-
@ 4ba8e86d:89d32de4
2024-11-14 09:17:14Tutorial feito por nostr:nostr:npub1rc56x0ek0dd303eph523g3chm0wmrs5wdk6vs0ehd0m5fn8t7y4sqra3tk poste original abaixo:
Parte 1 : http://xh6liiypqffzwnu5734ucwps37tn2g6npthvugz3gdoqpikujju525yd.onion/263585/tutorial-debloat-de-celulares-android-via-adb-parte-1
Parte 2 : http://xh6liiypqffzwnu5734ucwps37tn2g6npthvugz3gdoqpikujju525yd.onion/index.php/263586/tutorial-debloat-de-celulares-android-via-adb-parte-2
Quando o assunto é privacidade em celulares, uma das medidas comumente mencionadas é a remoção de bloatwares do dispositivo, também chamado de debloat. O meio mais eficiente para isso sem dúvidas é a troca de sistema operacional. Custom Rom’s como LineageOS, GrapheneOS, Iodé, CalyxOS, etc, já são bastante enxutos nesse quesito, principalmente quanto não é instalado os G-Apps com o sistema. No entanto, essa prática pode acabar resultando em problemas indesejados como a perca de funções do dispositivo, e até mesmo incompatibilidade com apps bancários, tornando este método mais atrativo para quem possui mais de um dispositivo e separando um apenas para privacidade. Pensando nisso, pessoas que possuem apenas um único dispositivo móvel, que são necessitadas desses apps ou funções, mas, ao mesmo tempo, tem essa visão em prol da privacidade, buscam por um meio-termo entre manter a Stock rom, e não ter seus dados coletados por esses bloatwares. Felizmente, a remoção de bloatwares é possível e pode ser realizada via root, ou mais da maneira que este artigo irá tratar, via adb.
O que são bloatwares?
Bloatware é a junção das palavras bloat (inchar) + software (programa), ou seja, um bloatware é basicamente um programa inútil ou facilmente substituível — colocado em seu dispositivo previamente pela fabricante e operadora — que está no seu dispositivo apenas ocupando espaço de armazenamento, consumindo memória RAM e pior, coletando seus dados e enviando para servidores externos, além de serem mais pontos de vulnerabilidades.
O que é o adb?
O Android Debug Brigde, ou apenas adb, é uma ferramenta que se utiliza das permissões de usuário shell e permite o envio de comandos vindo de um computador para um dispositivo Android exigindo apenas que a depuração USB esteja ativa, mas também pode ser usada diretamente no celular a partir do Android 11, com o uso do Termux e a depuração sem fio (ou depuração wifi). A ferramenta funciona normalmente em dispositivos sem root, e também funciona caso o celular esteja em Recovery Mode.
Requisitos:
Para computadores:
• Depuração USB ativa no celular; • Computador com adb; • Cabo USB;
Para celulares:
• Depuração sem fio (ou depuração wifi) ativa no celular; • Termux; • Android 11 ou superior;
Para ambos:
• Firewall NetGuard instalado e configurado no celular; • Lista de bloatwares para seu dispositivo;
Ativação de depuração:
Para ativar a Depuração USB em seu dispositivo, pesquise como ativar as opções de desenvolvedor de seu dispositivo, e lá ative a depuração. No caso da depuração sem fio, sua ativação irá ser necessária apenas no momento que for conectar o dispositivo ao Termux.
Instalação e configuração do NetGuard
O NetGuard pode ser instalado através da própria Google Play Store, mas de preferência instale pela F-Droid ou Github para evitar telemetria.
F-Droid: https://f-droid.org/packages/eu.faircode.netguard/
Github: https://github.com/M66B/NetGuard/releases
Após instalado, configure da seguinte maneira:
Configurações → padrões (lista branca/negra) → ative as 3 primeiras opções (bloquear wifi, bloquear dados móveis e aplicar regras ‘quando tela estiver ligada’);
Configurações → opções avançadas → ative as duas primeiras (administrar aplicativos do sistema e registrar acesso a internet);
Com isso, todos os apps estarão sendo bloqueados de acessar a internet, seja por wifi ou dados móveis, e na página principal do app basta permitir o acesso a rede para os apps que você vai usar (se necessário). Permita que o app rode em segundo plano sem restrição da otimização de bateria, assim quando o celular ligar, ele já estará ativo.
Lista de bloatwares
Nem todos os bloatwares são genéricos, haverá bloatwares diferentes conforme a marca, modelo, versão do Android, e até mesmo região.
Para obter uma lista de bloatwares de seu dispositivo, caso seu aparelho já possua um tempo de existência, você encontrará listas prontas facilmente apenas pesquisando por elas. Supondo que temos um Samsung Galaxy Note 10 Plus em mãos, basta pesquisar em seu motor de busca por:
Samsung Galaxy Note 10 Plus bloatware list
Provavelmente essas listas já terão inclusas todos os bloatwares das mais diversas regiões, lhe poupando o trabalho de buscar por alguma lista mais específica.
Caso seu aparelho seja muito recente, e/ou não encontre uma lista pronta de bloatwares, devo dizer que você acaba de pegar em merda, pois é chato para um caralho pesquisar por cada aplicação para saber sua função, se é essencial para o sistema ou se é facilmente substituível.
De antemão já aviso, que mais para frente, caso vossa gostosura remova um desses aplicativos que era essencial para o sistema sem saber, vai acabar resultando na perda de alguma função importante, ou pior, ao reiniciar o aparelho o sistema pode estar quebrado, lhe obrigando a seguir com uma formatação, e repetir todo o processo novamente.
Download do adb em computadores
Para usar a ferramenta do adb em computadores, basta baixar o pacote chamado SDK platform-tools, disponível através deste link: https://developer.android.com/tools/releases/platform-tools. Por ele, você consegue o download para Windows, Mac e Linux.
Uma vez baixado, basta extrair o arquivo zipado, contendo dentro dele uma pasta chamada platform-tools que basta ser aberta no terminal para se usar o adb.
Download do adb em celulares com Termux.
Para usar a ferramenta do adb diretamente no celular, antes temos que baixar o app Termux, que é um emulador de terminal linux, e já possui o adb em seu repositório. Você encontra o app na Google Play Store, mas novamente recomendo baixar pela F-Droid ou diretamente no Github do projeto.
F-Droid: https://f-droid.org/en/packages/com.termux/
Github: https://github.com/termux/termux-app/releases
Processo de debloat
Antes de iniciarmos, é importante deixar claro que não é para você sair removendo todos os bloatwares de cara sem mais nem menos, afinal alguns deles precisam antes ser substituídos, podem ser essenciais para você para alguma atividade ou função, ou até mesmo são insubstituíveis.
Alguns exemplos de bloatwares que a substituição é necessária antes da remoção, é o Launcher, afinal, é a interface gráfica do sistema, e o teclado, que sem ele só é possível digitar com teclado externo. O Launcher e teclado podem ser substituídos por quaisquer outros, minha recomendação pessoal é por aqueles que respeitam sua privacidade, como Pie Launcher e Simple Laucher, enquanto o teclado pelo OpenBoard e FlorisBoard, todos open-source e disponíveis da F-Droid.
Identifique entre a lista de bloatwares, quais você gosta, precisa ou prefere não substituir, de maneira alguma você é obrigado a remover todos os bloatwares possíveis, modifique seu sistema a seu bel-prazer. O NetGuard lista todos os apps do celular com o nome do pacote, com isso você pode filtrar bem qual deles não remover.
Um exemplo claro de bloatware insubstituível e, portanto, não pode ser removido, é o com.android.mtp, um protocolo onde sua função é auxiliar a comunicação do dispositivo com um computador via USB, mas por algum motivo, tem acesso a rede e se comunica frequentemente com servidores externos. Para esses casos, e melhor solução mesmo é bloquear o acesso a rede desses bloatwares com o NetGuard.
MTP tentando comunicação com servidores externos:
Executando o adb shell
No computador
Faça backup de todos os seus arquivos importantes para algum armazenamento externo, e formate seu celular com o hard reset. Após a formatação, e a ativação da depuração USB, conecte seu aparelho e o pc com o auxílio de um cabo USB. Muito provavelmente seu dispositivo irá apenas começar a carregar, por isso permita a transferência de dados, para que o computador consiga se comunicar normalmente com o celular.
Já no pc, abra a pasta platform-tools dentro do terminal, e execute o seguinte comando:
./adb start-server
O resultado deve ser:
daemon not running; starting now at tcp:5037 daemon started successfully
E caso não apareça nada, execute:
./adb kill-server
E inicie novamente.
Com o adb conectado ao celular, execute:
./adb shell
Para poder executar comandos diretamente para o dispositivo. No meu caso, meu celular é um Redmi Note 8 Pro, codinome Begonia.
Logo o resultado deve ser:
begonia:/ $
Caso ocorra algum erro do tipo:
adb: device unauthorized. This adb server’s $ADB_VENDOR_KEYS is not set Try ‘adb kill-server’ if that seems wrong. Otherwise check for a confirmation dialog on your device.
Verifique no celular se apareceu alguma confirmação para autorizar a depuração USB, caso sim, autorize e tente novamente. Caso não apareça nada, execute o kill-server e repita o processo.
No celular
Após realizar o mesmo processo de backup e hard reset citado anteriormente, instale o Termux e, com ele iniciado, execute o comando:
pkg install android-tools
Quando surgir a mensagem “Do you want to continue? [Y/n]”, basta dar enter novamente que já aceita e finaliza a instalação
Agora, vá até as opções de desenvolvedor, e ative a depuração sem fio. Dentro das opções da depuração sem fio, terá uma opção de emparelhamento do dispositivo com um código, que irá informar para você um código em emparelhamento, com um endereço IP e porta, que será usado para a conexão com o Termux.
Para facilitar o processo, recomendo que abra tanto as configurações quanto o Termux ao mesmo tempo, e divida a tela com os dois app’s, como da maneira a seguir:
Para parear o Termux com o dispositivo, não é necessário digitar o ip informado, basta trocar por “localhost”, já a porta e o código de emparelhamento, deve ser digitado exatamente como informado. Execute:
adb pair localhost:porta CódigoDeEmparelhamento
De acordo com a imagem mostrada anteriormente, o comando ficaria “adb pair localhost:41255 757495”.
Com o dispositivo emparelhado com o Termux, agora basta conectar para conseguir executar os comandos, para isso execute:
adb connect localhost:porta
Obs: a porta que você deve informar neste comando não é a mesma informada com o código de emparelhamento, e sim a informada na tela principal da depuração sem fio.
Pronto! Termux e adb conectado com sucesso ao dispositivo, agora basta executar normalmente o adb shell:
adb shell
Remoção na prática Com o adb shell executado, você está pronto para remover os bloatwares. No meu caso, irei mostrar apenas a remoção de um app (Google Maps), já que o comando é o mesmo para qualquer outro, mudando apenas o nome do pacote.
Dentro do NetGuard, verificando as informações do Google Maps:
Podemos ver que mesmo fora de uso, e com a localização do dispositivo desativado, o app está tentando loucamente se comunicar com servidores externos, e informar sabe-se lá que peste. Mas sem novidades até aqui, o mais importante é que podemos ver que o nome do pacote do Google Maps é com.google.android.apps.maps, e para o remover do celular, basta executar:
pm uninstall –user 0 com.google.android.apps.maps
E pronto, bloatware removido! Agora basta repetir o processo para o resto dos bloatwares, trocando apenas o nome do pacote.
Para acelerar o processo, você pode já criar uma lista do bloco de notas com os comandos, e quando colar no terminal, irá executar um atrás do outro.
Exemplo de lista:
Caso a donzela tenha removido alguma coisa sem querer, também é possível recuperar o pacote com o comando:
cmd package install-existing nome.do.pacote
Pós-debloat
Após limpar o máximo possível o seu sistema, reinicie o aparelho, caso entre no como recovery e não seja possível dar reboot, significa que você removeu algum app “essencial” para o sistema, e terá que formatar o aparelho e repetir toda a remoção novamente, desta vez removendo poucos bloatwares de uma vez, e reiniciando o aparelho até descobrir qual deles não pode ser removido. Sim, dá trabalho… quem mandou querer privacidade?
Caso o aparelho reinicie normalmente após a remoção, parabéns, agora basta usar seu celular como bem entender! Mantenha o NetGuard sempre executando e os bloatwares que não foram possíveis remover não irão se comunicar com servidores externos, passe a usar apps open source da F-Droid e instale outros apps através da Aurora Store ao invés da Google Play Store.
Referências: Caso você seja um Australopithecus e tenha achado este guia difícil, eis uma videoaula (3:14:40) do Anderson do canal Ciberdef, realizando todo o processo: http://odysee.com/@zai:5/Como-remover-at%C3%A9-200-APLICATIVOS-que-colocam-a-sua-PRIVACIDADE-E-SEGURAN%C3%87A-em-risco.:4?lid=6d50f40314eee7e2f218536d9e5d300290931d23
Pdf’s do Anderson citados na videoaula: créditos ao anon6837264 http://eternalcbrzpicytj4zyguygpmkjlkddxob7tptlr25cdipe5svyqoqd.onion/file/3863a834d29285d397b73a4af6fb1bbe67c888d72d30/t-05e63192d02ffd.pdf
Processo de instalação do Termux e adb no celular: https://youtu.be/APolZrPHSms
-
@ 3b7fc823:e194354f
2025-02-13 02:25:42site:example.com intitle:"index of" inurl:admin intext:"password"
site:example.com site:.gov site:.edu site:*.mil
inurl:login inurl:admin inurl:dashboard inurl:portal intitle:"admin login"
intitle:"index of /" intitle:"index of" "parent directory" intitle:"index of" "backup"
filetype:pdf "confidential" filetype:xls "username | password" filetype:doc "top secret" filetype:sql "database"
intext:"username" intext:"password" intext:"login" intext:"password" filetype:txt "passwords"
inurl:"viewerframe?mode=" inurl:"/view.shtml" inurl:"/view/index.shtml"
intitle:"index of" "wp-config.php" inurl:".git"
filetype:xls intext:"email" filetype:csv intext:"email"
inurl:"/setup.cgi?next_file=netgear.cfg" inurl:"/wificonf.html"
-
@ a58a2663:87bb2918
2025-03-05 12:41:36After two years of using Standard Notes as my main note-taking app, I’m switching to Obsidian.
The $100 that Standard Notes charges for basic editing capabilities is difficult to justify, especially for someone paying in Brazilian Real and striving to make a living from writing. However, I will certainly miss its simplicity and cleaner interface.
It’s my impression that the developers are missing an opportunity to create a privacy-focused note-taking app tailored to the specific needs of writers, rather than general users.
Substack, for example, achieved such success because it targeted the distribution and monetization of writers’ work. But we need more tools focused not on distribution or monetization, but on the actual process—indeed, the various phases of the process—of creating texts. This is especially true for complex, long-form texts with different levels of argumentation, numerous written and multimedia sources, and cross-references to other works by the author.
It’s crucial that an app like this doesn’t feel overly complex, like Notion or Evernote, or so all-purpose, like Obsidian. And, of course, I’m not talking about a new full-fledged text editor like Scrivener.
Just a thought. Take note.
-
@ a95c6243:d345522c
2025-03-04 09:40:50Die «Eliten» führen bereits groß angelegte Pilotprojekte für eine Zukunft durch, die sie wollen und wir nicht. Das schreibt der OffGuardian in einem Update zum Thema «EU-Brieftasche für die digitale Identität». Das Portal weist darauf hin, dass die Akteure dabei nicht gerade zimperlich vorgehen und auch keinen Hehl aus ihren Absichten machen. Transition News hat mehrfach darüber berichtet, zuletzt hier und hier.
Mit der EU Digital Identity Wallet (EUDI-Brieftasche) sei eine einzige von der Regierung herausgegebene App geplant, die Ihre medizinischen Daten, Beschäftigungsdaten, Reisedaten, Bildungsdaten, Impfdaten, Steuerdaten, Finanzdaten sowie (potenziell) Kopien Ihrer Unterschrift, Fingerabdrücke, Gesichtsscans, Stimmproben und DNA enthält. So fasst der OffGuardian die eindrucksvolle Liste möglicher Einsatzbereiche zusammen.
Auch Dokumente wie der Personalausweis oder der Führerschein können dort in elektronischer Form gespeichert werden. Bis 2026 sind alle EU-Mitgliedstaaten dazu verpflichtet, Ihren Bürgern funktionierende und frei verfügbare digitale «Brieftaschen» bereitzustellen.
Die Menschen würden diese App nutzen, so das Portal, um Zahlungen vorzunehmen, Kredite zu beantragen, ihre Steuern zu zahlen, ihre Rezepte abzuholen, internationale Grenzen zu überschreiten, Unternehmen zu gründen, Arzttermine zu buchen, sich um Stellen zu bewerben und sogar digitale Verträge online zu unterzeichnen.
All diese Daten würden auf ihrem Mobiltelefon gespeichert und mit den Regierungen von neunzehn Ländern (plus der Ukraine) sowie über 140 anderen öffentlichen und privaten Partnern ausgetauscht. Von der Deutschen Bank über das ukrainische Ministerium für digitalen Fortschritt bis hin zu Samsung Europe. Unternehmen und Behörden würden auf diese Daten im Backend zugreifen, um «automatisierte Hintergrundprüfungen» durchzuführen.
Der Bundesverband der Verbraucherzentralen und Verbraucherverbände (VZBV) habe Bedenken geäußert, dass eine solche App «Risiken für den Schutz der Privatsphäre und der Daten» berge, berichtet das Portal. Die einzige Antwort darauf laute: «Richtig, genau dafür ist sie ja da!»
Das alles sei keine Hypothese, betont der OffGuardian. Es sei vielmehr «Potential». Damit ist ein EU-Projekt gemeint, in dessen Rahmen Dutzende öffentliche und private Einrichtungen zusammenarbeiten, «um eine einheitliche Vision der digitalen Identität für die Bürger der europäischen Länder zu definieren». Dies ist nur eines der groß angelegten Pilotprojekte, mit denen Prototypen und Anwendungsfälle für die EUDI-Wallet getestet werden. Es gibt noch mindestens drei weitere.
Den Ball der digitalen ID-Systeme habe die Covid-«Pandemie» über die «Impfpässe» ins Rollen gebracht. Seitdem habe das Thema an Schwung verloren. Je näher wir aber der vollständigen Einführung der EUid kämen, desto mehr Propaganda der Art «Warum wir eine digitale Brieftasche brauchen» könnten wir in den Mainstream-Medien erwarten, prognostiziert der OffGuardian. Vielleicht müssten wir schon nach dem nächsten großen «Grund», dem nächsten «katastrophalen katalytischen Ereignis» Ausschau halten. Vermutlich gebe es bereits Pläne, warum die Menschen plötzlich eine digitale ID-Brieftasche brauchen würden.
Die Entwicklung geht jedenfalls stetig weiter in genau diese Richtung. Beispielsweise hat Jordanien angekündigt, die digitale biometrische ID bei den nächsten Wahlen zur Verifizierung der Wähler einzuführen. Man wolle «den Papierkrieg beenden und sicherstellen, dass die gesamte Kette bis zu den nächsten Parlamentswahlen digitalisiert wird», heißt es. Absehbar ist, dass dabei einige Wahlberechtigte «auf der Strecke bleiben» werden, wie im Fall von Albanien geschehen.
Derweil würden die Briten gerne ihre Privatsphäre gegen Effizienz eintauschen, behauptet Tony Blair. Der Ex-Premier drängte kürzlich erneut auf digitale Identitäten und Gesichtserkennung. Blair ist Gründer einer Denkfabrik für globalen Wandel, Anhänger globalistischer Technokratie und «moderner Infrastruktur».
Abschließend warnt der OffGuardian vor der Illusion, Trump und Musk würden den US-Bürgern «diesen Schlamassel ersparen». Das Department of Government Efficiency werde sich auf die digitale Identität stürzen. Was könne schließlich «effizienter» sein als eine einzige App, die für alles verwendet wird? Der Unterschied bestehe nur darin, dass die US-Version vielleicht eher privat als öffentlich sei – sofern es da überhaupt noch einen wirklichen Unterschied gebe.
[Titelbild: Screenshot OffGuardian]
Dieser Beitrag ist zuerst auf Transition News erschienen.
-
@ 82c020bb:126e8208
2025-03-05 12:08:32three four
-
@ a95c6243:d345522c
2025-03-01 10:39:35Ständige Lügen und Unterstellungen, permanent falsche Fürsorge \ können Bausteine von emotionaler Manipulation sein. Mit dem Zweck, \ Macht und Kontrolle über eine andere Person auszuüben. \ Apotheken Umschau
Irgendetwas muss passiert sein: «Gaslighting» ist gerade Thema in vielen Medien. Heute bin ich nach längerer Zeit mal wieder über dieses Stichwort gestolpert. Das war in einem Artikel von Norbert Häring über Manipulationen des Deutschen Wetterdienstes (DWD). In diesem Fall ging es um eine Pressemitteilung vom Donnerstag zum «viel zu warmen» Winter 2024/25.
Häring wirft der Behörde vor, dreist zu lügen und Dinge auszulassen, um die Klimaangst wach zu halten. Was der Leser beim DWD nicht erfahre, sei, dass dieser Winter kälter als die drei vorangegangenen und kälter als der Durchschnitt der letzten zehn Jahre gewesen sei. Stattdessen werde der falsche Eindruck vermittelt, es würde ungebremst immer wärmer.
Wem also der zu Ende gehende Winter eher kalt vorgekommen sein sollte, mit dessen Empfinden stimme wohl etwas nicht. Das jedenfalls wolle der DWD uns einreden, so der Wirtschaftsjournalist. Und damit sind wir beim Thema Gaslighting.
Als Gaslighting wird eine Form psychischer Manipulation bezeichnet, mit der die Opfer desorientiert und zutiefst verunsichert werden, indem ihre eigene Wahrnehmung als falsch bezeichnet wird. Der Prozess führt zu Angst und Realitätsverzerrung sowie zur Zerstörung des Selbstbewusstseins. Die Bezeichnung kommt von dem britischen Theaterstück «Gas Light» aus dem Jahr 1938, in dem ein Mann mit grausamen Psychotricks seine Frau in den Wahnsinn treibt.
Damit Gaslighting funktioniert, muss das Opfer dem Täter vertrauen. Oft wird solcher Psychoterror daher im privaten oder familiären Umfeld beschrieben, ebenso wie am Arbeitsplatz. Jedoch eignen sich die Prinzipien auch perfekt zur Manipulation der Massen. Vermeintliche Autoritäten wie Ärzte und Wissenschaftler, oder «der fürsorgliche Staat» und Institutionen wie die UNO oder die WHO wollen uns doch nichts Böses. Auch Staatsmedien, Faktenchecker und diverse NGOs wurden zu «vertrauenswürdigen Quellen» erklärt. Das hat seine Wirkung.
Warum das Thema Gaslighting derzeit scheinbar so populär ist, vermag ich nicht zu sagen. Es sind aber gerade in den letzten Tagen und Wochen auffällig viele Artikel dazu erschienen, und zwar nicht nur von Psychologen. Die Frankfurter Rundschau hat gleich mehrere publiziert, und Anwälte interessieren sich dafür offenbar genauso wie Apotheker.
Die Apotheken Umschau machte sogar auf «Medical Gaslighting» aufmerksam. Davon spreche man, wenn Mediziner Symptome nicht ernst nähmen oder wenn ein gesundheitliches Problem vom behandelnden Arzt «schnöde heruntergespielt» oder abgetan würde. Kommt Ihnen das auch irgendwie bekannt vor? Der Begriff sei allerdings irreführend, da er eine manipulierende Absicht unterstellt, die «nicht gewährleistet» sei.
Apropos Gaslighting: Die noch amtierende deutsche Bundesregierung meldete heute, es gelte, «weiter [sic!] gemeinsam daran zu arbeiten, einen gerechten und dauerhaften Frieden für die Ukraine zu erreichen». Die Ukraine, wo sich am Montag «der völkerrechtswidrige Angriffskrieg zum dritten Mal jährte», verteidige ihr Land und «unsere gemeinsamen Werte».
Merken Sie etwas? Das Demokratieverständnis mag ja tatsächlich inzwischen in beiden Ländern ähnlich traurig sein. Bezüglich Friedensbemühungen ist meine Wahrnehmung jedoch eine andere. Das muss an meinem Gedächtnis liegen.
Dieser Beitrag ist zuerst auf Transition News erschienen.
-
@ 5f3e7e41:81cb07cf
2025-03-05 11:37:27The question of life’s meaning has long been a central concern in philosophy, debated by existentialists, nihilists, absurdists, and theologians alike. Is there an inherent purpose to human existence, or must we construct our own meaning? This essay explores the philosophical dimensions of the question by examining various perspectives, including existentialism, nihilism, and teleological interpretations. Existentialist Perspective Existentialists argue that meaning is not intrinsic but must be created. Jean-Paul Sartre, for instance, asserts that existence precedes essence—humans exist first and define their own purpose afterward. Unlike an artifact designed for a specific function, human beings are thrown into existence without predetermined meaning. Sartre’s concept of radical freedom suggests that we are entirely responsible for imbuing our lives with purpose through our choices and actions. Albert Camus, while existential in his approach, leans toward absurdism. He argues that human beings seek meaning in a universe that offers none. This fundamental conflict, the absurd, leads to either nihilism or rebellion. Camus advocates for an embrace of the absurd—accepting life’s lack of inherent purpose and living in defiance of this reality, deriving meaning from the act of living itself. Nihilistic Perspective Nihilism, most famously articulated by Friedrich Nietzsche, asserts that life has no objective meaning, purpose, or value. The "death of God" in Nietzsche’s work signifies the collapse of religious and metaphysical sources of meaning, leaving humanity in an existential void. Without a higher order dictating meaning, one might fall into existential despair. However, Nietzsche’s solution is the creation of personal values through the concept of the Übermensch, an individual who forges their own path and meaning without reliance on external validation. Teleological and Theistic Views In contrast, religious and teleological perspectives propose an intrinsic meaning to life, often rooted in divine purpose. Theistic traditions argue that meaning is bestowed upon humanity by a higher power. For example, in Christianity, the purpose of life is to fulfill God’s will, achieve salvation, and cultivate virtue. Similarly, in Aristotelian philosophy, eudaimonia, or human flourishing, is seen as the ultimate telos (end goal) of human existence, achieved through rational activity and moral virtue. Synthesis: A Constructivist Approach Given the divergence in perspectives, one might adopt a constructivist stance that synthesizes elements from each. If no inherent meaning exists, as existentialists and nihilists suggest, and if religious interpretations require faith, then meaning may best be understood as a subjective construction. Humans, as rational and reflective beings, can choose to ascribe significance to their existence based on personal values, relationships, creative endeavors, or contributions to humanity. Conclusion The meaning of life remains an open question, shaped by individual perspectives and cultural influences. Whether meaning is self-created, divinely ordained, or ultimately absent, the inquiry itself underscores a fundamental aspect of human nature: the relentless pursuit of significance. Perhaps the search for meaning is what gives life its greatest meaning.
-
@ a95c6243:d345522c
2025-02-21 19:32:23Europa – das Ganze ist eine wunderbare Idee, \ aber das war der Kommunismus auch. \ Loriot
«Europa hat fertig», könnte man unken, und das wäre nicht einmal sehr verwegen. Mit solch einer Einschätzung stünden wir nicht alleine, denn die Stimmen in diese Richtung mehren sich. Der französische Präsident Emmanuel Macron warnte schon letztes Jahr davor, dass «unser Europa sterben könnte». Vermutlich hatte er dabei andere Gefahren im Kopf als jetzt der ungarische Ministerpräsident Viktor Orbán, der ein «baldiges Ende der EU» prognostizierte. Das Ergebnis könnte allerdings das gleiche sein.
Neben vordergründigen Themenbereichen wie Wirtschaft, Energie und Sicherheit ist das eigentliche Problem jedoch die obskure Mischung aus aufgegebener Souveränität und geschwollener Arroganz, mit der europäische Politiker:innende unterschiedlicher Couleur aufzutreten pflegen. Und das Tüpfelchen auf dem i ist die bröckelnde Legitimation politischer Institutionen dadurch, dass die Stimmen großer Teile der Bevölkerung seit Jahren auf vielfältige Weise ausgegrenzt werden.
Um «UnsereDemokratie» steht es schlecht. Dass seine Mandate immer schwächer werden, merkt natürlich auch unser «Führungspersonal». Entsprechend werden die Maßnahmen zur Gängelung, Überwachung und Manipulation der Bürger ständig verzweifelter. Parallel dazu plustern sich in Paris Macron, Scholz und einige andere noch einmal mächtig in Sachen Verteidigung und «Kriegstüchtigkeit» auf.
Momentan gilt es auch, das Überschwappen covidiotischer und verschwörungsideologischer Auswüchse aus den USA nach Europa zu vermeiden. So ein «MEGA» (Make Europe Great Again) können wir hier nicht gebrauchen. Aus den Vereinigten Staaten kommen nämlich furchtbare Nachrichten. Beispielsweise wurde einer der schärfsten Kritiker der Corona-Maßnahmen kürzlich zum Gesundheitsminister ernannt. Dieser setzt sich jetzt für eine Neubewertung der mRNA-«Impfstoffe» ein, was durchaus zu einem Entzug der Zulassungen führen könnte.
Der europäischen Version von «Verteidigung der Demokratie» setzte der US-Vizepräsident J. D. Vance auf der Münchner Sicherheitskonferenz sein Verständnis entgegen: «Demokratie stärken, indem wir unseren Bürgern erlauben, ihre Meinung zu sagen». Das Abschalten von Medien, das Annullieren von Wahlen oder das Ausschließen von Menschen vom politischen Prozess schütze gar nichts. Vielmehr sei dies der todsichere Weg, die Demokratie zu zerstören.
In der Schweiz kamen seine Worte deutlich besser an als in den meisten europäischen NATO-Ländern. Bundespräsidentin Karin Keller-Sutter lobte die Rede und interpretierte sie als «Plädoyer für die direkte Demokratie». Möglicherweise zeichne sich hier eine außenpolitische Kehrtwende in Richtung integraler Neutralität ab, meint mein Kollege Daniel Funk. Das wären doch endlich mal ein paar gute Nachrichten.
Von der einstigen Idee einer europäischen Union mit engeren Beziehungen zwischen den Staaten, um Konflikte zu vermeiden und das Wohlergehen der Bürger zu verbessern, sind wir meilenweit abgekommen. Der heutige korrupte Verbund unter technokratischer Leitung ähnelt mehr einem Selbstbedienungsladen mit sehr begrenztem Zugang. Die EU-Wahlen im letzten Sommer haben daran ebenso wenig geändert, wie die Bundestagswahl am kommenden Sonntag darauf einen Einfluss haben wird.
Dieser Beitrag ist zuerst auf Transition News erschienen.
-
@ 3b7fc823:e194354f
2025-02-12 23:13:57Staying Digitally Safe in Airports: A Comprehensive Guide
Airports are hubs of activity, but they’re also places where your digital security can be at risk. From public Wi-Fi to potential device thefts, staying safe while traveling can feel overwhelming. However, with the right knowledge and precautions, you can protect yourself and enjoy your journey stress-free. Let’s dive into how to stay digitally safe in airports while traveling.
Understanding the Risks
- Public Wi-Fi Vulnerabilities:
- Airports often offer free Wi-Fi, but these networks can be unsecured or insecure. Hackers may use these networks to intercept sensitive data.
-
Avoid using public Wi-Fi for personal banking, shopping, or handling sensitive information.
-
Device Theft:
-
High-traffic areas like security checkpoints, gates, and lounges are hotspots for device thefts. Always keep your devices in secure locations, such as carry-on bags or locked briefcases.
-
Malware and Phishing Attacks:
-
Some airports may have phishing attempts or malware distributed via pop-ups, email, or malicious websites.
-
Physical Surveillance:
- In some cases, law enforcement or security personnel may monitor your activities. Always be mindful of your surroundings to avoid unintended data exposure.
Best Practices for Staying Digitally Safe in Airports
- Use a VPN for Extra Security:
- Even secure airport Wi-Fi can expose your data if not encrypted. Use a reputable Virtual Private Network (VPN) to encrypt your internet traffic and protect your privacy.
-
Always ensure your VPN is active when using public Wi-Fi.
-
Minimize Sensitive Data on Public Devices:
-
Avoid carrying devices with sensitive information like passwords, credit card details, or personal identification numbers (PIIs).
-
Encrypt Your Data:
-
Enable encryption for all your devices to protect data stored locally or in the cloud. Ensure your operating system and apps are updated with the latest security patches.
-
Secure Your Devices:
- Use cable locks or secure cases to lock down laptops, tablets, and smartphones when not in use.
-
Remove screensavers that display your device passcode to prevent unauthorized access.
-
Keep Antivirus Software Updated:
-
Install and maintain up-to-date antivirus software on all devices. This helps detect and remove malicious software (malware) that may be installed through compromised networks or phishing attempts.
-
Avoid Plugging Into Public USB charging stations:
-
Refrain from using public USB ports or charging stations unless you know they’re secure. Malware can spread via these points.
-
Use Caution With Lost and Found:
-
If you find a device or drop one accidentally, avoid using lost and found kiosks to pick it up. Instead, contact airport security for assistance in safely retrieving your property without exposing it to potential thieves.
-
Stay Alert to Security Alerts:
-
Pay attention to announcements over the airport’s PA system regarding suspicious activity or security alerts. Follow any instructions provided by airport staff.
-
Monitor Your Accounts Remotely:
- If you suspect something is wrong (e.g., unusual transactions on your credit card), check your financial accounts immediately upon arriving at your destination. Notify your bank of potential fraudulent activity and report it to the authorities if necessary.
Additional Tips for Airport Safety
- Use a Portable Power Bank:
-
Keep your devices charged so you don’t rely on public charging stations, which may be compromised.
-
Travel with Backup Devices:
-
Always bring an extra SIM card, USB drive, or cloud storage to backup important data. This ensures you can access critical information even if your primary device is lost or damaged.
-
Avoid Sharing Personal Information Over Earphone Rentals:
-
Refrain from using earphones rented from airport kiosks that may record or intercept your conversations. Stick to your own headphones or those provided by the airline.
-
Use Airport Lounges Wisely:
-
If you’re using an airline lounge, avoid discussing sensitive information in public areas where it could be overheard.
-
Keep Your Luggage in Sight:
-
Never leave your checked luggage unattended, as it may contain devices or documents with sensitive information.
-
Plan for Data Loss:
- Before leaving home, make a backup of all important files and photos on an external drive or cloud storage. This way, you can restore them if something goes wrong during your trip.
What to Do If Something Goes Wrong
- Report Suspected Security Incidents:
-
If you notice unusual activity on your devices or suspect a security breach, inform airport security immediately.
-
Contact Your Financial Institutions:
-
If you believe your financial information has been compromised, contact your bank or credit card provider to freeze your account and monitor for fraudulent charges.
-
File a Police Report:
-
In cases of theft or suspected unauthorized access, file a report with local authorities and provide evidence (if available).
-
Use Travel Insurance:
- Check if your travel insurance covers theft, fraud, or data breaches. Submit a claim if you’re covered.
Extra Security Measures forTech-Savvy Travelers
- Two-Factor Authentication (2FA): Enable 2FA for all your critical accounts before leaving home.
- Biometric Locks: Use biometric locks on your devices to add an extra layer of security.
- Incident Response Plan: Create a plan in advance for what to do if your devices are lost or compromised.
Final Tips
- Always prioritize secure practices, even in seemingly safe environments like airports.
- Travel light but keep your important documents and devices close at hand.
- Remember that staying digitally safe is just as important as physical safety during your travels.
By following these tips, you can enjoy your trip with peace of mind, knowing your data and devices are protected. Happy traveling!
Advocating for privacy does not finance itself. If you enjoyed this article, please consider zapping or sending monero
82XCDNK1Js8TethhpGLFPbVyKe25DxMUePad1rUn9z7V6QdCzxHEE7varvVh1VUidUhHVSA4atNU2BTpSNJLC1BqSvDajw1
-
@ a95c6243:d345522c
2025-02-19 09:23:17Die «moralische Weltordnung» – eine Art Astrologie. Friedrich Nietzsche
Das Treffen der BRICS-Staaten beim Gipfel im russischen Kasan war sicher nicht irgendein politisches Event. Gastgeber Wladimir Putin habe «Hof gehalten», sagen die Einen, China und Russland hätten ihre Vorstellung einer multipolaren Weltordnung zelebriert, schreiben Andere.
In jedem Fall zeigt die Anwesenheit von über 30 Delegationen aus der ganzen Welt, dass von einer geostrategischen Isolation Russlands wohl keine Rede sein kann. Darüber hinaus haben sowohl die Anreise von UN-Generalsekretär António Guterres als auch die Meldungen und Dementis bezüglich der Beitrittsbemühungen des NATO-Staats Türkei für etwas Aufsehen gesorgt.
Im Spannungsfeld geopolitischer und wirtschaftlicher Umbrüche zeigt die neue Allianz zunehmendes Selbstbewusstsein. In Sachen gemeinsamer Finanzpolitik schmiedet man interessante Pläne. Größere Unabhängigkeit von der US-dominierten Finanzordnung ist dabei ein wichtiges Ziel.
Beim BRICS-Wirtschaftsforum in Moskau, wenige Tage vor dem Gipfel, zählte ein nachhaltiges System für Finanzabrechnungen und Zahlungsdienste zu den vorrangigen Themen. Während dieses Treffens ging der russische Staatsfonds eine Partnerschaft mit dem Rechenzentrumsbetreiber BitRiver ein, um Bitcoin-Mining-Anlagen für die BRICS-Länder zu errichten.
Die Initiative könnte ein Schritt sein, Bitcoin und andere Kryptowährungen als Alternativen zu traditionellen Finanzsystemen zu etablieren. Das Projekt könnte dazu führen, dass die BRICS-Staaten den globalen Handel in Bitcoin abwickeln. Vor dem Hintergrund der Diskussionen über eine «BRICS-Währung» wäre dies eine Alternative zu dem ursprünglich angedachten Korb lokaler Währungen und zu goldgedeckten Währungen sowie eine mögliche Ergänzung zum Zahlungssystem BRICS Pay.
Dient der Bitcoin also der Entdollarisierung? Oder droht er inzwischen, zum Gegenstand geopolitischer Machtspielchen zu werden? Angesichts der globalen Vernetzungen ist es oft schwer zu durchschauen, «was eine Show ist und was im Hintergrund von anderen Strippenziehern insgeheim gesteuert wird». Sicher können Strukturen wie Bitcoin auch so genutzt werden, dass sie den Herrschenden dienlich sind. Aber die Grundeigenschaft des dezentralisierten, unzensierbaren Peer-to-Peer Zahlungsnetzwerks ist ihm schließlich nicht zu nehmen.
Wenn es nach der EZB oder dem IWF geht, dann scheint statt Instrumentalisierung momentan eher der Kampf gegen Kryptowährungen angesagt. Jürgen Schaaf, Senior Manager bei der Europäischen Zentralbank, hat jedenfalls dazu aufgerufen, Bitcoin «zu eliminieren». Der Internationale Währungsfonds forderte El Salvador, das Bitcoin 2021 als gesetzliches Zahlungsmittel eingeführt hat, kürzlich zu begrenzenden Maßnahmen gegen das Kryptogeld auf.
Dass die BRICS-Staaten ein freiheitliches Ansinnen im Kopf haben, wenn sie Kryptowährungen ins Spiel bringen, darf indes auch bezweifelt werden. Im Abschlussdokument bekennen sich die Gipfel-Teilnehmer ausdrücklich zur UN, ihren Programmen und ihrer «Agenda 2030». Ernst Wolff nennt das «eine Bankrotterklärung korrupter Politiker, die sich dem digital-finanziellen Komplex zu 100 Prozent unterwerfen».
Dieser Beitrag ist zuerst auf Transition News erschienen.
-
@ 3b7fc823:e194354f
2025-02-12 02:20:27I fought with making this work for two days before I finally figured out that I made a simple SQL format mistake. I asked chatGPT to write a tutorial on how to do it based on what I did and the work I did with it. Sharing it in case anyone finds it useful.
Enabling Persistent Memory in Open WebUI with Ollama
This tutorial will guide you through the process of enabling persistent memory for your AI models running locally with Ollama and Open WebUI on Debian Linux. By the end of this guide, your AI will be able to remember the last 20 conversations you’ve had with it.
Prerequisites
- Debian Linux system
- Ollama installed and configured
- Open WebUI installed and running
Step 1: Setting Up the Database for Persistent Memory
We'll use SQLite to store conversation history.
1.1 Create
conversation_memory.py
Navigate to your Open WebUI backend directory and create a new file called
conversation_memory.py
.bash cd /home/your_username/Documents/open-webui-0.5.10/backend nano conversation_memory.py
Paste the following code into
conversation_memory.py
:```python import sqlite3 import os
Set DB_FILE to the absolute path of memory.db in the same directory as this script
DB_FILE = "/home/your_username/Documents/open-webui-0.5.10/backend/memory.db"
def init_db(): """Create database table if it doesn't exist""" conn = sqlite3.connect(DB_FILE) c = conn.cursor() c.execute(""" CREATE TABLE IF NOT EXISTS memory ( id INTEGER PRIMARY KEY AUTOINCREMENT, user TEXT, ai TEXT ) """) conn.commit() conn.close()
def save_conversation(user_input, ai_response): """Save a conversation entry to the database and maintain only the last 20 entries.""" try: conn = sqlite3.connect(DB_FILE) c = conn.cursor() c.execute("INSERT INTO memory (user, ai) VALUES (?, ?)", (user_input, ai_response)) c.execute(""" DELETE FROM memory WHERE id NOT IN ( SELECT id FROM memory ORDER BY id DESC LIMIT 20 ) """) conn.commit() conn.close() print(f"Successfully saved: User - {user_input}, AI - {ai_response}") except Exception as e: print(f"Error saving conversation: {e}")
def get_last_conversations(limit=5): """Retrieve the last 'limit' number of conversations""" try: conn = sqlite3.connect(DB_FILE) c = conn.cursor() c.execute("SELECT user, ai FROM memory ORDER BY id DESC LIMIT ?", (limit,)) conversations = c.fetchall() conn.close() return conversations except Exception as e: print(f"Error retrieving conversations: {e}") return []
Initialize the database when this script is run
init_db() ```
Step 2: Integrating Memory into Open WebUI Middleware
We'll modify the Open WebUI middleware to save and retrieve conversations.
2.1 Edit
middleware.py
Open the
middleware.py
file for editing:bash nano middleware.py
2.2 Import Memory Functions
At the top of the file, import the memory functions:
python from conversation_memory import save_conversation, get_last_conversations
2.3 Retrieve and Append Conversation History
Locate the function responsible for processing chat payloads. Add the following code to retrieve and append the last 20 conversations:
```python
Retrieve past conversations (e.g., last 20 messages)
conversation_history = get_last_conversations(limit=20)
Format past conversations as context
history_text = "\n".join([f"User: {conv[0]}\nAI: {conv[1]}" for conv in conversation_history])
Append conversation history to the current user message
user_message = get_last_user_message(form_data["messages"]) if history_text: combined_message = f"Previous conversation:\n{history_text}\n\nNew message:\nUser: {user_message}" else: combined_message = f"User: {user_message}"
Update the last user message with combined history
form_data["messages"][-1]["content"] = combined_message ```
2.4 Save New Conversations
Ensure that new conversations are saved after the AI generates a response. Add the following code where the AI response is handled:
```python
Extract AI response content
if isinstance(ai_response, dict) and "choices" in ai_response: ai_response_content = ai_response["choices"][0]["message"]["content"] else: ai_response_content = ""
Save the new conversation
if ai_response_content.strip(): save_conversation(user_message, ai_response_content) ```
Step 3: Testing Persistent Memory
3.1 Run the Script to Test Saving
Run
conversation_memory.py
to ensure it's saving data correctly:bash python3 /home/your_username/Documents/open-webui-0.5.10/backend/conversation_memory.py
3.2 Query the Database to Verify Data
Use SQLite to check if conversations are being saved:
bash sqlite3 /home/your_username/Documents/open-webui-0.5.10/backend/memory.db sqlite> SELECT * FROM memory;
You should see your test conversations listed.
Step 4: Final Verification in Open WebUI
- Restart the Open WebUI server to apply changes.
- Start a conversation with the AI.
- After several interactions, verify if the AI references past conversations.
- Query
memory.db
again to ensure new conversations are being saved:
bash sqlite3 /home/your_username/Documents/open-webui-0.5.10/backend/memory.db sqlite> SELECT * FROM memory;
Conclusion
You’ve successfully enabled persistent memory for your AI models running with Ollama and Open WebUI! The AI will now remember the last 20 conversations, creating a more dynamic and personalized user experience.
Feel free to adjust the memory limit or expand the functionality as needed. Happy coding!
Advocating for privacy does not finance itself. If you enjoyed this article, please consider zapping or sending monero
82XCDNK1Js8TethhpGLFPbVyKe25DxMUePad1rUn9z7V6QdCzxHEE7varvVh1VUidUhHVSA4atNU2BTpSNJLC1BqSvDajw1
-
@ a95c6243:d345522c
2025-02-15 19:05:38Auf der diesjährigen Münchner Sicherheitskonferenz geht es vor allem um die Ukraine. Protagonisten sind dabei zunächst die US-Amerikaner. Präsident Trump schockierte die Europäer kurz vorher durch ein Telefonat mit seinem Amtskollegen Wladimir Putin, während Vizepräsident Vance mit seiner Rede über Demokratie und Meinungsfreiheit für versteinerte Mienen und Empörung sorgte.
Die Bemühungen der Europäer um einen Frieden in der Ukraine halten sich, gelinde gesagt, in Grenzen. Größeres Augenmerk wird auf militärische Unterstützung, die Pflege von Feindbildern sowie Eskalation gelegt. Der deutsche Bundeskanzler Scholz reagierte auf die angekündigten Verhandlungen über einen möglichen Frieden für die Ukraine mit der Forderung nach noch höheren «Verteidigungsausgaben». Auch die amtierende Außenministerin Baerbock hatte vor der Münchner Konferenz klargestellt:
«Frieden wird es nur durch Stärke geben. (...) Bei Corona haben wir gesehen, zu was Europa fähig ist. Es braucht erneut Investitionen, die der historischen Wegmarke, vor der wir stehen, angemessen sind.»
Die Rüstungsindustrie freut sich in jedem Fall über weltweit steigende Militärausgaben. Die Kriege in der Ukraine und in Gaza tragen zu Rekordeinnahmen bei. Jetzt «winkt die Aussicht auf eine jahrelange große Nachrüstung in Europa», auch wenn der Ukraine-Krieg enden sollte, so hört man aus Finanzkreisen. In der Konsequenz kennt «die Aktie des deutschen Vorzeige-Rüstungskonzerns Rheinmetall in ihrem Anstieg offenbar gar keine Grenzen mehr». «Solche Friedensversprechen» wie das jetzige hätten in der Vergangenheit zu starken Kursverlusten geführt.
Für manche Leute sind Kriegswaffen und sonstige Rüstungsgüter Waren wie alle anderen, jedenfalls aus der Perspektive von Investoren oder Managern. Auch in diesem Bereich gibt es Startups und man spricht von Dingen wie innovativen Herangehensweisen, hocheffizienten Produktionsanlagen, skalierbaren Produktionstechniken und geringeren Stückkosten.
Wir lesen aktuell von Massenproduktion und gesteigerten Fertigungskapazitäten für Kriegsgerät. Der Motor solcher Dynamik und solchen Wachstums ist die Aufrüstung, die inzwischen permanent gefordert wird. Parallel wird die Bevölkerung verbal eingestimmt und auf Kriegstüchtigkeit getrimmt.
Das Rüstungs- und KI-Startup Helsing verkündete kürzlich eine «dezentrale Massenproduktion für den Ukrainekrieg». Mit dieser Expansion positioniere sich das Münchner Unternehmen als einer der weltweit führenden Hersteller von Kampfdrohnen. Der nächste «Meilenstein» steht auch bereits an: Man will eine Satellitenflotte im Weltraum aufbauen, zur Überwachung von Gefechtsfeldern und Truppenbewegungen.
Ebenfalls aus München stammt das als DefenseTech-Startup bezeichnete Unternehmen ARX Robotics. Kürzlich habe man in der Region die größte europäische Produktionsstätte für autonome Verteidigungssysteme eröffnet. Damit fahre man die Produktion von Militär-Robotern hoch. Diese Expansion diene auch der Lieferung der «größten Flotte unbemannter Bodensysteme westlicher Bauart» in die Ukraine.
Rüstung boomt und scheint ein Zukunftsmarkt zu sein. Die Hersteller und Vermarkter betonen, mit ihren Aktivitäten und Produkten solle die europäische Verteidigungsfähigkeit erhöht werden. Ihre Strategien sollten sogar «zum Schutz demokratischer Strukturen beitragen».
Dieser Beitrag ist zuerst auf Transition News erschienen.
-
@ c631e267:c2b78d3e
2025-02-07 19:42:11Nur wenn wir aufeinander zugehen, haben wir die Chance \ auf Überwindung der gegenseitigen Ressentiments! \ Dr. med. dent. Jens Knipphals
In Wolfsburg sollte es kürzlich eine Gesprächsrunde von Kritikern der Corona-Politik mit Oberbürgermeister Dennis Weilmann und Vertretern der Stadtverwaltung geben. Der Zahnarzt und langjährige Maßnahmenkritiker Jens Knipphals hatte diese Einladung ins Rathaus erwirkt und publiziert. Seine Motivation:
«Ich möchte die Spaltung der Gesellschaft überwinden. Dazu ist eine umfassende Aufarbeitung der Corona-Krise in der Öffentlichkeit notwendig.»
Schon früher hatte Knipphals Antworten von den Kommunalpolitikern verlangt, zum Beispiel bei öffentlichen Bürgerfragestunden. Für das erwartete Treffen im Rathaus formulierte er Fragen wie: Warum wurden fachliche Argumente der Kritiker ignoriert? Weshalb wurde deren Ausgrenzung, Diskreditierung und Entmenschlichung nicht entgegengetreten? In welcher Form übernehmen Rat und Verwaltung in Wolfsburg persönlich Verantwortung für die erheblichen Folgen der politischen Corona-Krise?
