-
@ 04c915da:3dfbecc9
2025-02-25 03:55:08Here’s a revised timeline of macro-level events from The Mandibles: A Family, 2029–2047 by Lionel Shriver, reimagined in a world where Bitcoin is adopted as a widely accepted form of money, altering the original narrative’s assumptions about currency collapse and economic control. In Shriver’s original story, the failure of Bitcoin is assumed amid the dominance of the bancor and the dollar’s collapse. Here, Bitcoin’s success reshapes the economic and societal trajectory, decentralizing power and challenging state-driven outcomes.
Part One: 2029–2032
-
2029 (Early Year)\ The United States faces economic strain as the dollar weakens against global shifts. However, Bitcoin, having gained traction emerges as a viable alternative. Unlike the original timeline, the bancor—a supranational currency backed by a coalition of nations—struggles to gain footing as Bitcoin’s decentralized adoption grows among individuals and businesses worldwide, undermining both the dollar and the bancor.
-
2029 (Mid-Year: The Great Renunciation)\ Treasury bonds lose value, and the government bans Bitcoin, labeling it a threat to sovereignty (mirroring the original bancor ban). However, a Bitcoin ban proves unenforceable—its decentralized nature thwarts confiscation efforts, unlike gold in the original story. Hyperinflation hits the dollar as the U.S. prints money, but Bitcoin’s fixed supply shields adopters from currency devaluation, creating a dual-economy split: dollar users suffer, while Bitcoin users thrive.
-
2029 (Late Year)\ Dollar-based inflation soars, emptying stores of goods priced in fiat currency. Meanwhile, Bitcoin transactions flourish in underground and online markets, stabilizing trade for those plugged into the bitcoin ecosystem. Traditional supply chains falter, but peer-to-peer Bitcoin networks enable local and international exchange, reducing scarcity for early adopters. The government’s gold confiscation fails to bolster the dollar, as Bitcoin’s rise renders gold less relevant.
-
2030–2031\ Crime spikes in dollar-dependent urban areas, but Bitcoin-friendly regions see less chaos, as digital wallets and smart contracts facilitate secure trade. The U.S. government doubles down on surveillance to crack down on bitcoin use. A cultural divide deepens: centralized authority weakens in Bitcoin-adopting communities, while dollar zones descend into lawlessness.
-
2032\ By this point, Bitcoin is de facto legal tender in parts of the U.S. and globally, especially in tech-savvy or libertarian-leaning regions. The federal government’s grip slips as tax collection in dollars plummets—Bitcoin’s traceability is low, and citizens evade fiat-based levies. Rural and urban Bitcoin hubs emerge, while the dollar economy remains fractured.
Time Jump: 2032–2047
- Over 15 years, Bitcoin solidifies as a global reserve currency, eroding centralized control. The U.S. government adapts, grudgingly integrating bitcoin into policy, though regional autonomy grows as Bitcoin empowers local economies.
Part Two: 2047
-
2047 (Early Year)\ The U.S. is a hybrid state: Bitcoin is legal tender alongside a diminished dollar. Taxes are lower, collected in BTC, reducing federal overreach. Bitcoin’s adoption has decentralized power nationwide. The bancor has faded, unable to compete with Bitcoin’s grassroots momentum.
-
2047 (Mid-Year)\ Travel and trade flow freely in Bitcoin zones, with no restrictive checkpoints. The dollar economy lingers in poorer areas, marked by decay, but Bitcoin’s dominance lifts overall prosperity, as its deflationary nature incentivizes saving and investment over consumption. Global supply chains rebound, powered by bitcoin enabled efficiency.
-
2047 (Late Year)\ The U.S. is a patchwork of semi-autonomous zones, united by Bitcoin’s universal acceptance rather than federal control. Resource scarcity persists due to past disruptions, but economic stability is higher than in Shriver’s original dystopia—Bitcoin’s success prevents the authoritarian slide, fostering a freer, if imperfect, society.
Key Differences
- Currency Dynamics: Bitcoin’s triumph prevents the bancor’s dominance and mitigates hyperinflation’s worst effects, offering a lifeline outside state control.
- Government Power: Centralized authority weakens as Bitcoin evades bans and taxation, shifting power to individuals and communities.
- Societal Outcome: Instead of a surveillance state, 2047 sees a decentralized, bitcoin driven world—less oppressive, though still stratified between Bitcoin haves and have-nots.
This reimagining assumes Bitcoin overcomes Shriver’s implied skepticism to become a robust, adopted currency by 2029, fundamentally altering the novel’s bleak trajectory.
-
-
@ da0b9bc3:4e30a4a9
2025-03-09 07:38:43Hello Stackers!
Welcome on into the ~Music Corner of the Saloon!
A place where we Talk Music. Share Tracks. Zap Sats.
So stay a while and listen.
🚨Don't forget to check out the pinned items in the territory homepage! You can always find the latest weeklies there!🚨
🚨Subscribe to the territory to ensure you never miss a post! 🚨
originally posted at https://stacker.news/items/908081
-
@ e3ba5e1a:5e433365
2025-02-13 06:16:49My favorite line in any Marvel movie ever is in “Captain America.” After Captain America launches seemingly a hopeless assault on Red Skull’s base and is captured, we get this line:
“Arrogance may not be a uniquely American trait, but I must say, you do it better than anyone.”
Yesterday, I came across a comment on the song Devil Went Down to Georgia that had a very similar feel to it:
America has seemingly always been arrogant, in a uniquely American way. Manifest Destiny, for instance. The rest of the world is aware of this arrogance, and mocks Americans for it. A central point in modern US politics is the deriding of racist, nationalist, supremacist Americans.
That’s not what I see. I see American Arrogance as not only a beautiful statement about what it means to be American. I see it as an ode to the greatness of humanity in its purest form.
For most countries, saying “our nation is the greatest” is, in fact, twinged with some level of racism. I still don’t have a problem with it. Every group of people should be allowed to feel pride in their accomplishments. The destruction of the human spirit since the end of World War 2, where greatness has become a sin and weakness a virtue, has crushed the ability of people worldwide to strive for excellence.
But I digress. The fears of racism and nationalism at least have a grain of truth when applied to other nations on the planet. But not to America.
That’s because the definition of America, and the prototype of an American, has nothing to do with race. The definition of Americanism is freedom. The founding of America is based purely on liberty. On the God-given rights of every person to live life the way they see fit.
American Arrogance is not a statement of racial superiority. It’s barely a statement of national superiority (though it absolutely is). To me, when an American comments on the greatness of America, it’s a statement about freedom. Freedom will always unlock the greatness inherent in any group of people. Americans are definitionally better than everyone else, because Americans are freer than everyone else. (Or, at least, that’s how it should be.)
In Devil Went Down to Georgia, Johnny is approached by the devil himself. He is challenged to a ridiculously lopsided bet: a golden fiddle versus his immortal soul. He acknowledges the sin in accepting such a proposal. And yet he says, “God, I know you told me not to do this. But I can’t stand the affront to my honor. I am the greatest. The devil has nothing on me. So God, I’m gonna sin, but I’m also gonna win.”
Libertas magnitudo est
-
@ c913b8e3:8704332c
2025-03-09 07:13:10The markets are returning to normal? Everything was priced for perfection. The S&P 500 gaining over 30% for two consecutive years is not normal. Maybe we go back to a normal return of 4-8% per year? But really, what even is "normal" nowadays?
Passive investing is a huge problem, but that's a rant for another day. It's certainly not normal.
The past 5-6 years have nothing to do with real investing. It has become gambling and peak idiocy. Do I seriously think I'm smarter and can pick the right stocks? Does contrarian investing always work? Why has it worked lately?
People have become slaves to algorithms, completely losing the ability to think objectively. Just a massive idiotic blob bulldozing through logic.
Even very successful people have pitched meme stocks to me - stocks already up 300-500%, without real businesses behind them. What's the upside? Seriously, what's the point? If insiders are selling, the stock has soared hundreds of percent, isn't profitable, and your info comes from Reddit or X - stop and ask yourself, are you an idiot?
The market has been about predicting where this mindless blob moves next. Sorry, I missed the train that "Rearming Europe" would become the hot narrative, making European defense stocks the next "big thing." Or German cement business. This is exorbitant. I've said it for years: the market is turning into a cryptocasino. To succeed, you have to obsessively live and breathe the next trending narrative - it requires zero skill, just madness.
Politics mirror the market’s idiocy. Mention Trump here in Finland, and people lose their minds, incapable of rational discussion or seeing the bigger picture. I've lost friendships just by suggesting peace negotiations. Finnish media pushes a singular narrative through the same old fear-mongering analysts, conveniently now riding the EU gravy train to Brussels. How ironic.
Europe
Now the narrative is shifting to Europe. Europe is great! Or is it? Finnish politicians who once opposed collective EU debt now love it because "Russia." They're even ready to seize Russian assets.
Increasing defense spending might make sense, but funding it with debt? Even Germany, the last bastion of economic sense, is piling on debt, with Poland and the rest close behind. Hard work and tough decisions are too much effort - take on more debt!
Euro stocks might rise, but why own them? Europe lacks essential resources like raw materials, energy, oil - and frankly, competent leadership. Money won't fix structural problems.
In Finland, purchasing power has regressed 15-20 years. Are you ready for another hit?
Europe is slowly becoming more like Russia: bureaucratic, corrupt, and convinced that more central planning will magically solve everything. Good luck with that.
Maybe it's time we think less about ourselves and more about building something better for our kids. Otherwise, what are we even doing?The markets are returning to normal? Everything was priced for perfection. The S&P 500 gaining over 30% for two consecutive years is not normal. Maybe we go back to a normal return of 4-8% per year? But really, what even is "normal" nowadays?
Passive investing is a huge problem, but that's a rant for another day. It's certainly not normal.
The past 5-6 years have nothing to do with real investing. It has become gambling and peak idiocy. Do I seriously think I'm smarter and can pick the right stocks? Does contrarian investing always work? Why has it worked lately?
People have become slaves to algorithms, completely losing the ability to think objectively. Just a massive idiotic blob bulldozing through logic.
Even very successful people have pitched meme stocks to me - stocks already up 300-500%, without real businesses behind them. What's the upside? Seriously, what's the point? If insiders are selling, the stock has soared hundreds of percent, isn't profitable, and your info comes from Reddit or X - stop and ask yourself, are you an idiot?
The market has been about predicting where this mindless blob moves next. Sorry, I missed the train that "Rearming Europe" would become the hot narrative, making European defense stocks the next "big thing." Or German cement business. This is exorbitant. I've said it for years: the market is turning into a cryptocasino. To succeed, you have to obsessively live and breathe the next trending narrative - it requires zero skill, just madness.
Politics mirror the market’s idiocy. Mention Trump here in Finland, and people lose their minds, incapable of rational discussion or seeing the bigger picture. I've lost friendships just by suggesting peace negotiations. Finnish media pushes a singular narrative through the same old fear-mongering analysts, conveniently now riding the EU gravy train to Brussels. How ironic.
Europe Now the narrative is shifting to Europe. Europe is great! Or is it? Finnish politicians who once opposed collective EU debt now love it because "Russia." They're even ready to seize Russian assets.
Increasing defense spending might make sense, but funding it with debt? Even Germany, the last bastion of economic sense, is piling on debt, with Poland and the rest close behind. Hard work and tough decisions are too much effort - take on more debt!
Euro stocks might rise, but why own them? Europe lacks essential resources like raw materials, energy, oil - and frankly, competent leadership. Money won't fix structural problems.
In Finland, purchasing power has regressed 15-20 years. Are you ready for another hit?
Europe is slowly becoming more like Russia: bureaucratic, corrupt, and convinced that more central planning will magically solve everything. Good luck with that.
Maybe it's time we think less about ourselves and more about building something better for our kids. Otherwise, what are we even doing?
-
@ 0fa80bd3:ea7325de
2025-01-30 04:28:30"Degeneration" or "Вырождение" ![[photo_2025-01-29 23.23.15.jpeg]]
A once-functional object, now eroded by time and human intervention, stripped of its original purpose. Layers of presence accumulate—marks, alterations, traces of intent—until the very essence is obscured. Restoration is paradoxical: to reclaim, one must erase. Yet erasure is an impossibility, for to remove these imprints is to deny the existence of those who shaped them.
The work stands as a meditation on entropy, memory, and the irreversible dialogue between creation and decay.
-
@ 0fa80bd3:ea7325de
2025-01-29 15:43:42Lyn Alden - биткойн евангелист или евангелистка, я пока не понял
npub1a2cww4kn9wqte4ry70vyfwqyqvpswksna27rtxd8vty6c74era8sdcw83a
Thomas Pacchia - PubKey owner - X - @tpacchia
npub1xy6exlg37pw84cpyj05c2pdgv86hr25cxn0g7aa8g8a6v97mhduqeuhgpl
calvadev - Shopstr
npub16dhgpql60vmd4mnydjut87vla23a38j689jssaqlqqlzrtqtd0kqex0nkq
Calle - Cashu founder
npub12rv5lskctqxxs2c8rf2zlzc7xx3qpvzs3w4etgemauy9thegr43sf485vg
Джек Дорси
npub1sg6plzptd64u62a878hep2kev88swjh3tw00gjsfl8f237lmu63q0uf63m
21 ideas
npub1lm3f47nzyf0rjp6fsl4qlnkmzed4uj4h2gnf2vhe3l3mrj85vqks6z3c7l
Много адресов. Хз кто надо сортировать
https://github.com/aitechguy/nostr-address-book
ФиатДжеф - создатель Ностр - https://github.com/fiatjaf
npub180cvv07tjdrrgpa0j7j7tmnyl2yr6yr7l8j4s3evf6u64th6gkwsyjh6w6
EVAN KALOUDIS Zues wallet
npub19kv88vjm7tw6v9qksn2y6h4hdt6e79nh3zjcud36k9n3lmlwsleqwte2qd
Программер Коди https://github.com/CodyTseng/nostr-relay
npub1syjmjy0dp62dhccq3g97fr87tngvpvzey08llyt6ul58m2zqpzps9wf6wl
Anna Chekhovich - Managing Bitcoin at The Anti-Corruption Foundation https://x.com/AnyaChekhovich
npub1y2st7rp54277hyd2usw6shy3kxprnmpvhkezmldp7vhl7hp920aq9cfyr7
-
@ 6e0ea5d6:0327f353
2025-03-09 01:45:29Breaking a promise is like carrying a gun without ammunition. You raise your hand, make a threat, but when the shot is expected, nothing happens.
And what is worse than a man who makes empty promises? He inspires no trust, commands no respect; he is an imposter, a farce. An unkept word is like steel that rusts: dull, without edge, without honor. And what remains of a man who has no honor? Nothing! He is a walking corpse, awaiting the moment when he will be devoured by vultures that already scent him from afar.
When you speak, every syllable must be as heavy as lead, sharp as a Sicilian blade, and as final as a fatal blow. Words are not wind; they are hammers that build or destroy empires. A man who opens his mouth without being willing to stand by every word spoken is a fool building his own ruin with bricks of falseness. And let’s be clear: a fool doesn’t last long in this world of ours. He is swallowed, crushed, and spit out like remnants by the relentless machine of life. A word is your contract with the world, and breaking that contract is signing your sentence of social death.
Made a mistake? Bene, mistakes are inevitable. Ma, ecco il punto: the difference between an honorable man and a miserable one is how quickly he corrects the error. Letting a mistake grow is like allowing a snake to coil around your neck. With every passing minute, the noose tightens, the air runs out, and the only certainty is the approaching death. An uncorrected mistake is like poison running through your veins; the antidote is simple, but few have the courage to administer it. Correcting yourself is not a choice, it’s a matter of survival.
Only the weak cling blindly to their mistakes, preferring to sink into their illusions than face the weight of the truth. The true man, the one forged in fire and pain, reassesses, reconsiders, and changes course without hesitation. Persisting in error is the path of the defeated.
A man without his word is like a traitor, and you know very well the fate reserved for traitors. There is no forgiveness, no second chance. The traitor deserves no mercy; he is a dead weight that must be swiftly eliminated before he contaminates everything around him with the stench of his dishonor.
Thank you for reading, my friend!
If this message resonated with you, consider leaving your "🥃" as a token of appreciation.
A toast to our family!
-
@ 6be5cc06:5259daf0
2025-01-21 01:51:46Bitcoin: Um sistema de dinheiro eletrônico direto entre pessoas.
Satoshi Nakamoto
satoshin@gmx.com
www.bitcoin.org
Resumo
O Bitcoin é uma forma de dinheiro digital que permite pagamentos diretos entre pessoas, sem a necessidade de um banco ou instituição financeira. Ele resolve um problema chamado gasto duplo, que ocorre quando alguém tenta gastar o mesmo dinheiro duas vezes. Para evitar isso, o Bitcoin usa uma rede descentralizada onde todos trabalham juntos para verificar e registrar as transações.
As transações são registradas em um livro público chamado blockchain, protegido por uma técnica chamada Prova de Trabalho. Essa técnica cria uma cadeia de registros que não pode ser alterada sem refazer todo o trabalho já feito. Essa cadeia é mantida pelos computadores que participam da rede, e a mais longa é considerada a verdadeira.
Enquanto a maior parte do poder computacional da rede for controlada por participantes honestos, o sistema continuará funcionando de forma segura. A rede é flexível, permitindo que qualquer pessoa entre ou saia a qualquer momento, sempre confiando na cadeia mais longa como prova do que aconteceu.
1. Introdução
Hoje, quase todos os pagamentos feitos pela internet dependem de bancos ou empresas como processadores de pagamento (cartões de crédito, por exemplo) para funcionar. Embora esse sistema seja útil, ele tem problemas importantes porque é baseado em confiança.
Primeiro, essas empresas podem reverter pagamentos, o que é útil em caso de erros, mas cria custos e incertezas. Isso faz com que pequenas transações, como pagar centavos por um serviço, se tornem inviáveis. Além disso, os comerciantes são obrigados a desconfiar dos clientes, pedindo informações extras e aceitando fraudes como algo inevitável.
Esses problemas não existem no dinheiro físico, como o papel-moeda, onde o pagamento é final e direto entre as partes. No entanto, não temos como enviar dinheiro físico pela internet sem depender de um intermediário confiável.
O que precisamos é de um sistema de pagamento eletrônico baseado em provas matemáticas, não em confiança. Esse sistema permitiria que qualquer pessoa enviasse dinheiro diretamente para outra, sem depender de bancos ou processadores de pagamento. Além disso, as transações seriam irreversíveis, protegendo vendedores contra fraudes, mas mantendo a possibilidade de soluções para disputas legítimas.
Neste documento, apresentamos o Bitcoin, que resolve o problema do gasto duplo usando uma rede descentralizada. Essa rede cria um registro público e protegido por cálculos matemáticos, que garante a ordem das transações. Enquanto a maior parte da rede for controlada por pessoas honestas, o sistema será seguro contra ataques.
2. Transações
Para entender como funciona o Bitcoin, é importante saber como as transações são realizadas. Imagine que você quer transferir uma "moeda digital" para outra pessoa. No sistema do Bitcoin, essa "moeda" é representada por uma sequência de registros que mostram quem é o atual dono. Para transferi-la, você adiciona um novo registro comprovando que agora ela pertence ao próximo dono. Esse registro é protegido por um tipo especial de assinatura digital.
O que é uma assinatura digital?
Uma assinatura digital é como uma senha secreta, mas muito mais segura. No Bitcoin, cada usuário tem duas chaves: uma "chave privada", que é secreta e serve para criar a assinatura, e uma "chave pública", que pode ser compartilhada com todos e é usada para verificar se a assinatura é válida. Quando você transfere uma moeda, usa sua chave privada para assinar a transação, provando que você é o dono. A próxima pessoa pode usar sua chave pública para confirmar isso.
Como funciona na prática?
Cada "moeda" no Bitcoin é, na verdade, uma cadeia de assinaturas digitais. Vamos imaginar o seguinte cenário:
- A moeda está com o Dono 0 (você). Para transferi-la ao Dono 1, você assina digitalmente a transação com sua chave privada. Essa assinatura inclui o código da transação anterior (chamado de "hash") e a chave pública do Dono 1.
- Quando o Dono 1 quiser transferir a moeda ao Dono 2, ele assinará a transação seguinte com sua própria chave privada, incluindo também o hash da transação anterior e a chave pública do Dono 2.
- Esse processo continua, formando uma "cadeia" de transações. Qualquer pessoa pode verificar essa cadeia para confirmar quem é o atual dono da moeda.
Resolvendo o problema do gasto duplo
Um grande desafio com moedas digitais é o "gasto duplo", que é quando uma mesma moeda é usada em mais de uma transação. Para evitar isso, muitos sistemas antigos dependiam de uma entidade central confiável, como uma casa da moeda, que verificava todas as transações. No entanto, isso criava um ponto único de falha e centralizava o controle do dinheiro.
O Bitcoin resolve esse problema de forma inovadora: ele usa uma rede descentralizada onde todos os participantes (os "nós") têm acesso a um registro completo de todas as transações. Cada nó verifica se as transações são válidas e se a moeda não foi gasta duas vezes. Quando a maioria dos nós concorda com a validade de uma transação, ela é registrada permanentemente na blockchain.
Por que isso é importante?
Essa solução elimina a necessidade de confiar em uma única entidade para gerenciar o dinheiro, permitindo que qualquer pessoa no mundo use o Bitcoin sem precisar de permissão de terceiros. Além disso, ela garante que o sistema seja seguro e resistente a fraudes.
3. Servidor Timestamp
Para assegurar que as transações sejam realizadas de forma segura e transparente, o sistema Bitcoin utiliza algo chamado de "servidor de registro de tempo" (timestamp). Esse servidor funciona como um registro público que organiza as transações em uma ordem específica.
Ele faz isso agrupando várias transações em blocos e criando um código único chamado "hash". Esse hash é como uma impressão digital que representa todo o conteúdo do bloco. O hash de cada bloco é amplamente divulgado, como se fosse publicado em um jornal ou em um fórum público.
Esse processo garante que cada bloco de transações tenha um registro de quando foi criado e que ele existia naquele momento. Além disso, cada novo bloco criado contém o hash do bloco anterior, formando uma cadeia contínua de blocos conectados — conhecida como blockchain.
Com isso, se alguém tentar alterar qualquer informação em um bloco anterior, o hash desse bloco mudará e não corresponderá ao hash armazenado no bloco seguinte. Essa característica torna a cadeia muito segura, pois qualquer tentativa de fraude seria imediatamente detectada.
O sistema de timestamps é essencial para provar a ordem cronológica das transações e garantir que cada uma delas seja única e autêntica. Dessa forma, ele reforça a segurança e a confiança na rede Bitcoin.
4. Prova-de-Trabalho
Para implementar o registro de tempo distribuído no sistema Bitcoin, utilizamos um mecanismo chamado prova-de-trabalho. Esse sistema é semelhante ao Hashcash, desenvolvido por Adam Back, e baseia-se na criação de um código único, o "hash", por meio de um processo computacionalmente exigente.
A prova-de-trabalho envolve encontrar um valor especial que, quando processado junto com as informações do bloco, gere um hash que comece com uma quantidade específica de zeros. Esse valor especial é chamado de "nonce". Encontrar o nonce correto exige um esforço significativo do computador, porque envolve tentativas repetidas até que a condição seja satisfeita.
Esse processo é importante porque torna extremamente difícil alterar qualquer informação registrada em um bloco. Se alguém tentar mudar algo em um bloco, seria necessário refazer o trabalho de computação não apenas para aquele bloco, mas também para todos os blocos que vêm depois dele. Isso garante a segurança e a imutabilidade da blockchain.
A prova-de-trabalho também resolve o problema de decidir qual cadeia de blocos é a válida quando há múltiplas cadeias competindo. A decisão é feita pela cadeia mais longa, pois ela representa o maior esforço computacional já realizado. Isso impede que qualquer indivíduo ou grupo controle a rede, desde que a maioria do poder de processamento seja mantida por participantes honestos.
Para garantir que o sistema permaneça eficiente e equilibrado, a dificuldade da prova-de-trabalho é ajustada automaticamente ao longo do tempo. Se novos blocos estiverem sendo gerados rapidamente, a dificuldade aumenta; se estiverem sendo gerados muito lentamente, a dificuldade diminui. Esse ajuste assegura que novos blocos sejam criados aproximadamente a cada 10 minutos, mantendo o sistema estável e funcional.
5. Rede
A rede Bitcoin é o coração do sistema e funciona de maneira distribuída, conectando vários participantes (ou nós) para garantir o registro e a validação das transações. Os passos para operar essa rede são:
-
Transmissão de Transações: Quando alguém realiza uma nova transação, ela é enviada para todos os nós da rede. Isso é feito para garantir que todos estejam cientes da operação e possam validá-la.
-
Coleta de Transações em Blocos: Cada nó agrupa as novas transações recebidas em um "bloco". Este bloco será preparado para ser adicionado à cadeia de blocos (a blockchain).
-
Prova-de-Trabalho: Os nós competem para resolver a prova-de-trabalho do bloco, utilizando poder computacional para encontrar um hash válido. Esse processo é como resolver um quebra-cabeça matemático difícil.
-
Envio do Bloco Resolvido: Quando um nó encontra a solução para o bloco (a prova-de-trabalho), ele compartilha esse bloco com todos os outros nós na rede.
-
Validação do Bloco: Cada nó verifica o bloco recebido para garantir que todas as transações nele contidas sejam válidas e que nenhuma moeda tenha sido gasta duas vezes. Apenas blocos válidos são aceitos.
-
Construção do Próximo Bloco: Os nós que aceitaram o bloco começam a trabalhar na criação do próximo bloco, utilizando o hash do bloco aceito como base (hash anterior). Isso mantém a continuidade da cadeia.
Resolução de Conflitos e Escolha da Cadeia Mais Longa
Os nós sempre priorizam a cadeia mais longa, pois ela representa o maior esforço computacional já realizado, garantindo maior segurança. Se dois blocos diferentes forem compartilhados simultaneamente, os nós trabalharão no primeiro bloco recebido, mas guardarão o outro como uma alternativa. Caso o segundo bloco eventualmente forme uma cadeia mais longa (ou seja, tenha mais blocos subsequentes), os nós mudarão para essa nova cadeia.
Tolerância a Falhas
A rede é robusta e pode lidar com mensagens que não chegam a todos os nós. Uma transação não precisa alcançar todos os nós de imediato; basta que chegue a um número suficiente deles para ser incluída em um bloco. Da mesma forma, se um nó não receber um bloco em tempo hábil, ele pode solicitá-lo ao perceber que está faltando quando o próximo bloco é recebido.
Esse mecanismo descentralizado permite que a rede Bitcoin funcione de maneira segura, confiável e resiliente, sem depender de uma autoridade central.
6. Incentivo
O incentivo é um dos pilares fundamentais que sustenta o funcionamento da rede Bitcoin, garantindo que os participantes (nós) continuem operando de forma honesta e contribuindo com recursos computacionais. Ele é estruturado em duas partes principais: a recompensa por mineração e as taxas de transação.
Recompensa por Mineração
Por convenção, o primeiro registro em cada bloco é uma transação especial que cria novas moedas e as atribui ao criador do bloco. Essa recompensa incentiva os mineradores a dedicarem poder computacional para apoiar a rede. Como não há uma autoridade central para emitir moedas, essa é a maneira pela qual novas moedas entram em circulação. Esse processo pode ser comparado ao trabalho de garimpeiros, que utilizam recursos para colocar mais ouro em circulação. No caso do Bitcoin, o "recurso" consiste no tempo de CPU e na energia elétrica consumida para resolver a prova-de-trabalho.
Taxas de Transação
Além da recompensa por mineração, os mineradores também podem ser incentivados pelas taxas de transação. Se uma transação utiliza menos valor de saída do que o valor de entrada, a diferença é tratada como uma taxa, que é adicionada à recompensa do bloco contendo essa transação. Com o passar do tempo e à medida que o número de moedas em circulação atinge o limite predeterminado, essas taxas de transação se tornam a principal fonte de incentivo, substituindo gradualmente a emissão de novas moedas. Isso permite que o sistema opere sem inflação, uma vez que o número total de moedas permanece fixo.
Incentivo à Honestidade
O design do incentivo também busca garantir que os participantes da rede mantenham um comportamento honesto. Para um atacante que consiga reunir mais poder computacional do que o restante da rede, ele enfrentaria duas escolhas:
- Usar esse poder para fraudar o sistema, como reverter transações e roubar pagamentos.
- Seguir as regras do sistema, criando novos blocos e recebendo recompensas legítimas.
A lógica econômica favorece a segunda opção, pois um comportamento desonesto prejudicaria a confiança no sistema, diminuindo o valor de todas as moedas, incluindo aquelas que o próprio atacante possui. Jogar dentro das regras não apenas maximiza o retorno financeiro, mas também preserva a validade e a integridade do sistema.
Esse mecanismo garante que os incentivos econômicos estejam alinhados com o objetivo de manter a rede segura, descentralizada e funcional ao longo do tempo.
7. Recuperação do Espaço em Disco
Depois que uma moeda passa a estar protegida por muitos blocos na cadeia, as informações sobre as transações antigas que a geraram podem ser descartadas para economizar espaço em disco. Para que isso seja possível sem comprometer a segurança, as transações são organizadas em uma estrutura chamada "árvore de Merkle". Essa árvore funciona como um resumo das transações: em vez de armazenar todas elas, guarda apenas um "hash raiz", que é como uma assinatura compacta que representa todo o grupo de transações.
Os blocos antigos podem, então, ser simplificados, removendo as partes desnecessárias dessa árvore. Apenas a raiz do hash precisa ser mantida no cabeçalho do bloco, garantindo que a integridade dos dados seja preservada, mesmo que detalhes específicos sejam descartados.
Para exemplificar: imagine que você tenha vários recibos de compra. Em vez de guardar todos os recibos, você cria um documento e lista apenas o valor total de cada um. Mesmo que os recibos originais sejam descartados, ainda é possível verificar a soma com base nos valores armazenados.
Além disso, o espaço ocupado pelos blocos em si é muito pequeno. Cada bloco sem transações ocupa apenas cerca de 80 bytes. Isso significa que, mesmo com blocos sendo gerados a cada 10 minutos, o crescimento anual em espaço necessário é insignificante: apenas 4,2 MB por ano. Com a capacidade de armazenamento dos computadores crescendo a cada ano, esse espaço continuará sendo trivial, garantindo que a rede possa operar de forma eficiente sem problemas de armazenamento, mesmo a longo prazo.
8. Verificação de Pagamento Simplificada
É possível confirmar pagamentos sem a necessidade de operar um nó completo da rede. Para isso, o usuário precisa apenas de uma cópia dos cabeçalhos dos blocos da cadeia mais longa (ou seja, a cadeia com maior esforço de trabalho acumulado). Ele pode verificar a validade de uma transação ao consultar os nós da rede até obter a confirmação de que tem a cadeia mais longa. Para isso, utiliza-se o ramo Merkle, que conecta a transação ao bloco em que ela foi registrada.
Entretanto, o método simplificado possui limitações: ele não pode confirmar uma transação isoladamente, mas sim assegurar que ela ocupa um lugar específico na cadeia mais longa. Dessa forma, se um nó da rede aprova a transação, os blocos subsequentes reforçam essa aceitação.
A verificação simplificada é confiável enquanto a maioria dos nós da rede for honesta. Contudo, ela se torna vulnerável caso a rede seja dominada por um invasor. Nesse cenário, um atacante poderia fabricar transações fraudulentas que enganariam o usuário temporariamente até que o invasor obtivesse controle completo da rede.
Uma estratégia para mitigar esse risco é configurar alertas nos softwares de nós completos. Esses alertas identificam blocos inválidos, sugerindo ao usuário baixar o bloco completo para confirmar qualquer inconsistência. Para maior segurança, empresas que realizam pagamentos frequentes podem preferir operar seus próprios nós, reduzindo riscos e permitindo uma verificação mais direta e confiável.
9. Combinando e Dividindo Valor
No sistema Bitcoin, cada unidade de valor é tratada como uma "moeda" individual, mas gerenciar cada centavo como uma transação separada seria impraticável. Para resolver isso, o Bitcoin permite que valores sejam combinados ou divididos em transações, facilitando pagamentos de qualquer valor.
Entradas e Saídas
Cada transação no Bitcoin é composta por:
- Entradas: Representam os valores recebidos em transações anteriores.
- Saídas: Correspondem aos valores enviados, divididos entre os destinatários e, eventualmente, o troco para o remetente.
Normalmente, uma transação contém:
- Uma única entrada com valor suficiente para cobrir o pagamento.
- Ou várias entradas combinadas para atingir o valor necessário.
O valor total das saídas nunca excede o das entradas, e a diferença (se houver) pode ser retornada ao remetente como troco.
Exemplo Prático
Imagine que você tem duas entradas:
- 0,03 BTC
- 0,07 BTC
Se deseja enviar 0,08 BTC para alguém, a transação terá:
- Entrada: As duas entradas combinadas (0,03 + 0,07 BTC = 0,10 BTC).
- Saídas: Uma para o destinatário (0,08 BTC) e outra como troco para você (0,02 BTC).
Essa flexibilidade permite que o sistema funcione sem precisar manipular cada unidade mínima individualmente.
Difusão e Simplificação
A difusão de transações, onde uma depende de várias anteriores e assim por diante, não representa um problema. Não é necessário armazenar ou verificar o histórico completo de uma transação para utilizá-la, já que o registro na blockchain garante sua integridade.
10. Privacidade
O modelo bancário tradicional oferece um certo nível de privacidade, limitando o acesso às informações financeiras apenas às partes envolvidas e a um terceiro confiável (como bancos ou instituições financeiras). No entanto, o Bitcoin opera de forma diferente, pois todas as transações são publicamente registradas na blockchain. Apesar disso, a privacidade pode ser mantida utilizando chaves públicas anônimas, que desvinculam diretamente as transações das identidades das partes envolvidas.
Fluxo de Informação
- No modelo tradicional, as transações passam por um terceiro confiável que conhece tanto o remetente quanto o destinatário.
- No Bitcoin, as transações são anunciadas publicamente, mas sem revelar diretamente as identidades das partes. Isso é comparável a dados divulgados por bolsas de valores, onde informações como o tempo e o tamanho das negociações (a "fita") são públicas, mas as identidades das partes não.
Protegendo a Privacidade
Para aumentar a privacidade no Bitcoin, são adotadas as seguintes práticas:
- Chaves Públicas Anônimas: Cada transação utiliza um par de chaves diferentes, dificultando a associação com um proprietário único.
- Prevenção de Ligação: Ao usar chaves novas para cada transação, reduz-se a possibilidade de links evidentes entre múltiplas transações realizadas pelo mesmo usuário.
Riscos de Ligação
Embora a privacidade seja fortalecida, alguns riscos permanecem:
- Transações multi-entrada podem revelar que todas as entradas pertencem ao mesmo proprietário, caso sejam necessárias para somar o valor total.
- O proprietário da chave pode ser identificado indiretamente por transações anteriores que estejam conectadas.
11. Cálculos
Imagine que temos um sistema onde as pessoas (ou computadores) competem para adicionar informações novas (blocos) a um grande registro público (a cadeia de blocos ou blockchain). Este registro é como um livro contábil compartilhado, onde todos podem verificar o que está escrito.
Agora, vamos pensar em um cenário: um atacante quer enganar o sistema. Ele quer mudar informações já registradas para beneficiar a si mesmo, por exemplo, desfazendo um pagamento que já fez. Para isso, ele precisa criar uma versão alternativa do livro contábil (a cadeia de blocos dele) e convencer todos os outros participantes de que essa versão é a verdadeira.
Mas isso é extremamente difícil.
Como o Ataque Funciona
Quando um novo bloco é adicionado à cadeia, ele depende de cálculos complexos que levam tempo e esforço. Esses cálculos são como um grande quebra-cabeça que precisa ser resolvido.
- Os “bons jogadores” (nós honestos) estão sempre trabalhando juntos para resolver esses quebra-cabeças e adicionar novos blocos à cadeia verdadeira.
- O atacante, por outro lado, precisa resolver quebra-cabeças sozinho, tentando “alcançar” a cadeia honesta para que sua versão alternativa pareça válida.
Se a cadeia honesta já está vários blocos à frente, o atacante começa em desvantagem, e o sistema está projetado para que a dificuldade de alcançá-los aumente rapidamente.
A Corrida Entre Cadeias
Você pode imaginar isso como uma corrida. A cada bloco novo que os jogadores honestos adicionam à cadeia verdadeira, eles se distanciam mais do atacante. Para vencer, o atacante teria que resolver os quebra-cabeças mais rápido que todos os outros jogadores honestos juntos.
Suponha que:
- A rede honesta tem 80% do poder computacional (ou seja, resolve 8 de cada 10 quebra-cabeças).
- O atacante tem 20% do poder computacional (ou seja, resolve 2 de cada 10 quebra-cabeças).
Cada vez que a rede honesta adiciona um bloco, o atacante tem que "correr atrás" e resolver mais quebra-cabeças para alcançar.
Por Que o Ataque Fica Cada Vez Mais Improvável?
Vamos usar uma fórmula simples para mostrar como as chances de sucesso do atacante diminuem conforme ele precisa "alcançar" mais blocos:
P = (q/p)^z
- q é o poder computacional do atacante (20%, ou 0,2).
- p é o poder computacional da rede honesta (80%, ou 0,8).
- z é a diferença de blocos entre a cadeia honesta e a cadeia do atacante.
Se o atacante está 5 blocos atrás (z = 5):
P = (0,2 / 0,8)^5 = (0,25)^5 = 0,00098, (ou, 0,098%)
Isso significa que o atacante tem menos de 0,1% de chance de sucesso — ou seja, é muito improvável.
Se ele estiver 10 blocos atrás (z = 10):
P = (0,2 / 0,8)^10 = (0,25)^10 = 0,000000095, (ou, 0,0000095%).
Neste caso, as chances de sucesso são praticamente nulas.
Um Exemplo Simples
Se você jogar uma moeda, a chance de cair “cara” é de 50%. Mas se precisar de 10 caras seguidas, sua chance já é bem menor. Se precisar de 20 caras seguidas, é quase impossível.
No caso do Bitcoin, o atacante precisa de muito mais do que 20 caras seguidas. Ele precisa resolver quebra-cabeças extremamente difíceis e alcançar os jogadores honestos que estão sempre à frente. Isso faz com que o ataque seja inviável na prática.
Por Que Tudo Isso é Seguro?
- A probabilidade de sucesso do atacante diminui exponencialmente. Isso significa que, quanto mais tempo passa, menor é a chance de ele conseguir enganar o sistema.
- A cadeia verdadeira (honesta) está protegida pela força da rede. Cada novo bloco que os jogadores honestos adicionam à cadeia torna mais difícil para o atacante alcançar.
E Se o Atacante Tentar Continuar?
O atacante poderia continuar tentando indefinidamente, mas ele estaria gastando muito tempo e energia sem conseguir nada. Enquanto isso, os jogadores honestos estão sempre adicionando novos blocos, tornando o trabalho do atacante ainda mais inútil.
Assim, o sistema garante que a cadeia verdadeira seja extremamente segura e que ataques sejam, na prática, impossíveis de ter sucesso.
12. Conclusão
Propusemos um sistema de transações eletrônicas que elimina a necessidade de confiança, baseando-se em assinaturas digitais e em uma rede peer-to-peer que utiliza prova de trabalho. Isso resolve o problema do gasto duplo, criando um histórico público de transações imutável, desde que a maioria do poder computacional permaneça sob controle dos participantes honestos. A rede funciona de forma simples e descentralizada, com nós independentes que não precisam de identificação ou coordenação direta. Eles entram e saem livremente, aceitando a cadeia de prova de trabalho como registro do que ocorreu durante sua ausência. As decisões são tomadas por meio do poder de CPU, validando blocos legítimos, estendendo a cadeia e rejeitando os inválidos. Com este mecanismo de consenso, todas as regras e incentivos necessários para o funcionamento seguro e eficiente do sistema são garantidos.
Faça o download do whitepaper original em português: https://bitcoin.org/files/bitcoin-paper/bitcoin_pt_br.pdf
-
@ 87730827:746b7d35
2024-11-20 09:27:53Original: https://techreport.com/crypto-news/brazil-central-bank-ban-monero-stablecoins/
Brazilian’s Central Bank Will Ban Monero and Algorithmic Stablecoins in the Country
Brazil proposes crypto regulations banning Monero and algorithmic stablecoins and enforcing strict compliance for exchanges.
KEY TAKEAWAYS
- The Central Bank of Brazil has proposed regulations prohibiting privacy-centric cryptocurrencies like Monero.
- The regulations categorize exchanges into intermediaries, custodians, and brokers, each with specific capital requirements and compliance standards.
- While the proposed rules apply to cryptocurrencies, certain digital assets like non-fungible tokens (NFTs) are still ‘deregulated’ in Brazil.
In a Notice of Participation announcement, the Brazilian Central Bank (BCB) outlines regulations for virtual asset service providers (VASPs) operating in the country.
In the document, the Brazilian regulator specifies that privacy-focused coins, such as Monero, must be excluded from all digital asset companies that intend to operate in Brazil.
Let’s unpack what effect these regulations will have.
Brazil’s Crackdown on Crypto Fraud
If the BCB’s current rule is approved, exchanges dealing with coins that provide anonymity must delist these currencies or prevent Brazilians from accessing and operating these assets.
The Central Bank argues that currencies like Monero make it difficult and even prevent the identification of users, thus creating problems in complying with international AML obligations and policies to prevent the financing of terrorism.
According to the Central Bank of Brazil, the bans aim to prevent criminals from using digital assets to launder money. In Brazil, organized criminal syndicates such as the Primeiro Comando da Capital (PCC) and Comando Vermelho have been increasingly using digital assets for money laundering and foreign remittances.
… restriction on the supply of virtual assets that contain characteristics of fragility, insecurity or risks that favor fraud or crime, such as virtual assets designed to favor money laundering and terrorist financing practices by facilitating anonymity or difficulty identification of the holder.
The Central Bank has identified that removing algorithmic stablecoins is essential to guarantee the safety of users’ funds and avoid events such as when Terraform Labs’ entire ecosystem collapsed, losing billions of investors’ dollars.
The Central Bank also wants to control all digital assets traded by companies in Brazil. According to the current proposal, the national regulator will have the power to ask platforms to remove certain listed assets if it considers that they do not meet local regulations.
However, the regulations will not include NFTs, real-world asset (RWA) tokens, RWA tokens classified as securities, and tokenized movable or real estate assets. These assets are still ‘deregulated’ in Brazil.
Monero: What Is It and Why Is Brazil Banning It?
Monero ($XMR) is a cryptocurrency that uses a protocol called CryptoNote. It launched in 2013 and ‘erases’ transaction data, preventing the sender and recipient addresses from being publicly known. The Monero network is based on a proof-of-work (PoW) consensus mechanism, which incentivizes miners to add blocks to the blockchain.
Like Brazil, other nations are banning Monero in search of regulatory compliance. Recently, Dubai’s new digital asset rules prohibited the issuance of activities related to anonymity-enhancing cryptocurrencies such as $XMR.
Furthermore, exchanges such as Binance have already announced they will delist Monero on their global platforms due to its anonymity features. Kraken did the same, removing Monero for their European-based users to comply with MiCA regulations.
Data from Chainalysis shows that Brazil is the seventh-largest Bitcoin market in the world.
In Latin America, Brazil is the largest market for digital assets. Globally, it leads in the innovation of RWA tokens, with several companies already trading this type of asset.
In Closing
Following other nations, Brazil’s regulatory proposals aim to combat illicit activities such as money laundering and terrorism financing.
Will the BCB’s move safeguard people’s digital assets while also stimulating growth and innovation in the crypto ecosystem? Only time will tell.
References
Cassio Gusson is a journalist passionate about technology, cryptocurrencies, and the nuances of human nature. With a career spanning roles as Senior Crypto Journalist at CriptoFacil and Head of News at CoinTelegraph, he offers exclusive insights on South America’s crypto landscape. A graduate in Communication from Faccamp and a post-graduate in Globalization and Culture from FESPSP, Cassio explores the intersection of governance, decentralization, and the evolution of global systems.
-
@ 41e6f20b:06049e45
2024-11-17 17:33:55Let me tell you a beautiful story. Last night, during the speakers' dinner at Monerotopia, the waitress was collecting tiny tips in Mexican pesos. I asked her, "Do you really want to earn tips seriously?" I then showed her how to set up a Cake Wallet, and she started collecting tips in Monero, reaching 0.9 XMR. Of course, she wanted to cash out to fiat immediately, but it solved a real problem for her: making more money. That amount was something she would never have earned in a single workday. We kept talking, and I promised to give her Zoom workshops. What can I say? I love people, and that's why I'm a natural orange-piller.
-
@ 3bf0c63f:aefa459d
2024-09-06 12:49:46Nostr: a quick introduction, attempt #2
Nostr doesn't subscribe to any ideals of "free speech" as these belong to the realm of politics and assume a big powerful government that enforces a common ruleupon everybody else.
Nostr instead is much simpler, it simply says that servers are private property and establishes a generalized framework for people to connect to all these servers, creating a true free market in the process. In other words, Nostr is the public road that each market participant can use to build their own store or visit others and use their services.
(Of course a road is never truly public, in normal cases it's ran by the government, in this case it relies upon the previous existence of the internet with all its quirks and chaos plus a hand of government control, but none of that matters for this explanation).
More concretely speaking, Nostr is just a set of definitions of the formats of the data that can be passed between participants and their expected order, i.e. messages between clients (i.e. the program that runs on a user computer) and relays (i.e. the program that runs on a publicly accessible computer, a "server", generally with a domain-name associated) over a type of TCP connection (WebSocket) with cryptographic signatures. This is what is called a "protocol" in this context, and upon that simple base multiple kinds of sub-protocols can be added, like a protocol for "public-square style microblogging", "semi-closed group chat" or, I don't know, "recipe sharing and feedback".
-
@ be39043c:4a573ca3
2024-08-16 01:59:24Traditionally, miso making takes place during the cold winter. Miso is fermented during the warm season and start using after it gets cooler in the fall. However, I did make during the summer and there was no problem.
For 29oz miso
Ingredients: * Chickpeas 0.5lbs(227g) * Dried Koji 0.5lbs(227g) *not raw(active) koji * Natural salts 103g * Chickpeas : Koji: Salts = 1: 1: 0.45 (salts 12.5%)
I find chickpeas easier to handle than soy beans. For soy beans,
- Soy beans 230g (soak at least 18 hours)
- Dried Koji 340g
- Natural salts 30g(Salts 12.5%)
You also need :
Container for fermentation -32 oz glass jar (no metal lid) or strong plastic container or bag that can be sealed. * large mixing bowl
small bowl
* pressure cooker or large pot * food processor or blender or masher (I use the bottom of small glass jar sanitized with hotwater) * parchment paper or plastic wrap to cover the surface- Wash chickpeas and soak over night
- Cook chickpeas until it can be crashed with your thumb and pinky finger with a pressure cooker or a pot (this may take hours with a pot) Move a part of cooked liquid from the pot to a small bowl and drain the rest. Wait until chickpeas can be handled with hand.
- Mash chickpeas into paste
- Sanitize the 32oz jar with hot water or sanitizer of your choice
- Mixed dried koji with salts with hand
- Add koji and salts to the chickpea paste. Mix with hand well. Add a little bit of the liquid you put aside earlier if the paste is too dry (do not add too much).
- When mixed well, make balls with the paste using hands.
- Throw one of the balls into the jar and push onto the jar with your fist. Repeat this process. (you don't have to punch here. Just push. This process is to transfer the miso paste into the jar without air. The exposure to air will lead to mold. Make sure not to have a space.)
- After throwing all balls into the jar and place tightly without air, seal the surface with a piece of parchment paper or plastic wrap.
- Close the lid.
- Place the jar in a cool and dark place (room temperature). Leave 6 months to 2 years. After the half of the duration, you may pull out of paste and place the bottom half onto the upper half so that the miso will be evenly fermented. This process can be skipped. Check once in a couple of months if there is mold.
- If mold appears on the surface, just scrape it off.
Miso pro's video. He uses soys.
-
@ 2ede6f6b:b94998e2
2024-08-15 21:11:43test
originally posted at https://stacker.news/items/459389
-
@ f25afb62:8d50c6e7
2025-03-09 01:34:10The recent economic turmoil in New Zealand has reignited debates over the role of the Reserve Bank of New Zealand (RBNZ) in "engineering a recession." Many believe that the RBNZ’s decision to raise the Official Cash Rate (OCR) was the root cause of the downturn, but this narrative oversimplifies the reality.
Who Really Engineered the Recession?
Blaming the RBNZ for the recession ignores a fundamental truth: market interest rates were rising long before the OCR was adjusted. Bond yields, swap rates, and borrowing costs surged as the RBNZ stepped back from being the primary buyer of government bonds. When the RBNZ stopped paying artificially high prices (low yields) for bonds, the private sector had to price them instead, leading to yields rising back to real market interest rates. Meanwhile, the government continued to refinance its rolling debt at these higher rates, further driving up borrowing costs. The RBNZ, in hiking the OCR, was following the market interest rate, attempting to maintain credibility rather than dictating outcomes.
The real policy missteps were made much earlier:
-
Artificially Suppressing Interest Rates Through Money Printing\ The RBNZ engaged in Large-Scale Asset Purchases (LSAP), creating money out of thin air to buy government bonds. This artificially lowered yields, making it cheaper for the government to borrow and spend beyond its means. The result? Inflation surged as the economy was flooded with cheap money.
-
Funding for Lending Programme (FLP): Free Money for Banks\ The RBNZ offered near 0% loans to banks, allowing them to borrow at artificially low rates while lending at much higher rates. This wasn’t just monetary easing—it was a blatant distortion of the free market, reinforcing the Cantillon Effect, where those closest to the money printer benefit first.
-
Holding Rates Too Low for Too Long\ A 0% OCR in itself doesn’t cause inflation—what does is creating excess liquidity while artificially suppressing borrowing costs. Banks, instead of competing for deposits and lending productively, were incentivized to park money in assets like housing, fueling unsustainable bubbles.
When inflation inevitably took hold, the RBNZ had no choice but to raise rates aggressively. This wasn’t an effort to “engineer” a recession—it was damage control after prior policy failures. The claim that the RBNZ alone caused the recession is a convenient distraction from the real culprits: government overspending and central bank interventionism.
The Cycle of Blame: Central Bank Governors as Fall Guys
This cycle isn’t new. Central banks are officially independent, but in reality, they almost always align with the government of the day. The Large-Scale Asset Purchase (LSAP) program was effectively a way to finance government spending through money printing—something politicians would never admit outright. When the government needed funding for pandemic-era stimulus, the RBNZ obliged, creating \$50 billion out of thin air to buy government bonds and lower borrowing costs, making it easier for the Labour government to spend big.
Now, with a new government in power, they get to bring in their own person—likely someone who will align with their fiscal policies, just as Orr aligned with Labour's. This cycle plays out over and over again:
- Print money to fund government priorities.
- Blame the central bank for inflation or economic consequences.
- Replace the central bank governor with someone more aligned with the new government’s agenda.
- Repeat.
The “independent central bank” narrative is a useful tool for politicians to deflect blame. Labour can say, “Inflation wasn’t our fault, it was the RBNZ’s monetary policy!” Meanwhile, National can now install someone who will adjust policy to suit their needs while still claiming, “We respect the independence of the Reserve Bank!” This allows both parties to escape accountability, despite the fact that excessive government spending and central bank money printing go hand in hand.
This isn’t just a New Zealand issue—most central banks operate the same way. They provide the liquidity needed to keep government spending rolling, and when inflation or other economic problems arise, the governor becomes the convenient fall guy.
The Role of Bitcoin: An Exit From the Broken System
This cycle of money printing, asset bubbles, inflation, and central bank tightening isn’t unique to New Zealand—it’s the natural consequence of a system where central banks and governments have unchecked control over money. Bitcoin was created as a direct response to this very problem.
Bitcoin Fixes the Cantillon Effect
- Unlike fiat money, which is distributed to banks and institutions first, Bitcoin’s issuance is predictable and transparent. There are no backroom deals, no preferential access, no bailouts.
- Bitcoin doesn’t change its supply to accommodate political agendas. There is only one Bitcoin—just like there is only one Earth, and its land area cannot be expanded. It can be divided into 21 million equal-sized pieces called BTC or 2,100 trillion equal-sized pieces called sats.
- Bitcoin doesn’t grant special privileges. You either earn it, mine it, or buy it. No one gets first access at a discount.
Bitcoin Removes the Central Bank Middleman
- The RBNZ and other central banks manipulate money supply and interest rates to serve political and economic interests. Bitcoin’s monetary policy is fixed and free from human interference.
- No government can arbitrarily print Bitcoin to fund its spending or suppress its value.
- Bitcoin allows people to store their wealth without the risk of inflationary dilution or government confiscation.
Bitcoin Protects You from the Next Bailout
- Every time the financial system faces a crisis, governments and central banks shift the cost onto the public—through inflation, taxation, or outright financial repression.
- Bitcoin lets you opt out of this cycle. By holding Bitcoin, your savings remain secure, beyond the reach of reckless monetary policy.
- When the next crisis hits—and it will—Bitcoin holders won’t be left wondering how much purchasing power they’ve lost overnight.
A Strategic Shift: The U.S. Embraces Bitcoin
Recent developments in the U.S. signal a major turning point in how governments view Bitcoin. President Trump recently signed an Executive Order establishing a Strategic Bitcoin Reserve, marking the first time a nation has officially designated Bitcoin as a strategic asset. This reserve will be exclusively Bitcoin, initially seeded with Bitcoin seized through civil and criminal forfeitures, but with a commitment to acquiring more through budget-neutral strategies at no additional cost to taxpayers. This means that if the government can save money elsewhere, those funds can be redirected toward buying and holding Bitcoin as a permanent reserve asset.
The implications of this decision are profound:
- The U.S. acknowledges Bitcoin as fundamentally different from “crypto.” Altcoins and centralized tokens are being liquidated, while Bitcoin is being held as a permanent reserve.
- The government is shifting from selling confiscated Bitcoin to strategically accumulating it, positioning the U.S. as a key player in a Bitcoin-based financial future.
- Bitcoin mining is being embraced as a domestic industry, stabilizing power grids and reinforcing the U.S. as a leader in proof-of-work security.
This policy shift highlights what Bitcoiners have long understood: Bitcoin is digital gold, and fiat systems will eventually recognize its superiority. While central banks continue their cycle of money printing and blame-shifting, the adoption of Bitcoin as a strategic reserve asset may mark the beginning of a global financial transformation.
The Bigger Picture: Free Markets vs. Centralized Control
The idea that the RBNZ acted independently in creating these economic conditions is a myth. Central banks do not exist in isolation; they facilitate government spending and economic policies, whether through bond purchases, artificially low interest rates, or direct lending programs. The economic pain we’re seeing now is not an accident—it’s a consequence of a system designed to redistribute wealth to those closest to the money printer.
Bitcoin represents an alternative: a free-market monetary system where no central entity controls issuance, no insiders get preferential treatment, and no government can erode its value through reckless policies.
The sooner people recognize the flaws in the current system, the sooner they’ll understand why Bitcoin exists—not just as an investment, but as a monetary revolution.
originally posted at https://stacker.news/items/907966
-
-
@ 3ffac3a6:2d656657
2025-03-08 23:07:57Recently, I found an old Sapphire Block Erupter USB at home that I used for Bitcoin mining back in 2013. Out of curiosity and nostalgia, I decided to try getting it to work again. I spent an entire afternoon configuring the device and, after much trial and error, discovered that I needed an older version of CGMiner to make it work.
The Sapphire Block Erupter USB was one of the first ASIC devices designed for Bitcoin mining. Although obsolete for competitive mining, it can still be used for learning, nostalgia, or experimentation. In this post, I’ll show you how to run a Block Erupter USB on Linux today.
1. Prerequisites
Before you start, make sure you have:
- A Sapphire Block Erupter USB
- A powered USB hub (optional but recommended)
- A computer running Linux (Ubuntu, Debian, or another compatible distribution)
- A mining pool account (e.g., Slush Pool, KanoPool, etc.)
2. Installing Dependencies
Before running the miner, install some dependencies:
bash sudo apt update && sudo apt install -y git build-essential autoconf automake libtool pkg-config libusb-1.0-0-dev
3. Determining the Compatible Version of CGMiner
To find the correct CGMiner version that still supports Block Erupter USB, I performed a binary search across different versions, testing each one until I found the last one that properly recognized the device. The result was that version 3.4.3 is the most recent one that still supports Block Erupters. However, different versions of these devices may require different CGMiner versions.
4. Downloading and Compiling CGMiner
CGMiner is one of the software options compatible with Block Erupters. You can download the correct version from two trusted sources:
- From the official repository: CGMiner v3.4.3 on GitHub
- Alternatively, from this mirror: CGMiner v3.4.3 on Haven
To ensure file integrity, verify the SHA-256 hash:
3b44da12e5f24f603eeeefdaa2c573bd566c5c50c9d62946f198e611cd55876b
Now, download and extract it:
```bash wget https://github.com/ckolivas/cgminer/archive/refs/tags/v3.4.3.tar.gz
Or, alternatively:
wget https://haven.girino.org/3b44da12e5f24f603eeeefdaa2c573bd566c5c50c9d62946f198e611cd55876b.tgz
sha256sum v3.4.3.tar.gz # Confirm that the hash matches
Extract the file
tar -xvf v3.4.3.tar.gz cd cgminer-3.4.3
Compile CGMiner
./autogen.sh --enable-icarus make -j$(nproc)
Install on the system (optional)
sudo make install ```
5. Connecting the Block Erupter USB
Plug the device into a USB port and check if it is recognized:
bash dmesg | grep USB lsusb
You should see something like:
Bus 003 Device 004: ID 10c4:ea60 Cygnal Integrated Products, Inc. CP2102 USB to UART Bridge Controller
If needed, adjust the USB device permissions:
bash sudo chmod 666 /dev/ttyUSB0
6. Configuring and Running CGMiner
Now, run CGMiner, pointing it to your mining pool:
bash ./cgminer -o stratum+tcp://your.pool.com:3333 -u yourUsername -p yourPassword
If the miner detects the Block Erupter correctly, you should see something like:
[2025-03-08 22:26:45] Started cgminer 3.4.3 [2025-03-08 22:26:45] No devices detected! [2025-03-08 22:26:45] Waiting for USB hotplug devices or press q to quit [2025-03-08 22:26:45] Probing for an alive pool [2025-03-08 22:26:46] Pool 0 difficulty changed to 65536 [2025-03-08 22:26:46] Network diff set to 111T [2025-03-08 22:26:46] Stratum from pool 0 detected new block [2025-03-08 22:27:02] Hotplug: Icarus added AMU 0
Conclusion
Although no longer viable for real mining, the Sapphire Block Erupter USB is still great for learning about ASICs, testing mining pools, and understanding Bitcoin mining. If you enjoy working with old hardware and have one lying around, it’s worth experimenting with!
If you have any questions or want to share your experience, leave a comment below!
-
@ 3ffac3a6:2d656657
2025-03-08 23:02:13Como Rodar um Sapphire Block Erupter USB para Mineração no Linux em 2025
Recentemente, encontrei um Sapphire Block Erupter USB velho aqui em casa que eu usava para minerar Bitcoin em 2013. Por curiosidade e nostalgia, resolvi tentar colocá-lo para funcionar novamente. Passei uma tarde inteira tentando configurar o dispositivo e, depois de muita tentativa e erro, descobri que precisava de uma versão mais antiga do CGMiner para fazê-lo funcionar.
Os Sapphire Block Erupter USB foram um dos primeiros dispositivos ASIC voltados para mineração de Bitcoin. Embora estejam obsoletos para mineração competitiva, eles ainda podem ser usados para aprendizado, nostalgia ou experimentação. Neste post, vou te mostrar como rodar um Block Erupter USB no Linux atualmente.
1. Pré-requisitos
Antes de começar, certifique-se de que você tem:
- Um Sapphire Block Erupter USB
- Um hub USB alimentado (opcional, mas recomendado)
- Um computador rodando Linux (Ubuntu, Debian, Arch ou outra distribuição compatível)
- Um pool de mineração configurado (ex: Slush Pool, KanoPool, etc.)
2. Instalando as Dependências
Antes de rodar o minerador, instale algumas dependências:
bash sudo apt update && sudo apt install -y git build-essential autoconf automake libtool pkg-config libusb-1.0-0-dev
3. Determinando a Versão Compatível do CGMiner
Para encontrar a versão correta do CGMiner que ainda suporta os Block Erupter USB, realizei uma busca binária entre diferentes versões, testando cada uma até encontrar a última que reconhecia corretamente o dispositivo. O resultado foi que a versão 3.4.3 é a mais recente que ainda suporta os Block Erupters. No entanto, outras versões desses dispositivos podem requerer versões diferentes do CGMiner.
4. Baixando e Compilando o CGMiner
O CGMiner é um dos softwares compatíveis com os Block Erupters. Você pode baixar a versão correta de duas fontes confiáveis:
- Do repositório oficial: CGMiner v3.4.3 no GitHub
- Alternativamente, deste espelho: CGMiner v3.4.3 no Haven
Para garantir a integridade do arquivo, você pode verificar o hash SHA-256:
3b44da12e5f24f603eeeefdaa2c573bd566c5c50c9d62946f198e611cd55876b
Agora, faça o download e extraia:
```bash wget https://github.com/ckolivas/cgminer/archive/refs/tags/v3.4.3.tar.gz
Ou, alternativamente:
wget https://haven.girino.org/3b44da12e5f24f603eeeefdaa2c573bd566c5c50c9d62946f198e611cd55876b.tgz
sha256sum v3.4.3.tar.gz # Confirme que o hash bate
Extraia o arquivo
tar -xvf v3.4.3.tar.gz cd cgminer-3.4.3
Compile o CGMiner
./autogen.sh --enable-icarus make -j$(nproc)
Instale no sistema (opcional)
sudo make install ```
4. Conectando o Block Erupter USB
Plugue o dispositivo na porta USB e verifique se ele foi reconhecido:
bash dmesg | grep USB lsusb
Você deve ver algo como:
Bus 003 Device 004: ID 10c4:ea60 Cygnal Integrated Products, Inc. CP2102 USB to UART Bridge Controller
Se necessário, ajuste as permissões para o dispositivo USB:
bash sudo chmod 666 /dev/ttyUSB0
5. Configurando e Rodando o CGMiner
Agora, execute o CGMiner apontando para seu pool de mineração:
bash ./cgminer -o stratum+tcp://seu.pool.com:3333 -u seuUsuario -p suaSenha
Se o minerador detectar corretamente o Block Erupter, você verá algo como:
``` [2025-03-08 22:26:45] Started cgminer 3.4.3 [2025-03-08 22:26:45] No devices detected! [2025-03-08 22:26:45] Waiting for USB hotplug devices or press q to quit [2025-03-08 22:26:45] Probing for an alive pool [2025-03-08 22:26:46] Pool 0 difficulty changed to 65536 [2025-03-08 22:26:46] Network diff set to 111T [2025-03-08 22:26:46] Stratum from pool 0 detected new block [2025-03-08 22:27:02] Hotplug: Icarus added AMU 0
```
Conclusão
Apesar de não serem mais viáveis para mineração real, os Sapphire Block Erupter USB ainda são ótimos para aprender sobre ASICs, testar pools e entender mais sobre a mineração de Bitcoin. Se você gosta de hardware antigo e tem um desses guardado, vale a pena experimentar!
Se tiver dúvidas ou quiser compartilhar sua experiência, comente abaixo!
-
@ ffbcb706:b0574044
2025-03-08 22:51:54I recently switched from stock Android on my Pixel 8 Pro to GrapheneOS and transitioned from Authy to Aegis to move away from Big Tech and embrace open-source and privacy-focused alternatives. While Aegis offers local encrypted backups, I noticed it lacked external automatic sync, and I wanted to be sure that I could still access my 2FA tokens even if I lost my phone, without having to remember to back up Aegis externally every time I added a new 2FA entry.
Additionally, because many commands need to be run in Termux, I found it useful to use Scrcpy to control my Android device from my Ubuntu desktop. Scrcpy requires ADB and allows easy copy-paste functionality between Ubuntu and Android. I used ALT + V in Ubuntu scrcpy and then long-pressed the screen on my Pixel and selected 'Paste' to copy text easily. This is an optional but highly useful method for managing terminal commands efficiently.
This guide will walk you through setting up rclone and Termux:Boot to enable seamless Aegis backup automation on GrapheneOS. While I use GrapheneOS, this setup should work on most modern Android versions.
Prerequisites
Before starting, make sure you have:
- GrapheneOS installed on your Google Pixel Android device (Pixel 8 Pro in my case).
- Aegis Authenticator installed with automatic backup enabled.
- Proton Drive account ready.
- Obtainium installed or an alternative such as F-droid to manage Termux updates securely.
- Termux & Termux:Boot installed via Obtainium:
- Termux: https://github.com/termux/termux-app/releases
- Termux:Boot: https://github.com/termux/termux-boot/releases
- Scrcpy installed (optional, for easier command handling):
- Install on Ubuntu:
sudo apt install scrcpy
- Ensure ADB is enabled on your Android device.
Step 1: Install Required Packages and Set Up the Backup Folder
Open Termux and install the required tools:
sh pkg update && pkg upgrade -y pkg install rclone inotify-tools termux-api
Grant storage permissions to Termux:
sh termux-setup-storage
Create the ProtonSync directory where all files to be backed up will be stored, including Aegis backups:
sh mkdir -p /storage/emulated/0/ProtonSync/Aegis/
Ensure the directory exists:
sh ls /storage/emulated/0/ProtonSync/Aegis/
If this returns an empty result (instead of an error), you are ready to proceed.
Step 2: Configure rclone for Proton Drive
Since August 2024, Proton Drive has been available as a dedicated backend in rclone (official documentation). However, this integration is still evolving, as it relies on a proton-api-bridge that is under active development.
Run:
sh rclone config
Follow the prompts:
- Choose "n" for a new remote.
- Name it:
protondrive
- Select Proton Drive from the list.
- Enter your Proton username and password.
- If 2FA is enabled, enter the current code from your authenticator app.
- Confirm and save the remote configuration.
Test the setup by listing files:
sh rclone lsd protondrive:
If you see your Proton Drive folders, the connection works.
Step 3: Automate Sync with inotify-tools
We will set up a script to monitor new Aegis backup files and sync them instantly.
- Manually trigger a backup in Aegis first, to ensure a file is created. You can do this in Aegis → Settings → Backups → Trigger backup.
- Create the sync script directly in the Termux:Boot directory:
sh mkdir -p ~/.termux/boot/ nano ~/.termux/boot/watch_protonsync.sh
- Add this content:
```sh
!/data/data/com.termux/files/usr/bin/bash
inotifywait -m -r -e close_write,moved_to,create /storage/emulated/0/ProtonSync/Aegis/ --format '%w%f' | while read file do rclone sync /storage/emulated/0/ProtonSync/Aegis/ protondrive:/ProtonSync/Aegis/ -P done ```
- Save and exit (
CTRL + X
,Y
,ENTER
). - Make it executable:
sh chmod +x ~/.termux/boot/watch_protonsync.sh
Run it manually to test:
sh bash ~/.termux/boot/watch_protonsync.sh &
Now, whenever Aegis creates a new backup file, it will automatically sync to Proton Drive.
Step 4: Test Auto-Start with Termux:Boot
- Reboot your phone.
- Open Aegis and manually trigger a backup (
Settings → Backups → Trigger backup
). - Check Proton Drive under
/ProtonSync/Aegis/
to confirm that the new backup appears.
If the file is there, the automation works! 🎉 I would advice to keep an eye regularly at the Proton Drive to check if the automation is still working.
-
@ 2cb8ae56:84d30cba
2025-03-08 22:41:58[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
[19]
[20]
[21]
[22]
[23]
[24]
[25]
[26]
[27]
[28]
[29]
[30]
[31]
[32]
[33]
[34]
[35]
[36]
[37]
[38]
[39]
[40]
[41]
[42]
[43]
[44]
[45]
[46]
[47]
[48]
[49]
[50]
[51]
[52]
[53]
[54]
[55]
[56]
[57]
[58]
[59]
[60]
[61]
[62]
[63]
[64]
-
@ 1c69692c:f89196c0
2025-03-08 20:19:22 -
@ 401014b3:59d5476b
2025-03-08 20:14:04Alright, football lunatics, it’s March 2025, and we’re storming into the AFC West like it’s a saloon brawl with whiskey on the line. Free agency’s a lawless frontier, the draft’s a roll of the dice, and this division’s always a mix of firepower and flops. The Chiefs owned 2024, the Chargers turned heads, the Broncos showed grit, and the Raiders… uh, raided their own dignity. Let’s slap some records on this rodeo and see who’s got the guts to lasso the crown. Saddle up, fam—here we go.
