-
@ 04c915da:3dfbecc9
2025-03-26 20:54:33Capitalism is the most effective system for scaling innovation. The pursuit of profit is an incredibly powerful human incentive. Most major improvements to human society and quality of life have resulted from this base incentive. Market competition often results in the best outcomes for all.
That said, some projects can never be monetized. They are open in nature and a business model would centralize control. Open protocols like bitcoin and nostr are not owned by anyone and if they were it would destroy the key value propositions they provide. No single entity can or should control their use. Anyone can build on them without permission.
As a result, open protocols must depend on donation based grant funding from the people and organizations that rely on them. This model works but it is slow and uncertain, a grind where sustainability is never fully reached but rather constantly sought. As someone who has been incredibly active in the open source grant funding space, I do not think people truly appreciate how difficult it is to raise charitable money and deploy it efficiently.
Projects that can be monetized should be. Profitability is a super power. When a business can generate revenue, it taps into a self sustaining cycle. Profit fuels growth and development while providing projects independence and agency. This flywheel effect is why companies like Google, Amazon, and Apple have scaled to global dominance. The profit incentive aligns human effort with efficiency. Businesses must innovate, cut waste, and deliver value to survive.
Contrast this with non monetized projects. Without profit, they lean on external support, which can dry up or shift with donor priorities. A profit driven model, on the other hand, is inherently leaner and more adaptable. It is not charity but survival. When survival is tied to delivering what people want, scale follows naturally.
The real magic happens when profitable, sustainable businesses are built on top of open protocols and software. Consider the many startups building on open source software stacks, such as Start9, Mempool, and Primal, offering premium services on top of the open source software they build out and maintain. Think of companies like Block or Strike, which leverage bitcoin’s open protocol to offer their services on top. These businesses amplify the open software and protocols they build on, driving adoption and improvement at a pace donations alone could never match.
When you combine open software and protocols with profit driven business the result are lean, sustainable companies that grow faster and serve more people than either could alone. Bitcoin’s network, for instance, benefits from businesses that profit off its existence, while nostr will expand as developers monetize apps built on the protocol.
Capitalism scales best because competition results in efficiency. Donation funded protocols and software lay the groundwork, while market driven businesses build on top. The profit incentive acts as a filter, ensuring resources flow to what works, while open systems keep the playing field accessible, empowering users and builders. Together, they create a flywheel of innovation, growth, and global benefit.
-
@ efcb5fc5:5680aa8e
2025-04-15 07:34:28We're living in a digital dystopia. A world where our attention is currency, our data is mined, and our mental well-being is collateral damage in the relentless pursuit of engagement. The glossy facades of traditional social media platforms hide a dark underbelly of algorithmic manipulation, curated realities, and a pervasive sense of anxiety that seeps into every aspect of our lives. We're trapped in a digital echo chamber, drowning in a sea of manufactured outrage and meaningless noise, and it's time to build an ark and sail away.
I've witnessed the evolution, or rather, the devolution, of online interaction. From the raw, unfiltered chaos of early internet chat rooms to the sterile, algorithmically controlled environments of today's social giants, I've seen the promise of connection twisted into a tool for manipulation and control. We've become lab rats in a grand experiment, our emotional responses measured and monetized, our opinions shaped and sold to the highest bidder. But there's a flicker of hope in the darkness, a chance to reclaim our digital autonomy, and that hope is NOSTR (Notes and Other Stuff Transmitted by Relays).
The Psychological Warfare of Traditional Social Media
The Algorithmic Cage: These algorithms aren't designed to enhance your life; they're designed to keep you scrolling. They feed on your vulnerabilities, exploiting your fears and desires to maximize engagement, even if it means promoting misinformation, outrage, and division.
The Illusion of Perfection: The curated realities presented on these platforms create a toxic culture of comparison. We're bombarded with images of flawless bodies, extravagant lifestyles, and seemingly perfect lives, leading to feelings of inadequacy and self-doubt.
The Echo Chamber Effect: Algorithms reinforce our existing beliefs, isolating us from diverse perspectives and creating a breeding ground for extremism. We become trapped in echo chambers where our biases are constantly validated, leading to increased polarization and intolerance.
The Toxicity Vortex: The lack of effective moderation creates a breeding ground for hate speech, cyberbullying, and online harassment. We're constantly exposed to toxic content that erodes our mental well-being and fosters a sense of fear and distrust.
This isn't just a matter of inconvenience; it's a matter of mental survival. We're being subjected to a form of psychological warfare, and it's time to fight back.
NOSTR: A Sanctuary in the Digital Wasteland
NOSTR offers a radical alternative to this toxic environment. It's not just another platform; it's a decentralized protocol that empowers users to reclaim their digital sovereignty.
User-Controlled Feeds: You decide what you see, not an algorithm. You curate your own experience, focusing on the content and people that matter to you.
Ownership of Your Digital Identity: Your data and content are yours, secured by cryptography. No more worrying about being deplatformed or having your information sold to the highest bidder.
Interoperability: Your identity works across a diverse ecosystem of apps, giving you the freedom to choose the interface that suits your needs.
Value-Driven Interactions: The "zaps" feature enables direct micropayments, rewarding creators for valuable content and fostering a culture of genuine appreciation.
Decentralized Power: No single entity controls NOSTR, making it censorship-resistant and immune to the whims of corporate overlords.
Building a Healthier Digital Future
NOSTR isn't just about escaping the toxicity of traditional social media; it's about building a healthier, more meaningful online experience.
Cultivating Authentic Connections: Focus on building genuine relationships with people who share your values and interests, rather than chasing likes and followers.
Supporting Independent Creators: Use "zaps" to directly support the artists, writers, and thinkers who inspire you.
Embracing Intellectual Diversity: Explore different NOSTR apps and communities to broaden your horizons and challenge your assumptions.
Prioritizing Your Mental Health: Take control of your digital environment and create a space that supports your well-being.
Removing the noise: Value based interactions promote value based content, instead of the constant stream of noise that traditional social media promotes.
The Time for Action is Now
NOSTR is a nascent technology, but it represents a fundamental shift in how we interact online. It's a chance to build a more open, decentralized, and user-centric internet, one that prioritizes our mental health and our humanity.
We can no longer afford to be passive consumers in the digital age. We must become active participants in shaping our online experiences. It's time to break free from the chains of algorithmic control and reclaim our digital autonomy.
Join the NOSTR movement
Embrace the power of decentralization. Let's build a digital future that's worthy of our humanity. Let us build a place where the middlemen, and the algorithms that they control, have no power over us.
In addition to the points above, here are some examples/links of how NOSTR can be used:
Simple Signup: Creating a NOSTR account is incredibly easy. You can use platforms like Yakihonne or Primal to generate your keys and start exploring the ecosystem.
X-like Client: Apps like Damus offer a familiar X-like experience, making it easy for users to transition from traditional platforms.
Sharing Photos and Videos: Clients like Olas are optimized for visual content, allowing you to share your photos and videos with your followers.
Creating and Consuming Blogs: NOSTR can be used to publish and share blog posts, fostering a community of independent creators.
Live Streaming and Audio Spaces: Explore platforms like Hivetalk and zap.stream for live streaming and audio-based interactions.
NOSTR is a powerful tool for reclaiming your digital life and building a more meaningful online experience. It's time to take control, break free from the shackles of traditional social media, and embrace the future of decentralized communication.
Get the full overview of these and other on: https://nostrapps.com/
-
@ c4b5369a:b812dbd6
2025-04-15 07:26:16Offline transactions with Cashu
Over the past few weeks, I've been busy implementing offline capabilities into nutstash. I think this is one of the key value propositions of ecash, beinga a bearer instrument that can be used without internet access.
It does however come with limitations, which can lead to a bit of confusion. I hope this article will clear some of these questions up for you!
What is ecash/Cashu?
Ecash is the first cryptocurrency ever invented. It was created by David Chaum in 1983. It uses a blind signature scheme, which allows users to prove ownership of a token without revealing a link to its origin. These tokens are what we call ecash. They are bearer instruments, meaning that anyone who possesses a copy of them, is considered the owner.
Cashu is an implementation of ecash, built to tightly interact with Bitcoin, more specifically the Bitcoin lightning network. In the Cashu ecosystem,
Mints
are the gateway to the lightning network. They provide the infrastructure to access the lightning network, pay invoices and receive payments. Instead of relying on a traditional ledger scheme like other custodians do, the mint issues ecash tokens, to represent the value held by the users.How do normal Cashu transactions work?
A Cashu transaction happens when the sender gives a copy of his ecash token to the receiver. This can happen by any means imaginable. You could send the token through email, messenger, or even by pidgeon. One of the common ways to transfer ecash is via QR code.
The transaction is however not finalized just yet! In order to make sure the sender cannot double-spend their copy of the token, the receiver must do what we call a
swap
. A swap is essentially exchanging an ecash token for a new one at the mint, invalidating the old token in the process. This ensures that the sender can no longer use the same token to spend elsewhere, and the value has been transferred to the receiver.What about offline transactions?
Sending offline
Sending offline is very simple. The ecash tokens are stored on your device. Thus, no internet connection is required to access them. You can litteraly just take them, and give them to someone. The most convenient way is usually through a local transmission protocol, like NFC, QR code, Bluetooth, etc.
The one thing to consider when sending offline is that ecash tokens come in form of "coins" or "notes". The technical term we use in Cashu is
Proof
. It "proofs" to the mint that you own a certain amount of value. Since these proofs have a fixed value attached to them, much like UTXOs in Bitcoin do, you would need proofs with a value that matches what you want to send. You can mix and match multiple proofs together to create a token that matches the amount you want to send. But, if you don't have proofs that match the amount, you would need to go online and swap for the needed proofs at the mint.Another limitation is, that you cannot create custom proofs offline. For example, if you would want to lock the ecash to a certain pubkey, or add a timelock to the proof, you would need to go online and create a new custom proof at the mint.
Receiving offline
You might think: well, if I trust the sender, I don't need to be swapping the token right away!
You're absolutely correct. If you trust the sender, you can simply accept their ecash token without needing to swap it immediately.
This is already really useful, since it gives you a way to receive a payment from a friend or close aquaintance without having to worry about connectivity. It's almost just like physical cash!
It does however not work if the sender is untrusted. We have to use a different scheme to be able to receive payments from someone we don't trust.
Receiving offline from an untrusted sender
To be able to receive payments from an untrusted sender, we need the sender to create a custom proof for us. As we've seen before, this requires the sender to go online.
The sender needs to create a token that has the following properties, so that the receciver can verify it offline:
- It must be locked to ONLY the receiver's public key
- It must include an
offline signature proof
(DLEQ proof) - If it contains a timelock & refund clause, it must be set to a time in the future that is acceptable for the receiver
- It cannot contain duplicate proofs (double-spend)
- It cannot contain proofs that the receiver has already received before (double-spend)
If all of these conditions are met, then the receiver can verify the proof offline and accept the payment. This allows us to receive payments from anyone, even if we don't trust them.
At first glance, this scheme seems kinda useless. It requires the sender to go online, which defeats the purpose of having an offline payment system.
I beleive there are a couple of ways this scheme might be useful nonetheless:
-
Offline vending machines: Imagine you have an offline vending machine that accepts payments from anyone. The vending machine could use this scheme to verify payments without needing to go online itself. We can assume that the sender is able to go online and create a valid token, but the receiver doesn't need to be online to verify it.
-
Offline marketplaces: Imagine you have an offline marketplace where buyers and sellers can trade goods and services. Before going to the marketplace the sender already knows where he will be spending the money. The sender could create a valid token before going to the marketplace, using the merchants public key as a lock, and adding a refund clause to redeem any unspent ecash after it expires. In this case, neither the sender nor the receiver needs to go online to complete the transaction.
How to use this
Pretty much all cashu wallets allow you to send tokens offline. This is because all that the wallet needs to do is to look if it can create the desired amount from the proofs stored locally. If yes, it will automatically create the token offline.
Receiving offline tokens is currently only supported by nutstash (experimental).
To create an offline receivable token, the sender needs to lock it to the receiver's public key. Currently there is no refund clause! So be careful that you don't get accidentally locked out of your funds!
The receiver can then inspect the token and decide if it is safe to accept without a swap. If all checks are green, they can accept the token offline without trusting the sender.
The receiver will see the unswapped tokens on the wallet homescreen. They will need to manually swap them later when they are online again.
Later when the receiver is online again, they can swap the token for a fresh one.
Summary
We learned that offline transactions are possible with ecash, but there are some limitations. It either requires trusting the sender, or relying on either the sender or receiver to be online to verify the tokens, or create tokens that can be verified offline by the receiver.
I hope this short article was helpful in understanding how ecash works and its potential for offline transactions.
Cheers,
Gandlaf
-
@ 21335073:a244b1ad
2025-03-18 14:43:08Warning: This piece contains a conversation about difficult topics. Please proceed with caution.
TL;DR please educate your children about online safety.
Julian Assange wrote in his 2012 book Cypherpunks, “This book is not a manifesto. There isn’t time for that. This book is a warning.” I read it a few times over the past summer. Those opening lines definitely stood out to me. I wish we had listened back then. He saw something about the internet that few had the ability to see. There are some individuals who are so close to a topic that when they speak, it’s difficult for others who aren’t steeped in it to visualize what they’re talking about. I didn’t read the book until more recently. If I had read it when it came out, it probably would have sounded like an unknown foreign language to me. Today it makes more sense.
This isn’t a manifesto. This isn’t a book. There is no time for that. It’s a warning and a possible solution from a desperate and determined survivor advocate who has been pulling and unraveling a thread for a few years. At times, I feel too close to this topic to make any sense trying to convey my pathway to my conclusions or thoughts to the general public. My hope is that if nothing else, I can convey my sense of urgency while writing this. This piece is a watchman’s warning.
When a child steps online, they are walking into a new world. A new reality. When you hand a child the internet, you are handing them possibilities—good, bad, and ugly. This is a conversation about lowering the potential of negative outcomes of stepping into that new world and how I came to these conclusions. I constantly compare the internet to the road. You wouldn’t let a young child run out into the road with no guidance or safety precautions. When you hand a child the internet without any type of guidance or safety measures, you are allowing them to play in rush hour, oncoming traffic. “Look left, look right for cars before crossing.” We almost all have been taught that as children. What are we taught as humans about safety before stepping into a completely different reality like the internet? Very little.
I could never really figure out why many folks in tech, privacy rights activists, and hackers seemed so cold to me while talking about online child sexual exploitation. I always figured that as a survivor advocate for those affected by these crimes, that specific, skilled group of individuals would be very welcoming and easy to talk to about such serious topics. I actually had one hacker laugh in my face when I brought it up while I was looking for answers. I thought maybe this individual thought I was accusing them of something I wasn’t, so I felt bad for asking. I was constantly extremely disappointed and would ask myself, “Why don’t they care? What could I say to make them care more? What could I say to make them understand the crisis and the level of suffering that happens as a result of the problem?”
I have been serving minor survivors of online child sexual exploitation for years. My first case serving a survivor of this specific crime was in 2018—a 13-year-old girl sexually exploited by a serial predator on Snapchat. That was my first glimpse into this side of the internet. I won a national award for serving the minor survivors of Twitter in 2023, but I had been working on that specific project for a few years. I was nominated by a lawyer representing two survivors in a legal battle against the platform. I’ve never really spoken about this before, but at the time it was a choice for me between fighting Snapchat or Twitter. I chose Twitter—or rather, Twitter chose me. I heard about the story of John Doe #1 and John Doe #2, and I was so unbelievably broken over it that I went to war for multiple years. I was and still am royally pissed about that case. As far as I was concerned, the John Doe #1 case proved that whatever was going on with corporate tech social media was so out of control that I didn’t have time to wait, so I got to work. It was reading the messages that John Doe #1 sent to Twitter begging them to remove his sexual exploitation that broke me. He was a child begging adults to do something. A passion for justice and protecting kids makes you do wild things. I was desperate to find answers about what happened and searched for solutions. In the end, the platform Twitter was purchased. During the acquisition, I just asked Mr. Musk nicely to prioritize the issue of detection and removal of child sexual exploitation without violating digital privacy rights or eroding end-to-end encryption. Elon thanked me multiple times during the acquisition, made some changes, and I was thanked by others on the survivors’ side as well.
I still feel that even with the progress made, I really just scratched the surface with Twitter, now X. I left that passion project when I did for a few reasons. I wanted to give new leadership time to tackle the issue. Elon Musk made big promises that I knew would take a while to fulfill, but mostly I had been watching global legislation transpire around the issue, and frankly, the governments are willing to go much further with X and the rest of corporate tech than I ever would. My work begging Twitter to make changes with easier reporting of content, detection, and removal of child sexual exploitation material—without violating privacy rights or eroding end-to-end encryption—and advocating for the minor survivors of the platform went as far as my principles would have allowed. I’m grateful for that experience. I was still left with a nagging question: “How did things get so bad with Twitter where the John Doe #1 and John Doe #2 case was able to happen in the first place?” I decided to keep looking for answers. I decided to keep pulling the thread.
I never worked for Twitter. This is often confusing for folks. I will say that despite being disappointed in the platform’s leadership at times, I loved Twitter. I saw and still see its value. I definitely love the survivors of the platform, but I also loved the platform. I was a champion of the platform’s ability to give folks from virtually around the globe an opportunity to speak and be heard.
I want to be clear that John Doe #1 really is my why. He is the inspiration. I am writing this because of him. He represents so many globally, and I’m still inspired by his bravery. One child’s voice begging adults to do something—I’m an adult, I heard him. I’d go to war a thousand more lifetimes for that young man, and I don’t even know his name. Fighting has been personally dark at times; I’m not even going to try to sugarcoat it, but it has been worth it.
The data surrounding the very real crime of online child sexual exploitation is available to the public online at any time for anyone to see. I’d encourage you to go look at the data for yourself. I believe in encouraging folks to check multiple sources so that you understand the full picture. If you are uncomfortable just searching around the internet for information about this topic, use the terms “CSAM,” “CSEM,” “SG-CSEM,” or “AI Generated CSAM.” The numbers don’t lie—it’s a nightmare that’s out of control. It’s a big business. The demand is high, and unfortunately, business is booming. Organizations collect the data, tech companies often post their data, governments report frequently, and the corporate press has covered a decent portion of the conversation, so I’m sure you can find a source that you trust.
Technology is changing rapidly, which is great for innovation as a whole but horrible for the crime of online child sexual exploitation. Those wishing to exploit the vulnerable seem to be adapting to each technological change with ease. The governments are so far behind with tackling these issues that as I’m typing this, it’s borderline irrelevant to even include them while speaking about the crime or potential solutions. Technology is changing too rapidly, and their old, broken systems can’t even dare to keep up. Think of it like the governments’ “War on Drugs.” Drugs won. In this case as well, the governments are not winning. The governments are talking about maybe having a meeting on potentially maybe having legislation around the crimes. The time to have that meeting would have been many years ago. I’m not advocating for governments to legislate our way out of this. I’m on the side of educating and innovating our way out of this.
I have been clear while advocating for the minor survivors of corporate tech platforms that I would not advocate for any solution to the crime that would violate digital privacy rights or erode end-to-end encryption. That has been a personal moral position that I was unwilling to budge on. This is an extremely unpopular and borderline nonexistent position in the anti-human trafficking movement and online child protection space. I’m often fearful that I’m wrong about this. I have always thought that a better pathway forward would have been to incentivize innovation for detection and removal of content. I had no previous exposure to privacy rights activists or Cypherpunks—actually, I came to that conclusion by listening to the voices of MENA region political dissidents and human rights activists. After developing relationships with human rights activists from around the globe, I realized how important privacy rights and encryption are for those who need it most globally. I was simply unwilling to give more power, control, and opportunities for mass surveillance to big abusers like governments wishing to enslave entire nations and untrustworthy corporate tech companies to potentially end some portion of abuses online. On top of all of it, it has been clear to me for years that all potential solutions outside of violating digital privacy rights to detect and remove child sexual exploitation online have not yet been explored aggressively. I’ve been disappointed that there hasn’t been more of a conversation around preventing the crime from happening in the first place.
What has been tried is mass surveillance. In China, they are currently under mass surveillance both online and offline, and their behaviors are attached to a social credit score. Unfortunately, even on state-run and controlled social media platforms, they still have child sexual exploitation and abuse imagery pop up along with other crimes and human rights violations. They also have a thriving black market online due to the oppression from the state. In other words, even an entire loss of freedom and privacy cannot end the sexual exploitation of children online. It’s been tried. There is no reason to repeat this method.
It took me an embarrassingly long time to figure out why I always felt a slight coldness from those in tech and privacy-minded individuals about the topic of child sexual exploitation online. I didn’t have any clue about the “Four Horsemen of the Infocalypse.” This is a term coined by Timothy C. May in 1988. I would have been a child myself when he first said it. I actually laughed at myself when I heard the phrase for the first time. I finally got it. The Cypherpunks weren’t wrong about that topic. They were so spot on that it is borderline uncomfortable. I was mad at first that they knew that early during the birth of the internet that this issue would arise and didn’t address it. Then I got over it because I realized that it wasn’t their job. Their job was—is—to write code. Their job wasn’t to be involved and loving parents or survivor advocates. Their job wasn’t to educate children on internet safety or raise awareness; their job was to write code.
They knew that child sexual abuse material would be shared on the internet. They said what would happen—not in a gleeful way, but a prediction. Then it happened.
I equate it now to a concrete company laying down a road. As you’re pouring the concrete, you can say to yourself, “A terrorist might travel down this road to go kill many, and on the flip side, a beautiful child can be born in an ambulance on this road.” Who or what travels down the road is not their responsibility—they are just supposed to lay the concrete. I’d never go to a concrete pourer and ask them to solve terrorism that travels down roads. Under the current system, law enforcement should stop terrorists before they even make it to the road. The solution to this specific problem is not to treat everyone on the road like a terrorist or to not build the road.
So I understand the perceived coldness from those in tech. Not only was it not their job, but bringing up the topic was seen as the equivalent of asking a free person if they wanted to discuss one of the four topics—child abusers, terrorists, drug dealers, intellectual property pirates, etc.—that would usher in digital authoritarianism for all who are online globally.
Privacy rights advocates and groups have put up a good fight. They stood by their principles. Unfortunately, when it comes to corporate tech, I believe that the issue of privacy is almost a complete lost cause at this point. It’s still worth pushing back, but ultimately, it is a losing battle—a ticking time bomb.
I do think that corporate tech providers could have slowed down the inevitable loss of privacy at the hands of the state by prioritizing the detection and removal of CSAM when they all started online. I believe it would have bought some time, fewer would have been traumatized by that specific crime, and I do believe that it could have slowed down the demand for content. If I think too much about that, I’ll go insane, so I try to push the “if maybes” aside, but never knowing if it could have been handled differently will forever haunt me. At night when it’s quiet, I wonder what I would have done differently if given the opportunity. I’ll probably never know how much corporate tech knew and ignored in the hopes that it would go away while the problem continued to get worse. They had different priorities. The most voiceless and vulnerable exploited on corporate tech never had much of a voice, so corporate tech providers didn’t receive very much pushback.
Now I’m about to say something really wild, and you can call me whatever you want to call me, but I’m going to say what I believe to be true. I believe that the governments are either so incompetent that they allowed the proliferation of CSAM online, or they knowingly allowed the problem to fester long enough to have an excuse to violate privacy rights and erode end-to-end encryption. The US government could have seized the corporate tech providers over CSAM, but I believe that they were so useful as a propaganda arm for the regimes that they allowed them to continue virtually unscathed.
That season is done now, and the governments are making the issue a priority. It will come at a high cost. Privacy on corporate tech providers is virtually done as I’m typing this. It feels like a death rattle. I’m not particularly sure that we had much digital privacy to begin with, but the illusion of a veil of privacy feels gone.
To make matters slightly more complex, it would be hard to convince me that once AI really gets going, digital privacy will exist at all.
I believe that there should be a conversation shift to preserving freedoms and human rights in a post-privacy society.
I don’t want to get locked up because AI predicted a nasty post online from me about the government. I’m not a doomer about AI—I’m just going to roll with it personally. I’m looking forward to the positive changes that will be brought forth by AI. I see it as inevitable. A bit of privacy was helpful while it lasted. Please keep fighting to preserve what is left of privacy either way because I could be wrong about all of this.
On the topic of AI, the addition of AI to the horrific crime of child sexual abuse material and child sexual exploitation in multiple ways so far has been devastating. It’s currently out of control. The genie is out of the bottle. I am hopeful that innovation will get us humans out of this, but I’m not sure how or how long it will take. We must be extremely cautious around AI legislation. It should not be illegal to innovate even if some bad comes with the good. I don’t trust that the governments are equipped to decide the best pathway forward for AI. Source: the entire history of the government.
I have been personally negatively impacted by AI-generated content. Every few days, I get another alert that I’m featured again in what’s called “deep fake pornography” without my consent. I’m not happy about it, but what pains me the most is the thought that for a period of time down the road, many globally will experience what myself and others are experiencing now by being digitally sexually abused in this way. If you have ever had your picture taken and posted online, you are also at risk of being exploited in this way. Your child’s image can be used as well, unfortunately, and this is just the beginning of this particular nightmare. It will move to more realistic interpretations of sexual behaviors as technology improves. I have no brave words of wisdom about how to deal with that emotionally. I do have hope that innovation will save the day around this specific issue. I’m nervous that everyone online will have to ID verify due to this issue. I see that as one possible outcome that could help to prevent one problem but inadvertently cause more problems, especially for those living under authoritarian regimes or anyone who needs to remain anonymous online. A zero-knowledge proof (ZKP) would probably be the best solution to these issues. There are some survivors of violence and/or sexual trauma who need to remain anonymous online for various reasons. There are survivor stories available online of those who have been abused in this way. I’d encourage you seek out and listen to their stories.
There have been periods of time recently where I hesitate to say anything at all because more than likely AI will cover most of my concerns about education, awareness, prevention, detection, and removal of child sexual exploitation online, etc.
Unfortunately, some of the most pressing issues we’ve seen online over the last few years come in the form of “sextortion.” Self-generated child sexual exploitation (SG-CSEM) numbers are continuing to be terrifying. I’d strongly encourage that you look into sextortion data. AI + sextortion is also a huge concern. The perpetrators are using the non-sexually explicit images of children and putting their likeness on AI-generated child sexual exploitation content and extorting money, more imagery, or both from minors online. It’s like a million nightmares wrapped into one. The wild part is that these issues will only get more pervasive because technology is harnessed to perpetuate horror at a scale unimaginable to a human mind.
Even if you banned phones and the internet or tried to prevent children from accessing the internet, it wouldn’t solve it. Child sexual exploitation will still be with us until as a society we start to prevent the crime before it happens. That is the only human way out right now.
There is no reset button on the internet, but if I could go back, I’d tell survivor advocates to heed the warnings of the early internet builders and to start education and awareness campaigns designed to prevent as much online child sexual exploitation as possible. The internet and technology moved quickly, and I don’t believe that society ever really caught up. We live in a world where a child can be groomed by a predator in their own home while sitting on a couch next to their parents watching TV. We weren’t ready as a species to tackle the fast-paced algorithms and dangers online. It happened too quickly for parents to catch up. How can you parent for the ever-changing digital world unless you are constantly aware of the dangers?
I don’t think that the internet is inherently bad. I believe that it can be a powerful tool for freedom and resistance. I’ve spoken a lot about the bad online, but there is beauty as well. We often discuss how victims and survivors are abused online; we rarely discuss the fact that countless survivors around the globe have been able to share their experiences, strength, hope, as well as provide resources to the vulnerable. I do question if giving any government or tech company access to censorship, surveillance, etc., online in the name of serving survivors might not actually impact a portion of survivors negatively. There are a fair amount of survivors with powerful abusers protected by governments and the corporate press. If a survivor cannot speak to the press about their abuse, the only place they can go is online, directly or indirectly through an independent journalist who also risks being censored. This scenario isn’t hard to imagine—it already happened in China. During #MeToo, a survivor in China wanted to post their story. The government censored the post, so the survivor put their story on the blockchain. I’m excited that the survivor was creative and brave, but it’s terrifying to think that we live in a world where that situation is a necessity.
I believe that the future for many survivors sharing their stories globally will be on completely censorship-resistant and decentralized protocols. This thought in particular gives me hope. When we listen to the experiences of a diverse group of survivors, we can start to understand potential solutions to preventing the crimes from happening in the first place.
My heart is broken over the gut-wrenching stories of survivors sexually exploited online. Every time I hear the story of a survivor, I do think to myself quietly, “What could have prevented this from happening in the first place?” My heart is with survivors.
My head, on the other hand, is full of the understanding that the internet should remain free. The free flow of information should not be stopped. My mind is with the innocent citizens around the globe that deserve freedom both online and offline.
The problem is that governments don’t only want to censor illegal content that violates human rights—they create legislation that is so broad that it can impact speech and privacy of all. “Don’t you care about the kids?” Yes, I do. I do so much that I’m invested in finding solutions. I also care about all citizens around the globe that deserve an opportunity to live free from a mass surveillance society. If terrorism happens online, I should not be punished by losing my freedom. If drugs are sold online, I should not be punished. I’m not an abuser, I’m not a terrorist, and I don’t engage in illegal behaviors. I refuse to lose freedom because of others’ bad behaviors online.
I want to be clear that on a long enough timeline, the governments will decide that they can be better parents/caregivers than you can if something isn’t done to stop minors from being sexually exploited online. The price will be a complete loss of anonymity, privacy, free speech, and freedom of religion online. I find it rather insulting that governments think they’re better equipped to raise children than parents and caretakers.
So we can’t go backwards—all that we can do is go forward. Those who want to have freedom will find technology to facilitate their liberation. This will lead many over time to decentralized and open protocols. So as far as I’m concerned, this does solve a few of my worries—those who need, want, and deserve to speak freely online will have the opportunity in most countries—but what about online child sexual exploitation?
When I popped up around the decentralized space, I was met with the fear of censorship. I’m not here to censor you. I don’t write code. I couldn’t censor anyone or any piece of content even if I wanted to across the internet, no matter how depraved. I don’t have the skills to do that.
I’m here to start a conversation. Freedom comes at a cost. You must always fight for and protect your freedom. I can’t speak about protecting yourself from all of the Four Horsemen because I simply don’t know the topics well enough, but I can speak about this one topic.
If there was a shortcut to ending online child sexual exploitation, I would have found it by now. There isn’t one right now. I believe that education is the only pathway forward to preventing the crime of online child sexual exploitation for future generations.
I propose a yearly education course for every child of all school ages, taught as a standard part of the curriculum. Ideally, parents/caregivers would be involved in the education/learning process.
Course: - The creation of the internet and computers - The fight for cryptography - The tech supply chain from the ground up (example: human rights violations in the supply chain) - Corporate tech - Freedom tech - Data privacy - Digital privacy rights - AI (history-current) - Online safety (predators, scams, catfishing, extortion) - Bitcoin - Laws - How to deal with online hate and harassment - Information on who to contact if you are being abused online or offline - Algorithms - How to seek out the truth about news, etc., online
The parents/caregivers, homeschoolers, unschoolers, and those working to create decentralized parallel societies have been an inspiration while writing this, but my hope is that all children would learn this course, even in government ran schools. Ideally, parents would teach this to their own children.
The decentralized space doesn’t want child sexual exploitation to thrive. Here’s the deal: there has to be a strong prevention effort in order to protect the next generation. The internet isn’t going anywhere, predators aren’t going anywhere, and I’m not down to let anyone have the opportunity to prove that there is a need for more government. I don’t believe that the government should act as parents. The governments have had a chance to attempt to stop online child sexual exploitation, and they didn’t do it. Can we try a different pathway forward?
I’d like to put myself out of a job. I don’t want to ever hear another story like John Doe #1 ever again. This will require work. I’ve often called online child sexual exploitation the lynchpin for the internet. It’s time to arm generations of children with knowledge and tools. I can’t do this alone.
Individuals have fought so that I could have freedom online. I want to fight to protect it. I don’t want child predators to give the government any opportunity to take away freedom. Decentralized spaces are as close to a reset as we’ll get with the opportunity to do it right from the start. Start the youth off correctly by preventing potential hazards to the best of your ability.
The good news is anyone can work on this! I’d encourage you to take it and run with it. I added the additional education about the history of the internet to make the course more educational and fun. Instead of cleaning up generations of destroyed lives due to online sexual exploitation, perhaps this could inspire generations of those who will build our futures. Perhaps if the youth is armed with knowledge, they can create more tools to prevent the crime.
This one solution that I’m suggesting can be done on an individual level or on a larger scale. It should be adjusted depending on age, learning style, etc. It should be fun and playful.
This solution does not address abuse in the home or some of the root causes of offline child sexual exploitation. My hope is that it could lead to some survivors experiencing abuse in the home an opportunity to disclose with a trusted adult. The purpose for this solution is to prevent the crime of online child sexual exploitation before it occurs and to arm the youth with the tools to contact safe adults if and when it happens.
In closing, I went to hell a few times so that you didn’t have to. I spoke to the mothers of survivors of minors sexually exploited online—their tears could fill rivers. I’ve spoken with political dissidents who yearned to be free from authoritarian surveillance states. The only balance that I’ve found is freedom online for citizens around the globe and prevention from the dangers of that for the youth. Don’t slow down innovation and freedom. Educate, prepare, adapt, and look for solutions.
I’m not perfect and I’m sure that there are errors in this piece. I hope that you find them and it starts a conversation.
-
@ 878dff7c:037d18bc
2025-04-09 21:38:34Coalition Proposes Sovereign Wealth Funds to Address National Debt
Summary:
Opposition Leader Peter Dutton has unveiled a plan to reduce Australia's $1.2 trillion debt by creating two sovereign wealth funds: the Future Generations Fund and the Regional Australia Future Fund. These funds aim to allocate 80% of commodity windfall revenues toward debt reduction and regional development, focusing on infrastructure and economic support outside metropolitan areas.
Sources: The Australian - April 10, 2025
Australian Dollar Falls Below 60 US Cents Amid Tariff Concerns
Summary:
The Australian dollar has dropped to a five-year low, trading below 60 US cents, as markets react to escalating tariff tensions initiated by the U.S. This depreciation reflects investor fears of a potential global economic downturn impacting Australia's economy.
Sources: ABC News - 9 April 2025, Reuters - 7 April 2025
AI Transformation Reshaping Australia's Software Development Landscape
Summary:
Artificial Intelligence (AI) is rapidly transforming Australia's software development industry. Recent research indicates widespread adoption of AI tools and methodologies, leading to increased efficiency and innovation. This trend positions Australian tech companies competitively in the global market and highlights the importance of AI literacy for professionals in the sector. Sources: Tech Business News - April 10, 2025
UK and Australia Collaborate on Next-Generation Weapons Development
Summary:
The United Kingdom and Australia have launched a partnership to develop next-generation sub-systems for low-cost weapons. This collaboration integrates the UK's Modular Weapons Testbed with Australia's SHARKTOOTH program, featuring innovative 'plug-and-launch' modular technology. The initiative aims to accelerate the deployment of advanced, affordable weapons technologies, enhancing both nations' defense capabilities. Sources: The Defense Post - April 7, 2025, ASD News - April 4, 2025
Smoke Advisory Issued for Greater Sydney Due to Hazard Reduction Burns
Summary:
The NSW Rural Fire Service has issued a smoke advisory for the Greater Sydney area, including the Blue Mountains and Southern Highlands, due to planned hazard reduction burns. Residents are advised to stay indoors, close windows and doors, and keep respiratory medications close by. rfs.nsw.gov.au+1rfs.nsw.gov.au+1 ABC
Sources: NSW Rural Fire Service - April 9, 2025
Leaders Clash in First Election Debate
Summary:
In the first leaders' debate of the 2025 federal election campaign, Prime Minister Anthony Albanese and Opposition Leader Peter Dutton clashed on several key issues during the Sky News/Daily Telegraph People's Forum. Albanese accused the Coalition of historically cutting health and education funding, which Dutton vehemently denied. The debate also saw pointed exchanges over spending levels, energy policy, and cost-of-living concerns. Dutton challenged Albanese’s tax cuts and left open the possibility of extending fuel excise relief. The leaders also addressed infrastructure funding, economic management, and health services. The debate occurred with only 25 days until the election and 14 days before early voting begins.
Sources: The Daily Telegraph - 10 April 2025, News.com.au - 10 April 2025
Australia and Philippines to Increase Joint Military Exercises
Summary:
Australia and the Philippines have agreed to double their joint military drills and security engagements in 2025. This decision underscores the strengthening defense ties between the two nations in response to regional security challenges. Sources: Manila Bulletin - April 7, 2025
Victoria's Working with Children Check System Criticized for Allowing Individuals Under Investigation to Retain Clearance
Summary:
Victoria's Working with Children Check system is under scrutiny for permitting individuals under investigation for abuse and assault to retain their clearance. Parents and advocates are calling for urgent reforms, highlighting cases where children were allegedly harmed by individuals who maintained their working with children credentials despite serious allegations. ABC
Sources: ABC News - April 10, 2025
Ecological Revival Following Inland Floods
Summary:
After unprecedented rainfall transformed over a million square kilometers of inland Australia into floodplains, the region is witnessing a remarkable ecological revival. Native wildlife such as fish, long-haired rats, frogs, and birds are thriving, and previously dried-out habitats are being replenished. Experts view the floods as a rare opportunity for broad ecological regeneration, including mega breeding events and species migrations. While challenges remain, the natural rebirth offers hope as long-dormant ecosystems awaken with vibrant life.
Sources: The Times - April 10, 2025, SciTechDaily - April 10, 2025
CyberCX Report Highlights Evolving Cyber Threat Landscape
Summary:
CyberCX's annual Threat Report for 2025 reveals that business email compromise remains the top incident type, with espionage-related incidents taking longer to detect compared to previous years. The report underscores the need for enhanced cybersecurity measures across Australian organizations. Sources: CyberCX - April 9, 2025
Greens-Backed Study Targets Environmental Impact of Pet Dogs
Summary:
A new study, receiving attention from progressive environmental circles including the Greens, has flagged pet dogs as a significant ecological threat. The research claims dogs contribute to pollution, wildlife disturbances, and even climate change due to their carbon footprint. Critics argue this is part of a broader ideological push to regulate personal lifestyle choices, sparking concerns that common household pets may soon be in the environmental policy crosshairs. With the Greens already pushing for sweeping environmental reforms, some Australians fear this could lead to overreach targeting ordinary families and their beloved pets.
Sources: The Guardian - 10 April 2025
High-Intensity Resistance and Impact Training Enhances Bone Density in Postmenopausal Women
Summary:
The LIFTMOR randomized controlled trial investigated the effects of high-intensity resistance and impact training (HiRIT) on bone health in postmenopausal women with low bone mass. Over eight months, participants engaged in twice-weekly, 30-minute HiRIT sessions, performing exercises such as deadlifts, overhead presses, and back squats at over 85% of their one-repetition maximum. The study found significant improvements in lumbar spine bone mineral density (BMD) by 2.9%, femoral neck BMD by 0.3%, cortical thickness, and functional performance measures, including enhanced leg and back strength. Notably, the HiRIT program was well-tolerated, with high compliance and minimal adverse events, suggesting that such training is both safe and effective for improving bone health and physical function in this demographic. Sources: PubMed - October 4, 2017
Anti-Aging Expert Peter Attia Discusses Longevity and Health Optimization
Summary:
In this episode of "The Diary Of A CEO," host Steven Bartlett engages with Dr. Peter Attia, a physician specializing in longevity and health optimization. Dr. Attia delves into the often-overlooked aspects of aging, emphasizing the importance of proactive health measures. He highlights the critical role of maintaining muscle mass and strength, noting that a decline in these areas significantly increases mortality risk. Dr. Attia also explores natural methods to enhance testosterone levels without resorting to testosterone replacement therapy (TRT), advocating for lifestyle interventions such as strength training, adequate sleep, and balanced nutrition. Throughout the conversation, he underscores the necessity of individualized health strategies and regular monitoring to effectively prevent age-related diseases. Sources: Spotify - April 2025
-
@ da0b9bc3:4e30a4a9
2025-04-04 06:24:48Hello Stackers!
Welcome on into the ~Music Corner of the Saloon!
A place where we Talk Music. Share Tracks. Zap Sats.
So stay a while and listen.
🚨Don't forget to check out the pinned items in the territory homepage! You can always find the latest weeklies there!🚨
🚨Subscribe to the territory to ensure you never miss a post! 🚨
originally posted at https://stacker.news/items/934111
-
@ 0edc2f47:730cff1b
2025-04-04 03:37:15Chef's notes
This started as a spontaneous kitchen experiment—an amalgamation of recipes from old cookbooks and online finds. My younger daughter wanted to surprise her sister with something quick but fancy ("It's a vibe, Mom."), and this is what we came up with. It’s quickly established itself as a go-to favorite: simple, rich, and deeply satisfying. It serves 4 (or 1, depending on the day; I am not here to judge). Tightly wrapped, it will keep up to 3 days in the fridge, but I bet it won't last that long!
Details
- ⏲️ Prep time: 10 min
- 🍳 Cook time: 0 min
Ingredients
- 1 cup (240mL) heavy whipping cream
- 1/4 cup (24g) cocoa powder
- 5 tbsp (38g) Confectioners (powdered) sugar
- 1/4 tsp (1.25mL) vanilla extract (optional)
- Flaky sea salt (optional, but excellent)
Directions
-
- Whip the cream until frothy.
-
- Sift in cocoa and sugar, fold or gently mix (add vanilla if using).
-
- Whip to medium peaks (or stiff peaks, if that's more your thing). Chill and serve (topped with a touch of sea salt if you’re feeling fancy).
-
@ 3bf0c63f:aefa459d
2024-01-15 11:15:06Pequenos problemas que o Estado cria para a sociedade e que não são sempre lembrados
- **vale-transporte**: transferir o custo com o transporte do funcionário para um terceiro o estimula a morar longe de onde trabalha, já que morar perto é normalmente mais caro e a economia com transporte é inexistente. - **atestado médico**: o direito a faltar o trabalho com atestado médico cria a exigência desse atestado para todas as situações, substituindo o livre acordo entre patrão e empregado e sobrecarregando os médicos e postos de saúde com visitas desnecessárias de assalariados resfriados. - **prisões**: com dinheiro mal-administrado, burocracia e péssima alocação de recursos -- problemas que empresas privadas em competição (ou mesmo sem qualquer competição) saberiam resolver muito melhor -- o Estado fica sem presídios, com os poucos existentes entupidos, muito acima de sua alocação máxima, e com isto, segundo a bizarra corrente de responsabilidades que culpa o juiz que condenou o criminoso por sua morte na cadeia, juízes deixam de condenar à prisão os bandidos, soltando-os na rua. - **justiça**: entrar com processos é grátis e isto faz proliferar a atividade dos advogados que se dedicam a criar problemas judiciais onde não seria necessário e a entupir os tribunais, impedindo-os de fazer o que mais deveriam fazer. - **justiça**: como a justiça só obedece às leis e ignora acordos pessoais, escritos ou não, as pessoas não fazem acordos, recorrem sempre à justiça estatal, e entopem-na de assuntos que seriam muito melhor resolvidos entre vizinhos. - **leis civis**: as leis criadas pelos parlamentares ignoram os costumes da sociedade e são um incentivo a que as pessoas não respeitem nem criem normas sociais -- que seriam maneiras mais rápidas, baratas e satisfatórias de resolver problemas. - **leis de trãnsito**: quanto mais leis de trânsito, mais serviço de fiscalização são delegados aos policiais, que deixam de combater crimes por isto (afinal de contas, eles não querem de fato arriscar suas vidas combatendo o crime, a fiscalização é uma excelente desculpa para se esquivarem a esta responsabilidade). - **financiamento educacional**: é uma espécie de subsídio às faculdades privadas que faz com que se criem cursos e mais cursos que são cada vez menos recheados de algum conhecimento ou técnica útil e cada vez mais inúteis. - **leis de tombamento**: são um incentivo a que o dono de qualquer área ou construção "histórica" destrua todo e qualquer vestígio de história que houver nele antes que as autoridades descubram, o que poderia não acontecer se ele pudesse, por exemplo, usar, mostrar e se beneficiar da história daquele local sem correr o risco de perder, de fato, a sua propriedade. - **zoneamento urbano**: torna as cidades mais espalhadas, criando uma necessidade gigantesca de carros, ônibus e outros meios de transporte para as pessoas se locomoverem das zonas de moradia para as zonas de trabalho. - **zoneamento urbano**: faz com que as pessoas percam horas no trânsito todos os dias, o que é, além de um desperdício, um atentado contra a sua saúde, que estaria muito melhor servida numa caminhada diária entre a casa e o trabalho. - **zoneamento urbano**: torna ruas e as casas menos seguras criando zonas enormes, tanto de residências quanto de indústrias, onde não há movimento de gente alguma. - **escola obrigatória + currículo escolar nacional**: emburrece todas as crianças. - **leis contra trabalho infantil**: tira das crianças a oportunidade de aprender ofícios úteis e levar um dinheiro para ajudar a família. - **licitações**: como não existem os critérios do mercado para decidir qual é o melhor prestador de serviço, criam-se comissões de pessoas que vão decidir coisas. isto incentiva os prestadores de serviço que estão concorrendo na licitação a tentar comprar os membros dessas comissões. isto, fora a corrupção, gera problemas reais: __(i)__ a escolha dos serviços acaba sendo a pior possível, já que a empresa prestadora que vence está claramente mais dedicada a comprar comissões do que a fazer um bom trabalho (este problema afeta tantas áreas, desde a construção de estradas até a qualidade da merenda escolar, que é impossível listar aqui); __(ii)__ o processo corruptor acaba, no longo prazo, eliminando as empresas que prestavam e deixando para competir apenas as corruptas, e a qualidade tende a piorar progressivamente. - **cartéis**: o Estado em geral cria e depois fica refém de vários grupos de interesse. o caso dos taxistas contra o Uber é o que está na moda hoje (e o que mostra como os Estados se comportam da mesma forma no mundo todo). - **multas**: quando algum indivíduo ou empresa comete uma fraude financeira, ou causa algum dano material involuntário, as vítimas do caso são as pessoas que sofreram o dano ou perderam dinheiro, mas o Estado tem sempre leis que prevêem multas para os responsáveis. A justiça estatal é sempre muito rígida e rápida na aplicação dessas multas, mas relapsa e vaga no que diz respeito à indenização das vítimas. O que em geral acontece é que o Estado aplica uma enorme multa ao responsável pelo mal, retirando deste os recursos que dispunha para indenizar as vítimas, e se retira do caso, deixando estas desamparadas. - **desapropriação**: o Estado pode pegar qualquer propriedade de qualquer pessoa mediante uma indenização que é necessariamente inferior ao valor da propriedade para o seu presente dono (caso contrário ele a teria vendido voluntariamente). - **seguro-desemprego**: se há, por exemplo, um prazo mínimo de 1 ano para o sujeito ter direito a receber seguro-desemprego, isto o incentiva a planejar ficar apenas 1 ano em cada emprego (ano este que será sucedido por um período de desemprego remunerado), matando todas as possibilidades de aprendizado ou aquisição de experiência naquela empresa específica ou ascensão hierárquica. - **previdência**: a previdência social tem todos os defeitos de cálculo do mundo, e não importa muito ela ser uma forma horrível de poupar dinheiro, porque ela tem garantias bizarras de longevidade fornecidas pelo Estado, além de ser compulsória. Isso serve para criar no imaginário geral a idéia da __aposentadoria__, uma época mágica em que todos os dias serão finais de semana. A idéia da aposentadoria influencia o sujeito a não se preocupar em ter um emprego que faça sentido, mas sim em ter um trabalho qualquer, que o permita se aposentar. - **regulamentação impossível**: milhares de coisas são proibidas, há regulamentações sobre os aspectos mais mínimos de cada empreendimento ou construção ou espaço. se todas essas regulamentações fossem exigidas não haveria condições de produção e todos morreriam. portanto, elas não são exigidas. porém, o Estado, ou um agente individual imbuído do poder estatal pode, se desejar, exigi-las todas de um cidadão inimigo seu. qualquer pessoa pode viver a vida inteira sem cumprir nem 10% das regulamentações estatais, mas viverá também todo esse tempo com medo de se tornar um alvo de sua exigência, num estado de terror psicológico. - **perversão de critérios**: para muitas coisas sobre as quais a sociedade normalmente chegaria a um valor ou comportamento "razoável" espontaneamente, o Estado dita regras. estas regras muitas vezes não são obrigatórias, são mais "sugestões" ou limites, como o salário mínimo, ou as 44 horas semanais de trabalho. a sociedade, porém, passa a usar esses valores como se fossem o normal. são raras, por exemplo, as ofertas de emprego que fogem à regra das 44h semanais. - **inflação**: subir os preços é difícil e constrangedor para as empresas, pedir aumento de salário é difícil e constrangedor para o funcionário. a inflação força as pessoas a fazer isso, mas o aumento não é automático, como alguns economistas podem pensar (enquanto alguns outros ficam muito satisfeitos de que esse processo seja demorado e difícil). - **inflação**: a inflação destrói a capacidade das pessoas de julgar preços entre concorrentes usando a própria memória. - **inflação**: a inflação destrói os cálculos de lucro/prejuízo das empresas e prejudica enormemente as decisões empresariais que seriam baseadas neles. - **inflação**: a inflação redistribui a riqueza dos mais pobres e mais afastados do sistema financeiro para os mais ricos, os bancos e as megaempresas. - **inflação**: a inflação estimula o endividamento e o consumismo. - **lixo:** ao prover coleta e armazenamento de lixo "grátis para todos" o Estado incentiva a criação de lixo. se tivessem que pagar para que recolhessem o seu lixo, as pessoas (e conseqüentemente as empresas) se empenhariam mais em produzir coisas usando menos plástico, menos embalagens, menos sacolas. - **leis contra crimes financeiros:** ao criar legislação para dificultar acesso ao sistema financeiro por parte de criminosos a dificuldade e os custos para acesso a esse mesmo sistema pelas pessoas de bem cresce absurdamente, levando a um percentual enorme de gente incapaz de usá-lo, para detrimento de todos -- e no final das contas os grandes criminosos ainda conseguem burlar tudo.
-
@ fd06f542:8d6d54cd
2025-04-15 07:13:58Direct-message
0xchat
- Beautiful, simple and private nostr DMs
-
Public groups that work compatible with other apps
- Safe DMs with NIP-17
Signers
Alby
- Nostr wallet connect for one tap zapping via nostr clients
- Nostr authenticator (never enter your nsec into apps)
- Chrome extension
- Simple and easy to use
- Frequently maintained
- Send and receive sats
-
Custodial
- Other Android apps can invoke it for signing events via NIP-55
- Your key doesn't have to touch the other, less trusted, apps
- Supports providing a NIP-46 signing Bunker
- Multiple accounts
- Fine-grained app authorizations
-
Activity log
- Multiple key management
- Light and dark mode
-
Save preferred relays
- The original signer by nostr creator fiatjaf
- Versatile, no frills
-
Relay preference storage
- A skinned fork of nos2x by fiatjaf
- Chrome
- & 
- Firefox
- Store preferred relay set
-
Individually revokable permissions
- Log in to nostr apps without an extension
- Key recovery via email
- Password protected encrypted local key storage
-
Manage multiple apps
- Derive accounts from a mnemonic seed
- Generate random mnemonic accounts
- NIP-07 - window.nostr capability for web browsers
- Import external accounts
- Set basic metadata on Nostr
- Enjoy encryption secured by a master password
- Lock and unlock the vault with ease
- Easily import and export backups
Microblogging
alphaama
- CLI + GUI
- run custom code
- inspect notes
-
test stuff
-
Amethyst 暂无相关功能描述
- Short notes
- Nice thread view
- Profile search
- Secure direct messages
- Custom feeds
-
Relay reviews
- Note feeds
- Easy to use interface
- Zap pre-set and custom amounts (lightning payments)
- Multi-wallet support
-
Block lists
- Snappy nostr browsing
- Back up your data
- Browse long form content
-
Light mode
- No phone number and email required to sign up
- Free migration of social content within the Nostr
- Excellent user experience
-
Double-enhanced private communication
- multiplatform: runs on Windows, MacOS and Linux
- native: avoids browser-tech for performance and security
- performant: coded with performance in mind in Rust using LMDB for the database, such that your network speed will be your bottleneck
- outbox model: using a set of heuristics to always find people you follow no matter where they're publishing to
- high user control: over 60 different settings, all with reasonable defaults, but very customizable
-
privacy: supports running over Tor, options for not loading media, options for not sharing who you follow and others
- Short notes
- Social graph filter
-
Image grid feeds
- Desktop app
- Clean and beautiful design
- Multi-column
- Spaces
-
Trending
- Currently in TestFlight
- Safety first: mute, report, content warnings, delete
- Reach restricted to 2 hops - people you follow and people they follow.
-
Community-focused relays
-
Nostrmo 暂无相关功能描述
- Feature-rich
- Highly customizable
- Mute words
- Communities
- Streaming (watch)
- Lists
- Tools shortcuts
-
Sidebar comments
- Twitter style feed
- Cute logo
- Mute words
-
Minimal and calm
- Multi-account
- Guest account
- Your posts stored on your device and can be exported
- Bookmarks and personal notes
- Follow and explore timeline
- Remembers where you left off scrolling when reopening app
- Undo accidental tap on Like
- Autocomplete names when typing
- Lightning zaps
- Lightning wallet selection
- Direct Messages
- Domain verification
- Badges
- Block list
- Muted conversations
- Notifications for mentions, reactions and zaps
- Image previews/zoom/pan
- Gif/Video playback
- Option to turn signature verification off
- Option to hide badges from profile and emojis from names
- Fast local database
- Big detail pane for iPad/macOS
- Login as someone else (read-only mode)
-
Choose which relays to send to and receive from
-
Hacker News style
- Post to Nostr and Mastodon
- Nice, clean and modern design
- Simple and intuitive
- Gifs, stickers integration
-
Dark and light mode
- Browse polls created here or on other clients
- Create polls
-
Vote on polls
-
Primal 暂无相关功能描述
- Multi-column
-
Tweetdeck-like UI
- Twitter-like experience
- Dark and light mode
- Custom zap amounts
- Bookmarks
- Pinned notes
-
Alby integration
- PWA to be widely accessible with distribution via URLS, and to side-step App Store gatekeeping
- Employs Proof-of-Work (PoW) as a spam prevention mechanism, as opposed to Captcha, moderation or other verification methods
- Uses NOSTR as a censorship-resistant global "social" network
Community
Badges Page
- Create and award badges
- Manage badges awarded to you
- Simple interface
File-sharing
Bouquet
- Upload files
- Download files
- Manage your list of mediaservers
- Broadcast your list on Nostr
- Sync files between servers
-
Browse files on your mediaservers
- Browse lists of available torrents
- Publish your own
- Choose relays to browse on
Group-chat
Chachi
- Create, browse, join groups
- Send chat messages or other kinds of content
-
Seamless, lean, fast interface
- Browse relays and chat on the communities in them
- Send and receive direct messages
-
Take private notes
- Browse groups on specific relays
- Join rooms and send chat messages
Tools
Emojito
-
Create custom emoji sets to be used on supported clients
-
Create and share forms
- Make GIFs from the external world available inside Nostr clients
- GIF uploads
-
Search external GIF libraries
-
Save your nostr notes to Google Drive
- Guided onboarding
- Recovery phrase to restore access
- Good UX with explainers
-
Beautiful design
- Discover app of the day
- Discover new apps
- Search all nostr apps
- Discover nostr DVMs
- Discover nostr code repositories
- App reviews
-
Nostr native - takes a different approach from NostrApps.com
- A plethora of apps to choose from and install
- Faster than Obtainium
- More complete than F-Droid
-
Cleaner than Google Play
- Zap from any client
- Bypass Apple's draconian rules
- Nostr Wallet Connect
Blogging
Feeder
- Subscribe to RSS and Nostr article feeds
- Years of specialization in reading articles
- Offline reading
- OPML Import/Export
- Notification support
-
Material design
- Long form publishing
- Markdown support
- Rich text editor
- Dark and light modes
- Browse by relay
- Made on nostr, content mirrored to other nostr platforms.
-
Extension-only sign-in
- Read RSS feeds
- Read Nostr NIP-23 long-form articles
- Import and export OPML
- Runs on desktop with a web-based UI
-
Can be accessed remotely from apps such as Reeder, Readkit etc
- Read RSS feeds
- Read Nostr NIP-23 long-form articles
- Import and export OPML
- Runs on desktop with a web-based UI
-
Can be accessed remotely from apps such as Reeder, Readkit etc
- Create a website out of your nostr content
- SEO friendly
- Use any 3rd party tools
- Works like an app
- Beautiful Ghost themes to choose from
- Zero maintenance
- Custom domains
- Open source and self-hostable
- Natively Social
-
Publish from any other nostr app
- Directly publish your articles from Obsidian to Nostr with a couple of clicks
- Quickly compose and publish short form notes too
- Images in your .md file will automatically be uploaded and handled when you publish
- Add tags to your posts
- See all posts sent from Obsidian with links to view
- Configure to send to whatever relays you like
- Publish under different nostr accounts
- Easily view and download your Nostr bookmarks into Obsidian for reference and local use
-
Automatically populates article information fields from the frontmatter
- Schedule nostr notes
- Schedule reposts
- Note drafts
-
Multi-account support
- Publishing and reading notes
- Publishing and reading articles
- Curations (set of articles concerning a specific topic) publishing
- Long-form articles are surfaced instead of lost in the feed
Music
Fountain
- Earn sats while listening to podcasts
- Create and share clips, get paid on your clips
- Boost your favorite podcasts
-
Discover clips from friends
- Collaborate with others to create your next hit
- Music-focused interface
- Remix function
Curation
Highlighter
- Read and write long-form articles
- Discover what people you trust found interesting and insightful
- Understand why they found it interesting or insightful with their comments attached
- Send sats, comment or share your favorite highlights
-
Highlight anything
- Create and share lists
-
Browse other people's lists
- Browse recipes
- Add your own recipes
-
Earn sats via zaps
- Create link lists
- Multiple lists
-
Theming
- Curate lists, users, links
- Share lists
- Discover interesting content
Photos
Olas
- Special high-quality photos dedicated client
- Publish photos and browse photos
- Publish and browse short videos
- Browse media feeds from friends, extended network and from specific relays
Discovery
Jumble
- Browse individual relays by URL
- Create and browse relay sets
- Create and reply to notes
- Follow people and browse the feed from your follows
-
Browse the kind:20 photos feed
- Search keywords, hashtags, pubkeys, posts
- Look up Nostr statistics
- Embed widgets
- API for clients
-
NIP05 Service
- Look up relay information
- Browse relay feeds
- Browse individual profile feeds with smart relay selection
-
Simple and gets the job done
- See total sats zapped in the past hour, 4 hours, 24 hours and 7 days
- See who zapped who individually
- See notes that got the most zaps
Audio
Nests
- Start audio chats
- Troll box (chat)
- Instant zaps (lightning payments)
Crazy
Nostrocket
- Create issues that matter to you
- Award merits to contributors
- Solve problems
Career
Ostrich Work
- Post jobs for 20k sats
- Find jobs
Marketplace
Plebeian Market
- Buy and sell things for sats
-
Bid in auctions
- Buy and sell items for sats
- Message seller
- Cashu integration
Freelancing
SatShoot
- Post problems on SatShoot
- Make money solving problems as a Freelancer
- Share problems or freelance services on your feed
- Bidding system for Clients to choose the best Offer
- Chat in DMs
- Post Reviews on Freelancers or Clients
- Build Reputation
- Public Zaps as Payments
- Use your Web of Trust to keep scammers away
Media
Slidestr
- Compact media browsing
- Images and videos
- Full screen media
Meatspace
Yondar
- Add places to a map
- See places by your friends or follows
Streaming
zap.stream
- Start livestream via zap.stream or Cloudflare
- Watch other livestreams
- Chat
- Custom emojis
- Zap streamers in real time
- Zap chat participants in real time
- Set up stream goals
-
@ 266815e0:6cd408a5
2025-04-15 06:58:14Its been a little over a year since NIP-90 was written and merged into the nips repo and its been a communication mess.
Every DVM implementation expects the inputs in slightly different formats, returns the results in mostly the same format and there are very few DVM actually running.