Der Termin fand allerdings nicht statt – der Bürgermeister sagte ihn kurz vorher wieder ab. Knipphals bezeichnete Weilmann anschließend als Wiederholungstäter, da das Stadtoberhaupt bereits 2022 zu einem Runden Tisch in der Sache eingeladen hatte, den es dann nie gab. Gegenüber Multipolar erklärte der Arzt, Weilmann wolle scheinbar eine öffentliche Aufarbeitung mit allen Mitteln verhindern. Er selbst sei «inzwischen absolut desillusioniert» und die einzige Lösung sei, dass die Verantwortlichen gingen.
Die Aufarbeitung der Plandemie beginne bei jedem von uns selbst, sei aber letztlich eine gesamtgesellschaftliche Aufgabe, schreibt Peter Frey, der den «Fall Wolfsburg» auch in seinem Blog behandelt. Diese Aufgabe sei indes deutlich größer, als viele glaubten. Erfreulicherweise sei der öffentliche Informationsraum inzwischen größer, trotz der weiterhin unverfrorenen Desinformations-Kampagnen der etablierten Massenmedien.
Frey erinnert daran, dass Dennis Weilmann mitverantwortlich für gravierende Grundrechtseinschränkungen wie die 2021 eingeführten 2G-Regeln in der Wolfsburger Innenstadt zeichnet. Es sei naiv anzunehmen, dass ein Funktionär einzig im Interesse der Bürger handeln würde. Als früherer Dezernent des Amtes für Wirtschaft, Digitalisierung und Kultur der Autostadt kenne Weilmann zum Beispiel die Verknüpfung von Fördergeldern mit politischen Zielsetzungen gut.
Wolfsburg wurde damals zu einem Modellprojekt des Bundesministeriums des Innern (BMI) und war Finalist im Bitkom-Wettbewerb «Digitale Stadt». So habe rechtzeitig vor der Plandemie das Projekt «Smart City Wolfsburg» anlaufen können, das der Stadt «eine Vorreiterrolle für umfassende Vernetzung und Datenerfassung» aufgetragen habe, sagt Frey. Die Vereinten Nationen verkauften dann derartige «intelligente» Überwachungs- und Kontrollmaßnahmen ebenso als Rettung in der Not wie das Magazin Forbes im April 2020:
«Intelligente Städte können uns helfen, die Coronavirus-Pandemie zu bekämpfen. In einer wachsenden Zahl von Ländern tun die intelligenten Städte genau das. Regierungen und lokale Behörden nutzen Smart-City-Technologien, Sensoren und Daten, um die Kontakte von Menschen aufzuspüren, die mit dem Coronavirus infiziert sind. Gleichzeitig helfen die Smart Cities auch dabei, festzustellen, ob die Regeln der sozialen Distanzierung eingehalten werden.»
Offensichtlich gibt es viele Aspekte zu bedenken und zu durchleuten, wenn es um die Aufklärung und Aufarbeitung der sogenannten «Corona-Pandemie» und der verordneten Maßnahmen geht. Frustration und Desillusion sind angesichts der Realitäten absolut verständlich. Gerade deswegen sind Initiativen wie die von Jens Knipphals so bewundernswert und so wichtig – ebenso wie eine seiner Kernthesen: «Wir müssen aufeinander zugehen, da hilft alles nichts».
Dieser Beitrag ist zuerst auf Transition News erschienen.
-
@ bd32f268:22b33966
2025-03-05 11:04:29Segundo a filosofia Aristotélica quando analisamos uma coisa seja ela um objecto ou um fenómeno devemos ser capazes de observar as suas causas. Podemos dizer que analisar as causas nos permite compreender com outra densidade, a origem, o significado e a finalidade das coisas.
Atualmente, estamos vetados a um reducionismo materialista quando fazemos ciência, sendo portanto nota dominante a nossa fixação na matéria como o fator primordial do conhecimento dos objetos. Ao fixarmo-nos neste aspeto perdemos muitas outras dimensões que compõe as coisas.
Atendamos então a Aristóteles e a quatro causas que este autor identifica para as coisas e fenómenos.
Segundo o filósofo grego as causas dividem-se entre: materiais (relativas ao que algo é feito), as formais (relativas ao que algo é), as eficientes/motoras (relativas ao que as produziu ou quem as produziu) e as finais ( relativas á finalidade, Télos ou para quê; ou seja o que algo visa ou “tem por fim”).
Seguindo esta teoria das quatro das quatro causas podemos descrever as condições de existência tanto de entidades estáticas como em transformação. Quer isto dizer que assim temos meios para explorar o porquê das coisas. Até conhecermos o porquê das coisas não podemos dizer que as conhecemos verdadeiramente.
Analisemos um exemplo para que fique mais claro este método de análise. Uma mesa tem como causa material a madeira que a compõe, a sua causa formal (que diz respeito à forma) é a estrutura, ou seja o seu design; a sua causa eficiente é o trabalho de carpintaria que lhe deu origem e a sua causa final é servir de suporte para as refeições.
\ Destas causas destaco em particular a causa final que creio ser a que mais frequentemente induz confusão nas pessoas. De facto, o conhecimento da finalidade das coisas é fundamental inclusive para que possamos viver de forma harmoniosa com a realidade. É certo que nos podemos sentar numa mesa e jantar na cadeira, contudo automaticamente vamos perceber a desarmonia que advém dessa decisão.
Por vezes essa desarmonia não será tão evidente, no entanto não nos podemos esquecer que tudo o que existe tem um propósito, isto é orienta-se para um fim, cumprindo-nos agir em conformidade com a natureza das coisas para alcançar essa harmonia com a própria realidade.
São muitas as ocasiões na nossa vida que queremos de alguma forma revogar esta inclinação natural das coisas para os seus fins, que funciona também como objeto e fundamento para a lei natural. Vejamos por exemplo a forma como muitas vezes quando comemos, em vez ordenar a nossa ação pelo fim primeiro (alimentar-se) buscamos o prazer como fim primário ao qual os outros estão subordinados resultando em desordem, ou seja num apetite que não está em conformidade com o objetivo último da alimentação. Não quer isto dizer que não se possa ou deva sentir prazer ao comer, quer apenas dizer que o fim último para que existe esse ato não é o prazer, mas sim a subsistência do corpo. Com este exemplo conseguimos perceber que há uma ordenação natural nos fins para que se orientam as coisas, sendo que nessa ordenação há sempre fins primários e secundários. Sendo conscientes dessa hierarquia podemos, de uma forma mais ajustada adaptar as nossas atitudes á realidade, isto é aos preceitos da lei natural.
-
@ a95c6243:d345522c
2025-01-31 20:02:25Im Augenblick wird mit größter Intensität, großer Umsicht \ das deutsche Volk belogen. \ Olaf Scholz im FAZ-Interview
Online-Wahlen stärken die Demokratie, sind sicher, und 61 Prozent der Wahlberechtigten sprechen sich für deren Einführung in Deutschland aus. Das zumindest behauptet eine aktuelle Umfrage, die auch über die Agentur Reuters Verbreitung in den Medien gefunden hat. Demnach würden außerdem 45 Prozent der Nichtwähler bei der Bundestagswahl ihre Stimme abgeben, wenn sie dies zum Beispiel von Ihrem PC, Tablet oder Smartphone aus machen könnten.
Die telefonische Umfrage unter gut 1000 wahlberechtigten Personen sei repräsentativ, behauptet der Auftraggeber – der Digitalverband Bitkom. Dieser präsentiert sich als eingetragener Verein mit einer beeindruckenden Liste von Mitgliedern, die Software und IT-Dienstleistungen anbieten. Erklärtes Vereinsziel ist es, «Deutschland zu einem führenden Digitalstandort zu machen und die digitale Transformation der deutschen Wirtschaft und Verwaltung voranzutreiben».
Durchgeführt hat die Befragung die Bitkom Servicegesellschaft mbH, also alles in der Familie. Die gleiche Erhebung hatte der Verband übrigens 2021 schon einmal durchgeführt. Damals sprachen sich angeblich sogar 63 Prozent für ein derartiges «Demokratie-Update» aus – die Tendenz ist demgemäß fallend. Dennoch orakelt mancher, der Gang zur Wahlurne gelte bereits als veraltet.
Die spanische Privat-Uni mit Globalisten-Touch, IE University, berichtete Ende letzten Jahres in ihrer Studie «European Tech Insights», 67 Prozent der Europäer befürchteten, dass Hacker Wahlergebnisse verfälschen könnten. Mehr als 30 Prozent der Befragten glaubten, dass künstliche Intelligenz (KI) bereits Wahlentscheidungen beeinflusst habe. Trotzdem würden angeblich 34 Prozent der unter 35-Jährigen einer KI-gesteuerten App vertrauen, um in ihrem Namen für politische Kandidaten zu stimmen.
Wie dauerhaft wird wohl das Ergebnis der kommenden Bundestagswahl sein? Diese Frage stellt sich angesichts der aktuellen Entwicklung der Migrations-Debatte und der (vorübergehend) bröckelnden «Brandmauer» gegen die AfD. Das «Zustrombegrenzungsgesetz» der Union hat das Parlament heute Nachmittag überraschenderweise abgelehnt. Dennoch muss man wohl kein ausgesprochener Pessimist sein, um zu befürchten, dass die Entscheidungen der Bürger von den selbsternannten Verteidigern der Demokratie künftig vielleicht nicht respektiert werden, weil sie nicht gefallen.
Bundesweit wird jetzt zu «Brandmauer-Demos» aufgerufen, die CDU gerät unter Druck und es wird von Übergriffen auf Parteibüros und Drohungen gegen Mitarbeiter berichtet. Sicherheitsbehörden warnen vor Eskalationen, die Polizei sei «für ein mögliches erhöhtes Aufkommen von Straftaten gegenüber Politikern und gegen Parteigebäude sensibilisiert».
Der Vorwand «unzulässiger Einflussnahme» auf Politik und Wahlen wird als Argument schon seit einiger Zeit aufgebaut. Der Manipulation schuldig befunden wird neben Putin und Trump auch Elon Musk, was lustigerweise ausgerechnet Bill Gates gerade noch einmal bekräftigt und als «völlig irre» bezeichnet hat. Man stelle sich die Diskussionen um die Gültigkeit von Wahlergebnissen vor, wenn es Online-Verfahren zur Stimmabgabe gäbe. In der Schweiz wird «E-Voting» seit einigen Jahren getestet, aber wohl bisher mit wenig Erfolg.
Die politische Brandstiftung der letzten Jahre zahlt sich immer mehr aus. Anstatt dringende Probleme der Menschen zu lösen – zu denen auch in Deutschland die weit verbreitete Armut zählt –, hat die Politik konsequent polarisiert und sich auf Ausgrenzung und Verhöhnung großer Teile der Bevölkerung konzentriert. Basierend auf Ideologie und Lügen werden abweichende Stimmen unterdrückt und kriminalisiert, nicht nur und nicht erst in diesem Augenblick. Die nächsten Wochen dürften ausgesprochen spannend werden.
Dieser Beitrag ist zuerst auf Transition News erschienen.
-
@ a95c6243:d345522c
2025-01-24 20:59:01Menschen tun alles, egal wie absurd, \ um ihrer eigenen Seele nicht zu begegnen. \ Carl Gustav Jung
«Extremer Reichtum ist eine Gefahr für die Demokratie», sagen über die Hälfte der knapp 3000 befragten Millionäre aus G20-Staaten laut einer Umfrage der «Patriotic Millionaires». Ferner stellte dieser Zusammenschluss wohlhabender US-Amerikaner fest, dass 63 Prozent jener Millionäre den Einfluss von Superreichen auf US-Präsident Trump als Bedrohung für die globale Stabilität ansehen.
Diese Besorgnis haben 370 Millionäre und Milliardäre am Dienstag auch den in Davos beim WEF konzentrierten Privilegierten aus aller Welt übermittelt. In einem offenen Brief forderten sie die «gewählten Führer» auf, die Superreichen – also sie selbst – zu besteuern, um «die zersetzenden Auswirkungen des extremen Reichtums auf unsere Demokratien und die Gesellschaft zu bekämpfen». Zum Beispiel kontrolliere eine handvoll extrem reicher Menschen die Medien, beeinflusse die Rechtssysteme in unzulässiger Weise und verwandele Recht in Unrecht.
Schon 2019 beanstandete der bekannte Historiker und Schriftsteller Ruthger Bregman an einer WEF-Podiumsdiskussion die Steuervermeidung der Superreichen. Die elitäre Veranstaltung bezeichnete er als «Feuerwehr-Konferenz, bei der man nicht über Löschwasser sprechen darf.» Daraufhin erhielt Bregman keine Einladungen nach Davos mehr. Auf seine Aussagen machte der Schweizer Aktivist Alec Gagneux aufmerksam, der sich seit Jahrzehnten kritisch mit dem WEF befasst. Ihm wurde kürzlich der Zutritt zu einem dreiteiligen Kurs über das WEF an der Volkshochschule Region Brugg verwehrt.
Nun ist die Erkenntnis, dass mit Geld politischer Einfluss einhergeht, alles andere als neu. Und extremer Reichtum macht die Sache nicht wirklich besser. Trotzdem hat man über Initiativen wie Patriotic Millionaires oder Taxmenow bisher eher selten etwas gehört, obwohl es sie schon lange gibt. Auch scheint es kein Problem, wenn ein Herr Gates fast im Alleingang versucht, globale Gesundheits-, Klima-, Ernährungs- oder Bevölkerungspolitik zu betreiben – im Gegenteil. Im Jahr, als der Milliardär Donald Trump zum zweiten Mal ins Weiße Haus einzieht, ist das Echo in den Gesinnungsmedien dagegen enorm – und uniform, wer hätte das gedacht.
Der neue US-Präsident hat jedoch «Davos geerdet», wie Achgut es nannte. In seiner kurzen Rede beim Weltwirtschaftsforum verteidigte er seine Politik und stellte klar, er habe schlicht eine «Revolution des gesunden Menschenverstands» begonnen. Mit deutlichen Worten sprach er unter anderem von ersten Maßnahmen gegen den «Green New Scam», und von einem «Erlass, der jegliche staatliche Zensur beendet»:
«Unsere Regierung wird die Äußerungen unserer eigenen Bürger nicht mehr als Fehlinformation oder Desinformation bezeichnen, was die Lieblingswörter von Zensoren und derer sind, die den freien Austausch von Ideen und, offen gesagt, den Fortschritt verhindern wollen.»
Wie der «Trumpismus» letztlich einzuordnen ist, muss jeder für sich selbst entscheiden. Skepsis ist definitiv angebracht, denn «einer von uns» sind weder der Präsident noch seine auserwählten Teammitglieder. Ob sie irgendeinen Sumpf trockenlegen oder Staatsverbrechen aufdecken werden oder was aus WHO- und Klimaverträgen wird, bleibt abzuwarten.
Das WHO-Dekret fordert jedenfalls die Übertragung der Gelder auf «glaubwürdige Partner», die die Aktivitäten übernehmen könnten. Zufällig scheint mit «Impfguru» Bill Gates ein weiterer Harris-Unterstützer kürzlich das Lager gewechselt zu haben: Nach einem gemeinsamen Abendessen zeigte er sich «beeindruckt» von Trumps Interesse an der globalen Gesundheit.
Mit dem Projekt «Stargate» sind weitere dunkle Wolken am Erwartungshorizont der Fangemeinde aufgezogen. Trump hat dieses Joint Venture zwischen den Konzernen OpenAI, Oracle, und SoftBank als das «größte KI-Infrastrukturprojekt der Geschichte» angekündigt. Der Stein des Anstoßes: Oracle-CEO Larry Ellison, der auch Fan von KI-gestützter Echtzeit-Überwachung ist, sieht einen weiteren potenziellen Einsatz der künstlichen Intelligenz. Sie könne dazu dienen, Krebserkrankungen zu erkennen und individuelle mRNA-«Impfstoffe» zur Behandlung innerhalb von 48 Stunden zu entwickeln.
Warum bitte sollten sich diese superreichen «Eliten» ins eigene Fleisch schneiden und direkt entgegen ihren eigenen Interessen handeln? Weil sie Menschenfreunde, sogenannte Philanthropen sind? Oder vielleicht, weil sie ein schlechtes Gewissen haben und ihre Schuld kompensieren müssen? Deswegen jedenfalls brauchen «Linke» laut Robert Willacker, einem deutschen Politikberater mit brasilianischen Wurzeln, rechte Parteien – ein ebenso überraschender wie humorvoller Erklärungsansatz.
Wenn eine Krähe der anderen kein Auge aushackt, dann tut sie das sich selbst noch weniger an. Dass Millionäre ernsthaft ihre eigene Besteuerung fordern oder Machteliten ihren eigenen Einfluss zugunsten anderer einschränken würden, halte ich für sehr unwahrscheinlich. So etwas glaube ich erst, wenn zum Beispiel die Rüstungsindustrie sich um Friedensverhandlungen bemüht, die Pharmalobby sich gegen institutionalisierte Korruption einsetzt, Zentralbanken ihre CBDC-Pläne für Bitcoin opfern oder der ÖRR die Abschaffung der Rundfunkgebühren fordert.
Dieser Beitrag ist zuerst auf Transition News erschienen.
-
@ c631e267:c2b78d3e
2025-01-18 09:34:51Die grauenvollste Aussicht ist die der Technokratie – \ einer kontrollierenden Herrschaft, \ die durch verstümmelte und verstümmelnde Geister ausgeübt wird. \ Ernst Jünger
«Davos ist nicht mehr sexy», das Weltwirtschaftsforum (WEF) mache Davos kaputt, diese Aussagen eines Einheimischen las ich kürzlich in der Handelszeitung. Während sich einige vor Ort enorm an der «teuersten Gewerbeausstellung der Welt» bereicherten, würden die negativen Begleiterscheinungen wie Wohnungsnot und Niedergang der lokalen Wirtschaft immer deutlicher.
Nächsten Montag beginnt in dem Schweizer Bergdorf erneut ein Jahrestreffen dieses elitären Clubs der Konzerne, bei dem man mit hochrangigen Politikern aus aller Welt und ausgewählten Vertretern der Systemmedien zusammenhocken wird. Wie bereits in den vergangenen vier Jahren wird die Präsidentin der EU-Kommission, Ursula von der Leyen, in Begleitung von Klaus Schwab ihre Grundsatzansprache halten.
Der deutsche WEF-Gründer hatte bei dieser Gelegenheit immer höchst lobende Worte für seine Landsmännin: 2021 erklärte er sich «stolz, dass Europa wieder unter Ihrer Führung steht» und 2022 fand er es bemerkenswert, was sie erreicht habe angesichts des «erstaunlichen Wandels», den die Welt in den vorangegangenen zwei Jahren erlebt habe; es gebe nun einen «neuen europäischen Geist».
Von der Leyens Handeln während der sogenannten Corona-«Pandemie» lobte Schwab damals bereits ebenso, wie es diese Woche das Karlspreis-Direktorium tat, als man der Beschuldigten im Fall Pfizergate die diesjährige internationale Auszeichnung «für Verdienste um die europäische Einigung» verlieh. Außerdem habe sie die EU nicht nur gegen den «Aggressor Russland», sondern auch gegen die «innere Bedrohung durch Rassisten und Demagogen» sowie gegen den Klimawandel verteidigt.
Jene Herausforderungen durch «Krisen epochalen Ausmaßes» werden indes aus dem Umfeld des WEF nicht nur herbeigeredet – wie man alljährlich zur Zeit des Davoser Treffens im Global Risks Report nachlesen kann, der zusammen mit dem Versicherungskonzern Zurich erstellt wird. Seit die Globalisten 2020/21 in der Praxis gesehen haben, wie gut eine konzertierte und konsequente Angst-Kampagne funktionieren kann, geht es Schlag auf Schlag. Sie setzen alles daran, Schwabs goldenes Zeitfenster des «Great Reset» zu nutzen.
Ziel dieses «großen Umbruchs» ist die totale Kontrolle der Technokraten über die Menschen unter dem Deckmantel einer globalen Gesundheitsfürsorge. Wie aber könnte man so etwas erreichen? Ein Mittel dazu ist die «kreative Zerstörung». Weitere unabdingbare Werkzeug sind die Einbindung, ja Gleichschaltung der Medien und der Justiz.
Ein «Great Mental Reset» sei die Voraussetzung dafür, dass ein Großteil der Menschen Einschränkungen und Manipulationen wie durch die Corona-Maßnahmen praktisch kritik- und widerstandslos hinnehme, sagt der Mediziner und Molekulargenetiker Michael Nehls. Er meint damit eine regelrechte Umprogrammierung des Gehirns, wodurch nach und nach unsere Individualität und unser soziales Bewusstsein eliminiert und durch unreflektierten Konformismus ersetzt werden.
Der aktuelle Zustand unserer Gesellschaften ist auch für den Schweizer Rechtsanwalt Philipp Kruse alarmierend. Durch den Umgang mit der «Pandemie» sieht er die Grundlagen von Recht und Vernunft erschüttert, die Rechtsstaatlichkeit stehe auf dem Prüfstand. Seiner dringenden Mahnung an alle Bürger, die Prinzipien von Recht und Freiheit zu verteidigen, kann ich mich nur anschließen.
Dieser Beitrag ist zuerst auf Transition News erschienen.
-
@ a95c6243:d345522c
2025-01-13 10:09:57Ich begann, Social Media aufzubauen, \ um den Menschen eine Stimme zu geben. \ Mark Zuckerberg
Sind euch auch die Tränen gekommen, als ihr Mark Zuckerbergs Wendehals-Deklaration bezüglich der Meinungsfreiheit auf seinen Portalen gehört habt? Rührend, oder? Während er früher die offensichtliche Zensur leugnete und später die Regierung Biden dafür verantwortlich machte, will er nun angeblich «die Zensur auf unseren Plattformen drastisch reduzieren».
«Purer Opportunismus» ob des anstehenden Regierungswechsels wäre als Klassifizierung viel zu kurz gegriffen. Der jetzige Schachzug des Meta-Chefs ist genauso Teil einer kühl kalkulierten Business-Strategie, wie es die 180 Grad umgekehrte Praxis vorher war. Social Media sind ein höchst lukratives Geschäft. Hinzu kommt vielleicht noch ein bisschen verkorkstes Ego, weil derartig viel Einfluss und Geld sicher auch auf die Psyche schlagen. Verständlich.
«Es ist an der Zeit, zu unseren Wurzeln der freien Meinungsäußerung auf Facebook und Instagram zurückzukehren. Ich begann, Social Media aufzubauen, um den Menschen eine Stimme zu geben», sagte Zuckerberg.
Welche Wurzeln? Hat der Mann vergessen, dass er von der Überwachung, dem Ausspionieren und dem Ausverkauf sämtlicher Daten und digitaler Spuren sowie der Manipulation seiner «Kunden» lebt? Das ist knallharter Kommerz, nichts anderes. Um freie Meinungsäußerung geht es bei diesem Geschäft ganz sicher nicht, und das war auch noch nie so. Die Wurzeln von Facebook liegen in einem Projekt des US-Militärs mit dem Namen «LifeLog». Dessen Ziel war es, «ein digitales Protokoll vom Leben eines Menschen zu erstellen».
Der Richtungswechsel kommt allerdings nicht überraschend. Schon Anfang Dezember hatte Meta-Präsident Nick Clegg von «zu hoher Fehlerquote bei der Moderation» von Inhalten gesprochen. Bei der Gelegenheit erwähnte er auch, dass Mark sehr daran interessiert sei, eine aktive Rolle in den Debatten über eine amerikanische Führungsrolle im technologischen Bereich zu spielen.
Während Milliardärskollege und Big Tech-Konkurrent Elon Musk bereits seinen Posten in der kommenden Trump-Regierung in Aussicht hat, möchte Zuckerberg also nicht nur seine Haut retten – Trump hatte ihn einmal einen «Feind des Volkes» genannt und ihm lebenslange Haft angedroht –, sondern am liebsten auch mitspielen. KI-Berater ist wohl die gewünschte Funktion, wie man nach einem Treffen Trump-Zuckerberg hörte. An seine Verhaftung dachte vermutlich auch ein weiterer Multimilliardär mit eigener Social Media-Plattform, Pavel Durov, als er Zuckerberg jetzt kritisierte und gleichzeitig warnte.
Politik und Systemmedien drehen jedenfalls durch – was zu viel ist, ist zu viel. Etwas weniger Zensur und mehr Meinungsfreiheit würden die Freiheit der Bürger schwächen und seien potenziell vernichtend für die Menschenrechte. Zuckerberg setze mit dem neuen Kurs die Demokratie aufs Spiel, das sei eine «Einladung zum nächsten Völkermord», ernsthaft. Die Frage sei, ob sich die EU gegen Musk und Zuckerberg behaupten könne, Brüssel müsse jedenfalls hart durchgreifen.
Auch um die Faktenchecker macht man sich Sorgen. Für die deutsche Nachrichtenagentur dpa und die «Experten» von Correctiv, die (noch) Partner für Fact-Checking-Aktivitäten von Facebook sind, sei das ein «lukratives Geschäftsmodell». Aber möglicherweise werden die Inhalte ohne diese vermeintlichen Korrektoren ja sogar besser. Anders als Meta wollen jedoch Scholz, Faeser und die Tagesschau keine Fehler zugeben und zum Beispiel Correctiv-Falschaussagen einräumen.
Bei derlei dramatischen Befürchtungen wundert es nicht, dass der öffentliche Plausch auf X zwischen Elon Musk und AfD-Chefin Alice Weidel von 150 EU-Beamten überwacht wurde, falls es irgendwelche Rechtsverstöße geben sollte, die man ihnen ankreiden könnte. Auch der Deutsche Bundestag war wachsam. Gefunden haben dürften sie nichts. Das Ganze war eher eine Show, viel Wind wurde gemacht, aber letztlich gab es nichts als heiße Luft.
Das Anbiedern bei Donald Trump ist indes gerade in Mode. Die Weltgesundheitsorganisation (WHO) tut das auch, denn sie fürchtet um Spenden von über einer Milliarde Dollar. Eventuell könnte ja Elon Musk auch hier künftig aushelfen und der Organisation sowie deren größtem privaten Förderer, Bill Gates, etwas unter die Arme greifen. Nachdem Musks KI-Projekt xAI kürzlich von BlackRock & Co. sechs Milliarden eingestrichen hat, geht da vielleicht etwas.
Dieser Beitrag ist zuerst auf Transition News erschienen.
-
@ 3b7fc823:e194354f
2025-02-12 01:15:49We are constantly surrounded by technologies that claim to enhance our experiences but often come at the cost of our privacy. Think about it – every time you visit a website, cookies are being dropped like breadcrumbs, tracking your every move without you even knowing.
How Tech Companies Collect Your Data: The Spy Next Door
-
Cookies: These tiny files are placed on your device as soon as you visit a site. They follow you around the web, creating a digital trail that companies use to learn about your habits and interests.
-
Tracking Pixels: Like cookies, these are invisible tags that track your actions across different websites. Imagine someone following you wherever you go online – that's what tracking pixels do.
-
Behavioral Targeting: This is when companies analyze your browsing history to serve you ads tailored to your interests. It's like knowing what you like and then bombarding you with it, whether you like it or not.
-
Data Brokers: These middlemen collect data from various sources and sell it on to the highest bidder. Your information could be used for marketing, insurance, or even political purposes – without your consent!
-
Third-Party trackers: Apps and websites you visit may share your data with other companies, creating a web of surveillance that's hard to escape.
What They Do with Your Data
Once companies have your data, they can use it for targeted advertising, profile building, and even political manipulation. Think about the Cambridge Analytica scandal... Your data isn't just used to make your experience better; it's being sold and exploited in ways you probably never imagined.
How to Stop Them: Empower Yourself
-
Use Privacy-Friendly Browsers: Tools like Brave or Firefox with enhanced tracking protection can block trackers and cookies, giving you control over what data is collected.
-
Block Trackers and Cookies: Browser extensions that allow you to block these elements are available for free, providing an added layer of privacy.
-
Minimize Data Usage: When using apps or websites, avoid granting unnecessary permissions that could lead to data collection.
-
Delete Unused Apps: Regularly delete apps and services that are no longer needed to stop data collection from inactive accounts.
-
Read Privacy Policies: Before accepting terms of service or privacy policies, read through them to understand what data will be collected and how it will be used.
-
Use Incognito or Private Browsing Modes: These modes often block cookies and trackers, offering an additional way to reduce data collection. But remember that Google was still tracking you on Chrome regardless, so your mileage may vary.
-
Limit Device Usage: Avoid using personal devices for sensitive activities when privacy is a concern.
-
Use Tor: Yes it's slower, yes some sites won't work. It's more private and you using helps disquise traffic giving protection for others that might need it more than you do.
Why It Matters: The Domino Effect
The data collected today isn't just for ads; it's used in decision-making processes that can affect your life. From insurance rates to job opportunities, your data can influence significant aspects of your existence. Imagine a world where your information is bought and sold without your consent – it's time to take control.
Your Data, Your Choice
Your data is being collected and sold without your consent, and the time to act is now. By understanding how data collection works and taking steps to protect yourself, you can reclaim control over your privacy. Remember, you're not just a user – you're the owner of your information. It's time to stand up for your rights and demand transparency from the companies that claim to serve you.
Don't Let Corporate Spies Steal Your Privacy
Your data is valuable, and it's being harvested without your knowledge. Take action today by educating yourself and others about the importance of privacy. Together, we can create a world where privacy is respected and protected, not exploited for profit.
Join the movement to fight against corporate surveillance and protect your right to privacy. Your information is too important to leave in the hands of those who don't have your consent. It's time to take a stand – your digital life depends on it.
Advocating for privacy does not finance itself. If you enjoyed this article, please consider zapping or sending monero
82XCDNK1Js8TethhpGLFPbVyKe25DxMUePad1rUn9z7V6QdCzxHEE7varvVh1VUidUhHVSA4atNU2BTpSNJLC1BqSvDajw1
-
-
@ a95c6243:d345522c
2025-01-03 20:26:47Was du bist hängt von drei Faktoren ab: \ Was du geerbt hast, \ was deine Umgebung aus dir machte \ und was du in freier Wahl \ aus deiner Umgebung und deinem Erbe gemacht hast. \ Aldous Huxley
Das brave Mitmachen und Mitlaufen in einem vorgegebenen, recht engen Rahmen ist gewiss nicht neu, hat aber gerade wieder mal Konjunktur. Dies kann man deutlich beobachten, eigentlich egal, in welchem gesellschaftlichen Bereich man sich umschaut. Individualität ist nur soweit angesagt, wie sie in ein bestimmtes Schema von «Diversität» passt, und Freiheit verkommt zur Worthülse – nicht erst durch ein gewisses Buch einer gewissen ehemaligen Regierungschefin.
Erklärungsansätze für solche Entwicklungen sind bekannt, und praktisch alle haben etwas mit Massenpsychologie zu tun. Der Herdentrieb, also der Trieb der Menschen, sich – zum Beispiel aus Unsicherheit oder Bequemlichkeit – lieber der Masse anzuschließen als selbstständig zu denken und zu handeln, ist einer der Erklärungsversuche. Andere drehen sich um Macht, Propaganda, Druck und Angst, also den gezielten Einsatz psychologischer Herrschaftsinstrumente.
Aber wollen die Menschen überhaupt Freiheit? Durch Gespräche im privaten Umfeld bin ich diesbezüglich in der letzten Zeit etwas skeptisch geworden. Um die Jahreswende philosophiert man ja gerne ein wenig über das Erlebte und über die Erwartungen für die Zukunft. Dabei hatte ich hin und wieder den Eindruck, die totalitären Anwandlungen unserer «Repräsentanten» kämen manchen Leuten gerade recht.
«Desinformation» ist so ein brisantes Thema. Davor müsse man die Menschen doch schützen, hörte ich. Jemand müsse doch zum Beispiel diese ganzen merkwürdigen Inhalte in den Social Media filtern – zur Ukraine, zum Klima, zu Gesundheitsthemen oder zur Migration. Viele wüssten ja gar nicht einzuschätzen, was richtig und was falsch ist, sie bräuchten eine Führung.
Freiheit bedingt Eigenverantwortung, ohne Zweifel. Eventuell ist es einigen tatsächlich zu anspruchsvoll, die Verantwortung für das eigene Tun und Lassen zu übernehmen. Oder die persönliche Freiheit wird nicht als ausreichend wertvolles Gut angesehen, um sich dafür anzustrengen. In dem Fall wäre die mangelnde Selbstbestimmung wohl das kleinere Übel. Allerdings fehlt dann gemäß Aldous Huxley ein Teil der Persönlichkeit. Letztlich ist natürlich alles eine Frage der Abwägung.
Sind viele Menschen möglicherweise schon so «eingenordet», dass freiheitliche Ambitionen gar nicht für eine ganze Gruppe, ein Kollektiv, verfolgt werden können? Solche Gedanken kamen mir auch, als ich mir kürzlich diverse Talks beim viertägigen Hacker-Kongress des Chaos Computer Clubs (38C3) anschaute. Ich war nicht nur überrascht, sondern reichlich erschreckt angesichts der in weiten Teilen mainstream-geformten Inhalte, mit denen ein dankbares Publikum beglückt wurde. Wo ich allgemein hellere Köpfe erwartet hatte, fand ich Konformismus und enthusiastisch untermauerte Narrative.
Gibt es vielleicht so etwas wie eine Herdenimmunität gegen Indoktrination? Ich denke, ja, zumindest eine gestärkte Widerstandsfähigkeit. Was wir brauchen, sind etwas gesunder Menschenverstand, offene Informationskanäle und der Mut, sich freier auch zwischen den Herden zu bewegen. Sie tun das bereits, aber sagen Sie es auch dieses Jahr ruhig weiter.
Dieser Beitrag ist zuerst auf Transition News erschienen.
-
@ a012dc82:6458a70d
2025-03-05 10:24:56In the dynamic and often unpredictable realm of cryptocurrency, the actions of Bitcoin whales—investors who hold large amounts of BTC—can significantly influence market trends and investor sentiment. A recent transaction, involving the transfer of over $1.5 billion worth of Bitcoin, has once again highlighted the profound impact these entities can have on the digital currency landscape. This article delves into the details of this massive move, exploring its implications and the broader context of whale activity in the cryptocurrency market.
Table of Contents
-
The Billion-Dollar Transaction: A Deep Dive
- Other Significant Whale Movements
-
Analyzing the Impact of Whale Activity
-
Market Volatility and Speculation
-
Psychological Impact on Investors
-
-
The Role of Whales in the Cryptocurrency Ecosystem
-
Liquidity and Market Depth
-
Influence on Adoption and Perception
-
-
The Billion-Dollar Transfer in Context
-
Bitcoin's Market Position
-
Historical Whale Activity
-
-
Future Implications and the Evolving Role of Whale …
-
Regulatory Environment
-
Institutional Investors and Market Stability
-
Technological Advances and Market Monitoring
-
-
Conclusion
-
FAQs
The Billion-Dollar Transaction: A Deep Dive
On January 31st, the cryptocurrency community was abuzz with news of a monumental Bitcoin transfer. A whale moved 35,049 BTC, valued at approximately $1,518,020,170, from one unknown wallet to another. This transaction not only stood out due to its sheer size but also because it underscored the significant liquidity and wealth concentrated in the hands of a few within the Bitcoin ecosystem.
Other Significant Whale Movements
The billion-dollar transfer was part of a series of large transactions that day, which included:
-
25,266 BTC ($1,099,679,062) transferred between unknown wallets.
-
929 BTC ($39,562,024) moved from Coinbase to Gemini.
-
2,500 BTC ($106,647,312) sent to PayPal.
-
1,736 BTC ($73,943,008) transferred to Gemini.
-
34,300 BTC ($1,476,690,397) moved between unknown wallets.
These transactions, totaling around $4.5 billion, highlight the enormous sums that whales can mobilize, influencing the Bitcoin market's liquidity and volatility.
Analyzing the Impact of Whale Activity
The actions of Bitcoin whales can lead to significant market movements. Large-scale transfers and trades can signal potential sales or acquisitions, prompting widespread speculation and reactive trading among smaller investors.
Market Volatility and Speculation
The recent billion-dollar transaction has sparked intense speculation regarding the whale's motives and the potential repercussions for Bitcoin's price stability. Such movements can create uncertainty, leading to price volatility as the market reacts to perceived changes in supply and demand.
Psychological Impact on Investors
Whale activity can also have a psychological impact on retail investors. The knowledge that a single entity or group can move the market might lead to caution, fear, or even panic selling, exacerbating price fluctuations and potentially leading to market manipulation accusations.
The Role of Whales in the Cryptocurrency Ecosystem
Bitcoin whales play a crucial role in the cryptocurrency ecosystem. Their significant holdings give them considerable influence over market dynamics, liquidity, and even the adoption and perception of Bitcoin as a digital asset.
Liquidity and Market Depth
Whales contribute to market liquidity and depth by providing substantial capital. Their trades, though potentially disruptive in the short term, help create a more liquid market, enabling other investors to execute large transactions more smoothly.
Influence on Adoption and Perception
The actions of whales can influence the broader perception of Bitcoin. Significant investments or divestments by these entities can signal confidence or concern regarding Bitcoin's future, influencing the sentiment of smaller investors and the general public.
The Billion-Dollar Transfer in Context
To fully understand the implications of the billion-dollar transfer, it's essential to consider the broader context of Bitcoin's market position and the historical activity of whales.
Bitcoin's Market Position At the time of the transfer, Bitcoin was trading at $42,647, experiencing a slight decrease from its previous values. This period of relative stability makes the timing of the whale's move particularly noteworthy, as it suggests strategic positioning rather than a reaction to short-term market trends.
Historical Whale Activity
Historically, whale movements have preceded significant market movements, both bullish and bearish. By analyzing past transactions, investors attempt to predict future market directions based on whale behavior. However, the opaque nature of these entities and their motivations makes such predictions speculative at best.
Future Implications and the Evolving Role of Whales
As the cryptocurrency market matures, the role and impact of whales may evolve. Regulatory changes, the growing adoption of Bitcoin, and the entrance of institutional investors could all influence whale behavior and their impact on the market.
Regulatory Environment
Increased regulatory scrutiny could lead to more transparency in whale transactions, potentially mitigating some of the market volatility associated with these moves. However, it could also lead to more sophisticated strategies by whales to conceal their actions or to manipulate the market within legal boundaries.
Institutional Investors and Market Stability
The entrance of more institutional investors into the cryptocurrency market could dilute the relative influence of individual whales, leading to greater market stability. Institutional investors typically employ more conservative strategies and are subject to stricter regulatory oversight, which could help moderate the impact of large-scale transactions.
Technological Advances and Market Monitoring Advancements in blockchain analytics and monitoring tools are making it easier to track whale activity in real-time. This increased transparency could help demystify whale actions, allowing smaller investors to make more informed decisions and potentially leveling the playing field.
Conclusion
The recent billion-dollar Bitcoin transfer by a whale is a stark reminder of the significant influence these entities hold over the cryptocurrency market. While their actions can lead to market volatility and speculation, they also play a crucial role in providing liquidity and depth to the market. As the cryptocurrency ecosystem continues to evolve, understanding the motivations and implications of whale activity will remain a critical aspect of navigating the digital asset landscape.
FAQs
What is a Bitcoin whale? A Bitcoin whale is an individual or entity that holds a large amount of Bitcoin. These investors have enough capital to influence market movements significantly when they buy or sell large quantities of BTC.
How much Bitcoin was moved by the whale? The whale moved 35,049 BTC, which was valued at approximately $1,518,020,170 at the time of the transaction.
Where was the Bitcoin transferred? The Bitcoin was transferred from one unknown wallet to another. The identities of the parties involved and the purpose of the transfer remain undisclosed.
Were there other significant transactions on the same day? Yes, there were several other significant transactions on the same day, including transfers worth hundreds of millions and billions of dollars, contributing to a total movement of about $4.5 billion in Bitcoin by whales.
How do whale movements affect the Bitcoin market? Whale movements can lead to increased volatility in the Bitcoin market. Large transactions can signal potential sales or purchases to other traders, influencing the market price and leading to speculative trading.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
X: @croxroadnewsco
Instagram: @croxroadnews.co/
Youtube: @thebitcoinlibertarian
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
Get Orange Pill App And Connect With Bitcoiners In Your Area. Stack Friends Who Stack Sats link: https://signup.theorangepillapp.com/opa/croxroad
Buy Bitcoin Books At Konsensus Network Store. 10% Discount With Code “21croxroad” link: https://bitcoinbook.shop?ref=21croxroad
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ 3b7fc823:e194354f
2025-02-10 18:56:06A VPN is Not Magic
A VPN is a virtual private network. A VPN service provides an encrypted tunnel between your device and a server they own or rent. You then connect to the internet from this server thus making your IP address appear to the wider internet as the server IP. That's it. That's all it does.
Your Device -> VPN -> Website
Your Device sees that you are connecting to a website through a VPN. Your ISP sees that you are connecting to a VPN server but nothing after. The website sees that someone from a VPN is connecting to them but doesn't know who. The VPN sees your device connected to their server and that you then connected to a website.
VPN Anonymity and Privacy
VPNs do a lot to protect your privacy, they keep your ISP from seeing and logging every single thing you do online and they spoof your location and IP to any website that you visit. Although this website protection isn't 100% anonymous because of cookies, trackers, and if you have to log into a site with your information. If you are using a VPN on a mobile phone then you are still broadcasting your location to the cell towers even if you are not telling the website you are browsing.
Then there is the elephant in the room. The VPN knows all and sees all. How much do they log? How long do they save it? Can you trust them? This is going to vary VASTLY between VPN providers. I always prefer if they are setup where they cannot know the information in the first place and limit what I tell them in the first place by paying through the use of bitcoin or monero. Just because they have a no log "policy" in place it doesn't always fill me with confidence.
VPN Security
How much security does a VPN give you? Some in certain circumstances but not a lot. A VPN is not going to stop malware or viruses. A VPN can provide some protection from a man in the middle or evil twin attack as it provides a encrypted tunnel between your device and the VPN server, so always use a VPN when joining public WIFI spots. Just remember a VPN cannot protect you downstream on the connection between the VPN server and the website, always use secure encrypted connections and be aware that MITM attacks can still happen on the backside. A VPN can prevent DDoS attacks since the attacker doesn't know your real IP address and a fantastic use of VPNs is to protect IoT devices. Those smart devices around your home love to scream out all their data insecurely and a VPN can change their IP and encrypt their data in transit protecting them from hacking.
VPN Legality
In many countries VPNs are banned, blocked, or outright illegal:
Bahrain Belarus China Cuba Egypt Iran Iraq Libya Myanmar North Korea Oman Russia Syria Turkey Turkmenistan UAE Uganda Venezuela Vietnam
Advocating for privacy does not finance itself. If you enjoyed this article, please consider zapping or sending monero
82XCDNK1Js8TethhpGLFPbVyKe25DxMUePad1rUn9z7V6QdCzxHEE7varvVh1VUidUhHVSA4atNU2BTpSNJLC1BqSvDajw1
-
@ a95c6243:d345522c
2025-01-01 17:39:51Heute möchte ich ein Gedicht mit euch teilen. Es handelt sich um eine Ballade des österreichischen Lyrikers Johann Gabriel Seidl aus dem 19. Jahrhundert. Mir sind diese Worte fest in Erinnerung, da meine Mutter sie perfekt rezitieren konnte, auch als die Kräfte schon langsam schwanden.
Dem originalen Titel «Die Uhr» habe ich für mich immer das Wort «innere» hinzugefügt. Denn der Zeitmesser – hier vermutliche eine Taschenuhr – symbolisiert zwar in dem Kontext das damalige Zeitempfinden und die Umbrüche durch die industrielle Revolution, sozusagen den Zeitgeist und das moderne Leben. Aber der Autor setzt sich philosophisch mit der Zeit auseinander und gibt seinem Werk auch eine klar spirituelle Dimension.
Das Ticken der Uhr und die Momente des Glücks und der Trauer stehen sinnbildlich für das unaufhaltsame Fortschreiten und die Vergänglichkeit des Lebens. Insofern könnte man bei der Uhr auch an eine Sonnenuhr denken. Der Rhythmus der Ereignisse passt uns vielleicht nicht immer in den Kram.
Was den Takt pocht, ist durchaus auch das Herz, unser «inneres Uhrwerk». Wenn dieses Meisterwerk einmal stillsteht, ist es unweigerlich um uns geschehen. Hoffentlich können wir dann dankbar sagen: «Ich habe mein Bestes gegeben.»
Ich trage, wo ich gehe, stets eine Uhr bei mir; \ Wieviel es geschlagen habe, genau seh ich an ihr. \ Es ist ein großer Meister, der künstlich ihr Werk gefügt, \ Wenngleich ihr Gang nicht immer dem törichten Wunsche genügt.
Ich wollte, sie wäre rascher gegangen an manchem Tag; \ Ich wollte, sie hätte manchmal verzögert den raschen Schlag. \ In meinen Leiden und Freuden, in Sturm und in der Ruh, \ Was immer geschah im Leben, sie pochte den Takt dazu.
Sie schlug am Sarge des Vaters, sie schlug an des Freundes Bahr, \ Sie schlug am Morgen der Liebe, sie schlug am Traualtar. \ Sie schlug an der Wiege des Kindes, sie schlägt, will's Gott, noch oft, \ Wenn bessere Tage kommen, wie meine Seele es hofft.
Und ward sie auch einmal träger, und drohte zu stocken ihr Lauf, \ So zog der Meister immer großmütig sie wieder auf. \ Doch stände sie einmal stille, dann wär's um sie geschehn, \ Kein andrer, als der sie fügte, bringt die Zerstörte zum Gehn.
Dann müßt ich zum Meister wandern, der wohnt am Ende wohl weit, \ Wohl draußen, jenseits der Erde, wohl dort in der Ewigkeit! \ Dann gäb ich sie ihm zurücke mit dankbar kindlichem Flehn: \ Sieh, Herr, ich hab nichts verdorben, sie blieb von selber stehn.
Johann Gabriel Seidl (1804-1875)
-
@ a95c6243:d345522c
2024-12-21 09:54:49Falls du beim Lesen des Titels dieses Newsletters unwillkürlich an positive Neuigkeiten aus dem globalen polit-medialen Irrenhaus oder gar aus dem wirtschaftlichen Umfeld gedacht hast, darf ich dich beglückwünschen. Diese Assoziation ist sehr löblich, denn sie weist dich als unverbesserlichen Optimisten aus. Leider muss ich dich diesbezüglich aber enttäuschen. Es geht hier um ein anderes Thema, allerdings sehr wohl ein positives, wie ich finde.
Heute ist ein ganz besonderer Tag: die Wintersonnenwende. Genau gesagt hat heute morgen um 10:20 Uhr Mitteleuropäischer Zeit (MEZ) auf der Nordhalbkugel unseres Planeten der astronomische Winter begonnen. Was daran so außergewöhnlich ist? Der kürzeste Tag des Jahres war gestern, seit heute werden die Tage bereits wieder länger! Wir werden also jetzt jeden Tag ein wenig mehr Licht haben.
Für mich ist dieses Ereignis immer wieder etwas kurios: Es beginnt der Winter, aber die Tage werden länger. Das erscheint mir zunächst wie ein Widerspruch, denn meine spontanen Assoziationen zum Winter sind doch eher Kälte und Dunkelheit, relativ zumindest. Umso erfreulicher ist der emotionale Effekt, wenn dann langsam die Erkenntnis durchsickert: Ab jetzt wird es schon wieder heller!
Natürlich ist es kalt im Winter, mancherorts mehr als anderswo. Vielleicht jedoch nicht mehr lange, wenn man den Klimahysterikern glauben wollte. Mindestens letztes Jahr hat Väterchen Frost allerdings gleich zu Beginn seiner Saison – und passenderweise während des globalen Überhitzungsgipfels in Dubai – nochmal richtig mit der Faust auf den Tisch gehauen. Schnee- und Eischaos sind ja eigentlich in der Agenda bereits nicht mehr vorgesehen. Deswegen war man in Deutschland vermutlich in vorauseilendem Gehorsam schon nicht mehr darauf vorbereitet und wurde glatt lahmgelegt.
Aber ich schweife ab. Die Aussicht auf nach und nach mehr Licht und damit auch Wärme stimmt mich froh. Den Zusammenhang zwischen beidem merkt man in Andalusien sehr deutlich. Hier, wo die Häuser im Winter arg auskühlen, geht man zum Aufwärmen raus auf die Straße oder auf den Balkon. Die Sonne hat auch im Winter eine erfreuliche Kraft. Und da ist jede Minute Gold wert.
Außerdem ist mir vor Jahren so richtig klar geworden, warum mir das südliche Klima so sehr gefällt. Das liegt nämlich nicht nur an der Sonne als solcher, oder der Wärme – das liegt vor allem am Licht. Ohne Licht keine Farben, das ist der ebenso simple wie gewaltige Unterschied zwischen einem deprimierenden matschgraubraunen Winter und einem fröhlichen bunten. Ein großes Stück Lebensqualität.
Mir gefällt aber auch die Symbolik dieses Tages: Licht aus der Dunkelheit, ein Wendepunkt, ein Neuanfang, neue Möglichkeiten, Übergang zu neuer Aktivität. In der winterlichen Stille keimt bereits neue Lebendigkeit. Und zwar in einem Zyklus, das wird immer wieder so geschehen. Ich nehme das gern als ein Stück Motivation, es macht mir Hoffnung und gibt mir Energie.
Übrigens ist parallel am heutigen Tag auf der südlichen Halbkugel Sommeranfang. Genau im entgegengesetzten Rhythmus, sich ergänzend, wie Yin und Yang. Das alles liegt an der Schrägstellung der Erdachse, die ist nämlich um 23,4º zur Umlaufbahn um die Sonne geneigt. Wir erinnern uns, gell?
Insofern bleibt eindeutig festzuhalten, dass “schräg sein” ein willkommener, wichtiger und positiver Wert ist. Mit anderen Worten: auch ungewöhnlich, eigenartig, untypisch, wunderlich, kauzig, … ja sogar irre, spinnert oder gar “quer” ist in Ordnung. Das schließt das Denken mit ein.
In diesem Sinne wünsche ich euch allen urige Weihnachtstage!
Dieser Beitrag ist letztes Jahr in meiner Denkbar erschienen.
