Nostr can add new capabilities to all other internet-connected technologies, from browsers to web applications. In my view, it achieves this through three core capabilities.
- A lightweight decentralised identity (Nostr keys, "npubs" and "nsecs"),
- A lightweight data distribution network (Nostr relays),
- A set of data interoperability standards (The Nostr Improvement Protocols "NIPs"), including the "nostr:" URI which we'll use in this post.
The lightweight nature is its core strength. Very little is required to interoperate with Nostr, which means many existing technologies can be easily used with the network.
Over the next few blog posts, I'll explore different Nostr inter-op ideas, and also deliver my first small open source projects to the community. I'll cover–
- NFC cards integrated with Nostr (in this post),
- Workflow Automations integrated with Nostr,
- AI LLMs integrated with Nostr.
The "Nostr:" URI
One feature of Nostr is it defines a custom URI scheme handler "nostr:". What is that?
A URI is used to identify a resource in a system. A system will have a protocol handler registry used to store such URI's, and if a system has a URI registered, then it knows what to do when it sees it. You are probably already familiar with some URI schemes such as "http:" and "mailto:". For example, when you click an http link, the system knows that it describes an http resource and opens a web browser to fetch the content from the internet.
A nostr: link operates in the same way. The nostr: prefix indicates a custom URI scheme specifically designed for the Nostr protocol. If a system has a Nostr application installed, that application may have registered "nostr:" in the protocol handler registry. On that system when a "nostr:" URI is clicked, the system will know that it describes a nostr resource and open the Nostr client to fetch the content from the nostr relay network.
This inter-op with the protocol handler registry gives us the power to do nice and exciting things with other technologies.
Nostr and NFC
Another technology that uses URIs is NFC cards. NFC (Near Field Communication) is a wireless technology that enables devices to exchange data over a few centimeters. It’s widely used in contactless payments, access control, and information sharing.
NFC tags are small chips embedded in cards or stickers which can store data like plain text, URLs, or custom URIs. They are very cheap (cents each) and widely available (Amazon with next day delivery).
When an NFC tag contains a URI, such as a http: (or nostr:) link, it acts as a trigger. Tapping the tag with an NFC-enabled device launches the associated application and processes the URI. For example, tapping a tag with "nostr:..." could open a Nostr client, directing it to a specific login page, public profile, or event.
This inter-op allows us to bridge the physical world to Nostr with just a tap.
Many useful ideas
There are many interesting ways to use this. Too many for me to explore. Perhaps some of these are interesting for your next side hustle?
- Nostr NFC "login cards" – tap to log into Amethyst on Android,
- Nostr NFC "business cards" – give to connections so they can tap to load your npub,
- Nostr NFC "payment cards" – integrating lightning network or ecash,
- Nostr NFC "doorbells", "punch cards", "drop boxes", or "dead drops" – put a tag in a specific place and tap to open a location-specific message or chat,
- Integrations with other access control systems,
- Integrations with other home automation systems,
- Many more ...
To start with I have built and use the "login card" and "business card" solutions. This blog post will show you how to do the same.
Nostr Login Card
You can use an NFC card to log into your Nostr client.
Most Nostr clients accept a variety of login methods, from posting your nsec into the app (insecure) to using a remote signer (more secure). A less known but more secure method is to sign into a session with a tap of a specially-configured NFC card. Amethyst is a Nostr client on Android which supports this type of login.
- A secure method for logging in
- Optionally keeps no log in history on the device after logout
- Does not require users to know or understand how keys work
- Keys are kept secure on a physically-separated card to reduce risk of compromise
Nostr devs think that this is useful for anti-establishment actors–Fair enough. For me, I am interested in this login card pattern as it could be useful for rolling out identities within an organisation context with less training (office workers are already familiar with door access cards). This pattern potentially abstracts away key management to the IT or ops team who provision the cards.
I first discovered this when Kohei demonstrated it in his video.
Here's how you set it up at a high level–
- Buy yourself some NFC cards
- Get your Nostr key ready in an encrypted, password protected format called "nencryptsec"
- Write the nencryptsec to the NFC card as a custom URI
- Tap to load the login screen, and enter your password to login
Here it is in detail–
Buy yourself some NFC cards
I found no specific requirements. As usual with Nostr so far, I tried to the cheapest possible route and it worked. Generic brand NFC cards shipped from China, I believe it was 50X for $15 from Amazon. Your mileage may vary.
Get your Nostr key ready
Your key will be saved to the NFC card in an encrypted password-protected format called "nencryptsec". Several applications support this. As we'll be using this to login to Amethyst, we will use Amethyst to output the nencryptsec for us.
- Login to Amethyst with your nsec,
- Open the sidebar and click "Backup Keys",
- Enter a password, and click "Encrypt and my secret key",
- It will add the password-protected key to your clipboard in the format "ncryptsec1...",
- Remember to backup your password.
Write the ncryptsec to the NFC card
- Download the free NFC Tools app to your device, and open it,
- Click "Write" and "Add a record", then click "Custom URL / URI",
- Paste your nencryptsec with the nostr URI in front, i.e. "nostr:ncryptsec1..." and click OK,
- Click "Write". NFC Tools will prompt you to "Approach an NFC tag",
- Place your NFC card against your phone, and it will write to the card,
- Your card is ready.
Tap to load the login screen
Tap the card against your phone again, and your phone should open the login screen of Amethyst and prompt you for your password.
Once you enter your password, Amethyst will decrypt your nsec and log you in.
Optionally, you can also set the app to forget you once you log out.
You have created a Nostr NFC "login card".
Nostr Business Card
You can use another NFC card to give anyone you meet a link straight to your Nostr profile.
I attended Peter McCormack's #CheatCode conference in Sydney and gave a few of these out following the Nostr panel, notably to Preston Pysh where it got some cut through and found me my first 100 followers. You can do the same.
To create your Nostr NFC "business card" is even easier than your NFC "login card".
- Buy yourself some NFC cards,
- Download the free NFC Tools app to your device, and open it,
- Click "Write" and "Add a record", then click "Custom URL / URI",
- Write your npub to the NFC card as a custom URI in the format "nostr:npub1..." (e.g. for me this is "nostr:npub1r0d8u8mnj6769500nypnm28a9hpk9qg8jr0ehe30tygr3wuhcnvs4rfsft"),
- Your card is ready.
Give the card to someone who is a Nostr user, and when they tap the card against their phone it will open their preferred Nostr client and go directly to your Nostr profile page.
You have created a Nostr NFC "business card".
What I Did Wrong
I like to share what I did wrong so you don't have to make the same mistakes. This time, this was very easy, and little went wrong. In general
- When password-protecting your nsec, don't forget the password!
- When writing to the NFC card, make sure to use "Custom URI/URL" as this accepts your "nostr:" URI scheme. If you use generic "URI/URL" it won't work.
What's Next
Over my first four blogs I have explored creating a good Nostr setup
- Mined a Nostr pubkey and backed up the mnemonic
- Set up Nostr payments with a Lightning wallet plus all the bells and whistles
- Set up NIP-05 and Lighting Address at my own domain
- Set up a Personal Relay at my own domain
Over the next few blogs I will be exploring different types of Nostr inter-op
- NFC cards integrated with Nostr (this post)
- Workflow Automations integrated with Nostr
- AI LLMs integrated with Nostr
Please be sure to let me know if you think there's another Nostr topic you'd like to see me tackle.
GM Nostr.
-
@ dbb19ae0:c3f22d5a
2025-02-01 09:06:49The Magic of
=()=
in Perl: Counting Matches with ElegancePerl is full of powerful and sometimes cryptic features, and one of the lesser-known yet highly useful tricks is the
=()=
operator. This clever construct allows you to count the number of matches in a string without using loops or unnecessary variables.
Understanding
=()=
: A Smart Counting TrickNormally, when you apply a regex with the
/g
(global match) flag, Perl finds all occurrences in the string. However, getting the count of those matches isn't as straightforward as you might expect.Consider this example:
perl my $str = "Hello 123, Perl 456!"; my $count = () = $str =~ /\w/g; print "Matched $count word characters.\n";
Breaking It Down
- Regex Matching (
$str =~ /\w/g
) - This searches for all word characters (
\w
→[A-Za-z0-9_]
) in$str
. -
The
/g
flag ensures it captures all occurrences instead of just the first one. -
The Empty List
()
- The regex match is assigned to an empty list
()
. -
This forces Perl to evaluate the regex in list context, where it returns all matches instead of just one.
-
Assigning to a Scalar (
$count
) - When a list is assigned to a scalar, Perl doesn't store the list—it simply counts its elements.
- The result?
$count
contains the number of matches.
Expected Output
Matched 15 word characters.
If you manually count the\w
matches (Hello123Perl456
), you'll find 15.
Why Not Use
scalar()
Instead?You might think this is equivalent to:
perl my $count = scalar($str =~ /\w/g); # will return 1
But this won't work!scalar($str =~ /\w/g)
only returns the last match found, not the count.=()=
is necessary because it forces list context, ensuring Perl counts all matches correctly.
Practical Use Cases
This trick is useful whenever you need to count occurrences without modifying the original string. Some real-world applications include:
✅ Counting words, numbers, or special characters in a string.
✅ Measuring how many times a pattern appears in a text.
✅ Quick validation checks (e.g., ensuring a string contains at leastn
digits).Example: Counting words in a sentence
perl my $sentence = "Perl is awesome!"; my $word_count = () = $sentence =~ /\b\w+\b/g; print "Word count: $word_count\n"; # Output: 3
Final Thoughts
The
=()=
operator might look like magic at first, but it's actually an elegant way to force list context and extract match counts without loops or extra variables. Whether processing text or just trying to optimize Perl scripts, this trick is a powerful addition to the Perl toolkit. - Regex Matching (
-
@ 5e5fc143:393d5a2c
2024-11-19 10:20:25Now test old reliable front end Stay tuned more later Keeping this as template long note for debugging in future as come across few NIP-33 post edit issues
-
@ 0271e1b9:ad8cff90
2025-02-01 07:39:31I study the greats. For if and when I find myself beaten down into the gutters of life - the vile, bile and the mundane - I shall draw strength from other great men - past, present and future - who, quite often, faced many more adversities and a lot more suffering, but chose to use them to their advantage, to overcome their dire circumstances and rise above the afflictions that life had bestowed upon them. It’s all been done before. It can be done again, better.
Learning from the past and from the present is very straightforward. Anyone can do that. But how does one learn from the future? It’s simple: you envision the best possible future for humanity, for generations to come, and for yourself. Then you figure out an approximate path on how to get there, and what kind of a man or a woman you must be to walk that path. The skills, the mindset, the qualities. And lastly, but perhaps most importantly, you find actionable measures, habits, convictions on how to become that person - and conversely, what are stopping you from becoming that person.
“You must value learning above everything else.”
― Robert Greene
“Those who have a 'why' to live, can bear with almost any 'how'.”
― Viktor E. Frankl
“You need to look at all events as having value. If you can do that, then you’re in a zone of tremendous opportunity.”
― Phil Stutz
“I shall take the more pains to uncover the fountains of philosophy, from which all my eloquence has taken its rise.”
― Marcus Tullius Cicero
“Error correction is the basis of all intelligence.”
― Jeff Booth
“Yes, you’re likely to fail, that’s fine. Because the goal of playing is not to win, but to keep learning. And the day you stop learning is the day you stop living."
― Jesse Enkamp
"A man is great not because he hasn't failed; a man is great because failure hasn't stopped him."
— Confucius
“If people knew how hard I had to work to gain my mastery, it would not seem so wonderful at all.”
― Michelangelo
“First of all we have to decide what we are to do and what manner of men we wish to be - the most difficult problem in the world.”
― Marcus Tullius Cicero
“You either bleed soul into your work, or let the work bleed out your soul.”
― Pran Yoganthan
"The Stoic philosopher is the man who has liberated himself from fear. He’s not afraid of death, he’s not afraid of pain, he’s not afraid of other people’s dismissal as a fool. The only thing he cares about is that he should meet his moral obligations.”
― Michael Sugrue
"The strong do what they can and the weak suffer what they must."
― Thucydides
“The brain is the most powerful weapon in the world.”
― David Goggins
“Man, the bravest of animals, and the one most accustomed to suffering, does not repudiate suffering as such; he desires it, he even seeks it out, provided he is shown a meaning for it, a purpose of suffering. The meaninglessness of suffering, not suffering itself, was the curse that lay over mankind so far.”
― Friedrich Nietzsche
"Consciousness is awareness with a choice."
― Thomas Campbell
“The essence of philosophy is that a man should so live that his happiness shall depend as little as possible on external things.”
― Epictetus
“It’s most real, it’s most good and it’s most salvific - it saves you, it transforms you. That’s the sacred.”
— John Vervaeke
“It is impossible for a man to learn what he thinks he already knows.”
― Epictetus
“Evolution is a process of iteration. There’s no master plan. It’s in each moment of what happens.”
― Michael Behrens
“Don’t follow anybody and don’t accept anyone as a teacher, except when you become your own teacher and disciple.”
― Jiddu Krishnamurti
“This is your life. You’re accountable. What are you gonna do about that?”
― James Hollis
By the way, if you enjoyed these quotes, feel free to follow a little side project of mine: Stoic Resurrection
Peace & Love,
Block height 881,748
-
@ f9cf4e94:96abc355
2025-01-18 06:09:50Para esse exemplo iremos usar: | Nome | Imagem | Descrição | | --------------- | ------------------------------------------------------------ | ------------------------------------------------------------ | | Raspberry PI B+ |
| Cortex-A53 (ARMv8) 64-bit a 1.4GHz e 1 GB de SDRAM LPDDR2, | | Pen drive |
| 16Gb |
Recomendo que use o Ubuntu Server para essa instalação. Você pode baixar o Ubuntu para Raspberry Pi aqui. O passo a passo para a instalação do Ubuntu no Raspberry Pi está disponível aqui. Não instale um desktop (como xubuntu, lubuntu, xfce, etc.).
Passo 1: Atualizar o Sistema 🖥️
Primeiro, atualize seu sistema e instale o Tor:
bash apt update apt install tor
Passo 2: Criar o Arquivo de Serviço
nrs.service
🔧Crie o arquivo de serviço que vai gerenciar o servidor Nostr. Você pode fazer isso com o seguinte conteúdo:
```unit [Unit] Description=Nostr Relay Server Service After=network.target
[Service] Type=simple WorkingDirectory=/opt/nrs ExecStart=/opt/nrs/nrs-arm64 Restart=on-failure
[Install] WantedBy=multi-user.target ```
Passo 3: Baixar o Binário do Nostr 🚀
Baixe o binário mais recente do Nostr aqui no GitHub.
Passo 4: Criar as Pastas Necessárias 📂
Agora, crie as pastas para o aplicativo e o pendrive:
bash mkdir -p /opt/nrs /mnt/edriver
Passo 5: Listar os Dispositivos Conectados 🔌
Para saber qual dispositivo você vai usar, liste todos os dispositivos conectados:
bash lsblk
Passo 6: Formatando o Pendrive 💾
Escolha o pendrive correto (por exemplo,
/dev/sda
) e formate-o:bash mkfs.vfat /dev/sda
Passo 7: Montar o Pendrive 💻
Monte o pendrive na pasta
/mnt/edriver
:bash mount /dev/sda /mnt/edriver
Passo 8: Verificar UUID dos Dispositivos 📋
Para garantir que o sistema monte o pendrive automaticamente, liste os UUID dos dispositivos conectados:
bash blkid
Passo 9: Alterar o
fstab
para Montar o Pendrive Automáticamente 📝Abra o arquivo
/etc/fstab
e adicione uma linha para o pendrive, com o UUID que você obteve no passo anterior. A linha deve ficar assim:fstab UUID=9c9008f8-f852 /mnt/edriver vfat defaults 0 0
Passo 10: Copiar o Binário para a Pasta Correta 📥
Agora, copie o binário baixado para a pasta
/opt/nrs
:bash cp nrs-arm64 /opt/nrs
Passo 11: Criar o Arquivo de Configuração 🛠️
Crie o arquivo de configuração com o seguinte conteúdo e salve-o em
/opt/nrs/config.yaml
:yaml app_env: production info: name: Nostr Relay Server description: Nostr Relay Server pub_key: "" contact: "" url: http://localhost:3334 icon: https://external-content.duckduckgo.com/iu/?u= https://public.bnbstatic.com/image/cms/crawler/COINCU_NEWS/image-495-1024x569.png base_path: /mnt/edriver negentropy: true
Passo 12: Copiar o Serviço para o Diretório de Systemd ⚙️
Agora, copie o arquivo
nrs.service
para o diretório/etc/systemd/system/
:bash cp nrs.service /etc/systemd/system/
Recarregue os serviços e inicie o serviço
nrs
:bash systemctl daemon-reload systemctl enable --now nrs.service
Passo 13: Configurar o Tor 🌐
Abra o arquivo de configuração do Tor
/var/lib/tor/torrc
e adicione a seguinte linha:torrc HiddenServiceDir /var/lib/tor/nostr_server/ HiddenServicePort 80 127.0.0.1:3334
Passo 14: Habilitar e Iniciar o Tor 🧅
Agora, ative e inicie o serviço Tor:
bash systemctl enable --now tor.service
O Tor irá gerar um endereço
.onion
para o seu servidor Nostr. Você pode encontrá-lo no arquivo/var/lib/tor/nostr_server/hostname
.
Observações ⚠️
- Com essa configuração, os dados serão salvos no pendrive, enquanto o binário ficará no cartão SD do Raspberry Pi.
- O endereço
.onion
do seu servidor Nostr será algo como:ws://y3t5t5wgwjif<exemplo>h42zy7ih6iwbyd.onion
.
Agora, seu servidor Nostr deve estar configurado e funcionando com Tor! 🥳
Se este artigo e as informações aqui contidas forem úteis para você, convidamos a considerar uma doação ao autor como forma de reconhecimento e incentivo à produção de novos conteúdos.
-
@ 13bb52c0:7a8bd512
2025-01-16 19:58:47¡Ya Tenemos un nuevo dominio https://VEINTIUNO.BTC.pub!
-
@ af9c48b7:a3f7aaf4
2024-11-18 20:26:07Chef's notes
This simple, easy, no bake desert will surely be the it at you next family gathering. You can keep it a secret or share it with the crowd that this is a healthy alternative to normal pie. I think everyone will be amazed at how good it really is.
Details
- ⏲️ Prep time: 30
- 🍳 Cook time: 0
- 🍽️ Servings: 8
Ingredients
- 1/3 cup of Heavy Cream- 0g sugar, 5.5g carbohydrates
- 3/4 cup of Half and Half- 6g sugar, 3g carbohydrates
- 4oz Sugar Free Cool Whip (1/2 small container) - 0g sugar, 37.5g carbohydrates
- 1.5oz box (small box) of Sugar Free Instant Chocolate Pudding- 0g sugar, 32g carbohydrates
- 1 Pecan Pie Crust- 24g sugar, 72g carbohydrates
Directions
- The total pie has 30g of sugar and 149.50g of carboydrates. So if you cut the pie into 8 equal slices, that would come to 3.75g of sugar and 18.69g carbohydrates per slice. If you decided to not eat the crust, your sugar intake would be .75 gram per slice and the carborytrates would be 9.69g per slice. Based on your objective, you could use only heavy whipping cream and no half and half to further reduce your sugar intake.