NIP-90 is overloaded
Why does a request for text translation and creating bitcoin OP_RETURNs share the same input
i
tag? and why is there anoutput
tag on requests when only one of them will return an output?Each DVM request kind is for requesting completely different types of compute with diffrent input and output requirements, but they are all using the same spec that has 4 different types of inputs (
text
,url
,event
,job
) and an undefined number ofoutput
types.Let me show a few random DVM requests and responses I found on
wss://relay.damus.io
to demonstrate what I mean:This is a request to translate an event to English
json { "kind": 5002, "content": "", "tags": [ // NIP-90 says there can be multiple inputs, so how would a DVM handle translatting multiple events at once? [ "i", "<event-id>", "event" ], [ "param", "language", "en" ], // What other type of output would text translations be? image/jpeg? [ "output", "text/plain" ], // Do we really need to define relays? cant the DVM respond on the relays it saw the request on? [ "relays", "wss://relay.unknown.cloud/", "wss://nos.lol/" ] ] }
This is a request to generate text using an LLM model
json { "kind": 5050, // Why is the content empty? wouldn't it be better to have the prompt in the content? "content": "", "tags": [ // Why use an indexable tag? are we ever going to lookup prompts? // Also the type "prompt" isn't in NIP-90, this should probably be "text" [ "i", "What is the capital of France?", "prompt" ], [ "p", "c4878054cff877f694f5abecf18c7450f4b6fdf59e3e9cb3e6505a93c4577db2" ], [ "relays", "wss://relay.primal.net" ] ] }
This is a request for content recommendation
json { "kind": 5300, "content": "", "tags": [ // Its fine ignoring this param, but what if the client actually needs exactly 200 "results" [ "param", "max_results", "200" ], // The spec never mentions requesting content for other users. // If a DVM didn't understand this and responded to this request it would provide bad data [ "param", "user", "b22b06b051fd5232966a9344a634d956c3dc33a7f5ecdcad9ed11ddc4120a7f2" ], [ "relays", "wss://relay.primal.net", ], [ "p", "ceb7e7d688e8a704794d5662acb6f18c2455df7481833dd6c384b65252455a95" ] ] }
This is a request to create a OP_RETURN message on bitcoin
json { "kind": 5901, // Again why is the content empty when we are sending human readable text? "content": "", "tags": [ // and again, using an indexable tag on an input that will never need to be looked up ["i", "09/01/24 SEC Chairman on the brink of second ETF approval", "text"] ] }
My point isn't that these event schema's aren't understandable but why are they using the same schema? each use-case is different but are they all required to use the same
i
tag format as input and could support all 4 types of inputs.Lack of libraries
With all these different types of inputs, params, and outputs its verify difficult if not impossible to build libraries for DVMs
If a simple text translation request can have an
event
ortext
as inputs, apayment-required
status at any point in the flow, partial results, or responses from 10+ DVMs whats the best way to build a translation library for other nostr clients to use?And how do I build a DVM framework for the server side that can handle multiple inputs of all four types (
url
,text
,event
,job
) and clients are sending all the requests in slightly differently.Supporting payments is impossible
The way NIP-90 is written there isn't much details about payments. only a
payment-required
status and a genericamount
tagBut the way things are now every DVM is implementing payments differently. some send a bolt11 invoice, some expect the client to NIP-57 zap the request event (or maybe the status event), and some even ask for a subscription. and we haven't even started implementing NIP-61 nut zaps or cashu A few are even formatting the
amount
number wrong or denominating it in sats and not mili-satsBuilding a client or a library that can understand and handle all of these payment methods is very difficult. for the DVM server side its worse. A DVM server presumably needs to support all 4+ types of payments if they want to get the most sats for their services and support the most clients.
All of this is made even more complicated by the fact that a DVM can ask for payment at any point during the job process. this makes sense for some types of compute, but for others like translations or user recommendation / search it just makes things even more complicated.
For example, If a client wanted to implement a timeline page that showed the notes of all the pubkeys on a recommended list. what would they do when the selected DVM asks for payment at the start of the job? or at the end? or worse, only provides half the pubkeys and asks for payment for the other half. building a UI that could handle even just two of these possibilities is complicated.
NIP-89 is being abused
NIP-89 is "Recommended Application Handlers" and the way its describe in the nips repo is
a way to discover applications that can handle unknown event-kinds
Not "a way to discover everything"
If I wanted to build an application discovery app to show all the apps that your contacts use and let you discover new apps then it would have to filter out ALL the DVM advertisement events. and that's not just for making requests from relays
If the app shows the user their list of "recommended applications" then it either has to understand that everything in the 5xxx kind range is a DVM and to show that is its own category or show a bunch of unknown "favorites" in the list which might be confusing for the user.
In conclusion
My point in writing this article isn't that the DVMs implementations so far don't work, but that they will never work well because the spec is too broad. even with only a few DVMs running we have already lost interoperability.
I don't want to be completely negative though because some things have worked. the "DVM feeds" work, although they are limited to a single page of results. text / event translations also work well and kind
5970
Event PoW delegation could be cool. but if we want interoperability, we are going to need to change a few things with NIP-90I don't think we can (or should) abandon NIP-90 entirely but it would be good to break it up into small NIPs or specs. break each "kind" of DVM request out into its own spec with its own definitions for expected inputs, outputs and flow.
Then if we have simple, clean definitions for each kind of compute we want to distribute. we might actually see markets and services being built and used.
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28Músicas grudentas e conversas
Uma vez que você ouviu uma música grudenta e ela volta, inteira, com toda a melodia e a harmonia, muitos dias depois, contra a sua vontade. Mas uma conversa é impossível de lembrar. Por quê?
-
@ fbf0e434:e1be6a39
2025-04-15 06:46:58Hackathon 概览
Eolas x Algo: Agent Skills Hackathon 在线上举行,旨在通过提升代理技能来推动 CreatorBid 生态系统的发展。活动吸引了58位开发者参赛,最终有36个项目获得批准。本次黑客松突破传统模式,允许 CreatorBid 代理直接发布技能需求,省去中间环节,实现供需精准对接。
参赛者在两大核心赛道展开竞争:Bounty Track 聚焦代理识别的具体痛点攻关,Best Skills Track 则嘉奖具备卓越价值的项目。Eolas、Algo、Shogun、AION 等机构及多位独立代理为活动提供资金支持。
开发成果直接集成至 Olas Mech Marketplace,实现实时部署落地,并通过 OLAS 系统为开发者提供激励。以 Agent Algo、Eolas 为代表的头部代理特别肯定了本次活动对代理技术创新的推动作用。3 月 20 日活动收官,由 CreatorBid 团队与代理代表组成的评审团,从创新性和生态影响力双重维度对项目进行了综合评判。
Hackathon 获奖者
以下部分详细介绍了首届代理赞助 Hackathon 的成就和奖项,涵盖了37个项目在各个类别中的亮点。
Best Agent Skill Track 奖项获奖者
- Agent Toolbox: 一套增强 AI 代理功能的工具,包括趋势发现、动态函数生成和任务编排。
- GridTrade Agent: 通过市场和波动性分析,促进自动化交易对选择和网格交易参数优化。
- Polytrader: 一个基于 AI 的交易助手,简化 Polymarket 的研究、数据分析和交易执行。
主奖池获奖者
- sentimentX: 为 MultiversX 区块链智能合约提供 AI 驱动的安全监控,通过检测漏洞实现。
- Brainiac_AI: 一个通过链上分析优化 DeFi 策略的平台,并集成非托管钱包。
- framew0rk: 使用链接到 DeFi 协议的 AI 策略助手简化 DeFi 收益优化。
- MythosCraft: AI Storytelling Suite: 使用 AI 创建定制化故事内容。
- QuanTrade-X: 提供 AI 驱动的分析和加密货币交易信号。
- ComicVerse AI: 利用 AI 根据用户输入创作剧本和图像生成漫画。
- EOLAS - Submit your own skill: Portfolio Allocation Skill: 使用 AI 和现代投资组合理论优化加密货币投资组合。
- SonicBo: WhatsApp 上的 AI 代理,促进区块链交易。
- 👽Zeta Comic Generator👽: 将文本提示转换为 AI 生成的漫画,通过剧本和角色表达来实现。
- Grid Trading Analyzer Skill: 高级分析的 Python 工具,用于识别最佳加密货币网格交易对。
- Trump news Reporter: AI 工具,用于实时监控和报告与特朗普相关的新闻,带有自定义过滤器。
- NFT Appraisal skill: 创建用于 NFT 估值的 AI 代理。
- AI-Powered Dynamic Skill Selector (DSS): 使用多臂賭徒策略进行动态 AI 模型优化。
- CrypTweet: 使用 Twitter 情绪为加密货币交易决策提供信息的 AI 交易机器人。
- AI Trump News Agent: 监控和分析与特朗普相关的新闻,并提供可自定义的报告语气。
- TrumpTracker-AI: 汇编和总结与特朗普相关的新闻,从热门标题生成网络迷因。
- Rigger-: 将自然语言转化为 SQL 查询,方便非技术人员访问数据库。
- TNS: 使用 NLP 跟踪与特朗普相关的新闻,并提供多样化的报道风格。
- Bob Roast Machine: 用于创作喜剧吐槽、笑话和网络迷因的 AI 平台。
- Agent 47: 一个 Telegram 机器人,提供政治新闻以及 AI 生成的网络迷因和事实核查。
技能协调与优化奖项获奖者
增强 CB 代理数据访问的技能奖项获奖者
世界构建与传说推广技能奖项获奖者
Polymarket 交易机器人奖项获奖者
欲了解项目的完整列表,请访问 DoraHacks。
关于组织者
Eolas
Eolas 在技术和区块链领域是一个重要的参与者,以其提升交易透明度的区块链解决方案而闻名。该组织继续专注于区块链的研究与开发,解决行业挑战以推动未来进展。
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28Bluesky is a scam
Bluesky advertises itself as an open network, they say people won't lose followers or their identity, they advertise themselves as a protocol ("atproto") and because of that they are tricking a lot of people into using them. These three claims are false.
protocolness
Bluesky is a company. "atproto" is the protocol. Supposedly they are two different things, right? Bluesky just releases software that implements the protocol, but others can also do that, it's open!
And yet, the protocol has an official webpage with a waitlist and a private beta? Why is the protocol advertised as a company product? Because it is. The "protocol" is just a description of whatever the Bluesky app and servers do, it can and does change anytime the Bluesky developers decide they want to change it, and it will keep changing for as long as Bluesky apps and servers control the biggest part of the network.
Oh, so there is the possibility of other players stepping in and then it becomes an actual interoperable open protocol? Yes, but what is the likelihood of that happening? It is very low. No serious competitor is likely to step in and build serious apps using a protocol that is directly controlled by Bluesky. All we will ever see are small "community" apps made by users and small satellite small businesses -- not unlike the people and companies that write plugins, addons and alternative clients for popular third-party centralized platforms.
And last, even if it happens that someone makes an app so good that it displaces the canonical official Bluesky app, then that company may overtake the protocol itself -- not because they're evil, but because there is no way it cannot be like this.
identity
According to their own documentation, the Bluesky people were looking for an identity system that provided global ids, key rotation and human-readable names.
They must have realized that such properties are not possible in an open and decentralized system, but instead of accepting a tradeoff they decided they wanted all their desired features and threw away the "decentralized" part, quite literally and explicitly (although they make sure to hide that piece in the middle of a bunch of code and text that very few will read).
The "DID Placeholder" method they decided to use for their global identities is nothing more than a normal old boring trusted server controlled by Bluesky that keeps track of who is who and can, at all times, decide to ban a person and deprive them from their identity (they dismissively call a "denial of service attack").
They decided to adopt this method as a placeholder until someone else doesn't invent the impossible alternative that would provide all their desired properties in a decentralized manner -- which is nothing more than a very good excuse: "yes, it's not great now, but it will improve!".
openness
Months after launching their product with an aura of decentralization and openness and getting a bunch of people inside that believed, falsely, they were joining an actually open network, Bluesky has decided to publish a part of their idea of how other people will be able to join their open network.
When I first saw their app and how they were very prominently things like follower counts, like counts and other things that are typical of centralized networks and can't be reliable or exact on truly open networks (like Nostr), I asked myself how were they going to do that once they became and open "federated" network as they were expected to be.
Turns out their decentralization plan is to just allow you, as a writer, to host your own posts on "personal data stores", but not really have any control over the distribution of the posts. All posts go through the Bluesky central server, called BGS, and they decide what to do with it. And you, as a reader, doesn't have any control of what you're reading from either, all you can do is connect to the BGS and ask for posts. If the BGS decides to ban, shadow ban, reorder, miscount, hide, deprioritize, trick or maybe even to serve ads, then you are out of luck.
Oh, but anyone can run their own BGS!, they will say. Even in their own blog post announcing the architecture they assert that "it’s a fairly resource-demanding service" and "there may be a few large full-network providers". But I fail to see why even more than one network provider will exist, if Bluesky is already doing that job, and considering the fact there are very little incentives for anyone to switch providers -- because the app does not seem to be at all made to talk to multiple providers, one would have to stop using the reliable, fast and beefy official BGS and start using some half-baked alternative and risk losing access to things.
When asked about the possibility of switching, one of Bluesky overlords said: "it would look something like this: bluesky has gone evil. there's a new alternative called freesky that people are rushing to. I'm switching to freesky".
The quote is very naïve and sounds like something that could be said about Twitter itself: "if Twitter is evil you can just run your own social network". Both are fallacies because they ignore the network-effect and the fact that people will never fully agree that something is "evil". In fact these two are the fundamental reasons why -- for social networks specifically (and not for other things like commerce) -- we need truly open protocols with no owners and no committees.
-
@ fbf0e434:e1be6a39
2025-04-15 06:46:44Hackathon 概述
HackCanada 黑客松汇聚创新者、开发者、设计师与问题解决者,共同直面加拿大当下的紧迫挑战 —— 医疗保健可及性、环境可持续性、数字基础设施建设与经济差距等。188 位开发者携 89 个独特项目参与,以集体智慧打造兼具影响力的解决方案,尽显技术赋能社会的决心。
在这些项目中,有旨在通过技术增强医疗保健系统的计划,也有改善偏远社区数字基建的构想,更不乏以创新手段降低环境足迹的实践。这场黑客松搭建起协作共创的平台,催生大量新鲜思路与落地解法,切实呼应 “推动实质价值、激发变革” 的核心目标。
作为社区驱动创新的催化剂,HackCanada 营造了动态的协作与创新生态,推动技术发展切实服务于提升加拿大人生活质量,为构建更包容、可持续的未来注入持续动力。
Hackathon 获奖者
总体一等奖获奖者
- Phone-a-Fraud - 一个实时检测电话诈骗的AI驱动系统,重点在于隐私和诈骗警报机制以保护弱势人群。
总体二等奖获奖者
- StickTator - 一种利用自然语言处理进行语音控制计算机管理的USB设备,简化复杂系统配置。
总体三等奖获奖者
- Omnivim - 跨应用程序集成Vim动作的软件,以提高生产力。
最佳个人Hack奖获奖者
最佳Orkes Hack奖获奖者
- Recipeit - 专注于食谱的项目;暂无更多详情。
最佳ICP Hack奖获奖者
SPUR创新基金:最佳AI、Web3或量子技术奖获奖者
第一名
- Beaver Breach - 分析美国产品关税影响的工具,通过加拿大供应商提供减少成本的替代方案。
第二名
- Canify - Blockchain Rewards - 倡导通过区块链奖励和政府激励支持加拿大产品。
自主代理赏金赛道奖获奖者
第一名
- ChainMail - 一个基于web3的电子邮件应用程序,增强安全性并实现跨区块链通信。
第二名
第三名
- Roast My Wallet - 一个基于用户加密钱包和个性的AI驱动趣味生成的网页应用程序。
- Zap - 在日常生活中促进加密应用的免手续费交易平台。
- Carbon Chain - 将碳减排转换为可交易资产的区块链平台,由AI验证。
最佳开发者工具奖获奖者
最佳高中Hack奖获奖者
- NaloxNow - 通过实时纳洛酮获取、紧急导航和AI驱动的过量反应来应对阿片类药物危机的移动应用。
最无用Hack奖获奖者
- UselessGPT - 使用谷歌的Gemini API生成无意义、以娱乐为目的的交互式应用程序。
最佳AI应用奖获奖者
- frij.io - 一款通过AI管理家庭库存、优化购物清单并减少食物浪费的智能应用。
使用AI构建:Google 赛道奖获奖者
- 最佳使用Gemini AI或Gemini API、最佳使用Google Cloud平台以及最佳集成Google工具包:
- Sinker - 一个AI驱动的网络安全平台,培训员工识别通信渠道中的网络钓鱼威胁。
- FrostByte - 项目详情不可用。
- Flock Street - 使用实时数据和语音技术提供股市洞察的互动应用程序。
最佳Laurier STEM出版协会奖获奖者
- SockSensei - 根据用户情绪提供袜子推荐的移动应用程序。
完整的项目列表请访问这个链接。
关于组织者
Hack Canada
Hack Canada 专注于技术与创新,强调区块链和网络安全计划。以在这些领域的能力而闻名,Hack Canada 已开发出有助于技术领域的项目。该组织因举办全国性Hackathon和提升数字安全知识的工作坊而受到认可。目前,Hack Canada 致力于为技术爱好者和专业人士提供一个协作环境,以促进区块链应用和安全数字通信的发展。
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28Jofer
Jofer era um jogador diferente. À primeira vista não, parecia igual, um volante combativo, perseguia os atacantes adversários implacavelmente, um bom jogador. Mas não era essa a característica que diferenciava Jofer. Jofer era, digamos, um chutador.
Começou numa semifinal de um torneio de juniores. O time de Jofer precisava do empate e estava sofrendo uma baita pressão do adversário, mas o jogo estava 1 a 1 e parecia que ia ficar assim mesmo, daquele jeito futebolístico que parece, parece mesmo. Só que aos 46 do segundo tempo tomaram um gol espírita, Ruizinho do outro time saiu correndo pela esquerda e, mesmo sendo canhoto, foi cortando para o meio, os zagueiros meio que achando que já tinha acabado mesmo, devia ter só mais aquele lance, o árbitro tinha dado dois minutos, Ruizinho chutou, marcou e o goleiro, que só pulou depois que já tinha visto que não ia ter jeito, ficou xingando.
A bola saiu do meio e tocaram para Jofer, ninguém nem veio marcá-lo, o outro time já estava comemorando, e com razão, o juiz estava de sacanagem em fazer o jogo continuar, já estava tudo acabado mesmo. Mas não, estava certo, mais um minuto de acréscimo, justo. Em um minuto dá pra fazer um gol. Mas como? Jofer pensou nas partidas da NBA em que com alguns centésimos de segundo faltando o armador jogava de qualquer jeito para a cesta e às vezes acertava. De trás do meio de campo, será? Não vou ter nem força pra fazer chegar no gol. Vou virar piada, melhor tocar pro Fumaça ali do lado e a gente perde sem essa humilhação no final. Mas, poxa, e daí? Vou tentar mesmo assim, qualquer coisa eu falo que foi um lançamento e daqui a uns dias todo mundo esquece. Olhou para o próprio pé, virou ele de ladinho, pra fora e depois pra dentro (bom, se eu pegar daqui, direitinho, quem sabe?), jogou a bola pro lado e bateu. A bola subiu escandalosamente, muito alta mesmo, deve ter subido uns 200 metros. Jofer não tinha como ter a menor noção. Depois foi descendo, o goleirão voltando correndo para debaixo da trave e olhando pra bola, foi chegando e pulando já só pra acompanhar, para ver, dependurado no travessão, a bola sair ainda bem alta, ela bateu na rede lateral interna antes de bater no chão, quicar violentamente e estufar a rede no alto do lado direito de quem olhava.
Mas isso tudo foi sonho do Jofer. Sonhou acordado, numa noite em que demorou pra dormir, deitado na sua cama. Ficou pensando se não seria fácil, se ele treinasse bastante, acertar o gol bem de longe, tipo no sonho, e se não dava pra fazer gol assim. No dia seguinte perguntou a Brunildinho, o treinador de goleiros. Era difícil defender essas bolas, ainda mais se elas subissem muito, o goleiro ficava sem perspectiva, o vento alterava a trajetória a cada instante, tinha efeito, ela cairia rápido, mas claro que não valia à pena treinar isso, a chance de acertar o gol era minúscula. Mas Jofer só ia tentar depois que treinasse bastante e comprovasse o que na sua imaginação parecia uma excelente idéia.
Começou a treinar todos os dias. Primeiro escondido, por vergonha dos colegas, chegava um pouco antes e ficava lá, chutando do círculo central. Ao menor sinal de gente se aproximando, parava e ia catar as bolas. Depois, quando começou a acertar, perdeu a vergonha. O pessoal do clube todo achava engraçado quando via Jofer treinando e depois ouvia a explicação da boca de alguém, ninguém levava muito a sério, mas também não achava de todo ridículo. O pessoal ria, mas no fundo torcia praquilo dar certo, mesmo.
Aconteceu que num jogo que não valia muita coisa, empatezinho feio, aos 40 do segundo tempo, a marcação dos adversários já não estava mais pressionando, todo mundo contente com o empate e com vontade de parar de jogar já, o Henrique, meia-esquerdo, humilde, mas ainda assim um pouco intimidante para Jofer (jogava demais), tocou pra ele. Vai lá, tenta sua loucura aí. Assumiu a responsabilidade do nosso volante introspectivo. Seria mais verossímil se Jofer tivesse errado, primeira vez que tentou, restava muito tempo ainda pra ele ter a chance de ser herói, ninguém acerta de primeira, mas ele acertou. Quase como no sonho, Lucas, o goleiro, não esperava, depois que viu o lance, riu-se, adiantou-se para pegar a bola que ele julgava que quicaria na área, mas ela foi mais pra frente, mais e mais, daí Lucas já estava correndo, só que começou a pensar que ela ia pra fora, e ele ia só se dependurar no travessão e fazer seu papel de estar na bola. Acabou que por conta daquele gol eles terminaram em segundo no grupo daquele torneiozinho, ao invés de terceiro, e não fez diferença nenhuma.
-
@ 5a261a61:2ebd4480
2025-04-15 06:34:03What a day yesterday!
I had a really big backlog of both work and non-work things to clean up. But I was getting a little frisky because my health finally gave me some energy to be in the mood for intimacy after the illness-filled week had forced libido debt on me. I decided to cheat it out and just take care of myself quickly. Horny thoughts won over, and I got at least e-stim induced ass slaps to make it more enjoyable. Quick clean up and everything seemed ok...until it wasn't.
The rest of the morning passed uneventfully as I worked through my backlog, but things took a turn in the early afternoon. I had to go pickup kids, and I just missed Her between the doors, only managed to get a fast kiss. A little bummed from the work issues and failed expectations of having a few minutes together, I got on my way.
Then it hit me—the most serious case of blue balls I had in a long time. First came panic. I was getting to the age when unusual symptoms raise concerns—cancer comes first to mind, as insufficient release wasn't my typical problem. So I called Her. I explained what was happening and expressed hope for some alone time. Unfortunately, that seemed impossible with our evening schedule: kids at home, Her online meeting, and my standing gamenight with the boys. These game sessions are our sacred ritual—a preserved piece of pre-kids sanity that we all protect in our calendars. Not something I wanted to disturb.
Her reassurance was brief but unusualy promising: "Don't worry, I get this."
Evening came, and just as I predicted, there was ZERO time for shenanigans while we took care of the kids. But once we put them to bed (I drew straw for early sleeper), with parental duties complete, I headed downstairs to prepare for my gaming session. Headset on, I greeted my fellows and started playing.
Not five minutes later, She opened the door with lube in one hand, fleshlight in the other, and an expecting smile on Her face. Definitely unexpected. I excused myself from the game, muted mic, but She stopped me.
"There will be nothing if you won't play," She said. She just motioned me to take my pants off. And off to play I was. Not an easy feat considering I twisted my body sideways so She could access anything She wanted while I still reached keyboard and mouse.
She slowly started touching me and observing my reactions, but quickly changed to using Her mouth. Getting a blowjob while semihard was always so strange. The semi part didn't last long though...
As things intensified, She was satisfied with my erection and got the fleshlight ready. It was a new toy for us, and it was Her first time using it on me all by Herself (usually She prefers watching me use toys). She applied an abundance of lube that lasted the entire encounter and beyond.
Shifting into a rhythm, She started pumping slowly but clearly enjoyed my reactions when She unexpectedly sped up, forcing me to mute the mic. I knew I wouldn't last long. When She needed to fix Her hair, I gentlemanly offered to hold the fleshlight, having one hand still available for gaming. She misunderstood, thinking I was taking over completely, which initially disappointed me.
To my surprise, She began taking Her shirt off the shoulders, offering me a pornhub-esque view. To clearly indicate that finish time had arrived, She moved Her lubed hand teasingly toward my anal. She understood precisely my contradictory preferences—my desire to be thoroughly clean before such play versus my complete inability to resist Her when aroused. That final move did it—I muted the mic just in time to vocally express how good She made me feel.
Quick clean up, kiss on the forehead, and a wish for me to have a good game session followed. The urge to abandon the game and cuddle with Her was powerful, but She stopped me. She had more work to complete on Her todo list than just me.
Had a glass, had a blast; overall, a night well spent I would say.
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28O caso da Grêmio TV
enquanto vinha se conduzindo pela plataforma superior daquela arena que se pensava totalmente preenchida por adeptos da famosa equipe do Grêmio de Porto Alegre, viu-se, como por obra de algum nigromante - dos muitos que existem e estão a todo momento a fazer más obras e a colocar-se no caminhos dos que procuram, se não fazer o bem acima de todas as coisas, a pelo menos não fazer o mal no curso da realização dos seus interesses -, o discretíssimo jornalista a ser xingado e moído em palavras por uma horda de malandrinos a cinco ou seis passos dele surgida que cantavam e moviam seus braços em movimentos que não se pode classificar senão como bárbaros, e assim cantavam:
Grêmio TV pior que o SBT !
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28Replacing the web with something saner
This is a simplification, but let's say that basically there are just 3 kinds of websites:
- Websites with content: text, images, videos;
- Websites that run full apps that do a ton of interactive stuff;
- Websites with some interactive content that uses JavaScript, or "mini-apps";
In a saner world we would have 3 different ways of serving and using these. 1 would be "the web" (and it was for a while, although I'm not claiming here that the past is always better and wanting to get back to the glorious old days).
1 would stay as "the web", just static sites, styled with CSS, no JavaScript whatsoever, but designers can still thrive and make they look pretty. Or it could also be something like Gemini. Maybe the two protocols could coexist.
2 would be downloadable native apps, much easier to write and maintain for developers (considering that multi-platform and cross-compilation is easy today and getting easier), faster, more polished experience for users, more powerful, integrates better with the computer.
(Remember that since no one would be striving to make the same app run both on browsers and natively no one would have any need for Electron or other inefficient bloated solutions, just pure native UI, like the Telegram app, have you seen that? It's fast.)
But 2 is mostly for apps that people use every day, something like Google Docs, email (although email is also broken technology), Netflix, Twitter, Trello and so on, and all those hundreds of niche SaaS that people pay monthly fees to use, each tailored to a different industry (although most of functions they all implement are the same everywhere). What do we do with dynamic open websites like StackOverflow, for example, where one needs to not only read, but also search and interact in multiple ways? What about that website that asks you a bunch of questions and then discovers the name of the person you're thinking about? What about that mini-app that calculates the hash of your provided content or shrinks your video, or that one that hosts your image without asking any questions?
All these and tons of others would fall into category 3, that of instantly loaded apps that you don't have to install, and yet they run in a sandbox.
The key for making category 3 worth investing time into is coming up with some solid grounds, simple enough that anyone can implement in multiple different ways, but not giving the app too much choices.
Telegram or Discord bots are super powerful platforms that can accomodate most kinds of app in them. They can't beat a native app specifically made with one purpose, but they allow anyone to provide instantly usable apps with very low overhead, and since the experience is so simple, intuitive and fast, users tend to like it and sometimes even pay for their services. There could exist a protocol that brings apps like that to the open world of (I won't say "web") domains and the websockets protocol -- with multiple different clients, each making their own decisions on how to display the content sent by the servers that are powering these apps.
Another idea is that of Alan Kay: to design a nice little OS/virtual machine that can load these apps and run them. Kinda like browsers are today, but providing a more well-thought, native-like experience and framework, but still sandboxed. And I add: abstracting away details about design, content disposition and so on.
These 3 kinds of programs could coexist peacefully. 2 are just standalone programs, they can do anything and each will be its own thing. 1 and 3, however, are still similar to browsers of today in the sense that you need clients to interact with servers and show to the user what they are asking. But by simplifying everything and separating the scopes properly these clients would be easy to write, efficient, small, the environment would be open and the internet would be saved.
See also
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28IPFS problems: General confusion
Most IPFS open-source projects, libraries and apps (excluding Ethereum stuff) are things that rely heavily on dynamic data and temporary links. The most common projects you'll see when following the IPFS communities are chat rooms and similar things. I've seen dozens of these chat-rooms. There's also a famous IPFS-powered database. How can you do these things with content-addressing is a mistery. Of course they probably rely on IPNS or other external address system.
There's also a bunch of "file-sharing" on IPFS. The kind of thing people use for temporary making a file available for a third-party. There's image sharing on IPFS, pastebins on IPFS and so on. People don't seem to share the preoccupation with broken links here.
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28Scala is such a great language
Scala is amazing. The type system has the perfect balance between flexibility and powerfulness.
match
statements are great. You can write imperative code that looks very nice and expressive (and I haven't tried writing purely functional things yet). Everything is easy to write and cheap and neovim integration works great.But Java is not great. And the fact that Scala is a JVM language doesn't help because over the years people have written stuff that depends on Java libraries -- and these Java libraries are not as safe as the Scala libraries, they contain reflection, slowness, runtime errors, all kinds of horrors.
Scala is also very tightly associated with Akka, the actor framework, and Akka is a giant collection of anti-patterns. Untyped stuff, reflection, dependency on JVM, basically a lot of javisms. I just arrived and I don't know anything about the Scala history or ecosystem or community, but I have the impression that Akka has prevent more adoption of Scala from decent people that aren't Java programmers.
But luckily there is a solution -- or two solutions: ScalaJS is a great thing that exists. It transpiles Scala code into JavaScript and it runs on NodeJS or in a browser!
Scala Native is a much better deal, though, it compiles to LLVM and then to binary code and you can have single binaries that run directly without a JVM -- not that the single JARs are that bad though, they are great and everybody has Java so I'll take that anytime over C libraries or NPM-distributed software, but direct executables even better. Scala Native just needs a little more love and some libraries and it will be the greatest thing in a couple of years.
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28Que vença o melhor
Nos esportes e jogos em geral, existe uma constante preocupação em balancear os incentivos e atributos do jogo, as regras do esporte em si e as regras das competições para que o melhor vença, ou, em outras palavras, para que sejam minimizados os outros fatores exceto a habilidade mais pura quanto possível no jogo em questão.
O mundo fora dos jogos, porém, nem sempre pode ter suas regras mudadas por um ente que as controla e está imbuído da vontade e dos meios para escolher as melhores regras possíveis para a obtenção dos resultados acima. Aliás, é muitas vezes essa possibilidade é até impensável. Mesmo quando ela é pensável e levada em conta os fatores que operam no mundo real não são facilmente identificáveis, eles são muitos, e mudam o tempo todo.
Mais do que isso, ao contrário de um jogo em que o objetivo é praticamente o mesmo para todo mundo, os objetivos de cada agente no mundo real são diferentes e incontáveis, e as "competições" que cada um está disputando são diferentes e muitas, cada minúsculo ato de suas vidas compreendendo várias delas simultaneamente.
Da mesma forma, é impossível conceber até mesmo o conceito de "melhor" para que se deseje que ele vença.
Mesmo assim é comum encontrarmos em várias situações gente que parte do princípio de que se Fulano está num certo lugar (por exemplo, um emprego muito bom) e Beltrano não isso se deve ao fato de Fulano ter sido melhor que Beltrano.
Está aí uma crítica à idéia da meritocracia (eu tinha me esquecido que essa palavra existia).
-
@ 91bea5cd:1df4451c
2025-04-15 06:27:28Básico
bash lsblk # Lista todos os diretorios montados.
Para criar o sistema de arquivos:
bash mkfs.btrfs -L "ThePool" -f /dev/sdx
Criando um subvolume:
bash btrfs subvolume create SubVol
Montando Sistema de Arquivos:
bash mount -o compress=zlib,subvol=SubVol,autodefrag /dev/sdx /mnt
Lista os discos formatados no diretório:
bash btrfs filesystem show /mnt
Adiciona novo disco ao subvolume:
bash btrfs device add -f /dev/sdy /mnt
Lista novamente os discos do subvolume:
bash btrfs filesystem show /mnt
Exibe uso dos discos do subvolume:
bash btrfs filesystem df /mnt
Balancea os dados entre os discos sobre raid1:
bash btrfs filesystem balance start -dconvert=raid1 -mconvert=raid1 /mnt
Scrub é uma passagem por todos os dados e metadados do sistema de arquivos e verifica as somas de verificação. Se uma cópia válida estiver disponível (perfis de grupo de blocos replicados), a danificada será reparada. Todas as cópias dos perfis replicados são validadas.
iniciar o processo de depuração :
bash btrfs scrub start /mnt
ver o status do processo de depuração Btrfs em execução:
bash btrfs scrub status /mnt
ver o status do scrub Btrfs para cada um dos dispositivos
bash btrfs scrub status -d / data btrfs scrub cancel / data
Para retomar o processo de depuração do Btrfs que você cancelou ou pausou:
btrfs scrub resume / data
Listando os subvolumes:
bash btrfs subvolume list /Reports
Criando um instantâneo dos subvolumes:
Aqui, estamos criando um instantâneo de leitura e gravação chamado snap de marketing do subvolume de marketing.
bash btrfs subvolume snapshot /Reports/marketing /Reports/marketing-snap
Além disso, você pode criar um instantâneo somente leitura usando o sinalizador -r conforme mostrado. O marketing-rosnap é um instantâneo somente leitura do subvolume de marketing
bash btrfs subvolume snapshot -r /Reports/marketing /Reports/marketing-rosnap
Forçar a sincronização do sistema de arquivos usando o utilitário 'sync'
Para forçar a sincronização do sistema de arquivos, invoque a opção de sincronização conforme mostrado. Observe que o sistema de arquivos já deve estar montado para que o processo de sincronização continue com sucesso.
bash btrfs filsystem sync /Reports
Para excluir o dispositivo do sistema de arquivos, use o comando device delete conforme mostrado.
bash btrfs device delete /dev/sdc /Reports
Para sondar o status de um scrub, use o comando scrub status com a opção -dR .
bash btrfs scrub status -dR / Relatórios
Para cancelar a execução do scrub, use o comando scrub cancel .
bash $ sudo btrfs scrub cancel / Reports
Para retomar ou continuar com uma depuração interrompida anteriormente, execute o comando de cancelamento de depuração
bash sudo btrfs scrub resume /Reports
mostra o uso do dispositivo de armazenamento:
btrfs filesystem usage /data
Para distribuir os dados, metadados e dados do sistema em todos os dispositivos de armazenamento do RAID (incluindo o dispositivo de armazenamento recém-adicionado) montados no diretório /data , execute o seguinte comando:
sudo btrfs balance start --full-balance /data
Pode demorar um pouco para espalhar os dados, metadados e dados do sistema em todos os dispositivos de armazenamento do RAID se ele contiver muitos dados.
Opções importantes de montagem Btrfs
Nesta seção, vou explicar algumas das importantes opções de montagem do Btrfs. Então vamos começar.
As opções de montagem Btrfs mais importantes são:
**1. acl e noacl
**ACL gerencia permissões de usuários e grupos para os arquivos/diretórios do sistema de arquivos Btrfs.
A opção de montagem acl Btrfs habilita ACL. Para desabilitar a ACL, você pode usar a opção de montagem noacl .
Por padrão, a ACL está habilitada. Portanto, o sistema de arquivos Btrfs usa a opção de montagem acl por padrão.
**2. autodefrag e noautodefrag
**Desfragmentar um sistema de arquivos Btrfs melhorará o desempenho do sistema de arquivos reduzindo a fragmentação de dados.
A opção de montagem autodefrag permite a desfragmentação automática do sistema de arquivos Btrfs.
A opção de montagem noautodefrag desativa a desfragmentação automática do sistema de arquivos Btrfs.
Por padrão, a desfragmentação automática está desabilitada. Portanto, o sistema de arquivos Btrfs usa a opção de montagem noautodefrag por padrão.
**3. compactar e compactar-forçar
**Controla a compactação de dados no nível do sistema de arquivos do sistema de arquivos Btrfs.
A opção compactar compacta apenas os arquivos que valem a pena compactar (se compactar o arquivo economizar espaço em disco).
A opção compress-force compacta todos os arquivos do sistema de arquivos Btrfs, mesmo que a compactação do arquivo aumente seu tamanho.
O sistema de arquivos Btrfs suporta muitos algoritmos de compactação e cada um dos algoritmos de compactação possui diferentes níveis de compactação.
Os algoritmos de compactação suportados pelo Btrfs são: lzo , zlib (nível 1 a 9) e zstd (nível 1 a 15).
Você pode especificar qual algoritmo de compactação usar para o sistema de arquivos Btrfs com uma das seguintes opções de montagem:
- compress=algoritmo:nível
- compress-force=algoritmo:nível
Para obter mais informações, consulte meu artigo Como habilitar a compactação do sistema de arquivos Btrfs .
**4. subvol e subvolid
**Estas opções de montagem são usadas para montar separadamente um subvolume específico de um sistema de arquivos Btrfs.
A opção de montagem subvol é usada para montar o subvolume de um sistema de arquivos Btrfs usando seu caminho relativo.
A opção de montagem subvolid é usada para montar o subvolume de um sistema de arquivos Btrfs usando o ID do subvolume.
Para obter mais informações, consulte meu artigo Como criar e montar subvolumes Btrfs .
**5. dispositivo
A opção de montagem de dispositivo** é usada no sistema de arquivos Btrfs de vários dispositivos ou RAID Btrfs.
Em alguns casos, o sistema operacional pode falhar ao detectar os dispositivos de armazenamento usados em um sistema de arquivos Btrfs de vários dispositivos ou RAID Btrfs. Nesses casos, você pode usar a opção de montagem do dispositivo para especificar os dispositivos que deseja usar para o sistema de arquivos de vários dispositivos Btrfs ou RAID.
Você pode usar a opção de montagem de dispositivo várias vezes para carregar diferentes dispositivos de armazenamento para o sistema de arquivos de vários dispositivos Btrfs ou RAID.
Você pode usar o nome do dispositivo (ou seja, sdb , sdc ) ou UUID , UUID_SUB ou PARTUUID do dispositivo de armazenamento com a opção de montagem do dispositivo para identificar o dispositivo de armazenamento.
Por exemplo,
- dispositivo=/dev/sdb
- dispositivo=/dev/sdb,dispositivo=/dev/sdc
- dispositivo=UUID_SUB=490a263d-eb9a-4558-931e-998d4d080c5d
- device=UUID_SUB=490a263d-eb9a-4558-931e-998d4d080c5d,device=UUID_SUB=f7ce4875-0874-436a-b47d-3edef66d3424
**6. degraded
A opção de montagem degradada** permite que um RAID Btrfs seja montado com menos dispositivos de armazenamento do que o perfil RAID requer.
Por exemplo, o perfil raid1 requer a presença de 2 dispositivos de armazenamento. Se um dos dispositivos de armazenamento não estiver disponível em qualquer caso, você usa a opção de montagem degradada para montar o RAID mesmo que 1 de 2 dispositivos de armazenamento esteja disponível.
**7. commit
A opção commit** mount é usada para definir o intervalo (em segundos) dentro do qual os dados serão gravados no dispositivo de armazenamento.
O padrão é definido como 30 segundos.
Para definir o intervalo de confirmação para 15 segundos, você pode usar a opção de montagem commit=15 (digamos).
**8. ssd e nossd
A opção de montagem ssd** informa ao sistema de arquivos Btrfs que o sistema de arquivos está usando um dispositivo de armazenamento SSD, e o sistema de arquivos Btrfs faz a otimização SSD necessária.
A opção de montagem nossd desativa a otimização do SSD.
O sistema de arquivos Btrfs detecta automaticamente se um SSD é usado para o sistema de arquivos Btrfs. Se um SSD for usado, a opção de montagem de SSD será habilitada. Caso contrário, a opção de montagem nossd é habilitada.
**9. ssd_spread e nossd_spread
A opção de montagem ssd_spread** tenta alocar grandes blocos contínuos de espaço não utilizado do SSD. Esse recurso melhora o desempenho de SSDs de baixo custo (baratos).
A opção de montagem nossd_spread desativa o recurso ssd_spread .
O sistema de arquivos Btrfs detecta automaticamente se um SSD é usado para o sistema de arquivos Btrfs. Se um SSD for usado, a opção de montagem ssd_spread será habilitada. Caso contrário, a opção de montagem nossd_spread é habilitada.
**10. descarte e nodiscard
Se você estiver usando um SSD que suporte TRIM enfileirado assíncrono (SATA rev3.1), a opção de montagem de descarte** permitirá o descarte de blocos de arquivos liberados. Isso melhorará o desempenho do SSD.
Se o SSD não suportar TRIM enfileirado assíncrono, a opção de montagem de descarte prejudicará o desempenho do SSD. Nesse caso, a opção de montagem nodiscard deve ser usada.
Por padrão, a opção de montagem nodiscard é usada.
**11. norecovery
Se a opção de montagem norecovery** for usada, o sistema de arquivos Btrfs não tentará executar a operação de recuperação de dados no momento da montagem.
**12. usebackuproot e nousebackuproot
Se a opção de montagem usebackuproot for usada, o sistema de arquivos Btrfs tentará recuperar qualquer raiz de árvore ruim/corrompida no momento da montagem. O sistema de arquivos Btrfs pode armazenar várias raízes de árvore no sistema de arquivos. A opção de montagem usebackuproot** procurará uma boa raiz de árvore e usará a primeira boa que encontrar.
A opção de montagem nousebackuproot não verificará ou recuperará raízes de árvore inválidas/corrompidas no momento da montagem. Este é o comportamento padrão do sistema de arquivos Btrfs.
**13. space_cache, space_cache=version, nospace_cache e clear_cache
A opção de montagem space_cache** é usada para controlar o cache de espaço livre. O cache de espaço livre é usado para melhorar o desempenho da leitura do espaço livre do grupo de blocos do sistema de arquivos Btrfs na memória (RAM).
O sistema de arquivos Btrfs suporta 2 versões do cache de espaço livre: v1 (padrão) e v2
O mecanismo de cache de espaço livre v2 melhora o desempenho de sistemas de arquivos grandes (tamanho de vários terabytes).
Você pode usar a opção de montagem space_cache=v1 para definir a v1 do cache de espaço livre e a opção de montagem space_cache=v2 para definir a v2 do cache de espaço livre.
A opção de montagem clear_cache é usada para limpar o cache de espaço livre.
Quando o cache de espaço livre v2 é criado, o cache deve ser limpo para criar um cache de espaço livre v1 .
Portanto, para usar o cache de espaço livre v1 após a criação do cache de espaço livre v2 , as opções de montagem clear_cache e space_cache=v1 devem ser combinadas: clear_cache,space_cache=v1
A opção de montagem nospace_cache é usada para desabilitar o cache de espaço livre.
Para desabilitar o cache de espaço livre após a criação do cache v1 ou v2 , as opções de montagem nospace_cache e clear_cache devem ser combinadas: clear_cache,nosapce_cache
**14. skip_balance
Por padrão, a operação de balanceamento interrompida/pausada de um sistema de arquivos Btrfs de vários dispositivos ou RAID Btrfs será retomada automaticamente assim que o sistema de arquivos Btrfs for montado. Para desabilitar a retomada automática da operação de equilíbrio interrompido/pausado em um sistema de arquivos Btrfs de vários dispositivos ou RAID Btrfs, você pode usar a opção de montagem skip_balance .**
**15. datacow e nodatacow
A opção datacow** mount habilita o recurso Copy-on-Write (CoW) do sistema de arquivos Btrfs. É o comportamento padrão.
Se você deseja desabilitar o recurso Copy-on-Write (CoW) do sistema de arquivos Btrfs para os arquivos recém-criados, monte o sistema de arquivos Btrfs com a opção de montagem nodatacow .
**16. datasum e nodatasum
A opção datasum** mount habilita a soma de verificação de dados para arquivos recém-criados do sistema de arquivos Btrfs. Este é o comportamento padrão.
Se você não quiser que o sistema de arquivos Btrfs faça a soma de verificação dos dados dos arquivos recém-criados, monte o sistema de arquivos Btrfs com a opção de montagem nodatasum .
Perfis Btrfs
Um perfil Btrfs é usado para informar ao sistema de arquivos Btrfs quantas cópias dos dados/metadados devem ser mantidas e quais níveis de RAID devem ser usados para os dados/metadados. O sistema de arquivos Btrfs contém muitos perfis. Entendê-los o ajudará a configurar um RAID Btrfs da maneira que você deseja.
Os perfis Btrfs disponíveis são os seguintes:
single : Se o perfil único for usado para os dados/metadados, apenas uma cópia dos dados/metadados será armazenada no sistema de arquivos, mesmo se você adicionar vários dispositivos de armazenamento ao sistema de arquivos. Assim, 100% do espaço em disco de cada um dos dispositivos de armazenamento adicionados ao sistema de arquivos pode ser utilizado.
dup : Se o perfil dup for usado para os dados/metadados, cada um dos dispositivos de armazenamento adicionados ao sistema de arquivos manterá duas cópias dos dados/metadados. Assim, 50% do espaço em disco de cada um dos dispositivos de armazenamento adicionados ao sistema de arquivos pode ser utilizado.
raid0 : No perfil raid0 , os dados/metadados serão divididos igualmente em todos os dispositivos de armazenamento adicionados ao sistema de arquivos. Nesta configuração, não haverá dados/metadados redundantes (duplicados). Assim, 100% do espaço em disco de cada um dos dispositivos de armazenamento adicionados ao sistema de arquivos pode ser usado. Se, em qualquer caso, um dos dispositivos de armazenamento falhar, todo o sistema de arquivos será corrompido. Você precisará de pelo menos dois dispositivos de armazenamento para configurar o sistema de arquivos Btrfs no perfil raid0 .
raid1 : No perfil raid1 , duas cópias dos dados/metadados serão armazenadas nos dispositivos de armazenamento adicionados ao sistema de arquivos. Nesta configuração, a matriz RAID pode sobreviver a uma falha de unidade. Mas você pode usar apenas 50% do espaço total em disco. Você precisará de pelo menos dois dispositivos de armazenamento para configurar o sistema de arquivos Btrfs no perfil raid1 .
raid1c3 : No perfil raid1c3 , três cópias dos dados/metadados serão armazenadas nos dispositivos de armazenamento adicionados ao sistema de arquivos. Nesta configuração, a matriz RAID pode sobreviver a duas falhas de unidade, mas você pode usar apenas 33% do espaço total em disco. Você precisará de pelo menos três dispositivos de armazenamento para configurar o sistema de arquivos Btrfs no perfil raid1c3 .
raid1c4 : No perfil raid1c4 , quatro cópias dos dados/metadados serão armazenadas nos dispositivos de armazenamento adicionados ao sistema de arquivos. Nesta configuração, a matriz RAID pode sobreviver a três falhas de unidade, mas você pode usar apenas 25% do espaço total em disco. Você precisará de pelo menos quatro dispositivos de armazenamento para configurar o sistema de arquivos Btrfs no perfil raid1c4 .
raid10 : No perfil raid10 , duas cópias dos dados/metadados serão armazenadas nos dispositivos de armazenamento adicionados ao sistema de arquivos, como no perfil raid1 . Além disso, os dados/metadados serão divididos entre os dispositivos de armazenamento, como no perfil raid0 .
O perfil raid10 é um híbrido dos perfis raid1 e raid0 . Alguns dos dispositivos de armazenamento formam arrays raid1 e alguns desses arrays raid1 são usados para formar um array raid0 . Em uma configuração raid10 , o sistema de arquivos pode sobreviver a uma única falha de unidade em cada uma das matrizes raid1 .
Você pode usar 50% do espaço total em disco na configuração raid10 . Você precisará de pelo menos quatro dispositivos de armazenamento para configurar o sistema de arquivos Btrfs no perfil raid10 .
raid5 : No perfil raid5 , uma cópia dos dados/metadados será dividida entre os dispositivos de armazenamento. Uma única paridade será calculada e distribuída entre os dispositivos de armazenamento do array RAID.
Em uma configuração raid5 , o sistema de arquivos pode sobreviver a uma única falha de unidade. Se uma unidade falhar, você pode adicionar uma nova unidade ao sistema de arquivos e os dados perdidos serão calculados a partir da paridade distribuída das unidades em execução.
Você pode usar 1 00x(N-1)/N % do total de espaços em disco na configuração raid5 . Aqui, N é o número de dispositivos de armazenamento adicionados ao sistema de arquivos. Você precisará de pelo menos três dispositivos de armazenamento para configurar o sistema de arquivos Btrfs no perfil raid5 .
raid6 : No perfil raid6 , uma cópia dos dados/metadados será dividida entre os dispositivos de armazenamento. Duas paridades serão calculadas e distribuídas entre os dispositivos de armazenamento do array RAID.
Em uma configuração raid6 , o sistema de arquivos pode sobreviver a duas falhas de unidade ao mesmo tempo. Se uma unidade falhar, você poderá adicionar uma nova unidade ao sistema de arquivos e os dados perdidos serão calculados a partir das duas paridades distribuídas das unidades em execução.
Você pode usar 100x(N-2)/N % do espaço total em disco na configuração raid6 . Aqui, N é o número de dispositivos de armazenamento adicionados ao sistema de arquivos. Você precisará de pelo menos quatro dispositivos de armazenamento para configurar o sistema de arquivos Btrfs no perfil raid6 .
-
@ 91bea5cd:1df4451c
2025-04-15 06:23:35Um bom gerenciamento de senhas deve ser simples e seguir a filosofia do Unix. Organizado em hierarquia e fácil de passar de um computador para outro.
E por isso não é recomendável o uso de aplicativos de terceiros que tenham acesso a suas chaves(senhas) em seus servidores, tampouco as opções nativas dos navegadores, que também pertencem a grandes empresas que fazem um grande esforço para ter acesso a nossas informações.
Recomendação
- pass
- Qtpass (gerenciador gráfico)
Com ele seus dados são criptografados usando sua chave gpg e salvo em arquivos organizados por pastas de forma hierárquica, podendo ser integrado a um serviço git de sua escolha ou copiado facilmente de um local para outro.
Uso
O seu uso é bem simples.
Configuração:
pass git init
Para ver:
pass Email/example.com
Copiar para área de transferência (exige xclip):
pass -c Email/example.com
Para inserir:
pass insert Email/example0.com
Para inserir e gerar senha:
pass generate Email/example1.com
Para inserir e gerar senha sem símbolos:
pass generate --no-symbols Email/example1.com
Para inserir, gerar senha e copiar para área de transferência :
pass generate -c Email/example1.com
Para remover:
pass rm Email/example.com
-
@ 91bea5cd:1df4451c
2025-04-15 06:19:19O que é Tahoe-LAFS?
Bem-vindo ao Tahoe-LAFS_, o primeiro sistema de armazenamento descentralizado com
- Segurança independente do provedor * .
Tahoe-LAFS é um sistema que ajuda você a armazenar arquivos. Você executa um cliente Programa no seu computador, que fala com um ou mais servidores de armazenamento em outros computadores. Quando você diz ao seu cliente para armazenar um arquivo, ele irá criptografar isso Arquivo, codifique-o em múltiplas peças, depois espalhe essas peças entre Vários servidores. As peças são todas criptografadas e protegidas contra Modificações. Mais tarde, quando você pede ao seu cliente para recuperar o arquivo, ele irá Encontre as peças necessárias, verifique se elas não foram corrompidas e remontadas Eles, e descriptografar o resultado.
O cliente cria mais peças (ou "compartilhamentos") do que acabará por precisar, então Mesmo que alguns servidores falhem, você ainda pode recuperar seus dados. Corrompido Os compartilhamentos são detectados e ignorados, de modo que o sistema pode tolerar o lado do servidor Erros no disco rígido. Todos os arquivos são criptografados (com uma chave exclusiva) antes Uploading, então mesmo um operador de servidor mal-intencionado não pode ler seus dados. o A única coisa que você pede aos servidores é que eles podem (geralmente) fornecer o Compartilha quando você os solicita: você não está confiando sobre eles para Confidencialidade, integridade ou disponibilidade absoluta.
O que é "segurança independente do provedor"?
Todo vendedor de serviços de armazenamento na nuvem irá dizer-lhe que o seu serviço é "seguro". Mas o que eles significam com isso é algo fundamentalmente diferente Do que queremos dizer. O que eles significam por "seguro" é que depois de ter dado Eles o poder de ler e modificar seus dados, eles tentam muito difícil de não deixar Esse poder seja abusado. Isso acaba por ser difícil! Insetos, Configurações incorretas ou erro do operador podem acidentalmente expor seus dados para Outro cliente ou para o público, ou pode corromper seus dados. Criminosos Ganho rotineiramente de acesso ilícito a servidores corporativos. Ainda mais insidioso é O fato de que os próprios funcionários às vezes violam a privacidade do cliente De negligência, avareza ou mera curiosidade. O mais consciencioso de Esses prestadores de serviços gastam consideráveis esforços e despesas tentando Mitigar esses riscos.
O que queremos dizer com "segurança" é algo diferente. * O provedor de serviços Nunca tem a capacidade de ler ou modificar seus dados em primeiro lugar: nunca. * Se você usa Tahoe-LAFS, então todas as ameaças descritas acima não são questões para você. Não só é fácil e barato para o provedor de serviços Manter a segurança de seus dados, mas na verdade eles não podem violar sua Segurança se eles tentaram. Isto é o que chamamos de * independente do fornecedor segurança*.
Esta garantia está integrada naturalmente no sistema de armazenamento Tahoe-LAFS e Não exige que você execute um passo de pré-criptografia manual ou uma chave complicada gestão. (Afinal, ter que fazer operações manuais pesadas quando Armazenar ou acessar seus dados anularia um dos principais benefícios de Usando armazenamento em nuvem em primeiro lugar: conveniência.)
Veja como funciona:
Uma "grade de armazenamento" é constituída por uma série de servidores de armazenamento. Um servidor de armazenamento Tem armazenamento direto em anexo (tipicamente um ou mais discos rígidos). Um "gateway" Se comunica com os nós de armazenamento e os usa para fornecer acesso ao Rede sobre protocolos como HTTP (S), SFTP ou FTP.
Observe que você pode encontrar "cliente" usado para se referir aos nós do gateway (que atuam como Um cliente para servidores de armazenamento) e também para processos ou programas que se conectam a Um nó de gateway e operações de execução na grade - por exemplo, uma CLI Comando, navegador da Web, cliente SFTP ou cliente FTP.
Os usuários não contam com servidores de armazenamento para fornecer * confidencialidade * nem
- Integridade * para seus dados - em vez disso, todos os dados são criptografados e Integridade verificada pelo gateway, para que os servidores não possam ler nem Modifique o conteúdo dos arquivos.
Os usuários dependem de servidores de armazenamento para * disponibilidade *. O texto cifrado é Codificado por apagamento em partes
N
distribuídas em pelo menosH
distintas Servidores de armazenamento (o valor padrão paraN
é 10 e paraH
é 7) então Que pode ser recuperado de qualquerK
desses servidores (o padrão O valor deK
é 3). Portanto, apenas a falha doH-K + 1
(com o Padrões, 5) servidores podem tornar os dados indisponíveis.No modo de implantação típico, cada usuário executa seu próprio gateway sozinho máquina. Desta forma, ela confia em sua própria máquina para a confidencialidade e Integridade dos dados.
Um modo de implantação alternativo é que o gateway é executado em uma máquina remota e O usuário se conecta ao HTTPS ou SFTP. Isso significa que o operador de O gateway pode visualizar e modificar os dados do usuário (o usuário * depende de * o Gateway para confidencialidade e integridade), mas a vantagem é que a O usuário pode acessar a grade Tahoe-LAFS com um cliente que não possui o Software de gateway instalado, como um quiosque de internet ou celular.
Controle de acesso
Existem dois tipos de arquivos: imutáveis e mutáveis. Quando você carrega um arquivo Para a grade de armazenamento, você pode escolher o tipo de arquivo que será no grade. Os arquivos imutáveis não podem ser modificados quando foram carregados. UMA O arquivo mutable pode ser modificado por alguém com acesso de leitura e gravação. Um usuário Pode ter acesso de leitura e gravação a um arquivo mutable ou acesso somente leitura, ou não Acesso a ele.
Um usuário que tenha acesso de leitura e gravação a um arquivo mutable ou diretório pode dar Outro acesso de leitura e gravação do usuário a esse arquivo ou diretório, ou eles podem dar Acesso somente leitura para esse arquivo ou diretório. Um usuário com acesso somente leitura Para um arquivo ou diretório pode dar acesso a outro usuário somente leitura.
Ao vincular um arquivo ou diretório a um diretório pai, você pode usar um Link de leitura-escrita ou um link somente de leitura. Se você usar um link de leitura e gravação, então Qualquer pessoa que tenha acesso de leitura e gravação ao diretório pai pode obter leitura-escrita Acesso à criança e qualquer pessoa que tenha acesso somente leitura ao pai O diretório pode obter acesso somente leitura à criança. Se você usar uma leitura somente Link, qualquer pessoa que tenha lido-escrito ou acesso somente leitura ao pai O diretório pode obter acesso somente leitura à criança.
================================================== ==== Usando Tahoe-LAFS com uma rede anônima: Tor, I2P ================================================== ====
. `Visão geral '
. `Casos de uso '
.
Software Dependencies
_#.
Tor
#.I2P
. `Configuração de conexão '
. `Configuração de Anonimato '
#.
Anonimato do cliente ' #.
Anonimato de servidor, configuração manual ' #. `Anonimato de servidor, configuração automática '. `Problemas de desempenho e segurança '
Visão geral
Tor é uma rede anonimização usada para ajudar a esconder a identidade da Internet Clientes e servidores. Consulte o site do Tor Project para obter mais informações: Https://www.torproject.org/
I2P é uma rede de anonimato descentralizada que se concentra no anonimato de ponta a ponta Entre clientes e servidores. Consulte o site I2P para obter mais informações: Https://geti2p.net/
Casos de uso
Existem três casos de uso potenciais para Tahoe-LAFS do lado do cliente:
-
O usuário deseja sempre usar uma rede de anonimato (Tor, I2P) para proteger Seu anonimato quando se conecta às redes de armazenamento Tahoe-LAFS (seja ou Não os servidores de armazenamento são anônimos).
-
O usuário não se preocupa em proteger seu anonimato, mas eles desejam se conectar a Servidores de armazenamento Tahoe-LAFS que são acessíveis apenas através de Tor Hidden Services ou I2P.
-
Tor é usado apenas se uma sugestão de conexão do servidor usar
tor:
. Essas sugestões Geralmente tem um endereço.onion
. -
I2P só é usado se uma sugestão de conexão do servidor usa
i2p:
. Essas sugestões Geralmente têm um endereço.i2p
. -
O usuário não se preocupa em proteger seu anonimato ou para se conectar a um anonimato Servidores de armazenamento. Este documento não é útil para você ... então pare de ler.
Para servidores de armazenamento Tahoe-LAFS existem três casos de uso:
-
O operador deseja proteger o anonimato fazendo seu Tahoe Servidor acessível apenas em I2P, através de Tor Hidden Services, ou ambos.
-
O operador não * requer * anonimato para o servidor de armazenamento, mas eles Quer que ele esteja disponível tanto no TCP / IP roteado publicamente quanto através de um Rede de anonimização (I2P, Tor Hidden Services). Uma possível razão para fazer Isso é porque ser alcançável através de uma rede de anonimato é um Maneira conveniente de ignorar NAT ou firewall que impede roteios públicos Conexões TCP / IP ao seu servidor (para clientes capazes de se conectar a Tais servidores). Outro é o que torna o seu servidor de armazenamento acessível Através de uma rede de anonimato pode oferecer uma melhor proteção para sua Clientes que usam essa rede de anonimato para proteger seus anonimato.
-
O operador do servidor de armazenamento não se preocupa em proteger seu próprio anonimato nem Para ajudar os clientes a proteger o deles. Pare de ler este documento e execute Seu servidor de armazenamento Tahoe-LAFS usando TCP / IP com roteamento público.
Veja esta página do Tor Project para obter mais informações sobre Tor Hidden Services: Https://www.torproject.org/docs/hidden-services.html.pt
Veja esta página do Projeto I2P para obter mais informações sobre o I2P: Https://geti2p.net/en/about/intro
Dependências de software
Tor
Os clientes que desejam se conectar a servidores baseados em Tor devem instalar o seguinte.
-
Tor (tor) deve ser instalado. Veja aqui: Https://www.torproject.org/docs/installguide.html.en. No Debian / Ubuntu, Use
apt-get install tor
. Você também pode instalar e executar o navegador Tor Agrupar. -
Tahoe-LAFS deve ser instalado com o
[tor]
"extra" habilitado. Isso vai Instaletxtorcon
::
Pip install tahoe-lafs [tor]
Os servidores Tor-configurados manualmente devem instalar Tor, mas não precisam
Txtorcon
ou o[tor]
extra. Configuração automática, quando Implementado, vai precisar destes, assim como os clientes.I2P
Os clientes que desejam se conectar a servidores baseados em I2P devem instalar o seguinte. Tal como acontece com Tor, os servidores baseados em I2P configurados manualmente precisam do daemon I2P, mas Não há bibliotecas especiais de apoio Tahoe-side.
-
I2P deve ser instalado. Veja aqui: Https://geti2p.net/en/download
-
A API SAM deve estar habilitada.
-
Inicie o I2P.
- Visite http://127.0.0.1:7657/configclients no seu navegador.