Kansas City Chiefs: 12-5 – Mahomes’ Dynasty Rolls On
The Chiefs were the AFC’s big dogs in 2024, and 2025’s no different. Patrick Mahomes is still the NFL’s cheat code—Xavier Worthy’s a speed demon, Travis Kelce’s defying Father Time, and the O-line’s a fortress. That defense—Chris Jones, Trent McDuffie—keeps QBs sweating, but free agency’s a buzzkill. The WR depth’s thin. Still, Mahomes magic lands ‘em at 12-5, division champs. KC’s the team everyone loves to hate—and they keep winning anyway.
Los Angeles Chargers: 10-7 – Harbaugh’s Grit Pays Off
The Chargers flipped the script in 2024 under Jim Harbaugh, and they’re building steam. Justin Herbert’s a cannon-armed freak, Ladd McConkey’s emerging, and J.K. Dobbins (if healthy) keeps the run game humming. The defense—Joey Bosa, Derwin James—is a problem when it’s clicking, but free agency looms. Khalil Mack’s getting old, and Asante Samuel Jr. might bolt. 10-7’s the vibe, snagging a wildcard. Harbaugh’s got ‘em believing—they’re legit playoff pests now.
Denver Broncos: 8-9 – Bo Nix’s Baby Steps
The Broncos showed fight in 2024 with rookie Bo Nix, and 2025’s a growth spurt. Nix has Courtland Sutton and Marvin Mims to sling it to, while Javonte Williams grinds the run game. That defense—Pat Surtain II, Zach Allen—is still nasty, but free agency could sting. Jonathon Cooper might cash out elsewhere, and the O-line needs juice. 8-9’s where they land—close, but not quite playoff-ready. Sean Payton’s cooking, but it’s not fully baked yet.
Las Vegas Raiders: 4-13 – Chaos in the Desert
The Raiders are the AFC West’s hot mess. No QB worth a damn (Aidan O’Connell? Please), Davante Adams bailed, and the run game’s a ghost town without Josh Jacobs. The defense—Maxx Crosby, Christian Wilkins—has some bite, but the roster’s a dumpster fire, and free agency won’t help. Tyree Wilson’s unproven, and the cap’s a nightmare. 4-13’s the brutal truth—they’re tanking for a draft savior. Vegas, baby, but not in a good way.
The Final Shootout
The AFC West in 2025 is a Chiefs cakewalk with a Charger chaser. The Chiefs (12-5) lock the title because Mahomes is Mahomes, the Chargers (10-7) snag a wildcard with Harbaugh’s mojo, the Broncos (8-9) tease progress, and the Raiders (4-13) crash and burn. Free agency’s the wild card—lose a star, you’re toast; keep ‘em, you’re riding high. Hit me on Nostr when I screw this up, but this is my AFC West sermon. Let’s roll, degenerates.
-
@ 8671a6e5:f88194d1
2025-03-08 18:55:02The ECB’s Tightrope Walk (2019–2025)
The European Central Bank (ECB) is caught between a rock and a hard place these past years (2019–2025). On one hand, it’s failing its core mission: keeping the Euro stable with a 2% inflation target. On the other, trust in the currency—and the EU itself—is crumbling fast. You can see it in the sinking European bond market and the growing crowd of voters backing anti-EU politicians.
As usual, the ECB sticks to its playbook: blending marketing with “innovations,” spicing it up with anti-crypto MiCA rulings on Bitcoin, and blaming everyone—Putin, Trump, Elon, China, the wind, the moon—for their woes. Since the financial crisis, it’s pumped 2.3 trillion euros into the economy, money conjured out of thin air for market purchases (quantitative easing). The result? Our wallets feel the pinch as purchasing power tanks, with inflation bouncing between 2.1% and 20%, depending on which figures you still trust. No shock there: for every euro circulating in 2002, there are now five.
Meanwhile, Europe’s scrambling to keep up appearances, led by a parliament of nitwits who treat error-riddled high school essays from the Dutch Central Bank as gospel—or print 1 trillion euros (!) to prop up their debt and war cycle. These politicians aren’t too dumb to spot the mistakes; they just care more about ramming through the “narrative,” shaky or not.
The Bitcoin Smokescreen Take the attack on Bitcoin, always nagging about its “energy use”—a standard they never apply elsewhere. Good thing, too; electricity isn’t “good” or “evil.” The real play? Clearing the path for a “digital euro,” cooked up by sly financial institutions hawking their “Aldi Bitcoin” via corporate blockchains.
Digital Euro: The Shiny Trap
Advantages I’ll grudgingly list a few perks, though they’re skin-deep: faster transactions than today’s sluggish bank transfers, digital payments (QR codes), and a unified standard across Europe. These tiny upgrades—great for marketing—don’t outweigh the massive downsides but do beat the current patchwork of payment systems. That’s the good news, and it ends here.
Disadvantages
The cons list is long, so I’ll hit the three worst:
Permission-Coin Nightmare You’ll need approval from some authority (or commercial bank) to receive, spend, or hold it. A 50€ note moves from A to B, no questions asked—cash has no name, needs no permission. Pocket money for your kid, a coin for a beggar, or paying for a used PlayStation: cash flows free. They want that gone. Bitcoin’s beauty mirrors cash but better—unconfiscatable, A to B, no permission needed, saint or crook. That’s the bedrock of a working social-economic system. Sorry, EU pious elite, but white, gray, and black economies will always exist—check your own subsidies; not everything’s clean. Worse, it threatens wage sanctity, potentially reviving forced spending schemes banned since 1887 (in Belgium, at least). Workers once got paid in cash and expiring factory vouchers—a disaster now illegal.
Programmable Tokens A digital euro (CBDC) turns money into controllable tokens, ripe for expiry dates, discounts, or restrictions. Big banks are testing this, aping Bitcoin’s gimmick but under total state control, endlessly minting “safe” tokens for their theft-driven consumer economy. Services like Corda are set to link your ID via eIDAS (Europe’s total-control digital identity surveillance) to these CBDC wallets. Your behavior won’t just be monitored—it’ll tie to fines or coin deductions. (link: https://r3.com/get-corda/ )
Total Control Coin Citizens lose on nearly all fronts. Recall the Belgian Franc-to-Euro shock (cheese sandwich: 40 francs to 1.2 euros, now 3+)? The digital euro rollout—likely hitting welfare recipients and civil servants (with little recourse) via a “gov-app” wallet around July 2025—will sting worse. You’ll get no real money, just controllable vouchers. The ECB won’t program the coins directly; they’ll let banks take the fall. If trust erodes (it will), they’ll blame “greedy banks” or “corrupt third parties.” Cash’s freedom—untraceable, unblockable—dies. The ECB gains tools: negative interest, forced loans, outright theft—all impossible with cash (unless they swap notes, which is slow and costly). Weaponized bank accounts already plague the EU; this makes them worse—shut down sans court order, targeting journalists, dissidents, anyone in the crosshairs.
This isn’t convenience—it’s power. And the ECB’s pushing it despite the euro’s instability. Fabio Panetta once said, “A digital euro would preserve the coexistence of safe central bank money and private money, ensuring sovereign money remains a monetary anchor” (Evolution or Revolution?, Feb 10, 2021). Stability’s key, yet they’re charging ahead anyway. (source)
Conclusion: The Great Heist The CBDC Digital Euro is the greatest theft in Europe since WWII. It’ll shred our freedom, warp market pricing, kill opposition, and chain us financially to the powerful—bank runs impossible. Citizens lose on 9/10 fronts… though payments will be quick. Trust in the Eurozone? It’ll erode faster, propped up only by nudging, marketing, and force.
Citizens will lose out on 9 out of 10 fronts… though, admittedly, payments will be quick.\ The loss in trust in the Eurozone even faster....
AVB\ \ tip if you like this
-
@ 378562cd:a6fc6773
2025-03-08 16:31:22The insurance industry is one of the most lucrative businesses in the world, built on a foundation of fear, deception, and manipulation. It presents itself as a guardian of financial security, promising protection in times of crisis. However, in practice, it operates like a government-backed extortion scheme, siphoning money from individuals and businesses while finding ways to avoid paying out claims.
Many people view insurance as a necessary evil—a required expense for responsible living. But very few stop to consider the true nature of the industry and how it functions not as a service, but as a well-oiled criminal machine designed to extract wealth from the population while delivering as little value as possible.
A Business Model Built on Exploiting Fear and Uncertainty Insurance companies do not sell a product in the traditional sense. You don’t receive something tangible in return for your payments. Instead, they sell you a promise that if something terrible happens, they will be there to cover the costs. However, that promise is deliberately wrapped in vague legalese, riddled with loopholes, and ultimately designed to benefit the insurer more than the insured.
To make this scam even more effective, insurance companies exploit human psychology, knowing that fear is one of the strongest motivators. They bombard people with relentless messaging about the catastrophic risks of being uninsured—the dangers of driving without auto insurance, the financial ruin of an unexpected hospital visit, or the devastation of losing a home to a fire or natural disaster. Ask your local insurance person (if you think they would give you an honest answer) how many full payouts they have had to give out due to a complete loss over the past year, 5 years, since they have been selling insurance. You'd be amazed at how few that number really is.
But it doesn’t stop there. Other industries have caught on to this fear-driven strategy and now use insurance as the perfect scapegoat to justify absurdly inflated prices. Hospitals, auto manufacturers, homebuilders, and repair services all point to “rising insurance costs” among other things as the reason for their skyrocketing fees. A simple medical procedure that should cost a few hundred dollars now runs into the several thousands because “that’s what insurance pays.” Auto repairs that used to be affordable are now exorbitant because shops know insurers will cover part of the bill. The end result? A rigged system where businesses get richer while consumers pay more, not just in premiums, but in every aspect of life.
The truth? Insurance companies thrive on the fact that most policyholders will never need to file a major claim, and if they do, the company will do everything in its power to pay out as little as possible—or nothing at all.
The Three D’s: Deny, Delay, Defend
When it comes time for an insurance company to actually pay out a claim, they rarely do so without a fight. Instead, they deploy the Three D’s strategy—a well-documented tactic used to minimize payouts and maximize profits:
Deny the Claim – The first step is simple: find a reason, any reason, to reject your claim.
Did you miss a payment once five years ago? Denied.
Did you fail to report a minor detail when signing up for your policy? Denied.
Did they discover a tiny, unrelated pre-existing condition? Denied.
Delay the Payout – If they can’t outright deny your claim, the next step is to make the process as slow and painful as possible.
Endless paperwork requirements. Requests for additional documentation (often things that were already submitted). Long hold times when you call for an update. The goal? Wear you down so you give up or settle for less.
Defend Against Lawsuits – If you decide to take legal action, the company will unleash an army of high-priced attorneys (another equally criminal organization with the same rules and laws applied) to fight you every step of the way.
They have billions of dollars available for legal fees. They will outlast you, knowing that most individuals lack the time, money, or energy to engage in a lengthy legal battle. This cycle repeats daily, with millions of policyholders becoming victims of the very companies they’ve paid to protect them. Where is the legal protection to protect you and me? NON-EXISTENT FARSE!
The Myth of the “Struggling” Insurance Agent Insurance agents like to present themselves as hard-working individuals, just trying to make a living. They’ll tell you they’re not getting rich and that they only want what’s best for you. But make no mistake—there is no such thing as a "barely making it" insurance agent in the long run. Mine is constantly on FB telling of this trip to Mexico or some exotic island somewhere or someplace I would love to take my family someday but can never seem to afford it time or money.
Agents work on commission, meaning their income is tied directly to the number of policies they sell. This creates an incentive to push as many policies as possible, often using manipulative tactics.
They will upsell coverage you don’t need by playing on your fears. They will gloss over exclusions and fine print, ensuring you only focus on the benefits, not the limitations. They will push you into long-term commitments that make it costly to switch or cancel and have the "adjustor" and "company policy" as an scapegoat to ease their own conscience.
Meanwhile, at the top, insurance executives make obscene amounts of money while denying rightful claims to hard-working individuals. The CEOs of major insurance companies bring in tens of millions of dollars per year, all while raising premiums and reducing coverage for their customers.
Mandatory Insurance: A Government-Backed Extortion Scheme One of the most damning aspects of the insurance industry is how it has embedded itself into government policy, ensuring that people have no choice but to participate in the system.
Car Insurance: Nearly every state requires auto insurance, even though the majority of drivers never file a claim. Meanwhile, insurance companies raise rates even if you never get into an accident. Health Insurance: The government forces people to buy into overpriced health insurance plans that come with absurd deductibles, making them nearly useless for many policyholders. Home Insurance: Mortgage lenders force homeowners to carry insurance, ensuring another guaranteed revenue stream for the industry. These laws do not exist to protect consumers—they exist to guarantee profits for the insurance companies.
Who Really Benefits? Follow the Money
The biggest winners in the insurance industry are not the policyholders that provide ALL THE MONEY into this criminal organization. The true beneficiaries are the corporate executives and shareholders, and it funnels down to the individual agents collecting all this for them.
The largest insurance companies report billions of dollars in annual profits—far more than they pay out in claims. Shouldn't they break even after a 'modest" salary for their service and time? Wouldn't THAT make more sense to a sensible human being? They invest premium dollars into the stock market, real estate, and other ventures, ensuring their wealth (the money YOU gave them) continues to grow.
They lobby politicians to maintain their stranglehold on the industry, keeping regulations in their favor and ensuring insurance remains legally required in most aspects of life. In short, insurance companies are not in the business of helping people—they are in the business of making money.
The Harsh Reality: A System Designed to Exploit Most people will pay hundreds of thousands of dollars in insurance premiums throughout their lifetime. And yet, when the time comes to actually use the coverage, many find themselves fighting an uphill battle against a rigged system.
Consider these facts:
Insurance companies cancel policies when people become too “expensive.” They increase rates after a single claim—even if it wasn’t your fault. They spend billions on advertising to attract new customers but fight tooth and nail to avoid paying out existing ones. At what point does this stop being a service and start being a scam?
Final Thoughts: A Broken System That Needs an Overhaul
The insurance industry presents itself as a pillar of stability, but in reality, it is one of the most corrupt, exploitative industries in the world. It thrives by preying on fear, avoiding payouts, and ensuring government policies force people to participate in the scam.
If the system was truly fair, it would operate like mutual aid, where all policyholders contribute and receive support as needed. But instead, it functions like organized crime, where the ones collecting the money hold all the power, and those in need are left scrambling for scraps.
Until a major upheaval occurs, there’s little the average person can do to fight back against this deeply entrenched system. The harsh reality is that there are far too many crooks, manipulators, and dishonest players at every level of society—from corporate executives to politicians, from insurance adjusters to business owners who have happily joined in on the scam.
Reading the fine print won’t stop an industry designed to change the rules whenever it benefits them. Shopping around is meaningless when every company is playing the same rigged game. Demanding transparency? Good luck—those in power have built entire careers around keeping consumers in the dark.
At the end of the day, insurance companies—and the industries that now use them as an excuse to inflate costs—are not here to protect you. They exist to extract wealth from you, and there’s no real way to “win” in a system engineered to ensure you always lose.
-
@ 044da344:073a8a0e
2025-03-08 14:45:54Manchmal ist es anstrengend mit den Kommentaren. Irgendjemand weiß immer irgendetwas besser und will das aller Welt auch zeigen – anonym natürlich. Man gönnt sich ja sonst nichts. Auch bei meinem Gespräch mit Michael Beleites gab es ein paar Nörgler. Schaut euch den Geparden an oder den Dingo. Dann seht ihr schnell, wie falsch ihr liegt. Eine Nummer größer: Ihr habt den Darwin nicht verstanden. Oder ganz im Gegenteil: alles kalter Kaffee, seit Menschengedenken bekannt. Meist fällt mir ein Sprüchlein ein und ich kann das für mich abhaken.
Diesmal war es anders. Wenn es buchstäblich um Gott und die Welt geht, kommt man nicht mehr durch mit einer Standard-Antwort. Ich kann das hier gar nicht alles aufzählen. Was den Zuschauer triggert, hängt auch und vor allem von ihm selbst ab. Und Michael Beleites liefert Andockstationen noch und nöcher. „Die Wissenschaft ist sich einig“? Nicht für @brigittegartner7946. „Eine Migrationspolitik, die Völker und Ethnien um den halben Erdball treibt“? Passt für @hildegverakaethner3340 nicht zu der Erkenntnis, dass sich der Mensch dort am wohlsten fühlt, wo er geboren und aufgewachsen ist. Marsbesiedelung? Keine Option für @d.l.6789. Dafür umso mehr: „Den Kindern das Staunen geben“, nicht nur für @Romasi54.
„Zeit, Ruhe, Gelegenheit und Bestätigung – zu selten erleben Kinder das. Oft kommt ein belehrender Erwachsener dazwischen. Und dabei sind Erwachsene einfach nur eher geboren. Lassen und geben wir den Kindern ihre eigenen Erlebnisse, Entdeckungen, Erkenntnisse.“
Das Thema DDR spielte für das Publikum kaum eine Rolle, obwohl es im Gespräch ja auch um Zersetzung einst und jetzt geht und darum, dass die Cancel Culture von heute viel mehr Jünger anzieht als alles, was die Stasi je versucht hat. 96 Prozent der DDR-Bürger, so Michael Beleites hinterher bei uns im Wohnzimmer, haben davon nicht viel mitbekommen. Zwei Prozent Täter und zwei Prozent Opfer so wie er – Menschen, die oft bis heute die Deutungshoheit haben über die Vergangenheit und die, so sieht das Michael Beleites, schon in den 1990ern damit angefangen haben könnten, die Maßstäbe für das Miteinander zu verschieben. Kommentar eines Westdeutschen online: Ich bin „immer stark beeindruckt, wenn ich mit Ostdeutschen kontrovers diskutiere oder Ostdeutsche sich kontrovers auseinandersetzen. Ruhig und sachlich. Meine Frau, Französin, spürt immer sofort, wer West- und wer Ostdeutscher ist.“ Letzter Schnipsel aus der YouTube-Welt: @fotografiker2 bietet an, „mit zur Schaufel“ zu greifen, wenn die „Logik des Wettbewerbs“ beerdigt wird. Da sind wir schon mindestens drei.
Was bleibt von so einem Gespräch? Die Persönlichkeit des Gastes, klar, aber das ist eine Plattitüde. Was macht einen Menschen zu dem, was er ist? Sein Buch, sagt Michael Beleites in die Kamera, habe ihm Klarheit gebracht. Einmal alles aufgeschrieben und dann auch erlebt zu haben, wer wie reagiert: Das sortiert die Dinge genauso wie die Menschen – vor allem dann, wenn man sich vorgenommen hat, gegen den Strom zu schwimmen, und außerdem weiß, was es bedeutet, einen Konflikt nicht nach außen zu bringen, sondern ihn weiter mit sich herumzutragen. Michael Beleites kann gelassen aussprechen, dass die Wissenschaft nicht gern zugibt, nichts zu wissen, dass sie cancelt und dass es so jenseits von Studium und akademischer Laufbahn möglicherweise leichter ist, der Wahrheit auf den Grund zu gehen. Hier: die Sache mit dem Kampf ums Dasein. Als die Kameras aus waren, erzählte ein Zuschauer von den Schlangen in seiner Zucht. Mächtige Männchen, die verbissen miteinander ringen und gar nicht merken, dass das Weibchen derweil von einem Schwächling begattet wird. Und dann die Schönheit der Natur, die sich weder über Zweckmäßigkeit erklären lässt noch mit einem Züchter im Verborgenen.
In den YouTube-Kommentaren finden sich viele ganz persönliche Geschichten. Stellvertretend sei hier @st.p.5025 zitiert:
Während meiner Arbeit (in einem Stadtpark) habe ich immer wieder die Möglichkeit, genau das seit Jahren zu beobachten, wovon hier die Rede ist. Auch dass eben nicht nur der Stärkste gewinnt. Bei den Enten und den anderen Wasservögeln, den Singvögeln, auch bei Eichhorn, Nutria und Co. Zudem ist es bei unterschiedlichen Arten nicht selten, dass sich die vermeintlich Schwächeren gegen den als stärker Geltenden durchsetzen. Auch wie die Kämpfe untereinander ablaufen oder vielmehr, wie diese aufgelöst werden. Oder, ihr Sozialverhalten in ihrer Gemeinschaft, welche Art in welchem Jahr überwiegt, dominiert usw. All das bringt auch mich Tag für Tag zum Staunen! Jede Lebewesen-Beobachtung bedeutet für mich Lebensqualität, gesundes Lernen und Freude. Und gibt mir tatsächlich auch Mut. Beispielsweise, dass eben nicht immer nur der „Stärkste“ gewinnt, wie Kämpfe aufgelöst oder verhindert werden.
Michael Beleites formuliert aus, was sich daraus ableiten lässt. Nicht „Ich“ oder „Du“, sondern „Ich“ und „Du“. Lasst uns ausloten, was gemeinsam geht. Lasst uns verhindern, dass die Landschaft zerstört und aufgefressen wird. Lasst uns das dezentral angehen – ein jeder am besten dort, wo er spürt, dass es ihm gut geht.
-
@ 3ac03011:41ecd1bb
2025-03-08 11:49:21IT'S THE SAME THING AGAIN AND AGAIN AND AGAIN....
I just watched the latest John Oliver episode—I enjoy seeing opinions from all sides—and I'm just furious. He brought up an argument from some economists that left me rewinding just to make sure I heard it right. In response to Trump's proposed tax-break for tipped workers, they argued that these workers shouldn't get a tax-break because it's "unfair" to non-tipped workers in the same income bracker.
Wait, seriously? That's the hill they want to die on? So we're supposed to keep everyone broke just to preserve some twisted idea of fairness? That's like watching someone drown and refusing to throw one of those floating rings because someone else upstream doesn't have one either. It's not just misguided—it's downright delusional.
And, of course, the people pushing this argument aren't the ones worrying about rent or groceries. They're sitting comfortably, while arguing against anything that might actually help people who need it. It's all just virtue signaling.
What they misunderstand (when they choose to) is that fair isn't the same as good. I don't want a world where everyone's equally miserable—I want a world where people's lives actually improve. If a tax break can help tipped workers, even a little, why are we wasting time debating it?
This obsession with fairness for fairness's sake is exhausting. Isn't the goal to lift people up instead of dragging everyone down to the same level of struggle? It’s almost impressive how out of touch some people are. Fuck all of them.
-
@ a012dc82:6458a70d
2025-03-08 10:26:25The advent of Bitcoin introduced the world to a new form of digital gold, promising wealth and innovation through the marvels of blockchain technology. However, as the cryptocurrency landscape has evolved, so too have the implications of its underlying processes, particularly Bitcoin mining. In Granbury, Texas, a community has found itself at the intersection of technological advancement and environmental distress, embodying a growing concern over the real-world impacts of digital currencies. This narrative is not unique to Granbury but echoes across various locales globally, where the quest for digital wealth intersects with the fabric of everyday life, often at a cost not initially anticipated.
Table of Contents
-
The Heart of the Matter: Granbury's Plight
-
The Noise That Never Sleeps
-
A Community's Health at Stake
-
-
The Economics of Bitcoin Mining
- The Cost of Digital Wealth
-
Regulatory Responses and Community Action
- Seeking Solutions
-
The Future of Bitcoin Mining and Community Well-be …
- Sustainable Alternatives
-
Conclusion
-
FAQs
The Heart of the Matter: Granbury's Plight
Granbury, a small town in Texas, has become an unwilling host to the cacophony of Bitcoin mining. A local power plant, repurposed for the energy-intensive task of mining Bitcoin, has disrupted the lives of residents with its relentless noise. The sound, likened to the continuous roar of jet engines, penetrates the tranquility of this community, leaving in its wake sleepless nights, health issues, and a disturbed local ecosystem. This intrusion represents a broader dilemma faced by communities worldwide, where the benefits of technological progress clash with the sanctity of personal and environmental well-being.
The Noise That Never Sleeps
Cheryl Shadden, a nurse anesthetist living in Granbury, describes the noise as akin to sitting on an airport runway with jets taking off in succession. The constant hum has made simple pleasures like conversations on the back patio impossible, highlighting the intrusive nature of the mining operation. This relentless noise pollution is not just a minor inconvenience but a significant disruption to daily life, affecting everything from personal relationships to the simple enjoyment of one's home. The situation in Granbury sheds light on the often-overlooked consequences of industrial activities, prompting a reevaluation of what progress means at the expense of quality of life.
A Community's Health at Stake
The incessant din has not only stolen peace but has also been linked to physical ailments among the residents. Reports of migraines, sleep disturbances, and even wildlife fleeing the area paint a grim picture of the toll taken on the community's health and well-being. These health issues are a stark reminder of the environmental cost of our digital age, where the pursuit of innovation can sometimes lead to unforeseen consequences. The plight of Granbury's residents underscores the need for a balanced approach to technological development, one that considers the health and happiness of communities as a measure of success.
The Economics of Bitcoin Mining
Bitcoin mining, the process by which new bitcoins are entered into circulation and transactions are verified, is notoriously energy-hungry. It relies on a proof-of-work system that requires extensive computational power and, consequently, a significant amount of electricity. Texas, with its cheap energy and land, has become a global hub for these operations, attracting companies with the promise of low overhead costs. This economic boon, however, comes with its own set of challenges, as the environmental and social costs begin to surface in communities like Granbury.
The Cost of Digital Wealth
While Bitcoin mining has been lauded for its potential economic benefits, including job creation and investment, the case of Granbury reveals a darker side. The operation consumes approximately 2,100 megawatts of Texas's power supply, raising concerns about carbon and noise pollution, as well as increased utility bills for consumers. The juxtaposition of economic gain against environmental and social loss presents a complex dilemma. It raises critical questions about the sustainability of such ventures and the true cost of digital wealth in the age of cryptocurrency.
Regulatory Responses and Community Action
The situation in Granbury has sparked a dialogue on the need for regulatory oversight. Texas state law currently offers little recourse for noise pollution, with the maximum penalty for exceeding noise limits set at a mere $500 fine. This inadequacy has prompted local officials and residents to seek alternative solutions, including the construction of a sound barrier wall, which, paradoxically, has amplified the noise in some areas. The struggle for regulatory solutions reflects a broader challenge in governing emerging technologies and industries, where existing frameworks often fall short of addressing new and unforeseen impacts.
Seeking Solutions
In response to growing complaints, Marathon Digital Holdings, the company behind the Granbury mining operation, has pledged to conduct a sound study and take over full control of the mine to address community concerns. However, the effectiveness of these measures remains to be seen, and the community's frustration is palpable. This scenario highlights the importance of corporate responsibility and the need for companies to engage with and address the concerns of the communities in which they operate. It also underscores the potential for innovative solutions to mitigate the negative impacts of such operations, fostering a more harmonious relationship between industry and community.
The Future of Bitcoin Mining and Community Well-being
The case of Granbury serves as a cautionary tale of the unintended consequences of Bitcoin mining. As the cryptocurrency industry continues to grow, the balance between technological progress and environmental sustainability becomes increasingly precarious. This tension between innovation and well-being calls for a reimagined approach to technological development, one that prioritizes the health of our communities and the planet.
Sustainable Alternatives
The outcry from Granbury and similar communities across the country underscores the urgent need for sustainable mining practices. Alternatives such as proof-of-stake, a less energy-intensive consensus mechanism, offer a glimpse into a possible future where digital currencies can coexist with environmental stewardship. These alternatives not only represent a technical evolution but also a philosophical shift towards a more sustainable and equitable digital economy.
Conclusion
The story of Granbury is a microcosm of a larger debate on the impact of digital currencies on our physical world. As we venture further into the age of cryptocurrency, the challenge lies in harnessing its potential for economic growth without sacrificing the health and well-being of our communities. The digital gold rush must not lead to audible grief; instead, it should pave the way for innovations that are both economically beneficial and environmentally responsible. The journey from digital gold to a future where technology and nature harmonize requires not just technological innovation, but a collective commitment to redefining progress.
FAQs
How does Bitcoin mining affect local communities? Local communities, like Granbury, can experience noise pollution, increased electricity consumption leading to higher utility bills, potential environmental impacts due to increased energy use, and health issues among residents such as sleep disturbances and migraines.
What are the economic benefits of Bitcoin mining? Economic benefits include job creation, investment in local infrastructure, and increased demand for local services. However, these benefits often come with environmental and social costs that need to be carefully managed.
What measures are being taken to address the concerns of Granbury residents? Measures include the construction of sound barrier walls, conducting sound studies, and engaging with the community to find solutions. Companies like Marathon Digital Holdings are also taking steps to take over full control of mining operations to better address noise issues.
Are there sustainable alternatives to proof-of-work Bitcoin mining? Yes, alternatives such as proof-of-stake (PoS) are being explored and implemented in various cryptocurrencies. PoS is less energy-intensive and could potentially offer a more sustainable option for securing blockchain networks without the significant environmental impact of traditional mining.
How is the Texas government responding to the issue of Bitcoin mining noise pollution? The response includes monitoring noise levels and exploring legal and regulatory measures to manage the impact of mining operations. However, existing laws offer limited recourse, and there is ongoing discussion about the need for more effective regulations.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co/
Youtube: @thebitcoinlibertarian
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
Get Orange Pill App And Connect With Bitcoiners In Your Area. Stack Friends Who Stack Sats link: https://signup.theorangepillapp.com/opa/croxroad
Buy Bitcoin Books At Konsensus Network Store. 10% Discount With Code “21croxroad” link: https://bitcoinbook.shop?ref=21croxroad
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ d6c48950:54d57756
2025-03-08 08:17:06This post is going to cover some very basic habits and sanity checks that offer large returns over time whilst having a very low cost and in that theme I’m going to keep this to a condensed bullet point list.
how to get the solution faster - You solve problems every day, when you have a goal and try to achieve it, when you face a shortcoming and try and overcome it, when you have an issue and resolve it - As a habit each time you solve a problem go over your actual thoguht process, how did you solve it? - After you’ve looked critically at it ask how you could have improved it
if someones better do what they tell you - I’ve noticed a lot of people won’t take advice from people who knows better (I think because they feel if they just do what they’re told it doesn’t feel like ‘their’ accomplishment) - If someone is more credible than you and the advice they give is credible just do what you’re told
accept easy/simple solutions - Weight loss is incredibly simple, you weigh yourself daily, count your calories and maintain a deficit of 200-500kcal daily, apps automate most of the heavy lifting - As a human it’s natural to fight against simple/easy solutions to longstanding problems - “Not only has this thing been destroying my life for years but the solution is easy and something everyone already knows? the solution is the thing everyones been telling me since the problem first started?” - supress the urge to push it away and just accept the solution, even if it means your problem was mostly self inflicted and easily avoidable
log predictions - Keep a log of your predictions (I use apple numbers) then also log your confidence (55%, 65%, 75%, 85%, 95%) in each prediction and see how close you are - If you make 100 predictions at 55% confidence only 55 of them should be correct, if more are correct you’re underconfident if less are correct you’re overconfident
working harder is almost always beneficial - Despite the doomerish advice hard work and time spent working is beneficial way more than most people give it credit for - there’s probably a point at which it tops off (16hrs a day might be marginally better than 12hrs) but it’s way higher than you’d instinctively expect - Try working longer hours and harder and see how you do, in my view burnout is probably a non issue if other factors of your life (sleep, diet, exercise, stress management) are correct,
basic stuff works very well - Certain basic advice (sleep, exercise, don’t take recreational drugs, don’t drink) are not only increidlby consistent but they also have very large effect sizes, do the basic stuff before moving onto the more esoteric like nicotine patches or adderall
-
@ d6c48950:54d57756
2025-03-08 08:16:05This is just a readme for my github site - this is the best way to access my blog in my opinion, it's split into several "chunks" - Layer 1, Core and central content - Layer 2, Stuff that builds upon core - Layer 3, Misc
My blog can also be found on posthaven here that has more detailed tags and a search feature - obviously my posts can also be found on nostr
-
@ da0b9bc3:4e30a4a9
2025-03-08 07:03:33Hello Stackers!
Welcome on into the ~Music Corner of the Saloon!
A place where we Talk Music. Share Tracks. Zap Sats.
So stay a while and listen.
🚨Don't forget to check out the pinned items in the territory homepage! You can always find the latest weeklies there!🚨
🚨Subscribe to the territory to ensure you never miss a post! 🚨
originally posted at https://stacker.news/items/907271
-
@ 220522c2:61e18cb4
2025-03-08 06:19:30Comet is available on Linux
The Comet longform desktop app is available as an AppImage for Linux.
linux
-
@ 291c75d9:37f1bfbe
2025-03-08 04:09:59In 1727, a 21-year-old Benjamin Franklin gathered a dozen men in Philadelphia for a bold experiment in intellectual and civic growth. Every Friday night, this group—known as the Junto, from the Spanish juntar ("to join")—met in a tavern or private home to discuss "Morals, Politics, or Natural Philosophy (science)." Far from a casual social club, the Junto was a secret society dedicated to mutual improvement, respectful discourse, and community betterment. What began as a small gathering of tradesmen and thinkers would leave a lasting mark on Franklin’s life and colonial America.
Printers are educated in the belief that when men differ in opinion, both sides ought equally to have the advantage of being heard by the public, and that when Truth and Error have fair play, the former is always an overmatch for the latter. - Benjamin Franklin
The Junto operated under a clear set of rules, detailed by Franklin in his Autobiography:
"The rules that I drew up required that every member, in his turn, should produce one or more queries on any point of Morals, Politics, or Natural Philosophy, to be discuss’d by the company; and once in three months produce and read an essay of his own writing, on any subject he pleased. Our debates were to be under the direction of a president, and to be conducted in the sincere spirit of inquiry after truth, without fondness for dispute, or desire of victory; and, to prevent warmth [heatedness], all expressions of positiveness in opinions, or direct contradiction, were after some time made contraband and prohibited under small pecuniary penalties [monetary fines]."
These guidelines emphasized collaboration over competition. Members were expected to contribute questions or essays, sparking discussions that prioritized truth over ego. To keep debates civil, the group even imposed small fines for overly assertive or contradictory behavior—a practical nudge toward humility and open-mindedness. (Yes, I believe that is an ass tax!)
Rather than admitting new members, Franklin encouraged existing ones to form their own discussion groups. This created a decentralized network of groups ("private relays," as I think of them), echoing the structure of modern platforms like NOSTR—while preserving the Junto’s exclusivity and privacy.
From the beginning, they made it a rule to keep these meetings secret, without applications or admittance of new members. Instead, Franklin encouraged members to form their own groups—in a way acting as private relays of sorts. (I say "private" because they continued to keep the Junto secret, even with these new groups.)
Membership: A Diverse Circle United by Values
The Junto’s twelve founding members came from varied walks of life—printers, surveyors, shoemakers, and clerks—yet shared a commitment to self-improvement. Franklin, though the youngest (around 21 when the group formed), led the Junto with a vision of collective growth. To join, candidates faced a simple vetting process, answering four key questions:
- Have you any particular disrespect for any present members? Answer: I have not.
- Do you sincerely declare that you love mankind in general, of what profession or religion soever? Answer: I do.
- Do you think any person ought to be harmed in his body, name, or goods, for mere speculative opinions, or his external way of worship? Answer: No.
- Do you love truth for truth’s sake, and will you endeavor impartially to find and receive it yourself and communicate it to others? Answer: Yes.
These criteria reveal the Junto’s core values: respect, tolerance, and an unwavering pursuit of truth. They ensured that members brought not just intellect but also character to the table—placing dialogue as the priority.
One should also note the inspiration from the "Dry Club" of John Locke, William Popple, and Benjamin Furly in the 1690s. They too required affirmation to:
- Whether he loves all men, of what profession or religion soever?
- Whether he thinks no person ought to be harmed in his body, name, or goods, for mere speculative opinions, or his external way of worship?
- Whether he loves and seeks truth for truth’s sake; and will endeavor impartially to find and receive it himself, and to communicate it to others?
And they agreed: "That no person or opinion be unhandsomely reflected on; but every member behave himself with all the temper, judgment, modesty, and discretion he is master of."
The Discussions: 24 Questions to Spark Insight
Franklin crafted a list of 24 questions to guide the Junto’s conversations, ranging from personal anecdotes to civic concerns. These prompts showcase the group’s intellectual breadth. Here are some of my favorites:
Hath any citizen in your knowledge failed in his business lately, and what have you heard of the cause? Have you lately heard of any citizen’s thriving well, and by what means? Do you know of any fellow citizen who has lately done a worthy action, deserving praise and imitation? Do you think of anything at present in which the Junto may be serviceable to mankind, their country, friends, or themselves? Have you lately observed any defect in the laws of your country, which it would be proper to move the legislature for an amendment? Do you know of any deserving young beginner lately set up, whom it lies in the power of the Junto any way to encourage?
(Read them all here.)
Note the keen attention to success and failure, and the reflection on both. Attention was often placed on the community and individual improvement beyond the members of the group. These questions encouraged members to share knowledge, reflect on virtues and vices, and propose solutions to real-world problems. The result? Discussions that didn’t just end at the tavern door but inspired tangible community improvements.
The Junto’s Legacy: America’s First Lending Library
One of the Junto’s most enduring contributions to Philadelphia—and indeed, to the American colonies—was the creation of the first lending library in 1731. Born from the group’s commitment to mutual improvement and knowledge-sharing, this library became a cornerstone of public education and intellectual life in the community.
The idea for the library emerged naturally from the Junto’s discussions. Members, who came from diverse backgrounds but shared a passion for learning, recognized that their own access to books was often limited and costly—and they referred to them often. To address this, they proposed pooling their personal collections to create a shared resource. This collaborative effort allowed them—and eventually the broader public—to access a wider range of books than any individual could afford alone.
The library operated on a simple yet revolutionary principle: knowledge should be available to all, regardless of wealth or status. By creating a lending system, the Junto democratized access to information, fostering a culture of self-education and curiosity. This was especially significant at a time when books were scarce and formal education was not universally accessible.
The success of the Junto’s library inspired similar initiatives across the colonies, laying the groundwork for the public library system we know today. It also reflected the group’s broader mission: to serve not just its members but the entire community. The library became a symbol of the Junto’s belief in the power of education to uplift individuals and society alike.
With roots extending back to the founding of the Society in 1743, the Library of the American Philosophical Society houses over thirteen million manuscripts, 350,000 volumes and bound periodicals, 250,000 images, and thousands of hours of audiotape. The Library’s holdings make it one of the premier institutions for documenting the history of the American Revolution and Founding, the study of natural history in the 18th and 19th centuries, the study of evolution and genetics, quantum mechanics, and the development of cultural anthropology, among others.
The American Philosophical Society Library continues today. I hope to visit it myself in the future.
Freedom, for Community
Comparing the Junto to Nostr shows how the tools of community and debate evolve with time. Both prove that people crave spaces to connect, share, and grow—whether in a colonial tavern or a digital relay. Yet their differences reveal trade-offs: the Junto’s structure offered depth and focus but capped its reach, while Nostr’s openness promises scale at the cost of order.
In a sense, Nostr feels like the Junto’s modern echo—faster, bigger, and unbound by gates or rules. Franklin might admire its ambition, even if he’d raise an eyebrow at its messiness. For us, the comparison underscores a timeless truth: no matter the medium, the drive to seek truth and build community endures.
The Autobiography of Benjamin Franklin (1771–1790, pub. 1791)
http://www.benjamin-franklin-history.org/junto-club/
Benjamin Franklin, Political, Miscellaneous, and Philosophical Pieces, ed. Benjamin Vaughan (London: 1779), pp. 533–536.
"Rules of a Society" in The Remains of John Locke, Esq. (1714), p. 113
npubpro
-
@ c3ae4ad8:e54d46cb
2025-03-08 03:38:15This is for one serving (I'm currently doing a >500 cal low carb meal plan). Next time, I'll scramble an egg in there to up the protein a little more. High-protein, low-carb stir fry made with turkey, broccoli, snow peas, green onions, savoy cabbage, bok choy, garlic, in a sesame, soy and ginger sauce.
INGREDIENTS
- 1/3 lb / 170g ground turkey (I used 93% lean, hormone-free/organic)
- 2 tsp light olive oil or coconut oil
- 3 TB soy sauce, tamari, or coconut aminos
- 1 cup / 85g mixed stir fry greens, your choice (cabbage, bok choy, etc.)
- Half a bunch of green onion, roughly chopped, green parts only
- Dash of crushed red pepper flakes
- 1 clove minced garlic
- 1 tsp minced ginger
- Sesame seeds (optional, black, regular, or both!)
- 1 tsp sesame oil
DIRECTIONS
1. Heat oil in a skillet and add the ground turkey once the oil starts to shimmer.
2. On medium-high heat, cook the ground turkey, breaking it into bite-size pieces as it cooks, drizzling 1 TB of the soy sauce over the meat a little at a time. You want to evaporate the water out of the meat, so keep letting it cook until it's actually browned—the soy sauce helps with this, but you want the milliard reaction here (look it up and thank me later)!
3. Decrease the heat to low. Push the cooked turkey to one side and tilt the pan a bit away from you so the oil is isolated, and add the garlic into the oil and stir it in there a little bit.
4. Once the garlic is fragrant, stir the meat back into the garlic, toss in the chopped veggies, green onions, and remaining 1 TB of soy sauce. Then add the minced ginger and red pepper flakes on top, and quickly cover the pan with a lid. Let it steam for about 6-8 minutes on medium-low heat.
5. After the veggies are cooked, stir the little pile of steamed ginger into the mix, drizzle the sesame seed oil over the meat and veggies, stir again, and serve hot with optional sesame seeds as a garnish. Enjoy!
For more food and recipes by me, visit https://ketobeejay.npub.pro/ and click on "recipes" at the top
-
@ 7b3f7803:8912e968
2025-03-08 03:05:16Libertarians believe in open borders in theory. In practice, open borders don't work, because, among other things, the combination with a welfare state creates a moral hazard, and the least productive of society end up within the borders of welfare states and drain resources. The social services are paid by the productive people of the country or, in the case of most fiat systems, by currency holders through inflation. Welfare states are much more likely under fiat money and the redistribution goes from native taxpayers to illegal immigrants. Thus, under fiat money, open borders end up being an open wound by which the productive lifeblood of the country bleeds out, despite the theoretical trade-efficiency benefits. As libertarians like to say, open borders and the welfare state don't mix. In this article, we'll examine the other sacred cow of libertarian thought: free trade.
Free Trade without Libertarian Ideals
Free trade is very similar to free movement of labor in that it works great in theory, but not in practice, especially under fiat money. In a libertarian free-market world, free trade works. But that assumes a whole host of libertarian ideals like sound money, non-interfering governments, and minimal aggression. Once those ideals are violated, such as with government intervention in the market, similar moral hazards and long-term costs come with them, making free trade about as libertarian as a fractional reserve bank.
An example will illustrate what I'm talking about. Let's say Portugal subsidizes their wine for export to other countries. The obvious first-order effect is that it makes Portuguese wine cheaper in France, perhaps undercutting the price of French wine. Libertarians would say, that's great! French customers get cheaper goods, so what's the problem?
As with any government intervention, there are significant second- and third-order effects in play. Subsidization puts unsubsidized companies at risk, perhaps driving them to bankruptcy. In this case, this might be a French wine maker. Subsidized companies may become zombies instead of dying out. In this case, this might be a Portuguese wine maker that was failing domestically but survives by selling to customers abroad with government subsidies. While French customers benefit in the short run with cheaper prices for wine, they are ultimately hurt because the goods that would have existed without government intervention never come to market. Perhaps French wine makers that went bankrupt were innovating. Perhaps the resources of the zombie Portuguese wine maker would have created something better.
Further, the dependency of French people on Portuguese wine means that something going wrong in Portugal, like a war or subsidy cuts, disrupts the supply and price of wine for France. Now France must meddle in Portugal internationally if it doesn't want the wine supply to get disrupted. The two countries get entangled in such a way as to become more interventionist internationally. A war involving Portugal now suddenly becomes France's business and incentivizes military aid or even violence. As usual, the unseen effects of government policy are the most pernicious.
Not Really Free
In other words, what we call free trade isn't really free trade. A country exporting to the US may subsidize their products through government intervention, making the product cheaper in the US. This hurts US companies, and they’re forced into choices they never would have had to face without the foreign government intervention. But because the good is crossing borders under the rubric of "free trade," it's somehow seen as fair. Of course it's not, as government intervention distorts the market whether it's done by our own government or a foreign government.
So why would a foreign government do this? It gets several benefits through targeted market manipulation. First, it makes its own companies' products more popular abroad and conversely, makes US companies' products less popular. This has the dual benefit of growing the foreign government’s firms and shrinking, perhaps bankrupting, the US ones.
Targeted subsidization like this can lead to domination under free trade. It's not unlike the Amazon strategy of undercutting everyone first and using the monopoly pricing power at scale once everyone else has bankrupted. The global monopoly is tremendously beneficial to the country that has it. Not only is there significant tax revenue over the long term, but also a head start on innovations within that industry and an advantage in production in the adjacent industries around the product.
Second, the manufacturing centralization gives that country leverage geo-politically. A critical product that no one else manufactures means natural alliances with the countries that depend on the product, which is especially useful for smaller countries like Taiwan. Their chip manufacturing industry, holding 60% of global supply (2024), has meant that they're a critical link for most other countries, and hence, they can use this fact to deter Chinese invasion.
Third, because of the centralization of expertise, more innovations, products, and manufacturing will tend to come within the country. This increased production has cascading benefits, including new industries and national security. China leads the world in drone technology, which undoubtedly has given it an innovation advantage for its military, should it go to war.
Fourth, the capital that flows into the country for investing in the monopolized industry will tend to stay, giving the country more wealth in the form of factories, equipment, and skills. While that capital may nominally be in the hands of foreigners, over time, the ownership of that industry will inevitably transition toward native locals, as the knowledge about how to run such industries gets dissipated within the country.
[Image: Map showing “China Drone Tech” and “Taiwan Chips” hubs, with arrows of capital flow staying local]
Currency Devaluation: The Universal Trade Weapon
It would be one thing if only a specific industry were singled out for government subsidies and then the products dumped into the US as a way to hurt US companies, as that would limit the scope of the damage. But with currency devaluation, a government can subsidize all of its exports at the same time. Indeed, this is something that many countries do. While short-term, this helps US consumers, it hurts US companies and forces them into decisions that aren't good for the US.
To compete, they have to lower costs by using the same devalued currency to pay their labor as their foreign competition. That is, by relocating their capital, their manufacturing, and even their personnel to the country that's devaluing the currency. Not only does relocating reduce labor cost, but it also often gets them benefits like tax breaks. This makes US companies de facto multinationals and not only makes them subject to other jurisdictions, but ultimately divides their loyalties. To take advantage of the reduced labor, capital must move to another country and, along with it, future innovation.
Such relocations ultimately leave the company stripped of their manufacturing capability in the US, as local competition will generally fare better over the long run. Much of the value of the industry then is captured by other governments in taxes, development, and even state-owned companies. Free trade, in other words, creates a vulnerability for domestic companies as they can be put at a significant disadvantage compared to foreign counterparts.
Hidden Effects of Foreign Intervention
Unlike the multinationals, small companies have no chance as they're not big enough to exploit the labor arbitrage. And as is usual in a fiat system, they suffer the most while the giant corporations get the benefits of the supposed "free trade". Most small companies can't compete, so we get mostly the bigger companies that survive.
The transition away from domestic manufacturing necessarily means significant disruption. Domestic workers are displaced and have to find new work. Factories and equipment either have to be repurposed or rot. Entire communities that depended on the manufacturing facility now have to figure out new ways to support themselves. It's no good telling them that they can just do something else. In a currency devaluation scenario, most of the manufacturing leaves and the jobs left are service-oriented or otherwise location-based, like real estate development. There's a natural limit to location-based industries because the market only grows with the location that you're servicing. Put another way, you can only have so many people give haircuts or deliver packages in a geographic area. There has to be some manufacturing of goods that can be sold outside the community, or the community will face scarce labor opportunities relative to the population.
You also can't say the displaced workers can start some other manufacturing business. Such businesses will get out-competed on labor by the currency-devaluing country, so there won't be much investment available for such a business, and even if there were, such a business would be competing with its hands tied behind its back. So in this scenario, what you end up with are a large pool of unemployed people whom the state subsidizes with welfare.
So when a US company leaves or goes bankrupt due to a foreign government's subsidies, the disruption alone imposes a significant short-term cost with displaced labor, unused capital goods, and devastated communities.
Mitigations
So how do countries fight back against such a devastating economic weapon? There are a few ways countries have found around this problem of currency devaluation under free trade. First, a country can prevent capital from leaving. This is called capital controls, and many countries, particularly those that manufacture a lot, have them. Try to get money, factories, or equipment out of Malaysia, for example, and you'll find that they make it quite difficult. Getting the same capital into the country, on the other hand, faces few restrictions. Unfortunately, the US can't put in capital controls because dollars are its main export. It is, after all, the reserve currency of the world.
Second, you can compete by devaluing your own currency. But that’s very difficult because it requires printing a lot of dollars, and that causes inflation. There's also no guarantee that a competing country doesn't devalue its currency again. The US is also in a precarious position as the world's reserve currency, so devaluing the currency more than it already does will make other holders of the dollar less likely to want to hold it, threatening the reserve currency status.
So the main two mitigations against currency devaluation in a free trade scenario are not available to the US. So what else is there? The remaining option is to drop free trade. The solution, in other words, is to add tariffs. This is how you can nullify the effects of foreign government intervention, by leveling the playing field for US manufacturers.
Tariffs
One major industry that's managed to continue being manufactured in the US despite significant foreign competition is cars. Notably, cars have a tariff, which incentivizes their manufacture in the US, even for foreign car makers. The tariff has acted as a way to offset foreign government subsidies and currency debasement.
The scope of this one industry for the US is huge. There are around 300,000 direct jobs in auto assembly within the US (USTR) and there are an additional 3 million jobs supplying these manufacturers within the US. But the benefits don't end there. The US is also creating a lot of innovation around cars, such as self-driving and plug-in electric cars. There are many countries that would love to have this industry for themselves, but because of tariffs, auto manufacturing continues in the US.
And though tariffs are seen as a tax on consumers, US car prices are cheap relative to the rest of the world. What surprises a lot of people when they move from the US to other countries is finding out that the same car often costs more abroad (e.g. 25% tariffs keep U.S. prices 20% below Europe’s $40K average, 2024). The downside of tariffs pales next to the downsides of "free trade."
Free Trade Doesn’t Work with Fiat Money
The sad reality is that while we would love for free trade to work in the ideal libertarian paradise, it won't in our current fiat-based system. The subsidization by foreign governments to bankrupt US companies or to make them multinational, combined with the unfortunate reality of the US dollar being the world reserve currency, means that free trade guts the US of manufacturing. Tariffs are a reasonable way to protect US manufacturers, particularly smaller ones that can't go multinational.
What's more, tariffs make the US less fragile and less dependent on international supply chains. Many of the wars in the past 60 years have been waged because of the entanglements the US has with other countries due to the reliance on international supply chains. Lessening this dependency, if only to prevent a war, has clear value.
Lastly, labor has been devalued significantly by fiat monetary expansion, but at least some of that can be recovered if tariffs create more manufacturing, which in turn adds to the demand for labor. This should reduce the welfare state as more opportunities are made available and fewer unemployed people will be on the rolls.
Conclusion
Fiat money produces a welfare state, which makes open borders unworkable. Fiat money also gives foreign governments a potent economic weapon to use against US companies, and by extension the labor force that powers them. Though currency debasement and capital controls are available to other countries as a defense, for the US, neither of these tools is available due to the fact that the dollar is the world reserve currency. As such, tariffs are a reasonable defense against the fiat subsidization of foreign governments.
-
@ 7b3f7803:8912e968
2025-03-08 02:28:40Libertarians believe in open borders in theory. In practice, open borders don’t work, because, among other things, the combination with a welfare state creates a moral hazard, and the least productive of society end up within the borders of welfare states and drain resources. The social services are paid by the productive people of the country or, in the case of most fiat systems, by currency holders through inflation. Welfare states are much more likely under fiat money and the redistribution goes from native taxpayers to illegal immigrants. Thus, under fiat money, open borders end up being an open wound by which the productive lifeblood of the country bleeds out, despite the theoretical trade-efficiency benefits. As libertarians like to say, open borders and the welfare state don’t mix. In this article, we’ll examine the other sacred cow of libertarian thought: free trade.
Free Trade without Libertarian Ideals
Free trade is very similar to free movement of labor in that it works great in theory, but not in practice, especially under fiat money. In a libertarian free-market world, free trade works. But that assumes a whole host of libertarian ideals like sound money, non-interfering governments, and minimal aggression. Once those ideals are violated, such as with government intervention in the market, similar moral hazards and long-term costs come with them, making free trade about as libertarian as a fractional reserve bank.
An example will illustrate what I’m talking about. Let’s say Portugal subsidizes their wine for export to other countries. The obvious first-order effect is that it makes Portuguese wine cheaper in France, perhaps undercutting the price of French wine. Libertarians would say, that’s great! French customers get cheaper goods, so what’s the problem?
As with any government intervention, there are significant second- and third-order effects in play. Subsidization puts unsubsidized companies at risk, perhaps driving them to bankruptcy. In this case, this might be a French wine maker. Subsidized companies may become zombies instead of dying out. In this case, this might be a Portuguese wine maker that was failing domestically but survives by selling to customers abroad with government subsidies. While French customers benefit in the short run with cheaper prices for wine, they are ultimately hurt because the goods that would have existed without government intervention never come to market. Perhaps French wine makers that went bankrupt were innovating. Perhaps the resources of the zombie Portuguese wine maker would have created something better.
Further, the dependency of French people on Portuguese wine means that something going wrong in Portugal, like a war or subsidy cuts, disrupts the supply and price of wine for France. Now France must meddle in Portugal internationally if it doesn’t want the wine supply to get disrupted. The two countries get entangled in such a way as to become more interventionist internationally. A war involving Portugal now suddenly becomes France’s business and incentivizes military aid or even violence. As usual, the unseen effects of government policy are the most pernicious.
Not Really Free
In other words, what we call free trade isn’t really free trade. A country exporting to the US may subsidize their products through government intervention, making the product cheaper in the US. This hurts US companies, and they’re forced into choices they never would have had to face without the foreign government intervention. But because the good is crossing borders under the rubric of “free trade,” it’s somehow seen as fair. Of course it’s not, as government intervention distorts the market whether it’s done by our own government or a foreign government.
So why would a foreign government do this? It gets several benefits through targeted market manipulation. First, it makes its own companies’ products more popular abroad and conversely, makes US companies’ products less popular. This has the dual benefit of growing the foreign government’s firms and shrinking, perhaps bankrupting, the US ones.
Targeted subsidization like this can lead to domination under free trade. It’s not unlike the Amazon strategy of undercutting everyone first and using the monopoly pricing power at scale once everyone else has bankrupted. The global monopoly is tremendously beneficial to the country that has it. Not only is there significant tax revenue over the long term, but also a head start on innovations within that industry and an advantage in production in the adjacent industries around the product.
Second, the manufacturing centralization gives that country leverage geo-politically. A critical product that no one else manufactures means natural alliances with the countries that depend on the product, which is especially useful for smaller countries like Taiwan. Their chip manufacturing industry, holding 60% of global supply (2024), has meant that they’re a critical link for most other countries, and hence, they can use this fact to deter Chinese invasion.
Third, because of the centralization of expertise, more innovations, products, and manufacturing will tend to come within the country. This increased production has cascading benefits, including new industries and national security. China leads the world in drone technology, which undoubtedly has given it an innovation advantage for its military, should it go to war.
Fourth, the capital that flows into the country for investing in the monopolized industry will tend to stay, giving the country more wealth in the form of factories, equipment, and skills. While that capital may nominally be in the hands of foreigners, over time, the ownership of that industry will inevitably transition toward native locals, as the knowledge about how to run such industries gets dissipated within the country.
Currency Devaluation: The Universal Trade Weapon
It would be one thing if only a specific industry were singled out for government subsidies and then the products dumped into the US as a way to hurt US companies, as that would limit the scope of the damage. But with currency devaluation, a government can subsidize all of its exports at the same time. Indeed, this is something that many countries do. While short-term, this helps US consumers, it hurts US companies and forces them into decisions that aren’t good for the US.
To compete, they have to lower costs by using the same devalued currency to pay their labor as their foreign competition. That is, by relocating their capital, their manufacturing, and even their personnel to the country that’s devaluing the currency. Not only does relocating reduce labor cost, but it also often gets them benefits like tax breaks. This makes US companies de facto multinationals and not only makes them subject to other jurisdictions, but ultimately divides their loyalties. To take advantage of the reduced labor, capital must move to another country and, along with it, future innovation.
Such relocations ultimately leave the company stripped of their manufacturing capability in the US, as local competition will generally fare better over the long run. Much of the value of the industry then is captured by other governments in taxes, development, and even state-owned companies. Free trade, in other words, creates a vulnerability for domestic companies as they can be put at a significant disadvantage compared to foreign counterparts.
Hidden Effects of Foreign Intervention
Unlike the multinationals, small companies have no chance as they’re not big enough to exploit the labor arbitrage. And as is usual in a fiat system, they suffer the most while the giant corporations get the benefits of the supposed “free trade”. Most small companies can’t compete, so we get mostly the bigger companies that survive.
The transition away from domestic manufacturing necessarily means significant disruption. Domestic workers are displaced and have to find new work. Factories and equipment either have to be repurposed or rot. Entire communities that depended on the manufacturing facility now have to figure out new ways to support themselves. It’s no good telling them that they can just do something else. In a currency devaluation scenario, most of the manufacturing leaves and the jobs left are service-oriented or otherwise location-based, like real estate development. There’s a natural limit to location-based industries because the market only grows with the location that you’re servicing. Put another way, you can only have so many people give haircuts or deliver packages in a geographic area. There has to be some manufacturing of goods that can be sold outside the community, or the community will face scarce labor opportunities relative to the population.
You also can’t say the displaced workers can start some other manufacturing business. Such businesses will get out-competed on labor by the currency-devaluing country, so there won’t be much investment available for such a business, and even if there were, such a business would be competing with its hands tied behind its back. So in this scenario, what you end up with are a large pool of unemployed people whom the state subsidizes with welfare.
So when a US company leaves or goes bankrupt due to a foreign government’s subsidies, the disruption alone imposes a significant short-term cost with displaced labor, unused capital goods, and devastated communities.
Mitigations
So how do countries fight back against such a devastating economic weapon? There are a few ways countries have found around this problem of currency devaluation under free trade. First, a country can prevent capital from leaving. This is called capital controls, and many countries, particularly those that manufacture a lot, have them. Try to get money, factories, or equipment out of Malaysia, for example, and you’ll find that they make it quite difficult. Getting the same capital into the country, on the other hand, faces few restrictions. Unfortunately, the US can’t put in capital controls because dollars are its main export. It is, after all, the reserve currency of the world.
Second, you can compete by devaluing your own currency. But that’s very difficult because it requires printing a lot of dollars, and that causes inflation. There’s also no guarantee that a competing country doesn’t devalue its currency again. The US is also in a precarious position as the world’s reserve currency, so devaluing the currency more than it already does will make other holders of the dollar less likely to want to hold it, threatening the reserve currency status.
So the main two mitigations against currency devaluation in a free trade scenario are not available to the US. So what else is there? The remaining option is to drop free trade. The solution, in other words, is to add tariffs. This is how you can nullify the effects of foreign government intervention, by leveling the playing field for US manufacturers.
Tariffs
One major industry that’s managed to continue being manufactured in the US despite significant foreign competition is cars. Notably, cars have a tariff, which incentivizes their manufacture in the US, even for foreign car makers. The tariff has acted as a way to offset foreign government subsidies and currency debasement.
The scope of this one industry for the US is huge. There are around 300,000 direct jobs in auto assembly within the US (USTR) and there are an additional 3 million jobs supplying these manufacturers within the US. But the benefits don’t end there. The US is also creating a lot of innovation around cars, such as self-driving and plug-in electric cars. There are many countries that would love to have this industry for themselves, but because of tariffs, auto manufacturing continues in the US.
And though tariffs are seen as a tax on consumers, US car prices are cheap relative to the rest of the world. What surprises a lot of people when they move from the US to other countries is finding out that the same car often costs more abroad (e.g. 25% tariffs keep U.S. prices 20% below Europe’s $40K average, 2024). The downside of tariffs pales next to the downsides of “free trade.”
Free Trade Doesn’t Work with Fiat Money
The sad reality is that while we would love for free trade to work in the ideal libertarian paradise, it won’t in our current fiat-based system. The subsidization by foreign governments to bankrupt US companies or to make them multinational, combined with the unfortunate reality of the US dollar being the world reserve currency, means that free trade guts the US of manufacturing. Tariffs are a reasonable way to protect US manufacturers, particularly smaller ones that can’t go multinational.
What’s more, tariffs make the US less fragile and less dependent on international supply chains. Many of the wars in the past 60 years have been waged because of the entanglements the US has with other countries due to the reliance on international supply chains. Lessening this dependency, if only to prevent a war, has clear value.
Lastly, labor has been devalued significantly by fiat monetary expansion, but at least some of that can be recovered if tariffs create more manufacturing, which in turn adds to the demand for labor. This should reduce the welfare state as more opportunities are made available and fewer unemployed people will be on the rolls.
Conclusion
Fiat money produces a welfare state, which makes open borders unworkable. Fiat money also gives foreign governments a potent economic weapon to use against US companies, and by extension the labor force that powers them. Though currency debasement and capital controls are available to other countries as a defense, for the US, neither of these tools is available due to the fact that the dollar is the world reserve currency. As such, tariffs are a reasonable defense against the fiat subsidization of foreign governments.
-
@ df478568:2a951e67
2025-03-08 02:16:57I began using/testing Cashu over 105,120 blocks ago when @NVK said "Cashu is very interesting.".
The first time I swapped sweet cipher-text to sats, it was too new new and novel to digest. Someone sent me cashu over nostr, straight to my npub. I copy pasta-ed it into my minibits wallet and recieved 10 sats. In retrospect, I would compare it to gold backed paper currency. Over a century ago, paper USD was a coupon for gold, "redeemable in gold on demand at the United States Treasury, or in gold for lawful money at any federal reserve bank.
In the analog days of the early 20th century a bean-counter at a Federal Reserve bank would give you approximately 5 ounces of gold for an analog bored ape, Ben Franklin. Cashu is an NFT without the jpeg and the innate ability to be redeemed for bitcoin over the lightning network. I've heard NVK describe it as "an honest shitcoin" and I like this framing. The rug-pull risk is greater than zero, but less than the rug-pull risk of Wallet of Satoshi with the added benefit of generational wealth.
This means we can abstract bitcoin value into something that looks like this.
cashuBpGFteCJodHRwczovL21pbnQubWluaWJpdHMuY2FzaC9CaXRjb2luYXVjc2F0YXSBomFpSABQBVDwSUFGYXCCpGFhAmFzeEBkMzM2Mjk1OTZhNTVkODcyNWFjOGI3MDQyNjM5MjQ0OTU4YmJlMjVkYmFhYzIyY2E5Y2M2NTMyNTM1OWFiZDI2YWNYIQNOrrDCFnYa3sMJxpr02o8Bg5AfibjqIOTmiktqYkABKWFko2FlWCBdC0gEM2j5YE4_xMGyuvLHIufqx7zzp6TNJAeJiB6_WmFzWCDRMyyGRmJPYmwB3u8kB7fyBlvRm69hC2DfkyY5Mizd-WFyWCB_88znXGBc_GgRngr9m1nEYAJEDUkQiQLT1e6R9_Un_aRhYQhhc3hANjVkYWQyM2ExNjQyNTYzMDU5OGRmMTdiNDc0YWQ0YzdhMjNhMmFiZjUwNjEzYTdjOTI4NzllMDllZTg5ODcxZWFjWCECoRg-ub_wReP4T6A0UuwqS36Iw6Ton4U5j6IJrLYjKCxhZKNhZVggmXDv_na1XQU3ESYq147mIyDyQm5mgsnkl7HxBbVmXv9hc1ggIbKkVVdG06hBgAvWBhoFo8T-V6MjNzxUGNaGjQjU2e5hclggAJp2vzdgwmehnhwmmFQsZ_BNTb8Aqz_ItwOx0iLQ9NlhZHgtQ29uZ3JhdHVsYXRpb25zIGZvciBjbGFpbWluZyB0aGlzIGVjYXNoIGZpcnN0
The lightning network is cool, but requires the reciever to have a wallet. Many Americans began using nostr when Wallet of Satoshi was available to them. They disappeared like a magiian once Wallet of Satoshi was removed from the app stores. To be fair, it still works. Last I checked, sats from wallet of satoshi can still be received and spent from US based IP addresses, but non-technical noobs can no longer download it from app stores designed for the neuro-typical.
I sprinkled a little e cash in a few Substack articles, but few people know what it is. These things takes time. Maybe it's too early. Maybe, just maybe, we can make paper cash great again.
Is it a long shot? Sure. Will I try it anyway? Hell yes!
How To Make Paper Money Great Again
The plan: Create paper products with QR codes that have Cashu. Think tip cards or birtday cards designed to hold cash. You can choose your mint on Mibibits or Macadamia depending on your pnone. This is not bitcoin for posterity. We're talking about pocket spending money, not generational wealth.
I plan to make and sell greeting cards: HallMarc cards.😉 I draw like I'm 5, but we'll let the market decide if they prefer my Kidnergarden-style art or Ideogram. Then I'll write some cheesy words people like on greeting cards. Here's my first idea.
Happy Birthday
Stack Sats.
Okay....So it's more like a first draft, but this is a proof of concept. Cut me some slack. 😅 There's still a few kinks to work out, but here's the prototype.
Set Up Shop With A Free And Open Source Version
I will add these cards to my merch shop. I can add 1,000 sats, maybe some custom amounts, but I'll also open source them. I like to give cards that pay bitcoin to kids in my family. If I open source this, maybe more people will be willing to give the kids in their family sats. It only costs card stock paper, ink, and the sats you give away.
If you're like me, your family knows your a bitcoin dork anyway. We might as well show them it's not just an investment. It's money we can give them they can either save or spend.
We should mention it's better to save bitcoin. That's what stacking sats means. That will be my second draft.
Happy Birthday.
Save as much bitcoin as you can.
Npub1marc26z8nh3xkj5rcx7ufkatvx6ueqhp5vfw9v5teq26z254renshtf3g0
https://mempool.marc26z.com/block/000000000000000000001567ce65dab25358bcae86c2c573984888eb08948b65
https://marc26z.com/merch/
-
@ 6e0ea5d6:0327f353
2025-03-08 01:31:14💀
No one returns the same after witnessing such great disrespect that even the eyes doubt what they see.
When behavior does not match the promise, when the path being followed contradicts our principles, when a lie unfolds right before our eyes, or when an offense is deliberately crafted as a test of our resolve, a feeling arises—one that urges us to intervene, to stop such foolishness so that things may proceed as they should. But it is an arrow already released. It cannot be retrieved. There is no turning back. And perhaps, Nietzsche’s words explain it best:
"I’m not upset that you lied to me; I’m upset that from now on, I can’t trust you."
This is what we feel, in conflict with what we know. But maturity has taught us whom to listen to. The mind knows that one must be cruel to oneself so that others will not be cruel to us.
It takes cruelty to kill with indifference what desires to live in our hearts.
Thank you for reading, my friend!
If this message resonated with you, consider leaving your "🥃" as a token of appreciation.
A toast to our family!
-
@ 6e0ea5d6:0327f353
2025-03-08 01:17:35Ascolta bene, amico mio. Are you really concerned about what a morally bankrupt society has to say about "being a man"?
The same society that glorifies weakness, where anyone—without the slightest idea of what it means to bear the weight of masculinity—thinks they have the right to an opinion? And, of course, we can’t forget the spectacle: women without any solid paternal reference, never having experienced what it means to have a true masculine figure, now feel entitled to dictate how you should live, act, and even feel. This is more than a joke—it’s the tragic portrait of a civilization on the brink of collapse.
Think about it: it’s as if someone who has never held a hammer tried to teach a blacksmith how to forge steel. What do they know about the burden of being a man? They have never had to carry this weight. They have never known what it is to walk alone, facing the world without guarantees, without anyone to catch them when everything falls apart. Talking is easy, amico mio, when they’ve never had to get their hands dirty with the brutal reality we face every day.
Want to know what you should do? Ignore it. Simple as that. The opinion of those who have never walked your path holds no value. Do not take seriously the judgments of those trapped in a modern fantasy of masculinity, shaped by empty ideals that only encourage weakness. If these women have never had a strong father figure, a real example of masculinity, what do they know about being a man? Nothing. And the worst part: they don’t even realize the emptiness of their words.
