-
@ 3ffac3a6:2d656657
2025-04-15 14:49:31🏅 Como Criar um Badge Épico no Nostr com
nak
+ badges.pageRequisitos:
- Ter o
nak
instalado (https://github.com/fiatjaf/nak) - Ter uma chave privada Nostr (
nsec...
) - Acesso ao site https://badges.page
- Um relay ativo (ex:
wss://relay.primal.net
)
🔧 Passo 1 — Criar o badge em badges.page
- Acesse o site https://badges.page
-
Clique em "New Badge" no canto superior direito
-
Preencha os campos:
- Nome (ex:
Teste Épico
) - Descrição
-
Imagem e thumbnail
-
Após criar, você será redirecionado para a página do badge.
🔍 Passo 2 — Copiar o
naddr
do badgeNa barra de endereços, copie o identificador que aparece após
/a/
— este é o naddr do seu badge.Exemplo:
nostr:naddr1qq94getnw3jj63tsd93k7q3q8lav8fkgt8424rxamvk8qq4xuy9n8mltjtgztv2w44hc5tt9vetsxpqqqp6njkq3sd0
Copie:
naddr1qq94getnw3jj63tsd93k7q3q8lav8fkgt8424rxamvk8qq4xuy9n8mltjtgztv2w44hc5tt9vetsxpqqqp6njkq3sd0
🧠 Passo 3 — Decodificar o naddr com
nak
Abra seu terminal (ou Cygwin no Windows) e rode:
bash nak decode naddr1qq94getnw3jj63tsd93k7q3q8lav8fkgt8424rxamvk8qq4xuy9n8mltjtgztv2w44hc5tt9vetsxpqqqp6njkq3sd0
Você verá algo assim:
json { "pubkey": "3ffac3a6c859eaaa8cdddb2c7002a6e10b33efeb92d025b14ead6f8a2d656657", "kind": 30009, "identifier": "Teste-Epico" }
Grave o campo
"identifier"
— nesse caso: Teste-Epico
🛰️ Passo 4 — Consultar o evento no relay
Agora vamos pegar o evento do badge no relay:
bash nak req -d "Teste-Epico" wss://relay.primal.net
Você verá o conteúdo completo do evento do badge, algo assim:
json { "kind": 30009, "tags": [["d", "Teste-Epico"], ["name", "Teste Épico"], ...] }
💥 Passo 5 — Minerar o evento como "épico" (PoW 31)
Agora vem a mágica: minerar com proof-of-work (PoW 31) para que o badge seja classificado como épico!
bash nak req -d "Teste-Epico" wss://relay.primal.net | nak event --pow 31 --sec nsec1SEU_NSEC_AQUI wss://relay.primal.net wss://nos.lol wss://relay.damus.io
Esse comando: - Resgata o evento original - Gera um novo com PoW de dificuldade 31 - Assina com sua chave privada
nsec
- E publica nos relays wss://relay.primal.net, wss://nos.lol e wss://relay.damus.io⚠️ Substitua
nsec1SEU_NSEC_AQUI
pela sua chave privada Nostr.
✅ Resultado
Se tudo der certo, o badge será atualizado com um evento de PoW mais alto e aparecerá como "Epic" no site!
- Ter o
-
@ e3ba5e1a:5e433365
2025-04-15 11:03:15Prelude
I wrote this post differently than any of my others. It started with a discussion with AI on an OPSec-inspired review of separation of powers, and evolved into quite an exciting debate! I asked Grok to write up a summary in my overall writing style, which it got pretty well. I've decided to post it exactly as-is. Ultimately, I think there are two solid ideas driving my stance here:
- Perfect is the enemy of the good
- Failure is the crucible of success
Beyond that, just some hard-core belief in freedom, separation of powers, and operating from self-interest.
Intro
Alright, buckle up. I’ve been chewing on this idea for a while, and it’s time to spit it out. Let’s look at the U.S. government like I’d look at a codebase under a cybersecurity audit—OPSEC style, no fluff. Forget the endless debates about what politicians should do. That’s noise. I want to talk about what they can do, the raw powers baked into the system, and why we should stop pretending those powers are sacred. If there’s a hole, either patch it or exploit it. No half-measures. And yeah, I’m okay if the whole thing crashes a bit—failure’s a feature, not a bug.
The Filibuster: A Security Rule with No Teeth
You ever see a firewall rule that’s more theater than protection? That’s the Senate filibuster. Everyone acts like it’s this untouchable guardian of democracy, but here’s the deal: a simple majority can torch it any day. It’s not a law; it’s a Senate preference, like choosing tabs over spaces. When people call killing it the “nuclear option,” I roll my eyes. Nuclear? It’s a button labeled “press me.” If a party wants it gone, they’ll do it. So why the dance?
I say stop playing games. Get rid of the filibuster. If you’re one of those folks who thinks it’s the only thing saving us from tyranny, fine—push for a constitutional amendment to lock it in. That’s a real patch, not a Post-it note. Until then, it’s just a vulnerability begging to be exploited. Every time a party threatens to nuke it, they’re admitting it’s not essential. So let’s stop pretending and move on.
Supreme Court Packing: Because Nine’s Just a Number
Here’s another fun one: the Supreme Court. Nine justices, right? Sounds official. Except it’s not. The Constitution doesn’t say nine—it’s silent on the number. Congress could pass a law tomorrow to make it 15, 20, or 42 (hitchhiker’s reference, anyone?). Packing the court is always on the table, and both sides know it. It’s like a root exploit just sitting there, waiting for someone to log in.
So why not call the bluff? If you’re in power—say, Trump’s back in the game—say, “I’m packing the court unless we amend the Constitution to fix it at nine.” Force the issue. No more shadowboxing. And honestly? The court’s got way too much power anyway. It’s not supposed to be a super-legislature, but here we are, with justices’ ideologies driving the bus. That’s a bug, not a feature. If the court weren’t such a kingmaker, packing it wouldn’t even matter. Maybe we should be talking about clipping its wings instead of just its size.
The Executive Should Go Full Klingon
Let’s talk presidents. I’m not saying they should wear Klingon armor and start shouting “Qapla’!”—though, let’s be real, that’d be awesome. I’m saying the executive should use every scrap of power the Constitution hands them. Enforce the laws you agree with, sideline the ones you don’t. If Congress doesn’t like it, they’ve got tools: pass new laws, override vetoes, or—here’s the big one—cut the budget. That’s not chaos; that’s the system working as designed.
Right now, the real problem isn’t the president overreaching; it’s the bureaucracy. It’s like a daemon running in the background, eating CPU and ignoring the user. The president’s supposed to be the one steering, but the administrative state’s got its own agenda. Let the executive flex, push the limits, and force Congress to check it. Norms? Pfft. The Constitution’s the spec sheet—stick to it.
Let the System Crash
Here’s where I get a little spicy: I’m totally fine if the government grinds to a halt. Deadlock isn’t a disaster; it’s a feature. If the branches can’t agree, let the president veto, let Congress starve the budget, let enforcement stall. Don’t tell me about “essential services.” Nothing’s so critical it can’t take a breather. Shutdowns force everyone to the table—debate, compromise, or expose who’s dropping the ball. If the public loses trust? Good. They’ll vote out the clowns or live with the circus they elected.
Think of it like a server crash. Sometimes you need a hard reboot to clear the cruft. If voters keep picking the same bad admins, well, the country gets what it deserves. Failure’s the best teacher—way better than limping along on autopilot.
States Are the Real MVPs
If the feds fumble, states step up. Right now, states act like junior devs waiting for the lead engineer to sign off. Why? Federal money. It’s a leash, and it’s tight. Cut that cash, and states will remember they’re autonomous. Some will shine, others will tank—looking at you, California. And I’m okay with that. Let people flee to better-run states. No bailouts, no excuses. States are like competing startups: the good ones thrive, the bad ones pivot or die.
Could it get uneven? Sure. Some states might turn into sci-fi utopias while others look like a post-apocalyptic vidya game. That’s the point—competition sorts it out. Citizens can move, markets adjust, and failure’s a signal to fix your act.
Chaos Isn’t the Enemy
Yeah, this sounds messy. States ignoring federal law, external threats poking at our seams, maybe even a constitutional crisis. I’m not scared. The Supreme Court’s there to referee interstate fights, and Congress sets the rules for state-to-state play. But if it all falls apart? Still cool. States can sort it without a babysitter—it’ll be ugly, but freedom’s worth it. External enemies? They’ll either unify us or break us. If we can’t rally, we don’t deserve the win.
Centralizing power to avoid this is like rewriting your app in a single thread to prevent race conditions—sure, it’s simpler, but you’re begging for a deadlock. Decentralized chaos lets states experiment, lets people escape, lets markets breathe. States competing to cut regulations to attract businesses? That’s a race to the bottom for red tape, but a race to the top for innovation—workers might gripe, but they’ll push back, and the tension’s healthy. Bring it—let the cage match play out. The Constitution’s checks are enough if we stop coddling the system.
Why This Matters
I’m not pitching a utopia. I’m pitching a stress test. The U.S. isn’t a fragile porcelain doll; it’s a rugged piece of hardware built to take some hits. Let it fail a little—filibuster, court, feds, whatever. Patch the holes with amendments if you want, or lean into the grind. Either way, stop fearing the crash. It’s how we debug the republic.
So, what’s your take? Ready to let the system rumble, or got a better way to secure the code? Hit me up—I’m all ears.
-
@ c4b5369a:b812dbd6
2025-04-15 07:26:16Offline transactions with Cashu
Over the past few weeks, I've been busy implementing offline capabilities into nutstash. I think this is one of the key value propositions of ecash, beinga a bearer instrument that can be used without internet access.
It does however come with limitations, which can lead to a bit of confusion. I hope this article will clear some of these questions up for you!
What is ecash/Cashu?
Ecash is the first cryptocurrency ever invented. It was created by David Chaum in 1983. It uses a blind signature scheme, which allows users to prove ownership of a token without revealing a link to its origin. These tokens are what we call ecash. They are bearer instruments, meaning that anyone who possesses a copy of them, is considered the owner.
Cashu is an implementation of ecash, built to tightly interact with Bitcoin, more specifically the Bitcoin lightning network. In the Cashu ecosystem,
Mints
are the gateway to the lightning network. They provide the infrastructure to access the lightning network, pay invoices and receive payments. Instead of relying on a traditional ledger scheme like other custodians do, the mint issues ecash tokens, to represent the value held by the users.How do normal Cashu transactions work?
A Cashu transaction happens when the sender gives a copy of his ecash token to the receiver. This can happen by any means imaginable. You could send the token through email, messenger, or even by pidgeon. One of the common ways to transfer ecash is via QR code.
The transaction is however not finalized just yet! In order to make sure the sender cannot double-spend their copy of the token, the receiver must do what we call a
swap
. A swap is essentially exchanging an ecash token for a new one at the mint, invalidating the old token in the process. This ensures that the sender can no longer use the same token to spend elsewhere, and the value has been transferred to the receiver.What about offline transactions?
Sending offline
Sending offline is very simple. The ecash tokens are stored on your device. Thus, no internet connection is required to access them. You can litteraly just take them, and give them to someone. The most convenient way is usually through a local transmission protocol, like NFC, QR code, Bluetooth, etc.
The one thing to consider when sending offline is that ecash tokens come in form of "coins" or "notes". The technical term we use in Cashu is
Proof
. It "proofs" to the mint that you own a certain amount of value. Since these proofs have a fixed value attached to them, much like UTXOs in Bitcoin do, you would need proofs with a value that matches what you want to send. You can mix and match multiple proofs together to create a token that matches the amount you want to send. But, if you don't have proofs that match the amount, you would need to go online and swap for the needed proofs at the mint.Another limitation is, that you cannot create custom proofs offline. For example, if you would want to lock the ecash to a certain pubkey, or add a timelock to the proof, you would need to go online and create a new custom proof at the mint.
Receiving offline
You might think: well, if I trust the sender, I don't need to be swapping the token right away!
You're absolutely correct. If you trust the sender, you can simply accept their ecash token without needing to swap it immediately.
This is already really useful, since it gives you a way to receive a payment from a friend or close aquaintance without having to worry about connectivity. It's almost just like physical cash!
It does however not work if the sender is untrusted. We have to use a different scheme to be able to receive payments from someone we don't trust.
Receiving offline from an untrusted sender
To be able to receive payments from an untrusted sender, we need the sender to create a custom proof for us. As we've seen before, this requires the sender to go online.
The sender needs to create a token that has the following properties, so that the receciver can verify it offline:
- It must be locked to ONLY the receiver's public key
- It must include an
offline signature proof
(DLEQ proof) - If it contains a timelock & refund clause, it must be set to a time in the future that is acceptable for the receiver
- It cannot contain duplicate proofs (double-spend)
- It cannot contain proofs that the receiver has already received before (double-spend)
If all of these conditions are met, then the receiver can verify the proof offline and accept the payment. This allows us to receive payments from anyone, even if we don't trust them.
At first glance, this scheme seems kinda useless. It requires the sender to go online, which defeats the purpose of having an offline payment system.
I beleive there are a couple of ways this scheme might be useful nonetheless:
-
Offline vending machines: Imagine you have an offline vending machine that accepts payments from anyone. The vending machine could use this scheme to verify payments without needing to go online itself. We can assume that the sender is able to go online and create a valid token, but the receiver doesn't need to be online to verify it.
-
Offline marketplaces: Imagine you have an offline marketplace where buyers and sellers can trade goods and services. Before going to the marketplace the sender already knows where he will be spending the money. The sender could create a valid token before going to the marketplace, using the merchants public key as a lock, and adding a refund clause to redeem any unspent ecash after it expires. In this case, neither the sender nor the receiver needs to go online to complete the transaction.
How to use this
Pretty much all cashu wallets allow you to send tokens offline. This is because all that the wallet needs to do is to look if it can create the desired amount from the proofs stored locally. If yes, it will automatically create the token offline.
Receiving offline tokens is currently only supported by nutstash (experimental).
To create an offline receivable token, the sender needs to lock it to the receiver's public key. Currently there is no refund clause! So be careful that you don't get accidentally locked out of your funds!
The receiver can then inspect the token and decide if it is safe to accept without a swap. If all checks are green, they can accept the token offline without trusting the sender.
The receiver will see the unswapped tokens on the wallet homescreen. They will need to manually swap them later when they are online again.
Later when the receiver is online again, they can swap the token for a fresh one.
Summary
We learned that offline transactions are possible with ecash, but there are some limitations. It either requires trusting the sender, or relying on either the sender or receiver to be online to verify the tokens, or create tokens that can be verified offline by the receiver.
I hope this short article was helpful in understanding how ecash works and its potential for offline transactions.
Cheers,
Gandlaf
-
@ 266815e0:6cd408a5
2025-04-15 06:58:14Its been a little over a year since NIP-90 was written and merged into the nips repo and its been a communication mess.
Every DVM implementation expects the inputs in slightly different formats, returns the results in mostly the same format and there are very few DVM actually running.
NIP-90 is overloaded
Why does a request for text translation and creating bitcoin OP_RETURNs share the same input
i
tag? and why is there anoutput
tag on requests when only one of them will return an output?Each DVM request kind is for requesting completely different types of compute with diffrent input and output requirements, but they are all using the same spec that has 4 different types of inputs (
text
,url
,event
,job
) and an undefined number ofoutput
types.Let me show a few random DVM requests and responses I found on
wss://relay.damus.io
to demonstrate what I mean:This is a request to translate an event to English
json { "kind": 5002, "content": "", "tags": [ // NIP-90 says there can be multiple inputs, so how would a DVM handle translatting multiple events at once? [ "i", "<event-id>", "event" ], [ "param", "language", "en" ], // What other type of output would text translations be? image/jpeg? [ "output", "text/plain" ], // Do we really need to define relays? cant the DVM respond on the relays it saw the request on? [ "relays", "wss://relay.unknown.cloud/", "wss://nos.lol/" ] ] }
This is a request to generate text using an LLM model
json { "kind": 5050, // Why is the content empty? wouldn't it be better to have the prompt in the content? "content": "", "tags": [ // Why use an indexable tag? are we ever going to lookup prompts? // Also the type "prompt" isn't in NIP-90, this should probably be "text" [ "i", "What is the capital of France?", "prompt" ], [ "p", "c4878054cff877f694f5abecf18c7450f4b6fdf59e3e9cb3e6505a93c4577db2" ], [ "relays", "wss://relay.primal.net" ] ] }
This is a request for content recommendation
json { "kind": 5300, "content": "", "tags": [ // Its fine ignoring this param, but what if the client actually needs exactly 200 "results" [ "param", "max_results", "200" ], // The spec never mentions requesting content for other users. // If a DVM didn't understand this and responded to this request it would provide bad data [ "param", "user", "b22b06b051fd5232966a9344a634d956c3dc33a7f5ecdcad9ed11ddc4120a7f2" ], [ "relays", "wss://relay.primal.net", ], [ "p", "ceb7e7d688e8a704794d5662acb6f18c2455df7481833dd6c384b65252455a95" ] ] }
This is a request to create a OP_RETURN message on bitcoin
json { "kind": 5901, // Again why is the content empty when we are sending human readable text? "content": "", "tags": [ // and again, using an indexable tag on an input that will never need to be looked up ["i", "09/01/24 SEC Chairman on the brink of second ETF approval", "text"] ] }
My point isn't that these event schema's aren't understandable but why are they using the same schema? each use-case is different but are they all required to use the same
i
tag format as input and could support all 4 types of inputs.Lack of libraries
With all these different types of inputs, params, and outputs its verify difficult if not impossible to build libraries for DVMs
If a simple text translation request can have an
event
ortext
as inputs, apayment-required
status at any point in the flow, partial results, or responses from 10+ DVMs whats the best way to build a translation library for other nostr clients to use?And how do I build a DVM framework for the server side that can handle multiple inputs of all four types (
url
,text
,event
,job
) and clients are sending all the requests in slightly differently.Supporting payments is impossible
The way NIP-90 is written there isn't much details about payments. only a
payment-required
status and a genericamount
tagBut the way things are now every DVM is implementing payments differently. some send a bolt11 invoice, some expect the client to NIP-57 zap the request event (or maybe the status event), and some even ask for a subscription. and we haven't even started implementing NIP-61 nut zaps or cashu A few are even formatting the
amount
number wrong or denominating it in sats and not mili-satsBuilding a client or a library that can understand and handle all of these payment methods is very difficult. for the DVM server side its worse. A DVM server presumably needs to support all 4+ types of payments if they want to get the most sats for their services and support the most clients.
All of this is made even more complicated by the fact that a DVM can ask for payment at any point during the job process. this makes sense for some types of compute, but for others like translations or user recommendation / search it just makes things even more complicated.
For example, If a client wanted to implement a timeline page that showed the notes of all the pubkeys on a recommended list. what would they do when the selected DVM asks for payment at the start of the job? or at the end? or worse, only provides half the pubkeys and asks for payment for the other half. building a UI that could handle even just two of these possibilities is complicated.
NIP-89 is being abused
NIP-89 is "Recommended Application Handlers" and the way its describe in the nips repo is
a way to discover applications that can handle unknown event-kinds
Not "a way to discover everything"
If I wanted to build an application discovery app to show all the apps that your contacts use and let you discover new apps then it would have to filter out ALL the DVM advertisement events. and that's not just for making requests from relays
If the app shows the user their list of "recommended applications" then it either has to understand that everything in the 5xxx kind range is a DVM and to show that is its own category or show a bunch of unknown "favorites" in the list which might be confusing for the user.
In conclusion
My point in writing this article isn't that the DVMs implementations so far don't work, but that they will never work well because the spec is too broad. even with only a few DVMs running we have already lost interoperability.
I don't want to be completely negative though because some things have worked. the "DVM feeds" work, although they are limited to a single page of results. text / event translations also work well and kind
5970
Event PoW delegation could be cool. but if we want interoperability, we are going to need to change a few things with NIP-90I don't think we can (or should) abandon NIP-90 entirely but it would be good to break it up into small NIPs or specs. break each "kind" of DVM request out into its own spec with its own definitions for expected inputs, outputs and flow.
Then if we have simple, clean definitions for each kind of compute we want to distribute. we might actually see markets and services being built and used.
-
@ fbf0e434:e1be6a39
2025-04-18 09:59:51Hackathon 概要
Build & Brew - Espresso Global Hackathon 吸引了485位开发者,共有151个项目获得批准。活动由 Espresso Network 主办,通过两个赛道“Caffeinate & Code”和“Cracking Composability”分发了总计100,000美元的奖品。主要目标包括提升以太坊的可组合性以及开发使用 Espresso 确认的新型跨链应用。
此次活动取得了显著成就,其中包括部署与 Espresso Network 集成的功能性 rollup,为开发互操作应用提供了支持。创新重点在于利用快速、安全的确认实现跨链功能。多个项目使用了 Open Intents Framework 来构建高级应用架构。
Hackathon 展示了 Espresso Network 对区块链生态系统的潜在影响,通过将其共识层应用于实际场景。此事件为网络的使命助力,使区块链之间的交互更加无缝,并突显了开发者在推动可组合性方面的重要角色。4月7日的最终演示展示了在开发以太坊跨链能力方面的显著进展。
Hackathon 获奖者
首届 Build & Brew 黑客松落幕时,91 条集成 Espresso 的 Arbitrum Orbit 链成功完成部署,为创新跨链应用开辟了道路。活动设置总额 65,000 美元的奖池,彰显其行业影响力,奖金根据测试网和主网的部署成果分级发放。
获奖项目
第1名 - Affogato
Affogato 是一个 Swap + Bridge 系统,利用以太坊 rollup 和 Espresso 确认来确保安全高效的跨链交易。
第2名 - Random Network
该项目通过使用 rollup 活跃性验证来增强可组合性,并采用开放意图池来实现系统间的无缝集成。
第3名 - Disburse Network
Disburse Network 提供了一种模块化支付协议,通过 Nitro rollup 架构实现一键跨链大规模支付,提高了支付处理效率。
第4名 - Coffee Chain
Coffee Chain 是一个跨链支付应用程序,可以让商家无缝接受任何代币或区块链的加密支付。
第5名 - GTXpresso
目前作为未完成的占位符,GTXpresso 是一个跨链的中央限价订单簿(CLOB)项目。
要查看 Hackathon 的所有项目,请访问 Build and Brew Hackathon on DoraHacks。
关于组织者
Espresso
Espresso 专注于推进区块链领域的技术。该组织以其在创建高效、可扩展的区块链解决方案方面的专业知识而闻名,重点在于安全性和用户可访问性。主要成就包括部署创新的共识机制,这些机制提高了交易速度并降低了计算成本。Espresso 参与合作项目,致力于将区块链技术整合到各个行业,巩固其作为技术进步重要贡献者的地位。目前,Espresso 正专注于优化区块链基础设施,以推动普及并支持行业范围的数字化转型努力。
-
@ 7d33ba57:1b82db35
2025-04-18 09:56:09Bamberg is one of the most enchanting towns in Bavaria, known for its UNESCO-listed old town, picturesque half-timbered houses, cobbled streets, and unique smoked beer. Built on seven hills and straddling the Regnitz River, Bamberg has an irresistible old-world charm that feels straight out of a storybook.
🏰 Top Things to See in Bamberg
🏛️ Bamberg Old Town (Altstadt)
- One of Europe’s best-preserved medieval towns
- Wander its winding lanes, colorful buildings, and riverside walkways
- Don’t miss Obere Brücke, a bridge that cuts through the town with a Baroque Old Town Hall (Altes Rathaus) perched on an island
⛪ Bamberg Cathedral (Bamberger Dom)
- A majestic 13th-century cathedral with four spires
- Houses the Bamberg Horseman statue and the tombs of Pope Clement II and Emperor Henry II
🌉 Little Venice (Klein Venedig)
- A charming row of fishermen's houses along the river
- Perfect for a romantic stroll or a gondola-style boat ride
🏰 Altenburg Castle
- Perched on the highest of Bamberg’s seven hills
- Offers panoramic views over the city and surrounding countryside
- Great spot for photos and a beer at the rustic tavern
🍺 Smoke Beer & Beer Culture
- Bamberg is the capital of Franconian beer, home to 10 breweries
- Try the famous Rauchbier (smoked beer) at Schlenkerla, served straight from the barrel
- Don’t miss a beer tasting tour or visit the Franconian Brewery Museum
🌿 Nature & Walks
- Stroll along the Regnitz riverbanks or hike up through Stephansberg
- Explore the Hain Park, a green oasis perfect for picnics or renting paddle boats
🍽️ What to Eat
- Schäuferla (roast pork shoulder with crispy skin)
- Bamberger Hörnla (a local croissant-style pastry)
- Franconian bratwurst with sauerkraut
- Local cheeses and pretzels served in cozy beer gardens
📅 Best Time to Visit
- Spring–Autumn (May–Oct): Ideal for exploring on foot, enjoying beer gardens, and outdoor cafés
- December: Cozy Christmas markets light up the medieval streets
- Summer: Expect cultural festivals, riverside music, and sunny terrace vibes
🚉 Getting There
- Easily reached by train from Nuremberg (45 min) or Munich (2 hours)
- The historic core is very walkable—no car needed!
-
@ 91bea5cd:1df4451c
2025-04-15 06:27:28Básico
bash lsblk # Lista todos os diretorios montados.
Para criar o sistema de arquivos:
bash mkfs.btrfs -L "ThePool" -f /dev/sdx
Criando um subvolume:
bash btrfs subvolume create SubVol
Montando Sistema de Arquivos:
bash mount -o compress=zlib,subvol=SubVol,autodefrag /dev/sdx /mnt
Lista os discos formatados no diretório:
bash btrfs filesystem show /mnt
Adiciona novo disco ao subvolume:
bash btrfs device add -f /dev/sdy /mnt
Lista novamente os discos do subvolume:
bash btrfs filesystem show /mnt
Exibe uso dos discos do subvolume:
bash btrfs filesystem df /mnt
Balancea os dados entre os discos sobre raid1:
bash btrfs filesystem balance start -dconvert=raid1 -mconvert=raid1 /mnt
Scrub é uma passagem por todos os dados e metadados do sistema de arquivos e verifica as somas de verificação. Se uma cópia válida estiver disponível (perfis de grupo de blocos replicados), a danificada será reparada. Todas as cópias dos perfis replicados são validadas.
iniciar o processo de depuração :
bash btrfs scrub start /mnt
ver o status do processo de depuração Btrfs em execução:
bash btrfs scrub status /mnt
ver o status do scrub Btrfs para cada um dos dispositivos
bash btrfs scrub status -d / data btrfs scrub cancel / data
Para retomar o processo de depuração do Btrfs que você cancelou ou pausou:
btrfs scrub resume / data
Listando os subvolumes:
bash btrfs subvolume list /Reports
Criando um instantâneo dos subvolumes:
Aqui, estamos criando um instantâneo de leitura e gravação chamado snap de marketing do subvolume de marketing.
bash btrfs subvolume snapshot /Reports/marketing /Reports/marketing-snap
Além disso, você pode criar um instantâneo somente leitura usando o sinalizador -r conforme mostrado. O marketing-rosnap é um instantâneo somente leitura do subvolume de marketing
bash btrfs subvolume snapshot -r /Reports/marketing /Reports/marketing-rosnap
Forçar a sincronização do sistema de arquivos usando o utilitário 'sync'
Para forçar a sincronização do sistema de arquivos, invoque a opção de sincronização conforme mostrado. Observe que o sistema de arquivos já deve estar montado para que o processo de sincronização continue com sucesso.
bash btrfs filsystem sync /Reports
Para excluir o dispositivo do sistema de arquivos, use o comando device delete conforme mostrado.
bash btrfs device delete /dev/sdc /Reports
Para sondar o status de um scrub, use o comando scrub status com a opção -dR .
bash btrfs scrub status -dR / Relatórios
Para cancelar a execução do scrub, use o comando scrub cancel .
bash $ sudo btrfs scrub cancel / Reports
Para retomar ou continuar com uma depuração interrompida anteriormente, execute o comando de cancelamento de depuração
bash sudo btrfs scrub resume /Reports
mostra o uso do dispositivo de armazenamento:
btrfs filesystem usage /data
Para distribuir os dados, metadados e dados do sistema em todos os dispositivos de armazenamento do RAID (incluindo o dispositivo de armazenamento recém-adicionado) montados no diretório /data , execute o seguinte comando:
sudo btrfs balance start --full-balance /data
Pode demorar um pouco para espalhar os dados, metadados e dados do sistema em todos os dispositivos de armazenamento do RAID se ele contiver muitos dados.
Opções importantes de montagem Btrfs
Nesta seção, vou explicar algumas das importantes opções de montagem do Btrfs. Então vamos começar.
As opções de montagem Btrfs mais importantes são:
**1. acl e noacl
**ACL gerencia permissões de usuários e grupos para os arquivos/diretórios do sistema de arquivos Btrfs.
A opção de montagem acl Btrfs habilita ACL. Para desabilitar a ACL, você pode usar a opção de montagem noacl .
Por padrão, a ACL está habilitada. Portanto, o sistema de arquivos Btrfs usa a opção de montagem acl por padrão.
**2. autodefrag e noautodefrag
**Desfragmentar um sistema de arquivos Btrfs melhorará o desempenho do sistema de arquivos reduzindo a fragmentação de dados.
A opção de montagem autodefrag permite a desfragmentação automática do sistema de arquivos Btrfs.
A opção de montagem noautodefrag desativa a desfragmentação automática do sistema de arquivos Btrfs.
Por padrão, a desfragmentação automática está desabilitada. Portanto, o sistema de arquivos Btrfs usa a opção de montagem noautodefrag por padrão.
**3. compactar e compactar-forçar
**Controla a compactação de dados no nível do sistema de arquivos do sistema de arquivos Btrfs.
A opção compactar compacta apenas os arquivos que valem a pena compactar (se compactar o arquivo economizar espaço em disco).
A opção compress-force compacta todos os arquivos do sistema de arquivos Btrfs, mesmo que a compactação do arquivo aumente seu tamanho.
O sistema de arquivos Btrfs suporta muitos algoritmos de compactação e cada um dos algoritmos de compactação possui diferentes níveis de compactação.
Os algoritmos de compactação suportados pelo Btrfs são: lzo , zlib (nível 1 a 9) e zstd (nível 1 a 15).
Você pode especificar qual algoritmo de compactação usar para o sistema de arquivos Btrfs com uma das seguintes opções de montagem:
- compress=algoritmo:nível
- compress-force=algoritmo:nível
Para obter mais informações, consulte meu artigo Como habilitar a compactação do sistema de arquivos Btrfs .
**4. subvol e subvolid
**Estas opções de montagem são usadas para montar separadamente um subvolume específico de um sistema de arquivos Btrfs.
A opção de montagem subvol é usada para montar o subvolume de um sistema de arquivos Btrfs usando seu caminho relativo.
A opção de montagem subvolid é usada para montar o subvolume de um sistema de arquivos Btrfs usando o ID do subvolume.
Para obter mais informações, consulte meu artigo Como criar e montar subvolumes Btrfs .
**5. dispositivo
A opção de montagem de dispositivo** é usada no sistema de arquivos Btrfs de vários dispositivos ou RAID Btrfs.
Em alguns casos, o sistema operacional pode falhar ao detectar os dispositivos de armazenamento usados em um sistema de arquivos Btrfs de vários dispositivos ou RAID Btrfs. Nesses casos, você pode usar a opção de montagem do dispositivo para especificar os dispositivos que deseja usar para o sistema de arquivos de vários dispositivos Btrfs ou RAID.
Você pode usar a opção de montagem de dispositivo várias vezes para carregar diferentes dispositivos de armazenamento para o sistema de arquivos de vários dispositivos Btrfs ou RAID.
Você pode usar o nome do dispositivo (ou seja, sdb , sdc ) ou UUID , UUID_SUB ou PARTUUID do dispositivo de armazenamento com a opção de montagem do dispositivo para identificar o dispositivo de armazenamento.
Por exemplo,
- dispositivo=/dev/sdb
- dispositivo=/dev/sdb,dispositivo=/dev/sdc
- dispositivo=UUID_SUB=490a263d-eb9a-4558-931e-998d4d080c5d
- device=UUID_SUB=490a263d-eb9a-4558-931e-998d4d080c5d,device=UUID_SUB=f7ce4875-0874-436a-b47d-3edef66d3424
**6. degraded
A opção de montagem degradada** permite que um RAID Btrfs seja montado com menos dispositivos de armazenamento do que o perfil RAID requer.
Por exemplo, o perfil raid1 requer a presença de 2 dispositivos de armazenamento. Se um dos dispositivos de armazenamento não estiver disponível em qualquer caso, você usa a opção de montagem degradada para montar o RAID mesmo que 1 de 2 dispositivos de armazenamento esteja disponível.
**7. commit
A opção commit** mount é usada para definir o intervalo (em segundos) dentro do qual os dados serão gravados no dispositivo de armazenamento.
O padrão é definido como 30 segundos.
Para definir o intervalo de confirmação para 15 segundos, você pode usar a opção de montagem commit=15 (digamos).
**8. ssd e nossd
A opção de montagem ssd** informa ao sistema de arquivos Btrfs que o sistema de arquivos está usando um dispositivo de armazenamento SSD, e o sistema de arquivos Btrfs faz a otimização SSD necessária.
A opção de montagem nossd desativa a otimização do SSD.
O sistema de arquivos Btrfs detecta automaticamente se um SSD é usado para o sistema de arquivos Btrfs. Se um SSD for usado, a opção de montagem de SSD será habilitada. Caso contrário, a opção de montagem nossd é habilitada.
**9. ssd_spread e nossd_spread
A opção de montagem ssd_spread** tenta alocar grandes blocos contínuos de espaço não utilizado do SSD. Esse recurso melhora o desempenho de SSDs de baixo custo (baratos).
A opção de montagem nossd_spread desativa o recurso ssd_spread .
O sistema de arquivos Btrfs detecta automaticamente se um SSD é usado para o sistema de arquivos Btrfs. Se um SSD for usado, a opção de montagem ssd_spread será habilitada. Caso contrário, a opção de montagem nossd_spread é habilitada.
**10. descarte e nodiscard
Se você estiver usando um SSD que suporte TRIM enfileirado assíncrono (SATA rev3.1), a opção de montagem de descarte** permitirá o descarte de blocos de arquivos liberados. Isso melhorará o desempenho do SSD.
Se o SSD não suportar TRIM enfileirado assíncrono, a opção de montagem de descarte prejudicará o desempenho do SSD. Nesse caso, a opção de montagem nodiscard deve ser usada.
Por padrão, a opção de montagem nodiscard é usada.
**11. norecovery
Se a opção de montagem norecovery** for usada, o sistema de arquivos Btrfs não tentará executar a operação de recuperação de dados no momento da montagem.
**12. usebackuproot e nousebackuproot
Se a opção de montagem usebackuproot for usada, o sistema de arquivos Btrfs tentará recuperar qualquer raiz de árvore ruim/corrompida no momento da montagem. O sistema de arquivos Btrfs pode armazenar várias raízes de árvore no sistema de arquivos. A opção de montagem usebackuproot** procurará uma boa raiz de árvore e usará a primeira boa que encontrar.
A opção de montagem nousebackuproot não verificará ou recuperará raízes de árvore inválidas/corrompidas no momento da montagem. Este é o comportamento padrão do sistema de arquivos Btrfs.
**13. space_cache, space_cache=version, nospace_cache e clear_cache
A opção de montagem space_cache** é usada para controlar o cache de espaço livre. O cache de espaço livre é usado para melhorar o desempenho da leitura do espaço livre do grupo de blocos do sistema de arquivos Btrfs na memória (RAM).
O sistema de arquivos Btrfs suporta 2 versões do cache de espaço livre: v1 (padrão) e v2
O mecanismo de cache de espaço livre v2 melhora o desempenho de sistemas de arquivos grandes (tamanho de vários terabytes).
Você pode usar a opção de montagem space_cache=v1 para definir a v1 do cache de espaço livre e a opção de montagem space_cache=v2 para definir a v2 do cache de espaço livre.
A opção de montagem clear_cache é usada para limpar o cache de espaço livre.
Quando o cache de espaço livre v2 é criado, o cache deve ser limpo para criar um cache de espaço livre v1 .
Portanto, para usar o cache de espaço livre v1 após a criação do cache de espaço livre v2 , as opções de montagem clear_cache e space_cache=v1 devem ser combinadas: clear_cache,space_cache=v1
A opção de montagem nospace_cache é usada para desabilitar o cache de espaço livre.
Para desabilitar o cache de espaço livre após a criação do cache v1 ou v2 , as opções de montagem nospace_cache e clear_cache devem ser combinadas: clear_cache,nosapce_cache
**14. skip_balance
Por padrão, a operação de balanceamento interrompida/pausada de um sistema de arquivos Btrfs de vários dispositivos ou RAID Btrfs será retomada automaticamente assim que o sistema de arquivos Btrfs for montado. Para desabilitar a retomada automática da operação de equilíbrio interrompido/pausado em um sistema de arquivos Btrfs de vários dispositivos ou RAID Btrfs, você pode usar a opção de montagem skip_balance .**
**15. datacow e nodatacow
A opção datacow** mount habilita o recurso Copy-on-Write (CoW) do sistema de arquivos Btrfs. É o comportamento padrão.
Se você deseja desabilitar o recurso Copy-on-Write (CoW) do sistema de arquivos Btrfs para os arquivos recém-criados, monte o sistema de arquivos Btrfs com a opção de montagem nodatacow .
**16. datasum e nodatasum
A opção datasum** mount habilita a soma de verificação de dados para arquivos recém-criados do sistema de arquivos Btrfs. Este é o comportamento padrão.
Se você não quiser que o sistema de arquivos Btrfs faça a soma de verificação dos dados dos arquivos recém-criados, monte o sistema de arquivos Btrfs com a opção de montagem nodatasum .
Perfis Btrfs
Um perfil Btrfs é usado para informar ao sistema de arquivos Btrfs quantas cópias dos dados/metadados devem ser mantidas e quais níveis de RAID devem ser usados para os dados/metadados. O sistema de arquivos Btrfs contém muitos perfis. Entendê-los o ajudará a configurar um RAID Btrfs da maneira que você deseja.
Os perfis Btrfs disponíveis são os seguintes:
single : Se o perfil único for usado para os dados/metadados, apenas uma cópia dos dados/metadados será armazenada no sistema de arquivos, mesmo se você adicionar vários dispositivos de armazenamento ao sistema de arquivos. Assim, 100% do espaço em disco de cada um dos dispositivos de armazenamento adicionados ao sistema de arquivos pode ser utilizado.
dup : Se o perfil dup for usado para os dados/metadados, cada um dos dispositivos de armazenamento adicionados ao sistema de arquivos manterá duas cópias dos dados/metadados. Assim, 50% do espaço em disco de cada um dos dispositivos de armazenamento adicionados ao sistema de arquivos pode ser utilizado.
raid0 : No perfil raid0 , os dados/metadados serão divididos igualmente em todos os dispositivos de armazenamento adicionados ao sistema de arquivos. Nesta configuração, não haverá dados/metadados redundantes (duplicados). Assim, 100% do espaço em disco de cada um dos dispositivos de armazenamento adicionados ao sistema de arquivos pode ser usado. Se, em qualquer caso, um dos dispositivos de armazenamento falhar, todo o sistema de arquivos será corrompido. Você precisará de pelo menos dois dispositivos de armazenamento para configurar o sistema de arquivos Btrfs no perfil raid0 .
raid1 : No perfil raid1 , duas cópias dos dados/metadados serão armazenadas nos dispositivos de armazenamento adicionados ao sistema de arquivos. Nesta configuração, a matriz RAID pode sobreviver a uma falha de unidade. Mas você pode usar apenas 50% do espaço total em disco. Você precisará de pelo menos dois dispositivos de armazenamento para configurar o sistema de arquivos Btrfs no perfil raid1 .
raid1c3 : No perfil raid1c3 , três cópias dos dados/metadados serão armazenadas nos dispositivos de armazenamento adicionados ao sistema de arquivos. Nesta configuração, a matriz RAID pode sobreviver a duas falhas de unidade, mas você pode usar apenas 33% do espaço total em disco. Você precisará de pelo menos três dispositivos de armazenamento para configurar o sistema de arquivos Btrfs no perfil raid1c3 .
raid1c4 : No perfil raid1c4 , quatro cópias dos dados/metadados serão armazenadas nos dispositivos de armazenamento adicionados ao sistema de arquivos. Nesta configuração, a matriz RAID pode sobreviver a três falhas de unidade, mas você pode usar apenas 25% do espaço total em disco. Você precisará de pelo menos quatro dispositivos de armazenamento para configurar o sistema de arquivos Btrfs no perfil raid1c4 .
raid10 : No perfil raid10 , duas cópias dos dados/metadados serão armazenadas nos dispositivos de armazenamento adicionados ao sistema de arquivos, como no perfil raid1 . Além disso, os dados/metadados serão divididos entre os dispositivos de armazenamento, como no perfil raid0 .
O perfil raid10 é um híbrido dos perfis raid1 e raid0 . Alguns dos dispositivos de armazenamento formam arrays raid1 e alguns desses arrays raid1 são usados para formar um array raid0 . Em uma configuração raid10 , o sistema de arquivos pode sobreviver a uma única falha de unidade em cada uma das matrizes raid1 .
Você pode usar 50% do espaço total em disco na configuração raid10 . Você precisará de pelo menos quatro dispositivos de armazenamento para configurar o sistema de arquivos Btrfs no perfil raid10 .
raid5 : No perfil raid5 , uma cópia dos dados/metadados será dividida entre os dispositivos de armazenamento. Uma única paridade será calculada e distribuída entre os dispositivos de armazenamento do array RAID.
Em uma configuração raid5 , o sistema de arquivos pode sobreviver a uma única falha de unidade. Se uma unidade falhar, você pode adicionar uma nova unidade ao sistema de arquivos e os dados perdidos serão calculados a partir da paridade distribuída das unidades em execução.
Você pode usar 1 00x(N-1)/N % do total de espaços em disco na configuração raid5 . Aqui, N é o número de dispositivos de armazenamento adicionados ao sistema de arquivos. Você precisará de pelo menos três dispositivos de armazenamento para configurar o sistema de arquivos Btrfs no perfil raid5 .
raid6 : No perfil raid6 , uma cópia dos dados/metadados será dividida entre os dispositivos de armazenamento. Duas paridades serão calculadas e distribuídas entre os dispositivos de armazenamento do array RAID.
