-
@ 9ea10fd4:011d3b15
2025-03-03 14:47:43(Le français suit) I have the feeling of two brothers trying to remove the speck from each other’s eye but failing to see the beam in their own.
-
To liberal democracies, I say: The war in Ukraine, led by NATO, is a bad war that could have easily been avoided and would not have happened if NATO had respected the logic that applies to a country like Ukraine, adjacent to a great power, Russia. As a counterexample, would the United States accept a Russian or allied military presence on the Mexican border? It is so obvious that denying it is pure bad faith. I will not shed tears over your graves.
-
To the populist far-right, I say: To borrow the words of Le Monde’s editorial, too often, the denunciation of attacks on freedom of expression serves to mask the defense of the economic model of social media platforms owned by billionaires who, by promoting confrontation and fake news, spread hatred, hinder informed debate, and undermine democracy. Behind the idea of unlimited “free speech” lurks “the promotion of a far-right ideology eager to replace the rule of law with the law of the strongest, to the detriment of policies protecting social rights, women, and other victims of discrimination.”
Regarding political history, let it be noted that “this situation is the result of three decades of economic liberalism, which institutional left-wing forces have also embraced” (Alain Lipietz).
“It must be acknowledged: Trump’s United States is no longer a protection but a threat to democracy in Europe.”
Les Etats-Unis de Donald Trump, une menace pour la démocratie en Europe
**
J’ai le sentiment de deux frères qui essaient d’enlever la paille dans l’œil de l’autre, mais ne voient pas la poutre dans le leur.
-
Aux démocraties libérales, je dis : La guerre en Ukraine menée par l’OTAN est une mauvaise guerre qui aurait facilement pu être évitée et qui n’aurait pas eu lieu si l’OTAN avait respecté la logique s’appliquant à un pays, l’Ukraine, adjacent à une grande puissance, la Russie. En contre-exemple, les États-Unis accepteraient-ils une présence militaire russe ou de leurs alliés à la frontière avec le Mexique ? C’est tellement évident que c’en est de la mauvaise foi. Je n'irai pas pleurer sur vos tombes.
-
À l’extrême-droite populiste, je dis : Pour reprendre les termes de l’éditorial du journal Le Monde, trop souvent la dénonciation des entorses à la liberté d’expression masque la défense du modèle économique de médias sociaux détenus par des milliardaires qui, en promouvant la confrontation et les fake news, diffusent la haine, entravent les débats éclairés et sapent la démocratie. Sous la conception d’un « free speech » sans limite, « pointe la promotion d’une idéologie d’extrême droite avide de substituer la loi du plus fort aux politiques de défense des droits sociaux, des femmes et des autres victimes de discriminations ».
En ce qui concerne l’histoire politique, qu'il soit noté que « cette situation résulte de trois décennies de libéralisme économique, auxquelles se sont ralliées les forces de la gauche institutionnelle » (Alain Lipietz).
« Il faut se rendre à l’évidence : les Etats-Unis de Trump ne constituent plus une protection mais une menace pour la démocratie en Europe. »
Les Etats-Unis de Donald Trump, une menace pour la démocratie en Europe
-
-
@ f16adada:68b1dabc
2025-03-03 13:38:44{"hours":1,"content":"AGAIN","field":"General","mediaUrls":[]}
-
@ 0463223a:3b14d673
2025-03-03 13:33:46It’s now been a full week without prescribed drugs for being a spaz. The last week was tough to be honest, sleepless nights, constantly restless and uncomfortable, nausea, diarrhoea, headaches. Not dissimilar to giving up certain illegal drugs, not quite on a par with opiates but not dissimilar.
The physical symptoms have mostly subsided but I am rather emotionally unstable. I can imagine the Stoics of Nostr being quite stoically unimpressed by these ramblings. Obviously men never have emotions or feelings etc. We only discuss important subjects such as the works of Mises and Rothbard, we have no comprehension of the difference between art and craft, that’s for the women folk. We’re just a plain wallpaper of rational actions buying bitcoin bitcoin bitcoin...
Fuck that lol. I mean cool if that’s you, it’s not me. I started out a spaz and it’ll likely I’ll continue to be a spaz. I’m still trying to improve myself, I lifted some heavy things up and down this morning, eaten a healthy breakfast (although it wasn’t raw meat and salt, sorry) and am about to set about some practice before tonight’s session helping local youngsters with their music. I’ve worked my way through emails and I’m now writing this shit instead of doing some other bollocks. Maybe one day I’ll string a half coherent sentence together and become a V4V billionaire....
Existential dread is a laugh innit? I have no idea what the fuck I’m doing. I’ll make more music but it’s pretty futile. The hours of labour vs the financial return is terrible. I find it pretty amusing watching the numbers on my streams drop off in the morning whenever I play any of my own music... Clear market signals if ever I saw them but I stubbornly crack on anyway.
I’m sure at some point, through the process of putting shit on the internet, something will happen that’s of value to someone. Actually I have some nice supporters online which is very much appreciated and, as I said on my stream this morning, I’m grateful the same people come back each day. It’s like the most underground little club on the internet. I have 20 subscribers, no YouTube, X or Meta accounts. No LinkedIn. All is done on the free and open internet, either on a server I own or via some magical relays. So obviously this makes me 10x harder than Mark Zuckerberg, no matter how much Ju Jitsu he does. I’m not riffling through your underwear like a creepy perv.
If anyone reading this is ever wondering why capitalism gets such a bad rep, it’s because some of us are really, really shit at it. But I have a shed, no one’s taking that away from me. My cat is bad ass, I have an amazing wife and the sun is shining. I have a lot to be grateful for. I’ll keep trying to think of ways to earn a coin without selling my soul to the devil. There’s trade offs a plenty but I take responsibility for my own shit and I don’t have to sully myself with corporate bullshit.
Onwards and upwards. It’s a great day!
As Craig David didn’t once sing…
Stopped taking drugs on Monday Sleepless night and shivers on Tuesday We were throwing up by Wednesday And on Thursday & Friday & Saturday we chilled on Sunday
-
@ 91bea5cd:1df4451c
2025-02-04 17:24:50Definição de ULID:
Timestamp 48 bits, Aleatoriedade 80 bits Sendo Timestamp 48 bits inteiro, tempo UNIX em milissegundos, Não ficará sem espaço até o ano 10889 d.C. e Aleatoriedade 80 bits, Fonte criptograficamente segura de aleatoriedade, se possível.
Gerar ULID
```sql
CREATE EXTENSION IF NOT EXISTS pgcrypto;
CREATE FUNCTION generate_ulid() RETURNS TEXT AS $$ DECLARE -- Crockford's Base32 encoding BYTEA = '0123456789ABCDEFGHJKMNPQRSTVWXYZ'; timestamp BYTEA = E'\000\000\000\000\000\000'; output TEXT = '';
unix_time BIGINT; ulid BYTEA; BEGIN -- 6 timestamp bytes unix_time = (EXTRACT(EPOCH FROM CLOCK_TIMESTAMP()) * 1000)::BIGINT; timestamp = SET_BYTE(timestamp, 0, (unix_time >> 40)::BIT(8)::INTEGER); timestamp = SET_BYTE(timestamp, 1, (unix_time >> 32)::BIT(8)::INTEGER); timestamp = SET_BYTE(timestamp, 2, (unix_time >> 24)::BIT(8)::INTEGER); timestamp = SET_BYTE(timestamp, 3, (unix_time >> 16)::BIT(8)::INTEGER); timestamp = SET_BYTE(timestamp, 4, (unix_time >> 8)::BIT(8)::INTEGER); timestamp = SET_BYTE(timestamp, 5, unix_time::BIT(8)::INTEGER);
-- 10 entropy bytes ulid = timestamp || gen_random_bytes(10);
-- Encode the timestamp output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 0) & 224) >> 5)); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 0) & 31))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 1) & 248) >> 3)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 1) & 7) << 2) | ((GET_BYTE(ulid, 2) & 192) >> 6))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 2) & 62) >> 1)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 2) & 1) << 4) | ((GET_BYTE(ulid, 3) & 240) >> 4))); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 3) & 15) << 1) | ((GET_BYTE(ulid, 4) & 128) >> 7))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 4) & 124) >> 2)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 4) & 3) << 3) | ((GET_BYTE(ulid, 5) & 224) >> 5))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 5) & 31)));
-- Encode the entropy output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 6) & 248) >> 3)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 6) & 7) << 2) | ((GET_BYTE(ulid, 7) & 192) >> 6))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 7) & 62) >> 1)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 7) & 1) << 4) | ((GET_BYTE(ulid, 8) & 240) >> 4))); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 8) & 15) << 1) | ((GET_BYTE(ulid, 9) & 128) >> 7))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 9) & 124) >> 2)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 9) & 3) << 3) | ((GET_BYTE(ulid, 10) & 224) >> 5))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 10) & 31))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 11) & 248) >> 3)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 11) & 7) << 2) | ((GET_BYTE(ulid, 12) & 192) >> 6))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 12) & 62) >> 1)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 12) & 1) << 4) | ((GET_BYTE(ulid, 13) & 240) >> 4))); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 13) & 15) << 1) | ((GET_BYTE(ulid, 14) & 128) >> 7))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 14) & 124) >> 2)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 14) & 3) << 3) | ((GET_BYTE(ulid, 15) & 224) >> 5))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 15) & 31)));
RETURN output; END $$ LANGUAGE plpgsql VOLATILE; ```
ULID TO UUID
```sql CREATE OR REPLACE FUNCTION parse_ulid(ulid text) RETURNS bytea AS $$ DECLARE -- 16byte bytes bytea = E'\x00000000 00000000 00000000 00000000'; v char[]; -- Allow for O(1) lookup of index values dec integer[] = ARRAY[ 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 255, 255, 255, 255, 255, 255, 255, 10, 11, 12, 13, 14, 15, 16, 17, 1, 18, 19, 1, 20, 21, 0, 22, 23, 24, 25, 26, 255, 27, 28, 29, 30, 31, 255, 255, 255, 255, 255, 255, 10, 11, 12, 13, 14, 15, 16, 17, 1, 18, 19, 1, 20, 21, 0, 22, 23, 24, 25, 26, 255, 27, 28, 29, 30, 31 ]; BEGIN IF NOT ulid ~* '^[0-7][0-9ABCDEFGHJKMNPQRSTVWXYZ]{25}$' THEN RAISE EXCEPTION 'Invalid ULID: %', ulid; END IF;
v = regexp_split_to_array(ulid, '');
-- 6 bytes timestamp (48 bits) bytes = SET_BYTE(bytes, 0, (dec[ASCII(v[1])] << 5) | dec[ASCII(v[2])]); bytes = SET_BYTE(bytes, 1, (dec[ASCII(v[3])] << 3) | (dec[ASCII(v[4])] >> 2)); bytes = SET_BYTE(bytes, 2, (dec[ASCII(v[4])] << 6) | (dec[ASCII(v[5])] << 1) | (dec[ASCII(v[6])] >> 4)); bytes = SET_BYTE(bytes, 3, (dec[ASCII(v[6])] << 4) | (dec[ASCII(v[7])] >> 1)); bytes = SET_BYTE(bytes, 4, (dec[ASCII(v[7])] << 7) | (dec[ASCII(v[8])] << 2) | (dec[ASCII(v[9])] >> 3)); bytes = SET_BYTE(bytes, 5, (dec[ASCII(v[9])] << 5) | dec[ASCII(v[10])]);
-- 10 bytes of entropy (80 bits); bytes = SET_BYTE(bytes, 6, (dec[ASCII(v[11])] << 3) | (dec[ASCII(v[12])] >> 2)); bytes = SET_BYTE(bytes, 7, (dec[ASCII(v[12])] << 6) | (dec[ASCII(v[13])] << 1) | (dec[ASCII(v[14])] >> 4)); bytes = SET_BYTE(bytes, 8, (dec[ASCII(v[14])] << 4) | (dec[ASCII(v[15])] >> 1)); bytes = SET_BYTE(bytes, 9, (dec[ASCII(v[15])] << 7) | (dec[ASCII(v[16])] << 2) | (dec[ASCII(v[17])] >> 3)); bytes = SET_BYTE(bytes, 10, (dec[ASCII(v[17])] << 5) | dec[ASCII(v[18])]); bytes = SET_BYTE(bytes, 11, (dec[ASCII(v[19])] << 3) | (dec[ASCII(v[20])] >> 2)); bytes = SET_BYTE(bytes, 12, (dec[ASCII(v[20])] << 6) | (dec[ASCII(v[21])] << 1) | (dec[ASCII(v[22])] >> 4)); bytes = SET_BYTE(bytes, 13, (dec[ASCII(v[22])] << 4) | (dec[ASCII(v[23])] >> 1)); bytes = SET_BYTE(bytes, 14, (dec[ASCII(v[23])] << 7) | (dec[ASCII(v[24])] << 2) | (dec[ASCII(v[25])] >> 3)); bytes = SET_BYTE(bytes, 15, (dec[ASCII(v[25])] << 5) | dec[ASCII(v[26])]);
RETURN bytes; END $$ LANGUAGE plpgsql IMMUTABLE;
CREATE OR REPLACE FUNCTION ulid_to_uuid(ulid text) RETURNS uuid AS $$ BEGIN RETURN encode(parse_ulid(ulid), 'hex')::uuid; END $$ LANGUAGE plpgsql IMMUTABLE; ```
UUID to ULID
```sql CREATE OR REPLACE FUNCTION uuid_to_ulid(id uuid) RETURNS text AS $$ DECLARE encoding bytea = '0123456789ABCDEFGHJKMNPQRSTVWXYZ'; output text = ''; uuid_bytes bytea = uuid_send(id); BEGIN
-- Encode the timestamp output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 0) & 224) >> 5)); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 0) & 31))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 1) & 248) >> 3)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 1) & 7) << 2) | ((GET_BYTE(uuid_bytes, 2) & 192) >> 6))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 2) & 62) >> 1)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 2) & 1) << 4) | ((GET_BYTE(uuid_bytes, 3) & 240) >> 4))); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 3) & 15) << 1) | ((GET_BYTE(uuid_bytes, 4) & 128) >> 7))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 4) & 124) >> 2)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 4) & 3) << 3) | ((GET_BYTE(uuid_bytes, 5) & 224) >> 5))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 5) & 31)));
-- Encode the entropy output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 6) & 248) >> 3)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 6) & 7) << 2) | ((GET_BYTE(uuid_bytes, 7) & 192) >> 6))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 7) & 62) >> 1)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 7) & 1) << 4) | ((GET_BYTE(uuid_bytes, 8) & 240) >> 4))); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 8) & 15) << 1) | ((GET_BYTE(uuid_bytes, 9) & 128) >> 7))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 9) & 124) >> 2)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 9) & 3) << 3) | ((GET_BYTE(uuid_bytes, 10) & 224) >> 5))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 10) & 31))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 11) & 248) >> 3)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 11) & 7) << 2) | ((GET_BYTE(uuid_bytes, 12) & 192) >> 6))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 12) & 62) >> 1)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 12) & 1) << 4) | ((GET_BYTE(uuid_bytes, 13) & 240) >> 4))); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 13) & 15) << 1) | ((GET_BYTE(uuid_bytes, 14) & 128) >> 7))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 14) & 124) >> 2)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 14) & 3) << 3) | ((GET_BYTE(uuid_bytes, 15) & 224) >> 5))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 15) & 31)));
RETURN output; END $$ LANGUAGE plpgsql IMMUTABLE; ```
Gera 11 Digitos aleatórios: YBKXG0CKTH4
```sql -- Cria a extensão pgcrypto para gerar uuid CREATE EXTENSION IF NOT EXISTS pgcrypto;
-- Cria a função para gerar ULID CREATE OR REPLACE FUNCTION gen_lrandom() RETURNS TEXT AS $$ DECLARE ts_millis BIGINT; ts_chars TEXT; random_bytes BYTEA; random_chars TEXT; base32_chars TEXT := '0123456789ABCDEFGHJKMNPQRSTVWXYZ'; i INT; BEGIN -- Pega o timestamp em milissegundos ts_millis := FLOOR(EXTRACT(EPOCH FROM clock_timestamp()) * 1000)::BIGINT;
-- Converte o timestamp para base32 ts_chars := ''; FOR i IN REVERSE 0..11 LOOP ts_chars := ts_chars || substr(base32_chars, ((ts_millis >> (5 * i)) & 31) + 1, 1); END LOOP; -- Gera 10 bytes aleatórios e converte para base32 random_bytes := gen_random_bytes(10); random_chars := ''; FOR i IN 0..9 LOOP random_chars := random_chars || substr(base32_chars, ((get_byte(random_bytes, i) >> 3) & 31) + 1, 1); IF i < 9 THEN random_chars := random_chars || substr(base32_chars, (((get_byte(random_bytes, i) & 7) << 2) | (get_byte(random_bytes, i + 1) >> 6)) & 31 + 1, 1); ELSE random_chars := random_chars || substr(base32_chars, ((get_byte(random_bytes, i) & 7) << 2) + 1, 1); END IF; END LOOP; -- Concatena o timestamp e os caracteres aleatórios RETURN ts_chars || random_chars;
END; $$ LANGUAGE plpgsql; ```
Exemplo de USO
```sql -- Criação da extensão caso não exista CREATE EXTENSION IF NOT EXISTS pgcrypto; -- Criação da tabela pessoas CREATE TABLE pessoas ( ID UUID DEFAULT gen_random_uuid ( ) PRIMARY KEY, nome TEXT NOT NULL );
-- Busca Pessoa na tabela SELECT * FROM "pessoas" WHERE uuid_to_ulid ( ID ) = '252FAC9F3V8EF80SSDK8PXW02F'; ```
Fontes
- https://github.com/scoville/pgsql-ulid
- https://github.com/geckoboard/pgulid
-
@ a012dc82:6458a70d
2025-03-03 13:22:08The dynamic landscape of Bitcoin and blockchain technology is a testament to the relentless innovation and debate that drives this sector forward. A pivotal figure in this narrative is Adam Back, CEO of Blockstream, whose recent insights and proposals have stirred a significant conversation within the Bitcoin community. His stance on the indomitable nature of JPEGs and other media inscriptions on the Bitcoin blockchain, along with his suggestion for a block size increase, is not just a technical observation but a philosophical statement about the future direction of Bitcoin. This article delves into the implications of Back's views, exploring how they could shape the trajectory of Bitcoin in the years to come.
Table of Contents
-
The Unstoppable Nature of Bitcoin Inscriptions
-
JPEGs on the Blockchain: A New Reality
-
Implications for the Bitcoin Ecosystem
-
-
Adam Back's Proposal for Block Size Increase
-
A Technical Solution to a Growing Challenge
-
Balancing Innovation and Network Integrity
-
-
Comparative Analysis with Ethereum's Innovations
-
Bitcoin and Ethereum: Divergent Paths Converging?
-
Learning from Ethereum's Approach
-
-
Conclusion
-
FAQs
The Unstoppable Nature of Bitcoin Inscriptions
JPEGs on the Blockchain: A New Reality
Adam Back's acknowledgment of the unstoppable nature of JPEGs on the Bitcoin blockchain is a watershed moment. It signifies a recognition of the blockchain's evolving utility, transcending its original financial transactional purpose. This evolution raises fundamental questions about the nature of Bitcoin. Is it merely a financial tool, or is it morphing into a broader digital canvas for various forms of data? The embedding of JPEGs and other media, known as inscriptions, is not just a technical feat but a cultural shift in the perception and usage of Bitcoin.
Implications for the Bitcoin Ecosystem
The phenomenon of media inscriptions on the Bitcoin blockchain is a double-edged sword. On one hand, it showcases the network's versatility and the ingenuity of its users. On the other hand, it introduces new challenges in terms of network efficiency and focus. The primary concern is the potential for network congestion, as the blockchain is burdened with non-financial data. This could lead to slower transaction times and higher fees for traditional Bitcoin transactions, potentially undermining the network's primary purpose as a digital currency. Moreover, there's a philosophical debate within the community about the purity of Bitcoin's original vision versus its evolving nature.
Adam Back's Proposal for Block Size Increase
A Technical Solution to a Growing Challenge
In response to the burgeoning use of Bitcoin for media inscriptions, Adam Back has put forth a bold proposal: increasing the block size of the Bitcoin blockchain. This proposal is not merely a technical adjustment; it's a strategic move to accommodate the growing diversity of uses of the Bitcoin network. By introducing a "segwit annex" for additional space in each block, Back is advocating for a more inclusive Bitcoin that can support both its traditional financial role and its emerging function as a digital ledger for various forms of data.
Balancing Innovation and Network Integrity
The crux of Back's proposal lies in finding a middle ground between fostering innovation and preserving the network's efficiency and purpose. The proposed block size increase is a recognition that the Bitcoin network needs to evolve to accommodate new uses while ensuring that it remains a robust and efficient platform for financial transactions. This proposal also reflects a pragmatic approach to blockchain development, acknowledging that rigid adherence to original designs may not be suitable in the face of changing user behaviors and technological advancements.
Comparative Analysis with Ethereum's Innovations
Bitcoin and Ethereum: Divergent Paths Converging?
The proposed changes to Bitcoin's block structure draw an interesting parallel with developments in the Ethereum blockchain. Ethereum's EIP-4844, known as Proto-Danksharding, introduces the concept of temporary data blobs with a separate fee market, a concept somewhat mirrored in Back's proposal for Bitcoin. This comparison is crucial as it underscores the evolving nature of blockchain technology and the different paths taken by these two leading networks. While Bitcoin has traditionally focused on being a digital currency, Ethereum has been more open to diverse applications from its inception.
Learning from Ethereum's Approach
Ethereum's approach to scalability and functionality, particularly with EIP-4844, offers valuable lessons for Bitcoin. It demonstrates the feasibility of integrating new features and capabilities into an established blockchain network while maintaining its core functions. For Bitcoin, adopting a similar approach could mean not only enhanced functionality but also increased relevance in a rapidly evolving digital landscape. It's a testament to the fluidity and adaptability of blockchain technology, where innovations in one network can inspire and inform developments in another.
Conclusion
Adam Back's perspective on JPEGs and his proposal for block size expansion mark a critical moment in the evolution of Bitcoin. As the Bitcoin community navigates these developments, it faces the challenge of embracing change while staying true to the core principles that have defined Bitcoin since its inception. The future of Bitcoin, shaped by these ongoing discussions and decisions, remains a fascinating and significant topic in the broader narrative of cryptocurrency and blockchain technology. The path Bitcoin takes will not only influence its own trajectory but also set precedents for the future development of blockchain technology as a whole.
FAQs
What is Adam Back's stance on JPEGs on the Bitcoin blockchain? Adam Back, CEO of Blockstream, acknowledges that embedding JPEGs and other media, known as inscriptions, on the Bitcoin blockchain is unstoppable. He views this as a natural evolution of the blockchain's capabilities.
Why is the embedding of JPEGs on Bitcoin significant? The embedding of JPEGs signifies a shift in how the Bitcoin blockchain is used, extending beyond its original purpose of financial transactions to a broader digital platform for various data types.
What is Adam Back's proposal for the Bitcoin blockchain? Adam Back proposes increasing the Bitcoin block size to accommodate the growing use of the network for media inscriptions. This includes adding a "segwit annex" for additional space in each block.
How does Adam Back's proposal aim to balance Bitcoin's functionality? Back's proposal aims to balance innovation with network efficiency by providing dedicated space for inscriptions, thus managing network congestion while maintaining efficient transaction processing.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co/
Youtube: @thebitcoinlibertarian
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
Get Orange Pill App And Connect With Bitcoiners In Your Area. Stack Friends Who Stack Sats link: https://signup.theorangepillapp.com/opa/croxroad
Buy Bitcoin Books At Konsensus Network Store. 10% Discount With Code “21croxroad” link: https://bitcoinbook.shop?ref=21croxroad
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ 95cb4330:96db706c
2025-03-03 12:55:48The Eisenhower Matrix, also known as the Urgent-Important Matrix, is a powerful time-management tool that helps prioritize tasks based on their urgency and importance. Developed from former President Dwight D. Eisenhower's management style, this matrix enables individuals to focus on activities that drive long-term success while effectively managing immediate demands.
How the Eisenhower Matrix Works
Tasks are categorized into four quadrants:
- Urgent and Important:
Tasks requiring immediate attention and contributing significantly to your goals. - Examples: Crisis management, pressing deadlines.
-
Action: Address these tasks promptly to prevent escalation.
-
Important but Not Urgent:
Tasks that are vital for long-term success but do not require immediate action. - Examples: Strategic planning, skill development.
-
Action: Schedule specific times to focus on these activities, ensuring consistent progress.
-
Urgent but Not Important:
Tasks that demand quick attention but have less impact on your long-term objectives. - Examples: Interruptions, non-essential meetings.
-
Action: Delegate these tasks when possible to free up time for more important activities.
-
Neither Urgent nor Important:
Tasks that offer minimal value and can be considered distractions. - Examples: Time-wasting activities, excessive social media use.
- Action: Eliminate or minimize engagement in these tasks to enhance productivity.
Benefits of Using the Eisenhower Matrix
-
Enhanced Productivity:
By focusing on important tasks, you achieve meaningful progress toward your goals. -
Improved Time Management:
Distinguishing between urgent and important tasks helps allocate time more effectively. -
Reduced Stress:
Prioritizing tasks prevents last-minute rushes and the anxiety associated with looming deadlines.
Implementing the Eisenhower Matrix
-
List Your Tasks:
Write down all tasks and responsibilities. -
Categorize Each Task:
Assign each task to one of the four quadrants based on its urgency and importance. -
Take Appropriate Action:
Manage each task according to its quadrant's recommended action plan. -
Review Regularly:
Consistently assess and adjust your task list to ensure alignment with your evolving goals and priorities.
By integrating the Eisenhower Matrix into your daily routine, you can enhance focus, productivity, and overall effectiveness in both personal and professional endeavors.
For a visual guide on implementing the Eisenhower Matrix, you might find this tutorial helpful:
- Urgent and Important:
-
@ a296b972:e5a7a2e8
2025-03-03 12:38:59Bislang war die NATO das Trojanische Pferd der USA, um ihre Interessen weltweit durchzusetzen. Das sogenannte Verteidigungsbündnis hat sich mangels Gelegenheit einer militärischen Verteidigung mehr auf Aktionen wie im Kosovo konzentriert.
Mit seinen Stützpunkten in Europa hat die USA-NATO bislang die Möglichkeit geschaffen, potenzielle kriegerische Auseinandersetzungen aus dem eigenen Land fernzuhalten, zu zeigen wer die Hosen anhat und überall die Finger mit im Spiel zu haben. Sozusagen militärisches Outsourcing.
Als Gegenleistung darf Europa theoretisch unter die Bettdecke der USA-NATO krabbeln, wenn es draußen mal so richtig kalt werden sollte. Ob das auch wirklich so geschehen würde, wenn es darauf ankommt, bleibt fraglich.
Die NATO-Osterweiterung ist ein übergriffiges Heranrücken der USA an Russland, ein Ignorieren und Übergehen eines für beide Weltmächte nötigen Sicherheitsabstands.
Wenn der Nachbar mit seinen Anbauten immer mehr an die eigene Grundstücksgrenze heranrückt, den Sicherheitsabstand nicht einhält, und in seiner Großkotzigkeit immer weiter macht (weil er, überheblich, wie er ist, glaubt, dass er es kann), dann ist irgendwann der Punkt erreicht, wo man sagt: Schluss jetzt!
Den dicken Vorschlaghammer rauszuholen, ist dann sicher nicht die beste Lösung, aber was soll man machen, wenn alles Reden und die Versuche aufeinander zuzugehen und eine gemeinsame Lösung zu finden, von der Seite des Aggressors in seiner impertinenten Arroganz nicht für nötig gehalten wird.
Dieser Punkt war im Februar 2022 mit Überlegungen zum Beitritt der Ukraine in die NATO erreicht und Russland ist in die Ukraine einmarschiert. Es folgte eine massive Unterstützung der USA in Form von Logistik, Technologie (Starlink), Waffen, Bedienungspersonal und jede Menge Kohle. Und weil Deutschland ja gerne ganz vorne mitmischt und Uncle Sam zeigen will, was für ein braver Nick-August und treuer Vasall Deutschland ist, hat man sich gleich an die zweite Stelle emporgedient.
Wegen der Gefahr, dass „versehentlich“ der Bündnisfall eintreten könnte, hat man auf das offizielle Entsenden von NATO-Soldaten zur Unterstützung verzichtet. Es gibt jedoch genug Beweise dafür, dass auch Männer in der Lage sind, ihre Kleidung zu wechseln.
Es ist nie um die Verteidigung des „demokratischen Wertewestens“ gegangen, sondern immer nur, wie in jedem Krieg, um knallharte Interessen, und wieder einmal die der USA. Menschenleben Nebensache, notwendiges Übel. Was macht schon vielleicht inzwischen 1 Million gestorbener Soldaten aus? Die Erde dreht sich ja weiter. Man muss groß denken und da kann man sich nicht mit Nebensächlichkeiten abgeben.
Politik – Krieg (Krieg ist Politik mit anderen Mitteln)
Menschen – Frieden (Die Politik führt Krieg, die Menschen, egal wo, wollen Frieden!)
Schon einen Tag nach Ausbruch des Ukraine-Konflikts war klar: Die Ukraine kann den Krieg nicht gewinnen. Und von Anfang an bestand auch schon die Möglichkeit, dass die USA ähnliche „Erfolge“ erzielen würde, wie seinerzeit im Irak, in Libyen oder in Vietnam.
An dem Punkt stehen wir jetzt. Und jetzt ist die Frage, wie kann sich die USA aus der Affaire ziehen, ohne ihr Gesicht zu verlieren? Am besten natürlich als „Friedensstifter“ eines Krieges, den sie selbst angezettelt hat.
Ja, richtig, Trump ist nicht dafür verantwortlich, dass wir jetzt da stehen, wo wir sind. Aber mit seiner Präsidentschaft hat er auch die Verantwortung für das übernommen, was sein Vorgänger angerichtet hat. Seine Aufgabe ist, die Suppe auszulöffeln, die ihm andere eingebrockt haben. Er hat erkannt, dass der Stellvertreterkrieg zwischen den USA und Russland zu keinem günstigen Ergebnis für die USA führen wird. Wie es also jetzt anstellen, dass man Selenskyj wie eine heiße Kartoffel fallen lassen kann und dabei auch noch einen weiteren Profit erwirtschaften? Wie praktisch ist da ein Deal um Seltenerden, als Gegenleistung für das „großzügige“ Engagement durch die daran gutverdienende Waffenindustrie?
Erst erhoffe ich mir Chancen, Interessen durchzusetzen, investiere in ein vermeintlich gutes Geschäft, und wenn ich dann sehe, dass nichts daraus wird, suche ich nach einer Möglichkeit, wie ich meinen Geschäftspartner auch noch für meine eigene Fehleinschätzung bezahlen lassen kann. Dieses Geschäftsmodell liegt in den Genen der USA und ist nicht erst Trumps Erfindung. Und auch das Prinzip: Erst haue ich alles kurz und klein, verdiene durch die Waffenindustrie, und dann verdiene ich noch einmal am Wiederaufbau. Große Teile der fruchtbaren schwarzen Erde in der Ukraine sind bereits in US-amerikanischer Hand.
Trumps Vorgänger John F. Kennedy hat schon gesagt: „Wen ich nicht zu meinem Feind haben will, den mache ich zu meinem Freund.“ Ist das die Strategie, die Trump gegenüber Russland, derzeit mit großem Erfolg, fährt?
Wenn Selenskyj nicht so ein erbärmlicher Charakter wäre, könnte er einem fast leidtun. Politisch unerfahren, dafür aber trittsicher auf High-Heels im Lackanzug, hat er treudoof den USA vertraut und jetzt wird er mit der Realität konfrontiert. Wie man an der hollywoodreifen Aufführung im Oval Office sehen kann, zeigt der Hai erbarmungslos seine Zähne. Entweder du spurst, wie wir es vorgeben, oder wir machen dich fertig. Gruß an Don Corleone. Hast du immer noch nicht kapiert: Wir sitzen am längeren Hebel und gewinnen immer, so oder so.
Wenn die USA so gescheit gewesen wären, Selenskij das Gefühl zu geben, er habe die Macht, als Retter und Friedensbringer für die Ukraine aus der Vertragsunterzeichnung hervorzugehen, hätte er den USA aus der Hand gefressen, weil er diesen Trick sicher nicht durchschaut hätte. Stattdessen ist er auf Konfrontationskurs gegangen, vielleicht auch, weil er glaubt, noch einige Trümpfe im Ärmel zu haben, die er in Europa vermutet. Nicht ganz unberechtigt, denn die masochistischen Tendenzen „Wir stehen nach wie vor fest an deiner Seite“, lassen weiter hoffen (ich muss schon wieder an das Lack-Kostüm denken. Passt doch.)
Sowohl Selenskyj, als auch Trump und Vance haben in diesem Drama gezeigt, dass auf beiden Seiten noch ein riesiges Optimierungspotenzial in Diplomatie besteht.
Und die Universal-Dilettanten (derzeit mein Lieblingswort) in Europa haben nichts eiligeres zu tun, als einen Pakt zu schließen, wie sie die Ukraine weiter unterstützen können. Schließlich wird die Demokratie, besonders die deutsche Unseredemokratie, ja nicht nur seinerzeit in Afghanistan, sondern auch in der Ukraine verteidigt. Das führt dann zu solchen Aussagen wie: „Die Ukraine muss den Krieg gewinnen“, obwohl Deutschland, Europa von der Realität umzingelt, langsam vom Kontinent zur Insel wird.
Inzwischen erwägen die USA aus der NATO und den Vereinten Nationen auszutreten.
Was bleibt dann von der NATO übrig, wenn die USA wegfallen? Ein Haufen europäischer Nationen, die ihre erbärmlichen Waffenbestände zum Entsorgen in die Ukraine geschickt haben und jetzt blank dastehen. Und mit einer Armee, besonders der deutschen Bundeswehr mit den paar Köpfen, die sicher ganz besonders erpicht darauf ist, ihr Land zu verteidigen, wo doch die Moral der Truppe so wunderbar durch die Impfpflicht für Soldaten gefördert wurde. Würde ich als Soldat mein Leben für ein Land hergeben, dass mich dazu gezwungen hat, einen möglichen Impfschaden bis hin zum Tod in Kauf zu nehmen? Wohl kaum.
Man hat das Gefühl, Deutschland und Europa sind in einer Zeitkapsel gefangen. Bis dato hat, außer Orban und Fico, vielleicht auch schon Meloni, wohl noch niemand erkannt, dass sich der Wind gedreht hat. Man arbeitet einen europäischen Friedensplan aus. Wie soll der aussehen: Russland soll sich aus den ehemals ukrainischen Gebieten zurückziehen, der Frieden soll von europäischen Truppen gesichert werden (da könnte ich auch meine Oma an der Grenze aufstellen), die Ukraine soll in die NATO aufgenommen werden?
Der angehende deutsche Fritzefanzler hat sich angeboten, mit Trump zu sprechen. Trump hat dankend abgelehnt. Wen wundert das? Die Verantwortlichen in Europa haben immer noch nicht realisiert, dass sie nichts zu sagen haben, von einem großen Teil der Welt ausgelacht werden, nicht zuletzt auch wegen der Außenrepräsentantin der einst führenden deutschen Wirtschaftsmacht, die mit ihrem Trampolin von einem Fettnäpfchen in das andere gesprungen ist. Diese Aufzählung könnte man um weitere „Geistesgrößen“ ergänzen, die allesamt an Gehirnschwund zu leiden scheinen.
Europa hat sich angewöhnt geschichtspolitische Ereignisse ab einem Zeitpunkt zu bewerten, der ihnen passt. Man muss jedoch die Ereignisse in einer Zeitschiene, in einem Verlauf von Ursachen und Wirkungen sehen, doch dazu scheint das europäische politische Gruselkabinett bis nach Brüssel hin, nicht in der Lage zu sein, oder es nicht zu wollen.
Vielleicht rechnet man in Brüssel mit einer Migration der durch das Ausheben des US-AID-Sumpfs auf der Flucht befindlichen Deep-State-Agitatoren und deren Vermögen Richtung Europa? Doch das wäre eine neue Verschwörungstheorie.
Selbstverständlich ist das wichtigste, dass endlich Frieden geschlossen wird, damit nicht noch mehr Menschen sinnlos sterben müssen, auf beiden Seiten. Und eigentlich ist dazu jedes Mittel recht. Das bedeutet aber nicht, dass man sich nicht die Voraussetzungen, die Rahmenbedingungen, sowie die vorangegangenen Umstände einmal anschauen sollte.
-
@ da0b9bc3:4e30a4a9
2025-03-03 07:07:32Hello Stackers!
Welcome on into the ~Music Corner of the Saloon!
A place where we Talk Music. Share Tracks. Zap Sats.
So stay a while and listen.
🚨Don't forget to check out the pinned items in the territory homepage! You can always find the latest weeklies there!🚨
🚨Subscribe to the territory to ensure you never miss a post! 🚨
originally posted at https://stacker.news/items/902254
-
@ d360efec:14907b5f
2025-03-03 05:40:07การวิเคราะห์แต่ละ Timeframe (TF):
-
TF 15m (Intraday):
- แนวโน้ม: Bearish (แต่เริ่มมีสัญญาณกลับตัวเล็กน้อย). ราคาเคยอยู่ใต้ EMA ทั้งสอง แต่เริ่มขยับขึ้นมาเหนือ EMA 50.
- SMC:
- มี Bearish OB ชัดเจนที่ ~93,000 (ทดสอบแล้วไม่ผ่านในวันที่ 1 มี.ค.).
- มี Bullish OB ที่ ~86,000-87,000 (ราคาลงไปทดสอบแล้วดีดกลับ).
- SSL: ~86,845, ~83,859 (ถูกกวาดไปแล้ว).
- BSL: ~92,669 (อาจเป็นเป้าหมายถัดไป).
- Trend Strength: เมฆยังเป็นสีแดง แต่เริ่มจางลง. มีลูกศร Buy เล็กๆ.
- กลยุทธ์ Day Trade (SMC):
- ระมัดระวัง: ตลาดมีความผันผวน. แนวโน้มหลักยังเป็นขาลง, แต่ระยะสั้นเริ่มมีแรงซื้อ.
- Option 1 (Aggressive): Buy เมื่อราคาย่อลงมาใกล้ Bullish OB (~87,000) หรือ EMA 50. ตั้ง Stop Loss ใต้ OB. เป้าหมายทำกำไรที่ BSL (~92,669) หรือ Bearish OB เดิม.
- Option 2 (Conservative): รอให้ราคา Breakout เหนือ Bearish OB (~93,000) อย่างชัดเจน แล้วค่อยพิจารณา Buy ตาม.
- Short: ถ้าจะ Short, รอให้ราคาขึ้นไปใกล้ Bearish OB อีกครั้ง แล้วเกิดสัญญาณ Bearish Reversal (เช่น Bearish Engulfing) ค่อย Short.
-
TF 4H (ระยะกลาง):
- แนวโน้ม: Bearish. ราคาอยู่ใต้ EMA ทั้งสอง, EMA 50 อยู่ใต้ EMA 200.
- SMC:
- Bearish OB ใหญ่: ~95,000-100,000.
- SSL: ~83,559.5, ~81,260.4, ~78,961.4 (เป้าหมายระยะกลาง-ยาว).
- BSL: 105,543.4
- Trend Strength: เมฆสีแดงเข้ม. สัญญาณ Sell.
- กลยุทธ์: เน้น Short. รอ Pullback ไปใกล้ EMA หรือ Bearish OB แล้วหาจังหวะ Short.
-
TF Day (ระยะยาว):
- แนวโน้ม: ยังคงเป็น Bearish, แต่เริ่มเห็นสัญญาณการชะลอตัว. ราคาหลุด EMA 200 ลงมา
- SMC: มี Order Block ใหญ่ที่ $90,000 - $100,000
- Trend Strength: เมฆเริ่มเปลี่ยนจากสีแดงเข้ม เป็นสีแดงจางลง. ยังไม่มีสัญญาณ Buy ที่ชัดเจน.
- กลยุทธ์: ยังไม่ควร Long. รอสัญญาณกลับตัวที่ชัดเจนกว่านี้ (เช่น Breakout เหนือ EMA 50, เกิด Bullish Divergence).
สรุปและข้อควรระวัง:
- แนวโน้มหลักของ BTC ยังคงเป็นขาลง (Bearish) ในทุก Timeframe.
- TF 15m เริ่มมีสัญญาณการกลับตัวระยะสั้น (Bullish Reversal) แต่ยังต้องระวัง เพราะยังอยู่ในแนวโน้มหลักขาลง.
- Smart Money อาจกำลังสะสม (Accumulation) ที่ระดับราคาปัจจุบัน.
- สิ่งที่ต้องระวัง: ข่าว, ความผันผวน, การ "กวาด" Stop Loss (Liquidity Sweep).
Disclaimer: การวิเคราะห์นี้เป็นเพียงความคิดเห็นส่วนตัว ไม่ถือเป็นคำแนะนำในการลงทุน ผู้ลงทุนควรศึกษาข้อมูลเพิ่มเติมและตัดสินใจด้วยความรอบคอบ
-
-
@ 0fa80bd3:ea7325de
2025-01-29 05:55:02The land that belongs to the indigenous peoples of Russia has been seized by a gang of killers who have unleashed a war of extermination. They wipe out anyone who refuses to conform to their rules. Those who disagree and stay behind are tortured and killed in prisons and labor camps. Those who flee lose their homeland, dissolve into foreign cultures, and fade away. And those who stand up to protect their people are attacked by the misled and deceived. The deceived die for the unchecked greed of a single dictator—thousands from both sides, people who just wanted to live, raise their kids, and build a future.
Now, they are forced to make an impossible choice: abandon their homeland or die. Some perish on the battlefield, others lose themselves in exile, stripped of their identity, scattered in a world that isn’t theirs.
There’s been endless debate about how to fix this, how to clear the field of the weeds that choke out every new sprout, every attempt at change. But the real problem? We can’t play by their rules. We can’t speak their language or use their weapons. We stand for humanity, and no matter how righteous our cause, we will not multiply suffering. Victory doesn’t come from matching the enemy—it comes from staying ahead, from using tools they haven’t mastered yet. That’s how wars are won.
Our only resource is the will of the people to rewrite the order of things. Historian Timothy Snyder once said that a nation cannot exist without a city. A city is where the most active part of a nation thrives. But the cities are occupied. The streets are watched. Gatherings are impossible. They control the money. They control the mail. They control the media. And any dissent is crushed before it can take root.
So I started asking myself: How do we stop this fragmentation? How do we create a space where people can rebuild their connections when they’re ready? How do we build a self-sustaining network, where everyone contributes and benefits proportionally, while keeping their freedom to leave intact? And more importantly—how do we make it spread, even in occupied territory?
In 2009, something historic happened: the internet got its own money. Thanks to Satoshi Nakamoto, the world took a massive leap forward. Bitcoin and decentralized ledgers shattered the idea that money must be controlled by the state. Now, to move or store value, all you need is an address and a key. A tiny string of text, easy to carry, impossible to seize.
That was the year money broke free. The state lost its grip. Its biggest weapon—physical currency—became irrelevant. Money became purely digital.
The internet was already a sanctuary for information, a place where people could connect and organize. But with Bitcoin, it evolved. Now, value itself could flow freely, beyond the reach of authorities.
Think about it: when seedlings are grown in controlled environments before being planted outside, they get stronger, survive longer, and bear fruit faster. That’s how we handle crops in harsh climates—nurture them until they’re ready for the wild.
Now, picture the internet as that controlled environment for ideas. Bitcoin? It’s the fertile soil that lets them grow. A testing ground for new models of interaction, where concepts can take root before they move into the real world. If nation-states are a battlefield, locked in a brutal war for territory, the internet is boundless. It can absorb any number of ideas, any number of people, and it doesn’t run out of space.
But for this ecosystem to thrive, people need safe ways to communicate, to share ideas, to build something real—without surveillance, without censorship, without the constant fear of being erased.
This is where Nostr comes in.
Nostr—"Notes and Other Stuff Transmitted by Relays"—is more than just a messaging protocol. It’s a new kind of city. One that no dictator can seize, no corporation can own, no government can shut down.
It’s built on decentralization, encryption, and individual control. Messages don’t pass through central servers—they are relayed through independent nodes, and users choose which ones to trust. There’s no master switch to shut it all down. Every person owns their identity, their data, their connections. And no one—no state, no tech giant, no algorithm—can silence them.
In a world where cities fall and governments fail, Nostr is a city that cannot be occupied. A place for ideas, for networks, for freedom. A city that grows stronger the more people build within it.
-
@ 9e69e420:d12360c2
2025-01-26 15:26:44Secretary of State Marco Rubio issued new guidance halting spending on most foreign aid grants for 90 days, including military assistance to Ukraine. This immediate order shocked State Department officials and mandates “stop-work orders” on nearly all existing foreign assistance awards.
While it allows exceptions for military financing to Egypt and Israel, as well as emergency food assistance, it restricts aid to key allies like Ukraine, Jordan, and Taiwan. The guidance raises potential liability risks for the government due to unfulfilled contracts.
A report will be prepared within 85 days to recommend which programs to continue or discontinue.
-
@ 9e69e420:d12360c2
2025-01-25 22:16:54President Trump plans to withdraw 20,000 U.S. troops from Europe and expects European allies to contribute financially to the remaining military presence. Reported by ANSA, Trump aims to deliver this message to European leaders since taking office. A European diplomat noted, “the costs cannot be borne solely by American taxpayers.”
The Pentagon hasn't commented yet. Trump has previously sought lower troop levels in Europe and had ordered cuts during his first term. The U.S. currently maintains around 65,000 troops in Europe, with total forces reaching 100,000 since the Ukraine invasion. Trump's new approach may shift military focus to the Pacific amid growing concerns about China.
-
@ b17fccdf:b7211155
2025-01-21 17:02:21The past 26 August, Tor introduced officially a proof-of-work (PoW) defense for onion services designed to prioritize verified network traffic as a deterrent against denial of service (DoS) attacks.
~ > This feature at the moment, is deactivate by default, so you need to follow these steps to activate this on a MiniBolt node:
- Make sure you have the latest version of Tor installed, at the time of writing this post, which is v0.4.8.6. Check your current version by typing
tor --version
Example of expected output:
Tor version 0.4.8.6. This build of Tor is covered by the GNU General Public License (https://www.gnu.org/licenses/gpl-3.0.en.html) Tor is running on Linux with Libevent 2.1.12-stable, OpenSSL 3.0.9, Zlib 1.2.13, Liblzma 5.4.1, Libzstd N/A and Glibc 2.36 as libc. Tor compiled with GCC version 12.2.0
~ > If you have v0.4.8.X, you are OK, if not, type
sudo apt update && sudo apt upgrade
and confirm to update.- Basic PoW support can be checked by running this command:
tor --list-modules
Expected output:
relay: yes dirauth: yes dircache: yes pow: **yes**
~ > If you have
pow: yes
, you are OK- Now go to the torrc file of your MiniBolt and add the parameter to enable PoW for each hidden service added
sudo nano /etc/tor/torrc
Example:
```
Hidden Service BTC RPC Explorer
HiddenServiceDir /var/lib/tor/hidden_service_btcrpcexplorer/ HiddenServiceVersion 3 HiddenServicePoWDefensesEnabled 1 HiddenServicePort 80 127.0.0.1:3002 ```
~ > Bitcoin Core and LND use the Tor control port to automatically create the hidden service, requiring no action from the user. We have submitted a feature request in the official GitHub repositories to explore the need for the integration of Tor's PoW defense into the automatic creation process of the hidden service. You can follow them at the following links:
- Bitcoin Core: https://github.com/lightningnetwork/lnd/issues/8002
- LND: https://github.com/bitcoin/bitcoin/issues/28499
More info:
- https://blog.torproject.org/introducing-proof-of-work-defense-for-onion-services/
- https://gitlab.torproject.org/tpo/onion-services/onion-support/-/wikis/Documentation/PoW-FAQ
Enjoy it MiniBolter! 💙
-
@ 95cb4330:96db706c
2025-03-03 05:36:23Adopting Single-Threaded Leadership, as implemented by Jeff Bezos at Amazon, involves assigning full ownership of a high-impact initiative to one individual. This strategy ensures accountability, accelerates decision-making, and fosters deep focus, leading to more effective execution.
Understanding Single-Threaded Leadership
- Definition:
A leadership approach where a dedicated leader focuses exclusively on a specific project or goal, free from competing responsibilities. This model contrasts with traditional structures where leaders juggle multiple projects simultaneously.
medium.com
Examples in Practice
-
Amazon's Single-Threaded Leaders:
Jeff Bezos structured Amazon's key initiatives around single-threaded leaders, ensuring they could drive results without distractions. This approach has been credited with enhancing innovation and operational efficiency within the company. -
Elon Musk's Focused Leadership:
Elon Musk exemplifies intense focus by dedicating his attention to one company at a time, such as Tesla, SpaceX, or Neuralink, thereby propelling each forward without splitting his attention.
Implementing Single-Threaded Leadership
-
Identify High-Impact Projects:
Determine which initiatives are critical to your organization's success and would benefit from dedicated leadership. -
Assign Sole Ownership:
Appoint a leader whose primary responsibility is the success of that specific project, minimizing their involvement in unrelated tasks. -
Empower Decision-Making:
Grant the single-threaded leader the authority to make decisions and allocate resources necessary for the project's success. -
Minimize Dependencies:
Structure the project to reduce reliance on other teams or departments, allowing the leader to maintain momentum without unnecessary delays.
Action Step
Evaluate your current projects to identify where responsibilities are fragmented. Select a high-priority initiative and assign one person full responsibility, ensuring they have the autonomy and resources to execute effectively without unnecessary dependencies.
By implementing single-threaded leadership, organizations can enhance focus, streamline decision-making, and drive successful outcomes in their most critical projects.
For a deeper understanding of this concept, consider watching this discussion:
Single-Threaded Leadership: How Amazon Solved Organizational Scaling Challenges
- Definition:
-
@ 95cb4330:96db706c
2025-03-03 05:23:48Most people make decisions based on averages—what usually happens. But in high-impact fields like investing, startups, and technology, outliers drive the biggest results.