-
@ 3b7fc823:e194354f
2025-02-10 17:34:18Dealing with law enforcement can be a challenging and stressful experience. However, understanding your rights and knowing how to navigate such situations can empower you to protect yourself. Here’s a structured approach to handle these interactions effectively:
- Stay Calm and Compliant:
-
When approached by law enforcement, remain calm and avoid sudden movements. Slowly raise your hands and identify yourself if possible.
-
Ask for Identification:
-
Request the officer's name, badge number, and station. This documentation can be crucial later on.
-
Know Your Miranda Rights:
-
Upon arrest, you have the right to remain silent. Do not answer questions without consulting a lawyer. If Mirandized, exercise your right to remain silent.
-
Refuse Incriminating Statements:
-
Avoid answering questions that could incriminate yourself. Politely state, "I will not answer any questions at this time."
-
Document the Incident:
-
Use your phone or notebook to record details such as dates, times, and descriptions of interactions. Note any injuries or mistreatment.
-
Seek Legal Advice:
-
After the encounter, contact a lawyer. They can review evidence and provide guidance on how to proceed.
-
Understand Search and Seizure Laws:
-
Officers generally need a warrant to search your property unless there's probable cause. If stopped without a warrant, calmly refuse entry.
-
Use a Body Camera Policy:
-
If applicable, ask for the officer's body camera footage and request it via formal complaint if refused.
-
Know When to Comply:
-
Comply with instructions that do not infringe on your rights, such as providing identification when legally required.
-
Consider a Witness Statement:
- If you witness illegal actions, consider reporting them. Your role as a bystander may be crucial in documenting incidents.
-
Seek Emotional Support:
- Interactions with law enforcement can be traumatic. Reach out to support groups or mental health resources for assistance.
-
Understand Legal Recourse:
- If rights are violated, consult legal aid societies or civil rights organizations for guidance on filing complaints or seeking redress.
Conclusion: Understanding your rights and documenting interactions is essential when dealing with law enforcement. This guide provides a framework to help you navigate such situations confidently and protect your rights effectively. Remember, knowledge is power, and being informed can lead to better outcomes in challenging circumstances.
Advocating for privacy does not finance itself. If you enjoyed this article, please consider zapping or sending monero
82XCDNK1Js8TethhpGLFPbVyKe25DxMUePad1rUn9z7V6QdCzxHEE7varvVh1VUidUhHVSA4atNU2BTpSNJLC1BqSvDajw1
-
@ e31e84c4:77bbabc0
2025-03-05 10:23:47The IMF’s $1.4 Billion Shackle was Written By Kudzai Kutukwa. If you enjoyed this article then support his writing, directly, by donating to his lightning wallet: muggyarch11@walletofsatoshi.com**
The recent $1.4 billion Extended Fund Facility (EFF) agreement between the International Monetary Fund (IMF) and El Salvador marks a significant turning point in the nation's economic and monetary policy. The IMF’s $1.4 billion “lifeline” is a sly Trojan horse, gutting El Salvador’s sovereignty and kneecapping its 2021 Bitcoin law— which represented a bold step toward monetary freedom and economic self-determination— all to prop up the same economic mess it pretends to fix. Brilliant, right?
The IMF’s Colonialist Agenda: A Historical Precedent
In 2021, El Salvador made history by adopting Bitcoin as legal tender, positioning itself at the forefront of financial innovation and offering its citizens an alternative to the U.S. dollar. This move was a bold step toward monetary independence and as a pathway toward individual financial sovereignty by reducing remittance costs for Salvadorans and bypassing the predatory international banking system. By making Bitcoin legal tender, El Salvador was taking steps to free itself from financial colonialism.
The IMF’s response to El Salvador’s Bitcoin law was predictably hostile from day one. The institution repeatedly warned of the “risks” associated with Bitcoin, framing it as a threat to financial stability rather than a tool for economic empowerment. Hypocrisy drips from every word—the IMF’s own debt traps and inflationary schemes have fueled the chaos it now “rescues” El Salvador from.
The Bretton Woods institution has long been the enforcer of the global financial elite, ensuring that nations remain shackled to the U.S. dollar-dominated system. Through predatory loans and stringent conditions, the IMF perpetuates economic subjugation. Now, facing pressure from these same institutions, El Salvador finds itself caught in the classic IMF trap: accepting loans with strings attached that further cement dependency.
This aid package isn't a solution to El Salvador's problems; it's leverage to force compliance with the global banking cartel's agenda. Under the IMF agreement, El Salvador has been compelled to amend its Bitcoin law, revoking Bitcoin's status as legal tender and making its acceptance by businesses voluntary. Additionally, tax obligations must now be settled exclusively in U.S. dollars. This gut-wrenching retreat from its bold Bitcoin rebellion represents a diabolical masterpiece of oppression—stripping citizens of financial freedom and forcing them to forever bow before the fiat gods.
Why the IMF Must Destroy Bitcoin’s Medium of Exchange Use Case
To understand why the IMF is so determined to undermine Bitcoin’s role as a medium of exchange in El Salvador, it’s important to revisit the fundamental nature of money. The widely cited “three functions” of money—medium of exchange, store of value, and unit of account—are often misunderstood. These are not rigid definitions, but empirical observations of how money functions in practice.
Money is, first and foremost, the generally accepted medium of exchange. The other functions tend to follow, but they are not exclusive to money. For example, gold can serve as a store of value but is no longer a commonly accepted medium of exchange, and other commodities can also act as units of account, but neither is money unless it is widely accepted as a medium of exchange. Bitcoin’s rise as a store of value (akin to “digital gold”) is not as threatening to the fiat system as its potential to function as a widely accepted medium of exchange. A strong store of value can exist within a system that is still dominated by fiat currencies.
If Bitcoin were to become a dominant medium of exchange, it would directly challenge the monopoly of central banks and the control that institutions like the IMF exert over global financial systems. That is why the IMF’s primary goal in El Salvador is not necessarily to stop Bitcoin’s adoption altogether but rather to strip Bitcoin of its medium of exchange function, thus effectively relegating Bitcoin to a speculative asset or store of value.
Furthermore, this Bitcoin experiment was the first real-world test of Bitcoin as a medium of exchange at the nation-state level. If it had succeeded, other countries—especially those in the Global South struggling with inflation, currency devaluation, and IMF-imposed austerity—might have followed suit. The IMF couldn't afford to let that happen. By neutralizing Bitcoin's role as money, it ensures that alternative financial systems do not gain traction outside the fiat-based global order. In other words, as long as Bitcoin can't be used freely as a medium of exchange, it cannot fulfill its role as money, and the fiat gods' grip on the global monetary system remains unchallenged—at least for now.
The $1.4 Billion Faustian Bargain
El Salvador’s decision to seek IMF funding is a reflection of the immense pressure it faces from global financial markets and institutions. The country’s high debt levels and weak external buffers are, in large part, a consequence of its integration into a global financial system that prioritizes short-term capital flows over long-term economic stability. By accepting the IMF’s terms, El Salvador has effectively traded its sovereignty for temporary financial relief.
What is even more surprising is that El Salvador had an alternative to this Faustian bargain: the issuance of Bitcoin bonds. While initially proposed as a way to finance Bitcoin City and geothermal Bitcoin mining infrastructure, the volcano bonds the country could have raised the $1.4 billion needed without sacrificing its monetary sovereignty. This represents a missed opportunity for El Salvador to bolster its financial independence, attract global capital, and solidify its position as a pioneer in the adoption of decentralized money.
Instead of falling back into the IMF’s debt trap—complete with austerity measures, restrictions on Bitcoin use, and financial surveillance—El Salvador could have embraced a Bitcoin-native financial strategy that aligned with its long-term vision of economic independence.
So why didn't El Salvador go through with the Bitcoin bond issuance? I don't know, but if I were to speculate, I would say the answer likely lies in political and institutional inertia, coupled with external pressures from the IMF and its allied institutions, or worse. If El Salvador had raised capital through Bitcoin bonds, it would have sent shockwaves through the financial world, proving that a nation-state could operate independently of the IMF.
The Long-Term Consequences for El Salvador
While the IMF’s program may provide short-term relief, its long-term consequences are likely to be detrimental to the Salvadoran people. The emphasis on fiscal consolidation and debt reduction will inevitably lead to cuts in public spending, particularly in areas such as social services and infrastructure. These measures will disproportionately affect the most vulnerable segments of society, exacerbating inequality and undermining the country’s social fabric.
Moreover, the IMF’s focus on “strengthening governance and transparency” is a thinly veiled attempt to impose external control over El Salvador’s domestic policies. The requirement to enhance Anti-Money Laundering and Countering the Financing of Terrorism (AML/CFT) frameworks, while ostensibly aimed at combating illicit activities, will likely be used to surveil and restrict the financial activities of ordinary citizens. This represents a gross violation of individual rights and a further erosion of economic freedom.
Conclusion
The IMF's $1.4 billion arrangement with El Salvador represents not economic salvation but a calculated reassertion of control. By forcing El Salvador to retreat from its Bitcoin initiative, the IMF is protecting the very system that has kept developing nations financially subjugated for decades.
For Salvadorans, this means their bold experiment in monetary sovereignty has been curtailed, not by market forces or technological limitations, but by the deliberate intervention of the guardians of the old financial order.
Those who believe in true financial freedom must recognize this for what it is: not assistance, but suppression; not aid, but control. The battle for monetary sovereignty continues, and despite this setback, Bitcoin's promise of financial liberation remains as vital as ever—not just for El Salvador, but for all those seeking escape from the oppressive machinery of central banking.
The IMF’s $1.4 Billion Shackle was Written By Kudzai Kutukwa. If you enjoyed this article then support his writing, directly, by donating to his lightning wallet: muggyarch11@walletofsatoshi.com**
-
@ 3b7fc823:e194354f
2025-02-10 13:13:25Alright, let’s get one thing straight: you’re scrolling through your phone, shopping online, maybe even working from home. But here’s the thing – someone might be watching. Not in the creepy stalker way, but in the “is that company really needing my data?” kind of way. That’s where a Virtual Private Network (VPN) comes in, saving you from the prying eyes of marketers, governments, and even your own internet provider.
What Does a VPN Do?
A VPN creates a secure, encrypted connection between your device and a VPN server. This allows you to browse the internet anonymously, keeping your online activities private from your Internet Service Provider (ISP), network administrators, and even hackers. When you connect to a VPN, your internet traffic is routed through an intermediary server, making it difficult for anyone to track your online movements.
Why You Need a VPN: Privacy edition
- Hiding Your IP Address
Every time you jump online, your device gets an IP address, like a digital ID. If you don’t use a VPN, everyone can see this ID, making it easy for advertisers and governments to track your every move.
-
[X ] Myth: A VPN hides my IP address from everyone.
-
[X] Reality: A VPN hides your IP address only from the websites you visit and your ISP. Your internet service provider still knows you're using a VPN, but they won't be able to see what sites you're visiting. Your VPN knows what sites you are visiting and may know who you are as well.
-
Bypassing Censorship
Ever tried accessing something that’s blocked in your country? A VPN can help you bypass those restrictions, letting you watch the latest shows, access social media, or even download books without getting flagged as a troublemaker.
- Protecting Your Data
When you connect to public Wi-Fi – like at a café or airport – you’re basically handing over your data on a silver platter. A VPN encrypts this data, so even if someone intercepts it, they can’t decode it. Think of it as adding an extra layer of security.
- Avoiding Surveillance
Companies and governments love collecting data. From what you search to who you talk to, there’s a lot of stuff that’s none of their business. A VPN ensures that only you know where you’ve been online.
- Safeguarding Your Personal and Professional Life
Whether you’re working from home or just shopping for a present, a VPN keeps your activities private. It’s like having a secure safe for all your online stuff, so no one can snoop.
- Stopping Targeted Ads
Companies track your browsing habits to send you ads that follow you around the internet. A VPN breaks this cycle, making sure those creepy “you might like” ads stop following you around.
- No Logs Policy
Some VPNs keep records of your activity, which means they could be handed over if the government comes knocking. But with a no-logs policy, nothing is stored – they promise ;)
- The Dark Side of Free VPNs
Before you jump into using a free VPN, think twice. Free services often come with a catch: they might sell your data to advertisers or even track your activity themselves. It’s like getting a free hotdog at a gas station – it sounds great, but you’ll probably regret it later.
How to Use a VPN (Because You’re Not a Tech Wizard)
- Choose the Right Provider
Go for a reputable service that offers strong encryption and a no-logs policy. Look for options with a kill switch, which stops any data from being leaked if the connection drops. I prefer ones you can pay annoymously but that may be overkill for most people.
- Download and Install
Once you pick a provider, download the app to your device. It’s not rocket science, but it does require a bit more than just opening an email.
- Set It Up
Most VPNs have user-friendly interfaces. Just click “Connect” and you’re good to go. You might need to enter your login details or use a password from your provider.
The Final Word Using a VPN isn’t about being a hacker or someone with something to hide. It’s about respecting your privacy and having control over what you share online. In today’s world, where companies and governments are constantly getting more creative about how they collect data, it’s practically a requirement if you want to stay ahead of the curve.
So there you have it – the secret life of your internet. With a VPN, you’re not just protecting yourself; you’re making sure that your digital footprint is as small as possible. Whether you’re at home or on the go, a VPN gives you the freedom to surf, shop, and work without anyone watching your every move.
And hey, if you’re still not convinced, just think about it this way: imagine your internet connection as a crowded public space. Without a VPN, everyone’s staring at you. With one, you’re wearing a mask, and no one’s the wiser.
Advocating for privacy does not finance itself. If you enjoyed this article, please consider zapping or sending monero
82XCDNK1Js8TethhpGLFPbVyKe25DxMUePad1rUn9z7V6QdCzxHEE7varvVh1VUidUhHVSA4atNU2BTpSNJLC1BqSvDajw1
-
@ a95c6243:d345522c
2024-12-13 19:30:32Das Betriebsklima ist das einzige Klima, \ das du selbst bestimmen kannst. \ Anonym
Eine Strategie zur Anpassung an den Klimawandel hat das deutsche Bundeskabinett diese Woche beschlossen. Da «Wetterextreme wie die immer häufiger auftretenden Hitzewellen und Starkregenereignisse» oft desaströse Auswirkungen auf Mensch und Umwelt hätten, werde eine Anpassung an die Folgen des Klimawandels immer wichtiger. «Klimaanpassungsstrategie» nennt die Regierung das.
Für die «Vorsorge vor Klimafolgen» habe man nun erstmals klare Ziele und messbare Kennzahlen festgelegt. So sei der Erfolg überprüfbar, und das solle zu einer schnelleren Bewältigung der Folgen führen. Dass sich hinter dem Begriff Klimafolgen nicht Folgen des Klimas, sondern wohl «Folgen der globalen Erwärmung» verbergen, erklärt den Interessierten die Wikipedia. Dabei ist das mit der Erwärmung ja bekanntermaßen so eine Sache.
Die Zunahme schwerer Unwetterereignisse habe gezeigt, so das Ministerium, wie wichtig eine frühzeitige und effektive Warnung der Bevölkerung sei. Daher solle es eine deutliche Anhebung der Nutzerzahlen der sogenannten Nina-Warn-App geben.
Die ARD spurt wie gewohnt und setzt die Botschaft zielsicher um. Der Artikel beginnt folgendermaßen:
«Die Flut im Ahrtal war ein Schock für das ganze Land. Um künftig besser gegen Extremwetter gewappnet zu sein, hat die Bundesregierung eine neue Strategie zur Klimaanpassung beschlossen. Die Warn-App Nina spielt eine zentrale Rolle. Der Bund will die Menschen in Deutschland besser vor Extremwetter-Ereignissen warnen und dafür die Reichweite der Warn-App Nina deutlich erhöhen.»
Die Kommunen würden bei ihren «Klimaanpassungsmaßnahmen» vom Zentrum KlimaAnpassung unterstützt, schreibt das Umweltministerium. Mit dessen Aufbau wurden das Deutsche Institut für Urbanistik gGmbH, welches sich stark für Smart City-Projekte engagiert, und die Adelphi Consult GmbH beauftragt.
Adelphi beschreibt sich selbst als «Europas führender Think-and-Do-Tank und eine unabhängige Beratung für Klima, Umwelt und Entwicklung». Sie seien «global vernetzte Strateg*innen und weltverbessernde Berater*innen» und als «Vorreiter der sozial-ökologischen Transformation» sei man mit dem Deutschen Nachhaltigkeitspreis ausgezeichnet worden, welcher sich an den Zielen der Agenda 2030 orientiere.
Über die Warn-App mit dem niedlichen Namen Nina, die möglichst jeder auf seinem Smartphone installieren soll, informiert das Bundesamt für Bevölkerungsschutz und Katastrophenhilfe (BBK). Gewarnt wird nicht nur vor Extrem-Wetterereignissen, sondern zum Beispiel auch vor Waffengewalt und Angriffen, Strom- und anderen Versorgungsausfällen oder Krankheitserregern. Wenn man die Kategorie Gefahreninformation wählt, erhält man eine Dosis von ungefähr zwei Benachrichtigungen pro Woche.
Beim BBK erfahren wir auch einiges über die empfohlenen Systemeinstellungen für Nina. Der Benutzer möge zum Beispiel den Zugriff auf die Standortdaten «immer zulassen», und zwar mit aktivierter Funktion «genauen Standort verwenden». Die Datennutzung solle unbeschränkt sein, auch im Hintergrund. Außerdem sei die uneingeschränkte Akkunutzung zu aktivieren, der Energiesparmodus auszuschalten und das Stoppen der App-Aktivität bei Nichtnutzung zu unterbinden.
Dass man so dramatische Ereignisse wie damals im Ahrtal auch anders bewerten kann als Regierungen und Systemmedien, hat meine Kollegin Wiltrud Schwetje anhand der Tragödie im spanischen Valencia gezeigt. Das Stichwort «Agenda 2030» taucht dabei in einem Kontext auf, der wenig mit Nachhaltigkeitspreisen zu tun hat.
Dieser Beitrag ist zuerst auf Transition News erschienen.
-
@ 220522c2:61e18cb4
2025-03-05 09:53:59How to package a macOS Desktop App
Introduction
Creating and distributing macOS desktop applications is a huge pain in the ass and can be very confusing. I'm writing this article as a reference for myself as well as any other developer who wants to package a desktop app for macOS.
Join the Apple Developer Program
-
Go to developer.apple.com and sign in with your Apple ID
-
Enroll in an individual ($99/year) or organization ($299/year) membership
-
Complete the enrollment process and wait for approval
Setup Xcode for some reason
-
Download Xcode from from the Mac App Store
-
Go to Xcode -> Settings -> Accounts
-
Click the "+" button and add your Apple Developer Account
Check if Xcode Command Line Tools are installed
xcode-select -p
If they are not installed for some reason you can install them with
xcode-select --install
Generate a Certificate Signing Request (CSR)
-
Open Keychain Access
-
Go to Keychain Access > Certificate Assistant > Request a Certificate From a Certificate Authority
-
Enter your email address and a common name (e.g., your name or company name)
-
Leave "CA Email Address" blank, select Saved to disk, and click Continue
-
Save the
.certSigningRequest
file somewhere
Request Certificate
-
Log in to developer.apple.com/account
-
Go to Certificates, Identifiers & Profiles > Certificates
-
Click the + button to add a new certificate
-
Under "Software," select Developer ID Application, then Continue
-
Choose G2 Sub-CA (Xcode 11.4.1 or later)
-
Upload the
.certSigningRequest
file you just created, then Continue -
Download the
.cer
file (e.g.,developerID_application.cer
)
Install the Certificate
-
Double-click the downloaded
.cer
file to add it to your Keychain Access under "My Certificates" -
Verify it’s there with a private key, after selecting the cert look at the top tabs, select "My Certificates" expand the certificate to see the key icon
Sign your Application
You can now try signing your application, if you run into issues check out the troubleshooting section at the bottom of this article.
codesign --deep --force --verify --verbose --sign "Developer ID Application: Your Name (TeamID)" --options=runtime --timestamp /path/to/YourApp.app
Package Your App
Most apps distributed via websites are packaged in a
.dmg
(disk image) for a polished user experience:- Use Disk Utility or a tool like
create-dmg
(install via Homebrew:brew install create-dmg
)
create-dmg --volname "YourApp" --app-drop-link 600 185 --window-pos 200 120 --window-size 800 400 "YourApp.dmg" /path/to/YourApp.app
This will setup the drag and drop thing for you app into the applications folder, when you run this command that drag and drop ui will pop up, ignore it.
You really should use a tool like this, if you try to do it on your own you'll need to deal with symlinks, applescript and other nonsense. I've done it this way and if there's interest I can write a part two for a more manual approach.
- Sign the
.dmg
codesign --deep --force --verify --verbose --sign "Developer ID Application: Your Name (TeamID)" --options=runtime --timestamp YourApp.dmg
Notarize your App
Apple requires notarization to confirm your app isn’t malicious. You’ll need an app-specific password (not your Apple ID password)
Create and App-Specific Password:
-
Go to appleid.apple.com, sign in, and under "Sign-In and Security," select App-Specific Passwords
-
Generate a new password (name it whatever you like) and save it
Submit for Notarization
- Use the
notarytool
command
xcrun notarytool submit /path/to/YourApp.dmg --apple-id "your@email.com" --password "app-specific-password" --team-id "YourTeamID" --wait
-
Replace placeholders with your Apple ID, the app-specific password, and your Team ID
-
The
--wait
flag shows the result immediately (takes a few minutes). You’ll get a "Success" message or a log ID with issues to fix
Staple the Notarization Ticket:
- After approval, attach the notarization ticket to your
.dmg
xcrun stapler staple /path/to/YourApp.dmg
- This ensures Gatekeeper can verify it offline
Upload and Distribute
-
Upload the notarized
.dmg
to your GitHub or your website -
Provide a download link (preferably HTTPS for security)
-
Users might see a Gatekeeper prompt on first launch; they can right-click > Open or allow it in System Settings > Security & Privacy
Troubleshooting
I have had countless issues when trying to sign applications
Unable to build chain to self-signed root
One issue that I've run into on both of my macbooks is:
Warning: unable to build chain to self-signed root for signer
Something I usually have to do is open the Developer Certificate, expand the trust section and set "When using this certificate:" to "Use System Defaults" Then I restart my laptop once or twice and eventually it works.
Can't delete cert in GUI
I have also had an issue where I can't delete the certs in the gui, in this case run the command to list the certs:
security find-identity -v -p codesigning
and delete it based on the hash in the beginning:
security delete-certificate -Z ABC123...
Notarization fails
This is usually due to not passing the hardened runtime option so try resigning the app and dmg with
--options runtime
You can use the command below to see what's wrong
xcrun notarytool log "notary id" --apple-id "your@email.com" --password "app-specific-password" --team-id "HGGSBC8HJF"
Conclusion
Having an article like this would have saved me a lot of time debugging.
npub1ygzj9skr9val9yqxkf67yf9jshtyhvvl0x76jp5er09nsc0p3j6qr260k2
Posted at notestack.com
-
-
@ 3b7fc823:e194354f
2025-02-09 15:14:10As someone who takes privacy seriously, I'm always on the lookout for innovative solutions that can help individuals protect their digital lives. One such solution is Tails OS, a Linux-based operating system that's specifically designed for privacy and security.
What is Tails OS?
Tails OS, short for The Amnesic Incognito Live System, is a Debian-based Linux distribution that offers a high level of anonymity and privacy. Developed by the Tails Project, this operating system is designed to preserve your online anonymity and protect your digital identity. Tails OS is a "live" distribution, meaning you can boot it from a USB drive or CD/DVD without installing it on your computer. This makes it an ideal solution for those who need to maintain their privacy while working in public spaces or using public computers.
Why Use Tails OS for Privacy?
Tails OS offers several features that make it an excellent choice for those seeking to protect their online privacy:
- Anonymity: Tails OS uses the Tor network to route your internet traffic through a series of nodes, making it difficult for anyone to trace your online activities back to your physical location.
- Encryption: Tails OS comes with built-in encryption tools, such as GnuPG and OpenSSL, to protect your sensitive data.
- Secure Boot: Tails OS uses a secure boot process to ensure that your system is free from malware and other threats.
- No Persistence: Tails OS is designed to leave no trace on your computer, meaning that any data you create or access while using the operating system will be deleted when you shut down.
Getting Started with Tails OS
Now that you know why Tails OS is an excellent choice for privacy protection, let's dive into the step-by-step guide on how to use it:
Step 1: Download and Create a Tails USB Drive
Visit the Tails website and download the latest version of Tails OS. Follow the instructions to create a bootable USB drive.
Step 2: Boot Tails OS
Insert the USB drive into your computer and restart it. Enter the BIOS settings (usually by pressing F2, F12, or Del) and set the USB drive as the first boot device. Save the changes and exit the BIOS settings. Your computer will now boot from the Tails USB drive.
Step 3: Security implications of setting up an administration password For better security, no administration password is set up by default. When you set up an administration password, an attacker who can get physical access to your computer while Tails is running could be able to break your security
Step 4: Configure Tails OS
Tails OS comes with a pre-configured Tor network, which is enabled by default. You can also configure other settings, such as the keyboard layout and language, from the "Settings" menu.
Step 5: Use Tails OS for Private Activities
Now that you're logged in and configured, you can use Tails OS for private activities, such as:
- Browsing the internet anonymously using Tor
- Sending and receiving encrypted emails using GnuPG
- Creating and editing documents using LibreOffice
- Chatting with friends and family using Pidgin
- Setup Persistent Storage for files
Emergency shutdown To trigger an emergency shutdown, unplug the USB stick from which Tails is running. Doing so might be faster than shutting down from the system menu.
NOTE: You risk breaking your Persistent Storage and losing data when you unplug your USB stick while Tails is running.
Conclusion
Tails OS is an excellent tool for anyone seeking to protect their online privacy. With its built-in anonymity features, encryption tools, and secure boot process, Tails OS provides a high level of protection for your digital identity. By following the step-by-step guide outlined above, you can start using Tails OS for private activities and take control of your digital life.
Remember, privacy is a fundamental human right, and it's essential to take steps to protect it. Tails OS is an excellent tool for anyone looking to maintain their online anonymity and protect their digital identity.
Advocating for privacy does not finance itself. If you enjoyed this article, please consider zapping or sending monero
82XCDNK1Js8TethhpGLFPbVyKe25DxMUePad1rUn9z7V6QdCzxHEE7varvVh1VUidUhHVSA4atNU2BTpSNJLC1BqSvDajw1
-
@ 3b7fc823:e194354f
2025-02-07 18:42:31Privacy in Public Spaces: A Tactical Guide
1. Public Wi-Fi Privacy
Using public Wi-Fi can be convenient, but it's important to take precautions to protect your privacy:
- Use a VPN (Virtual Private Network): A VPN encrypts your internet traffic, making it difficult for hackers to intercept your data.
- Disable Automatic Connections: Prevent your device from automatically connecting to open Wi-Fi networks by turning off this feature in your settings.
- Avoid Sensitive Transactions: Refrain from accessing banking or other sensitive accounts while connected to public Wi-Fi.
- Use Secure Websites: Look for "https://" in the website's URL to ensure it uses encryption.
- Keep Software Updated: Ensure your device's operating system and apps are up-to-date to protect against security vulnerabilities.
2. Surveillance Camera Awareness
Surveillance cameras are common in public spaces. Here are some strategies to maintain your privacy:
- Spotting Cameras:
- Look for Signs: Many establishments post signs indicating the presence of surveillance cameras.
- Camera Placement: Cameras are often placed near entrances, exits, and high-traffic areas. Look for dome-shaped cameras on ceilings or wall-mounted cameras.
- Using Masks and Coverings:
- Face Masks: Wearing a mask can help obscure your facial features from facial recognition systems.
- Hats and Sunglasses: A hat can shield your face from overhead cameras, while sunglasses can hide your eyes.
- Covering Identifying Marks:
- Clothing Choices: Wear clothing that doesn't have distinctive logos or patterns that can easily identify you.
- Blend In: Opt for styles and clothing choices that helps you blend in with your surroundings, reducing your visibility.
- Temporary Coverings: Consider using temporary coverings, such as scarves or hoods, to conceal tattoos or other identifying marks.
3. General Privacy Tips in Public Spaces
- Be Mindful of Your Surroundings: Pay attention to your environment and be aware of any unusual behavior or devices that may be capturing your information.
- Limit Personal Information: Avoid discussing sensitive information in public where it can be overheard.
- Use Encrypted Messaging Apps: Apps like Signal or SimpleX offer end-to-end encryption for your messages, making it harder for eavesdroppers to intercept your conversations.
- Use Privacy Screens: Privacy screens on all of you electronic screens can defend against the over the shoulder peek or side eye.
- Avoiding Behaviors: Be mindful of behaviors that could make you a target, such as frequent visits to certain areas or engaging in conversations that might attract unwanted attention.
Taking these steps can help you maintain your privacy while navigating public spaces and using public Wi-Fi. Remember, staying informed and vigilant is key to protecting your personal information.
Advocating for privacy does not finance itself. If you enjoyed this article, please consider zapping or sending monero
82XCDNK1Js8TethhpGLFPbVyKe25DxMUePad1rUn9z7V6QdCzxHEE7varvVh1VUidUhHVSA4atNU2BTpSNJLC1BqSvDajw1
-
@ a95c6243:d345522c
2024-12-06 18:21:15Die Ungerechtigkeit ist uns nur in dem Falle angenehm,\ dass wir Vorteile aus ihr ziehen;\ in jedem andern hegt man den Wunsch,\ dass der Unschuldige in Schutz genommen werde.\ Jean-Jacques Rousseau
Politiker beteuern jederzeit, nur das Beste für die Bevölkerung zu wollen – nicht von ihr. Auch die zahlreichen unsäglichen «Corona-Maßnahmen» waren angeblich zu unserem Schutz notwendig, vor allem wegen der «besonders vulnerablen Personen». Daher mussten alle möglichen Restriktionen zwangsweise und unter Umgehung der Parlamente verordnet werden.
Inzwischen hat sich immer deutlicher herausgestellt, dass viele jener «Schutzmaßnahmen» den gegenteiligen Effekt hatten, sie haben den Menschen und den Gesellschaften enorm geschadet. Nicht nur haben die experimentellen Geninjektionen – wie erwartet – massive Nebenwirkungen, sondern Maskentragen schadet der Psyche und der Entwicklung (nicht nur unserer Kinder) und «Lockdowns und Zensur haben Menschen getötet».
Eine der wichtigsten Waffen unserer «Beschützer» ist die Spaltung der Gesellschaft. Die tiefen Gräben, die Politiker, Lobbyisten und Leitmedien praktisch weltweit ausgehoben haben, funktionieren leider nahezu in Perfektion. Von ihren persönlichen Erfahrungen als Kritikerin der Maßnahmen berichtete kürzlich eine Schweizerin im Interview mit Transition News. Sie sei schwer enttäuscht und verspüre bis heute eine Hemmschwelle und ein seltsames Unwohlsein im Umgang mit «Geimpften».
Menschen, die aufrichtig andere schützen wollten, werden von einer eindeutig politischen Justiz verfolgt, verhaftet und angeklagt. Dazu zählen viele Ärzte, darunter Heinrich Habig, Bianca Witzschel und Walter Weber. Über den aktuell laufenden Prozess gegen Dr. Weber hat Transition News mehrfach berichtet (z.B. hier und hier). Auch der Selbstschutz durch Verweigerung der Zwangs-Covid-«Impfung» bewahrt nicht vor dem Knast, wie Bundeswehrsoldaten wie Alexander Bittner erfahren mussten.
Die eigentlich Kriminellen schützen sich derweil erfolgreich selber, nämlich vor der Verantwortung. Die «Impf»-Kampagne war «das größte Verbrechen gegen die Menschheit». Trotzdem stellt man sich in den USA gerade die Frage, ob der scheidende Präsident Joe Biden nach seinem Sohn Hunter möglicherweise auch Anthony Fauci begnadigen wird – in diesem Fall sogar präventiv. Gibt es überhaupt noch einen Rest Glaubwürdigkeit, den Biden verspielen könnte?
Der Gedanke, den ehemaligen wissenschaftlichen Chefberater des US-Präsidenten und Direktor des National Institute of Allergy and Infectious Diseases (NIAID) vorsorglich mit einem Schutzschild zu versehen, dürfte mit der vergangenen Präsidentschaftswahl zu tun haben. Gleich mehrere Personalentscheidungen des designierten Präsidenten Donald Trump lassen Leute wie Fauci erneut in den Fokus rücken.
Das Buch «The Real Anthony Fauci» des nominierten US-Gesundheitsministers Robert F. Kennedy Jr. erschien 2021 und dreht sich um die Machenschaften der Pharma-Lobby in der öffentlichen Gesundheit. Das Vorwort zur rumänischen Ausgabe des Buches schrieb übrigens Călin Georgescu, der Überraschungssieger der ersten Wahlrunde der aktuellen Präsidentschaftswahlen in Rumänien. Vielleicht erklärt diese Verbindung einen Teil der Panik im Wertewesten.
In Rumänien selber gab es gerade einen Paukenschlag: Das bisherige Ergebnis wurde heute durch das Verfassungsgericht annuliert und die für Sonntag angesetzte Stichwahl kurzfristig abgesagt – wegen angeblicher «aggressiver russischer Einmischung». Thomas Oysmüller merkt dazu an, damit sei jetzt in der EU das Tabu gebrochen, Wahlen zu verbieten, bevor sie etwas ändern können.
Unsere Empörung angesichts der Historie von Maßnahmen, die die Falschen beschützen und für die meisten von Nachteil sind, müsste enorm sein. Die Frage ist, was wir damit machen. Wir sollten nach vorne schauen und unsere Energie clever einsetzen. Abgesehen von der Umgehung von jeglichem «Schutz vor Desinformation und Hassrede» (sprich: Zensur) wird es unsere wichtigste Aufgabe sein, Gräben zu überwinden.
Dieser Beitrag ist zuerst auf Transition News erschienen.
-
@ a95c6243:d345522c
2024-11-29 19:45:43Konsum ist Therapie.
Wolfgang JoopUmweltbewusstes Verhalten und verantwortungsvoller Konsum zeugen durchaus von einer wünschenswerten Einstellung. Ob man deswegen allerdings einen grünen statt eines schwarzen Freitags braucht, darf getrost bezweifelt werden – zumal es sich um manipulatorische Konzepte handelt. Wie in der politischen Landschaft sind auch hier die Etiketten irgendwas zwischen nichtssagend und trügerisch.
Heute ist also wieder mal «Black Friday», falls Sie es noch nicht mitbekommen haben sollten. Eigentlich haben wir ja eher schon eine ganze «Black Week», der dann oft auch noch ein «Cyber Monday» folgt. Die Werbebranche wird nicht müde, immer neue Anlässe zu erfinden oder zu importieren, um uns zum Konsumieren zu bewegen. Und sie ist damit sehr erfolgreich.
Warum fallen wir auf derartige Werbetricks herein und kaufen im Zweifelsfall Dinge oder Mengen, die wir sicher nicht brauchen? Pure Psychologie, würde ich sagen. Rabattschilder triggern etwas in uns, was den Verstand in Stand-by versetzt. Zusätzlich beeinflussen uns alle möglichen emotionalen Reize und animieren uns zum Schnäppchenkauf.
Gedankenlosigkeit und Maßlosigkeit können besonders bei der Ernährung zu ernsten Problemen führen. Erst kürzlich hat mir ein Bekannter nach einer USA-Reise erzählt, dass es dort offenbar nicht unüblich ist, schon zum ausgiebigen Frühstück in einem Restaurant wenigstens einen Liter Cola zu trinken. Gerne auch mehr, um das Gratis-Nachfüllen des Bechers auszunutzen.
Kritik am schwarzen Freitag und dem unnötigen Konsum kommt oft von Umweltschützern. Neben Ressourcenverschwendung, hohem Energieverbrauch und wachsenden Müllbergen durch eine zunehmende Wegwerfmentalität kommt dabei in der Regel auch die «Klimakrise» auf den Tisch.
Die EU-Kommission lancierte 2015 den Begriff «Green Friday» im Kontext der überarbeiteten Rechtsvorschriften zur Kennzeichnung der Energieeffizienz von Elektrogeräten. Sie nutzte die Gelegenheit kurz vor dem damaligen schwarzen Freitag und vor der UN-Klimakonferenz COP21, bei der das Pariser Abkommen unterzeichnet werden sollte.
Heute wird ein grüner Freitag oft im Zusammenhang mit der Forderung nach «nachhaltigem Konsum» benutzt. Derweil ist die Europäische Union schon weit in ihr Geschäftsmodell des «Green New Deal» verstrickt. In ihrer Propaganda zum Klimawandel verspricht sie tatsächlich «Unterstützung der Menschen und Regionen, die von immer häufigeren Extremwetter-Ereignissen betroffen sind». Was wohl die Menschen in der Region um Valencia dazu sagen?
Ganz im Sinne des Great Reset propagierten die Vereinten Nationen seit Ende 2020 eine «grüne Erholung von Covid-19, um den Klimawandel zu verlangsamen». Der UN-Umweltbericht sah in dem Jahr einen Schwerpunkt auf dem Verbraucherverhalten. Änderungen des Konsumverhaltens des Einzelnen könnten dazu beitragen, den Klimaschutz zu stärken, hieß es dort.
Der Begriff «Schwarzer Freitag» wurde in den USA nicht erstmals für Einkäufe nach Thanksgiving verwendet – wie oft angenommen –, sondern für eine Finanzkrise. Jedoch nicht für den Börsencrash von 1929, sondern bereits für den Zusammenbruch des US-Goldmarktes im September 1869. Seitdem mussten die Menschen weltweit so einige schwarze Tage erleben.
Kürzlich sind die britischen Aufsichtsbehörden weiter von ihrer Zurückhaltung nach dem letzten großen Finanzcrash von 2008 abgerückt. Sie haben Regeln für den Bankensektor gelockert, womit sie «verantwortungsvolle Risikobereitschaft» unterstützen wollen. Man würde sicher zu schwarz sehen, wenn man hier ein grünes Wunder befürchten würde.
Dieser Beitrag ist zuerst auf Transition News erschienen.
-
@ fd78c37f:a0ec0833
2025-03-05 09:50:19In this edition, we invited njump.me/npub134d6jtyveg74cuuj7qun4v2m6r7x7c6ryk69z4q7pa7f43kran2sl2yggk from Bitcoin Junior Club to share how she empowers children, teenagers, and families through Bitcoin education. She emphasizes that in the Bitcoin ecosystem, education should come before mass adoption.
YakiHonne: Şelale, thank you for being here! Before we dive into the interview questions, I'd like to introduce YakiHonne, the hosting platform for today’s discussion. YakiHonne is a decentralized media client built on Nostr—a protocol designed to empower freedom of speech through technology. It enables creators to own their voices and assets while offering innovative tools like smart widgets, verified notes, and support for long-form content. With YakiHonne, individuals can express themselves freely, without the fear of censorship, bans, or restrictions. Today, we’ll be exploring more about your community,Şelale. So, let’s start with an introduction—could you tell us a bit about yourself and your community?
Şelale:Thank you! I'm actually a big fan of YakiHonne. Nostr is my second biggest passion, right after Bitcoin. And within this ecosystem, everything YakiHonne has done—whether empowering communities or supporting creators—looks truly incredible. I could represent many different communities, but today, I want to focus on a recent project I started together with my husband—Bitcoin Junior Club. It's a fun and educational space designed for children, teenagers, and entire families.
My Bitcoin journey dates back to around 2017 when I started diving deeper into Bitcoin. During the block size controversy. I found myself repeatedly reading the Whitepaper, trying to understand why some people were attempting to manipulate the rules and why the debate was gaining so much traction in the mass media. As I often say, the Bitcoin journey is a dynamic process—over the years, my experiences, perspectives, and areas of focus have continuously evolved. Right now, one of my key priorities are families and education. The Bitcoin ecosystem had already seen various emerging trends, such as the rise of female-oriented communities, hence the need for children related topics as well. Overall, the last few years have brought more creative minds building up their projects, which is very nice to see. A good example here would be Bitcoin FilmFest, another dynamic initiative I’m involved in. These are all signs of Bitcoin's ever-expanding and evolving landscape.
YakiHonne: I would like to know, what sparked your interest in Bitcoin? And what motivated you to create Bitcoin Junior Club? What inspired you to create a whole community around it?
Şelale:There were many different aspects that drew me to Bitcoin, but I would say the most important one is the aspect of freedom, Bitcoin is the best form of money humanity has ever had. No middlemen, no one setting the rules. For the first time, people who have always been unprivileged and unbanked now have a real alternative—a way to opt out of the system they were born into. At the same time, when we look at developed countries, we see increasing surveillance, restrictions, and privacy constraints. Once again, Bitcoin serves a crucial role here. It is freedom money, a freedom tool, and that’s what hooked me the most.
On the other hand, what truly motivated me to launch our project was the realization that money is just a tool. If people stop thinking critically, if they don’t truly understand its potential, even something as revolutionary as Bitcoin can be misused or even turned against us.
Together with my husband, we believe that education is essential, especially for younger generations. We want to help them develop critical and creative thinking skills, to keep questioning topics they come across, and to think for themselves. This is the core reason we started this community. Along the way, I’ve come across many family-friendly projects with a similar mission. But most of such resources are scattered and difficult to locate. That’s why, one of our main goals is to create a comprehensive database—a place where people can find all kinds of educational resources, from the content we produce to information about existing initiatives in areas like: homeschooling, unschooling, Bitcoin, financial education, and more.
At the heart of it all, our focus remains on fostering creativity and independent thinking, because without it, we risk heading toward a future I personally don’t want to see. In the end, our mission is to help raise sovereign generations— individuals who truly understand and embrace financial and personal freedom.
(source: interactive game for kids and families, “Bitcoin Calendar, Part 01”)
YakiHonne: Yes, absolutely! I really appreciate your recognition of Bitcoin’s freedom aspect, as that is its very core—sovereignty. I also deeply admire your dedication to educating the next generation—it’s truly essential. We need to nurture and guide these young minds so that when they step into this space, they can help maintain the stability of the Bitcoin ecosystem and safeguard the communities that have been built around it. Could you share with us how your community was founded and how you initially attracted members?
Şelale:Well, to make a long story short, it all started as a way for me to relax at night. I work on several projects within the Bitcoin ecosystem, and when I feel mentally exhausted, I like to unwind by designing and drawing. That’s how it all began—I started designing various creative worksheets, such as logic puzzles, coloring pages, and other engaging activities targeted at younger audiences.
My husband and I are also nomads, so a few years ago, we began distributing these materials to different homes during our travels. The response was overwhelmingly positive—kids were excited and, interestingly, it also turned out to be a subtle "orange pill" tool for their parents. Quite often, when they noticed the Bitcoin logo in these materials, it sparked their curiosity and triggered many questions.
At first, I simply wanted to share these resources freely with the community, allowing anyone interested to use them. Over time, I came across many other family-friendly Bitcoin-themed materials such as books, videos, and games. I wanted to create a space where these things could be seen and heard. That’s when I decided to build a website, which could be described more as a database rather than a community.
Since I’m involved in multiple projects and have limited time, I don’t want to focus entirely on building a community around Bitcoin Junior Club—at least not for now. Instead, my priority is to expand the database, continue creating creative educational materials, and connect with other family-friendly Bitcoin projects to give them extra visibility.
(source: a snapshot from the home-page of Bitcoin Junior Club)
YakiHonne: What challenges did you encounter while creating this project?
Şelale:If we were to shift more towards community-building, I would say the biggest challenge lies in the diverse target audience—especially across different age groups. If you want to engage very young children, aged 2 to 3.5 years, you also need to involve their parents or mentors. If you want to reach teenagers and young adults (aged 11 to 20+), their interests, perspectives, and learning preferences are entirely different. To truly engage all these different groups, you need a wide range of tools that cater to their needs and interests. That is a significant challenge.
I’ve noticed that when people discover Bitcoin Junior Club, they often feel excited and relieved, realizing that such an initiative exists. But at the same time, it’s a fragmented process—it takes time to plant the seed and let people know, this resource is available if you or someone you know might need it.
These are the biggest challenges. But nothing to worry about. The project is naturally and organically growing, and the community will likely develop on its own over time.
(source: Selected photos from Adopting Bitcoin El Salvador, Nov 2024, where a 2-day event for families, co-organized by Bitcoin Junior Club, was run in parallel to the entire conference)
YakiHonne: Yeah, that’s very true. The age gap and diverse target audience can indeed be a challenge for many communities. It’s a key factor to consider. However, I really admire the way you’ve been able to navigate this challenge and still effectively reach out to them despite the difficulties. That’s truly something worth recognizing.
Şelale:Thank you, that’s true. What I see here, once again, is the power of Nostr. On other social media platforms and across the Internet, there is so much noise—it’s an overwhelming space. But Nostr is different. The community is still relatively small, which means the audience is more specific and targeted. This also makes it faster and easier to understand their needs. Compared to three, four, or five years ago, this is a huge advantage when it comes to reaching specific groups and learning from them.
YakiHonne: What advice would you give to someone looking to start or grow a Bitcoin-focused community in today's landscape?
Şelale: Overall, don’t overthink it, and don’t try to build something too big from the start. Whatever you envision at the beginning will likely evolve over time. If you know your skills and have an idea that could bring value to the community, start with a high-level roadmap. Avoid over-planning—don’t try to monetize everything or map out years ahead, especially in the early stages, unless you’re working on a large-scale project in a bigger group.
Start with smaller steps and learn from the feedback. As we often say in the Bitcoin world, “don’t ask for permission, just do it”.
I would also emphasize: Learn and adapt along the way, because the feedback you receive from people is the best teacher. As I mentioned earlier, your initial idea may evolve into something different—so don’t give up, and don’t get discouraged. Just keep building. Also, especially for non-technical people, remember that contributing to the Bitcoin ecosystem isn’t just about tech. Of course, technology is at the core of our freedom-oriented future, and it’s incredibly important. But you don’t need technical skills to contribute—there are many ways to add value. It can be anything.
YakiHonne: Yes, I really love the last part of what you just said—it’s so important. Many people tend to believe that if you don’t have technical skills, you can’t contribute to the Bitcoin ecosystem, and this is a very common misconception. The more we educate people and help them understand that Bitcoin needs contributions beyond just the technical side, the stronger the community will become. It’s a crucial point and absolutely true. I’d love to know—does your community focus more on the technical or non-technical aspects of Bitcoin? Or do you cover both?
Şelale:I would say both, but more indirectly. Bitcoin Junior Club is not only a fun and educational space, but also an online resource providing a wide variety of materials, and so it naturally covers both technical and non-technical aspects. There are many excellent technical projects out there, such as those related to Lightning Network, which are more technical fields, and these can target young generations as well. Lightning Piggy is a great example to use here.
Also, during my recent time in El Salvador, I came across an amazing project, Node Nation, that teaches teenagers how to run their own Bitcoin nodes—a clearly technical-focused initiative.
In the future, if we continue to expand and place more emphasis on family-friendly gatherings in person, where practical activities are the core, the technical aspect may naturally grow as well. I have some ideas related to coding courses, interactive games, and other technical aspects that teenagers could be interested in. However, for now, our main focus remains on education and sharing existing resources with more people online. All in all, Bitcoin Junior Club is indirectly engaging with both technical and non-technical content.
YakiHonne: Sounds like a lot of work, but what you guys are doing is truly amazing. I can already see the large-scale impact this will have in the coming years. Since you are involved in the technical side as well, what advice would you give to technically inclined individuals or organizations looking to contribute meaningfully to the Bitcoin ecosystem?
Şelale:My advice would be: go out and speak up. Try to join different meetups—not necessarily large conferences, but smaller local meetups, hackathons, and co-working spaces. These environments will help you connect with others who also have technical skills. You may meet people who are already working on something related to your field, and eventually can guide you toward bigger areas of contribution. Face to face meetings are the best options to find potential collaborators, and to build something together, as well as to strengthen your skills, and to motivate you to start building on your own.
Also, don’t hesitate to share your ideas and ask questions publicly—for example, on Nostr, or through platforms like YakiHonne.
Simply, speak up, and see if anyone is working on something similar or wants to collaborate.
Most importantly, don’t be shy. Don’t isolate yourself in your own bubble. Just like creative people, technical people too, sometimes tend to stay in their own world, hesitant to step out. The truth is, it’s not that difficult to get involved—you just need to let people know you exist and what you can contribute.
YakiHonne: You know, many people tend to believe that only large conferences are worthwhile, thinking they won’t gain much from local meetups. But in reality, starting with local gatherings often leads to stronger connections. That’s a crucial point. So, my next question, Selale—how do you see the role of Bitcoin communities evolving as the technology matures, particularly in areas like scalability, privacy, and adaptability with other systems?
Şelale:What I’m about to say might be a bit of an unpopular opinion, but this is how I genuinely feel—especially in the past few years, there has been a lot of noise around mass adoption and scaling up, with a strong focus on doing things on a huge scale for everyone.
However, I believe there is a more important step before that—which is mass education and awareness. If we truly want to protect privacy and ensure the conscious use of Bitcoin, so that it remains a freedom technology, we need to prioritize education before expansion.
I hope that Bitcoin communities will become more aware of this and continue building on core values—the real Bitcoin ethos, such as truth, long-trem progress, privacy, and sovereignty, rather than just repeating hype-driven trends. I hope the community moves in this direction or, at the very least, remains strong enough to keep spreading the message of privacy and scalability as tools for freedom, rather than just chasing mass adoption and making everything overly simple.
Of course, user experience matters—I absolutely support improving UX across different areas because it’s necessary for broader adoption. However, before that, we need to raise awareness and ensure that people—whoever they are—truly understand Bitcoin’s potential along with the risks that come with losing sovereignty, overexposing personal data, and rushing into oversimplification.
For me, Proof of Work is not just about mining—it also means that understanding Bitcoin requires effort. You have to invest time, energy, and thought into learning about it. Making things too easy, too big, and too flashy isn’t necessarily something I believe in or support.
YakiHonne: Though it’s true that Bitcoin communities will play an increasingly significant role as time goes on and as the technology matures, they will also evolve in terms of scalability, privacy, and adaptability. These aspects align with the core values that most Bitcoin communities uphold, especially given Bitcoin’s decentralized nature. So, we’ve now come to our last question for today, and I must say, it’s one of my favorite questions. Is the government in your region supportive or opposed to Bitcoin? And how has that impacted the community?
Şelale:That’s an interesting question, because as a nomad, I don’t stay under the influence of any single government for long—usually not more than one to three months. We are constantly changing locations. However, we mostly stay within the European Union, and just using it as an example, with its centralized structure, it’s fundamentally opposite to what Bitcoin stands for. It operates against nation-states, encouraging people to think and act not as individuals, but as a collective.