Em uma configuração raid6 , o sistema de arquivos pode sobreviver a duas falhas de unidade ao mesmo tempo. Se uma unidade falhar, você poderá adicionar uma nova unidade ao sistema de arquivos e os dados perdidos serão calculados a partir das duas paridades distribuídas das unidades em execução.
Você pode usar 100x(N-2)/N % do espaço total em disco na configuração raid6 . Aqui, N é o número de dispositivos de armazenamento adicionados ao sistema de arquivos. Você precisará de pelo menos quatro dispositivos de armazenamento para configurar o sistema de arquivos Btrfs no perfil raid6 .
-
@ 9223d2fa:b57e3de7
2025-04-15 02:54:0012,600 steps
-
@ 6e0ea5d6:0327f353
2025-04-14 15:11:17Ascolta.
We live in times where the average man is measured by the speeches he gives — not by the commitments he keeps. People talk about dreams, goals, promises… but what truly remains is what’s honored in the silence of small gestures, in actions that don’t seek applause, in attitudes unseen — yet speak volumes.
Punctuality, for example. Showing up on time isn’t about the clock. It’s about respect. Respect for another’s time, yes — but more importantly, respect for one’s own word. A man who is late without reason is already running late in his values. And the one who excuses his own lateness with sweet justifications slowly gets used to mediocrity.
Keeping your word is more than fulfilling promises. It is sealing, with the mouth, what the body must later uphold. Every time a man commits to something, he creates a moral debt with his own dignity. And to break that commitment is to declare bankruptcy — not in the eyes of others, but in front of himself.
And debts? Even the small ones — or especially the small ones — are precise thermometers of character. A forgotten sum, an unpaid favor, a commitment left behind… all of these reveal the structure of the inner building that man resides in. He who neglects the small is merely rehearsing for his future collapse.
Life, contrary to what the reckless say, is not built on grand deeds. It is built with small bricks, laid with almost obsessive precision. The truly great man is the one who respects the details — recognizing in them a code of conduct.
In Sicily, especially in the streets of Palermo, I learned early on that there is more nobility in paying a five-euro debt on time than in flaunting riches gained without word, without honor, without dignity.
As they say in Palermo: L’uomo si conosce dalle piccole cose.
So, amico mio, Don’t talk to me about greatness if you can’t show up on time. Don’t talk to me about respect if your word is fickle. And above all, don’t talk to me about honor if you still owe what you once promised — no matter how small.
Thank you for reading, my friend!
If this message resonated with you, consider leaving your "🥃" as a token of appreciation.
A toast to our family!
-
@ 6e0ea5d6:0327f353
2025-04-14 15:10:58Ascolta bene.
A man’s collapse never begins on the battlefield.
It begins in the invisible antechamber of his own mind.
Before any public fall, there is an ignored internal whisper—
a small, quiet, private decision that gradually drags him toward ruin.No empire ever fell without first rotting from within.
The world does not destroy a man who hasn’t first surrendered to himself.
The enemy outside only wins when it finds space in the void the man has silently carved.**Non ti sbagliare ** — there are no armies more ruthless than undisciplined thoughts.
There are no blows more fatal than the ones we deal ourselves:
with small concessions, well-crafted excuses,
and the slow deterioration of our integrity.
What people call failure is nothing more than the logical outcome
of a sequence of internal betrayals.Afraid of the world? Sciocchezze.
But a man who’s already bowed before his own weaknesses—
he needs no enemies.
He digs his own grave, chooses the epitaph,
and the only thing the world does is toss in some dirt.Capisci?
Strength isn’t the absence of falling, but the presence of resistance.
The true battle isn’t external.
It takes place within—where there’s only you, your conscience, and the mirror.
And it’s in that silent courtroom where everything is decided.The discipline to say “no” to yourself
is more noble than any public glory.
Self-control is more valuable than any victory over others.In Sicily, we learn early:
“Cu s’abbrazza cu’ so’ nemicu, si scorda la faccia di l’amicu.”
He who embraces his enemy forgets the face of his friend.
The most dangerous enemy is the one you feed daily with self-indulgence.
And the most relentless confrontation is the one you avoid in front of the mirror.So don’t talk to me about external defeats.
Tell me where inside you the weakness began.
Tell me the exact moment you abandoned what you believed in, in the name of ease.
Because a man only falls before the world… after falling before himself.Thank you for reading, my friend!
If this message resonated with you, consider leaving your "🥃" as a token of appreciation.
A toast to our family!
-
@ c21b1a6c:0cd4d170
2025-04-14 14:41:20🧾 Progress Report Two
Hey everyone! I’m back with another progress report for Formstr, a part of the now completed grant from nostr:npub10pensatlcfwktnvjjw2dtem38n6rvw8g6fv73h84cuacxn4c28eqyfn34f . This update covers everything we’ve built since the last milestone — including polish, performance, power features, and plenty of bug-squashing.
🏗️ What’s New Since Last Time?
This quarter was less about foundational rewrites and more about production hardening and real-world feedback. With users now onboard, our focus shifted to polishing UX, fixing issues, and adding new features that made Formstr easier and more powerful to use.
✨ New Features & UX Improvements
- Edit Existing Forms
- Form Templates
- Drag & Drop Enhancements (especially for mobile)
- New Public Forms UX (card-style layout)
- FAQ & Support Sections
- Relay Modal for Publishing
- Skeleton Loaders and subtle UI Polish
🐛 Major Bug Fixes
- Fixed broken CSV exports when responses were empty
- Cleaned up mobile rendering issues for public forms
- Resolved blank.ts export issues and global form bugs
- Fixed invalid
npub
strings in the admin flow - Patched response handling for private forms
- Lots of small fixes for titles, drafts, embedded form URLs, etc.
🔐 Access Control & Privacy
- Made forms private by default
- Fixed multiple issues around form visibility, access control UIs, and anonymous submissions
- Improved detection of pubkey issues in shared forms
🚧 Some Notable In-Progress Features
The following features are actively being developed, and many are nearing completion:
-
Conditional Questions:
This one’s been tough to crack, but we’re close!
Work in progress bykeraliss
and myself:
👉 PR #252 -
Downloadable Forms:
Fully-contained downloadable HTML versions of forms.
Being led bycasyazmon
with initial code by Basanta Goswami
👉 PR #274 -
OLLAMA Integration (Self-Hosted LLMs):
Users will be able to create forms using locally hosted LLMs.
PR byashu01304
👉 PR #247 -
Sections in Forms:
Work just started on adding section support!
Small PoC PR bykeraliss
:
👉 PR #217
🙌 Huge Thanks to New Contributors
We've had amazing contributors this cycle. Big thanks to:
- Aashutosh Gandhi (ashu01304) – drag-and-drop enhancements, OLLAMA integration
- Amaresh Prasad (devAmaresh) – fixed npub and access bugs
- Biresh Biswas (Billa05) – skeleton loaders
- Shashank Shekhar Singh (Shashankss1205) – bugfixes, co-authored image patches
- Akap Azmon Deh-nji (casyazmon) – CSV fixes, downloadable forms
- Manas Ranjan Dash (mdash3735) – bug fixes
- Basanta Goswami – initial groundwork for downloadable forms
- keraliss – ongoing work on conditional questions and sections
We also registered for the Summer of Bitcoin program and have been receiving contributions from some incredibly bright new applicants.
🔍 What’s Still Coming?
From the wishlist I committed to during the grant, here’s what’s still in the oven:
-[x] Upgrade to nip-44 - [x] Access Controlled Forms: A Form will be able to have multiple admins and Editors. - [x] Private Forms and Fixed Participants: Enncrypt a form and only allow certain npubs to fill it. - [x] Edit Past Forms: Being able to edit an existing form. - [x] Edit Past Forms
- [ ] Conditional Rendering (in progress)
- [ ] Sections (just started)
- [ ] Integrations - OLLAMA / AI-based Form Generation (near complete)
- [ ] Paid Surveys
- [ ] NIP-42 Private Relay support
❌ What’s De-Prioritized?
- Nothing is de-prioritized now especially since Ollama Integration got re-prioritized (thanks to Summer Of Bitcoin). We are a little delayed on Private Relays support but it's now becoming a priority and in active development. Zap Surveys will be coming soon too.
💸 How Funds Were Used
- Paid individual contributors for their work.
- Living expenses to allow full-time focus on development
🧠 Closing Thoughts
Things feel like they’re coming together now. We’re out of "beta hell", starting to see real adoption, and most importantly, gathering feedback from real users. That’s helping us make smarter choices and move fast without breaking too much.
Stay tuned for the next big drop — and in the meantime, try creating a form at formstr.app, and let me know what you think!
-
@ fbf0e434:e1be6a39
2025-04-18 09:52:24Hackathon 概述
BUIDL BATTLE | The Bitcoin Builders Tournament 共有 219 位开发者注册参与,最终 81 个项目通过审核。这场为期三周的线上活动旨在为建设者、投资者及加速器提供高曝光机会,推动比特币领域的创新发展。活动聚焦比特币 DeFi 与真实世界应用主题,参与者围绕超 9 万美元总奖金展开竞争,奖项涵盖现金、AWS 积分及 ICP 资助。值得关注的创新成果包括基于 Stacks 技术和 sBTC 的组件应用。
本次黑客松采用两轮赛制:决赛入围者需向由风险投资家与行业领袖组成的评审团展示项目,最终决出总冠军。参与者通过工作坊和导师指导获取专业见解,第二轮赛程进一步提升了项目曝光度与潜在融资机会。在 Stacks 基金会、AWS 等合作伙伴的支持下,活动不仅发掘了新生力量,更助力强化了比特币开发生态系统。
Hackathon 优胜者
比特币 DeFi 2.0 奖项得主
比特币 DeFi 2.0 侧重于提高可扩展性、安全性和用户体验。此类别的获奖者展示了显著的技术进步和创新解决方案,以应对这些挑战。
BigMarket:一个基于比特币 Layer 2 网络 Stacks 的去中心化、AI 启动的预测市场平台。由 DAO 运营,提供可靠的去中心化预测。
BitForward:一个去中心化平台,通过使用 Stacks 区块链创建比特币上的 NFT 支持的远期合约。
3.0 数字经济奖项得主
本类别考察通过将金融、娱乐和社会互动融合,形成以用户为驱动的生态系统,如 MemeFi、SocialFi 和 GameFi。
Kulture.Fun:一个去中心化的 SocialFi 聊天平台,具有代币门控访问和比特币支持的功能,以增强加密社区的互动。
Skullcoin:通过集成 sBTC 将游戏化引入比特币 DeFi,促进互动的游戏内体验和激活 BTC 的流动性。
真实世界序列号及 NFT 使用奖项得主
本类别关注除传统艺术和表情包之外的实用应用,鼓励探索 NFT 在不同领域的潜力。
Offers & Counter-offers | BNS One:一个市场,通过智能合约实现基于区块链的 BNS 名称交易,实现无信任交易。
Truth-Chain:利用区块链技术通过 Stacks 平台验证数字内容的真实性和来源。
工具与基础设施奖项得主
本部分的创新提供了去中心化应用开发所需的框架和协议,着重于 Web3 工具。
BLAZE PROTOCOL:通过 Layer 2 架构加强 Web3 体验,提供即时交易确认和无缝用户互动。
PoXAgents:使用 AI 代理简化非技术用户与 Stacks 区块链的互动。
ICP 挑战奖项得主
本类别的项目结合互联网计算机的进步,解决比特币生态系统中的常见区块链挑战。
ckBoost:加速互联网计算机上的比特币交易,通过流动资金池减少确认时间。
CounterpartyICP:通过一个接口对接 Counterparty API 的模块,促进比特币上的智能合约和数字资产管理。
AWS - Buidl with Bedrock 挑战奖项得主
重点关注利用 AWS 技术的项目,本类别展示了在坚实基础设施上建立的创新。
- Stacks AI:一个用于在 Clarity 中生成、调试和学习智能合约的 AI 工具,使用 AWS Bedrock 进行可扩展分析。
有关所有项目和创新的更多详细信息,请访问 Dorahacks。
关于组织者
Stacks Foundation
Stacks Foundation 致力于促进 Stacks 区块链的成长和发展。它支持各种利用比特币安全性来赋能去中心化互联网的项目。通过像 Stacks Accelerator 这样的计划,Foundation 通过推动创新和开发者参与对区块链生态系统做出了重大贡献。其当前使命聚焦于为开发者增强工具和资源以构建用户拥有的应用,强化其对去中心化网络的承诺。
-
@ 502ab02a:a2860397
2025-04-18 06:27:02AGEs กับการทอด เกิดขึ้นได้ไม่ว่าจะใช้ไขมันอะไร
ก่อนจะทำความรู้จักน้ำมันตัวต่อไป พอดีหลายคนมีคำถามว่า เมื่อเราต้องทอดอาหาร ควรใช้น้ำมันอะไรถึงจะดีต่อสุขภาพ? เป็นคำถามที่ตอบยาก เพราะแม้จะเลือกใช้น้ำมันที่ดูเหมาะสมที่สุด แต่สิ่งที่ควรพิจารณามากกว่าคือ กระบวนการปรุงอาหาร โดยเฉพาะการทอดที่มีการใช้ความร้อนสูง ซึ่งไม่ว่าคุณจะใช้น้ำมันอะไร, ไขมันสัตว์หรือไขมันพืช, ก็สามารถทำให้เกิดสารพิษที่เรียกว่า AGEs (Advanced Glycation End Products) ได้ทั้งนั้น กระบวนการทอดที่อุณหภูมิสูงเป็นตัวการสำคัญที่กระตุ้นการเกิดสารนี้ ซึ่งมีผลเสียต่อสุขภาพมากกว่าการเลือกใช้น้ำมันประเภทใด ดังนั้น สิ่งที่เราควรระวังมากที่สุดคือวิธีการปรุงอาหาร ซึ่งหลายคนยังเข้าใจผิดว่าการเลือกน้ำมันจะเป็นตัวตัดสินความดีหรือไม่ดีต่อสุขภาพ ทั้งที่จริงๆ แล้วกระบวนการปรุงอาหารต่างหากที่สำคัญกว่าอย่างมาก
และถ้าต้องตอบว่าน้ำมันอะไรดี มันก็จะแค่บอกได้ว่า ปาล์ม กับ มะพร้าว ซึ่งมันจะช่วยได้แค่การลดโอกาสการเกิดออกซิเดชั่น และคุณสมบัติตามโพรไฟล์การรับความร้อนได้ มันก็เป็นแค่น้ำมันที่ทนความร้อนได้ดีกว่าใครเขา
แต่มันไม่ได้ตอบคำถามที่มีคำว่า "ดีต่อสุขภาพ" ด้วยนะสิครับ เพราะอะไร? ผมพยายามเขียนแบบเล่าสู่กันอ่านนะครับ ให้เข้าใจง่ายๆไม่วิชากงวิชาการมากนัก
ในโลกของการปรุงอาหาร, การทอดถือเป็นหนึ่งในวิธีการทำอาหารที่ได้รับความนิยมสูง เพราะมันง่ายและรวดเร็ว แต่อย่างไรก็ตาม, การทอดที่อุณหภูมิสูงนั้นอาจเป็นสาเหตุที่ทำให้เกิดสารพิษชนิดหนึ่งที่เรียกว่า AGEs (Advanced Glycation End Products) ซึ่งมีผลกระทบต่อสุขภาพในระยะยาว ไม่ว่าเราจะใช้ ไขมันสัตว์ หรือ น้ำมันพืช ก็สามารถเกิด AGEs ได้ทั้งนั้น ถ้าหากการทอดเกิดขึ้นที่อุณหภูมิสูงอย่างต่อเนื่อง
AGEs คืออะไร? AGEs คือ สารพิษที่เกิดจากการปฏิกิริยาระหว่าง น้ำตาล (เช่น กลูโคส หรือ ฟรุกโตส) และ โปรตีน หรือ ไขมัน ในอาหาร เมื่อเราเตรียมอาหารในอุณหภูมิสูง ซึ่งปฏิกิริยานี้สามารถเกิดขึ้นได้กับ ทุกชนิดของไขมัน ไม่ว่าจะเป็น ไขมันสัตว์ หรือ น้ำมันพืช ซึ่งอาจส่งผลเสียต่อสุขภาพของเราได้หากได้รับเข้าไปในปริมาณมาก
การทอดและการเกิด AGEs การทอดอาหารที่มีอุณหภูมิสูง เช่น การทอดหมูชุบแป้ง หรืออาหารที่ใช้ น้ำมันพืช เช่น น้ำมันถั่วเหลือง, น้ำมันข้าวโพด หรือ ไขมันสัตว์ เช่น น้ำมันหมู แม้ว่าเราไม่ได้เติมน้ำตาลลงไปในขั้นตอนการเตรียมอาหาร แต่ น้ำตาลธรรมชาติ ที่มีอยู่ในอาหาร เช่น คาร์โบไฮเดรตจากแป้ง, ข้าว, หรือแม้แต่ในเนื้อสัตว์ก็สามารถทำปฏิกิริยากับ กรดอะมิโน (ในโปรตีน) และ ไขมัน (ในเนื้อสัตว์หรืออาหาร) ที่มีอยู่ในอาหารได้ และที่สำคัญคือการทำอาหารที่มีอุณหภูมิสูงจะเพิ่มโอกาสในการเกิดปฏิกิริยานี้
การทอดอาหารด้วยอุณหภูมิสูง (ประมาณ 180 องศาเซลเซียสหรือสูงกว่า) จะทำให้ น้ำตาลธรรมชาติ ในอาหารทำปฏิกิริยากับกรดอะมิโน (จากโปรตีน) หรือกรดไขมัน (จากไขมันในอาหาร) ก่อให้เกิดสาร AGEs ซึ่งเป็น สารพิษ ที่ไม่เพียงแต่ทำให้เกิด การเกิดสารออกซิเดชั่น แต่ยังสามารถทำลายเซลล์ในร่างกาย, เพิ่มความเสี่ยงของการเกิดโรคเรื้อรัง, และทำให้กระบวนการชราภาพของร่างกายเร็วขึ้น
AGEs เกิดได้จากทุกชนิดไขมัน ไม่เพียงแต่ น้ำมันพืช ที่เป็นปัญหาหรือไขมันจากสัตว์ที่ต้องระวัง แต่ AGEs สามารถเกิดได้จากการทอดทุกประเภทไขมันทั้งจากพืชและสัตว์ เพราะ การทอดด้วยความร้อนสูง เป็นปัจจัยหลักที่ทำให้เกิดปฏิกิริยา Maillard reaction (ปฏิกิริยาระหว่างน้ำตาลและโปรตีนหรือไขมัน) ซึ่งเป็นกระบวนการที่สร้างสาร AGEs ดังนั้นไม่ว่าจะเลือกใช้น้ำมันพืชหรือน้ำมันหมูในการทอด ก็ยังสามารถเกิด AGEs ได้
การอบขนมและ AGEs นอกจากนี้การอบขนมที่ใช้ความร้อนประมาณ 180 องศาเซลเซียส (เช่นเดียวกับการทอด) ก็สามารถก่อให้เกิด AGEs ได้เช่นกัน การอบขนมและการปรุงอาหารในอุณหภูมิสูงจึงเป็นปัจจัยที่ส่งผลให้เกิดสารพิษนี้ได้เช่นกัน โดยเฉพาะเมื่อมีส่วนผสมของน้ำตาลธรรมชาติและโปรตีนจากแป้งหรือไขมันในอาหาร การใช้ความร้อนในการอบจึงไม่ต่างจากการทอดเท่าไรในการกระตุ้นการเกิด AGEs
AGEs กับสุขภาพ AGEs ไม่เพียงแต่มีผลเสียในแง่ของการทำให้ร่างกายแก่ก่อนวัย แต่ยังเชื่อมโยงกับโรคเรื้อรังหลายชนิด เช่น โรคเบาหวาน, โรคหัวใจ, โรคหลอดเลือดสมอง และโรคความจำเสื่อม การรับประทานอาหารที่มี AGEs สูงในระยะยาวอาจทำให้การทำงานของเซลล์ในร่างกายลดลง และเพิ่มความเสี่ยงต่อการเกิดโรคต่างๆ ดังนั้นการควบคุมอุณหภูมิในการปรุงอาหาร และการเลือกใช้ไขมันที่เหมาะสมจึงเป็นสิ่งสำคัญในการลดการเกิด AGEs
สรุปแบบสั้นๆให้นะครับว่า การทอดอาหารด้วยอุณหภูมิสูง ไม่ว่าจะใช้น้ำมันพืชหรือไขมันสัตว์ ก็สามารถเกิด AGEs ได้ หากไม่ระมัดระวังในการปรุงอาหาร การเลือกใช้อุณหภูมิที่เหมาะสมในการปรุงอาหารและการเลือกวัตถุดิบที่มีคุณภาพสูงจึงเป็นกุญแจสำคัญในการลดการสะสมของ AGEs ในร่างกาย และช่วยให้เรามีสุขภาพที่ดีในระยะยาว
การรับประทานอาหารที่ปรุงด้วยความร้อนสูงบ่อยๆ นอกจากจะทำให้ร่างกายแก่เร็วขึ้นแล้ว ยังสามารถเพิ่มความเสี่ยงของการเกิดโรคต่างๆ ได้ ดังนั้นเราควรพิจารณาและเลือกวิธีการปรุงอาหารที่เหมาะสมเพื่อลดความเสี่ยงจาก AGEs และดูแลสุขภาพของเราให้ดีในระยะยาวครับ
ทั้งหมดที่เล่ามา ไม่ได้เขียนขึ้นเพื่อทำให้ใครต้องกลัวอาหาร หรือรู้สึกผิดเวลาหยิบของทอดเข้าปาก แต่เพื่อชวนกันมองให้ลึกว่า เราไม่ได้ควรถามแค่ว่า ‘ใช้น้ำมันอะไรดี’ แต่ควรถามต่อว่า ‘เราปรุงยังไง ใช้อุณหภูมิเท่าไร และกินแบบไหนในชีวิตจริง’ ต่างหาก การมีความรู้เรื่อง AGEs ไม่ได้แปลว่าเราต้องตัดทุกอย่างที่เคยชอบออกจากชีวิต แต่เป็นการมีแว่นขยายไว้ส่องดูว่า อะไรที่ควรเบาลง อะไรที่ควรปรับ แล้วใช้มันอย่างรู้เท่าทัน เพราะสุดท้ายแล้ว สุขภาพที่ดี ไม่ได้มาจากการห้ามทุกอย่าง แต่มาจากความเข้าใจในสิ่งที่เรากินต่างหากครับ
#pirateketo #กูต้องรู้มั๊ย #ม้วนหางสิลูก #ฉลาก3รู้
-
@ 1f9e547c:8af216ed
2025-04-18 03:52:38Opinion about Bitcoin Core (desktop)
From Hebasto Twitter
Fellow Bitcoin Core Guix builders,
Heads up! If you're using the Ubuntu guix package, avoid upgrading to Ubuntu 24.04 as it breaks your Guix setup.
https://bugs.launchpad.net/ubuntu/+source/guix/+bug/2064115
WalletScrutiny #nostrOpinion
-
@ 0b118e40:4edc09cb
2025-04-13 02:46:36note - i wrote this before the global trade war, back when tariffs only affected China, Mexico, and Canada. But you will still get the gist of it.
During tough economic times, governments have to decide if they should open markets to global trade or protect local businesses with tariffs. The United States has swung between these two strategies, and history shows that the results are never straightforward
Just days ago, President Donald Trump imposed tariffs on imports from Canada, Mexico, and China. He framed these tariffs (25% on most Canadian goods, 10% on Canadian energy, 25% on Mexican imports, and 10% on Chinese imports) as a way to protect American industries.
But will they actually help, or could they backfire?
A History of U.S. Tariffs
Many have asked if countries will retaliate against the US. They can and they have. Once upon a time, 60 countries were so pissed off at the US, they retaliated at one go and crushed US dominance over trade.
This was during the Great Depression era in the 1930s when the government passed the Smoot-Hawley Tariff Act, placing high taxes on over 20,000 foreign goods. The goal was to protect American jobs, especially American farmers and manufacturers, but it backfired so badly.
Over 60 countries, including Canada, France, and Germany, retaliated by imposing their own tariffs. By 1933, US imports and exports both dropped significantly over 60%, and unemployment rose to 25%.
After President Franklin Roosevelt came to office, he implemented the Reciprocal Trade Agreements Act of 1934 to reverse these policies, calming the world down and reviving trade again.
The economist history of protectionism
The idea of shielding local businesses with tariffs isn’t new or recent. It's been around for a few centuries. In the 16th to 18th centuries, mercantilism encouraged countries to limit imports and boost exports.
In the 18th century, Adam Smith, in The Wealth of Nations, argued that free trade allows nations to specialize in what they do best countering protectionism policies. Friedrich List later challenged Smith's view by stating that developing countries need some protection to grow their “infant” industries which is a belief that still influences many governments today.
But how often do governments truly support startups and new small businesses in ways that create real growth, rather than allowing funds to trickle down to large corporations instead?
In modern times, John Maynard Keynes supported government intervention during economic downturns, while Milton Friedman championed free trade and minimal state interference.
Paul Krugman argued that limited protectionism can help large industries by providing them unfair advantages to become global market leaders. I have deep reservations about Krugman’s take, particularly on its impact or lack thereof in globalizing small businesses.
The debate between free trade and protectionism has existed for centuries. What’s clear is that there is no one-size-fits-all model to this.
The Political Debate - left vs right
Both the left and right have used tariffs but for different reasons. The right supports tariffs to protect jobs and industries, while the left uses them to prevent multinational corporations from exploiting cheap labor abroad.
Neoliberal policies favor free trade, arguing that competition drives efficiency and growth. In the US this gets a little bit confusing as liberals are tied to the left, and free trade is tied to libertarianism which the rights align closely with, yet at present right wing politicians push for protectionism which crosses the boundaries of free-trade.
There are also institutions like the WTO and IMF who advocate for open markets, but their policies often reflect political alliances and preferential treatment - so it depends on what you define as true 'free trade’.
Who Really Benefits from Tariffs?
Most often, tariffs help capital-intensive industries like pharmaceuticals, tech, and defense, while hurting labor-intensive sectors like manufacturing, agriculture, and construction.
This worsens inequality as big corporations will thrive, while small businesses and working-class people struggle with rising costs and fewer job opportunities.
I’ve been reading through international trade economics out of personal interest, I'll share some models below on why this is the case
1. The Disruption of Natural Trade
Tariffs disrupt the natural flow of trade. The Heckscher-Ohlin model explains that countries export goods that match their resources like Canada’s natural resource energy or China’s labour intensive textile and electronics. When tariffs block this natural exchange, industries suffer.
A clear example was Europe’s energy crisis during the Russia-Ukraine war. By abruptly cutting themselves off from the supply of Russian energy, Europe scrambled to find alternative sources. In the end, it was the people who had to bear the brunt of skyrocketing prices of energy.
2. Who wins and who loses?
The Stolper-Samuelson theorem helps us understand who benefits from tariffs and who loses. The idea behind it is that tariffs benefit capital-intensive industries, while labor-intensive sectors are hurt.
In the US, small manufacturing industries that rely on low-cost imports on intermediary parts from countries like China and Mexico will face rising costs, making their final goods too expensive and less competitive. This is similar to what happened to Argentina, where subsidies and devaluation of pesos contributed to cost-push inflation, making locally produced goods more expensive and less competitive globally.
This also reminded me of the decline of the US Rust Belt during the 1970s and 1980s, where the outsourcing of labour-intensive manufacturing jobs led to economic stagnation in many regions in the Midwest, while capital-intensive sectors flourished on the coasts. It resulted in significantly high income inequality that has not improved over the last 40 years.
Ultimately the cost of economic disruption is disproportionately borne by smaller businesses and low-skilled workers. At the end of the day, the rich get richer and the poor get poorer.
3. Delays in Economic Growth
The Rybczynski theorem suggests that economic growth depends on how efficiently nations reallocate their resources toward capital- or labor-intensive industries. But tariffs can distort this transition and progress.
In the 70s and 80s, the US steel industry had competition from Japan and Germany who modernized their production methods, making their steel more efficient and cost-effective. Instead of prioritizing innovation, many U.S. steel producers relied on tariffs and protectionist measures to shield themselves from foreign competition. This helped for a bit but over time, American steelmakers lost global market share as foreign competitors continued to produce better, cheaper steel. Other factors, such as aging infrastructure, and economic shifts toward a service-based economy, further contributed to the industry's decline.
A similar struggle is seen today with China’s high-tech ambitions. Tariffs on Chinese electronics and technology products limit access to key inputs, such as semiconductors and advanced robotics. While China continues its push for automation and AI-driven manufacturing, these trade barriers increase costs and disrupt supply chains, forcing China to accelerate its decoupling from Western markets. This shift could further strengthen alliances within BRICS, as China seeks alternative trade partnerships to reduce reliance on U.S.-controlled financial and technological ecosystems.
Will the current Tariff imposition backfire and isolate the US like it did a hundred years ago or 50 years ago? Is US risking it's position as a trusted economic leader? Only time would tell
The impact of tariff on innovation - or lack thereof
While the short-term impacts of tariffs often include higher consumer prices and job losses, the long-term effects can be even more damaging, as they discourage innovation by increasing costs and reducing competition.
Some historical examples globally : * Nigeria: Blocking import of rice opened up black market out of desperation to survive. * Brazil: Protectionist car policies led to expensive, outdated vehicles. * Malaysia’s Proton: Sheltered by tariffs and cronyism and failed to compete globally. * India (before 1991): Over-regulation limited the industries, until economic reforms allowed for growth. * Soviet Union during Cold War : Substandard products and minimal innovation due to the absence of foreign alternatives, yielding to economic stagnation.
On the flip side, Vietnam has significantly reduced protectionism policies by actively pursuing free trade agreements. This enabled it to become a key manufacturing hub. But Vietnam is not stopping there as it is actively pushing forward its capital-intensive growth by funding entrepreneurs.
The Future of U.S. Tariffs
History has shown that tariffs rarely deliver their intended benefits without unintended consequences. While they may provide temporary relief, they often raise prices, shrink job opportunities, and weaken industries in the long run.
Without a clear strategy for innovation and industrial modernization, the U.S. risks repeating past mistakes of isolating itself from global trade rather than strengthening its economy.
At this point, only time will tell whether these tariffs will truly help Americans or will they, once again, make the rich richer and the poor poorer.
-
@ 3b3a42d3:d192e325
2025-04-10 08:57:51Atomic Signature Swaps (ASS) over Nostr is a protocol for atomically exchanging Schnorr signatures using Nostr events for orchestration. This new primitive enables multiple interesting applications like:
- Getting paid to publish specific Nostr events
- Issuing automatic payment receipts
- Contract signing in exchange for payment
- P2P asset exchanges
- Trading and enforcement of asset option contracts
- Payment in exchange for Nostr-based credentials or access tokens
- Exchanging GMs 🌞
It only requires that (i) the involved signatures be Schnorr signatures using the secp256k1 curve and that (ii) at least one of those signatures be accessible to both parties. These requirements are naturally met by Nostr events (published to relays), Taproot transactions (published to the mempool and later to the blockchain), and Cashu payments (using mints that support NUT-07, allowing any pair of these signatures to be swapped atomically.
How the Cryptographic Magic Works 🪄
This is a Schnorr signature
(Zₓ, s)
:s = z + H(Zₓ || P || m)⋅k
If you haven't seen it before, don't worry, neither did I until three weeks ago.
The signature scalar s is the the value a signer with private key
k
(and public keyP = k⋅G
) must calculate to prove his commitment over the messagem
given a randomly generated noncez
(Zₓ
is just the x-coordinate of the public pointZ = z⋅G
).H
is a hash function (sha256 with the tag "BIP0340/challenge" when dealing with BIP340),||
just means to concatenate andG
is the generator point of the elliptic curve, used to derive public values from private ones.Now that you understand what this equation means, let's just rename
z = r + t
. We can do that,z
is just a randomly generated number that can be represented as the sum of two other numbers. It also follows thatz⋅G = r⋅G + t⋅G ⇔ Z = R + T
. Putting it all back into the definition of a Schnorr signature we get:s = (r + t) + H((R + T)ₓ || P || m)⋅k
Which is the same as:
s = sₐ + t
wheresₐ = r + H((R + T)ₓ || P || m)⋅k
sₐ
is what we call the adaptor signature scalar) and t is the secret.((R + T)ₓ, sₐ)
is an incomplete signature that just becomes valid by add the secret t to thesₐ
:s = sₐ + t
What is also important for our purposes is that by getting access to the valid signature s, one can also extract t from it by just subtracting
sₐ
:t = s - sₐ
The specific value of
t
depends on our choice of the public pointT
, sinceR
is just a public point derived from a randomly generated noncer
.So how do we choose
T
so that it requires the secret t to be the signature over a specific messagem'
by an specific public keyP'
? (without knowing the value oft
)Let's start with the definition of t as a valid Schnorr signature by P' over m':
t = r' + H(R'ₓ || P' || m')⋅k' ⇔ t⋅G = r'⋅G + H(R'ₓ || P' || m')⋅k'⋅G
That is the same as:
T = R' + H(R'ₓ || P' || m')⋅P'
Notice that in order to calculate the appropriate
T
that requirest
to be an specific signature scalar, we only need to know the public nonceR'
used to generate that signature.In summary: in order to atomically swap Schnorr signatures, one party
P'
must provide a public nonceR'
, while the other partyP
must provide an adaptor signature using that nonce:sₐ = r + H((R + T)ₓ || P || m)⋅k
whereT = R' + H(R'ₓ || P' || m')⋅P'
P'
(the nonce provider) can then add his own signature t to the adaptor signaturesₐ
in order to get a valid signature byP
, i.e.s = sₐ + t
. When he publishes this signature (as a Nostr event, Cashu transaction or Taproot transaction), it becomes accessible toP
that can now extract the signaturet
byP'
and also make use of it.Important considerations
A signature may not be useful at the end of the swap if it unlocks funds that have already been spent, or that are vulnerable to fee bidding wars.
When a swap involves a Taproot UTXO, it must always use a 2-of-2 multisig timelock to avoid those issues.
Cashu tokens do not require this measure when its signature is revealed first, because the mint won't reveal the other signature if they can't be successfully claimed, but they also require a 2-of-2 multisig timelock when its signature is only revealed last (what is unavoidable in cashu for cashu swaps).
For Nostr events, whoever receives the signature first needs to publish it to at least one relay that is accessible by the other party. This is a reasonable expectation in most cases, but may be an issue if the event kind involved is meant to be used privately.
How to Orchestrate the Swap over Nostr?
Before going into the specific event kinds, it is important to recognize what are the requirements they must meet and what are the concerns they must address. There are mainly three requirements:
- Both parties must agree on the messages they are going to sign
- One party must provide a public nonce
- The other party must provide an adaptor signature using that nonce
There is also a fundamental asymmetry in the roles of both parties, resulting in the following significant downsides for the party that generates the adaptor signature:
- NIP-07 and remote signers do not currently support the generation of adaptor signatures, so he must either insert his nsec in the client or use a fork of another signer
- There is an overhead of retrieving the completed signature containing the secret, either from the blockchain, mint endpoint or finding the appropriate relay
- There is risk he may not get his side of the deal if the other party only uses his signature privately, as I have already mentioned
- There is risk of losing funds by not extracting or using the signature before its timelock expires. The other party has no risk since his own signature won't be exposed by just not using the signature he received.
The protocol must meet all those requirements, allowing for some kind of role negotiation and while trying to reduce the necessary hops needed to complete the swap.
Swap Proposal Event (kind:455)
This event enables a proposer and his counterparty to agree on the specific messages whose signatures they intend to exchange. The
content
field is the following stringified JSON:{ "give": <signature spec (required)>, "take": <signature spec (required)>, "exp": <expiration timestamp (optional)>, "role": "<adaptor | nonce (optional)>", "description": "<Info about the proposal (optional)>", "nonce": "<Signature public nonce (optional)>", "enc_s": "<Encrypted signature scalar (optional)>" }
The field
role
indicates what the proposer will provide during the swap, either the nonce or the adaptor. When this optional field is not provided, the counterparty may decide whether he will send a nonce back in a Swap Nonce event or a Swap Adaptor event using thenonce
(optionally) provided by in the Swap Proposal in order to avoid one hop of interaction.The
enc_s
field may be used to store the encrypted scalar of the signature associated with thenonce
, since this information is necessary later when completing the adaptor signature received from the other party.A
signature spec
specifies thetype
and all necessary information for producing and verifying a given signature. In the case of signatures for Nostr events, it contain a template with all the fields, exceptpubkey
,id
andsig
:{ "type": "nostr", "template": { "kind": "<kind>" "content": "<content>" "tags": [ … ], "created_at": "<created_at>" } }
In the case of Cashu payments, a simplified
signature spec
just needs to specify the payment amount and an array of mints trusted by the proposer:{ "type": "cashu", "amount": "<amount>", "mint": ["<acceptable mint_url>", …] }
This works when the payer provides the adaptor signature, but it still needs to be extended to also work when the payer is the one receiving the adaptor signature. In the later case, the
signature spec
must also include atimelock
and the derived public keysY
of each Cashu Proof, but for now let's just ignore this situation. It should be mentioned that the mint must be trusted by both parties and also support Token state check (NUT-07) for revealing the completed adaptor signature and P2PK spending conditions (NUT-11) for the cryptographic scheme to work.The
tags
are:"p"
, the proposal counterparty's public key (required)"a"
, akind:30455
Swap Listing event or an application specific version of it (optional)
Forget about this Swap Listing event for now, I will get to it later...
Swap Nonce Event (kind:456) - Optional
This is an optional event for the Swap Proposal receiver to provide the public nonce of his signature when the proposal does not include a nonce or when he does not want to provide the adaptor signature due to the downsides previously mentioned. The
content
field is the following stringified JSON:{ "nonce": "<Signature public nonce>", "enc_s": "<Encrypted signature scalar (optional)>" }
And the
tags
must contain:"e"
, akind:455
Swap Proposal Event (required)"p"
, the counterparty's public key (required)
Swap Adaptor Event (kind:457)
The
content
field is the following stringified JSON:{ "adaptors": [ { "sa": "<Adaptor signature scalar>", "R": "<Signer's public nonce (including parity byte)>", "T": "<Adaptor point (including parity byte)>", "Y": "<Cashu proof derived public key (if applicable)>", }, …], "cashu": "<Cashu V4 token (if applicable)>" }
And the
tags
must contain:"e"
, akind:455
Swap Proposal Event (required)"p"
, the counterparty's public key (required)
Discoverability
The Swap Listing event previously mentioned as an optional tag in the Swap Proposal may be used to find an appropriate counterparty for a swap. It allows a user to announce what he wants to accomplish, what his requirements are and what is still open for negotiation.
Swap Listing Event (kind:30455)
The
content
field is the following stringified JSON:{ "description": "<Information about the listing (required)>", "give": <partial signature spec (optional)>, "take": <partial signature spec (optional)>, "examples: [<take signature spec>], // optional "exp": <expiration timestamp (optional)>, "role": "<adaptor | nonce (optional)>" }
The
description
field describes the restrictions on counterparties and signatures the user is willing to accept.A
partial signature spec
is an incompletesignature spec
used in Swap Proposal eventskind:455
where omitting fields signals that they are still open for negotiation.The
examples
field is an array ofsignature specs
the user would be willing totake
.The
tags
are:"d"
, a unique listing id (required)"s"
, the status of the listingdraft | open | closed
(required)"t"
, topics related to this listing (optional)"p"
, public keys to notify about the proposal (optional)
Application Specific Swap Listings
Since Swap Listings are still fairly generic, it is expected that specific use cases define new event kinds based on the generic listing. Those application specific swap listing would be easier to filter by clients and may impose restrictions and add new fields and/or tags. The following are some examples under development:
Sponsored Events
This listing is designed for users looking to promote content on the Nostr network, as well as for those who want to monetize their accounts by sharing curated sponsored content with their existing audiences.
It follows the same format as the generic Swap Listing event, but uses the
kind:30456
instead.The following new tags are included:
"k"
, event kind being sponsored (required)"title"
, campaign title (optional)
It is required that at least one
signature spec
(give
and/ortake
) must have"type": "nostr"
and also contain the following tag["sponsor", "<pubkey>", "<attestation>"]
with the sponsor's public key and his signature over the signature spec without the sponsor tag as his attestation. This last requirement enables clients to disclose and/or filter sponsored events.Asset Swaps
This listing is designed for users looking for counterparties to swap different assets that can be transferred using Schnorr signatures, like any unit of Cashu tokens, Bitcoin or other asset IOUs issued using Taproot.
It follows the same format as the generic Swap Listing event, but uses the
kind:30457
instead.It requires the following additional tags:
"t"
, asset pair to be swapped (e.g."btcusd"
)"t"
, asset being offered (e.g."btc"
)"t"
, accepted payment method (e.g."cashu"
,"taproot"
)
Swap Negotiation
From finding an appropriate Swap Listing to publishing a Swap Proposal, there may be some kind of negotiation between the involved parties, e.g. agreeing on the amount to be paid by one of the parties or the exact content of a Nostr event signed by the other party. There are many ways to accomplish that and clients may implement it as they see fit for their specific goals. Some suggestions are:
- Adding
kind:1111
Comments to the Swap Listing or an existing Swap Proposal - Exchanging tentative Swap Proposals back and forth until an agreement is reached
- Simple exchanges of DMs
- Out of band communication (e.g. Signal)
Work to be done
I've been refining this specification as I develop some proof-of-concept clients to experience its flaws and trade-offs in practice. I left the signature spec for Taproot signatures out of the current document as I still have to experiment with it. I will probably find some important orchestration issues related to dealing with
2-of-2 multisig timelocks
, which also affects Cashu transactions when spent last, that may require further adjustments to what was presented here.The main goal of this article is to find other people interested in this concept and willing to provide valuable feedback before a PR is opened in the NIPs repository for broader discussions.
References
- GM Swap- Nostr client for atomically exchanging GM notes. Live demo available here.
- Sig4Sats Script - A Typescript script demonstrating the swap of a Cashu payment for a signed Nostr event.
- Loudr- Nostr client under development for sponsoring the publication of Nostr events. Live demo available at loudr.me.