Instead of asking, "What is the average outcome?" ask: - ✔ What is the full range of possible outcomes? - ✔ How can I maximize the upside while protecting against the worst-case scenario?
Example in Action: Bezos, Thiel & Altman
Jeff Bezos & AWS
When launching Amazon Web Services (AWS), Bezos saw a small chance of massive success—cloud computing dominance—against a limited downside (R&D costs). He optimized for the best-case scenario, which became a trillion-dollar business.
Peter Thiel & Venture Capital
Thiel’s Power Law investing philosophy is based on distributions: Instead of funding many "average" startups, he focuses on a few outliers that can return 100x or more (e.g., Facebook, Palantir).
Sam Altman & OpenAI
Altman understands that AI breakthroughs follow an exponential curve—a small chance of creating AGI (Artificial General Intelligence) is worth more than incremental AI improvements.
How to Apply This Thinking
Map the Full Range of Outcomes
Instead of assuming an "average" result, consider: - Best-case scenario: How big can this get? - Worst-case scenario: What’s my downside risk? - Unlikely but extreme possibilities: What are the hidden risks or rare events?
Optimize for Asymmetric Upside
Focus on decisions where the upside is massive, even if the probability is low. - Example: Launching a new product in an emerging market versus incrementally improving an existing one.
Protect Against Catastrophic Downside
Even if an outlier event has a small chance, if it can ruin you, avoid it. - Example: Diversifying investments instead of going all-in on one bet.
Resources to Learn More
- Understanding Distributions vs. Averages – Farnam Street
- Jeff Bezos on Thinking Long-Term – Harvard Business Review
- Peter Thiel’s Power Law Thinking – NFX
Action Step: Apply This Today
- Pick one major decision you're working on.
- Instead of assuming an "average" result, analyze the full distribution of outcomes.
- Ask: Am I optimizing for a rare, high-upside event while managing the worst-case risks?
By thinking in distributions, you make better strategic bets, spot hidden risks, and maximize your long-term impact. 🚀
-
@ b84b0d81:f3a3865f
2025-03-03 05:05:30**Introduction ** Starting a business is an exciting journey, but ensuring its long-term success requires careful planning, strategic decision-making, and continuous adaptation. Many entrepreneurs fail not because they lack passion but because they don’t build a business that is sustainable. To establish a thriving business, you need to identify the right opportunity, create a solid foundation, and adapt to market trends effectively.
This guide will take you through the key steps to identifying and building the best business for long-term success. From market research to customer engagement and financial management, we’ll cover essential strategies to ensure your business remains competitive and profitable over time. Step 1: Identifying the Right Business Idea 1.1 Assess Your Interests and Strengths One of the best ways to build a sustainable business is to align it with your passion and expertise. When you start a business in an area where you have knowledge and interest, you increase your chances of success. 1.2 Conduct Market Research Researching your target market is crucial to understanding demand, competition, and potential customer needs. Consider the following when conducting market research: • Who is your ideal customer? • What problems are they facing that your business can solve? • How big is the market for your product or service? • Who are your competitors, and what are they doing well (or poorly)? A report by the Small Business Administration (SBA) states that only 50% of businesses survive beyond five years, emphasizing the importance of thorough market research and planning. (Source) 1.3 Evaluate Market Trends Trends can dictate the future of any industry. Businesses that succeed in the long term are those that adapt to changing consumer behaviors, technological advancements, and economic shifts. Utilize tools like Google Trends, industry reports, and customer feedback to stay ahead of the curve. Step 2: Building a Strong Business Foundation 2.1 Create a Clear Business Plan A well-structured business plan acts as a roadmap for your company’s growth. It should include: • Executive Summary • Market Analysis • Business Structure • Product/Service Offering • Marketing and Sales Strategies • Financial Projections • Growth Plan 2.2 Secure Funding and Manage Finances Financial stability is a pillar of business success. Options for securing capital include: • Bootstrapping (using personal savings) • Small business loans • Angel investors or venture capitalists • Crowdfunding According to the U.S. Bureau of Labor Statistics, approximately 20% of new businesses fail within their first year due to cash flow issues. (Source) To avoid this, monitor your finances closely, keep overhead costs low, and reinvest profits wisely. Step 3: Establishing a Competitive Edge 3.1 Develop a Unique Value Proposition (UVP) Your UVP should clearly articulate why customers should choose your business over competitors. It should be: • Clear and concise • Focused on solving a specific problem • Easily communicated to your target audience 3.2 Build a Strong Brand Identity A strong brand helps customers recognize and trust your business. Essential elements of branding include: • Logo and visual identity • Brand voice and messaging • Customer experience and service 3.3 Leverage Digital Marketing In today’s digital era, having an online presence is non-negotiable. Strategies to implement: • SEO (Search Engine Optimization): Helps increase organic traffic to your website. • Social Media Marketing: Engage with customers on platforms like Facebook, Instagram, and LinkedIn. • Email Marketing: Build relationships with potential and existing customers through personalized emails. • Content Marketing: Provide valuable information through blogs, videos, and guides to establish authority in your industry. Step 4: Customer-Centric Approach 4.1 Understand and Engage Your Customers Listening to your customers can provide insights into improving your business. Strategies to enhance customer engagement include: • Conducting surveys and feedback sessions • Implementing a loyalty program • Providing exceptional customer service 4.2 Build a Community Around Your Brand Creating a loyal customer base goes beyond selling a product or service. Engage with your audience through social media, email newsletters, and exclusive events to foster a sense of community. Step 5: Scaling and Adapting for Long-Term Success 5.1 Implement Scalable Processes As your business grows, efficient systems and automation can help manage increased demand. Consider: • Using customer relationship management (CRM) software • Automating inventory and order processing • Streamlining workflow with project management tools 5.2 Stay Agile and Innovative The most successful businesses evolve with market trends. Regularly evaluate industry developments, adopt new technologies, and be open to pivoting your strategy when necessary. 5.3 Expand Wisely When expanding, assess factors such as: • Market demand for your product or service • Financial readiness • Operational capacity Options for expansion include opening new locations, diversifying product lines, or entering international markets.
**Conclusion ** Building a business that lasts requires a strategic approach, financial discipline, and an unwavering commitment to customer satisfaction. By conducting thorough research, creating a strong foundation, leveraging digital tools, and continuously adapting to industry trends, you can set your business up for long-term success. With careful planning and execution, your business can not only survive but thrive for years to come.
-
@ e9fcc47b:ae2e68a8
2025-03-03 02:26:47This event has been deleted; your client is ignoring the delete request.
-
@ d360efec:14907b5f
2025-03-03 01:34:50$OKX:BTCUSDT.P
Timeframe Analysis:
-
TF 15m (Intraday):
- Trend: Bearish (but showing signs of a minor reversal). Price was below both EMAs but is starting to move above the EMA 50.
- SMC:
- Clear Bearish OB at ~93,000 (tested and failed on March 1st).
- Bullish OB at ~86,000-87,000 (price tested and bounced).
- SSL: ~86,845, ~83,859 (already swept).
- BSL: ~92,669 (potential next target).
- Trend Strength: Cloud is still red but fading. A small Buy arrow appears.
- Day Trade Strategy (SMC):
- Caution: The market is volatile. The main trend is still down, but there's short-term buying pressure.
- Option 1 (Aggressive): Buy when the price dips near the Bullish OB (~87,000) or EMA 50. Set a stop-loss below the OB. Target the BSL (~92,669) or the previous Bearish OB.
- Option 2 (Conservative): Wait for a clear breakout above the Bearish OB (~93,000) before considering a buy.
- Short: If shorting, wait for the price to approach the Bearish OB again and look for a bearish reversal signal (e.g., Bearish Engulfing) before shorting.
-
TF 4H (Medium-Term):
- Trend: Bearish. Price is below both EMAs, EMA 50 is below EMA 200.
- SMC:
- Larger Bearish OB: ~95,000-100,000.
- SSL: ~83,559.5, ~81,260.4, ~78,961.4 (medium- to long-term targets).
- BSL: 105,543.4
- Trend Strength: Dark red cloud. Sell signal.
- Strategy: Focus on shorts. Wait for pullbacks to the EMAs or Bearish OB and look for shorting opportunities.
-
TF Day (Long-Term):
- Trend: Still Bearish, but starting to show signs of slowing down. The price has broken below the EMA 200.
- SMC: Large order Block $90,000-$100,000
- Trend Strength: The cloud is changing from dark red to a lighter red. No clear Buy signal yet.
- Strategy: Avoid going long. Wait for clearer reversal signals (e.g., breakout above EMA 50, Bullish Divergence).
Summary and Cautions:
- The main trend of BTC is still Bearish on all timeframes.
- The 15m TF is showing signs of a short-term Bullish Reversal, but be cautious as it's against the main downtrend.
- Smart Money may be accumulating at current price levels.
- Cautions: News, volatility, liquidity sweeps (stop-loss hunting).
Disclaimer: This analysis is for informational purposes only and does not constitute financial advice. Investors should conduct their own research and make decisions carefully.
-
-
@ 878dff7c:037d18bc
2025-03-03 00:23:00Slow Cooker Pastrami (No Smoker)
This is one of our family staples! It is pretty low effort and the first few slices straight after it comes out of the oven are AMAZING.
Full credit to Nagi over at RecipeTin Eats! Please go and check out her other amazing recipes and give her the recognition she deserves.
Adapted from Nagi at RecipeTin Eats
Ingredients
Meat
- 4 lbs (2 kg) corned beef with a thick fat cap (Try find one that has a fairly consistent shape and direction of muscle fibers for maximum tenderness)
Spice Mix
- 4 tbsp coarsely ground black pepper
- 2 tbsp coriander powder
- 1½ tsp mustard powder
- 1 tbsp brown sugar
- 1 tbsp smoked paprika
- 2 tsp garlic powder (For a low FODMAP alternative substitute garlic and onion with hing powder, only about 1/4 tsp... If in doubt, just skip garlic and onion. It still tastes amazing!)
- 2 tsp onion powder
- Optional: 2 tbsp liquid smoke
Instructions
1. Prepare the Spice Mix
- Combine all spice mix ingredients in a bowl.
2. Season the Beef
- Pat the corned beef dry.
- Spread the spice mix on a tray and roll the beef in it, ensuring all sides are well-coated.
- If using liquid smoke, sprinkle it over the beef.
3. Wrap the Beef
- Place the beef fat-side down on a large sheet of foil and wrap it tightly.
- Wrap it again with another sheet of foil and flip it so the fat side is up.
- I use 3 sheets of foil and 'over lay' the wrap so it's a bit harder for the delicious juices to escape.
- Dont stress if you forget where the fat cap is, it'll be fine...
4. Slow Cook
- Place a rack in the slow cooker to elevate the beef (scrunched-up foil balls can be used if a rack isn't available. I use cookie cutter patterns ;) ).
- Set the wrapped beef on the rack.
- Cook on low for 10 hours.
5. Cool and Refrigerate
- Remove the beef from the slow cooker and let it cool.
- Refrigerate for at least 6 hours to firm up, making it easier to slice thinly. (24-36hrs is fine in the fridge if you don't have time etc)
6. Bake to Set the Crust
- Preheat the oven to 350°F (180°C).
- Unwrap the beef and place it on a rack over a baking tray.
- Bake for 30 minutes to set the spice crust.
7. Slice and Serve
- Remove from the oven and let it cool slightly.
- Slice thinly against the grain.
- Serve on toasted rye bread with mustard and pickles, or use in Reuben sandwiches.
Enjoy homemade pastrami without a smoker!
-
@ c8383d81:f9139549
2025-03-02 23:57:18Project is still in early stages but now it is split into 2 different domain entities. Everything is opened sourced under one github https://github.com/Nsite-Info
So what’s new ?
Project #1 https://Nsite.info
A basic website with main info regarding what an Nsite is how it works and a list of tools and repo’s you can use to start building and debugging. 99% Finished, needs some extra translations and the Nsite Debugger can use a small upgrade.
Project #2 https://Nsite.cloud
This project isn’t finished, it currently is at a 40% finished stage. This contains the Nsite Gateway for all sites (still a work in progress) and the final stage the Nsite editor & template deployment.
If you are interested in Nsite’s join: https://chachi.chat/groups.hzrd149.com/e23891
Big thanks to nostr:npub1elta7cneng3w8p9y4dw633qzdjr4kyvaparuyuttyrx6e8xp7xnq32cume nostr:npub1ye5ptcxfyyxl5vjvdjar2ua3f0hynkjzpx552mu5snj3qmx5pzjscpknpr nostr:npub1klr0dy2ul2dx9llk58czvpx73rprcmrvd5dc7ck8esg8f8es06qs427gxc for all the tooling & code.
!(image)[https://i.nostr.build/AkUvk7R2h9cVEMLB.png]
-
@ 878dff7c:037d18bc
2025-03-02 22:48:04This dish is a classic Argentine barbecue (asado) preparation, where lamb leg is slowly grilled over an open fire or on a parrilla (grill) and served with chimichurri sauce.
Ingredients
For the Lamb:
- 1 whole leg of lamb (about 2.3–3.2 kg/5–7 lbs)
- 3 tbsp coarse salt
- 2 tbsp black pepper
- 3 tbsp olive oil
- 4 cloves garlic, minced
- 1 tbsp smoked paprika
- 1 tbsp dried oregano
- 1 tbsp ground cumin
- Juice of 1 lemon
- ½ cup red wine (optional)
For the Chimichurri Sauce:
- 1 cup fresh parsley, finely chopped
- ½ cup fresh cilantro (optional)
- 4 cloves garlic, minced
- 1 tsp red pepper flakes
- 1 tbsp dried oregano
- ½ cup olive oil
- ¼ cup red wine vinegar
- Salt and pepper to taste
Instructions
1. Prepare the Lamb:
- Pat the lamb leg dry and rub it with olive oil, garlic, lemon juice, paprika, oregano, cumin, salt, and black pepper.
- Let it marinate at room temperature for 1 hour (or overnight in the fridge for more flavor. I recommend 12-24hrs).
2. Set Up the Fire:
- Traditionally, cordero asado is cooked over a wood fire or charcoal at a low temperature (225–275°F / 110–135°C) for slow cooking.
- If using a grill, prepare indirect heat by placing hot coals on one side and keeping the lamb on the cooler side.
3. Grill the Lamb:
- Place the lamb leg on the grill bone-side down.
- Cook low and slow for 3 to 4 hours, turning occasionally and basting with wine or water to keep it moist.
- If using a thermometer, the internal temperature should be:
- Rare: 125°F (52°C)
- Medium-Rare: 130–135°F (55–57°C) (I recommend medium rare for my lamb)
- Medium: 140–145°F (60–63°C)
- Well Done: 155°F+ (68°C+)
4. Make the Chimichurri Sauce:
- In a bowl, mix chopped parsley, cilantro, garlic, red pepper flakes, oregano, olive oil, and red wine vinegar.
- Season with salt and pepper.
- Let it sit for 30 minutes for the flavors to blend.
5. Rest & Serve:
- Once cooked, let the lamb rest for 15–20 minutes before slicing.
- Serve with chimichurri sauce and a side of grilled vegetables or crusty bread.
Enjoy your Argentinian Cordero Asado! 🇦🇷🔥
-
@ 8d34bd24:414be32b
2025-03-02 22:12:14Last night I was reading this passage in Ezekiel, who was called to be a watchman to Israel.
“Son of man, I have appointed you a watchman to the house of Israel; whenever you hear a word from My mouth, warn them from Me. When I say to the wicked, ‘You will surely die,’ and you do not warn him or speak out to warn the wicked from his wicked way that he may live, that wicked man shall die in his iniquity, but his blood I will require at your hand. Yet if you have warned the wicked and he does not turn from his wickedness or from his wicked way, he shall die in his iniquity; but you have delivered yourself. Again, when a righteous man turns away from his righteousness and commits iniquity, and I place an obstacle before him, he will die; since you have not warned him, he shall die in his sin, and his righteous deeds which he has done shall not be remembered; but his blood I will require at your hand. However, if you have warned the righteous man that the righteous should not sin and he does not sin, he shall surely live because he took warning; and you have delivered yourself.” (Ezekiel 3:17-21) {emphasis mine}
Although I do not believe we can directly apply this command to our lives because it was given directly to Ezekiel and because our salvation comes from Jesus and not works, I do think we can learn from this passage. Just as Ezekiel was called to share God’s blessings, His curses, and His fixed plan, in the same way we are to share the Gospel (the good and the bad) and God’s eternal plan as laid out in the Bible. Unlike Ezekiel, we will receive blessings for being God’s witness and watchman, but will not be punished for failure due to being covered in the blood of Jesus and His righteousness.
We are called to share the Gospel and make disciples:
Go therefore and make disciples of all the nations, baptizing them in the name of the Father and the Son and the Holy Spirit, teaching them to observe all that I commanded you; and lo, I am with you always, even to the end of the age.” (Matthew 28:19-20) {emphasis mine}
We should never stop until the end. We are not supposed to hide the fact we are Christians or act like everyone else in the culture, but to be a light for Jesus.
“You are the light of the world. A city set on a hill cannot be hidden; nor does anyone light a lamp and put it under a basket, but on the lampstand, and it gives light to all who are in the house. Let your light shine before men in such a way that they may see your good works, and glorify your Father who is in heaven. (Matthew 5:14-16) {emphasis mine}
Our love for Jesus should shine so brightly that everyone knows we belong to Christ.
Now as they observed the confidence of Peter and John and understood that they were uneducated and untrained men, they were amazed, and began to recognize them as having been with Jesus. (Acts 4:13)
We should study the Bible so we are ready to share God’s word with all who will listen. Being a light for Jesus isn’t always easy. It can sometimes even lead to persecution and hardship, but we are called to give an account.
But even if you should suffer for the sake of righteousness, you are blessed. And do not fear their intimidation, and do not be troubled, but sanctify Christ as Lord in your hearts, always being ready to make a defense to everyone who asks you to give an account for the hope that is in you, yet with gentleness and reverence; and keep a good conscience so that in the thing in which you are slandered, those who revile your good behavior in Christ will be put to shame. (1 Peter 3:14-16) {emphasis mine}
Being ready requires diligent prayer and Bible study. We need to know God and His word well to be most effective. Of course we need to be more than just impersonal scholars. We need to have a relationship with Jesus and our Father God and share that relationship with others. We need to share Jesus with even more excitement than we would share our spouse or our kids. We need to be more excited to introduce people to Jesus than we would be to introduce people to a celebrity or other important person. Jesus should be a focus and our joy and such a part of our life that talking about Him becomes second nature. (For most people this takes a long time to reach this point, so don’t lose hope if you aren’t there yet.)
There are lies that we tell and there are also lies by omission. When we leave out some truth, we can imply a lie. So often Christians are so worried about seeming loving that we don’t love people enough to speak the whole truth to them. Yes, God is loving, but He is also holy and gives righteous judgment. Yes Jesus died on our cross to take away our sins, but some will reject Him and spend eternity in eternal torment in Hell. If we only tell the “good” parts, but leave out the “bad” parts, we are speaking a lie.
Everyone deceives his neighbor And does not speak the truth, They have taught their tongue to speak lies; They weary themselves committing iniquity. (Jeremiah 9:5)
In court we are asked to speak the truth, the whole truth, and nothing but the truth. Are you speaking the whole truth when you speak of God? Do you sometimes hold back? I recently was communicating with someone online about the Bible and I caught myself watering down a truth. Not speaking the whole, complete truth trapped me in a corner and my witness was harmed. I like to think of myself as fearlessly sharing God and His truth with people, but I seriously messed up on this one.
Therefore, laying aside falsehood, speak truth each one of you with his neighbor, for we are members of one another. (Ephesians 4:25) {emphasis mine}
Sometimes we hold back because the truth (things like God’s judgment, only one way to God, election, or God’s sovereignty) seems too hard or unpleasant. Sometimes we hold back because we are ashamed. Don’t be ashamed, for Jesus said:
For whoever is ashamed of Me and My words, the Son of Man will be ashamed of him when He comes in His glory, and the glory of the Father and of the holy angels. (Luke 9:26) {emphasis mine}
The closer our relationship is to God and the better we know our Bible, the more confident we can be sharing the Good News to those around us, but no matter how much we prepare within ourselves, we must always lean on Jesus and do things in His power, not our own.
For God has not given us a spirit of timidity, but of power and love and discipline. Therefore do not be ashamed of the testimony of our Lord or of me His prisoner, but join with me in suffering for the gospel according to the power of God, who has saved us and called us with a holy calling, not according to our works, but according to His own purpose and grace which was granted us in Christ Jesus from all eternity (2 Timothy 1:7-9) {emphasis mine}
May God mold us and guide us to be a good witness and a good watchman, so we can shine the light of Jesus onto all the world and become the faithful servants we were designed to be for His glory.
Trust Jesus
-
@ 878dff7c:037d18bc
2025-03-02 21:49:36Cyclone Alfred Threatens South East Queensland
Tropical Cyclone Alfred is projected to make landfall in South East Queensland by Thursday as a Category 2 system.
Currently located 465 km northeast of Brisbane, the cyclone is expected to bring gale-force winds, up to 600 mm of rainfall, abnormally high tides, and damaging swells.
Authorities have issued multiple warnings, including coastal hazard and flood watches, urging residents from Bundaberg to the Gold Coast to prepare for severe weather conditions.
Housing Market Rebounds Amid Interest Rate Cut
Australia's housing market downturn appears to be over, with property values rising by 0.3% in February, nearly offsetting the previous three-month decline of 0.4%.
This rebound is attributed to increased buyer confidence following a recent interest rate cut by the Reserve Bank, signaling a potential resurgence in the housing sector.
Federal Politics: Australia Urged to Lift Defense Spending
In federal politics, discussions have emerged urging Australia to increase its defense spending.
This call emphasizes the need to bolster national security and address evolving geopolitical challenges.
Australian Government Pledges RAAF Base Access for Aerial Firefighting
The Australian government has pledged to grant the New South Wales Rural Fire Service access to Royal Australian Air Force (RAAF) bases to support aerial firefighting operations.
This initiative aims to enhance the state's capacity to respond to bushfires and improve overall emergency preparedness.
New Search Initiated for MH370
Eleven years after the disappearance of Malaysia Airlines Flight MH370, a new search has commenced.
Ocean Infinity is deploying advanced technology, including mothership Armada 7806 and remote-controlled underwater drones capable of scanning the ocean floor down to six kilometers.
The search covers a new 15,000 square kilometer area 1,500 kilometers west of Perth, identified based on data from the past decade.
Challenges such as extreme weather conditions and the vast Indian Ocean area persist.
Experts emphasize the improvement in maritime technology and the emotional toll of repeated search efforts.
The Malaysian government is negotiating a contract with Ocean Infinity, promising a $70 million reward if the wreckage is found.
Victorian Unions Protest Public Sector Job Cuts
The Victorian government, led by Treasurer Jaclyn Symes, announced an unexpected plan to cut 3,000 public sector jobs as part of a budget clean-out, causing uproar among unions.
Six unions representing various sectors, including firefighters, teachers, and public sector workers, have organized a rally on March 3 to protest the job cuts.
Union officials emphasized the widespread impact of these cuts, questioning who would take on the workload and warning of the expensive payouts in redundancies.
They criticized the government's approach, pointing out potential repercussions and the irony of hiring costly consultants to advise on job cuts.
Centrelink Payments Increase for Millions of Australians
Starting in March, approximately five million Australians receiving various Centrelink payments, including Age Pension, Carer Payment, Commonwealth Rent Assistance, ABSTUDY, JobSeeker, Disability Support Pension, and Parenting Payment Single, will see payment increases.
These adjustments are based on the higher of the consumer price index or wage price index, assessed biannually.
Notable changes for JobSeeker include reduced penalties for non-compliance with job requirements for new registrants and exemptions for those working 30 hours a fortnight for two months.
Carers will benefit from more flexible work hours, allowing a spread of 100 hours over four weeks without affecting their payments.
These measures aim to alleviate cost-of-living pressures, with increments resulting in a substantial rise in support since the current government took office.
Note: All information is based on articles published on March 3, 2025.
-
@ f3873798:24b3f2f3
2025-03-02 20:00:47No Brasil, o consumo de álcool não é apenas aceito socialmente, mas fortemente incentivado. A presença de bebidas alcoólicas é constante em festas, confraternizações e até mesmo no ambiente familiar. Quem se recusa a beber muitas vezes é visto como alguém “estranho”, “chato” ou antissocial. Essa mentalidade gera um ciclo vicioso de incentivo ao consumo, ignorando seus impactos negativos.
A Pressão Social Pelo Consumo
Desde cedo, muitos brasileiros são introduzidos ao álcool sem qualquer reflexão sobre os riscos. Em algumas regiões, crianças experimentam bebidas alcoólicas ainda na infância, muitas vezes com o incentivo de familiares. A ideia de que “todo mundo bebe” cria um ambiente em que se recusar a ingerir álcool pode levar ao isolamento social e até mesmo a chacotas.
Aqueles que não bebem frequentemente se sentem excluídos de eventos sociais, pois a cultura ao redor do álcool é tão intensa que parece não haver espaço para quem faz uma escolha diferente. Em reuniões, festas e até mesmo encontros informais, a presença da bebida é praticamente obrigatória, reforçando a ideia de que a diversão depende dela.
O Álcool e a Imprudência no Trânsito
Outro reflexo dessa cultura é a alta incidência de acidentes de trânsito causados pelo consumo de álcool. Apesar das campanhas de conscientização e das leis mais rígidas, dirigir embriagado ainda é um problema grave no Brasil. Muitos motoristas assumem o risco, acreditando que estão “bem o suficiente” para conduzir, colocando a própria vida e a de outras pessoas em perigo.
Infelizmente, essa imprudência não se limita ao ato de dirigir. Em festas e eventos regados a álcool, discussões e brigas são comuns, e atos de violência aumentam significativamente. O efeito entorpecente do álcool reduz a capacidade de julgamento, resultando em comportamentos agressivos e irresponsáveis.
A Decadência e o Cenário Degradante
Outro aspecto ignorado pela cultura do álcool é a decadência humana observada em eventos onde o consumo excessivo é incentivado. Não é raro ver pessoas embriagadas vomitando ou até mesmo defecando em vias públicas, completamente inconscientes de seus atos. Essas cenas se tornaram tão comuns que são tratadas como algo natural, quando, na verdade, refletem um problema social sério.
O Carnaval é um dos exemplos mais emblemáticos desse fenômeno. O que deveria ser uma celebração cultural muitas vezes se transforma em um festival de exageros, onde a bebedeira extrema leva a uma série de consequências negativas, como furtos, brigas, acidentes e crimes diversos.
O Lado Ignorado Dessa Cultura
Curiosamente, todos esses problemas são frequentemente minimizados ou ignorados. A sociedade foca apenas no aspecto festivo do álcool, sem considerar os prejuízos que ele causa. Pouco se discute sobre os impactos na saúde pública, na segurança e na dignidade dos indivíduos.
É importante ressaltar que este artigo não propõe a proibição do álcool nem adota uma visão moralista sobre o tema. O problema não está na bebida em si, mas na forma como é consumida e incentivada. O que se defende aqui é o equilíbrio e a responsabilidade.
Beber com moderação, respeitar os limites do próprio corpo e das pessoas ao redor, evitar a pressão social sobre aqueles que não bebem e nunca misturar álcool e direção são atitudes fundamentais para transformar essa cultura. O consumo consciente permite que momentos de celebração sejam realmente prazerosos, sem que se tornem um problema para quem bebe ou para a sociedade como um todo.
A diversão não precisa estar atrelada ao exagero. É possível aproveitar bons momentos sem perder o controle, sem colocar vidas em risco e sem alimentar um ciclo de imprudência. Repensar a forma como lidamos com o álcool é essencial para uma convivência mais saudável e responsável.
-
@ d6affa19:9110b177
2025-03-02 19:43:03i make my way downstairs,
the house is quiet now;
the little ones are finally asleep.
a soft drizzle from the shower fills the silence.
She must've gotten in already—
taking some time for Herself after a long day.i grab two towels from the closet and toss them in the dryer.
She likes them warm.
unsure of how long She's been bathing,
i begin preparing the room.i light a few of Her candles—
a sweet, autumn scent fills the air,
rich with hints of cinnamon and crisp leaves.
it wraps me in a pleasant embrace,
evoking memories of cozy evenings.i turn off the lighting,
leaving only the candlelight flickering.
the room is illuminated with a warm, orange glow.i go ahead and set out the oils and lotions—
wondering what She'll choose tonight...
anticipation quickens my heartbeat,
rousing a familiar longing.with everything prepped,
i take some time to breathe in the atmosphere.
the gentle cascade of water still echoes from the bathroom.
it flows like a calming stream,
creating a soothing ambiance.i lie down on the bed, closing my eyes.
a moment of stillness envelops me,
a brief escape from the day's chaos.
i've been looking forward to this.
i can feel my mindset shifting.suddenly, the shower stops,
breaking the stillness.
my eyes quickly open.
a rush of enthusiasm surges through me.
i spring out of bed and retrieve Her towels from the dryer.upon opening the bathroom door, i'm greeted by Her sweet voice, "Is that my good boy? Perfect timing."
a flash of heat creeps up my neck,
i can't help but grin.
my body relaxes,
the tension eases as i lean into Her approval.i open the shower door then kneel down,
the soft bath mat cushions me.
steam from the shower fills the room,
creating a cocoon of warmth.
Her silhouette glows softly through the mist.i offer the warm towels,
the fabric still radiating heat.
without a word She presents Her leg.
instinctively, i set one towel on my lap,
using the other i begin patting Her dry,
starting from Her pedicured foot.Her smooth skin invites my touch—
but the plush towel acts as a barrier.
once She is satisfied,
i switch to the other leg,
continuing my attentive care."Did they give you any trouble?" She asks, Her tone light and curious.
"I hope they weren't too rough on you.""not tonight, my Queen," i answer, still focused on my task.
"they fell asleep quickly—must've been exhausted."
"Good," She says with a relieved sigh.She then snaps Her fingers—
signaling for me to hand Her the towel.
i comply, moving out of Her way.
She finishes drying Herself and wraps the towel snugly around Her body.
She casually grabs the other towel and wraps it around Her head,
then makes Her way into the bedroom.i watch Her walk over to the nightstand,
setting the lavender oil to the front of it—
this is what She's chosen for the evening.
She then picks up Her phone,
settling onto the edge of the bed,
towel still wrapped around Her."Well done—I love it!" She says, Her voice rich with approval as She absorbs the arrangement.
Her words pull me from my thoughts,
another subtle flush creeping into my cheeks.
i make my way to the nightstand,
picking up the oil.
my pulse quickens as i kneel before Her,
the cool floor a stark contrast to my rising excitement.She tilts Her head from behind Her phone, a playful glint in Her eyes.
"Don't you look so adorable down there?"
She leans forward slightly, Her expression shifting to one of command.
"It's been a long day. So be sure that you give My feet the attention they deserve tonight."my stomach flutters as She lifts one foot.
i take it gently into my hands,
a shiver runs through me.
i pour a small amount of oil into my palm.
the scent of lavender mingles with the autumn candles.as i massage it into Her foot,
i can't help but notice every detail—
the curve of Her arch draws me in,
the softness of Her skin captivates me.She shifts Her foot slightly,
guiding me to the areas that demand my attention.
Her toes wiggle in response.
it's so mesmerizing...
with each stroke i feel my mind quieting.
the chill of the floor fades away.
there's only Her.the rhythm of my hands,
the way the oil glides so smoothly,
the way She relaxes under my touch.
i lose myself in these sensations.
my thoughts slowly dissipate—
replaced by a feeling of clarity, of purpose.i feel Her foot pull away,
momentarily releasing me from my trance.
it's had its fill.
She lifts the other one in front of me.
Her toes curling playfully.
my heartbeat skips.
a desperation fills my chest.
a longing.
to express my devotion in the most intimate way.
to worship the very thing that grounds Her—
that ties Her to this earth.
it's a yearning that goes beyond words.
i can almost taste the moment.
the connection it would bring....
i breathe deeply,
a heavy sigh escaping my lips—
lips that ache to honor Her every curve.
permission lingers in the air,
tantalizing and just out of reach.
i notice Her looking at me,
a giant smirk playing on Her lips,
Her phone now at Her side."Well..?" She teases, a mischievous look in Her eyes.
"What are you waiting for? It's not going to rub itself."
Her toes continue wiggling in front of me—taunting.the urge simmers beneath the surface.
the denial resides like a sweet ache.
i breathe through it,
accepting Her limitation.
i'm grateful for the gift of this moment,
channeling the energy into the task at hand.i gently embrace Her other foot,
admiring the delicate contours of Her ankle.
Her skin feels like silk against my fingertips.
i pour a few more drops of oil into my palm,
the velvety texture glides through my hands.
another burst of lavender dances in the air,
blending again with the persistent aroma of the candles.i begin to knead Her other foot,
focusing on the arch,
applying a careful amount of pressure.
each stroke sends ripples of warmth through my hands,
i feel Her tension melting away beneath my touch.
She lets out a contented sigh and falls back on the bed taking it in.
"Mmmm, that feels good." She encourages.i savor this privilege,
as the flickering candles cast a soft glow around us.
they dance slowly,
a soothing backdrop to the rhythm of my hands.i trace the outline of Her heel,
feeling the delicate curves,
enthralled by Her foot's response.
with each gentle caress,
watching Her toes dance slightly,
a silent acknowledgement of my devotion.as if pulled by a magnetic force,
i lean in closer,
inhaling the sweet aroma of lavender,
it's floral notes fused with the radiance of Her scent.
a sense of peace settles within me.
the weight of the day lifts,
replaced by the comforting embrace of surrender.
i'm here to please Her,
i'm here to honor Her,
i'm here to love Her.
lost in the act of serving,
i feel Her energy flow through me,
binding us together.
closer.as i finish,
i look back up at Her.
my heart swells with pride.
She smiles down at me,
a knowing glimmer in Her eyes.
igniting a fire within me—
a sense of belonging.
right now,
i know exactly where i need to be—
kneeling before Her,
fully aligned with Her presence.in these cherished rituals,
in this sacred exchange,
i find my place.
forever devoted..."I love you, sweet boy." She whispers,
Her words deeply resonating,
echoing the truth of my heart—
that i am completely and utterly Hers. -
@ d6affa19:9110b177
2025-03-02 19:27:10Wander — 19:27
It’s been a long, rough day.
The fresh air feels good,
but my mind is still trapped,
stuck in that office,
its fluorescent lighting,
archaic and noisy,
still buzzes behind my eyes.
Closing that sale was grueling—
the customer’s incessant demands—
they still press against my skull.
My patience feels razor-thin,
the weight of the day settling on my shoulders.On my way to the apartment,
I catch a glimpse of the setting sun.
Its warm hues contrast my somber demeanor.
I check my phone again,
scrolling through my messages.
...
Nothing new…
I haven’t heard from her in hours—
only left on “read.”I let out a sigh.
My body feels heavy.
This day has just dragged on forever.Walking up to the apartment door,
I fumble a bit with my keys,
the metal clinks,
I struggle to find the right one.
Upon entering the dimly lit apartment,
I see her sitting on the sofa,
dressed as if she’s getting ready to leave.Ugh, I don’t feel like going anywhere tonight…
She looks up from her phone,
our eyes locking.
“You didn’t let Me know you were on your way,” her tone sharp.A hint of disappointment in her eyes—
subtle, but pointed.
A silent judgment.
A reminder of my failure—
of a broken word of honor.But my pride,
like a protective big brother,
overshadows the regret gnawing at me,
feeding my mind with justifications.She didn’t respond earlier—
to my messages.
Not a single word.
And now, all of a sudden,
communication matters?
My eyebrows furrow.
My hands clench.“I told you I’d be late today, didn’t I?” I finally answer,
trying to keep my voice steady.
Her nonchalant expression shifts,
becoming more annoyed.“And that has nothing to do with your promise to let Me know when you’re leaving,”
she fires back,
arms folded across her chest.Her voice cuts through the air.
“Now go get cleaned up. I’m hungry and we have a little bit of shopping to do.”I subtly bite at my lip.
A dull pain.
A distraction.
Anything to manage the tension.Taking a seat on the sunken foyer’s edge,
I slowly remove my shoes,
lingering in defiance.Today has been so stressful…
Doesn’t she see that I’m exhausted?
Maybe I don’t want to go back out.
Does she even consider how I feel?
Maybe she’d know if she just asked.“Hey! Are you listening?” She snaps,
impatience saturating her tone.
“What’s wrong?”I remain seated,
and turn my head toward her,
meeting her gaze—
a fierce expression now on her face.A heavy sigh escapes me.
Honestly, I don’t want to tell her no.
But the thought of getting back out…
It feels unbearable.“I’m just so tired,” I finally admitted,
shoulders slumping.She seems unconvinced.
“There’s more to it than that,” she posits,
her eyes piercing through my defenses.
“What is it? Tell me what’s going on.”I turn my head away.
Shame tightens around me,
suffocating, silencing.
From the hurt I feel—
over some ignored messages.
Just a few simple messages…
It seems juvenile.
But it’s amplified by her disregard for my situation.
It stings, and I can’t find the words to express it.
Nor would I if I could.…
At some point, she moved.
I didn’t hear her.
I didn’t see her.
But I feel her now—
towering over me.
Close.
Her presence,
it’s tangible,
like a weight bearing down on me.Looking up at her,
our angry expressions collide,
the air thickens with unspoken tension.
I notice my heart beating faster—
Not only from the conflict,
but from her aura…There’s a shift in her energy.
A quiet intensity brewing beyond her expression.
Have I pushed her too far with my silence..?
Veil — 19:38
With a swift motion,
she lunges forward,
pushing me to my back.
Her weight settles on my stomach,
pinning me to the floor.My breath catches.
Her scent—something floral..?
Jasmine…
It melds with her natural aroma,
igniting my senses.The softness of her skin,
the pressure of her body above me;
they contrast sharply,
a blend of elegance and power."W-what are you doing!?" I exclaim, the surprise evident in my voice.
Her response is immediate.
"I won't tolerate you moping or acting out tonight, boy. Now tell Me what's wrong," she demands,
her voice sharp as a knife.I'm stunned.
A fire burns in my chest—
is it anger?
Or something else?
Embarrassment settles in,
uninvited, heating my face,
her eyes piercing into me."I already told you, I-I'm just tired. There's no need for this!" I plead,
muscles tensing as I try to push her off."Stop pushing!" she commands.
I resist,
frustration spilling over.
"Get off!"Attempting to restrain me,
she grabs my wrists.
But I'm stronger,
easily breaking her grip.
I interlock our hands,
pushing back,
trying to lift her."I said stop!" she asserts,
her voice firm,
unyielding.I continue to push,
arms fully extended.But she suddenly shifts.
Her weight crashes forward,
pinning my arms above my head.
I can’t push from this angle.As she holds me down,
something mingles with the fluster—
an unexpected exhilaration...Her body hovers above mine,
our faces inches apart.
I'm trapped,
her hair falling around us like a curtain.
A predaceous look glimmers in her eyes—
she leans in closer,
jawline tightening,
eyes slowly narrowing,
asserting her dominance.
I can't resist inhaling Her scent,
it’s so distracting—
intoxicating.With every labored breath,
the warmth of Her body presses down on me.
Now sitting on my chest,
Her weight feels heavier,
oddly comforting.Her gaze pursues me.
I look away,
desperate to hide.My heart is racing.
It's overwhelming—
Her scent,
Her pressure,
the gleam in Her eyes.
I struggle to focus.Somehow, without me noticing,
our hands are no longer intertwined…
Instead, She holds my wrists—
tightly against the ground.Lost between defiance and surrender,
my body is betraying me,
not from fear,
but from curiosity.
Or is it a mixture?A shiver travels down my spine,
my body relaxes,
how did we get here..?The desire to resist is fading,
yielding to the magnetic pull of Her presence—
losing myself in Her orbit.Aware of my waning resistance,
a smug grin flashes across Her lips—
so captivating.
I’m melting."Good boy." She whispers into my ear.
Her words surround me like a warm embrace,
and Her smile—
the most precious sight in the world—
puts butterflies in my stomach,
a lightness in my head.
The frustration of the prior moment,
seems somehow…
distant.Still holding my wrists,
She looks down at me,
taking in the moment—
savoring it."Who is your Queen?" She finally asks,
Her voice gentle and sweet.I feel a storm within,
emotions crashing like a tsunami.
Pulling me back to the present—
regret, devotion, shame—
all colliding together.
How She hurt me.
How I failed Her.
I try to look away.
A hint of defiance persisting..."Answer me." She demands,
Her soft tone hardening.
"Who is your Queen?"I pause,
Her gaze weighing more than Her body.
My heart pounds,
and for a moment,
I'm lost in the depths of Her eyes,
searching for an escape—
an escape that isn’t there...The silence stretches,
heavy and expectant.
My throat tightens,
heart pounding—
betraying me..?
Or leading the way?With a resigned breath,
I whisper, "You are..."She immediately follows up,
"And who do you obey?"
Her tone still harsh.My eyes plead to Her fierce gaze,
swallowed in shame.
Begging to avoid the obvious answer,
because of my guilt—
because of my broken promise.
but Her stare is unrelenting,
and I divert my eyes once more."Look at me," She commands sharply,
"Who do you obey?"My eyes instinctively comply,
Her grin now replaced by a stern expression.With no other option,
I mutter my surrender, "...You."
The word slips out,
a quiet truth that echoes in between us,
heavy with contrition,
but liberating."Now answer properly," She demands,
"Who do you obey?""I obey You, my Queen."
The words spill effortlessly from my lips,
weightless and freeing."That's right." She proudly replies.
She releases my wrists and sits up,
a triumphant smile gracing Her lips.
Those enchanting lips…
That beautiful smile…With my arms free,
I feel a mix of relief and lingering tension,
my heart still racing from the struggle.A whirlwind of emotions continue to swell—
shame, regret, adoration—
neglect and dismissal—
longing—
disappointment…And the sight of Her beauty aches—
yet, despite my surrender,
something in Her eyes tells me…She’s just getting started.
Stricken — 19:46
The sun has set.
Its remaining beams peering through the glass door,
filling the room with an orange hue.Her silhouette is framed by the fading light—
imposing, inescapable.
She looms over me,
Her shadow stretching,
covering,
consuming.I lie underneath Her—
underneath Her shadow—
between breath and reverence,
desperately searching,
looking for the right words,
but only stare.I feel trapped.
Not by Her,
but by my own self—
the walls I put up.
Unable to express my regret.
For how I failed Her.
For my own hurt feelings…When suddenly,
and surprisingly,
She slaps me.
Her palm releases a sharp crack,
a sound that echoes in the stillness.
The impact burns on my left cheek,
forcing me to wince,
the world tilts for a heartbeat,
returning me to the moment.Slightly disoriented,
my hands cover my face,
instinctively guarding."Put your hands down." She orders,
Her voice firm.
I hesitate—
caught between instinct and obedience.
Tension coils in my chest.She takes my hand,
tucks it to my side,
and pins it with Her thigh.I don't resist.
She does the same with my other hand,
leaving me unguarded—
vulnerable.Her grip is tight—
constraining.
My senses feel heightened.
The warmth of Her skin—
so smooth against my own—
presses against me.
Deceptively soothing.
A paradox of wrath and comfort,
leading me deeper into the moment.I watch Her draw back Her hand,
preparing another slap.
a stoic look etched across Her face.
My breath catches,
the air is thick with unspoken words.
Yet, strangely,
my heartbeat steadies,
my body relaxes,
ready to absorb Her frustrations.Her hand lands forcefully,
slamming into my left cheek once again,
the sting tight and harsh.
I wince again,
losing focus,
struggling to meet Her gaze."Apologize to me." She commands harshly.
Before I can orient myself,
before I can respond,
She slaps me again.
And again.
And again.
And again.
Each strike lands like a thunderbolt—
a wrecking ball to the walls I’ve built.A fiery pulse ignites my face,
blending with a deviant thrill—
something coursing through me,
blurring agony and bliss.
My eyes form tears.
I fight desperately to hold them back."I said apologize!" She hisses,
Her tone as sharp as Her slaps.
I look up at Her,
trying to focus,
and catch Her expression—
impassive, demanding,
yet with a soft glimmer in Her eyes—
so gorgeous...A warmth radiates from Her,
it blends with the heat from my cheek,
amplifying Her pull,
leaving me breathless,
utterly subject to Her will."I… I'm sorry…" I whimper,
the words barely escaping my lips,
laced with a mixture of shame and exhilaration."For what?" She asks,
Her lips curl,
a blend of annoyance and...
something, something—
primal.I try to take another deep breath,
it's difficult with Her weight pressing down.
My pride aches as much as my face.
I barely maintain composure,
my eyes unable to escape Her gaze.She strikes again,
forcefully,
without warning.
My head snaps to the side,
leaving an imprint on my soul itself.
The barriers I’ve placed—
their remnants—
are completely shattered,
freeing the truth."For disobeying You!" I nearly cry.
The admission tastes bittersweet on my tongue.
It feels like a release,
the confession washing over me,
leaving me breathless and exposed.She lets out an amused laugh.
The smile She was fighting back breaks through,
a satisfied grin that lights up Her face.
My heart to skips a beat.But She's not finished yet.
Purge — 19:52
"And how exactly did you disobey me?" She asks,
already knowing the answer.She's going to make me own it…
The buzzing on my cheek—
a subtle reminder to comply."For not letting You know when I left." I meekly respond.
"And..?" She questions,
not satisfied with the previous answer."And for not getting ready when you asked…" I amend,
my voice barely above a whisper."And..?" She continues,
Her tone becoming impatient.But I'm at a loss—
unsure.
What is She seeking?
My mind races,
desperately searching,
looking for the right words.…
But none come.
Panic sets in,
gnawing, deep—
am I failing Her again?
Was I being too much?
Too needy?
I can’t explain this ache in my chest…She looks down at me,
Her expression softening."For not telling me what's bothering you." She says,
guiding me to the answer."I'm your Queen, and I deserve for you to be honest with Me about everything—“ She continues,
Her voice carrying a tenderness,
cutting through the tension.
“you should feel safe enough to tell Me anything…"My body is still,
yet it feels as if it’s trembling fiercely.
I can only stare.“You don’t have to hide anymore...”
She continues,
“You’re safe now…”My heart feels cracked open.
Lying beneath Her,
restrained and exposed—
and now with Her words…Her voice hangs in the air,
slicing through the chaos.
She's reached into my heart,
through the walls and the barriers,
amidst the insecurities and doubts—
the fear and pain—
touching the essence that is truly me,
with nothing standing in Her way.I look up at Her angelic face,
into Her divine eyes,
and with no more hesitation,
I express what seemed impossible before."I felt… hurt, like You were ignoring me…" the confession falls out clumsily.
“Like… like I wasn’t worth the attention…” my chest tightens more as I speak,
each word breathing life into the hurt I tried to bury.
"Even after such a hard day..."I see the look on Her face change,
Her gentle expression slipping away,
revealing a raw vulnerability.
Silence fills the space between us."And..." I continue,
"And it’s stupid, I know… I’m sorry for being too much, I-I couldn’t help it…" my voice breaking,
“I just… needed You, so much… and you didn’t even message me back… I felt invisible…”I take a moment to regain my composure.
"Like, I know I was supposed to let You know that I was on my way, but... I... I was just so angry... I'm sorry… and it just seems so childish now…" I finish through tears.
The last piece of me lain bare.Her hand slowly reaches down,
caressing my cheek.
Her fingers trace across my skin,
gentle, light—
a stark contrast from the slaps earlier.
The tears linger,
a reminder of all I’ve kept from Her.
Her palm cups my cheek,
softer than I’ve ever known,
and I see in Her eyes,
Her own tension,
a glimmer of regret...“I…” Her voice trembles.
She catches Herself,
maintaining control.But there’s something else—
an unease.
"I didn’t realize… I should have known.” She continues.
“You needed me and I wasn’t there for you, was I?"She looks down,
Her gaze escapes my eyes,
and for a moment,
I see the disappointment in them—
the disappointment in Herself, too.
Her divine presence alters,
revealing a more human beauty…I nod,
feeling the weight of my admission.Her eyes meet with mine again,
shimmering with unshed tears.
She simply stares,
taking it in for a brief moment,
the words settling between us,
forming a bridge that connects our spirits."I'm so sorry, My sweet boy." She says,
trying to hold a steady demeanor.
"I had no idea you needed Me so much today… I was interrupted after reading your message and never followed up. Oh, sweetie, I'm so sorry I wasn't there for you… that I let you down… you’re not… you’re not ‘too much.’"With both arms,
She reaches around my head,
and gives me a powerful embrace.
The hug is so tight that I can barely breathe.
She begins saying something else,
but it sounds muffled,
I can't make it out.And yet, it doesn't matter.
Her words—
Her acknowledgment...
the tension inside me begins to unravel.And, despite Her increasing pressure on top of me,
it’s as if the weight of the world has been lifted from my chest,
replaced by a serene joy that blossoms within—
from knowing that She cares,
that She was able to reach out and guide me to the honesty of my confession,
creating a space where we could see each other authentically.Her arms tighten around me,
I melt into Her embrace.
My heart pounds.
But not frantically—
it’s steady now,
slow, calming,
like a gentle wave.
Her breath against my neck,
warm and soothing,
Her embrace,
feels like a sanctuary,
where my heart can rest and heal.Everything fades,
only the sound of Her heartbeat,
it intertwines with mine,
forming a profound connection.
I dare not move,
I dare not disturb this moment,
not for air,
not for life itself—
this closeness is all I crave,
and I would die for it.…
Then,
just like that,
the moment fades.
Her arms loosen,
the weight of Her touch lifts,
leaving an emptiness.My body feels light,
but my heart is heavy—
full.I need a moment,
in this space,
in the silence,
to gather the pieces of myself—
the pieces She’s helped reveal.
Bound — 20:04
She releases Her grip on me,
returning Herself to a seated position.
I inhale sharply,
much-needed air filling my lungs.
She lets out an adorable chuckle at the sight.My vision clears,
drawn to Her beautiful smile."So, will you forgive Me, sweet boy?" She asks, wiping a few tears from Her own eyes.
"Of course, my Queen." I respond almost reflexively.
"Will You forgive me?"She leans down,
Her lips pressing lightly on my forehead.
"I already have, My sweet boy," She smiles.The warmth of Her kiss lingers,
sending a shiver down my spine.She stands up,
relieving the pressure on my chest.