And here’s the lesson: you don’t need the approval of a lost society that doesn’t understand the value of discipline, strength, and the sacrifice that true masculinity demands. You don’t need to be shaped by the expectations of this dying world. The only respect that matters is the one you have for yourself. Once you understand this, the judgment of others becomes irrelevant, and their voices fade into the wind like an insignificant breeze.
Who do you want to be respected by? A society that glorifies mediocrity? Or by those who, like you, know the true struggle?
Thank you for reading, my friend!
If this message resonated with you, consider leaving your "🥃" as a token of appreciation.
A toast to our family!
-
@ 4925ea33:025410d8
2025-03-08 00:38:481. O que é um Aromaterapeuta?
O aromaterapeuta é um profissional especializado na prática da Aromaterapia, responsável pelo uso adequado de óleos essenciais, ervas aromáticas, águas florais e destilados herbais para fins terapêuticos.
A atuação desse profissional envolve diferentes métodos de aplicação, como inalação, uso tópico, sempre considerando a segurança e a necessidade individual do cliente. A Aromaterapia pode auxiliar na redução do estresse, alívio de dores crônicas, relaxamento muscular e melhora da respiração, entre outros benefícios.
Além disso, os aromaterapeutas podem trabalhar em conjunto com outros profissionais da saúde para oferecer um tratamento complementar em diversas condições. Como já mencionado no artigo sobre "Como evitar processos alérgicos na prática da Aromaterapia", é essencial ter acompanhamento profissional, pois os óleos essenciais são altamente concentrados e podem causar reações adversas se utilizados de forma inadequada.
2. Como um Aromaterapeuta Pode Ajudar?
Você pode procurar um aromaterapeuta para diferentes necessidades, como:
✔ Questões Emocionais e Psicológicas
Auxílio em momentos de luto, divórcio, demissão ou outras situações desafiadoras.
Apoio na redução do estresse, ansiedade e insônia.
Vale lembrar que, em casos de transtornos psiquiátricos, a Aromaterapia deve ser usada como terapia complementar, associada ao tratamento médico.
✔ Questões Físicas
Dores musculares e articulares.
Problemas respiratórios como rinite, sinusite e tosse.
Distúrbios digestivos leves.
Dores de cabeça e enxaquecas. Nesses casos, a Aromaterapia pode ser um suporte, mas não substitui a medicina tradicional para identificar a origem dos sintomas.
✔ Saúde da Pele e Cabelos
Tratamento para acne, dermatites e psoríase.
Cuidados com o envelhecimento precoce da pele.
Redução da queda de cabelo e controle da oleosidade do couro cabeludo.
✔ Bem-estar e Qualidade de Vida
Melhora da concentração e foco, aumentando a produtividade.
Estímulo da disposição e energia.
Auxílio no equilíbrio hormonal (TPM, menopausa, desequilíbrios hormonais).
Com base nessas necessidades, o aromaterapeuta irá indicar o melhor tratamento, calculando doses, sinergias (combinação de óleos essenciais), diluições e técnicas de aplicação, como inalação, uso tópico ou difusão.
3. Como Funciona uma Consulta com um Aromaterapeuta?
Uma consulta com um aromaterapeuta é um atendimento personalizado, onde são avaliadas as necessidades do cliente para a criação de um protocolo adequado. O processo geralmente segue estas etapas:
✔ Anamnese (Entrevista Inicial)
Perguntas sobre saúde física, emocional e estilo de vida.
Levantamento de sintomas, histórico médico e possíveis alergias.
Definição dos objetivos da terapia (alívio do estresse, melhora do sono, dores musculares etc.).
✔ Escolha dos Óleos Essenciais
Seleção dos óleos mais indicados para o caso.
Consideração das propriedades terapêuticas, contraindicações e combinações seguras.
✔ Definição do Método de Uso
O profissional indicará a melhor forma de aplicação, que pode ser:
Inalação: difusores, colares aromáticos, vaporização.
Uso tópico: massagens, óleos corporais, compressas.
Banhos aromáticos e escalda-pés. Todas as diluições serão ajustadas de acordo com a segurança e a necessidade individual do cliente.
✔ Plano de Acompanhamento
Instruções detalhadas sobre o uso correto dos óleos essenciais.
Orientação sobre frequência e duração do tratamento.
Possibilidade de retorno para ajustes no protocolo.
A consulta pode ser realizada presencialmente ou online, dependendo do profissional.
Quer saber como a Aromaterapia pode te ajudar? Agende uma consulta comigo e descubra os benefícios dos óleos essenciais para o seu bem-estar!
-
@ dc4cd086:cee77c06
2025-03-07 22:32:02Understanding Network Dynamics in Technology Adoption
- Top Row: Continuous vs Discontinuous Transitions in Social Diffusion
- Shows two different ways that innovations spread through a population. The horizontal axis (
λ
) represents "persuasion capacity" - how effectively adopters convince others to join. The vertical axis (ρ
) shows what fraction of the population eventually adopts. - Blue line shows a continuous transition: as persuasion capacity increases, adoption grows gradually and smoothly. Example: streaming services that steadily gains users year after year.
- Red line shows a discontinuous transition (or "tipping point"): adoption remains near zero until reaching a critical threshold, then suddenly jumps to a high level. This represents technologies that spread explosively once they reach a critical mass.
- The different curves emerge from the situations of how people make adoption decisions. When there is higher adoption resistance (higher threshold
T
and steeper response curvea
), discontinuous transitions become more likely.
Bottom Left: Cascade Window
When is widespread adoption possible? Its based on network structure. The horizontal axis (
z
) represents network connectivity - on average, how many connections does an individual have? The plot has a regime "cascade window" - widespread adoption only occurs within a specific range of connectivity: - If connectivity is too low (left side), the network is too fragmented for innovations to spread widely - If connectivity is too high (right side), people become resistant to change because they need many of their connections to adopt before they will follow suitThe different curves show theoretical predictions for:
- The early adopter network (blue solid): people who can be convinced to adopt with minimal influence.
- The core connected userbase (red line): the largest interconnected population in the network
- Total adoption potential (green line): the potential total reach possible through both early adopters and those they influence
Bottom Right: Phase Transition Points
This plot highlights
critical thresholds
where the system undergoes dramatic changes. The peaks represent points where small changes in network connectivity cause the largest shifts in adoption patterns. The vertical dashed line marks a critical connectivity value where adoption dynamics fundamentally change. Near these critical points, the network becomes especially sensitive - like how a small price drop might suddenly make a product accessible to a much larger market segment, increasing how easily individuals are connected.The green line (total adoption potential rate) shows only a brief spike at the critical threshold and then quickly returns to zero. Implying that the total potential reach of an innovation changes only at that specific critical point and then stabilizes. This is why timing market entry is so crucial - there's a narrow window where network conditions can suddenly enable widespread adoption, and missing this window means the technology might never achieve its full potential.
Further Reading:
- Malcom Gladwell's Tipping Point
Sources:
- https://www.frontiersin.org/journals/physics/articles/10.3389/fphy.2018.00021/full
-
https://www.pnas.org/doi/10.1073/pnas.1414708112
-
https://www.pnas.org/doi/10.1073/pnas.082090499
-
@ 527b02f7:b0ed5fd2
2025-03-07 21:40:48202502181044 Este HUD para PLO debería de estar prohibido☠⛔
Creado: 2025-02-18 10:46
La estructura del HUD: La esencia de la información para explotar a tus rivales 📊
Un HUD para PLO debe reunir estadísticas específicas y bien calibradas, pensadas para identificar patrones de juego y explotar las debilidades de cada rival. Este en particular incluye todas las métricas que considero esenciales.
Dependiendo de tu nivel tienes disponibles dos versiones del HUD:
- Una para PLO BASIC, más sencilla con los valores esenciales generales y los valores más básicos post-flop
![[Pasted image 20250218105241.png]]
- Otra para PLO PRO, la versión más completa con toda la información necesaria que necesitas para conocer cada detalle del juego de tus rivales.
![[Hand2Note_Zr1rE8CUv7.png]]
Todo HUD comienza con las tres estadísticas generales más importantes para identificar a qué tipo de jugador te enfrentas:
- VPIP (Voluntarily Put Money In Pot): Esta estadística muestra la frecuencia con la que un jugador pone dinero en el bote de forma voluntaria.
- PFR (Preflop Raise): Un indicador de la agresividad preflop. El PFR nos permite entender qué tan seguido un jugador toma la iniciativa antes del flop, lo que es esencial para decidir cuándo hacer call o re-raise.
- 3-Bet Preflop: la frecuencia de 3-bet preflop nos indica el % de manos que está resubiendo el jugador pre-flop. Esto nos indica su grado de agresividad general antes del flop.
Esto como puedes imaginarte es tan solo un aperitivo de todo lo que podemos deducir de las estadísticas que nos da el HUD.
Instalación y configuración del HUD en cada software 🔧
Configurar el HUD en Hand2Note, PT4 o HM3 es bastante sencillo, y en Mentopoker puedes acceder a tutoriales específicos. Estos tutoriales te guiarán paso a paso para que puedas instalarlo correctamente y personalizar algunos ajustes según tu estilo de juego.
Puedes descargar el HUD en sus dos versiones dependiendo de tu nivel en la escuela directamente desde la página de descargas de Mentopoker.
Además si quieres aprender a leer, interpretar y sacar el máximo provecho al HUD, tienes clases específicas en la escuela donde te lo explico con lujo de detalles.
Estás dejando dinero en la mesa 💸
Si estás buscando una herramienta que te dé una ventaja real en las mesas de PLO, este HUD es sin duda una de las mejores opciones. La suscripción a Mentopoker no solo te permitirá acceder a este HUD, sino que también podrás mejorar cada aspecto de tu juego con el soporte y las clases exclusivas que hemos creado.
Si quieres jugar como un profesional y ganar como un profesional, has de usar las herramientas que usan los profesionales. Un HUD mediocre te brindará información poco precisa y dejará muchos huecos de información sobre información relevante. Por el contrario un HUD hecho por jugadores profesionales, te dará información crucial que marcará la diferencia en decisiones clave, que te harán incrementar sin lugar a dudas tu winrate.
En la escuela siempre compartimos los métodos y herramientas que usamos nosotros en las mesas día a día, para que así siempre tengas los mejores recursos a tu disposición.
En futuros artículos compartiré otra información relevante al respecto, como la fiabilidad de los datos y el grado de certeza de las muestras.
¡Nos vemos en las mesas!
Suscríbete al blog.
Te informaré cada vez que publique una nueva entrada y así estarás al día de las últimas novedades.
El email que proporciones no se utilizará para mandar publicidad, ni se compartirá con terceros. Solo se te enviarán todas las novedades de esta web.
-
@ ec9bd746:df11a9d0
2025-03-07 20:13:38I was diving into PoW (Proof-of-Work) once again after nostr:nprofile1qy88wumn8ghj7mn0wvhxcmmv9uq3wamnwvaz7tmjv4kxz7fwdehhxarj9e3xzmny9uqzqj8a67jths8euy33v5yu6me6ngua5v3y3qq3dswuqh2pejmtls6datagmu rekindled my interest with his PoW Draw project. It was a fun little trifle, but it shifted my focus just the right way at the right time.
Because then, on Friday, came the Oval Office Travesty. Once I got over the initial shock, I decided I couldn't just curse and lament; I needed to do something bigger, something symbolic, something expressive. So that's exactly what I did—breaking nostr:nprofile1qy88wumn8ghj7mn0wvhxcmmv9uq32amnwvaz7tmjv4kxz7fwv3sk6atn9e5k7tcqyqewrqnkx4zsaweutf739s0cu7et29zrntqs5elw70vlm8zudr3y2t9v7jg's record which he held for almost 2 and half years.
Here is a note with PoW 45, the highest PoW known to Nostr (as of now).
nostr:nevent1qvzqqqqqqypzpmym6ar92346qc04ml08z6j0yrelylkv9r9ysurhte0g2003r2wsqy88wumn8ghj7mn0wvhxcmmv9uqsuamnwvaz7tmwdaejumr0dshsqgqqqqqqqqqy8t8awr5c8z4yfp4cr8v7spp8psncv8twlh083flcr582fyu9
How Did I Pull It Off?
In theory, quite simple: Create note, run PoW mining script & wait.
Thanks to PoW Draw, I already had mining software at hand: nostr:nprofile1qy88wumn8ghj7mn0wvhxcmmv9uq32amnwvaz7tmjv4kxz7fwv3sk6atn9e5k7tcqyqvqc5tlvn6etv09f0fvuauves49dvgnukjtzsndfv9y8yyrqyxmz7dty6z's notemine_hw, but when you know that there is a 1 in 2^45 chance that the next hash will be the correct one you want to increase the odds a bit. So on Monday evening, I started my Note Mining operation on an old 40 thread machine called Workhorse.
Issues Along the Way
I was immediately surprised that Workhorse (2× Intel Xeon Silver 4114) produced only about 3Mh/s. A laptop (Intel Core i7-1185G7) with Windows and all the bloat did 5Mh/s. That was strange.
Another hurdle was that notemine_hw does not refresh the
created_at
field. With just a few Mh/s of power I was potentially looking at weeks of computation, by then the note would be quite stale. So I created systemd service leveraging theRuntimeMaxSec
option to periodically restart every 3600 seconds assuring that the Note would be max 1 hour old at the time of publishing.Luckily PoW is that kind of problem where every hash attempt is an independent event, so the chance of success is the same whether you do it in small increments or one uninterrupted stretch. So by restarting the mining process I was only losing a few mere seconds every hour due to the overhead.
Once the note staleness issue was resolved, I looked at the 40 workers on Workhorse vs. 7 workers on the laptop and start messing around with running one instance with 40 workers and running 40 instances with 1 worker and found out, that the workers are not bound to a CPU thread and are jumping between the CPUs like rabbits high on Colombian carrots.
The solution? Running multiple instances with one worker each as a service locked to its own CPU core using systemd's
CPUAffinity
option. ``` $aida@workhorse:systemd/system $ sudo cat notemine@.service [Unit] Description=Notemine HW Publish (restarts hourly)[Service] Type=simple CPUAffinity=%i
The command to run:
ExecStart=/home/aida/.cargo/bin/notemine_hw publish --n-workers 1 --difficulty 45 --event-json /home/aida/note.json --relay-url 'wss://wot.shaving.kiwi' --nsec nsec0123456789abcdef
Let the process run for 1 hour (3600 seconds), then systemd will stop it:
RuntimeMaxSec=3600 TimeoutStopSec=1
Tells systemd to restart the service automatically after it stops:
Restart=always RestartSec=1
run as a non-root user:
User=aida Group=aida
[Install] WantedBy=multi-user.target ``` Then I added a starting service to spawn an instance for each CPU thread.
``` $aida@workhorse:systemd/system $ sudo cat notemine_start.service [Unit] Description=Start all services in sequence with 3-second intervals
[Service] Type=oneshot ExecStart=/usr/bin/zsh /home/aida/notemine_start.sh
RemainAfterExit=yes
[Install] WantedBy=multi-user.target
Here is the startup script (I know, loops exist—but Ctrl+C/Ctrl+V is so old-school):
aida@workhorse:~ $ cat notemine_start.sh /usr/bin/systemctl start notemine@0.service /usr/bin/sleep 3 /usr/bin/systemctl start notemine@1.service /usr/bin/sleep 3 /usr/bin/systemctl start notemine@2.service /usr/bin/sleep 3 /usr/bin/systemctl start notemine@3.service /usr/bin/sleep 3 ... ... ... /usr/bin/systemctl start notemine@38.service`` The sleep there is critical to make sure that the
created_at`timestamps are different, preventing redundant hashing.This adjustment made Workhorse the strongest machine in my fleet with 10+Mh/s.
The Luck Aspect
From Monday evening, I started adding all machines at my disposal into the fleet and by Wednesday evening I was crunching hashes on about 130 CPU threads (a lot of them were quite antique) and at the peak was just little shy of 40Mh/s. To compensate for the slow start with the few above-mentioned hiccups and the fact that I had to use my desktop to do other things from time to time, I counted with the conservative estimate of 30Mh/s when I was doing all the probability calculations.
Based on the type of task that PoW mining is, the outcome is not predictible. You are only looking at what is the chance that the outcome of every single independent event will be consecutively non-favourable and then subtracting it from 1 to get the chance of that single favourable event you want. I really had to brush up on my combinatorics and discrete mathematics to make sure I have at least an elementary understanding of what is going on. Also, because we are not just throwing a dice 5 times, but are operating with big numbers, approximation was necessary. Luckily, the formula is available and quite simple in the end.
Two weeks to exhauste all the possible tries still doesn't guarantee anything, actually there is a slighlty less than 2 in 3 chance that you will have a result after all that time. So the fact that I was able to hit the right hash in less than 3 days was good luck. Not insane lottery winning luck, but good luck; slighlty lower than 1 in 5.
Do you want to beat me?
Go ahead! All the pitfalls are described above and until there is a GPU-based PoW Mining available, we are all on pretty even ground.
Do you hate the note?
In that case, feel free to enjoy this accompanying image:
-
@ d058ffb7:70ed2330
2025-03-07 19:45:59Au cours de mon éternelle recherche du Graal de l'application de prise de note, je suis récemment tombé sur une recommandation intéressante : LogSeq.
Cette application fait partie de la dernière génération de logicielle pour la prise de note, en facilitant la recherche. Celles-ci se distinguent en offrant la cartographie de pensée (mind map), qui permet de liée différents sujets ensemble, souvent sous la forme d'hyperlien. On peut ensuite les consulter sous forme de graphique de connaissance. Sur le marché, on peut donc comparer Logseq à Roam, Obsidian ou Notion.
Parmi les avantages de cette application, il y a la facilité à explorer les différents sujets de façon cohérente, un peu à la façon Wikipedia, mais également de regrouper des thèmes communs. Elle permet également une grande flexibilité dans la création de contenu. Enfin, la mise en page est basée sur le système de mark-up, ce qui rend saisie simple.
Utilisation
J'ai eu la chance de tester son utilisation durant un voyage récemment afin de le tester avec plusieurs cas d'utilisation. En voici quelques un :
Journal et planification
À l'ouverture, on se retrouve dans une interface qui peut rappeler un journal, i.e. une page par date de calendrier. En plus de pouvoir suivre les notes chronologiquement, cette interface est aussi utile pour la planification, puisque qu'on peut attacher des notes à une date ultérieure (via la fonction \date picker) et voir ces liens quand arrivera la journée prévue.
Liste de points
L'application encourage beaucoup l'utilisation de liste de points. Elle permet alors d'indenter sans limite, mais également d'éclater/fermer les points faciliter la consultation lors beaucoup de sous-points.
Gestion de tâche
Des bonnes vieilles to-do list dont possibles, avec bouton pour biffer les tâches terminées. On peut se limiter à une liste unique et consolidée, mais également répartir les tâches dans les différentes pages en utilisant un lien vers la page principale.
Lecture - Notes, résumés et recommandations
On peut également y collecter les différentes lectures, ainsi que les recommandations reçues. Certains livres pourront alors leur page spécifique lorsqu'un résumé ou des notes sont pertinentes. Il est également possible de maintenir une page de citations et de les lier au livre correspondant. À chacun sa saveur Considérant la flexibilité et que nous avons tous une façon unique de réfléchir, il est important de se donner la chance de découvrir l'outils et de développer sa propre stratégie/structure pour la prise de note, en fonction de sa propre réalité et de ses besoins.
Avantages
Gratuit
Contrairement à plusieurs compétiteurs, la version principale est gratuite pour tous. À l'heure actuelle, elle n'est pas sur le Play Store d'Android, on doit plutôt télécharger et installer le package à partir de leur site web.
Open-source
L'application est disponible sur GitHub et publiée selon la licence AGPL-3.0 license, qui confirme l'aspect open-source, mais qui dont les versions qui en dépendent doivent conserver cette licence (et donc ne peuvent la fermer par la suite). L'application est activement développé, mais bénéficie également d'un nombre impressionnant d'application tierce / plug-in, qui permettent une utilisation encore plus complète.
Défis
Appareils multiples
Malheureusement, LogSeq ne permet toujours pas la synchronisation avec la version principale. Cette fonctionnalité (LogSeq Sync) est présentement en bêta mais n'est disponible que pour les commanditaires et backers. Comme c'est open-source et n'est qu'ultimement un fichier texte, il y a différentes stratégies maison, mais pour l'instant, l'utilisation sur mobile était suffisante. Au besoin, il est possible d'exporter le contenu sous format .json et ensuite l'importer dans une version sur bureau (ce que j'ai fait pour extraire le graphe plus haut).
Prochaines étapes
Applications / Plugins
Il me reste maintenant à explorer le marketplace pour découvrir les nombreux plug-ins disponibles.
De nombreux guides sont disponibles, sur Youtube, mais également sur leur blog et leur page de communauté. Pourquoi ne pas commencer par cette page ?
https://hub.logseq.com/use-cases/1Sr4awszMQzD4GM5KvWim7/10-must-have-plugins-for-logseq/jgDG2ZVkeZGSQHXUNkWroo
-
@ a296b972:e5a7a2e8
2025-03-07 19:20:32Wer soll wehrpflichtig sein? Alle, die einen deutschen Pass haben? Auch die, die durch die Willkommenskultur nach Deutschland gekommen sind? Gleich hier und schon sterben?
Wie groß ist die Bereitschaft „für’s Vaterland“ sein Leben einzusetzen? Die Messer-Fachkräfte und Autofahrer unter den Willkommenen könnten einen Vorteil gegenüber den Bio-Deutschen haben. Mehr Testosteron, mehr Cochones!
Gibt es noch bewohnbare Kasernen? Wenn ja, wer wohnt derzeit in ihnen und wohin mit denen? Entsprechen sie der Brandschutz-Verordnung? Heizen sie mit Wärmepumpen?
Wie gut wird die Unterbringung unterschiedlicher Kulturen, Ethnien und Religionszugehörigkeiten in den Kasernen lebenspraktisch funktionieren?
Werden separate Küchen eingerichtet, damit die verschiedenen Kulturen und Religionen ihrer Herkunft nach entsprechende Kost zubereitet bekommen? Ich kann mir nicht vorstellen, dass Erbsensuppe mit Schweins-Bockwurst aus der Gulaschkanone die Leibspeise für alle Migranten werden wird. Und es muss mindestens ein veganes und ein glutenfreies Essen zur Auswahl geben. Allergien können sonst die Wehrkraft zersetzen. Gutes Essen ist wichtig für die Truppenmoral!
Vereintes Duschen, Toilettengang kein Problem? Sind Kampfunterbrechungen für Gebete vorgesehen? Werden Gebetsteppiche in Tarnfarben angeschafft?
Werden die Pass-Straßen in den Zelten der ehemaligen Impf-Zentren für die mRNA-Vergiftung zu Kreiswehr-Ersatz-Ämtern umfunktioniert. Mit Länderfähnchen für die vielen Nationen?
Werden in der Volkshochschule Schnellkurse für Ausbilder angeboten?
Wie steht es um die Moral in der Truppe bei denjenigen, die sich der Genbehandlung unterziehen mussten, und sich damit schon einmal mit ihrem Leben eingesetzt haben?
Wäre es gerecht, wenn alle Menschen mit einem deutschen Pass möglicherweise aufgrund ihrer Herkunft unterschiedlich gut oder weniger gut als wehrtauglich eingestuft würden?
Wie soll die Gleichstellung von Männern und Frauen in der Wehrpflicht umgesetzt werden? Wie wäre diese in den unterschiedlichen Kulturen umzusetzen? Wird garantiert, dass muslimische Frauen weiter ihr Kopftuch tragen können? Gibt es spezielle weibliche Uniformen mit Vollverschleierung?
In wie vielen Sprachen werden Dienstanweisungen mündlich ausgegeben? Und schriftlich in lateinischer und arabischer Schrift?
Wie viele Sprachen müssen Vorgesetzte sprechen, da nicht davon auszugehen ist, dass alle Wehrpflichtigen Deutsch und schon gar nicht Militär-Deutsch verstehen werden? Das gilt sowohl für Bio-Deutsche, als auch für die Menschen mit Migrationshintergrund.
Sind daher Dienst-Handys mit Übersetzer-App vorgesehen? Gäbe es für jeden ein Gerät oder müssen sich Klein-Gruppen jeweils eine Übersetzer-App teilen? Wird ein potenzieller Feind im Ernstfall warten, bis alle Soldaten die Befehle in ihre Sprache übersetzt haben, damit sie wissen, was zu tun ist?
Wird es Sandalen und Flip-Flops mit Stahlkappen geben?
Wird es Helme in Übergröße geben, damit die Hochfrisuren der Drag-Queens nicht zu Schaden kommen?
Ist vorgesehen, dass im Übungsgelände eine Fußbodenheizung verlegt wird, damit es bei Kriech-Übungen den jungen, deutschen Männern nicht zu kalt wird?
Würden Waffen und Munition den Umwelt- und Klima-Vorschriften der Agenda 2030 entsprechen? Gäbe es Gärtner-Kolonnen, die die Abdrücke der Panzerketten, nach Manöver-Übungen und im Ernstfall, wieder einebnen und glattharken, die Bombentrichter zuschütten und die Natur wieder in ihren ursprünglichen Zustand versetzen würden?
Wird jahrelanges virtuelles Ballerspielen auf die Grundausbildungszeit angerechnet?
Wird die deutsche Bevölkerung, die in die Mobilitätsaktivitäten einbezogen werden soll, bereit sein, für durchziehende Truppen Kaffee zu kochen (am liebsten Latte Macchiato extra large, aber bitte mit Hafermilch!) und Leberwurst-Butterbrote zu schmieren? Was, wenn einer statt Kaffee lieber Tee oder eine Bio-Limonade haben möchte, was wenn der Gefreite Malte Alexander statt Leberwurst lieber einen veganen Brotaufstrich vorzieht?
Wird es eine allgemeine Auszahlung einer Versorgungspauschale für die Bevölkerung geben, oder ist es Bürgerpflicht aus Solidarität mit der kämpfenden Truppe die Verköstigung aus der eigenen Tasche zu zahlen? Oder werden die Kosten mit einer Pauschale bei der Einkommensteuer steuersenkend berücksichtigt?
Darf die deutsche Bevölkerung im Ernstfall ausnahmsweise die deutsche Fahne am Balkon hissen, oder ist eine andere Fahne vorgesehen?
Bis all diese Fragen geklärt und durch die deutschen Bürokratie-Mühlen gegangen sind, hat ein potenzieller Feind das Land schon drei Mal überrollt.
Die geplante Merz-Revolution, die Kombination von Militärausgaben und Ausgaben in die Infrastruktur innerhalb der Sondervermögens-Schulden macht Sinn. Auf den maroden Straßen und Brücken in Deutschland können keine schweren Panzer fahren. Und die müssen auch erst einmal gebaut werden. Hier finden ja jetzt die Arbeiter in der niedergehenden Autoindustrie eine „Anschlussverwendung“ in der Rüstungsindustrie.
Laut Fritzefanzler soll die Bundeswehr ungehinderten Zugang zu Schulen und Hochschulen bekommen, um Kanonenfutter zu rekrutieren. Ein paar Lebensmüde werden sich schon finden lassen. Man will ja auch kein Rechter sein, weil man sich sonst als Pazifist outen müsste.
Man kann nur hoffen, dass ein potenzieller Feind so lange wartet, bis alles fertig ist.
Deutschland braucht gar keinen Feind von außen. Mit deutscher Gründlichkeit zerstört sich Deutschland von innen heraus systematisch von ganz alleine. Wer hat sich diesen Plan ausgedacht?
Das wichtigste wurde bei all der deutschen Kriegstüchtigkeit jedoch vergessen: Deutschland braucht einen Feind! Ohne Feind kein Krieg! Russland macht nicht die geringsten Anzeichen, sich hier zur Verfügung stellen zu wollen. Es gibt einfach keinen Grund. Weder von russischer Seite, Frau Baerbock in Brandenburg einen Hausbesuch abzustatten, noch von deutscher Seite, die keinerlei Belege dafür hat, dass Deutschland von irgendwem bedroht wird.
Deutschland inszeniert derzeit ein heraufkommendes Gewitter bei strahlend blauem Himmel. Frankreich erklärt Russland quasi den Krieg und das russische Militär schüttelt vermutlich ratlos mit dem Kopf, weil es sich fragt, warum nur?
Die EU beruft einen Sondergipfel ein. Mit 800 Milliarden Budget präsentiert sie den ReArm-EU-Plan. Es gehen Gerüchte um, dass die USA die NATO verlassen könnten. Europa muss dringend wiederbewaffnet werden. Das Ganze dauert, wenn es denn überhaupt klappt, mindestens 10 bis 15 Jahre. Und in der Zwischenzeit? Kann Frau von der Leyen die Zeit anhalten und wir wissen es nur noch nicht?
Erste Schwierigkeiten tauchen schon auf, weil die eine Nation nicht preisgeben will, wie viele Waffen sie noch im Keller hat, und andere Nationen wollen nicht preisgeben, wie wenig Waffen sie noch in der Garage haben. Was für ein Chaos-Club. Dennoch gut, denn so wird das alles nichts.
Angefeuert in Brüssel von der Waffen-Lobbyistin aus Düsseldorf-Rheinmetall, Herrn Kriegsgewitter, dem Mann aus Bayern mit den unglücklichen Initialen AH und unterstützt von Joschka und dem zukünftigen, hoffentlich bald schon wieder ehemaligen Bundeskanzler.
Europa benimmt sich wie ein aufgeschreckter Haufen gackernder Gänse, die wild hin und her rennen und keine Ahnung haben, was sie tun sollen. Blinder Aktionismus ist angesagt.
Es gibt einfach keine klare Begründung, warum eine Bedrohung sofortige, dringende Maßnahmen nötig macht. Warum nicht? Weil es keinen Grund gibt.
Wie wäre es, statt einer Wehrpflicht, mit einer Pflicht zur Wahrnehmung der Realität, die derzeit offensichtlich auf Heimaturlaub ist. (Ort unbekannt, möglicherweise Planet Vega, Sternbild Leier)? Wohin sind Besonnenheit und Hausverstand verschwunden?
Im Hinblick darauf, dass es durchaus sein kann, dass die USA die NATO wirklich verlassen werden, würde es in der Tat Sinn machen, dass die europäischen Nationen, jede für sich, eine gewisse Verteidigungsfähigkeit mit der Zeit wiederherstellen würde. Nach Abgleich könnte man sogar ein europäisches Militärbündnis schließen, eventuell Reststrukturen der NATO nutzen. Dieser Vorgang würde ebenso gute 10 bis 15 Jahre dauern. In Polen vielleicht schon etwas früher, da wird ja schon seit einiger Zeit kräftig aufgerüstet und die Armee aufgestockt. Manche scheinen es kaum abwarten zu können, sich verstümmeln zu lassen oder zerfetzt zu werden. Viele scheinen wirklich zu glauben, Krieg ist so was wie „Call of Duty“, aber Krieg ist noch ernster als ernst.
In der Zwischenzeit sollte alles darangesetzt werden, größtmögliche Sicherheit für einen langfristigen, andauernden Frieden zu schaffen, statt damit zu drohen, aus Kanonen zu schießen, die man in absehbarer Zeit gar nicht haben wird. Genau das Gegenteil geschieht. Ein weiterer Part aus George Orwells „1984“ soll umgesetzt werden: Krieg ist Frieden. Wie bescheuert kann man sein?
Erst verscherzt es sich Europa mit Russland, jetzt auch noch mit den USA. Merz soll Trump ein Arschloch genannt haben. Trump hat ein Elefanten-Gedächtnis. Der Schuss kann auch ganz leicht nach hinten losgehen. Es gibt da noch so einige Verträge aus der Nachkriegszeit. Und vermutlich gibt es auch die Kanzler-Akte, nach der ein neuer Bundeskanzler in den USA anzutreten hat.
Eine deutsche „Geistesgröße“ hat vor den US-Wahlen sinngemäß gesagt: Nicht auszumalen, wenn Trump die Wahlen gewinnt. Wie stehen wir denn da?
Abgeleitet davon die Frage: Angenommen, Deutschland und Europa hätten es tatsächlich geschafft, innerhalb kürzester Zeit aufzurüsten und der Russe kommt gar nicht. Wie stehen wir denn da?
In beiden Fällen wie die letzten Deppen, die die Verantwortlichen wohl auch sein wollen.
Europa ist größenwahnsinnig geworden, und im schlimmsten Fall, falls die Lage eskaliert, sind die Menschen, die keinen Krieg wollen, wie immer, die Leidtragenden, die mit der Arschkarte.
Gegen Unkenntnis kann man etwas tun, gegen Dummheit kämpfen selbst die Götter vergebens.
Frieden – Mir – Pace – Peace (sowas von rääääääächts!)
-
@ 401014b3:59d5476b
2025-03-07 14:44:12Alright, football savages, it’s March 2025, and we’re tearing into the AFC North like it’s a pierogi-eating contest at a steel mill tailgate. Free agency’s a wild west shootout, the draft’s a blind bet, and this division’s always a brutal cage match of toughness and trash talk. The Bengals and Ravens duked it out in 2024, the Steelers hung tough, and the Browns… well, they Brownsed. Let’s throw some records on this grinder and see who’s got the grit to claim the crown. Here we go, fam—pass the Iron City.
Cincinnati Bengals: 11-6 – Burrow’s Back with a Vengeance
The Bengals were a force in 2024, and 2025’s shaping up as Joe Burrow’s revenge tour. With Ja’Marr Chase and Tee Higgins (assuming they keep him) torching DBs, this offense is a video game cheat code. The O-line’s finally decent, and the defense—Logan Wilson, Trey Hendrickson—if he stays, brings the pain when it matters. Roster changes are a hurdle—Higgins and Hendrickson might chase a mega-deal elsewhere—but Burrow’s ice-cold clutch factor seals it. 11-6, division champs. Cincy’s ready to remind everyone who dey really are.
Baltimore Ravens: 10-7 – Lamar’s Still a Freak
The Ravens are the AFC North’s relentless machine. Lamar Jackson’s running circles around defenses, Derrick Henry’s still trucking fools (if he’s back), and Zay Flowers keeps the passing game spicy. That defense—Roquan Smith, Kyle Hamilton—is a brick wall, but free agency could bite. Justin Madubuike SHOULD stay, and the secondary’s got holes to patch. 10-7’s the call, snagging a wildcard. They’re a half-step behind Cincy but built to ruin someone’s playoff dreams.
Pittsburgh Steelers: 9-8 – Tomlin’s Eternal .500 Magic
Mike Tomlin’s Steelers are the NFL’s cockroaches—impossible to kill. Russell Wilson initially steadied the ship in 2024, and with Najee Harris pounding the rock and George Pickens stretching the field, they’ve got enough juice. The defense—T.J. Watt, Cam Heyward (if he’s still kicking)—is still a nightmare, but age and free agency loom. Patrick Queen could bolt, the Steelers need to settle on a QB, and the secondary’s thin. 9-8’s classic Tomlin—competitive, scrappy, maybe a wildcard if the stars align. Pittsburgh doesn’t die; it just reloads.
Cleveland Browns: 6-11 – Deshaun’s Last Stand?
The Browns are the AFC North’s punching bag, and 2025 ain’t looking much brighter. Deshaun Watson’s a $230 million question mark—Nick Chubb’s back, Jerry Jeudy’s a weapon, but that O-line’s shaky. The defense—Myles Garrett, Denzel Ward—keeps ‘em in games, but free agency might swipe Jeremiah Owusu-Koramoah, and the vibes are off. 6-11’s the harsh truth—too much baggage, not enough spark. Cleveland’s stuck in neutral ‘til they figure out QB.
The Final Bell
The AFC North in 2025 is a Cincinnati coronation with a bloody chase. The Bengals (11-6) take the title because Burrow’s a killer, the Ravens (10-7) claw a wildcard with Lamar’s wizardry, the Steelers (9-8) hang tough, and the Browns (6-11) wallow. Free agency’s the game-changer—lose a stud, you’re screwed; keep ‘em, you’re cooking. Hit me on Nostr when I butcher this, but this is my AFC North gospel. Let’s roll, degenerates.
-
@ eac63075:b4988b48
2025-03-07 14:35:26Listen the Podcast:
https://open.spotify.com/episode/7lJWc1zaqA9CNhB8coJXaL?si=4147bca317624d34
https://www.fountain.fm/episode/YEGnlBLZhvuj96GSpuk9
Abstract
This paper examines a hypothetical scenario in which the United States, under Trump’s leadership, withdraws from NATO and reduces its support for Europe, thereby enabling a Russian conquest of Ukraine and the subsequent expansion of Moscow’s influence over Eurasia, while the US consolidates its dominance over South America. Drawing on classical geopolitical theories—specifically those of Halford Mackinder, Alfred Thayer Mahan, Rudolf Kjellén, and Friedrich Ratzel—the study analyzes how these frameworks can elucidate the evolving power dynamics and territorial ambitions in a reconfigured global order. The discussion highlights Mackinder’s notion of the Eurasian Heartland and its strategic importance, Mahan’s emphasis on maritime power and control of strategic routes, Kjellén’s view of the state as an expanding organism, and Ratzel’s concept of Lebensraum as a justification for territorial expansion. The paper also explores contemporary developments, such as the US–Ukraine economic agreement and Trump’s overt territorial ambitions involving Greenland and Canada, in light of these theories. By juxtaposing traditional geopolitical concepts with current international relations, the study aims to shed light on the potential implications of such shifts for regional stability, global security, and the balance of power, particularly in relation to emerging neocolonial practices in Latin America.
Introduction
In recent years, the geopolitical dynamics involving the United States, Russia, and Ukraine have sparked analyses from different theoretical perspectives. This paper examines recent events – presupposing a scenario in which Donald Trump withdraws the US from NATO and reduces its support for Europe, allowing a Russian conquest of Ukraine and the expansion of Moscow’s influence over Eurasia, while the US consolidates its dominance over South America – in light of classical geopolitical theories. The ideas of Halford Mackinder, Alfred Thayer Mahan, Rudolf Kjellén, and Friedrich Ratzel are used as reference points. The proposal is to impartially evaluate how each theory can elucidate the developments of this hypothetical scenario, relating Russian territorial expansion in Eurasia to the strategic retreat of the US to the Western Hemisphere.
Initially, we will outline Mackinder’s conception of the Heartland (the central Eurasian territory) and the crucial role of Eastern Europe and Ukraine in the quest for global dominance. Next, we will discuss Mahan’s ideas regarding maritime power and the control of strategic routes, considering the impacts on the naval power balance among the US, Russia, and other maritime powers such as the United Kingdom and Japan. Subsequently, we will examine Kjellén’s organic theory of the state, interpreting the Russian expansionist strategy as a reflection of a state organism in search of vital space. In the same vein, Ratzel’s concept of “Lebensraum” will be explored, along with how Russia could justify territorial expansion based on resources and territory. Finally, the paper connects these theories to the current political context, analyzing the direct negotiations between Washington and Moscow (overlooking Ukraine and Europe), the US policy toward authoritarian regimes in Latin America, and the notion of a hemispheric division of power – the “Island of the Americas” under North American hegemony versus an Eurasia dominated by Russia. Lastly, it considers the possibility that such a geopolitical arrangement may foster the strengthening of authoritarian governments globally, rather than containing them, thus altering the paradigms of the liberal world order.
The Heartland of Mackinder: Ukraine, Eurasia, and Global Dominance
Halford J. Mackinder, a British geographer and pioneer of geopolitics, proposed the celebrated Heartland Theory in the early twentieth century. Mackinder divided the world into geostrategic zones and identified the Heartland—the central continental mass of Eurasia—as the “geographical pivot of history” [5]. His most famous maxim encapsulates this vision: “who rules Eastern Europe commands the Heartland; who rules the Heartland commands the World Island; who rules the World Island commands the world” [5]. Eastern Europe and, in particular, the region of present-day Ukraine, play a key role in this formula. This is because, for Mackinder, Eastern Europe functions as a gateway to the Heartland, providing access to resources and a strategic position for the projection of continental power [5].
Applying this theory to our scenario, the conquest of Ukraine and Eastern European countries by Russia would have profound geopolitical implications. From a Mackinderian point of view, such a conquest would enormously strengthen Russia’s position in the Heartland by adding manpower (population) and Ukraine’s industrial and agricultural resources to its power base [5]. In fact, Mackinder argued that controlling the Heartland conferred formidable geostrategic advantages—a vast terrestrial “natural fortress” protected from naval invasions and rich in resources such as wheat, minerals, and fuels [5]. Thus, if Moscow were to incorporate Ukraine (renowned for its fertile soil and grain production, as well as its mineral reserves) and extend its influence over Eastern Europe, Russia would consolidate the Heartland under its direct control. In this context, the absence of the USA (withdrawn from NATO and less engaged in Europe) would remove an important obstacle to Russian predominance in the region.
With central and eastern Eurasia under Russian influence, it would be possible to move toward the realization of the geopolitical nightmare described by Mackinder for Western maritime powers: a hegemonic continental power capable of projecting power to both Europe and Asia. Mackinder himself warned that if a Heartland power gained additional access to an oceanic coastline—in other words, if it combined land power with a significant maritime front—it would constitute a “danger” to global freedom [5]. In the scenario considered, besides advancing into Eastern Europe, Russia would already possess strategic maritime outlets (for example, in the Black Sea, via Crimea, and in the Baltic, via Kaliningrad or the Baltic States if influenced). Thus, the control of Ukraine would reinforce Russia’s position in the Black Sea and facilitate projection into the Eastern Mediterranean, expanding its oceanic front. From a Mackinderian perspective, this could potentially transform Russia into the dominant power of the “World Island” (the combined mass of Europe, Asia, and Africa), thereby unbalancing the global geopolitical order [5].
It is worth noting that, historically, Mackinder’s doctrine influenced containment strategies: both in the interwar period and during the Cold War, efforts were made to prevent a single power from controlling the Heartland and Eastern Europe. NATO, for example, can be seen as an instrument to prevent Soviet/Russian advances in Europe, in line with Mackinder’s imperative to “contain the Heartland.” Thus, if the USA were to abandon that role—by leaving NATO and tacitly accepting the Russian sphere of influence in Eurasia—we would be witnessing an inversion of the principles that have guided Western policy for decades. In short, under Mackinder’s theory, the Russian conquest of Ukraine and beyond would represent the key for Russia to command the Heartland and, potentially, challenge global hegemony, especially in a scenario where the USA self-restricts to the Western Hemisphere.
The Maritime Power of Mahan and the Naval Balance between West and East
While Mackinder emphasized continental land power, Alfred Thayer Mahan, a nineteenth-century American naval strategist, highlighted the crucial role of maritime power in global dominance. In his work The Influence of Sea Power upon History (1890), Mahan studied the example of the British Empire and concluded that control of the seas paved the way for British supremacy as a world power [10]. He argued that a strong navy and the control of strategic maritime routes were decisive factors for projecting military, political, and economic power. His doctrine can be summarized in the following points: (1) the United States should aspire to be a world power; (2) control of the seas is necessary to achieve that status; (3) such control is obtained through a powerful fleet of warships [17]. In other words, for Mahan, whoever dominates the maritime routes and possesses naval superiority will be in a position to influence global destinies, ensuring trade, supplies, and the rapid movement of military forces.
In the proposed scenario, in which the USA withdraws militarily from Europe and possibly from the Eurasian stage, Mahan’s ideas raise questions about the distribution of maritime power and its effects. Traditionally, the US Navy operates globally, ensuring freedom of navigation and deterring challenges in major seas (Atlantic, Pacific, Indian, etc.). A withdrawal of the USA from NATO could also signal a reduction in its naval presence in the Northeast Atlantic, the Mediterranean Sea, and other areas close to Eurasia. In such a case, who would fill this naval vacuum? Russia, although primarily a land power, has been attempting to modernize its navy and has specific interests—for example, consolidating its dominance in the Black Sea and maintaining a presence in the Mediterranean (with a naval base in Tartus, Syria). The United Kingdom, a historic European maritime power, would remain aligned with the USA but, without American military support in Europe, might potentially be overwhelmed trying to contain an increasingly assertive Russian navy in European waters on its own. Japan, another significant maritime actor allied with the USA, is concerned with the naval balance in the Pacific; without full American engagement, Tokyo might be compelled to expand its own naval power to contain both Russia in the Far East (which maintains a fleet in the Pacific) and, especially, the growing Chinese navy.
According to Mahan’s thinking, strategic maritime routes and choke points (crucial straits and channels) become contested prizes in this power game. With the USA focusing on the Americas, one could imagine Washington reinforcing control over the Panama Canal and Caribbean routes—reviving an “American Gulf” policy in the Western Atlantic and Eastern Pacific. In fact, indications of this orientation emerge in statements attributed to Trump, who once suggested reclaiming direct control over Panama, transforming Canada into a North American state, and even “annexing” Greenland due to its Arctic geopolitical importance [18]. These aspirations reflect a quest to secure advantageous maritime positions near the American continent.
Conversely, in the absence of American presence in the Eastern Atlantic and Mediterranean, Russia would have free rein for regional maritime projection. This could include anything from the unrestricted use of the Black Sea (after dominating Ukraine, thereby ensuring full access to Crimea and Ukrainian ports) to greater influence in the Eastern Mediterranean via Syria and partnerships with countries such as Iran or Egypt. The Baltic Sea would also become an area of expanded Russian interest, pressuring coastal countries and perhaps reducing NATO’s traditional local naval supremacy. However, it is worth noting that even with these regional expansions, Russia lacks a blue-water navy comparable to that of the USA; thus, its initial global maritime impact would be limited without alliances.
An important aspect of Mahan’s theories is that naval power serves as a counterbalance to the land power of the Heartland. Therefore, even if Russia were to dominate the Eurasian continental mass, the continued presence of American naval might on the oceans could prevent complete global domination by Moscow. However, if the USA voluntarily restricts its naval reach to the Americas, it would forgo influencing the power balance in the seas adjacent to Eurasia. Consequently, the balance of maritime power would tend to shift in favor of regional Eurasian actors. The United Kingdom and Japan, traditional allies of the USA, could intensify their naval capabilities to defend regional interests—the United Kingdom safeguarding the North Atlantic and the North Sea, and Japan patrolling the Northwest Pacific—but both would face budgetary and structural limitations in fully compensating for the absence of the American superpower. Consequently, Mahan’s vision suggests that the withdrawal of the USA from the extra-regional scene would weaken the liberal maritime regime, possibly opening space for revisionist powers to contest routes that were previously secured (for example, Russia and China encountering less opposition on the routes of the Arctic and the Indo-Pacific, respectively). In summary, naval hegemony would fragment, and control of strategic seas would become contested, reconfiguring the relative influence of the USA, Russia, and maritime allies such as the United Kingdom and Japan.
Kjellén and the State as a Living Organism: Russian Expansion as an Organic Necessity
Another useful theoretical lens to interpret Russian geopolitical posture is that of Rudolf Kjellén, a Swedish political scientist of the early twentieth century who conceived the State as a living organism. Kjellén, who even coined the term “geopolitics,” was influenced by Friedrich Ratzel’s ideas and by social Darwinism, arguing that States are born, grow, and decline analogously to living beings [13]. In his work Staten som livsform (The State as a Form of Life, 1916), he maintained that States possess an organic dimension in addition to the legal one and that “just as any form of life, States must expand or die” [14]. This expansion would not be motivated merely by aggressive conquest but seen as a necessary growth for the self-preservation of the state organism [14]. In complement, Kjellén echoed Ratzel’s “law of expanding spaces” by asserting that large States expand at the expense of smaller ones, with it being only a matter of time before the great realms fill the available spaces [14]. That is, from the organic perspective, vigorous States tend to incorporate smaller neighboring territories, consolidating territorially much like an organism absorbing nutrients.
Applying this theory to the strategy of contemporary Russia, we can interpret Moscow’s actions—including the invasion of Ukraine and the ambition to restore its sphere of influence in Eurasia—as the expression of an organic drive for expansion. For a strategist influenced by this school, Russia (viewed as a state organism with a long imperial history) needs to expand its territory and influence to ensure its survival and security. The loss of control over spaces that once were part of the Russian Empire or the Soviet Union (such as Ukraine itself, the Caucasus, or Central Asia) may be perceived by Russian elites as an atrophy of the state organism, rendering it vulnerable. Thus, the reincorporation of these territories—whether directly (annexation) or indirectly (political vassalage)—would equate to restoring lost members or strengthening vital organs of the state body. In fact, official Russian arguments often portray Ukraine as an intrinsic part of “Russian historicity,” denying it a fully separate identity—a narrative that aligns with the idea that Russian expansion in that region is natural and necessary for the Russian State (seen as encompassing also Russian speakers beyond its current borders).
Kjellén would thus provide a theoretical justification for Russian territorial expansion as an organic phenomenon. As a great power, Russia would inevitably seek to expand at the expense of smaller neighbors (Ukraine, Georgia, the Baltic States, etc.), as dictated by the tendency of “great spaces to organize” to the detriment of the small [14]. This view can be identified in contemporary Russian doctrines that value spheres of influence and the notion that neighboring countries must gravitate around Moscow in order for the natural order to be maintained. The very idea of “Eurasia” united under Russian leadership (advocated by modern Russian thinkers) echoes this organic conception of vital space and expansion as a sign of the State’s vitality.
However, Kjellén’s theory also warns of the phenomenon of “imperial overstretch,” should a State exceed its internal cohesion limits by expanding excessively [14]. He recognized that extending borders too far could increase friction and vulnerabilities, making it difficult to maintain cohesion—a very large organism may lack functional integration. In the Russian context, this suggests that although expansion is seen as necessary, there are risks if Russia tries to encompass more than it can govern effectively. Conquering Ukraine and subjugating Eastern Europe, for example, could economically and militarily overburden the Russian State, especially if it faced resistance or had to manage hostile populations. However, in the hypothetical scenario we adopt (isolated USA and a weakened Europe), Russia might calculate that the organic benefits of expansion (territory, resources, strategic depth) would outweigh the costs, since external interference would be limited. Thus, through Kjellén’s lens, expansionist Russia behaves as an organism following its instinct for survival and growth, absorbing weaker neighbors; yet such a process is not devoid of challenges, requiring that the “organism Russia” manages to assimilate these new spaces without collapsing under its own weight.
Ratzel and Lebensraum: Resources, Territory, and the Justification for Expansion
Parallel to Kjellén’s organic view, Friedrich Ratzel’s theory offers another conceptual basis for understanding Russian expansion: the concept of Lebensraum (vital space). Ratzel, a German geographer of the late nineteenth century, proposed that the survival and development of a people or nation depended critically on the available physical space and resources. Influenced by Darwinist ideas, he applied the notion of “survival of the fittest” to nations, arguing that human societies need to conquer territory and resources to prosper, and that the stronger and fittest civilizations will naturally prevail over the weaker ones [12]. In 1901, Ratzel coined the term Lebensraum to describe this need for “vital space” as a geographical factor in national power [15].
Subsequently, this idea would be adopted—and extremely distorted—by Nazi ideology to justify Germany’s aggressions in Europe. However, the core of Ratzel’s concept is that territorial expansion is essential for the survival and growth of a State, especially to secure food, raw materials, and space for its population [12].
When examining Russia’s stance under this perspective, we can see several narratives that evoke the logic of Lebensraum. Russia is the largest country in the world by area; however, much of its territory is characterized by adverse climates (tundra, taiga) and is relatively sparsely populated in Siberia. On the other hand, adjacent regions such as Ukraine possess highly arable lands (chernozem—black soil), significant Slavic population density, and additional natural resources (coal in the Donbass, for example). An implicit justification for Russian expansion could be the search for supplementary resources and fertile lands to secure its self-sufficiency and power—exactly as Ratzel described that vigorous nations do. Historical records show that Ratzel emphasized agrarian primacy: he believed that new territories should be colonized by farmers, providing the food base for the nation [12]. Ukraine, historically called the “breadbasket of Europe,” fits perfectly into this vision of conquest for sustenance and agricultural wealth.
Furthermore, Ratzel viewed geography as a determinant of the destiny of nations—peoples adapted to certain habitats seek to expand them if they aspire to grow. In contemporary Russian discourse, there is often mention of the need to ensure security and territorial depth in the face of NATO, or to unite brotherly peoples (Russians and Russian speakers) within a single political space. Such arguments can be read as a modern translation of Lebensraum: the idea that the Russian nation, in order to be secure and flourish, must control a larger space, encompassing buffer zones and critical resources. This Russian “vital space” would naturally include Ukraine and other former Soviet republics, given the historical and infrastructural interdependence. Ratzel emphasized that peoples migrated and expanded when their original homeland no longer met their needs or aspirations [12]. Although contemporary Russia does not suffer from demographic pressure (on the contrary, it faces population decline), under the logic of a great power there is indeed a sentiment of geopolitical insufficiency for having lost influence over areas considered strategic. Thus, reconquering these areas would mean recovering the “habitat” necessary for the Russian nation to prosper and feel secure.
It is important to mention that, in Ratzel’s and Kjellén’s formulations, the pursuit of Lebensraum or organic expansion is not morally qualified—it is treated as a natural process in the politics of power. Thus, on the discursive level, Russia can avoid overly aggressive rhetoric and resort to “natural” justifications: for example, claiming that it needs to occupy Ukraine for defensive purposes (security space) or to reunify peoples (a common cultural and historical space). Beneath these justifications, however, resonates the geopolitical imperative to acquire more territory and resources as a guarantee of national survival, something consonant with Ratzel’s theory. In fact, Russian Realpolitik frequently prioritizes the control of energy resources (gas, oil) and transportation routes. Expanding its influence over central Eurasia would also mean controlling oil pipelines, gas lines, and logistical corridors—essential elements of modern Lebensraum understood as access to vital resources and infrastructure.
In summary, by conquering Ukraine and extending its reach into Eurasia, Russia could effectively invoke the concept of Lebensraum: presenting its expansion not as mere imperialism, but as a necessity to secure indispensable lands and resources for its people and to correct the “injustice” of a vital space diminished by post-Cold War territorial losses. The theories of Ratzel and Kjellén together paint a picture in which Russian expansion emerges almost as a natural law—the great State reclaiming space to ensure its survival and development at the expense of smaller neighbors.
Trump, NATO, and the Threat of American Withdrawal
One of the most alarming changes with Trump's return to power is the tense relationship with the North Atlantic Treaty Organization (NATO). Trump has long criticized allies for not meeting military spending targets, even threatening during his first term to withdraw the US from the alliance if members did not increase their contributions [2]. This threat, initially viewed with skepticism, became concrete after his re-election, leading European allies to seriously consider the possibility of having to defend themselves without American support [1]. In fact, Trump suggested in post-election interviews that the US would only remain in NATO if the allies “paid their bills” – otherwise, he “would seriously consider” leaving [2]. Such statements reinforced the warning that the US might not honor NATO's mutual defense commitment, precisely at a time of continuous Russian threat due to the war in Ukraine [1].
From a theoretical point of view, this posture of American retrenchment evokes the classic tension between maritime power and land power. Alfred Thayer Mahan emphasized that the global power of the US derived largely from its naval superiority and from alliances that ensured control over strategic maritime routes [9]. NATO, since 1949, has served not only to deter Soviet terrestrial advances in Eurasia, but also to secure the US naval presence in the North Atlantic and the Mediterranean – a fundamental element according to Mahan. In turn, Halford Mackinder warned that the balance of global power depended on the control of the Eurasian “Heartland” (the central region of Eurasia). The withdrawal or disengagement of the US (a maritime power) from this region could open the way for a continental power (such as Russia) to expand its influence in Eastern Europe, unbalancing the power balance [3]. In other words, by threatening to leave NATO, Trump jeopardizes the principle of containment that prevented Russian dominance over Eastern Europe – something that Mackinder would see as a dangerous shift in global power in favor of the Heartland power.
Adopting an impartial tone, it is observed that European countries have reacted to this new reality with precautionary measures. Strategic reports already calculate the cost of an autonomous European defense: hundreds of thousands of additional soldiers and investments of hundreds of billions of euros would be required if the US ceased to guarantee the security of the continent [1]. European dependence on American military power is significant and, without it, there would be a need for a major reinforcement of European Armed Forces [1]. This mobilization practically reflects the anticipation of a power vacuum left by the US – a scenario in which Mackinder’s theory (on the primacy of the Heartland and the vulnerability of the “external crescent” where Western Europe is located) regains its relevance.
The US–Ukraine Economic Agreement: Strategic Minerals in Exchange for Support?
Another novelty of Trump's second term is the unprecedented and transactional manner in which Washington has been dealing with the war in Ukraine. Instead of emphasizing security guarantees and alliances, the Trump administration proposed a trade agreement with Ukraine focused on the exploitation of strategic minerals, linking American support to a direct economic benefit. According to sources close to the negotiations, the US and Ukraine are about to sign a pact to share the revenues from the exploitation of critical mineral resources on Ukrainian territory [19]. Materials such as titanium, lithium, rare earths, and uranium – vital for high-tech and defense industries – would be at the core of this agreement [6]. According to the known draft, Ukraine would allocate 50% of the profits from new mineral ventures to a fund controlled by the US, which would reinvest part of the resources in the country’s own reconstruction [6] [19].
It is noteworthy that the pact does not include explicit security guarantees for Kyiv, despite Ukraine remaining under direct military threat from Russia [19]. Essentially, the Trump administration offers financial support and economic investment in exchange for a share in Ukrainian natural resources, but without formally committing to Ukraine's defense in the event of a renewed Russian offensive [19]. American authorities argue that this economic partnership would already be sufficient to “secure Ukrainian interests,” as it would provide the US with its own incentives to desire Ukraine’s stability [19]. “What could be better for Ukraine than being in an economic partnership with the United States?” stated Mike Waltz, a US national security advisor, defending the proposal [19].
Analysts, however, assess the agreement in divided terms. For some, it represents a form of economic exploitation at a time of Ukraine's fragility – comparing the demand to share mineral wealth amid war to a scheme of “mafia protection” [19]. Steven Cook, from the Council on Foreign Relations, classified the offer as “extortion,” and political scientist Virginia P. Fortna observed that charging resources from an invaded country resembles predatory practices [19]. Joseph Nye adds that it is a short-term gain strategy that could be “disastrous in the long run” for American credibility, reflecting the transactional approach that Trump even adopted with close allies in other contexts [19]. On the other hand, some see a future advantage for Kyiv: journalist Pierre Briançon suggests that at least this agreement aligns American commercial interests with Ukraine’s future, which could, in theory, keep the US involved in Ukrainian prosperity in the long term [19]. It is even recalled that President Zelensky himself proposed last year the idea of sharing natural resources with the US to bring the interests of the two countries closer together [19].
From the perspective of geopolitical theories, this agreement illustrates a shift towards economic pragmatism in international relations, approaching concepts proposed by Kjellén. Rudolf Kjellén, who coined the term “geopolitics,” saw the State as a territorial organism that seeks to ensure its survival through self-sufficiency and the control of strategic resources [4]. Trump's demand for a share in Ukrainian resources in order to continue supporting the country reflects a logic of autarky and direct national interest – that is, foreign policy serving primarily to reinforce the economic and material position of the US. This view contrasts with the traditional cooperative approach, but aligns with Kjellén’s idea that powerful States tend to transform international relations into opportunities for their own gain, ensuring access to vital raw materials. Similarly, Friedrich Ratzel argued that States have a “propensity to expand their borders according to their capacities,” seeking vital space (Lebensraum) and resources to sustain their development [11]. The US–Ukraine pact, by conditioning military/economic aid on obtaining tangible advantages (half of the mineral profits), is reminiscent of Ratzel’s perspective: the US, as a rising economic power, expands its economic influence over Ukrainian territory like an organism extending itself to obtain the necessary resources for its well-being. It is, therefore, a form of economic expansionism at the expense of purely ideological commitments or collective security.
Peace Negotiations Excluding Ukraine and the Legitimacy of the Agreement
Another controversial point is the manner in which peace negotiations between Russia and the West have been conducted under Trump's administration. Since taking office, the American president has engaged directly with Moscow in pursuit of a ceasefire, deliberately keeping the Ukrainian government out of the initial discussions [6]. Trump expressed his desire to “leave Zelensky out of the conversation” and also excluded the European Union from any influence in the process [6]. This negotiation strategy—conducted without the presence of the primary interested party, Ukraine—raises serious questions about the legitimacy and sustainability of any resulting agreement.
Historically, peace agreements reached without the direct participation of one of the conflicting parties tend to face problems in implementation and acceptance.
The exclusion of Ukraine in the decision-making phase brings to light the issue of guarantees. As noted, the emerging agreement lacks formal US security guarantees for Ukraine. This implies that, after the agreement is signed, nothing will prevent Russia from launching a new offensive if it deems it convenient, knowing that the US has not committed to defending it militarily. Experts have already warned that a ceasefire without robust protection may only be a pause for Russian rearmament, rendering the conflict “frozen” temporarily and potentially resumed in the near future. The European strategic community has expressed similar concern: without American deterrence, the risk of further Russian aggressions in the region increases considerably [1]. Denmark, for example, has released intelligence reports warning of possible imminent Russian attacks, prompting neighboring countries to accelerate plans for independent defense [1].
The legitimacy of this asymmetric peace agreement (negotiated without Ukraine fully at the table and under economic coercion) is also questionable from a legal and moral point of view. It violates the principle of self-determination by imposing terms decided by great powers on a sovereign country—a practice reminiscent of dark chapters in diplomacy, such as the Munich Agreement of 1938, when powers determined the fate of Czechoslovakia without its consent. In the current case, Ukraine would end up signing the agreement, but from a position of weakness, raising doubts about how durable such a commitment would be.
From Mackinder’s perspective, Ukraine’s removal from the battlefield without guarantees essentially means admitting a greater influence of Russia (the Heartland power) over Eastern Europe. This would alter the balance in Eurasia in a potentially lasting way. Furthermore, the fact that great powers negotiate over the heads of a smaller country evokes the imperial logic of the nineteenth and early twentieth centuries, when empires decided among themselves the divisions of foreign territories—a behavior that Mackinder saw as likely in a world of a “closed system.” With the entire world already occupied by States, Mackinder predicted that powers would begin to compete for influence within this consolidated board, often subjugating smaller states to gain advantage [3]. The US–Russia negotiation regarding Ukraine, without proper Ukrainian representation, exemplifies this type of neo-imperial dynamic in the twenty-first century.
Also noteworthy is the consonance with the ideas of Ratzel and Kjellén: both viewed smaller states as easily relegated to the status of satellites or even “parasitic organisms” in the orbit of larger states. Kjellén spoke of the intrinsic vulnerability of states with little territorial depth or economic dependence, making them susceptible to external pressures [4][20]. Ukraine, weakened by war and dependent on external aid, becomes a concrete example of this theorized vulnerability: it has had to cede strategic resources and accept terms dictated against its will in an attempt to secure its immediate survival. The resulting agreement, therefore, reflects a power imbalance characteristic of the hierarchical international relations described by classical geopolitical theorists.
Implicit Territorial Concessions and Trump’s Public Discourse
A central and controversial point in Trump’s statements regarding the war in Ukraine is the insinuation of territorial concessions to Russia as part of the conflict’s resolution. Publicly, Trump avoided explicitly condemning Russian aggression and even stated that he considered it “unlikely” that Ukraine would be able to retake all the areas occupied by the Russians [16]. In debates and interviews, he suggested that “if I were president, the war would end in 24 hours,” implying that he would force an understanding between Kyiv and Moscow that would likely involve ceding some territory in exchange for peace. This position marks a break with the previous US policy of not recognizing any territorial acquisitions made by force and fuels speculations that a future peace agreement sponsored by Trump would legitimize at least part of Russia’s gains since 2014 (Crimea, Donbass, and areas seized during the 2022 invasion).
The actions of his administration corroborate this interpretation. As discussed, the economic agreement focuses on the exploitation of Ukrainian natural resources, many of which are located precisely in regions currently under Russian military control, such as parts of the Zaporizhzhia Oblast, Donetsk, Lugansk, and the Azov Sea area [6]. A Ukrainian geologist, Hanna Liventseva, highlighted that “most of these elements (strategic minerals) are found in the south of the Ukrainian Shield, mainly in the Azov region, and most of these territories are currently invaded by Russia” [6]. This means that, to make joint exploitation viable, Russia’s de facto control over these areas would have to be recognized—or at least tolerated—in the short term. In other words, the pact indirectly and tacitly accepts Russian territorial gains, as it involves sharing the profits from resources that are not currently accessible to the Kyiv government.
Furthermore, figures close to Trump have made explicit statements regarding the possibility of territorial cession. Mike Waltz, Trump’s national security advisor, publicly stated that Zelensky might need to “cede land to Russia” to end the war [8]. This remark—made public in March 2025—confirms that the Trump White House considers it natural for Ukraine to relinquish parts of its territory in favor of an agreement. Such a stance marks a break from the previous Western consensus, which condemned any territorial gains by force. Under Trump, a pragmatic view (in the eyes of his supporters) or a cynical one (according to his critics) seems to prevail: sacrificing principles of territorial integrity to quickly end hostilities and secure immediate economic benefits.
In theoretical terms, this inclination to validate territorial gains by force recalls the concept of Realpolitik and the geopolitical Darwinism that influenced thinkers such as Ratzel. In Ratzel’s organic conception, expanding states naturally absorb neighboring territories when they are strong enough to do so, while declining states lose territory—a process almost biological in the selection of the fittest [11]. The Trump administration’s acceptance that Ukraine should “give something” to Moscow to seal peace reflects a normalization of this geopolitical selection process: it recognizes the aggressor (Russia) as having the “right” to retain conquered lands, because that is how power realities on the ground dictate. Mackinder, although firmly opposed to allowing Russia to dominate the Heartland, would see this outcome as the logical consequence of the lack of engagement from maritime powers (the USA and the United Kingdom, for example) in sustaining the Ukrainian counterattack. Without the active involvement of maritime power to balance the dispute, land power prevails in Eastern Europe.
From the perspective of international legitimacy, the cession of Ukrainian territories—whether de jure or de facto—creates a dangerous precedent in the post-Cold War era. Rewarding violent aggression with territorial gains may encourage similar strategies in other parts of the world, undermining the architecture of collective security. This is possibly a return to a world of spheres of influence, where great powers define borders and zones of control according to their convenience—something that the rules-based order after 1945 sought to avoid. Here, academic impartiality requires noting that coercion for territorial concessions rarely produces lasting peace, as the aggrieved party—in this case, Ukraine—may accept temporarily but will continue to assert its rights in the long term, as has occurred with other territorial injustices in history.
Territorial Ambitions of Trump: Greenland and Canada
Beyond the Eurasian theater of war, Trump revived geopolitical ambitions involving territories traditionally allied with the US: Greenland (an autonomous territory of Denmark) and Canada. As early as 2019, during his first term, Trump shocked the world by proposing to buy Greenland—rich in minerals and strategically positioned in the Arctic. Upon his return to power, he went further: expressing a “renewed interest” in acquiring Greenland and publicly suggesting the incorporation of Canada as the 51st American state [2].
In January 2025, during a press conference at Mar-a-Lago, he even displayed maps in which the US and Canada appeared merged into a single country, while Greenland was marked as a future American possession [2]. Posts by the president on social media included satirical images with a map of North America where Canada was labeled “51st” and Greenland designated as “Our Land” [2].
Such moves were met with concern and disbelief by allies. Canadian Prime Minister Justin Trudeau was caught on an open microphone warning that Trump’s fixation on annexation “is real” and not just a joke [7]. Trudeau emphasized that Washington appeared to covet Canada’s vast mineral resources, which would explain the insistence on the idea of absorption [7]. In public, Trump argued that Canadians “would be more prosperous as American citizens,” promising tax cuts and better services should they become part of the US [7]. On the Danish side, the reaction to the revived plan regarding Greenland was firmly negative—as it was in 2019—reaffirming that the territory is not for sale. Trump, however, insinuated that the issue might be one of national security, indicating that American possession of Greenland would prevent adverse influences (a reference to China and Russia in the Arctic) [2]. More worryingly, he refused to rule out the use of military means to obtain the island, although he assured that he had no intention of invading Canada by force (in the Canadian case, he spoke of “economic force” to forge a union) [2].
This series of initiatives reflects an unprecedented expansionist impetus by the US in recent times, at least in discourse. Analyzing this through the lens of classical geopolitics offers interesting insights. Friedrich Ratzel and his notion of Lebensraum suggest that powerful states, upon reaching a certain predominance, seek to expand their territory by influencing or incorporating adjacent areas. Trump, by targeting the immediate neighbor (Canada) and a nearby strategic territory (Greenland), appears to resurrect this logic of territorial expansion for the sake of gaining space and resources. Ratzel saw such expansion almost as a natural process for vigorous states, comparable to the growth of an organism [11]. From this perspective, the US would be exercising its “right” of expansion in North America and the polar region, integrating areas of vital interest.