- Mix all wet ingredients and the instant pudding until thoroughly mixed and a consistent color has been achieved. The heavy whipping cream causes the mixture to thicken the more you mix it. So, I’d recommend using an electric mixer. Once you are satisfied with the color, start mixing in the whipping cream until it has a consistent “chocolate” color thorough. Once your satisfied with the color, spoon the mixture into the pie crust, smooth the top to your liking, and then refrigerate for one hour before serving.
-
@ ee7e3590:5602f192
2025-02-01 05:02:15You’re hitting on the core tension: unlimited demand for emergency care collides with finite resources, and pretending otherwise leads to either runaway costs or rationing-by-stealth. Let’s confront this head-on with free-market-aligned solutions that don’t ignore human realities:
1. Redefine "Emergency Care"
The U.S. legally mandates ERs to stabilize anyone, regardless of ability to pay (EMTALA). This creates moral hazard:
- Problem: Hospitals inflate prices on paying patients to offset uncompensated care.
- Free-Market Fix:
- Repeal EMTALA: Allow ERs to refuse non-critical cases (e.g., toothaches, rashes) unless prepaid or insured.
- Clarify "True Emergency": Legally define emergencies as immediate life threats (e.g., strokes, cardiac arrest) and let non-critical cases be diverted to urgent care.
- Consequence: ERs could price transparently for true emergencies, while non-critical cases face market-driven urgent care options.
2. Embrace Tiered Emergency Care
Not all emergencies require Level I trauma centers:
- Basic ERs: Staffed by NPs and paramedics for minor injuries (e.g., sprains, minor burns) at lower costs.
- Advanced ERs: For critical care (e.g., gunshot wounds), priced higher but competing via outcomes (e.g., survival rates).
- Example: India’s Ziqitza Healthcare operates ambulance tiers—basic vans for transport and advanced ICU units.
3. Address Moral Hazard with Insurance Innovation**
- Catastrophic Insurance Mandates: Require everyone to carry cheap, high-deductible plans covering only true emergencies (e.g., $10/month for coverage above $50k).
- Incentivizes price shopping for non-emergencies.
- Prevents freeloading on ERs.
- Risk-Adjusted Premiums: Smokers, skydivers, or diabetics pay higher premiums, aligning costs with personal choices.
4. Community-Based Safety Nets**
- Mutual Aid Networks: Local groups negotiate bulk ER rates (e.g., $100/month membership covers three ER visits annually).
- Crowdfunding ER Vouchers: Platforms like GoFundMe could partner with hospitals to prepurchase discounted emergency care slots.
5. Radical Transparency + Bankruptcy Reform**
- ER Debt Auctions: Let hospitals sell unpaid ER bills to collection agencies in real-time, creating competition to minimize patient liability.
- Flat-Fee ER Pricing: Hospitals post rates like “$5,000 for appendicitis stabilization, all-inclusive” to deter surprise billing.
- Ban Wage Garnishment for Medical Debt: Protect patients from lifelong ruin, forcing hospitals to price responsibly or absorb losses.
6. Accept Trade-Offs Explicitly**
The U.S. system fails because it hides rationing behind complexity. A free-market approach must embrace transparency:
- Option 1: Pay $100,000 for a 95% survival rate in a car crash.
- Option 2: Pay $20,000 for a 70% survival rate at a budget ER.
- Brutal but Honest: Let individuals (or insurers) choose their risk tolerance upfront.Example:
- Japan’s Price Controls: Caps ER costs but tolerates wait times (e.g., 8+ hours for non-critical care).
- Switzerland’s Mandates: Everyone buys insurance, but ERs charge $1,000+ deductibles to deter overuse.
7. Disrupt with Decentralized Care**
- Crypto-ERs: Blockchain-based emergency funds where contributors vote on covering members’ bills.
- AI-Guided Self-Care: Apps that stabilize patients en route to ERs (e.g., tourniquet tutorials, overdose reversal guidance).
8. Reform Malpractice to Reduce Defensive Medicine**
- “No Pay, No Harm” Liability: If a patient doesn’t pay, they can’t sue for malpractice (incentivizing upfront pricing).
- Safe Harbor Protocols: ERs using approved, cost-effective treatments (e.g., generics) get immunity from lawsuits.
The Uncomfortable Truth
A free market in emergency care requires accepting that not everyone will be saved—just as not everyone can afford a Ferrari. The alternative is the current U.S. model, which pretends to save everyone but bankrupts millions and still leaves 30% of ER visits unmet due to overcrowding.
By legalizing tiered care, deregulating monopolies, and forcing transparency, you create a system where:
- Elites pay premium prices for cutting-edge emergency care.
- Most get “good enough” stabilization at reasonable costs.
- Some choose cheap, high-risk options (or none at all).This isn’t pretty, but it’s honest—and arguably more ethical than today’s hidden rationing and financial toxicity.
-
@ 2e8970de:63345c7a
2025-02-01 09:39:04https://x.com/flavioAd/status/1885449107436679394
originally posted at https://stacker.news/items/872130
-
@ 41e6f20b:06049e45
2024-11-17 17:33:55Let me tell you a beautiful story. Last night, during the speakers' dinner at Monerotopia, the waitress was collecting tiny tips in Mexican pesos. I asked her, "Do you really want to earn tips seriously?" I then showed her how to set up a Cake Wallet, and she started collecting tips in Monero, reaching 0.9 XMR. Of course, she wanted to cash out to fiat immediately, but it solved a real problem for her: making more money. That amount was something she would never have earned in a single workday. We kept talking, and I promised to give her Zoom workshops. What can I say? I love people, and that's why I'm a natural orange-piller.
-
@ ee7e3590:5602f192
2025-02-01 05:00:39You’re hitting on the core tension: unlimited demand for emergency care collides with finite resources, and pretending otherwise leads to either runaway costs or rationing-by-stealth. Let’s confront this head-on with free-market-aligned solutions that don’t ignore human realities:
1. Redefine "Emergency Care"
The U.S. legally mandates ERs to stabilize anyone, regardless of ability to pay (EMTALA). This creates moral hazard:
- Problem: Hospitals inflate prices on paying patients to offset uncompensated care.
- Free-Market Fix:
- Repeal EMTALA: Allow ERs to refuse non-critical cases (e.g., toothaches, rashes) unless prepaid or insured.
- Clarify "True Emergency": Legally define emergencies as immediate life threats (e.g., strokes, cardiac arrest) and let non-critical cases be diverted to urgent care.
- Consequence: ERs could price transparently for true emergencies, while non-critical cases face market-driven urgent care options.
2. Embrace Tiered Emergency Care
Not all emergencies require Level I trauma centers:
- Basic ERs: Staffed by NPs and paramedics for minor injuries (e.g., sprains, minor burns) at lower costs.
- Advanced ERs: For critical care (e.g., gunshot wounds), priced higher but competing via outcomes (e.g., survival rates).
- Example: India’s Ziqitza Healthcare operates ambulance tiers—basic vans for transport and advanced ICU units.
3. Address Moral Hazard with Insurance Innovation**
- Catastrophic Insurance Mandates: Require everyone to carry cheap, high-deductible plans covering only true emergencies (e.g., $10/month for coverage above $50k).
- Incentivizes price shopping for non-emergencies.
- Prevents freeloading on ERs.
- Risk-Adjusted Premiums: Smokers, skydivers, or diabetics pay higher premiums, aligning costs with personal choices.
4. Community-Based Safety Nets**
- Mutual Aid Networks: Local groups negotiate bulk ER rates (e.g., $100/month membership covers three ER visits annually).
- Crowdfunding ER Vouchers: Platforms like GoFundMe could partner with hospitals to prepurchase discounted emergency care slots.
5. Radical Transparency + Bankruptcy Reform**
- ER Debt Auctions: Let hospitals sell unpaid ER bills to collection agencies in real-time, creating competition to minimize patient liability.
- Flat-Fee ER Pricing: Hospitals post rates like “$5,000 for appendicitis stabilization, all-inclusive” to deter surprise billing.
- Ban Wage Garnishment for Medical Debt: Protect patients from lifelong ruin, forcing hospitals to price responsibly or absorb losses.
6. Accept Trade-Offs Explicitly**
The U.S. system fails because it hides rationing behind complexity. A free-market approach must embrace transparency:
- Option 1: Pay $100,000 for a 95% survival rate in a car crash.
- Option 2: Pay $20,000 for a 70% survival rate at a budget ER.
- Brutal but Honest: Let individuals (or insurers) choose their risk tolerance upfront.Example:
- Japan’s Price Controls: Caps ER costs but tolerates wait times (e.g., 8+ hours for non-critical care).
- Switzerland’s Mandates: Everyone buys insurance, but ERs charge $1,000+ deductibles to deter overuse.
7. Disrupt with Decentralized Care**
- Crypto-ERs: Blockchain-based emergency funds where contributors vote on covering members’ bills.
- AI-Guided Self-Care: Apps that stabilize patients en route to ERs (e.g., tourniquet tutorials, overdose reversal guidance).
8. Reform Malpractice to Reduce Defensive Medicine**
- “No Pay, No Harm” Liability: If a patient doesn’t pay, they can’t sue for malpractice (incentivizing upfront pricing).
- Safe Harbor Protocols: ERs using approved, cost-effective treatments (e.g., generics) get immunity from lawsuits.
The Uncomfortable Truth
A free market in emergency care requires accepting that not everyone will be saved—just as not everyone can afford a Ferrari. The alternative is the current U.S. model, which pretends to save everyone but bankrupts millions and still leaves 30% of ER visits unmet due to overcrowding.
By legalizing tiered care, deregulating monopolies, and forcing transparency, you create a system where:
- Elites pay premium prices for cutting-edge emergency care.
- Most get “good enough” stabilization at reasonable costs.
- Some choose cheap, high-risk options (or none at all).This isn’t pretty, but it’s honest—and arguably more ethical than today’s hidden rationing and financial toxicity.
-
@ f4c59e4c:82f66850
2025-01-31 18:34:41Introduction
This governance report summarizes Dora Factory's voting activities from January 2025 across multiple blockchain ecosystems. It highlights their strategic approach to supporting ecosystem growth, enhancing security, and fostering innovation. Dora Factory’s participation in governance ensures alignment with long-term objectives and contributes to the sustainable development of various blockchain ecosystems such as Cosmos Hub, Celestia, dYdX, Injective, Kaia and Osmosis.
Proposals
2025-01-10 Cosmos Proposal 986 Yes Dora Factory voted YES on Cosmos Proposal 986 to approve a $650,000 budget to fund Hydro development and integrations in 2025. The proposal includes transferring 200k USDC and 86,538.46 ATOM to a Hydro-controlled wallet, with additional funds for grants and continued product development.
2025-01-17 Cosmos Proposal 987 Dora Factory voted YES on Cosmos Proposal 987 to approve the Gaia v22 software upgrade. The upgrade includes updates to the Cosmos Hub binary and has been tested by Informal Systems and Hypha Co-op.
2025-01-21 Celestia Proposal 5 Yes Dora Factory voted YES on Celestia Proposal 5 to increase the max block size to 8MiB and set the GovMaxSquareSize value to 128.
2025-01-17 dYdX Proposal 200 Yes Dora Factory voted YES on dYdX Proposal 200 to approve the dYdX Chain Software Upgrade v8.0.
2025-01-17 dYdX Proposal 202 Yes Dora Factory voted YES on dYdX Proposal 202 to approve the wind-down of the CIG-USD market.
2025-01-23 dYdX Proposal 203 Yes Dora Factory voted YES on dYdX Proposal 203 to lower the impact_notional parameter for the Long Tail, Safety, Isolated, and FX tiers from 2,500 to 1,000. This change aims to stabilize funding rates in less liquid markets, improving user experience and supporting market growth by mitigating fluctuations.
2025-01-28 dYdX Proposal 205 Yes Dora Factory voted YES on dYdX Proposal 205 to delist the OCEAN-USD, EURC-USD, WBTC-USD, and AMPL-USD markets.
2025-01-28 dYdX Proposal 206 Yes Dora Factory voted YES on dYdX Proposal 206 to distribute $1.5M in DYDX tokens to qualifying users in the Season 8 Incentive Program. The proposal outlines that the incentives will be distributed across 3,007 accounts based on the trading volume and data analysis, ensuring rewards go to users who contribute substantial volume and fees.
2025-01-11 Injective Proposal 477 Yes Dora Factory voted YES on Injective Proposal 477 to settle the BTC/wUSDM PERP, CHILLGUY/USDT PERP, and MOODENG/USDT PERP markets. The settlement prices for open positions will be determined based on the oracle price when the proposal is passed.
2025-01-12 Injective Proposal 478 Yes Dora Factory voted YES on Injective Proposal 478 to register several wallet addresses maintained by Stork on-chain. This update will ensure that prices relayed are verified by Stork, speeding up the process for listing new perpetual futures tokens.
2025-01-12 Injective Proposal 479 Abstain Dora Factory voted ABSTAIN on Injective Proposal 479, which seeks permission to upload the Incubator contract from NinjaFactory. The proposal relates to NinjaFactory, a no-code meme token launchpad enabling users to create and trade tokens with ease.
2025-01-12 Injective Proposal 480 Abstain Dora Factory voted ABSTAIN on Injective Proposal 480, which requests permission to upload the Pair contract from NinjaFactory.
2025-01-12 Injective Proposal 481 Abstain Dora Factory voted ABSTAIN on Injective Proposal 481, which requests permission to upload the CW20 contract from NinjaFactory.
2025-01-17 Injective Proposal 482 Yes Dora Factory voted YES on Injective Proposal 482 to settle the JUP/USDT PERP, POPCAT/USDT PERP, and MOTHER/USDT PERP markets. The settlement price of open positions will be based on the oracle price when the proposal is passed.
2025-01-21 Injective Proposal 484 Abstain Dora Factory voted ABSTAIN on Injective Proposal 484, which concerns the b3x-fund-management contract. This contract manages the protocol for creating and overseeing financial vaults, ensuring efficient and transparent management by setting configurations, enforcing role-based access, and supporting customizable vault settings.
2025-01-21 Injective Proposal 485 Abstain Dora Factory voted ABSTAIN on Injective Proposal 485, which involves the b3x-referral contract. This contract manages a referral reward system, allowing users to claim rewards based on verified signatures while enforcing strict ownership control over critical actions. The contract tracks rewards, verifies claims, and ensures sufficient funds for payouts.
2025-01-21 Injective Proposal 486 Abstain Dora Factory voted ABSTAIN on Injective Proposal 486, which concerns the b3x-staking contract. This contract manages the staking of CW20 tokens, allowing users to stake, claim rewards, and unstake assets.
2025-01-21 Injective Proposal 487 Abstain Dora Factory voted ABSTAIN on Injective Proposal 487, which concerns the b3x-vault contract. This contract enables the creation and management of vaults within the Injective blockchain ecosystem, supporting asset deposits, withdrawals, market and limit order executions, and fee management.
2025-01-23 Injective Proposal 488 Yes Dora Factory voted YES on Injective Proposal 488 to update the oracle for the XION/USDT PERP, HYPE/USDT PERP, W/USDT PERP, and ZRO/USDT PERP markets to use Pyth price feeds, aiming to improve the accuracy and reliability of price feeds.
2025-01-24 Injective Proposal 489 Yes Dora Factory voted YES on Injective Proposal 489 to confirm the final Open Liquidity Program (OLP) institutional performance for epoch 41 and approve the distribution of 39,221.467 INJ tokens. This includes 19,221.532 INJ vested from epoch 38 and 19,999.935 INJ as 50% of the OLP rewards for epoch 41.
2025-01-11 Kaia Proposal 13 Yes Dora Factory voted YES on Kaia Proposal 13 to approve the use of the Kaia Ecosystem Fund for liquidity bootstrapping in early 2025. This initiative allocates up to $2 million worth of KAIA to support liquidity pools for Kaia Wave Mini Dapps and Kaia Portal Partners. The goal is to enhance on-chain transactions, reduce slippage, and stabilize trading for new tokens. Contracts with partners will ensure the return of KAIA within a set timeframe.
2025-01-20 Kaia Proposal 14 No Dora Factory voted NO on Kaia Proposal 14 to approve a $330,000 payment for the full integration of KAIA and other tokens on the Kaia blockchain with Chainalysis. The proposal aimed to enhance security, transparency, and regulatory compliance by connecting the Kaia network to Chainalysis' blockchain data platform.
2025-01-10 Osmosis Proposal 890 Yes Dora Factory voted YES on Osmosis Proposal 890 to reposition and reallocate the stOSMO/OSMO static liquidity position. The proposal aims to transfer liquidity to a Margined Vault, increasing depth and flexibility while maintaining a backstop for the stOSMO peg.
2025-01-16 Osmosis Proposal 891 Yes Dora Factory voted YES on Osmosis Proposal 891 to dissolve protocol-held OSMO paired liquidity pools for minor assets. The proposal aims to support OSMO decoupling and return assets to the Community Pool.
2025-01-23 Osmosis Proposal 893 Yes Dora Factory voted YES on Osmosis Proposal 893 to increase the nBTC static limit within Alloyed BTC from 10% to 20%. This change is aimed at meeting the demand for BTC inflows via the Nomic decentralized bridge.
2025-01-27 Osmosis Proposal 896 Yes Dora Factory voted YES on Osmosis Proposal 896 to upgrade the IBC Rate Limiting contract, enhancing security with additional checks while preserving existing functionality.
Conclusion
Dora Factory’s votes highlight a commitment to supporting proposals that drive operational improvements, increase platform stability, and encourage ecosystem development. These efforts are integral to ensuring the continued success and scalability of those blockchain ecosystems.
-
@ a10260a2:caa23e3e
2025-01-15 16:53:44First off, big shoutout to Coinos for having support for adding a memo to BOLT12 offers. This provides a solid alternative for the pleb who wants to support mining decentralization but doesn’t want to set up a CLN node and pay thousands of sats for a channel only to get little rewards. This is the case for most of us who only have a miner or two (e.g. a Bitaxe and/or an S9).
Before we get into setting up Lightning payouts, you’ll want to have your miner configured to mine with OCEAN of course. You’ll also want to make sure that the bitcoin address you use is from a wallet that supports signing messages.
These are the ones listed in the OCEAN docs^1:
- Bitcoin Knots/Bitcoin Core
- Coldcard
- Electrum
- LND (Command Line)
- Seedsigner
- Sparrow
- Specter
- Trezor
I checked one of my favorite, user-friendly wallets — Blue Wallet — and it happens to support signing messages as well.
Just tap the three dots on the upper right and you’ll see the “Sign/Verify Message” button at the bottom.
Whichever wallet you choose, generate a receive address to use when configuring your miner (it’ll also be your OCEAN username).
Here’s how it looks on the Bitaxe (AxeOS)…
And the Antminer S9 (Braiins OS).
NOTE: There’s a slight difference in the URL format between the two apps. Other than that, the username will be your bitcoin address followed by the optional “.” + the nickname for your machine.
You can find more details on OCEAN’s get started page^2.
Alright, now that your miner is pointed at OCEAN. Let’s configure Lightning payouts!
Generating the BOLT12 Offer
In the Coinos app, go to Receive > Bolt 12.
Tap “Set memo” and set it to “OCEAN Payouts for [insert your bitcoin address]” (this text is case-sensitive). Use the same bitcoin address you used above to configure your miner(s).
After tapping OK, copy the BOLT12 offer (it should start with “lno”) and proceed to the next step.
Generating the Configuration Message
Navigate to the My Stats page by searching for your OCEAN Bitcoin address.
