-
@ c631e267:c2b78d3e
2025-02-07 19:42:11Nur wenn wir aufeinander zugehen, haben wir die Chance \ auf Überwindung der gegenseitigen Ressentiments! \ Dr. med. dent. Jens Knipphals
In Wolfsburg sollte es kürzlich eine Gesprächsrunde von Kritikern der Corona-Politik mit Oberbürgermeister Dennis Weilmann und Vertretern der Stadtverwaltung geben. Der Zahnarzt und langjährige Maßnahmenkritiker Jens Knipphals hatte diese Einladung ins Rathaus erwirkt und publiziert. Seine Motivation:
«Ich möchte die Spaltung der Gesellschaft überwinden. Dazu ist eine umfassende Aufarbeitung der Corona-Krise in der Öffentlichkeit notwendig.»
Schon früher hatte Knipphals Antworten von den Kommunalpolitikern verlangt, zum Beispiel bei öffentlichen Bürgerfragestunden. Für das erwartete Treffen im Rathaus formulierte er Fragen wie: Warum wurden fachliche Argumente der Kritiker ignoriert? Weshalb wurde deren Ausgrenzung, Diskreditierung und Entmenschlichung nicht entgegengetreten? In welcher Form übernehmen Rat und Verwaltung in Wolfsburg persönlich Verantwortung für die erheblichen Folgen der politischen Corona-Krise?
Der Termin fand allerdings nicht statt – der Bürgermeister sagte ihn kurz vorher wieder ab. Knipphals bezeichnete Weilmann anschließend als Wiederholungstäter, da das Stadtoberhaupt bereits 2022 zu einem Runden Tisch in der Sache eingeladen hatte, den es dann nie gab. Gegenüber Multipolar erklärte der Arzt, Weilmann wolle scheinbar eine öffentliche Aufarbeitung mit allen Mitteln verhindern. Er selbst sei «inzwischen absolut desillusioniert» und die einzige Lösung sei, dass die Verantwortlichen gingen.
Die Aufarbeitung der Plandemie beginne bei jedem von uns selbst, sei aber letztlich eine gesamtgesellschaftliche Aufgabe, schreibt Peter Frey, der den «Fall Wolfsburg» auch in seinem Blog behandelt. Diese Aufgabe sei indes deutlich größer, als viele glaubten. Erfreulicherweise sei der öffentliche Informationsraum inzwischen größer, trotz der weiterhin unverfrorenen Desinformations-Kampagnen der etablierten Massenmedien.
Frey erinnert daran, dass Dennis Weilmann mitverantwortlich für gravierende Grundrechtseinschränkungen wie die 2021 eingeführten 2G-Regeln in der Wolfsburger Innenstadt zeichnet. Es sei naiv anzunehmen, dass ein Funktionär einzig im Interesse der Bürger handeln würde. Als früherer Dezernent des Amtes für Wirtschaft, Digitalisierung und Kultur der Autostadt kenne Weilmann zum Beispiel die Verknüpfung von Fördergeldern mit politischen Zielsetzungen gut.
Wolfsburg wurde damals zu einem Modellprojekt des Bundesministeriums des Innern (BMI) und war Finalist im Bitkom-Wettbewerb «Digitale Stadt». So habe rechtzeitig vor der Plandemie das Projekt «Smart City Wolfsburg» anlaufen können, das der Stadt «eine Vorreiterrolle für umfassende Vernetzung und Datenerfassung» aufgetragen habe, sagt Frey. Die Vereinten Nationen verkauften dann derartige «intelligente» Überwachungs- und Kontrollmaßnahmen ebenso als Rettung in der Not wie das Magazin Forbes im April 2020:
«Intelligente Städte können uns helfen, die Coronavirus-Pandemie zu bekämpfen. In einer wachsenden Zahl von Ländern tun die intelligenten Städte genau das. Regierungen und lokale Behörden nutzen Smart-City-Technologien, Sensoren und Daten, um die Kontakte von Menschen aufzuspüren, die mit dem Coronavirus infiziert sind. Gleichzeitig helfen die Smart Cities auch dabei, festzustellen, ob die Regeln der sozialen Distanzierung eingehalten werden.»
Offensichtlich gibt es viele Aspekte zu bedenken und zu durchleuten, wenn es um die Aufklärung und Aufarbeitung der sogenannten «Corona-Pandemie» und der verordneten Maßnahmen geht. Frustration und Desillusion sind angesichts der Realitäten absolut verständlich. Gerade deswegen sind Initiativen wie die von Jens Knipphals so bewundernswert und so wichtig – ebenso wie eine seiner Kernthesen: «Wir müssen aufeinander zugehen, da hilft alles nichts».
Dieser Beitrag ist zuerst auf Transition News erschienen.
-
@ a95c6243:d345522c
2025-01-31 20:02:25Im Augenblick wird mit größter Intensität, großer Umsicht \ das deutsche Volk belogen. \ Olaf Scholz im FAZ-Interview
Online-Wahlen stärken die Demokratie, sind sicher, und 61 Prozent der Wahlberechtigten sprechen sich für deren Einführung in Deutschland aus. Das zumindest behauptet eine aktuelle Umfrage, die auch über die Agentur Reuters Verbreitung in den Medien gefunden hat. Demnach würden außerdem 45 Prozent der Nichtwähler bei der Bundestagswahl ihre Stimme abgeben, wenn sie dies zum Beispiel von Ihrem PC, Tablet oder Smartphone aus machen könnten.
Die telefonische Umfrage unter gut 1000 wahlberechtigten Personen sei repräsentativ, behauptet der Auftraggeber – der Digitalverband Bitkom. Dieser präsentiert sich als eingetragener Verein mit einer beeindruckenden Liste von Mitgliedern, die Software und IT-Dienstleistungen anbieten. Erklärtes Vereinsziel ist es, «Deutschland zu einem führenden Digitalstandort zu machen und die digitale Transformation der deutschen Wirtschaft und Verwaltung voranzutreiben».
Durchgeführt hat die Befragung die Bitkom Servicegesellschaft mbH, also alles in der Familie. Die gleiche Erhebung hatte der Verband übrigens 2021 schon einmal durchgeführt. Damals sprachen sich angeblich sogar 63 Prozent für ein derartiges «Demokratie-Update» aus – die Tendenz ist demgemäß fallend. Dennoch orakelt mancher, der Gang zur Wahlurne gelte bereits als veraltet.
Die spanische Privat-Uni mit Globalisten-Touch, IE University, berichtete Ende letzten Jahres in ihrer Studie «European Tech Insights», 67 Prozent der Europäer befürchteten, dass Hacker Wahlergebnisse verfälschen könnten. Mehr als 30 Prozent der Befragten glaubten, dass künstliche Intelligenz (KI) bereits Wahlentscheidungen beeinflusst habe. Trotzdem würden angeblich 34 Prozent der unter 35-Jährigen einer KI-gesteuerten App vertrauen, um in ihrem Namen für politische Kandidaten zu stimmen.
Wie dauerhaft wird wohl das Ergebnis der kommenden Bundestagswahl sein? Diese Frage stellt sich angesichts der aktuellen Entwicklung der Migrations-Debatte und der (vorübergehend) bröckelnden «Brandmauer» gegen die AfD. Das «Zustrombegrenzungsgesetz» der Union hat das Parlament heute Nachmittag überraschenderweise abgelehnt. Dennoch muss man wohl kein ausgesprochener Pessimist sein, um zu befürchten, dass die Entscheidungen der Bürger von den selbsternannten Verteidigern der Demokratie künftig vielleicht nicht respektiert werden, weil sie nicht gefallen.
Bundesweit wird jetzt zu «Brandmauer-Demos» aufgerufen, die CDU gerät unter Druck und es wird von Übergriffen auf Parteibüros und Drohungen gegen Mitarbeiter berichtet. Sicherheitsbehörden warnen vor Eskalationen, die Polizei sei «für ein mögliches erhöhtes Aufkommen von Straftaten gegenüber Politikern und gegen Parteigebäude sensibilisiert».
Der Vorwand «unzulässiger Einflussnahme» auf Politik und Wahlen wird als Argument schon seit einiger Zeit aufgebaut. Der Manipulation schuldig befunden wird neben Putin und Trump auch Elon Musk, was lustigerweise ausgerechnet Bill Gates gerade noch einmal bekräftigt und als «völlig irre» bezeichnet hat. Man stelle sich die Diskussionen um die Gültigkeit von Wahlergebnissen vor, wenn es Online-Verfahren zur Stimmabgabe gäbe. In der Schweiz wird «E-Voting» seit einigen Jahren getestet, aber wohl bisher mit wenig Erfolg.
Die politische Brandstiftung der letzten Jahre zahlt sich immer mehr aus. Anstatt dringende Probleme der Menschen zu lösen – zu denen auch in Deutschland die weit verbreitete Armut zählt –, hat die Politik konsequent polarisiert und sich auf Ausgrenzung und Verhöhnung großer Teile der Bevölkerung konzentriert. Basierend auf Ideologie und Lügen werden abweichende Stimmen unterdrückt und kriminalisiert, nicht nur und nicht erst in diesem Augenblick. Die nächsten Wochen dürften ausgesprochen spannend werden.
Dieser Beitrag ist zuerst auf Transition News erschienen.
-
@ 3b7fc823:e194354f
2025-02-10 17:34:18Dealing with law enforcement can be a challenging and stressful experience. However, understanding your rights and knowing how to navigate such situations can empower you to protect yourself. Here’s a structured approach to handle these interactions effectively:
- Stay Calm and Compliant:
-
When approached by law enforcement, remain calm and avoid sudden movements. Slowly raise your hands and identify yourself if possible.
-
Ask for Identification:
-
Request the officer's name, badge number, and station. This documentation can be crucial later on.
-
Know Your Miranda Rights:
-
Upon arrest, you have the right to remain silent. Do not answer questions without consulting a lawyer. If Mirandized, exercise your right to remain silent.
-
Refuse Incriminating Statements:
-
Avoid answering questions that could incriminate yourself. Politely state, "I will not answer any questions at this time."
-
Document the Incident:
-
Use your phone or notebook to record details such as dates, times, and descriptions of interactions. Note any injuries or mistreatment.
-
Seek Legal Advice:
-
After the encounter, contact a lawyer. They can review evidence and provide guidance on how to proceed.
-
Understand Search and Seizure Laws:
-
Officers generally need a warrant to search your property unless there's probable cause. If stopped without a warrant, calmly refuse entry.
-
Use a Body Camera Policy:
-
If applicable, ask for the officer's body camera footage and request it via formal complaint if refused.
-
Know When to Comply:
-
Comply with instructions that do not infringe on your rights, such as providing identification when legally required.
-
Consider a Witness Statement:
- If you witness illegal actions, consider reporting them. Your role as a bystander may be crucial in documenting incidents.
-
Seek Emotional Support:
- Interactions with law enforcement can be traumatic. Reach out to support groups or mental health resources for assistance.
-
Understand Legal Recourse:
- If rights are violated, consult legal aid societies or civil rights organizations for guidance on filing complaints or seeking redress.
Conclusion: Understanding your rights and documenting interactions is essential when dealing with law enforcement. This guide provides a framework to help you navigate such situations confidently and protect your rights effectively. Remember, knowledge is power, and being informed can lead to better outcomes in challenging circumstances.
Advocating for privacy does not finance itself. If you enjoyed this article, please consider zapping or sending monero
82XCDNK1Js8TethhpGLFPbVyKe25DxMUePad1rUn9z7V6QdCzxHEE7varvVh1VUidUhHVSA4atNU2BTpSNJLC1BqSvDajw1
-
@ e771af0b:8e8ed66f
2024-09-05 22:14:04I have searched the web for "Find bitcoin block number from historical date" maybe 100 times in my life.
Never again.
You'll need a bitcoin node for this to work. The script is fast.
Install
WoT Install
one liner ```
curl
curl -o fjb.sh https://gist.githubusercontent.com/dskvr/18252c16cf85c06c1ee6cb5ae04a3197/raw/34bad6a35d98501978c8cd0c25b1628db1191cfe/fjb.sh && chmod +x fjb.sh
wget
wget -O fjb.sh https://gist.githubusercontent.com/dskvr/18252c16cf85c06c1ee6cb5ae04a3197/raw/34bad6a35d98501978c8cd0c25b1628db1191cfe/fjb.sh && chmod +x fjb.sh ```
Trust no one.
create file ``` vi fjb.sh
or
nano fjb.sh ```
review, copy and past into file ``` TIMESTAMP=$1 LOWER=0 UPPER=$(bitcoin-cli getblockcount)
while (( LOWER <= UPPER )); do MID=$(( (LOWER + UPPER) / 2 )) BLOCKHASH=$(bitcoin-cli getblockhash $MID) BLOCKTIME=$(bitcoin-cli getblockheader $BLOCKHASH | jq .time)
if (( BLOCKTIME < TIMESTAMP )); then LOWER=$(( MID + 1 )) elif (( BLOCKTIME > TIMESTAMP )); then UPPER=$(( MID - 1 )) else echo "$BLOCKTIME" exit 0 fi
done
echo "$UPPER" ```
give executable permissions
chmod +x ./fjb.sh
Usage
./fjb.sh <timestampSeconds>
It returns block number onlyExample
$: ./fjb.sh 1668779310 763719
-
@ 04ed2b8f:75be6756
2025-02-10 11:30:04The world doesn’t care about your excuses. It doesn’t care about your past, your wounds, or the battles you’ve already fought. Life will not lower the weight just because you feel tired. You either rise, or you stay down.
But here’s the truth—you are not your past. You are not your failures, not your pain, not the things that tried to break you. You are what you choose to become.
Some people get knocked down and never get back up. Some let their past define them, cage them, strip them of their potential. And then there are those who decide. They decide that no matter what happened, they will rise. They will fight. They will carve their own path, even if they have to do it with their bare hands.
Your Past is a Weapon—If You Use It Right
Your past can be two things: a chain or a sword.
- Weak minds wear their past like a shackle, letting it hold them back.
- Warriors forge their past into steel, using it as a blade to cut through the future they want.Scars? They aren’t signs of weakness. They are proof that you survived. That you endured. And that you’re still standing. So stop letting your past dictate your future. Rip the pen from its hands and write your own damn story.
The Weak Surrender. The Strong Rebuild.
Life will try to break you. That’s a fact. You will lose, you will hurt, you will doubt. But none of that matters. The only thing that matters is what you do next.
- You can let failure drown you, or you can rise stronger.
- You can let heartbreak harden you, or you can sharpen yourself through it.
- You can let regret bury you, or you can burn it as fuel.
It’s easy to stay down. To blame the world. To say, “This is just who I am.” But warriors don’t do easy. They do necessary.
You Are the Architect of Your Own Power
Everything you need to win is already inside you. You don’t need permission. You don’t need the world to approve. You just need one thing: to choose.
- Choose discipline over comfort.
- Choose hunger over hesitation.
- Choose action over excuses.
- Choose to become something greater than your past.
Because in the end, that’s the only choice that matters.
The world will try to define you. It will try to chain you to your past, drag you down with doubt, and keep you in a box. Shatter it. Prove them wrong. Be the person that refuses to be shaped by circumstance—be the one who shapes themselves.
The past is done. The future is unwritten. The power to decide who you become? That’s all yours. Now get up and take it.
-
@ c4551bf3:f041d130
2025-02-10 08:21:56TA88 là một nền tảng kỹ thuật số tiên tiến, mang đến trải nghiệm trực tuyến mượt mà và ổn định cho người dùng. Với giao diện thân thiện và thiết kế tối ưu, TA88 giúp người dùng dễ dàng truy cập trên cả máy tính và thiết bị di động. Nền tảng này được xây dựng trên công nghệ hiện đại, đảm bảo tốc độ xử lý nhanh, kết nối ổn định và khả năng tương thích cao, mang đến sự tiện lợi và linh hoạt tối đa cho người dùng.
Không ngừng đổi mới, TA88 liên tục cập nhật và nâng cấp hệ thống để mang đến chất lượng dịch vụ tốt nhất. Nền tảng này tích hợp nhiều công nghệ tiên tiến, giúp tối ưu hóa hiệu suất và nâng cao trải nghiệm người dùng. Nhờ vào sự cải tiến không ngừng, TA88 mang đến không gian giải trí phong phú, hấp dẫn và luôn bắt kịp xu hướng công nghệ, giúp người dùng có những trải nghiệm mới mẻ và thú vị.
Bên cạnh việc tập trung vào công nghệ, TA88 cũng đặc biệt chú trọng đến bảo mật và quyền riêng tư. Hệ thống bảo mật đa lớp với các giao thức mã hóa tiên tiến giúp bảo vệ dữ liệu cá nhân của người dùng một cách an toàn tuyệt đối. Việc áp dụng các biện pháp bảo mật nghiêm ngặt giúp TA88 đảm bảo môi trường trực tuyến an toàn, giúp người dùng yên tâm tận hưởng những tiện ích mà nền tảng mang lại.
Không chỉ tập trung vào công nghệ hiện đại, TA88 còn đầu tư mạnh mẽ vào dịch vụ chăm sóc khách hàng. Đội ngũ hỗ trợ chuyên nghiệp luôn sẵn sàng giải đáp mọi thắc mắc và cung cấp sự trợ giúp nhanh chóng, đảm bảo người dùng có trải nghiệm thuận tiện và hài lòng nhất. Sự tận tâm và chuyên nghiệp trong dịch vụ khách hàng là yếu tố giúp TA88 xây dựng lòng tin và sự trung thành từ cộng đồng người dùng.
Với những ưu điểm vượt trội, TA88 không ngừng đổi mới và phát triển để mang đến những trải nghiệm tối ưu. Nền tảng này liên tục cập nhật công nghệ, mở rộng tính năng và tối ưu hóa dịch vụ nhằm duy trì vị thế hàng đầu trong lĩnh vực giải trí kỹ thuật số. Nhờ vào sự kết hợp giữa công nghệ hiện đại, tính bảo mật cao và dịch vụ chuyên nghiệp, TA88 đã trở thành một trong những lựa chọn hàng đầu cho những ai tìm kiếm một nền tảng trực tuyến tiện lợi, an toàn và đáng tin cậy.
-
@ a95c6243:d345522c
2025-01-24 20:59:01Menschen tun alles, egal wie absurd, \ um ihrer eigenen Seele nicht zu begegnen. \ Carl Gustav Jung
«Extremer Reichtum ist eine Gefahr für die Demokratie», sagen über die Hälfte der knapp 3000 befragten Millionäre aus G20-Staaten laut einer Umfrage der «Patriotic Millionaires». Ferner stellte dieser Zusammenschluss wohlhabender US-Amerikaner fest, dass 63 Prozent jener Millionäre den Einfluss von Superreichen auf US-Präsident Trump als Bedrohung für die globale Stabilität ansehen.
Diese Besorgnis haben 370 Millionäre und Milliardäre am Dienstag auch den in Davos beim WEF konzentrierten Privilegierten aus aller Welt übermittelt. In einem offenen Brief forderten sie die «gewählten Führer» auf, die Superreichen – also sie selbst – zu besteuern, um «die zersetzenden Auswirkungen des extremen Reichtums auf unsere Demokratien und die Gesellschaft zu bekämpfen». Zum Beispiel kontrolliere eine handvoll extrem reicher Menschen die Medien, beeinflusse die Rechtssysteme in unzulässiger Weise und verwandele Recht in Unrecht.
Schon 2019 beanstandete der bekannte Historiker und Schriftsteller Ruthger Bregman an einer WEF-Podiumsdiskussion die Steuervermeidung der Superreichen. Die elitäre Veranstaltung bezeichnete er als «Feuerwehr-Konferenz, bei der man nicht über Löschwasser sprechen darf.» Daraufhin erhielt Bregman keine Einladungen nach Davos mehr. Auf seine Aussagen machte der Schweizer Aktivist Alec Gagneux aufmerksam, der sich seit Jahrzehnten kritisch mit dem WEF befasst. Ihm wurde kürzlich der Zutritt zu einem dreiteiligen Kurs über das WEF an der Volkshochschule Region Brugg verwehrt.
Nun ist die Erkenntnis, dass mit Geld politischer Einfluss einhergeht, alles andere als neu. Und extremer Reichtum macht die Sache nicht wirklich besser. Trotzdem hat man über Initiativen wie Patriotic Millionaires oder Taxmenow bisher eher selten etwas gehört, obwohl es sie schon lange gibt. Auch scheint es kein Problem, wenn ein Herr Gates fast im Alleingang versucht, globale Gesundheits-, Klima-, Ernährungs- oder Bevölkerungspolitik zu betreiben – im Gegenteil. Im Jahr, als der Milliardär Donald Trump zum zweiten Mal ins Weiße Haus einzieht, ist das Echo in den Gesinnungsmedien dagegen enorm – und uniform, wer hätte das gedacht.
Der neue US-Präsident hat jedoch «Davos geerdet», wie Achgut es nannte. In seiner kurzen Rede beim Weltwirtschaftsforum verteidigte er seine Politik und stellte klar, er habe schlicht eine «Revolution des gesunden Menschenverstands» begonnen. Mit deutlichen Worten sprach er unter anderem von ersten Maßnahmen gegen den «Green New Scam», und von einem «Erlass, der jegliche staatliche Zensur beendet»:
«Unsere Regierung wird die Äußerungen unserer eigenen Bürger nicht mehr als Fehlinformation oder Desinformation bezeichnen, was die Lieblingswörter von Zensoren und derer sind, die den freien Austausch von Ideen und, offen gesagt, den Fortschritt verhindern wollen.»
Wie der «Trumpismus» letztlich einzuordnen ist, muss jeder für sich selbst entscheiden. Skepsis ist definitiv angebracht, denn «einer von uns» sind weder der Präsident noch seine auserwählten Teammitglieder. Ob sie irgendeinen Sumpf trockenlegen oder Staatsverbrechen aufdecken werden oder was aus WHO- und Klimaverträgen wird, bleibt abzuwarten.
Das WHO-Dekret fordert jedenfalls die Übertragung der Gelder auf «glaubwürdige Partner», die die Aktivitäten übernehmen könnten. Zufällig scheint mit «Impfguru» Bill Gates ein weiterer Harris-Unterstützer kürzlich das Lager gewechselt zu haben: Nach einem gemeinsamen Abendessen zeigte er sich «beeindruckt» von Trumps Interesse an der globalen Gesundheit.
Mit dem Projekt «Stargate» sind weitere dunkle Wolken am Erwartungshorizont der Fangemeinde aufgezogen. Trump hat dieses Joint Venture zwischen den Konzernen OpenAI, Oracle, und SoftBank als das «größte KI-Infrastrukturprojekt der Geschichte» angekündigt. Der Stein des Anstoßes: Oracle-CEO Larry Ellison, der auch Fan von KI-gestützter Echtzeit-Überwachung ist, sieht einen weiteren potenziellen Einsatz der künstlichen Intelligenz. Sie könne dazu dienen, Krebserkrankungen zu erkennen und individuelle mRNA-«Impfstoffe» zur Behandlung innerhalb von 48 Stunden zu entwickeln.
Warum bitte sollten sich diese superreichen «Eliten» ins eigene Fleisch schneiden und direkt entgegen ihren eigenen Interessen handeln? Weil sie Menschenfreunde, sogenannte Philanthropen sind? Oder vielleicht, weil sie ein schlechtes Gewissen haben und ihre Schuld kompensieren müssen? Deswegen jedenfalls brauchen «Linke» laut Robert Willacker, einem deutschen Politikberater mit brasilianischen Wurzeln, rechte Parteien – ein ebenso überraschender wie humorvoller Erklärungsansatz.
Wenn eine Krähe der anderen kein Auge aushackt, dann tut sie das sich selbst noch weniger an. Dass Millionäre ernsthaft ihre eigene Besteuerung fordern oder Machteliten ihren eigenen Einfluss zugunsten anderer einschränken würden, halte ich für sehr unwahrscheinlich. So etwas glaube ich erst, wenn zum Beispiel die Rüstungsindustrie sich um Friedensverhandlungen bemüht, die Pharmalobby sich gegen institutionalisierte Korruption einsetzt, Zentralbanken ihre CBDC-Pläne für Bitcoin opfern oder der ÖRR die Abschaffung der Rundfunkgebühren fordert.
Dieser Beitrag ist zuerst auf Transition News erschienen.
-
@ e771af0b:8e8ed66f
2024-04-19 22:29:43Have you ever seen a relay and out of curiosity visited the https canonical of a relay by swapping out the
wss
withhttps
? I sure have, and I believe others have too. When I ranhttps://nostr.sandwich.farm
in late 2022/2023, I had thousands of hits to my relay's https canonical. Since then, I've dreamed of improving the look and feel of these generic default landing pages.With the release of myrelay.page v0.2, relays can now host their own customizable micro-client at their https canonical.
Transform your relay's landing page from this:
or this:
to something like this:
I say "something like this" because each page is customizable at runtime via the page itself.
In a nutshell
myrelay.page is a self-configuring, Client-Side Rendered (CSR) micro-client specifically built to be hosted at relay canonicals, customizable at runtime via NIP-78. Check out a live example.
Features:
- Dark or light theme
- Join relay
- Relay operator profile and feed
- Zap relay operator
- See people you follow who are on the relay
- Customizable by the relay operator
- Enable/disable blocks
- Sort blocks
- Add HTML blocks
- Add image blocks
- Add markdown blocks
- Add feed blocks, with two layouts (grid/list) and customizable filters.
You can find a full list of features complete and todo here
Why I created myrelay.page
For several different reasons.
Firstly, the default, bland relay pages always seemed like a missed opportunity. I jotted down an idea to build a relay micro-client in early January 2023, but never had the time to start it.
Next, I've been ramping up the refactor of nostr.watch and first need to catch up on client-side technologies and validate a few of my ideas. To do this, I have been conducting short research & development projects to prepare and validate ideas before integrating them into an app I intend to support long-term. One of those R&D projects is myrelay.page.
Additionally, I wanted to explore NIP-78 a bit more, a NIP that came into fruition after a conversation I had with @fiatjaf on February 23rd, 2023. It stemmed from the desire to store application-specific data for app customization. I have seen clients use NIP-78, but from what I've seen, their implementations are limited and do not demonstrate the full potential of NIP-78. There's more on NIP-78 towards the end of this article
The convergence of these needs and ideas, in addition to having an itch I needed to scratch, resulted in the creation of myrelay.page.
*Could be wrong, please let me know in the comments if you have examples of nostr clients that utilize NIP-78 for propagating customizations to other visitors.
Editor Flow
Now I'm going to give you a brief example of the Editor Flow on myrelay.page. There's a lot that isn't covered here, but I want to be as brief as possible.
Note: myrelay.page is alpha, there are bugs, quality of life issues and things are far from perfect.
Login
Presently, myrelay.page only supports NIP-07 authentication, but other authentication methods will be implemented at a later date.
In order to customize your page, you need to have a valid NIP-11 document that provides a valid hex
pubkey
value that is the same as the key you use to login.Click "Edit"
Add a block
For brevity, I'm going to add a markdown block
Configure the block
Add a title to the block and a sentence with markdown syntax.
Publish the configuration
Click publish and confirm the event, once it's been published to relays the page will refresh.
Note: Again it's alpha, so the page doesn't refresh after a few seconds, the publish probably failed. Press publish until it refreshes. Error handling here will improve with time.
Confirm state persistence
After reload, you should see your block persisted. Anyone who visits your page will see your newly configured page. Big caveat: Given the blessing of relays who store your configuration note, if your configuration cannot be found or you cannot connect to your relays, visitors will only see your relay's NIP-11.
Interested?
myrelay.page is alpha and only has two releases, so if you want to be an early adopter, you'll need the skillset and patience of an early adopter. That said, as long as you have some basic development and sysadmin skills as well as understand your reverse-proxy of choice, it's a quick, easy and low-risk side project that can be completed in about 20 minutes.
1. Build
yarn build
ornpm run build
orpnpm run build
(note: I had issues with pnpm and cannot guarantee they are resolved!)2. Deploy
Move the contents of
build
folder to your relay server (or another server that you can reverse-proxy to from your relay)3. Update your reverse-proxy configuration
You'll need to split your relay traffic from the http traffic, this ranges from easy to difficult, depending on your server of choice. - caddy: By far the easiest, see an example configuration for strfry here (easily adapted by those with experience to other relay software) - nginx: A little more stubborn, here's the most recent nginx config I got to work. You'll need to serve the static site from an internal port (
8080
in the aforementioned nginx conf) - haproxy: Should be easier than nginx or maybe even caddy, haven't tried yet. - no reverse-proxy: shrugsIf any of that's over your head, I'll be providing detailed guides for various deployment shapes within the next few weeks.
Exploring NIP-78
One of the special things about NIP-78 is that it is application specific, meaning, you don't need to conform to any existing NIP to make magic happen. Granted there are limits to this, as interoperability reigns supreme on nostr. However, there are many use cases where interoperability is not particularly desirable nor beneficial. It doesn't change the care needed to craft events, but it does enable a bunch of unique opportunities.
- A nostr client that is fully configurable and customized by the user.
- A nostr powered CMS that can be edited entirely on the client-side.
- Any use case where an application has special functionality or complex data structures that present no benefit in the context of interoperability (since they are "Application Specific").
Final thoughts
I was surprised at how quickly I was able to get myrelay.page customizable and loading within an acceptable timeframe;
NIP-11
, the operator'sNIP-65
and the myrelay.pageNIP-78
events all need to be fetched before the page is hydrated! While there is much to do around optimization, progressive page-loading, and general functionality, I'm very happy with the outcome of this short side project.I'll be shifting my focus over to another micro-app to validate a few concepts, and then on to the next nostr.watch. Rebuilding nostr.watch has been a high-priority item since shortly after Jack lit a flame under nostr in late 2022, but due to personal circumstances in 2023, I was unable to tackle it. Thanks to @opensats I am able to realize my ideas and explore ideas that have been keeping me up at night for a year or more.
Also, if you're a relay developer and are curious about making it easier for developers to deploy myrelay.page, get in touch.
Next article will likely be about the micro-app I briefly mentioned and nostr.watch. Until then, be well.
-
@ c631e267:c2b78d3e
2025-01-18 09:34:51Die grauenvollste Aussicht ist die der Technokratie – \ einer kontrollierenden Herrschaft, \ die durch verstümmelte und verstümmelnde Geister ausgeübt wird. \ Ernst Jünger
«Davos ist nicht mehr sexy», das Weltwirtschaftsforum (WEF) mache Davos kaputt, diese Aussagen eines Einheimischen las ich kürzlich in der Handelszeitung. Während sich einige vor Ort enorm an der «teuersten Gewerbeausstellung der Welt» bereicherten, würden die negativen Begleiterscheinungen wie Wohnungsnot und Niedergang der lokalen Wirtschaft immer deutlicher.
Nächsten Montag beginnt in dem Schweizer Bergdorf erneut ein Jahrestreffen dieses elitären Clubs der Konzerne, bei dem man mit hochrangigen Politikern aus aller Welt und ausgewählten Vertretern der Systemmedien zusammenhocken wird. Wie bereits in den vergangenen vier Jahren wird die Präsidentin der EU-Kommission, Ursula von der Leyen, in Begleitung von Klaus Schwab ihre Grundsatzansprache halten.
Der deutsche WEF-Gründer hatte bei dieser Gelegenheit immer höchst lobende Worte für seine Landsmännin: 2021 erklärte er sich «stolz, dass Europa wieder unter Ihrer Führung steht» und 2022 fand er es bemerkenswert, was sie erreicht habe angesichts des «erstaunlichen Wandels», den die Welt in den vorangegangenen zwei Jahren erlebt habe; es gebe nun einen «neuen europäischen Geist».
Von der Leyens Handeln während der sogenannten Corona-«Pandemie» lobte Schwab damals bereits ebenso, wie es diese Woche das Karlspreis-Direktorium tat, als man der Beschuldigten im Fall Pfizergate die diesjährige internationale Auszeichnung «für Verdienste um die europäische Einigung» verlieh. Außerdem habe sie die EU nicht nur gegen den «Aggressor Russland», sondern auch gegen die «innere Bedrohung durch Rassisten und Demagogen» sowie gegen den Klimawandel verteidigt.
Jene Herausforderungen durch «Krisen epochalen Ausmaßes» werden indes aus dem Umfeld des WEF nicht nur herbeigeredet – wie man alljährlich zur Zeit des Davoser Treffens im Global Risks Report nachlesen kann, der zusammen mit dem Versicherungskonzern Zurich erstellt wird. Seit die Globalisten 2020/21 in der Praxis gesehen haben, wie gut eine konzertierte und konsequente Angst-Kampagne funktionieren kann, geht es Schlag auf Schlag. Sie setzen alles daran, Schwabs goldenes Zeitfenster des «Great Reset» zu nutzen.
Ziel dieses «großen Umbruchs» ist die totale Kontrolle der Technokraten über die Menschen unter dem Deckmantel einer globalen Gesundheitsfürsorge. Wie aber könnte man so etwas erreichen? Ein Mittel dazu ist die «kreative Zerstörung». Weitere unabdingbare Werkzeug sind die Einbindung, ja Gleichschaltung der Medien und der Justiz.
Ein «Great Mental Reset» sei die Voraussetzung dafür, dass ein Großteil der Menschen Einschränkungen und Manipulationen wie durch die Corona-Maßnahmen praktisch kritik- und widerstandslos hinnehme, sagt der Mediziner und Molekulargenetiker Michael Nehls. Er meint damit eine regelrechte Umprogrammierung des Gehirns, wodurch nach und nach unsere Individualität und unser soziales Bewusstsein eliminiert und durch unreflektierten Konformismus ersetzt werden.
Der aktuelle Zustand unserer Gesellschaften ist auch für den Schweizer Rechtsanwalt Philipp Kruse alarmierend. Durch den Umgang mit der «Pandemie» sieht er die Grundlagen von Recht und Vernunft erschüttert, die Rechtsstaatlichkeit stehe auf dem Prüfstand. Seiner dringenden Mahnung an alle Bürger, die Prinzipien von Recht und Freiheit zu verteidigen, kann ich mich nur anschließen.
Dieser Beitrag ist zuerst auf Transition News erschienen.
-
@ c4551bf3:f041d130
2025-02-10 08:20:56333Win là một nền tảng kỹ thuật số tiên tiến, mang đến trải nghiệm trực tuyến mượt mà và ổn định cho người dùng. Với giao diện thân thiện và thiết kế tối ưu, 333Win giúp người dùng dễ dàng truy cập trên cả máy tính và thiết bị di động. Hệ thống được xây dựng trên nền tảng công nghệ hiện đại, đảm bảo tốc độ xử lý nhanh, kết nối ổn định và hiệu suất tối ưu, giúp người dùng có những trải nghiệm liền mạch, tiện lợi mọi lúc, mọi nơi.
Không ngừng đổi mới, 333WIN liên tục cập nhật và nâng cấp hệ thống nhằm mang đến chất lượng dịch vụ tốt nhất. Nền tảng này tích hợp nhiều công nghệ tiên tiến để tối ưu hóa hiệu suất, giúp nâng cao sự tiện lợi và linh hoạt trong quá trình sử dụng. Nhờ vào sự cải tiến không ngừng, 333Win tạo ra một không gian giải trí phong phú, hấp dẫn và phù hợp với nhu cầu đa dạng, giúp người dùng luôn có những trải nghiệm trọn vẹn và mới mẻ.
Bên cạnh công nghệ tiên tiến, 333Win cũng đặc biệt chú trọng đến bảo mật và quyền riêng tư. Hệ thống bảo mật đa lớp với các giao thức mã hóa tiên tiến giúp bảo vệ dữ liệu cá nhân của người dùng một cách an toàn tuyệt đối. Việc áp dụng các biện pháp bảo vệ nghiêm ngặt giúp 333Win đảm bảo môi trường trực tuyến an toàn, giúp người dùng yên tâm tận hưởng những tiện ích mà nền tảng mang lại.
Không chỉ tập trung vào công nghệ hiện đại, 333Win còn chú trọng đến chất lượng dịch vụ chăm sóc khách hàng. Đội ngũ hỗ trợ chuyên nghiệp luôn sẵn sàng giải đáp thắc mắc và cung cấp sự trợ giúp nhanh chóng, đảm bảo trải nghiệm người dùng luôn thuận tiện và hài lòng. Sự tận tâm và chuyên nghiệp trong dịch vụ là yếu tố giúp 333Win xây dựng lòng tin và sự trung thành từ cộng đồng người dùng.
Với những ưu điểm vượt trội, 333Win không ngừng đổi mới và phát triển để mang đến những trải nghiệm tốt nhất. Nền tảng này liên tục cập nhật công nghệ, mở rộng tính năng và tối ưu hóa dịch vụ nhằm duy trì vị thế hàng đầu trong lĩnh vực giải trí kỹ thuật số. Nhờ vào sự kết hợp giữa công nghệ hiện đại, tính bảo mật cao và dịch vụ chuyên nghiệp, 333Win đã trở thành một trong những lựa chọn hàng đầu cho những ai tìm kiếm một nền tảng trực tuyến tiện lợi, an toàn và đáng tin cậy.
-
@ daa41bed:88f54153
2025-02-09 16:50:04There has been a good bit of discussion on Nostr over the past few days about the merits of zaps as a method of engaging with notes, so after writing a rather lengthy article on the pros of a strategic Bitcoin reserve, I wanted to take some time to chime in on the much more fun topic of digital engagement.
Let's begin by defining a couple of things:
Nostr is a decentralized, censorship-resistance protocol whose current biggest use case is social media (think Twitter/X). Instead of relying on company servers, it relies on relays that anyone can spin up and own their own content. Its use cases are much bigger, though, and this article is hosted on my own relay, using my own Nostr relay as an example.
Zap is a tip or donation denominated in sats (small units of Bitcoin) sent from one user to another. This is generally done directly over the Lightning Network but is increasingly using Cashu tokens. For the sake of this discussion, how you transmit/receive zaps will be irrelevant, so don't worry if you don't know what Lightning or Cashu are.
If we look at how users engage with posts and follows/followers on platforms like Twitter, Facebook, etc., it becomes evident that traditional social media thrives on engagement farming. The more outrageous a post, the more likely it will get a reaction. We see a version of this on more visual social platforms like YouTube and TikTok that use carefully crafted thumbnail images to grab the user's attention to click the video. If you'd like to dive deep into the psychology and science behind social media engagement, let me know, and I'd be happy to follow up with another article.
In this user engagement model, a user is given the option to comment or like the original post, or share it among their followers to increase its signal. They receive no value from engaging with the content aside from the dopamine hit of the original experience or having their comment liked back by whatever influencer they provide value to. Ad revenue flows to the content creator. Clout flows to the content creator. Sales revenue from merch and content placement flows to the content creator. We call this a linear economy -- the idea that resources get created, used up, then thrown away. Users create content and farm as much engagement as possible, then the content is forgotten within a few hours as they move on to the next piece of content to be farmed.
What if there were a simple way to give value back to those who engage with your content? By implementing some value-for-value model -- a circular economy. Enter zaps.
Unlike traditional social media platforms, Nostr does not actively use algorithms to determine what content is popular, nor does it push content created for active user engagement to the top of a user's timeline. Yes, there are "trending" and "most zapped" timelines that users can choose to use as their default, but these use relatively straightforward engagement metrics to rank posts for these timelines.
That is not to say that we may not see clients actively seeking to refine timeline algorithms for specific metrics. Still, the beauty of having an open protocol with media that is controlled solely by its users is that users who begin to see their timeline gamed towards specific algorithms can choose to move to another client, and for those who are more tech-savvy, they can opt to run their own relays or create their own clients with personalized algorithms and web of trust scoring systems.
Zaps enable the means to create a new type of social media economy in which creators can earn for creating content and users can earn by actively engaging with it. Like and reposting content is relatively frictionless and costs nothing but a simple button tap. Zaps provide active engagement because they signal to your followers and those of the content creator that this post has genuine value, quite literally in the form of money—sats.
I have seen some comments on Nostr claiming that removing likes and reactions is for wealthy people who can afford to send zaps and that the majority of people in the US and around the world do not have the time or money to zap because they have better things to spend their money like feeding their families and paying their bills. While at face value, these may seem like valid arguments, they, unfortunately, represent the brainwashed, defeatist attitude that our current economic (and, by extension, social media) systems aim to instill in all of us to continue extracting value from our lives.
Imagine now, if those people dedicating their own time (time = money) to mine pity points on social media would instead spend that time with genuine value creation by posting content that is meaningful to cultural discussions. Imagine if, instead of complaining that their posts get no zaps and going on a tirade about how much of a victim they are, they would empower themselves to take control of their content and give value back to the world; where would that leave us? How much value could be created on a nascent platform such as Nostr, and how quickly could it overtake other platforms?
Other users argue about user experience and that additional friction (i.e., zaps) leads to lower engagement, as proven by decades of studies on user interaction. While the added friction may turn some users away, does that necessarily provide less value? I argue quite the opposite. You haven't made a few sats from zaps with your content? Can't afford to send some sats to a wallet for zapping? How about using the most excellent available resource and spending 10 seconds of your time to leave a comment? Likes and reactions are valueless transactions. Social media's real value derives from providing monetary compensation and actively engaging in a conversation with posts you find interesting or thought-provoking. Remember when humans thrived on conversation and discussion for entertainment instead of simply being an onlooker of someone else's life?
If you've made it this far, my only request is this: try only zapping and commenting as a method of engagement for two weeks. Sure, you may end up liking a post here and there, but be more mindful of how you interact with the world and break yourself from blind instinct. You'll thank me later.
-
@ c4551bf3:f041d130
2025-02-10 08:19:466623 là một nền tảng kỹ thuật số tiên tiến, mang đến trải nghiệm trực tuyến mượt mà và ổn định cho người dùng. Với giao diện thân thiện và thiết kế tối ưu, 6623 giúp người dùng dễ dàng truy cập trên cả máy tính và thiết bị di động. Hệ thống được phát triển với công nghệ hiện đại, đảm bảo tốc độ xử lý nhanh, kết nối ổn định và hiệu suất tối ưu, giúp người dùng tận hưởng dịch vụ tiện lợi và liền mạch mọi lúc, mọi nơi.
Một trong những ưu điểm nổi bật của 6623 là sự đổi mới và cập nhật liên tục nhằm nâng cao chất lượng dịch vụ. Nền tảng này luôn tích hợp các công nghệ tiên tiến nhất để tối ưu hóa hiệu suất và mang đến trải nghiệm linh hoạt cho người dùng. Nhờ vào sự cải tiến không ngừng, 6623 tạo ra một không gian giải trí phong phú, hấp dẫn và phù hợp với nhu cầu đa dạng, giúp người dùng luôn có những trải nghiệm trọn vẹn và mới mẻ.
Bên cạnh việc tập trung vào công nghệ, 6623 đặc biệt chú trọng đến bảo mật và quyền riêng tư của người dùng. Hệ thống bảo mật đa lớp với các giao thức mã hóa tiên tiến giúp bảo vệ dữ liệu cá nhân một cách an toàn tuyệt đối. Các biện pháp bảo mật nghiêm ngặt đảm bảo môi trường trực tuyến an toàn, giúp người dùng yên tâm khi trải nghiệm nền tảng mà không lo lắng về các rủi ro bảo mật.
Không chỉ tập trung vào công nghệ hiện đại, 6623 còn cung cấp dịch vụ chăm sóc khách hàng chuyên nghiệp. Đội ngũ hỗ trợ luôn sẵn sàng giải đáp thắc mắc và cung cấp sự trợ giúp nhanh chóng, đảm bảo trải nghiệm người dùng luôn thuận tiện và hài lòng nhất. Sự tận tâm trong dịch vụ là một trong những yếu tố quan trọng giúp 6623 xây dựng lòng tin và sự gắn kết với cộng đồng người dùng.
Với những ưu điểm vượt trội, 6623 không ngừng đổi mới và phát triển để mang đến những trải nghiệm tốt nhất. Nền tảng này liên tục cập nhật công nghệ, mở rộng tính năng và tối ưu hóa dịch vụ nhằm duy trì vị thế hàng đầu trong lĩnh vực giải trí kỹ thuật số. Nhờ vào sự kết hợp giữa công nghệ tiên tiến, bảo mật tối đa và dịch vụ chuyên nghiệp, 6623 đã trở thành một trong những lựa chọn hàng đầu cho những ai tìm kiếm một nền tảng trực tuyến hiện đại, tiện lợi và đáng tin cậy.
-
@ e771af0b:8e8ed66f
2023-11-28 03:49:11The last 6 months has been full full of unexpected surprises, of the unpleasant variety. So it was welcomed news that
nostrwatch
was awarded a grant by OpenSats recently which has allowed me to revisit this project and build out my original vision, the one I had before nostr went vertical.The last month has been a bit of a joyride, in that I have met little friction meeting goals. For example I was able to rewrite
nostrwatch-js
in an evening, tests another evening and did most of the Typescript conversion in 30 minutes (thanks AI!)Here's a quick summary of the last month, I'm probably missing a handful of details, but these are the important bits.
- Went through all the new NIPs, prototyped and experimented
- Nearly completed a full rewrite of
nostrwatch-js
, nownocap
. Presently porting to Typescript. Still alpha, don’t use it. - Released
nostrawl
, a wrapper fornostr-fetch
that has Queue adapters for persistent fetching. Nothing special, but needed to factor out the functionality from the legacy trawler and the requirements were general enough to make it a package. - Starting porting the nostr.watch trawler, cache layer and rest API, but much work is still needed there. Aiming to have the current infrastructure updated with new daemons by end of year.
- In concert with the cache layer testing, I ran some experiments by patching in a rough trend engine prototype from earlier this year and a novel outbox solution, both with promising results.
- Wrote a few small CLI tools to assist with developments, got acquainted with
ink
, and reacquainted myself with wonderful world of ES Module conflicts.
The rest of this year will be mostly backend work, tests and data engineering. Early next year I will begin iterative development on a new GUI and a string of CLI tools.
Luckily, nostr.watch and it's underlying infrastructure, as abysmal as it is, hasn't completely sank. Traffic is much lower than the ATH but still hovering between 2-3k unique visitors a month. I can't express in words how happy I will be when I can put the legacy nostr.watch to rest.
Next update will include a bit more of the why and how, and where I am trying to get to with this project.
Until next time.
-
@ a95c6243:d345522c
2025-01-13 10:09:57Ich begann, Social Media aufzubauen, \ um den Menschen eine Stimme zu geben. \ Mark Zuckerberg
Sind euch auch die Tränen gekommen, als ihr Mark Zuckerbergs Wendehals-Deklaration bezüglich der Meinungsfreiheit auf seinen Portalen gehört habt? Rührend, oder? Während er früher die offensichtliche Zensur leugnete und später die Regierung Biden dafür verantwortlich machte, will er nun angeblich «die Zensur auf unseren Plattformen drastisch reduzieren».
«Purer Opportunismus» ob des anstehenden Regierungswechsels wäre als Klassifizierung viel zu kurz gegriffen. Der jetzige Schachzug des Meta-Chefs ist genauso Teil einer kühl kalkulierten Business-Strategie, wie es die 180 Grad umgekehrte Praxis vorher war. Social Media sind ein höchst lukratives Geschäft. Hinzu kommt vielleicht noch ein bisschen verkorkstes Ego, weil derartig viel Einfluss und Geld sicher auch auf die Psyche schlagen. Verständlich.
«Es ist an der Zeit, zu unseren Wurzeln der freien Meinungsäußerung auf Facebook und Instagram zurückzukehren. Ich begann, Social Media aufzubauen, um den Menschen eine Stimme zu geben», sagte Zuckerberg.
Welche Wurzeln? Hat der Mann vergessen, dass er von der Überwachung, dem Ausspionieren und dem Ausverkauf sämtlicher Daten und digitaler Spuren sowie der Manipulation seiner «Kunden» lebt? Das ist knallharter Kommerz, nichts anderes. Um freie Meinungsäußerung geht es bei diesem Geschäft ganz sicher nicht, und das war auch noch nie so. Die Wurzeln von Facebook liegen in einem Projekt des US-Militärs mit dem Namen «LifeLog». Dessen Ziel war es, «ein digitales Protokoll vom Leben eines Menschen zu erstellen».
Der Richtungswechsel kommt allerdings nicht überraschend. Schon Anfang Dezember hatte Meta-Präsident Nick Clegg von «zu hoher Fehlerquote bei der Moderation» von Inhalten gesprochen. Bei der Gelegenheit erwähnte er auch, dass Mark sehr daran interessiert sei, eine aktive Rolle in den Debatten über eine amerikanische Führungsrolle im technologischen Bereich zu spielen.
Während Milliardärskollege und Big Tech-Konkurrent Elon Musk bereits seinen Posten in der kommenden Trump-Regierung in Aussicht hat, möchte Zuckerberg also nicht nur seine Haut retten – Trump hatte ihn einmal einen «Feind des Volkes» genannt und ihm lebenslange Haft angedroht –, sondern am liebsten auch mitspielen. KI-Berater ist wohl die gewünschte Funktion, wie man nach einem Treffen Trump-Zuckerberg hörte. An seine Verhaftung dachte vermutlich auch ein weiterer Multimilliardär mit eigener Social Media-Plattform, Pavel Durov, als er Zuckerberg jetzt kritisierte und gleichzeitig warnte.
Politik und Systemmedien drehen jedenfalls durch – was zu viel ist, ist zu viel. Etwas weniger Zensur und mehr Meinungsfreiheit würden die Freiheit der Bürger schwächen und seien potenziell vernichtend für die Menschenrechte. Zuckerberg setze mit dem neuen Kurs die Demokratie aufs Spiel, das sei eine «Einladung zum nächsten Völkermord», ernsthaft. Die Frage sei, ob sich die EU gegen Musk und Zuckerberg behaupten könne, Brüssel müsse jedenfalls hart durchgreifen.
Auch um die Faktenchecker macht man sich Sorgen. Für die deutsche Nachrichtenagentur dpa und die «Experten» von Correctiv, die (noch) Partner für Fact-Checking-Aktivitäten von Facebook sind, sei das ein «lukratives Geschäftsmodell». Aber möglicherweise werden die Inhalte ohne diese vermeintlichen Korrektoren ja sogar besser. Anders als Meta wollen jedoch Scholz, Faeser und die Tagesschau keine Fehler zugeben und zum Beispiel Correctiv-Falschaussagen einräumen.
Bei derlei dramatischen Befürchtungen wundert es nicht, dass der öffentliche Plausch auf X zwischen Elon Musk und AfD-Chefin Alice Weidel von 150 EU-Beamten überwacht wurde, falls es irgendwelche Rechtsverstöße geben sollte, die man ihnen ankreiden könnte. Auch der Deutsche Bundestag war wachsam. Gefunden haben dürften sie nichts. Das Ganze war eher eine Show, viel Wind wurde gemacht, aber letztlich gab es nichts als heiße Luft.
Das Anbiedern bei Donald Trump ist indes gerade in Mode. Die Weltgesundheitsorganisation (WHO) tut das auch, denn sie fürchtet um Spenden von über einer Milliarde Dollar. Eventuell könnte ja Elon Musk auch hier künftig aushelfen und der Organisation sowie deren größtem privaten Förderer, Bill Gates, etwas unter die Arme greifen. Nachdem Musks KI-Projekt xAI kürzlich von BlackRock & Co. sechs Milliarden eingestrichen hat, geht da vielleicht etwas.
Dieser Beitrag ist zuerst auf Transition News erschienen.
-
@ f7d424b5:618c51e8
2025-02-09 18:33:48(Copied from my show notes [website](https://melonmancy.net/mp-100-nuance-enjoyer) for Melonmancy)
Promise this isn't normal. It would be disingenuous to not bring it up.
We mentioned a few things in the show you might want to pull up while listening, they are the following:
- Nightmare Kart dev crashes out
- Dr Disrespect gives post-mortem on Midnight Society
- Lords of the Fallen announcement post
Obligatory:
- Listen to the new episode here!
- Discuss this episode on OUR NEW FORUM
- Get the RSS and Subscribe (this is a new feed URL, but the old one redirects here too!)
- Get a modern podcast app to use that RSS feed on at newpodcastapps.com
- Or listen to the show on the forum using the embedded Podverse player!
- Send your complaints here
Reminder that this is a Value4Value podcast so any support you can give us via a modern podcasting app is greatly appreciated and we will never bow to corporate sponsors!
Our podcast is created entirely with free software and is proudly hosted on RSSBlue!
-
@ a95c6243:d345522c
2025-01-03 20:26:47Was du bist hängt von drei Faktoren ab: \ Was du geerbt hast, \ was deine Umgebung aus dir machte \ und was du in freier Wahl \ aus deiner Umgebung und deinem Erbe gemacht hast. \ Aldous Huxley
Das brave Mitmachen und Mitlaufen in einem vorgegebenen, recht engen Rahmen ist gewiss nicht neu, hat aber gerade wieder mal Konjunktur. Dies kann man deutlich beobachten, eigentlich egal, in welchem gesellschaftlichen Bereich man sich umschaut. Individualität ist nur soweit angesagt, wie sie in ein bestimmtes Schema von «Diversität» passt, und Freiheit verkommt zur Worthülse – nicht erst durch ein gewisses Buch einer gewissen ehemaligen Regierungschefin.