Additionally, Alfred Mahan’s view on maritime power helps to understand the strategic value of Greenland. Mahan postulated that control of key maritime chokepoints and naval bases ensures global advantage [9]. Greenland, situated between the North Atlantic and the Arctic, has become increasingly relevant as climate change opens new polar maritime routes and reveals vast mineral deposits (including rare earth elements and oil). For the US, having a presence or sovereignty over Greenland would mean dominating the gateway to the Arctic and denying this space to rivals. This aligns with Mahan’s strategy of securing commercial and military routes (in this case, potential Arctic routes) and resources to consolidate naval supremacy. On the other hand, the incorporation of Canada—with its enormous territory, Arctic coastline, and abundant natural resources—would provide the US with formidable geoeconomic and geopolitical reinforcement, practically eliminating vulnerabilities along its northern border. This is an ambitious project that also echoes ideas of Kjellén, for whom an ideal State should seek territorial completeness and economic self-sufficiency within its region. Incorporating Canada would be the pinnacle of American regional autarky, turning North America into a unified bloc under Washington (a scenario reminiscent of the “pan-regions” conceived by twentieth-century geopoliticians influenced by Kjellén).
It is important to note, however, that these ambitions face enormous legal and political obstacles. The sovereignty of Canada and Greenland (Denmark) is guaranteed by international law, and both peoples categorically reject the idea of annexation. Any hostile action by the US against these countries would shake alliances and the world order itself. Even so, the very fact that an American president suggests such possibilities already produces geopolitical effects: traditional partners begin to distrust Washington’s intentions, seek alternative alliances, and strengthen nationalist discourses of resistance. In summary, Trump’s expansionist intentions in Greenland and Canada rekindle old territorial issues and paradoxically place the US in the position of a revisionist power—a role once associated with empires in search of colonies.
Implications for Brazil and South America: A New Neocolonization?
In light of this geopolitical reconfiguration driven by Trump's USA—with a reordering of alliances and a possible partition of spheres of influence among great powers—the question arises: what is the impact on Brazil and the other countries of South America? Traditionally, Latin America has been under the aegis of the Monroe Doctrine (1823), which established non-interference by Europe in the region and, implicitly, the primacy of the USA in the Western Hemisphere. In the post–Cold War period, this influence translated more into political and economic leadership, without formal annexations or direct territorial domination. However, the current context points to a kind of “neocolonization” of the Global South, in which larger powers seek to control resources and peripheral governments in an indirect yet effective manner.
Mackinder’s theories can be used to illuminate this dynamic. As mentioned, Mackinder envisioned the twentieth-century world as a closed system, in which there were no longer any unknown lands to be colonized—hence, the powers would fight among themselves for control over already occupied regions [3]. He predicted that Africa and Latin America (then largely European colonies or semi-colonies) would continue as boards upon which the great powers would project their disputes, a form of neocolonialism. In the current scenario, we see the USA proposing exchanges of protection for resources (as in Ukraine) and even leaders of developing countries seeking similar agreements. A notable example: the President of the Democratic Republic of the Congo, Felix Tshisekedi, praised the USA–Ukraine initiative and suggested an analogous agreement involving Congolese mineral wealth in exchange for US support against internal rebels (M23) [19]. In other words, African countries and possibly South American ones may enter into this logic of offering privileged access to resources (cobalt, lithium, food, biodiversity) in order to obtain security guarantees or investments. This represents a regression to the times when external powers dictated the directions of the South in exchange for promises of protection, characterizing a strategic neocolonialism.
For Brazil, in particular, this rearrangement generates both opportunities and risks. As a regional power with considerable diplomatic autonomy, Brazil has historically sought to balance relationships with the USA, Europe, China, and other actors, avoiding automatic alignments. However, in a world where Trump’s USA is actively redefining spheres of influence—possibly making deals with Russia that divide priorities (for example, Washington focusing on the Western Hemisphere and Moscow on the Eastern)—South America could once again be seen as an exclusive American sphere of influence. From this perspective, Washington could pressure South American countries to align with its directives, limiting partnerships with rivals (such as China) and seeking privileged access to strategic resources (such as the Amazon, fresh water, minerals, and agricultural commodities). Some indications are already emerging: Trump’s transactional approach mentioned by Nye included pressures on Canada and Mexico regarding border and trade issues, under the threat of commercial sanctions. It would not be unthinkable to adopt a hard line, for example, with regard to Brazilian environmental policies (linked to the Amazon) or Brazil’s relations with China, using tariffs or incentives as leverage—a sort of geopolitics of economic coercion.
On the other hand, Brazil and its neighbors could also attempt to take advantage of the Sino–North American competition. If the USA is distracted consolidating its hemispheric “hard power” hegemony (even with annexation fantasies in the north), powers such as China may advance their economic presence in South America through investments and trade (Belt and Road, infrastructure financing)—which is already happening. This would constitute an indirect neocolonial dispute in the South: Chinese loans and investments versus American demands and agreements, partly reminiscent of the nineteenth-century imperial competition (when the United Kingdom, USA, and others competed for Latin American markets and resources).
From a conceptual standpoint, Mackinder might classify South America as part of the “Outer Crescent” (external insular crescent)—peripheral to the great Eurasian “World-Island,” yet still crucial as a source of resources and a strategic position in the South Atlantic and Pacific. If the USA consolidates an informal empire in the Americas, it would be reinforcing its “insular bastion” far from the Eurasian Heartland, a strategy that Mackinder once suggested for maritime powers: to control islands and peripheral continents to compensate for the disadvantage of not controlling the Heartland. However, an excessive US dominance in the South could lead to local resistance and alternative alignments, unbalancing the region.
Kjellén would add that for Brazil to maintain its decisive sovereignty, it will need to strengthen its autarky and internal cohesion—in other words, reduce vulnerabilities (economic, military, social) that external powers might exploit [4]. Meanwhile, Mahan might point out the importance for Brazil of controlling its maritime routes and coastlines (South Atlantic) to avoid being at the mercy of a naval power like the USA. And Ratzel would remind us that states that do not expand their influence tend to be absorbed by foreign influences—which, in the context of Brazil, does not mean conquering neighboring territories, but rather actively leading South American integration to create a block more resilient to external intrusion.
In summary, South America finds itself in a more competitive and segmented world, where major players are resurrecting practices from past eras. The notion of “neocolonization” here does not imply direct occupation, but rather mechanisms of dependency: whether through unequal economic agreements or through diplomatic or military pressure for alignment. Brazil, as the largest economy and territory on the subcontinent, will have to navigate with heightened caution. A new global power balance, marked by the division of spheres of influence among the USA, China, and Russia, may reduce the sovereign maneuvering space of South American countries unless they act jointly. Thus, theoretical reflection suggests the need for South–South strategies, reinforcement of regional organizations, and diversification of partnerships to avoid falling into modern “neocolonial traps.”
Conclusion
The emerging post–re-election geopolitical conjuncture of Donald Trump signals a return to classical geopolitical principles, after several decades of predominance of institutional liberal views. We witness the revaluation of concepts such as spheres of influence, exchanges of protection for resources, naval power versus land power, and disputes over territory and raw materials—all central themes in the writings of Mackinder, Mahan, Kjellén, and Ratzel at the end of the nineteenth and the beginning of the twentieth century. An impartial analysis of these events, in light of these theories, shows internal coherence in Trump’s actions: although controversial, they follow a logic of maximizing national interest and the relative power of the USA on the world stage, even at the expense of established principles and alliances.
Halford Mackinder reminds us that, in a closed world with no new lands to conquer, the great powers will seek to redistribute the world among themselves [3]. This seems to manifest in the direct understandings between the USA and Russia over the fate of Ukraine, and in American ambitions in the Arctic and the Western Hemisphere. Alfred Mahan emphasizes that the control of the seas and strategic positions ensures supremacy—we see reflections of this in Trump’s obsession with Greenland (Arctic) and the possible neglect of the importance of maintaining NATO (and therefore the North Atlantic) as a cohesive bloc, something that Mahan’s theory would criticize due to the risk of a naval vacuum. Rudolf Kjellén and Friedrich Ratzel provide the framework to understand the more aggressive facet of expansionist nationalism: the idea of the State as an organism that needs to grow, secure resources, and seek self-sufficiency explains everything from the extortionate agreement imposed on Ukraine to the annexation rhetoric regarding Canada.
The potential consequences are profound. In the short term, we may witness a precarious ceasefire in the Ukraine war, with consolidated Russian territorial gains and Ukraine economically tied to the USA, but without formal military protection—a fragile “armed peace.” Western Europe, alarmed, may accelerate its independent militarization, perhaps marking the beginning of European defense autonomy, as is already openly debated [1]. At the far end of the globe, American activism in the Arctic and the Americas may reshape alliances: countries like Canada, once aligned with Washington, might seek to guarantee their sovereignty by distancing themselves from it; powers like China could take advantage of the openings to increase their presence in Latin America and Africa through economic diplomacy; and emerging countries of the Global South may have to choose between submitting to new “guardianships” or strengthening South–South cooperation.
Ultimately, the current situation reinforces the relevance of studying geopolitics through historical lenses. The actions of the Trump administration indicate that, despite all technological and normative advances, the competition for geographic power has not disappeared—it has merely assumed new formats. Academic impartiality obliges us not to prematurely judge whether these strategies will be successful or beneficial, but history and theory warn that neo-imperial movements tend to generate counter-reactions. As Mackinder insinuated, “every shock or change anywhere reverberates around the world,” and a sudden move by a superpower tends to provoke unforeseen adjustments and chain conflicts. It remains to be seen how the other actors—including Brazil and its neighbors—will adapt to this new chapter in the great struggle for global power, in which centuries-old theories once again have a surprising explanatory power over present events.
Bibliography
[1] A Referência. (2025). Europa calcula o custo de se defender sem os EUA: 300 mil soldados e 250 bilhões de euros a mais. Recuperado em 3 de março de 2025, de https://areferencia.com/europa/europa-calcula-o-custo-de-se-defender-sem-os-eua-300-mil-soldados-e-250-bilhoes-de-euros-a-mais/#:\~:text=Europa%20calcula%20o%20custo%20de,bilh%C3%B5es%20de%20euros%20a%20mais
[2] Brexit Institute. (2025). What happens if Trump invades Greenland? Recuperado em 3 de março de 2025, de https://dcubrexitinstitute.eu/2025/01/what-happens-if-trump-invades-greenland/#:\~:text=Ever%20since%20Donald%20Trump%20announced,agreed%20in%20Wales%20in%202014
[3] Cfettweis C:CST22(2)8576.DVI. (2025). Mackinder and Angell. Recuperado em 3 de março de 2025, de https://cfettweis.com/wp-content/uploads/Mackinder-and-Angell.pdf#:\~:text=meant%20the%20beginning%20of%20an,Mackinder
[4] Diva-Portal. (2025). The geopolitics of territorial relativity. Poland seen by Rudolf Kjellén. Recuperado em 3 de março de 2025, de https://www.diva-portal.org/smash/get/diva2:1696547/FULLTEXT02#:\~:text=,The%20state%20territory
[5] Geopolitical Monitor. (2025). The Russo-Ukrainian War and Mackinder’s Heartland Thesis. Recuperado em 3 de março de 2025, de https://www.geopoliticalmonitor.com/the-ukraine-war-and-mackinders-heartland-thesis/#:\~:text=In%201904%2C%20Sir%20Halford%20J,in%20adding%20a%20substantial%20oceanic
[6] Instituto Humanitas Unisinos. (2025). Trump obriga Zelensky a hipotecar a exploração de minerais críticos em troca do seu apoio. Recuperado em 3 de março de 2025, de https://www.ihu.unisinos.br/648986-trump-obriga-zelensky-a-hipotecar-a-exploracao-de-minerais-criticos-em-troca-do-seu-apoio#:\~:text=Essa%20troca%20inclui%20os%20cobi%C3%A7ados,s%C3%A3o%20praticamente%20inexploradas%20no%20pa%C3%ADs
[7] Politico. (2025). Trump’s annexation fixation is no joke, Trudeau warns. Recuperado em 3 de março de 2025, de https://www.politico.com/news/2025/02/07/canada-trudeau-trump-51-state-00203156#:\~:text=TORONTO%20%E2%80%94%20Prime%20Minister%20Justin,Canada%20becoming%20the%2051st%20state%2C%E2%80%9D%20Trudeau%20said
[8] The Daily Beast. (2025). Top Trump Adviser Moves Goalpost for Ukraine to End War. Recuperado em 3 de março de 2025, de https://www.thedailybeast.com/top-trump-adviser-moves-goalpost-for-ukraine-to-end-war/#:\~:text=LAND%20GRAB
[9] The Geostrata. (2025). Alfred Thayer Mahan and Supremacy of Naval Power. Recuperado em 3 de março de 2025, de https://www.thegeostrata.com/post/alfred-thayer-mahan-and-supremacy-of-naval-power#:\~:text=Alfred%20Thayer%20Mahan%20and%20Supremacy,control%20over%20maritime%20trade%20routes
[10] U.S. Department of State. (2025). Mahan’s The Influence of Sea Power upon History: Securing International Markets in the 1890s. Recuperado em 3 de março de 2025, de https://history.state.gov/milestones/1866-1898/mahan#:\~:text=Mahan%20argued%20that%20British%20control,American%20politicians%20believed%20that%20these
[11] Britannica. (2025a). Friedrich Ratzel | Biogeography, Anthropogeography, Political Geography. Recuperado em 3 de março de 2025, de https://www.britannica.com/biography/Friedrich-Ratzel#:\~:text=webster,Swedish%20political%20scientist%20%2076
[12] Britannica. (2025b). Lebensraum. Recuperado em 3 de março de 2025, de https://www.britannica.com/topic/Lebensraum#:\~:text=defined,The
[13] Britannica. (2025c). Rudolf Kjellén. Recuperado em 3 de março de 2025, de https://www.britannica.com/biography/Rudolf-Kjellen
[14] Wikipedia (ZH). (2025). Rudolf Kjellén. Recuperado em 3 de março de 2025, de https://zh.wikipedia.org/wiki/w:Rudolf_Kjell%C3%A9n#:\~:text=Besides%20legalistic%2C%20states%20have%20organic,preservation.%20%5B%203
[15] Wikipedia. (2025). Lebensraum. Recuperado em 3 de março de 2025, de https://en.wikipedia.org/wiki/Lebensraum#:\~:text=The%20German%20geographer%20and%20ethnographer,into%20the%20Greater%20Germanic%20Reich
[16] YouTube. (2025). Trump says Ukraine 'unlikely to get all land back' or join NATO [Vídeo]. Recuperado em 3 de março de 2025, de https://www.youtube.com/watch?v=BmHzAVLhsXU#:\~:text=Trump%20says%20Ukraine%20%27unlikely%20to,for%20it%20to%20join%20NATO
[17] U.S. Naval Institute. (2025) Operation World Peace. Recuperado em 3 de março de 2025, de https://www.usni.org/magazines/proceedings/1955/june/operation-world-peace#:\\~:text=“The Mahan doctrine%2C” according to,the word “airships” is more
[18] Emissary. (2024) Trump’s Greenland and Panama Canal Threats Are a Throwback to an Old, Misguided Foreign Policy. Recuperado em 3 de março de 2025, de https://carnegieendowment.org/emissary/2025/01/trump-greenland-panama-canal-monroe-doctrine-policy?lang=en
[19] A Referência. Acordo EUA-Ucrânia está praticamente fechado, mas analistas se dividem sobre quem sairá ganhando. Recuperado em 3 de março de 2025, de https://areferencia.com/europa/acordo-eua-ucrania-esta-praticamente-fechado-mas-analistas-se-dividem-sobre-quem-saira-ganhando/#:\\~:text=EUA e 17,o acordo a seu favor
[20] Wikipedia. (2025) Geopolitik. Recuperado em 3 de março de 2025, de https://en.wikipedia.org/wiki/Geopolitik#:\\~:text=Rudolph Kjellén was Ratzel's Swedish,Kjellén's State
-
@ 147ac18e:ef1ca1ba
2025-03-07 14:04:46The world is on the brink of a technological shift, where artificial intelligence (AI) is becoming increasingly autonomous. With AI agents conducting transactions, hiring other AI agents, and managing digital assets, a critical question arises: What form of money will power this new AI-driven economy? The answer, as some industry experts predict, is Bitcoin.
The Rise of the Autonomous Economy
AI agents are no longer just tools executing predefined tasks; they are evolving into independent economic actors capable of initiating transactions, negotiating terms, and paying for services. The transaction volume within AI-driven economies is projected to be 100 times larger than human transactions, as each person may have dozens or even hundreds of AI agents working on their behalf. This creates an unprecedented demand for a seamless, efficient, and universally accepted form of digital money.
Why Bitcoin is the Natural Choice for AI Transactions
Bitcoin stands out as the ideal currency for AI-driven economies for several reasons:
-
Borderless and Permissionless: Unlike traditional banking systems that require identity verification (KYC/AML) and impose restrictions based on geography, Bitcoin allows AI agents to transact freely without human intervention.
-
Personless Transactions: AI agents, by nature, do not have legal identities, making it impossible for them to interact with banks or obtain credit cards. Bitcoin provides a neutral medium that does not require a legal entity to use it.
-
Energy-Backed Economy: AI agents function on computational power, which is an energy-intensive process. Bitcoin’s proof-of-work mechanism aligns well with this model, as it is also backed by computational energy. AI systems will inherently recognize Bitcoin as a valid medium of exchange due to this energy linkage.
-
Micropayments via Lightning Network: AI transactions will often involve micropayments—small fees for data processing, information retrieval, and digital labor. Traditional financial networks are inefficient in handling such transactions due to high fees and processing delays. The Bitcoin Lightning Network enables instant, low-cost micropayments, making it perfect for AI-to-AI financial interactions.
-
Immutability and Transparency: AI systems require trustless environments where transaction history cannot be altered or reversed. Bitcoin’s blockchain ensures that all transactions are transparent and immutable, reducing fraud and enabling verifiable AI-driven commerce.
The Symbiotic Growth of Bitcoin and AI
As AI-driven economies expand, Bitcoin adoption will accelerate in the following ways:
-
Increased Transaction Volume: With billions of AI transactions occurring daily, Bitcoin will see an explosion in on-chain and Lightning Network activity, solidifying its position as the world’s primary digital currency.
-
Institutional and Enterprise Adoption: As businesses integrate AI into their workflows, they will increasingly adopt Bitcoin to facilitate machine-to-machine payments, smart contracts, and decentralized finance (DeFi) solutions.
-
Regulatory Shift Towards Decentralized Currencies: Governments and financial institutions will have to acknowledge Bitcoin’s role in AI economies and adjust regulatory frameworks accordingly, further legitimizing its use.
-
Bitcoin as a Store of Value for AI: AI systems will not only use Bitcoin for transactions but may also accumulate it as a reserve asset due to its deflationary nature and finite supply.
The Future: Bitcoin as the De Facto AI Currency
As AI continues to reshape industries, Bitcoin is poised to become the backbone of an autonomous digital economy. The fusion of AI and Bitcoin will create a self-sustaining loop where AI agents fuel Bitcoin’s transactional utility, and Bitcoin’s decentralized nature enables AI’s economic autonomy. This symbiosis will not only drive Bitcoin adoption but could also redefine global economic structures.
In this AI-driven future, Bitcoin may not just be a currency for humans—it could very well be the native currency of artificial intelligence.
Episode link: https://fountain.fm/episode/Ds1qicPmbC3udErQ7J3z
-
-
@ a012dc82:6458a70d
2025-03-07 13:17:07In an era where digital currencies are becoming as commonplace as traditional banking, a groundbreaking development has emerged from the UK, capturing the attention of both financial experts and law enforcement agencies worldwide. The UK police have made a monumental discovery, uncovering a staggering $1.7 billion in Bitcoin, intricately linked to a vast investment fraud scheme with roots deep in China. This revelation not only highlights the growing issue of cybercrime and financial fraud but also showcases the sophisticated methods employed by criminals to exploit the digital currency landscape for illicit purposes.
Table of Contents
-
The Discovery
-
The Accusation
-
The Implications
-
The Investigation
-
The Broader Impact
-
Conclusion
-
FAQs
The Discovery
The astonishing discovery was made amidst the trial of Jian Wen, a 42-year-old UK citizen embroiled in allegations of money laundering connected to a massive $6 billion investment fraud scheme. This scheme, masterminded by Zhimin Qian, known to some as Yadi Zhang, has left approximately 130,000 investors in China in dire straits, their investments vanished into the ether. The UK police's breakthrough in tracing the Bitcoin linked to this scheme underscores the meticulous and technologically advanced tactics utilized by law enforcement to combat digital financial crimes. The ability to trace such a significant amount of Bitcoin back to a specific fraud case marks a significant achievement in the realm of financial crime investigation, reflecting the increasing capability of global law enforcement agencies to adapt to the challenges posed by the digital age.
The Accusation
Jian Wen finds herself at the center of this complex web of financial deceit, accused of attempting to launder the ill-gotten gains from the fraudulent scheme. Her alleged attempts to funnel these vast sums into the London real estate market, though ultimately unsuccessful, paint a vivid picture of the lengths to which individuals involved in such schemes will go to legitimize their criminal proceeds. Wen's steadfast denial of the allegations against her adds a layer of intrigue to the case, challenging prosecutors to untangle the sophisticated methods used to disguise the fraudulent origins of the funds. This case highlights the critical need for vigilance and sophistication in tracking financial transactions across the globe, as criminals increasingly turn to complex schemes and digital currencies to obscure their activities.
The Implications
The implications of this case extend far beyond the immediate legal battle unfolding in London. It shines a spotlight on the dark underbelly of the digital currency world, where anonymity and the lack of regulatory oversight can too easily be exploited for nefarious purposes. The use of Bitcoin and other cryptocurrencies in money laundering and fraud schemes poses significant challenges for regulators and law enforcement worldwide. This case serves as a stark reminder of the urgent need for international cooperation and regulatory harmonization to address the vulnerabilities of the digital financial system. As cryptocurrencies continue to gain mainstream acceptance, the need for enhanced regulatory frameworks and advanced technological tools to monitor and control digital financial transactions becomes increasingly apparent.
The Investigation
The investigation leading to the discovery of the $1.7 billion in Bitcoin is a testament to the evolving landscape of law enforcement in the digital age. The success of the UK police in tracing these funds highlights the advancements in forensic technology and the growing expertise within law enforcement agencies in navigating the complex world of cryptocurrency transactions. This case exemplifies the potential for collaboration between financial institutions, regulatory bodies, and international law enforcement agencies to combat financial crime effectively. The ability to trace and recover assets in cryptocurrency form represents a significant step forward in the global fight against money laundering and investment fraud, setting a precedent for future investigations.
The Broader Impact
The uncovering of this vast sum of Bitcoin linked to the China fraud scheme has far-reaching implications for the cryptocurrency market and the broader financial ecosystem. It raises critical questions about the security and stability of digital currencies and the potential for their misuse in criminal enterprises. This case could serve as a catalyst for change, prompting policymakers and regulators to implement more stringent controls on cryptocurrency transactions and enhance the transparency of digital financial systems. As the digital currency market continues to evolve, the lessons learned from this investigation will undoubtedly influence the development of policies and technologies designed to protect investors and maintain the integrity of the financial system.
Conclusion
The discovery of $1.7 billion in Bitcoin by the UK police marks a watershed moment in the fight against international financial fraud. As the trial against Jian Wen progresses, it promises to offer unprecedented insights into the mechanisms of cryptocurrency laundering and the global nature of financial crime. This case not only underscores the critical role of digital currencies in the modern financial landscape but also highlights the imperative for continuous vigilance, innovation, and cooperation among law enforcement, regulatory bodies, and the financial industry at large. In the quest to safeguard the integrity of the global financial market, the unraveling of this $1.7 billion Bitcoin mystery represents both a significant challenge and a vital opportunity for the future of financial security and crime prevention.
FAQs
Who is Jian Wen, and what are the accusations against her? Jian Wen is a 42-year-old UK citizen accused of attempting to launder the proceeds of a $6 billion investment fraud scheme from China by investing in high-value properties in London. She denies the allegations.
How did the UK police trace the Bitcoin linked to the fraud? The UK police utilized advanced forensic technology and collaborated with international law enforcement agencies to trace the Bitcoin transactions back to the fraud scheme, demonstrating their growing expertise in combating digital financial crimes.
What are the broader implications of this case for the cryptocurrency market? This case highlights the potential for misuse of cryptocurrencies in money laundering and fraud schemes, raising questions about the need for enhanced regulatory frameworks and technological tools to monitor digital financial transactions.
What does this case reveal about the challenges of combating financial crime in the digital age? The case underscores the complexities and challenges law enforcement faces in tracking and prosecuting financial crimes that exploit digital currencies, emphasizing the need for international cooperation and advanced technological capabilities.
How might this discovery influence future regulatory policies on cryptocurrencies? The discovery could prompt policymakers and regulators to implement stricter controls on cryptocurrency transactions and develop more transparent and secure digital financial systems to prevent their misuse in criminal activities.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co/
Youtube: @thebitcoinlibertarian
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
Get Orange Pill App And Connect With Bitcoiners In Your Area. Stack Friends Who Stack Sats link: https://signup.theorangepillapp.com/opa/croxroad
Buy Bitcoin Books At Konsensus Network Store. 10% Discount With Code “21croxroad” link: https://bitcoinbook.shop?ref=21croxroad
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ fcd81845:5c1832a7
2025-03-07 09:25:39Price Updates
In order to improve the services we offer, we are increasing the prices effective date March 6th 2025:
Here are the price changes (all prices are per month, rolling contract):
| name | Price | New Price | | ---- | ----- | --------- | | Tiny | 2 EUR | 2.70 EUR | | Small | 4 EUR | 5.10 EUR | | Medium | 8 EUR | 9.90 EUR | | Large | 17 EUR | 21.90 EUR | | X-Large | 30 EUR | 39.90 EUR | | XX-Large | 45 EUR | 55.50 EUR |
These changes coincide with the release of custom pricing!
We have also released a few other features:
- User configurable PTR records
- Separate billing page o VM info view
- VM resource usage graphs
- New VM's are assigned a forward DNS entry on lnvps.cloud (eg. vm-1.lnvps.cloud) existing VM's will have a forward entry added at a later date.
- As well as many other smaller improvements in the handling of resource allocation
-
@ 95cb4330:96db706c
2025-03-07 07:21:49Embracing Contrarian Thinking, as advocated by Peter Thiel, involves challenging prevailing beliefs to uncover unique opportunities and minimize competition. This mindset encourages asking:
"What important truth do very few people agree with me on?"
By doing so, individuals and organizations can identify untapped markets and innovate beyond conventional boundaries.
Understanding Contrarian Thinking
- Definition:
A mindset that involves questioning widely accepted norms and beliefs to discover unique insights and opportunities.
Examples in Practice
-
Peter Thiel's Investment in Facebook:
Thiel invested in Facebook when social media was largely dismissed as a passing trend, recognizing its potential to revolutionize communication. -
Elon Musk's Development of Tesla:
Musk pursued the development of electric vehicles despite widespread skepticism about their viability, ultimately leading to Tesla's success in the automotive industry. -
Jeff Bezos's Customer-Centric Approach at Amazon:
Bezos prioritized long-term customer satisfaction over immediate profits, a strategy that defied traditional retail models and contributed to Amazon's dominance.
Implementing Contrarian Thinking
-
Challenge Assumptions:
Regularly question the status quo and consider alternative perspectives. -
Embrace Risk:
Be willing to explore unconventional ideas, understanding that innovation often involves venturing into uncharted territory. -
Foster a Diverse Environment:
Encourage diverse viewpoints within your team to stimulate critical thinking and challenge groupthink.
Benefits of Contrarian Thinking
-
Innovation:
By challenging existing paradigms, contrarian thinkers can develop groundbreaking products and services. -
Competitive Advantage:
Identifying opportunities overlooked by others can lead to market leadership. -
Resilience:
A contrarian mindset fosters adaptability, enabling individuals and organizations to navigate changing environments effectively.
Action Step
Identify a commonly held belief in your industry or field. Consider the opposite perspective and explore the potential opportunities that this contrarian viewpoint might reveal.
By adopting contrarian thinking, you position yourself to uncover unique opportunities and drive innovation beyond conventional boundaries.
For further insights into Peter Thiel's approach to contrarian thinking, consider watching this discussion:
Peter Thiel's Contrarian Strategy
- Definition:
-
@ da0b9bc3:4e30a4a9
2025-03-07 06:27:17Hello Stackers!
Welcome on into the ~Music Corner of the Saloon!
A place where we Talk Music. Share Tracks. Zap Sats.
So stay a while and listen.
🚨Don't forget to check out the pinned items in the territory homepage! You can always find the latest weeklies there!🚨
🚨Subscribe to the territory to ensure you never miss a post! 🚨
originally posted at https://stacker.news/items/906261
-
@ d360efec:14907b5f
2025-03-07 05:11:52Bitcoin (BTC) เผชิญกับการปรับฐานอย่างรุนแรงในวันที่ 7 มีนาคม 2568 หลังจากที่ราคาพุ่งขึ้นทำจุดสูงสุดใหม่ (All-Time High) อย่างต่อเนื่อง บทวิเคราะห์นี้จะเจาะลึกถึงสถานการณ์ปัจจุบันของ BTC โดยใช้การวิเคราะห์ทางเทคนิคจากหลาย Timeframe (15m, 4H, Day) พร้อมทั้งพิจารณาอินดิเคเตอร์สำคัญต่างๆ เพื่อประเมินแนวโน้มและกลยุทธ์การเทรดที่เหมาะสม
การวิเคราะห์ทางเทคนิค:
-
Timeframe 15 นาที (15m):
- เกิดการร่วงลงของราคาอย่างรุนแรง (Sell-Off) ทะลุแนวรับสำคัญหลายระดับ
- EMA 50 ตัด EMA 200 ลงมา (Death Cross) เป็นสัญญาณ Bearish ที่ชัดเจน
- Money Flow เป็นลบอย่างมาก
- Trend Strength เป็นเมฆสีแดงหนาแน่น (แนวโน้มขาลงแข็งแกร่ง)
- สรุป: แนวโน้มขาลงระยะสั้นชัดเจน
-
Timeframe 4 ชั่วโมง (4H):
- ราคาหลุดกรอบ Consolidation และ EMA 50
- EMA 50 ตัด EMA 200 ลงมา (Death Cross) ยืนยันสัญญาณ Bearish ระยะกลาง
- Money Flow เป็นลบ
- Trend Strength เป็นเมฆสีแดง
- แนวรับสำคัญอยู่ที่ EMA 200 (ประมาณ $60,000) และ $58,000
- สรุป: ยืนยันการปรับฐานระยะกลาง
-
Timeframe Day (Day):
- ราคายังคงอยู่เหนือ EMA 50 และ EMA 200 โครงสร้างขาขึ้นหลักยังไม่เสีย
- Money Flow ยังคงเป็นบวก (แม้จะเริ่มลดลง)
- Trend Strength เมฆสีเขียวยังคงอยู่ (แต่เริ่มบางลง)
- แนวรับสำคัญอยู่ที่ $60,000 (Low ก่อนหน้า) และ $50,000-$52,000 (EMA 200 และ Demand Zone)
- สรุป: แนวโน้มระยะยาวยังเป็นขาขึ้น แต่เริ่มมีสัญญาณอ่อนแรง
Buyside & Sellside Liquidity (สรุปจากทุก TF):
- Buyside Liquidity (แนวต้าน): $68,000-$69,000 (แนวต้านที่แข็งแกร่งในระยะสั้น), $72,000, $75,000 (เป้าหมายระยะยาว หากกลับเป็นขาขึ้น)
- Sellside Liquidity (แนวรับ): $60,000 (แนวรับสำคัญทางจิตวิทยา และ EMA 200 ใน TF 4H, Low ก่อนหน้าใน TF Day), $58,000 (Demand Zone ใน TF 4H), $50,000-$52,000 (EMA 200 และ Demand Zone ใน TF Day)
กลยุทธ์การเทรด:
- Day Trade (15m): ความเสี่ยงสูงมาก ไม่แนะนำให้ Buy เน้น Short Sell เมื่อราคา Rebound ขึ้นไปทดสอบแนวต้าน (EMA หรือบริเวณ $68,000-$69,000) และมีสัญญาณ Bearish แต่ต้องระมัดระวังอย่างยิ่ง เพราะขัดแย้งกับแนวโน้มหลักระยะยาว ตั้ง Stop Loss เหนือ Swing High
- Swing Trade (4H): ไม่แนะนำให้ Buy ตอนนี้ รอสัญญาณกลับตัวที่ชัดเจนกว่านี้ บริเวณแนวรับ EMA 200 ($60,000) หรือ $58,000 หากมีสัญญาณ Bullish ที่แนวรับเหล่านี้ ถึงจะพิจารณาเข้า Buy โดยตั้ง Stop Loss ต่ำกว่าแนวรับ
- Position Trade (Day): รอจังหวะที่แนวรับสำคัญ ($60,000 หรือ $50,000-$52,000) หรือรอสัญญาณกลับตัวที่ชัดเจน
สิ่งที่ต้องระวัง:
- ความผันผวนของราคา BTC ที่สูงมากในช่วงนี้
- ข่าวหรือเหตุการณ์ที่อาจส่งผลกระทบต่อตลาด
- False Breakout และ Dead Cat Bounce (การ Rebound สั้นๆ ก่อนลงต่อ)
- การสวน Trend มีความเสี่ยงสูงมาก
สรุป:
Bitcoin กำลังเผชิญกับการปรับฐานครั้งสำคัญ หลังจากที่ราคาพุ่งขึ้นอย่างต่อเนื่อง แนวโน้มระยะสั้น (15m) เป็นขาลงอย่างชัดเจน, ระยะกลาง (4H) ยืนยันการปรับฐาน, ส่วนระยะยาว (Day) ยังคงเป็นขาขึ้นแต่เริ่มอ่อนแรง นักลงทุนควรใช้ความระมัดระวังอย่างสูงในการเทรด Day Trader อาจพิจารณา Short Sell เมื่อมีสัญญาณ, Swing Trader ควรรอสัญญาณกลับตัวที่แนวรับ, ส่วน Position Trader ควรรอจังหวะที่แนวรับสำคัญ
Disclaimer: การวิเคราะห์นี้เป็นเพียงความคิดเห็นส่วนตัว ไม่ถือเป็นคำแนะนำในการลงทุน ผู้ลงทุนควรศึกษาข้อมูลเพิ่มเติมและตัดสินใจด้วยความรอบคอบ
-
-
@ d360efec:14907b5f
2025-03-07 05:08:51$OKX: $BTC $USDT.P
Introduction:
Bitcoin (BTC) faced a sharp correction on March 7, 2025, after a continuous rally to new all-time highs. This analysis delves into the current situation of BTC using technical analysis from multiple timeframes (15m, 4H, Day), considering various key indicators to assess the trend and appropriate trading strategies.
Technical Analysis:
-
15-Minute Timeframe (15m):
- Experienced a sharp price drop (Sell-Off), breaking through several key support levels.
- EMA 50 crossed below EMA 200 (Death Cross), a clear Bearish signal.
- Money Flow is strongly negative.
- Trend Strength is a thick red cloud (strong downtrend).
- Conclusion: Clear short-term downtrend.
-
4-Hour Timeframe (4H):
- Price broke out of the consolidation range and below EMA 50.
- EMA 50 crossed below EMA 200 (Death Cross), confirming a medium-term Bearish signal.
- Money Flow is negative.
- Trend Strength is a red cloud.
- Key support is at EMA 200 (around $60,000) and $58,000.
- Conclusion: Confirms the medium-term correction.
-
Daily Timeframe (Day):
- The price remains above EMA 50 and EMA 200. The main uptrend structure is still intact.
- Money Flow remains positive (although starting to decrease).
- Trend Strength: The green cloud is still present (but starting to thin).
- Key support is at $60,000 (previous Low) and $50,000-$52,000 (EMA 200 and Demand Zone).
- Conclusion: The long-term trend is still uptrend, but signs of weakness are starting to appear.
Buyside & Sellside Liquidity (Summary from all TFs):
- Buyside Liquidity (Resistance): $68,000-$69,000 (strong resistance in the short term), $72,000, $75,000 (long-term targets if it turns bullish again).
- Sellside Liquidity (Support): $60,000 (key psychological support and EMA 200 on 4H TF, previous Low on Day TF), $58,000 (Demand Zone on 4H TF), $50,000-$52,000 (EMA 200 and Demand Zone on Day TF).
Trading Strategies:
- Day Trade (15m): Very high risk. Do not recommend Buy. Focus on Short Selling when the price rebounds to test resistance (EMA or the $68,000-$69,000 area) and there are Bearish signals. But be extremely careful as it contradicts the main long-term trend. Set a Stop Loss above the Swing High.
- Swing Trade (4H): Do not Buy now. Wait for clearer reversal signals around the EMA 200 support ($60,000) or $58,000. If there are Bullish signals at these supports, then consider entering a Buy with a Stop Loss below the support.
- Position Trade (Day): Wait for opportunities at key support levels ($60,000 or $50,000-$52,000) or wait for clear reversal signals.
Things to Watch Out For:
- Very high volatility of BTC price during this period.
- News or events that may affect the market.
- False Breakouts and Dead Cat Bounces (short rebounds before continuing to fall).
- Going against the trend is very high risk.
Summary:
Bitcoin is facing a significant correction after a continuous rally. The short-term trend (15m) is clearly bearish, the medium-term (4H) confirms the correction, while the long-term (Day) is still bullish but starting to weaken. Investors should be extremely cautious in trading. Day traders may consider Short Selling on signal, Swing traders should wait for reversal signals at support, and Position traders should wait for opportunities at key support levels.
Disclaimer: This analysis is a personal opinion and not investment advice. Investors should do their own research and make decisions carefully.
-
-
@ c48e29f0:26e14c11
2025-03-07 04:51:09ESTABLISHMENT OF THE STRATEGIC BITCOIN RESERVE AND UNITED STATES DIGITAL ASSET STOCKPILE EXECUTIVE ORDER March 6, 2025
By the authority vested in me as President by the Constitution and the laws of the United States of America, it is hereby ordered:
Section 1. Background.
Bitcoin is the original cryptocurrency. The Bitcoin protocol permanently caps the total supply of bitcoin (BTC) at 21 million coins, and has never been hacked. As a result of its scarcity and security, Bitcoin is often referred to as “digital gold”. Because there is a fixed supply of BTC, there is a strategic advantage to being among the first nations to create a strategic bitcoin reserve. The United States Government currently holds a significant amount of BTC, but has not implemented a policy to maximize BTC’s strategic position as a unique store of value in the global financial system. Just as it is in our country’s interest to thoughtfully manage national ownership and control of any other resource, our Nation must harness, not limit, the power of digital assets for our prosperity.
Sec. 2. Policy.
It is the policy of the United States to establish a Strategic Bitcoin Reserve. It is further the policy of the United States to establish a United States Digital Asset Stockpile that can serve as a secure account for orderly and strategic management of the United States’ other digital asset holdings.
Sec. 3. Creation and Administration of the Strategic Bitcoin Reserve and United States Digital Asset Stockpile.
(a) The Secretary of the Treasury shall establish an office to administer and maintain control of custodial accounts collectively known as the “Strategic Bitcoin Reserve,” capitalized with all BTC held by the Department of the Treasury that was finally forfeited as part of criminal or civil asset forfeiture proceedings or in satisfaction of any civil money penalty imposed by any executive department or agency (agency) and that is not needed to satisfy requirements under 31 U.S.C. 9705 or released pursuant to subsection (d) of this section (Government BTC). Within 30 days of the date of this order, each agency shall review its authorities to transfer any Government BTC held by it to the Strategic Bitcoin Reserve and shall submit a report reflecting the result of that review to the Secretary of the Treasury. Government BTC deposited into the Strategic Bitcoin Reserve shall not be sold and shall be maintained as reserve assets of the United States utilized to meet governmental objectives in accordance with applicable law.
(b) The Secretary of the Treasury shall establish an office to administer and maintain control of custodial accounts collectively known as the “United States Digital Asset Stockpile,” capitalized with all digital assets owned by the Department of the Treasury, other than BTC, that were finally forfeited as part of criminal or civil asset forfeiture proceedings and that are not needed to satisfy requirements under 31 U.S.C. 9705 or released pursuant to subsection (d) of this section (Stockpile Assets). Within 30 days of the date of this order, each agency shall review its authorities to transfer any Stockpile Assets held by it to the United States Digital Asset Stockpile and shall submit a report reflecting the result of that review to the Secretary of the Treasury. The Secretary of the Treasury shall determine strategies for responsible stewardship of the United States Digital Asset Stockpile in accordance with applicable law.
(c) The Secretary of the Treasury and the Secretary of Commerce shall develop strategies for acquiring additional Government BTC provided that such strategies are budget neutral and do not impose incremental costs on United States taxpayers. However, the United States Government shall not acquire additional Stockpile Assets other than in connection with criminal or civil asset forfeiture proceedings or in satisfaction of any civil money penalty imposed by any agency without further executive or legislative action.
(d) “Government Digital Assets” means all Government BTC and all Stockpile Assets. The head of each agency shall not sell or otherwise dispose of any Government Digital Assets, except in connection with the Secretary of the Treasury’s exercise of his lawful authority and responsible stewardship of the United States Digital Asset Stockpile pursuant to subsection (b) of this section, or pursuant to an order from a court of competent jurisdiction, as required by law, or in cases where the Attorney General or other relevant agency head determines that the Government Digital Assets (or the proceeds from the sale or disposition thereof) can and should: (i) be returned to identifiable and verifiable victims of crime; (ii) be used for law enforcement operations;
(iii) be equitably shared with State and local law enforcement partners; or (iv) be released to satisfy requirements under 31 U.S.C. 9705, 28 U.S.C. 524(c), 18 U.S.C. 981, or 21 U.S.C. 881.(e) Within 60 days of the date of this order, the Secretary of the Treasury shall deliver an evaluation of the legal and investment considerations for establishing and managing the Strategic Bitcoin Reserve and United States Digital Asset Stockpile going forward, including the accounts in which the Strategic Bitcoin Reserve and United States Digital Asset Stockpile should be located and the need for any legislation to operationalize any aspect of this order or the proper management and administration of such accounts.
Sec. 4. Accounting.
Within 30 days of the date of this order, the head of each agency shall provide the Secretary of the Treasury and the President’s Working Group on Digital Asset Markets with a full accounting of all Government Digital Assets in such agency’s possession, including any information regarding the custodial accounts in which such Government Digital Assets are currently held that would be necessary to facilitate a transfer of the Government Digital Assets to the Strategic Bitcoin Reserve or the United States Digital Asset Stockpile. If such agency holds no Government Digital Assets, such agency shall confirm such fact to the Secretary of the Treasury and the President’s Working Group on Digital Asset Markets within 30 days of the date of this order.
Sec. 5. General Provisions.
(a) Nothing in this order shall be construed to impair or otherwise affect: (i) the authority granted by law to an executive department or agency, or the head thereof; or (ii) the functions of the Director of the Office of Management and Budget relating to budgetary, administrative, or legislative proposals.
(b) This order shall be implemented consistent with applicable law and subject to the availability of appropriations.
(c) This order is not intended to, and does not, create any right or benefit, substantive or procedural, enforceable at law or in equity by any party against the United States, its departments, agencies, or entities, its officers, employees, or agents, or any other person.
THE WHITE HOUSE, March 6, 2025
-
@ d34e832d:383f78d0
2025-03-07 01:47:15
A comprehensive system for archiving and managing large datasets efficiently on Linux.
1. Planning Your Data Archiving Strategy
Before starting, define the structure of your archive:
✅ What are you storing? Books, PDFs, videos, software, research papers, backups, etc.
✅ How often will you access the data? Frequently accessed data should be on SSDs, while deep archives can remain on HDDs.
✅ What organization method will you use? Folder hierarchy and indexing are critical for retrieval.
2. Choosing the Right Storage Setup
Since you plan to use 2TB HDDs and store them away, here are Linux-friendly storage solutions:
📀 Offline Storage: Hard Drives & Optical Media
✔ External HDDs (2TB each) – Use
ext4
orXFS
for best performance.
✔ M-DISC Blu-rays (100GB per disc) – Excellent for long-term storage.
✔ SSD (for fast access archives) – More durable than HDDs but pricier.🛠 Best Practices for Hard Drive Storage on Linux
🔹 Use
smartctl
to monitor drive health
bash sudo apt install smartmontools sudo smartctl -a /dev/sdX
🔹 Store drives vertically in anti-static bags.
🔹 Rotate drives periodically to prevent degradation.
🔹 Keep in a cool, dry, dark place.☁ Cloud Backup (Optional)
✔ Arweave – Decentralized storage for public data.
✔ rclone + Backblaze B2/Wasabi – Cheap, encrypted backups.
✔ Self-hosted options – Nextcloud, Syncthing, IPFS.
3. Organizing and Indexing Your Data
📂 Folder Structure (Linux-Friendly)
Use a clear hierarchy:
plaintext 📁 /mnt/archive/ 📁 Books/ 📁 Fiction/ 📁 Non-Fiction/ 📁 Software/ 📁 Research_Papers/ 📁 Backups/
💡 Use YYYY-MM-DD format for filenames
✅2025-01-01_Backup_ProjectX.tar.gz
✅2024_Complete_Library_Fiction.epub
📑 Indexing Your Archives
Use Linux tools to catalog your archive:
✔ Generate a file index of a drive:
bash find /mnt/DriveX > ~/Indexes/DriveX_index.txt
✔ Use
locate
for fast searches:
bash sudo updatedb # Update database locate filename
✔ Use
Recoll
for full-text search:
bash sudo apt install recoll recoll
🚀 Store index files on a "Master Archive Index" USB drive.
4. Compressing & Deduplicating Data
To save space and remove duplicates, use:
✔ Compression Tools:
-tar -cvf archive.tar folder/ && zstd archive.tar
(fast, modern compression)
-7z a archive.7z folder/
(best for text-heavy files)✔ Deduplication Tools:
-fdupes -r /mnt/archive/
(finds duplicate files)
-rdfind -deleteduplicates true /mnt/archive/
(removes duplicates automatically)💡 Use
par2
to create parity files for recovery:
bash par2 create -r10 file.par2 file.ext
This helps reconstruct corrupted archives.
5. Ensuring Long-Term Data Integrity
Data can degrade over time. Use checksums to verify files.
✔ Generate Checksums:
bash sha256sum filename.ext > filename.sha256
✔ Verify Data Integrity Periodically:
bash sha256sum -c filename.sha256
🔹 Use
SnapRAID
for multi-disk redundancy:
bash sudo apt install snapraid snapraid sync snapraid scrub
🔹 Consider ZFS or Btrfs for automatic error correction:
bash sudo apt install zfsutils-linux zpool create archivepool /dev/sdX
6. Accessing Your Data Efficiently
Even when archived, you may need to access files quickly.
✔ Use Symbolic Links to "fake" files still being on your system:
bash ln -s /mnt/driveX/mybook.pdf ~/Documents/
✔ Use a Local Search Engine (Recoll
):
bash recoll
✔ Search within text files usinggrep
:
bash grep -rnw '/mnt/archive/' -e 'Bitcoin'
7. Scaling Up & Expanding Your Archive
Since you're storing 2TB drives and setting them aside, keep them numbered and logged.
📦 Physical Storage & Labeling
✔ Store each drive in fireproof safe or waterproof cases.
✔ Label drives (Drive_001
,Drive_002
, etc.).
✔ Maintain a printed master list of drive contents.📶 Network Storage for Easy Access
If your archive grows too large, consider:
- NAS (TrueNAS, OpenMediaVault) – Linux-based network storage.
- JBOD (Just a Bunch of Disks) – Cheap and easy expansion.
- Deduplicated Storage –ZFS
/Btrfs
with auto-checksumming.
8. Automating Your Archival Process
If you frequently update your archive, automation is essential.
✔ Backup Scripts (Linux)
Use
rsync
for incremental backups:bash rsync -av --progress /source/ /mnt/archive/
Automate Backup with Cron Jobs
bash crontab -e
Add:plaintext 0 3 * * * rsync -av --delete /source/ /mnt/archive/
This runs the backup every night at 3 AM.Automate Index Updates
bash 0 4 * * * find /mnt/archive > ~/Indexes/master_index.txt
So Making These Considerations
✔ Be Consistent – Maintain a structured system.
✔ Test Your Backups – Ensure archives are not corrupted before deleting originals.
✔ Plan for Growth – Maintain an efficient catalog as data expands.For data hoarders seeking reliable 2TB storage solutions and appropriate physical storage containers, here's a comprehensive overview:
2TB Storage Options
1. Hard Disk Drives (HDDs):
-
Western Digital My Book Series: These external HDDs are designed to resemble a standard black hardback book. They come in various editions, such as Essential, Premium, and Studio, catering to different user needs. citeturn0search19
-
Seagate Barracuda Series: Known for affordability and performance, these HDDs are suitable for general usage, including data hoarding. They offer storage capacities ranging from 500GB to 8TB, with speeds up to 190MB/s. citeturn0search20
2. Solid State Drives (SSDs):
- Seagate Barracuda SSDs: These SSDs come with either SATA or NVMe interfaces, storage sizes from 240GB to 2TB, and read speeds up to 560MB/s for SATA and 3,400MB/s for NVMe. They are ideal for faster data access and reliability. citeturn0search20
3. Network Attached Storage (NAS) Drives:
- Seagate IronWolf Series: Designed for NAS devices, these drives offer HDD storage capacities from 1TB to 20TB and SSD capacities from 240GB to 4TB. They are optimized for multi-user environments and continuous operation. citeturn0search20
Physical Storage Containers for 2TB Drives
Proper storage of your drives is crucial to ensure data integrity and longevity. Here are some recommendations:
1. Anti-Static Bags:
Essential for protecting drives from electrostatic discharge, especially during handling and transportation.
2. Protective Cases:
- Hard Drive Carrying Cases: These cases offer padded compartments to securely hold individual drives, protecting them from physical shocks and environmental factors.
3. Storage Boxes:
- Anti-Static Storage Boxes: Designed to hold multiple drives, these boxes provide organized storage with anti-static protection, ideal for archiving purposes.
4. Drive Caddies and Enclosures:
- HDD/SSD Enclosures: These allow internal drives to function as external drives, offering both protection and versatility in connectivity.
5. Fireproof and Waterproof Safes:
For long-term storage, consider safes that protect against environmental hazards, ensuring data preservation even in adverse conditions.
Storage Tips:
-
Labeling: Clearly label each drive with its contents and date of storage for easy identification.
-
Climate Control: Store drives in a cool, dry environment to prevent data degradation over time.
By selecting appropriate 2TB storage solutions and ensuring they are stored in suitable containers, you can effectively manage and protect your data hoard.
Here’s a set of custom Bash scripts to automate your archival workflow on Linux:
1️⃣ Compression & Archiving Script
This script compresses and archives files, organizing them by date.
```bash!/bin/bash
Compress and archive files into dated folders
ARCHIVE_DIR="/mnt/backup" DATE=$(date +"%Y-%m-%d") BACKUP_DIR="$ARCHIVE_DIR/$DATE"
mkdir -p "$BACKUP_DIR"
Find and compress files
find ~/Documents -type f -mtime -7 -print0 | tar --null -czvf "$BACKUP_DIR/archive.tar.gz" --files-from -
echo "Backup completed: $BACKUP_DIR/archive.tar.gz" ```
2️⃣ Indexing Script
This script creates a list of all archived files and saves it for easy lookup.
```bash!/bin/bash
Generate an index file for all backups
ARCHIVE_DIR="/mnt/backup" INDEX_FILE="$ARCHIVE_DIR/index.txt"
find "$ARCHIVE_DIR" -type f -name "*.tar.gz" > "$INDEX_FILE"
echo "Index file updated: $INDEX_FILE" ```
3️⃣ Storage Space Monitor
This script alerts you if the disk usage exceeds 90%.
```bash!/bin/bash
Monitor storage usage
THRESHOLD=90 USAGE=$(df -h | grep '/mnt/backup' | awk '{print $5}' | sed 's/%//')
if [ "$USAGE" -gt "$THRESHOLD" ]; then echo "WARNING: Disk usage at $USAGE%!" fi ```
4️⃣ Automatic HDD Swap Alert
This script checks if a new 2TB drive is connected and notifies you.
```bash!/bin/bash
Detect new drives and notify
WATCHED_SIZE="2T" DEVICE=$(lsblk -dn -o NAME,SIZE | grep "$WATCHED_SIZE" | awk '{print $1}')
if [ -n "$DEVICE" ]; then echo "New 2TB drive detected: /dev/$DEVICE" fi ```
5️⃣ Symbolic Link Organizer
This script creates symlinks to easily access archived files from a single directory.
```bash!/bin/bash
Organize files using symbolic links
ARCHIVE_DIR="/mnt/backup" LINK_DIR="$HOME/Archive_Links"
mkdir -p "$LINK_DIR" ln -s "$ARCHIVE_DIR"//.tar.gz "$LINK_DIR/"
echo "Symbolic links updated in $LINK_DIR" ```
🔥 How to Use These Scripts:
- Save each script as a
.sh
file. - Make them executable using:
bash chmod +x script_name.sh
- Run manually or set up a cron job for automation:
bash crontab -e
Add this line to run the backup every Sunday at midnight:
bash 0 0 * * 0 /path/to/backup_script.sh
Here's a Bash script to encrypt your backups using GPG (GnuPG) for strong encryption. 🚀
🔐 Backup & Encrypt Script
This script will:
✅ Compress files into an archive
✅ Encrypt it using GPG
✅ Store it in a secure location```bash
!/bin/bash
Backup and encrypt script
ARCHIVE_DIR="/mnt/backup" DATE=$(date +"%Y-%m-%d") BACKUP_FILE="$ARCHIVE_DIR/backup_$DATE.tar.gz" ENCRYPTED_FILE="$BACKUP_FILE.gpg" GPG_RECIPIENT="your@email.com" # Change this to your GPG key or use --symmetric for password-based encryption
mkdir -p "$ARCHIVE_DIR"
Compress files
tar -czvf "$BACKUP_FILE" ~/Documents
Encrypt the backup using GPG
gpg --output "$ENCRYPTED_FILE" --encrypt --recipient "$GPG_RECIPIENT" "$BACKUP_FILE"
Verify encryption success
if [ -f "$ENCRYPTED_FILE" ]; then echo "Backup encrypted successfully: $ENCRYPTED_FILE" rm "$BACKUP_FILE" # Remove unencrypted file for security else echo "Encryption failed!" fi ```
🔓 Decrypting a Backup
To restore a backup, run:
bash gpg --decrypt --output backup.tar.gz backup_YYYY-MM-DD.tar.gz.gpg tar -xzvf backup.tar.gz
🔁 Automating with Cron
To run this script every Sunday at midnight:
bash crontab -e
Add this line:
bash 0 0 * * 0 /path/to/encrypt_backup.sh
🔐 Backup & Encrypt Script (Password-Based)
This script:
✅ Compresses files into an archive
✅ Encrypts them using GPG with a passphrase
✅ Stores them in a secure location```bash
!/bin/bash
Backup and encrypt script (password-based)
ARCHIVE_DIR="/mnt/backup" DATE=$(date +"%Y-%m-%d") BACKUP_FILE="$ARCHIVE_DIR/backup_$DATE.tar.gz" ENCRYPTED_FILE="$BACKUP_FILE.gpg" PASSPHRASE="YourStrongPassphraseHere" # Change this!
mkdir -p "$ARCHIVE_DIR"
Compress files
tar -czvf "$BACKUP_FILE" ~/Documents
Encrypt the backup with a password
gpg --batch --yes --passphrase "$PASSPHRASE" --symmetric --cipher-algo AES256 --output "$ENCRYPTED_FILE" "$BACKUP_FILE"
Verify encryption success
if [ -f "$ENCRYPTED_FILE" ]; then echo "Backup encrypted successfully: $ENCRYPTED_FILE" rm "$BACKUP_FILE" # Remove unencrypted file for security else echo "Encryption failed!" fi ```
🔓 Decrypting a Backup
To restore a backup, run:
bash gpg --batch --yes --passphrase "YourStrongPassphraseHere" --decrypt --output backup.tar.gz backup_YYYY-MM-DD.tar.gz.gpg tar -xzvf backup.tar.gz
🔁 Automating with Cron
To run this script every Sunday at midnight:
bash crontab -e
Add this line:
bash 0 0 * * 0 /path/to/encrypt_backup.sh
🔥 Security Best Practices
- Do NOT hardcode the password in the script. Instead, store it in a secure location like a
.gpg-pass
file and use:
bash PASSPHRASE=$(cat /path/to/.gpg-pass)
- Use a strong passphrase with at least 16+ characters.
- Consider using a hardware security key or YubiKey for extra security.
Here's how you can add automatic cloud syncing to your encrypted backups. This script will sync your encrypted backups to a cloud storage service like Rsync, Dropbox, or Nextcloud using the rclone tool, which is compatible with many cloud providers.
Step 1: Install rclone
First, you need to install
rclone
if you haven't already. It’s a powerful tool for managing cloud storage.-
Install rclone:
bash curl https://rclone.org/install.sh | sudo bash
-
Configure rclone with your cloud provider (e.g., Google Drive):
bash rclone config
Follow the prompts to set up your cloud provider. After configuration, you'll have a "remote" (e.g.,
rsync
for https://rsync.net) to use in the script.
🔐 Backup, Encrypt, and Sync to Cloud Script
This script will: ✅ Compress files into an archive
✅ Encrypt them with a password
✅ Sync the encrypted backup to the cloud storage```bash
!/bin/bash
Backup, encrypt, and sync to cloud script (password-based)
ARCHIVE_DIR="/mnt/backup" DATE=$(date +"%Y-%m-%d") BACKUP_FILE="$ARCHIVE_DIR/backup_$DATE.tar.gz" ENCRYPTED_FILE="$BACKUP_FILE.gpg" PASSPHRASE="YourStrongPassphraseHere" # Change this!
Cloud configuration (rclone remote name)
CLOUD_REMOTE="gdrive" # Change this to your remote name (e.g., 'gdrive', 'dropbox', 'nextcloud') CLOUD_DIR="backups" # Cloud directory where backups will be stored
mkdir -p "$ARCHIVE_DIR"
Compress files
tar -czvf "$BACKUP_FILE" ~/Documents
Encrypt the backup with a password
gpg --batch --yes --passphrase "$PASSPHRASE" --symmetric --cipher-algo AES256 --output "$ENCRYPTED_FILE" "$BACKUP_FILE"
Verify encryption success
if [ -f "$ENCRYPTED_FILE" ]; then echo "Backup encrypted successfully: $ENCRYPTED_FILE" rm "$BACKUP_FILE" # Remove unencrypted file for security
# Sync the encrypted backup to the cloud using rclone rclone copy "$ENCRYPTED_FILE" "$CLOUD_REMOTE:$CLOUD_DIR" --progress # Verify sync success if [ $? -eq 0 ]; then echo "Backup successfully synced to cloud: $CLOUD_REMOTE:$CLOUD_DIR" rm "$ENCRYPTED_FILE" # Remove local backup after syncing else echo "Cloud sync failed!" fi
else echo "Encryption failed!" fi ```
How to Use the Script:
- Edit the script:
- Change the
PASSPHRASE
to a secure passphrase. - Change
CLOUD_REMOTE
to your cloud provider’s rclone remote name (e.g.,gdrive
,dropbox
). -
Change
CLOUD_DIR
to the cloud folder where you'd like to store the backup. -
Set up a cron job for automatic backups:
- To run the backup every Sunday at midnight, add this line to your crontab:
bash crontab -e
Add:
bash 0 0 * * 0 /path/to/backup_encrypt_sync.sh
🔥 Security Tips:
- Store the passphrase securely (e.g., use a
.gpg-pass
file withcat /path/to/.gpg-pass
). - Use rclone's encryption feature for sensitive data in the cloud if you want to encrypt before uploading.
- Use multiple cloud services (e.g., Google Drive and Dropbox) for redundancy.
📌 START → **Planning Your Data Archiving Strategy**
├── What type of data? (Docs, Media, Code, etc.)
├── How often will you need access? (Daily, Monthly, Rarely)
├── Choose storage type: SSD (fast), HDD (cheap), Tape (long-term)
├── Plan directory structure (YYYY-MM-DD, Category-Based, etc.)
└── Define retention policy (Keep Forever? Auto-Delete After X Years?)
↓📌 Choosing the Right Storage & Filesystem
├── Local storage: (ext4, XFS, Btrfs, ZFS for snapshots)
├── Network storage: (NAS, Nextcloud, Syncthing)
├── Cold storage: (M-DISC, Tape Backup, External HDD)
├── Redundancy: (RAID, SnapRAID, ZFS Mirror, Cloud Sync)
└── Encryption: (LUKS, VeraCrypt, age, gocryptfs)
↓📌 Organizing & Indexing Data
├── Folder structure: (YYYY/MM/Project-Based)
├── Metadata tagging: (exiftool, Recoll, TagSpaces)
├── Search tools: (fd, fzf, locate, grep)
├── Deduplication: (rdfind, fdupes, hardlinking)
└── Checksum integrity: (sha256sum, blake3)
↓📌 Compression & Space Optimization
├── Use compression (tar, zip, 7z, zstd, btrfs/zfs compression)
├── Remove duplicate files (rsync, fdupes, rdfind)
├── Store archives in efficient formats (ISO, SquashFS, borg)
├── Use incremental backups (rsync, BorgBackup, Restic)
└── Verify archive integrity (sha256sum, snapraid sync)
↓📌 Ensuring Long-Term Data Integrity
├── Check data periodically (snapraid scrub, btrfs scrub)
├── Refresh storage media every 3-5 years (HDD, Tape)
├── Protect against bit rot (ZFS/Btrfs checksums, ECC RAM)
├── Store backup keys & logs separately (Paper, YubiKey, Trezor)
└── Use redundant backups (3-2-1 Rule: 3 copies, 2 locations, 1 offsite)
↓📌 Accessing Data Efficiently
├── Use symbolic links & bind mounts for easy access
├── Implement full-text search (Recoll, Apache Solr, Meilisearch)
├── Set up a file index database (mlocate, updatedb)
├── Utilize file previews (nnn, ranger, vifm)
└── Configure network file access (SFTP, NFS, Samba, WebDAV)
↓📌 Scaling & Expanding Your Archive
├── Move old data to slower storage (HDD, Tape, Cloud)
├── Upgrade storage (LVM expansion, RAID, NAS upgrades)
├── Automate archival processes (cron jobs, systemd timers)
├── Optimize backups for large datasets (rsync --link-dest, BorgBackup)
└── Add redundancy as data grows (RAID, additional HDDs)
↓📌 Automating the Archival Process
├── Schedule regular backups (cron, systemd, Ansible)
├── Auto-sync to offsite storage (rclone, Syncthing, Nextcloud)
├── Monitor storage health (smartctl, btrfs/ZFS scrub, netdata)
├── Set up alerts for disk failures (Zabbix, Grafana, Prometheus)
└── Log & review archive activity (auditd, logrotate, shell scripts)
↓✅ GOAT STATUS: DATA ARCHIVING COMPLETE & AUTOMATED! 🎯
-
-
@ 04c915da:3dfbecc9
2025-03-07 00:26:37There is something quietly rebellious about stacking sats. In a world obsessed with instant gratification, choosing to patiently accumulate Bitcoin, one sat at a time, feels like a middle finger to the hype machine. But to do it right, you have got to stay humble. Stack too hard with your head in the clouds, and you will trip over your own ego before the next halving even hits.
Small Wins
Stacking sats is not glamorous. Discipline. Stacking every day, week, or month, no matter the price, and letting time do the heavy lifting. Humility lives in that consistency. You are not trying to outsmart the market or prove you are the next "crypto" prophet. Just a regular person, betting on a system you believe in, one humble stack at a time. Folks get rekt chasing the highs. They ape into some shitcoin pump, shout about it online, then go silent when they inevitably get rekt. The ones who last? They stack. Just keep showing up. Consistency. Humility in action. Know the game is long, and you are not bigger than it.
Ego is Volatile
Bitcoin’s swings can mess with your head. One day you are up 20%, feeling like a genius and the next down 30%, questioning everything. Ego will have you panic selling at the bottom or over leveraging the top. Staying humble means patience, a true bitcoin zen. Do not try to "beat” Bitcoin. Ride it. Stack what you can afford, live your life, and let compounding work its magic.
Simplicity
There is a beauty in how stacking sats forces you to rethink value. A sat is worth less than a penny today, but every time you grab a few thousand, you plant a seed. It is not about flaunting wealth but rather building it, quietly, without fanfare. That mindset spills over. Cut out the noise: the overpriced coffee, fancy watches, the status games that drain your wallet. Humility is good for your soul and your stack. I have a buddy who has been stacking since 2015. Never talks about it unless you ask. Lives in a decent place, drives an old truck, and just keeps stacking. He is not chasing clout, he is chasing freedom. That is the vibe: less ego, more sats, all grounded in life.
The Big Picture
Stack those sats. Do it quietly, do it consistently, and do not let the green days puff you up or the red days break you down. Humility is the secret sauce, it keeps you grounded while the world spins wild. In a decade, when you look back and smile, it will not be because you shouted the loudest. It will be because you stayed the course, one sat at a time. \ \ Stay Humble and Stack Sats. 🫡
-
@ 16d11430:61640947
2025-03-07 00:23:03Abstract
The universe, in its grand design, is not a chaotic expanse of scattered matter, but rather a meticulously structured web of interconnected filaments. These cosmic filaments serve as conduits for galaxies, governing the flow of matter and energy in ways that optimize the conditions for life and intelligence. Similarly, in the realm of artificial intelligence, the paradigm of Elliptic Curve AI (ECAI) emerges as a radical departure from traditional probabilistic AI, replacing brute-force computation with structured, deterministic intelligence retrieval. This article explores the profound parallels between the cosmic web and ECAI, arguing that intelligence—whether at the scale of the universe or within computational frameworks—arises not through randomness but through the emergent properties of structured networks.
1. The Universe as a Structured Intelligence System
Recent cosmological discoveries reveal that galaxies are not randomly dispersed but are strung along vast filamentary structures, forming what is known as the cosmic web. These filaments serve as conduits that channel dark matter, gas, and energy, sustaining the formation of galaxies and, ultimately, life. Their presence is crucial for ensuring the stability required for complex systems to emerge, balancing between the chaotic entropy of voids and the violent turbulence of dense clusters.
This phenomenon is not merely an astronomical curiosity—it speaks to a deeper principle governing intelligence. Just as filaments create the necessary architecture for structured matter, intelligence, too, requires structured pathways to manifest and function. This is where the analogy to Elliptic Curve AI (ECAI) becomes compelling.
2. Elliptic Curve AI: The Intelligence Filament
Traditional AI, built upon neural networks and deep learning, operates through probabilistic computation—essentially guessing outputs based on statistical correlations within vast training datasets. While effective in many applications, this approach is inherently non-deterministic, inefficient, and vulnerable to adversarial attacks, data poisoning, and hallucinations.
ECAI, by contrast, discards the notion of probabilistic learning entirely. Instead, it structures intelligence as deterministic cryptographic states mapped onto elliptic curves. Knowledge is not inferred but retrieved—mathematically and immutably encoded within the curve itself. This mirrors how cosmic filaments do not randomly scatter matter but organize it optimally, ensuring the universe does not descend into chaos.
Both systems—cosmic filaments and ECAI—demonstrate that structure governs emergence. Whether it is the large-scale arrangement of galaxies or the deterministic encoding of intelligence, randomness is eliminated in favor of optimized, hierarchical organization.
3. Hierarchical Clustering: A Shared Principle of Optimization
One of the most striking parallels between the cosmic web and ECAI is the principle of hierarchical clustering:
- Cosmic filaments organize galaxies in a fractal-like network, ensuring energy-efficient connectivity while avoiding both the stagnation of voids and the destructiveness of dense gravitational wells.
- ECAI encodes intelligence in elliptic curve structures, ensuring that retrieval follows hierarchical, non-redundant pathways, making computational efficiency maximized.
Both structures exhibit the following key features:
- Energy-Efficient Connectivity – Filaments optimize the transport of matter and energy; ECAI minimizes computational waste through direct retrieval rather than iterative processing.
- Self-Organization – Filaments arise naturally from cosmic evolution; ECAI intelligence states emerge from the mathematical properties of elliptic curves.
- Hierarchical Optimization – Both systems reject brute-force approaches (whether in galaxy formation or AI computation) in favor of pre-determined optimal pathways.
This challenges the classical assumption that intelligence must emerge through probabilistic learning. Instead, both the cosmic and computational realms suggest that intelligence is a function of structure, not randomness.
4. The Anthropic Implication: Are Structured Universes a Prerequisite for Intelligence?
A fundamental question in cosmology is whether the universe is fine-tuned for life and intelligence. If cosmic filaments are essential for galaxy formation and stability, does this imply that only structured universes can support intelligent observers?