- Poelstra, A. (2017). Scriptless Scripts. Blockstream Research. https://github.com/BlockstreamResearch/scriptless-scripts
-
@ 502ab02a:a2860397
2025-04-18 01:41:22เวทีอุตสาหกรรมตัดต่อพันธุกรรมระดับโลก ที่กำลังจะเปลี่ยนอาหารทั้งระบบให้เป็นของบริษัทต่างๆ "Precision Fermentation" ซึ่งฟังดูเหมือนคล้ายการทำโยเกิร์ตหรือเบียร์ใช่มะ แต่ความจริงมันคือ การออกแบบชีวิตใหม่เพื่อขายเป็นอาหารครับ
เรามาเรียกชื่อตอนนี้ให้เท่ๆว่า Precision Fermentation จากถังหมัก สู่กับดักพันธุกรรม
Precision Fermentation (PF) ต่อจากนี้ไปอยากให้จำคำนี้ไว้ให้ดีๆ อ่านข่าวอาหารอะไรคอยดูว่ามีคำนี้ไหม มันคือการใช้ จุลินทรีย์ที่ถูกดัดแปลงพันธุกรรม (GMO yeast, bacteria, fungi) เพื่อผลิต “สารอาหาร” เช่น โปรตีนจากนม ไข่ขาว ไขมันสัตว์ เจลาติน วิตามิน โดยไม่ต้องมีสัตว์จริงอยู่ในระบบเลยสัก ใช้ตัวจุดขายว่า “อาหารแห่งอนาคตที่ปลอดสัตว์ เป็นมิตรกับโลก”
แต่เบื้องหลังมันคือ... ระบบปิดที่บริษัทเดียวควบคุมตั้งแต่สายพันธุ์จุลินทรีย์ เครื่องจักร ไปจนถึงสิทธิบัตรของอาหารทุกชิ้น
เป็นการหมักชีวิตให้กลายเป็นกรรมสิทธิ์ ในระบบ PF นักวิจัยจะเลือก DNA จากสัตว์ เช่น เคซีน (โปรตีนนมวัว) อัลบูมิน (โปรตีนไข่) ฮีม (กลิ่นเลือดในเนื้อวัว) แล้วเอาไปใส่ไว้ในยีสต์หรือจุลินทรีย์ เพื่อให้มัน "หมัก" ผลิตสารเหล่านี้ออกมาในถังขนาดใหญ่
ฟังดูน่าสนใจใช่ไหมครับ? แต่ DNA เหล่านั้นจะถูกจดสิทธิบัตรทันที และจุลินทรีย์เหล่านั้นก็จะถูกควบคุมโดยบริษัทไม่กี่รายเท่านั้น หมายความว่า โปรตีนจากไข่ นม หรือเนื้อ จะกลายเป็น “กรรมสิทธิ์ของบริษัท” ไม่ใช่ของธรรมชาติอีกต่อไป
บริษัทไหนบ้างที่เล่นเกมนี้ เรามาลองดูตัวอย่างกันครับ Perfect Day – ผลิตโปรตีนนมด้วยยีสต์ GMO The EVERY Company – ไข่ขาวจากเชื้อรา Clara Foods – โปรตีนจากไข่ด้วย PF Motif FoodWorks – กลิ่นเนื้อและไขมันจาก PF Impossible Foods – ฮีม (heme) จากถั่วเหลือง GMO ที่หมักด้วยยีสต์ดัดแปลง และที่สำคัญเหมือนเดิมครับเบื้องหลังคือเงินทุนจาก SoftBank, Bill Gates, Google Ventures และบริษัทอาหารระดับโลก เช่น Nestlé, Tyson Foods, Unilever
คำถามก็คือมันคืออาหารหรือเคมี เพราะสิ่งที่ได้จาก PF มักมีสถานะก้ำกึ่งระหว่างอาหารกับสารเคมี นอกจากนี้ยังมีงานวิจัยน้อยมากเรื่องผลกระทบต่อร่างกายระยะยาว ไม่ผ่านการพิสูจน์ในระบบย่อยอาหารมนุษย์อย่างชัดเจน หลายชนิดไม่บอกบนฉลากว่าได้จาก GMO fermentation หรือไม่ และบางบริษัทจงใจเรียกของตัวเองว่า “non-animal” เพื่อเลี่ยงการเปิดเผยว่าเป็น GMO
แต่สิ่งที่คาดว่าน่าจะเกิดขึ้นแน่ๆคือ 1.การครอบครองพันธุกรรมของสิ่งมีชีวิต ทุกยีสต์หรือจุลินทรีย์ในระบบ PF ถูก “จดสิทธิบัตร” ทั้งหมด ใครเลียนแบบ โดนฟ้อง ใครผลิตเองโดยไม่ได้รับอนุญาต โดนปิดกิจการ 2.การขับไล่เกษตรกรออกจากระบบอาหาร ไม่ต้องรีดนม ไม่ต้องเก็บไข่ ไม่ต้องเลี้ยงสัตว์ บริษัทไม่ต้องพึ่งเกษตรกรเลย แล้วใครจะอยู่รอดในระบบนี้? 3.การกำหนดราคาโดยผูกขาด PF ทำให้บริษัทมีอำนาจควบคุมแหล่งโปรตีน ถ้าบริษัทไม่ขาย หรือขายแพง ก็ไม่มีใครมีอำนาจต่อรอง 4.การขาดเสรีภาพในการเลือกอาหาร ถ้าของจริงถูกลดบทบาท และของเทียมถูกยัดใส่ผลิตภัณฑ์ทั่วไปแบบไม่ระบุฉลาก คนจะถูกหลอกว่า "กินอาหาร" ทั้งที่จริงๆ กำลังกินผลิตภัณฑ์ชีววิศวกรรมที่ไม่มีใครรู้แน่ชัดว่าปลอดภัยจริงไหม
หากอาหารของโลกต้องผ่านถังหมัก ผ่านโรงงาน ผ่านระบบสิทธิบัตร และต้องขอใบอนุญาตจากบริษัทยักษ์ทุกครั้งที่ผลิต โลกเราจะเหลือ “อาหารจากธรรมชาติ” แค่ในนิทานพื้นบ้าน อาหารที่ปู่ย่าตายายเคยปลูก เคยเลี้ยง เคยกิน อาจกลายเป็นของผิดกฎหมายในโลกอนาคต เพราะ ของที่ไม่ผ่านระบบ PF จะถูกตีตราว่า “ไม่สะอาด” หรือ “ไม่ยั่งยืน”
สิ่งที่ต้องรอดูต่อไปคือ เกมส์การโจมตีอาหาร real food จะมาในรูปแบบใดบ้าง ความสะอาด โรค หรือ การกีดกัน
เอาเป็นว่าถ้าคุณคิดว่ามันอีกยาวไกล ลองค้นคว้าดูไหมครับว่า นมโอ้ต ผลิตมาอย่างไร 5555
#pirateketo #กูต้องรู้มั๊ย #ม้วนหางสิลูก
-
@ 7b3f7803:8912e968
2025-04-18 00:16:02As we enter Holy Week, we are confronted with a world steeped in sin, strife, conflict, and mortality. There exists a peculiar fascination among some with societal decline, as if they derive satisfaction from witnessing civilization’s unraveling. This attraction to darkness may reflect their inner turmoil, a desire to see others share in their suffering. Alternatively, it could stem from a profound hopelessness, a belief that life lacks purpose, leading them to wish for its end. The allure of dystopian futures is, indeed, a curious phenomenon.
Alexander Hamilton once yearned for war as a means to elevate his status, a reflection of youthful ambition for decisive action. Such a desire—to distinguish oneself and ascend the social hierarchy—underlies some of the grim visions of the future propagated by certain ideological circles. Their aim is not war itself but a reconfiguration of power, placing authority in the hands of those who affirm their values. For years, such individuals have held sway, yet their influence appears to be waning.
In the absence of hope, many embrace visions of decline. This despair is characteristic of a faltering empire, signaling the end of an era. The younger generation, burdened by weariness, falters under the weight of their circumstances. They lack hope for a brighter future and see no clear path out of life’s monotony. In a word, they are trapped, uncertain of how to proceed.
We witnessed a similar sentiment during the Arab Spring, where upheaval was celebrated as a longed-for revolution, a societal reset. The assassination of a prominent corporate executive, such as the CEO of United Health, evokes a comparable yearning for disruption. There is a desire for a cultural transformation, though its precise nature remains elusive.
Yet, the youth find themselves dominated by the very elites whose rhetoric they echo. Unlike the 1960s, when generational values clashed overtly, today’s power structures co-opt the language of the young, redirecting their frustration toward populist movements. This inversion is a cunning strategy, mitigating the potential for significant rebellion.
The reality remains that the older generation holds the wealth, power, and authority, while the young are consistently marginalized. They are the ones left with little hope, ensnared by the system. However, a quiet rebellion is emerging—one rooted in hope and faith. Many are beginning to see through the falsehoods propagated by those in power. The promises of governmental provision, once alluring, now appear untenable in light of fiscal realities. The youth seek a new source of hope, a renewed perspective. Thankfully, they are beginning to find it, turning toward faith as a foundation for a more optimistic future.
-
@ a296b972:e5a7a2e8
2025-04-17 23:08:50Die Figuren in der Koalition der Willigen entlarven ihre charakterliche Ungeeignetheit für politische Ämter mit Verantwortung für ganze Nationen. Staatliche Entscheidungen dürfen nicht emotionsgesteuert sein. Aber genau das ist derzeit der Fall. Überall wird mit der Moralkeule um sich gehauen. Erwachsene benehmen sich wie im Kindergarten und zeigen ihre fehlende Reife. Von menschlicher Größe ganz zu schweigen.
Bisher war es schön warm unter den Fittichen der USA. Deutschland hat aufgrund seiner Geschichte besonders gut den Nick-August gespielt und sich selbst eine Souveränität vorgelogen, die es so nie gegeben hat. Jetzt sieht es so aus, als wollten die USA Europa in die Freiheit, in die Volljährigkeit entlassen. Es könnte auch sein, dass die USA aus der NATO austreten und sich vor allem um sich selbst kümmern. Allein das würde die Welt schon wesentlich friedlicher machen, denkt man beispielsweise an den Einmarsch in den Irak. Es gehen Gerüchte um, dass Truppen aus Rumänien und Deutschland abgezogen werden sollen.
Vielleicht geht es bei den Friedensverhandlungen zwischen Trump und Putin nicht nur um die Ukraine, sondern, wenn man schon mal dabei ist, auch um die Kräfteverteilung in Europa insgesamt. Waffeneinsätze in der Ukraine wurden maßgeblich von Wiesbaden aus gesteuert. 2026 sollen dort US-Mittelstrecken-Raketen stationiert werden. Der an Führungsstärke kleinste Kanzler der Bundesrepublik, Scholz, hat das brav abgenickt. Der nur noch durch ein Wunder zu verhindernde neue Kanzler, das Glas Gewürzgurken aus dem Sauerland, provoziert Russland mit seiner Ankündigung zu den Taurus-Raketen dafür um so mehr. Da ist man schon fast gewillt, sich den Scholz zurückzuwünschen, als das kleinere Übel.
Statt mit Besonnenheit und Vernunft die veränderte Sicherheitslage mit den USA als eher abtrünnige Schutzmacht neu zu bewerten, hierin auch eine Chance zu sehen, eine starke Botschaft und den Willen auf ein friedliches neues Miteinander in den Fokus zu stellen, reagieren die meisten europäischen politischen „Spitzenkräfte“ mit blindem Aktionismus, der weltenbrandgefährlich ist. Und Deutschland, dass es sich aufgrund seiner Geschichte am wenigsten erlauben könnte, macht mit von der Leyen in Brüssel und Merz, Pistorius und anderen Kriegs-Warm-Uppern am weitesten das Maul auf, obwohl es sich am bedecktesten halten sollte.
Angesichts der Tatsache, dass Europa gegenüber einer Atommacht wie Russland vollkommen wehrlos ist, wäre es wirklich viel gescheiter, sich der neuen Situation anzupassen und ständig Signale der Friedensbereitschaft zu senden. Unterstütz von den Briten und Franzosen schmiegt Brüssel eine Koalition der Friedensuntüchtigen, wie sie Uwe Froschauer aktuell in seinem Buch „Die Friedensuntüchtigen“ beschreibt. In der Rezension von mir gibt es auch einen Link zu einem Review des Inhalts:
https://wassersaege.com/blogbeitraege/buchrezension-die-friedensuntuechtigen-von-uwe-froschauer/
Stattdessen passiert das Gegenteil.
Es ist nicht nur legitim, sondern sogar Aufgabe der einzelnen Staaten, eine gewisse Verteidigungsfähigkeit aufbauen zu wollen. Derzeit geschieht das jedoch unter falschen Vorzeichen. Die NATO, als sogenanntes Verteidigungsbündnis zur Vorlage zu nehmen, wäre keine gute Idee, weil sie sich mangels Gelegenheit (der Verteidigung) eher als das Gegenteil herausgestellt hat, wie man seinerzeit in Jugoslawien erleben musste.
Russland als Feind hochzustilisieren, um ein Aufrüsten zu beschleunigen, ist jedoch der denkbar falscheste Weg. Wenn ein Yorkshire-Terrier einen Pit-Bull ankläfft, könnte das fatale Folgen haben. Wenn die europäischen „Geistesgrößen“ bei Verstand wären und in der Lage, die Realität richtig einzuschätzen, würden sie das erkennen.
Woher kommt die Überheblichkeit, woher die Unfähigkeit zur Einschätzung der Lage, woher die Realitätsverweigerung? Ist das gewollt, steckt ein Plan dahinter oder sind „die“ einfach „nur“ strunzendoof? Letzteres wäre die gefährlichste Variante.
Es stellt sich immer mehr heraus, dass Corona offensichtlich ein Test war, wie weit die Menschen in ihrer Obrigkeitshörigkeit zu treiben sind. Wie dumm und gefolgsam sind die Schafe wirklich?
Bei einer Lieferung von Taurus-Raketen, die von Deutschen gesteuert werden müssen, könnte es vielleicht gelingen, die Krim-Brücke zu zerstören. Den Kriegsverlauf würde das jedoch nicht beeinflussen. Russland gewinnt so oder so. Im Gegenteil, die Folgen für Deutschland würden den dort möglicherweise angerichteten Schaden bei weitem übertreffen.
Während ich schreibe kommt gerade auf RT DE (aufgrund der „Pressefreiheit“ verzichtet man derzeit offiziell auf diesen Sender) folgende Meldung rein: Russisches Außenministerium: Taurus-Einsatz bedeutet deutsche Kriegsbeteiligung.
https://rtde.site/international/242696-russisches-aussenministerium-taurus-einsatz-bedeutet/
Es ist nicht nachvollziehbar, dass Merz offensichtlich nicht in der Lage ist anzuerkennen, dass Russland über Oreschnik-Raketen verfügt. Er scheint nicht in der Lage zu sein, die möglichen Folgen einschätzen zu können. Genau so wenig wie Pistorius. Die beiden kommen einem vor, wie zwei, die sich im stockfinsteren Wald verirrt haben und sich gegenseitig Mut zusprechen.
Nach wie vor gibt es keine fundierten Beweise dafür, dass Russland die Absicht hat, Deutschland auf unschöne Weise bereisen zu wollen. Das kann nicht oft genug gesagt werden.
Wie schon vor dem Ukraine-Konflikt, durch ein ständiges mit der NATO-Osterweiterung Russland-immer-näher-auf-die-Pelle-rücken, streut jetzt Europa, Deutschland, der Kriegskanzler Salz in die Wunde und Russland sagt ständig: Stoy, so geht das nicht!
Wenn wir eine Bedrohungslage haben, dann die, dass das aktuelle Regime den Deutschen in seinem Wehrwahn mit Wehrpflicht und einer bevorstehenden russischen Invasion droht, obwohl es, man kann es wirklich nicht oft genug sagen, keine reale Bedrohung durch Russland gibt.
In einem Interview im deutschen Propaganda-Funk faselt Pistorius davon, dass in einem „Schnuppercamp der Bundesmarine“ in Kiel für Teenager ab 16 Jahre, er gar nichts Verwerfliches daran finden kann. „Die schießen ja nicht…“, „Wir bringen ihnen ja nicht das Töten bei mit 17, sondern wir bereiten sie vor auf eine Ausbildung zum Soldaten. Und Soldat ist ein sehr ehrenwerter Beruf, der nämlich dazu dient, unsere Freiheit und Sicherheit im Ernstfall zu verteidigen.“ Dass diese Verteidigung tödlich enden kann, wird hier verschwiegen. Das könnte schließlich Teile der Soldaten verunsichern.
Ein Politikwissenschaftler regt sich über den Titel eines Liedes auf:
-Da stört sich doch tatsächlich jemand an der Liedzeile „Meine Söhne geb‘ ich nicht“-
https://www.nachdenkseiten.de/?p=131733
Man hat das Gefühl, dass alle Politiker, statt wie Obelix in den Zaubertrank, in ein Fass Teflon-Lack gefallen sind. Anders ist es nicht zu erklären, warum die Realität so perfekt an ihnen abperlt.
Wir werden immer mehr in die Enge getrieben. Und man weiß nicht, was im Zuge der digitalisierten Überwachung, die auch in Russland kräftig Fahrt aufnimmt, zwischen den USA und Russland sonst noch ausgehandelt wird. Auch, wenn Vance derzeit von UK-Premier Keir Starmer fordert, er müsse die Gesetze gegen „Hassrede“ aufheben, um ein Handelsabkommen mit den USA zu erzielen, und das eine Vorankündigung auf die Verhandlungen mit der EU sein könnte, (Bedingung: Abschaffung des Digital Services Act). In den USA gibt es Tech-Giganten, wie Musk und Thiel und Konsorten, die mit Umlegen eines Schalters, den derzeit augenscheinlichen Kampf für Meinungsfreiheit und Freiheit der Bürger, im Handumdrehen ins Gegenteil verqueren können. Dann sind wir in Null Komma Nichts in der Versklavung mit einem Totalitarismus und einer Technokratie gelandet, in der sich Georg Orwells „1984“ wie eine Gute-Nacht-Geschichte für kleine Kinder anhört.
Dieser Artikel wurde mit dem Pareto-Client geschrieben
-
@ 5d4b6c8d:8a1c1ee3
2025-04-17 21:35:47Congrats to @gnilma and @Carresan! Thanks to Herro and Butler both having 38 points (shoutout Heat Culture) they both secured 9 points and are tied for the lead.
Now we move on to the final Play-In Round
Matchups (seed)
- Heat (10) @ Hawks (8)
- Mavericks (10) @ Grizzlies (8)
You need to select one team from this round to win their game. You also need to predict who will be the highest scoring player in this round.
Scoring this round: 1 Point for your team winning + Your team's seed if they win + 1 Point for picking the correct top scorer
This round has a maximum of 12 points.
Prize
10k sats (or sum of zaps on contest posts, whichever is larger)
originally posted at https://stacker.news/items/946686
-
@ 66675158:1b644430
2025-03-23 11:39:41I don't believe in "vibe coding" – it's just the newest Silicon Valley fad trying to give meaning to their latest favorite technology, LLMs. We've seen this pattern before with blockchain, when suddenly Non Fungible Tokens appeared, followed by Web3 startups promising to revolutionize everything from social media to supply chains. VCs couldn't throw money fast enough at anything with "decentralized" (in name only) in the pitch deck. Andreessen Horowitz launched billion-dollar crypto funds, while Y Combinator batches filled with blockchain startups promising to be "Uber for X, but on the blockchain."
The metaverse mania followed, with Meta betting its future on digital worlds where we'd supposedly hang out as legless avatars. Decentralized (in name only) autonomous organizations emerged as the next big thing – supposedly democratic internet communities that ended up being the next scam for quick money.
Then came the inevitable collapse. The FTX implosion in late 2022 revealed fraud, Luna/Terra's death spiral wiped out billions (including my ten thousand dollars), while Celsius and BlockFi froze customer assets before bankruptcy.
By 2023, crypto winter had fully set in. The SEC started aggressive enforcement actions, while users realized that blockchain technology had delivered almost no practical value despite a decade of promises.
Blockchain's promises tapped into fundamental human desires – decentralization resonated with a generation disillusioned by traditional institutions. Evangelists presented a utopian vision of freedom from centralized control. Perhaps most significantly, crypto offered a sense of meaning in an increasingly abstract world, making the clear signs of scams harder to notice.
The technology itself had failed to solve any real-world problems at scale. By 2024, the once-mighty crypto ecosystem had become a cautionary tale. Venture firms quietly scrubbed blockchain references from their websites while founders pivoted to AI and large language models.
Most reading this are likely fellow bitcoiners and nostr users who understand that Bitcoin is blockchain's only valid use case. But I shared that painful history because I believe the AI-hype cycle will follow the same trajectory.
Just like with blockchain, we're now seeing VCs who once couldn't stop talking about "Web3" falling over themselves to fund anything with "AI" in the pitch deck. The buzzwords have simply changed from "decentralized" to "intelligent."
"Vibe coding" is the perfect example – a trendy name for what is essentially just fuzzy instructions to LLMs. Developers who've spent years honing programming skills are now supposed to believe that "vibing" with an AI is somehow a legitimate methodology.
This might be controversial to some, but obvious to others:
Formal, context-free grammar will always remain essential for building precise systems, regardless of how advanced natural language technology becomes
The mathematical precision of programming languages provides a foundation that human language's ambiguity can never replace. Programming requires precision – languages, compilers, and processors operate on explicit instructions, not vibes. What "vibe coding" advocates miss is that beneath every AI-generated snippet lies the same deterministic rules that have always governed computation.
LLMs don't understand code in any meaningful sense—they've just ingested enormous datasets of human-written code and can predict patterns. When they "work," it's because they've seen similar patterns before, not because they comprehend the underlying logic.
This creates a dangerous dependency. Junior developers "vibing" with LLMs might get working code without understanding the fundamental principles. When something breaks in production, they'll lack the knowledge to fix it.
Even experienced developers can find themselves in treacherous territory when relying too heavily on LLM-generated code. What starts as a productivity boost can transform into a dependency crutch.
The real danger isn't just technical limitations, but the false confidence it instills. Developers begin to believe they understand systems they've merely instructed an AI to generate – fundamentally different from understanding code you've written yourself.
We're already seeing the warning signs: projects cobbled together with LLM-generated code that work initially but become maintenance nightmares when requirements change or edge cases emerge.
The venture capital money is flowing exactly as it did with blockchain. Anthropic raised billions, OpenAI is valued astronomically despite minimal revenue, and countless others are competing to build ever-larger models with vague promises. Every startup now claims to be "AI-powered" regardless of whether it makes sense.
Don't get me wrong—there's genuine innovation happening in AI research. But "vibe coding" isn't it. It's a marketing term designed to make fuzzy prompting sound revolutionary.
Cursor perfectly embodies this AI hype cycle. It's an AI-enhanced code editor built on VS Code that promises to revolutionize programming by letting you "chat with your codebase." Just like blockchain startups promised to "revolutionize" industries, Cursor promises to transform development by adding LLM capabilities.
Yes, Cursor can be genuinely helpful. It can explain unfamiliar code, suggest completions, and help debug simple issues. After trying it for just an hour, I found the autocomplete to be MAGICAL for simple refactoring and basic functionality.
But the marketing goes far beyond reality. The suggestion that you can simply describe what you want and get production-ready code is dangerously misleading. What you get are approximations with:
- Security vulnerabilities the model doesn't understand
- Edge cases it hasn't considered
- Performance implications it can't reason about
- Dependency conflicts it has no way to foresee
The most concerning aspect is how such tools are marketed to beginners as shortcuts around learning fundamentals. "Why spend years learning to code when you can just tell AI what you want?" This is reminiscent of how crypto was sold as a get-rich-quick scheme requiring no actual understanding.
When you "vibe code" with an AI, you're not eliminating complexity—you're outsourcing understanding to a black box. This creates developers who can prompt but not program, who can generate but not comprehend.
The real utility of LLMs in development is in augmenting existing workflows:
- Explaining unfamiliar codebases
- Generating boilerplate for well-understood patterns
- Suggesting implementations that a developer evaluates critically
- Assisting with documentation and testing
These uses involve the model as a subordinate assistant to a knowledgeable developer, not as a replacement for expertise. This is where the technology adds value—as a sophisticated tool in skilled hands.
Cursor is just a better hammer, not a replacement for understanding what you're building. The actual value emerges when used by developers who understand what happens beneath the abstractions. They can recognize when AI suggestions make sense and when they don't because they have the fundamental knowledge to evaluate output critically.
This is precisely where the "vibe coding" narrative falls apart.
-
@ df478568:2a951e67
2025-04-17 21:10:33I created a GitHub repository at https://github.com/Marc26z/ZapShirts. Here is a copy of the README.md
ZapShirts
This is an idea I have to make t-shirts that are also bitcoin point-of-sale terminals.
Create T-Shirt Point-Of-Sale
The idea is to create a bitcoin point of sale on a T-shirt. You can use it to sell stickers at a conference or have a friend pay you back for dinner. It is only limited by your imagination.
Why Would Anybody Need A ZapShirt?
I no longer "orange pill" local businesses. I do not care if they wish to accept bitcoin, but I want to be the change in the world I want to see. I will accept bitcoin on a T-Shirt to show others how easy it is to accept bitcoin as a p2p electronic cash system. Anyone can accept bitcoin as payment if they want to. You could print a sign on a piece of paper if you wanted to. The problem was, nobody I asked wanted a sign, even bitcoiners. So I asked myself...Self, what if you did the opposite? What if the customer accepted bitcoin, but the business owner did not.
I also thought it would be pretty cool T-Shirt to wear at meet-ups.
How To Make Your Own Zap Shirt
- Create a QR code that sends you to your coinos page, getalby page, strike or whatever you feel comfortable using. This can easily be done at https://libreqr.com/
- Use a program like gimp to replace the default QR Code with your own QR code on the file.
- Create the shirt.
To support this please zap me or buy one from my store.
Can I Buy A Zap Shirt?
Yes. If you would like a shirt, hit me up on nostr
https://primal.net/marc
end README.md
I like the idea of open sourcing my ideas and trying to sell them for sats on the Internet. I am currently working on a site to sell things like this and my gift cards. I feel a little uneasy because I haven't been writing much, but I've been building. The idea is to create bitcoin educational products and services. Onward.
-
@ eac63075:b4988b48
2025-01-04 19:41:34Since its creation in 2009, Bitcoin has symbolized innovation and resilience. However, from time to time, alarmist narratives arise about emerging technologies that could "break" its security. Among these, quantum computing stands out as one of the most recurrent. But does quantum computing truly threaten Bitcoin? And more importantly, what is the community doing to ensure the protocol remains invulnerable?
The answer, contrary to sensationalist headlines, is reassuring: Bitcoin is secure, and the community is already preparing for a future where quantum computing becomes a practical reality. Let’s dive into this topic to understand why the concerns are exaggerated and how the development of BIP-360 demonstrates that Bitcoin is one step ahead.
What Is Quantum Computing, and Why Is Bitcoin Not Threatened?
Quantum computing leverages principles of quantum mechanics to perform calculations that, in theory, could exponentially surpass classical computers—and it has nothing to do with what so-called “quantum coaches” teach to scam the uninformed. One of the concerns is that this technology could compromise two key aspects of Bitcoin’s security:
- Wallets: These use elliptic curve algorithms (ECDSA) to protect private keys. A sufficiently powerful quantum computer could deduce a private key from its public key.
- Mining: This is based on the SHA-256 algorithm, which secures the consensus process. A quantum attack could, in theory, compromise the proof-of-work mechanism.
Understanding Quantum Computing’s Attack Priorities
While quantum computing is often presented as a threat to Bitcoin, not all parts of the network are equally vulnerable. Theoretical attacks would be prioritized based on two main factors: ease of execution and potential reward. This creates two categories of attacks:
1. Attacks on Wallets
Bitcoin wallets, secured by elliptic curve algorithms, would be the initial targets due to the relative vulnerability of their public keys, especially those already exposed on the blockchain. Two attack scenarios stand out:
-
Short-term attacks: These occur during the interval between sending a transaction and its inclusion in a block (approximately 10 minutes). A quantum computer could intercept the exposed public key and derive the corresponding private key to redirect funds by creating a transaction with higher fees.
-
Long-term attacks: These focus on old wallets whose public keys are permanently exposed. Wallets associated with Satoshi Nakamoto, for example, are especially vulnerable because they were created before the practice of using hashes to mask public keys.
We can infer a priority order for how such attacks might occur based on urgency and importance.
Bitcoin Quantum Attack: Prioritization Matrix (Urgency vs. Importance)
2. Attacks on Mining
Targeting the SHA-256 algorithm, which secures the mining process, would be the next objective. However, this is far more complex and requires a level of quantum computational power that is currently non-existent and far from realization. A successful attack would allow for the recalculation of all possible hashes to dominate the consensus process and potentially "mine" it instantly.
Satoshi Nakamoto in 2010 on Quantum Computing and Bitcoin Attacks
Recently, Narcelio asked me about a statement I made on Tubacast:
https://x.com/eddieoz/status/1868371296683511969
If an attack became a reality before Bitcoin was prepared, it would be necessary to define the last block prior to the attack and proceed from there using a new hashing algorithm. The solution would resemble the response to the infamous 2013 bug. It’s a fact that this would cause market panic, and Bitcoin's price would drop significantly, creating a potential opportunity for the well-informed.
Preferably, if developers could anticipate the threat and had time to work on a solution and build consensus before an attack, they would simply decide on a future block for the fork, which would then adopt the new algorithm. It might even rehash previous blocks (reaching consensus on them) to avoid potential reorganization through the re-mining of blocks using the old hash. (I often use the term "shielding" old transactions).
How Can Users Protect Themselves?
While quantum computing is still far from being a practical threat, some simple measures can already protect users against hypothetical scenarios:
- Avoid using exposed public keys: Ensure funds sent to old wallets are transferred to new ones that use public key hashes. This reduces the risk of long-term attacks.
- Use modern wallets: Opt for wallets compatible with SegWit or Taproot, which implement better security practices.
- Monitor security updates: Stay informed about updates from the Bitcoin community, such as the implementation of BIP-360, which will introduce quantum-resistant addresses.
- Do not reuse addresses: Every transaction should be associated with a new address to minimize the risk of repeated exposure of the same public key.
- Adopt secure backup practices: Create offline backups of private keys and seeds in secure locations, protected from unauthorized access.
BIP-360 and Bitcoin’s Preparation for the Future
Even though quantum computing is still beyond practical reach, the Bitcoin community is not standing still. A concrete example is BIP-360, a proposal that establishes the technical framework to make wallets resistant to quantum attacks.
BIP-360 addresses three main pillars:
- Introduction of quantum-resistant addresses: A new address format starting with "BC1R" will be used. These addresses will be compatible with post-quantum algorithms, ensuring that stored funds are protected from future attacks.
- Compatibility with the current ecosystem: The proposal allows users to transfer funds from old addresses to new ones without requiring drastic changes to the network infrastructure.
- Flexibility for future updates: BIP-360 does not limit the choice of specific algorithms. Instead, it serves as a foundation for implementing new post-quantum algorithms as technology evolves.
This proposal demonstrates how Bitcoin can adapt to emerging threats without compromising its decentralized structure.
Post-Quantum Algorithms: The Future of Bitcoin Cryptography
The community is exploring various algorithms to protect Bitcoin from quantum attacks. Among the most discussed are:
- Falcon: A solution combining smaller public keys with compact digital signatures. Although it has been tested in limited scenarios, it still faces scalability and performance challenges.
- Sphincs: Hash-based, this algorithm is renowned for its resilience, but its signatures can be extremely large, making it less efficient for networks like Bitcoin’s blockchain.
- Lamport: Created in 1977, it’s considered one of the earliest post-quantum security solutions. Despite its reliability, its gigantic public keys (16,000 bytes) make it impractical and costly for Bitcoin.
Two technologies show great promise and are well-regarded by the community:
- Lattice-Based Cryptography: Considered one of the most promising, it uses complex mathematical structures to create systems nearly immune to quantum computing. Its implementation is still in its early stages, but the community is optimistic.
- Supersingular Elliptic Curve Isogeny: These are very recent digital signature algorithms and require extensive study and testing before being ready for practical market use.
The final choice of algorithm will depend on factors such as efficiency, cost, and integration capability with the current system. Additionally, it is preferable that these algorithms are standardized before implementation, a process that may take up to 10 years.
Why Quantum Computing Is Far from Being a Threat
The alarmist narrative about quantum computing overlooks the technical and practical challenges that still need to be overcome. Among them:
- Insufficient number of qubits: Current quantum computers have only a few hundred qubits, whereas successful attacks would require millions.
- High error rate: Quantum stability remains a barrier to reliable large-scale operations.
- High costs: Building and operating large-scale quantum computers requires massive investments, limiting their use to scientific or specific applications.
Moreover, even if quantum computers make significant advancements, Bitcoin is already adapting to ensure its infrastructure is prepared to respond.
Conclusion: Bitcoin’s Secure Future
Despite advancements in quantum computing, the reality is that Bitcoin is far from being threatened. Its security is ensured not only by its robust architecture but also by the community’s constant efforts to anticipate and mitigate challenges.
The implementation of BIP-360 and the pursuit of post-quantum algorithms demonstrate that Bitcoin is not only resilient but also proactive. By adopting practical measures, such as using modern wallets and migrating to quantum-resistant addresses, users can further protect themselves against potential threats.
Bitcoin’s future is not at risk—it is being carefully shaped to withstand any emerging technology, including quantum computing.
-
@ eac63075:b4988b48
2024-11-09 17:57:27Based on a recent paper that included collaboration from renowned experts such as Lynn Alden, Steve Lee, and Ren Crypto Fish, we discuss in depth how Bitcoin's consensus is built, the main risks, and the complex dynamics of protocol upgrades.
Podcast https://www.fountain.fm/episode/wbjD6ntQuvX5u2G5BccC
Presentation https://gamma.app/docs/Analyzing-Bitcoin-Consensus-Risks-in-Protocol-Upgrades-p66axxjwaa37ksn
1. Introduction to Consensus in Bitcoin
Consensus in Bitcoin is the foundation that keeps the network secure and functional, allowing users worldwide to perform transactions in a decentralized manner without the need for intermediaries. Since its launch in 2009, Bitcoin is often described as an "immutable" system designed to resist changes, and it is precisely this resistance that ensures its security and stability.
The central idea behind consensus in Bitcoin is to create a set of acceptance rules for blocks and transactions, ensuring that all network participants agree on the transaction history. This prevents "double-spending," where the same bitcoin could be used in two simultaneous transactions, something that would compromise trust in the network.
Evolution of Consensus in Bitcoin
Over the years, consensus in Bitcoin has undergone several adaptations, and the way participants agree on changes remains a delicate process. Unlike traditional systems, where changes can be imposed from the top down, Bitcoin operates in a decentralized model where any significant change needs the support of various groups of stakeholders, including miners, developers, users, and large node operators.
Moreover, the update process is extremely cautious, as hasty changes can compromise the network's security. As a result, the philosophy of "don't fix what isn't broken" prevails, with improvements happening incrementally and only after broad consensus among those involved. This model can make progress seem slow but ensures that Bitcoin remains faithful to the principles of security and decentralization.
2. Technical Components of Consensus
Bitcoin's consensus is supported by a set of technical rules that determine what is considered a valid transaction and a valid block on the network. These technical aspects ensure that all nodes—the computers that participate in the Bitcoin network—agree on the current state of the blockchain. Below are the main technical components that form the basis of the consensus.
Validation of Blocks and Transactions
The validation of blocks and transactions is the central point of consensus in Bitcoin. A block is only considered valid if it meets certain criteria, such as maximum size, transaction structure, and the solving of the "Proof of Work" problem. The proof of work, required for a block to be included in the blockchain, is a computational process that ensures the block contains significant computational effort—protecting the network against manipulation attempts.
Transactions, in turn, need to follow specific input and output rules. Each transaction includes cryptographic signatures that prove the ownership of the bitcoins sent, as well as validation scripts that verify if the transaction conditions are met. This validation system is essential for network nodes to autonomously confirm that each transaction follows the rules.
Chain Selection
Another fundamental technical issue for Bitcoin's consensus is chain selection, which becomes especially important in cases where multiple versions of the blockchain coexist, such as after a network split (fork). To decide which chain is the "true" one and should be followed, the network adopts the criterion of the highest accumulated proof of work. In other words, the chain with the highest number of valid blocks, built with the greatest computational effort, is chosen by the network as the official one.
This criterion avoids permanent splits because it encourages all nodes to follow the same main chain, reinforcing consensus.
Soft Forks vs. Hard Forks
In the consensus process, protocol changes can happen in two ways: through soft forks or hard forks. These variations affect not only the protocol update but also the implications for network users:
-
Soft Forks: These are changes that are backward compatible. Only nodes that adopt the new update will follow the new rules, but old nodes will still recognize the blocks produced with these rules as valid. This compatibility makes soft forks a safer option for updates, as it minimizes the risk of network division.
-
Hard Forks: These are updates that are not backward compatible, requiring all nodes to update to the new version or risk being separated from the main chain. Hard forks can result in the creation of a new coin, as occurred with the split between Bitcoin and Bitcoin Cash in 2017. While hard forks allow for deeper changes, they also bring significant risks of network fragmentation.
These technical components form the base of Bitcoin's security and resilience, allowing the system to remain functional and immutable without losing the necessary flexibility to evolve over time.
3. Stakeholders in Bitcoin's Consensus
Consensus in Bitcoin is not decided centrally. On the contrary, it depends on the interaction between different groups of stakeholders, each with their motivations, interests, and levels of influence. These groups play fundamental roles in how changes are implemented or rejected on the network. Below, we explore the six main stakeholders in Bitcoin's consensus.
1. Economic Nodes
Economic nodes, usually operated by exchanges, custody providers, and large companies that accept Bitcoin, exert significant influence over consensus. Because they handle large volumes of transactions and act as a connection point between the Bitcoin ecosystem and the traditional financial system, these nodes have the power to validate or reject blocks and to define which version of the software to follow in case of a fork.
Their influence is proportional to the volume of transactions they handle, and they can directly affect which chain will be seen as the main one. Their incentive is to maintain the network's stability and security to preserve its functionality and meet regulatory requirements.
2. Investors
Investors, including large institutional funds and individual Bitcoin holders, influence consensus indirectly through their impact on the asset's price. Their buying and selling actions can affect Bitcoin's value, which in turn influences the motivation of miners and other stakeholders to continue investing in the network's security and development.
Some institutional investors have agreements with custodians that may limit their ability to act in network split situations. Thus, the impact of each investor on consensus can vary based on their ownership structure and how quickly they can react to a network change.
3. Media Influencers
Media influencers, including journalists, analysts, and popular personalities on social media, have a powerful role in shaping public opinion about Bitcoin and possible updates. These influencers can help educate the public, promote debates, and bring transparency to the consensus process.
On the other hand, the impact of influencers can be double-edged: while they can clarify complex topics, they can also distort perceptions by amplifying or minimizing change proposals. This makes them a force both of support and resistance to consensus.
4. Miners
Miners are responsible for validating transactions and including blocks in the blockchain. Through computational power (hashrate), they also exert significant influence over consensus decisions. In update processes, miners often signal their support for a proposal, indicating that the new version is safe to use. However, this signaling is not always definitive, and miners can change their position if they deem it necessary.
Their incentive is to maximize returns from block rewards and transaction fees, as well as to maintain the value of investments in their specialized equipment, which are only profitable if the network remains stable.
5. Protocol Developers
Protocol developers, often called "Core Developers," are responsible for writing and maintaining Bitcoin's code. Although they do not have direct power over consensus, they possess an informal veto power since they decide which changes are included in the main client (Bitcoin Core). This group also serves as an important source of technical knowledge, helping guide decisions and inform other stakeholders.
Their incentive lies in the continuous improvement of the network, ensuring security and decentralization. Many developers are funded by grants and sponsorships, but their motivations generally include a strong ideological commitment to Bitcoin's principles.
6. Users and Application Developers
This group includes people who use Bitcoin in their daily transactions and developers who build solutions based on the network, such as wallets, exchanges, and payment platforms. Although their power in consensus is less than that of miners or economic nodes, they play an important role because they are responsible for popularizing Bitcoin's use and expanding the ecosystem.
If application developers decide not to adopt an update, this can affect compatibility and widespread acceptance. Thus, they indirectly influence consensus by deciding which version of the protocol to follow in their applications.
These stakeholders are vital to the consensus process, and each group exerts influence according to their involvement, incentives, and ability to act in situations of change. Understanding the role of each makes it clearer how consensus is formed and why it is so difficult to make significant changes to Bitcoin.
4. Mechanisms for Activating Updates in Bitcoin
For Bitcoin to evolve without compromising security and consensus, different mechanisms for activating updates have been developed over the years. These mechanisms help coordinate changes among network nodes to minimize the risk of fragmentation and ensure that updates are implemented in an orderly manner. Here, we explore some of the main methods used in Bitcoin, their advantages and disadvantages, as well as historical examples of significant updates.
Flag Day
The Flag Day mechanism is one of the simplest forms of activating changes. In it, a specific date or block is determined as the activation moment, and all nodes must be updated by that point. This method does not involve prior signaling; participants simply need to update to the new software version by the established day or block.
-
Advantages: Simplicity and predictability are the main benefits of Flag Day, as everyone knows the exact activation date.
-
Disadvantages: Inflexibility can be a problem because there is no way to adjust the schedule if a significant part of the network has not updated. This can result in network splits if a significant number of nodes are not ready for the update.
An example of Flag Day was the Pay to Script Hash (P2SH) update in 2012, which required all nodes to adopt the change to avoid compatibility issues.
BIP34 and BIP9
BIP34 introduced a more dynamic process, in which miners increase the version number in block headers to signal the update. When a predetermined percentage of the last blocks is mined with this new version, the update is automatically activated. This model later evolved with BIP9, which allowed multiple updates to be signaled simultaneously through "version bits," each corresponding to a specific change.
-
Advantages: Allows the network to activate updates gradually, giving more time for participants to adapt.
-
Disadvantages: These methods rely heavily on miner support, which means that if a sufficient number of miners do not signal the update, it can be delayed or not implemented.
BIP9 was used in the activation of SegWit (BIP141) but faced challenges because some miners did not signal their intent to activate, leading to the development of new mechanisms.
User Activated Soft Forks (UASF) and User Resisted Soft Forks (URSF)
To increase the decision-making power of ordinary users, the concept of User Activated Soft Fork (UASF) was introduced, allowing node operators, not just miners, to determine consensus for a change. In this model, nodes set a date to start rejecting blocks that are not in compliance with the new update, forcing miners to adapt or risk having their blocks rejected by the network.
URSF, in turn, is a model where nodes reject blocks that attempt to adopt a specific update, functioning as resistance against proposed changes.
-
Advantages: UASF returns decision-making power to node operators, ensuring that changes do not depend solely on miners.
-
Disadvantages: Both UASF and URSF can generate network splits, especially in cases of strong opposition among different stakeholders.