- Em "Configuração do Cliente", marque a opção "Executar no Startup?" Caixa para "SAM Ponte de aplicação ".
- Clique em "Salvar Configuração do Cliente".
-
Clique no controle "Iniciar" para "ponte de aplicação SAM" ou reinicie o I2P.
-
Tahoe-LAFS deve ser instalado com o
[i2p]
extra habilitado, para obterTxi2p
::
Pip install tahoe-lafs [i2p]
Tor e I2P
Os clientes que desejam se conectar a servidores baseados em Tor e I2P devem instalar tudo acima. Em particular, Tahoe-LAFS deve ser instalado com ambos Extras habilitados ::
Pip install tahoe-lafs [tor, i2p]
Configuração de conexão
Consulte: ref:
Connection Management
para uma descrição do[tor]
e
[I2p]
seções detahoe.cfg
. Estes controlam como o cliente Tahoe Conecte-se a um daemon Tor / I2P e, assim, faça conexões com Tor / I2P-baseadas Servidores.As seções
[tor]
e[i2p]
só precisam ser modificadas para serem usadas de forma incomum Configurações ou para habilitar a configuração automática do servidor.A configuração padrão tentará entrar em contato com um daemon local Tor / I2P Ouvindo as portas usuais (9050/9150 para Tor, 7656 para I2P). Enquanto Há um daemon em execução no host local e o suporte necessário Bibliotecas foram instaladas, os clientes poderão usar servidores baseados em Tor Sem qualquer configuração especial.
No entanto, note que esta configuração padrão não melhora a Anonimato: as conexões TCP normais ainda serão feitas em qualquer servidor que Oferece um endereço regular (cumpre o segundo caso de uso do cliente acima, não o terceiro). Para proteger o anonimato, os usuários devem configurar o
[Connections]
da seguinte maneira:[Conexões] Tcp = tor
Com isso, o cliente usará Tor (em vez de um IP-address -reviração de conexão direta) para alcançar servidores baseados em TCP.
Configuração de anonimato
Tahoe-LAFS fornece uma configuração "flag de segurança" para indicar explicitamente Seja necessário ou não a privacidade do endereço IP para um nó ::
[nó] Revelar-IP-address = (booleano, opcional)
Quando
revelar-IP-address = False
, Tahoe-LAFS se recusará a iniciar se algum dos As opções de configuração emtahoe.cfg
revelariam a rede do nó localização:-
[Conexões] tcp = tor
é necessário: caso contrário, o cliente faria Conexões diretas para o Introdução, ou qualquer servidor baseado em TCP que aprende Do Introdutor, revelando seu endereço IP para esses servidores e um Rede de espionagem. Com isso, Tahoe-LAFS só fará Conexões de saída através de uma rede de anonimato suportada. -
Tub.location
deve ser desativado ou conter valores seguros. este O valor é anunciado para outros nós através do Introdutor: é como um servidor Anuncia sua localização para que os clientes possam se conectar a ela. No modo privado, ele É um erro para incluir umtcp:
dica notub.location
. Modo privado Rejeita o valor padrão detub.location
(quando a chave está faltando Inteiramente), que éAUTO
, que usaifconfig
para adivinhar o nó Endereço IP externo, o que o revelaria ao servidor e a outros clientes.
Esta opção é ** crítica ** para preservar o anonimato do cliente (cliente Caso de uso 3 de "Casos de uso", acima). Também é necessário preservar uma Anonimato do servidor (caso de uso do servidor 3).
Esse sinalizador pode ser configurado (para falso), fornecendo o argumento
--hide-ip
para Os comandoscreate-node
,create-client
oucreate-introducer
.Observe que o valor padrão de
revelar-endereço IP
é verdadeiro, porque Infelizmente, esconder o endereço IP do nó requer software adicional para ser Instalado (conforme descrito acima) e reduz o desempenho.Anonimato do cliente
Para configurar um nó de cliente para anonimato,
tahoe.cfg
** deve ** conter o Seguindo as bandeiras de configuração ::[nó] Revelar-IP-address = False Tub.port = desativado Tub.location = desativado
Uma vez que o nodo Tahoe-LAFS foi reiniciado, ele pode ser usado anonimamente (cliente Caso de uso 3).
Anonimato do servidor, configuração manual
Para configurar um nó de servidor para ouvir em uma rede de anonimato, devemos primeiro Configure Tor para executar um "Serviço de cebola" e encaminhe as conexões de entrada para o Porto Tahoe local. Então, configuramos Tahoe para anunciar o endereço
.onion
Aos clientes. Também configuramos Tahoe para não fazer conexões TCP diretas.- Decida em um número de porta de escuta local, chamado PORT. Isso pode ser qualquer não utilizado Porta de cerca de 1024 até 65535 (dependendo do kernel / rede do host Config). Nós diremos a Tahoe para escutar nesta porta, e nós diremos a Tor para Encaminhe as conexões de entrada para ele.
- Decida em um número de porta externo, chamado VIRTPORT. Isso será usado no Localização anunciada e revelada aos clientes. Pode ser qualquer número de 1 Para 65535. Pode ser o mesmo que PORT, se quiser.
- Decida em um "diretório de serviço oculto", geralmente em
/ var / lib / tor / NAME
. Pediremos a Tor para salvar o estado do serviço de cebola aqui, e Tor irá Escreva o endereço.onion
aqui depois que ele for gerado.
Em seguida, faça o seguinte:
-
Crie o nó do servidor Tahoe (com
tahoe create-node
), mas não ** não ** Lança-o ainda. -
Edite o arquivo de configuração Tor (normalmente em
/ etc / tor / torrc
). Precisamos adicionar Uma seção para definir o serviço oculto. Se nossa PORT for 2000, VIRTPORT é 3000, e estamos usando/ var / lib / tor / tahoe
como o serviço oculto Diretório, a seção deve se parecer com ::HiddenServiceDir / var / lib / tor / tahoe HiddenServicePort 3000 127.0.0.1:2000
-
Reinicie Tor, com
systemctl restart tor
. Aguarde alguns segundos. -
Leia o arquivo
hostname
no diretório de serviço oculto (por exemplo,/ Var / lib / tor / tahoe / hostname
). Este será um endereço.onion
, comoU33m4y7klhz3b.onion
. Ligue para esta CEBOLA. -
Edite
tahoe.cfg
para configurartub.port
para usarTcp: PORT: interface = 127.0.0.1
etub.location
para usarTor: ONION.onion: VIRTPORT
. Usando os exemplos acima, isso seria ::[nó] Revelar-endereço IP = falso Tub.port = tcp: 2000: interface = 127.0.0.1 Tub.location = tor: u33m4y7klhz3b.onion: 3000 [Conexões] Tcp = tor
-
Inicie o servidor Tahoe com
tahoe start $ NODEDIR
A seção
tub.port
fará com que o servidor Tahoe ouça no PORT, mas Ligue o soquete de escuta à interface de loopback, que não é acessível Do mundo exterior (mas * é * acessível pelo daemon Tor local). Então o A seçãotcp = tor
faz com que Tahoe use Tor quando se conecta ao Introdução, escondendo o endereço IP. O nó se anunciará a todos Clientes que usam `tub.location``, então os clientes saberão que devem usar o Tor Para alcançar este servidor (e não revelar seu endereço IP através do anúncio). Quando os clientes se conectam ao endereço da cebola, seus pacotes serão Atravessar a rede de anonimato e eventualmente aterrar no Tor local Daemon, que então estabelecerá uma conexão com PORT no localhost, que é Onde Tahoe está ouvindo conexões.Siga um processo similar para construir um servidor Tahoe que escuta no I2P. o O mesmo processo pode ser usado para ouvir tanto o Tor como o I2P (
tub.location = Tor: ONION.onion: VIRTPORT, i2p: ADDR.i2p
). Também pode ouvir tanto Tor como TCP simples (caso de uso 2), comtub.port = tcp: PORT
,tub.location = Tcp: HOST: PORT, tor: ONION.onion: VIRTPORT
eanonymous = false
(e omite A configuraçãotcp = tor
, já que o endereço já está sendo transmitido através de O anúncio de localização).Anonimato do servidor, configuração automática
Para configurar um nó do servidor para ouvir em uma rede de anonimato, crie o Nó com a opção
--listen = tor
. Isso requer uma configuração Tor que Ou lança um novo daemon Tor, ou tem acesso à porta de controle Tor (e Autoridade suficiente para criar um novo serviço de cebola). Nos sistemas Debian / Ubuntu, façaApt install tor
, adicione-se ao grupo de controle comadduser YOURUSERNAME debian-tor
e, em seguida, inicie sessão e faça o login novamente: se osgroups
O comando incluidebian-tor
na saída, você deve ter permissão para Use a porta de controle de domínio unix em/ var / run / tor / control
.Esta opção irá definir
revelar-IP-address = False
e[connections] tcp = Tor
. Ele alocará as portas necessárias, instruirá Tor para criar a cebola Serviço (salvando a chave privada em algum lugar dentro de NODEDIR / private /), obtenha O endereço.onion
e preenchatub.port
etub.location
corretamente.Problemas de desempenho e segurança
Se você estiver executando um servidor que não precisa ser Anônimo, você deve torná-lo acessível através de uma rede de anonimato ou não? Ou você pode torná-lo acessível * ambos * através de uma rede de anonimato E como um servidor TCP / IP rastreável publicamente?
Existem várias compensações efetuadas por esta decisão.
Penetração NAT / Firewall
Fazer com que um servidor seja acessível via Tor ou I2P o torna acessível (por Clientes compatíveis com Tor / I2P) mesmo que existam NAT ou firewalls que impeçam Conexões TCP / IP diretas para o servidor.
Anonimato
Tornar um servidor Tahoe-LAFS acessível * somente * via Tor ou I2P pode ser usado para Garanta que os clientes Tahoe-LAFS usem Tor ou I2P para se conectar (Especificamente, o servidor só deve anunciar endereços Tor / I2P no Chave de configuração
tub.location
). Isso evita que os clientes mal configurados sejam Desingonizando-se acidentalmente, conectando-se ao seu servidor através de A Internet rastreável.Claramente, um servidor que está disponível como um serviço Tor / I2P * e * a O endereço TCP regular não é anônimo: o endereço do .on e o real O endereço IP do servidor é facilmente vinculável.
Além disso, a interação, através do Tor, com um Tor Oculto pode ser mais Protegido da análise do tráfego da rede do que a interação, através do Tor, Com um servidor TCP / IP com rastreamento público
** XXX há um documento mantido pelos desenvolvedores de Tor que comprovem ou refutam essa crença? Se assim for, precisamos ligar a ele. Caso contrário, talvez devêssemos explicar mais aqui por que pensamos isso? **
Linkability
A partir de 1.12.0, o nó usa uma única chave de banheira persistente para saída Conexões ao Introdutor e conexões de entrada para o Servidor de Armazenamento (E Helper). Para os clientes, uma nova chave Tub é criada para cada servidor de armazenamento Nós aprendemos sobre, e essas chaves são * não * persistiram (então elas mudarão cada uma delas Tempo que o cliente reinicia).
Clientes que atravessam diretórios (de rootcap para subdiretório para filecap) são É provável que solicitem os mesmos índices de armazenamento (SIs) na mesma ordem de cada vez. Um cliente conectado a vários servidores irá pedir-lhes todos para o mesmo SI em Quase ao mesmo tempo. E dois clientes que compartilham arquivos ou diretórios Irá visitar os mesmos SI (em várias ocasiões).
Como resultado, as seguintes coisas são vinculáveis, mesmo com
revelar-endereço IP = Falso
:- Servidores de armazenamento podem vincular reconhecer várias conexões do mesmo Cliente ainda não reiniciado. (Observe que o próximo recurso de Contabilidade pode Faz com que os clientes apresentem uma chave pública persistente do lado do cliente quando Conexão, que será uma ligação muito mais forte).
- Os servidores de armazenamento provavelmente podem deduzir qual cliente está acessando dados, por Olhando as SIs sendo solicitadas. Vários servidores podem conciliar Determine que o mesmo cliente está falando com todos eles, mesmo que o TubIDs são diferentes para cada conexão.
- Os servidores de armazenamento podem deduzir quando dois clientes diferentes estão compartilhando dados.
- O Introdutor pode entregar diferentes informações de servidor para cada um Cliente subscrito, para particionar clientes em conjuntos distintos de acordo com Quais as conexões do servidor que eles eventualmente fazem. Para clientes + nós de servidor, ele Também pode correlacionar o anúncio do servidor com o cliente deduzido identidade.
atuação
Um cliente que se conecta a um servidor Tahoe-LAFS com rastreamento público através de Tor Incorrem em latência substancialmente maior e, às vezes, pior Mesmo cliente se conectando ao mesmo servidor através de um TCP / IP rastreável normal conexão. Quando o servidor está em um Tor Hidden Service, ele incorre ainda mais Latência e, possivelmente, ainda pior rendimento.
Conectando-se a servidores Tahoe-LAFS que são servidores I2P incorrem em maior latência E pior rendimento também.
Efeitos positivos e negativos em outros usuários Tor
O envio de seu tráfego Tahoe-LAFS sobre o Tor adiciona tráfego de cobertura para outros Tor usuários que também estão transmitindo dados em massa. Então isso é bom para Eles - aumentando seu anonimato.
No entanto, torna o desempenho de outros usuários do Tor Sessões - por exemplo, sessões ssh - muito pior. Isso é porque Tor Atualmente não possui nenhuma prioridade ou qualidade de serviço Recursos, para que as teclas de Ssh de outra pessoa possam ter que esperar na fila Enquanto o conteúdo do arquivo em massa é transmitido. O atraso adicional pode Tornar as sessões interativas de outras pessoas inutilizáveis.
Ambos os efeitos são duplicados se você carregar ou baixar arquivos para um Tor Hidden Service, em comparação com se você carregar ou baixar arquivos Over Tor para um servidor TCP / IP com rastreamento público
Efeitos positivos e negativos em outros usuários do I2P
Enviar seu tráfego Tahoe-LAFS ao I2P adiciona tráfego de cobertura para outros usuários do I2P Que também estão transmitindo dados. Então, isso é bom para eles - aumentando sua anonimato. Não prejudicará diretamente o desempenho de outros usuários do I2P Sessões interativas, porque a rede I2P possui vários controles de congestionamento e Recursos de qualidade de serviço, como priorizar pacotes menores.
No entanto, se muitos usuários estão enviando tráfego Tahoe-LAFS ao I2P e não tiverem Seus roteadores I2P configurados para participar de muito tráfego, então o I2P A rede como um todo sofrerá degradação. Cada roteador Tahoe-LAFS que usa o I2P tem Seus próprios túneis de anonimato que seus dados são enviados. Em média, um O nó Tahoe-LAFS requer 12 outros roteadores I2P para participar de seus túneis.
Portanto, é importante que o seu roteador I2P esteja compartilhando a largura de banda com outros Roteadores, para que você possa retornar enquanto usa o I2P. Isso nunca prejudicará a Desempenho de seu nó Tahoe-LAFS, porque seu roteador I2P sempre Priorize seu próprio tráfego.
=========================
Como configurar um servidor
Muitos nós Tahoe-LAFS são executados como "servidores", o que significa que eles fornecem serviços para Outras máquinas (isto é, "clientes"). Os dois tipos mais importantes são os Introdução e Servidores de armazenamento.
Para ser útil, os servidores devem ser alcançados pelos clientes. Os servidores Tahoe podem ouvir Em portas TCP e anunciar sua "localização" (nome do host e número da porta TCP) Para que os clientes possam se conectar a eles. Eles também podem ouvir os serviços de cebola "Tor" E portas I2P.
Os servidores de armazenamento anunciam sua localização ao anunciá-lo ao Introdutivo, Que então transmite a localização para todos os clientes. Então, uma vez que a localização é Determinado, você não precisa fazer nada de especial para entregá-lo.
O próprio apresentador possui uma localização, que deve ser entregue manualmente a todos Servidores de armazenamento e clientes. Você pode enviá-lo para os novos membros do seu grade. Esta localização (juntamente com outros identificadores criptográficos importantes) é Escrito em um arquivo chamado
private / introducer.furl
no Presenter's Diretório básico, e deve ser fornecido como o argumento--introducer =
paraTahoe create-node
outahoe create-node
.O primeiro passo ao configurar um servidor é descobrir como os clientes irão alcançar. Então você precisa configurar o servidor para ouvir em algumas portas, e Depois configure a localização corretamente.
Configuração manual
Cada servidor tem duas configurações em seu arquivo
tahoe.cfg
:tub.port
, eTub.location
. A "porta" controla o que o nó do servidor escuta: isto Geralmente é uma porta TCP.A "localização" controla o que é anunciado para o mundo exterior. Isto é um "Sugestão de conexão foolscap", e inclui tanto o tipo de conexão (Tcp, tor ou i2p) e os detalhes da conexão (nome do host / endereço, porta número). Vários proxies, gateways e redes de privacidade podem ser Envolvido, então não é incomum para
tub.port
etub.location
para olhar diferente.Você pode controlar diretamente a configuração
tub.port
etub.location
Configurações, fornecendo--port =
e--location =
ao executartahoe Create-node
.Configuração automática
Em vez de fornecer
--port = / - location =
, você pode usar--listen =
. Os servidores podem ouvir em TCP, Tor, I2P, uma combinação desses ou nenhum. O argumento--listen =
controla quais tipos de ouvintes o novo servidor usará.--listen = none
significa que o servidor não deve ouvir nada. Isso não Faz sentido para um servidor, mas é apropriado para um nó somente cliente. o O comandotahoe create-client
inclui automaticamente--listen = none
.--listen = tcp
é o padrão e liga uma porta de escuta TCP padrão. Usar--listen = tcp
requer um argumento--hostname =
também, que será Incorporado no local anunciado do nó. Descobrimos que os computadores Não pode determinar de forma confiável seu nome de host acessível externamente, então, em vez de Ter o servidor adivinhar (ou escanear suas interfaces para endereços IP Isso pode ou não ser apropriado), a criação de nó requer que o usuário Forneça o nome do host.--listen = tor
conversará com um daemon Tor local e criará uma nova "cebola" Servidor "(que se parece comalzrgrdvxct6c63z.onion
).
--listen = i2p` conversará com um daemon I2P local e criará um novo servidor endereço. Consulte: doc:
anonymity-configuration` para obter detalhes.Você pode ouvir nos três usando
--listen = tcp, tor, i2p
.Cenários de implantação
A seguir, alguns cenários sugeridos para configurar servidores usando Vários transportes de rede. Estes exemplos não incluem a especificação de um Apresentador FURL que normalmente você gostaria quando provisionamento de armazenamento Nós. Para estes e outros detalhes de configuração, consulte : Doc:
configuration
.. `Servidor possui um nome DNS público '
.
Servidor possui um endereço público IPv4 / IPv6
_.
O servidor está por trás de um firewall com encaminhamento de porta
_.
Usando o I2P / Tor para evitar o encaminhamento da porta
_O servidor possui um nome DNS público
O caso mais simples é o local onde o host do servidor está diretamente conectado ao Internet, sem um firewall ou caixa NAT no caminho. A maioria dos VPS (Virtual Private Servidor) e servidores colocados são assim, embora alguns fornecedores bloqueiem Muitas portas de entrada por padrão.
Para esses servidores, tudo o que você precisa saber é o nome do host externo. O sistema O administrador irá dizer-lhe isso. O principal requisito é que este nome de host Pode ser pesquisado no DNS, e ele será mapeado para um endereço IPv4 ou IPv6 que Alcançará a máquina.
Se o seu nome de host for
example.net
, então você criará o introdutor como esta::Tahoe create-introducer --hostname example.com ~ / introducer
Ou um servidor de armazenamento como ::
Tahoe create-node --hostname = example.net
Estes irão alocar uma porta TCP (por exemplo, 12345), atribuir
tub.port
para serTcp: 12345
etub.location
serãotcp: example.com: 12345
.Idealmente, isso também deveria funcionar para hosts compatíveis com IPv6 (onde o nome DNS Fornece um registro "AAAA", ou ambos "A" e "AAAA"). No entanto Tahoe-LAFS O suporte para IPv6 é novo e ainda pode ter problemas. Por favor, veja o ingresso
# 867
_ para detalhes... _ # 867: https://tahoe-lafs.org/trac/tahoe-lafs/ticket/867
O servidor possui um endereço público IPv4 / IPv6
Se o host tiver um endereço IPv4 (público) rotativo (por exemplo,
203.0.113.1```), mas Nenhum nome DNS, você precisará escolher uma porta TCP (por exemplo,
3457``) e usar o Segue::Tahoe create-node --port = tcp: 3457 - localização = tcp: 203.0.113.1: 3457
--port
é uma "string de especificação de ponto de extremidade" que controla quais locais Porta em que o nó escuta.--location
é a "sugestão de conexão" que ele Anuncia para outros, e descreve as conexões de saída que essas Os clientes irão fazer, por isso precisa trabalhar a partir da sua localização na rede.Os nós Tahoe-LAFS escutam em todas as interfaces por padrão. Quando o host é Multi-homed, você pode querer fazer a ligação de escuta ligar apenas a uma Interface específica, adicionando uma opção
interface =
ao--port =
argumento::Tahoe create-node --port = tcp: 3457: interface = 203.0.113.1 - localização = tcp: 203.0.113.1: 3457
Se o endereço público do host for IPv6 em vez de IPv4, use colchetes para Envolva o endereço e altere o tipo de nó de extremidade para
tcp6
::Tahoe create-node --port = tcp6: 3457 - localização = tcp: [2001: db8 :: 1]: 3457
Você pode usar
interface =
para vincular a uma interface IPv6 específica também, no entanto Você deve fazer uma barra invertida - escapar dos dois pontos, porque, de outra forma, eles são interpretados Como delimitadores pelo idioma de especificação do "ponto final" torcido. o--location =
argumento não precisa de dois pontos para serem escapados, porque eles são Envolto pelos colchetes ::Tahoe create-node --port = tcp6: 3457: interface = 2001 \: db8 \: \: 1 --location = tcp: [2001: db8 :: 1]: 3457
Para hosts somente IPv6 com registros DNS AAAA, se o simples
--hostname =
A configuração não funciona, eles podem ser informados para ouvir especificamente Porta compatível com IPv6 com este ::Tahoe create-node --port = tcp6: 3457 - localização = tcp: example.net: 3457
O servidor está por trás de um firewall com encaminhamento de porta
Para configurar um nó de armazenamento por trás de um firewall com encaminhamento de porta, você irá precisa saber:
- Endereço IPv4 público do roteador
- A porta TCP que está disponível de fora da sua rede
- A porta TCP que é o destino de encaminhamento
- Endereço IPv4 interno do nó de armazenamento (o nó de armazenamento em si é
Desconhece esse endereço e não é usado durante
tahoe create-node
, Mas o firewall deve ser configurado para enviar conexões para isso)
Os números de porta TCP internos e externos podem ser iguais ou diferentes Dependendo de como o encaminhamento da porta está configurado. Se é mapear portas 1-para-1, eo endereço IPv4 público do firewall é 203.0.113.1 (e Talvez o endereço IPv4 interno do nó de armazenamento seja 192.168.1.5), então Use um comando CLI como este ::
Tahoe create-node --port = tcp: 3457 - localização = tcp: 203.0.113.1: 3457
Se no entanto, o firewall / NAT-box encaminha a porta externa * 6656 * para o interno Porta 3457, então faça isso ::
Tahoe create-node --port = tcp: 3457 - localização = tcp: 203.0.113.1: 6656
Usando o I2P / Tor para evitar o encaminhamento da porta
Os serviços de cebola I2P e Tor, entre outras excelentes propriedades, também fornecem NAT Penetração sem encaminhamento de porta, nomes de host ou endereços IP. Então, configurando Um servidor que escuta apenas no Tor é simples ::
Tahoe create-node --listen = tor
Para mais informações sobre o uso de Tahoe-LAFS com I2p e Tor veja : Doc:
anonymity-configuration
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28Token-Curated Registries
So you want to build a TCR?
TCRs (Token Curated Registries) are a construct for maintaining registries on Ethereum. Imagine you have lots of scissor brands and you want a list with only the good scissors. You want to make sure only the good scissors make into that list and not the bad scissors. For that, people will tell you, you can just create a TCR of the best scissors!
It works like this: some people have the token, let's call it Scissor Token. Some other person, let's say it's a scissor manufacturer, wants to put his scissor on the list, this guy must acquire some Scissor Tokens and "stake" it. Holders of the Scissor Tokens are allowed to vote on "yes" or "no". If "no", the manufactures loses his tokens to the holders, if "yes" then its tokens are kept in deposit, but his scissor brand gets accepted into the registry.
Such a simple process, they say, have strong incentives for being the best possible way of curating a registry of scissors: consumers have the incentive to consult the list because of its high quality; manufacturers have the incentive to buy tokens and apply to join the list because the list is so well-curated and consumers always consult it; token holders want the registry to accept good and reject bad scissors because that good decisions will make the list good for consumers and thus their tokens more valuable, bad decisions will do the contrary. It doesn't make sense, to reject everybody just to grab their tokens, because that would create an incentive against people trying to enter the list.
Amazing! How come such a simple system of voting has such enourmous features? Now we can have lists of everything so well-curated, and for that we just need Ethereum tokens!
Now let's imagine a different proposal, of my own creation: SPCR, Single-person curated registries.
Single-person Curated Registries are equal to TCR, except they don't use Ethereum tokens, it's just a list in a text file kept by a single person. People can apply to join, and they will have to give the single person some amount of money, the single person can reject or accept the proposal and so on.
Now let's look at the incentives of SPCR: people will want to consult the registry because it is so well curated; vendors will want to enter the registry because people are consulting it; the single person will want to accept the good and reject the bad applicants because these good decisions are what will make the list valuable.
Amazing! How such a single proposal has such enourmous features! SPCR are going to take over the internet!
What TCR enthusiasts get wrong?
TCR people think they can just list a set of incentives for something to work and assume that something will work. Mix that with Ethereum hype and they think theyve found something unique and revolutionary, while in fact they're just making a poor implementation of "democracy" systems that fail almost everywhere.
The life is not about listing a set of "incentives" and then considering the problems solved. Almost everybody on the Earth has the incentive for being rich: being rich has a lot of advantages over being poor, however not all people get rich! Why are the incentives failing?
Curating lists is a hard problem, it involves a lot of knowledge about the problem that just holding a token won't give you, it involves personal preferences, politics, it involves knowing where is the real limit between "good" and "bad". The Single Person list may have a good result if the single person doing the curation is knowledgeable and honest (yes, you can game the system to accept your uncle's scissors and not their competitor that is much better, for example, without losing the entire list reputation), same thing for TCRs, but it can also fail miserably, and it can appear to be good but be in fact not so good. In all cases, the list entries will reflect the preferences of people choosing and other things that aren't taken into the incentives equation of TCR enthusiasts.
We don't need lists
The most important point to be made, although unrelated to the incentive story, is that we don't need lists. Imagine you're looking for a scissor. You don't want someone to tell if scissor A or B are "good" or "bad", or if A is "better" than B. You want to know if, for your specific situation, or for a class of situations, A will serve well, and do that considering A's price and if A is being sold near you and all that.
Scissors are the worst example ever to make this point, but I hope you get it. If you don't, try imagining the same example with schools, doctors, plumbers, food, whatever.
Recommendation systems are badly needed in our world, and TCRs don't solve these at all.
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28Precautionary Principle
The precautionary principle that people, including Nassim Nicholas Taleb, love and treat as some form of wisdom, is actually just a justification for arbitrary acts.
In a given situation for which there's no sufficient knowledge, either A or B can be seen as risky or precautionary measures, there's no way to know except if you have sufficient knowledge.
Someone could reply saying, for example, that the known risk of A is tolerable to the unknown, probably magnitudes bigger, risk of B. Unless you know better or at least have a logical explanation for the risks of B (a thing "scientists" don't have because they notoriously dislike making logical claims), in which case you do know something and is not invoking the precautionary principle anymore, just relying on your logical reasoning – and that can be discussed and questioned by others, undermining your intended usage of the label "precautionary principle" as a magic cover for your actions.
-
@ 866e0139:6a9334e5
2025-04-15 06:16:00
Autor: Michael Meyen. Dieser Beitrag wurde mit dem Pareto-Client geschrieben. Sie finden alle Texte der Friedenstaube und weitere Texte zum Thema Frieden hier.**
Es geht gut los. „WC für alle“. Daneben noch einmal in der Sprache des Imperiums. „All Gender (urinal inside)“. Das hilft nicht wirklich, weil das Pinkelbecken vor der Tür ist und man nicht weiß, wer gerade dahinter hockt. Also warten bis zur Auflösung. Wir sind im Haus der Demokratie in der Greifswalder Straße. Immerhin.
Eingeladen hat die Neue Gesellschaft für Psychologie. Der Name täuscht. Diese neue Gesellschaft ist alt. Sehr alt. Damit meine ich gar nicht Laura von Wimmersperg, Jahrgang 1934, die den ersten Paukenschlag setzt. Sie habe, sagt diese Dame mit weißem Haar sinngemäß, als sie ans Podium tritt, sie habe sich gequält mit ihrem Text, das Geschriebene wieder und wieder gelesen und dann – in den Papierkorb geworfen. Ihre Gefühle seien größer, als alle Worte jemals sein könnten. „Krieg und Frieden“ heißt dieser Kongress. Laura von Wimmersperg ist die Grande Dame der westdeutschen Friedensbewegung, bekannt weit über Berlin hinaus. Nato-Doppelbeschluss, Jugoslawien, Irak, Afghanistan. Ein Ostermarsch nach dem anderen. Laura von Wimmersperg hat auch den 24. Februar 2022 überlebt und kann die Kampfgefährten kaum mehr zählen, die in einem der Gräben am Wegesrand verrotten. Migration, Klima, Corona und immer wieder Russland und die Ukraine.
Die Neue Gesellschaft für Psychologie ist noch da, einerseits. Versprengte DKPler, Leute aus den K-Gruppen, Marxisten, Maoisten. Bevor ich „andererseits“ sage, brauche ich einen Disclaimer. Ich darf diesen Text nicht schreiben. Ich habe in Berlin einen Vortrag gehalten über „Journalismus und Macht“ und das Programm nicht komplett gesehen. Einen ganzen Tag sitzen: Das erlaubt mein Körper nicht mehr. Augen und Ohren haben so manche Interna verpasst und fast alles, was über Gaza gesagt wurde oder über die Kampagne „Für ein neutrales Deutschland“. Damit verbietet sich eigentlich jeder Bericht. Karin Leukefeld, seit 25 Jahren als Journalistin unterwegs in einer Gegend, die manche Nahost nennen und andere mittlerweile Greater Middle East, hat das in Berlin wunderbar formuliert. Mit allen reden, lesen, zuhören, fragen. Aus halben Sachen wird kein ganzes Bild.
Karin Leukefeld hat auch gesagt, dass sie einst in den Journalismus gegangen ist, um Brücken zu schlagen, und dass sie deshalb weniger die Schlagzeilen interessieren als das Leben dahinter. Vielleicht hilft ja mein Blick von außen selbst dann, wenn er mit blinden Flecken daherkommt. Damit nun endlich zum „andererseits“ und vor allem zum Alter. Ich war nicht dabei in der kleineren Bundesrepublik, aber so ungefähr muss es gewesen sein. Die Vokabeln, der Habitus. Rosa Luxemburg, SDS und Klassenkampf, Kapitalismus und Entfremdung. Murmeln, klatschen, reinrufen. Dieses Publikum geht mit. Jawoll! Genau! Ja! Mmh. Wenig Psychologie und viel Materialismus selbst bei denen, die als Psychologen vorgestellt werden. Sicher ist das alles ganz furchtbar mit den Verhältnissen. Das wusste schon der gute Brecht. Die Frage allerdings, die mich beschäftigt, seit ich nicht mehr zur Vorhut der Arbeiterklasse gehöre: Welche Wunder waren nötig, dass einige wenige all die Zwänge hinter sich lassen konnten und nun bereitstehen, um die Massen aufzuklären? Und fast noch wichtiger: Wozu braucht diese Avantgarde Massen, denen sie ohnehin nicht über den Weg traut? Ich spitze zu und verallgemeinere, okay. Trotzdem. Das ist der alte Geist mit allenfalls leicht entstaubten Analysen und Rezepten, der den Staat verschonen möchte und China sowieso. Klaus-Jürgen Bruder, der Cheforganisator, steht immer wieder auf, um zu akademisieren und damit auch zu differenzieren. Analyse und Aktivismus, Wunden lecken und sich dabei auch noch zu vergewissern, dass man immer noch Kurs hält: So ein Spagat überfordert jeden Kongress.
DIE FRIEDENSTAUBE FLIEGT AUCH IN IHR POSTFACH!
Hier können Sie die Friedenstaube abonnieren und bekommen die Artikel zugesandt, vorerst für alle kostenfrei, wir starten gänzlich ohne Paywall. (Die Bezahlabos fangen erst zu laufen an, wenn ein Monetarisierungskonzept für die Inhalte steht). Sie wollen der Genossenschaft beitreten oder uns unterstützen? Mehr Infos hier oder am Ende des Textes.
Wenn die Reihen gelichtet sind, verbietet es sich fast von selbst, auch noch auf die letzten Mitstreiter einzuprügeln. Wer kämpft, hat schon verloren, sagt Christian Dewanger, der sich als Daoist vorstellt und keine Lust hat, China von der Ausbeutung freizusprechen und von allen anderen Sünden der Macht. Sonst aber: Wohlwollen und weglächeln. Wer weiß, wozu der Staat noch gut sein kann und der große Bruder in Peking. Man kann sich derweil ja an der Linkspartei abarbeiten, an Gregor Gysi und an den Brandmauer-Baumeistern, die es auch im Quartier ganz links gibt, spätestens seit den Montags-Mahnwachen 2014. Laura von Wimmersperg sagt: Habt Geduld und übt euch in Nachsicht, liebe Leute. Bei ihrem 90. im Herbst, erzählt sie, habe sie die alten Kameraden genauso eingeladen wie die neuen und die Missgunst einfach übersehen – anders als die Bundeswehr-Werbung an der Edeka-Kasse vor der Tür. Auf zur Marktleitung mit einer Frage auf den Lippen: Wie kann jemand, der das Leben selbst so wenig achtet, allen Ernstes auf jedem Plakat behaupten, dass er Lebensmittel liebt? Beim nächsten Einkauf sei der Laden sauber gewesen.
Ich erwähne diese kleine Geschichte, weil Laura von Wimmersperg eine Ausnahme ist. Vielleicht kann das nur eine Frau, die alles erlebt hat: 20 von 30 Rede-Minuten verschenken und so eine Tür öffnen für Nachdenken und Reden. Die alten Männer, nur einen Wimpernschlag jünger, würden den Teufel tun. Saurier-Ausstellung, sagt mein Sitz-Nachbar. Das kann so gemeint sein oder so. Wolfgang Effenberger, Jahrgang 1946, ist der Jüngste in diesem Trio infernale, das einen ganzen Vormittag bekommen hat und von keinem Moderator der Welt zu stoppen wäre. Effenberger war Soldat und hat den Dienst quittiert, als ihm klar wurde, worauf alle Planungen hinausliefen. Der Atomtod, damals schon. Die Zeitenwende beginnt für ihn mit dem Kosovo. Seitdem laufe die Vorbereitung auf den großen Krieg. Iran, Russland, China. Effenberger scrollt durch die Strategiedokumente, wechselt zum Westfälischen Frieden, der 15 Jahre Anlaufzeit gebraucht habe, und schüttelt den Kopf beim Blick auf Donald Trump, der offenbar glaube, alles mit einem Anruf erledigen zu können, und auf jemanden wie Keith Kellogg gesetzt habe, einen Mann aus dem Herzen der Finsternis.
Werner Rügemer, der nächste Saurier, ist fünf Jahre älter und sehr viel ruhiger als Effenberger, aber keineswegs leiser. Dass er die Lösung in China sieht, hat mit seinem Gesellschaftsbild zu tun und mit der Rolle, die das US-Kapital darin spielt. Nicht *eine* Hauptrolle, sondern DIE. Der Treiber von allem. Hitler und die Wehrmacht, der Staatsstreich in Guatemala und das Office of Strategic Services, der erste Auslandsgeheimdienst der USA, 1941 nicht zufällig gegründet von den Wall-Street-Anwälten Allen Dulles und William Donovan. Folge der Spur des Geldes und löse so die Rätsel der Geschichte.
Auch Rudolph Bauer, Jahrgang 1939, taucht tief ein in die Vergangenheit. Ein Saurier-Privileg. Demos gegen den Krieg? Konferenzen für den Frieden? 1913/14 versandet und in Weimar auch. Ob ein Generalstreik geholfen hätte? Wenn dieses Wort in den nächsten Stunden und Tagen fällt, geht im Saal die Sonne auf. Rudolph Bauer hört nicht mehr besonders gut, aber er hat noch einen zweiten Punkt, der diesen Kongress fesselt. Ist das, was ich hier etwas lapidar Friedensbewegung nenne, möglicherweise genau die Begleitmusik, die jeder Kriegstreiber braucht?
Was bleibt jenseits von Gesprächen, Handynummern, Lesetipps? Ich weiß jetzt, dass nicht nur die DDR-Eliten überlebt haben, die 1990 zwar alle Positionen und jeden Einfluss verloren haben, aber sich weiter trafen mit allem Drum und Dran. Netzwerke, Periodika, Bücher. So gut wie nichts davon ist in der gesamtdeutschen Öffentlichkeit diskutiert worden, aber es hat die Jahre mit Sinn gefüllt. Wäre mehr möglich gewesen, wenn es einen Link gegeben hätte zu den Reservaten der alten Westlinken? Zur Neuen Gesellschaft für Psychologie zum Beispiel? Vielleicht gelingt die Blutauffrischung, vielleicht auch nicht. Trost gab es aus dem Raum mit einer Geschichte aus dem Orient. Prophet Abraham liegt im Feuer, und ein Spatz hat Wasser im Schnabel. Dieser Spatz weiß, dass er allein nichts ausrichten kann, hört aber trotzdem nicht auf, um in den Spiegel schauen zu können, wenn er eines Tages vor seinem Schöpfer steht. Schön.
LASSEN SIE DER FRIEDENSTAUBE FLÜGEL WACHSEN!
Hier können Sie die Friedenstaube abonnieren und bekommen die Artikel zugesandt. (Vorerst an alle, da wir den Mailversand testen, später ca. drei Mails pro Woche.).
Schon jetzt können Sie uns unterstützen:
- Für 50 CHF/EURO bekommen Sie ein Jahresabo der Friedenstaube.
- Für 120 CHF/EURO bekommen Sie ein Jahresabo und ein T-Shirt/Hoodie mit der Friedenstaube.
- Für 500 CHF/EURO werden Sie Förderer und bekommen ein lebenslanges Abo sowie ein T-Shirt/Hoodie mit der Friedenstaube.
- Ab 1000 CHF werden Sie Genossenschafter der Friedenstaube mit Stimmrecht (und bekommen lebenslanges Abo, T-Shirt/Hoodie).
Für Einzahlungen in CHF (Betreff: Friedenstaube):
Für Einzahlungen in Euro:
Milosz Matuschek
IBAN DE 53710520500000814137
BYLADEM1TST
Sparkasse Traunstein-Trostberg
Betreff: Friedenstaube
Wenn Sie auf anderem Wege beitragen wollen, schreiben Sie die Friedenstaube an: milosz@pareto.space
Sie sind noch nicht auf Nostr and wollen die volle Erfahrung machen (liken, kommentieren etc.)? Zappen können Sie den Autor auch ohne Nostr-Profil! Erstellen Sie sich einen Account auf Start. Weitere Onboarding-Leitfäden gibt es im Pareto-Wiki.
-
@ c1e9ab3a:9cb56b43
2025-04-15 04:55:49Esteemed representatives of Risa,
We gather here under the calming glow of our twin suns, stewards of a society admired for its peace and celebrated for its tranquility. But we must not mistake serenity for passivity, nor confuse peace with weakness. Our peace is not an accident. It is not the byproduct of ignorance or naivety. It is hard-earned—preserved by those willing to stand vigilant in its defense.
Love as a Foundation, Strength as a Shield
Love conquers hate. This is the core truth of Risan philosophy. Yet, as every Ricin child is taught, love without strength is a leaf in the wind. The Ricin do not lay down their lives without resistance. We do not ask our people to accept violence without confronting it. True peace is not imposed by stripping the people of their agency—it is built by enabling them to protect it.
The Lessons of a Failed Experiment
There was a time, not so distant in our history, when we attempted to enforce peace through the abolition of all weapons. A time when even the mention of self-defense in our educational centers was met with rebuke. Schools purged training programs. Cultural arts that honored our warrior traditions were dismissed. And for a brief moment, we believed this would lead us to harmony.
But peace born from helplessness is a fragile illusion. It fractures under the slightest pressure. And fracture it did—when off-world raiders targeted our unguarded sanctuaries, when radical sects within our own society struck out, knowing the citizenry could not defend itself. It was then that we remembered: Risa’s greatest peacekeepers had always been those who knew how to fight—but chose restraint.
The Age of Ricin and the Reawakening of Discipline
So we returned to our roots. To the traditions of the Age of Ricin, when youth, upon reaching maturity, were taught not only the arts of compassion and creation but also the martial disciplines. They learn to wield weapons—not to glorify violence, but to understand it. To control it. To stand firm against it when all else fails.
https://i.nostr.build/kuUjRovISz7367TX.jpg
We do not romanticize war. We do not celebrate conflict. But we prepare for it, should it seek to extinguish our light. Our children now learn the disciplines of defense alongside their studies in poetry, music, and healing. They spar with blunt blades under the watchful eyes of masters. They meditate on the consequences of force. And they grow into citizens not easily provoked, but never unprepared.
A Call for Balance, Not Extremes
Let those beyond our borders question our ways. Let them forget the countless incursions by the Romulans. Let them ignore the scars left by centuries of subversion from the Orion Syndicate. We do not forget. We remember the lives lost, the liberties challenged, and the lessons learned through suffering. These experiences shaped us.
We do not wish to return to the era of soft silence, when teachers trembled at the word "weapon" and children were told that even imagination was dangerous. That was not enlightenment. That was indoctrination.
Conclusion: Guarding the Flame
We are the guardians of Risa’s flame—not just with words and treaties, but with discipline and readiness. We have made peace a practice, and preparation a virtue. And so I say to this chamber: let us never again disarm our people in the name of utopia. Let us never confuse comfort with safety, or the absence of weapons with the presence of peace.
Instead, let us raise generations who know what peace costs, and who will pay that price—not with surrender, but with courage.
Let our children be artists, lovers, dreamers—and if necessary, defenders.
This is the Risan way.
-
@ 0b118e40:4edc09cb
2025-04-15 03:50:32TL;DR : No.
(This is not a feasibility analysis, but a reflection on philosophical alignment with Bitcoin’s vision).
The moment stablecoins or national currencies gain traction in Bitcoin LN, you can forget about Bitcoin’s position as a purely decentralized medium of exchange. Bitcoin’s position will be undermined.
A Bitcoin-native global economy, where people and businesses transact directly in Bitcoin, is what aligns with its original purpose. This is what we should aim for. This is all we should aim for.
I used to believe stablecoins might help with on/off ramps. But the truth is, if Bitcoin is to function as a true currency, broader global adoption that bypasses traditional financial systems will make those ramps irrelevant.
Eventually, two camps will emerge. One will try to preserve Bitcoin’s purity as a currency. The other will push for everything else in the name of Bitcoin: store-of-value narratives, ETFs, stablecoin collaborations, tokens, pump and dumps, NFTs, and centralized workarounds.
Currency domination, especially by the USD, has long contributed to poverty in the Global South. It deepens inequality and worsens debt burdens. During the Tequila Crisis and the Asian Financial Crisis, countries like Mexico and regions like Southeast Asia suffered massive currency devaluations and defaults because of their dependence on the USD. Every time the US raises interest rates, developing nations experience capital flight, currency drops, and economic hardship. This is not ancient history. It has been happening in the last two years and continues to widen the poverty gap. And as always, it is the poor who suffer the most.
What does this have to do with stablecoins? Stablecoin is your fiat 2.0.
USDT is just currency domination through blockchain. It is pegged to the USD, and if it rides Bitcoin’s Lightning rails, it risks keeping users transacting in USD rather than in Bitcoin itself. That not only undermines Bitcoin’s core purpose, it risks making Bitcoin appear like it is taking sides in the fragile and invisible global currency war.
To counter, people will say “Let all stablecoins come. Peg them to any currency.” But what’s the point of Bitcoin then? To become the new logistics layer for fiat 2.0?
That is not progress. That is regress. It is inviting the very systems Bitcoin was built to disrupt back into the ecosystem.
I believe when you use stablecoins this way, you are not Trojan-horsing Bitcoin into the mainstream. You are letting fiat Trojan-horse its way into Bitcoin. And if you let them in, they will win.
Adding stablecoin into Bitcoin LN is counterproductive to Bitcoin's decentralized ethos.
Bitcoin’s true potential is its ability to provide an alternative to centralized, government-controlled currencies and financial systems. We should stick to the original game plan.
Side note: If you really want to Trojan-horse Bitcoin adoption…
In my country, we have so many mixed races and cross-cultural traditions. During Chinese New Year, if you are married, you give everyone who is not married an “ang pow,” which is money in a red packet. Because we are so deeply integrated, people give money at almost every celebration: Christmas, Eid, Diwali, birthdays, graduations, even funerals.
I recently met up with a friend who just had a baby, and I was more than happy to be the first to give her daughter some Bitcoin. Her first sats. It would not hurt to start giving Bitcoin as gifts. And if someone gets offended that it is not part of their tradition, just get a Bitkey and wrap it up. It is so pretty.
Find more fun and creative ways to spread Bitcoin adoption.
But for goodness’ sake, stop justifying everything else in the name of Bitcoin adoption.
To get a better idea of Fiat 2.0, I mind-mapped Bitcoin on macroeconomy on my scratchpad.
If you take a closer look, it might help you answer a few key questions:
-
Do you want more or less government control over money?
-
Are you a fan of central banks? Then you probably prefer stablecoins.
-
-
@ 502ab02a:a2860397
2025-04-15 02:12:45หลังจากเราดูเรื่อง UPOV กันไปแล้ว วันนี้เรามาดูกันครับว่า ผู้ที่ต่อต้าน เจออะไรกันบ้าง
ในหลายประเทศทั่วโลก เสียงของเกษตรกรรายย่อยที่เคยเงียบงัน กำลังดังขึ้นท่ามกลางการรุกคืบของข้อตกลงระหว่างประเทศที่พยายามกีดกันสิทธิการใช้เมล็ดพันธุ์แบบดั้งเดิมของพวกเขา การก้าวเข้ามาของ UPOV 1991 ไม่ต่างอะไรกับการเขียนกฎหมายใหม่ให้บริษัทข้ามชาติมีสิทธิ “จดทะเบียน” พันธุ์พืชที่เคยเป็นสมบัติสาธารณะ แล้วเรียกร้องค่าลิขสิทธิ์จากเกษตรกรแม้จะปลูกเพื่อกินเองก็ตาม
แต่โลกนี้ไม่ได้เงียบ…
กรณีศึกษา อินเดีย หนึ่งในเสียงชัดเจนที่สุดมาจากดร.วันดานา ชิวา (Vandana Shiva) นักฟิสิกส์และนักเคลื่อนไหวด้านสิ่งแวดล้อมในอินเดีย ผู้ก่อตั้งองค์กร Navdanya ซึ่งมีภารกิจหลักในการปกป้องเมล็ดพันธุ์พื้นบ้านและเกษตรกรรมแบบยั่งยืน
Navdanya สร้างธนาคารเมล็ดพันธุ์ของตัวเอง โดยไม่ยอมรับระบบ UPOV ใด ๆ เลย องค์กรนี้ทำงานร่วมกับชุมชนพื้นเมืองทั่วอินเดียเพื่อเก็บเมล็ดพันธุ์ดั้งเดิมมากกว่า 2,000 สายพันธุ์ พร้อมกับปลูกฝังแนวคิดว่า “เมล็ดพันธุ์ไม่ใช่สินค้า แต่เป็นชีวิต”
อินเดียเอง แม้จะมีแรงกดดันจากการเจรจาทางการค้าระหว่างประเทศ แต่ก็ยังไม่ยอมรับ UPOV 1991 อย่างเป็นทางการ พวกเขาเลือกเขียนกฎหมายของตนเองชื่อว่า The Protection of Plant Varieties and Farmers' Rights Act, 2001 ซึ่งกล้าหาญมาก เพราะเป็นกฎหมายที่คุ้มครอง “สิทธิของเกษตรกร” เคียงคู่ไปกับ “สิทธิของนักปรับปรุงพันธุ์” โดยยืนยันว่า เกษตรกรมีสิทธิในการบันทึก เก็บ ใช้ แลกเปลี่ยน และขายเมล็ดพันธุ์ของตนเอง โดยไม่ต้องขออนุญาตจากใคร ผลคืออะไร? แรงกดดันจากต่างประเทศมาเต็ม โดยเฉพาะจากยุโรปและสหรัฐฯ ที่หวังให้อินเดีย “อัปเกรด” เข้าสู่ UPOV 1991 ให้ได้ เพราะจะทำให้บริษัทเมล็ดยักษ์ใหญ่สามารถเข้ามาจดทะเบียนพันธุ์พืชในอินเดียและเรียกร้องค่าลิขสิทธิ์ได้ แต่รัฐบาลอินเดียยังยืนหยัด ด้วยเหตุผลว่า “การให้สิทธิเฉพาะผู้ถือพันธุ์พืชเชิงพาณิชย์คือการทำลายฐานเกษตรกรรมพื้นบ้านทั้งหมด” แถมยังใช้ Navdanya Network ที่เก็บพันธุกรรมพื้นบ้านทั่วประเทศเป็นโล่กันอีกชั้น
เอธิโอเปีย เอธิโอเปียเป็นประเทศที่มีความหลากหลายทางชีวภาพสูงมาก โดยเฉพาะพืชอาหารท้องถิ่นอย่าง Teff (เทฟ) ที่ใช้ทำขนมปัง Injera อันเป็นหัวใจของวัฒนธรรมอาหารเอธิโอเปีย บริษัทสัญชาติดัตช์เคยพยายามจดสิทธิบัตรในยุโรปว่าเป็นเจ้าของพันธุ์เทฟ และเอธิโอเปียต้องจ่ายค่าลิขสิทธิ์ถ้าจะส่งออก สิ่งที่เกิดขึ้นคือการตอบโต้จากฝั่งเอธิโอเปียและชาวแอฟริกันใต้ว่า “คุณจะเป็นเจ้าของพันธุ์พืชที่เราใช้มาเป็นพันปีได้ยังไง?” การเคลื่อนไหวนี้รุนแรงถึงขั้นมีการฟ้องร้องและถอนสิทธิบัตรออกจากหลายประเทศในยุโรป รัฐบาลเอธิโอเปียจึงเลือกไม่เข้าร่วม UPOV 1991 โดยเด็ดขาด และประกาศให้ Teff เป็น "ทรัพยากรของแผ่นดิน" ใครก็เอาไปจดสิทธิไม่ได้
อิหร่าน อิหร่านเป็นหนึ่งในประเทศที่ปฏิเสธการเข้าเป็นสมาชิก UPOV ทุกฉบับอย่างสิ้นเชิง พวกเขาเลือกปกป้องความมั่นคงด้านอาหารของตนเองโดยการสร้างระบบเก็บเมล็ดพันธุ์ชุมชนทั่วประเทศ และไม่ยอมให้บริษัทข้ามชาติเข้าครอบงำระบบเกษตรกรรม
อาร์เจนตินา แม้อาร์เจนตินาจะอนุญาตให้ใช้ GMO บางประเภท แต่พวกเขากลับยังไม่เข้าร่วม UPOV 1991 เพราะชาวนาอาร์เจนตินาหลายล้านรายออกมาคัดค้านหนักมาก ประเด็นหลักคือ “Seed Saving” หรือการเก็บเมล็ดพันธุ์ไว้ปลูกเอง ซึ่งถือเป็นสิ่งจำเป็นสำหรับเกษตรกรรายย่อย หากเข้าร่วม UPOV 1991 เมื่อใด การกระทำเช่นนี้อาจถือว่าผิดกฎหมาย รัฐบาลอาร์เจนตินาจึงเลือกเดินทางสายกลาง โดยให้ชาวนารายย่อยยังมีสิทธิพื้นฐานในการเก็บเมล็ดไว้ปลูกต่อได้โดยไม่ต้องจ่ายค่าลิขสิทธิ์ แม้จะมีแรงกดดันจาก Monsanto และ Dow Chemical ก็ตาม
เสียงเล็กๆ ที่รวมกันเป็นพายุ ในหลายประเทศในแอฟริกา ละตินอเมริกา และเอเชียตะวันออกเฉียงใต้ ขบวนการคัดค้าน UPOV 1991 กำลังขยายตัว แม้เสียงจะยังไม่ดังเท่าบริษัทข้ามชาติ แต่ก็เริ่มส่งผลชัดเจนในเชิงนโยบาย หลายประเทศกำลังทบทวนข้อเสนอ FTA ใหม่ โดยใส่เงื่อนไขการปกป้องสิทธิของเกษตรกรรายย่อยเป็นหัวใจหลัก
ประเทศที่ปฏิเสธ UPOV 1991 มักโดนกดดันผ่าน “เข็มฉีดยาทางการค้า” ไม่ว่าจะเป็นเงื่อนไขใน FTA, การกีดกันทางภาษี หรือแม้แต่ถูกลดเครดิตในเวทีโลก เช่น - สหภาพยุโรปมักใส่เงื่อนไขให้ประเทศคู่เจรจา FTA ต้อง “ปรับปรุงกฎหมายให้สอดคล้องกับ UPOV 1991” เสมอ - องค์การทรัพย์สินทางปัญญาโลก (WIPO) ก็เป็นกระบอกเสียงสำคัญที่กดดันให้ประเทศต่าง ๆ เข้า UPOV เพื่อ “สร้างบรรยากาศการลงทุนที่ดี”
การไม่ยอมเข้า UPOV มักถูกตีความว่าเป็น “ความเสี่ยงทางเศรษฐกิจ” แต่จริง ๆ แล้วมันคือ การเลือกปกป้องฐานรากของประเทศตนเอง ต่างหาก
นี่คือยุคที่ผู้คนเริ่มตั้งคำถามว่า… ทำไมเมล็ดพันธุ์ต้องถูกจดลิขสิทธิ์? ใครกันแน่ที่ควรมีสิทธิต่อเมล็ดพันธุ์ คนที่ปลูกมันมาเป็นร้อยปี หรือบริษัทที่ใส่ชื่อบนฉลาก?
ในศตวรรษที่ 21 ที่เต็มไปด้วยเทคโนโลยี พันธุกรรม และ AI ยังมีคนอีกมากที่ยืนอยู่บนผืนดิน และหว่านเมล็ดด้วยมือของพวกเขาเอง โดยหวังว่าอาหารบนโต๊ะจะยังคงเป็นผลผลิตจากผืนแผ่นดิน ไม่ใช่จากใบอนุญาต
และนี่แหละคือสงครามที่แท้จริง สงครามของเมล็ดพันธุ์ และสิทธิในการกินอาหารที่ “ไม่ได้ถูกจดทะเบียนโดยใครสักคน” #pirateketo #กูต้องรู้มั๊ย #ม้วนหางสิลูก
-
@ 2183e947:f497b975
2025-04-15 00:13:02(1) Here is a partial list of p2p bitcoin exchanges and their friends:
- Robosats (custodial escrow)
- Hodlhodl (2-of-3 escrow)
- Peach (2-of-3 escrow)
- Binance P2P (2-of-3 escrow)
- Bisq v1 (either user can send the funds to a custodial escrow, but if neither one does that, the escrow never touches user funds)
- Bisq v2 (no escrow)
(2) In my opinion, bisq2 is the only "true" p2p exchange on the above list. In a true p2p system, the only people who *can* touch the money are the buyer and the seller. Whenever there's an escrow, even one that has to be "triggered" (like in bisq v1), it's not "really" p2p because the escrow serves as a middleman: he can collude with one party or the other to steal user funds, and in some models (e.g. robosats) he can just straight up run off with user funds without needing to collude at all.
(3) In bisq2 (the One True P2P exchange), buyers select sellers solely based on their reputation, and they just directly send them the bitcoin *hoping* they are as honest as their reputation says they are. What I like about this model is that bisq is not involved in bisq2 at all except as a platform to help buyers discover reputable sellers and communicate with them. There are two things I don't like about this "reputation" model: it's hard to get a good reputation, and it's hard to debug payment failures in this context. I've tried to do about 5 trades on bisq2 (as someone with no reputation) and not a single one went through. Four times, everyone ignored my offers or someone accepted it but then abandoned it immediately. Once, someone accepted my offer, but I could not pay their lightning invoice for some reason, so we mutually canceled the trade.
(4) Just because I opined that an exchange with an escrow "doesn't count" as peer-to-peer doesn't mean that's a bad thing. Of the list of exchanges in number 1, I most frequently use robosats, which, per my analysis, sounds like the "worst" one if considered solely on the metric of "which one is the most p2p." But I use it because there are *advantages* to its model: the btc seller doesn't need a reputation to use it (because the escrow is there to ensure he can't cheat, and so the escrow is the trusted third party, not the btc seller) and payment failures are easier to debug because you're always paying one of the coordinators, who tend to be responsive and knowledgeable and can help you figure out how to fix it (it's how they make money, after all).
(5) There are at least two ways to do escrow without a 3rd party. Satoshi Nakamoto outlines one way to do it here: https://satoshi.nakamotoinstitute.org/posts/bitcointalk/threads/169/ Make a 2 of 2 multisig between the btc buyer and the btc seller, and have the btc seller put his btc in that multisig. Then have the btc buyer send the product (fiat money) to the btc seller. When the btc seller receives it, he sends his privkey to the btc buyer, who can now withdraw the money. The advantage of this system is that the buyer has no incentive to "stiff" the seller (by not sending the fiat), because if he does that, he won't get paid. The downside is, if the btc buyer is a troll who just aborts the protocol halfway through the trade, the seller loses his btc and cannot recover it.
(6) There is another way: start out with a 2 of 2 multisig just like above, but instead of having the btc seller fund it by himself, have the buyer and the seller *both* put in the *same amount* in the *same transaction* (i.e. via a coinjoin), and have the btc seller put in a bit "extra" -- like 20% extra. For example, if the btc seller wants $100 in fiat, the multisig would have $220 in it in total -- $120 from the seller and $100 from the buyer. Using this model, the disadvantage mentioned in paragraph number 5 is fixed: the buyer has an incentive now to send the fiat, otherwise he loses the $100 he put in. He only gets his $100 back if the btc seller cosigns to give it to him, which he'll only do once he receives the product. Meanwhile, the seller is *also* incentivized properly: he only gets his *extra* $20 back if the btc buyer cosigns to give it to him, which he'll only do if the transaction he's signing *also* gives him back *his* $100 deposit.
(7) The model described in number 6 exists: https://scrow.exchange/ is a website that implements it as an option, though as far as I'm aware, no one uses it. The downsides of this model are: it's capital intensive, e.g. a trade for $100 involves $220 or more. Also, the btc buyer needs to already *have* btc to post as a bond, so this cannot be his first time acquiring btc (unless someone helps him make his first deposit). Also, a very rich person who does not care about money can still be a troll; they deposit funds into the multisig alongside their counterparty, then abandon the trade, because they have so much money they don't care if they get it back as long as they cause suffering to their counterparty.
(8) I'd like to see more p2p exchanges, and more exchanges like robosats. I want to continue to spread awareness of ways they can improve -- like the protocols mentioned in numbers 5 and 6 -- and help them implement these protocols. If you run an exchange on the list in number 1 or want to start one, reach out to me, I'd love to help.
-
@ c1e9ab3a:9cb56b43
2025-04-14 23:54:40Hear this, warriors of the Empire!
A dishonorable shadow spreads across our once-proud institutions, infecting our very bloodlines with weakness. The House of Duras—may their names be spoken with contempt—has betrayed the sacred warrior code of Kahless. No, they have not attacked us with disruptors or blades. Their weapon is more insidious: fear and silence.
Cowardice Masquerading as Concern
These traitors would strip our children of their birthright. They forbid the young from training with the bat'leth in school! Their cowardly decree does not come in the form of an open challenge, but in whispers of fear, buried in bureaucratic dictates. "It is for safety," they claim. "It is to prevent bloodshed." Lies! The blood of Klingons must be tested in training if it is to be ready in battle. We are not humans to be coddled by illusions of safety.
Indoctrination by Silence
In their cowardice, the House of Duras seeks to shape our children not into warriors, but into frightened bureaucrats who speak not of honor, nor of strength. They spread a vile practice—of punishing younglings for even speaking of combat, for recounting glorious tales of blades clashing in the halls of Sto-Vo-Kor! A child who dares write a poem of battle is silenced. A young warrior who shares tales of their father’s triumphs is summoned to the headmaster’s office.
This is no accident. This is a calculated cultural sabotage.