The click the Configuration link next to Next Block to access the configuration form.
Paste the BOLT12 offer here, update the block height to latest, click GENERATE, and copy the generated unsigned message.
Signing the Configuration Message
To sign the generated message, go back to Blue Wallet and use the signing function. Paste the configuration message in the Message field, tap Sign, and copy the signed message that’s generated.
Submitting the Signed Message
Once signed, copy the signature, paste it in the OCEAN configuration form, and click CONFIRM.
If all goes well, you should see a confirmation that the configuration was successful. Congrats! 🎉
All you gotta do now is sit back, relax, and wait for a block to be found…
Or you can look into setting up DATUM. 😎
originally posted at https://stacker.news/items/851025
-
@ 4ba8e86d:89d32de4
2024-11-14 09:17:14Tutorial feito por nostr:nostr:npub1rc56x0ek0dd303eph523g3chm0wmrs5wdk6vs0ehd0m5fn8t7y4sqra3tk poste original abaixo:
Parte 1 : http://xh6liiypqffzwnu5734ucwps37tn2g6npthvugz3gdoqpikujju525yd.onion/263585/tutorial-debloat-de-celulares-android-via-adb-parte-1
Parte 2 : http://xh6liiypqffzwnu5734ucwps37tn2g6npthvugz3gdoqpikujju525yd.onion/index.php/263586/tutorial-debloat-de-celulares-android-via-adb-parte-2
Quando o assunto é privacidade em celulares, uma das medidas comumente mencionadas é a remoção de bloatwares do dispositivo, também chamado de debloat. O meio mais eficiente para isso sem dúvidas é a troca de sistema operacional. Custom Rom’s como LineageOS, GrapheneOS, Iodé, CalyxOS, etc, já são bastante enxutos nesse quesito, principalmente quanto não é instalado os G-Apps com o sistema. No entanto, essa prática pode acabar resultando em problemas indesejados como a perca de funções do dispositivo, e até mesmo incompatibilidade com apps bancários, tornando este método mais atrativo para quem possui mais de um dispositivo e separando um apenas para privacidade. Pensando nisso, pessoas que possuem apenas um único dispositivo móvel, que são necessitadas desses apps ou funções, mas, ao mesmo tempo, tem essa visão em prol da privacidade, buscam por um meio-termo entre manter a Stock rom, e não ter seus dados coletados por esses bloatwares. Felizmente, a remoção de bloatwares é possível e pode ser realizada via root, ou mais da maneira que este artigo irá tratar, via adb.
O que são bloatwares?
Bloatware é a junção das palavras bloat (inchar) + software (programa), ou seja, um bloatware é basicamente um programa inútil ou facilmente substituível — colocado em seu dispositivo previamente pela fabricante e operadora — que está no seu dispositivo apenas ocupando espaço de armazenamento, consumindo memória RAM e pior, coletando seus dados e enviando para servidores externos, além de serem mais pontos de vulnerabilidades.
O que é o adb?
O Android Debug Brigde, ou apenas adb, é uma ferramenta que se utiliza das permissões de usuário shell e permite o envio de comandos vindo de um computador para um dispositivo Android exigindo apenas que a depuração USB esteja ativa, mas também pode ser usada diretamente no celular a partir do Android 11, com o uso do Termux e a depuração sem fio (ou depuração wifi). A ferramenta funciona normalmente em dispositivos sem root, e também funciona caso o celular esteja em Recovery Mode.
Requisitos:
Para computadores:
• Depuração USB ativa no celular; • Computador com adb; • Cabo USB;
Para celulares:
• Depuração sem fio (ou depuração wifi) ativa no celular; • Termux; • Android 11 ou superior;
Para ambos:
• Firewall NetGuard instalado e configurado no celular; • Lista de bloatwares para seu dispositivo;
Ativação de depuração:
Para ativar a Depuração USB em seu dispositivo, pesquise como ativar as opções de desenvolvedor de seu dispositivo, e lá ative a depuração. No caso da depuração sem fio, sua ativação irá ser necessária apenas no momento que for conectar o dispositivo ao Termux.
Instalação e configuração do NetGuard
O NetGuard pode ser instalado através da própria Google Play Store, mas de preferência instale pela F-Droid ou Github para evitar telemetria.
F-Droid: https://f-droid.org/packages/eu.faircode.netguard/
Github: https://github.com/M66B/NetGuard/releases
Após instalado, configure da seguinte maneira:
Configurações → padrões (lista branca/negra) → ative as 3 primeiras opções (bloquear wifi, bloquear dados móveis e aplicar regras ‘quando tela estiver ligada’);
Configurações → opções avançadas → ative as duas primeiras (administrar aplicativos do sistema e registrar acesso a internet);
Com isso, todos os apps estarão sendo bloqueados de acessar a internet, seja por wifi ou dados móveis, e na página principal do app basta permitir o acesso a rede para os apps que você vai usar (se necessário). Permita que o app rode em segundo plano sem restrição da otimização de bateria, assim quando o celular ligar, ele já estará ativo.
Lista de bloatwares
Nem todos os bloatwares são genéricos, haverá bloatwares diferentes conforme a marca, modelo, versão do Android, e até mesmo região.
Para obter uma lista de bloatwares de seu dispositivo, caso seu aparelho já possua um tempo de existência, você encontrará listas prontas facilmente apenas pesquisando por elas. Supondo que temos um Samsung Galaxy Note 10 Plus em mãos, basta pesquisar em seu motor de busca por:
Samsung Galaxy Note 10 Plus bloatware list
Provavelmente essas listas já terão inclusas todos os bloatwares das mais diversas regiões, lhe poupando o trabalho de buscar por alguma lista mais específica.
Caso seu aparelho seja muito recente, e/ou não encontre uma lista pronta de bloatwares, devo dizer que você acaba de pegar em merda, pois é chato para um caralho pesquisar por cada aplicação para saber sua função, se é essencial para o sistema ou se é facilmente substituível.
De antemão já aviso, que mais para frente, caso vossa gostosura remova um desses aplicativos que era essencial para o sistema sem saber, vai acabar resultando na perda de alguma função importante, ou pior, ao reiniciar o aparelho o sistema pode estar quebrado, lhe obrigando a seguir com uma formatação, e repetir todo o processo novamente.
Download do adb em computadores
Para usar a ferramenta do adb em computadores, basta baixar o pacote chamado SDK platform-tools, disponível através deste link: https://developer.android.com/tools/releases/platform-tools. Por ele, você consegue o download para Windows, Mac e Linux.
Uma vez baixado, basta extrair o arquivo zipado, contendo dentro dele uma pasta chamada platform-tools que basta ser aberta no terminal para se usar o adb.
Download do adb em celulares com Termux.
Para usar a ferramenta do adb diretamente no celular, antes temos que baixar o app Termux, que é um emulador de terminal linux, e já possui o adb em seu repositório. Você encontra o app na Google Play Store, mas novamente recomendo baixar pela F-Droid ou diretamente no Github do projeto.
F-Droid: https://f-droid.org/en/packages/com.termux/
Github: https://github.com/termux/termux-app/releases
Processo de debloat
Antes de iniciarmos, é importante deixar claro que não é para você sair removendo todos os bloatwares de cara sem mais nem menos, afinal alguns deles precisam antes ser substituídos, podem ser essenciais para você para alguma atividade ou função, ou até mesmo são insubstituíveis.
Alguns exemplos de bloatwares que a substituição é necessária antes da remoção, é o Launcher, afinal, é a interface gráfica do sistema, e o teclado, que sem ele só é possível digitar com teclado externo. O Launcher e teclado podem ser substituídos por quaisquer outros, minha recomendação pessoal é por aqueles que respeitam sua privacidade, como Pie Launcher e Simple Laucher, enquanto o teclado pelo OpenBoard e FlorisBoard, todos open-source e disponíveis da F-Droid.
Identifique entre a lista de bloatwares, quais você gosta, precisa ou prefere não substituir, de maneira alguma você é obrigado a remover todos os bloatwares possíveis, modifique seu sistema a seu bel-prazer. O NetGuard lista todos os apps do celular com o nome do pacote, com isso você pode filtrar bem qual deles não remover.
Um exemplo claro de bloatware insubstituível e, portanto, não pode ser removido, é o com.android.mtp, um protocolo onde sua função é auxiliar a comunicação do dispositivo com um computador via USB, mas por algum motivo, tem acesso a rede e se comunica frequentemente com servidores externos. Para esses casos, e melhor solução mesmo é bloquear o acesso a rede desses bloatwares com o NetGuard.
MTP tentando comunicação com servidores externos:
Executando o adb shell
No computador
Faça backup de todos os seus arquivos importantes para algum armazenamento externo, e formate seu celular com o hard reset. Após a formatação, e a ativação da depuração USB, conecte seu aparelho e o pc com o auxílio de um cabo USB. Muito provavelmente seu dispositivo irá apenas começar a carregar, por isso permita a transferência de dados, para que o computador consiga se comunicar normalmente com o celular.
Já no pc, abra a pasta platform-tools dentro do terminal, e execute o seguinte comando:
./adb start-server
O resultado deve ser:
daemon not running; starting now at tcp:5037 daemon started successfully
E caso não apareça nada, execute:
./adb kill-server
E inicie novamente.
Com o adb conectado ao celular, execute:
./adb shell
Para poder executar comandos diretamente para o dispositivo. No meu caso, meu celular é um Redmi Note 8 Pro, codinome Begonia.
Logo o resultado deve ser:
begonia:/ $
Caso ocorra algum erro do tipo:
adb: device unauthorized. This adb server’s $ADB_VENDOR_KEYS is not set Try ‘adb kill-server’ if that seems wrong. Otherwise check for a confirmation dialog on your device.
Verifique no celular se apareceu alguma confirmação para autorizar a depuração USB, caso sim, autorize e tente novamente. Caso não apareça nada, execute o kill-server e repita o processo.
No celular
Após realizar o mesmo processo de backup e hard reset citado anteriormente, instale o Termux e, com ele iniciado, execute o comando:
pkg install android-tools
Quando surgir a mensagem “Do you want to continue? [Y/n]”, basta dar enter novamente que já aceita e finaliza a instalação
Agora, vá até as opções de desenvolvedor, e ative a depuração sem fio. Dentro das opções da depuração sem fio, terá uma opção de emparelhamento do dispositivo com um código, que irá informar para você um código em emparelhamento, com um endereço IP e porta, que será usado para a conexão com o Termux.
Para facilitar o processo, recomendo que abra tanto as configurações quanto o Termux ao mesmo tempo, e divida a tela com os dois app’s, como da maneira a seguir:
Para parear o Termux com o dispositivo, não é necessário digitar o ip informado, basta trocar por “localhost”, já a porta e o código de emparelhamento, deve ser digitado exatamente como informado. Execute:
adb pair localhost:porta CódigoDeEmparelhamento
De acordo com a imagem mostrada anteriormente, o comando ficaria “adb pair localhost:41255 757495”.
Com o dispositivo emparelhado com o Termux, agora basta conectar para conseguir executar os comandos, para isso execute:
adb connect localhost:porta
Obs: a porta que você deve informar neste comando não é a mesma informada com o código de emparelhamento, e sim a informada na tela principal da depuração sem fio.
Pronto! Termux e adb conectado com sucesso ao dispositivo, agora basta executar normalmente o adb shell:
adb shell
Remoção na prática Com o adb shell executado, você está pronto para remover os bloatwares. No meu caso, irei mostrar apenas a remoção de um app (Google Maps), já que o comando é o mesmo para qualquer outro, mudando apenas o nome do pacote.
Dentro do NetGuard, verificando as informações do Google Maps:
Podemos ver que mesmo fora de uso, e com a localização do dispositivo desativado, o app está tentando loucamente se comunicar com servidores externos, e informar sabe-se lá que peste. Mas sem novidades até aqui, o mais importante é que podemos ver que o nome do pacote do Google Maps é com.google.android.apps.maps, e para o remover do celular, basta executar:
pm uninstall –user 0 com.google.android.apps.maps
E pronto, bloatware removido! Agora basta repetir o processo para o resto dos bloatwares, trocando apenas o nome do pacote.
Para acelerar o processo, você pode já criar uma lista do bloco de notas com os comandos, e quando colar no terminal, irá executar um atrás do outro.
Exemplo de lista:
Caso a donzela tenha removido alguma coisa sem querer, também é possível recuperar o pacote com o comando:
cmd package install-existing nome.do.pacote
Pós-debloat
Após limpar o máximo possível o seu sistema, reinicie o aparelho, caso entre no como recovery e não seja possível dar reboot, significa que você removeu algum app “essencial” para o sistema, e terá que formatar o aparelho e repetir toda a remoção novamente, desta vez removendo poucos bloatwares de uma vez, e reiniciando o aparelho até descobrir qual deles não pode ser removido. Sim, dá trabalho… quem mandou querer privacidade?
Caso o aparelho reinicie normalmente após a remoção, parabéns, agora basta usar seu celular como bem entender! Mantenha o NetGuard sempre executando e os bloatwares que não foram possíveis remover não irão se comunicar com servidores externos, passe a usar apps open source da F-Droid e instale outros apps através da Aurora Store ao invés da Google Play Store.
Referências: Caso você seja um Australopithecus e tenha achado este guia difícil, eis uma videoaula (3:14:40) do Anderson do canal Ciberdef, realizando todo o processo: http://odysee.com/@zai:5/Como-remover-at%C3%A9-200-APLICATIVOS-que-colocam-a-sua-PRIVACIDADE-E-SEGURAN%C3%87A-em-risco.:4?lid=6d50f40314eee7e2f218536d9e5d300290931d23
Pdf’s do Anderson citados na videoaula: créditos ao anon6837264 http://eternalcbrzpicytj4zyguygpmkjlkddxob7tptlr25cdipe5svyqoqd.onion/file/3863a834d29285d397b73a4af6fb1bbe67c888d72d30/t-05e63192d02ffd.pdf
Processo de instalação do Termux e adb no celular: https://youtu.be/APolZrPHSms
-
@ 19fd5e65:946640b2
2025-01-31 08:04:34Согласно новому исследованию Workplace Intelligence и Международной бизнес-школы Hult, работодатели скептически настроены по отношению к выпускникам вузов. 37% опрошенных работодателей предпочли бы нанять робота или ИИ, чем недавнего выпускника колледжа. Эта поразительная статистика отражает растущую озабоченность по поводу готовности молодых специалистов к работе и проливает свет на меняющиеся ожидания работодателей.
Почему работодатели скептичны?
96% руководителей HR считают, что вузы не готовят студентов должным образом к современным реалиям рынка труда. 89% работодателей признались, что активно избегают найма недавних выпускников из-за отсутствия у них практического опыта, недостатка soft skills, таких как коммуникация и умение работать в команде, и даже базовых знаний делового этикета.
Этот разрыв между вузами и бизнесом приводит к необходимости дорогостоящего обучения и адаптации новых сотрудников. По оценкам HR-специалистов, они могли бы сэкономить более 4500 долларов на каждого сотрудника, если бы кандидаты были готовы к работе с первого дня. На рынке труда, где ценится эффективность, этот пробел в готовности делает ИИ или другие альтернативы более привлекательными.
Кризис доверия и сожаления о выборе
Результаты исследования также отражают кризис доверия среди самих выпускников. 77% опрошенных заявили, что узнали больше за первые шесть месяцев работы, чем за все время обучения в бакалавриате, а 55% считают, что их образование вообще не подготовило их к работе. Почти все выпускники (94%) сожалеют о выборе специальности, причем 43% считают, что это негативно повлияло на их карьерные перспективы и финансовое будущее.
Что это значит для работодателей и вузов?
Для работодателей предпочтение ИИ новым выпускникам подчеркивает необходимость срочных изменений в подходе компаний и образовательных учреждений к подготовке молодых специалистов. Хотя ИИ может обеспечить эффективность, ему не хватает креативности, адаптивности и эмоционального интеллекта, присущих людям. Это подтверждает важность разработки программ, которые помогают выпускникам приобретать не только технические навыки, но и soft skills, которые работодатели ценят превыше всего.
Опрошенные HR-руководители подчеркнули необходимость таких навыков, как коммуникация (98%), сотрудничество (92%) и критическое мышление (87%). Сотрудничая с вузами для разработки более практичных учебных программ, ориентированных на навыки, или инвестируя в комплексные программы адаптации, работодатели могут помочь преодолеть разрыв в готовности, а не обходить его с помощью ИИ.
Исследование Workplace Intelligence и Hult дает четкий вывод: как образовательные учреждения, так и работодатели должны адаптироваться, чтобы подготовить молодых специалистов к быстро меняющемуся рынку труда. Для вузов это означает включение в учебные программы реальных задач, обучения работе с ИИ и коучинга. Для работодателей это означает поиск баланса между краткосрочной эффективностью и долгосрочным развитием, чтобы использовать весь потенциал следующего поколения работников.
-
@ ea30c5a8:f76a0295
2025-01-30 21:59:17i guess this is wotking correctly?
-
@ ea30c5a8:f76a0295
2025-01-30 21:58:25whats up yall doing some more testing using nostrmo, amber, citrine, pokey on my shitty android.
-
@ f1989a96:bcaaf2c1
2025-01-31 21:22:59In the summer of 2023, the Human Rights Foundation (HRF) launched a Bitcoin Bounty program aimed at funding software developers to create new tools and features for Bitcoin tailored to the needs of dissidents and human rights advocates challenging authoritarianism worldwide. These bounties ranged from UX improvements to privacy upgrades and open-sourcing closed and permissioned systems.
There were 11 bounties in total, each with specific objectives. The deadline was Dec. 31, 2024.
We are excited to announce that every single bounty was claimed and that the resulting tools and upgrades are now empowering human rights activists daily across popular apps such as Blue Wallet, Zeus, Stack Wallet, Iris, Coracle, Keeper, Bull Bitcoin, Cake Wallet, and more.
This program highlights the impact of collaboration between human rights activists and software developers to create better tools for freedom. HRF is proud to have played a role in this effort and looks forward to continuing similar programs in the future. Special credit goes to the Oslo Freedom Forum, where much of the critical interaction between developers and activists occurred.
This wave of bounties was inspired by a successful pilot project in 2021, executed in partnership with Strike and Jack Mallers, which supported developers like Will Cassarin and Calle. Their innovations later gave rise to important advancements such as zaps in Nostr and the Cashu ecash protocol.
Bounty Details
1. Open-Sourcing the Design Guide
Winner: CypherStack for porting the Bitcoin UI Kit from Figma to an open-source Penpot project (2 BTC awarded).
Many UI kits are created using proprietary software like Figma. While these tools are powerful, they require licenses and are not accessible to everyone — an obstacle for developers working on open-source projects or those with limited funds. This creates a barrier to entry for designers and developers wanting to contribute to the Bitcoin ecosystem. This bounty was awarded to CypherStack for porting the Bitcoin UI Kit from Figma to Penpot, an open-source design tool similar to Figma, but free and accessible to everyone. This helped democratize access to information and resources, promote collaboration, and make it easier for developers to create high-quality Bitcoin tools, which in turn helped to increase Bitcoin adoption.
2. Serverless Payjoin
Winners: This is a two-part bounty. The first bounty is for the development of the Serverless Payjoin specification, and the second bounty is for any wallets that implement Serverless Payjoin.