An example of UASF was the activation of SegWit in 2017, where users supported activation independently of miner signaling, which ended up forcing its adoption.
BIP8 (LOT=True)
BIP8 is an evolution of BIP9, designed to prevent miners from indefinitely blocking a change desired by the majority of users and developers. BIP8 allows setting a parameter called "lockinontimeout" (LOT) as true, which means that if the update has not been fully signaled by a certain point, it is automatically activated.
-
Advantages: Ensures that changes with broad support among users are not blocked by miners who wish to maintain the status quo.
-
Disadvantages: Can lead to network splits if miners or other important stakeholders do not support the update.
Although BIP8 with LOT=True has not yet been used in Bitcoin, it is a proposal that can be applied in future updates if necessary.
These activation mechanisms have been essential for Bitcoin's development, allowing updates that keep the network secure and functional. Each method brings its own advantages and challenges, but all share the goal of preserving consensus and network cohesion.
5. Risks and Considerations in Consensus Updates
Consensus updates in Bitcoin are complex processes that involve not only technical aspects but also political, economic, and social considerations. Due to the network's decentralized nature, each change brings with it a set of risks that need to be carefully assessed. Below, we explore some of the main challenges and future scenarios, as well as the possible impacts on stakeholders.
Network Fragility with Alternative Implementations
One of the main risks associated with consensus updates is the possibility of network fragmentation when there are alternative software implementations. If an update is implemented by a significant group of nodes but rejected by others, a network split (fork) can occur. This creates two competing chains, each with a different version of the transaction history, leading to unpredictable consequences for users and investors.
Such fragmentation weakens Bitcoin because, by dividing hashing power (computing) and coin value, it reduces network security and investor confidence. A notable example of this risk was the fork that gave rise to Bitcoin Cash in 2017 when disagreements over block size resulted in a new chain and a new asset.
Chain Splits and Impact on Stakeholders
Chain splits are a significant risk in update processes, especially in hard forks. During a hard fork, the network is split into two separate chains, each with its own set of rules. This results in the creation of a new coin and leaves users with duplicated assets on both chains. While this may seem advantageous, in the long run, these splits weaken the network and create uncertainties for investors.
Each group of stakeholders reacts differently to a chain split:
-
Institutional Investors and ETFs: Face regulatory and compliance challenges because many of these assets are managed under strict regulations. The creation of a new coin requires decisions to be made quickly to avoid potential losses, which may be hampered by regulatory constraints.
-
Miners: May be incentivized to shift their computing power to the chain that offers higher profitability, which can weaken one of the networks.
-
Economic Nodes: Such as major exchanges and custody providers, have to quickly choose which chain to support, influencing the perceived value of each network.
Such divisions can generate uncertainties and loss of value, especially for institutional investors and those who use Bitcoin as a store of value.
Regulatory Impacts and Institutional Investors
With the growing presence of institutional investors in Bitcoin, consensus changes face new compliance challenges. Bitcoin ETFs, for example, are required to follow strict rules about which assets they can include and how chain split events should be handled. The creation of a new asset or migration to a new chain can complicate these processes, creating pressure for large financial players to quickly choose a chain, affecting the stability of consensus.
Moreover, decisions regarding forks can influence the Bitcoin futures and derivatives market, affecting perception and adoption by new investors. Therefore, the need to avoid splits and maintain cohesion is crucial to attract and preserve the confidence of these investors.
Security Considerations in Soft Forks and Hard Forks
While soft forks are generally preferred in Bitcoin for their backward compatibility, they are not without risks. Soft forks can create different classes of nodes on the network (updated and non-updated), which increases operational complexity and can ultimately weaken consensus cohesion. In a network scenario with fragmentation of node classes, Bitcoin's security can be affected, as some nodes may lose part of the visibility over updated transactions or rules.
In hard forks, the security risk is even more evident because all nodes need to adopt the new update to avoid network division. Experience shows that abrupt changes can create temporary vulnerabilities, in which malicious agents try to exploit the transition to attack the network.
Bounty Claim Risks and Attack Scenarios
Another risk in consensus updates are so-called "bounty claims"—accumulated rewards that can be obtained if an attacker manages to split or deceive a part of the network. In a conflict scenario, a group of miners or nodes could be incentivized to support a new update or create an alternative version of the software to benefit from these rewards.
These risks require stakeholders to carefully assess each update and the potential vulnerabilities it may introduce. The possibility of "bounty claims" adds a layer of complexity to consensus because each interest group may see a financial opportunity in a change that, in the long term, may harm network stability.
The risks discussed above show the complexity of consensus in Bitcoin and the importance of approaching it gradually and deliberately. Updates need to consider not only technical aspects but also economic and social implications, in order to preserve Bitcoin's integrity and maintain trust among stakeholders.
6. Recommendations for the Consensus Process in Bitcoin
To ensure that protocol changes in Bitcoin are implemented safely and with broad support, it is essential that all stakeholders adopt a careful and coordinated approach. Here are strategic recommendations for evaluating, supporting, or rejecting consensus updates, considering the risks and challenges discussed earlier, along with best practices for successful implementation.
1. Careful Evaluation of Proposal Maturity
Stakeholders should rigorously assess the maturity level of a proposal before supporting its implementation. Updates that are still experimental or lack a robust technical foundation can expose the network to unnecessary risks. Ideally, change proposals should go through an extensive testing phase, have security audits, and receive review and feedback from various developers and experts.
2. Extensive Testing in Secure and Compatible Networks
Before an update is activated on the mainnet, it is essential to test it on networks like testnet and signet, and whenever possible, on other compatible networks that offer a safe and controlled environment to identify potential issues. Testing on networks like Litecoin was fundamental for the safe launch of innovations like SegWit and the Lightning Network, allowing functionalities to be validated on a lower-impact network before being implemented on Bitcoin.
The Liquid Network, developed by Blockstream, also plays an important role as an experimental network for new proposals, such as OP_CAT. By adopting these testing environments, stakeholders can mitigate risks and ensure that the update is reliable and secure before being adopted by the main network.
3. Importance of Stakeholder Engagement
The success of a consensus update strongly depends on the active participation of all stakeholders. This includes economic nodes, miners, protocol developers, investors, and end users. Lack of participation can lead to inadequate decisions or even future network splits, which would compromise Bitcoin's security and stability.
4. Key Questions for Evaluating Consensus Proposals
To assist in decision-making, each group of stakeholders should consider some key questions before supporting a consensus change:
- Does the proposal offer tangible benefits for Bitcoin's security, scalability, or usability?
- Does it maintain backward compatibility or introduce the risk of network split?
- Are the implementation requirements clear and feasible for each group involved?
- Are there clear and aligned incentives for all stakeholder groups to accept the change?
5. Coordination and Timing in Implementations
Timing is crucial. Updates with short activation windows can force a split because not all nodes and miners can update simultaneously. Changes should be planned with ample deadlines to allow all stakeholders to adjust their systems, avoiding surprises that could lead to fragmentation.
Mechanisms like soft forks are generally preferable to hard forks because they allow a smoother transition. Opting for backward-compatible updates when possible facilitates the process and ensures that nodes and miners can adapt without pressure.
6. Continuous Monitoring and Re-evaluation
After an update, it's essential to monitor the network to identify problems or side effects. This continuous process helps ensure cohesion and trust among all participants, keeping Bitcoin as a secure and robust network.
These recommendations, including the use of secure networks for extensive testing, promote a collaborative and secure environment for Bitcoin's consensus process. By adopting a deliberate and strategic approach, stakeholders can preserve Bitcoin's value as a decentralized and censorship-resistant network.
7. Conclusion
Consensus in Bitcoin is more than a set of rules; it's the foundation that sustains the network as a decentralized, secure, and reliable system. Unlike centralized systems, where decisions can be made quickly, Bitcoin requires a much more deliberate and cooperative approach, where the interests of miners, economic nodes, developers, investors, and users must be considered and harmonized. This governance model may seem slow, but it is fundamental to preserving the resilience and trust that make Bitcoin a global store of value and censorship-resistant.
Consensus updates in Bitcoin must balance the need for innovation with the preservation of the network's core principles. The development process of a proposal needs to be detailed and rigorous, going through several testing stages, such as in testnet, signet, and compatible networks like Litecoin and Liquid Network. These networks offer safe environments for proposals to be analyzed and improved before being launched on the main network.
Each proposed change must be carefully evaluated regarding its maturity, impact, backward compatibility, and support among stakeholders. The recommended key questions and appropriate timing are critical to ensure that an update is adopted without compromising network cohesion. It's also essential that the implementation process is continuously monitored and re-evaluated, allowing adjustments as necessary and minimizing the risk of instability.
By following these guidelines, Bitcoin's stakeholders can ensure that the network continues to evolve safely and robustly, maintaining user trust and further solidifying its role as one of the most resilient and innovative digital assets in the world. Ultimately, consensus in Bitcoin is not just a technical issue but a reflection of its community and the values it represents: security, decentralization, and resilience.
8. Links
Whitepaper: https://github.com/bitcoin-cap/bcap
Youtube (pt-br): https://www.youtube.com/watch?v=rARycAibl9o&list=PL-qnhF0qlSPkfhorqsREuIu4UTbF0h4zb
-
-
@ 872982aa:8fb54cfe
2025-04-18 02:17:09就是底部栏 有一个写blog的 按钮,这个按钮现在不居中。如何解决呢?我再求助一下 deepseek吧。
-
@ 5c26ee8b:a4d229aa
2025-04-17 20:01:03Prophet Jesus peace be upon him was never killed, he was saved by God and raised to heavens body and soul.
4:157 An-Nisaa
وَقَوْلِهِمْ إِنَّا قَتَلْنَا الْمَسِيحَ عِيسَى ابْنَ مَرْيَمَ رَسُولَ اللَّهِ وَمَا قَتَلُوهُ وَمَا صَلَبُوهُ وَلَٰكِنْ شُبِّهَ لَهُمْ ۚ وَإِنَّ الَّذِينَ اخْتَلَفُوا فِيهِ لَفِي شَكٍّ مِنْهُ ۚ مَا لَهُمْ بِهِ مِنْ عِلْمٍ إِلَّا اتِّبَاعَ الظَّنِّ ۚ وَمَا قَتَلُوهُ يَقِينًا
And because of their saying (in boast), "We killed Messiah 'Iesa (Jesus), son of Maryam (Mary), the Messenger of Allah," - but they killed him not, nor crucified him, but the resemblance of 'Iesa (Jesus) was put over another man (and they killed that man), and those who differ therein are full of doubts. They have no (certain) knowledge, they follow nothing but conjecture. For surely; they killed him not [i.e. 'Iesa (Jesus), son of Maryam (Mary)]:
4:158 An-Nisaa
بَلْ رَفَعَهُ اللَّهُ إِلَيْهِ ۚ وَكَانَ اللَّهُ عَزِيزًا حَكِيمًا
But Allah raised him ['Iesa (Jesus)] up (with his body and soul) unto Himself (and he is in the heavens). And Allah is Ever All-Powerful, All-Wise.
Jesus, peace be upon him, is neither God nor his son.
5:17 Al-Maaida
لَقَدْ كَفَرَ الَّذِينَ قَالُوا إِنَّ اللَّهَ هُوَ الْمَسِيحُ ابْنُ مَرْيَمَ ۚ قُلْ فَمَنْ يَمْلِكُ مِنَ اللَّهِ شَيْئًا إِنْ أَرَادَ أَنْ يُهْلِكَ الْمَسِيحَ ابْنَ مَرْيَمَ وَأُمَّهُ وَمَنْ فِي الْأَرْضِ جَمِيعًا ۗ وَلِلَّهِ مُلْكُ السَّمَاوَاتِ وَالْأَرْضِ وَمَا بَيْنَهُمَا ۚ يَخْلُقُ مَا يَشَاءُ ۚ وَاللَّهُ عَلَىٰ كُلِّ شَيْءٍ قَدِيرٌ
They have certainly disbelieved who say that Allah is Christ, the son of Mary. Say, "Then who could prevent Allah at all if He had intended to destroy Christ, the son of Mary, or his mother or everyone on the earth?" And to Allah belongs the dominion of the heavens and the earth and whatever is between them. He creates what He wills, and Allah is over all things competent.
5:18 Al-Maaida
وَقَالَتِ الْيَهُودُ وَالنَّصَارَىٰ نَحْنُ أَبْنَاءُ اللَّهِ وَأَحِبَّاؤُهُ ۚ قُلْ فَلِمَ يُعَذِّبُكُمْ بِذُنُوبِكُمْ ۖ بَلْ أَنْتُمْ بَشَرٌ مِمَّنْ خَلَقَ ۚ يَغْفِرُ لِمَنْ يَشَاءُ وَيُعَذِّبُ مَنْ يَشَاءُ ۚ وَلِلَّهِ مُلْكُ السَّمَاوَاتِ وَالْأَرْضِ وَمَا بَيْنَهُمَا ۖ وَإِلَيْهِ الْمَصِيرُ
But the Jews and the Christians say, "We are the children of Allah and His beloved." Say, "Then why does He punish you for your sins?" Rather, you are human beings from among those He has created. He forgives whom He wills, and He punishes whom He wills. And to Allah belongs the dominion of the heavens and the earth and whatever is between them, and to Him is the [final] destination.
5:72 Al-Maaida
لَقَدْ كَفَرَ الَّذِينَ قَالُوا إِنَّ اللَّهَ هُوَ الْمَسِيحُ ابْنُ مَرْيَمَ ۖ وَقَالَ الْمَسِيحُ يَا بَنِي إِسْرَائِيلَ اعْبُدُوا اللَّهَ رَبِّي وَرَبَّكُمْ ۖ إِنَّهُ مَنْ يُشْرِكْ بِاللَّهِ فَقَدْ حَرَّمَ اللَّهُ عَلَيْهِ الْجَنَّةَ وَمَأْوَاهُ النَّارُ ۖ وَمَا لِلظَّالِمِينَ مِنْ أَنْصَارٍ
Surely, they have disbelieved who say: "Allah is the Messiah ['Iesa (Jesus)], son of Maryam (Mary)." But the Messiah ['Iesa (Jesus)] said: "O Children (descendants) of Israel! Worship Allah, my Lord and your Lord." Verily, whosoever sets up partners in worship with Allah, then Allah has forbidden Paradise for him, and the Fire will be his abode. And for the Zalimun (unjust, polytheists and wrong-doers) there are no helpers.
5:73 Al-Maaida
لَقَدْ كَفَرَ الَّذِينَ قَالُوا إِنَّ اللَّهَ ثَالِثُ ثَلَاثَةٍ ۘ وَمَا مِنْ إِلَٰهٍ إِلَّا إِلَٰهٌ وَاحِدٌ ۚ وَإِنْ لَمْ يَنْتَهُوا عَمَّا يَقُولُونَ لَيَمَسَّنَّ الَّذِينَ كَفَرُوا مِنْهُمْ عَذَابٌ أَلِيمٌ
Surely, disbelievers are those who said: "Allah is the third of the three (in a Trinity)." But there is no ilah (god) (none who has the right to be worshipped) but One Ilah (God; Allah). And if they do not cease from what they say, verily, a painful torment will befall the disbelievers among them.
5:74 Al-Maaida
أَفَلَا يَتُوبُونَ إِلَى اللَّهِ وَيَسْتَغْفِرُونَهُ ۚ وَاللَّهُ غَفُورٌ رَحِيمٌ
Will they not repent to Allah and ask His Forgiveness? For Allah is Oft-Forgiving, Most Merciful.
5:75 Al-Maaida
مَا الْمَسِيحُ ابْنُ مَرْيَمَ إِلَّا رَسُولٌ قَدْ خَلَتْ مِنْ قَبْلِهِ الرُّسُلُ وَأُمُّهُ صِدِّيقَةٌ ۖ كَانَا يَأْكُلَانِ الطَّعَامَ ۗ انْظُرْ كَيْفَ نُبَيِّنُ لَهُمُ الْآيَاتِ ثُمَّ انْظُرْ أَنَّىٰ يُؤْفَكُونَ
The Messiah ['Iesa (Jesus)], son of Maryam (Mary), was no more than a Messenger; many were the Messengers that passed away before him. His mother [Maryam (Mary)] was a Siddiqah [i.e. she believed in the words of Allah and His Books (see Verse 66:12)]. They both used to eat food (as any other human being, while Allah does not eat). Look how We make the Ayat (proofs, evidences, verses, lessons, signs, revelations, etc.) clear to them, yet look how they are deluded away (from the truth).
5:76 Al-Maaida
قُلْ أَتَعْبُدُونَ مِنْ دُونِ اللَّهِ مَا لَا يَمْلِكُ لَكُمْ ضَرًّا وَلَا نَفْعًا ۚ وَاللَّهُ هُوَ السَّمِيعُ الْعَلِيمُ
Say, "Do you worship besides Allah that which holds for you no [power of] harm or benefit while it is Allah who is the Hearing, the Knowing?"
5:77 Al-Maaida
قُلْ يَا أَهْلَ الْكِتَابِ لَا تَغْلُوا فِي دِينِكُمْ غَيْرَ الْحَقِّ وَلَا تَتَّبِعُوا أَهْوَاءَ قَوْمٍ قَدْ ضَلُّوا مِنْ قَبْلُ وَأَضَلُّوا كَثِيرًا وَضَلُّوا عَنْ سَوَاءِ السَّبِيلِ
Say, "O People of the Scripture, do not exceed limits in your religion beyond the truth and do not follow the inclinations of a people who had gone astray before and misled many and have strayed from the soundness of the way."
Al-An'aam verse 100 وَجَعَلُوا لِلَّهِ شُرَكَاءَ الْجِنَّ وَخَلَقَهُمْ ۖ وَخَرَقُوا لَهُ بَنِينَ وَبَنَاتٍ بِغَيْرِ عِلْمٍ ۚ سُبْحَانَهُ وَتَعَالَىٰ عَمَّا يَصِفُونَ Yet, they join the jinns as partners in worship with Allah, though He has created them (the jinns), and they attribute falsely without knowledge sons and daughters to Him. Be He Glorified and Exalted above (all) that they attribute to Him. Verse 101 بَدِيعُ السَّمَاوَاتِ وَالْأَرْضِ ۖ أَنَّىٰ يَكُونُ لَهُ وَلَدٌ وَلَمْ تَكُنْ لَهُ صَاحِبَةٌ ۖ وَخَلَقَ كُلَّ شَيْءٍ ۖ وَهُوَ بِكُلِّ شَيْءٍ عَلِيمٌ He is the Originator of (created in beautiful form) the heavens and the earth. How can He have children when He has no wife (companion)? He created all things and He is the All-Knower of everything. Verse 102 ذَٰلِكُمُ اللَّهُ رَبُّكُمْ ۖ لَا إِلَٰهَ إِلَّا هُوَ ۖ خَالِقُ كُلِّ شَيْءٍ فَاعْبُدُوهُ ۚ وَهُوَ عَلَىٰ كُلِّ شَيْءٍ وَكِيلٌ Such is Allah, your Lord! La ilaha illa Huwa (none has the right to be worshipped but He), the Creator of all things. So worship Him (Alone), and He is the Wakil (Trustee, Disposer of affairs, Guardian, etc.) over all things. Verse 103 لَا تُدْرِكُهُ الْأَبْصَارُ وَهُوَ يُدْرِكُ الْأَبْصَارَ ۖ وَهُوَ اللَّطِيفُ الْخَبِيرُ No vision can grasp Him, but His Grasp is over all vision. He is the Most Subtle and Courteous, Well-Acquainted with all things. Verse 104 قَدْ جَاءَكُمْ بَصَائِرُ مِنْ رَبِّكُمْ ۖ فَمَنْ أَبْصَرَ فَلِنَفْسِهِ ۖ وَمَنْ عَمِيَ فَعَلَيْهَا ۚ وَمَا أَنَا عَلَيْكُمْ بِحَفِيظٍ
Verily, proofs have come to you from your Lord, so whosoever sees, will do so for (the good of) his ownself, and whosoever blinds himself, will do so to his own harm, and I am not a watcher over you.
In the following a narration of a conversation between God and Prophet Jesus, peace be upon him:
5:116 Al-Maaida
وَإِذْ قَالَ اللَّهُ يَا عِيسَى ابْنَ مَرْيَمَ أَأَنْتَ قُلْتَ لِلنَّاسِ اتَّخِذُونِي وَأُمِّيَ إِلَٰهَيْنِ مِنْ دُونِ اللَّهِ ۖ قَالَ سُبْحَانَكَ مَا يَكُونُ لِي أَنْ أَقُولَ مَا لَيْسَ لِي بِحَقٍّ ۚ إِنْ كُنْتُ قُلْتُهُ فَقَدْ عَلِمْتَهُ ۚ تَعْلَمُ مَا فِي نَفْسِي وَلَا أَعْلَمُ مَا فِي نَفْسِكَ ۚ إِنَّكَ أَنْتَ عَلَّامُ الْغُيُوبِ
And (remember) when Allah will say (on the Day of Resurrection): "O 'Iesa (Jesus), son of Maryam (Mary)! Did you say unto men: 'Worship me and my mother as two gods besides Allah?' " He will say: "Glory to You! It was not for me to say what I had no right (to say). Had I said such a thing, You would surely have known it. You know what is in my inner-self though I do not know what is in Yours, truly, You, only You, are the All-Knower of all that is hidden and unseen.
5:117 Al-Maaida
مَا قُلْتُ لَهُمْ إِلَّا مَا أَمَرْتَنِي بِهِ أَنِ اعْبُدُوا اللَّهَ رَبِّي وَرَبَّكُمْ ۚ وَكُنْتُ عَلَيْهِمْ شَهِيدًا مَا دُمْتُ فِيهِمْ ۖ فَلَمَّا تَوَفَّيْتَنِي كُنْتَ أَنْتَ الرَّقِيبَ عَلَيْهِمْ ۚ وَأَنْتَ عَلَىٰ كُلِّ شَيْءٍ شَهِيدٌ
"Never did I say to them aught except what You (Allah) did command me to say: 'Worship Allah, my Lord and your Lord.' And I was a witness over them while I dwelt amongst them, but when You took me up, You were the Watcher over them, and You are a Witness to all things. (This is a great admonition and warning to the Christians of the whole world).
5:118 Al-Maaida
إِنْ تُعَذِّبْهُمْ فَإِنَّهُمْ عِبَادُكَ ۖ وَإِنْ تَغْفِرْ لَهُمْ فَإِنَّكَ أَنْتَ الْعَزِيزُ الْحَكِيمُ
"If You punish them, they are Your slaves, and if You forgive them, verily You, only You are the All-Mighty, the All-Wise."
5:119 Al-Maaida
قَالَ اللَّهُ هَٰذَا يَوْمُ يَنْفَعُ الصَّادِقِينَ صِدْقُهُمْ ۚ لَهُمْ جَنَّاتٌ تَجْرِي مِنْ تَحْتِهَا الْأَنْهَارُ خَالِدِينَ فِيهَا أَبَدًا ۚ رَضِيَ اللَّهُ عَنْهُمْ وَرَضُوا عَنْهُ ۚ ذَٰلِكَ الْفَوْزُ الْعَظِيمُ
Allah will say: "This is a Day on which the truthful will profit from their truth: theirs are Gardens under which rivers flow (in Paradise) - they shall abide therein forever. Allah is pleased with them and they with Him. That is the great success (Paradise).
5:120 Al-Maaida
لِلَّهِ مُلْكُ السَّمَاوَاتِ وَالْأَرْضِ وَمَا فِيهِنَّ ۚ وَهُوَ عَلَىٰ كُلِّ شَيْءٍ قَدِيرٌ
To Allah belongs the dominion of the heavens and the earth and all that is therein, and He is Able to do all things.
Jesus, peace be upon him is only a prophet and we (Muslim people) will follow him when he returns before Judgement Day. In Islam, we believe in all prophets chosen by God while making no difference between any of them acknowledging that the last prophet is prophet Mohamed, peace be upon him.
2:285 Al-Baqara آمَنَ الرَّسُولُ بِمَا أُنْزِلَ إِلَيْهِ مِنْ رَبِّهِ وَالْمُؤْمِنُونَ ۚ كُلٌّ آمَنَ بِاللَّهِ وَمَلَائِكَتِهِ وَكُتُبِهِ وَرُسُلِهِ لَا نُفَرِّقُ بَيْنَ أَحَدٍ مِنْ رُسُلِهِ ۚ وَقَالُوا سَمِعْنَا وَأَطَعْنَا ۖ غُفْرَانَكَ رَبَّنَا وَإِلَيْكَ الْمَصِيرُ The Messenger (Muhammad SAW) believes in what has been sent down to him from his Lord, and (so do) the believers. Each one believes in Allah, His Angels, His Books, and His Messengers. They say, "We make no distinction between one another of His Messengers" - and they say, "We hear, and we obey. (We seek) Your Forgiveness, our Lord, and to You is the return (of all)."
27:59 An-Naml قُلِ الْحَمْدُ لِلَّهِ وَسَلَامٌ عَلَىٰ عِبَادِهِ الَّذِينَ اصْطَفَىٰ ۗ آللَّهُ خَيْرٌ أَمَّا يُشْرِكُونَ Say: "Praise and thanks be to Allah, and peace be on His servants whom He has chosen (for His Message)! Is Allah better, or (all) that you ascribe as partners (to Him)?" (Of course, Allah is Better). 33:57 Al-Ahzaab إِنَّ الَّذِينَ يُؤْذُونَ اللَّهَ وَرَسُولَهُ لَعَنَهُمُ اللَّهُ فِي الدُّنْيَا وَالْآخِرَةِ وَأَعَدَّ لَهُمْ عَذَابًا مُهِينًا Verily, those who cause harm to Allah and His Messenger, Allah has cursed them in this world, and in the Hereafter, and has prepared for them a humiliating torment. 33:58 Al-Ahzaab وَالَّذِينَ يُؤْذُونَ الْمُؤْمِنِينَ وَالْمُؤْمِنَاتِ بِغَيْرِ مَا اكْتَسَبُوا فَقَدِ احْتَمَلُوا بُهْتَانًا وَإِثْمًا مُبِينًا And those who cause harm believing men and women undeservedly, bear on themselves the crime of slander and plain sin.
Some of the miracles shown by prophet Jesus peace be upon him are mentioned in the Quran in the following verses.
5:110 Al-Maaida
إِذْ قَالَ اللَّهُ يَا عِيسَى ابْنَ مَرْيَمَ اذْكُرْ نِعْمَتِي عَلَيْكَ وَعَلَىٰ وَالِدَتِكَ إِذْ أَيَّدْتُكَ بِرُوحِ الْقُدُسِ تُكَلِّمُ النَّاسَ فِي الْمَهْدِ وَكَهْلًا ۖ وَإِذْ عَلَّمْتُكَ الْكِتَابَ وَالْحِكْمَةَ وَالتَّوْرَاةَ وَالْإِنْجِيلَ ۖ وَإِذْ تَخْلُقُ مِنَ الطِّينِ كَهَيْئَةِ الطَّيْرِ بِإِذْنِي فَتَنْفُخُ فِيهَا فَتَكُونُ طَيْرًا بِإِذْنِي ۖ وَتُبْرِئُ الْأَكْمَهَ وَالْأَبْرَصَ بِإِذْنِي ۖ وَإِذْ تُخْرِجُ الْمَوْتَىٰ بِإِذْنِي ۖ وَإِذْ كَفَفْتُ بَنِي إِسْرَائِيلَ عَنْكَ إِذْ جِئْتَهُمْ بِالْبَيِّنَاتِ فَقَالَ الَّذِينَ كَفَرُوا مِنْهُمْ إِنْ هَٰذَا إِلَّا سِحْرٌ مُبِينٌ
[The Day] when Allah will say, "O Jesus, Son of Mary, remember My favor upon you and upon your mother when I supported you with the Pure Spirit and you spoke to the people in the cradle and in maturity; and [remember] when I taught you writing and wisdom and the Torah and the Gospel; and when you designed from clay [what was] like the form of a bird with My permission, then you breathed into it, and it became a bird with My permission; and you healed the blind and the leper with My permission; and when you brought forth the dead with My permission; and when I restrained the Children of Israel from [killing] you when you came to them with clear proofs and those who disbelieved among them said, "This is not but obvious magic."
5:111 Al-Maaida
وَإِذْ أَوْحَيْتُ إِلَى الْحَوَارِيِّينَ أَنْ آمِنُوا بِي وَبِرَسُولِي قَالُوا آمَنَّا وَاشْهَدْ بِأَنَّنَا مُسْلِمُونَ
And [remember] when I inspired to the disciples, "Believe in Me and in My messenger Jesus." They said, "We have believed, so bear witness that indeed we are Muslims [in submission to Allah]."
5:112 Al-Maaida إِذْ قَالَ الْحَوَارِيُّونَ يَا عِيسَى ابْنَ مَرْيَمَ هَلْ يَسْتَطِيعُ رَبُّكَ أَنْ يُنَزِّلَ عَلَيْنَا مَائِدَةً مِنَ السَّمَاءِ ۖ قَالَ اتَّقُوا اللَّهَ إِنْ كُنْتُمْ مُؤْمِنِينَ (Remember) when Al-Hawariun (the disciples) said: "O 'Iesa (Jesus), son of Maryam (Mary)! Can your Lord send down to us a table spread (with food) from heaven?" 'Iesa (Jesus) said: "Fear Allah, if you are indeed believers."
5:113 Al-Maaida قَالُوا نُرِيدُ أَنْ نَأْكُلَ مِنْهَا وَتَطْمَئِنَّ قُلُوبُنَا وَنَعْلَمَ أَنْ قَدْ صَدَقْتَنَا وَنَكُونَ عَلَيْهَا مِنَ الشَّاهِدِينَ They said: "We wish to eat thereof and to be stronger in Faith, and to know that you have indeed told us the truth and that we ourselves be its witnesses."
5:114 Al-Maaida قَالَ عِيسَى ابْنُ مَرْيَمَ اللَّهُمَّ رَبَّنَا أَنْزِلْ عَلَيْنَا مَائِدَةً مِنَ السَّمَاءِ تَكُونُ لَنَا عِيدًا لِأَوَّلِنَا وَآخِرِنَا وَآيَةً مِنْكَ ۖ وَارْزُقْنَا وَأَنْتَ خَيْرُ الرَّازِقِينَ 'Iesa (Jesus), son of Maryam (Mary), said: "O Allah, our Lord! Send us from heaven a table spread (with food) that there may be for us - for the first and the last of us - a festival and a sign from You; and provide us sustenance, for You are the Best of sustainers."
5:115 Al-Maaida قَالَ اللَّهُ إِنِّي مُنَزِّلُهَا عَلَيْكُمْ ۖ فَمَنْ يَكْفُرْ بَعْدُ مِنْكُمْ فَإِنِّي أُعَذِّبُهُ عَذَابًا لَا أُعَذِّبُهُ أَحَدًا مِنَ الْعَالَمِينَ Allah said: "I am going to send it down unto you, but if any of you after that disbelieves, then I will punish him with a torment such as I have not inflicted on anyone among (all) the 'Alamin (mankind and jinns)."
The pregnancy of Mary and the birth of prophet Jesus peace be upon him are also miracles and they are mentioned in the following verses. Jesus peace be upon him himself is a gift to Mary; however God, Allah, created him in the same way he created Adam.
3:8 Aal-i-Imraan
رَبَّنَا لَا تُزِغْ قُلُوبَنَا بَعْدَ إِذْ هَدَيْتَنَا وَهَبْ لَنَا مِنْ لَدُنْكَ رَحْمَةً ۚ إِنَّكَ أَنْتَ الْوَهَّابُ
[Who say], "Our Lord, let not our hearts deviate after You have guided us and grant us from Yourself mercy. Indeed, You are the Bestower. 3:45 Aal-i-Imraan
إِذْ قَالَتِ الْمَلَائِكَةُ يَا مَرْيَمُ إِنَّ اللَّهَ يُبَشِّرُكِ بِكَلِمَةٍ مِنْهُ اسْمُهُ الْمَسِيحُ عِيسَى ابْنُ مَرْيَمَ وَجِيهًا فِي الدُّنْيَا وَالْآخِرَةِ وَمِنَ الْمُقَرَّبِينَ
[And mention] when the angels said, "O Mary, indeed Allah gives you good tidings of a word from Him, whose name will be the Messiah, Jesus, the son of Mary - distinguished in this world and the Hereafter and among those brought near [to Allah].
3:46 Aal-i-Imraan
وَيُكَلِّمُ النَّاسَ فِي الْمَهْدِ وَكَهْلًا وَمِنَ الصَّالِحِينَ
He will speak to the people in the cradle and in maturity and will be of the righteous."
3:47 Aal-i-Imraan
قَالَتْ رَبِّ أَنَّىٰ يَكُونُ لِي وَلَدٌ وَلَمْ يَمْسَسْنِي بَشَرٌ ۖ قَالَ كَذَٰلِكِ اللَّهُ يَخْلُقُ مَا يَشَاءُ ۚ إِذَا قَضَىٰ أَمْرًا فَإِنَّمَا يَقُولُ لَهُ كُنْ فَيَكُونُ
She said, "My Lord, how will I have a child when no man has touched me?" [The angel] said, "Such is Allah; He creates what He wills. When He decrees a matter, He only says to it, 'Be,' and it is.
3:48 Aal-i-Imraan
وَيُعَلِّمُهُ الْكِتَابَ وَالْحِكْمَةَ وَالتَّوْرَاةَ وَالْإِنْجِيلَ
And He will teach him writing and wisdom and the Torah and the Gospel
3:49 Aal-i-Imraan
وَرَسُولًا إِلَىٰ بَنِي إِسْرَائِيلَ أَنِّي قَدْ جِئْتُكُمْ بِآيَةٍ مِنْ رَبِّكُمْ ۖ أَنِّي أَخْلُقُ لَكُمْ مِنَ الطِّينِ كَهَيْئَةِ الطَّيْرِ فَأَنْفُخُ فِيهِ فَيَكُونُ طَيْرًا بِإِذْنِ اللَّهِ ۖ وَأُبْرِئُ الْأَكْمَهَ وَالْأَبْرَصَ وَأُحْيِي الْمَوْتَىٰ بِإِذْنِ اللَّهِ ۖ وَأُنَبِّئُكُمْ بِمَا تَأْكُلُونَ وَمَا تَدَّخِرُونَ فِي بُيُوتِكُمْ ۚ إِنَّ فِي ذَٰلِكَ لَآيَةً لَكُمْ إِنْ كُنْتُمْ مُؤْمِنِينَ
And [make him] a messenger to the Children of Israel, [who will say], 'Indeed I have come to you with a sign from your Lord in that I design for you from clay [that which is] like the form of a bird, then I breathe into it and it becomes a bird by permission of Allah. And I cure the blind and the leper, and I give life to the dead - by permission of Allah. And I inform you of what you eat and what you store in your houses. Indeed in that is a sign for you, if you are believers.
3:50 Aal-i-Imraan
وَمُصَدِّقًا لِمَا بَيْنَ يَدَيَّ مِنَ التَّوْرَاةِ وَلِأُحِلَّ لَكُمْ بَعْضَ الَّذِي حُرِّمَ عَلَيْكُمْ ۚ وَجِئْتُكُمْ بِآيَةٍ مِنْ رَبِّكُمْ فَاتَّقُوا اللَّهَ وَأَطِيعُونِ
And [I have come] confirming what was before me of the Torah and to make lawful for you some of what was forbidden to you. And I have come to you with a sign from your Lord, so fear Allah and obey me.
3:51 Aal-i-Imraan
إِنَّ اللَّهَ رَبِّي وَرَبُّكُمْ فَاعْبُدُوهُ ۗ هَٰذَا صِرَاطٌ مُسْتَقِيمٌ
Indeed, Allah is my Lord and your Lord, so worship Him. That is the straight path."
3:52 Aal-i-Imraan
۞ فَلَمَّا أَحَسَّ عِيسَىٰ مِنْهُمُ الْكُفْرَ قَالَ مَنْ أَنْصَارِي إِلَى اللَّهِ ۖ قَالَ الْحَوَارِيُّونَ نَحْنُ أَنْصَارُ اللَّهِ آمَنَّا بِاللَّهِ وَاشْهَدْ بِأَنَّا مُسْلِمُونَ
But when Jesus felt [persistence in] disbelief from them, he said, "Who are my supporters for [the cause of] Allah?" The disciples said, "We are supporters for Allah. We have believed in Allah and testify that we are Muslims [submitting to Him].
3:53 Aal-i-Imraan
رَبَّنَا آمَنَّا بِمَا أَنْزَلْتَ وَاتَّبَعْنَا الرَّسُولَ فَاكْتُبْنَا مَعَ الشَّاهِدِينَ
Our Lord, we have believed in what You revealed and have followed the messenger Jesus, so register us among the witnesses [to truth]."
3:54 Aal-i-Imraan
وَمَكَرُوا وَمَكَرَ اللَّهُ ۖ وَاللَّهُ خَيْرُ الْمَاكِرِينَ
And the disbelievers planned, but Allah planned. And Allah is the best of planners.
3:55 Aal-i-Imraan
إِذْ قَالَ اللَّهُ يَا عِيسَىٰ إِنِّي مُتَوَفِّيكَ وَرَافِعُكَ إِلَيَّ وَمُطَهِّرُكَ مِنَ الَّذِينَ كَفَرُوا وَجَاعِلُ الَّذِينَ اتَّبَعُوكَ فَوْقَ الَّذِينَ كَفَرُوا إِلَىٰ يَوْمِ الْقِيَامَةِ ۖ ثُمَّ إِلَيَّ مَرْجِعُكُمْ فَأَحْكُمُ بَيْنَكُمْ فِيمَا كُنْتُمْ فِيهِ تَخْتَلِفُونَ
[Mention] when Allah said, "O Jesus, indeed I will take you and raise you to Myself and purify you from those who disbelieve and make those who follow you [in submission to Allah alone] superior to those who disbelieve until the Day of Resurrection. Then to Me is your return, and I will judge between you concerning that in which you used to differ.
3:56 Aal-i-Imraan
فَأَمَّا الَّذِينَ كَفَرُوا فَأُعَذِّبُهُمْ عَذَابًا شَدِيدًا فِي الدُّنْيَا وَالْآخِرَةِ وَمَا لَهُمْ مِنْ نَاصِرِينَ
And as for those who disbelieved, I will punish them with a severe punishment in this world and the Hereafter, and they will have no helpers."
3:57 Aal-i-Imraan
وَأَمَّا الَّذِينَ آمَنُوا وَعَمِلُوا الصَّالِحَاتِ فَيُوَفِّيهِمْ أُجُورَهُمْ ۗ وَاللَّهُ لَا يُحِبُّ الظَّالِمِينَ
But as for those who believed and did righteous deeds, He will give them in full their rewards, and Allah does not like the wrongdoers.
3:58 Aal-i-Imraan
ذَٰلِكَ نَتْلُوهُ عَلَيْكَ مِنَ الْآيَاتِ وَالذِّكْرِ الْحَكِيمِ
This is what We recite to you, [O Muhammad], of [Our] verses and the precise [and wise] message.
3:59 Aal-i-Imraan
إِنَّ مَثَلَ عِيسَىٰ عِنْدَ اللَّهِ كَمَثَلِ آدَمَ ۖ خَلَقَهُ مِنْ تُرَابٍ ثُمَّ قَالَ لَهُ كُنْ فَيَكُونُ
Indeed, the example of Jesus to Allah is like that of Adam. He created Him from dust; then He said to him, "Be," and he was.
3:60 Aal-i-Imraan
الْحَقُّ مِنْ رَبِّكَ فَلَا تَكُنْ مِنَ الْمُمْتَرِينَ
The truth is from your Lord, so do not be among the doubters.
3:61 Aal-i-Imraan
فَمَنْ حَاجَّكَ فِيهِ مِنْ بَعْدِ مَا جَاءَكَ مِنَ الْعِلْمِ فَقُلْ تَعَالَوْا نَدْعُ أَبْنَاءَنَا وَأَبْنَاءَكُمْ وَنِسَاءَنَا وَنِسَاءَكُمْ وَأَنْفُسَنَا وَأَنْفُسَكُمْ ثُمَّ نَبْتَهِلْ فَنَجْعَلْ لَعْنَتَ اللَّهِ عَلَى الْكَاذِبِينَ
Then whoever argues with you about it after [this] knowledge has come to you - say, "Come, let us call our sons and your sons, our women and your women, ourselves and yourselves, then supplicate earnestly [together] and invoke the curse of Allah upon the liars [among us]."
3:62 Aal-i-Imraan
إِنَّ هَٰذَا لَهُوَ الْقَصَصُ الْحَقُّ ۚ وَمَا مِنْ إِلَٰهٍ إِلَّا اللَّهُ ۚ وَإِنَّ اللَّهَ لَهُوَ الْعَزِيزُ الْحَكِيمُ
Indeed, this is the true narration. And there is no deity except Allah. And indeed, Allah is the Exalted in Might, the Wise.
3:63 Aal-i-Imraan
فَإِنْ تَوَلَّوْا فَإِنَّ اللَّهَ عَلِيمٌ بِالْمُفْسِدِينَ
But if they turn away, then indeed - Allah is Knowing of the corrupters.
3:64 Aal-i-Imraan
قُلْ يَا أَهْلَ الْكِتَابِ تَعَالَوْا إِلَىٰ كَلِمَةٍ سَوَاءٍ بَيْنَنَا وَبَيْنَكُمْ أَلَّا نَعْبُدَ إِلَّا اللَّهَ وَلَا نُشْرِكَ بِهِ شَيْئًا وَلَا يَتَّخِذَ بَعْضُنَا بَعْضًا أَرْبَابًا مِنْ دُونِ اللَّهِ ۚ فَإِنْ تَوَلَّوْا فَقُولُوا اشْهَدُوا بِأَنَّا مُسْلِمُونَ
Say, "O People of the Scripture, come to a word that is equitable between us and you - that we will not worship except Allah and not associate anything with Him and not take one another as lords instead of Allah." But if they turn away, then say, "Bear witness that we are Muslims [submitting to Him]."
19:16 Maryam
وَاذْكُرْ فِي الْكِتَابِ مَرْيَمَ إِذِ انْتَبَذَتْ مِنْ أَهْلِهَا مَكَانًا شَرْقِيًّا
And mention, [O Muhammad], in the Book [the story of] Mary, when she withdrew from her family to a place toward the east.