I don’t see any direct threats or actions taken against Bitcoin Junior Club or any other communities I’m involved in. However, I do believe that the narratives pushed by certain jurisdictions can create obstacles—or, maybe on the other hand, they can actually awaken more people. These days, it has become popular among politicians to claim they are pro-Bitcoin, using it as a low-hanging fruit to gain attention. Hence, it’s hard to say whether some governments are truly pro- or anti-Bitcoin. From my personal journey I see them rather having a neutral approach, but it could change in the next few months, as supporting Bitcoin has suddenly become trendy. Probably a topic for a longer chat.
At the same time, I’ve seen areas in which ruling parties are officially anti-Bitcoin, yet people still find ways to work within the ecosystem and continue spreading the message of freedom.
YakiHonne: Just an outside the box question. Did anyone around your area or towards your community consider Bitcoin to be a scam?
Şelale:I had those experiences many years ago, in the very beginning. Currently, I’ve just consciously stopped spending time around people who hold such opinions, so I don’t see or hear it as often. ItThat said, it still happens occasionally—especially in Western countries. If I talk to someone new and they ask, “What do you do?” and I mention Bitcoin, sometimes they respond with:"Oh, that’s a Ponzi scheme." It’s very rare, but it still happens. For me, it just shows that those people are still too influenced by mainstream narratives—the same way people repeat things like "Bitcoin consumes too much energy" without fully understanding the subject. However, compared to five to ten years ago, these misconceptions have definitely become less common.
As a site note, I’ve reached a stage where instead of overwhelming others with Bitcoin-themed conversations, I prefer to keep building- i.e. working on various resources that will be easy enough to find to learn from. If somebody later wants to ask questions or debate, still doubting whether Bitcoin is good or bad for humanity, I am ready to join. All in all, instead of actively trying to convince people, I focus my energy on projects like Bitcoin Junior Club, Bitcoin Film Fest, and other initiatives that provide content for freedom-seekers at heart.
YakiHonne: Thank you so much. We've reached the end of today's interview, and it has truly been a fantastic conversation. I’ve gained a lot of valuable insights from you, and I genuinely appreciate the incredible work that you and your community are doing in the European Union. It’s truly inspiring. I’m certain that Europe is privileged to have you and your team contributing to this space.
Şelale: The pleasure is mine. Thank you very much for this conversation. Once again, kudos to all you are bullying at Yaki Honne.
-
@ a95c6243:d345522c
2024-11-08 20:02:32Und plötzlich weißt du:
Es ist Zeit, etwas Neues zu beginnen
und dem Zauber des Anfangs zu vertrauen.
Meister EckhartSchwarz, rot, gold leuchtet es im Kopf des Newsletters der deutschen Bundesregierung, der mir freitags ins Postfach flattert. Rot, gelb und grün werden daneben sicher noch lange vielzitierte Farben sein, auch wenn diese nie geleuchtet haben. Die Ampel hat sich gerade selber den Stecker gezogen – und hinterlässt einen wirtschaftlichen und gesellschaftlichen Trümmerhaufen.
Mit einem bemerkenswerten Timing hat die deutsche Regierungskoalition am Tag des «Comebacks» von Donald Trump in den USA endlich ihr Scheitern besiegelt. Während der eine seinen Sieg bei den Präsidentschaftswahlen feierte, erwachten die anderen jäh aus ihrer Selbsthypnose rund um Harris-Hype und Trump-Panik – mit teils erschreckenden Auswüchsen. Seit Mittwoch werden die Geschicke Deutschlands nun von einer rot-grünen Minderheitsregierung «geleitet» und man steuert auf Neuwahlen zu.
Das Kindergarten-Gehabe um zwei konkurrierende Wirtschaftsgipfel letzte Woche war bereits bezeichnend. In einem Strategiepapier gestand Finanzminister Lindner außerdem den «Absturz Deutschlands» ein und offenbarte, dass die wirtschaftlichen Probleme teilweise von der Ampel-Politik «vorsätzlich herbeigeführt» worden seien.
Lindner und weitere FDP-Minister wurden also vom Bundeskanzler entlassen. Verkehrs- und Digitalminister Wissing trat flugs aus der FDP aus; deshalb darf er nicht nur im Amt bleiben, sondern hat zusätzlich noch das Justizministerium übernommen. Und mit Jörg Kukies habe Scholz «seinen Lieblingsbock zum Obergärtner», sprich: Finanzminister befördert, meint Norbert Häring.
Es gebe keine Vertrauensbasis für die weitere Zusammenarbeit mit der FDP, hatte der Kanzler erklärt, Lindner habe zu oft sein Vertrauen gebrochen. Am 15. Januar 2025 werde er daher im Bundestag die Vertrauensfrage stellen, was ggf. den Weg für vorgezogene Neuwahlen freimachen würde.
Apropos Vertrauen: Über die Hälfte der Bundesbürger glauben, dass sie ihre Meinung nicht frei sagen können. Das ging erst kürzlich aus dem diesjährigen «Freiheitsindex» hervor, einer Studie, die die Wechselwirkung zwischen Berichterstattung der Medien und subjektivem Freiheitsempfinden der Bürger misst. «Beim Vertrauen in Staat und Medien zerreißt es uns gerade», kommentierte dies der Leiter des Schweizer Unternehmens Media Tenor, das die Untersuchung zusammen mit dem Institut für Demoskopie Allensbach durchführt.
«Die absolute Mehrheit hat absolut die Nase voll», titelte die Bild angesichts des «Ampel-Showdowns». Die Mehrheit wolle Neuwahlen und die Grünen sollten zuerst gehen, lasen wir dort.
Dass «Insolvenzminister» Robert Habeck heute seine Kandidatur für das Kanzleramt verkündet hat, kann nur als Teil der politmedialen Realitätsverweigerung verstanden werden. Wer allerdings denke, schlimmer als in Zeiten der Ampel könne es nicht mehr werden, sei reichlich optimistisch, schrieb Uwe Froschauer bei Manova. Und er kenne Friedrich Merz schlecht, der sich schon jetzt rhetorisch auf seine Rolle als oberster Feldherr Deutschlands vorbereite.
Was also tun? Der Schweizer Verein «Losdemokratie» will eine Volksinitiative lancieren, um die Bestimmung von Parlamentsmitgliedern per Los einzuführen. Das Losverfahren sorge für mehr Demokratie, denn als Alternative zum Wahlverfahren garantiere es eine breitere Beteiligung und repräsentativere Parlamente. Ob das ein Weg ist, sei dahingestellt.
In jedem Fall wird es notwendig sein, unsere Bemühungen um Freiheit und Selbstbestimmung zu verstärken. Mehr Unabhängigkeit von staatlichen und zentralen Institutionen – also die Suche nach dezentralen Lösungsansätzen – gehört dabei sicher zu den Möglichkeiten. Das gilt sowohl für jede/n Einzelne/n als auch für Entitäten wie die alternativen Medien.
Dieser Beitrag ist zuerst auf Transition News erschienen.
-
@ a95c6243:d345522c
2024-10-26 12:21:50Es ist besser, ein Licht zu entzünden, als auf die Dunkelheit zu schimpfen. Konfuzius
Die Bemühungen um Aufarbeitung der sogenannten Corona-Pandemie, um Aufklärung der Hintergründe, Benennung von Verantwortlichkeiten und das Ziehen von Konsequenzen sind durchaus nicht eingeschlafen. Das Interesse daran ist unter den gegebenen Umständen vielleicht nicht sonderlich groß, aber es ist vorhanden.
Der sächsische Landtag hat gestern die Einsetzung eines Untersuchungsausschusses zur Corona-Politik beschlossen. In einer Sondersitzung erhielt ein entsprechender Antrag der AfD-Fraktion die ausreichende Zustimmung, auch von einigen Abgeordneten des BSW.
In den Niederlanden wird Bill Gates vor Gericht erscheinen müssen. Sieben durch die Covid-«Impfstoffe» geschädigte Personen hatten Klage eingereicht. Sie werfen unter anderem Gates, Pfizer-Chef Bourla und dem niederländischen Staat vor, sie hätten gewusst, dass diese Präparate weder sicher noch wirksam sind.
Mit den mRNA-«Impfstoffen» von Pfizer/BioNTech befasst sich auch ein neues Buch. Darin werden die Erkenntnisse von Ärzten und Wissenschaftlern aus der Analyse interner Dokumente über die klinischen Studien der Covid-Injektion präsentiert. Es handelt sich um jene in den USA freigeklagten Papiere, die die Arzneimittelbehörde (Food and Drug Administration, FDA) 75 Jahre unter Verschluss halten wollte.
Ebenfalls Wissenschaftler und Ärzte, aber auch andere Experten organisieren als Verbundnetzwerk Corona-Solution kostenfreie Online-Konferenzen. Ihr Ziel ist es, «wissenschaftlich, demokratisch und friedlich» über Impfstoffe und Behandlungsprotokolle gegen SARS-CoV-2 aufzuklären und die Diskriminierung von Ungeimpften zu stoppen. Gestern fand eine weitere Konferenz statt. Ihr Thema: «Corona und modRNA: Von Toten, Lebenden und Physik lernen».
Aufgrund des Digital Services Acts (DSA) der Europäischen Union sei das Risiko groß, dass ihre Arbeit als «Fake-News» bezeichnet würde, so das Netzwerk. Staatlich unerwünschte wissenschaftliche Aufklärung müsse sich passende Kanäle zur Veröffentlichung suchen. Ihre Live-Streams seien deshalb zum Beispiel nicht auf YouTube zu finden.
Der vielfältige Einsatz für Aufklärung und Aufarbeitung wird sich nicht stummschalten lassen. Nicht einmal der Zensurmeister der EU, Deutschland, wird so etwas erreichen. Die frisch aktivierten «Trusted Flagger» dürften allerdings künftige Siege beim «Denunzianten-Wettbewerb» im Kontext des DSA zusätzlich absichern.
Wo sind die Grenzen der Meinungsfreiheit? Sicher gibt es sie. Aber die ideologische Gleichstellung von illegalen mit unerwünschten Äußerungen verfolgt offensichtlich eher das Ziel, ein derart elementares demokratisches Grundrecht möglichst weitgehend auszuhebeln. Vorwürfe wie «Hassrede», «Delegitimierung des Staates» oder «Volksverhetzung» werden heute inflationär verwendet, um Systemkritik zu unterbinden. Gegen solche Bestrebungen gilt es, sich zu wehren.
Dieser Beitrag ist zuerst auf Transition News erschienen.
-
@ c631e267:c2b78d3e
2024-10-23 20:26:10Herzlichen Glückwunsch zum dritten Geburtstag, liebe Denk Bar! Wieso zum dritten? Das war doch 2022 und jetzt sind wir im Jahr 2024, oder? Ja, das ist schon richtig, aber bei Geburtstagen erinnere ich mich immer auch an meinen Vater, und der behauptete oft, der erste sei ja schließlich der Tag der Geburt selber und den müsse man natürlich mitzählen. Wo er recht hat, hat er nunmal recht. Konsequenterweise wird also heute dieser Blog an seinem dritten Geburtstag zwei Jahre alt.
Das ist ein Grund zum Feiern, wie ich finde. Einerseits ganz einfach, weil es dafür gar nicht genug Gründe geben kann. «Das Leben sind zwei Tage», lautet ein gängiger Ausdruck hier in Andalusien. In der Tat könnte es so sein, auch wenn wir uns im Alltag oft genug von der Routine vereinnahmen lassen.
Seit dem Start der Denk Bar vor zwei Jahren ist unglaublich viel passiert. Ebenso wie die zweieinhalb Jahre davor, und all jenes war letztlich auch der Auslöser dafür, dass ich begann, öffentlich zu schreiben. Damals notierte ich:
«Seit einigen Jahren erscheint unser öffentliches Umfeld immer fragwürdiger, widersprüchlicher und manchmal schier unglaublich - jede Menge Anlass für eigene Recherchen und Gedanken, ganz einfach mit einer Portion gesundem Menschenverstand.»
Wir erleben den sogenannten «großen Umbruch», einen globalen Coup, den skrupellose Egoisten clever eingefädelt haben und seit ein paar Jahren knallhart – aber nett verpackt – durchziehen, um buchstäblich alles nach ihrem Gusto umzukrempeln. Die Gelegenheit ist ja angeblich günstig und muss genutzt werden.
Nie hätte ich mir träumen lassen, dass ich so etwas jemals miterleben müsste. Die Bosheit, mit der ganz offensichtlich gegen die eigene Bevölkerung gearbeitet wird, war früher für mich unvorstellbar. Mein (Rest-) Vertrauen in alle möglichen Bereiche wie Politik, Wissenschaft, Justiz, Medien oder Kirche ist praktisch komplett zerstört. Einen «inneren Totalschaden» hatte ich mal für unsere Gesellschaften diagnostiziert.
Was mich vielleicht am meisten erschreckt, ist zum einen das Niveau der Gleichschaltung, das weltweit erreicht werden konnte, und zum anderen die praktisch totale Spaltung der Gesellschaft. Haben wir das tatsächlich mit uns machen lassen?? Unfassbar! Aber das Werkzeug «Angst» ist sehr mächtig und funktioniert bis heute.
Zum Glück passieren auch positive Dinge und neue Perspektiven öffnen sich. Für viele Menschen waren und sind die Entwicklungen der letzten Jahre ein Augenöffner. Sie sehen «Querdenken» als das, was es ist: eine Tugend.
Auch die immer ernsteren Zensurbemühungen sind letztlich nur ein Zeichen der Schwäche, wo Argumente fehlen. Sie werden nicht verhindern, dass wir unsere Meinung äußern, unbequeme Fragen stellen und dass die Wahrheit peu à peu ans Licht kommt. Es gibt immer Mittel und Wege, auch für uns.
Danke, dass du diesen Weg mit mir weitergehst!
-
@ 3b7fc823:e194354f
2025-02-07 00:39:21Details on how to use a Burner Phone
Mobile phones are needed for communications when out in the world but they are a nightmare for privacy and security as detailed in
especially when it comes to surveillance risks. This is more of a hands on guide for how to mitigate those risks. Burner phones as the name describes is a use and "burn" device either for a single operation or for a longer period if proper precautions are taken. In case you are unaware what I mean by a burner phone; cell phones can be purchased from big box stores, gas stations, and kiosks in cash without a contract. They are usually not very expense and enable you to buy prepaid cards to use for phone and internet service.
Getting a Burner Phone:
- Best to use a store out of town but not mandatory.
- Do not take any electronics with you, especially another phone.
- Park down the street in another parking lot near the store and walk over. Be mindful of security cameras.
- Cover any tattoos or identifying marks. Wear a hat and a medical mask. (Thank you covid)
- Use cash only to buy.
- Leave, do not shop or buy anything else.
Setting up Burner Phone:
- Go somewhere with free public WIFI (Starbucks, Library, whatever)
- Do not take any electronics with you, especially another phone.
- Open package and follow directions to activate using the public WIFI access.
- Choose a random area code during setup.
- Create a new random gmail account. (Do not reuse accounts or names)
- Download and install a VPN, Signal or SimpleX, Firefox Focus Browser, Tor if needed. Delete any other unnecessary apps.
- Change phone settings (see list)
- Turn off and remove battery if able to (becoming harder to find) or put into a Faraday Bag.
- Destroy packaging that came with the phone.
Phone Settings: 1. Turn off hotspot and tethering. Enable Always on VPN and Block Connections without VPN. Set DNS to automatic. 2. Turn off bluetooth and WIFI. 3. Disable all notifications, notification history, notifications on lock screen, and emergency alerts. 4. Turn off all sounds and vibrations. 5. Turn off Find my Device. Setup screen lock with password. (No bio) 6. Toggle everything in privacy: no permissions, turn off microphone, turn off usage and diagnostics, etc 7. Set Use Location to off. 8. Under Languages & Input > Virtual Keyboard > Gboard > Advanced: disable usage statistics, personalizing, and improve voice and typing for everyone.
Using a Burner Phone:
- Never sign into any account associated with your real identity.
- Never use it to contact anyone associated with your real identity.
- Time and distance between burner phone and any other cell phone you own. i.e. A hour has passed and several miles from when you use and had on the other device.
- When not in use the battery is removed or in a Faraday Bag.
- Always use a VPN and always use private search and browser set to delete upon closing (Firefox Focus default).
- Never actually call or text from the phone. You only want to use SimpleX or Signal for communications.
- Do not save anything (files, pictures, history) on the phone, especially if incriminating.
- Do not take it with you or use unless necessary.
- When in doubt, burn it and get another one.
- Never carry over names, accounts, whatever from old burner phone to new burner phone.
Burning a phone:
- Factory reset the device.
- Remove and destroy the SIM card.
- Remove the battery because lithium batteries can explode. (may have to take it apart)
- Smash internals.
- Burn remains or drown in water. (Throw it in the river)
As long as you are careful to never identify yourself with the burner phone the only surveillance they can do is know that a phone was used or in a location but not who it belongs to. Be aware that if you are caught with it on your person any information or contacts on the phone may get compromised. Be mindful what you put on it.
-
@ 95cb4330:96db706c
2025-03-05 08:39:40Embracing a Long-Term Thinking Mindset, as exemplified by leaders like Jeff Bezos and Peter Thiel, involves making decisions that prioritize enduring success over immediate gains. This approach fosters sustainable growth and innovation by focusing on strategies that yield compounded benefits over time.
Understanding the Long-Term Thinking Mindset
- Definition:
A strategic perspective that emphasizes planning and decision-making with a focus on achieving substantial, lasting outcomes—often at the expense of short-term profits or conveniences.
Examples in Practice
-
Jeff Bezos and Amazon:
Bezos structured Amazon to prioritize long-term customer trust over quarterly profits, leading to its dominance. He believes that long-term thinking leverages existing abilities and supports the failure and iteration required for invention. -
Peter Thiel's Investment Strategy:
Thiel invests in startups with unique, superior products and a 10+ year vision, rather than chasing short-term competition. His contrarian investment strategy focuses on long-term tech investments.
Implementing Long-Term Thinking
-
Set Visionary Goals:
Define objectives that align with enduring values and aspirations, guiding sustained efforts toward meaningful achievements. -
Prioritize Sustainable Practices:
Adopt strategies that ensure environmental, social, and economic sustainability, contributing to long-term viability. -
Embrace Delayed Gratification:
Recognize that significant rewards often require patience and persistent effort, avoiding the allure of immediate but fleeting benefits.
Benefits of Long-Term Thinking
-
Resilience:
Organizations and individuals become better equipped to navigate challenges and adapt to changing circumstances. -
Reputation:
A commitment to long-term goals fosters trust and credibility among stakeholders, enhancing relationships and opportunities. -
Innovation:
Focusing on enduring success encourages continuous improvement and the development of groundbreaking solutions.
Action Step
Identify a current decision or project and assess whether your approach favors short-term comfort or long-term success. If it leans toward immediate gratification, consider realigning your strategy to prioritize enduring benefits—ensuring that today's choices contribute positively to your future goals.
By adopting a long-term thinking mindset, you position yourself and your organization to achieve sustained success and make a lasting impact.
For further insights into Jeff Bezos's perspective on long-term thinking, consider watching this discussion:
JEFF BEZOS - THINK LONG TERM
- Definition:
-
@ 878dff7c:037d18bc
2025-03-05 07:58:03Overview
Tropical Cyclone Alfred, currently a Category 2 system, is advancing towards the southeastern coast of Queensland and northern New South Wales. The cyclone is anticipated to make landfall between late Thursday and early Friday, bringing destructive winds, heavy rainfall, and potential life-threatening flooding. Authorities have issued evacuation orders for residents in low-lying areas, closed schools, suspended public transport, and established evacuation centers. The Australian Defence Force and emergency services are on standby to assist with evacuation and recovery efforts. Residents are urged to prepare their properties, have evacuation plans in place, and stay updated through official channels. TROPICAL CYCLONE FORECAST TRACK MAP
Public Transport to Halt in South-East Queensland as Cyclone Alfred Approaches
### Summary: Severe weather conditions due to Tropical Cyclone Alfred are ongoing, with the cyclone expected to impact south-east Queensland and northern New South Wales. Public transport in Brisbane and the surrounding region has been suspended, and authorities have urged residents to prepare their properties and have evacuation plans ready. The cyclone, likely to maintain a Category 2 status as it crosses the coast on Friday, could result in significant flooding and coastal erosion. The Australian Defence Force and emergency services are on standby to assist with possible evacuations and recovery efforts. Nearly 20,000 residences in Brisbane are at risk of flooding, and evacuation centers are being set up in NSW. This event is anticipated to be one of the most severe since 1954, with high winds, heavy rainfall, and damaging storm surges expected. Sources: The Guardian - 5 March 2025
Residents Urged to Evacuate as Cyclone Alfred Nears
### Summary: Residents in southeast Queensland are urgently advised to evacuate as Tropical Cyclone Alfred approaches, threatening severe storm surges and flash flooding. The Category 2 cyclone is expected to hit between Brisbane and the Gold Coast around midnight on Thursday, coinciding with a high tide. Approximately 30,600 properties across Brisbane, the Sunshine Coast, and the Gold Coast are at risk. Premier David Crisafulli emphasized the need for immediate action to seek shelter with loved ones or in evacuation centers. Schools will be closed, and elective surgeries canceled on Thursday and Friday. Winds could reach 130 km/h, and up to 800 mm of rain is anticipated. The Australian Defence Force is ready to assist, with additional resources in place. Authorities are knocking on doors in at-risk areas, and evacuation centers will open. Residents are urged to stay indoors and avoid examining cyclone damage during the storm. Sources: The Australian - 5 March 2025
Northern NSW Braces for Cyclone Alfred's Impact
### Summary: Northern NSW is preparing for a significant natural disaster as Cyclone Alfred intensifies and slows, heightening the potential for severe impacts. Premier Chris Minns has traveled to the region to meet with SES volunteers and prepare for flooding. The cyclone, which may reach low-end Category 3 strength, is expected to make landfall near Brisbane on Friday. Authorities have warned residents to prepare for "three natural disaster events in one," including high winds, flash flooding, and significant rainfall. Over 120 schools are closed, flights have been canceled, and evacuation plans are advised for vulnerable areas. Essential Energy is managing power outages caused by high winds, and residents are advised to take action before conditions worsen. The NSW SES has opened evacuation centers, anticipating severe impacts along the coast. Residents are urged to prepare for potential flooding and power disruptions as authorities continue to monitor the situation. Sources: The Daily Telegraph - 5 March 2025
Brisbane and Gold Coast Brace for First Cyclone in 51 Years
### Summary: Residents in Brisbane and the Gold Coast are preparing for Tropical Cyclone Alfred, the first cyclone in 51 years to hit the Australian east coast near Brisbane. The cyclone is predicted to make landfall late Thursday or early Friday, bringing destructive winds, large swells, and potential life-threatening flooding. Brisbane, with over 3 million residents, may see up to 20,000 homes affected by flooding. The government has provided 250,000 sandbags and established cyclone refuge centers. Schools, public transport, and non-urgent hospital surgeries will be suspended. Queensland Premier David Crisafulli has urged residents to prepare their homes and plan evacuation routes. Cyclone Zoe was the last cyclone to hit the region in 1974. Sources: Associated Press - 5 March 2025
Rare Cyclone Alfred Threatens Australia's East Coast
### Summary: Tropical Cyclone Alfred, with strength equivalent to a Category 1 Atlantic hurricane, is expected to cross the coast just south of Brisbane. Authorities have urged residents in low-lying areas to evacuate ahead of the storm's landfall, anticipated early Friday. The cyclone poses significant risks of severe winds, heavy rainfall, and potential flooding to the densely populated regions of southeast Queensland and northern New South Wales. Sources: CNN - 5 March 2025
Evacuations Begin as Tropical Cyclone Alfred Approaches
### Summary: Queensland and NSW are setting up evacuation centers ahead of Tropical Cyclone Alfred's expected landfall, as the weather bureau warns it could intensify to a Category 3 system. Residents in low-lying areas are advised to evacuate due to the risks of severe winds, heavy rainfall, and potential flooding. Authorities are closely monitoring the situation and coordinating emergency response efforts to ensure public safety. Sources: SBS News - 5 March 2025
-
@ 3b7fc823:e194354f
2025-02-06 00:19:45Your phone is not your friend. It is a filthy little snitch that tells anyone who asks where you are, what you are doing, and who you are doing it with. You can obscure and hide some things through the use of privacy respecting software like encrypted communication apps, Tor pathways using Orbot, or the base OS like Graphene but metadata and geolocation is still very loud and very present. It is built into the infrastructure of how cell phones work. Your phone is tracked at all times through every cell tower area you pass through logging your IMEI and by extension your phone number and identity. This data is logged and saved forever by companies who use and sell it for corporate surveillance and post Patriot Act give it to police and government agencies warrantlessly.
Fine, I will just turn it off then. Nice try, but unless the battery can be removed it still tracks you. You didn't think it was weird that Find My Phone still works even if the phone was off? Luddites are not off the hook. That dumb phone or flip phone is tracked just the same and since it will not run encrypted communications you are screaming out the content of every call or text and not just the metadata.
OK, I will get a burner phone or anonymous SIM card not tied to my identity. Better, but not bulletproof. This is great for use and toss but if you continue to use it multiple times, around other devices that are tied to you or your social network, or take it to your home, work, or any location associated with you then it will be doxxed. Once doxxed all past information associated with it becomes now linked to you.
Metadata, Profile, and Network Your network is very easily known and built up over time. Who are the contacts saved in your phone? Who do you interact with? Who do you call, text, email, DM, or follow on social networks? Who do you never contact but your geolocation overlaps with them often. Now look at all those contacts and who they have a network with. A giant spider web of connections. If by 7 degrees of Kevin Bacon you have a shady contact in your network then you may get more scrutiny than you may realize.
You are spilling metadata everywhere you go along with your geolocation. Time stamps, who you contacted, how long you talk to them, which app was used when, internet searches, map app searches, etc. People are creatures of habit and over time this metadata builds a pretty good profile on you. Phone becomes active around 7am when they wake up. Scans social media and news sites for usually 30 minutes. Assume they are taking a shower because the phone is on but not being used until 8am most weekdays. Travels to a coffee place on the corner most mornings and then goes to their place of work. Between 9:30 and 10:30 am they again scan social media and news sites for a solid 10 minutes, probably their bathroom schedule. During lunch they frequent these locations with these people. You get the point.
This profile, plus your geolocation history, plus your network paints a pretty complete picture on you. Surprisingly it is not what you do but when you do something different that gets attention. There was a big protest last night that we are not happy about. We already have a list of everyone who took their phones with them at that geolocation and timestamp. We run an algorithm looking for simple patterns. John is usually at a restaurant eating with friends during this time but strangely his phone was left at home and turned off during that time frame. Did anyone in his network go to the protest that we have already confirmed? Anyone in his network follow the protest Facebook page, or have a deviation from their usual pattern such as their phone being somewhere dormant when it is usually active during this time?
What can you do? You can choose to do nothing. You can just live your life with the awareness that you are being tracked and profiled, maybe work to limit how much metadata you are spilling out to the universe. If you are an activist, an oppressed minority, live in an oppressive regime, or your country suddenly becomes oppressive this might not be an option. Randomize or maintain your profile. This is hard but not impossible. Make your profile and habits so chaotic that any deviation is not a deviation. Most people cannot do this but if you are couch-surfing, going to different places constantly, new friends and new activities on the daily agent of chaos then maybe this is an option.
On the opposite extreme maybe you are a very regimented person so be aware of that and always stick to your routine. If you want to go to that protest but are usually home doom scrolling youtube during that time then set your phone to no sleep mode and set up to watch a long playlist of youtube videos left at home while you go to the protest.
Home phone only. Maybe you decide to have a home phone only, no not a landline, but an actual smart device that can utilize encrypted communications services but never leaves the house. This could potentially save you a lot of money on data plans, texts, and minutes if you don't buy a network plan and just use VOIP on your home WIFI. Or maybe you have a very minimal network plan and when you leave the house you either take it with you in a Faraday bag or have a secondary device that lives in a Faraday bag that only comes out for emergencies and to check in. Just be aware that the time in and out of the Faraday bag is part of your profile.
No Phone. You can have no phone whatsoever. This will not work for most people in the modern age but if you have an extreme risk profile then this might be the extreme option you need. How do you survive with no phone or only a home phone? Just some alternatives and some ideas. You can still buy WIFI only devices that have no network connection and / or stay in airplane mode. Old MP3 players for music and podcasts while on the go. Old phones that you can download maps to for navigation and use VOIP services in WIFI hotspots.
Emergency Communication and Go Bag Prepper culture has given us all sorts of bags: bug out bags, get home bags, never coming back bags, and go bags. I define go bags as very small, light weight, and compact bags or kits. They carry very minimal, bare necessary gear, and ideally are so small that you actually have it on you, in your purse or computer satchel or car all of the time. Emergency communication will be part of this. This is when the burner phone, purchased with cash out of town, and stored in a Faraday bag all the time shines. It has no connection to you and has no history of use. It is a have but hope to never use oh shit device. If you are the activist, the whistleblower, the oppressed that they could come after at any time, or the journalist that investigates corruption, organized crime, or terrorism then you need this.
-
@ 3b7fc823:e194354f
2025-02-03 14:51:45Protecting Email Communications: A Guide for Privacy Activists
Safeguarding your communications is paramount, especially for activists who often face unique challenges. Encryption tools offer a vital layer of security, ensuring that your emails remain confidential and inaccessible to unauthorized parties. This guide will walk you through the process of using encryption tools effectively, providing both practical advice and essential insights.
Why Encryption Matters
Encryption transforms your communications into a secure format, making it difficult for unauthorized individuals to access or read your messages. Without encryption, even encrypted email services can expose metadata, which includes details like who sent the email, when it was sent, and the recipient's email address. Metadata can reveal sensitive information about your activities and location.
Key Encryption Tools
There are several tools available for encrypting emails, catering to different skill levels and preferences:
- PGP (Pretty Good Privacy)
-
For Tech-Savvy Users: PGP is a robust encryption tool that uses public and private keys. The recipient needs your public key to decrypt your messages. You can obtain your public key through a key server or directly from the recipient.
-
GPG (GNU Privacy Guard)
-
Free and Open Source: GPG is a user-friendly alternative to PGP, offering similar functionality. It's ideal for those who prefer an open-source solution.
-
ProtonMail
-
End-to-End Encryption: ProtonMail is popular among privacy-conscious individuals, offering end-to-end encryption and zero-knowledge encryption, meaning only the sender and recipient can access the message content.
-
Tresorit
-
Secure Communication: Tresorit provides end-to-end encrypted messaging with a focus on security and privacy, making it a favorite among activists and journalists.
-
Claws Mail
- User-Friendly Email Client: Claws Mail supports PGP encryption directly, making it an excellent choice for those who prefer a dedicated email client with built-in encryption features.
Steps to Encrypt Your Emails
- Choose a Tool:
-
Select the tool that best fits your needs and comfort level. Tools like PGP or GPG are suitable for those with some technical knowledge, while ProtonMail offers an easy-to-use interface.
-
Generate Keys:
-
Create a public key using your chosen tool. This key will be shared with recipients to enable them to encrypt their responses.
-
Share Your Public Key:
-
Ensure that the recipient has access to your public key through secure means, such as pasting it directly into an email or sharing it via a secure messaging platform.
-
Encrypt and Send:
- When composing an email, use your encryption tool to encrypt the message before sending. This ensures that only the recipient with your public key can decrypt the content.
Minimizing Metadata
Beyond encryption, consider these steps to reduce metadata exposure:
- Use Tor for Sending Emails:
-
Routing emails through Tor hides your IP address and makes communication more anonymous.
-
Avoid Revealing Identifiers:
-
Use .onion addresses when possible to avoid leaving a traceable email account.
-
Choose Privacy-Friendly Providers:
- Select email providers that do not require phone numbers or other personally identifiable information (PII) for registration.
Best Practices
- Avoid Using Real Email Accounts:
-
Create dedicated, disposable email accounts for encryption purposes to minimize your personal exposure.
-
Understand Legal Implications:
-
Be aware of laws in your country regarding encryption and digital privacy. Engaging in encrypted communications may have legal consequences, so understand when and how to use encryption responsibly.
-
Use Encrypted Backup Methods:
- Encrypt sensitive information stored on devices or cloud services to ensure it remains inaccessible if your device is compromised.
When Encryption Isn't Enough
While encryption protects content, there are limitations. Governments can legally compel decryption in certain circumstances, especially when they possess a warrant. Understanding these limits and considering the consequences of encryption is crucial for privacy activists.
Conclusion
Encryption is a vital tool for safeguarding communications, but it must be used wisely. By selecting the right tools, minimizing metadata, and understanding legal boundaries, privacy activists can effectively protect their emails while maintaining their commitment to privacy and freedom. Stay informed, stay secure, and always prioritize your digital well-being.
Advocating for privacy does not finance itself. If you enjoyed this article, please consider zapping or sending monero
82XCDNK1Js8TethhpGLFPbVyKe25DxMUePad1rUn9z7V6QdCzxHEE7varvVh1VUidUhHVSA4atNU2BTpSNJLC1BqSvDajw1
-
@ a95c6243:d345522c
2024-10-19 08:58:08Ein Lämmchen löschte an einem Bache seinen Durst. Fern von ihm, aber näher der Quelle, tat ein Wolf das gleiche. Kaum erblickte er das Lämmchen, so schrie er:
"Warum trübst du mir das Wasser, das ich trinken will?"
"Wie wäre das möglich", erwiderte schüchtern das Lämmchen, "ich stehe hier unten und du so weit oben; das Wasser fließt ja von dir zu mir; glaube mir, es kam mir nie in den Sinn, dir etwas Böses zu tun!"
"Ei, sieh doch! Du machst es gerade, wie dein Vater vor sechs Monaten; ich erinnere mich noch sehr wohl, daß auch du dabei warst, aber glücklich entkamst, als ich ihm für sein Schmähen das Fell abzog!"
"Ach, Herr!" flehte das zitternde Lämmchen, "ich bin ja erst vier Wochen alt und kannte meinen Vater gar nicht, so lange ist er schon tot; wie soll ich denn für ihn büßen."
"Du Unverschämter!" so endigt der Wolf mit erheuchelter Wut, indem er die Zähne fletschte. "Tot oder nicht tot, weiß ich doch, daß euer ganzes Geschlecht mich hasset, und dafür muß ich mich rächen."
Ohne weitere Umstände zu machen, zerriß er das Lämmchen und verschlang es.
Das Gewissen regt sich selbst bei dem größten Bösewichte; er sucht doch nach Vorwand, um dasselbe damit bei Begehung seiner Schlechtigkeiten zu beschwichtigen.
Quelle: https://eden.one/fabeln-aesop-das-lamm-und-der-wolf
-
@ da0b9bc3:4e30a4a9
2025-03-05 07:20:21Hello Stackers!
Welcome on into the ~Music Corner of the Saloon!
A place where we Talk Music. Share Tracks. Zap Sats.
So stay a while and listen.
🚨Don't forget to check out the pinned items in the territory homepage! You can always find the latest weeklies there!🚨
🚨Subscribe to the territory to ensure you never miss a post! 🚨
originally posted at https://stacker.news/items/904251
-
@ 1d7ff02a:d042b5be
2025-03-05 06:02:55ມະນຸດມີຄວາມຈະເລີນໄດ້ຍ້ອນຮູ້ຈັກສ້າງຄວາມຫມັ້ນຄົງໃນອະນາຄົດ
ມະນຸດເຮົາສ້າງຄວາມຈະເລີນຮຸ່ງຮອງໄດ້ກໍຍ້ອນການສ້າງຄວາມຫມັ້ນຄົງໃນກະນາຄົດ ເຊິ່ງສະແດງອອກຢູ່ໃນ ຈາກແຕ່ກ່ອນຕ້ອງອອກໄປ ຫາອາຫານ ລ່າສັດ ເພື່ອເປັນພະລັງງານໃນການມີຊີວິດ ຈົນຮູ້ເຮົາຮູ້ຈັກການເກັບດອງອາຫານໃຫ້ກິນຍາວນານຂຶ້ນ, ຈາການຫາອາຫານເພື່ອຕົວເອງຢ່າງດຽວ ກໍຮູ້ຈັກການແລກປ່ຽນ (barter trade) ເຮັດໃຫ້ໄດ້ສິນຄ້າທີ່ຕົວເອງຕ້ອງການ ໂດຍບໍ່ຕ້ອງໃຊ້ເວລາທັງຫມົດໄປກັບການຫາ ຫລື ຜະລິດສິ່ງນັ້ນ ແລະ ສຸດທ້າຍເຮົາກໍຮູ້ຈັກເລືອກສິນຄ້າທີ່ມີຄວາມຫມັ້ນຄົງ ແລະ ຜະລິດຍາກ ມາເປັນເງິນ ເພື່ອໃຊ້ເປັນ ສື່ກາງ ໃນການແລກປ່ຽນ ຈົນແຕ່ລະຄົນມີເວລາໃນການໂຟກັສ ພັດທະນາທັກສະທີ່ຕົວເອງສົນໃຈຈົນມີຄວາມຊຳນານກວ່າຄົນທົ່ວໄປ ເຮັດໃຫ້ສາມາດຜະລິດສິນຄ້າ ແລະ ບໍລິການ ທີ່ມີຄຸນນະພາບ ແລະ ລາຄາຖືກລົງ. ປະກົດການເຫລົ່ານີ້ເກີດຂຶ້ນໄດ້ຍ້ອນເຮົາມີຄວາມຫມັ້ນຄົງໃນອະນາຄົດດ້ວຍເງິນເກັບ ຈົນມີເວລາຈະລອງຜິດລອງຖືກໄດ້.
ແຕ່ຫລັງຈາກທີ່ເຮົາອອກຈາກ ມາດຕະຖານທອງຄຳ ກໍເຮັດໃຫ້ເງິນມັນເຊື່ອມຄ່າລົງໄປຕາມການເວລາ ຈົນເຮັດໃຫ້ຄົນເຫັນແກ່ເວລາອັນສັ້ນ, ຜະລິດສິນຄ້າ ແລະ ບໍລິການ ທີ່ບໍ່ໄດ້ຄຸນນະພາບ ເພາະຄິດແຕ່ວ່າຈະເຮັດແນວໃດເພື່ອຈະໄດ້ເງິນຫລາຍຂຶ້ນ ເພາະເງິນມັນເຊື່ອມມູນຄ່າລົງເລື່ອຍໆ ຈົນລືມຄິດໄປວ່າສິ່ງໃດແທ້ ທີ່ສຳຄັນໃນຊີວິດ ຈົນເກີດບັນຫາຕ່າງໆ ບໍ່ວ່າຈະເປັນສັງຄົມ ແລະ ເສດຖະກິດ.
ບິດຄອຍ ບໍ່ໄດ້ເຮັດໃຫ້ທ່ານລວຍໄວຂຶ້ນ ແຕ່ມັນກຳລັງແກ້ບັນຫາພື້ນຖານຢ່າງການ ເກັບເງິນ ຢູ່ ເພາະປະຈຸບັນມະນຸດເກັບເງິນບໍ່ໄດ້ແລ້ວ ເພາະມູນຄ່າຂອງມັນຫລຸດລົງເລື່ອຍໆ
ການ DCA ບິດຄອຍ
ບິດຄອຍມີຄວາມຜັນຜວນເລື່ອງລາຄາຫລາຍ ກໍຍ້ອນເຮົາເບິ່ງໃນໄລຍະສັ້ນ ແຕ່ຖ້າເຮົາເບິ່ງມັນເປັນເຄື່ອງມືເກັບອອມເຮົາຈະເຫັນຄວາມຈິງ ບິດຄອຍຄືຄວາມຫມັ້ນຄົງ ແລະ ຕໍ່ຕ້ານການເຟີ້ຂອງເງິນ. ຕົວຢ່າງລຸ່ມນີ້ເປັນການຄຳນວນວ່າ ຖ້າເຮົາເກັບບິດຄອຍ ທຸກເດືອນ ຜ່ານໄປ 8 ປີ ມັນຈະມີມູນຄ່າເພີ່ມຂຶ້ນ 617% ຫລື ປະມານປີລະ 77% ໂດຍສະເລ່ຍ ເຊິ່ງມັນກໍບໍ່ໄດ້ເປັນໂຕເລກໂອເວີຫຍັງຫລາຍ ແຕ່ສາມາດເອົາຊະນະເງິນເພີ້ໄດ້ແລ້ວ ພຽງແຕ່ເກັບ ແລະ ບໍ່ຕ້ອງຄິດຫຍັງ.
### ເມື່ອເຮົາມີເງິນເກັບທີ່ຮັກສາມູນຄ່າໄດ້ ມັນເປັນຄົນລະເລື່ອງເລີຍໃນການໃຊ້ຊີວິດ ແລະ ວິທີຄິດ
ຄົນຈະມີຄວາມຄິດການໄກຫລາຍຂຶ້ນ, ມີເວລາຄິດທົບທວນເລື່ອງຕ່າງໆໃນຊີວິດຢ່າງລະອຽດຖີ່ຖ້ວນ ແລະ ຕັດສິນໃຈແບບມີເຫດມີຜົນ. ຄົນຈະເລືອກເຮັດວຽກມີຢາກເຮັດ ເຖິງວ່າລາຍໄດ້ອາດຈະຫນ້ອຍ ແຕ່ເງິນເກັບສາມາດຮັກສາມູນຄ່າຂຶ້ນໄດ້ເລື່ອຍໆ, ເຮົາຈະມີເວລາໃຫ້ກັບຄອບຄົວຫລາຍກວ່າ ເພາະບໍ່ໄດ້ແລ່ນຕາມວຽກເພື່ອຈະໄດ້ລາຍຮັບເພີ່ມຂຶ້ນຕາມການເຊື່ອມຄ່າຂອງເງິນ. ຄົນຈະໃຫ້ຄວາມສຳຄັນກັບສຸຂະພາບຫລາຍຂຶ້ນ ເພາະສຸດທ້າຍແລ້ວເຮົາຈະເຂົ້າໃຈວ່າສຸຂະພາບນີ້ແລະ ສຳຄັນສຸດ.
ຈາກຄວາມຮູ້ສຶກຂອງຕົວຂ້ອຍເອງມັນເຮັດໃຫ້ ມີຄວາມຫວັງ ແລະ ຕື່ນເຕັ້ນທີ່ຈະໄດ້ໃຊ້ຊີວິດໄປໃນການນາຄົດ ເພາະຮູ້ສຶກວ່າມີຄວາມຫມັ້ນຄົງ ຈາກການຄ່ອຍໆເກັບ ບິດຄອຍ ໂດຍມີເປົ້າຫມາຍເຮັດແນວໃດ ຈະໄດ້ໃຊ້ເວລາທີ່ເຫລືອຢູ່ ເກັບຄົນທີ່ເຮົາຮັກ, ເຮັດສິ່ງທີ່ມັກ ແລະ ມີສຸຂະພາບດີຈົນຈາກໂລກນີ້ໄປໃຫ້ເຈັບປວດຫນ້ອຍທີ່ສຸດ.
-
@ 3b7fc823:e194354f
2025-02-03 02:19:03At-Risk Groups Are Facing A Battle For Their Rights
Privacy. It’s a word we often take for granted, scrolling through our phones and sharing photos without a second thought. But for certain groups—those at risk due to their identities, beliefs, or circumstances—privacy isn’t just a luxury; it’s a lifeline. In today’s world, where governments, corporations, and even our own social media accounts seem to have a vested interest in collecting and selling our data, the fight for privacy has never been more crucial.
Privacy is not a buzzword but a fundamental human right. We can do more to protect those who need it most.
Privacy As A Human Right
The concept of privacy is deeply rooted in our basic human rights. It’s not just about keeping your medical records confidential or hiding your bank statements; it’s about the right to control what others can know about you. For individuals who identify as LGBTQ+, immigrants, journalists, or political dissidents, this right is even more fragile.
Recently, we’ve seen a rise in policies that seem designed to strip away these protections. From the Trump administration’s transgender ban on military service and passport changes to the targeting of journalists and activists, the message is clear: certain groups are considered fair game for scrutiny and control.
These actions are about erasing the autonomy of individuals to live their lives without fear of retribution or discrimination. Privacy isn’t just a feel-good concept; it’s the cornerstone of a individuals liberty. We must ensure that no one’s rights can be arbitrarily taken away, especially the right to privacy.
The Attack On Vulnerable Groups
The targeting of at-risk groups has reached a fever pitch in recent months:
- Transgender Rights Under Fire
The Trump administration has issued a sweeping executive order that effectively erased recognition of transgender individuals’ rights. This included changes to passport policies that required individuals to declare their gender at birth, making it nearly impossible for trans individuals to update their documents without facing extreme scrutiny or even denial.
These actions don’t just impact transgender people; they send a chilling message to the entire LGBTQ+ community.
- Free Speech And Political Dissent
Trump’s Free Speech Executive Order, aimed to protect citizens’ right to express their beliefs. However, critics argue it was more about silencing dissenters. Journalists, activists, and even private citizens have faced increasing pressure from government officials to either comply with certain views or face professional consequences.
“Free speech is a double-edged sword,” noted one legal expert. “When the government uses it as a tool to marginalize certain groups, it becomes a weapon rather than a shield.”
-
Media And Press Freedom
Trump’s ongoing battles with major media outlets are well-documented. From labeling reporters as “fake news” to pushing for laws that would limit press freedom, the administration has made it clear that journalists and news organizations are not above scrutiny. For independent journalists and investigative reporters, this poses a significant threat to their work and safety. -
Immigrant Rights And Discrimination
The Trump administration’s harsh immigration policies have had a devastating impact on vulnerable communities. From family separations to the expansion of surveillance in immigrant-heavy areas, these actions have left many feeling exposed and unsafe. Immigrants, particularly those from Latin America and the Middle East, are increasingly targeted for their perceived alignments with political rhetoric.
The Consequences Of Losing Privacy
When privacy is stripped away, it doesn’t just affect individuals—it affects entire communities. For transgender individuals, the fear of being “outted” online or facing discrimination at work is a daily reality. For journalists, the threat of government retribution can lead to self-censorship and an inability to hold power accountable. For immigrants, the risk of deportation or surveillance means constant vigilance—and often, no recourse.
These consequences are not just personal; they’re systemic. When certain groups are deemed unworthy of protection, it sets a dangerous precedent for what’s allowed in society. It sends the message that some lives matter less than others, and that the government can act with impunity. If you are not in one of these currently impacted groups just give it time and eventually they will come for you too.
The Fight For Privacy: What We Can Do
The good news is that we don’t have to sit idly by while this happens. There are steps we can take to fight for privacy as a fundamental right. Here’s how:
-
Advocate For Stronger Protections
Governments at all levels need to pass and enforce laws that protect privacy, especially for vulnerable groups. This includes everything from data protection legislation to anti-discrimination policies. -
Support Independent Journalism
Journalists are on the front lines of this fight, uncovering corruption and holding power accountable. Support independent media outlets and platforms that prioritize transparency and press freedom. -
Educate And Empower
Communities under threat need resources to protect themselves. This includes education on their rights, know how and tools to secure their data, and access to legal support when needed. -
Use Your Voice
Speak out against policies that erode privacy and target vulnerable groups. Use your actions to protect yourself and others. -
Demand Accountability
When governments overreach, they need to be held accountable. Fight for yours and others rights.
Privacy Is A Fight Worth Winning
Privacy isn’t just about convenience or comfort—it’s about freedom, autonomy, and the right to live without fear of arbitrary control. For at-risk groups, this is not just a luxury; it’s a lifeline. As we move forward in this uncertain era, let’s remember that the fight for privacy is not over— it’s just beginning.
We all have a role to play in protecting those who need it most. So let’s get to work.
- Transgender Rights Under Fire
-
@ 3b7fc823:e194354f
2025-02-02 22:55:32The Secret to Staying Private in the Digital Wild West: A Guide to Using Encryption
You’re scrolling through social media, and suddenly you realize your phone’s been tracking your location and displaying it on your profile for months. You’re not even sure how that happened. Or maybe you’ve noticed that every time you shop online, the item you looked for follows you around with ads wherever you go. Sound familiar? Yeah, welcome to the digital world—where your data is basically a free buffet for anyone who knows how to ask.
But here’s the thing: you don’t have to sit back and take it. Encryption is like the secret weapon that lets you lock up your data and keep those prying eyes out. It’s not just for hackers or spies—it’s for regular people who want to take control of their privacy in a world that’s increasingly looking like a reality show where everyone’s a contestant.
What Is Encryption, and Why Should You Care?
Encryption is like a secure box that only you can open. When you use encryption, your data is scrambled in a way that’s hard for anyone else to read, even if they try. Think of it as putting on a metaphorical cloak that makes your online activity invisible to just about everyone except the people you want to see it.
For example, when you browse the internet, your connection is often not encrypted by default. That’s why websites start with “https” to indicate a secure connection—it’s saying, “Hey, we’re using encryption here!” Without that little green padlock, anyone on the same WiFi could potentially spy on what you’re doing.
So, encryption isn’t just for tech geeks or government agencies. It’s for everyone who wants to protect their data from being sold, stolen, or misused without their consent. And guess what? You’re already using it without realizing it. Every time you use a password-protected account or send an encrypted message, you’re reaping the benefits of encryption.
The Privacy Advantages of Encryption for Regular People
Let’s break down why encryption is your best friend when it comes to privacy:
-
Financial Transactions
When you pay online or use a banking app, encryption keeps your financial info safe from hackers. It ensures that only the banks and businesses you’re dealing with can access your money—no one else can. -
Online Accounts
Your email, social media, and other accounts often use encryption to protect your login details. That’s why you see those little “lock” icons when you’re logging in. Without encryption, someone could potentially intercept your password and gain unauthorized access to your account. -
Data Breaches
Encryption can often prevent data breaches from being useful. Even if hackers manage to steal your information, the encryption makes it unreadable, so the stolen data is basically worthless to the attackers. -
Location Data
If you’re worried about apps tracking your every move, encryption can help limit how much of that data is accessible. Some apps use encryption to protect location data, making it harder for companies to sell your movements without your consent. -
Privacy Protection
Encryption acts as a layer of protection against invasive technologies. For example, some apps use tracking software that follows you around the internet based on your browsing history. With encryption, these trackers can be blocked or limited, giving you more control over what information is collected about you.