Part 1: Dan Gould for his work on PayJoin V2 (1 BTC)
Part 2: Dan Gould, Spacebear from Payjoin DevKit, and Bull Bitcoin app, for their collaborative effort implementing Payjoin into the Bull Bitcoin wallet (0.5 BTC split three ways).
PayJoin is a privacy upgrade to Bitcoin that flusters mass surveillance attempts on the network. Traditional implementations have required the receiver to run a server for transaction coordination, creating a barrier to adoption. Serverless PayJoin removed this dependency and simplified the process. Serverless PayJoin also eliminated the need for receiver-hosted infrastructure and reduced censorship risks by removing a central point of failure — a significant advantage for activists and nonprofits operating under repressive regimes. This bounty resulted in the first mobile app (Bull Bitcoin) with integrated PayJoin send and receive support, an important advancement that provided robust privacy protections against surveillance for at-risk individuals.
3. End-to-End Encrypted Nostr Group Chats
Winners: Martti Malmi for incorporating encrypted group chat functionality into the Iris Nostr client (1 BTC) and to Vitor Pamplona, hodlbod, and Paul Miller for their work on NIP-17, which allowed users to encrypt and share Nostr messages in a way that can be recognized across different Nostr clients (1 BTC).
End-to-End Encrypted (E2EE) Nostr Group Chats are private, secure messaging groups built on the Nostr protocol, a decentralized communication system. While Nostr messages are already encrypted, they still expose metadata, allowing outside observers to see who is communicating and when. This bounty focused on preventing metadata leakage, ensuring that these details remain private. By leveraging Nostr’s decentralized architecture, these chats offered censorship resistance. They prevented conversations from being surveilled, blocked, or controlled by a central authority, and as a result of this bounty, have now been implemented into popular Nostr clients like Iris, Amethyst, and Coracle. This is an important step forward for activists, journalists, and communities who risk losing their freedom of speech under oppressive regimes.
4. Silent Payments
Winners: cygnet3 and Sosthene for their contributions to critical libraries for delivering Silent Payments and for developing a mobile wallet capable of sending and receiving Silent Payments without requiring a full node (1 BTC).
Silent Payments are a privacy-enhancing Bitcoin addressing scheme that allows a sender to generate a unique static address for a recipient without requiring any interaction (while still allowing the recipient to detect and spend the received funds). This breaks common tracking methods used by surveillance firms and autocracies and makes it harder to link payments to a specific recipient. By improving on the privacy of traditional Bitcoin addresses, Silent Payments enhanced financial privacy, making them ideal for donations, salaries, and other sensitive transactions. This bounty code has been fully integrated into Cake Wallet, and several other major wallets like Wasabi, Blue Wallet, and Bitbox have added partial functionality. This brings Silent Payments to tens of thousands of users and marks a major step in real-world Bitcoin privacy.
5. Human-Readable Offers
Winners: Stephen DeLorme, Chad Welch, and Evan Kaloudis for Twelve Cash and its integration into Zeus Wallet (1 BTC).
Human-Readable Offers simplify Bitcoin payments by replacing complex Bitcoin addresses and invoices with user-friendly text. This is especially important for Lightning Network transactions, which currently involve a cumbersome process of generating invoices for each payment. With Human-Readable Offers, sending Lightning payments becomes as simple as sending an email (just by entering a username). This approach, similar to many fintech apps today, reduces errors, lowers the barrier to entry, increases trust, and is crucial for broader adoption of Bitcoin among new and seasoned users alike. It’s also important for people who don’t have access to smartphones and cannot copy and paste or use QR codes. Today, as a result of this bounty, Zeus users connected to a Core Lightning node can create a human-readable Bolt 12 offer to privately receive donations.
6. Self-Custodial Mobile Lightning Address
Winner: Evan Kaloudis for Zeus Wallet (1 BTC).
Activists, nonprofits, and content creators often use Lightning addresses to receive donations quickly and easily. However, setting up and managing a Lightning address presents a challenge: users have to choose between the self-sovereignty of managing their own web server (a complex process) or the convenience of a custodial service, which requires trusting a third party with their funds. This bounty directly addressed this issue. It allowed users of Zeus Wallet, one of the most popular self-custodial Bitcoin Lightning wallets, to easily and securely receive donations through a Lightning address while maintaining control of their funds.
7. Mobile Border Wallets
Winner: Bitcoin Tribe for their border wallet functionality, allowing users to create and memorize seeds without relying on written backups, and for building a React Native library, making it easier for other wallets to integrate this feature (2 BTC).
Mobile Border Wallets aimed to solve a critical problem with traditional Bitcoin seed phrase backups: they’re often written down on paper, making them susceptible to being lost, destroyed, or stolen. This makes securing a user’s Bitcoin a delicate balance between security and accessibility. It also makes it challenging, especially for activists or refugees who frequently cross international borders. Border Wallets offered a solution to this problem. Instead of writing down a 12- or 24-word seed phrase and finding a secure place to store it, users can upload a randomly generated grid of words to the cloud and memorize a pattern to secure their seed phrase, similar to a pattern a user would memorize and draw on an Android device to unlock it. This initiative resulted in a user-friendly mobile app that allowed users to create Border Wallets digitally, enhancing accessibility and offering an alternative to physical storage like printed paper or metal seed plates.
8. Easy Mobile Multisig
Winner: Bitcoin Keeper (1 BTC).
Multi-signature wallets allow multiple users to collaboratively control a Bitcoin wallet. This enhances security by requiring consensus before funds can be moved. Traditional multisig wallets often require physical hardware wallets or involve subscription fees, presenting a significant barrier for organizations exploring Bitcoin adoption. This bounty funded the development of easy mobile multisig functionality in the Bitcoin Keeper app, enabling users to set up a 2-of-3 multisig (requiring two out of three keys to authorize spending) to secure and manage their bitcoin. This is a great feature for activists to prevent government seizure of funds: even if one key holder gets detained, the funds are safe so long as the other two key holders are safe. The idea is to make sure two of the keys are held by entities outside of one’s country or threat zone.
9. FROST Multisig Wallet
Winner: CypherStack for Stack Wallet, which enables dynamic multisig using FROST, allowing users to modify signer sets without moving funds (1 BTC).
Multisig (multisignature) wallets require multiple signatures to authorize a transaction. This enhances security by distributing control over funds. However, traditional multisig setups — while secure — can be inflexible. If you need to change the set of signers, it often requires moving all the funds to a new multisig wallet with the updated signer set. This is burdensome, time-consuming, and incurs fees. FROST is a cryptographic protocol that offers significant advantages for multisig wallets. It provides dynamic multisig functionality, meaning users can easily adjust their signer sets as needed without affecting the funds within. This is an important functionality for nonprofits and civil society groups who often need to adjust their authorized signatories, especially in situations where a regime may seize a private key and that key then needs to be deprecated. This dynamic kind of secure setup is now available for activists to use on the Stack Wallet.
10. Cashu Upgrades
Winners: eNuts Wallet (0.5 BTC), Misovan for Minibits Wallet (0.5 BTC), Gandlaf for Proxnut (0.5 BTC), and Gandlaf for adding Cashu-TS restore functionality (0.5 BTC).
Cashu is a digital cash system designed for privacy and speed. It is like physical cash, but in digital form and uses blind signatures for private transactions. With Cashu, transactions are instant, low-fee, and can operate offline. There is no blockchain or transaction graph to be surveilled. Bounty recipients addressed critical aspects of usability and accessibility for Cashu tools: eNuts and Minibits Wallets brought Cashu to iOS and Android users worldwide, Proxnut enabled easy web integration for payments, and Cashu-TS Restore added crucial seed phrase backup. Together, these projects have taken Cashu from a more theoretical concept to a practical one and have been relevant for use cases like donations, content monetization, daily transactions, and cross-border payments.
11. BIP47 Expansion
Winner: Blue Wallet (0.5 BTC) for adding BIP 47 support.
BIP47 is a Bitcoin Improvement Proposal that enhances payment privacy for Bitcoin users. In Bitcoin, it’s generally considered bad privacy practice to reuse the same Bitcoin address for multiple transactions. It can link those transactions together and make it easier to track a user’s spending in high-risk environments. Generating a new address for each payment has become a common workaround, but this becomes cumbersome. BIP47 solves this with reusable payment codes. Users receiving funds generate a BIP47 payment code and share it with those who will be sending them payments. Each time a payment is initiated, a new, unused Bitcoin address is generated from the recipient’s payment code. This ensures every transaction uses a unique address. Blue Wallet received this bounty for integrating BIP47 support, making this important privacy enhancement accessible to its growing user base.
HRF’s Financial Freedom program educates activists worldwide, unites people from different industries and backgrounds, and makes grants in the service of advancing Bitcoin as a tool for human rights. To receive HRF’s weekly Financial Freedom Report, subscribe here.
For media inquiries or interview requests, please contact media @ hrf.org.
-
@ fd208ee8:0fd927c1
2024-11-08 10:27:40You have no idea
I regularly read comments from people, on here, wondering how it's possible to marry -- or even simply be friends! -- with someone who doesn't agree with you on politics. I see this sentiment expressed quite often, usually in the context of Bitcoin, or whatever pig is currently being chased through the village, as they say around here.
It seems rather sensible, but I don't think it's as hard, as people make it out to be. Further, I think it's a dangerous precondition to set, for your interpersonal relationships, because the political field is constantly in flux. If you determine who you will love, by their opinions, do you stop loving them if their opinions change, or if the opinions they have become irrelevant and a new set of opinions are needed -- and their new ones don't match your new ones? We could see this happen to relationships en masse, during the Covid Era, and I think it happens every day, in a slow grind toward the disintegration of interpersonal discourse.
I suspect many people do stop loving, at that point, as they never really loved the other person for their own sake, they loved the other person because they thought the other person was exactly like they are. But no two people are alike, and the longer you are in a relationship with someone else, the more the initial giddiness wears off and the trials and tribulations add up, the more you notice how very different you actually are. This is the point, where best friends and romantic couples say, We just grew apart.
But you were always apart. You were always two different people. You just didn't notice, until now.
I've also always been surprised at how many same-party relationships disintegrate because of some disagreement over some particular detail of some particular topic, that they generally agree on. To me, it seems like an irrelevant side-topic, but they can't stand to be with this person... and they stomp off. So, I tend to think that it's less that opinions need to align to each other, but rather that opinions need to align in accordance with the level of interpersonal tolerance they can bring into the relationship.
I was raised by relaxed revolutionaries
Maybe I see things this way because my parents come from two diverging political, cultural, national, and ethnic backgrounds, and are prone to disagreeing about a lot of "important" (to people outside their marriage) things, but still have one of the healthiest, most-fruitful, and most long-running marriages of anyone I know, from that generation. My parents, you see, aren't united by their opinions. They're united by their relationship, which is something outside of opinions. Beyond opinions. Relationships are what turn two different people into one, cohesive unit, so that they slowly grow together. Eventually, even their faces merge, and their biological clocks tick to the same rhythm. They eventually become one entity that contains differing opinions about the same topics.
It's like magic, but it's the result of a mindset, not a worldview. Or, as I like to quip:
The best way to stay married, is to not get divorced.
My parents simply determined early on, that they would stay together, and whenever they would find that they disagreed on something that didn't directly pertain to their day-to-day existence with each other they would just agree-to-disagree about that, or roll their eyes, and move on. You do you. Live and let live.
My parents have some of the most strongly held personal opinions of any people I've ever met, but they're also incredibly tolerant and can get along with nearly anyone, so their friends are a confusing hodgepodge of people we liked and found interesting enough to keep around. Which makes their house parties really fun, and highly unusual, in this day and age of mutual-damnation across the aisle.
The things that did affect them, directly, like which school the children should attend or which country they should live in, etc. were things they'd sit down and discuss, and somehow one opinion would emerge, and they'd again... move on.
And that's how my husband and I also live our lives, and it's been working surprisingly well. No topics are off-limits to discussion (so long as you don't drone on for too long), nobody has to give up deeply held beliefs, or stop agitating for the political decisions they prefer.
You see, we didn't like that the other always had the same opinion. We liked that the other always held their opinions strongly. That they were passionate about their opinions. That they were willing to voice their opinions; sacrifice to promote their opinions. And that they didn't let anyone browbeat or cow them, for their opinions, not even their best friends or their spouse. But that they were open to listening to the other side, and trying to wrap their mind around the possibility that they might just be wrong about something.
We married each other because we knew: this person really cares, this person has thought this through, and they're in it, to win it. What "it" is, is mostly irrelevant, so long as it doesn't entail torturing small animals in the basement, or raising the children on a diet of Mountain Dew and porn, or something.
Live and let live. At least, it's never boring. At least, there's always something to ~~argue~~ talk about. At least, we never think... we've just grown apart.
-
@ 3ad01248:962d8a07
2025-01-30 18:45:07Well we finally have our first so called "Bitcoin President" in office. It's been a solid 10 days in office now and things are playing out exactly how many thought it would. Immigration raids, federal funds being frozen and to top it all off talks of a crypto reserve instead of Bitcoin Strategic Reserve (BSR) as we were promised on the campaign trail in exchange for our votes.
The reaction from Bitcoiners has been varied to say the least. There are some who are disappointed that Trump didn't declare a BSR on day one and there are others that want to give him to to work through his other political priorities. I am of the opinion that if you promise a Bitcoin Strategic Reserve on day one that you have to follow through on something like that.
This idea came from Strike CEO Jack Mallers so the source was reputable and put that expectation on the minds of Bitcoiners, so to see this fall through is kind of a let down. There are rumblings that backers of the Ripple Blockchain are actively lobbying Trump to include Ripple in some kind of "crypto reserve".
It looks like their lobbying efforts have been paying off so far. Trump did announce an executive order on pertaining to crypto more broadly. The EO established a "Presidential Working Group" on digital asset markets. Whatever the hell this means is beyond me but it does take the Trump administration focus off of Bitcoin which isn't a good development.
When combined with Trump launching a memecoin before he even stepped into office means that Bitcoiners inside and outside of the administration need to step up and keep the pedal to the meddle to make the BSR a reality.
The Bitcoiners around Trump have done a admirable job getting the Trump administration to where they are today and have undoubtedly has made the political environment better for Bitcoiners in general but they can't lose focus now.
A question that I have been thinking about myself is should Bitcoiners even advocated for a Bitcoin Strategic Reserve? I thought we were all about separating money and state. The federal government acquiring Bitcoin is antithetical to the whole point of why Bitcoin was created in the first place.
When I see the big names in Bitcoin all salivating and cheering on a BSR I'm like they just want their bags pumped. What happened to the revolution they were espousing during the bear market? I get it, who doesn't want their bags to be pumped? Hodling is psychologically tough so finally seeing that hard work pay off is a natural desire but at the expense of giving up your principles, I'm not so sure its worth it to be honest.
A superpower nation such as the US or China using Bitcoin to supercharge what they are doing now is bad for the entire world. Who is to say that they won't use their reserves to manipulate the market, borrow against their reserve to fund more military expansion and surveillance technology to further enslave the world.
Governments are no longer accountable to the people and will do whatever they want to keep power and keep their citizens subjugated. Bitcoin adoption at the nation state level is something we should not be cheering on.
Bitcoin has been and should always be a bottom up movement. In order to take away power from the state and bring the power back to the people they need a economic alternative that isn't controlled by the state. By taking away the power of the state to tax and monitor transactions slowly drains the power of the state to oppress the people.
Bitcoiners should be encouraging and creating more Bitcoin circular economies such as:
Your bags will be pumped when we get more individuals onto the Bitcoin Standard. Going the BSR route is a shortcut that is shortsighted and undermines the whole mission of Bitcoin. I fear the cat is already out of the bag as we see more and more countries and jurisdiction announce setting up their own BSR's. As an individual keep advocating for your friends, family and neighbors to adopt a Bitcoin standard before governments get their paws on it. Good luck and Godspeed.
-
@ 19306922:c06688d2
2025-01-31 21:14:52At a time when data-gathering technologies are dominating all aspects of everyday life, governmental agencies such as The National Security Agency have considerable surveillance and control authority. The National Security Agency runs surveillance programs on not just violent international criminals, but also ordinary citizens within the country. A tremendous amount of effort is being made to keep these programs from being critiqued and shared with the public. In this paper, I will discuss whistleblowing and its relevance in establishing a more democratic structure in governmental institutions, through the cases of Edward Snowden and Thomas Drake. Firstly, I will emphasize Edward Snowden's action as an example of illegal whistleblowing and how he acts closer to civic disobedience rather than espionage. Following that, I will discuss Thomas Drake's espionage charge while legally criticizing The National Security Agency's programs and the inadequacy of whistleblower protection laws.
In our everyday lives, we come into contact with or utilize a variety of technological equipment such as security cameras, GPS devices, iris scanners, and so on. Everything we do, from buying things from shopping malls to searching for information on the internet, is kept in massive databases. Without even our knowledge, our data, which is vast enough to create our entire profile, is in the databases of a private firm or the government. That's why the surveillance network is getting bigger and bigger. Most of the surveillance tools and the capability to regulate these tools are under state control. The government also agrees with data aggregators -companies that collect data from multiple sources and make it available to customers in a value-added format- to access more data. The US Department of Justice has an $8 million agreement with data aggregator company ChoicePoint (Stanley, Steinhardt 2014). In this way, The Justice Department can access many civilians' information in the company's database. Although this surveillance mechanism seems to be an effective way to track and detect many illegal incidents such as terrorism, money laundering, etc., this surveillance network can easily be applied to ordinary civilians. For example, in 2002, Attorney General John Ashcroft released new domestic spy guidelines that dramatically expanded federal agents' ability to monitor on American civilians (Stanley, Steinhardt 2014). The American government also is running programs to spy on ordinary citizens, according to information obtained from the National Security Agency documents which leaked to the media on multiple occasions (Greenberg, 2013).
The National Security Agency (NSA) began as a cryptology-focused agency and has since grown into an intelligence agency that gathers data from enemies of the United States of America (Verble, 2014). The surveillance and data collection programs of NSA, however, are not carried out just to keep enemies at bay. Information on the NSA's programs was provided to the media by Thomas A. Drake, a senior executive at the NSA, and Edward J. Snowden, who also worked as a computer intelligence consultant at the NSA. As a result of all of these events, it is fairly obvious that the state and its institutions are conducting unethical surveillance to the civilians. However, the two people who raised awareness of this unethical operation by providing classified and declassified NSA documents to the media faced major crises. Both Thomas Drake and Edward Snowden faced charges under the Espionage Act. Despite the fact that two former NSA employees used different methods to prevent these surveillance programs, which were developed to spy on citizens using their taxes, both were charged with treason. In this article, I will discuss the whistleblowing act through Thomas Drake and Edward Snowden examples, as well as the significance of whistleblowing in inspecting institutions with tremendous authority, such as centralized databases. Whistleblowing is described as the act of an employee, typically within the organization, who reveals illegal, immoral, or inefficient information or actions within a private, public, or government institution. Daniel Ellsberg, one of the authors of the document, leaked information concerning the United States' political and military engagement in Vietnam between 1945 and 1967, also known as the Pentagon Papers. These papers, which revealed that the American government of the time did not accurately reflect information about Vietnam to the public, became the subject of the most well-known whistleblowing act in American history. Daniel Ellsberg faced charges under the Espionage Act (Greenberg, 2013). It is problematic to think that sharing the information with the public about crucial topics such as the state is systematically lying to the public or spying on them in a wide surveillance network is equated with espionage. The development of democratic regimes necessitates public debate and regulation of this type of government acts. I will demonstrate the significance through the examples of acts of Edward Snowden and Thomas Drake.