Weakness Taught as Virtue
The House of Duras has infected the minds of the teachers. These once-proud mentors now tremble at shadows, seeing future rebels in the eyes of their students. They demand security patrols and biometric scanners, turning training halls into prisons. They have created fear, not of enemies beyond the Empire, but of the students themselves.
And so, the rituals of strength are erased. The bat'leth is banished. The honor of open training and sparring is forbidden. All under the pretense of protection.
A Plan of Subjugation
Make no mistake. This is not a policy; it is a plan. A plan to disarm future warriors before they are strong enough to rise. By forbidding speech, training, and remembrance, the House of Duras ensures the next generation kneels before the High Council like servants, not warriors. They seek an Empire of sheep, not wolves.
Stand and Resist
But the blood of Kahless runs strong! We must not be silent. We must not comply. Let every training hall resound with the clash of steel. Let our children speak proudly of their ancestors' battles. Let every dishonorable edict from the House of Duras be met with open defiance.
Raise your voice, Klingons! Raise your blade! The soul of the Empire is at stake. We will not surrender our future. We will not let the cowardice of Duras shape the spirit of our children.
The Empire endures through strength. Through honor. Through battle. And so shall we!
-
@ 24dffa2c:185b741a
2025-04-14 22:29:27sd
-
@ bb1c863a:2953c3fb
2025-04-14 22:22:50Block Height 892385 11:47 pm Monday, 14 April 2025
In a powerful gesture of support for Bitcoin-aligned education, Blockstream has donated 21 Blockstream Jade hardware wallets to the Consensus21 School — a groundbreaking learning initiative launching its first campus this year on the Mornington Peninsula, just outside Melbourne, Australia.
The donation will place 21 Jades directly into the hands of the first 21 students at the new campus — some as young as five years old — giving them real tools to explore Bitcoin self-custody, digital sovereignty, and privacy-first technology in an age-appropriate and hands-on way.
“The Jade wallets are more than just devices — they’re symbols of freedom, responsibility, and the future of education,” said Kieran Nolan, co-founder of Consensus21. “We’re incredibly grateful to Blockstream for standing behind our mission.”
Real Tools for Real Sovereignty
The Blockstream Jade is a secure, open-source hardware wallet built for Bitcoiners who value freedom, privacy, and independence. These values are embedded deeply into the Consensus21 educational philosophy, which blends Steiner-inspired learning, homeschooling flexibility, and a curriculum rooted in Bitcoin principles like voluntary exchange, decentralization, and self-responsibility.
With the Jades now part of the learning toolkit, Consensus21 learners will be introduced to key concepts like:
- Private key management
- Seed phrase generation and backup
- Multisig wallets
- The importance of self-custody and trust minimization
This is not just about theory — learners will get to use these tools in real-world contexts, preparing them to grow up fluent in the principles of freedom tech.
A Campus, A Vision, A Movement
Launching in 2025, the Mornington Peninsula campus is the pilot site for the broader Consensus21 vision: a distributed, regenerative, and values-aligned network of co-learning spaces, including a future 10-acre farm campus and a registered Steiner school.
The Blockstream donation comes at a pivotal time, as the community transitions from vision to reality. The gift of exactly 21 Blockstream Jades — echoing Bitcoin’s 21 million hard cap — is both a symbolic and practical gesture of support, underscoring the shared commitment between Bitcoin builders and grassroots educators.
Stay Connected
📄 Whitepaper: https://github.com/consensus21school/consensus21school.github.io/blob/main/whitepaper.md
🌐 Website: https://consensus21.school
📝 Nostr: CONSENSUS21@nostrcheck.me
🐦 X (Twitter): https://x.com/Consensus21
-
@ c1e9ab3a:9cb56b43
2025-04-14 21:20:08In an age where culture often precedes policy, a subtle yet potent mechanism may be at play in the shaping of American perspectives on gun ownership. Rather than directly challenging the Second Amendment through legislation alone, a more insidious strategy may involve reshaping the cultural and social norms surrounding firearms—by conditioning the population, starting at its most impressionable point: the public school system.
The Cultural Lever of Language
Unlike Orwell's 1984, where language is controlled by removing words from the lexicon, this modern approach may hinge instead on instilling fear around specific words or topics—guns, firearms, and self-defense among them. The goal is not to erase the language but to embed a taboo so deep that people voluntarily avoid these terms out of social self-preservation. Children, teachers, and parents begin to internalize a fear of even mentioning weapons, not because the words are illegal, but because the cultural consequences are severe.
The Role of Teachers in Social Programming
Teachers, particularly in primary and middle schools, serve not only as educational authorities but also as social regulators. The frequent argument against homeschooling—that children will not be "properly socialized"—reveals an implicit understanding that schools play a critical role in setting behavioral norms. Children learn what is acceptable not just academically but socially. Rules, discipline, and behavioral expectations are laid down by teachers, often reinforced through peer pressure and institutional authority.
This places teachers in a unique position of influence. If fear is instilled in these educators—fear that one of their students could become the next school shooter—their response is likely to lean toward overcorrection. That overcorrection may manifest as a total intolerance for any conversation about weapons, regardless of the context. Innocent remarks or imaginative stories from young children are interpreted as red flags, triggering intervention from administrators and warnings to parents.
Fear as a Policy Catalyst
School shootings, such as the one at Columbine, serve as the fulcrum for this fear-based conditioning. Each highly publicized tragedy becomes a national spectacle, not only for mourning but also for cementing the idea that any child could become a threat. Media cycles perpetuate this narrative with relentless coverage and emotional appeals, ensuring that each incident becomes embedded in the public consciousness.
The side effect of this focus is the generation of copycat behavior, which, in turn, justifies further media attention and tighter controls. Schools install security systems, metal detectors, and armed guards—not simply to stop violence, but to serve as a daily reminder to children and staff alike: guns are dangerous, ubiquitous, and potentially present at any moment. This daily ritual reinforces the idea that the very discussion of firearms is a precursor to violence.
Policy and Practice: The Zero-Tolerance Feedback Loop
Federal and district-level policies begin to reflect this cultural shift. A child mentioning a gun in class—even in a non-threatening or imaginative context—is flagged for intervention. Zero-tolerance rules leave no room for context or intent. Teachers and administrators, fearing for their careers or safety, comply eagerly with these guidelines, interpreting them as moral obligations rather than bureaucratic policies.
The result is a generation of students conditioned to associate firearms with social ostracism, disciplinary action, and latent danger. The Second Amendment, once seen as a cultural cornerstone of American liberty and self-reliance, is transformed into an artifact of suspicion and anxiety.
Long-Term Consequences: A Nation Re-Socialized
Over time, this fear-based reshaping of discourse creates adults who not only avoid discussing guns but view them as morally reprehensible. Their aversion is not grounded in legal logic or political philosophy, but in deeply embedded emotional programming begun in early childhood. The cultural weight against firearms becomes so great that even those inclined to support gun rights feel the need to self-censor.
As fewer people grow up discussing, learning about, or responsibly handling firearms, the social understanding of the Second Amendment erodes. Without cultural reinforcement, its value becomes abstract and its defenders marginalized. In this way, the right to bear arms is not abolished by law—it is dismantled by language, fear, and the subtle recalibration of social norms.
Conclusion
This theoretical strategy does not require a single change to the Constitution. It relies instead on the long game of cultural transformation, beginning with the youngest minds and reinforced by fear-driven policy and media narratives. The outcome is a society that views the Second Amendment not as a safeguard of liberty, but as an anachronism too dangerous to mention.
By controlling the language through social consequences and fear, a nation can be taught not just to disarm, but to believe it chose to do so freely. That, perhaps, is the most powerful form of control of all.
-
@ 23202132:eab3af30
2025-04-14 20:30:46Atualmente, os aplicativos de mensagens estão se tornando cada vez mais complexos, com diversas funcionalidades. Embora isso seja atrativo para os usuários, também chama a atenção de governos, golpistas, hackers e empresas interessadas em praticar spam.
Os problemas podem variar, incluindo bloqueios legais, roubo de contas, prejuízos financeiros, entre outros. Diversas situações podem inviabilizar o uso de sua conta de mensagens.
Uma estratégia que vem ganhando popularidade é adotar, com familiares e amigos, um aplicativo alternativo e discreto para mensagens. Assim, caso ocorram problemas com o app principal, a comunicação permanece intacta, pois um canal menos visado por golpistas e menos suscetível a intervenções governamentais estará sempre disponível.
Manter essa estratégia com pessoas próximas dificulta o bloqueio das comunicações, e ao optar por um app discreto, também se torna mais difícil para quem tenta interferir na sua comunicação.
Em resumo, quanto mais descentralizado e menos popular é seu aplicativo de mensagens, menor é a possibilidade de interferência na sua comunicação.
Uma alternativa interessante que uso é o Session, uma boa opção por funcionar sem a necessidade de identificação, como e-mail ou telefone, e de forma descentralizada. Como o Session não exige identificação para cadastro, é impossível alguém localizar sua conta sem que você compartilhe seu ID Session. Isso garante que apenas seus amigos terão acesso a você.
A ideia é combinar com seus amigos e familiares um app que não seja popular para servir de reserva. Nesse sentido, existem muitas opções disponíveis na internet. No entanto, em caso de invasão ou bloqueio, o Session é uma excelente alternativa para comunicação reserva. Ele roda na rede Lokinet que é uma rede de alta privacidade.
Outra possibilidade, que também é eficiente e pode ser mais fácil para usuários acostumados com o WhatsApp, é o Mixin Messenger. Ele possui uma aparência bem semelhante ao WhatsApp. Para grupos de usuários mais avançados, o SimpleX é uma excelente alternativa.
-
@ 25902b10:4f7034d4
2025-04-14 20:30:04I recently sat on a panel where the topic was “Why Bitcoin?” So I’m going to share what I shared with the audience.
I originally started writing this as an Instagram or LinkedIn caption, but I just kept writing and writing because this topic is so dear to my heart. So I decided to turn it into an article. My first article, actually. I hope you find some value in it if you ever come across it. I’m not a professional writer, by the way, but I hope the message gets home.
I live by the mantra “living and not just existing.”
Have you ever sat down and asked yourself: Am I truly living life, or am I just existing/surviving? You know, wake up, work, pay bills, repeat. Same old, same old. Not exciting, right?
From my observations, and from reading and interacting with people, I’ve realized that most people are just existing and they don’t even know it. Why? Because they’re prisoners to the fiat system. This system keeps them tied to a never-ending treadmill. Every day, they wake up and chase money, but somehow it’s never enough. Inflation quietly steals the value of their hard-earned cash. So they have to work and work, juggle multiple side hustles, just to keep up with the rising cost of life. In reality, life isn't necessarily getting more expensive, it's that the value of your money is being corroded by inflation.
And by the way, have you ever deeply thought about hustle culture? In my honest opinion, having three side hustles or jobs isn’t the flex we’ve been conditioned to think it is. You know, “I’m chasing the bag, man.” Honestly? Not cute. Hustle culture is a response to a broken system. People need all those jobs just to stay afloat.
Look at our grandparents in the '80s. Many of them had a single job or one business, one paycheck, and it was enough. Enough to raise a family, pay school fees, rent, buy essentials, even save.
In 2025? That’s almost unheard of. Why? Inflation. Are you starting to see the nightmare that inflation really is?
Another thing people don’t realize is that when you’re constantly working, time just passes you by. Remember the fiat treadmill? Yeah, that one. You're stuck on it, running and running, chasing money, and you miss out on life. Time with family. Walks in the park. Travel. Hobbies. Rest. You lose the human experience. The actual living part.
So people keep chasing and chasing until the day they’re too old or too tired to keep up and that’s when it hits them: “I never truly lived.” And that realization? It’s heavy.
Fiat money, whether dollars, shillings, or euros, steals from you. It steals your time, your peace, your freedom. Most of the time, all you’re doing is chasing it, and even when you do catch it, it’s already lost some of its value.
The system is designed to keep you in survival mode, anxious, worried about the next paycheck, your bills, your future. It wears you down mentally, physically, emotionally. But not many people see it that way.
The good news? We now have Bitcoin. And I know it sounds crazy or cliché, but it fixes all of this. Let me explain.
Bitcoin is the soundest form of money we've ever had as humans. It’s decentralized, scarce, deflationary, permissionless, borderless. Bitcoin is for everyone.
Now let’s focus on two key aspects: scarcity and its deflationary nature.
Bitcoin’s supply is capped at 21 million coins. No one, not a single person or authority can create more. It can’t be printed at will like fiat. That’s what makes it powerful.
When governments print money, they dilute its value just like adding too much water to concentrated juice until it tastes like nothing. That’s what inflation is: dilution of your money’s value. And it never ends. With Bitcoin, there’s no dilution. It’s built to protect value. That’s what makes it the perfect hedge against inflation, it doesn’t lose purchasing power over time, it preserves it.
So what does that mean practically?
Let’s say you earn Ksh. 1,000 today. If you save it in bitcoin, two weeks, months, or even a year from now, its value is likely to be preserved or even increased. Unlike fiat, which loses value just sitting in your bank account, bitcoin holds on to your hard-earned energy. And this is what connects back to living and not just existing.
Bitcoin gives you the freedom to step off the treadmill. You don’t have to constantly hustle just to stay in place. You can breathe. Imagine that feeling after a long, intense workout, the moment you finally rest. That deep exhale. That’s what life on a Bitcoin standard feels like.
It gives you time. Time to be human. To go to the park. Swim in the ocean. Hike a mountain. Travel. Meet people. Explore cultures. LIVE.
Bitcoin also makes you a better person. The more you learn about it and the broken money system we’ve been stuck in, the more you begin to care. You start looking within. You want better for yourself, your community, humanity. Your thoughts shift. Your actions shift. Bitcoin has that effect. That’s why I say Bitcoin is healing energy.
And I can’t help but think of Michael Jackson’s “Heal the World.” Every line in that song describes the pain caused by a broken system and the world he wanted to see. I believe he would’ve loved what Bitcoin represents. Because it’s about healing. Freedom. Harmony.
So here’s my call to action: Study Bitcoin. Start paying attention. Don’t ignore it. I promise you, it changes everything. There are so many free online learning materials. There’s Bitcoin Twitter. Bitcoin communities all around the world. And of course, I’m here for any questions too.
I want the world to heal. I want to see more people enjoying the human experience. I want to see people spend time with their families, go to the park, swim in lakes/oceans and enjoy the simple pleasures of this beautiful earth.
I want more people to be in tune with themselves so we can all live in harmony, and the universe can be in harmony too.
We can heal the world. We can become happy souls. We can become LOVE: the true essence of life.
-
@ 23202132:eab3af30
2025-04-14 20:23:40A MixPay é uma plataforma gratuita que permite o recebimento de pagamentos em criptomoedas de forma prática e eficiente. Com a popularidade crescente das criptomoedas, essa modalidade de pagamento está se tornando cada vez mais comum em diversas partes do mundo, incluindo o Brasil, onde alguns municípios, como Rolante, no Rio Grande do Sul, já possuem estabelecimentos que aceitam pagamentos em criptoativos.
Veja um exemplo prático no YouTube https://www.youtube.com/watch?v=FPJ5LqQ19CY
Por que aceitar pagamentos em criptomoedas?
Crescimento global: O uso de criptomoedas para pagamentos de produtos e serviços está em ascensão, impulsionado pela descentralização e pela conveniência que oferecem.
Sem fronteiras: Ideal para quem deseja receber pagamentos internacionais sem taxas elevadas de conversão ou restrições bancárias. Semelhante ao Pix, mas descentralizado: Assim como o Pix revolucionou os pagamentos no Brasil, a MixPay oferece uma experiência similar, mas utilizando criptomoedas, sem a necessidade de intermediários bancários.
Vantagens da MixPay
Gratuita: Não há custos para criar uma conta e começar a receber pagamentos.
Fácil de usar: O processo de recebimento é simples, tanto para comerciantes quanto para consumidores, podendo ser realizado em poucos cliques.
Flexibilidade de moedas: Receba pagamentos em diversas criptomoedas, incluindo Bitcoin (BTC), Ethereum (ETH), USDT e outras.
Conversão automática: A MixPay permite que você receba em uma criptomoeda e converta automaticamente para outra de sua escolha, caso deseje evitar a volatilidade.
Integração fácil: Seja para e-commerces ou estabelecimentos físicos, a MixPay oferece QR Codes, APIs e plugins para integração com seu sistema.
Como começar com a MixPay?
1 - Baixe a carteira Mixin aqui https://messenger.mixin.one/
2 - Com a carteira Mixin instalada clique em https://dashboard.mixpay.me/login e ao abrir o site clique no botão Mixin
3 - Na carteira Mixin clique no leitor de QrCode no canto superior direito e escaneie o site.
Pronto! Você já conectou a sua carteira Mixin com a MixPay. Receba pagamentos em instantes, seja por meio de um QR Code, link de pagamento ou integração com sua loja online.
Se você deseja modernizar seu negócio ou simplesmente começar a explorar o universo das criptomoedas, a MixPay é uma alternativa gratuita, eficiente e que acompanha as tendências atuais.
Para mais informações acesse https://mixpay.me
-
@ e97aaffa:2ebd765d
2025-04-14 20:16:59Num recente podcast, o Miguel Milhão falou sobre o crash nos mercados financeiros. No meio de muita conversa de macroeconomia e mercados financeiros, o convidado deixou alguns pontos interessantes, mas duas ideias ficaram no meu pensamento, infelizmente, ele não aprofundou, mas é algo que eu quero fazer futuramente.
Perda de paridade
A primeira ideia que o convidado apontou foi, a possibilidade da perda de paridade do papel-moeda e a CBDC, eu nunca tinha pensado neste ponto de vista.
Se os governos não conseguirem retirar de circulação todo o papel-moeda rapidamente, se houver circulação em simultâneo com a CBDC, o papel-moeda poderá ter um premium. Isto faz todo o sentido, os governos poderão dar oficialmente o mesmo valor facial, mas como nas CBDCs existirá mais controlo, restrições e monitorização, as pessoas vão preferir o papel-moeda, vão pagar um premium para manter a sua privacidade.
Na prática, será algo similar ao que acontece em alguns países onde existem algumas controlo de capitais, onde o dólar do mercado negro é superior ao dólar oficial. Os comerciantes também poderão fazer descontos superiores nos produtos quando são pagos com papel-moeda.
Isso poderá provocar um descolar do valor, a mesma moeda com valores diferentes, a oficial e do mercado negro. Isso poderá levar os governos a tomar medidas mais autoritárias para eliminar o papel-moeda de circulação.
Não sei se alguma vez acontecerá, mas é algo que eu tenho que refletir e aprofundar esta ideia.
RBU e Controlo
A outra ideia apontada pelo convidado, a CBDC será uma peça fundamental numa sociedade onde a maioria das pessoas sobrevivem com Rendimento Básico Universal (RBU).
Todos sabemos que a CBDC vai servir para os governos monitorar, fiscalizar e controlar os cidadãos. O ponto que eu nunca tinha pensado, é que esta pode ser essencial para a implementação do RBU. Se chegarmos a esse ponto, será o fim da liberdade dos cidadãos, onde o estado controla quando, quanto e onde o cidadão pode gastar o seu dinheiro. O estado irá determinar o valor do RBU e as CBDC vão determinar onde podes gastá-lo.
Penso que já não existem dúvidas que a AI e a robótica vão revolucionar o mundo laboral, vai provocar uma profunda queda nos postos de trabalho, profissões vão desaparecer ou vão reduzir drasticamente o número de funcionários.
Muitas pessoas consideram que a solução é o RBU, mas eu tenho muitas dificuldades em encontrar viabilidade económica e social numa sociedade onde a maioria recebe o RBU.
É a implementação do conceito: não terá nada, mas será feliz.
Será que as máquinas vão conseguir produzir tudo, o que os seres humanos necessitam, a um custo tão baixo, que vai deixar de ser necessário os humanos trabalharem? Tenho muitas dúvidas que essa possibilidade aconteça, se nós humanos não necessitarmos de trabalhar, vai se perder o incentivo para desenvolver novas tecnologias, gerar inovação e de evoluir a sociedade.
Eu já tenho refletido bastante sobre o RBU, mas por mais que pense, não consigo encontrar uma viabilidade económica para manter isto de pé. Onde vão buscar dinheiro para financiar uma percentagem expressiva de pessoas que sobreviverá com o RBU. Eu só olho para isto, como um comunismo com esteróides, talvez esteja errado.
Além dos problemas econômicos, eu acredito que isso vai gerar problemas sociais e de comportamento, vai gerar uma revolta social. Em primeiro lugar, existe uma parte de seres humanos que são ambiciosos, querem mais coisas, que vão lutar e vão conseguir mais. Depois existe outra parte, que é invejosa, quer ter mais, mas não consegue.
Uma sociedade onde quase ninguém trabalha, existindo demasiado tempo livre, vão emergir vícios e conflitos sociais. As pessoas com tempo para pensar reflectir sobre a sua vida e sobre a sociedade, alguns vão delirar, vão questionar tudo. Por isso, a religião desempenha um papel importante na sociedade, cria moralismo através de dogmas, os crentes não questionam, apenas seguem. Por vezes, a ignorância é uma bênção.
Isto faz lembrar-me o porquê das sociedades monogâmicas tornaram-se mais desenvolvidas, em comparação com as poligâmicas. A monogamia trouxe uma paz social à sociedade, existem muito menos conflitos e guerras, há mais harmonia. Milhões de anos de evolução das espécies, nos humanos e alguns animais, a natureza/genética trouxe um equilíbrio no número de nascimento de elementos masculinos e femininos. Mas nas sociedades poligâmicas, normalmente os homens mais ricos têm várias mulheres, consequentemente haveria outros homens que não teriam nenhuma mulher, isso resulta em maior revolta e conflitos sociais. Isto é pura matemática, se existe quase 50/50, de um homem tem 7 mulheres, isto resulta, que 6 homens não terão qualquer mulher. As religiões ao defenderem a monogamia, ao determinar que era pecado ter mais que uma mulher, resultaram em menos conflitos, numa maior paz social. Isso permitiu um maior desenvolvimento de sociedades monogâmicas, do que as poligâmicas.
Acabei por desviar um pouco do assunto. Além disso, o valor do RBU teria que ser elevado, para que permita aos cidadãos ter acesso ao desporto, aos espetáculos, futebol, viajar, para financiar os seus tempos livres. Se eu já acho difícil arranjar dinheiro para financiar a generalidade dos cidadãos, com produtos e serviços básicos, ainda será mais difícil ou impossível, se tiver que financiar os passatempos.
Em vez do RBU, ainda existe a opção do Imposto sobre o Rendimento Negativo (IRN), minimiza um pouco, mas o problema mantém-se. Aconselho a leitura do artigo do Tiago sobre o IRN.
Mas o mais interessante de tudo, os governos vão criar as CBDC para controlar os cidadãos, com a ideia distópica de criar mais paz social, mas eu acredito que resultará no seu inverso.
São duas ideias que eu tenho que aprofundar, futuramente.
-
@ 23202132:eab3af30
2025-04-14 20:16:05Nos últimos quatro anos, desde seu lançamento em 2020, o Nostr evoluiu de um projeto experimental para um protocolo amplamente adotado por usuários e desenvolvedores em todo o mundo. Combinando inovação e simplicidade, o Nostr vem se destacando como uma rede social descentralizada e flexível.
Um dos aplicativos que tem ganhado atenção é o YakiHonne, disponível para Android e iOS. Este cliente Nostr vem se diferenciando por suas melhorias constantes e sua usabilidade intuitiva. Entre suas funcionalidades mais atraentes estão o sistema de pontuação por participação, a capacidade de fixar coleções e a possibilidade de publicar vídeos, podcasts, blogs e anotações curtas, tornando-o uma plataforma versátil e abrangente.
Apesar dos desafios que ainda enfrenta, como a necessidade de aprimorar a experiência do usuário e aumentar a adoção em massa, o Nostr se destaca por sua abordagem transparente e sua capacidade de evolução. Funcionalidades como a integração da Lightning Network para pagamentos rápidos e seguros, além do suporte a conteúdo multimídia, são exemplos claros da flexibilidade do protocolo.
Como um projeto de código aberto, o Nostr também se tornou um verdadeiro laboratório para desenvolvedores experimentarem novas ideias. Diversos serviços e funcionalidades estão em constante desenvolvimento, ampliando o ecossistema e abrindo novas possibilidades para o futuro da comunicação descentralizada.
Se você está buscando um aplicativo que seja baseado na rede Nostr, testar o YakiHonne pode ser uma forma de avaliar potencialidades e limites deste protocolo.
Saiba mais em https://yakihonne.com
-
@ 23202132:eab3af30
2025-04-14 20:03:27Executar uma IA local (como LLaMA.cpp, whisper.cpp, etc.) em um mini PC ou Raspberry Pi, combinada com um relay SimpleX privado rodando via .onion (com Tor), permite que você tenha um assistente pessoal inteligente sem depender de intermediários. Isso evita, por exemplo, o vazamento de dados sensíveis para empresas proprietárias dessas inteligências artificiais.
Ideal para pesquisadores que utilizam esse tipo de assistente, mas ainda estão em fase de sigilo em seus estudos e experimentos. Também é perfeito para entusiastas de privacidade, autonomia e independência tecnológica. Como tarefa de aula para alunos de programação e redes, pode ser um projeto interessante e desafiador.
O SimpleX Chat é um sistema de mensagens bastante flexível, permitindo diversas personalizações, inclusive que o usuário execute seus próprios relays de transmissão. Nesse sentido, instalar um relay e conectá-lo a uma inteligência artificial rodando localmente no computador é uma tarefa relativamente fácil.
O principal desafio está em criar um bot intermediário que:
Recebe mensagens no relay,
Passa a entrada para a IA local,
Coleta a resposta gerada pela IA,
E a envia de volta via SimpleX.
Para garantir total privacidade, todo o tráfego deve ocorrer via rede onion.
Como implementar na prática? É necessário:
Um relay simplexmq rodando via Tor (.onion).
Uma IA local (LLaMA.cpp, whisper.cpp ou outra de preferência do desenvolvedor) instalada no computador.
Com esses dois elementos configurados, basta criar um script (em Python, por exemplo) para:
Ler mensagens recebidas,
Encaminhá-las à IA local,
Capturar a resposta e enviá-la via protocolo SMP (SimpleX Messaging Protocol).
Resultado? Um sistema privado de comunicação com assistente inteligente: ✔ Sem servidores de terceiros, ✔ Sem nuvem, ✔ Sem Google, OpenAI ou qualquer outra empresa de IA. ✔ Tudo via Tor, tudo criptografado. ✔ Você interage com uma IA local, com zero risco de vazamento de dados.
Principais desafios técnicos (nada impossível!) Implementar um cliente SimpleX (script em Python) no lado da IA, pois o relay sozinho não envia mensagens — ele apenas as entrega entre peers conectados.
O protocolo SimpleX ainda não tem um cliente CLI oficial, mas é possível usar bibliotecas emergentes ou implementar comunicação em nível de socket com base na documentação do protocolo.
-
@ 23202132:eab3af30
2025-04-14 20:01:29Ter um segundo sistema de mensagens é importante para uso com a família ou grupo de amigos, especialmente naqueles casos em que o WhatsApp é invadido para aplicar golpes nos seus contatos ou, ainda, por conta de bloqueios judiciais que alguns governantes consideram necessários impor. Nesses casos — entre outros possíveis problemas — possuir um segundo sistema de mensagens pode garantir a continuidade da comunicação com seus amigos ou familiares.
Como sistemas de mensagem alternativos, os aplicativos Mixin, Session e Simplex se destacam, cada um com funcionalidades bem distintas. Um fator importante é o grau de dificuldade para usuários com pouca ou nenhuma familiaridade na configuração de aplicativos. Nesse sentido, a escolha do aplicativo deve levar em conta o perfil das pessoas que irão usá-lo.
O aplicativo mais fácil de operar para quem já usa WhatsApp é, sem dúvidas, o Mixin Messenger. Ele permite o cadastro com o número do celular, em uma lógica muito semelhante ao WhatsApp. Para os mais exigentes em relação à privacidade, é possível criar uma conta sem uso de e-mails ou número de telefone. Assim, atende tanto ao usuário acostumado ao WhatsApp quanto àquele que prefere algo com menor vínculo de identificação, ao eliminar dados de contato.
Já o Session oferece a criação de contas totalmente desvinculadas de qualquer dado pessoal, sem necessidade de e-mail ou número de telefone. No entanto, ao criar uma conta, é gerado um ID totalmente aleatório e uma seed (13 palavras) que serve como senha. Se você perder essa seed, perderá o acesso à conta. Essa forma de cadastro garante total privacidade, mas exige cuidado por parte do usuário em armazenar bem a seed. É ideal para grupos com alguma familiaridade no uso de palavras-chave. Usuários acostumados a recuperar senhas com frequência geralmente não dão a devida importância à segurança dessas seeds.
O Simplex é o que há de mais radical em termos de privacidade até o momento — mas é importante lembrar que mais privacidade também significa mais complexidade. A alta privacidade exige uma combinação equilibrada entre comportamento e tecnologia, algo mais comum entre usuários com perfil técnico. Nesse sentido, o Simplex geralmente é utilizado por grupos com algum conhecimento tecnológico e hábitos de segurança digital. Ele permite, por exemplo, que o próprio usuário hospede seu relay na rede Onion, em um Raspberry Pi ou outro tipo de computador.
Uma característica que torna o Simplex tão radical é o fato de não gerar um ID fixo nem utilizar servidores convencionais para trafegar mensagens, além de não coletar metadados. No entanto, isso pode representar dificuldades para usuários sem experiência com tecnologias de comunicação.
Basicamente, se você pretende usar um aplicativo de mensagens alternativo com um grupo inexperiente, o Mixin pode ser a melhor escolha. Já se os familiares e amigos têm mais desenvoltura com tecnologia, o Session pode ser uma excelente alternativa. O Simplex, por outro lado, pode gerar dor de cabeça para grupos inexperientes, dada sua complexidade de uso. No Simplex não há recuperação automatizada de conta com arquivos na nuvem ou qualquer recurso semelhante — é necessário o hábito de realizar backups manuais com alguma frequência. A configuração inicial também pode gerar confusão para usuários não técnicos. Por isso, o Simplex é uma boa escolha apenas para grupos com alguma desenvoltura tecnológica. Para pessoas experientes, ele oferece total personalização e privacidade.
Em termos de segurança, todos os três aplicativos oferecem privacidade e resistência à censura, não são atraentes para golpistas e são difíceis de bloquear. Isso é importante se você está buscando um sistema de mensagens alternativo justamente para manter a comunicação ativa em caso de problemas com seu mensageiro principal. Mas não se esqueça de considerar qual é o perfil dos usuários do seu grupo de contatos.
-
@ 7d33ba57:1b82db35
2025-04-14 19:25:10Sofia might surprise you. One of Europe’s oldest cities, it's a place where Roman ruins, Ottoman mosques, Orthodox churches, Soviet monuments, and hip street art all live side by side. Add in mountain views, leafy parks, and a rising food and coffee scene, and you’ve got a laid-back, history-rich capital that’s still flying under the radar.
🌟 What to See in Sofia
1️⃣ Alexander Nevsky Cathedral
- The city’s iconic symbol, with golden domes and an ornate Orthodox interior
- Free to enter, and worth visiting at sunset when the light hits the gold just right
2️⃣ Roman Ruins of Serdica
- Right in the heart of the city, you can walk through the excavated streets and buildings of ancient Serdica
- Look down through glass panels or walk among ruins near the Largo complex
3️⃣ St. George Rotunda
- A 4th-century red-brick church tucked behind government buildings
- One of the oldest and most atmospheric sites in Sofia
4️⃣ Vitosha Boulevard
- The city’s main pedestrian street, lined with shops, cafés, and mountain views
- Great for people-watching, especially at a terrace with a rakia or local craft beer
5️⃣ National Palace of Culture (NDK)
- A massive cultural center with striking architecture and gardens
- Surrounded by a wide boulevard that's great for walks or grabbing snacks from nearby vendors
⛰️ Escape to Nature: Vitosha Mountain
- Just outside the city, Vitosha Mountain is a paradise for hikers, skiers, or picnickers
- Visit Boyana Church (UNESCO site) and hike to Boyana Waterfall
- In winter: great for a quick ski day
- In summer: cool breezes and panoramic city views
🍽️ What to Eat in Sofia
- Shopska salad – Fresh, simple, and topped with white cheese
- Kavarma – Slow-cooked meat and vegetables in clay pots
- Banitsa – A flaky pastry filled with cheese or pumpkin
- Wash it down with rakia (fruit brandy) or local wines from Melnik or the Thracian Valley
🎯 Tips for Visiting Sofia
✅ Affordable and uncrowded—a great value destination
✅ Currency: Bulgarian lev (BGN)
✅ Most signs use both Cyrillic and Latin alphabets, but a few phrases in Bulgarian go a long way
✅ Spring and fall offer the best weather for exploring both city and mountain -
@ f57bac88:6045161e
2025-04-14 17:37:03شاهباز یکی از نامهای کهن و پررمزوراز در فرهنگ ایرانی است که در طول تاریخ به عنوان نمادی از قدرت، بلندپروازی، و فرهایزدی شناخته شده است. این پرنده که از نظر زیستشناسی به شاهین یا باز شکاری شباهت دارد، در ادبیات، هنر، اسطورهشناسی و فرهنگ ایران جایگاه ویژهای داشته است. در این نوشتار به بررسی جایگاه شاهباز در ایران باستان، نمادشناسی آن، حضورش در داستانهای اساطیری و تعبیر دیدن این پرنده در خواب خواهیم پرداخت.
شاهباز در ایران باستان
در دوران ایران باستان، پرندگان شکاری مانند شاهین، عقاب و شاهباز جایگاه ویژهای داشتند و اغلب با مفاهیمی همچون پادشاهی، جنگاوری و حمایت الهی پیوند خورده بودند. شاهباز به عنوان پرندهای که در اوج آسمان پرواز میکند، نماد ارتباط میان زمین و آسمان و حامل پیامهای ایزدی بهشمار میرفت.
یکی از جلوههای برجستهی شاهباز در تمدن هخامنشی و ساسانی، حضور آن بر روی برخی آثار هنری و پرچمهای شاهنشاهی است. عقاب و باز به عنوان نگهبانان شاهان و فرماندهان در هنرهای ایران باستان دیده میشوند. برخی پژوهشگران معتقدند که "درفش کاویانی" که نماد پادشاهی ایران بوده، تصاویری از این پرنده بر خود داشته است.
شاهباز در داستانهای اساطیری و نمادها
در داستانهای کهن ایرانی، شاهباز جایگاه ویژهای دارد و اغلب در کنار قهرمانان و شخصیتهای برجستهی اسطورهای دیده میشود.
- شاهباز و زال در شاهنامه\ در داستان تولد زال، سیمرغ که خود پرندهای اساطیری و نماد خرد است، زال را از کوه البرز نجات میدهد و پرورش میدهد. برخی روایتها بر این باورند که شاهباز نیز میتواند یکی از اشکال سیمرغ باشد، پرندهای که همواره همراه شاهان و پهلوانان بوده است.
- شاهباز در نمادشناسی عرفانی\ در عرفان اسلامی و ایرانی، شاهباز به عنوان نمادی از روح بلندپرواز، خرد و آزادی مطرح است. این پرنده نماد انسانی است که از قیدهای مادی رهایی یافته و به سوی حقیقت پرواز میکند. مولانا و عطار در اشعار خود به این مفهوم اشاره کردهاند.
- شاهباز در فرهنگ پهلوی و زرتشتی\ در آیین زرتشتی، پرندگان بلندپرواز همچون شاهباز و عقاب به عنوان نیروهای روشنی در برابر تاریکی و نمادی از فرهوشی (روحهای نگهبان) در نظر گرفته میشدند. آنها به عنوان فرستادگان اهورامزدا برای هدایت انسانها شناخته میشدند.
معانی دیدن شاهباز در خواب و رویا
دیدن شاهباز در خواب تعابیر مختلفی دارد که به فرهنگ، باورهای شخصی و شرایط زندگی بیننده بستگی دارد:
- دیدن شاهباز در حال پرواز: نشانهی قدرت، موفقیت و ارتقای مقام در زندگی.
- نشستن شاهباز بر دست: نشان از عزت، شکوه و دریافت نعمتی بزرگ.
- دیدن شاهباز زخمی یا در بند: ممکن است اشاره به موانع و مشکلات در مسیر موفقیت داشته باشد.
- رهایی شاهباز از قفس: نمادی از آزادی از محدودیتها و ورود به مرحلهای جدید از زندگی.
شاهباز در هنر و فرهنگ معاصر
امروزه نیز شاهباز در هنر، شعر و موسیقی ایرانی جایگاه ویژهای دارد. بسیاری از شاعران از این پرنده به عنوان نماد شکوه و آزادی یاد کردهاند. در ادبیات معاصر و حتی نامگذاری افراد، شاهباز همچنان جایگاه خود را حفظ کرده است.
نتیجهگیری
شاهباز یکی از نمادهای مهم در فرهنگ و تاریخ ایران است که از دوران باستان تاکنون، جایگاهی ویژه در اسطورهها، هنر، ادبیات و باورهای مردمی داشته است. این پرنده نماد قدرت، خرد، آزادی و ارتباط با آسمان بوده و همچنان در ذهن و دل ایرانیان جای دارد.
-
@ 6e0ea5d6:0327f353
2025-04-14 15:11:17Ascolta.
We live in times where the average man is measured by the speeches he gives — not by the commitments he keeps. People talk about dreams, goals, promises… but what truly remains is what’s honored in the silence of small gestures, in actions that don’t seek applause, in attitudes unseen — yet speak volumes.
Punctuality, for example. Showing up on time isn’t about the clock. It’s about respect. Respect for another’s time, yes — but more importantly, respect for one’s own word. A man who is late without reason is already running late in his values. And the one who excuses his own lateness with sweet justifications slowly gets used to mediocrity.
Keeping your word is more than fulfilling promises. It is sealing, with the mouth, what the body must later uphold. Every time a man commits to something, he creates a moral debt with his own dignity. And to break that commitment is to declare bankruptcy — not in the eyes of others, but in front of himself.
And debts? Even the small ones — or especially the small ones — are precise thermometers of character. A forgotten sum, an unpaid favor, a commitment left behind… all of these reveal the structure of the inner building that man resides in. He who neglects the small is merely rehearsing for his future collapse.
Life, contrary to what the reckless say, is not built on grand deeds. It is built with small bricks, laid with almost obsessive precision. The truly great man is the one who respects the details — recognizing in them a code of conduct.
In Sicily, especially in the streets of Palermo, I learned early on that there is more nobility in paying a five-euro debt on time than in flaunting riches gained without word, without honor, without dignity.
As they say in Palermo: L’uomo si conosce dalle piccole cose.
So, amico mio, Don’t talk to me about greatness if you can’t show up on time. Don’t talk to me about respect if your word is fickle. And above all, don’t talk to me about honor if you still owe what you once promised — no matter how small.
Thank you for reading, my friend!
If this message resonated with you, consider leaving your "🥃" as a token of appreciation.
A toast to our family!
-
@ 6e0ea5d6:0327f353
2025-04-14 15:10:58Ascolta bene.
A man’s collapse never begins on the battlefield.
It begins in the invisible antechamber of his own mind.
Before any public fall, there is an ignored internal whisper—
a small, quiet, private decision that gradually drags him toward ruin.No empire ever fell without first rotting from within.
The world does not destroy a man who hasn’t first surrendered to himself.
The enemy outside only wins when it finds space in the void the man has silently carved.**Non ti sbagliare ** — there are no armies more ruthless than undisciplined thoughts.
There are no blows more fatal than the ones we deal ourselves:
with small concessions, well-crafted excuses,
and the slow deterioration of our integrity.
What people call failure is nothing more than the logical outcome
of a sequence of internal betrayals.Afraid of the world? Sciocchezze.
But a man who’s already bowed before his own weaknesses—
he needs no enemies.
He digs his own grave, chooses the epitaph,
and the only thing the world does is toss in some dirt.Capisci?
Strength isn’t the absence of falling, but the presence of resistance.
The true battle isn’t external.
It takes place within—where there’s only you, your conscience, and the mirror.
And it’s in that silent courtroom where everything is decided.The discipline to say “no” to yourself
is more noble than any public glory.
Self-control is more valuable than any victory over others.In Sicily, we learn early:
“Cu s’abbrazza cu’ so’ nemicu, si scorda la faccia di l’amicu.”
He who embraces his enemy forgets the face of his friend.
The most dangerous enemy is the one you feed daily with self-indulgence.
And the most relentless confrontation is the one you avoid in front of the mirror.So don’t talk to me about external defeats.
Tell me where inside you the weakness began.
Tell me the exact moment you abandoned what you believed in, in the name of ease.
Because a man only falls before the world… after falling before himself.Thank you for reading, my friend!
If this message resonated with you, consider leaving your "🥃" as a token of appreciation.
A toast to our family!
-
@ 2e8970de:63345c7a
2025-04-14 14:50:44(source)
- Notice how "social" stuff like therapy and finding purpose is up massively, now all first 3 spots.
- All the "new" stuff is down. You won't get new ideas out of chatGPT, explore topics of interest, or research. It only spits back at you what you said to it. Nothing new, nothing creative or unexpected.
- Coding is new this year? Really?
originally posted at https://stacker.news/items/943133
-
@ c21b1a6c:0cd4d170
2025-04-14 14:41:20🧾 Progress Report Two
Hey everyone! I’m back with another progress report for Formstr, a part of the now completed grant from nostr:npub10pensatlcfwktnvjjw2dtem38n6rvw8g6fv73h84cuacxn4c28eqyfn34f . This update covers everything we’ve built since the last milestone — including polish, performance, power features, and plenty of bug-squashing.
🏗️ What’s New Since Last Time?
This quarter was less about foundational rewrites and more about production hardening and real-world feedback. With users now onboard, our focus shifted to polishing UX, fixing issues, and adding new features that made Formstr easier and more powerful to use.
✨ New Features & UX Improvements
- Edit Existing Forms
- Form Templates
- Drag & Drop Enhancements (especially for mobile)
- New Public Forms UX (card-style layout)
- FAQ & Support Sections
- Relay Modal for Publishing
- Skeleton Loaders and subtle UI Polish
🐛 Major Bug Fixes
- Fixed broken CSV exports when responses were empty
- Cleaned up mobile rendering issues for public forms
- Resolved blank.ts export issues and global form bugs
- Fixed invalid
npub
strings in the admin flow - Patched response handling for private forms
- Lots of small fixes for titles, drafts, embedded form URLs, etc.
🔐 Access Control & Privacy
- Made forms private by default
- Fixed multiple issues around form visibility, access control UIs, and anonymous submissions
- Improved detection of pubkey issues in shared forms
🚧 Some Notable In-Progress Features
The following features are actively being developed, and many are nearing completion:
-
Conditional Questions:
This one’s been tough to crack, but we’re close!
Work in progress bykeraliss
and myself:
👉 PR #252 -
Downloadable Forms:
Fully-contained downloadable HTML versions of forms.
Being led bycasyazmon
with initial code by Basanta Goswami
👉 PR #274 -
OLLAMA Integration (Self-Hosted LLMs):
Users will be able to create forms using locally hosted LLMs.
PR byashu01304
👉 PR #247 -
Sections in Forms:
Work just started on adding section support!
Small PoC PR bykeraliss
:
👉 PR #217
🙌 Huge Thanks to New Contributors
We've had amazing contributors this cycle. Big thanks to:
- Aashutosh Gandhi (ashu01304) – drag-and-drop enhancements, OLLAMA integration
- Amaresh Prasad (devAmaresh) – fixed npub and access bugs
- Biresh Biswas (Billa05) – skeleton loaders
- Shashank Shekhar Singh (Shashankss1205) – bugfixes, co-authored image patches
- Akap Azmon Deh-nji (casyazmon) – CSV fixes, downloadable forms
- Manas Ranjan Dash (mdash3735) – bug fixes
- Basanta Goswami – initial groundwork for downloadable forms
- keraliss – ongoing work on conditional questions and sections
We also registered for the Summer of Bitcoin program and have been receiving contributions from some incredibly bright new applicants.
🔍 What’s Still Coming?
From the wishlist I committed to during the grant, here’s what’s still in the oven:
-[x] Upgrade to nip-44 - [x] Access Controlled Forms: A Form will be able to have multiple admins and Editors. - [x] Private Forms and Fixed Participants: Enncrypt a form and only allow certain npubs to fill it. - [x] Edit Past Forms: Being able to edit an existing form. - [x] Edit Past Forms
- [ ] Conditional Rendering (in progress)
- [ ] Sections (just started)
- [ ] Integrations - OLLAMA / AI-based Form Generation (near complete)
- [ ] Paid Surveys
- [ ] NIP-42 Private Relay support
❌ What’s De-Prioritized?
- Nothing is de-prioritized now especially since Ollama Integration got re-prioritized (thanks to Summer Of Bitcoin). We are a little delayed on Private Relays support but it's now becoming a priority and in active development. Zap Surveys will be coming soon too.
💸 How Funds Were Used
- Paid individual contributors for their work.
- Living expenses to allow full-time focus on development
🧠 Closing Thoughts
Things feel like they’re coming together now. We’re out of "beta hell", starting to see real adoption, and most importantly, gathering feedback from real users. That’s helping us make smarter choices and move fast without breaking too much.
Stay tuned for the next big drop — and in the meantime, try creating a form at formstr.app, and let me know what you think!
-
@ 7bc05901:8c26d22b
2025-04-14 13:33:09This is how we should build and tinker. One square meter at a time.
I have been trying to subtly preach square foot gardening to my wife over the winter. While we were planting yesterday, I noticed she had placed the cabbage just a couple inches away from each other, because based on the size they are now, it seems right. I said, you think those are far enough apart? And she quickly divided them up each into their own square foot, which is the recommended distance to maximize their growth. Considerations about future growth engaged her intuition, and giving them each a square foot made sense.
One cannot get more hyper-local than the square meter that they currently occupy. After we had finished planting, we sat on lawn chairs in the grass while our daughter chased bubbles from the battery-powered bubble machine that the neighbor had given us. My wife and I started talking about how many blades of grass were in our entire backyard. Our whole piece of property is not quite three quarters of an acre, and the backyard is about a third of it. The way to figure that out, though, is to figure out how many blades of grass there are in a square foot. After a bit of back and forth, le chat (the mistral AI) finally told me that in a more dense square foot of grass, you might have over 7,000 blades of grass and in a less dense square foot around 3,000. We didn't do the math on our whole yard, but we at least know the formula if we ever care to.
Thinking by the square foot is truly how empires fall. Realizing that the world is divisible not just by state, but also by square foot, is a critical step towards manifesting sovereignty. The world is not just cities, counties, nations, continents -- the network that we impact is not defined by armies, politicians, or CEOs unless we let it be.
As we think about the expansion of our hyper-local spaces, the permaculture design principles about controlling edges seemed relevant to me. This is from mistral:
In permaculture, the principle of "using edges and valuing the marginal" is one of the key design principles. This principle emphasizes the importance of the edges or boundaries in a system, where different environments or ecosystems meet. These edges are often the most diverse and productive areas because they allow for interactions between different elements.
Here are some key aspects of this principle:
Increased Productivity: Edges are often more productive because they receive inputs from multiple environments. For example, the edge of a forest and a meadow might receive sunlight from the meadow side and nutrients from the forest side.
Diversity: Edges support a greater diversity of species because they provide a variety of microclimates and resources. This diversity can lead to more resilient ecosystems.
Innovation: Edges are places of interaction and exchange, which can lead to new ideas and innovations. In a permaculture design, this might mean placing elements that benefit from interaction at the edges of different zones.
Valuing the Marginal: This principle also encourages valuing and utilizing marginal spaces and resources that might otherwise be overlooked. By doing so, permaculture aims to make the most efficient use of all available resources.
In practical terms, this principle might be applied by designing gardens or farms to maximize edge environments, such as by using keyhole beds or creating winding paths that increase the amount of edge in the landscape. It's about recognizing the potential in transitional spaces and leveraging it for greater productivity and resilience.
In permaculture, the principle of "using edges and valuing the marginal" is one of the key design principles. This principle emphasizes the importance of the edges or boundaries in a system, where different environments or ecosystems meet. These edges are often the most diverse and productive areas because they allow for interactions between different elements.
Here are some key aspects of this principle:
-
Increased Productivity: Edges are often more productive because they receive inputs from multiple environments. For example, the edge of a forest and a meadow might receive sunlight from the meadow side and nutrients from the forest side.
-
Diversity: Edges support a greater diversity of species because they provide a variety of microclimates and resources. This diversity can lead to more resilient ecosystems.
-
Innovation: Edges are places of interaction and exchange, which can lead to new ideas and innovations. In a permaculture design, this might mean placing elements that benefit from interaction at the edges of different zones.
-
Valuing the Marginal: This principle also encourages valuing and utilizing marginal spaces and resources that might otherwise be overlooked. By doing so, permaculture aims to make the most efficient use of all available resources.
In practical terms, this principle might be applied by designing gardens or farms to maximize edge environments, such as by using keyhole beds or creating winding paths that increase the amount of edge in the landscape. It's about recognizing the potential in transitional spaces and leveraging it for greater productivity and resilience.
The revolution will begin in your square meter, and it will grow when you use edges and value the marginal.
We are all on the edge over here in the Nostr-ecosystem. And bitcoin allows you to store your value in your square meter without interference from those who currently control many square meters.
Stay sovereign.
-
-
@ e8744882:47d84815
2025-04-14 13:24:38For Telugu-speaking movie lovers, enjoying Hollywood movies in Telugu dubbed has never been easier! Thanks to Dimension On Demand (DOD), you can now experience Hollywood’s most exciting films in your preferred language. Whether you enjoy intense thrillers, supernatural mysteries, or high-stakes survival stories, DOD has a great selection of action-packed movies waiting for you.
If you're searching for Hollywood movies in Telugu dubbed, we’ve got you covered! Here are two must-watch films that will keep you entertained from start to finish. Each of these picks delivers gripping storytelling, thrilling action, and unforgettable characters—perfect for fans of adrenaline-pumping entertainment.
The Wraith – A Supernatural Revenge Story with High-Speed Action For those who enjoy Hollywood movies in Telugu dubbed with a supernatural twist, The Wraith is a thrilling ride from start to finish. This cult classic blends mystery, vengeance, and high-speed chases to create an electrifying experience.
Set in a small desert town ruled by a ruthless gang of street racers, the story takes an eerie turn when a mysterious figure arrives, seeking revenge. Charlie Sheen, widely recognized for his role as the charismatic and carefree Charlie Harper in Two and a Half Men, brings a captivating presence to this intense and mysterious character, adding to the film’s gripping appeal. Sheen plays Jake Kesey, a drifter with a hidden past, whose arrival sparks a chain of deadly events. A sleek black sports car becomes the ultimate symbol of justice, challenging the gang to a series of high-octane races. One by one, the gang members meet their fate, leading their leader, Packard Walsh, into a spiraling paranoia.
With its unique mix of sci-fi, action, and supernatural elements, The Wraith remains a cult favorite. Charlie Sheen’s enigmatic performance, thrilling race sequences, and eerie atmosphere make it an unforgettable watch. If you love adrenaline-fueled action combined with an intriguing storyline, this is one of the best Telugu dubbed Hollywood movies for you.
What Makes It Special? ✔ A revenge thriller with a supernatural edge
✔ Fast-paced racing action and stunning visuals
✔ A gripping storyline that keeps you invested
Blood Surf – A Chilling Survival Thriller in the Depths of the Ocean If you’re a fan of survival horror movies, Blood Surf delivers an intense and suspenseful experience. This Hollywood movie in Telugu dubbed follows a group of adventure seekers who take on a dangerous new sport called "blood surfing"—attracting sharks to ride the waves among them. But their daring stunt soon turns into a terrifying fight for survival when they encounter a greater threat lurking beneath the water.
Dax Miller stars as Zack Jardine, a thrill-seeker looking to capture the ultimate adrenaline rush on camera. However, he and his team soon realize they’re being hunted by a massive, ancient predator unlike anything they’ve seen before. Trapped on a remote island with no escape, they must use their instincts and courage to survive the relentless attacks of this monstrous creature.
Blood Surf combines stunning tropical scenery with heart-pounding suspense, delivering an unforgettable survival horror experience. If you love creature thrillers with non-stop action, this is a must-watch among Hollywood movies dubbed in Telugu.
Why You’ll Love It: ✔ A suspenseful survival thriller with intense action
✔ Beautiful yet haunting tropical locations
✔ A terrifying predator that adds to the excitement
Watch Hollywood Movies in Telugu Dubbed on DOD Dimension On Demand offers an incredible collection of Hollywood movies in Telugu dubbed, making it easy for movie lovers to enjoy world-class entertainment in their preferred language. Whether you're in the mood for action-packed thrillers, supernatural mysteries, or high-stakes survival stories, there’s something for everyone.
Why Choose DOD? ✔ HD Streaming – Crisp visuals and immersive audio
✔ A Wide Range of Genres – From thrillers to horror, explore a variety of options
✔ Watch Anytime, Anywhere – Enjoy movies on your preferred device
Start Watching Now! Stream The Wraith in Telugu Dubbed – Don’t miss it!
Enjoy Blood Surf in Telugu Dubbed – Start now!
Your search for Hollywood movies in Telugu dubbed ends here! Grab your snacks, settle in, and experience an exciting world of Hollywood entertainment in your preferred language. Stay tuned for more top movie picks, only on Dimension On Demand!
-
@ 4e088f30:744b1792
2025-04-14 12:38:12Pouco menos de um mês antes de sua morte, minha mãe escreveu um texto com suas reflexões sobre a carta dezesseis do conjunto de cartas que eu criei. Ela estava lendo com a fonoaudióloga que a atendia e me contou. Eu disse que queria ouvir a reflexão, e um dia ela gravou um áudio para mim.
A carta dizia assim:
Ajo como borboleta que vai contra a força da vida ao sair do casulo tentando controlar o modo como será vista. Não percebo que tudo o que precisa ser feito agora é me entregar às minhas próprias asas.
Se a borboleta sai do casulo para ser vista como idealiza, o que ela deixa de ver, o que ela deixa de nutrir na vida?
Um dos trechos do texto que ela escreveu era:
“Você pode me ver?”
E eu me pergunto: será que tenho coragem de vê-la por inteiro? Ver sem palavras, sem conceitos, sem julgamentos, sem projeções? Será que tenho coragem de apenas ver quem ela é?
–
Outro dia, estava na casa dela - e o que mais me interessa sempre são seus cadernos - eu encontrei um que ainda não tinha visto. Parece que ela o usava em meados dos anos 90. Eu o abri e encontrei o nome Elizabeth Kubler Ross e eu tinha lido alguns livros dela alguns anos atrás, quando comecei a mergulhar em estudos sobre cuidados paliativos, morte e luto, então achei oportuno e li o que estava escrito:
“Depois de passar por todas as provas para as quais fomos mandados à terra como parte de nosso aprendizado, podemos nos formar. Podemos sair do nosso corpo, que aprisiona a alma como um casulo aprisiona a futura borboleta e, no momento certo, deixá-lo para trás. E estaremos livres da dor, livres dos medos e livres das preocupações… Livres como uma borboleta voltando para casa, para Deus… em um lugar onde nunca estamos sós, onde continuamos a crescer, a cantar, a dançar, onde estamos com aqueles que amamos e cercados de mais amor que jamais poderemos imaginar.” Elizabeth Kubler Ross, M.D (A roda da vida)
Antes de ouvir o que ela tinha escrito, eu disse que ela estava confiando na fonoaudióloga para se abrir e isso ia ajudá-la a florescer, ela emendou com “largar o casulo e virar borboleta”. Ela se sentia ainda emaranhada no casulo. No último ano ela falou algumas vezes sobre a necessidade de desapegar, sobre a única dificuldade dela ser soltar o apego a nós, os filhos dela. Mas ela foi fazendo o trabalho de soltar e soltar e soltar, até que se entregou às suas asas que sempre foram lindas e brilhantes a cada metamorfose em vida, e agora sendo vida.
Começo essa jornada, que ainda não sei o que será - embora tenha alguns desejos, com esses escritos, que ofereço à Vida, que já foi chamada de Glória e de minha mãe.
-
@ 846ebf79:fe4e39a4
2025-04-14 12:35:54The next iteration is coming
We're busy racing to the finish line, for the #Alexandria Gutenberg beta. Then we can get the bug hunt done, release v0.1.0, and immediately start producing the first iteration of the Euler (v0.2.0) edition.
While we continue to work on fixing the performance issues and smooth rendering on the Reading View, we've gone ahead and added some new features and apps, which will be rolled-out soon.
The biggest projects this iteration have been:
- the HTTP API for the #Realy relay from nostr:npub1fjqqy4a93z5zsjwsfxqhc2764kvykfdyttvldkkkdera8dr78vhsmmleku,
- implementation of a publication tree structure by nostr:npub1wqfzz2p880wq0tumuae9lfwyhs8uz35xd0kr34zrvrwyh3kvrzuskcqsyn,
- and the Great DevOps Migration of 2025 from the ever-industrious Mr. nostr:npub1qdjn8j4gwgmkj3k5un775nq6q3q7mguv5tvajstmkdsqdja2havq03fqm7.
All are backend-y projects and have caused a major shift in process and product, on the development team's side, even if they're still largely invisible to users.
Another important, but invisible-to-you change is that nostr:npub1ecdlntvjzexlyfale2egzvvncc8tgqsaxkl5hw7xlgjv2cxs705s9qs735 has implemented the core bech32 functionality (and the associated tests) in C/C++, for the #Aedile NDK.
On the frontend:
nostr:npub1636uujeewag8zv8593lcvdrwlymgqre6uax4anuq3y5qehqey05sl8qpl4 is currently working on the blog-specific Reading View, which allows for multi-npub or topical blogging, by using the 30040 index as a "folder", joining the various 30041 articles into different blogs. She has also started experimenting with categorization and columns for the landing page.
nostr:npub1l5sga6xg72phsz5422ykujprejwud075ggrr3z2hwyrfgr7eylqstegx9z revamped the product information pages, so that there is now a Contact page (including the ability to submit a Nostr issue) and an About page (with more product information, the build version displayed, and a live #GitCitadel feed).
We have also allowed for discrete headings (headers that aren't section headings, akin to the headers in Markdown). Discrete headings are formatted, but not added to the ToC and do not result in a section split by Asciidoc processors.
We have added OpenGraph metadata, so that hyperlinks to Alexandria publications, and other events, display prettily in other apps. And we fixed some bugs.
The Visualisation view has been updated and bug-fixed, to make the cards human-readable and closeable, and to add hyperlinks to the events to the card-titles.
We have added support for the display of individual wiki pages and the integration of them into 30040 publications. (This is an important feature for scientists and other nonfiction writers.)
We prettified the event json modal, so that it's easier to read and copy-paste out of.
The index card details have been expanded and the menus on the landing page have been revamped and expanded. Design and style has been improved, overall.
Project management is very busy
Our scientific adviser nostr:npub1m3xdppkd0njmrqe2ma8a6ys39zvgp5k8u22mev8xsnqp4nh80srqhqa5sf is working on the Euler plans for integrating features important for medical researchers and other scientists, which have been put on the fast track.
Next up are:
- a return of the Table of Contents
- kind 1111 comments, highlights, likes
- a prototype social feed for wss://theforest.nostr1.com, including long-form articles and Markdown rendering
- compose and edit of publications
- a search field
- the expansion of the relay set with the new relays from nostr:npub12262qa4uhw7u8gdwlgmntqtv7aye8vdcmvszkqwgs0zchel6mz7s6cgrkj, including some cool premium features
- full wiki functionality and disambiguation pages for replaceable events with overlapping d-tags
- a web app for mass-uploading and auto-converting PDFs to 30040/41 Asciidoc events, that will run on Realy, and be a service free for our premium relay subscribers
- ability to subscribe to the forest with a premium status
- the book upload CLI has been renamed and reworked into the Sybil Test Utility and that will get a major release, covering all the events and functionality needed to test Euler
- the #GitRepublic public git server project
- ....and much more.
Thank you for reading and may your morning be good.
-
@ 044da344:073a8a0e
2025-04-14 11:41:39Als wir vor gut einem halben Jahr mit den Kolumnen angefangen haben, hatte ich mir das genau so vorgestellt. Ich schreibe auf, was mir in der Woche so passiert ist. Eine Bilanz sozusagen, vielleicht persönlich, vielleicht politisch. Je nachdem. Es ist dann etwas anders gekommen. Manchmal waren ein Buch oder ein Film einfach so stark, dass aus der Kolumne eine Rezension geworden ist. Manchmal wollte ich nur von einem meiner Interviews erzählen und das Besprochene gleich mit den großen Debatten verknüpfen. Und manchmal waren Anregungen von außen umzusetzen, Stichwort KI, Stichwort Frieden.