Erklärungsansätze für solche Entwicklungen sind bekannt, und praktisch alle haben etwas mit Massenpsychologie zu tun. Der Herdentrieb, also der Trieb der Menschen, sich – zum Beispiel aus Unsicherheit oder Bequemlichkeit – lieber der Masse anzuschließen als selbstständig zu denken und zu handeln, ist einer der Erklärungsversuche. Andere drehen sich um Macht, Propaganda, Druck und Angst, also den gezielten Einsatz psychologischer Herrschaftsinstrumente.
Aber wollen die Menschen überhaupt Freiheit? Durch Gespräche im privaten Umfeld bin ich diesbezüglich in der letzten Zeit etwas skeptisch geworden. Um die Jahreswende philosophiert man ja gerne ein wenig über das Erlebte und über die Erwartungen für die Zukunft. Dabei hatte ich hin und wieder den Eindruck, die totalitären Anwandlungen unserer «Repräsentanten» kämen manchen Leuten gerade recht.
«Desinformation» ist so ein brisantes Thema. Davor müsse man die Menschen doch schützen, hörte ich. Jemand müsse doch zum Beispiel diese ganzen merkwürdigen Inhalte in den Social Media filtern – zur Ukraine, zum Klima, zu Gesundheitsthemen oder zur Migration. Viele wüssten ja gar nicht einzuschätzen, was richtig und was falsch ist, sie bräuchten eine Führung.
Freiheit bedingt Eigenverantwortung, ohne Zweifel. Eventuell ist es einigen tatsächlich zu anspruchsvoll, die Verantwortung für das eigene Tun und Lassen zu übernehmen. Oder die persönliche Freiheit wird nicht als ausreichend wertvolles Gut angesehen, um sich dafür anzustrengen. In dem Fall wäre die mangelnde Selbstbestimmung wohl das kleinere Übel. Allerdings fehlt dann gemäß Aldous Huxley ein Teil der Persönlichkeit. Letztlich ist natürlich alles eine Frage der Abwägung.
Sind viele Menschen möglicherweise schon so «eingenordet», dass freiheitliche Ambitionen gar nicht für eine ganze Gruppe, ein Kollektiv, verfolgt werden können? Solche Gedanken kamen mir auch, als ich mir kürzlich diverse Talks beim viertägigen Hacker-Kongress des Chaos Computer Clubs (38C3) anschaute. Ich war nicht nur überrascht, sondern reichlich erschreckt angesichts der in weiten Teilen mainstream-geformten Inhalte, mit denen ein dankbares Publikum beglückt wurde. Wo ich allgemein hellere Köpfe erwartet hatte, fand ich Konformismus und enthusiastisch untermauerte Narrative.
Gibt es vielleicht so etwas wie eine Herdenimmunität gegen Indoktrination? Ich denke, ja, zumindest eine gestärkte Widerstandsfähigkeit. Was wir brauchen, sind etwas gesunder Menschenverstand, offene Informationskanäle und der Mut, sich freier auch zwischen den Herden zu bewegen. Sie tun das bereits, aber sagen Sie es auch dieses Jahr ruhig weiter.
Dieser Beitrag ist zuerst auf Transition News erschienen.
-
@ a95c6243:d345522c
2025-01-01 17:39:51Heute möchte ich ein Gedicht mit euch teilen. Es handelt sich um eine Ballade des österreichischen Lyrikers Johann Gabriel Seidl aus dem 19. Jahrhundert. Mir sind diese Worte fest in Erinnerung, da meine Mutter sie perfekt rezitieren konnte, auch als die Kräfte schon langsam schwanden.
Dem originalen Titel «Die Uhr» habe ich für mich immer das Wort «innere» hinzugefügt. Denn der Zeitmesser – hier vermutliche eine Taschenuhr – symbolisiert zwar in dem Kontext das damalige Zeitempfinden und die Umbrüche durch die industrielle Revolution, sozusagen den Zeitgeist und das moderne Leben. Aber der Autor setzt sich philosophisch mit der Zeit auseinander und gibt seinem Werk auch eine klar spirituelle Dimension.
Das Ticken der Uhr und die Momente des Glücks und der Trauer stehen sinnbildlich für das unaufhaltsame Fortschreiten und die Vergänglichkeit des Lebens. Insofern könnte man bei der Uhr auch an eine Sonnenuhr denken. Der Rhythmus der Ereignisse passt uns vielleicht nicht immer in den Kram.
Was den Takt pocht, ist durchaus auch das Herz, unser «inneres Uhrwerk». Wenn dieses Meisterwerk einmal stillsteht, ist es unweigerlich um uns geschehen. Hoffentlich können wir dann dankbar sagen: «Ich habe mein Bestes gegeben.»
Ich trage, wo ich gehe, stets eine Uhr bei mir; \ Wieviel es geschlagen habe, genau seh ich an ihr. \ Es ist ein großer Meister, der künstlich ihr Werk gefügt, \ Wenngleich ihr Gang nicht immer dem törichten Wunsche genügt.
Ich wollte, sie wäre rascher gegangen an manchem Tag; \ Ich wollte, sie hätte manchmal verzögert den raschen Schlag. \ In meinen Leiden und Freuden, in Sturm und in der Ruh, \ Was immer geschah im Leben, sie pochte den Takt dazu.
Sie schlug am Sarge des Vaters, sie schlug an des Freundes Bahr, \ Sie schlug am Morgen der Liebe, sie schlug am Traualtar. \ Sie schlug an der Wiege des Kindes, sie schlägt, will's Gott, noch oft, \ Wenn bessere Tage kommen, wie meine Seele es hofft.
Und ward sie auch einmal träger, und drohte zu stocken ihr Lauf, \ So zog der Meister immer großmütig sie wieder auf. \ Doch stände sie einmal stille, dann wär's um sie geschehn, \ Kein andrer, als der sie fügte, bringt die Zerstörte zum Gehn.
Dann müßt ich zum Meister wandern, der wohnt am Ende wohl weit, \ Wohl draußen, jenseits der Erde, wohl dort in der Ewigkeit! \ Dann gäb ich sie ihm zurücke mit dankbar kindlichem Flehn: \ Sieh, Herr, ich hab nichts verdorben, sie blieb von selber stehn.
Johann Gabriel Seidl (1804-1875)
-
@ 5d4b6c8d:8a1c1ee3
2025-02-10 16:32:15The Super Bowl definitely threw me off a bit. My dad offered to bring some food over and the plan was to eat before the game/during the first half. I have no idea what he was doing, but for some reason, it took him two hours to get the food (that was already made) ready to eat.
All things considered, I still did ok. The dry fast was about 13 hours and I might make it to 16 hours without eating (I'm at 15 now).
Score Card
Day 1: 14 hour fast (13 dry) Day 2: 15 hour fast (14 dry) Day 3: 17 hours (16 dry) Day 4: 18 hours (17 dry) Day 5: 18 hours (16 dry) Day 6: 19 hours (16 dry) Day 7: 16 hours (15 dry) Day 8: 18 hours (17 dry) Day 9: 17 hours (17 dry) Day 10: TBD (13 dry)
originally posted at https://stacker.news/items/881691
-
@ e3ba5e1a:5e433365
2025-02-05 17:47:16I got into a friendly discussion on X regarding health insurance. The specific question was how to deal with health insurance companies (presumably unfairly) denying claims? My answer, as usual: get government out of it!
The US healthcare system is essentially the worst of both worlds:
- Unlike full single payer, individuals incur high costs
- Unlike a true free market, regulation causes increases in costs and decreases competition among insurers
I'm firmly on the side of moving towards the free market. (And I say that as someone living under a single payer system now.) Here's what I would do:
- Get rid of tax incentives that make health insurance tied to your employer, giving individuals back proper freedom of choice.
- Reduce regulations significantly.
-
In the short term, some people will still get rejected claims and other obnoxious behavior from insurance companies. We address that in two ways:
- Due to reduced regulations, new insurance companies will be able to enter the market offering more reliable coverage and better rates, and people will flock to them because they have the freedom to make their own choices.
- Sue the asses off of companies that reject claims unfairly. And ideally, as one of the few legitimate roles of government in all this, institute new laws that limit the ability of fine print to allow insurers to escape their responsibilities. (I'm hesitant that the latter will happen due to the incestuous relationship between Congress/regulators and insurers, but I can hope.)
Will this magically fix everything overnight like politicians normally promise? No. But it will allow the market to return to a healthy state. And I don't think it will take long (order of magnitude: 5-10 years) for it to come together, but that's just speculation.
And since there's a high correlation between those who believe government can fix problems by taking more control and demanding that only credentialed experts weigh in on a topic (both points I strongly disagree with BTW): I'm a trained actuary and worked in the insurance industry, and have directly seen how government regulation reduces competition, raises prices, and harms consumers.
And my final point: I don't think any prior art would be a good comparison for deregulation in the US, it's such a different market than any other country in the world for so many reasons that lessons wouldn't really translate. Nonetheless, I asked Grok for some empirical data on this, and at best the results of deregulation could be called "mixed," but likely more accurately "uncertain, confused, and subject to whatever interpretation anyone wants to apply."
https://x.com/i/grok/share/Zc8yOdrN8lS275hXJ92uwq98M
-
@ a95c6243:d345522c
2024-12-21 09:54:49Falls du beim Lesen des Titels dieses Newsletters unwillkürlich an positive Neuigkeiten aus dem globalen polit-medialen Irrenhaus oder gar aus dem wirtschaftlichen Umfeld gedacht hast, darf ich dich beglückwünschen. Diese Assoziation ist sehr löblich, denn sie weist dich als unverbesserlichen Optimisten aus. Leider muss ich dich diesbezüglich aber enttäuschen. Es geht hier um ein anderes Thema, allerdings sehr wohl ein positives, wie ich finde.
Heute ist ein ganz besonderer Tag: die Wintersonnenwende. Genau gesagt hat heute morgen um 10:20 Uhr Mitteleuropäischer Zeit (MEZ) auf der Nordhalbkugel unseres Planeten der astronomische Winter begonnen. Was daran so außergewöhnlich ist? Der kürzeste Tag des Jahres war gestern, seit heute werden die Tage bereits wieder länger! Wir werden also jetzt jeden Tag ein wenig mehr Licht haben.
Für mich ist dieses Ereignis immer wieder etwas kurios: Es beginnt der Winter, aber die Tage werden länger. Das erscheint mir zunächst wie ein Widerspruch, denn meine spontanen Assoziationen zum Winter sind doch eher Kälte und Dunkelheit, relativ zumindest. Umso erfreulicher ist der emotionale Effekt, wenn dann langsam die Erkenntnis durchsickert: Ab jetzt wird es schon wieder heller!
Natürlich ist es kalt im Winter, mancherorts mehr als anderswo. Vielleicht jedoch nicht mehr lange, wenn man den Klimahysterikern glauben wollte. Mindestens letztes Jahr hat Väterchen Frost allerdings gleich zu Beginn seiner Saison – und passenderweise während des globalen Überhitzungsgipfels in Dubai – nochmal richtig mit der Faust auf den Tisch gehauen. Schnee- und Eischaos sind ja eigentlich in der Agenda bereits nicht mehr vorgesehen. Deswegen war man in Deutschland vermutlich in vorauseilendem Gehorsam schon nicht mehr darauf vorbereitet und wurde glatt lahmgelegt.
Aber ich schweife ab. Die Aussicht auf nach und nach mehr Licht und damit auch Wärme stimmt mich froh. Den Zusammenhang zwischen beidem merkt man in Andalusien sehr deutlich. Hier, wo die Häuser im Winter arg auskühlen, geht man zum Aufwärmen raus auf die Straße oder auf den Balkon. Die Sonne hat auch im Winter eine erfreuliche Kraft. Und da ist jede Minute Gold wert.
Außerdem ist mir vor Jahren so richtig klar geworden, warum mir das südliche Klima so sehr gefällt. Das liegt nämlich nicht nur an der Sonne als solcher, oder der Wärme – das liegt vor allem am Licht. Ohne Licht keine Farben, das ist der ebenso simple wie gewaltige Unterschied zwischen einem deprimierenden matschgraubraunen Winter und einem fröhlichen bunten. Ein großes Stück Lebensqualität.
Mir gefällt aber auch die Symbolik dieses Tages: Licht aus der Dunkelheit, ein Wendepunkt, ein Neuanfang, neue Möglichkeiten, Übergang zu neuer Aktivität. In der winterlichen Stille keimt bereits neue Lebendigkeit. Und zwar in einem Zyklus, das wird immer wieder so geschehen. Ich nehme das gern als ein Stück Motivation, es macht mir Hoffnung und gibt mir Energie.
Übrigens ist parallel am heutigen Tag auf der südlichen Halbkugel Sommeranfang. Genau im entgegengesetzten Rhythmus, sich ergänzend, wie Yin und Yang. Das alles liegt an der Schrägstellung der Erdachse, die ist nämlich um 23,4º zur Umlaufbahn um die Sonne geneigt. Wir erinnern uns, gell?
Insofern bleibt eindeutig festzuhalten, dass “schräg sein” ein willkommener, wichtiger und positiver Wert ist. Mit anderen Worten: auch ungewöhnlich, eigenartig, untypisch, wunderlich, kauzig, … ja sogar irre, spinnert oder gar “quer” ist in Ordnung. Das schließt das Denken mit ein.
In diesem Sinne wünsche ich euch allen urige Weihnachtstage!
Dieser Beitrag ist letztes Jahr in meiner Denkbar erschienen.
-
@ 6bae33c8:607272e8
2025-02-10 15:27:25I didn’t realize how much I had missed a good old fashioned Super Bowl blowout. I wasn’t even gonna bet the game, but over the last couple days, I got an Eagles vibe. There was too much, “The refs won’t let the Chiefs lose”, and Patrick Mahomes and Taylor Swift, and other noise, and yet the line didn’t budge. It was obvious the Eagles were the sharper side, and they had the league’s best defense, which usually correlates to overperformance of the spread in Super Bowls, sometimes massive overperformance.
But it wasn’t any one thing — just an overall dawning on me that the Eagles were probably the right side. I didn’t feel that strongly about it, even so, and decided I’d just bet Saquon Barkley for MVP, get 3:1 or so if the Eagles won. So I texted someone in the states to place the bet for me, and best he could offer was +175! That’s a terrible value for a RB to win MVP! A few minutes later Tim Schuler offered to bet me $50, give me the Eagles +1, and I obliged him. After that, I texted my friend back to put $500 on the Eagles +1 for me.
Of course, I didn’t stay up all night to watch — after losing 1K on the Falcons (who were up 28-3 in the third quarter at 3 am) eight years ago, never again. So I caught the 40-minute version this morning. What a great game! The Eagles dominated from start to finish. The defensive line got after Mahomes on every play. And while the Chiefs sold out to stop Barkley, Jalen Hurts ran wild on them.
I’m sure I would have enjoyed a Chiefs blowout less, but the beauty of a blowout is it settles things. There’s no looking back at a bad call, a dropped pass or a fumble and wondering what might have been. Close games have drama, but they are more or less arbitrary. I mean I get it, the guy made the throw at the time with the game on the line, but maybe also he just got the cheap roughing the passer call or the ticky tack PI. When the Giants won the Super Bowl on Scott Norwood’s miss, I didn’t have the same sense of satisfaction I did when they blew out John Elway’s Broncos five years earlier. Yes, they won, but it might as well have been on a coin flip.
I grew up on blowouts in the ‘80s — Raiders-Redskins, 49ers-Dolphins, Pats-Bears, Giants-Broncos, Redskins-Broncos — only the Bengals managed to keep Super Bowl losses close (Congratulations Jeff Erickson!) This was before replay reviews and all the lawyering about what is and isn’t a completed catch. The last fucking thing you wanted was some controversy about who really outplayed whom. So it was nice to win some easy money and not to have to worry about refs or fumbles or untimely drops for a change.
-
I wanted Saquon to win MVP, but he drew the attention of the KC defense, is one of the best I’ve ever seen in blitz pickup and still had 97 yards from scrimmage. One of the all-time great years from an all-time great back. (He broke Terrell Davis’ record for the most yardage, regular season and playoffs, too, albeit in two extra games.)
-
Hurts threw the one bad pick under pressure, but it served as a good punt, and otherwise had a near perfect game. Only four other incomplete passes, 72 yards and a score on the ground. He was an easy MVP call.
-
I was a little worried about shaky Jake Elliott, but he drilled all four of his field goals, three of them twice!, due to penalties.
-
Patrick Mahomes padded his stats in garbage time, but he got crushed. An elite defense that gets home with four is the way you kill the GOATS. The Giants did it to Tom Brady twice.
-
Xavier Worthy had a nice garbage-time stat-padding game, but he was the only one. DeAndre Hopkins had a bad drop, though they got him a garbage-time feel-good TD, basically a participation trophy.
-
Congrats to Lane Johnson, Brandon Graham, Elliott and long-snapper Rick Lovato — the only four players in NFL history to defeat both Tom Brady and Mahomes in Super Bowls.
-
The only negative is I lost my $50 four-teams bet with Erickson. I had the Chiefs, Bills, Lions and Ravens, he had the field. But I directed Schuler to pay him, which is good, because I cancelled Paypal for their retarded foray into free-speech policing, and now I don’t have to figure out a workaround.
-
-
@ a95c6243:d345522c
2024-12-13 19:30:32Das Betriebsklima ist das einzige Klima, \ das du selbst bestimmen kannst. \ Anonym
Eine Strategie zur Anpassung an den Klimawandel hat das deutsche Bundeskabinett diese Woche beschlossen. Da «Wetterextreme wie die immer häufiger auftretenden Hitzewellen und Starkregenereignisse» oft desaströse Auswirkungen auf Mensch und Umwelt hätten, werde eine Anpassung an die Folgen des Klimawandels immer wichtiger. «Klimaanpassungsstrategie» nennt die Regierung das.
Für die «Vorsorge vor Klimafolgen» habe man nun erstmals klare Ziele und messbare Kennzahlen festgelegt. So sei der Erfolg überprüfbar, und das solle zu einer schnelleren Bewältigung der Folgen führen. Dass sich hinter dem Begriff Klimafolgen nicht Folgen des Klimas, sondern wohl «Folgen der globalen Erwärmung» verbergen, erklärt den Interessierten die Wikipedia. Dabei ist das mit der Erwärmung ja bekanntermaßen so eine Sache.
Die Zunahme schwerer Unwetterereignisse habe gezeigt, so das Ministerium, wie wichtig eine frühzeitige und effektive Warnung der Bevölkerung sei. Daher solle es eine deutliche Anhebung der Nutzerzahlen der sogenannten Nina-Warn-App geben.
Die ARD spurt wie gewohnt und setzt die Botschaft zielsicher um. Der Artikel beginnt folgendermaßen:
«Die Flut im Ahrtal war ein Schock für das ganze Land. Um künftig besser gegen Extremwetter gewappnet zu sein, hat die Bundesregierung eine neue Strategie zur Klimaanpassung beschlossen. Die Warn-App Nina spielt eine zentrale Rolle. Der Bund will die Menschen in Deutschland besser vor Extremwetter-Ereignissen warnen und dafür die Reichweite der Warn-App Nina deutlich erhöhen.»
Die Kommunen würden bei ihren «Klimaanpassungsmaßnahmen» vom Zentrum KlimaAnpassung unterstützt, schreibt das Umweltministerium. Mit dessen Aufbau wurden das Deutsche Institut für Urbanistik gGmbH, welches sich stark für Smart City-Projekte engagiert, und die Adelphi Consult GmbH beauftragt.
Adelphi beschreibt sich selbst als «Europas führender Think-and-Do-Tank und eine unabhängige Beratung für Klima, Umwelt und Entwicklung». Sie seien «global vernetzte Strateg*innen und weltverbessernde Berater*innen» und als «Vorreiter der sozial-ökologischen Transformation» sei man mit dem Deutschen Nachhaltigkeitspreis ausgezeichnet worden, welcher sich an den Zielen der Agenda 2030 orientiere.
Über die Warn-App mit dem niedlichen Namen Nina, die möglichst jeder auf seinem Smartphone installieren soll, informiert das Bundesamt für Bevölkerungsschutz und Katastrophenhilfe (BBK). Gewarnt wird nicht nur vor Extrem-Wetterereignissen, sondern zum Beispiel auch vor Waffengewalt und Angriffen, Strom- und anderen Versorgungsausfällen oder Krankheitserregern. Wenn man die Kategorie Gefahreninformation wählt, erhält man eine Dosis von ungefähr zwei Benachrichtigungen pro Woche.
Beim BBK erfahren wir auch einiges über die empfohlenen Systemeinstellungen für Nina. Der Benutzer möge zum Beispiel den Zugriff auf die Standortdaten «immer zulassen», und zwar mit aktivierter Funktion «genauen Standort verwenden». Die Datennutzung solle unbeschränkt sein, auch im Hintergrund. Außerdem sei die uneingeschränkte Akkunutzung zu aktivieren, der Energiesparmodus auszuschalten und das Stoppen der App-Aktivität bei Nichtnutzung zu unterbinden.
Dass man so dramatische Ereignisse wie damals im Ahrtal auch anders bewerten kann als Regierungen und Systemmedien, hat meine Kollegin Wiltrud Schwetje anhand der Tragödie im spanischen Valencia gezeigt. Das Stichwort «Agenda 2030» taucht dabei in einem Kontext auf, der wenig mit Nachhaltigkeitspreisen zu tun hat.
Dieser Beitrag ist zuerst auf Transition News erschienen.
-
@ 6ad3e2a3:c90b7740
2025-02-09 11:22:19I’m honored to have the opportunity to speak with the highly regarded and much beloved Lisbon legend Oscar Liss. Oscar has brought joy to so many children and adults alike. He even helped one person find spiritual salvation, something about which we ask him below. So please enjoy this far-ranging conversation about the meaning life and the nature of consciousness itself.
Q: Oscar, thanks so much for making the time. For the few people that don’t know you, do you mind stating your full name and date of birth?
A: My name is Oscar Liss, though officially it’s Oscar Quinta da Bicherada, the prison complex where I was born. I am a long-haired mini dachshund. I have many aliases, including Osk, Oskie, The Skeeze, Skeezeley, Skeezeley-ski, The Guy, The Guy Behind The Guy, “The Opportunist” (which I don’t like), the…
Q That’s more than sufficient, Oscar, thank you. And date of birth?
A: July 7, 2020.
Q Talk a little bit about your childhood and how you came to live in Lisbon.
A: I was in the prison complex, mostly caged for the first few months. Then I was sold to dog traffickers in Lisbon.
Q: That must have been traumatic.
A: Not really. I quickly developed Stockholm Syndrome. Whenever I see my traffickers now, I feel nothing but overwhelming joy.
Q: Wow. A lot of us can learn from that attitude. Let’s fast forward a bit to your present-day life. In what does it consist?
A: Sleep on the sofa, go for walks, fetch vegetable sticks. Sometimes go for hikes or get sent to dog camp (which is okay, but I’m always the smallest.)
Q: I meant to ask you about your size. I hope it’s not a sensitive subject.
A: I’m six inches tall, more than a foot long, weigh almost 10 pounds.
Q: Are you self-conscious about being a small dog?
A: No, but the traffickers are self-conscious on my behalf. They’re always like, “Who’s the apex predator? Who’s an apex!" Or “you’re such a big strong dog.” It’s absurd. I am fine with who I am.
Q: What’s the source of your self-confidence, I’m sure many of our readers could take a lesson from you.
A: I’m not ambitious. I’m perfectly happy to be a dog.
Q: That’s so profound. Does it not concern you some have described you as “all bark, no bite?”
A: I had a friend once who bit a few people, and they executed him. People mock, but they have no idea the stakes.
Q: Human privilege?
A: Yes. Dogs don’t get due process. There is no justice for a dog.
Q: Do you think there’s species discrimination?
A: Have you ever been rejected from a restaurant and made to wait in the car while everyone else gets in?
Q: How does that make you feel?
A: Bad. I’ve been to many dog-friendly restaurants, never had a problem, aside for that one time I urinated on the coffee shop floor.
Q: Humans often purport to know what a dog is going through, some even create social media accounts for them. What do you think of that?
A: A person of human ancestry can’t possibly know the lived experience of a dog.
Q: You mentioned vegetable sticks. Are you a vegetarian?
A: No. I have never understood the appeal of it. I just like to chew the sticks. (Sometimes I eat apples or bell peppers, but it takes work when you don’t have molars. A lot of “crunch, crunch, crunch” with my jaw.)
Q: What’s behind the alias “The Opportunist” which you said you don’t like.
A: Whenever one of the traffickers opens the refrigerator, I tend to show up in in short order.
Q: I see how that could be insulting. How would you describe your current vocation?
A: I was named “Calorie Acquisition Specialist” recently, but I also work in security.
Q: Security?
A: I make sure to let everyone know when someone’s at the front door.
Q: What goes through your mind in those cases? Are you scared?
A: Not really. Imagine if you were fast asleep and the voice of God at volume 11 screamed into your mind: “WHO THE FUCK IS AT THE DOOR!!!!!!!!!”
Q: Speaking of God, can you tell us about the time you helped a woman on the street connect with Him?
A: We were walking back from Parque Eduardo VII (by the way, Portuguese is my native language), and a woman with two regular size dachshunds, saw me, started shrieking and proclaimed, “your dog is so beautiful he proves the existence of God!”
Q: Wow. It really hit home for her. Let’s talk about your work. How do you stay in character so consistently? How do you maintain your role as a dog?
A: I was incarnated in a dog body and therefore have dog consciousness. Everything I do is a reflection of that basic fact.
Q: Some serious method acting!
A: You could call it that. I am fully immersed in the role.
Q: A lot of humans speak about past lives, can even recall them under hypnosis. Do you think you will be ever reincarnated as a dog, stuck in an infinite dog-loop, so to speak, or will you one day jump into a human body?
A: I don’t know. I focus on the present.
Q: Oscar, it’s been such a pleasure to talk with you. I really appreciate your making the time.
(buzzer sounds)
A: WHO THE FUCK IS AT THE DOOR!!!!!!!!!!!!!!
-
@ 3b7fc823:e194354f
2025-02-10 13:13:25Alright, let’s get one thing straight: you’re scrolling through your phone, shopping online, maybe even working from home. But here’s the thing – someone might be watching. Not in the creepy stalker way, but in the “is that company really needing my data?” kind of way. That’s where a Virtual Private Network (VPN) comes in, saving you from the prying eyes of marketers, governments, and even your own internet provider.
What Does a VPN Do?
A VPN creates a secure, encrypted connection between your device and a VPN server. This allows you to browse the internet anonymously, keeping your online activities private from your Internet Service Provider (ISP), network administrators, and even hackers. When you connect to a VPN, your internet traffic is routed through an intermediary server, making it difficult for anyone to track your online movements.
Why You Need a VPN: Privacy edition
- Hiding Your IP Address
Every time you jump online, your device gets an IP address, like a digital ID. If you don’t use a VPN, everyone can see this ID, making it easy for advertisers and governments to track your every move.
-
[X ] Myth: A VPN hides my IP address from everyone.
-
[X] Reality: A VPN hides your IP address only from the websites you visit and your ISP. Your internet service provider still knows you're using a VPN, but they won't be able to see what sites you're visiting. Your VPN knows what sites you are visiting and may know who you are as well.
-
Bypassing Censorship
Ever tried accessing something that’s blocked in your country? A VPN can help you bypass those restrictions, letting you watch the latest shows, access social media, or even download books without getting flagged as a troublemaker.
- Protecting Your Data
When you connect to public Wi-Fi – like at a café or airport – you’re basically handing over your data on a silver platter. A VPN encrypts this data, so even if someone intercepts it, they can’t decode it. Think of it as adding an extra layer of security.
- Avoiding Surveillance
Companies and governments love collecting data. From what you search to who you talk to, there’s a lot of stuff that’s none of their business. A VPN ensures that only you know where you’ve been online.
- Safeguarding Your Personal and Professional Life
Whether you’re working from home or just shopping for a present, a VPN keeps your activities private. It’s like having a secure safe for all your online stuff, so no one can snoop.
- Stopping Targeted Ads
Companies track your browsing habits to send you ads that follow you around the internet. A VPN breaks this cycle, making sure those creepy “you might like” ads stop following you around.
- No Logs Policy
Some VPNs keep records of your activity, which means they could be handed over if the government comes knocking. But with a no-logs policy, nothing is stored – they promise ;)
- The Dark Side of Free VPNs
Before you jump into using a free VPN, think twice. Free services often come with a catch: they might sell your data to advertisers or even track your activity themselves. It’s like getting a free hotdog at a gas station – it sounds great, but you’ll probably regret it later.
How to Use a VPN (Because You’re Not a Tech Wizard)
- Choose the Right Provider
Go for a reputable service that offers strong encryption and a no-logs policy. Look for options with a kill switch, which stops any data from being leaked if the connection drops. I prefer ones you can pay annoymously but that may be overkill for most people.
- Download and Install
Once you pick a provider, download the app to your device. It’s not rocket science, but it does require a bit more than just opening an email.
- Set It Up
Most VPNs have user-friendly interfaces. Just click “Connect” and you’re good to go. You might need to enter your login details or use a password from your provider.
The Final Word Using a VPN isn’t about being a hacker or someone with something to hide. It’s about respecting your privacy and having control over what you share online. In today’s world, where companies and governments are constantly getting more creative about how they collect data, it’s practically a requirement if you want to stay ahead of the curve.
So there you have it – the secret life of your internet. With a VPN, you’re not just protecting yourself; you’re making sure that your digital footprint is as small as possible. Whether you’re at home or on the go, a VPN gives you the freedom to surf, shop, and work without anyone watching your every move.
And hey, if you’re still not convinced, just think about it this way: imagine your internet connection as a crowded public space. Without a VPN, everyone’s staring at you. With one, you’re wearing a mask, and no one’s the wiser.
Advocating for privacy does not finance itself. If you enjoyed this article, please consider zapping or sending monero
82XCDNK1Js8TethhpGLFPbVyKe25DxMUePad1rUn9z7V6QdCzxHEE7varvVh1VUidUhHVSA4atNU2BTpSNJLC1BqSvDajw1
-
@ 31da2214:af2508e2
2025-02-10 11:23:19Video Title: Une révolution géopolitique est en marche : l’Afrique se libère ! Creator: Pensées KAMITE Published Date: February 9, 2025 Video Length: 17 minutes 6 seconds Views: >24k Likes: >2k Video URL: Original YouTube Video
Key Points from the Video:
- End of Western Hegemony: The video asserts that Western dominance in Africa is coming to an end. A geopolitical revolution is underway, breaking the chains of neocolonialism and fundamentally reshaping the continent's geopolitical landscape.
- Decline of Western Influence: The video highlights a notable decline in Western influence and power in Africa. This is contrasted with the growing presence of China and Russia, who are increasing their investments in key sectors such as infrastructure, energy, defense, natural resources, and technology across the continent.
- Shifting Economic Partnerships: China and Russia are now surpassing the European Union as Africa's primary trading partners. This indicates a significant shift in economic alliances, moving away from traditional Western partners.
- Failure of Western Strategies: The host argues that Western imperialist strategies have failed to adapt to the evolving realities in Africa. While African countries initially engaged in colonial agreements with the West, the economic landscape now favors China and Russia.
- Collapse of Unipolar World Order: This geopolitical shift is described as unprecedented, signaling the collapse of the unipolar world order established after World War II. The video suggests that the United States, weakened by costly conflicts and substantial debt, is experiencing an erosion of power. In contrast, China and Russia, leading the BRICS nations, are emerging as crucial players in a newly forming global balance of power.
- Strategic Importance of Africa: The video emphasizes Africa's strategic importance in this new global order. Emerging powers are forming alliances with African nations that are perceived as more respectful and mutually beneficial.
- Critique of Western Approach: The speaker criticizes the West's approach to Africa as cruel and paternalistic, accusing it of imposing underdevelopment policies driven by self-interest rather than genuine partnership. This approach has allegedly led to widespread poverty, conflict, economic dependence, and inequality across the continent.
- Rise of China and Russia as Alternatives: The video presents the rise of China and Russia as offering alternative partnerships that are more advantageous and respectful of African sovereignty. These new alliances are seen as enabling Africa to chart its own future.
- Call for African Collaboration: African nations are urged to collaborate with these new global actors to further accelerate the decline of Western influence in Africa. The Democratic Republic of Congo is given as an example, suggesting it should seek strategic partnerships with Russia and China for military and economic cooperation rather than relying on Western support.
- Need for Strong African Leadership: The speaker emphasizes the need for visionary and courageous African leadership, suggesting that military leaders might be better positioned to provide this strategic direction compared to civilian leaders who are portrayed as hesitant and lacking strategic vision.
- Opportunity for Africa: The video concludes that the West's decline presents a crucial moment for Africa to assert itself, support liberation movements, and challenge Western interests. It points to perceived contradictions and self-interest in Western actions on the global stage.
- Call to Action: Viewers are urged to support the movement towards a multipolar world and to advocate for the complete independence of African nations, free from Western influence.
External Context and Further Details:
To provide a broader context, it's important to consider information from external sources regarding the geopolitical shifts in Africa.
- Increased Russian and Chinese Engagement: Numerous reports and analyses confirm the growing economic and political influence of Russia and China in Africa. These countries have increased their trade, investment, and military cooperation with various African nations. Example China-Africa Growing Trade & Example Russia-Africa relations.
- Shifting Alliances and Security Concerns: The video mentions countries like Mali, Burkina Faso, Chad, and Niger. These nations have indeed experienced political instability and have, in some cases, moved away from traditional Western security partners, seeking alternatives, including Russia's Wagner Group in Mali. Example Wagner Group in Mali.
- Anti-Western Sentiment: There is a growing anti-Western sentiment in parts of Africa, fueled by historical colonial experiences, perceived neocolonial practices, and a desire for more equitable partnerships. Example Anti-Western Sentiment in Africa.
- Multipolar World Order: The concept of a transition to a multipolar world order, where power is distributed among multiple centers rather than concentrated in the West, is a widely discussed topic in international relations. The rise of China and the resurgence of Russia are key factors in this shift. Example Multipolar World Order.
Credit:
This summary is based on the YouTube video "Une révolution géopolitique est en marche : l’Afrique se libère !" created by Pensées KAMITE, published on February 9, 2025. The analysis incorporates information directly from the video and contextual details gathered from general knowledge searches to provide a more comprehensive overview.
-
@ a95c6243:d345522c
2024-12-06 18:21:15Die Ungerechtigkeit ist uns nur in dem Falle angenehm,\ dass wir Vorteile aus ihr ziehen;\ in jedem andern hegt man den Wunsch,\ dass der Unschuldige in Schutz genommen werde.\ Jean-Jacques Rousseau
Politiker beteuern jederzeit, nur das Beste für die Bevölkerung zu wollen – nicht von ihr. Auch die zahlreichen unsäglichen «Corona-Maßnahmen» waren angeblich zu unserem Schutz notwendig, vor allem wegen der «besonders vulnerablen Personen». Daher mussten alle möglichen Restriktionen zwangsweise und unter Umgehung der Parlamente verordnet werden.
Inzwischen hat sich immer deutlicher herausgestellt, dass viele jener «Schutzmaßnahmen» den gegenteiligen Effekt hatten, sie haben den Menschen und den Gesellschaften enorm geschadet. Nicht nur haben die experimentellen Geninjektionen – wie erwartet – massive Nebenwirkungen, sondern Maskentragen schadet der Psyche und der Entwicklung (nicht nur unserer Kinder) und «Lockdowns und Zensur haben Menschen getötet».
Eine der wichtigsten Waffen unserer «Beschützer» ist die Spaltung der Gesellschaft. Die tiefen Gräben, die Politiker, Lobbyisten und Leitmedien praktisch weltweit ausgehoben haben, funktionieren leider nahezu in Perfektion. Von ihren persönlichen Erfahrungen als Kritikerin der Maßnahmen berichtete kürzlich eine Schweizerin im Interview mit Transition News. Sie sei schwer enttäuscht und verspüre bis heute eine Hemmschwelle und ein seltsames Unwohlsein im Umgang mit «Geimpften».
Menschen, die aufrichtig andere schützen wollten, werden von einer eindeutig politischen Justiz verfolgt, verhaftet und angeklagt. Dazu zählen viele Ärzte, darunter Heinrich Habig, Bianca Witzschel und Walter Weber. Über den aktuell laufenden Prozess gegen Dr. Weber hat Transition News mehrfach berichtet (z.B. hier und hier). Auch der Selbstschutz durch Verweigerung der Zwangs-Covid-«Impfung» bewahrt nicht vor dem Knast, wie Bundeswehrsoldaten wie Alexander Bittner erfahren mussten.
Die eigentlich Kriminellen schützen sich derweil erfolgreich selber, nämlich vor der Verantwortung. Die «Impf»-Kampagne war «das größte Verbrechen gegen die Menschheit». Trotzdem stellt man sich in den USA gerade die Frage, ob der scheidende Präsident Joe Biden nach seinem Sohn Hunter möglicherweise auch Anthony Fauci begnadigen wird – in diesem Fall sogar präventiv. Gibt es überhaupt noch einen Rest Glaubwürdigkeit, den Biden verspielen könnte?
Der Gedanke, den ehemaligen wissenschaftlichen Chefberater des US-Präsidenten und Direktor des National Institute of Allergy and Infectious Diseases (NIAID) vorsorglich mit einem Schutzschild zu versehen, dürfte mit der vergangenen Präsidentschaftswahl zu tun haben. Gleich mehrere Personalentscheidungen des designierten Präsidenten Donald Trump lassen Leute wie Fauci erneut in den Fokus rücken.
Das Buch «The Real Anthony Fauci» des nominierten US-Gesundheitsministers Robert F. Kennedy Jr. erschien 2021 und dreht sich um die Machenschaften der Pharma-Lobby in der öffentlichen Gesundheit. Das Vorwort zur rumänischen Ausgabe des Buches schrieb übrigens Călin Georgescu, der Überraschungssieger der ersten Wahlrunde der aktuellen Präsidentschaftswahlen in Rumänien. Vielleicht erklärt diese Verbindung einen Teil der Panik im Wertewesten.
In Rumänien selber gab es gerade einen Paukenschlag: Das bisherige Ergebnis wurde heute durch das Verfassungsgericht annuliert und die für Sonntag angesetzte Stichwahl kurzfristig abgesagt – wegen angeblicher «aggressiver russischer Einmischung». Thomas Oysmüller merkt dazu an, damit sei jetzt in der EU das Tabu gebrochen, Wahlen zu verbieten, bevor sie etwas ändern können.
Unsere Empörung angesichts der Historie von Maßnahmen, die die Falschen beschützen und für die meisten von Nachteil sind, müsste enorm sein. Die Frage ist, was wir damit machen. Wir sollten nach vorne schauen und unsere Energie clever einsetzen. Abgesehen von der Umgehung von jeglichem «Schutz vor Desinformation und Hassrede» (sprich: Zensur) wird es unsere wichtigste Aufgabe sein, Gräben zu überwinden.
Dieser Beitrag ist zuerst auf Transition News erschienen.
-
@ a95c6243:d345522c
2024-11-29 19:45:43Konsum ist Therapie.
Wolfgang JoopUmweltbewusstes Verhalten und verantwortungsvoller Konsum zeugen durchaus von einer wünschenswerten Einstellung. Ob man deswegen allerdings einen grünen statt eines schwarzen Freitags braucht, darf getrost bezweifelt werden – zumal es sich um manipulatorische Konzepte handelt. Wie in der politischen Landschaft sind auch hier die Etiketten irgendwas zwischen nichtssagend und trügerisch.
Heute ist also wieder mal «Black Friday», falls Sie es noch nicht mitbekommen haben sollten. Eigentlich haben wir ja eher schon eine ganze «Black Week», der dann oft auch noch ein «Cyber Monday» folgt. Die Werbebranche wird nicht müde, immer neue Anlässe zu erfinden oder zu importieren, um uns zum Konsumieren zu bewegen. Und sie ist damit sehr erfolgreich.
Warum fallen wir auf derartige Werbetricks herein und kaufen im Zweifelsfall Dinge oder Mengen, die wir sicher nicht brauchen? Pure Psychologie, würde ich sagen. Rabattschilder triggern etwas in uns, was den Verstand in Stand-by versetzt. Zusätzlich beeinflussen uns alle möglichen emotionalen Reize und animieren uns zum Schnäppchenkauf.
Gedankenlosigkeit und Maßlosigkeit können besonders bei der Ernährung zu ernsten Problemen führen. Erst kürzlich hat mir ein Bekannter nach einer USA-Reise erzählt, dass es dort offenbar nicht unüblich ist, schon zum ausgiebigen Frühstück in einem Restaurant wenigstens einen Liter Cola zu trinken. Gerne auch mehr, um das Gratis-Nachfüllen des Bechers auszunutzen.
Kritik am schwarzen Freitag und dem unnötigen Konsum kommt oft von Umweltschützern. Neben Ressourcenverschwendung, hohem Energieverbrauch und wachsenden Müllbergen durch eine zunehmende Wegwerfmentalität kommt dabei in der Regel auch die «Klimakrise» auf den Tisch.
Die EU-Kommission lancierte 2015 den Begriff «Green Friday» im Kontext der überarbeiteten Rechtsvorschriften zur Kennzeichnung der Energieeffizienz von Elektrogeräten. Sie nutzte die Gelegenheit kurz vor dem damaligen schwarzen Freitag und vor der UN-Klimakonferenz COP21, bei der das Pariser Abkommen unterzeichnet werden sollte.
Heute wird ein grüner Freitag oft im Zusammenhang mit der Forderung nach «nachhaltigem Konsum» benutzt. Derweil ist die Europäische Union schon weit in ihr Geschäftsmodell des «Green New Deal» verstrickt. In ihrer Propaganda zum Klimawandel verspricht sie tatsächlich «Unterstützung der Menschen und Regionen, die von immer häufigeren Extremwetter-Ereignissen betroffen sind». Was wohl die Menschen in der Region um Valencia dazu sagen?
Ganz im Sinne des Great Reset propagierten die Vereinten Nationen seit Ende 2020 eine «grüne Erholung von Covid-19, um den Klimawandel zu verlangsamen». Der UN-Umweltbericht sah in dem Jahr einen Schwerpunkt auf dem Verbraucherverhalten. Änderungen des Konsumverhaltens des Einzelnen könnten dazu beitragen, den Klimaschutz zu stärken, hieß es dort.
Der Begriff «Schwarzer Freitag» wurde in den USA nicht erstmals für Einkäufe nach Thanksgiving verwendet – wie oft angenommen –, sondern für eine Finanzkrise. Jedoch nicht für den Börsencrash von 1929, sondern bereits für den Zusammenbruch des US-Goldmarktes im September 1869. Seitdem mussten die Menschen weltweit so einige schwarze Tage erleben.
Kürzlich sind die britischen Aufsichtsbehörden weiter von ihrer Zurückhaltung nach dem letzten großen Finanzcrash von 2008 abgerückt. Sie haben Regeln für den Bankensektor gelockert, womit sie «verantwortungsvolle Risikobereitschaft» unterstützen wollen. Man würde sicher zu schwarz sehen, wenn man hier ein grünes Wunder befürchten würde.
Dieser Beitrag ist zuerst auf Transition News erschienen.
-
@ dc4cd086:cee77c06
2025-02-09 03:35:25Have you ever wanted to learn from lengthy educational videos but found it challenging to navigate through hours of content? Our new tool addresses this problem by transforming long-form video lectures into easily digestible, searchable content.
Key Features:
Video Processing:
- Automatically downloads YouTube videos, transcripts, and chapter information
- Splits transcripts into sections based on video chapters
Content Summarization:
- Utilizes language models to transform spoken content into clear, readable text
- Formats output in AsciiDoc for improved readability and navigation
- Highlights key terms and concepts with [[term]] notation for potential cross-referencing
Diagram Extraction:
- Analyzes video entropy to identify static diagram/slide sections
- Provides a user-friendly GUI for manual selection of relevant time ranges
- Allows users to pick representative frames from selected ranges
Going Forward:
Currently undergoing a rewrite to improve organization and functionality, but you are welcome to try the current version, though it might not work on every machine. Will support multiple open and closed language models for user choice Free and open-source, allowing for personal customization and integration with various knowledge bases. Just because we might not have it on our official Alexandria knowledge base, you are still welcome to use it on you own personal or community knowledge bases! We want to help find connections between ideas that exist across relays, allowing individuals and groups to mix and match knowledge bases between each other, allowing for any degree of openness you care.
While designed with #Alexandria users in mind, it's available for anyone to use and adapt to their own learning needs.
Screenshots
Frame Selection
This is a screenshot of the frame selection interface. You'll see a signal that represents frame entropy over time. The vertical lines indicate the start and end of a chapter. Within these chapters you can select the frames by clicking and dragging the mouse over the desired range where you think diagram is in that chapter. At the bottom is an option that tells the program to select a specific number of frames from that selection.
Diagram Extraction
This is a screenshot of the diagram extraction interface. For every selection you've made, there will be a set of frames that you can choose from. You can select and deselect as many frames as you'd like to save.
Links
- repo: https://github.com/limina1/video_article_converter
- Nostr Apps 101: https://www.youtube.com/watch?v=Flxa_jkErqE
Output
And now, we have a demonstration of the final result of this tool, with some quick cleaning up. The video we will be using this tool on is titled Nostr Apps 101 by nostr:npub1nxy4qpqnld6kmpphjykvx2lqwvxmuxluddwjamm4nc29ds3elyzsm5avr7 during Nostrasia. The following thread is an analog to the modular articles we are constructing for Alexandria, and I hope it conveys the functionality we want to create in the knowledge space. Note, this tool is the first step! You could use a different prompt that is most appropriate for the specific context of the transcript you are working with, but you can also manually clean up any discrepancies that don't portray the video accurately. You can now view the article on #Alexandria https://next-alexandria.gitcitadel.eu/publication?d=nostr-apps-101
Initially published as chained kind 1's nostr:nevent1qvzqqqqqqypzp5r5hd579v2sszvvzfel677c8dxgxm3skl773sujlsuft64c44ncqy2hwumn8ghj7un9d3shjtnyv9kh2uewd9hj7qgwwaehxw309ahx7uewd3hkctcpzemhxue69uhhyetvv9ujumt0wd68ytnsw43z7qghwaehxw309aex2mrp0yhxummnw3ezucnpdejz7qgewaehxw309aex2mrp0yh8xmn0wf6zuum0vd5kzmp0qqsxunmjy20mvlq37vnrcshkf6sdrtkfjtjz3anuetmcuv8jswhezgc7hglpn
Or view on Coracle https://coracle.social /nevent1qqsxunmjy20mvlq37vnrcshkf6sdrtkfjtjz3anuetmcuv8jswhezgcppemhxue69uhkummn9ekx7mp0qgsdqa9md83tz5yqnrqjw07hhkpmfjpkuv9hlh5v8yhu8z274w9dv7qnnq0s3
-
@ 31da2214:af2508e2
2025-02-10 10:08:06A global privacy nightmare is unfolding. The UK government secretly ordered Apple to backdoor encrypted iCloud storage worldwide—but Apple is legally forbidden from revealing this order, or they face criminal charges. This affects 2 BILLION USERS.
Here’s the full story & why it’s part of a much bigger power grab. 🧵👇 [Thread by @sayerjigmi on Thread Reader App]
1) The UK's Secret Order to Backdoor Encryption 🔓
Under the UK’s Investigatory Powers Act (IPA) 2016, Apple was served a Technical Capability Notice (TCN)—forcing them to create a backdoor for encrypted iCloud data.
This is not limited to UK users. It applies worldwide, meaning your private files are at risk, no matter where you live.
🔗 @macworld report
2) Apple’s Legal Gag Order 🤐
Apple is legally forbidden from revealing this order. If Apple even acknowledges that the UK issued this demand, they could face criminal charges.
This is a secret government order with global consequences.
3) A Global Threat to Encryption 🌍
This isn’t just about the UK (although they are leading the charge in threatening citizens in OTHER countries for violating BRITISH censorship laws!).
If Apple complies, every government in the world will demand the same access—from the US to China to authoritarian regimes.
End-to-end encryption would be effectively dead.4) Apple’s Dilemma: Comply or Withdraw? 🚪
Apple has two choices:
- Comply & weaken encryption globally.
- Refuse & withdraw services from the UK.WhatsApp & Signal faced similar threats last year and vowed to leave the UK rather than compromise security. Will Apple do the same?
🚨 Watch the heated discussion between Damian Collins, director of CCDH (architect of the UK Online Safety Bill), and Signal’s CEO: YouTube Link
5) Why This Matters: Encryption Protects Everything 🔐
- Encryption protects financial data, health records, personal security (e.g., where you live or work), and private conversations.
- Governments always say they need backdoors for national security—but history shows they’re used for mass surveillance.
- Once a backdoor exists, hackers, rogue employees, and other governments WILL find it.
6) The UK’s War on Encryption 🛡️
The UK is trying to dominate the global surveillance & censorship landscape.
While the US, Canada, Australia, and New Zealand have supported strong encryption to mitigate cyber threats, the UK stands alone in its war on encryption.
7) The Free Speech Crackdown 🗣️
This isn’t just about encryption—it’s about control. Governments worldwide are criminalizing dissent and censoring free speech, using tech companies as their enforcement arms.
🔗 GreenMedInfo Report
8) The Global Censorship Agenda 🌐
This ties into the UK’s broader, GLOBALLY ORCHESTRATED censorship agenda:
- The Online Safety Bill criminalizes encrypted messaging & forces platforms to scan private messages.
- The Digital Services Act (EU) gives governments the power to shut down online content they don’t like.
- Leaked US-UK documents show direct coordination between UK intelligence & the Biden administration to censor online speech.
9) The Architects of Speech Policing: CCDH 🕵️♂️
The Center for Countering Digital Hate (CCDH)—a UK intelligence-backed group—has been a driving force behind global censorship.
They were caught:
- Running “black ops” to suppress RFK Jr.’s presidential campaign.
- Leading the "Kill Musk’s Twitter" directive, trying to shut down free speech on X.
- Labeling 12 private US citizens as the “Disinformation Dozen” to justify mass censorship.
🔗 Reclaim the Net Investigation
10) The Pattern is Clear: Surveillance + Censorship 🔍
1️⃣ Governments create "safety" laws to justify surveillance.
2️⃣ They pressure tech companies to enforce censorship.
3️⃣ Once encrypted services are gone, nothing is private anymore.This is the biggest attack on digital freedom in history.
11) What Can We Do? 💪
- Support companies that refuse to build backdoors (Signal, ProtonMail, etc.).
- Push for legislation that protects encryption & free speech.
- Stay informed & spread awareness—governments count on secrecy to push these policies through.
- Follow and support privacy and internet freedom organizations such as:
- @G_W_Forum
- @FFO_Freedom
- @ReclaimTheNetHQ
12) The Ultimate Power Grab: Controlling All Digital Communication 📱
If Apple caves, every other platform will be forced to follow.
📌 The UK’s Global Playbook:
- A backdoor to encryption (Investigatory Powers Act).
- A government-linked censorship network (CCDH).
- A speech-policing framework that extends worldwide (Online Safety Bill).This is a global effort to control what people can say, share, and store privately.
13) The Final Stand: Will You Comply or Resist? ⚔️🚨
They want total control—your speech, your privacy, your elections. This is the defining battle of our time.
🇬🇧 UK’s war on encryption = Global censorship blueprint.
🗳️ Election meddling + speech policing = A hijacked democracy.📢 Digital freedom is human freedom.
Stand up. Speak out. Fight back. 🏴☠️🔥
Full thread preserved by Thread Reader App.
-
@ a95c6243:d345522c
2024-11-08 20:02:32Und plötzlich weißt du:
Es ist Zeit, etwas Neues zu beginnen
und dem Zauber des Anfangs zu vertrauen.
Meister EckhartSchwarz, rot, gold leuchtet es im Kopf des Newsletters der deutschen Bundesregierung, der mir freitags ins Postfach flattert. Rot, gelb und grün werden daneben sicher noch lange vielzitierte Farben sein, auch wenn diese nie geleuchtet haben. Die Ampel hat sich gerade selber den Stecker gezogen – und hinterlässt einen wirtschaftlichen und gesellschaftlichen Trümmerhaufen.