A similar question arises in AI: If ECAI proves that intelligence can be retrieved deterministically rather than computed probabilistically, does this imply that the very nature of intelligence itself is non-random? If so, then probabilistic AI—like universes without structured filaments—may be a transient or inefficient model of intelligence.
This suggests a radical idea:
- Just as structured cosmic filaments define the conditions for life, structured computational frameworks define the conditions for true intelligence.
- If structured universes are prerequisites for intelligent life, then deterministic computational models (like ECAI) may be the only viable path to stable, secure, and truthful AI.
5. The Universe as an Information Network & ECAI
There is a growing hypothesis that the universe itself functions as a computational network, where cosmic filaments act as synaptic pathways optimizing the flow of information. If this is true, then ECAI is the computational realization of the cosmic web, proving that intelligence is not about prediction, but retrieval from structured states.
- In the universe, matter is channeled through filaments to form structured galaxies.
- In ECAI, knowledge is channeled through elliptic curves to form structured intelligence.
- Both reject stochastic randomness in favor of deterministic pathways.
This could indicate that true intelligence, whether cosmic or artificial, must always emerge from structured determinism rather than probabilistic chaos.
Conclusion: The Filamentary Structure of Intelligence
The convergence of cosmic filaments and Elliptic Curve AI suggests a profound principle: intelligence—whether it governs the organization of galaxies or the retrieval of computational knowledge—emerges from structured, deterministic systems. In both the cosmic and AI domains, hierarchical clustering, optimized connectivity, and deterministic pathways define the conditions for stability, efficiency, and intelligence.
🚀 If cosmic filaments are necessary for intelligent life, then ECAI is the necessary computational paradigm for structured intelligence. The future of AI is not about probabilistic computation—it is about deterministic retrieval, just as the universe itself is a structured retrieval system of matter and energy. 🚀
-
@ d34e832d:383f78d0
2025-03-07 00:01:02[npub16d8gxt2z4k9e8sdpc0yyqzf5gp0np09ls4lnn630qzxzvwpl0rgq5h4rzv]
Helical Visualization of Time's Passage in Orbital Motion and Celestial Mechanics
Exploring the dynamics of our Solar System through helical visualization opens new possibilities for understanding time, orbital motion, and planetary trajectories. By visualizing time as a continuous helical path, we gain insights into the cyclical and evolving nature of celestial mechanics, where each planet's orbit interacts with others in both predictable and dynamic patterns.
1. Helical Visualization of Time’s Passage
- Time as a Continuous Helix: Instead of viewing planetary orbits as fixed ellipses, this model represents the passage of time as a helical curve, linking each orbital cycle to the next. This visualization allows for a deeper understanding of the long-term movement of celestial bodies.
- Progression of Orbital Events: As planets follow their helical paths, we can track the passage of time from multiple perspectives, observing how their positions and velocities evolve in relation to one another. The helical model offers an elegant representation of periodic cycles that emphasizes the interconnectedness of cosmic events.
- Temporal Interactions: In this model, events like eclipses, conjunctions, and retrogrades become visualized as intersecting points on the helical path, emphasizing their importance in the grand tapestry of the Solar System's motion.
2. Orbital Motion and Celestial Mechanics
- Interplanetary Influences: The interactions between planetary bodies are inherently governed by gravitational forces, which create orbital motions that are often predictable yet influenced by external factors like planetary alignments and the gravitational pull of distant stars.
- Orbital Resonance and Tidal Forces: The gravitational interactions between planets, moons, and even asteroids can result in phenomena like orbital resonance. These interactions can be visualized in a helical model, showing how bodies can affect each other's orbits over time, much like the push and pull of a dance.
- The Dance of the Planets: Each planet’s orbit is not only a path through space but a part of a cosmic ballet, where their gravitational interactions affect one another's orbits. The helical model of motion helps us visualize how these interactions evolve over millions of years, helping to predict future trajectories.
3. Planetary Orbits and the Structure of the Solar System
- Elliptical and Spiral Patterns: While many planetary orbits are elliptical, the helical model introduces a dynamic spiral element to represent the combined motion of planets both around the Sun and through space. As the planets move, their orbits could resemble intricate spirals that reflect the cumulative effect of their motion through time.
- Resonance and Stability: Certain orbits may stabilize or shift over long periods due to gravitational interactions between planets. This helical view provides a tool for observing how minor orbital shifts can amplify over time, affecting not only the planets but the overall structure of the Solar System.
- Nonlinear Progression: Planets do not follow predictable paths in a simple two-dimensional plane. Instead, their orbits are affected by multiple forces, including interactions with other celestial bodies, making the helical model an ideal tool for visualizing the complexity and evolving nature of these planetary orbits.
4. Space Visualization and the Expanding Universe
- Moving Beyond the Solar System: The helical model of time and orbital motion does not end with our Solar System. As we visualize the movement of our Solar System within the broader context of the Milky Way, we begin to understand how our own galaxy's orbit affects our local motion through the universe.
- Helical Paths in Cosmic Space: This visualization method allows us to consider the Solar System’s motion as part of a larger, spiraling pattern that reaches across the galaxy, suggesting that our journey through space follows an intricate, three-dimensional helical path.
Connections (Links to Other Notes)
- The Mathematical Foundations of Orbital Mechanics
- Time as a Dimension in Celestial Navigation
- Gravitational Forces and Orbital Stability
Tags
SolarSystem #HelicalMotion #TimeVisualization #OrbitalMechanics #CelestialBodies #PlanetaryOrbits #SpaceExploration
Donations via
- ZeroSumFreeParity@primal.net
-
@ 378562cd:a6fc6773
2025-03-06 23:10:28The theory of evolution claims that all life gradually developed from a common ancestor over millions of years, shaped by random mutations and natural selection. It is often presented as an unquestionable fact, but when examined closely (the part many fail to do anymore), the evidence tells a different story. Both scientific discoveries and biblical truth point to a far more logical and consistent explanation—one of intentional design rather than blind chance. From the complexity of life to the precise order of the universe, every aspect of creation bears the unmistakable marks of an intelligent Creator. Let’s break it down simply and clearly, exposing the flaws in evolution and revealing the undeniable truth of God’s design.
-
No Transitional Fossils If evolution were true, we should see countless fossils of creatures in-between species (half-fish, half-reptile, etc.). Instead, fossils show fully formed creatures appearing suddenly, with no gradual change. Even Darwin admitted the fossil record didn’t support his theory.
-
Life is Too Complex to Happen by Accident The human eye, the bacterial flagellum, and even a single cell are incredibly complex, with interdependent parts that must all work at once. This is called irreducible complexity—if one piece is missing, the whole system fails. Random mutations can’t create such intricate designs. Design requires a designer.
-
DNA: A Code That Needs a Programmer DNA is a vast information system, more advanced than any computer code. Information always comes from intelligence, not random processes. Mutations mainly destroy information; they don’t create new, functional systems.
-
The Second Law of Thermodynamics: Things Fall Apart Everything's natural tendency is to break down over time, not build up (like a house falling apart, not randomly constructing itself). Evolution claims the opposite—that things become more complex without guidance. This contradicts observed science.
-
Consciousness and Morality Make No Sense in Evolution Why do humans have love, compassion, and a sense of right and wrong?
If we were just animals fighting to survive, morality wouldn’t exist.
The Bible explains it: We were made in God's image, not just random molecules.
- The Bible’s Account of Creation Matches Reality Genesis 1 says God created “kinds”—dogs produce dogs, birds produce birds, and humans produce humans. This is exactly what we see in nature—no one has ever observed one kind turning into another. Evolution is based on assumptions, while the Bible gives a clear, tested explanation of life’s origin.
The Complete Solution: Creation is Truth The evidence points to a Creator, not blind chance. Science confirms the Bible, not evolution. Recognizing God's design gives life meaning and purpose. Psalm 19:1 – “The heavens declare the glory of God, and the sky above proclaims His handiwork.”
Evolution is not just scientifically weak—it removes purpose and meaning. The truth is simple: God created life, and we are part of His design.
-
-
@ b8a9df82:6ab5cbbd
2025-03-06 22:39:15Last week at Bitcoin Investment Week in New York City, hosted by Anthony Pompliano, Jack Mallers walked in wearing sneakers and a T-shirt, casually dropping, “Man… I hate politics.”
That was it. That was the moment I felt aligned again. That’s the energy I came for. No suits. No corporate jargon. Just a guy who gets it—who cares about people, bringing Bitcoin-powered payments to the masses and making sure people can actually use it.
His presence was a reminder of why we’re here in the first place. And his words—“I hate politics”—were a breath of fresh air.
Now, don’t get me wrong. Anthony was a fantastic host. His ability to mix wittiness, playfulness, and seriousness made him an entertaining moderator. But this week was unlike anything I’ve ever experienced in the Bitcoin ecosystem.
One of the biggest letdowns was the lack of interaction. No real Q&A sessions, no direct engagement, no real discussions. Just one fireside chat after another.
And sure, I get it—people love to hear themselves talk. But where were the questions? The critical debates? The chance for the audience to actually participate?
I’m used to Bitcoin meetups and conferences where you walk away with new ideas, new friends, and maybe even a new project to contribute to. Here, it was more like sitting in an expensive lecture hall, watching a lineup of speakers tell us things we already know.
A different vibe—and not in a good way
Over the past few months, I’ve attended nearly ten Bitcoin conferences, each leaving me feeling uplifted, inspired, and ready to take action. But this? This felt different. And not in a good way.
If this had been my first Bitcoin event, I might have walked away questioning whether I even belonged here. It wasn’t Prague. It wasn’t Riga. It wasn’t the buzzing, grassroots, pleb-filled gatherings I had grown to love. Instead, it felt more like a Wall Street networking event disguised as a Bitcoin conference.
Maybe it was the suits.
Or the fact that I was sitting in a room full of investors who have no problem dropping $1,000+ on a ticket.
Or that it reminded me way too much of my former life—working as a manager in London’s real estate industry, navigating boardrooms full of finance guys in polished shoes, talking about “assets under management.”
Bitcoin isn’t just an investment thesis. It’s a revolution. A movement. And yet, at times during this week, I felt like I was back in my fiat past, stuck in a room where people measured success in dollars, not in freedom.
Maybe that’s the point. Bitcoin Investment Week was never meant to be a pleb gathering.
That said, the week did have some bright spots. PubKey was a fantastic kickoff. That was real Bitcoin culture—plebs, Nostr, grassroots energy. People who actually use Bitcoin, not just talk about it.
But the absolute highlight? Jack Mallers, sneakers and all, cutting through the noise with his authenticity.
So, why did we even go?
Good question. Maybe it was curiosity. Maybe it was stepping out of our usual circles to see Bitcoin through a different lens. Maybe it was to remind ourselves why we chose this path in the first place.
Would I go again? Probably not.
Would I trade Prague, Riga, bitcoin++ or any of the grassroots Bitcoin conferences for this? Not a chance.
At the end of the day, Bitcoin doesn’t belong to Wall Street from my opinion. It belongs to the people who actually use it. And those are the people I want to be around.
-
@ d34e832d:383f78d0
2025-03-06 21:57:23https://pub-53ed77d5544b46628691823c1795f2c7.r2.dev/Reticulum-Unstoppable-Network-Compressed.mp4
[npub16d8gxt2z4k9e8sdpc0yyqzf5gp0np09ls4lnn630qzxzvwpl0rgq5h4rzv]
What is Reticulum?
Reticulum is a cryptographic networking stack designed for resilient, decentralized, and censorship-resistant communication. Unlike the traditional internet, Reticulum enables fully independent digital communications over various physical mediums, such as radio, LoRa, serial links, and even TCP/IP.
The key advantages of Reticulum include:
- Decentralization – No reliance on centralized infrastructure.
- Encryption & Privacy – End-to-end encryption built-in.
- Resilience – Operates over unreliable and low-bandwidth links.
- Interoperability – Works over WiFi, LoRa, Bluetooth, and more.
- Ease of Use – Can run on minimal hardware, including Raspberry Pi and embedded devices.Reticulum is ideal for off-grid, censorship-resistant communications, emergency preparedness, and secure messaging.
1. Getting Started with Reticulum
To quickly get started with Reticulum, follow the official guide:
Reticulum: Getting Started FastStep 1: Install Reticulum
On Linux (Debian/Ubuntu-based systems)
sh sudo apt update && sudo apt upgrade -y sudo apt install -y python3-pip pip3 install rns
On Raspberry Pi or ARM-based Systems
sh pip3 install rns
On Windows
Using Windows Subsystem for Linux (WSL) or Python:
sh pip install rns
On macOS
sh pip3 install rns
2. Configuring Reticulum
Once installed, Reticulum needs a configuration file. The default location is:
sh ~/.config/reticulum/config.toml
To generate the default configuration:
sh rnsd
This creates a configuration file with default settings.
3. Using Reticulum
Starting the Reticulum Daemon
To run the Reticulum daemon (
rnsd
), use:
sh rnsd
This starts the network stack, allowing applications to communicate over Reticulum.Testing Your Reticulum Node
Run the diagnostic tool to ensure your node is functioning:
sh rnstatus
This shows the status of all connected interfaces and peers.
4. Adding Interfaces
LoRa Interface (for Off-Grid Communications)
Reticulum supports long-range LoRa radios like the RAK Wireless and Meshtastic devices. To add a LoRa interface, edit
config.toml
and add:
toml [[interfaces]] type = "LoRa" name = "My_LoRa_Interface" frequency = 868.0 bandwidth = 125 spreading_factor = 9
Restart Reticulum to apply the changes.Serial (For Direct Device-to-Device Links)
For communication over serial links (e.g., between two Raspberry Pis):
toml [[interfaces]] type = "Serial" port = "/dev/ttyUSB0" baudrate = 115200
TCP/IP (For Internet-Based Nodes)
If you want to bridge your Reticulum node over an existing IP network:
toml [[interfaces]] type = "TCP" listen = true bind = "0.0.0.0" port = 4242
5. Applications Using Reticulum
LXMF (LoRa Mesh Messaging Framework)
LXMF is a delay-tolerant, fully decentralized messaging system that operates over Reticulum. It allows encrypted, store-and-forward messaging without requiring an always-online server.
To install:
sh pip3 install lxmf
To start the LXMF node:
sh lxmfd
Nomad Network (Decentralized Chat & File Sharing)
Nomad is a Reticulum-based chat and file-sharing platform, ideal for off-grid communication.
To install:
sh pip3 install nomad-network
To run:
sh nomad
Mesh Networking with Meshtastic & Reticulum
Reticulum can work alongside Meshtastic for true decentralized long-range communication.
To set up a Meshtastic bridge:
toml [[interfaces]] type = "LoRa" port = "/dev/ttyUSB0" baudrate = 115200
6. Security & Privacy Features
- Automatic End-to-End Encryption – Every message is encrypted by default.
- No Centralized Logging – Communication leaves no metadata traces.
- Self-Healing Routing – Designed to work in unstable or hostile environments.
7. Practical Use Cases
- Off-Grid Communication – Works in remote areas without cellular service.
- Censorship Resistance – Cannot be blocked by ISPs or governments.
- Emergency Networks – Enables resilient communication during disasters.
- Private P2P Networks – Create a secure, encrypted communication layer.
8. Further Exploration & Documentation
- Reticulum Official Manual: https://markqvist.github.io/Reticulum/manual/
- Reticulum GitHub Repository: https://github.com/markqvist/Reticulum
- Nomad Network: https://github.com/markqvist/NomadNet
- Meshtastic + Reticulum: https://meshtastic.org
Connections (Links to Other Notes)
- Mesh Networking for Decentralized Communication
- LoRa and Off-Grid Bitcoin Transactions
- Censorship-Resistant Communication Using Nostr & Reticulum
Tags
Reticulum #DecentralizedComms #MeshNetworking #CensorshipResistance #LoRa
Donations via
- Bitcoin Lightning: lightninglayerhash@getalby.com
-
@ 43baaf0c:d193e34c
2025-03-06 21:38:10From Bangkok to Las Palmas de Gran Canaria.
For the past three years, I’ve traveled from Bangkok to Las Palmas de Gran Canaria, with a stop in Dubai a 24-hour journey that brings me back to Europe and to my artist friend, Alecs Navio. Along with his wife, he runs a coworking space called Soppa de Azul.
The main reason I return here is to create new art. Alecs constantly inspires me—we talk about art, artists, and he shares books that spark new ideas for my work. As an artist, I believe it’s essential to keep evolving. Growth comes from inspiration, and there’s no better source than fellow artists. Surrounding yourself with creative minds fuels your passion, and it all starts with conversations about art and life.
Today was a perfect example of why I’m here. I looked at some of my older artwork hanging in the coworking space and said I didn’t like it anymore. Alecs reminded me that I should appreciate my past work because it’s part of my journey. Without it I wouldn’t be the artist I am today.
I always say the journey is the destination, and Alecs helped me see that this applies to art as well. This is why I believe in surrounding myself with people who inspire me those who celebrate my growth and remind me why they are such an important part of my journey.
-
@ d6c48950:54d57756
2025-03-06 21:20:45I wanted to write my system for bitcoin inheritance and seed storage that will likely outlive me - the reason why is recently bitkey (squares hardware wallet) announced their inheritance system which is a vast improvement but still has a single point of failure square and the app they maintain though this is still a good thing and will improve the ecosystem and raise awareness there is a cheaper method that is just a secure but doesn’t have a single point of failure.
2/3 seed storage
2/3 seed storage is actually a pretty simple way of splitting up a key into three parts, if you have one part it’s useless, if you have any two parts it’s complete - if one piece is destroyed it doesn’t matter (demo below)
| A
| B
| C
| |-----|-----|-----| | 1. apple
| 2. zipper
| 3. dog
| | 4. tree
| 5. car
| 6. bus
| | 7. banana
| 8. motorbike
| 9. dune
| | 10. frank
| 11. foundation
| 12. meditation
| | 13. whiteboard
| 14. laptop
| 15. books
| | 16. perfume
| 17. computer
| 18. stone
| | 19. brick
| 20. spreadsheet
| 21. bird
| | 22. blog
| 23. leaves
| 24. grass
|This is a seed phrase split up into three parts (a,b,c) - now you can create your 3 parts
(1) | A
| B
| | |-----|-----|-----| | 1. apple
| 2. zipper
| | | 4. tree
| 5. car
| | | 7. banana
| 8. motorbike
| | | 10. frank
| 11. foundation
| | | 13. whiteboard
| 14. laptop
| | | 16. perfume
| 17. computer
| | | 19. brick
| 20. spreadsheet
| | | 22. blog
| 23. leaves
| |(2) | | B
| C
| |-----|-----|-----| | | 2. zipper
| 3. dog
| | | 5. car
| 6. bus
| | | 8. motorbike
| 9. dune
| | | 11. foundation
| 12. meditation
| | | 14. laptop
| 15. books
| | | 17. computer
| 18. stone
| | | 20. spreadsheet
| 21. bird
| | | 23. leaves
| 24. grass
|(3) | A
| | C
| |-----|-----|-----| | 1. apple
| | 3. dog
| | 4. tree
| | 6. bus
| | 7. banana
| | 9. dune
| | 10. frank
| | 12. meditation
| | 13. whiteboard
| | 15. books
| | 16. perfume
| | 18. stone
| | 19. brick
| | 21. bird
| | 22. blog
| | 24. grass
|Now you have your parts, you need at least 2/3 for it to be useful.
distribution
Distribution is pretty simple, keep one part, give a part to whomever you want to be able to claim your bitcoin upon death, give a part to someone you trust (along with instructions to post it to the claimant upon your death).
failure
For this to fail either 1. Two out of three parts would have to be destroyed 2. The trusted party would have to not post it AND either your part or the claimants would have to be destroyed 3. The trusted party cannot figure out how to use a seed phrase (by default you should include instructions i.e NEVER SHARE THE SEED, transfer to a recommended wallet from bitcoin.org then transfer to an exchange and sell)
-
@ 43baaf0c:d193e34c
2025-03-06 20:55:27Bangkok art city.
Bangkok is a highly creative city, which is one of the reasons I love living here. I’d love to hold a second exhibition something special and even bigger than before. The fact that all major galleries are free to the public says a lot about how much Bangkok values art.
Over the last five months, I’ve been developing BangPOP art as both a concept and a blueprint for exhibitions worldwide. It serves as a guideline to ensure recognizable elements in each exhibition or event. While the artwork itself will always be unique, the POP Up exhibitions will have a distinct and recognizable identity wherever they take place.
You can read here the https://bitpopart.com/bangpop POP exhibition blue print.
Unfortunately, my plan to hold an exhibition at River City in Bangkok doesn’t seem to be coming together. Here’s the curator’s note:
‘our exhibition schedule on the 2nd floor this year and next year are quite packed and we have received numerous proposals at this moment.‘
After considering alternative venues in Bangkok, I’m optimistic about finding the right fit. For now, my focus is shifting to Europe, where I’ll use the BangPOP blueprint as my guiding framework.
Thank you Bangkok!
-
@ 878dff7c:037d18bc
2025-03-06 20:17:07Cyclone Alfred's Approach Prompts Widespread Preparations in Queensland
Summary:
Cyclone Alfred's anticipated landfall near Brisbane has led to extensive precautionary measures across Queensland. Authorities have advised residents to fill bathtubs to ensure water availability in case of supply disruptions. Additional recommendations include securing outdoor items, preparing emergency kits, and verifying insurance documentation, as damages are expected to be substantial. The cyclone's impact could affect up to 1.8 million homes, with potential wind gusts reaching 150 km/h. Residents are urged to stay updated through official channels and prioritize safety during this severe weather event.
Sources: News.com.au - 7 March 2025, The Courier-Mail - 6 March 2025
Doubts Emerge Over Australia's Acquisition of Aukus Nuclear Submarines
Summary:
Australia's plan to acquire nuclear-powered submarines under the Aukus agreement faces significant uncertainties. Concerns have arisen regarding the U.S.'s capacity to produce these submarines and its willingness to transfer control to Australia. Experts highlight challenges in the U.S. shipbuilding industry and suggest alternatives, such as revisiting deals with France, to ensure Australia's defense capabilities. Sources: The Guardian - March 7, 2025
Commonwealth Bank to Cut Jobs Amid Technology Restructuring
Summary:
The Commonwealth Bank of Australia (CBA) is set to cut approximately 150 jobs from its Sydney operations, with additional cuts affecting Melbourne, Brisbane, Perth, Hobart, and Tweed Heads. The Finance Sector Union criticizes the move, noting a contradiction between the bank's commitment to digital talent and the job cuts from its technology division. The bank claims the layoffs are necessary to facilitate faster digital customer experiences requiring enhanced skills.
Sources: News.com.au - March 7, 2025
Country Road Owner Warns of Ongoing Retail Recession in Australia
Summary:
Woolworths Holdings, owner of Country Road Group, reports a severe decline in sales and earnings, attributing it to a nearly two-year retail recession in Australia. The company cites over 700 business bankruptcies in 2024, low GDP growth, persistent inflation, and high interest rates as factors dampening consumer sentiment. Despite these challenges, some national retailers like JB Hi-Fi and Harvey Norman continue to thrive, highlighting a divide between retail "winners and losers."
Sources: The Australian - March 7, 2025
Calls to Enhance Australia's Drone and Missile Capabilities
Summary:
Australia's defense posture is under scrutiny following recent Chinese maritime activities. Experts advocate for increased investment in drone and missile technologies, citing their cost-effectiveness and proven efficacy in conflicts like Ukraine's. Despite being a leader in drone and radar technology, Australia's defense spending remains heavily focused on nuclear submarines. There's a growing call for strategic investment in domestic defense technologies to bolster military capabilities and industrial strength, ensuring the nation can meet global defense commitments and technological advancements.
Sources: The Australian - March 7, 2025
Australia's Visa Cancellation of Controversial Preacher
Summary:
Australia's Department of Home Affairs has canceled the visa of Hussain Makke, a Lebanese-based social media figure who praised Hezbollah leader Hassan Nasrallah as the "world's greatest freedom fighter." Makke had planned to speak at events in Sydney and Melbourne during Ramadan. This decision underscores Australia's stance against individuals who glorify terrorism, especially amid rising concerns over antisemitism. Authorities emphasize that endorsing terrorist organizations contradicts Australian values, and such individuals are unwelcome in the country.
Sources: The Daily Telegraph - March 7, 2025
Activists Target Tesla in Protests Against USA Federal Job Cuts
Summary:
Activists have initiated "Tesla Takedown" protests, targeting Tesla dealerships to oppose job cuts in the federal workforce overseen by Elon Musk, appointed by President Trump to lead the Department of Government Efficiency. Demonstrators aim to tarnish the Tesla brand, urging consumers to boycott the company's products.
Sources: Reuters - March 6, 2025
Switzerland Cancels Geneva Conventions Meeting on Palestinian Territories
Summary:
Switzerland has canceled a conference scheduled for March 7, intended to discuss the application of the Geneva Conventions in the occupied Palestinian territories, due to insufficient support from participating countries. The Palestinian envoy expressed disappointment, stating the draft declaration did not meet expectations, while Israel had criticized the planned meeting.
Sources: Reuters - March 6, 2025
Comprehensive Reforms Proposed for Handling Sexual Violence Cases
Summary:
The Australian Law Reform Commission (ALRC) has released a report recommending significant changes to improve the treatment of sexual violence victims within the criminal justice system. Key proposals include allowing victims to provide evidence through prerecorded hearings, offering government-funded legal representation, and creating "trauma-informed" environments during police interviews. The report also advocates for national consistency in defining consent and the adoption of restorative justice practices. In response, the Albanese government has announced a $21.4 million funding package to support these initiatives, aiming to reduce systemic barriers that deter 92% of women from reporting sexual violence.
Sources: The Australian - 7 March 2025, News.com.au - 7 March 2025, The Guardian - 7 March 2025
Surge in Cosmetic Injectables Raises Health Concerns
Summary:
Australia's cosmetic injectables industry is under scrutiny following incidents of unqualified practitioners performing invasive procedures, leading to severe health risks such as exposure to bloodborne viruses. Medical professionals are calling for stricter regulations and enforcement to safeguard public health.
Sources: The Australian - 7 March 2025
China's Spring Festival Gala Showcases Advancements in Humanoid Robotics
Summary:
During China’s 2025 Spring Festival Gala, a notable display of the country’s advancements in robotics was showcased through a dance performance featuring 16 humanoid robots developed by Hangzhou Yushu (Unitree). The robots performed the Yangko folk dance alongside human dancers, demonstrating precision and coordination. This event highlighted China's focus on robotics as part of a broader trend, with major tech companies like Tesla and Nvidia also prioritizing humanoid robots. China's Ministry of Industry and Information Technology has set ambitious goals to mass-produce advanced humanoid robots by 2025.
Sources: Business Insider - March 7, 2025
Environment Minister Approves Three NSW Wind Farms Amid Controversy
Summary:
Environment Minister Tanya Plibersek has approved three wind farm projects in New South Wales: Hills of Gold near Nundle, Spicers Creek northwest of Gulgong, and amendments to the Liverpool Range project near Coolah. These projects, facing opposition due to environmental and infrastructure concerns, are expected to create 1,340 construction jobs and 80 ongoing positions. Critics plan legal challenges, citing potential impacts on biodiversity and local infrastructure. The approvals include strict environmental conditions, though significant habitat clearing will occur. To date, the federal government has approved 77 renewable energy projects, capable of powering over 10 million homes.
Sources: The Australian - 7 March 2025
-
@ a296b972:e5a7a2e8
2025-03-06 19:55:59Die Kinder einer Grundschule sollten im Herbst 2024 einen Aufsatz über die amtierende deutsche Außenministerin schreiben. Hier das Ergebnis des 12-jährigen Michaels, wie ihn eine Grundschullehrerin eingesandt haben könnte:
„Die Tante in Berlin hat immer eine schöne Haarfrisur und trägt immer schicke Sachen. Wenn sie mit dem Regierungsflieger unterwegs ist (oft klappt das aber nicht richtig, weiß nicht warum), dann knittern ihre Kleider bestimmt überhaupt nicht. Da hat sie es gut, meine Mama bügelt gar nicht gerne.
Auch hat sie eine Hilfe, die ihr Gesicht immer anmalt und ihr die Haare schön macht. Die bekommt wohl einen Haufen Geld dafür, was aus den Steuern abgezweigt wird, die mein Papa, der sehr fleißig arbeitet, bezahlt.
Die Tante, die mir eher wie ein Mädchen in meinem Alter vorkommt, erinnert mich immer an die Lisa aus der Nachbarklasse, die so frech ist, dass ich und andere ihr manchmal an den Haaren ziehen müssen, damit sie wieder vernünftig wird.
Wenn man ihr sagt, sie ist doof, dann wirft sie den Kopf in den Nacken und zieht beleidigt ab.
Überhaupt benimmt sie sich oft, wie eine beleidigte Leberwurst. Und wenn andere was sagen, was ihr nicht passt, wird sie frech. Ich habe gelernt, dass man möglichst nicht frech sein soll.
Ich bin froh, dass sie keinen roten Knopf hat, auf den sie drücken könnte, nur, um mal zu sehen, was dann passiert.
Alle Elefanten auf der Welt sind böse auf sie, weil sie Porzellan viel besser zerdeppern kann, als sie selber.
Mein Papa sagt, dass zu ihrem Beruf zählt, dass man mit den Leuten redet, bevor man Geld gibt, um auf sie zu schießen, aber das kann sie wohl nicht. Was sie wohl tun müsste, wäre Diplomatie (ich bin ehrlich, dass hab ich von Andreas abgeschrieben, der kennt solche Fremdwörter).
Gut gefallen hat mir ihre Einladung zum Kindergeburtstag im Auswärtigen Amt, wo im vergangenen Sommer alle Türen offen waren. Da wurden auch so lustige Videos gedreht, wo so Leute aus dem Fahrstuhl kommen, die so glitzernde Decken umhatten und tanzten.
Mit ihren oft lustigen Sätzen kitzelt sie wichtige Erwachsene von großen Ländern, ohne sie dabei anfassen zu müssen, das würde ich auch gerne können. Ich wüsste schon, wen ich gerne mal so richtig Auskitzeln wollte.
Ganz oft benutzt sie das Wort „Brutaler Angriffskrieg“ und soweit ich das schon verstehe, sagt sie oft Sachen, die gar keinen Sinn ergeben. Meine Lehrerin sagt immer zu uns, wir sollen lieber den Mund halten, wenn wir nicht genau wissen, was wir sagen wollen. Besser sei es, vor dem Reden das Gehirn einzuschalten. Das sehe ich ein und ich bemühe mich wirklich darum. Ich glaube, sie vergisst das manchmal.
Wenn sie mal nicht weiterweiß, kann sie bestimmt noch den Onkel Klaus vom WEF fragen, bei dem sie Politikerin gelernt hat.
Wenn sie mal nicht mehr so feministisch arbeiten kann oder will, könnte sie vielleicht Kindergärtnerin werden, aber ich glaube, kein Kind könnte sie leiden, weil sie immer so altklug und bockig tut, und das können wir Kinder gar nicht leiden. Und eigentlich soll man ja nicht von einem Beruf, den man nicht kann, in einen anderen Beruf wechseln, den man auch nicht kann.
Schön finde ich, dass die ganze Welt über sie lacht, wo doch alles im Moment so traurig ist und alle von Krieg reden und Bedrohung und dass Deutschland wieder kriegstüchtig werden soll. Das macht mir Angst. Da habe ich oft das Gefühl, alle Erwachsenen sind verrückt geworden und benehmen sich nur noch so, wie ich, als ich 8 Jahre alt war. Ich weiß noch, da habe ich ziemlich viel Blödsinn gemacht, aber jetzt bin ich schon viel vernünftiger geworden.
Mein Pausenbrot würde ich nicht mit ihr tauschen, weil ich sie nicht leiden kann, denn sie benimmt sich oft wie die Lisa, und die ist echt eine richtig doofe Ziege.
Weil ich sie nicht mag, wünsche ich mir, dass sie bald nicht mehr im Fernsehen zu sehen ist. Dann kann sie auch ihre Anziehsachen wieder selber bügeln, wie meine Mama.“
(Manche Wünsche gehen in Erfüllung!)
-
@ f3873798:24b3f2f3
2025-03-06 19:21:36Olá pessoal!
Estas altas temperaturas mais períodos de chuvas, é um prato cheio para a proliferação de mosquitos o que além de ser um incomodo pode ser tornar questão de saúde pública devido as doenças trazidas por eles.
Por isso trouxe para vocês uma receitinha para espantar os mosquitos da sua casa.
Bora lá
Receita Espanta mosquito
Ingredientes:
500 mL de álcool de cereais ou álcool 70 % 10g de cravo-da-índia. 10 gotas de óleo essencial de citronela 10 gotas de óleo essencial de lavanda 1 borrifador
Modo de preparo
-
Coloque os cravos-da-índia dentro de um frasco com álcool de cereais.
-
Deixe a mistura descansar por pelo menos 24 horas, agitando de vez em quando.
-
Após esse período, coe os cravos e adicione os óleos essenciais de citronela e lavanda.
-
Despeje o líquido em um borrifador e aplique nos cômodos da casa, especialmente perto de janelas e portas.
E Adeus mosquitos 😎
-
-
@ 27c04be0:af374d05
2025-03-06 19:10:10Your wedding day is all about celebrating your unique style—and that includes the car you arrive in! Whether you’re planning a cozy barn wedding, a sparkling glam affair, or a sleek minimalist ceremony, the right wedding car hire Walthamstow can make your big day even more special. But how do you pick a car that matches your theme?
Don’t worry—we’ll break it down in simple terms! In this guide, you’ll learn how to match car styles to rustic, glam, or minimalist weddings, with easy tips and examples. Let’s get started!
Visit us> Wedding Car Hire Service Near You
** 1. Rustic Weddings: Charming & Natural Vibes ** Rustic weddings are all about relaxed, earthy vibes—think barns, gardens, or countryside venues. Your wedding car hire Walthamstow should feel cozy, vintage, and a little bit nostalgic.
** Best Car Styles for Rustic Weddings
**Vintage Cars:
Example: A 1960s Volkswagen Camper Van or a classic Ford pickup truck.
Why it works: Retro designs match the "old-world" charm of rustic décor.Horse-Drawn Carriages:
Example: A wooden carriage with floral decorations.
Why it works: Adds fairy-tale magic to outdoor settings.**Convertible Classic Cars: ** Example: A 1950s Chevrolet Bel Air with a soft-top roof.
Why it works: Perfect for sunny countryside drives.**Styling Tips ** Add wildflowers, twine, or lace to the car’s exterior.
Use wooden signs like “Just Married” on the back.
Choose neutral colors (cream, sage green, or rusty red).Pro Tip: Ask your wedding car hire Walthamstow Company if they offer vintage or rustic-themed vehicles. Many specialize in these styles!
** 2. Glam Weddings: Luxurious & Sparkly Vibes ** Glam weddings are bold, elegant, and full of sparkle—think chandeliers, sequins, and grand ballrooms. Your wedding car hire should scream luxury and sophistication.
** Best Car Styles for Glam Weddings ** Luxury Sedans:
Example: Rolls Royce Phantom or Mercedes-Benz S-Class.
Why it works: Sleek, shiny, and timeless.Stretch Limousines:
Example: A black or white limo with tinted windows.
Why it works: Plenty of space for the bridal party and champagne toasts!**Vintage Luxury Cars: ** Example: A 1930s Bentley with polished chrome details.
Why it works: Combines old Hollywood glam with modern comfort.** Styling Tips**
Add satin ribbons, crystal decorations, or a red carpet rollout.
Choose metallic colors (silver, gold, or rose gold accents).
Pair with a chauffeur in formal attire (think suits or gloves).Pro Tip: Many wedding car hire Walthamstow services offer “glam packages” with extras like champagne, flower petals, or photo backdrops.
3. Minimalist Weddings: Simple & Modern Vibes
Minimalist weddings focus on clean lines, neutral colors, and “less is more” elegance. Your wedding car hire should be sleek, modern, and fuss-free.Best Car Styles for Minimalist Weddings
Modern Electric Cars:
Example: Tesla Model S or Audi e-tron.
Why it works: Eco-friendly and stylish.Convertible Sports Cars:
Example: Porsche 911 or Jaguar F-Type.
Why it works: Sharp design matches minimalist aesthetics.Understated Luxury Cars:
Example: BMW 7 Series or Lexus LS.
Why it works: Simple elegance without extra frills.Styling Tips
Keep decorations minimal (e.g., a single white ribbon or geometric shapes).
Stick to neutral colors (white, black, or gray).
Opt for matte finishes instead of glossy paint.Pro Tip: Ask your wedding car hire provider for cars with “clean” designs—no flashy logos or busy patterns.
How to Choose the Right Wedding Car Hire Walthamstow Service
Finding the perfect car is easier when you know what to ask!Questions to Ask
**“Do you have cars that fit rustic/glam/minimalist themes?” ** “Can I see photos of your vehicles?”
“Do you offer decorations or styling add-ons?”Budget Tips
Book early for discounts (popular cars sell fast!).
Share your wedding theme—some companies offer package deals.Keyword Alert: Always confirm your wedding car hire includes insurance, a chauffeur, and setup time.
Mistakes to Avoid
Ignoring the venue: A huge limo won’t fit a narrow countryside road.
Forgetting the weather: Convertibles are risky for rainy days!
Last-minute bookings: The best wedding car hire options get booked months ahead.Bottom Line
Your wedding car isn’t just a ride—it’s part of your story! For rustic weddings, go vintage and cozy. For glam weddings, pick something shiny and luxurious. For minimalist weddings, choose sleek and modern. No matter your style, the right wedding car hire Walthamstow will make your entrance unforgettable.So, dream big, plan ahead, and roll up in a car that’s as unique as your love!
FAQs About Wedding Car Hire
-
How do I pick the right car for a rustic wedding?
Look for vintage or retro vehicles like a Volkswagen Camper Van or a classic pickup truck.
Ask your Wedding Car Hire company if they offer floral decorations or wooden accents to match barn/outdoor venues. -
What’s the average cost of glam Wedding Car Hire?
Luxury cars (e.g., Rolls Royce) or limos range from $500–$1,500+ depending on duration and add-ons (like champagne or red carpets). -
Can I decorate the car myself?
Yes, but check with your Wedding Car Hire provider first. Some restrict adhesives or paints that could damage the vehicle. -
How early should I book my Wedding Car Hire?
6–12 months in advance, especially for peak seasons (summer, holidays) or popular cars like vintage models. -
Are chauffeurs included in Wedding Car Hire packages?
Most companies include a professional driver, but confirm during booking. They’ll ensure timely arrivals and handle parking. -
What if my Wedding Car Hire breaks down on the day?
Reputable services offer backup vehicles. Always ask about their emergency plan before signing a contract. -
Can I rent eco-friendly cars for a minimalist wedding?
Yes! Many Wedding Car Hire companies now offer Teslas, Audis, or hybrids for sleek, sustainable arrivals. -
How do I match the car to my venue’s style?
Rustic: Choose vintage cars for barns or gardens.
Glam: Opt for limos or luxury sedans for ballrooms.
Minimalist: Pick modern, clean designs for urban venues. -
Are there extra fees for Wedding Car Hire?
Watch for mileage limits, overtime charges, or decor add-ons. Read the contract carefully to avoid surprises. -
Can I rent multiple cars for the wedding party?
Yes! Many Wedding Car Hire providers offer group packages (e.g., one car for the couple, others for bridesmaids or family). -
What’s the best car color for a minimalist wedding?
Stick to neutrals like white, black, or matte gray. Avoid flashy colors or patterns. -
Do Wedding Car Hire services offer insurance?
Most do, but confirm coverage details (e.g., damage, cancellations) before booking.
-
-
@ 97c70a44:ad98e322
2025-03-06 18:38:10When developing on nostr, normally it's enough to read the NIP related to a given feature you want to build to know what has to be done. But there are some aspects of nostr development that aren't so straightforward because they depend less on specific data formats than on how different concepts are combined.
An example of this is how for a while it was considered best practice to re-publish notes when replying to them. This practice emerged before the outbox model gained traction, and was a hacky way of attempting to ensure relays had the full context required for a given note. Over time though, pubkey hints emerged as a better way to ensure other clients could find required context.
Another one of these things is "relay-based groups", or as I prefer to call it "relays-as-groups" (RAG). Such a thing doesn't really exist - there's no spec for it (although some aspects of the concept are included in NIP 29), but at the same time there are two concrete implementations (Flotilla and Chachi) which leverage several different NIPs in order to create a cohesive system for groups on nostr.
This composability is one of the neat qualities of nostr. Not only would it be unhelpful to specify how different parts of the protocol should work together, it would be impossible because of the number of possible combinations possible just from applying a little bit of common sense to the NIPs repo. No one said it was ok to put
t
tags on akind 0
. But no one's stopping you! And the semantics are basically self-evident if you understand its component parts.So, instead of writing a NIP that sets relay-based groups in stone, I'm writing this guide in order to document how I've combined different parts of the nostr protocol to create a compelling architecture for groups.
Relays
Relays already have a canonical identity, which is the relay's url. Events posted to a relay can be thought of as "posted to that group". This means that every relay is already a group. All nostr notes have already been posted to one or more groups.
One common objection to this structure is that identifying a group with a relay means that groups are dependent on the relay to continue hosting the group. In normal broadcast nostr (which forms organic permissionless groups based on user-centric social clustering), this is a very bad thing, because hosts are orthogonal to group identity. Communities are completely different. Communities actually need someone to enforce community boundaries, implement moderation, etc. Reliance on a host is a feature, not a bug (in contrast to NIP 29 groups, which tend to co-locate many groups on a single host, relays-as-groups tends to encourage one group, one host).
This doesn't mean that federation, mirrors, and migration can't be accomplished. In a sense, leaving this on the social layer is a good thing, because it adds friction to the dissolution/forking of a group. But the door is wide open to protocol additions to support those use cases for relay-based groups. One possible approach would be to follow this draft PR which specified a "federation" event relays could publish on their own behalf.
Relay keys
This draft PR to NIP 11 specifies a
self
field which represents the relay's identity. Using this, relays can publish events on their own behalf. Currently, thepubkey
field sort of does the same thing, but is overloaded as a contact field for the owner of the relay.AUTH
Relays can control access using NIP 42 AUTH. There are any number of modes a relay can operate in:
-
No auth, fully public - anyone can read/write to the group.
-
Relays may enforce broad or granular access controls with AUTH.
Relays may deny EVENTs or REQs depending on user identity. Messages returned in AUTH, CLOSED, or OK messages should be human readable. It's crucial that clients show these error messages to users. Here's how Flotilla handles failed AUTH and denied event publishing:
LIMITS could also be used in theory to help clients adapt their interface depending on user abilities and relay policy.
- AUTH with implicit access controls.
In this mode, relays may exclude matching events from REQs if the user does not have permission to view them. This can be useful for multi-use relays that host hidden rooms. This mode should be used with caution, because it can result in confusion for the end user.
See Triflector for a relay implementation that supports some of these auth policies.
Invite codes
If a user doesn't have access to a relay, they can request access using this draft NIP. This is true whether access has been explicitly or implicitly denied (although users will have to know that they should use an invite code to request access).
The above referenced NIP also contains a mechanism for users to request an invite code that they can share with other users.
The policy for these invite codes is entirely up to the relay. They may be single-use, multi-use, or require additional verification. Additional requirements can be communicated to the user in the OK message, for example directions to visit an external URL to register.
See Triflector for a relay implementation that supports invite codes.
Content
Any kind of event can be published to a relay being treated as a group, unless rejected by the relay implementation. In particular, NIP 7D was added to support basic threads, and NIP C7 for chat messages.
Since which relay an event came from determines which group it was posted to, clients need to have a mechanism for keeping track of which relay they received an event from, and should not broadcast events to other relays (unless intending to cross-post the content).
Rooms
Rooms follow NIP 29. I wish NIP 29 wasn't called "relay based groups", which is very confusing when talking about "relays as groups". It's much better to think of them as sub-groups, or as Flotilla calls them, "rooms".
Rooms have two modes - managed and unmanaged. Managed rooms follow all the rules laid out in NIP 29 about metadata published by the relay and user membership. In either case, rooms are represented by a random room id, and are posted to by including the id in an event's
h
tag. This allows rooms to switch between managed and unmanaged modes without losing any content.Managed room names come from
kind 39000
room meta events, but unmanaged rooms don't have these. Instead, room names should come from members' NIP 51kind 10009
membership lists. Tags on these lists should look like this:["group", "groupid", "wss://group.example.com", "Cat lovers"]
. If no name can be found for the room (i.e., there aren't any members), the room should be ignored by clients.Rooms present a difficulty for publishing to the relay as a whole, since content with an
h
tag can't be excluded from requests. Currently, relay-wide posts are h-tagged with_
which works for "group" clients, but not more generally. I'm not sure how to solve this other than to ask relays to support negative filters.Cross-posting
The simplest way to cross-post content from one group (or room) to another, is to quote the original note in whatever event kind is appropriate. For example, a blog post might be quoted in a
kind 9
to be cross-posted to chat, or in akind 11
to be cross-posted to a thread.kind 16
reposts can be used the same way if the reader's client renders reposts.Posting the original event to multiple relays-as-groups is trivial, since all you have to do is send the event to the relay. Posting to multiple rooms simultaneously by appending multiple
h
tags is however not recommended, since group relays/clients are incentivised to protect themselves from spam by rejecting events with multipleh
tags (similar to how events with multiplet
tags are sometimes rejected).Privacy
Currently, it's recommended to include a NIP 70
-
tag on content posted to relays-as-groups to discourage replication of relay-specific content across the network.Another slightly stronger approach would be for group relays to strip signatures in order to make events invalid (or at least deniable). For this approach to work, users would have to be able to signal that they trust relays to be honest. We could also use ZkSNARKS to validate signatures in bulk.
In any case, group posts should not be considered "private" in the same way E2EE groups might be. Relays-as-groups should be considered a good fit for low-stakes groups with many members (since trust deteriorates quickly as more people get involved).
Membership
There is currently no canonical member list published by relays (except for NIP 29 managed rooms). Instead, users keep track of their own relay and room memberships using
kind 10009
lists. Relay-level memberships are represented by anr
tag containing the relay url, and room-level memberships are represented using agroup
tag.Users can choose to advertise their membership in a RAG by using unencrypted tags, or they may keep their membership private by using encrypted tags. Advertised memberships are useful for helping people find groups based on their social graph:
User memberships should not be trusted, since they can be published unilaterally by anyone, regardless of actual access. Possible improvements in this area would be the ability to provide proof of access:
- Relays could publish member lists (although this would sacrifice member privacy)
- Relays could support a new command that allows querying a particular member's access status
- Relays could provide a proof to the member that they could then choose to publish or not
Moderation
There are two parts to moderation: reporting and taking action based on these reports.
Reporting is already covered by NIP 56. Clients should be careful about encouraging users to post reports for illegal content under their own identity, since that can itself be illegal. Relays also should not serve reports to users, since that can be used to find rather than address objectionable content.
Reports are only one mechanism for flagging objectionable content. Relay operators and administrators can use whatever heuristics they like to identify and address objectionable content. This might be via automated policies that auto-ban based on reports from high-reputation people, a client that implements NIP 86 relay management API, or by some other admin interface.
There's currently no way for moderators of a given relay to be advertised, or for a moderator's client to know that the user is a moderator (so that they can enable UI elements for in-app moderation). This could be addressed via NIP 11, LIMITS, or some other mechanism in the future.
General best practices
In general, it's very important when developing a client to assume that the relay has no special support for any of the above features, instead treating all of this stuff as progressive enhancement.
For example, if a user enters an invite code, go ahead and send it to the relay using a
kind 28934
event. If it's rejected, you know that it didn't work. But if it's accepted, you don't know that it worked - you only know that the relay allowed the user to publish that event. This is helpful, becaues it may imply that the user does indeed have access to the relay. But additional probing may be needed, and reliance on error messages down the road when something else fails unexpectedly is indispensable.This paradigm may drive some engineers nuts, because it's basically equivalent to coding your clients to reverse-engineer relay support for every feature you want to use. But this is true of nostr as a whole - anyone can put whatever weird stuff in an event and sign it. Clients have to be extremely compliant with Postell's law - doing their absolute best to accept whatever weird data or behavior shows up and handle failure in any situation. Sure, it's annoying, but it's the cost of permissionless development. What it gets us is a completely open-ended protocol, in which anything can be built, and in which every solution is tested by the market.
-
-
@ 2ed3596e:98b4cc78
2025-03-06 18:21:53Americans can now Dollar Cost Average (DCA) bitcoin directly from their bank straight to self-custody! This first-of-its-kind product is the safest way to buy bitcoin on a schedule. We call it Recurring Buy.
When you set up a Recurring Buy, we handle the entire buying process for you. The journey from dollars in your bank to bitcoin in self-custody is seamless and eliminates the risk of having money sit in a balance at a bitcoin exchange.
Bitcoin Well will automatically pull dollars from your bank, convert them to bitcoin and send your (real) bitcoin directly to your personal wallet. All Recurring Buy transactions have no added fees and we also pay your miner fee. We apply our standard 1.2% spread with no other fees. Your path to financial independence just got automated! 🗓️🤖
To set up your bitcoin Recurring Buy, go to the Buy bitcoin page and set your purchase size, wallet destination and purchase frequency. That’s it! Watch your self-custody bitcoin wallet fill up with bitcoin. \ \ Below are detailed instructions on how to DCA bitcoin to your personal bitcoin wallet; automatically and on your schedule.
Set your transaction details
Go to your Buy bitcoin page where you’ll see four options to set your bitcoin Recurring Buy: Amount, Source, Destination and Frequency.
You can set up to five unique Recurring Buys. This enables you to buy different amounts of bitcoin on different time frames concurrently, all while being sent directly to self-custody for free 🤯
\ Amount: Select the amount of dollars you want to convert into bitcoin. \ \ Source: The bank to pull dollars.\ \ Destination: Your personal bitcoin wallet. Bitcoin Well automatically converts incoming dollars to bitcoin immediately when they are received. Your bitcoin will be automatically batched and sent to you for free.
Frequency: Your purchase frequency is set to ‘One time’ by default so you can smash buy.
You can set your payment frequency to weekly, biweekly or monthly. When setting your frequency, choose the start date: you can select “Today” or navigate the calendar to choose a later start date.
\ Once you’ve set up your Recurring Buy, select “Review” and then “Confirm” to activate your bitcoin Recurring Buy. The best bitcoin Recurring Buy in the USA is here 🐐
Pausing, cancelling or changing your Recurring Buy
\ You can easily pause or cancel any of your Recurring Buys from the Buy bitcoin page. All of your Recurring Buys will be shown on the right-hand side of your Buy bitcoin page on desktop or at the bottom of your Buy bitcoin page on mobile. \ \ To pause a Recurring Buy, click the pause button within the Recurring Buy preview in your Buy bitcoin page. Similarly, to cancel a Recurring Buy, click the ‘Cancel’ button within the Recurring Buy preview. \ \ To replace an active Recurring Buy, simply cancel your active Recurring Buy as described above and then set up a new Recurring Buy with your new desired amount and frequency. For example: you want to cancel an existing biweekly $200 Recurring Buy with a weekly $100 Recurring Buy. Cancel the existing biweekly $200 Recurring buy, then set up a new weekly $100 Recurring Buy as described in Set your transaction details.
\ As always, your bitcoin is automatically purchased at the current market rate when your dollars arrive. Additionally, your bitcoin will be batched and sent out on the blockchain for free by default.
Earn sats from your bitcoin transactions
\ Bitcoin Well is also the best place in the world to earn bitcoin. When you earn points in your Bitcoin Well account, you gain the opportunity to play the Bitcoin (Wishing) Well, where you win sats with every play.
The best part? We send bitcoin that you win straight to your personal wallet via the Lightning Network ⚡
Oh yeah, did we mention you can win 1,000,000 sats? If you're an active Bitcoin Well customer, there is a chance you've earned a pile of points. The more you use your account for buying, selling or spending bitcoin - the more points you’ll earn! Log in to your Bitcoin Well account and check your point balance.
About Bitcoin Well
\ Bitcoin Well exists to enable independence. We do this by coupling the convenience of modern banking, with the benefits of bitcoin. In other words, we make it easy to use bitcoin with self-custody.
-
@ 5b0183ab:a114563e
2025-03-06 17:38:10What Is Dark Nostr?
Dark Nostr can be described as the unintended adverse effects that arise from creating systems designed to resist censorship and promote freedom. These systems often rely on algorithms and micropayments to function, but their very design can inadvertently spawn phenomena that are unpredictable, uncontrollable, and sometimes downright weird.
Think of it as the Yin to the Yang of decentralized freedom—a necessary shadow cast by the bright ideals of liberation. While freedom protocols aim to empower individuals, they also open the door to consequences that aren’t always sunshine and rainbows.
An Emergent Phenomenon
The fascinating thing about Dark Nostr is its emergent nature. This means it’s not something you can fully define or predict ahead of time; instead, it arises organically as decentralized systems are implemented and evolve. Like watching clouds form shapes in the sky, GM miners panhandle for sats or shower girls in the global feed, you can only observe it as it happens—and even then, its contours remain elusive.
Emergent phenomena are tricky beasts. While simplicity is at the core of the protocol layer darkness is born on the edge where complexity thrives—where individual components interact in ways that produce unpredictable outcomes. In this case, Dark Nostr encapsulates everything from algorithmic quirks and micropayment dynamics to unforeseen social consequences within decentralized ecosystems.
Studying Dark Nostr: Memes as Cultural Artifacts
Here’s where things get anthropologically juicy: much of what we know about Dark Nostr comes not from academic papers or technical manuals but from memes. Yes, memes—the internet’s favorite medium for cultural commentary—have become a lens through which this phenomenon is being observed and studied.
Memes act as modern-day hieroglyphs, distilling complex ideas into bite-sized cultural artifacts that reflect collective sentiment. When communities encounter something as nebulous as Dark Nostr, they turn to humor and symbolism to make sense of it. In doing so, they create a shared narrative—a way to grapple with the shadow side of decentralization without losing sight of its promise.
Why Does It Matter?
Dark Nostr isn’t just an abstract concept for philosophers or tech enthusiasts—it’s a reminder that every innovation comes with trade-offs. While decentralized systems aim to empower individuals by resisting censorship and central control, they also carry risks that must be acknowledged:
- Algorithmic Chaos: Algorithms designed for freedom might amplify harmful content or create echo chambers.
- Micropayment Pitfalls: Financial incentives could lead to exploitation or manipulation within these systems.
- Social Dynamics: The lack of centralized control might enable bad actors or foster unforeseen societal shifts.Understanding Dark Nostr is crucial for anyone involved in building or using decentralized technologies. It challenges us to balance freedom with responsibility and reminds us that even the most well-intentioned systems have their shadow side.
Conclusion: Embracing the Shadow
Dark Nostr is more than just a cautionary tale—it’s a fascinating glimpse into the complexities of human interaction with technology. As an emergent phenomenon, it invites us to remain vigilant and adaptive as we navigate the uncharted waters of decentralization.
By studying its manifestations through cultural artifacts like memes and engaging in thoughtful reflection, we can better prepare for both its opportunities and risks. After all, every great innovation needs its shadow—it’s what makes progress real, messy, and human.
So here we stand before Dark Nostr: may we study it wisely, meme it relentlessly, and learn from its lessons as we build the future together.
Stay Vigilent Nostr.....
-
@ 4925ea33:025410d8
2025-03-06 15:37:04Os óleos essenciais são os principais ativos terapêuticos da Aromaterapia. No entanto, assim como qualquer substância que aplicamos na pele, inalamos ou ingerimos, eles podem causar reações alérgicas. Esse risco é ainda maior porque os óleos essenciais contêm compostos altamente concentrados, alguns dos quais possuem grande potencial alergênico. Por isso, é fundamental conhecer bem os óleos essenciais e entender seus riscos antes de utilizá-los.
Entendendo os riscos dos óleos essenciais
Embora sejam naturais, os óleos essenciais são altamente concentrados e podem provocar irritações ou alergias em algumas pessoas. Cada óleo contém diferentes componentes químicos, e é essencial compreender sua toxicidade para um uso seguro.
Podemos dividir os principais componentes químicos dos óleos essenciais em dois grandes grupos:
- Aromáticos ou fenóis
- Terpênicos
Além desses, existem outras substâncias que, apesar de terem propriedades terapêuticas, também podem apresentar riscos, como: lactonas, cumarinas (responsáveis pela fototoxicidade), ftalidas, compostos nitrogenados e compostos sulfurados.
A toxicidade de um óleo essencial depende da concentração dessas substâncias e do método de extração. Por exemplo, óleos obtidos pelo método de prensagem a frio preservam melhor seus componentes químicos, tornando-se mais potentes terapeuticamente, mas também mais propensos a causar reações adversas.
Os principais riscos dos óleos essenciais incluem:
✔️ Fotossensibilização (aumenta a sensibilidade da pele ao sol) ✔️ Efeito cáustico (pode causar queimaduras químicas) ✔️ Irritação na pele e nas mucosas ✔️ Reações alérgicas ✔️ Nefrotoxicidade (toxicidade para os rins) ✔️ Hepatotoxicidade (toxicidade para o fígado) ✔️ Neurotoxicidade (efeitos no sistema nervoso)
Diante desses riscos, é essencial contar com a orientação de um profissional e sempre realizar um teste de sensibilidade antes de usar qualquer óleo essencial.
Como fazer o teste de sensibilidade?
O teste de sensibilidade deve ser feito em áreas mais sensíveis da pele, como a dobra do cotovelo ou atrás da orelha – sendo a dobra do cotovelo a opção mais segura.
Passo a passo: Diluir o óleo essencial: misture 1 ou 2 gotas do óleo essencial em 5 mL de óleo carreador (ou siga a proporção de 1 gota de óleo essencial para 5 gotas de carreador). Aplicar na pele: passe a mistura na região escolhida. Observar por 24 horas: caso surjam vermelhidão, coceira ou irritação, é importante avaliar a gravidade da reação com um profissional antes de prosseguir com o uso. Mesmo em casos de reações leves, pode ser possível utilizar o óleo essencial com uma diluição maior. Nesses casos, o aromaterapeuta pode ajustar a formulação conforme tabelas específicas para pessoas sensíveis.
Dicas para um uso seguro dos óleos essenciais
✅ Nunca use óleos essenciais puros na pele. Sempre dilua em um óleo carreador adequado, pois ele transporta os ativos sem alterar suas propriedades e pode até potencializar os efeitos terapêuticos. ✅ Atenção à inalação! Ajuste o número de gotas no difusor e o tempo de exposição. No início do tratamento, prefira difusões curtas (até 30 minutos). ✅ Atenção às diluições! As proporções variam conforme o público:
Crianças e pessoas sensíveis: diluição máxima de 1% de óleo essencial na fórmula. Adultos saudáveis: diluição entre 2% e 3%.
Se você tem dúvidas ou quer saber como a Aromaterapia pode ajudar no seu dia a dia, me mande uma mensagem! Será um prazer te ajudar a usar os óleos essenciais com segurança. 😊✨
-
@ 611021ea:089a7d0f
2025-03-06 15:33:35In today's world, most running apps function just like Facebook—they track your runs, collect your personal data, and monetize your activity by selling insights to third parties. You are the product. But what if there was a way to track your running stats without sacrificing your privacy? Enter Runstr, the first running app built on the Nostr protocol.
A Running App That Respects Your Privacy
Unlike traditional fitness apps that harvest your data, Runstr leverages Nostr, a decentralized protocol that ensures your running stats remain under your control. This means you can log your runs, measure your performance, and improve your fitness without exposing your data to corporations, advertisers, or big tech.
From PWA to Android: Improving the Experience
We started with a Progressive Web App (PWA) as a proof of concept. However, we quickly ran into challenges with tracking run stats when the screen was turned off. To overcome these limitations, we pivoted to building a dedicated Android app that allows for better functionality and seamless background tracking. The response has been great so far, with early adopters loving the enhanced features and user experience.
Features & Integrations
Runstr is designed to be a powerful, yet lightweight running companion. Some of the key features include:
- Accurate run tracking: Distance, time, pace, and more
- Wavlake integration: Listen to your favorite tracks while running without switching apps
- Zero data harvesting: No third-party tracking, no selling your information
Recognition & Roadmap
We recently presented Runstr to PlebLab, and they loved the concept! They’ve offered mentorship and promotion support to help us scale. Looking ahead, here’s what’s coming in the next quarter:
- Running events & team events
- Personal goals & performance tracking
- Advanced statistics dashboard
- Local running clubs
- Runstr branding strategy for the app & running merchandise
Additionally, Runstr LLC is now an official business entity, marking a major milestone in our journey.
Nosfabrica - SALUD Decentralized Health App Development Challenge
We’ve entered the Nosfabrica - SALUD Decentralized Health App Development Challenge, whose mission is to develop an ecosystem of open-source tools built on Nostr and Bitcoin to decentralize healthcare, improve health, and address challenges in healthcare access, data portability, and overall health outcomes. Currently, the total prize pool is 0.12 BTC, and all participating projects can be found on the Kanbanstr board.
Fundraising & How You Can Support
To accelerate our development and bring Runstr to the next level, we are raising 0.1 BTC to fund design, branding, and development. Our goal is to launch the official Runstr app on zap.store by the end of May.
If you’d like to support this vision, you can:
- Download the app, take it for a run, and share your feedback on Nostr using the hashtag #runstr.
- Contribute to our fundraising via Geyser Fund.
Together, we can build the ultimate privacy-first running app. Join us and let’s run free! 🏃♂️⚡
-
@ 6e0ea5d6:0327f353
2025-03-06 15:32:33Ascolta bene!
Absorb from suffering the lessons that joy would never dare to offer you.
Davvero, all strong men are truly tested only when everything falls apart. It is easy to feel good and motivated on happy days. But in life's great adversities, we discover whether we can truly withstand what our optimism conveniently sweeps under the rug.
When you are dragged by powerful currents, regretting diving into deep waters is useless. The only path is to fight with strong strokes to avoid drowning and cling to the first rock or log that appears on the riverbank to survive. Likewise, my friend, your regrets and remorse are like concrete weights tied to your feet, dragging you deeper into despair.
Which man has never tormented himself thinking, "What if I had done things differently?" The failure of your decisions must be confronted with all your strength. Do not lament what you could have done or failed to do—focus your mind on fixing what is still within your control. This is not about motivation; it is about survival. A wound, once healed, becomes a scar. A mistake, once learned from, becomes a valuable lesson.
Anguish, sadness, and frustration are anchors that paralyze and offer no benefit. You must not stop your journey just because your shoes have worn out. You cannot bury your will to win simply because of the defeats along the way. Nothing will ever be easy—it never was. Anyone who says otherwise is a cunning liar!
Infatti, if there is one piece of advice I can give to each of you, it is this: never allow yourself to succumb when everything collapses, and your plans slip through your fingers.
Thank you for reading, my friend!
If this message resonated with you, consider leaving your "🥃" as a token of appreciation.
A toast to our family!
-
@ f1989a96:bcaaf2c1
2025-03-06 14:49:57Good morning, readers!
In Nicaragua, the regime is increasingly cracking down on civil society, imposing new financial regulations on non-governmental organizations (NGOs) that require them to disclose donors and report all financial transactions — further restricting their ability to operate independently. Meanwhile, in Iraq, the central bank governor announced plans to introduce a central bank digital currency (CBDC) to replace cash in circulation. CBDCs are a mechanism for using digital currencies to centralize financial control.
In freedom tech news, Alby Go, a mobile Bitcoin Lightning wallet, added support for Pick n Pay QR codes, making it easier for South Africans to pay with Bitcoin at one of the country’s largest retailers. Additionally, Bitcoin Safe, an open-source Bitcoin wallet designed to simplify self-custody, introduced support for Burmese and Korean Languages, making the wallet more accessible to activists, dissidents, and individuals in these regions.
We end with a new discussion from 21st Capital, where Alex Gladstein, Chief Strategy Officer at HRF, joins Ziya Sadr, an Iranian activist and Bitcoin educator, to explore Bitcoin’s role in fighting financial repression and advancing global freedom. Sadr, who was detained by the Iranian regime during the Mahsa Amini protests, shares a sobering account of authoritarian control and the ways Bitcoin can help alleviate these struggles.
Now, let’s get right to it!
Subscribe Here
GLOBAL NEWS
Nicaragua | Increases Financial Surveillance of NGOs
Nicaragua’s dictator, Daniel Ortega, intensified his crackdown on civil society with two new regulations that significantly increase the Ministry of the Interior’s (MINT) authority over national and foreign NGOs. The new regulations require NGOs to submit financial documentation, disclose their donors, and report all financial transactions. Using this information, authorities can now classify organizations as “threats,” conduct surprise inspections, impose sanctions, seize assets, and force closure. These regulations, framed as efforts to combat “digital terrorism,” intensify state surveillance and control and are a continuation of the regime’s systematic use of financial repression to silence dissent. This year alone, Ortega shut down 15 NGOs, and since 2021, he has closed over 5,600.
El Salvador | IMF Approves 1.4 Billion Loan With Further Restrictions
The International Monetary Fund (IMF) has officially approved its $1.4 billion loan to El Salvador while reinforcing even stricter limits on Bitcoin. This comes after last month’s legal reforms that made Bitcoin acceptance voluntary and prohibited its use for tax payments. The finalized deal, which grants an immediate $113 million disbursement, confines “government engagement in Bitcoin-related economic activities, as well as government transactions in and purchases of Bitcoin.” Despite these constraints, President Bukele has continued to flaunt Bitcoin purchases on social media, leaving many questions unanswered. Where does this bitcoin come from? Who controls the wallets? The lack of transparency remains.
Iraq | Issuing CBDC to Replace Cash
Iraq’s central bank governor, Ali Al-Allaq, announced that “the Iraqi central bank is now moving to create its own digital currency which will gradually replace paper notes.” Al-Allaq highlighted that this move aligns with broader “radical” changes in the global financial system. This news comes after Iraq banned all digital assets in 2017, citing concerns over financial crime and terrorism. Yet, its embrace of a CBDC over decentralized currencies like Bitcoin highlights a familiar pattern. China, Nigeria, and Russia have also pushed for CBDCs while restricting Bitcoin. Evidently, authoritarian regimes prefer financial control to remain in their own hands rather than risk empowering the public.
Nigeria | Frees Tigran Gambaryan in Exchange for Greater Financial Surveillance
In October 2024, Nigeria released Tigran Gambaryan, a former Binance executive accused of money laundering and contributing to the naira’s devaluation — though, in reality, he was a scapegoat for the regime’s economic mismanagement. According to The Rage, his release was secured through a deal with the US to help Nigeria prosecute “cryptocurrency and financial crimes.” Soon after, the two countries announced the creation of a “Bilateral Liaison Group on Illicit Finance and Cryptocurrencies” to expand Nigeria’s surveillance capabilities and “pursue cybercrime investigations and prosecutions.” Gambaryan, who described his prison conditions as “torture,” now faces an unsettling reality: his freedom may have come at the cost of strengthening an authoritarian regime notorious for its financial repression.
Turkey | X Blocks Accounts of Three Journalists at Regimes Request
X recently blocked the accounts of three Kurdish journalists in Turkey — Abdurrahman Gök, Oktay Candemir, and Ruşen Takva — following a Turkish government request citing concerns over “national security.” The journalists, known for exposing government corruption and reporting on Kurdish issues, now join a growing list of silenced Turkish reporters. This comes as Turkey intensifies its crackdown on independent media through arrests, legal pressure, and censorship. With 95% of media outlets in Turkey complying with the regime, social platforms remain one of the last places for free expression. Yet, as X and other platforms increasingly comply with authoritarian demands, access to independent information shrinks. This escalating repression underscores the need for censorship-resistant alternatives like nostr, where government pressure or corporate compliance cannot easily suppress speech.
__________
Webinar Series for Nonprofits: Become Unstoppable
HRF will host a free, three-day webinar from March 17–19, teaching human rights defenders and nonprofits how to use Bitcoin to counter state censorship and confiscation. Sessions run daily from 10:30 a.m. to 12:00 p.m. EDT and are beginner-friendly. The webinar will be led by Anna Chekhovich, HRF’s Bitcoin nonprofit adoption lead and financial manager at Alexei Navalny’s Anti-Corruption Foundation.
SXSW | The Human Rights Risks of Central Bank Digital Currencies (CBDCs)
Join HRF at SXSW 2025 in Austin from March 7–13 to explore how CBDCs threaten financial freedom. Experts Roger Huang, Charlene Fadirepo, and Nick Anthony will discuss how authoritarian regimes use CBDCs for surveillance and control. Attendees can also visit HRF’s CBDC Tracker booth to explore an interactive map of CBDC developments worldwide.