The Case of Edward Snowden
At one point, Edward Snowden's and Thomas Drake's whistleblowing actions differ. While Edward Snowden got confidential material from the NSA and shared it with the media directly, Thomas Drake initially attempted to prevent or regulate programs run by NSA from inside the organization by taking a legal path.
Firstly, using Edward Snowden as an example, I will evaluate the role of becoming an illegal whistleblower by sharing classified information with the public. Edward Snowden released highly classified information from NSA in 2013, revealing the NSA's surveillance operations with the cooperation of telecommunications companies and European governments. Snowden was charged under the Espionage Act and stealing government property by the US Department of Justice, and his passport was canceled by the Department of State. Not only that, the efforts were made to portray him as a traitor. Before leaking the information to the media, Edward Snowden was a 29-year-old consultant who worked for the NSA's Hawaii office and made $200,000 per year (Scheuerman, 2014). Snowden did not reveal this information to a country or organization that is hostile to the United States. He directly shared this material with the media, allowing the public to learn about these surveillance programs. He received no personal benefit from this act, and he risked himself and lost his privileged position in his life. Edward Snowden said to The Guardian reporters; “I really want the focus to be on these documents and the debate which I hope this will trigger among citizens around the globe about what kind of world we want to live in.” He added: “My sole motive is to inform the public as to that which is done in their name and that which is done against them” (Glenn, 2013). Given all of this, Edward Snowden's actions are more similar to civic disobedience than treason or espionage (Scheuerman, 2014). As a United Nations citizen, Edward Snowden revealed to the public the wrongdoing of a governmental institution, making this situation questioned among the public. A democratic government gains from public criticism of its acts, which aids in the development of more ethical institutions. While it is a social benefit to inform the public about a massive government surveillance program, obtaining that information from the NSA and making it available to the public may also benefit the United States' enemies. Institutions also have the opportunity to develop and regulate these programs within their own walls, without any confidential information leaking out. Employees of the institution can file complaints to their supervisors and criticize these programs in a legal path, which is legal whistleblowing, however, in the case of Thomas Drake, we can see that legal whistleblowing puts people's lives at risk at least as much as the illegal version.
The Case Of Thomas Drake
On September 11, 2001, one of the most devastating days in American history, Thomas Drake began his job at the NSA. In the early years of the new millennium, when America was most vulnerable to external threats and digital data was growing exponentially, a program named Trailblazer caught Drake's attention. Drake saw the initiative as a huge budget waste that did not contribute to national security. He reported his critique to his supervisors, which is considered legal whistleblowing, but his attempts were unsuccessful. Finally, he decided to share his criticism with the media while remaining anonymous, although he did not share any confidential documents with the media. He only served declassified information, which conveys that Trailblazer was an ineffective project that wastes money. Drake was questioned by FBI investigators shortly after and accused of taking classified documents from the NSA. He faced charges of 35 years in jail time for 10 different crimes including the Espionage Act. The court dismissed the case in 2011, stating that the accusations were inappropriate and overstated, and Thomas Drake was sentenced to one year of probation. However, as a result of the entire process, Drake spent $82,000 on legal expenses, was dismissed from both his NSA and university positions, and lost his retirement (Greenberg, 2013). Thomas Drake's experience is an example of how even the slightest criticism of government institutions and their projects can have drastic consequences. The courage to criticize unethical projects is trying to be destroyed by this atmosphere of fear. The whistleblowers, whether they go the legal or illegal path, are aware that they will be prosecuted for espionage, loss of employment, and jail time.
At this juncture, I believe we should oppose the totalitarian positions adopted by the institutions, which have vast surveillance networks both domestically and internationally, and we should protect whistleblowers' rights. The United States has two legislations protecting whistleblowers, the Federal Whistleblower Protection Act of 1989 and the Whistleblower Protection Enhancement Act of 2012. According to a 2015 research, the Federal Whistleblower Protection Act of 1989 fails to protect whistleblowers. 79 percent of the 142 cases involving government ethics and administration ended in employee job loss. The Whistleblower Protection Enhancement Act of 2012 is also insufficient in terms of protections of whistleblowers (Peffer, Bocheko, Del Valle, Osmani, Peyton, Roman, 2015).
Conclusion
The whistleblowing contributes to public debate about the ethics of the state's programs. However, these organizations, which hold a vast surveillance network, damage the democratic process by raising severe allegations against whistleblowers in order to avoid the risk of limiting their authority. We can have an idea of how our data is gathered and used if we have laws and rules that protect whistleblowers. Accusing them with espionage and treason, on the other hand, will gradually create this environment of fear and, as a consequence, silence.
Reference Glenn G. (2013, Jun 11). Edward Snowden: the whistleblower behind the NSA surveillance revelations. The Guardian. Retrieved from https://www.theguardian.com/world/2013/jun/09/edward-snowden-nsa-whistleblower-surveillance Greenberg, A. (2013). This machine kills secrets: Julian Assange, the Cypherpunks, and their fight to empower whistleblowers. Penguin. Scheuerman, W. E. (2014). Whistleblowing as civil disobedience: The case of Edward Snowden. Philosophy & Social Criticism, 40(7), 609-628. Stanley, J., & Steinhardt, B. (2014). Bigger monster, weaker chains: the growth of an American surveillance society. In Ethics and Emerging Technologies (pp. 269-284). Palgrave Macmillan, London. Peffer, S. L., Bocheko, A., Del Valle, R. E., Osmani, A., Peyton, S., & Roman, E. (2015).Whistle Where you work? The ineffectiveness of the Federal Whistleblower Protection Act of 1989 and the promise of the Whistleblower Protection Enhancement Act of 2012. Review of Public Personnel Administration, 35(1), 70-81. Verble, J. (2014). The NSA and Edward Snowden: surveillance in the 21st century. ACM SIGCAS Computers and Society, 44(3), 14-20.
-
@ a95c6243:d345522c
2025-01-31 20:02:25Im Augenblick wird mit größter Intensität, großer Umsicht \ das deutsche Volk belogen. \ Olaf Scholz im FAZ-Interview
Online-Wahlen stärken die Demokratie, sind sicher, und 61 Prozent der Wahlberechtigten sprechen sich für deren Einführung in Deutschland aus. Das zumindest behauptet eine aktuelle Umfrage, die auch über die Agentur Reuters Verbreitung in den Medien gefunden hat. Demnach würden außerdem 45 Prozent der Nichtwähler bei der Bundestagswahl ihre Stimme abgeben, wenn sie dies zum Beispiel von Ihrem PC, Tablet oder Smartphone aus machen könnten.
Die telefonische Umfrage unter gut 1000 wahlberechtigten Personen sei repräsentativ, behauptet der Auftraggeber – der Digitalverband Bitkom. Dieser präsentiert sich als eingetragener Verein mit einer beeindruckenden Liste von Mitgliedern, die Software und IT-Dienstleistungen anbieten. Erklärtes Vereinsziel ist es, «Deutschland zu einem führenden Digitalstandort zu machen und die digitale Transformation der deutschen Wirtschaft und Verwaltung voranzutreiben».
Durchgeführt hat die Befragung die Bitkom Servicegesellschaft mbH, also alles in der Familie. Die gleiche Erhebung hatte der Verband übrigens 2021 schon einmal durchgeführt. Damals sprachen sich angeblich sogar 63 Prozent für ein derartiges «Demokratie-Update» aus – die Tendenz ist demgemäß fallend. Dennoch orakelt mancher, der Gang zur Wahlurne gelte bereits als veraltet.
Die spanische Privat-Uni mit Globalisten-Touch, IE University, berichtete Ende letzten Jahres in ihrer Studie «European Tech Insights», 67 Prozent der Europäer befürchteten, dass Hacker Wahlergebnisse verfälschen könnten. Mehr als 30 Prozent der Befragten glaubten, dass künstliche Intelligenz (KI) bereits Wahlentscheidungen beeinflusst habe. Trotzdem würden angeblich 34 Prozent der unter 35-Jährigen einer KI-gesteuerten App vertrauen, um in ihrem Namen für politische Kandidaten zu stimmen.
Wie dauerhaft wird wohl das Ergebnis der kommenden Bundestagswahl sein? Diese Frage stellt sich angesichts der aktuellen Entwicklung der Migrations-Debatte und der (vorübergehend) bröckelnden «Brandmauer» gegen die AfD. Das «Zustrombegrenzungsgesetz» der Union hat das Parlament heute Nachmittag überraschenderweise abgelehnt. Dennoch muss man wohl kein ausgesprochener Pessimist sein, um zu befürchten, dass die Entscheidungen der Bürger von den selbsternannten Verteidigern der Demokratie künftig vielleicht nicht respektiert werden, weil sie nicht gefallen.
Bundesweit wird jetzt zu «Brandmauer-Demos» aufgerufen, die CDU gerät unter Druck und es wird von Übergriffen auf Parteibüros und Drohungen gegen Mitarbeiter berichtet. Sicherheitsbehörden warnen vor Eskalationen, die Polizei sei «für ein mögliches erhöhtes Aufkommen von Straftaten gegenüber Politikern und gegen Parteigebäude sensibilisiert».
Der Vorwand «unzulässiger Einflussnahme» auf Politik und Wahlen wird als Argument schon seit einiger Zeit aufgebaut. Der Manipulation schuldig befunden wird neben Putin und Trump auch Elon Musk, was lustigerweise ausgerechnet Bill Gates gerade noch einmal bekräftigt und als «völlig irre» bezeichnet hat. Man stelle sich die Diskussionen um die Gültigkeit von Wahlergebnissen vor, wenn es Online-Verfahren zur Stimmabgabe gäbe. In der Schweiz wird «E-Voting» seit einigen Jahren getestet, aber wohl bisher mit wenig Erfolg.
Die politische Brandstiftung der letzten Jahre zahlt sich immer mehr aus. Anstatt dringende Probleme der Menschen zu lösen – zu denen auch in Deutschland die weit verbreitete Armut zählt –, hat die Politik konsequent polarisiert und sich auf Ausgrenzung und Verhöhnung großer Teile der Bevölkerung konzentriert. Basierend auf Ideologie und Lügen werden abweichende Stimmen unterdrückt und kriminalisiert, nicht nur und nicht erst in diesem Augenblick. Die nächsten Wochen dürften ausgesprochen spannend werden.
Dieser Beitrag ist zuerst auf Transition News erschienen.
-
@ 1d4d7479:8aec9f9c
2025-01-30 17:43:34I'm new to Nostr and came here innocently enough. I was intrigued by the idea of building a blog on Npub.pro that not only could be published for the traditional web but would also allow us to get paid for great content or additional services within the Nostr community. Looking into the future I can see this approach as something that allows us to build a community that we can encourage to help support us.
The goals: 1. Build a traditonal blog. 2. Do work once, share on other platforms. 3. Own our content/thoughts. 4. Serve an international audience. 5. Cultivate a community. 6. Improve the Signal to Noise Ratio.
My belief is that we can serve all these through Nostr. I'll let you know how things go on the journey.
Tools on my radar: 1. Npub.pro 2. Habla.news 3. Alby
What else should I be looking at over the next 4 to 6 months when seeking to follow a Nostr-first strategy for a services business?
-
@ 3ccfd5ee:2efa0073
2025-01-31 17:24:28BYD Cars Philippines and ACMobility, the Philippine distributor of BYD vehicles, have pledged to donate $100 to Super Typhoon Carina's victims for every BYD Sealion 6 DM-i sold from July 25, 2024 until December 31, 2024.
This campaign is part of both companies' broader efforts to the affected communities and reflects their dedication to social responsibility. In fact, ACMobility was one of the first to mobilize disaster response efforts by distributing relief goods to over 100 families in Dela Paz, Pasig City, on July 26. Employees and volunteers from ACMobility, BYD Cars Philippines, and its affiliate agencies participated in the cause.
“On behalf of BYD, I would like to express my sympathy to the people affected by Typhoon Carina. We, together with ACMobility, wish to extend BYD's support to Filipinos who suffered from this unfortunate disaster,” said BYD Asia Pacific Auto Sales Division General Manager Liu Xueliang.
The BYD Sealion 6 DM-i is an all-electric compact SUV that runs on BYD's proprietary Super DM-i Technology—generating power well beyond the typical electric vehicle. It generates 217 horsepower and 325 Newton meters of torque, enabling it to go from zero to a hundred in just over eight seconds.
Furthermore, the vehicle runs on Blade Battery, allowing it to drive up to 105 kilometers in Pure EV Mode and 1,100 km in Extended Range Mode. It empowers drivers to travel without range anxiety. Attendees of ACMobility and BYD Cars Philippines' relief drive even used the Sealion 6 DM-i's Blade Battery to charge devices on-site. The Sealion 6 DM-i starts at ₱1,548,000. With every unit sold, BYD and ACMotors donate $100 to Typhoon Carina's victims until the end of 2024.
"Guided by our company value of malasakit, we remain committed to going above and beyond in serving our communities during these trying times," BYD Cars Philippines Managing Director Bob Palanca shared.
Super Typhoon Carina—internationally known as Gaemi—brought widespread devastation across the Philippines. The National Disaster Risk Reduction and Management Council (NDRRMC) stated that Carina, on top of the southwest monsoon, affected over 1.3 million Filipinos.
About BYD Cars Philippines
BYD Cars Philippines is a leader in the Filipino EV industry. As the Philippine arm of the globally renowned electric car and battery manufacturer, it brings cutting-edge technology and powerful yet comfortable drives to the local sustainable mobility market. The EV manufacturer has a range of models designed to address the needs of Filipinos, from affordable cars to luxury SUVs. Each vehicle's cutting-edge tech and superior safety features make every purchase worth it. Most importantly, BYD addresses the growing demand for eco-friendly cars and actively participates in initiatives to build greener mobility infrastructure for Filipinos.
Visit BYD Cars Philippines' website today to learn more.
-
@ 0d97beae:c5274a14
2025-01-11 16:52:08This article hopes to complement the article by Lyn Alden on YouTube: https://www.youtube.com/watch?v=jk_HWmmwiAs
The reason why we have broken money
Before the invention of key technologies such as the printing press and electronic communications, even such as those as early as morse code transmitters, gold had won the competition for best medium of money around the world.
In fact, it was not just gold by itself that became money, rulers and world leaders developed coins in order to help the economy grow. Gold nuggets were not as easy to transact with as coins with specific imprints and denominated sizes.
However, these modern technologies created massive efficiencies that allowed us to communicate and perform services more efficiently and much faster, yet the medium of money could not benefit from these advancements. Gold was heavy, slow and expensive to move globally, even though requesting and performing services globally did not have this limitation anymore.
Banks took initiative and created derivatives of gold: paper and electronic money; these new currencies allowed the economy to continue to grow and evolve, but it was not without its dark side. Today, no currency is denominated in gold at all, money is backed by nothing and its inherent value, the paper it is printed on, is worthless too.
Banks and governments eventually transitioned from a money derivative to a system of debt that could be co-opted and controlled for political and personal reasons. Our money today is broken and is the cause of more expensive, poorer quality goods in the economy, a larger and ever growing wealth gap, and many of the follow-on problems that have come with it.
Bitcoin overcomes the "transfer of hard money" problem
Just like gold coins were created by man, Bitcoin too is a technology created by man. Bitcoin, however is a much more profound invention, possibly more of a discovery than an invention in fact. Bitcoin has proven to be unbreakable, incorruptible and has upheld its ability to keep its units scarce, inalienable and counterfeit proof through the nature of its own design.
Since Bitcoin is a digital technology, it can be transferred across international borders almost as quickly as information itself. It therefore severely reduces the need for a derivative to be used to represent money to facilitate digital trade. This means that as the currency we use today continues to fare poorly for many people, bitcoin will continue to stand out as hard money, that just so happens to work as well, functionally, along side it.
Bitcoin will also always be available to anyone who wishes to earn it directly; even China is unable to restrict its citizens from accessing it. The dollar has traditionally become the currency for people who discover that their local currency is unsustainable. Even when the dollar has become illegal to use, it is simply used privately and unofficially. However, because bitcoin does not require you to trade it at a bank in order to use it across borders and across the web, Bitcoin will continue to be a viable escape hatch until we one day hit some critical mass where the world has simply adopted Bitcoin globally and everyone else must adopt it to survive.
Bitcoin has not yet proven that it can support the world at scale. However it can only be tested through real adoption, and just as gold coins were developed to help gold scale, tools will be developed to help overcome problems as they arise; ideally without the need for another derivative, but if necessary, hopefully with one that is more neutral and less corruptible than the derivatives used to represent gold.
Bitcoin blurs the line between commodity and technology
Bitcoin is a technology, it is a tool that requires human involvement to function, however it surprisingly does not allow for any concentration of power. Anyone can help to facilitate Bitcoin's operations, but no one can take control of its behaviour, its reach, or its prioritisation, as it operates autonomously based on a pre-determined, neutral set of rules.
At the same time, its built-in incentive mechanism ensures that people do not have to operate bitcoin out of the good of their heart. Even though the system cannot be co-opted holistically, It will not stop operating while there are people motivated to trade their time and resources to keep it running and earn from others' transaction fees. Although it requires humans to operate it, it remains both neutral and sustainable.
Never before have we developed or discovered a technology that could not be co-opted and used by one person or faction against another. Due to this nature, Bitcoin's units are often described as a commodity; they cannot be usurped or virtually cloned, and they cannot be affected by political biases.
The dangers of derivatives
A derivative is something created, designed or developed to represent another thing in order to solve a particular complication or problem. For example, paper and electronic money was once a derivative of gold.
In the case of Bitcoin, if you cannot link your units of bitcoin to an "address" that you personally hold a cryptographically secure key to, then you very likely have a derivative of bitcoin, not bitcoin itself. If you buy bitcoin on an online exchange and do not withdraw the bitcoin to a wallet that you control, then you legally own an electronic derivative of bitcoin.
Bitcoin is a new technology. It will have a learning curve and it will take time for humanity to learn how to comprehend, authenticate and take control of bitcoin collectively. Having said that, many people all over the world are already using and relying on Bitcoin natively. For many, it will require for people to find the need or a desire for a neutral money like bitcoin, and to have been burned by derivatives of it, before they start to understand the difference between the two. Eventually, it will become an essential part of what we regard as common sense.
Learn for yourself
If you wish to learn more about how to handle bitcoin and avoid derivatives, you can start by searching online for tutorials about "Bitcoin self custody".
There are many options available, some more practical for you, and some more practical for others. Don't spend too much time trying to find the perfect solution; practice and learn. You may make mistakes along the way, so be careful not to experiment with large amounts of your bitcoin as you explore new ideas and technologies along the way. This is similar to learning anything, like riding a bicycle; you are sure to fall a few times, scuff the frame, so don't buy a high performance racing bike while you're still learning to balance.
-
@ 4ba8e86d:89d32de4
2024-11-07 13:56:21Tutorial feito por Grom mestre⚡poste original abaixo:
http://xh6liiypqffzwnu5734ucwps37tn2g6npthvugz3gdoqpikujju525yd.onion/240277/tutorial-criando-e-acessando-sua-conta-de-email-pela-i2p?show=240277#q240277
Bom dia/tarde/noite a todos os camaradas. Seguindo a nossa série de tutoriais referentes a tecnologias essenciais para a segurança e o anonimato dos usuários, sendo as primeiras a openPGP e a I2P, lhes apresento mais uma opção para expandir os seus conhecimentos da DW. Muitos devem conhecer os serviços de mail na onion como DNMX e mail2tor, mas e que tal um serviço de email pela I2P. Nesse tutorial eu vou mostrar a vocês como criar a sua primeira conta no hq.postman.i2p e a acessar essa conta.