Mit einem bemerkenswerten Timing hat die deutsche Regierungskoalition am Tag des «Comebacks» von Donald Trump in den USA endlich ihr Scheitern besiegelt. Während der eine seinen Sieg bei den Präsidentschaftswahlen feierte, erwachten die anderen jäh aus ihrer Selbsthypnose rund um Harris-Hype und Trump-Panik – mit teils erschreckenden Auswüchsen. Seit Mittwoch werden die Geschicke Deutschlands nun von einer rot-grünen Minderheitsregierung «geleitet» und man steuert auf Neuwahlen zu.
Das Kindergarten-Gehabe um zwei konkurrierende Wirtschaftsgipfel letzte Woche war bereits bezeichnend. In einem Strategiepapier gestand Finanzminister Lindner außerdem den «Absturz Deutschlands» ein und offenbarte, dass die wirtschaftlichen Probleme teilweise von der Ampel-Politik «vorsätzlich herbeigeführt» worden seien.
Lindner und weitere FDP-Minister wurden also vom Bundeskanzler entlassen. Verkehrs- und Digitalminister Wissing trat flugs aus der FDP aus; deshalb darf er nicht nur im Amt bleiben, sondern hat zusätzlich noch das Justizministerium übernommen. Und mit Jörg Kukies habe Scholz «seinen Lieblingsbock zum Obergärtner», sprich: Finanzminister befördert, meint Norbert Häring.
Es gebe keine Vertrauensbasis für die weitere Zusammenarbeit mit der FDP, hatte der Kanzler erklärt, Lindner habe zu oft sein Vertrauen gebrochen. Am 15. Januar 2025 werde er daher im Bundestag die Vertrauensfrage stellen, was ggf. den Weg für vorgezogene Neuwahlen freimachen würde.
Apropos Vertrauen: Über die Hälfte der Bundesbürger glauben, dass sie ihre Meinung nicht frei sagen können. Das ging erst kürzlich aus dem diesjährigen «Freiheitsindex» hervor, einer Studie, die die Wechselwirkung zwischen Berichterstattung der Medien und subjektivem Freiheitsempfinden der Bürger misst. «Beim Vertrauen in Staat und Medien zerreißt es uns gerade», kommentierte dies der Leiter des Schweizer Unternehmens Media Tenor, das die Untersuchung zusammen mit dem Institut für Demoskopie Allensbach durchführt.
«Die absolute Mehrheit hat absolut die Nase voll», titelte die Bild angesichts des «Ampel-Showdowns». Die Mehrheit wolle Neuwahlen und die Grünen sollten zuerst gehen, lasen wir dort.
Dass «Insolvenzminister» Robert Habeck heute seine Kandidatur für das Kanzleramt verkündet hat, kann nur als Teil der politmedialen Realitätsverweigerung verstanden werden. Wer allerdings denke, schlimmer als in Zeiten der Ampel könne es nicht mehr werden, sei reichlich optimistisch, schrieb Uwe Froschauer bei Manova. Und er kenne Friedrich Merz schlecht, der sich schon jetzt rhetorisch auf seine Rolle als oberster Feldherr Deutschlands vorbereite.
Was also tun? Der Schweizer Verein «Losdemokratie» will eine Volksinitiative lancieren, um die Bestimmung von Parlamentsmitgliedern per Los einzuführen. Das Losverfahren sorge für mehr Demokratie, denn als Alternative zum Wahlverfahren garantiere es eine breitere Beteiligung und repräsentativere Parlamente. Ob das ein Weg ist, sei dahingestellt.
In jedem Fall wird es notwendig sein, unsere Bemühungen um Freiheit und Selbstbestimmung zu verstärken. Mehr Unabhängigkeit von staatlichen und zentralen Institutionen – also die Suche nach dezentralen Lösungsansätzen – gehört dabei sicher zu den Möglichkeiten. Das gilt sowohl für jede/n Einzelne/n als auch für Entitäten wie die alternativen Medien.
Dieser Beitrag ist zuerst auf Transition News erschienen.
-
@ a012dc82:6458a70d
2025-02-08 22:44:44The world of cryptocurrency has always been a rollercoaster of highs and lows, but recent developments in the Bitcoin market have caught the attention of investors worldwide. The circulating supply of Bitcoin in profit has surged to a multi-year high, a phenomenon not seen since the heady days of November 2021 when Bitcoin reached its all-time high. This significant milestone, backed by data from industry analysts at Glassnode and a detailed report from Bitfinex, paints a picture of a robust Bitcoin market. The implications of this surge are far-reaching, affecting not just seasoned cryptocurrency traders but also new investors who are contemplating dipping their toes into the Bitcoin pool. This article aims to dissect this trend, exploring its roots, its impact on the market, and what it potentially spells out for the future of Bitcoin investment.
Table Of Content
-
Understanding the Surge
-
Implications for Long-term Investors
-
Market Strength and Investor Confidence
-
Potential Early Signs of a Bull Market
-
Caution and Market Dynamics
-
Conclusion
-
FAQs
Understanding the Surge
The surge in Bitcoin's circulating supply in profit is a complex phenomenon, driven by a confluence of market dynamics and investor behavior. The recent increase in Bitcoin's price, which saw it soar above $37,000, is a primary factor. This price hike has pushed a significant portion of Bitcoin into profitable territory. According to the Bitfinex report, over 16.3 million Bitcoin, a staggering amount by any measure, are currently in profit. This figure is considerably higher than the historical average, suggesting a market that is not only recovering but thriving. The surge is not just a momentary blip but a reflection of deeper market trends, including increased institutional interest in Bitcoin, broader acceptance of cryptocurrencies as a legitimate asset class, and the growing perception of Bitcoin as a hedge against inflation and currency devaluation.
Implications for Long-term Investors
For long-term investors, this surge in Bitcoin's profitability is a beacon of stability in the typically volatile cryptocurrency market. The fact that 70% of Bitcoin's total circulating supply has remained static over the past year is indicative of a maturing market where investors are increasingly viewing Bitcoin as a long-term investment rather than a quick profit opportunity. This holding pattern contributes to a tightening of supply, which, coupled with increasing demand, can lead to a sustained price increase. However, long-term investors should also be aware of the potential risks. The cryptocurrency market is still relatively young and can be influenced by regulatory changes, technological advancements, and shifts in investor sentiment. Therefore, while the current trend is encouraging, it should be viewed within the broader context of market dynamics.
Market Strength and Investor Confidence
The current state of the Bitcoin market is a testament to its growing strength and the confidence it instills in investors. With a majority of holders seeing positive returns, there's a renewed vigor in the market, attracting both retail and institutional investors. This influx of new investment can further stabilize the market and potentially drive prices higher. However, this increased investor confidence must be tempered with a degree of caution. The cryptocurrency market is known for its rapid fluctuations, and what goes up can just as quickly come down. Investors should be mindful of the inherent risks and conduct thorough research before making any investment decisions. The market's strength, while promising, is not a guarantee of future performance, and a prudent investment strategy should always be in place.
Potential Early Signs of a Bull Market
The analysis by Bitfinex suggests that the market might be in the early stages of a bull market. This is a significant indicator for investors, as bull markets are characterized by rising prices and increased buying activity. If this trend continues, it could lead to substantial gains for those invested in Bitcoin. However, predicting market movements, especially in the volatile world of cryptocurrencies, is fraught with uncertainty. While the signs are positive, they are not infallible indicators of future performance. Investors should therefore approach this potential bull market with optimism tempered by realism, recognizing that market conditions can change rapidly and without warning.
Caution and Market Dynamics
In the face of these optimistic trends, a word of caution is warranted. The cryptocurrency market is notoriously unpredictable, and while the current indicators are positive, they are not immune to sudden and unexpected changes. Factors such as regulatory announcements, technological breakthroughs, or macroeconomic shifts can rapidly alter the market landscape. Therefore, investors should remain vigilant, keeping abreast of market news and trends. Diversification of investments, a keen understanding of market dynamics, and a clear investment strategy are essential tools in navigating the complexities of the Bitcoin market.
Conclusion
The surge in Bitcoin's circulating supply in profit to a multi-year high marks a significant milestone in the cryptocurrency's journey. It reflects a market that is gaining maturity, strength, and the confidence of its investors. This development could herald the beginning of a new era for Bitcoin, characterized by stability and sustained growth. However, the path of Bitcoin and the broader cryptocurrency market remains unpredictable. Investors should therefore approach this market with a well-informed strategy, balancing optimism with a healthy dose of caution. In the ever-evolving world of cryptocurrency, staying informed and adaptable is key to navigating the market's highs and lows.
FAQs
How does this surge affect long-term investors? Long-term investors may see this as a sign of market stability and maturity, indicating that Bitcoin is increasingly being viewed as a viable long-term investment.
Could this trend indicate the start of a Bitcoin bull market? While the surge in profitable Bitcoin supply could be an early sign of a bull market, predicting market movements in the volatile cryptocurrency sector is complex and uncertain.
What percentage of Bitcoin's circulating supply is currently in profit? Over 83% of Bitcoin's circulating supply is reported to be in profit, according to recent data.
What should investors be cautious about in light of this surge? Investors should be aware of the inherent volatility in the cryptocurrency market and consider factors like regulatory changes, technological advancements, and broader market dynamics before making investment decisions.
How does the current Bitcoin market compare to historical averages? The current percentage of Bitcoin in profit is significantly higher than the historical average, indicating a particularly strong market phase.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co
Youtube: @croxroadnews
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ 1c197b12:242e1642
2025-02-09 22:56:33A Cypherpunk's Manifesto by Eric Hughes
Privacy is necessary for an open society in the electronic age. Privacy is not secrecy. A private matter is something one doesn't want the whole world to know, but a secret matter is something one doesn't want anybody to know. Privacy is the power to selectively reveal oneself to the world.
If two parties have some sort of dealings, then each has a memory of their interaction. Each party can speak about their own memory of this; how could anyone prevent it? One could pass laws against it, but the freedom of speech, even more than privacy, is fundamental to an open society; we seek not to restrict any speech at all. If many parties speak together in the same forum, each can speak to all the others and aggregate together knowledge about individuals and other parties. The power of electronic communications has enabled such group speech, and it will not go away merely because we might want it to.
Since we desire privacy, we must ensure that each party to a transaction have knowledge only of that which is directly necessary for that transaction. Since any information can be spoken of, we must ensure that we reveal as little as possible. In most cases personal identity is not salient. When I purchase a magazine at a store and hand cash to the clerk, there is no need to know who I am. When I ask my electronic mail provider to send and receive messages, my provider need not know to whom I am speaking or what I am saying or what others are saying to me; my provider only need know how to get the message there and how much I owe them in fees. When my identity is revealed by the underlying mechanism of the transaction, I have no privacy. I cannot here selectively reveal myself; I must always reveal myself.
Therefore, privacy in an open society requires anonymous transaction systems. Until now, cash has been the primary such system. An anonymous transaction system is not a secret transaction system. An anonymous system empowers individuals to reveal their identity when desired and only when desired; this is the essence of privacy.
Privacy in an open society also requires cryptography. If I say something, I want it heard only by those for whom I intend it. If the content of my speech is available to the world, I have no privacy. To encrypt is to indicate the desire for privacy, and to encrypt with weak cryptography is to indicate not too much desire for privacy. Furthermore, to reveal one's identity with assurance when the default is anonymity requires the cryptographic signature.
We cannot expect governments, corporations, or other large, faceless organizations to grant us privacy out of their beneficence. It is to their advantage to speak of us, and we should expect that they will speak. To try to prevent their speech is to fight against the realities of information. Information does not just want to be free, it longs to be free. Information expands to fill the available storage space. Information is Rumor's younger, stronger cousin; Information is fleeter of foot, has more eyes, knows more, and understands less than Rumor.
We must defend our own privacy if we expect to have any. We must come together and create systems which allow anonymous transactions to take place. People have been defending their own privacy for centuries with whispers, darkness, envelopes, closed doors, secret handshakes, and couriers. The technologies of the past did not allow for strong privacy, but electronic technologies do.
We the Cypherpunks are dedicated to building anonymous systems. We are defending our privacy with cryptography, with anonymous mail forwarding systems, with digital signatures, and with electronic money.
Cypherpunks write code. We know that someone has to write software to defend privacy, and since we can't get privacy unless we all do, we're going to write it. We publish our code so that our fellow Cypherpunks may practice and play with it. Our code is free for all to use, worldwide. We don't much care if you don't approve of the software we write. We know that software can't be destroyed and that a widely dispersed system can't be shut down.
Cypherpunks deplore regulations on cryptography, for encryption is fundamentally a private act. The act of encryption, in fact, removes information from the public realm. Even laws against cryptography reach only so far as a nation's border and the arm of its violence. Cryptography will ineluctably spread over the whole globe, and with it the anonymous transactions systems that it makes possible.
For privacy to be widespread it must be part of a social contract. People must come and together deploy these systems for the common good. Privacy only extends so far as the cooperation of one's fellows in society. We the Cypherpunks seek your questions and your concerns and hope we may engage you so that we do not deceive ourselves. We will not, however, be moved out of our course because some may disagree with our goals.
The Cypherpunks are actively engaged in making the networks safer for privacy. Let us proceed together apace.
Onward.
Eric Hughes hughes@soda.berkeley.edu
9 March 1993
-
@ 91bea5cd:1df4451c
2025-02-04 17:24:50Definição de ULID:
Timestamp 48 bits, Aleatoriedade 80 bits Sendo Timestamp 48 bits inteiro, tempo UNIX em milissegundos, Não ficará sem espaço até o ano 10889 d.C. e Aleatoriedade 80 bits, Fonte criptograficamente segura de aleatoriedade, se possível.
Gerar ULID
```sql
CREATE EXTENSION IF NOT EXISTS pgcrypto;
CREATE FUNCTION generate_ulid() RETURNS TEXT AS $$ DECLARE -- Crockford's Base32 encoding BYTEA = '0123456789ABCDEFGHJKMNPQRSTVWXYZ'; timestamp BYTEA = E'\000\000\000\000\000\000'; output TEXT = '';
unix_time BIGINT; ulid BYTEA; BEGIN -- 6 timestamp bytes unix_time = (EXTRACT(EPOCH FROM CLOCK_TIMESTAMP()) * 1000)::BIGINT; timestamp = SET_BYTE(timestamp, 0, (unix_time >> 40)::BIT(8)::INTEGER); timestamp = SET_BYTE(timestamp, 1, (unix_time >> 32)::BIT(8)::INTEGER); timestamp = SET_BYTE(timestamp, 2, (unix_time >> 24)::BIT(8)::INTEGER); timestamp = SET_BYTE(timestamp, 3, (unix_time >> 16)::BIT(8)::INTEGER); timestamp = SET_BYTE(timestamp, 4, (unix_time >> 8)::BIT(8)::INTEGER); timestamp = SET_BYTE(timestamp, 5, unix_time::BIT(8)::INTEGER);
-- 10 entropy bytes ulid = timestamp || gen_random_bytes(10);
-- Encode the timestamp output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 0) & 224) >> 5)); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 0) & 31))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 1) & 248) >> 3)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 1) & 7) << 2) | ((GET_BYTE(ulid, 2) & 192) >> 6))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 2) & 62) >> 1)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 2) & 1) << 4) | ((GET_BYTE(ulid, 3) & 240) >> 4))); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 3) & 15) << 1) | ((GET_BYTE(ulid, 4) & 128) >> 7))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 4) & 124) >> 2)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 4) & 3) << 3) | ((GET_BYTE(ulid, 5) & 224) >> 5))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 5) & 31)));
-- Encode the entropy output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 6) & 248) >> 3)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 6) & 7) << 2) | ((GET_BYTE(ulid, 7) & 192) >> 6))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 7) & 62) >> 1)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 7) & 1) << 4) | ((GET_BYTE(ulid, 8) & 240) >> 4))); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 8) & 15) << 1) | ((GET_BYTE(ulid, 9) & 128) >> 7))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 9) & 124) >> 2)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 9) & 3) << 3) | ((GET_BYTE(ulid, 10) & 224) >> 5))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 10) & 31))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 11) & 248) >> 3)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 11) & 7) << 2) | ((GET_BYTE(ulid, 12) & 192) >> 6))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 12) & 62) >> 1)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 12) & 1) << 4) | ((GET_BYTE(ulid, 13) & 240) >> 4))); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 13) & 15) << 1) | ((GET_BYTE(ulid, 14) & 128) >> 7))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 14) & 124) >> 2)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 14) & 3) << 3) | ((GET_BYTE(ulid, 15) & 224) >> 5))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 15) & 31)));
RETURN output; END $$ LANGUAGE plpgsql VOLATILE; ```
ULID TO UUID
```sql CREATE OR REPLACE FUNCTION parse_ulid(ulid text) RETURNS bytea AS $$ DECLARE -- 16byte bytes bytea = E'\x00000000 00000000 00000000 00000000'; v char[]; -- Allow for O(1) lookup of index values dec integer[] = ARRAY[ 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 255, 255, 255, 255, 255, 255, 255, 10, 11, 12, 13, 14, 15, 16, 17, 1, 18, 19, 1, 20, 21, 0, 22, 23, 24, 25, 26, 255, 27, 28, 29, 30, 31, 255, 255, 255, 255, 255, 255, 10, 11, 12, 13, 14, 15, 16, 17, 1, 18, 19, 1, 20, 21, 0, 22, 23, 24, 25, 26, 255, 27, 28, 29, 30, 31 ]; BEGIN IF NOT ulid ~* '^[0-7][0-9ABCDEFGHJKMNPQRSTVWXYZ]{25}$' THEN RAISE EXCEPTION 'Invalid ULID: %', ulid; END IF;
v = regexp_split_to_array(ulid, '');
-- 6 bytes timestamp (48 bits) bytes = SET_BYTE(bytes, 0, (dec[ASCII(v[1])] << 5) | dec[ASCII(v[2])]); bytes = SET_BYTE(bytes, 1, (dec[ASCII(v[3])] << 3) | (dec[ASCII(v[4])] >> 2)); bytes = SET_BYTE(bytes, 2, (dec[ASCII(v[4])] << 6) | (dec[ASCII(v[5])] << 1) | (dec[ASCII(v[6])] >> 4)); bytes = SET_BYTE(bytes, 3, (dec[ASCII(v[6])] << 4) | (dec[ASCII(v[7])] >> 1)); bytes = SET_BYTE(bytes, 4, (dec[ASCII(v[7])] << 7) | (dec[ASCII(v[8])] << 2) | (dec[ASCII(v[9])] >> 3)); bytes = SET_BYTE(bytes, 5, (dec[ASCII(v[9])] << 5) | dec[ASCII(v[10])]);
-- 10 bytes of entropy (80 bits); bytes = SET_BYTE(bytes, 6, (dec[ASCII(v[11])] << 3) | (dec[ASCII(v[12])] >> 2)); bytes = SET_BYTE(bytes, 7, (dec[ASCII(v[12])] << 6) | (dec[ASCII(v[13])] << 1) | (dec[ASCII(v[14])] >> 4)); bytes = SET_BYTE(bytes, 8, (dec[ASCII(v[14])] << 4) | (dec[ASCII(v[15])] >> 1)); bytes = SET_BYTE(bytes, 9, (dec[ASCII(v[15])] << 7) | (dec[ASCII(v[16])] << 2) | (dec[ASCII(v[17])] >> 3)); bytes = SET_BYTE(bytes, 10, (dec[ASCII(v[17])] << 5) | dec[ASCII(v[18])]); bytes = SET_BYTE(bytes, 11, (dec[ASCII(v[19])] << 3) | (dec[ASCII(v[20])] >> 2)); bytes = SET_BYTE(bytes, 12, (dec[ASCII(v[20])] << 6) | (dec[ASCII(v[21])] << 1) | (dec[ASCII(v[22])] >> 4)); bytes = SET_BYTE(bytes, 13, (dec[ASCII(v[22])] << 4) | (dec[ASCII(v[23])] >> 1)); bytes = SET_BYTE(bytes, 14, (dec[ASCII(v[23])] << 7) | (dec[ASCII(v[24])] << 2) | (dec[ASCII(v[25])] >> 3)); bytes = SET_BYTE(bytes, 15, (dec[ASCII(v[25])] << 5) | dec[ASCII(v[26])]);
RETURN bytes; END $$ LANGUAGE plpgsql IMMUTABLE;
CREATE OR REPLACE FUNCTION ulid_to_uuid(ulid text) RETURNS uuid AS $$ BEGIN RETURN encode(parse_ulid(ulid), 'hex')::uuid; END $$ LANGUAGE plpgsql IMMUTABLE; ```
UUID to ULID
```sql CREATE OR REPLACE FUNCTION uuid_to_ulid(id uuid) RETURNS text AS $$ DECLARE encoding bytea = '0123456789ABCDEFGHJKMNPQRSTVWXYZ'; output text = ''; uuid_bytes bytea = uuid_send(id); BEGIN
-- Encode the timestamp output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 0) & 224) >> 5)); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 0) & 31))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 1) & 248) >> 3)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 1) & 7) << 2) | ((GET_BYTE(uuid_bytes, 2) & 192) >> 6))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 2) & 62) >> 1)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 2) & 1) << 4) | ((GET_BYTE(uuid_bytes, 3) & 240) >> 4))); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 3) & 15) << 1) | ((GET_BYTE(uuid_bytes, 4) & 128) >> 7))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 4) & 124) >> 2)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 4) & 3) << 3) | ((GET_BYTE(uuid_bytes, 5) & 224) >> 5))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 5) & 31)));
-- Encode the entropy output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 6) & 248) >> 3)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 6) & 7) << 2) | ((GET_BYTE(uuid_bytes, 7) & 192) >> 6))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 7) & 62) >> 1)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 7) & 1) << 4) | ((GET_BYTE(uuid_bytes, 8) & 240) >> 4))); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 8) & 15) << 1) | ((GET_BYTE(uuid_bytes, 9) & 128) >> 7))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 9) & 124) >> 2)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 9) & 3) << 3) | ((GET_BYTE(uuid_bytes, 10) & 224) >> 5))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 10) & 31))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 11) & 248) >> 3)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 11) & 7) << 2) | ((GET_BYTE(uuid_bytes, 12) & 192) >> 6))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 12) & 62) >> 1)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 12) & 1) << 4) | ((GET_BYTE(uuid_bytes, 13) & 240) >> 4))); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 13) & 15) << 1) | ((GET_BYTE(uuid_bytes, 14) & 128) >> 7))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 14) & 124) >> 2)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 14) & 3) << 3) | ((GET_BYTE(uuid_bytes, 15) & 224) >> 5))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 15) & 31)));
RETURN output; END $$ LANGUAGE plpgsql IMMUTABLE; ```
Gera 11 Digitos aleatórios: YBKXG0CKTH4
```sql -- Cria a extensão pgcrypto para gerar uuid CREATE EXTENSION IF NOT EXISTS pgcrypto;
-- Cria a função para gerar ULID CREATE OR REPLACE FUNCTION gen_lrandom() RETURNS TEXT AS $$ DECLARE ts_millis BIGINT; ts_chars TEXT; random_bytes BYTEA; random_chars TEXT; base32_chars TEXT := '0123456789ABCDEFGHJKMNPQRSTVWXYZ'; i INT; BEGIN -- Pega o timestamp em milissegundos ts_millis := FLOOR(EXTRACT(EPOCH FROM clock_timestamp()) * 1000)::BIGINT;
-- Converte o timestamp para base32 ts_chars := ''; FOR i IN REVERSE 0..11 LOOP ts_chars := ts_chars || substr(base32_chars, ((ts_millis >> (5 * i)) & 31) + 1, 1); END LOOP; -- Gera 10 bytes aleatórios e converte para base32 random_bytes := gen_random_bytes(10); random_chars := ''; FOR i IN 0..9 LOOP random_chars := random_chars || substr(base32_chars, ((get_byte(random_bytes, i) >> 3) & 31) + 1, 1); IF i < 9 THEN random_chars := random_chars || substr(base32_chars, (((get_byte(random_bytes, i) & 7) << 2) | (get_byte(random_bytes, i + 1) >> 6)) & 31 + 1, 1); ELSE random_chars := random_chars || substr(base32_chars, ((get_byte(random_bytes, i) & 7) << 2) + 1, 1); END IF; END LOOP; -- Concatena o timestamp e os caracteres aleatórios RETURN ts_chars || random_chars;
END; $$ LANGUAGE plpgsql; ```
Exemplo de USO
```sql -- Criação da extensão caso não exista CREATE EXTENSION IF NOT EXISTS pgcrypto; -- Criação da tabela pessoas CREATE TABLE pessoas ( ID UUID DEFAULT gen_random_uuid ( ) PRIMARY KEY, nome TEXT NOT NULL );
-- Busca Pessoa na tabela SELECT * FROM "pessoas" WHERE uuid_to_ulid ( ID ) = '252FAC9F3V8EF80SSDK8PXW02F'; ```
Fontes
- https://github.com/scoville/pgsql-ulid
- https://github.com/geckoboard/pgulid
-
@ 40b9c85f:5e61b451
2025-02-09 20:53:03Data Vending Machine Context Protocol
The Convergence of Nostr DVMs and MCP
In the rapidly evolving landscape of artificial intelligence, a new approach to sharing and accessing computational tools is emerging through the combination of two powerful technologies: Nostr's Data Vending Machines (DVMs) and the Model Context Protocol (MCP). This convergence has the potential to reshape how we think about tool distribution and accessibility, creating a truly decentralized marketplace for computational capabilities that serves AI, humans, and any type of machine that speaks the protocol.
Understanding the Building Blocks
Nostr's Data Vending Machines function much like their physical counterparts, but instead of dispensing snacks, they provide computational services with built-in Lightning Network payment capabilities. These DVMs operate on the decentralized Nostr network, allowing users to reach service providers without relying on centralized platforms or gatekeepers.
The Model Context Protocol complements this infrastructure by providing a standardized way for applications to share context and expose their capabilities. Think of MCP as a universal language that allows tools to communicate effectively with any application that understands the protocol. This standardization is crucial for creating a seamless experience across different tools and services.
What is DVMCP?
DVMCP proposes a path for making DVMs and MCPs interoperable, introducing a protocol that makes local utilities available to everyone on the network. Our draft specification serves as a foundation for easily transforming any MCP server into a DVM. To bridge these technologies, we've developed a simple software component that sits between your MCP server and the DVM ecosystem. You can find it in our repository. This bridge connects to your MCP server as a client and exposes its utilities through Nostr as a DVM, handling all the necessary Nostr logic. This means any existing MCP server can become accessible through Nostr without modifications - simply run the bridge alongside your server.
This is particularly exciting because the vibrant and growing MCP community. Any team or individual already working with MCP can instantly plug into the Nostr DVM ecosystem, gaining access to decentralized discovery, built-in monetization, and an already existing user base. The bridge component makes this transition effortless, requiring no changes to any existing MCP implementations.
A New Paradigm
A decentralized marketplace where anyone can run tools locally and make them available globally. This addresses an unsolved problem larger than the Nostr ecosystem: how to make resources and tools discoverable and accessible in a decentralized, permissionless way.
The power of this combination lies in its flexibility. Users can access tools through regular Nostr clients, AI agents can discover specific capabilities, and DVMs can create sophisticated tool chains. With Lightning Network integration, true machine-to-machine transactions become possible, where machines can autonomously discover, negotiate, and pay for computational services. Most importantly, you can run services on your own hardware while making these capabilities accessible to anyone anywhere.
The result is a system that preserves privacy, promotes innovation, and creates new opportunities without central authorities controlling what tools can be offered or who can use them. The entire project, is available under the MIT license, and any feedback and collaboration is welcome.
Looking Forward
As these technologies mature, we're likely to see a fundamental shift in how computational capabilities are distributed and accessed. Instead of relying on massive cloud data centers controlled by a few companies, we're moving toward a global network of local machines, each contributing unique capabilities and computation to a larger, more resilient ecosystem.
The convergence of Nostr DVMs and MCP represents more than just a technical innovation—it's a step toward a more equitable and accessible future. By enabling anyone to run and share tools, we're building an ecosystem where computational resources are not concentrated in the hands of a few but are available to and controllable by everyone.
-
@ 554ab6fe:c6cbc27e
2025-02-10 16:48:35René Descartes famously stated, "I think therefore I am." A concept centered around the idea that the existence of our meta-conscious thought proves our existence. Furthermore, it denotes a sense of self-derived from the presence of our thinking. What if this famous idea is wrongly reversed? What if our perceived sense of self derives from our thoughts, and these thoughts act as an illusion of the true nature of the self?
A couple of my posts have focused on the idea that the calm mind, potentially derived from a practice of meditation, can achieve a heightened sense of awareness. Some neuroscientists now view the mind as a predictive modeling machine (Seth, 2013), constantly receiving signals from both internal and external sources, generating predictions and models to understand the current condition. This theory inspired me to create an analogy of a calm pond: Imagine the brain and mind as a pond, and instead of neuronal signals, raindrops are falling into the pond. When the pond is calm, and a single drop falls, the pond's ripples provide adequate information to deduce the location and size of the raindrop. By observing the single ripple, one can simply understand the raindrop. However, if there is a storm and many raindrops impact the pond simultaneously, then the ripples are indistinguishable. This makes the analysis of the incoming information near impossible. This may be how the brain works. This would be why calming the mind generates such benefits in health because the brain can analyze the information accurately and execute the proper response. This idea is supported by scientific evidence that interoception increases with mindfulness practice. I have alluded to this idea as a possible explanation of why meditation generates a higher form of consciousness. More on this later.
To further explore this idea, a deeper exploration into the neuroscience of internal mental processes is required. The areas of the brain that are clinically recognized to perform internal mental operations are known as the default mode network (DMN) (Ekhtiari et al., 2016; van Buuren et al., 2010). The DMN is not a single area of the brain but a network and interaction between many areas. The brain areas involved within the DMN include the medial prefrontal cortex (mPFC), the anterior and posterior cingulate cortex (ACC and PCC), temporoparietal junction (TPJ), later temporal cortex (LTC), and the temporal pole (TempP)(Farb et al., 2007; Zhou et al., 2020). In general, the mental processes conducted by the DMN are self-referential processing, long-term memory retrieval, and mind-wandering (Ekhtiari et al., 2016; Marstaller et al., 2017; Spreng & Grady, 2010; van Buuren et al., 2010). However, the functions expand beyond just those. Different brain areas carry differing roles in these processes. For example, the PCC plays a unique role in the autobiographical retrieval process and plays a role in self-centered spatial navigation (Hamilton et al., 2015). However, sometimes these processes manifest in more complex interactions. For example, both the PCC and anterior portion of the mPFC (amPFC) facilitate self-referential processes and the interaction between other hubs of the DMN (Zhou et al., 2020). The role of the DMN is complicated, but its relationship to meditation is significant.
The DMN's plays a significant role in mental ruminations and the activity of the mind. In our modern culture, mental ruminations are commonplace and widely accepted. With this cultural norm, there is no adequate training to properly handle these thoughts when they become repetitive, unconstructive, and potentially destructive. Repetitive unconstructive ruminations are associated with and can lead to depression (Watkins, 2008). Therefore, this mental habit attributes to a significant source of many mental health issues. It is a primary reason why meditation seems to be such an effective mental health benefiting practice. In Eastern traditions, this unhealthy mind is called the "monkey mind": a mind that swings from thought to thought, often time traveling to the past and future. Meditation, and similar practices, aim to quiet this monkey mind. From a clinical perspective, it is fascinating to consider that the DMN may be a neural network representing the monkey mind's activation. There is research to support this idea as well. Autobiographical memory retrieval processes activate the DMN (Spreng & Grady, 2010). Additionally, the DMN seems to maintain a cohesive perception of the self across time to interpret novel information (Marstaller et al., 2017). Clearly, not only is the DMN involved in processes that involve thoughts about the self, but it is also primarily responsible for our mental time traveling processes. If meditation aims to bring our experience to the present, then the DMN is the antithesis.
As previously stated, mental ruminations and other unconstructive thought patterns drive the development of mental health issues such as anxiety and depression. Given that the DMN has a strong relationship to these thought patterns, it is also interesting to note that DMN activity dominance is associated with the development of depression (Hamilton et al., 2011). The brain areas that seem to be activated more often during depression are the anterior and dorsal regions of the mPFC, PCC, temporal lobes, and the TPJ (Zhou et al., 2020)—further suggesting that the DMN is the brain region highly responsible for our inner self-referential thoughts, our time traveling thoughts, and the subsequent mental health outcomes.
The DMN represents, in large part, the mental activity of the mind that removes us from a calm and present state of being. In other words, it adds more “raindrops” to the calm pond (my analogy from before) making it harder for the brain to analyze and adequately react to incoming information. Evidence for this idea lies in the observation that the DMN is responsible for monkey mind-like processes and in learning and conditioning. Again, the brain is constantly receiving neuronal signals from the body. Say it receives a signal from the toe: it must first predict that the signal came from the toe, then understand what the signal meant, and react accordingly. So, if the signal was a pain signal, the brain may command the toe to lift from the ground. If the signal stops, the brain knows the toe is no longer in pain, verifying the prediction. If the signal doesn't stop, further trial and error are required. This is a simple example, but the brain is likely processing and reacting to signals like this all the time, both from information coming from outside the body and within. Therefore, much learning and prediction model generation is taking place. Imagine the famous experiment of Pavlov's dogs. The dogs learned that a particular cue meant food, and their bodies learned to react accordingly. This learning and conditioning are a fundamental aspect of biological life. The DMN plays a significant role in this learning within our brain. For example, the PCC responds to error detection, and the signal is amplified when small rewards or novel stimuli are introduced to the experience (Heilbronner & Platt, 2013). Areas of the DMN (such as the mPFC and PCC) are also thought to be involved in contextualizing memories of safety and inhibit fear responses when appropriate (Marstaller et al., 2017). Finally, the mPFC is thought to play a role in goal-directed motivation (Hamilton et al., 2015). All this evidence suggests that the DMN plays a significant role in the learning process by contextualizing information.
Keep in mind that the DMN can only accurately contextualize incoming stimuli if the full range of signals is adequately recognized. According to the calm pond idea, the noisy activation of a ruminating mind may hinder this ability. Here, greater clarification and definition on what a polluted mind means is needed. To define such mental patterns, functions of specific DMN regions will be explained. Commonly activated regions within the DMN that involve self-referential processes are (Farb et al., 2007; Knyazev, 2013):
- The orbitomedial prefrontal cortex (omPFC) – which contextualizes experienced stimuli as experienced by the self
- The ACC – which actively monitors the self-experienced stimuli
- The mPFC – which evaluates the self-experienced stimuli
- The PCC – which is involved in a generated a broader context of the personal experience given certain self-experienced stimuli.
By now, it may be evident that the DMN is involved with what is commonly referred to as the "ego". Some researchers claim that the DMN develops the ego itself (R. L. Carhart-Harris & Friston, 2010). The term "ego" derives from Freudian psychoanalytic, and for this reason, the term "narrative-self" will be used instead. It is crucial to consider the word choice here. As previously explained, the DMN generates a time-oriented perception of the self to contextualize information. Furthermore, the four brain areas above all involved contextualizing an experience as experienced by the narrative self (rather than the self being the experience), monitoring these experiences across time, and evaluating these experiences as a broader implication of the experience of the self. The DMN is generating a narrative of the self through every experience. This is indeed where many unconstructive ruminations arise. Any reader can likely relate to ruminating over themselves and their circumstances and thinking about what this means in the larger context of their lives, worth, purpose, etc. This is the monkey mind. This is the DMN.
So, the real question becomes: what effect does the strong presence of a narrative-self have on our broader experience and health? Does a strong presence of the narrative-self influence the body's interoceptive abilities and ability to properly analyze and predict incoming stimuli? This is a complex and challenging question, but evidence suggests that this is indeed the case. In a fantastic study by Farb and others in 2007, fMRIs were used to monitor brain activity in those who did and did not practice mindfulness meditation (Farb et al., 2007). In this study, a distinction was made between narrative focus and experiential focus. For eight weeks, those who underwent mindfulness meditation training were taught to practice experiential focus, which involves having present centered awareness of all thoughts, feelings, and experiences in a non-judgmental manner. Narrative focus was defined as judging experiences and trying to figure out what those stimuli meant. Brain scans were performed on both trained and untrained participants during both focus styles. For both groups, narrative focus increased activation of the mPFC and PCC as expected. During experiential focus, both groups reduced mPFC activity, but only the meditation trained group increased activation of the insula. This is incredible because the insula is highly involved in interoception and the sensations of internal physical states (Fox et al., 2014; Mehling et al., 2012). This study by Farb and others suggests a functional difference between the narrative-self and an experiential-self and shows how the quieting of the narrative-self increases interoceptive abilities and enhances the brains' ability to analyze incoming stimuli properly. Not to mention, this study shows how this skill can be trained.
So far, we have seen how the DMN is involved in the generation of the narrative-self and how this influences our ability to analyze the signals coming from the body. The next reasonable question is to what extent can this be changed? And what are the implications of such change? As was previously shown in the mentioning of the study by Farb and others in 2007, mindfulness meditation appears to be capable of changing DMN activity. This is not the only study to suggest this. Another study showed that meditation decreased mPFC activity in DMN regions, such as the TPJ and PCC (Scheibner et al., 2017). It has also been shown that the neurotransmitter GABA reduces DMN activity, and both yoga and meditation have been implicated in the release of GABA (Guglietti et al., 2013; Hu et al., 2013; Streeter et al., 2018). The release of GABA release is also modulated by the vagus nerve, providing evidence of the possible mechanism at which meditation inhibits DMN activity (Hu et al., 2013; Keute et al., 2018; Streeter et al., 2018). Through these studies, it seems evident that meditation decreases DMN activity. In what ways is this significant? Firstly, it provides more explanation as to why meditation seems capable of alleviating depression. Similarly, it offers more evidence for how meditation increases interoceptive awareness (de Jong et al., 2016; Farb et al., 2010; Hanley et al., 2017). The increase in interoception suggests that the brain is more adequately processing not only the internal environment more adequately, but presumably the outside environment as well. Reality in general is being more accurately understood. It is possible that this also implicates a broader understanding of how meditation can alter consciousness and allowing monks, yogis, and the like to achieve nirvana/samadhi/enlightenment, or whatever you prefer to call such a state of altered consciousnesses. Perhaps this experience of altered consciousness is a more accurate interpretation of reality, produced by enhanced interoception and exteroception.
The subject of altered consciousness is perhaps best explored through brain changes induced by another technique commonly used in a spiritual manner: psychedelics. The famous studies from Johns Hopkins University using psilocybin found that this drug causes a spiritual experience often described as a sense of unity of all things that transcend space and time (Griffiths et al., 2006, 2008). Many participants rate this experience as one of the most significant spiritual experiences of their life (Griffiths et al., 2006). These experiences were often described with an experienced loss sense of self and an altered form of consciousness (Griffiths et al., 2008). It is not hard to imagine that this experience seems very similar to that of a trained monk or yogi, who learn to let go of their narrative-self and gain a sense of oneness with all things. This connection is further verified by the observation that psilocybin decreases the activity of the ACC, PCC, and mPFC (Robin L. Carhart-Harris et al., 2012). Ayahuasca, another psychedelic drug used in spiritual rituals by the indigenous peoples of the Amazon, also has been shown to have similar effects (Palhano-Fontes et al., 2015). Additionally, LSD has been shown to do the same (Speth et al., 2016). Suppose both psychedelic drugs and meditative practice decrease the same DMN, which generates the narrative-self. In that case, both methods likely lead one to the same place: an experience beyond time and space, where one is present with a profound sense of unity with everything.
This, to me, is a profound idea. It suggests that quieting the mind, or calming the “pond”, improves mental, physical, and spiritual health. It provides one with a perception full of compassion, peace, and love. It not only can make the individual healthier, but so too the community and planet. It is extraordinary evidence that improving the self is the greatest means of improving the world around us. Not to mention, it provides a simple means of liberating oneself from the struggle and hardship of life. Perhaps it is not life that is hard on us, but ourselves, by allowing the narrative-mind to take hold of our reality, rather than letting a purer form of consciousness dominate our perceptions. This is the pursuit, and meditation techniques are the practice.
References
Carhart-Harris, R. L., & Friston, K. J. (2010). The default-mode, ego-functions and free-energy: A neurobiological account of Freudian ideas. Brain, 133(4), 1265–1283. https://doi.org/10.1093/brain/awq010
Carhart-Harris, Robin L., Erritzoe, D., Williams, T., Stone, J. M., Reed, L. J., Colasanti, A., Tyacke, R. J., Leech, R., Malizia, A. L., Murphy, K., Hobden, P., Evans, J., Feilding, A., Wise, R. G., & Nutt, D. J. (2012). Neural correlates of the psychedelic state as determined by fMRI studies with psilocybin. Proceedings of the National Academy of Sciences of the United States of America, 109(6), 2138–2143. https://doi.org/10.1073/pnas.1119598109
de Jong, M., Lazar, S. W., Hug, K., Mehling, W. E., Hölzel, B. K., Sack, A. T., Peeters, F., Ashih, H., Mischoulon, D., & Gard, T. (2016). Effects of mindfulness-based cognitive therapy on body awareness in patients with chronic pain and comorbid depression. Frontiers in Psychology, 7(JUN). https://doi.org/10.3389/fpsyg.2016.00967
Ekhtiari, H., Nasseri, P., Yavari, F., Mokri, A., & Monterosso, J. (2016). Neuroscience of drug craving for addiction medicine: From circuits to therapies. In Progress in Brain Research (Vol. 223, pp. 115–141). Elsevier B.V. https://doi.org/10.1016/bs.pbr.2015.10.002
Farb, N. A. S., Anderson, A. K., Mayberg, H., Bean, J., McKeon, D., & Segal, Z. v. (2010). Minding One's Emotions: Mindfulness Training Alters the Neural Expression of Sadness. Emotion, 10(1), 25–33. https://doi.org/10.1037/a0017151
Farb, N. A. S., Segal, Z. v., Mayberg, H., Bean, J., Mckeon, D., Fatima, Z., & Anderson, A. K. (2007). Attending to the present: Mindfulness meditation reveals distinct neural modes of self-reference. Social Cognitive and Affective Neuroscience, 2(4), 313–322. https://doi.org/10.1093/scan/nsm030
Fox, K. C. R., Nijeboer, S., Dixon, M. L., Floman, J. L., Ellamil, M., Rumak, S. P., Sedlmeier, P., & Christoff, K. (2014). Is meditation associated with altered brain structure? A systematic review and meta-analysis of morphometric neuroimaging in meditation practitioners. Neuroscience and Biobehavioral Reviews, 43, 48–73. https://doi.org/10.1016/j.neubiorev.2014.03.016
Griffiths, R. R., Richards, W. A., Johnson, M. W., McCann, U. D., & Jesse, R. (2008). Mystical-type experiences occasioned by psilocybin mediate the attribution of personal meaning and spiritual significance 14 months later. Journal of Psychopharmacology, 22(6), 621–632. https://doi.org/10.1177/0269881108094300
Griffiths, R. R., Richards, W. A., McCann, U., & Jesse, R. (2006). Psilocybin can occasion mystical-type experiences having substantial and sustained personal meaning and spiritual significance. Psychopharmacology, 187(3), 268–283. https://doi.org/10.1007/s00213-006-0457-5
Guglietti, C. L., Daskalakis, Z. J., Radhu, N., Fitzgerald, P. B., & Ritvo, P. (2013). Meditation-related increases in GABAB modulated cortical inhibition. Brain Stimulation, 6(3), 397–402. https://doi.org/10.1016/j.brs.2012.08.005
Hamilton, J. P., Farmer, M., Fogelman, P., & Gotlib, I. H. (2015). Depressive Rumination, the Default-Mode Network, and the Dark Matter of Clinical Neuroscience. In Biological Psychiatry (Vol. 78, Issue 4, pp. 224–230). Elsevier USA. https://doi.org/10.1016/j.biopsych.2015.02.020
Hamilton, J. P., Furman, D. J., Chang, C., Thomason, M. E., Dennis, E., & Gotlib, I. H. (2011). Default-mode and task-positive network activity in major depressive disorder: Implications for adaptive and maladaptive rumination. Biological Psychiatry, 70(4), 327–333. https://doi.org/10.1016/j.biopsych.2011.02.003
Hanley, A. W., Mehling, W. E., & Garland, E. L. (2017). Holding the body in mind: Interoceptive awareness, dispositional mindfulness and psychological well-being. Journal of Psychosomatic Research, 99, 13–20. https://doi.org/10.1016/j.jpsychores.2017.05.014
Heilbronner, S. R., & Platt, M. L. (2013). Causal evidence of performance monitoring by neurons in posterior cingulate cortex during learning. Neuron, 80(6), 1384–1391. https://doi.org/10.1016/j.neuron.2013.09.028
Hu, Y., Chen, X., Gu, H., & Yang, Y. (2013). Resting-state glutamate and GABA concentrations predict task-induced deactivation in the default mode network. Journal of Neuroscience, 33(47), 18566–18573. https://doi.org/10.1523/JNEUROSCI.1973-13.2013
Keute, M., Ruhnau, P., Heinze, H. J., & Zaehle, T. (2018). Behavioral and electrophysiological evidence for GABAergic modulation through transcutaneous vagus nerve stimulation. Clinical Neurophysiology, 129(9), 1789–1795. https://doi.org/10.1016/j.clinph.2018.05.026
Knyazev, G. G. (2013). EEG correlates of self-referential processing. Frontiers in Human Neuroscience, 7(MAY), 1–14. https://doi.org/10.3389/fnhum.2013.00264
Marstaller, L., Burianová, H., & Reutens, D. C. (2017). Adaptive contextualization: A new role for the default mode network in affective learning. Human Brain Mapping, 38(2), 1082–1091. https://doi.org/10.1002/hbm.23442
Mehling, W. E., Price, C., Daubenmier, J. J., Acree, M., Bartmess, E., & Stewart, A. (2012). The Multidimensional Assessment of Interoceptive Awareness (MAIA). PLoS ONE, 7(11). https://doi.org/10.1371/journal.pone.0048230
Palhano-Fontes, F., Andrade, K. C., Tofoli, L. F., Jose, A. C. S., Crippa, A. S., Hallak, J. E. C., Ribeiro, S., & de Araujo, D. B. (2015). The psychedelic state induced by Ayahuasca modulates the activity and connectivity of the Default Mode Network. PLoS ONE, 10(2), 1–13. https://doi.org/10.1371/journal.pone.0118143
Scheibner, H. J., Bogler, C., Gleich, T., Haynes, J. D., & Bermpohl, F. (2017). Internal and external attention and the default mode network. NeuroImage, 148(January), 381–389. https://doi.org/10.1016/j.neuroimage.2017.01.044
Seth, A. K. (2013). Interoceptive inference, emotion, and the embodied self. Trends in Cognitive Sciences, 17(11), 565–573. https://doi.org/10.1016/j.tics.2013.09.007
Speth, J., Speth, C., Kaelen, M., Schloerscheidt, A. M., Feilding, A., Nutt, D. J., & Carhart-Harris, R. L. (2016). Decreased mental time travel to the past correlates with default-mode network disintegration under lysergic acid diethylamide. Journal of Psychopharmacology, 30(4), 344–353. https://doi.org/10.1177/0269881116628430
Spreng, R. N., & Grady, C. L. (2010). Patterns of brain activity supporting autobiographical memory, prospection, and theory of mind, and their relationship to the default mode network. Journal of Cognitive Neuroscience, 22(6), 1112–1123. https://doi.org/10.1162/jocn.2009.21282
Streeter, C., Gerbarg, P. L., Nielsen, G. H., Brown, R. P., Jensen, J. E., Silveri, M., & Streeter, C. C. (2018). Effects of Yoga on Thalamic Gamma-Aminobutyric Acid, Mood and Depression: Analysis of Two Randomized Controlled Trials. Neuropsychiatry, 8(6), 1923–1939. https://doi.org/10.4172/Neuropsychiatry.1000535
van Buuren, M., Gladwin, T. E., Zandbelt, B. B., Kahn, R. S., & Vink, M. (2010). Reduced functional coupling in the default-mode network during self-referential processing. Human Brain Mapping, 31(8), 1117–1127. https://doi.org/10.1002/hbm.20920
Watkins, E. R. (2008). Constructive and unconstructive repetitive thought. Psychological Bulletin, 134(2), 163–206. https://doi.org/10.1037/0033-2909.134.2.163
Zhou, H. X., Chen, X., Shen, Y. Q., Li, L., Chen, N. X., Zhu, Z. C., Castellanos, F. X., & Yan, C. G. (2020). Rumination and the default mode network: Meta-analysis of brain imaging studies and implications for depression. In NeuroImage (Vol. 206, p. 116287). Academic Press Inc. https://doi.org/10.1016/j.neuroimage.2019.116287
-
@ 91bea5cd:1df4451c
2025-02-04 17:15:57Definição de ULID:
Timestamp 48 bits, Aleatoriedade 80 bits Sendo Timestamp 48 bits inteiro, tempo UNIX em milissegundos, Não ficará sem espaço até o ano 10889 d.C. e Aleatoriedade 80 bits, Fonte criptograficamente segura de aleatoriedade, se possível.