My lungs seize the opportunity,
pulling in air.
But the relief is fleeting—Her foot crashes down,
pressing me back into the ground.
Her weight returns—
focused,
steady,
absolute.
I’m breathless again—
by the force She exerts,
and the sight of Her over me.She stands poised,
effortless.
A Queen assessing Her property.
The look in Her eyes sharpens again,
though this time,
amusement dances behind them.She shifts Her weight slightly,
a small, deliberate adjustment.
The pressure deepens,
spreading through my chest—
slow, rolling,
a silent warning."And don't you ever give me a reason to do this to you again, do you understand me, boy?" She asks,
the weight increasing,
firm and steady.
My body strains beneath Her foot,
not quite pain,
something heavy,
something consuming,
part of me craving more…"Yes, my Queen." the words escape,
slipping through shallow breaths.
I wince,
but the feeling is not unwelcome—
it feels grounding,
reassuring.She presses a little more.
A test..?
I instinctively tense,
but don’t resist.
Our clothing dulls the sensation,
but amplifies something deeper—
the certainty of Her control,
the reality of Her dominance."I need you to be open and honest with your feelings, got it?" She continues,
Her tone firm,
and yet warm,
welcoming."Of course, my Queen." I vow instantly,
the words feeling like both a promise and a plea."Good boy." She adds with a satisfied grin spreading across Her face,
lighting up Her features.
"Now, get yourself cleaned up, I'm hungry and we have some shopping to do."She lingers for a moment.
Then with a slow, deliberate motion,
She finally lifts Her foot from my chest.
The absence is sudden.
The liberation…
unnatural.
Wrong.My chest rises sharply,
filling with air once again,
the breath She has granted me.Above me,
She smiles,
admiring Her handiwork.
There’s a sense of satisfaction in Her expression,
a silent acknowledgment of our shared moment."Yes, my Queen. Thank You, my Queen." I say to Her with a smile,
my heart swelling with gratitude.But there’s something else…
I hesitate.
The words are there,
on the tip of my tongue.
Will She welcome them..?
Acknowledge them..?<She watches me closely,
aware,
waiting,
Her eyes softening,
enough to make my heart stutter.
But I can’t hold them in any longer—…
"…I love You," I add,
the words spilling out of me. -
@ 6be5cc06:5259daf0
2025-01-21 01:51:46Bitcoin: Um sistema de dinheiro eletrônico direto entre pessoas.
Satoshi Nakamoto
satoshin@gmx.com
www.bitcoin.org
Resumo
O Bitcoin é uma forma de dinheiro digital que permite pagamentos diretos entre pessoas, sem a necessidade de um banco ou instituição financeira. Ele resolve um problema chamado gasto duplo, que ocorre quando alguém tenta gastar o mesmo dinheiro duas vezes. Para evitar isso, o Bitcoin usa uma rede descentralizada onde todos trabalham juntos para verificar e registrar as transações.
As transações são registradas em um livro público chamado blockchain, protegido por uma técnica chamada Prova de Trabalho. Essa técnica cria uma cadeia de registros que não pode ser alterada sem refazer todo o trabalho já feito. Essa cadeia é mantida pelos computadores que participam da rede, e a mais longa é considerada a verdadeira.
Enquanto a maior parte do poder computacional da rede for controlada por participantes honestos, o sistema continuará funcionando de forma segura. A rede é flexível, permitindo que qualquer pessoa entre ou saia a qualquer momento, sempre confiando na cadeia mais longa como prova do que aconteceu.
1. Introdução
Hoje, quase todos os pagamentos feitos pela internet dependem de bancos ou empresas como processadores de pagamento (cartões de crédito, por exemplo) para funcionar. Embora esse sistema seja útil, ele tem problemas importantes porque é baseado em confiança.
Primeiro, essas empresas podem reverter pagamentos, o que é útil em caso de erros, mas cria custos e incertezas. Isso faz com que pequenas transações, como pagar centavos por um serviço, se tornem inviáveis. Além disso, os comerciantes são obrigados a desconfiar dos clientes, pedindo informações extras e aceitando fraudes como algo inevitável.
Esses problemas não existem no dinheiro físico, como o papel-moeda, onde o pagamento é final e direto entre as partes. No entanto, não temos como enviar dinheiro físico pela internet sem depender de um intermediário confiável.
O que precisamos é de um sistema de pagamento eletrônico baseado em provas matemáticas, não em confiança. Esse sistema permitiria que qualquer pessoa enviasse dinheiro diretamente para outra, sem depender de bancos ou processadores de pagamento. Além disso, as transações seriam irreversíveis, protegendo vendedores contra fraudes, mas mantendo a possibilidade de soluções para disputas legítimas.
Neste documento, apresentamos o Bitcoin, que resolve o problema do gasto duplo usando uma rede descentralizada. Essa rede cria um registro público e protegido por cálculos matemáticos, que garante a ordem das transações. Enquanto a maior parte da rede for controlada por pessoas honestas, o sistema será seguro contra ataques.
2. Transações
Para entender como funciona o Bitcoin, é importante saber como as transações são realizadas. Imagine que você quer transferir uma "moeda digital" para outra pessoa. No sistema do Bitcoin, essa "moeda" é representada por uma sequência de registros que mostram quem é o atual dono. Para transferi-la, você adiciona um novo registro comprovando que agora ela pertence ao próximo dono. Esse registro é protegido por um tipo especial de assinatura digital.
O que é uma assinatura digital?
Uma assinatura digital é como uma senha secreta, mas muito mais segura. No Bitcoin, cada usuário tem duas chaves: uma "chave privada", que é secreta e serve para criar a assinatura, e uma "chave pública", que pode ser compartilhada com todos e é usada para verificar se a assinatura é válida. Quando você transfere uma moeda, usa sua chave privada para assinar a transação, provando que você é o dono. A próxima pessoa pode usar sua chave pública para confirmar isso.
Como funciona na prática?
Cada "moeda" no Bitcoin é, na verdade, uma cadeia de assinaturas digitais. Vamos imaginar o seguinte cenário:
- A moeda está com o Dono 0 (você). Para transferi-la ao Dono 1, você assina digitalmente a transação com sua chave privada. Essa assinatura inclui o código da transação anterior (chamado de "hash") e a chave pública do Dono 1.
- Quando o Dono 1 quiser transferir a moeda ao Dono 2, ele assinará a transação seguinte com sua própria chave privada, incluindo também o hash da transação anterior e a chave pública do Dono 2.
- Esse processo continua, formando uma "cadeia" de transações. Qualquer pessoa pode verificar essa cadeia para confirmar quem é o atual dono da moeda.
Resolvendo o problema do gasto duplo
Um grande desafio com moedas digitais é o "gasto duplo", que é quando uma mesma moeda é usada em mais de uma transação. Para evitar isso, muitos sistemas antigos dependiam de uma entidade central confiável, como uma casa da moeda, que verificava todas as transações. No entanto, isso criava um ponto único de falha e centralizava o controle do dinheiro.
O Bitcoin resolve esse problema de forma inovadora: ele usa uma rede descentralizada onde todos os participantes (os "nós") têm acesso a um registro completo de todas as transações. Cada nó verifica se as transações são válidas e se a moeda não foi gasta duas vezes. Quando a maioria dos nós concorda com a validade de uma transação, ela é registrada permanentemente na blockchain.
Por que isso é importante?
Essa solução elimina a necessidade de confiar em uma única entidade para gerenciar o dinheiro, permitindo que qualquer pessoa no mundo use o Bitcoin sem precisar de permissão de terceiros. Além disso, ela garante que o sistema seja seguro e resistente a fraudes.
3. Servidor Timestamp
Para assegurar que as transações sejam realizadas de forma segura e transparente, o sistema Bitcoin utiliza algo chamado de "servidor de registro de tempo" (timestamp). Esse servidor funciona como um registro público que organiza as transações em uma ordem específica.
Ele faz isso agrupando várias transações em blocos e criando um código único chamado "hash". Esse hash é como uma impressão digital que representa todo o conteúdo do bloco. O hash de cada bloco é amplamente divulgado, como se fosse publicado em um jornal ou em um fórum público.
Esse processo garante que cada bloco de transações tenha um registro de quando foi criado e que ele existia naquele momento. Além disso, cada novo bloco criado contém o hash do bloco anterior, formando uma cadeia contínua de blocos conectados — conhecida como blockchain.
Com isso, se alguém tentar alterar qualquer informação em um bloco anterior, o hash desse bloco mudará e não corresponderá ao hash armazenado no bloco seguinte. Essa característica torna a cadeia muito segura, pois qualquer tentativa de fraude seria imediatamente detectada.
O sistema de timestamps é essencial para provar a ordem cronológica das transações e garantir que cada uma delas seja única e autêntica. Dessa forma, ele reforça a segurança e a confiança na rede Bitcoin.
4. Prova-de-Trabalho
Para implementar o registro de tempo distribuído no sistema Bitcoin, utilizamos um mecanismo chamado prova-de-trabalho. Esse sistema é semelhante ao Hashcash, desenvolvido por Adam Back, e baseia-se na criação de um código único, o "hash", por meio de um processo computacionalmente exigente.
A prova-de-trabalho envolve encontrar um valor especial que, quando processado junto com as informações do bloco, gere um hash que comece com uma quantidade específica de zeros. Esse valor especial é chamado de "nonce". Encontrar o nonce correto exige um esforço significativo do computador, porque envolve tentativas repetidas até que a condição seja satisfeita.
Esse processo é importante porque torna extremamente difícil alterar qualquer informação registrada em um bloco. Se alguém tentar mudar algo em um bloco, seria necessário refazer o trabalho de computação não apenas para aquele bloco, mas também para todos os blocos que vêm depois dele. Isso garante a segurança e a imutabilidade da blockchain.
A prova-de-trabalho também resolve o problema de decidir qual cadeia de blocos é a válida quando há múltiplas cadeias competindo. A decisão é feita pela cadeia mais longa, pois ela representa o maior esforço computacional já realizado. Isso impede que qualquer indivíduo ou grupo controle a rede, desde que a maioria do poder de processamento seja mantida por participantes honestos.
Para garantir que o sistema permaneça eficiente e equilibrado, a dificuldade da prova-de-trabalho é ajustada automaticamente ao longo do tempo. Se novos blocos estiverem sendo gerados rapidamente, a dificuldade aumenta; se estiverem sendo gerados muito lentamente, a dificuldade diminui. Esse ajuste assegura que novos blocos sejam criados aproximadamente a cada 10 minutos, mantendo o sistema estável e funcional.
5. Rede
A rede Bitcoin é o coração do sistema e funciona de maneira distribuída, conectando vários participantes (ou nós) para garantir o registro e a validação das transações. Os passos para operar essa rede são:
-
Transmissão de Transações: Quando alguém realiza uma nova transação, ela é enviada para todos os nós da rede. Isso é feito para garantir que todos estejam cientes da operação e possam validá-la.
-
Coleta de Transações em Blocos: Cada nó agrupa as novas transações recebidas em um "bloco". Este bloco será preparado para ser adicionado à cadeia de blocos (a blockchain).
-
Prova-de-Trabalho: Os nós competem para resolver a prova-de-trabalho do bloco, utilizando poder computacional para encontrar um hash válido. Esse processo é como resolver um quebra-cabeça matemático difícil.
-
Envio do Bloco Resolvido: Quando um nó encontra a solução para o bloco (a prova-de-trabalho), ele compartilha esse bloco com todos os outros nós na rede.
-
Validação do Bloco: Cada nó verifica o bloco recebido para garantir que todas as transações nele contidas sejam válidas e que nenhuma moeda tenha sido gasta duas vezes. Apenas blocos válidos são aceitos.
-
Construção do Próximo Bloco: Os nós que aceitaram o bloco começam a trabalhar na criação do próximo bloco, utilizando o hash do bloco aceito como base (hash anterior). Isso mantém a continuidade da cadeia.
Resolução de Conflitos e Escolha da Cadeia Mais Longa
Os nós sempre priorizam a cadeia mais longa, pois ela representa o maior esforço computacional já realizado, garantindo maior segurança. Se dois blocos diferentes forem compartilhados simultaneamente, os nós trabalharão no primeiro bloco recebido, mas guardarão o outro como uma alternativa. Caso o segundo bloco eventualmente forme uma cadeia mais longa (ou seja, tenha mais blocos subsequentes), os nós mudarão para essa nova cadeia.
Tolerância a Falhas
A rede é robusta e pode lidar com mensagens que não chegam a todos os nós. Uma transação não precisa alcançar todos os nós de imediato; basta que chegue a um número suficiente deles para ser incluída em um bloco. Da mesma forma, se um nó não receber um bloco em tempo hábil, ele pode solicitá-lo ao perceber que está faltando quando o próximo bloco é recebido.
Esse mecanismo descentralizado permite que a rede Bitcoin funcione de maneira segura, confiável e resiliente, sem depender de uma autoridade central.
6. Incentivo
O incentivo é um dos pilares fundamentais que sustenta o funcionamento da rede Bitcoin, garantindo que os participantes (nós) continuem operando de forma honesta e contribuindo com recursos computacionais. Ele é estruturado em duas partes principais: a recompensa por mineração e as taxas de transação.
Recompensa por Mineração
Por convenção, o primeiro registro em cada bloco é uma transação especial que cria novas moedas e as atribui ao criador do bloco. Essa recompensa incentiva os mineradores a dedicarem poder computacional para apoiar a rede. Como não há uma autoridade central para emitir moedas, essa é a maneira pela qual novas moedas entram em circulação. Esse processo pode ser comparado ao trabalho de garimpeiros, que utilizam recursos para colocar mais ouro em circulação. No caso do Bitcoin, o "recurso" consiste no tempo de CPU e na energia elétrica consumida para resolver a prova-de-trabalho.
Taxas de Transação
Além da recompensa por mineração, os mineradores também podem ser incentivados pelas taxas de transação. Se uma transação utiliza menos valor de saída do que o valor de entrada, a diferença é tratada como uma taxa, que é adicionada à recompensa do bloco contendo essa transação. Com o passar do tempo e à medida que o número de moedas em circulação atinge o limite predeterminado, essas taxas de transação se tornam a principal fonte de incentivo, substituindo gradualmente a emissão de novas moedas. Isso permite que o sistema opere sem inflação, uma vez que o número total de moedas permanece fixo.
Incentivo à Honestidade
O design do incentivo também busca garantir que os participantes da rede mantenham um comportamento honesto. Para um atacante que consiga reunir mais poder computacional do que o restante da rede, ele enfrentaria duas escolhas:
- Usar esse poder para fraudar o sistema, como reverter transações e roubar pagamentos.
- Seguir as regras do sistema, criando novos blocos e recebendo recompensas legítimas.
A lógica econômica favorece a segunda opção, pois um comportamento desonesto prejudicaria a confiança no sistema, diminuindo o valor de todas as moedas, incluindo aquelas que o próprio atacante possui. Jogar dentro das regras não apenas maximiza o retorno financeiro, mas também preserva a validade e a integridade do sistema.
Esse mecanismo garante que os incentivos econômicos estejam alinhados com o objetivo de manter a rede segura, descentralizada e funcional ao longo do tempo.
7. Recuperação do Espaço em Disco
Depois que uma moeda passa a estar protegida por muitos blocos na cadeia, as informações sobre as transações antigas que a geraram podem ser descartadas para economizar espaço em disco. Para que isso seja possível sem comprometer a segurança, as transações são organizadas em uma estrutura chamada "árvore de Merkle". Essa árvore funciona como um resumo das transações: em vez de armazenar todas elas, guarda apenas um "hash raiz", que é como uma assinatura compacta que representa todo o grupo de transações.
Os blocos antigos podem, então, ser simplificados, removendo as partes desnecessárias dessa árvore. Apenas a raiz do hash precisa ser mantida no cabeçalho do bloco, garantindo que a integridade dos dados seja preservada, mesmo que detalhes específicos sejam descartados.
Para exemplificar: imagine que você tenha vários recibos de compra. Em vez de guardar todos os recibos, você cria um documento e lista apenas o valor total de cada um. Mesmo que os recibos originais sejam descartados, ainda é possível verificar a soma com base nos valores armazenados.
Além disso, o espaço ocupado pelos blocos em si é muito pequeno. Cada bloco sem transações ocupa apenas cerca de 80 bytes. Isso significa que, mesmo com blocos sendo gerados a cada 10 minutos, o crescimento anual em espaço necessário é insignificante: apenas 4,2 MB por ano. Com a capacidade de armazenamento dos computadores crescendo a cada ano, esse espaço continuará sendo trivial, garantindo que a rede possa operar de forma eficiente sem problemas de armazenamento, mesmo a longo prazo.
8. Verificação de Pagamento Simplificada
É possível confirmar pagamentos sem a necessidade de operar um nó completo da rede. Para isso, o usuário precisa apenas de uma cópia dos cabeçalhos dos blocos da cadeia mais longa (ou seja, a cadeia com maior esforço de trabalho acumulado). Ele pode verificar a validade de uma transação ao consultar os nós da rede até obter a confirmação de que tem a cadeia mais longa. Para isso, utiliza-se o ramo Merkle, que conecta a transação ao bloco em que ela foi registrada.
Entretanto, o método simplificado possui limitações: ele não pode confirmar uma transação isoladamente, mas sim assegurar que ela ocupa um lugar específico na cadeia mais longa. Dessa forma, se um nó da rede aprova a transação, os blocos subsequentes reforçam essa aceitação.
A verificação simplificada é confiável enquanto a maioria dos nós da rede for honesta. Contudo, ela se torna vulnerável caso a rede seja dominada por um invasor. Nesse cenário, um atacante poderia fabricar transações fraudulentas que enganariam o usuário temporariamente até que o invasor obtivesse controle completo da rede.
Uma estratégia para mitigar esse risco é configurar alertas nos softwares de nós completos. Esses alertas identificam blocos inválidos, sugerindo ao usuário baixar o bloco completo para confirmar qualquer inconsistência. Para maior segurança, empresas que realizam pagamentos frequentes podem preferir operar seus próprios nós, reduzindo riscos e permitindo uma verificação mais direta e confiável.
9. Combinando e Dividindo Valor
No sistema Bitcoin, cada unidade de valor é tratada como uma "moeda" individual, mas gerenciar cada centavo como uma transação separada seria impraticável. Para resolver isso, o Bitcoin permite que valores sejam combinados ou divididos em transações, facilitando pagamentos de qualquer valor.
Entradas e Saídas
Cada transação no Bitcoin é composta por:
- Entradas: Representam os valores recebidos em transações anteriores.
- Saídas: Correspondem aos valores enviados, divididos entre os destinatários e, eventualmente, o troco para o remetente.
Normalmente, uma transação contém:
- Uma única entrada com valor suficiente para cobrir o pagamento.
- Ou várias entradas combinadas para atingir o valor necessário.
O valor total das saídas nunca excede o das entradas, e a diferença (se houver) pode ser retornada ao remetente como troco.
Exemplo Prático
Imagine que você tem duas entradas:
- 0,03 BTC
- 0,07 BTC
Se deseja enviar 0,08 BTC para alguém, a transação terá:
- Entrada: As duas entradas combinadas (0,03 + 0,07 BTC = 0,10 BTC).
- Saídas: Uma para o destinatário (0,08 BTC) e outra como troco para você (0,02 BTC).
Essa flexibilidade permite que o sistema funcione sem precisar manipular cada unidade mínima individualmente.
Difusão e Simplificação
A difusão de transações, onde uma depende de várias anteriores e assim por diante, não representa um problema. Não é necessário armazenar ou verificar o histórico completo de uma transação para utilizá-la, já que o registro na blockchain garante sua integridade.
10. Privacidade
O modelo bancário tradicional oferece um certo nível de privacidade, limitando o acesso às informações financeiras apenas às partes envolvidas e a um terceiro confiável (como bancos ou instituições financeiras). No entanto, o Bitcoin opera de forma diferente, pois todas as transações são publicamente registradas na blockchain. Apesar disso, a privacidade pode ser mantida utilizando chaves públicas anônimas, que desvinculam diretamente as transações das identidades das partes envolvidas.
Fluxo de Informação
- No modelo tradicional, as transações passam por um terceiro confiável que conhece tanto o remetente quanto o destinatário.
- No Bitcoin, as transações são anunciadas publicamente, mas sem revelar diretamente as identidades das partes. Isso é comparável a dados divulgados por bolsas de valores, onde informações como o tempo e o tamanho das negociações (a "fita") são públicas, mas as identidades das partes não.
Protegendo a Privacidade
Para aumentar a privacidade no Bitcoin, são adotadas as seguintes práticas:
- Chaves Públicas Anônimas: Cada transação utiliza um par de chaves diferentes, dificultando a associação com um proprietário único.
- Prevenção de Ligação: Ao usar chaves novas para cada transação, reduz-se a possibilidade de links evidentes entre múltiplas transações realizadas pelo mesmo usuário.
Riscos de Ligação
Embora a privacidade seja fortalecida, alguns riscos permanecem:
- Transações multi-entrada podem revelar que todas as entradas pertencem ao mesmo proprietário, caso sejam necessárias para somar o valor total.
- O proprietário da chave pode ser identificado indiretamente por transações anteriores que estejam conectadas.
11. Cálculos
Imagine que temos um sistema onde as pessoas (ou computadores) competem para adicionar informações novas (blocos) a um grande registro público (a cadeia de blocos ou blockchain). Este registro é como um livro contábil compartilhado, onde todos podem verificar o que está escrito.
Agora, vamos pensar em um cenário: um atacante quer enganar o sistema. Ele quer mudar informações já registradas para beneficiar a si mesmo, por exemplo, desfazendo um pagamento que já fez. Para isso, ele precisa criar uma versão alternativa do livro contábil (a cadeia de blocos dele) e convencer todos os outros participantes de que essa versão é a verdadeira.
Mas isso é extremamente difícil.
Como o Ataque Funciona
Quando um novo bloco é adicionado à cadeia, ele depende de cálculos complexos que levam tempo e esforço. Esses cálculos são como um grande quebra-cabeça que precisa ser resolvido.
- Os “bons jogadores” (nós honestos) estão sempre trabalhando juntos para resolver esses quebra-cabeças e adicionar novos blocos à cadeia verdadeira.
- O atacante, por outro lado, precisa resolver quebra-cabeças sozinho, tentando “alcançar” a cadeia honesta para que sua versão alternativa pareça válida.
Se a cadeia honesta já está vários blocos à frente, o atacante começa em desvantagem, e o sistema está projetado para que a dificuldade de alcançá-los aumente rapidamente.
A Corrida Entre Cadeias
Você pode imaginar isso como uma corrida. A cada bloco novo que os jogadores honestos adicionam à cadeia verdadeira, eles se distanciam mais do atacante. Para vencer, o atacante teria que resolver os quebra-cabeças mais rápido que todos os outros jogadores honestos juntos.
Suponha que:
- A rede honesta tem 80% do poder computacional (ou seja, resolve 8 de cada 10 quebra-cabeças).
- O atacante tem 20% do poder computacional (ou seja, resolve 2 de cada 10 quebra-cabeças).
Cada vez que a rede honesta adiciona um bloco, o atacante tem que "correr atrás" e resolver mais quebra-cabeças para alcançar.
Por Que o Ataque Fica Cada Vez Mais Improvável?
Vamos usar uma fórmula simples para mostrar como as chances de sucesso do atacante diminuem conforme ele precisa "alcançar" mais blocos:
P = (q/p)^z
- q é o poder computacional do atacante (20%, ou 0,2).
- p é o poder computacional da rede honesta (80%, ou 0,8).
- z é a diferença de blocos entre a cadeia honesta e a cadeia do atacante.
Se o atacante está 5 blocos atrás (z = 5):
P = (0,2 / 0,8)^5 = (0,25)^5 = 0,00098, (ou, 0,098%)
Isso significa que o atacante tem menos de 0,1% de chance de sucesso — ou seja, é muito improvável.
Se ele estiver 10 blocos atrás (z = 10):
P = (0,2 / 0,8)^10 = (0,25)^10 = 0,000000095, (ou, 0,0000095%).
Neste caso, as chances de sucesso são praticamente nulas.
Um Exemplo Simples
Se você jogar uma moeda, a chance de cair “cara” é de 50%. Mas se precisar de 10 caras seguidas, sua chance já é bem menor. Se precisar de 20 caras seguidas, é quase impossível.
No caso do Bitcoin, o atacante precisa de muito mais do que 20 caras seguidas. Ele precisa resolver quebra-cabeças extremamente difíceis e alcançar os jogadores honestos que estão sempre à frente. Isso faz com que o ataque seja inviável na prática.
Por Que Tudo Isso é Seguro?
- A probabilidade de sucesso do atacante diminui exponencialmente. Isso significa que, quanto mais tempo passa, menor é a chance de ele conseguir enganar o sistema.
- A cadeia verdadeira (honesta) está protegida pela força da rede. Cada novo bloco que os jogadores honestos adicionam à cadeia torna mais difícil para o atacante alcançar.
E Se o Atacante Tentar Continuar?
O atacante poderia continuar tentando indefinidamente, mas ele estaria gastando muito tempo e energia sem conseguir nada. Enquanto isso, os jogadores honestos estão sempre adicionando novos blocos, tornando o trabalho do atacante ainda mais inútil.
Assim, o sistema garante que a cadeia verdadeira seja extremamente segura e que ataques sejam, na prática, impossíveis de ter sucesso.
12. Conclusão
Propusemos um sistema de transações eletrônicas que elimina a necessidade de confiança, baseando-se em assinaturas digitais e em uma rede peer-to-peer que utiliza prova de trabalho. Isso resolve o problema do gasto duplo, criando um histórico público de transações imutável, desde que a maioria do poder computacional permaneça sob controle dos participantes honestos. A rede funciona de forma simples e descentralizada, com nós independentes que não precisam de identificação ou coordenação direta. Eles entram e saem livremente, aceitando a cadeia de prova de trabalho como registro do que ocorreu durante sua ausência. As decisões são tomadas por meio do poder de CPU, validando blocos legítimos, estendendo a cadeia e rejeitando os inválidos. Com este mecanismo de consenso, todas as regras e incentivos necessários para o funcionamento seguro e eficiente do sistema são garantidos.
Faça o download do whitepaper original em português: https://bitcoin.org/files/bitcoin-paper/bitcoin_pt_br.pdf
-
@ f9cf4e94:96abc355
2025-01-18 06:09:50Para esse exemplo iremos usar: | Nome | Imagem | Descrição | | --------------- | ------------------------------------------------------------ | ------------------------------------------------------------ | | Raspberry PI B+ |
| Cortex-A53 (ARMv8) 64-bit a 1.4GHz e 1 GB de SDRAM LPDDR2, | | Pen drive |
| 16Gb |
Recomendo que use o Ubuntu Server para essa instalação. Você pode baixar o Ubuntu para Raspberry Pi aqui. O passo a passo para a instalação do Ubuntu no Raspberry Pi está disponível aqui. Não instale um desktop (como xubuntu, lubuntu, xfce, etc.).
Passo 1: Atualizar o Sistema 🖥️
Primeiro, atualize seu sistema e instale o Tor:
bash apt update apt install tor
Passo 2: Criar o Arquivo de Serviço
nrs.service
🔧Crie o arquivo de serviço que vai gerenciar o servidor Nostr. Você pode fazer isso com o seguinte conteúdo:
```unit [Unit] Description=Nostr Relay Server Service After=network.target
[Service] Type=simple WorkingDirectory=/opt/nrs ExecStart=/opt/nrs/nrs-arm64 Restart=on-failure
[Install] WantedBy=multi-user.target ```
Passo 3: Baixar o Binário do Nostr 🚀
Baixe o binário mais recente do Nostr aqui no GitHub.
Passo 4: Criar as Pastas Necessárias 📂
Agora, crie as pastas para o aplicativo e o pendrive:
bash mkdir -p /opt/nrs /mnt/edriver
Passo 5: Listar os Dispositivos Conectados 🔌
Para saber qual dispositivo você vai usar, liste todos os dispositivos conectados:
bash lsblk
Passo 6: Formatando o Pendrive 💾
Escolha o pendrive correto (por exemplo,
/dev/sda
) e formate-o:bash mkfs.vfat /dev/sda
Passo 7: Montar o Pendrive 💻
Monte o pendrive na pasta
/mnt/edriver
:bash mount /dev/sda /mnt/edriver
Passo 8: Verificar UUID dos Dispositivos 📋
Para garantir que o sistema monte o pendrive automaticamente, liste os UUID dos dispositivos conectados:
bash blkid
Passo 9: Alterar o
fstab
para Montar o Pendrive Automáticamente 📝Abra o arquivo
/etc/fstab
e adicione uma linha para o pendrive, com o UUID que você obteve no passo anterior. A linha deve ficar assim:fstab UUID=9c9008f8-f852 /mnt/edriver vfat defaults 0 0
Passo 10: Copiar o Binário para a Pasta Correta 📥
Agora, copie o binário baixado para a pasta
/opt/nrs
:bash cp nrs-arm64 /opt/nrs
Passo 11: Criar o Arquivo de Configuração 🛠️
Crie o arquivo de configuração com o seguinte conteúdo e salve-o em
/opt/nrs/config.yaml
:yaml app_env: production info: name: Nostr Relay Server description: Nostr Relay Server pub_key: "" contact: "" url: http://localhost:3334 icon: https://external-content.duckduckgo.com/iu/?u= https://public.bnbstatic.com/image/cms/crawler/COINCU_NEWS/image-495-1024x569.png base_path: /mnt/edriver negentropy: true
Passo 12: Copiar o Serviço para o Diretório de Systemd ⚙️
Agora, copie o arquivo
nrs.service
para o diretório/etc/systemd/system/
:bash cp nrs.service /etc/systemd/system/
Recarregue os serviços e inicie o serviço
nrs
:bash systemctl daemon-reload systemctl enable --now nrs.service
Passo 13: Configurar o Tor 🌐
Abra o arquivo de configuração do Tor
/var/lib/tor/torrc
e adicione a seguinte linha:torrc HiddenServiceDir /var/lib/tor/nostr_server/ HiddenServicePort 80 127.0.0.1:3334
Passo 14: Habilitar e Iniciar o Tor 🧅
Agora, ative e inicie o serviço Tor:
bash systemctl enable --now tor.service
O Tor irá gerar um endereço
.onion
para o seu servidor Nostr. Você pode encontrá-lo no arquivo/var/lib/tor/nostr_server/hostname
.
Observações ⚠️
- Com essa configuração, os dados serão salvos no pendrive, enquanto o binário ficará no cartão SD do Raspberry Pi.
- O endereço
.onion
do seu servidor Nostr será algo como:ws://y3t5t5wgwjif<exemplo>h42zy7ih6iwbyd.onion
.
Agora, seu servidor Nostr deve estar configurado e funcionando com Tor! 🥳
Se este artigo e as informações aqui contidas forem úteis para você, convidamos a considerar uma doação ao autor como forma de reconhecimento e incentivo à produção de novos conteúdos.
-
@ 2b1964b8:851949fa
2025-03-02 19:00:56Routine Picture-in-Picture American Sign Language Interpretation in American Broadcasting
(PiP, ASL)
Picture-in-picture sign language interpretation is a standard feature in news broadcasts across the globe. Why hasn’t America become a leader in picture-in-picture implementation too?
Misconception.
There are prevalent misunderstandings about the necessity of ASL interpreters in the media and beyond. As recently as January 2025, an American influencer with ~10M social followers on Instagram and X combined, referred to sign language interpreters during emergency briefings as a distraction.
Such views overlook the fact that, for many deaf individuals, American Sign Language is their primary language. It is wrongly assumed that deaf Americans know—or should know—English. American Sign Language differs in grammatical structure from English. Moreover, human interpreters are able to convey nuances that captions often miss, such as non-manual markers; facial expressions, body movements, head positions utilized in sign language to convey meaning. English is the native language for many hearing Americans, who have access to it throughout the United States without any additional expectation placed upon them.
A deeper understanding reveals that many nations have their own unique signed languages, reflecting their local deaf culture and community — Brazilian Sign Language, British Sign Language, Finnish Sign Language, French Sign Language, Japanese Sign Language, Mexican Sign Language, Nigerian Sign Language, and South African Sign Language, among numerous others.
Bottom Line: American Sign Language is the native language for many American-born deaf individuals, and English is the native language for many American-born hearing individuals. It is a one-for-one relationship; both are equal.
In an era where information dissemination is instantaneous, ensuring that mainstream broadcasts are accessible to all citizens is paramount.
Public Figures Including Language Access In Their Riders
What's a rider? A rider is an addendum or supplemental clause added to a contract that expands or adjusts the contract's terms. Riders are commonly used in agreements for public figures to specify additional requirements such as personal preferences or technical needs.
A Simple Yet Powerful Action
Public figures have a unique ability to shape industry standards, and by including language access in their riders, they can make a profound impact with minimal effort. * On-site American Sign Language interpretation ensures that deaf and hard-of-hearing individuals can fully engage with speeches and live events. * Open captions (burned-in captions) for all live and post-production interview segments guarantee accessibility across platforms, making spoken content instantly available to a wider audience. These implements don’t just benefit deaf constitutents—they also support language learners, individuals in sound-sensitive environments and any person who relies on, or simply refers, visual reinforcement to engage with spoken content.
For public figures, adding these 2 requests to a rider is one of the most efficient and immediate ways to promote accessibility. By normalizing language access as a standard expectation, you encourage event organizers, broadcasters, and production teams to adopt these practices universally.
As a result, there will be an industry shift from accessibility as an occasional accommodation to an industry norm, ensuring that future events, interviews, and media content are more accessible for all. Beyond immediate accessibility, the regular presence of interpreters in public spaces increases awareness of sign language. Seeing interpreters in mainstream media can spark interest among both deaf and hearing children to pursue careers in interpretation, expanding future language access and representation.
Year-Round Commitment to Accessibility
Too often, language access is only considered when an immediate demand arises, which leads to rushed or inadequate solutions. While some events may include interpretation or captioning, these efforts can fall short when they lack the expertise and coordination necessary for true disability justice. Thoughtful, proactive planning ensures that language access is seamlessly integrated into events, rather than being a reactive measure.
Best practices happen when all key players are involved from the start: * Accessibility leads with combined production and linguistic knowledge who can ensure accessibility remains central to the purpose rather than allowing themselves to be caught up in the spectacle of an event. * Language experts who ensure accuracy and cultural competency.
* Production professionals who understand event logistics.By prioritizing accessibility year-round, organizations create spaces where disability justice is not just accommodated, but expected—ensuring that every audience member, regardless of language needs, has access to information and engagement.
-
@ 3f770d65:7a745b24
2024-12-31 17:03:46Here are my predictions for Nostr in 2025:
Decentralization: The outbox and inbox communication models, sometimes referred to as the Gossip model, will become the standard across the ecosystem. By the end of 2025, all major clients will support these models, providing seamless communication and enhanced decentralization. Clients that do not adopt outbox/inbox by then will be regarded as outdated or legacy systems.
Privacy Standards: Major clients such as Damus and Primal will move away from NIP-04 DMs, adopting more secure protocol possibilities like NIP-17 or NIP-104. These upgrades will ensure enhanced encryption and metadata protection. Additionally, NIP-104 MLS tools will drive the development of new clients and features, providing users with unprecedented control over the privacy of their communications.
Interoperability: Nostr's ecosystem will become even more interconnected. Platforms like the Olas image-sharing service will expand into prominent clients such as Primal, Damus, Coracle, and Snort, alongside existing integrations with Amethyst, Nostur, and Nostrudel. Similarly, audio and video tools like Nostr Nests and Zap.stream will gain seamless integration into major clients, enabling easy participation in live events across the ecosystem.
Adoption and Migration: Inspired by early pioneers like Fountain and Orange Pill App, more platforms will adopt Nostr for authentication, login, and social systems. In 2025, a significant migration from a high-profile application platform with hundreds of thousands of users will transpire, doubling Nostr’s daily activity and establishing it as a cornerstone of decentralized technologies.
-
@ 6e0ea5d6:0327f353
2025-03-02 15:01:24Ascolta bene! Forget the State, the Parties, and the Ideologies of bureaucrats! Let your own business, interests, and money be your greatest political allegiance.
Do not swear loyalty to a flag that despises you. Loyalty to family is the rock upon which true honor is built. In times of uncertainty, your devotion to blood ties must be unconditional, for family is the foundation that sustains your very existence. But remember: blood makes relatives, loyalty makes a family.
Loyalty is not just a virtue but a moral obligation. Betraying the trust of family is the greatest sin—an act that not only destroys relationships but also the essence of belonging to something greater.
A truly loyal man understands that family is a reflection of his own soul. He knows that each member is an extension of himself, and protecting these bonds is an extension of protecting his own identity. Amidst the storms of adversity, stand firm, for a family, like a ship, only reaches safe harbor when all its crew members work in unison.
So, amico mio, keep this truth in your heart: loyalty to family is the fortress that withstands all storms. Without it, a man is like a leaf in the wind—directionless and purposeless.
Hold fast to your principles, honor your commitments, and never, under any circumstance, abandon those dearest to you. Only then will you find the true peace and honor that come from fulfilling your sacred duty.
Thank you for reading, my friend!
If this message resonated with you, consider leaving your "🥃" as a token of appreciation.
A toast to our family!
-
@ 16d11430:61640947
2024-12-23 16:47:01At the intersection of philosophy, theology, physics, biology, and finance lies a terrifying truth: the fiat monetary system, in its current form, is not just an economic framework but a silent, relentless force actively working against humanity's survival. It isn't simply a failed financial model—it is a systemic engine of destruction, both externally and within the very core of our biological existence.
The Philosophical Void of Fiat
Philosophy has long questioned the nature of value and the meaning of human existence. From Socrates to Kant, thinkers have pondered the pursuit of truth, beauty, and virtue. But in the modern age, the fiat system has hijacked this discourse. The notion of "value" in a fiat world is no longer rooted in human potential or natural resources—it is abstracted, manipulated, and controlled by central authorities with the sole purpose of perpetuating their own power. The currency is not a reflection of society’s labor or resources; it is a representation of faith in an authority that, more often than not, breaks that faith with reckless monetary policies and hidden inflation.
The fiat system has created a kind of ontological nihilism, where the idea of true value, rooted in work, creativity, and family, is replaced with speculative gambling and short-term gains. This betrayal of human purpose at the systemic level feeds into a philosophical despair: the relentless devaluation of effort, the erosion of trust, and the abandonment of shared human values. In this nihilistic economy, purpose and meaning become increasingly difficult to find, leaving millions to question the very foundation of their existence.
Theological Implications: Fiat and the Collapse of the Sacred
Religious traditions have long linked moral integrity with the stewardship of resources and the preservation of life. Fiat currency, however, corrupts these foundational beliefs. In the theological narrative of creation, humans are given dominion over the Earth, tasked with nurturing and protecting it for future generations. But the fiat system promotes the exact opposite: it commodifies everything—land, labor, and life—treating them as mere transactions on a ledger.
This disrespect for creation is an affront to the divine. In many theologies, creation is meant to be sustained, a delicate balance that mirrors the harmony of the divine order. Fiat systems—by continuously printing money and driving inflation—treat nature and humanity as expendable resources to be exploited for short-term gains, leading to environmental degradation and societal collapse. The creation narrative, in which humans are called to be stewards, is inverted. The fiat system, through its unholy alliance with unrestrained growth and unsustainable debt, is destroying the very creation it should protect.
Furthermore, the fiat system drives idolatry of power and wealth. The central banks and corporations that control the money supply have become modern-day gods, their decrees shaping the lives of billions, while the masses are enslaved by debt and inflation. This form of worship isn't overt, but it is profound. It leads to a world where people place their faith not in God or their families, but in the abstract promises of institutions that serve their own interests.
Physics and the Infinite Growth Paradox
Physics teaches us that the universe is finite—resources, energy, and space are all limited. Yet, the fiat system operates under the delusion of infinite growth. Central banks print money without concern for natural limits, encouraging an economy that assumes unending expansion. This is not only an economic fallacy; it is a physical impossibility.
In thermodynamics, the Second Law states that entropy (disorder) increases over time in any closed system. The fiat system operates as if the Earth were an infinite resource pool, perpetually able to expand without consequence. The real world, however, does not bend to these abstract concepts of infinite growth. Resources are finite, ecosystems are fragile, and human capacity is limited. Fiat currency, by promoting unsustainable consumption and growth, accelerates the depletion of resources and the degradation of natural systems that support life itself.
Even the financial “growth” driven by fiat policies leads to unsustainable bubbles—inflated stock markets, real estate, and speculative assets that burst and leave ruin in their wake. These crashes aren’t just economic—they have profound biological consequences. The cycles of boom and bust undermine communities, erode social stability, and increase anxiety and depression, all of which affect human health at a biological level.
Biology: The Fiat System and the Destruction of Human Health
Biologically, the fiat system is a cancerous growth on human society. The constant chase for growth and the devaluation of work leads to chronic stress, which is one of the leading causes of disease in modern society. The strain of living in a system that values speculation over well-being results in a biological feedback loop: rising anxiety, poor mental health, physical diseases like cardiovascular disorders, and a shortening of lifespans.
Moreover, the focus on profit and short-term returns creates a biological disconnect between humans and the planet. The fiat system fuels industries that destroy ecosystems, increase pollution, and deplete resources at unsustainable rates. These actions are not just environmentally harmful; they directly harm human biology. The degradation of the environment—whether through toxic chemicals, pollution, or resource extraction—has profound biological effects on human health, causing respiratory diseases, cancers, and neurological disorders.
The biological cost of the fiat system is not a distant theory; it is being paid every day by millions in the form of increased health risks, diseases linked to stress, and the growing burden of mental health disorders. The constant uncertainty of an inflation-driven economy exacerbates these conditions, creating a society of individuals whose bodies and minds are under constant strain. We are witnessing a systemic biological unraveling, one in which the very act of living is increasingly fraught with pain, instability, and the looming threat of collapse.
Finance as the Final Illusion
At the core of the fiat system is a fundamental illusion—that financial growth can occur without any real connection to tangible value. The abstraction of currency, the manipulation of interest rates, and the constant creation of new money hide the underlying truth: the system is built on nothing but faith. When that faith falters, the entire system collapses.
This illusion has become so deeply embedded that it now defines the human experience. Work no longer connects to production or creation—it is reduced to a transaction on a spreadsheet, a means to acquire more fiat currency in a world where value is ephemeral and increasingly disconnected from human reality.
As we pursue ever-expanding wealth, the fundamental truths of biology—interdependence, sustainability, and balance—are ignored. The fiat system’s abstract financial models serve to disconnect us from the basic realities of life: that we are part of an interconnected world where every action has a reaction, where resources are finite, and where human health, both mental and physical, depends on the stability of our environment and our social systems.
The Ultimate Extermination
In the end, the fiat system is not just an economic issue; it is a biological, philosophical, theological, and existential threat to the very survival of humanity. It is a force that devalues human effort, encourages environmental destruction, fosters inequality, and creates pain at the core of the human biological condition. It is an economic framework that leads not to prosperity, but to extermination—not just of species, but of the very essence of human well-being.
To continue on this path is to accept the slow death of our species, one based not on natural forces, but on our own choice to worship the abstract over the real, the speculative over the tangible. The fiat system isn't just a threat; it is the ultimate self-inflicted wound, a cultural and financial cancer that, if left unchecked, will destroy humanity’s chance for survival and peace.
-
@ 660162cf:8d93a1dc
2025-03-02 14:33:16อย่าตัดสินภาพลักษณ์ผู้อื่นจากอดีต
เคยไหมที่คุณเผลอตัดสินใครสักคนเพียงเพราะ “ภาพลักษณ์เก่าๆ” ที่คุณเคยเห็นเมื่อหลายปีก่อน? ไม่ว่าจะเป็นเพื่อนสมัยเรียนที่เคยขี้เล่น พูดเก่ง ชอบยิงมุกตลกในห้องจนดูไม่น่านับถือ แต่วันหนึ่งเขากลับมาในฐานะอาจารย์มหาวิทยาลัยผู้มีความรู้เชิงลึก หรือ เพื่อนร่วมงานที่เคยทำงานผิดพลาดในโปรเจกต์แรกแต่วันนี้กลับกลายเป็นคนที่จัดการงานได้อย่างยอดเยี่ยม
ภาพลักษณ์เก่าๆ ฝังแน่นในใจเราได้อย่างไร
สมองของเรามักจะจดจำ “ความประทับใจแรก” หรือ “เหตุการณ์สะดุดตา” ไว้เป็นกรอบเพื่อใช้ตัดสินผู้อื่นในปัจจุบันและบ่อยครั้งเรายังนำสิ่งนั้นไปคาดการณ์อนาคตของเขาเพิ่มเติมด้วย ที่สำคัญเรามักจะต่อต้านข้อมูลหรือสิ่งใหม่ ๆ ที่เราไม่คุ่นเคยโดยอัตโนมัติถ้ามันขัดแย้งกับกรอบเดิมๆที่เรารู้จัก เพราะเรารู้สึกว่าอาจต้องสูญเสียความมั่นคงหรือความสบายใจในการรับรู้จากสิ่งที่เราคุ้นชินบางครั้งก็อาจสั่นคลอนการใช้ภาพลักษณ์จำเก่าๆที่เราจดจำไว้ ดังนั้นการตัดสินใจแบบโดยการนำภาพลักษณ์เก่าๆมาจึงเป็นวิธีลัดที่สมองชอบเลือกใช้ โดยเฉพาะในชีวิตประจำวันที่ต้องเร่งรีบ
เราทุกคนล้วนมีสิทธิ์ เปลี่ยนแปลง และ เติบโต ภาพลักษณ์ก็เช่นกัน
กรอบความคิดเก่า คือ สิ่งที่ทำให้เรายึดติดกับอดีต
ลองนึกถึงเพื่อนที่เคยสอบตกวิชาคณิตศาสตร์ แต่ปัจจุบันเขาอาจเป็นโปรแกรมเมอร์มืออาชีพ หรือหัวหน้าทีมพัฒนาระบบในบริษัทใหญ่ๆ หรือเพื่อนร่วมงานที่เคยถูกมองว่าตัดสินใจพลาดไปเสียทุกครั้ง ก็อาจพัฒนาตัวเองจนมีวิจารณญาณเฉียบคมที่สุดในทีม การเปลี่ยนแปลงเหล่านี้เกิดขึ้นได้เสมอกับทุกคนที่ผ่านเข้ามาในชีวิตของเรา
คนเรามีสิทธิ์พัฒนาและเติบโตในแบบที่คาดไม่ถึง
แล้วเราจะเปิดใจยอมรับการเปลี่ยนแปลงของผู้อื่นได้อย่างไร?
1) ถามตัวเองให้บ่อยขึ้น ทุกครั้งที่เผลอตัดสินใครจากภาพลักษณ์เก่าๆลองตั้งคำถามก่อนว่า “สิ่งที่เคยเห็นหรือที่เคยรับรู้ในอดีตยังเป็นจริงอย่างที่เราคิดอยู่ไหม?” และ “ปัจจุบันตอนนี้เขาเปลี่ยนไปอย่างไรบ้าง?” หรือเราอาจจะตั้งคำถามว่า “เขามีด้านดีหรือสิ่งที่เปลี่ยนไปจากภาพลักษณ์เดิมที่เรารู้จักหรือเปล่า?” เพื่อกระตุ้นให้เราเปิดใจรับรู้ข้อมูลใหม่
2) สังเกตพฤติกรรมปัจจุบัน แทนที่จะยึดติดกับเรื่องในอดีตเราลองตั้งใจฟังความคิดเห็นของเขาหรือสังเกตการกระทำในปัจจุบันเพื่อมองหาความก้าวหน้าหรือสิ่งที่เปลี่ยนไปจากที่เราเคยคิดมาก่อนในอดีต
3) ให้โอกาสและเวลา การเปิดโอกาสให้คนคนหนึ่งได้พิสูจน์ตัวเองในสถานการณ์ใหม่ๆ มักทำให้เราเห็นศักยภาพที่ไม่เคยรับรู้มาก่อน
4) อยู่กับปัจจุบันมากกว่าความทรงจำเก่าๆ อย่าปล่อยให้ภาพลักษณ์เก่าๆของเขากลายเป็นอุปสรรคต่อการทำความรู้จักตัวตนปัจจุบันอดีตอาจเป็นเพียงหนึ่งบทของชีวิตแต่ไม่ใช่ทั้งหมดที่เขาเป็น ณ ปัจุบัน
การเปิดใจมองเพื่อนคนหนึ่งในอดีตโดยดูจากภาพลักษณ์ที่เค้าเปลี่ยนไปแล้วในปัจุบันโดยไม่ตัดสิ่นที่เขาจากสิ่งที่เคยทำแย่ๆมาก่อน เป็นอีกก้าวในการเติบโตทางด่านความคิดของเรา
ยิ่งเปิดใจ เราก็ยิ่งได้เรียนรู้
การเลือกเปิดใจยอมรับตัวตนใหม่ของคนรอบข้าง นอกจากจะช่วยให้ความสัมพันธ์ดีขึ้นแล้ว เรายังได้เรียนรู้และรับแรงบันดาลใจจากเขาอีกด้วย ทุกการเปลี่ยนแปลงที่เกิดขึ้นสะท้อนว่ามนุษย์มีศักยภาพเติบโตได้ไม่สิ้นสุด ดังคำกล่าวที่ว่า “อย่าตัดสินภาพลักษณ์ผู้อื่นจากอดีต” — เพราะเพื่อนร่วมงานที่เคยมีปัญหาในอดีต อาจกลายเป็นผู้เชี่ยวชาญในสาขาที่เราไม่เคยคาดคิด หรือเพื่อนสมัยมัธยมคนนั้นอาจเติบโตมาเป็นครูอาจารย์ผู้ถ่ายทอดความรู้ให้คนรุ่นใหม่และนี่ก็คือ พลังอันยิ่งใหญ่ของการยอมรับในพัฒนาการของผู้อื่น
Siamstr
-
@ 044da344:073a8a0e
2025-03-02 14:22:04Ich war neugierig. Florentine Anders hat mit mir studiert. Wobei: Ganz so nah, wie das jetzt klingt, waren wir nicht. 120 Studenten, sieben Seminargruppen: Als es im Herbst 1988 für uns losging an der Sektion Journalistik in Leipzig, hing es auch vom Zufall ab, mit wem man mehr zu tun hatte und mit wem weniger. Manche Gruppen hatten sich im Volontariat gebildet und andere bei der Auswahlwoche in Bad Saarow am Scharmützelsee. Lange hielt das alles ohnehin nicht. Nach einem Jahr kamen die Dinge ins Rutschen und sprengten oft das, was bis dahin gewachsen war.