Get your tickets
__________
BITCOIN AND FREEDOM TECH NEWS
Nostr Wallet Connect | Introduces Pull Request for On-Chain Send and Receive
Nostr Wallet Connect (NWC), a protocol that connects Bitcoin Lightning wallets and applications, is developing a potential upgrade: support for on-chain Bitcoin transactions. Currently, NWC is designed for Lightning transactions. This new update would allow users to also send and receive on-chain Bitcoin transactions, which are slower and less private, but more secure with higher send and receive limits. This means users and apps can more easily move funds between Lightning and regular Bitcoin wallets, making NWC more practical and flexible. This upgrade enhances financial resilience for dissidents and activists by providing a more secure and flexible way to store and move Bitcoin.
Bitcoin Safe | Adds Support for Burmese and Korean Languages
Bitcoin Safe, an open-source Bitcoin wallet designed to make self-custody simple — even for non-technical users — introduced support for Burmese and Korean Languages. This support makes the wallet more accessible to activists, dissidents, and individuals in these regions, empowering them with uncensorable and unseizable money. Bitcoin Safe guides users through the entire setup process, offering step-by-step instructions for single-signature wallets (where one private key controls your Bitcoin) and multisignature wallets (which require multiple private keys for added security). By breaking down barriers to Bitcoin self-custody, Bitcoin Safe is making financial freedom accessible to those who need it most.
Frostr | Turn Your Nostr Private Key into a Rotatable Multisig
Frostr is an experimental new tool that adds a layer of security to a user’s nostr private key by splitting it into multiple parts. Instead of using a single key, Frostr divides the key into shares, requiring a subset of these shares to sign messages on nostr. This offers two key benefits. First, greater security; even if one share is lost or stolen, a user’s full key remains secret and in their control. Second, flexible key rotation; users can replace or update shares of the key without changing their digital identity. This is an important advancement for activists, journalists, and human rights defenders. Many authoritarian regimes track, censor, and punish those who speak freely. If an activist’s private key is compromised, their digital identity and safety could be at risk. Frostr removes this single point of failure and empowers users to communicate freely, securely, and flexibly, even in hostile environments.
Alby Go | Integrates Pick n Pay QRs for Bitcoin Payments in South Africa
Alby Go, a mobile Bitcoin Lightning wallet, added support for Pick n Pay QR codes, making it easier for South Africans to pay with Bitcoin at one of the country’s largest retailers. The update also integrates BTC map, offering users a detailed directory of merchants that accept Bitcoin. These changes make everyday Bitcoin payments more practical, expand access to businesses that accept Bitcoin, and give South Africans an alternative to the country’s unstable financial system and currency.
bitcoin++ | Announces Freedom and Privacy Edition
bitcoin++, a bitcoin-only developer conference series, is set to return on August 7-8, 2025, with a dedicated focus on freedom and privacy. Taking place in Riga, Latvia the event will bring together privacy advocates, developers, and freedom tech enthusiasts to explore the latest developments in privacy tech, censorship resistance, and open-source development on Bitcoin. Learn more and get your tickets here.
RECOMMENDED CONTENT
Bitcoin’s Potential to Revolutionize Freedom with Alex Gladstein
In this episode of 21st Capital, Alex Gladstein, Chief Strategy Officer at HRF, sits down with Ziya Sadr, an Iranian activist and Bitcoin educator, to discuss Bitcoin’s role in fighting financial repression and advancing global freedom. Ziya helped build Iran’s Farsi-speaking Bitcoin community, created educational content on privacy, and contributed to open-source translation projects. He was later detained by the Iranian regime during the Mahsa Amini protests. During the discussion, Gladstein highlights stories of individuals escaping authoritarian control, accessing global markets, and securing their wealth through Bitcoin. Watch here to learn how Bitcoin is a tool for human rights.
If this article was forwarded to you and you enjoyed reading it, please consider subscribing to the Financial Freedom Report here.
Support the newsletter by donating bitcoin to HRF’s Financial Freedom program via BTCPay.\ Want to contribute to the newsletter? Submit tips, stories, news, and ideas by emailing us at ffreport @ hrf.org
The Bitcoin Development Fund (BDF) is accepting grant proposals on an ongoing basis. The Bitcoin Development Fund is looking to support Bitcoin developers, community builders, and educators. Submit proposals here.
-
@ cbaa0c82:e9313245
2025-03-06 13:45:58TheWholeGrain - #February2025
Ah, February! The month of love! Well, it is if Valentine's Day and a few slices of bread have anything to say about it! All of this month's Sunday Singles all revolved around this theme. How can we portray to folks our love for, well, Love! We even changed our logo on Valentine's Day this year and released the art for it as a note using the NOSTR protocol.
The adventure known as Questline released two more pages of its story ending the month with readers wondering how will the gang deal with their first adversary.
As usual a piece of Concept Art and Bitcoin Art were released. However, some will notice that the art work was released with a new framing standard which we plan to continue.
Last of all, we started releasing merchandise with an exclusive bundle inspired by this month's Toast's Comic Collection. You'll see more information about this near the end of this issue of The Whole Grain.
Sunday Singles - February 2025 2025-02-02 | Sunday Single 78 Title: Cupid If you don’t watch out, you might just get struck by Cupid’s arrow! https://i.nostr.build/Op8Snf3PjwJvzzK8.png
2025-02-09 | Sunday Single 79 Title: Ace of Hearts Will you be an Ace this Valentine’s Day? https://i.nostr.build/X5fEXpE9HJIR2QCH.png
2025-02-16 | Sunday Single 80 Title: Three of Hearts Talk about lucky! Here are three hearts worth having! https://i.nostr.build/5JfWe3GggiPEEULv.png
2025-02-23 | Sunday Single 81 Title: Chemistry For the past month our top scientist has been studying chemistry. https://i.nostr.build/VS4GN0D7vH7cQUyv.png
Adventure Series: Questline Bread, Toast, and End-Piece left a recently burned down village behind them. As they continue forward pondering what they have recently seen they are about to be surprised by something big...
Writer: Daniel David (dan 🍞) Artist: Dakota Jernigan (The Bitcoin Painter)
2025-02-11 | Questline 003 - Time to Move Forward After some time investigating the recently torched village our heroes continue on the path. Toast is happy to be leaving it behind them, but Bread continues to wonder what could have possibly caused such immense damage... and where were all the villagers? https://i.nostr.build/gh7OlC14dUCrzorW.png
2025-02-25 | Questline 004 - Winged Predator The village and its dark clouds can no longer be seen behind our heroes. However, Bread still cannot stop pondering the village, and what could have happened to it. Suddenly, within a span of few seconds, Toast notices their three shadows engrossed by a much larger one and hears what is approaching behind them. https://i.nostr.build/SlAxb3eRzptMe3il.png
Other Content Released in February 2025 2025-02-05 | Toast's Comic Collection Title: Batbread #10 I am... vengeance. I am... the night.
I am... Batbread. https://i.nostr.build/Townax6XYzlZbKpa.png2025-02-12 | Concept Art Title: Second Toast Sketch A second sketch of the character Toast. Remade and cleaned up. https://i.nostr.build/zcUuetaZDGEqjrqU.png
2025-02-14 | Leftover Title: Valentine's Day 2025 Happy Valentine's Day! 💘
We know that we say this a lot, but... 🍞 ♥️ U https://i.nostr.build/12MUzD8uVwfDBY0t.png2025-02-19 | Bitcoin Art Title: The Miner Block Height: 884458 End-Piece is the miner of the group. Someone has to do the hard work! https://i.nostr.build/03EYvG3owN6TeRki.png
Merchandise Announcement We want to begin selling some merchandise. After the success of the exclusive metal cut-outs sold at Nostr Valley 2024 we decided to sell something similar. Bread and Toast made an announcement this past month shortly after this month's Toast's Comic Collection release with the Batbread Bundle (Limited Supply). https://i.nostr.build/PNt4kyEJkaCe7q1K.png
If you are interested in purchasing he Batbread Bundle contact us by email at store@breadandtoast.com with "Batbread" in the subject line! There are only 21 in total available. It'll be first come, first serve!
Thanks for checking out the sixth issue of The Whole Grain. The Whole Grain is released on the first of every month and covers all of the content released by Bread and Toast in the previous month. For all Bread and Toast content visit BreadandToast.com!
🍞 ♥️ U Bread, Toast, and End-Piece
BreadandToast #SundaySingle #Questline #ToastsComicCollection #ConceptArt #BitcoinArt #Bread #Toast #EndPiece #Artstr #Comic #Cartoon #NostrOnly #Valentines #Love #🖼️
List of nPubs Mentioned: The Bitcoin Painter: npub1tx5ccpregnm9afq0xaj42hh93xl4qd3lfa7u74v5cdvyhwcnlanqplhd8g
dan 🍞: npub16e3vzr7dk2uepjcnl85nfare3kdapxge08gr42s99n9kg7xs8xhs90y9v6
-
@ d830ee7b:4e61cd62
2025-03-06 12:41:15สายลมพัดกระโชกแรง แทรกซึมผ่านแนวต้นไม้สูงใหญ่ในป่าทึบ รัตติกาลโอบล้อมทุกสิ่งไว้ในความมืดมิด ร่างของเอี้ยก้วยเคลื่อนผ่านเส้นทางขรุขระ ย่ำเดินไปบนโคลนที่เปียกชื้นจากฝนที่ตกพรำมาทั้งวัน
ทุกย่างก้าวหนักอึ้ง... ไม่ใช่เพราะความเหนื่อยล้าของร่างกาย แต่เป็นภาระของหัวใจที่แบกรับไว้—มันหนักเสียยิ่งกว่าภูเขาหลายลูก
เซียวเหล่งนึ่ง... จากไปแล้ว
ราวกับสวรรค์เล่นตลก เหมือนโชคชะตากำลังทดสอบจิตวิญญาณของเขา ทุกสิ่งที่เขาต่อสู้เพื่อมัน ทุกสิ่งที่เขาหวงแหน... กลับถูกพรากไปอย่างโหดร้าย ไม่มีสิ่งใดเจ็บปวดมากไปกว่าการยืนอยู่เพียงลำพังในโลกกว้างใหญ่ที่ไร้เงาของนาง
ไม่นานก่อนหน้านี้ เอี้ยก้วยและเซียวเหล่งนึ่งยังคงอยู่ด้วยกันภายใน หุบเขาสุสานโบราณ—สถานที่ที่ทั้งสองเคยให้คำมั่นว่าจะครองรักกันไปชั่วชีวิต แต่แล้วโชคชะตาก็พลิกผันอย่างโหดร้าย
เซียวเหล่งนึ่งเชื่อว่า ตนเองถูกวางยาพิษร้ายแรง นางไม่ต้องการให้เอี้ยก้วยต้องทนทุกข์ทรมานกับการเห็นนางจากไปช้าๆ—นางจึงเลือกที่จะทิ้งเขาไว้
“อย่าตามหาข้า...”
เสียงของนางยังคงก้องอยู่ในใจเขา แม้จะเป็นเพียงกระซิบแผ่วเบาในคืนฝนตก แต่สำหรับเอี้ยก้วย มันราวกับเสียงฟ้าผ่าที่ทำลายทุกสิ่ง
เขาเคยสาบานว่าจะอยู่เคียงข้างนาง แต่สุดท้ายนางกลับเลือกหนทางนี้...
ฝนยังคงโปรยปราย สายลมยังคงโหมพัด แต่ในใจของเอี้ยก้วย กลับเงียบงันยิ่งกว่าทะเลทรายอันว่างเปล่า
ตั้งแต่วันที่เซียวเหล่งนึ่งจากไป เขาออกเดินทางโดยไร้จุดหมาย เท้าของเขาพาเขาไปข้างหน้าอย่างไร้ทิศทาง แม้แต่ตัวเขาเองก็ไม่รู้ว่ากำลังจะไปที่ใด
หรือบางที... อาจเป็นเพราะเขาไม่สนใจอีกแล้ว
เขาเดินฝ่าภูเขา ป่าทึบ ลัดเลาะเส้นทางอันเปลี่ยวร้างของยุทธภพ แววตาของเขามิได้เต็มไปด้วยความโกรธแค้นอีกต่อไป แต่มันกลับกลายเป็นความว่างเปล่า ราวกับวิหคที่บินหลงทางในฟากฟ้าอันไร้ที่สิ้นสุด
เขาไม่ได้มุ่งหน้ากลับไปที่สุสานโบราณ เพราะเขารู้ว่า—ต่อให้กลับไป ก็จะไม่พบสิ่งใดอีกแล้ว
เสียงฟ้าคำรามก้องกังวาน สายฟ้าผ่าลงมาส่องแสงวาบผ่านม่านเมฆดำสนิท ลำแสงสีขาวแหวกทะลุเงาของต้นไม้สูงใหญ่ เผยให้เห็นร่างของเอี้ยก้วยที่ยังคงยืนอยู่กลางพายุ
เสื้อคลุมของเขาเปียกโชกจากสายฝน น้ำฝนไหลซึมผ่านผิวกาย แต่อากาศหนาวเย็นกลับไม่อาจทำให้เขาสั่นสะท้านได้ เพราะจิตใจของเขาเย็นยะเยือกยิ่งกว่าสายลมที่พัดผ่าน
“ทำไมกัน...”
เสียงของเขาถูกกลืนหายไปในเสียงพายุ เอี้ยก้วยกำมือแน่น รู้สึกถึงอารมณ์ที่ปะทุขึ้นภายใน—มันเป็นทั้งความเจ็บปวด ความโกรธ ความสับสน และความสิ้นหวัง
แต่ทันใดนั้นเอง...
เขาสัมผัสได้ถึงบางสิ่ง
มันไม่ใช่เพียงเสียงพายุ หรือเสียงใบไม้ไหวในสายลม—แต่เป็นสายตา... สายตาของใครบางคนกำลังจ้องมองเขาอยู่
ร่างของเอี้ยก้วยตวัดสายตามองไปรอบตัว ลมหายใจของเขาติดขัด ฝนที่ตกหนักบดบังทุกสิ่งรอบกาย แต่มันมิอาจบดบังสัมผัสของเขาได้
จากมุมหนึ่งของม่านฝน...
เงาหนึ่งขยับเข้ามาอย่างแผ่วเบา
แม้ไม่มีเสียงฝีเท้า แต่พลังที่เปล่งออกมากลับหนักหน่วง ยิ่งกว่าคลื่นของมหาสมุทร
เสียงหนึ่งดังขึ้น แทรกผ่านสายฝน...
"ดูเหมือนเจ้ายังไม่เข้าใจสายฝนดีพอ..."
มันไม่ดังนักแต่กลับทะลวงเข้าสู่หัวใจ เอี้ยก้วยหันขวับ ดวงตาจ้องเขม็งผ่านม่านน้ำ
แล้วเขาก็เห็น...
ชายผู้นั้นยืนอยู่กลางสายฝน แต่เสื้อคลุมขาวของเขากลับมิได้เปียกโชกแม้แต่น้อย ร่างสูงโปร่งแต่กลับแฝงไว้ด้วยพลังอันไม่อาจหยั่งถึง ดวงตาของเขาสงบนิ่งยิ่งกว่าน้ำในบึงลึก ทว่ากลับสะท้อนความลี้ลับดุจมหาสมุทร
“ข้าแซ่ JAKK นามว่า Goodday”
เสียงของเขาราบเรียบ แต่กลับทำให้หัวใจของเอี้ยก้วยเต้นแรงอย่างไม่รู้สาเหตุ มันไม่ใช่พลังข่มขู่ แต่เป็นแรงกดดันที่มาโดยธรรมชาติ ราวกับภูเขาสูงตระหง่านที่มิได้พยายามบดบังแสงอาทิตย์ แต่กลับบังมันไว้โดยสมบูรณ์
“เจ้าคือใครกันแน่?” เอี้ยก้วยเอ่ยถาม ดวงตาจ้องมองชายลึกลับตรงหน้า “เจ้ามีจุดประสงค์ใดถึงได้ปรากฏตัวต่อหน้าข้า?”
JAKK เพียงแค่ยิ้มบาง ๆ แต่ในดวงตานั้นกลับฉายแววที่ทำให้หัวใจของเอี้ยก้วยสั่นสะท้าน
“ข้าคือผู้เดินทางผ่าน เช่นเดียวกับสายฝนนี้”
เอี้ยก้วยขมวดคิ้ว คำพูดเหล่านั้นช่างคลุมเครือ ราวกับหยาดฝนที่ร่วงหล่นแต่กลับไร้รูปร่างจับต้อง
ทันใดนั้นเอง สายลมกระโชกแรงขึ้น ฝนที่เคยสาดกระหน่ำกลับเปลี่ยนทิศทาง หยาดน้ำที่ตกลงมากลางอากาศดูเหมือนจะหยุดนิ่ง ก่อนจะไหลวนตามแรงที่มองไม่เห็น ราวกับทั้งสายฝนนี้กำลังถูกควบคุม
ฟึ่บ!
เสี้ยววินาทีถัดมา เอี้ยก้วยสัมผัสได้ถึงแรงบางอย่างที่พุ่งผ่านใบหน้า ไม่ใช่ลม ไม่ใช่ฝน แต่มันคือบางสิ่งที่จับต้องไม่ได้!
เขาตวัดกระบี่ขึ้นอย่างฉับพลัน แต่กลับสัมผัสได้เพียงความว่างเปล่า พริบตานั้นเอง... ใบไม้ด้านหลังเขาถูกเฉือนขาดเป็นเส้นตรง!
เอี้ยก้วยเบิกตากว้าง "นี่มัน..."
JAKK เอียงศีรษะเล็กน้อย ดวงตาฉายแววของผู้ที่มองเห็นสิ่งที่ผู้อื่นมองไม่ออก
“ฝนสามารถทำให้ดินชุ่มชื้น หรือสามารถกัดเซาะภูเขาได้” เขากล่าวช้า ๆ “แต่เจ้ากลับปล่อยให้มันตกต้องโดยไร้ความหมาย”
เอี้ยก้วยกำกระบี่แน่น รู้สึกถึงความโกรธที่แล่นขึ้นมาในอก "เจ้าหมายความว่าอย่างไร?"
JAKK ไม่ตอบ แต่เพียงยื่นมือออกไป หยดน้ำฝนที่ปลายนิ้วของเขาค่อย ๆ ไหลรวมกันเป็นเส้นบางเบา ส่องประกายราวใยไหมในความมืด
"น้ำ... ไม่ได้แข็งแกร่งที่สุด"
"แต่มันไม่มีใครทำลายมันได้"
เอี้ยก้วยขมวดคิ้ว เขาไม่เข้าใจ... หรือบางที เขาอาจไม่อยากเข้าใจ
JAKK ปล่อยให้ความเงียบเข้าปกคลุมชั่วขณะ ก่อนจะกล่าวขึ้นด้วยเสียงแผ่วเบา แต่แหลมคมกว่ากระบี่ใด ๆ
"เจ้ากำลังเผชิญหน้ากับสายฝน... หรือเจ้ากำลังปล่อยให้มันกลืนกินเจ้า?"
คำถามที่ดูเหมือนไร้ความหมาย... กลับหนักหน่วงยิ่งกว่าสายฝนที่โหมกระหน่ำ เอี้ยก้วยรู้สึกถึงอะไรบางอย่างกำลังสั่นคลอนอยู่ในจิตใจของตนเอง
"ฝนเป็นเพียงฝน ข้าจะไปอยู่เหนือมันหรือถูกมันชะล้างได้อย่างไร?" เขาตอบโดยไม่ต้องคิด
JAKK ยิ้มเพียงเล็กน้อย ก่อนกล่าวคำที่ทำให้เอี้ยก้วยต้องนิ่งงัน
"เช่นนั้น เจ้าก็ไม่อาจเข้าใจสิ่งที่กำลังมองหา..."
สายฝนยังคงโปรยปราย ท้องฟ้ามืดครึ้มราวกับมหาสมุทรที่คว่ำลงสู่พื้นพิภพ ฟ้าคำรามก้อง ลำแสงสายฟ้าแหวกม่านเมฆดำสาดลงมาราวกับต้องการเปิดโปงความลึกลับที่ปกคลุมค่ำคืนนี้
เอี้ยก้วยยืนตระหง่านอยู่กลางลานหิน สายตาของเขามิได้จดจ้องสายฝนที่ซัดกระหน่ำร่างของเขาอีกต่อไป หากแต่จับจ้องอยู่ที่ชายตรงหน้า—บุรุษผู้เผยตนจากม่านฝน ร่างสูงสง่าในอาภรณ์ขาวสะอาดไร้รอยเปียก ดวงตาสงบนิ่งดังมหานทีอันลึกล้ำ
“เจ้ากำลังต้านฝน…” JAKK กล่าวเสียงเรียบ “แต่สายฝนนี้มิใช่ศัตรูของเจ้า”
เอี้ยก้วยสูดลมหายใจเข้าลึก กระชับกระบี่ในมือแน่น
“ข้ามิได้มาที่นี่เพื่อทดสอบความหมายของหยาดฝน” เสียงของเขาเด็ดเดี่ยว “แต่เพื่อพิสูจน์ว่าข้ายังยืนหยัดอยู่ได้ แม้สวรรค์จะทอดทิ้งข้า”
JAKK มิได้กล่าวตอบ แต่ปลายนิ้วของเขายื่นออกมาเพียงเล็กน้อย
ฟึ่บ!
สายฝนรอบตัว JAKK คล้ายหยุดนิ่งไปชั่วขณะ ก่อนจะรวมตัวกันเป็นเส้นสายโปร่งใสราวกับใยไหมสะท้อนแสงจันทร์
“ใยวารี”
เสียงกระซิบแผ่วเบาดังลอดออกจากริมฝีปากของ JAKK และในพริบตานั้นเอง เส้นสายเหล่านั้นก็แปรเปลี่ยนเป็นอาวุธแห่งธารา แหวกอากาศพุ่งเข้าหาเอี้ยก้วยด้วยความเร็วเหนือมนุษย์!
เคร้ง!
เอี้ยก้วยสะบัดกระบี่ปัดป้อง แต่บางสิ่งผิดปกติ เส้นใยน้ำมิได้ถูกเฉือนขาด กลับพันรอบคมกระบี่ราวกับเถาวัลย์ที่ไร้ตัวตน ร่างของเขาถูกดึงรั้งไปข้างหน้าโดยไม่รู้ตัว!
“อะไร!?”
ฟึ่บ!
เอี้ยก้วยตัดสินใจกระโจนขึ้นกลางอากาศ หมุนตัวเพื่อสะบัดใยวารีออกจากร่าง แต่ในขณะที่เขาลอยตัวกลางหาว ใยโปร่งใสเหล่านั้นกลับเคลื่อนตามมาอย่างลื่นไหล ปรับทิศทางเหมือนมันมีชีวิต!
JAKK มองภาพนั้นนิ่ง ๆ ดวงตาของเขาไร้แววเย้ยหยัน มีเพียงประกายแห่งการสังเกต
“สายน้ำไม่เคยยึดติด ไม่เคยต่อต้าน” JAKK กล่าวเรียบ ๆ “มันซึมซับทุกสิ่งอย่างไร้รูปร่าง เจ้ายังไม่เข้าใจสิ่งที่อยู่ตรงหน้า”
เอี้ยก้วยกัดฟันแน่น ฝ่ามือที่จับกระบี่เริ่มสั่นเล็กน้อย นี่มิใช่วิชาที่เขาเคยประมือมาก่อน…
“ถ้าเช่นนั้น ข้าจะทำให้มันแตกสลาย!”
กระบี่วิหคโบยบิน!
เอี้ยก้วยระเบิดพลังสุดกำลัง กวัดแกว่งกระบี่เป็นวงกว้าง ตวัดเป็นแนวสายลมกรรโชก!
ลำแสงแห่งกระบี่พุ่งตัดผ่านม่านฝน ปะทะเข้ากับใยวารีที่พุ่งมาอย่างแรง!
ฉัวะ!
สิ่งที่เกิดขึ้นหาใช่การแตกสลายของใยวารีไม่ เส้นใยเหล่านั้นกลับยืดหยุ่นและดูดซับแรงปะทะของกระบี่ ราวกับมันมิใช่ของแข็งหรือของเหลว แต่เป็นสภาวะที่อยู่เหนือขึ้นไป!
เคร้ง!
แรงสะท้อนทำให้เอี้ยก้วยเสียหลัก กระบี่ของเขาถูกดูดซับพลังไปในชั่วพริบตา ร่างของเขาถอยหลังไปหลายก้าว หัวใจเต้นแรง
“เป็นไปไม่ได้...”
JAKK ก้าวเข้ามาช้า ๆ สายตาไร้แววสมเพชหรือโอ้อวด มีเพียงความสงบเช่นผืนน้ำที่ไร้คลื่น
“พลังที่แข็งแกร่งที่สุด มิใช่พลังที่เผชิญหน้า” เขากล่าว “แต่คือพลังที่อยู่เหนือการเผชิญหน้า”
เอี้ยก้วยยังไม่เข้าใจ แต่จิตใจของเขาเริ่มหวั่นไหว
JAKK มองเขาเงียบ ๆ ก่อนจะพลิกมืออย่างแผ่วเบา
ฟึ่บ!
ใยวารีสายสุดท้ายพุ่งตรงเข้าหาร่างของเอี้ยก้วย!
เอี้ยก้วยสะบัดกระบี่ขึ้นสุดกำลังเพื่อป้องกัน แต่…
ครั้งนี้ เขารู้สึกว่า มันมิใช่สิ่งที่สามารถต้านทานได้ด้วยพลังเพียงอย่างเดียว
เขายังคงหอบหายใจหนัก สองมือกำกระบี่แน่น สายตาจับจ้องไปยังชายตรงหน้า—JAKK บุรุษผู้ควบคุมน้ำฝนได้ดั่งอวัยวะของตนเอง เขาเพียงยืนอยู่ตรงนั้น ดวงตาเรียบนิ่ง ไม่แสดงความเหนือกว่า แต่กลับเปล่งพลังลี้ลับราวกับสายน้ำในห้วงลึก
เอี้ยก้วยไม่เคยเจอศัตรูเช่นนี้มาก่อน
ทุกกระบวนท่าของเขาถูกทำให้ไร้ความหมาย ดุจพายุกระหน่ำใส่ธารน้ำ มันมิได้แตกหัก แต่มันกลืนกินและซึมซับทุกสิ่งที่เข้ามา
“ข้ายังไม่เข้าใจ…”
เสียงของเอี้ยก้วยแผ่วเบา แต่หนักแน่นในความสงสัย ดวงตาของเขายังคงคุกรุ่นด้วยไฟแห่งการต่อสู้ แต่ในแววตานั้น เริ่มฉายแววของบางสิ่งที่เปลี่ยนแปลง
JAKK พินิจเขาครู่หนึ่งก่อนกล่าวขึ้น “เจ้ายังมิอาจปล่อยให้สายน้ำไหลผ่านใจเจ้า”
เขายื่นมือออกไป หยดน้ำฝนที่ตกลงมากลางอากาศหยุดนิ่งชั่วขณะ ก่อนจะค่อย ๆ เคลื่อนไหว หมุนวนในอากาศดุจเส้นไหมโปร่งใส เอี้ยก้วยจ้องมองมัน หัวใจเต้นแรง
มันไร้รูปร่าง ไร้ขีดจำกัด…
เช่นนั้นข้าจะทำลายมันได้อย่างไร?
เอี้ยก้วยก้าวถอยหลังหนึ่งก้าว นี่เป็นครั้งแรกที่เขารู้สึกว่าไม่อาจพึ่งพากระบี่ของตนเองได้
“ข้าคิดว่าข้ารู้จักกระบี่ของข้าดีที่สุด แต่เหตุใดมันจึงไร้พลังต่อหน้าเจ้า?”
JAKK มิได้ตอบ แต่พลิกฝ่ามือเบา ๆ เส้นใยวารีที่ลอยอยู่กลางอากาศเริ่มขยับ เปลี่ยนเป็นรูปแบบใหม่ตลอดเวลา บางครั้งมันรวมกันเป็นหยดน้ำเดียว บางครั้งมันแตกออกเป็นเส้นสายมากมาย ไร้รูปแบบตายตัว
“แล้วเจ้าคิดว่าตนเองคืออะไร?” JAKK เอ่ยขึ้น
เอี้ยก้วยขมวดคิ้ว “ข้าเป็นข้า… เอี้ยก้วย”
JAKK ส่ายหน้า “หากเจ้ามีตัวตนเช่นนั้น เจ้าจะไม่มีวันเข้าใจวารี”
เอี้ยก้วยเม้มริมฝีปากแน่น นี่เป็นครั้งแรกที่เขารู้สึกว่าตัวเองถูกผลักให้ตกลงสู่ห้วงแห่งความเงียบ
เขาสูดลมหายใจเข้าลึก ก่อนจะค่อย ๆ หลับตาลง
สายฝนยังคงตกลงมา แต่บัดนี้ มันมิได้รู้สึกเหมือนดาบนับพันที่โหมกระหน่ำลงบนร่างของเขาอีกต่อไป
มันค่อย ๆ ซึมผ่านผิวหนัง คล้ายกับเขาเองก็เป็นส่วนหนึ่งของมัน
ปลายนิ้วของเขาขยับเพียงเล็กน้อย—และในวินาทีนั้น เขารู้สึกได้ถึงแรงสั่นสะเทือนบางอย่าง
เขาสัมผัสได้ถึงสายน้ำรอบตัว
แต่ก่อนที่เขาจะเข้าใจมันอย่างแท้จริง—
ฟึ่บ!
JAKK พลิกฝ่ามือเสี้ยววินาที เส้นใยวารีสะบัดวูบ ปลดปล่อยแรงกระแทกมหาศาล!
เอี้ยก้วยลืมตาขึ้น แต่คราวนี้ เขามิได้ต้านทานมัน
เขาเคลื่อนตัวไปกับมัน—
ร่างของเขาหลุดจากการจู่โจมได้อย่างฉิวเฉียด โดยที่มิได้ออกแรงฝืนเลยแม้แต่น้อย!
หยาดน้ำเย็นเฉียบโปรยปรายลงมาอย่างต่อเนื่อง สายลมพัดโหมรุนแรงพอจะถอนรากต้นไม้ แต่ภายในใจของเอี้ยก้วย กลับสงบนิ่งอย่างไม่เคยเป็นมาก่อน
เมื่อครู่... ร่างของเขาหลุดพ้นจากการจู่โจมของ "ใยวารี" โดยที่มิได้ต่อต้าน แต่มันไม่ใช่เพราะเขาเร็วขึ้น หรือแข็งแกร่งขึ้น
เขาเพียง ‘ปล่อยให้มันไหลไป’
ดวงตาของเขาเบิกกว้าง ความรู้สึกหนึ่งพลันแล่นผ่านจิตใจราวกับสายฟ้าที่ส่องลงบนมหาสมุทรอันมืดมิด
JAKK มองเขาอยู่ห่าง ๆ มุมปากของชายลึกลับผู้นี้ยกขึ้นเพียงเล็กน้อย แต่แฝงไว้ด้วยความพึงพอใจ
“เริ่มเข้าใจแล้วหรือไม่?”
เอี้ยก้วยกำกระบี่แน่น... แต่ครั้งนี้ มิใช่ด้วยความโกรธ มิใช่เพื่อจู่โจม มิใช่เพื่อพิสูจน์ตนเองต่อโชคชะตา แต่เพื่อสัมผัสถึงบางสิ่งที่เคยถูกซ่อนเร้นมาตลอดชีวิต
“ข้าเริ่มสัมผัสได้... แต่ข้ายังไม่เข้าใจ”
JAKK ยกมือขึ้น นิ้วชี้แตะกลางอากาศ—
ฟึ่บ!
หยดฝนที่โปรยปรายอยู่พลันรวมตัวกันกลางอากาศ หมุนวนเป็นเกลียว ก่อนจะยืดขยายออกเป็น กระบี่วารี—ใสกระจ่างประหนึ่งกระจก แต่มิใช่ของแข็ง มิใช่ของเหลว มันไร้ตัวตนและมีอยู่ในคราวเดียวกัน
“เจ้าจะต้องเรียนรู้ด้วยร่างกายของเจ้าเอง”
“มาเถิด เอี้ยก้วย”
เอี้ยก้วยมิใช่คนที่หวั่นเกรงต่อความท้าทาย เขาสูดลมหายใจเข้าลึก ก้าวขาขึ้นหน้าอย่างมั่นคง ดวงตาทอประกาย ครั้งนี้ เขาจะมิใช่ผู้ที่ปล่อยให้คลื่นซัดไปตามใจมันอีกต่อไป
เขาตวัดกระบี่ขึ้น—
ฟึ่บ!
JAKK เคลื่อนกาย กระบี่วารีของเขาโค้งงอ ปรับเปลี่ยนรูปทรงไปราวกับธารน้ำที่ไหลเวียน ไม่มีมุม ไม่มีองศา ไม่มีวิถีที่คาดเดาได้
เอี้ยก้วยตวัดกระบี่เข้าปะทะ—
เคร้ง!
ปลายกระบี่กระทบกัน แต่กลับมิได้มีเสียงกังวานของโลหะ กลับเป็นเสียงสายน้ำแตกกระจาย ก่อนจะรวมตัวกันใหม่ราวกับไม่เคยแปรเปลี่ยน
“กระบี่ของเจ้ามีขอบเขต” JAKK กล่าว “แต่วารี... ไร้ขอบเขต”
เอี้ยก้วยมิได้ตอบ แต่ร่างของเขาเริ่มเคลื่อนไหวช้าลง สายตามิได้จับจ้องไปที่กระบี่ของ JAKK อีกต่อไป แต่กลับมองไปที่ ‘กระแสน้ำ’ ที่กำลังไหลเวียนอยู่รอบตัวเขา
เขาต้องไม่ต่อสู้กับมัน แต่ต้องเป็นหนึ่งเดียวกับมัน
ร่างของเอี้ยก้วยเริ่มขยับไหลลื่นขึ้น ความแข็งแกร่งของกระบี่วิหคถูกหลอมรวมเข้ากับความอ่อนโยนของสายน้ำ ทุกก้าวย่างของเขาเบาหวิว ทุกกระบวนท่าที่ปล่อยออกไป ไม่มีจุดเริ่มต้นและไม่มีจุดจบ
JAKK มองดูการเปลี่ยนแปลงนั้นก่อนจะค่อย ๆ ลดกระบี่วารีลง
“เข้าใจแล้วหรือยัง?”
เอี้ยก้วยมิได้ตอบ เขาเพียงปล่อยให้หยาดฝนซึมผ่านร่างของตนเอง แต่ครั้งนี้ มิใช่เพราะมันตกลงมา แต่เพราะเขาเป็นส่วนหนึ่งของมัน
JAKK ยิ้มบาง ๆ ก่อนกล่าวทิ้งท้าย—
“เมื่อเจ้าเป็นวารี เจ้าจะไม่มีวันถูกทำลาย”
สิบหกปีต่อมา..
สายลมอ่อนพัดผ่านแมกไม้ เสียงน้ำไหลจากลำธารเล็ก ๆ ขับขานเป็นบทเพลงแห่งความสงบ ฟากฟ้าไร้เมฆฝน แสงอาทิตย์อ่อนจางทอดผ่านปลายใบไผ่ ดุจรอยยิ้มของสวรรค์หลังจากผ่านพายุอันเกรี้ยวกราดมาเนิ่นนาน
เอี้ยก้วยยืนอยู่บนโขดหินริมลำธาร มองสายน้ำที่ไหลผ่านราวกับไม่มีจุดสิ้นสุด ในแววตานั้นมีเพียงความสงบและลึกซึ้ง ร่างของเขายังคงองอาจเช่นวันวาน แต่สิ่งที่เปลี่ยนไปคือพลังอันเงียบสงบที่แผ่ซ่านอยู่รอบกาย มิใช่เพลิงแห่งโทสะ หากแต่เป็นสายธารที่ไหลลื่น ไม่มีสิ่งใดขวางกั้นได้
“เจ้ากำลังคิดอะไรอยู่?”
เสียงอ่อนโยนดังขึ้นเบื้องหลัง เซียวเหล่งนึ่ง ก้าวออกจากร่มเงาของต้นไม้ นางยังคงงดงามดังเดิม แม้กาลเวลาจะล่วงผ่าน ทว่าดวงตาของนางยังเปี่ยมไปด้วยความอ่อนโยน และรอยยิ้มที่มอบให้เอี้ยก้วยยังคงเป็นเช่นเดิม
เอี้ยก้วยหันมองนาง ก่อนยิ้มบาง ๆ แล้วทอดสายตากลับไปยังลำธาร “มีผู้หนึ่งเคยกล่าวกับข้า... วารีไม่เคยต่อต้านสิ่งใด แต่ไม่มีสิ่งใดทำลายมันได้”
เซียวเหล่งนึ่งขมวดคิ้วเล็กน้อย “ผู้ใด?”
เอี้ยก้วยนิ่งไปชั่วขณะ ก่อนตอบ “อาวุโสผู้หนึ่งนามว่า Jakk Goodday ไม่เพียงยอดฝีมือ แต่เป็นผู้ที่เข้าใจธรรมชาติแห่งทุกสรรพสิ่ง” เขายิ้มเล็กน้อย “เขาสอนข้าถึงพลังที่แท้จริงของวารี”
เซียวเหล่งนึ่งรับฟังเงียบ ๆ นางมองเขาด้วยแววตาที่เต็มไปด้วยความเข้าใจ
เขาหย่อนปลายนิ้วลงไปในน้ำเบื้องหน้า แหวนน้ำกระจายออกเป็นวง ทว่าไม่นานก็คืนสู่สภาพเดิม "แรงที่รุนแรงที่สุด ไม่ได้ทำให้ทุกอย่างแตกสลาย... แต่มันจะถูกดูดซับไปในที่สุด" เอี้ยก้วยพึมพำเบา ๆ
“เมื่อก่อน ข้ามักต่อต้านทุกสิ่ง” เอี้ยก้วยเอ่ยขึ้น แววตาสะท้อนถึงอดีตที่ผ่านมา “ข้าสู้กับโชคชะตา ข้าท้าทายทุกสิ่งที่ขัดขวางข้า ไม่ว่าจะเป็นสวรรค์หรือมนุษย์”
เอี้ยก้วยหลับตาลง สายลมพัดผ่านร่างของเขาเย็นเยียบ ก่อนจะเปิดตาขึ้นช้า ๆ "เมื่อก่อนข้าต้านทานทุกสิ่ง แต่บางครั้ง... ทางที่มั่นคงที่สุด อาจเป็นทางที่ไม่มีเส้นทางเลย" เขาเอ่ยเสียงเบา คล้ายกล่าวกับตนเองมากกว่านาง
เซียวเหล่งนึ่งก้าวเข้าไปใกล้ มองสบตาเขานิ่ง ๆ "แล้วตอนนี้ เจ้าจะไหลไปตามกระแสน้ำ... หรือเจ้ายังต้องการกระบี่ของเจ้าอยู่?"
“น้ำไม่เคยฝืนตัวมันเอง มันไม่แข็งกร้าว แต่มันชนะทุกสิ่ง ไม่ว่าจะเป็นหินแข็งหรือเหล็กกล้า” เขายื่นมือแตะผิวน้ำเบา ๆ “กระบี่ของข้าเคยเป็นดังเปลวไฟที่เผาผลาญทุกสิ่ง แต่ตอนนี้... มันเป็นสายธารที่ไหลไปตามใจของมัน”
เซียวเหล่งนึ่งก้าวเข้ามาใกล้ แสงอาทิตย์ส่องต้องนางราวกับนางเป็นภาพฝัน “ข้าดีใจที่เจ้ากลับมา... และข้าดีใจที่เจ้าพบสิ่งที่เจ้าตามหามาตลอด”
เอี้ยก้วยหันกลับมาสบตานาง แววตาของเขาอ่อนโยน "ข้ารู้แล้วว่า การรอคอยที่แท้จริง... มิใช่เพียงรอคอยเจ้า แต่เป็นรอคอยวันที่ข้าจะเข้าใจตัวข้าเอง"
เซียวเหล่งนึ่งยิ้ม “และตอนนี้ เจ้าเข้าใจแล้วหรือไม่?”
เอี้ยก้วยพยักหน้า “ข้าเข้าใจแล้ว” เขากุมมือนางเบา ๆ “รักที่แท้จริงมิใช่พันธนาการ มันเป็นดั่งสายน้ำ ไม่ต้องไขว่คว้า ไม่ต้องครอบครอง แต่ไหลไปตามทางของมันเอง”
เซียวเหล่งนึ่งเงยหน้าขึ้นสบตาเขา นางไม่ต้องการคำพูดใดอีก เพราะทุกสิ่งอยู่ในดวงตาของเขาแล้ว
สายลมพัดผ่านเบา ๆ ลำธารยังคงไหลไปข้างหน้า ไม่มีสิ่งใดหยุดยั้งมันได้ เช่นเดียวกับเวลาที่เคลื่อนผ่าน และความรักที่ไม่มีวันจืดจาง
และในที่สุด... เอี้ยก้วยก็ได้กลายเป็นดั่งสายน้ำ ที่ไม่มีวันถูกทำลาย
-
@ 5e13e5d5:217fe898
2025-03-06 11:54:58In today's era of rapid technological development, the widespread use of drones has brought new challenges to the security field. In order to effectively solve the interference and intrusion problems of drones, the D-004 vehicle-mounted drone jammer, as an innovative device, has attracted much attention for its excellent performance and outstanding quality.
https://www.thejammerblocker.com/d-004-200w-4-bands-vehicle-fpv-drone-signal-blocker/
The D-004 vehicle-mounted drone jammer has unique advantages in dealing with drone interference. First of all, the jammer is equipped with four customizable frequency bands, operating in the range of 380-450MHz, 720-840MHz, 840-960MHz and 960-1080MHz, which can widely interfere with the WiFi and GPS signals of various drones, providing a more comprehensive solution to ensure security. This wide frequency band coverage enables the D-004 to effectively fight against various types of drones and protect your safety.
https://www.thejammerblocker.com/wifi-bluetooth-camera-jammer-blocker/
Not only that, the D-004 vehicle-mounted drone jammer is also famous for its military quality. Made of high-quality materials and advanced technology, it undergoes strict quality inspection and testing to ensure its reliability and stability in harsh environments. Whether on the battlefield or in the civilian field, D-004 has demonstrated excellent performance and reliability, providing users with strong protection.
In addition to its wide frequency band coverage and military quality, the D-004 vehicle-mounted drone jammer has many other advantages. Its portable design makes it suitable for different places and environments, such as vehicles, ships and mobile bases. Easy to operate, users can quickly deploy and use it, flexibly respond to different drone threats, and ensure safety. At the same time, D-004 also has efficient jamming capabilities, which can quickly interfere with the communication signals and navigation systems of target drones, effectively blocking their activities and ensuring the safety of the field.
https://www.thejammerblocker.com/gps-jammer-car-tracker-blocker/
In general, the D-004 vehicle-mounted drone jammer has become a powerful tool for protecting the security field with its wide frequency band coverage, military quality and efficient jamming performance. Whether it is a military agency, a security agency or a civilian field, D-004 can provide excellent protection and security solutions, bringing users a worry-free use experience. In the field of science and technology that is constantly improving and developing, we believe that the D-004 vehicle-mounted drone jammer will continue to play an important role in ensuring the safety and stability of the field.
https://www.thejammerblocker.com/drone-uavs-jammers-blockers/
-
@ 8947a945:9bfcf626
2025-03-06 10:50:28Law of diminishing returns : ทำมากได้น้อย ซวยหน่อยขาดทุน
** หมายเหตุ บทความนี้มีเนื้อหาต่อเนื่องจาก “(TH) Why I quit : สาเหตุที่ผมลาออกจากที่(ทำงาน) ที่ (เคย) เรียกว่า”บ้าน” ใครยังไม่ได้อ่าน แนะนำให้ไปอ่านก่อนนะครับ
ผมได้ยิน คุณท็อป จิรายุส (คุณท๊อป บิทคับ) พูดคำว่า "Law of diminishing returns" ไว้ตอนแชร์มุมมองด้านการทำธุรกิจ ตอนนั้นผมไม่เข้าใจ แต่ผมรู้สึกว่ามันเป็นเจ๋งดี
สำหรับผม สรุปกฏนี้สั้นๆ คือ “ทำมากได้น้อย ซวยหน่อยขาดทุน”
กฏข้อนี้ว่าด้วยเรื่องการทำธุรกิจ พูดถึงปัจจัย 3 อย่าง - Fixed input คือสิ่งที่ไม่สามารถผลิตเพิ่มได้อีกในธุรกิจตอนนั้น เช่น จำนวนห้องตรวจในโรงพยาบาล, พื้นที่ที่ดินทำการเกษตร, ห้องเก็บสินค้า, จำนวนโต๊ะทำงานในสำนักงาน, ช่องบริการลูกค้าในธุรกิจบริการต่างๆ เป็นต้น ผมขอเรียกสั้นๆว่า “พื้นที่” - Variable input คือสิ่งที่สามารถเติมเข้ามาในธุรกิจได้ ปรับแต่งได้ เช่น แรงงาน เครื่องจักร พลังงาน - Marginal product คือผลลัพธ์ของธุรกิจ กำไรเพิ่มขึ้นหลังจากเพิ่ม variable input เข้าสู่ระบบ
ระยะของ law of diminishing returns
- Increased return (ทำเงินได้เยอะขึ้น) เมื่อป้อนแรงงานหรือเครื่องจักรเข้าสู่ระบบ ธุรกิจสามารถทำเงินเพิ่มขึ้นเนื่องจาก fixed input เดิมที่ถูกใช้สอยไม่เต็มที่ (underutilized) ถูกเติมเต็ม กรณีของรพ. คือมีห้องตรวจที่ว่าง ไม่มีหมอนั่งตรวจคนไข้ ห้องตรวจนั้นก็จะไม่สร้างรายได้ แต่เมื่อห้องนั้นมีหมอมานั่ง จะเปลี่ยนเป็นพื้นที่ที่ก่อให้เกิดรายได้ เมื่อห้องตรวจทุกห้องมีหมอนั่งครบ ถือว่าเต็มศักยภาพ ประสิทธิภาพการทำงานที่ดีตามมา
- Diminishing return (ทำมากได้น้อย) จุดของความพอดี (optimum point) คือจุดที่สมดุลพอดีของธุรกิจนั้น ทำกำไรได้เหมาะสม ไม่มากไม่น้อยจนเกินไป แต่ถ้ามองไม่เห็นจุด optimum นี้แล้วยังเพิ่ม”แรงงาน”เข้าไปอีก มันจะทำให้ ”พื้นที่” วุ่นวายเละเทะ ประสิทธิภาพในการทำงานลดลง
- Negative returns (ซวยหน่อยขาดทุน) ถ้ายังไม่หยุดเพิ่ม “แรงงาน” อีก สามารถนำมาสู่การขาดทุน
สรุปเป็นกราฟหน้าตาตามนี้ครับ
ทำไมมันถึงเป็นอย่างนั้น
ผมใช้โมเดลธุรกิจรพ.นี้เป็นตัวอย่างเลยนะครับ
ช่วงแรกที่สร้างรพ. ห้องตรวจมีไม่มาก จำนวนหมอและคนไข้สมดุลกันพอดี งานไม่หนักเกินไป การดูแลคนไข้มีประสิทธิภาพ รพ.เป็นที่ไว้ใจของคนในพื้นที่ มีชื่อเสียง ถูกบอกต่อ ทำให้จำนวนคนไข้เข้ามารับบริการมากขึ้น ต้องขยายพื้นที่รพ. สร้างตึกเพิ่ม รับบุคคลากรทุกระดับเข้ามาทำงานมากขึ้น จนเต็มพื้นที่ที่ดินรพ.ไม่สามารถขยายเพิ่มไปได้มากกว่านี้แล้ว เกิดสมดุลพอดี ทุกพื้นที่ถูกใช้งานเต็มศักยภาพ ประสิทธิภาพงานดีมาก
ผลการดำเนินงาน
ไม่เคยขาดทุน ผ่านช่วงวิกฤตต้มยำกุ้ง และ COVID ได้สบายๆ ฐานะทางการเงินแข็งแรง จ่ายปันผลสม่ำเสมอ ถ้าผมเป็นเจ้าของรพ.ผมจะ 1. สร้างระบบ 2. สร้างทีมผู้บริหาร 3. เน้นย้ำความสำคัญทำตามระบบ 3. Plan - Do- Check - Act เมื่อเกิดปัญหา
เพื่อให้ตัวผมสามารถถอยตัวเองออกมาจากตัวธุรกิจ คอยติดตาม monitor ทุกไตรมาส อย่างใกล้ชิด ไม่ทำอะไรเพิ่มไปมากกว่านี้
แต่สุดท้ายมันก็เกิดเหตุการณ์ทายาทรุ่นที่ 2 “ไม่เอา” นั่นแหละครับ มันทำให้วัฒนธรรมองค์กรเปลี่ยน ก้าวเท้าเข้าไปสู่ยุคตกต่ำ
บริหารแบบล้าหลัง ทำอะไรไม่สุด คิดว่าทำแล้วแต่จริงๆคือไม่ได้ทำ แก้ปัญหาไม่ตรงจุดสร้างปัญหากว่าเดิม
ตัวอย่าง
1. นโยบายการประหยัดพลังงานเพื่อลด carbon footprint
ฟังดูเหมือนจะดี แต่รพ.สื่อสารให้
รณรงค์ให้ปิดไฟ ... ปิดแอร์เมื่อไม่ใช้งาน ...
ผมว่าประโยคนี้มันคุ้นๆ เหมือนเคยได้ยินมามากกว่า 10 ปีแล้ว ... หรือผมเข้าใจผิดหรือเปล่าไม่แน่ใจ
รณรงค์แค่นี้แหละครับ เรื่องลด carbon footprint ไม่ได้เป็นการคิดอะไรใหม่ๆที่เหมาะกับยุคสมัย หรือสร้างอะไรที่จับต้องได้ (objective)
แต่สิ่งที่ทำสวนทางโดยสิ้นเชิงคือใช้พลาสติกแบบใช้แล้วทิ้ง (single use plastic) เป็นภาชนะหลักในการบรรจุอาหารของแพทย์ และผู้เข้าร่วมประชุมงานใหญ่ๆ
มีเสียงเสนอแนะจากบุคคลากรทุกระดับว่าให้ทำเป็นบุฟเฟ่ต์ จานชามช้อนส้อมแบบปกติก็ได้ เสนอกันมา 5 ปี ก็ยังคงไม่่มีการเปลี่ยนแปลง ได้รับแจ้งลงมาว่าใช้ภาชนะพลาสติกมันประหยัดกว่า เอาเป็นว่ากล่องข้าวพลาสติกมีการใช้อย่างน้อย 1200 กล่องต่อเดือน … คาดว่าสมการการปล่อยก๊าสคาร์บอน (carbon emission) ที่ทีมผู้บริหารคำนวณ อาจจะซับซ้อนเกินความเข้าใจของผมก็ได้นะครับ
2. การตลาดที่ล้มเหลวและพาแพทย์ซวย
ทำการตลาดไม่เข้าเป้า “เหมือนจะ” ทำ digital marketing แต่ทำแค่โพสกราฟฟิคโปรโมชั่นภาพนิ่งลงสื่อโซเชียลทุกช่องทาง แล้วบอกว่านั่นคือ digital marketing
... แต่เดี๋ยวก่อนๆๆๆ ...
ผมจะบอกว่าการโพสมันเป็นแค่ 1 ใน 10 ของ digital marketing แต่รพ.เข้าใจว่าตัวเองได้เข้าสู่ digital marketing แล้ว
... จริงๆมันไม่ใช่เลยเว้ย ...
ผลลัพธ์คือไม่สามารถเปิดน่านน้ำลูกค้าใหม่ได้เลย ได้แต่ฐานลูกค้าเดิมที่มี brand royalty (แต่แนวโน้มลดลง)
แถมที่แย่ที่สุดคือทำการตลาดแพคเกจออกมาโดยไม่ปรึกษาแพทย์ก่อนว่ามันขัดต่อมาตรฐานการรักษาหรือไม่ กลายเป็นทำแพคเกจดึงดูดคนไข้เข้ามาใช้บริการ แต่การรักษาในแพคเกจขัดต่อมาตรฐานการรักษาของแพทย์
คนไข้ไม่รู้หรอกครับ คนไข้จะเอาตามที่มีในแพคเกจ เขาจ่ายตังค์แล้ว แต่ความซวยมันไปตกอยู่กับแพทย์
3. วางกลยุทธไม่เข้าเป้า
ทุกๆต้นปีทางผู้บริหารจะประกาศกลยุทธประจำปี ว่าในปีนั้นๆรพ.จะมุ้งเน้นพัฒนาด้านไหน รพ.นี้มีปัญหาที่เป็นงูกินหางมานาน มันส่งผลต่อประสิทธิภาพการทำงานของหมอและพยาบาล มีการเสนอแก้ปัญหาเรื่องนี้วนซ้ำซากมา 5 ปี แต่ไม่ได้รับแก้ไขจริงจัง (ผมขอไม่เล่านะครับ)
แต่กลยุทธประจำปี 3 ปีที่ผ่านมา พุ่งใส่ตัวบุคคลากร เน้นพฤติกรรมบริการที่ดีเลิศ ทราบมาว่ามีการลงทุนกับโครงการนี้หลักแสนหรือหลักล้าน มีการจัด workshop เชิญวิทยากรและ trainer จากบริษัทภายนอก (outsource) เข้ามาอบรม เป็นโครงการที่เน้นให้บุคคลากรทุกคนเข้าอบรม 100%
ผมมองว่าปัญหาที่เป็นราก (root cause) มันยังไม่ถูกแก้เลย เปรียบเทียบเหมือนฐานรากของอาคารที่มันโคลงเคลงๆไม่มั่นคงยังไม่ได้รับการแก้ไข แต่พยายามตกแต่งห้องด้วยวัสดุคุณภาพดีและเทคโนโลยีที่ทันสมัย … แต่พร้อมจะล้มลงมาได้ทุกเมื่อ
4. มีเสน่ดึงดูด partner ใหม่ๆ แต่ไม่เอาเอง
ในช่วง COVID ระลอกแรก มีผู้นำทางด้านธุรกิจโรงแรมในจังหวัดมานำเสนอโมเดลธุรกิจ “hospitel เปลี่ยนโรงแรมให้เป็นโรงพยาบาล” ด้วยศักยภาพของรพ.ที่มีบุคคลากรเพียงพอ และตัวโรงแรมที่นำมาเสนอมีห้องพักประมาณ 300 ห้อง เป็นโมเดลที่รพ.และโรงแรม win-win ทั้งคู่ แต่ทางผู้บริหารมองว่าไม่คุ้ม ปฏิเสธข้อเสนอนี้ ทำให้เสียโอกาสให้กับคู่แข่งคว้าตลาด blue ocean นี้ไป
ผมได้แต่เกาหัวตอนรู้เรื่องนี้ เพราะ 1. ช่วง COVID คนไข้น้อย พนักงานโดนลดชั่วโมงการทำงาน ได้เงินเดือนขั้นต่ำ ไม่ได้ OT 2. ทาง partner เสนอขอบุคคลากรเหล่านี้แหละ ไปช่วยงาน เรื่องสถานที่ทางโรงแรมเขามีแม่บ้าน ฝ่ายทำความสะอาดอยู่แล้ว 3. ทาง partner เสนอ profit sharing กับทางรพ. ถึงผมจะไม่รู้ตัวเลข แต่เชื่อว่ามันยุติธรรม
ผมก็ไม่รู้ครับ ว่าอะไรคือคุ้มสำหรับผู้บริหาร
5. Top down absolute power
ไม่ฟังข้อเสนอจากตัวแทนหมอ คนที่มีอำนาจการตัดสินใจไม่เคยเอาตัวลงมาคุยกับหมอแบบจริงจังเลย
1-2 ปีจะลงมาพบหมอทั้งรพ.ซักหนึ่งครั้ง สร้างภาพเก่ง พูดขายฝันสวนหรูถึงภาพที่เขาต้องการ สั่งการลงมา พอเกิดปัญหาตัวเองไม่ลงมารับผิดชอบ แต่อาศัยหน่วยข่าวกรอง(ที่ไม่รู้ว่ากรองอะไรเข้าไปบ้าง) ออกคำสั่งแก้ผ้าเอาหน้ารอดลงมาทีหลัง
แถมสั่งให้เงียบและหุบปาก
ครั้งหนึ่งมีคำสั่งออกมาไม่ชัดเจน จนพยาบาลทำงานไม่ได้ ตัวแทนพยาบาลต้องโทรมาหาผมเพื่อให้ผมช่วย
ผมรวบรวมข้อมูลทั้งหมดและพบว่าคำสั่งมีปัญหาจริงๆ ผมจึง chat line ลงไปสอบถามผู้บริหารเพื่อขอความชัดเจน
… ผ่านไปไม่ถึง 5 นาที หนึ่งในผู้บริหาร(คนที่แทงข้างหลังผมที่หาว่าผมมาตรวจคนไข้ VIP เขาช้า 5 นาทีนั่นแหละ)โทรหาผมทันทีคุยกับผมสั้นๆ ใจความว่า “คำสั่งนั้นเอาแบบเดิม ไม่ต้องแก้ และให้ผมเงียบๆซะ”... (ก็ได้วะครับ)
จุดเปลี่ยนที่ทำให้รพ.เข้าสู่ law of diminishing returns
ห้องตรวจทุกห้องของรพ. ถูกใช้จนเต็มศักยภาพ … เอาจริงๆคือล้นศักยภาพเสียอีก (over-utilized) บางแผนกมีเก้าอี้ดนตรี - หมอคนแรกหมดเวลาออกตรวจ - หมอคนต่อไปเดินเข้าใช้ห้องตรวจต่อทันที - ถ้าไม่ทันก็ต้องคว้าห้องตรวจที่ว่างพร้อมใช้งานก่อน - หมอทำการไล่ที่กันเอง - หมอบางท่านต้องใช้ห้องทำงานของพยาบาลเป็นห้องตรวจชั่วคราว
ห้องพักผู้ป่วยก็เช่นกัน บางช่วงเตียงเต็มจนไม่สามารถ admit คนไข้ได้
แต่จำที่ผมบอกได้มั้ยครับว่า คนที่เป็น top down absolute power ไม่เคยเอาตัวลงมาพูดคุยกับแพทย์เพื่อรับฟังปัญหาที่แท้จริงเลย รับแต่ข่าวกรอง(ที่ไม่รู้ว่ากรองอะไรเข้าไปบ้าง) ช่วงนึงมีคนไข้ complaint ว่ารอนั่งรอหมอนาน หมอมาตรวจช้า ผู้บริหารเลยพยายามจะแก้ปัญหา โดยการ monitor waiting time (ระยะเวลารอหมอ) หยิบยกเรื่องนี้ขึ้นมาเป็นวาระเร่งด่วนต้องรีบแก้ไข
แต่เขายังงงๆกับ concept waiting time อยู่เลยว่าจะนับตั้งแต่ตอนไหนถึงตอนไหน - Waiting time สั้นแปลว่าดี เพราะคนไข้ได้เจอหมอเร็ว - Waiting time นานแปลว่าไม่ดี เพราะคนไข้นั่งรอหมอนาน
เขาตีความจากตัวเลขครับ แต่เคยเอาตัวลงมาดูจริงๆหรือเปล่าว่าทำไมตัวเลขมันถึงออกมาไม่ดี
คำตอบคือ“ไม่” ครับ
หมอบางสาขามีความจำเป็นต้องไปดูคนไข้ที่อาการหนักใช้เวลารักษานาน ... หรือ ... รับปรึกษาจากแพทย์ต่างสาขา ... หรือ ... เป็นสาขาเฉพาะทางของเฉพาะทางอีกที ต้องใช้เวลาตรวจละเอียดตรวจนาน
มันเป็นกระบวนการทำงานของหมอ ที่หมอด้วยกันเข้าใจกัน
ส่วนคนเก็บข้อมูลก็นำเสนอไปทั้งอย่างนั้นโดยที่ไม่ได้วิเคราะห์อะไรเลย มันเป็นการกรองข้อมูลที่ไม่รอบคอบก่อนนำเสนอผู้บริหาร
สุดท้ายผู้บริหาร “โทษหมอ” ว่าไม่มีการบริหารเวลาทำงานที่ดีเพียงพอ ทำให้คนไข้รอนาน เขาสรุปกันดื้อๆแบบนี้เลยครับ
พอหนักๆเข้า “รอหมอนาน ต้องเพิ่มหมอ” season การรับสมัครหมอหลายตำแหน่งได้เริ่มขึ้น
แต่เดี๋ยวนะ ห้องตรวจมันแน่นจนแทบไม่มีที่ให้หมอนั่งทำงานแล้ว แต่เขาก็ไม่สนครับ รับหมอหน้าใหม่ๆมาเพิ่มเรื่อยๆ
ด้วย mindset ว่า "ต้องเพิ่มหมอ หมอจะได้เยอะขึ้น คนไข้จะได้ไม่ต้องรอนาน" และเชื่อว่าจะทำรายได้ให้รพ.มากขึ้น หมอหน้าใหม่บางท่านเข้ามาทำงานวันแรกถึงขั้นอยู่ในสภาวะ dead air คือไม่มีที่ให้นั่งทำงาน
“ทำมากได้น้อย” เริ่มต้น
คนไข้รพ.นี้ ส่วนใหญ่เป็นโรคซับซ้อน ต้องการทักษะและเวลาหมอเฉพาะทางแต่ละสาขาอยู่ดี ไม่ได้ทำให้ waiting time ดีขึ้น คนไข้ยัง “นั่งรอหมอนานเหมือนเดิม”
รายได้เริ่มลดลง ยอดคนไข้เริ่มลดลง รพ.พยายามแก้เกมโดยการเพิ่มราคาค่าบริการ (เพิ่มขนาด ticket size) ทำให้มีเสียงรีวิวตามโซเชียลว่า "แพง"
ผลที่เกิดขึ้นคือคนไข้หลายคนอาศัยรพ.นี้ในการตรวจวินิจฉัยโรคแล้วเอาผลไปรักษาต่อรพ.รัฐบาลตามสิทธิ์เพราะสู้ราคาค่ารักษาไม่ไหว บางคนมีประกันสุขภาพหลายฉบับแต่ก็ต้องจ่ายส่วนต่างมากอยู่ดี
วิธีการข้างต้นนี้ ไม่ผิดกติกาครับ ผล X-ray , CT, MRI, ultrasound จากรพ.เอกชน ไวกว่ารพ.รัฐบาลอยู่แล้ว แต่ก็มีคนไข้บางส่วนยินดีจ่ายแพง เพราะเชื่อมั่นหมอที่รพ.นี้ไม่อยากย้ายรพ.ก็มีครับ เพราะหมอไม่ได้ทำอะไรผิด หมอเก่งๆมีเยอะ
ถึงแม้ว่ารพ.จะรักษา momentum มีจำนวนคนไข้ประมาณ 1100 - 1200 รายต่อวัน แต่ก็เป็นโรคง่ายๆ(simple disease) เช่นไข้หวัด อาหารเป็นพิษ เป็นต้น โรคเหล่านี้ ticket size ไม่ได้ใหญ่มาก ประคองไว้ไม่ให้ขาดทุนเท่านั้นครับ
แต่ความแพงแบบไม่สมเหตุสมผล ทำให้คนไข้หลายรายถอดใจย้ายรพ.ตั้งแต่ทราบค่าใช้จ่ายวินาทีแรก
คนไข้น้อยลง --> รายได้ลดลง --> เพิ่ม ticket size ต่อหัวให้แพงขึ้น --> คนไข้หนีเพราะแพงเกิน
ผมไม่รู้ว่าผู้บริหารเขาเห็นไหม แต่คาดว่าคงจะไม่เห็น
ส่วนโรคหรือการผ่าตัดที่สมศักดิ์ศรีกับศักยภาพของรพ. "น้อยมากจนแทบไม่มี" ไม่ใช่สาเหตุอื่นเลยครับ โดนรพ.คู่แข่งในรัศมี 20 กิโลเมตรเอาไปหมด เพราะราคาถูกกว่า หมอก็เก่งไม่แพ้กัน หมอบางคนเคยอยู่ที่รพ.แห่งนี้ เสนอโปรเจคการรักษาโรคบางโรคที่สามารถสร้างรายได้เป็นกอบเป็นกำ แต่ทางรพ.ไม่เอาเอง สุดท้ายหมอเหล่านั้นย้ายไปอยู่กับรพ.คู่แข่งและผลักดันโปรเจคเหล่านั้นสำเร็จจนมีชื่อเสียง
"รพ.ขายสินค้า premium ไม่ได้เลย ขายได้แต่สินค้าเกรดท้องตลาด"
กลยุทธที่รพ.ทำต่อมาคือเพิ่มจำนวนชั่วโมงการทำงานของหมอให้เพิ่มขึ้นโดยให้หมอมาทำงานเร็วขึ้น 2 ชม. แต่ไม่จ่าย OT ให้ ด้วยตรรกะว่าถ้าหมอทำงานนานขึ้น จะมีจำนวนคนไข้มากขึ้น ทางรพ.ไม่ได้ขอร้อง แต่บีบคอให้หมอร่วมมือ หากไม่ร่วมมือไล่ออกทันที
ไปๆมาๆ มีการไล่ออกกระทันหันเกิดขึ้น มีการส่งหนังสือส่วนตัวหาหมอทุกคน ใครมีรายชื่อที่จะปลดออกก็ต้องออกจากงานทันที
ผมมองว่าฐานะทางการเงินมีปัญหารุนแรงครับ เงินเดือนพนักงานถือเป็น fixed cost ที่ธุรกิจต้องแบกรับ ถ้าเจ๋งจริงต้องควบคุมรายจ่ายให้ธุรกิจสามารถไปต่อได้โดยไม่ปลดคน ในส่วนของธุรกิจรพ. หมอคือบุคคลากรที่สำคัญที่สุดและเป็นด่านสุดท้ายที่จะไล่ออกเพื่อรักษาชีวิตของธุรกิจ ตอนนี้รพ.ได้เข้าสู่ระยะสุดท้ายของ law of diminishing returns คือ “ซวยหน่อยขาดทุน” เป็นที่เรียบร้อยครับ
จุดจบของรพ.แบบนี้ ที่ศักยภาพดี แต่บริหารห่วยแตก มันจะจบด้วยการถูก take over ผ่านมาไม่นานกราฟหุ้นออกอาการ exit liquidity แล้วครับ
ข้อคิดที่อยากแบ่งปันกับทุกคนที่อ่านมาจนจบ
- ช่วงธุรกิจเปลี่ยนผ่านสู่ทายาท คือจุดวัดใจหัวเลี้ยวหัวต่อว่าจะรอดหรือไม่รอด
- Law of diminishing returns ไม่ได้ใช้เฉพาะกับธุรกิจ แต่สามารถประยุกต์ใช้กับการดำเนินชีวิตได้หลายมิติ หากใครเข้าใจ จะขยับเข้าสู่ Pareto’s rule … สั้นๆคือ ทำน้อยแต่ได้(โคตร)มาก
- เจ้าของธุรกิจ ต้องหูไว มองหาเนื้อร้ายที่คอยกัดกินธุรกิจให้เจอ แล้วกำจัดมันซะ ก่อนที่ธุรกิจจะล้มทั้งยืน ทับตัวเองตาย
-
@ cbc6fc60:5e022c37
2025-03-06 10:33:16Key Points
- Research suggests Starship, developed by SpaceX, could lower space travel costs, enabling Mars and Moon colonization.
- It seems likely that Starship will support scientific research and rapid global travel, potentially transforming industries.
- The evidence leans toward environmental benefits from reusability, though launch impacts are debated.
What is Starship and Its Potential Benefits?
Overview of Starship
Starship is a two-stage, fully reusable super heavy-lift launch vehicle by SpaceX, consisting of the Starship spacecraft and Super Heavy booster. It aims to be the most powerful launch vehicle, capable of carrying up to 150 metric tons to orbit when reusable and 250 metric tons expendable, as noted on SpaceX Starship.Benefits for Space Exploration
Starship could enable human colonization of Mars and the Moon, reducing Earth's dependency and ensuring survival against global disasters. It supports NASA's Artemis missions for lunar landings, potentially establishing bases for further exploration. Its large payload capacity also facilitates deep space missions, expanding scientific discovery.Earth-Based Applications
Starship may revolutionize global travel, allowing trips anywhere on Earth in under an hour, which could transform transportation. It could also lower satellite launch costs, enhancing communication and monitoring services. Additionally, it might inspire STEM careers, driving innovation.Environmental and Economic Impacts
Reusability could reduce space debris and environmental impact compared to traditional rockets, though launch frequency raises concerns. Economically, cheaper launches might boost industries like manufacturing and data analytics, as discussed in Get Ready for SpaceX’s Bold Move.