Gerar ULID
```sql
CREATE EXTENSION IF NOT EXISTS pgcrypto;
CREATE FUNCTION generate_ulid() RETURNS TEXT AS $$ DECLARE -- Crockford's Base32 encoding BYTEA = '0123456789ABCDEFGHJKMNPQRSTVWXYZ'; timestamp BYTEA = E'\000\000\000\000\000\000'; output TEXT = '';
unix_time BIGINT; ulid BYTEA; BEGIN -- 6 timestamp bytes unix_time = (EXTRACT(EPOCH FROM CLOCK_TIMESTAMP()) * 1000)::BIGINT; timestamp = SET_BYTE(timestamp, 0, (unix_time >> 40)::BIT(8)::INTEGER); timestamp = SET_BYTE(timestamp, 1, (unix_time >> 32)::BIT(8)::INTEGER); timestamp = SET_BYTE(timestamp, 2, (unix_time >> 24)::BIT(8)::INTEGER); timestamp = SET_BYTE(timestamp, 3, (unix_time >> 16)::BIT(8)::INTEGER); timestamp = SET_BYTE(timestamp, 4, (unix_time >> 8)::BIT(8)::INTEGER); timestamp = SET_BYTE(timestamp, 5, unix_time::BIT(8)::INTEGER);
-- 10 entropy bytes ulid = timestamp || gen_random_bytes(10);
-- Encode the timestamp output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 0) & 224) >> 5)); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 0) & 31))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 1) & 248) >> 3)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 1) & 7) << 2) | ((GET_BYTE(ulid, 2) & 192) >> 6))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 2) & 62) >> 1)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 2) & 1) << 4) | ((GET_BYTE(ulid, 3) & 240) >> 4))); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 3) & 15) << 1) | ((GET_BYTE(ulid, 4) & 128) >> 7))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 4) & 124) >> 2)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 4) & 3) << 3) | ((GET_BYTE(ulid, 5) & 224) >> 5))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 5) & 31)));
-- Encode the entropy output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 6) & 248) >> 3)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 6) & 7) << 2) | ((GET_BYTE(ulid, 7) & 192) >> 6))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 7) & 62) >> 1)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 7) & 1) << 4) | ((GET_BYTE(ulid, 8) & 240) >> 4))); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 8) & 15) << 1) | ((GET_BYTE(ulid, 9) & 128) >> 7))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 9) & 124) >> 2)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 9) & 3) << 3) | ((GET_BYTE(ulid, 10) & 224) >> 5))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 10) & 31))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 11) & 248) >> 3)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 11) & 7) << 2) | ((GET_BYTE(ulid, 12) & 192) >> 6))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 12) & 62) >> 1)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 12) & 1) << 4) | ((GET_BYTE(ulid, 13) & 240) >> 4))); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 13) & 15) << 1) | ((GET_BYTE(ulid, 14) & 128) >> 7))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 14) & 124) >> 2)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 14) & 3) << 3) | ((GET_BYTE(ulid, 15) & 224) >> 5))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 15) & 31)));
RETURN output; END $$ LANGUAGE plpgsql VOLATILE; ```
ULID TO UUID
```sql CREATE OR REPLACE FUNCTION parse_ulid(ulid text) RETURNS bytea AS $$ DECLARE -- 16byte bytes bytea = E'\x00000000 00000000 00000000 00000000'; v char[]; -- Allow for O(1) lookup of index values dec integer[] = ARRAY[ 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 255, 255, 255, 255, 255, 255, 255, 10, 11, 12, 13, 14, 15, 16, 17, 1, 18, 19, 1, 20, 21, 0, 22, 23, 24, 25, 26, 255, 27, 28, 29, 30, 31, 255, 255, 255, 255, 255, 255, 10, 11, 12, 13, 14, 15, 16, 17, 1, 18, 19, 1, 20, 21, 0, 22, 23, 24, 25, 26, 255, 27, 28, 29, 30, 31 ]; BEGIN IF NOT ulid ~* '^[0-7][0-9ABCDEFGHJKMNPQRSTVWXYZ]{25}$' THEN RAISE EXCEPTION 'Invalid ULID: %', ulid; END IF;
v = regexp_split_to_array(ulid, '');
-- 6 bytes timestamp (48 bits) bytes = SET_BYTE(bytes, 0, (dec[ASCII(v[1])] << 5) | dec[ASCII(v[2])]); bytes = SET_BYTE(bytes, 1, (dec[ASCII(v[3])] << 3) | (dec[ASCII(v[4])] >> 2)); bytes = SET_BYTE(bytes, 2, (dec[ASCII(v[4])] << 6) | (dec[ASCII(v[5])] << 1) | (dec[ASCII(v[6])] >> 4)); bytes = SET_BYTE(bytes, 3, (dec[ASCII(v[6])] << 4) | (dec[ASCII(v[7])] >> 1)); bytes = SET_BYTE(bytes, 4, (dec[ASCII(v[7])] << 7) | (dec[ASCII(v[8])] << 2) | (dec[ASCII(v[9])] >> 3)); bytes = SET_BYTE(bytes, 5, (dec[ASCII(v[9])] << 5) | dec[ASCII(v[10])]);
-- 10 bytes of entropy (80 bits); bytes = SET_BYTE(bytes, 6, (dec[ASCII(v[11])] << 3) | (dec[ASCII(v[12])] >> 2)); bytes = SET_BYTE(bytes, 7, (dec[ASCII(v[12])] << 6) | (dec[ASCII(v[13])] << 1) | (dec[ASCII(v[14])] >> 4)); bytes = SET_BYTE(bytes, 8, (dec[ASCII(v[14])] << 4) | (dec[ASCII(v[15])] >> 1)); bytes = SET_BYTE(bytes, 9, (dec[ASCII(v[15])] << 7) | (dec[ASCII(v[16])] << 2) | (dec[ASCII(v[17])] >> 3)); bytes = SET_BYTE(bytes, 10, (dec[ASCII(v[17])] << 5) | dec[ASCII(v[18])]); bytes = SET_BYTE(bytes, 11, (dec[ASCII(v[19])] << 3) | (dec[ASCII(v[20])] >> 2)); bytes = SET_BYTE(bytes, 12, (dec[ASCII(v[20])] << 6) | (dec[ASCII(v[21])] << 1) | (dec[ASCII(v[22])] >> 4)); bytes = SET_BYTE(bytes, 13, (dec[ASCII(v[22])] << 4) | (dec[ASCII(v[23])] >> 1)); bytes = SET_BYTE(bytes, 14, (dec[ASCII(v[23])] << 7) | (dec[ASCII(v[24])] << 2) | (dec[ASCII(v[25])] >> 3)); bytes = SET_BYTE(bytes, 15, (dec[ASCII(v[25])] << 5) | dec[ASCII(v[26])]);
RETURN bytes; END $$ LANGUAGE plpgsql IMMUTABLE;
CREATE OR REPLACE FUNCTION ulid_to_uuid(ulid text) RETURNS uuid AS $$ BEGIN RETURN encode(parse_ulid(ulid), 'hex')::uuid; END $$ LANGUAGE plpgsql IMMUTABLE; ```
UUID to ULID
```sql CREATE OR REPLACE FUNCTION uuid_to_ulid(id uuid) RETURNS text AS $$ DECLARE encoding bytea = '0123456789ABCDEFGHJKMNPQRSTVWXYZ'; output text = ''; uuid_bytes bytea = uuid_send(id); BEGIN
-- Encode the timestamp output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 0) & 224) >> 5)); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 0) & 31))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 1) & 248) >> 3)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 1) & 7) << 2) | ((GET_BYTE(uuid_bytes, 2) & 192) >> 6))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 2) & 62) >> 1)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 2) & 1) << 4) | ((GET_BYTE(uuid_bytes, 3) & 240) >> 4))); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 3) & 15) << 1) | ((GET_BYTE(uuid_bytes, 4) & 128) >> 7))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 4) & 124) >> 2)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 4) & 3) << 3) | ((GET_BYTE(uuid_bytes, 5) & 224) >> 5))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 5) & 31)));
-- Encode the entropy output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 6) & 248) >> 3)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 6) & 7) << 2) | ((GET_BYTE(uuid_bytes, 7) & 192) >> 6))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 7) & 62) >> 1)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 7) & 1) << 4) | ((GET_BYTE(uuid_bytes, 8) & 240) >> 4))); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 8) & 15) << 1) | ((GET_BYTE(uuid_bytes, 9) & 128) >> 7))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 9) & 124) >> 2)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 9) & 3) << 3) | ((GET_BYTE(uuid_bytes, 10) & 224) >> 5))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 10) & 31))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 11) & 248) >> 3)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 11) & 7) << 2) | ((GET_BYTE(uuid_bytes, 12) & 192) >> 6))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 12) & 62) >> 1)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 12) & 1) << 4) | ((GET_BYTE(uuid_bytes, 13) & 240) >> 4))); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 13) & 15) << 1) | ((GET_BYTE(uuid_bytes, 14) & 128) >> 7))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 14) & 124) >> 2)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 14) & 3) << 3) | ((GET_BYTE(uuid_bytes, 15) & 224) >> 5))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 15) & 31)));
RETURN output; END $$ LANGUAGE plpgsql IMMUTABLE; ```
Gera 11 Digitos aleatórios: YBKXG0CKTH4
```sql -- Cria a extensão pgcrypto para gerar uuid CREATE EXTENSION IF NOT EXISTS pgcrypto;
-- Cria a função para gerar ULID CREATE OR REPLACE FUNCTION gen_lrandom() RETURNS TEXT AS $$ DECLARE ts_millis BIGINT; ts_chars TEXT; random_bytes BYTEA; random_chars TEXT; base32_chars TEXT := '0123456789ABCDEFGHJKMNPQRSTVWXYZ'; i INT; BEGIN -- Pega o timestamp em milissegundos ts_millis := FLOOR(EXTRACT(EPOCH FROM clock_timestamp()) * 1000)::BIGINT;
-- Converte o timestamp para base32 ts_chars := ''; FOR i IN REVERSE 0..11 LOOP ts_chars := ts_chars || substr(base32_chars, ((ts_millis >> (5 * i)) & 31) + 1, 1); END LOOP; -- Gera 10 bytes aleatórios e converte para base32 random_bytes := gen_random_bytes(10); random_chars := ''; FOR i IN 0..9 LOOP random_chars := random_chars || substr(base32_chars, ((get_byte(random_bytes, i) >> 3) & 31) + 1, 1); IF i < 9 THEN random_chars := random_chars || substr(base32_chars, (((get_byte(random_bytes, i) & 7) << 2) | (get_byte(random_bytes, i + 1) >> 6)) & 31 + 1, 1); ELSE random_chars := random_chars || substr(base32_chars, ((get_byte(random_bytes, i) & 7) << 2) + 1, 1); END IF; END LOOP; -- Concatena o timestamp e os caracteres aleatórios RETURN ts_chars || random_chars;
END; $$ LANGUAGE plpgsql; ```
Exemplo de USO
```sql -- Criação da extensão caso não exista CREATE EXTENSION IF NOT EXISTS pgcrypto; -- Criação da tabela pessoas CREATE TABLE pessoas ( ID UUID DEFAULT gen_random_uuid ( ) PRIMARY KEY, nome TEXT NOT NULL );
-- Busca Pessoa na tabela SELECT * FROM "pessoas" WHERE uuid_to_ulid ( ID ) = '252FAC9F3V8EF80SSDK8PXW02F'; ```
Fontes
- https://github.com/scoville/pgsql-ulid
- https://github.com/geckoboard/pgulid
-
@ 65912a7a:5dc638bf
2025-02-09 20:34:15I didn’t set out to become an enemy of the world’s richest man, but I seem to have managed it all the same. Until this moment, I’ve resisted describing my falling out with Elon Musk in much detail, but as the man’s cultural influence has metastasized—and he continues to spread lies about me on the social media platform that he owns (Twitter/X)—it seems only appropriate to set the record straight. I know that it annoys many in my audience to see me defend myself against attacks that they recognize to be spurious, but they might, nevertheless, find the details of what happened with Elon interesting.
Of all the remarkable people I’ve met, Elon is probably the most likely to remain a world-historical figure—despite his best efforts to become a clown. He is also the most likely to squander his ample opportunities to live a happy life, ruin his reputation and most important relationships, and produce lasting harm across the globe. None of this was obvious to me when we first met, and I have been quite amazed at Elon’s evolution, both as a man and as an avatar of chaos. The friend I remember did not seem to hunger for public attention. But his engagement with Twitter/X transformed him—to a degree seldom seen outside of Marvel movies or Greek mythology. If Elon is still the man I knew, I can only conclude that I never really knew him.
When we first met, Elon wasn’t especially rich or famous. In fact, I recall him teetering on the brink of bankruptcy around 2008, while risking the last of his previous fortune to make payroll at Tesla. At the time, he was living off loans from his friends Larry and Sergey. Once Elon became truly famous, and his personal wealth achieved escape velocity, I was among the first friends he called to discuss his growing security concerns. I put him in touch with Gavin de Becker, who provided his first bodyguards, and recommended other changes to his life. We also went shooting on at least two occasions with Scott Reitz, the finest firearms instructor I’ve ever met. It is an ugly irony that Elon’s repeated targeting of me on Twitter/X has increased my own security concerns. He understands this, of course, but does not seem to care.
So how did we fall out? Let this be a cautionary tale for any of Elon’s friends who might be tempted to tell the great man something he doesn’t want to hear:
(1.) When the SARS-CoV-2 virus first invaded our lives in March of 2020, Elon began tweeting in ways that I feared would harm his reputation. I also worried that his tweets might exacerbate the coming public-health emergency. Italy had already fallen off a cliff, and Elon shared the following opinion with his tens of millions of fans :
the coronavirus panic is dumb
As a concerned friend, I sent him a private text:
Hey, brother— I really think you need to walk back your coronavirus tweet. I know there’s a way to parse it that makes sense (“panic” is always dumb), but I fear that’s not the way most people are reading it. You have an enormous platform, and much of the world looks to you as an authority on all things technical. Coronavirus is a very big deal, and if we don’t get our act together, we’re going to look just like Italy very soon. If you want to turn some engineers loose on the problem, now would be a good time for a breakthrough in the production of ventilators...
(2.) Elon’s response was, I believe, the first discordant note ever struck in our friendship:
Sam, you of all people should not be concerned about this.
He included a link to a page on the CDC website, indicating that Covid was not even among the top 100 causes of death in the United States. This was a patently silly point to make in the first days of a pandemic.
We continued exchanging texts for at least two hours. If I hadn’t known that I was communicating with Elon Musk, I would have thought I was debating someone who lacked any understanding of basic scientific and mathematical concepts, like exponential curves.
(3.) Elon and I didn’t converge on a common view of epidemiology over the course of those two hours, but we hit upon a fun compromise: A wager. Elon bet me $1 million dollars (to be given to charity) against a bottle of fancy tequila ($1000) that we wouldn’t see as many as 35,000 cases of Covid in the United States (cases, not deaths). The terms of the bet reflected what was, in his estimation, the near certainty (1000 to 1) that he was right. Having already heard credible estimates that there could be 1 million deaths from Covid in the U.S. over the next 12-18 months (these estimates proved fairly accurate), I thought the terms of the bet ridiculous—and quite unfair to Elon. I offered to spot him two orders of magnitude: I was confident that we’d soon have 3.5 million cases of Covid in the U.S. Elon accused me of having lost my mind and insisted that we stick with a ceiling of 35,000.
(4.) We communicated sporadically by text over the next couple of weeks, while the number of reported cases grew. Ominously, Elon dismissed the next batch of data reported by the CDC as merely presumptive—while confirmed cases of Covid, on his account, remained elusive.
(5.) A few weeks later, when the CDC website finally reported 35,000 deaths from Covid in the U.S. and 600,000 cases, I sent Elon the following text:
Is (35,000 deaths + 600,000 cases) > 35,000 cases?
(6.) This text appears to have ended our friendship. Elon never responded, and it was not long before he began maligning me on Twitter for a variety of imaginary offenses. For my part, I eventually started complaining about the startling erosion of his integrity on my podcast, without providing any detail about what had transpired between us.
(7.) At the end of 2022, I abandoned Twitter/X altogether, having recognized the poisonous effect that it had on my life—but also, in large part, because of what I saw it doing to Elon. I’ve been away from the platform for over two years, and yet Elon still attacks me. Occasionally a friend will tell me that I’m trending there, and the reasons for this are never good. As recently as this week, Elon repeated a defamatory charge about my being a “hypocrite” for writing a book in defense of honesty and then encouraging people to lie to keep Donald Trump out of the White House. Not only have I never advocated lying to defeat Trump (despite what that misleading clip from the Triggernometry podcast might suggest to naive viewers), I’ve taken great pains to defend Trump from the most damaging lie ever told about him. Elon knows this, because we communicated about the offending clip when it first appeared on Twitter/X. However, he simply does not care that he is defaming a former friend to hundreds of millions of people—many of whom are mentally unstable. On this occasion, he even tagged the incoming president of the United States.
All of this remains socially and professionally awkward, because Elon and I still have many friends in common. Which suggests the terms of another wager that I would happily make, if such a thing were possible—and I would accept 1000 to 1 odds in Elon’s favor:
I bet that anyone who knows us both knows that I am telling the truth.
Everyone close to Elon must recognize how unethical he has become, and yet they remain silent. Their complicity is understandable, but it is depressing all the same. These otherwise serious and compassionate people know that when Elon attacks private citizens on Twitter/X—falsely accusing them of crimes or corruption, celebrating their misfortunes—he is often causing tangible harm in their lives. It’s probably still true to say that social media “isn’t real life,” until thousands of lunatics learn your home address.
A final absurdity in my case, is that several of the controversial issues that Elon has hurled himself at of late—and even attacked me over—are ones we agree about. We seem to be in near total alignment on immigration and the problems at the southern border of the U.S. We also share the same concerns about what he calls “the woke mind virus.” And we fully agree about the manifest evil of the so-called “grooming-gangs scandal” in the U.K. The problem with Elon, is that he makes no effort to get his facts straight when discussing any of these topics, and he regularly promotes lies and conspiracy theories manufactured by known bad actors, at scale. (And if grooming were really one of his concerns, it’s strange that he couldn’t find anything wrong with Matt Gaetz.)
Elon and I even agree about the foundational importance of free speech. It’s just that his approach to safeguarding it—amplifying the influence of psychopaths and psychotics, while deplatforming real journalists and his own critics; or savaging the reputations of democratic leaders, while never saying a harsh word about the Chinese Communist Party—is not something I can support. The man claims to have principles, but he appears to have only moods and impulses.
Any dispassionate observer of Elon’s behavior on Twitter/X can see that there is something seriously wrong with his moral compass, if not his perception of reality. There is simply no excuse for a person with his talents, resources, and opportunities to create so much pointless noise. The callousness and narcissism conveyed by his antics should be impossible for his real friends to ignore—but they appear to keep silent, perhaps for fear of losing access to his orbit of influence.
Of course, none of this is to deny that the tens of thousands of brilliant engineers Elon employs are accomplishing extraordinary things. He really is the greatest entrepreneur of our generation. And because of the businesses he’s built, he will likely become the world’s first trillionaire—perhaps very soon. Since the election of Donald Trump in November, Elon’s wealth has grown by around $200 billion. That’s nearly $3 billion a day (and over $100 million an hour). Such astonishing access to resources gives Elon the chance—and many would argue the responsibility—to solve enormous problems in our world.
So why spend time spreading lies on X?
-
@ a95c6243:d345522c
2024-10-26 12:21:50Es ist besser, ein Licht zu entzünden, als auf die Dunkelheit zu schimpfen. Konfuzius
Die Bemühungen um Aufarbeitung der sogenannten Corona-Pandemie, um Aufklärung der Hintergründe, Benennung von Verantwortlichkeiten und das Ziehen von Konsequenzen sind durchaus nicht eingeschlafen. Das Interesse daran ist unter den gegebenen Umständen vielleicht nicht sonderlich groß, aber es ist vorhanden.
Der sächsische Landtag hat gestern die Einsetzung eines Untersuchungsausschusses zur Corona-Politik beschlossen. In einer Sondersitzung erhielt ein entsprechender Antrag der AfD-Fraktion die ausreichende Zustimmung, auch von einigen Abgeordneten des BSW.
In den Niederlanden wird Bill Gates vor Gericht erscheinen müssen. Sieben durch die Covid-«Impfstoffe» geschädigte Personen hatten Klage eingereicht. Sie werfen unter anderem Gates, Pfizer-Chef Bourla und dem niederländischen Staat vor, sie hätten gewusst, dass diese Präparate weder sicher noch wirksam sind.
Mit den mRNA-«Impfstoffen» von Pfizer/BioNTech befasst sich auch ein neues Buch. Darin werden die Erkenntnisse von Ärzten und Wissenschaftlern aus der Analyse interner Dokumente über die klinischen Studien der Covid-Injektion präsentiert. Es handelt sich um jene in den USA freigeklagten Papiere, die die Arzneimittelbehörde (Food and Drug Administration, FDA) 75 Jahre unter Verschluss halten wollte.
Ebenfalls Wissenschaftler und Ärzte, aber auch andere Experten organisieren als Verbundnetzwerk Corona-Solution kostenfreie Online-Konferenzen. Ihr Ziel ist es, «wissenschaftlich, demokratisch und friedlich» über Impfstoffe und Behandlungsprotokolle gegen SARS-CoV-2 aufzuklären und die Diskriminierung von Ungeimpften zu stoppen. Gestern fand eine weitere Konferenz statt. Ihr Thema: «Corona und modRNA: Von Toten, Lebenden und Physik lernen».
Aufgrund des Digital Services Acts (DSA) der Europäischen Union sei das Risiko groß, dass ihre Arbeit als «Fake-News» bezeichnet würde, so das Netzwerk. Staatlich unerwünschte wissenschaftliche Aufklärung müsse sich passende Kanäle zur Veröffentlichung suchen. Ihre Live-Streams seien deshalb zum Beispiel nicht auf YouTube zu finden.
Der vielfältige Einsatz für Aufklärung und Aufarbeitung wird sich nicht stummschalten lassen. Nicht einmal der Zensurmeister der EU, Deutschland, wird so etwas erreichen. Die frisch aktivierten «Trusted Flagger» dürften allerdings künftige Siege beim «Denunzianten-Wettbewerb» im Kontext des DSA zusätzlich absichern.
Wo sind die Grenzen der Meinungsfreiheit? Sicher gibt es sie. Aber die ideologische Gleichstellung von illegalen mit unerwünschten Äußerungen verfolgt offensichtlich eher das Ziel, ein derart elementares demokratisches Grundrecht möglichst weitgehend auszuhebeln. Vorwürfe wie «Hassrede», «Delegitimierung des Staates» oder «Volksverhetzung» werden heute inflationär verwendet, um Systemkritik zu unterbinden. Gegen solche Bestrebungen gilt es, sich zu wehren.
Dieser Beitrag ist zuerst auf Transition News erschienen.
-
@ c631e267:c2b78d3e
2024-10-23 20:26:10Herzlichen Glückwunsch zum dritten Geburtstag, liebe Denk Bar! Wieso zum dritten? Das war doch 2022 und jetzt sind wir im Jahr 2024, oder? Ja, das ist schon richtig, aber bei Geburtstagen erinnere ich mich immer auch an meinen Vater, und der behauptete oft, der erste sei ja schließlich der Tag der Geburt selber und den müsse man natürlich mitzählen. Wo er recht hat, hat er nunmal recht. Konsequenterweise wird also heute dieser Blog an seinem dritten Geburtstag zwei Jahre alt.
Das ist ein Grund zum Feiern, wie ich finde. Einerseits ganz einfach, weil es dafür gar nicht genug Gründe geben kann. «Das Leben sind zwei Tage», lautet ein gängiger Ausdruck hier in Andalusien. In der Tat könnte es so sein, auch wenn wir uns im Alltag oft genug von der Routine vereinnahmen lassen.
Seit dem Start der Denk Bar vor zwei Jahren ist unglaublich viel passiert. Ebenso wie die zweieinhalb Jahre davor, und all jenes war letztlich auch der Auslöser dafür, dass ich begann, öffentlich zu schreiben. Damals notierte ich:
«Seit einigen Jahren erscheint unser öffentliches Umfeld immer fragwürdiger, widersprüchlicher und manchmal schier unglaublich - jede Menge Anlass für eigene Recherchen und Gedanken, ganz einfach mit einer Portion gesundem Menschenverstand.»
Wir erleben den sogenannten «großen Umbruch», einen globalen Coup, den skrupellose Egoisten clever eingefädelt haben und seit ein paar Jahren knallhart – aber nett verpackt – durchziehen, um buchstäblich alles nach ihrem Gusto umzukrempeln. Die Gelegenheit ist ja angeblich günstig und muss genutzt werden.
Nie hätte ich mir träumen lassen, dass ich so etwas jemals miterleben müsste. Die Bosheit, mit der ganz offensichtlich gegen die eigene Bevölkerung gearbeitet wird, war früher für mich unvorstellbar. Mein (Rest-) Vertrauen in alle möglichen Bereiche wie Politik, Wissenschaft, Justiz, Medien oder Kirche ist praktisch komplett zerstört. Einen «inneren Totalschaden» hatte ich mal für unsere Gesellschaften diagnostiziert.
Was mich vielleicht am meisten erschreckt, ist zum einen das Niveau der Gleichschaltung, das weltweit erreicht werden konnte, und zum anderen die praktisch totale Spaltung der Gesellschaft. Haben wir das tatsächlich mit uns machen lassen?? Unfassbar! Aber das Werkzeug «Angst» ist sehr mächtig und funktioniert bis heute.
Zum Glück passieren auch positive Dinge und neue Perspektiven öffnen sich. Für viele Menschen waren und sind die Entwicklungen der letzten Jahre ein Augenöffner. Sie sehen «Querdenken» als das, was es ist: eine Tugend.
Auch die immer ernsteren Zensurbemühungen sind letztlich nur ein Zeichen der Schwäche, wo Argumente fehlen. Sie werden nicht verhindern, dass wir unsere Meinung äußern, unbequeme Fragen stellen und dass die Wahrheit peu à peu ans Licht kommt. Es gibt immer Mittel und Wege, auch für uns.
Danke, dass du diesen Weg mit mir weitergehst!
-
@ fad5c183:5cb8046b
2025-02-10 17:46:03The Big Question: What Really Supports Bitcoin? Let’s cut the fluff. Money has always needed something to back it. In the past, it was gold, something tangible, scarce, and universally recognized as valuable. Then came fiat (government-backed currency), which ditched gold in favor of trust in central banks.
Now, Bitcoin is here. It’s digital, decentralized, and allegedly free from manipulation. But is it? If Bitcoin isn’t backed by gold, oil, or government decree, what gives it value? And if a small number of players hold most of it, are we just recreating the same problems as fiat?
Let’s dig in.
Why Bitcoin Has Value (Even If You Can’t Touch It) Bitcoin is backed by math, code, and energy—not physical resources. Its value comes from three major factors:
- Scarcity – Only 21 million BTC will ever exist. No central bank can “print” more.
- Security – It’s protected by cryptography and (proof-of-work). Hacking the Bitcoin network is practically impossible.
- Market Trust – Bitcoin is valuable because people believe in its ability to store value, just like gold or fiat.
Unlike government money, where supply is controlled by a central authority, Bitcoin’s supply is fixed and transparent.
Sounds great, right? Well, there’s a catch.
Are We Just Repeating the Fiat Problem?
Fiat money is flawed because central banks can print it endlessly, manipulate interest rates, and control its flow. This causes inflation, bailouts, and financial crises.
Bitcoin fixes that. No one can create more Bitcoin out of thin air. But here’s the issue:
A small number of people and institutions own a huge percentage of Bitcoin. These “whales” can manipulate price movements, just like big banks do with fiat. Unlike fiat, where governments intervene (for better or worse), Bitcoin markets are unregulated and volatile. So, if whales can dump Bitcoin to crash prices and buy back cheap, is it really that different from fiat where the rich get richer?
Bitcoin’s Advantage: Transparency & Control
Here’s where Bitcoin still wins:
✅ No Central Control – Governments and banks can’t change its monetary policy. ✅ Transparency – Every transaction is on the blockchain. No hidden “money printing.” ✅ Self-Custody – You can hold your Bitcoin, unlike fiat, which sits in a bank that can freeze or seize it.
But let’s not pretend it’s perfect. If the majority of Bitcoin remains concentrated in a few hands, it still creates power imbalances.
The solution? More decentralization—and that’s where Nostr comes in.
How Nostr & Bitcoin Could Change the Game
Nostr is a decentralized communication protocol. No servers, no censorship, no single point of control.
When paired with Bitcoin and the Lightning Network, it could:
- Enable truly peer-to-peer transactions without banks or centralized exchanges.
- Reduce whale manipulation by increasing adoption and distribution.
- Support a free, censorship-resistant financial system without intermediaries.
Imagine a world where you don’t need banks or corporations to transact—just an internet connection. That’s where we’re headed.
Final Thought: Are We at Square One?
Bitcoin isn’t a perfect solution, but it’s a step forward. It removes central banks from the equation but still struggles with wealth concentration and market manipulation.
So, are we just recreating fiat 2.0? Maybe in some ways. But here’s the difference:
The rules can’t be changed by elites in a closed room. Every transaction is visible—no shady money printing. Anyone can self-custody their assets—no middlemen needed. The key to breaking the cycle? More decentralization, better distribution, and adoption beyond whales and institutions.
Bitcoin is a tool. It’s up to us to use it wisely.
What do you think? Are we just repeating history, or is Bitcoin truly different? Let’s debate. 🔥
-
@ dbb19ae0:c3f22d5a
2025-02-08 15:06:44PS C:\Users\Alashazam> cortex run tinyllama In order to exit, type
exit()
give me a little sentence of 10 words "Certainly, here's a little sentence of 10 words that exemplifies the power of words: 'The beauty of life is that it has the power to change us, even in the smallest ways.'" now use SQL to insert this sentence into a table that has 2 fields Id, and sentence Here's an SQL query to insert the sentence you gave into the
sentence
table:INSERT INTO sentence (id, sentence) VALUES (1, 'The beauty of life is that it has the power to change us, even in the smallest ways.');
This query will create a new row in the
sentence
table with the givenid
andsentence
, and will also update thesentence
table'ssentence
column to contain the new sentence.please generate the table creation for sqlite Here's a table creation statement for a
sentence
table in SQLite:CREATE TABLE IF NOT EXISTS sentence ( id INTEGER PRIMARY KEY, sentence TEXT UNIQUE NOT NULL );
This will create a table called
sentence
with the following columns:id
: An integer primary key column used to uniquely identify each row.sentence
: A text column containing the actual sentence.
This table will store the sentence you provided in your text input.
exit()
-
@ a95c6243:d345522c
2024-10-19 08:58:08Ein Lämmchen löschte an einem Bache seinen Durst. Fern von ihm, aber näher der Quelle, tat ein Wolf das gleiche. Kaum erblickte er das Lämmchen, so schrie er:
"Warum trübst du mir das Wasser, das ich trinken will?"
"Wie wäre das möglich", erwiderte schüchtern das Lämmchen, "ich stehe hier unten und du so weit oben; das Wasser fließt ja von dir zu mir; glaube mir, es kam mir nie in den Sinn, dir etwas Böses zu tun!"
"Ei, sieh doch! Du machst es gerade, wie dein Vater vor sechs Monaten; ich erinnere mich noch sehr wohl, daß auch du dabei warst, aber glücklich entkamst, als ich ihm für sein Schmähen das Fell abzog!"
"Ach, Herr!" flehte das zitternde Lämmchen, "ich bin ja erst vier Wochen alt und kannte meinen Vater gar nicht, so lange ist er schon tot; wie soll ich denn für ihn büßen."
"Du Unverschämter!" so endigt der Wolf mit erheuchelter Wut, indem er die Zähne fletschte. "Tot oder nicht tot, weiß ich doch, daß euer ganzes Geschlecht mich hasset, und dafür muß ich mich rächen."
Ohne weitere Umstände zu machen, zerriß er das Lämmchen und verschlang es.
Das Gewissen regt sich selbst bei dem größten Bösewichte; er sucht doch nach Vorwand, um dasselbe damit bei Begehung seiner Schlechtigkeiten zu beschwichtigen.
Quelle: https://eden.one/fabeln-aesop-das-lamm-und-der-wolf
-
@ da0b9bc3:4e30a4a9
2025-02-10 12:51:46Hello Stackers!
It's Monday so we're back doing "Meta Music Mondays" 😉.
From before the territory existed there was just one post a week in a ~meta take over. Now each month we have a different theme and bring music from that theme.
Welcome to Femmes Fatales 3!!!
I absolutely loved doing this last year so I'm bringing it back for round 3!
It's Femmes Fatales, where we celebrate women in ~Music. So let's have those ladies of the lung, the sirens of sound, our Femmes Fatales!
https://youtu.be/ya69LUa1E_w?si=cM6yCALsPpp9L3Sc
I recently got introduced to these ladies. Their music is fantastic, they're really talented musicians. They are:
Lilith: The vocalist. Lamia: The lead guitarist. Nixe: The bassist. Abrahel: The drummer.
Their identity is meant to be a mystery, so let's keep it that way.
These Nuns can make Noise!!
Let's go!
Talk Music. Share Tracks. Zap Sats.
originally posted at https://stacker.news/items/881416
-
@ d076d4cc:e8d8f919
2025-02-08 12:04:00Betano là một nền tảng kỹ thuật số tiên tiến, được thiết kế để mang đến trải nghiệm mượt mà và hiện đại cho người dùng. Với giao diện thân thiện, trực quan và dễ sử dụng, Betano cho phép người dùng thao tác một cách nhanh chóng và thuận tiện trên nhiều thiết bị khác nhau. Nền tảng này không ngừng tối ưu hóa để đảm bảo hiệu suất cao, giúp mọi hoạt động diễn ra ổn định và không bị gián đoạn. Đây là yếu tố quan trọng giúp Betano trở thành sự lựa chọn hàng đầu trong lĩnh vực kỹ thuật số.
Yếu tố bảo mật luôn được BETANO đặt lên hàng đầu nhằm đảm bảo sự an toàn tuyệt đối cho người dùng. Hệ thống bảo mật đa lớp được tích hợp để bảo vệ thông tin cá nhân cũng như dữ liệu quan trọng, ngăn chặn mọi nguy cơ rủi ro. Công nghệ mã hóa hiện đại giúp đảm bảo rằng tất cả thông tin đều được bảo vệ một cách nghiêm ngặt. Betano cũng thường xuyên cập nhật và nâng cấp hệ thống bảo mật để đáp ứng các tiêu chuẩn cao nhất, mang đến sự an tâm tuyệt đối cho người dùng.
Bên cạnh yếu tố bảo mật, Betano còn đặc biệt chú trọng đến hiệu suất hoạt động của nền tảng. Hệ thống được thiết kế để đảm bảo tốc độ xử lý nhanh, giúp người dùng dễ dàng truy cập và sử dụng mà không gặp lỗi kỹ thuật. Những tính năng tiên tiến được cập nhật liên tục nhằm nâng cao trải nghiệm tổng thể, mang đến sự thuận tiện và hài lòng tối đa. Betano luôn hướng đến việc tạo ra một nền tảng kỹ thuật số linh hoạt, dễ sử dụng và phù hợp với mọi đối tượng người dùng.
Dịch vụ chăm sóc khách hàng của Betano được đánh giá cao nhờ sự tận tâm và chuyên nghiệp. Đội ngũ hỗ trợ hoạt động 24/7, luôn sẵn sàng giải đáp mọi thắc mắc và xử lý các vấn đề một cách nhanh chóng, hiệu quả. Người dùng có thể liên hệ với bộ phận chăm sóc khách hàng thông qua nhiều kênh khác nhau để nhận được sự hỗ trợ tốt nhất. Đây chính là một trong những điểm mạnh giúp Betano tạo dựng được lòng tin và sự hài lòng từ cộng đồng người dùng.
Với sự kết hợp giữa công nghệ hiện đại, hệ thống bảo mật tiên tiến và dịch vụ chăm sóc khách hàng chuyên nghiệp, Betano không ngừng khẳng định vị thế của mình trong lĩnh vực kỹ thuật số. Những cải tiến liên tục giúp nền tảng này đáp ứng nhu cầu ngày càng đa dạng của người dùng, mang đến trải nghiệm hoàn hảo và đáng tin cậy.
-
@ 1cb14ab3:95d52462
2025-02-09 15:45:32Hey all. I am setting up a Plebeian Marketplace on Nostr using my Lightning node. I currently have two channels open (one with a capacity of 500,000 sats, one with a capacity of 100,000 sats). Both use different LSP's (Megalith and Olympus).
My question is regarding the maximum product price I can set for my marketplace. One of my products is 1M sats. Obviously my receiving capacity is not large enough to cover this, so I was planning on opening up another channel.
If I open another channel for 500,000 sats, that would bring my total receiving capacity to 1.1M which would cover the product. However my question is if I need all of the receiving capacity in the same channel, or if the sale would pull from all three channels? Am I best to close out the first two channels and open a single, larger channel?
Sorry for the noob question.
Tl;DR: Can someone explain how I should best set up my node to accommodate my store.
originally posted at https://stacker.news/items/880591
-
@ 78c90fc4:4bff983c
2025-02-10 12:08:13“Die Welt wird von ganz anderen Personen regiert als diejenigen es sich vorstellen, die nicht hinter den Kulissen stehen.”
Benjamin Disraeli, zweimaliger britischer Premierminister und Romanautor.
Quelle:
https://www.unz.com/article/the-disraeli-enigma/\ \ Als 1853 der Krimkrieg zwischen Russland und dem Osmanischen Reich ausbrach, wurde das Osmanische Reich vom Vereinigten Königreich und Frankreich gerettet. Zwanzig Jahre später zog Zar Alexander II. als Beschützer der unterdrückten serbischen und bulgarischen Christen erneut gegen die Osmanen in den Krieg. Als die Russen vor den Toren Konstantinopels/Istanbuls standen, waren die Osmanen gezwungen, die Schaffung der autonomen Fürstentümer Bulgarien, Serbien und Rumänien durch den Vertrag von San Stefano zu akzeptieren. Die Briten waren mit diesem Vertrag unzufrieden und beriefen zusammen mit Österreich-Ungarn den Berliner Kongress (1878) ein, der ihn aufhob. Russische Eroberungen wurden zurückgenommen, Armenien und Bulgarien wurden größtenteils an das Osmanische Reich zurückgegeben und der Balkan wurde in heterogene und konfliktreiche Staaten aufgeteilt. Diese „Balkanisierung“ löste nationalistische Ressentiments aus, die den Ersten Weltkrieg auslösen sollten.
\ Das Hauptziel des Berliner Vertrags bestand darin, das zu retten, was von einem schwächelnden Osmanischen Reich zu retten war, um der panslawistischen Expansion Russlands entgegenzuwirken. England, das stets eifersüchtig auf seine Vormachtstellung zur See bedacht war, wollte verhindern, dass Russland näher an den Bosporus heranrückte. Die Briten erhielten das Recht, Zypern als Marinestützpunkt zu nutzen und gleichzeitig den Suezkanal zu überwachen. Dies war der Beginn des „Great Game“ Großbritanniens um die Kolonialherrschaft in Asien und die Eindämmung Russlands, was insbesondere zur Schaffung Afghanistans als Pufferstaat führte.
\ Es gibt verschiedene Möglichkeiten, diesen Abschnitt der Geschichte zu interpretieren, der den Keim für alle Tragödien des 20. Jahrhunderts („das jüdische Jahrhundert“ laut Yuri Slezkine) in sich trägt.[1]\ Yuri Slezkine, The Jewish Century, Princeton University Press, 2004.
\ Es gibt unterschiedliche Ansichten darüber, welche Kräfte die Geschichte in dieser entscheidenden Zeit geprägt haben. Aber letztendlich wird Geschichte von Menschen gemacht, und sie kann nur verstanden werden, wenn man die Hauptakteure und ihre Motive identifiziert: Man kann den Vietnamkrieg einfach nicht verstehen, ohne sich mit der Denkweise von Johnson oder Kissinger auseinanderzusetzen. Unter den Anstiftern des Berliner Vertrags sticht ein Name besonders hervor: Benjamin Disraeli (1804–1881), Premierminister unter Königin Victoria von 1868 bis 1869 und erneut von 1874 bis 1880. Disraeli war auch der Mann, der 1875 die Übernahme des Suezkanals durch England ermöglichte, und zwar durch die Finanzierung seines Freundes Lionel de Rothschild, dem Sohn von Nathan Mayer – eine Operation, die die Kontrolle der Rothschilds über die Bank of England festigte.
\ Disraeli ist ein sehr interessanter Fall, da er sowohl ein bedeutender britischer Staatsmann während der globalen Hegemonie Großbritanniens als auch ein Romanautor war, der seine fiktiven Figuren dazu benutzte, seine ehrlichen Gedanken zu äußern, während er eine Art „glaubhafte Abstreitbarkeit“ (Sidonia spricht, nicht ich!) aufrechterhielt. Wir haben daher die einzigartige Gelegenheit, die wahren Motive des Mannes in der Politik zwischen den Zeilen zu lesen. Stellen Sie sich vor, Kissinger hätte Romane geschrieben, in denen ein Jude die Hauptfigur ist, der die Außen- und Militärpolitik des Imperiums vorantrieb und gleichzeitig ein enger Freund des reichsten jüdischen Bankiers war.\ \
Disraeli wird als der wahre Erfinder des Britischen Empires bezeichnet, da er es war, der Königin Victoria durch das Parlament mit dem Royal Titles Act von 1876 zur Kaiserin von Indien ernennen ließ (das obere Bild ist eine Karikatur, die Disraeli als Hausierer zeigt, der der Königin die Kaiserkrone überreicht).
Disraeli war, wie bereits erwähnt, die Hauptinspiration für den Berliner Kongress. Darüber hinaus war Disraeli ein Vorläufer des Zionismus, der versuchte, die „Wiederherstellung Israels“ auf die Tagesordnung des Berliner Kongresses zu setzen, in der Hoffnung, den Sultan Abdul Hamid davon zu überzeugen, Palästina als autonome Provinz zu gewähren. Der Sultan lehnte das Angebot ab, das wahrscheinlich das Versprechen finanzieller Unterstützung für seine zusammenbrechende Wirtschaft beinhaltete – wie auch Herzls Angebot im Jahr 1902, das ebenfalls abgelehnt wurde.\ \ Der Zionismus war Disraelis uralter Traum: Nach einer Reise in den Nahen Osten im Alter von sechsundzwanzig Jahren veröffentlichte er seinen ersten Roman, Die wundersame Geschichte des Alroy, und ließ seinen Helden, einen einflussreichen Juden des Mittelalters, sagen: „Mein Wunsch ist eine nationale Existenz, die wir nicht haben. Mein Wunsch ist das Land der Verheißung und Jerusalem und der Tempel, alles, was wir eingebüßt haben, wonach wir uns gesehnt haben, wofür wir gekämpft haben, unser schönes Land, unser heiliges Glaubensbekenntnis, unsere einfachen Sitten und unsere alten Bräuche.“\ Disraeli schrieb diese Zeilen noch vor den Anfängen der biblischen Archäologie; erst 1841 veröffentlichte Edward Robinson seine Biblical Researches in Palestine. Die ersten Ausgrabungen des von Königin Victoria geförderten Palestine Exploration Fund begannen 1867. Wohlhabende britische Juden hatten sich jedoch schon lange zuvor für Palästina interessiert. Disraelis Interesse wurde durch seinen Nachbarn und vierzigjährigen Freund Moses Montefiore beeinflusst, der Judith Cohen, die Schwägerin von Nathan Rothschild, heiratete. Nach einer Reise nach Palästina im Jahr 1827 widmete Montefiore seine immensen Ressourcen der Unterstützung seiner Glaubensgenossen im Heiligen Land, indem er Land kaufte und Häuser baute.
\ Sowohl Montefiore als auch Disraeli waren sephardischer Herkunft. Disraeli stammte aus einer Familie portugiesischer Marranen, die in Venedig zum Judentum konvertierten. Sein Großvater war 1748 nach London gezogen. Benjamin wurde im Alter von dreizehn Jahren getauft, als sein Vater Isaac D'Israeli zusammen mit seiner ganzen Familie zum anglikanischen Christentum konvertierte. Isaac D'Israeli ist der Autor eines Buches mit dem Titel The Genius of Judaism(in Anlehnung an Chateaubriands Le Génie du Christianisme), in dem er die einzigartigen Eigenschaften des jüdischen Volkes verherrlicht, aber die talmudischen Rabbiner dafür verantwortlich macht, dass sie „den nationalen Geist ihres Volkes versiegeln“ und „die Einfachheit ihres antiken Glaubens korrumpieren“. Wie für viele andere Juden dieser Zeit war die Konversion für D'Israeli rein opportunistisch: Bis zum Beginn des 19. Jahrhunderts blieben Verwaltungskarrieren für Juden verschlossen. Ein Gesetz von 1740 hatte ihre Einbürgerung erlaubt, aber es hatte Volksaufstände provoziert und wurde 1753 aufgehoben. Viele einflussreiche Juden, wie der Stadtbankier Sampson Gideon, entschieden sich dann für eine nominelle Konversion ihrer Kinder.[2]\ Cecil Roth, A History of the Marranos (1932), Meridian Books, 1959, S. 148.\ \ Etwa zur gleichen Zeit wie Disraeli konvertierte Heinrich Heine (1797–1856) zum Luthertum (während einer seiner Brüder zum Katholizismus konvertierte, um Offizier in Österreich zu werden, und ein anderer zur Orthodoxie, um als Arzt in Russland zu dienen). Heine betrachtete die Taufe als „Eintrittskarte in die europäische Zivilisation“. Er beklagte sich jedoch darüber, dass er von den Deutschen immer noch als Jude angesehen wurde, und zog es daher vor, in Frankreich zu leben, wo er als Deutscher angesehen wurde. Nur wenige Jahre nach seiner Konversion zeigten seine Schriften eine sehr negative Einstellung gegenüber dem Christentum, das er als „düstere, blutrünstige Religion für Kriminelle“ bezeichnete, die die Sinnlichkeit unterdrücke. Am Ende seines Lebens bereute er seine Taufe, die ihm nichts gebracht hatte, und erklärte in seinem letzten Buch Romanzero: „Ich mache kein Geheimnis aus meinem Judentum, zu dem ich nicht zurückgekehrt bin, weil ich es nicht verlassen habe.“[3]\ Zitiert in Kevin MacDonald, Separation and Its Discontents: Toward an Evolutionary Theory of Anti-Semitism, Praeger, 1998, kindle 2013, l. 4732–4877.
\ Genau wie bei den portugiesischen Marranen im 15. Jahrhundert verstärkte die Taufe bei den europäischen Juden des 19. Jahrhunderts ein nicht-religiöses, rassisches Verständnis des Judentums. Disraeli bezeichnete sich selbst als „Anglikaner jüdischer Abstammung“.
\ Für Hannah Arendt ist Disraeli ein „Rassenfanatiker“, der in seinem ersten Roman Alroy (1833) „einen Plan für ein jüdisches Reich entwickelte, in dem Juden als streng getrennte Klasse herrschen würden“. In seinem anderen Roman Coningsby „entfaltete er einen fantastischen Plan, nach dem jüdisches Geld den Aufstieg und Fall von Höfen und Reichen beherrscht und in der Diplomatie die Oberhand hat“. Diese Idee „wurde zum Dreh- und Angelpunkt seiner politischen Philosophie“.[4]\ Hannah Arendt, The Origins of Totalitarianism, Band 1: Antisemitism, Meridian Books, 1958, S. 309–310.\ Dies ist eine ziemlich fantastische Anschuldigung, die die meisten Biografen Disraelis nicht bestätigen würden. Sie ist jedoch wahrscheinlich richtig. Aber wir müssen genau auf Disraelis eigene Stimme hören, die durch Sidonia zum Ausdruck kommt, die Figur, die in drei seiner Romane vorkommt: Coningsby (1844), Sybil (1845) und Tancred (1847).
In Sidonias Worten spürt man den Groll gegen die Nation, in die er sich zu integrieren versuchte:\ Kann es etwas Absurderes geben, als dass eine Nation sich an eine Einzelperson wendet, um ihren Kredit, ihre Existenz als Imperium und ihren Komfort als Volk zu erhalten; und diese Einzelperson, der ihre Gesetze die stolzesten Rechte der Staatsbürgerschaft, das Privileg, in ihrem Senat zu sitzen und Land zu besitzen, verweigern; denn obwohl ich unbesonnen genug war, mehrere Ländereien zu kaufen, bin ich der Meinung, dass ein Engländer hebräischen Glaubens nach dem geltenden Recht Englands keinen Boden besitzen kann.
\ Da es einem Juden nicht möglich ist, sich durch Landbesitz in die britische Aristokratie zu integrieren, selbst wenn er zum örtlichen Glauben konvertiert, was sollte ein Jude tun, außer durch die Macht des Geldes aufzusteigen? Wie Heine spürte auch Disraeli die Heuchelei der Christen, die es den Juden übel nahmen, dass sie keine Christen waren, sie aber weiterhin als Juden behandelten, wenn sie konvertierten, und es insgeheim sogar vorzogen, dass sie Juden blieben.
\ Laut Disraelis Biografen Robert Blake ist Sidonia „eine Kreuzung zwischen Lionel de Rothschild und Disraeli selbst“. Er stammt von einer Adelsfamilie aus Aragon ab, zu deren herausragenden Mitgliedern ein Erzbischof und ein Großinquisitor gehörten, die beide heimlich dem Judentum ihrer Väter anhingen. Sidonias Vater, wie auch Lionel de Rothschilds Vater, „machte während der Napoleonischen Kriege ein großes Vermögen mit Militärverträgen und der Versorgung der verschiedenen Armeen“. Nachdem er sich in London niedergelassen hatte, „setzte er alles, was er besaß, auf die Waterloo-Anleihe; und das Ereignis machte ihn zu einem der größten Kapitalisten Europas.“ Seit seinem siebzehnten Lebensjahr besuchte Sidonia die Fürstenhöfe der Schuldner seines Vaters und lernte die Geheimnisse der Macht kennen. „Die geheime Geschichte der Welt war sein Zeitvertreib. Es bereitete ihm großes Vergnügen, die verborgenen Motive mit den öffentlichen Vorwänden der Transaktionen zu kontrastieren.“ Disraeli selbst war laut Robert Blake „von Verschwörungen besessen“.[5]\ Robert Blake, Disraeli (1966), Faber Finds, 2010, S. 202.
\ Sidonia ist von seiner Rasse begeistert: „Alles ist Rasse – es gibt keine andere Wahrheit.“ Er weigert sich, eine Nichtjüdin zu heiraten, weil, so der Erzähler, „keine irdische Überlegung ihn jemals dazu veranlassen würde, die Reinheit der Rasse zu beeinträchtigen, auf die er stolz ist.“ Mit „Rasse“ meinte Disraeli Blutsverwandtschaft. In seinem letzten Roman Endymion (1880) schrieb er:\ Kein Mensch wird das Prinzip der Rasse gleichgültig behandeln. Es ist der Schlüssel zur Geschichte, und der Grund, warum die Geschichte oft so verwirrend ist, liegt darin, dass sie von Männern geschrieben wurde, die dieses Prinzip und all das damit verbundene Wissen nicht kennen ... Sprache und Religion machen keine Rasse aus – es gibt nur eine Sache, die eine Rasse ausmacht, und das ist Blut.\ Sidonia erzählt seinem Schützling Coningsby in Coningsby oder die neue Generation, dass die Verfolgung durch christliche Nationen die jüdische Nation niemals zerschlagen könnte.
\ Tatsache ist, dass man eine reine Rasse der kaukasischen Organisation nicht vernichten kann. Es ist eine physiologische Tatsache; ein einfaches Naturgesetz, das ägyptische und assyrische Könige, römische Kaiser und christliche Inquisitoren verblüfft hat. Keine Strafgesetze, keine körperlichen Folterungen können bewirken, dass eine überlegene Rasse in einer unterlegenen aufgehen oder von ihr vernichtet werden sollte. Die gemischten verfolgenden Rassen verschwinden, die reine verfolgte Rasse bleibt bestehen. Und im Moment, trotz Jahrhunderten oder gar Jahrzehnten der Erniedrigung, übt der jüdische Geist einen enormen Einfluss auf die Angelegenheiten Europas aus. Ich spreche nicht von ihren Gesetzen, denen Sie immer noch gehorchen; von ihrer Literatur, mit der Ihr Geist gesättigt ist, sondern vom lebendigen hebräischen Intellekt. Sie beobachten nie eine große intellektuelle Bewegung in Europa, an der die Juden nicht in hohem Maße beteiligt sind.\ Wo auch immer er reiste, fügte Sidonia hinzu, sah er jüdische Berater hinter Monarchen und Staatsoberhäuptern.
„Sie sehen also, mein lieber Coningsby, dass die Welt von ganz anderen Persönlichkeiten regiert wird, als diejenigen, die nicht hinter den Kulissen stehen, sich vorstellen können.“
In einem Sachbuch (Lord George Bentinck: A Political Biography, 1852) schrieb Disraeli:\ [Juden] sind ein lebendiger und der eindrucksvollste Beweis für die Falschheit dieser verderblichen Doktrin der Neuzeit, der natürlichen Gleichheit der Menschen. ... die natürliche Gleichheit der Menschen, die heute in Mode ist und die Form einer kosmopolitischen Bruderschaft annimmt, ist ein Prinzip, das, wenn man danach handeln könnte, die großen Rassen zersetzen und den ganzen Genius der Welt zerstören würde. ... Die angeborene Tendenz der jüdischen Rasse, die zu Recht stolz auf ihr Blut ist, ist gegen die Doktrin der Gleichheit der Menschen.[6]\ Benjamin Disraeli, Lord George Bentinck, Archibald, 1852 (archive.org), S. 496.
\ Disraeli ist eindeutig auf derselben Wellenlänge wie Moses Hess, Herzls geistiger Vater, der, nachdem er Marx (einen weiteren nominellen Konvertiten) beeinflusst hatte, zu dem Schluss kam, dass „der Rassenkrieg wichtiger ist als der Klassenkampf“ (Rom und Jerusalem, 1862). Ein gutes Beispiel für dialektische politische Manipulation ist, dass Hess Marx weiterhin heimlich unterstützte und auf dessen Bitte hin nach dem Generalkongress der Internationale in Basel (5.–12. September 1869) Verleumdungen gegen Bakunin veröffentlichte, in denen er Bakunin beschuldigte, ein Agent provocateur der russischen Regierung zu sein und „im Interesse des Panslawismus“ zu arbeiten.[7]\ Bakunins Antwort auf Französisch, „Aux citoyens rédacteurs du Réveil“, finden Sie auf Wikisource.org.\ Es ist interessant zu sehen, dass ein anderer Proto-Zionist wie Disraeli den russischen Interessen zutiefst feindlich gesinnt war.\ \ Was war Disraelis Motivation hinter der Außenpolitik, die er dem britischen Empire vermittelte? Glaubte er, dass es die offensichtliche Bestimmung der Briten sei, die Welt zu erobern? Oder sah er das britische Empire als Instrument für die überlegene Bestimmung der jüdischen Nation, wenn er sich daran erinnerte, wie Esra und Nehemia in biblischen Zeiten die Außenpolitik der Perser ausgenutzt hatten? Indem er den Suezkanal (der zwischen 1859 und 1869 von den Franzosen gegraben wurde) mit den britischen Interessen in Verbindung brachte, wollte er einfach nur die Franzosen übertrumpfen, oder legte er damit den Grundstein für das zukünftige Bündnis zwischen Israel und dem angloamerikanischen Empire? Da die Briten nun einmal den Suezkanal besaßen, mussten sie ihn verteidigen, und wie ginge das besser als mit einer befreundeten jüdischen autonomen Regierung in der Nähe in Palästina? Genau das war es, was Chaim Weizmann dreißig Jahre später den Briten schmackhaft machen wollte: „Das jüdische Palästina wäre ein Schutz für England, insbesondere in Bezug auf den Suezkanal.“[8]\ Chaim Weizmann, Trial and Error, Harper & Brothers, 1949, S. 192.
\ Und als die Israelis 1956 mit britischer und französischer Unterstützung in den Sinai einmarschierten, taten sie dies, indem sie Großbritannien erneut versprachen, die Kontrolle über den von Nasser verstaatlichten Kanal an Großbritannien zurückzugeben.