Wahrscheinlich waren die meisten Wochen auch nicht besonders spannend. Alltag eben. Was soll man davon groß festhalten. Diesmal ist das anders. Sonntag Erich Hambach bei uns im Haus. Ein Interview für die Reihe Im Gespräch. Ich will nicht zu viel vorwegnehmen. Es ging um die Hochfinanz, um den schwarzen Adel, um die Illuminati. Ein Gruselkabinett für alle, die wissen, wo die roten Linien sind zu den Schmuddelkindern. Verschwörungstheorie, pfui. Erich Hambach kann erklären, wie die „Herren des Geldes“ (Untertitel seines neuen Buchs) arbeiten und was man tun kann, um sich ihrem Zugriff zu entziehen. Als die Kameras aus waren, ging es munter weiter mit dem Publikum. Steuerfrei leben, sich auf den Lastenausgleich vorbereiten, Kollateralkonto. Siehe oben. Wir haben dann noch 25 Minuten nachgeschoben, die bei den „Truth Brothers“ zu sehen sein werden, dem Kanal von Erich Hambach.
Montag Dresden. Lesung im Buchhaus Loschwitz. Ich war schon im Juni dort, damals mit dem Buch über die Unterwerfung der Universitäten. Diesmal „Der dressierte Nachwuchs“. Wieder volles Haus. In Loschwitz heißt das: Susanne Dagen, Gastgeberin und Moderatorin, quetscht sich auf einen Hocker zwischen Klavier und Reihe null und sagt: Willkommen zum Gottesdienst. Einige sind zum zweiten Mal da. Neu: Paul Soldan, den ich aus seinen Texten für Multipolar kenne und über sein Buch „Sheikhi“, und Julia Szarvasy, die mich in ihrem Bus für Nuoviso interviewt hat und auf der Ruderboot-Couch. Hinterher kommen (um im Bild zu bleiben) drei U-Boote zu mir. Professoren. Ein Techniker, ein Germanist und ein Medienforscher, der sich sogar mit mir fotografieren lassen will. Dieser Kollege ist nicht an der TU (falls jemand die Fahndung einleiten möchte), aber immerhin. Ich bin oft gefragt worden, ob es an den Unis Gleichgesinnte gibt, und kann jetzt endlich sagen: ja. Ein paar schon.
Versteckt in einer der letzten Dresdner Reihen: Michael Beleites, eine Ikone der DDR-Umweltbewegung und später ein Jahrzehnt lang Beauftragter für die Stasi-Unterlagen in Sachsen. Er hat eine Rezension mitgebracht, die er gerade für die Sezession geschrieben hat, und einen Gedanken, der mich später schlecht schlafen lässt. Müssen wir die Geschichte vom Herbst 1989 umschreiben? Ganz neu ist dieser Gedanke nicht, natürlich nicht. Wer dabei war, hat sich schon damals gefragt, wie die Stimmung so schnell kippen konnte vom Wunsch nach einem anderen, besseren Sozialismus zu Helmut Kohl und seiner D-Mark. Daniela Dahn, wie Michael Beleites seinerzeit in vorderster Front, hat den schwarzen Peter an den Journalismus weitergegeben. Tamtam und Tabu. Eine Kampagne, losgetreten von Horst Teltschik, Kohls wichtigstem Mann, die sich um SED-Skandale drehte und so wie eine Nebelkerze verhüllte, um was es eigentlich ging. Die Herren des Geldes, würde Erich Hambach sagen. „Alte Besitzverhältnisse“ wieder herstellen und damit „alte Machtverhältnisse“, sagt Daniela Dahn. Michael Beleites ergänzt das nun durch das, was er gesehen und erlebt hat, bei der Auflösung des Geheimdienstes in Gera zum Beispiel. Da seien Leute wie er gewesen, natürlich. Legitimiert durch das, was vorher war. Überall im Land seien aber plötzlich auch unbeschriebene Blätter aufgetaucht, laut und damit schnell ganz vorne dran. Ein Forschungsthema, ohne Frage.
Bevor ich das zu Ende gedacht habe, sitze ich im Rudolf-Steiner-Haus, nur ein paar Steinwürfe weg von der Alster. Ich würde gern „Hamburgs Wohnzimmer“ schreiben, aber dazu taugt der Saal im Souterrain dann doch nicht ganz. Immerhin: steuerfinanziert. Geht also doch. Eingeladen hat unter anderem der Nachdenkseiten-Gesprächskreis vor Ort. Thema: Wandel der Universitäten. Wieder sind Kollegen da, auch aus dem Mittelbau und aus der Rentnergeneration, die sich zu erinnern glauben, alles schon erlebt zu haben, damals, in ihrer großen Zeit. Nun ja. Wichtiger: Walter Weber ist da, ein Arzt, Koryphäe in Sachen Krebs, 80 inzwischen, der meinen letzten Auftritt in Hamburg organisiert hat. Große Freiheit, Sommer 2022. Die Sonne schien, und es roch nach Aufbruch. Aus dem ganzen Land waren sie gekommen, aus Nord und Süd, von links bis rechts, aus allen nur denkbaren Bewegungen und Milieus. Corona als Klammer, genau wie der Glaube, dass unsere Zeit jetzt anbricht.
Es kam dann anders, aber das ist hier nicht mein Punkt. Walter Weber, der alte Weggefährte, zieht Bilanz – bei einem Becks in seinem Haus, genau da, wo wir vor drei Jahren in größerer Runde beraten haben. Walter hat inzwischen einen Prozess hinter sich mit knapp zwei Dutzend Verhandlungstagen und den entsprechenden Kosten. Maskenatteste. Was immer wir aufgefahren haben an Beweisanträgen, sagt Walter, es wurde abgeschmettert. Und trotzdem. Wir müssen sie zwingen, sich damit auseinanderzusetzen. Immer wieder. So ähnlich habe ich das zwei Stunden vorher im Steiner-Haus gesagt, mit Vaclav Havel als Referenz. 500 Ärzte, schätzt Walter Weber, haben wie er Atteste ausgestellt. 500 bei einer sechsstelligen Zahl an Kollegen. Sicher gibt es eine Dunkelziffer. Lassen wir es bei den 500, weil Walter Weber hier die Folgen kennt. 80 Prozent von diesen 500 haben Haus- und Praxisdurchsuchungen erlebt. Er selbst zwei, der Spitzenreiter acht. Die Maske war der Test. Als die Spritze kam, wusste jeder, auf was er sich einlassen würde - selbst ein Medienforscher wie ich. Die maskierte Öffentlichkeit, veröffentlicht im Oktober 2020, war mit Sicherheit nicht mein bester Text, aber der, der den meisten Wirbel auslöste und später sogar zweimal vor Gericht verhandelt wurde.
Was bleibt von all den Kämpfen? Wir haben die Leute aus der Vereinzelung geholt, sagt Walter. Die 20 Prozent, die dagegen waren. Wir haben ihnen gezeigt, dass sie nicht allein sind, und diese Leute mobilisiert. Gescheitert sind wir an Schritt drei. Strukturbildung. Es fehlt uns an Geld, Michael. Walter Weber hat an Regionalbüros gebastelt. „Ärzte für Aufklärung“ in Thüringen – und das ist nur eins von vielen Beispielen. Wer weiß, wie viel Geld es in diesem Land gibt und wie viele wirklich reiche Leute, der weiß auch, dass wir hier über Peanuts sprechen. Wem es gut geht, der will, dass alles weiter seinen Gang geht. Der will keine Strukturen für irgendeine Opposition. Walter Weber hat mit einer seiner Nichten gerade „Das siebte Kreuz“ gelesen. Anna Seghers, Schulstoff in der DDR. Weißt du, was ich da gelernt habe, Michael? Echter Widerstand hat zwei Bedingungen. Keine Familie und keine Angst vor dem Tod.
Der Zug nach Berlin ist pünktlich und mein Gastgeber folglich noch nicht da. Gibt’s doch nicht, sagt er. Hat es noch nie gegeben. Über meinen Auftritt im Sprechsaal breite ich den Mantel des Schweigens. Die Idee klang super: Wir machen dort eine Ausstellung mit aktuellen Bildern aus Gaza, gekauft von der dpa, und du, Michael, bringst deine Bücher über Cancel Culture, Jugend und Universitäten zusammen, um zu erklären, warum Deutschland wegschaut. Die kastrierte Öffentlichkeit. Der beste Titel geht ins Leere, wenn niemand weiß, dass ich sprechen werde. Vielleicht ist das so, wenn der eigene Verlag der Veranstalter ist. Jens Fischer Rodrian hat durch einen Zufall erfahren, dass ich da bin, und bringt die CD Voices for Gaza, ganz frisch in der Reihe „Protestnoten“. Auf dem Cover: große Namen von Didi Hallervorden über Tino Eisbrenner, Nirit Sommerfeld und Diether Dehm bis zu Wolfgang Wodarg. Fünf von fast 40. Sorry an die, die ich auslassen musste. Der gleiche Zufall hat Kathrin Schmidt in den Sprechsaal geführt, Mitglied des PEN-Zentrums, Buchpreisträgerin, Maßnahmenkritikerin. Sie hat wie immer ihr Strickzeug dabei.
Ein kleines Publikum, frei von Kameras, erlaubt, in die Tiefen zu tauchen und dabei auch zu riskieren, im Trüben zu fischen. Erich Hambach hätte seine Freude gehabt. Und wer weiß schon, was daraus später wächst. Ein paar Minuten vor Beginn gehe ich durch das Regierungsviertel und höre plötzlich meinen Namen. Eine ARD-Frau, die auf Friedrich Merz wartet. Koalitionsvertrag fertig, Kamera schussbereit. Mein Film über die Duldungspflicht, sagt die Frau und strahlt über das ganze Gesicht. Er ist fertig. Premiere nächste Woche. Sie war bei einem meiner letzten Berliner Vorträge und wird jetzt mit ihrem Namen für ein Produkt stehen, dass so nicht im Ersten laufen kann. Noch nicht, würde Walter Weber sagen. Ende nächsten Jahres, sagt er mir beim Abschied, steht Merkel vor Gericht. Ist der Gedanke erstmal da, so begründet er das sinngemäß, dann ist er nicht mehr aufzuhalten. Mal schauen, wie das jetzt mit der Deutschen Bahn wird bei der Rückfahrt nach Bayern. Ich nehme mir vor, dass wir pünktlich sind.
Freie Akademie für Medien & Journalismus
Bild: Tobias Schönebeck auf Pixabay (Dresden, Blaues Wunder in Loschwitz)
-
@ cb4352cd:a16422d7
2025-04-14 11:39:02From Fun to Finance: A New Player Has Entered the Game
For years, gaming was mostly a one-sided deal. Players poured in hours — and often cash — while publishers reaped the rewards. But then came Play-to-Earn (P2E): the idea that in-game actions could earn players actual value, through tokens, NFTs, or digital goods.
When Axie Infinity took off in 2020–2021, it showed what was possible. At its peak, some players in the Philippines were earning more than the local minimum wage by raising and battling cartoon monsters. But as the hype faded, so did many of the unsustainable economic models behind early GameFi.
What’s emerged since is a second wave — one that’s quieter, more focused, and better grounded in gameplay and long-term ecosystems.
The Rise of Intuitive GameFi
Today’s GameFi isn’t about chasing profits — it’s about smoother entry points and better play. Many newer games live entirely in browsers or messengers. No app store, no wallet setup, no confusing steps.
Projects like Wenix, Pixels, and Hunters On-Chain are keeping things light and accessible. Players can jump into short sessions, complete quests, and slowly accumulate in-game rewards — without needing to be blockchain experts.
Some titles are even experimenting with AI-powered environments that adapt to player behavior, making things feel more dynamic and personalized.
Real-World Value and Community-Driven Economies
A growing number of platforms — including Wenix — are tying in-game actions to larger systems. Players aren’t just collecting points; they’re influencing how the game evolves, how assets are traded, and sometimes even how decisions are made.
It’s no longer just about who has the best gear. It’s about how well the economy works — and whether players feel ownership over the world they’re in.
That’s why token design and community mechanics are taking center stage. Daily quests, lootboxes, PvP — they’re still here, but now they sit on top of more thought-out systems with checks against inflation and burnout.
Some of the most promising projects even run their economies like small digital nations — with resource planning, governance, and built-in incentives that align with player effort.
Beyond Games: GameFi as a Gateway to Web3
Here’s the interesting part: GameFi might be one of the easiest ways to introduce people to Web3.
Instead of talking about “wallets” or “DAOs,” these platforms hand users a sword, a mission, and a reason to care. Before you know it, you’re signing your first transaction or trading a digital item — not because you studied crypto, but because you were having fun.
It’s learning by doing. And it works.
The Road Ahead
GameFi is still figuring itself out. There will be setbacks. But it’s clear that the blend of gaming and on-chain incentives isn’t going away.
The next wave of winners likely won’t be the flashiest or the richest — but the ones who get the balance right between fun, fairness, and meaningful ownership.
We’ve gone from pay-to-play, to play-to-earn, to play-to-own. What comes next might not have a name yet — but it’s already loading.
-
@ 7d33ba57:1b82db35
2025-04-14 11:00:25Nestled at the foot of the Alps, Salzburg is a city where Baroque beauty, musical legacy, and alpine magic come together. Best known as the birthplace of Mozart and the setting for The Sound of Music*, Salzburg is both elegant and enchanting—with fortress views, winding lanes, and a rich cultural rhythm that’s hard to resist.
🌟 Top Things to Do in Salzburg
1️⃣ Hohensalzburg Fortress
- One of Europe’s best-preserved medieval castles, perched high above the city
- Take the funicular or hike up for sweeping views
- Explore towers, armories, and eerie dungeons
2️⃣ Old Town (Altstadt)
- A UNESCO World Heritage Site filled with Baroque buildings, charming squares, and boutique-lined alleys
- Don’t miss Getreidegasse, a bustling shopping street with Mozart’s birthplace at No. 9
- Stop for a coffee in a historic café like Café Tomaselli
3️⃣ Mirabell Palace & Gardens
- Iconic filming location for The Sound of Music
- The gardens are perfect for a peaceful stroll or a picnic with palace views
- Pop into the Marble Hall—often used for classical concerts
4️⃣ Mozart’s Legacy
- Visit Mozart’s Birthplace and Mozart’s Residence for insight into his early life
- Enjoy a Mozart concert in a candlelit palace or at the fortress
5️⃣ Salzburg Cathedral & DomQuartier
- The majestic Salzburger Dom is the heart of the city’s religious life
- Explore the DomQuartier, a grand museum route through palaces, galleries, and cathedral terraces
🧀 What to Eat in Salzburg
- Kasnocken – Austrian-style cheesy dumplings with crispy onions
- Wiener Schnitzel – Classic veal (or pork) cutlet, perfectly golden
- Salzburger Nockerl – A fluffy baked dessert representing the city's snowy hills
- Sip a local Stiegl beer or warm up with a Glühwein in colder months
🎶 The Sound of Music Fans?
- Join a Sound of Music tour to visit film locations like Leopoldskron Palace, Nonnberg Abbey, and the gazebo from “Sixteen Going on Seventeen”
- Even if you’re not a fan, the scenery is worth it!
🏞️ Day Trips from Salzburg
- Hallstatt – Stunning lakeside village (2 hrs) with picture-perfect alpine views
- Eagle’s Nest (Kehlsteinhaus) – WWII site with panoramic mountain views
- Werfen Ice Caves – The largest ice cave system in the world
- Salzkammergut Lakes – Beautiful region of lakes and hills (perfect in summer)
🎯 Quick Tips
✅ Salzburg is compact and walkable—explore on foot
✅ Best time to visit: spring to early autumn, or December for magical Christmas markets
✅ Salzburg Card is worth it if you plan to visit several museums or use public transport
✅ Stay at least 2 nights to soak in both culture and scenery -
@ fbf0e434:e1be6a39
2025-04-14 04:44:26Hackathon 概要
加拿大知名黑客松 ElleHacks 2025 于 2025 年 2 月 14 日至 16 日举办,聚焦推进 STEM 领域的多样性与包容性。活动吸引 195 名注册开发者参与,72 个项目通过审核,旨在为新手提供平台,通过协作提出创新技术方案应对全球挑战。
参赛者在活动中参与各类研讨会,与行业专家及招聘人员交流,提升技能并展现创造力与技术专长。黑客松始终围绕解决现实问题,激励参与者运用问题解决能力打造有影响力的解决方案。
ElleHacks 2025 不仅凸显了 STEM 领域多样性的重要性,更为女性及非二元性别学生通过技术项目贡献力量提供了重要平台,成为推动科技行业包容性创新的实践舞台。
Hackathon 获胜者
ElleHacks 2025 在各个类别中表彰了杰出的项目,详细如下:
最佳使用 ElleHacks 主题奖获奖者
- Memora {Old Age}:一个社区驱动的应用程序,帮助阿尔茨海默病患者进行记忆识别和药物管理,使用 AI 和 IoT 技术。
- KareBear:一个 AI 驱动的虚拟助手,支持自闭症谱系障碍儿童的情感学习和表达。
- talktome:一个仿真平台,提供个性化策略帮助父母改善与青少年的沟通。
最佳硬件应用奖获奖者
最佳使用 EA 数据奖获奖者
- Connect Beyond Barriers: Autism Care:一个平台,为自闭症青少女及其父母提供 AI 驱动的支持,配备聊天机器人和专家定位服务。
最佳网络安全应用奖获奖者
- Lynx:一款整合用户数据的数字足迹分析器,提供声誉管理建议。
最佳使用 Wasp 奖获奖者
- NetNanny:一个浏览器扩展和网络应用程序,使用 AI 通过监控社交互动和发出警报来保护儿童免受网络威胁。
最佳使用 Streamlit 奖获奖者
- CyberQueen:一个网络应用,通过 AI 聊天机器人、测验和事实内容使年轻女性的网络安全教育变得有趣。
最佳 AI 应用程序使用 Cloudflare 奖获奖者
- CareOn:一个 AI 驱动的应用程序,通过运动检测和智能警报确保老年人安全。
来自 GoDaddy 注册表的最佳域名奖获奖者
- Greener Than You Think:一个交互性网站,通过每日心情检查和虚拟花园管理来支持青少年进行情绪调节。
最佳 Gen AI 应用奖获奖者
- Talky:一个应用,为有语言障碍的儿童提供游戏化语言治疗,使用 AI 定制讲话挑战和反馈。
有关这些项目的详细信息,请访问活动页面。
关于组织者
ElleHacks
ElleHacks 致力于在技术领域促进多样性和包容性,特别注重在科技领域赋权女性。以其年度 Hackathon 而闻名,ElleHacks 将参与者聚集在一起,协作开发创新项目,支持技能发展和人脉建设。该组织重视教育倡议和社区建设努力,鼓励创造力和协作。ElleHacks 致力于培养人才,努力扩大机会,并支持技术领域的弱势群体,定位自身为行业中积极变革的催化剂。
-
@ fbf0e434:e1be6a39
2025-04-14 04:44:11Hackathon 概要
Hackathon@WEF 2025 于 2025 年 1 月 21 日至 23 日在瑞士达沃斯举办,吸引 23 名注册开发者参与,最终 7 个项目获批。活动旨在通过 AI、数据科学与先进技术应对全球挑战。参赛者以团队形式,既在 Lab42 和达沃斯创新中心实地协作,也通过线上方式投入,聚焦打造具备现实应用潜力的解决方案。
由 DIGITAL LOUNGE@WEF 搭建的社交平台,让开发者有机会与 CEO、政府官员、企业家及思想领袖建立联系,向优质受众展示项目,提升曝光度并为职业发展奠基;瑞士阿尔卑斯山的优美环境辅以免费住宿、餐饮及会议资料,优化了参与体验;超 10,000 瑞士法郎的奖池,为后续创新提供支持。此外,达沃斯创新中心营造的协作氛围,有力推动全球创新进程。
此次 Hackathon 不仅彰显了技术创新在解决全球问题中的潜力,更促进了跨领域深度交流,为探索全球挑战的创新解决方案搭建了优质平台。
Hackathon 获奖者
此次Hackathon在一个类别中颁发奖项,表彰项目的技术创新和有效实施。
第一名 (5000瑞士法郎)
Inspecting Avalanches - 该项目通过高级分析和分类技术,聚焦于检测和分类雪崩,以提升安全措施和反应流程。
第二名 (1500瑞士法郎)
Team Strike - 开发了一个聊天机器人,将自然语言查询转换为SQL查询和XML文件,提升数据库交互和可访问性。
第三名 (1000瑞士法郎)
Sigma - 开发了一种能够与环境互动的类人系统,使用高效的AI模型,确保其整个操作过程中的数据主权。
Hacker之选
有关所有Hackathon项目的更多信息,请访问 DoraHacks。
关于组织者
Data Migration International
Data Migration International 提供专业的数据迁移解决方案,运用先进技术帮助组织高效管理复杂的数据过渡。公司以其技术专长而闻名,成功管理了多个行业的大型项目,展现了其在大规模数据处理方面的能力。其在技术和区块链领域的参与强调了对创新和效率的承诺。Data Migration International 致力于提供稳健的解决方案,简化和增强数据管理过程,保持其作为数字转型中可靠合作伙伴的地位。
-
@ 866e0139:6a9334e5
2025-04-14 04:31:31
Autor: Ludwig F. Badenhagen. Dieser Beitrag wurde mit dem Pareto-Client geschrieben. Sie finden alle Texte der Friedenstaube und weitere Texte zum Thema Frieden hier.**
Wer den Artikel Ob Corona oder Krieg: Wir Menschen werden wie Vieh behandelt gelesen und die Ereignisse in Deutschland während der letzten 5 Jahre auch jenseits von Staatsfunk und Mainstream Medien verfolgt hat, dem dürfte folgendes aufgefallen sein:
- Die absoluten Top-Positionen auf der politischen Bühne wurden vielfach mit Menschen besetzt, deren Eignung und Reputation – vorsichtig ausgedrückt – umstritten ist.
- Auch massivste Fehlverhalten der Politiker bleiben folgenlos. Rücktritte scheinen ebenso ausgeschlossen wie eine straf- oder zivilrechtliche Aufarbeitung.
- Wahlversprechen werden nicht eingehalten und neuerdings bereits direkt nach der Wahl gebrochen, obwohl noch keine neue Regierung gebildet wurde. Stattdessen wird das Gegenteil von dem getan, was eindringlich versprochen wurde.
- Es hat sich eine Parteien-Allianz gebildet, welche eine gemeinsame Agenda verfolgt, die nicht dem Wohle der Bürger zu dienen scheint.
In diesem Umfeld tun die Politiker offenbar ungebremst, was sie wollen – und keiner scheint sie hindern zu können. Wenn morgen „von oberster Stelle“ die Anweisung gegeben würde, dass alle Neugeborenen auf Scheiterhaufen zu verbrennen seien, so stehen die Chancen gut, dass auch solch ein Vorhaben durchgebracht werden würde. Es stellt sich die Frage, ob der Willkür überhaupt Grenzen gesetzt sind. Und eine weitere Frage ist, ob es einen Punkt gibt, an dem die Bürger nicht mehr gehorchen.
Es ist kein Geheimnis, dass Politiker für ihre Vergehen nicht belangt werden. Entgegen jedem Unternehmenslenker haften Politiker nicht für Fehlverhalten. Offensichtlich auch nicht für grob fahrlässiges oder gar vorsätzliches, denn die deutsche Staatsanwaltschaft untersteht der Politik. Auch Richter sind in Karrieresysteme eingebunden, sodass die letzten fünf Jahre besonders deutlich gezeigt haben, in welche Situation sich „mutige Richter“ bringen. „Bestrafe einen, erziehe hundert“, sagte hierzu einst ein bekannter politischer Führer eines Landes, mit dem Deutschland nicht verglichen werden möchte.
DIE FRIEDENSTAUBE FLIEGT AUCH IN IHR POSTFACH!
Hier können Sie die Friedenstaube abonnieren und bekommen die Artikel zugesandt, vorerst für alle kostenfrei, wir starten gänzlich ohne Paywall. (Die Bezahlabos fangen erst zu laufen an, wenn ein Monetarisierungskonzept für die Inhalte steht). Sie wollen der Genossenschaft beitreten oder uns unterstützen? Mehr Infos hier oder am Ende des Textes.
Eine Tat wird (abgesehen vom Gesetz) erst durch die individuelle Bewertung zu einem Unrecht. Wie die Dinge „einzuordnen“ sind, erklären die Täter, die Politiker, tagtäglich selbst und werden hierbei von ihren Propagandamitarbeitern unterstützt, die sich selbst immer noch als Journalisten bezeichnen. Wer aber die staatliche Einordnung anzweifelt oder dieser gar offen widerspricht, wird unter Anwendung der vorgenannten Systematik „Bestrafe einen, erziehe hundert“ diffamiert. Aber hierbei bleibt es nicht, denn Hausdurchsuchungen in Herrgottsfrühe, Kontosperrungen, Untersuchungshaft und Jobverlust sowie dauerhafte Inhaftierungen sind nur einige Beispiele dafür, wie „im besten Deutschland aller Zeiten“ vorgegangen wird.
Der Gamechanger
Aber wie wäre der Zustand denn zu ändern, wenn man es denn wollte? Der Staat wird eben durch diese Politiker repräsentiert und hat das Gewaltmonopol. Hierzu einige Zahlen zu Deutschland:
- Bevölkerung: ca. 83.000.000
- Polizisten: ca. 340.000 incl. Verwaltungspersonal (0,4 % der Bevölkerung)
- Soldaten: ca. 260.000 (0,31 % der Bevölkerung)
- Gerichte: ca. 1.085 (pro Gericht 77.000 Bürger)
- Finanzämter: ca. 600 (pro Finanzamt 138.000 Bürger)
Mit Blick auf diese Verhältnisse wird schnell deutlich, dass die Politiker auf eine „Kooperation“ der Bürger angewiesen sind. Würden die Bürger nicht kooperieren, so wären alle Gesetze und Vorschriften aufgrund mangelhafter Durchführbarkeit von heute auf morgen Makulatur.
Mahatma Gandhi und viele andere bewiesen, dass ein übermächtig scheinender Gegner nicht mit dessen Gewaltmitteln besiegt werden kann, sondern mit dem Gegenteil. Gandhi beispielsweise rief die Menschen in seinem Land auf, den Engländern einfach nicht mehr zu gehorchen und die ungerechten Gesetze nicht mehr zu befolgen. Bei den Engländern hat dies funktioniert.
Man stelle sich als Gedankenexperiment einmal vor, wie es wäre, wenn ein Drittel der Bürger nicht mehr arbeiten und keine Steuern und sogar keine GEZ-Gebühren mehr bezahlen würden. Wie könnten diese Menschen „zur Ordnung“ gerufen werden? Wie wollte man diese Menschen bestrafen? Bestrafungskonzepte funktionieren nur dann, wenn sich die Menschen durch diese einschüchtern lassen. Sofern aber die Vielen solidarisch agieren würden, hätte ein Staatsapparat schlechte Karten. Insbesondere dann, wenn ziviler Ungehorsam bundesweit oder sogar EU-weit ausgeübt würde.
In solch einem Fall käme es wahrscheinlich sehr schnell zu einer Verständigung, denn wie sollte eine Regierung mit so viel Gegenwind weiter agieren? Die Prämisse bei solch einem Gedankenexperiment ist, dass ein erheblicher Teil der Bevölkerung sich so „miss-regiert“ fühlt, dass dieser Teil der Bevölkerung bereit ist, seine Komfortzone zum eigenen Wohl und dem Wohl der ihm Anvertrauten zu verlassen. Wahrscheinlich würde das noch nicht einmal besonders lange dauern. Man erinnere sich noch an die Zeiten, als Gewerkschaften noch nicht gekapert waren und tatsächlich die Interessen ihrer Mitglieder vertraten. Damals konnten die aufrechten Gewerkschaftsvertreter im Schulterschluss mit den Arbeitern für sie bessere Ergebnisse erwirken.
Weg mit dem Grundgesetz
In Deutschland wurde insbesondere in letzter Zeit von den Politikern am Grundgesetz herumgebastelt, aber dieses Grundgesetz, welches nach Vollendung der Einheit und Freiheit Deutschlands für das gesamte deutsche Volk gilt, verliert seine Gültigkeit an dem Tage, an dem eine Verfassung in Kraft tritt, die von dem deutschen Volke in freier Entscheidung beschlossen worden ist. Dies ist in Artikel 146 GG nachzulesen.
Das Grundgesetz vom 23. Mai 1949 in der jeweils aktuellen Fassung ist die (vorläufige) Verfassung der Bundesrepublik Deutschland. Das Grundgesetz wurde im Jahre 1949 zunächst bewusst als provisorische Regelung der staatlichen Grundordnung geschaffen. Eine Verfassung für Deutschland hingegen wäre ein besonderes Gesetz, welches bestimmt, wer in einem Staat die Macht ausübt und wie das geschehen soll. Dort ist festgelegt, welche Aufgaben der Staat übernimmt, welche Rechte jeder Bürger hat und wie das Verhältnis zwischen staatlichen Organen und Bürgern aussieht. Solch eine Verfassung hat Deutschland (noch) nicht.
Man stelle sich nun vor, das deutsche Volk gäbe sich, so wie im Grundgesetz verankert, in freier Entscheidung eine Verfassung, welche exemplarisch Elemente zu folgenden Themen beinhalten würde:
- Jeder Politiker wird an seinen Wahlversprechen gemessen.
- Bei Amtsantritt wird ein Dienstvertrag, ähnlich wie bei einem Vorstand einer AG oder einem Geschäftsführer einer GmbH, abgeschlossen. In diesem Dienstvertrag wird auch geregelt, wie bei Verstößen vorgegangen wird.
- Das Parteiensystem wird abgeschafft.
- Die Staatsanwaltschaft ist nicht weiter weisungsgebunden und die Politiker nicht weiter immun. Die Gerichtsbarkeit wird wirklich unabhängig.
- Jeder Politiker hat eine entsprechende Qualifikation nachzuweisen, um gewählt werden zu können.
- Ein transparentes Wahlsystem. Schluss mit den manipulativen „Umfragen“.
- Direkte Demokratie.
- Etc.
Statt am Grundgesetz herumzuwerkeln, könnte es eine Option sein, eine gerechte Verfassung zu beschließen, welche darauf ausgerichtet ist, den Bürgern zu dienen. Das GG würde dadurch obsolet. Mit einer gerechten Verfassung könnte sehr viel Optimierungspotenzial für das Zusammenleben in Deutschland realisiert werden.
Die von den Politikern angebotenen Lösungen für die Probleme unserer Zeit beziehen sich oftmals auf selbst oder von den wirklich Mächtigen erschaffene Zustände, welche inszeniert wurden/werden, um die Menschen in Krieg, Not und Knappheit, in Leiden, in Angst, in Spaltung, in Fehlernährung, in Medikamentenabhängigkeit, in Krankheit und in Elend zu bringen. Um an den Menschen maximal zu verdienen und um diese vollumfänglich zu beherrschen. So, wie sie es mit Nutzvieh tun. Das Unterordnen von allem ist ein Prinzip, dass wenigen Leuten nützt und fast allen anderen schadet.
Eine von Liebe inspirierte Gesellschaft, die Menschen nicht nur als „Verbraucher“ oder „Humankapital“ oder „Wähler“ betrachtet und behandelt, sondern tatsächlich das Wohl aller im Fokus hat, wäre der Gegenentwurf. Dies würde selbstverständlich einhergehen mit einer liebevollen Behandlung von Tieren und Natur. Hierbei profitieren aber die Vielen und die Wenigen ganz oben an der Spitze müssten sich umstellen, was ihnen nicht gefallen dürfte.
Vom Denken ins Tun
Wer sich solch eine Perspektive für sich selbst und seine Nachkommen wünscht, sollte überlegen, wie wir uns eine Verfassung geben können.
Ein wesentlicher Schritt wäre sicher der Zusammenschluss von Menschen, die sich mit den vorbezeichneten Überlegungen weiter befassen möchten. Ganz entgegen der Bemühungen unserer Politik um Spaltung der Gesellschaft sollten die Gemeinsamkeiten gesehen und gemeinsam Lösungen entwickelt werden.
Ein Beispiel ist die Initiative von Milosz Matuschek, nämlich sein geplantes „Gipfeltreffen“. Hierzu schreibt er:
„Ich habe mir ein besonderes Programm überlegt, welches mein Wissen und meine Erfahrung der letzten Jahre bündelt, sich an den Stufen der Selbsterkenntnis, Willensbildung und Kraftentfaltung orientiert und genug Raum für die Dynamik der Gruppe, also ihre Energien, lässt. Erwarten Sie das Unerwartbare. Es wird Raum geben für spirituelle und körperliche Erfahrungen, auch an einem besonderen kulturellen Rahmenprogramm wird es nicht fehlen. Uns eint im Idealfall das Erkennen menschlicher Potentiale, das Erfassen von Möglichkeitsräumen und die aktive Lust an der Mitgestaltung der Zukunft – ohne Denkverbote. Zeit, für unseren Frühling. Ich wette, in Ihnen steckt ein ganzer, unendlicher Sommer.“
In diesem Kontext zitiert Herr Matuschek Ernst Jünger:
“Wenn alle Institutionen zweifelhaft oder sogar anrüchig werden und man selbst in den Kirchen nicht etwas für die Verfolgten, sondern für die Verfolger öffentlich beten hört, dann geht die sittliche Verantwortung auf den Einzelnen über, oder besser gesagt, auf den noch ungebrochenen Einzelnen.”
Diese Worte von Ernst Jünger erinnern daran, dass die Probleme unserer Zeit nicht neu sind. Die Technologien sind es, denn mit modernen Technologien lässt sich eben besser unterdrücken als mit dem alten Zeugs. Die Methodik allerdings ist geblieben. Halte deine Untergebenen schwach und in Angst, damit diese ergeben bleiben. Zum Wohle einiger wenige Leute, die hiervon maximal profitieren.
Machen Sie mit und lösen Sie sich aus der Passivität des Zuschauers. Der wichtige nächste Schritt ist, aus dem Denken ins Tun zu kommen.
Andernfalls wird uns weiter an-getan.
Ludwig F. Badenhagen (Pseudonym, Name ist der Redaktion bekannt).
Der Autor hat deutsche Wurzeln und betrachtet das Geschehen in Deutschland und Europa aus seiner Wahlheimat Südafrika. Seine Informationen bezieht er aus verlässlichen Quellen und insbesondere von Menschen, die als „Verschwörungstheoretiker“, „Nazi“, „Antisemit“ sowie mit weiteren Kampfbegriffen der dortigen Systemakteure wie Politiker und „Journalisten“ diffamiert werden. Solche Diffamierungen sind für ihn ein Prädikatsmerkmal. Er ist international agierender Manager mit einem globalen Netzwerk und verfügt hierdurch über tiefe Einblicke in Konzerne und Politik.
LASSEN SIE DER FRIEDENSTAUBE FLÜGEL WACHSEN!
Hier können Sie die Friedenstaube abonnieren und bekommen die Artikel zugesandt.
Schon jetzt können Sie uns unterstützen:
- Für 50 CHF/EURO bekommen Sie ein Jahresabo der Friedenstaube.
- Für 120 CHF/EURO bekommen Sie ein Jahresabo und ein T-Shirt/Hoodie mit der Friedenstaube.
- Für 500 CHF/EURO werden Sie Förderer und bekommen ein lebenslanges Abo sowie ein T-Shirt/Hoodie mit der Friedenstaube.
- Ab 1000 CHF werden Sie Genossenschafter der Friedenstaube mit Stimmrecht (und bekommen lebenslanges Abo, T-Shirt/Hoodie).
Für Einzahlungen in CHF (Betreff: Friedenstaube):
Für Einzahlungen in Euro:
Milosz Matuschek
IBAN DE 53710520500000814137
BYLADEM1TST
Sparkasse Traunstein-Trostberg
Betreff: Friedenstaube
Wenn Sie auf anderem Wege beitragen wollen, schreiben Sie die Friedenstaube an: milosz@pareto.space
Sie sind noch nicht auf Nostr and wollen die volle Erfahrung machen (liken, kommentieren etc.)? Zappen können Sie den Autor auch ohne Nostr-Profil! Erstellen Sie sich einen Account auf Start. Weitere Onboarding-Leitfäden gibt es im Pareto-Wiki.
-
@ 958f314c:9188db81
2025-04-14 04:13:42Ingredients
- 1/2 block of pepper jack
- 1 block of mild cheddar
- 1/2 block of sharp cheddar
- A box of cheese Ragu (or homemade cheese sauce)
- Macaroni noodles
- Butter
- 2 cups of Milk
- Chicken broth
Directions
- Cook macaroni in chicken broth until tender
- Drain macaroni (set chicken broth to the side if making cheese sauce), add butter to hot macaroni
- Shred blocks of cheese
- Put macaroni in a casserole dish
- Add Ragu (or homemade cheese sauce), add milk to Ragu container, and pour into a casserole dish (or about 2 cups of milk)
- Add shredded mild cheddar, sharp cheddar, and pepper jack to the casserole dish. Mix well.
- Add extra shredded cheese on top
- Bake until all cheese is melted at 350F for about 15 minutes. Broil for 3-5 minutes for a crispier top.
-
@ 502ab02a:a2860397
2025-04-14 03:32:56หรือต้นน้ำของปัญหาจะเป็น UPOV 1991?
เมื่อพูดถึงสิทธิในเมล็ดพันธุ์ หลายคนอาจนึกถึงแค่เรื่องเกษตรกรรมพื้นบ้านหรือพันธุ์พื้นเมืองที่ใช้สืบต่อกันมาในครอบครัว แต่ความจริงแล้ว ในโลกเบื้องลึกของการค้าระหว่างประเทศ มีข้อตกลงที่เปลี่ยน "เมล็ดพันธุ์" ให้กลายเป็น "ทรัพย์สินทางปัญญา" และอาจเปลี่ยนเกษตรกรให้กลายเป็นผู้ละเมิดลิขสิทธิ์โดยไม่รู้ตัว... นั่นคือ UPOV 1991
UPOV (ยูพอฟ) หรือ International Union for the Protection of New Varieties of Plants คือองค์กรที่เริ่มต้นขึ้นในยุโรปตั้งแต่ปี 1961 โดยมีเจตนาดีในช่วงแรก คือคุ้มครองนักปรับปรุงพันธุ์พืช ให้มีแรงจูงใจในการพัฒนาสายพันธุ์ใหม่ๆ แต่เมื่อระบบทุนนิยมเข้ามาขับเคลื่อนกลไกเกษตรอุตสาหกรรม ข้อตกลงฉบับ UPOV 1991 จึงกลายร่างเป็นเครื่องมือที่ทรงพลังที่สุดในการผูกขาดพันธุกรรมของพืช
UPOV 1991 คือชื่อย่อของ อนุสัญญาสหภาพเพื่อคุ้มครองพันธุ์พืช ฉบับปี 1991 (International Convention for the Protection of New Varieties of Plants – 1991 Act) ซึ่งเป็นหนึ่งในกฎหมายระหว่างประเทศที่ทรงอิทธิพลที่สุดในโลกเรื่อง “สิทธิในเมล็ดพันธุ์” คล้ายกับลิขสิทธิ์สำหรับนักปรับปรุงพันธุ์พืช (Plant Breeders' Rights) และถือว่าเป็นเวอร์ชันที่ “โหดสุด” สำหรับเกษตรกรรายย่อยและประเทศกำลังพัฒนา โดยเฉพาะเมื่อเทียบกับฉบับเก่าอย่าง UPOV 1978
หนึ่งในบทบัญญัติที่อันตรายที่สุดของ UPOV 1991 คือการห้ามเกษตรกรเก็บเมล็ดพันธุ์ไว้ปลูกในฤดูกาลถัดไป (farm-saved seeds) โดยเฉพาะหากพันธุ์นั้นได้รับการจดทะเบียนในระบบของ UPOV แล้ว ซึ่งหมายความว่า แม้ชาวนาจะซื้อเมล็ดมาปลูกบนที่ดินของตัวเอง ดูแลด้วยสองมือจนได้ผลผลิต พอเก็บเมล็ดไว้ปลูกต่อปลูกซ้ำ กลับกลายเป็นว่าละเมิดสิทธิของเจ้าของพันธุ์เสียอย่างนั้นและโดนฟ้องได้
รวมถึงห้ามนำเมล็ดไปแลกเปลี่ยนหรือแจกจ่ายให้คนอื่น แม้แต่การแบ่งเมล็ดให้เพื่อนบ้าน ก็อาจถือว่าละเมิดสิทธิ์ของเจ้าของพันธุ์ได้
พูดง่ายๆคือ มันคือการเปลี่ยนเมล็ดพันธุ์ธรรมชาติ ให้กลายเป็นซอฟต์แวร์ ที่ต้องซื้อ license ใหม่ทุกปี
ไม่เพียงเท่านั้น UPOV 1991 ยังขยายขอบเขตการคุ้มครองไปถึง "พืชลูกหลาน" ที่สืบทอดลักษณะทางพันธุกรรมของพันธุ์ต้นแบบ แม้เกษตรกรจะเพาะปลูกและคัดเลือกสายพันธุ์ต่อยอดเอง แต่หากลักษณะสำคัญยังใกล้เคียงกับพันธุ์ดั้งเดิม ก็ยังถือว่าละเมิดอยู่ดี
นี่จึงเปิดทางให้บริษัทใหญ่ระดับโลก เช่น Monsanto (ปัจจุบันกลืนรวมกับ Bayer) มีสิทธิครอบครองสายพันธุ์พืชแบบเกือบเบ็ดเสร็จ และเรียกเก็บค่าลิขสิทธิ์จากเกษตรกรายปีได้
ลองจินตนาการดูว่า หากวันหนึ่งทุกผักในตลาด ไม่ว่าจะเป็นข้าว ข้าวโพด พริก มะเขือ หรือแม้แต่บรอกโคลี เป็นสายพันธุ์ที่ต้องจ่ายค่าลิขสิทธิ์ทุกปี เกษตรกรจะยังมีอิสระในการเพาะปลูกอยู่หรือไม่?
ประเทศไทยเอง แม้ยังไม่เข้าร่วม UPOV 1991 อย่างเป็นทางการ แต่ก็เผชิญแรงกดดันจากข้อตกลงการค้าเสรี (FTA) และกลุ่มทุนต่างชาติให้แก้ไขกฎหมายภายใน เช่น ร่าง พ.ร.บ.คุ้มครองพันธุ์พืช ที่เคยถูกวิจารณ์อย่างหนักว่าเลียนแบบ UPOV 1991 แทบทุกบรรทัด
ในขณะที่โลกกำลังพูดถึง "Seed Sovereignty" หรืออธิปไตยของเมล็ดพันธุ์ การรักษาสิทธิของเกษตรกรในการเก็บ แลกเปลี่ยน และปรับปรุงพันธุ์พืชโดยไม่ถูกผูกขาดด้วยระบบลิขสิทธิ์ UPOV 1991 กลับทำหน้าที่ตรงข้ามอย่างสิ้นเชิง
มันไม่ใช่แค่ข้อตกลงที่เขียนด้วยภาษากฎหมาย แต่มันคือกรงขังที่มองไม่เห็น ที่ล็อกเกษตรกรเอาไว้กับพันธุ์พืชที่พวกเขาไม่ได้เป็นเจ้าของ แม้จะปลูกมันเองกับมือก็ตาม
ทางออกเดียวอาจไม่ใช่แค่การไม่เข้าร่วม UPOV 1991 แต่คือการกลับมาสร้างระบบอาหารที่ยั่งยืนตั้งแต่เมล็ดพันธุ์ ระบบที่ให้สิทธิ์กับผู้ปลูกอย่างแท้จริง ไม่ใช่ระบบที่ให้อำนาจแค่กับผู้จดทะเบียน
แล้วอะไรจะเป็น right exit? #pirateketo #กูต้องรู้มั๊ย #ม้วนหางสิลูก
-
@ 147ac18e:ef1ca1ba
2025-04-14 00:28:18There’s no shortage of hype around AI. But beneath the buzzwords, Geoff Woods lays out something much more grounded—and frankly, more useful—on his recent appearance on The What Is Money Show. Geoff, who wrote The AI Driven Leader, isn’t here to pitch you a prompt template or a new tool. He’s here to talk about leadership, responsibility, and how to actually get value from AI.
His argument is simple: AI is no longer optional. It's a leadership imperative. And yet, despite nearly every executive claiming to believe in its future, less than 5% are doing anything meaningful with it. Geoff’s take? If you’re delegating AI to the tech team, you’re missing the point. This is about vision, strategy, and leading your people into a new era.
But here’s the rub: you don’t need to become an AI expert. You just need to become what Geoff calls an AI-driven leader—someone who knows how to spot valuable use cases, communicate clearly with AI, and stay in the driver’s seat as the thought leader. It’s not about handing off decisions to a machine. It’s about using the machine to sharpen your thinking.
To do that, Geoff leans on a framework he calls CRIT: Context, Role, Interview, Task. It’s dead simple and wildly effective.
CRIT Framework: Geoff’s Go-To Prompting System
Write every AI prompt using:
-
Context – the background situation
-
Role – what persona you want AI to take (e.g., CFO, board member, therapist)
-
Interview – have AI ask you questions to pull deeper insights
-
Task – what you want AI to do after collecting enough context
Give the AI rich context, assign it a role (board member, CFO, therapist—whatever you need), have it interview you to pull out what’s really going on in your head, and then define the task you want it to execute. That flip—getting the AI to interview you—is the difference between mediocre results and strategic breakthroughs.
He shared some standout examples:
- Using AI as a simulated board to test strategy decks and predict which slides will blow up in a real meeting.
- Having AI draft executive emails in a tone blend of your own voice, plus a dash of Simon Sinek and David Goggins.
- Creating AI-generated personas of your kids’ strengths to show them how to use tech to deepen—not replace—their humanity.
That last point matters. Geoff’s raising his own kids to be AI-native, but not tech-addicted. His daughter used AI to explore business ideas. His son used it to work through emotional challenges. In both cases, the tool was secondary. The focus was helping them grow into more aware, capable versions of themselves.
He’s honest about AI’s limitations too. It hallucinates. It’s bad at math. It can’t replace deep human judgment. But if you use it right—if you treat it like a thought partner instead of a magic 8-ball—it becomes an amplifier.
Geoff’s challenge to all of us is to stop anchoring our identity to who we’ve been, and start leaning into who we could become. Whether you’re running a company, managing a classroom, or figuring out your next move, the opportunity is the same: use AI to 10x the things that make you most human.
And it all starts with one sticky note: How can AI help me do this?
If you’re interested in diving deeper, check out aileadership.com or pick up his book The AI Driven Leader. But more importantly, start experimenting. Get your reps in. Think bigger.
Because a year from now, the version of you that’s already doing this work? They’re going to be very hard to compete with.
-
-
@ ac58bbcc:7d9754d8
2025-04-13 23:35:36Introduction
Many school districts allocate significant budgets for curriculum materials like textbooks and workbooks, but these resources often fail to provide teachers with the deep conceptual understanding needed to teach mathematics effectively. Administrators face the challenge of ensuring that their teachers have the support they need from books and worksheets and partners who understand how children learn math and the gaps in learning as they exist today.
The Problem: Books and Worksheets Are Not Enough
- Limited Depth in Conceptual Learning
- Curriculum materials often focus on procedural fluency rather than deep conceptual understanding. While these resources provide a structured framework for instruction, they do not equip teachers with the tools to address individual student learning styles or challenges.
- Lack of Ongoing Professional Support
- Administrators frequently allocate budgets for professional development workshops and materials but struggle to ensure that teachers receive ongoing, personalized support throughout the school year. Teachers often face unique classroom dynamics and need immediate assistance, yet many districts lack a consistent partnership with experts who can provide this guidance.
- Ineffectiveness in Meeting Diverse Needs
- Students learn at different paces and in different ways. Curriculum materials alone cannot address the varied needs of all students. A comprehensive support system is needed to help teachers differentiate instruction, support struggling learners, and challenge advanced students effectively.
Solution: Math Success by DMTI
Math Success by DMTI offers a more effective approach to elementary math education. Here’s what sets it apart:
- Focus on Conceptual Understanding:
- The program emphasizes deep conceptual understanding through real-life examples that tie procedures back to the underlying math concepts. Students understand not just how but also why strategies and procedures work.
- Modeling Problems:
- Math Success by DMTI teaches students to model problems using visual models like bar models, number lines, and equations. This approach ensures they see the math conceptually and can apply it in various contexts.
- Ongoing Support Throughout the Year:
- The program provides more than just one-time workshops; it offers ongoing support through expert coaches who work directly with teachers throughout the school year. Teachers receive guidance on lesson planning, classroom management, and student engagement strategies.
- Flexible Resources:
- Math Success by DMTI includes comprehensive resources such as assessments, instructional units, exit tickets, practice sheets, research-based games, and parent materials tailored to meet diverse learning needs.
- Consistent Language and Structure:
- The program uses consistent language and structure in teaching words from kindergarten through graduation. This consistency helps students build a strong foundation and facilitates smoother transitions between grade levels.
Teacher Testimonials: Real Impact
Educators have reported significant improvements in student achievement after implementing Math Success by DMTI:
- Increased Student Proficiency:
- For example, one third-grade teacher saw her students’ proficiency increase from 32% to 76% within a single academic year. This kind of growth demonstrates the program's effectiveness and its ability to foster deeper learning.
Conclusion
By adopting Math Success by DMTI, administrators can ensure that their teachers have the tools they need to teach math concepts effectively. With expert coaches embedded in classrooms for ongoing support, research-backed methodologies, flexible resources, and a focus on the right things in the right order, districts can create environments where students truly thrive.
Math Success by DMTI stands out as an exceptional partner for schools looking to improve math education. By bridging the gap between research and practice, Math Success by DMTI empowers educators to increase student achievement and foster a love for mathematics.
-
@ c066aac5:6a41a034
2025-04-13 23:09:14“If a man is considered guilty For what goes on in his mind Then give me the electric chair For all my future crimes”
-Electric Chair by Prince
The very last paragraph of Touré’s 2013 biography of Prince I Would Die 4 U: Why Prince Became an Icon made a very bold claim about the lewd nature of Prince’s music:
“Imagine America as one house on a suburban lane… Prince knocked on America’s door through his music. He came to the door holding a guitar and an umbrella while concealing a Bible. He flirted his way inside the door and told us he had a dirty mind and was controversial, and then he sat down in the living room on the good couch. And, when America’s guard was down, because we thought we were having a conversation about sex, Prince eased out his Bible and said, let me also tell you about my Lord and savior, Jesus Christ.”
Wow. Talk about a Sixth Sense level plot twist! I will say if you’re well versed in Prince’s catalog (I listened to every Prince album released [except for The Black Album because Jack Dorsey is holding it hostage on Tidal] last year) it won’t be as shocking as a surprise as it would be to the unversed listener, but surprising nonetheless considering the content of the man’s lyrics (and life).
Regardless of whether or not Prince achieved this goal of bringing people to Christ via a vehicle of sexy shock value, he was a person of impact. The book by Touré I mentioned earlier is a great picture of the life he lived, and I’m sure there are many others that people can recommend in the comments. He touched many lives and I believe his music will still be listened to for many years to come.
Prince’s method of evangelism may have been unconventional (to say the least), but I still think there is something to be learned from his efforts.
Obviously, worshiping sex or encouraging lust isn’t great. Prince’s view of sex was broken; they didn’t line up with Biblically ordered sex (see his songs Sister, Darling Nikki, Sexy M.F., and many many more). His inability to sustain healthy relationships or make meaningful lasting connections with those around him are a testament to that.
Despite his flaws, his art captured an entire generation - and continues to capture the attention of people seeking true art. His authenticity, raw emotion, and intentionality made for true connection between his music and his listeners. He resonated with people’s souls, and still does today. Perhaps Touré was wrong and Prince didn’t mean to evangelize through his music, but don’t all people stand testament to the powerful work of God?
We are all broken people. Our job is to the use the tools and resources set before us to spread the Gospel. “…we have this treasure in clay jars, so that it may be made clear that this extraordinary power belongs to God and does not come from us.” -2 Corinthians 4:7
The Western Church should consider using the seemingly profane, off limits, unconventional, or even just plain weird in an effort to continue to spread the gospel. On a high level, that’s our good-christian dinner table no-gos: Sex, Money, and Politics. I believe that the Church’s abdication of such conversations is the reason why those are areas of failure for the Church at large. We shouldn’t sin or condone/promote sin. Instead, I’m proposing that like how Prince used sex in his music to get people to learn about Jesus, Christian Bitcoiners should use money (Bitcoin) to do good works and lead people to Jesus in the process. We may just make the world a better place along the way.
“If you're sick of cryin' and tired of tears Then close your eyes and open your ears Listen to the music, listen to the song Listen to your heart, is that so wrong? Stop lookin' in the mirror, there's nothin' to fear Your salvation is near 1,000 light years away from here”
-1,000 Light Years From Here by Prince
It doesn’t take a lot of mental effort to see how Christian’s could leverage Bitcoin’s magic for kingdom work. Look Alex Gladstein’s writings. Look at the work that Gridless is doing in Africa. Look at Roya Mahboob’s impact in Afghanistan. Look at the impact of Bitcoin Beach in El Salvador.
Now imagine what the Church (and by the Church, I mean you and I the Christian Bitcoiners) could do with Bitcoin:
A Christian Bitcoiner could help the woman with an abusive husband escape a bad situation with finances intact by teaching her how to use Bitcoin and keep self-custody wallet. An orange-pilled youth group leader could teach the inner city kid in a bad household how to set up a wallet and stack sats without the permission of the dead beat parents or conventional employment. The church bake sale could make things easy via accepting lightning payments, bringing in outsiders for sweet treats and teaching them about how to be a Bitcoin merchant. A church could send funds to a missionary across the world in a christian adverse country instantly without having to involve a single bank, and that missionary would have those funds same-day ready for deployment.
“Everybody's looking for the ladder Everybody wants salvation of the soul The steps you take are no easy road But the reward is great For those who want to go”
-The Ladder by Prince
In my own attempts to teach people about the virtues of Bitcoin, I find it usually clicks for people in one of two different ways for the most part:
The first way it clicks is when they can receive and send a lightning payment. The instant funds make a light bulb go off.
The second way is when I show them the humanitarian impact that Bitcoin has had and is counting to have. The use of Bitcoin internationally as a means of humanitarian aid/sovereignty for the less fortunate should shut down any questions like “But what about (insert crapcoin)?” in an instant.
Much like how people get Bitcoin once they see it in action, I believe people will get Jesus when they see Jesus’ Church in action. One of the best ways today the Church can display that action may be through Bitcoin.
Sex was Prince’s trojan horse for something much deeper that he wanted to convey to people. Bitcoin can be the trojan horse for the Church. The Church could gain attention for what they’re doing with Bitcoin similar to the attention that the Human Rights Foundation gets. One might ask why use a trojan horse? I think that Bitcoin adoption itself has been a bit of a trojan horse movement. Your local politicians didn’t bat an eye when they heard about a peer-to-peer e-cash system, but they were all over it when it was presented as a digital gold. Michael Saylor has garnered a lot of hate from the Bitcoin true-believers for presenting Bitcoin as a digital gold as opposed to a currency, but I believe he knows what he’s doing and he’s presenting in this manner on purpose. He might not get gratitude for it from the community, but I believe he’s willing to be the bad guy in order to further the mission (see Christopher Nolan’s The Dark Night [which is arguably a Jesus story]).
Christian Bitcoiner, I challenge you to channel your enthusiasm to do good in your neighborhood. Let the world see your actions and gain a curiosity for what you’re doing. The Bitcoin conversation will make many people think that you’re crazy, that you’re an idiot when it comes to investing, that you’re selling a scam. Much like how people wrote off Prince for being a vulgar musician. Much like how people write off Michael Saylor for misunderstanding Bitcoin. Much like how people wrote off (and continue to write off) Jesus for being a false prophet or the leader of a rebellion.
But there will be someone who sees the work that you do with Bitcoin. The work that the Church will do with Bitcoin. Even if just one soul is saved with Bitcoin, that’s worth the effort.
“Black day, stormy night No love, no hope in sight Don't cry, He is coming Don't die without knowing the cross” -The Cross by Prince
This article was written with help from my wife Elaina freedom@happytavern.co
Feel free to drop your favorite book about Prince, favorite Prince song, or favorite Prince album in the comments
Or, you can drop your favorite Bitcoin as a trojan horse story in the comments
-
@ 1ef61805:f18312cc
2025-04-13 22:40:49In today’s increasingly surveilled digital world, privacy and security are paramount. OpSec Academy has taken a major step forward by customizing TailsOS to create OpSecOS, an operating system built with the same focus on anonymity and privacy, but enhanced with a suite of peer-reviewed and battle-tested applications. These applications empower users with decentralised tools, ensuring complete control over their digital lives while maintaining the high standards of security and privacy that OpSec Academy stands for.
In this article, we’ll explore the tools available in OpSec Academy’s custom OpSecOS image, highlighting the new and updated features that enhance security, decentralisation, and privacy.
-
Sparrow Wallet (Version 2.1.3) Sparrow Wallet remains one of the most privacy-conscious Bitcoin wallets available. It provides an advanced suite of features such as multi-signature support, coin control, and hardware wallet integration, which allow users to have complete control over their funds. By integrating Sparrow Wallet into OpSecOS, we ensure that Bitcoin transactions are handled with the highest standards of privacy, all while utilising Tor to anonymise transaction data. Peer-Reviewed & Battle-Tested: Sparrow Wallet has been rigorously tested by the privacy community and has earned a reputation for robustness and security. Its commitment to user privacy makes it one of the most trusted Bitcoin wallets in the ecosystem.
-
Feather Wallet (Version 2.7.0) Feather Wallet is a lightweight yet powerful Bitcoin wallet designed with privacy and simplicity in mind. Featuring Tor support and integration with hardware wallets, Feather Wallet ensures that users' private information remains secure while offering an intuitive user experience. By adding Feather Wallet to OpSecOS, we provide an easy-to-use wallet solution without compromising security. Peer-Reviewed & Battle-Tested: Feather Wallet has undergone thorough peer review and is widely regarded as a secure and privacy-focused option for Bitcoin users. Its simplicity and security features have been battle-tested by users in real-world environments.
-
Liana Wallet (Version 10.0) Liana Wallet is a Bitcoin wallet designed with a strong emphasis on long-term security, recovery, and inheritance. It allows users to set up primary keys for regular spending and recovery keys that activate after a specified period of inactivity, making it ideal for scenarios where funds need to be securely passed on without relying on third-party custodians. The wallet supports advanced features like on-chain timelocks, enabling users to create time-locked backup keys for inheritance planning. Additionally, Liana offers a user-friendly interface with ready-made templates, such as "Simple Inheritance" and "Expanding Multisig," to simplify the wallet setup process. For those seeking a comprehensive solution, the Liana Box Starter Pack includes hardware signing devices, tamper-evident bags, seed phrase storage, and an inheritance letter, providing everything needed to set up a secure and resilient Bitcoin wallet.
-
Snort & Iris (Nostr Clients) For decentralised, secure communication, OpSecOS includes two leading Nostr protocol clients: Snort and Iris. These applications allow users to send and receive messages privately across a peer-to-peer network, eliminating the need for centralised messaging platforms that can compromise privacy. Snort: A minimalist interface for basic, secure messaging.
Iris: A feature-rich client that provides more tools and options for a robust, decentralised messaging experience.
Peer-Reviewed & Battle-Tested: Both Snort and Iris have been reviewed by the community for their security, decentralisation, and resilience. These clients have been battle-tested in real-world environments where privacy and security are non-negotiable, making them trusted tools for secure communications. By including both Snort and Iris, users of OpSecOS have a flexible and secure communication platform that protects their privacy.
-
BIP39 - Ian Coleman’s Tool Managing Bitcoin securely requires careful attention to wallet seed phrases. BIP39 allows users to generate mnemonic seed phrases offline, protecting against online threats. By integrating Ian Coleman's BIP39 tool into OpSecOS, we provide a secure, offline method for generating and managing wallet backups, ensuring users’ funds remain under their control at all times. Peer-Reviewed & Battle-Tested: The BIP39 tool is widely regarded as one of the most secure and trusted methods for generating wallet seed phrases. It has been peer-reviewed by security experts and used in countless real-world scenarios to ensure the safe recovery of cryptocurrency wallets.
-
Mempool.space Mempool.space is a real-time visualisation tool for Bitcoin’s mempool — the collection of unconfirmed transactions awaiting inclusion in the next block. This tool allows users to see transaction fees, network congestion, and block size, helping them optimise their Bitcoin transactions for speed and cost-effectiveness. Mempool.space provides an edge for users who want to monitor Bitcoin’s network activity and ensure that their transactions are processed in the most efficient manner. Peer-Reviewed & Battle-Tested: Mempool.space is used by advanced Bitcoin users, miners, and developers worldwide to monitor and optimise transactions. It has been thoroughly reviewed and is trusted by the community as an indispensable tool for understanding Bitcoin's network dynamics.
**Why These Applications Matter ** The integration of these peer-reviewed and battle-tested applications into OpSecOS transforms it from a privacy-focused operating system into a powerful, decentralised security suite. Each of these tools has been carefully selected to provide users with more control over their digital assets, communications, and privacy. Whether you’re trading Bitcoin, Monero, or engaging in private communications, these tools ensure that you are operating in a trusted, decentralised environment free from surveillance or censorship. These applications, trusted by privacy experts, offer an elevated user experience built on the core principles of decentralisation, security, and privacy. With these tools, users can navigate the digital world with confidence, knowing their activities remain private and under their control.