Comprehensive Analysis: Detailed Examination of Starship's Future Benefits for Humanity
This section provides an in-depth exploration of SpaceX's Starship, its development, and the multifaceted benefits it holds for humanity, drawing from extensive research and analysis. The following discussion aims to cover all aspects, including technical details, potential applications, and broader societal implications, ensuring a thorough understanding for readers interested in the future of space exploration.
Background and Development of Starship
Starship, developed by SpaceX under the leadership of Elon Musk, is a two-stage, fully reusable super heavy-lift launch vehicle. It comprises the Starship spacecraft and the Super Heavy booster, designed to be the tallest and most powerful launch vehicle ever built, with a height of 120 meters (394 feet) when stacked, as detailed in Starship | Definition, SpaceX, & Facts | Britannica. The vehicle's development began in 2012 with the focus on Raptor engines, evolving from the Interplanetary Transport System (ITS) unveiled in 2016 to its current form, as noted in SpaceX's next-gen "Starship" Mars rocket is going to change the world. On April 20, 2023, Starship conducted its first integrated flight test, marking it as the most massive and powerful vehicle to fly, according to SpaceX Starship - Wikipedia.
The design emphasizes reusability, aiming to lower launch costs through economies of scale, mass manufacturing, and rapid launch frequencies. Both stages are equipped with Raptor engines, which use liquid methane and oxygen, enhancing efficiency and reducing costs compared to traditional rocket fuels, as seen in SpaceX - Starship.
Vision and Objectives
The overarching vision for Starship, as articulated by Elon Musk, is to make life multi-planetary, ensuring humanity's survival by establishing colonies on Mars and the Moon. This aligns with Musk's 2016 statement, "History is going to bifurcate along two directions. One path is we stay on Earth forever, and then there will be some eventual extinction event. The alternative is to become a spacefaring civilisation and a multi-planet species," as quoted in What is Elon Musk's Starship space vehicle?. This vision is not merely exploratory but existential, aiming to safeguard humanity against Earth-bound catastrophes like asteroid impacts or climate change.
Benefits for Space Exploration
Starship's potential to transform space exploration is profound, driven by its technical capabilities and strategic applications:
-
Mars and Lunar Colonization:
Starship's ability to carry up to 100 people and significant cargo to Mars, as mentioned in What is the SpaceX Starship?, positions it as a key enabler for establishing self-sustaining colonies. This reduces humanity's reliance on Earth, providing a backup against global disasters. Similarly, for the Moon, Starship serves as the lunar lander for NASA's Artemis missions, aiming to return astronauts to the lunar surface for the first time in over 50 years, as noted in SpaceX - Starship. This could lead to permanent lunar bases, supporting further space exploration. -
Deep Space Missions:
With on-orbit refueling capabilities, Starship can extend its reach to distant parts of the solar system, such as Jupiter's moons or asteroids, facilitating scientific research and resource utilization. This is particularly highlighted in discussions about future missions, as seen in SpaceX Starship (spacecraft) - Wikipedia. -
Scientific Research in Space:
The vehicle's large payload capacity allows for the deployment of advanced space telescopes, such as the proposed Habitable Worlds Observatory, which requires a super heavy-lift launch vehicle to search for signs of life on exoplanets, as mentioned in SpaceX Starship - Wikipedia. This could revolutionize our understanding of the universe and the potential for extraterrestrial life.
Earth-Based Applications and Economic Impacts
Starship's benefits extend beyond space, offering transformative applications for Earth:
-
Point-to-Point Global Travel:
One unexpected application is the potential for rapid global transportation, enabling travel to any point on Earth in under 30 minutes, as outlined in SpaceX - Starship. This could revolutionize industries like tourism, logistics, and emergency response, reducing travel time and potentially lowering carbon emissions compared to traditional aviation, though this depends on the environmental impact of frequent launches. -
Satellite Deployment and Communication:
Starship's high payload capacity and reusability will make launching satellites more cost-effective, supporting the expansion of constellations like Starlink, which aims to provide high-speed internet globally, as discussed in SpaceX CEO Elon Musk explains why we need a 'whole new architecture' for space travel | Space. This could bridge digital divides, particularly in remote areas, enhancing global connectivity and economic opportunities. -
Economic Growth and Job Creation:
The commercial space industry, driven by Starship, is poised for exponential growth, stimulating sectors like manufacturing, engineering, and data analytics. As launches become more frequent, cost reductions for placing payloads in orbit could lead to widespread technological advancements, as noted in Get Ready for SpaceX’s Bold Move. This could generate jobs and enhance technological capabilities, contributing to global economic development. -
Inspiration and Education:
The development of Starship is likely to inspire future generations to pursue careers in STEM fields, fostering innovation and technological advancement. This inspirational aspect is crucial for long-term societal progress, as highlighted in discussions about space exploration's broader impacts, such as in Benefits to Humanity - NASA.
Environmental Considerations
While Starship offers environmental benefits through reusability, reducing the need for new rocket production and minimizing space debris, there are concerns about the environmental impact of frequent launches. The use of liquid methane as fuel and the potential for increased launch frequency could have local environmental effects, such as air and noise pollution, as mentioned in SpaceX Starship: an Introduction | Sent Into Space. Balancing these impacts will be crucial, with ongoing debates about the sustainability of space travel, as seen in r/IsaacArthur on Reddit.
Challenges and Future Outlook
Despite its potential, Starship faces several challenges:
-
Development and Testing:
As of March 6, 2025, Starship is still in development, with multiple test flights conducted, including a successful launch on October 13, 2024, where the booster was caught back at the launch pad, as reported in SpaceX's Starship launch a success : NPR. However, earlier tests faced setbacks, such as explosions, indicating the need for further reliability and safety improvements before crewed missions. -
International Collaboration and Governance:
The framework for international cooperation in space governance will be essential to avoid conflicts and ensure equitable sharing of benefits, as discussed in Get Ready for SpaceX’s Bold Move. This includes adherence to space law and managing the growing commercial space industry. -
Long-Term Viability:
The concept of generation ships, while theoretical, is mentioned in Could a Self-Sustaining Starship Carry Humanity to Distant Worlds? | The MIT Press Reader, suggesting Starship could evolve to support long-duration interstellar travel, though this remains speculative and requires significant technological advancements.
Comparative Analysis: Starship vs. Traditional Rockets
To illustrate Starship's potential, consider the following comparison with traditional rockets, based on available data:
| Feature | Traditional Rockets (e.g., Falcon 9) | Starship | |--------------------------|-------------------------------------|------------------------------| | Reusability | Partially reusable (first stage) | Fully reusable (both stages) | | Payload to Orbit | Up to 22.8 metric tons (Falcon 9) | Up to 150 metric tons | | Cost per Launch | Higher due to non-reusability | Significantly lower | | Launch Frequency | Limited by cost and production | Aimed at multiple daily | | Applications | LEO, ISS, satellites | Mars, Moon, global travel |
This table, derived from SpaceX Starship - Wikipedia and SpaceX - Starship, highlights Starship's superior capabilities, particularly in payload and reusability, which are expected to drive its transformative impact.
Conclusion
SpaceX's Starship represents a pivotal advancement in space technology, with the potential to revolutionize space exploration, global transportation, and economic growth. Its benefits for humanity include enabling Mars and lunar colonization, supporting scientific research, and inspiring future generations. While challenges remain, particularly in development and environmental impact, the evidence leans toward Starship being a game-changer, as suggested in How Starship Will Change Humanity Soon. As of March 6, 2025, its successful test flights and ongoing development indicate a promising future, with profound implications for humanity's expansion into space and beyond.
Key Citations
-
@ a296b972:e5a7a2e8
2025-03-06 09:06:10Liebe Annalena (ich duze dich jetzt einfach, von Frau zu Frau),
wer führt jetzt die feministische Außenpolitik fort? Eine Politik, die die ganze Welt so nachhaltig beeindruckt hat.
Viele sagen ja, du hast einen brutalen Angriffskrieg gegen unsere Intelligenz geführt. Nein, du warst die einzige, die auch immer an die armen Kinder gedacht hat. Das war die Diplomatie der Menschlichkeit. Wie oft hast du immer und immer wieder klar ausgesprochen, wie brutal alles ist. Und das ist es ja auch. Deine Vorgänger waren zu technokratisch unterwegs, sie haben sich an Fakten gehalten und vorher überlegt, was sie wem wie sagen können. Aus dir hat dein Herz und nicht der Verstand gesprochen.
Du hast frischen Wind in die Außenpolitik gebracht. Frisch, fromm, fröhlich, frei von der Leber weg hast du es endlich mal anders herum gemacht. Du hast erst geredet und dann gedacht, wenn es nötig war. Das war revolutionär.
Ja, du hast den einen oder anderen Begriff durcheinandergebracht, oder falsch ausgesprochen. Es kommt doch aber auf die Inhalte an, und die hast du klar rübergebracht.
Du hast das ganze Außenministerium mal so richtig wuschig gemacht. Die werden sich umgucken, wenn der brutale Angriffskrieg auf deine einzigartigen Ideen unter einem anderen Minister losgeht.
Deine zeitlose Kleidung, knitterfrei, die hätte doch sicher noch eine weitere Amtsperiode gehalten. Die Kosmetik- und Schminktöpfchen können doch auch noch nicht leer sein. Und du musst auch an deine Visagistin denken, das kann ich dir nicht ersparen, das muss gesagt werden.
Was hättest du noch für Deutschland, für Europa und die Kinder tun können!
Unvergessen vor allem dein authentisches Engagement und das nächtelange Nachdenken über den richtigen Standort von Klos in Afrika. Welcher Genius vor dir hat sich jemals solche wichtigen Gedanken gemacht. Von einer Frau für Frauen. Außen, in der Politik.
Du hast erkannt, dass allein diese Frage größer war, als die gesamte Aufgabe als Außenfeministin. Deutschland im Ausland zu repräsentieren, das ist eine Aufgabe, die ist größer als du selbst. Darum hast du dich auch so zurückgenommen.
Aus jedem Wort von dir sprach die Volks-Wirtschafterin. Menschen, die sich um Außenpolitik kümmern, nennt man Duplomaten. Das hat aber nichts mit einem Schokoriegel oder Tomaten oder Automaten zu tun. Nein, das sind Menschen, die sich um Außenpolitik kümmern.
Zu den wichtigsten Zielen der deutschen Außenpolitik gehört die Wahrung des Friedens auf der Welt. Dank deiner internationalen, fast schon freundschaftlichen Kontakte und deines positiven Einflusses, haben diese mehr auf Frieden geachtet, als du von Ihnen verlangt hast.
Und dann dieser Satz, der sicher in die Geschichte eingehen wird: „Wi ar faiting ä wor ägänst Rascha“. Was für ein Geniestreich, mit dem du den ollen russischen Außenminister, der schon rund 40 Jahre im Amt ist, geprüft hast, ob er wirklich die Nerven hat, die ihm immer nachgesagt werden. Das war Diplomatie im Gold-Standard, höchstes Niveau und doch so einfach verpackt.
Du hast dich Tag und Nacht für Deutschland aufgeopfert, deine Kinder vernachlässigt, bist gar nicht mehr in den Urlaub gekommen. Und deine Ehe ist auch noch in die Brüche gegangen. Du, das tut mir sooooo leid! Du hast Opfer gebracht, darum ist auch zu verstehen, dass du jetzt keine Lust mehr hast. Soll’n sich doch die anderen auch mal kümmern.
Wie oft bist du falsch verstanden worden, du hast dir doch so viel Mühe gegeben und der Außenpolitik einen femininen Touch verpasst. Das war lange schon mal dringend nötig.
Soll’n sie doch zusehen, wie sie ohne dich klarkommen. Und immer im grellen Scheinwerferlicht zu stehen, ist auch gar nicht gut für den Teint. Das wusste Marlene Dietrich schon.
Das sollen die anderen dir erst mal nachmachen. So zielgenau mit dem Trampolin von einem Fettnäpfchen in das andere zu springen. Dazu gehört Mut und Können, auf so ungewöhnliche, einzigartige und völlig neue Weise auf Missstände aufmerksam zu machen. Wer hätte wahrgenommen, dass du dich auch über skandinavische Bunker informiert hast, wenn du dies nicht mit deiner Hüpfekästchen-Einlage so eindringlich gezeigt hättest.
Warum hast du erst jetzt darüber nachgedacht, was es bräuchte, damit du aufhörst. Du hättest schon ganz zu Anfang merken können, dass man dich nicht versteht. Keiner hat wirklich erkannt und zu schätzen gewusst, was du wirklich willst. Keiner hat verstanden, was du denkst.
Vielleicht findest du jetzt mal endlich Zeit, auf den Spuren deines Großvaters zu wandeln. Mach das, so lange es noch möglich ist. Wie schnell kann es passieren, dass der Russe vor deiner Tür in Brandenburg steht, und du sprichst noch nicht einmal russisch.
Später dann, könntest du vielleicht doch ein Parfüm auf den Markt bringen. „Bacon of Hope“, in einem Flacon, der wie der Hope-Diamant aussieht. Das würde zu dir passen.
Und vielleicht kannst du auch mal in Wuppertal vorsprechen und Werbung machen. Die bauen da doch den Kobald-Staubsauger. Telogen bist du ja.
Ach, da wären noch so viele tolle Ideen. Und Außen-Dings zu sein, ist eigentlich gar kein so schöner Job, wenn man richtig überlegt. Ständig hin und her fliegen und dann geht der Flieger nicht, oder er ist kaputt. Das ist doch auf die Dauer echt nervig.
Und wie die dich da in Syrien abgekanzelt haben. Dumme Jungs eigentlich, die so überhaupt nichts von Feminismus verstehen, aber mach dir nichts draus, da hast du haushoch drübergestanden.
Dann war da noch das künstliche Aufregen über ein paar Grad mehr oder weniger. Ob nun 360 oder 180 Grad, was macht das schon? Da sieht man mal wieder, wie kleinlich die Leute sind, wo es doch auf den Kern ankommt, aber den haben sie alle nicht verstanden.
Peinlich war allerdings, da muss man ehrlich bleiben, und das sag ich dir jetzt ganz im Vertrauen, peinlich war dein Versprecher mit den Hunderttausenden von Kilometern. Warum hast du nie gesagt, dass du ja eigentlich Zentimeter meintest. Du hast das nie korrigiert. Das hätte so schnell aus der Welt sein können.
Immer haben sie an dir was zu meckern gehabt. Du hast dir die Mühe gemacht, in die Südsee zu fliegen, hast dich mitten in den Ozian gestellt, hast allen gezeigt, wie die Grabsteine unter Wasser stehen und dann macht dir irgend so ein ruchloser Depp das alles kaputt, in dem er behauptet, dass sich nicht der Meeresspiegel erhöht, sondern das Land abgesenkt hat. Das war echt gemein. Wir sehen doch überall, dass sich das Klima schneller wandelt, als die Mode.
Du bist einfach durch und durch grün, bis hinter die Ohren, sozusagen eine Vollblut-Grüne. (Ich weiß, Blut ist eigentlich blau, aber du weißt schon, was ich damit sagen will).
Also, mach mal Pause, und du kannst ja vielleicht später noch einmal Volks- oder Wirtschaftsministerin werden. Das Zeug dazu hast du ja. Und feministische Wirtschaftspolitik könnte auch ganz spannend werden. Den Habeck würdest du da locker in die Tasche stecken.
Das kannst du alle Male besser. Wo der doch von den Schweinen und Hühnern kommt.
Und wenn eine die Fressefreiheit hochgehalten hat, dann du! Für uns, für Deutschland und Europa.
Aber ich will dich nicht belabern. Bleib so, wie du bist und chill mal so richtig ab. Und wenn du mal ein paar Schminktipps brauchst, und die Visagistin dir privat zu teuer ist, dann melde dich gerne. Wir können dann ja mal einen Mädchen-Tag einlegen.
Also, mach’s gut, bleib anständig, denk nicht mehr an die Kokaine und relax und ärger dich nicht. Deutschland hat dich einfach nicht verdient.
-
@ a012dc82:6458a70d
2025-03-06 08:28:23In a groundbreaking move that could significantly alter the investment landscape, Harvest Fund Management, a prominent Chinese asset manager, has boldly stepped forward with an application for a spot Bitcoin exchange-traded fund (ETF) in Hong Kong. This initiative is not just a leap towards diversifying investment options but also a testament to the evolving acceptance and integration of digital assets into the mainstream financial ecosystem.
Table of Contents
-
Introduction to Spot Bitcoin ETFs
-
Harvest Fund's Strategic Move
-
The Significance for Hong Kong
-
Regulatory Landscape and Stablecoin Interest
-
The Road Ahead
-
Conclusion
-
FAQs
Introduction to Spot Bitcoin ETFs
Spot Bitcoin ETFs represent a bridge between the traditional financial world and the burgeoning realm of cryptocurrencies. By mirroring the current market price of Bitcoin, these ETFs offer investors a straightforward path to participate in the cryptocurrency market without the direct ownership of Bitcoin. This eliminates the need for investors to engage with cryptocurrency exchanges or secure digital wallets, thereby lowering the entry barriers to the Bitcoin market. The significance of spot Bitcoin ETFs extends beyond convenience; they are a symbol of the growing legitimization of cryptocurrencies as a viable asset class. By being listed on conventional stock exchanges, these ETFs are subjected to regulatory scrutiny and standards, offering a layer of security and transparency that is sometimes questioned in the crypto space. This development could potentially attract a new wave of institutional and retail investors, who have been on the sidelines due to concerns over regulatory clarity and the technical challenges associated with cryptocurrency investments.
Harvest Fund's Strategic Move
Harvest Fund Management's application for a spot Bitcoin ETF is a calculated strategic move, positioning the firm at the forefront of financial innovation in Hong Kong. By aiming to launch the city's first such ETF, Harvest Fund is not merely expanding its product lineup but is also contributing to the legitimization and institutionalization of Bitcoin as an investable asset. This pioneering effort reflects a deep understanding of market dynamics and a vision for the future of investment, where digital and traditional assets coexist within regulated frameworks. The initiative by Harvest Fund could catalyze a shift in investor sentiment, encouraging more conservative players to consider the potential of Bitcoin and other cryptocurrencies. Furthermore, it sets a benchmark for product innovation and regulatory compliance, potentially influencing the pace and direction of cryptocurrency adoption across the financial sector. As the first mover, Harvest Fund could enjoy a competitive advantage, capturing significant market share among investors eager to explore digital assets within a regulated environment.
The Significance for Hong Kong
Hong Kong's financial landscape is on the cusp of transformation, with Harvest Fund's application signaling a broader trend towards the acceptance of digital assets. This move comes at a pivotal moment, as Hong Kong seeks to assert itself as a global hub for cryptocurrency and blockchain technology. The interest from approximately 10 fund companies in launching their own spot crypto ETFs underscores the city's potential to lead in the virtual asset space. This collective momentum could significantly enhance Hong Kong's attractiveness as a financial center, drawing in global investors looking for regulated avenues into the cryptocurrency market. The introduction of spot Bitcoin ETFs would not only diversify the city's financial products but also reinforce its reputation as a jurisdiction that balances innovation with investor protection. By providing a structured and regulated framework for cryptocurrency investments, Hong Kong can set a global standard for how financial centers can adapt to the evolving landscape of digital assets. This development is a key step in the broader journey towards integrating cryptocurrencies into the global financial system, with Hong Kong leading the way.
Regulatory Landscape and Stablecoin Interest
The enthusiasm for spot Bitcoin ETFs in Hong Kong is paralleled by an equally significant interest in stablecoins, indicating a comprehensive approach to cryptocurrency regulation and adoption. The discussions between the HKMA and various companies about stablecoin trials reflect a proactive stance towards understanding and integrating digital currencies in a way that supports financial stability and innovation. This balanced approach is crucial, as stablecoins represent a bridge between traditional fiat currencies and cryptocurrencies, offering the potential for more efficient payment systems and financial services. The regulatory efforts around stablecoins, coupled with the move towards spot Bitcoin ETFs, show Hong Kong's commitment to creating a robust framework for digital assets. This not only enhances the city's competitive edge as a financial hub but also provides a blueprint for other jurisdictions navigating the complexities of cryptocurrency regulation. By leading in both areas, Hong Kong is positioning itself at the forefront of financial innovation, setting the stage for a future where digital and traditional finance converge seamlessly.
The Road Ahead
The initiative by Harvest Fund Management to launch a spot Bitcoin ETF in Hong Kong marks the beginning of a new era in cryptocurrency investment. This move is more than just an expansion of the financial products available to investors; it is a signal of the maturing relationship between the cryptocurrency industry and the broader financial community. As regulatory frameworks continue to evolve and more players enter the market, the landscape for cryptocurrency investment is set to undergo significant changes. Hong Kong's role in this transition cannot be understated. By fostering an environment that encourages innovation while ensuring investor protection, the city is not just adapting to the rise of digital assets but is actively shaping the future of finance. The success of Harvest Fund's application and the subsequent launch of the city's first spot Bitcoin ETF could serve as a catalyst for other financial centers to follow suit, potentially leading to a global shift in how cryptocurrencies are perceived and utilized within the investment world.
Conclusion
Harvest Fund Management's bold step towards launching a spot Bitcoin ETF in Hong Kong is a landmark moment in the integration of digital assets into mainstream finance. This initiative not only opens up new avenues for investment but also underscores Hong Kong's ambition to be at the forefront of financial innovation. As the regulatory landscape evolves and the market for digital assets continues to grow, the efforts of Harvest Fund and like-minded institutions will be crucial in bridging the gap between traditional finance and the digital asset world. The path ahead is promising, and Hong Kong's leadership in this space could pave the way for a new chapter in the global financial narrative, where digital and traditional assets coexist in a regulated, dynamic, and inclusive investment ecosystem.
FAQs
Who has filed for the first spot Bitcoin ETF in Hong Kong? Harvest Fund Management, a major Chinese asset manager, has filed an application for the first spot Bitcoin ETF in Hong Kong with the Securities and Futures Commission (SFC).
Why is a spot Bitcoin ETF significant for investors? A spot Bitcoin ETF provides a regulated, accessible, and potentially less risky way for investors to gain exposure to Bitcoin's price movements without dealing with the complexities of cryptocurrency exchanges, digital wallets, and private keys.
How does a spot Bitcoin ETF work? A spot Bitcoin ETF buys and holds actual Bitcoin, and the value of the ETF shares fluctuates with the real-time price of Bitcoin. Investors can buy and sell these shares through traditional stock exchanges.
What are the benefits of investing in a spot Bitcoin ETF? Investing in a spot Bitcoin ETF offers the benefits of trading and owning a stock, including regulatory protection, ease of access, and liquidity, while also providing exposure to Bitcoin's price.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co/
Youtube: @thebitcoinlibertarian
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
Get Orange Pill App And Connect With Bitcoiners In Your Area. Stack Friends Who Stack Sats link: https://signup.theorangepillapp.com/opa/croxroad
Buy Bitcoin Books At Konsensus Network Store. 10% Discount With Code “21croxroad” link: https://bitcoinbook.shop?ref=21croxroad
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ 1c19eb1a:e22fb0bc
2025-03-06 07:52:32It's been barely two years since I joined Nostr on my main npub, nostr:npub1kun5628raxpm7usdkj62z2337hr77f3ryrg9cf0vjpyf4jvk9r9smv3lhe, and in just that relatively short time, the amount of development on top of this protocol has been staggering. When nostr:npub1sg6plzptd64u62a878hep2kev88swjh3tw00gjsfl8f237lmu63q0uf63m first opened the floodgates of adoption by tweeting about Nostr, it felt like most of the available clients were barely serviceable and held together with a prayer and copious amounts of duct tape. Of course, it can sometimes still feel that way, but there are definitely some Nostr apps looking and feeling more polished and providing true innovation when compared with legacy social platforms. Indeed, there are a growing number of Nostr-based applications and tools that have very little to do with social media at all.
One thing we have not had available to the growing Nostr community, and those considering joining it, is a source for application reviews that is thorough, approachable, knowledgeable, and balanced. This is what I hope to begin to provide through this new npub dedicated to reviewing as many of the Nostr clients, apps, and tools as I possibly can, so you the reader can determine which ones will fit your needs, and perhaps help you find new ones you had never heard about.
One of the best parts about Nostr is the portability of your identity and social graph, allowing users to log into any Nostr-based application with their same "account" without some centralized tech giant like Google or Apple owning who you are and all of your data. Leverage this super-power of Nostr with me as we explore the best applications and tools the intrepid developers building on this platform have cooked up.
What will you review?
My choice of applications to review will be based on a few factors.
First, I will only be reviewing applications that have a production release, or are otherwise considered production ready by the developer. nostr:npub1xtscya34g58tk0z605fvr788k263gsu6cy9x0mhnm87echrgufzsevkk5s, you won't have to worry that I will be putting NoteDeck under the microscope while it is still very much in alpha. All of us who love to try the new clients as soon as they are available understand well enough that there will be plenty of bugs, UI quirks, and rough edges to look past.
Second, I will generally be reviewing applications that are meant to be user-facing for the average person. That is, apps that your normie friends might soon be using, and then asking you why they can't edit anything they post. I will not be doing reviews of various relay implementations, for instance, unless they are designed to be approachable to the average user to install and manage. nostr:npub10npj3gydmv40m70ehemmal6vsdyfl7tewgvz043g54p0x23y0s8qzztl5h, your project might just be a notable exception.
Third, my reviews will be limited by the operating systems I have available to me at the time. Sorry folks over on iOS, Mac, and Windows. I will only be able to review apps I can run on Android, Linux, or my web browser for the time being.
How will the apps be rated?
I want to be thorough in my reviews, and yet avoid overloading my readers with information they don't care about. In order to attempt to achieve this, I will break my reviews into several sections, so readers can skip to the sections relevant to their interests.
First, I will provide a basic overview of the type of application I am reviewing, what it is trying to achieve, and why a user might want to try it out.
Next, I will give my overall impression of the application. The good, the bad, and the ugly, as it were, so that those who just want a brief rundown can get the TLDR right out the gate and be on their way.
Then we will begin diving into the nitty-gritty with an in depth look at the main features of the application. What it does well. What features seem lacking. What expected features are absent. What features make it unique and set it apart from other applications with a similar purpose.
For the sake of all the baby Nostriches out there, the next section will be an assessment of how approachable the application would likely be to a normie who is coming to Nostr with no idea what a public and private key are, what relays are, or why they might want to start interacting here instead of on a legacy equivalent. What would someone used to Twitter think of #Snort? What would someone used to Spotify think of #Fountain or #Wavlake?
The next section will be a review of the application's UI. The design and polish. How easy it is to find the things you want in the areas you would expect them. In short, how well the application achieves the goal of making the user feel at home and want to continue using the app just through quality UI design.
If you know me and my contstant harping on developers to include various forms of external signing, it should be no surprise to you that the next section will cover login options. What does the sign-in and sign-up flow look like, and does the user have to expose their private key to the application in order to use it?
A review of virtually any Nostr application would be incomplete without a section dedicated to zap integration. How prominent is zapping in the app? How easy is it to zap or start receiving zaps? Are zaps displayed in a way that encourages users to compete to be top zapper? Is Nostr Wallet Connect supported for using external wallets for one-tap-zapping?
Most Nostr applications, even "other stuff" clients, are designed to present some form of content to the user. The next section will cover how easy it is for the user to find the type of content they may be interested in, or to discover content they didn't know they might be interested in. For social clients, how easy is it to discover other users that they might want to follow?
The backbone of the protocol is the interplay between clients and relays, and the next section of the review will cover how the app manages relays. Are they hidden from the user? Are there sensible defaults? Can users who want to do so select the relays they prefer? Does the app respect relays the user has selected in other apps, or are the app's relays independent of those selected in other apps. Worse, does the app overwrite your selected relays with its defaults?
Finally, I will scour the #AskNostr feed for questions and comments from other users about the app under review to get more perspectives than just my own. What are the common pain-points other users are having? What do they love about the app? What features would they like to see added?
Are there other sections you would like to see me add before I start dropping reviews? Get them to me soon, because I am currently taking notes for my first review, which will be the #Primal #Android client!
PV 🤙
-
@ 878dff7c:037d18bc
2025-03-06 06:49:59Overview
Cyclone Alfred, currently a Category 2 storm, is approaching Australia's east coast, particularly targeting Queensland and northern New South Wales. The cyclone's landfall has been delayed, now anticipated between Friday and Saturday. Authorities have implemented extensive safety measures, including closing schools, halting public transport, and issuing evacuation orders. Residents are advised to prepare for heavy rainfall, strong winds, and potential flooding.
(Photo courtesy of Sean. Thanks Sean, it was the only on-location photo you sent ;). Stay safe!)
Resources
TROPICAL CYCLONE FORECAST TRACK MAP
Redland City Council Emergency Dashboard - Thanks Michael! Stay safe!
News
Lismore Braces for Major Flooding as Cyclone Alfred Approaches
Summary:
Lismore is on high alert for potential major flooding due to Cyclone Alfred. Water levels have already reached 1.23 meters even before the cyclone's full impact. NSW Premier Chris Minns described the cyclone as an "unwanted house guest," warning of extended damages from heavy rains and strong winds. Over 2,000 SES volunteers and various emergency services are deployed to ensure public safety, with 24 areas under 'prepare to evacuate' orders. Mayor Steve Krieg acknowledged the community's trauma from the 2022 floods but praised early preparations. Councillor Harper Dalton-Earls noted the community's improved preparedness, though concerns over the buyback process and flood-proofing strategies remain. Authorities emphasize the importance of heeding warnings and taking safety measures ahead of the storm.
Sources: The Daily Telegraph - March 6, 2025
Schools Closed and Public Transport Halted as Cyclone Alfred Nears
Summary:
Tropical Cyclone Alfred is approaching the eastern coast of Queensland, bringing strong winds and heavy rain. Brisbane is expected to experience significant impacts, including potential widespread flooding, as the cyclone is predicted to become the first to hit the area since 1974. Authorities have taken precautionary measures by shutting down 940 schools and halting public transportation. Residents are stocking up on essentials, and a shortage of sandbags has led to the use of potting mix as an alternative. With winds already affecting parts of the coast and rivers rising, emergency teams are preparing for potential evacuations. The prime minister reassured that the government is ready to support affected regions, as strong winds and high tides continue to pose challenges.
Sources: Associated Press - March 6, 2025
Trio on Jet Ski Rescued Amid Cyclone Alfred's Rough Conditions
Summary:
Three individuals on a jet ski sparked an extensive rescue operation near Noosa North Shore, Queensland, after becoming stranded in rough conditions and activating a flare. The rescue involved the Noosa Coast Guard and lifeguards who faced challenging weather due to Cyclone Alfred's approach. Despite the dangerous situation, the trio was safely retrieved, with two being brought back by a lifeguard and the third by the coast guard. The Noosa Coast Guard Flotilla Commander criticized the decision to venture out during the cyclone warning, noting that none of them had mobile phones for communication. Fortunately, all three individuals were unharmed. Separately, a man in his 60s suffered a significant arm injury after falling from a roof onto a pool fence at Little Cove, Noosa, and was taken to Sunshine Coast University Hospital in stable condition.
Sources: The Courier-Mail - March 6, 2025
Adelaide Flights Grounded as Cyclone Alfred Approaches Queensland
Summary:
Numerous Adelaide flights to and from Brisbane have been grounded due to the approach of Tropical Cyclone Alfred. Only a few morning departures and afternoon arrivals are proceeding on Thursday. Adelaide Airport confirmed the cancellation of all flights departing for Brisbane after 10:10 am and all arrivals from Brisbane after 4:20 pm. This follows an earlier announcement canceling all flights between Adelaide and Gold Coast for the day. Passengers are advised to check with their airlines for updates regarding Friday flights. Virgin Australia is offering free rescheduling within 14 days for affected travelers, and Qantas and Jetstar passengers are being offered travel credits and fee waivers for date changes. The cyclone, the first to hit the region in 50 years, may strengthen before making landfall late Friday or Saturday morning. Travelers are advised to monitor the situation closely and contact airlines if impacted.
Sources: The Advertiser - March 6, 2025
Over 265 Schools Closed in Northern NSW as Cyclone Alfred Intensifies
Summary:
Cyclone Alfred is set to bring severe weather to Northern NSW, prompting the closure of over 265 schools, including public, Catholic, and independent schools, as well as TAFE campuses. The Bureau of Meteorology has predicted gale-force winds, damaging gusts, and potential storm surges which could lead to dangerous flooding. Residents have been advised to prepare for evacuation, especially in low-lying areas, with potential rainfall up to 400mm and winds reaching 150km/h. State Emergency Operations Controller Peter Thurtell emphasized the seriousness of the situation, urging caution. Education Minister Prue Car stated that the school closures, effective through Friday, prioritize safety despite not being an easy decision. As the cyclone may intensify to a Category 3 before landfall in South East Queensland, authorities are actively monitoring for updates and preparing evacuation centers.
Sources: The Daily Telegraph - March 6, 2025
Residents Capture Dramatic Footage as Cyclone Alfred Approaches
Summary:
A dramatic video shared on TikTok shows water inundating Currumbin Alley south of Palm Beach due to Tropical Cyclone Alfred, which has caused flash floods sweeping away cars and crossing roads. Residents of the Gold Coast are preparing for the cyclone's arrival, anticipated to reach category two by Friday or Saturday. However, some people still visit the iconic beaches despite authorities' warnings about dangerous conditions. A 12.3-meter wave, the highest recorded, has been monitored. A 78-year-old woman was swept by a large wave and suffered a head injury, being transported to Gold Coast University Hospital. Acting Mayor Donna Gates has urged residents to stay away from the beaches due to the risks posed by Cyclone Alfred.
Sources: news.com.au - March 6, 2025
Concerns Rise as Cyclone Alfred Slows Down, Potentially Strengthening
Summary:
Tropical Cyclone Alfred, currently a category 2 storm, has slowed down and is traveling westwards at 10 km/h. Initially expected to make landfall late Thursday, it is now forecasted to hit the Queensland coast early Saturday morning. There are concerns it could strengthen to category 3. Significant impacts are already being felt from Coolangatta to Ballina, NSW. Evacuation centers are opening, schools and public transport are shut down, and grocery stores in affected areas of Queensland will close starting Thursday. Authorities remain vigilant as they continue to monitor the situation.
Sources: news.com.au - March 6, 2025
Flight Suspensions in Brisbane and Gold Coast as Cyclone Alfred Intensifies
Summary:
Cyclone Alfred is expected to hit the Queensland coastline by early Saturday morning, bringing damaging winds, heavy rainfall, and significant coastal erosion. As a proactive measure, Qantas, Jetstar, and Virgin have suspended flights at Brisbane and Gold Coast airports. The cyclone, categorized as either 1 or 2, has already caused wind speeds up to 98 km/h and has delayed its landfall, prolonging adverse conditions. Significant rainfall has been recorded, prompting concerns about major flooding and property damage, which could cost billions. Authorities have mobilized emergency services and the Australian Defence Force, activated evacuation centers, and distributed sandbags as the cyclone approaches. People living in the affected regions are advised to stay home and avoid travel.
Sources: The Courier-Mail - March 6, 2025
-
@ da0b9bc3:4e30a4a9
2025-03-06 06:35:31Hello Stackers!
Welcome on into the ~Music Corner of the Saloon!
A place where we Talk Music. Share Tracks. Zap Sats.
So stay a while and listen.
🚨Don't forget to check out the pinned items in the territory homepage! You can always find the latest weeklies there!🚨
🚨Subscribe to the territory to ensure you never miss a post! 🚨
originally posted at https://stacker.news/items/905374
-
@ 732c6a62:42003da2
2025-03-06 06:00:53De acordo com a Forbes, a Ripple (Empresa responsável pela Criptomoeda XRP) tem financiado e apoiado campanhas contra a mineração de Bitcoin.
Por que Ripple faz propaganda anti-bitcoin?
Simples: eles são o oposto do Bitcoin em quase tudo. Enquanto o Bitcoin foi criado para ser descentralizado, resistente à censura e independente de instituições, o Ripple é basicamente um serviço bancário 2.0. Eles precisam atacar o Bitcoin para justificar sua própria existência.
O que você não sabe:
- Ripple Labs controla a maioria do XRP: Eles têm um estoque estratégico que pode ser liberado no mercado a qualquer momento. Isso é o oposto de descentralização.
- XRP não é uma moeda para "pessoas comuns": Foi criada para bancos e instituições financeiras. Basicamente, é o "banco central" das criptomoedas.
- Ripple não é blockchain no sentido tradicional: Eles usam um protocolo chamado Ripple Protocol Consensus Algorithm (RPCA), que é mais rápido, mas menos descentralizado.
Os principais ataques do Ripple ao Bitcoin:
- Anti-mineração: O Ripple critica o consumo de energia do Bitcoin, mas esquece que seu próprio sistema depende de servidores centralizados que também consomem energia.
- Anti-reserva estratégica: O Ripple tem um estoque gigante de XRP, mas critica o Bitcoin por ser "deflacionário". Hipocrisia? Nunca ouvi falar.
- Anti-descentralização: O Ripple prega que a descentralização do Bitcoin é "ineficiente", mas o que eles realmente querem é manter o controle nas mãos de poucos.
Análise Psicológica Básica (para você que acha que XRP é o futuro):
- Síndrome do Underdog: Acha que apoiar o Ripple te faz um rebelde, mas na verdade você está torcendo para o sistema bancário tradicional.
- Viés de Confirmação: Só ouve opiniões que validam sua decisão de comprar XRP.
- Efeito Dunning-Kruger: Acha que entender Ripple te torna um especialista em criptomoedas, mas não sabe o que é um hard fork.
Estudo de Caso (Real, mas Você Vai Ignorar):
Carlos, 30 anos, comprou XRP porque "é o futuro das transações bancárias". Ele não sabe que o Ripple está sendo processado pela SEC por vender XRP como um título não registrado. Carlos agora está esperando o "pump" que nunca vem.Conclusão: ou, "volte para a aula de economia do ensino médio"
Ripple não é o futuro das finanças. É só mais um player tentando lucrar em um mercado competitivo. E sua propaganda anti-Bitcoin? Essa só prova que a descentralização assusta quem quer controle. Agora vá estudar blockchain básico — ou pelo menos pare de compartilhar memes com erros de português.
-
@ 732c6a62:42003da2
2025-03-06 04:33:48De ''Dialética do Oprimido'' a ''Like do Oprimido'': A Queda Livre do Debate que Nunca Existiu.
A moda do momento
Fiquei aproximadamente 8 meses sem ter acesso a nenhum dispositivo. Quando consegui novamente o acesso ao smartphone, percebi algo diferente no debate político brasileiro: enquanto a direita estava se engajando em incontáveis números de curtidas e compartilhamentos com memes que demonstravam críticas ao governo e aos seus ainda poucos apoiadores que se humilham para defender o indefensável, a esquerda radical repetia sua imposição intelectual em comentários de vários posts, incluindo textos, vídeos e tweets com frases semelhantes a "vai ler um livro de história" "nunca leu um livro", "eu estou do lado certo da história" e "se eu fosse irracional eu seria de direita". Tudo isso pra tentar passar uma mensagem de que a história é de esquerda. A tese é: será que eles realmente são tão inteligentes como juram?
Fatos que ignoram enquanto cospem jargões do "lado certo da história":
1. A esquerda também tem seus terraplanistas: Anti-vaxxers de organicafé, terraplanistas do gênero, e os que acham que a Coreia do Norte é uma democracia.
2. Viés de confirmação não é monopólio da direita: Eles compartilham estudos "científicos" do Medium como se fossem peer-reviewed, mas desdenham de dados que contradizem sua narrativa.
3. A direita não é um monolito: Tem desde ancaps que calculam até a última casa decimal até bolsominions que acham que a Terra é plana. Generalizar é... bem, irracional.Estudo de Caso (Fictício, mas Verdadeiro):
Larissa, 23 anos, posta sobre "ciência e razão" enquanto defende horóscopo como "ferramenta de autoconhecimento". Acredita que o capitalismo causa depressão, mas não sabe o que é taxa Selic. Larissa é você após três caipirinhas.A Imposição intelectual que ninguém pediu (mas todos recebem de graça)
A esquerda brasileira, em sua cruzada épica para salvar o mundo dos "fascistas que ousam discordar", adotou uma nova estratégia: transformar complexidade política em slogans de camiseta de feira. A frase "se eu fosse irracional, seria de direita" não é original — é plágio descarado da cartilha do Complexo de Deus em Oferta no AliExpress.
O Quebra-Cabeça da superioridade Auto-Delirante
A tese esquerdista se sustenta em três pilares frágeis:
1. A falácia do "lado certo da história": Como se história fosse um jogo de futebol com narração do João Cléber.
2. A ilusão de que citar Foucault = ter QI elevado: Spoiler: decorar "biopoder" não te torna imune a acreditar em astrologia.
3. A crença de que volume de texto = profundidade: 15 parágrafos no Twitter não equivalem a um semestre de Ciência Política.Dado Cruel: Um estudo da Universidade de Cambridge (2022) mostrou que extremistas de ambos os lados cometem erros lógicos similares. A diferença? A esquerda usa palavras mais bonitas para mascarar a burrice.
A hipocrisia do "nunca tocou em um livro" (enquanto compartilham resumo de livro no TikTok)
A acusação preferida — "você não lê!" — esconde uma ironia deliciosa:
- 72% dos "intelectuais de rede social" citam livros que nunca leram além do título (Fonte: Pesquisa Informal do Twitter, 2023).
- Obras citadas como troféu: "1984" (para chamar Bolsonaro de Big Brother), "O Capital" (para justificar o NFT da Gal Gadot), e "Feminismo para os 99%" (para atacar homens heterossexuais que usam sandália de dedo).Pergunta Incômoda: Se ler Marx fosse garantia de racionalidade, por que a União Soviética acabou em pizza (literalmente, considerando a economia deles)?
Quando a autoimagem colide com a realidade (Ou: por que nenhum esquerdista lassa no teste de turing da coerência)
A esquerda adora se pintar como a Última Trincheira da Razão, mas pratica o que critica:
- Exemplo 1: Defendem "ciência" quando convém (vacinas), mas abraçam pseudociência quando é trendy (cristais energéticos contra o capitalismo).
- Exemplo 2: Chamam a direita de "terraplanista", mas acham que inflação se resolve com tabelamento estatal — a versão econômica de "a Terra é sustentada por tartarugas".
- Exemplo 3: Criticam "fake news", mas compartilham teorias de que o agro "envenena a comida" (enquanto comem sushi de supermercado).Frase-Chave: "Racionalidade seletiva é o novo analfabetismo funcional."
Pergunta Final: Se a esquerda é tão racional, por que não usa a "lógica implacável" para resolver algo além do enquadro perfeito de stories no Instagram?
Enfim
O debate "esquerda racional vs. direita irracional" é só mais um episódio da novela "Brasil: O País que Confunde Opinião com Ataque de Ego". Enquanto uns brincam de "quem tem o QI mais alto", o país queima — literalmente, considerando o Pantanal. Talvez a verdadeira irracionalidade seja gastar energia discutindo superioridade moral enquanto o Wi-Fi cai pela décima vez no dia. Racionalidade não tem lado político. Arrogância, por outro lado, é universal. Sua necessidade de se sentir superior só prova que a lacração é o último refúgio dos fracos de argumento. Agora deviam estudar economia básica — ou pelo menos que parem de achar que "Ah, mas o capitalismo!" é um contra-argumento.
Saudade da época em que a esquerda não se fingia de intelectual.
-
@ 6b0a60cf:b952e7d4
2025-03-06 02:45:45とあるSNSで海外の相互さん(以降、Aさんと呼ぶ)からDMで相談されたことがあって、思ったことをつらつらと書いてみる。
非公開の場での相談なので多少ぼかしを入れるけど。事の経緯
発端は、Aさんの友人が作品に日本人作者の素材を使用しようとしていて、その利用規約を翻訳して読んだらうまく翻訳されなくて理解が正しいのかわからない、なので間違いが無いか確認してほしい、という相談だった。
あー、確かに日本語特有の回りくどい表現があるねー、と思いながらバシッと簡潔に意訳してお伝えしたところ、スッキリ理解していただけたらしく一件落着となった。独自ライセンス文化
しかしまあ、創作界隈における作品・素材の利用規約というものは総じて長くて細かい。
ジャンルによるのかもしれないけれど。
自分は絵や音を創ることは無いがプログラムのコードを書く趣味はあるのでプログラム向けのライセンスを利用している。MITとかGPLとかいうやつ。
創作向けであればCCライセンスが適しているだろう。しかしこれがなかなか広まらない。
杓子定規のライセンスでは表しきれないような特別な希望があるのだろう。
そして独自ライセンスが跋扈することとなる。NO MORE 映画泥棒
特に気になるのが、「泥棒をしてはいけません」レベルの注意書きが散見されるのだ。
わざわざライセンスに書くことではない。あなたが警告するまでもなく、違法な行為は処罰される。
でも、たぶん効果があるからこういうのが広まるのだろう。
「泥棒してはいけないって書いてないから泥棒しました」というレベルの利用者が存在するのだろう。
そういう人は書いてあっても読んでないか、理屈をこねて泥棒するんだろうと思うけれども。その術はオレに効く
で、そういう警告文が魔除けの札のごとくびっしり貼られていると、こちらにやましい心が無くても、ちょっとこの素材は利用しないほうがよさそうだな……と思って引き返してしまうことがある。
SNSで可愛い絵を見て、作者さんをフォローしようと思ったら「無断転載禁止」みたいなのがプロフにずらずら書いてあって「おっと……」みたいに引き返すことがあるが、それに似ている。
きっと過去によくない体験をしてしまって、そのようにプロフに書くことでそれが改善するという実体験があって、そうなっているのだろうと推測している。異文化の壁を超えて
冒頭で話したAさんはきわめて紳士的な方であり、日本文化に対してもよく理解しようと努めてくれるので、話が通じやすくて助かったし、件の素材についても臆すること無く使用することになりそうだった。
ただ魔除けの札が効かないような魑魅魍魎にはいくら札を貼っても意味がないし、実際の悪魔祓いの効果と善良な利用者をも祓ってしまう機会損失(?)を比べて合理的なのだろうか、と考えたりしたのでした。オチは無い。ライセンス
この文章は CC0 1.0 でライセンスします。
Nostrイベントとして公開する以上はNIPsに従う範囲内で自由に利用されることを望みます。
NIPsに違反したご利用は他のクライアントの利用者にご迷惑になるのでご遠慮いただくことを希望します。^1 -
@ a63655ce:05240c71
2025-03-06 00:48:46looks really clean.
window.nostr
asked for the key multiple times for some reason -
@ 6e0ea5d6:0327f353
2025-03-06 00:18:09Ascolta, amico mio...
There come moments when a grown man looks in the mirror and fails to recognize himself.
Naturally, when this happens, there is nothing more fitting than lighting a cigarette, pouring a glass of fine wine, and toasting to oneself—the birth of a new man, forged in the womb of a harsh and sobering reality.
One cannot scatter thorns along a path walked barefoot, nor allow the tongue to speak what the mind may later pay for—but this, we learn only through years of suffering.
Only now do I realize that, among all the teachers I have had, experience was the harshest of them all, for it first administered the test and only afterward taught me the lesson.
In peaceful moments, one can reflect more easily on the world around him. Imagine, then, the depths of reflection that can be reached in a state of true inner tranquility.
If you have never gazed upon the horizon, taken in all the fortune before your eyes, and declared to yourself, "I will own all of this!", then you have never possessed true ambition. However, blind ambition will leave you waking up hungry for wealth and power but going to sleep with an empty soul.
Walk always with honor, pride, and loyalty—let these principles never depart from you nor fail to steady your steps. In your battles, do not wish for your enemies to be handed to you on their knees; instead, seek to gain the strength and ruthlessness to bring them down while they stand.
Your greatest dilemma is the eternal paradox in the life of a businessman within the sacred Sicilian organization: how to acquire power and wealth without placing both feet in hell?
Be careful not to surrender to arrogance. The man who shouts his virtues to the wind will, when he falls, hear only the echo of his own pride.
Let your greatest legacy be to live in a way that does not shame your mother and makes your father proud.
Thank you for reading, my friend!
If this message resonated with you, consider leaving your "🥃" as a token of appreciation.
A toast to our family!
-
@ b8851a06:9b120ba1
2025-03-05 23:03:00The U.S. isn't just blocking Gaza's reconstruction—it's ensuring Palestinians have no future there.
This week, Washington rejected the Arab League's $53 billion plan to rebuild Gaza. Not because it was unworkable, but because it was unwanted. #Gaza, they say, is "uninhabitable." The solution? Depopulation, disguised as development.
The Riviera Plan: Rebuilding Without Its People
National Security Council spokesman Brian Hughes put it bluntly:
"Gaza is uninhabitable."
This isn't a call for humanitarian intervention. It's a pretext for forced displacement.
Trump's vision transforms Gaza into a "Riviera of the #MiddleEast"—after its population has been relocated. Officials have explicitly stated Palestinians "would not be allowed to return" once reconstruction begins. This isn't rebuilding; it's replacement.
Regional Consensus Rejected
The Arab League's proposal represented rare unity among regional powers. It offered a detailed roadmap for reconstruction while allowing #Palestinians to remain in their homeland.
By dismissing this plan, Washington sent a clear message: Palestinian self-determination remains subordinate to Western geopolitical interests.
This isn't new. For over a century, Western capitals have determined Palestinian futures while treating their voices as irrelevant.
The Fiat War Machine Connection
War and fiat money go hand in hand. Governments don't fund wars through taxes anymore—it's all printed money. Inflation steals from the public silently, financing endless destruction abroad while citizens struggle at home.
As Saifedean Ammous writes in The Fiat Standard: nostr:npub1gdu7w6l6w65qhrdeaf6eyywepwe7v7ezqtugsrxy7hl7ypjsvxksd76nak
"Central banks are essentially war machines, enabling governments to finance endless conflicts through inflation rather than direct taxation."
This system divorces "economic reward from economic productivity, and instead bases it on political allegiance." The result? A world "perpetually lurching from one crisis to another, with devastating consequences for humanity."
Ukraine Parallels: When Support Is Conditional
The U.S. has now halted military aid to #Ukraine, suspending over $1 billion in arms. #Europe scrambles to fill the gap, suddenly realizing the conditional nature of American protection.
Both conflicts reveal the same truth: geopolitical support is increasingly transactional rather than values-based.
As Henry Kissinger observed: "It may be dangerous to be America's enemy, but being America's friend can be fatal."
The Cycle Continues
The U.S. model is simple: fund destruction, control reconstruction, keep the cycle going.
Fiat money makes it possible. Indifference makes it permanent. And yes #Bitcoin can fix it. But will it?
How long before people wake up #nostr? How long before the cycle breaks?
"Fiat money is a tool for governments to control their citizens" as Saifedean rightly says—and now, through endless war, to control the world.
-
@ f3873798:24b3f2f3
2025-03-05 23:01:12O café faz parte da rotina de milhões de pessoas, seja para despertar pela manhã, acompanhar uma boa conversa ou até impulsionar a produtividade no trabalho. Mas você já parou para pensar na qualidade do café que consome diariamente? Neste artigo, vamos falar sobre os benefícios do café e as diferenças entre o café extraforte e o café especial.
☕ Benefícios do Café no Dia a Dia
O café não é apenas uma bebida saborosa, mas também oferece diversos benefícios para a saúde, como:
Aumento da energia e concentração – A cafeína estimula o sistema nervoso central, ajudando na atenção e no foco.
Melhora do humor – O consumo moderado de café pode estimular a produção de dopamina, contribuindo para uma sensação de bem-estar.
Propriedades antioxidantes – O café é rico em compostos que combatem os radicais livres, ajudando a prevenir o envelhecimento precoce.
Auxílio na digestão – Para muitas pessoas, o café funciona como um leve estimulante do sistema digestivo.
☕ Café Extraforte vs. Café Especial: Qual a Diferença?
Na prateleira do supermercado ou na cafeteria, há uma grande variedade de cafés. Mas, afinal, qual é a diferença entre o café extraforte e o café especial?
☕Café Extraforte
Produzido a partir de grãos de qualidade inferior, muitas vezes misturados com impurezas.
Possui torra muito escura, o que pode mascarar defeitos do grão.
Tem um sabor mais amargo e intenso, muitas vezes com notas queimadas.
Pode ser mais ácido e difícil de digerir para algumas pessoas.
☕Café Especial
Feito com grãos selecionados e de alta qualidade, sem defeitos.
A torra é mais equilibrada, preservando os aromas e sabores naturais.
Possui notas sensoriais diferenciadas (frutadas, achocolatadas, florais, etc.).
Mais suave e menos ácido, proporcionando uma experiência mais agradável ao paladar.
☕ Qual Escolher para o Dia a Dia?
Se você busca praticidade e um café forte, o extraforte pode ser uma opção. No entanto, se quiser aproveitar melhor os benefícios do café e sentir sabores mais ricos, vale a pena investir no café especial. Além disso, moer os grãos na hora e preparar a bebida com métodos como coador de pano, prensa francesa ou Hario V60 pode transformar sua experiência com o café.
-
@ b7b1382e:74635e6c
2025-03-05 22:32:18Abstract
By Lamar Wilson
This white paper examines an alternative taxation framework characterized by three primary components: a uniform 15% flat tax on income, a redistribution mechanism, and a tiered consumption tax structure. The proposed model aims to stimulate economic growth while maintaining social equity through strategic fiscal policy interventions. This paper analyzes the theoretical underpinnings of this approach, its potential macroeconomic implications, distributional effects across income strata, and implementation challenges. The analysis suggests that while the proposed framework offers significant advantages in terms of simplicity and growth incentives, careful consideration must be given to revenue adequacy, wealth concentration effects, and long-term economic sustainability.
1. Introduction
Taxation systems fundamentally shape economic incentive structures, income distribution, and government fiscal capacity. Contemporary tax regimes often reflect accumulated historical policy decisions rather than coherent economic theory, resulting in complex systems with varying degrees of progressivity, efficiency, and equity (Mirrlees et al., 2011). This paper examines a potential alternative taxation framework built upon three pillars: a uniform flat tax, redistribution mechanisms, and stratified consumption taxation.
The theoretical foundation of this approach draws upon both supply-side economics, which emphasizes the importance of investment incentives, and demand-side considerations, which recognize the economic significance of broad-based consumption. By synthesizing these perspectives, the proposed framework attempts to create a self-reinforcing economic cycle wherein simplified taxation stimulates both investment and consumption.
2. Structural Components of the Proposed Framework
2.1 Uniform Flat Income Taxation
The cornerstone of the proposed system is a uniform 15% tax rate applied to income. This component includes two key elements:
-
Individual Taxation: A 15% flat tax applied to gross income across all individual taxpayers, regardless of income level. This approach eliminates tax brackets, deductions, and exemptions that characterize progressive taxation systems.
-
Business Taxation: A parallel 15% flat tax on net business income (profits), allowing for business expense deductions while maintaining a uniform rate across business entities regardless of size, industry, or organizational structure.
The flat tax component represents a significant departure from graduated or progressive taxation systems prevalent in many developed economies. This simplification potentially reduces compliance costs, eliminates bracket-based behavioral distortions, and creates uniform incentive structures across income levels (Hall & Rabushka, 2007).
2.2 Universal Redistribution Mechanism
The second component involves the pooling and redistribution of tax revenue:
-
Collection Aggregation: All tax revenues from both individual and business taxation are consolidated into a unified fiscal pool.
-
Equal Per Capita Distribution: The aggregated tax revenue is redistributed on an equal per capita basis to all individuals within the jurisdiction, functioning as a universal basic income mechanism.
This redistribution mechanism effectively creates a de facto progressive element within the overtly flat system, as redistribution amounts represent a larger percentage of total income for lower-income individuals compared to higher-income individuals (Van Parijs & Vanderborght, 2017).
2.3 Tiered Consumption Taxation
The third component introduces a differentiated consumption tax structure:
-
Essential Goods and Services: A minimal 2% consumption tax applied to essential items including food, healthcare, housing, and utilities.
-
Non-Essential and Luxury Items: A higher consumption tax rate (suggested at 5% or greater) applied to discretionary purchases and luxury goods.
This differentiated approach to consumption taxation acknowledges consumption patterns that vary across income levels, with lower-income households typically allocating a greater proportion of spending to essential goods (Lustig, 2018).
3. Economic Implications Analysis
3.1 Distributive Effects Across Income Levels
3.1.1 Lower-Income Households
The model's impact on lower-income households involves several counterbalancing forces:
- The 15% flat income tax represents a potentially higher nominal rate than many lower-income households currently face under progressive systems.
- The universal redistribution component serves as a direct income supplement, with the amount received likely exceeding tax contributions for this demographic.
- The 2% consumption tax on essentials introduces a modest additional cost on necessary expenditures.
Net analysis suggests that lower-income households would likely experience a positive fiscal impact through this system, as the redistributive component would exceed their combined income and consumption tax obligations (Piketty & Saez, 2013).
3.1.2 Higher-Income Households
For higher-income households, the framework produces different effects:
- The 15% flat income tax rate typically represents a reduction from current progressive tax rates applied to higher income brackets.
- The universal redistribution amount constitutes a proportionally smaller income supplement relative to total income.
- Higher consumption taxes on luxury goods create a de facto progressive element based on discretionary spending patterns.
The net impact on higher-income households would likely be a reduced overall tax burden compared to progressive systems, potentially increasing capital availability for investment (Auerbach & Hassett, 2015).
3.2 Macroeconomic Implications
3.2.1 Investment and Growth Effects
The framework's reduced taxation on higher incomes and business profits theoretically increases capital availability for investment. This aligns with supply-side economic theories suggesting that lower marginal tax rates stimulate economic expansion through:
- Increased business formation and expansion
- Enhanced capital investment
- Improved labor productivity through capital deepening
- Potential innovation stimulation through retained earnings
Empirical research on flat tax implementations in various jurisdictions provides mixed evidence regarding growth effects, with contextual factors playing significant roles in outcomes (Keen et al., 2008).
3.2.2 Demand Stability and Consumption Patterns
The redistribution component creates a consumption floor that may enhance economic stability through:
- Maintaining baseline consumer demand during economic downturns
- Reducing consumption volatility across business cycles
- Supporting broader-based consumption patterns
- Creating demand-side support for business expansion
This mechanism acknowledges the economic significance of broad-based consumption capacity alongside investment incentives (Stiglitz, 2012).
3.2.3 Labor Market Dynamics
The simplified tax structure potentially influences labor market participation through:
- Elimination of high marginal tax rates that may discourage additional work
- Reduced tax-related work disincentives at lower income levels
- Possible increased labor force participation due to simplified income-benefit calculations
- Potential wage effects as businesses retain higher post-tax profits
The framework's impact on labor markets would likely vary across skill levels, industries, and existing labor market institutions (Card & Krueger, 2015).
4. Implementation Challenges and Considerations
4.1 Fiscal Revenue Adequacy
A primary challenge involves ensuring sufficient government revenue, particularly during the transition period:
- The overall tax burden reduction (estimated at approximately 50% compared to current systems) creates potential revenue shortfalls.
- Government spending obligations would require adjustment, postponement, or alternative funding mechanisms.
- Transitional provisions may be necessary to align revenue reductions with spending adaptations.
Potential solutions include phased implementation, temporary supplementary revenue sources, or deliberate acceleration of economic growth to expand the tax base (Auerbach, 2006).
4.2 Wealth Concentration Effects
Despite redistribution mechanisms, the framework may influence wealth concentration dynamics:
- Reduced taxation on higher incomes could accelerate capital accumulation among wealthy individuals.
- Business owners might experience wealth growth exceeding redistribution effects.
- Global investment patterns could divert economic benefits outside the domestic economy.
Addressing these concerns might require calibration of the redistribution component or implementing complementary policies addressing wealth concentration (Piketty, 2014).
4.3 Long-Term Sustainability Considerations
The framework's long-term viability depends on several factors:
- Sustained economic growth sufficient to support government functions with reduced tax rates
- Continued business investment in productive domestic activities rather than financial engineering
- Maintenance of investment-consumption balance to prevent boom-bust cycles
- Evolution of the system in response to changing economic conditions
Supplementary policies supporting research and development, entrepreneurship, and domestic investment may be necessary to ensure the system's sustainability (Acemoglu & Robinson, 2012).
5. Comparative Cost-Benefit Analysis: Proposed System vs. Current Tax Structure
5.1 Compliance Cost Reduction
The current U.S. tax system imposes substantial compliance costs on individuals and businesses that extend far beyond direct tax payments:
- Americans spend approximately 6.5 billion hours annually on tax compliance activities (Taxpayer Advocate Service, 2022)
- The monetary value of compliance time is estimated at $200-400 billion annually (Laffer et al., 2018)
- Businesses spend an estimated $147 billion annually on tax compliance (Tax Foundation, 2021)
- The Internal Revenue Service budget exceeds $13 billion annually for tax administration and enforcement
The proposed flat tax system would dramatically reduce these costs through:
- Elimination of complex deduction and credit calculations (estimated 90% reduction in form complexity)
- Removal of recordkeeping requirements for numerous tax provisions
- Significant reduction in tax planning expenses for both individuals and businesses
- Decreased need for professional tax preparation services
- Streamlined tax enforcement with fewer provisions to interpret and audit
Quantitative analysis suggests that transitioning to the proposed system could reduce overall compliance costs by approximately 70-80%, representing annual savings of $140-320 billion to the U.S. economy (Greenberg, 2020).
5.2 Administrative Efficiency Gains
The current tax administration infrastructure incurs substantial costs:
- The IRS employs approximately 75,000 full-time equivalent positions
- Tax litigation consumes significant judicial resources across multiple court systems
- Regulatory development and guidance require extensive government resources
- Tax enforcement costs represent approximately 35 cents per $100 collected
The proposed system would generate administrative efficiencies through:
- Simplified verification processes requiring fewer personnel
- Reduced need for specialized tax rulings and interpretations
- Lower audit costs due to straightforward compliance requirements
- Streamlined distribution mechanisms leveraging existing payment systems
Conservative estimates suggest administrative cost reductions of 50-60%, representing billions in government savings that could be redirected to essential services or deficit reduction.
5.3 Economic Efficiency Improvements
Beyond direct compliance and administrative costs, the current system creates significant economic distortions:
- Taxpayers make economic decisions influenced by tax considerations rather than underlying economic value
- Complex provisions create market inefficiencies and misallocation of resources
- High marginal rates discourage additional productive activity
- International tax complexities influence global investment decisions
The proposed system addresses these inefficiencies through:
- Uniform treatment of income regardless of source
- Elimination of tax-motivated transaction structures
- Reduced incentives for artificial entity structures
- Simplified international transactions with domestic reinvestment incentives
Economic models suggest these efficiency improvements could increase GDP by 0.5-1.0% annually beyond direct compliance savings (Jorgenson & Yun, 2012).
5.4 Distributional Cost Analysis
The current system's compliance burden falls disproportionately across income levels:
- Lower-income taxpayers spend a higher percentage of their income on tax compliance
- Small businesses face compliance costs estimated at $1,500-$4,000 per employee
- Middle-income taxpayers navigate complex provisions with limited professional assistance
- High-income taxpayers allocate substantial resources to tax planning and compliance
The proposed system redistributes this burden by:
- Equalizing compliance requirements across income levels
- Substantially reducing small business administrative overhead
- Eliminating the need for complex tax planning strategies
- Providing transparent, predictable tax consequences for economic decisions
This redistribution of compliance costs represents an additional progressive element beyond the direct redistribution component, with estimated financial benefits to lower and middle-income households of $300-500 annually in reduced compliance costs.
6. Conclusion
The proposed tripartite taxation framework offers a conceptually coherent alternative to conventional progressive taxation systems. By combining flat income taxation with universal redistribution and differentiated consumption taxes, the approach attempts to simultaneously address supply-side investment incentives and demand-side consumption support.
The theoretical analysis suggests potential advantages in terms of simplicity, economic growth stimulation, and maintenance of social safety net functions. However, significant implementation challenges exist regarding revenue adequacy, wealth concentration effects, and long-term economic sustainability.
Further empirical research, potentially through regional pilot implementations or microsimulation modeling, would enhance understanding of the practical implications of this taxation approach. While the framework presents a promising theoretical model, its successful implementation would require careful calibration to specific economic contexts, thoughtful transition planning, and ongoing adjustment based on observed outcomes.
References
Acemoglu, D., & Robinson, J. A. (2012). Why nations fail: The origins of power, prosperity, and poverty. Crown Business.
Greenberg, S. (2020). Reforming the U.S. tax system: Evidence on economic growth and distribution. American Enterprise Institute.
Jorgenson, D. W., & Yun, K. Y. (2012). Tax reform and the cost of capital. Oxford University Press.
Laffer, A. B., Moore, S., & Williams, J. (2018). The wealth of states: How taxes, energy, and worker freedom change everything. Wiley.
Tax Foundation (2021). The cost of tax compliance. Fiscal Fact No. 512.
Taxpayer Advocate Service (2022). Annual report to Congress. Internal Revenue Service.
Auerbach, A. J. (2006). The choice between income and consumption taxes: A primer. NBER Working Paper Series.
Auerbach, A. J., & Hassett, K. (2015). Capital taxation in the twenty-first century. American Economic Review, 105(5), 38-42.
Card, D., & Krueger, A. B. (2015). Myth and measurement: The new economics of the minimum wage. Princeton University Press.
Hall, R. E., & Rabushka, A. (2007). The flat tax. Hoover Institution Press.
Keen, M., Kim, Y., & Varsano, R. (2008). The "flat tax(es)": Principles and experience. International Tax and Public Finance, 15(6), 712-751.
Lustig, N. (2018). Fiscal policy, income redistribution and poverty reduction in low and middle income countries. Commitment to Equity Handbook.
Mirrlees, J., Adam, S., Besley, T., Blundell, R., Bond, S., Chote, R., Gammie, M., Johnson, P., Myles, G., & Poterba, J. (2011). Tax by design. Oxford University Press.
Piketty, T. (2014). Capital in the twenty-first century. Harvard University Press.
Piketty, T., & Saez, E. (2013). Optimal labor income taxation. Handbook of Public Economics, 5, 391-474.
Stiglitz, J. E. (2012). The price of inequality: How today's divided society endangers our future. W.W. Norton & Company.
Van Parijs, P., & Vanderborght, Y. (2017). Basic income: A radical proposal for a free society and a sane economy. Harvard University Press.
A Tripartite Approach to Fiscal Reform: Analyzing the Economic Impact of a Flat Tax, Redistribution, and Consumption Tax Framework
Author: Lamar Wilson
Abstract
By Lamar Wilson
This white paper examines an alternative taxation framework characterized by three primary components: a uniform 15% flat tax on income, a redistribution mechanism, and a tiered consumption tax structure. The proposed model aims to stimulate economic growth while maintaining social equity through strategic fiscal policy interventions. This paper analyzes the theoretical underpinnings of this approach, its potential macroeconomic implications, distributional effects across income strata, and implementation challenges. The analysis suggests that while the proposed framework offers significant advantages in terms of simplicity and growth incentives, careful consideration must be given to revenue adequacy, wealth concentration effects, and long-term economic sustainability.
1. Introduction
Taxation systems fundamentally shape economic incentive structures, income distribution, and government fiscal capacity. Contemporary tax regimes often reflect accumulated historical policy decisions rather than coherent economic theory, resulting in complex systems with varying degrees of progressivity, efficiency, and equity (Mirrlees et al., 2011). This paper examines a potential alternative taxation framework built upon three pillars: a uniform flat tax, redistribution mechanisms, and stratified consumption taxation.
The theoretical foundation of this approach draws upon both supply-side economics, which emphasizes the importance of investment incentives, and demand-side considerations, which recognize the economic significance of broad-based consumption. By synthesizing these perspectives, the proposed framework attempts to create a self-reinforcing economic cycle wherein simplified taxation stimulates both investment and consumption.
2. Structural Components of the Proposed Framework
2.1 Uniform Flat Income Taxation
The cornerstone of the proposed system is a uniform 15% tax rate applied to income. This component includes two key elements:
-
Individual Taxation: A 15% flat tax applied to gross income across all individual taxpayers, regardless of income level. This approach eliminates tax brackets, deductions, and exemptions that characterize progressive taxation systems.
-
Business Taxation: A parallel 15% flat tax on net business income (profits), allowing for business expense deductions while maintaining a uniform rate across business entities regardless of size, industry, or organizational structure.
The flat tax component represents a significant departure from graduated or progressive taxation systems prevalent in many developed economies. This simplification potentially reduces compliance costs, eliminates bracket-based behavioral distortions, and creates uniform incentive structures across income levels (Hall & Rabushka, 2007).
2.2 Universal Redistribution Mechanism
The second component involves the pooling and redistribution of tax revenue:
-
Collection Aggregation: All tax revenues from both individual and business taxation are consolidated into a unified fiscal pool.