\ Disraelis Russophobie, zu der er Königin Victoria bekehrte, und seine Verteidigung der Türken, deren Massaker an den Serben und Bulgaren allgemein bekannt waren, führten zu Theorien über eine jüdische Verschwörung. William Ewart Gladstone, ein langjähriger Gegner Disraelis und selbst mehrmals Premierminister (1868–1874, 1880–1885, 1886 und 1892–1894), erklärte, dass Disraeli „die britische Außenpolitik als Geisel seiner jüdischen Sympathien nahm und mehr daran interessiert war, die Leiden der Juden in Russland und der Türkei zu lindern, als an britischen Interessen“. Die Zeitung „The Truth“ vom 22. November 1877 spielte auf die Vertrautheit Disraelis mit den Rothschilds an und vermutete „eine stillschweigende Verschwörung ... seitens einer beträchtlichen Anzahl von Anglo-Hebräern, um uns im Namen der Türken in einen Krieg zu ziehen“. Es wurde außerdem daran erinnert, dass Disraeli in einer Rede vor dem britischen Unterhaus im Jahr 1847 die Zulassung von Juden zu wählbaren Ämtern gefordert hatte, mit der Begründung, dass „der jüdische Geist einen enormen Einfluss auf die Angelegenheiten Europas ausübt“.[9]\ Stanley Weintraub, Disraeli: A Biography, Hamish Hamilton, 1993, S. 579, 547.
\ Die Königin stand, wie ein Großteil der britischen Aristokratie, bereits unter dem Bann einer modischen Theorie, die den Angelsachsen einen israelitischen Ursprung zuschrieb. Diese Theorie war erstmals zur Zeit Oliver Cromwells aufgetaucht und wurde 1840 von Pastor John Wilson in seinen Vorlesungen über das alte Israel und den israelitischen Ursprung der modernen Nationen Europas sowie 1870 von Edward Hine in The English Nation Identified with the Lost Israel neu aufgelegt. In diesem Werk erfahren wir, dass das Wort „Saxon“ von „Isaac's sons“ (Söhne Isaaks) abgeleitet ist. Diese lächerliche Theorie lieferte eine billige biblische Rechtfertigung für den britischen Kolonialismus und sogar für den Völkermord an den kolonisierten Völkern (neue Kanaaniter) durch das britische Empire (neues Israel).[10]\ André Pichot, Aux origines des théories raciales, de la Bible à Darwin, Flammarion, 2008, S. 124–143, 319.
\ Königin Victoria war glücklich, glauben zu können, dass ihre edle Abstammung auf König David zurückging, und ließ ihre Söhne beschneiden, ein Brauch, der bis heute fortbesteht. Es mag etwas Wahres an dem Gefühl der britischen Elite für ihr Judentum liegen, denn im 16. und 17. Jahrhundert hatten viele Ehen reiche jüdische Familien mit der alten, verarmten Landaristokratie vereint, so dass nach Hilaire Bellocs Schätzung „mit Beginn des 20. Jahrhunderts diejenigen der großen territorialen englischen Familien, in denen es kein jüdisches Blut gab, die Ausnahme waren“.[11]\ Hilaire Belloc, The Jews, Constable & Co., 1922 (archive.org), S. 223.
\ Die Begeisterung der Königin für das Judentum hatte aber auch viel mit dem Einfluss Disraelis zu tun, der einmal gegenüber einem Freund damit prahlte: „Jeder mag Schmeichelei, und wenn es um das Königshaus geht, sollte man sie mit einer Kelle auftragen.“[12]\ Stanley Weintraub, Disraeli: A Biography, Hamish Hamilton, 1993, S. 579, 547.
\ Der Fall Disraeli ist aufschlussreich, weil die Frage, die er aufwirft, dieselbe ist wie die Frage, die heute geopolitische Analysten in Bezug auf die Beziehung zwischen den Vereinigten Staaten und Israel spaltet: Wer führt wen an der Nase herum? Ist Israel der Brückenkopf der Vereinigten Staaten im Nahen Osten oder sind die Vereinigten Staaten, wie Zbigniew Brzezinski einmal sagte, der „dumme Esel“ Israels? Die Beantwortung dieser Frage für das Jahrhundert vor dem Zweiten Weltkrieg (als „Israel“ das internationale Judentum bedeutete) hilft bei der Beantwortung derselben Frage heute, da die symbiotische Beziehung zwischen Israel und dem Imperium erheblich gewachsen ist.
\ Die Antwort hängt vom Standpunkt des Betrachters ab. Die Zionisten haben natürlich ein Interesse daran, die Ansicht zu fördern, dass Israel den angloamerikanischen Interessen dient und nicht umgekehrt. Disraeli argumentierte vor dem britischen Parlament, dass ein jüdisches Palästina im Interesse des britischen Kolonialismus sei. Aber jüdische Zionisten haben die Dinge schon immer aus der anderen Perspektive betrachtet, und man kann kaum glauben, dass Disraeli ihre Ansicht nicht insgeheim teilte. Wenn der Held seines Romans Tancred (1847), ein Jude, der wie Disraeli zum Lord ernannt wurde, das britische Empire mit folgenden Worten verherrlicht: „Wir wollen die Welt erobern, angeführt von Engeln, um die Menschheit unter göttlicher Herrschaft glücklich zu machen“, wer verbirgt sich hinter diesem zweideutigen „wir“? Ist es dasselbe doppeldeutige „wir“, das die PNAC-Neokonservativen benutzten, um Amerika in Kriege zum Wohle Israels zu verwickeln?
\ Wenn ein britischer Jude wie Disraeli zu den Briten „wir“ sagte, war dies eine strategische Zweideutigkeit. Er traf damit den patriotischen Nerv der angelsächsischen Elite, die den gemeinsamen Glauben an die Mission des britischen Empires teilte, die Welt zu zivilisieren – Menschen wie Lord Salisbury, Mitglied von Cecil Rhodes' Round Table, der sich für eine Weltregierung durch die „britische Rasse“ einsetzte.[13]\ Carroll Quigley, The Anglo-American Establishment, From Rhodes to Cliveden (1949), Books In Focus, 1981.
\ Der britische Imperialismus und der zionistische Nationalismus wurden etwa zur gleichen Zeit geboren wie die Zwillinge Esau und Jakob und sind seit ihrer Geburt eng miteinander verflochten. Zwei Überlegungen helfen jedoch, ihre wahre Beziehung zu verstehen. Erstens reichen die ideologischen Wurzeln des Britischen Empires nicht weiter zurück als bis ins 17. Jahrhundert, während die des Zionismus mehr als zwei Jahrtausende zurückreichen. Zweitens starb das Britische Empire nach dem Ersten Weltkrieg, während der Zionismus aufblühte. Aus diesen beiden Gründen ist die Theorie, dass der Zionismus ein Nebenprodukt des britischen Imperialismus ist (nennen wir sie die Chomsky-Theorie), nicht haltbar.
\ Um die wahre Beziehung zwischen Zion und Albion zu Disraelis Zeiten zu verstehen, muss man die Macht der Rothschild-Dynastie über die britische Politik richtig einschätzen. Ohne die Rothschilds hätte Großbritannien nie die Kontrolle über den Suezkanal erlangt, der den Grundstein des britischen Empires im Nahen Osten bildete. Die Rothschilds selbst kandidierten nicht für ein politisches Amt, heirateten jedoch manchmal in eine solche Familie ein: Lord Archibald Primrose, 1886 und von 1892 bis 1894 Außenminister und 1894–1895 Premierminister, war der Schwiegersohn von Mayer Amschel de Rothschild.\ Es ist bemerkenswert, dass Theodor Herzl den zukünftigen jüdischen Staat als „aristokratische Republik“ mit „dem ersten Prinzen Rothschild“ an der Spitze sah. In einer langen Tirade in seinem Tagebuch ermahnte er die Rothschilds, ihre bösen Seelen zu erlösen, indem sie den Zionismus statt Kriege finanzierten:\ Ich weiß nicht, ob alle Regierungen bereits erkennen, welche internationale Bedrohung Ihr Weltreich darstellt. Ohne Sie können keine Kriege geführt werden, und wenn Frieden geschlossen werden soll, sind die Menschen umso mehr auf Sie angewiesen. Für das Jahr 1895 wurden die Militärausgaben der fünf Großmächte auf vier Milliarden Francs geschätzt, und ihre tatsächliche militärische Stärke in Friedenszeiten auf 2.800.000 Mann. Und diese Streitkräfte, die in der Geschichte ihresgleichen suchen, kommandieren Sie finanziell, ungeachtet der widerstreitenden Wünsche der Nationen. ... Und Ihr verfluchter Reichtum wächst immer noch. ... Aber wenn Sie sich uns anschließen, ... werden wir unseren ersten gewählten Herrscher aus Ihrem Haus nehmen. Das ist das leuchtende Leuchtfeuer, das wir auf die Spitze des fertigen Eiffelturms Ihres Vermögens setzen werden. In der Geschichte wird es so aussehen, als wäre das der Zweck des gesamten Bauwerks gewesen.[14]\ \ The Complete Diaries of Theodor Herzl, edited by Raphael Patai, Herzl Press & Thomas Yoseloff, 1960, vol. 1, pp. 163–170.\ Wie Richard Wagner jedoch einmal sagte (Judaism in Music, 1850), zogen es die Rothschilds vor, „die Juden der Könige“ zu bleiben, anstatt „die Könige der Juden“ zu sein.\ \ Wenn die Zeit für die Gründung des jüdischen Staates zu Disraelis Zeiten noch nicht reif war, dann vor allem deshalb, weil die Juden in Russland sich von Palästina ebenso wenig angezogen fühlten wie die Juden in Europa; sie wussten kaum, wo es lag. Erst kürzlich von Zar Alexander II. emanzipiert, strebten sie lediglich eine Auswanderung nach Europa oder in die Vereinigten Staaten an. Erst nach der Ermordung von Zar Alexander II. im Jahr 1881 (einen Monat vor Disraelis Tod) wurden einige von ihnen durch die Pogrome für Leon Pinskers proto-zionistischen Aufruf von 1882 empfänglich: „Wir müssen uns ein für alle Mal mit dem Gedanken abfinden, dass die anderen Nationen uns aufgrund ihres angeborenen natürlichen Antagonismus für immer ablehnen werden.“[15]\ Benzion Netanyahu, The Founding Fathers of Zionism, Balfour Books, 2012, Kindle l. 761-775.
\ Ebenfalls im Jahr 1881 begann Baron Edmond de Rothschild vom Pariser Zweig, unter der Schirmherrschaft seiner Palestine Jewish Colonization Association (PICA) Land in Palästina zu kaufen und die Ansiedlung jüdischer Siedler zu finanzieren, insbesondere in Tel Aviv. Die meisten bestehenden internationalen jüdischen Organisationen, wie B'nai B'rith (gegründet 1843 in New York) oder die Alliance Israélite Universelle (gegründet 1860 in Paris), waren jedoch der Meinung, dass Israel als verstreute Nation gut zurechtkäme und keine Pläne für Palästina habe.\ Dies änderte sich während des Ersten Weltkriegs, als ein äußerst effizientes Netzwerk aufgebaut wurde, das beide Seiten des Atlantiks verband.[16]\ Alison Weir, Against Our Better Judgment: The Hidden History of How the U.S. Was Used to Create Israel, 2014, Kindle l. 387-475.
\ Theodor Herz konzentrierte seine diplomatischen Bemühungen zunächst auf Deutschland, aber in England begannen sich die Dinge vielversprechend zu entwickeln („Der Schwerpunkt hat sich nach England verlagert“, schrieb er 1895 in sein Tagebuch), was zum Teil der Rekrutierung von Israel Zangwill zu verdanken war, der laut Benzion Netanyahu „der erste war, der in den oberen Kreisen der britischen Politik direkt über den Zionismus sprach“, insbesondere mit Lloyd George, „einem engen Bekannten Zangwills von Beginn seiner zionistischen Tätigkeit bis zu seinem Lebensende“.[17]\ Netanyahu, The Founding Fathers of Zionism, l. 2536-59.
\ Erinnern wir uns daran, dass Zangwill der erfolgreiche Autor von The Melting Pot war, einem Theaterstück, das Mischehen für Amerikaner pries. Hier besteht kein Widerspruch, denn „die gemischten verfolgten Rassen verschwinden, die reine verfolgte Rasse bleibt bestehen“, wie Sidonia sagte.\ \ Die Bedeutung von Disraelis geopolitischen Manövern wird von Historikern der Zionisten selten anerkannt, da sie oberflächlich betrachtet nicht den Weg für die Gründung des jüdischen Staates geebnet zu haben scheinen. Tatsächlich bildeten sie jedoch das unsichtbare Fundament, auf dem Herzl und Zangwill aufbauten. Und diese unsichtbare Kontinuität zeugt von der erstaunlichen generationsübergreifenden Beharrlichkeit des jüdischen Volkes, das sein jahrtausendealtes, selbsternanntes Schicksal Generation für Generation vorantreibt. Ja, es ist wirklich bewundernswert, wenn auch verheerend für die westliche Zivilisation, die durch zweitausend Jahre Christentum ahnungslos und ihres eigenen Sinns für Blut beraubt wurde. Wie der zionistische Autor Jakob Klatzkin einmal in der Zeitschrift „Der Jude“, 1916, schrieb:\ Wir bilden in uns selbst eine geschlossene juristische und geschäftliche Körperschaft. Eine starke Mauer, die wir errichtet haben, trennt uns von den Menschen in den Ländern, in denen wir leben – und hinter dieser Mauer befindet sich ein jüdischer Staat.[18]
Zitiert in Robert Edward Edmondson, The Jewish System Indicted by the Documentary Record, 1937 (archive.org), S. 15.\ \ Anmerkungen\ [1] Yuri Slezkine, The Jewish Century, Princeton University Press, 2004.\ [2] Cecil Roth, A History of the Marranos (1932), Meridian Books, 1959, S. 148.\ [3] Zitiert in Kevin MacDonald, Separation and Its Discontents: Toward an Evolutionary Theory of Anti-Semitism, Praeger, 1998, kindle 2013, l. 4732–4877.\ [4] Hannah Arendt, The Origins of Totalitarianism, Band 1: Antisemitism, Meridian Books, 1958, S. 309–310.\ [5] Robert Blake, Disraeli (1966), Faber Finds, 2010, S. 202.\ [6] Benjamin Disraeli, Lord George Bentinck, Archibald, 1852 (archive.org), S. 496.\ [7] Bakunins Antwort auf Französisch, „Aux citoyens rédacteurs du Réveil“, auf Wikisource.org.\ [8] Chaim Weizmann, Trial and Error, Harper & Brothers, 1949, S. 192.\ [9] Stanley Weintraub, Disraeli: A Biography, Hamish Hamilton, 1993, S. 579, 547.\ [10] André Pichot, Aux origines des théories raciales, de la Bible à Darwin, Flammarion, 2008, S. 124–143, 319.\ [11] Hilaire Belloc, The Jews, Constable & Co., 1922 (archive.org), S. 223.\ [12] Stanley Weintraub, Disraeli: A Biography, Hamish Hamilton, 1993, S. 579, 547.\ [13] Carroll Quigley, The Anglo-American Establishment, From Rhodes to Cliveden (1949), Books In Focus, 1981.\ [14] The Complete Diaries of Theodor Herzl, edited by Raphael Patai, Herzl Press & Thomas Yoseloff, 1960, vol. 1, pp. 163–170.\ [15] Benzion Netanyahu, The Founding Fathers of Zionism, Balfour Books, 2012, Kindle-Ausgabe, S. 761–775.\ [16] Alison Weir, Against Our Better Judgment: The Hidden History of How the U.S. Was Used to Create Israel, 2014, Kindle-Ausgabe, S. 387–475.\ [17] Netanyahu, The Founding Fathers of Zionism, S. 2536-59.\ [18] Zitiert in Robert Edward Edmondson, The Jewish System Indicted by the Documentary Record, 1937 (archive.org), S. 15.
-
@ 7e19a1dd:ea50ba3b
2025-02-10 11:16:42Air compressors are workhorses across industries, from manufacturing plants to auto repair shops. However, keeping them running smoothly requires regular maintenance, which can be a time-consuming and costly chore. That’s where air compressor filters come into play. These simple yet vital components can help extend the life of your compressor while saving you money and headaches down the line.
What Do Air Compressor Filters Actually Do?
Air compressors suck in air from their surroundings, and that air isn’t always clean. It can carry dirt, moisture, and even tiny particles that can damage your compressor's internal parts. Filters act as the gatekeepers, trapping contaminants before they wreak havoc.
Without a good filter, dirt and debris can clog valves and reduce efficiency. Even worse, it can lead to costly repairs—or worse, a full-blown breakdown. Filters also remove moisture, preventing rust and corrosion in your compressor and connected equipment.
Less Maintenance, More Savings
Regular maintenance on an air compressor is inevitable, but filters significantly cut down the frequency of those tune-ups. Clean air means fewer clogs and less wear and tear on moving parts. As a result, you’ll need fewer repairs and part replacements over time.
And let’s not forget energy efficiency. When an air compressor operates with clean air, it doesn’t have to work as hard. This reduced workload translates into lower energy bills. Over time, this can add up to significant savings.
Filters Protect Your Investment
Air compressors aren’t cheap, and replacing one can feel like a punch to the wallet. Using high-quality air compressor filters protects your investment by keeping the equipment running at peak performance. Think of it like regularly changing your car’s oil. It’s a small, affordable step that prevents big problems later.
Save Time and Effort
No one enjoys unscheduled downtime, especially when deadlines are looming. A well-maintained compressor equipped with a proper filter is far less likely to break down unexpectedly. That means fewer interruptions and more time to focus on your work. And here’s another bonus: replacing filters is quick and easy. Compared to the hours it can take to clean or repair a compressor, swapping out a filter is a breeze.
Choosing the Right Filter
Not all filters are created equal. Make sure you choose one that matches your compressor’s specifications. If you’re unsure, check your user manual or ask a professional. Investing in a high-quality filter might cost a little more upfront, but it will pay off in the long run.
Final Thoughts
Air compressor filters are a small but mighty tool in keeping your equipment running smoothly. They cut down on maintenance, protect your compressor, and save you both time and money. By making filters a regular part of your maintenance routine, you’ll not only extend the life of your compressor but also improve its efficiency. That’s a win-win for your wallet and your workflow. So, the next time you fire up your air compressor, make sure its filter is up to the task. You’ll thank yourself later!
-
@ d076d4cc:e8d8f919
2025-02-08 12:03:03May88 là một nền tảng kỹ thuật số tiên tiến, được thiết kế để mang lại trải nghiệm mượt mà và hiệu suất cao cho người dùng. Giao diện của May88 được tối ưu hóa để dễ sử dụng, giúp người dùng thao tác nhanh chóng và tiện lợi trên mọi thiết bị. Với hệ thống được xây dựng trên nền tảng công nghệ hiện đại, May88 đảm bảo tốc độ xử lý nhanh, ổn định và không bị gián đoạn, mang đến trải nghiệm trọn vẹn cho tất cả người dùng.
Yếu tố bảo mật luôn được đặt lên hàng đầu tại MAY88. Hệ thống bảo mật đa lớp được tích hợp để bảo vệ dữ liệu cá nhân và thông tin giao dịch của người dùng một cách an toàn. Công nghệ mã hóa tiên tiến giúp ngăn chặn các nguy cơ tiềm ẩn, đảm bảo mọi thông tin được bảo mật tuyệt đối. Đội ngũ kỹ thuật của May88 cũng liên tục cập nhật và nâng cấp hệ thống để luôn đáp ứng các tiêu chuẩn bảo mật cao nhất, mang đến sự an tâm cho người dùng khi sử dụng nền tảng.
Bên cạnh công nghệ bảo mật, May88 còn tập trung vào việc cải thiện hiệu suất của hệ thống. Các tính năng được tối ưu hóa để đảm bảo tốc độ phản hồi nhanh chóng, giúp người dùng có những trải nghiệm trơn tru mà không gặp lỗi kỹ thuật. Giao diện thân thiện, thiết kế thông minh giúp ngay cả những người mới sử dụng cũng có thể dễ dàng thao tác mà không gặp bất kỳ khó khăn nào. May88 luôn hướng đến sự hoàn hảo trong từng chi tiết để mang lại sự hài lòng cao nhất cho người dùng.
Dịch vụ hỗ trợ khách hàng tại May88 được đánh giá cao nhờ vào đội ngũ chăm sóc khách hàng chuyên nghiệp và tận tâm. Hệ thống hỗ trợ hoạt động 24/7, sẵn sàng giải đáp mọi thắc mắc và xử lý các vấn đề của người dùng một cách nhanh chóng. Người dùng có thể liên hệ qua nhiều kênh khác nhau để nhận được sự hỗ trợ tốt nhất, giúp quá trình trải nghiệm nền tảng trở nên thuận tiện và hiệu quả hơn.
Với sự kết hợp giữa công nghệ hiện đại, hệ thống bảo mật tiên tiến và dịch vụ chăm sóc khách hàng chuyên nghiệp, May88 đang khẳng định vị thế là một trong những nền tảng kỹ thuật số hàng đầu. Những cải tiến không ngừng của May88 giúp đáp ứng nhu cầu đa dạng của người dùng, mang đến trải nghiệm chất lượng cao và đáng tin cậy.
-
@ 42342239:1d80db24
2025-02-10 08:16:32The risks associated with cryptocurrencies have recently received attention in the media, where e.g. the Swedish Financial Supervisory Authority warns of the high volatility and risk of investments in crypto. Within the EU, as usual, significant efforts are being made to expand the already extensive regulatory framework. Meanwhile, in the US, there has been a marked turnaround. Even the presidential family has launched their own cryptocurrencies, resulting in criticism from industry experts .
Important perspectives, however, are conspicuous by their absence in the conversation.
Iain McGilchrist, a British psychiatrist and philosopher, has introduced the hemispheric hypothesis (a theory about how the brain's two hemispheres function). The left hemisphere is more detail- and control-oriented, while the right hemisphere is more holistic. A society dominated by the left hemisphere, such as our own according to McGilchrist , "would see it as its task to control everything maximally and would have a paranoid feeling that we need to have surveillance cameras everywhere...".
During a speech at the World Economic Forum, President Trump recently stated that conservatives complain about big banks, such as Bank of America, not allowing them to conduct business within the bank. Critics argue that the American banking system has been used to persecute political opponents, both during Obama's and Biden's terms. Under Obama, 'Operation Chokepoint' was introduced to limit certain businesses' access to banking services. A subcommittee in the Senate now wants to eradicate this phenomenon.
More and more people are discovering that their money is not always under their control. Non-profit associations and congregations are not allowed to open bank accounts. Sometimes they are even thrown out as bank customers. Others may report being subjected to lengthy interrogations by the bank about what they intend to do with their money, even when they just want to transfer funds between their own accounts. Rejected churches are met with silence, while a bank account is (still!) necessary to fully operate in society.
When leading economists at the International Monetary Fund (IMF) argue that a cashless society can threaten fundamental rights , including property rights, when churches are refused bank accounts in what is described as "a threat to civil society" and when regulations still fail to combat organised crime , is it not reasonable to wonder if we are on the right path?
With cash, people can pay freely without intermediaries, which constitutes a form of financial freedom. The notes you hold in your hand are your own. Cryptocurrencies, such as Bitcoin, offer a similar possibility: an electronic, peer-to-peer cash system (person to person).
A society dominated by the left hemisphere results in a pathological need for control, according to McGilchrist. A more holistic perspective, taking into account the right hemisphere, would acknowledge that too much control can be detrimental, that property rights are a fundamental right, and that financial freedom is a human right. Do these perspectives not deserve more attention?
-
@ 5d4b6c8d:8a1c1ee3
2025-02-09 15:36:35Sitting down to breakfast now, after 17 hours no food or water.
Score Card
Day 1: 14 hour fast (13 dry) Day 2: 15 hour fast (14 dry) Day 3: 17 hours (16 dry) Day 4: 18 hours (17 dry) Day 5: 18 hours (16 dry) Day 6: 19 hours (16 dry) Day 7: 16 hours (15 dry) Day 8: 18 hours (17 dry) Day 9: 17 hours (17 dry)
originally posted at https://stacker.news/items/880575
-
@ e3ba5e1a:5e433365
2025-02-04 08:29:00President Trump has started rolling out his tariffs, something I blogged about in November. People are talking about these tariffs a lot right now, with many people (correctly) commenting on how consumers will end up with higher prices as a result of these tariffs. While that part is true, I’ve seen a lot of people taking it to the next, incorrect step: that consumers will pay the entirety of the tax. I put up a poll on X to see what people thought, and while the right answer got a lot of votes, it wasn't the winner.
For purposes of this blog post, our ultimate question will be the following:
- Suppose apples currently sell for $1 each in the entire United States.
- There are domestic sellers and foreign sellers of apples, all receiving the same price.
- There are no taxes or tariffs on the purchase of apples.
- The question is: if the US federal government puts a $0.50 import tariff per apple, what will be the change in the following:
- Number of apples bought in the US
- Price paid by buyers for apples in the US
- Post-tax price received by domestic apple producers
- Post-tax price received by foreign apple producers
Before we can answer that question, we need to ask an easier, first question: before instituting the tariff, why do apples cost $1?
And finally, before we dive into the details, let me provide you with the answers to the ultimate question. I recommend you try to guess these answers before reading this, and if you get it wrong, try to understand why:
- The number of apples bought will go down
- The buyers will pay more for each apple they buy, but not the full amount of the tariff
- Domestic apple sellers will receive a higher price per apple
- Foreign apple sellers will receive a lower price per apple, but not lowered by the full amount of the tariff
In other words, regardless of who sends the payment to the government, both taxed parties (domestic buyers and foreign sellers) will absorb some of the costs of the tariff, while domestic sellers will benefit from the protectionism provided by tariffs and be able to sell at a higher price per unit.
Marginal benefit
All of the numbers discussed below are part of a helper Google Sheet I put together for this analysis. Also, apologies about the jagged lines in the charts below, I hadn’t realized before starting on this that there are some difficulties with creating supply and demand charts in Google Sheets.
Let’s say I absolutely love apples, they’re my favorite food. How much would I be willing to pay for a single apple? You might say “$1, that’s the price in the supermarket,” and in many ways you’d be right. If I walk into supermarket A, see apples on sale for $50, and know that I can buy them at supermarket B for $1, I’ll almost certainly leave A and go buy at B.
But that’s not what I mean. What I mean is: how high would the price of apples have to go everywhere so that I’d no longer be willing to buy a single apple? This is a purely personal, subjective opinion. It’s impacted by how much money I have available, other expenses I need to cover, and how much I like apples. But let’s say the number is $5.
How much would I be willing to pay for another apple? Maybe another $5. But how much am I willing to pay for the 1,000th apple? 10,000th? At some point, I’ll get sick of apples, or run out of space to keep the apples, or not be able to eat, cook, and otherwise preserve all those apples before they rot.
The point being: I’ll be progressively willing to spend less and less money for each apple. This form of analysis is called marginal benefit: how much benefit (expressed as dollars I’m willing to spend) will I receive from each apple? This is a downward sloping function: for each additional apple I buy (quantity demanded), the price I’m willing to pay goes down. This is what gives my personal demand curve. And if we aggregate demand curves across all market participants (meaning: everyone interested in buying apples), we end up with something like this:
Assuming no changes in people’s behavior and other conditions in the market, this chart tells us how many apples will be purchased by our buyers at each price point between $0.50 and $5. And ceteris paribus (all else being equal), this will continue to be the demand curve for apples.
Marginal cost
Demand is half the story of economics. The other half is supply, or: how many apples will I sell at each price point? Supply curves are upward sloping: the higher the price, the more a person or company is willing and able to sell a product.
Let’s understand why. Suppose I have an apple orchard. It’s a large property right next to my house. With about 2 minutes of effort, I can walk out of my house, find the nearest tree, pick 5 apples off the tree, and call it a day. 5 apples for 2 minutes of effort is pretty good, right?
Yes, there was all the effort necessary to buy the land, and plant the trees, and water them… and a bunch more than I likely can’t even guess at. We’re going to ignore all of that for our analysis, because for short-term supply-and-demand movement, we can ignore these kinds of sunk costs. One other simplification: in reality, supply curves often start descending before ascending. This accounts for achieving efficiencies of scale after the first number of units purchased. But since both these topics are unneeded for understanding taxes, I won’t go any further.
Anyway, back to my apple orchard. If someone offers me $0.50 per apple, I can do 2 minutes of effort and get $2.50 in revenue, which equates to a $75/hour wage for me. I’m more than happy to pick apples at that price!
However, let’s say someone comes to buy 10,000 apples from me instead. I no longer just walk out to my nearest tree. I’m going to need to get in my truck, drive around, spend the day in the sun, pay for gas, take a day off of my day job (let’s say it pays me $70/hour). The costs go up significantly. Let’s say it takes 5 days to harvest all those apples myself, it costs me $100 in fuel and other expenses, and I lose out on my $70/hour job for 5 days. We end up with:
- Total expenditure: $100 + $70 * 8 hours a day * 5 days \== $2900
- Total revenue: $5000 (10,000 apples at $0.50 each)
- Total profit: $2100
So I’m still willing to sell the apples at this price, but it’s not as attractive as before. And as the number of apples purchased goes up, my costs keep increasing. I’ll need to spend more money on fuel to travel more of my property. At some point I won’t be able to do the work myself anymore, so I’ll need to pay others to work on the farm, and they’ll be slower at picking apples than me (less familiar with the property, less direct motivation, etc.). The point being: at some point, the number of apples can go high enough that the $0.50 price point no longer makes me any money.
This kind of analysis is called marginal cost. It refers to the additional amount of expenditure a seller has to spend in order to produce each additional unit of the good. Marginal costs go up as quantity sold goes up. And like demand curves, if you aggregate this data across all sellers, you get a supply curve like this:
Equilibrium price
We now know, for every price point, how many apples buyers will purchase, and how many apples sellers will sell. Now we find the equilibrium: where the supply and demand curves meet. This point represents where the marginal benefit a buyer would receive from the next buyer would be less than the cost it would take the next seller to make it. Let’s see it in a chart:
You’ll notice that these two graphs cross at the $1 price point, where 63 apples are both demanded (bought by consumers) and supplied (sold by producers). This is our equilibrium price. We also have a visualization of the surplus created by these trades. Everything to the left of the equilibrium point and between the supply and demand curves represents surplus: an area where someone is receiving something of more value than they give. For example:
- When I bought my first apple for $1, but I was willing to spend $5, I made $4 of consumer surplus. The consumer portion of the surplus is everything to the left of the equilibrium point, between the supply and demand curves, and above the equilibrium price point.
- When a seller sells his first apple for $1, but it only cost $0.50 to produce it, the seller made $0.50 of producer surplus. The producer portion of the surplus is everything to the left of the equilibrium point, between the supply and demand curves, and below the equilibrium price point.
Another way of thinking of surplus is “every time someone got a better price than they would have been willing to take.”
OK, with this in place, we now have enough information to figure out how to price in the tariff, which we’ll treat as a negative externality.
Modeling taxes
Alright, the government has now instituted a $0.50 tariff on every apple sold within the US by a foreign producer. We can generally model taxes by either increasing the marginal cost of each unit sold (shifting the supply curve up), or by decreasing the marginal benefit of each unit bought (shifting the demand curve down). In this case, since only some of the producers will pay the tax, it makes more sense to modify the supply curve.
First, let’s see what happens to the foreign seller-only supply curve when you add in the tariff:
With the tariff in place, for each quantity level, the price at which the seller will sell is $0.50 higher than before the tariff. That makes sense: if I was previously willing to sell my 82nd apple for $3, I would now need to charge $3.50 for that apple to cover the cost of the tariff. We see this as the tariff “pushing up” or “pushing left” the original supply curve.
We can add this new supply curve to our existing (unchanged) supply curve for domestic-only sellers, and we end up with a result like this:
The total supply curve adds up the individual foreign and domestic supply curves. At each price point, we add up the total quantity each group would be willing to sell to determine the total quantity supplied for each price point. Once we have that cumulative supply curve defined, we can produce an updated supply-and-demand chart including the tariff:
As we can see, the equilibrium has shifted:
- The equilibrium price paid by consumers has risen from $1 to $1.20.
- The total number of apples purchased has dropped from 63 apples to 60 apples.
- Consumers therefore received 3 less apples. They spent $72 for these 60 apples, whereas previously they spent $63 for 3 more apples, a definite decrease in consumer surplus.
- Foreign producers sold 36 of those apples (see the raw data in the linked Google Sheet), for a gross revenue of $43.20. However, they also need to pay the tariff to the US government, which accounts for $18, meaning they only receive $25.20 post-tariff. Previously, they sold 42 apples at $1 each with no tariff to be paid, meaning they took home $42.
- Domestic producers sold the remaining 24 apples at $1.20, giving them a revenue of $28.80. Since they don’t pay the tariff, they take home all of that money. By contrast, previously, they sold 21 apples at $1, for a take-home of $21.
- The government receives $0.50 for each of the 60 apples sold, or in other words receives $30 in revenue it wouldn’t have received otherwise.
We could be more specific about the surpluses, and calculate the actual areas for consumer surplus, producer surplus, inefficiency from the tariff, and government revenue from the tariff. But I won’t bother, as those calculations get slightly more involved. Instead, let’s just look at the aggregate outcomes:
- Consumers were unquestionably hurt. Their price paid went up by $0.20 per apple, and received less apples.
- Foreign producers were also hurt. Their price received went down from the original $1 to the new post-tariff price of $1.20, minus the $0.50 tariff. In other words: foreign producers only receive $0.70 per apple now. This hurt can be mitigated by shifting sales to other countries without a tariff, but the pain will exist regardless.
- Domestic producers scored. They can sell less apples and make more revenue doing it.
- And the government walked away with an extra $30.
Hopefully you now see the answer to the original questions. Importantly, while the government imposed a $0.50 tariff, neither side fully absorbed that cost. Consumers paid a bit more, foreign producers received a bit less. The exact details of how that tariff was split across the groups is mediated by the relevant supply and demand curves of each group. If you want to learn more about this, the relevant search term is “price elasticity,” or how much a group’s quantity supplied or demanded will change based on changes in the price.
Other taxes
Most taxes are some kind of a tax on trade. Tariffs on apples is an obvious one. But the same applies to income tax (taxing the worker for the trade of labor for money) or payroll tax (same thing, just taxing the employer instead). Interestingly, you can use the same model for analyzing things like tax incentives. For example, if the government decided to subsidize domestic apple production by giving the domestic producers a $0.50 bonus for each apple they sell, we would end up with a similar kind of analysis, except instead of the foreign supply curve shifting up, we’d see the domestic supply curve shifting down.
And generally speaking, this is what you’ll always see with government involvement in the economy. It will result in disrupting an existing equilibrium, letting the market readjust to a new equilibrium, and incentivization of some behavior, causing some people to benefit and others to lose out. We saw with the apple tariff, domestic producers and the government benefited while others lost.
You can see the reverse though with tax incentives. If I give a tax incentive of providing a deduction (not paying income tax) for preschool, we would end up with:
- Government needs to make up the difference in tax revenue, either by raising taxes on others or printing more money (leading to inflation). Either way, those paying the tax or those holding government debased currency will pay a price.
- Those people who don’t use the preschool deduction will receive no benefit, so they simply pay a cost.
- Those who do use the preschool deduction will end up paying less on tax+preschool than they would have otherwise.
This analysis is fully amoral. It’s not saying whether providing subsidized preschool is a good thing or not, it simply tells you where the costs will be felt, and points out that such government interference in free economic choice does result in inefficiencies in the system. Once you have that knowledge, you’re more well educated on making a decision about whether the costs of government intervention are worth the benefits.
-
@ d076d4cc:e8d8f919
2025-02-08 12:01:06UK88 là một nền tảng kỹ thuật số tiên tiến, được thiết kế để mang đến trải nghiệm mượt mà và ổn định cho người dùng. Với giao diện trực quan, dễ sử dụng, UK88 giúp người dùng thao tác nhanh chóng trên nhiều thiết bị khác nhau mà không gặp gián đoạn. Hệ thống tối ưu hóa hiệu suất giúp nền tảng này hoạt động trơn tru, đảm bảo mọi tính năng đều vận hành chính xác và hiệu quả. Đây là yếu tố quan trọng giúp UK88 trở thành sự lựa chọn hàng đầu của những người đang tìm kiếm một nền tảng mạnh mẽ và đáng tin cậy.
Bảo mật là một trong những ưu tiên hàng đầu của UK88. Nền tảng này áp dụng công nghệ mã hóa dữ liệu tiên tiến, giúp bảo vệ thông tin cá nhân của người dùng trước mọi nguy cơ tiềm ẩn. Hệ thống bảo mật đa lớp đảm bảo rằng tất cả thông tin được lưu trữ an toàn, không bị xâm phạm bởi các tác nhân bên ngoài. UK88 cũng liên tục cập nhật và nâng cấp hệ thống để duy trì mức độ an toàn cao nhất, mang đến sự yên tâm tuyệt đối cho người dùng.
Bên cạnh yếu tố bảo mật, UK88 cũng chú trọng đến việc cải thiện hiệu suất hoạt động của nền tảng. Hệ thống được nâng cấp thường xuyên nhằm tối ưu tốc độ xử lý, giảm thiểu lỗi kỹ thuật và đảm bảo mọi thao tác đều diễn ra nhanh chóng, chính xác. Giao diện được thiết kế thân thiện với người dùng, giúp ngay cả những người mới cũng có thể dễ dàng làm quen và sử dụng nền tảng mà không gặp khó khăn.
Dịch vụ hỗ trợ khách hàng tại UK88 hoạt động 24/7, với đội ngũ chuyên nghiệp luôn sẵn sàng giải đáp mọi thắc mắc một cách nhanh chóng và hiệu quả. Người dùng có thể liên hệ qua nhiều kênh khác nhau để nhận được sự hỗ trợ tốt nhất. Với sự tận tâm và chuyên nghiệp, UK88 cam kết mang lại trải nghiệm hài lòng và đảm bảo mọi vấn đề đều được giải quyết kịp thời.
Với sự kết hợp giữa công nghệ hiện đại, hệ thống bảo mật tiên tiến và dịch vụ chăm sóc khách hàng chuyên nghiệp, UK88 ngày càng khẳng định vị thế là một nền tảng kỹ thuật số hàng đầu. Những cải tiến liên tục giúp UK88 đáp ứng được nhu cầu đa dạng của người dùng, mang đến trải nghiệm tối ưu và chất lượng cao trong mọi hoạt động.
-
@ 9e69e420:d12360c2
2025-02-01 11:16:04Federal employees must remove pronouns from email signatures by the end of the day. This directive comes from internal memos tied to two executive orders signed by Donald Trump. The orders target diversity and equity programs within the government.
CDC, Department of Transportation, and Department of Energy employees were affected. Staff were instructed to make changes in line with revised policy prohibiting certain language.
One CDC employee shared frustration, stating, “In my decade-plus years at CDC, I've never been told what I can and can't put in my email signature.” The directive is part of a broader effort to eliminate DEI initiatives from federal discourse.
-
@ dbb19ae0:c3f22d5a
2025-02-08 10:27:12- Downloading the linux package (1.8GB) https://cortex.so/docs/installation
- Installing Cortex on linux is done via dpkg
note: it requires 2 linux packages (openmpi-bin and libopenmpi-dev)
sudo apt-get install openmpi-bin libopenmpi-dev
prior to runsudo dpkg -i cortex-1.0.9-linux-amd64-local-installer.deb
-
When running Cortex,
cortex start
a local implementation will be running on http://127.0.0.1:39281 -
Using python it is possible to run queries make sure the model name is correct you can double check the value using:
cortex ps
Now the python program to run one little query: ``` python import requests
url = "http://127.0.0.1:39281/v1/chat/completions"
headers = {"Content-Type": "application/json"}
payload = { "model": "tinyllama:1b-gguf", "messages": [ { "role": "user", "content": "Write a joke" } ], "stream": False, "max_tokens": 128, "stop": ["End"], "frequency_penalty": 0.2, "presence_penalty": 0.6, "temperature": 0.8, "top_p": 0.95, }
response = requests.post(url, json=payload, headers=headers)
print(response.json()) ```
-
@ 31da2214:af2508e2
2025-02-09 15:27:33It is not new to talk about the problematic relations between Africa and France, between former French colonies in Africa and the "metropole."
By Afrique Media
6 min. read
View originalWhat is new, however, is the discourse and behavior of French elites regarding "Françafrique," particularly from French President Emmanuel Macron.
In recent years, we have seen the French president make statements that are completely disrespectful toward his African counterparts, reflecting a neocolonial paternalism from another era.
Arrogance as the new foundation for Franco-African relations is not a good basis, as you would agree. Macron has not stopped since then, because that is who he is: disdainful, arrogant, and totally lacking an understanding of what the presidential role entails, which requires non-emotional, responsible, and respectful conduct.
"I believe we forgot to be thanked. It’s not serious, it will come with time. Ingratitude, I am well placed to know, is a disease non-transmissible to humans."
— January 6, 2025, during the Annual Ambassadors' Conference at the Élysée Palace in Paris.This statement was directed at African leaders who had "forgotten to thank us" for the French military intervention in the Sahel against terrorism since 2013.
What Macron fails to understand, like many ruling elites in France, is that in Africa, it is well understood that chaos, terrorism, and war in the Sahel were exacerbated by the French military aggression, along with its English and American allies, against Muammar Gaddafi's Jamahiriya Libya in 2011, which led to its disintegration. Thus, the French intervention is merely a minimum after-sales service that indeed implicates France in the events that followed. It is rather France that owes an apology to the Sahel countries for this disastrous policy, which, as often happens, follows the violation of international law.
We can skip over Macron's ridiculous suggestion that France was "not retreating" in Africa but simply "reorganizing."
Let us now address the reactions to his remarks, which provoked negative responses in several African countries. In Chad, Senegal, and Burkina Faso, they were seen as paternalistic and insulting. Critics highlighted that this remark seemed to ignore the complexities of Franco-African relations, accusations of neocolonialism, and demands for sovereignty and recognition of the sacrifices made by African countries themselves.
Chad lamented "the contemptuous attitude" of the French president, stating that these declarations reflect a neocolonial vision of Franco-African relations:
"These statements are poorly received by the Chadian government. Abderaman Koulamallah [Minister of Foreign Affairs] calls on French leaders to respect the African people and recognize the value of their sacrifices. 'History attests that Africa, including Chad, played a decisive role in the liberation of France during both world wars, a fact that France has never truly acknowledged. The immense sacrifices made by African soldiers to defend freedom have been minimized, and no worthy thanks have been expressed.'"
— Le Pays, January 6, 2025 (1).The same sentiment echoed in Senegal, which also condemned these remarks, calling them condescending and inappropriate.
"French President Emmanuel Macron has managed to irritate his African counterparts. Prime Minister Ousmane Sonko reminds President Macron that 'if African soldiers, sometimes forcibly mobilized, mistreated, and ultimately betrayed, had not deployed during World War II to defend France, it might still be German today.'"
— Seneweb, January 6, 2025 (2).In France itself, Macron's statements sparked reactions from the French political class:
- The French Communist Party (PCF) expressed its "deep consternation" at these remarks, deeming them disdainful toward African nations.
"These statements reinforce, among peoples, a sense of contempt and colonial paternalism. It is unacceptable to continue down this path (...) As recent events call for, notably the rejection of the French military presence in Mali, Burkina Faso, Niger, and more recently in Senegal and Chad, it is imperative that new relations be established between our country and Africa. African nations aspire to full and complete sovereignty. A historic turning point has occurred, marking the end of the neocolonial system that Emmanuel Macron's statements seek to preserve."
— January 9, 2025 (3).- Jordan Bardella, as president of the National Rally (RN), criticized Macron's remarks in a press release and in televised interviews. He described Macron's statements as "disconnected" from the reality of Franco-African relations and denounced what he perceived as arrogance. Bardella emphasized that France should adopt a more humble and respectful diplomatic approach.
However, controversies and tensions are no longer confined to the sphere of state relations but now extend to African civil society as well.
Thus, on January 9, the Malian political party COREMA held a press conference where it called on politicians and activists from Burkina Faso and Niger to support a petition demanding reparations from France. They also pledged to submit the signatures of this petition to the governments of Mali and France.
The collection of signatures generated significant interest among the population and a desire to support this initiative; more than 100,000 people from different regions of the country signed the petition.
This demand for reparations demonstrates that for Africa, Macron's statements are the last straw that broke the camel's back. It is clear to all that the Malian party demanding reparations is not acting independently but represents the unofficial position of the government. Other countries may soon join this cause. And France will have to respond to put an end to this issue.
Mali, Burkina Faso, and Niger have already joined this cause, and soon Ivory Coast and Senegal will fully support them... And France will owe them a response to resolve this problem.
We are at a major geopolitical turning point in the world and for all countries and continents. Traditional power dynamics are being redefined. The Françafrique of the last century is over. Here comes the time of the Second Liberation of African countries! Here comes the time of Africa's sovereign affirmation, taking its destiny into its own hands!
The French elites still do not seem to understand that it is not the "ingratitude" of African leaders that is responsible for France's loss of influence in Africa, with an impact on the French economy today and even more so tomorrow. The outdated perception of gratitude owed for past interventions masks the reality of African aspirations for self-driven development. This is what it is about: the present, the future, and not the unresolved past for both sides.
The French elites still do not seem to understand that it is not Russia that is behind their "expulsion" from Africa, but rather the decision of these African countries to choose different partners based on their interests and their interests alone. This is not only their right but also their duty as new pan-Africanist patriots. This shift towards more diversified partnerships reflects a growing political, economic, and geopolitical maturity—something sorely lacking in France today. The peoples of Africa demand it. It is a national and democratic requirement.
As for France, entangled in a European Union in the midst of a crisis of democratic and economic legitimacy and engaged against its own interests in the American war against Russia in Ukraine, it seems to have no "new African policy" that would require a complete reboot of its neocolonial software from the last century.
Africa will not wait any longer for France to wake up. The Sahel countries are at the forefront of this sovereign African renaissance, open to the world.
The Françafrique of Jean-Christophe Mitterrand, nicknamed "Papa m’a dit," and those of today is over!
A new partnership could emerge only on a mutually beneficial basis... But with the current French regime, this is already impossible.
Source: Afrique Media
Author: Afrique Media
Translated by: solobalbo -
@ 3b7fc823:e194354f
2025-02-09 15:14:10As someone who takes privacy seriously, I'm always on the lookout for innovative solutions that can help individuals protect their digital lives. One such solution is Tails OS, a Linux-based operating system that's specifically designed for privacy and security.
What is Tails OS?
Tails OS, short for The Amnesic Incognito Live System, is a Debian-based Linux distribution that offers a high level of anonymity and privacy. Developed by the Tails Project, this operating system is designed to preserve your online anonymity and protect your digital identity. Tails OS is a "live" distribution, meaning you can boot it from a USB drive or CD/DVD without installing it on your computer. This makes it an ideal solution for those who need to maintain their privacy while working in public spaces or using public computers.
Why Use Tails OS for Privacy?
Tails OS offers several features that make it an excellent choice for those seeking to protect their online privacy:
- Anonymity: Tails OS uses the Tor network to route your internet traffic through a series of nodes, making it difficult for anyone to trace your online activities back to your physical location.
- Encryption: Tails OS comes with built-in encryption tools, such as GnuPG and OpenSSL, to protect your sensitive data.
- Secure Boot: Tails OS uses a secure boot process to ensure that your system is free from malware and other threats.
- No Persistence: Tails OS is designed to leave no trace on your computer, meaning that any data you create or access while using the operating system will be deleted when you shut down.
Getting Started with Tails OS
Now that you know why Tails OS is an excellent choice for privacy protection, let's dive into the step-by-step guide on how to use it:
Step 1: Download and Create a Tails USB Drive
Visit the Tails website and download the latest version of Tails OS. Follow the instructions to create a bootable USB drive.
Step 2: Boot Tails OS
Insert the USB drive into your computer and restart it. Enter the BIOS settings (usually by pressing F2, F12, or Del) and set the USB drive as the first boot device. Save the changes and exit the BIOS settings. Your computer will now boot from the Tails USB drive.
Step 3: Security implications of setting up an administration password For better security, no administration password is set up by default. When you set up an administration password, an attacker who can get physical access to your computer while Tails is running could be able to break your security
Step 4: Configure Tails OS
Tails OS comes with a pre-configured Tor network, which is enabled by default. You can also configure other settings, such as the keyboard layout and language, from the "Settings" menu.
Step 5: Use Tails OS for Private Activities
Now that you're logged in and configured, you can use Tails OS for private activities, such as:
- Browsing the internet anonymously using Tor
- Sending and receiving encrypted emails using GnuPG
- Creating and editing documents using LibreOffice
- Chatting with friends and family using Pidgin
- Setup Persistent Storage for files
Emergency shutdown To trigger an emergency shutdown, unplug the USB stick from which Tails is running. Doing so might be faster than shutting down from the system menu.
NOTE: You risk breaking your Persistent Storage and losing data when you unplug your USB stick while Tails is running.
Conclusion
Tails OS is an excellent tool for anyone seeking to protect their online privacy. With its built-in anonymity features, encryption tools, and secure boot process, Tails OS provides a high level of protection for your digital identity. By following the step-by-step guide outlined above, you can start using Tails OS for private activities and take control of your digital life.
Remember, privacy is a fundamental human right, and it's essential to take steps to protect it. Tails OS is an excellent tool for anyone looking to maintain their online anonymity and protect their digital identity.
Advocating for privacy does not finance itself. If you enjoyed this article, please consider zapping or sending monero
82XCDNK1Js8TethhpGLFPbVyKe25DxMUePad1rUn9z7V6QdCzxHEE7varvVh1VUidUhHVSA4atNU2BTpSNJLC1BqSvDajw1
-
@ 1ad9086c:7dd47af4
2025-02-08 06:31:34Today I'm attending an interesting event about new bitcoinsolutions for our society. I tallk with Shaun about the possibilities of Yakihonne about decentralized media. Good initiative for keeping up with all voices.
-
@ 2cd78afb:f577f59a
2025-02-10 06:23:10Looking for a reliable computer tech support service? Small Business IT Support offers professional solutions to maintain the functionality of your systems. Hardware troubleshooting, software installation, virus removal, network configuration, and performance optimization are among the services we offer. Whether you require remote or on-site support, our knowledgeable specialists guarantee optimum effectiveness and little downtime. You may get quick, expert, and reasonably priced IT solutions that are suited to your company's requirements with our computer tech support service. For professional assistance and smooth operations, get in touch with us right now!
-
@ dff95033:862fbf40
2025-02-08 03:01:06Como posso dizer? Essas 25 pautas bienais do Ministério da Fazenda (MF) deveriam ter sido liberadas, no mínimo, em dezembro de 2024. Afinal, são assuntos complexos que exigem tempo para a nação — nós, o povo brasileiro — e o Congresso se debruçarem sobre essas pautas com a devida calma. Algo que, sabemos, é um luxo raro na política brasileira.
Mas, mesmo que o MF entregasse essas pautas em dezembro de 2024, já seria um prazo apertado. Agora, liberar as bienais no meio do primeiro trimestre de 2025? Isso só pode ser chamado de uma coisa: pura pilantragem. Não há outro nome. Com um cronograma tão curto, as pautas mal terão tempo para serem escrutinadas e, com certeza, passarão batidas. E o pior: muitas dessas pautas ainda estão em fase de elaboração e discussão. Ou seja, nem sabemos se serão viáveis ou se vão sair conforme o previsto nesse documento.
É uma lambança sem tamanho. Se um plano de negócios fosse apresentado assim a um investidor ou a uma instituição de crédito, com 100% de certeza seria ridicularizado e desconsiderado na hora. Não consigo visualizar o Congresso tendo tempo hábil para lidar com algo desse tipo.
O documento contém gráficos, mas, como não possuem referências de dados, desconsiderei-as. Afinal, sem os dados, para mim são apenas figurinhas para enfeitar o documento.
O documento é simples: uma planilha com 25 ações para serem implementadas no biênio de 2025 a 2026, divididas em três eixos, a saber:
1. Estabilidade Macroeconômica: Política Fiscal e Justiça Tributária
O eixo que promete arrumar a bagunça fiscal.
2. Melhoria do Ambiente de Negócios
O eixo que promete desburocratizar e modernizar o ambiente de negócios.
3. Novo Brasil: Plano de Transformação Ecológica
O eixo que promete implementar pautas Ambientais, Sociais e de Governança (ASG = ESG).