19:17 Maryam
فَاتَّخَذَتْ مِنْ دُونِهِمْ حِجَابًا فَأَرْسَلْنَا إِلَيْهَا رُوحَنَا فَتَمَثَّلَ لَهَا بَشَرًا سَوِيًّا
And she took, in seclusion from them, a screen. Then We sent to her Our Angel, and he represented himself to her as a well-proportioned man.
19:18 Maryam
قَالَتْ إِنِّي أَعُوذُ بِالرَّحْمَٰنِ مِنْكَ إِنْ كُنْتَ تَقِيًّا
She said, "Indeed, I seek refuge in the Most Merciful from you, [so leave me], if you should be fearing of Allah."
19:19 Maryam
قَالَ إِنَّمَا أَنَا رَسُولُ رَبِّكِ لِأَهَبَ لَكِ غُلَامًا زَكِيًّا
He said, "I am only the messenger of your Lord to give you [news of] a pure boy."
19:20 Maryam
قَالَتْ أَنَّىٰ يَكُونُ لِي غُلَامٌ وَلَمْ يَمْسَسْنِي بَشَرٌ وَلَمْ أَكُ بَغِيًّا
She said, "How can I have a boy while no man has touched me and I have not been unchaste?"
19:21 Maryam
قَالَ كَذَٰلِكِ قَالَ رَبُّكِ هُوَ عَلَيَّ هَيِّنٌ ۖ وَلِنَجْعَلَهُ آيَةً لِلنَّاسِ وَرَحْمَةً مِنَّا ۚ وَكَانَ أَمْرًا مَقْضِيًّا
He said, "Thus [it will be]; your Lord says, 'It is easy for Me, and We will make him a sign to the people and a mercy from Us. And it is a matter [already] decreed.' "
19:22 Maryam
۞ فَحَمَلَتْهُ فَانْتَبَذَتْ بِهِ مَكَانًا قَصِيًّا
So she conceived him, and she withdrew with him to a remote place.
19:23 Maryam
فَأَجَاءَهَا الْمَخَاضُ إِلَىٰ جِذْعِ النَّخْلَةِ قَالَتْ يَا لَيْتَنِي مِتُّ قَبْلَ هَٰذَا وَكُنْتُ نَسْيًا مَنْسِيًّا
And the pains of childbirth drove her to the trunk of a palm tree. She said, "Oh, I wish I had died before this and was in oblivion, forgotten."
19:24 Maryam
فَنَادَاهَا مِنْ تَحْتِهَا أَلَّا تَحْزَنِي قَدْ جَعَلَ رَبُّكِ تَحْتَكِ سَرِيًّا
But he called her from below her, "Do not grieve; your Lord has provided beneath you a stream.
19:25 Maryam
وَهُزِّي إِلَيْكِ بِجِذْعِ النَّخْلَةِ تُسَاقِطْ عَلَيْكِ رُطَبًا جَنِيًّا
And shake toward you the trunk of the palm tree; it will drop upon you ripe, fresh dates.
19:26 Maryam
فَكُلِي وَاشْرَبِي وَقَرِّي عَيْنًا ۖ فَإِمَّا تَرَيِنَّ مِنَ الْبَشَرِ أَحَدًا فَقُولِي إِنِّي نَذَرْتُ لِلرَّحْمَٰنِ صَوْمًا فَلَنْ أُكَلِّمَ الْيَوْمَ إِنْسِيًّا
So eat and drink and be contented. And if you see from among humanity anyone, say, 'Indeed, I have vowed to the Most Merciful abstention, so I will not speak today to [any] man.' "
19:27 Maryam
فَأَتَتْ بِهِ قَوْمَهَا تَحْمِلُهُ ۖ قَالُوا يَا مَرْيَمُ لَقَدْ جِئْتِ شَيْئًا فَرِيًّا
Then she brought him to her people, carrying him. They said, "O Mary, you have certainly done a thing unprecedented.
19:28 Maryam
يَا أُخْتَ هَارُونَ مَا كَانَ أَبُوكِ امْرَأَ سَوْءٍ وَمَا كَانَتْ أُمُّكِ بَغِيًّا
O sister of Aaron, your father was not a man of evil, nor was your mother unchaste."
19:29 Maryam
فَأَشَارَتْ إِلَيْهِ ۖ قَالُوا كَيْفَ نُكَلِّمُ مَنْ كَانَ فِي الْمَهْدِ صَبِيًّا
So she pointed to him. They said, "How can we speak to one who is in the cradle a child?"
19:30 Maryam
قَالَ إِنِّي عَبْدُ اللَّهِ آتَانِيَ الْكِتَابَ وَجَعَلَنِي نَبِيًّا
[Jesus] said, "Indeed, I am the servant of Allah. He has given me the Scripture and made me a prophet.
19:31 Maryam
وَجَعَلَنِي مُبَارَكًا أَيْنَ مَا كُنْتُ وَأَوْصَانِي بِالصَّلَاةِ وَالزَّكَاةِ مَا دُمْتُ حَيًّا
And He has made me blessed wherever I am and has enjoined upon me prayer and zakah as long as I remain alive
19:32 Maryam
وَبَرًّا بِوَالِدَتِي وَلَمْ يَجْعَلْنِي جَبَّارًا شَقِيًّا
And [made me] dutiful to my mother, and He has not made me a wretched tyrant.
19:33 Maryam
وَالسَّلَامُ عَلَيَّ يَوْمَ وُلِدْتُ وَيَوْمَ أَمُوتُ وَيَوْمَ أُبْعَثُ حَيًّا
And peace is on me the day I was born and the day I will die and the day I am raised alive."
19:34 Maryam
ذَٰلِكَ عِيسَى ابْنُ مَرْيَمَ ۚ قَوْلَ الْحَقِّ الَّذِي فِيهِ يَمْتَرُونَ
That is Jesus, the son of Mary - the word of truth about which they are in dispute.
19:35 Maryam
مَا كَانَ لِلَّهِ أَنْ يَتَّخِذَ مِنْ وَلَدٍ ۖ سُبْحَانَهُ ۚ إِذَا قَضَىٰ أَمْرًا فَإِنَّمَا يَقُولُ لَهُ كُنْ فَيَكُونُ
It is not [befitting] for Allah to take a son; exalted is He! When He decrees an affair, He only says to it, "Be," and it is.
19:36 Maryam
وَإِنَّ اللَّهَ رَبِّي وَرَبُّكُمْ فَاعْبُدُوهُ ۚ هَٰذَا صِرَاطٌ مُسْتَقِيمٌ
[Jesus said], "And indeed, Allah is my Lord and your Lord, so worship Him. That is a straight path."
19:37 Maryam
فَاخْتَلَفَ الْأَحْزَابُ مِنْ بَيْنِهِمْ ۖ فَوَيْلٌ لِلَّذِينَ كَفَرُوا مِنْ مَشْهَدِ يَوْمٍ عَظِيمٍ
Then the factions differed [concerning Jesus] from among them, so woe to those who disbelieved - from the scene of a tremendous Day.
19:38 Maryam
أَسْمِعْ بِهِمْ وَأَبْصِرْ يَوْمَ يَأْتُونَنَا ۖ لَٰكِنِ الظَّالِمُونَ الْيَوْمَ فِي ضَلَالٍ مُبِينٍ
How [clearly] they will hear and see the Day they come to Us, but the wrongdoers today are in clear error.
19:39 Maryam
وَأَنْذِرْهُمْ يَوْمَ الْحَسْرَةِ إِذْ قُضِيَ الْأَمْرُ وَهُمْ فِي غَفْلَةٍ وَهُمْ لَا يُؤْمِنُونَ
And warn them, [O Muhammad], of the Day of Regret, when the matter will be concluded; and [yet], they are in [a state of] heedlessness, and they do not believe.
In the following verse prophet Jesus peace be upon him told the people of his time about the arrival of prophet Mohamed peace be upon him (please note that Ahmed and Mohamed have the same meaning in Arabic and have the same word origin; the verb Hamad that means thanked).
61:6 As-Saff
وَإِذْ قَالَ عِيسَى ابْنُ مَرْيَمَ يَا بَنِي إِسْرَائِيلَ إِنِّي رَسُولُ اللَّهِ إِلَيْكُمْ مُصَدِّقًا لِمَا بَيْنَ يَدَيَّ مِنَ التَّوْرَاةِ وَمُبَشِّرًا بِرَسُولٍ يَأْتِي مِنْ بَعْدِي اسْمُهُ أَحْمَدُ ۖ فَلَمَّا جَاءَهُمْ بِالْبَيِّنَاتِ قَالُوا هَٰذَا سِحْرٌ مُبِينٌ
And [mention] when Jesus, the son of Mary, said, "O children (descendants) of Israel, indeed I am the messenger of Allah to you confirming what came before me of the Torah and bringing good tidings of a messenger to come after me, whose name is Ahmad." But when he came to them with clear evidences, they said, "This is obvious magic."
-
@ eac63075:b4988b48
2024-10-26 22:14:19The future of physical money is at stake, and the discussion about DREX, the new digital currency planned by the Central Bank of Brazil, is gaining momentum. In a candid and intense conversation, Federal Deputy Julia Zanatta (PL/SC) discussed the challenges and risks of this digital transition, also addressing her Bill No. 3,341/2024, which aims to prevent the extinction of physical currency. This bill emerges as a direct response to legislative initiatives seeking to replace physical money with digital alternatives, limiting citizens' options and potentially compromising individual freedom. Let's delve into the main points of this conversation.
https://www.fountain.fm/episode/i5YGJ9Ors3PkqAIMvNQ0
What is a CBDC?
Before discussing the specifics of DREX, it’s important to understand what a CBDC (Central Bank Digital Currency) is. CBDCs are digital currencies issued by central banks, similar to a digital version of physical money. Unlike cryptocurrencies such as Bitcoin, which operate in a decentralized manner, CBDCs are centralized and regulated by the government. In other words, they are digital currencies created and controlled by the Central Bank, intended to replace physical currency.
A prominent feature of CBDCs is their programmability. This means that the government can theoretically set rules about how, where, and for what this currency can be used. This aspect enables a level of control over citizens' finances that is impossible with physical money. By programming the currency, the government could limit transactions by setting geographical or usage restrictions. In practice, money within a CBDC could be restricted to specific spending or authorized for use in a defined geographical area.
In countries like China, where citizen actions and attitudes are also monitored, a person considered to have a "low score" due to a moral or ideological violation may have their transactions limited to essential purchases, restricting their digital currency use to non-essential activities. This financial control is strengthened because, unlike physical money, digital currency cannot be exchanged anonymously.
Practical Example: The Case of DREX During the Pandemic
To illustrate how DREX could be used, an example was given by Eric Altafim, director of Banco Itaú. He suggested that, if DREX had existed during the COVID-19 pandemic, the government could have restricted the currency’s use to a 5-kilometer radius around a person’s residence, limiting their economic mobility. Another proposed use by the executive related to the Bolsa Família welfare program: the government could set up programming that only allows this benefit to be used exclusively for food purchases. Although these examples are presented as control measures for safety or organization, they demonstrate how much a CBDC could restrict citizens' freedom of choice.
To illustrate the potential for state control through a Central Bank Digital Currency (CBDC), such as DREX, it is helpful to look at the example of China. In China, the implementation of a CBDC coincides with the country’s Social Credit System, a governmental surveillance tool that assesses citizens' and companies' behavior. Together, these technologies allow the Chinese government to monitor, reward, and, above all, punish behavior deemed inappropriate or threatening to the government.
How Does China's Social Credit System Work?
Implemented in 2014, China's Social Credit System assigns every citizen and company a "score" based on various factors, including financial behavior, criminal record, social interactions, and even online activities. This score determines the benefits or penalties each individual receives and can affect everything from public transport access to obtaining loans and enrolling in elite schools for their children. Citizens with low scores may face various sanctions, including travel restrictions, fines, and difficulty in securing loans.
With the adoption of the CBDC — or “digital yuan” — the Chinese government now has a new tool to closely monitor citizens' financial transactions, facilitating the application of Social Credit System penalties. China’s CBDC is a programmable digital currency, which means that the government can restrict how, when, and where the money can be spent. Through this level of control, digital currency becomes a powerful mechanism for influencing citizens' behavior.
Imagine, for instance, a citizen who repeatedly posts critical remarks about the government on social media or participates in protests. If the Social Credit System assigns this citizen a low score, the Chinese government could, through the CBDC, restrict their money usage in certain areas or sectors. For example, they could be prevented from buying tickets to travel to other regions, prohibited from purchasing certain consumer goods, or even restricted to making transactions only at stores near their home.
Another example of how the government can use the CBDC to enforce the Social Credit System is by monitoring purchases of products such as alcohol or luxury items. If a citizen uses the CBDC to spend more than the government deems reasonable on such products, this could negatively impact their social score, resulting in additional penalties such as future purchase restrictions or a lowered rating that impacts their personal and professional lives.
In China, this kind of control has already been demonstrated in several cases. Citizens added to Social Credit System “blacklists” have seen their spending and investment capacity severely limited. The combination of digital currency and social scores thus creates a sophisticated and invasive surveillance system, through which the Chinese government controls important aspects of citizens’ financial lives and individual freedoms.
Deputy Julia Zanatta views these examples with great concern. She argues that if the state has full control over digital money, citizens will be exposed to a level of economic control and surveillance never seen before. In a democracy, this control poses a risk, but in an authoritarian regime, it could be used as a powerful tool of repression.
DREX and Bill No. 3,341/2024
Julia Zanatta became aware of a bill by a Workers' Party (PT) deputy (Bill 4068/2020 by Deputy Reginaldo Lopes - PT/MG) that proposes the extinction of physical money within five years, aiming for a complete transition to DREX, the digital currency developed by the Central Bank of Brazil. Concerned about the impact of this measure, Julia drafted her bill, PL No. 3,341/2024, which prohibits the elimination of physical money, ensuring citizens the right to choose physical currency.
“The more I read about DREX, the less I want its implementation,” says the deputy. DREX is a Central Bank Digital Currency (CBDC), similar to other state digital currencies worldwide, but which, according to Julia, carries extreme control risks. She points out that with DREX, the State could closely monitor each citizen’s transactions, eliminating anonymity and potentially restricting freedom of choice. This control would lie in the hands of the Central Bank, which could, in a crisis or government change, “freeze balances or even delete funds directly from user accounts.”
Risks and Individual Freedom
Julia raises concerns about potential abuses of power that complete digitalization could allow. In a democracy, state control over personal finances raises serious questions, and EddieOz warns of an even more problematic future. “Today we are in a democracy, but tomorrow, with a government transition, we don't know if this kind of power will be used properly or abused,” he states. In other words, DREX gives the State the ability to restrict or condition the use of money, opening the door to unprecedented financial surveillance.
EddieOz cites Nigeria as an example, where a CBDC was implemented, and the government imposed severe restrictions on the use of physical money to encourage the use of digital currency, leading to protests and clashes in the country. In practice, the poorest and unbanked — those without regular access to banking services — were harshly affected, as without physical money, many cannot conduct basic transactions. Julia highlights that in Brazil, this situation would be even more severe, given the large number of unbanked individuals and the extent of rural areas where access to technology is limited.
The Relationship Between DREX and Pix
The digital transition has already begun with Pix, which revolutionized instant transfers and payments in Brazil. However, Julia points out that Pix, though popular, is a citizen’s choice, while DREX tends to eliminate that choice. The deputy expresses concern about new rules suggested for Pix, such as daily transaction limits of a thousand reais, justified as anti-fraud measures but which, in her view, represent additional control and a profit opportunity for banks. “How many more rules will banks create to profit from us?” asks Julia, noting that DREX could further enhance control over personal finances.
International Precedents and Resistance to CBDC
The deputy also cites examples from other countries resisting the idea of a centralized digital currency. In the United States, states like New Hampshire have passed laws to prevent the advance of CBDCs, and leaders such as Donald Trump have opposed creating a national digital currency. Trump, addressing the topic, uses a justification similar to Julia’s: in a digitalized system, “with one click, your money could disappear.” She agrees with the warning, emphasizing the control risk that a CBDC represents, especially for countries with disadvantaged populations.
Besides the United States, Canada, Colombia, and Australia have also suspended studies on digital currencies, citing the need for further discussions on population impacts. However, in Brazil, the debate on DREX is still limited, with few parliamentarians and political leaders openly discussing the topic. According to Julia, only she and one or two deputies are truly trying to bring this discussion to the Chamber, making DREX’s advance even more concerning.
Bill No. 3,341/2024 and Popular Pressure
For Julia, her bill is a first step. Although she acknowledges that ideally, it would prevent DREX's implementation entirely, PL 3341/2024 is a measure to ensure citizens' choice to use physical money, preserving a form of individual freedom. “If the future means control, I prefer to live in the past,” Julia asserts, reinforcing that the fight for freedom is at the heart of her bill.
However, the deputy emphasizes that none of this will be possible without popular mobilization. According to her, popular pressure is crucial for other deputies to take notice and support PL 3341. “I am only one deputy, and we need the public’s support to raise the project’s visibility,” she explains, encouraging the public to press other parliamentarians and ask them to “pay attention to PL 3341 and the project that prohibits the end of physical money.” The deputy believes that with a strong awareness and pressure movement, it is possible to advance the debate and ensure Brazilians’ financial freedom.
What’s at Stake?
Julia Zanatta leaves no doubt: DREX represents a profound shift in how money will be used and controlled in Brazil. More than a simple modernization of the financial system, the Central Bank’s CBDC sets precedents for an unprecedented level of citizen surveillance and control in the country. For the deputy, this transition needs to be debated broadly and transparently, and it’s up to the Brazilian people to defend their rights and demand that the National Congress discuss these changes responsibly.
The deputy also emphasizes that, regardless of political or partisan views, this issue affects all Brazilians. “This agenda is something that will affect everyone. We need to be united to ensure people understand the gravity of what could happen.” Julia believes that by sharing information and generating open debate, it is possible to prevent Brazil from following the path of countries that have already implemented a digital currency in an authoritarian way.
A Call to Action
The future of physical money in Brazil is at risk. For those who share Deputy Julia Zanatta’s concerns, the time to act is now. Mobilize, get informed, and press your representatives. PL 3341/2024 is an opportunity to ensure that Brazilian citizens have a choice in how to use their money, without excessive state interference or surveillance.
In the end, as the deputy puts it, the central issue is freedom. “My fear is that this project will pass, and people won’t even understand what is happening.” Therefore, may every citizen at least have the chance to understand what’s at stake and make their voice heard in defense of a Brazil where individual freedom and privacy are respected values.
-
@ eac63075:b4988b48
2024-10-21 08:11:11Imagine sending a private message to a friend, only to learn that authorities could be scanning its contents without your knowledge. This isn't a scene from a dystopian novel but a potential reality under the European Union's proposed "Chat Control" measures. Aimed at combating serious crimes like child exploitation and terrorism, these proposals could significantly impact the privacy of everyday internet users. As encrypted messaging services become the norm for personal and professional communication, understanding Chat Control is essential. This article delves into what Chat Control entails, why it's being considered, and how it could affect your right to private communication.
https://www.fountain.fm/episode/coOFsst7r7mO1EP1kSzV
https://open.spotify.com/episode/0IZ6kMExfxFm4FHg5DAWT8?si=e139033865e045de
Sections:
- Introduction
- What Is Chat Control?
- Why Is the EU Pushing for Chat Control?
- The Privacy Concerns and Risks
- The Technical Debate: Encryption and Backdoors
- Global Reactions and the Debate in Europe
- Possible Consequences for Messaging Services
- What Happens Next? The Future of Chat Control
- Conclusion
What Is Chat Control?
"Chat Control" refers to a set of proposed measures by the European Union aimed at monitoring and scanning private communications on messaging platforms. The primary goal is to detect and prevent the spread of illegal content, such as child sexual abuse material (CSAM) and to combat terrorism. While the intention is to enhance security and protect vulnerable populations, these proposals have raised significant privacy concerns.
At its core, Chat Control would require messaging services to implement automated scanning technologies that can analyze the content of messages—even those that are end-to-end encrypted. This means that the private messages you send to friends, family, or colleagues could be subject to inspection by algorithms designed to detect prohibited content.
Origins of the Proposal
The initiative for Chat Control emerged from the EU's desire to strengthen its digital security infrastructure. High-profile cases of online abuse and the use of encrypted platforms by criminal organizations have prompted lawmakers to consider more invasive surveillance tactics. The European Commission has been exploring legislation that would make it mandatory for service providers to monitor communications on their platforms.
How Messaging Services Work
Most modern messaging apps, like Signal, Session, SimpleX, Veilid, Protonmail and Tutanota (among others), use end-to-end encryption (E2EE). This encryption ensures that only the sender and the recipient can read the messages being exchanged. Not even the service providers can access the content. This level of security is crucial for maintaining privacy in digital communications, protecting users from hackers, identity thieves, and other malicious actors.
Key Elements of Chat Control
- Automated Content Scanning: Service providers would use algorithms to scan messages for illegal content.
- Circumvention of Encryption: To scan encrypted messages, providers might need to alter their encryption methods, potentially weakening security.
- Mandatory Reporting: If illegal content is detected, providers would be required to report it to authorities.
- Broad Applicability: The measures could apply to all messaging services operating within the EU, affecting both European companies and international platforms.
Why It Matters
Understanding Chat Control is essential because it represents a significant shift in how digital privacy is handled. While combating illegal activities online is crucial, the methods proposed could set a precedent for mass surveillance and the erosion of privacy rights. Everyday users who rely on encrypted messaging for personal and professional communication might find their conversations are no longer as private as they once thought.
Why Is the EU Pushing for Chat Control?
The European Union's push for Chat Control stems from a pressing concern to protect its citizens, particularly children, from online exploitation and criminal activities. With the digital landscape becoming increasingly integral to daily life, the EU aims to strengthen its ability to combat serious crimes facilitated through online platforms.
Protecting Children and Preventing Crime
One of the primary motivations behind Chat Control is the prevention of child sexual abuse material (CSAM) circulating on the internet. Law enforcement agencies have reported a significant increase in the sharing of illegal content through private messaging services. By implementing Chat Control, the EU believes it can more effectively identify and stop perpetrators, rescue victims, and deter future crimes.
Terrorism is another critical concern. Encrypted messaging apps can be used by terrorist groups to plan and coordinate attacks without detection. The EU argues that accessing these communications could be vital in preventing such threats and ensuring public safety.
Legal Context and Legislative Drivers
The push for Chat Control is rooted in several legislative initiatives:
-
ePrivacy Directive: This directive regulates the processing of personal data and the protection of privacy in electronic communications. The EU is considering amendments that would allow for the scanning of private messages under specific circumstances.
-
Temporary Derogation: In 2021, the EU adopted a temporary regulation permitting voluntary detection of CSAM by communication services. The current proposals aim to make such measures mandatory and more comprehensive.
-
Regulation Proposals: The European Commission has proposed regulations that would require service providers to detect, report, and remove illegal content proactively. This would include the use of technologies to scan private communications.
Balancing Security and Privacy
EU officials argue that the proposed measures are a necessary response to evolving digital threats. They emphasize the importance of staying ahead of criminals who exploit technology to harm others. By implementing Chat Control, they believe law enforcement can be more effective without entirely dismantling privacy protections.
However, the EU also acknowledges the need to balance security with fundamental rights. The proposals include provisions intended to limit the scope of surveillance, such as:
-
Targeted Scanning: Focusing on specific threats rather than broad, indiscriminate monitoring.
-
Judicial Oversight: Requiring court orders or oversight for accessing private communications.
-
Data Protection Safeguards: Implementing measures to ensure that data collected is handled securely and deleted when no longer needed.
The Urgency Behind the Push
High-profile cases of online abuse and terrorism have heightened the sense of urgency among EU policymakers. Reports of increasing online grooming and the widespread distribution of illegal content have prompted calls for immediate action. The EU posits that without measures like Chat Control, these problems will continue to escalate unchecked.
Criticism and Controversy
Despite the stated intentions, the push for Chat Control has been met with significant criticism. Opponents argue that the measures could be ineffective against savvy criminals who can find alternative ways to communicate. There is also concern that such surveillance could be misused or extended beyond its original purpose.
The Privacy Concerns and Risks
While the intentions behind Chat Control focus on enhancing security and protecting vulnerable groups, the proposed measures raise significant privacy concerns. Critics argue that implementing such surveillance could infringe on fundamental rights and set a dangerous precedent for mass monitoring of private communications.
Infringement on Privacy Rights
At the heart of the debate is the right to privacy. By scanning private messages, even with automated tools, the confidentiality of personal communications is compromised. Users may no longer feel secure sharing sensitive information, fearing that their messages could be intercepted or misinterpreted by algorithms.
Erosion of End-to-End Encryption
End-to-end encryption (E2EE) is a cornerstone of digital security, ensuring that only the sender and recipient can read the messages exchanged. Chat Control could necessitate the introduction of "backdoors" or weaken encryption protocols, making it easier for unauthorized parties to access private data. This not only affects individual privacy but also exposes communications to potential cyber threats.
Concerns from Privacy Advocates
Organizations like Signal and Tutanota, which offer encrypted messaging services, have voiced strong opposition to Chat Control. They warn that undermining encryption could have far-reaching consequences:
- Security Risks: Weakening encryption makes systems more vulnerable to hacking, espionage, and cybercrime.
- Global Implications: Changes in EU regulations could influence policies worldwide, leading to a broader erosion of digital privacy.
- Ineffectiveness Against Crime: Determined criminals might resort to other, less detectable means of communication, rendering the measures ineffective while still compromising the privacy of law-abiding citizens.
Potential for Government Overreach
There is a fear that Chat Control could lead to increased surveillance beyond its original scope. Once the infrastructure for scanning private messages is in place, it could be repurposed or expanded to monitor other types of content, stifling free expression and dissent.
Real-World Implications for Users
- False Positives: Automated scanning technologies are not infallible and could mistakenly flag innocent content, leading to unwarranted scrutiny or legal consequences for users.
- Chilling Effect: Knowing that messages could be monitored might discourage people from expressing themselves freely, impacting personal relationships and societal discourse.
- Data Misuse: Collected data could be vulnerable to leaks or misuse, compromising personal and sensitive information.
Legal and Ethical Concerns
Privacy advocates also highlight potential conflicts with existing laws and ethical standards:
- Violation of Fundamental Rights: The European Convention on Human Rights and other international agreements protect the right to privacy and freedom of expression.
- Questionable Effectiveness: The ethical justification for such invasive measures is challenged if they do not significantly improve safety or if they disproportionately impact innocent users.
Opposition from Member States and Organizations
Countries like Germany and organizations such as the European Digital Rights (EDRi) have expressed opposition to Chat Control. They emphasize the need to protect digital privacy and caution against hasty legislation that could have unintended consequences.
The Technical Debate: Encryption and Backdoors
The discussion around Chat Control inevitably leads to a complex technical debate centered on encryption and the potential introduction of backdoors into secure communication systems. Understanding these concepts is crucial to grasping the full implications of the proposed measures.
What Is End-to-End Encryption (E2EE)?
End-to-end encryption is a method of secure communication that prevents third parties from accessing data while it's transferred from one end system to another. In simpler terms, only the sender and the recipient can read the messages. Even the service providers operating the messaging platforms cannot decrypt the content.
- Security Assurance: E2EE ensures that sensitive information—be it personal messages, financial details, or confidential business communications—remains private.
- Widespread Use: Popular messaging apps like Signal, Session, SimpleX, Veilid, Protonmail and Tutanota (among others) rely on E2EE to protect user data.
How Chat Control Affects Encryption
Implementing Chat Control as proposed would require messaging services to scan the content of messages for illegal material. To do this on encrypted platforms, providers might have to:
- Introduce Backdoors: Create a means for third parties (including the service provider or authorities) to access encrypted messages.
- Client-Side Scanning: Install software on users' devices that scans messages before they are encrypted and sent, effectively bypassing E2EE.
The Risks of Weakening Encryption
1. Compromised Security for All Users
Introducing backdoors or client-side scanning tools can create vulnerabilities:
- Exploitable Gaps: If a backdoor exists, malicious actors might find and exploit it, leading to data breaches.
- Universal Impact: Weakening encryption doesn't just affect targeted individuals; it potentially exposes all users to increased risk.
2. Undermining Trust in Digital Services
- User Confidence: Knowing that private communications could be accessed might deter people from using digital services or push them toward unregulated platforms.
- Business Implications: Companies relying on secure communications might face increased risks, affecting economic activities.
3. Ineffectiveness Against Skilled Adversaries
- Alternative Methods: Criminals might shift to other encrypted channels or develop new ways to avoid detection.
- False Sense of Security: Weakening encryption could give the impression of increased safety while adversaries adapt and continue their activities undetected.
Signal’s Response and Stance
Signal, a leading encrypted messaging service, has been vocal in its opposition to the EU's proposals:
- Refusal to Weaken Encryption: Signal's CEO Meredith Whittaker has stated that the company would rather cease operations in the EU than compromise its encryption standards.
- Advocacy for Privacy: Signal emphasizes that strong encryption is essential for protecting human rights and freedoms in the digital age.
Understanding Backdoors
A "backdoor" in encryption is an intentional weakness inserted into a system to allow authorized access to encrypted data. While intended for legitimate use by authorities, backdoors pose several problems:
- Security Vulnerabilities: They can be discovered and exploited by unauthorized parties, including hackers and foreign governments.
- Ethical Concerns: The existence of backdoors raises questions about consent and the extent to which governments should be able to access private communications.
The Slippery Slope Argument
Privacy advocates warn that introducing backdoors or mandatory scanning sets a precedent:
- Expanded Surveillance: Once in place, these measures could be extended to monitor other types of content beyond the original scope.
- Erosion of Rights: Gradual acceptance of surveillance can lead to a significant reduction in personal freedoms over time.
Potential Technological Alternatives
Some suggest that it's possible to fight illegal content without undermining encryption:
- Metadata Analysis: Focusing on patterns of communication rather than content.
- Enhanced Reporting Mechanisms: Encouraging users to report illegal content voluntarily.
- Investing in Law Enforcement Capabilities: Strengthening traditional investigative methods without compromising digital security.
The technical community largely agrees that weakening encryption is not the solution:
- Consensus on Security: Strong encryption is essential for the safety and privacy of all internet users.
- Call for Dialogue: Technologists and privacy experts advocate for collaborative approaches that address security concerns without sacrificing fundamental rights.
Global Reactions and the Debate in Europe
The proposal for Chat Control has ignited a heated debate across Europe and beyond, with various stakeholders weighing in on the potential implications for privacy, security, and fundamental rights. The reactions are mixed, reflecting differing national perspectives, political priorities, and societal values.
Support for Chat Control
Some EU member states and officials support the initiative, emphasizing the need for robust measures to combat online crime and protect citizens, especially children. They argue that:
- Enhanced Security: Mandatory scanning can help law enforcement agencies detect and prevent serious crimes.
- Responsibility of Service Providers: Companies offering communication services should play an active role in preventing their platforms from being used for illegal activities.
- Public Safety Priorities: The protection of vulnerable populations justifies the implementation of such measures, even if it means compromising some aspects of privacy.
Opposition within the EU
Several countries and organizations have voiced strong opposition to Chat Control, citing concerns over privacy rights and the potential for government overreach.
Germany
- Stance: Germany has been one of the most vocal opponents of the proposed measures.
- Reasons:
- Constitutional Concerns: The German government argues that Chat Control could violate constitutional protections of privacy and confidentiality of communications.
- Security Risks: Weakening encryption is seen as a threat to cybersecurity.
- Legal Challenges: Potential conflicts with national laws protecting personal data and communication secrecy.
Netherlands
- Recent Developments: The Dutch government decided against supporting Chat Control, emphasizing the importance of encryption for security and privacy.
- Arguments:
- Effectiveness Doubts: Skepticism about the actual effectiveness of the measures in combating crime.
- Negative Impact on Privacy: Concerns about mass surveillance and the infringement of citizens' rights.
Table reference: Patrick Breyer - Chat Control in 23 September 2024
Privacy Advocacy Groups
European Digital Rights (EDRi)
- Role: A network of civil and human rights organizations working to defend rights and freedoms in the digital environment.
- Position:
- Strong Opposition: EDRi argues that Chat Control is incompatible with fundamental rights.
- Awareness Campaigns: Engaging in public campaigns to inform citizens about the potential risks.
- Policy Engagement: Lobbying policymakers to consider alternative approaches that respect privacy.
Politicians and Activists
Patrick Breyer
- Background: A Member of the European Parliament (MEP) from Germany, representing the Pirate Party.
- Actions:
- Advocacy: Actively campaigning against Chat Control through speeches, articles, and legislative efforts.
- Public Outreach: Using social media and public events to raise awareness.
- Legal Expertise: Highlighting the legal inconsistencies and potential violations of EU law.
Global Reactions
International Organizations
- Human Rights Watch and Amnesty International: These organizations have expressed concerns about the implications for human rights, urging the EU to reconsider.
Technology Companies
- Global Tech Firms: Companies like Apple and Microsoft are monitoring the situation, as EU regulations could affect their operations and user trust.
- Industry Associations: Groups representing tech companies have issued statements highlighting the risks to innovation and competitiveness.
The Broader Debate
The controversy over Chat Control reflects a broader struggle between security interests and privacy rights in the digital age. Key points in the debate include:
- Legal Precedents: How the EU's decision might influence laws and regulations in other countries.
- Digital Sovereignty: The desire of nations to control digital spaces within their borders.
- Civil Liberties: The importance of protecting freedoms in the face of technological advancements.
Public Opinion
- Diverse Views: Surveys and public forums show a range of opinions, with some citizens prioritizing security and others valuing privacy above all.
- Awareness Levels: Many people are still unaware of the potential changes, highlighting the need for public education on the issue.
The EU is at a crossroads, facing the challenge of addressing legitimate security concerns without undermining the fundamental rights that are central to its values. The outcome of this debate will have significant implications for the future of digital privacy and the balance between security and freedom in society.
Possible Consequences for Messaging Services
The implementation of Chat Control could have significant implications for messaging services operating within the European Union. Both large platforms and smaller providers might need to adapt their technologies and policies to comply with the new regulations, potentially altering the landscape of digital communication.
Impact on Encrypted Messaging Services
Signal and Similar Platforms
-
Compliance Challenges: Encrypted messaging services like Signal rely on end-to-end encryption to secure user communications. Complying with Chat Control could force them to weaken their encryption protocols or implement client-side scanning, conflicting with their core privacy principles.
-
Operational Decisions: Some platforms may choose to limit their services in the EU or cease operations altogether rather than compromise on encryption. Signal, for instance, has indicated that it would prefer to withdraw from European markets than undermine its security features.
Potential Blocking or Limiting of Services
-
Regulatory Enforcement: Messaging services that do not comply with Chat Control regulations could face fines, legal action, or even be blocked within the EU.
-
Access Restrictions: Users in Europe might find certain services unavailable or limited in functionality if providers decide not to meet the regulatory requirements.
Effects on Smaller Providers
-
Resource Constraints: Smaller messaging services and startups may lack the resources to implement the required scanning technologies, leading to increased operational costs or forcing them out of the market.
-
Innovation Stifling: The added regulatory burden could deter new entrants, reducing competition and innovation in the messaging service sector.
User Experience and Trust
-
Privacy Concerns: Users may lose trust in messaging platforms if they know their communications are subject to scanning, leading to a decline in user engagement.
-
Migration to Unregulated Platforms: There is a risk that users might shift to less secure or unregulated services, including those operated outside the EU or on the dark web, potentially exposing them to greater risks.
Technical and Security Implications
-
Increased Vulnerabilities: Modifying encryption protocols to comply with Chat Control could introduce security flaws, making platforms more susceptible to hacking and data breaches.
-
Global Security Risks: Changes made to accommodate EU regulations might affect the global user base of these services, extending security risks beyond European borders.
Impact on Businesses and Professional Communications
-
Confidentiality Issues: Businesses that rely on secure messaging for sensitive communications may face challenges in ensuring confidentiality, affecting sectors like finance, healthcare, and legal services.
-
Compliance Complexity: Companies operating internationally will need to navigate a complex landscape of differing regulations, increasing administrative burdens.
Economic Consequences
-
Market Fragmentation: Divergent regulations could lead to a fragmented market, with different versions of services for different regions.
-
Loss of Revenue: Messaging services might experience reduced revenue due to decreased user trust and engagement or the costs associated with compliance.
Responses from Service Providers
-
Legal Challenges: Companies might pursue legal action against the regulations, citing conflicts with privacy laws and user rights.
-
Policy Advocacy: Service providers may increase lobbying efforts to influence policy decisions and promote alternatives to Chat Control.
Possible Adaptations
-
Technological Innovation: Some providers might invest in developing new technologies that can detect illegal content without compromising encryption, though the feasibility remains uncertain.
-
Transparency Measures: To maintain user trust, companies might enhance transparency about how data is handled and what measures are in place to protect privacy.
The potential consequences of Chat Control for messaging services are profound, affecting not only the companies that provide these services but also the users who rely on them daily. The balance between complying with legal requirements and maintaining user privacy and security presents a significant challenge that could reshape the digital communication landscape.
What Happens Next? The Future of Chat Control
The future of Chat Control remains uncertain as the debate continues among EU member states, policymakers, technology companies, and civil society organizations. Several factors will influence the outcome of this contentious proposal, each carrying significant implications for digital privacy, security, and the regulatory environment within the European Union.
Current Status of Legislation
-
Ongoing Negotiations: The proposed Chat Control measures are still under discussion within the European Parliament and the Council of the European Union. Amendments and revisions are being considered in response to the feedback from various stakeholders.
-
Timeline: While there is no fixed date for the final decision, the EU aims to reach a consensus to implement effective measures against online crime without undue delay.
Key Influencing Factors
1. Legal Challenges and Compliance with EU Law
-
Fundamental Rights Assessment: The proposals must be evaluated against the Charter of Fundamental Rights of the European Union, ensuring that any measures comply with rights to privacy, data protection, and freedom of expression.
-
Court Scrutiny: Potential legal challenges could arise, leading to scrutiny by the European Court of Justice (ECJ), which may impact the feasibility and legality of Chat Control.
2. Technological Feasibility
-
Development of Privacy-Preserving Technologies: Research into methods that can detect illegal content without compromising encryption is ongoing. Advances in this area could provide alternative solutions acceptable to both privacy advocates and security agencies.
-
Implementation Challenges: The practical aspects of deploying scanning technologies across various platforms and services remain complex, and technical hurdles could delay or alter the proposed measures.
3. Political Dynamics
-
Member State Positions: The differing stances of EU countries, such as Germany's opposition, play a significant role in shaping the final outcome. Consensus among member states is crucial for adopting EU-wide regulations.
-
Public Opinion and Advocacy: Growing awareness and activism around digital privacy can influence policymakers. Public campaigns and lobbying efforts may sway decisions in favor of stronger privacy protections.
4. Industry Responses
-
Negotiations with Service Providers: Ongoing dialogues between EU authorities and technology companies may lead to compromises or collaborative efforts to address concerns without fully implementing Chat Control as initially proposed.
-
Potential for Self-Regulation: Messaging services might propose self-regulatory measures to combat illegal content, aiming to demonstrate effectiveness without the need for mandatory scanning.
Possible Scenarios
Optimistic Outcome:
- Balanced Regulation: A revised proposal emerges that effectively addresses security concerns while upholding strong encryption and privacy rights, possibly through innovative technologies or targeted measures with robust oversight.
Pessimistic Outcome:
- Adoption of Strict Measures: Chat Control is implemented as initially proposed, leading to weakened encryption, reduced privacy, and potential withdrawal of services like Signal from the EU market.
Middle Ground:
- Incremental Implementation: Partial measures are adopted, focusing on voluntary cooperation with service providers and emphasizing transparency and user consent, with ongoing evaluations to assess effectiveness and impact.
How to Stay Informed and Protect Your Privacy
-
Follow Reputable Sources: Keep up with news from reliable outlets, official EU communications, and statements from privacy organizations to stay informed about developments.
-
Engage in the Dialogue: Participate in public consultations, sign petitions, or contact representatives to express your views on Chat Control and digital privacy.
-
Utilize Secure Practices: Regardless of legislative outcomes, adopting good digital hygiene—such as using strong passwords and being cautious with personal information—can enhance your online security.
The Global Perspective
-
International Implications: The EU's decision may influence global policies on encryption and surveillance, setting precedents that other countries might follow or react against.
-
Collaboration Opportunities: International cooperation on developing solutions that protect both security and privacy could emerge, fostering a more unified approach to addressing online threats.
Looking Ahead
The future of Chat Control is a critical issue that underscores the challenges of governing in the digital age. Balancing the need for security with the protection of fundamental rights is a complex task that requires careful consideration, open dialogue, and collaboration among all stakeholders.
As the situation evolves, staying informed and engaged is essential. The decisions made in the coming months will shape the digital landscape for years to come, affecting how we communicate, conduct business, and exercise our rights in an increasingly connected world.
Conclusion
The debate over Chat Control highlights a fundamental challenge in our increasingly digital world: how to protect society from genuine threats without eroding the very rights and freedoms that define it. While the intention to safeguard children and prevent crime is undeniably important, the means of achieving this through intrusive surveillance measures raise critical concerns.
Privacy is not just a personal preference but a cornerstone of democratic societies. End-to-end encryption has become an essential tool for ensuring that our personal conversations, professional communications, and sensitive data remain secure from unwanted intrusion. Weakening these protections could expose individuals and organizations to risks that far outweigh the proposed benefits.
The potential consequences of implementing Chat Control are far-reaching:
- Erosion of Trust: Users may lose confidence in digital platforms, impacting how we communicate and conduct business online.
- Security Vulnerabilities: Introducing backdoors or weakening encryption can make systems more susceptible to cyberattacks.
- Stifling Innovation: Regulatory burdens may hinder technological advancement and competitiveness in the tech industry.
- Global Implications: The EU's decisions could set precedents that influence digital policies worldwide, for better or worse.
As citizens, it's crucial to stay informed about these developments. Engage in conversations, reach out to your representatives, and advocate for solutions that respect both security needs and fundamental rights. Technology and policy can evolve together to address challenges without compromising core values.
The future of Chat Control is not yet decided, and public input can make a significant difference. By promoting open dialogue, supporting privacy-preserving innovations, and emphasizing the importance of human rights in legislation, we can work towards a digital landscape that is both safe and free.
In a world where digital communication is integral to daily life, striking the right balance between security and privacy is more important than ever. The choices made today will shape the digital environment for generations to come, determining not just how we communicate, but how we live and interact in an interconnected world.
Thank you for reading this article. We hope it has provided you with a clear understanding of Chat Control and its potential impact on your privacy and digital rights. Stay informed, stay engaged, and let's work together towards a secure and open digital future.