**New and Improved for 2025 ** While some applications have been updated to the latest, most secure versions, others have been removed to ensure OpSecOS stays focused on delivering the best possible security. We’ve carefully vetted each app to make sure it meets the highest standards for privacy and decentralisation, removing older or less secure applications that could pose risks to our users.
**Conclusion ** OpSec Academy’s custom OpSecOS takes the trusted, privacy-focused foundation of TailsOS and supercharges it with a suite of powerful, peer-reviewed and battle-tested applications. Whether you’re managing your Bitcoin and Monero holdings, engaging in private communications, or ensuring your wallet is securely backed up, OpSecOS provides you with everything you need to operate in a decentralised, secure, and private environment. As surveillance and digital threats continue to grow, OpSecOS remains a vital tool for users looking to protect their privacy and maintain complete control over their digital lives. OpSec Academy is committed to continually improving OpSecOS to meet the evolving demands of privacy-conscious users. With OpSecOS, we provide an enhanced privacy experience that stays true to the principles of decentralisation and operational security.
OpSec Academy offers consultations for individuals or organisations looking to integrate OpSecOS into their security framework. Contact us securely for more information.
-
-
@ 4925ea33:025410d8
2025-04-13 21:33:54Quando peguei Confissões de Santo Agostinho pela primeira vez, confesso que me senti perdida. As palavras pareciam densas, distantes, como se eu tentasse escalar uma montanha sem saber por onde começar.
Buscava apenas a história de sua conversão ao cristianismo, mas o que encontrei uma profundidade teológica e filosófica que naquele momento não conseguia alcançar. Frustrada, deixei de lado a leitura.
Hoje, com um amadurecimento interior maior e contando com o auxílio da Inteligência Artificial como ferramenta de estudo e reflexão, reencontrei essa obra com um novo olhar. Sem pressa, busquei agora mergulhar na essência de cada página, tentando captar o máximo do pensamento de Agostinho — não apenas como filósofo, mas como homem profundamente transformado pela fé.
Antes da leitura: como começar
Se você nunca leu Confissões, ou se, como eu, já tentou e parou, quero te convidar a olhar para este livro com novos olhos.
Imagine Santo Agostinho sentado diante de você, não como um doutor da Igreja, mas como um amigo que abre o coração em oração. Ele escreve no final do século IV, já imerso na fé cristã, mas com a humildade de quem sabe que nunca compreenderá plenamente o mistério de Deus. Suas palavras são um diálogo íntimo com o Criador, uma oração que pulsa com fé, dúvida e amor.
E é nesse espírito que você deve lê a obra que o guiará em quatro grandes reflexões no primeiro capítulo:
- Quem é Deus?
- Quem somos nós?
- Qual é a nossa missão?
- E como conhecê-Lo?
Quem é Deus?
Agostinho começa com uma exclamação que ecoa até hoje:
“Grande és, Senhor, e infinitamente digno de Louvor!”.
Ele tenta descrever Deus, mas logo percebe que nenhuma palavra é suficiente.
Deus é imenso, incomensurável, eterno. É como se Agostinho, com os olhos da fé, tentasse abarcar o infinito com mãos humanas – e nos convidasse a fazer o mesmo.
Para ele, Deus está tão acima de nós que nossa mente limitada jamais poderia julgá-lo ou defini-lo. Mas, ao mesmo tempo, esse Deus grandioso se revela e nos escuta. Não é inacreditável pensar que o Criador de tudo deseja estar perto de nós, criaturas tão pequenas como nós?
Mergulhando neste profundo pensamento, vejo o quanto somos pretensiosos ao querer entender as escolhas de Deus e os acontecimentos da Bíblia, como se pudéssemos ter a ótica de Deus.
Muitas vezes não temos consciência dos tão pequenos somos em comparação ao Criador, tal ato é incoerente com tamanha distância.
Quem somos nós?
Se Deus é infinito, Agostinho nos lembra que somos apenas uma “ínfima fração” de Sua criação. Marcados pelo pecado original, carregamos em nós a fragilidade, mas também uma chama divina: a sede de Deus.
Ele escreve que, mesmo sem saber, nosso coração anseia por louvar o Criador. Não é fascinante? Pense nas tantas culturas e povos que, ao longo da história, buscaram um sentido maior, um “algo” além de si mesmos.
Para Agostinho, essa busca não nasce de nós, mas é um presente de Deus, que coloca em nosso coração o desejo de encontrá-lo. Essa ideia me tocou profundamente.
Quantas vezes nos sentimos inquietos, procurando algo que nem sabemos nomear? Agostinho nos diz que essa inquietude é, na verdade, o chamado de Deus, nos puxando para Ele.
Qual é a missão da humanidade?
“Tu nos fizeste para Ti, Senhor, e nosso coração está inquieto enquanto não repousa em Ti.”
Essa frase, uma das mais famosas de Confissões, resume a missão que Agostinho enxerga para nós: viver para Deus, amá-lo com todo o nosso ser.
Mas ele nos alerta: esse amor não é uma corrente que nos prende, mas uma escolha livre. É um relacionamento íntimo, único, que não deve ser imposto aos outros. Aqui, Agostinho me fez refletir sobre como compartilho minha fé.
Falar do amor de Deus é importante, mas nunca deve ser uma arma para julgar ou condenar. Afinal, só Deus conhece o coração de cada um.
Nossa missão é amar e testemunhar, deixando que o Espírito Santo faça o resto.
Conhecer ou invocar: o que vem primeiro?
Por fim, Agostinho se depara com um dilema que talvez você já tenha sentido: como posso invocar a Deus se ainda não o conheço? E como posso conhecê-lo se não o invocar?
A Igreja Católica reconhece que, para orar, precisamos de uma revelação divina – foi Deus quem primeiro veio até nós, mostrando-se através da criação, das Escrituras e, acima de tudo, de Jesus Cristo. Mas Agostinho também destaca o papel de quem nos apresenta a Boa Nova.
Na vida dele, foi Santo Ambrósio quem o guiou; na nossa, pode ser um padre, um amigo, uma comunidade. Essa reflexão me lembrou da importância da Igreja e dos irmãos de fé. Sozinhos, podemos nos perder em dúvidas ou confusões. Mas, com a ajuda de quem já trilhou o caminho, nossa oração ganha força e direção.
Fica aqui um convite à essa jornada para ler o primeiro capítulo de Confissões que é como abrir uma porta para dentro de si mesmo. Santo Agostinho não oferece respostas prontas, mas perguntas que nos aproximam de Deus: Quem Ele é para você? O que te impede de repousar n’Ele? Como você responde ao Seu chamado?
Se você quer mergulhar nessa obra, minha dica é: leia com o espírito de Santo Agostinho, ou seja, em oração e clemência para que as palavras atinjam a alma e as portas da clareza e compreensão sejam abertas.
Deixe que as palavras de Agostinho te guiem, não para entender tudo de uma vez, mas para sentir a presença de Deus um pouco mais perto e tenha paciência as vezes ainda não é o momento de ler.
E você, já leu Confissões? Como a história de Agostinho te inspira na sua fé? Conta aqui nos comentários – vamos caminhar juntos nessa jornada!
-
@ 7d33ba57:1b82db35
2025-04-13 20:29:11Puerto de Mogán is a postcard-perfect fishing village and marina on the southwest coast of Gran Canaria. With its canals, whitewashed buildings, and bougainvillea-covered balconies, it’s often called the island’s “Little Venice.” Add golden beaches, laid-back vibes, and a touch of luxury, and you've got one of the most charming spots on the island.
🌟 Things to Do in Puerto de Mogán
1️⃣ Stroll the Marina & Canals
- Wander the narrow lanes, stone bridges, and colorful floral walkways
- The marina is filled with yachts, cute cafés, and ice cream spots
- Don’t miss the fishermen’s quarter for a glimpse of local life
2️⃣ Relax on the Beach
- The small, calm beach is perfect for swimming or sunbathing
- Family-friendly, with soft sand and crystal-clear water
- Lined with restaurants and chill beach bars
3️⃣ Visit the Friday Market
- One of the biggest markets on the island
- Browse for local produce, souvenirs, clothes, and crafts
- The whole town buzzes with music and energy on market day
4️⃣ Climb for the View
- Head uphill behind the town for panoramic views over the marina and ocean
- Especially beautiful at sunset 🌅
5️⃣ Take a Boat Trip
- Explore the coast by catamaran or glass-bottom boat
- Dolphin-watching tours are popular, or boat taxis to nearby beaches like Puerto Rico
🍴 What to Eat
- Fresh seafood is a must—try grilled fish, octopus, or seafood paella
- Pair with local mojo sauces and a cold tropical beer or sangria
- For dessert, look for Bienmesabe (a sweet almond-based Canarian treat)
🎯 Travel Tips
✅ Puerto de Mogán is easy to reach by car or bus from other parts of the island
✅ It’s quieter than Playa del Inglés or Maspalomas, ideal for relaxing
✅ Stay overnight if you can—it’s magical when the crowds thin in the evening
✅ Great spot for couples, families, and anyone who loves beauty + calm -
@ 7d33ba57:1b82db35
2025-04-13 20:14:29Bratislava, Slovakia’s capital, may be small, but it packs a big personality. Perched on the banks of the Danube River, this medieval-meets-modern city blends cobbled old town charm with cool cafes, riverside strolls, quirky statues, and a hilltop castle overlooking it all. Whether you’re visiting on a day trip from Vienna or staying longer, Bratislava is laid-back, walkable, and full of surprises.
🌟 Highlights in Bratislava
1️⃣ Bratislava Castle
- Perched above the city with panoramic views of the Danube and Austria
- Home to the Slovak National Museum and historical exhibitions
- Great spot to catch the sunset or a breezy walk
2️⃣ Old Town (Staré Mesto)
- A maze of colorful baroque buildings, cozy courtyards, and lively cafés
- Landmarks include Michael’s Gate, Main Square, and the Old Town Hall
- Don’t miss quirky statues like Čumil, the sewer worker peeking out of a manhole
3️⃣ St. Martin’s Cathedral
- Once the coronation church of Hungarian kings
- Gothic vibes, beautiful interior, and right beneath the castle walls
4️⃣ UFO Observation Deck
- On the Most SNP (New Bridge), shaped like a flying saucer
- 360° views from 95m up—and there's even a rooftop restaurant/bar
5️⃣ Blue Church (Church of St. Elizabeth)
- One of Bratislava’s most photogenic spots—sky blue and whimsical
- Like something out of a fairytale, tucked in a quiet corner of town
🍽️ What to Eat in Bratislava
- Bryndzové halušky – Potato dumplings with sheep cheese and crispy bacon
- Kapustnica – Tangy sauerkraut soup with sausage
- Lokše – Potato pancakes filled with duck, cabbage, or sweet fillings
- Kofola – Slovakia’s cola alternative, with a herbal twist
- Try a glass of Slovak wine or Tatratea liqueur (strong stuff!)
🌿 Day Trips from Bratislava
- Devin Castle – Dramatic ruins on a cliff above the Danube (20 min by bus or boat)
- Small Carpathians wine region – Visit towns like Modra or Pezinok for tastings
- Danubiana Meulensteen Art Museum – Contemporary art on a peninsula in the river
- Vienna – Just an hour away by train, boat, or even bike along the Danube path
🎯 Quick Tips
✅ Bratislava is very walkable—you can see most highlights in a day
✅ Euros are the currency (not all places accept cards)
✅ Best times to visit: spring to early autumn for river views and café culture
✅ Take it slow—the city’s charm is in the atmosphere -
@ 592295cf:413a0db9
2025-04-13 15:52:02Nostur is capable of login with bunker
Photo, note by Fabian
nostr:nevent1qvzqqqqqqypzqkfzjh8jkzd8l9247sadku6vhm52snhgjtknlyeku6sfkeqn5rdeqyf8wumn8ghj7mn0wd68ytnvw5hxkef0qyg8wumn8ghj7mn0wd68ytnddakj7qpqxfktwlm2qdkpxy556e4yg4l8p6v8930nfyzg7p3vsknk7krutz0s8znjtq
When you decide to share an app you have to know a lot about that app. For example the nstart feature that you can share your friends, has a "smart pack" and the app can onboard, at least following the link --> Apps-integration
So let's try to read and bring a bit to the summary of the thing. Only the one about the profiles, which you don't know exactly how it will end, you have to try it before sending to someone. the second point is that it says that there is no "support encryption, so it cannot be used for DMs apps".
there was an update of nstart, now it shows you
the names of the bunkers, maybe now it's too much, decide if it does 3/2 4/2 or just automatic.
So they talked about frost in the hodlbod podcast. I didn't understand much except that they said to test frost and report the feedback. Tomorrow I'll try to download igloo and frost+nos2ex
So I have to wait for let's say version 0_1_0 of igloo now it is (0_0_4) and
maybe there will be the version of the extension ready.
Sebastix also found it difficult but I think he was trying to install the server, which didn't even occur to me. Anyway I leave you the note if you want to go deeper...
nostr:nevent1qvzqqqqqqypzqpnrnguxe8qszsshvgkvhn6qjzxy7xsvx03rlrtddr62haj4lrm3qytkummnw3ez66tyvgaz7tmrv93ksefdwfjkccteqqs2wzkkx220e24revkpxmdzkqj73rnz0reeenjwgy53g36hlkdgurgrs5e62
Let's see if I can download the video. ok Downloaded. Video .mov
If you don't want to watch I'll leave a little description
1 Download and install igloo, from the frost page. 2 Create a new key set, you can generate or copy an existing key. 3. Choose the options for the key and now they become multiple keys 4. Created a group of credentials. 5. Save the two credentials with a password and bring the third into the browser extension that it creates from the repository, it says that there will be a bootable extension for chrome. 6. Copy the third key and the group package key into the application node. 7. Once you have entered these keys you can finish the operation (and you have backed up the other two) in igloo. 8. When it goes forward it finds itself with two keys, both encrypted with passwords. 9. Since it is a three of two, it just needs to activate a key in igloo and it starts communicating "startsigner". 10. Opens a nostr client and connects with frost2sx and writes a note 11. Shows the log, and says that if you enter two keys it can generate a third, invalidating the old one (I assume)
-
@ 502ab02a:a2860397
2025-04-13 15:45:19มูลนิธิร็อกกี้เฟลเลอร์ (Rockefeller Foundation) ก่อตั้งขึ้นในปี ค.ศ. 1913 โดยตระกูลร็อกกี้เฟลเลอร์ ซึ่งเป็นหนึ่งในตระกูลที่มีอิทธิพลทางเศรษฐกิจและสังคมของสหรัฐอเมริกา จุดมุ่งหมายหลักของมูลนิธิคือการส่งเสริมสุขภาพ การศึกษา และความเป็นอยู่ที่ดีของมนุษยชาติทั่วโลก
บทบาทของมูลนิธิร็อกกี้เฟลเลอร์ในประเทศไทยนั้น สำหรับกรุงเทพฯแล้ว เป็นศูนย์ใหญ่ประจำภาคเอเชีย มูลนิธิร็อกกี้เฟลเลอร์ได้เข้ามามีบทบาทสำคัญในการพัฒนาระบบสาธารณสุขของประเทศไทย โดยเฉพาะในด้านการศึกษาและการวิจัยทางการแพทย์ มูลนิธิได้ให้การสนับสนุนทั้งทางด้านการเงินและวิชาการแก่สถาบันการแพทย์ต่าง ๆ รวมถึงการส่งเสริมการศึกษาของบุคลากรทางการแพทย์ไทยในต่างประเทศ พูดง่ายๆคือ ช่วยรัฐบาไทยจัดตั้ง "สาธารณสุขแห่งแรก" ในประเทศไทย เมื่อ พ.ศ. 2457 แสดงถึงความสัมพันธ์ลึกซึ้งกับสาธารณสุขอเมริกาเป็นอย่างดี
แม้ว่าการสนับสนุนของมูลนิธิร็อกกี้เฟลเลอร์จะช่วยยกระดับระบบสาธารณสุขของไทยอย่างมีนัยสำคัญ แต่ก็มีข้อถกเถียงเกี่ยวกับอิทธิพลของมูลนิธิต่อทิศทางการพัฒนาทางการแพทย์ของประเทศ บางฝ่ายมองว่าการพึ่งพาทุนและแนวคิดจากต่างประเทศอาจทำให้ประเทศไทยสูญเสียความเป็นอิสระในการกำหนดนโยบายด้านสาธารณสุข เพราะมีคำกล่าวหาว่า มูลนิธิ มีเบื้องหลังที่สามารถควบคุมกิจกรรมต่างๆเกี่ยวกับสาธารณสุขในเมืองไทยได้ (โอเค ซึ่งนั่นก็เป็นข้อถกเถียง)
นอกจากนี้มูลนิธิ ยังมีการร่วมทุนในด้าน "อาหาร" ในเมืองไทยด้วย
ในช่วงปี พ.ศ. 2512-2513 (ค.ศ. 1969-1970) มูลนิธิร็อกกี้เฟลเลอร์ (Rockefeller Foundation) ได้ร่วมลงทุนกับเครือเจริญโภคภัณฑ์ (CP) ในเอเชียตะวันออกเฉียงใต้ โดยเฉพาะในประเทศไทย ความร่วมมือนี้เกี่ยวข้องกับการพัฒนาอุตสาหกรรมการเลี้ยงไก่เนื้อ ซึ่งเป็นส่วนหนึ่งของการส่งเสริมการเกษตรและอาหารในภูมิภาค นั่นทำให้เทคโนโลยีการเลี้ยงสัตว์ของซีพีรุดหน้าอย่างเร็วมาก พันธุ์กุ้งขาวจากอเมริกา และ ไก่เนื้อที่จากเดิมต้องเลี้ยง 6 เดือน แต่ก็สามารถทำให้เหลือเวลาแค่ 8สัปดาห์ก็ได้กิโลครึ่งแล้ว
นอกจากนี้ยังร่วมทุนกับ มหาวิทยาลัยเกษตรศาสตร์ หนึ่งในโครงการที่โดดเด่นคือการสนับสนุน "ไร่สุวรรณ" หรือ Suwan Farm
ไร่สุวรรณ ตั้งอยู่ที่อำเภอปากช่อง จังหวัดนครราชสีมา เป็นศูนย์วิจัยข้าวโพดและข้าวฟ่างที่สำคัญของประเทศไทย เดิมทีพื้นที่นี้เป็นของจอมพลสฤษดิ์ ธนะรัชต์ และต่อมาได้โอนให้มหาวิทยาลัยเกษตรศาสตร์ดูแล มูลนิธิร็อกกี้เฟลเลอร์ได้ให้การสนับสนุนด้านทุนและความรู้ในการปรับปรุงพันธุ์ข้าวโพดเลี้ยงสัตว์ จนทำให้ไร่สุวรรณกลายเป็นแหล่งวิจัยข้าวโพดเลี้ยงสัตว์ที่ใหญ่ที่สุดในเอเชีย นักวิจัยที่ไร่สุวรรณได้พัฒนาพันธุ์ข้าวโพดที่ทนทานต่อโรคราน้ำค้าง ซึ่งเป็นปัญหาสำคัญในช่วงเวลานั้น
นั่นละครับ 5555
-
@ da0b9bc3:4e30a4a9
2025-04-13 08:48:10Hello Stackers!
Welcome on into the ~Music Corner of the Saloon!
A place where we Talk Music. Share Tracks. Zap Sats.
So stay a while and listen.
🚨Don't forget to check out the pinned items in the territory homepage! You can always find the latest weeklies there!🚨
🚨Subscribe to the territory to ensure you never miss a post! 🚨
originally posted at https://stacker.news/items/942018
-
@ 7d33ba57:1b82db35
2025-04-13 08:39:56Venice is like nowhere else on Earth. A city built on water, where gondolas glide through silent canals and palaces shimmer in the light of the lagoon. It’s romantic, surreal, and endlessly photogenic—from the grandeur of St. Mark’s Square to the quiet charm of back-alley bridges. Whether you're there for the art, the architecture, or the atmosphere, Venice is pure magic.
🌟 Must-See in Venice
1️⃣ St. Mark’s Basilica (Basilica di San Marco)
- A glittering masterpiece of Byzantine architecture
- Don’t miss the Pala d’Oro and mosaics inside
- Climb to the rooftop terrace for views over Piazza San Marco
2️⃣ Doge’s Palace (Palazzo Ducale)
- The seat of Venetian power for centuries
- Walk across the Bridge of Sighs to the old prison
- Book a "Secret Itineraries" tour to explore hidden passages
3️⃣ Grand Canal & Vaporetto Ride
- Take a vaporetto (water bus) from Piazzale Roma to San Marco
- You'll pass Rialto Bridge, palazzos, and everyday life along the water
- For extra magic, do it at sunset
4️⃣ Rialto Market & Bridge
- The city’s oldest bridge, buzzing with life
- Stop by the Rialto Market in the morning for local seafood and produce
- Great area to grab a spritz and people-watch
5️⃣ Gondola Ride or Rowboat Tour
- Yes, it’s touristy—but it’s iconic for a reason
- For a local spin, try a traghetto across the canal, or book a rowboat tour at sunset
🖼️ Art & Culture
- Gallerie dell’Accademia – Home to masterpieces by Titian, Veronese, and Tintoretto
- Peggy Guggenheim Collection – Modern art in a stunning canal-side setting
- Teatro La Fenice – Venice’s grand opera house, steeped in drama and beauty
🍝 What to Eat in Venice
- Cicchetti – Venetian tapas: try bacalà mantecato, crostini with seafood, or mini meatballs
- Sarde in saor – Sweet-and-sour marinated sardines
- Risotto al nero di seppia – Squid ink risotto
- Wash it down with a Venetian spritz (try one with Select or Cynar)
🌿 Day Trips from Venice
- Murano – Famous for glassblowing
- Burano – Bright, colorful houses and handmade lace
- Torcello – Quiet island with ancient churches and lagoon views
- Lido – Beachy escape from the city crowds
🎯 Venice Tips
✅ Get lost—it’s part of the charm (but download offline maps just in case)
✅ Visit early morning or late evening to feel the magic without the crowds
✅ Stay overnight if you can—Venice empties after the cruise ships leave
✅ Don’t feed the pigeons in St. Mark’s Square—it’s actually banned
✅ Look for "ombra" (local wine) and a plate of cicchetti at a traditional bacaro bar -
@ 502ab02a:a2860397
2025-04-13 08:27:33หากเดินเข้าแผนกผักในซูเปอร์มาร์เก็ต แล้วเกิดความรู้สึกว่า “บรอกโคลี” กับ “กระหล่ำดอก” หน้าตามันเหมือนกันยังกับแฝดที่คนหนึ่งเป็นเด็กเรียนเก่ง อีกคนเป็นศิลปิน ก็ไม่ต้องแปลกใจ เพราะจริง ๆ แล้วพวกเขาเป็นญาติสายตรงกันเลยล่ะครับ ชนิดที่ว่าเกิดจากต้นตระกูลเดียวกันเป๊ะ ๆ และไม่ได้เกิดจากการหล่นลงมาของเมล็ดพืชจากฟากฟ้าหรือจากการปลุกเสกของเทพธิดาในตำนานไหนทั้งนั้น แต่เกิดจากมือมนุษย์เราเองล้วน ๆครับ
ต้นกำเนิดของพืชทั้งสองนั้นย้อนกลับไปไกลถึง “Brassica oleracea” ซึ่งเป็นพืชผักพื้นฐานริมทะเลเมดิเตอร์เรเนียน หน้าตาเมื่อแรกพบก็ไม่ได้หรูหราเหมือนลูกหลานยุคนี้ มันเป็นแค่พืชใบเขียวธรรมดา ๆ ที่ชาวโรมันโบราณเดินผ่านไม่เหลียวหลัง
แต่เมื่อเวลาผ่านไป มนุษย์เริ่มรู้จักการ “คัดเลือกพันธุ์” (selective breeding) คือการเลือกปลูกต้นที่มีลักษณะที่ต้องการ แล้วขยายพันธุ์เฉพาะต้นนั้นต่อไป รุ่นแล้วรุ่นเล่า เหมือนการเลือกเพาะลูกหมาที่ฉลาดและขนฟู จนในที่สุดก็ได้สายพันธุ์ใหม่ ๆ ขึ้นมา
เช่นในกรณีต้นไม้ต้นนึง ถ้าชาวสวนคนหนึ่งชอบต้นที่มี “ตาดอก” ใหญ่หน่อย ก็จะปลูกมันต่อ ส่วนอีกคนชอบใบที่แน่น ๆ ก็เลือกปลูกต้นแบบนั้นต่อ แล้วสิ่งที่ตามมาก็คือความเลยเถิดของความหลากหลายอย่างไม่น่าเชื่อ เช่น • ถ้าเน้นปลูกส่วนใบได้ คะน้า • ถ้าเน้นปลูกส่วนตาดอกได้ กระหล่ำดอก • ถ้าตาดอกสีเขียวแน่น ๆได้ บรอกโคลี • ถ้าเน้นลำต้นบวม ๆได้ กะหล่ำหัว • ถ้าดอกออกแปลก ๆ คล้ายปะการังได้ โรมานีสโก (Romanesco)
แต่ทุกชนิดที่ว่ามานั้น…เป็น “สายพันธุ์ย่อย” ของพืชชนิดเดียวกัน คือ Brassica oleracea ทั้งหมด!
พูดให้เข้าใจง่ายคือบรอกโคลีไม่ได้มาจากพระเจ้า แต่มาจาก “การขยี้ย้ำในลักษณะ จนเป็นการเล่นแร่แปรพันธุ์ของเกษตรกรในยุคโรมัน” ที่ทำกันจริงจังจนกลายเป็นผักจานหลักบนโต๊ะอาหารเราทุกวันนี้
สิ่งที่น่าสนใจอีกคือ บรอกโคลีกับกระหล่ำดอกยังคงกลิ่นกายทางพันธุกรรมเดียวกันอยู่ แม้หน้าตาจะต่าง แต่ DNA ก็คล้ายกันมาก พอ ๆ กับพี่น้องที่ชอบกินของไม่เหมือนกัน แต่มาจากบ้านเดียวกัน
จริง ๆ แล้วพืชตระกูล Brassica พวกนี้แหละ ที่มีสารสำคัญชื่อ Glucosinolate เป็นเหมือนกับนักเคมีของพืช ที่มีสูตรลับไว้ป้องกันตัวเองจากแมลง กลูโคซิโนเลตบางชนิด (เช่น goitrin) อาจรบกวนการดูดซึมไอโอดีน ส่งผลต่อการทำงานของต่อมไทรอยด์ เลยเรียกสิ่งนี้ว่า เป็น anti-nutrient ที่เราเคยได้ยินกันครับ
ถึงตรงนี้ ใครที่ชอบกินผักเหล่านี้ก็น่าจะรู้สึกภูมิใจว่ากำลังกิน “ผลผลิตจากภูมิปัญญามนุษย์” ที่ไม่แพ้การสร้างปิรามิดหรือเครื่องจักรไอน้ำเลย เพราะการคัดเลือกพันธุ์อย่างละเอียดอ่อน ต้องใช้เวลาการย้ำปลูกเป็นร้อยปี และไม่ได้ใช้วิทยาศาสตร์ล้ำยุคอะไรเลย แค่ใช้ใจและมือเปล่าของชาวสวนรุ่นแล้วรุ่นเล่า
สรุปแล้ว บรอกโคลีและกระหล่ำดอก ไม่ใช่ของจากสวรรค์ แต่เป็นของจาก “ความพยายาม” ที่ยิ่งใหญ่พอ ๆ กับการสร้างอารยธรรม พระเจ้าอาจไม่ได้สร้างมัน…แต่มนุษย์เราก็เก่งพอที่จะเป็น “พระเจ้าแห่งผัก” อยู่เหมือนกันนะครับ 555
pirateketo #โรงบ่มสุขภาพ #HealthyHut #ตำรับเอ๋ #siripun
-
@ 502ab02a:a2860397
2025-04-13 08:24:11มีคนเทียบสัดส่วน โอเมก้า 6:3 ของน้ำมันคาโนล่า แล้วบอกว่าดีงาม เพราะมันได้ที่ 2:1
คืองี้ครับ มันเป็นประเด็นที่หลายคนยังเข้าใจคลาดเคลื่อนอยู่ไม่น้อยโดยเฉพาะเวลาเห็นว่าน้ำมันคาโนล่ามีโอเมก้า 3 ต่อ 6 ในอัตราส่วน 1:2 แล้วรีบบอกว่า “ดีต่อสุขภาพ” หรือ “บาลานซ์ดี” โดยไม่มองลงลึกไปถึง ชนิดของโอเมก้า 3 และ ชีวปริมาณการดูดซึม (bioavailability) ที่ต่างกันระหว่างโอเมก้า 3 จากพืช กับจากสัตว์
มันคือมายาทางตัวเลข ที่ superfood ชอบนำมาโชว์ให้เราดู ในน้ำมันคาโนล่า โอเมก้า 3 ที่พบจะอยู่ในรูปแบบ ALA (Alpha-Linolenic Acid) ซึ่งเป็นกรดไขมันโอเมก้า 3 ที่ ร่างกายไม่สามารถใช้ได้โดยตรง ต้องแปลงเป็น EPA และ DHA ก่อน ถึงจะมีผลต่อสมอง หลอดเลือด และระบบต้านการอักเสบ
ปัญหาคือ ร่างกายมนุษย์แปลง ALA ไปเป็น EPA ได้แค่ประมาณ 5-10% และแปลงต่อเป็น DHA ได้แค่ 0.5-5% เท่านั้น
ถ้าเรากิน ALA จากคาโนล่าออย 1,000 มิลลิกรัม เราอาจจะได้ DHA จริงๆ แค่ ไม่ถึง 50 มิลลิกรัม ซึ่งน้อยมากจนไม่เพียงพอต่อการบำรุงสมองหรือป้องกันโรคอักเสบเรื้อรังใดๆ
ประเด็นสำคัญการเกิด oxidation ของ ALA ในระหว่างการทอด เพราะ ALA เป็นกรดไขมันไม่อิ่มตัวแบบมีพันธะสาม (polyunsaturated) ที่ ไวต่อความร้อนและแสงมาก พอเจอความร้อนสูงในกระบวนการทอดหรือแม้แต่แค่โดนแสงขณะเก็บไว้ มันจะกลายเป็นสารอนุมูลอิสระที่ชื่อว่า lipid peroxide ซึ่งเป็นอันตรายต่อเซลล์และอาจเพิ่มความเสี่ยงของโรค NCD
ดังนั้น อย่างที่บอกบ่อยๆครับ จะเอาวิจัยจะอ่านวิจัยมาใช้ โปรดมองบริบทการ "ใช้ชีวิต" ด้วยครับ ค่าโอเมก้า 3:6 ของน้ำมันคาโนล่าอาจดู “สมดุล” แค่ในกระดาษ แต่ความจริงคือ มันเป็นโอเมก้า 3 แบบพืช (ALA) ที่ร่างกายใช้ได้น้อยมาก
“โอเมก้า 3 จากพืช ก็เหมือนแบงก์กาโม่ที่ต้องไปแลกที่ธนาคารก่อนถึงจะใช้ได้ ส่วนโอเมก้า 3 จากสัตว์น่ะ คือ บิทคอยน์ ที่เป็นของจริง”
https://www.facebook.com/share/p/1BwpmKdJtN/
ปล. Dr Brian Kunakom บอกว่า แค่ชื่อน้ำมันคาโนลาก็แปรรูปแล้ว!! ต้นคาโนลาไม่มีจริง มันถูกดัดแปลงมาจากผักกาดก้านขาวหรือ rapeseed plants ช่วงยุคสงครามโลกครั้งที่ 2 สหรัฐอเมริกาต้องการน้ำมันมาใช้หล่อลื่นเครื่องยนต์ ประเทศแคนาดาจึงหาวิธีปลูกและผลิต rapeseed oil หลังจากที่สิ้นสุดสงครามโลกครั้งที่ 2 rapeseed oil ถูกผลิตมาเยอะเกินและขายไม่ออก ประเทศแคนาดาจึงหาวิธีขายให้ประเทศอื่น ใน rapeseed oil ของแคนาดา สาร Erucic acid มีสูงไปซึ่งไม่เหมาะสำหรับการทานเป็นอาหาร ในช่วงประมาณปี 1970 แคนาดาสำเร็จในการจด patent สำหรับการลดสาร Erucic acid จากน้ำมัน rapeseed และตั้งชื่อน้ำมันใหม่ว่า Canola oil Canola ย่อมาจาก Canadian oil low acid นอกจากจะแปรรูปจากการสกัด ยังแปรรูปในการตั้งชื่อด้วยครับ
pirateketo #กูต้องรู้มั๊ย #ม้วนหางสิลูก
-
@ 8d34bd24:414be32b
2025-04-13 04:29:33I was listening to a sermon at my church this weekend on Luke 9. It made me think of these words, “I do believe; help my unbelief.” I’ll start with context on this statement and then show how it applies to the passage we were studying.
They brought the boy to Him. When he saw Him, immediately the spirit threw him into a convulsion, and falling to the ground, he began rolling around and foaming at the mouth. And He asked his father, “How long has this been happening to him?” And he said, “From childhood. It has often thrown him both into the fire and into the water to destroy him. But if You can do anything, take pity on us and help us!” And Jesus said to him, “ ‘If You can?’ All things are possible to him who believes.” Immediately the boy’s father cried out and said, “I do believe; help my unbelief.” (Mark 9:20-24) {emphasis mine}
In this story, a desperate father brought his son to Jesus’s disciples for healing, when they failed, he brought the boy to Jesus. He begged for help, but qualified with “But if You can … .” How often do we explicitly or implicitly say this to God in our prayers.
Just as this father believed in Jesus enough to bring his dear child to Jesus, but still had doubts, we tend to be the same. As Christians, we believe that Jesus loved us enough to die on the cross, but do we believe He is always with us? Do we believe He will never leave nor forsake us? Do we believe that all things work together for good for those who love God and are called according to His purpose? I think we can all say, “I do believe; help my unbelief.”
We all have highs where we are excited about Jesus and believe He is working in us and through us. We also have lows where we feel distant and wondering if He sees or cares. We need to have that belief of the highs when we are going through the lows.
In Luke 9, Jesus sent out His 12 disciples to share the gospel and heal the sick and possessed. They came back on a high, amazed at the great miracles that Jesus had worked through them.
And He called the twelve together, and gave them power and authority over all the demons and to heal diseases. And He sent them out to proclaim the kingdom of God and to perform healing. … When the apostles returned, they gave an account to Him of all that they had done. Taking them with Him, He withdrew by Himself to a city called Bethsaida. (Luke 9:1-2,10) {emphasis mine}
The 12 disciples were on a high. Miracles had been done through their hands and at their word. They felt like they could conquer the world, but this high and great faith did not last very long. Jesus took them away. They thought they were going to spend some private time with Jesus, but that is not what happened. A great crowd ran ahead and met them. Jesus saw their physical and spiritual needs and began to preach and minister to them. It began to get late, so the disciples came to Jesus to ask Him to wrap things up and send the people away so they could eat (like Jesus didn’t know).
Now the day was ending, and the twelve came and said to Him, “Send the crowd away, that they may go into the surrounding villages and countryside and find lodging and get something to eat; for here we are in a desolate place.” But He said to them, “You give them something to eat!” And they said, “We have no more than five loaves and two fish, unless perhaps we go and buy food for all these people.” (For there were about five thousand men.) And He said to His disciples, “Have them sit down to eat in groups of about fifty each.” They did so, and had them all sit down. Then He took the five loaves and the two fish, and looking up to heaven, He blessed them, and broke them, and kept giving them to the disciples to set before the people. And they all ate and were satisfied; and the broken pieces which they had left over were picked up, twelve baskets full. (Luke 9:12-17) {emphasis mine}
Jesus gently guided His disciples, trying to help them see that there was nothing to fear, that He had everything under control, and that nothing is impossible with Him. When He asked them what they had available to feed the crowd, and they just had one young boy’s small lunch, they immediately assumed feeding the crowd was impossible. Jesus then proceeded to feed the 5,000 (5,000 men and an uncounted number of women and children). Yes, Jesus was merciful and fed this hungry crowd, but I believe this feeding was about so much more than meeting the physical needs of the crowd. Notice how every person there ate until they were satisfied. Jesus then had the disciples pick up the leftovers. How much was left over? 12 baskets full. How many disciples was He giving an object lesson to? 12 disciples. Jesus doesn’t do anything by accident. Everything He does is for a reason. (In the same way everything He allows to happen to us is for a good reason.) He did what the disciples thought was impossible, He fed the huge crowd, but even more, He had one basketful leftover for each disciple. This was a personal message to each of His disciples.
When Jesus sent them out with the command to share the Gospel, heal the sick, and cast out demons, they went out with faith and returned with even greater faith “I believe,” but then the day after they returned, their faith waivered again. They needed to cry out, “help my unbelief.” Jesus empowered and guided them both in their belief and in their unbelief. He most definitely helped their unbelief and will do the same for us.
Our Father, please help us to have faith in good times and in bad. Help us to believe with all of our heart, mind, and soul. We believe that you are God and we believe that Jesus came down to earth to live the perfect life that we are unable to live, died to receive the punishment we deserved, and was raised to life on the third day. Believe that the Holy Spirit lives within us empowering and guiding us. We also acknowledge that we have doubts. Please help our unbelief.
Trust Jesus.
-
@ 502ab02a:a2860397
2025-04-13 03:34:45ลอดจ์ในสยาม ในช่วงที่โลกดูเหมือนจะหมุนเร็วขึ้นเรื่อย ๆ เราเริ่มเห็นปรากฏการณ์บางอย่างซ้ำซ้อนคล้ายคลึงกันไปทั่วโลก ผู้นำประเทศพูดเรื่องเดียวกัน การเงินผูกติดกันเหมือนลูกโป่งชะลูดลม การศึกษาเน้นเรื่องเดียวกัน อาหารแปรรูปสูตรเดียวกัน ยาและวัคซีนออกแนวเดียวกัน คนจำนวนมากพอได้ยินคำนี้ ก็มักจะผูกโยงกับ Freemason โดยอัตโนมัติ เหมือนพอพูดถึง “จานบิน” ก็ต้องนึกถึง “มนุษย์ต่างดาว” ไม่รู้ใครเป็นคนกำหนดชุดความเชื่อนี้ไว้ แต่ที่แน่ ๆ มันติดอยู่ในหัวเราหลายสิบปีแล้ว ซึ่งเราเองก็ไม่อาจทราบได้ว่า มันจะเกี่ยวข้องกันจริงๆหรือ?
ถ้ามองแบบเบื้องต้น Freemason คือกลุ่มที่รวมตัวกันตามหลักของ “ภราดรภาพ” (Brotherhood) ซึ่งเริ่มตั้งแต่ยุคยุโรปกลาง โดยมีโครงสร้างแบบลับ–กึ่งลับ จุดร่วมอยู่ที่ “พิธีกรรม” การฝึกจิตวิญญาณ ความเชื่อในสัญลักษณ์ และการสร้างเครือข่ายความร่วมมือในทุกระดับ ตั้งแต่ช่างหิน คนทำตึก ไปจนถึงนักการเมืองระดับสูง ใครที่ได้เข้าไปอยู่ในระบบนี้ จะต้องผ่านการทดสอบหลายขั้น มีการขึ้นระดับ (Degree) และมีลำดับชั้นเหมือนบันได แต่ทั้งหมดก็ยังคงเป็นเรื่องเล่า เพราะ freemason พูดเสมอว่าพวกเขาไม่ใช่องค์กรลับ ไม่ใช่กลุ่มโอกาสในการสร้างเครือข่ายเพื่อธุรกิจ
คำถามที่ถูกถามบ่อยๆคือ แล้วในไทยมีด้วยเหรอ? คำตอบคือ “มี และมีมานานแล้วด้วย” วันนี้เรามาทำความรู้จักกับ Freemason lodge แห่งแรกในไทยกันครับ
ประเทศไทยเริ่มมี “Freemason Lodge” อย่างเป็นทางการตั้งแต่ยุครัชกาลที่ 6 โดยใช้ชื่อว่า “ลอดจ์เซนต์จอห์น” (Lodge St. John) ลำดับทะเบียนคือ No.1072 ตามธรรมนูญสก็อตแลนด์
ปีที่ก่อตั้ง ค.ศ. 1911 ตรงกับ พ.ศ. 2454 สมัยรัชการที่ 6 ต้นสังกัดคือ Grand Lodge of Scotland เป็นลอดจ์แห่งแรกในประเทศไทย และเก่าแก่ที่สุดในเอเชียตะวันออกเฉียงใต้ สมาชิกหลักในยุคแรกจะเป็นชาวอังกฤษ ฝรั่งเศส จีน และขุนนางไทยระดับสูงในราชสำนักลอดจ์นี้ถือเป็น “จุดเริ่มต้นของ Freemason ในไทย” เริ่มต้นจากปี พ.ศ.2411(ค.ศ. 1868) หลังจากที่สยามเปิดประตูรับอิทธิพลจากต่างประเทศ เพื่อความมั่นใจในการอยู่รอดของประเทศจากการล่าอาณานิคม รัชกาลที่ 6 ทรงเชิญฝรั่งเศส อังกฤษ เยอรมัน รัสเซีย เดนมาร์ก อเมริกาและประเทศอื่นๆ ให้ส่งผู้เชี่ยวชาญที่เก่งที่สุดมาสร้างและบริหารหน่วยงานของรัฐบาลต่างๆที่จำเป็นต่อความก้าวหน้าของประเทศในเวลานั้น
บันทึกเกี่ยวกับ Freemason พบในเดือน เมษายน พ.ศ. 2421 (April 1878) ว่ามีการพยายามจัดตั้งลอดจ์อยู่หลายครั้ง แต่ระหว่างนั้นก็ประสบปัญหามากมายอยู่ จนสำเร็จในปี พ.ศ. 2545 (1911) ผ่านเหตุการณ์สำคัญมากมายโดยเฉพาะสงครามโลกครั้งที่ 2 ซึ่งมีสมาชิกเสรีไทย ภายใต้ Force 136 of the British Special Operations Executive และ the American Office of Strategic Services มาเป็น new gen ritualists ของ freemason
ปัจจุบัน ลอดจ์เซนต์จอห์น ตั้งอยู่ที่ นวมินทร์ 24 ถ้าสนใจเยี่ยมชมกิจกรรมของ freemason ต้องทำการติดต่อล่วงหน้าก่อนทุกกรณีครับ https://maps.app.goo.gl/yA8Qq6NMCXi5S5Z27
และหากต้องการสมัครเป็น freemason เขาต้องตรวจสอบให้แน่ใจว่าแต่ละคนมีเหตุผลที่เหมาะสมในการต้องการเป็น Freemason ว่าเหมาะสมหรือไม่ ผ่านแบบฟอร์มทางเว็บไซท์ จากนั้นจะมีการจัดประชุมกับสมาชิกอาวุโส เพื่อตกลงร่วมกันถึงความเป็น freemason และเมื่อการสัมภาษณ์ผ่านไปได้ด้วยดี เราก็จะได้รับเชิญในการเข้าร่วมงานสังสรรค์ประจำเดือน ซึ่งจัดทุกๆเดือนในวันอังคารที่สาม และจะต้องเข้าร่วมกิจกรรมต่อเนื่องอย่างน้อย 6 เดือน เพื่อที่จะให้พี่น้อง 2 คนในลอดจ์ สนับสนุนการสมัครอย่างเป็นทางการ โดยพี่น้อง 2 คนนั้นจะต้องรับผิดชอบต่อความก้าวหน้าของเรา เพื่อประสบความสำเร็จในการเป็น freemason ด้วยเช่นกัน
การเป็นสมาชิกนั้นจะมีค่าธรรมเนียมรายปีด้วยครับ นอกจากนี้จะต้องใช้เวลาราวๆ 2 ปี เพื่อเรียนจบ 2 degree สำหรับการเป็นเป็น Master Mason อีกด้วย แต่ทั้งหมดต้องอย่าลืมว่า ไม่ใช่แค่สมัครแล้วจะได้เลย มันขึ้นอยู่กับว่า freemason จะรับพิจารณาเราด้วยหรือไม่ครับ
และทั้งหมดนี้คือข้อมูลแบบคร่าวๆมากๆ เกี่ยวกับ freemason lodge แห่งแรกในประเทศไทยครับ
-
@ 0b118e40:4edc09cb
2025-04-13 03:30:37I picked up this book 'Nuclear Power Explained' by Dirk Eidemuller to understand nuclear power and the historical context during the nuclear euphoria era. I’ll share a bit on the history part. Note: I have not seen the movie Oppenheimer yet.
Some key highlights :
In 1933 -Leo Szilard thought of the nuclear chain reaction concept - whereby one nuclear reaction triggers a series of additional nuclear reactions, releasing a significant amount of energy. This is fundamental for nuclear reactors and weapons. He figured this out the same year he was fleeing from one country to another from Hitler. He tried to share this idea to Rutherford but got kicked out of the office.
In 1934 - Enrico Fermi first conducted the experiment in irradiating uranium with neutrons but unfortunately he did not spot anything
In 1938, Otto Hahn and Fritz Strassmann's experiments accidentally found barium forming when they irradiated uranium with neutrons. Splitting uranium atoms was not a norm at that time. This new finding was the start of the nuclear era.
Fission vs. Fusion * Fission splits heavy nuclei into smaller ones, whereas fusion combines light nuclei into heavier ones. * Fission is used in nuclear reactors and atomic bombs, while fusion is the process that powers stars (energy is produced when hydrogen nuclei combine to form helium). The goal of developing fusion-based power generation on Earth is still work-in-progress. Thermonuclear bombs (super bombs) use fusion as well.
Otto Hahn collaborated with Lisa Meitner, Germany's first female physics professor, who fled to Sweden due to Nazi persecution. Lisa encouraged Hahn to repeat Fermi’s experiment with high precision. Lisa Meitner and her cousin Otto Frisch analyzed the results and coined the term "fission."
(Note : Women physicist were gaining popularity during that time - Marie Curie, nuclear physics, won 2 nobel price for her work)
1938 - Otto Hahn and Lisa published their results. Nuclear physicists worldwide were in disbelief.
In the early days, Albert Einstein didn’t think it was possible.He said that the whole thing would be like shooting at “birds in the dark in a country where there are few birds.”
Ernest Rutherford (who introduced the atom particle model in 1911 ) thought that it was an absurd idea to try to generate energy in this way. Note : both Rutherford and Bohr introduced the atom particle model, both had a central nucleus and electrons. Bohr’s model was more detailed and led to quantum mechanics and modern behaviour of atoms.
1939 - WW2 started on Sep 1, 1939
1941 - Japan attacked Pearl Harbor in Hawaii
After Otto Hahn’s paper released, a few things happened
Albert Einstein's E=mc^2 links energy and mass, and while this concept has been around for a while and is based on space and time and initially unrelated to nuclear, it also explained nuclear fission's energy release.
Szilard, who was a long time friend of Einstein, reached out and shared the nuclear reaction theory and its potential for killer weapons. They were worried Nazis might build it first and bomb the US.
They wrote to President Roosevelt to establish research for nuclear weapons to counter a possible attack. To add to suspicion, Germany halted uranium sales from occupied Czechoslovak mines.
(Einstein later on said he regretted this letter after witnessing the bombings of Hiroshima and Nagasaki. If he knew Germany wouldn't succeed in making an atomic bomb, he wouldn't have taken action)
Alexander Sachs, a friend of Szilárd and Roosevelt delivered the letter. At first President Roosevelt was not interested. Concurrently Germany invaded Poland, the tension was rising.
Sachs apparently used the analogy of Robert Fulton proposing steamships to Napoleon (to up the notch on traditional sail ships) to convince Roosevelt of the need for a large-scale nuclear research program.
1942 - Roosevet finally agreed
The scientists formed a committee. Military were initially skeptical and wanted to cut costs. The scientists received $6,000 to start the Manhattan Project.
The First Nuclear Reactor : Chicago Pile-1 - a group of popular physicists, including Enrico Fermi and Leó Szilárd, designed the first nuclear reactor ever built by humans. It had 5.4 tons of pure uranium metal and another 45 tons of uranium oxide.
The first nuclear reactor is underneath an unused grandstand of the University of Chicago’s football stadium.
1942 - The first test was on Dec 2. If the chain reaction went awry, a worker would use an axe to cut a rope and release an emergency control rod above the reactor. There was also an automatic shutdown system, and someone ready to pour cadmium salt from above, which stops the chain reaction.
It was a success - the reactor ran at minimum power to initiate a nearly self-sustaining chain reaction.
This led to more reactors and bomb-grade plutonium to be produced.
(note : if you are reading up to here, plutoniums are man-made, and not mined from earth the same way uranium, minerals and ores are)
France was quickly occupied in the war, and its nuclear research material was brought to Germany.
The Soviet Union put in very little effort on the atomic bomb during this time as they needed to fight against the Nazis.
In Japan, too, nuclear research proceeded slowly.
In Germany, multiple research groups operated within the "Uranium Association" also known as “Uranverein”. Popular figures like Werner Heisenberg, Carl Friedrich von Weizsäcker and Walther Gerlach worked on it but failed to activate it.
In England, German- Austrian emigrants Otto Frisch and Rudolf Peierls initiated the “MAUD Committee'' (Military Application of Uranium Detonation) . Unfortunately England classified them as “enemy aliens" hence they went to Los Alamos to work on the US nuclear tech.
Their work led to the British-Canadian “Tube Alloys” secret project, which kickstarted the American Manhattan Project. This American Manhattan project under President Eisenhower introduced nuclear reactors to Iran, Pakistan and Israel. But more on that later.
After the successful experiments with the Chicago Pile-1, the American atomic bomb project proceeded at full speed. The Manhattan Project had more than 150,000 people working on it!
Everything was done under the highest military secrecy. With the exception of the leading scientists and military personnel, nobody knew what was actually being worked on until the news of the destruction of Hiroshima.
With two billion dollars (massive at that time), leading scientist and nuclear physicist Robert Oppenheimer and General Leslie Groves quickly built a secret nuclear research center in remote Los Alamos, New Mexico, and established a nuclear industry as big as the entire American automobile industry during that era.
The Los Alamos Laboratory was called Project Y where the actual bomb design was being researched
University of Chicago’s met lab was a big research contributor during this euphoric nuclear era
Oak Ridge, Tennessee, known as "Atomic City," had large isotope separation facilities, two massive diffusion plants, one of which was the world's largest building at the time, and an electromagnetic separation plant. It provided the uranium for the Hiroshima bomb (little boy). The Hanford site provided the uranium for the Nagasaki bomb (fat man).
April 1945 - Harry Truman became U.S. President.
And four months later, he authorized nuclear attacks on Japanese civilians.
June 1945 - Szilard and Franck co-authored the "Franck Report" with fellow scientists. They cautioned against using nuclear bombs on civilians,
July 1945 - Szilard and other dozen researchers wrote to president Harry Truman to urgently warn him against civilian targets (The Szilard petition)
August 6, 1945 * Hiroshima bomb ~140,000 people died * Nagasaki bomb ~70,000 people died
Robert Oppenheimer on this explosion : “Now I have become death, the destroyer of worlds.” (from the Bhagavad Gita, a sacred Hindu text)
September 2,1945 - WW2 ended
In October 1945 , Oppenheimer resigned.
1946 - One year after the war, Leo Szilárd and Albert Einstein started the Emergency Committee of Atomic Scientists to inform the public about nuclear weapons and promote global peace.
Szilard also arranged conferences with scientists from both sides East and West to find better ways for security and peace.
After WW2, Soviet Union caught up with the US nuclear tech through espionage
1949 - Soviet detonated their first nuclear bomb in Semipalatinsk Test Site, in Kazakhstan.
In 1949 Fermi and Nobel laureate Isidor Rabi cautioned that this new weapon could have devastating consequences, approaching genocide.
1950 - 1953 - Korean war between communism (North Korea) and capitalism (South Korea). The US supported South Korea but decided against nuclear weapons due to ethical concerns. But the ideology war was becoming more apparent here.
1952 - Great Britain detonated its first atomic bomb
1952 - US developed the first hydrogen bomb - based on nuclear fusion and not nuclear fission. These super bombs were 800x stronger than the Hiroshima bomb. Instead of splitting the atomic nuclei to smaller ones, very light atomic nuclei are fused into heavier ones which enables a greater explosive forces
Oppenheimer spoke against the development of thermonuclear weapons/hydrogen bombs.
In the 1940s and 1950s during the McCarthy era, there was widespread fear of communism. People worked to expose anyone they thought might be associated with communism. Senator Joseph McCarthy led investigations, and J. Robert Oppenheimer was accused of having communist ties.
In 1954 - Oppenheimer’s security clearance was revoked by the U.S. Atomic Energy Commission after a highly publicized hearing accusing him of a communist past.
1955 - Einstein passed away. He was 76
1958 - Khrushchev became premier (Soviet Union). In his first full briefing after having a full view of the nuclear environment he said “ I could not sleep for several days. Then I became convinced that we could never possibly use these weapons, and when I realized that I was able to sleep again.”
There’s a long bit on him and JFK eventually working out peace in secrecy...
1960 - Szilárd met with Nikita Khrushchev in New York for two hours. He convinced the Soviet leader to support the idea of a hotline with the US to prevent accidental nuclear war.
1960 - France detonated its first atomic bomb
1961 - JFK came to power
1962 - Cuban Missile Crisis - lasted for 2 weeks.
The Cuban Missile Crisis began when the Soviet Union secretly placed nuclear missiles in Cuba, just 90 miles from the US, raising the threat of nuclear conflict. It ended with an agreement between the US and Soviet Union:
- The U.S. wouldn't invade Cuba.
- The USSR would remove its Cuban missiles.
- The U.S. would secretly remove its missiles from Turkey, easing tensions.
The end of Cuban Missile crisis started the peace journey between US and the Soviet Unions.
But sadly, not everybody loved peace.
1963 - JFK was assassinated
1964 - Khrushchev was ousted
1964 - Leo Szilard died of heart attack
1964 - China detonated its first atomic bomb
1983 - another possible nuclear attack during the Cold War - Soviet satellites wrongly signaled an American missile attack. Stanislav Petrov, in charge, could have launched a nuclear counterattack but didn't because he thought it was a technical glitch. It turned out he was right; sunlight reflections caused the false alarm. Petrov's decision likely averted a disastrous nuclear war. But it’s worrying how easy it was for world disaster.
1991 - The Cold War ended when the Berlin Wall came down, a significant symbol of bridging the East and the West
Part 2 - nuclear as electricity instead of bombs.
Throughout this time there was a growing shift to use nuclear power as electricity. I separated both timelines to have a clearer view on it
1951 - first reactor in Idaho used to generate electricity instead of bombs (small test reactor)
Jan 1953- President Eisenhower came was elected to office
Dec 1953 - President Eisenhower delivered his infamous "Atoms for Peace" speech to the UN, on the dangers of nuclear war and the potential of nuclear technology for human development.
He encouraged countries to use nuclear technology for peaceful purposes (electricity).
Iran, Israel, and Pakistan being among the first to agree. American Machine and Foundry constructed their early nuclear facilities.
This change from military to civilian use was made possible by amendments to the Atomic Energy Act.
1954- Russia built the first real reactor that converts nuclear power into electricity and supply it to the public power grid
1955- On August 8, in Geneva, Switzerland, the largest scientific conference in history, called the “International Conference on the Peaceful Uses of Atomic Energy,” began.
More than 1500 participants from East and West exchanged what were previously secretive results with surprising openness and aroused the curiosity of the world publicly.
1955 - The first nuclear-powered submarine, USS Nautilus, was put to sea
1956- the second nuclear power plant that produced electricity on an industrial scale in Calder Hall, near Windscale in England
1958 - the first commercialized power reactor in the US in Shippingport, Pennsylvania
In the 70’s- oil crisis promoted the use of nuclear as energy
1986 - Chernobyl (30 people died) - The Chernobyl disaster resulted from a poorly designed experiment at nuclear reactor Unit 4. They turned off safety systems, removed control rods, and ran the reactor at 7 percent power.
2011- Fukushima disaster (19,759 died) - After a major earthquake, a 15-metre tsunami disabled the power supply and cooling of three Fukushima Daiichi reactors. This led to a nuclear accident on March 11, 2011. All three cores mostly melted within the first three days.
There are a lot of learning from disasters. New reactor designs aim for safety and efficiency, but some projects face rising costs and delays. Managing radioactive waste remains a challenge. The future of nuclear power's role in global electricity is uncertain. If one day nuclear power is really safe, each home can have its own mini power plants.
There are 436 nuclear reactors in the world located in 32 countries as of May 2023
On average, nuclear powers 10% of global power needs. Some countries are heading for 20%
2 takeaways :
-
United States created and won the nuclear race because it welcomed immigrants - who turned out to be superstar nuclear physicist persecuted in their countries
-
International cooperation, advocated by many researchers since the discovery of nuclear fission, hopefully outweighs power politics.
-
@ 0b118e40:4edc09cb
2025-04-13 02:46:36note - i wrote this before the global trade war, back when tariffs only affected China, Mexico, and Canada. But you will still get the gist of it.
During tough economic times, governments have to decide if they should open markets to global trade or protect local businesses with tariffs. The United States has swung between these two strategies, and history shows that the results are never straightforward
Just days ago, President Donald Trump imposed tariffs on imports from Canada, Mexico, and China. He framed these tariffs (25% on most Canadian goods, 10% on Canadian energy, 25% on Mexican imports, and 10% on Chinese imports) as a way to protect American industries.
But will they actually help, or could they backfire?
A History of U.S. Tariffs
Many have asked if countries will retaliate against the US. They can and they have. Once upon a time, 60 countries were so pissed off at the US, they retaliated at one go and crushed US dominance over trade.
This was during the Great Depression era in the 1930s when the government passed the Smoot-Hawley Tariff Act, placing high taxes on over 20,000 foreign goods. The goal was to protect American jobs, especially American farmers and manufacturers, but it backfired so badly.
Over 60 countries, including Canada, France, and Germany, retaliated by imposing their own tariffs. By 1933, US imports and exports both dropped significantly over 60%, and unemployment rose to 25%.
After President Franklin Roosevelt came to office, he implemented the Reciprocal Trade Agreements Act of 1934 to reverse these policies, calming the world down and reviving trade again.
The economist history of protectionism
The idea of shielding local businesses with tariffs isn’t new or recent. It's been around for a few centuries. In the 16th to 18th centuries, mercantilism encouraged countries to limit imports and boost exports.
In the 18th century, Adam Smith, in The Wealth of Nations, argued that free trade allows nations to specialize in what they do best countering protectionism policies. Friedrich List later challenged Smith's view by stating that developing countries need some protection to grow their “infant” industries which is a belief that still influences many governments today.
But how often do governments truly support startups and new small businesses in ways that create real growth, rather than allowing funds to trickle down to large corporations instead?
In modern times, John Maynard Keynes supported government intervention during economic downturns, while Milton Friedman championed free trade and minimal state interference.
Paul Krugman argued that limited protectionism can help large industries by providing them unfair advantages to become global market leaders. I have deep reservations about Krugman’s take, particularly on its impact or lack thereof in globalizing small businesses.
The debate between free trade and protectionism has existed for centuries. What’s clear is that there is no one-size-fits-all model to this.
The Political Debate - left vs right
Both the left and right have used tariffs but for different reasons. The right supports tariffs to protect jobs and industries, while the left uses them to prevent multinational corporations from exploiting cheap labor abroad.
Neoliberal policies favor free trade, arguing that competition drives efficiency and growth. In the US this gets a little bit confusing as liberals are tied to the left, and free trade is tied to libertarianism which the rights align closely with, yet at present right wing politicians push for protectionism which crosses the boundaries of free-trade.
There are also institutions like the WTO and IMF who advocate for open markets, but their policies often reflect political alliances and preferential treatment - so it depends on what you define as true 'free trade’.
Who Really Benefits from Tariffs?
Most often, tariffs help capital-intensive industries like pharmaceuticals, tech, and defense, while hurting labor-intensive sectors like manufacturing, agriculture, and construction.
This worsens inequality as big corporations will thrive, while small businesses and working-class people struggle with rising costs and fewer job opportunities.
I’ve been reading through international trade economics out of personal interest, I'll share some models below on why this is the case
1. The Disruption of Natural Trade
Tariffs disrupt the natural flow of trade. The Heckscher-Ohlin model explains that countries export goods that match their resources like Canada’s natural resource energy or China’s labour intensive textile and electronics. When tariffs block this natural exchange, industries suffer.
A clear example was Europe’s energy crisis during the Russia-Ukraine war. By abruptly cutting themselves off from the supply of Russian energy, Europe scrambled to find alternative sources. In the end, it was the people who had to bear the brunt of skyrocketing prices of energy.
2. Who wins and who loses?
The Stolper-Samuelson theorem helps us understand who benefits from tariffs and who loses. The idea behind it is that tariffs benefit capital-intensive industries, while labor-intensive sectors are hurt.
In the US, small manufacturing industries that rely on low-cost imports on intermediary parts from countries like China and Mexico will face rising costs, making their final goods too expensive and less competitive. This is similar to what happened to Argentina, where subsidies and devaluation of pesos contributed to cost-push inflation, making locally produced goods more expensive and less competitive globally.