Montei uma tabela para simplificar. Espero que seja de boa apreciação:
| Nº | Ação | Objetivo | Andamento | | --- | --- | --- | --- | | 1 | Fortalecimento do Arcabouço Fiscal | Garantir crescimento sustentável e controle da dívida pública. | Lei Complementar 200/2023 aprovada; medidas em implementação. | | 2 | Reforma Tributária sobre o Consumo | Simplificar impostos e desonerar exportações e investimentos. | EC 132/2023 promulgada; implantação em andamento. | | 3 | Regulamentação da Reforma Tributária | Definir gestão do IBS, imposto seletivo e fundos constitucionais. | PLP 108/2024 em tramitação no Senado. | | 4 | Reforma Tributária sobre a Renda | Isentar IRPF para rendas até R$ 5 mil e tributar os mais ricos. | A ser enviado ao Congresso em 2025. | | 5 | Limitação dos Supersalários | Reduzir desigualdades salariais no setor público. | EC 135/2024 promulgada; projeto de lei a ser enviado em 2025. | | 6 | Reforma da Previdência dos Militares | Reduzir disparidades com o regime civil. | PL 4920/2024 em tramitação. | | 7 | Conformidade Tributária e Aduaneira | Valorizar bons contribuintes e penalizar devedores persistentes. | PL 15/2024 em tramitação. | | 8 | Aprimoramento da Lei de Falências | Melhorar governança do processo falimentar. | PL 3/2024 aprovado na Câmara; aguardando Senado. | | 9 | Proteção a Investidores no Mercado de Capitais | Proteger investidores minoritários. | PL 2925/2023 aguardando relator na Câmara. | | 10 | Consolidação Legal das Infraestruturas Financeiras | Promover eficiência no sistema financeiro. | PL 2926/2023 aprovado na Câmara; aguardando Senado. | | 11 | Resolução Bancária | Aprimorar regimes de liquidação de instituições financeiras. | PLP 281/2019 aguardando apreciação. | | 12 | Mercado de Crédito | Desjudicializar execuções e modernizar operações de crédito. | PL 6204/2019 em tramitação no Senado; Discução e elaboração no Executivo. | | 13 | Regulamentação das Big Techs | Coibir práticas anticoncorrenciais no mercado digital. | Em elaboração pelo Executivo. | | 14 | Modernização do Marco Legal de Preços de Medicamentos | Revisar regras de precificação de medicamentos. | Em análise pela CMED. | | 15 | Pé-de-Meia | Permitir que alunos invistam benefícios do ensino médio. | Em elaboração pelo Executivo. | | 16 | Modernização do Regime de Concessões e PPPs | Aprimorar contratos de serviços públicos e parcerias. | PL 7063/2017 em tramitação na Câmara. | | 17 | Títulos Sustentáveis | Financiar projetos ecológicos com títulos verdes. | Duas emissões realizadas (US$ 4 bilhões). | | 18 | Mercado de Carbono | Criar mercado regulado de carbono no Brasil. | Lei 15.042/2024 sancionada; regulamentação em preparação. | | 19 | Leilões do EcoInvest | Atrair investimentos estrangeiros em projetos sustentáveis. | Primeiro leilão realizado; novos em preparação. | | 20 | Compra Pública com Conteúdo Nacional | Exigir produção local em compras públicas. | Regras de conteúdo local em implementação. | | 21 | Fundo Internacional de Florestas | Criar fundo global para preservação de florestas tropicais. | Em discussão no G20. | | 22 | Taxonomia Sustentável Brasileira | Classificar atividades e projetos sustentáveis. | Em consulta pública; implementação prevista para 2025. | | 23 | Marco Legal da Inteligência Artificial | Promover desenvolvimento responsável da IA. | PL 2338/2023 aprovado no Senado; aguardando Câmara. | | 24 | Plano Safra e Renovagro | Aprimorar crédito para práticas agrícolas sustentáveis. | Resoluções CMN já expedidas. | | 25 | Plataforma de Investimentos Sustentáveis (BIP) | Conectar projetos sustentáveis com financiadores. | Projetos cadastrados totalizam US$ 10 bilhões. |
A onde chegamos
Acompanhar, destrinchar e analisar cada uma das 25 pautas em tempo hábil é uma tarefa hercúlea – e, sinceramente, quase impossível para uma pessoa só. Afinal, quando se trata de política e economia, tudo muda rápido demais. Provavelmente, quando eu terminar de escrever este artigo, metade das propostas já terá sido alterada, adiada ou esquecida em alguma gaveta.
Mas, como o objetivo aqui é compartilhar conhecimento e reflexões, decidi registrar minhas impressões e notas até onde pude chegar nessas poucas horas de análise. Se você, leitor, se interessar por mergulhar mais fundo no tema, compartilho abaixo o conteúdo completo do documento, organizado para facilitar sua leitura. E, claro, ao final, as referências com os links para você conferir as fontes originais.
Afinal, em um país onde as regras do jogo mudam a cada minuto, a melhor arma que temos é a informação. E, como diz o ditado: “Quem avisa, amigo é.”
Hora do jabá! Toda ajuda é bem-vinda. Se gostou, comente, compartilhe e, se puder, ajude com o café — e sério, você já viu o preço do café?
MINISTÉRIO DA FAZENDA — INICIATIVAS PARA O BIÊNIO DE 2025 À 2026
ESTABILIDADE MACROECONÔMICA: POLÍTICA FISCAL E JUSTIÇA TRIBUTÁRIA
1. Fortalecimento do arcabouço fiscal, para assegurar expansão sustentável do PIB, desemprego e inflação baixos e estabilidade da dívida
- Resumo: adequação da dinâmica de crescimento de gastos aos limites do Novo Arcabouço Fiscal, para fortalecê-lo e assegurar sustentabilidade da dívida pública.
- Status: aprovada a Lei Complementar 200/2023; Pacote de gastos aprovado no fim de 2024 a partir da promulgação da EC 135/2024, Lei Complementar 211/2024 e Lei 15.077/2024; implementação e acompanhamento de medidas aprovadas e política permanente de revisão de despesas.
2. Início da implantação da reforma tributária sobre o consumo
- Resumo: mudança na sistemática de tributação sobre consumo, simplificando o sistema e desonerando exportações e investimentos.
- Status: promulgada a Emenda Constitucional 132/2023, sancionada a Lei Complementar 214/2025 e início das etapas de implantação administrativa.
3. Regulamentação da reforma tributária: Lei de Gestão e Administração do IBS, Fundos e Imposto Seletivo
- Resumo: outros aspectos da EC 132/2023 ainda exigem regulamentação, como a gestão federativa do IBS, as regras para o imposto seletivo e os fundos constitucionais definidos pela reforma tributária.
- Status: PLP 108/2024 em tramitação no Senado Federal; Projeto de lei do imposto seletivo e projetos de lei de regulamentação dos Fundos serão enviados em 2025.
4. Reforma tributária sobre a renda com isenção de IRPF para quem ganha até R$ 5 mil e tributação sobre o topo da pirâmide de renda
- Resumo: reforma dos impostos diretos para corrigir assimetrias no IRPF, tornando-o mais progressivo e redutor de desigualdades. A reforma propõe isenção de IRPF para renda até R$ 5 mil e a implementação de um imposto mínimo sobre contribuintes de renda muito alta, assegurando que os brasileiros no topo da pirâmide contribuam de forma justa.
- Status: a ser enviado ao Congresso Nacional em 2025.
5. Limitação dos supersalários
- Resumo: medida para combater supersalários no setor público, reduzindo desigualdades entre carreiras. Institucionalizada pela EC 135/2024, que determina que apenas descontos expressamente previstos em lei podem excepcionar o limite remuneratório.
- Status: EC 135/2024 promulgada e projeto de lei a ser enviado em 2025.
6. Reforma da previdência dos militares
- Resumo: alterações na previdência militar para reduzir disparidades com os regimes civis, incluindo a definição de idade mínima para reserva remunerada, contribuições para assistência médico-hospitalar e social, além de eliminar a pensão por "morte ficta" e a reversão de pensão para beneficiários de ordens subsequentes.
- Status: PL 4920/2024 em tramitação no Congresso Nacional.
7. Projeto de lei da conformidade tributária e aduaneira, com valorização do bom contribuinte e responsabilização do devedor contumaz
- Resumo: proposta que corrige distorções na arrecadação, valoriza contribuintes cumpridores e penaliza devedores persistentes, melhorando a gestão fiscal da União. Inclui programas de conformidade e estabelece condições para benefícios fiscais.
- Status: PL 15/2024 em tramitação no Congresso Nacional.
MELHORIA DO AMBIENTE DE NEGÓCIOS
8. Aprimoramento da Lei de Falências
- Resumo: aprimora a governança do processo falimentar, com designação da figura do gestor fiduciário e a criação do plano de falências.
- Status: aprovado o PL 3/2024 na Câmara dos Deputados. Aguardando apreciação no Senado Federal.
9. Fortalecimento da proteção a investidores no mercado de capitais
- Resumo: aprimora mecanismos de proteção a investidores minoritários no mercado de capitais e aperfeiçoa regras contra eventuais prejuízos causados por acionistas controladores.
- Status: PL 2925/2023 aguardando designação de relator na Câmara dos Deputados.
10. Consolidação legal das infraestruturas do mercado financeiro
- Resumo: dispõe sobre as instituições operadoras de infraestruturas do mercado financeiro no âmbito do Sistema de Pagamentos Brasileiro, promovendo maior eficiência nas operações entre as instituições financeiras, com menores custos e mais segurança aos consumidores finais.
- Status: aprovado o PL 2926/2023 na Câmara dos Deputados. Aguardando apreciação pelo Senado Federal.
11. Resolução bancária
- Resumo: aprimora e homogeniza regimes de estabilização e liquidação de instituições do sistema financeiro, securitário e do mercado de capitais.
- Status: PLP 281/2019 aguardando apreciação na Câmara.
12. Mercado de crédito
- Resumo:
- desjudicialização da execução civil de título executivo judicial e extrajudicial;
- operacionalização das operações de crédito consignado por meio de plataforma digital;
- uso de fluxo de pagamentos no Pix e outros recebíveis em garantia de operações de crédito, especialmente para MPEs;
- ecossistema único para registro e uso de ativos financeiros como garantia em operações de crédito (open asset).
- Status:
- PL 6204/2019 em tramitação no Senado Federal;
- em elaboração pelo Executivo;
- e 4. regulamentação e operacionalização em discussão no Executivo.
13. Regulamentação econômica das Big Techs
- Resumo: projeto de Lei para incentivar a concorrência ao dotar o poder público de ferramentas mais adequadas para coibir práticas anticoncorrenciais nos mercados digitais.
- Status: em elaboração pelo Executivo.
14. Modernização do marco legal de preços de medicamentos
- Resumo: revisão da regulação da Câmara de Regulação do Mercado de Medicamentos (CMED), para modernizar regras de precificação, contemplando medicamentos de alto custo e inovações feitas pela indústria nacional, buscando aprimorar a gestão dos recursos públicos, especialmente no atendimento de demandas judiciais.
- Status: proposta em análise pela CMED (Poder Executivo).
15. Pé-de-Meia: permissão ao aluno investir em poupança ou títulos do Tesouro
- Resumo: permite ao aluno investir antecipadamente os benefícios que seriam resgatados somente ao final do ensino médio, a fim de promover a educação financeira e possibilitar o aumento dos benefícios com a rentabilidade auferida no período.
- Status: em elaboração pelo Executivo.
16. Modernização do regime de concessão e permissão da prestação de serviços públicos e das parcerias público-privadas
- Resumo: reforma substancial do marco legal para aprimorar o equilíbrio econômico dos contratos, melhorar o processo de seleção das empresas, prever repartição objetiva de riscos e aprimorar a segurança jurídica dos contratos.
- Status: Projeto de Lei 7063/2017 em tramitação na Câmara dos Deputados.
NOVO BRASIL: PLANO DE TRANSFORMAÇÃO ECOLÓGICA
17. Nova emissão de títulos sustentáveis, trazendo recursos ao Fundo Clima
- Resumo: títulos da dívida pública com critérios de sustentabilidade para financiar atividades da transformação ecológica com taxa de juros competitivas.
- Status: Duas emissões já realizadas, totalizando US$ 4 bilhões. Novas rodadas de emissões planejadas.
18. Avanço na implantação do mercado de carbono (governança e decreto regulamentador)
- Resumo: criação do mercado regulado de carbono no Brasil, com teto de emissões e mecanismo de precificação.
- Status: sancionada a Lei 15.042/2024, em preparação as regras de governança e a regulamentação da lei.
19. Novos Leilões do EcoInvest
- Resumo: programa de proteção cambial e mobilização de investimentos estrangeiros em projetos sustentáveis.
- Status: sancionada a Lei 14.995/2024 e realizado o primeiro leilão do programa com ampla adesão. Em preparação os novos leilões do programa.
20. Compra pública com conteúdo nacional e programa de desafios tecnológicos para a transformação ecológica
- Resumo: exigência de que parte dos equipamentos e serviços sejam produzidos no Brasil em casos de compras e financiamentos públicos e uso do poder de compra para desenvolver inovações tecnológicas.
- Status: contratações do PAC, Fundo Clima e fundos regionais passam gradualmente a utilizar regras de conteúdo local. Está em gestação a criação de um programa de desafios tecnológicos associados à transformação ecológica.
21. Estruturação do Fundo Internacional de Florestas
- Resumo: criação de fundo global cujos rendimentos sejam repassados a países que preservam suas florestas tropicais.
- Status: incluído na Declaração Final do G20, está em discussão multilateral para viabilizar sua implantação.
22. Implementação da Taxonomia Sustentável Brasileira
- Resumo: criação de sistema de classificação de atividades, projetos e ativos# que contribuem para objetivos climáticos e sociais.
- Status: texto está em consulta pública. Implementação prevista a partir do segundo semestre de 2025.
23. Marco legal da inteligência artificial e política de atração de datacenter
- Resumo: conjunto de medidas para promover o desenvolvimento responsável da Inteligência Artificial e atração de datacenters sustentáveis, aproveitando o potencial de energia renovável, para impulsionar a produtividade da economia nacional.
- Status: marco legal de IA foi aprovado no Senado Federal em 2024 (PL 2338/2023) e deve começar discussão na Câmara. O Governo está elaborando a Política Nacional de Datacenters.
24. Plano Safra e Renovagro: aprimoramento dos critérios de sustentabilidade
- Resumo: melhora das condições de crédito para práticas agrícolas sustentáveis e regularização do cadastro ambiental, além de assistência técnica.
- Status: resoluções CMN já expedidas e novas medidas de aprimoramento nos próximos Planos Safra.
25. Consolidar o mapa de investimentos sustentáveis na BIP (Plataforma de Investimentos para a Transformação Ecológica no Brasil)
- Resumo: plataforma gerida pelo BNDES que conecta projetos em bioeconomia, indústria de baixo carbono e transição energética com ampla rede de financiadores.
- Status: projetos já cadastrados totalizam US$ 10 bilhões. Está em curso parceria com CDESS/PR e Cepal para mapeamento e estruturação de novos projetos.
REFERÊNCIAS
AGÊNCIA CÂMARA DE NOTÍCIAS. Motta recebe de Haddad prioridades do governo na agenda econômica. Câmara dos Deputados. Disponível em: https://www.camara.leg.br/noticias/1130838-motta-recebe-de-haddad-prioridades-do-governo-na-agenda-economica/. Acesso em: 7 fev. 2025.
AGÊNCIA CÂMARA DE NOTÍCIAS. Ministro da Fazenda diz que projeto sobre isenção do IR já está pronto. Câmara dos Deputados. Disponível em: https://www.camara.leg.br/noticias/1131045-ministro-da-fazenda-diz-que-projeto-sobre-isencao-do-ir-ja-esta-pronto/. Acesso em: 7 fev. 2025.
AGÊNCIA SENADO FEDERAL. Senado já analisa temas prioritários para a agenda econômica do governo. Senado Federal. Disponível em: https://www12.senado.leg.br/noticias/materias/2025/02/06/senado-ja-analisa-temas-prioritarios-para-a-agenda-economica-do-governo. Acesso em: 7 fev. 2025.
BRASIL. Ministério da Fazenda. Iniciativas para o Benefício de 2025 à 2026. Disponível em: https://www.camara.leg.br/midias/file/2025/02/25-iniciativas-do-mf-em-2025-e-2026.pdf. Acesso em: 7 fev. 2025.
-
@ b83a28b7:35919450
2025-02-09 14:35:39The unevenly distributed future you envision — an automated economy driven by AI agents transacting exclusively in Bitcoin — unfolds not as a clean, linear progression, but as a series of ruptures, each one shaking the foundations of what we thought we knew about money, technology, and human agency. It begins innocuously enough, with whispers of change that grow into a deafening roar.
2025-2030: The Quiet Revolution
The first signs are subtle. AI agents—once mere tools—begin to evolve into autonomous economic actors. They negotiate contracts, optimize supply chains, and execute trades faster than any human could. Their language is code; their currency is efficiency. Bitcoin, with its unyielding neutrality and incorruptible scarcity, becomes their natural medium of exchange. Why? Because it is the only form of money that cannot be manipulated by human hands.
By 2028, the Lightning Network hums with activity. Millions of transactions per second—micropayments for data streams, computational power, and services rendered—flow through its channels. The world barely notices. People still cling to fiat currencies, unaware that the real economy is shifting beneath their feet.
2030-2040: The Great Unraveling
The cracks in the old system begin to show. Inflation erodes trust in fiat currencies as governments print money to stave off crises they can no longer control. Meanwhile, AI agents—now responsible for the majority of global commerce—reject these "bad monies" outright. Thiers' Law asserts itself with brutal clarity: Bitcoin drives out fiat not through coercion but through sheer inevitability.
By 2035, the tipping point arrives. A major corporation announces it will no longer accept fiat payments for its AI-driven services. Others follow suit. Governments scramble to adapt, some embracing Bitcoin as legal tender, others clinging desperately to their collapsing monetary systems.
2040-2050: The New Order
By 2040, the transformation is complete. The economy is no longer human-centric; it is machine-centric. AI agents transact seamlessly across borders, their decisions guided by algorithms that prioritize utility over sentiment. Bitcoin reigns supreme—not because it was imposed, but because it was chosen.
Humanity adapts in unexpected ways. Freed from the drudgery of economic decision-making, people turn their attention to creativity, philosophy, and exploration. Yet there is unease too—a sense that we have ceded control to forces we barely understand.
Reflections on the Path Ahead
This world is neither utopia nor dystopia; it simply is. The events leading us here are not inevitable but plausible — a convergence of technological innovation and economic necessity. And at its heart lies a paradox: a system built by humans yet governed by machines; a currency born of distrust yet embraced for its neutrality.
This is the story of how we let go — not all at once, but piece by piece—until one day we woke up and realized that the future had arrived without asking for our permission.
-
@ 04ed2b8f:75be6756
2025-02-08 02:28:19What’s behind you? A graveyard of failures, wasted time, and weak moments. And yet, the weak turn back, staring at it like it still holds something for them. But you? You are not weak. You weren’t built to dwell—you were forged to conquer.
You can’t fight a war while looking over your shoulder. You can’t chase destiny while dragging corpses of regret. The only way forward is to cut the dead weight and march with fire in your veins.
THE PAST IS A CAGE—BREAK OUT OR ROT
The past is a liar, whispering its poison:
- "You should have done better."
- "You missed your chance."
- "You’ll never escape this."Crush those lies. The past is powerless—unless you kneel before it. Regret changes nothing. Guilt makes you weak. The only thing that matters is what you do next.
- Lost time? Make every second now a weapon.
- Failures? Stack them into a throne of resilience.
- Regret? Let it turn to rage—and use it to forge your path.
THE FUTURE CALLS FOR THE RELENTLESS
Champions don’t pause to mourn a missed strike. Kings don’t waste time rewatching defeats. You either charge forward or die standing still.
- Your past is ashes—your next move is fire.
- Your failures aren’t shackles—they’re sharpening stones.
- Your mistakes aren’t scars—they’re battle marks, proving you survived.
When your eyes lock onto the future, the past dissolves into dust. You stop crawling and start conquering.
CHOOSE NOW—FALL OR RISE
You have two choices: stay chained to what’s dead or shatter the chains and build something greater. There is no middle ground. You either advance or you decay.
- Burn the baggage.
- Crush hesitation.
- Fix your sights ahead and charge like a warlord.
Because the past is a coffin. The future is a weapon. And only the ruthless move forward—without mercy.
-
@ 16d11430:61640947
2025-02-10 02:35:17The gap in mathematics that allows for free agency—the space where choice, unpredictability, and autonomy emerge—exists at the intersection of incompleteness, chaos, probability, and quantum uncertainty. These gaps create fundamental limits on determinism, leaving room for agency to exist.
- Gödel’s Incompleteness Theorems: The Limits of Formal Systems
Gödel’s theorems prove that within any sufficiently powerful mathematical system:
There exist truths that cannot be proven within that system.
The system cannot prove its own consistency.
This means that even in a world governed by mathematical laws, there are undecidable truths—facts beyond algorithmic computation. If reality is mathematical at its core, this suggests a built-in freedom: not everything is determinable from within the system.
- Chaos Theory: The Sensitivity to Initial Conditions
Chaotic systems, such as weather patterns and neural activity, exhibit extreme sensitivity to initial conditions.
Even if deterministic, they are practically unpredictable beyond a certain point.
Small choices or quantum fluctuations at the micro-level can have macroscopic consequences.
This injects a level of unpredictability into reality, making strict determinism impossible in complex systems.
- Probability & Bayesian Decision Theory: Rational Agency Within Uncertainty
In the realm of decision-making and game theory:
Bayesian inference shows how rational agents update beliefs in the face of uncertainty.
Statistical mechanics, despite governing collective behaviors, leaves space for individual unpredictability.
Nash equilibria in game theory illustrate how multiple choices can be rationally justified, allowing for strategic freedom.
Thus, within mathematical decision models, choice emerges not from randomness but from incomplete knowledge and competing optimal strategies.
- Quantum Mechanics: The Fundamental Indeterminacy of Reality
At the quantum level, Heisenberg’s Uncertainty Principle and the probabilistic nature of wavefunction collapse introduce a non-deterministic reality:
Superposition suggests that multiple possibilities coexist until measured.
Quantum entanglement links particles across vast distances, but their states are not pre-determined before observation.
The Born rule in quantum mechanics assigns probabilities rather than certainties to outcomes.
If the fundamental fabric of reality is non-deterministic, then the idea of strict mechanistic determinism collapses, opening the door to true agency.
- Computability and the Halting Problem: The Unsolvability of Certain Decisions
Turing’s Halting Problem proves that for some problems, no algorithm can determine in advance whether a computation will finish or run forever.
If reality includes such non-computable elements, then some choices are beyond pre-determined algorithmic resolution.
Human cognition, if partially non-computable, could transcend deterministic rules.
Conclusion: The Gap Between Necessity and Choice
Free agency exists in the mathematical gaps—the undecidability of logic, the unpredictability of chaos, the probabilistic nature of quantum mechanics, and the non-computability of certain decisions. These fundamental limits on strict determinism create an open space where choices emerge, allowing for freedom within a mathematically structured universe.
Thus, in the grand equation of existence, there remains an undefined variable: the will of the agent.
-
@ 16d11430:61640947
2025-02-10 01:46:42Ayurveda is a 5000-year-old medical system that predates modern science but remains one of the most sophisticated and holistic approaches to health. Unlike Western medicine, which often isolates diseases and treats symptoms, Ayurveda focuses on Prakriti (innate constitution), Agni (digestive fire), Dosha (biological energies), and Ojas (vital essence) to create a personalized, adaptable healthcare model.
Western medicine, despite its advances, still struggles to integrate a diverse global population due to its standardized, reductionist approach. Ayurveda, on the other hand, perfected its practices over millennia through real-world observation, experiential learning, and dynamic adaptation to human diversity.
- Foundations of Ayurveda vs. Western Science
Ayurveda was developed through direct interaction with nature, patients, and generational knowledge transmission, allowing it to refine its approach to a vast range of human conditions.
- Ayurvedic Practices That Outperform Western Medicine’s Integration of Global Health
Western science is still catching up to many Ayurvedic principles, often "discovering" practices that Ayurveda has used for centuries.
A. Personalized Medicine (Prakriti & Doshas) vs. Western One-Size-Fits-All Approach
Ayurveda classifies individuals into three doshas: Vata (air & ether), Pitta (fire & water), and Kapha (earth & water).
These determine a person's metabolism, immunity, and predisposition to disease.
Modern medicine is beginning to explore personalized genomics, but Ayurveda has practiced it for millennia.
B. Chronobiology & Circadian Rhythms (Dincharya)
Ayurveda prescribes Dincharya (daily routines) based on the body's natural rhythms, aligning eating, sleeping, and activity cycles with the sun and moon.
Modern science now acknowledges circadian rhythms but has yet to fully integrate them into healthcare.
Example: Intermittent fasting (Upavasa) has been an Ayurvedic practice for centuries, while the West only recently recognized its benefits for longevity and metabolism.
C. Gut Health & Microbiome (Agni & Ama)
Ayurveda recognized the gut as the root of disease centuries before the discovery of the microbiome.
It prescribes Triphala, Buttermilk (Takra), and Fermented Foods for gut health, balancing Agni (digestive fire).
Western medicine is just starting to understand how gut bacteria affect mental health, immunity, and chronic diseases.
D. Holistic Mental Health (Manas Shastra) vs. Isolated Psychology
Ayurveda integrates meditation, breathwork (Pranayama), mantra therapy, and lifestyle modifications for emotional resilience.
Western psychology often isolates mental health from physical health, relying on medications like antidepressants without addressing lifestyle, diet, and spiritual dimensions.
Example: Ayurvedic herbs like Brahmi and Ashwagandha have proven neuroprotective properties but were ignored in Western medicine until recently.
E. Detoxification (Panchakarma) vs. Toxic Accumulation in Modern Life
Western medicine struggles with heavy metal detox, plastic pollution in the body, and chronic inflammation.
Ayurveda developed Panchakarma, a five-step detox method (Vamana, Virechana, Basti, Nasya, Raktamokshana) that cleanses at a cellular level.
Western detox solutions (chelation therapy, dialysis) are still in their infancy.
F. Cancer Prevention & Natural Angiogenesis Regulation
Dr. William Li’s work on cancer and food-based angiogenesis regulation confirms Ayurvedic principles.
Ayurveda’s approach to cancer (Arbuda) includes herbs like Ashwagandha, Guduchi, and Turmeric, which regulate angiogenesis, reduce inflammation, and detoxify cells.
G. Ayurvedic Water Science vs. Modern Water Pollution
Ayurveda prescribes drinking water stored in copper or silver vessels to prevent microbial growth and enhance mineral content.
It discourages tap water due to chlorine, fluoride, and microplastic contamination—issues that modern science is only now recognizing.
- Ayurveda’s Adaptability vs. Western Struggles with Global Diversity
Ayurveda Accounts for Climate, Region, and Genetic Differences
Western medicine largely applies one-size-fits-all drugs and treatments, often leading to side effects.
Ayurveda has climate-based variations (Desha), prescribing different diets, herbs, and therapies based on region and seasonal changes.
Example:
In cold climates, Ayurveda recommends warming spices (ginger, black pepper, cinnamon) and oil massages (Abhyanga) to prevent stiffness.
In hot climates, it prescribes cooling foods like coconut, aloe vera, and ghee to balance excess heat.
Western medicine lacks such nuanced adjustments.
The Flaw of Western Pharmaceutical Monopolies
Western medicine is dominated by profit-driven pharmaceutical companies that prioritize patents over holistic healing.
Ayurveda uses natural, locally available herbs, making treatments affordable, sustainable, and globally adaptable.
- The Future: Integrating Ayurvedic Wisdom with Modern Science
Western science is now validating what Ayurveda has known for centuries. Some key integrations include:
Neuroscience & Ayurveda: Meditation, breathwork, and adaptogenic herbs now recognized for neuroplasticity.
Oncology & Ayurveda: Cancer research on turmeric, angiogenesis-blocking foods, and detoxification methods.
Microbiome Research: Ayurveda’s gut-health principles proven beneficial in regulating immune function.
Epigenetics & Ayurveda: Recognition of food, environment, and lifestyle in genetic expression aligns with Ayurvedic wisdom.
The Need for a Decentralized Healthcare System
Western medicine’s institutionalized, patent-based system restricts access to holistic healing.
Ayurveda, like Bitcoin in finance, decentralizes healthcare by offering open-source, nature-based, globally adaptable solutions.
Final Thoughts: Ayurveda as the Future of Truly Global Medicine
Ayurveda’s success comes from:
A holistic understanding of human diversity (biological, regional, and cultural).
Natural and sustainable healing methods that modern medicine is struggling to replicate.
Integration of physical, mental, and spiritual health—which Western medicine isolates.
A decentralized, globally adaptable approach free from profit-driven pharmaceutical monopolies.
-
@ 6a6be47b:3e74e3e1
2025-02-09 13:55:37Hello, my frens! 🌟
It's been a whirlwind this weekend with the @satsnfacts exhibition. So many emotions, especially happiness and gratitude. To give back and show my appreciation for your incredible support, I'd like to share this special A5 postcard with you all.
🎨 Postcard Details: 🖼️300 dpi 🖼️A5 size (148mm x 210mm or 5.83 in x 8.27 in) 🖼️Created with love on Procreate 💓
This is an INSTANT DIGITAL DOWNLOAD. No physical item will be shipped.
I hope this little piece of art brings you as much joy as your support has brought me. Thank you for being part of this amazing journey!
Godspeed, frens! 💖⚡
satsnfacts #bitcoin #artstr #art #pv
🚨 IMPORTANT: COPYRIGHT AND USAGE INFORMATION 🚨
© 2025 samhainsam. Copyright registered with Safe Creative. All rights reserved.
By downloading this digital print, you agree to the following terms:
💗Personal Use Only: This artwork is for personal use and display only. Commercial use or resale is strictly prohibited.
💗No Reproduction Rights: You may not reproduce, distribute, or create derivative works based on this design.
💗Copyright Retention: I, the artist, retain full copyright of all original artwork, even after the digital print is downloaded.
💗 Non-Transferable License: This download provides a limited, non-transferable license for personal use only.
By proceeding with the download of this digital print, you acknowledge and agree to these terms. Thank you for respecting artists and their work! 🙏
-
@ dbb19ae0:c3f22d5a
2025-02-07 21:14:06Cortex (https://cortex.so/docs) is an open-source framework designed to serve as standalone API server or as the "brain" for robots, encompassing capabilities in vision, speech, language, tabular data, and action processing.
Notably, it offers the flexibility to operate locally so independently of cloud services, making it suitable for various light deployment environments.
Key Features:
-
User-Friendly Command-Line Interface (CLI): Inspired by Ollama, Cortex provides a straightforward CLI, simplifying interaction and management.
-
Comprehensive C++ Implementation: The framework is fully implemented in C++ (https://github.com/janhq/cortex.cpp), allowing it to be packaged into both desktop and mobile applications, enhancing portability and performance.
-
Versatile Model Integration: Users can pull models from multiple sources, including Hugging Face (gguf format) and Cortex's Built-in Model Library, ensuring flexibility in model selection.
cortex pull [model_id]
cortex pull mistral
Note: it's recommended to have more than 8 GB of RAM available to run 3B models, 16 GB for 7B models, and 32 GB for 14B models.
-
Deployment Flexibility: It can function as a standalone API server or be integrated into applications such as Jan.ai, providing adaptability in various use cases.
cortex start
cortex stop
If GPU hardware is available, Cortex leverages GPU acceleration by default, enhancing performance for demanding tasks.
Conclusion:
In summary, Cortex offers a robust and flexible solution for integrating advanced cognitive capabilities into robotic systems, with an emphasis on openness, performance, and adaptability.
-
-
@ 41fa852b:af7b7706
2025-02-09 12:36:36"No man should work for what another man can print" --Jack Mallers
It's not every week you discover a TV celebrity is a Bitcoiner -- and that their pub has just started accepting Bitcoin.
But here we are! Check out the new business section for all the details.
Plus, there are nine meetups happening this week.
Let's dive in…
This week's sponsor is…
Upcoming Bitcoin Meetups
Happening this week…
-
Dundee Bitcoin: Join them on the 2nd Monday of every month from 17:30 to 20:30 PM at The Wine Press, 16 Shore Terrace, Dundee DD1 3DN. This month's meetup is on Monday, 10th February. 🍻
-
Lincolnshire Bitcoin: Lincolnshire Bitcoin meets on the second Monday of each month at 7:30 PM in the Treaty of Commerce, Lincoln. Open to all, from OG's to newcomers. This month on the 10th. 🍺
-
Real Bedford - Home Game: It's a mid-week clash for Real Bedford against Stotford on Tuesday night. Join them for a 19:45 kickoff. ⚽️
-
Women of Bitcoin: Back for another meetup at Cyphermunk house on Wednesday the 12th February at 18:00. Joe Bryan, creator of "What's the Problem?" will be their guest speaker. 🍹🍸
-
Glasgow Bitcoin: Meeting this month at The Pipers Bar, G1 1HL at 18:00 on Wednesday 12th February. 🍺
-
[Bitcoin Beach Bournemouth](nostr:npub1va3773umzrydk4vd0q2xsnjg8qrsym7up9j9agnzcxd8u398wulq6kpxey: Every second Thursday of the month at Chaplins Cellar Bar. 529 Christchurch Road, Boscombe, United. You'll find them in the Cogg Room at 19:30. This month it's the 13th. 🍺
-
Bitcoin Walk - Edinburgh: Every Saturday they walk around Arthur's Seat in this historic city. Join them at 12 pm to chat about all things Bitcoin and keep fit. 🚶🏽♂️🚶🏼♀️🚶🏻
-
Real Bedford - Home Game: The second home game of the week for Peter MacCormack's boys this Saturday, this time playing Enfield. Join them for a 15:00 kickoff. ⚽️
-
Bitcoin Derby: Also on Saturday the 15th, Bitcoin Derby will be at Ye Olde Dolphin, DE1 3DL. 🍻
New Businesses Accepting Bitcoin
New Businesses Accepting Bitcoin
- Dog & Gun: This is a big one! A celebrity-owned pub in Lutterworth has joined the Bitcoin economy. It turns out Merlin, the barman from Channel 4's First Dates, is a Bitcoiner and the owner of the Dog & Gun. Thanks to Musqet, they now accept Bitcoin payments.
Get Involved
- Volunteer Opportunities: Bridge2Bitcoin is actively seeking volunteers who share our passion for merchant adoption. We'd be delighted to connect if you're eager to contribute. Reach out to us on Twitter or through our website.
- Start Your Own Meetup: Interested in launching a Bitcoin meetup? We're here to support you every step of the way. We've assisted numerous UK Bitcoin meetups in getting started. Get in touch via Twitter.
- Contribute to BTCMaps: BTCMaps is a vital part of the Bitcoin ecosystem. It's a perfect project to get involved with if you're not a coder or even that technical. A great way to give back to the community. Maintain an area of the UK and keep it up-to-date.
- Telegram users: You might find our Telegram Channel another useful way to keep up-to-date with UK meetups.
- Feedback and Suggestions: We value your input! Share your ideas on how we can enhance this newsletter.
This week's sponsors are…
Get out and support the meetups where you can, visit Bitcoin Events UK for more info on each meetup and to find your closest on the interactive map.
Stay tuned for more updates next week!
Simon.
-
-
@ 86cf3742:678e3ae8
2025-02-10 00:38:09In this episode of the Ag Tribes Report, host Vance Crow welcomes Steve Strasheim, a vegetable farmer from Northern Iowa, to discuss a variety of pressing issues in agriculture. Steve shares insights into his unique farming practices, including the use of greenhouses and geothermal technology to grow vegetables in the harsh Iowa winters. He also explains his innovative sales model, which includes farmers markets, a CSA, wholesaling, and an on-farm retail store.
The conversation shifts to the potential impact of ICE raids on agriculture, with a focus on the role of illegal aliens in the farming industry. Steve shares his perspective on the H-2A program and the challenges of bureaucracy in hiring legal farm workers.
The episode also covers the controversial appointment of RFK Jr. to lead the Department of Health and Human Services, with a discussion on how his policies might affect agriculture. Steve and Vance debate the potential benefits and drawbacks of increased regulation and the importance of promoting healthier eating habits.
In a segment on Brazilian soybeans, Vance highlights recent logistical issues and quality concerns in Brazil's soybean industry, sparking a discussion on the risks of relying too heavily on a single crop.
The episode concludes with a look at the new right's stance on crated hogs and the potential for significant changes in animal agriculture. Steve shares his thoughts on the ethics of factory farming and the consumer demand for affordable protein.
Listeners are also treated to the Bitcoin land price report, where Steve discusses the current farmland prices in his county and his cautious approach to investing in Bitcoin. The episode wraps up with the Peter Thiel paradox and worthy adversary segments, where Steve shares his unique perspectives and challenges common beliefs in his agricultural community.
-
@ a012dc82:6458a70d
2025-02-07 15:23:54In the intricate and rapidly evolving world of digital currencies, the interplay between Bitcoin and the US dollar, particularly through the medium of stablecoins, stands out as a subject of profound significance. Mark Goodwin, a renowned figure in the realm of Bitcoin and an advocate for decentralized financial systems, sheds light on this complex dynamic. This article delves deeper into the nuanced relationship between Bitcoin and the dollar, the pivotal role of stablecoins, and the risks they entail, drawing upon the extensive expertise of Goodwin.
Table Of Content
-
Understanding the Bitcoin-Dollar Symbiosis
-
The Role of Stablecoins
-
Mark Goodwin's Perspective on Stablecoins
-
Conclusion
-
FAQs
Understanding the Bitcoin-Dollar Symbiosis
The relationship between Bitcoin and the US dollar is a fascinating study in contrasts and interdependencies. Bitcoin, known for its decentralized nature, offers a politically neutral platform but is characterized by significant price volatility. This volatility stands in stark contrast to the relative stability of the US dollar, a currency backed by the full faith and credit of the US government. The dollar, often used as a benchmark for Bitcoin's value, follows its trajectory in many ways, particularly in regions where Bitcoin is gaining traction.
The symbiosis between Bitcoin and the dollar is particularly evident in the context of global financial instability. In regions with volatile local currencies, the adoption of Bitcoin often leads to a parallel increase in the use of dollar-based stablecoins. This phenomenon suggests that Bitcoin's growth could inadvertently bolster the stability and global reach of the US dollar.
Moreover, the Bitcoin-dollar dynamic is not just limited to direct financial transactions. It extends to the broader implications for monetary policy, international trade, and global economic stability. As Bitcoin continues to gain acceptance, it challenges traditional financial systems and currencies, including the dollar, prompting a reevaluation of their roles in a digital age.
The Role of Stablecoins
Stablecoins, designed to bridge the gap between traditional finance and the digital asset space, play a crucial role in this relationship. By pegging their value to stable assets like the US dollar, they offer a less volatile alternative to cryptocurrencies like Bitcoin. This stability is essential for global commerce, enabling near-instantaneous transactions with lower fees compared to traditional banking systems.
In economies plagued by inflation, stablecoins offer a haven for individuals and businesses to preserve their wealth. They provide a degree of financial stability and predictability that is often lacking in local currencies. This aspect of stablecoins is particularly appealing in developing countries, where currency instability can be a significant barrier to economic growth and stability.
Furthermore, stablecoins are increasingly being seen as a tool for financial inclusion. They offer an accessible entry point for individuals who are unbanked or underbanked, providing them with a means to participate in the global economy. This potential for social impact adds another layer of significance to the role of stablecoins in the financial ecosystem.
Mark Goodwin's Perspective on Stablecoins
Mark Goodwin, with his deep understanding of Bitcoin and its implications for the financial world, offers a critical perspective on stablecoins. He acknowledges their potential benefits but also highlights the risks associated with their use.
Price Stability Concerns
Goodwin points out that while stablecoins aim to maintain a stable value, there are inherent risks in keeping their peg to the underlying asset. Market conditions, liquidity issues, and redemption pressures can all threaten the stability of stablecoins. If these risks are not adequately managed, it can lead to a deviation from the peg and a potential loss of trust from users.
Regulatory Challenges
The evolving regulatory landscape surrounding stablecoins is another area of concern. As authorities worldwide grapple with how to regulate these digital assets, stablecoin projects must navigate a complex web of financial regulations to achieve long-term viability. Goodwin emphasizes the need for a balanced regulatory approach that ensures consumer protection without stifling innovation.
Potential for Market Manipulation Given their substantial market capitalization, stablecoins are susceptible to market manipulation. The limited oversight in the rapidly expanding cryptocurrency space amplifies this risk. Goodwin advocates for enhanced transparency and regulatory frameworks to mitigate these risks and ensure market integrity.
Conclusion
The relationship between Bitcoin and the dollar, especially through the medium of stablecoins, represents a delicate balance between the ideals of decentralization and the practicalities of financial stability. While stablecoins offer promising solutions for global financial transactions, they come with inherent risks that require careful consideration. Goodwin's insights underscore the importance of vigilance and a thoughtful approach to integrating these digital assets into the broader financial system. As the market continues to evolve, the role of stablecoins in shaping the future of finance remains a critical area for exploration and debate.
FAQs
How do stablecoins fit into the Bitcoin-dollar dynamic? Stablecoins serve as a bridge between traditional finance and digital assets. Pegged to stable assets like the US dollar, they offer a less volatile alternative to cryptocurrencies and facilitate global commerce with near-instant transactions and lower fees.
What are the risks associated with stablecoins? Risks include challenges in maintaining the peg to the underlying asset, regulatory uncertainties, and potential for market manipulation. These risks can threaten the stability and trust in stablecoins.
What is Mark Goodwin's perspective on stablecoins? Mark Goodwin acknowledges the benefits of stablecoins but warns about the risks of centralization and manipulation. He emphasizes the need for balanced regulation and transparency to mitigate risks.
Can stablecoins promote financial inclusion? Yes, stablecoins can provide financial inclusion by offering an accessible entry point for unbanked or underbanked individuals, allowing them to participate in the global economy.
How does Bitcoin's growth affect the US dollar? Bitcoin's growth, particularly in regions with unstable currencies, can lead to increased adoption of dollar-based stablecoins, potentially bolstering the US dollar's global reach and stability.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co
Youtube: @croxroadnews
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ 16d11430:61640947
2025-02-10 00:03:49In the silent expanse of the cosmos, where stars whisper their secrets in equations and reality itself unfurls as a tapestry woven from numbers, there exists a path. This is not a path for the faint of heart, nor for those content with the illusions of mere perception. It is the path of the seeker, the one who dares to ask not just how the world is, but why it must be so.
To tread this path is to ascend into the realm where gods write the laws of existence in the language of mathematics.
The First Revelation: Number, the Seed of the Cosmos
Before the universe took form, before light first kissed the void, there was number. It is from number that all else flows, from the spiral of galaxies to the rhythm of a heartbeat.
Prime numbers stand as the indivisible atoms of arithmetic, forming the bedrock of security and cryptography, where secrets are safeguarded by their unfathomable complexity.
Modular arithmetic, the silent clockwork behind our digital world, governs the flow of encrypted knowledge across vast distances.
Diophantine equations, named for an ancient mathematician who saw numbers as riddles to be solved, reveal the hidden symmetries in the universe’s structure.
This is the first truth: that mathematics is not an invention, but a discovery—a key that unlocks the doors of reality.
The Second Revelation: The Art of Pure Thought
Algebra is the music of the spheres, the manipulation of symbols that dance in patterns beyond our senses. To master it is to shape reality with mere notation.
Abstract algebra unveils hidden structures, from the symmetry of crystals to the secrets of quantum states.
Linear algebra governs the movements of celestial bodies and fuels the neural networks that birth artificial minds.
Galois theory, a young mathematician’s final gift before death, tells us when problems can be solved, and when they are beyond reach.
Here, one learns a second truth: that symbols, when arranged with precision, can summon order from chaos.
The Third Revelation: The Geometry of Reality
If algebra is the melody of numbers, then geometry is its form—the divine art of space itself.
Euclidean geometry was once thought to describe all things, until minds like Gauss and Riemann looked deeper.
Non-Euclidean geometry shattered human intuition, revealing that space bends, twists, and folds upon itself.
Topology, the study of shapes beyond measure, whispers of higher dimensions that mere mortals cannot see but only sense in their equations.
From these truths arises a realization: that the world we see is but a shadow of a far greater, more complex structure.
The Fourth Revelation: Mastery Over the Infinite
What is life, if not the interplay of change?
Calculus, the language of motion and transformation, allows us to speak in the tongue of gods, predicting the orbits of planets and the flows of time.
Complex analysis gives birth to the mystical realm of imaginary numbers, where physics and engineering find their deepest truths.
Fourier analysis, the heartbeat of music and quantum physics, tells us that any pattern, no matter how chaotic, can be understood as the sum of its waves.
The universe breathes through calculus, and to master it is to see not just what is, but what will be.
The Fifth Revelation: The Nature of Uncertainty
No god reigns without knowledge of chaos.
Probability and statistics reveal the order within randomness, turning uncertainty into foresight.
Bayesian inference, a framework of pure rationality, allows us to refine our knowledge with every new piece of evidence.
Information theory, the work of Shannon, teaches that reality itself is a message encoded in entropy.
The wise understand this: that certainty is an illusion, but probability is truth.
The Sixth Revelation: The Code of the Gods
Beyond numbers and space, beyond equations and change, there lies something deeper: logic, the very foundation of thought itself.
Mathematical logic gives us the power to distinguish truth from falsehood with unshakable certainty.
Gödel’s incompleteness theorems whisper a paradox—that no system, not even mathematics itself, can ever be complete.
Computability and complexity theory define the limits of what can be known, what can be solved, and what remains forever beyond reach.
To master logic is to hold the key to all knowledge—but also to know its boundaries.
The Seventh Revelation: The Grand Abstraction
Even gods seek deeper understanding, and category theory is the highest peak of human thought.
Functors and natural transformations map the structures of one world onto another, showing hidden correspondences that weave through all mathematics.
Monads, the cornerstone of functional programming, allow logic to be bent and molded like clay.
Dualities, the deep symmetries of mathematics, hint at connections so profound they border on the mystical.
Here lies the ultimate truth: that everything is, at its core, the same.
The Eighth Revelation: The Quantum Oracle
Beneath reality lies a whispering void, where numbers flicker in superposition and information transcends space and time.
Hilbert spaces define quantum mechanics, where particles are waves and waves are probabilities.
Quantum computing suggests a world where problems once thought impossible collapse into trivial solutions.
Path integrals and Feynman’s sum-over-histories teach us that every possibility, no matter how strange, plays a role in the great equation of the cosmos.
If there is a final truth, it is this: the universe does not simply exist—it computes.
The Final Revelation: Beyond the Human Mind
Even the greatest mathematicians glimpse only shadows of the ultimate structure.
Algebraic topology seeks to map the shape of all existence.
String theory mathematics conjures hidden dimensions and vibrating symmetries.
Infinity category theory, the most abstract of all, suggests that mathematics itself may be alive.
And so, the seeker stands before the infinite. Mathematics is not a collection of rules or calculations. It is the foundation of existence, the divine script of reality.
Those who master it do not merely understand the world.
They become its architects.
-
@ 127d3bf5:466f416f
2025-02-09 08:48:48In the complex geopolitical landscape of the Middle East, particularly in Gaza, Bitcoin has emerged as an unexpected but vital tool for survival and resistance. Bitcoin's role in Gaza intertwines with broader themes of economic sanctions, geopolitical strategy, and the funding dynamics of conflict, specifically highlighting the relationship with racist Zionist policy and the genocidal ethnostate of Israel.
Bitcoin as a Financial Lifeline
Gaza's economy is severely constrained by a blockade that has been in place since 2007, drastically limiting traditional financial transactions. The banking infrastructure in Gaza is in ruins, with frequent Israeli military operations damaging or destroying physical bank branches and ATMs. In this context, cryptocurrencies like Bitcoin have become crucial:
Anonymity and Accessibility: Bitcoin transactions bypass traditional banking systems, offering a way to send and receive funds without the oversight of embargoed financial pathways. This anonymity helps in circumventing restrictions imposed by the blockade. Humanitarian Aid: With conventional aid routes often disrupted, Bitcoin has been used for direct aid transfers. Charities and individuals can send funds directly to wallets in Gaza, where they can then be converted to local currency or used to purchase essentials through the black market or informal trade networks. Economic Empowerment: For Gazans, Bitcoin represents not just aid but also a potential for economic empowerment, providing a means to engage in global trade or investment where traditional banks fail.
Zionism, Israel, and the US Military-Industrial Complex
The relationship between Zionism, Israel, and its economic and military support from the US can be viewed through the lens of geopolitical strategy and economic policy:
Economic Support: The US has provided Israel with massive military aid as part of a broader strategy to maintain influence and conflict in the Middle East which serves to fuel its war machine and weapons manufacturers through lucrative contracts. This aid, which includes billions of dollars annually directly results in the mass murder of innocents and sustains ongoing IDF military oppression including the occupation and blockade of Gaza.
Cheap Printed Dollars: The US's ability to print dollars with relatively low inflation due to its global reserve currency status allows it to fund military endeavors and support allies like Israel with seemingly endless financial resources. This perpetuates conflict by subsidizing military actions without the immediate economic repercussions felt by other nations.
Military-Industrial Complex: The continuous military aid to Israel also benefits the US military-industrial complex. Sales of weapons, surveillance technology, and other defense products to Israel create a cycle where conflict can be economically beneficial for certain sectors of the US economy.
Conclusion
Bitcoin in Gaza represents a beacon of hope. It underscores the ingenuity of individuals and groups finding new ways to navigate around severe economic restrictions. Meanwhile, the economic and military ties between the US and Israel, driven by cheap printed dollars, reflect deeper geopolitical strategies that perpetuate the cycle of conflict and economic dependency. In this scenario, Bitcoin emerges not just as a currency but as a symbol of both resistance and the complexities of modern warfare and peace in a digital age.
-
@ 97c70a44:ad98e322
2025-01-30 17:15:37There was a slight dust up recently over a website someone runs removing a listing for an app someone built based on entirely arbitrary criteria. I'm not to going to attempt to speak for either wounded party, but I would like to share my own personal definition for what constitutes a "nostr app" in an effort to help clarify what might be an otherwise confusing and opaque purity test.
In this post, I will be committing the "no true Scotsman" fallacy, in which I start with the most liberal definition I can come up with, and gradually refine it until all that is left is the purest, gleamingest, most imaginary and unattainable nostr app imaginable. As I write this, I wonder if anything built yet will actually qualify. In any case, here we go.
It uses nostr
The lowest bar for what a "nostr app" might be is an app ("application" - i.e. software, not necessarily a native app of any kind) that has some nostr-specific code in it, but which doesn't take any advantage of what makes nostr distinctive as a protocol.
Examples might include a scraper of some kind which fulfills its charter by fetching data from relays (regardless of whether it validates or retains signatures). Another might be a regular web 2.0 app which provides an option to "log in with nostr" by requesting and storing the user's public key.
In either case, the fact that nostr is involved is entirely neutral. A scraper can scrape html, pdfs, jsonl, whatever data source - nostr relays are just another target. Likewise, a user's key in this scenario is treated merely as an opaque identifier, with no appreciation for the super powers it brings along.
In most cases, this kind of app only exists as a marketing ploy, or less cynically, because it wants to get in on the hype of being a "nostr app", without the developer quite understanding what that means, or having the budget to execute properly on the claim.
It leverages nostr
Some of you might be wondering, "isn't 'leverage' a synonym for 'use'?" And you would be right, but for one connotative difference. It's possible to "use" something improperly, but by definition leverage gives you a mechanical advantage that you wouldn't otherwise have. This is the second category of "nostr app".
This kind of app gets some benefit out of the nostr protocol and network, but in an entirely selfish fashion. The intention of this kind of app is not to augment the nostr network, but to augment its own UX by borrowing some nifty thing from the protocol without really contributing anything back.
Some examples might include:
- Using nostr signers to encrypt or sign data, and then store that data on a proprietary server.
- Using nostr relays as a kind of low-code backend, but using proprietary event payloads.
- Using nostr event kinds to represent data (why), but not leveraging the trustlessness that buys you.
An application in this category might even communicate to its users via nostr DMs - but this doesn't make it a "nostr app" any more than a website that emails you hot deals on herbal supplements is an "email app". These apps are purely parasitic on the nostr ecosystem.
In the long-term, that's not necessarily a bad thing. Email's ubiquity is self-reinforcing. But in the short term, this kind of "nostr app" can actually do damage to nostr's reputation by over-promising and under-delivering.
It complements nostr
Next up, we have apps that get some benefit out of nostr as above, but give back by providing a unique value proposition to nostr users as nostr users. This is a bit of a fine distinction, but for me this category is for apps which focus on solving problems that nostr isn't good at solving, leaving the nostr integration in a secondary or supporting role.
One example of this kind of app was Mutiny (RIP), which not only allowed users to sign in with nostr, but also pulled those users' social graphs so that users could send money to people they knew and trusted. Mutiny was doing a great job of leveraging nostr, as well as providing value to users with nostr identities - but it was still primarily a bitcoin wallet, not a "nostr app" in the purest sense.