Ich weiß nicht einmal, ob Florentine bis zum Diplom durchgehalten hat. Gar nicht wenige von uns haben die Ungewissheit nicht ausgehalten und sind sofort irgendwo in Lohn und Brot, manchmal auch jenseits des Journalismus. Wer eine Nase hatte für den Wind, der sich für den Propaganda-Nachwuchs schnell drehte von der Euphorie des Anfangs in Richtung Pranger, der konnte schon auf die Idee kommen, lieber Autos zu verkaufen oder Versicherungen. Außerdem lockte der Westen, auch mit Journalistenschulen. Andreas Rook, heute ein MDR-Gesicht, der damals mit seiner Freundin nach Moskau ging, war die Ausnahme. Die Regel: München, Wales, Paris. Ich hatte gehört, dass Florentine Anders nach Frankreich gegangen war, aber dann reißt der Faden ab. Dass sie im Zeit-Kosmos gelandet ist, war nicht bis zu mir durchgedrungen.
Dieses Buch dann schon. Wenn etwas über die DDR erscheint, bekomme ich das mit. Ich kaufe längst nicht mehr alles. Wenn immer wieder das gleiche serviert wird, freut man sich selbst über einen Film wie Kundschafter des Friedens 2. Florentine Anders und ihr Opa Hermann Henselmann: Das klang gut. Das klang nach Brigitte Reimann und „Franziska Linkerhand“. Nach Defa. „Unser kurzes Leben“ von Lothar Warneke und „Insel der Schwäne“ von Herrmann Zschoche, zwei Filme, die Anfang der 1980er ins Kino kamen und die Tristesse des Wohnungsbaus genauso festgehalten haben wie einen Alltag, der heute so weit weg ist wie die Marskolonie von Elon Musk.
Ich will nicht sagen, dass ich enttäuscht worden bin. Die Mitstudentin von einst hat das gut gemacht. Sie hat sich hineingegraben in die Papiere und viele der Orte besucht, die wichtig gewesen sind für die Henselmanns und ihre acht Kinder. Schreiben kann sie ohnehin. Das haben wir in Leipzig gelernt oder schon vorher in der Redaktion. Entstanden ist so eine Familienbiografie, in der sich die Autorin zurücknimmt. Drei, vier Einsprengsel zur Recherche. Mit der Mutter im Stasiarchiv, wo es nicht nur eine Opferakte gibt, sondern auch eine Täterakte – zur Überraschung der Tochter. Ein paar Sätze zu den regelmäßigen Besuchen beim berühmten Opa, der ihr alle 14 Tage ein Buch mitgibt, über das dann diskutiert werden soll. Sonst ist da vor allem Distanz. Abstand halten. Keine Emotionen zeigen. Sagen, wie es gewesen sein könnte. Journalismus und Geschichtsschreibung – aber kein Roman.
Um noch einen Moment loben zu können: Florentine Anders geht chronologisch vor, von 1931 bis 1995, fast wie in einem Fotoalbum. Da die DDR klein war und die Henselmanns zu ihrem Adel gehörten, gibt es literarische Bilder von vielen Prominenten. Mit Lotte Ulbricht auf der Völkerfreundschaft, Manfred Krug als Fast-Nachbar, ein Unterschlupf bei Alex Wedding, die eigentlich Grete Weiskopf hieß und Pflichtlektüre für jedes Kind war. Es passiert sogar jede Menge Ungeheuerliches, auch jenseits der Seitensprünge des Opas und von Robert Havemann, der mit Omas Schwester verheiratet war. Architektur, Opposition, Ost-West-Spionage, Berlin im Wandel der Zeit: Das ist auch deshalb spannend, weil Florentine Anders darauf verzichtet, dem Diktaturgedächtnis Futter zu geben, und einfach die Tatsachen sprechen lässt, ohne die zu verurteilen, die an das Projekt DDR geglaubt oder von ihm profitiert haben und beides längst nicht immer auseinanderhalten konnten.
Vielleicht hätte der Verlag auf das Wort „Roman“ verzichten sollen. Ein Roman braucht einen Konflikt – einen Dreh- und Angelpunkt, der nicht nur solche Figuren aus den Tiefen der Vergangenheit trägt, sondern im Idealfall universell ist und so auch die Gegenwart erreicht. Der Mann zum Beispiel, der älter wird und prominent und daraus etwas macht bei jüngeren Frauen, ohne seine erste Liebe aufgeben zu wollen. Die Frau, die all das sieht und es trotzdem nicht zum Bruch kommen lässt – oder doch, wie Florentines Mutter offenbar dann gleich zweimal. Oder die Ideologie, die sich hineinfrisst in die Profession und etwas verlangt, wenn man sich im Licht der Macht sonnen möchte. Ich denke dabei natürlich an Eugen Ruge, dem ein runder Geburtstag gereicht hat, um nicht nur eine kommunistische Familie auseinanderbrechen zu lassen, sondern zugleich die Geschichte vom Aufstieg und Ende einer Utopie zu erzählen. Vielleicht ist dieser Vergleich aber auch vermessen. „In Zeiten des abnehmenden Lichts“: Das war einmal. Jetzt lesen wir eben „Die Allee“.
Freie Akademie für Medien & Journalismus
Titelbild: Markus Spiske @Pixabay
-
@ 42342239:1d80db24
2025-03-02 14:13:43With the rapid development of artificial intelligence (AI), we face a future where we may soon have access to almost everything we desire – at least in the digital realm. But unfortunately, what we wish for doesn’t always align with what we truly need, or what would benefit us.
The Dutch ethologist Niko Tinbergen was awarded the Nobel Prize in Physiology or Medicine in 1973 for his studies of animal behaviour patterns. While earlier scientists had primarily focused on learning as the main explanation for animal behaviour, Tinbergen instead emphasised instincts.
Tinbergen studied, among other things, what makes newly hatched bird chicks beg for food from their parents. This was investigated by presenting parentless chicks with various painted beak models to see which ones they would seek food from. Several objects proved more popular than real gull beaks.
Artificial eggs were also created and placed in bird nests. Black-headed gulls that received wooden eggs before laying their own were found to actually refrain from laying real eggs. Fake eggs were painted in different colours and patterns, and made in various sizes. The gulls always preferred trying to incubate eggs of absurd sizes – for example eggs with eight times the volume of real ones. The poor gulls made desperate attempts to sit on these giant eggs – but often slid off.
The explanation for the gulls’ self-destructive behaviour was that they had a hardwired ability (instinct) to respond to specific stimuli (appearance of beaks and eggs with particular colours/sizes). Researchers exaggerated these stimuli, creating stronger but ultimately misguided reactions. The concept of "superstimuli" was hatched. Nothing in the gulls’ evolution had prepared them for these experiments, explaining their self-destructive behaviors.
Psychologist Deirdre Barrett has translated this concept to a human context. She argues that superstimuli govern human behaviours much like they do other animals’, citing junk food consumption, addictive social media use, and pornography consumption as examples. Nothing in Homo sapiens’ evolution prepared us for modern society’s stimuli, which might explain our frequently self-destructive behaviours.
When the Liberal Party (Swedish political party Liberalerna) proposes mandatory porn filters on all mobile phones "to protect children and youth," it might appear they’re on the right track. However, these issues deserve more profound discussions.
How do we create technical solutions that meet our fundamental needs for health, education, and human connection – rather than just supplying mindless scrolling entertainment? How can we ensure those collecting our data don’t exploit it for their own interests, selling us things we don’t need? Is the current model of centralisation, corporate giants, and profit maximisation really compatible with our best interests?
In summary: How can we ensure future technology serves our real needs, rather than mislead us - much like Niko Tinbergen deceived the poor gulls?
-
@ 43baaf0c:d193e34c
2025-03-02 14:00:59As an artist, your main desire is to create. I believe we are all born creators, but some of us have a deeper passion for it than others. Those who dedicate themselves to their art and receive recognition for it are often called artists. But let’s set aside the debate about what defines an artist and focus on what truly matters our craft.
This is what we love to do. We dream about it, wake up for it, and live for it. It’s more than just work—it’s a passion that comes from within. You could even go as far as to call it your purpose in life.
Often, you’d still create even without money because your art is beyond numbers. But we live in a world where kisses won’t pay for groceries—at least, I can’t pay that way! So, money matters, not as the goal, but as a tool to keep doing what you love: creating.
Artists have often been seen as struggling creatives, barely making ends meet. When I started art school, I saw so many parents telling their kids to choose a “real” career doctor, lawyer, something secure. A “real job,” right? 😅
Luckily, my parents never told me that. My mom always said, follow your heart. (Thanks, Mom and Dad! 🙏)
After art school, I spent four years studying graphic and media design, followed by another four years in animation and film. But when it came time to find work as a 2D animator, I struggled. To be honest, I wasn’t good enough—or at least, that’s how it felt. Plus, the industry had already shifted heavily toward 3D animation.
But I wasn’t discouraged. I loved everything related to art and design. And growing up in a small city like Sneek, Friesland (The Netherlands), I had always dreamed of seeing more of the world.
Travel & Filming I’ve always been fascinated by people, their stories, and how different cultures live. That curiosity led me to documentary filmmaking, and along the way, I started building my own stock footage database (you can find it all on https://www.shutterstock.com/g/traveltelly.
Making a living as an independent documentary filmmaker isn’t easy, so I often filmed for volunteer organizations. This gave me the opportunity to experience different cultures while also shooting stock footage. I did this for about 10 years, traveling across the globe—and I’ve been fortunate enough to visit 88 countries so far.
Technology, Change, and Art Stories In 2018, I read The Bitcoin Standard because I couldn’t understand why, despite investing in an expensive camera, I struggled to earn it back as stock footage royalties kept dropping. That book opened my eyes to the first part of the equation: money itself.
It took me a few years to truly grasp Bitcoin’s significance, and through trial and error, I realized it’s the only cryptocurrency I believe in. I had my fair share of shitcoin lessons—where I made some money but also lost it. Those experiences taught me a lot about value, scarcity, and what truly lasts.
Bitcoin Is Different Once you truly understand what Bitcoin stands for, you realize it’s a path to real financial freedom. Like any journey, there will be ups and downs, and plenty of people will tell you you’re wrong—especially when Bitcoin’s price drops in dollar (fiat) terms. But when in doubt, zoom out.
One thing I’ve learned is that your own path is never truly wrong for you. When others say it is, it’s usually because they’re comparing it to their own. But we’re all walking our own unique journey. The moment you start comparing, you begin to doubt. True happiness comes from embracing your path—not someone else’s.
Art Is My Life, Bitcoin Is the Tool For me, art is life. Bitcoin is simply the tool that allows me to live a good artist’s life. Saving in Bitcoin and spend when I need it gives me peace of mind. And even with a bit more financial freedom, that doesn’t mean I’d ever stop creating. I always want to push myself, improve my craft, and hopefully inspire others through my art and stories.
I truly believe that all good energy comes from human connection and relationships. The most important thing is having a good day with the people around you. These days, we share those moments on social media—but that’s just a reflection of a single moment, whether happy or sad. If you don’t truly live that moment, it’s just wasted energy.
I’ve also learned to truly appreciate other artists and their craft—to find inspiration in their work. This mindset comes more naturally when you have peace of mind, something a Bitcoin savings can provide.
When you’re not under constant financial pressure, art doesn’t have to feel like a business where you must sell your work immediately at an exhibition or event just to make ends meet. Instead, you can focus on creating for the sake of art itself, allowing your work to evolve naturally.
Freedom to Share Your Art on Nostr Luckily, we now have platforms like Nostr where we can share and earn from our art while building a community, without anyone controlling what we do. Bitcoin stands for financial freedom, and Nostr stands for art-sharing freedom. With Bitcoin, you can walk your own path, and with Nostr, you can share your journey freely.
When you’re free to walk your own path, you naturally attract like-minded people because you don’t feel the need to constantly compare yourself to others. The more you embrace being yourself, the more you’ll connect with people who resonate with you.
I’m not suggesting you stay in your own bubble, but rather acknowledging that everyone is in their own bubble in some way. Just like not everyone feels at home in the same country, not everyone feels at home in the same space or community. It’s all about finding where you belong and who aligns with your energy.
Networking/Events I’ve always hated networking events in my creative job. I understand their value, but they were never really my thing. So, I was hesitant at first to attend a Nostr event. But it was in Tokyo (Nostrasia), and I love Japan, so that gave me a good reason to go. Fortunately, I was right—it felt like the right fit for me.
I love to create, and I tend to talk less, so I’m very selective about the events I attend. Nostr events felt different. It’s like we’re all builders and creators who have already broken free from the fiat mindset. By that, I mean the mindset where you go to an event, pay a high price (like at some mayor Bitcoin events, which I can’t stand), and expect to get something in return. The fiat job mentality where you exchange time for direct money, or as we say in Dutch, uurtje factuurtje (hour work, invoice) just doesn’t fit with me. The more you walk your own path, the more you realize what works for you and what doesn’t.
My only advice? Save in Bitcoin, create, and walk your own path. And yes, don’t forget to smile and enjoy the ride. The journey is the destination!
-
@ fd78c37f:a0ec0833
2025-03-02 13:55:43In this edition, we invited Bam from Bitcoin Barqnet to share his journey with Bitcoin and its impact in the Middle East. He also discussed the growth of the Barqnet community and introduced his modular wallet, Cypherbox.
YakiHonne: Bam, thank you for joining today's conversation. Before we begin, let me briefly introduce YakiHonne. YakiHonne is a decentralized media client built on Nostr—a protocol designed to empower freedom of speech through technology. It enables creators to own their voices and assets while offering innovative tools like smart widgets, verified notes, and support for long-form content. With YakiHonne, individuals can express themselves freely, without the fear of censorship, bans, or restrictions. So before starting the interview, I’d like to learn a little more about you and your community, Bam. Can you tell us more about yourself and what you do?
Bam:My name is Basim, and my nickname is Bam. I became somewhat well-known in the Middle East for releasing some Bitcoin courses. I'm an old player in Bitcoin, having gotten involved in 2014. Back then, I realized that Bitcoin was something big, but I didn’t have much Bitcoin because I didn’t have the money to buy it. Instead of investing money in Bitcoin, I invested my time in understanding it and researching it. Bam:After graduating in 2016-17, I decided to dedicate my entire career to Bitcoin while I was in Istanbul. Of course, Bitcoin was the core focus, but there were also many altcoins, and I became interested in those areas as well. I love this space because it's very libertarian, and I myself am a person with libertarian values. Bam:I currently publish tutorial videos on YouTube, primarily aimed at Arabic-speaking audiences in the Middle East, to teach them about Bitcoin economics, technology, and how to use Bitcoin. They have very little knowledge about these topics. I’ve covered many subjects, including wallet operations, mining, using the Lightning Network, and even non-custodial liquidity management. We’ve produced over 200 videos so far. I’ve realized that there are many issues with Bitcoin-related applications, so I’ve decided to develop my own Bitcoin app called Cypherbox.
YakiHonne: That's really impressive. You're a content creator in the Bitcoin ecosystem, explaining Bitcoin on YouTube and spreading the Bitcoin ideology. And you're developing your own Lightning app specifically for the Middle East. You're doing a lot of meaningful work.
Bam:Unfortunately, I didn't buy more Bitcoins in 2014. I used to own some, but I invested all of my Bitcoin into my channel because I strongly believe in the importance of education. I believe that global international currency is more important than mere wealth. I've tried to ensure that my project is neither charity nor purely commercial. I am now creating an Arabic academy, selling some courses or applications I develop, and trying to commercialize them. Overall, my project is somewhere between open source and commercialization, and I hope to support my life through these means.
YakiHonne: That's really great, Bam. I really admire how much you value education and enlightening others. So now, let's move on to the first question. Bam, I think you've already touched on part of the answer. But I'd like to ask again, this time in more detail: What truly sparked your interest in Bitcoin? What motivated you to build or form a community around it?
Bam:I used Bitcoin very early on, and I understood right away when I looked at its wallets that it wasn’t a company. I had some experience with decentralized networks, like Tor and Torrent, and I knew this was open-source. Open-source projects are really attractive to me as an engineer. The more I studied Bitcoin, the more fascinated I became with it. I love its decentralized nature. Bam:I studied complex systems, energy engineering, and systems like aeronautics and marine engineering, and I found Bitcoin to be the most sophisticated energy system I’ve ever studied. It’s just fascinating on a technical level, especially the cryptography aspect. What’s so amazing about Bitcoin’s security is that it doesn’t rely on firewalls or central authority; it’s actually the opposite, as Andreas Antonopoulos often explains. Bam:Bitcoin's security comes from its openness. The whole thing—its censorship resistance, the privacy, the community around it—just captivated me. The fact that Satoshi created the greatest monetary network ever, but never moved any coins or had any control after 2009, and gave it away to the community, for everyone in the world, is just an incredible story. There’s so much about Bitcoin that I can’t even begin to explain how deeply I’m attached to it. Bam:What I want to say is that Bitcoin has significantly helped with the issues my country faces because I am from Syria. We have been locked out of the financial system by OFAC policies, which were perhaps seen as justified due to sanctions. Syria has been under financial sanctions, but the problem is that these sanctions weren't just imposed on the Syrian government; they were imposed on the entire Syrian population. Even though the current president Assad is no longer in power, these sanctions still persist. These financial sanctions have caused great suffering for the Syrian people. Syrians are unable to engage in e-commerce or trade with the outside world. This system, which locks people into such a closed financial environment, is a huge issue. Bam:Bitcoin provides an alternative. Bitcoin has not closed its doors to Syrians, and we can still use Bitcoin in Syria. People in Syria use Bitcoin without fear of censorship from any part of the world. No government can lock Syrians out of the Bitcoin network, and Bitcoin transactions can be settled in real time in Syria, regardless of whether any government approves or not.
YakiHonne: Can you tell me how you have been able to attract members so far and what challenges have you faced when you started earlier on?
Bam:We started on Clubhouse, just a bunch of random Bitcoiners talking about Bitcoin, and around 2020 and 2021, the Lightning Network started to become more usable. We saw some interesting Lightning apps, and when I learned about it, I immediately realized that this was the future of the internet of money. I was heavily involved in Ethereum at the time, writing smart contracts, but once I took Lightning seriously, I knew it was the future of digital money. Bam:We started discussing Lightning on Clubhouse during COVID, focusing on Lightning wallets. We asked ourselves, "How can we bring this technology to the Middle East?" Around that time, I also wanted to get more involved in Bitcoin education, so I began putting out more content. A friend of mine created a Telegram group called Barqnet, and we invited everyone from Clubhouse to join. I started sharing more Bitcoin content and promoting the group, saying, "Hey, if you want to get real education about Bitcoin—beyond videos and courses—come join this group and let's build this community together. Bam:We did this for about six months, and the group attracted a lot of people. But my initial goal wasn’t just to attract regular people; it was to attract technical engineers and build a network of engineers who could not only listen to my explanations but also help me better understand Bitcoin and the challenges they face when interacting with Bitcoin and building the Bitcoin banking infrastructure in the Middle East. As a result, we attracted many highly skilled people. Now the group has about 1,000 members, all of whom are highly technical. Bam:We also created a technical support space for regular Bitcoin users. Anyone in the Middle East facing issues with wallets, buying Bitcoin, mining, or any other Bitcoin-related problems can come to us for help. This is a completely voluntary online initiative, and now many people know that if they have technical questions, no matter how complex, they can come to Barqnet and get answers.
YakiHonne: That's really amazing. It seems like you guys are covering both the technical and non-technical aspects of Bitcoin, which is truly remarkable. It's not so common to find a community that manages to engage both sides. But Barqnet, as the Arabic Bitcoin community, seems to have successfully blended both, working with both technical and non-technical people. The work you're doing is really impressive—it's an outstanding job.
Bam:I really enjoy seeing the growth of Bitcoin, and I've already started telling people how their lives have changed. In 2024, many people have messaged us in the group, saying, "Thank you so much, you really changed our lives." It's not just people from poor areas, even in wealthy regions like Saudi Arabia and the UAE, people are telling us, "I started a Bitcoin business, I started mining, I started investing, and now I’ve made some money, my value has gone up because of you guys. I didn't sell, I kept my Bitcoin in cold storage." So, everyone is thanking us. Bam:This means much more to us than any financial gain. We didn’t make a lot of money from these initiatives—sure, we earned some, but not much. And it hasn’t changed our lives. If I had spent my time as an engineer focusing on corporate projects, I would probably make a lot more money. I live in Europe now, and my life is pretty good. But helping people understand Bitcoin and onboard into the Bitcoin world means so much more to me than money. YakiHonne: So, moving on to the next question. How do you see the role of Bitcoin communities evolving as technology matures, particularly in areas like scalability, privacy, and adaptability with other systems? So, how do you see the Bitcoin community evolving with time? Bam:I actually have a lot of different views on how Bitcoin is being taught and developed, especially in terms of scalability. Many people in the West are focused on highly technical developments that do promote individual sovereignty, self-custody, and privacy protection. However, these don't help people who don’t understand the technology, and they make it really difficult for them to use Bitcoin. For example, when I see people recommending non-custodial Lightning wallets, I don’t think this is a good option for everyone, especially in the Global South. For people who don’t understand the technology and just want to use Bitcoin simply, these wallets are way too complicated. Bam:This is why I developed my own app. It's not just a wallet for the Middle East; it's an international wallet that anyone can download. It's open-source and aims to provide a modular Bitcoin experience. The Bitcoin app I envision would contain all the necessary tools, whether it's a custodial service, an exchange, or a simple Lightning custodian service for people who just want to quickly send and receive Bitcoin without dealing with complexity. Bam:A Bitcoin Lightning custodian makes perfect sense if it's reliable. In addition to that, you’d also have your hot wallet, which you can use to withdraw your funds when ready, and move them into self-custody with a simple hot wallet like Blue Wallet. Cold storage should not be the first step for everyone. People often say it's expensive, and that you need to buy hardware wallets, but it’s more of a progression. Start with the basics, and over time, you’ll learn. Bam:Inside the app, users should have access to all the tools for self-custody, including non-custodial Lightning, hot storage, cold storage, federated chains, e-cash systems, and side chains, if applicable. The app would allow users to personalize their experience—choosing what they want based on their technical knowledge, the amount of Bitcoin they want to secure, their privacy preferences, and the fees they’re willing to pay. I imagine the future of Bitcoin will be modular, and every user will be able to customize their experience according to their needs and preferences.
YakiHonne: I really appreciate the key points and important aspects of Bitcoin scalability that you mentioned. They're truly crucial, and it's essential for people to understand Bitcoin better rather than misinterpret it. The importance of Bitcoin in these other areas shouldn't be overlooked, and people should embrace it as part of the future, not reject it. Now, we're at the last question. Is the government around you for or against Bitcoin? And how has that affected the community?
Bam:I live in France, and the government is generally neutral when it comes to privacy tech. I’ve lived in Turkey, the UAE, Brazil, the EU, and the Netherlands, so I don’t consider myself Syrian. I prefer to think of myself as a citizen of Earth. When it comes to governments, I pay attention to policies and regulations in all countries. I look at examples like El Salvador, and I also follow the current situation in Syria. Right now, we’re working to push for a policy that recognizes Bitcoin rather than implementing strict regulations. We’re trying to get the government to draft laws that are more friendly to Bitcoin. Although the central bank is confused about Bitcoin, they’re not completely opposed to it. We’ve proposed a way to manage the market that doesn’t restrict people’s freedom but also helps regulators deal with companies and Bitcoin projects. We’re seeing very positive reactions, and I believe Syria will become the place that opens Bitcoin to the entire Middle East region, thanks to the voluntary initiatives we’ve initiated.
YakiHonne: That was really a fantastic answer, thank you so much, Bam. With that, we’ve come to the end of today’s interview. It’s truly an honor and privilege to have had this conversation with you. I’ve really enjoyed the entire discussion, from start to finish, and I’ve learned a lot from everything we’ve talked about. I really appreciate your passion for Bitcoin and your dedication to pushing for education. We love the work you’re doing. Although we haven’t used your app yet, we believe it’s going to be amazing.Thank you so much again.
-
@ f3873798:24b3f2f3
2025-03-02 13:12:10Olá meus caros leitores, estou fazendo um guia voltados aos Brasileiros aqui do Nostr. Vejo que há muito conteúdo em inglês que infelizmente não é traduzido para o português. Por este motivo tomei a iniciativa de começa com este artigo.
Espero que gostem deste artigo, que tenham uma ótima leitura.
Bem-vindos ao Mundo Nostr !!
Acredito que todos que estão aqui sabem um pouco sobre o Nostr e que é uma rede social descentralizada, local onde você pode postar sem medo de represarias governamentais [ditatoriais].
Mas, vocês conheçem como o Nostr funciona e todas as ferramentas que vocês têm disponível neste ecossistema?
Poisé, acho que não.
O Nostr é um protocolo de comunição descentralizada muito versátil, isso quer dizer que não está limitado a um tipo de "rede social", nele é possível fazer Blogs, streaming, podcast e até mesmo e-mails com autonomia total do usuário.
Meus caros, isso é liberdade total, sem ficar na mão de bigtech como Microsoft, Apple, Google.
Para ficar mais claro darei um exemplo para vocês:
Imagine você criando uma conta no Youtube, você deve aceitar as Diretrizes impostas pela google no uso do SEU CANAL, por mais que você tenha autonomia na produção do SEU CONTEÚDO, determinadas palavras e termos não podem ser usadas, ou seja, O GOOGLE DETERMINA O QUE VOCÊ PODE OU NÃO FAZER NO SEU CANAL.
Veja que é uma liberdade parcial no processo de criação de conteúdo.
Já no Nostr, o seu canal é completamente seu. Não há nenhuma entidade, empresa responsável pelo seu conteúdo a não ser você.
O Mundo Nostr e sua funcionalidades
No nostr você terá acesso a uma diversidade de aplicativos para cada objetivo de uso. Mas, antes de abordar sobre os diversos layouts e funcionalidades do Nostr é necessário aprender o básico deste universo.
Em primeiro lugar: É necessário que vocês saibam que a partir do momento que vocês criaram um conta aqui, independente do "cliente" ou "distro como o pessoal que gosta de fazer analogia com o Linux", vocês recebem duas importantes chaves ! A chave privada e a chave pública.
A Chave privada, também chamada de chave secreta é o acesso ilimitado a sua conta, ou seja, é a partir dela que poderá produzir conteúdos em geral neste mundo. Ela te dará acesso a todos os rercusos do Nostr, portanto é importante que esteja muito segura.
A Chave pública, você ver como os outros usuários ver o seu perfil e o seu conteúdo. Ela é uma importante chave para que as pessoas possam ter acesso aos conteúdo que vocês públicam, ou seja, é atráves dela que você poderá compartilhar o seu perfil para que seu público tenha acesso ao seu mundo.
Dito isso vamos conhecer os apps e os chamados clientes Nostr.
O que são clientes Nostr?
Clientes são as várias maneiras de interagir com o protocolo Nostr [fonte: Nostr.com]
É semelhante ao Sistema Operacional Linux que tem várias distro com diferentes layout para o mesmo Sistema.
Vejamos as principais para que vocês tenham uma noção da amplitude do protocolo.
- Damus: é um app para celulares IOS terem acesso ao NOSTR, tem formato de rede social, como Primal e o Amethyst.
- Primal é um app versátil serve tanto para celulares IOS, Android e PCs, também tem formato de rede social, porém você pode abrir uma carteira lightning bitcoin exclusiva deste app, facilitando muito os micropagamentos em satoshis pela rede.
- Amethyst, assim como o Damus é para o IOS o Amethsy é para o Android, sou suspeita para falar sobre este clientes, pois é o meu favorito. Além de várias possibilidades de edição de texto, ele tem diversas funcionalidade incluídas, como *Guia Mercado*** onde você pode comercializar produtos pela rede, tem como intergrar com outros apps de streaming, formar grupos temáticos etc.
- OXchat não é exatamente uma rede social tem um layout que lembra um pouco o Whatsapp ou Telegram, serve como uma rede de interação instantânea, tem diversos recursos que achei mais interessante é a lousa, onde é possível interagir no grupo com desenhos etc.
- Yakihonne que é justamente o cliente que estou usando para construir este artigo. Como usuário posso dizer que ele tem um foco para criação de Blogs no protocolo Nostr, lembrando que cada cliente tem um layout diferente, ou seja, uso de templates para definir a estrutura do seu blog é meio limitado [ressalva assim como vocês sou iniciante do Nostr, pode ser que tenha como determinar um layout próprio, mas eu mesma não sei como]
Há muitos outros clientes disponíveis para acessar e experimentar e conhecer todos eu recomendo o site: Nostrapps
Agora que você leu este pequeno guia, se divirta aqui no nostr e não se esqueça de apoia a gente.
Até Mais !!
-
@ f3873798:24b3f2f3
2025-03-02 13:10:00Estamos próximos a uma das principais premiações da indústria. Vemos não só a perversão de pautas woke e destruição de valores ocidentes, mas também um grande confronto entre o que mais forte o ativismo Lgbt ou o ativismo político entre as atrizes Fernanda Torres e Karla Gascon.
Só evidência o caos que é os conflitos de interesse de diversas vertentes que a esquerda abraça e diz que é sua.
Mas, o que mais impressiona é o fato do Oscar ter um filme no indicado que até o momento não ganhou nada, porém é notório a superioridade aos outros, este filme é Sing Sing.
Porque o filme Sing sing foi ignorado pelos avaliadores?
O filme tem uma narrativa de superação e como a arte pode mudar as pessoas e as realidades mais pertubadoras. Ele retrata o Sistema carcerário americano, onde realidade de vários presos é mudada atraves de um projeto de um teatro na prisão.
Observando friamente a sintese do filme é uma história que se encaixa perfeitamente aos vies de bandidolatria, se não tivesse um questão, a ação transformadora da arte e deixando de serem vítimas e serem artistas.
Porém apesar de ser uma obra de arte que estimula as pessoas pensarem sobre a vida e ter uma pegada inovadora e completamente diferente dos demais filmes que retratam o sistema carcerário, ele é totalmente ignorado por não ser suficientemente lacrativo.
-
@ a367f9eb:0633efea
2024-12-22 21:35:22I’ll admit that I was wrong about Bitcoin. Perhaps in 2013. Definitely 2017. Probably in 2018-2019. And maybe even today.
Being wrong about Bitcoin is part of finally understanding it. It will test you, make you question everything, and in the words of BTC educator and privacy advocate Matt Odell, “Bitcoin will humble you”.
I’ve had my own stumbles on the way.
In a very public fashion in 2017, after years of using Bitcoin, trying to start a company with it, using it as my primary exchange vehicle between currencies, and generally being annoying about it at parties, I let out the bear.
In an article published in my own literary magazine Devolution Review in September 2017, I had a breaking point. The article was titled “Going Bearish on Bitcoin: Cryptocurrencies are the tulip mania of the 21st century”.
It was later republished in Huffington Post and across dozens of financial and crypto blogs at the time with another, more appropriate title: “Bitcoin Has Become About The Payday, Not Its Potential”.
As I laid out, my newfound bearishness had little to do with the technology itself or the promise of Bitcoin, and more to do with the cynical industry forming around it:
In the beginning, Bitcoin was something of a revolution to me. The digital currency represented everything from my rebellious youth.
It was a decentralized, denationalized, and digital currency operating outside the traditional banking and governmental system. It used tools of cryptography and connected buyers and sellers across national borders at minimal transaction costs.
…
The 21st-century version (of Tulip mania) has welcomed a plethora of slick consultants, hazy schemes dressed up as investor possibilities, and too much wishy-washy language for anything to really make sense to anyone who wants to use a digital currency to make purchases.
While I called out Bitcoin by name at the time, on reflection, I was really talking about the ICO craze, the wishy-washy consultants, and the altcoin ponzis.
What I was articulating — without knowing it — was the frame of NgU, or “numbers go up”. Rather than advocating for Bitcoin because of its uncensorability, proof-of-work, or immutability, the common mentality among newbies and the dollar-obsessed was that Bitcoin mattered because its price was a rocket ship.
And because Bitcoin was gaining in price, affinity tokens and projects that were imperfect forks of Bitcoin took off as well.
The price alone — rather than its qualities — were the reasons why you’d hear Uber drivers, finance bros, or your gym buddy mention Bitcoin. As someone who came to Bitcoin for philosophical reasons, that just sat wrong with me.
Maybe I had too many projects thrown in my face, or maybe I was too frustrated with the UX of Bitcoin apps and sites at the time. No matter what, I’ve since learned something.
I was at least somewhat wrong.
My own journey began in early 2011. One of my favorite radio programs, Free Talk Live, began interviewing guests and having discussions on the potential of Bitcoin. They tied it directly to a libertarian vision of the world: free markets, free people, and free banking. That was me, and I was in. Bitcoin was at about $5 back then (NgU).
I followed every article I could, talked about it with guests on my college radio show, and became a devoted redditor on r/Bitcoin. At that time, at least to my knowledge, there was no possible way to buy Bitcoin where I was living. Very weak.
I was probably wrong. And very wrong for not trying to acquire by mining or otherwise.
The next year, after moving to Florida, Bitcoin was a heavy topic with a friend of mine who shared the same vision (and still does, according to the Celsius bankruptcy documents). We talked about it with passionate leftists at Occupy Tampa in 2012, all the while trying to explain the ills of Keynesian central banking, and figuring out how to use Coinbase.
I began writing more about Bitcoin in 2013, writing a guide on “How to Avoid Bank Fees Using Bitcoin,” discussing its potential legalization in Germany, and interviewing Jeremy Hansen, one of the first political candidates in the U.S. to accept Bitcoin donations.
Even up until that point, I thought Bitcoin was an interesting protocol for sending and receiving money quickly, and converting it into fiat. The global connectedness of it, plus this cypherpunk mentality divorced from government control was both useful and attractive. I thought it was the perfect go-between.
But I was wrong.
When I gave my first public speech on Bitcoin in Vienna, Austria in December 2013, I had grown obsessed with Bitcoin’s adoption on dark net markets like Silk Road.
My theory, at the time, was the number and price were irrelevant. The tech was interesting, and a novel attempt. It was unlike anything before. But what was happening on the dark net markets, which I viewed as the true free market powered by Bitcoin, was even more interesting. I thought these markets would grow exponentially and anonymous commerce via BTC would become the norm.
While the price was irrelevant, it was all about buying and selling goods without permission or license.
Now I understand I was wrong.
Just because Bitcoin was this revolutionary technology that embraced pseudonymity did not mean that all commerce would decentralize as well. It did not mean that anonymous markets were intended to be the most powerful layer in the Bitcoin stack.
What I did not even anticipate is something articulated very well by noted Bitcoin OG Pierre Rochard: Bitcoin as a savings technology.
The ability to maintain long-term savings, practice self-discipline while stacking stats, and embrace a low-time preference was just not something on the mind of the Bitcoiners I knew at the time.
Perhaps I was reading into the hype while outwardly opposing it. Or perhaps I wasn’t humble enough to understand the true value proposition that many of us have learned years later.
In the years that followed, I bought and sold more times than I can count, and I did everything to integrate it into passion projects. I tried to set up a company using Bitcoin while at my university in Prague.
My business model depended on university students being technologically advanced enough to have a mobile wallet, own their keys, and be able to make transactions on a consistent basis. Even though I was surrounded by philosophically aligned people, those who would advance that to actually put Bitcoin into practice were sparse.
This is what led me to proclaim that “Technological Literacy is Doomed” in 2016.
And I was wrong again.
Indeed, since that time, the UX of Bitcoin-only applications, wallets, and supporting tech has vastly improved and onboarded millions more people than anyone thought possible. The entrepreneurship, coding excellence, and vision offered by Bitcoiners of all stripes have renewed a sense in me that this project is something built for us all — friends and enemies alike.
While many of us were likely distracted by flashy and pumpy altcoins over the years (me too, champs), most of us have returned to the Bitcoin stable.
Fast forward to today, there are entire ecosystems of creators, activists, and developers who are wholly reliant on the magic of Bitcoin’s protocol for their life and livelihood. The options are endless. The FUD is still present, but real proof of work stands powerfully against those forces.
In addition, there are now dozens of ways to use Bitcoin privately — still without custodians or intermediaries — that make it one of the most important assets for global humanity, especially in dictatorships.
This is all toward a positive arc of innovation, freedom, and pure independence. Did I see that coming? Absolutely not.
Of course, there are probably other shots you’ve missed on Bitcoin. Price predictions (ouch), the short-term inflation hedge, or the amount of institutional investment. While all of these may be erroneous predictions in the short term, we have to realize that Bitcoin is a long arc. It will outlive all of us on the planet, and it will continue in its present form for the next generation.
Being wrong about the evolution of Bitcoin is no fault, and is indeed part of the learning curve to finally understanding it all.
When your family or friends ask you about Bitcoin after your endless sessions explaining market dynamics, nodes, how mining works, and the genius of cryptographic signatures, try to accept that there is still so much we have to learn about this decentralized digital cash.
There are still some things you’ve gotten wrong about Bitcoin, and plenty more you’ll underestimate or get wrong in the future. That’s what makes it a beautiful journey. It’s a long road, but one that remains worth it.
-
@ af9c48b7:a3f7aaf4
2024-11-18 20:26:07Chef's notes
This simple, easy, no bake desert will surely be the it at you next family gathering. You can keep it a secret or share it with the crowd that this is a healthy alternative to normal pie. I think everyone will be amazed at how good it really is.
Details
- ⏲️ Prep time: 30
- 🍳 Cook time: 0
- 🍽️ Servings: 8
Ingredients
- 1/3 cup of Heavy Cream- 0g sugar, 5.5g carbohydrates
- 3/4 cup of Half and Half- 6g sugar, 3g carbohydrates
- 4oz Sugar Free Cool Whip (1/2 small container) - 0g sugar, 37.5g carbohydrates
- 1.5oz box (small box) of Sugar Free Instant Chocolate Pudding- 0g sugar, 32g carbohydrates
- 1 Pecan Pie Crust- 24g sugar, 72g carbohydrates
Directions
- The total pie has 30g of sugar and 149.50g of carboydrates. So if you cut the pie into 8 equal slices, that would come to 3.75g of sugar and 18.69g carbohydrates per slice. If you decided to not eat the crust, your sugar intake would be .75 gram per slice and the carborytrates would be 9.69g per slice. Based on your objective, you could use only heavy whipping cream and no half and half to further reduce your sugar intake.
- Mix all wet ingredients and the instant pudding until thoroughly mixed and a consistent color has been achieved. The heavy whipping cream causes the mixture to thicken the more you mix it. So, I’d recommend using an electric mixer. Once you are satisfied with the color, start mixing in the whipping cream until it has a consistent “chocolate” color thorough. Once your satisfied with the color, spoon the mixture into the pie crust, smooth the top to your liking, and then refrigerate for one hour before serving.
-
@ 41e6f20b:06049e45
2024-11-17 17:33:55Let me tell you a beautiful story. Last night, during the speakers' dinner at Monerotopia, the waitress was collecting tiny tips in Mexican pesos. I asked her, "Do you really want to earn tips seriously?" I then showed her how to set up a Cake Wallet, and she started collecting tips in Monero, reaching 0.9 XMR. Of course, she wanted to cash out to fiat immediately, but it solved a real problem for her: making more money. That amount was something she would never have earned in a single workday. We kept talking, and I promised to give her Zoom workshops. What can I say? I love people, and that's why I'm a natural orange-piller.
-
@ f3873798:24b3f2f3
2025-03-02 13:07:41Muitas pessoas sofrem em silêncio diante das dificuldades da vida. Seja um término de relacionamento, o convívio em uma família desestruturada ou até mesmo situações extremas, como estar preso em um campo de concentração, a escrita pode ir além de um simples ato de colocar palavras no papel – ela pode ser um agente de libertação.
Seja em forma de diário, desabafo, artigo de opinião ou até mesmo a construção de uma história fantástica, como foi o caso de Harry Potter, escrever pode trazer alívio e transformar a dor em algo criativo e significativo.
Escrever é quase mágico. O simples ato de organizar ideias para construir um texto dá ao escritor o poder de viajar para mundos criados por sua própria mente, funcionando como uma verdadeira forma de escapismo.
Em certas situações extremas, essa pode ser a única alternativa para fugir da realidade, um fio de esperança para aqueles que se sentem perdidos na escuridão do desespero.
Sabe aquela fase da adolescência em que pensamos "Meus pais não me entendem"? Se você está passando por isso, este texto é para você!
Por que não transformar suas angústias em palavras e criar histórias maravilhosas sobre seus anseios, sonhos ou aprendizados do dia a dia?
A escrita pode oferecer um refúgio, um momento em que tudo ao seu redor se transforma e seu processo criativo se torna uma lembrança especial.
Portanto, se você está sofrendo com os desafios da vida, experimente colocar seus sentimentos no papel e transforme a dor em arte. Você pode se surpreender com o poder das palavras.
Essa é a mensagem de hoje.
Até a próxima leitura aleatória
-
@ f3873798:24b3f2f3
2025-03-02 13:02:47Você já conheceu alguém que sempre tenta levar vantagem em tudo? Aquele tipo de pessoa que, em vez de buscar crescimento legítimo, prefere explorar os outros para obter benefícios? Infelizmente, essa mentalidade está mais presente do que gostaríamos de admitir.
Ela se manifesta de diversas formas, como:
-
Pedir descontos e brindes de maneira abusiva, como se fosse um direito;
-
Ameaçar ou constranger vendedores para conseguir preços mais baixos;
-
Vender produtos com valores incompatíveis com a qualidade ou omitir defeitos para enganar clientes.
Quem age assim tem uma conduta antiética e, pior, muitas vezes se orgulha disso, como se enganar alguém fosse um sinal de esperteza. Mas será que essa mentalidade realmente leva ao sucesso?
A curto prazo, pode parecer que sim. Alguns até conseguem vantagens temporárias, mas a longo prazo, essa postura cobra seu preço. A reputação se desgasta, as oportunidades diminuem e, inevitavelmente, o comportamento oportunista se volta contra quem o pratica.
No Brasil, essa mentalidade oportunista se tornou quase um traço cultural. Combater isso exige uma mudança de perspectiva e, acima de tudo, uma autoavaliação sincera.
O primeiro passo é reconhecer se, em algum momento, você já adotou esse comportamento. Ser honesto consigo mesmo é fundamental para evoluir.
O segundo passo é entender que essa mentalidade não só é antiética, mas também prejudica seu próprio crescimento. Quem não valoriza o trabalho alheio dificilmente conseguirá que seu próprio trabalho seja valorizado.
Portanto, abandone essa postura de querer sempre "se dar bem" às custas dos outros. Valorize o esforço e o trabalho de quem está oferecendo um produto ou serviço. Se não pode pagar, simplesmente não compre. Faça igual o Lula rsrsrs.
Mas brincadeiras a parte, não exija que os outros arquem com o custo da sua insatisfação.
E esta foi a mensagem de hoje.
Espero que tenha gostado de mais uma leitura aleatória.
-
-
@ 4ba8e86d:89d32de4
2024-11-07 13:56:21Tutorial feito por Grom mestre⚡poste original abaixo:
http://xh6liiypqffzwnu5734ucwps37tn2g6npthvugz3gdoqpikujju525yd.onion/240277/tutorial-criando-e-acessando-sua-conta-de-email-pela-i2p?show=240277#q240277
Bom dia/tarde/noite a todos os camaradas. Seguindo a nossa série de tutoriais referentes a tecnologias essenciais para a segurança e o anonimato dos usuários, sendo as primeiras a openPGP e a I2P, lhes apresento mais uma opção para expandir os seus conhecimentos da DW. Muitos devem conhecer os serviços de mail na onion como DNMX e mail2tor, mas e que tal um serviço de email pela I2P. Nesse tutorial eu vou mostrar a vocês como criar a sua primeira conta no hq.postman.i2p e a acessar essa conta.
É importante que vocês tenham lido a minha primeira série de tutoriais a respeito de como instalar, configurar e navegar pela I2P nostr:nevent1qqsyjcz2w0e6d6dcdeprhuuarw4aqkw730y542dzlwxwssneq3mwpaspz4mhxue69uhhyetvv9ujuerpd46hxtnfduhsygzt4r5x6tvh39kujvmu8egqdyvf84e3w4e0mq0ckswamfwcn5eduspsgqqqqqqsyp5vcq Esse tutorial é um pré-requisito para o seguinte e portanto recomendo que leia-os antes de prosseguir com o seguinte tutorial. O tutorial de Kleopatra nostr:nevent1qqs8h7vsn5j6qh35949sa60dms4fneussmv9jd76n24lsmtz24k0xlqzyp9636rd9ktcjmwfxd7ru5qxjxyn6uch2uhas8utg8wa5hvf6vk7gqcyqqqqqqgecq8f7 é complementar dado que é extremamente recomendado assinar e criptografar as mensagens que seguem por emails pela DW. Sem mais delongas, vamos ao tutorial de fato.
1. Criando uma conta de email no hq.postman
Relembrando: Esse tutorial considera que você já tenha acesso à I2P. Entre no seu navegador e acesse o endereço hq.postman.i2p. O roteador provavelmente já contém esse endereço no seu addressbook e não haverá a necessidade de inserir o endereço b32 completo. Após entrar no site vá para a página '1 - Creating a mailbox' https://image.nostr.build/d850379fe315d2abab71430949b06d3fa49366d91df4c9b00a4a8367d53fcca3.jpg
Nessa página, insira as credenciais de sua preferências nos campos do formulário abaixo. Lembre-se que o seu endereço de email aceita apenas letras e números. Clique em 'Proceed' depois que preencher todos os campos. https://image.nostr.build/670dfda7264db393e48391f217e60a2eb87d85c2729360c8ef6fe0cf52508ab4.jpg
Uma página vai aparecer pedindo para confirmar as credenciais da sua nova conta. Se tudo estiver certo apenas clique em 'Confirm and Create Mailbox'. Se tudo ocorrer como conforme haverá uma confirmação de que a sua nova conta foi criada com sucesso. Após isso aguarde por volta de 5 minutos antes de tentar acessá-la, para que haja tempo suficiente para o servidor atualizar o banco de dados. https://image.nostr.build/ec58fb826bffa60791fedfd9c89a25d592ac3d11645b270c936c60a7c59c067f.jpg https://image.nostr.build/a2b7710d1e3cbb36431acb9055fd62937986b4da4b1a1bbb06d3f3cb1f544fd3.jpg
Pronto! Sua nova conta de email na I2P foi criada. Agora vamos para a próxima etapa: como acessar a sua conta via um cliente de email.
2. Configurando os túneis cliente de SMTP e POP3
O hq.postman não possui um cliente web que nos permite acessar a nossa conta pelo navegador. Para isso precisamos usar um cliente como Thunderbird e configurar os túneis cliente no I2Pd que serão necessários para o Thunderbird se comunicar com o servidor pela I2P.
Caso não tenha instalado o Thunderbird ainda, faça-o agora antes de prosseguir.
Vamos configurar os túneis cliente do servidor de email no nosso roteador. Para isso abra um terminal ou o seu gestor de arquivos e vá para a pasta de configuração de túneis do I2P. Em Linux esse diretório se localiza em /etc/i2pd/tunnels.d. Em Windows, essa pasta se localiza em C:\users\user\APPDATA\i2pd. Na pasta tunnels.d crie dois arquivos: smtp.postman.conf e pop-postman.conf. Lembre-se que em Linux você precisa de permissões de root para escrever na pasta de configuração. Use o comando sudoedit
para isso. Edite-os conforme as imagens a seguir:
Arquivo pop-postman.conf https://image.nostr.build/7e03505c8bc3b632ca5db1f8eaefc6cecb4743cd2096d211dd90bbdc16fe2593.jpg
Arquivo smtp-postman.conf https://image.nostr.build/2d06c021841dedd6000c9fc2a641ed519b3be3c6125000b188842cd0a5af3d16.jpg
Salve os arquivos e reinicie o serviço do I2Pd. Em Linux isso é feito pelo comando:
sudo systemctl restart i2pd
Entre no Webconsole do I2Pd pelo navegador (localhost:7070) e na seção I2P Tunnels, verifique se os túneis pop-postman e smtp-postman foram criados, caso contrário verifique se há algum erro nos arquivos e reinicie o serviço.Com os túneis cliente criados, vamos agora configurar o Thunderbird
3. Configurando o Thunderbird para acessar a nossa conta
Abra o Thunderbird e clique em criar uma nova conta de email. Se você não tiver nenhum conta previamente presente nele você vai ser diretamente recebido pela janela de criação de conta a seguir. https://image.nostr.build/e9509d7bd30623716ef9adcad76c1d465f5bc3d5840e0c35fe4faa85740f41b4.jpg https://image.nostr.build/688b59b8352a17389902ec1e99d7484e310d7d287491b34f562b8cdd9dbe8a99.jpg
Coloque as suas credenciais, mas não clique ainda em Continuar. Clique antes em Configure Manually, já que precisamos configurar manualmente os servidores de SMTP e POP3 para, respectivamente, enviar e receber mensagens.
Preencha os campos como na imagem a seguir. Detalhe: Não coloque o seu endereço completo com o @mail.i2p, apenas o nome da sua conta. https://image.nostr.build/4610b0315c0a3b741965d3d7c1e4aff6425a167297e323ba8490f4325f40cdcc.jpg
Clique em Re-test para verificar a integridade da conexão. Se tudo estiver certo uma mensagem irá aparecer avisando que as configurações do servidores estão corretas. Clique em Done assim que estiver pronto para prosseguir. https://image.nostr.build/8a47bb292f94b0d9d474d4d4a134f8d73afb84ecf1d4c0a7eb6366d46bf3973a.jpg
A seguinte mensagem vai aparecer alertando que não estamos usando criptografia no envio das credenciais. Não há problema nenhum aqui, pois a I2P está garantindo toda a proteção e anonimato dos nossos dados, o que dispensa a necessidade de uso de TLS ou qualquer tecnologia similar nas camadas acima. Marque a opção 'I Understand the risks' e clique em 'Continue' https://image.nostr.build/9c1bf585248773297d2cb1d9705c1be3bd815e2be85d4342227f1db2f13a9cc6.jpg
E por fim, se tudo ocorreu como devido sua conta será criada com sucesso e você agora será capaz de enviar e receber emails pela I2P usando essa conta. https://image.nostr.build/8ba7f2c160453c9bfa172fa9a30b642a7ee9ae3eeb9b78b4dc24ce25aa2c7ecc.jpg
4. Observações e considerações finais
Como informado pelo próprio site do hq.postman, o domínio @mail.i2p serve apenas para emails enviados dentro da I2P. Emails enviados pela surface devem usar o domínio @i2pmai.org. É imprescindível que você saiba usar o PGP para assinar e criptografar as suas mensagens, dado que provavelmente as mensagens não são armazenadas de forma criptografada enquanto elas estão armazenadas no servidor. Como o protocolo POP3 delete as mensagens no imediato momento em que você as recebe, não há necessidade de fazer qualquer limpeza na sua conta de forma manual.