How to Use Encryption Like a Pro
Now that you know why encryption is essential for privacy, let’s talk about how to use it effectively:
-
Use Strong Passwords
Encryption works only if your passwords are strong and unique. Don’t reuse passwords from one account to another, and avoid using easily guessable information like “password123” or your birth year. Use a password manager if you need help keeping track of them. -
Enable HTTPS Everywhere
Install browser extensions like HTTPS Everywhere to automatically encrypt your connections to websites that don’t support encryption by default. This ensures that even if you’re not actively thinking about it, your data is still protected. -
Look for the Lock Icon
Whenever you’re on a website or app, look for the lock icon in the URL bar. Make sure it’s encrypted before you input any personal information. -
Use Encrypted Communication Tools
For private conversations, use apps like Signal or SimpleX, which are designed with encryption in mind. These tools ensure that only the sender and recipient can read your messages, keeping them safe from prying eyes. -
Enable Two-Factor Authentication (2FA)
This isn’t exactly encryption, but it’s a close second. 2FA adds an extra layer of security by requiring you to provide two forms of verification—like your password and a code sent to your phone—to access your account. While not encryption itself, it works alongside encryption to keep your accounts secure. -
Use Encrypted Storage and Backup
When storing sensitive files or data, use encrypted cloud storage or external drives. Tools like BitLocker (for Windows) or AES-256 encryption can protect your files from unauthorized access. -
Stay Updated
Encryption technology is always evolving, so it’s important to keep your software and apps updated. Outdated systems are often easy targets for hackers, leaving you vulnerable to attacks.
Final Thoughts: Your Data Is Your Power
In a world where data is a commodity, encryption is your weapon against the invasive tactics of corporations and hackers alike. It empowers you to control what information you share and protects you from having it used against you. So, whether you’re shopping online, using your favorite apps, or just browsing the web, remember that encryption is there to help you stay private and in control of your own data.
And if you ever feel overwhelmed by all the privacy stuff, just remember this: you’re not alone. Millions of people are fighting for stronger privacy protections every day. So, do your part by using encryption wisely—your data and your privacy are worth it. Let’s make sure no one can take that away from you.
Advocating for privacy does not finance itself. If you enjoyed this article, please consider zapping or sending monero
82XCDNK1Js8TethhpGLFPbVyKe25DxMUePad1rUn9z7V6QdCzxHEE7varvVh1VUidUhHVSA4atNU2BTpSNJLC1BqSvDajw1
-
-
@ 3b7fc823:e194354f
2025-02-02 13:39:49Why You Should Only Run DeepSeek Locally: A Privacy Perspective and how to
In an era where AI tools promise immense utility, the decision to run DeepSeek locally is not merely about functionality but also about safeguarding privacy and security. Here's the rationale why:
-
Control Over Data Access: Running DeepSeek locally ensures that data processing occurs on your own machine or server, allowing you to have full control over who can access the system. This reduces the risk of unauthorized access and misuse.
-
Data Privacy: By keeping computations local, you ensure that personal data does not leave your control, minimizing the risk of exposure through cloud-based services.
-
Security Measures: Local operation provides an additional layer of security. You can implement access controls, monitor usage, and respond to incidents more effectively, which might be harder or impossible when relying on third-party platforms.
-
Practical Implementation: Tools like Ollama and OpenWebUI facilitate setting up a local environment, making it accessible even for those with limited technical expertise. This setup empowers individuals to leverage AI capabilities while maintaining privacy.
-
Right to Control Data: Privacy is a fundamental right, and running DeepSeek locally respects this by allowing users to decide what data they share and how it's accessed. This empowers individuals to make informed choices about their personal data.
For those prioritizing privacy, this approach is not just beneficial—it's essential.
Running DeepSeek Locally: A Guide for Individual Home Users
DeepSeek is a powerful AI search engine that can help with various tasks, but running it locally gives you greater control over your data and privacy. Here’s how you can set it up at home.
What You’ll Need
- A Computer: A desktop or laptop with sufficient processing power (at least 4GB RAM).
- Python and pip: To install and run DeepSeek.
- Ollama: An open-source tool that allows you to run AI models locally.
- OpenWebUI: A simple web interface for interacting with Ollama.
Step-by-Step Guide
1. Install the Prerequisites
- Python: Download and install Python from https://www.python.org.
- pip: Use pip to install Python packages.
bash pip install --upgrade pip
- Ollama:
bash pip install ollama
- OpenWebUI: Visit https://github.com/DeepSeek-LLM/openwebui and follow the instructions to install it.
2. Set Up Ollama
- Clone the official Ollama repository:
bash git clone https://github.com/OllamaAI/Ollama.git cd Ollama
- Follow the installation guide on https://ollama.ai to set it up.
3. Run DeepSeek Locally
- Use OpenWebUI as your interface:
bash # Start OpenWebUI (open a terminal and run this): python openwebui.py --model deepseek-llm-v0.2-beta
- A web browser will open, allowing you to interact with DeepSeek.
Tips for Optimization
- Reduce Memory Usage: Use smaller models like
deepseek-llm-v0.2-beta
if your computer has limited resources. - Limit Model Access: Only allow authorized users to access the system by restricting IP addresses or using a VPN.
- Regular Updates: Keep all software up to date to protect against vulnerabilities.
Why Run DeepSeek Locally?
- Privacy: Your data stays on your local machine, reducing the risk of unauthorized access.
- Flexability: Running locally allows you to build specific models for specific uses and provide them with RAG data.
Advocating for privacy does not finance itself. If you enjoyed this article, please consider zapping or sending monero
-
-
@ 3b7fc823:e194354f
2025-02-02 03:16:40Why Privacy Matters and How to Protect It
Privacy is about control. It’s not about hiding yourself but deciding what others can see about you. Just as you don’t share everything when buying a magazine, technology shouldn’t force you to reveal more than needed.
Why Privacy is Important
-
Personal Control: Privacy lets you choose what parts of your life are visible. You shouldn’t have to share everything just to use a service.
-
Security Against Exploitation: Without privacy, people and groups can be targeted by companies or governments. This abuse can lead to data breaches or unnecessary surveillance.
-
Building Trust: Privacy is key to trust in relationships and communities. When your info is safe, you can transact and communicate without fear of misuse.
How to Protect Your Privacy 1. Think Before You Share: Only share what’s necessary and know why you’re doing it. 2. Use Encryption: Encrypt sensitive communications like emails or messages. 3. Control Data Sharing: Avoid oversharing personal details online. 4. Enable Privacy Tools: Use VPNs or privacy settings on social media to shield your data. 5. Be Mindful of Metadata: Understand that metadata (like location data) can reveal more about you than the content itself. 6. Support Privacy-Focused Brands: Choose services that prioritize privacy, like encrypted messaging apps. 7. Read Privacy Policies: Know what data you’re sharing and with whom. 8. Tools like privacy.io can help visualize your digital footprint. 9. Block Trackers: Use tools like DoNotTrackMe or uBlock Origin to stop trackers from collecting your data.
Conclusion
Protecting privacy is a vital step in safeguarding your personal freedoms. By taking proactive measures, you can control what information is accessible and ensure that your rights are respected. Remember, you are your own best advocate for privacy—trust no one but yourself to protect your data and identity.
Join the movement to champion privacy as a fundamental human right. Advocate for stronger laws and encourage others to take action, so we can all enjoy safer, more secure digital environments.
-
-
@ 44dc1c2d:31c74f0b
2024-09-25 20:15:13Chef's notes
Last time I made this I subbed the tomato puréed with some blistered cherry tomatoes. Don't think I'll be using the purée going forward.
I prefer thighs so that's what I use for this but use whatever you want.
Adjust spices based on the size of your onions. If all you have is two massive onions maybe use one and a half onion or just up the amount of spices a little.
Details
- ⏲️ Prep time: ~10 min
- 🍳 Cook time: ~40 ish min
- 🍽️ Servings: 4
Ingredients
- 2 Onions
- 2 tbsp tomato purée
- 1/3 cup cashews
- 1.5 tsp Garam Masala
- 2 ish cloves of crushed garlic
- 1 tsp chili powder
- 1 tbsp lemon juice
- 1/4 tsb ground turmeric
- 1 tsb salt
- 1 tbsp plain yogurt
- 2 tbsp of your cooking oil or fat
- 1 tbsp Coriander (Cilantro) plus extra for garnish
- 1 tbsp sultanas (golden raisins)
- 1 lb of chicken cubed
- 6 oz of white button mushrooms
Directions
- Quarter the onions and put them in a food possessor for about a minute
- Add the tomatoes, nuts, garlic, Garam masala, chili powder, lemon juice, turmeric, salt, yogurt and blend for another minute tell its well mixed in.
- In a wok or a large pan heat your cooking oil and add the onion and spice mix in. Fry gently for around 2-ish minutes, stir frequently.
- Add the chicken, coriander, and raisins to the pan. Stir-fry for another minute or so.
- Add mushrooms and water. Bring to simmer and cover the pan cook for 10 min or until the chicken is 100% cooked through.
- Serve with plain rice and enjoy!
-
@ 862fda7e:02a8268b
2024-09-24 01:14:40The media, government, and "elite" (who are only elite in this low vibration illusion we call "life") are afraid of people like me because I do not accept the reality they have forced us into. My manifesto is an attempt to wake you up from ideas you have been conditioned into believing because it benefits one class - the protected class known as the "elite".
The elite would like to have you believe that my message is something crafted from hatred and they would like to label me with mental issues. They would like you to think I am some crazy extremist who wants to advocate for the harm of others. They would like you to think that I am enciting violence.
This could not be further from the truth.
I am not and will never be an extremist, white supermicist, terrorist, radical, hateful human being. I do not believe in killing in order to convey a message or movement. I do not believe in division.
I only advocate that you become conscious of the reality around us. The reality is that this is a world controlled by the most evil, controlling, destructive freaks. These people work to make sure we are essentially slaves to a system that benefits those who created the system - the elites. Let me make this clear: I do NOT advocate for violence, destruction, death, killing, murder, hatred, division, or terrorism. The elite are threatened by people like me, because they know that we know their game. We know their plans are to destroy, to advocate for violence, to kill, murder, to encite hatred and division. This is all the elite do - they cannot fathom having people live in peace because it isn't beneficial if you want to control the world.
So while you may think it's impossible there is a group of a few evil people who control the world - look back at history. It has always been littered with the few evil who control the many. It would be stupid to think it would be different
-
@ 862fda7e:02a8268b
2024-09-16 22:59:38I was in some sort of nice romantic building and I met this nicer middle aged blonde woman who looked a lot like one of my old teachers. We got to chatting and things started moving quickly, we were going to have sexy lesbian sex but she told me she wanted me to shave my vagina before we started. I said fine, went to a bathroom and started shaving. If it meant I was going to slang some tang, I was gonna do it. It took me a long time to complete this daunting task, as I've mantioned many times before, I have a very thick and dense bush. I also wanted to make sure no hair was left behind, if my sweet lesbian lover saw that I had a hair on my vagina, she would probably freak out and call me disgusting for having a feature that naturally grows on me.
Anyways, I finished shaving my vagina and went to go meet her. Sadly, she decided to not have lesbian sex with me anymore since I took too long and she had some time to think about it. I got screwed without getting screwed. And now I had a gross hairless vagina.
I think I know why this dream occured. It's because my so called "fans" have judged me on my fan page for having hair on my vagina. Yes, I sometimes maintain it and keep it trimmed, sometimes. But sometimes I just let it go if I'm too lazy. Now the lesbians in my dreams want me to shave, and even at that, they still don't want to have sex with me. One time I remember cumming from a wet dream I had, which is very rare for me to do. I was watching 2 Japanese chicks dressed up in the school girl uniform scissor, and I remember waking up with a hard clit and it pulsated. I felt embarassed waking up, because I didn't even voluntarily masturbate but I still climaxed.
-
@ 3b7fc823:e194354f
2024-09-11 19:08:03Operational Security and Your Digital Life
I. Definitions
Operations security (OPSEC) is a process that identifies what information can be seen by threat actors, whether that information could be weaponized, and possible mitigation actions.
Your digital life is every interaction you have, all personal identifying, financial, and health information, your preferences, your habits, and any history that can be obtained both publicly and privately that has ever been recorded or digitized.
Your digital life is a incredibly rich field for various actors to observe, record, analyze, sell, and exploit for profit, harm, or control. Some of this information you give away without thinking (social media), some you give to one party but it is shared without your knowledge to other parties (data brokers, big tech), or it is taken without your consent (criminals, governments).
II. Threats
It would be impossible to list them all but a few examples:
Mass surveillance by governments to fight crime, terrorism, civil unrest, and control the population. This is across the board blanket information on everyone that is stored for later use from feeding algorithms for social credit systems to lists of people who are threats that need to be disappeared. The only variable is how explicit the government in question is doing it.
Corporate surveillance by public and private companies for marketing, market share, or selling for profit. Your data is incredibly profitable. Entire mega companies have built their entire business model on it like Google, Meta, and various Data Brokers. This information is collected and stored. It is then used internally, sold for profit, acquired by governments, or stolen by nefarious actors.
Criminal or Nefarious Surveillance for harm, control, or profit. This is a catch all from partners in a controlling relationship, angry ex's wanting revenge, religions and groups watching their members, terrorists and cults looking for people to recruit or indoctrinate, and foreign espionage to plain old criminals who want your information to sell to other criminals, looking for blackmail opportunities, to steal your financial or social accounts, or identity theft.
III. Mitigation
To do this properly a security self audit should be performed to determine exactly what assets you have to protect, how at risk they are, ranking their priority, and specific steps that are needed to protect them. I will detail how to do this for the average person in a later post but until then we will stick to generalities.
It is impossible to to block or hide all information all the time. Not only is it impossible but it would be exhausting to even try. This is where most people interested in privacy get confused, lost, and give up the idea of privacy because the only path they see to achieve it is living in a underground faraday cage out in the woods.
The only viable path is obscurity and compartmentlizion. Compartmentation of your devices, accounts, and digital selves is wildly misunderstood and not applied properly. Done incorrectly this can be disastrous if you are too casual with something that you thought was hidden or putting a spotlight on yourself by attempting to be obscured.
IV. Tactics For Everyone
Common advice I give to everyone. I don't care what your thoughts are on privacy and security, you should be doing this.
-
Do not give your personal email or phone number to anyone except friends and family. This just opens you up to spam, phishing attacks, and an identifying tracer. Use a email alias service or a throw away email account to give to stores and online accounts. Get a VOIP number for that dating app or service quote. When your real number rings, recieves texts, or get a email you know it is from someone you know and trust.
-
Use cash locally if you can and for everything else get a virtual debit or credit card with a spending limit or fixed amount. Do you really need your entire paycheck, emergency savings, life savings tied to a single card / account? Are you really entering your real credit card or banking information into a random website to buy something? Even if it's not a scam site, how well are they protecting it while in transit or storage? You will probably get the money back in case of fraud but why feed the beast and besides it's a total hassle to get your accounts frozen, wait for reimbursement, open and change accounts. Just avoid it. For extra credit you can use visa gift cards purchased with cash to obscure your financial transactions if you choose. Every financial transaction doesn't have to be public record.
-
Stop using unencrypted phone calls and SMS texts. Switch to encrypted options such as Signal or SimpleX and make anyone who wants to have contact with you reach out to you on it. Even if you "have nothing to hide" there is no reason for you to broadcast every personal conversation, comment, or shared meme with Ma'bell, the government, and anyone else listening and recording. Seriously, just stop.
V. Compartmentation of Your Digital Selves
I will keep this very high level as this article has already run longer than I intended but will cover this in much greater detail in the future.
You can break down all digital activities and interactions into several broad categories or digital selves. Then build separate systems for use in each category depending on the activity and need. The trick is to preplan what activities go where. Using the wrong account on the wrong system means they are now burned. Letting the systems overlap and contaminate each other then you risk exposing anything ever done on those systems. The separation can be accomplished with multiple accounts and devices, isolated virtual machines, or operating systems that enable compartmentation such as Qubes OS or Tails.
VI. Breakdown
- Public
This is the default. This is you. Your real name, address, and details. This is unavoidable and would be weird and attract attention if you didn't have one.
Use this for any KYC activities that you have to log into such as taxes, bank accounts, utility bills, etc. Clearnet only, you have nothing to hide.
Awareness: If it has to be public then put your best foot forward. Only show them what you want them to see and make it good and boring. Blend into the crowd of normies not important enough to pay attention to.
- Private No logins to KYC services. Traffic routed through a VPN. Use of sudo anonymous account names. You are Neo, not Mr. Anderson.
Use for most social media that is not public facing. Shopping and browsing that would be embarrassing or misunderstood if made public. Encrypted to protect against criminals and looky loos. A good default if people just don't need to know.
Awareness: Do not be confused by the word private. The goal is to make it to difficult, to expensive, or just not worth the effort to determine exactly who you are and what you are doing but it's not impossible. Only use this with the knowledge that someday it might get doxxed. That potential only increases with time and frequency of use of accounts. Not to be used for anything that could be considered illegal or has the potential to get you fired or cancelled.
- Anonymous Only single use non KYC logins. Single purpose accounts and names that are burned after achieving that purpose. Traffic routed only through Tor. Encryption by default.
Use if you are a whistle blower, freedom fighter, activist, or for shady activities.
Awareness: Be very careful and deliberate with this system as to not accidentally compromise it with something that would have been better served by a different system. Rotate and clean accounts and systems often. Don't carry stuff over after a cleaning to a new system. Reusing names and handles is how people get busted.
- Nemo
Nemo doesn't exist. There is no record that they ever existed. Only amnesiac systems are even used and never a login. If files or traces are left behind they are encrypted, hidden, and have plausible deniability.
Enjoy anon, more to come.
-
-
@ 862fda7e:02a8268b
2024-09-10 01:32:05I have a lot of dreams where I'm playing a claw machine and just winning a ton of toys. One of the best clawe machine dreams is where I come across claw machines with large toys as prizes, it had carnival toys from the 70's-80's as prizes. Unfortunately, the claw machine was non functional as it was pretty old. In most of these dreams I am winning an endless amount of toys, so much so that the prize chute becomes full with toys. In real life, they rig claw machines. Often times, the owners of the machines set it so they must meet a certain "pay out" before the claw will actually grip a prize. So while you might have a great aim on getting the claw around a toy, it won't grip it firmly enough until enough money has been inserted to meet that payout. Some claw machines will do a fake out, where it will grab the prize, then once the claw gets back to the top of the machine, it will drop the prize. It's to trick you that it got it, but it actually didn't. Sadly, claw machines are worthless to play these days. It's become highly monetizable and impossible to win. I'm great at claw machines, but it's just a matter of luck with hitting the payout these days.
-
@ 9ea10fd4:011d3b15
2025-03-05 02:09:11(Le français suit) Scott Ritter discusses Trump’s willingness to end the war in Ukraine, highlighting his desire for peace (although other analysts suggest that the United States is shifting its strategic focus toward China).
Ritter claims that the United States could consider leaving NATO by the end of the summer but provides no explanation. The U.S. takes a utilitarian approach toward its allies. Ritter believes that, unlike the Democrats, Trump does not align with the military-industrial complex. He is seen as an outsider to this complex, seeking to shift American policy toward trade and the economy rather than militarism (however, military spending increased during his first term). This complex, which developed during World War II and the Cold War, has an increasing need for conflicts to sustain itself, potentially leading to nuclear war.
Europe, under U.S. influence, is compared to a Frankenstein’s monster—believing it is America’s ally while actually being a replaceable tool. A global transition is underway, marked by closer ties between the U.S., Russia, China, and India, excluding Europe for ideological and practical reasons—if I understand correctly, because it is characterized as knowing only war (I note that European diplomacy has recently turned toward India as an alternative to the U.S. and China). This shift, as described by Ritter, could signify the end of the transatlantic order.
Obstacles remain for Trump, notably the issue of Gaza, which is complicated by pressure from the pro-Israel lobby and the positioning of Arab countries.
Finally, it is suggested that Trump might want to reduce the size of the military and rethink the role of the United Nations, seen as a legacy of past conflicts—an intriguing idea but not fully developed.
**
“In this perspective, Trump’s imposition of tariffs would serve as a key element of a strategy aimed at prioritizing the economy over militarism, marginalizing Europe while fostering pragmatic ties with powers like Russia and China, and redefining American power in a post-transatlantic world. This would reflect a break from the military-industrial complex and a utilitarian view of international relations, where tariffs replace tanks as tools of domination or negotiation. However, their success would depend on Trump’s ability to navigate internal pressures (the pro-Israel lobby) and external reactions (from trade partners).” (Grok 3 Beta)
(On Telegram) FIRST IMPRESSION ON TRUMP ZELENSKY FIASCO Interview for India & Global Left
Scott Ritter évoque la volonté de Trump de mettre fin à la guerre en Ukraine, soulignant son désir de paix (cela bien que d’autres analystes disent que les États-Unis sont en train de réorienter leur stratégie vers la Chine).
Ritter avance que les États-Unis pourraient envisager de quitter l’OTAN d’ici à la fin de l’été mais ne fournit aucune explication. Les États-Unis adoptent une approche utilitaire vis-à-vis de leurs alliés. Ritter estime que Trump ne se positionne pas en faveur du complexe militaro-industriel, contrairement aux démocrates. Trump est perçu comme un acteur extérieur à ce complexe, cherchant à réorienter la politique américaine vers le commerce et l’économie plutôt que le militarisme (cependant les dépenses militaires avaient augmenté lors de son premier mandat). Ce complexe, qui s'est développé pendant la Seconde Guerre mondiale et la guerre froide, a un besoin croissant de conflits pour perdurer, menant éventuellement à une guerre nucléaire.
L’Europe, sous l’influence des États-Unis, est comparée à un monstre de Frankenstein, croyant être l’alliée des États-Unis alors qu’elle n’est qu’un outil remplaçable. Une transition mondiale est en cours, marquée par un rapprochement entre les États-Unis, la Russie, la Chine et l’Inde, en excluant l’Europe pour des raisons idéologiques et pratiques si j’ai bien compris, car elle est caractérisée comme ne connaissant que la guerre (je remarque que la diplomatie européenne s'est récemment tournée vers l'Inde présentée comme une alternative aux États-Unis et à Chine). Ce changement tel que décrit par Ritter pourrait signifier la fin de l’ordre transatlantique.
Des obstacles subsisteraient pour Trump, notamment la question de Gaza, compliquée par les pressions exercées par le lobby pro-Israël et le positionnement des pays arabes.
Enfin, il est suggéré que Trump pourrait vouloir réduire la taille de l’armée et repenser le rôle des Nations Unies, perçues comme un héritage des conflits passés, une idée suggestive mais peu développée.
**
« Dans cette perspective, l’imposition de tarifs douaniers par Trump s’insérerait comme une pièce maîtresse d’une stratégie visant à privilégier l’économie sur le militarisme, à marginaliser l’Europe tout en se rapprochant de puissances comme la Russie ou la Chine sur des bases pragmatiques, et à redéfinir la puissance américaine dans un monde post-transatlantique. Cela refléterait une rupture avec le complexe militaro-industriel et une vision utilitaire des relations internationales, où les tarifs remplacent les tanks comme outils de domination ou de négociation. Toutefois, leur succès dépendrait de la capacité de Trump à naviguer entre des pressions internes (lobby pro-Israël) et externes (réactions des partenaires commerciaux). » (Grok 3 bêta)
(Sur Telegram) FIRST IMPRESSION ON TRUMP ZELENSKY FIASCO Interview for India & Global Left
-
@ 401014b3:59d5476b
2025-03-05 01:39:21Alright, football freaks, it’s March 2025, and we’re slinging some half-baked AFC East predictions like it’s a tailgate wing-eating contest. Free agency’s a madhouse, the draft’s a blind stab, and this division’s always a mix of fireworks and faceplants. The Bills ran the show in 2024, the Dolphins teased us, the Jets are jetting Rodgers out the door, and the Pats have a new sheriff in town. Let’s slap records on this chaos and see who’s got the cajones to take the crown. Strap in—this one’s a banger.
Buffalo Bills: 12-5 – Josh Allen’s Reign of Pain
The Bills owned the AFC East in 2024, and 2025’s looking like a victory lap. Josh Allen’s a goddamn force of nature—cannon arm, truck-stick legs—and he’s got James Cook tearing up the ground game even without a stud WR1. That O-line’s a top-10 crew, and the defense, despite some roster churn, still hits hard with Greg Rousseau leading the charge. Free agency might nibble at the edges—Matt Milano’s return could be clutch—but this squad’s a bully. 12-5’s the vibe, division locked up again. Good luck stopping ‘em.
Miami Dolphins: 9-8 – Tua’s Hot-and-Cold Hustle
The Dolphins are the AFC East’s rollercoaster—thrilling ‘til they puke. Tua Tagovailoa’s slinging to Tyreek Hill and Jaylen Waddle, but that O-line’s still a question mark, and they fold like lawn chairs in December. The defense stepped up in 2024 with Jalen Ramsey locking down receivers, but free agency could sting—Jaelan Phillips might chase a bag elsewhere. If Tua stays healthy and the core holds, 9-8’s on the table. Wildcard’s their best shot—Buffalo’s still the big brother they can’t shake.
New York Jets: 8-9 – New QB, Same Jets Jinx
The Jets are ditching Aaron Rodgers—old man’s outta here—and rolling with a new QB (TBD, but let’s say a rookie or a vet like Tyrod Taylor for kicks). Garrett Wilson and Breece Hall are studs, but that O-line’s a disaster, and the defense might take a hit if Sauce Gardner starts sniffing bigger paychecks. New coach, fresh start, same Jets curse? They’ve got enough talent to flirt with 8-9, maybe sniff a wildcard if the QB doesn’t totally tank. Still feels like classic Jets—almost there, never quite.
New England Patriots: 5-12 – Vrabel’s Rough Rebuild
The Pats are a work in progress, but Mike Vrabel’s the new head honcho, and that’s worth a damn shout. The ex-Titans tough guy’s got Drake Maye at QB—bright future, brutal present. 2025’s gonna be a grind; Maye’s taking rookie lumps behind a shaky O-line with no real weapons to speak of. Christian Gonzalez is a lockdown corner, but the defense ain’t what it was without Belichick’s wizardry. Vrabel’s a culture guy—he’ll keep ‘em scrappy—but 5-12’s the reality. They’re building, not winning, in Foxboro this year.
The Final Buzzer
The AFC East in 2025 is Buffalo’s playground with a dash of dysfunction. The Bills (12-5) snag the crown because Josh Allen’s a beast, the Dolphins (9-8) tease a wildcard, the Jets (8-9) stumble sans Rodgers, and the Pats (5-12) grit it out under Vrabel. That’s 34 wins, 34 losses—math’s tight when you factor in the division’s slugfest with the NFL’s other suckers. Free agency’s the X-factor—lose a star, you’re screwed; snag a gem, you’re golden. Yell at me on X when I botch this, but for now, this is my story, and I’m sticking to it. Let’s ride, degenerates.
-
@ 44dc1c2d:31c74f0b
2024-09-09 01:55:24Chef's notes
Makes an excellent Chicken sandwich.
Details
- ⏲️ Prep time: 6 Ish hours
- 🍳 Cook time: 40 min
- 🍽️ Servings: 1 loaf
Ingredients
- 3 ½ - 4 cups bread flour, or more as needed
- 1 ⅓ cups warm milk (110°F – 115°F)
- 5 tablespoons honey
- 4 tablespoons salted butter, melted and slightly cooled
- 1 tablespoon instant “rapid rise” yeast
- 1 ½ teaspoons salt
- Oil or butter for greasing the bowl
- 1 tablespoon melted salted butter, for brushing the crust at the end
Directions
- To prepare the dough, weigh the flour or measure it by gently spooning it into a cup, then leveling off any excess. In a large bowl, combine the flour with the warm milk, honey, melted butter, instant yeast, and salt. Mix by hand or with the paddle attachment of a stand mixer until a shaggy dough forms, gradually adding more flour, as necessary, to get the dough to come together so that it just pulls away from the sides of the bowl.
- Switch to the dough hook attachment (or use your hands) to knead the dough until fairly smooth, about 7-8 minutes.
- Oil a large mixing bowl. Place the dough in the greased bowl, turning once to grease the top. Cover and let rise in a warm place until doubled, 1 ½ - 2 hours.
- Punch down the dough. Transfer to a lightly floured work surface. Pat the dough into a 9 x 12-inch rectangle. Starting on one of the short sides, roll up the dough to make a log; pinch the seams. Place the dough seam-side down in a lightly greased 9 x 5-inch loaf pan.
- Cover the pan with lightly greased plastic wrap; allow to rise for 1-2 hours, until it’s crowned about 1-2 inches over the rim of the pan. Towards the end of the rising time, preheat the oven to 350°F.
- Bake the bread for 40-45 minutes, tenting the top of the bread loosely with foil towards the end if the top starts to get too brown. The bread should be golden brown, and it should sound hollow when tapped.
- Brush the top of the warm bread with melted butter.
- Remove from the pan and cool on a wire rack for at least 1 hour before slicing.
-
@ 862fda7e:02a8268b
2024-09-04 01:45:14It is true that I often dream about James Corbett from CorbettReport.com. Somehow James is always finding his way to my mind. James Corbett intimidates me, I feel like he would heavily dislike me because I am not serious enough. Anytime I see James Corbett smile or laugh it feels like I'm watching an alien try to be human. I wish James the best with his family life and career, but he looks like he is always one second away from either crying hyterically or beating a defensless Japanese man sensless. I am indreasibly grateful for all the hard work he's put out all these years, he's a great person in the truth circle. However, he's like a caracatiure in my head. Anytime he whips out his guitar, I start to cringe. I just know what's about to come will only be the truth about how bad his singing is. But yet, I still love when he plays his guitar. It's awful in a great way, it brings genuine joy to me. Did you know he has a band? He has one song called "Screw Youtube", and in his music video he was sitting on this tall wooden fence and he was wearing these SHORTS WITH SANDALS and he was SWINGING HIS LEGS. I'm sorry, but I expect James to wear white caykies at all times. It felt so gross to see his legs in that state. But then again, here I am getting genuine joy out of seeing that atrosity.
I remember one time watching a James Corbett episode where he has the James Evan Pilatto from MediaMonarchy.com on, and the other James always looks like he's super fucking cracked up. Like he has a ton of energy. Well anyways, one time the other James was his usual self, looking super cracked out excited, talking about the reppies (reptilians) and James Corbett looked so tight lipped, red faced, like he was about to burst out crying. It was so funny to see the two polar opposites, the other James totally oblivious that real James looked like he was about to cry for seemingly no reason. I know this sounds mean of me to say, but I really appreciate these guys for all they do. I just think this is funny.
Anyways, I have a lot of dreams with James Corbett in them. I think it's because he's a teacher and my vagina has a fondness for male teachers. Sadly, none of my good looking male teachers never slept with me. That being said, I think James is good looking for possibly being an English teacher in Japan. I would let him teach me about the reptilians and Klaus Schwab, just let the teaching session see where it goes. Would his gap teeth feel good over my clitty? I dunno.
Okay but here is the most memorable and hilarious dream I had invovling James Corbett. You know how he makes content very often? One day he got extremely fed up with making videos. At the time I think it's because he mentioned in a video how he was annoyed that people kept saying him and Andrew Caufman. So one day he just flipped out, got extremely angry, made one last video saying how he was never coming back and how he's leaving his wife and kids. He deletes everything and is unheard of for months. A few months pass and he uploads a new video. The new video is James obsessively showing and talking about his highly advanced chicken coop he made in Minecraft. He had hundreds of chickens lined up maybe 80 feet in the air, each chicken had a 1x1 square to fit in. Below the chicken was a long tube in which their egg would drop down, and a catcher at the base of the ground. James was fantically showing this contraption, rocking back and forth, had a headset on. He looked awful too. I actually emailed James Corbett about this dream, but he never responded.
Speaking of James Corbett, why do so many people look like him? I feel like they make middle aged bald, bearded men in a DUMB and just release them into the wild, but give them balding genetics so they know how to keep track of them. Like they probably made James Corbett and Andrew Caufman from the same test tube. They fucked up with them, at least like give one of them hair or good eyesight.
-
@ 3b7fc823:e194354f
2024-09-04 01:33:21Nyms, Personas, and Digital Identity
GHOSTn
If you want #privacy then embrace compartmentlization and obscuration in your digital life. Get used to having multiple identities that you can switch between for various needs.
Your legal "matrix" name that pays taxes and has no controversal opinions or associations. Don't try to obscure this person. They are a open book. Put your best foot forward. Show them what you want them to see.
Your private online persona. You let your hair down, have hot takes on social media, purchase legal but potentially embarrassing items or just have hobbies and associations that you are not ashamed of but don't want to advertise for some reason. You use a VPN and no kyc sudo anonymous accounts. Have fun but don't go crazy, know that on a long enough timeline this persona will be linked back to you. The more connections and data that you put out there the easier this will be.
Your anonymous nym that only uses #tor, VMs, hidden drives, and rarely used accounts. Plausible deniability is baked in. Used by dissidents, freedom fights, truth to power, and anyone in oppressive regimes.
Finally you have your Nemo. This person does not exist. No name, no files and only uses #Tails or disposable systems that does not leave a trace. Not everyone would ever have a need for a Nemo but it is good to know how to just in case you ever do.
-
@ 3b7fc823:e194354f
2024-09-04 00:26:48Encryption is the promethium fire that the cypherpunks secured from heaven for me and you. It is our sacred duty to use and advance that in the world. Encryption is so powerful that governments tried to keep it away from the people and to this day have tried to weaken and backdoor it at every turn.
So what is encryption?
It is a deep deep rabbit hole and involves a lot of numbers but in a nutshell it uses math to scramble up the data of your file so it is gibberish and can't be read without decrypting it back to regular data. Encryption technology has continued to advance over time and cracking technology to break the encryption has as well. For our purposes all you really need to remember is to use modern cyphers and your encryption is really only going to be as good as the password (use a passphrase) strength you are using to lock it down with.
BEGINNER LEVEL - Encrypt your phone and computer.
People walk around with their whole lives on their phone. Protect it.
-phone: Congratulations, if you already have a lock screen set on either your iPhone or Android device then device encryption is enabled. If your lock screen password is only 4 digits then we still have work to do. Four digits is only about 10,000 combinations and fairly easy to crack. I believe it only took them about 40 minutes to crack the iPhone of the attempted Trump shooter. Go into settings and set it up for 6 digits or for extra credit use a alphanumeric password.
After your phone then your personal computer probably has the most important data to you. Banking records, tax documents, photos, etc. Encrypt your drive.
-Windows: from Settings, select Privacy security -> Device encryption. Just follow the prompts.
-Apple: from Apple icon, select System Preferences -> Security & Privacy icon. Click "Turn On FileVault".
-Linux: most distros gives you the option during installation. If you didn't do so then search for how to enable it after the fact based on your distribution.
Awesome sauce. You have achieved minimum status.
ADVANCED LEVEL - Encrypt individual files.
You already encrypted your computer but guess what, once you start up your computer and log in the key is stored in RAM for as long as it stays on. The beginner level encryption protects your computer when it is off and it means no one can just steal your hard drive and access your files. This is good, but what if someone grabs you while you're sitting there working on it? What if you leave it in sleep mode and not turned off? Then that whole disk encryption is not really going to help you.
What if you had individual files that you consider more secret than the others? That finance spreadsheet or that special pic your spouse sent you? That's where individual file encryption comes in. You are just scrolling nostr when they grab you, your computer is on, and unlocked, but those special files are still safely encrypted.
I will share with you one of my favorite small programs: Picocrypt.
Download the Paranoid pack and store it in multiple drives, email accounts, and cloud storage. That way you will always have a copy to decrypt any files that you stored away.
Use it to encrypt any files that you feel need extra attention. It is also very useful for encrypting any files that you intend to store online in cloud storage. You do encrypt your files that are stored online don't you? Yes, even with the company that offers "encrypted" storage. Don't trust their encryption, use your own.
EXPERT LEVEL - Encrypt containers and hidden containers.
What if you want to encrypt several files and keep them all together in like a folder or container? That's where Veracrypt comes in. Free, open source, cross platform, and powerful.
Veracrypt allows you to create encrypted containers from any file that act like individual drives that can be mounted or unmounted as needed. You can name these files anything that you want, move them around or delete like any file, and make as many as you want. This allows you to have compartmentation of your files and drives.
Next trick, Veracrypt allows you to create a hidden container inside that container. Enter one passphrase and you open the encrypted container. Enter a different passphrase and you open a different hidden container.
This allows deniability. When they grab you and start pulling your fingernails off until you tell them the password to open the encrypted container, give it to them. They don't have to know that there is another hidden one under that.
These features allow you to do all sorts of interesting things only limited by your need and imagination.
What if you have a container named as some random config file in your /etc folder? What if you just encrypted a removable storage drive? What if you have multiple hard drives on your computer that have multiple containers and hidden containers? What if you have a hidden container that can only be accessed from booting up in a amnesiac OS like Tails leaving no trace that the files exist or trail that they were ever accessed? Go crazy, have fun.
NEMO - Failsafe
Nemo has no files, encrypted or otherwise. If they did you couldn't prove it. Nemo does use something like Tails that retains no memory from boot to boot.
Nemo also uses a failsafe. A simple lanyard attached to the flashdrive running the OS and the other end around their wrist while they work. When you try to separate them from the computer the flashdrive pulls out and everything is gone.
Using these programs you can create a layered and compartmentlized approach to your encryption scheme. There are also plenty of other encryption programs to check out such as Cryptomator, AES Crypt, etc
Last point and most important: Encryption is only as good as the passphrase you use to lock it down. Use a shitty password and it doesn't matter how uncrackable your encryption is.
-
@ 3b7fc823:e194354f
2024-09-02 16:26:30First steps into privacy.
You are a normie, but maybe you are privacy curious. Maybe you are ready to take a first step or two into security and privacy but don't know where to start.
Don't worry, here are some absolute beginner first steps that will make a big difference.
-
No one except your friends and family should know your personal phone number and email address. Stop giving away your data! You don't have to fill out every blank on that form. Unless they are mailing you something they don't need your home address. Use a email aliasing service or just create a burner email account as a spam trap. Get a second VOIP phone number. Look up the address of a local hotel. Use these instead of your personal information or maybe just skip the customer reward program.
-
Speaking of giving away your data. Stop using spyware! Facebook, Instagram, Tiktok, etc. It is "free" software designed to suck every ounce of personal data from you to be repackaged and sold. Don't just delete the app, search for how to delete your account data.
BTW Windows, google, and 90% of the apps on your phone are also spyware but one thing at a time. Maybe start reading up on FOSS.
-
Clean up your communications. Stop using unencrypted calls and SMS texts. There are several options but just get Signal and make your friends use it. Its easy and works.
-
Clean up your email. This one is probably going to take you some time if you are like most people who have hundreds of emails from years gone bye. Go through every single one and unsubscribe from every newsletter or sales pitch from every store you have ever bought anything from. Block every spam email you see. If you are using a email provider that literally scans every email you send or receive in order to sell you stuff like gmail, then now is the time to switch to a private and encrypted provider like proton or tuta.
-
Clean up your web surfing. Switch to a privacy browser and search engine. If you don't know which one just get Brave. There are ones that I like better but Brave is good enough and easy, especially if you like Chrome. A hardened Firefox is better but requires some homework and if on desktop Mullvad browser is a excellent choice.
BONUS TIP:
Clean up your security. Make sure all of your software is setup for automatic updates, especially security updates. Also, I don’t know who needs to hear this but get a password manager if you don’t have one. (Don't save passwords on the browser!) Get an actual password manager and then add 2FA to all of your online accounts and you will have better security than 90% of the population.
OK, nothing too exciting but we got the big rocks. Data leaks, communications, email, web surfing, and basic security.
What, no VPN or Tor or super secret stuff? No, not yet. This is your level zero default. Your identity and activity is still transparent but you are no longer leaking your data all over the place. This will provide a general base for everyone.
The next step is to perform a basic threat assessment of your personal situation. What are you most at risk for? Targeted attacks or passive? Cyber or physical? What do you most need to defend against? Government mass surveillance, surveillance capitalism, censorship, or public exposure?
There will be some overlap with all of them but your next steps will really depend on your answer. We will cover each of these in greater depth later.
-
-
@ 3b7fc823:e194354f
2024-09-02 13:07:09GHOSTn
- Renoted from a month ago into a article as a proof of concept
A quick overview
privacy #tor #vpn
**Computer -> clearnet -> Website **
ISP: sees that you are connected to website VPN: n/a Tor Entrance Node: n/a Tor Exit Node: n/a Website: sees your IP address and logs everything that you do on the website
Good for when the expectation of privacy does not exist. A KYC site you are logging into. Utility bill pay site, bank
**Computer -> VPN -> Website **
ISP: sees that you are connecting to a VPN but not what you are doing afterwards VPN: sees your IP Address and that you are connecting to a website Tor Entrance Node: n/a Tor Exit Node: n/a Website: sees that someone from a VPN exit node has connected but doesn’t know who. Logs data.
Good for hiding your activity from your ISP. Good for hiding your identity from the website. Good for when you want low level privacy but not anonymity. VPN provider sees everything and your level of privacy depends on how much they know about you and how much data they log and retain (varies greatly from provider to provider).
**Computer -> Tor -> Website **
ISP: sees that you are connected to Tor but nothing afterwards VPN: n/a Tor Entrance Node: sees your IP address but nothing afterwards Tor Exit Node: sees website you are going to but not who you are Website: sees someone from Tor has connected but doesn’t know who. Logs.
Good for privacy and anonymity. Assumes that Tor is legal in your country.
**Computer -> VPN -> Tor -> Website **
ISP: sees that you connected to a VPN but nothing afterwards VPN: sees IP address and that you are connecting to Tor but nothing afterwards Tor Entrance Node: sees a VPN is connected but nothing afterwards Tor Exit Node: sees website you are going to but not who you are Website: sees someone from Tor has connected but doesn’t know who. Logs.
Good for if your ISP blocks or cancels your service for using Tor. Potentially an option if Tor is illegal in your country (Dangerous).
**Computer -> Tor -> VPN -> Website **
ISP: sees that you are connecting to Tor but nothing afterwards VPN: sees someone from Tor is connected and that they are connecting to a website Tor Entrance Node: sees IP address but nothing afterwards Tor Exit Node: sees someone is connecting to a VPN but nothing afterwards Website: sees someone from a VPN is connecting but doesn’t know who. Logs.
Good for when a website blocks Tor traffic. Assumes Tor is legal in your country. Assumes that the VPN doesn’t know who you are. To maximize privacy and anonymity VPN provider should be KYC free and accept privacy payments (ex: Monero).
Note: If a website blocks Tor and VPN then maybe that is a sign that you shouldn’t go there.
-
@ 3b7fc823:e194354f
2024-09-01 23:52:38I dOn'T cAre ABouT pRivAcY. IT dOEsN'T maTtER. i'M nOT dOiNg AnyThiNg wRonG.
GHOSTn
Your phone is spying on you. Your apps are spying on you. Your websites, search engine, fitness tracker, smart watch, IoT device, EVERYTHING is collecting anything it can and sending it off to be stored, cross referenced, and sold.
Data is the new oil.
So what? I don't care if Google knows I like motorcycles. By itself one data point isn't a big deal but once you start bringing everything together...
Who are you talking to? When and how long did you talk to them? Where did you go? How often do you go there? On and on the profile starts to become overwhelmingly invasive.
Right now it is extremely cheap and easy to collect and store the data but it's hard and expensive to cross reference and tabulate the data down to the individual. But in the extremely near future using AI and faster processers, data profiles for sale go from white men between 25 - 30, with this education level, and background like XYZ to -> John loves motorcycls and steak.
Suddenly your insurance premiums are way higher than your friends because you partake in dangerous activities and eat too much red meat. You get denied that loan because you invest in risky assets and it raises your risk factors to pay it back. That job that you applied to never responded because they already ran you through the algorithm and you don't fit the culture.
Protect your data and privacy now before its too late.
privacy
-
@ 878dff7c:037d18bc
2025-03-04 22:51:05Disclaimer: While I strive for accuracy, remember that political predictions are as reliable as a weather forecast without a window.
Introduction: The Sands of Western Australia Shift
As Western Australians head to the polls on March 8, 2025, the political landscape is poised for potential tremors that could reverberate across the nation. Premier Roger Cook (WA Labor Party), leading the Labor charge, seeks a third consecutive term, while the opposition, led by Libby Mettam (WA Liberal Party), aims to regain lost ground.
The outcome of this state election may offer insights—or at least entertaining speculation—about the forthcoming federal election.
Crystal Ball Predictions: WA's Influence on the Federal Election
1. Labor's Momentum or Moment of Reflection?
Scenario A: Labor Victory in WA
If Premier Cook and his team secure another term, federal Labor might interpret this as a green light, signaling public approval of their policies. This could embolden Prime Minister Anthony Albanese (Parliamentary Profile) to align his federal campaign closely with WA’s successful strategies—perhaps even adopting the state’s beloved quokka as the new party mascot.
Scenario B: Opposition Upset
Conversely, if the opposition manages to dethrone Labor in WA, it could serve as a cautionary tale for the federal party. Such an outcome might prompt Albanese to reassess campaign strategies — lest he find himself writing a concession speech that doubles as a political eulogy for overconfidence.
2. The Teal Factor: Independent Waves
The rise of independent candidates, particularly those with an environmental focus, has been notable. In WA, seats like Curtin have seen strong independent contenders. A successful independent bid in the state election could foreshadow similar movements federally, reminding major parties that voters sometimes prefer their politics à la carte.
3. Policy Bellwethers: Mining, Climate, and Beyond
WA’s economy, heavily reliant on mining, places it at the nexus of debates on environmental policy and economic growth. If WA voters lean towards candidates advocating for sustainable mining practices, it could signal a broader national shift towards balancing economic and environmental concerns.
Anthony Albanese’s Election Date Dilemma: Factors at Play
Choosing an election date is akin to selecting a ripened avocado—timing is everything. Here’s what might be on the Prime Minister’s mind:
1. Avoiding the WA Election Shadow
With the WA state election on March 8, Albanese would likely avoid calling a federal election too close to this date to prevent voter fatigue. An April 12 election date has been speculated, allowing a respectful distance from the state polls. (News.com.au)
2. Budgetary Considerations: To Table or Not to Table
The federal budget, traditionally delivered in late March, presents a scheduling conundrum. Calling an election before the budget could be perceived as dodging fiscal scrutiny, while delaying until after allows the opposition ample time to critique.
It’s a classic case of "damned if you do, damned if you don’t," much like wearing white to a spaghetti dinner.
3. Natural Events: Cyclone Alfred's Unwanted Cameo
Mother Nature has a penchant for unpredictability. The looming Cyclone Alfred threatens to disrupt parts of Queensland and New South Wales, complicating election logistics. Announcing an election amidst natural disasters could be seen as insensitive—akin to hosting a barbecue during a hailstorm. (ABC News)
4. Polling and Public Sentiment
Recent polls have shown a decline in Albanese’s approval ratings, with the opposition gaining traction. Timing the election to capitalize on any positive swing in public sentiment is crucial. After all, in politics, as in comedy, timing is everything. (The Guardian)
Conclusion: The Unpredictable Dance of Democracy
While the WA state election offers a glimpse into the political mood, the federal election remains a separate beast, influenced by a myriad of factors—from economic conditions to the whims of the electorate. Anthony Albanese’s decision on when to call the federal election will undoubtedly be a calculated one, aiming to navigate the treacherous waters of public opinion, policy debates, and perhaps the occasional cyclone.
In the end, predicting election outcomes is much like forecasting the weather: despite all the data and models, sometimes you just have to look out the window and hope you brought an umbrella.
Sources:
-
@ 862fda7e:02a8268b
2024-08-20 02:36:41I had a dream that I was at a cementary where only children were buried. Except the headstones for the graves weren't headstones; they were toilets. It was respectful for the family of the deceased child to use the toilet. The toilets were out in the open so everyone could see the family using the toilet. Imagine a cementary but it's all a bunch of toilets, that's what it was like. During my visit there were plenty of family paying respects and releasing themselves. I'm not sure where the family's feces and pee went after they flushed, but it seems only right that it flushed down to the dead body's casket. I'd hope nobody was paying respects to an infant, because they couldn't release much without overflowing the toilet. Also, the feces wouldn't stink since it's six feet under.
I recall the place being very filthy, there was vomit on the ground in a lot of places, except the vomit was very poorly cleaned up (mostly smeared about).
Dream analysis: Dead kids deserve to be shit on. Respectfully.
-
@ 862fda7e:02a8268b
2024-08-13 02:16:07I never try to convince people to stop using social media, government spy devices (AKA smart phones), etc. Any time I have ever tried, people's curiosity is not peaked by learning how awful and extremely invasive the practices held by these companies are. Instead, people turn defensive and downplay the reality, or say "I have nothing to hide" (click here to learn why this is not an OK excuse), or give a pletora of excuses as to why they "have" to continue engaging in the harmful practice.
You do not HAVE to do anything. Everything we do is a choice.
What people REALLY mean is, "but this is more convenient." I have noticed that people really prefer the path of least resistance - and this is not a conscious choice. What other people in society do, we tend to do as well, all without thinking about it. This is why certain hairstyles are exclusive to a decade. We unconsciouslly adapt our behavior to what others are doing. A hairstyle is a great example, because it's a physical example we can SEE this happening. However, our internal thinking and behaviours also adapt to what others are doing.
When the entire society around us has intergrated the use of government spy devices (AKA cell phones) into common every day life, the average person will follow suit and get a cell phone and use it how everyone else is using it. This means cell phone -> required invasive "apps" to use cell phone = getting spied on my the government, corporations, and whoever they sell that data to.
-
@ 62a6a41e:b12acb43
2025-03-04 22:19:29War is rarely (or if ever) the will of the people. Throughout history, wars have been orchestrated by political and economic elites, while the media plays a key role in shaping public opinion. World War I is a clear example of how propaganda was used to glorify war, silence dissent, and demonize the enemy.
Today, we see similar tactics being used in the Ukrainian War. The media spreads one-sided narratives, censors alternative views, and manipulates public sentiment. This article argues that wars are decided from the top, and media is used to justify them.