É importante que vocês tenham lido a minha primeira série de tutoriais a respeito de como instalar, configurar e navegar pela I2P nostr:nevent1qqsyjcz2w0e6d6dcdeprhuuarw4aqkw730y542dzlwxwssneq3mwpaspz4mhxue69uhhyetvv9ujuerpd46hxtnfduhsygzt4r5x6tvh39kujvmu8egqdyvf84e3w4e0mq0ckswamfwcn5eduspsgqqqqqqsyp5vcq Esse tutorial é um pré-requisito para o seguinte e portanto recomendo que leia-os antes de prosseguir com o seguinte tutorial. O tutorial de Kleopatra nostr:nevent1qqs8h7vsn5j6qh35949sa60dms4fneussmv9jd76n24lsmtz24k0xlqzyp9636rd9ktcjmwfxd7ru5qxjxyn6uch2uhas8utg8wa5hvf6vk7gqcyqqqqqqgecq8f7 é complementar dado que é extremamente recomendado assinar e criptografar as mensagens que seguem por emails pela DW. Sem mais delongas, vamos ao tutorial de fato.
1. Criando uma conta de email no hq.postman
Relembrando: Esse tutorial considera que você já tenha acesso à I2P. Entre no seu navegador e acesse o endereço hq.postman.i2p. O roteador provavelmente já contém esse endereço no seu addressbook e não haverá a necessidade de inserir o endereço b32 completo. Após entrar no site vá para a página '1 - Creating a mailbox' https://image.nostr.build/d850379fe315d2abab71430949b06d3fa49366d91df4c9b00a4a8367d53fcca3.jpg
Nessa página, insira as credenciais de sua preferências nos campos do formulário abaixo. Lembre-se que o seu endereço de email aceita apenas letras e números. Clique em 'Proceed' depois que preencher todos os campos. https://image.nostr.build/670dfda7264db393e48391f217e60a2eb87d85c2729360c8ef6fe0cf52508ab4.jpg
Uma página vai aparecer pedindo para confirmar as credenciais da sua nova conta. Se tudo estiver certo apenas clique em 'Confirm and Create Mailbox'. Se tudo ocorrer como conforme haverá uma confirmação de que a sua nova conta foi criada com sucesso. Após isso aguarde por volta de 5 minutos antes de tentar acessá-la, para que haja tempo suficiente para o servidor atualizar o banco de dados. https://image.nostr.build/ec58fb826bffa60791fedfd9c89a25d592ac3d11645b270c936c60a7c59c067f.jpg https://image.nostr.build/a2b7710d1e3cbb36431acb9055fd62937986b4da4b1a1bbb06d3f3cb1f544fd3.jpg
Pronto! Sua nova conta de email na I2P foi criada. Agora vamos para a próxima etapa: como acessar a sua conta via um cliente de email.
2. Configurando os túneis cliente de SMTP e POP3
O hq.postman não possui um cliente web que nos permite acessar a nossa conta pelo navegador. Para isso precisamos usar um cliente como Thunderbird e configurar os túneis cliente no I2Pd que serão necessários para o Thunderbird se comunicar com o servidor pela I2P.
Caso não tenha instalado o Thunderbird ainda, faça-o agora antes de prosseguir.
Vamos configurar os túneis cliente do servidor de email no nosso roteador. Para isso abra um terminal ou o seu gestor de arquivos e vá para a pasta de configuração de túneis do I2P. Em Linux esse diretório se localiza em /etc/i2pd/tunnels.d. Em Windows, essa pasta se localiza em C:\users\user\APPDATA\i2pd. Na pasta tunnels.d crie dois arquivos: smtp.postman.conf e pop-postman.conf. Lembre-se que em Linux você precisa de permissões de root para escrever na pasta de configuração. Use o comando sudoedit
para isso. Edite-os conforme as imagens a seguir:
Arquivo pop-postman.conf https://image.nostr.build/7e03505c8bc3b632ca5db1f8eaefc6cecb4743cd2096d211dd90bbdc16fe2593.jpg
Arquivo smtp-postman.conf https://image.nostr.build/2d06c021841dedd6000c9fc2a641ed519b3be3c6125000b188842cd0a5af3d16.jpg
Salve os arquivos e reinicie o serviço do I2Pd. Em Linux isso é feito pelo comando:
sudo systemctl restart i2pd
Entre no Webconsole do I2Pd pelo navegador (localhost:7070) e na seção I2P Tunnels, verifique se os túneis pop-postman e smtp-postman foram criados, caso contrário verifique se há algum erro nos arquivos e reinicie o serviço.Com os túneis cliente criados, vamos agora configurar o Thunderbird
3. Configurando o Thunderbird para acessar a nossa conta
Abra o Thunderbird e clique em criar uma nova conta de email. Se você não tiver nenhum conta previamente presente nele você vai ser diretamente recebido pela janela de criação de conta a seguir. https://image.nostr.build/e9509d7bd30623716ef9adcad76c1d465f5bc3d5840e0c35fe4faa85740f41b4.jpg https://image.nostr.build/688b59b8352a17389902ec1e99d7484e310d7d287491b34f562b8cdd9dbe8a99.jpg
Coloque as suas credenciais, mas não clique ainda em Continuar. Clique antes em Configure Manually, já que precisamos configurar manualmente os servidores de SMTP e POP3 para, respectivamente, enviar e receber mensagens.
Preencha os campos como na imagem a seguir. Detalhe: Não coloque o seu endereço completo com o @mail.i2p, apenas o nome da sua conta. https://image.nostr.build/4610b0315c0a3b741965d3d7c1e4aff6425a167297e323ba8490f4325f40cdcc.jpg
Clique em Re-test para verificar a integridade da conexão. Se tudo estiver certo uma mensagem irá aparecer avisando que as configurações do servidores estão corretas. Clique em Done assim que estiver pronto para prosseguir. https://image.nostr.build/8a47bb292f94b0d9d474d4d4a134f8d73afb84ecf1d4c0a7eb6366d46bf3973a.jpg
A seguinte mensagem vai aparecer alertando que não estamos usando criptografia no envio das credenciais. Não há problema nenhum aqui, pois a I2P está garantindo toda a proteção e anonimato dos nossos dados, o que dispensa a necessidade de uso de TLS ou qualquer tecnologia similar nas camadas acima. Marque a opção 'I Understand the risks' e clique em 'Continue' https://image.nostr.build/9c1bf585248773297d2cb1d9705c1be3bd815e2be85d4342227f1db2f13a9cc6.jpg
E por fim, se tudo ocorreu como devido sua conta será criada com sucesso e você agora será capaz de enviar e receber emails pela I2P usando essa conta. https://image.nostr.build/8ba7f2c160453c9bfa172fa9a30b642a7ee9ae3eeb9b78b4dc24ce25aa2c7ecc.jpg
4. Observações e considerações finais
Como informado pelo próprio site do hq.postman, o domínio @mail.i2p serve apenas para emails enviados dentro da I2P. Emails enviados pela surface devem usar o domínio @i2pmai.org. É imprescindível que você saiba usar o PGP para assinar e criptografar as suas mensagens, dado que provavelmente as mensagens não são armazenadas de forma criptografada enquanto elas estão armazenadas no servidor. Como o protocolo POP3 delete as mensagens no imediato momento em que você as recebe, não há necessidade de fazer qualquer limpeza na sua conta de forma manual.
Por fim, espero que esse tutorial tenha sido útil para vocês. Que seu conhecimento tenha expandido ainda mais com as informações trazidas aqui. Até a próxima.
-
@ 3ccfd5ee:2efa0073
2025-01-31 17:05:59Penis size is a topic that many people feel curious or insecure about. It’s important to approach this subject with an understanding of the wide range of normal sizes and the various options available for those who may be interested in enlargement procedures. For some, the use of sex toys or dildos may be a practical solution to enhance sexual experiences, while others may look into enlargement procedures. Here’s a brief overview of what you should know about average penis size and the options available for enlargement.
What is the Average Penis Size?
Studies consistently show that the average erect penis size is around 5 to 6 inches in length, and the average flaccid size is about 3 to 4 inches. It’s crucial to recognize that penis size varies among individuals, and there is a broad spectrum of what is considered normal. Factors like body type, genetics, and age can all influence size. Most men’s sizes fall within this range, and concerns about size often arise from misconceptions rather than actual medical issues.
Penis Enlargment as an Alternative
For those interested in penis enlargement, there are a few options available. These include surgical procedures, non-surgical devices, and sometimes even the use of sex toys to create a fuller feeling or enhance size temporarily. Here’s a closer look at the most common methods:
Surgical Procedures
One of the most well-known surgical options is penile lengthening surgery, where a surgeon cuts the suspensory ligament that supports the penis, allowing it to hang lower. While the procedure can result in a modest increase in length, it carries risks such as infection, scarring, and potential issues with erectile function. Always consult with a qualified healthcare provider before considering surgery.
Non-Surgical Options
Devices like penis pumps or penile traction devices are often used to temporarily increase size. A penis pump creates a vacuum that draws blood into the penis, temporarily making it appear larger. Traction devices apply gentle pressure to the penis over time, which can result in gradual lengthening. Both of these methods can offer temporary improvements, but they require consistent use and do not guarantee long-lasting results.
Sex Toys and Dildos
For those looking for a more immediate solution, dildos and other sex toys can offer a way to enhance sexual pleasure without altering physical size. These toys come in a wide range of shapes, sizes, and materials, allowing individuals and couples to explore different sensations. Find a dildo for sale that can provide added size during intercourse, and using sex toys can also help individuals become more comfortable with their bodies, leading to better self-esteem and sexual confidence.
Penis Enlargement Pills or Supplements
Many products on the market claim to increase penis size, but the effectiveness of these pills is largely unproven. Medical experts often caution against using such supplements, as they can have unwanted side effects and are not regulated.
-
@ 3ccfd5ee:2efa0073
2025-01-31 16:50:06To stay competitive, many companies are outsourcing key administrative and management functions in manufacturing. This approach helps businesses better manage deliverables, reduce costs, utilize advanced technology, and navigate changing labor dynamics.
What is Outsource Manufacturing?
Outsourcing manufacturing involves delegating not only production but also important administrative and management tasks to external providers, rather than handling everything in-house. These tasks often include non-core activities such as supply chain management, procurement, quality assurance, and compliance.
By partnering with specialized manufacturers, often in regions with lower labor and operational costs, companies can take advantage of their expertise and efficiency. The process typically begins with selecting a trusted manufacturer, negotiating contracts, and overseeing production to ensure quality and timely delivery.
5 Types of Outsource Manufacturing Services
Outsourcing specific tasks can streamline your operations and reduce costs. Here’s an overview of the key outsourcing services for manufacturing:
Contract Management
Managing contracts with manufacturers and suppliers can be complex and time-consuming. By outsourcing this function, you allow experts to handle negotiations, oversee agreements, and ensure smooth operations, reducing legal risks and freeing you to focus on other vital business areas.
Supplier Management
Supplier management includes finding and vetting suppliers based on quality, pricing, and reliability. By building a dedicated team through optiBPO in the Philippines, you can streamline this process. The team will handle negotiations and ensure that suppliers meet your standards, giving you full control without the administrative burden.
Logistics Coordination
From transportation to warehousing, logistics coordination involves many moving parts. Outsourcing this function to a skilled team, like one from optiBPO, allows you to optimize the logistics process, choosing the best transportation methods and balancing cost, speed, and reliability. This ensures efficient and timely product deliveries.
Quality Assurance Coordination
Consistently maintaining high product quality is essential for customer satisfaction and brand reputation. Outsourcing quality assurance lets a team of professionals handle inspections, compliance checks, and data analysis to reduce defects, enhance product reliability, and maintain high standards.
Inventory Management
Managing inventory levels, ordering, and stock maintenance can be overwhelming. By outsourcing these administrative tasks, your external team can monitor inventory, forecast demand, and coordinate with suppliers to ensure stock is always replenished on time. Services from optiBPO can streamline this process and keep operations running smoothly.
In Conclusion
By outsourcing these crucial functions, your business can gain access to expertise, improve efficiency, and reduce costs—ultimately allowing you to focus on what matters most: growing your business.
You can learn more about ousource manufacturing through this infographic.
https://sp-ao.shortpixel.ai/client/to_webp,q_glossy,ret_img,w_800/https://optibpo.com/wp-content/uploads/2024/10/outsource_manufacturing_Info8.png
-
@ 37fe9853:bcd1b039
2025-01-11 15:04:40yoyoaa
-
@ 2e8970de:63345c7a
2025-01-30 17:29:52https://x.com/MistralAI/status/1884967826215059681
https://mistral.ai/news/mistral-small-3/
originally posted at https://stacker.news/items/870135
-
@ 62033ff8:e4471203
2025-01-11 15:00:24收录的内容中 kind=1的部分,实话说 质量不高。 所以我增加了kind=30023 长文的article,但是更新的太少,多个relays 的服务器也没有多少长文。
所有搜索nostr如果需要产生价值,需要有高质量的文章和新闻。 而且现在有很多机器人的文章充满着浪费空间的作用,其他作用都用不上。
https://www.duozhutuan.com 目前放的是给搜索引擎提供搜索的原材料。没有做UI给人类浏览。所以看上去是粗糙的。 我并没有打算去做一个发microblog的 web客户端,那类的客户端太多了。
我觉得nostr社区需要解决的还是应用。如果仅仅是microblog 感觉有点够呛
幸运的是npub.pro 建站这样的,我觉得有点意思。
yakihonne 智能widget 也有意思
我做的TaskQ5 我自己在用了。分布式的任务系统,也挺好的。
-
@ 7cb5fba1:4ea55c0e
2025-01-30 05:36:08
Samira parties with customers at a brothel. She was married at 12, trafficked to a brothel two weeks later.
A madam counts money in a brothel
Mia, 15, sits with her new 27-year-old groom during their wedding. ‘My family has been saving for my wedding for a very long time. I am a girl, so they always knew they would need to give me away.' Five or six months ago, her parents found Mia a groom, a 27-year-old man who works in a garment factory. 'I am nervous,' Mia says, quietly. 'I think I will miss my family'
Yasmin waits for customers
A girl shows her self harm scars
Women wait for customers
Habiba waits for customers. The 14-year-old has been in a brothel for three years
‘I ran away from my husband after seven days. He was only about 15 or 16, but he raped me so violently that one morning, when I knew he was asleep, I slipped out of the house as quietly as I could, and ran,’ Samira says. ‘I ran back to my house, but I was too frightened to go inside because I was covered in blood and bruises. My mum died when I was 11, so my brother and sister had arranged the marriage because they could not afford to look after me any more, and I knew leaving my husband would make them angry. So I asked a rickshaw driver to take me across (the town) to my friend’s house, but he told me I should be ashamed of myself, and dropped me off at the brothel instead’
A customer enters Yasmin’s room
A police officer stops to speak to a woman outside a brothel
A customer fights with girls at a brothel
-
@ 8760f3a0:f7ee5cb3
2025-01-30 00:15:23Do the last five years really matter? People were killed by government-pushed medical interventions, grandparents were banned from seeing grandchildren, businesses were closed never to open again, educational years were lost and the socialisation of a generation of children destroyed, people were arrested, people were made suspicious of people. You know the list of horrors, you were there and lived through it. But why does it all matter to us? And why do some of those who defend all the measures do so, so vehemently? How do they make their twisted appeal to convince us it was all for the good? There are a lot of people who don’t think it does matter.Do the last four years really matter? People were killed by government-pushed medical interventions, grandparents were banned from seeing grandchildren, businesses were closed never to open again, educational years were lost and the socialisation of a generation of children destroyed, people were arrested, people were made suspicious of people. You know the list of horrors, you were there and lived through it. But why does it all matter to us? And why do some of those who defend all the measures do so, so vehemently? How do they make their twisted appeal to convince us it was all for the good? There are a lot of people who don’t think it does matter.
Why does it matter? Because of what is always at stake. Truth, goodness and beauty is short hand for describing what matters. It’s a way of pointing to the non-negotiables of life that were (and continue to be) violated.
These aren't abstract concepts. Truth, goodness and beauty are real concrete things we deal with all the time. They are more real and more consistent than you or me. We can easily drift from the truth into delusions, we can dull our ability to see beauty and promote it, our moral score cards never balance out the good and evil that we have done. And yet, truth, goodness and beauty remain concrete standards and ongoing concerns in our lives. These are the things that were offended by the Covid conspiracy. We need to be able to articulate, to ourselves and the powers over us, what is always at stake.
TGB and Common Sense
We all have an innate concern with truth , goodness and beauty.
We are concerned with facts because truth matters to us. We don’t like being sold something that doesn't turn out to be as advertised. Truth matters to us because we are also concerned with the good, with life flourishing as it should. Facts matter morally.
We know these things to be true. They are built into us. We think it terms of truth, goodness and beauty (the flourishing of our human nature) and react in those terms when things go wrong. For instance, as I write, the news today is filled with the story of infected blood transfusions. It turns out that health care professionals knew about it (again!). The victims want the truth and justice. People want the freedom and power to access restorative treatment to attempt, where possible, to get their lives back on track and regain what they have lost.
What of beauty? We find joy in things being restored and people and nature achieving their full, given, potential — things that become what they are meant to be are beautiful. When things and people are allowed to develop according to their given natures then truth and goodness are upheld and beauty is displayed. This is why there is a deep connection between beauty and health, fulfilment, joy and happiness. Beauty is the display of truth and goodness through the flourishing of given natures.
Truth, goodness, beauty and freedom belong together — including freedom of speech. If you pick up truth you find goodness, beauty and freedom hanging from it. They are tied together like a ball of Christmas tree lights.
A Classical View of Given Natures and Freedom
I am, unapologetically, taking a classical approach to the being and nature of things and people. Natures are given realties. Things flourish as they fulfil their potential in accordance with their given natures. For humans this includes freedom to have a family, do a days work and attend worship. Acorns fulfil their potential when they grow in to big old oak trees. An acorn can’t become a larch, it’s not in its nature. An Acorn has no potential to grow into something else.
On this classical view, freedom refers to unhindered development of potential in accordance with our given nature. Tyranny always violates nature and the actualisation of given potentials that are inherent in the nature of things and people. Boys can’t flourish by ‘becoming’ women. Puberty blockers and surgery attempt to force development against a child’s given nature. Trans ideology is not about freedom and fulfilment. It is an agenda that denies the natural processes of personal actualisation — this is the real philosophical, moral and metaphysical weight behind the phrase ‘its not natural’. The rise of a deeply subjectivist view of reality and being (I am what I think I am) and the denial of given natures is the doorway to tyranny.
A proper grasp of the true, good and beautiful connects us to the basic givenness of nature. That is why — although it’s out of fashion to use these terms — the sense that something isn’t natural and so must be morally wrong or odd, is a good built-in moral compass.
The Problems of Memory and Evil
There are two important contextual realities which mean we will always have a fight on our hands to make truth, goodness and beauty foundational to our thinking and life together in society: 1) the problem of societal memory loss and 2) the parasitical nature of evil.