Por fim, espero que esse tutorial tenha sido útil para vocês. Que seu conhecimento tenha expandido ainda mais com as informações trazidas aqui. Até a próxima.
-
@ a296b972:e5a7a2e8
2025-03-02 10:23:10Die Geburt in die Pareto-Welt hat dann doch länger gedauert, als gedacht, jedoch dank der Geduld meines Hebammen-Mentors, ist es nun vollbracht.
Ich möchte meinen Beitrag zum Erhalt der Meinungsfreiheit leisten, bin aber nicht ganz uneigennützig, denn das Schreiben ist auch mein Ventil für den Wahnsinn, der bei Verstand gebliebenen Menschen immer näher auf die Pelle rückt.
2020 habe ich, bis heute erfolglos, damit angefangen, langjährigen Freundinnen und Freunden Links zu schicken, die die Vorzüge der Gen-Behandlung infrage stellen.
Auslöser war ein Gespräch mit einem jetzt ehemaligen Freund über die Verhältnisse im 3. Reich. Wir stellten uns damals die Frage, wie wir uns wohl verhalten hätten, wenn wir gefragt worden wären, wo denn plötzlich der ruhige, zuvorkommende Nachbar Salomon abgeblieben sei, der nie einer Fliege etwas zu Leide getan hat. Hätten wir auch mit den Achseln gezuckt, weil wir Angst davor gehabt hätten, dass uns vielleicht das gleiche Schicksal ereilen könnte?
Wir kamen überein, dass es uns nicht zusteht, über die Schweiger zu richten, weil wir uns keine wirkliche Vorstellung von dieser Zeit machen konnten. Wir, die wir in einer Demokratie aufgewachsen sind, hatten keine Ahnung davon, wie sich eine Diktatur anfühlt, welche Stimmung sie verursacht, auf was man alles achten muss, damit man sich nicht mit dem Staat anlegt.
Seit dem C-Ereignis sind wir um eine Erfahrung reicher. Jetzt wissen wir es.
Wir wissen, wie digitale Bücherverbrennung geht, wie Bankkonten ohne Begründung gelöscht werden können, wie Existenzen vernichtet werden können, was nötig ist, um morgens um 6 Uhr schon Besuch zu bekommen, der dann noch nicht einmal frische Semmeln mitbringt, und dass es gut ist, immer einen frisch gewaschenen Bademantel am Haken hängen zu haben.
Als junger Mensch hatte ich noch die Gelegenheit mit einer Frau zu sprechen, die diese dunkle Zeit in Deutschland miterlebt hatte. Auf meine Fragen antwortete sie, das werde ich nie im Leben vergessen: „Wir haben ja von all dem nichts gewusst!“ Das kann man glauben, muss man aber nicht.
Das war für mich das Aha-Erlebnis. Schon damals habe ich beschlossen, dass ich niemals zu denjenigen gehören will, die so etwas sagen werden. Und meinen Freunden wollte ich von Anfang an die Gelegenheit nehmen, mir diesen Satz einmal sagen zu können, daher habe ich sie, nach eigener anfänglicher Verunsicherung, mit Informationen über das C-Ereignis versorgt, die im staatskonformen Propaganda-Funk nicht zu finden waren.
Mit Samtpfötchen habe ich mich herangetastet, Lese-Angebote gemacht, vorsichtig formuliert. Dabei ging es mir nie darum, recht zu haben oder recht zu behalten. Für mich ging es um meine lieben Freunde, um Leben und Tod. Ich war zutiefst besorgt um sie. Das hat auch nach 5 Jahren nicht dazu geführt, dass sie ihr heiliges Schweigegelöbnis gebrochen haben.
Inzwischen ist mein Freundeskreis vollkommen ausgetauscht.
Anfangs war ich noch so naiv zu glauben, der Schwindel würde sich ganz schnell in Wohlgefallen auflösen, doch dann wurde mir klar, dass sich der gesunde Hausverstand von einem großen Teil der Menschen verabschiedet hat, und das hält bis heute an.
Irgendwann kam dann in der Öffentlichkeit der Satz auf: „Das konnten wir zum damaligen Zeitpunkt nicht wissen.“ Doch konntet ihr, wenn ihr euch mit den alternativen Informationsquellen beschäftigt hättet, die sicher nicht nur ich an Freunde weitergegeben habe.
Nie habe ich behauptet, die Wahrheit gepachtet zu haben, immer aber habe ich danach gestrebt, ihr so nahe wie möglich zu kommen. Bis heute.
Inzwischen sind die allermeisten Verschwörungstheorien wahr geworden.
Nachdem das C-Ereignis etwas an Schärfe verloren hatte, ging es gleich weiter mit dem Ukraine-Konflikt. Einen Tag nach Ausbruch im Februar 2022 schrieb ich in einer Email: Die Ukraine kann diesen Krieg nicht gewinnen.
Und so ging es weiter und weiter. Ein Wahnsinn nach dem anderen. Ohnmächtig müssen wir dabei zuschauen, wie Universal-Dilettanten das Ruder in der Hand haben und kerzengerade auf den Eisberg zusteuern. Da soll man sich still zurücklehnen, Popcorn futtern und die Show genießen? Tut mir leid, kann ich nicht.
Die „Geistesgrößen“ dieser Zeit scheinen George Orwells „1984“ als Bedienungsanleitung zu verstehen. Als ich es jüngst noch einmal gelesen habe, dachte ich, am weitesten ist bislang das Wahrheitsministerium vorangeschritten. Verdrehung der Realität mit Neusprech. Eine Generalumkehr der Begriffe. Daher auch mein Name in Anlehnung an diesen großen Vorherseher.
Es ist mir nicht vergönnt, zu denjenigen zu gehören, die die Bequemlichkeit im Denken pflegen und kultivieren und ein Diplom in Verdrängen über dem Sofa hängen haben.
Ich will die alte Welt nicht zurück, im Gegenteil. Mit meinen bescheidenen Mitteln und Möglichkeiten will ich dazu beitragen, habe ich die Hoffnung, den einen oder anderen vielleicht doch noch zum Nachdenken anregen zu können. Ich muss nicht recht behalten, darum ging es mir nie, ich kann mich irren und würde das auch zugeben. Derzeit mangelt es jedoch an Gelegenheiten.
Vielleicht habe ich tatsächlich etwas zu sagen (so sagt man mir es nach), und es ist sicher kein Zufall, dass mir Pareto durch Milosz Matuschek über den Weg gelaufen ist.
Es würde mich sehr freuen, wenn die geneigten Leserschaft das eine oder andere anspricht, was ich so von mir geben werde. Erst, wenn es Satoshis regnet, damit ich aufhöre, lasse ich es.
Bis dahin werde ich mich für den Erhalt der Meinungsfreiheit einsetzen, weil diese unmittelbar mit einem demokratischen System einhergeht. Sägt man an einem Baum auf einer Seite alle Äste ab, gerät der Baum in Schieflage und er fällt beim leisesten Windzug um. Das gilt es von den für Gehirnwäsche immunen Menschen zu verhindern.
-
@ 41fa852b:af7b7706
2025-03-02 08:13:00"The only way to deal with an unfree world is to become so absolutely free that your very existence is an act of rebellion." --Albert Camus
Another great week of Bitcoin meetups is ahead of us!
This week, we are thrilled to partner with The Bitcoin Ireland Conference 2025 to help spread the word about this amazing grass-roots gathering.
We have two tickets to give away in a competition. To enter, click here to submit your entry.
Good luck, check out all the details below, and we'll see you there.
This week's sponsor is…
Upcoming Bitcoin Meetups
Happening this week…
-
Eat and Meet with Joe Bryan: Meet the creator of 'What's the Problem' and a host of fellow bitcoiners at the Weeping Willow in Bury St Edmunds. Starting at 18:00 on Tuesday, March the 4th.
-
Bitcoin 101 @ Cyphermunk House: On Tuesday, March 4, 2025, from 18:30 to 20:30, a beginner's Bitcoin class at 9 John Street, London WC1N 2ES. This 2-hour community-led event covers wallets, signers, and privacy, starting at 18:45. Arrive early; £5 donation in cash or sats.
-
Canterbury Bitcoin: Meeting this month at the Millers Arms in Canterbury at 19:00 on Tuesday the 4th of March. An informal meetup to discuss Bitcoin and chat.
-
Belfast Bitcoin: Join them on Tuesday the 4th March, 20:00. These guys meet in person monthly on the first Tuesday of each month at Ormeau Baths Event Space, 18 Ormeau Avenue, Belfast, BT2 8HS, Northern Ireland.
-
OPA North London Meetup: On Wednesday, March 5, 2025, from 18:30 to 21:30, North Londoners gather at Alice House, 283--285 West End Lane, NW6 1RD, West Hampstead. The Snug, a cosy pub nook, hosts this relaxed meetup for plotting and connecting, easily reachable by overground, no passport needed.
-
Rooted in the West Bank @ Cyphermunk House: On Friday, March 7, 2025, from 18:30 to 21:30, a 3-hour event at 9 John Street, London WC1N 2ES features a screening of a 47-minute documentary by Uri Fruchtmann and Bruno Sorrentino. It profiles Palestinian farmer Atta Jabar, with Uri presenting to raise sats for a feature-length expansion.
-
Bitcoin Walk - Edinburgh: Every Saturday at 12:00, Edinburgh Bitcoiners gather for a walk starting near Meadows Park's tennis courts, discussing news, innovations, and hyperbitcoinization. Newcomers are welcome to learn about Bitcoin's role in separating money from state. They often continue the conversation afterwards with something to eat. 🚶🏽♂️🚶🏼♀️🚶🏻
-
Bitcoin Derby: On Saturday, March 8, 2025, at 15:00, Bitcoin Derby gathers at Ye Olde Dolphin, DE1 3DL, to mark the 32nd anniversary of Eric Hughes' "A Cypherpunk Manifesto." Join fellow Bitcoiners to commemorate this iconic moment at the regular time and place.
-
Privacy Day, Nostr London v6: On March 9, 2025, the 2140 Collective hosts the event in Tooting from 15:00 to 21:40, honoring Eric Hughes' Cypherpunk Manifesto. It features talks on Bitcoin crowdfunding, freedom, Nostr projects, art, free burgers from Angor.io, and a sats drop for Lightning wallet users.
Upcoming Special Events
These events aren't happening next week, but they're important to add to your calendar now as tickets are selling fast.
- CheatCode 2025 - Peter McCormack hosts the CheatCode conference, following last year's success. This year, international guest speakers include Preston Pysh, Alex Gladstein, Natalie Brunell, Matthew Pines, Steve Baker, Ben Arc, and Checkmate.
Friday, April 11th, is the main conference day, followed by a huge meetup at Ledger Park for the men's Real Bedford match, and again on Sunday for the women's match. Check out the link for ticket details.
- Bitcoin Ireland Conference 2025: Bitcoin Ireland is hosting its annual Bitcoin Conference, building on the momentum of previous years. This year Bitcoin Events UK are proudly serving as a media partner to help spread the word! Enter our competition to win two free tickets worth (€198 value). This year's lineup of international guest speakers includes Daniel Prince, alongside notable figures like Knut Svanholm, Dinny Collins, Lawrence-Stanley and other respected voices in the Bitcoin community, offering thoughtful perspectives on the evolving Bitcoin revolution.
The main conference takes place on Saturday, May 24th, at The Green Isle Hotel in Dublin. Following the event, attendees can join a relaxed networking meetup with Ireland's Bitcoin community to continue the discussion. For ticket details, visit: www.bitcoinireland.eu.
Get Involved
- Volunteer Opportunities: Bridge2Bitcoin is actively seeking volunteers who share our passion for merchant adoption. We'd be delighted to connect if you're eager to contribute. Reach out to us on Twitter or through our website.
- Start Your Own Meetup: Interested in launching a Bitcoin meetup? We're here to support you every step of the way. We've assisted numerous UK Bitcoin meetups in getting started. Get in touch via Twitter.
- Contribute to BTCMaps: BTCMaps is a vital part of the Bitcoin ecosystem. It's a perfect project to get involved with if you're not a coder or even that technical. A great way to give back to the community. Maintain an area of the UK and keep it up-to-date.
- Telegram users: You might find our Telegram Channel another useful way to keep up-to-date with UK meetups.
- Feedback and Suggestions: We value your input! Share your ideas on how we can enhance this newsletter.
This week's sponsors are…
Get out and support the meetups where you can, visit Bitcoin Events UK for more info on each meetup and to find your closest on the interactive map.
Stay tuned for more updates next week!
Simon.
-
-
@ da0b9bc3:4e30a4a9
2025-03-02 08:12:23Hello Stackers!
Welcome on into the ~Music Corner of the Saloon!
A place where we Talk Music. Share Tracks. Zap Sats.
So stay a while and listen.
🚨Don't forget to check out the pinned items in the territory homepage! You can always find the latest weeklies there!🚨
🚨Subscribe to the territory to ensure you never miss a post! 🚨
originally posted at https://stacker.news/items/901383
-
@ fbf0e434:e1be6a39
2025-03-02 06:18:25DoraHacks has once again set a new standard for showcasing the brightest minds in Web3 and frontier technology with the successful debut of BUIDL DAY—our flagship event dedicated to amplifying the voices of early-stage, high-impact projects from the most promising ecosystems in the space.
With over 500 participants in attendance, BUIDL DAY was more than just an event; it was a hub of energy and innovation. Held at the intersection of collaboration and cutting-edge technology, we brought together nine pioneering ecosystems.— Cosmos, Babylon, Sonic, Aptos, Circle, KAIA, Initia, Movement and Flow—to spotlight the most original and contrarian early-stage teams building the next generation of technology.
It was the moment DoraHacks unveiled its defining thesis for 2025: Freedom of BUIDL—the fundamental belief that anyone, anywhere, should have the freedom to build what they want, when they want.
DoraHacks is not merely a platform. It is a force of nature, mobilizing the world's largest and most significant hacker movement. With over 200,000 developers having collectively launched 20,000+ startups, DoraHacks is rewriting the blueprint of innovation. This is where the future is built—not in closed rooms, but in the open, by hackers who refuse to ask for permission.
Hacking Without Borders
The numbers speak for themselves. In 2024 alone, over 300 organizations hosted more than 350 hackathons through DoraHacks, proving that the demand for open innovation has never been stronger. Any organization, from emerging startups to global enterprises, can tap into the boundless creative potential of the DoraHacks ecosystem and launch their own hackathons with ease.
DoraHacks' 2025 Thesis: The Future of BUIDL
At BUIDL Day, DoraHacks announced its core technological priorities for 2025. These are not mere trends—they are fundamental shifts in how the internet, cryptography, and decentralized systems will evolve. DoraHacks is doubling down on collaborations with the most critical open-source platforms to foster growth and innovation. The key areas include:
- Consumer Crypto – A narrative gaining traction across Aptos, Circle, Flow, and beyond, driving the next wave of crypto-native consumer applications.
- Agentic Crypto & Organizations – A revolution in decentralized coordination, playing out in Injective, Sonic, and YakiHonne.
- Freedom of BUIDL & Privacy Tech – Powering sovereign innovation and privacy-first technologies, championed by Zama and Dora Factory.
- Sovereign Independent Blockchains – The rise of self-sovereign networks, an area where Cosmos and its ecosystem continue to lead.
But we are not stopping there.
Exploring the Next Frontier
2025 marks the beginning of DoraHacks’ deep foray into frontier technology:
- Quantum Software & Infrastructure – Enabling the next paradigm shift in computing.
- Quantum Cryptography – Developing encryption that withstands the quantum era.
- Open Source Hardware – Breaking the barriers of proprietary computing.
The future is decentralized. It is open-source. And it is being built, right now.
The Next Chapter: Google Cloud x DoraHacks
DoraHacks is not just shaping the future—it is forming alliances with those who are building it. At BUIDL Day, DoraHacks officially announced its partnership with Google Cloud. As part of this collaboration, Google Cloud will provide $350,000 in cloud and AI services to support DoraHacks’ most promising startups. This partnership will also drive the launch of new hackathons focused on cutting-edge fields, from AI to quantum computing.
A Platform for Bold Builders
BUIDL DAY was meticulously designed to give early-stage teams the visibility, resources, and connections they need to propel their projects forward. Unlike traditional conferences and summits, our focus was on the BUIDLs that challenge the status quo—teams building with first-principles thinking and forging paths where others have yet to tread. These BUIDLs represented the cutting edge of decentralized technology, from novel Layer 1s and interoperability solutions to revolutionary applications in DeFi, consumer, AI gaming, and infrastructure.
Unparalleled Networking and Exposure
The energy in the room was electric as builders, investors, and foundation leaders engaged in deep discussion. Venture capitalists, including some of the most active investors in the space, had the opportunity to meet the next wave of category-defining projects at their earliest stages. Meanwhile, developers and founders connected with the leading foundations backing their ecosystems, receiving invaluable insights, mentorship, and potential funding opportunities.
Beyond structured networking, serendipitous encounters defined the day—whether it was a team finding a strategic partner over coffee or a founder securing an unexpected investor introduction during a panel discussion. BUIDL DAY was proof that the right environment fosters groundbreaking collaborations.
Why BUIDL DAY Matters
The ethos behind BUIDL DAY is simple: true innovation happens when visionary builders are given a platform to share, iterate, and connect. While the Web3 landscape is constantly evolving, one thing remains certain—early-stage projects need more than funding; they need the right ecosystem, exposure, and support to succeed.
By curating an event that prioritizes originality and contrarian thinking, DoraHacks has reaffirmed its commitment to nurturing the builders who will define the future of blockchain and beyond. BUIDL DAY was not just a moment in time—it was the beginning of something much bigger.
To all the builders, investors, and foundation leaders who joined us: thank you for making this an unforgettable experience. We can’t wait to see where these projects go next and look forward to building together in the future.
Until next time, keep BUIDLing!
If you want to learn more about all of the participating BUIDLs please refer the our
-
@ 6e0ea5d6:0327f353
2025-03-02 03:08:00Ascolta bene! Conquering a city is easy. All it takes is gathering armies, strategies, and being ruthless. But mastering one’s own spirit? Ah, that is the battle that separates men from boys, leaders from tyrants, and the wise from the foolish.
Davvero, patience is the hammer that shapes a man's spirit; fury is the fire that destroys it. A warrior wins battles, but a man who controls his emotions rules empires. He who governs himself will never be a slave to circumstances.
An army may tear down walls, but a single man who controls his emotions builds empires—both within and beyond himself. Patience is not weakness; it is the precise strike of one who has already won the internal battle. Unchecked rage destroys in seconds what patience builds over a lifetime.
External victory without internal mastery is a deception. What good is it to conquer a city if your soul remains a battlefield? He who does not control his spirit is a slave to himself. Anger, ego, and pride are serpents coiled within the heart, ready to suffocate any chance of greatness. A man without self-control is nothing more than a wild beast; a patient man is a fortress.
Patience is not weakness; it is an invisible sword that cuts deeper than any forged blade. True power does not lie in the roar of rage but in the silence of strategy. It is the shield that guards against reckless decisions, words that cannot be taken back, and mistakes that are far too costly. A patient man, one who masters his spirit, is like a volcano—choosing when and where to erupt. He does not waste energy; he channels it, calculates, and triumphs.
A man's success is not measured by the lands he conquers or the people he commands, but by his ability to remain unshaken, even when everything around him crumbles. The man who does not master himself is a slave, even with an empire at his feet. But the patient man, the one who transforms anger into strength and silence into strategy, becomes a living weapon. He does not merely survive—he dominates, unbreakable, immortal in his legacy.
Be this man, amico mio.
Thank you for reading, my friend!
If this message resonated with you, consider leaving your "🥃" as a token of appreciation.
A toast to our family!
-
@ 22050dd3:480c11ea
2025-03-02 03:06:35Written by Keith Meola, Revised by Frank Corva
Situated 8 miles off the coast of Cancun surrounded by pristine turquoise waters is a small island called Isla Mujeres.
And when I say small, I mean small. It measures just 5 miles long by 0.5 miles wide.
The sliver of landmass has a lot going on, though. On it, you can find a lake, a bay, different beaches with unique waves, and various distinct areas.
There’s the calmer residential center, the active and more touristy “downtown”, and the tranquil and posh Southern tip, to describe a few.
12,600 people live on the island, and several hundred merchants and businesses operate there.
Of these businesses, 16 accept bitcoin.
At the beginning of 2024, this number was zero. So, how have so many people on the island been orange-pilled in such a short period of time?
A passionate Bitcoiner named Isabella (Isa) Santos, that's who. And she started doing this work at block height #829,750 (mined February 9, 2024). This is when BTC Isla was born.
BTC Isla
Isa started the work as a passion project. BTC Isla was slow to initially get off the ground, but, Isa began to pick up steam by the end of 2024. And now she is charging ahead with the help of visiting Bitcoiners.
The first visitor arrived in the Summer of 2024 and the number of visitors has been steadily increasing since then.
Within the first month of this year, 6 Bitcoiners from 4 countries have visited the island to see what is happening and partake in the movement. Those who have visited have split their time between attending meetups or volunteering and partaking in efforts to spread Bitcoin adoption. And Isa intends to welcome many more Bitcoiners to the island this year.
She also plans to continue to work tirelessly to not only onboard more merchants but to educate the freshly orange-pilled about how Bitcoin works and why it's so important.
One of the bitcoin-accepting merchants on the island
Bitcoin Education
Education is at the core of BTC Isla. In Isa's mind, Bitcoin education is necessary to truly empower the population.
It is one thing to accept bitcoin as a form of payment. It's another for people to truly understand what Bitcoin is and what it can do for them.
Isa teaches Bitcoin classes which are free to attend.
At the moment they are held at the Mayakita restaurant, which is also the usual spot for the Bitcoin meetups. Isa teaches the classes in Spanish using the Mi Primer Bitcoin curriculum.
This curriculum is an open-source diploma-based educational program created by the organization Mi Primer Bitcoin in El Salvador. Through their coursework, students are taught the essential knowledge to gain financial literacy and understand Bitcoin.
As of the time of writing, one cohort has already graduated and the second one is on its way!
BTC Isla class
Merchant Adoption
Adoption on the island is picking up steam in 2025. As mentioned, 16 merchants on the island currently accept bitcoin as payment.
And Isa is working to increase that number with the help of locals. Expats living on the island as well as students and graduated students help with adoption.
Thanks to the efforts of Isa and her team, it's now possible to visit the island and use bitcoin exclusively to pay for goods and services!
The majority of the merchants who accept bitcoin are food and drink vendors, but it is possible to pay for accommodation, transportation, and even some tours and shopping with bitcoin.
Visitors at a meetup
As I wrote, the number of visitors to the island is exploding in 2025. I recently had the opportunity and pleasure to visit the island and spent 2 weeks there observing and taking part In the project. I will be writing about my experiences on the island and with BTC Isla!
Gaining Attention
Big and exciting things are happening on the small island of Isla Mujeres.
What started as a solo passion project to “orange pill a whole island” is quickly gaining new members and it's attracting attention both on the island and around the globe.
Word is quickly spreading that something is brewing off the coast of Cancun.
Post-class picture, that's me in the white shirt
BTC Isla can be followed at the following handles:
-
@ 6e0ea5d6:0327f353
2025-03-02 03:02:20Every venture is a tremendous risk. In all your business endeavors, ask yourself: is the potential gain viable enough to outweigh the risk of loss? Courage must always align with intelligence. That is, every initiative should be based on a thorough study of the market, supply, and demand.
If the success of your plans depends on someone else's help, believe this: you have already failed. Do not wait for assistance, do not rely on the goodwill of others, and never trust promises of support. In the end, people are more likely to ignore you than to honor their word.
It will not be their fault in any way. However, it will be yours. Do not be disappointed in others—be disappointed in yourself for expecting too much from them. Engrave these words in your heart, and you will never have the spear of betrayal lodged in your back. When you are at rock bottom, the only thing that will fall from the sky is dirt. The best time to be courageous is when you have nothing left.
With that in mind, approach your problems with enthusiasm and determination! Keep your eyes open, your mouth shut, your heart still, and your spirit ready for war. Only lower your guard when they lower the lid of your coffin. Both failure and victory are direct results of your actions and how you navigate your personal circumstances. Take responsibility for your choices and mistakes, do not wallow in self-pity, and enjoy what you earn.
Expect nothing from others but disappointment, lies, and constant frustration. Anything good that comes your way—consider it a bonus.
Thank you for reading, my friend!
If this message resonated with you, consider leaving your "🥃" as a token of appreciation.
A toast to our family!
-
@ f3873798:24b3f2f3
2025-03-02 02:32:22Olá, caros leitores!
No meu Guia para Novatos do Nostr, mencionei brevemente o YakiHonne, um dos diversos clientes disponíveis no ecossistema Nostr. Hoje, quero aprofundar mais sobre esse cliente, destacando suas funcionalidades, vantagens, desvantagens e minha opinião final.
YakiHonne: O Melhor Cliente para Microblog no Nostr?
O YakiHonne se destaca por sua interface bem organizada e otimizada para leitura de artigos no Nostr. Um dos seus diferenciais é a seção de sugestões no canto superior da tela, que recomenda conteúdos relevantes e incentiva a exploração de novas postagens.
Caso você queira mais visibilidade na plataforma, existe a opção de pagar para destacar uma publicação através da funcionalidade> Note Paga, localizada na parte inferior da tela de criação de posts.
Além disso, o YakiHonne oferece diversas opções de publicação, cada uma com otimizações específicas.
Funcionalidades do YakiHonne
Ao clicar no botão "+", o usuário tem acesso às seguintes opções de postagens:
📌 Note
Equivalente às postagens instantâneas de redes sociais como X (antigo Twitter), onde os usuários compartilham pensamentos curtos e interagem rapidamente.
📝 Article
Voltado para microblogs e blogs, essa opção permite uma formatação mais detalhada dos textos, sendo ideal para quem quer produzir conteúdo mais elaborado.
🎥 Vídeo
Uma funcionalidade destinada à publicação de vídeos. Aparentemente, o YakiHonne busca ser um “YouTube descentralizado” dentro do Nostr, mas ainda não explorei essa opção a fundo. Se alguém já testou, sinta-se à vontade para compartilhar nos comentários.
🖥️ Smart Widget
Permite personalizar o layout do cliente para que a experiência de navegação e leitura fique mais intuitiva e agradável para cada usuário.
📚 Curation
Uma funcionalidade que possibilita a criação de curations, ou seja, coleções de artigos organizados por tema. Além disso, outras pessoas podem contribuir com artigos relacionados, tornando essa uma ferramenta colaborativa interessante.
Na minha opinião, a opção Article é a mais útil, pois permite criar textos bem estruturados.
Construindo um Artigo no YakiHonne
Na opção Article, há diversas ferramentas de formatação disponíveis, incluindo:
-
Negrito
-
Itálico
-
Hyperlink
-
Diferentes níveis de títulos (H1, H2, H3…)
-
<> Para realçar trechos de código ou termos específicos
-
" Para inserir citações destacadas
-
Sublinhado
-
f (parece criar um botão, mas precisa de ajustes)
-
Inserção de imagens via URL ou upload direto
-
Inteligência Artificial integrada para auxiliar na escrita
-
Smart Widget para melhor organização
Essas ferramentas tornam a experiência de escrever no YakiHonne mais completa e dinâmica.
Vantagens do YakiHonne
✅ Ótima otimização para textos – É um dos clientes mais completos para quem deseja produzir conteúdos bem estruturados. ✅ Interface intuitiva – A organização da plataforma facilita a navegação e a gestão das postagens. ✅ Ferramentas de divulgação – As opções de curadoria e destaques pagos ajudam a impulsionar conteúdos relevantes.
Desvantagens do YakiHonne
⚠️ Edição de texto precisa de melhorias – A opção de sublinhar altera o tamanho e a fonte do texto, o que não é ideal para destacar palavras estrangeiras corretamente. ⚠️ Botão "f" desconfigurado – A funcionalidade que aparentemente gera um botão ficou deformada no meu celular, sem possibilidade de ajuste.
Considerações Finais
O YakiHonne é um dos melhores clientes Nostr que já experimentei. Se você gosta de ler e escrever artigos, pode passar horas explorando os conteúdos da comunidade.
Além disso, acredito que no futuro haverá mais opções de monetização. Assim como outros clientes Nostr, o YakiHonne permite associar uma carteira de Bitcoin, possibilitando receber doações pelos conteúdos publicados.
Se você já testou esse cliente, deixe nos comentários sua experiências
-
-
@ d5c3d063:4d1159b3
2025-03-02 02:29:00ทำไมคนที่ด่าเรา ถึงเป็นคนที่ทุกข์...ลองนึกภาพคนที่กำลังมีความสุขดูสิ... เขาจะมีเวลามานั่งด่าใครไหม
วันหนึ่ง...ผมนั่งอยู่ในร้านกาแฟ มองออกไปเห็นชายคนหนึ่งกำลังมีปากเสียงกับพนักงานร้าน เขาพูดจาเสียงดัง หน้าตาบึ้งตึง ดูหงุดหงิดอย่างเห็นได้ชัด พนักงานสาวที่ถูกตำหนิพยายามขอโทษ และอธิบายเหตุผลของเธอด้วยน้ำเสียงสุภาพ แต่ชายคนนั้นยังคงไม่พอใจ เดินออกจากร้านไปด้วยอารมณ์ขุ่นมัว ทิ้งบรรยากาศตึงเครียดไว้เบื้องหลัง
!(image)[https://m.primal.net/PQdY.png]
พนักงานสาวถอนหายใจเบา ๆ แล้วหันกลับมาทำงานต่อราวกับไม่มีอะไรเกิดขึ้น ผมอดสงสัยไม่ได้ว่าทำไมเธอถึงดูไม่ทุกข์ร้อนกับเหตุการณ์เมื่อครู่นี้เลย
"ไม่เป็นไรค่ะ เขาคงมีเรื่องให้กังวลอยู่แล้ว" เธอตอบเมื่อผมถาม
คำพูดนั้นทำให้ผมหยุดคิด...
ในชีวิตของเรา คงไม่มีใครไม่เคยถูกตำหนิ ถูกต่อว่า หรือถูกพูดจาไม่ดีใส่ บางครั้งอาจเป็นเพียงคำพูดที่ไม่ได้ตั้งใจ บางครั้งอาจเป็นอารมณ์โกรธที่ถูกระบายออกมาโดยไม่เลือกที่หมาย แต่หากเราหยุดดูให้ดี เราจะพบว่าคนที่กำลังโกรธ ดุด่าหรือตำหนิใครสักคน มักจะเป็นคนที่กำลังเผชิญกับความทุกข์อยู่แล้ว
คนที่มาด่าเรา อาจจะกำลังเหนื่อยล้าจากปัญหาส่วนตัว อาจจะผิดหวังในบางสิ่ง อาจจะรู้สึกไม่เป็นที่ยอมรับ อาจจะเครียดจากเรื่องในครอบครัว และบางครั้ง…อาจจะไม่ได้มีเจตนาร้าย เพียงแต่เขาไม่รู้จะจัดการกับอารมณ์ของตัวเองยังไง
...และเมื่อเผชิญกับคำพูดที่ไม่ดี เรามีทางเลือกอยู่เสมอ...
-
ตอบโต้กลับไป บางครั้งเราโกรธและเผลอพูดอะไรออกไปตามอารมณ์ สิ่งนี้อาจทำให้เกิดความรู้สึกไม่ดีทั้งสองฝ่าย บางครั้งเราชนะการโต้เถียง แต่กลับแพ้ที่ความสงบในใจ
-
ปล่อยผ่าน และเข้าใจ การเข้าใจว่า "คนที่ด่าเรา เขานั่นแหละทุกข์" ไม่ได้หมายความว่าเราต้องยอมรับการถูกกระทำที่ไม่เหมาะสม แต่หมายถึงการไม่เอาคำพูดเหล่านั้นมาเป็นภาระของตัวเอง
-
มองลึกลงไปให้เห็นเจตนา บางครั้งคนที่ตำหนิเราอาจจะต้องการให้เราปรับปรุงในบางเรื่อง อารมณ์ของเขาอาจจะไม่ดี แต่หากเราแยกเนื้อหาจากอารมณ์ออกมาได้ เราอาจพบว่ามีบางอย่างที่เราสามารถเรียนรู้ได้
ท้ายที่สุด คำพูดของใครก็ไม่สำคัญเท่ากับสิ่งที่เราบอกกับตัวเอง
หากเรามั่นคงพอ คำพูดที่รุนแรงจะเป็นเพียงเสียงที่ผ่านเข้ามาแล้วผ่านไป หากเรามีเมตตา คำพูดที่ไม่ดีจะเป็นบทเรียนให้เราเข้าใจมนุษย์มากขึ้น หากเรารู้เท่าทันอารมณ์ตัวเอง คำพูดเหล่านั้นก็จะไม่มีอิทธิพลต่อเรา
"ไม่เป็นไรค่ะ เขาคงมีเรื่องให้กังวลอยู่แล้ว"
ผมนั่งจิบกาแฟพลางคิดตามคำพูดนั้นแล้วพบว่ามันเป็นเรื่องจริง คนที่มาด่าเรา อาจจะต้องการกำลังใจมากกว่าที่เราคิดก็ได้...
Siamstr
-
-
@ ec42c765:328c0600
2024-10-21 07:42:482024年3月
フィリピンのセブ島へ旅行。初海外。
Nostrに投稿したらこんなリプライが
nostr:nevent1qqsff87kdxh6szf9pe3egtruwfz2uw09rzwr6zwpe7nxwtngmagrhhqc2qwq5
nostr:nevent1qqs9c8fcsw0mcrfuwuzceeq9jqg4exuncvhas5lhrvzpedeqhh30qkcstfluj
(ビットコイン関係なく普通の旅行のつもりで行ってた。というか常にビットコインのこと考えてるわけではないんだけど…)
そういえばフィリピンでビットコイン決済できるお店って多いのかな?
海外でビットコイン決済ってなんかかっこいいな!
やりたい!
ビットコイン決済してみよう! in セブ島
BTCMap でビットコイン決済できるところを探す
本場はビットコインアイランドと言われてるボラカイ島みたいだけど
セブにもそれなりにあった!
なんでもいいからビットコイン決済したいだけなので近くて買いやすい店へ
いざタピオカミルクティー屋!
ちゃんとビットコインのステッカーが貼ってある!
つたない英語とGoogle翻訳を使ってビットコイン決済できるか店員に聞いたら
店員「ビットコインで支払いはできません」
(えーーーー、なんで…ステッカー貼ってあるやん…。)
まぁなんか知らんけどできないらしい。
店員に色々質問したかったけど質問する英語力もないのでする気が起きなかった
結局、せっかく店まで足を運んだので普通に現金でタピオカミルクティーを買った
タピオカミルクティー
話題になってた時も特に興味なくて飲んでなかったので、これが初タピオカミルクティーになった
法定通貨の味がした。
どこでもいいからなんでもいいから
海外でビットコイン決済してみたい
ビットコイン決済させてくれ! in ボラカイ島
ビットコインアイランドと呼ばれるボラカイ島はめちゃくちゃビットコイン決済できるとこが多いらしい
でもやめてしまった店も多いらしい
でも300もあったならいくつかはできるとこあるやろ!
nostr:nevent1qqsw0n6utldy6y970wcmc6tymk20fdjxt6055890nh8sfjzt64989cslrvd9l
行くしかねぇ!
ビットコインアイランドへ
フィリピンの国内線だぁ
``` 行き方: Mactan-Cebu International Airport ↓飛行機 Godofredo P. Ramos Airport (Caticlan International Airport, Boracay Airport) ↓バスなど Caticlan フェリーターミナル ↓船 ボラカイ島
料金: 飛行機(受託手荷物付き) 往復 21,000円くらい 空港~ボラカイ島のホテルまで(バス、船、諸経費) 往復 3,300円くらい (klookからSouthwest Toursを利用)
このページが色々詳しい https://smaryu.com/column/d/91761/ ```
空港おりたらSouthwestのバスに乗る
事前にネットで申し込みをしている場合は5番窓口へ
港!
船!(めっちゃ速い)
ボラカイついた!
ボラカイ島の移動手段
セブの移動はgrabタクシーが使えるがボラカイにはない。
ネットで検索するとトライシクルという三輪タクシーがおすすめされている。
(トライシクル:開放的で風がきもちいい)
トライシクルの欠点はふっかけられるので値切り交渉をしないといけないところ。
最初に300phpくらいを提示され、行き先によるけど150phpくらいまでは下げられる。
これはこれで楽しい値切り交渉だけど、個人的にはトライシクルよりバスの方が気楽。
Hop On Hop Off バス:
https://www.hohoboracay.com/pass.php
一日乗り放題250phpなので往復や途中でどこか立ち寄ったりを考えるとお得。
バスは現金が使えないので事前にどこかでカードを買うか車内で買う。
私は何も知らずに乗って車内で乗務員さんから現金でカードを買った。
バスは狭い島内を数本がグルグル巡回してるので20~30分に1本くらいは来るイメージ。
逆にトライシクルは待たなくても捕まえればすぐに乗れるところがいいところかもしれない。
現実
ボラカイ島 BTC Map
BTC決済できるとこめっちゃある
さっそく店に行く!
「bitcoin accepted here」のステッカーを見つける!
店員にビットコイン支払いできるか聞く!
できないと言われる!
もう一軒行く
「bitcoin accepted here」のステッカーを見つける
店員にビットコイン支払いできるか聞く
できないと言われる
5件くらいは回った
全部できない!
悲しい
で、ネットでビットコインアイランドで検索してみると
旅行日の一か月前くらいにアップロードされた動画があったので見てみた
要約 - ビットコイン決済はpouch.phというスタートアップ企業がボラカイ島の店にシステムを導入した - ビットコインアイランドとすることで観光客が10%~30%増加つまり数百~千人程度のビットコインユーザーが来ると考えた - しかし実際には3~5人だった - 結果的に200の店舗がビットコイン決済を導入しても使われたのはごく一部だった - ビットコイン決済があまり使われないので店員がやり方を忘れてしまった - 店は関心を失いpouchのアプリを消した
https://youtu.be/uaqx6794ipc?si=Afq58BowY1ZrkwaQ
なるほどね~
しゃあないわ
聖地巡礼
動画内でpouchのオフィスだったところが紹介されていた
これは半年以上前の画像らしい
現在はオフィスが閉鎖されビットコインの看板は色あせている
おもしろいからここに行ってみよう!となった
で行ってみた
看板の色、更に薄くなってね!?
記念撮影
これはこれで楽しかった
場所はこの辺
https://maps.app.goo.gl/WhpEV35xjmUw367A8
ボラカイ島の中心部の結構いいとこ
みんな~ビットコイン(の残骸)の聖地巡礼、行こうぜ!
最後の店
Nattoさんから情報が
なんかあんまりネットでも今年になってからの情報はないような…https://t.co/hiO2R28sfO
— Natto (@madeofsoya) March 22, 2024
ここは比較的最近…?https://t.co/CHLGZuUz04もうこれで最後だと思ってダメもとで行ってみた なんだろうアジア料理屋さん?
もはや信頼度0の「bitcoin accepted here」
ビットコイン払いできますか?
店員「できますよ」
え?ほんとに?ビットコイン払いできる?
店員「できます」
できる!!!!
なんかできるらしい。
適当に商品を注文して
印刷されたQRコードを出されたので読み取る
ここでスマートに決済できればよかったのだが結構慌てた
自分は英語がわからないし相手はビットコインがわからない
それにビットコイン決済は日本で1回したことがあるだけだった
どうもライトニングアドレスのようだ
送金額はこちらで指定しないといけない
店員はフィリピンペソ建ての金額しか教えてくれない
何sats送ればいいのか分からない
ここでめっちゃ混乱した
でもウォレットの設定変えればいいと気付いた
普段円建てにしているのをフィリピンペソ建てに変更すればいいだけだった
設定を変更したら相手が提示している金額を入力して送金
送金は2、3秒で完了した
やった!
海外でビットコイン決済したぞ!
ログ
PORK CHAR SIU BUN とかいうやつを買った
普通にめっちゃおいしかった
なんかビットコイン決済できることにビビッて焦って一品しか注文しなかったけどもっと頼めばよかった
ここです。みなさん行ってください。
Bunbun Boracay
https://maps.app.goo.gl/DX8UWM8Y6sEtzYyK6
めでたしめでたし
以下、普通の観光写真
セブ島
ジンベエザメと泳いだ
スミロン島でシュノーケリング
市場の路地裏のちょっとしたダウンタウン?スラム?をビビりながら歩いた
ボホール島
なんか変な山
メガネザル
現地の子供が飛び込みを披露してくれた
ボラカイ島
ビーチ
夕日
藻
ボラカイ島にはいくつかビーチがあって宿が多いところに近い南西のビーチ、ホワイトビーチは藻が多かった(時期によるかも)
北側のプカシェルビーチは全然藻もなく、水も綺麗でめちゃくちゃよかった
プカシェルビーチ
おわり!
-
@ 3bf0c63f:aefa459d
2024-09-18 10:37:09How to do curation and businesses on Nostr
Suppose you want to start a Nostr business.
You might be tempted to make a closed platform that reuses Nostr identities and grabs (some) content from the external Nostr network, only to imprison it inside your thing -- and then you're going to run an amazing AI-powered algorithm on that content and "surface" only the best stuff and people will flock to your app.
This will be specially good if you're going after one of the many unexplored niches of Nostr in which reading immediately from people you know doesn't work as you generally want to discover new things from the outer world, such as:
- food recipe sharing;
- sharing of long articles about varying topics;
- markets for used goods;
- freelancer work and job offers;
- specific in-game lobbies and matchmaking;
- directories of accredited professionals;
- sharing of original music, drawings and other artistic creations;
- restaurant recommendations
- and so on.
But that is not the correct approach and damages the freedom and interoperability of Nostr, posing a centralization threat to the protocol. Even if it "works" and your business is incredibly successful it will just enshrine you as the head of a platform that controls users and thus is prone to all the bad things that happen to all these platforms. Your company will start to display ads and shape the public discourse, you'll need a big legal team, the FBI will talk to you, advertisers will play a big role and so on.
If you are interested in Nostr today that must be because you appreciate the fact that it is not owned by any companies, so it's safe to assume you don't want to be that company that owns it. So what should you do instead? Here's an idea in two steps:
- Write a Nostr client tailored to the niche you want to cover
If it's a music sharing thing, then the client will have a way to play the audio and so on; if it's a restaurant sharing it will have maps with the locations of the restaurants or whatever, you get the idea. Hopefully there will be a NIP or a NUD specifying how to create and interact with events relating to this niche, or you will write or contribute with the creation of one, because without interoperability this can't be Nostr.
The client should work independently of any special backend requirements and ideally be open-source. It should have a way for users to configure to which relays they want to connect to see "global" content -- i.e., they might want to connect to
wss://nostr.chrysalisrecords.com/
to see only the latest music releases accredited by that label or towss://nostr.indiemusic.com/
to get music from independent producers from that community.- Run a relay that does all the magic
This is where your value-adding capabilities come into play: if you have that magic sauce you should be able to apply it here. Your service -- let's call it
wss://magicsaucemusic.com/
-- will charge people or do some KYM (know your music) validation or use some very advanced AI sorcery to filter out the spam and the garbage and display the best content to your users who will request the global feed from it (["REQ", "_", {}]
), and this will cause people to want to publish to your relay while others will want to read from it.You set your relay as the default option in the client and let things happen. Your relay is like your "website" and people are free to connect to it or not. You don't own the network, you're just competing against other websites on a leveled playing field, so you're not responsible for it. Users get seamless browsing across multiple websites, unified identities, a unified interface (that could be different in a different client) and social interaction capabilities that work in the same way for all, and they do not depend on you, therefore they're more likely to trust you.
Does this centralize the network still? But this a simple and easy way to go about the matter and scales well in all aspects.
Besides allowing users to connect to specific relays for getting a feed of curated content, such clients should also do all kinds of "social" (i.e. following, commenting etc) activities (if they choose to do that) using the outbox model -- i.e. if I find a musician I like under
wss://magicsaucemusic.com
and I decide to follow them I should keep getting updates from them even if they get banned from that relay and start publishing onwss://nos.lol
orwss://relay.damus.io
or whatever relay that doesn't even know anything about music.The hardcoded defaults and manual typing of relay URLs can be annoying. But I think it works well at the current stage of Nostr development. Soon, though, we can create events that recommend other relays or share relay lists specific to each kind of activity so users can get in-app suggestions of relays their friends are using to get their music from and so on. That kind of stuff can go a long way.
-
@ eb35d9c0:6ea2b8d0
2025-03-02 00:55:07I had a ton of fun making this episode of Midnight Signals. It taught me a lot about the haunting of the Bell family and the demise of John Bell. His death was attributed to the Bell Witch making Tennessee the only state to recognize a person's death to the supernatural.
If you enjoyed the episode, visit the Midnight Signals site. https://midnightsignals.net
Show Notes
Journey back to the early 1800s and the eerie Bell Witch haunting that plagued the Bell family in Adams, Tennessee. It began with strange creatures and mysterious knocks, evolving into disembodied voices and violent attacks on young Betsy Bell. Neighbors, even Andrew Jackson, witnessed the phenomena, adding to the legend. The witch's identity remains a mystery, sowing fear and chaos, ultimately leading to John Bell's tragic demise. The haunting waned, but its legacy lingers, woven into the very essence of the town. Delve into this chilling story of a family's relentless torment by an unseen force.
Transcript
Good evening, night owls. I'm Russ Chamberlain, and you're listening to midnight signals, the show, where we explore the darkest corners of our collective past. Tonight, our signal takes us to the early 1800s to a modest family farm in Adams, Tennessee. Where the Bell family encountered what many call the most famous haunting in American history.
Make yourself comfortable, hush your surroundings, and let's delve into this unsettling tale. Our story begins in 1804, when John Bell and his wife Lucy made their way from North Carolina to settle along the Red River in northern Tennessee. In those days, the land was wide and fertile, mostly unspoiled with gently rolling hills and dense woodland.
For the Bells, John, Lucy, and their children, The move promised prosperity. They arrived eager to farm the rich soil, raise livestock, and find a peaceful home. At first, life mirrored [00:01:00] that hope. By day, John and his sons worked tirelessly in the fields, planting corn and tending to animals, while Lucy and her daughters managed the household.
Evenings were spent quietly, with scripture readings by the light of a flickering candle. Neighbors in the growing settlement of Adams spoke well of John's dedication and Lucy's gentle spirit. The Bells were welcomed into the Fold, a new family building their future on the Tennessee Earth. In those early years, the Bells likely gave little thought to uneasy rumors whispered around the region.
Strange lights seen deep in the woods, soft cries heard by travelers at dusk, small mysteries that most dismissed as product of the imagination. Life on the frontier demanded practicality above all else, leaving little time to dwell on spirits or curses. Unbeknownst to them, events on their farm would soon dominate not only their lives, but local lore for generations to come.[00:02:00]
It was late summer, 1817, when John Bell's ordinary routines took a dramatic turn. One evening, in the waning twilight, he spotted an odd creature near the edge of a tree line. A strange beast resembling part dog, part rabbit. Startled, John raised his rifle and fired, the shot echoing through the fields. Yet, when he went to inspect the spot, nothing remained.
No tracks, no blood, nothing to prove the creature existed at all. John brushed it off as a trick of falling light or his own tired eyes. He returned to the house, hoping for a quiet evening. But in the days that followed, faint knocking sounds began at the windows after sunset. Soft scratching rustled against the walls as if curious fingers or claws tested the timbers.
The family's dog barked at shadows, growling at the emptiness of the yard. No one considered it a haunting at first. Life on a rural [00:03:00] farm was filled with pests, nocturnal animals, and the countless unexplained noises of the frontier. Yet the disturbances persisted, night after night, growing a little bolder each time.
One evening, the knocking on the walls turned so loud it woke the entire household. Lamps were lit, doors were open, the ground searched, but the land lay silent under the moon. Within weeks, the unsettling taps and scrapes evolved into something more alarming. Disembodied voices. At first, the voices were faint.
A soft murmur in rooms with no one in them. Betsy Bell, the youngest daughter, insisted she heard her name called near her bed. She ran to her mother and her father trembling, but they found no intruder. Still, The voice continued, too low for them to identify words, yet distinct enough to chill the blood.
Lucy Bell began to fear they were facing a spirit, an unclean presence that had invaded their home. She prayed for divine [00:04:00] protection each evening, yet sometimes the voice seemed to mimic her prayers, twisting her words into a derisive echo. John Bell, once confident and strong, grew unnerved. When he tried reading from the Bible, the voice mocked him, imitating his tone like a cruel prankster.
As the nights passed, disturbances gained momentum. Doors opened by themselves, chairs shifted with no hand to move them, and curtains fluttered in a room void of drafts. Even in daytime, Betsy would find objects missing, only for them to reappear on the kitchen floor or a distant shelf. It felt as if an unseen intelligence roamed the house, bent on sowing chaos.
Of all the bells, Betsy suffered the most. She was awakened at night by her hair being yanked hard enough to pull her from sleep. Invisible hands slapped her cheeks, leaving red prints. When she walked outside by day, she heard harsh whispers at her ear, telling her she would know [00:05:00] no peace. Exhausted, she became withdrawn, her once bright spirit dulled by a ceaseless fear.
Rumors spread that Betsy's torment was the worst evidence of the haunting. Neighbors who dared spend the night in the Bell household often witnessed her blankets ripped from the bed, or watched her clutch her bruised arms in distress. As these accounts circulated through the community, people began referring to the presence as the Bell Witch, though no one was certain if it truly was a witch's spirit or something else altogether.