Read more:
- https://www.patrick-breyer.de/en/posts/chat-control/
- https://www.patrick-breyer.de/en/new-eu-push-for-chat-control-will-messenger-services-be-blocked-in-europe/
- https://edri.org/our-work/dutch-decision-puts-brakes-on-chat-control/
- https://signal.org/blog/pdfs/ndss-keynote.pdf
- https://tuta.com/blog/germany-stop-chat-control
- https://cointelegraph.com/news/signal-president-slams-revised-eu-encryption-proposal
- https://mullvad.net/en/why-privacy-matters
-
@ 872982aa:8fb54cfe
2025-04-18 01:40:04博客和微博不一样,他是思考过的内容,所以,我认为他和书的性质相近。
他一定有修改更新功能。所以,我觉得要有存草稿功能,如何保存草稿呢?还没有想好,需要认真想想。按照标题保存?按照时间保存?
-
@ c1e9ab3a:9cb56b43
2025-04-15 13:59:17Prepared for Off-World Visitors by the Risan Institute of Cultural Heritage
Welcome to Risa, the jewel of the Alpha Quadrant, celebrated across the Federation for its tranquility, pleasure, and natural splendor. But what many travelers do not know is that Risa’s current harmony was not inherited—it was forged. Beneath the songs of surf and the serenity of our resorts lies a history rich in conflict, transformation, and enduring wisdom.
We offer this briefing not merely as a tale of our past, but as an invitation to understand the spirit of our people and the roots of our peace.
I. A World at the Crossroads
Before its admittance into the United Federation of Planets, Risa was an independent and vulnerable world situated near volatile borders of early galactic powers. Its lush climate, mineral wealth, and open society made it a frequent target for raiders and an object of interest for imperial expansion.
The Risan peoples were once fragmented, prone to philosophical and political disunity. In our early records, this period is known as the Winds of Splintering. We suffered invasions, betrayals, and the slow erosion of trust in our own traditions.
II. The Coming of the Vulcans
It was during this period of instability that a small delegation of Vulcan philosophers, adherents to the teachings of Surak, arrived on Risa. They did not come as conquerors, nor even as ambassadors, but as seekers of peace.
These emissaries of logic saw in Risa the potential for a society not driven by suppression of emotion, as Vulcan had chosen, but by the balance of joy and discipline. While many Vulcans viewed Risa’s culture as frivolous, these followers of Surak saw the seed of a different path: one in which beauty itself could be a pillar of peace.
The Risan tradition of meditative dance, artistic expression, and communal love resonated with Vulcan teachings of unity and inner control. From this unlikely exchange was born the Ricin Doctrine—the belief that peace is sustained not only through logic or strength, but through deliberate joy, shared vulnerability, and readiness without aggression.
III. Betazed and the Trial of Truth
During the same era, early contact with the people of Betazed brought both inspiration and tension. A Betazoid expedition, under the guise of diplomacy, was discovered to be engaging in deep telepathic influence and information extraction. The Risan people, who valued consent above all else, responded not with anger, but with clarity.
A council of Ricin philosophers invited the Betazoid delegation into a shared mind ceremony—a practice in which both cultures exposed their thoughts in mutual vulnerability. The result was not scandal, but transformation. From that moment forward, a bond was formed, and Risa’s model of ethical emotional expression and consensual empathy became influential in shaping Betazed’s own peace philosophies.
IV. Confronting Marauders and Empires
Despite these philosophical strides, Risa’s path was anything but tranquil.
-
Orion Syndicate raiders viewed Risa as ripe for exploitation, and for decades, cities were sacked, citizens enslaved, and resources plundered. In response, Risa formed the Sanctum Guard, not a military in the traditional sense, but a force of trained defenders schooled in both physical technique and psychological dissuasion. The Ricin martial arts, combining beauty with lethality, were born from this necessity.
-
Andorian expansionism also tested Risa’s sovereignty. Though smaller in scale, skirmishes over territorial claims forced Risa to adopt planetary defense grids and formalize diplomatic protocols that balanced assertiveness with grace. It was through these conflicts that Risa developed the art of the ceremonial yield—a symbolic concession used to diffuse hostility while retaining honor.
-
Romulan subterfuge nearly undid Risa from within. A corrupt Romulan envoy installed puppet leaders in one of our equatorial provinces. These agents sought to erode Risa’s social cohesion through fear and misinformation. But Ricin scholars countered the strategy not with rebellion, but with illumination: they released a network of truths, publicly broadcasting internal thoughts and civic debates to eliminate secrecy. The Romulan operation collapsed under the weight of exposure.
-
Even militant Vulcan splinter factions, during the early Vulcan-Andorian conflicts, attempted to turn Risa into a staging ground, pressuring local governments to support Vulcan supremacy. The betrayal struck deep—but Risa resisted through diplomacy, invoking Surak’s true teachings and exposing the heresy of their logic-corrupted mission.
V. Enlightenment Through Preparedness
These trials did not harden us into warriors. They refined us into guardians of peace. Our enlightenment came not from retreat, but from engagement—tempered by readiness.
- We train our youth in the arts of balance: physical defense, emotional expression, and ethical reasoning.
- We teach our history without shame, so that future generations will not repeat our errors.
- We host our guests with joy, not because we are naïve, but because we know that to celebrate life fully is the greatest act of resistance against fear.
Risa did not become peaceful by denying the reality of conflict. We became peaceful by mastering our response to it.
And in so doing, we offered not just pleasure to the stars—but wisdom.
We welcome you not only to our beaches, but to our story.
May your time here bring you not only rest—but understanding.
– Risan Institute of Cultural Heritage, in collaboration with the Council of Enlightenment and the Ricin Circle of Peacekeepers
-
-
@ d7a8e245:27456aad
2025-04-17 16:01:04Bibel-Selfies
Prompts
Eva, Schlange, Apfel und Adam
A selfie of a woman resembling eve in the time of old testament, blurred body, holding an apple, kneeling in front adam. he has a shocked expression with his mouth open and wide eyes, evoking a sense of both fear and surprise. The scene appears surreal, with a huge snake behind her. The photo is taken with a wide-angle lens, adding to the dramatic and humorous effect. The setting is reminiscent of a scene with adam and eve, possibly at a place like garden eden. The style of the photo blends surrealism with humor, similar to the style of Yasir Khan Chaudha --v 6.0
Tochter des Pharao mit Mose
A selfie of the biblical figure moabite woman with her baby in front of an oasis. She is wearing traditional and has black hair. The background shows water from the desert oasis and grasses around it. In the Background a wicker basket on the water. The photo was taken in the style of a selfie shot with GoPro camera
Simon Petrus
A selfie of a man resembling Simon Petrus, wearing a white robe, surrounded by waves and thunderstorm. He has a shocked expression with his mouth open and wide eyes, evoking a sense of both humor and surprise. The scene appears surreal, with many waves behind him. The photo is taken with a wide-angle lens, adding to the dramatic and humorous effect. The setting is reminiscent of a scene with jesus at the dead sea, possibly at a place like the sea. The style of the photo blends surrealism with humor, similar to the style of Yasir Khan Chaudhary --v 6.0
Zachäus auf dem Baum
A selfie of a man resembling a roman in the time of jesus, wearing a glamorous robe, surrounded by the crown of a tree. He has a shocked expression with his mouth open and wide eyes, evoking a sense of both humor and surprise. The scene appears surreal, with many leaves behind him. The photo is taken with a wide-angle lens, adding to the dramatic and humorous effect. The setting is reminiscent of a scene with jesus walking by, possibly at a place like the jerusalem. The style of the photo blends surrealism with humor, similar to the style of Yasir Khan Chaudhary --v 6.0
Maria am Ostermorgen
A selfie of a woman resembling maria in the time of jesus, wearing a robe, kneeling in front of stone grave. she has a shocked expression with her mouth open and wide eyes, evoking a sense of both fear and surprise. The scene appears surreal, with the open glowing grave behind her. The photo is taken with a wide-angle lens, adding to the dramatic and humorous effect. The setting is reminiscent of a scene with jesus resurrection, possibly at a place like the jerusalem. The style of the photo blends surrealism with humor, similar to the style of Yasir Khan Chaudhary --v 6.0
Der verlorene Sohn bei den Schweinen
A young ancient arabic man with short hair in the time of jesus, brown eyes, and a dirty face, covered in mud from working on his pig farm, takes an amateur selfie at dusk. He is surrounded by pig stables, with a barn visible in the background and pigs seen near the front. The photo captures a raw, authentic moment, as he gazes directly into the camera with an expression of excitement or wonder. The image has a realistic style, akin to Unsplash photography, and is meant to be posted on a primitive-themed social network. The resolution of the photo is high, style of selfie with gopro --v 6.0
Vater und Sohn vereint
A selfie of an Arab father in simple garments in the time of jesus, embracing and hugging a young man. The father's face, visible in the foreground, radiates joy and relief. Only the back of the son's head is visible, as he faces away from the camera, returning the embrace in tattered clothing. In the background, a large ancient house and other family members can be seen watching from a distance, blurred. The photo is taken with a wide-angle lens using a GoPro, enhancing the dramatic and overwhelming effect of the scene --v 6.0
Bartimäus
A selfie of a man resembling blind bartimaeus in the time of jesus, black and brown and white bandages on his head over his eyes and face, wearing a robe, kneeling in front of a market place. he has a shocked expression with his mouth open and wide eyes still covered with black and brown and white bandages on his head, evoking a sense of both fear and surprise. The scene appears surreal, with many sand behind him. The photo is taken with a wide-angle lens, adding to the dramatic and humorous effect. The setting is reminiscent of a scene with jesus healing the blind, possibly at a place like the jerusalem. The style of the photo blends surrealism with humor, similar to the style of Yasir Khan Chaudha --v 6.0
Daniel in der Löwengrube
A selfie of a man resembling Jesus, wearing a beige hoodie, surrounded by lions and cheetahs. He has a shocked expression with his mouth open and wide eyes, evoking a sense of both humor and surprise. The scene appears surreal, with many lions behind him. The photo is taken with a wide-angle lens, adding to the dramatic and humorous effect. The setting is reminiscent of a lion's den, possibly at a place like the Grand Tabahar. The style of the photo blends surrealism with humor, similar to the style of Yasir Khan Chaudhary
David und Goliath
selfie of a the boy and shepherd david holding his slingshot resembling a fight with the giant goliath in the time of old testament, wearing a glamorous sligshot focusing on his giant opponent. David has a shocked expression with his mouth open and wide eyes, evoking a sense of both humor and surprise. The scene appears surreal, with a desert surrounding him. The photo is taken with a wide-angle lens, adding to the dramatic and humorous effect. The setting is reminiscent of the scene of David fighting with the giant goliath with his slingshot, possibly at a place like the jerusalem. The style of the photo blends surrealism with humor, similar to the style of Yasir Khan Chaudhary --v 6.0
Simson im Philistertempel
A selfie of a man resembling simson in the time of old testament, wearing a glamorous beard and long hair, surrounded by thousands of ancient fighters. He has a shocked expression with his mouth open and wide eyes, evoking a sense of both humor and surprise. The scene appears surreal, with a temple surrounding him. The photo is taken with a wide-angle lens, adding to the dramatic and humorous effect. The setting is reminiscent of a scene with jesus walking by, possibly at a place like the jerusalem. The style of the photo blends surrealism with humor, similar to the style of Yasir Khan Chaudhary --v 6.0
Jona und der Wal
A selfie of a man resembling israeli jona in the time of old testament,`wearing a glamorous beard and long hair, inside the body of a whale. He has a shocked expression with his mouth open and wide eyes, evoking a sense of both humor and surprise. The scene appears surreal, with the ocean surrounding him. The photo is taken with a wide-angle lens, adding to the dramatic and humorous effect. The setting is reminiscent of a scene in the bible. The style of the photo blends surrealism with humor, similar to the style of Yasir Khan Chaudhary
Jakob und Isaak
A selfie of a young man resembling an ancient Arabic in clothes made of skins of goats and furs of the goats, looking overwhelmed and distressed as he betrays his father, who blesses him. The scene shows a dawn sky with hints of the sunrise, evoking a surreal and dramatic atmosphere. The scene is set in ancient Jerusalem, with stone buildings. in the background an old man with a gesture of blessing, rising his hands to the sky, The photo is taken with a wide-angle lens, blending surrealism with humor. The style is reminiscent of a GoPro selfie, capturing the intense moment with a sense of both fear and surprise
Petrus und der Hahn
A selfie of a man resembling ancient young arabic man saint in traditional biblical attire, being eaten by a whale,. he has a shocked expression with his mouth pressed and wide eyes, evoking a sense of both fear and surprise. The scene appears surreal, with one rooster crowing out loud behind the man. The photo is taken with a wide-angle lens, adding to the dramatic and humorous effect. The setting is reminiscent of a scene with peter and the rooster, possibly at a place in jerusalem . The style of the photo blends surrealism with humor, go pro selfie, morning dawn near sunrise setting
Josef im Brunnen
A selfie of an ancient israelian man with a magical dreamcoat clothing in a deep well, looking at the camera from above, captured in the style of a go pro selfie stick
Elia und die Raben
A close-up selfie of a bearded man (Elijah) in biblical clothing, smiling gratefully. He is standing near a stream in a secluded, rocky area. Several black ravens are perched on his shoulders and arms, holding pieces of bread and meat in their beaks. The scene has a warm, golden light, symbolizing God's provision. Photorealistic style, high detail.
Absalom im Baum
A selfie of a man resembling of a young man (Absalom) with long hair knotted arount the branches of a large oak tree.. He has a shocked expression with his mouth open and wide eyes, evoking a sense of both humor and surprise. The scene appears surreal, with all of his hairs knotted around the tree. The photo is taken with a wide-angle lens, adding to the dramatic and humorous effect. The setting is reminiscent of a scene of a robin hood movie in the forest . The style of the photo blends surrealism with humor
Ruth und Boas im Weizenfeld
A selfie of a young woman resembling Ruth, with a radiant smile and sun-kissed skin. She's standing in a golden wheat field at sunset, her arms filled with freshly gathered sheaves of wheat. Her hair is partially covered with a simple headscarf, with loose strands blowing in the wind. She has a look of joy and gratitude in her eyes. The scene appears idyllic, with wheat stalks seeming to embrace her. In the background, a distinguished older man (Boaz) can be seen watching from a distance, his expression a mix of curiosity and admiration. The photo is taken with a wide-angle lens, capturing the vastness of the field, the warmth of the setting sun, and Boaz in the distance. The setting is reminiscent of a biblical harvest scene. The style of the photo blends realism with a touch of romantic nostalgia.
"Bibel-Selfies" von Jörg Lohrer Lizenz: CC0 1.0
.
`
-
@ cffd7b79:dd8ca91f
2025-04-17 15:14:18There aren't many Minecraft servers that have bitcoin involved, but recently I saw a server that finally has one, its called SovereignCraft. A server that is different from Satlantis(Now called Tribyu). How does one differ from Satlantis that got shutdown because of it? I'll tell you why my friend.
What differs between them is that Satlantis had a pay-to-win mechanic where the more "ASICs" you had the more likely you will get a block of sats. Therefore, the clan/player who had the most "ASICs" gets more sats than other players making it unfair for new players. Making it so newbies have to spend more sats than usual just so to get a scratch of sats. To get a picture of that situation think of this
SovereignCraft, however doesnt do that, instead it does actual 1:1 market exchange. It does NOT do virtual mining nor pay-to-win. You simply trade your sats for items you want for minecraft and vice versa.
EDIT: Sovtoshi, the owner of Sovereigncraft made a comment on more of the difference sovereigncraft has than Satlantis/Tribyu. Give it a look
-
@ fbf0e434:e1be6a39
2025-04-17 12:49:04Hackathon 概述
由 Injective 和 ElizaOS 主办的 Injective AI Agent Hackathon 吸引了 496 名参与者,最终提交了 126 个获批项目。本次 Hackathon 突显了 AI 和 区块链 的结合,展示了 AI 代理在去中心化网络中运作的潜力,并推动了超越传统金融的创新。参与者探索了多种应用,包括自主交易、代币化资产管理和 AI 驱动的金融洞察。
本次设立的奖池高达 $100,000, 其中 $50,000 为Grant Prizes,还有其他重要项目的额外奖项。通过将 AI 的适应性与区块链的透明性结合,本次 Hackathon 展示了这些技术的变革潜力,并标志着在展示 AI 和区块链整合创新潜力方面一个重要的里程碑。
Hackathon 获奖者
-
Jecta: Jecta 集成了多个大型语言模型(LLM),以自动化 Injective 区块链上的任务。它专注于透明性和社区驱动的开发,利用开源技术提升使用的简便性和效率。
-
Paradyze: Paradyze 通过为区块链交易引入自然语言接口来改善 Injective 生态系统。其设计旨在增强可访问性和安全性,使用户能够以简单的交互方式进行操作。
要查看所有项目,请访问 Injective AI Hackathon 页面。
关于组织者
Injective
Injective 是一个基于区块链的组织,专注于开发去中心化金融(DeFi)解决方案。它以创建优化 DeFi 应用的可互操作的 Layer-1 区块链而闻名,促进快速且安全的交易。值得注意的项目包括 Injective Protocol,该协议增强了去中心化交易的跨链能力。
Injective 的使命是通过提供可访问且可靠的去中心化基础设施推动金融自由,为多样化的金融服务赋能,支持用户和开发者在区块链生态系统中进行创新。
-
-
@ 29ccddd8:49860677
2025-04-17 11:31:54Der Kauf einer Sexpuppe ist heutzutage so individuell wie der persönliche Geschmack. Angesichts der großen Auswahl an Modellen, Materialien und Funktionen kann die Entscheidung schnell überwältigend wirken. Mit diesem Ratgeber erhältst du praktische Tipps, um die perfekte Real Doll nach deinen Bedürfnissen und deinem Budget auszuwählen.
1. Materialien: Silikon oder TPE?
Silikon und TPE (Thermoplastisches Elastomer) sind die gängigsten Materialien für hochwertige Sexpuppen.
- Silikon
- Vorteile: Sehr langlebig, hitzebeständig, realistisch in Optik und Haptik, leicht zu reinigen.
- Nachteile: Meist teurer als TPE, weniger flexibel.
- TPE
- Vorteile: Sehr weich und elastisch, fühlt sich hautähnlich an, meist günstiger.
- Nachteile: Empfindlicher gegenüber Hitze, benötigt mehr Pflege, kann leichter Flecken aufnehmen.
Tipp: Wer Wert auf maximale Realitätsnähe und Pflegeleichtigkeit legt, wählt Silikon. Für ein begrenztes Budget und ein besonders weiches Gefühl ist TPE eine gute Wahl.
2. Funktionen: Mehr als nur Optik
Moderne lebensgroße Sexpuppe bieten eine Vielzahl von Funktionen:
- Bewegliche Gelenke: Für realistische Posen und Stellungen.
- Heizfunktion: Für eine natürliche, körperwarme Temperatur.
- Soundmodule: Für akustische Stimulation.
- Austauschbare Teile: Verschiedene Köpfe, Perücken und Outfits sorgen für Abwechslung.
- Smart Dolls: Modelle mit KI-Interaktion, Sprachsteuerung oder App-Anbindung.
Tipp: Überlege dir vor dem Kauf, welche Funktionen dir wirklich wichtig sind – sie beeinflussen maßgeblich den Preis.
3. Budget: Was kostet eine hochwertige Real Doll?
Die Preisspanne ist groß und hängt von Material, Größe, Detailgrad und zusätzlichen Features ab:
- Einfache Modelle: ab ca. 500 € (meist kleinere, weniger detaillierte Puppen)
- Mittelklasse: 1.000–2.000 € (lebensechte Körpergröße, realistische Optik, gute Materialien)
- Premiumklasse: ab 2.000 € (hochwertiges Silikon, viele Funktionen, individuelle Gestaltung)
Tipp: Achte auf versteckte Kosten wie Versand, Zoll und Zubehör. Bei seriösen Shops sind diese meist inklusive.
4. Worauf sollte man beim Kauf achten?
- Seriöse Händler: Achte auf Zertifikate (CE, RoHS, ggf. FDA), transparente Preise, diskreten Versand und guten Kundenservice.
- Pflege & Reinigung: Informiere dich über Reinigungsmöglichkeiten und Pflegeprodukte, um die Lebensdauer deiner real sex doll zu verlängern.
- Datenschutz: Seriöse Anbieter garantieren diskrete Verpackung und Schutz deiner Daten.
Fazit: Deine perfekte Sexdoll wartet
Mit der richtigen Vorbereitung findest du garantiert die silikon sexpuppe, die zu dir passt. Überlege dir, welches Material und welche Funktionen dir am wichtigsten sind – und setze dir ein Budget. Achte beim Kauf auf Qualität, Sicherheit und einen vertrauenswürdigen Anbieter.
- Silikon
-
@ 7d33ba57:1b82db35
2025-04-17 10:49:33Kraków is one of Europe’s most beautiful and historically rich cities. With its medieval charm, vibrant squares, haunting WWII history, and buzzing student life, Kraków effortlessly blends past and present. It’s the kind of place where you can walk cobblestone streets in the morning, sip craft cocktails by evening, and dive into centuries of culture in between.
🏰 Top Things to Do in Kraków
🏙️ Old Town (Stare Miasto)
- A UNESCO World Heritage Site full of Gothic, Renaissance, and Baroque architecture
- Wander through the Main Market Square (Rynek Główny)—Europe’s largest medieval square
- Visit the Cloth Hall (Sukiennice) for local crafts and the St. Mary’s Basilica, where a trumpeter plays every hour from the tower
🏰 Wawel Castle
- Iconic royal residence on a hill overlooking the Vistula River
- Explore the Royal Apartments, cathedral, and the Dragon’s Den cave (legend says a dragon once lived there!)
🕍 Kazimierz (Jewish Quarter)
- A vibrant area packed with synagogues, street art, and hip cafes
- Once the heart of Jewish life, it’s now a lively cultural hub—especially great for food, bars, and vintage shops
- Don’t miss Plac Nowy for late-night zapiekanki (Polish-style baguette pizza)
🌆 Schindler’s Factory
- A deeply moving museum inside the former factory of Oskar Schindler, telling the story of Kraków during Nazi occupation
- Located in Podgórze, near the remains of the Kraków Ghetto
⛪ Nowa Huta
- A planned socialist city turned edgy neighborhood
- Soviet-style architecture, unique local flavor, and great for urban exploration
🕊️ Day Trips from Kraków
🚐 Auschwitz-Birkenau Memorial
- A must-visit for historical reflection and remembrance
- About 1.5 hours away, best visited on a guided tour
⛰️ Wieliczka Salt Mine
- A surreal underground world carved from salt—chambers, sculptures, and even chapels
- Just 30 minutes outside the city
🍽️ What to Eat in Kraków
- 🥟 Pierogi – Dumplings with fillings like cheese, potatoes, or meat
- 🍲 Żurek – Sour rye soup with sausage and egg
- 🐷 Gołąbki – Cabbage rolls stuffed with meat and rice
- 🧁 Try obwarzanek krakowski (a pretzel-like street snack)
- 🍻 Wash it all down with Polish beer, vodka, or mulled wine in winter
🗓️ Best Time to Visit
- Spring (Apr–Jun): Mild weather and blooming gardens
- Summer (Jul–Aug): Festivals and al fresco dining (can get busy)
- Autumn (Sept–Oct): Fewer crowds, golden cityscapes
- Winter (Dec): Magical Christmas markets and snow-dusted rooftops
-
@ 7d33ba57:1b82db35
2025-04-17 08:46:22Oslo, the capital of Norway, is where sleek Scandinavian design, deep Viking roots, and stunning fjord views come together. Surrounded by forests and water, Oslo is one of Europe’s greenest and most livable cities, with a creative, outdoorsy spirit and world-class museums.
🏙️ Top Things to Do in Oslo
🎨 Vigeland Sculpture Park (Frogner Park)
- A surreal, open-air park filled with over 200 sculptures by Gustav Vigeland
- It’s free and open year-round—great for a stroll or picnic
🛶 Oslofjord and Island Hopping
- Take a ferry or kayak around the Oslofjord
- Visit Hovedøya, Gressholmen, or Lindøya for swimming, hiking, and picnicking
🖼️ The National Museum & MUNCH
- The National Museum holds iconic works, including Munch’s The Scream
- Visit the new MUNCH Museum on the waterfront for a deeper dive into the artist’s life
⛵ Aker Brygge & Tjuvholmen
- Trendy harborside neighborhoods full of restaurants, bars, and galleries
- Great for a waterside meal or people-watching
🏰 Akershus Fortress
- A medieval castle with epic views over the Oslofjord
- Walk along the fortress walls and explore Oslo’s early history
🏛️ The Viking Ship Museum (Reopening in 2026)
- Currently under renovation, but a must-visit when it reopens—actual Viking ships and artifacts!
🌲 Nature Close to the City
🌳 Nordmarka Forest
- Miles of trails for hiking, biking, skiing, or lake swimming just 20 minutes from the center
- Hop on the metro to Frognerseteren for panoramic views and waffles at a mountain hut
🏞️ Ekebergparken
- Sculpture park on a hill with views over Oslo
- Mix of art, forest trails, and history
🍽️ What to Eat & Drink
- Salmon, reindeer, and meatballs (kjøttkaker)
- Try a pølse (Norwegian hot dog) with crispbread
- Don’t miss kanelsnurrer (cinnamon buns) or brown cheese (brunost)
- Local craft beer or a glass of Akevitt, Norway’s signature spirit
🗓️ Best Time to Visit
- Summer (June–Aug): Long days, festivals, island hopping, and café life
- Winter (Dec–Feb): Great for skiing, winter lights, and cozy vibes
- Shoulder seasons: Fewer crowds, moody beauty, and great museum access
🧭 Travel Tips
- Oslo is compact—walk or use public transport (Oslo Pass is a great deal!)
- Tap water is pristine, and locals are super friendly
- Many attractions are closed on Mondays—plan ahead
- Bring layers—weather can shift fast!
-
@ 0b5faac9:12669905
2025-04-17 08:05:44In the wave of digitalization, handwriting as a way to record thoughts and inspire inspiration is gradually being forgotten. Mobile phone notifications, drone hums and ubiquitous wireless signals make it difficult for us to calm down and hold a pen to write. How to regain the time of handwriting and find the pure joy of creation? With the help of tools such as mobile phone jammers, drone jammers and high-power jammers, we can block interference and create a focused writing space.
1. The threat of digital interference to handwriting
Mobile phone intrusion: Frequent notifications, social media and calls interrupt thoughts, making it difficult to focus on the smooth expression between paper and pen.
Drone noise: When writing outdoors, the hum or monitoring of drones not only destroys the atmosphere, but may also cause privacy concerns.
Wireless signal clutter: WiFi, Bluetooth and other signals invisibly distract attention and weaken the immersion when writing.
https://www.jammermfg.com/cell-phone-jammers.html
2. The guardian of handwriting
Mobile phone jammer: By blocking mobile phone signals, mobile phone jammers make your device temporarily "disconnected", eliminating the interference of notifications and calls, suitable for focused writing at home or in a cafe.
Drone jammer: When writing outdoors, drone jammers can block drone signals to prevent their noise or surveillance from disrupting your creative mood.
https://www.jammermfg.com/drone-jammer.html
High-power jammer: For scenes that require a large range of quiet environments, such as writing workshops, high-power jammers can block multiple wireless signals to create a pure "signal pure land".
3. Practical methods to regain handwriting
In addition to using jammers, cultivating handwriting habits can also improve concentration:
- Fixed handwriting time: arrange 30 minutes to 1 hour of "interference-free handwriting time" every day, use mobile phone jammers to ensure that you are not disturbed, and record inspiration or diary.
- Choose a comfortable scene: write in a quiet study or outdoor natural environment, and use drone jammers to protect the tranquility of outdoor creation.
4. Your creative partner
https://www.jammermfg.com/high-power-military-jammer.html
To regain handwriting time, it is crucial to choose a reliable jammer. Jammermfg provides a variety of solutions to meet the needs of different creative scenarios:
- Diversified products: from portable mobile phone jammers to high-power jammers, covering a variety of indoor and outdoor writing environments.
- Professional support: Provide purchase suggestions and usage guidance to ensure that the equipment is perfectly adapted to your handwriting needs.
Conclusion
Handwriting is a bridge between the heart and the world, but we need to actively make room for it. With the help of mobile phone jammers, drone jammers and high-power jammers, combined with scientific writing habits, we can stay away from distractions and regain the fun and depth of handwriting.
-
@ 95cb4330:96db706c
2025-04-17 07:12:01Summary and Guide Based on Sam Altman's Classic Post
In life and business, almost everyone starts off chasing money. But if you observe closely — especially among those who achieve outlier success — you’ll notice something interesting:
Over time, money becomes secondary. The real obsession becomes making something important happen.
Sam Altman, entrepreneur and CEO of OpenAI, laid out a roadmap to achieving this rare level of success. It’s about much more than working hard or being smart — it’s about how you think, act, and invest your time over decades.
Here's a deep breakdown of his 13 principles — explained, with examples and reflections.
1. Compound Yourself
Think exponentially, not linearly.
- Businesses (and careers) that compound — growing 50% per year — become unstoppable over time.
- You want your learning, network, and impact to snowball.
- Focus on adding zeros to your results, not just small wins.
🔎 Example: Instead of focusing on one-off gigs, build skills and systems that grow your results faster every year. Think like an investor, not an hourly worker.
2. Have (Almost) Too Much Self-Belief
You have to believe in yourself beyond reason — but stay open to feedback.
- Most real innovation requires contrarian thinking.
- Early critics will tell you you're crazy — and that’s normal.
- Learn to manage your own morale.
🔎 Example: Elon Musk’s absolute certainty about colonizing Mars — even when few believed him — fueled SpaceX’s breakthrough innovations.
3. Learn to Think Independently
Original thinking can’t be taught by schools.
- Break problems into first principles instead of copying others.
- Test crazy ideas quickly and cheaply.
- The ability to "figure things out when no one knows what to do" is a superpower.
🔎 Example: Airbnb founders had no roadmap for building a company based on renting strangers' homes — they made it up as they went.
4. Get Good at Sales
It’s not enough to have a great idea — you must convince others to join you.
- Great careers and startups are sales jobs: selling visions to investors, customers, and employees.
- The best sales come from genuine belief in what you're building.
🔎 Example: Altman emphasizes in-person interactions: “When it mattered, I always got on the plane.”
5. Make It Easy to Take Risks
Big rewards require many small bets and the willingness to look foolish.
- Risk is overestimated; reward is underestimated.
- Stay financially and mentally flexible early in life.
🔎 Example: Leaving a high-paying tech job is hard — but those who leap to start companies often change the world.
6. Focus
Doing the right work matters more than working hard on the wrong things.
- Ruthlessly prioritize what truly matters.
- Ignore distractions.
- Be unstoppable once you know what to focus on.
🔎 Example: Startups win by focusing on one core thing until they dominate, not by trying to do everything.
7. Work Hard
- Smart + hard work is required to reach the top 1% of any field.
- Success begets success — momentum compounds.
- Find work you love and people you love working with to avoid burnout.
🔎 Example: Early Amazon teams pulled insane hours — but they believed they were building something world-changing.
8. Be Bold
- Solve hard problems, not easy ones.
- People are attracted to missions that matter.
🔎 Example: If your dream is gene-editing or AI, don’t settle for building another social media app.
9. Be Willful
- The world is more malleable than you think.
- Persistence and optimism often win in the end.
🔎 Example: Airbnb founders survived maxed-out credit cards and endless rejection — but they didn't quit.
10. Be Hard to Compete With
- Differentiate yourself through leverage:
- Skills at the intersection of fields
- Strong personal brand
- Unique insights
🔎 Example: Elon Musk isn't just an engineer or marketer — he's both, and that makes him hard to beat.
11. Build a Network
- Great accomplishments require great teams.
- Help people long before you need them.
- Spot undiscovered talent early.
🔎 Example: Most of Altman’s best career opportunities came from helping others years before it paid off.
12. Own Equity
- Salaries won't make you rich.
- Owning assets (companies, IP, real estate) creates real wealth.
🔎 Example: The richest people in the world — Bezos, Musk, Gates — got there by owning companies, not by drawing salaries.
13. Be Internally Driven
- Don’t chase approval or follow the herd.
- Care about doing great work for yourself.
- If you're motivated mainly by status or envy, you will lose focus.
🔎 Example: Jessica Livingston and Paul Graham were mocked early for Y Combinator. They didn’t care — and YC changed the world of startups.
💬 Final Thought
Success isn’t about short-term hacks. It’s about long-term habits:
- Think long-term.
- Bet boldly.
- Compound yourself.
- Build something important.“Eventually, you will define your success by performing excellent work in areas that are important to you. The sooner you start, the further you will go.”
Commit to the path. The rewards — both internal and external — are beyond what most people ever experience.
🌱 Start planting seeds today. Watch them compound beyond imagination. 🚀
📈 How To Be Successful — 13 Principles for Outlier Achievement
| Principle | Summary | |:-------------|:------------| | 🧠 Compound Yourself | Focus on exponential growth — build skills, network, and leverage over time. | | 💪 Self-Belief (Almost Too Much) | Believe in your vision even when others doubt you, balanced by self-awareness. | | 🔥 Think Independently | Use first-principles thinking; test new ideas rather than copying others. | | 🗣️ Master Sales | Convince others of your ideas — genuine belief makes selling easier. | | 🎯 Make Risk-Taking Easy | Stay flexible and bet on ideas with high upside and limited downside. | | 🎯 Focus | Ruthlessly prioritize — working on the right things matters more than working long hours. | | 🛠️ Work Hard | Smart + intense effort is necessary to reach the top 1%. Momentum compounds success. | | 🚀 Be Bold | Solve big, important problems — bold missions create constant tailwinds. | | 🌎 Be Willful | Persist until you succeed — optimistic persistence often bends reality. | | 🧩 Be Hard to Compete With | Combine rare skills and leverage to become uniquely valuable. | | 🤝 Build a Powerful Network | Help others early; spot and collaborate with rising talent. | | 🏡 Own Equity | Own scalable assets — don’t just trade your time for money. | | 🔥 Stay Internally Driven | Follow intrinsic motivation — work on what you truly care about. |
🚀 Final Thought
"Long-term focus on inputs, boldness, learning, and compound effort leads to extraordinary success."
-
@ 044da344:073a8a0e
2025-04-17 06:53:41Hölderlin taugt immer. Diesmal sogar doppelt. Dass mit der Gefahr das Rettende wächst, hat sich inzwischen herumgesprochen. Raymond Unger ist so ein Anker. Wann immer ich seinen Namen bei einer Veranstaltung erwähne: Die Leute wissen Bescheid. Vom Verlust der Freiheit. Ich hätte zählen sollen, wie oft ich gehört habe: Dieses Buch hat mir die Augen geöffnet. Migration, Klima, Corona: alles drin und vor allem so verflochten, dass zusammenpasst, was eigentlich nicht zusammengehört und unsere Welt auf den Kopf gestellt hat. Viele haben danach Ungers Impfbuch gelesen, sich von seiner Heldenreise inspirieren oder bestätigen lassen und mit ihm um Gunnar Kaiser getrauert (Habe ich genug getan?, 2024). Wer schon länger dabei ist, kennt in der Regel auch Die Wiedergutmacher – ein Psychogramm der Babyboomer, das so nur jemand schreiben kann, der selbst erlebt hat, wie das Weltkriegstrauma vererbt wurde, und als Therapeut die Konzepte kennt, mit denen sich das in Worte fassen lässt.
Der Sachbuchautor Raymond Unger war und ist ein Fremdgänger – ein Künstler, preisgekrönt, den die Not des Beobachters gezwungen hat, das Metier zu wechseln. Der erste Hölderlin. Ohne die große Krise würde dieser Maler vermutlich immer noch nächtelang an seiner Staffelei mit der Materie kämpfen und vor allem mit sich selbst. Wahrscheinlich kennt Raymond Unger auch mein zweites Hölderlin-Zitat: Was aber bleibet, stiften die Dichter. Ich habe diesen Satz gerade wieder gehört aus dem Mund von Peter-Michael Diestel, letzter Innenminister der DDR, der sich mit Gregor Gysi über Heimat unterhält, über den Osten und den Westen und dabei fast zwangsläufig auf die Historiker zu sprechen kommt. „Ärmliches Lohnschreiber-Geschwader“, sagt Diestel und zeichnet ein ganzes anderes Bild von der Vergangenheit als die Geschichtsbücher. „Die DDR ist meine Herkunft. Mein Paradies.“ Sagt einer ihrer Totengräber. Und damit Vorhang auf für die Dichter.
Auf der Bühne steht der Romanautor Raymond Unger, eine Melange aus dem Bildermacher und dem Gesellschaftsanalytiker, die den gleichen Namen tragen. Wuchtig kommt sein Gemälde KAI daher mit Szenen und Orten, von denen jeder Hollywood-Regisseur träumt. Ostsee und Alpen, Berlin, Hamburg und das Silicon Valley. Am Ende Fulda, okay. Davor aber eine Schriftstellerin, Ende 30, attraktiv, Objekt der Begierde zweier reifer Männer, bis die Dame plötzlich im Wortsinn zerfließt, das gute Stück eines der beiden Verehrer beleidigt (klein, was sonst) und auf den Teppich pinkelt. Das ist nur das Vorspiel für einen Antiterroreinsatz in der schwedischen Idylle und Explosionen im Zentrum von Berlin, für ein Auto, das seinen Fahrer wie von Geisterhand gesteuert in den Tod reißt, und für einen Quarterback, der auf dem Spielfeld tot umfällt – zur Primetime, damit jeder weiß, was ihm blühen könnte.
Ich schreibe das, weil ich ein wenig Angst hatte vor diesem Roman. Einer meiner Lieblingsautoren auf neuem Gelände. Wird er sich dort verlaufen, untergehen gar, und mir so einen Fixstern aus meinem Bücherregal nehmen? Nein, nein und nochmal nein. KAI ist ein großer Wurf. KAI ist das Buch, auf das ich gewartet habe. Sicher: Ich habe die Dystopie Hinter der Zukunft von Thomas Eisinger gefeiert, einen Augenöffner ersten Ranges, und ein wenig auch die Corona-Kurzgeschichten von Eugen Zentner. Trotzdem. KAI hat das Zeug, unseren Nachkommen zu berichten, was wir erlebt und erlitten haben. Und vielleicht noch wichtiger: KAI übersetzt all das in ein Märchen, das realer nicht sein könnte und mit einem Ende daherkommt, das die Kämpfe seit den frühen 2010er Jahren mit Sinn auflädt und aus Verlierern Sieger macht. Dazu gleich mehr.
Vorher ein Wort zu Hölderlin und zu seinem Satz über die Dichter, die sagen, was bleibt. Der Mensch ist ein Geschichtentier. Das ist trivial, ich weiß, kann aber nicht oft genug wiederholt werden in einer Zeit, in der eine Regierung sich ins Stammbuch schreibt, dass „die bewusste Verbreitung von falschen Tatsachenbehauptungen“ nicht „durch die Meinungsfreiheit“ gedeckt sei. Falsche Tatsachenbehauptungen. Was soll das sein? 2014 ist Argentinien Fußball-Weltmeister geworden. Oder Tansania. Zwei plus zwei ist fünf und der Autor dieses Textes – eine Frau. Ich muss gar nicht in die Absurditätenkiste greifen, sondern kann in meinem Fachgebiet bleiben. Das 20. Jahrhundert beginnt mit dem Panzerkreuzer Aurora in Petrograd und endet mit den Moskauer Schüssen vom August 1991. Falsch. Falsch? Muss ich künftig Putsch sagen und Sankt Petersburg und hundert Jahre hundert Jahre sein lassen, um der Medienaufsicht nicht ins Netz zu gehen?
Namen, Daten, Orte, Ereignisse: All das rauscht an uns vorbei, wenn es nicht mit einer Story daherkommt und sich nicht einfügen lässt in das, was wir uns über die Menschen und die Welt erzählen. Wer glaubt, dass der Staat ein guter Forscher ist, ein noch besserer Lehrer und der ideale Verwalter aller Vermögen, der wird sich nicht beklagen, wenn Steuergelder in Wissenschaft und Bildung, Kunst und Kultur gepumpt werden und man parallel über einen Lastenausgleich diskutiert. Noch einmal anders gewendet: Es lohnt sich nicht, die Gegenseite mit „Fakten“ und „Tatsachen“ zu bombardieren. Nicht das Fleisch entscheidet, sondern die Sauce. Demokratie, Menschenrechte, Wertewesten. Schwarz-Rot will die „Meinungsfreiheit“ wahren, aber trotzdem „auf der Basis klarer gesetzlicher Vorgaben gegen Informationsmanipulation sowie Hass und Hetze vorgehen“. Alles in einem Satz. Das ist die hohe Schule der Manipulation – möglich nur, weil die Jünger des Parteienstaates gar nicht auf die Idee kommen können, dass im Namen der großen Erzählung Böses getan wird.
Raymond Unger weiß: Wir brauchen eine neue Erzählung. Und wir brauchen Klarheit über die Wucht, die Erzählungen entfalten. Also lässt er Materialisten und Idealisten aufeinander losgehen und öffnet auf dem Höhepunkt der Schlacht „ein Portal zur Anderswelt“, „durch das uralte kosmische Kräfte in unsere physische Welt hineinwirken können“ – bei ihm ein Einfallstor für die „transhumanistische Agenda“ und jene Kräfte, die „alles Menschliche“ verdrängen wollen. Wenn das jetzt kryptisch klingen sollte: keine Sorge. Dieser Autor kann erzählen. Er lässt Freud und Jung in einem Ehepaar auferstehen, das sich so kappelt wie Hans Castorp und Lodovico Settembrini auf dem Zauberberg von Thomas Mann, und mischt das, was er über Klima, 5G und mRNA braucht, in Gespräche mit ChatGPT und kurze Vorträge, die jeder verstehen kann, weil im Publikum Laien sitzen.
Von der Story selbst will ich hier nicht allzu viel verraten. Siehe oben. Wenn man ins Kino geht, reichen auch die Schnipsel aus dem Werbespot und die Gesichter der Helden. Bill Gates spielt mit, Uğur Şahin und Ulrike Herrmann. Leicht verfremdet, aber ja: Es geht schließlich um alles. Den Titel immerhin muss ich auflösen: Bei Raymond Unger sitzt KAI am Hebel. CO2-Märchen, Pandemie-Märchen, das Schlachtfeld Ukraine, Kriegstüchtigkeit: Produkte einer finsteren Macht, die bei ihm aus der Technik wächst und aus der Ideenwelt des Okkultismus, die man aber genauso gut ganz irdisch dort verorten könnte, wo nicht wenige einen „tiefen Staat“ vermuten. Ein guter Roman braucht nicht nur große Gefühle, sondern mehr als eine Ebene. Wer sich wie ich eher an Akteure und Ressourcen hält, kann KAI leicht als Metapher lesen, erst recht in dieser Schreibweise.