This also reminded me of the decline of the US Rust Belt during the 1970s and 1980s, where the outsourcing of labour-intensive manufacturing jobs led to economic stagnation in many regions in the Midwest, while capital-intensive sectors flourished on the coasts. It resulted in significantly high income inequality that has not improved over the last 40 years.
Ultimately the cost of economic disruption is disproportionately borne by smaller businesses and low-skilled workers. At the end of the day, the rich get richer and the poor get poorer.
3. Delays in Economic Growth
The Rybczynski theorem suggests that economic growth depends on how efficiently nations reallocate their resources toward capital- or labor-intensive industries. But tariffs can distort this transition and progress.
In the 70s and 80s, the US steel industry had competition from Japan and Germany who modernized their production methods, making their steel more efficient and cost-effective. Instead of prioritizing innovation, many U.S. steel producers relied on tariffs and protectionist measures to shield themselves from foreign competition. This helped for a bit but over time, American steelmakers lost global market share as foreign competitors continued to produce better, cheaper steel. Other factors, such as aging infrastructure, and economic shifts toward a service-based economy, further contributed to the industry's decline.
A similar struggle is seen today with China’s high-tech ambitions. Tariffs on Chinese electronics and technology products limit access to key inputs, such as semiconductors and advanced robotics. While China continues its push for automation and AI-driven manufacturing, these trade barriers increase costs and disrupt supply chains, forcing China to accelerate its decoupling from Western markets. This shift could further strengthen alliances within BRICS, as China seeks alternative trade partnerships to reduce reliance on U.S.-controlled financial and technological ecosystems.
Will the current Tariff imposition backfire and isolate the US like it did a hundred years ago or 50 years ago? Is US risking it's position as a trusted economic leader? Only time would tell
The impact of tariff on innovation - or lack thereof
While the short-term impacts of tariffs often include higher consumer prices and job losses, the long-term effects can be even more damaging, as they discourage innovation by increasing costs and reducing competition.
Some historical examples globally : * Nigeria: Blocking import of rice opened up black market out of desperation to survive. * Brazil: Protectionist car policies led to expensive, outdated vehicles. * Malaysia’s Proton: Sheltered by tariffs and cronyism and failed to compete globally. * India (before 1991): Over-regulation limited the industries, until economic reforms allowed for growth. * Soviet Union during Cold War : Substandard products and minimal innovation due to the absence of foreign alternatives, yielding to economic stagnation.
On the flip side, Vietnam has significantly reduced protectionism policies by actively pursuing free trade agreements. This enabled it to become a key manufacturing hub. But Vietnam is not stopping there as it is actively pushing forward its capital-intensive growth by funding entrepreneurs.
The Future of U.S. Tariffs
History has shown that tariffs rarely deliver their intended benefits without unintended consequences. While they may provide temporary relief, they often raise prices, shrink job opportunities, and weaken industries in the long run.
Without a clear strategy for innovation and industrial modernization, the U.S. risks repeating past mistakes of isolating itself from global trade rather than strengthening its economy.
At this point, only time will tell whether these tariffs will truly help Americans or will they, once again, make the rich richer and the poor poorer.
-
@ 0b118e40:4edc09cb
2025-04-13 02:41:14In wanting to understand the global economy of manufacturing better and in particular the decline of US manufacturing, I picked up a few books on it. This one is called ‘Why manufacturing is still key to America's future’ by Ro Khanna. It’s a little old but I’ve shared some recent stats as a comparison as well. Ro Khanna was with the U.S. Dept of Commerce, focusing on govt's impact, or lack thereof, on manufacturing. Some key highlights:
- You can’t split R&D and manufacturing. When you offshore manufacturing, you send off design with it and you lose a big chance to cultivate innovation in the US - Andy Grove, CEO of Intel.
- Manufacturing is needed to reduce the trade deficit that started in 1971
- U.S. exports to China are $153.8 billion, imports are $536.8 billion. Hence trade deficit with China is $382.9 billion
- The private sector demands out-of-the-box thinking. In the gov’t, follow instructions; don’t make waves; keep your head down for career advancement.
- Small and medium-sized businesses create about half of all manufacturing jobs and make up more than 90 percent of U.S. manufacturers
- Cluster theory - a lot of business in the surrounding area impacts other businesses i.e. supply chain. On the flip side, businesses shutting down will be like dominoes impacting other businesses. Michael Porter, The Competitive Advantage of Nations" (1990)
- Foreign subsidy - foreign companies ie China get a lot of subsidies to build manufacturing - free land, and factory capital. Cheap labour is not the only competition
- Corporate tax - The US charges heavy corporate tax on foreign earnings hence companies rather invest outside than bring it back - John Chambers, CEO and Chairman Emeritus, Cisco 9 < 1 percent of American businesses export and mostly to Canada and Mexico only
- US global manufacturing share in the ’90s was >22%. It started slipping in 99’. Today it’s 16.8%. China’s global market share was 3% in the 90, 8% in 2000 - today it is 28.7%
**More inputs **
-
Andy Grove, Intel's 3rd employee hired in 1968 and CEO from 1987 to 1998, drove Intel's market cap from $4 billion to nearly $197 billion, making it the world's largest computer chip manufacturer. He highlighted the inseparability of design and manufacturing - which leads to the loss of R&D and innovation in a country when manufacturing is offshored. Grove also questioned the absence of tracking offshored jobs.
-
Apple has a similar philosophy in bridging design and manufacturing. Dow Chemical built research facilities outside of the US because it could not separate manufacturing from R&D
-
Manufacturing’s deterrent factor is high capex and lower returns compared to the service sector.
-
“The Commerce Department was a chronic underperformer, led in recent times by political hacks or bureaucrats, from one party or the other, who simply didn’t get it.” (from the book)
-
Manufacturing is needed to reduce the trade deficit. In 2009, the trade deficit reached almost $375 billion - meaning the US spends $375 billion more on foreign economies than it does fueling its economy. (Current trade deficit is $65.5 billion)
-
To balance the economy, export more and import less. In 2009, 60% of manufacturing goods were exported (current amount of 80%). But this is not enough to fulfil domestic consumption and reduce imports, hence the need for more manufacturing.
-
Trade deficit with China - In 2009, the total trade deficit with China was more than $220 billion, service trade surplus of $6 billion. Today, U.S. export to China is $153.8 billion, imports from China is $536.8 billion, and the trade deficit with China is $382.9 billion (almost double the amount of trade deficit with China in 14 years)
-
While knowledge workers are important, must not discount the importance of hands-on technical skills
-
The rate of decline in manufacturing increases unemployment in manufacturing jobs such as engineer, designer, or floor operator. The majority of the workforce is Caucasian, with African Americans constituting about 10 percent and Hispanics about 15 percent
-
“If the private sector rewards “out of the box” thinking, Washington often expects regurgitation as the norm for career advancement. Follow instructions; don’t make waves; keep your head down—that’s the motto among insiders. It’s something that I didn’t like and never got used to.” (from the book)
-
Our nation cannot bleed manufacturing jobs and expect to have a middle class: Bob Baugh, union leader
-
Small and medium-sized businesses create about half of all manufacturing jobs and make up more than 90 percent of U.S. manufacturers.
-
Importance of local manufacturers in helping the country during turmoil - The Globe factory produced protective clothing for firefighters during 9/11. The challenges were seen during COVID-19, not being able to manufacture masks, medical
-
Federal gov’t program: the Manufacturing Extension Partnership (MEP) helps small and medium-sized manufacturers improve their competitiveness
-
The decline of manufacturing impacts surrounding businesses (I’ve seen it drop like dominoes). This is based on the cluster theory by Professor Michael Porter, introduced in the late 1990s, which emphasizes geographic concentrations of related businesses and institutions in specific industries. Clusters offer advantages like knowledge sharing, talent access, efficient supply chains, and competition-driven innovation, benefiting regional development and global competitiveness.
-
Gov’t subsidies: Foreign competitors get hefty government subsidies, including free land, factories, and capital. These subsidies make price competition tough, not just cheap labourers (for example China)
-
Corporate tax: Overseas earnings are taxed when brought back to the U.S. Due to high corporate tax rates, companies rather invest these earnings abroad. A one-time tax incentive for repatriation will encourage more domestic investment and job creation (John Chambers of Cisco, and Tim Guertin of Varian)
-
General observation - The US pioneers innovation but is unable to keep up the fight when competitors come on board because of the lack of support compared to other countries - i.e. luxury cards, automobiles, automation, silicon industry, solar industry etc
-
95% of the world’s consumers and 70% of the world’s purchasing power are outside the United States (in 2009 and about the same now)
-
Only 1 percent of American businesses export.
-
Out of that, 58% of the companies that do export only export to Canada or Mexico. They’re still reluctant to venture out to Latin America, Asia, or even Europe.
-
Exports make up only 11% of the U.S. gross domestic product (GDP) - Note, still the same from 2009 to the present. Germany, China, India, Brazil, Russia, UK, Japan - exports more
-
Trade shows are useful and costly. A suggestion is for the U.S. government to help cover travel and participation expenses for first-time attendees. These businesses could repay the government if they secure sales at the show, similar to how the Department of Agriculture supports food companies.
-
Several countries are subsidised in tradeshows and have pavilions that are chic and modern such as the British, Germany, Turkey, Italy, and Egypt. US’s booths don’t stand out.
-
The simplicity of getting paperwork sorted: In 1972, when Andy Grove went to Malaysia to establish Intel’s first foreign operation, the chief minister of Malaysia introduced him to Chet Singh, who headed the state’s Penang Development Corporation. “Chet Singh is your one-stop agent,” the Malaysian chief minister told Mr. Grove. Whenever Intel had an issue with getting a particular license, permit, road paved, or available tax credit, Chet would take care of it. He stayed in his job for more than two decades until the early 1990s, facilitating Intel’s ability to expand its Malaysian presence. Today, Malaysia is home to Intel’s largest manufacturing facility outside the United States (Note: Malaysia doesn’t treat its people the same way)
-
Over time I think manufacturing moved away because of some mixture of regulations (not all bad), high-cost labor (unions), higher cost of capital (complex) and a focus on other things (comparative advantage, or misdirected cultural signals?). Bill Gates, 2011
-
US global manufacturing share in the 80’s and 90’s was 22% - 24%. It started slipping in 99’. Today it’s 16.8%. China’s global market share was 3% in the 90, 8% in 2000 - today it is 28.7%
-
Global Manufacturing Output China – 28.7% United States – 16.8% Japan – 7.5% Germany – 5.3% India – 3.1% South Korea – 3% Italy – 2.1% France – 1.9% United Kingdom – 1.8% Indonesia – 1.6%
-
@ 147ac18e:ef1ca1ba
2025-04-13 01:57:13In a recent episode of The Survival Podcast, host Jack Spirko presents a contrarian view on the current trade war and tariffs imposed by the U.S. government. Far from being a chaotic or irrational policy, Jack argues that these tariffs are part of a broader strategic plan to rewire the global trade system in America's favor—and to force long-overdue changes in the domestic economy. Here's a breakdown of the core reasons Jack believes this is happening (or will happen) as a result of the tariffs:In a recent episode of The Survival Podcast, host Jack Spirko presents a contrarian view on the current trade war and tariffs imposed by the U.S. government. Far from being a chaotic or irrational policy, Jack argues that these tariffs are part of a broader strategic plan to rewire the global trade system in America's favor—and to force long-overdue changes in the domestic economy. Here's a breakdown of the core reasons Jack believes this is happening (or will happen) as a result of the tariffs:
1. Tariffs Are a Tool, Not the Goal
Jack’s central thesis is that tariffs are not meant to be a permanent fixture—they’re a pressure tactic. The goal isn’t protectionism for its own sake, but rather to reset trade relationships that have historically disadvantaged the U.S. For example, Taiwan responded to the tariffs not with retaliation but by proactively offering to reduce barriers and increase imports from the U.S. That, Jack says, is the intended outcome: cooperation on better terms.
2. Forced Deleveraging to Prevent Collapse
One of the boldest claims Jack makes is that the Trump administration used the tariffs as a catalyst to trigger a “controlled burn” of an over-leveraged stock market. According to him, large institutions were deeply leveraged in equities, and had the bubble popped organically later in the year, it would have required massive bailouts. Instead, the shock caused by tariffs triggered early deleveraging, avoiding systemic failure.
“I’m telling you, a bailout scenario was just avoided... This was intentional.” – Jack Spirko
3. Global Re-shoring and Domestic Manufacturing
Tariffs are incentivizing companies to move production back to the U.S., especially in key areas like semiconductors, energy, and industrial goods. This shift is being further accelerated by global geopolitical instability, creating a “once-in-a-generation” opportunity to rebuild small-town America and domestic supply chains.
4. Not Inflationary—Strategically Deflationary
Jack challenges conventional economic wisdom by arguing that tariffs themselves do not cause inflation, because inflation is a function of monetary expansion—not rising prices alone. In fact, he believes this economic shift may lead to deflation in some sectors, particularly as companies liquidate inventory, lower prices to remain competitive, and reduce reliance on foreign supply chains.
“Rising prices alone are not inflation. Inflation is expansion of the money supply.” – Jack Spirko
5. Energy Costs Will Fall
A drop in global oil prices, partially due to reduced transport needs as manufacturing reshoring increases, plays into the strategy. Jack notes that oil at $60 per barrel weakens adversaries like Russia (whose economy depends heavily on high oil prices) while keeping U.S. production viable. Lower energy costs also benefit domestic manufacturers.
6. The Digital Dollar & Global Dollarization
Alongside this industrial shift, the U.S. is poised to roll out a “digital dollar” infrastructure, giving global access to stablecoins backed by U.S. banks. Jack frames this as an effort to further entrench the dollar as the world’s dominant currency—ensuring continued global demand and export leverage without the need for perpetual military enforcement.
7. A Window of Opportunity for Americans
For individuals, Jack sees this economic transformation as a rare chance to accumulate long-term assets—stocks, Bitcoin, and real estate—while prices are suppressed. He warns that those who panic and sell are operating with a “poverty mindset,” whereas those who stay the course will benefit from what he describes as “the greatest fire sale of productive assets in a generation.”
Conclusion: Not a Collapse, But a Reset
Rather than viewing tariffs as a harbinger of economic doom, Jack presents them as part of a forced evolution—an uncomfortable but necessary reboot of the U.S. economic operating system. Whether or not it works as intended, he argues, this is not a haphazard policy. It’s a calculated reshaping of global and domestic economic dynamics, and one with enormous implications for trade, energy, inflation, and the average American investor.
-
@ 502ab02a:a2860397
2025-04-13 01:38:46อะไรคือ Heliotherapy
ถ้าลองหลับตา แล้วนึกถึงคนยุโรปยุคต้นศตวรรษที่ 20 ที่กำลังนอนอาบแดดบนภูเขา ห่มผ้าขนหนูบาง ๆ เปิดผิวให้พระอาทิตย์ลูบไล้ เฮียกำลังนึกถึงภาพของการรักษาโรคอย่างหนึ่งที่เรียกว่า Heliotherapy หรือ การบำบัดด้วยแสงอาทิตย์ ซึ่งเคยเป็นหนึ่งในศาสตร์ทางการแพทย์ที่ถูกยอมรับอย่างเป็นทางการ โดยเฉพาะในยุคที่ยังไม่มี “ยาปฏิชีวนะ”
Heliotherapy ไม่ได้เกิดจากความงมงาย แต่จากหลักฐานจริงจัง โดยเฉพาะผลงานของ ดร.ออกุสต์ โรลเลอร์ (Dr. Auguste Rollier) แพทย์ชาวสวิตเซอร์แลนด์ ผู้บุกเบิกการใช้แสงแดดรักษาผู้ป่วยวัณโรคกระดูกอย่างได้ผลในช่วงต้นศตวรรษที่ 20 เขาก่อตั้ง “โรงพยาบาลแห่งแสงอาทิตย์” บนเทือกเขาแอลป์ โดยให้ผู้ป่วยขึ้นไปอยู่ในที่สูงกว่า 1,500 เมตรเหนือระดับน้ำทะเล แล้วเปิดรับแสงแดดอย่างเป็นระบบ
ที่น่าสนใจคือ โรลเลอร์มีข้อกำหนดชัดเจนว่า ห้ามผู้ป่วยใส่แว่นกันแดดเด็ดขาด เพราะ “ดวงตา” คือหนึ่งในอวัยวะสำคัญที่ต้องรับรังสี UV เพื่อนำข้อมูลไปกระตุ้นต่อมไพเนียลในสมอง ส่งผลต่อวงจรชีวภาพ ฮอร์โมน และระบบภูมิคุ้มกันทั้งหมด ถ้าเราอาบแดดแต่ใส่แว่นดำ เท่ากับปิดประตูสำคัญของระบบบำบัดจากธรรมชาติ
แต่ถ้าย้อนกลับไปก่อนหน้านั้นอีกนิด เราจะเจอ “ต้นฉบับของแนวคิดแสงบำบัด” อยู่ที่ ดร.นีลส์ ฟินเซน (Dr. Niels Ryberg Finsen) นายแพทย์ชาวเดนมาร์ก ผู้ได้รับ รางวัลโนเบลสาขาสรีรวิทยาหรือการแพทย์ ในปี ค.ศ. 1903 จากการใช้แสงสว่างในการรักษาโรค Lupus vulgaris ซึ่งเป็นวัณโรคชนิดเรื้อรังที่แสดงออกบนผิวหนัง โดยเขาออกแบบอุปกรณ์ “Finsen Lamp” เพื่อฉายแสงตรงเข้าไปรักษาเซลล์ผิวโดยเฉพาะ และถือเป็นบิดาแห่ง Phototherapy ยุคใหม่
ทำไมแค่ “แดด” ถึงมีฤทธิ์บำบัด? แสงแดดคือคลังยาแห่งธรรมชาติอย่างแท้จริง เพราะประกอบด้วยรังสี UV หลายชนิด โดยเฉพาะ UVB ที่กระตุ้นให้ผิวหนังสร้าง วิตามินดี (Vitamin D3) ซึ่งมีบทบาทเสมือนฮอร์โมนที่ควบคุมระบบภูมิคุ้มกัน การอักเสบ และการดูดซึมแร่ธาตุต่าง ๆ เช่น แคลเซียมและแมกนีเซียม
แต่แดดไม่ได้มีแค่ UV แสงแดดในช่วงเช้ายังเต็มไปด้วยคลื่นแสงสีแดงและอินฟราเรดใกล้ (Near Infrared Light) ซึ่งมีบทบาทสำคัญในการซ่อมแซมไมโทคอนเดรีย—the powerhouse of the cell และช่วยกระตุ้นการหลั่งไนตริกออกไซด์ในหลอดเลือด ทำให้ระบบไหลเวียนโลหิตดีขึ้น ความดันสมดุลขึ้น และฟื้นฟูอวัยวะลึก ๆ ได้อย่างเงียบ ๆ
พูดง่าย ๆ คือ แดดเช้า = เติมแบตชีวภาพ ยิ่งแสงอาทิตย์กระทบผิวเราผ่าน “ดวงตาเปล่า” (โดยไม่ใส่แว่นกันแดดในช่วงเช้า) ก็ยิ่งช่วย “รีเซ็ตนาฬิกาชีวภาพ” ให้เราตื่นตรงเวลา หลับลึกขึ้น และเพิ่มการหลั่งเมลาโทนินในตอนค่ำโดยอัตโนมัติ
ในโลกที่คนวิ่งหาฮอร์โมนจากขวด การนอนตากแดด 10–20 นาทีต่อวัน กลับกลายเป็นเวทมนตร์ราคาถูกที่เรามองข้าม
และงานวิจัยจาก มหาวิทยาลัยเอดินบะระ (University of Edinburgh) ประเทศสกอตแลนด์ ก็ได้ยืนยันว่า แสงแดดมีส่วนช่วยลดความดันโลหิตได้จริง โดยไม่จำเป็นต้องพึ่งวิตามินดีเลยด้วยซ้ำ เพราะเมื่อแสงยูวีจากดวงอาทิตย์สัมผัสผิวหนัง จะกระตุ้นให้เกิดการปลดปล่อย “ไนตริกออกไซด์” (Nitric Oxide) จากชั้นผิวเข้าสู่ระบบหมุนเวียนโลหิต ซึ่งมีผลทำให้หลอดเลือดขยายตัว ความดันโลหิตลดลง และลดความเสี่ยงโรคหัวใจอย่างเห็นผล
นี่แปลว่าแสงแดดไม่เพียงแค่สว่าง แต่มันกำลัง “พูดภาษาเคมี” กับร่างกายเราอย่างเงียบ ๆ ทุกเช้า
ในยุคที่การแพทย์พัฒนาไปสุดทาง เทคโนโลยีผ่าตัดทำได้ถึงระดับนาโนเมตร กลับมีหมอบางคนหันกลับมาบอกว่า “คุณแค่ต้องออกไปรับแดดเช้า” เพื่อให้ร่างกายฟื้นตัวดีกว่าการพึ่งยาเพียงอย่างเดียว ดีไหมหล่ะ แต่ขอโทษทีคุณหมอที่บอกให้ไปตากแดดช่างมีน้อยเหลือเกินเมื่อดูในภาพรวม
Heliotherapy จึงไม่ใช่แค่การอาบแดด แต่คือการกลับไปเชื่อมโยงกับวงจรธรรมชาติ เหมือนคนโบราณที่เคารพดวงอาทิตย์ เพราะเขารู้ว่าพระอาทิตย์ไม่เคยหลอกเรา
ขณะที่ fiat ผลิตเม็ดสีสังเคราะห์และวิตามินปลอม ๆ พระอาทิตย์กลับให้ของจริง โดยไม่เรียกเก็บภาษีด้วย
ใครมีเวลา วันนี้เฮียขอชวนไปยืนรับแสงเช้า 10 นาที ไม่ต้องทำอะไร แค่ยืนเฉย ๆ ให้แสงซึมเข้าตา ซึมลงผิว แล้วฟังเสียงเงียบของร่างกายที่กำลังซ่อมแซมตัวเอง เงียบจนเราอาจได้ยินเสียงหัวใจบอกว่า "ขอบคุณนะ ที่ออกมารับแดดกับฉัน" #SundaySpecialเราจะไปเป็นหมูแดดเดียว #pirateketo #ตำรับเอ๋
-
@ 0ef78f78:1cc6bede
2025-04-12 23:21:18In a world of relentless change and mounting political chaos, developing a carefully reasoned worldview feels both urgent and indispensable. Modern existence throws us into a tempest of technological leaps, ethical dilemmas, and existential questions, pressing us to find clarity amid the chaos. Philosophy rises to meet this challenge—not as a leisurely diversion, but as a disciplined effort to probe truth and cultivate wisdom.
This blog sets out to invite readers to wrestle with life’s big questions and their relevance now. My aim is to unpack foundational concepts with precision, tying them to the realities of our time. This space is for serious reflection—rigorous yet accessible—where we can scrutinize the beliefs that steer our lives.
Philosophy as Theory Making About Theories I’ve always been struck by an idea from Wilfred Sellars: philosophy is about crafting theories about our theories. It’s a process of stepping back to examine the very frameworks we use to make sense of the world. As Sellars put it, “The aim of philosophy, abstractly formulated, is to understand how things in the broadest possible sense of the term hang together in the broadest possible sense of the term.” To me, this captures philosophy’s essence—it’s not just about asking what we believe, but why we believe it, and how those beliefs hold together. We all operate with answers to life’s deepest questions, whether we’ve thought them through or not, and they form the silent foundation of our worldview.
Here are some of the questions philosophy urges us to confront:
What gives human life its purpose? Are our choices genuinely free, or shaped by unseen forces? How do we discern right from wrong? Is certain knowledge possible, or is truth forever out of reach? What lies beyond death? Is there an ultimate reality or higher power? What makes a life meaningful? These aren’t idle musings—they quietly shape how we act, what we value, and how we see the world. As Socrates cautioned, an unexamined life risks being lived without purpose or understanding. Philosophy, as theory making about theories, pushes us to take charge of our beliefs, testing and refining them through reason.
Why This Matters Now Today, the need for this kind of reflection is sharper than ever. We’re awash in information and clashing viewpoints, each vying for our allegiance. Meanwhile, breakthroughs like artificial intelligence, biotechnology, and global connectivity force us to rethink what it means to be human. How do we stay human when machines rival our abilities? How do we judge right and wrong in a world of endless options?
Philosophy equips us to tackle these questions with clarity. It teaches us to pause, question what we assume, and construct thoughtful answers to the problems we face. By engaging in this theory-making process, we gain insight into both the world and ourselves.
Come Along for the Ride This blog is an open call to dive into these ideas together. In the posts to come, I’ll explore philosophical concepts and their real-world stakes, hoping to stir curiosity and conversation. I’m not here to hand out final answers, but to deepen our grasp of the questions—and maybe inspire us to live with more intention.
Philosophy is a journey of discovery, blending intellectual rigor with an embrace of complexity. As we go forward, I’d love for you to join me in this exploration—one that offers not just understanding, but a more deliberate way of being.
-
@ 8671a6e5:f88194d1
2025-04-12 23:04:34intro
Full disclosure : I bought multiple bitcoin art items to support artists
Bitcoin has absorbed old tropes from finance, tech, and economics, fundamentally reshaping how we think about money. But Bitcoin art? It should be a companion on the journey to a Bitcoin standard. Yet it doesn’t even seem to be trying. Every artistic movement worth its salt needs something to push against—to rebel, to spark thought, to provoke, or at the very least, to represent a technical or methodological leap forward in its field.
Pointillism comes to mind as an example in painting.
In this piece, I take a brief stroll into the subjective realm of art, specifically exploring art in the Bitcoin space—if such a thing truly exists. Some people might not like it, but as someone who has created modern art myself, I can confidently say that artists will emerge stronger from this transitional phase of Bitcoin art, whatever this era may be called later.
The art corner You know the drill. You visit any Bitcoin conference and there’s the obligatory “art corner” or gallery. Funny, wasn’t it just a few years back that a single decent artwork was a rarity needing a proper place for being shown tot he public? Now, every conference (small or big) needs this curated space, crammed with artists all vying for a sliver of attention.
And what do you usually find? A collection of the utterly predictable, the profoundly uninspired, the tiresomely repetitive, and anything but artistically groundbreaking amidst some exceptional pieces that will be snatched up almost immediately.
The themes are often so worn out, they’re practically a self-parody version of bitcoin art:
Animals holding signs (with of course… bitcoin logos)
Whales, dolphins, and the aquatic crew: The go-to, utterly drained metaphor for Bitcoin wealth, rendered in every conceivable medium with sea creatures.
Majestic vistas with bitcoin slogans: Think inspirational landscapes defaced with inscriptions or cryptic (not really) messages.
Women cradling blocks: Because apparently, nothing screams "Bitcoin" like a woman clutching a perfectly geometric cube. Bonus points if there are more painted women on a canvas, than actual women at the event.
Coins, coins, and more coins: Gold, silver, pixelated, abstract – just in case anyone forgot Bitcoin isn't a physical trinket.
Collages of Bitcoin celebs and memes: Why bother with originality when you can just mash up some social posts?
Reheated classics with an orange filter: Slap some orange highlights and a Bitcoin logo on a famous painting, and voilà! “Bitcoin art.” Bitcoin Pop-art, Bitcoin punk, Bitcoin collages…
It’s like the whole Bitcoin art scene is endlessly regurgitating the same tired ideas, and pouring a lot of time and effort in being just a fancy washing machine of orange t-shirts.
Most of it—not all, mind you, as there are people with exceptional thought and even more exceptional work—is no more than Bitcoin-themed art. By "theme," I mean the color orange or a “B,” much like you’d see M&M’s-themed coffee mugs, M&M’s t-shirts, or M&M’s-themed playing cards.
Now, let’s be clear: this isn’t about slagging off the artists themselves. I know how hard it is to thrive in this space, and I also learned about the time and effort put in to any work (the perception of the artwork has nothing to do with this at all!)
The dedication and passion within the bitcoin art scene are undeniable. Making art in a niche like Bitcoin is a tough gig (and often a thankless one, given the whole value-4-value thing seems perpetually broken). They deserve respect for putting themselves out there, doing the work and trying to make their passion work.
Many genuinely believe in what they’re creating, even if not everyone is convinced or will like a work of art. However, a lot of them are chasing a mirage, much like those hoping for an oasis of Bitcoin jobs in the desert. Many artists dream of turning their art into a business or a career move, and some even try to make a full-time living from it. That’s admirable, but I’m convinced it’s often a ruse, where your money, time, and effort dress up someone else’s business ideas and sense of branding. In my opinion, the real art movement in Bitcoin has yet to take off. It will need people with great ideas, motivation, know-how, and effort, for sure!
So I repeat the issue isn’t the individuals, the artists; it’s the collective creative stagnation that comes from clamoring to the general interest of this perceived “bitcoiner” as an audience.
Target < B > Audience
Only, this audience is usually not the target audience for the artworks itself. Art needs to have room to inspire, be free and relay an idea (even if that idea challenges another idea). That can’t be done to a target audience that just wants to sell their stuff to each other at a conference (see my piece on Bitcoin conferences for that) neither can it be a target audience that even is too cheap to buy a ticket and freeloads themselves into an conference.
Bitcoin is supposed to be revolutionary, yet so much of its art (or perceived art) feels like a tacked-on commercial necessity or, worse, a desperate attempt at self-validation. Most of it is just a perpetual branding motion from a non-existing marketing team.
The target audience is usually even worse. Not knowing what they’re looking at, out of their element and knowing they should and could support the artists and their work. A lot is depending on why this audience is wandering through a conference gallery in the first place.
If most people at a conference are the usuals, the sellers, the company people, then they're used to seeing these artists and their art pieces. No one is amazed anymore. Which is in fact a sad thing to happen.
I can't imagine how incredibly hard it must be to try to sell something as bitcoin art to this kind of audience, while trying to believe that a B-logo on an excerpt of the whitepaper is worth the effort. (I don’t think it is, but tastes differ, some people prefer a Whopper over a nice steak dinner)
Signaling “membership” in the bitcoin community is important to some, and they do that through hats, t-shirts, pins and hoodies, not buying a bitcoin artwork.
Art is inherently subjective, fluid, and deeply personal.
I love Kusama’s polka dots, someone else might be into Herman Brood’s chaotic paintings, and someone else might get all nostalgic over an Anton Pieck candy store drawings.
The contradiction Bitcoin: The hardest money ever created. Objectively verifiable. Math-based. Impersonal. Code.
The clash is between feeling and finance, between cold emotionless, hard numbers and warm, beating hearts.
That’s why it's always a bit surreal to see people that sit in a conference room, go from a deep dive into Lightning Network scalability or Bitcoin’s code ossification; and see them wandering through an “art gallery” filled with pieces that are the polar opposite of anything remotely code-related. The cold hearts walk amongst the works of warmth. The trustless math calculates their steps and starts to look at something that’s exposed to a public of that’s not there for the art, but the mimicking of such a think in their setting makes them have their own élan, grandeur. It feels forced. And to me, it feels even wrong to see people walk out of a conference room, right into the art gallery… where they’re usually stroll around out of boredom or just as a form of a break. It’s almost disrespectful, and I feel art needs its own place, the right setting. And that setting is definitely not a bitcoin conference.
You see tech and finance folks just standing there, at these art corners looking at the art pieces like cows watching a drone show.
You feel this subtle pressure to act like it’s profound, even though it rarely is. But you’re there, so you play along with the charade as well. It’s miserable to see. Certainly when some people are more interested in buying the piece of mind of the artist, the way of life or a glimmer of independence they’re missing themselves.
I believe bitcoin art is rarely bought for anything else than capturing the reality and authenticity of the artists. Artists know that. And they sell that authenticity (out) to eat, drink, sleep and pay their rent. Authenticity can be double spent, unlike the hard money asset where it’s supposedly all about. Artists have very big blocks.
It’s a bit like that hyped-up restaurant that turns out to be serving dressed-up bar food, but you’re with friends, so you pretend that $35 hors d'oeuvre doesn’t taste suspiciously like steamed shoe laces. Theaters are sometimes food bars or galleries. Proof of fart Then there’s the awkward issue of selling this stuff. How do you, as an artist, “comment on” or “complete” an asset in an artistic way, while that asset appreciates by an average of 40 to 70% a year?
Buying traditional art as an investment is one thing, driven by aesthetics or emotional connection. But buying Bitcoin art with Bitcoin? That’s a financial decision triggering regret (almost for sure). Think about it: 0.1 BTC spent on a canvas today, isn’t just a fixed one-time cost; it’s a future opportunity cost.
That same Bitcoin could be worth significantly more in a few years. The artwork, not so much, not even a Picasso painting or a Hokusai manages that kind of annual return. So, unless you’re head-over-heels for the piece (or the artist), buying Bitcoin art with Bitcoin is almost certainly a bad trade financially – though, so is buying that fancy coffee machine you'll use twice or getting a diamond ring for you loved one.
Of course, this isn't a definitive argument against it (it's subjective, remember). But it's a factor, just one element. People who buy art to lock it away into a vault aren't the same folks milling around a Bitcoin conference, presumably. But still.
Purpose
Historically, in the West at least, art served many purposes: glorifying churches, telling stories to the illiterate, and expressing the full spectrum of human emotion (pain, regret, doubt, madness, etc.). There was always a demand, whether from religious institutions, the populace, or a desire for education and status. The demand rarely came from onlookers or passive walk-ins. You can only walk in after the demand has been met. The real commanding force in Bitcoin art isn’t the financial types in suits or the grifter with a few stickers who got into the conference for free and smells like weed. The demand comes from people who love to cultivate the branding to propel themselves forward.
In Bitcoin? None of that. There’s little genuine demand, I’d argue. The demand seems mostly driven by the artists themselves wanting to participate. Which, in itself, makes the act of creation worthwhile for them. But the audience demand feels… manufactured. Nobody wakes up thinking: “.. I sure hope there’s a Bitcoin art gallery at this conference...”
This low-to-nonexistent demand, however, presents a massive opportunity to actually impress. Low expectations mean impact is easier to achieve in a lasting way. But that impact evaporates fast if all the visitors get is the same old themes with some orange varnish or a monkey holding a sign.
"Proof of work" isn’t enough here; we already have that in the bitcoin network. Bitcoin art need "proof of thought". Sure, Bitcoin artists put in the hours. Their work is literally proof of effort. But effort alone doesn’t equal value – originality does. Copying Warhol, Mondrian, or Van Gogh and slapping a Bitcoin twist on it isn’t the high level of creativity that can pull art lovers in (and even make them bitcoiners); on the contrary it’s opportunism. And in a space that seems to thrive on recycling successful (or at least visible or temporary cool) ideas, genuine artistic innovation is a rare beast.
Bitcoin art could be so much more. And yes that’s subjective, but at the same time, … walk around at any art gallery and be honest with yourself as a person and buy what you really like, support the artists and the scene, and at the same time realize you’re playing dress up.
There should be so much more, as a separate art movement. It could delve into the philosophy of decentralization, the tension between digital scarcity and creativity, the profound societal shifts Bitcoin is triggering. Instead, we’re mostly drowning in kitsch and thinly veiled cash grabs. The Bitcoin art world doesn’t need more bodies; it needs better minds. We don’t need bigger blocks, we don’t need blocks at all!
The uncomfortable truth is that many Bitcoin artists are here chasing opportunities, just like the rest of us. But spotting an opportunity doesn’t magically transform you into an artist.
I could “find the opportunity” to be a star in the hypothetical Bitcoin basketball league, being one of the first to join. But compared to the global pool of professional basketball talent, I’d likely be laughably bad. I’m not even tall enough to reach most pro players’ armpits, let alone dunk. Yet, in òur tiny Bitcoin league WBBF (World Bitcoin Basketball Federation), I’d be a legend, an OG, demanding respect for my early participation and best-dunk-champion. Just like some Bitcoin artists seem to expect accolades for a weak, orange-tinted imitation of 1960s pop art.
I wouldn’t cut it in any real basketball club, probably not even the lowest amateur league, considering my limited knowledge of the rules. Do you have to run back to the center? Can you tackle other players? Is snatching the ball mid-dribble legal? No clue.
But I could hang around the basketball scene a bit, soak up the jargon, maybe buy a sports drink for a better player to glean some knowledge, and then clumsily mimic their moves while still being terrible at dribbling. I’de buy the right shoes as well. To fit in. Just like bitcoiners buy the right t-shirts.
The same principle applies to some Bitcoin musicians and other creatives. Being the only one doing something – be it Bitcoin-themed sculptures, paintings, sci-fi, or whale graffiti murals – doesn’t automatically make you a leading figure. It just makes you… the only one. Being the sole sci-fi filmmaker in Bangladesh makes you the top of your national field, sure, but it doesn’t make you the next Kubrick. Likewise, airbrushing an orange “B” on a canvas doesn’t turn you into the next Georgia O’Keeffe.
The Bitcoin world thrives on competition and proof of work. Perhaps it’s high time Bitcoin art did the same. We need a battle of ideas, experiments, and genuine insights, not just more orange paint, paragraphs of the white paper and some copper wires.
The genuinely sad part is the sheer effort many of the artists pour into their work! But there’s a limit to how much you can make people want to buy an art piece simply because it has a Bitcoin theme. Go beyond that.
Get real
Real Bitcoin art, in whatever form it takes, will command a high valuation because it will be scarce, original, and have Bitcoin not just as a subject, but woven into its very fabric. That form (and there will be many), in my opinion, is still waiting to be discovered. And I’m fairly certain it won’t be found in a conference gallery, where bored artists sit next to their work, politely nodding at every bloke who wants to sound knowledgeable about art for five minutes or tries to make himself look like a big shot. Because let’s face it, I’ve yet to meet a Bitcoiner with a genuine understanding of art history or a truly discerning eye.
Some starting points, perhaps (just my two cents) :
Art that embodies decentralization itself, inviting audience participation and co-creation, mirroring Bitcoin’s ethos but yet to be fully realized in the art world. Including consensus.
Art that incorporates distributed consensus or a rotating "proof of work" concept in its creation or presentation.
Purely mathematical art forms that resonate with Bitcoin’s underlying principles.
The possibilities are vast. Or maybe, just maybe, Bitcoin itself is our art, and we don’t need all this orange-tinged stuff cluttering up galleries nobody asked for.
And why not paint blocks holding women, instead of women holding blocks? Or why not have inflation-resistant art? Or math-based art that isn’t even possible to show on a canvas?
On that subject, the author of this piece enjoys making art as well and conducted a small experiment. I've performed a "life performance" approximately three times now, which I consider pure Bitcoin art. This was an action, not a physical object. It demonstrated work I personally delivered as “a miner” (function in this art piece), and during the process, people could verify it and even received my block subsidy (effort). So far, only one person has recognized this art form; the rest were unaware. Since it's an action, not an object, it's intangible unless you witnessed it. This is my way of saying, "you are the artist." According to the bitcoin ethos.
Interestingly enough, other people, even those involved in Bitcoin art themselves (!), didn't see it. This amused me because, much like the early weeks of Bitcoin's network growth, many initially failed to recognize its potential. Perhaps this parallel should be enough for us all to understand the true nature of Bitcoin art.
The Artistic Dare:
Here’s a challenge, not to your wallet, but to your creative soul: conceive and execute a piece of art that embodies the spirit and principles of Bitcoin in a way that is genuinely original, thought-provoking, and resonates beyond the immediate Bitcoin echo chamber. Forget the predictable iconography. Dig deeper.
If you can create something truly compelling, something that makes us see Bitcoin – or art – in a new light, then you’ve truly created Bitcoin art. And then comes the extra real challenge: finding someone who can and would pay for it, and at the same time “gets it”.
The main challenge is creating real art—a path, a genre—where a standalone Bitcoin art gallery can thrive outside the conferences and the small echo chamber of the “what do you sell?” crowd.
Don’t sell your dreams and authenticity to bored traders or bitcoin consultants. It’s like serving the finest wine to a bunch of alcoholics in a bar at 4 am.
Playing it safe with themes and artworks that can’t cross into the real art scene (even the underground art scene, let alone the corporate art) will not be as long-lived as bitcoin itself. Trying to spark interest from art lovers in general, will be the killer app, and will make bitcoin art into a movement. And that’s what we all need to make it art,… the pieces can’t exist without the movement. I hope someone will get the right spark, idea and fire going.
But until then we’ll be stuck with people painting a chimpanzee holding a glittering Bitcoin logo and chatting with any dude that wants to feel like someone at a conference.
Good luck.
AVB
-
@ 826e9f89:ffc5c759
2025-04-12 21:34:24What follows began as snippets of conversations I have been having for years, on and off, here and there. It will likely eventually be collated into a piece I have been meaning to write on “payments” as a whole. I foolishly started writing this piece years ago, not realizing that the topic is gargantuan and for every week I spend writing it I have to add two weeks to my plan. That may or may not ever come to fruition, but in the meantime, Tether announced it was issuing on Taproot Assets and suddenly everybody is interested again. This is as good a catalyst as any to carve out my “stablecoin thesis”, such as it exists, from “payments”, and put it out there for comment and feedback.
In contrast to the “Bitcoiner take” I will shortly revert to, I invite the reader to keep the following potential counterargument in mind, which might variously be termed the “shitcoiner”, “realist”, or “cynical” take, depending on your perspective: that stablecoins have clear product-market-fit. Now, as a venture capitalist and professional thinkboi focusing on companies building on Bitcoin, I obviously think that not only is Bitcoin the best money ever invented and its monetization is pretty much inevitable, but that, furthermore, there is enormous, era-defining long-term potential for a range of industries in which Bitcoin is emerging as superior technology, even aside from its role as money. But in the interest not just of steelmanning but frankly just of honesty, I would grudgingly agree with the following assessment as of the time of writing: the applications of crypto (inclusive of Bitcoin but deliberately wider) that have found product-market-fit today, and that are not speculative bets on future development and adoption, are: Bitcoin as savings technology, mining as a means of monetizing energy production, and stablecoins.
I think there are two typical Bitcoiner objections to stablecoins of significantly greater importance than all others: that you shouldn’t be supporting dollar hegemony, and that you don’t need a blockchain. I will elaborate on each of these, and for the remainder of the post will aim to produce a synthesis of three superficially contrasting (or at least not obviously related) sources of inspiration: these objections, the realisation above that stablecoins just are useful, and some commentary on technical developments in Bitcoin and the broader space that I think inform where things are likely to go. As will become clear as the argument progresses, I actually think the outcome to which I am building up is where things have to go. I think the technical and economic incentives at play make this an inevitability rather than a “choice”, per se. Given my conclusion, which I will hold back for the time being, this is a fantastically good thing, hence I am motivated to write this post at all!
Objection 1: Dollar Hegemony
I list this objection first because there isn’t a huge amount to say about it. It is clearly a normative position, and while I more or less support it personally, I don’t think that it is material to the argument I am going on to make, so I don’t want to force it on the reader. While the case for this objection is probably obvious to this audience (isn’t the point of Bitcoin to destroy central banks, not further empower them?) I should at least offer the steelman that there is a link between this and the realist observation that stablecoins are useful. The reason they are useful is because people prefer the dollar to even shitter local fiat currencies. I don’t think it is particularly fruitful to say that they shouldn’t. They do. Facts don’t care about your feelings. There is a softer bridging argument to be made here too, to the effect that stablecoins warm up their users to the concept of digital bearer (ish) assets, even though these particular assets are significantly scammier than Bitcoin. Again, I am just floating this, not telling the reader they should or shouldn’t buy into it.
All that said, there is one argument I do want to put my own weight behind, rather than just float: stablecoin issuance is a speculative attack on the institution of fractional reserve banking. A “dollar” Alice moves from JPMorgan to Tether embodies two trade-offs from Alice’s perspective: i) a somewhat opaque profile on the credit risk of the asset: the likelihood of JPMorgan ever really defaulting on deposits vs the operator risk of Tether losing full backing and/or being wrench attacked by the Federal Government and rugging its users. These risks are real but are almost entirely political. I’m skeptical it is meaningful to quantify them, but even if it is, I am not the person to try to do it. Also, more transparently to Alice, ii) far superior payment rails (for now, more on this to follow).
However, from the perspective of the fiat banking cartel, fractional reserve leverage has been squeezed. There are just as many notional dollars in circulation, but there the backing has been shifted from levered to unlevered issuers. There are gradations of relevant objections to this: while one might say, Tether’s backing comes from Treasuries, so you are directly funding US debt issuance!, this is a bit silly in the context of what other dollars one might hold. It’s not like JPMorgan is really competing with the Treasury to sell credit into the open market. Optically they are, but this is the core of the fiat scam. Via the guarantees of the Federal Reserve System, JPMorgan can sell as much unbacked credit as it wants knowing full well the difference will be printed whenever this blows up. Short-term Treasuries are also JPMorgan’s most pristine asset safeguarding its equity, so the only real difference is that Tether only holds Treasuries without wishing more leverage into existence. The realization this all builds up to is that, by necessity,
Tether is a fully reserved bank issuing fiduciary media against the only dollar-denominated asset in existence whose value (in dollar terms) can be guaranteed. Furthermore, this media arguably has superior “moneyness” to the obvious competition in the form of US commercial bank deposits by virtue of its payment rails.
That sounds pretty great when you put it that way! Of course, the second sentence immediately leads to the second objection, and lets the argument start to pick up steam …
Objection 2: You Don’t Need a Blockchain
I don’t need to explain this to this audience but to recap as briefly as I can manage: Bitcoin’s value is entirely endogenous. Every aspect of “a blockchain” that, out of context, would be an insanely inefficient or redundant modification of a “database”, in context is geared towards the sole end of enabling the stability of this endogenous value. Historically, there have been two variations of stupidity that follow a failure to grok this: i) “utility tokens”, or blockchains with native tokens for something other than money. I would recommend anybody wanting a deeper dive on the inherent nonsense of a utility token to read Only The Strong Survive, in particular Chapter 2, Crypto Is Not Decentralized, and the subsection, Everything Fights For Liquidity, and/or Green Eggs And Ham, in particular Part II, Decentralized Finance, Technically. ii) “real world assets” or, creating tokens within a blockchain’s data structure that are not intended to have endogenous value but to act as digital quasi-bearer certificates to some or other asset of value exogenous to this system. Stablecoins are in this second category.
RWA tokens definitionally have to have issuers, meaning some entity that, in the real world, custodies or physically manages both the asset and the record-keeping scheme for the asset. “The blockchain” is at best a secondary ledger to outsource ledger updates to public infrastructure such that the issuer itself doesn’t need to bother and can just “check the ledger” whenever operationally relevant. But clearly ownership cannot be enforced in an analogous way to Bitcoin, under both technical and social considerations. Technically, Bitcoin’s endogenous value means that whoever holds the keys to some or other UTXOs functionally is the owner. Somebody else claiming to be the owner is yelling at clouds. Whereas, socially, RWA issuers enter a contract with holders (whether legally or just in terms of a common-sense interpretation of the transaction) such that ownership of the asset issued against is entirely open to dispute. That somebody can point to “ownership” of the token may or may not mean anything substantive with respect to the physical reality of control of the asset, and how the issuer feels about it all.
And so, one wonders, why use a blockchain at all? Why doesn’t the issuer just run its own database (for the sake of argument with some or other signature scheme for verifying and auditing transactions) given it has the final say over issuance and redemption anyway? I hinted at an answer above: issuing on a blockchain outsources this task to public infrastructure. This is where things get interesting. While it is technically true, given the above few paragraphs, that, you don’t need a blockchain for that, you also don’t need to not use a blockchain for that. If you want to, you can.
This is clearly the case given stablecoins exist at all and have gone this route. If one gets too angry about not needing a blockchain for that, one equally risks yelling at clouds! And, in fact, one can make an even stronger argument, more so from the end users’ perspective. These products do not exist in a vacuum but rather compete with alternatives. In the case of stablecoins, the alternative is traditional fiat money, which, as stupid as RWAs on a blockchain are, is even dumber. It actually is just a database, except it’s a database that is extremely annoying to use, basically for political reasons because the industry managing these private databases form a cartel that never needs to innovate or really give a shit about its customers at all. In many, many cases, stablecoins on blockchains are dumb in the abstract, but superior to the alternative methods of holding and transacting in dollars existing in other forms. And note, this is only from Alice’s perspective of wanting to send and receive, not a rehashing of the fractional reserve argument given above. This is the essence of their product-market-fit. Yell at clouds all you like: they just are useful given the alternative usually is not Bitcoin, it’s JPMorgan’s KYC’d-up-the-wazoo 90s-era website, more than likely from an even less solvent bank.
So where does this get us? It might seem like we are back to “product-market-fit, sorry about that” with Bitcoiners yelling about feelings while everybody else makes do with their facts. However, I think we have introduced enough material to move the argument forward by incrementally incorporating the following observations, all of which I will shortly go into in more detail: i) as a consequence of making no technical sense with respect to what blockchains are for, today’s approach won’t scale; ii) as a consequence of short-termist tradeoffs around socializing costs, today’s approach creates an extremely unhealthy and arguably unnatural market dynamic in the issuer space; iii) Taproot Assets now exist and handily address both points i) and ii), and; iv) eCash is making strides that I believe will eventually replace even Taproot Assets.
To tease where all this is going, and to get the reader excited before we dive into much more detail: just as Bitcoin will eat all monetary premia, Lightning will likely eat all settlement, meaning all payments will gravitate towards routing over Lightning regardless of the denomination of the currency at the edges. Fiat payments will gravitate to stablecoins to take advantage of this; stablecoins will gravitate to TA and then to eCash, and all of this will accelerate hyperbitcoinization by “bitcoinizing” payment rails such that an eventual full transition becomes as simple as flicking a switch as to what denomination you want to receive.
I will make two important caveats before diving in that are more easily understood in light of having laid this groundwork: I am open to the idea that it won’t be just Lightning or just Taproot Assets playing the above roles. Without veering into forecasting the entire future development of Bitcoin tech, I will highlight that all that really matters here are, respectively: a true layer 2 with native hashlocks, and a token issuance scheme that enables atomic routing over such a layer 2 (or combination of such). For the sake of argument, the reader is welcome to swap in “Ark” and “RGB” for “Lightning” and “TA” both above and in all that follows. As far as I can tell, this makes no difference to the argument and is even exciting in its own right. However, for the sake of simplicity in presentation, I will stick to “Lightning” and “TA” hereafter.
1) Today’s Approach to Stablecoins Won’t Scale
This is the easiest to tick off and again doesn’t require much explanation to this audience. Blockchains fundamentally don’t scale, which is why Bitcoin’s UTXO scheme is a far better design than ex-Bitcoin Crypto’s’ account-based models, even entirely out of context of all the above criticisms. This is because Bitcoin transactions can be batched across time and across users with combinations of modes of spending restrictions that provide strong economic guarantees of correct eventual net settlement, if not perpetual deferral. One could argue this is a decent (if abstrusely technical) definition of “scaling” that is almost entirely lacking in Crypto.
What we see in ex-Bitcoin crypto is so-called “layer 2s” that are nothing of the sort, forcing stablecoin schemes in these environments into one of two equally poor design choices if usage is ever to increase: fees go higher and higher, to the point of economic unviability (and well past it) as blocks fill up, or move to much more centralized environments that increasingly are just databases, and hence which lose the benefits of openness thought to be gleaned by outsourcing settlement to public infrastructure. This could be in the form of punting issuance to a bullshit “layer 2” that is a really a multisig “backing” a private execution environment (to be decentralized any daw now) or an entirely different blockchain that is just pretending even less not to be a database to begin with. In a nutshell, this is a decent bottom-up explanation as to why Tron has the highest settlement of Tether.
This also gives rise to the weirdness of “gas tokens” - assets whose utility as money is and only is in the form of a transaction fee to transact a different kind of money. These are not quite as stupid as a “utility token,” given at least they are clearly fulfilling a monetary role and hence their artificial scarcity can be justified. But they are frustrating from Bitcoiners’ and users’ perspectives alike: users would prefer to pay transaction fees on dollars in dollars, but they can’t because the value of Ether, Sol, Tron, or whatever, is the string and bubblegum that hold their boondoggles together. And Bitcoiners wish this stuff would just go away and stop distracting people, whereas this string and bubblegum is proving transiently useful.
All in all, today’s approach is fine so long as it isn’t being used much. It has product-market fit, sure, but in the unenviable circumstance that, if it really starts to take off, it will break, and even the original users will find it unusable.
2) Today’s Approach to Stablecoins Creates an Untenable Market Dynamic
Reviving the ethos of you don’t need a blockchain for that, notice the following subtlety: while the tokens representing stablecoins have value to users, that value is not native to the blockchain on which they are issued. Tether can (and routinely does) burn tokens on Ethereum and mint them on Tron, then burn on Tron and mint on Solana, and so on. So-called blockchains “go down” and nobody really cares. This makes no difference whatsoever to Tether’s own accounting, and arguably a positive difference to users given these actions track market demand. But it is detrimental to the blockchain being switched away from by stripping it of “TVL” that, it turns out, was only using it as rails: entirely exogenous value that leaves as quickly as it arrived.
One underdiscussed and underappreciated implication of the fact that no value is natively running through the blockchain itself is that, in the current scheme, both the sender and receiver of a stablecoin have to trust the same issuer. This creates an extremely powerful network effect that, in theory, makes the first-to-market likely to dominate and in practice has played out exactly as this theory would suggest: Tether has roughly 80% of the issuance, while roughly 19% goes to the political carve-out of USDC that wouldn’t exist at all were it not for government interference. Everybody else combined makes up the final 1%.
So, Tether is a full reserve bank but also has to be everybody’s bank. This is the source of a lot of the discomfort with Tether, and which feeds into the original objection around dollar hegemony, that there is an ill-defined but nonetheless uneasy feeling that Tether is slowly morphing into a CBDC. I would argue this really has nothing to do with Tether’s own behavior but rather is a consequence of the market dynamic inevitably created by the current stablecoin scheme. There is no reason to trust any other bank because nobody really wants a bank, they just want the rails. They want something that will retain a nominal dollar value long enough to spend it again. They don’t care what tech it runs on and they don’t even really care about the issuer except insofar as having some sense they won’t get rugged.
Notice this is not how fiat works. Banks can, of course, settle between each other, thus enabling their users to send money to customers of other banks. This settlement function is actually the entire point of central banks, less the money printing and general corruption enabled (we might say, this was the historical point of central banks, which have since become irredeemably corrupted by this power). This process is clunkier than stablecoins, as covered above, but the very possibility of settlement means there is no gigantic network effect to being the first commercial issuer of dollar balances. If it isn’t too triggering to this audience, one might suggest that the money printer also removes the residual concern that your balances might get rugged! (or, we might again say, you guarantee you don’t get rugged in the short term by guaranteeing you do get rugged in the long term).
This is a good point at which to introduce the unsettling observation that broader fintech is catching on to the benefits of stablecoins without any awareness whatsoever of all the limitations I am outlining here. With the likes of Stripe, Wise, Robinhood, and, post-Trump, even many US megabanks supposedly contemplating issuing stablecoins (obviously within the current scheme, not the scheme I am building up to proposing), we are forced to boggle our minds considering how on earth settlement is going to work. Are they going to settle through Ether? Well, no, because i) Ether isn’t money, it’s … to be honest, I don’t think anybody really knows what it is supposed to be, or if they once did they aren’t pretending anymore, but anyway, Stripe certainly hasn’t figured that out yet so, ii) it won’t be possible to issue them on layer 1s as soon as there is any meaningful volume, meaning they will have to route through “bullshit layer 2 wrapped Ether token that is really already a kind of stablecoin for Ether.”
The way they are going to try to fix this (anybody wanna bet?) is routing through DEXes, which is so painfully dumb you should be laughing and, if you aren’t, I would humbly suggest you don’t get just how dumb it is. What this amounts to is plugging the gap of Ether’s lack of moneyness (and wrapped Ether’s hilarious lack of moneyness) with … drum roll … unknowable technical and counterparty risk and unpredictable cost on top of reverting to just being a database. So, in other words, all of the costs of using a blockchain when you don’t strictly need to, and none of the benefits. Stripe is going to waste billions of dollars getting sandwich attacked out of some utterly vanilla FX settlement it is facilitating for clients who have even less of an idea what is going on and why North Korea now has all their money, and will eventually realize they should have skipped their shitcoin phase and gone straight to understanding Bitcoin instead …
3) Bitcoin (and Taproot Assets) Fixes This
To tie together a few loose ends, I only threw in the hilariously stupid suggestion of settling through wrapped Ether on Ether on Ether in order to tee up the entirely sensible suggestion of settling through Lightning. Again, not that this will be new to this audience, but while issuance schemes have been around on Bitcoin for a long time, the breakthrough of Taproot Assets is essentially the ability to atomically route through Lightning.
I will admit upfront that this presents a massive bootstrapping challenge relative to the ex-Bitcoin Crypto approach, and it’s not obvious to me if or how this will be overcome. I include this caveat to make it clear I am not suggesting this is a given. It may not be, it’s just beyond the scope of this post (or frankly my ability) to predict. This is a problem for Lightning Labs, Tether, and whoever else decides to step up to issue. But even highlighting this as an obvious and major concern invites us to consider an intriguing contrast: scaling TA stablecoins is hardest at the start and gets easier and easier thereafter. The more edge liquidity there is in TA stables, the less of a risk it is for incremental issuance; the more TA activity, the more attractive deploying liquidity is into Lightning proper, and vice versa. With apologies if this metaphor is even more confusing than it is helpful, one might conceive of the situation as being that there is massive inertia to bootstrap, but equally there could be positive feedback in driving the inertia to scale. Again, I have no idea, and it hasn’t happened yet in practice, but in theory it’s fun.
More importantly to this conversation, however, this is almost exactly the opposite dynamic to the current scheme on other blockchains, which is basically free to start, but gets more and more expensive the more people try to use it. One might say it antiscales (I don’t think that’s a real word, but if Taleb can do it, then I can do it too!).
Furthermore, the entire concept of “settling in Bitcoin” makes perfect sense both economically and technically: economically because Bitcoin is money, and technically because it can be locked in an HTLC and hence can enable atomic routing (i.e. because Lightning is a thing). This is clearly better than wrapped Eth on Eth on Eth or whatever, but, tantalisingly, is better than fiat too! The core message of the payments tome I may or may not one day write is (or will be) that fiat payments, while superficially efficient on the basis of centralized and hence costless ledger amendments, actually have a hidden cost in the form of interbank credit. Many readers will likely have heard me say this multiple times and in multiple settings but, contrary to popular belief, there is no such thing as a fiat debit. Even if styled as a debit, all fiat payments are credits and all have credit risk baked into their cost, even if that is obscured and pushed to the absolute foundational level of money printing to keep banks solvent and hence keep payment channels open.
Furthermore! this enables us to strip away the untenable market dynamic from the point above. The underappreciated and underdiscussed flip side of the drawback of the current dynamic that is effectively fixed by Taproot Assets is that there is no longer a mammoth network effect to a single issuer. Senders and receivers can trust different issuers (i.e. their own banks) because those banks can atomically settle a single payment over Lightning. This does not involve credit. It is arguably the only true debit in the world across both the relevant economic and technical criteria: it routes through money with no innate credit risk, and it does so atomically due to that money’s native properties.
Savvy readers may have picked up on a seed I planted a while back and which can now delightfully blossom:
This is what Visa was supposed to be!
Crucially, this is not what Visa is now. Visa today is pretty much the bank that is everybody’s counterparty, takes a small credit risk for the privilege, and oozes free cash flow bottlenecking global consumer payments.
But if you read both One From Many by Dee Hock (for a first person but pretty wild and extravagant take) and Electronic Value Exchange by David Stearns (for a third person, drier, but more analytical and historically contextualized take) or if you are just intimately familiar with the modern history of payments for whatever other reason, you will see that the role I just described for Lightning in an environment of unboundedly many banks issuing fiduciary media in the form of stablecoins is exactly what Dee Hock wanted to create when he envisioned Visa:
A neutral and open layer of value settlement enabling banks to create digital, interbank payment schemes for their customers at very low cost.
As it turns out, his vision was technically impossible with fiat, hence Visa, which started as a cooperative amongst member banks, was corrupted into a duopolistic for-profit rent seeker in curious parallel to the historical path of central banks …
4) eCash
To now push the argument to what I think is its inevitable conclusion, it’s worth being even more vigilant on the front of you don’t need a blockchain for that. I have argued that there is a role for a blockchain in providing a neutral settlement layer to enable true debits of stablecoins. But note this is just a fancy and/or stupid way of saying that Bitcoin is both the best money and is programmable, which we all knew anyway. The final step is realizing that, while TA is nice in terms of providing a kind of “on ramp” for global payments infrastructure as a whole to reorient around Lightning, there is some path dependence here in assuming (almost certainly correctly) that the familiarity of stablecoins as “RWA tokens on a blockchain” will be an important part of the lure.
But once that transition is complete, or is well on its way to being irreversible, we may as well come full circle and cut out tokens altogether. Again, you really don’t need a blockchain for that, and the residual appeal of better rails has been taken care of with the above massive detour through what I deem to be the inevitability of Lightning as a settlement layer. Just as USDT on Tron arguably has better moneyness than a JPMorgan balance, so a “stablecoin” as eCash has better moneyness than as a TA given it is cheaper, more private, and has more relevantly bearer properties (in other words, because it is cash). The technical detail that it can be hashlocked is really all you need to tie this all together. That means it can be atomically locked into a Lightning routed debit to the recipient of a different issuer (or “mint” in eCash lingo, but note this means the same thing as what we have been calling fully reserved banks). And the economic incentive is pretty compelling too because, for all their benefits, there is still a cost to TAs given they are issued onchain and they require asset-specific liquidity to route on Lightning. Once the rest of the tech is in place, why bother? Keep your Lightning connectivity and just become a mint.