How the Media Glorified and Propagated WW1
The Media Sold War as an Adventure
Before WW1, newspapers and propaganda made war seem noble and exciting. Young men were encouraged to enlist for honor and glory. Posters displayed slogans like “Your Country Needs You”, making war look like a duty rather than a tragedy.
Demonization of the Enemy
Governments and media portrayed Germans as "barbaric Huns," spreading exaggerated stories like the "Rape of Belgium," where German soldiers were accused of horrific war crimes—many later proven false. Today, Russia is painted as purely evil, while NATO’s role and Ukraine’s internal conflicts are ignored.
Social Pressure & Nationalism
Anyone who opposed WW1 was labeled a traitor. Conscientious objectors were shamed, jailed, or even executed. The same happens today—if you question support for Ukraine, you are called "pro-Russian" or "anti-European." In the U.S., opposing war is falsely linked to supporting Trump or extremism.
Fabricated Stories
During WW1, fake reports of German soldiers killing babies were widely spread. In Ukraine, reports of massacres and war crimes often circulate without verification, while Ukrainian war crimes receive little coverage.
How the Media Promotes War Today: The Case of Ukraine
One-Sided Narratives
The media presents Ukraine as a heroic struggle against an evil invader, ignoring the 2014 coup, the Donbas conflict, and NATO expansion. By simplifying the issue, people are discouraged from questioning the full story.
Censorship and Suppression of Dissent
During WW1, anti-war activists were jailed. Today, journalists and commentators questioning NATO’s role face censorship, deplatforming, or cancellation.
Selective Coverage
Media highlights civilian deaths in Ukraine but ignores similar suffering in Yemen, Syria, or Palestine. Coverage depends on political interests, not humanitarian concern.
Glorification of War Efforts
Ukrainian soldiers—even extremist groups—are painted as heroes. Meanwhile, peace negotiations and diplomatic efforts receive little attention.
War is a Top-Down Decision, Not the Will of the People
People Don’t Want Wars
If given a choice, most people would reject war. Examples:
- Before WW1: Many workers and socialists opposed war, but governments ignored them.
- Vietnam War: Protests grew, but the war continued.
- Iraq War (2003): Millions protested, yet the invasion went ahead.
Small Elites Decide War
Wars benefit arms manufacturers, politicians, and corporate interests—not ordinary people. Public opposition is often ignored or crushed.
Manipulation Through Fear
Governments use fear to justify war: “If we don’t act now, it will be too late.” This tactic was used in WW1, the Iraq War, and is used today in Ukraine.
Violence vs. War: A Manufactured Conflict
Violence Happens, But War is Manufactured
Conflicts and disputes are natural, but large-scale war is deliberately planned using propaganda and logistical preparation.
War Requires Justification
If war were natural, why does it need massive media campaigns to convince people to fight? Just like in WW1, today’s wars rely on media narratives to gain support.
The Crimea Referendum: A Case of Ignored Democracy
Crimea’s 2014 Referendum
- Over 90% of Crimeans voted to join Russia in 2014.
- Western governments called it "illegitimate," while similar referendums (like in Kosovo) were accepted.
The Contradiction in Democracy
- If democracy is sacred, why ignore a clear vote in Crimea?
- Other examples: Brexit was resisted, Catalonia’s referendum was shut down, and peace referendums were dismissed when they didn’t fit political interests.
- Democracy is used as a tool when convenient.
VII. The Libertarian Case Against War
The Non-Aggression Principle (NAP)
Libertarianism is fundamentally opposed to war because it violates the Non-Aggression Principle (NAP)—the idea that no person or institution has the right to initiate force against another. War, by its very nature, is the ultimate violation of the NAP, as it involves mass killing, destruction, and theft under the guise of national interest.
War is State Aggression
- Governments wage wars, not individuals. No private citizen would naturally start a conflict with another country.
- The state forces people to fund wars through taxation, violating their economic freedom.
- Conscription, used in many wars, is nothing more than state-sponsored slavery, forcing individuals to fight and die for political goals they may not support.
War Creates Bigger Government
- War expands state power, eroding civil liberties (e.g., WW1's Espionage Act, the Patriot Act after 9/11).
- The military-industrial complex grows richer while taxpayers foot the bill.
- Emergency powers granted during wars rarely get repealed after conflicts end, leaving citizens with fewer freedoms.
Peaceful Trade vs. War
- Libertarians advocate for free trade as a means of cooperation. Countries that trade are less likely to go to war.
- Wars destroy wealth and infrastructure, while peaceful trade increases prosperity for all.
- Many wars have been fought not for defense, but for economic interests, such as securing oil, resources, or geopolitical power.
Who Benefits from War?
- Not the people, who suffer death, destruction, and economic hardship.
- Not small businesses or workers, who bear the burden of inflation and taxes to fund wars.
- Not individual liberty, as war leads to greater state control and surveillance.
- Only the elites, including defense contractors, politicians, and bankers, who profit from war and use it to consolidate power.
Conclusion: The Media’s Role in War is Crucial
Wars don’t happen naturally—they are carefully planned and sold to the public using propaganda, fear, and nationalism.
- WW1 and Ukraine prove that media is key to war-making.
- The media silences peace efforts and glorifies conflict.
- If people truly had a choice, most wars would never happen.
To resist this, we must recognize how we are manipulated and reject the forced narratives that push us toward war.
-
@ 862fda7e:02a8268b
2024-08-07 05:09:12I find it strange how many times people have mentioned that my website looks the way it does as a way of paciticing "ironic" humor. The implication being that my website looks bad, and intentionally so, to try and mimic the internet's look from the mid 1990's to early 2000's. However, this is not what I am doing. I genuinely heavily prefer a basic web browsing experience. I find Javascript to be one of the worst, most invasive, evil things to happen to web browsing. On top of that, it's also heavily bloated and preforms many unnecessarry tasks. I also describe the modern internet in one way: The monetized internet. The internet no longer is a place of personal passion, a place to put your personal interests online that are fueled entirely by your PERSONAL interesnt, not a MONETARY interest. With the ushering in of MONETARY interest in the internet, people have felt the need to strip the web of its character and create websites that look minimal, yet are actually incredibly bloated with invasive Javascript. I find it funny that a minial, eye-blistering white Wordpress website uses tons of Javascript when in reality, that website should actually be created on basic and lightweight HTML/CSS.
My use of colors and animated .gifs is not an attempt at humor. It's strange that a website with character is so rare that it's assumed to be a joke. I like colors, I like textures, I like fun basic effects (like blinking, marquee, which by the way - GOOGLE IS STRIPPING SOME OF THE OLDEST AND MOST BASIC HTML FEATURES FROM THE WEB. Google SHOULD NOT be the determining factor as to which BASIC HTML FEATURES LIVE and DIE (Such as autoplaying music, .gif cursors, .gif favicons, marquee). All web browsers like to follow what Google foes, so if Google gets rid of a feature, all web browsers follow suit. Yes, this INCLUDES Firefox and Brave, which is a Chromium based browser.
-
@ 862fda7e:02a8268b
2024-07-31 23:10:52If you see my picture, my name, or anyone subtely implying they are me anywhere online that isn't the following websites: icum.to videos.icum.to tubgurl.com endchan.gg/ashleyj that is NOT me. I do not use any form of social media*, I do not have "secret" profiles, I do not use realtime chat. There have been numerous times people thought they were talking to me. People can easily impersonate me because I talk about my interests and have photos/videos of me online. I do not play online video games, I do not use/like realtime chat, I do not use social media. It is not me. Usernames similar to my name/interests are not me. If you really think you are talking to me on a game, Discord, social media, etc. call my phone number (725-286-3278) or email me and I will verify that I am not the imposter.
*Social media being any large or small social platform, be it proprietary or open source. Popular ones include Facebook, Instagram, TikTok, Discord, Twitter, or Mastodon instances. I appreciate open source efforts for a more free social media, however, I do not like the social media platform style for a number of reasons.
If you are curious as to why I do not use social media, please read this.
-
@ 862fda7e:02a8268b
2024-07-19 22:15:48If you're a straight man jacking off to straight porn, you're gay. You're looking at another man's cock as a means to get gratification. Without that man's cock, your sexual experience wouldn't be fulfilled. You needing to see that man's cock in order to be sexually fulfilled is gay. I like men but even I can't stand looking at a dude's cock as he bangs a chick. It's a complete turn off. It ruins the entire thing. I don't want to see a man's body, I don't want to see his penis, I don't want to hear him. We have the technology to perfectly replicate a male penis and even automated thrusting. There's no need to continue to jack off to a real man's penis. I don't understand how any self respecting man can become erect while watching another man and his penis bang a hot chick. It's the defenition of cucking, but people will try to rationalize their way out of it. You're the cuck, you just don't have a camera panned on you showing your shame as you pound off.
This is why lesbian or solo porn is always superior. Two is better than one, so lesbian porn is by far the best. Lesbian porno has no cocks, or if it does, they're fake and not disgusting. You don't have to deal with looking at a dildo's asshole as it pounds a chick. Lesbian porn is weirdly underrated these days. I almost NEVER see anyone talk about it. It's always degenerate straight porn or overwhelmingly gay shit. You're way more likely to see gay and tranny garbage before lesbians. It's weird that lesbians are probably one of the lesser viewed categories these days. There's a lot of homos out there. Females are not threatening to a sexual situation. It's male penetration that is cuck-like behavior. With females it is all playful and sensual, always with room for more to play. The more cocks you have around a woman, the gayer and more homosexual it is. I especially can't wrap my mind around being turned on by cum shots on a woman. You're jacking off to not only a guy's cock, but his orgasm. You're jacking off to his load. And yes, I UNDERSTAND you're "jacking off to the woman getting cummed on", but you miss the point. You are jacking off to a man having an orgasm. It's never sat right with me, when I want to utilize "material", I want to get turned on by a woman. I feel more straight than straight men at times.
-
@ 862fda7e:02a8268b
2024-07-15 06:48:28As of April 27, 2024, I will make the conscious effort to no longer refer nor use the imperial system for measurments. This will be a difficult change for me to make, as I have been accostumed to the imperial measurment system for the past 25 years of my life. However, I find the system of measurment very flawed and inconvenient, especially as most of the world opts for the more accurate metric system.
I have decided to finally make this change after learning about the ridiculous naming system of CMD ceramic capacitor casings. The CMD ceramic capacitor casings are named after their measurments, which I find convenient and straight forward. However, they are based off of imperial measurments. When we know that CMD ceramic capacitors are notociously small; you would think it's foolish to name their casings after the imerial system, as we know the smallest measurment in the imerial system is inches. Most Americans do not bother using centimeters nor millimeters.
Well, this is where our problem is. The CMD ceramic capacitor casings are MILLIMETERS small. They cannot measure an inch, not even half an inch. A common CMD cermaic capacitor measures 0.08 inches by 0.06 inches. The casing is named a 0806 casing, meaning it's 0.08 inches by 0.06 inches.
When we try to visiualize what 0.08 inches looks like, it's nearly impossible. This is not due to a lack of intelligence. However, it is due to a lack of using inches in such a miniscule measurement. Americans never refer to inches in such small measurements, it's very hard to visualize. This is an absurd naming convention and they should have realized this flaw.
If I want to measure a CMD ceramic capacitor to determine what casing size it is, I would never in my right mind use the inches section of my ruler. It's very impractical and confusing. However, a very simple choice a sane person would make is to refer to the millimeters section of their ruler to measure a very small object for a very accruate measurment. This example was the final straw for me. I am no longer going to abide by the imperial system. It is flawed. It is a very generalized way of measuring something. It's also very pig-headed and innacurate. It limits how specific we can get with a measurment. For some reason I am a lot more well versed in millimeters and centimeters than most Americans. I am shocked at the average American's lack of compresension of superior measurment practices.
I am not as well versed in metric measurments as someone who has grown up with this superior measurment instilled in them since childhood. I will frequently be measuring items around my house to gain a more familiar understanding with their size in the superior measurment convention. Due to pure habit, I may casually refer to something in inches. This is not due to a lack of willpower, nor a lack of commitment to my new change. It is purely a bad habit that I am trying to rid away. There will be mistakes.
While we are on this topic, I will quickly mention other strictly Americanized choices that I reject for purely logical reasons. 1. I do not spell it "publicly". This makes no sense when words that typically end in "cally" have an "a" in them. Logically, it should be spelled, "publically". I will continue to choose to spell it this way, as it logically makes more sense.
-
I do not spell it "gray". When I pronounce the word "grey", there is clearly an "e" in it. Not an "a". The original word is spelled with an "e", there was no need to bastardize its spelling with an "a".
-
I do not pronounce the word "solder" as "sodder". The word is spelled with an "l", but not only that. I refered to the origin of the word "solder", and this is what I found. "to consolidate, close, fasten together, join with solder" (13c.), from Latin solidare "to make solid," from solidus "solid" The word ultimately comes from "solid", which we do not pronounce "soid". We say, "solid" with an "l".
-
-
@ 862fda7e:02a8268b
2024-07-08 19:51:16People who enjoy hot weather have a more reptilian brain and are generally stupider. Rain and cloudy weather is the best weather. This isn't a matter of opinion, it's factual and logical.
The default response you're supposed to have when it's blisteringly sunny out is, "It's so nice outside." People don't have many preferences and take on whatever the default is given to you by society. Since reptilians run our society, and reptilians are cold-blooded, they much prefer the hot weather. This is why in the media we continually hear that very hot weather is nice weather. Reptilians also hate life and feed off of a death cycle. When you have heat so hot it starts to kill life. There's less chance of rain, which means plants and food can't trive, and the heat is so hot it kills the plants by drying them out.
Rain is the source of life. When it rains continually for a period of time, plants thrive. I ALWAYS feel a million times better when it's cloudy out and raining. For some reason I feel more conscious when it's raining. Rain represents life and safety. You have a water source, your food will thrive, plants continue to live, there is no threat of fire. Continual sun, especially very hot sun ruins all of this. This is a pre-curated opinion given to people because reptilians run the show and control the media/politics/education. Any logical person would realize that heat and hot temperatures are inferior.
A dumb retard might say, "But the sun is so nice because that means you can do things." This makes no sense to me. I assume by "do things" they mean go outside for a walk, or perhaps eat at a restraunt outside? I go on walks all the time in the rain, I love it. I love to sit in the rain, lay in the rain. Rain doesn't stop you from enjoying the outdoors, it actually makes it more enjoyable because you can actually withstand the temperature and the scenery is a million times more beautiful with rain providing life. With """good weather""" in the summer, you can't go outside barefoot without burning your feet. How is that "nice"? There are also always fires in the summer because it's insanely easy for fires to start. When it's blisteringly hot out, you really can't do much outside, which is why it makes no logical sense as to why people say it's "so nice out". You can't do anything when it's 105 degrees out. This is why kids have to play with some form of water in the summer in order to even withstand the heat (such as water guns, super soakers, pools, sprinklers, etc.) If you are to spend a prolonged time in the heat, your skin can burn, your feet will burn, you may come across rattlesnakes, fires may occur, the list goes on and on. Then when you go inside, you crave the cool air and a cool drink. It's really strange mentality, rain and everything that comes along with rain is much more natural. It represents life, temperatures are not as drastic and generally maintain at a livable comfortable range, and I believe it must provide some sort of conscious benefit since I always feel much better when it rains. It's not to say it should rain every single day for months on end. Balance is key. Ideally it should rain 75% of the time, and moderate sun 25% of the time.
I usually find that I get along better with people who also prefer the rain. Something about it usually signals that they're a thinking person compared to pre-programmed non-thinking humans. It's bizarre that the media equates rain to sadness and depression. It's inversion, as the reptilians do with everything because it's a major part of the occult.
-
@ 862fda7e:02a8268b
2024-07-02 10:36:56I am not a Zoomer. Please stop with this misconception.
I was considered a Millenial my entire life until I was 20 in 2019. It was that year that I started hearing people refer to me and others my age as Zoomers. I was confused as to why there was a sudden shift when my entire life I was a Millenial. I even remember one of my High School teachers mention how it was funny we were all in the same generation, she was around her late 20's and we were 18, only a ten year age difference.
This sudden shift is bizarre and most people go along with it mindlessly. I was always a Millenial. I still am. Apparently now the general year of birth for Zoomers is anywhere from 1994-1997. Generations are never a strict year range. Generations are made up on experiences regarding a certain time line. I'm at the age range where based on how you lived your childhood, based on the experiences you had, you can easily fall into the Millenial or Zoomer generation. Even though someone may consider me a Zoomer, I absoloutely do NOT relate to Zoomers at all. Never have, never will. Once again, generations are made upon experiences, not solely the year cut off. That is just a generalization.
I have had a number of Zoomers (around 15-19) call my phone line and it's insane how many references I make or things I talk about that they have no idea about. Even something as extremely iconic as Duke Nukem is unknown to them. No, I'm not kidding. When I was a kid on the internet, you couldn't go a day without seeing Duke Nukem referenced somehow. He was really popular, along with Beavis and Butthead, which is one of my favorite shows as a child and still is to this day. I especially differ from Zoomers when it comes to technology and experiences on the internet. I was on the internet from a young age. Since I had a very hard time making friends at school, I used the internet as a way to have communication with others. I was the "lul so randum" type, but online that was fairly standard. In person it was annoying and I was weird. That being said, I experienced a ton of things on the internet that Zoomers have no concept about. I was torrenting from a young age, and while torrenting definitely shouldn't be an achievemnet, these RETARD ZOOMERS don't even know how to download an .mp3 from a Youtube video. They screen record it on their phone and complain about having to be silent so they don't ruin the audio with their voice. Yes, this is clearly, CLEARLY, a major generational difference. Another thing, one of my fondest memories was downloading toolbars and getting viruses and trying to figure out how to remove it from the family computer before anyone found out. Zoomers don't have toolbars, they don't know what those are. They got replaced for apps. Zoomers can't get viruses anymore - every device, be it a computer or phone, is heavily babby-proofed so if you want a virus, you're going to have to jump through some hoops to get one. Things like HTML and markup were common when I was a kid, and I learned the very basics of it. The only time a Zoomer will know HTML is if they have a Neocities phase for 2 weeks. The list continues. "VHS aesthetics" is a phrase that makes me want to kill myself. Most Zoomers never had experience with VCRs, and for some reason hold this nostalgia for how VHS tapes look even though they never experienced it. What's funny is that the "VHS aesthetic" is not true to life - you'd have to have a heavily damaged tape via magnents or moisture damage to get that awful of a look. VCRs, VHS tapes, camcorders, I used them all as a kid and it wasn't anything special. That was what we had before we started using DVDs. Same with CDs, used those and I'm pretty sure most Zoomers would not have used CDs.
I'm not saying I'm a hardcore Millenial. There are certain things I didn't experience or can't remember. However, I am definitely a late-term Millenial, one of the very last few. FOR GODS SAKE I WAS BORN BEFORE THE MILLENIUM. MILLENIAL -> MILLENIUM. Being a later Millenial, I experienced a VERY different internet from the Zoomers. Especially when it comes to internet culture. The entirety of how people acted on the internet is inperceivable to Zoomers. People didn't take things so seriously or personally, it wasn't expected that you should tell people your real name or every little thing about you (unless a personal website), being on the internet wasn't a 24/7 thing either. Being on the internet was with intention. It wasn't readily available any single time you were bored. It was 100% noticible how internet quality declined the more phone users used the internet. When you use a phone, you're vastly limited as to how you interact with the internet. Your posts will be shorter and of less value because it takes much longer to type on a phone, and it's way more inconvenient to look up reference things when on a phone compared to a computer. You are also using the internet with way less intent. When you were forced to be on a computer, it was more of a dedicated event. You're on the computer, you're using the intenret. With a phone, it's a very passive mindless butchered use of the internet. I genuinely don't understand how someone has a comfortable time using a cell phone for internet browsing. It feels like an insult. You feel like a monkey doing that. However, that's really all Zoomers know and prefer, they didn't experience much different. I did, though, which is why it's confusing to me when people call me a Zoomer. As you can see, it's all about the experiences rather than just a birth year.
For more examples, how I experienced my first exposure to pornography wasn't through the internet. It was Playboy magazines for years, then porn on TV, then the internet. For most Zoomers it would have been via the internet.
I will say that there are people who are my exact age who definitely fall in line with the Zoomer category. Mostly because these kids growing up were normies. They were watching the latest TV, movies, music, and didn't use the internet because that was still for losers up until Facebook and smartphones became popular. Since I was a loser retard, I was using the internet at a young age, I experienced a totally different world from the normies.
To add onto this, much of the media I consumed growing up was from the 80's and 90's. They were showing plenty of re-runs of 90's cartoons when I was a kid. However, I never had Saturday morning cartoons, since I'm a late Millenial, there were channels like Cartoon Network. My parents mostly played music from the 80's and is probably why I really enjoy the music from that time. Shows and movies I loved included/includes the 1985 Care Bears series (one of my favorites), PeeWees Big Adventure (amazing), Beavis and Butthead, TMNT, etc. I also had many toys from the 70's since that's when my parents were children and they passes their toys onto me. Many 1970's Fisher Price toys, toys like Little People, the Little People boat, carport, Barn, and a metal Dollhouse from the 1970's. I recall even wearing those god awful super scratchy kids pajamas from the 1980's that had cartoon characters on them. Mine had Strawberry Shortcake. I have a lot of experience with these things.
There is a clear generational devide between me and the Zoomers. They cannot relate to the things I talk about, the references I make, and vice versa. When I mention Beanie Babies to a 17 year old, they think I'm talking about Beanie Boos, which isn't something I saw until probably 2015 when I was 16. The phrase "boomer shooters" is a dead giveaway that someone's a Zoomer and has shit taste, because that term is a disgrace to games like DOOM and Duke Nukem.
Also, how I handle things like homosexuality and identity politics is vastly different from Zoomers. The Zoomers act like this stuff is real, without question or self awareness that it's weird. I never hesitate when I know something is faggot behavior. Trannies are not """trans""", they're trannies and weirdos. But when these Zoomers call me they start off the conversation with "what are your pronouns?" with a SERIOUS intention. I don't play along with that stuff, and it's a generational thing with people like me who grew up in a certain time who haven't changed due to societal pressure. It's clear I'm very guy-ish with my interests and things I do, so when I remark about my dislike of my breasts, they immedietly jump to "well you can get "top surgery". It's insane how programmed the Zoomers are. Their generation is continually taught to never truly be okay with who you are. You always have to feel pressured to fit in a certain label, a certain race, a certain gender, it's all overdramatized identity politics. I say if a man ever sucks a cock or yearns for a cock, that man's a homo. Then they try to explain to me that sexuality is a fricken' spectrum. Sure, it's a spectrum: FUCKING GAY and STRAIGHT. If a man EVER yearns for a cock or has jacked off to gay porn (yes, trannies are gay because they're men), then that man is forever a homo. I don't care if he regrets it, if he 70% likes women 30% likes men - it doesn't work like that. The dude is a fag. And guess what? I don't care. I don't care if someone is gay or wants to play dress up, with red lip stick between his stubble. Who cares. I don't. However, it is weird. It's funny. It's bizarre being exposed to Zoomers with how brainwashed they are into this garbage. Plenty of Millenials are as well, however, ones who grew up on the internet with that certain internet culture call it as they see it and I will never change that about myself. There is no way on Earth someone can truly compare me to be similar to a modern day 15 or 20 year old. The experiences don't align.
Clearly I am not a Zoomer.
-
@ 3c984938:2ec11289
2024-06-29 11:40:44Understand the power of your signature on corporate documents.
Do you ever feel like you put your signature on everything when it comes to legal documents? A cellphone? Loan(s)? Voting booth? Electricity & Water? Driver's License? Hunting Permit? It seems like anything you want or need. You have to sign a contract. What if I told you that there's always a catch?
👉Definition of Reverse Trust Scam: It is a type of fraud that targets unknowingly individuals, often using a combination of deception, manipulation, and false promises to convince them (gains your trust) to part with their hard-earned money, privacy, rights, savings, and even property etc. (This could easily get extended with relationships, too)
✨SideNote: There are a lot of very good scammers out there, and many are very creative and use modern day technology just like you. Some may even pose as FBI or the IRS!
For the purpose of this article, let's go with something a bit harmless. The new Tesla CyberTruck.
Example:
The Tesla CyberTruck has various benefits such as Instant Torque, tech, sustainability, bulletproof, fireproof, customization and off-road etc.
You're probably thinking, "YES! SIGN ME UP." You might even be very grateful after you've signed the contract.
Any type of corporate sale, deal, contract, the solicitor does not have to disclose everything in the contract. They only explain what you get, and not what you forfeit, or has terms & conditions.
This is where the scam part comes in.
First, Let's define what scam[^1] actually means.
This story was published after a man purchased a CyberTruck, "A Man Says Tesla Won’t Let Him Sell His Cybertruck—Even Though It’s Too Big for His Parking Spot."
"That agreement includes a provision that states that if a Cybertruck owner sells the EV during the first year, they can be fined $50,000 or the value of the vehicle, whichever is greater, and be banned from buying future Teslas."
In this case, whether he paid for it fully or partially(via bank loan), he “owns” the Truck. Or does he not? So what happened here? He waived away his right to sell it for at least a year or face heavy penalties. But the salesman did not disclose that information! What would you call this? To me --this would be fraud. Thanks to the internet, this information has come into light. You might be thinking "fraud," might be a bit harsh. Allow me to explain.
What the salesman did was not tell you the information purposefully in order to sale the vehicle(they get paid by commissions). He also has used the power of the law, against you to “protect” himself using your "signature." Essentially, the salesman became the beneficiary, and the man is the glorified holder of the "title" of the vehicle, redeemable after a year.
Think like an owner here for a moment: ✨If I bought a CD with music and resold it later to a friend-he or she have full rights. If I gave a PlayStation game to a friend, they can play to their hearts content. This also applies with books, bikes, microwaves, and so forth. You probably don't even pay taxes to these items.
📚🧾🎼The Author of a book holds the trust(copyright), so I cannot copy its content without their permission. Plain and simple. This makes me the beneficiary of that book because I benefitted from reading the book. The music CD and game is copyrighted, but I can still sell it or give it away. 🌠Note: I never signed anything for these items, all I did was pay the clerk for ownership.
The use of digital products such as ebooks, mp3s, and even your data has forced the consumer to agree to platforms ever-changing "TOS" and are no longer the owner but rather the digital item(s) are held in custodial care. Doesn't this feel like the reverse version of ownership? If you buy ebooks on Amazon, you cannot share the files nor can you sell it. 🍎Apple pulls a similar move with the music and app industry. The next runner-up is your data on 🐦Twitter, Meta, and Google. What about your 👛Bitcoin held on exchanges? They could(FAANG) at will, terminate your account if they desire to do so. Seems like no one benefits, except the corporations because you've digitally "agreed" and thus waived your rights which aren't disclosed. Therefore, you don't own anything. You're just the glorified "user" of those digital items.
🌟Moments like these make me grateful for Nostr protocol and Bitcoin.
So think of all the documents you've ever signed. What did you give up when you signed a contract? Did it benefit you? What was not disclosed? Often times, things that you sign are written in another language known as legalese. For example, have you ever been on the phone and were asked, "Is this a person?"🤔What kind of question is that? Start applying this idea to vaccination, school and etc, and you might see where I'm going with this.
Here is what they're really saying.
^^ Have I been tricked?
Well, I certainly was! I can even recall a memory I had in my "youth." I was pulled over at a stop sign, the officer(waiting on top of a hill- out of sight) gave me a ticket because I didn't perform a “full stop” but rather a "rolling stop." I remember being asked, "Do you understand?”
Do you think I'm innocent? Or was I truly wrong? Maybe I was tricked? According to the officer, I was wrong, and I signed the ticket and paid the fine. I've wised up significantly since that event. It is to this day the only ticket I've ever paid for, and that was 14+ years ago. I, understand now that was part of the driver's license contract.
☑ Do you ever wonder why voting is pushed onto the public? The people running the voting stations don't even care "who" you vote for. They just want you to "register" into the 🦅 "State," thus relinquishing your title voluntarily. Maybe I'm right? Perhaps I'm wrong? I've made my feelings known here.
This world is filled with amazingly deceitful scam artists. Often times, you may not even realize it. They do this to steal your sovereignty, but it can only be done through contracts signed. Your signature is as good as gold(if not better) and is an original trademark.
I hope this article helps you understand the price you're paying by signing contracts. What do the stars tell you? Seek the truth. Trust yourself, we each have a moral compass; Just follow your heart and listen to your inner intuitions.
"In a time of universal deceit, telling the truth is a revolutionary act"- George Orwell
With 🧡, Onigirl
🧧⚡Zaps⚡ are always appreciated, but are not required.
Thank you for taking your time to read my article. I am truly humble every time someone does. I, sometimes even 😊blush when someone shares it. I will share ways to decentralize your life.
Here are other articles that I wrote that you might like: Nostr Beginner's guide Another cup of Tea? Content Creator Tools for writers Just Don't Vote
📢Special Shout-outs: DarthCoin Lux ALL the developers, relay operators, and 🐈designers in Nostr.
✨Support your favorite dev and zap with a special note that you like their work. If you're a little embarrassed send a private zap.😊
[^1]: Fraud and scam have the same see the definition
-
@ 3c7dc2c5:805642a8
2025-03-04 22:04:22🧠Quote(s) of the week:
Bitcoin adoption: 1. Slow enough to confuse nearly everyone. 2. Fast enough to change your life if you can just stay focused for 4 years. Do you notice the higher your intellect grows (thanks to Bitcoin) the more unsocial you become, In real life. Or it's just me?
'First companies will add Bitcoin to their balance sheets. Then states will buy for their treasuries. And finally, sovereigns will hold it as a strategic asset. A natural progression that is already underway.' - James Lavish
🧡Bitcoin news🧡
After last week's dip, I want to share the following quote and picture. Just to keep you sharp & focused.
SAIFEDEAN AMMOUS: "If you think in years, dips are opportunities—not problems. Zoom out."
Bitcoin for Freedom: 'The Bitcoin dip is the best test to check if you understand Bitcoin. If you feel bad when it dips you don’t understand it. When you understand Bitcoin the fiat value doesn’t affect you and you have FOMO all the time.'
On the 25th of February:
➡️REKT! $1.5 BILLION leveraged crypto positions liquidated in 24 hours as Bitcoin plunges below $87,000. Bitcoin is down ~$20K from its all-time high of $109,354. $755.59 million was liquidated from the BTC perpetual futures market in the past 24 hours.
Just know for now Bitcoin is still following (with a 2-3 month lag) global liquidity.
M2 is a measure of liquidity and has been declining since December, but has recently begun to inflect back up again.
If history repeats the Bitcoin dip will soon come to an end and the recovery will be violent.
Oh, and just one more thing on this topic: 'M2 money supply growth per cycle:
2013 cycle: +26%
2017 cycle: +22%
2021 cycle: +49%
2025 cycle: +0.5%
We’ve seen this entire bull market happen with no new money in circulation.' - Bitcoin Isaiah
➡️Rep. Logan Manhart's bill, which aimed to establish a Bitcoin strategic reserver in South Dakota, failed in committee by a vote of 9-3. Manhart plans to reintroduce the bill next year.
➡️'Metaplanet has raised ~$47 million in equity at a market in the first four trading days of its “21m Plan,” with 5.54% of the plan completed to date.' - Dylan LeClair Metaplanet has purchased an additional 135 Bitcoin.
➡️'Germany’s €370 BILLION DekaBank is launching Bitcoin and crypto trading + custody for institutions. Their government sells BTC. Their citizens stack it.' - Bitcoin Archive
➡️At the end of the Weekly Recap, I always share a little gift, a podcast, an article, a report, or a newsletter. This week a report by River. Excellent report. Please give it a read. This is the most important graph in the entire document IMO; we're just getting started:
➡️'31% of Australians have owned BTC or crypto, an all-time-high in adoption, per IRCI '25. 42.9% anticipate widespread future adoption, though 14.3% cite economic and regulatory concerns for not investing. 1 in 5 investors reported banking transaction delays or blocks.' - Bitcoin News
➡️'For years, Bitcoiners pushed exchanges to adopt Lightning. And guess what? It worked. Public Lightning volume is up 266% in about a year.' -Sam Wouters
➡️The Bybit hackers are bridging their stolen ETH to Bitcoin.
➡️ America’s largest publicly traded Bitcoin mining company, Mara, just acquired this 114-megawatt wind farm in Hansford County, Texas.
➡️ 'MicroStrategy has $8.2B debt against $43.4B of BTC. A leverage ratio of ~19%. Only $5B of CBs are below their conversion price, so the effective leverage ratio is more like ~11.5%. BTC would have to drop 80%-90% for MSTR to become insolvent. And none of this debt matures until 2028...' - Bitcoin Overflow
On the 26th of February:
➡️'The IMF today sent out a press release that says as per their agreement with El Salvador, "program commitments will confine" government purchases of bitcoin. This is the first time I've seen El Salvador's bitcoin reserve being implicated in the $1.4bn IMF deal.' - Pleditor
➡️'Unless bitcoin rebounds soon, it looks like the 4-year CAGR could dip below 10% for the first time ever.' - Wicked
➡️'This is currently who is selling. Short-term holders who bought the top are selling spot Bitcoin, this isn't leverage-driven, and perps aren't negative.
That is why equities such as MSTR are green, they must have bottomed out or close to it.
Just your old fashioned fire sale, in BTC.' - James van Straten
More than 74% of realized Bitcoin losses came from holders who bought in the last month! Only the educated survive.
➡️Publicly traded Fold Holdings buys an additional 10 Bitcoins for $875,000.
➡️SEC closes its inquiry into Gemini without enforcement after a 699-day investigation. Cameron Winklevoss calls for accountability, suggesting agencies reimburse legal costs for investigations lacking clear guidelines.
On the 28th of February:
➡️Matthew Sigel:
List of Bitcoin corrections in the run-up to $20k in 2017:
-41%
-38%
-29%
-34%
-41%
-40%
-27%
List of Bitcoin corrections in the run-up to $69k in 2021:
-21%
-17%
-31%
-26%
-55% (!!)
-25%
➡️BlackRock adds its own Bitcoin ETF into its $150 BILLION model-portfolio universe - Bloomberg While Bitcoin is facing short-term pressure from economic fears as weak-ass paper hands are folding, long-term institutional adoption keeps rising.
On the 1st of March:
➡️ Bitcoin dominance back above 61%.
➡️'Bitcoin mining/energy convergence spotted. Petrobras (Brazil) just started mining Bitcoin using flare gas (reduces methane emissions) They join oil companies already mining Bitcoin: Tecpetrol, YPF, Plus Petrol (Argentina), Gazpromneft (Russia), ExxonMobil & ConocoPhillips (US).' - Daniel Batten
On the 2nd of March:
➡️President Trump has officially announced the US Strategic Crypto Reserve and Bitcoin is back above $94,000. In just 3 hours, crypto markets have now added over +$300 BILLION in market cap on the news.
And you can't make this shit up. I couldn't agree more with Peter Schiff: "Bitcoin is digital gold, which is better than analog gold. So let's create a Bitcoin reserve...", "But what's the rationale for an XRP reserve? Why the hell would we need that?"
Trump pumped and dumped a meme coin on the eve of his presidency. Of course, he wants shitcoins, XRP, SOL, and ADA, in the strategic reserve. This is basically all of our journeys from Bitcoin to shitcoins, back to Bitcoin, but on a national scale.
Even Brian Armstrong, CEO of the biggest shitcoin casino in the world, Coinbase, thinks the Reserve should be Bitcoin only.
Luke Broyles:
'My prediction: 1) Trump makes crypto reserve. 2) Reserve pumps all assets. 3) Retail and some companies get burnt in said pump. 4) Public outcry to crypto reserve along with other critiques of the Trump administration. 5) Crypto reserve is dumped in the next bear market. Massive downwards narrative catalyst. Back to no Bitcoin. 6) The government figures out the importance of Bitcoin PoW and goes BTC only soon afterward. 7) Other nations follow suit over years'
Seems legit. Please read the following post by Parker Lewis:
https://x.com/parkeralewis/status/1895550178184110217
“Bitcoin is the first form of money to ever exist that is also a currency.”
It is both a protocol and network, as the currency is embedded within the code, and validated by the network.
On the 3rd of March:
➡️Metaplanet has acquired 156 BTC for ~$13.4 million at ~$85,890 per bitcoin and has achieved a BTC Yield of 31.8% YTD 2025. As of 3/3/2025, we hold 2391 Bitcoin acquired for ~$196.3 million at ~82,100 per Bitcoin.
➡️Fidelity has bought $142.08 million Bitcoin for its ETF.
➡️Vietnam's Prime Minister has directed the Central Bank and Finance Ministry to draft a Digital Assets Framework by March.
➡️BlackRock’s model advisor team releases new Bitcoin report Key takeaways from “Why Bitcoin? A Perspective from Model Portfolio Builders”: • Bitcoin as a novel store of value and global monetary alternative • Hedge against USD hegemony and political instability • A play on the shift from offline to online commerce • Boosted by boomer-to-millennial wealth transfer • Potential for diversification and unique risk premia in portfolios • Intrinsic value expected to be increasingly recognized worldwide • Relevance grows in a debt-laden, digital-first, AI-entrenched world
➡️Meanwhile Ray Dalio tells Bloomberg that Bitcoin could be "a big part" of the restructuring of the global debt-based monetary system. Gold and Bitcoin are "store holds of wealth".
💸Traditional Finance / Macro:
On the 26th of February:
👉🏽Nvidia stock soars after posting record quarterly revenue of $39.3 billion, above expectations of $38.0 billion.
🏦Banks:
👉🏽 no news
🌎Macro/Geopolitics:
On the 24th of February:
👉🏽'US CPI inflation is on track to hit 4.6% over the next 6 months, according to Bank of America. CPI inflation has averaged +0.4% on a month-over-month basis over the last 3 months. If this trend continues, this puts year-over-year inflation on pace to hit 4.6% by July, the highest since April 2023. That would be more than DOUBLE the Fed’s 2% inflation target. Even if monthly inflation prints ease to 0.3%, year-over-year inflation would still rise to 3.8%. Inflation is accelerating.' - TKL
On the 25th of February:
👉🏽After the ECB's massive losses, now Germany’s Central Bank. The Bundesbank reports a €19.2 billion loss for 2024—the first loss since 1979 and the largest in its history. It's not a good time for Central Bankers. Accountability anyone? 'This loss is primarily attributed to the sharp increase in interest rates initiated by the ECB since the summer of 2022 to combat high inflation. This led to higher interest expenses for the Bundesbank, as it had to pay more on deposits held by commercial banks.
In 2023, the Bundesbank offset a loss of €21.6 billion by fully releasing its provision for general risk and drawing from other reserves. However, by the end of 2024, only €0.7 billion in reserves remained available, insufficient to cover the year's losses. This resulted in an accumulated loss of €19.2 billion, which will be carried forward to 2025.' - Wyatt J. Prescott
👉🏽 A typical politician, says one thing to get elected and does another, no wonder people are losing trust in the system. Leader of the CDU Friedrich Merz just completely went back on what was said during the election and announced that there will be NO TALK of shutting the borders to those without valid documentation.
"I want to say it very clearly again. None of us will talk about border closures, no one, although this was claimed at times during the election campaign, none of us want to close the borders"
Grok has fact-checked this. Merz DID say this during the election and has now reneged on it only ONE DAY after the election.
👉🏽'G-7 Debt/GDP forecast, we are entering a new era, it would be really naive to assume positive real interest rates as we go forward. Position your long-term investments and wealth protection accordingly.' -Michael A. Arouet
On the 26th of February:
👉🏽'Germany, where consumer sentiment has worsened again due to the weak labor market figures. The GfK Consumer Confidence Index dropped from -22.6 to -24.7, its lowest level since Apr 2024. Economists polled by Bloomberg had predicted an improvement to -21.6. This adds more pressure on the CDU/CSU and SPD to form a govt quickly and restore confidence in the economy.' - Holger Zschaepitz
👉🏽The US government spent $710 billion in the first month of the Trump presidency, up from $630 billion in the same period a year ago - Analysis
Funny how inflation works innit? And you still believe the 2% or 3% CPI?
On the 27th of February:
👉🏽U.S. Credit Card Defaults soared to $46 Billion, the most since the aftermath of the Global Financial Crisis.
On the 28th of February:
👉🏽Treasury Secretary Scott Bessent was just questioned if we're in a recession. "We're seeing the hangover from the excess spending in the Biden 4 years. In 6 to 12 months, it becomes Trump's economy." Translation: They want the market to crash soon.
Great quote on this topic: 'It would be in their best interest to let it crash. If they implement QE, we will see massive inflation. It's better to get it out prior to the midterms and then implement QE and buy the midterms. At least that's what I would do.
On the 1st of March:
👉🏽The White House announces that President Trump will host and speak at the first-ever White House Crypto Summit on March 7. The event will bring together top crypto founders, CEOs, investors, and members of the President’s Working Group on Digital Assets.
European victory plan: 1) Destroy gas supplies coming from Russia 2) Destroy the relationship with Russia 3) Make yourself dependent on US gas supplies 4) Destroy the relationship with the USA 5) Give all your money to Ukraine 6) … 7) Victory
👉🏽CarlBMenger: US national debt:
Feb 28, 2025: $36.5 trillion
Feb 28, 2024: $34.3 trillion
Feb 28, 2023: $31.6 trillion
Nothing is going to stop this train.
“National debt is immoral and destructive, silently undermining the basis of the state; it delivers the present generation to the execration of posterity.” - Napoleon
👉🏽Italy’s government has approved a law to restart nuclear power, nearly 4 decades after a 1987 referendum shut it down.
PM Meloni: "The government has approved another important measure to ensure clean, safe, low-cost energy that can guarantee energy security and strategic independence." If nuclear reaches 11% of the energy mix, Italy could save €17 billion in decarbonization costs by 2050. Source: Reuters
👉🏽Gold funds see record weekly inflows. Investors poured a staggering $4.7 billion into gold funds this week, marking an all-time high.
On the 2nd of March:
👉🏽For the Dutch / EU readers amongst my followers: 'This chart always shocks me when I see it. Major European countries have unfunded pension obligations of 400 to 500% of GDP. Combined with collapsing demographics it’s a recipe for disaster. Who is supposed to pay for these pensions? - Michael A. Aouret
Got Bitcoin?
👉🏽'How bad has the US debt crisis become? US net interest payments as a percentage of federal revenue reached a whopping 18.7% in January, the highest since the 1990s. This is just 20 basis points below the all-time high of 18.9% posted in 1992. Furthermore, this share has DOUBLED in just 18 months as interest costs have skyrocketed. Interest expense hit a record $1.2 trillion over the last 12 months and is the second-largest government outlay after Social Security.
The worst part? Net interest costs as a percentage of federal revenues are estimated to reach 34% by 2054, assuming there will be no recession over this period.' - TKL
👉🏽ARGENTINA'S ECONOMY SURGES—MILEI'S POLICIES DRIVE 7.1% GDP GROWTH PROJECTION
GDP is expected to grow 7.1% interannually in Q2 2025. After a tough 2024, Milei’s austerity measures and economic freedom reforms are restoring confidence—just in time for the 2025 electoral cycle. Milei’s bold strategy is proving to be the right call.
Source: Ramiro Castiñeira
👉🏽French President Emmanuel Macron today urged EU member states to agree on "massive, common funding" (ERGO: lending) to unlock investments of hundreds of billions of euros for European defense and security. Source: Politico Jippieee more debt, and who the F will be paying for all that?
On the 3rd of February:
👉🏽Dutch inflation rose to 3,8% in February.
👉🏽Gold prices surge back above $2,900 as volatility rises and geopolitical tensions escalate.
🎁If you have made it this far I would like to give you a little gift:
What’s Driving Bitcoin Adoption in 2025?
Trust in Bitcoin has grown faster than that of any asset in history. While bitcoin is a form of money, its rate of growth mirrors that of the internet. River's new report is a deep dive into Bitcoin adoption. In this report: - Why this bull market is different - The current state of the Bitcoin protocol, network, and monetary system - Deep dives on institutional, business, & nation-state adoption - A fresh look at Lightning Network's growth - Why Bitcoin adoption is still very early
You can find the report here: https://blog.river.com/bitcoin-adoption-2025/
Credit: I have used multiple sources!
My savings account: Bitcoin The tool I recommend for setting up a Bitcoin savings plan: PocketBitcoin especially suited for beginners or people who want to invest in Bitcoin with an automated investment plan once a week or monthly.
Use the code SE3997
Get your Bitcoin out of exchanges. Save them on a hardware wallet, run your own node...be your own bank. Not your keys, not your coins. It's that simple. ⠀⠀⠀⠀ ⠀ ⠀⠀⠀
Do you think this post is helpful to you? If so, please share it and support my work with a zap.
▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃
⭐ Many thanks⭐
Felipe - Bitcoin Friday!
▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃
-
@ 862fda7e:02a8268b
2024-06-29 08:18:20I am someone who thinks independently without abiding to a group to pre-formulate my opinions for me. I do not hold my opinions out of impulse, out of the desire to please, nor out of mindless apadtion to what others abide to. My opinions are held on what I belive is the most logical while being the most ethical and empathetic. We live in a world with a nervous systems and emotions for animals and humans (same thing) alike, thus, we should also consider those feelings. That is not the case in our world.
Cyclists are one of the most homosexual GAY ANNOYING people to exist on EARTH
I hate cyclists with a burning passion. These faggots are the GAYEST MOST ANNOYING retards to exist. They wear the tightest fitting clothing possible to show off their flaccid cocks to each other and to anybody around them.
And if that weren't enough, they present their ass up in the air, begging to be fucked by their cyclist buddies, as they ride their bike in the middle of the road. It's homosexual.
Look at the seat they ride on, it looks like a black cock about to go up their ass. Don't get me started on their gay helmets, the "aerodynamic" helmets they wear. YOU FAGGOTS AREN'T IN THE TOUR DE FRANCE, YOU'RE IN FRONT OF MY CAR IN AN INTERSECTION IN A MINNESOTA TOWN WITH A POPULATION OF 5,000. They LIKE the look of the costume. And that's just what it is - a costume. You're required to have a "look" as a cyclist - you aren't really a cyclist if you don't spend hundreds of dollars on the gay gear. God forbid you just get a bike and ride it around on a trail like anyone else. These people LIKE to be seen. They WANT to be seen as cool, which is why they ride right in front of my fucking car at 15mph in a 45mph zone. I swear, every time I pass one of these cyclists, I am this close to yelling "FAGGOT" out the window at them. The only reason I haven't is because they like to record everything on their gay bikes and upload it to Youtube, so then I'd have to deal with you people knowing where I live just because I called some fruit on a bike a faggot. Think I'm exaggerating? Think again. These homos have an entire community built on "catching" drivers who dare drive too close or blow their exhaust at the poor little faggy cyclist. There's Youtube channels dedicated to this. Part of their culture is being a victim by cars. Almost like it's dangerous to be in the middle of the road going 15mph on a 45mph road. Oh but I'm sure cars almost hitting you is surely a personal attack and nothing to do with the fact that what you're doing is DANGEROUS YOU RETARD.
I've seen these "share the road" signs in the most insane and dangerous places. I've seen them on HIGHWAYS, yes, HIGHWAYS, where the cyclist would BARELY have any room next to the car. It's insanely dangerous and I guess to some people, the constant threat of dying is fun... until it actually happens. I will never understand the mind of a cyclist. You are not in the fricken' Tour de France. You look like a homosexual that's inconveniencing HEAVY METAL HIGH POWERED CARS RIGHT BEHIND YOU. It's incredibly dangerous, and you can't rely on the very heavy, high powered cars and the people driving them to honor your life. Road rage is real, you might be the tipping point for some angry old boomer in his Ram to RAM INTO YOU and kill you. God I hate cyclists, their gay look, their cocky "better than you" attitude. Hey fudge stripe, in a battle between my CAR and your soft body, my CAR WILL WIN. Get off the road and go suck some cocks instead. Stop riding the bikes and go ride cocks instead, you homo.
-
@ 862fda7e:02a8268b
2024-06-29 08:16:47Pictured above is a female body that looks incredibly similar to mine. So similar that it could be mine if I didn't have a c-section scar. Actually her boobs are a bit bigger than mine, but mine do look like that when they swell.
Nudity should be normalized
I don't understand why people get offended or sensitive over the human body. Especially the female human chest. We all have nipples, we all know what they look like, so I don't understand why a female being topless is unacceptable, whereas a male topless is normal. I've seen shirtless men with more shapely, larger breasts than mine. Personally, I have stopped caring if other people see the shape of my breasts or my nipples if they were to be poking in the freezer section of the grocery store. I stopped wearing bras years ago. I often times want to be topless outside in my yard because it feels good and natural. I like the sun on my skin, and I especially love the rain on my skin. It's very unfortunate that our natural human body is massively shamed, by who I believe, is the reptilians (for a number of reasons). Logically, it makes no sense to be outraged by the female human chest. We all know what nipples look like, we all have them, I truly believe women should be allowed to be topless like men are. If it's hot out and you're doing yard work - pop your top off, who cares?
I understand that males and some females sexualize the human chest. However, that is not my problem. That is none of my concern what others think about my body. I should be allowed to wear my human body as it is just like anyone else should be. What I can't wrap my mind around is why people are shocked or offended by the human body, since we ALL know what these parts look like and we all have them. I understand in certain scenarios being topless or nude would likely be inapproriate, or that perverts would use it as a way to expose themselves to children. In an ideal world, we could live like tribes where the human body is normal, it's not overtly sexual. This is why we're so offended over the human body - it's constantly concealed, so the moment we get to see a female chest, it's suddenly sexual because it's normally tabboo to be seen. I wish I could be shirtless outside, I envy males who get to truly feel the wind, the earth on their backs and their chest. Female and male nipples look the same, I don't understand why it should be illegal for me to experience nature in my natural state.
Anyways, I highly dislike the "nudist" people because it is NOT about accepting the human body in its natural state. It's completely co-opted by pedophiles who want to expose themselves to childen or for children to expose themselves to others for sexual gratification. There are nudist resorts pedophile parents force their children to go to (as a child you have no personal autonomy and are completely a slave to your parents - trust me, I know this because I couldn't LEGALLY decide which parent I wanted to live with up until I was 18 years old. If your parent wants you to do something, a child in the US has no legal say over that, so if your parent wants to go to a nudist resort, you must go). A human body should simply be a human body, it's unfortunate that being unclothed immediately brings on sexualization. This is mostly an issue because clothes is the expected default. The more tabboo something is, the more naughty the thing is.