In the tightly knit town of Adams, word of the strange happenings at the Bell Farm soon reached every ear. Some neighbors offered sympathy, believing wholeheartedly that the family was besieged by an evil force. Others expressed skepticism, guessing there must be a logical trick behind it all. John Bell, ordinarily a private man, found himself hosting visitors eager to witness the so called witch in action.
[00:06:00] These visitors gathered by the parlor fireplace or stood in darkened hallways, waiting in tense silence. Occasionally, the presence did not appear, and the disappointed guests left unconvinced. More often, they heard knocks vibrating through the walls or faint moans drifting between rooms. One man, reading aloud from the Bible, found his words drowned out by a rasping voice that repeated the verses back at him in a warped, sing song tone.
Each new account that left the bell farm seemed to confirm the unearthly intelligence behind the torment. It was no longer mere noises or poltergeist pranks. This was something with a will and a voice. Something that could think and speak on its own. Months of sleepless nights wore down the Bell family.
John's demeanor changed. The weight of the haunting pressed on him. Lucy, steadfast in her devotion, prayed constantly for deliverance. The [00:07:00] older Bell children, seeing Betsy attacked so frequently, tried to shield her but were powerless against an enemy that slipped through walls. Farming tasks were delayed or neglected as the family's time and energy funneled into coping with an unseen assailant.
John Bell began experiencing health problems that no local healer could explain. Trembling hands, difficulty swallowing, and fits of dizziness. Whether these ailments arose from stress or something darker, they only reinforced his sense of dread. The voice took to mocking him personally, calling him by name and snickering at his deteriorating condition.
At times, he woke to find himself pinned in bed, unable to move or call out. Despite it all, Lucy held the family together. Soft spoken and gentle, she soothed Betsy's tears and administered whatever remedies she could to John. Yet the unrelenting barrage of knocks, whispers, and violence within her own home tested her faith [00:08:00] daily.
Amid the chaos, Betsy clung to one source of joy, her engagement to Joshua Gardner, a kind young man from the area. They hoped to marry and begin their own life, perhaps on a parcel of the Bell Land or a new farmstead nearby. But whenever Joshua visited the Bell Home, The unseen spirit raged. Stones rattled against the walls, and the door slammed as if in warning.
During quiet walks by the river, Betsy heard the voice hiss in her ear, threatening dire outcomes if she ever were to wed Joshua. Night after night, Betsy lay awake, her tears soaked onto her pillow as she wrestled with the choice between her beloved fiancé and this formidable, invisible foe. She confided in Lucy, who offered comfort but had no solution.
For a while, Betsy and Joshua resolved to stand firm, but the spirit's fury only escalated. Believing she had no alternative, Betsy broke off the engagement. Some thought the family's [00:09:00] torment would subside if the witches demands were met. In a cruel sense, it seemed to succeed. With Betsy's engagement ended, the spirit appeared slightly less focused on her.
By now, the Bell Witch was no longer a mere local curiosity. Word of the haunting spread across the region and reached the ears of Andrew Jackson, then a prominent figure who would later become president. Intrigued, or perhaps skeptical, he traveled to Adams with a party of men to witness the phenomenon firsthand.
According to popular account, the men found their wagon inexplicably stuck on the road near the Bell property, refusing to move until a disembodied voice commanded them to proceed. That night, Jackson's men sat in the Bell parlor, determined to uncover fraud if it existed. Instead, they found themselves subjected to jeering laughter and unexpected slaps.
One boasted of carrying a special bullet that could kill any spirit, only to be chased from the house in terror. [00:10:00] By morning, Jackson reputedly left, shaken. Although details vary among storytellers, the essence of his experience only fueled the legend's fire. Some in Adams took to calling the presence Kate, suspecting it might be the spirit of a neighbor named Kate Batts.
Rumors pointed to an old feud or land dispute between Kate Batts and John Bell. Whether any of that was true, or Kate Batts was simply an unfortunate scapegoat remains unclear. The entity itself, at times, answered to Kate when addressed, while at other times denying any such name. It was a puzzle of contradictions, claiming multiple identities.
A wayward spirit, a demon, or a lost soul wandering in malice. No single explanation satisfied everyone in the community. With Betsy's engagement to Joshua broken, the witch devoted increasing attention to John Bell. His health declined rapidly in 1820, marked by spells of near [00:11:00] paralysis and unremitting pain.
Lucy tended to him day and night. Their children worried and exhausted, watched as their patriarch grew weaker, his once strong presence withering under an unseen hand. In December of that year, John Bell was found unconscious in his bed. A small vial of dark liquid stood nearby. No one recognized its contents.
One of his sons put a single drop on the tongue of the family cat, which died instantly. Almost immediately, the voice shrieked in triumph, boasting that it had given John a final, fatal dose. That same day, John Bell passed away without regaining consciousness, leaving his family both grief stricken and horrified by the witch's brazen gloating.
The funeral drew a large gathering. Many came to mourn the respected farmer. Others arrived to see whether the witch would appear in some dreadful form. As pallbearers lowered John Bell's coffin, A jeering laughter rippled across the [00:12:00] mourners, prompting many to look wildly around for the source. Then, as told in countless retellings, the voice broke into a rude, mocking song, echoing among the gravestones and sending shudders through the crowd.
In the wake of John Bell's death, life on the farm settled into an uneasy quiet. Betsy noticed fewer night time assaults. And the daily havoc lessened. People whispered that the witch finally achieved its purpose by taking John Bell's life. Then, just as suddenly as it had arrived, the witch declared it would leave the family, though it promised to return in seven years.
After a brief period of stillness, the witch's threat rang true. Around 1828, a few of the Bells claimed to hear light tapping or distant murmurs echoing in empty rooms. However, these new incidents were mild and short lived compared to the previous years of torment. Soon enough, even these faded, leaving the bells [00:13:00] with haunted memories, but relative peace.
Near the bell property stood a modest cave by the Red River, a spot often tied to the legend. Over time, people theorized that cave's dark recesses, though the bells themselves rarely ventured inside. Later visitors and locals would tell of odd voices whispering in the cave or strange lights gliding across the damp stone.
Most likely, these stories were born of the haunting's lingering aura. Yet, they continued to fuel the notion that the witch could still roam beyond the farm, hidden beneath the earth. Long after the bells had ceased to hear the witch's voice, the story lived on. Word traveled to neighboring towns, then farther, into newspapers and traveler anecdotes.
The tale of the Tennessee family plagued by a fiendish, talkative spirit captured the imagination. Some insisted the Bell Witch was a cautionary omen of what happens when old feuds and injustices are left [00:14:00] unresolved. Others believed it was a rare glimpse of a diabolical power unleashed for reasons still unknown.
Here in Adams, people repeated the story around hearths and campfires. Children were warned not to wander too far near the old bell farm after dark. When neighbors passed by at night, they might hear a faint rustle in the bush or catch a flicker of light among the trees, prompting them to walk faster.
Hearts pounding, minds remembering how once a family had suffered greatly at the hands of an unseen force. Naturally, not everyone agreed on what transpired at the Bell farm. Some maintained it was all too real, a case of a vengeful spirit or malignant presence carrying out a personal vendetta. Others whispered that perhaps a member of the Bell family had orchestrated the phenomenon with cunning trickery, though that failed to explain the bruises on Betsy, the widespread witnesses, or John's mysterious death.
Still, others pointed to the possibility of an [00:15:00] unsettled spirit who had attached itself to the land for reasons lost to time. What none could deny was the tangible suffering inflicted on the Bells. John Bell's slow decline and Betsy's bruises were impossible to ignore. Multiple guests, neighbors, acquaintances, even travelers testified to hearing the same eerie voice that threatened, teased and recited scripture.
In an age when the supernatural was both feared and accepted, the Bell Witch story captured hearts and sparked endless speculation. After John Bell's death, the family held onto the farm for several years. Betsy, robbed of her engagement to Joshua, eventually found a calmer path through life, though the memory of her tormented youth never fully left her.
Lucy, steadfast and devout to the end, kept her household as best as she could, unwilling to surrender her faith even after all she had witnessed. Over time, the children married and started families of their own, [00:16:00] quietly distancing themselves from the tragedy that had defined their upbringing.
Generations passed, the farm changed hands, the Bell House was repurposed and renovated, and Adams itself transformed slowly from a frontier settlement into a more established community. Yet the name Bellwitch continued to slip into conversation whenever strange knocks were heard late at night or lonely travelers glimpsed inexplicable lights in the distance.
The story refused to fade, woven into the identity of the land itself. Even as the first hand witnesses to the haunting aged and died, their accounts survived in letters, diaries, and recollections passed down among locals. Visitors to Adams would hear about the famed Bell Witch, about the dreadful death of John Bell, the heartbreak of Betsy's broken engagement, and the brazen voice that filled nights with fear.
Some folks approached the story with reverence, others with skepticism. But no one [00:17:00] denied that it shaped the character of the town. In the hush of a moonlit evening, one might stand on that old farmland, fields once tilled by John Bell's callous hands, now peaceful beneath the Tennessee sky. And imagine the entire family huddled in the house, listening with terrified hearts for the next knock on the wall.
It's said that if you pause long enough, you might sense a faint echo of their dread, carried on a stray breath of wind. The Bell Witch remains a singular chapter in American folklore, a tale of a family besieged by something unseen, lethal, and uncannily aware. However one interprets the events, whether as vengeful ghosts, demonic presence, or some other unexplainable force, the Bell Witch.
Its resonance lies in the very human drama at its core. Here was a father undone by circumstances he could not control. A daughter tormented in her own home, in a close knit household tested by relentless fear. [00:18:00] In the end, the Bell Witch story offers a lesson in how thin the line between our daily certainties and the mysteries that defy them.
When night falls, and the wind rattles the shutters in a silent house, we remember John Bell and his family, who discovered that the safe haven of home can become a battlefield against forces beyond mortal comprehension. I'm Russ Chamberlain, and you've been listening to Midnight Signals. May this account of the Bell Witch linger with you as a reminder that in the deepest stillness of the night, Anything seems possible.
Even the unseen tapping of a force that seeks to make itself known. Sleep well, if you dare.
-
@ 5725c4a8:6ba4f820
2025-03-01 23:41:24!(image)[https://i.nostr.build/iuWXGIaA91wMTFJg.jpg] I've been seeing some posts from (I think new) Bitcoiners complaining about the recent volatility of Bitcoin, sometimes in dismay about the price, and sometimes in dismay that they have no "dry powder" available to buy the dip. With inflation being such a huge problem, cost of living has a very real effect on our ability to stack sats, so some creative thinking is in order. My hope is that this post can share a little bit of wisdom that I have found to work for me in my own quest to accumulate as much Bitcoin as I can. If you want to skip to the meat of this article, scroll down My Strategy. As the standard disclosure goes: this is not financial or investment advice.
A little about me and where I'm coming from
I'm part of the 2022 class of Bitcoiners. I'm very new to this community.But I have gone down the Bitcoin rabbit hole, I have read Saifdean's The Bitcoin Standard and The Fiat Standard, and I have spent many many hundreds of hours listening to podcasts on Bitcoin and Austrian economics (which I discovered at about the same time). All this to say, despite the work that I have put in thus far, take this with a grain of salt and use your own reasoning to determine if this strategy or any ideas derived from it are right for you.
Dollar Cost Averaging
Dollar Cost Averaging (DCA) is the practice of setting a recurring buy order of a stock or commodity. Such orders, once set, will continue to execute at the set frequency until the buyer's selected termination date, or until a set amount has been reached, or until no more funds are available in the buyer's account from which to buy. DCA takes advantage of the fact that for a long term growth asset (like Bitcoin), the average price will always tend to go up over time despite intermittent volatility. By not trying watch for or time the dips and highs, DCAing not only makes it easier to accumulate Bitcoin, but it is very effective in the long term and reduces a lot of potential stress from trying to game the market volatility. One more important point is that as this method utilizes averaging, the closer that the buyer can match the actual price curve over time, the greater the benefit from the average growth of that price curve. This means that for two recurring buy orders, using the same amount of fiat in the buying pool, if one has more frequent buys and the other has less frequent buys, even if they spent the same amount at the end of the buying period, the order with more frequent buys will experience the greater value from the average growth of the asset being purchased.
This is in contrast to limit orders, in which they buyer attempts to gauge what price action will occur in the future, or "smash buying" in which the buyer tries to watch and time the market to place real-time orders. As these are not the focus of this strategy, I won't go into detail about them. But if you understand DCA and why it works, I assume that you can also reason for yourself about the effectiveness and utility of these other buying methods.
Each of these methods can occasionally be successful, I'm not saying that there is not place for them. In fact, I use these too, but they are used in a tactical manner, and I try to be careful to make sure that using these do not interrupt my DCA strategy.
Savings Allocation
I may update this in the future, based on changes in my financial situation, the larger landscape, and whatproducts/tools are available. Note that I'm not rich. I work for a tech startup which is gaining traction, and if it is successful then that may change. But for now I operate with limited financial resources to use for stacking sats. But still, I stack sats. I say this to clarify why this strategy works for me, and hopefully to establish that this will work for you if you also have limited income but have the ability and desire to accumulate Bitcoin for yourself.
I have a consistent amount of money coming in on a regular basis, and this is an important part of my calculus. Similarly, I have consistent bills going out. The difference between these are my subsistence and discretionary spending. Subsistence spending being money that I spend on food and other nutrients, and discretionary spending is what I spend on the things that I want but don't need.
I'm not at a point where I've managed to completely cut out my discretionary spending, but I do try to limit it as much as I can. Similarly, I'm proactive about finding good deals on food (especially beef). Then I can allocate more money to savings. It is this savings allocation that I use for buying Bitcoin.
My DCA Strategy
!(image)[https://i.nostr.build/augZsY8EVEAsdP34.png] My strategy begins with the money from each pay check that I want to allocate to savings (which in my case all goes to buying Bitcoin). It also hinges on DCA, and is strongly inspired by the sayings "stay humble and stack sats", and that "time in the market beats timing the market". I am not a professional trader, nor do I aspire to be one. As such, I want to maximize my time in the market without stressing myself out.
Allocating funds for DCA: First, find the amount for each pay period that you will use to buy Bitcoin, but don't immediately use it to buy, yet. Next, you need to find the frequency by which you will buy, and how much. I recommend the most frequent recurring buy option that you can find.
To do this, you need to find the DCA options available on the exchanges that you use. As a Bitcoin maximalist, I use Bitcoin focused exchanges. As a man with limited available funds for this use, I want the ability to DCA in fairly small amounts, but as frequently as possible. I find that River and Strike are excellent exchanges for this. Each of these exchanges currently allow buying as frequently as once-per-hour. River has a minimum of $1 per purchase. Strike can go even lower, I have a friend who I convinced to adopt this strategy and he started out with an hourly recurring buy of $0.05 per hour.
Having been a Bitcoiner for a little while now, I also find that it is useful to have additional funds set aside for "smash buys" to take advantage of major dips, such as the one that we are currently experiencing (I'm writing this on March 1st, 2025).
Using River as an example: The minimal buy on River, as stated above, is $1 per hour. There are 24 hours in a day, and 14 days in a pay period (for me). Then the minimum amount to allocate on River is $1/hour x 24 hours/day x 14 days/period = $336 per period.
You can change the dollar amount or number of days as are appropriate for your own goals and circumstances.
If you have a lower total available amount, you can use this version of the formula to find the recurring buy amount on Strike (or whichever other platform allows sub-dollar recurring buys): Recurring Buy = (available funds) / (number of hours over which to buy)
In truth, I use Strike as well, but I have another reason for choosing River in this example: I mentioned having a DCA strategy which keeps a reserve of "dry powder" so that you can also buy the dip.
You may benefit from keeping some reserve of savings in USD. It's something we simply can't get away from at this time of continued fiat dominance. This allows you to pull from the fiat reserve rather than selling any accumulated Bitcoin in cases of emergency (like car problems, or a family member needing help).
Last year, River announced a feature by which any cash kept on their exchange would earn 3.8% interest, which is paid in Bitcoin. This strategy works with other exchanges, but using River means that interest accumulation can also be leveraged (and it is much better than a typical bank savings account).
This is the final part of the strategy: put the rest of your savings into River and let it accumulate interest in Bitcoin. This reserve then becomes your dry powder. Use it at your discretion, save for emergencies, or use it to "smash buy" the dip, but do it without compromising your DCA setup. DON'T CANCEL your DCA, keep it going and take advantage of it's average growth. You don't know when the price will dip, and you don't know when it will go back up again. If it is difficult for you to maintain discipline and not spend your DCA reserve (since River doesn't split it into buckets for you), a variation of this strategy is to DCA-stack on another exchange so that it's not in the same pool as your fiat reserve.
When all else fails, just keep calm, stay humble, and stack sats. !(image)[https://i.nostr.build/pko6uWkq3rf0y0io.png]
I hope that someone finds this helpful. If you have your own personalized strategy, I'd love to hear about it in the comments.
-
@ ee11a5df:b76c4e49
2024-09-11 08:16:37Bye-Bye Reply Guy
There is a camp of nostr developers that believe spam filtering needs to be done by relays. Or at the very least by DVMs. I concur. In this way, once you configure what you want to see, it applies to all nostr clients.
But we are not there yet.
In the mean time we have ReplyGuy, and gossip needed some changes to deal with it.
Strategies in Short
- WEB OF TRUST: Only accept events from people you follow, or people they follow - this avoids new people entirely until somebody else that you follow friends them first, which is too restrictive for some people.
- TRUSTED RELAYS: Allow every post from relays that you trust to do good spam filtering.
- REJECT FRESH PUBKEYS: Only accept events from people you have seen before - this allows you to find new people, but you will miss their very first post (their second post must count as someone you have seen before, even if you discarded the first post)
- PATTERN MATCHING: Scan for known spam phrases and words and block those events, either on content or metadata or both or more.
- TIE-IN TO EXTERNAL SYSTEMS: Require a valid NIP-05, or other nostr event binding their identity to some external identity
- PROOF OF WORK: Require a minimum proof-of-work
All of these strategies are useful, but they have to be combined properly.
filter.rhai
Gossip loads a file called "filter.rhai" in your gossip directory if it exists. It must be a Rhai language script that meets certain requirements (see the example in the gossip source code directory). Then it applies it to filter spam.
This spam filtering code is being updated currently. It is not even on unstable yet, but it will be there probably tomorrow sometime. Then to master. Eventually to a release.
Here is an example using all of the techniques listed above:
```rhai // This is a sample spam filtering script for the gossip nostr // client. The language is called Rhai, details are at: // https://rhai.rs/book/ // // For gossip to find your spam filtering script, put it in // your gossip profile directory. See // https://docs.rs/dirs/latest/dirs/fn.data_dir.html // to find the base directory. A subdirectory "gossip" is your // gossip data directory which for most people is their profile // directory too. (Note: if you use a GOSSIP_PROFILE, you'll // need to put it one directory deeper into that profile // directory). // // This filter is used to filter out and refuse to process // incoming events as they flow in from relays, and also to // filter which events get/ displayed in certain circumstances. // It is only run on feed-displayable event kinds, and only by // authors you are not following. In case of error, nothing is // filtered. // // You must define a function called 'filter' which returns one // of these constant values: // DENY (the event is filtered out) // ALLOW (the event is allowed through) // MUTE (the event is filtered out, and the author is // automatically muted) // // Your script will be provided the following global variables: // 'caller' - a string that is one of "Process", // "Thread", "Inbox" or "Global" indicating // which part of the code is running your // script // 'content' - the event content as a string // 'id' - the event ID, as a hex string // 'kind' - the event kind as an integer // 'muted' - if the author is in your mute list // 'name' - if we have it, the name of the author // (or your petname), else an empty string // 'nip05valid' - whether nip05 is valid for the author, // as a boolean // 'pow' - the Proof of Work on the event // 'pubkey' - the event author public key, as a hex // string // 'seconds_known' - the number of seconds that the author // of the event has been known to gossip // 'spamsafe' - true only if the event came in from a // relay marked as SpamSafe during Process // (even if the global setting for SpamSafe // is off)
fn filter() {
// Show spam on global // (global events are ephemeral; these won't grow the // database) if caller=="Global" { return ALLOW; } // Block ReplyGuy if name.contains("ReplyGuy") || name.contains("ReplyGal") { return DENY; } // Block known DM spam // (giftwraps are unwrapped before the content is passed to // this script) if content.to_lower().contains( "Mr. Gift and Mrs. Wrap under the tree, KISSING!" ) { return DENY; } // Reject events from new pubkeys, unless they have a high // PoW or we somehow already have a nip05valid for them // // If this turns out to be a legit person, we will start // hearing their events 2 seconds from now, so we will // only miss their very first event. if seconds_known <= 2 && pow < 25 && !nip05valid { return DENY; } // Mute offensive people if content.to_lower().contains(" kike") || content.to_lower().contains("kike ") || content.to_lower().contains(" nigger") || content.to_lower().contains("nigger ") { return MUTE; } // Reject events from muted people // // Gossip already does this internally, and since we are // not Process, this is rather redundant. But this works // as an example. if muted { return DENY; } // Accept if the PoW is large enough if pow >= 25 { return ALLOW; } // Accept if their NIP-05 is valid if nip05valid { return ALLOW; } // Accept if the event came through a spamsafe relay if spamsafe { return ALLOW; } // Reject the rest DENY
} ```
-
@ 3bf0c63f:aefa459d
2024-09-06 12:49:46Nostr: a quick introduction, attempt #2
Nostr doesn't subscribe to any ideals of "free speech" as these belong to the realm of politics and assume a big powerful government that enforces a common ruleupon everybody else.
Nostr instead is much simpler, it simply says that servers are private property and establishes a generalized framework for people to connect to all these servers, creating a true free market in the process. In other words, Nostr is the public road that each market participant can use to build their own store or visit others and use their services.
(Of course a road is never truly public, in normal cases it's ran by the government, in this case it relies upon the previous existence of the internet with all its quirks and chaos plus a hand of government control, but none of that matters for this explanation).
More concretely speaking, Nostr is just a set of definitions of the formats of the data that can be passed between participants and their expected order, i.e. messages between clients (i.e. the program that runs on a user computer) and relays (i.e. the program that runs on a publicly accessible computer, a "server", generally with a domain-name associated) over a type of TCP connection (WebSocket) with cryptographic signatures. This is what is called a "protocol" in this context, and upon that simple base multiple kinds of sub-protocols can be added, like a protocol for "public-square style microblogging", "semi-closed group chat" or, I don't know, "recipe sharing and feedback".
-
@ f33c8a96:5ec6f741
2025-03-01 23:25:22Setting Up Your Code Editor
Introduction
In this lesson, we'll set up the most fundamental tool in your development journey: your code editor. This is where you'll spend most of your time writing, testing, and debugging code, so it's crucial to get comfortable with it from the start.
What is an IDE?
Definition
An IDE (Integrated Development Environment) is a software application that provides comprehensive facilities for software development. Think of it as your complete workshop for writing code.
Key Components
- Code Editor
- Where you write and edit code
- Provides syntax highlighting
- Helps with code formatting
-
Makes code easier to read and write
-
Compiler/Interpreter
- Runs your code
- Translates your code into executable instructions
-
Helps test your applications
-
Debugging Tools
- Help find and fix errors
- Provide error messages and suggestions
- Make problem-solving easier
Setting Up Visual Studio Code
Why VS Code?
- Free and open-source
- Lightweight yet powerful
- Excellent community support
- Popular among developers
- Great for beginners and experts alike
Installation Steps
- Visit code.visualstudio.com
- Download the version for your operating system
- Run the installer
- Follow the installation prompts
Essential VS Code Features
1. Interface Navigation
- File Explorer (Ctrl/Cmd + Shift + E)
- Browse and manage your files
- Create new files and folders
-
Navigate your project structure
-
Search (Ctrl/Cmd + Shift + F)
- Find text across all files
- Replace text globally
-
Search with regular expressions
-
Source Control (Ctrl/Cmd + Shift + G)
- Track changes in your code
- Commit and manage versions
- Integrate with Git
2. Terminal Integration
To open the integrated terminal: - Use
Ctrl + `
(backtick) - Or View → Terminal from the menu - Basic terminal commands:bash ls # List files (dir on Windows) cd # Change directory clear # Clear terminal code . # Open VS Code in current directory
3. Essential Extensions
Install these extensions to enhance your development experience: 1. ESLint - Helps find and fix code problems - Enforces coding standards - Improves code quality
- Prettier
- Automatically formats your code
- Maintains consistent style
-
Saves time on formatting
-
Live Server
- Runs your web pages locally
- Auto-refreshes on save
- Great for web development
Important Keyboard Shortcuts
Ctrl/Cmd + S # Save file Ctrl/Cmd + C # Copy Ctrl/Cmd + V # Paste Ctrl/Cmd + Z # Undo Ctrl/Cmd + Shift + P # Command palette Ctrl/Cmd + P # Quick file open
Writing Your First Code
Let's create and run a simple HTML file:
- Create a new file (
index.html
) - Add basic HTML content:
```html
Hello World!
``` 3. Save the file (Ctrl/Cmd + S) 4. Open in browser or use Live Server
Best Practices
1. File Organization
- Keep related files together
- Use clear, descriptive names
- Create separate folders for different projects
2. Regular Saving
- Save frequently (Ctrl/Cmd + S)
- Watch for the unsaved dot indicator
- Enable auto-save if preferred
3. Terminal Usage
- Get comfortable with basic commands
- Use the integrated terminal
- Practice navigation and file operations
Troubleshooting Common Issues
1. Installation Problems
- Ensure you have admin rights
- Check system requirements
- Use official download sources
2. Extension Issues
- Keep extensions updated
- Disable conflicting extensions
- Restart VS Code after installation
3. Performance
- Don't install too many extensions
- Regular restart of VS Code
- Keep your system updated
Next Steps
- Practice Navigation
- Create and manage files
- Use the integrated terminal
-
Try keyboard shortcuts
-
Customize Your Editor
- Explore themes
- Adjust font size
-
Configure auto-save
-
Prepare for Next Lesson
- Keep VS Code open
- Get comfortable with the interface
- Practice basic operations
Additional Resources
Remember: Your code editor is your primary tool as a developer. Take time to get comfortable with it, and don't worry about mastering everything at once. Focus on the basics we covered in the video, and you'll naturally learn more features as you need them.
Happy coding! 🚀
-
@ f33c8a96:5ec6f741
2025-03-01 23:24:35CSS Fundamentals: Styling Your First Webpage
Introduction
In our previous lesson, we created the structure of our webpage with HTML. Now, we'll learn how to style it using CSS (Cascading Style Sheets). While HTML provides the bones of our webpage, CSS adds the visual presentation - the colors, layouts, spacing, and overall aesthetics.
What is CSS?
Definition
CSS (Cascading Style Sheets) is a stylesheet language that controls the visual presentation of HTML documents. Think of it like the paint, decorations, and interior design of a house - it determines how everything looks and is arranged.
Key Concepts
- Styling Capabilities
- Fonts and typography
- Colors and backgrounds
- Margins and padding
- Element sizes
- Visual effects
-
Layout and positioning
-
Cascading Nature
- Styles can be inherited from parent elements
- Multiple styles can apply to the same element
- Specificity determines which styles take precedence
- Styles "cascade" down through your document
Basic CSS Syntax
css selector { property: value; }
Example:
css h1 { color: blue; font-size: 24px; margin-bottom: 20px; }
Connecting CSS to HTML
Method 1: External Stylesheet (Recommended)
html <link rel="stylesheet" href="style.css">
Method 2: Internal CSS
```html
```
Method 3: Inline CSS (Use Sparingly)
```html
Title
```
The Box Model
Every HTML element is treated as a box in CSS, with:
┌──────────────────────┐ │ Margin │ │ ┌──────────────┐ │ │ │ Border │ │ │ │ ┌──────────┐ │ │ │ │ │ Padding │ │ │ │ │ │ ┌──────┐ │ │ │ │ │ │ │ │ │ │ │ │ │ │ │Content│ │ │ │ │ │ │ │ │ │ │ │ │ │ │ └──────┘ │ │ │ │ │ └──────────┘ │ │ │ └──────────────┘ │ └──────────────────────┘
- Content: The actual content of the element
- Padding: Space between content and border
- Border: The border around the padding
- Margin: Space outside the border
CSS Units
Absolute Units
px
- pixelspt
- pointscm
- centimetersmm
- millimetersin
- inches
Relative Units
%
- percentage relative to parentem
- relative to font-sizerem
- relative to root font-sizevh
- viewport heightvw
- viewport width
Practical Example: Styling Our Webpage
1. Basic Page Setup
css body { min-height: 100vh; margin: 0; font-family: Arial, sans-serif; background-color: #f0f0f0; display: flex; flex-direction: column; }
2. Header Styling
css header { background-color: #333; color: white; padding: 20px; text-align: center; }
3. Main Content Area
css main { max-width: 800px; margin: 0 auto; padding: 20px; flex: 1; }
4. Footer Styling
css footer { background-color: #333; color: white; padding: 10px; text-align: center; }
Layout with Flexbox
Basic Concept
Flexbox is a modern layout system that makes it easier to create flexible, responsive layouts.
Key Properties
css .container { display: flex; flex-direction: row | column; justify-content: center | space-between | space-around; align-items: center | flex-start | flex-end; }
Common Use Cases
- Centering content
- Creating navigation bars
- Building responsive layouts
- Equal-height columns
- Dynamic spacing
Best Practices
1. Organization
- Use consistent naming conventions
- Group related styles together
- Comment your code for clarity
- Keep selectors simple and specific
2. Performance
- Avoid unnecessary specificity
- Use shorthand properties when possible
- Minimize redundant code
- Consider load time impact
3. Maintainability
- Use external stylesheets
- Follow a consistent formatting style
- Break large stylesheets into logical files
- Document important design decisions
Debugging CSS
Common Tools
- Browser Developer Tools
- Element inspector
- Style inspector
- Box model viewer
Common Issues
- Specificity conflicts
- Inheritance problems
- Box model confusion
- Flexbox alignment issues
Exercises
1. Style Modifications
Try modifying these properties in your stylesheet: ```css / Change colors / header { background-color: #4a90e2; }
/ Adjust spacing / main { padding: 40px; }
/ Modify typography / h1 { font-size: 32px; font-weight: bold; } ```
2. Layout Challenge
Create a card layout using Flexbox: ```css .card-container { display: flex; justify-content: space-between; gap: 20px; }
.card { flex: 1; padding: 20px; background: white; border-radius: 8px; box-shadow: 0 2px 4px rgba(0,0,0,0.1); } ```
Additional Resources
Learning Tools
- Flexbox Froggy - Interactive Flexbox learning game
- CSS-Tricks - Excellent CSS reference and tutorials
- MDN CSS Documentation
Practice Projects
- Style your personal webpage
- Create a responsive navigation menu
- Build a flexible card layout
- Design a custom button style
Remember: CSS is both an art and a science. Don't be afraid to experiment and break things - that's how you'll learn the most. The key is to start simple and gradually add complexity as you become more comfortable with the basics.
Next up, we'll dive into JavaScript to add interactivity to our webpage! 🚀
-
@ 0176967e:1e6f471e
2024-07-28 15:31:13Objavte, ako avatari a pseudonymné identity ovplyvňujú riadenie kryptokomunít a decentralizovaných organizácií (DAOs). V tejto prednáške sa zameriame na praktické fungovanie decentralizovaného rozhodovania, vytváranie a správu avatarových profilov, a ich rolu v online reputačných systémoch. Naučíte sa, ako si vytvoriť efektívny pseudonymný profil, zapojiť sa do rôznych krypto projektov a využiť svoje aktivity na zarábanie kryptomien. Preskúmame aj príklady úspešných projektov a stratégie, ktoré vám pomôžu zorientovať sa a uspieť v dynamickom svete decentralizovaných komunít.
-
@ 0176967e:1e6f471e
2024-07-28 09:16:10Jan Kolčák pochádza zo stredného Slovenska a vystupuje pod umeleckým menom Deepologic. Hudbe sa venuje už viac než 10 rokov. Začínal ako DJ, ktorý s obľubou mixoval klubovú hudbu v štýloch deep-tech a afrohouse. Stále ho ťahalo tvoriť vlastnú hudbu, a preto sa začal vzdelávať v oblasti tvorby elektronickej hudby. Nakoniec vydal svoje prvé EP s názvom "Rezonancie". Učenie je pre neho celoživotný proces, a preto sa neustále zdokonaľuje v oblasti zvuku a kompozície, aby jeho skladby boli kvalitné na posluch aj v klube.
V roku 2023 si založil vlastnú značku EarsDeep Records, kde dáva príležitosť začínajúcim producentom. Jeho značku podporujú aj etablované mená slovenskej alternatívnej elektronickej scény. Jeho prioritou je sloboda a neškatulkovanie. Ako sa hovorí v jednej klasickej deephouseovej skladbe: "We are all equal in the house of deep." So slobodou ide ruka v ruke aj láska k novým technológiám, Bitcoinu a schopnosť udržať si v digitálnom svete prehľad, odstup a anonymitu.
V súčasnosti ďalej produkuje vlastnú hudbu, venuje sa DJingu a vedie podcast, kde zverejňuje svoje mixované sety. Na Lunarpunk festivale bude hrať DJ set tvorený vlastnou produkciou, ale aj skladby, ktoré sú blízke jeho srdcu.
Podcast Bandcamp Punk Nostr website alebo nprofile1qythwumn8ghj7un9d3shjtnwdaehgu3wvfskuep0qy88wumn8ghj7mn0wvhxcmmv9uq3xamnwvaz7tmsw4e8qmr9wpskwtn9wvhsz9thwden5te0wfjkccte9ejxzmt4wvhxjme0qyg8wumn8ghj7mn0wd68ytnddakj7qghwaehxw309aex2mrp0yh8qunfd4skctnwv46z7qpqguvns4ld8k2f3sugel055w7eq8zeewq7mp6w2stpnt6j75z60z3swy7h05
-
@ f33c8a96:5ec6f741
2025-03-01 23:23:54JavaScript: Building Your First Interactive Web App
Introduction
In this lesson, we'll bring our web pages to life by adding dynamic functionality with JavaScript. We'll build a real-world application that displays and updates Bitcoin prices in real-time, teaching core JavaScript concepts along the way.
Project Overview: Bitcoin Price Tracker
We'll build a web application that: - Displays current Bitcoin price - Updates automatically every 3 seconds - Allows currency switching - Includes interactive controls - Shows current date/time
Core JavaScript Concepts
1. Variables and Data Types
```javascript // Variables can be declared with let or const let currentCurrency = "USD"; // Can be changed const interval = 3000; // Cannot be changed
// Basic data types const price = 45000; // Number const isVisible = true; // Boolean const currency = "USD"; // String ```
2. DOM Manipulation
```javascript // Getting elements const priceElement = document.getElementById('price'); const button = document.getElementById('refresh-button');
// Modifying content priceElement.textContent =
${price} ${currency}
;// Changing styles priceElement.style.display = 'none'; ```
3. Event Listeners
```javascript // Basic click handler button.addEventListener('click', () => { fetchBitcoinPrice(); });
// Change event for select elements selector.addEventListener('change', (event) => { handleCurrencyChange(event.value); }); ```
4. Async Operations & Fetch API
javascript async function fetchBitcoinPrice() { try { const response = await fetch(apiUrl); const data = await response.json(); updatePrice(data.price); } catch (error) { console.error('Error:', error); } }
Project Structure
HTML Setup
```html
Bitcoin Price Tracker Current Bitcoin Price
The price is:
```
Core Functionality Implementation
- Setting Up the Timer ```javascript // Update price every 3 seconds setInterval(fetchBitcoinPrice, 3000);
// Update date/time every second setInterval(updateDateTime, 1000); ```
-
Currency Selection
javascript function handleCurrencyChange(newCurrency) { currentCurrency = newCurrency; fetchBitcoinPrice(); }
-
Toggle Visibility
javascript function togglePriceVisibility() { const price = document.getElementById('price'); price.style.display = price.style.display === 'none' ? 'inline' : 'none'; }
Best Practices
1. Error Handling
- Always use try/catch with async operations
- Provide meaningful error messages
- Handle edge cases gracefully
2. Code Organization
- Keep functions focused and small
- Use meaningful variable names
- Group related functionality
- Add comments for clarity
3. Performance
- Avoid unnecessary DOM updates
- Use appropriate update intervals
- Clean up intervals when not needed
Common Challenges & Solutions
1. API Issues
javascript // Handle API failures gracefully catch (error) { priceElement.textContent = 'Price unavailable'; console.error('API Error:', error); }
2. Currency Formatting
javascript function formatPrice(price, currency) { return new Intl.NumberFormat('en-US', { style: 'currency', currency: currency }).format(price); }
3. Time Zones
javascript function getLocalTime() { return new Date().toLocaleString(); }
Extending the Project
Consider adding these features for practice: 1. Price change indicators (up/down arrows) 2. Historical price chart 3. Multiple cryptocurrency support 4. Price alerts 5. Local storage for settings
Debugging Tips
Using Console
javascript console.log('Price fetched:', price); console.error('Error occurred:', error); console.table(priceHistory);
Chrome DevTools
- Network tab for API calls
- Console for errors
- Elements for DOM inspection
- Sources for debugging
Additional Resources
- MDN JavaScript Guide
- JavaScript.info
- CoinGecko API Documentation
- Chrome DevTools Documentation
Next Steps
- Add styling with CSS
- Implement additional features
- Learn about React for more complex applications
- Explore other APIs and cryptocurrencies
Remember: The best way to learn is by doing. Don't be afraid to break things and experiment with the code. The developer console is your friend for debugging and understanding what's happening in your application.
Happy coding! 🚀
-
@ 0176967e:1e6f471e
2024-07-27 11:10:06Workshop je zameraný pre všetkých, ktorí sa potýkajú s vysvetľovaním Bitcoinu svojej rodine, kamarátom, partnerom alebo kolegom. Pri námietkach z druhej strany väčšinou ideme do protiútoku a snažíme sa vytiahnuť tie najlepšie argumenty. Na tomto workshope vás naučím nový prístup k zvládaniu námietok a vyskúšate si ho aj v praxi. Know-how je aplikovateľné nie len na komunikáciu Bitcoinu ale aj pre zlepšenie vzťahov, pri výchove detí a celkovo pre lepší osobný život.
-
@ f33c8a96:5ec6f741
2025-03-01 23:23:36Setting Up Git and GitHub: A Developer's Foundation
Lesson Overview
In this lesson, we'll establish one of the most important foundations of your development journey: version control with Git and GitHub. This knowledge will enable you to track your code, back it up in the cloud, and start building your developer portfolio.
Prerequisites
- Visual Studio Code installed
- Terminal/Command Line basics
- GitHub account (we'll create one in this lesson)
Key Learning Objectives
- Understand what Git and GitHub are and why they're essential
- Set up Git locally and connect it to GitHub
- Learn basic Git commands and workflow
- Create your first repository and commit
- Establish good Git habits for your developer journey
What is Git and GitHub?
Git: Your Local Version Control
- A version control system that tracks code changes over time
- Prevents accidental overwrites of your work
- Enables multiple developers to work on the same project safely
- Runs locally on your machine
GitHub: Your Code in the Cloud
- A web-based platform that extends Git
- Cloud storage for your code repositories
- Enables code sharing and collaboration
- Includes features like:
- Issue tracking
- Pull requests
- Project management tools
- Code review capabilities
Why Use GitHub?
1. Portfolio Building
- Acts as your "proof of work" as a developer
- Shows your coding activity through contribution graphs
- Demonstrates your consistency and dedication
- Serves as a public showcase of your projects
2. Collaboration and Learning
- Access millions of open-source projects
- Learn from other developers' code
- Contribute to real-world projects
- Get feedback on your code
- Work effectively in teams
3. Code Safety and Access
- All your code is safely stored in the cloud
- Access your projects from anywhere
- Never lose your work due to computer issues
Essential GitHub Terminology
| Term | Definition | |------|------------| | Repository (Repo) | A folder containing your project files and version history | | Commit | A saved change or addition to your code | | Staging | Marking changes to be included in your next commit | | Push | Sending your local commits to GitHub | | Branch | A separate version of your code for new features or experiments | | Pull Request (PR) | A request to merge changes from one branch to another | | Clone | Creating a local copy of a remote repository | | Fork | Creating your own copy of someone else's repository |
Hands-on Practice
Setting Up Git
- Install Git from https://git-scm.com/downloads
- Configure your identity:
bash git config --global user.name "Your Name" git config --global user.email "your.email@example.com"
Your First Repository
- Create a new repository on GitHub named "hello-world"
- Initialize Git locally:
bash git init git add . git commit -m "My first commit" git remote add origin <your-repository-url> git push -u origin main
Basic Git Workflow Quick Reference
Pushing Code to GitHub
```bash
1. Stage your changes
git add .
2. Commit your changes with a message
git commit -m "Describe your changes here"
3. Push to GitHub
git push ```
Getting Code from GitHub
```bash
If you already have the repository locally:
git pull
If you need to download a repository:
git clone https://github.com/username/repository.git ```
Building Good Habits
Daily Git Practice
- Make it a goal to push code every day
- Even small changes count
- Use your GitHub contribution graph as motivation
- Track your progress over time
Best Practices
- Commit often with clear messages
- Pull before you start working
- Push your changes when you finish
- Keep each project in its own repository
- Include README files to explain your projects
Common Issues and Solutions
"No upstream branch" Error
If you see this error when pushing:
bash git push --set-upstream origin main
Changes Not Showing Up
- Check if changes are staged:
bash git status
- Make sure you've committed:
bash git commit -m "Your message"
- Verify you've pushed:
bash git push
Exercise: Start Your Journey
- Create your GitHub account if you haven't already
- Set up Git locally using the commands we covered
- Create your first repository named "hello-world"
- Make your first commit
- Push your code to GitHub
- Make a habit of pushing code daily
Additional Resources
- GitHub Documentation
- Git Documentation
- Practice with GitHub Learning Lab
Next Steps
- Start tracking all your code projects with Git
- Begin building your portfolio on GitHub
- Join the open-source community
- Collaborate with other developers
Remember: Every developer started where you are now. The key is consistency and persistence. Make pushing code to GitHub a daily habit, and you'll be amazed at your progress over time.
Happy coding! 🚀
-
@ 0176967e:1e6f471e
2024-07-26 17:45:08Ak ste v Bitcoine už nejaký ten rok, možno máte pocit, že už všetkému rozumiete a že vás nič neprekvapí. Viete čo je to peňaženka, čo je to seed a čo adresa, možno dokonca aj čo je to sha256. Ste si istí? Táto prednáška sa vám to pokúsi vyvrátiť. 🙂
-
@ 0176967e:1e6f471e
2024-07-26 12:15:35Bojovať s rakovinou metabolickou metódou znamená použiť metabolizmus tela proti rakovine. Riadenie cukru a ketónov v krvi stravou a pohybom, časovanie rôznych typov cvičení, včasná kombinácia klasickej onko-liečby a hladovania. Ktoré vitamíny a suplementy prijímam a ktorým sa napríklad vyhýbam dajúc na rady mojej dietologičky z USA Miriam (ktorá sa špecializuje na rakovinu).
Hovori sa, že čo nemeriame, neriadime ... Ja som meral, veľa a dlho ... aj grafy budú ... aj sranda bude, hádam ... 😉
-
@ f33c8a96:5ec6f741
2025-03-01 23:23:04What is HTML?
HTML (HyperText Markup Language) is the foundation of all webpages. Think of it as the framing of a house - it provides the basic structure that everything else builds upon.
Key Concepts
- HTML is a markup language, not a programming language
- It tells browsers how to structure web content
- Every HTML element is like a building block
- Browsers interpret HTML to display content
The Building Analogy
When building a webpage, think of it like constructing a house: - HTML: The framing and structure (walls, rooms, layout) - CSS: The design elements (paint, decorations, styling) - JavaScript: The functionality (plumbing, electrical, moving parts)
Basic HTML Structure
1. HTML Boilerplate
Every webpage starts with a basic template:
```html
Your Page Title ```
2. Understanding the Parts
<!DOCTYPE html>
: Tells browsers this is an HTML5 document<html>
: The root element of the page<head>
: Contains metadata about the document<body>
: Contains the visible content
Essential HTML Elements
1. Headings
HTML has six levels of headings: ```html
Main Title
Subtitle
Section Header
Smallest Heading
```
2. Paragraphs
```html
This is a paragraph of text. It can contain as much text as you need.
```
3. Images
html <img src="path-to-image.jpg" alt="Description of image" width="300">
4. Links
html <a href="https://example.com">Click here</a>
HTML Attributes
Attributes provide additional information or modify HTML elements:
html <tag attribute="value">Content</tag>
Common attributes: -
src
: Source path for images -href
: Destination for links -alt
: Alternative text for images -class
: CSS class names -id
: Unique identifier -style
: Inline CSS stylesSemantic HTML
What is Semantic HTML?
Semantic HTML uses meaningful tags that describe their content's purpose. This improves: - Accessibility - SEO (Search Engine Optimization) - Code readability - Maintainability
Common Semantic Elements
```html
```
Non-Semantic vs Semantic Example
Instead of: ```html
```
Use: ```html
```
Building Your First Webpage
1. Basic Structure
```html
My First Webpage Welcome to My First Webpage!
About Me
Hi, I'm learning web development with PlebDevs!
My Interests
I'm interested in Bitcoin, programming, and building cool stuff!
```
Best Practices
1. Structure
- Use proper indentation
- Keep code organized and readable
- Use semantic elements when possible
- Include all required elements (
DOCTYPE
,html
,head
,body
)
2. Content
- Use appropriate heading levels (start with
h1
) - Write descriptive
alt
text for images - Keep content meaningful and organized
- Use comments to explain complex sections
3. Accessibility
- Use semantic HTML elements
- Provide alternative text for images
- Maintain a logical heading structure
- Ensure content makes sense when read linearly
Common Issues and Solutions
Problem: Images Not Loading
```html
```
Problem: Links Not Working
```html
Click here ```
Next Steps
- Practice Building
- Create a personal webpage about yourself
- Include different types of content (text, images, links)
-
Use semantic HTML elements
-
Experiment with Structure
- Try different layouts
- Use various HTML elements
-
Pay attention to semantic meaning
-
Prepare for CSS
- Think about how you want your page to look
- Consider what styles you'll want to add
- Plan your layout structure
Exercise: Create Your Profile Page
Try creating a simple profile page using what you've learned:
- Use the HTML boilerplate
- Add a header with your name
- Include an "About Me" section
- Add a photo (if you want)
- List your interests or goals
- Add a footer with contact information
Remember to: - Use semantic HTML - Include appropriate headings - Add descriptive alt text for images - Keep your code clean and well-organized
Additional Resources
Remember: HTML is the foundation of web development. Take time to understand these basics well, as they'll serve as the building blocks for everything else you'll learn. Happy coding! 🚀
-
@ 0176967e:1e6f471e
2024-07-26 09:50:53Predikčné trhy predstavujú praktický spôsob, ako môžeme nahliadnuť do budúcnosti bez nutnosti spoliehať sa na tradičné, často nepresné metódy, ako je veštenie z kávových zrniek. V prezentácii sa ponoríme do histórie a vývoja predikčných trhov, a popíšeme aký vplyv mali a majú na dostupnosť a kvalitu informácií pre širokú verejnosť, a ako menia trh s týmito informáciami. Pozrieme sa aj na to, ako tieto trhy umožňujú obyčajným ľuďom prístup k spoľahlivým predpovediam a ako môžu prispieť k lepšiemu rozhodovaniu v rôznych oblastiach života.
-
@ f33c8a96:5ec6f741
2025-03-01 23:21:44Welcome to PlebDevs Starter Course
Course Mission
Welcome to the PlebDevs starter course! I'm Austin, the founder of PlebDevs, and I'll be walking you through this short intro starter course that will get you up and running and interacting with the rest of the content on the platform. If you're here, I'm assuming you're new to coding or just starting out. If you already have experience and have your bearings down, there's lots more intermediate and advanced content on the platform. This course is designed for absolute beginners.
Course Goals
Overall PlebDevs Goals
- Learn how to code
- Build Bitcoin/Lightning/Nostr apps
- Become a developer
This is a big journey with a lot of pieces and things to learn. The starter course is going to get you on that path as quickly as possible and make it a smooth journey.
Starter Course Objectives
- Give you an easy, high-level overview of the dev journey
- Get you set up and comfortable in a development environment where you'll write and ship code
- Give you basic experience in the languages covered in our courses and workshops
There's lots of material out there that will just tell you exactly what to do and not explain why but I want you to actually understand for yourself. I want you to have a good mental model of what this journey is going to be like, what it's going to be like actually writing and pushing code. And then we're going to start getting our hands dirty and gain real experience.
What is a PlebDev?
Origins and Philosophy
I started using the term "PlebDev" a few years ago to describe a unique approach to learning development in the Bitcoin space. It represents:
- Inclusive Learning: Anyone can become a developer, regardless of background
- Growth Mindset: Embracing the journey from beginner to professional
- Practical Focus: Emphasizing real-world application development
- Community Support: Learning and growing together
Key Characteristics
- 🌱 Growth-Focused: PlebDevs are always learning and improving
- 🎯 App-Centric: Focus on building applications rather than protocol development
- 🆕 Embrace Being New: Being a new developer is infinitely better than being on the sidelines
- 🤝 Community-Driven: Bitcoin/Lightning/Nostr ecosystem needs more plebdevs like you!
Our Learning Approach
Core Principles
- Lower Barriers
- Simplify complex concepts
- Focus on practical understanding
-
Build confidence through action
-
Project-Based Learning
- Learn by doing
- Create real applications
-
Build a portfolio as you learn
-
MVP (Minimum Viable Product) Focus
- Start with core functionality
- Get things working first
-
Iterate and improve
-
Actionable Knowledge
- Focus on the 20% that delivers 80% of results
- Learn what you can use right away
- Build practical skills
Teaching Methods
- Detailed concept breakdowns
- Line-by-line code explanations
- Interactive learning
- 1:1 support available
- Community-driven progress
Course Structure
The Learning Path
Instead of the traditional bottom-up approach, we use a project-focused method:
🏔️ Advanced Skills 🏔️ Projects & Practice 🏔️ Core Concepts 🏔️ Development Environment 🏔️ Getting Started
We'll create checkpoints through projects, allowing you to: - Verify your understanding - Build your portfolio - See real progress - Have reference points for review
Student Expectations
What We Expect From You
- High Agency: Take ownership of your learning journey
- Active Participation: Engage with the material and community
- Persistence: Push through challenges
- Curiosity: Ask questions and explore concepts
What You Can Expect From Us
- Clear, practical instruction
- Comprehensive support
- Real-world applications
- Community backing
Getting Started
Next Steps
- Ensure you're ready to commit to learning
- Set up your development environment (next lesson)
- Join our community
- Start building!