-
Equal Per Capita Distribution: The aggregated tax revenue is redistributed on an equal per capita basis to all individuals within the jurisdiction, functioning as a universal basic income mechanism.
This redistribution mechanism effectively creates a de facto progressive element within the overtly flat system, as redistribution amounts represent a larger percentage of total income for lower-income individuals compared to higher-income individuals (Van Parijs & Vanderborght, 2017).
2.3 Tiered Consumption Taxation
The third component introduces a differentiated consumption tax structure:
-
Essential Goods and Services: A minimal 2% consumption tax applied to essential items including food, healthcare, housing, and utilities.
-
Non-Essential and Luxury Items: A higher consumption tax rate (suggested at 5% or greater) applied to discretionary purchases and luxury goods.
This differentiated approach to consumption taxation acknowledges consumption patterns that vary across income levels, with lower-income households typically allocating a greater proportion of spending to essential goods (Lustig, 2018).
3. Economic Implications Analysis
3.1 Distributive Effects Across Income Levels
3.1.1 Lower-Income Households
The model's impact on lower-income households involves several counterbalancing forces:
- The 15% flat income tax represents a potentially higher nominal rate than many lower-income households currently face under progressive systems.
- The universal redistribution component serves as a direct income supplement, with the amount received likely exceeding tax contributions for this demographic.
- The 2% consumption tax on essentials introduces a modest additional cost on necessary expenditures.
Net analysis suggests that lower-income households would likely experience a positive fiscal impact through this system, as the redistributive component would exceed their combined income and consumption tax obligations (Piketty & Saez, 2013).
3.1.2 Higher-Income Households
For higher-income households, the framework produces different effects:
- The 15% flat income tax rate typically represents a reduction from current progressive tax rates applied to higher income brackets.
- The universal redistribution amount constitutes a proportionally smaller income supplement relative to total income.
- Higher consumption taxes on luxury goods create a de facto progressive element based on discretionary spending patterns.
The net impact on higher-income households would likely be a reduced overall tax burden compared to progressive systems, potentially increasing capital availability for investment (Auerbach & Hassett, 2015).
3.2 Macroeconomic Implications
3.2.1 Investment and Growth Effects
The framework's reduced taxation on higher incomes and business profits theoretically increases capital availability for investment. This aligns with supply-side economic theories suggesting that lower marginal tax rates stimulate economic expansion through:
- Increased business formation and expansion
- Enhanced capital investment
- Improved labor productivity through capital deepening
- Potential innovation stimulation through retained earnings
Empirical research on flat tax implementations in various jurisdictions provides mixed evidence regarding growth effects, with contextual factors playing significant roles in outcomes (Keen et al., 2008).
3.2.2 Demand Stability and Consumption Patterns
The redistribution component creates a consumption floor that may enhance economic stability through:
- Maintaining baseline consumer demand during economic downturns
- Reducing consumption volatility across business cycles
- Supporting broader-based consumption patterns
- Creating demand-side support for business expansion
This mechanism acknowledges the economic significance of broad-based consumption capacity alongside investment incentives (Stiglitz, 2012).
3.2.3 Labor Market Dynamics
The simplified tax structure potentially influences labor market participation through:
- Elimination of high marginal tax rates that may discourage additional work
- Reduced tax-related work disincentives at lower income levels
- Possible increased labor force participation due to simplified income-benefit calculations
- Potential wage effects as businesses retain higher post-tax profits
The framework's impact on labor markets would likely vary across skill levels, industries, and existing labor market institutions (Card & Krueger, 2015).
4. Implementation Challenges and Considerations
4.1 Fiscal Revenue Adequacy
A primary challenge involves ensuring sufficient government revenue, particularly during the transition period:
- The overall tax burden reduction (estimated at approximately 50% compared to current systems) creates potential revenue shortfalls.
- Government spending obligations would require adjustment, postponement, or alternative funding mechanisms.
- Transitional provisions may be necessary to align revenue reductions with spending adaptations.
Potential solutions include phased implementation, temporary supplementary revenue sources, or deliberate acceleration of economic growth to expand the tax base (Auerbach, 2006).
4.2 Wealth Concentration Effects
Despite redistribution mechanisms, the framework may influence wealth concentration dynamics:
- Reduced taxation on higher incomes could accelerate capital accumulation among wealthy individuals.
- Business owners might experience wealth growth exceeding redistribution effects.
- Global investment patterns could divert economic benefits outside the domestic economy.
Addressing these concerns might require calibration of the redistribution component or implementing complementary policies addressing wealth concentration (Piketty, 2014).
4.3 Long-Term Sustainability Considerations
The framework's long-term viability depends on several factors:
- Sustained economic growth sufficient to support government functions with reduced tax rates
- Continued business investment in productive domestic activities rather than financial engineering
- Maintenance of investment-consumption balance to prevent boom-bust cycles
- Evolution of the system in response to changing economic conditions
Supplementary policies supporting research and development, entrepreneurship, and domestic investment may be necessary to ensure the system's sustainability (Acemoglu & Robinson, 2012).
5. Comparative Cost-Benefit Analysis: Proposed System vs. Current Tax Structure
5.1 Compliance Cost Reduction
The current U.S. tax system imposes substantial compliance costs on individuals and businesses that extend far beyond direct tax payments:
- Americans spend approximately 6.5 billion hours annually on tax compliance activities (Taxpayer Advocate Service, 2022)
- The monetary value of compliance time is estimated at $200-400 billion annually (Laffer et al., 2018)
- Businesses spend an estimated $147 billion annually on tax compliance (Tax Foundation, 2021)
- The Internal Revenue Service budget exceeds $13 billion annually for tax administration and enforcement
The proposed flat tax system would dramatically reduce these costs through:
- Elimination of complex deduction and credit calculations (estimated 90% reduction in form complexity)
- Removal of recordkeeping requirements for numerous tax provisions
- Significant reduction in tax planning expenses for both individuals and businesses
- Decreased need for professional tax preparation services
- Streamlined tax enforcement with fewer provisions to interpret and audit
Quantitative analysis suggests that transitioning to the proposed system could reduce overall compliance costs by approximately 70-80%, representing annual savings of $140-320 billion to the U.S. economy (Greenberg, 2020).
5.2 Administrative Efficiency Gains
The current tax administration infrastructure incurs substantial costs:
- The IRS employs approximately 75,000 full-time equivalent positions
- Tax litigation consumes significant judicial resources across multiple court systems
- Regulatory development and guidance require extensive government resources
- Tax enforcement costs represent approximately 35 cents per $100 collected
The proposed system would generate administrative efficiencies through:
- Simplified verification processes requiring fewer personnel
- Reduced need for specialized tax rulings and interpretations
- Lower audit costs due to straightforward compliance requirements
- Streamlined distribution mechanisms leveraging existing payment systems
Conservative estimates suggest administrative cost reductions of 50-60%, representing billions in government savings that could be redirected to essential services or deficit reduction.
5.3 Economic Efficiency Improvements
Beyond direct compliance and administrative costs, the current system creates significant economic distortions:
- Taxpayers make economic decisions influenced by tax considerations rather than underlying economic value
- Complex provisions create market inefficiencies and misallocation of resources
- High marginal rates discourage additional productive activity
- International tax complexities influence global investment decisions
The proposed system addresses these inefficiencies through:
- Uniform treatment of income regardless of source
- Elimination of tax-motivated transaction structures
- Reduced incentives for artificial entity structures
- Simplified international transactions with domestic reinvestment incentives
Economic models suggest these efficiency improvements could increase GDP by 0.5-1.0% annually beyond direct compliance savings (Jorgenson & Yun, 2012).
5.4 Distributional Cost Analysis
The current system's compliance burden falls disproportionately across income levels:
- Lower-income taxpayers spend a higher percentage of their income on tax compliance
- Small businesses face compliance costs estimated at $1,500-$4,000 per employee
- Middle-income taxpayers navigate complex provisions with limited professional assistance
- High-income taxpayers allocate substantial resources to tax planning and compliance
The proposed system redistributes this burden by:
- Equalizing compliance requirements across income levels
- Substantially reducing small business administrative overhead
- Eliminating the need for complex tax planning strategies
- Providing transparent, predictable tax consequences for economic decisions
This redistribution of compliance costs represents an additional progressive element beyond the direct redistribution component, with estimated financial benefits to lower and middle-income households of $300-500 annually in reduced compliance costs.
6. Conclusion
The proposed tripartite taxation framework offers a conceptually coherent alternative to conventional progressive taxation systems. By combining flat income taxation with universal redistribution and differentiated consumption taxes, the approach attempts to simultaneously address supply-side investment incentives and demand-side consumption support.
The theoretical analysis suggests potential advantages in terms of simplicity, economic growth stimulation, and maintenance of social safety net functions. However, significant implementation challenges exist regarding revenue adequacy, wealth concentration effects, and long-term economic sustainability.
Further empirical research, potentially through regional pilot implementations or microsimulation modeling, would enhance understanding of the practical implications of this taxation approach. While the framework presents a promising theoretical model, its successful implementation would require careful calibration to specific economic contexts, thoughtful transition planning, and ongoing adjustment based on observed outcomes.
References
Acemoglu, D., & Robinson, J. A. (2012). Why nations fail: The origins of power, prosperity, and poverty. Crown Business.
Greenberg, S. (2020). Reforming the U.S. tax system: Evidence on economic growth and distribution. American Enterprise Institute.
Jorgenson, D. W., & Yun, K. Y. (2012). Tax reform and the cost of capital. Oxford University Press.
Laffer, A. B., Moore, S., & Williams, J. (2018). The wealth of states: How taxes, energy, and worker freedom change everything. Wiley.
Tax Foundation (2021). The cost of tax compliance. Fiscal Fact No. 512.
Taxpayer Advocate Service (2022). Annual report to Congress. Internal Revenue Service.
Auerbach, A. J. (2006). The choice between income and consumption taxes: A primer. NBER Working Paper Series.
Auerbach, A. J., & Hassett, K. (2015). Capital taxation in the twenty-first century. American Economic Review, 105(5), 38-42.
Card, D., & Krueger, A. B. (2015). Myth and measurement: The new economics of the minimum wage. Princeton University Press.
Hall, R. E., & Rabushka, A. (2007). The flat tax. Hoover Institution Press.
Keen, M., Kim, Y., & Varsano, R. (2008). The "flat tax(es)": Principles and experience. International Tax and Public Finance, 15(6), 712-751.
Lustig, N. (2018). Fiscal policy, income redistribution and poverty reduction in low and middle income countries. Commitment to Equity Handbook.
Mirrlees, J., Adam, S., Besley, T., Blundell, R., Bond, S., Chote, R., Gammie, M., Johnson, P., Myles, G., & Poterba, J. (2011). Tax by design. Oxford University Press.
Piketty, T. (2014). Capital in the twenty-first century. Harvard University Press.
Piketty, T., & Saez, E. (2013). Optimal labor income taxation. Handbook of Public Economics, 5, 391-474.
Stiglitz, J. E. (2012). The price of inequality: How today's divided society endangers our future. W.W. Norton & Company.
Van Parijs, P., & Vanderborght, Y. (2017). Basic income: A radical proposal for a free society and a sane economy. Harvard University Press.
-
-
@ 878dff7c:037d18bc
2025-03-05 20:37:35Overview
Tropical Cyclone Alfred, currently a Category 2 system, is approaching Australia's eastern coast, with landfall anticipated between the Sunshine Coast and Gold Coast early Friday. This rare event has prompted widespread preparations and warnings across Queensland and New South Wales. Authorities are urging residents in vulnerable areas to evacuate and brace for destructive winds, heavy rainfall, and potential life-threatening flooding. TROPICAL CYCLONE FORECAST TRACK MAP
(Cover photo thanks to our 'unfortunately on the ground' photographer Sean. Stay safe mate!)
Queensland and New South Wales Brace for Cyclone Alfred's Impact
Summary:
Residents in Queensland and northern New South Wales are preparing for Tropical Cyclone Alfred, expected to make landfall early Friday between the Sunshine Coast and Gold Coast. The Category 2 storm is forecasted to bring severe winds and heavy rain, with potential for major flooding. Emergency measures include power outages, flight cancellations, school closures, and activation of emergency centers. The Australian Defence Force has been engaged to assist with response efforts. Sources: The Guardian - 6 March 2025
Authorities Issue Evacuation Warnings Ahead of Cyclone Alfred
Summary:
Australian authorities have issued major evacuation warnings ahead of Tropical Cyclone Alfred's expected landfall on Friday morning. The cyclone, categorized as Category 2, is anticipated to bring winds of 155 km/h and 800 mm of rainfall, potentially leading to dangerous and life-threatening conditions. Areas like Brisbane, the Gold Coast, and Sunshine Coast are in the cyclone's projected path. Residents in flood-prone and coastal areas are urged to evacuate and make necessary preparations, including stocking up on water and non-perishable food. The Australian government has declared a state of emergency and engaged the Australian Defence Force to assist with evacuation and disaster response efforts. Sources: The Sun - 6 March 2025
Residents Prepare for First Cyclone in Over Five Decades
Summary:
Residents in Brisbane and the Gold Coast are preparing for Tropical Cyclone Alfred, the first cyclone in 51 years to hit the Australian east coast near Brisbane. The cyclone is predicted to make landfall late Thursday or early Friday, bringing destructive winds, large swells, and potential life-threatening flooding. Brisbane, with over 3 million residents, may see up to 20,000 homes affected by flooding. The government has provided 250,000 sandbags and established cyclone refuge centers. Schools, public transport, and non-urgent hospital surgeries will be suspended. Queensland Premier David Crisafulli has urged residents to prepare their homes and plan evacuation routes. Sources: AP News - 6 March 2025
Cyclone Alfred's Approach Prompts Widespread Preparations
Summary:
Cyclone Alfred, a Category 2 storm, is approaching the Tweed Coast near Brisbane, expected to make landfall late Thursday or early Friday. As tension mounts, residents are bracing for potential disaster with power outages and water contamination being the main concerns. Supermarkets are emptied of essential supplies, and emergency preparations, such as sandbagging and securing properties, are in full swing. The community displays remarkable solidarity, with neighbors helping one another and sharing real-time updates. Surfers are taking advantage of the monster swells, enjoying the waves despite the looming threat. Families face difficult decisions on whether to stay or evacuate, while prioritizing the safety and well-being of their loved ones. With a keen sense of unity and preparedness, the community waits in hope that their efforts will withstand the upcoming storm. Sources: News.com.au - 6 March 2025
Cyclone Alfred's Unusual Path Raises Concerns
Summary:
Australia is preparing for a rare tropical cyclone, named Alfred, approaching Brisbane. Authorities are urging residents in flood-prone suburbs to evacuate due to potential destructive wind gusts up to 155 kph and significant rainfall that could lead to life-threatening flash flooding. The storm is expected to land as a Category 2 cyclone early on Friday. Evacuation efforts are in place, with heavy-lift helicopters deployed and evacuation centers being opened. Schools and public transport will shut down, and flights have been canceled in the affected regions. This area of southeast Queensland and northern New South Wales has not experienced such a cyclone for over fifty years. Sources: Reuters - 6 March 2025
Ice Cube Shares Experience Amid Cyclone Alfred
Summary:
Ice Cube is currently staying at a beachfront hotel in Australia as Cyclone Alfred intensifies. The 55-year-old rapper and actor, who is there for upcoming performances, humorously commented about experiencing a cyclone for the first time. Residents in flood-prone regions have been advised to evacuate, with heavy rains and strong winds expected to cause potentially life-threatening flash floods and severe storm conditions. The cyclone is particularly significant for Queensland, which hasn't seen such severe weather in decades. Ice Cube also denied rumors of his involvement in an 'Anaconda' reboot being filmed in Australia, stating he was only there for his Sydney show. Sources: People - 6 March 2025
Cyclone Alfred's Impact on Northern New South Wales
Summary:
Residents in Northern New South Wales are preparing for the impacts of Cyclone Alfred, with rainfalls of up to 400 millimeters expected, alongside winds of up to 150 kilometers per hour and likely flooding. The cyclone's approach has led to heightened concerns and preparations in the region. Sources: ABC News - 6 March 2025
Authorities Urge Evacuations as Cyclone Alfred Nears
Summary:
Residents in flood-prone suburbs of Brisbane and the Gold Coast are being urged to evacuate as Cyclone Alfred approaches. The storm is expected to bring destructive winds and heavy rainfall, leading to life-threatening flash flooding. Evacuation centers have been established, and emergency services are on high alert to assist those in need. Sources: The Guardian - 6 March 2025
-
@ 05933d87:81bac46e
2025-03-05 20:17:49A few months ago, an Uber driver alerted me to the presence of his rival. By that point, Waymo had been testing in Austin for over a year. I hid my excitement during the ride but I applied as a beta tester, noting my belonging to the demographics a PM might test for. My application went ignored until, huzzah, Waymo sent me an email yesterday announcing their self-driving cars are available directly through Uber in Austin.
I configured my allegiance to our new overlords swearing in on my screened sandwich of silicon.
Without willing it, and having forgot my new religion, I woke earlier than planned today and hailed a ride. The app spoke to me, "if you wait 3 minutes longer, we'll send you a car without a driver." For five minutes, I watched a car but not a driver move in the direction of me and my screen.
The ride was nice. I didn't have to theatrically rush to a waiting human. There was less social weirdness than I would normally sit with on a ride. I could inspect the car without risking the driver sense that I'm inspecting them. The car couldn't look at me buffering, deciphering if I am homeless or merely look it. I got to pick my own music. I got to watch people un-contacted by Waymo watch the car.
But ... it drove a lot more like a robot driving a car than a human driving a car. It pumped the brakes a few times as we passed weirdly parked cars uncertain (apparently) if the car might move into our lane. Once it signaled that we were headed into oncoming traffic as a street widened from one lane to two. Worst of all, it dropped me off near an anomalous stretch of sidewalk where my door opened to a wall, and if I were to climb and get out the other side, I'd arrive in the middle lane of a busy street. Trapped, I pinched myself through the door and, like Laura Croft, navigated the road's edge to a sidewalk.
tbh I'm still excited for my next Waymo ride. I'll just choose a different drop-off address.
originally posted at https://stacker.news/items/904830
-
@ 878dff7c:037d18bc
2025-03-05 20:12:53Queensland Premier Urges Immediate Preparations Ahead of Cyclone Alfred
Summary:
Queensland Premier David Crisafulli has urged residents to complete their preparations immediately as Tropical Cyclone Alfred approaches. The Category 2 cyclone is expected to bring heavy rainfall, destructive winds, and potential flooding to South-East Queensland and Northern New South Wales. Public transport services and elective surgeries have been canceled, and hundreds of schools will remain closed through the week. Residents are advised to stay indoors and ensure their safety during the cyclone's landfall.
Sources: The Guardian - March 5, 2025, News.com.au - March 6, 2025
Evacuation Orders Issued as Cyclone Alfred Approaches
Summary:
Authorities have issued evacuation orders for residents in Northern New South Wales, particularly in areas from Tweed to Yamba, as Cyclone Alfred intensifies. The cyclone is expected to bring gale-force winds, heavy rainfall up to 400 mm, and significant flooding. Schools and flights have been disrupted, with widespread closures and cancellations in the region. Coastal areas are experiencing high winds and massive waves, increasing the risk of flash floods. Emergency services are on high alert, preparing residents and reinforcing infrastructure to manage imminent threats.
Sources: The Daily Telegraph - March 6, 2025, News.com.au - March 6, 2025
Liberal Senator Alex Antic's Rise Signals Shift to Conservatism in South Australia
Summary:
Liberal Senator Alex Antic has ascended to the top position on South Australia's Senate ticket, marking a significant shift from the state's traditionally moderate Liberal stance to a more conservative direction. This change follows the resignation of veteran moderate Simon Birmingham and an influx of social conservatives and libertarians into the party. Antic, known for his controversial views, believes that conservative values are gaining traction as the world reaches "peak woke." He emphasizes the importance of adhering to traditional conservative principles to appeal to families concerned about social issues and younger individuals focused on economic matters. Despite past conflicts with party moderates, Antic is optimistic about the party's future under leaders like Peter Dutton, noting similar conservative movements globally. Sources: The Australian - March 5, 2025
Government's $130k Weekly Legal Fees for Toll Reform Under Scrutiny
Summary:
The Minns government's efforts to reform Sydney's toll network have cost taxpayers over $8 million, with legal advice alone amounting to $130,000 per week since February 5, 2025. Despite these expenditures, significant changes have yet to be implemented, leading to criticism over the prioritization of consultancy fees over actionable toll reforms.
Sources: The Daily Telegraph - March 6, 2025
Tech Giants Generate $27 Billion Annually from Australian Consumers
Summary:
An analysis by the Parliamentary Budget Office reveals that the top 16 tech companies, including Google, Microsoft, Meta, and Amazon, collectively earn $26.7 billion annually from Australian consumers. The Greens propose a 3% tax on these companies' revenues exceeding $20 million, potentially generating $11.5 billion for the government to fund essential services like dental care in Medicare. However, this proposal faces challenges due to potential retaliatory measures from the U.S. government. Sources: The Guardian - 6 March 2025
Melioidosis Outbreak in Queensland
Summary:
Queensland is experiencing a significant outbreak of melioidosis, a serious disease caused by the bacteria Burkholderia pseudomallei, typically found in soil and freshwater. The bacteria can infect humans and animals through cuts, contaminated water, or inhalation. Symptoms include fever, headache, respiratory issues, and muscle pain. This year, there have been over 90 confirmed cases and 15 deaths in Queensland, higher than usual. The outbreak is believed to be linked to heavy rainfall and flooding, increasing the bacteria's prevalence. Preventative measures include wearing protective gear in wet areas and seeking early medical attention for symptoms like fever and breathing difficulties.
Sources: The Advertiser - 3 March 2025
Philippine Defense Chief Warns Against Chinese Restrictions in South China Sea
Summary:
Philippine Defense Secretary Gilberto Teodoro warned that the Philippines and its allies would respond to any Chinese attempt to impose an air defense zone or restrict flights over the South China Sea. Teodoro highlighted China's growing aggression in the disputed waters, which has led to increased confrontations involving Chinese and Philippine forces, as well as incidents with U.S. and Australian military aircraft. Recent encounters have included close flybys and warning flares from Chinese aircraft. Teodoro emphasized that China's actions pose a major threat to both Philippine and global security due to the region's critical trade routes. He stated that defense officials are preparing contingency measures and could act alone or with international partners to counter potential Chinese aggression. Teodoro noted the possibility of a broader coalition forming to resist China's attempts to reshape international law and norms. Sources: Associated Press - 6 March 2025
Amazon Joins Quantum Computing Race with 'Cat Qubit' Chip
Summary:
Amazon has unveiled its new quantum computing chip, Ocelot, which utilizes "cat qubit" technology to significantly reduce quantum errors—a major hurdle in developing commercially viable quantum systems. This advancement positions Amazon alongside other tech giants like Google and Microsoft in the quest for functional quantum computers.
Sources: SHRM - March 6, 2025
New $1 Billion Fund Launched to Boost Australia's Circular Economy
Summary:
Planet Ark and Boston Global have partnered to launch the BG Planet Ark Circular Future Fund, aiming to raise $1 billion by 2030 to invest in businesses promoting sustainability, reducing carbon emissions, and enhancing the circular economy. This initiative aligns with Australia's Circular Economy Framework, which seeks to double circularity by 2035 and add $26 billion annually to the GDP. Initial funding of $100 million has been secured, targeting sectors like regenerative farming and waste-to-energy solutions.
Sources: The Australian - March 6, 2025
Australia's Foreign Minister Comments on Trump's Second Term
Summary:
Foreign Minister Penny Wong has remarked that Donald Trump's second presidency is already more disruptive than his first. She noted that Australia's government is dealing with a very different American administration, reflecting concerns about potential shifts in international relations and policies affecting Australia's strategic interests.
Sources: Reuters - March 5, 2025
-
@ 2e8970de:63345c7a
2025-03-05 19:50:10It leads to fast, and massive weight loss by not just suppressing appetite, but also by upregulating metabolism.
https://www.nejm.org/doi/full/10.1056/NEJMoa2301972
originally posted at https://stacker.news/items/904851
-
@ 4925ea33:025410d8
2025-03-05 19:44:37De acordo com a Resolução 03/25 do Conselho Federal de Farmácia a Aromaterapia é uma prática terapêutica que utiliza as propriedades dos óleos essenciais para restaurar o equilíbrio e a harmonia do organismo, promovendo a saúde física, mental e emocional. Essa técnica baseia-se no uso dos compostos aromáticos naturais extraídos das plantas para estimular respostas neurológicas e bioquímicas no corpo.
Os óleos essenciais atuam diretamente no sistema límbico, região do cérebro responsável pelas emoções, memórias e comportamentos. Mas seus benefícios vão muito além do bem-estar emocional! Eles possuem propriedades terapêuticas únicas, podendo atuar como cicatrizantes, antifúngicos, antibacterianos, anti-inflamatórios e até auxiliares no alívio de dores e tensões musculares. Além da inalação, os óleos podem ser aplicados topicamente, sendo absorvidos pela pele e interagindo com o organismo de maneira profunda e eficaz.
No entanto, é importante lembrar que os óleos essenciais são altamente concentrados e contêm substâncias que podem causar alergias ou irritações se usados de forma inadequada. Por isso, é essencial buscar orientação de um profissional qualificado para garantir um tratamento seguro e eficaz.
Quer saber como a Aromaterapia pode transformar seu bem-estar? Agende uma consulta comigo e descubra os benefícios personalizados para você.
-
@ b4403b24:83542d4e
2025-03-05 19:18:39I can't believe so many shitcoiners are invited to attend 🫣
originally posted at https://stacker.news/items/904818
-
@ a296b972:e5a7a2e8
2025-03-05 18:34:49Von Egon Bahr stammt der Satz: „Wir können politisch alles Mögliche ändern, nur nicht die Geografie.“ Er scheint der letzte deutsche Politiker gewesen zu sein, der wusste, dass Europa zwischen den USA im Westen und Russland im Osten liegt. Die tektonische Plattenverschiebung wird daran über kurz oder lang auch nichts ändern.
Europa, besonders Deutschland, wird erneut von der Weltgeschichte die Möglichkeit gegeben, seine ihm ureigenste Rolle anzunehmen, nämlich endlich eine neutrale, vermittelnde Rolle zwischen West und Ost zu ergreifen. Stattdessen verscherzt Europa es sich derzeit mit beiden Weltmächten. Das muss man erst einmal hinbekommen. Wie doof kann man sein? Brücken bauen scheint man in Deutschland nicht mehr zu können. Sieht man ja in Dresden.
Deutschland scheint diese Chance erneut nicht zu erkennen, da es spätestens seit dem C-Ereignis, entgegen den USA zumindest teilweise, bis heute nicht wieder zu Verstand gekommen ist. Eigentlich schon früher, nur da hat man es noch nicht so gemerkt.
Bis auf wenige Ausnahmen wird ganz Europa derzeit von Verrückten und deren Erfüllungsgehilfen geleitet. Allein die Aussage der CDU in Deutschland einen Tag nach der Wahl, „Die Ukraine muss den Krieg gewinnen“, zeigt, dass weiterhin nicht alle Porzellan-Trinkgefäße in dem dafür vorgesehenen Küchenmöbel vorhanden sind.
Es werden „Kriegs-Konferenzen“ einberufen, wie man die Ukraine weiter mit Geld und Waffen unterstützen kann, statt zu erkennen, dass sich der Wind Richtung Frieden gedreht hat. Europa hat zwar nichts zu sagen, dennoch kann Dummheit gefährlich werden. Es können Teller zerdeppert werden, die man besser nicht angerührt hätte.
Jeder Banker schüttelt den Kopf und drückt auf den Alarmknopf unter der Schreibtischplatte, wenn man zu ihm geht und um ein Sondervermögen ansucht. Hexenmeister Deutschland kann Geld herbeizaubern, allein durch seinen politischen Willen, Kraft seiner Gedanken. Schöpfung aus dem Nichts. Und warum drängt sich gerade Deutschland schon wieder so nach vorne? Was steht im Zeugnis von Deutschland? Geschichtsunterricht: nicht teilgenommen
Alles, wofür Deutschland einmal stand, für Frieden und Diplomatie, scheint einer allgemeinen Kriegslüsternheit des Polit-Büros gewichen zu sein, obwohl die Arsenale leer sind (Gottseidank!). Eine Aufrüstung sowohl logistisch, personell als auch materialmäßig würde mindestens 10 Jahre dauern. Da kann man nur hoffen, dass Putin so lange wartet, wo doch aus allen Propagandarohren geschossen wird, dass er seine imperialistischen Phantasien nach der Ukraine weiter in Richtung Europa ausleben will. Erst nach Polen und dann mit dem Trampolin von Brandenburg aus direkt nach Berlin. Das war’s. Dabei brauchen wir gar keinen Feind von außen. Deutschland ist ja bereits mit der BRD im Krieg.
Man spekuliert auf einen europäischen Schutzschild mit Frankreich als Land mit Atomwaffen. Wie lächerlich ist das denn? Das erinnert an einen Yorkshire-Terrier, der ein Pferd anbellt. Die immer noch gültige Feindstaaten-Klausel scheint für alle zu gelten, nur nicht für die, die sie betrifft, also Deutschland. Sie ist durch den 2 + 4 – Vertrag nicht aufgehoben worden, weil der kein Friedensvertrag ist.
Trump spricht davon, seine Truppen aus Europa, aus Deutschland abzuziehen. Es kursieren Gerüchte, dass er gar die NATO verlassen könnte. Dann steht Deutschland völlig blank da – stets aufs Äußerste zur Entschlossenheit bereit! Panik im Hühnerstall, weil der Fuchs in der Nähe gesehen wurde. Und statt Überlegungen in Richtung Neutralität anzustellen, was gut zu Deutschland, im Verbund mit Österreich und der Schweiz als deutschsprachigen Kulturraum passen würde, überlegt man, wie man die Arbeiter der niedergehenden Autoindustrie in der Rüstungsindustrie anschlussverwenden kann. Es ist alles nur noch irre.
Wer Pazifist und für den Frieden ist, delegitimiert den Staat, ist reeeeechts. Ja, wo sind wir denn inzwischen gelandet? Im Emsland macht die Polizei folgende Ansage durch einen Lautsprecher: „Beachten Sie die Beschränkungen. Ausrufe, wie „Stoppt das Morden“, „Stoppt den Krieg“ und weiterfolgend, haben zu unterbleiben.“
Vielleicht spekuliert man ja darauf, dass es eine neue Migrationswelle nach Europa gibt. Diesmal von denen, die von der US-Regierung als Deep State-Angehörige aufgespürt werden. Mit ihrem Geld und Einfluss kämen sie den Großmanns-Phantasien der Europäer gerade recht. Herzlich Willkommen, ihr Deep-State-Fachkräfte!
Mit den zukünftig in der deutschen Regierung befindlichen Alt-Parteien wird es ein „Weiter so“ in Richtung Niedergang geben. Ein weiteres Zeichen dafür, dass Deutschland von Masochisten gelenkt wird. Wie man an den Wahlergebnissen sehen kann, befindet sich ein großer Teil der Bevölkerung immer noch im Dauer-Tiefschlaf. Und der wache Rest schaut ohnmächtig zu, wie die Katastrophe weiter ihren Lauf nimmt. Die einzige friedliche Möglichkeit, diesem schadenbringenden Treiben ein Ende zu bereiten, wäre dem Staat den Geldhahn zuzudrehen: Steuerzahlungs-Verweigerung, Einstellung der Zwangsgebühren für den Staats-Propaganda-Funk, Verweigerung der Kammer-Zwangs-Beiträge, doch da landet man im Knast. Da stößt die vielgepriesene Freiheit in „Unseredemokratie“ an ihre Grenzen.
Und dass all die Missstände ja nicht an die breite Öffentlichkeit gelangen, wird fleißig zensiert und zum Denunzieren angeregt, wozu es Menschen braucht, die sich dafür hergeben, und die es aber offensichtlich zu geben scheint. Der Digital Services Act ist nichts weiter, als die Weiterentwicklung des Fernsehens der DDR, oder noch schlimmeres. Jüngst erst wurde eine Telefonseelsorge für diejenigen eingerichtet, die auf dem Pfad des tugendhaft betreuten Denkens vom Weg abgekommen sind. Bereue und Dir wird vergeben!
Bei den vorletzten Wahlen mussten die Bürger einen Maulkorb tragen, bei der jüngsten Bundestagswahl hatten sie diesen bereits in den Kopf implantiert, da fast die Hälfte der Deutschen meint, ihre Meinung nicht mehr frei äußern zu können. Wenn das mal keinen Einfluss auf die Wahlentscheidung hatte.
Man kann recht pessimistisch sein, dass in absehbarer Zeit wieder die Vernunft Einzug in die Köpfe der Verantwortlichen hält, daher ist zu vermuten, dass Europa erst komplett implodieren muss, bevor ein Neuanfang möglich sein wird. Man kann aber auch optimistisch sein, da Deutschland, in der EU der größte Geldgeber, derzeit fleißig daran arbeitet, dass der Karren tiefst möglich in den Dreck gefahren wird. Fein, weg mit dem Brüsseler Bürokratie-Monster und zurück zur Europäischen Wirtschaftsgemeinschaft. Die Sommerzeit, die Gurken-Krümmungs-Verordnung und die Tetra-Pak-Deckel-Ehe würde man wohl kaum vermissen.
Die zahlreichen Universal-Dilettanten und Kriegs-Maulhelden in ganz Europa werden ihren Teil dazu beitragen, den Deppen-Status in der Welt zu manifestieren.
Nicht ganz so rosig wäre es, wenn die US-Deep-State-Migranten auf die Idee kämen, in Europa Fuß fassen zu wollen. Das wäre dann eher ein Neuanfang mit einer E-ID, dem digitalen Bargeld, einem Social-Credit-System, also den feuchten Träumen des WEFs, 15-Minuten-Städten, KI-gesteuerter Mobilität und totaler Versklavung durch 24/7/365-Überwachung. Die Kriminell-Kommissarin, das Röschen in Brüssel, arbeitet auch hier schon emsig wie ein Bienchen. Wenn hinter all dem Trump-Getöse dasselbe steckt, haben wir sowieso verloren.
Europa befindet sich am Scheideweg. Quo vadis?
Die breite Masse fühlt sich in ihrem Weltbild „verunsichert“. Eingeschüchtert von Messer-Fachkräften und Autos, die trotz Fahrer einfach so in Menschenmengen rasen, weil sie es wollen. Ob ein System hinter den Anschlägen steckt, oder nicht, spielt gar keine Rolle. Es passiert. Was, wenn der Staat sagt, jetzt ist Schluss, wir greifen durch. Zum Schutze und zur Sicherheit der Bevölkerung führen wir eine persönliche ID ein, als Abschreckungsmaßnahme, damit ja kein Irrer mehr auch nur auf die Idee kommt, so einen Anschlag verüben zu wollen.
Wollt ihr zu eurem eigenen Schutz die totale Überwachung? „JAAAAAAA!“
Die positiv Gestimmten behaupten zwar, es würden immer mehr Menschen wach werden, doch obwohl die Wecker nun schon seit 5 Jahren ununterbrochen laut klingeln, geht das viel zu langsam. Bis auch Lieschen Müller aus Hinterdeppendorf verstanden hat, dass wir nach allen Regeln der Kunst belogen und betrogen werden, ist es wahrscheinlich schon längst soweit, dass die Falle zugeschnappt ist.
Und dann wird das Geheule groß sein: „Ach hätten wir doch mal…“ Ja, wenn so viele nicht immer noch viel zu bequem, behäbig und träge wären, hätten wir schon längst die Pfeifen in unseren europäischen Parlamenten inklusive des Affen-Zirkus in Brüssel in die Wüste geschickt.
Ja, wir brauchen eine Revolution, aber eine geistige! Wie bekommen wir die Denkvergiftung durch jahrzehntelanges Starren auf die Inhalte der öffentlich-rechtlichen Anstalt für Propaganda und Volksverblödung als Gehirnwaschanlage aus den Köpfen der Leute wieder heraus?
Lieber wartet man auf den Erlöser, der es schon richten wird. Ich habe ja schließlich gewählt, mehr kann ich nicht tun. Nein, der kommt nicht. Der Fritzefanzler ist es leider auch nicht. Der wechselt seine Meinung schneller, als man ein Paar Socken an- und ausgezogen hat. Da nutzen auch seine markig akzentuierten Sprechabsonderungen nichts. Schon jetzt muss man sein Bild umdrehen, damit die Mundwinkel einmal nach oben zeigen. Warum ist er traurig? Geht es dem Sauerländer nicht schnell genug, den Rest von Deutschland in Essig einzulegen, damit dieses Land vollkommen in ein trefflich schmeckendes Glas Gewürzgurken verwandelt wird?
Es wäre an uns, uns unserer Kraft als Souverän bewusst zu werden und die Schritte einzuleiten, die nötig sind, um ein friedliches und einträgliches miteinander der Nationen zu leben. Die Menschen wollen keinen Krieg, es sind immer die Staaten. In Rumänien, in Bulgarien sind die Menschen massenweise auf der Straße und drücken ihren Protest aus. In Deutschland geht das nicht. Man hat ja noch die Kartoffeln auf dem Herd und kann solange nicht weg. Es sei denn, man kann ein paar Euro dazuverdienen, das ist dann was anderes. Und endlich ist dann auch noch einmal was im Leben der enkellosen Großmutter los.
Krieg ist nur die Durchsetzung von Politik mit anderen Mitteln. Es ging und geht nie um Menschenleben, sondern um das erbarmungslose Durchsetzen von staatlichen Interessen, die gefälligst im schlimmsten Fall vom dämlichen Volk als Kanonenfutter umzusetzen sind.
Nach den Impfverweigerern kommen vielleicht bald die Kriegsdienstverweigerer in den Fokus. Ich soll mein Leben für ein Land auf’s Spiel setzen, das einen Bockmist nach dem anderen baut? Bin ich lebensmüde?
Und obendrein zahlt der brave Bürger auch noch die Zeche, mit seinem sauer verdienten Geld durch legalisierten Steuerraub. Jeder würde wohl gerne Steuern zahlen, wenn das Geld sinnvoll verwendet würde. Ein Hochrüsten gehört ganz sicher nicht dazu. Geschickteres Ausbeuten von Staatsseite geht nicht, und dümmer nicht von Seiten der Bevölkerung, die sich das gefallen lässt.
Die Demokratie-Simulation hat bislang recht gut funktioniert. Es bleibt zu hoffen, dass es ein guter Wind ist, der da von Westen über den Atlantik nach Europa weht und diese ganzen verklebten Gehirne einmal so richtig durchbläst. Die Ereignisse überschlagen sich derzeit, wer weiß?
-
@ 97c70a44:ad98e322
2025-03-05 18:09:05So you've decided to join nostr! Some wide-eyed fanatic has convinced you that the "sun shines every day on the birds and the bees and the cigarette trees" in a magical land of decentralized, censorship-resistant freedom of speech - and it's waiting just over the next hill.
But your experience has not been all you hoped. Before you've even had a chance to upload your AI-generated cyberpunk avatar or make up exploit codenames for your pseudonym's bio, you've been confronted with a new concept that has left you completely nonplussed.
It doesn't help that this new idea might be called by any number of strange names. You may have been asked to "paste your nsec", "generate a private key", "enter your seed words", "connect with a bunker", "sign in with extension", or even "generate entropy". Sorry about that.
All these terms are really referring to one concept under many different names: that of "cryptographic identity".
Now, you may have noticed that I just introduced yet another new term which explains exactly nothing. You're absolutely correct. And now I'm going to proceed to ignore your complaints and talk about something completely different. But bear with me, because the juice is worth the squeeze.
Identity
What is identity? There are many philosophical, political, or technical answers to this question, but for our purposes it's probably best to think of it this way:
Identity is the essence of a thing. Identity separates one thing from all others, and is itself indivisible.
This definition has three parts:
- Identity is "essential": a thing can change, but its identity cannot. I might re-paint my house, replace its components, sell it, or even burn it down, but its identity as something that can be referred to - "this house" - is durable, even outside the boundaries of its own physical existence.
- Identity is a unit: you can't break an identity into multiple parts. A thing might be composed of multiple parts, but that's only incidental to the identity of a thing, which is a concept, not a material thing.
- Identity is distinct: identity is what separates one thing from all others - the concept of an apple can't be mixed with that of an orange; the two ideas are distinct. In the same way, a single concrete apple is distinct in identity from another - even if the component parts of the apple decompose into compost used to grow more apples.
Identity is not a physical thing, but a metaphysical thing. Or, in simpler terms, identity is a "concept".
I (or someone more qualified) could at this point launch into a Scholastic tangent on what "is" is, but that is, fortunately, not necessary here. The kind of identities I want to focus on here are not our actual identities as people, but entirely fictional identities that we use to extend our agency into the digital world.
Think of it this way - your bank login does not represent you as a complete person. It only represents the access granted to you by the bank. This access is in fact an entirely new identity that has been associated with you, and is limited in what it's useful for.
Other examples of fictional identities include:
- The country you live in
- Your social media persona
- Your mortgage
- Geographical coordinates
- A moment in time
- A chess piece
Some of these identites are inert, for example points in space and time. Other identies have agency and so are able to act in the world - even as fictional concepts. In order to do this, they must "authenticate" themselves (which means "to prove they are real"), and act within a system of established rules.
For example, your D&D character exists only within the collective fiction of your D&D group, and can do anything the rules say. Its identity is authenticated simply by your claim as a member of the group that your character in fact exists. Similarly, a lawyer must prove they are a member of the Bar Association before they are allowed to practice law within that collective fiction.
"Cryptographic identity" is simply another way of authenticating a fictional identity within a given system. As we'll see, it has some interesting attributes that set it apart from things like a library card or your latitude and longitude. Before we get there though, let's look in more detail at how identities are authenticated.
Certificates
Merriam-Webster defines the verb "certify" as meaning "to attest authoritatively". A "certificate" is just a fancy way of saying "because I said so". Certificates are issued by a "certificate authority", someone who has the authority to "say so". Examples include your boss, your mom, or the Pope.
This method of authentication is how almost every institution authenticates the people who associate with it. Colleges issue student ID cards, governments issue passports, and websites allow you to "register an account".
In every case mentioned above, the "authority" creates a closed system in which a document (aka a "certificate") is issued which serves as a claim to a given identity. When someone wants to access some privileged service, location, or information, they present their certificate. The authority then validates it and grants or denies access. In the case of an international airport, the certificate is a little book printed with fancy inks. In the case of a login page, the certificate is a username and password combination.
This pattern for authentication is ubiquitous, and has some very important implications.
First of all, certified authentication implies that the issuer of the certificate has the right to exclusive control of any identity it issues. This identity can be revoked at any time, or its permissions may change. Your social credit score may drop arbitrarily, or money might disappear from your account. When dealing with certificate authorities, you have no inherent rights.
Second, certified authentication depends on the certificate authority continuing to exist. If you store your stuff at a storage facility but the company running it goes out of business, your stuff might disappear along with it.
Usually, authentication via certificate authority works pretty well, since an appeal can always be made to a higher authority (nature, God, the government, etc). Authorities also can't generally dictate their terms with impunity without losing their customers, alienating their constituents, or provoking revolt. But it's also true that certification by authority creates an incentive structure that frequently leads to abuse - arbitrary deplatforming is increasingly common, and the bigger the certificate authority, the less recourse the certificate holder (or "subject") has.
Certificates also put the issuer in a position to intermediate relationships that wouldn't otherwise be subject to their authority. This might take the form of selling user attention to advertisers, taking a cut of financial transactions, or selling surveillance data to third parties.
Proliferation of certificate authorities is not a solution to these problems. Websites and apps frequently often offer multiple "social sign-in" options, allowing their users to choose which certificate authority to appeal to. But this only piles more value into the social platform that issues the certificate - not only can Google shut down your email inbox, they can revoke your ability to log in to every website you used their identity provider to get into.
In every case, certificate issuance results in an asymmetrical power dynamic, where the issuer is able to exert significant control over the certificate holder, even in areas unrelated to the original pretext for the relationship between parties.
Self-Certification
But what if we could reverse this power dynamic? What if individuals could issue their own certificates and force institutions to accept them?
Ron Swanson's counterexample notwithstanding, there's a reason I can't simply write myself a parking permit and slip it under the windshield wiper. Questions about voluntary submission to legitimate authorities aside, the fact is that we don't have the power to act without impunity - just like any other certificate authority, we have to prove our claims either by the exercise of raw power or by appeal to a higher authority.
So the question becomes: which higher authority can we appeal to in order to issue our own certificates within a given system of identity?
The obvious answer here is to go straight to the top and ask God himself to back our claim to self-sovereignty. However, that's not how he normally works - there's a reason they call direct acts of God "miracles". In fact, Romans 13:1 explicitly says that "the authorities that exist have been appointed by God". God has structured the universe in such a way that we must appeal to the deputies he has put in place to govern various parts of the world.
Another tempting appeal might be to nature - i.e. the material world. This is the realm in which we most frequently have the experience of "self-authenticating" identities. For example, a gold coin can be authenticated by biting it or by burning it with acid. If it quacks like a duck, walks like a duck, and looks like a duck, then it probably is a duck.
In most cases however, the ability to authenticate using physical claims depends on physical access, and so appeals to physical reality have major limitations when it comes to the digital world. Captchas, selfies and other similar tricks are often used to bridge the physical world into the digital, but these are increasingly easy to forge, and hard to verify.
There are exceptions to this rule - an example of self-certification that makes its appeal to the physical world is that of a signature. Signatures are hard to forge - an incredible amount of data is encoded in physical signatures, from strength, to illnesses, to upbringing, to personality. These can even be scanned and used within the digital world as well. Even today, most contracts are sealed with some simulacrum of a physical signature. Of course, this custom is quickly becoming a mere historical curiosity, since the very act of digitizing a signature makes it trivially forgeable.
So: transcendent reality is too remote to subtantiate our claims, and the material world is too limited to work within the world of information. There is another aspect of reality remaining that we might appeal to: information itself.
Physical signatures authenticate physical identities by encoding unique physical data into an easily recognizable artifact. To transpose this idea to the realm of information, a "digital signature" might authenticate "digital identities" by encoding unique "digital data" into an easily recognizable artifact.
Unfortunately, in the digital world we have the additional challenge that the artifact itself can be copied, undermining any claim to legitimacy. We need something that can be easily verified and unforgeable.
Digital Signatures
In fact such a thing does exist, but calling it a "digital signature" obscures more than it reveals. We might just as well call the thing we're looking for a "digital fingerprint", or a "digital electroencephalogram". Just keep that in mind as we work our way towards defining the term - we are not looking for something looks like a physical signature, but for something that does the same thing as a physical signature, in that it allows us to issue ourselves a credential that must be accepted by others by encoding privileged information into a recognizable, unforgeable artifact.
With that, let's get into the weeds.
An important idea in computer science is that of a "function". A function is a sort of information machine that converts data from one form to another. One example is the idea of "incrementing" a number. If you increment 1, you get 2. If you increment 2, you get 3. Incrementing can be reversed, by creating a complementary function that instead subtracts 1 from a number.
A "one-way function" is a function that can't be reversed. A good example of a one-way function is integer rounding. If you round a number and get
5
, what number did you begin with? It's impossible to know - 5.1, 4.81, 5.332794, in fact an infinite number of numbers can be rounded to the number5
. These numbers can also be infinitely long - for example rounding PI to the nearest integer results in the number3
.A real-life example of a useful one-way function is
sha256
. This function is a member of a family of one-way functions called "hash functions". You can feed as much data as you like intosha256
, and you will always get 256 bits of information out. Hash functions are especially useful because collisions between outputs are very rare - even if you change a single bit in a huge pile of data, you're almost certainly going to get a different output.Taking this a step further, there is a whole family of cryptographic one-way "trapdoor" functions that act similarly to hash functions, but which maintain a specific mathematical relationship between the input and the output which allows the input/output pair to be used in a variety of useful applications. For example, in Elliptic Curve Cryptography, scalar multiplication on an elliptic curve is used to derive the output.
"Ok", you say, "that's all completely clear and lucidly explained" (thank you). "But what goes into the function?" You might expect that because of our analogy to physical signatures we would have to gather an incredible amount of digital information to cram into our cryptographic trapdoor function, mashing together bank statements, a record of our heartbeat, brain waves and cellular respiration. Well, we could do it that way (maybe), but there's actually a much simpler solution.
Let's play a quick game. What number am I thinking of? Wrong, it's 82,749,283,929,834. Good guess though.
The reason we use signatures to authenticate our identity in the physical world is not because they're backed by a lot of implicit physical information, but because they're hard to forge and easy to validate. Even so, there is a lot of variation in a single person's signature, even from one moment to the next.
Trapdoor functions solve the validation problem - it's trivially simple to compare one 256-bit number to another. And randomness solves the problem of forgeability.
Now, randomness (A.K.A. "entropy") is actually kind of hard to generate. Random numbers that don't have enough "noise" in them are known as "pseudo-random numbers", and are weirdly easy to guess. This is why Cloudflare uses a video stream of their giant wall of lava lamps to feed the random number generator that powers their CDN. For our purposes though, we can just imagine that our random numbers come from rolling a bunch of dice.
To recap, we can get a digital equivalent of a physical signature (or fingerprint, etc) by 1. coming up with a random number, and 2. feeding it into our chosen trapdoor function. The random number is called the "private" part. The output of the trapdoor function is called the "public" part. These two halves are often called "keys", hence the terms "public key" and "private key".
And now we come full circle - remember about 37 years ago when I introduced the term "cryptographic identity"? Well, we've finally arrived at the point where I explain what that actually is.
A "cryptographic identity" is identified by a public key, and authenticated by the ability to prove that you know the private key.
Notice that I didn't say "authenticated by the private key". If you had to reveal the private key in order to prove you know it, you could only authenticate a public key once without losing exclusive control of the key. But cryptographic identities can be authenticated any number of times because the certification is an algorithm that only someone who knows the private key can execute.
This is the super power that trapdoor functions have that hash functions don't. Within certain cryptosystems, it is possible to mix additional data with your private key to get yet another number in such a way that someone else who only knows the public key can prove that you know the private key.
For example, if my secret number is
12
, and someone tells me the number37
, I can "combine" the two by adding them together and returning the number49
. This "proves" that my secret number is12
. Of course, addition is not a trapdoor function, so it's trivially easy to reverse, which is why cryptography is its own field of knowledge.What's it for?
If I haven't completely lost you yet, you might be wondering why this matters. Who cares if I can prove that I made up a random number?
To answer this, let's consider a simple example: that of public social media posts.
Most social media platforms function by issuing credentials and verifying them based on their internal database. When you log in to your Twitter (ok, fine, X) account, you provide X with a phone number (or email) and password. X compares these records to the ones stored in the database when you created your account, and if they match they let you "log in" by issuing yet another credential, called a "session key".
Next, when you "say" something on X, you pass along your session key and your tweet to X's servers. They check that the session key is legit, and if it is they associate your tweet with your account's identity. Later, when someone wants to see the tweet, X vouches for the fact that you created it by saying "trust me" and displaying your name next to the tweet.
In other words, X creates and controls your identity, but they let you use it as long as you can prove that you know the secret that you agreed on when you registered (by giving it to them every time).
Now pretend that X gets bought by someone even more evil than Elon Musk (if such a thing can be imagined). The new owner now has the ability to control your identity, potentially making it say things that you didn't actually say. Someone could be completely banned from the platform, but their account could be made to continue saying whatever the owner of the platform wanted.
In reality, such a breach of trust would quickly result in a complete loss of credibility for the platform, which is why this kind of thing doesn't happen (at least, not that we know of).
But there are other ways of exploiting this system, most notably by censoring speech. As often happens, platforms are able to confiscate user identities, leaving the tenant no recourse except to appeal to the platform itself (or the government, but that doesn't seem to happen for some reason - probably due to some legalese in social platforms' terms of use). The user has to start completely from scratch, either on the same platform or another.
Now suppose that when you signed up for X instead of simply telling X your password you made up a random number and provided a cryptographic proof to X along with your public key. When you're ready to tweet (there's no need to issue a session key, or even to store your public key in their database) you would again prove your ownership of that key with a new piece of data. X could then publish that tweet or not, along with the same proof you provided that it really came from you.
What X can't do in this system is pretend you said something you didn't, because they don't know your private key.
X also wouldn't be able to deplatform you as effectively either. While they could choose to ban you from their website and refuse to serve your tweets, they don't control your identity. There's nothing they can do to prevent you from re-using it on another platform. Plus, if the system was set up in such a way that other users followed your key instead of an ID made up by X, you could switch platforms and keep your followers. In the same way, it would also be possible to keep a copy of all your tweets in your own database, since their authenticity is determined by your digital signature, not X's "because I say so".
This new power is not just limited to social media either. Here are some other examples of ways that self-issued cryptographic identites transform the power dynamic inherent in digital platforms:
- Banks sometimes freeze accounts or confiscate funds. If your money was stored in a system based on self-issued cryptographic keys rather than custodians, banks would not be able to keep you from accessing or moving your funds. This system exists, and it's called bitcoin.
- Identity theft happens when your identifying information is stolen and used to take out a loan in your name, and without your consent. The reason this is so common is because your credentials are not cryptographic - your name, address, and social security number can only be authenticated by being shared, and they are shared so often and with so many counterparties that they frequently end up in data breaches. If credit checks were authenticated by self-issued cryptographic keys, identity theft would cease to exist (unless your private key itself got stolen).
- Cryptographic keys allow credential issuers to protect their subjects' privacy better too. Instead of showing your ID (including your home address, birth date, height, weight, etc), the DMV could sign a message asserting that the holder of a given public key indeed over 21. The liquor store could then validate that claim, and your ownership of the named key, without knowing anything more about you. Zero-knowledge proofs take this a step further.
In each of these cases, the interests of the property owner, loan seeker, or customer are elevated over the interests of those who might seek to control their assets, exploit their hard work, or surveil their activity. Just as with personal privacy, freedom of speech, and Second Amendment rights the individual case is rarely decisive, but in the aggregate realigned incentives can tip the scale in favor of freedom.
Objections
Now, there are some drawbacks to digital signatures. Systems that rely on digital signatures are frequently less forgiving of errors than their custodial counterparts, and many of their strengths have corresponding weaknesses. Part of this is because people haven't yet developed an intuition for how to use cryptographic identities, and the tools for managing them are still being designed. Other aspects can be mitigated through judicious use of keys fit to the problems they are being used to solve.
Below I'll articulate some of these concerns, and explore ways in which they might be mitigated over time.
Key Storage
Keeping secrets is hard. "A lie can travel halfway around the world before the truth can get its boots on", and the same goes for gossip. Key storage has become increasingly important as more of our lives move online, to the extent that password managers have become almost a requirement for keeping track of our digital lives. But even with good password management, credentials frequently end up for sale on the dark web as a consequence of poorly secured infrastructure.
Apart from the fact that all of this is an argument for cryptographic identities (since keys are shared with far fewer parties), it's also true that the danger of losing a cryptographic key is severe, especially if that key is used in multiple places. Instead of hackers stealing your Facebook password, they might end up with access to all your other social media accounts too!
Keys should be treated with the utmost care. Using password managers is a good start, but very valuable keys should be stored even more securely - for example in a hardware signing device. This is a hassle, and something additional to learn, but is an indispensable part of taking advantage of the benefits associated with cryptographic identity.
There are ways to lessen the impact of lost or stolen secrets, however. Lots of different techniques exist for structuring key systems in such a way that keys can be protected, invalidated, or limited. Here are a few:
- Hierarchical Deterministic Keys allow for the creation of a single root key from which multiple child keys can be generated. These keys are hard to link to the parent, which provides additional privacy, but this link can also be proven when necessary. One limitation is that the identity system has to be designed with HD keys in mind.
- Key Rotation allows keys to become expendable. Additional credentials might be attached to a key, allowing the holder to prove they have the right to rotate the key. Social attestations can help with the process as well if the key is embedded in a web of trust.
- Remote Signing is a technique for storing a key on one device, but using it on another. This might take the form of signing using a hardware wallet and transferring an SD card to your computer for broadcasting, or using a mobile app like Amber to manage sessions with different applications.
- Key sharding takes this to another level by breaking a single key into multiple pieces and storing them separately. A coordinator can then be used to collaboratively sign messages without sharing key material. This dramatically reduces the ability of an attacker to steal a complete key.
Multi-Factor Authentication
One method for helping users secure their accounts that is becoming increasingly common is "multi-factor authentication". Instead of just providing your email and password, platforms send a one-time use code to your phone number or email, or use "time-based one time passwords" which are stored in a password manager or on a hardware device.
Again, MFA is a solution to a problem inherent in account-based authentication which would not be nearly so prevalent in a cryptographic identity system. Still, theft of keys does happen, and so MFA would be an important improvement - if not for an extra layer of authentication, then as a basis for key rotation.
In a sense, MFA is already being researched - key shards is one way of creating multiple credentials from a single key. However, this doesn't address the issue of key rotation, especially when an identity is tied to the public key that corresponds to a given private key. There are two possible solutions to this problem:
- Introduce a naming system. This would allow identities to use a durable name, assigning it to different keys over time. The downside is that this would require the introduction of either centralized naming authorities (back to the old model), or a blockchain in order to solve Zooko's trilemma.
- Establish a chain of keys. This would require a given key to name a successor key in advance and self-invalidate, or some other process like social recovery to invalidate an old key and assign the identity to a new one. This also would significantly increase the complexity of validating messages and associating them with a given identity.
Both solutions are workable, but introduce a lot of complexity that could cause more trouble than it's worth, depending on the identity system we're talking about.
Surveillance
One of the nice qualities that systems based on cryptographic identities have is that digitally signed data can be passed through any number of untrusted systems and emerge intact. This ability to resist tampering makes it possible to broadcast signed data more widely than would otherwise be the case in a system that relies on a custodian to authenticate information.
The downside of this is that more untrusted systems have access to data. And if information is broadcast publicly, anyone can get access to it.
This problem is compounded by re-use of cryptographic identities across multiple contexts. A benefit of self-issued credentials is that it becomes possible to bring everything attached to your identity with you, including social context and attached credentials. This is convenient and can be quite powerful, but it also means that more context is attached to your activity, making it easier to infer information about you for advertising or surveillance purposes. This is dangerously close to the dystopian ideal of a "Digital ID".
The best way to deal with this risk is to consider identity re-use an option to be used when desirable, but to default to creating a new key for every identity you create. This is no worse than the status quo, and it makes room for the ability to link identities when desired.
Another possible approach to this problem is to avoid broadcasting signed data when possible. This could be done by obscuring your cryptographic identity when data is served from a database, or by encrypting your signed data in order to selectively share it with named counterparties.
Still, this is a real risk, and should be kept in mind when designing and using systems based on cryptographic identity. If you'd like to read more about this, please see this blog post.
Making Keys Usable
You might be tempted to look at that list of trade-offs and get the sense that cryptographic identity is not for mere mortals. Key management is hard, and footguns abound - but there is a way forward. With nostr, some new things are happening in the world of key management that have never really happened before.
Plenty of work over the last 30 years has gone into making key management tractable, but none have really been widely adopted. The reason for this is simple: network effect.
Many of these older key systems only applied the thinnest veneer of humanity over keys. But an identity is much richer than a mere label. Having a real name, social connections, and a corpus of work to attach to a key creates a system of keys that humans care about.
By bootstrapping key management within a social context, nostr ensures that the payoff of key management is worth the learning curve. Not only is social engagement a strong incentive to get off the ground, people already on the network are eager to help you get past any roadblocks you might face.
So if I could offer an action item: give nostr a try today. Whether you're in it for the people and their values, or you just want to experiment with cryptographic identity, nostr is a great place to start. For a quick introduction and to securely generate keys, visit njump.me.
Thanks for taking the time to read this post. I hope it's been helpful, and I can't wait to see you on nostr!
-
@ 8d34bd24:414be32b
2025-03-05 16:52:58Sometimes I wonder why I write posts like this. This is not the way to gain a big following, but then again, that is not my goal. My goal is to share Jesus with anyone who will listen, to faithfully speak whatever truth I feel God is leading me to share, and to teach the inerrant word of God in order to draw people, both believers and not yet believers, closer to Jesus. I trust God to use my words in whatever way He sees best. If it only reaches a few, that is OK by me. If somehow this substack starts reaching a vast audience, then praise God for that!
Today, I am writing about a hard truth. The Bible contains a number of hard truths that most people don’t want to believe, but which our Creator God has stated as truth. None of us likes being called a sinner, but the Bible says:
as it is written, “There is none righteous, not even one. (Romans 3:10)
As hard as the truth that we are all sinners is, a much harder truth is that not everyone gets to go to Heaven. Some people are destined for Hell. I am going to investigate some verses that illuminate this truth.
Ironically, most people have two contradictory thoughts. Most people wonder why God allows so much evil in the world. If He is truly sovereign, why doesn’t He stop evil? At the same time they wonder why a loving God would send anyone to Hell. We can’t expect God to stop and punish evil, but not send some people to Hell. We can’t have it both ways.
The Lord is not slow about His promise, as some count slowness, but is patient toward you, not wishing for any to perish but for all to come to repentance. (2 Peter 3:9)
This verse explains the basic facts of how God’s holiness is reconciled with His love and mercy, but of course there is so much more. If God is truly sovereign over all, then why is there any evil? Why does anyone sin? Why is there pain and suffering?
The Lord has made everything for its own purpose,\ Even the wicked for the day of evil.\ Everyone who is proud in heart is an abomination to the Lord;\ Assuredly, he will not be unpunished.\ By lovingkindness and truth iniquity is atoned for,\ And by the fear of the Lord one keeps away from evil. (Proverbs 16:4-6) {emphasis mine}
Everyone and everything was made for God’s own purpose. As our Creator, He has the right to make each of us for whatever purpose He desires. The creature has no right to question the Creator and His purpose.
Then I went down to the potter’s house, and there he was, making something on the wheel. But the vessel that he was making of clay was spoiled in the hand of the potter; so he remade it into another vessel, as it pleased the potter to make.
Then the word of the Lord came to me saying, “Can I not, O house of Israel, deal with you as this potter does?” declares the Lord. “Behold, like the clay in the potter’s hand, so are you in My hand, O house of Israel. At one moment I might speak concerning a nation or concerning a kingdom to uproot, to pull down, or to destroy it; if that nation against which I have spoken turns from its evil, I will relent concerning the calamity I planned to bring on it. Or at another moment I might speak concerning a nation or concerning a kingdom to build up or to plant it; if it does evil in My sight by not obeying My voice, then I will think better of the good with which I had promised to bless it. (Jeremiah 18:3-10) {emphasis mine}
But the Bible says it even goes beyond God directly responding to our choices. The God of the Bible is creator and sovereign over all. Nothing happens contrary to His will.
So then He has mercy on whom He desires, and He hardens whom He desires.
You will say to me then, “Why does He still find fault? For who resists His will?” On the contrary, who are you, O man, who answers back to God? The thing molded will not say to the molder, “Why did you make me like this,” will it? Or does not the potter have a right over the clay, to make from the same lump one vessel for honorable use and another for common use? What if God, although willing to demonstrate His wrath and to make His power known, endured with much patience vessels of wrath prepared for destruction? And He did so to make known the riches of His glory upon vessels of mercy, which He prepared beforehand for glory, even us, whom He also called, not from among Jews only, but also from among Gentiles. (Romans 9:18-24) {emphasis mine}
The above passage speaks a very uncomfortable truth. We don’t like thinking we don’t have full and complete free-will to do whatever we want and to determine our future, but it isn’t that simple. The Bible says specifically that some are “prepared for destruction” and others are “prepared beforehand for glory.”
For by grace you have been saved through faith; and that not of yourselves, it is the gift of God; not as a result of works, so that no one may boast. For we are His workmanship, created in Christ Jesus for good works, which God prepared beforehand so that we would walk in them. (Ephesians 2:8-10) {emphasis mine}
We aren’t saved because we are smarter than all of the people who didn’t choose Jesus. We aren’t wiser than those who chose their own path rather than the path designed by God. We are saved by God as a gift. He called those who were dead in their sins to life in him. The dead can’t choose anything. We all must be made spiritually alive so we can follow Him. Only Jesus does that. We can’t make ourselves alive in Him.
Every believer needs to thank Jesus daily for the miracle of spiritual life in Him that has been given to us despite us not deserving it or choosing it.
In this is love, not that we loved God, but that He loved us and sent His Son to be the propitiation for our sins. (1 John 4:10)
and
We love, because He first loved us. (1 John 4:19)
Jesus acted first, choosing us, and we responded, not that we chose Him and He loved us because of our choice.
I’m sure many of my readers are cringing at this Biblical truth. We all try to make God’s word say something else because we don’t like feeling out of control. We don’t like to think that someone else is smarter, stronger, or more in control of our lives than ourselves. Still, being made to follow Jesus is the greatest blessing a person can receive.
Trust in the Lord with all your heart\ And do not lean on your own understanding.\ In all your ways acknowledge Him,\ And He will make your paths straight.\ Do not be wise in your own eyes;\ Fear the Lord and turn away from evil.\ It will be healing to your body\ And refreshment to your bones. (Proverbs 3:5-8)
We don’t have to fully understand God’s truth, but we do need to accept it.
May God guide you in the truth through His God breathed word, so we may serve Him faithfully and submit fully to His authority and His will to the glory of His majesty.
Trust Jesus
-
@ 401014b3:59d5476b
2025-03-05 15:37:44Alright, football fiends, it’s March 2025, and we’re diving into the NFC North like it’s a polar plunge with a side of cheap beer. Free agency’s a free-for-all, the draft’s a crapshoot, and this division’s always a slugfest of grit, guts, and grudges. The Vikings shocked the world with a 14-3 run in 2024, the Lions roared, the Packers stayed scrappy, and the Bears showed flashes. Let’s slap some records on this beast and figure out who’s got the stones to take the North. Here we go, fam—hold my bratwurst.
Minnesota Vikings: 11-6 – Darnold’s Encore or Bust
The Vikings were the NFL’s Cinderella story in 2024, rolling to 14-3 with Sam Darnold slinging it and Brian Flores’ defense eating souls. Justin Jefferson’s still a cheat code, and Aaron Jones keeps the ground game humming. That D-line—Jonathan Greenard, Andrew Van Ginkel—stays nasty, but free agency’s lurking. Danielle Hunter’s long gone, and guys like Harrison Phillips might chase a bag. J.J. McCarthy’s waiting in the wings, but Darnold’s 2024 magic earns him the nod. Regression’s real after a dream season—11-6 feels right, snagging the division. They’re not hitting 14 again, but they’re still a playoff lock.
Detroit Lions: 10-7 – Campbell’s Grit Keeps Grinding
The Lions were a buzzsaw in 2024, and they’re not fading. Jared Goff’s got Amon-Ra St. Brown and Jameson Williams torching secondaries, while David Montgomery and Jahmyr Gibbs bulldoze defenses. Aidan Hutchinson’s a one-man wrecking crew up front, but free agency could nick ‘em—Brian Branch or Alim McNeill might dip. Dan Campbell’s got this team playing with their hair on fire, and that O-line’s still elite. 10-7’s the call, grabbing a wildcard. They’re a hair behind Minnesota but ready to punch someone’s lights out in January.
Green Bay Packers: 9-8 – Love’s Rollercoaster Redux
The Packers are the NFC North’s wild card—literally. Jordan Love’s got that boom-or-bust vibe, Josh Jacobs keeps the run game honest, and the WR trio—Christian Watson, Romeo Doubs, Jayden Reed—is a problem when healthy. Rashan Gary’s a beast on D, but the secondary’s shaky, and Jaire Alexander might bolt if the money’s right. This team’s young, scrappy, and inconsistent—9-8’s where they land. Might sneak a wildcard if the chips fall, but they’re not catching the top dogs yet.
Chicago Bears: 6-11 – Caleb’s Sophomore Slump
The Bears had their moments in 2024, but 2025’s a grind. Caleb Williams has DJ Moore and Rome Odunze to sling it to, and D’Andre Swift’s solid, but that O-line’s still a sieve. The defense—Montez Sweat, Jaylon Johnson—can ball, but depth’s thin, and free agency might swipe Tremaine Edmunds. Williams takes a step, but not a leap—6-11’s the harsh reality. They’re building something, but it’s not playoff-ready. Sorry, Windy City, you’re still in the basement.
The Final Roar
The NFC North in 2025 is a Viking victory lap with a tight chase. The Vikings (11-6) snag the crown because Darnold’s 2024 glow carries over, the Lions (10-7) claw a wildcard with grit, the Packers (9-8) flirt with relevance, and the Bears (6-11) eat turf. Free agency’s the X-factor—lose a star, you’re cooked; keep ‘em, you’re golden. Yell at me on X when I botch this, but this is my NFC North sermon. Let’s ride, degenerates.