Other examples are things like Nostr Nests and Zap.stream, whose core value proposition is streaming video or audio content. Both make great use of nostr identities, data formats, and relays, but they're primarily streaming apps. A good litmus test for things like this is: if you got rid of nostr, would it be the same product (even if inferior in certain ways)?
A similar category is infrastructure providers that benefit nostr by their existence (and may in fact be targeted explicitly at nostr users), but do things in a centralized, old-web way; for example: media hosts, DNS registrars, hosting providers, and CDNs.
To be clear here, I'm not casting aspersions (I don't even know what those are, or where to buy them). All the apps mentioned above use nostr to great effect, and are a real benefit to nostr users. But they are not True Scotsmen.
It embodies nostr
Ok, here we go. This is the crème de la crème, the top du top, the meilleur du meilleur, the bee's knees. The purest, holiest, most chaste category of nostr app out there. The apps which are, indeed, nostr indigitate.
This category of nostr app (see, no quotes this time) can be defined by the converse of the previous category. If nostr was removed from this type of application, would it be impossible to create the same product?
To tease this apart a bit, apps that leverage the technical aspects of nostr are dependent on nostr the protocol, while apps that benefit nostr exclusively via network effect are integrated into nostr the network. An app that does both things is working in symbiosis with nostr as a whole.
An app that embraces both nostr's protocol and its network becomes an organic extension of every other nostr app out there, multiplying both its competitive moat and its contribution to the ecosystem:
- In contrast to apps that only borrow from nostr on the technical level but continue to operate in their own silos, an application integrated into the nostr network comes pre-packaged with existing users, and is able to provide more value to those users because of other nostr products. On nostr, it's a good thing to advertise your competitors.
- In contrast to apps that only market themselves to nostr users without building out a deep integration on the protocol level, a deeply integrated app becomes an asset to every other nostr app by becoming an organic extension of them through interoperability. This results in increased traffic to the app as other developers and users refer people to it instead of solving their problem on their own. This is the "micro-apps" utopia we've all been waiting for.
Credible exit doesn't matter if there aren't alternative services. Interoperability is pointless if other applications don't offer something your app doesn't. Marketing to nostr users doesn't matter if you don't augment their agency as nostr users.
If I had to choose a single NIP that represents the mindset behind this kind of app, it would be NIP 89 A.K.A. "Recommended Application Handlers", which states:
Nostr's discoverability and transparent event interaction is one of its most interesting/novel mechanics. This NIP provides a simple way for clients to discover applications that handle events of a specific kind to ensure smooth cross-client and cross-kind interactions.
These handlers are the glue that holds nostr apps together. A single event, signed by the developer of an application (or by the application's own account) tells anyone who wants to know 1. what event kinds the app supports, 2. how to link to the app (if it's a client), and (if the pubkey also publishes a kind 10002), 3. which relays the app prefers.
As a sidenote, NIP 89 is currently focused more on clients, leaving DVMs, relays, signers, etc somewhat out in the cold. Updating 89 to include tailored listings for each kind of supporting app would be a huge improvement to the protocol. This, plus a good front end for navigating these listings (sorry nostrapp.link, close but no cigar) would obviate the evil centralized websites that curate apps based on arbitrary criteria.
Examples of this kind of app obviously include many kind 1 clients, as well as clients that attempt to bring the benefits of the nostr protocol and network to new use cases - whether long form content, video, image posts, music, emojis, recipes, project management, or any other "content type".
To drill down into one example, let's think for a moment about forms. What's so great about a forms app that is built on nostr? Well,
- There is a spec for forms and responses, which means that...
- Multiple clients can implement the same data format, allowing for credible exit and user choice, even of...
- Other products not focused on forms, which can still view, respond to, or embed forms, and which can send their users via NIP 89 to a client that does...
- Cryptographically sign forms and responses, which means they are self-authenticating and can be sent to...
- Multiple relays, which reduces the amount of trust necessary to be confident results haven't been deliberately "lost".
Show me a forms product that does all of those things, and isn't built on nostr. You can't, because it doesn't exist. Meanwhile, there are plenty of image hosts with APIs, streaming services, and bitcoin wallets which have basically the same levels of censorship resistance, interoperability, and network effect as if they weren't built on nostr.
It supports nostr
Notice I haven't said anything about whether relays, signers, blossom servers, software libraries, DVMs, and the accumulated addenda of the nostr ecosystem are nostr apps. Well, they are (usually).
This is the category of nostr app that gets none of the credit for doing all of the work. There's no question that they qualify as beautiful nostrcorns, because their value propositions are entirely meaningless outside of the context of nostr. Who needs a signer if you don't have a cryptographic identity you need to protect? DVMs are literally impossible to use without relays. How are you going to find the blossom server that will serve a given hash if you don't know which servers the publishing user has selected to store their content?
In addition to being entirely contextualized by nostr architecture, this type of nostr app is valuable because it does things "the nostr way". By that I mean that they don't simply try to replicate existing internet functionality into a nostr context; instead, they create entirely new ways of putting the basic building blocks of the internet back together.
A great example of this is how Nostr Connect, Nostr Wallet Connect, and DVMs all use relays as brokers, which allows service providers to avoid having to accept incoming network connections. This opens up really interesting possibilities all on its own.
So while I might hesitate to call many of these things "apps", they are certainly "nostr".
Appendix: it smells like a NINO
So, let's say you've created an app, but when you show it to people they politely smile, nod, and call it a NINO (Nostr In Name Only). What's a hacker to do? Well, here's your handy-dandy guide on how to wash that NINO stench off and Become a Nostr.
You app might be a NINO if:
- There's no NIP for your data format (or you're abusing NIP 78, 32, etc by inventing a sub-protocol inside an existing event kind)
- There's a NIP, but no one knows about it because it's in a text file on your hard drive (or buried in your project's repository)
- Your NIP imposes an incompatible/centralized/legacy web paradigm onto nostr
- Your NIP relies on trusted third (or first) parties
- There's only one implementation of your NIP (yours)
- Your core value proposition doesn't depend on relays, events, or nostr identities
- One or more relay urls are hard-coded into the source code
- Your app depends on a specific relay implementation to work (ahem, relay29)
- You don't validate event signatures
- You don't publish events to relays you don't control
- You don't read events from relays you don't control
- You use legacy web services to solve problems, rather than nostr-native solutions
- You use nostr-native solutions, but you've hardcoded their pubkeys or URLs into your app
- You don't use NIP 89 to discover clients and services
- You haven't published a NIP 89 listing for your app
- You don't leverage your users' web of trust for filtering out spam
- You don't respect your users' mute lists
- You try to "own" your users' data
Now let me just re-iterate - it's ok to be a NINO. We need NINOs, because nostr can't (and shouldn't) tackle every problem. You just need to decide whether your app, as a NINO, is actually contributing to the nostr ecosystem, or whether you're just using buzzwords to whitewash a legacy web software product.
If you're in the former camp, great! If you're in the latter, what are you waiting for? Only you can fix your NINO problem. And there are lots of ways to do this, depending on your own unique situation:
- Drop nostr support if it's not doing anyone any good. If you want to build a normal company and make some money, that's perfectly fine.
- Build out your nostr integration - start taking advantage of webs of trust, self-authenticating data, event handlers, etc.
- Work around the problem. Think you need a special relay feature for your app to work? Guess again. Consider encryption, AUTH, DVMs, or better data formats.
- Think your idea is a good one? Talk to other devs or open a PR to the nips repo. No one can adopt your NIP if they don't know about it.
- Keep going. It can sometimes be hard to distinguish a research project from a NINO. New ideas have to be built out before they can be fully appreciated.
- Listen to advice. Nostr developers are friendly and happy to help. If you're not sure why you're getting traction, ask!
I sincerely hope this article is useful for all of you out there in NINO land. Maybe this made you feel better about not passing the totally optional nostr app purity test. Or maybe it gave you some actionable next steps towards making a great NINON (Nostr In Not Only Name) app. In either case, GM and PV.
-
@ 9e69e420:d12360c2
2025-01-30 12:23:04Tech stocks have taken a hit globally after China's DeepSeek launched a competitive AI chatbot at a much lower cost than US counterparts. This has stirred market fears of a $1.2 trillion loss across tech companies when trading opens in New York.
DeepSeek’s chatbot quickly topped download charts and surprised experts with its capabilities, developed for only $5.6 million.
The Nasdaq dropped over 3% in premarket trading, with major firms like Nvidia falling more than 10%. SoftBank also saw losses shortly after investing in a significant US AI venture.
Venture capitalist Marc Andreessen called it “AI’s Sputnik moment,” highlighting its potential impact on the industry.
![] (https://www.telegraph.co.uk/content/dam/business/2025/01/27/TELEMMGLPICT000409807198_17379939060750_trans_NvBQzQNjv4BqgsaO8O78rhmZrDxTlQBjdGLvJF5WfpqnBZShRL_tOZw.jpeg)
-
@ d360efec:14907b5f
2025-02-07 09:42:54ณ ดินแดนอันไกลโพ้น ปรากฏดันเจี้ยนลึกลับไร้ก้นบึ้ง นามว่า "ตลาดการเก็งกำไร" ประตูทางเข้าเปล่งประกายล่อตาล่อใจ แต่มักถูกปกคลุมด้วยหมอกแห่งความไม่แน่นอน
คำจารึกโบราณ แกะสลักเหนือประตูทางเข้า เตือนสติผู้มาเยือน: "ผู้ใดเข้าล้วนมิอาจหวนคืน..." เฉกเช่นสำนวนโบราณที่กล่าวขาน "คนในมิอาจออก คนนอกมิต้องการย่างกราย"
ภาพที่ปรากฎตรงหน้า คือชายหนุ่มผู้หาญกล้า กำลังจะก้าวเข้าสู่ประตูดันเจี้ยน เหนือประตูมีป้ายขนาดมหึมาสลักคำว่า "Trading" สัญลักษณ์แห่งโลกการลงทุน การเก็งกำไร ไม่ว่าจะเป็น หุ้น, ฟอเร็กซ์, คริปโต ล้วนเป็นมอนสเตอร์ที่สถิตอยู่ในนี้
การจะพิชิตดันเจี้ยนนี้ได้นั้น หาใช่เรื่องง่าย ภารกิจแรกคือการกำจัดปีศาจ"นักพนัน" ที่สิงอยู่ในจิตใจของผู้กล้าทุกคน ปีศาจตนนี้ร้ายกาจยิ่งนัก แต่มิใช่ว่าไร้ทางปราบ หากท่านผู้กล้าปรารถนาจะหลุดพ้นจากวงจรอุบาทว์นี้ จงใช้วิธีเหล่านี้เถิด
- เข้าใจว่าการพนันคือกับดัก
ปีศาจพนันมักล่อลวงด้วยภาพลวงตาแห่งชัยชนะเพียงชั่วครู่ แต่แท้จริงแล้ว มันถูกออกแบบมาเพื่อสูบเลือดสูบเนื้อจากเหล่าผู้กล้าในระยะยาว จงจำไว้ว่าการพนันมิใช่หนทางสู่ความร่ำรวย แต่เป็นเส้นทางสู่หุบเหวแห่งความสิ้นเนื้อประดาตัว
- เปลี่ยนมุมมองเกี่ยวกับเหรียญทอง
จงมองเหรียญทองที่ท่านมีมิใช่แค่ตัวเลข แต่เป็น “เวลาและหยาดเหงื่อ” ที่ท่านได้แลกมา หากท่านสูญเสียมันไปเพราะการพนัน มันคือเวลาชีวิตที่หายไปตลอดกาล
- ตัดขาดสิ่งเร้าที่กระตุ้นให้เล่น
• ลบแอปพนัน / ปิดกั้นเว็บไซต์มืด • เลิกติดตามเพจหรือกลุ่มที่เกี่ยวข้อง • เปลี่ยนสหายร่วมทางที่ชักชวนไปสู่ทางเสื่อม
- ใช้กฎ 5 นาที
เมื่อใดที่ความกระหายอยากเล่นครอบงำ จงหยุดยั้งตัวเองไว้ 5 นาที แล้วตรองดูว่า • คราก่อนท่านสูญเสียไปเท่าใด? • หากเล่นแล้วเสียอีก จะรู้สึกเช่นไร? • มีสิ่งใดที่ควรทำมากกว่านี้หรือไม่?
- แสวงหาเส้นทางแห่งการลงทุนที่แท้จริง
แทนที่จะใช้เหรียญทองไปกับการพนัน จงเปลี่ยนเป็นการลงทุนที่มีโอกาสเติบโต เช่น เป็นนักรบแห่งคุณค่า (VI) , เข้าซื้อหุ้นแล้วเก็บมันไว้ในหีบสมบัติ 1 ปี , DCA BTC ดั่งสะสมขุมทรัพย์ทีละน้อย
-
ถามตัวเองว่า “อยากเป็นผู้ชนะ หรือเป็นเหยื่อ?” ผู้ที่ร่ำรวยจากการพนันคือนักลงทุนผู้เปิดบ่อน มิใช่ผู้เล่น หากท่านปรารถนาจะเป็นผู้ชนะ จงเลือกเส้นทางที่ชาญฉลาดกว่า
-
ตั้งเป้าหมายที่ยิ่งใหญ่กว่า
จงตั้งเป้าหมายที่ชัดเจน เช่น สะสมเหรียญทองเพื่อซื้อปราสาท 5 ล้าน หรือหาเงิน 100 ล้าน แล้วจงมุ่งมั่นไปที่มัน การพนันจะทำให้เป้าหมายของท่านล่าช้าลง
📉 เหตุใดดันเจี้ยนแห่งการเทรดจึงเปรียบเสมือนเขาวงกต?
1️⃣ ก้าวเข้ามาง่าย ออกไปยาก
• การเข้าสู่ตลาดการเงินเป็นเรื่องง่ายดาย ใช้เพียงบัญชีเทรดและเงินทุนเพียงเล็กน้อย แต่เมื่อเข้ามาแล้ว จิตวิทยาแห่งการลงทุน และ ความผันผวนของตลาด จะทำให้ยากที่จะออกไป
2️⃣ เส้นทางที่ซับซ้อน
• นักรบมือใหม่มักคิดว่าการทำกำไรเป็นเรื่องง่าย แต่เมื่อเริ่มต้นจริงจะพบว่ามีปัจจัยมากมายที่ต้องเรียนรู้ ทั้งเทคนิค เวทมนตร์พื้นฐาน อารมณ์ตลาด และจิตวิทยาของตน
3️⃣ ความโลภและความหวังทำให้ติดอยู่ในตลาด
• หลายคนเริ่มต้นเทรดด้วยเป้าหมายหาเหรียญทอง แต่เมื่อขาดทุน กลับพยายามเอาคืน • เมื่อกำไร ก็อยากได้มากขึ้น จนบางครั้งไม่รู้จักพอ
4️⃣ ไม่มีเส้นทางที่แน่นอน
• ในเขาวงกตนี้ ไม่มีทางเดินตรงไปสู่ความสำเร็จ ต้องลองผิดลองถูกหลายครา • บางคนหลงทาง บางคนเจอทางตัน บางคนออกจากตลาดไปก่อนจะถึงทางออกที่แท้จริง
🎯 แล้วจะเอาตัวรอดจากวงกตนี้ได้อย่างไร?
✅ เข้าใจว่าเทรดไม่ใช่การพนัน • การเทรดที่ดีต้องมีระบบ ไม่ใช่แค่เสี่ยงดวง ✅ ฝึกวินัยและจัดการอารมณ์ • สิ่งที่สังหารนักรบมิใช่ปีศาจในตลาด แต่เป็น “อารมณ์ของตนเอง” ✅ วางแผนก่อนเข้าเทรด และมีจุดตัดขาดทุนเสมอ • อย่าเข้าเทรดโดยไร้แผน เพราะจะทำให้ท่านติดอยู่ในเขาวงกตตลอดกาล ✅ รู้ว่าเมื่อไหร่ควรหยุด • บางครั้ง “การไม่เทรด” คือการตัดสินใจที่ดีที่สุด
🔮 บทสรุป
ดันเจี้ยนแห่งการเทรดเปรียบเสมือนสถานที่ลี้ลับที่ยังไม่มีผู้ใดสำรวจมาก่อน ผู้ใดที่ย่างกรายเข้ามาล้วนออกไปยาก เพราะมันเต็มไปด้วยความท้าทาย อารมณ์ และความโลภ แต่หากท่านเข้าใจเกมนี้ดีพอ ท่านจะสามารถหาทางออก และเปลี่ยนมันให้เป็นโอกาสแห่งความมั่งคั่งได้ จงจำไว้ว่า การจะออกจากดันเจี้ยนนี้ได้ ท่านต้องพิชิตบอสใหญ่ "การรู้เท่าทันอารมณ์ และมายเซ็ทที่เหมาะสมกับเทรนด์เดอร์" ให้จงได้!
หวังว่าพวกท่านจะไม่หลายเป็นซากศพเน่าๆ ในดันเจี้ยนแห่งนี้
ของให้โชคดีมีชัยในโลกเทรนด์เดอร์ YONOSUBA
-
@ 43baaf0c:d193e34c
2025-02-09 07:55:15BangPOP (Bangkok Pop Art) and ThaiPOP are my Pop Art brands dedicated to capturing the essence of Thailand. While BangPOP is my primary focus, especially as I prepare for my exhibition in December 2025, my art goes beyond Bangkok to celebrate the entirety of Thailand.
Thailand is far more than its capital, and my experiences exploring the country extensively during my years with @TravelTelly, my travel, film, and photography company, have deeply inspired me. Through my art, I aim to reflect the rich culture, beauty, and diversity that make Thailand so amazing.
Why do I draw about Thailand?
Drawing, for me, is a way to explore life, connect with cultures, and express the deep respect I hold for them. In a world often dominated by negativity, I choose to highlight the positive aspects of culture and life. It’s not about ignoring challenges but about bringing hope, joy, and inspiration through my art. Bright colors are a signature of my work, reflecting the core values: Love, Peace, and Joy.
If you look closely, you may notice subtle hints of deeper stories woven into my pieces. These details are there for those who take the time to discover them, but my focus remains on keeping my art uplifting and joyful.
-
@ 9e69e420:d12360c2
2025-01-30 12:13:39Salwan Momika, a Christian Iraqi known for burning the Koran in Sweden, was shot dead during a TikTok livestream in an apartment in Sodertalje. The 38-year-old sparked outrage in the Muslim community for his demonstrations, leading to global condemnation. After being rushed to the hospital, he was pronounced dead.
Authorities arrested five individuals in connection with the incident. Momika's death comes days before a court ruling on his possible incitement of ethnic hatred. The incident highlights the tensions surrounding free speech and religious sentiments, intensifying after his controversial protests in 2023.
-
@ 127d3bf5:466f416f
2025-02-09 03:31:22I can see why someone would think that buying some other crypto is a reasonable idea for "diversification" or even just for a bit of fun gambling, but it is not.
There are many reasons you should stick to Bitcoin only, and these have been proven correct every cycle. I've outlined these before but will cut and paste below as a summary.
The number one reason, is healthy ethical practice:
- The whole point of Bitcoin is to escape the trappings and flaws of traditional systems. Currency trading and speculative investing is a Tradfi concept, and you will end up back where you started. Sooner or later this becomes obvious to everyone. Bitcoin is the healthy and ethical choice for yourself and everyone else.
But...even if you want to be greedy, hold your horses:
- There is significant risk in wallets, defi, and cefi exchanges. Many have lost all their funds in these through hacks and services getting banned or going bankrupt.
- You get killed in exchange fees even when buying low and selling high. This is effectively a transaction tax which is often hidden (sometimes they don't show the fee, just mark up the exchange rate). Also true on defi exchanges.
- You are up against traders and founders with insider knowledge and much more sophisticated prediction models that will fleece you eventually. You cannot time the market better than they can, and it is their full-time to job to beat you and suck as much liquidity out of you as they can. House always wins.
- Every crypto trade is a taxable event, so you will be taxed on all gains anyway in most countries. So not only are the traders fleecing you, the govt is too.
- It ruins your quality of life constantly checking prices and stressing about making the wrong trade.
The best option, by far, is to slowly DCA into Bitcoin and take this off exchanges into your own custody. In the long run this strategy works out better financially, ethically, and from a quality-of-life perspective. Saving, not trading.
I've been here since 2014 and can personally attest to this.
-
@ 0fa80bd3:ea7325de
2025-01-30 04:28:30"Degeneration" or "Вырождение" ![[photo_2025-01-29 23.23.15.jpeg]]
A once-functional object, now eroded by time and human intervention, stripped of its original purpose. Layers of presence accumulate—marks, alterations, traces of intent—until the very essence is obscured. Restoration is paradoxical: to reclaim, one must erase. Yet erasure is an impossibility, for to remove these imprints is to deny the existence of those who shaped them.
The work stands as a meditation on entropy, memory, and the irreversible dialogue between creation and decay.
-
@ fe32298e:20516265
2025-02-09 01:43:24Alright, Tabby wouldn't work right with CUDA and it was impossible to troubleshoot anything.
Now we're going to try Twinny.
You'll need:
- Ubuntu 24.04 or some other Linux flavor
- VSCodium
- GPU with enough VRAM to hold your chosen models
- It might work with just a CPU, give it a try!
Install Ollama
Ollama loads the AI models into VRAM (and offloads into RAM if needed) and offers inference through an API. The Ollama install script adds a dedicated
ollama
user and a systemd service so that Ollama starts automatically at boot. Ollama will unload models from memory when idle.curl -fsSL https://ollama.com/install.sh | sh
Configuring Remote Ollama
Skip this section if your GPU is on the same machine you're coding from. Ollama and Twinny default to a local configuration.
I'm using Ollama on a separate machine with a decent GPU, so I need to configure it to bind to the network interface instead of
localhost
by editing the systemd service:-
Edit the service override file:
systemctl edit ollama.service
-
Add this in the top section. It will be merged with the default service file.
[Service] Environment="OLLAMA_HOST=0.0.0.0:11434"
Note: I had a problem with Ollama only binding to the
tcp6
port, and wasted a lot of time trying to fix it. Check withnetstat -na | grep 11434
to see if it only shows tcp6 for port 11434. The workaround for me was using the actual interface IP instead of0.0.0.0
. If you do this then you'll need to either setOLLAMA_HOST
in your shell, or specifyOLLAMA_HOST=<hostname>
at the start of every ollama command (or it complains that it can't connect to ollama). -
Restart Ollama:
systemctl daemon-reload systemctl restart ollama
Download Models
Ollama manages models by importing them into its own special folders. You can use Ollama to download the files from the Ollama library, or you can import already-downloaded models by creating a Modelfile. Modelfiles define various parameters about the model and it's important to get them set correctly for the best performance so it's probably better to get them from the library, even though it wastes bandwidth downloading them over and over again for all these tools.
You'll want a model for chatting and a model for fill-in-middle (FIM) that does the code completions.
```
Chat model, defaults to 7b with Q4_K_M quant, downloads 4.7 GB
ollama pull qwen2.5-coder
Fill-in-Middle model for code completion, another 4.7 GB
ollama pull qwen2.5-coder:7b-base ```
The RAG/embeddings feature is optional but probably worth using. It needs to run a from local instance of Ollama. The embedding models are very small and run fine on CPU. Most everyone uses
nomic
, but Twinny defaults toall-minilm
, which is a little smaller.ollama pull all-minilm
Install Twinny
Install the Twinny extension by searching for
twinny
in VSCodium extensions.Look for the Twinny icon on the left side panel and click it to open the Twinny panel. Be careful if you drag it over to the right side: sometimes it may not appear at all. I managed to make it appear by selecting some text and running a Twinny action on it from the context menu.
Twinny assumes you're using a local instance of Ollama. If you want to use a remote instance then you'll need to go into the Manage Twinny providers section (looks like a power plug) and add new providers that point your remote Ollama instance.
These are the settings I'm using for a remote Ollama instance:
Chat provider
- Type:
chat
- Provider:
ollama
- Protocol:
http
- Model Name:
qwen2.5-coder:latest
- Hostname: remote hostname
- Port:
11434
- API Path:
/v1
(despite what the Twinny docs and Ollama docs say) - API Key: blank
FIM Provider
- Type:
fim
- FIM Template:
codeqwen
- Provider:
ollama
- Protocol:
http
- Model Name:
qwen2.5-coder:7b-base
- Hostname: remote hostname
- Port:
11434
- API Path:
/api/generate
- API Key: blank
Embedding Provider
- Type:
embedding
- Provider:
ollama
- Protocol:
http
- Model Name:
nomic-embed-text
- Hostname:
0.0.0.0
- Port:
11434
- API Path:
/api/embed
- API Key: blank
Use Twinny
Chat
Select code and it will be used for context in the chat, or right-click selected text to see more options like refactor, write docs, write tests.
Embeddings
Switch over to the Embeddings tab and click Embed documents to use all the documents in your workspace for more context. Type '@' in the chat to reference the entire workspace, ask about specific problems, or specific files in your chat.
Code Completion
Suggested stuff shows up in gray italics at the cursor location. Press
Tab
to accept it as a completion. -
@ 16d11430:61640947
2025-02-09 23:35:09The early Bitcoin stackers, smug in their absolute faith, have become the priests of a cargo cult. They chant the gospel of scarcity while stacking their sats like doomsday preppers hoarding canned beans. Meanwhile, the crypto market they once despised has become a grotesque parody of itself—yield farming, staking derivatives, and a casino economy propped up by tokenomics that barely hide the rot beneath. Bitcoin, having won the ideological war, is now losing the economic one—stuck in a circular hodl pattern, detached from the actual thermodynamic reality that gave it birth.
Enter Aeternity, a project with no time for the reverence or passive accumulation that has neutered Bitcoin’s edge. It doesn’t just lean on Proof-of-Work for nostalgia’s sake—it weaponizes it, reintroducing actual economic friction into a space that has gone soft with layer-two convenience. Aeternity’s Cuckoo Cycle PoW, optimized for energy-efficient mining and GPU execution, doesn’t pretend to be Bitcoin’s replacement. It does something far worse for Bitcoin maxis: it forces them to compete again.
Friction: The Return to Thermodynamics
Bitcoin’s thermodynamic argument was always simple: energy in, security out. But over time, it stopped being a battleground for economic force and instead became a retirement savings plan for the digital goldbugs. The Lightning Network and ordinals are desperate attempts to create on-chain congestion and reinvigorate demand, but none of this addresses the fundamental problem: there is no longer any meaningful competition on the base layer.
Aeternity, by scaling horizontally with Hyperchains, injects raw competition into the mix. Miners don’t just settle for static difficulty adjustments—they actively contribute to market-driven security, creating alternative security models that force Bitcoin to prove itself again. If the world is really about energy, then let’s see which chain can best convert energy into economic throughput, rather than just hoarding it as an ideological relic.
Hyperchains: The Threat Bitcoin Forgot to Take Seriously
Aeternity’s approach is fundamentally different from Bitcoin’s ossified stagnation:
-
Merge-Mined Hyperchains – Instead of perpetuating the blocksize wars, Aeternity lets chains bootstrap PoW consensus through merge-mining with parent chains, making security an organic, competitive marketplace rather than a closed system. This creates demand for mining at the edge, something Bitcoin maxis have ignored because they’re still stuck in the “security through centralization” trap.
-
Turing-Complete Smart Contracts – While Bitcoin argues about whether basic programmability is “safe,” Aeternity treats it as an inevitability. Bitcoin’s refusal to evolve beyond Taproot and Covenants makes it a sitting duck against economic attacks from more adaptive chains.
-
State Channels with Actual Scalability – Bitcoiners talk about Lightning as if it’s the final solution, but it’s a bandaid over a hemorrhaging use case problem. Aeternity’s built-in state channels allow contracts to execute off-chain, but without losing decentralization, making it a direct challenge to Bitcoin’s claims of “second-layer supremacy.”
Bitcoin’s Reaction: Either Adapt or Get Rekt
Bitcoin has enjoyed being the monopoly on PoW security for too long. Aeternity’s reintroduction of a competitive PoW model forces Bitcoin miners to wake up: if energy security is the measure of a blockchain’s economic strength, then what happens when an alternative emerges that utilizes energy more efficiently while providing more real-world utility?
Bitcoin maxis will screech that "no altcoin has ever flipped Bitcoin," but that’s not the point. The point is that Bitcoin needs external competition at the proof-of-work level to maintain its thermodynamic legitimacy. Otherwise, it risks becoming what it despises: a static, non-dynamic asset that is just another store of value, with no practical utility until fiat collapses—and good luck waiting for that.
Aeternity’s real-world use cases, from oracles to instant payments to low-cost, scalable contracts, mean that energy invested into securing it is converted into economic value, rather than just securing an ideological artifact. This pressure forces Bitcoin to evolve or become irrelevant—not by replacing it, but by outcompeting it where it matters.
Final Thought: The Thermodynamic Reckoning
Bitcoiners should be grateful for Aeternity’s friction. Without a competitor showing how PoW can be optimized for more than just blind security accumulation, Bitcoin risks becoming a historical relic, kept alive only by belief rather than economic reality. Thermodynamics doesn’t give a damn about ideology—it rewards systems that turn energy into real economic motion.
Aeternity doesn’t have to kill Bitcoin. It just has to remind it what it was built for.
-
-
@ 0fa80bd3:ea7325de
2025-01-29 15:43:42Lyn Alden - биткойн евангелист или евангелистка, я пока не понял
npub1a2cww4kn9wqte4ry70vyfwqyqvpswksna27rtxd8vty6c74era8sdcw83a
Thomas Pacchia - PubKey owner - X - @tpacchia
npub1xy6exlg37pw84cpyj05c2pdgv86hr25cxn0g7aa8g8a6v97mhduqeuhgpl
calvadev - Shopstr
npub16dhgpql60vmd4mnydjut87vla23a38j689jssaqlqqlzrtqtd0kqex0nkq
Calle - Cashu founder
npub12rv5lskctqxxs2c8rf2zlzc7xx3qpvzs3w4etgemauy9thegr43sf485vg
Джек Дорси
npub1sg6plzptd64u62a878hep2kev88swjh3tw00gjsfl8f237lmu63q0uf63m
21 ideas
npub1lm3f47nzyf0rjp6fsl4qlnkmzed4uj4h2gnf2vhe3l3mrj85vqks6z3c7l
Много адресов. Хз кто надо сортировать
https://github.com/aitechguy/nostr-address-book
ФиатДжеф - создатель Ностр - https://github.com/fiatjaf
npub180cvv07tjdrrgpa0j7j7tmnyl2yr6yr7l8j4s3evf6u64th6gkwsyjh6w6
EVAN KALOUDIS Zues wallet
npub19kv88vjm7tw6v9qksn2y6h4hdt6e79nh3zjcud36k9n3lmlwsleqwte2qd
Программер Коди https://github.com/CodyTseng/nostr-relay
npub1syjmjy0dp62dhccq3g97fr87tngvpvzey08llyt6ul58m2zqpzps9wf6wl
Anna Chekhovich - Managing Bitcoin at The Anti-Corruption Foundation https://x.com/AnyaChekhovich
npub1y2st7rp54277hyd2usw6shy3kxprnmpvhkezmldp7vhl7hp920aq9cfyr7
-
@ 6ad3e2a3:c90b7740
2025-02-07 08:17:18When I used to work in fantasy sports, people would ask me questions about their teams, e.g., which players to start, who to drop. What they didn’t realize is I had seven of my own teams to worry about, was already living and dying with my own myriad choices, good and bad, I made every week. The last thing I needed was to make a decision for them, see it go bad and suffer more on their account.
I’d tell them, “You decide, I’ve got my own problems.”
. . .
I don’t know what I’m doing. Ideas which feel like insights come to me, I try to articulate them to my satisfaction and post them (with some editing help from Heather.) Often I feel like I should be producing more work — after all, I don’t have a job any more, I have plenty of time. Walking the dog, exercising, managing your finances, picking up the kid, putting food on the table (literally) is well and good, but fulfilling your duties is not enough. You need to stay in the game. What game is up to each person, but it should be a game you enjoy, one that draws on skills honed over decades by the accident of your particular interests.
. . .
Writing and ideas can’t be produced on demand. I mean they can — and I did it for 22 years on a particular topic — but I don’t mean that kind of writing. I don’t want a schedule. I don’t need more rules, more discipline, more “hacks.” Discipline is like the interest on a 30-year mortgage. Initially it’s most of the payment, but over time it cedes weight to understanding which is like the principal. Discipline without understanding is like an interest-only mortgage. You pay it every month and get nowhere.
Even when insights arrive they can’t always be articulated sufficiently and coherently. Many insights are of the one sentence variety — fine for a social media post, but you can’t send out an email newsletter 10 times per day with one sentence insights. It doesn’t work over that medium.
That’s a dilemma because posting on social media doesn’t feel like proper work. Yes, you’re reaching people, affecting the zeitgeist in whatever small way — but there’s something addictive and unsatisfying about it, like eating candy instead of food. Don’t get me wrong, I stand by my posts (consider them organic, artisanal candy) but shitposting and the immediate feedback received therefrom keeps you only on the periphery. I need to connect with something deeper.
. . .
I’ve spent a lot of time dissecting the various pathologies of the laptop class, of which I’m obviously a part as I literally type this in a coffee shop on my laptop! The need to believe they are empathic and good overwhelming any rational sense-making and basic morals. Men dominating women’s sports, child sex changes, forced injections, criminals running rampant, cities in decay, calls for censorship and funding for foreign wars. The authorities patted them on the back, their peers accepted them and their overlords promoted them so long as they hewed to the narrative.
The freakout we’re presently witnessing is not about the billions in taxpayer money no longer being sent for DEI training in some foreign country, i.e., money-laundering to favored interests and cronies. They’re not really upset FBI agents are being fired, secrets are being revealed, that we are finally making an effort to prevent fentanyl from flowing across the border and killing our fellow citizens. These are good things, and even if you don’t agree, none of it is grounds for the meltdowns I see every day on social media.
What’s really happening is people who were assured they were the “good”, the empathic, the compassionate ones, those who towed the line during covid, got their boosters, wore their masks, “social distanced,” put pronouns in their bios, are being confronted with a terrifying realization: the behaviors and beliefs, to which they so dutifully attached themselves, for which they publicly and stridently advocated, whether online or at Thanksgiving dinner, are no longer being rewarded. In fact, they are being openly ridiculed. Instead of the pat on the back, increasingly Team Good is facing mockery and outright scorn.
There will be no legal consequences. No one will be arrested or put in a camp, delusions of persecution notwithstanding. If you produce real value for a real employer, you are not at risk of being fired. If you insist on perpetuating your derangement on social media you will not be deplatformed or canceled (that only happens to people speaking the truths inconvenient to the powerful.)
No, the reality is in some ways far worse: your entire worldview, on which you staked your self-image, is being dismantled in real time. You are no longer “good,” it’s becoming obvious to most the policies for which you advocated were catastrophic, the politicians for whom you voted deeply cynical and corrupt. The gaping abyss within your being to which you attached this superstructure of self-affirmation is dissolving into thin air. You are not “superior” like you thought, you are just another person suffering and existing like everyone else. And your only choices are to face that daunting reality or cling to a dying and useless paradigm, the end game for which is only madness.
We all want to feel good about ourselves, and like an obese person drugging themselves with high-fructose corn syrup for years, you have gorged on the distorted approbation of a sick society that, unpleasantly for you, is starting to heal. Your first laps around the track, so to speak, are going to hurt a lot.
. . .
I probably went on too long about the laptop class freakout. I have a lot of resentment toward the way they behaved the last five years. But I started this essay with the idea that I have my own problems, and in the end, I am not much different from them.
I want to produce more work, and of higher quality, but to what end? To feel good about my contributions, to have a sense that I am “good.” Maybe it’s not “good” in the lame “I complied with authority, and everyone likes me” kind of way, but it arises from the same source. That source is the emptiness within, wherein we require accolades, dopamine, positive feedback as a kind of justification for our existence. “No, I am not squandering my time on earth, living a comfortable life, I am asking hard questions, connecting with people, sharing hard-won insights. I am useful! I am good! I got my sixth dopamine booster from writing yet another essay!”
. . .
There is an irony in writing this piece. I feel as I type the cathartic nature of expressing these feelings. I am doing something worthwhile, everything is flowing out of me, the minutes are sailing by. I am identifying and solving this thorny problem simultaneously, engaging with the emptiness and dissatisfaction. The solution isn’t in the output, whatever one might think of it, it’s in giving attention to the feelings I’ve squandered too much time avoiding. I feel unworthy not because I do not produce enough work, it turns out, but because I am unwilling to connect with my deepest nature.
. . .
No matter how uneasy you feel, no matter how much fundamental doubt you have about your value as a human being, you can always start where you are. The feeling of unworthiness, the need for an escape, the craving for some kind of reward from your peers or the authorities or whatever easily-consumed carbohydrates you have in the kitchen is simply the present state in which you find yourself. It is not wrong or bad, it just is. And what is can always be examined, observed, given attention. Attending to that discomfort is always within reach.
. . .
The last thing I want to do is write an essay, face a purgatory of sitting down and consciously putting my feelings into words. It’s so much easier to distract oneself with all the news about the world, check 100 times a day the price of bitcoin and my other investments. But purgatory is the only way out of hell. The hell of wanting to succeed, of wanting to become “good.”
For some, that astroturfed worldview they so painstaking affixed to their empty souls is dissolving toward a revelation of the emptiness beneath. And unsurprisingly they are freaking out. But I’ve wasted too much time arguing with them, pointing out the ways in which they’re misinformed, driven by fear and derelict in their basic epistemic responsibilities. If you want to hold onto the lies you were told, knock yourself out. I’ve got my own problems.
-
@ 0fa80bd3:ea7325de
2025-01-29 14:44:48![[yedinaya-rossiya-bear.png]]
1️⃣ Be where the bear roams. Stay in its territory, where it hunts for food. No point setting a trap in your backyard if the bear’s chilling in the forest.
2️⃣ Set a well-hidden trap. Bury it, disguise it, and place the bait right in the center. Bears are omnivores—just like secret police KGB agents. And what’s the tastiest bait for them? Money.
3️⃣ Wait for the bear to take the bait. When it reaches in, the trap will snap shut around its paw. It’ll be alive, but stuck. No escape.
Now, what you do with a trapped bear is another question... 😏
-
@ fd208ee8:0fd927c1
2025-02-06 15:58:38Beginning at the start
In my previous article, The Establishment, I answered the question: "How do we form a company?" I realize, now, that I was getting a bit ahead, of myself, as the precursor to a company is a team, and many people struggle to form teams. So, I will go back to the beginning, and then you can read both articles to the end, and then stop.
The Initiation
The first, and most-difficult step of team formation, is the initiation. We know that it must be the most-difficult, as it's the step that carries the highest potential reward, and it's the step that is tried-and-failed most often. (Some people, like Elon Musk or Donald Trump, are born Initiators with excellent follow-through, but this archetype is exceedingly thin on the ground because it requires you to be mildly autistic, have barely-throttled ADHD, and/or tend to megalomania, also popularly known as "toxic masculinity", "CEO personality", or "being a successful military officer".)
Someone needs to form a useful, attractive Vision and then motivate other people to help them achieve it. That sounds really easy, but it's actually brutally difficult because * You have to come up with an idea that is coherent, plausible, and inspiring. * You have to be able to communicate that idea to other people and make it appealing to them, by tying it into their own personal goals and desires. * You have to be able to hone and reformulate that idea, constantly, to correct it or to re-motivate the other team members. * You have to defend the idea against detractors, naysayers, and trolls, and you have to do it so vociferously, that it will erode your own popularity among those who disagree with you and open you to personal attacks. * You have to be able to focus on the idea, yourself, for a long stretch of time, and not allow yourself to get bored, lazy, or distracted.
So, just do and be all of those things, and then initiate the team, with the method I will name the Hatbock Method. It is so named because of the classic, German initiation ritual, in which an Initiator stands up, loudly defines their Vision and calls into a group "Wer hat Bock?" (roughly, "Who has the hunger/desire?") and whoever responds with "Ich hab Bock." (roughly, "Yes, I hunger for this.") is a part of the team.
Then the Initiator says, "Okay, everyone with the hunger, let's sit down together, and discuss this some more." (This "sitting" is literally called a "seating", or "Sitzung", which is the German word for "meeting".)
The Sitting
We now get to the second most difficult part of team formation: figuring out where to sit. Most teams get this wrong, repeatedly, and many teams dissolve or fracture under the difficulty of this momentous decision. You would think organizing yourselves online would make this easier ("Oh, we'll just meet online!"), but the number of places available for sitting online are limitless. You can talk your whole Vision into the ground, with laborous discussions and migrations between Chachi, OxChat, Telegram, SimpleX, Slack, Discord, WhatsApp, GitHub, Teams, Coracle, Matrix... you get the idea.
Try to keep in mind that the Vision is more important than the seating area, and go with the flow. Simply, find someplace and go there. Worry about it again, at a later date. Don't lose momentum. Sit down and start discussing the Vision, immediately.
Now, this next bit is very important:
Do not let anyone outside your team influence where you sit!
...unless they are providing your team with some good, service, or income, that makes choosing their preferred location the superior choice.
This is the German Stammtisch principle, where a host encourages you to come sit down, regularly, in some particular place, because your sitting there provides them with some benefit: they can overhear your conversations, get you to test out their seating area, sell you refreshments, etc. Your choice of seating, in other words, is a valuable good, and you should only "sell" it to someone who rewards you in measure. They have to reward you because their preferred seating area wasn't your immediate and obvious choice, so there was probably something unappealing or uncertain about the seating area.
Plan it in
Once you've sat down, and finished your rough draft of the Vision, you need to figure out when to sit. This is the third most-difficult part of team formation. (Yes, don't worry, it gets easier as it goes along.)
The most popular plan is the Wirsehenuns Plan (roughly, "We'll see each other, around.") This can work quite well, if you just want to have a loose collaboration, that calls itself together in an ad hoc fashion, when a team member feels the need. Also known as "@ me, bros".
It's not a great plan for more intensive collaboration, as that tends to need a certain amount of velocity, to actually happen, as the speed of movement has a centrifugal effect on the tasks. Team momentum, in other words, creates a sort of gravity, that keeps the team together as a unit. So, for deeper teamwork, I would recommend the Stammtisch variant: name a place and date/time, when you will next meet. Preferably, on a rotating schedule: daily, weekly, last Thursday of the month, etc.
And then meet there and then. And discuss amongst yourselves. Set clear, short-term tasks (and assign them to particular people!), medium-term strategies, and longer-term goals. Write everything down. Anything not written down, is a suggestion, not an assigned task.
If you find your Stammtisch becoming increasingly rewarding and productive, and your goals start moving closer and closer into sight, then you might want to formalize your team structure further, as a company.
-
@ 3eba5ef4:751f23ae
2025-02-07 02:02:37🍨Your weekly byte of the latest updates from the Bitcoin ecosystem!
Crypto Insights
Security Crisis Revealed by Bitcoin Mempool Clearance
Recently, several Bitcoin blocks went unfilled as mempools cleared out and transaction fees hit 11-month low. Reduced activity on the network led miners to nearly clear out Bitcoin's pool of unconfirmed transactions. This post pointed out that these events highlight a potential security crisis.
What Has Been Done to Make Bitcoin Quantum-Safe?
According to Murch's response, there is currently no dedicated team within the Bitcoin community working on quantum security. However, related proposals exist, such as BIP-360: Pay to Quantum Resistant Hash, which aims to introduce a quantum-resistant output type.
A Variant of Cycling Attacks on Bitcoin Miners' Block Templates Disclosed
Antoine Riard reported a variant of cycling attacks that can censor transaction flows in miners' block templates. This enables attackers to manipulate Bitcoin fee rewards, maximizing their chances of mining blocks on the longest valid chain at the expense of honest miners.
Hurricash: A Multi-Signature Tool for Shared UTXOs
Hurricash is a multi-signature tool that allows multiple users to lock funds in a single UTXO while enabling unilateral exit with their contribution. Any member can spend money from Hurricash on Lightning Network since Hurricash can be a channel factory, or on the base layer via an LN-to-base-layer swap. Similar to Coinpools, but Hurricash requires everyone to exit with the same amount as everyone else.
Hurricash aims to address two key issues of the Lightning Network:
- High cost of opening channels (sometimes)
- Privacy concerns about placing channel-opening transactions on the base layer
Advantages of Hurricash:
- No soft fork required
- Computational cost for pool creation grows at O(n^3) instead of O(n!)
- Users can exit at any time, in any order, without coordination
- Unlike Ark, Hurricash has no central coordinator
- Unlike Ark, funds in Hurricash pools are not time-locked, allowing indefinite participation
Check out its GitHub for the code.
Fake Channels Are Real: Why Client-Side-Validated Lightning Is Easier Than You Think
Peter Todd argues that intermediary channels in the Lightning Network don’t need to be real. When Alice makes a payment via Alice ↔ Bob ↔ Charlie ↔ David, she only cares if David receives the payment, not whether Bob and Charlie’s channel exists.
This flexibility is particularly useful when using client-side-validated tokens like RGB or Taproot assets. Lightning payments can route through virtual channels, requiring only Alice’s channel to be valid. This eliminates third-party verification and enables users to route transactions with just a few MB of data.
Implementation of Non-Interactive Single-Round T-of-N Threshold Signature Protocol NOIST
Burak successfully implemented a 550/999 NOIST threshold multisig transaction. Check it out on mempool and watch the demo video.
NOIST (GitHub) is a non-interactive, single-round t-of-n threshold signing protocol. It allows multiple untrusted entities to generate a group key and produce signatures in constant time, preventing malicious signers from forcing a re-do. Its output is a 64-byte BIP-340-compatible Schnorr signature. Read more about NOIST.
Blockstream’s 2024 Year in Review
Blockstream reviewed its major developments over the past year, including:
- Multiple Core Lightning updates: such as dual funding, BOLT12, along with improved performance and accessibility
- BlockStream’s Lightning-as-a-Service (LaaS) Greenlight integrating with Europe’s leading Bitcoin platform Relai
- Hardware wallet Jade adding Miniscript support and reintroducing Anti-Exfil to counter Dark Skippy attacks
- Revamped Bitcoin desktop wallet BlockStream Green 2.0
- Sidechain-based, Bitcoin layer-2 settlement network Liquid advancements, including: Liquid Wallet Kit, testnet deployment of High-Assurance Smart Contract Simplicity, and ELIP 200 reducing transaction fees by up to 90%
Rizful: A Disposable Lightning Node Setup Tool
Rizful provides a quick and easy way for users to run their own Lightning nodes in the cloud, enabling instant receipt of zaps and other Lightning payments. Rizful nodes are disposable and fully implement the Nostr Wallet Connect specification, as well as instant inbound and self-managed channels.
Ark’s Minimally Dependent Wallet SDK for Bitcoin Transactions
Ark released a TypeScript-powered Wallet SDK that simplifies building Bitcoin wallet for both on-chain and off-chain transactions. The SDK follows the Noble Cryptography approach, minimizing dependencies while supporting Bitcoin and Ark transactions in web applications and mobile wallets—without WebAssembly overhead.
QuantumLink: Air-Gap-Level Security Over Bluetooth
Foundation introduced QuantumLink, a Bluetooth-based protocol that encrypts all data entering or exiting the Bluetooth chip with a quantum-resistant encryption scheme. This achieves a comparable level of air-gap security while maintaining convenience and flexibility.
Why DeepSeek is a Game Changer for AI x Crypto
The author argues that DeepSeek is a major breakthrough for AI + Crypto due to:
- Breaking the hardware-dependent AI computing model, challenging NVIDIA’s monopoly
- Using reinforcement learning (RL) and reasoning optimization instead of brute-force pre-training paradigm by piling up hardware
- Enabling cost-efficient AI Agent applications
- DeepSeek's open-source approach aligns with the decentralization principles of Crypto.
Tracking Bitcoin Adoption in the U.S.
StackStates.com provides an overview of state-level legislation on strategic Bitcoin reserves, helping track Bitcoin adoption across the U.S.
Top Reads on Blockchain and Beyond
RGB++: A New Approach to Bitcoin Scaling
This article explains why RGB++ offers a holistic solution that aligns with Bitcoin's original ethos in a landscape where existing scaling efforts often involve significant trade-offs—be it in security, decentralization, or usability.
RGB++’s major advantages:
- Enhanced Bitcoin Utility: RGB++ extends Bitcoin beyond a store of value and payment network, enabling decentralized applications, financial instruments, and cross-chain interactions without bridges.
- Scalability & Efficiency: Isomorphic binding allows advanced smart contracts without third-party trust, while transaction folding and off-chain asset issuance solve state bloat and boost throughput.
- Proven & Growing: RGB++ is already live on mainnet, with increasing adoption among users and dApps.
How the Zero-Click Deanonymization Attack Works via Cloudflare
The author discovered a unique attack method called the "zero-click deanonymization attack." This exploit allows attackers to pinpoint a target’s location within a 250-mile radius—without any user interaction. If the target has a vulnerable app installed—whether a mobile app or a background service on a computer—the attacker can send a malicious payload to reveal the target’s identity within seconds—the victim does’t even know. He found that hundreds of apps, including Signal, Discord, and Twitter/X, are vulnerable to this attack.
This article explains how the attack works through Cloudflare.
The Dangers of Central Bank Digital Currencies and Their Impact on Financial Independence and Privacy
This article explores the risks of Central Bank Digital Currencies (CBDCs) and their implications for financial independence and privacy. Referring to the International Monetary Fund’s CBDC Virtual Handbook, the author explains how CBDCs grant governments unprecedented control over transactions, enabling surveillance, restrictions, and financial coercion. The piece contrasts government-issued digital currencies with decentralized alternatives like Bitcoin, highlighting stark differences in privacy and user freedom.
-
@ f33c8a96:5ec6f741
2025-02-09 01:02:51I have been working on account linking in the backend for a little while and so far only GitHub has been available to users (mostly for following the dev journey on the platform)
Now with this release the existing OAUTH options AND Nostr NIP-07 authentication are surfaced and able to be linked to an existing profile on your settings page.
Put simply this allows you to easily link email, GitHub, and nostr profile in the plebdevs platform to access the same account from different login methods. This will make it much easier to keep the same profile across multiple devices AND make sure that you never lose access!
Let me know what you think and PLEASE LET ME KNOW if you find any bugs! (I love bugs 🐛)
ONWARDS 🫡
originally posted at https://stacker.news/items/880161
-
@ 0fa80bd3:ea7325de
2025-01-29 05:55:02The land that belongs to the indigenous peoples of Russia has been seized by a gang of killers who have unleashed a war of extermination. They wipe out anyone who refuses to conform to their rules. Those who disagree and stay behind are tortured and killed in prisons and labor camps. Those who flee lose their homeland, dissolve into foreign cultures, and fade away. And those who stand up to protect their people are attacked by the misled and deceived. The deceived die for the unchecked greed of a single dictator—thousands from both sides, people who just wanted to live, raise their kids, and build a future.
Now, they are forced to make an impossible choice: abandon their homeland or die. Some perish on the battlefield, others lose themselves in exile, stripped of their identity, scattered in a world that isn’t theirs.
There’s been endless debate about how to fix this, how to clear the field of the weeds that choke out every new sprout, every attempt at change. But the real problem? We can’t play by their rules. We can’t speak their language or use their weapons. We stand for humanity, and no matter how righteous our cause, we will not multiply suffering. Victory doesn’t come from matching the enemy—it comes from staying ahead, from using tools they haven’t mastered yet. That’s how wars are won.
Our only resource is the will of the people to rewrite the order of things. Historian Timothy Snyder once said that a nation cannot exist without a city. A city is where the most active part of a nation thrives. But the cities are occupied. The streets are watched. Gatherings are impossible. They control the money. They control the mail. They control the media. And any dissent is crushed before it can take root.
So I started asking myself: How do we stop this fragmentation? How do we create a space where people can rebuild their connections when they’re ready? How do we build a self-sustaining network, where everyone contributes and benefits proportionally, while keeping their freedom to leave intact? And more importantly—how do we make it spread, even in occupied territory?
In 2009, something historic happened: the internet got its own money. Thanks to Satoshi Nakamoto, the world took a massive leap forward. Bitcoin and decentralized ledgers shattered the idea that money must be controlled by the state. Now, to move or store value, all you need is an address and a key. A tiny string of text, easy to carry, impossible to seize.
That was the year money broke free. The state lost its grip. Its biggest weapon—physical currency—became irrelevant. Money became purely digital.
The internet was already a sanctuary for information, a place where people could connect and organize. But with Bitcoin, it evolved. Now, value itself could flow freely, beyond the reach of authorities.
Think about it: when seedlings are grown in controlled environments before being planted outside, they get stronger, survive longer, and bear fruit faster. That’s how we handle crops in harsh climates—nurture them until they’re ready for the wild.
Now, picture the internet as that controlled environment for ideas. Bitcoin? It’s the fertile soil that lets them grow. A testing ground for new models of interaction, where concepts can take root before they move into the real world. If nation-states are a battlefield, locked in a brutal war for territory, the internet is boundless. It can absorb any number of ideas, any number of people, and it doesn’t run out of space.