I am not a nudist. However, I do believe that at the very least, females should have the right to be topless in similar settings as males are allowed to. I don't think a woman is a slut if she's in her natural state, in her human body, and proceeds life as normal. How one acts portrays slutty behavior. Living your life in your natural human body should be a right without caviots. I feel detached from people who constantly see the human body as flawed (e.g. circumcision industry, body hair removal industry, clothing industry). These industries are harmful for the victims in them (infant boys, and modern day slaves in sweatshops), and the main motivating factor is money among all these industries.
-
@ 878dff7c:037d18bc
2025-03-04 21:16:44Cyclone Alfred Threatens Southeast Queensland and Northern NSW
### Summary:
Tropical Cyclone Alfred has intensified to a Category 2 storm and is projected to make landfall between late Thursday and early Friday near Brisbane, bringing severe weather conditions to Southeast Queensland and Northern New South Wales. Authorities have issued warnings for heavy rainfall, damaging winds up to 150 km/h, and potential life-threatening flash flooding. Coastal regions are particularly at risk for significant erosion and storm surges, with waves expected to reach up to 10 meters. Residents in low-lying and vulnerable areas are advised to evacuate if instructed and to prepare for possible power outages and service disruptions. Emergency services are on high alert, and preparations are underway to mitigate the cyclone's impact.
Sources: The Guardian - 5 March 2025, Courier Mail - 5 March 2025, News.com.au - 5 March 2025, The Australian - 5 March 2025
Coalition's Proposal to End Remote Work for Public Servants Faces Legal Challenges
Summary:
Opposition Leader Peter Dutton's plan to mandate a full-time return to office for federal public servants encounters significant obstacles. Legal experts suggest that enforcing such a mandate could breach workplace and discrimination laws, especially given existing agreements allowing remote work until 2027. The Community and Public Sector Union and other stakeholders are poised to challenge any unilateral changes. While some argue that remote work decreases productivity, studies indicate that hybrid models can enhance efficiency and employee satisfaction. The debate continues amid broader discussions on workplace flexibility and its implications for productivity. Sources: The Australian - 5 March 2025, News.com.au - 5 March 2025
Australia's GDP Predicted to Surpass RBA's Forecasts
Summary:
Despite recording its largest current account deficit since 2016, Australia has experienced a surge in net exports, driven by temporary tariff agreements with India and stronger commodity prices. This growth has led NAB to revise its December quarter GDP forecast upwards to 0.7%, projecting a 1.4% year-on-year growth, surpassing the RBA's forecast of 1.1%.
Sources: News.com.au - 5th March 2025, Yahoo Finance - 5th March 2025
Legal Action Initiated Over Lack of Recovery Plans for Endangered Species
Summary:
The Wilderness Society has filed a lawsuit against successive Australian federal environment ministers for failing to create mandatory recovery plans for eleven endangered native species, including the greater glider and ghost bat. These plans are essential for outlining actions to prevent extinction. The lawsuit claims the ministers' inaction is unlawful, as very few recovery plans have been completed on time, contributing to species decline. The case seeks to ensure future compliance with environmental laws to improve conservation efforts.
Sources: The Guardian - 5 March 2025
Largest Whooping Cough Epidemic Since Vaccine Introduction in South Australia
### Summary:
South Australia is experiencing its largest whooping cough (pertussis) epidemic since vaccines were introduced, with 1,018 cases reported so far this year compared to 142 the previous year. Nationally, over 41,000 cases have been reported. This surge highlights a critical public health threat, emphasizing the importance of booster shots, especially as one in four adolescents turning 13 in 2023 missed their booster. Sources: The Advertiser - 5 March 2025
Australian Navy and Air Force Monitor Chinese Vessels Off Western Coast
Summary:
On March 4, 2025, three Chinese naval vessels, potentially including a nuclear submarine, were detected southeast of Perth, Western Australia. The Royal Australian Navy and Air Force are actively monitoring the flotilla to ensure compliance with international law and to understand their mission. This surveillance involves the frigates HMAS Warramunga and HMAS Stuart, along with P-8 Poseidon aircraft. Additionally, U.S. and Australian submarines, accompanied by HMAS Hobart, have departed the HMAS Stirling naval base for scheduled training exercises, unrelated to the Chinese presence. The strategic importance of Western Australia is increasing under the AUKUS agreement, positioning it as a pivotal hub for Australian, U.S., and British nuclear submarines. Western Australia Premier Roger Cook emphasized the region's geopolitical sensitivity and the necessity for experienced leadership to navigate these challenges.
Sources: The Australian - March 5, 2025
Australia Considers Deploying Peacekeeping Troops to Ukraine Amid U.S. Aid Suspension
Summary:
Australian Prime Minister Anthony Albanese announced that the government is open to considering the deployment of Australian troops as part of a British-led peacekeeping force in Ukraine. This development follows U.S. President Donald Trump's decision to suspend military aid to Ukraine, pressuring President Volodymyr Zelensky to seek a peace settlement with Russia. Australia has already contributed $1.5 billion in aid to Ukraine, primarily in military assistance. While no formal request has been made, Albanese emphasized Australia's support for Ukraine's sovereignty and indicated readiness to assist. Opposition Leader Peter Dutton opposes deploying Australian troops, suggesting that European nations should assume this responsibility. National security experts have raised concerns about the potential impact on Australia's defense capabilities.
Sources: The Australian - March 5, 2025, The Guardian - March 5, 2025, News.com.au - March 5, 2025
Quantum Computing: Tech Giants Announce New Prototypes Amid Skepticism
### Summary:
Major tech companies, including Google, Amazon, and Microsoft, have unveiled new quantum computing prototypes. Amazon's Ocelot chip reportedly advances error correction and scalability, while Microsoft's Majorana 1 and Google's Willow chips are also highlighted as significant developments. However, experts caution that practical, commercially viable quantum computers may still be a decade or more away due to ongoing challenges like scalability and error correction.
Sources: Business Insider - March 5, 2025
Health Advisory Issued Following Salmon Deaths in Tasmania
### Summary: Biosecurity Tasmania confirmed that the bacterium Piscirickettsia salmonis caused a mass mortality event among farmed salmon, posing no threat to native marine species. However, the Department of Health advises against contact with dead fish and discourages swimming in affected areas. Beaches at Verona Sands and Bruny Island have seen salmon remains wash ashore, prompting cleanup efforts and raising environmental concerns among locals. Sources: Herald Sun - 5th March 2025, News.com.au - 5th March 2025
US Halts Military Aid to Ukraine Amid Peace Negotiations
Summary:
The United States has suspended military aid to Ukraine as President Donald Trump seeks to negotiate a peace settlement with Russia. This decision has led to increased tensions between the US and Ukrainian President Volodymyr Zelensky. The suspension aims to pressure Ukraine into seeking peace, with the US emphasizing the need for partner countries to share this objective. This development has significant implications for international relations and the ongoing conflict in Ukraine.
Sources: The Australian - 5 March 2025
-
@ 39cc53c9:27168656
2024-06-15 08:28:09“The future is there... staring back at us. Trying to make sense of the fiction we will have become.” — William Gibson.
This month is the 4th anniversary of kycnot.me. Thank you for being here.
Fifteen years ago, Satoshi Nakamoto introduced Bitcoin, a peer-to-peer electronic cash system: a decentralized currency free from government and institutional control. Nakamoto's whitepaper showed a vision for a financial system based on trustless transactions, secured by cryptography. Some time forward and KYC (Know Your Customer), AML (Anti-Money Laundering), and CTF (Counter-Terrorism Financing) regulations started to come into play.
What a paradox: to engage with a system designed for decentralization, privacy, and independence, we are forced to give away our personal details. Using Bitcoin in the economy requires revealing your identity, not just to the party you interact with, but also to third parties who must track and report the interaction. You are forced to give sensitive data to entities you don't, can't, and shouldn't trust. Information can never be kept 100% safe; there's always a risk. Information is power, who knows about you has control over you.
Information asymmetry creates imbalances of power. When entities have detailed knowledge about individuals, they can manipulate, influence, or exploit this information to their advantage. The accumulation of personal data by corporations and governments enables extensive surveillances.
Such practices, moreover, exclude individuals from traditional economic systems if their documentation doesn't meet arbitrary standards, reinforcing a dystopian divide. Small businesses are similarly burdened by the costs of implementing these regulations, hindering free market competition^1:
How will they keep this information safe? Why do they need my identity? Why do they force businesses to enforce such regulations? It's always for your safety, to protect you from the "bad". Your life is perpetually in danger: terrorists, money launderers, villains... so the government steps in to save us.
‟Hush now, baby, baby, don't you cry Mamma's gonna make all of your nightmares come true Mamma's gonna put all of her fears into you Mamma's gonna keep you right here, under her wing She won't let you fly, but she might let you sing Mamma's gonna keep baby cosy and warm” — Mother, Pink Floyd
We must resist any attack on our privacy and freedom. To do this, we must collaborate.
If you have a service, refuse to ask for KYC; find a way. Accept cryptocurrencies like Bitcoin and Monero. Commit to circular economies. Remove the need to go through the FIAT system. People need fiat money to use most services, but we can change that.
If you're a user, donate to and prefer using services that accept such currencies. Encourage your friends to accept cryptocurrencies as well. Boycott FIAT system to the greatest extent you possibly can.
This may sound utopian, but it can be achieved. This movement can't be stopped. Go kick the hornet's nest.
“We must defend our own privacy if we expect to have any. We must come together and create systems which allow anonymous transactions to take place. People have been defending their own privacy for centuries with whispers, darkness, envelopes, closed doors, secret handshakes, and couriers. The technologies of the past did not allow for strong privacy, but electronic technologies do.” — Eric Hughes, A Cypherpunk's Manifesto
The anniversary
Four years ago, I began exploring ways to use crypto without KYC. I bookmarked a few favorite services and thought sharing them to the world might be useful. That was the first version of kycnot.me — a simple list of about 15 services. Since then, I've added services, rewritten it three times, and improved it to what it is now.
kycnot.me has remained 100% independent and 100% open source^2 all these years. I've received offers to buy the site, all of which I have declined and will continue to decline. It has been DDoS attacked many times, but we made it through. I have also rewritten the whole site almost once per year (three times in four years).
The code and scoring algorithm are open source (contributions are welcome) and I can't arbitrarly change a service's score without adding or removing attributes, making any arbitrary alterations obvious if they were fake. You can even see the score summary for any service's score.
I'm a one-person team, dedicating my free time to this project. I hope to keep doing so for many more years. Again, thank you for being part of this.
-
@ 44dc1c2d:31c74f0b
2024-06-13 06:25:20Chef's notes
I really like serving this with a saffron and cardamon rice. Add a few saffron threads and 3 or 4 crushed green cardamon pods while the rice is cooking to make it.
Details
- ⏲️ Prep time: ~15 min
- 🍳 Cook time: ~1.5 hours
- 🍽️ Servings: 6
Ingredients
- .5 cups neutral frying oil or ghee
- 2 onions halved and thinly sliced
- ~1 inch piece ginger root cut into thin batons
- 1 garlic clove crushed
- 2 fresh red chilies seeded and minced
- 1 inch piece fresh turmeric crushed or 1 tsp ground turmeric
- 1 lemongrass stalk lower part sliced thin and the top bruised
- 1.5 lbs steak cut into strips
- 14oz coconut milk
- 1 1/4 cups water
- 1 aubergine (eggplant) sliced and patted dry
- 1 tsp tamarind pulp, soaked in ~4 tbsp warm water
- salt and pepper to taste
- Garnish:
- Deep fried onions
- More fresh chilis
- Serve :
- Rice
Directions
- Heat half your oil in a wok or large pan. Fry onions, ginger and garlic tell fragrant. Add chilies, turmeric and the lower parts of the lemongrass stalk. Push the contents to the side, crank the heat and add the steak. Stirring tell the meat is browned a bit.
- Add the coconut milk, water and lemongrass top. Hit it with some salt and pepper. Cover and let simmer for about an hour and a half. You want the meat to be tender.
- Towards the end of the cook time, use the rest of the oil to fry the aubergines. Brown on both sides.
- Add the browned aubergines cook for another 15 minutes or so. Stir gently every so often. Strain the tamarind juice and add it to the curry. Taste and adjust seasoning.
- Garnish with more Chilies and serve with rice.
-
@ c8ab3c20:4bb40a9d
2024-06-12 14:41:38Introduction
Cet article fait écho à mon article sur les flux RSS, qui est la méthode à utiliser pour s'abonner à mon blog, mais qui permet bien plus. Ici, je vais vous présenter différents agrégateurs RSS, les logiciels, applications ou extensions qui vous permettent de regrouper vos différents flux et de les organiser comme bon vous semble.
Je me limite à des solutions open source car elles sont, à mon avis, suffisamment qualitatives pour être privilégiées à des offres propriétaires dans un large panel d'usage. Je vais essayer de couvrir un large éventail de plateformes afin que vous trouviez un agrégateur qui puisse répondre à vos besoins.
Mobile (Android, iOS et iPadOS)
Twine
Twine est un lecteur RSS (et Atom) très récent au design soigné. Disponible pour mobile, il est publié en open source sous licence Apache 2.0 sur le Play Store, l'App Store ou GitHub (Android uniquement). Il permet de détecter automatiquement si un site a un flux RSS et de l'importer sans avoir à chercher le lien du flux en question, mais uniquement avec l'URL du site. Malheureusement, il n'est pas disponible en français pour le moment, mais vous ne devriez pas avoir trop de mal à l'utiliser. Il ne possède pas non plus de thème clair. C'est une option déjà riche en fonctionnalités, comme la recherche, l'épinglage ou l'import/export via OPML.
Fluent Reader Lite
Fluent Reader est un agrégateur open source et multi-plateforme. La version Lite est destinée aux appareils mobiles iOS ou Android et est publiée sous licence BSD 3-Clause. Vous pouvez l'acheter à petit prix sur l'App Store ou le Play Store, ou gratuitement depuis TestFlight ou GitHub. L'application mobile n'est pas autant complète que la version pour ordinateur et nécessite un service RSS en cloud (des solutions plus bas).
Android uniquement
Feeder
Feeder est un lecteur de flux (RSS, Atom, JSONFeed) open source sous licence GPLv3, disponible uniquement sur Android depuis une décennie déjà. Encore mis à jour régulièrement à l'heure où j'écris ces lignes, vous pouvez vous procurer l'application sur le Play Store, F-Droid ou GitHub. Feeder possède un thème sombre ou clair selon vos préférences, il supporte la langue française ainsi que les notifications et les imports/exports via OPML. Le design suit les lignes de MaterialYou (MD3) de Google et fait donc moderne, épuré et cohérent avec un Android 12 ou plus récent. Il s'agit de ma solution principale actuelle.
ReadYou
ReadYou est un lecteur de flux RSS open source sous licence GPLv3, disponible uniquement sur Android depuis deux ans maintenant. L'application est disponible en français et sur F-Droid, GitHub ou Telegram. Son design est très épuré et aligné à MaterialYou (MD3). Un peu moins complet, c'est un super agrégateur plutôt minimaliste.
Thud
Thud est un lecteur RSS minimaliste open source sous licence AGPLv3, inspiré par Pulse News qui fut racheté par LinkedIn et ruiné (étonnant). Disponible sur Android via le Play Store, F-Droid et GitHub, mais avec la possibilité de compiler une version iOS. Il possède un thème sombre et clair selon vos préférences et les fonctionnalités de base que l'on attend d'un agrégateur RSS.
Apple : iOS,iPadOS et macOS uniquement
NetNewsWire
NetNewsWire est l'agrégateur (RSS, Atom, JSONFeed et RSS-in-JSON) de référence pour les appareils d'Apple depuis plusieurs années. C'est une application open source publiée sous licence MIT. Elle est écrite en Swift et est donc native aux appareils de la marque à la pomme et disponible sur l'App Store ou, pour la version macOS, sur leur site web. Elle est très complète et a toutes les fonctionnalités dont vous avez besoin.
Desktop
Fluent Reader
Fluent Reader est un agrégateur open source et multi-plateforme. Cette version est pour ordinateur (Windows, macOS ou GNU/Linux) mais possède un client mobile nommé Fluent Reader Lite présenté plus haut. Comme la version mobile, cette variante est publiée en open source sous licence BSD 3-Clause. Elle est complète et suit les règles de design du Fluent Design (d'où son nom) de Microsoft introduit avec Windows 11 et s'intègre donc très bien avec ce dernier. Vous pouvez la télécharger sur le Microsoft Store, le Mac App Store ou GitHub
News Flash (GNU/Linux uniquement)
News Flash est une application complète au design moderne (GNOME Circle) se voulant comme le successeur spirituel de FeedReader, mais attention, il ne s'agit pas d'un fork. Vous pouvez la télécharger depuis FlatHub. Les paquets Alpin, Arch, Nix ou Snap ne sont plus supportés et donc pas à jour !
Extension Firefox
Brief
Brief est une extension open source lecteur RSS (et Atom) pour Firefox, distribuée sous licence MPL 2.0. Assez simple et intuitive à utiliser, elle a toutes les fonctionnalités de base que vous attendez d'un agrégateur de flux. Vous pouvez la télécharger sur le catalogue Firefox Browser Add-ons de Mozilla.
Cloud
Certaines personnes apprécient avoir leurs flux qui se synchronisent entre plusieurs appareils, et pour cela, le plus efficace reste une solution en ligne. La majorité sont propriétaires et freemium, mais vous pouvez très souvent les utiliser avec des agrégateurs open source comme ceux cités plus haut. Ceux-ci sont open source :
NewsBlur
NewsBlur est la référence de gestionnaire de flux RSS open source en cloud, leur code est publié sous licence MIT. Le service existe depuis plus d'une décennie et est supporté par beaucoup de clients présentés plus haut. Ils ont leur propre client web, Android et iOS que vous pouvez aussi installer. Vous pouvez utiliser gratuitement NewsBlur jusqu'à 64 sites ; au-delà, un abonnement annuel est nécessaire.
Feedbin
Feedbin est une autre solution en cloud plus récente et avec une interface plus moderne, mais compatible avec moins de clients. Vous trouverez des agrégateurs compatibles sur leur site. Le service coûte 5 $ par mois avec 30 jours d'essai offert afin de vous forger votre avis. Mais étant open source et sous licence MIT, vous pouvez héberger vous-même Feedbin ; malheureusement, pour des raisons techniques, il est plutôt conseillé de ne pas le faire pour le moment. Prenez plutôt une des solutions présentées juste après.
Auto-hébergé (selfhosted)
FreshRSS
FreshRSS est la référence, étant rapide, léger et puissant (fonctionnalités très complètes). Il est open source depuis une décennie déjà sous licence AGPLv3 bref la solution a privilégier si vous souhaitez héberger ce service chez vous ou sur votre VPS !
Fusion
Fusion est un agrégateur léger sous licence MIT à héberger soit même. Il est complet et son interface web est super moderne, cependant c'est une solution très récente et donc avec un avenir incertain mais vous pourriez être tenté de l'essayer ou même d'y contribuer.
Conclusion
Il existe de nombreux agrégateurs ou lecteurs RSS open source ; je n'ai présenté que ceux que je trouvais suffisamment qualitatifs pour remplacer des solutions propriétaires. Mais je suis curieux de savoir lesquels vous utilisez et quels sont les fonctionnalités que vous utilisez le plus. Que ce soit des solutions propriétaires ou open source, l'utilisation d'un agrégateur de flux permet de mieux se recentrer sur les informations qui nous intéressent de façon personnalisée et d'éviter d'être submergé par des dizaines de canaux différents. N'oubliez pas d'ajouter le flux RSS de mon blog dans votre client !
-
@ 39cc53c9:27168656
2024-06-10 14:28:46kycnot.me features a somewhat hidden tool that some users may not be aware of. Every month, an automated job crawls every listed service's Terms of Service (ToS) and FAQ pages and conducts an AI-driven analysis, generating a comprehensive overview that highlights key points related to KYC and user privacy.
Here's an example: Changenow's Tos Review
Why?
ToS pages typically contain a lot of complicated text. Since the first versions of kycnot.me, I have tried to provide users a comprehensive overview of what can be found in such documents. This automated method keeps the information up-to-date every month, which was one of the main challenges with manual updates.
A significant part of the time I invest in investigating a service for kycnot.me involves reading the ToS and looking for any clauses that might indicate aggressive KYC practices or privacy concerns. For the past four years, I performed this task manually. However, with advancements in language models, this process can now be somewhat automated. I still manually review the ToS for a quick check and regularly verify the AI’s findings. However, over the past three months, this automated method has proven to be quite reliable.
Having a quick ToS overview section allows users to avoid reading the entire ToS page. Instead, you can quickly read the important points that are grouped, summarized, and referenced, making it easier and faster to understand the key information.
Limitations
This method has a key limitation: JS-generated pages. For this reason, I was using Playwright in my crawler implementation. I plan to make a release addressing this issue in the future. There are also sites that don't have ToS/FAQ pages, but these sites already include a warning in that section.
Another issue is false positives. Although not very common, sometimes the AI might incorrectly interpret something harmless as harmful. Such errors become apparent upon reading; it's clear when something marked as bad should not be categorized as such. I manually review these cases regularly, checking for anything that seems off and then removing any inaccuracies.
Overall, the automation provides great results.
How?
There have been several iterations of this tool. Initially, I started with GPT-3.5, but the results were not good in any way. It made up many things, and important thigs were lost on large ToS pages. I then switched to GPT-4 Turbo, but it was expensive. Eventually, I settled on Claude 3 Sonnet, which provides a quality compromise between GPT-3.5 and GPT-4 Turbo at a more reasonable price, while allowing a generous 200K token context window.
I designed a prompt, which is open source^1, that has been tweaked many times and will surely be adjusted further in the future.
For the ToS scraping part, I initially wrote a scraper API using Playwright^2, but I replaced it with Jina AI Reader^3, which works quite well and is designed for this task.
Non-conflictive ToS
All services have a dropdown in the ToS section called "Non-conflictive ToS Reviews." These are the reviews that the AI flagged as not needing a user warning. I still provide these because I think they may be interesting to read.
Feedback and contributing
You can give me feedback on this tool, or share any inaccuraties by either opening an issue on Codeberg^4 or by contacting me ^5.
You can contribute with pull requests, which are always welcome, or you can support this project with any of the listed ways.
-
@ 3c984938:2ec11289
2024-06-09 14:40:55I'm having some pain in my heart about the U.S. elections.
Ever since Obama campaigned for office, an increase of young voters have come out of the woodwork. Things have not improved. They've actively told you that "your vote matters." I believe this to be a lie unless any citizen can demand at the gate, at the White House to be allowed to hold and point a gun to the president's head. (Relax, this is a hyperbole)
Why so dramatic? Well, what does the president do? Sign bills, commands the military, nominates new Fed chairman, ambassadors, supreme judges and senior officials all while traveling in luxury planes and living in a white palace for four years.
They promised Every TIME to protect citizen rights when they take the oath and office.
...They've broken this several times, with so-called "emergency-crisis"
The purpose of a president, today, it seems is to basically hire armed thugs to keep the citizens in check and make sure you "voluntarily continue to be a slave," to the system, hence the IRS. The corruption extends from the cop to the judge and even to politicians. The politicians get paid from lobbyists to create bills in congress for the president to sign. There's no right answer when money is involved with politicians. It is the same if you vote Obama, Biden, Trump, or Haley. They will wield the pen to serve themselves to say it will benefit the country.
In the first 100 years of presidency, the government wasn't even a big deal. They didn't even interfere with your life as much as they do today.
^^ You hold the power in your hands, don't let them take it. Don't believe me? Try to get a loan from a bank without a signature. Your signature is as good as gold (if not better) and is an original trademark.
Just Don't Vote. End the Fed. Opt out.
^^ I choose to form my own path, even if it means leaving everything I knew prior. It doesn't have to be a spiritual thing. Some, have called me religious because of this. We're all capable of greatness and having humanity.
✨Don't have a machine heart with a machine mind. Instead, choose to have a heart like the cowardly lion from the "Wizard Of Oz."
There's no such thing as a good president or politicians.
If there was, they would have issued non-interest Federal Reserve Notes. Lincoln and Kennedy tried to do this, they got shot.
There's still a banner of America there, but it's so far gone that I cannot even recognize it. However, I only see a bunch of 🏳🌈 pride flags.
✨Patrick Henry got it wrong, when he delivered his speech, "Give me liberty or give me death." Liberty and freedom are two completely different things.
Straightforward from Merriam-Webster Choose Right or left?
No control, to be 100% without restrictions- free.
✨I disagree with the example sentence given. Because you cannot advocate for human freedom and own slaves, it's contradicting it. Which was common in the founding days.
I can understand many may disagree with me, and you might be thinking, "This time will be different." I, respectfully, disagree, and the proxy wars are proof. Learn the importance of Bitcoin, every Satoshi is a step away from corruption.
✨What does it look like to pull the curtains from the "Wizard of Oz?"
Have you watched the video below, what 30 Trillion dollars in debt looks like visually? Even I was blown away. https://video.nostr.build/d58c5e1afba6d7a905a39407f5e695a4eb4a88ae692817a36ecfa6ca1b62ea15.mp4
I say this with love. Hear my plea?
Normally, I don't write about anything political. It just feels like a losing game. My energy feels it's in better use to learn new things, write and to create. Even a simple blog post as simple as this. Stack SATs, and stay humble.
<3 Onigirl
-
@ c8ab3c20:4bb40a9d
2024-06-08 13:33:15Introduction
Vous ne le saviez peut-être pas, mais il y a deux ans, j'alimentais un blog en ligne dédié à la vie privée. Je conjuguais tout à la première personne du pluriel, comme si j'étais une entreprise ou une entité composée de plusieurs passionnés, alors qu'en réalité, je suis seul derrière mon clavier. J'ai toujours aimé écrire, mais gentiment, mes articles ont cessé de dépasser le stade de brouillon. Je m'étais fixé un standard trop élevé et difficile à tenir avec mon temps libre. Je voulais absolument faire des articles longs, très détaillés et sourcés. Cela me demandait beaucoup de charge mentale pour un retour très discret. Puis, gentiment, les brouillons se sont faits de plus en plus rares, et les articles ont cessé de voir le jour sans trop d'explication. J'ai discrètement délisté mon blog comme s'il n'avait jamais été là. Depuis un petit moment déjà, ça me travaillait, je me suis remis à écrire pour d'autres projets qui peut-être eux aussi resteraient inachevés, au stade de brouillons de pensées. Mais je m'étais remis à écrire, et ça me manquait réellement. Et un jour, j'ai décidé de reprendre mon blog et de l'adapter à ma vision de ce que je voulais transmettre, qui avait bien évoluée en deux ans.
Une refonte de mon blog.
J'ai supprimé mes anciens articles qui étaient tous partiellement périmés, et oui, c'est le gros problème avec ce milieu, mais entre les rachats, les dépôts Git abandonnés, les nouveautés, si je ne suis pas régulier, mes informations seront très vite peu recommandables. Donc, j'ai décidé de m'autoriser à faire des articles plus simples, plus courts. Cela ne veut pas dire que ce sera le cas pour la totalité d'entre eux, et je compte continuer de faire de mon mieux pour partager de l'information de qualité en français. Mais afin d'être plus régulier, ce compromis me semblait nécessaire. Cette refonte m'a amené à changer le nom, je trouvais l'ancien légèrement cringe pour ne pas dire peu inspiré. Le blog se nomme aujourd'hui : "Le blog du petit lunarpunk 🌙". Je trouve ce nom à la fois mignon, oldschool et identitaire.
- J'ai choisi l'adjectif petit pour le côté rassurant et bienveillant. Le terrier de la privacy (confidentialité en anglais) peut-être angoissant, voir terrifiant, je sais de quoi je parle, ayant moi-même développé une légère paranoïa à force de m'aventurer dans ses profondeurs. Mais c'est contre-productif, et je veux réussir à amener une douceur dans l'accompagnement de votre quête pour une meilleure hygiène numérique.
- Le nom lunarpunk est pour balancer et ramener un peu de pragmatisme, car cela reste un terrier angoissant et très sombre. Mais ce personnage du petit lunarpunk que j'incarnerai en tant que Cypher Jack a justement le rôle d'une entité protectrice comme Jack dans le dessin animé Samouraï Jack (oui, oui, mon pseudo est une référence à ce vieux Cartoon Network des années 2000). Pour en apprendre un peu plus sur le concept de lunarpunk, vous pouvez lire la page d'accueil de mon blog.
- Avoir un blog, c'est en soi déjà un peu oldschool, mais avoir un blog dont le nom commence par "Le blog de/du/de la..." c'est encore plus à l'ancienne, et c'était pour représenter le choix simpliste que j'ai fait, je reviens là-dessus juste après. Mais sur ce blog, vous n'aurez pas de publicité AdSense, de tracking par JavaScript ou avec des cookies, juste du bon vieux HTML, un thème CSS simple et de l'information. En mémoire au web1, loin du modèle économique prédateur du web2 et du bullshit marketing du web3, mon blog se veut plus proche du web1 et du web0.
Le choix de la plateforme.
Medium et Substack
Pour faire un blog, on a du choix. Il y a évidemment des solutions populaires et propriétaires comme Medium et Substack qui, à mon avis, deviennent un peu drivés par le profit.
WordPress, Ghost et Grav
J'aurais pu héberger mon propre WordPress, après tout, ma formation professionnelle m'a familiarisé à cet incontournable plateforme du web... et c'est bien la raison pour laquelle j'ai décidé de l'éviter, car je sais ce que c'est. J'aurais pu aussi considérer une alternative open source un peu plus moderne comme Ghost ou Grav, Ghost faisait partie des options qui me semblait la plus compatible avec ma vision.
WriteFreely et le fédivers
Dans la même veine, on avait WriteFreely, une solution construite sur le protocole du Fédivers ActivityPub que je trouvais intéressant, malheureusement, je ne trouvais pas d'instance qui me donnait suffisamment envie ou qui était dans mes tarifs. Je n'ai pas comme objectif de transformer ce blog en business. Ça ne veut pas dire que je ne chercherai jamais le moyen de monétiser l'effort que j'y mets, en revanche, ce n'est pas pourquoi j'écris. Il me fallait donc une solution abordable (voir gratuite), open source et avec une interface agréable sans que cela ne me prenne la tête à configurer.
HUGO et ʕ•ᴥ•ʔ BearBlog
Je n'en ai pas parlé avant, mais similaire à Ghost ou WordPress, j'ai découvert HUGO qui m'intéressait bien car c'est très léger et supporte pleins de thèmes. Mais bon, il fallait le configurer et héberger tout ça.\ Un jour, je suis tombé sur la solution pour laquelle j'ai opté : BearBlog, A privacy-first, no-nonsense, super-fast blogging platform.\ En gros, la solution idéale pour moi, je pouvais la tester rapidement et gratuitement, c'est du logiciel libre et open source (MIT), respectueux de mon intégrité numérique mais aussi de la votre, sans publicité, sans JavaScript et sans pisteurs. La solution premium est super abordable, et je la considère donc simplement parce que, en plus d'être accessible, son créateur avait fait la solution dont j'avais besoin, et je pense qu'il mérite mon soutien.
Nostr et Habla
Fin 2022, alors qu'il y avait encore un peu d'activité sur mon blog, je découvre Nostr... j'y comprends pas grand-chose, mais la scène Bitcoin semble très emballée par ce protocole. Début 2023, après des discussions et présentations à des MeetUps Bitcoin, je commence à saisir le potentiel d'identités basées sur une paire de clés cryptographiques, de la stupidité des relais et du protocole, et de l'inventivité des clients qui ne cessent de germer et de s'améliorer. Parmi eux, un a particulièrement retenu mon attention : Habla. Une sorte de Medium basée sur Nostr avec l'intégration des zaps (des dons minuscules via le réseau Lightning remplaçant des likes sans valeurs). Je vais partager mes articles sur Nostr via ce client pour expérimenter, vous trouverez ma npub sur la page d'accueil.
Nouveaux contenus
Désormais, je veux vraiment essayer de commenter l'actualité autour de la vie privée en ligne et ce qui gravite autour. Je désire aussi rédiger des tests/reviews afin de faire des retours d'utilisation honnêtes (trust me, bro). Ça pourrait aller d'une app open source à un hardware wallet en passant par un service en ligne. C'est quelque chose que j'ai toujours aimé faire pour mes proches, je partagerai donc ça ici en espérant que vous y trouverez un plus grand intérêt que ces derniers.\ Mais surtout, comme avant, des guides ou tutoriels afin de vous aider à utiliser les outils de façon bénéfique pour votre niveau de menace. Ça ira du choix de son navigateur à l'utilisation de logiciels de chiffrement et l'hébergement de services.\ Je vais faire un résumé type TL;DR pour chaque article afin de faire passer l'information à ceux qui n'ont pas le temps ou la motivation de tout lire.
Conclusions
Je suis très heureux d'avoir retrouvé de la motivation pour écrire et alimenter mon blog, désormais nommé "Le blog du petit lunarpunk 🌙". Je souhaitais expliquer pourquoi j'ai choisi ce nom pour apporter un peu de sens à mes lecteurs. Au final, cet article est plus long que prévu, mais cela aura été un bon exercice pour moi, me permettant de me remettre dans le bain et de trouver l'inspiration pour la suite. Il était également important d'expliquer mon choix de plateforme, car j'ai opté pour la simplicité, qui est souvent un compromis, mais je pense avoir trouvé un bel équilibre avec BearBlog. Si mon projet vous intéresse, vous pouvez ajouter le flux RSS et oui, c'est old school aussi). Cela me permettra de faire un article sur cette vieille technologie qui est devenue incontournable dans ma vie pour obtenir de l'information. N'hésitez pas à prendre contact avec moi, que ce soit sur les plateformes listées en page d'accueil ou en privé. Vous pouvez également partager les prochains articles dans vos cercles si vous les trouvez de bonne qualité. Celui-ci n'est pas le plus intéressant à partager, mais faites ce que vous voulez.
-
@ 6e0ea5d6:0327f353
2025-03-04 20:02:47The recipe for the downfall of a relationship is quite simple: marry someone with whom you have nothing in common.
The exotic tends to be attractive, but how many times, in a fine restaurant, has a customer discreetly spat into a napkin what they had just chewed because the eye-catching appearance betrayed them with an unbearable taste?
At the end of a hard day or a week of good results, we simply want to recline in a chair and celebrate in our own way what we have overcome. In the high phase of life, when the days are ripe for harvest, this desire will manifest with even greater intensity. And when your prosperity extends into the shade, and the days grow longer due to idleness, what will the two of you have to talk about?
Will your mentalities align?
Or will this person nestle on your shoulder and pour out a history of degeneration, drinking, parties, and casual relationships, because that is their only life experience?
I do not speak only in the professional sense, but of progress as a whole: when you have overcome your flaws, will you want to share your life with someone who nurtures theirs and takes their own ego as a lover?
Some are lucky to meet during the journey—a great privilege. But in general, the busy ones find each other after the work is done, and it is natural for both to want to enjoy in this peaceful phase what their efforts have granted them. At that moment, being beside someone whose travels or experiences are fresh and well-earned as rewards for their own sacrifices contrasts with sharing life with someone who has already been through it countless times, with the merit of a parasite.
Opportunists and freeloaders exist on both sides. Do not take by the hand someone who is merely waiting for a winner at the finish line. It is easy to appear clean and unscarred when one has not run even a kilometer. Do not be unfair to your lifelong efforts; find someone who represents you in determination, ethics, and principles, and you will multiply your fruits here on Earth. Also, remember that old piece of advice: "be what you seek to have," so that your future demands are not those of a hypocrite.
Thank you for reading, my friend!
If this message resonated with you, consider leaving your "🥃" as a token of appreciation.
A toast to our family!
-
@ 04c915da:3dfbecc9
2025-03-04 17:00:18This piece is the first in a series that will focus on things I think are a priority if your focus is similar to mine: building a strong family and safeguarding their future.
Choosing the ideal place to raise a family is one of the most significant decisions you will ever make. For simplicity sake I will break down my thought process into key factors: strong property rights, the ability to grow your own food, access to fresh water, the freedom to own and train with guns, and a dependable community.
A Jurisdiction with Strong Property Rights
Strong property rights are essential and allow you to build on a solid foundation that is less likely to break underneath you. Regions with a history of limited government and clear legal protections for landowners are ideal. Personally I think the US is the single best option globally, but within the US there is a wide difference between which state you choose. Choose carefully and thoughtfully, think long term. Obviously if you are not American this is not a realistic option for you, there are other solid options available especially if your family has mobility. I understand many do not have this capability to easily move, consider that your first priority, making movement and jurisdiction choice possible in the first place.
Abundant Access to Fresh Water
Water is life. I cannot overstate the importance of living somewhere with reliable, clean, and abundant freshwater. Some regions face water scarcity or heavy regulations on usage, so prioritizing a place where water is plentiful and your rights to it are protected is critical. Ideally you should have well access so you are not tied to municipal water supplies. In times of crisis or chaos well water cannot be easily shutoff or disrupted. If you live in an area that is drought prone, you are one drought away from societal chaos. Not enough people appreciate this simple fact.
Grow Your Own Food
A location with fertile soil, a favorable climate, and enough space for a small homestead or at the very least a garden is key. In stable times, a small homestead provides good food and important education for your family. In times of chaos your family being able to grow and raise healthy food provides a level of self sufficiency that many others will lack. Look for areas with minimal restrictions, good weather, and a culture that supports local farming.
Guns
The ability to defend your family is fundamental. A location where you can legally and easily own guns is a must. Look for places with a strong gun culture and a political history of protecting those rights. Owning one or two guns is not enough and without proper training they will be a liability rather than a benefit. Get comfortable and proficient. Never stop improving your skills. If the time comes that you must use a gun to defend your family, the skills must be instinct. Practice. Practice. Practice.
A Strong Community You Can Depend On
No one thrives alone. A ride or die community that rallies together in tough times is invaluable. Seek out a place where people know their neighbors, share similar values, and are quick to lend a hand. Lead by example and become a good neighbor, people will naturally respond in kind. Small towns are ideal, if possible, but living outside of a major city can be a solid balance in terms of work opportunities and family security.
Let me know if you found this helpful. My plan is to break down how I think about these five key subjects in future posts.
-
@ 44dc1c2d:31c74f0b
2024-05-22 22:09:19Chef's notes
If you don't have peanuts, you can sub it with peanut butter, but you'll want to cook with less salt as the peanut butter can add too much salt to the dish.
Details
- 🍽️ Servings: 4
Ingredients
- 2 1/2 cups Coconut Milk
- 3 Tbsp Red Curry Paste
- 3 Tbsp Thai Fish Sauce
- 2 Tbsp Palm sugar or light brown sugar
- 1 LB rump streak cut into thin strips
- 2 Lemon Grass Stalks, Bruised
- 3 oz Ground Roasted Peanuts
- 2 Fresh Red Chilies, Sliced
- 5 Kaffir Lime Leaves, Torn
- Salt and Pepper
- Thai Basil for Garnish
- 2 Salted eggs to serve with
Directions
- Put half the coconut milk in a large pan or Wok and heat gently until it begins to boil and separate.
- Add the curry paste and cook over medium heat until fragrant. Then add the Fish sauce, sugar and lemon grass.
- Continue to cook until the color of the sauce deepens
- Add the remaining coconut milk. Bring back to boil. Add the beef and peanuts. Cook for another ~10 min
- Add the chilies and the torn Kaffir Lime and adjust the seasoning. Garnish with whole Basil leaves and serve with a salted egg and rice.
-
@ 39cc53c9:27168656
2024-05-22 18:09:11These reviews are sponsored, yet the sponsorship does not influence the outcome of the evaluations. Sponsored reviews are independent from the kycnot.me list, being only part of the blog. The reviews have no impact on the scores of the listings or their continued presence on the list. Should any issues arise, I will not hesitate to remove any listing. Reviews are in collaboration with Orangefren.
The review
Swapter.io is an all-purpose instant exchange. They entered the scene in the depths of the bear market about 2 years ago in June of 2022.
| Pros | Cons | |----------------------------------------------|---------------------------------------------| | Low fees | Shotgun KYC with opaque triggers | | Large liquidity | Relies on 3rd party liquidity | | Works over Tor | Front-end not synced with back-end | | Pretty UI | |
Rating: ★★★☆☆ Service Website: swapter.io
Test Trades
During our testing we performed a trade from XMR to LTC, and then back to XMR.
Our first trade had the ID of:
mpUitpGemhN8jjNAjQuo6EvQ
. We were promised 0.8 LTC for sending 0.5 XMR, before we sent the Monero. When the Monero arrived we were sent 0.799 LTC.On the return journey we performed trade with ID:
yaCRb5pYcRKAZcBqg0AzEGYg
. This time we were promised 0.4815 XMR for sending 0.799 LTC. After Litecoin arrived we were sent 0.4765 XMR.As such we saw a discrepancy of
~0.1%
in the first trade and~1%
in the second trade. Considering those trades were floating we determine the estimates presented in the UI to be highly accurate and honest.Of course Swapter could've been imposing a large fee on their estimates, but we checked their estimates against CoinGecko and found the difference to be equivalent to a fee of just over
0.5%
. Perfectly in line with other swapping services.Trading
Swapter supports BTC, LTC, XMR and well over a thousand other coins. Sadly they don't support the Lightning Network. For the myriad of currencies they deal with they provide massive upper limits. You could exchange tens, or even hundreds, of thousands of dollars worth of cryptocurrency in a single trade (although we wouldn't recommend it).
The flip side to this is that Swapter relies on 3rd party liquidity. Aside from the large liqudity this also benefits the user insofar as it allows for very low fees. However, it also comes with a negative - the 3rd party gets to see all your trades. Unfortunately Swapter opted not to share where they source their liquidity in their Privacy Policy or Terms of Service.
KYC & AML policies
Swapter reserves the right to require its users to provide their full name, their date of birth, their address and government-issued ID. A practice known as "shotgun KYC". This should not happen often - in our testing it never did - however it's not clear when exactly it could happen. The AML & KYC policy provided on Swapter's website simply states they will put your trade on hold if their "risk scoring system [deems it] as suspicious".
Worse yet, if they determine that "any of the information [the] customer provided is incorrect, false, outdated, or incomplete" then Swapter may decide to terminate all of the services they provide to the user. What exactly would happen to their funds in such a case remains unclear.
The only clarity we get is that the Swapter policy outlines a designated 3rd party that will verify the information provided by the user. The third party's name is Sum & Substance Ltd, also simply known as samsub and available at sumsub.com
It's understandable that some exchanges will decide on a policy of this sort, especially when they rely on external liquidity, but we would prefer more clarity be given. When exactly is a trade suspicious?
Tor
We were pleased to discover Swapter works over Tor. However, they do not provide a Tor mirror, nor do they work without JavaScript. Additionally, we found that some small features, such as the live chat, did not work over Tor. Fortunately, other means of contacting their support are still available.
UI
We have found the Swapter UI to be very modern, straightforward and simple to use. It's available in 4 languages (English, French, Dutch and Russian), although we're unable to vouch for the quality of some of those, the ones that we used seemed perfectly serviceable.
Our only issue with the UI was that it claims the funds have been sent following the trade, when in reality it seems to take the backend a minute or so to actually broadcast the transaction.
Getting in touch
Swapter's team has a chat on their website, a support email address and a support Telegram. Their social media presence in most active on Telegram and X (formerly Twitter).
Disclaimer
None of the above should be understood as investment or financial advice. The views are our own only and constitute a faithful representation of our experience in using and investigating this exchange. This review is not a guarantee of any kind on the services rendered by the exchange. Do your own research before using any service.
-
@ 3c984938:2ec11289
2024-05-19 12:55:47👉play the audio to listen to the article.
This article contain several links hidden within the text. If you dare to understand the meaning behind the last image. Click on "daily" for an image, read it. Then click on "muchness" to watch a video(about 1h) link. After you've done that, revisit here and look at my last image. You might have missed something.
Excusez-moi, s’il vous plaît. That tasted purple🍵🌺
🤤😮Are you still thirsty from the previous article? Are you amazed by the different flavors of web3 enabled sites, clients, and apps? Did you try out using NIP-07, "Signer extension?" Nos2x or NostrConnect are pretty spiffy, eh! Did it bring a similar reaction like when you first learned how to drive? When I started to explore Nostr I had that “whoa, that a lot easier than Facebook,” moment. 💡⚡A light bulb started to flicker on.
🎉🎈Are you having fun yet? Would you like another cup of tea? 💸HODL (Hold On for Dear Life) as we sip our way to purple. Things here in Nostr wonderland are curiouser and curiouser every day. One day it's 🍕pizza 🥧pie? And then the next day it's Danny, Dan, Dan. Hold on to your petticoat, because you're about to get swept away, by the tools to get the most out of Nostr.
But first, would you like a purple crumpet?💜🥞
🍵🍰🎉This wouldn't be much of a tea party without a bit of finger food. If you are following me, I'm just a little hors d'oeuvre among the many here on Nostr. So let's try some other flavors. You can start with some influencers from twitter that have fallen into the rabbit hole here at this link.
I follow Jack and Edward Snowden, but there are several others.
jack @npub1sg6plzptd64u62a878hep2kev88swjh3tw00gjsfl8f237lmu63q0uf63m
Snowden @npub1sn0wdenkukak0d9dfczzeacvhkrgz92ak56egt7vdgzn8pv2wfqqhrjdv9
💡🎮🏈🎲🏹What are some topics, hobbies, and interests that are important to you? You can search for hashtags and follow those on your client. For example, #onigirl, #privacy, and even #cats in your search bar on your client. Remember, there are no algorithms here. If wish to have a vibrant feed or be fed random stuff(which is kinda cool sometimes), follow curators that you like.
👉🚦💤Don't sleep on "stacker.news", 🎩🔐📎They're entirely bonkers! But I'll tell you a secret. All the best people are. Here are just a few.
📝@Lux drops “sovereignty pills"💊 daily in “Stacker Saloon,” 🏋️♀️@grayruby does 100 push-ups and squats until 100k Bitcoin, 🔏@sethforprivacy podcast host of "Opt Out," 🎼@MusicTrappa Former Tv Contestant of NBC the voice. 💣@nerd2ninja posts invigorating and provocative links and content, 🐝@Alby for bee news, @TNstacker, @0xbitcoiner, @undisciplined and dozens more! Plus a new territory just started by @AtlantisPleb called ~openagents revolving around NIP-90 Data Vending Machine, it is hilarious to play with. Try Trolly McPirate, tis quite fun.
Are you turning purple?💜
👉🍄🦋"Who are you?” said the Caterpillar Now, that you've drank and ate, are you changing color yet? Let's explore this wonderland that Nostr has given us! It starts with changing your profile and banner image to anything you like. Since, we're not robots.
👉🌻🌹"Do you suppose she's a wildflower?" asked the Daisy. 🌼🌷 ⭐NIP-05 identity DNS ⭐ Similarly to Twitter, a check mark is to show that you are from the same garden “like a human,” and not an outlier like a weed or, "bot." But not in the nefarious way that Big Tech handles this. In Nostr wonderland this allows you to map your silver key, "npub" to a DNS identifier. Once verified, eat a mushroom and shout out to announce your new Nostr residency to share. Just remember, one quick little thing. Break a small piece of the other side of the mushroom after, don't bite.
✨There are a plenty of options but if you've followed the steps in my previous article, "First time (N)ostrich start here!" guide following my advice to get a SN, "stacker.news" then this gets extremely easier.
👉✅Click your "Profile," then click "Settings," scroll to the bottom and paste your Silver key, "npub!" and click "save" and there you go! Use your Stacker.news lightning wallet address as your ⭐NIP-05.⭐ Congratulations!!! You are now verified! Give it a few hours and when you use your "main" client you should see a checkmark!
Beware of card soldiers 2-10
👉⚔🍎👑☠Oh No! The "Queen of Apples" has released a jabberwocky that threatens some Nostriches wallets! As long as you remain using her wares within Nostr Wonderland you may need to comply to her draconian ways! 👛👾👺🐭
❗It has come to my attention that Apple users cannot utilize Chrome webstore; thus are not able to take advantage of using "Signer extension." Whatever, shall we do? Shall we paint all the roses red?🌹
👉🎠🦄'Well, now that we have seen each other,’ said the Unicorn, ‘if you’ll believe in me, I’ll believe in you. Is that a bargain?🦁🤝
For 🍏Apple users, you can still use "stacker.news" by registering with your email to help you get a starter Bitcoin lightning wallet. Another option is Primal, please note both wallets have Satoshi limits. Primal, may not be in your interest if you're concerned with privacy.
👉🎠🌼🐝🌻 A unicorn sent a friend, to help thee.🐝🌷🌹 A solution for 🍏Apple users would be to get an invitational code from Alby. You are able to use Alby via Safari on your Mac Os, and as a signer extension. Then connect 💎Damus with Alby. The good news is you can find @Alby on stacker.news and ask! Or check them out on your client. Just search "hello@getalby.com" Once you get an account, you could use your Alby lighting address as your ⭐NIP-05⭐ address as an option. The bee whispered to me, “I also support android, Safari on Mac and things,” and flew high to lead us out.
Alby the bee, silver key @npub1getal6ykt05fsz5nqu4uld09nfj3y3qxmv8crys4aeut53unfvlqr80nfm
Quickly! Follow me out of this maze!
✨With the help from 🐝Albee, we escaped the 👑queen's jabberwocky. The key to decentralization is to shred all thing bounding you by unseen 🔗chains and "things". To abandon all things 🏫learned, and go back to thinking about 😲six impossible things. You should try it-- It certainly is such great practice. 💡For example, what if I told you that you were all ⚰dead? How 🤡preposterous and silly! But whose, 🤝who, to say it isn't? This is your adventure, dear user. I'm merely here to help guide you in all its marvels, and to safely navigate you through its treacherous terrains. How much 🦁muchness' do you have? Oh, blind me, do I see a clearing?
Ohh! Look here, my friends must have 🦺built a safe passage.
A ♨ steaming river is set before us. We must be very careful. Unless, you want to end up in the boiling sea. There are some boulders and pebbles over there. My 😊friends, must have laboriously put these here for Nostriches like us. I'll take you to the 🐸frogstr and 🐰hare, but then that will be the end of it.
I think I see him, He's right there. Ever since 🐸Frogstr converted to freedom, he's been spreading memes to others. Take a peek!