Resources and Support
Where to Get Help
- plebdevs.com
Tips for Success
- Push code daily, even if it is small.
- Focus on understanding rather than memorizing.
- Build projects that interest you.
- Engage with the community.
- Don't be afraid to ask questions.
Remember
You don't need to become a "10x developer" overnight. The goal is to start writing code, build useful things, and gradually improve. Every expert was once a beginner, and the journey of a thousand miles begins with a single line of code.
Ready to begin? Let's dive into the next lesson where we'll set up your development environment! 🚀
-
@ 6260f29f:2ee2fcd4
2025-03-01 22:48:31PlebDevs ⚡️
A one-of-a-kind developer education, content, and community platform built on Nostr and fully Lightning integrated.
https://plebdevs.comOverview
PlebDevs is an open-source platform that combines educational content, community interaction, and Bitcoin/Lightning integration. The platform publishes content to Nostr and actively pulls from Nostr relays, creating a distributed, interoperable trail of Documents, Videos, and Courses.
Technical Implementation
Nostr Integration
- Content Distribution: Implements NIP-23 for rich multimedia content embedding
- Content Encryption: Paid content bodies are encrypted while maintaining metadata visibility
- Authentication:
- Multi-method signup (NIP-07, Email, GitHub, Anonymous)
- Ephemeral keypair generation for non-Nostr users
- Account linking and recovery system
- Lists & Courses: NIP-51 implementation for structured content organization
- Monetization: NIP-99 for digital content sales
- Automated Subscriptions: NIP-47 (Nostr Wallet Connect) for recurring payments
- Badge System: NIP-58 for automated achievement rewards
- Identity: NIP-05 for custom platform identities
- Additional NIPs: Implements NIP-01, NIP-19, NIP-39, NIP-57
Platform Architecture
- Content Management:
- Draft system with preview capabilities
- Parameterized replaceable events
- Multi-format support (Markdown, Video, Mixed Media)
- Course builder with drag-and-drop ordering
- User Management:
- Profile synchronization with Nostr
- Activity tracking and progress monitoring
- Custom relay configuration
- Wallet connection management
- Admin Features:
- Protected admin routes based on pubkey configuration
- Content creation and management interface
- Draft/publish workflow
- Course assembly tools
-
@ 0176967e:1e6f471e
2024-07-25 20:53:07AI hype vnímame asi všetci okolo nás — už takmer každá appka ponúka nejakú “AI fíčuru”, AI startupy raisujú stovky miliónov a Európa ako obvykle pracuje na regulovaní a našej ochrane pred nebezpečím umelej inteligencie. Pomaly sa ale ukazuje “ovocie” spojenia umelej inteligencie a človeka, kedy mnohí ľudia reportujú signifikantné zvýšenie produktivity v práci ako aj kreatívnych aktivitách (aj napriek tomu, že mnohí hardcore kreatívci by každého pri spomenutí skratky “AI” najradšej upálili). V prvej polovici prednášky sa pozrieme na to, akými rôznymi spôsobmi nám vie byť AI nápomocná, či už v práci alebo osobnom živote.
Umelé neuróny nám už vyskakujú pomaly aj z ovsených vločiek, no to ako sa k nám dostávajú sa veľmi líši. Hlavne v tom, či ich poskytujú firmy v zatvorených alebo open-source modeloch. V druhej polovici prednášky sa pozrieme na boom okolo otvorených AI modelov a ako ich vieme využiť.
-
@ 4f1c14e5:b8546d05
2025-03-01 22:33:36Training ideologies often lead to tribalism when they shouldn’t. As with all things, there are no solutions - only tradeoffs.
The reality is that free weights and machines are both tools. The one you should use is determined by your objective.
In either case, creating tension within the target muscle group is always the objective when it comes to building muscle. It's this mechanical tension that's responsible for initiating the growth process by destroying already formed muscle cells. Both machines and free weights accomplish this objective.
As a general rule, the more stable you are during an exercise, the more tension you can create within the target muscle.
The difference is simply that machines offer more stability. That’s neither better nor worse, it just is. Stability within exercises is a spectrum. We create stability by bracing against things. The more points of contact and the more of your body that braces against things, the more stability you will have.
Because of gravity, we are forced to have at least one point of contact braced against something at all times. Typically, it's the floor. A pistol squat offers a very low amount of stability because of the lack of bracing. In this example, only one foot is braced against the floor.
Adding a second foot to the ground and doing a body weight squat enhances stability. Holding onto a bar or a bench in front of you while squatting now adds another layer of stability.
A hack squat is a machine where both feet are planted on a platform and the user rests the posterior portion of their entire upper body - from their lower back to their head - against a pad. This machine has a fixed movement pattern which further reduces any instability.
These are all examples of different exercises that follow the same movement pattern, yet offer varying degrees of stability.
Which should beginners use? Again, both is the best approach. But what would happen if you limited yourself to mostly one or the other?
Predominantly using machines as a beginner will allow you to forego the lack of development in your ability to stabilize yourself. The machine stabilizes your body for you in a way that beginners simply aren’t able to at first. You are braced by a seat, a back pad/chest pad and maybe a handle or two as well. In addition to this bracing, the movement path is already carved out for you. You simply position yourself appropriately and push (or pull), and the machine does the rest. This allows you to focus more on creating tension in the target muscle as well as learning to train to failure safely.
Predominantly using free weights as a beginner will force you to develop stability from the start. There are no pads anywhere to brace your body against. Your body must learn to brace against itself. You become the machine. This may limit your ability to create maximum tension in the target muscles at first, but the stability you create this way will translate to systemic muscular development. You'll become thicker everywhere because your body works as a system to stabilize itself against gravity.
The stability built through free weight movements will transfer over to machines. If you can stabilize yourself with just a barbell, the stability you can create while braced in a machine will translate to even greater tension. You’ll be stabilized by your body AND the machine.
Since it makes the most sense to do both, the only thing left is understanding which circumstances are better suited for machines vs free weights. Since fatigue is something we all contend with during a workout, it makes sense to program the least stabilized, most demanding movements earlier in the workout and the most stabilized, least demanding movements later in the session. This not only allows you to create the most tension possible throughout the workout, but is also the safest approach. It would be unwise to schedule barbell front squats at the end of a workout when fatigue is high and energy is low. Not only will you fail to generate maximum tension, but you’ll put yourself at higher risk of injury.
TLDR; use both, but do free weight stuff first.
-
@ 0176967e:1e6f471e
2024-07-25 20:38:11Čo vznikne keď spojíš hru SNAKE zo starej Nokie 3310 a Bitcoin? - hra Chain Duel!
Jedna z najlepších implementácií funkcionality Lightning Networku a gamingu vo svete Bitcoinu.
Vyskúšať si ju môžete s kamošmi na tomto odkaze. Na stránke nájdeš aj základné pravidlá hry avšak odporúčame pravidlá pochopiť aj priamo hraním
Chain Duel si získava hromady fanúšikov po bitcoinových konferenciách po celom svete a práve na Lunarpunk festival ho prinesieme tiež.
Multiplayer 1v1 hra, kde nejde o náhodu, ale skill, vás dostane. Poďte si zmerať sily s ďalšími bitcoinermi a vyhrať okrem samotných satoshi rôzne iné ceny.
Príďte sa zúčastniť prvého oficiálneho Chain Duel turnaja na Slovensku!
Pre účasť na turnaji je potrebná registrácia dopredu.
-
@ 6260f29f:2ee2fcd4
2025-03-01 22:23:15PlebDevs ⚡️
A one-of-a-kind developer education, content, and community platform built on Nostr and fully Lightning integrated.
https://plebdevs.comOverview
PlebDevs is an open-source platform that combines educational content, community interaction, and Bitcoin/Lightning integration. The platform publishes content to Nostr and actively pulls from Nostr relays, creating a distributed, interoperable trail of Documents, Videos, and Courses.
Technical Implementation
Nostr Integration
- Content Distribution: Implements NIP-23 for rich multimedia content embedding
- Content Encryption: Paid content bodies are encrypted while maintaining metadata visibility
- Authentication:
- Multi-method signup (NIP-07, Email, GitHub, Anonymous)
- Ephemeral keypair generation for non-Nostr users
- Account linking and recovery system
- Lists & Courses: NIP-51 implementation for structured content organization
- Monetization: NIP-99 for digital content sales
- Automated Subscriptions: NIP-47 (Nostr Wallet Connect) for recurring payments
- Badge System: NIP-58 for automated achievement rewards
- Identity: NIP-05 for custom platform identities
- Additional NIPs: Implements NIP-01, NIP-19, NIP-39, NIP-57
Platform Architecture
- Content Management:
- Draft system with preview capabilities
- Parameterized replaceable events
- Multi-format support (Markdown, Video, Mixed Media)
- Course builder with drag-and-drop ordering
- User Management:
- Profile synchronization with Nostr
- Activity tracking and progress monitoring
- Custom relay configuration
- Wallet connection management
- Admin Features:
- Protected admin routes based on pubkey configuration
- Content creation and management interface
- Draft/publish workflow
- Course assembly tools
-
@ 0176967e:1e6f471e
2024-07-22 19:57:47Co se nomádská rodina již 3 roky utíkající před kontrolou naučila o kontrole samotné? Co je to vlastně svoboda? Může koexistovat se strachem? S konfliktem? Zkusme na chvíli zapomenout na daně, policii a stát a pohlédnout na svobodu i mimo hranice společenských ideologií. Zkusme namísto hledání dalších odpovědí zjistit, zda se ještě někde neukrývají nové otázky. Možná to bude trochu ezo.
Karel provozuje již přes 3 roky se svou ženou, dvěmi dětmi a jedním psem minimalistický život v obytné dodávce. Na cestách spolu začali tvořit youtubový kanál "Karel od Martiny" o svobodě, nomádství, anarchii, rodičovství, drogách a dalších normálních věcech.
Nájdete ho aj na nostr.
-
@ 6260f29f:2ee2fcd4
2025-03-01 22:21:02 -
@ 0176967e:1e6f471e
2024-07-21 15:48:56Lístky na festival Lunarpunku sú už v predaji na našom crowdfunding portáli. V predaji sú dva typy lístkov - štandardný vstup a špeciálny vstup spolu s workshopom oranžového leta.
Neváhajte a zabezpečte si lístok, čím skôr to urobíte, tým bude festival lepší.
Platiť môžete Bitcoinom - Lightningom aj on-chain. Vaša vstupenka je e-mail adresa (neposielame potvrdzujúce e-maily, ak platba prešla, ste in).
-
@ f33c8a96:5ec6f741
2025-03-01 20:56:43 -
@ 0176967e:1e6f471e
2024-07-21 11:28:18Čo nám prinášajú exotické protokoly ako Nostr, Cashu alebo Reticulum? Šifrovanie, podpisovanie, peer to peer komunikáciu, nové spôsoby šírenia a odmeňovania obsahu.
Ukážeme si kúl appky, ako sa dajú jednotlivé siete prepájať a ako spolu súvisia.
-
@ 0176967e:1e6f471e
2024-07-21 11:24:21Podnikanie je jazyk s "crystal clear" pravidlami. Inštrumentalisti vidia podnikanie staticky, a toto videnie prenášajú na spoločnosť. Preto nás spoločnosť vníma často negatívne. Skutoční podnikatelia sú však "komunikátori".
Jozef Martiniak je zakladateľ AUSEKON - Institute of Austrian School of Economics
-
@ f33c8a96:5ec6f741
2025-03-01 20:50:47 -
@ 0176967e:1e6f471e
2024-07-21 11:20:40Ako sa snažím praktizovať LunarPunk bez budovania opcionality "odchodom" do zahraničia. Nie každý je ochotný alebo schopný meniť "miesto", ako však v takom prípade minimalizovať interakciu so štátom? Nie návod, skôr postrehy z bežného života.
-
@ 0176967e:1e6f471e
2024-07-20 08:28:00Tento rok vás čaká workshop na tému "oranžové leto" s Jurajom Bednárom a Mariannou Sádeckou. Dozviete sa ako mení naše vnímanie skúsenosť s Bitcoinom, ako sa navigovať v dnešnom svete a odstrániť mentálnu hmlu spôsobenú fiat životom.
Na workshop je potrebný extra lístok (môžete si ho dokúpiť aj na mieste).
Pre viac informácií o oranžovom lete odporúčame pred workshopom vypočuťi si podcast na túto tému.
-
@ f33c8a96:5ec6f741
2025-03-01 20:42:24 -
@ bbb5dda0:f09e2747
2025-03-01 17:46:48A couple weeks with a little bit of everything, TollGate marketing, app stability improvements, and some personal matters that needed my attention. Let's get into it:
TollGate App
For starters, we worked hard to get an early version of the TollGate website live. What do we want to communicate about the project, and to whom. We've identified three 'types' of visitor, each requiring its own 'customer journey' through the website. First there's the end-user, someone that just wants access to tollgate, but doesn't care about any of the technichalities. We try to guide those people to downloading our app as soon as possible. Currently that means downloading it straight from the website as an APK file. But we want to quickly move on to publishing it to the ZapStore.
The past couple weeks I put some efforts into getting the app stable. It was hard to identify what was causing the seemingly random crashes and full reloads (of the web content). After getting some outside help we've identified that we were trying to interact with the android API's on the main thread. Which is bad practice. I first couldn't figure out how to make a web request without having to spawn a seperate thread in the kotlin code, that then we'd have to create some kind of system to bubble up the callback method's result. I then found there's a proper Tauri (the framework) way of doing this using Kotlin Coroutines, which I wasn't familliar with. But it just executes the entire Tauri 'command' (function call) on a background thread. Problem solved. I haven't had any full app crashes since.
Which left me with the random page refreshes, the thing that was behind the demo-effect at Sat's and Facts. I noticed it happened around the moments I would go to settings to hit the 'sign in' button to dismiss the captive portal. That's where I had looked before, but I needed to zoom out. It had to do SOMETHING with moving the app to and from the background. Okay is it some kind of sleep issue? I don't remember where or how I found it but I saw a suggestion to run the Tauri dev build with a --no-watch flag. Which disables hot reloading of the app when I edit one of the TypeScript/HTML files. Somehow the reload would be triggered sometimes on app switching. Why? I don't know, but i'm glad I could pinpoint it.
So now the demo part seems stable, finally. Which means I can move on and properly implement the wallet logic and making the download on the website work.
TollGateOS
The second customer group will be people interested in running a TollGate. We're trying to get them to download our custom build of OpenWRT that includes all the required packages. We 'baptized' this version to be called TollGateOS as we say in proper Dutch ;). I think it will help to have these clear distinct names. I really want any moderately technical person to be able to install TollGateOS on a supported router. My vision for this is to have some kind of web installer, akin to what GrapheneOS does with their web-installer. It seems to be possible to do SSH from the browser, but I'll kill that bird when I see it (is that a saying? I think it should be...)
By the way, in earlier docs/demo's we talked about a 'herald' module, which would do the advertising of the tollgate. But as we found that the crowsnest already interacts with the hardware antennas, which is needed for 'advertising' the tollgate, we thought it better to merge both of them into the Crowsnest.
Developers
TollGate is fully open source, so anyone looking to either look at or fork the source code is welcome to do so. Developers interested at looking at the code are probably already interested to some degree. For this group we added easy links to navigate to the project's repositories
Currently our focus is publishing the Android version, but we're building the app in a cross-platform way. The only thing we have to customize are the system integrations, like scanning for wifi-networks and connecting to them.
Gearing up for Sovereign Engineering
As i'm writing this piece for you i'm at 10km (that's 30.000ft for y'all Americans) in the air on my way to Sovereign Engineering edition #4, SEC-04. I feel ready to go kick ass once again and build beautiful things with a bunch of my favourite plebs!
A bit of a focus shift
If you've been following me you might notice I haven't posted much about Epoxy recently. I found the momentum I see emerge on TollGate and GitHub Actions too good to let go to waste. So those will be my focus for a while, I'm hoping to circle back to Epoxy when these projects have a more steady pace.
-
@ df478568:2a951e67
2025-03-01 15:04:27In my Soapminer article, I added quotes from various plebs. I earned over 12,000 sats! That's enough for a McJunk today, but maybe a steak dinner in a few years. That's my two sats anyway.
This is not investment advice
It feels great to receive value from people who support and appreciate your work. It's also nice to stack more sats by writing. I have a budget of $25.00 that I have sent to various people using Zapplanner, but I'm trying something new: Zapsplits.
WTF Are Zapsplits?
I asked Unleashed.chat. Here's what the anthropomorphic Unleashed said.
Me: What is a Zapsplit on nostr?
Unleashed:
A Zapsplit on Nostr refers to splitting a Zap, which is a form of donation or tipping on the ~platform~ protocol, among multiple recipients. It allows users to distribute their support more broadly across various content creators instead of just one.
That's more succinct than I would put it, but nostr is a protocol, not a platform. The important part about Zapsplits for me is that it removes the cognitive cost of deciding what percentage of my giving budget should go to each creator. Do I zap podcast guests? Do podcasters with ads get less than podcasters sans ads? How much value did this particular article bring me? If I zap Guy Swann, should I also zap the authors he reads? Should I zap long-form articles more than micro-blogs? There are 21 million different considerations.
Zapsplits removes all this from me because I can use the following algorithm.
Does This Person Provide Me Value?
Yes ⬇️
I add them to my Zapsplit post for that month. A portion of my monthly zapping budget, 25 dirty-fiat bucks, transforms into magic Internet money and is distributed among everyone in the Zapsplit.
No ⬇️ If I don't get any value, I don't send value. Simple.
Testing Zapsplits
I added podcasters and devs to a nostr post and enabled a 10-way zapsplit on the post. It's based on prisms, a little nostr feature that gives me prose writing superpowers.
- I can earn sats for writing.
- I can support others with a single zap.
- I can add people who give me quotes to my zap splits.
People appreciate attribution. I suspect they will appreciate it more if they also get paid. What if I added some quotes to an article and then split any zaps I get with the quoted plebs? Come to think of it, I'll try it. [Here's a quote from a dev on nostr](nostr:note1qf4277rudtflllrjr555890xsjp6u60f7xdvclkwc9t220duajeq0x665q
I added Silberangel to the Zapsplits on Habla.news.
My V4V payments can also get sent to ten different plebs with a simple click of a button. I am going to start using this for a lot of my monthly V4V budget. Every month, I'll think about the people's content I value most and add them to a single zapsplit payment. Then, I'll zap the post.
Say I create a poll and make a wager with ten different people. If I lose, I can pay everyone pit at the same time. This is probably better for a football pool, but you get the idea. The options are limited only by your imagination.
nostr:nevent1qqspnhucgxc6mprhw36fe2242hzv7zumavyy7dhzjswtldhxk4dh7ugpz4mhxue69uhhyetvv9ujuerpd46hxtnfduhsygxlg7zks3uauf454q7phhzdh2mpkhxg9cdrzt3t9z7gzksj49g7vupsgqqqqqqsl5uwfl
Other people can also zap the post. As Siberangel says, we can use other people's money to provide value, too. This is a great option for stacking neophytes, people who don't have much bitcoin or cheap skates. Let's be honest, bitcoin has made most of us cheapskates.
Bitcoin books with multiple authors can have QR codes that link to one of these Zapsplit posts. The authors can do a book signing and sell their books using this on nostr. Nerds like me can get three autographs and zap the book. The sats are split among all authors. Here's a Zapsplit that includes all the authors of Parallel.
Can you think of any other ways to use Zapsplits? Let me know.
npub1marc26z8nh3xkj5rcx7ufkatvx6ueqhp5vfw9v5teq26z254renshtf3g0
-
@ 43baaf0c:d193e34c
2025-03-01 14:22:43eARThist vlog name represents the fusion of Earth and Art and me as traveling artist.
I'm kicking off my vlogging journey with my first vlog, Bangkok Lightning Tour. My goal with vlogging is to share more about my art journey as I travel the world. After years of traveling and filming around the world, I’m now fully focused on my art. However, filming and photography remaining a passion of mine. I also create still some travel content for my company, @traveltelly, whenever I’m not drawing.
After spending time creating art around the world, this feels like the natural next step sharing more behind the scenes moments of both traveling and my artist life.
I started in Bangkok, a city I often visit and where I’ve spent the last five months creating the BangPOP art. Teaming up with Sats ‘n’ Facts, I explored Bangkok to see how Bitcoin Lightning adoption is growing here. Bitcoin has given me the freedom to create art, so I wanted to see if it’s also helping others in Bangkok. On a scorching 35°C day, we filmed three places where you can pay with Bitcoin Lightning. You can find these locations on btcmap.org.
I’m leaving Bangkok soon, but more vlogs from Thailand will follow when I return. I always find my way back to the Land of Smiles.
-
@ a012dc82:6458a70d
2025-03-01 14:18:37Bitcoin, since its creation by the enigmatic figure Satoshi Nakamoto, has revolutionized the concept of currency. Its journey from an obscure digital token to a major financial asset has been marked by dramatic bull runs, capturing the attention of investors worldwide. These surges in Bitcoin's value are not random but are driven by a combination of technological innovation, economic factors, and unique monetary policy. In this article, we explore the intricacies of Bitcoin's scarcity, the halving process, and the broader market dynamics that contribute to its periodic bull runs.
The allure of Bitcoin lies not just in its technological novelty but also in its challenge to traditional financial systems. It represents a decentralized form of currency, free from government control and manipulation. This aspect has been particularly appealing in times of economic uncertainty, where traditional currencies and markets have shown vulnerability. Bitcoin's bull runs can be seen as a barometer of the changing landscape of finance, reflecting a growing shift towards digital assets.
Table of Contents
-
The Concept of Scarcity in Bitcoin
-
Finite Supply
-
Impact on Value
-
-
The Halving Events
-
Mechanism and Purpose
-
Historical Impact on Price
-
-
Market Dynamics and Investor Sentiment
-
Institutional Investment
-
Global Economic Factors
-
Technological Advancements
-
Regulatory Environment
-
-
Conclusion
-
FAQs
The Concept of Scarcity in Bitcoin
Finite Supply
Bitcoin's protocol ensures that only 21 million coins will ever be in existence. This limit is encoded in its blockchain, making it a deflationary asset as opposed to inflationary fiat currencies. The idea behind this is to create a form of money that can resist inflationary pressures over time, much like gold, which has maintained its value for centuries due to its scarcity.
Impact on Value
The scarcity of Bitcoin has a profound psychological impact on investors. It creates a sense of urgency and a fear of missing out (FOMO) as the available supply dwindles. This is particularly evident as each Bitcoin halving event approaches, reminding the market of the ever-decreasing new supply. The result is often a speculative rally, as seen in the past bull runs. Moreover, as Bitcoin becomes more scarce, its comparison to gold becomes increasingly apt, attracting investors who are looking for assets that can retain value over time.
Scarcity also plays into the hands of long-term investors, often referred to as 'HODLers' in the crypto community. These investors view Bitcoin as a long-term store of value, akin to an investment in precious metals. The limited supply of Bitcoin reassures these investors that their holdings will not be devalued through oversupply, a common problem in fiat currencies.
The Halving Events
Mechanism and Purpose
Bitcoin's halving is a genius mechanism that ensures a controlled and gradual distribution of coins. By reducing the mining reward by half every four years, Bitcoin mimics the process of extracting a natural resource like gold, becoming progressively harder and more resource-intensive to mine. This not only controls inflation but also adds to the scarcity, making each coin more valuable over time.
Historical Impact on Price
Each halving event has historically led to an increase in Bitcoin's price, though not immediately. There is typically a lag between the halving and the subsequent bull run. This delay can be attributed to market adjustment and the gradual realization of reduced supply. The anticipation of this price increase often starts a positive feedback loop, attracting more investors and further driving up the price.
The halving events serve as key milestones in Bitcoin's timeline, providing a predictable pattern of supply reduction that savvy investors monitor closely. These events have become celebratory moments within the Bitcoin community, symbolizing the strength and resilience of the network. They also serve as a reminder of Bitcoin's unique value proposition in the world of cryptocurrencies.
Market Dynamics and Investor Sentiment
Institutional Investment
The recent years have seen a paradigm shift with the entry of institutional investors into the Bitcoin market. This shift is significant as it marks a departure from Bitcoin's early days of being a niche asset for tech enthusiasts. Institutional investors bring with them not only large capital inflows but also a sense of legitimacy and stability to the market. Their involvement has been a key driver in the maturation of the cryptocurrency market, making it more appealing to a broader audience.
Global Economic Factors
The role of global economic factors in influencing Bitcoin's price cannot be overstated. In times of economic instability, such as during the COVID-19 pandemic, investors increasingly turned to Bitcoin as a safe haven asset. This trend is indicative of a growing recognition of Bitcoin's value as a hedge against inflation and economic uncertainty. The decentralized nature of Bitcoin makes it less susceptible to geopolitical tensions and policy changes that affect traditional currencies and markets.
Technological Advancements
The continuous evolution of blockchain technology and the infrastructure surrounding Bitcoin has played a crucial role in its adoption. Developments such as improved transaction speed, enhanced security measures, and user-friendly trading platforms have made Bitcoin more accessible and attractive to a wider audience. These technological advancements are crucial in building investor confidence and facilitating the integration of Bitcoin into mainstream finance.
Regulatory Environment
The regulatory environment for Bitcoin and cryptocurrencies has been a double-edged sword. On one hand, clear and supportive regulations in certain jurisdictions have provided a boost to the market, encouraging institutional participation and providing clarity for investors. On the other hand, regulatory crackdowns in some countries have led to market volatility and uncertainty. The ongoing development of a regulatory framework for cryptocurrencies remains a key factor in shaping Bitcoin's future.
Conclusion
Bitcoin's journey is a testament to the evolving nature of finance and investment in the digital age. Its bull runs, driven by scarcity, halving events, and a complex interplay of market dynamics, highlight the growing acceptance of cryptocurrencies as a legitimate asset class. As the world increasingly embraces digital currencies, Bitcoin's role as a pioneer and standard-bearer will likely continue to influence its value and relevance in the global financial landscape.
Understanding Bitcoin's market dynamics is not just about analyzing charts and trends. It's about appreciating the broader context of economic, technological, and social changes that are reshaping the way we think about money and value. For investors and enthusiasts alike, staying informed and adaptable is key to navigating the exciting and often unpredictable world of Bitcoin and cryptocurrencies.
FAQs
What causes a Bitcoin bull run? Bitcoin bull runs are typically driven by a combination of factors including its built-in scarcity due to the finite supply, halving events reducing the mining rewards, institutional investment, global economic factors, advancements in blockchain technology, and the evolving regulatory landscape.
How does Bitcoin's scarcity affect its value? Bitcoin's value is significantly influenced by its scarcity. With a capped supply of 21 million coins, as demand increases, the limited supply pushes the price upwards, similar to precious metals like gold.
What is a Bitcoin halving event? A Bitcoin halving event is when the reward for mining new Bitcoin blocks is halved, effectively reducing the rate at which new Bitcoins are created. This occurs approximately every four years and is a key factor in Bitcoin's deflationary model.
Why do institutional investors matter in Bitcoin's market? Institutional investors bring significant capital, credibility, and stability to the Bitcoin market. Their participation signals a maturation of the market and can lead to increased confidence and investment from other sectors.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co/
Youtube: @thebitcoinlibertarian
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
Get Orange Pill App And Connect With Bitcoiners In Your Area. Stack Friends Who Stack Sats link: https://signup.theorangepillapp.com/opa/croxroad
Buy Bitcoin Books At Konsensus Network Store. 10% Discount With Code “21croxroad” link: https://bitcoinbook.shop?ref=21croxroad
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ b83a28b7:35919450
2025-03-01 13:08:06Preamble
I used OpenAI's o3-mini reasoning engine to construct a thesis for the Russia-Ukraine conflict using the positions of Jeffery Sachs and John Mearsheimer. I then asked it to create a counterargument to those positions- the antithesis. And I finally asked for a synthesis that concludes in lasting peace in the region. In all three cases, I prompted it to only use axiomatic deductive reasoning and first principles thinking, emphasizing facts and ignoring the opinions and assertions of so-called experts.
The Thesis
John Mearsheimer's Position: A Realist Perspective
First Principles
- States prioritize survival: In an anarchic international system (no overarching authority), states act to maximize security and minimize threats.
- Great powers seek regional hegemony: States aim to dominate their immediate regions to prevent rival powers from threatening them.
- Proximity amplifies threat perception: The closer a rival power or alliance is to a state's borders, the greater the perceived threat.
Logical Reasoning
- NATO's eastward expansion brings a U.S.-led military alliance closer to Russia’s borders.
- From the principle of proximity, this increases Russia’s perceived insecurity.
- Ukraine’s potential NATO membership represents a direct challenge to Russia’s sphere of influence.
- A great power like Russia would logically act to prevent this encroachment, as it undermines its regional dominance.
- Russia’s actions (e.g., annexation of Crimea in 2014 and invasion in 2022) are defensive responses to NATO's perceived encroachment.
- From the principle of survival, Russia seeks to neutralize threats by ensuring Ukraine does not join NATO.
- The U.S. and NATO ignored Russia’s stated red lines (e.g., no NATO membership for Ukraine).
- This provoked predictable countermeasures from Russia, consistent with great-power behavior.
Conclusion
From a realist perspective, NATO expansion is the root cause of the conflict. Russia’s actions are not imperialistic but defensive responses to protect its security and sphere of influence.
Jeffrey Sachs' Position: A Historical and Diplomatic Perspective
First Principles
- Agreements create expectations: Commitments between states establish norms that guide future behavior.
- Security is interdependent: One state’s pursuit of security can increase another state’s insecurity (the "security dilemma").
- Conflicts are preventable through diplomacy: Negotiations and compromises can avert wars by addressing mutual concerns.
Logical Reasoning
- In 1990, U.S. officials assured Soviet leaders that NATO would not expand eastward if Germany was reunified.
- If such assurances were made (even informally), subsequent NATO expansion violated these expectations, fostering mistrust.
- The U.S.'s unilateral withdrawal from treaties like the Anti-Ballistic Missile Treaty (2002) and its push for NATO enlargement exacerbated Russia's insecurity.
- By the principle of interdependent security, these actions predictably escalated tensions with Russia.
- Putin proposed negotiations in 2021 to prevent NATO expansion into Ukraine, but these were rejected by the U.S.
- Diplomacy could have addressed Russian concerns without war, but its rejection left military action as Russia’s only perceived option.
- Ukraine’s neutrality could have prevented conflict by satisfying both Russian and Western security concerns.
- Neutrality would reduce NATO's proximity to Russia while preserving Ukraine's sovereignty.
Conclusion
From Sachs’ perspective, the war is a consequence of U.S.-led NATO expansion and missed diplomatic opportunities. A negotiated settlement based on Ukrainian neutrality remains the logical path to peace.
Deductive Insights
- Both positions agree that NATO expansion is central to understanding the conflict but differ in emphasis:
- Mearsheimer focuses on structural inevitabilities in great-power politics.
- Sachs highlights historical commitments and missed opportunities for diplomacy.
- Both rely on axioms about state behavior:
- Mearsheimer emphasizes security maximization through power balancing.
- Sachs underscores trust-building through adherence to agreements.
In conclusion, reasoning from first principles supports both scholars’ views as internally consistent frameworks for explaining the Ukraine conflict, though they emphasize different aspects of state behavior and international relations logic.
To construct counterarguments to the positions of John Mearsheimer and Jeffrey Sachs using axiomatic deductive reasoning, we will start with alternative first principles and challenge their logical conclusions. This approach ensures that the counterarguments are rooted in logic and facts, without relying on external opinions or assertions.
Counterarguments to John Mearsheimer's Position
First Principles for the Counterargument
- Sovereign states have the right to self-determination: All states, regardless of size, have the right to choose their alliances and political alignments.
- Security is not zero-sum: One state’s pursuit of security does not always come at the expense of another’s; collective security arrangements can enhance stability.
- Aggression undermines security: A state that invades its neighbors creates insecurity for itself by provoking opposition and strengthening rival alliances.
Logical Reasoning
- NATO expansion was voluntary and driven by the sovereign decisions of Eastern European states seeking protection from historical Russian aggression.
- From the principle of self-determination, NATO enlargement reflects the legitimate choices of countries like Poland, Estonia, and Ukraine to align with a defensive alliance, not an act of Western aggression against Russia.
- Russia’s perception of NATO as a threat is not inherently justified.
- NATO is a defensive alliance with no history of invading non-member states. From the principle that security is not zero-sum, NATO’s presence near Russia does not necessarily reduce Russian security unless Russia itself acts aggressively.
- Russia’s invasion of Ukraine contradicts Mearsheimer’s claim that its actions are purely defensive.
- By attacking Ukraine, Russia has provoked a stronger NATO presence in Eastern Europe (e.g., Finland and Sweden joining NATO) and increased its own insecurity. This undermines the principle that great powers act rationally to maximize their security.
- The analogy to the Cuban Missile Crisis is flawed.
- In 1962, the U.S. objected to Soviet missiles in Cuba because they posed an immediate offensive threat. NATO membership for Ukraine does not involve stationing offensive weapons aimed at Russia but rather a defensive commitment.
Conclusion
Mearsheimer’s argument fails to account for the agency of smaller states and overstates the inevitability of conflict due to NATO expansion. Russia’s actions are better explained as aggressive attempts to reassert imperial influence rather than rational defensive measures.
The Antithesis
Counterarguments to Jeffrey Sachs' Position
First Principles for the Counterargument
- Informal agreements lack binding force: Verbal or informal assurances between states do not constitute enforceable commitments in international relations.
- Security dilemmas require mutual restraint: Both sides in a conflict must take steps to reduce tensions; unilateral blame is insufficient.
- Sovereign equality underpins diplomacy: No state has the right to dictate another state’s foreign policy or alliances.
Logical Reasoning
- The alleged 1990 U.S. assurance against NATO expansion was never formalized in any treaty or agreement.
- From the principle that informal agreements lack binding force, subsequent NATO enlargement cannot be considered a violation of commitments since no legal obligation existed.
- Russia’s actions have escalated tensions far more than NATO expansion ever did.
- By annexing Crimea (2014) and invading Ukraine (2022), Russia has actively destabilized its neighbors and created insecurity across Europe. From the principle of mutual restraint, Russia bears responsibility for escalating the conflict rather than solely responding to U.S./NATO actions.
- Diplomatic solutions require both parties to negotiate in good faith.
- Putin’s 2021 proposals demanded guarantees that Ukraine would never join NATO—a condition that violates Ukraine’s sovereignty and right to self-determination. From the principle of sovereign equality, such demands are inherently illegitimate.
- Neutrality is not always a viable solution.
- Ukraine attempted neutrality after independence (e.g., refusing to join NATO for decades). However, this did not prevent Russian aggression in 2014 or 2022, undermining Sachs’ claim that neutrality would have ensured peace.
Conclusion
Sachs’ argument overemphasizes historical grievances and ignores Russia’s active role in escalating tensions through aggression and coercion. The failure of diplomacy lies as much with Russia’s demands as with Western policies.
Deductive Insights from Counterarguments
- Both Mearsheimer and Sachs underestimate the agency of smaller states like Ukraine, which made sovereign decisions based on their own security needs rather than being mere pawns in great-power politics.
- Both positions assume that Russia’s actions are primarily reactive or defensive, but this ignores evidence that Russia has proactively pursued aggressive policies (e.g., Georgia 2008, Crimea 2014).
- The principle of sovereignty challenges both scholars’ frameworks:
- Mearsheimer overlooks Ukraine's right to align with NATO if it chooses.
- Sachs dismisses Ukraine's agency by suggesting neutrality could have been imposed as a solution.
In conclusion, while Mearsheimer and Sachs present internally consistent arguments, their frameworks can be challenged by emphasizing sovereignty, rejecting inevitability in great-power conflict, and highlighting Russia's active role in escalating tensions beyond what can be justified by security concerns alone.
The Synthesis: A Balanced Framework for Resolving the Russia-Ukraine Conflict
First Principles for Synthesis
- Security is interdependent: A state’s pursuit of security can create insecurity for others, necessitating mutual accommodation.
- Sovereignty is fundamental but constrained by geography: States have a right to self-determination, but geography imposes practical limits on absolute sovereignty in a multipolar world.
- Great powers act to preserve their spheres of influence: In an anarchic international system, great powers prioritize regional dominance to ensure their survival.
- Diplomacy is essential for de-escalation: Durable peace requires negotiated compromises that address the core interests of all parties involved.
Reconciling the Thesis and Antithesis
Thesis (Mearsheimer and Sachs' Positions)
- NATO expansion near Russia’s borders provoked a predictable response from Moscow, reflecting structural dynamics of great-power competition.
- U.S. and NATO policies ignored Russian security concerns, contributing to the escalation of tensions.
- Diplomacy and neutrality for Ukraine are necessary to resolve the conflict.
Antithesis (Counterarguments)
- NATO expansion was driven by voluntary decisions of Eastern European states seeking protection from historical Russian aggression, not Western provocation.
- Russia’s actions are not purely defensive but reflect imperial ambitions that violate Ukraine’s sovereignty.
- Neutrality alone would not guarantee peace, as Russia has acted aggressively even when Ukraine was neutral.
Synthesis
Both perspectives contain valid insights but fail to fully address the complexity of the conflict. The synthesis must: 1. Acknowledge Russia’s legitimate security concerns while rejecting its imperialistic actions. 2. Respect Ukraine’s sovereignty while recognizing that its geographic position necessitates pragmatic compromises. 3. Balance great-power dynamics with smaller states’ rights to self-determination.
Proposed Solution: A Comprehensive Peace Framework
To achieve an enduring peace in Ukraine and stabilize Eastern Europe, the following steps are proposed:
1. Immediate Ceasefire
- Both sides agree to an immediate cessation of hostilities under international supervision (e.g., UN peacekeeping forces).
- A demilitarized buffer zone is established along current frontlines to prevent further clashes.
2. Neutrality with Conditions
- Ukraine adopts a status of permanent neutrality, enshrined in its constitution and guaranteed by international treaties.
- Neutrality includes:
- No NATO membership for Ukraine.
- Freedom for Ukraine to pursue economic integration with both the EU and other global partners without military alignments.
3. Security Guarantees
- Russia receives legally binding assurances that NATO will not expand further eastward or station offensive weapons near its borders.
- Ukraine receives multilateral security guarantees from major powers (e.g., U.S., EU, China) to deter future aggression from any party.
4. Territorial Dispute Resolution
- Crimea’s status is deferred to future negotiations under international mediation, with both sides agreeing to maintain the status quo in the interim.
- Donetsk and Luhansk regions are granted autonomy within Ukraine under a decentralized federal structure, ensuring local governance while preserving Ukrainian sovereignty.
5. Economic Reconstruction
- An international fund is established for rebuilding war-torn regions in Ukraine, with contributions from Russia, Western nations, and multilateral institutions.
- Economic cooperation between Ukraine and Russia is encouraged through trade agreements designed to benefit both parties.
6. Phased Implementation
- Peace agreements are implemented incrementally to build trust:
- Initial steps include withdrawal of heavy weaponry, prisoner exchanges, and humanitarian aid delivery.
- Subsequent phases involve constitutional reforms (e.g., neutrality), elections in disputed regions, and gradual reintegration of territories under international supervision.
7. Long-Term Regional Security Framework
- A new regional security framework is established involving Russia, Ukraine, NATO members, and neutral states to manage disputes peacefully.
- This framework institutionalizes dialogue channels for arms control, economic cooperation, and crisis management.
Rationale for the Solution
- Balances Security Concerns:
- Neutrality addresses Russia’s fears of NATO encirclement while preserving Ukraine’s independence.
-
Security guarantees reduce mistrust between NATO and Russia while protecting Ukraine from future aggression.
-
Respects Sovereignty:
-
Ukraine retains its independence and territorial integrity (except for deferred issues like Crimea) while accommodating regional realities through federalism and neutrality.
-
Acknowledges Great-Power Dynamics:
-
The solution recognizes Russia’s need for a secure sphere of influence without legitimizing its imperial ambitions or violating international law.
-
Builds Trust Through Gradualism:
- Incremental implementation allows both sides to verify commitments before proceeding further.
-
International monitoring ensures compliance with agreements.
-
Incorporates Lessons from History:
- Neutrality models (e.g., Austria) demonstrate that such arrangements can work when backed by strong guarantees.
- Phased implementation mirrors successful peace processes in other conflicts (e.g., Colombia).
Conclusion
The synthesis reconciles the structural realism of Mearsheimer with Sachs’ emphasis on diplomacy by proposing a balanced solution that addresses both security dilemmas and sovereignty concerns. Neutrality serves as the linchpin for de-escalation, while phased implementation builds trust over time. By integrating immediate conflict resolution measures with long-term regional frameworks, this approach offers a realistic path toward enduring peace in Eastern Europe.
Citations: [1] https://www.reddit.com/r/geopolitics/comments/1drhxxh/john_mearsheimers_take_on_the_russoukrainian_war/ [2] https://www.reddit.com/r/CredibleDefense/comments/14ktcv2/the_darkness_ahead_where_the_ukraine_war_is/ [3] https://www.reddit.com/r/PoliticalScience/comments/1bp64ub/what_is_with_mearsheimer_and_russia/ [4] https://www.reddit.com/r/AskConservatives/comments/1gznjks/do_you_think_appeasing_putin_is_the_right_way_to/ [5] https://www.reddit.com/r/changemyview/comments/1hu8iop/cmv_the_united_states_should_continue_to_send_aid/ [6] https://internationalpolicy.org/publications/jeffrey-sachs-matt-duss-debate-u-s-russia-talks-to-end-ukraine-war/ [7] https://www.reddit.com/r/IRstudies/comments/17iwfpr/john_mearsheimer_is_wrong_about_ukraine/ [8] https://scheerpost.com/2024/11/23/jeffrey-sachs-explains-the-russia-ukraine-war/ [9] https://consortiumnews.com/2023/09/21/jeffrey-sachs-nato-expansion-ukraines-destruction/ [10] https://www.democracynow.org/2025/2/18/russia_ukraine [11] https://www.reddit.com/r/geopolitics/comments/15kwpx3/ukraine_war_and_the_paradox_of_mearsheimers/ [12] https://braveneweurope.com/jeffrey-d-sachs-the-real-history-of-the-war-in-ukraine-a-chronology-of-events-and-case-for-diplomacy [13] https://www.jeffsachs.org/newspaper-articles/nato-chief-admits-expansion-behind-russian-invasion [14] https://www.semanticscholar.org/paper/2c06cbc711d95427489f8bc781c45daab461ccde [15] https://www.semanticscholar.org/paper/46e28172de2a520e4f77e654a37687a7757d9d49 [16] https://www.semanticscholar.org/paper/e8c17a15a554054c755a1b1d53d3e1099d159033 [17] https://www.semanticscholar.org/paper/65cbcec6ac255413086db567774844f84c813600 [18] https://www.semanticscholar.org/paper/d11db25ffa5b50ef38d18c2a1e2243e4c7c53b24 [19] https://www.semanticscholar.org/paper/5b750f3d763d728ae2bcf2ce3e6cf67a8281bb2b [20] https://www.semanticscholar.org/paper/34883bf28c7a988eb2c2fe458b7eab3180b36dcc [21] https://www.semanticscholar.org/paper/b64319315d02b2cc1dff936d69be40d78d15f6b9 [22] https://www.semanticscholar.org/paper/c4ca4d645825a5b8d7389c45bcfcad0eeebecd81 [23] https://www.ncbi.nlm.nih.gov/pmc/articles/PMC11734947/ [24] https://www.reddit.com/r/PoliticalScience/comments/17iwhqi/john_mearsheimer_is_wrong_about_ukraine/ [25] https://www.reddit.com/r/geopolitics/comments/1ih646n/john_mearsheimer_is_offensive_realist_who_should/ [26] https://www.reddit.com/r/neoliberal/comments/tjhwi4/a_response_to_mearsheimers_views_on_nato_ukraine/ [27] https://www.reddit.com/r/IRstudies/comments/1b12pdh/genuine_structural_realist_cases_against_us/ [28] https://www.reddit.com/r/lexfridman/comments/17xl8jk/john_mearsheimer_israelpalestine_russiaukraine/ [29] https://www.reddit.com/r/geopolitics/comments/17xve8j/people_give_too_much_credit_to_the_realist/ [30] https://www.reddit.com/r/PoliticalDiscussion/comments/zvfquu/do_you_agree_with_john_mearsheimers_complex_view/ [31] https://www.reddit.com/r/geopolitics/comments/1bghzbp/john_mearshimer_and_ukraine/ [32] https://www.reddit.com/r/LabourUK/comments/tbzs2d/john_mearsheimer_on_why_the_west_is_principally/ [33] https://www.reddit.com/r/IRstudies/comments/1gjus1i/playing_devils_advocate_to_john_mearsheimer/ [34] https://www.reddit.com/r/TheAllinPodcasts/comments/1fipvmu/john_mearsheimer_and_jeffrey_sachs_on_american/ [35] https://www.e-ir.info/2024/03/31/dissecting-the-realist-argument-for-russias-invasion-of-ukraine/ [36] https://www.youtube.com/watch?v=G6YOVl5LKTs [37] https://www.researchgate.net/publication/362890238_Mearsheimer_Realism_and_the_Ukraine_War [38] https://www.ndsmcobserver.com/article/2024/01/john-mearsheimer-talks-war-and-international-politics [39] https://euideas.eui.eu/2022/07/11/john-mearsheimers-lecture-on-ukraine-why-he-is-wrong-and-what-are-the-consequences/ [40] https://academic.oup.com/ia/article-pdf/98/6/1873/47659084/iiac217.pdf [41] https://www.youtube.com/watch?v=qciVozNtCDM [42] https://metacpc.org/en/mearsheimer2022/ [43] https://www.fpri.org/article/2023/01/the-realist-case-for-ukraine/ [44] https://www.mearsheimer.com/wp-content/uploads/2019/06/Why-the-Ukraine-Crisis-Is.pdf [45] https://www.newyorker.com/news/q-and-a/why-john-mearsheimer-blames-the-us-for-the-crisis-in-ukraine [46] https://www.semanticscholar.org/paper/cd2fd9e8ea82fa4e7f2f66a2eb517f4ba34981a0 [47] https://www.semanticscholar.org/paper/99942047e1e43e77ef76e147e51b725a63d86e22 [48] https://www.semanticscholar.org/paper/a53f98c63c58e4268856bde3883abc72e43e03bf [49] https://www.semanticscholar.org/paper/471f43cd36c53141ee24a431eef520bec311c15c [50] https://www.semanticscholar.org/paper/d56b89349fade26cef69c1d0cffd6887adca102d [51] https://www.semanticscholar.org/paper/50f504029753ffb7eec4d2660f29beb48b682803 [52] https://www.semanticscholar.org/paper/e2f85f09340e854efcfc4df9d1aabd2e533e1051 [53] https://www.reddit.com/r/UkraineRussiaReport/comments/1ghs32m/ru_pov_jeffrey_sachss_view_on_the_lead_up_and/ [54] https://www.reddit.com/r/EndlessWar/comments/1iwpc2e/ukraine_war_is_over_jeffrey_sachs_explosive/ [55] https://www.reddit.com/r/UnitedNations/comments/1ivq4zg/there_will_be_no_war/ [56] https://www.reddit.com/r/chomsky/comments/1gx5c5k/jeffrey_sachs_explains_the_background_to_the/ [57] https://www.reddit.com/r/chomsky/comments/1ix8z9a/jeffery_sachs_providing_clarity/ [58] https://www.reddit.com/r/chomsky/comments/1ism3vj/jeffrey_sachs_on_us_russia_talks_to_end_ukraine/ [59] https://www.reddit.com/r/geopolitics/comments/1e04cpd/i_do_not_understand_the_prorussia_stance_from/ [60] https://www.reddit.com/r/PoliticalVideo/comments/1izr6g9/economist_prof_jeffrey_sachs_addresses_eu/ [61] https://www.reddit.com/r/LabourUK/comments/1iw9u56/economist_prof_jeffrey_sachs_addresses_eu/ [62] https://www.reddit.com/r/TheAllinPodcasts/comments/1cjfkbx/fact_checking_david_sachs_data_sources_on_ukraine/ [63] https://www.reddit.com/r/chomsky/comments/1e4n8ea/why_wont_the_us_help_negotiate_a_peaceful_end_to/ [64] https://www.reddit.com/r/ukraine/comments/13lrmgo/rebuttal_to_jeffrey_sachs_ad_in_the_new_york/ [65] https://www.reddit.com/r/chomsky/comments/1ipg351/you_can_immediately_tell_who_in_this_sub_doesnt/ [66] https://www.youtube.com/watch?v=RiK6DijNLGE [67] https://www.internationalaffairs.org.au/australianoutlook/why-nato-expansion-explains-russias-actions-in-ukraine/ [68] https://www.youtube.com/watch?v=P7ThOU4xKaU [69] https://www.jeffsachs.org/newspaper-articles/s6ap8hxhp34hg252wtwwwtdw4afw7x [70] https://www.jeffsachs.org/newspaper-articles/wgtgma5kj69pbpndjr4wf6aayhrszm [71] https://www.youtube.com/watch?v=xfRG1Cqda2M [72] https://voxukraine.org/en/open-letter-to-jeffrey-sachs [73] https://www.youtube.com/watch?v=AmZoJ1vKEKk [74] https://www.youtube.com/watch?v=YnBakiVQf-s [75] https://www.project-syndicate.org/commentary/russia-nato-security-through-ukrainian-neutrality-by-jeffrey-d-sachs-2022-02 [76] https://www.commondreams.org/opinion/nato-chief-admits-expansion-behind-russian-invasion [77] https://www.youtube.com/watch?v=-MmJfmTgvAk [78] https://www.youtube.com/watch?v=ava7rqirOYI [79] https://jordantimes.com/opinion/jeffrey-d-sachs/war-ukraine-was-not-%E2%80%98unprovoked%E2%80%99 [80] https://www.reddit.com/r/geopolitics/comments/1d8ony5/john_mearsheimers_opinion_on_ukraines_own_ability/ [81] https://thegeopolitics.com/mearsheimer-revisited-how-offensive-realisms-founder-is-inconsistent-on-the-ukraine-russia-war/ [82] https://www.scielo.br/j/rbpi/a/MvWrWYGGtcLhgtsFRrmdmcx/ [83] https://www.degruyter.com/document/doi/10.1515/auk-2022-2023/html?lang=en [84] https://blog.prif.org/2023/07/26/russian-self-defense-fact-checking-arguments-on-the-russo-ukrainian-war-by-john-j-mearsheimer-and-others/ [85] https://europeanleadershipnetwork.org/commentary/the-ukraine-crisis-according-to-john-j-mearsheimer-impeccable-logic-wrong-facts/ [86] https://pjia.com.pk/index.php/pjia/article/download/837/587 [87] https://www.reddit.com/r/TheAllinPodcasts/comments/1e4noiz/where_is_sacks_prorussia_motive_coming_from/ [88] https://www.reddit.com/r/geopolitics/comments/1an20x2/why_did_boris_johnson_tell_ukraine_not_to_take/ [89] https://www.reddit.com/r/ukraine/comments/1gjfcwg/media_reveals_deal_russia_offered_to_ukraine_at/ [90] https://www.reddit.com/r/AskARussian/comments/1d3pv6y/do_you_feel_like_the_west_was_actively_sabotaging/
-
@ 3bf0c63f:aefa459d
2024-06-13 15:40:18Why relay hints are important
Recently Coracle has removed support for following relay hints in Nostr event references.