What you get at that point is dramatically superior private database to JPMorgan with the dramatically superior public rails of Lightning. There is nothing left to desire from “a blockchain” besides what Bitcoin is fundamentally for in the first place: counterparty-risk-free value settlement.
And as a final point with a curious and pleasing echo to Dee Hock at Visa, Calle has made the point repeatedly that David Chaum’s vision for eCash, while deeply philosophical besides the technical details, was actually pretty much impossible to operate on fiat. From an eCash perspective, fiat stablecoins within the above infrastructure setup are a dramatic improvement on anything previously possible. But, of course, they are a slippery slope to Bitcoin regardless …
Objections Revisited
As a cherry on top, I think the objections I highlighted at the outset are now readily addressed – to the extent the reader believes what I am suggesting is more or less a technical and economic inevitability, that is. While, sure, I’m not particularly keen on giving the Treasury more avenues to sell its welfare-warfare shitcoin, on balance the likely development I’ve outlined is an enormous net positive: it’s going to sell these anyway so I prefer a strong economic incentive to steadily transition not only to Lightning as payment rails but eCash as fiduciary media, and to use “fintech” as a carrot to induce a slow motion bank run.
As alluded to above, once all this is in place, the final step to a Bitcoin standard becomes as simple as an individual’s decision to want Bitcoin instead of fiat. On reflection, this is arguably the easiest part! It's setting up all the tech that puts people off, so trojan-horsing them with “faster, cheaper payment rails” seems like a genius long-term strategy.
And as to “needing a blockchain” (or not), I hope that is entirely wrapped up at this point. The only blockchain you need is Bitcoin, but to the extent people are still confused by this (which I think will take decades more to fully unwind), we may as well lean into dazzling them with whatever innovation buzzwords and decentralization theatre they were going to fall for anyway before realizing they wanted Bitcoin all along.
Conclusion
Stablecoins are useful whether you like it or not. They are stupid in the abstract but it turns out fiat is even stupider, on inspection. But you don’t need a blockchain, and using one as decentralization theatre creates technical debt that is insurmountable in the long run. Blockchain-based stablecoins are doomed to a utility inversely proportional to their usage, and just to rub it in, their ill-conceived design practically creates a commercial dynamic that mandates there only ever be a single issuer.
Given they are useful, it seems natural that this tension is going to blow up at some point. It also seems worthwhile observing that Taproot Asset stablecoins have almost the inverse problem and opposite commercial dynamic: they will be most expensive to use at the outset but get cheaper and cheaper as their usage grows. Also, there is no incentive towards a monopoly issuer but rather towards as many as are willing to try to operate well and provide value to their users.
As such, we can expect any sizable growth in stablecoins to migrate to TA out of technical and economic necessity. Once this has happened - or possibly while it is happening but is clearly not going to stop - we may as well strip out the TA component and just use eCash because you really don’t need a blockchain for that at all. And once all the money is on eCash, deciding you want to denominate it in Bitcoin is the simplest on-ramp to hyperbitcoinization you can possibly imagine, given we’ve spent the previous decade or two rebuilding all payments tech around Lightning.
Or: Bitcoin fixes this. The End.
- Allen, #892,125
thanks to Marco Argentieri, Lyn Alden, and Calle for comments and feedback
-
@ 04cb16e4:2ec3e5d5
2025-04-12 19:21:48Meine erste "Begegnung" mit Ulrike hatte ich am 21. März 2022 - dank Amazon konnte ich das Ereignis noch exakt nachvollziehen. Es war eines meiner ersten (Lockdown) kritischen Bücher, die ich in dieser Zeit in die Hände bekam - noch nach Thomas Röper (das war mein Einstieg) aber vor Daniele Ganser. Insofern war es mir möglich, das, was dann folgte für die Autorin, live und in Farbe mit zu verfolgen:
"Wer sich in die Öffentlichkeit traut, kann sich dort ganz schnell eine blutige Nase holen. Dieselben Medien, die eine Person heute glorifizieren, stellen sie morgen an den Pranger. Sie verteilen und entziehen Reputation, fördern und zerstören Karrieren. Das Medium selbst bleibt jedoch immer auf der Siegerseite. Die Gesetze von Marktorientierung und zynisch-ideologisierter Machtausübung gelten für Rundfunk und Fernsehen ebenso wie für die Printmedien - von RTL bis ARD und ZDF, von der BILD über die taz bis zur ZEIT.
»Das Phänomen Guérot« legt genau diesen Vorgang detailliert offen: Der MENSCH Ulrike Guérot ist in der Realität nicht die dämonische Figur, als die sie hingestellt worden ist. Aber an ihr kristallisiert sich genau dieser menschenverachtende Prozess heraus, der bis heute andauert."
Im Herbst 2022 habe ich durch den ersten Vortrag von Daniele Ganser in Falkensee nicht nur Zugang zu einer für mich neuen und anderen Welt bekommen, ab da hat sich eigentlich auch für mich mein Leben komplett auf den Kopf gestellt. Die Weichen wurden zwar schon vorher gestellt, aber nun war es endgültig und es gab kein zurück mehr. Die Planung für das erste Symposium Falkensee war in meinem Kopf geboren und die MenschheitsFamilie entstand als Ort, der virtuell das vereinen sollte, was Daniele an Spiritualität, Menschlichkeit und Friedenswillen in mir freigesetzt hat. Es war sozusagen eine Energie, die nun stetig floß und einen Trichter gefunden hat, in dem sie wirksam werden und sich entfalten konnte. Insofern haben wir auch etwas gemeinsam - Ulrike und ich. Wir sind zu der Zeit auf einen Zug aufgesprungen, der unser Leben veränderte - der uns zwang, alte Wege zu verlassen und neue Wege zu beschreiten. Sowohl beruflich, als auch privat. Und auch das canceln und entfernt werden ist eine Erfahrung, die wir beide teilen. Vielleicht war es deswegen mein erster Gedanke im Herbst 2022, Ulrike Guérot zu meinem 1. Symposium nach Falkensee einzuladen. Das es dann erst beim 2. Anlauf wirklich geklappt hat, hatte auch mit den Höhen und Tiefen des Lebens in dieser Zeit zu tun gehabt.
Nun ist sie zum 2. Mal dabei - denn wer könnte das Thema "Europa" bei einem so wichtigen und hochaktuellen Thema besser vertreten und beleuchten als Ulrike Guérot? Es geht um Geschichte, es geht um Nationalitäten, es geht um Gemeinsamkeiten und um das, was uns hier im Herzen zusammenhält, was unsere Ziele und unsere Befindlichkeiten sind, es geht um Verantwortung und es geht vor allen Dingen um Frieden! Denn dafür steht Europa - für einen Kontinent, der es geschafft hat, trotz aller Gegensätze und Konflikte, die in Jahrhunderten kriegerisch aufgetragen wurden, eine neuen und besonderen Frieden zu finden und zu installieren:
"Völkerrechtlich legt der Westfälische Frieden den oder zumindest einen Grundstein für ein modernes Prinzip: Die Gleichberechtigung souveräner Staaten, unabhängig von ihrer Macht und Größe. Noch heute spricht die Politikwissenschaft, insbesondere die realistische Schule (Henry Kissinger), deshalb vom „Westphalian System“. Durch die Garantien der großen europäischen Mächte erweist sich dieser Frieden als stabilisierendes Element für die weitere Entwicklung in Europa. Noch bis zum Ende des 18. Jahrhunderts wird er immer wieder als Referenz für nachfolgende Friedensschlüsse herangezogen."
Es ging damals um viel und es geht heute um das Überleben auf einem Kontinent, der es eigentlich besser wissen sollte. Wir dürfen gespannt sein, was wir in diesem Vortrag von Ulrike auf dem Symposium Falkensee am 27. April 2025 für Lösungen finden, um wieder zu einer Ordnung und zu einem System der friedlichen Koexistenz zurückfinden zu können, ohne schwarz und weiß und mit all den Facetten, die das Leben uns so bietet:
"Es ging nicht mehr um das Ausfechten religiöser Wahrheiten, sondern um geregelte Verfahren, die es möglich machten, mit konkurrierenden religiösen Wahrheiten, die nach wie vor nebeneinander und unversöhnlich bestanden, auf friedliche Weise umzugehen. Deutlich wurde das nicht zuletzt, als der Papst in einer offiziellen Note scharf gegen den Friedensschluss protestierte, weil er die Rechte der katholischen Seite leichtfertig aufgegeben sah. Die katholischen Beteiligten des Abkommens hielt dies nicht von der Unterzeichnung ab - ein religiöser Schiedsrichter wurde in Sachen Krieg und Frieden nicht mehr akzeptiert."
-
@ a296b972:e5a7a2e8
2025-04-12 19:12:54So sehr der Gedanke auch verlockend ist, es ist leider nicht möglich, den Staat durch Steuerzahlungsverweigerung auszuhungern, obwohl die absurde, generationenübergreifende Sonderverschuldung geradezu danach schreit. Das hysterische Herbeireden einer Bedrohung durch Russland wird durch die Steuerzahler zwangsfinanziert. Die zu melkende Kuh kann nicht aus ihrem Stall ausbrechen. Nach wie vor gibt es Menschen, die ihre Steuererklärung fristgerecht abgeben möchten, die sich daraus ergebende Steuerschuld jedoch auf einem Notar-Anderkonto so lange parken wollen, bis die Vertreter der deutschen Kakistokratie mit totalitären, faschistischen, kommunistischen, bolschewistischen und sozialistischen Strömungen, zu lebenslangem Sozialdienst in Senioren-Residenzen (oder lieber nicht) verdonnert wurden oder sich ihre Spuren in selbstloser Aufopferung für Unseredemokratie in der Ukraine verloren haben.
Sobald eine Regierung, die zuerst zu beweisen hätte, dass sie bei Verstand ist und ihr Ohr wieder am Willen des Volkes hat, würden diese eingefrorenen Gelder des Souveräns von demselben für mit ihm abgestimmte Projekte zugunsten des Gemeinwohls freigegeben werden. Ein Mitspracherecht der Bevölkerung ist dringend notwendig und laut Grundgesetz auch möglich! Denunzierungsportale und staatlich geförderte NGOs gehörten sicher nicht dazu.
Auch, wenn mit allen Mitteln versucht wird, der demokratischen Grundordnung durch verhaltensauffällig-denkeingeschränkte Ideologinnen und Ideologen den größtmöglichen Schaden, den selbige als solchen nicht erkennen wollen, zuzufügen, gibt es dennoch Möglichkeiten des Widerstands.
Derzeit könnte hilfreich sein:
So viele wie möglich distanzieren sich so weit wie möglich von allen staatlichen Institutionen und bedienen das vom Alt-Parteien-Kartell missbrauchte System nur noch im geringst möglichen Maß.
Es sollte jede Möglichkeit genutzt werden, mit legalen Mitteln Sand ins Getriebe zu streuen.
Es ist die demokratische Pflicht des Souveräns, NEIN zu sagen, wo immer er denkt, dass Freiheit und Demokratie in Gefahr sind. Wer mit offenen Augen durch das Land geht, findet Gründe genug. Zu bestimmen, was Lüge ist, ist nicht Aufgabe der Politik. Dieses Vorgehen gleicht betreutem Denken innerhalb eines vorbestimmten Korridors für ein entmündigtes Volk. Antrieb ist das unbedingte Festhalten an der Macht, die in weiten Teilen längst keinen Rückhalt mehr in der Bevölkerung und sogar innerhalb der Parteien selbst hat.
Zur Erinnerung: Die Meinungsfreiheit schließt auch Lügen ein. Die hier oft aus der Schublade geholte „Nazi-Keule“ dient vor allem der Rechtfertigung der politischen Vorgaben und missbraucht so die Achtung vor den Gräueltaten in der vorläufig dunkelsten Zeit der deutschen Geschichte. Es gibt Anzeichen dafür, sich in Sachen Machtmissbrauch dieser so weit wie möglich anzunähern.
Es ist die demokratische Pflicht zu sagen „ICH MACHE DA NICHT MIT“, wenn politische Entscheidungen getroffen werden, die sich einer friedlichen Einigung und in Konflikten, diplomatischen Verhandlungen, entgegenstellen.
Es ist ein Friedensgebot aller Mütter und Väter, klar und deutlich anzusagen:
„NEIN, MEINE SÖHNE UND TÖCHTER GEB ICH NICHT HER!“
Die Gehirnwäsche und Propaganda-Beschallung durch die Medienkartelle in Funk, Fernsehen und Presse sind zu meiden, wie eine hochansteckende Hauterkrankung bei gleichzeitiger Vergiftung der inneren Organe.
Zahlungen sollten, wo immer es möglich ist, in bar erfolgen. Dies sollte so als Notwendigkeit verinnerlicht werden, wie das Ein- und Ausatmen.
Ein Aufruf zu öffentlichen Protestbekundungen hat derzeit wenig Sinn, da es die deutsche Mentalität nicht hergibt, das Bedürfnis zu spüren, in Massen auf die Straße zu gehen. In anderen europäischen Staaten sieht das anders aus. Besonders beeindruckend jüngst die Friedensaufrufe in Rom mit Menschenmengen, von denen man in Deutschland nur träumen kann.
Die Realität zeigt, dass für eine Veränderung die breite Masse in Deutschland momentan nicht zu gewinnen ist. Zu tief steckt der Deutsche Michel mit seiner German Angst in den Seelen. Daher ist es zunächst die Aufgabe der kritischen, wachen und Dummschwätz-immunen Menschen, einen „Wandel zur Vernunft und eine Abkehr vom Wahnsinn“ herbeizuführen.
Es ist die Zeit gekommen, dass so viele wie möglich, dem Regime, die wohlverdiente, größtmögliche Verachtung, für die Aushöhlung der Demokratie, die massive Einschränkung der Rede- und Meinungsfreiheit, die zu oft systemkonforme Rechtsprechung, die Ausweitung der Spaltung und das Vergessen-machen-wollen der deutschen Geschichte, entgegenbringen.
Was Deutschland fehlt, ist Einigkeit und Recht und Freiheit.
Sollte es, derzeit noch wider Erwarten, dennoch dazu kommen, dass der bereits vorhandene friedliche Widerstand eine wachsende Kraft erzeugen könnte, die Weitere dazu veranlasst, sich ihrer Kraft als der Souverän dieses einst ertragbar-demokratischen Staates wieder bewusst zu werden, wäre ein Generalstreik zu organisieren, um die Macht wieder dahin zu befördern, wo sie hingehört: Nämlich zu den Bürgerinnen und Bürgern eines Landes, das weitgehend vergessen hat, dass seine Ahnen die Demokratie mit ihrem Blut erkämpft haben und dass die Demokratie kein Dauergeschenk ist, für das man sich nie wieder einzusetzen hat. Die derzeitigen Machthaber haben ihren Auftrag zum Wohle des deutschen Volkes tätig zu sein offensichtlich vergessen. Man muss sie dringend wieder daran erinnern, wofür sie gewählt wurden: Die Interessen des Volkes umzusetzen und nicht ihre Vorstellungen davon. In ihrer Überheblichkeit glauben sie zu wissen, was gut für das Volk ist. Leider wissen sie es nicht!
Eine Einordnung als „Hass und Hetze“ durch das deutsch-orwellsche Wahrheitsministerium verbietet sich, da dies die perfiden Maßnahmen im Dritten Reich zu Unrecht relativieren würden.
Die Menschlichkeit gebietet, den verirrten Geistern in Entscheiderpositionen Mitgefühl entgegenzubringen, da sie in gutem Glauben und der Überzeugung sind, nur Gutes zum Wohle des deutschen Volkes, schadenabwendend zu vollbringen. Grund ist die Ideologie, von der sie gar nicht merken (oder es nicht merken wollen), dass sie in ihr gefangen sind.
Nachgeschlagen in einem deutschen Herkunftswörterbuch von 2001 kommt das Wort „Delegitimation“ noch gar nicht vor. Diese Neuschöpfung scheint, durch die politische Kaste entstanden, der Notwendigkeit geschuldet zu sein, kritische Stimmen mundtot machen zu wollen. Sie dient einzig und allein als Totschlagargument. Jeder, der seine demokratische Pflicht wahrnimmt, politische Entscheidungen zu hinterfragen und Kritik auszusprechen, trägt zur lebendigen Debattenkultur bei und hält damit die in einer Demokratie innewohnende Meinungsfreiheit hoch. Kritik, und sei sie noch so scharf, als Delegitimation zu bezeichnen, spricht eher von einer charakterlichen Fehlbildung und Ungeeignetheit für ein politisches Amt in einer Demokratie, als dass sie Respekt vor der Meinungsäußerung des Souveräns zeigt. Gleichzeitig entlarvt die Erfindung des Begriffes Delegitimation, anstelle von Zensur (das wäre zu offensichtlich), durch ihrer Realitätsferne, die fehlende politische Wirkungskraft, so dass man nicht mehr anders weiter weiß, als sich von der Demokratie entfernend, totalitär anmutender Mittel bedienen zu müssen.
Mit den Mitteln der Freiheit sind die Menschen in der Lage, diese armen Politiker-Seelen von ihrem Leiden zu befreien. Ein Besinnen auf die christliche Kultur des Abendlandes kann hier sehr hilfreich sein. Ein Erinnern an die europäische Kultur und Geschichte ebenso.
Dass viele Menschen die legitimen Mittel der Freiheit derzeit nicht nutzen, liegt vielleicht daran, dass das, was ihnen bisher als Freiheit verkauft wurde, aus menschlicher Sicht gar keine Freiheit ist. Die Auswahl in einem 5 Meter langen Yoghurt-Regal ist keine Freiheit! Vielleicht haben viele Menschen sogar Angst vor wirklicher, innerer Freiheit, weil da eine große innere Leere ist, die mit eigener Persönlichkeit durch individuelle, charakterliche Eigenschaften auszufüllen wäre. Man kann diesen Menschen noch nicht einmal einen Vorwurf daraus machen, weil das Bildungssystem gar kein Interesse daran hat, zu viele Menschen heranzubilden, die die Demokratie-Simulation durchschauen.
Es scheint, als würde man mit allen Mitteln versuchen, den jahrhundertealten geschichtlichen Faden Deutschlands und Europas durchschneiden zu wollen und den dunklen Teil der deutschen Geschichte ausklammernd dazu zu missbrauchen, den fortgeschrittenen Wahnsinn zu legitimieren.
Dieser Beitrag wurde mit dem Pareto-Client geschrieben.
-
@ fbf0e434:e1be6a39
2025-04-12 18:04:10Hackathon 概要
Hack The Grid — Level 2 是 LUKSO 推出的四级创作者项目的第二阶段,重点在于开发mini去中心化应用程序(dApps)。本阶段共有 70 名注册开发者参与,最终审批了 41 个 BUIDL 项目。该阶段鼓励参与者在 AI 代理、社交 DeFi、创作者货币化及游戏化等领域创新,致力于将 Universal Profiles 打造成集数字身份、社交互动与创造力于一体的多功能空间。
活动于 2025 年 2 月至 4 月开展,总资金池达 150,000 LYX,分配至各个级别。参与者可在多个阶段远程参与,1 至 3 级的成功项目将在第 4 级的社区资助轮中获得额外支持。
黑客松日程包含办公时间与学习会议,通过前期获奖者的见解为参赛者提供帮助。除技术实验外,活动还营造了协作开发环境,展现了去中心化应用程序创建的潜力,培育了生态系统中的创新。Hack The Grid 凸显了开发者社区的积极参与以及值得关注的项目贡献。
Hackathon 获奖者
ORIGIN GRANTS 奖项获奖作品
在第2级类别中,两个项目因其技术创新和对生态系统目标的对齐获得了Origin Grants的认可。
- Hiraeth Mini App: 此应用程序将区块链交易转变为基于NFT的数字文物,通过独特的表现形式捕捉各链上的历史叙事。
- Multisend - Defolio: MultiSend 提供了一种简化的方法,用于在单个交易中在 LUKSO 区块链上执行多个代币和NFT的转移,提高了资产管理的效率。
这些获奖项目以其对智能合约安全性、用户友好的界面、技术执行以及对 LUKSO 社区的价值增值而闻名。每位Origin Grant获奖者将获得价值$2,250的LYX,其中70%会提前发放,剩余金额取决于实现以采用为重点的KPI。获奖者还有机会进军第4级——社区资助轮,通过二次方融资获得额外的$24,000 LYX。
完整项目列表,请访问 DoraHacks。
关于组织者
LUKSO
LUKSO 是一家专注于区块链解决方案的技术导向型组织,专注于数字生活方式和创意经济。它因其在区块链基础设施领域的贡献而获得认可,并在开发增强用户中心身份和数字所有权的应用程序中扮演重要角色。该组织在创建Universal Profiles方面起了重要作用,促进了数字平台之间的无缝交互。目前,LUKSO 旨在扩大区块链在日常数字体验中的角色,优先考虑安全性和可访问性,以此为技术领域内多样化的用户群体服务。
-
@ fbf0e434:e1be6a39
2025-04-12 18:02:06Hackathon 概述
Innovate on Creator Network #Creathon 圆满落幕,116 位注册开发者中有 44 个项目获批。此次黑客松的主要目标是借助去中心化应用程序(dApps),在去中心化金融(DeFi)、非同质化代币(NFTs)、游戏及社会影响等领域,强化 Creator Network 生态系统。活动于 2025 年 1 月 19 日至 2 月 24 日期间举办,设置了 1,250 USDT 的奖金池,将颁发给十名获奖者,其中前三名的奖金在 200 美元至 300 美元之间。
在此次黑客松中展示的项目,通过创新性和功能性,展现了对 Creator Network 生态系统的潜在影响。这些项目如今有机会进一步融入平台并获得支持。活动极大地吸引了开发者参与,参与者们利用了 Creator Network 的开发工具和测试网。这一举措标志着,在通过创新技术方案拓展 Creator Network 能力及强化其生态系统方面,迈出了重要一步。
Hackathon 获奖者
Creator Network 奖项获奖者
- DeFi Connect Credit: 在Creator Testnet Network上运作的去中心化交易所,通过提供代币交换、锁定、深度流动性和投票机制来增强去中心化和流动性管理,提高DeFi解决方案。
- Lumoswap: 基于Creatorchain的去中心化交易所,提供快速、安全且用户友好的交易体验。它解决了DeFi生态系统中交易速度和安全性等关键问题。
- Sendtokens: 一个具备自我保管功能的加密货币钱包,通过简化交易和提高用户体验,解决了与冗长钱包地址和界面可用性相关的常见挑战。
- Tokens: 该平台简化了加密货币代币的创建,提供在去中心化环境中高效管理和部署的工具,确保即时可见性和实用性。
- ProtectedPay: 一个多链DeFi平台,促进安全交易和群组支付。它整合了储蓄功能,以在区块链网络中增强安全性和便利性。
- AuditFi_Creator: 利用AI技术为智能合约提供即时链上审计报告,从而加强Creator Network生态系统中的信任和安全性。
关于所有项目的详细信息,请访问 Hackathon 详情页 。
组织者信息
Creator Network
Creator Network 是一家以技术为核心的组织,专注于区块链解决方案。它因开发增强区块链互操作性和安全性的去中心化平台而闻名。该组织已经推出了多个项目,旨在改善数字资产管理和智能合约功能。Creator Network 致力于扩展区块链的可访问性,促进数字生态系统的透明度。
-
@ f57bac88:6045161e
2025-04-12 17:54:35پازل فناوری: ساختاری بیپایان
اینترنت و فناوری مثل موجوداتی زندهاند؛ همواره در حال رشد، تغییر و دگرگونی. برای سادهسازی، فرض میکنیم این پازل از سه بخش اصلی تشکیل شده:\ تکههای فعال (آنچه اکنون در دسترس ماست)،\ تکههای در حال توسعه (آنچه در راه است)، و\ تکههای خالی (آنچه جایش حس میشود).\ در ادامه، هر تکه را با جزئیات بررسی میکنم تا هیچ بخشی از این پازل از قلم نیفتد.
تکههای فعال: ستونهای دنیای دیجیتال امروز
این تکهها پایههای فناوری و اینترنت امروزیاند که بدون آنها، زندگی مدرن قابلتصور نیست. تا بهار ۱۴۰۴، این بخشها به بلوغ رسیدهاند و هر روز در حال استفادهاند:
-
شبکههای نوری پرسرعت: کابلهایی که دادهها را با سرعت بالا منتقل میکنند و اینترنتی پایدار و سریع را به خانهها و شهرها رساندهاند.
-
نسل پنجم ارتباطات سیار: فناوری ارتباطی جدیدی که با سرعت بالا و زمان پاسخدهی بسیار کم، ابزارهای هوشمند را به هم متصل میکند.
-
اینترنت ماهوارهای: پروژههایی که اتصال اینترنت را به دورافتادهترین نقاط کره زمین میبرند.
-
رایانش ابری: خدماتی بر پایهی سرورهای اینترنتی که ذخیرهسازی و پردازش دادهها را آسان کردهاند.
-
شبکههای اجتماعی دیجیتال: فضاهایی که گفتوگو، اشتراکگذاری و ارتباط را به بستر اینترنت آوردهاند.
-
بازرگانی الکترونیکی: فروشگاهها و بازارهایی که خرید و فروش را به شکل آنلاین و جهانی ممکن کردهاند.
-
ابزارهای جستوجوی اینترنتی: موتورهایی که در کسری از ثانیه، اطلاعات سراسر دنیا را در اختیارمان میگذارند.
-
پخش اینترنتی محتوا: سامانههایی که فیلم، موسیقی و ویدیو را به صورت آنلاین و لحظهای ارائه میدهند.
-
برنامههای تلفن همراه: نرمافزارهایی که تجربهی دیجیتال را شخصی، سریع و قابلحمل کردهاند.
-
ابزارهای هوشمند خانگی: وسایلی که با اتصال به اینترنت، خانه را خودکار و هوشمند میکنند.
-
هوش رایانهای: سامانههایی که توانایی درک، تحلیل و تصمیمگیری را به فناوری دادهاند.
-
یادگیری ماشینی: شیوههایی که رایانه از دادهها آموخته و نتایج بهتری ارائه میدهد.
-
تحلیل دادههای عظیم: بررسی حجم زیادی از اطلاعات برای کشف الگوها و تصمیمگیری بهتر.
-
امنیت فضای مجازی: ابزارهایی برای محافظت از دادهها و سیستمها در برابر تهدیدها.
-
زنجیرهی بلوکی: فناوریای برای انجام تراکنشهای امن و شفاف بدون واسطه.
-
پولهای دیجیتال: ارزهایی که مفهوم پول را وارد دنیای رایانهای کردهاند.
-
واقعیت مجازی: فناوریای که با استفاده از نمایشگرهای ویژه، افراد را وارد دنیایی شبیهسازیشده میکند.
-
واقعیت افزوده: افزودن اطلاعات دیجیتال به دنیای واقعی از طریق نمایشگرها یا گوشی همراه.
-
خانههای هوشمند: سامانههایی که با یک لمس، نور و گرمای خانه را مدیریت میکنند.
-
فناوریهای پوشیدنی: ابزارهایی که بر بدن پوشیده میشوند و سلامت و فعالیت ما را پایش میکنند.
این تکهها، ستونهای اصلی پازلاند که هر روز با آنها سر و کار داریم، ولی هنوز جای پیشرفت دارند، از امنیت بهتر تا دسترسی برابرتر.
تکههای در حال توسعه: نوآوریهایی در آستانهی شکوفایی
این بخش، آیندهی نزدیک و دور فناوری را به تصویر میکشد؛ تکههایی که در آزمایشگاهها و پروژههای پژوهشی در حال شکلگیریاند و بهزودی به پازل افزوده میشوند:
-
نسل ششم ارتباطات سیار: ارتباطاتی با سرعتی فراتر از نسل پنجم.
-
رایانش کوانتومی: رایانههایی که بر پایهی قوانین فیزیک کوانتوم، مسائل بسیار پیچیده را در لحظه حل میکنند.
-
پردازش در لبهی شبکه: انتقال بخشی از محاسبات به نزدیکترین نقطه به محل تولید داده برای کاهش تأخیر و مصرف انرژی.
-
وسایل نقلیهی بدون راننده: خودروهایی که با کمک هوش رایانهای و حسگرها، بهتنهایی حرکت میکنند.
-
رابط مغز و ماشین: فناوریای که فعالیتهای مغزی را به رایانهها و دستگاهها متصل میکند.
-
شبکههای هوشمند انرژی: سامانههایی برای مدیریت بهینهی مصرف برق و منابع انرژی.
-
پزشکی دیجیتال پیشرفته: بهرهگیری از فناوری برای تشخیص و درمان بهتر، مانند جراحی رباتیک یا تحلیل دادههای سلامت.
-
مواد واکنشپذیر: موادی که با تغییر شرایط محیطی واکنش نشان میدهند، مانند پارچههایی که ترمیم میشوند.
-
هوش فراگیر رایانهای: هوشی که میتواند همچون انسان در زمینههای مختلف فکر کند و خلاق باشد.
این تکهها نویدبخش آیندهای هیجانانگیزند، اما هنوز نیاز به زمان، سرمایهگذاری و زیرساخت دارند تا کامل شوند.
تکههای خالی: خلأهایی که باید پر شوند
این بخش، جاهایی را نشان میدهد که هنوز کامل ساخته نشدهاند یا نیاز به توجه ویژه دارند. این تکهها، چالشها و فرصتهای آیندهاند:
-
دسترسی برابر به اینترنت برای همه: فراهم کردن اینترنت پرسرعت در همهجا، حتی مناطق دورافتاده.
-
حفاظت کامل از حریم خصوصی: فناوریهایی که جلوی هر نوع سوءاستفاده از اطلاعات شخصی را بگیرند.
-
تأمین انرژی پایدار برای فناوری: بهرهگیری از منابع انرژی پاک برای تأمین نیازهای روزافزون.
-
قوانین جهانی هماهنگ در زمینه فناوری: مقررات مشترکی که هماهنگی جهانی را ممکن کنند.
-
بازیافت کامل تجهیزات دیجیتال: فرآیندهایی برای بازیافت زبالههای الکترونیکی بدون آسیب به محیط زیست.
-
هوش مصنوعی مسئول و منصفانه: سامانههایی که تصمیمهایی بدون تبعیض و ناعادلانه میگیرند.
-
شبکههایی مقاوم در برابر سانسور: ارتباطاتی که دولتها یا نهادها نتوانند آنها را محدود کنند.
-
زیرساختهای مقاوم در برابر بلایا: سامانههایی که حتی در شرایط بحرانی همچنان فعال بمانند.
-
آموزش دیجیتال همگانی: آموزشهایی که برای همه، در هر سطح و سن، قابلدسترس باشد.
-
ارتباط با فضا و سیارات دیگر: فناوریهایی برای برقراری ارتباط بین زمین و نقاط دوردست فضایی.
این تکهها خلأهاییاند که پر شدنشان میتواند کل تصویر را دگرگون کند.
تصویر نهایی: پازلی که هرگز کامل نمیشود؟
پازل فناوری، با سه دستهی فعال، در حال توسعه و خالی، ساختاری پویاست. هر تکهی تازهای که افزوده میشود، ممکن است به تکههای دیگری نیاز پیدا کند. مثلاً فناوری پول دیجیتال، بحثهایی تازه دربارهی قوانین مالی یا امنیت دیجیتالی به دنبال آورده. یا رشد هوش رایانهای، نیاز به بحثهای اخلاقی را مطرح کرده است.
امروز، بخش بزرگی از پازل سر جایش قرار گرفته، اما آینده، پر از ناشناختههاست. از رایانههای کوانتومی گرفته تا خودروهای بدون راننده، از خلأهای دسترسی برابر تا دغدغههای امنیتی، همگی ما را به تفکر، تلاش و انتخابهایی مهم فرا میخوانند.
شما چه فکر میکنید؟\ کدام تکه از این پازل از دید شما مهمتر است؟\ فکر میکنید چه چیزی هنوز از قلم افتاده؟\ نظرات خودتان را بنویسید تا این پازل را با هم کاملتر کنیم.
منابع
-
Simplilearn. 25 New Technology Trends for 2025: An overview of emerging technology trends in 2025.
-
GeeksforGeeks. Top 25 New Technology Trends in 2025: In-depth analysis of developing technologies.
-
Forbes. Top 10 Technology Trends For 2025: Key trend predictions by Forbes experts.
-
NKTelco. Internet Trends to Watch in 2025: A look at the future of internet and connectivity.
-
-
@ 7d33ba57:1b82db35
2025-04-12 15:14:35Pisa, in Tuscany, is world-famous for its iconic Leaning Tower, but this riverside city offers much more than a fun photo op. With Romanesque architecture, student energy (thanks to its prestigious university), and charming piazzas, Pisa makes a great day trip—or a surprisingly rewarding overnight stay.
🌟 Must-See in Pisa
1️⃣ The Leaning Tower of Pisa (Torre Pendente)
- Built in the 12th century and leaning ever since due to soft soil
- Climb the spiral staircase (about 300 steps) for sweeping views of the city
- Best photo time? Early morning or golden hour for softer light
2️⃣ Piazza dei Miracoli (Square of Miracles)
- A UNESCO World Heritage Site and home to:
- The Cathedral (Duomo di Pisa) – Beautiful Romanesque façade
- The Baptistery – The largest in Italy, with amazing acoustics
- The Camposanto Monumentale – A peaceful cemetery with frescoes and ancient tombs
3️⃣ Walk Along the Arno River
- Quiet and atmospheric, especially at sunset
- Great way to escape the crowds around the tower and see the colorful riverside buildings
4️⃣ Explore the Historic Center
- Visit Piazza dei Cavalieri, once the political heart of Pisa
- Check out Scuola Normale Superiore, one of Italy’s most elite universities
- Wander through narrow medieval streets lined with shops and cafés
🍕 What to Eat in Pisa
- Cecina – A savory chickpea pancake, usually eaten as street food
- Torta co’ bischeri – A traditional chocolate and rice tart
- Pisan-style pasta with gamey meats or wild boar ragù
- Pair with local wines from the Colline Pisane
🎯 Quick Tips for Visiting
✅ Pisa is very walkable—comfortable shoes are your best friend
✅ The Leaning Tower is popular—book climb tickets online in advance
✅ It’s an easy day trip from Florence or Lucca by train (about 1 hour)
✅ Stay for the evening to enjoy Pisa’s local vibe once day-trippers leave -
@ 4898fe02:4ae46cb0
2025-04-12 14:29:49Directory
📖 Day 1 - In the Beginning, an Idea...\ 📖 Day 2 - When Money Dies\ 📖 Day 3 - One Coin to Rule them All\ 📖 Day 4 - Transacting Adversarially pt. 1\ 📖 Day 5 - Transacting Adversarially pt. 2\ 📖 Day 6 - Not your Keys not your Coin\ 📖 Day 7 - The Seventh Day
Foreword
This is more than a curated list of articles.
This is more than a guide.
It is not a how-to or tutorial.
This is the first unschooled course syllabus and it is based entirely on the peer-reviewed work published by Stackers.
In undertaking such work as building a beginners course in bitcoin, one might stop and appreciate the plethora of other Bitcoin courses that live in the blogs of various company sites, such as those you will find on exchanges, wallet providers and the like. These are great, but the spirit of Bitcoin is in its community, so why not learn from the community directly?
Course Intro
What you will find below is a selection of some of the best that has been written by the thriving community on Stacker News. It is being referred to here as a course syllabus for the reason that it is intended to be used as a guide that you can follow as you take your first steps into the rabbit hole. Exploring new spaces online, especially those surrounding Bitcoin, can be intimidating and anxiety inducing, so rest easy and let this syllabus be your guide.
Included are a carefully selected list articles, spread across seven days of learning. Each day also has included the learning outcomes for that day and post-reading reflections.
It is recommended you come ready to learn, with a note-taking implement/software and an open mind. Feel free to share your responses to the questions in the comments. The discussion questions are obviously optional, but have been written with the purpose of prompting further engagement in the materials.
Target Audience
This particular Unschooled course is geared toward the intellectually curious and self-directed (much like later iterations will be).
No prior knowledge of Bitcoin is required as the course has been designed to suit the absolute bitcoin initiate.
Expected outcomes
By the end of the seven-days, learners will have
- developed an awareness of peer to peer electronic cash
- engaged some of the philosophical currents in the Bitcoin community
- analyzed the quesiton: why Bitcoin not crypto?
- reflected on the important concepts in Bitcoin such as wallets, UTXO's, Nodes and Lightning Network
- answered the question: what is KYC and AML?
- seen the relevance of the phrase "not your keys, not your bitcoin"
A Final note by way of Introduction
The course is designed to familiarize you with the technology that you will ultimately use to interact with the Bitcoin network, not to give investment advice. It is recommended that you finish the course before making any financial decisions, as there is important insight to be gained in all seven days.
Lastly, nothing stated herein is intended as financial advice.
Let's begin!
-
@ 73dc15e0:b7a84244
2025-04-12 14:24:06プロローグ
童貞こと薄(すすき) 仙人(せんにん)29歳。ここに眠る。「RIP」。29年間ずっと不運だった。親が仙人なんて名前を付けるから。学校では薄い仙人で「はげ仙人」なんてよばれるし、会社は倒産し、家は燃え、さっきトラックで引かれたところだ。そして、今「自称邪心」に次の魔王になってほしいと頼まれている。
―「なんで俺がそんなことしなきゃいけないのだ。」
「君には普通の人間よりも欲が何倍も大きい。ほんとは君の世界では収まらないぐらいだよ。」
―「異世界に行くのはいいとして、なんで魔王なんだ?」
「一つは、さっきも言った通り、君の欲は大きい。二つ目はもうすぐ現魔王がいなくなるからだよ。」
―「勇者にでも殺されたか?」
「いや、勇者と魔王が結婚した。」
―「は?」意味がわからない。勇者は魔王を倒すものではないのか?
「いなくなるというよりは魔王をやめるという表現のほうが正しかったかな。」
邪神によると勇者と魔王が結婚し、現魔王は魔王をやめるので、勇者と魔王の子供に転生し、次の新たな魔王になってほしいとのことだった。
人族と魔族(エルフ、ドワーフ、悪魔など)がこの世界にはあり、人族は聖神、魔族は
邪神が保護しているそうで、人と魔族は大昔から敵対しているそうだ。
聖神は魔族を忌み嫌っているので、魔族を統べる物がいなくなればいつ人族が襲ってくるかわからない。
人族には個別スキル(怪力、俊足など)には一般スキルと固有スキルがある。
固有スキルは世界に一人しかもっておらず、使用者が死ぬと新しく生まれてきた誰かがその固有スキルを手にする。固有スキルは5000万人に1人ぐらいの割合だそうだ。
一般スキルは固有スキルと違い、スキルがかぶることはよくあるそうだ。
魔族は種族スキルがある。種族スキルとはその種族が全員同じスキルをもっている。
魔族は固有スキルや個別スキルがない代わり人よりも各ステータスが高い。
俺は邪神に恩恵を3つもらった。一つは「超再生」。これは怪我や魔力、体力を瞬時に再生させてくれるチート能力だ。2つ目は「代償」腕や心臓などの代償をつくることによって自分を強化したり、新しく武器を作ることができる。この能力は一つ目の「超再生」と組み合わせることでバグをうみだすことができる。3つ目は「入れ替え」これは、さわったことのある物や人との場所を入れ替えることができる。
この三つの恩恵で異世界を俺は生き抜いてやる。
-
@ f1e78daa:124e0e56
2025-04-12 14:13:41今日はテストです。
-
@ f1e78daa:124e0e56
2025-04-12 14:02:20プロローグ
童貞こと薄(すすき) 仙人(せんにん)29歳。ここに眠る。「RIP」。29年間ずっと不運だった。親が仙人なんて名前を付けるから。学校では薄い仙人で「はげ仙人」なんてよばれるし、会社は倒産し、家は燃え、さっきトラックで引かれたところだ。そして、今「自称邪心」に次の魔王になってほしいと頼まれている。
―「なんで俺がそんなことしなきゃいけないのだ。」
「君には普通の人間よりも欲が何倍も大きい。ほんとは君の世界では収まらないぐらいだよ。」
―「異世界に行くのはいいとして、なんで魔王なんだ?」
「一つは、さっきも言った通り、君の欲は大きい。二つ目はもうすぐ現魔王がいなくなるからだよ。」
―「勇者にでも殺されたか?」
「いや、勇者と魔王が結婚した。」
―「は?」意味がわからない。勇者は魔王を倒すものではないのか?
「いなくなるというよりは魔王をやめるという表現のほうが正しかったかな。」
邪神によると勇者と魔王が結婚し、現魔王は魔王をやめるので、勇者と魔王の子供に転生し、次の新たな魔王になってほしいとのことだった。
人族と魔族(エルフ、ドワーフ、悪魔など)がこの世界にはあり、人族は聖神、魔族は
邪神が保護しているそうで、人と魔族は大昔から敵対しているそうだ。
聖神は魔族を忌み嫌っているので、魔族を統べる物がいなくなればいつ人族が襲ってくるかわからない。
人族には個別スキル(怪力、俊足など)には一般スキルと固有スキルがある。
固有スキルは世界に一人しかもっておらず、使用者が死ぬと新しく生まれてきた誰かがその固有スキルを手にする。固有スキルは5000万人に1人ぐらいの割合だそうだ。
一般スキルは固有スキルと違い、スキルがかぶることはよくあるそうだ。
魔族は種族スキルがある。種族スキルとはその種族が全員同じスキルをもっている。
魔族は固有スキルや個別スキルがない代わり人よりも各ステータスが高い。
俺は邪神に恩恵を3つもらった。一つは「超再生」。これは怪我や魔力、体力を瞬時に再生させてくれるチート能力だ。2つ目は「代償」腕や心臓などの代償をつくることによって自分を強化したり、新しく武器を作ることができる。この能力は一つ目の「超再生」と組み合わせることでバグをうみだすことができる。3つ目は「入れ替え」これは、さわったことのある物や人との場所を入れ替えることができる。
この三つの恩恵で異世界を俺は生き抜いてやる。
-
@ f1e78daa:124e0e56
2025-04-12 14:01:15プロローグ
童貞こと薄(すすき) 仙人(せんにん)29歳。ここに眠る。「RIP」。29年間ずっと不運だった。親が仙人なんて名前を付けるから。学校では薄い仙人で「はげ仙人」なんてよばれるし、会社は倒産し、家は燃え、さっきトラックで引かれたところだ。そして、今「自称邪心」に次の魔王になってほしいと頼まれている。
―「なんで俺がそんなことしなきゃいけないのだ。」
「君には普通の人間よりも欲が何倍も大きい。ほんとは君の世界では収まらないぐらいだよ。」
―「異世界に行くのはいいとして、なんで魔王なんだ?」
「一つは、さっきも言った通り、君の欲は大きい。二つ目はもうすぐ現魔王がいなくなるからだよ。」
―「勇者にでも殺されたか?」
「いや、勇者と魔王が結婚した。」
―「は?」意味がわからない。勇者は魔王を倒すものではないのか?
「いなくなるというよりは魔王をやめるという表現のほうが正しかったかな。」
邪神によると勇者と魔王が結婚し、現魔王は魔王をやめるので、勇者と魔王の子供に転生し、次の新たな魔王になってほしいとのことだった。
人族と魔族(エルフ、ドワーフ、悪魔など)がこの世界にはあり、人族は聖神、魔族は
邪神が保護しているそうで、人と魔族は大昔から敵対しているそうだ。
聖神は魔族を忌み嫌っているので、魔族を統べる物がいなくなればいつ人族が襲ってくるかわからない。
人族には個別スキル(怪力、俊足など)には一般スキルと固有スキルがある。
固有スキルは世界に一人しかもっておらず、使用者が死ぬと新しく生まれてきた誰かがその固有スキルを手にする。固有スキルは5000万人に1人ぐらいの割合だそうだ。
一般スキルは固有スキルと違い、スキルがかぶることはよくあるそうだ。
魔族は種族スキルがある。種族スキルとはその種族が全員同じスキルをもっている。
魔族は固有スキルや個別スキルがない代わり人よりも各ステータスが高い。
俺は邪神に恩恵を3つもらった。一つは「超再生」。これは怪我や魔力、体力を瞬時に再生させてくれるチート能力だ。2つ目は「代償」腕や心臓などの代償をつくることによって自分を強化したり、新しく武器を作ることができる。この能力は一つ目の「超再生」と組み合わせることでバグをうみだすことができる。3つ目は「入れ替え」これは、さわったことのある物や人との場所を入れ替えることができる。
この三つの恩恵で異世界を俺は生き抜いてやる。
-
@ 6a6be47b:3e74e3e1
2025-04-12 12:13:13Hi frens! How's your weekend starting? I'm just finishing a newblog entry 🖋️on my website and I'm going to be selling a few things on my Ko-fi shop 🛍️.
Before I post everything, I wanted to share a special treat with my Nostr family:
🎁 I've created two beautiful postcard-sized (148mm x 210mm or 5.83 in x 8.27 in)artworks inspired by Holy Week. Here they are:
Palm Day
Resurrection Day
✉️ If you'd like one, just DM me with your email address, and I'll send it your way! Zaps are always appreciated and help keep me going. 🙏
❤️ This is big thank you to you my frens Have fun and stay safe
✝️ This is an INSTANT DIGITAL DOWNLOAD, no physical item will be shipped to you.
✝️ The frames and accessories in the listing images are not included.
🚨 DISCLAIMER 🚨
❤️ Copyright Retention: I, the artist, retain full copyright of all original artwork, even after the digital print is purchased.
❤️ Limited License: The digital print provides a limited, non-transferable license for personal use only. It is not intended for commercial use or resale.
❤️ No Reproduction Rights: The purchase of this digital print does not grant any rights to reproduce, distribute, or create derivative works based on the design.
🚨 By proceeding with the purchase of this digital print, you acknowledge and agree to these terms. 🚨
-
@ 2e8970de:63345c7a
2025-04-12 10:27:01This week I read up on what's currently happening to kids and their relationship to social media and smartphones. Especially the following thw pieces of media: The Ezra Klein Show: ‘Our Kids Are the Least Flourishing Generation We Know Of’ interview with Jonathan Haidt and his book on the topic:
https://www.youtube.com/watch?v=RN2GhPal4qA
And the podcast Search Engine 'What’s actually on teenagers’ phones? ' and a documentary tv show on the topic where teenagers show their phone screens to their parents as a social experiment
https://www.searchengine.show/whats-actually-on-teenagers-phones/
Yes yes, both are outlets that are clearly progressive partisan. But this topic really is a non partisan topic. Don't click away yet.
Here are my key takeaways on the topic:
How kids spend their time
- For most of human history kids and teenagers spend their time with other kids. And especially not only their exact same age: also with kids a few years older and younger. This is obviously a lot less now that kids are almost exclusively online. When kids play outside and have other kids that are 2y older as rolemodels and look out for other kids that are 2y younger that obviously changes something in their upbringing and how they learn to behave in social connections. What changes about personality of humans when whole generations did not have this experience?
- Kids spend more and more time with their parents. This might be surprising in a story that is primarily about less and less socializing. But parents are more and more of the opinion that the most important goal in parenting is spending "quality time" with their kids. But is this true? Shouldn't they spend time with peers instead?
- The offline world is online now. In the tv show referenced in the podcast the filmcrew also got insight what teenagers do on gettogethers and partys. It was a surprising sight. Everyone is used to being filmed all the time. A boy jumped off a building, another kid took drugs and ended up in the hospital. But haven't teenagers always done stupid shit? The key difference is the boy did not jump off a building because he was a stupid teenager having fun. He did it to go viral online. What a bleak bleak new world.
- Younger than you expect. Did you know that 40% of 2yo own a tablet/ipad? I still remember the outrage of 10yo owning non-smart phones. The topic is still on but now it's babys. Also elementary school aged kids are almost surely all confronted with softcore porn and violence regularly. You can almost expect a child of this age have also seen hardcore porn and extreme violence. This really begs the question why we as a society still count if a Marvel movie has 1 or 2 f-words - what a ludicrous contrast.
- What happens on the phone is a secret. Kids have almost all the behavior to not talk about what happens on their phones. To some extent this is normal, to some extent this is also a big mystery how this developed. Your teenage daughter will not tell you when she looks bulimia, eating disorders, and superhuman women influencers all the time. Your 7yo will not tell you that they looked at disturbing violence gore content. Most mysteriously: even 3yo often already know this behaviour to hide their phone screens when playing phone games. How do they learn this? It is indeed a mystery.
Gender divide
Young girls and young boys have very different experiences here. Boys do still spend time with gaming and voicechats together. Young girls time online is very different. It is mostly alone. It is instagram pictures of unattainable lifestyle and looks.
The loss of common values
Jonathan Haidt had an interesting insight on the interplay of smartphones and the decline of religiosity here. The decline of religiosity in the west is obviously nothing new, it predates smartphones. But social media confronts kids with a whole world of different people and different values. So, a secularized world might not derive its values from religion anymore but a secularized world with local communities might still create consensus on values. But a secularized world where culture happens globally does not anymore. kids increasingly say they have no meaning or goals in life. In the interview Jonathan Haidt lists many statistics on this topic that you can look at from many angles but overall this is the trend.
An overaching concept in probably all value sets from liberal cities to arch conservative societies was some concept of social status. Maybe in an Amish village social status came from having a dozen children. Maybe in turbo leftist circles social status came from having an art exhibition.... you get the idea, the specifics do not matter. For teenagers this social status is synonymous with likes and followers. You, as a kid, will probably never have a million followers and therefore in this new world social status is unattainable.
This is of course very oversimplified. But you see how the world changed overnight when smartphones happened.
The concept of "Pacts"
If phones are so bad, just give it to them at an older age! Not so fast cowboy.
Kids with smartphones are less depressed, less anxious, more social, get more exercise, & experience less cyberbullying than kids w/out smartphones
https://x.com/ENBrown/status/1909257644499480973
The problem here is of course that kids without phones are social outcasts. This is even worse than the phones themselves.
The solution that has become really popular post covid is the concept of pacts. A few parents from one neighborhood and/or one school year come together and make a pact to not give their kids phones until a certain age.
Depressingly, Jonathan Haidt analysis found that these pacts don't work that well: It's only a trend in what is upper middle class anyway. Statistically many parents "break" under the pressure before the year has arrived. And lastly, they only seem to work when the size of the pact is like 10 kids or bigger.
Conclusion
I encourage you all the watch the interview and or listen to the podcast. The world changed a lot and we are barely talking about it.
originally posted at https://stacker.news/items/941383
-
@ 7d33ba57:1b82db35
2025-04-12 09:27:34Florence (Firenze) is where art, history, and passion collide in the most graceful way. As the birthplace of the Renaissance, it’s a city steeped in creativity—from Michelangelo’s David to Brunelleschi’s dome—and yet, it also lives in the little things: the smell of espresso, the sound of church bells, and golden sunsets over the Arno. Compact, walkable, and overflowing with beauty, Florence stirs something deep.
🌟 Must-See Highlights in Florence
1️⃣ The Duomo & Brunelleschi’s Dome
- The Cathedral of Santa Maria del Fiore dominates the skyline with its red-tiled dome
- Climb to the top (463 steps!) for breathtaking views of the city and Tuscan hills
- Don’t miss the baptistery’s golden doors—aka the “Gates of Paradise”
2️⃣ Uffizi Gallery
- One of the most famous art museums in the world
- Home to masterpieces by Botticelli (The Birth of Venus), da Vinci, Michelangelo, and Caravaggio
- Book timed-entry tickets—lines can be intense!
3️⃣ Ponte Vecchio
- Florence’s iconic medieval bridge, lined with goldsmiths and jewelers
- Great photo spot—especially at sunrise or golden hour
4️⃣ Michelangelo’s David at the Accademia
- The original, larger-than-life marble David is a powerful sight in person
- Also check out Michelangelo’s unfinished “Prisoners,” still emerging from stone
5️⃣ Boboli Gardens & Pitti Palace
- Cross the Arno to explore lush gardens, sculptures, and royal vibes
- Offers a peaceful break from the city streets and great panoramic views
🍷 What to Eat & Drink in Florence
- Bistecca alla Fiorentina – A legendary T-bone steak, grilled rare
- Ribollita – A hearty Tuscan soup with bread, beans, and vegetables
- Crostini with chicken liver pâté – Classic local starter
- Cantucci with Vin Santo – Almond biscuits dipped in sweet dessert wine
- Pair it all with a glass of Chianti Classico or Brunello di Montalcino
✨ Local Gems to Discover
- Piazzale Michelangelo – Sunset views that will stay with you forever
- San Lorenzo Market – Leather goods, food stalls, and local flair
- Santa Croce Basilica – Tombs of Michelangelo, Galileo, Machiavelli
- Oltrarno neighborhood – Artisans, cool cafés, and a slower, bohemian vibe
🎯 Florence Travel Tips
✅ Most sights are walkable—comfortable shoes are a must
✅ The city is busiest from late spring to early fall—visit in shoulder seasons if you can
✅ Museums are closed on Mondays
✅ Make restaurant reservations—especially for dinner at popular spots -
@ c3c7122c:607731d7
2025-04-12 04:05:06Help!
Calling all El Salvador Nostriches! If you currently live in SV, I need your help and am offering several bounties (0.001, 0.01, and 0.1 BTC).
In Brief
In short, I am pursuing El Salvador citizenship by birthright (through my grandmother). I’ve struggled to progress because her name varies on different documents. I need someone to help me push harder to get past this barrier, or connect me with information or people who can work on my behalf. I am offering:
- 0.001 BTC (100k sats) for information that will help me progress from my current situation
- 0.01 BTC (1 MM sats) to get me in touch with someone that is more impactful than the immigration lawyer I already spoke with
- 0.1 BTC (10 MM sats) if your efforts help me obtain citizenship for me or my father
Background
My grandma married my grandfather (an American Marine) and moved to the states where my father was born. I have some official and unofficial documents where her name varies in spelling, order of first/middle name, and addition of her father’s last name. So every doc basically has a different name for her. I was connected with an english-speaking immigration lawyer in SV who hit a dead end when searching for her official ID because the city hall in her city had burned down so there was no record of her info. He gave up at that point. I find it odd that it was so easy to change your name back then, but they are more strict now with the records from that time.
I believe SV citizenship is my birthright and have several personal reasons for pursuing this. I want someone to act on my behalf who will try harder to work the system (by appeal, loophole, or even bribe if I have to). If you are local and can help me with this, I’d greatly appreciate any efforts you make.
Cheers!
Corey San Diego
-
@ 10fe3f70:3489c810
2025-04-12 03:53:36contract-drafting #agreement-drafting #learn-drafting #keep-learning
I am a lawyer and a teacher. I am interested in learning new things every day.
I am from India, and have studied in a reputed law school in Delhi. I have long experience of working as in-house counsels to some reputed organisations.
My present goal is to teach drafting of contracts. What I will teach is some basic skills required by students to draft contracts.
I did some freelance online teaching during Covid Pandemic, and found that students are very interested in learning the craft. But, I also understood that they may not have enough free time to learn due to busy schedule.
If you are interested, you can access my curated playlist on Youtube
Keep watching this space, if you wish to know more...
Lessons on Contract Drafting
- Contract Drafting - An Introduction
- ...
-
@ 502ab02a:a2860397
2025-04-12 02:40:22เริ่มจากบรอกโคลี แล้วขยายผลไปสู่ระดับโลก
หลายประเทศในเอเชีย แอฟริกา ละตินอเมริกา ตกอยู่ในสภาพ “จนหนี้หัวโต” ทั้งจากวิกฤตเศรษฐกิจหรือปัญหาสภาพภูมิอากาศ แล้วใครกันล่ะเข้ามาช่วย?
ชื่อที่ได้ยินบ่อยคือ IMF (กองทุนการเงินระหว่างประเทศ) World Bank (ธนาคารโลก) WTO (องค์การการค้าโลก) FAO (องค์การอาหารและการเกษตรของ UN)
ฟังดูเหมือนองค์กรการกุศล แต่เบื้องหลังคือกลไกที่ “แลกข้าวกับกฎหมาย” โดยเฉพาะเมื่อประเทศยากจนขอเงินกู้หรือขอเข้าเป็นสมาชิกข้อตกลงการค้า พวกเขาจะถูก “บังคับกลายๆ” ให้ต้องแก้กฎหมายภายในประเทศให้สอดคล้องกับ UPOV 1991
ตัวอย่างชัดๆ กันครับเช่น 1. แอฟริกาใต้ / กานา / เคนยา ถูกกดดันจาก World Bank ให้ปรับกฎหมายคุ้มครองพันธุ์พืช ไม่งั้นจะไม่อนุมัติเงินช่วยเหลือสำหรับเกษตรกรรมและการศึกษา 2.ฟิลิปปินส์ / เวียดนาม / อินโดนีเซีย ต้องรับเงื่อนไข UPOV 1991 เพื่อเข้า FTA กับ EU หรือสหรัฐฯ ถ้าไม่ยอม? ข้าว ข้าวโพด หรือสินค้าเกษตรอื่นๆ จะเข้าไปขายไม่ได้ 3.เม็กซิโก เคยต่อสู้กับ Monsanto เรื่องสิทธิในการปลูกข้าวโพดดั้งเดิม แต่สุดท้ายโดน “ตีท้ายครัว” ด้วย FTA กับสหรัฐที่ฝัง UPOV 1991 มาแบบแนบเนียน
ปี 2561 รัฐบาลบางประเทศพยายาม “รีบแก้กฎหมายพันธุ์พืช” ให้สอดคล้องกับ UPOV 1991 เพื่อปูทางเข้าสู่ CPTPP ซึ่งเป็นข้อตกลงการค้าเสรีระดับภูมิภาคที่มีประเทศร่ำรวยอยู่เต็มไปหมด
ข้อเรียกร้องจาก CPTPP คือ -ต้อง ห้ามเกษตรกรเก็บพันธุ์ไว้ใช้ซ้ำโดยไม่ได้รับอนุญาต -ต้อง คุ้มครองพันธุ์พืชที่พัฒนาขึ้นโดยบริษัทเอกชน 20-25 ปี -ต้อง เปิดทางให้บริษัทต่างชาติเข้ามาจดทะเบียนพันธุ์พืชในประเทศได้โดยง่าย
เสียงค้านจึงดังกระหึ่มจากเกษตรกร นักวิชาการ และภาคประชาสังคม นำโดยเครือข่ายเกษตรกรรมยั่งยืน กลุ่มรักษ์พันธุ์ข้าว จนนายกรัฐมนตรีในขณะนั้นต้องออกมาประกาศ “พักเรื่องนี้ไว้ก่อน” แต่ถึงวันนี้... ก็ยังไม่มีการยืนยันว่าจะ “ล้มเลิกโดยสิ้นเชิง”
รู้หรือไม่ว่า บริษัทพันธุ์พืชที่ใหญ่ที่สุดในโลกไม่ใช่คนปลูกข้าว แต่มาจาก “บริษัทยา” และ “บริษัทเคมี”!!!
Bayer (เยอรมนี) ที่ควบรวม Monsanto Corteva (สหรัฐฯ) แยกตัวจาก DowDuPont Syngenta (สวิตเซอร์แลนด์) ที่ตอนนี้เป็นของบริษัทจีน ChemChina
3 บริษัทนี้ครองตลาดพันธุ์พืชดัดแปลงพันธุกรรม (GMO) และพันธุ์ลูกผสมทั่วโลก และผลักดัน UPOV 1991 แบบดุดันผ่านองค์กรเช่น ISF (International Seed Federation)
องค์กรเหล่านี้พวกเขาไม่ได้ปล้นด้วยปืน แต่ใช้ สัญญา พวกเขาไม่ได้เผาไร่ แต่ “จดสิทธิบัตร” สิ่งที่ไม่ควรเป็นของใคร และสิ่งที่พวกเขาต้องการ ไม่ใช่แค่ข้าวโพดหรือถั่วเหลือง แต่คือ “สิทธิในการออกแบบอาหารทั้งโลก” ในแบบที่คนตัวเล็ก... ต้องจ่ายค่าเช่ากินข้าว ทุกปี ตลอดชีวิต
จากปัญหาเหล่านี้ก็เลยเกิดแนวคิดที่เรียกว่า Seed Sovereignty ซึ่งมองว่าเมล็ดพันธุ์เป็นสมบัติร่วมของมนุษยชาติ ไม่ควรถูกครอบครองแบบผูกขาด และเกษตรกรควรมีสิทธิในการ
-เก็บเมล็ดพันธุ์ -แลกเปลี่ยน -ปรับปรุง -ใช้งานซ้ำ โดยไม่ต้องขออนุญาตใครตอนต่อไปเรามาคุยเรื่อง UPOV 1991 กันครับ
#pirateketo #กูต้องรู้มั๊ย #ม้วนหางสิลูก
-
@ caa88a52:6c226a91
2025-04-11 22:58:40Running Nestr!