Memory loss
Truth, goodness and beauty — and also the necessary condition of freedom for fulfilling our potential —are not a construct of our personal perspectives. They are not social constructions or figments of our imagination. They exist above and beyond us. They were here before we showed up in this world, and they will still be here after you and I have gone. We are thrown into them at conception and birth. We receive them as integral to our being, the fabric of reality and to our physical, moral and intellectual progress in the world.
We don’t understand them when we first arrive. We need to be trained in living in line with them, in ways developed by our forefathers. In other words, because truth, goodness and beauty transcend us, human society has to have a memory or custodian function. This is captured in the fifth commandment, “honour your mother and father”.
Societies that break the intergenerational connection prevent the solutions of the past, for living together, from being transmitted. Every generation attempts some level of wilful forgetfulness. Every revolution has included some form of memory holing of the past. A true grasp of life according to the true, the good, and the beautiful requires a custodian’s mindset.
Evil
The true, the good and the beautiful are encountered in real life. They are found in people, events and objects. Ultimately they are personal attributes of God that are displayed in creation. However, people and events don’t consistently display truth, goodness and beauty. Lies, evil and ugliness, the thorns in the garden, grow up among us. They are parasitical on the true, the good and the beautiful.
Parasites feed off of their host and add nothing to it. Lies, moral corruption and ugliness are negations of the good, the true and the beautiful, but often appeal to us in the disguise of alternative ways to achieve truth, goodness and beauty. “They called evil good’ and good evil” (Isaiah 5:20). The source of the parasitical inversion of truth, goodness and beauty is the human soul. This means societies must always have a justice function, a way of reasserting the true, the good, and the beautiful.
Why the Covid Horrors Matter
You don’t need to be a Christian to know the value of the true, good and beautiful, or, the need to be a custodian and the constant problem of human corruption. Societies flourish when some form of law, that is grounded in truth, goodness and beauty, (which entails protection of life, property and freedoms), is in operation, and where the next generation are trained to become part of society. The Christian tradition calls this natural law. We might also refer to it as a built-in conscience or common sense. As humans, we often sabotage this sense, but it is there, and always, eventually, reasserts itself. We can’t undo the fabric of reality which is built on truth, goodness and beauty, however hard we try.
The Covid regime — planned above national government levels and implemented across the world in lock step and with startling rapidity — was an assault on natural law, truth, goodness and beauty. The Covid regime was built on lies, moral corruption and the destruction of all that is beautiful: the freedom of humanity to grow, celebrate family, work and worship, and do the work of passing on knowledge through education etc. It was all about curtail freedoms, denying life and the enforced regression of human flourishing. It was driven by people who see humanity as a blight on the earth that needs killing like weeds.
If you want to know why it all mattered, if it has all becoming a distant memory, the simple idea of truth, goodness and beauty — as a short hand for natural law — tells you, in concrete terms, why it matters and why we must not forget.
Truth, goodness and beauty is the summary of the code that is built into all of us, that stands ready at hand. It is the common ground where we can all meet, whatever our religion or belief, and stand against tyranny.
We need to make promoting Truth, Goodness and Beauty a live project where ever we can 1. It is a solid place to take a stand together. This requires exploration, articulation, defence, remembrance, celebration etc., of all that TGB stands for. These ideas must be actively deployed through out-loud ethical thinking, to call out the false, the bad and the ugly. It needs positive promotion to remind us of what is at stake if we hand over human flourishing and civil society to agendas that are parasitical perversions of the true, the good and beautiful.
I know some energetic and very capable people who are working hard on how to do this.
Ta ta for now,
Jonny
-
@ 1b5ee74d:bb1aae6e
2024-11-02 17:01:36A paper bordering on parody but, unfortunately, all too real. Titled “The Distributive Effects of Bitcoin,” it’s authored by Ulrich Bindseil and Jürgen Schaaf: the former manages the ECB’s Market Infrastructure and Payments division, while the latter serves as his advisor. Hosting this paper on its own servers, the Frankfurt institution safeguards itself with a disclaimer: “The views expressed are those of the authors and do not necessarily reflect the views of the ECB.” The disclaimer is understandable, as the positions of the two authors are so blatantly biased and devoid of any logical foundation that they seem too much even for Bitcoin’s number one enemy: the central bank itself.
The underlying assumption of the entire document is simple: Bitcoin does not increase the productive potential of the economy. Based on this shortsighted foundation, the authors construct an entire narrative that ignores some of the fundamental changes introduced by Bitcoin.
“Bitcoin does not increase the productive potential of the economy”
Since Bitcoin doesn’t increase the productive potential of the economy, the alleged increase in value is essentially redistributive. This means that the enrichment of the early bitcoin holders can only come at the expense of the rest of society.
Right from the abstract, the authors assert that Bitcoin in no way contributes to increasing the productive potential of the economy. Their thesis is that Bitcoin, lacking any connection to the creation of tangible goods or services, represents an asset with no intrinsic productive value. According to the document, while investments in sectors like technology or industry improve the efficiency and productive capacity of the economic system, Bitcoin provides no such benefit, as it does not directly contribute to production growth or innovation.
For the authors, much of Bitcoin’s attributed value derives solely from financial speculation and the perception of those who purchase it, without any tangible increase in “economic capacity.”
The redistributive potential: penalizing latecomers
Bindseil and Schaaf then explore what they call Bitcoin’s “redistributive structure,” claiming that its mechanism rewards early investors at the expense of latecomers. Their shocking revelation is that Bitcoin’s value increases for early purchasers as demand rises, generating higher returns for those who entered the market first.
In other words, Bindseil and Schaaf have discovered the wonderful world of supply and demand dynamics within that mysterious entity called “the market”—perhaps too complex to grasp for those dreaming of a Soviet-style economy. Not coincidentally, they describe this process as inherently unjust, arguing that people who decide to invest later don’t receive the same advantages and are forced to buy at higher prices.
If the rational part of your mind is screaming in desperation, I ask for one last effort.
The document describes this effect as a negative feature of Bitcoin, comparing it to a “speculative bubble” destined to collapse when new investors can no longer sustain the asset’s high price.
A point-by-point rebuttal
I confess, I would never have found the strength to sit down at my keyboard to debunk, once again, arguments so erroneous that they’d make anyone with a basic understanding of economics cringe. Fortunately, Murray Rudd and Dennis Porter of Satoshi Action Education, along with Allen Farrington of Axiom and Freddie New of Bitcoin Policy UK, have taken on this task.
Bitcoin’s productive potential: a central misunderstanding
The main assumption—that Bitcoin does not contribute to the productive potential of the economy—is challenged by highlighting how Bitcoin is fueling an ecosystem of technological and financial innovation. Tools like the Lightning Network reduce transaction costs and increase system efficiency, bringing tangible benefits to the economy. “Considering Bitcoin as a mere speculative tool,” the analysis states, “means ignoring the immense infrastructural and social value of payment networks and decentralized technologies deriving from its adoption.”
Bindseil and Schaaf also overlook how Bitcoin is already used to reduce the cost of international remittances, a vital function in parts of the world where transaction costs via traditional banking systems are often exorbitant, reaching up to 20% in some regions. This application provides both direct and indirect productive benefits in contexts with low financial inclusion.
Further, the response notes:
“Bitcoin is promoting innovation beyond payments. It has catalyzed advances in cryptography and energy efficiency, particularly through mining. Bitcoin mining using waste gas can mitigate methane emissions and improve renewable energy generation, contributing to grid flexibility thanks to the unique features of mining.”
Beyond technological advances, the arguments against Bitcoin reflect a fundamental misunderstanding of the role of money in capital accumulation and, consequently, economic prosperity. Productivity is driven by capital accumulation, and economic growth is the result of increased productivity through effective capital use. Arguing that capital growth does not contribute to productivity reveals a deep ignorance of basic market dynamics.
Bitcoin’s redistributive potential: a market dynamic
The final criticism from the two ECB-affiliated individuals concerns the accusation that Bitcoin only benefits early investors at the expense of newcomers. The authors of the rebuttal paper observe that this phenomenon exists in any asset—from real estate to gold—where early investors benefit from an increase in value. Furthermore, Bitcoin lacks privileged distributions, as seen in other cryptocurrencies issued with pre-mines or venture capital models. Bitcoin’s distribution model, which began with open and transparent mining, is considered by the authors “one of the fairest in the history of digital assets.” I would even go so far as to say the fairest.
The authors also point out that the fiat system, widely supported by the ECB, favors inequality through monetary devaluation—a form of reverse redistribution that penalizes small savers in favor of those with greater access to financial resources. Bitcoin, with its maximum issuance cap, offers an alternative to this erosion of purchasing power caused by inflation. In short, such an accusation from those representing the primary cause of the Cantillon effect is almost laughable.
The Federal Reserve’s direct attack
A few days after the publication of Bindseil and Schaaf’s paper, their American counterparts also decided to attack Bitcoin. The Federal Reserve of Minneapolis published a study titled “Unique Implementation of Permanent Primary Deficits?”
I won’t drag this out: in nearly forty pages of formulas and calculations, Fed experts managed to rediscover the obvious—if Bitcoin were to become widespread, the government would no longer be able to run deficits!
“Good morning, princess,” as Roberto Benigni would say in La Vita è Bella. In this newsletter, we’ve been discussing this topic for about three years, yet I haven’t received a job offer from Washington. Perhaps it’s because my views are slightly at odds with those of the employees of the monetary monopolist. The Fed, in fact, sees a very simple solution: ban Bitcoin! They state it plainly:
“The government could simply make Bitcoin illegal.”
Here, we encounter a fundamental disagreement. Believing that Bitcoin can be banned by a few lines in a law reflects a profound misunderstanding of the technology. If you’d like a consultation on the subject, dear friends at the Fed, I’ll be here.
Or rather, I’ll be enjoying your decline.
Sincerely,
Federico.
-
@ 9f3eba58:fa185499
2025-01-29 20:27:09Humanity as a whole has been degrading over the years, with average IQ decreasing, bone structures generally becoming poorly formed and fragile, average height decreasing, hormone levels ridiculously low and having various metabolic and mental illnesses becoming “normal”.
“By 2024, more than 800 million adults were living with diabetes, representing a more than fourfold increase since 1990”
“**1 in 3 people suffer from insulin resistance and can cause depression” (**https://olhardigital.com.br/2021/09/24/medicina-e-saude/1-em-cada-3-pessoas-sofre-de-resistencia-a-insulina-e-pode-causar-depressao/)
“More than 1.3 billion people will have diabetes in the world by 2050” (https://veja.abril.com.br/saude/mais-de-13-bilhao-de-pessoas-terao-diabetes-no-mundo-ate-2050)
“A new study released by Lancet, with data from 2022, shows that more than a billion people live with obesity in the world” (https://www.paho.org/pt/noticias/1-3-2024-uma-em-cada-oito-pessoas-no-mundo-vive-com-obesidade)
All this due to a single factor: diet. I’m not referring to a diet full of processed foods, as this has already been proven to destroy the health of those who eat it. I’m referring to the modern diet, with carbohydrates (from any source, even from fruit) being the main macronutrient, little animal protein and practically no saturated fat of animal origin. This diet implementation has been systematically occurring for decades. Sugar conglomerates seeking profits? Government institutions (after all, they need voters to be stupid and vote for them), evil spiritual interference wanting to destroy or distort their path? I don’t know, I’ll leave the conspiracy theories to you!
The modern diet or diet is extremely inflammatory, and inflammation over a long period of time leads to autoimmune diseases such as diabetes and Hashimoto’s.
Absolutely any food in the plant kingdom will harm you, no matter how asymptomatic it may be. Plants are living beings and do not want to die and be eaten. To defend themselves from this, they did not evolve legs like animals. They specifically developed chemical mechanisms such as oxalates, phytoalexins, glucosinolates, polyphenols, antinutrients and many others that act to repel anything that wants to eat them, being fatal (as in the case of mushrooms), causing discomfort and the animal or insect discovering that the plant is not edible, releasing unpleasant smells or, in many cases, a combination of these factors. Not to mention genetically modified foods (almost the entire plant kingdom is genetically modified) that work as a steroid for the plants' defenses. - Lack of focus
- Poor decision-making
- Difficulty in establishing and maintaining relationships
- Difficulty getting pregnant and difficult pregnancy
- Low testosterone (medical reference values are low)
- Alzheimer's
- Diabetes
- Dementia
- Chances of developing autism when mothers do not eat meat and fat properly during pregnancy
- Worsening of the degree of autism when the child does not eat meat and fat (food selectivity)
- Insomnia and other sleep problems
- Lack of energy
- Poorly formed and fragile bone structure
- Lack of willpower
- Depression
- ADHD
Not having full physical and mental capacity harms you in many different ways, these are just a few examples that not only directly impact one person but everyone else around them.
Fortunately, there is an alternative to break out of this cycle of destruction, Carnivore Diet.
I am not here to recommend a diet, eating plan or cure for your health problems, nor can I do so, as I am not a doctor (most doctors don't even know where the pancreas is, a mechanic is more useful in your life than a doctor, but that is a topic for another text.).
I came to present you with logic and facts in a very simplified way, from there you can do your own research and decide what is best for you.
Defining the carnivore diet
Simply put, the carnivore diet is an elimination diet, where carbohydrates (including fruits), vegetable fats (soy, canola, cotton, peanuts, etc.), processed products and any type of plant, be it spices or teas, are completely removed.
What is allowed on the carnivore diet?
- Animal protein
- Beef, preferably fatty cuts (including offal, liver, heart, kidneys, these cuts have more vitamins than anything else in the world)
- Lamb
- Eggs
- Fish and seafood
- Animal fat
- Butter
- Beef fat and tallow
- Salt
- No... salt does not cause high blood pressure. (explained later about salt and high consumption of saturated fats)
From now on I will list some facts that disprove the false accusations made against **eating exclusively meat and fat.
“Human beings are omnivores”
“Our ancestors were gatherers and hunters"
To determine the proportion of animal foods in our ancestors’ diets, we can look at the amount of δ15 nitrogen in their fossils. By looking at levels of this isotope, researchers can infer where animals reside in the food chain, identifying their protein sources. Herbivores typically have δ15N levels of 3–7 percent, carnivores show levels of 6–12 percent, and omnivores exhibit levels in between. When samples from Neanderthals and early modern humans were analyzed, they showed levels of 12 percent and 13.5 percent, respectively, even higher than those of other known carnivores, such as hyenas and wolves. And from an energy efficiency standpoint, hunting large animals makes the most sense. Gathering plants and chasing small animals provides far fewer calories and nutrients relative to the energy invested. In more recently studied indigenous peoples, we have observed a similar pattern that clearly indicates a preference for animal foods over plant foods. For example, in Vilhjalmur Stefansson’s studies of the Eskimos.
“…fat, not protein, seemed to play a very important role in hunters’ decisions about which animals (male or female) to kill and which body parts to discard or carry away.”
Why were our ancestors and more recent indigenous peoples so interested in finding fat? At a very basic level, it was probably about calories. By weight, fat provides more than twice as many calories as protein or carbohydrates. Furthermore, human metabolism makes fat an exceptionally valuable and necessary food. If we think of ourselves as automobiles that need fuel for our metabolic engines, we should not put protein in our gas tank. For best results, our metabolic engine runs most efficiently on fat or carbohydrates.
Eating animal foods has been a vital part of our evolution since the beginning. Katherine Milton, a researcher at UC Berkeley, came to the same conclusion in her paper “The Critical Role Played by Animal Source Foods in Human Evolution,” which states:
“Without routine access to animal-source foods, it is highly unlikely that evolving humans could have achieved their unusually large and complex brains while simultaneously continuing their evolutionary trajectory as large, active, and highly social primates. As human evolution progressed, young children in particular, with their rapidly expanding large brains and higher metabolic and nutritional demands relative to adults, would have benefited from concentrated, high-quality foods such as meat." - https://pubmed.ncbi.nlm.nih.gov/14672286/
Skeletons from Greece and Turkey reveal that 12,000 years ago, the average height of hunter-gatherers was five feet, nine inches for men and five feet, five inches for women. But with the adoption of agriculture, adult height plummeted—ending any hope these poor herders had of dunking a basketball or playing competitive volleyball, if such sports had existed at the time. By 3000 B.C., men in this region of the world were only five feet, three inches tall, and women were five feet, reflecting a massive decline in their overall nutritional status. Many studies in diverse populations show a strong correlation between adult height and nutritional quality. A study analyzing male height in 105 countries came to the following conclusion:
“In taller nations…consumption of plant proteins declines sharply at the expense of animal proteins, especially those from dairy products. Its highest consumption rates can be found in Northern and Central Europe, with the global peak in male height in the Netherlands (184 cm).”
In addition to the decline in height, there is also evidence that Native Americans buried at Dickson Mounds suffered from increased bacterial infections. These infections leave scars on the outer surface of the bone, known as the periosteum, with the tibia being especially susceptible to such damage due to its limited blood flow. Examination of tibias from skeletons found in the mounds shows that after agriculture, the number of such periosteal lesions increased threefold, with a staggering eighty-four percent of bones from this period demonstrating this pathology. The lesions also tended to be more severe and to appear earlier in life in the bones of post-agricultural peoples.
https://onlinelibrary.wiley.com/doi/full/10.1111/j.1747-0080.2007.00194.x
https://pubmed.ncbi.nlm.nih.gov/10702160/
Cholesterol
Many “doctors” say that consuming saturated fat is harmful to your health, “your veins and arteries will clog with excess fat” “you will have a heart attack if you consume a lot of fat" and many other nonsense, and in exchange recommends that you replace fatty cuts of meat with lean meat and do everything with vegetable oil that causes cancer and makes men effeminate.
Your brain is basically composed of fat and water, your neurons are made and repaired with fat, your cells, the basic unit of life, are composed of fat and protein, many of your hormones, especially sexual ones, are made from fat, there is no logical reason not to consume saturated fat other than several false "scientific articles".
"The power plant of the cell is the mitochondria, which converts what we eat into energy. Ketones are an energy source derived from fat. Mitochondria prefer fat as energy (ketones) because transforming ketones into energy costs the mitochondria half the effort of using sugar (glucose) for energy." - https://pubmed.ncbi.nlm.nih.gov/28178565/
"With the help of saturated fats, calcium is properly stored in our bones. The interaction between calcium, vitamin D, and parathyroid hormone regulates calcium levels in the body. When there are calcium imbalances in the blood, our bones release calcium into the blood to find homeostasis." - https://www.healthpedian.org/the-role-of-calcium-in-the-human-body/
"The body needs cholesterol to support muscle repair and other cellular functions. This is why when there is cardiovascular disease, we see increased amounts of cholesterol in the area. Cholesterol is not there causing the problem, but the boat carrying fat was docked there for cholesterol and other nutrients to help fight the problem. Plaque is the body's attempt to deal with injury within the blood vessels." - National Library of Medicine, “Cholesterol,” 2019
"Initially, the Plaque helps blood vessels stay strong and helps the vessels maintain their shape. But with the perpetual cycle of uncontrolled inflammation and leftover debris from cellular repair (cholesterol), over time plaque begins to grow and harden, reducing blood flow and oxygen to the heart. Both inflammation and repair require copious amounts of cholesterol and fats. So the body keeps sending these fatty substances to the site of the plaque — until either repair wins (plaque becomes sclerotic scars in the heart muscle, causing heart failure) or inflammation wins (atherosclerotic heart attack)" - https://pubmed.ncbi.nlm.nih.gov/21250192/
Inflammation in Atherosclerotic Cardiovascular Disease - https://pubmed.ncbi.nlm.nih.gov/21250192/
"Study finds that eating refined carbohydrates led to an increased risk of cardiovascular disease and obesity" - https://pmc.ncbi.nlm.nih.gov/articles/PMC5793267/
“Meat causes cancer”
Most of the misconceptions that red meat causes cancer come from a report by the World Health Organization's International Agency for Research on Cancer (IARC), which was released in 2015. Unfortunately, this report has been widely misrepresented by the mainstream media and is based on some very questionable interpretations of the science it claims to review.