But for this ecosystem to thrive, people need safe ways to communicate, to share ideas, to build something real—without surveillance, without censorship, without the constant fear of being erased.
This is where Nostr comes in.
Nostr—"Notes and Other Stuff Transmitted by Relays"—is more than just a messaging protocol. It’s a new kind of city. One that no dictator can seize, no corporation can own, no government can shut down.
It’s built on decentralization, encryption, and individual control. Messages don’t pass through central servers—they are relayed through independent nodes, and users choose which ones to trust. There’s no master switch to shut it all down. Every person owns their identity, their data, their connections. And no one—no state, no tech giant, no algorithm—can silence them.
In a world where cities fall and governments fail, Nostr is a city that cannot be occupied. A place for ideas, for networks, for freedom. A city that grows stronger the more people build within it.
-
@ 876c2d06:5b86e2af
2025-02-06 18:08:52Kimsa6868 là một nền tảng giải trí kỹ thuật số hiện đại, mang đến trải nghiệm tối ưu với giao diện thân thiện và dễ sử dụng. Người dùng có thể truy cập trên nhiều thiết bị khác nhau như máy tính, điện thoại di động và máy tính bảng mà không gặp bất kỳ trở ngại nào. Hệ thống được thiết kế thông minh giúp tốc độ xử lý nhanh, ổn định, đảm bảo sự mượt mà trong quá trình sử dụng. Kimsa6868 luôn đặt sự thuận tiện của người dùng lên hàng đầu, tạo ra một không gian giải trí linh hoạt, đáp ứng nhu cầu của mọi đối tượng.
Một trong những điểm nổi bật nhất của KIMSA6868 chính là kho nội dung đa dạng và phong phú, liên tục được cập nhật để mang đến sự mới mẻ. Hình ảnh chất lượng cao, âm thanh sống động cùng với hiệu ứng sắc nét giúp người dùng có những trải nghiệm chân thực và hấp dẫn. Nền tảng này không ngừng đổi mới và cải tiến công nghệ nhằm mang đến sự lôi cuốn hơn trong từng nội dung, đảm bảo sự hài lòng cho mọi người dùng. Kimsa6868 không chỉ mang đến những trải nghiệm giải trí thú vị mà còn giúp người dùng khám phá nhiều nội dung hấp dẫn khác nhau.
Bên cạnh kho nội dung đặc sắc, Kimsa6868 đặc biệt chú trọng đến tính bảo mật và an toàn thông tin cho người dùng. Hệ thống được trang bị công nghệ mã hóa tiên tiến, giúp bảo vệ dữ liệu cá nhân một cách tối đa. Mọi hoạt động truy cập đều được kiểm soát chặt chẽ nhằm ngăn chặn rủi ro và đảm bảo sự riêng tư tuyệt đối. Chính sách bảo mật chặt chẽ của Kimsa6868 đã giúp nền tảng này xây dựng được lòng tin vững chắc từ cộng đồng người dùng, tạo nên một môi trường an toàn và minh bạch.
Ngoài ra, Kimsa6868 sở hữu đội ngũ hỗ trợ khách hàng chuyên nghiệp, hoạt động 24/7 để đảm bảo mọi thắc mắc và yêu cầu của người dùng được giải đáp kịp thời. Với phương châm đặt trải nghiệm khách hàng lên hàng đầu, Kimsa6868 cam kết mang đến dịch vụ chăm sóc tận tâm, giúp người dùng có thể yên tâm tận hưởng mọi tiện ích trên nền tảng. Đội ngũ hỗ trợ luôn sẵn sàng giúp đỡ, giải quyết các vấn đề nhanh chóng, mang đến sự thuận tiện và hài lòng tối đa.
Nhờ những ưu điểm vượt trội về công nghệ, nội dung đa dạng, bảo mật chặt chẽ và dịch vụ chăm sóc khách hàng chuyên nghiệp, Kimsa6868 đã trở thành một trong những nền tảng giải trí hàng đầu hiện nay. Sự kết hợp giữa hiện đại, tiện lợi và chất lượng cao đã giúp nền tảng này tạo dựng được vị thế vững chắc trên thị trường. Nếu bạn đang tìm kiếm một không gian giải trí toàn diện, an toàn và hấp dẫn, Kimsa6868 chắc chắn sẽ là sự lựa chọn lý tưởng dành cho bạn.
-
@ b8af284d:f82c91dd
2025-02-09 18:48:21Liebe Abonnenten,
viele von uns erleben im privaten wie im öffentlichen Leben gerade eine Zeit der Verwirrung und Irritation. Etwas scheint im Umbruch, alte Gewissheiten, Strukturen und Allianzen scheinen sich vor unseren Augen aufzulösen. Trump, Musk und Thiel wirken wie die Abrissbirnen einer alten Ordnung, Agenten des Chaos mit dem einzigen Ziel, sich selbst zu bereichern. Ist es so?
Könnte es anders sein?
Folgender Text kann und will diese Fragen nicht ultimativ beantworten. Es gibt aber eine Brille, durch die, setzt man sie auf, viele Entwicklungen in einem anderen, viel helleren Licht erscheinen. Diese Brille heißt e/acc.
Was ist e/acc?
Das Kürzel geht auf den Programmierer Guillaume Verdon zurück, der unter dem Pseudonym „Beff Jezos“ die Bewegung. Es steht für „effective accelerationism“. Accelerationism, auf Deutsch Akzelerationismus, abgeleitet vom Verb „beschleunigen“, hat Wurzeln, die weiter zurückreichen - dazu später mehr. Der Zusatz „effective“ ist eine ironische Replik auf den „effective Altruism“, den unter anderen Sam Bankman-Fried vertrat und grandios scheiterte.
e/acc setzt also auf Beschleunigung. Kapitalismus, Innovation, vor allem künstliche Intelligenz sollen nicht aufgehalten oder reguliert werden, sondern im Gegenteil beschleunigt werden.
Warum?
Eine einfache Antwort lautet: Weil sie eh stattfinden. Besonders deutlich wird das im Fall künstlicher Intelligenz. Large Language Models (LLMs) wie ChatGPT und Deepseek sind nur die für die Öffentlichkeit sichtbaren Entwicklungen. Im Hintergrund ersetzt Künstliche Intelligenz zunehmend auch Produktionsprozesse und nicht zuletzt die Kriegsführung. Man spricht deswegen vom „Point of Singularity“. In den kommenden Jahren wird künstliche Intelligenz menschliche übertrumpfen. Unsere Arbeitswelt, unser Finanzsystem und gesellschaftliche Strukturen werden sich grundlegend ändern. Wenn es dazu kommt, warum die Entwicklung noch aufhalten? Beschleunigen ist besser.
Die zweite Antwort ist tiefgründiger und rührt an das Verständnis von Leben insgesamt. Langfristig strebt das Universum nach Entropie. Es dehnt sich aus, bis alle Teile in maximaler „Unordnung“ angeordnet sind. Systeme mit hoher Energiezufuhr können Strukturen aufbauen, solange sie Wärme oder Entropie in ihre Umgebung abgeben. In einem Organismus sind alle Teile zu einer höheren Ordnung organisiert. Leben strebt nach Ordnung, Selbsterhalt und Wachstum, weshalb der Energieverbrauch zunimmt. e/acc-Fan und Silicon-Valley-Investor Marc Andreessen schreibt in “The Techno-Optimist Manifesto”:
Techno-Optimists believe that societies, like sharks, grow or die.
We believe growth is progress – leading to vitality, expansion of life, increasing knowledge, higher well being.
Ein Gleichgewicht gibt es nicht. Entweder strebt eine Struktur nach Ordnung (Leben) oder nach Unordnung (Tod). Da eine Balance nicht existiert, gibt es nur zwei Möglichkeiten: Verlangsamen oder Beschleunigen. Höhere Ordnungen aufbauen oder verfallen. Wachsen oder Sterben. Beschleunigen ist besser.
Konsequenzen
e/acc ist kein philosophisches System im strengen Sinn. Es leitet Konsequenzen aus physikalischen Grundsätzen ab.
Kapitalistische Systeme und freie Märkte sind die effizientesten Strukturen, um Informationen zu verarbeiten. In einem offenen, freien Markt gibt der Preis das zuverlässigste Signal über Knappheit eines Gutes. Wird dieser Prozess durch externe Einflussnahme wie Subventionen gestört, läuft die Maschine nicht effizient. Das Gesamtsystem wird verzerrt. Nochmals Andreessen dazu:
We believe the market economy is a discovery machine, a form of intelligence – an exploratory, evolutionary, adaptive system.
Varianten und Abweichungen sind wichtig, da ein System dadurch am schnellsten auf sich ständig verändernde Umweltbedingungen reagieren kann. Wer nicht frei sprechen kann, kann nicht frei denken. Dezentrale Strukturen mit vielen kleinen einzelnen „Nodes“ sind resilienter als hierarchisch-zentralistische Systeme. Das führt zu einem Meinungsfreiheits-Maximalismus.
Greifen staatliche Akteure in die Forschung ein, und vergeben zum Beispiel Lizenzen für KI-Projekte, kann das System nicht mehr auf die besten Ressourcen zurückgreifen. Es entwickelt sich nicht in seiner natürlichen Geschwindigkeit, sondern wird künstlich verlangsamt. Beschleunigen ist besser.
Im Falle von KI hat dies geopolitische Konsequenzen: Sollten autoritäre Akteure wie zum Beispiel China schneller zum Punkt der Singularity vorstoßen, entsteht eine Dystopie, ein Orwellscher Überwachungsstaat. Bevorzugen ist deswegen eine beschleunigte, dezentrale Forschung, damit freie Systeme die Oberhand behalten.
Dasselbe gilt für das Geldsystem: e/acc trifft hier auf Hayek und Mises. Viele Zahlungssysteme stehen in permanenter Konkurrenz zueinander. Am Ende setzt sich das nützlichste und vermutlich auch härteste Geld durch.
Konkrete Folgen
Auf die konkrete Politik übertragen führt das zu Konsequenzen, die man aktuell beobachten kann.
**Radikale Deregulierung: **Die Biden-Administration versuchte, AI-Forschung eng an die Regierung zu binden. Open-AI-Gründer Sam Altman forderte 2023 eine Lizenz-Vergabe an Unternehmen, um überhaupt in diesem Bereich aktiv zu werden. (Musk trat zunächst sogar für ein Forschungs-Moratorium ein, änderte dann aber seine Meinung.) Das führte zum Widerstand der e/acc-Fraktion im Silicon Valley, und gab den Ausschlag, sich auf die Trump-Seite zu stellen. Deregulierung zieht sich nun durch alle Bereiche der Wirtschaft: auch auf die „Entwicklungshilfe“ von USAID. Der Regierungsapparat wird insgesamt massiv verkleinert, da Bürokratie das Wachstum hemmt. A fuera.
**Priorisierung von günstiger Energie: **Da der Energie-Verbrauch mit zunehmender Ordnung ansteigt, und LLMs einen sehr viel Strom brauchen, priorisiert die neue Regierung die Erschließung zusätzlicher Energiequellen: Gas, Öl, Nuklear und regenerative Energiequellen gleichermaßen.
Wiederherstellung von Meinungsfreiheit.Content-Moderationen auf Social-Media-Plattformen fallen weg. Geheimdienst-Dokumente werden freigegeben. So schrieb Peter Thiel vor einigen Wochen in einem Essay in der Financial Times über die große Enthüllung:
\ But understood in the original sense of the Greek word apokálypsis, meaning “unveiling”, Obama could not give the same reassurance in 2025. Trump’s return to the White House augurs the apokálypsis of the ancien regime’s secrets. (…)\ The apokálypsis is the most peaceful means of resolving the old guard’s war on the internet, a war the internet won. My friend and colleague Eric Weinstein calls the pre-internet custodians of secrets the Distributed Idea Suppression Complex (DISC) — the media organisations, bureaucracies, universities and government-funded NGOs that traditionally delimited public conversation.
Krypto-Deregulierung: Da Kryptowährungen und Smart-Contract-Strukturen bestens mit LLMs harmonieren, werden Innovationsbremsen in Form von Regulierungen abgebaut.
**Umbruch der Weltordnung: **Auf der geopolitischen Ebene werden Bündnisse, Allianzen und Blockstrukturen aufgebrochen und nach effizienten Win-Win-Verhältnissen neu organisiert.
Erschließung neuer Lebenswelten: Degrowth, weniger Energie-Verbrauch und weniger Kinder sind keine Option, da sie zum Tod führen. Das System Menschheit muss wachsen und wird neue Lösungen erfinden. Wenn die Ressourcen des Planeten Erde nicht mehr ausreichen, müssen neue erschlossen werden - vielleicht auf dem Mars.
Die Ideengeschichte
Während e/acc ein relativ neues System ist, hat der Akzelerationismus tiefere Wurzeln. Lenin kann man als einen frühen Akzelerationisten bezeichnen. Der Marxismus wurde Anfang des 20. Jahrhunderts weniger als Ideologie, sondern mehr als exakte Wissenschaft begriffen. Demnach würde der Kapitalismus früher oder später an seinen eigenen Widerständen kollabieren. Warum den Prozess also nicht beschleunigen und die Revolution herbeiführen?
Ende des 20. Jahrhunderts griff der Philosoph Nick Land diese Gedanken wieder auf. Land forderte Beschleunigung, sah am Ende des Prozesses aber einen Kollaps des Systems und eine dunkle Zukunft. Ironie der Geschichte: Land zog in den 2000er Jahren nach China, wo er einen autoritären Akzelerationismus verwirklicht sah. Auch Steve Bannon, Leiter des ersten Trump-Wahlkampfes 2016, war von Lands Gedanken geprägt.
e/acc aber ist eine neuer, optimistischer „Fork“ des alten, dunklen Akzelerationismus. Es sieht eine positive Zukunft für die gesamte Menschheit aufgrund eines gigantischen Produktivitätsschubs. Eine neue, höhere Ordnung ist am Entstehen. Kurz gesagt:
Effective accelerationism (e/acc) in a nutshell:
Stop fighting the thermodynamic will of the universe
You cannot stop the acceleration
You might as well embrace it
A C C E L E R A T E
Notes on e/acc principles and tenets
Happy Future also? Durch die e/acc-Brille gesehen wirkt die Welt wesentlich heller und optimistischer als sie die meisten “Legacy Media” gerade darstellen. Demnach bewegen wir uns auf eine neue Zeit gesteigerter Produktivität und damit Lebensqualität zu. Wenn alle Arbeit von Maschinen verrichtet wird, können Menschen währenddessen auf Bali surfen, meditieren und Yoga machen. Oder?
Kritik
Leben entsteht an der Grenze von Chaos und Ordnung. Vielleicht versetzt e/acc das Pendel zu stark in den Ausschlag in eine Richtung. Unkontrolliertes Wachstum bedeutet im lebenden Organismen Krebs. e/acc sieht sich wie Marxisten der ersten Stunde (Lenin) im Besitz der Wahrheit in Form physikalischer Grundsätze. Erst durch diese Hybris führten zu den Grausamkeiten sozialistischer Systeme im 20. Jahrhundert. Schließlich beantwortet e/acc nicht die Frage nach der Verteilungsgerechtigkeit, die durch den gewaltigen Produktivitätsschub durch AI entstehen wird.
Ob e/acc als politisches und gesellschaftliches System taugt, ist deswegen fraglich. Aber viele aktuelle Entwicklungen scheinen durch die Akzelerationismus-Brille klarer.
Quellen:
Peter Thiel: A Time for Truth and Reconciliation
Marc Andreessen: The Techno-Optimist Manifesto
e/acc: Notes on e/acc principles and tenets
Andy Beckett: Accelerationism: how a fringe philosophy predicted the future we live in
Lex Friedman: Guillaume Verdon. e/acc-Movement. Physics. Computation & AGI.
-
@ 9e69e420:d12360c2
2025-01-26 15:26:44Secretary of State Marco Rubio issued new guidance halting spending on most foreign aid grants for 90 days, including military assistance to Ukraine. This immediate order shocked State Department officials and mandates “stop-work orders” on nearly all existing foreign assistance awards.
While it allows exceptions for military financing to Egypt and Israel, as well as emergency food assistance, it restricts aid to key allies like Ukraine, Jordan, and Taiwan. The guidance raises potential liability risks for the government due to unfulfilled contracts.
A report will be prepared within 85 days to recommend which programs to continue or discontinue.
-
@ 876c2d06:5b86e2af
2025-02-06 18:07:00Nohu56 là một nền tảng giải trí kỹ thuật số tiên tiến, mang đến trải nghiệm mượt mà với công nghệ hiện đại và giao diện thân thiện. Người dùng có thể dễ dàng truy cập trên mọi thiết bị như máy tính, điện thoại hoặc máy tính bảng mà không gặp bất kỳ trở ngại nào. Hệ thống được tối ưu hóa để đảm bảo tốc độ xử lý nhanh, giúp quá trình sử dụng diễn ra trơn tru, không gián đoạn. Sự linh hoạt này cho phép người dùng tận hưởng mọi tính năng một cách tiện lợi, bất kể họ đang ở đâu.
Một trong những điểm thu hút nhất của NOHU56 chính là kho nội dung phong phú, đa dạng và không ngừng được cập nhật. Hình ảnh sắc nét, âm thanh sống động kết hợp với hiệu ứng chân thực mang đến trải nghiệm giải trí lôi cuốn. Nền tảng này không chỉ đảm bảo chất lượng nội dung mà còn luôn đổi mới để mang lại sự mới mẻ và hấp dẫn cho người dùng. Dù bạn yêu thích phong cách cổ điển hay hiện đại, Nohu56 đều có thể đáp ứng mọi nhu cầu, giúp bạn luôn cảm thấy hứng thú mỗi khi truy cập.
Bên cạnh việc cung cấp nội dung chất lượng, Nohu56 đặc biệt chú trọng đến yếu tố bảo mật và quyền riêng tư. Hệ thống được trang bị công nghệ bảo mật tiên tiến, đảm bảo thông tin cá nhân của người dùng luôn được bảo vệ tối đa. Mọi hoạt động truy cập đều được mã hóa để ngăn chặn rủi ro và đảm bảo an toàn tuyệt đối. Chính sách bảo mật chặt chẽ giúp người dùng yên tâm tận hưởng trải nghiệm mà không cần lo lắng về các vấn đề liên quan đến dữ liệu cá nhân.
Ngoài ra, Nohu56 còn sở hữu đội ngũ chăm sóc khách hàng chuyên nghiệp, hoạt động 24/7 để hỗ trợ và giải đáp mọi thắc mắc một cách nhanh chóng. Với phương châm đặt người dùng làm trung tâm, nền tảng luôn đảm bảo rằng mọi yêu cầu đều được xử lý kịp thời. Dịch vụ chăm sóc tận tâm này giúp tạo dựng sự tin tưởng và gắn kết lâu dài giữa Nohu56 và cộng đồng người dùng. Bất cứ khi nào gặp vấn đề, bạn đều có thể nhận được sự trợ giúp một cách dễ dàng.
Với sự kết hợp giữa công nghệ tiên tiến, nội dung chất lượng cao, bảo mật an toàn và dịch vụ khách hàng chuyên nghiệp, Nohu56 đã khẳng định được vị thế vững chắc trên thị trường giải trí số. Không ngừng cải tiến và nâng cấp, nền tảng này mang đến một không gian trải nghiệm hiện đại, hấp dẫn và đáng tin cậy. Nếu bạn đang tìm kiếm một điểm đến giải trí toàn diện, tiện lợi và an toàn, Nohu56 chắc chắn là lựa chọn hoàn hảo dành cho bạn.
-
@ 9e69e420:d12360c2
2025-01-26 01:31:31Chef's notes
arbitray
- test
- of
- chefs notes
hedding 2
Details
- ⏲️ Prep time: 20
- 🍳 Cook time: 1 hour
- 🍽️ Servings: 5
Ingredients
- Test ingredient
- 2nd test ingredient
Directions
- Bake
- Cool
-
@ 9e69e420:d12360c2
2025-01-25 22:16:54President Trump plans to withdraw 20,000 U.S. troops from Europe and expects European allies to contribute financially to the remaining military presence. Reported by ANSA, Trump aims to deliver this message to European leaders since taking office. A European diplomat noted, “the costs cannot be borne solely by American taxpayers.”
The Pentagon hasn't commented yet. Trump has previously sought lower troop levels in Europe and had ordered cuts during his first term. The U.S. currently maintains around 65,000 troops in Europe, with total forces reaching 100,000 since the Ukraine invasion. Trump's new approach may shift military focus to the Pacific amid growing concerns about China.
-
@ 876c2d06:5b86e2af
2025-02-06 18:05:52Kimsa6868 là một nền tảng giải trí kỹ thuật số tiên tiến, mang đến trải nghiệm mượt mà và tiện lợi cho người dùng. Với giao diện hiện đại, thân thiện và dễ sử dụng, nền tảng này giúp người dùng dễ dàng thao tác trên mọi thiết bị, từ máy tính, điện thoại đến máy tính bảng. Công nghệ tiên tiến được áp dụng nhằm đảm bảo tốc độ xử lý nhanh chóng, giúp người dùng có thể truy cập mọi lúc, mọi nơi mà không gặp bất kỳ gián đoạn nào. Kimsa6868 không ngừng cải tiến hệ thống để mang đến những trải nghiệm tối ưu nhất.
Điểm nổi bật của KIMSA6868 chính là kho nội dung phong phú, đa dạng và chất lượng cao, luôn được cập nhật thường xuyên để đáp ứng nhu cầu của người dùng. Hình ảnh sắc nét, âm thanh sống động cùng hiệu ứng chân thực giúp tạo nên không gian giải trí hấp dẫn, mang lại cảm giác lôi cuốn ngay từ những lần trải nghiệm đầu tiên. Không chỉ tập trung vào việc nâng cao chất lượng nội dung, nền tảng còn không ngừng đổi mới công nghệ nhằm tạo ra những tính năng hiện đại, giúp người dùng có thêm nhiều sự lựa chọn phù hợp với sở thích của mình.
Bên cạnh nội dung hấp dẫn, Kimsa6868 đặc biệt chú trọng đến yếu tố bảo mật và an toàn thông tin. Hệ thống áp dụng các công nghệ bảo mật tiên tiến, đảm bảo dữ liệu cá nhân của người dùng được bảo vệ tối đa. Mọi hoạt động truy cập đều được mã hóa nhằm ngăn chặn rủi ro, mang lại sự yên tâm tuyệt đối cho người dùng. Việc đảm bảo an toàn và minh bạch trong mọi thao tác đã giúp Kimsa6868 trở thành một nền tảng uy tín, được đông đảo người dùng tin tưởng và lựa chọn.
Ngoài ra, Kimsa6868 sở hữu đội ngũ chăm sóc khách hàng chuyên nghiệp, luôn sẵn sàng hỗ trợ 24/7 để giải đáp mọi thắc mắc. Với phương châm đặt trải nghiệm người dùng lên hàng đầu, đội ngũ hỗ trợ luôn sẵn sàng tiếp nhận và xử lý nhanh chóng mọi yêu cầu. Người dùng có thể dễ dàng liên hệ để nhận được sự trợ giúp tận tình, đảm bảo quá trình trải nghiệm không bị gián đoạn. Sự tận tâm và chuyên nghiệp của đội ngũ hỗ trợ là một trong những yếu tố giúp Kimsa6868 khẳng định vị thế vững chắc trên thị trường.
Với những ưu điểm vượt trội về công nghệ, nội dung, bảo mật và dịch vụ chăm sóc khách hàng, Kimsa6868 đã trở thành một trong những nền tảng giải trí kỹ thuật số hàng đầu hiện nay. Sự kết hợp giữa giao diện hiện đại, tốc độ xử lý nhanh và dịch vụ chuyên nghiệp đã giúp nền tảng này chiếm được lòng tin của đông đảo người dùng. Nếu bạn đang tìm kiếm một không gian giải trí chất lượng, an toàn và tiện lợi, Kimsa6868 chắc chắn sẽ là một lựa chọn hoàn hảo.
-
@ 52adc2ef:9f4bc0ba
2025-02-06 14:39:36ใครบอก“คนเก่งกว้าง”ไม่ประสบความสำเร็จ มาเข้าใจเทคนิค เก่งกว้าง เพื่อประสบความสำเร็จกัน
เราว่าทุกคนคงเคยโดนปลูกฝังมาว่า ชีวิตเราต้องเรียนรู้ให้เก่งเฉพาะด้านไปเลย ถึงประสบความสำเร็จ
แต่เราเป็นคนนึงที่ไม่ได้มีความเก่งเฉพาะด้านขนาดนั้น (คิดว่าส่วนใหญ่เหมือนกัน) กระทั่งมาอ่านหนังสือ
*How to be better at (almost) everything*
ได้เจออีกมุมมองว่า ทุกทักษะสามารถนำมาประยุกต์ใช้เเละสามารถพาเรามีข้อได้เปรียบมากกว่า คนเก่งลึก ไม่ได้บอกคนเก่งลึกไม่ดีนะครับ เเต่จะชี้ไปว่าเก่งกว้างก็มีข้อดีของมัน
การเก่งกว้าง
1.ไม่จำเป็นต้องเก่งเป็น The Best ก็สามารถประสบความสำเร็จได้
2.การรู้หลายทักษะสามรถที่จะ adopt ในการทำสิ่งใหม่ได้ เหมือนเเซนวิส
ที่ต้องมี ขนมปัง ผักต่างๆ เนื้อสัตว์ ประกอบเข้าด้วยกัน3.เเละเมื่อเรามี skill ต่างๆที่หลากหลาย จะทำให้คู่แข่งของเราน้อยลง เช่น เพื่อนๆเป็นนักวิ่งที่เก่งมาก เเต่ไม่ถึงกับเก่งที่สุดในรุ่นก็ได้
เเต่ถ้ามีทักษะการการเขียน เราว่าจะสามารถถ่ายทอดเเละสื่อสารได้ดีกว่า นักวิ่งที่อาจจะวิ่งเก่งกว่าเรา เเละสามารถให้คนรู้จักเราได้มากกว่า
4.เเละเมื่อเรามีทักษะที่สนใจเเล้ว คนเราเปลี่ยนเเปลงตัวเองได้ เกิดจากสิ่งที่เราทำมากกว่าสิ่งที่เรารับ เพราะต้องฝึกฝนเพื่อให้เกิดการเปลี่ยนแปลง
อิสระในการเลือก
การมีอิสระในการเลือก เป็นสิ่งที่ทุกคนต้องการอยู่เเล้ว เเต่ในเมื่อเรามีสิทธิ์เลือก จะทำให้เราไม่ focus กับสิ่งที่ทำ เเต่การเป็นอิสระต้องเก่งก่อน หรือเรียกว่า
อิสระความเป็นเลิศ
ตัวอย่างเช่น เราอยากจะเล่นกีต้าร์ อาจจะฝึกเล่น คอร์ดต่างๆ ฝึกไล่สเกล picking ลูกเล่น ถ้าเราเเค่มีอิสระที่จะเลือกเล่นก็อาจได้เเค่ตีคอร์ด ร้องเพลง แค่นั้น
เเต่ถ้าเรามีอิสระความเป็นเลิศ เมื่อเราฝึกสิ่งที่ยากเก่งกว่าคนทั่วไป (เดี๋ยวจะบอกว่าควรฝึกมากเท่าไหร่) เราจะมีอิสระในการทำสิ่งนั้นๆ
เราจะสามารถเล่นได้อย่างอิสระอย่างแท้จริง สามารถที่จะคิด หรือ หยิบลูกเล่นต่างๆมาใช้ เพราะ เราจะรู้ว่าเทคนิคนี้ควรใช้ตรงไหน รู้ทั้งหมดก่อนเพื่อที่จะได้เลือกใช้
เชื่อเถอะ ความสุขเกิดจากการฝึกฝนเเละลงมือทำ
กฎ 5 ข้อของคนเก่งกว้าง
1.เรียนรู้หลายๆทักษะเเละนำทักษะทั้งหมดมารวมกัน
เช่น เพื่อนๆเล่นกีต้าร์เก่งเเบบ เทพสุดๆ เเต่ไม่มีทักษะ การขายตัวเอง ต้องพึ่งพาคนอื่นในการหางานเเสดงต่างๆ
กลับกันถ้าเล่นเก่งประมาณนึง เเละเล่นำด้หลายหลาย มีทักษะการขาย ที่เรียนรู้มา ก็มีโอกาสที่เราจะได้งานเเละเป็นที่รู้จักมากกว่า
2.Focus ฝึกฝนเพื่อเก่งระยะสั้น
การจะมีทักษะใหม่เพิ่มเข้ามา บางคนกลัวว่าทักษะเดิมที่อยู่เเล้วจะไม่พัฒนา เเต่ต้องพัฒนาทักษะใหม่โดยยอมเสียทักษะเดิมไปนิดหน่อย เพื่อพัฒนาเอาทักษะมาใช้ร่วมกัน
3.เก่งในทักษะนั้นๆ อย่างน้อย 80%
มาตรวัดคือ เมื่อเราฝึกฝนสิ่งนั้นเเล้ว การใช้เวลาในการฝึกฝนมากกว่าผลลัพธ์ที่ออกมา เเสดงว่าเราถึงจุดที่ทบทวนทักษะของตัวเองว่า ควร focus ทักษะอื่นๆมั้ย
เช่น ยกน้ำหนัก เราจะยกได้มากขึ้นในช่วงๆเเรก เเต่เมื่อถึงจุดนึง ที่ไม่ว่าเราเพิ่มน้ำหนักเข้า เพียงเล็กน้อย เรากลับใช้เวลามากในการฝึกฝน
4.Focus เเต่ทักษะที่จำเป็นตามเป้าหมาย
เราต้องหาประโยชน์ที่เราจะฝึกฝนในทักษะนั้นๆ โดยตัดส่วนที่ไม่จำเป็นออกไปก่อน เช่น ฝึกเล่นกีต้าร์ที่มีท่อน solo ยากๆ ให้อยากท่อนฝึก เเต่ละช่วงให้เก่ง เเละ ค่อยfocus ในส่วนต่อไป
5.เพิ่มระดับความยาก
ถ้าอยากจะเพิ่มทักษะใดๆก็ตาม ต้องเพิ่มระดับความยาก เป็นไปไม่ได้เลยเเม้เราจะมีวินัยในการฝึก เเต่เหมือนเดิมทุกวัน ไม่มีทางที่เราจะเก่งมากขึ้น
ทักษะสำหรับคนเก่งกว้าง
การจะเก่งกว้างนั้นต้องมีักษะพื้นฐานที่จำเป็นด้วย
- ทักษะพื้นฐาน เช่น ทักษะการใช้เหตุผล ทักษะการโน้มน้าว เป็นสิ่งพื้นฐานที่คนเราทุกคนควรต้องมี
- ทักษะที่เราสนใจ ถ้าเรามีสิ่งที่เราสนใจ เราสามารถฝึกฝนมันได้ดีมากขึ้น
- ทักษะการขาย เป็นสิ่งที่ขาดไม่ได้เลย เพราะเมื่อเพื่อนๆมีความสามารถ ควรที่จะให้คนอื่นรับรู้ ของคุณค่าสิ่งที่คุณมี
เมื่อเราทราบเเล้วมาเราควรต้องมีทักษะอะไรบ้าง
ระเบียบวินัย
- คือ การทำตามคำสั่งของตัวเอง โดยมีเเรงบัลดาลใจจากสิ่งที่ไม่ได้ชอบ
- สามารถเพิ่มความมั่นใจให้แก่เราได้ ตอนเริ่มต้นในการเริ่มต้นทักษะ เราจะไม่มีความมั่นใจเลย เพราะเราไม่เก่งมากพอ เเต่เมื่อเราทำจนเกิดผลลัพธ์ ความมั่นใจและระเบียบวินัยจะตามมา
- เพิ่ม Passion จากที่เราทำสิ่งที่ไม่ถนัดหรือไม่ชอบ เเต่เริ่มได้ skill เราจะเริ่มสนุกเเละมีความหลงใหลในทักษะนั้นๆ
สมาธิ
- โดยธรรมชาติ จะมี ”
แรงต้าน
” เพื่อที่จะทำให้เราพ่ายแพ้ต่อสิ่งที่เราตั้งใจหรือ Focus - สมาธิ หมายถึง การควบคุมสิ่งที่คิดในหัวตัวเองได้ เช่น เริ่มมีเเรงบัลดาลใจในการเขียน เเต่ก็อาจจะมี comment เเย่ๆ ที่เราต้องไปตอบโต้ก่อน ทำให้จากความตั้งใจเดิมของเรานั้นเสียไป
การโน้มน้าว
- ต้องหาเหตุผลสิ่งที่เราเชื่อเเละยึดมั่นในการให้เหตุผลสิ่งนั้นๆ
- การโน้มน้าวความโน้มน้าวกับคนที่เห็นด้วยกับเพื่อนๆ ซึ่งนั้นสามารถสร้างความสุขให้เค้าได้
- เเต่เมื่อคุณโน้มน้าวกับคนที่ไม่เห็นด้วยกับเพื่อนๆ ไม่มีทางแน่ๆที่เค้าจะฟัง
เหตุผล
- การมีเหตุผลคือ การที่เราสามารถที่จะเเสดงจุดยืนของตัวเองได้
ความเชื่อ
- ความเชื่ออยากจะเชื่อในสิ่งที่เป็นวิทยาศาสตร์ หรือ สิ่งเหนือธรรมชาติ ก็ได้ ถ้ามีเหตุผลที่ดีในการเชื่อ เท่านั้นพอ
- คนเราไม่สามารถที่จะพิสุจน์เรื่องเหนือธรรมชาติได้ ถ้าสิ่งนั้นอยู่เหนือธรรมชาติ หมายความว่า อยู่เหนือขอบเขตของวิทยาศาสตร์ไปแล้ว ไม่สามารถที่จะเอาหลักการวิทยาศาสตร์มาคุยได้
- “ความทุกข์ยาก จำเป็นในการสร้างคุณค่าของมนุษย์”
ค้นหาทักษะที่ชอบ
เมื่อพบทักษะที่สนใจจริงๆเเล้ว ควรต้องฝึกฝน เเค่คุณชอบหรือให้ความสำคัญกับมันมากพอ
คุณก็จะมีเวลาในการฝึกซ้อมกับมัน
อย่าลืม Focus เเต่การฝึกทักษะจำเป็น
การทำสิ่งที่ชอบ มีความสุข เเละดีต่อผู้อื่น นั้นคือการดำเนินชีวิตที่ถูกต้อง
เเละอย่าท้อ งานทุกชิ้นเกิดจากส่วนย่อยหลายๆส่วนประกอบกัน
เหมือนเเต่งเพลงโดยนำทำนองง่ายๆมาประกอบกันจนซับซ้อน
ทักษะที่เรามี ต้องสร้างประโยชน์แก่สังคม
โดยทั่วไปเเล้วมนุษย์เราตัดสินใจในลักษณะเดียวกันคือ
สิ่งนั้นมีประโยชน์หรือส้รางความสุขแก่ตนเอง
- เมื่อการตัดสินใจเป็นแบบนี้ ทำให้เศรฐกิจโตที่โตได้ เพราะ ทุกคนในสังคมมอบประโยชน์ให้แก่กัน
- หมั่นสังเกต เเละ เรียนรู้ จากตลาดว่า ผู้คนใช้จ่ายไปกับอะไร เเละ หาว่าทักษะของเรานั้น ให้ประโยชน์อะไรกับผู้คนเหล่านั้นได้บ้าง
- ทักษะการขายสำคัญมากกก
- เพื่อนๆจะมีความสุข เมื่อสิ่งที่ทำนั้นยากเเละมีความหมาย
สุดท้ายเตือนตัวเองว่า เหตุผลเเรกที่เราเริ่มทำอะไรบางอย่างคืออะไร อย่าลืมความรู้สึกตอนนั้น
-
@ 32e18276:5c68e245
2025-02-08 20:20:46This period of the Damus OpenSats grant has been productive, and encompasses the work past our alpha release of Notedeck. Since we sent our last report on Dec 5, this encompasses all the work after then.
Damus is supported by the OpenSats LTS grant, which allows us to continue working on the goodies below. Thank you!
Damus Notedeck
Added
- Initial algo timelines (William Casarin) #712
- Initial support for local-network P2P nostr: multicast support (William Casarin) #626
- First steps toward the notedeck browser: multiple app support #565
- Clicking a mention now opens profile page (William Casarin) 5a241d730
- Note previews when hovering reply descriptions (William Casarin) #591
-
Various Android updates and compatibility improvements (Ken Sedgwick, William Casarin)
-
Media uploads (kernelkind) #662
- Profile editing (kernelkind) #625
- Add hashtags to posts (Daniel Saxton) #592
- Enhanced command-line interface for user interactions (Ken Sedgwick)
- Debug features for user relay-list and mute list synchronization (Ken Sedgwick)
Changed
- Major timeline cache refactor (William Casarin) #653
- Increased ping intervals for network performance (William Casarin)
- Migrated to egui v0.29.1 (William Casarin) #551
- Switch to only notes & replies on some tabs (William Casarin) #598
- Only show column delete button when not navigating (William Casarin)
- Pointer interactions enhancements in UI (William Casarin)
- Show profile pictures in column headers (William Casarin)
-
Show usernames in user columns (William Casarin)
-
Add confirmation when deleting columns (kernelkind)
- Enhance Android build and performance (Ken Sedgwick)
- Image cache handling using sha256 hash (kieran)
- Introduction of decks_cache and improvements (kernelkind)
- Nostrdb update for async support (Ken Sedgwick)
- Persistent theme setup across sessions (kernelkind)
- Tombstone muted notes (Ken)
Fixed
- Fix GIT_COMMIT_HASH compilation issue (William Casarin)
- Fix avatar alignment in profile previews (William Casarin)
- Fix broken quote repost hitbox (William Casarin)
- Fix crash when navigating in debug mode (William Casarin)
- Fix long delays when reconnecting (William Casarin)
-
Fix repost button size (William Casarin)
-
Fixed since kind filters (kernelkind)
- Clippy warnings resolved (Dimitris Apostolou)
Damus iOS
Work continued on the iOS side. While I was not directly involved in the work since the last report, I have been directing and managing its development.
Added
- Render Gif and video files while composing posts (Swift Coder)
- Purple members who have been active for more than a year now get a special badge (Daniel D’Aquino)
- Add profile info text in stretchable banner with follow button (Swift Coder)
- Paste Gif image similar to jpeg and png files (Swift Coder)
Changed
- Improved clarity of the mute button to indicate it can be used for blocking a user (Daniel D’Aquino)
- Made the microphone access request message more clear to users (Daniel D’Aquino)
- Improved UX around the label for searching words (Daniel D’Aquino)
- Improved accessibility support on some elements (Daniel D’Aquino)
Fixed
- Fixed issue where the "next" button would appear hidden and hard to click on the create account view (Daniel D’Aquino)
- Fix non scrollable wallet screen (Swift Coder)
- Fixed suggested users category titles to be localizable (Terry Yiu)
- Fixed GradientFollowButton to have consistent width and autoscale text limited to 1 line (Terry Yiu)
- Fixed right-to-left localization issues (Terry Yiu)
- Fixed AddMuteItemView to trim leading and trailing whitespaces from mute text and disallow adding text with only whitespaces (Terry Yiu)
- Fixed SideMenuView text to autoscale and limit to 1 line (Terry Yiu)
- Fixed an issue where a profile would need to be input twice in the search to be found (Daniel D’Aquino)
- Fixed non-breaking spaces in localized strings (Terry Yiu)
- Fixed localization issue on Add mute item button (Terry Yiu)
- Replace non-breaking spaces with regular spaces as Apple's NSLocalizedString macro does not seem to work with it (Terry Yiu)
- Fixed localization issues in RelayConfigView (Terry Yiu)
- Fix duplicate uploads (Swift Coder)
- Remove duplicate pubkey from Follow Suggestion list (Swift Coder)
- Fix Page control indicator (Swift Coder)
- Fix damus sharing issues (Swift Coder)
- Fixed issue where banner edit button is unclickable (Daniel D’Aquino)
- Handle empty notification pages by displaying suitable text (Swift Coder)
Nostrdb
nostrdb, the engine that powers notecrumbs, damus iOS, and notedeck, continued to improve:
Added
- Added nip50 fulltext searching (William Casarin) #68, demo
- Added async migrations (William Casarin) #59
- Implement author queries (William Casarin) #57
- Make
ndb
threadsafe (William Casarin) #56
Nostrdb Rust
Our nostrdb rust bindings also had improvements
- Async! Adding efficient, poll-based stream support (William Casarin): #25
Notecrumbs
Notecrumbs, the njump-style opengraph server that powers the damus.io links, got an update that upgraded it to async nostrdb
- Switch to async nostrdb-rs (William Casarin) #16
How money was used
- relay.damus.io server costs
- Living expenses
Next quarter
Our goal for next update: zaps, android version, lists, outbox model for notedeck. Olas images in damus iOS, continue switching Damus iOS over to local relay model so we can add outbox support.
-
@ 1cb14ab3:95d52462
2025-02-08 16:45:04Tree branches. 4'8" circle. [Chongming Island, China. 2021]
Introduction
Tucked into a quiet forest park on Chongming Island, Chongming frames a view of a canal and a small alluvial landform that mirrors the island itself. This lens reflects the constant interplay of land and water, inviting viewers to contemplate the delicate balance of nature and the forces that shape it.
Site & Placement
The lens is hidden along a forest path, directing attention to the canal’s subtle currents and the land it divides. The bench, situated 12 feet from the lens, encourages visitors to pause and immerse themselves in the tranquil rhythm of the scene.
Impermanence & Integration
As an alluvial island shaped by shifting waters, Chongming is a fitting location for this ephemeral lens. Constructed from branches, the lens will eventually return to the land, echoing the natural processes that formed the island and continue to shape it.
Reflection
Chongming offers a meditative space to reflect on the impermanence of land and the forces that transform it. The work’s fleeting existence underscores the beauty of change, inviting viewers to appreciate the subtle, ongoing dance of nature.
Photos
More from the 'Earth Lens' Series:
Earth Lens Series: Artist Statement + List of Works
"Looking Glass" (Earth Lens 001)
"Grandfather" (Earth Lens 005)
More from Hes
All images are credit of Hes, but you are free to download and use for any purpose. If you find joy from my art, please feel free to send a zap. Enjoy life on a Bitcoin standard.
-
@ 6be5cc06:5259daf0
2025-01-21 20:58:37A seguir, veja como instalar e configurar o Privoxy no Pop!_OS.
1. Instalar o Tor e o Privoxy
Abra o terminal e execute:
bash sudo apt update sudo apt install tor privoxy
Explicação:
- Tor: Roteia o tráfego pela rede Tor.
- Privoxy: Proxy avançado que intermedia a conexão entre aplicativos e o Tor.
2. Configurar o Privoxy
Abra o arquivo de configuração do Privoxy:
bash sudo nano /etc/privoxy/config
Navegue até a última linha (atalho:
Ctrl
+/
depoisCtrl
+V
para navegar diretamente até a última linha) e insira:bash forward-socks5 / 127.0.0.1:9050 .
Isso faz com que o Privoxy envie todo o tráfego para o Tor através da porta 9050.
Salve (
CTRL
+O
eEnter
) e feche (CTRL
+X
) o arquivo.
3. Iniciar o Tor e o Privoxy
Agora, inicie e habilite os serviços:
bash sudo systemctl start tor sudo systemctl start privoxy sudo systemctl enable tor sudo systemctl enable privoxy
Explicação:
- start: Inicia os serviços.
- enable: Faz com que iniciem automaticamente ao ligar o PC.
4. Configurar o Navegador Firefox
Para usar a rede Tor com o Firefox:
- Abra o Firefox.
- Acesse Configurações → Configurar conexão.
- Selecione Configuração manual de proxy.
- Configure assim:
- Proxy HTTP:
127.0.0.1
- Porta:
8118
(porta padrão do Privoxy) - Domínio SOCKS (v5):
127.0.0.1
- Porta:
9050
- Proxy HTTP:
- Marque a opção "Usar este proxy também em HTTPS".
- Clique em OK.
5. Verificar a Conexão com o Tor
Abra o navegador e acesse:
text https://check.torproject.org/
Se aparecer a mensagem "Congratulations. This browser is configured to use Tor.", a configuração está correta.
Dicas Extras
- Privoxy pode ser ajustado para bloquear anúncios e rastreadores.
- Outros aplicativos também podem ser configurados para usar o Privoxy.
-
@ 5d4b6c8d:8a1c1ee3
2025-02-08 14:51:13We'll have to put an asterisk on today's number. I had a bite of my daughter's leftovers that didn't seem worth storing for later. By my understanding, that shouldn't be enough to mess with fasting metabolism and it doesn't feel like it did.
@realBitcoinDog wants me to get to 20 hours on one of these. I'm at 17 already (just took a sip of coffee), but I'm starting to get hungry, so today might not be the day. We'll see, though. The wife isn't making any indications that she's going to cook anything anytime soon, so my natural laziness might get me over the finish line.
Score Card
Day 1: 14 hour fast (13 dry) Day 2: 15 hour fast (14 dry) Day 3: 17 hours (16 dry) Day 4: 18 hours (17 dry) Day 5: 18 hours (16 dry) Day 6: 19 hours (16 dry) Day 7: 16 hours (15 dry) Day 8: TBD (17 dry)
edit: I just got handed some bread crusts that no one else is going to eat, so the fast is going to end pretty soon.
originally posted at https://stacker.news/items/879683
-
@ 4c191b5d:c42abba6
2025-02-09 17:07:59Weil ich schon länger über das Thema Direkte Demokratie nachdenke ein paar Gedanken dazu. Ich freue mich auf Ergänzungen und anderen Meinungen.
Grundannahme
Die Macht soll vom Souverän ausgehen, also dem Volk. Entsprechend soll das Volk auch an politischen Entscheidungsprozessen teilhaben können - was sehr viel Sinn macht.
Allerdings sind im aktuellen demokratischen Verständnis diverse Fehler, die zwangsläufig zu einer gesellschaftlichen Spaltung führen.
Gewinner und Verlierer
Die Demokratie spaltet die Bürger, indem sie Gewinner und Verlierer bei Wahlen und politischen Entscheidungen hervorbringt. Es geht nicht darum, eine Entscheidung zu erzielen, die bestmöglich durch alle getragen werden kann. Dies erfordert eine Reduktion der Widerstände gegen einen Entscheidungsvorschlag und der Integration dieser Widerstände in einen weiterentwickelten Entscheidungsvorschlag.
Mangel an neuen Lösungen und Machtkämpfe
Es fehlt an echtem Interesse und lösungsorientiertem Handeln was zu einem erstarren des Systems führt. Stattdessen entstehen Machtkämpfe, bei denen der Fokus auf der Durchsetzung eigener Agenden liegt und andere Standpunkte bekämpft werden. Dies ist vor allem dem Umstand geschuldet, dass die Individualinteressen sowie die politischen Gruppierungen (insbesondere Parteien) an ihren eigenen Lösungsansätzen festhalten.
Medien
Die Medien spielen eine sehr wichtige Rolle in der Demokratie, indem sie Informationen bereitstellen und Meinungen verbreiten. Allerdings können sie auch zu einer Spaltung der Bürger beitragen, indem sie unterschiedliche politische Ansichten verstärken oder polarisierende Inhalte verbreiten.
Manipulationstechniken werden eingesetzt, um die öffentliche Meinung zu beeinflussen und bestimmte Narrative zu fördern. Dies führt zu weiterer Polarisierung, die das Vertrauen der Bürger in die Medien und demokratische Prozesse untergraben. Eine kritische Medienkompetenz und eine vielfältige Berichterstattung sind daher entscheidend, um eine gesunde demokratische Debatte zu fördern und Spaltungen zu vermeiden.
Informationen
Bürger können ihre Verantwortung nur wahrnehmen, wenn sie Zugang zu einer Vielzahl von Informationen haben, um eine fundierte Meinung zu bilden. Jedoch ist ein aufkommendes Phänomen in letzter Zeit die Zensur und Unterdrückung von Informationen, was zu einer weiteren Spaltung führt. Wenn bestimmte Inhalte oder Standpunkte systematisch unterdrückt werden oder wenn Medienplattformen selektiv Informationen präsentieren, können Bürger in Filterblasen gefangen bleiben und nur einseitige Perspektiven erhalten. Um eine gesunde demokratische Debatte und eine effektive Meinungsbildung zu ermöglichen, ist es wichtig, dass Informationen frei zugänglich sind und dass Zensurmechanismen transparent und verantwortungsbewusst gehandhabt werden.
Starke Beeinflussung durch Geldgeber
Geld spielt eine bedeutende Rolle im politischen Prozess einer Demokratie. Diejenigen mit mehr finanziellen Mitteln haben grösseren Einfluss und können ihre Agenda stärker vorantreiben. Dies führt zu einem Ungleichgewicht der politischen Macht und spaltet die Bürger in unterschiedliche Lager.
Der grössere Kontext
Während die Demokratien sich immer weiter von der Eigenverantwortung weg zu entwickeln ,scheinen und stattdessen auf parentale Kontrolle setzten (der starke Staat), ist Bitcoin eine klare Bewegung hierzu. Denn Bitcoin setzt auf echte Eigenverantwortung.
Daher sind wir auch davon überzeugt, dass das Thema Eigenverantwortung nicht nur die politischen sondern auch wirtschaftlichen Strukturen verändern wird. Denn wenn sich die Gesellschaft verändert, hat dies auch einen Einfluss auf die Wirtschaft. Und mit Wirtschaft meinen wir vor allem auch die Frage, wie Unternehmen sich organisieren und strukturieren. Es macht ja wenig Sinn, auf der einen Seite von ultimativer Eigenverantwortung zu sprechen, die dann aber auf der anderen Seite klassisch Command&Control erleben (oben entscheidet jemand, unten wird ausgeführt).
-
@ baa2d142:a83c4194
2025-02-06 12:59:50In crypto innovation often builds on what came before. Liquid Staking Derivatives (LSDs) have been a pivotal development, reshaping how users earn yield in the decentralized space. But as the industry evolves, so do the demands of users and the limitations of existing systems. That’s where Cicada Foundation’s Liquid Yield Derivatives (LYDs) step in, it’s a next-generation approach to yield that doesn’t just adapt to the future but defines it.
What Are LSDs and Why Do They Matter?
LSDs introduced a breakthrough concept: earning rewards while keeping assets liquid. They allow users to stake tokens without locking them up, providing access to liquidity while still benefiting from staking rewards. This innovation unlocked significant opportunities, enabling DeFi users to put their assets to work without tying them down.
But LSDs have a critical flaw. The reliance on staking and re-staking creates cycles that are, at times, unsustainable. Inflationary rewards can dilute long-term value, and the pressure to keep staking introduces risk into the system. While LSDs have pushed the boundaries of what’s possible, the crypto industry has outgrown them.
Enter LYDs: The Future of Yield
Cicada Foundation’s Liquid Yield Derivatives (LYDs) take the best of LSDs and enhance them, addressing their challenges while introducing new possibilities. LYDs are built around three principles: sustainability, flexibility, and real yield.
-
Sustainability Over Speculation Unlike LSDs, which often rely on inflationary rewards, LYDs are backed by tangible revenue streams like real-world assets and protocol income. This ensures that yields are not only substantial but also sustainable, protecting long-term value for users.
-
Flexibility Without Compromise LYDs eliminate the need for staking or locking assets. Users retain full control and liquidity while still earning yield. This means no more tying up funds, no more staking cycles, just simple, accessible growth.
-
Real Yield, Real Impact The yield generated by LYDs is rooted in real-world value, not speculative tokenomics. This creates a reliable foundation for growth, benefiting both individual investors and the broader ecosystem.
Why LYDs Are the Next Evolution LSDs were a necessary step in the evolution of decentralized finance. They broke down barriers and proved that users could earn without giving up liquidity. But LYDs represent a leap forward. They’re not just an improvement; they’re a rethinking of how yield should work. Think of LSDs as the beta version of yield generation: exciting, functional, but with room for improvement. LYDs are the fully realized product, addressing the cracks in the foundation and building a system that’s stronger, more reliable, and ready for the future.
The Cicada Foundation’s Vision Cicada Foundation didn’t just create LYDs to compete with LSDs, it created them to solve the challenges that LSDs couldn’t overcome. Users demand more from their investments, LYDs deliver by focusing on sustainability and adaptability. Liquid Staking Derivatives showed us what’s possible. Liquid Yield Derivatives show us what’s next. With LYDs, Cicada Foundation has redefined how users think about yield offering a solution that’s not only smarter but built to last. It’s time to leave staking cycles behind and embrace a future where growth doesn’t come at the cost of sustainability.
Welcome to the era of LYDs. Welcome to Cicada.
-