Supposedly Coracle is now relying only on public key hints and
kind:10002
events to determine where to fetch events from a user. That is a catastrophic idea that destroys much of Nostr's flexibility for no gain at all.- Someone makes a post inside a community (either a NIP-29 community or a NIP-87 community) and others want to refer to that post in discussions in the external Nostr world of
kind:1
s -- now that cannot work because the person who created the post doesn't have the relays specific to those communities in their outbox list; - There is a discussion happening in a niche relay, for example, a relay that can only be accessed by the participants of a conference for the duration of that conference -- since that relay is not in anyone's public outbox list, it's impossible for anyone outside of the conference to ever refer to these events;
- Some big public relays, say, relay.damus.io, decide to nuke their databases or periodically delete old events, a user keeps using that big relay as their outbox because it is fast and reliable, but chooses to archive their old events in a dedicated archival relay, say, cellar.nostr.wine, while prudently not including that in their outbox list because that would make no sense -- now it is impossible for anyone to refer to old notes from this user even though they are publicly accessible in cellar.nostr.wine;
- There are topical relays that curate content relating to niche (non-microblogging) topics, say, cooking recipes, and users choose to publish their recipes to these relays only -- but now they can't refer to these relays in the external Nostr world of
kind:1
s because these topical relays are not in their outbox lists. - Suppose a user wants to maintain two different identities under the same keypair, say, one identity only talks about soccer in English, while the other only talks about art history in French, and the user very prudently keeps two different
kind:10002
events in two different sets of "indexer" relays (or does it in some better way of announcing different relay sets) -- now one of this user's audiences cannot ever see notes created by him with their other persona, one half of the content of this user will be inacessible to the other half and vice-versa. - If for any reason a relay does not want to accept events of a certain kind a user may publish to other relays, and it would all work fine if the user referenced that externally-published event from a normal event, but now that externally-published event is not reachable because the external relay is not in the user's outbox list.
- If someone, say, Alex Jones, is hard-banned everywhere and cannot event broadcast
kind:10002
events to any of the commonly used index relays, that person will now appear as banned in most clients: in an ideal world in which clients followednprofile
and other relay hints Alex Jones could still live a normal Nostr life: he would print business cards with hisnprofile
instead of annpub
and clients would immediately know from what relay to fetch his posts. When other users shared his posts or replied to it, they would include a relay hint to his personal relay and others would be able to see and then start following him on that relay directly -- now Alex Jones's events cannot be read by anyone that doesn't already know his relay.
- Someone makes a post inside a community (either a NIP-29 community or a NIP-87 community) and others want to refer to that post in discussions in the external Nostr world of
-
@ d360efec:14907b5f
2025-03-01 12:58:51ภาพรวม (Integrated Overview)
ถ้าพิจารณาทั้ง TF Daily, 4H, และ 15m (พร้อมข้อมูล Money Flow ที่เป็นลบในทุก TF) ราคาปัจจุบันประมาณ 84,579
การวิเคราะห์แบบรวม*
-
แนวโน้ม (Trend):
- Daily: ขาลง (Bearish) แม้ว่าราคาจะอยู่เหนือเส้นค่าเฉลี่ยเคลื่อนที่ (EMA) แต่ Money Flow ที่เป็นลบอย่างรุนแรง บ่งชี้ถึงแนวโน้มขาลง
- 4H: ขาลง (Bearish) Money Flow เป็นลบอย่างมาก และมี รูปแบบ Head and Shoulders ที่มีโอกาสเกิดขึ้น
- 15m: ขาลง (Bearish) Money Flow เป็นลบ
-
SMC & ICT (Smart Money Concepts & Inner Circle Trader):
- Buyside Liquidity: อยู่เหนือราคาสูงสุดปัจจุบัน ระดับราคาที่ อาจ เป็นแนวต้าน (จากกราฟ Daily): 90456.8, 92755.8, 95054.9, 97354.0, 99653.1, 101952.1, 104251.3, 106550.3, 109998.9, และ 117000.0 ใน TF 15m, Buyside Liquidity คือจุดสูงสุดของแท่งเทียนก่อนหน้า
- Sellside Liquidity: แนวรับสำคัญ: 80,000 (Neckline ของ Head and Shoulders ใน TF 4H, ตัวเลขกลม, แนวรับทางจิตวิทยา) แนวรับอื่นๆ: 83559.5, 81260.4, 78961.4, 76662.3, 74363.2, 72064.1, 69705.1, 67400.0, 66811.7, และ 65166.9 (จากกราฟ Daily) ใน TF 15m, Sellside Liquidity คือจุดต่ำสุดของแท่งเทียนก่อนหน้า
-
Money Flow:
- Daily: เป็นลบอย่างมาก (Strongly Negative)
- 4H: เป็นลบอย่างมาก (Strongly Negative)
- 15m: เป็นลบ (Negative)
- นี่คือตัวบ่งชี้ที่สำคัญที่สุดในขณะนี้ และเป็นขาลงในทุก Timeframe
-
EMA (Exponential Moving Averages):
- Daily: ราคาอยู่เหนือ EMA 50 และ 200 แต่ถูกหักล้างด้วย Money Flow ที่เป็นลบ
- 4H: ราคาอยู่เหนือ EMA 50 และ 200 แต่ถูกหักล้างด้วย Money Flow ที่เป็นลบ
- 15m: ราคาแกว่งตัวรอบ EMA 50, อยู่เหนือ EMA 200 แต่ถูกหักล้างด้วย Money Flow ที่เป็นลบ
-
Trend Strength (AlgoAlpha):
- Daily: เมฆ Ichimoku เป็นสีเทา (Neutral - เป็นกลาง)
- 4H: เมฆ Ichimoku เป็นสีเทา (Neutral - เป็นกลาง)
- 15m: เมฆ Ichimoku เป็นสีเทา (Neutral - เป็นกลาง)
-
Chart Patterns (รูปแบบกราฟ):
- Daily: ไม่มีรูปแบบที่ชัดเจน แต่มีการอ่อนตัวของราคา
- 4H: มีโอกาสเกิด รูปแบบ Head and Shoulders (กลับหัว) (Bearish - ขาลง)
- 15m: ไม่มีรูปแบบที่ชัดเจน แต่อาจเป็นส่วนหนึ่งของ Right Shoulder ใน TF 4H
กลยุทธ์ Day Trade (SMC-Based)
เนื่องจาก Money Flow ที่เป็นลบอย่างท่วมท้นในทุก Timeframes และรูปแบบ Head and Shoulders ที่มีโอกาสเกิดขึ้นใน TF 4H กลยุทธ์การซื้อขายที่สมเหตุสมผล เพียงอย่างเดียว คือ การป้องกันอย่างเข้มงวด โดยเน้นที่ การหลีกเลี่ยงสถานะ Long และพิจารณาสถานะ Short เฉพาะ เมื่อมีเงื่อนไขที่เข้มงวดมากเท่านั้น
-
Long (Buy): ไม่แนะนำโดยเด็ดขาด (Absolutely, unequivocally not recommended) การทำเช่นนี้จะเป็นการซื้อขายสวนทางกับแนวโน้มหลักและสัญญาณ Money Flow ที่ชัดเจน
-
Short (Sell):
- Entry (จุดเข้า): นี่คือการเทรด เดียว ที่ อาจ มีเหตุผลสนับสนุน, แต่ เฉพาะ เมื่อเงื่อนไข ทั้งหมด ต่อไปนี้เป็นจริง:
- รูปแบบ Head and Shoulders ใน TF 4H เสร็จสมบูรณ์ ด้วยการ Breakout ที่ชัดเจนใต้ Neckline (80,000-81,000)
- การ Breakout ใต้ Neckline เกิดขึ้นพร้อมกับ Volume ที่สูง
- Money Flow ใน ทั้งสาม Timeframes ยังคง เป็นลบอย่างมาก
- คุณมีสัญญาณ Bearish อื่นๆ ยืนยัน (เช่น รูปแบบแท่งเทียน Bearish, Bearish Divergence)
- Target (เป้าหมาย): ระดับ Sellside Liquidity (เช่น 78961.4, 76662.3)
- Stop Loss (จุดตัดขาดทุน): เหนือ Neckline หรือ Right Shoulder ทันที จำเป็นต้องมี Stop Loss ที่เข้มงวดอย่างยิ่ง
- Entry (จุดเข้า): นี่คือการเทรด เดียว ที่ อาจ มีเหตุผลสนับสนุน, แต่ เฉพาะ เมื่อเงื่อนไข ทั้งหมด ต่อไปนี้เป็นจริง:
-
No Trade (ไม่เทรด): เป็นตัวเลือกที่ ดีที่สุด สำหรับนักเทรด/นักลงทุนส่วนใหญ่ ความเสี่ยงที่จะเกิดการปรับฐานครั้งใหญ่มีสูงมาก
สรุป
สถานการณ์ของ BTC คือ Bearish อย่างมาก Money Flow ที่เป็นลบอย่างมากในทุก Timeframes เป็นปัจจัยสำคัญที่สุด ซึ่งมีน้ำหนักมากกว่าสัญญาณ Bullish ใดๆ ก่อนหน้านี้จาก EMA รูปแบบ Head and Shoulders ที่มีโอกาสเกิดขึ้นใน TF 4H ช่วยเพิ่มการยืนยันแนวโน้ม Bearish สถานะ Long ไม่สมเหตุสมผลอย่างยิ่ง สถานะ Short อาจ พิจารณาได้, แต่ ต้อง มีการยืนยันสัญญาณที่ชัดเจน ทั้งหมด และมีการบริหารความเสี่ยงที่เข้มงวดมาก "Wait and See" (รอดู) และการรักษาเงินทุนเป็นสิ่งสำคัญที่สุด
Disclaimer: การวิเคราะห์นี้เป็นเพียงความคิดเห็นส่วนตัว ไม่ถือเป็นคำแนะนำในการลงทุน ผู้ลงทุนควรศึกษาข้อมูลเพิ่มเติมและตัดสินใจด้วยความรอบคอบ
-
-
@ 266815e0:6cd408a5
2024-04-24 23:02:21NOTE: this is just a quick technical guide. sorry for the lack of details
Install NodeJS
Download it from the official website https://nodejs.org/en/download
Or use nvm https://github.com/nvm-sh/nvm?tab=readme-ov-file#install--update-script
bash wget -qO- https://raw.githubusercontent.com/nvm-sh/nvm/v0.39.7/install.sh | bash nvm install 20
Clone example config.yml
bash wget https://raw.githubusercontent.com/hzrd149/blossom-server/master/config.example.yml -O config.yml
Modify config.yml
```bash nano config.yml
or if your that type of person
vim config.yml ```
Run blossom-server
```bash npx blossom-server-ts
or install it locally and run using npm
npm install blossom-server-ts ./node_modules/.bin/blossom-server-ts ```
Now you can open http://localhost:3000 and see your blossom server
And if you set the
dashboard.enabled
option in theconfig.yml
you can open http://localhost:3000/admin to see the admin dashboard -
@ 3bf0c63f:aefa459d
2024-01-15 11:15:06Pequenos problemas que o Estado cria para a sociedade e que não são sempre lembrados
- **vale-transporte**: transferir o custo com o transporte do funcionário para um terceiro o estimula a morar longe de onde trabalha, já que morar perto é normalmente mais caro e a economia com transporte é inexistente. - **atestado médico**: o direito a faltar o trabalho com atestado médico cria a exigência desse atestado para todas as situações, substituindo o livre acordo entre patrão e empregado e sobrecarregando os médicos e postos de saúde com visitas desnecessárias de assalariados resfriados. - **prisões**: com dinheiro mal-administrado, burocracia e péssima alocação de recursos -- problemas que empresas privadas em competição (ou mesmo sem qualquer competição) saberiam resolver muito melhor -- o Estado fica sem presídios, com os poucos existentes entupidos, muito acima de sua alocação máxima, e com isto, segundo a bizarra corrente de responsabilidades que culpa o juiz que condenou o criminoso por sua morte na cadeia, juízes deixam de condenar à prisão os bandidos, soltando-os na rua. - **justiça**: entrar com processos é grátis e isto faz proliferar a atividade dos advogados que se dedicam a criar problemas judiciais onde não seria necessário e a entupir os tribunais, impedindo-os de fazer o que mais deveriam fazer. - **justiça**: como a justiça só obedece às leis e ignora acordos pessoais, escritos ou não, as pessoas não fazem acordos, recorrem sempre à justiça estatal, e entopem-na de assuntos que seriam muito melhor resolvidos entre vizinhos. - **leis civis**: as leis criadas pelos parlamentares ignoram os costumes da sociedade e são um incentivo a que as pessoas não respeitem nem criem normas sociais -- que seriam maneiras mais rápidas, baratas e satisfatórias de resolver problemas. - **leis de trãnsito**: quanto mais leis de trânsito, mais serviço de fiscalização são delegados aos policiais, que deixam de combater crimes por isto (afinal de contas, eles não querem de fato arriscar suas vidas combatendo o crime, a fiscalização é uma excelente desculpa para se esquivarem a esta responsabilidade). - **financiamento educacional**: é uma espécie de subsídio às faculdades privadas que faz com que se criem cursos e mais cursos que são cada vez menos recheados de algum conhecimento ou técnica útil e cada vez mais inúteis. - **leis de tombamento**: são um incentivo a que o dono de qualquer área ou construção "histórica" destrua todo e qualquer vestígio de história que houver nele antes que as autoridades descubram, o que poderia não acontecer se ele pudesse, por exemplo, usar, mostrar e se beneficiar da história daquele local sem correr o risco de perder, de fato, a sua propriedade. - **zoneamento urbano**: torna as cidades mais espalhadas, criando uma necessidade gigantesca de carros, ônibus e outros meios de transporte para as pessoas se locomoverem das zonas de moradia para as zonas de trabalho. - **zoneamento urbano**: faz com que as pessoas percam horas no trânsito todos os dias, o que é, além de um desperdício, um atentado contra a sua saúde, que estaria muito melhor servida numa caminhada diária entre a casa e o trabalho. - **zoneamento urbano**: torna ruas e as casas menos seguras criando zonas enormes, tanto de residências quanto de indústrias, onde não há movimento de gente alguma. - **escola obrigatória + currículo escolar nacional**: emburrece todas as crianças. - **leis contra trabalho infantil**: tira das crianças a oportunidade de aprender ofícios úteis e levar um dinheiro para ajudar a família. - **licitações**: como não existem os critérios do mercado para decidir qual é o melhor prestador de serviço, criam-se comissões de pessoas que vão decidir coisas. isto incentiva os prestadores de serviço que estão concorrendo na licitação a tentar comprar os membros dessas comissões. isto, fora a corrupção, gera problemas reais: __(i)__ a escolha dos serviços acaba sendo a pior possível, já que a empresa prestadora que vence está claramente mais dedicada a comprar comissões do que a fazer um bom trabalho (este problema afeta tantas áreas, desde a construção de estradas até a qualidade da merenda escolar, que é impossível listar aqui); __(ii)__ o processo corruptor acaba, no longo prazo, eliminando as empresas que prestavam e deixando para competir apenas as corruptas, e a qualidade tende a piorar progressivamente. - **cartéis**: o Estado em geral cria e depois fica refém de vários grupos de interesse. o caso dos taxistas contra o Uber é o que está na moda hoje (e o que mostra como os Estados se comportam da mesma forma no mundo todo). - **multas**: quando algum indivíduo ou empresa comete uma fraude financeira, ou causa algum dano material involuntário, as vítimas do caso são as pessoas que sofreram o dano ou perderam dinheiro, mas o Estado tem sempre leis que prevêem multas para os responsáveis. A justiça estatal é sempre muito rígida e rápida na aplicação dessas multas, mas relapsa e vaga no que diz respeito à indenização das vítimas. O que em geral acontece é que o Estado aplica uma enorme multa ao responsável pelo mal, retirando deste os recursos que dispunha para indenizar as vítimas, e se retira do caso, deixando estas desamparadas. - **desapropriação**: o Estado pode pegar qualquer propriedade de qualquer pessoa mediante uma indenização que é necessariamente inferior ao valor da propriedade para o seu presente dono (caso contrário ele a teria vendido voluntariamente). - **seguro-desemprego**: se há, por exemplo, um prazo mínimo de 1 ano para o sujeito ter direito a receber seguro-desemprego, isto o incentiva a planejar ficar apenas 1 ano em cada emprego (ano este que será sucedido por um período de desemprego remunerado), matando todas as possibilidades de aprendizado ou aquisição de experiência naquela empresa específica ou ascensão hierárquica. - **previdência**: a previdência social tem todos os defeitos de cálculo do mundo, e não importa muito ela ser uma forma horrível de poupar dinheiro, porque ela tem garantias bizarras de longevidade fornecidas pelo Estado, além de ser compulsória. Isso serve para criar no imaginário geral a idéia da __aposentadoria__, uma época mágica em que todos os dias serão finais de semana. A idéia da aposentadoria influencia o sujeito a não se preocupar em ter um emprego que faça sentido, mas sim em ter um trabalho qualquer, que o permita se aposentar. - **regulamentação impossível**: milhares de coisas são proibidas, há regulamentações sobre os aspectos mais mínimos de cada empreendimento ou construção ou espaço. se todas essas regulamentações fossem exigidas não haveria condições de produção e todos morreriam. portanto, elas não são exigidas. porém, o Estado, ou um agente individual imbuído do poder estatal pode, se desejar, exigi-las todas de um cidadão inimigo seu. qualquer pessoa pode viver a vida inteira sem cumprir nem 10% das regulamentações estatais, mas viverá também todo esse tempo com medo de se tornar um alvo de sua exigência, num estado de terror psicológico. - **perversão de critérios**: para muitas coisas sobre as quais a sociedade normalmente chegaria a um valor ou comportamento "razoável" espontaneamente, o Estado dita regras. estas regras muitas vezes não são obrigatórias, são mais "sugestões" ou limites, como o salário mínimo, ou as 44 horas semanais de trabalho. a sociedade, porém, passa a usar esses valores como se fossem o normal. são raras, por exemplo, as ofertas de emprego que fogem à regra das 44h semanais. - **inflação**: subir os preços é difícil e constrangedor para as empresas, pedir aumento de salário é difícil e constrangedor para o funcionário. a inflação força as pessoas a fazer isso, mas o aumento não é automático, como alguns economistas podem pensar (enquanto alguns outros ficam muito satisfeitos de que esse processo seja demorado e difícil). - **inflação**: a inflação destrói a capacidade das pessoas de julgar preços entre concorrentes usando a própria memória. - **inflação**: a inflação destrói os cálculos de lucro/prejuízo das empresas e prejudica enormemente as decisões empresariais que seriam baseadas neles. - **inflação**: a inflação redistribui a riqueza dos mais pobres e mais afastados do sistema financeiro para os mais ricos, os bancos e as megaempresas. - **inflação**: a inflação estimula o endividamento e o consumismo. - **lixo:** ao prover coleta e armazenamento de lixo "grátis para todos" o Estado incentiva a criação de lixo. se tivessem que pagar para que recolhessem o seu lixo, as pessoas (e conseqüentemente as empresas) se empenhariam mais em produzir coisas usando menos plástico, menos embalagens, menos sacolas. - **leis contra crimes financeiros:** ao criar legislação para dificultar acesso ao sistema financeiro por parte de criminosos a dificuldade e os custos para acesso a esse mesmo sistema pelas pessoas de bem cresce absurdamente, levando a um percentual enorme de gente incapaz de usá-lo, para detrimento de todos -- e no final das contas os grandes criminosos ainda conseguem burlar tudo.
-
@ d360efec:14907b5f
2025-03-01 12:55:57$OKX:BTCUSDT.P
Overview (Integrated Overview)
All three provided timeframes (Daily, 4H, and 15m, all now confirmed to have negative Money Flow), The current price is approximately 84,579.
Integrated Analysis
-
Trend:
- Daily: Bearish. While the price is above the EMAs, the strongly negative Money Flow on the Daily chart overrides the EMA signal, indicating a bearish trend. The Ichimoku Cloud is neutral, further supporting the idea that the previous bullish trend is weakening.
- 4H: Bearish. Strongly negative Money Flow and a potential (but not yet confirmed) inverted Head and Shoulders pattern.
- 15m: Bearish. Negative Money Flow.
-
SMC & ICT (Smart Money Concepts & Inner Circle Trader):
- Buyside Liquidity: Above the current high. Potential resistance levels (derived from the Daily chart image, assuming it's from 2025): 90456.8, 92755.8, 95054.9, 97354.0, 99653.1, 101952.1, 104251.3, 106550.3, 109998.9, and 117000.0. On the 15m chart (though we are prioritizing the Daily and 4H now), Buyside Liquidity would be represented by recent swing highs.
- Sellside Liquidity: Key support: 80,000 (this is the approximate neckline of the potential Head and Shoulders pattern on the 4H chart, a round number, and a psychological support level). Other support levels (derived from the Daily chart image): 83559.5, 81260.4, 78961.4, 76662.3, 74363.2, 72064.1, 69705.1, 67400.0, 66811.7, and 65166.9. On the 15m chart, Sellside Liquidity would be represented by recent swing lows.
-
Money Flow:
- Daily: Strongly Negative. This is a major bearish signal.
- 4H: Strongly Negative. This reinforces the bearish signal and is consistent with the Daily chart.
- 15m: Negative. This confirms the short-term outflow of money.
- The consistently negative Money Flow across all timeframes is the most important and dominant indicator in this analysis.
-
EMA (Exponential Moving Averages):
- Daily: Price is above the EMA 50 (yellow) and EMA 200 (white). However, the strongly negative Money Flow overrides the bullish signal typically provided by the price being above the EMAs.
- 4H: Price is above the EMA 50 and EMA 200. Again, the strongly negative Money Flow overrides this.
- 15m: Price is oscillating around the EMA 50 and above the EMA 200. The negative Money Flow overrides this.
-
Trend Strength (AlgoAlpha Indicator):
- Daily: The Ichimoku Cloud is gray (Neutral). This is not a bullish signal and is consistent with the negative Money Flow.
- 4H: The Ichimoku Cloud is gray (Neutral).
- 15m: The Ichimoku Cloud is gray (Neutral).
-
Chart Patterns:
- Daily: No fully formed classic chart pattern. However, the recent price action shows a loss of upward momentum and the beginning of a potential downward move. This weakening price action, combined with the strongly negative Money Flow, is bearish.
- 4H: Potential inverted Head and Shoulders pattern. This is a bearish reversal pattern. It's crucial to understand that this pattern is not yet confirmed. Confirmation requires a decisive break below the neckline (approximately 80,000-81,000), with increased volume and continued negative Money Flow.
- 15m: No clearly defined classic chart pattern. The 15m price action is best understood as potentially forming the right shoulder of the 4H Head and Shoulders.
SMC-Based Day Trading Strategies
Given the overwhelmingly bearish evidence – primarily the strongly negative Money Flow across all timeframes, combined with the potential Head and Shoulders pattern on the 4H chart – the only justifiable trading strategy is extreme caution and a strong bias against long positions. Short positions have a slightly higher probability of success, but only under very specific conditions and with extremely tight risk management.
-
Long (Buy): Absolutely, unequivocally not recommended. There is no technical justification for entering a long position at this time. This would be trading directly against the dominant bearish signals.
-
Short (Sell):
- Entry: This is the only trade with any potential, and only if all of the following conditions are met:
- The Head and Shoulders pattern on the 4H chart fully completes with a decisive break below the neckline (80,000-81,000).
- The breakout below the neckline occurs on significantly increased volume.
- The Money Flow on all three timeframes (Daily, 4H, and 15m) remains strongly negative at the time of the breakout.
- Additional bearish confirmation is present (e.g., bearish candlestick patterns, bearish divergences on other oscillators like RSI or MACD – which we cannot see from the provided images).
- Target: Sellside Liquidity levels, derived from the Daily chart. Potential targets include, but are not limited to: 78961.4, 76662.3, 74363.2, and potentially lower.
- Stop Loss: Immediately above the neckline (after the breakout) or above the high of the right shoulder (if placing the trade before a confirmed neckline break – which is extremely risky). An extremely tight stop-loss is absolutely mandatory due to the inherent volatility of BTC and the potential for false breakouts.
- Entry: This is the only trade with any potential, and only if all of the following conditions are met:
-
No Trade (Cash): This is, by far, the best and most prudent option for the vast majority of traders and investors. The risk of a substantial price decline is extremely high, given the confluence of bearish signals. Preserving capital should be the primary objective.
Key Levels to Watch:
- 80,000 - 81,000 (4H Chart): This is the neckline of the potential Head and Shoulders pattern. A sustained break below this level, with the confirming factors listed above, would be a strong bearish signal.
- Money Flow on all chart:
Conclusion
The overall technical picture for BTC, strongly bearish. The dominant factor is the consistently and strongly negative Money Flow across all three timeframes. This overrides any seemingly bullish signals from the EMAs. The potential (but unconfirmed) Head and Shoulders pattern on the 4H chart adds further weight to the bearish case.
Long positions are completely unjustified and extremely risky. Short positions might be considered, but only with the strictest possible entry criteria, complete confirmation from multiple indicators, and extremely tight risk management. The "Wait and See" approach, prioritizing capital preservation, is the most prudent strategy for most market participants. This situation calls for extreme caution and a defensive posture.
Disclaimer: This analysis is a personal opinion. It is not financial advice. Trading and investing in cryptocurrencies involves significant risk. Always do your own research and consult with a qualified financial advisor before making any investment decisions.
-
-
@ ed5774ac:45611c5c
2025-03-01 12:55:28Trump and Vance Expose Zelensky: The West’s Narrative Machine Meets Reality
In the modern era, the West has perfected the art of ruling through narratives. Stories, carefully crafted and disseminated, have become the primary tool for shaping public perception, justifying actions, and maintaining control. This narrative-driven approach to governance has been the cornerstone of Western power since the 20th century, and nowhere is this more evident than in the ongoing conflict in Ukraine. Enter Volodymyr Zelensky, the comedian-turned-president, who has become a poster child for this narrative-driven world order. But in a recent confrontation with Donald Trump and J.D. Vance, Zelensky’s carefully constructed facade crumbled, exposing the fragility of the Western storytelling empire.
The West’s Narrative Machine
As Alastair Crooke astutely observes in his article The Western Way of War: Owning the Narrative Trumps Reality ( https://www.unz.com/article/the-western-way-of-war-owning-the-narrative-trumps-reality), the West’s power lies not in its military or economic might alone but in its ability to control the narrative. Crooke argues that the West has mastered the art of “owning the story,” creating a reality that serves its interests, regardless of facts on the ground. This narrative dominance ensures that the general public—often referred to as the masses—follows along without questioning, accepting the official line as gospel truth.
To maintain this control, the West relies on carefully curated protagonists who can sell its stories to the world. Take, for example, the story of Volodymyr Zelensky, a former actor whose rise to power was itself a narrative triumph. Portrayed as a relatable outsider who defeated the corrupt establishment, Zelensky promised hope and reform. But behind this carefully crafted image lay darker forces. Oligarch Ihor Kolomoisky, one of Ukraine’s most powerful and controversial figures, played a pivotal role in Zelensky’s ascent. Kolomoisky, who owned the TV channel that aired Zelensky’s show Servant of the People, used his media empire to propel the political novice into the spotlight. This was not a grassroots movement but a calculated maneuver by Ukraine’s oligarchic elite to maintain control under a new, more palatable face.
Zelensky’s Rise and the West’s Geopolitical Strategy
Zelensky’s rise was not just a domestic political shift; it was a calculated move by the West to advance its long-standing goal of containing Russia and dominating Eurasia. The West, particularly the EU and NATO, saw Ukraine as a critical piece in its geopolitical chess game. By installing a pro-Western leader like Zelensky, the West aimed to pull Ukraine firmly into its orbit, knowing full well that such a move would antagonize Moscow. This was not an accidental escalation but a deliberate provocation, designed to create a pretext for further Western intervention.
To polish Zelensky’s image and present him as a beacon of hope for peace and the Westernization of Ukraine, the West also needed to whitewash Ukraine’s darker realities. This meant turning a blind eye to the corruption and oligarchic influence that underpinned Zelensky’s presidency. Equally ignored were the neo-Nazi crimes and policies that had been well-documented before 2014, such as the rise of far-right groups like Svoboda and the Azov Battalion, their glorification of Nazi collaborator Stepan Bandera, and their violent attacks on ethnic minorities, political opponents, and LGBTQ+ communities. These atrocities, once reported in Western media, were suddenly erased from the narrative after 2014, as if they had never existed, to preserve the image of Ukraine as an innocent victim in the West’s geopolitical chess game.
The Grand Chessboard: Ukraine as a Proxy
The West’s use of Ukraine as a geopolitical pawn is not a recent development. Its roots can be traced back to Zbigniew Brzezinski’s 1997 book The Grand Chessboard, in which the former U.S. National Security Advisor laid out a blueprint for American dominance in Eurasia. He famously wrote, “The one who rules the heartland rules the world, the one who rules East Europe rules the heartland, the one who rules Ukraine rules East Europe.” This statement foreshadowed the West’s strategic interest in Ukraine as a tool to contain and destabilize Russia—a goal that has driven Western policy for decades.
Even in 2008, Western leaders like Angela Merkel and Nicolas Sarkozy opposed Ukraine’s NATO membership, recognizing that such a move would provoke Russia. Classified cables from William Burns, the U.S. Ambassador to Russia at the time, echoed this sentiment. Burns warned that NATO expansion into Ukraine was a “red line” for Moscow, succinctly stating, “Nyet means nyet.” The West was fully aware that it was playing with fire, risking a direct confrontation with Russia that could escalate into a potential World War III. Yet, despite these warnings, the West pushed forward with its agenda, pulling Ukraine into its orbit. The stakes were simply too high to abandon the plan.
At the heart of this strategy lies the West’s desperate need to sustain its faltering economic system. Since the 2008 financial crisis, the Western debt-driven financial model has teetered on the brink of collapse. Sovereign debt crises loom large, and the banking industry, reliant on endless money printing, urgently needs new collateral to back its ever-expanding debt. Russia’s vast resource-rich territories—filled with oil, gas, minerals, and rare earth metals—offer a tempting solution.
By dominating Russia and seizing control of its natural wealth, the West could issue resource-backed bonds, financial instruments tied directly to Russia’s oil and gas reserves. These bonds would allow the West to leverage Russia’s resources as collateral, providing a stable foundation for its debt-ridden financial system. Controlling access to these resources would ensure currency stability and keep Western economies functioning, even as debt levels soar.
But the West’s ambitions extend beyond economic survival. Controlling Russia’s resources would also allow it to sever China’s access to critical raw materials, undermining Beijing’s economic and military development. By dominating Russia’s energy exports, the West could manipulate global energy prices, stabilizing its own economies while weakening rivals like China, which relies heavily on Russian energy. The U.S. and EU view China as the greatest geopolitical challenge of the 21st century, and by encircling and weakening Russia, they aim to isolate and contain Beijing. In this grand strategy, Ukraine is not merely a pawn but a critical linchpin in the West’s efforts to reshape the global order—even at the risk of catastrophic conflict.
Zelensky’s Role in the West’s Strategy
To execute this high-stakes strategy, the West needed a compelling narrative—one that could justify its actions, rally public support, and obscure its true motives. Therefore, they created the narrative around Volodymyr Zelensky, casting him as a global symbol of resistance, a hero fighting against the “evil” of Putin’s Russia. The West, particularly the EU and NATO, embraced this narrative, using it to justify billions in aid—much of which served as a cover for money laundering—sanctions on Russia, and the broader geopolitical agenda outlined above. Zelensky became the face of this narrative, a willing participant in the West’s grand strategy, even as his own country was turned into a battlefield.
Zelensky’s narrative, however, is built on shaky ground. Take, for example, the claim that Putin is “non-agreement capable”—a talking point frequently parroted by Western media and politicians. This assertion is not only baseless but laughably ironic. Unlike the West, which has a long history of signing agreements only to disregard them (e.g., the Minsk agreements, the Istanbul peace deal in March 2022, or NATO’s broken promise not to expand eastward), Putin has consistently honored the contracts and treaties he has signed. The West, not Russia, is the true exemplar of “non-agreement capable” behavior.
Yet, Zelensky and his Western backers continue to peddle these lies, confident that the general public will follow. The narrative is simple: Ukraine is the victim, Russia is the aggressor, and any suggestion to the contrary is dismissed as propaganda. This black-and-white storytelling leaves no room for nuance, truth, or accountability.
Trump and Vance: Slapping Down the Narrative
Enter Donald Trump and J.D. Vance. In a recent meeting with Zelensky, the duo did what few in the West have dared to do: they called out the narrative for what it is—a fabrication. Trump, known for his blunt rhetoric, and Vance, a rising voice of realism in foreign policy, confronted Zelensky with the uncomfortable truth. They exposed the contradictions in his claims, highlighting the West’s role in prolonging the conflict and the absurdity of expecting the world to believe in a one-sided story.
Zelensky, accustomed to the adulation of Western elites and the uncritical support of the media, was unprepared for this reality check. His carefully rehearsed lines fell flat, his confidence wavered, and the mask slipped. The confrontation was a rare moment of clarity in a sea of narrative-driven fog, a reminder that truth, when spoken boldly, can still shatter even the most entrenched lies.
The Meltdown of a Narrative Puppet
Zelensky’s meltdown in the face of Trump and Vance’s truth-telling is emblematic of a larger crisis in the West’s narrative-driven order. For decades, the West has relied on storytelling to maintain its dominance, but this approach is increasingly unsustainable. The rise of alternative media, the growing skepticism of the public, and the emergence of leaders like Trump and Vance who refuse to play along are exposing the cracks in the narrative machine.
Zelensky, the figurehead who believed he could sell his lies to 8 billion people, is a cautionary tale. He is not the master of his narrative but a puppet, manipulated by his masters in the EU and NATO. His failure to withstand scrutiny is a testament to the hollowness of the stories he tells and the fragility of the system that props him up.
Conclusion: The End of Narrative Dominance?
The confrontation between Trump/Vance and Zelensky is more than just a political spat; it is a microcosm of the broader struggle between narrative and reality. The West’s reliance on storytelling as a tool of governance is reaching its limits. As Crooke warns, when the narrative diverges too far from reality, it risks collapsing under its own weight.
The general public, once content to follow blindly, is beginning to question. Leaders like Trump and Vance are challenging the status quo, forcing the world to confront uncomfortable truths. Zelensky’s meltdown is a sign of things to come—a harbinger of the end of narrative dominance and the return of reality-based governance. The question is, will the West adapt, or will it cling to its stories until the very end?
-
@ a296b972:e5a7a2e8
2025-03-01 12:45:01Hat das Corona-Ereignis Einfluss genommen auf die Bundestagswahl?
Eine zwingend notwendige Aufarbeitung der Corona-Zeit war noch nicht einmal Bestandteil der Wahlversprechungen in den Wahlprogrammen der Altparteien, die bekanntlich ohnehin nicht umgesetzt werden.
Bei einer hohen Wahlbeteiligung von rund 84 % haben sich rund 74 % für eine der Altparteien entschieden und rund 26 % für die AfD und das BSW.
Das Verhältnis von 74 zu 26 stellt in etwa das Verhältnis derjenigen dar, die sich für und gegen die Gen-Behandlung entschieden haben.
Kann es sein, dass sich die mehrheitlich genbehandelten Wähler unterbewusst für eine der Altparteien entschieden haben, weil sie hier recht sicher sein können, dass eine Aufarbeitung des Corona-Verbrechens nicht stattfinden wird?
Auch, wenn der öffentlich-rechtliche Propaganda-Apparat sehr darauf bedacht ist, die erdrückenden Erkenntnisse über die Schädlichkeit der Gen-Behandlung nicht zu thematisieren, dringt doch die eine oder andere Information zu den Gen-Behandelten durch.
Nach wie vor haben diese in der Mehrzahl ein heiliges Schweigegelübte abgelegt, denn ein ernsthafter Austausch findet auch nach 5 Jahren nicht statt. Die kognitive Dissonanz wirkt weiterhin. Sie wollen nicht, dass sie nach den aktuellen Erkenntnissen mit einem möglichen Fehler ihrer Entscheidung konfrontiert werden. Und hier sind sie bei der Wahl einer Altpartei auf der sicheren Seite, dass das auch von offizieller Stelle aus nicht geschieht.
Nach dieser Annahme wäre die Wahlentscheidung im Unterbewusstsein durch Angst manipuliert worden. Möglicherweise wäre so das Wahlergebnis die Folge der Corona-Zeit und indirekte Wahlmanipulation.
Bei der vorangegangenen Wahl durfte das Wahllokal nur mit einem Maulkorb betreten werden. Dieser wurde inzwischen durch einen DSA-gestützten meinungsfreiheitlichen Unseredemokratie-Maulkorb in den Köpften der Wähler ersetzt.
Die Regierungsbildung wird einige Zeit in Anspruch nehmen. In der Zwischenzeit werden die Friedensbemühungen für die Ukraine zwischen den USA und Russland mit derzeit guten Aussichten voranschreiten. Gleichzeitig findet eine Distanzierung von den USA statt und die EU, vor allem Deutschland, hält zur weiteren realitätsfremden Unterstützung der Ukraine und der für sie steigenden, aber nicht vorhandenen Gefahr einer russischen Invasion eine Kriegsertüchtigung dringend für notwendig.
Mit der Weiter-So-Politik wird der wirtschaftliche Niedergang Deutschlands voranschreiten.
Das Migrationsproblem wird sich nicht von alleine lösen. Es ist zu befürchten, dass es zu weiteren Messerstechereien kommt. Durch Aufrechterhalten der Brandmauer wird es zu weiteren absurden Entscheidungen der Alt-Parteien-Regierung kommen. Das wird dazu führen, dass diese Regierung keine Legislaturperiode von 4 Jahren halten wird. Es wird unter Umständen noch früher, vielleicht schon nach 2 Jahren zu Neuwahlen kommen.
Bereits einen Tag nach dem Wahlabend wird von Wahlmanipulation im Wahlkreis 106 Düsseldorf berichtet. Vermutlich kein Einzelfall. Viele Stimmen von Deutschen, die im Ausland leben, konnten nicht berücksichtigt werden. Viele der im Ausland lebenden haben das Land aufgrund der derzeit herrschenden Verhältnisse verlassen. Dass diese den Altparteien ihre Stimme geben, ist eher unwahrscheinlich. Es besteht auch noch die Möglichkeit, dass die gesamte Wahl annulliert werden muss.
-
@ 3bf0c63f:aefa459d
2024-01-14 14:52:16Drivechain
Understanding Drivechain requires a shift from the paradigm most bitcoiners are used to. It is not about "trustlessness" or "mathematical certainty", but game theory and incentives. (Well, Bitcoin in general is also that, but people prefer to ignore it and focus on some illusion of trustlessness provided by mathematics.)
Here we will describe the basic mechanism (simple) and incentives (complex) of "hashrate escrow" and how it enables a 2-way peg between the mainchain (Bitcoin) and various sidechains.
The full concept of "Drivechain" also involves blind merged mining (i.e., the sidechains mine themselves by publishing their block hashes to the mainchain without the miners having to run the sidechain software), but this is much easier to understand and can be accomplished either by the BIP-301 mechanism or by the Spacechains mechanism.
How does hashrate escrow work from the point of view of Bitcoin?
A new address type is created. Anything that goes in that is locked and can only be spent if all miners agree on the Withdrawal Transaction (
WT^
) that will spend it for 6 months. There is one of these special addresses for each sidechain.To gather miners' agreement
bitcoind
keeps track of the "score" of all transactions that could possibly spend from that address. On every block mined, for each sidechain, the miner can use a portion of their coinbase to either increase the score of oneWT^
by 1 while decreasing the score of all others by 1; or they can decrease the score of allWT^
s by 1; or they can do nothing.Once a transaction has gotten a score high enough, it is published and funds are effectively transferred from the sidechain to the withdrawing users.
If a timeout of 6 months passes and the score doesn't meet the threshold, that
WT^
is discarded.What does the above procedure mean?
It means that people can transfer coins from the mainchain to a sidechain by depositing to the special address. Then they can withdraw from the sidechain by making a special withdraw transaction in the sidechain.
The special transaction somehow freezes funds in the sidechain while a transaction that aggregates all withdrawals into a single mainchain
WT^
, which is then submitted to the mainchain miners so they can start voting on it and finally after some months it is published.Now the crucial part: the validity of the
WT^
is not verified by the Bitcoin mainchain rules, i.e., if Bob has requested a withdraw from the sidechain to his mainchain address, but someone publishes a wrongWT^
that instead takes Bob's funds and sends them to Alice's main address there is no way the mainchain will know that. What determines the "validity" of theWT^
is the miner vote score and only that. It is the job of miners to vote correctly -- and for that they may want to run the sidechain node in SPV mode so they can attest for the existence of a reference to theWT^
transaction in the sidechain blockchain (which then ensures it is ok) or do these checks by some other means.What? 6 months to get my money back?
Yes. But no, in practice anyone who wants their money back will be able to use an atomic swap, submarine swap or other similar service to transfer funds from the sidechain to the mainchain and vice-versa. The long delayed withdraw costs would be incurred by few liquidity providers that would gain some small profit from it.
Why bother with this at all?
Drivechains solve many different problems:
It enables experimentation and new use cases for Bitcoin
Issued assets, fully private transactions, stateful blockchain contracts, turing-completeness, decentralized games, some "DeFi" aspects, prediction markets, futarchy, decentralized and yet meaningful human-readable names, big blocks with a ton of normal transactions on them, a chain optimized only for Lighting-style networks to be built on top of it.
These are some ideas that may have merit to them, but were never actually tried because they couldn't be tried with real Bitcoin or inferfacing with real bitcoins. They were either relegated to the shitcoin territory or to custodial solutions like Liquid or RSK that may have failed to gain network effect because of that.
It solves conflicts and infighting
Some people want fully private transactions in a UTXO model, others want "accounts" they can tie to their name and build reputation on top; some people want simple multisig solutions, others want complex code that reads a ton of variables; some people want to put all the transactions on a global chain in batches every 10 minutes, others want off-chain instant transactions backed by funds previously locked in channels; some want to spend, others want to just hold; some want to use blockchain technology to solve all the problems in the world, others just want to solve money.
With Drivechain-based sidechains all these groups can be happy simultaneously and don't fight. Meanwhile they will all be using the same money and contributing to each other's ecosystem even unwillingly, it's also easy and free for them to change their group affiliation later, which reduces cognitive dissonance.
It solves "scaling"
Multiple chains like the ones described above would certainly do a lot to accomodate many more transactions that the current Bitcoin chain can. One could have special Lightning Network chains, but even just big block chains or big-block-mimblewimble chains or whatnot could probably do a good job. Or even something less cool like 200 independent chains just like Bitcoin is today, no extra features (and you can call it "sharding"), just that would already multiply the current total capacity by 200.
Use your imagination.
It solves the blockchain security budget issue
The calculation is simple: you imagine what security budget is reasonable for each block in a world without block subsidy and divide that for the amount of bytes you can fit in a single block: that is the price to be paid in satoshis per byte. In reasonable estimative, the price necessary for every Bitcoin transaction goes to very large amounts, such that not only any day-to-day transaction has insanely prohibitive costs, but also Lightning channel opens and closes are impracticable.
So without a solution like Drivechain you'll be left with only one alternative: pushing Bitcoin usage to trusted services like Liquid and RSK or custodial Lightning wallets. With Drivechain, though, there could be thousands of transactions happening in sidechains and being all aggregated into a sidechain block that would then pay a very large fee to be published (via blind merged mining) to the mainchain. Bitcoin security guaranteed.
It keeps Bitcoin decentralized
Once we have sidechains to accomodate the normal transactions, the mainchain functionality can be reduced to be only a "hub" for the sidechains' comings and goings, and then the maximum block size for the mainchain can be reduced to, say, 100kb, which would make running a full node very very easy.
Can miners steal?
Yes. If a group of coordinated miners are able to secure the majority of the hashpower and keep their coordination for 6 months, they can publish a
WT^
that takes the money from the sidechains and pays to themselves.Will miners steal?
No, because the incentives are such that they won't.
Although it may look at first that stealing is an obvious strategy for miners as it is free money, there are many costs involved:
- The cost of ceasing blind-merged mining returns -- as stealing will kill a sidechain, all the fees from it that miners would be expected to earn for the next years are gone;
- The cost of Bitcoin price going down: If a steal is successful that will mean Drivechains are not safe, therefore Bitcoin is less useful, and miner credibility will also be hurt, which are likely to cause the Bitcoin price to go down, which in turn may kill the miners' businesses and savings;
- The cost of coordination -- assuming miners are just normal businesses, they just want to do their work and get paid, but stealing from a Drivechain will require coordination with other miners to conduct an immoral act in a way that has many pitfalls and is likely to be broken over the months;
- The cost of miners leaving your mining pool: when we talked about "miners" above we were actually talking about mining pools operators, so they must also consider the risk of miners migrating from their mining pool to others as they begin the process of stealing;
- The cost of community goodwill -- when participating in a steal operation, a miner will suffer a ton of backlash from the community. Even if the attempt fails at the end, the fact that it was attempted will contribute to growing concerns over exaggerated miners power over the Bitcoin ecosystem, which may end up causing the community to agree on a hard-fork to change the mining algorithm in the future, or to do something to increase participation of more entities in the mining process (such as development or cheapment of new ASICs), which have a chance of decreasing the profits of current miners.
Another point to take in consideration is that one may be inclined to think a newly-created sidechain or a sidechain with relatively low usage may be more easily stolen from, since the blind merged mining returns from it (point 1 above) are going to be small -- but the fact is also that a sidechain with small usage will also have less money to be stolen from, and since the other costs besides 1 are less elastic at the end it will not be worth stealing from these too.
All of the above consideration are valid only if miners are stealing from good sidechains. If there is a sidechain that is doing things wrong, scamming people, not being used at all, or is full of bugs, for example, that will be perceived as a bad sidechain, and then miners can and will safely steal from it and kill it, which will be perceived as a good thing by everybody.
What do we do if miners steal?
Paul Sztorc has suggested in the past that a user-activated soft-fork could prevent miners from stealing, i.e., most Bitcoin users and nodes issue a rule similar to this one to invalidate the inclusion of a faulty
WT^
and thus cause any miner that includes it in a block to be relegated to their own Bitcoin fork that other nodes won't accept.This suggestion has made people think Drivechain is a sidechain solution backed by user-actived soft-forks for safety, which is very far from the truth. Drivechains must not and will not rely on this kind of soft-fork, although they are possible, as the coordination costs are too high and no one should ever expect these things to happen.
If even with all the incentives against them (see above) miners do still steal from a good sidechain that will mean the failure of the Drivechain experiment. It will very likely also mean the failure of the Bitcoin experiment too, as it will be proven that miners can coordinate to act maliciously over a prolonged period of time regardless of economic and social incentives, meaning they are probably in it just for attacking Bitcoin, backed by nation-states or something else, and therefore no Bitcoin transaction in the mainchain is to be expected to be safe ever again.
Why use this and not a full-blown trustless and open sidechain technology?
Because it is impossible.
If you ever heard someone saying "just use a sidechain", "do this in a sidechain" or anything like that, be aware that these people are either talking about "federated" sidechains (i.e., funds are kept in custody by a group of entities) or they are talking about Drivechain, or they are disillusioned and think it is possible to do sidechains in any other manner.
No, I mean a trustless 2-way peg with correctness of the withdrawals verified by the Bitcoin protocol!
That is not possible unless Bitcoin verifies all transactions that happen in all the sidechains, which would be akin to drastically increasing the blocksize and expanding the Bitcoin rules in tons of ways, i.e., a terrible idea that no one wants.
What about the Blockstream sidechains whitepaper?
Yes, that was a way to do it. The Drivechain hashrate escrow is a conceptually simpler way to achieve the same thing with improved incentives, less junk in the chain, more safety.
Isn't the hashrate escrow a very complex soft-fork?
Yes, but it is much simpler than SegWit. And, unlike SegWit, it doesn't force anything on users, i.e., it isn't a mandatory blocksize increase.
Why should we expect miners to care enough to participate in the voting mechanism?
Because it's in their own self-interest to do it, and it costs very little. Today over half of the miners mine RSK. It's not blind merged mining, it's a very convoluted process that requires them to run a RSK full node. For the Drivechain sidechains, an SPV node would be enough, or maybe just getting data from a block explorer API, so much much simpler.
What if I still don't like Drivechain even after reading this?
That is the entire point! You don't have to like it or use it as long as you're fine with other people using it. The hashrate escrow special addresses will not impact you at all, validation cost is minimal, and you get the benefit of people who want to use Drivechain migrating to their own sidechains and freeing up space for you in the mainchain. See also the point above about infighting.
See also