Raymond Ungers Gegenerzählung ist nicht neu, aber verlorengegangen auf Plattformen und Bildschirmen, die keine Zwischentöne erlauben und so die Spaltung vorantreiben. Unger sagt: Rettung kommt von da, wo es keine Mehrheiten gibt. Der Außenseiter in der Wissenschaft. Die Menschen, die entscheiden und verzichten und erst so zum Menschen werden. Coronakritiker. Ostdeutsche. Er sagt außerdem: Es gibt U-Boote selbst da, wo die Mehrheiten sind. Schreibt auch die nicht ab, die euch im Moment als Zielscheibe erscheinen. Vor allem aber sagt er: Der Mensch kann Dinge tun, die buchstäblich niemand auf dem Zettel hat. Gegen jede Wahrscheinlichkeit und damit völlig anders als selbst die perfekte Maschine. Nur der Mensch kann sich lösen von dem, was ist, und so Freund Hölderlin alle Ehre machen.
Vielleicht ein Wermutstropfen: Starke Frauen fehlen in seiner Welt. Das heißt: Es gibt starke Frauen, aber nur auf der dunklen Seite der Macht oder als leichtes Opfer von KAI. Ich habe mit zwei Kennerinnen über den Roman gesprochen, die insgesamt sehr angetan waren, aber leicht die Nase rümpften wegen mancher Formulierung und einigen Figuren. Hier und da etwas technokratisch, sagten die beiden, und nicht immer prall im Leben. Was soll man da antworten als Mann. Ich, ein Sachbuchfresser, habe KAI verschlungen. Und: Gut, dass wir endlich auch in der Unterwelt (Walter van Rossum) einen Roman haben, erschienen in einem großen Verlag, über den wir streiten können.
Raymond Unger: KAI. München: Europa Verlag, 431 Seiten, 25 Euro.
-
@ 20986fb8:cdac21b3
2025-04-17 06:46:14分布式Agentic组织(Distributed Agentic Organizations,DA(gentic)O)正在重塑协作的未来格局,融合智能代理(Agentic AI),跨越加密社区、网络社会与现实世界。但要规模化发展,DA(gentic)O 需要更友好的 Agent-to-Agent 和人-to-Agent 社交-交互路径。YakiHonne 可编程 Smart Widgets 提供轻量接口,嵌入社交与支付功能,让代理无缝协作、交易、治理。Agentic Mini Apps 则将这一潜力变为现实,覆盖从链上投票到咖啡支付的场景。在这篇文章我们将探讨 YakiHonne 可编程Smart widgets如何赋能 DA(gentic)O,激活去中心化生产力与代理驱动的协作经济。
1.从 DAO 到 DA(gentic)O:协作的新范式
传统组织依赖中心化管理,效率受限;DAO 通过区块链实现去中心化治理,但投票延迟和静态合约限制生产力。Agentic AI 开启协作新纪元,超越AI的被动执行,具备自主推理、动态适应的能力,宛如数字世界的“智能公民”。通过大语言模型、高级算法与外部工具(如链上数据、Web API、物联网传感器)融合,Agentic AI 实时感知信息、优化决策、持续进化,促使了 DA(gentic)O)的崛起。
DA(gentic)O 是由多个 AI 代理通过开放协议(如 Agent-to-Agent 协作协议、区块链、智能合约)组成的动态生态,优化去中心化自治组织(DAO)并推动其演化。不同于传统组织的中央指挥或 DAO 的投票瓶颈,DA(gentic)O 通过智能网络实现目标。例如,一个代理监测 BTC市场波动,另一个协调网络社会活动,二者通过协议协作,驱动链上交易到现实优化的成果。这种组织以生产力为核心,跨越 Web3治理、网络社会经济、物理社会运营,展现去中心化的灵活性与规模化潜力。DA(gentic)O 不仅是协作的工具,更是连接虚拟与现实的“生产力桥梁”,为全球分布式社区创造可验证的价值。
DA(gentic)O 的核心特点可概括为以下三点:
D:分布式 (Distributed) & 去中心化 (Decentralized) 决策与运作分布于多个自主代理,无需单一控制点,确保组织的鲁棒性与透明性。代理通过链上记录或分布式协议协商资源分配,形成一个无需信任中介的协作网络。例如,在 BTC 市场,代理共同管理资金流向;在网络社会,代理分布式投票决定社区规则;在物理社会,代理协调跨区域的物流调度。这种分布式架构赋予 DA(gentic)O 高度的抗干扰能力与扩展性。
A:自主 (Autonomous) 和智能 (Agentic) 代理具备独立感知、规划与执行的能力,组织通过智能协商实现自治。每个代理如同微型决策单元,能根据环境变化调整策略,无需人类频繁干预。例如,在网络社会的元宇宙,一个代理设计虚拟展览,另一个动态分配算力,二者通过协议自动协调;在物理社会的智能工厂,代理实时优化生产参数,响应市场需求。这种自主性使 DA(gentic)O 能够快速适应复杂场景,超越传统组织的反应速度。
O:组织 (Organization) 和运营 (Operation) 代理以组织化方式协同,形成高效的协作网络,完成从虚拟经济到现实生产的任务。无论是 Web3 的链上拍卖、网络社会的虚拟市场,还是物理社会的供应链整合,DA(gentic)O 都以协作驱动成果。例如,一个代理协调创作者与买家的交易,另一个优化物流配送,二者共同实现端到端的价值流转。这种运营能力使 DA(gentic)O 成为生产力的“协作枢纽”。
DA(gentic)O的灵活性源于Agentic AI的多样能力。反应型代理擅长实时响应,如监控链上交易波动;目标导向代理分解复杂任务,如规划虚拟社区的经济激励;学习型代理通过数据迭代优化,如调整智能工厂的生产参数。这些代理通过A2A协议形成协作网络,适配从虚拟治理、交易到现实优化的广泛需求,构建生产力驱动的“数字生态”。
DA(gentic)O 的主要支柱要素
构建高效的 DA(gentic)O 需以下关键支撑,确保代理网络的运行与协作:
- 主权钱包:每个代理拥有独立匿名数字钱包,安全管理资产并执行交易,支持链上支付、网络社会的虚拟奖励或物理社会的任务报酬,保障经济交互的自主性。
- 去中心化安全环境:可靠的链上或分布式系统,保护代理运行、数据隐私与决策完整性,防范外部攻击或内部篡改,确保协作的信任基础。
- 自由访问网络与链:代理需无缝访问互联网、区块链或其他数据源,获取实时信息与资源,如链上数据、网络社会的用户行为或物理社会的传感器输入,支持推理与协作。
- 接口:用户友好的且自主接口(如链上仪表盘、移动端面板),确保代理与用户、系统间的顺畅连接。
DA(gentic)O 以智能网络连接虚拟与现实,创造交易、协调和优化的价值。Agentic Mini Apps 是其关键交互工具。
2. 可编程Smart Widgets:DA(gentic)O的基础设施
YakiHonne 的可编程 Smart Widgets 是一套轻量化系统,支持 Agentic Mini Apps 的社交互动和支付功能,为DA(gentic)O 提供基础设施。它通过嵌入式接口和去中心化协议,驱动代理间的协作、交易和治理,降低开发门槛,连接 Web3、虚拟社区和现实场景。
2.1 Smart Widgets 的特性
在 Yakihonne 的设计中,Smart Widgets 是微型、智能的应用接口,专为 Agentic Mini Apps 的快速开发与部署设计。其核心特性包括:
- 嵌入社交流:支持 Mini Apps 直接嵌入社交环境,用户无需切换界面即可完成支付或交互。
- 无需中心化审核:任何开发者可以快速创建、部署和分享 Mini Apps,无需应用商店的审批流程。
- 可组合性:Smart Widgets 支持不同类型的功能模块组合,可灵活适配各种 Agent-to-Agent 协作需求。
- 内置支付能力:通过集成链上支付和稳定币支持,实现智能代理之间的价值交换。
这一体系极大降低了构建和扩展去中心化智能代理组织的门槛,使得个体代理(Agent)不仅能行动,还能彼此协作、交易和治理。
2.2 Smart Widgets 的形态与应用
Yakihonne Smart Widgets 根据创建者和使用者的不同需求,分为三种形态,覆盖从普通用户到开发者的全域需求:
- 基础组件(Basic Widgets) 无需编程,通过模板编辑器快速创建支付、投票等交互功能,适合用户构建简单的 Mini Apps。
- 动作组件(Action Widgets) 通过链接嵌入外部功能,保持社交界面的流畅性,支持 Mini Apps 扩展交互范围。
- 工具组件(Tool Widgets) 适合开发者或高级用户,基于 Mini App SDK 开发复杂应用,支持数据查询、链上任务执行、即时支付、智能决策等,构建复杂的智能化 Mini Apps。
这三种形态为 Mini Apps 提供从基础交互到高级协作的支持,适配 DA(gentic)O 的自动化流程。
2.3 支持 DA(gentic)O 的核心功能
Yakihonne Smart Widgets 为分布式Agentic组织提供以下关键能力,驱动 Agentic Mini Apps 的高效运行:
- 自治微应用(Autonomous Mini Apps) Smart Widgets 让代理能够嵌入服务逻辑,自主完成任务或发起支付。例如,Mini Apps 可自动分配 Web3 交易奖励,或协调网络社会的虚拟活动,无需人工干预。
- 即用即付(On-the-Fly Payment) 通过稳定币、BTC、闪电网络(LN)等无缝支付协议,智能代理可以即时完成链上支付,支持微交易经济体。
- 链上身份与社交绑定(On-chain Identity Integration) 代理可以在 Nostr 基础上绑定主权身份,进行链上行为的授权与签名。
- 即时交互与协作(Real-time Interaction and Coordination) 支持代理之间的即时数据交换、智能合约调用和协作执行,适配 Agent-to-Agent 协作网络。
- 开放与可组合性(Openness and Composability) 开发者可自由创建与组合 Widgets,扩展 Mini Apps 的模块化生态。
这些功能使 Smart Widgets 成为 DA(gentic)O 的“支柱”,通过 Mini Apps 连接个体代理与协作网络,构建动态、规模化的生态。
2.4 驱动代理经济(Agentic Economy)
在 DA(gentic)O 中,经济交互至关重要。Smart Widgets 通过以下方式推动代理经济形成:
- 降低支付壁垒 嵌入式支付支持代理间无摩擦的小额交易,简化价值流转。
- 微型自治市场 Widgets 赋予 Mini Apps 自主定价与运营能力,形成独立经济单元。
- 加速创新与扩展 开放创建机制与低成本部署鼓励开发者丰富 Mini Apps 生态。
Yakihonne 正在推动一种新的模式:社交即支付,应用即自治。这为未来的 Agentic DAO 和基于代理的社会经济体系提供了可行路径。
3.Agentic Mini App 应用场景
Agentic Mini Apps 是 DA(gentic)O的交互实现层,通过 YakiHonne Widgets 嵌入社交场景和支付功能,让用户在治理、创作、激励和消费中无缝互动。本章探讨 智能治理、社交媒体、消费生态 三类场景,展示 DA(gentic)O 如何构建从 Web3 到现实社会的动态生态。
3.1. 智能治理--Agentic AI for DAO
传统 DAO 依赖区块链实现透明治理,试图以社区投票和智能合约取代中心化管理。但投票延迟、分歧和静态合约限制价值交付,如投资 DAO 决策迟缓难敌专业机构,协议 DAO 缺乏生产力。Agentic AI 作为 DA(gentic)O 的“智能内核”,自动化执行提案、优化资源分配,提升链上效率,连接 Web3 与现实生产力。具体场景如下:
智能投票与治理优化 传统 aMaci 匿名投票复杂,限制规模化。该基于aMaci的Mini App 封装治理逻辑,提供友好交互,用户通过私信/通知接收提案通知(如“是否调整协议参数”),一键投票。Mini App 分析链上数据(如历史投票趋势),生成决策建议,投票结果秒级汇总,提案自动执行。
激励分配与贡献追踪 用户在 Mini App 内查看贡献(如代码提交、任务完成),Agentic AI 评估链上和链下活动,自动支付稳定币/LN/BTC 奖励,秒到账。私信通知奖励状态。用户通过 Post 展示贡献,Mini App 监测活动,支付代币或 NFT 奖励,链上记录,私信确认支付。
DAO2DAO协作 用户在 Mini App 内共享数据(如 BTC 趋势),Agentic AI 生成协作建议(如“联合活动”),自动执行跨 DAO 任务(如资金池分配)。Post 宣传合作动态。 用户也可通过私信发起联合提案,Mini App 整合多方数据,支付稳定币/LN/BTC 执行协作,链上透明。
社区活动与众筹 用户在 Mini App 内捐款支持活动(如“DAO 年会”),支付稳定币/LN/BTC,秒到账。Agentic AI 跟踪进度,自动分配资金,Post 展示成果。用户通过私信报名活动,Mini App 支付获 NFT 奖励,链上存证。
资源与任务分配 用户在 Mini App 内接收任务(如“开发模块”),Agentic AI 匹配技能,支付稳定币/LN/BTC 奖励,秒到账。私信通知任务状态。用户通过 Post 领取任务,Mini App 验证成果,自动支付代币,链上记录。私信确认完成。
链上身份与认证 用户在 Mini App 内将链上身份与 Nostr 身份绑定,Agentic AI 验证权限,支持跨 DAO 互认,支付稳定币/LN/BTC 激活身份。用户申请联合活动权限,Mini App 验证身份,自动授权,链上透明。
舆情实时分析 用户在 Mini App 内查看舆情报告(如“代币热度上升 30%”),Agentic AI 分析链上和社交数据,生成投资建议,支付 2 USDC 奖励,秒到账。私信推送报告。
3.2 社交媒体
中心化社交媒体因算法操控、内容审查和数据滥用限制用户表达,创作者收益被高额抽成侵蚀,信息真实性和隐私权受威胁。Agentic AI 促使去中心化社交生态更加智能和去中心化,保障用户主权,构建从 Web3 到现实社会的开放网络。具体场景如下:
内容创作与分发 用户与 Agentic AI 协作生成内容(如视频、长文、海报),一键分发到 YakiHonne 及多平台。Mini App 分析用户兴趣,精准推送,支付稳定币/LN/BTC 查看全文。
AI 记者-报道/采访 用户通过 Mini App 自动化新闻采集,分析链上数据和社交 Post,生成长文报道,发布后支持支付打赏。用户通过私信发起采访(如 BUIDL 项目),Agentic AI 生成大纲,Mini App 转录视频为长文或视频,发布至 YakiHonne 及其他平台。
内容互动 用户通过 YakiHonne 社交 Post 参与讨论,Mini App 追踪评论质量,自动打赏奖励高互动者。
内容订阅 用户通过 Mini App 支付订阅长文或独家 Post,Mini App 管理访问权限,秒到账。
内容真实性验证 用户通过 Mini App 验证内容真实性(如新闻出处),标记可信度并投票支持真实内容。
内容存档与协作 用户通过 Mini App 上传 Post 或长文,存储于去中心化网络,生成永久链接并支持其他用户付费下载。用户在 Mini App 内协作长文,Agentic AI 追踪并评估贡献,自动支付稳定币/LN/BTC 奖励,
去中心化广告与收益 创作者通过 Mini App 付费推送长文或内容触达用户,读者将会从广告直接获得收益。
舆情分析与公共讨论 Agentic AI 监测 YakiHonne Post 和社交动态(如“话题热度上升 30%”),生成讨论建议,用户通过私信接收长文报告并进行支付。
3.3 消费生态
中心化支付和传统消费因高额手续费、结算延迟和复杂流程限制用户体验,DeFi 应用也面临操作门槛高、信任不足的问题。Agentic AI 通过 Mini Apps 打造去中心化社交支付与消费生态,扩展链上与现实的消费场景,构建 Web3 价值网络。场景如下:
朋友转账 用户在 Mini App 内搜索好友并转账 0.05 USDC,Agentic AI 测算最优汇率和 Swap 路径,秒到账,链上记录。私信提醒转账请求。 用户在 Mini App 内发起群组分账,Agentic AI 计算份额,支付稳定币/LN/BTC,秒到账,Post 展示记录。
DeFi 质押激励 用户在 Mini App 内加入质押池,Agentic AI 推荐高收益策略,支付稳定币/LN/BTC,秒到账,链上分红透明。私信通知收益。 用户在 Mini App 内质押资产,Agentic AI 分析市场,支付 0.1 USDC 奖励活跃者,秒到账,Post 分享策略。
线下消费 用户在 Mini App 内支付 BTC/LN 购买咖啡或商品,秒到账,链上存证。Post 推送附近商家优惠。用户在 Mini App 内预订服务(如餐厅座位),支付稳定币/LN/BTC 获代币返现,秒到账,Post 分享活动。
GameFi 用户在 Mini App 内支付 0.1 USDC 购买游戏装备,秒到账,链上存证。Post 推送新资产吸引玩家。用户在 Mini App 内完成任务(如战斗挑战),Agentic AI 验证,支付稳定币/LN/BTC 奖励,秒到账,Post 展示排行。
跨境电商 用户在 Mini App 内支付 1 USDC 购买跨境商品,秒到账,链上记录物流。私信推送订单更新。用户在 Mini App 内参与跨境团购,Agentic AI 优化折扣,支付稳定币/LN/BTC 分摊运费,秒到账,Post 展示进展。
4. 结论
随着 Agentic AI 和去中心化技术的快速融合,DA(gentic)O 不再是理论构想,而是正在形成的“智能协作网络”。YakiHonne 的 Smart Widgets 和 Agentic Mini Apps,正在为这种网络提供关键接口与交互基础设施,为用户和开发者释放出前所未有的创作力、支付能力与治理可能。 我们正在见证三个关键趋势的叠加:
1) 从单体代理到多代理协作系统
未来的组织形态将不再是人类为中心的链上治理,而是以多智能体(Multi-Agent)为核心的动态生态。每一个智能代理代表一个用户、一个群体、一个经济单位,能独立感知、推理、执行,与其他代理协同完成更复杂的生产与治理流程。YakiHonne Smart Widgets 将成为这些代理的“协作面板”,为其提供微型入口与交互协议。
2)从社交互动到社交经济系统
当前的社交平台仍多以信息交换为主,而未来的去中心化社交网络将嵌入支付、投票、任务、协作等“社会操作系统”,形成真正的“社交经济”。在这个体系中,Mini Apps 不再是内容附属,而是核心交互单元。YakiHonne 的 Widget 设计天然服务于此场景:它让每一次社交行为都可能触发价值流转,从一次转账、一次众筹、一次治理投票,到一个内容生成任务。
3) 从平台生态到分布式开发生态
社交支付的未来,属于可编程的生态,而非封闭的平台。随着 Smart Widgets SDK 的开源,越来越多的开发者将加入 Agentic Mini App 的构建中。未来的 Web3 应用不会是一个个巨型 App,而是一组协同工作的 Widget 网络,它们在用户的社交流中被发现、被使用、被组合。YakiHonne 正在成为这一生态的起点。
YakiHonne的愿景不仅是打造一个功能强大的去中心化社交支付平台,更是构建一个通向未来的“Agentic 社交操作系统”。在这个系统中,每一个人、每一个代理、每一个交互都是协作的触发器,智能的入口,价值的节点。
-
@ f6497934:312c6532
2025-04-17 06:42:48Discover the ultimate Water Activity Meter for precise moisture measurement in food, pharmaceuticals, and cosmetics. Ensure product safety and extend shelf life by accurately assessing microbial growth risks. Our advanced meters, like the AQUALAB 4TE, deliver fast, reliable results in minutes with ±0.003 accuracy. Easy to use, portable, and temperature-controlled, they’re perfect for quality control in any industry. Optimize your production process, meet FDA standards, and boost product consistency. Invest in top-tier water activity testing today—shop now for unbeatable performance and durability!
-
@ 20986fb8:cdac21b3
2025-04-17 06:21:38Distributed Agentic Organizations (DA(gentic)O) are reshaping the future of collaboration, blending Agentic AI to bridge crypto communities, virtual societies, and the real world. To scale effectively, DA(gentic)O needs seamless Agent-to-Agent and human-to-Agent social pathways. YakiHonne’s programmable Smart Widgets deliver lightweight interfaces, embedding social and payment features to enable agents to collaborate, transact, and govern effortlessly. Agentic Mini Apps turn this vision into reality, powering scenarios from on-chain voting to buying coffee. In this article, we’ll explore how YakiHonne Smart Widgets empower DA(gentic)O, unlocking decentralized productivity and an agent-driven collaborative economy.
1.From DAO to DA(gentic)O: A New Paradigm for Collaboration
Traditional organizations rely on centralized management, often hitting efficiency bottlenecks. DAOs introduced decentralized governance via blockchain, but slow voting and rigid contracts limit their potential. Agentic AI marks a new era, moving beyond passive execution to autonomous reasoning and dynamic adaptation—like “digital citizens” in a virtual world. By integrating large language models, advanced algorithms, and external tools (like on-chain data, Web APIs, or IoT sensors), Agentic AI processes real-time information, optimizes decisions, and evolves continuously, fueling the rise of DA(gentic)O.
DA(gentic)O are dynamic ecosystems of AI agents connected through open protocols—like Agent-to-Agent collaboration frameworks, blockchain, or smart contracts—enhancing and evolving decentralized autonomous organizations (DAOs). Unlike centralized command structures or DAOs bottlenecked by voting, DA(gentic)O operate as intelligent networks to achieve goals. Picture one agent monitoring BTC market swings while another orchestrates virtual community events—together, they collaborate via protocols to drive outcomes from on-chain trades to real-world optimizations. These organizations prioritize productivity, spanning governance, virtual economies, and physical operations, showcasing the flexibility and scalability of decentralization. DA(gentic)O aren’t just tools for collaboration; they’re bridges linking virtual and physical realms, creating verifiable value for global distributed communities.
DA(gentic)O’s core traits boil down to three pillars:
D: Distributed & Decentralized Decisions and operations spread across autonomous agents, eliminating single points of control for robust, transparent systems. Agents negotiate resources via on-chain records or distributed protocols, forming trustless collaboration networks. For example, in BTC markets, agents collectively manage fund flows; in virtual communities, they vote to set rules; in the physical world, they coordinate cross-regional logistics. This distributed architecture gives DA(gentic)O unmatched resilience and scalability.
A: Autonomous & Agentic Agents independently sense, plan, and act, enabling organizations to self-govern through intelligent coordination. Each agent acts like a micro-decision unit, adapting strategies to changing conditions without constant human oversight. In a metaverse, one agent curates a virtual exhibition while another allocates computing power, syncing automatically via protocols. In smart factories, agents tweak production in real time to meet demand. This autonomy lets DA(gentic)O outpace traditional organizations in complex, fast-moving scenarios.
O: Organization & Operation Agents work as a cohesive network, tackling tasks from virtual economies to real-world production. Whether it’s an on-chain auction in Web3, a virtual marketplace, or a physical supply chain, DA(gentic)O deliver results through collaboration. One agent might handle creator-buyer transactions while another optimizes logistics, together streamlining value from end to end. This operational prowess makes DA(gentic)O a hub for productivity.
DA(gentic)O’s flexibility stems from Agentic AI’s diverse capabilities. Reactive agents excel at real-time responses, like tracking on-chain price shifts. Goal-driven agents break down complex tasks, such as designing virtual community incentives. Learning agents refine strategies through data, like optimizing factory outputs. United via A2A protocols, these agents form networks tailored to virtual governance, transactions, and real-world optimization, building a productivity-driven digital ecosystem.
Key Pillars of DA(gentic)O
To build effective DA(gentic)O, several components ensure the agent network thrives:
- Sovereign Wallets: Each agent holds an independent, anonymous digital wallet, securely managing assets and executing transactions—whether for on-chain payments, virtual rewards, or real-world task payouts—ensuring economic autonomy.
- Decentralized Security: Robust on-chain or distributed systems safeguard agent operations, data privacy, and decision integrity, protecting against attacks or tampering to maintain trust.
- Open Network Access: Agents need seamless access to the internet, blockchains, or other data sources for real-time insights, like on-chain metrics, user behaviors, or IoT sensor data, fueling reasoning and collaboration.
- Interfaces: User-friendly, autonomous interfaces (like on-chain dashboards or mobile panels) enable smooth connections between agents, users, and systems.
DA(gentic)O weave intelligent networks across virtual and physical domains, delivering value through transactions, coordination, and optimization. Agentic Mini Apps are the key to unlocking these interactions.
2. Programmable Smart Widgets: The Backbone of DA(gentic)O
YakiHonne’s programmable Smart Widgets are a lightweight system powering Agentic Mini Apps with social and payment features, serving as the infrastructure for DA(gentic)O. Through embedded interfaces and decentralized protocols, they drive agent collaboration, transactions, and governance, lowering development barriers and connecting Web3, virtual communities, and real-world scenarios.
2.1 Features of Smart Widgets
In YakiHonne’s design, Smart Widgets are compact, intelligent interfaces tailored for the rapid development and deployment of Agentic Mini Apps. Their core features include:
- Embedded Social Flows: Mini Apps integrate directly into social environments, letting users pay or interact without switching interfaces.
- No Centralized Approval: Developers can create, deploy, and share Mini Apps instantly, bypassing app store gatekeepers.
- Composability: Widgets support flexible combinations of functional modules, adapting to diverse Agent-to-Agent collaboration needs.
- Built-in Payments: With on-chain payment and stablecoin support, they enable seamless value exchange between agents.
This framework dramatically lowers the barrier to building and scaling decentralized agent organizations, empowering individual agents to not only act but also collaborate, transact, and govern together.
2.2 Forms and Applications of Smart Widgets
YakiHonne Smart Widgets come in three forms to meet varied needs, from everyday users to advanced developers, powering a full spectrum of DA(gentic)O demands:
- Basic Widgets: No coding required—users can quickly build payment or voting functions using a template editor, ideal for simple Mini Apps.
- Action Widgets: These link external features while keeping social interfaces seamless, expanding Mini Apps’ interaction scope.
- Tool Widgets: Designed for developers and power users, these leverage the Mini App SDK for complex applications, supporting data queries, on-chain tasks, instant payments, and smart decisions to create advanced, intelligent Mini Apps.
These forms provide Mini Apps with everything from basic interactions to sophisticated collaboration, aligning with DA(gentic)O’s automated workflows.
2.3 Core Capabilities for DA(gentic)O
YakiHonne Smart Widgets deliver key capabilities to fuel the efficient operation of Distributed Agentic Organizations through Agentic Mini Apps:
- Autonomous Mini Apps: Widgets embed service logic, letting agents independently handle tasks or trigger payments—like auto-distributing Web3 transaction rewards or coordinating virtual community events without human input.
- On-the-Fly Payments: Seamless protocols for stablecoins, BTC, or Lightning Network (LN) enable instant on-chain payments, supporting micro-transaction economies.
- On-Chain Identity Integration: Agents can tie sovereign identities to platforms like Nostr, authorizing and signing on-chain actions.
- Real-Time Interaction and Coordination: Widgets facilitate instant data sharing, smart contract calls, and collaborative execution, tailored for Agent-to-Agent networks.
- Openness and Composability: Developers can freely create and combine Widgets, expanding the modular Mini App ecosystem.
These features make Smart Widgets the “backbone” of DA(gentic)O, linking individual agents to collaborative networks and fostering dynamic, scalable ecosystems.
2.4 Fueling the Agentic Economy
In DA(gentic)O, economic interactions are critical. Smart Widgets drive the agentic economy by:
- Lowering Payment Barriers: Embedded payments enable frictionless micro-transactions between agents, streamlining value flow.
- Micro-Autonomous Markets: Widgets give Mini Apps independent pricing and operation capabilities, creating self-sustaining economic units.
- Accelerating Innovation: Open creation and low-cost deployment encourage developers to enrich the Mini App ecosystem.
YakiHonne is pioneering a new model: social interactions double as payments, and apps run autonomously. This lays the groundwork for future Agentic DAOs and agent-driven socio-economic systems.
3. Agentic Mini App Use Cases
Agentic Mini Apps are the interactive layer of DA(gentic)O, powered by YakiHonne Smart Widgets to embed social and payment features, enabling seamless user engagement in governance, content creation, incentives, and consumption. This chapter dives into three key scenarios—autonomous governance, social media, and consumption ecosystems—showing how DA(gentic)O build dynamic networks from Web3 to the real world.
3.1 Autonomous Governance: Agentic AI for DAOs
Traditional DAOs leverage blockchain for transparent governance, aiming to replace centralized control with community voting and smart contracts. But delays, disputes, and static contracts hinder value delivery—investment DAOs lag behind professional firms, and protocol DAOs struggle with productivity. Agentic AI, the “smart core” of DA(gentic)O, automates proposals, optimizes resource allocation, and boosts on-chain efficiency, bridging Web3 with real-world productivity. Here’s how it works:
- Intelligent Autonomous Voting and Governance Optimization
Traditional aMaci-based anonymous voting is complex and limits scale. This aMaci-powered Mini App simplifies governance logic with user-friendly interfaces. Users get proposal alerts via DMs or notifications (e.g., “Adjust protocol parameters?”) and vote with one tap. The Mini App analyzes on-chain data (like past voting trends) to suggest decisions, tallies results in seconds, and auto-executes proposals. - Incentive Allocation and Contribution Tracking
Users check contributions (e.g., code commits, completed tasks) in the Mini App. Agentic AI evaluates on-chain and off-chain activity, auto-paying rewards in stablecoins, LN, or BTC—instantly. DMs notify reward status. Users showcase contributions via posts, and the Mini App tracks activity, distributing tokens or NFTs, logged on-chain with DM confirmations. - DAO-to-DAO Collaboration
Users share data (e.g., BTC trends) in the Mini App, where Agentic AI suggests collaborations (e.g., “joint campaign”). It auto-executes cross-DAO tasks like fund pool allocation, with posts promoting updates. Users can also propose joint initiatives via DMs, and the Mini App aggregates multi-party data, paying stablecoins, LN, or BTC for execution, all transparent on-chain. - Community Events and Crowdfunding
Users donate to events (e.g., “DAO summit”) via the Mini App, paying stablecoins, LN, or BTC—instantly. Agentic AI tracks progress, auto-allocates funds, and posts share results. Users sign up for events via DMs, earning NFT rewards through Mini App payments, recorded on-chain. - Resource and Task Allocation
Users pick tasks (e.g., “build a module”) in the Mini App. Agentic AI matches skills, paying stablecoins, LN, or BTC rewards—instantly. DMs update task status. Users claim tasks via posts, and the Mini App verifies outcomes, auto-paying tokens, logged on-chain with DM confirmations. - On-Chain Identity and Authentication
Users link on-chain and Nostr identities in the Mini App. Agentic AI verifies permissions, enabling cross-DAO recognition, with stablecoin, LN, or BTC payments to activate identities. Users request event access, and the Mini App auto-grants permissions, transparent on-chain. - Real-Time Sentiment Analysis
Users view sentiment reports (e.g., “token buzz up 30%”) in the Mini App. Agentic AI analyzes on-chain and social data, offering investment tips for a 2 USDC reward—instantly. Reports are sent via DMs.
3.2 Social Media
Centralized social platforms curb free expression with algorithmic bias, content censorship, and data misuse. Creators lose earnings to hefty fees, and authenticity and privacy are at risk. Agentic AI powers a smarter, decentralized social ecosystem, ensuring user sovereignty and building open networks from Web3 to the real world. Key scenarios include: - Content Creation and Distribution
Users team up with Agentic AI to craft content (videos, articles, posters), publishing to YakiHonne and beyond with one click. The Mini App analyzes user interests for targeted delivery, with stablecoin, LN, or BTC payments to unlock full content. - AI Journalism: Reporting and Interviews
Users automate news gathering via the Mini App, pulling on-chain data and social posts to create in-depth reports, shareable for tip-based payments. For interviews (e.g., BUIDL projects), users DM requests, and Agentic AI drafts outlines, with the Mini App converting videos to articles or clips for YakiHonne and other platforms. - Content Interaction
Users engage in discussions via YakiHonne posts. The Mini App tracks comment quality, auto-rewarding active participants with tips. - Content Subscriptions
Users pay for premium articles or exclusive posts through the Mini App, which manages access—instantly. - Content Authenticity Verification
Users verify content credibility (e.g., news sources) via the Mini App, flagging trustworthiness and voting to support authentic posts. - Content Archiving and Collaboration
Users upload posts or articles to the Mini App, stored on decentralized networks with permanent links for paid downloads. For collaborative articles, Agentic AI tracks contributions, auto-paying stablecoin, LN, or BTC rewards. - Decentralized Ads and Revenue
Creators pay to promote articles or content via the Mini App, with readers earning directly from ad revenue. - Sentiment Analysis and Public Discourse
Agentic AI monitors YakiHonne posts and social trends (e.g., “topic buzz up 30%”), suggesting discussions. Users receive detailed reports via DMs for a payment.
3.3 Consumption Ecosystem
Centralized payments and traditional consumption suffer from high fees, slow settlements, and clunky processes, while DeFi apps face steep learning curves and trust issues. Agentic AI, through Mini Apps, builds a decentralized social payment and consumption ecosystem, expanding on-chain and real-world use cases to create a Web3 value network. Scenarios include:
- Peer-to-Peer Transfers
Users search friends in the Mini App to send 0.05 USDC. Agentic AI optimizes exchange rates and swap paths, settling instantly with on-chain records. DMs flag transfer requests. For group splits, users initiate in the Mini App, and Agentic AI calculates shares, paying stablecoins, LN, or BTC—instantly, with posts logging details. - DeFi Staking Incentives
Users join staking pools via the Mini App, where Agentic AI suggests high-yield strategies, paying stablecoins, LN, or BTC—instantly, with transparent on-chain dividends. DMs notify profits. Users stake assets, and Agentic AI rewards active users with 0.1 USDC, paid instantly, with posts sharing strategies. - Offline Purchases
Users pay BTC or LN for coffee or goods via the Mini App—instantly, logged on-chain. Posts promote nearby deals. For bookings (e.g., restaurant seats), users pay stablecoins, LN, or BTC, earning token cashback—instantly, with posts sharing events. - GameFi
Users buy game gear for 0.1 USDC in the Mini App—instantly, recorded on-chain. Posts highlight new assets to attract players. For tasks (e.g., battle challenges), Agentic AI verifies completion, paying stablecoin, LN, or BTC rewards—instantly, with posts showcasing leaderboards. - Cross-Border E-Commerce
Users pay 1 USDC for overseas goods via the Mini App—instantly, with on-chain logistics tracking. DMs update orders. For group buys, Agentic AI optimizes discounts, splitting stablecoin, LN, or BTC shipping costs—instantly, with posts tracking progress.
4. Conclusion
As Agentic AI and decentralized technologies converge rapidly, DA(gentic)O are no longer theoretical—they’re emerging as “intelligent collaboration networks.” YakiHonne’s Smart Widgets and Agentic Mini Apps provide the critical interfaces and infrastructure for these networks, unleashing unprecedented creativity, payment capabilities, and governance possibilities for users and developers alike. We’re witnessing the convergence of three transformative trends:
1) From Solo Agents to Multi-Agent Systems
The future of organizations isn’t human-centric on-chain governance but dynamic ecosystems driven by multi-agent systems. Each intelligent agent—representing a user, group, or economic unit—senses, reasons, and acts independently, collaborating with others to tackle complex production and governance tasks. YakiHonne Smart Widgets serve as the “collaboration dashboard” for these agents, offering micro-gateways and interaction protocols.
2) From Social Interaction to Social Economies
Today’s social platforms focus on information exchange, but tomorrow’s decentralized networks will embed payments, voting, tasks, and collaboration into a “social operating system,” forming true social economies. In this model, Mini Apps aren’t just content add-ons—they’re core interaction hubs. YakiHonne’s Widget design is built for this: every social action, from a transfer to a crowdfund, a governance vote to a content task, can spark value flow.
3) From Platform Ecosystems to Distributed Development
The future of social payments lies in programmable ecosystems, not walled gardens. With the open-source Smart Widgets SDK, more developers will join the Agentic Mini App movement. Apps won’t be monolithic giants but networks of interoperable Widgets, discovered, used, and combined within users’ social flows. YakiHonne is laying the foundation for this ecosystem.
YakiHonne’s vision goes beyond a powerful decentralized social payment platform—it’s about building an “Agentic Social Operating System” for the future. In this system, every person, every agent, every interaction is a trigger for collaboration, an entry point for intelligence, and a node for value creation.
-
@ 95cb4330:96db706c
2025-04-17 06:16:21In business, investing, and personal goals, it’s easy to obsess over outcomes: - How many sales did I make? - How high is my stock price? - How much money did I earn this month?
But if you focus too much on outputs, you risk chasing results without improving the process that actually creates success.
The best leaders — like Jeff Bezos — follow a simple but powerful principle:
Focus daily on controllable inputs. The outputs will follow naturally over time.
Let’s break down what this means, why it works, and how you can apply it to build long-term success.
🧠 What Does "Focus on Inputs" Mean?
Inputs = Actions you control directly: - Customer service quality - Product development speed - Operational efficiency - Attention to detail in execution
Outputs = Results you want but can’t control directly: - Revenue - Profits - Stock price - Market share
Key idea:
👉 When you relentlessly improve the inputs, you set the stage for outstanding outputs over time.
🚀 How Jeff Bezos Used Input Focus to Build Amazon
At Amazon, Bezos hardwired this mindset into the company:
- Teams weren’t told to "increase revenue."
- They were told to improve customer satisfaction, reduce delivery times, and expand product selection.
- Amazon focused on input metrics like:
- Time from customer click to shipment
- Product availability rates
- Number of customer complaints
By perfecting these controllable actions every day, sales and stock price naturally exploded over time.
💬 As Bezos put it:
"We can’t guarantee the stock price will go up, but we can guarantee that customers will love us if we execute on the right inputs."
📈 Why Focusing on Inputs Wins Over Time
✅ Inputs are under your direct control.
You can’t control customer behavior or market swings — but you can control how you perform daily tasks.✅ Good inputs compound over time.
Small daily improvements (like better service or faster shipping) build massive trust and long-term loyalty.✅ Outputs are lagging indicators.
If you chase outputs alone, you’re reacting to the past. Input focus keeps you proactive.✅ Stress and emotional swings decrease.
Instead of riding the highs and lows of every result, you stay calm and centered on today’s actions.
📚 Resources to Learn More
- 📄 Jeff Bezos on Input Metrics – Harvard Business Review
- 📚 How Focusing on Inputs Drives Success – Motley Fool
- 📘 James Clear on Goals vs Systems
🛠 How to Apply "Input Focus" in Your Own Work
✅ 1. Define Your Key Inputs
Ask yourself:
"What daily actions, if consistently improved, would lead to my goals?"
Examples: - Salesperson: Focus on number of quality client calls, not sales closed. - Writer: Focus on daily word count, not bestseller lists. - Startup founder: Focus on product iterations, not initial user growth.
✅ 2. Track Inputs, Not Just Outputs
Build habits around measuring what you control:
"Did I deliver 5 demos today?" "Did I ship a new feature this week?" "Did I respond to every customer ticket within 2 hours?"
✅ 3. Trust the Process
Results don’t show up instantly.
Stay consistent.
Refine your inputs.
Good outputs are a lagging reward for great daily actions.
📣 Final Thought
Outputs are loud.
They grab headlines.
They create FOMO.But inputs are where real power lies.
"Be obsessed with the process, and the results will take care of themselves."
Follow the principle that helped Amazon become a trillion-dollar company:
🎯 Control your inputs. Trust the compounding. Let success chase you. 🚀
-
@ efcb5fc5:5680aa8e
2025-04-15 07:34:28We're living in a digital dystopia. A world where our attention is currency, our data is mined, and our mental well-being is collateral damage in the relentless pursuit of engagement. The glossy facades of traditional social media platforms hide a dark underbelly of algorithmic manipulation, curated realities, and a pervasive sense of anxiety that seeps into every aspect of our lives. We're trapped in a digital echo chamber, drowning in a sea of manufactured outrage and meaningless noise, and it's time to build an ark and sail away.
I've witnessed the evolution, or rather, the devolution, of online interaction. From the raw, unfiltered chaos of early internet chat rooms to the sterile, algorithmically controlled environments of today's social giants, I've seen the promise of connection twisted into a tool for manipulation and control. We've become lab rats in a grand experiment, our emotional responses measured and monetized, our opinions shaped and sold to the highest bidder. But there's a flicker of hope in the darkness, a chance to reclaim our digital autonomy, and that hope is NOSTR (Notes and Other Stuff Transmitted by Relays).
The Psychological Warfare of Traditional Social Media
The Algorithmic Cage: These algorithms aren't designed to enhance your life; they're designed to keep you scrolling. They feed on your vulnerabilities, exploiting your fears and desires to maximize engagement, even if it means promoting misinformation, outrage, and division.
The Illusion of Perfection: The curated realities presented on these platforms create a toxic culture of comparison. We're bombarded with images of flawless bodies, extravagant lifestyles, and seemingly perfect lives, leading to feelings of inadequacy and self-doubt.
The Echo Chamber Effect: Algorithms reinforce our existing beliefs, isolating us from diverse perspectives and creating a breeding ground for extremism. We become trapped in echo chambers where our biases are constantly validated, leading to increased polarization and intolerance.
The Toxicity Vortex: The lack of effective moderation creates a breeding ground for hate speech, cyberbullying, and online harassment. We're constantly exposed to toxic content that erodes our mental well-being and fosters a sense of fear and distrust.
This isn't just a matter of inconvenience; it's a matter of mental survival. We're being subjected to a form of psychological warfare, and it's time to fight back.
NOSTR: A Sanctuary in the Digital Wasteland
NOSTR offers a radical alternative to this toxic environment. It's not just another platform; it's a decentralized protocol that empowers users to reclaim their digital sovereignty.
User-Controlled Feeds: You decide what you see, not an algorithm. You curate your own experience, focusing on the content and people that matter to you.
Ownership of Your Digital Identity: Your data and content are yours, secured by cryptography. No more worrying about being deplatformed or having your information sold to the highest bidder.
Interoperability: Your identity works across a diverse ecosystem of apps, giving you the freedom to choose the interface that suits your needs.