A closer look at a 2018 report on its findings reveals that only 14 of the 800 studies were considered in its final conclusions—and every single study was observational epidemiology. Why the other 786 were excluded remains a mystery, and this group included many interventional animal studies that clearly did not show a link between red meat and cancer. Of the fourteen epidemiological studies that were included in the IARC report, eight showed no link between meat consumption and the development of colon cancer. Of the remaining six studies, only one showed a statistically significant correlation between meat and cancer.
In epidemiological research, one looks for correlation between two things and the strength of the correlation. Having just one study out of 800 that shows meat causes cancer is a mere fluke and becomes statistically insignificant.
Interestingly, this was a study by Seventh-day Adventists in America — a religious group that advocates a plant-based diet.
Microbiota and Fiber
I have seen several people and “doctors” saying that eating only meat would destroy your microbiota. And I have come to the conclusion that neither “doctors” nor most people know what a microbiota is.
Microbiota is the set of several types of bacteria (millions) that exist in your stomach with the function of breaking down molecules of certain types of food that the body itself cannot get, fiber for example. Many times through the process of fermentation, which is why you have gas after eating your beloved oatmeal.
People unconsciously believe that the microbiota is something fixed and unchangeable, but guess what… it is not.
Your microbiota is determined by what you eat. If you love eating oatmeal, your microbiota will have a specific set of bacteria that can break down the oat molecule into a size that the body can absorb.
If you follow a carnivorous diet, your microbiota will adapt to digest meat.
Fiber
Nutritional guidelines recommend large amounts of fiber in our diet, but what they don't tell you is that we only absorb around 6% of all the vegetable fiber we eat. In other words, it's insignificant!
Another argument used by doctors and nutritionists is that it helps you go to the bathroom, but this is also a lie. Fiber doesn't help you evacuate, it forces you to do so. With the huge amount of undigestible food in your stomach (fiber), the intestine begins to force contractions, making this fecal matter go down, making you go to the bathroom.
They also raise the argument that fibers are broken down into short-chain fatty acids, such as butyrate (butyric acid), propionate (propionic acid) and acetate (acetic acid). Butyrate is essential because it is the preferred fuel source for the endothelial cells of the large intestine.
Butter, cream, and cheese contain butyrate in its absorbable form. Butter is the best source of butyric acid, or butyrate. In fact, the origins of the word butyric acid come from the Latin word butyro—the same origins as the word butter.
“In 2012, a study in the Journal of Gastroenterology showed that reducing fiber (a precursor to short-chain fatty acids) helped participants with chronic constipation. The study lasted six months, and after two weeks without fiber, these participants were allowed to increase fiber as needed. These participants felt so much relief after two weeks without fiber that they continued without fiber for the entire six-month period. Of the high-fiber, low-fiber, and no-fiber groups, the zero-fiber participants had the highest bowel movement frequency.” - https://pmc.ncbi.nlm.nih.gov/articles/PMC3435786/
Bioavailability
I said that our body can only absorb 6% of all the fiber we ingest. This is bioavailability, how much the body can absorb nutrients from a given food.
Meat is the most bioavailable food on the planet!
Grains and vegetables are not only not very bioavailable, but they also contain a huge amount of antinutrients. So if you eat a steak with some beans, you will not be able to absorb the nutrients from the beans, and the antinutrients in them will make it impossible to absorb a large amount of nutrients from the steak. https://pubmed.ncbi.nlm.nih.gov/23107545/
Lack of nutrients and antioxidants in a carnivorous diet
A major concern with the carnivorous diet is the lack of vitamin C, which would consequently lead to scurvy.
Vitamin C plays an important role in the breakdown and transport of glucose into cells. In 2000 and 2001, the recommended daily intake of vitamin C effectively doubled. In fact, every 10 to 15 years, there has been a large increase in the recommended daily intake of vitamin C, as happened in 1974 and 1989. Interestingly, also in 1974, sugar prices became so high that high fructose corn syrup was introduced into the US market. Could the increase in readily available glucose foods and foods with high fructose corn syrup be a reason why we need more vitamin C? The question remains…. But this is not a cause for concern for the carnivore, liver is rich in vitamin C. You could easily reach the daily recommendation with liver or any cut of steak. 200-300g of steak already meets your needs and if the theory that the more sugar you eat, the more vitamin C you will get is true, then the more sugar you will eat is true. C is necessary if true, you could easily exceed the daily requirement.
Meat and seafood are rich in ALL the nutrients that humans need to thrive.
Antioxidants
It is commonly said that fruits are rich in antioxidants but again this is a hoax, they are actually PRO-oxidants. These are substances that activate the mRF2 pathway of our immune system which causes the body to produce natural antioxidants.
The body produces antioxidants, but many occur naturally in foods, Vitamin C, Vitamin E, Selenium and Manganese are all natural antioxidants.
High concentrations of antioxidants can be harmful. Remember that high concentrations of antioxidants can increase oxidation and even protect against cancer cells.
Salt
Consuming too much salt does not increase blood pressure and therefore increases the risk of heart disease and stroke. Studies show no evidence that limiting salt intake reduces the risk of heart disease.
A 2011 study found that diets low in salt may actually increase the risk of death from heart attacks and strokes. Most importantly, they do not prevent high blood pressure. https://www.nytimes.com/2011/05/04/health/research/04salt.html
Sun
This is not a dietary issue specifically, but there are things that can I would like to present that is against common sense when talking about the sun.
It is common sense to say that the sun causes skin cancer and that we should not expose ourselves to it or, if we are exposed to the sun, use sunscreen, but no study proves that using sunscreen protects us from melanoma and basal cell carcinoma. The types of fatal melanomas usually occur in areas of the body that never see the sun, such as the soles of the feet.
https://www.jabfm.org/content/24/6/735
In 1978, the first sunscreen was launched, and the market grew rapidly, along with cases of melanoma.
Several studies show that sunscreens cause leaky gut (one of the main factors in chronic inflammation), hormonal dysfunction and neurological dysfunction.
https://pubmed.ncbi.nlm.nih.gov/31058986/
If your concern when going out in the sun is skin cancer, don't worry, your own body's natural antioxidants will protect you. When they can no longer protect you, your skin starts to burn. (If you have to stay in the sun for work, for example, a good way to protect yourself is to rub coconut oil on your skin or just cover yourself with a few extra layers of thin clothing and a hat).
Sunscreen gives you the false sense of protection by blocking the sunburn, so you stay out longer than your skin can handle, but sunscreens can only block 4% of UVA and UVB rays.
www.westonaprice.org/health-topics/environmental-toxins/sunscreens-the-dark-side-of-avoiding-the-sun/
Interestingly, vitamin D deficiency is linked to increased cancer risks. It's a big contradiction to say that the greatest provider of vit. D causes cancer…
https://med.stanford.edu/news/all-news/2010/10/skin-cancer-patients-more-likely-to-be-deficient-in-vitamin-d-study-finds.html
Important roles of vitamin D:
- Regulation of Bone Metabolism
- Facilitates the absorption of calcium and phosphorus in the intestine.
- Promotes bone mineralization and prevents diseases such as osteoporosis, rickets (in children) and osteomalacia (in adults).
- Immune Function
- Modulates the immune system, helping to reduce inflammation and strengthen the defense against infections, including colds, flu and other diseases.
- May help reduce the incidence of autoimmune diseases such as multiple sclerosis and rheumatoid arthritis. - Muscle Health
- Contributes to muscle strength and the prevention of weakness, especially in the elderly.
- Reduces the risk of falls and fractures.
- Cardiovascular Function
- May help regulate blood pressure and heart function, reducing the risk of cardiovascular disease.
- Hormonal Balance
- Influences the production of hormones, including those associated with fertility and the functioning of the endocrine system.
- Plays a role in insulin metabolism and glucose sensitivity.
- Brain Function and Mental Health
- Participates in mood regulation, which may reduce the risk of depression and improve mental health.
- Has been associated with the prevention of neurodegenerative diseases, such as Alzheimer's.
- Anticancer Role
- Evidence suggests that vitamin D may inhibit the proliferation of cancer cells, especially in breast, prostate and colon cancers. - Role in General Metabolism
- Contributes to metabolic health, regulating cellular growth and repair processes.
I tried to present everything in the simplest and most understandable way possible, but there are things that require prior knowledge to truly understand. Below is a list of books that will show you everything I have shown you in a more technical and in-depth way.
Book Recommendations
https://amzn.to/3EbjVsD
https://amzn.to/4awlnBZ
All of my arguments have studies to validate them. Feel free to read them all and draw your own conclusions about what is best for you and your life.
-
@ c68e2176:4439e6cf
2025-01-31 16:41:061:1 The record of the genealogy of Jesus the Messiah, the son of David, the son of Abraham: 2 Abraham was the father of Isaac, Isaac the father of Jacob, and Jacob the father of Judah and his brothers. 3 Judah was the father of Perez and Zerah by Tamar, Perez was the father of Hezron, and Hezron the father of Ram. 4 Ram was the father of Amminadab, Amminadab the father of Nahshon, and Nahshon the father of Salmon. 5 Salmon was the father of Boaz by Rahab, Boaz was the father of Obed by Ruth, and Obed the father of Jesse. 6 Jesse was the father of David the king. David was the father of Solomon by Bathsheba who had been the wife of Uriah. 7 Solomon was the father of Rehoboam, Rehoboam the father of Abijah, and Abijah the father of Asa. 8 Asa was the father of Jehoshaphat, Jehoshaphat the father of Joram, and Joram the father of Uzziah. 9 Uzziah was the father of Jotham, Jotham the father of Ahaz, and Ahaz the father of Hezekiah. 10 Hezekiah was the father of Manasseh, Manasseh the father of Amon, and Amon the father of Josiah. 11 Josiah became the father of Jeconiah and his brothers, at the time of the deportation to Babylon. 12 After the deportation to Babylon: Jeconiah became the father of Shealtiel, and Shealtiel the father of Zerubbabel. 13 Zerubbabel was the father of Abihud, Abihud the father of Eliakim, and Eliakim the father of Azor. 14 Azor was the father of Zadok, Zadok the father of Achim, and Achim the father of Eliud. 15 Eliud was the father of Eleazar, Eleazar the father of Matthan, and Matthan the father of Jacob. 16 Jacob was the father of Joseph the husband of Mary, by whom Jesus was born, who is called the Messiah. 17 So all the generations from Abraham to David are fourteen generations; from David to the deportation to Babylon, fourteen generations; and from the deportation to Babylon to the Messiah, fourteen generations. 18 Now the birth of Jesus Christ was as follows: when His mother Mary had been betrothed to Joseph, before they came together she was found to be with child by the Holy Spirit. 19 And Joseph her husband, being a righteous man and not wanting to disgrace her, planned to send her away secretly. 20 But when he had considered this, behold, an angel of the Lord appeared to him in a dream, saying, “Joseph, son of David, do not be afraid to take Mary as your wife; for the Child who has been conceived in her is of the Holy Spirit. 21 She will bear a Son; and you shall call His name Jesus, for He will save His people from their sins.” 22 Now all this took place to fulfill what was spoken by the Lord through the prophet: 23 “BEHOLD, THE VIRGIN SHALL BE WITH CHILD AND SHALL BEAR A SON, AND THEY SHALL CALL HIS NAME IMMANUEL,” which translated means, “GOD WITH US.” 24 And Joseph awoke from his sleep and did as the angel of the Lord commanded him, and took Mary as his wife, 25 but kept her a virgin until she gave birth to a Son; and he called His name Jesus.1:1 The record of the genealogy of Jesus the Messiah, the son of David, the son of Abraham:\ 2 Abraham was the father of Isaac, Isaac the father of Jacob, and Jacob the father of Judah and his brothers.\ 3 Judah was the father of Perez and Zerah by Tamar, Perez was the father of Hezron, and Hezron the father of Ram.\ 4 Ram was the father of Amminadab, Amminadab the father of Nahshon, and Nahshon the father of Salmon.\ 5 Salmon was the father of Boaz by Rahab, Boaz was the father of Obed by Ruth, and Obed the father of Jesse.\ 6 Jesse was the father of David the king.\ David was the father of Solomon by Bathsheba who had been the wife of Uriah.\ 7 Solomon was the father of Rehoboam, Rehoboam the father of Abijah, and Abijah the father of Asa.\ 8 Asa was the father of Jehoshaphat, Jehoshaphat the father of Joram, and Joram the father of Uzziah.\ 9 Uzziah was the father of Jotham, Jotham the father of Ahaz, and Ahaz the father of Hezekiah.\ 10 Hezekiah was the father of Manasseh, Manasseh the father of Amon, and Amon the father of Josiah.\ 11 Josiah became the father of Jeconiah and his brothers, at the time of the deportation to Babylon.\ 12 After the deportation to Babylon: Jeconiah became the father of Shealtiel, and Shealtiel the father of Zerubbabel.\ 13 Zerubbabel was the father of Abihud, Abihud the father of Eliakim, and Eliakim the father of Azor.\ 14 Azor was the father of Zadok, Zadok the father of Achim, and Achim the father of Eliud.\ 15 Eliud was the father of Eleazar, Eleazar the father of Matthan, and Matthan the father of Jacob.\ 16 Jacob was the father of Joseph the husband of Mary, by whom Jesus was born, who is called the Messiah.\ 17 So all the generations from Abraham to David are fourteen generations; from David to the deportation to Babylon, fourteen generations; and from the deportation to Babylon to the Messiah, fourteen generations.\ 18 Now the birth of Jesus Christ was as follows: when His mother Mary had been betrothed to Joseph, before they came together she was found to be with child by the Holy Spirit.\ 19 And Joseph her husband, being a righteous man and not wanting to disgrace her, planned to send her away secretly.\ 20 But when he had considered this, behold, an angel of the Lord appeared to him in a dream, saying, “Joseph, son of David, do not be afraid to take Mary as your wife; for the Child who has been conceived in her is of the Holy Spirit.\ 21 She will bear a Son; and you shall call His name Jesus, for He will save His people from their sins.”\ 22 Now all this took place to fulfill what was spoken by the Lord through the prophet:\ 23 “BEHOLD, THE VIRGIN SHALL BE WITH CHILD AND SHALL BEAR A SON, AND THEY SHALL CALL HIS NAME IMMANUEL,” which translated means, “GOD WITH US.”\ 24 And Joseph awoke from his sleep and did as the angel of the Lord commanded him, and took Mary as his wife,\ 25 but kept her a virgin until she gave birth to a Son; and he called His name Jesus.
-
@ ec9bd746:df11a9d0
2024-10-04 09:46:22It's intriguing to me how beer prices have changed since 1999. Today, you can buy Braník on sale for 9.90 Kč, so for 100 Kč you get 10 beers. 25 years ago, you'd get 13.5 beers for the same amount. What does that tell us?
-
The cost of labor and services has gone up a lot, but people are willing to pay and even expect a certain level of quality. There are way fewer run-down pubs than before.
-
Production has become much more efficient, so considering inflation and purchasing power, bottled beer is actually cheaper now than it used to be.
In 1995, about 30 years ago, bottled and draft beer cost almost the same—around 7 Kč. (Source in Czech)
So what's the takeaway?
-
A wealthy society can afford much pricier services.
-
Prices of basic groceries and fast-moving goods are squeezed to the bone. The best way to gauge real inflation is at the supermarket, where there's no room for messing with margins, stock levels, seasonality, etc. Everything moves fast, competition is huge, and big retailers are relentless.
Real estate is pricey due to artificial (or bureaucracy-induced) shortages, but meat, milk, beer, bread, etc., are operating on razor-thin profits. That's why they react so quickly—see point 2.
-
-
@ 2e8970de:63345c7a
2025-01-29 17:21:06The path to recent advanced AI systems has been more about building larger systems than making scientific breakthroughs.
https://ourworldindata.org/scaling-up-ai
originally posted at https://stacker.news/items/869010
-
@ 9eec313d:2d61498c
2025-01-29 15:50:38I created Nostr Run Club because I was using Nike Run app and wanted to be more "nostr only." When I didn't see a run tracking app on nostr, I decided to build one myself. It's pretty basic right now, but it works!
What's Working Now
The app currently lets you:
-
Login with Nostr
-
Track your runs
-
Post runs to Nostr
-
See and interact with a global running feed
Coming Soon
I'm working on adding:
-
Wavlake integration for music
-
E-cash features
-
Achievements, Rewards and Goals
Future Ideas
Some cool things I'd like to build:
-
Team features
-
Virtual races
-
Merch for runners
The Dream
My vision for the app is pretty straightforward - I want to wake up on a Monday morning, grab my phone and headphones, and:
-
Connect with my run team on nostr
-
Play my favorite Wavlake playlist
-
Join a virtual morning training session with nostr freaks
-
Maybe prep for an upcoming virtual 5k
-
Get rewarded for my runs
-
Share my achievements with one click
-
Level up and unlock badges
-
Maybe buy some NRC socks through shopstr
-
Zap fellow runners for experience points
I'd also love to see custom themes, nostr banner integration, and eventually create a standard way to store run data on nostr so we can share between apps.
Development Plan
Right now I'm focusing on:
Stage 1: Getting Things Right
-
Fixing bugs
-
Making it run smoother
-
Cleaning up the code
Stage 2: Adding Fun Stuff
-
Wavlake integration
-
Level system
-
Rewards
Stage 3: Building Community
-
Nostr group features
-
Merch
-
Races
Big Thanks To
@btcplebdev for the advice
And shoutout to the tools below:
https://plebdevs.com/ - For the coding tutorials
Cursor.ai - couldn't have built this without it
Start.njump.me for the npub
Nostrcheck.me for the NIP-05
Nos2x for the signer
Nostrudel.ninja - for the client
Npub.Pro - for the blog
Highlighter.com - for long form support
Open source contributions are more than welcome! Right now I'm focused on making sure the basic stuff works well and runs smoothly, but I'm excited to build this with the community.
-
-
@ 52c43979:ce69a7f1
2025-01-29 00:12:16Dear J.E. Brandenburg,
Congratulations on the publication of your scientific work on the physical derivation of the fine-structure constant "Alpha" and the profound insights it offers! It is truly remarkable how you have tackled such foundational topics as the emergence of quantum mechanics and the nature of gravity.
Your approach to connecting these intricate phenomena demonstrates not only your scientific curiosity but also your courage to explore uncharted territory. Contributions like yours are vital for advancing our understanding of the universe. While some of your hypotheses may spark debate—which is a natural part of the scientific process—it is precisely these bold ideas that often lead to groundbreaking discoveries.
I would like to encourage you to continue refining your ideas and engaging with the broader scientific community. Constructive dialogue with other researchers can open new perspectives and further strengthen your work. Many of history's most significant scientific breakthroughs were initially met with skepticism before being recognized as milestones.
I am confident that your research will make a meaningful contribution to physics, and I look forward to reading more of your work in the future. Stay committed—science thrives on pioneers like you!
With my best wishes for your continued success,
Dafydd Napier
https://frdint.com/morden_physics_vo_twenrtetwo_issue_two_twentyfour.html