Memestr, Pinstr, Badges, If you've received badges, put them on by visiting here., Swarmstr cute interface to view hashtags, My favorite food client with optional OnionSauce, noStrudel tastes like 🤖Reddit, Gossip My favorite Desktop Client, Extensive List of all things Nostr., and Alice in Wonderland story.
My friend the 🐇white rabbit Yakihonne now supports 🍎iOs and 🤖Android. This app supports NIP-23 in all of its entirety. Feel free to soak up the information there. When NIP-65? 🎯I don't know. Let's 🐜bug them to do that.
You can easily find all my content on 🐇Yakihonne.com or on the app. My only grief I have with the 🐰hare is that it's not Open Source. Annoy the 🐇white rabbit to go Open Source if you can catch him! He's always going off about "⏰Time⌚" which brings me to the end of my guide.
We're lucky to escape the Bloody Shrewd 👑Knave, but he will send his 🃏card ⚔soldiers yet again.
📢Lastly, dear user. What better time then now to make your life more ⛓decentralized, if not now then when? Take back your ⚖digital sovereignty, and it starts here in Nostr 🐹Wonderland. Use the 🛠tools here, and share your knowledge, experiences, or whatever and 💰monetize it. Join the 🎉Freedom Party! Learn about the Knights of Nostr that are fighting for Freedom Tech and the projects that are contributing to make it happen. FOSS for all!
👉Have you tried the 🍊Orange 🍵Tea, Dear User? It's quite divine. Would you like me to write a 💰Bitcoin guide? Let me know in the comments! I appreciate all feedback.
👉You can read my 🧵first article here. Alternatively, you can click/tap "here" if you're logged into app client.
🙇♀️🙏It would be the highest honor for me if you 🔖bookmarked my article and 🔁shared it with future (N)ostriches.
"Imagination is the only weapon in the war against reality." -Lewis Carroll
🧧⚡Zapping⚡ is always appreciated, but is not required.
💜🧡Thank you💖💋
📢🥂Special Shout-outs
🐶Uno - Spreading Nostr love @npub14q8uffuxxnhzd24u4j23kn8a0dt2ux96h5eutt7u76lddhyqa0gs97ct2x
🥂Derek Ross - welcoming committee to Nostr; I'm jumping on this. @npub18ams6ewn5aj2n3wt2qawzglx9mr4nzksxhvrdc4gzrecw7n5tvjqctp424
👏Nos Social - Introducing me to the Nos App community @npub1pu3vqm4vzqpxsnhuc684dp2qaq6z69sf65yte4p39spcucv5lzmqswtfch
🐇Yakihonne - For supporting all things Nip-23 @npub1yzvxlwp7wawed5vgefwfmugvumtp8c8t0etk3g8sky4n0ndvyxesnxrf8q
🐱💻Semisol - working hard to keep TOR relays up @npub12262qa4uhw7u8gdwlgmntqtv7aye8vdcmvszkqwgs0zchel6mz7s6cgrkj
📝James - Introducing me to use my obsidian tool or earring. (I've converted at least seven Nostr since then) @npub10a8kw2hsevhfycl4yhtg7vzrcpwpu7s6med27juf4lzqpsvy270qrh8zkw
-
@ a012dc82:6458a70d
2025-03-04 16:16:12Argentina's financial landscape is taking a significant turn with the adoption of Bitcoin for rental payments, an innovative move reflecting the country's openness to digital currencies. This pioneering transaction not only serves as a testament to Argentina's adaptability in the face of economic fluctuations but also marks a pivotal shift towards a more inclusive financial system. Amidst the backdrop of inflationary pressures and currency devaluation, cryptocurrencies offer a semblance of stability and reliability, enticing Argentinians to look towards digital solutions for everyday transactions. The use of Bitcoin in real estate transactions symbolizes a broader acceptance of digital currencies, challenging traditional banking paradigms and showcasing the potential for a digital economy. This event is not just a milestone for Argentina but also a beacon for countries worldwide grappling with similar economic challenges, demonstrating the viability of cryptocurrencies as a medium of exchange. By embracing Bitcoin for such a critical aspect of daily life—rental payments—Argentina is setting a precedent, illustrating the practical applications of digital currencies beyond speculative investments. This movement towards digital currency adoption is fostering a new era of financial inclusivity, where access to banking and financial services is no longer hindered by traditional barriers, offering a glimmer of hope for a more democratized financial future.
Table of Contents
-
The Historic Bitcoin Rental Transaction
-
Impact on Real Estate and Financial Transactions
-
Challenges and Opportunities Ahead
-
The Future of Cryptocurrencies in Argentina
-
Conclusion
-
FAQs
The Historic Bitcoin Rental Transaction
The transaction facilitated by Fiwind marks a watershed moment for Argentina, showcasing the tangible application of Bitcoin in the real estate market. This isn't merely about the novelty of using digital currency for rent but a reflection of a deeper shift towards digital transformation in financial dealings. The choice of Bitcoin, equivalent to 100 USDT, for this transaction, underscores the growing confidence in cryptocurrencies as a stable and viable alternative to fiat currencies, even in the face of their notorious volatility. This event highlights the synergies between blockchain technology and real estate transactions, pointing towards a future where such digital transactions could become the norm rather than the exception. The role of Fiwind in this transaction is emblematic of the critical role fintech companies are playing in bridging the gap between traditional financial services and the emerging digital economy. Through this pioneering payment, Argentina is not just experimenting with new technology but also laying the groundwork for a financial ecosystem that is more adaptable, secure, and inclusive. The successful execution of this rental payment using Bitcoin paves the way for further innovation in the sector, encouraging other players in the real estate market to explore the benefits of cryptocurrency transactions. This could lead to a ripple effect, where the acceptance and use of digital currencies become widespread, transforming the way financial transactions are conducted across the board.
Impact on Real Estate and Financial Transactions
The introduction of Bitcoin payments in the real estate sector is not just a one-off event but a sign of the evolving landscape of financial transactions in Argentina and globally. This development has the potential to catalyze a significant shift in how transactions are conducted, moving away from traditional, cumbersome processes to more streamlined, digital-first approaches. The benefits of using cryptocurrencies for real estate transactions extend beyond the immediate convenience and security—they represent a fundamental change in the perception and utilization of digital currencies in substantial financial dealings. The blockchain technology underlying Bitcoin transactions offers unparalleled transparency and security, mitigating many of the risks associated with traditional real estate transactions, such as fraud and delays in payment processing. Moreover, this shift towards digital currencies can greatly enhance the accessibility of real estate markets, removing barriers for international investors and simplifying cross-border transactions. As Argentina explores the full potential of cryptocurrencies in real estate, it sets a precedent for other sectors to follow suit, potentially revolutionizing payment and investment models across the economy. This could lead to greater efficiency, reduced costs, and a more inclusive market, where anyone with access to digital currencies can participate without the need for traditional banking infrastructure. The impact of this development could extend far beyond the real estate sector, influencing how businesses and individuals alike think about and engage with the financial system.
Challenges and Opportunities Ahead
While the adoption of Bitcoin for rental payments in Argentina opens up new avenues for the use of digital currencies, it also brings to light several challenges that need to be addressed. Regulatory uncertainty remains one of the biggest hurdles, as governments and financial institutions grapple with how to integrate cryptocurrencies within existing legal and financial frameworks. The volatile nature of digital currencies adds another layer of complexity, raising questions about valuation, taxation, and consumer protection. Despite these challenges, the opportunities presented by the broader adoption of cryptocurrencies are immense. They offer the potential for a more efficient and transparent financial system, reduced transaction costs, and increased access to financial services for underserved populations. Moreover, the adoption of digital currencies can spur innovation in financial technologies, encouraging the development of new tools and services that enhance the security and efficiency of transactions. As Argentina navigates these challenges and opportunities, it can serve as a valuable case study for other countries considering the role of digital currencies in their economies. By addressing regulatory and volatility concerns, Argentina can pave the way for a more stable and inclusive financial ecosystem, where cryptocurrencies play a significant role in everyday transactions. This journey towards cryptocurrency adoption is not without its obstacles, but the potential benefits for economic inclusivity, efficiency, and innovation make it a venture worth pursuing.
The Future of Cryptocurrencies in Argentina
The successful rental payment in Bitcoin is more than a novelty; it's a harbinger of the potential future role of digital currencies in Argentina's economy. As the country continues to explore the possibilities of cryptocurrencies, we can expect to see an expansion in their use across various sectors, from retail to services and beyond. This could dramatically transform the payment landscape, making digital currencies a common feature of everyday transactions. The implications of such a shift are profound, offering the possibility of a more inclusive financial system that transcends the limitations of traditional banking. However, the journey towards widespread adoption of cryptocurrencies is contingent on several factors, including technological advancements, regulatory clarity, and societal acceptance. As Argentina navigates these factors, it could emerge as a leader in the adoption of digital currencies, setting a benchmark for other nations. The potential for cryptocurrencies to improve efficiency, reduce transaction costs, and enhance financial inclusion is significant, suggesting a bright future for their role in Argentina's economy. This evolution towards a digital-first financial landscape represents a significant leap forward, promising a more accessible, secure, and efficient way of conducting transactions for all Argentinians.
Conclusion
The integration of Bitcoin into Argentina's rental market is a significant milestone, highlighting the growing acceptance and potential of cryptocurrencies to redefine traditional financial systems. This development is not just about the adoption of a new payment method but reflects a broader shift towards digital innovation and economic reform. As Argentina continues to embrace cryptocurrencies, it contributes to the global conversation on the future of finance, demonstrating the practical benefits and challenges of digital currencies. The journey of cryptocurrencies from niche investment to mainstream payment option is fraught with hurdles, but the opportunities they present for economic reform and innovation are unparalleled. As we reflect on Argentina's experience, it's clear that the role of cryptocurrencies in the global financial system is only set to grow, promising a future where digital transactions are the norm, offering greater accessibility, security, and efficiency. The adoption of Bitcoin for rentals in Argentina is just the beginning, paving the way for a future where cryptocurrencies play a central role in our financial lives, transforming how we think about and engage with money.
FAQs
What is the significance of Argentina embracing Bitcoin for rentals? Argentina's adoption of Bitcoin for rentals marks a milestone in the country's financial landscape, highlighting its progressive approach to digital currencies.
How was the historic Bitcoin rental transaction in Argentina facilitated? The transaction was made possible by Fiwind and involved a rental payment in Bitcoin, equivalent to 100 USDT.
What impact does this development have on real estate and financial transactions in Argentina? It opens new avenues for faster, more secure, and accessible payment methods in real estate, potentially transforming financial transactions across various sectors.
What challenges and opportunities are associated with cryptocurrency adoption in Argentina? Challenges include regulatory issues and cryptocurrency volatility, while opportunities include a more efficient and inclusive financial system.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co/
Youtube: @thebitcoinlibertarian
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
Get Orange Pill App And Connect With Bitcoiners In Your Area. Stack Friends Who Stack Sats link: https://signup.theorangepillapp.com/opa/croxroad
Buy Bitcoin Books At Konsensus Network Store. 10% Discount With Code “21croxroad” link: https://bitcoinbook.shop?ref=21croxroad
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ ce80c0eb:bcb3390c
2024-05-15 18:38:47GrapheneOS, a privacy-centric mobile operating system, often comes under scrutiny for app compatibility. This blog aims to demystify how GrapheneOS, through its innovative use of sandboxed Google Play Services, effectively resolves these concerns, making it an ideal choice for travelers who value privacy and security.
The Core of GrapheneOS
GrapheneOS stands out for its commitment to security and privacy. However, a common misunderstanding is its perceived limitation in-app functionality, primarily due to its default exclusion of Google Play Services.
The Role of Google Play Services in App Compatibility
Many essential apps for travel, communication, and navigation rely on Google Play Services. This dependency is where the misconception about GrapheneOS's app compatibility stems from, as it's designed to function without these services by default.
Sandboxed Google Play Services: A Strategic Solution
GrapheneOS addresses this challenge by offering sandboxed Google Play Services. This feature allows users to access and use a wide range of apps while maintaining the OS's high standards of privacy and security.
-
Ensuring App Functionality: By sandboxing Google Play Services, GrapheneOS allows users to run most apps seamlessly, countering the myth of limited app compatibility.
-
Maintaining Security and Privacy: The sandboxed environment isolates these services, minimizing their access to the system and user data, thus preserving the core privacy principles of GrapheneOS.
-
Providing User Flexibility: Users have the choice to install sandboxed Google Play Services based on their needs, offering a balance between functionality and privacy.
The Impact on Travel
For travelers, this means that they can use GrapheneOS to navigate, communicate, and engage with local services through popular apps without compromising their privacy. This functionality is particularly crucial in foreign environments where reliance on digital tools is often heightened.
Personal Insights and User Experience
As someone who primarily strives to use my device without Google services, I've found GrapheneOS to be incredibly accommodating. This OS aligns perfectly with my preference for a Google-free experience, offering robust privacy features and a plethora of non-Google apps that cater to most of my needs.
However, the reality of travel sometimes necessitates the use of certain apps that depend on Google's ecosystem. In these instances, the ability to use sandboxed Google Play Services on GrapheneOS has been a game-changer. This feature has been especially useful for accessing essential apps like maps for navigation, local transportation apps in different countries, and certain communication tools that are indispensable in specific regions or situations.
Addressing Common Concerns: GrapheneOS's Unique Solutions
While some users may have concerns about using GrapheneOS, such as app compatibility and eSIM management, the operating system offers innovative solutions to address these issues, making it an excellent choice for travelers.
1. Seamless Use of Essential Travel Apps
GrapheneOS enables the installation of Google Play Services in a sandboxed environment, allowing users to access most travel and communication apps without compromising their privacy.
- Personal Experience: During my travels in Southeast Asia and abroad, I have successfully used essential apps like Google Maps, LINE, and Grab without any issues, thanks to the sandboxed Play Services, which I installed in a separate user profile to keep my main profile Google free.
2. Extensive App Compatibility
Although GrapheneOS doesn't include Google Play Services in its standard setup, the sandboxed environment enables users to run a wide range of apps that rely on Google's ecosystem, dispelling the misconception of limited app compatibility.
- Alternative App Sources: For apps that don't require Google Services, GrapheneOS users can access a wealth of options and alternatives through sources like F-Droid and Aurora Store.
3. Streamlined and Secure eSIM Management
GrapheneOS has made significant advancements in eSIM management, offering users a streamlined and secure experience. This feature is particularly beneficial for travelers who need to switch between different mobile networks while abroad.
By addressing these common concerns head-on, GrapheneOS demonstrates its commitment to providing users with a privacy-focused, user-friendly, and travel-compatible mobile operating system.
Disabling Unused Apps for Enhanced Security
GrapheneOS offers a unique feature that allows users to disable apps they aren't actively using. This feature is particularly useful for travelers who may have location-specific apps that are only needed for a limited time.
-
Enhancing Security: By disabling unused apps, you reduce the potential attack surface of your device, making it more secure.
-
Saving Resources: Disabled apps don't run in the background, freeing up system resources and potentially extending battery life.
-
Streamlining App Management: This feature helps keep your app drawer organized and clutter-free, making it easier to manage your device.
To disable an app, simply go to the app's settings and select "Disable." You can easily re-enable the app whenever you need it again.
Tips for Nomads Using GrapheneOS
-
Set Up Sandboxed Google Play Services: Before you travel, set up the sandboxed environment for essential apps.
-
Regularly Review App Permissions: Keep track of which apps have access to your data and adjust settings as needed.
-
Explore Browser Alternatives: Use browser versions or PWAs of popular apps for a more privacy-conscious approach and also to reduce how many apps you have installed.
-
Stay Updated: Utilize GrapheneOS's automatic update feature to maintain security.
-
Secure Communication: Opt for encrypted communication apps for privacy in your work and personal conversations.
Conclusion
GrapheneOS, with its unique approach to privacy and app compatibility, dispels the common concerns of digital nomads. By understanding and utilizing its sandboxed Google Play Services, app disabling feature, and other capabilities, you can enjoy a seamless, secure digital experience on your travels. GrapheneOS is not just a viable option; it's a robust solution for the privacy-conscious nomad.
-
-
@ 83fd07de:aec50d47
2025-03-04 13:48:29Attempts to artificially inflate demand for Bitcoin—whether through ordinals for 'crypto' people, ETFs for institutional investors, or Bitcoin Strategic Reserves (BSR) for states—for purposes other than self-sovereign savings and payments, will almost always backfire.
The reasons you use to onboard people to Bitcoin can often be the same reasons they eventually decide to leave. While it's true that this process can lead to incremental improvements in user education, it also subjects actual Bitcoin users to considerable volatility, a defining characteristic of the Bitcoin user journey.
Simply put, all pro-Bitcoin narratives appear strong when prices are rising and weak when they are falling. So, what do the Bitcoin users actually know better than tourists that enable them to outlast the madness of the crowds?
https://media.tenor.com/QHPiPY42oR0AAAAC/benbvolliefde-b%26bvolliefde.gif
Unlike tourists, Bitcoin users know that bitcoin itself is not volatile; rather, it's the valuation expressed in fiat currency that experiences volatility. They know that Bitcoin is not something to be blindly trusted but something to be verified. They know that nothing out there beats running and using your own node. They know that their self-custody setup is solid. They know that Lightning works, offering incredible UX advancement in web payments. Additionally, they know how Nostr empowers exploration of new frontiers on the web, revealing traditional tech infrastructures for what they truly are. And there is so much more.
Yet most importantly, Bitcoin users know they ARE IN CHARGE of creating a new world.
Individual agency has been reclaimed, and it matters greatly. Anyone who is aware of this shift will embrace it wholeheartedly and will be reluctant to relinquish it, if ever.
Bitcoin is not a quest of telling what people should value; it's a journey of discovering the value of time well spent—a life worth living.
https://i.nostr.build/0TdM9A3rzm6BSElE.png
-
@ ce80c0eb:bcb3390c
2024-05-15 18:34:15Protecting your privacy while staying connected is more important than ever especially while traveling. JMP.chat is a powerful service that provides virtual phone numbers for calling and texting, leveraging the decentralized Jabber/XMPP network. By using JMP.chat with various XMPP clients, you can communicate securely and maintain your privacy, whether you're traveling, signing up for services, or simply want to keep your personal information private.
Why JMP.chat is a Game-Changer for Privacy and Travel
JMP.chat offers numerous benefits for those looking to protect their privacy and stay connected on the go:
Maintain your privacy: With a virtual number from JMP.chat, you can avoid giving out your real phone number to people or services you encounter, reducing the risk of your personal data being compromised.
Access local services and maintain control over your accounts: JMP.chat numbers provide a convenient way to sign up for local services or apps that require a phone number, without the need to reveal your real one. This is particularly useful when you need to receive two-factor authentication (2FA) codes or when signing up for apps like Telegram, which require a phone number for registration.
By using a JMP.chat number, you can ensure that you maintain control over your accounts and avoid getting locked out due to not having access to the phone number associated with your account. This added layer of privacy and control is especially important when traveling or using services that you may not fully trust.
Pay with Monero (XMR): JMP.chat allows you to pay for their services using Monero, a privacy-focused cryptocurrency that ensures your financial transactions remain confidential adding to more privacy overall.
No KYC required: One of the standout features of JMP.chat is that they do not require users to complete a Know Your Customer (KYC) process. By eliminating the need for KYC, JMP.chat ensures that your privacy is protected from the very beginning, allowing you to use their virtual numbers with peace of mind.
Cheogram: A Feature-Rich XMPP Client for JMP.chat
Cheogram is a popular XMPP client that offers seamless integration with JMP.chat and a range of useful features:
- Dialer integration: Cheogram allows you to use your JMP.chat number directly from your device's native dialer app, making it easy to make and receive calls without opening the Cheogram app.
- Contact integration: Cheogram can sync your JMP.chat contacts with your device's native contacts app, making it easy to manage your contacts in one place.
- Automatic prefix handling: When making international calls, Cheogram automatically adds the necessary prefixes to ensure your calls are routed correctly.
While Cheogram offers a user-friendly experience, it's important to note that you can use any XMPP client that supports JMP.chat's features, such as Conversations, Snikket, Movim, or Gajim
How JMP.chat Works with XMPP Clients
JMP.chat acts as a bridge between the traditional telephone network and the Jabber/XMPP network. To use JMP.chat, you'll need a Jabber ID (JID) and an XMPP client.
Here's how it works:
- Obtain a Jabber ID: Create a Jabber ID or use an existing JID.
- Choose a virtual number: Visit the JMP.chat website and search for a phone number that suits your needs.
- Link your Jabber ID: Enter your JID when prompted to link it to your chosen virtual number.
- Set up your XMPP client: Install and configure your preferred XMPP client, such as Conversations, Snikket, Movim, or Gajim. If using Cheogram, download the app and log in with your Jabber ID and password.
- Start communicating: With your virtual number set up, you can now make and receive calls and texts through your XMPP client, as long as you have an internet connection.
Additional Features and Capabilities of JMP.chat
JMP.chat offers a wide range of features to enhance your communication experience:
Group and picture messaging: Send and receive group texts and picture messages using any Jabber client.
Voicemail: Receive voicemails as audio recordings and text transcriptions.
Seamless communication: Your contacts can communicate with you as they would with any other phone number, without needing to change anything on their end.
Multiple numbers: Get different numbers for various purposes, such as personal, professional, or dating, to keep different aspects of your life separate.
Number porting: Port your current US or Canadian number to JMP.chat after signing up with a temporary number.
Open-source software: All software used to provide JMP.chat is free and open-source, allowing you to inspect, download, or modify the source code.
Supported and Unsupported Features
JMP.chat supports a wide array of text messaging features, including:
- SMS
- MMS (picture messaging)
- Group MMS
- Delivery receipts
- Emoji
- Long messages
However, some features are not yet supported, such as:
- Sending messages to short codes (e.g., for two-factor authentication)
- Automated spam filtering
- Automated blocking of numbers
It's important to note that while JMP.chat provides phone numbers and voice/SMS features, it does not provide emergency services (e.g., 911, 112, 999) over voice or SMS.
Conclusion
JMP.chat, combined with the power of XMPP clients, offers a robust solution for protecting your privacy and staying connected, whether you're traveling, signing up for services, or simply want to keep your personal information private. By providing a secure and convenient way to manage your communication needs through virtual phone numbers and the decentralized Jabber/XMPP network, JMP.chat empowers you to take control and communicate on your own terms. Explore the various XMPP clients available and find the one that best suits your needs, knowing that your privacy is in good hands with JMP.chat.
-
@ 3c984938:2ec11289
2024-05-11 12:21:43👉play the audio to listen to the article. https://media.nostr.build/av/749a03816c328c599054f31113588f9f5a47b5e67681e3a1eb9ee97c8f2e0dd3.mp3
Welcome to Nostr!
Introduction. Is this your first time here in Nostr? Welcome! Nostr has a oddball acronym for "Notes and Other Stuff Transmitted by Relays" with a simple goal, to be censorship-resistance. An alternative to traditional social media, communications, blogging, streaming, podcasting and eventually email (in development) with decentralization that empowers you, dear user. No more will you have to be plagued by ads, held by centralized entities and data hungry algorithms that monetizes you.
Allow me to be your host! I'm Onigirl! I'm on a quest to explore the world of Nostr, a decentralized communication protocol. I write about the tools, and the awesome developers within Nostr that bring this realm roaring with life.
Welcome to Nostr Wonderland
You're about to step into another world that will explode your mind from all the decentralized apps, clients, web3 enabled sites that you can use. You're never going to look at communications, logging in, 2FA, and social media the same way ever again. All thanks to Nostr's cryptographic nature inspired by Bitcoin blockchain technology. Each user, when they create a Nostr account, they get two keys, a private and a public key. These are your keys to your very own kingdom. Whatever you write, sing, podcast, stream, anything you create --all of it belongs to you. The sky is literally the limit!
A Gold and Silver Key
A friend of mine and I, call this "Identity by Encryption" because your Identity is encrypted. You can share your silver key, "npub" to other users to connect and follow. Use your gold key, "nsec" to unlock your account to plugin into a plethora of applications. Keep this key safe at all times. There is no reason to be caged ever again by social platforms TOS henceforth!
👉Give it a whirl, you can follow me by copying and pasting my public key into your search bar on any client that you decide to use.
Onigirl
npub18jvyjwpmm65g8v9azmlvu8knd5m7xlxau08y8vt75n53jtkpz2ys6mqqu3
Don't have a client yet? Select the best option
Find the right App for you! This is where you can use your gold key, "nsec" to login into these wonderful tools. You can also visit Nostr's app page here. Before you start pasting your gold key everywhere on apps, consider using a signers (for web3 enabled sites) please look at the next image for details, also refer to the legend.
Get a Signer extension via chrome webstore
A signer is an extension in the chrome webstore on Google. Nos2x and NostrConnect are widely accepted extension for logins. This simplifies the process of logging into web3 sites instead of copying and pasting your gold key, "nsec" each and every time, you keep it within the extension and give it permission(s) to sign you in.
👉⚡⚡Get a Bitcoin lightning wallet to send/receive Zaps⚡⚡ (This is optional)
Here on Nostr, we use the Bitcoin Lightning network (L2). You will need to get a lightning wallet in order to send/receive Satoshi. These are the smallest denominations of a Bitcoin. It is a one hundred millionth of a single bitcoin (0.00000001 BTC). Zaps are a form of "micropayment with sats" here on Nostr. If you enjoy a user content, it is the norm to "⚡zap⚡" a.k.a "tip" for their content. For example, If you like my content, you can zap me with SATs to reward my work. But you just arrived, you don't have a wallet yet. No worries! I got you covered!
"Stacker.News" is a platform where users can earn SATs by writing articles and engaging with other users. You.
👉Stacker.News is also the easiest place to get a Bitcoin Lighting wallet address.
- Log in with your "Signer" extension either "Nos2x or NostrConnect" click your profile which will be random letters and numbers in the upper right corner.
You will see something like this:
- Click "edit"
and choose a name that you like, and if you don't like it. You can change again later.
- Click "save"
- Create a bio and the SN community are very welcoming and will zap you some sats to welcome you.
- You new Bitcoin Lightning Wallet address will appear like this:
#### ^^Do not zap this address; this is purely for educational purposes!
- With your New Bitcoin Lightning wallet address you can put this into any client or app of your choice. To do this, go to your profile page and under your wallet address under "LN Address," enter your new address and hit "save" and there ya go. Congratulations!
👉✨Eventually, you may want to move to self custodial options and maybe consider to even self-host your own LN node for better privacy. Good news is stacker.news is also moving away from being a custodian wallet.
Nostr, the maverick of Servers
Instead of using a single instance or a centralized server Nostr is built to have several databases to exchange messages using "relays." Relays, which are neutral and nondiscriminatory, store and broadcast public messages in the Nostr network. They transmit messages to all other clients connected to them, securing communications in the decentralized network.
My friends in Nostr welcome you!
Welcome to the tea Party, would you like a spot of tea?🍵
There's so much more!
This is just the tip of the iceberg. Follow me as I continue to explore new lands and the developers, called "knights" behind this ever-growing ecosystem. Meet me here for more content like this and share this with future nostr users. Learn about the knights fighting for freedomTech within Nostr and the projects that are contributing to make it happen. Make your life more decentralized with Nostr. 💋
Onigirl @npub18jvyjwpmm65g8v9azmlvu8knd5m7xlxau08y8vt75n53jtkpz2ys6mqqu3
- Log in with your "Signer" extension either "Nos2x or NostrConnect" click your profile which will be random letters and numbers in the upper right corner.
You will see something like this:
-
@ 3c984938:2ec11289
2024-04-29 09:00:28This is a part of my sporadic work on the Legend Series. I had a hard time finding good images. The images Ai often gave out made the islanders that look like Indians with the feather crowns, so that was interesting. The ending of this one is kinda funny.
The island was inhabited long ago by the ancient people (called Taotaomona). They were much larger than a regular person today. They also had magic, albeit little. The men were blessed with size and strength, while the women were gifted with wisdom and just a touch of magic in their hair.
One day, in the Hagatna bay. A group of fishermen noticed it their bay had grew. It was beyond confusing, to say the least. Another group of fishermen noticed that their bay, pago, also grew on the opposite side of the island.
"If this continues, our island will be cut into two pieces," cried the islanders. A wise leader came up with an idea to protect the island. The fishermen would watch their own bays from their own bays.
^^Huge fish, but you can also see the Taotaomona are also big.
The next morning, a fisherman spotted a massive fish in Pago Bay. The giant fish swam in and started to nibble the shoreline. The fisherman ducks behind boulders to observe and passes the message to his clan leader.
The leaders came together and came a conclusion that they must kill the fish. They sent runners to Hagatna Bay to ask for help to save their island home. Soon, Pago Bay was surrounded by canoes and men. All of them diligently watching to prevent their land from being eaten away, both in and out of the reef. Regardless of how hard they searched or waited, the fish didn't show. After awhile they give up and returned home.
^^Fish nibbling under the island from down under.
The news spread throughout the island about their imminent doom from clan to clan. They felt powerless to do anything.
The women of the island wore long, flowing locks and were proud to wash their hair in the river spring. The juices of lemons were used to enhance the magic. The peels were thrown into the spring after they were finished.
The maidens threw away the lemon peels into Hagatna Spring, but now they were popping up in Pago Bay. Which can only mean the peels were passing through the island, how did that happen? It could only mean the fish was nibbling under the island. A maiden cried out, discovering this new information, "We're surely doomed." Another maiden came forward and said, "Maybe we can outsmart the fish." The fish will be lured into swimming to Hagatna spring and set up a trap. The women came together to gather to trim their precious hair and wove it into a net. The net grew large enough to spread out in every direction of the bay. Each maiden held onto the edges and spread out to sing, waiting for the fish by the spring.
^^This is not an accurate representation, as the ancient people did not wear clothes. And they cut their hair to make the net.
Their song carried under the island, and the soothing sound carried underwater to the giant fishes lair. Little by little, it slowly swam closer to listen to the maiden's song. They sang and sang until they came up with new songs. The massive fish swam closer and emerges from the water. The maiden jumped into the spring surrounding it with their net to capture it. Their net didn't give way no matter how much the fish struggled. It was a success.
One maiden immediately ran to Hagatna to tell the others they had captured the giant fish and that the island was saved.
Everyone rushed to the spring to see the freshly caught fish and were overjoyed. The maidens were celebrated for saving the island when men's strength did not. Everyone ate the fish! Happy time!
Historical Context:
Here you can see the distance of how far the lemon peels traveled under the island. And the shape of the bay. Legends are always fun to explore of how something came to be.
Hello Dear Reader! I hope you enjoy my content? I am curious to hear your thoughts. Do you like what you see?
I'll be grateful for your feedback. Please feel free to leave a comment. Thank you
-
@ 39cc53c9:27168656
2024-04-17 16:53:09I've been thinking about how to improve my seed backup in a cheap and cool way, mostly for fun. Until now, I had the seed written on a piece of paper in a desk drawer, and I wanted something more durable and fire-proof.
After searching online, I found two options I liked the most: the Cryptosteel Capsule and the Trezor Keep. These products are nice but quite expensive, and I didn't want to spend that much on my seed backup. Privacy is also important, and sharing details like a shipping address makes me uncomfortable. This concern has grown since the Ledger incident^1. A $5 wrench attack^2 seems too cheap, even if you only hold a few sats.
Upon seeing the design of Cryptosteel, I considered creating something similar at home. Although it may not be as cool as their device, it could offer almost the same in terms of robustness and durability.
Step 1: Get the materials and tools
When choosing the materials, you will want to go with stainless steel. It is durable, resistant to fire, water, and corrosion, very robust, and does not rust. Also, its price point is just right; it's not the cheapest, but it's cheap for the value you get.
I went to a material store and bought:
- Two bolts
- Two hex nuts and head nuts for the bolts
- A bag of 30 washers
All items were made of stainless steel. The total price was around €6. This is enough for making two seed backups.
You will also need:
- A set of metal letter stamps (I bought a 2mm-size letter kit since my washers were small, 6mm in diameter)
- You can find these in local stores or online marketplaces. The set I bought cost me €13.
- A good hammer
- A solid surface to stamp on
Total spent: 19€ for two backups
Step 2: Stamp and store
Once you have all the materials, you can start stamping your words. There are many videos on the internet that use fancy 3D-printed tools to get the letters nicely aligned, but I went with the free-hand option. The results were pretty decent.
I only stamped the first 4 letters for each word since the BIP-39 wordlist allows for this. Because my stamping kit did not include numbers, I used alphabet letters to define the order. This way, if all the washers were to fall off, I could still reassemble the seed correctly.
The final result
So this is the final result. I added two smaller washers as protection and also put the top washer reversed so the letters are not visible:
Compared to the Cryptosteel or the Trezor Keep, its size is much more compact. This makes for an easier-to-hide backup, in case you ever need to hide it inside your human body.
Some ideas
Tamper-evident seal
To enhance the security this backup, you can consider using a tamper-evident seal. This can be easily achieved by printing a unique image or using a specific day's newspaper page (just note somewhere what day it was).
Apply a thin layer of glue to the washer's surface and place the seal over it. If someone attempts to access the seed, they will be forced to destroy the seal, which will serve as an evident sign of tampering.
This simple measure will provide an additional layer of protection and allow you to quickly identify any unauthorized access attempts.
Note that this method is not resistant to outright theft. The tamper-evident seal won't stop a determined thief but it will prevent them from accessing your seed without leaving any trace.
Redundancy
Make sure to add redundancy. Make several copies of this cheap backup, and store them in separate locations.
Unique wordset
Another layer of security could be to implement your own custom mnemonic dictionary. However, this approach has the risk of permanently losing access to your funds if not implemented correctly.
If done properly, you could potentially end up with a highly secure backup, as no one else would be able to derive the seed phrase from it. To create your custom dictionary, assign a unique number from 1 to 2048 to a word of your choice. Maybe you could use a book, and index the first 2048 unique words that appear. Make sure to store this book and even get a couple copies of it (digitally and phisically).
This self-curated set of words will serve as your personal BIP-39 dictionary. When you need to translate between your custom dictionary and the official BIP-39 wordlist, simply use the index number to find the corresponding word in either list.
Never write the idex or words on your computer (Do not use
Ctr+F
) -
@ 3c984938:2ec11289
2024-04-16 17:14:58Hello (N)osytrs!
Yes! I'm calling you an (N)oystr!
Why is that? Because you shine, and I'm not just saying that to get more SATs. Ordinary Oysters and mussels can produce these beauties! Nothing seriously unique about them, however, with a little time and love each oyster is capable of creating something truly beautiful. I like believing so, at least, given the fact that you're even reading this article; makes you an (N)oystr! This isn't published this on X (formerly known as Twitter), Facebook, Discord, Telegram, or Instagram, which makes you the rare breed! A pearl indeed! I do have access to those platforms, but why create content on a terrible platform knowing I too could be shut down! Unfortunately, many people still use these platforms. This forces individuals to give up their privacy every day. Meta is leading the charge by forcing users to provide a photo ID for verification in order to use their crappy, obsolete site. If that was not bad enough, imagine if you're having a type of disagreement or opinion. Then, Bigtech can easily deplatform you. Umm. So no open debate? Just instantly shut-off users. Whatever, happened to right to a fair trial? Nope, just burning you at the stake as if you're a witch or warlock!
How heinous are the perpetrators and financiers of this? Well, that's opening another can of worms for you.
Imagine your voice being taken away, like the little mermaid. Ariel was lucky to have a prince, but the majority of us? The likelihood that I would be carried away by the current of the sea during a sunset with a prince on a sailboat is zero. And I live on an island, so I'm just missing the prince, sailboat(though I know where I could go to steal one), and red hair. Oh my gosh, now I feel sad.
I do not have the prince, Bob is better! I do not have mermaid fins, or a shell bra. Use coconut shells, it offers more support! But, I still have my voice and a killer sunset to die for!
All of that is possible thanks to the work of developers. These knights fight for Freedom Tech by utilizing FOSS, which help provides us with a vibrant ecosystem. Unfortunately, I recently learned that they are not all funded. Knights must eat, drink, and have a work space. This space is where they spend most of their sweat equity on an app or software that may and may not pan out. That brilliance is susceptible to fading, as these individuals are not seen but rather stay behind closed doors. What's worse, if these developers lose faith in their project and decide to join forces with Meta! 😖 Does WhatsApp ring a bell?
Without them, I probably wouldn't be able to create this long form article. Let's cheer them on like cheerleaders.. 👉Unfortunately, there's no cheerleader emoji so you'll just have to settle for a dancing lady, n guy. 💃🕺
Semisol said it beautifully, npub12262qa4uhw7u8gdwlgmntqtv7aye8vdcmvszkqwgs0zchel6mz7s6cgrkj
If we want freedom tech to succeed, the tools that make it possible need to be funded: relays like https://nostr.land, media hosts like https://nostr.build, clients like https://damus.io, etc.
With that thought, Onigirl is pleased to announce the launch of a new series. With a sole focus on free market devs/projects.
Knights of Nostr!
I'll happily brief you about their exciting project and how it benefits humanity! Let's Support these Magnificent projects, devs, relays, and builders! Our first runner up!
Oppa Fishcake :Lord of Media Hosting
npub137c5pd8gmhhe0njtsgwjgunc5xjr2vmzvglkgqs5sjeh972gqqxqjak37w
Oppa Fishcake with his noble steed!
Think of this as an introduction to learn and further your experience on Nostr! New developments and applications are constantly happening on Nostr. It's enough to make one's head spin. I may also cover FOSS projects(outside of Nostr) as they need some love as well! Plus, you can think of it as another tool to add to your decentralized life. I will not be doing how-to-Nostr guides. I personally feel there are plenty of great guides already available! Which I'm happy to add to curation collection via easily searchable on Yakihonne.
For email updates you can subscribe to my [[https://paragraph.xyz/@onigirl]]
If you like it, send me some 🧡💛💚 hearts💜💗💖 otherwise zap dat⚡⚡🍑🍑peach⚡⚡🍑 ~If not me, then at least to our dearest knight!
Thank you from the bottom of my heart for your time and support (N)oystr! Shine bright like a diamond! Share if you care! FOSS power!
Follow on your favorite Nostr Client for the best viewing experience!
[!NOTE]
I'm using Obsidian + Nostr Writer Plugin; a new way to publish Markdown directly to Nostr. I was a little nervous using this because I was used doing them in RStudio; R Markdown.
Since this is my first article, I sent it to my account as a draft to test it. It's pretty neat. -
@ 39cc53c9:27168656
2024-03-28 12:25:32Bitcoin enthusiasts frequently and correctly remark how much value it adds to Bitcoin not to have a face, a leader, or a central authority behind it. This particularity means there isn't a single person to exert control over, or a single human point of failure who could become corrupt or harmful to the project.
Because of this, it is said that no other coin can be equally valuable as Bitcoin in terms of decentralization and trustworthiness. Bitcoin is unique not just for being first, but also because of how the events behind its inception developed. This implies that, from Bitcoin onwards, any coin created would have been created by someone, consequently having an authority behind it. For this and some other reasons, some people refer to Bitcoin as "The Immaculate Conception".
While other coins may have their own unique features and advantages, they may not be able to replicate Bitcoin's community-driven nature. However, one other cryptocurrency shares a similar story of mystery behind its creation: Monero.
History of Monero
Bytecoin and CryptoNote
In March 2014, a Bitcointalk thread titled "Bytecoin. Secure, private, untraceable since 2012" was initiated by a user under the nickname "DStrange"^1^. DStrange presented Bytecoin (BCN) as a unique cryptocurrency, in operation since July 2012. Unlike Bitcoin, it employed a new algorithm known as CryptoNote.
DStrange apparently stumbled upon the Bytecoin website by chance while mining a dying bitcoin fork, and decided to create a thread on Bitcointalk^1^. This sparked curiosity among some users, who wondered how could Bytecoin remain unnoticed since its alleged launch in 2012 until then^2^.
Some time after, a user brought up the "CryptoNote v2.0" whitepaper for the first time, underlining its innovative features^4^. Authored by the pseudonymous Nicolas van Saberhagen in October 2013, the CryptoNote v2 whitepaper^5^ highlighted the traceability and privacy problems in Bitcoin. Saberhagen argued that these flaws could not be quickly fixed, suggesting it would be more efficient to start a new project rather than trying to patch the original^5^, an statement simmilar to the one from Satoshi Nakamoto^6^.
Checking with Saberhagen's digital signature, the release date of the whitepaper seemed correct, which would mean that Cryptonote (v1) was created in 2012^7^, although there's an important detail: "Signing time is from the clock on the signer's computer" ^9^.
Moreover, the whitepaper v1 contains a footnote link to a Bitcointalk post dated May 5, 2013^10^, making it impossible for the whitepaper to have been signed and released on December 12, 2012.
As the narrative developed, users discovered that a significant 80% portion of Bytecoin had been pre-mined^11^ and blockchain dates seemed to be faked to make it look like it had been operating since 2012, leading to controversy surrounding the project.
The origins of CryptoNote and Bytecoin remain mysterious, leaving suspicions of a possible scam attempt, although the whitepaper had a good amount of work and thought on it.
The fork
In April 2014, the Bitcointalk user
thankful_for_today
, who had also participated in the Bytecoin thread^12^, announced plans to launch a Bytecoin fork named Bitmonero^13^.The primary motivation behind this fork was "Because there is a number of technical and marketing issues I wanted to do differently. And also because I like ideas and technology and I want it to succeed"^14^. This time Bitmonero did things different from Bytecoin: there was no premine or instamine, and no portion of the block reward went to development.
However, thankful_for_today proposed controversial changes that the community disagreed with. Johnny Mnemonic relates the events surrounding Bitmonero and thankful_for_today in a Bitcointalk comment^15^:
When thankful_for_today launched BitMonero [...] he ignored everything that was discussed and just did what he wanted. The block reward was considerably steeper than what everyone was expecting. He also moved forward with 1-minute block times despite everyone's concerns about the increase of orphan blocks. He also didn't address the tail emission concern that should've (in my opinion) been in the code at launch time. Basically, he messed everything up. Then, he disappeared.
After disappearing for a while, thankful_for_today returned to find that the community had taken over the project. Johnny Mnemonic continues:
I, and others, started working on new forks that were closer to what everyone else was hoping for. [...] it was decided that the BitMonero project should just be taken over. There were like 9 or 10 interested parties at the time if my memory is correct. We voted on IRC to drop the "bit" from BitMonero and move forward with the project. Thankful_for_today suddenly resurfaced, and wasn't happy to learn the community had assumed control of the coin. He attempted to maintain his own fork (still calling it "BitMonero") for a while, but that quickly fell into obscurity.
The unfolding of these events show us the roots of Monero. Much like Satoshi Nakamoto, the creators behind CryptoNote/Bytecoin and thankful_for_today remain a mystery^17^, having disappeared without a trace. This enigma only adds to Monero's value.
Since community took over development, believing in the project's potential and its ability to be guided in a better direction, Monero was given one of Bitcoin's most important qualities: a leaderless nature. With no single face or entity directing its path, Monero is safe from potential corruption or harm from a "central authority".
The community continued developing Monero until today. Since then, Monero has undergone a lot of technological improvements, migrations and achievements such as RingCT and RandomX. It also has developed its own Community Crowdfundinc System, conferences such as MoneroKon and Monerotopia are taking place every year, and has a very active community around it.
Monero continues to develop with goals of privacy and security first, ease of use and efficiency second. ^16^
This stands as a testament to the power of a dedicated community operating without a central figure of authority. This decentralized approach aligns with the original ethos of cryptocurrency, making Monero a prime example of community-driven innovation. For this, I thank all the people involved in Monero, that lead it to where it is today.
If you find any information that seems incorrect, unclear or any missing important events, please contact me and I will make the necessary changes.
Sources of interest
- https://forum.getmonero.org/20/general-discussion/211/history-of-monero
- https://monero.stackexchange.com/questions/852/what-is-the-origin-of-monero-and-its-relationship-to-bytecoin
- https://en.wikipedia.org/wiki/Monero
- https://bitcointalk.org/index.php?topic=583449.0
- https://bitcointalk.org/index.php?topic=563821.0
- https://bitcointalk.org/index.php?action=profile;u=233561
- https://bitcointalk.org/index.php?topic=512747.0
- https://bitcointalk.org/index.php?topic=740112.0
- https://monero.stackexchange.com/a/1024
- https://inspec2t-project.eu/cryptocurrency-with-a-focus-on-anonymity-these-facts-are-known-about-monero/
- https://medium.com/coin-story/coin-perspective-13-riccardo-spagni-69ef82907bd1
- https://www.getmonero.org/resources/about/
- https://www.wired.com/2017/01/monero-drug-dealers-cryptocurrency-choice-fire/
- https://www.monero.how/why-monero-vs-bitcoin
- https://old.reddit.com/r/Monero/comments/u8e5yr/satoshi_nakamoto_talked_about_privacy_features/
-
@ 44dc1c2d:31c74f0b
2024-03-25 21:41:15Chef's notes
When adding things like extra veggies, if you don't want them to be mush, consider roasting veggies in the oven and only adding them near then end of the cook time. The same is generally true for meats.
While Parmesan is traditional, almost any cheese will work.
Choose your broth based on your needs (IE a veggie stock to make it more vegetarian friendly), water or more stock can be used in place of wine if need be.
Details
- ⏲️ Prep time: 20 min
- 🍳 Cook time: 25 min
- 🍽️ Servings: 4 mains or ~6 appetizers
Ingredients
- 1 onion, DIced
- ¼ cup butter
- 2 cups arborio rice
- 1 cup white wine
- 6 to 8 cups warm chicken broth
- 1 cup grated Parmigiano-Reggiano cheese
Directions
- In a large saucepan over medium heat, soften the onion in half the butter. Add the rice and cook for 1 minute, stirring to coat well. Add the white wine and reduce until almost dry.
- Add the broth, about 1 cup at a time, stirring frequently until the liquid is completely absorbed before adding more broth. Season with salt and pepper. Cook for 18 to 22 minutes or until the rice is al dente. Add broth, as needed.
- Take off the heat and add the cheese, the remaining butter and the toppings of your choice. Stir until the texture is very creamy. Adjust the seasoning.
- Dish up, sprinkle with a little Parmesan cheese, if desired. Enjoy.
-
@ 44dc1c2d:31c74f0b
2024-03-23 22:14:17Chef's notes
Recommend kosher salt for this recipe as it has a better flavor with the cream.
If you have foam, either skim the top or you can use a torch to get a glass smooth finish on the top.
Details
- ⏲️ Prep time: 30 min
- 🍳 Cook time: 40 min
- 🍽️ Servings: 6
Ingredients
- 2 cups heavy cream
- 10 tablespoons sugar, divided
- 1 vanilla bean (or 1 teaspoon vanilla extract)
- 4 large egg yolks
- 1/2 teaspoon vanilla extract
- 1/4 teaspoon kosher salt
- For the Brûlée topping:
- 4 tablespoons sugar (2 teaspoons per ramekin)
Directions
- Preheat oven to 325°F with a rack in the middle position: Arrange six 4-ounce ramekins in a 9x13 baking dish and set aside.
- Prepare the vanilla bean: Split the vanilla bean in half and scrape out the seeds with the dull (non-cutting) side of a paring knife.
- Warm the cream: In a medium saucepan, combine heavy cream, 4 tablespoons of the sugar, vanilla bean pod, vanilla bean seeds, and salt. Cook over medium heat, until it begins to simmer.
- Infuse the cream: Once the cream begins to simmer, remove the pan from heat, cover, and let stand for 15 minutes to allow the vanilla bean to infuse into the cream. (If you’re replacing the vanilla bean with vanilla extract, skip this step.)
- Separate the eggs and whisk with sugar: When your cream is almost done infusing, separate your eggs. Place the yolks in a medium-sized mixing bowl; save the whites for another purpose. Whisk the remaining 6 tablespoons of sugar into the yolks. (Don't combine the eggs and sugar too soon before you mix it with the warm cream because the sugar binds with the water in egg yolks, which constricts the proteins in yolks and creates eggy lumps. And you don't want eggy lumps in your custard!)
- Temper the yolks and mix with the cream: While whisking the yolks continuously, slowly add one ladle (about 1/4 or 1/3 cup) of hot cream in a thin stream. Do this two or three more times. While whisking, slowly add the remaining cream to the egg mixture, followed by the vanilla extract. Strain the mixture through a fine mesh sieve into a second mixing bowl and discard the vanilla bean pod (this also helps strain out any small bits of egg that may have curdled).
- At this point, the custard can be cooled and stored for up to 5 days. If you choose to bake them right from the fridge, you will probably need to add a couple of extra minutes.
- Fill the ramekins: Divide the custard between the ramekins, filling each one just up to the inner rim, or about three-quarters of the way full.
- Fill the hot water bath: Bring a kettle or pot of water to a boil. Fill the pan with the hot water until the water comes about two-thirds of the way up the side of the ramekins. Avoid splashing water into the custards.
- Bake the custards: Transfer the pan with the custards to the oven and bake for 38 to 40 minutes. When ready, the crème brûlée should have a uniform jiggle in the middle; when you touch the center, it should spring back just a bit. If the sides hold firm but the center sloshes, they aren’t quite done yet. If they are set like Jell-O, they’ve overbaked, although they will still be delicious! Chill them, brûlée them, eat them, love them and celebrate your efforts. If they have overbaked to the point that they look risen in the center, toss them, start again
- Cool and chill the custards: Remove the baking dish with the finished custards from the oven and set on a wire cooling rack. Let the custards cool in the water until you can safely pick up the ramekins by the rim with your fingers. This should take about 15 minutes, depending on how tender your fingers are. (Mine are like asbestos, so I tend to go in rather quickly.) Once removed from the water bath, let each custard rest on the cooling rack for about 15 more minutes. Use a spoon to skim any bubbles off the top, then cover each ramekin with plastic wrap and store in the fridge. Chill for at least 4 hours, or up to 4 days, before serving.
- Brûlée the custards: When ready to serve, remove the custards from fridge. Sprinkle the surface of each custard evenly with about 1 teaspoon of granulated sugar. Rotate the custard as you sprinkle to make sure the sugar evenly coats the surface. Ignite your torch. Hold the flame about 4 inches from the surface of the sugar. Using a circular motion, move the flame across the surface. The sugar will at first begin to bead up, and then will eventually solidify into a hard sugar crust. You want to make sure all the sugar granules have melted, and the sugar has at least a tint of caramel color. The longer you torch the surface, the darker it will become and the more bitter the sugar crust will be. Sprinkle each of the custards with an additional teaspoon of sugar and brûlée the surface again.