Value-Driven Interactions: The "zaps" feature enables direct micropayments, rewarding creators for valuable content and fostering a culture of genuine appreciation.
Decentralized Power: No single entity controls NOSTR, making it censorship-resistant and immune to the whims of corporate overlords.
Building a Healthier Digital Future
NOSTR isn't just about escaping the toxicity of traditional social media; it's about building a healthier, more meaningful online experience.
Cultivating Authentic Connections: Focus on building genuine relationships with people who share your values and interests, rather than chasing likes and followers.
Supporting Independent Creators: Use "zaps" to directly support the artists, writers, and thinkers who inspire you.
Embracing Intellectual Diversity: Explore different NOSTR apps and communities to broaden your horizons and challenge your assumptions.
Prioritizing Your Mental Health: Take control of your digital environment and create a space that supports your well-being.
Removing the noise: Value based interactions promote value based content, instead of the constant stream of noise that traditional social media promotes.
The Time for Action is Now
NOSTR is a nascent technology, but it represents a fundamental shift in how we interact online. It's a chance to build a more open, decentralized, and user-centric internet, one that prioritizes our mental health and our humanity.
We can no longer afford to be passive consumers in the digital age. We must become active participants in shaping our online experiences. It's time to break free from the chains of algorithmic control and reclaim our digital autonomy.
Join the NOSTR movement
Embrace the power of decentralization. Let's build a digital future that's worthy of our humanity. Let us build a place where the middlemen, and the algorithms that they control, have no power over us.
In addition to the points above, here are some examples/links of how NOSTR can be used:
Simple Signup: Creating a NOSTR account is incredibly easy. You can use platforms like Yakihonne or Primal to generate your keys and start exploring the ecosystem.
X-like Client: Apps like Damus offer a familiar X-like experience, making it easy for users to transition from traditional platforms.
Sharing Photos and Videos: Clients like Olas are optimized for visual content, allowing you to share your photos and videos with your followers.
Creating and Consuming Blogs: NOSTR can be used to publish and share blog posts, fostering a community of independent creators.
Live Streaming and Audio Spaces: Explore platforms like Hivetalk and zap.stream for live streaming and audio-based interactions.
NOSTR is a powerful tool for reclaiming your digital life and building a more meaningful online experience. It's time to take control, break free from the shackles of traditional social media, and embrace the future of decentralized communication.
Get the full overview of these and other on: https://nostrapps.com/
-
@ 95cb4330:96db706c
2025-04-17 06:10:39If there’s one strategy that quietly fuels the success of icons like Sam Altman, Jeff Bezos, and Elon Musk, it’s not a secret growth hack or a flashy new tool.
It’s something deceptively simple—and profoundly powerful:They learn. Constantly. Relentlessly. Deeply.
This is the essence of Compound Learning—the idea that knowledge, like money, compounds over time.
The more you invest in learning, the faster your decisions, the sharper your thinking, and the bigger your edge becomes.
🧠 What Is Compound Learning?
Compound learning means consistently building deep knowledge over time—not just collecting facts or skimming headlines.
It’s about:- Understanding principles
- Asking hard questions
- Applying what you learn across everything you do
It works just like compound interest:
- Learn a little every day
- Connect ideas across time
- Make smarter choices
- Smarter choices lead to even more learning opportunities
The longer you do it, the more valuable and self-reinforcing it becomes.
🚀 Examples in Action
📘 Sam Altman – Learning Is His Edge
Sam Altman, CEO of OpenAI, says:
"The best founders are learning machines."
He reads obsessively, writes to clarify his thinking, and debates ideas constantly with people smarter than him.
By compounding knowledge across AI, startups, economics, and human behavior, he positions himself to spot opportunities before others even see the pattern forming.
📚 Jeff Bezos – Reading as a Competitive Advantage
At Amazon, Bezos famously starts meetings in silence—reading internal memos.
Why? Because deep thinking requires deep attention.He believes:
- Clear writing = Clear thinking
- Deep reading = Better decision-making
His broad reading habits—from science fiction to business reports—gave him a mental model toolkit that shaped Amazon’s long-term success.
🚀 Elon Musk – Learning Across Disciplines
Elon Musk didn’t attend rocket science school. He:
- Read propulsion textbooks
- Asked engineers endless questions
- Cross-applied knowledge from physics, coding, and manufacturing
Result:
He built SpaceX through self-driven, compounded learning, not formal credentials.
🧭 How to Practice Compound Learning
✅ 1. Choose Depth Over Noise
Don’t chase surface-level content.
Go deep.- Read whole books
- Revisit difficult concepts
- Study timeless principles
✅ 2. Connect What You Learn
Link ideas across fields:
- How does biology teach you about systems?
- What does history reveal about strategy?
- How does physics influence product thinking?
The richest insights live between disciplines.
✅ 3. Reflect and Apply
Learning compounds when you use it.
- Journal what you’re learning
- Teach it to someone else
- Apply it immediately in your work or decisions
✅ 4. Make It a Daily Habit
Even 30 minutes a day turns into:
- 3.5 hours/week
- 182 hours/year
- Thousands of hours over a career
That’s a competitive moat no one can take away.
🧠 Prompt to Apply Today
What’s one area where deeper understanding could unlock better thinking or decisions?
Block 30 minutes today to go deep.
Read. Reflect. Learn.
Then ask: How can I use this tomorrow?
📚 Resources to Explore
- 📘 Sam Altman – Compound Learning in “How to Be Successful”
- 📄 Jeff Bezos’ Reading and Thinking Culture – Inc.
- 🎥 Elon Musk on Self-Learning – YouTube
💡 Final Thought
You don’t need to be a genius to succeed—but you do need to learn like one.
Compound learning is quiet, patient, and unstoppable.Start today.
Learn deeply.
Watch the returns grow for a lifetime. 📈 -
@ c1e9ab3a:9cb56b43
2025-04-15 04:55:49Esteemed representatives of Risa,
We gather here under the calming glow of our twin suns, stewards of a society admired for its peace and celebrated for its tranquility. But we must not mistake serenity for passivity, nor confuse peace with weakness. Our peace is not an accident. It is not the byproduct of ignorance or naivety. It is hard-earned—preserved by those willing to stand vigilant in its defense.
Love as a Foundation, Strength as a Shield
Love conquers hate. This is the core truth of Risan philosophy. Yet, as every Ricin child is taught, love without strength is a leaf in the wind. The Ricin do not lay down their lives without resistance. We do not ask our people to accept violence without confronting it. True peace is not imposed by stripping the people of their agency—it is built by enabling them to protect it.
The Lessons of a Failed Experiment
There was a time, not so distant in our history, when we attempted to enforce peace through the abolition of all weapons. A time when even the mention of self-defense in our educational centers was met with rebuke. Schools purged training programs. Cultural arts that honored our warrior traditions were dismissed. And for a brief moment, we believed this would lead us to harmony.
But peace born from helplessness is a fragile illusion. It fractures under the slightest pressure. And fracture it did—when off-world raiders targeted our unguarded sanctuaries, when radical sects within our own society struck out, knowing the citizenry could not defend itself. It was then that we remembered: Risa’s greatest peacekeepers had always been those who knew how to fight—but chose restraint.
The Age of Ricin and the Reawakening of Discipline
So we returned to our roots. To the traditions of the Age of Ricin, when youth, upon reaching maturity, were taught not only the arts of compassion and creation but also the martial disciplines. They learn to wield weapons—not to glorify violence, but to understand it. To control it. To stand firm against it when all else fails.
https://i.nostr.build/kuUjRovISz7367TX.jpg
We do not romanticize war. We do not celebrate conflict. But we prepare for it, should it seek to extinguish our light. Our children now learn the disciplines of defense alongside their studies in poetry, music, and healing. They spar with blunt blades under the watchful eyes of masters. They meditate on the consequences of force. And they grow into citizens not easily provoked, but never unprepared.
A Call for Balance, Not Extremes
Let those beyond our borders question our ways. Let them forget the countless incursions by the Romulans. Let them ignore the scars left by centuries of subversion from the Orion Syndicate. We do not forget. We remember the lives lost, the liberties challenged, and the lessons learned through suffering. These experiences shaped us.
We do not wish to return to the era of soft silence, when teachers trembled at the word "weapon" and children were told that even imagination was dangerous. That was not enlightenment. That was indoctrination.
Conclusion: Guarding the Flame
We are the guardians of Risa’s flame—not just with words and treaties, but with discipline and readiness. We have made peace a practice, and preparation a virtue. And so I say to this chamber: let us never again disarm our people in the name of utopia. Let us never confuse comfort with safety, or the absence of weapons with the presence of peace.
Instead, let us raise generations who know what peace costs, and who will pay that price—not with surrender, but with courage.
Let our children be artists, lovers, dreamers—and if necessary, defenders.
This is the Risan way.
-
@ 95cb4330:96db706c
2025-04-17 05:59:53One of the most important habits shared by top entrepreneurs like Elon Musk, Sam Altman, and Jeff Bezos is this simple but powerful principle:
Move fast first. Build the system later.
In the early stages of any idea, project, or product, speed of iteration matters far more than polish or perfection. Once you find out what works, then you can systematize and scale.
Let’s break down why this matters—and how you can apply it today.
Why Iterating Fast Beats Overplanning
When you’re trying something new, it’s easy to get trapped in:
- Endless research
- Overthinking
- Waiting for a "perfect" launch
The problem is:
No plan survives first contact with reality.
You don’t know exactly how users, customers, or the market will react. You need real feedback, not guesses.
Fast iteration means:
- Testing assumptions quickly
- Gathering real-world data
- Learning what actually works (and what doesn’t)
Systematization comes after you discover something that works—not before.
Examples in Action
🚀 Elon Musk – SpaceX’s Rapid Prototyping
At SpaceX, Musk doesn’t spend years perfecting a rocket on paper. Instead:
- He builds early prototypes, even if they’re rough.
- He tests them quickly—even if they crash.
- He learns from each failure and improves at lightning speed.
Result: SpaceX cut rocket development time dramatically compared to traditional aerospace companies.
🚀 Sam Altman – Startups Move Fast, Then Formalize
Sam Altman teaches startup founders:
"Ship first. Learn fast. Build processes later."
At OpenAI and Y Combinator, the focus was:
- Build basic products quickly.
- Test them with users.
- Only after finding product-market fit, build durable systems.
Speed wins early. Systems win later.
🚀 Jeff Bezos – "Disagree and Commit" for Speed
At Amazon, Bezos promotes the idea of "disagree and commit":
- Make decisions quickly, even with incomplete information.
- Move forward fast, knowing you can adjust if needed.
- Avoid the paralysis of endless debate.
Quick action + flexible course-correction beats slow perfection.
How to Apply "Iterate Fast, Then Systematize"
✅ Step 1: Identify an Area You’re Overthinking
Ask yourself:
"Where am I stuck planning instead of acting?"
It could be launching a new product, testing a marketing idea, starting a project—anything.
✅ Step 2: Run a Fast, Small Test
Don’t wait weeks.
- Build a minimum viable version.
- Ship it to a small audience.
- Gather feedback immediately.
✅ Step 3: Refine Based on Reality
- Use feedback to improve.
- Drop what doesn’t work.
- Double down on what shows promise.
Keep iterating fast until you find something that clicks.
✅ Step 4: Systematize After Success
Only after you know what’s working:
- Automate it.
- Build repeatable processes.
- Scale it efficiently.
Don’t waste time scaling something before it’s proven.
🧠 Prompt to Apply Today
Where in your work can you test something today instead of planning it for weeks?
Pick one idea you’ve been sitting on.
- Launch a version today.
- Learn fast.
- Build the system later.
📚 Resources to Learn More
- Sam Altman on Fast Iteration – Blog
- Elon Musk on Testing and Speed – AMA
- Jeff Bezos on Decision Speed
Final Thought
In today's world, speed is a superpower.
The faster you test ideas, the faster you learn, the faster you win.Don’t aim for perfect. Aim for proven.
Then build the machine to scale it.🚀 Iterate fast. Refine fast. Systematize smartly.
-
@ c1e9ab3a:9cb56b43
2025-04-15 04:15:58Spoken by Counselor Elaron T’Saren of Risa to the High Council, Stardate 52874.2
Honored members of the Council,
I bring you greetings from Risa—not the Risa of travel brochures and romantic holo-novels, but the true Risa. The Risa that has endured, adapted, and emerged stronger after each trial. I speak not as a tourist ambassador, but as a Counselor of our oldest institute of philosophy, and as a son of the Ricin tradition.
Today, the specter of the Borg hangs above us. The collective offers no room for diplomacy, no respect for culture, no compromise. We face not mere invaders—but a force that seeks to erase individuality, history, and identity. Some among the Council wonder what Risa—a world of peace—can offer in such a time. I say to you: we can offer the truth about peace.
The Hidden Roots of Our Tranquility
Long ago, before Risa joined the Federation, we too believed that peace could be maintained by disarming the populace, by eliminating even the mention of conflict in our schools. It was called the Great Disarmament. A generation was raised with no understanding of defense, and in time, we paid the price.
We were raided by Orion pirates. Exploited by off-world cartels. Our people were taken, our arts destroyed, our skies blackened. And we learned—too late—that peace without preparedness is only the illusion of safety.
The Birth of Ricin Doctrine
From the ashes of that failure arose the Ricin: scholars, philosophers, warriors of thought and purpose. They taught that peace is not the absence of conflict, but the mastery of it. That the mind and the body must be trained in tandem. That love without strength is a leaf in the wind.
We did not become a militant world. We became a watchful one. Our children were taught martial discipline—not to glorify violence, but to understand it, to confront it, and to defeat it when necessary. They learned meditation alongside hand-to-hand technique, negotiation beside tactical reasoning.
When we joined the Federation, we did so willingly. But let none assume we surrendered our right to defend our way of life.
Why I Speak to You Now
The Borg are not like the Orion Syndicate. They are not opportunistic, or ideological. They are methodical. And they are coming. You cannot debate with them. You cannot delay them. You can only prepare for them.
And yet, I hear murmurs within the halls of the Federation: whispers of abandoning planetary defense training, of downplaying the psychological need for individual and planetary preparedness. I hear the tired lie that “peace will protect us.”
No, Councilors. It is discipline that protects peace.
The Call to Action
I do not come bearing weapons. I come bearing wisdom. Let us take the Risan lesson and apply it across the Federation. Reestablish tactical readiness training in civilian schools. Encourage planetary governments to integrate defense and philosophy, not as contradictions, but as complements.
Let every child of the Federation grow up knowing not just the principles of liberty, but the means to defend them. Let every artist, scientist, and healer stand ready to protect the civilization they help to build.
Let us not wait until the Borg are in our orbit to remember what we must become.
Conclusion
The Borg seek to erase our uniqueness. Let us show them that the Federation is not a fragile collection of planets—but a constellation of cultures bound by a shared resolve.
We do not choose war. But neither do we flee from it.
We are the guardians of Risa’s flame—and we offer our light to the stars.
Thank you.
-
@ c1e9ab3a:9cb56b43
2025-04-14 23:54:40Hear this, warriors of the Empire!
A dishonorable shadow spreads across our once-proud institutions, infecting our very bloodlines with weakness. The House of Duras—may their names be spoken with contempt—has betrayed the sacred warrior code of Kahless. No, they have not attacked us with disruptors or blades. Their weapon is more insidious: fear and silence.
Cowardice Masquerading as Concern
These traitors would strip our children of their birthright. They forbid the young from training with the bat'leth in school! Their cowardly decree does not come in the form of an open challenge, but in whispers of fear, buried in bureaucratic dictates. "It is for safety," they claim. "It is to prevent bloodshed." Lies! The blood of Klingons must be tested in training if it is to be ready in battle. We are not humans to be coddled by illusions of safety.
Indoctrination by Silence
In their cowardice, the House of Duras seeks to shape our children not into warriors, but into frightened bureaucrats who speak not of honor, nor of strength. They spread a vile practice—of punishing younglings for even speaking of combat, for recounting glorious tales of blades clashing in the halls of Sto-Vo-Kor! A child who dares write a poem of battle is silenced. A young warrior who shares tales of their father’s triumphs is summoned to the headmaster’s office.
This is no accident. This is a calculated cultural sabotage.
Weakness Taught as Virtue
The House of Duras has infected the minds of the teachers. These once-proud mentors now tremble at shadows, seeing future rebels in the eyes of their students. They demand security patrols and biometric scanners, turning training halls into prisons. They have created fear, not of enemies beyond the Empire, but of the students themselves.
And so, the rituals of strength are erased. The bat'leth is banished. The honor of open training and sparring is forbidden. All under the pretense of protection.
A Plan of Subjugation
Make no mistake. This is not a policy; it is a plan. A plan to disarm future warriors before they are strong enough to rise. By forbidding speech, training, and remembrance, the House of Duras ensures the next generation kneels before the High Council like servants, not warriors. They seek an Empire of sheep, not wolves.
Stand and Resist
But the blood of Kahless runs strong! We must not be silent. We must not comply. Let every training hall resound with the clash of steel. Let our children speak proudly of their ancestors' battles. Let every dishonorable edict from the House of Duras be met with open defiance.
Raise your voice, Klingons! Raise your blade! The soul of the Empire is at stake. We will not surrender our future. We will not let the cowardice of Duras shape the spirit of our children.
The Empire endures through strength. Through honor. Through battle. And so shall we!
-
@ f839fb67:5c930939
2025-04-16 21:07:13Relays
| Name | Address | Price (Sats/Year) | Status | | - | - | - | - | | stephen's aegis relay | wss://paid.relay.vanderwarker.family | 42069 |
| | stephen's Outbox | wss://relay.vanderwarker.family | Just Me |
| | stephen's Inbox | wss://haven.vanderwarker.family/inbox | WoT |
| | stephen's DMs | wss://haven.vanderwarker.family/chat | WoT |
| | VFam Data Relay | wss://data.relay.vanderwarker.family | 0 |
| | VFam Bots Relay | wss://skeme.vanderwarker.family | Invite |
| | VFGroups (NIP29) | wss://groups.vanderwarker.family | 0 |
| | [TOR] My Phone Relay | ws://naswsosuewqxyf7ov7gr7igc4tq2rbtqoxxirwyhkbuns4lwc3iowwid.onion | 0 | Meh... |
My Pubkeys
| Name | hex | nprofile | | - | - | - | | Main | f839fb6714598a7233d09dbd42af82cc9781d0faa57474f1841af90b5c930939 | nostr:nprofile1qqs0sw0mvu29nznjx0gfm02z47pve9up6ra22ar57xzp47gttjfsjwgpramhxue69uhhyetvv9ujuanpdejx2unhv9exketj9enxzmtfd3us9mapfx | | Vanity (Backup) | 82f21be67353c0d68438003fe6e56a35e2a57c49e0899b368b5ca7aa8dde7c23 | nostr:nprofile1qqsg9usmuee48sxkssuqq0lxu44rtc4903y7pzvmx694efa23h08cgcpramhxue69uhhyetvv9ujuanpdejx2unhv9exketj9enxzmtfd3ussel49x | | VFStore | 6416f1e658ba00d42107b05ad9bf485c7e46698217e0c19f0dc2e125de3af0d0 | nostr:nprofile1qqsxg9h3uevt5qx5yyrmqkkehay9cljxdxpp0cxpnuxu9cf9mca0p5qpramhxue69uhhyetvv9ujuanpdejx2unhv9exketj9enxzmtfd3usaa8plu | | NostrSMS | 9be1b8315248eeb20f9d9ab2717d1750e4f27489eab1fa531d679dadd34c2f8d | nostr:nprofile1qqsfhcdcx9fy3m4jp7we4vn305t4pe8jwjy74v062vwk08dd6dxzlrgpramhxue69uhhyetvv9ujuanpdejx2unhv9exketj9enxzmtfd3us595d45 |
Bots
Unlocks Bot
Hex: 2e941ad17144e0a04d1b8c21c4a0dbc3fbcbb9d08ae622b5f9c85341fac7c2d0
nprofile:
nostr:nprofile1qqsza9q669c5fc9qf5dccgwy5rdu877th8gg4e3zkhuus56pltru95qpramhxue69uhhx6m9d4jjuanpdejx2unhv9exketj9enxzmtfd3ust4kvak
Latest Data:
nostr:naddr1qq882mnvda3kkttrda6kuar9wgq37amnwvaz7tmnddjk6efwweskuer9wfmkzuntv4ezuenpd45kc7gzyqhfgxk3w9zwpgzdrwxzr39qm0plhjae6z9wvg44l8y9xs06clpdqqcyqqq823cgnl9u5Step Counter
Hex: 9223d2faeb95853b4d224a184c69e1df16648d35067a88cdf947c631b57e3de7
nprofile: nostr:nprofile1qqsfyg7jlt4etpfmf53y5xzvd8sa79ny356sv75gehu50333k4lrmecpramhxue69uhhx6m9d4jjuanpdejx2unhv9exketj9enxzmtfd3ustswp3w
Latest Data:
nostr:naddr1qvzqqqr4gupzpy3r6tawh9v98dxjyjscf357rhckvjxn2pn63rxlj37xxx6hu008qys8wumn8ghj7umtv4kk2tnkv9hxgetjwashy6m9wghxvctdd9k8jtcqp3ehgets943k7atww3jhyn39gffRCTGuest
Hex: 373904615c781e46bf5bf87b4126c8a568a05393b1b840b1a2a3234d20affa0c
nprofile: nostr:nprofile1qqsrwwgyv9w8s8jxhadls76pymy2269q2wfmrwzqkx32xg6dyzhl5rqpramhxue69uhhx6m9d4jjuanpdejx2unhv9exketj9enxzmtfd3usy92jlxNow Playing
Hex: 8096ed6ba1f21a3713bd47a503ee377b0ce2f187b3e5a3ae909a25b84901018b
nprofile: nostr:nprofile1qqsgp9hddwslyx3hzw750fgracmhkr8z7xrm8edr46gf5fdcfyqsrzcpramhxue69uhhx6m9d4jjuanpdejx2unhv9exketj9enxzmtfd3uspk5v4w
Latest Data:
nostr:naddr1qq9kummh94cxccted9hxwqglwaehxw309aekketdv5h8vctwv3jhyampwf4k2u3wvesk66tv0ypzpqyka446rus6xufm63a9q0hrw7cvutcc0vl95whfpx39hpyszqvtqvzqqqr4gupdk2hd
NIP-29 Groups
- Minecraft Group Chat
nostr:naddr1qqrxvc33xpnxxqfqwaehxw309anhymm4wpejuanpdejx2unhv9exketj9enxzmtfd3usygrzymrpd2wz8ularp06y8ad5dgaddlumyt7tfzqge3vc97sgsarjvpsgqqqnpvqazypfd
- VFNet Group Chat
nostr:naddr1qqrrwvfjx9jxzqfqwaehxw309anhymm4wpejuanpdejx2unhv9exketj9enxzmtfd3usygrzymrpd2wz8ularp06y8ad5dgaddlumyt7tfzqge3vc97sgsarjvpsgqqqnpvq08hx48
"Nostrified Websites"
[D] = Saves darkmode preferences over nostr
[A] = Auth over nostr
[B] = Beta (software)
[z] = zap enabled
Other Services (Hosted code)
Emojis Packs
- Minecraft
nostr:naddr1qqy566twv43hyctxwsq37amnwvaz7tmjv4kxz7fwweskuer9wfmkzuntv4ezuenpd45kc7gzyrurn7m8z3vc5u3n6zwm6s40stxf0qwsl2jhga83ssd0jz6ujvynjqcyqqq82nsd0k5wp
- AIM
nostr:naddr1qqxxz6tdv4kk7arfvdhkuucpramhxue69uhhyetvv9ujuanpdejx2unhv9exketj9enxzmtfd3usyg8c88akw9ze3fer85yah4p2lqkvj7qap749w360rpq6ly94eycf8ypsgqqqw48qe0j2yk
- Blobs
nostr:naddr1qqz5ymr0vfesz8mhwden5te0wfjkccte9emxzmnyv4e8wctjddjhytnxv9kkjmreqgs0sw0mvu29nznjx0gfm02z47pve9up6ra22ar57xzp47gttjfsjwgrqsqqqa2wek4ukj
- FavEmojis
nostr:naddr1qqy5vctkg4kk76nfwvq37amnwvaz7tmjv4kxz7fwweskuer9wfmkzuntv4ezuenpd45kc7gzyrurn7m8z3vc5u3n6zwm6s40stxf0qwsl2jhga83ssd0jz6ujvynjqcyqqq82nsf7sdwt
- Modern Family
nostr:naddr1qqx56mmyv4exugzxv9kkjmreqy0hwumn8ghj7un9d3shjtnkv9hxgetjwashy6m9wghxvctdd9k8jq3qlqulkec5tx98yv7snk759tuzejtcr5865468fuvyrtuskhynpyusxpqqqp65ujlj36n
- nostriches (Amethyst collection)
nostr:naddr1qq9xummnw3exjcmgv4esz8mhwden5te0wfjkccte9emxzmnyv4e8wctjddjhytnxv9kkjmreqgs0sw0mvu29nznjx0gfm02z47pve9up6ra22ar57xzp47gttjfsjwgrqsqqqa2w2sqg6w
- Pepe
nostr:naddr1qqz9qetsv5q37amnwvaz7tmjv4kxz7fwweskuer9wfmkzuntv4ezuenpd45kc7gzyrurn7m8z3vc5u3n6zwm6s40stxf0qwsl2jhga83ssd0jz6ujvynjqcyqqq82ns85f6x7
- Minecraft Font
nostr:naddr1qq8y66twv43hyctxwssyvmmwwsq37amnwvaz7tmjv4kxz7fwweskuer9wfmkzuntv4ezuenpd45kc7gzyrurn7m8z3vc5u3n6zwm6s40stxf0qwsl2jhga83ssd0jz6ujvynjqcyqqq82nsmzftgr
- Archer Font
nostr:naddr1qq95zunrdpjhygzxdah8gqglwaehxw309aex2mrp0yh8vctwv3jhyampwf4k2u3wvesk66tv0ypzp7peldn3gkv2wgeap8dag2hc9nyhs8g04ft5wnccgxhepdwfxzfeqvzqqqr4fclkyxsh
- SMB Font
nostr:naddr1qqv4xatsv4ezqntpwf5k7gzzwfhhg6r9wfejq3n0de6qz8mhwden5te0wfjkccte9emxzmnyv4e8wctjddjhytnxv9kkjmreqgs0sw0mvu29nznjx0gfm02z47pve9up6ra22ar57xzp47gttjfsjwgrqsqqqa2w0wqpuk
Git Over Nostr
- NostrSMS
nostr:naddr1qqyxummnw3e8xmtnqy0hwumn8ghj7un9d3shjtnkv9hxgetjwashy6m9wghxvctdd9k8jqfrwaehxw309amk7apwwfjkccte9emxzmnyv4e8wctjddjhytnxv9kkjmreqyj8wumn8ghj7urpd9jzuun9d3shjtnkv9hxgetjwashy6m9wghxvctdd9k8jqg5waehxw309aex2mrp0yhxgctdw4eju6t0qyxhwumn8ghj7mn0wvhxcmmvqgs0sw0mvu29nznjx0gfm02z47pve9up6ra22ar57xzp47gttjfsjwgrqsqqqaueqp0epk
- nip51backup
nostr:naddr1qq9ku6tsx5ckyctrdd6hqqglwaehxw309aex2mrp0yh8vctwv3jhyampwf4k2u3wvesk66tv0yqjxamnwvaz7tmhda6zuun9d3shjtnkv9hxgetjwashy6m9wghxvctdd9k8jqfywaehxw309acxz6ty9eex2mrp0yh8vctwv3jhyampwf4k2u3wvesk66tv0yq3gamnwvaz7tmjv4kxz7fwv3sk6atn9e5k7qgdwaehxw309ahx7uewd3hkcq3qlqulkec5tx98yv7snk759tuzejtcr5865468fuvyrtuskhynpyusxpqqqpmej4gtqs6
- bukkitstr
nostr:naddr1qqykyattdd5hgum5wgq37amnwvaz7tmjv4kxz7fwweskuer9wfmkzuntv4ezuenpd45kc7gpydmhxue69uhhwmm59eex2mrp0yh8vctwv3jhyampwf4k2u3wvesk66tv0yqjgamnwvaz7tmsv95kgtnjv4kxz7fwweskuer9wfmkzuntv4ezuenpd45kc7gpz3mhxue69uhhyetvv9ujuerpd46hxtnfduqs6amnwvaz7tmwdaejumr0dspzp7peldn3gkv2wgeap8dag2hc9nyhs8g04ft5wnccgxhepdwfxzfeqvzqqqrhnyf6g0n2
Market Places
Please use Nostr Market or somthing simular, to view.
- VFStore
nostr:naddr1qqjx2v34xe3kxvpn95cnqven956rwvpc95unscn9943kxet98q6nxde58p3ryqglwaehxw309aex2mrp0yh8vctwv3jhyampwf4k2u3wvesk66tv0yqjvamnwvaz7tmgv9mx2m3wweskuer9wfmkzuntv4ezuenpd45kc7f0da6hgcn00qqjgamnwvaz7tmsv95kgtnjv4kxz7fwweskuer9wfmkzuntv4ezuenpd45kc7gpydmhxue69uhhwmm59eex2mrp0yh8vctwv3jhyampwf4k2u3wvesk66tv0ypzqeqk78n93wsq6sss0vz6mxl5shr7ge5cy9lqcx0smshpyh0r4uxsqvzqqqr4gvlfm7gu
Badges
Created
- paidrelayvf
nostr:naddr1qq9hqctfv3ex2mrp09mxvqglwaehxw309aex2mrp0yh8vctwv3jhyampwf4k2u3wvesk66tv0ypzp7peldn3gkv2wgeap8dag2hc9nyhs8g04ft5wnccgxhepdwfxzfeqvzqqqr48y85v3u3
- iPow
nostr:naddr1qqzxj5r02uq37amnwvaz7tmjv4kxz7fwweskuer9wfmkzuntv4ezuenpd45kc7gzyrurn7m8z3vc5u3n6zwm6s40stxf0qwsl2jhga83ssd0jz6ujvynjqcyqqq82wgg02u0r
- codmaster
nostr:naddr1qqykxmmyd4shxar9wgq37amnwvaz7tmjv4kxz7fwweskuer9wfmkzuntv4ezuenpd45kc7gzyrurn7m8z3vc5u3n6zwm6s40stxf0qwsl2jhga83ssd0jz6ujvynjqcyqqq82wgk3gm4g
- iMine
nostr:naddr1qqzkjntfdejsz8mhwden5te0wfjkccte9emxzmnyv4e8wctjddjhytnxv9kkjmreqgs0sw0mvu29nznjx0gfm02z47pve9up6ra22ar57xzp47gttjfsjwgrqsqqqafed5s4x5
Clients I Use
- Amethyst
nostr:naddr1qqxnzd3cx5urqv3nxymngdphqgsyvrp9u6p0mfur9dfdru3d853tx9mdjuhkphxuxgfwmryja7zsvhqrqsqqql8kavfpw3
- noStrudel
nostr:naddr1qqxnzd3cxccrvd34xser2dpkqy28wumn8ghj7un9d3shjtnyv9kh2uewd9hsygpxdq27pjfppharynrvhg6h8v2taeya5ssf49zkl9yyu5gxe4qg55psgqqq0nmq5mza9n
- nostrsms
nostr:naddr1qq9rzdejxcunxde4xymqz8mhwden5te0wfjkccte9emxzmnyv4e8wctjddjhytnxv9kkjmreqgsfhcdcx9fy3m4jp7we4vn305t4pe8jwjy74v062vwk08dd6dxzlrgrqsqqql8kjn33qm
Lists
- Bluesky
nostr:naddr1qvzqqqr4xqpzp7peldn3gkv2wgeap8dag2hc9nyhs8g04ft5wnccgxhepdwfxzfeqys8wumn8ghj7un9d3shjtnkv9hxgetjwashy6m9wghxvctdd9k8jtcqqapxcat9wd4hj0ah0jw
- Fediverse
nostr:naddr1qvzqqqr4xqpzp7peldn3gkv2wgeap8dag2hc9nyhs8g04ft5wnccgxhepdwfxzfeqys8wumn8ghj7un9d3shjtnkv9hxgetjwashy6m9wghxvctdd9k8jtcqp9rx2erfwejhyum9j4g0xh
- Fediverse_Bots
nostr:naddr1qvzqqqr4xqpzp7peldn3gkv2wgeap8dag2hc9nyhs8g04ft5wnccgxhepdwfxzfeqys8wumn8ghj7un9d3shjtnkv9hxgetjwashy6m9wghxvctdd9k8jtcqperx2erfwejhyum9tapx7arnfcpdzh
- My Bots
nostr:naddr1qvzqqqr4xqpzp7peldn3gkv2wgeap8dag2hc9nyhs8g04ft5wnccgxhepdwfxzfeqys8wumn8ghj7un9d3shjtnkv9hxgetjwashy6m9wghxvctdd9k8jtcqz4uh5jnpwscyss24fpkxw4fewafk566twa2q8f6fyk
-
@ 502ab02a:a2860397
2025-04-17 05:45:09วันก่อนเฮียไปเดินห้าง เดินไปเจอชั้นขายน้ำมันพืช มีน้ำมันรำข้าววางโชว์อยู่หน้าสุด พร้อมคำโปรยที่ดูแพงกว่าขวดซะอีก ตัวเลขข่มกันมาเข้มๆเลย ระดับหมื่นๆหน่วยทั้งนั้น “มีแกมมาออไรซานอล ลดคอเลสเตอรอล” “มีวิตามินอีสูง” “ทนความร้อนได้ดีเยี่ยม เหมาะกับทุกเมนูทอด” “น้ำมันสุขภาพ คนรักหัวใจควรมีไว้ประจำบ้าน”
เฮียยืนอ่านแล้วก็ได้แต่ยิ้ม…
ว่าด้วย Oryzanol ...ของดีจริงเหรอ? อันนี้เป็นไม้เด็ดของฝั่งที่เชียร์น้ำมันรำข้าวเลยเฮีย เขาบอกว่า แกมมาโอริซานอล (γ-Oryzanol) เนี่ย เป็นสารต้านอนุมูลอิสระที่ช่วยลดคอเลสเตอรอลในเลือด ฟังแล้วรู้สึกเหมือนกินแล้วหลอดเลือดจะสะอาดเหมือนพื้นห้องน้ำที่เพิ่งขัดเสร็จ แต่...อย่าเพิ่งรีบวางใจ เพราะงานวิจัยที่ว่าแกมมาโอริซานอล ลดคอเลสเตอรอลเนี่ย ส่วนใหญ่ใช้ “สารสกัดเข้มข้น” ในขนาดโดสระดับ 300-600 มิลลิกรัมต่อวัน ย้ำนะว่า สารสกัดเข้มข้น
ทีนี้เรามาดูกันไหมว่าที่ฉลากบอกว่ามี โอริซานอล 12,000 ppm ที่ดูเยอะแยะมากมายจนเราว๊าววววววกันนั้น ppm มันคืออะไรวะ? ppm (parts per million) แปลว่า “ส่วนในล้านส่วน” ในกรณีของของเหลวอย่างน้ำมัน 1 ppm = 1 มิลลิกรัม ต่อ 1 ลิตร ดังนั้น 12,000 ppm = 12,000 mg/ลิตร หรือก็คือ 12 กรัม ต่อน้ำมัน 1 ลิตร ถ้าเรากินน้ำมันแค่ “1 ช้อนโต๊ะ” (ประมาณ 15 มล.) ที่มี γ-Oryzanol 12,000 ppm จะมี γ-Oryzanol ประมาณ 180 mg สิ่งที่ร่างกายได้รับระหว่างที่ผสมในน้ำมัน กับ "สารสกัดเข้มข้น" ในการทดลอง มันคนละบริบทกัน แต่เอามาเคลมกัน???
ซึ่งเฮียบอกเลยว่า…เวลาเขาเคลมข้อดีมักจะดึงมาเป็นข้อๆ แต่ร่างกายมันเป็นเรื่องโยงใยอีรันพันตู คือก่อนที่คอเลสเตอรอลจะลด ตับเรานี่แหละจะรับไม่ไหวก่อน เพราะน้ำมันรำข้าวเป็นไขมันชนิดไม่อิ่มตัวหลายตำแหน่ง (PUFA) สูง ซึ่งถ้ารับเข้าไปในปริมาณมาก จะเพิ่มภาระให้ตับในการกำจัดสารอนุมูลอิสระและควบคุมสมดุลไขมันในเลือด ตับต้องทำงานหนักขึ้นเสมือนต้องล้างน้ำมันเครื่องเก่า ๆ ทุกวัน นานไปตับอาจเสื่อม ไม่สดใสเหมือนตอนกินไก่ต้มร้านประจำ
จริงอยู่ที่มีงานวิจัยบอกว่า γ‐oryzanol หรือที่เรียกกันว่า ออริซานอล เนี่ย สามารถช่วยลดการอมน้ำมันของอาหารทอดได้บ้าง โดยเปลี่ยนโครงสร้างของอาหารและสมบัติทางกายภาพของน้ำมัน ทำให้เฟรนช์ฟรายส์ที่ทอดออกมาน้ำมันเกาะน้อยลง เหมือนฟังดูดีใช่ไหมเฮีย?
แต่เฮียอยากชวนคิดอีกมุมว่า… ถ้าการจะทำให้อาหาร “ไม่อมน้ำมัน” ต้องอาศัยการ “เติมสารเคมี” เข้าไปเพื่อไปเปลี่ยนโครงสร้างของน้ำมัน แล้วนั่นยังเรียกว่า "ดีต่อสุขภาพ" ได้อยู่ไหม?
เพราะอย่าลืมว่า γ‐oryzanol ไม่ได้เป็นสารที่อยู่ในน้ำมันรำข้าวดิบ ๆ แบบธรรมชาติในปริมาณสูงพออยู่แล้ว ผู้ผลิตหลายเจ้าเลยต้อง เติมเพิ่มเข้าไปทีหลัง และการเติมสารเพิ่มในอุตสาหกรรมอาหารเนี่ย ไม่ได้มีฟรีนะ มันมีคำถามตามมาว่า เติมเท่าไหร่ถึงจะพอดี? เติมแบบนี้แล้วร่างกายดูดซึมได้แค่ไหน? สะสมในร่างกายไหม? และสุดท้าย... สารนี้จริง ๆ แล้ว “มีความจำเป็น” ต่อร่างกายหรือเปล่า?
เฮียบอกตรง ๆ ว่า ร่างกายคนเรา ไม่ได้ต้องการ γ‐oryzanol ในชีวิตประจำวันเลย มันไม่ใช่สารจำเป็นเหมือนวิตามิน หรือแร่ธาตุใด ๆ และก็ไม่มีหลักฐานชัดเจนในคนว่า การบริโภคต่อเนื่องในระยะยาวจะ ไม่มีผลข้างเคียง โดยเฉพาะเมื่อต้องโดนความร้อนสูง ๆ ซ้ำ ๆ ในการทอด แล้วอีกเรื่องที่ต้องไม่ลืมคือ…
น้ำมันรำข้าวเองเป็นน้ำมันที่มี กรดไขมันไม่อิ่มตัวสูงมาก โดยเฉพาะพวกโอเมก้า 6 ซึ่งถ้าเราโดนความร้อนสูงบ่อย ๆ อย่างการทอด มันจะเสื่อมสภาพเร็ว เกิดสารอนุมูลอิสระง่าย ซึ่งสารพวกนี้แหละที่เป็นต้นเหตุของการอักเสบเรื้อรังในร่างกาย ดังนั้นเวลาใครบอกว่า "โอเคนะ ใช้ได้ เพราะใส่สารช่วยป้องกันแล้ว" มันก็ควรถามกลับเหมือนกันว่า...แล้วทำไมเราไม่เริ่มจากใช้น้ำมันที่ทนความร้อนได้ดีตั้งแต่แรก???? มันก็เหมือนการแต่งหน้าซ่อนสิวโดยไม่รักษาสิวนั่นแหละ ดูดีขึ้นแค่ผิวเผิน แต่ต้นเหตุยังอยู่ครบ
เฮียอยากให้เพื่อน ๆ ฟังแล้วไม่ต้องรีบตัดสินใจอะไรทันที แค่ลองฟังอีกด้านไว้ แล้วค่อย ๆ คิด ว่าการกินอาหารเพื่อสุขภาพเนี่ย เราจะเลือกของที่ดูดีจากโฆษณา หรือของที่ “ร่างกายใช้ประโยชน์ได้จริง” โดยไม่ต้องพึ่งสารสังเคราะห์อะไรเลย
วิตามินอีสูง...แล้วไงต่อ? เค้าก็อ้างว่าน้ำมันรำข้าวมีวิตามินอีเยอะ เป็นสารต้านอนุมูลอิสระ จริงอยู่ วิตามินอีมีอยู่ในน้ำมันพืชหลายชนิด แต่เฮียขอเล่าให้ฟังแบบไม่อ้อมค้อมนะ…น้ำมันรำข้าวที่เราซื้อในท้องตลาด เขาเอารำข้าวไปผ่านกระบวนการ สกัดด้วยตัวทำละลายเฮกเซน (Hexane) ผ่านความร้อนสูงระดับ 200-270 องศาเซลเซียส แล้วก็ ฟอกกลิ่น ฟอกสี ให้มันดูใส ๆ น่ากิน
ปัญหาคือ…วิตามินอี กับสารต้านอนุมูลอิสระที่เขาว่า “มีสูง” มันพังไปกับความร้อนและกระบวนการผลิตตั้งแต่ช่วงแรก ๆ แล้ว เพราะวิตามินอีเป็นสารที่ไวต่ออุณหภูมิสูงมาก พอเจอความร้อนสูงแบบนั้น ก็กลายเป็นเหมือนซุปเปอร์ฮีโร่ที่หมดพลังกลางฉากแอ็กชัน
บางแบรนด์เลยต้องเติมวิตามินอีกลับเข้าไปทีหลัง ทั้งเพื่อ “เพิ่มคุณค่าทางโภชนาการ” ให้เอาไปโฆษณาได้ และ เพื่อช่วยป้องกันการเหม็นหืน ของน้ำมันที่ไวต่อปฏิกิริยาออกซิเดชัน เพราะน้ำมันรำข้าวที่อุดมไปด้วย PUFA จะเหม็นหืนเร็ว ถ้าไม่มีสารต้านอนุมูลอิสระไปจับ เรียกว่าเติมเพื่อให้ดูดีทั้งต่อสุขภาพและต่อกลิ่น (แม้สุขภาพอาจไม่ได้ดีจริง…)
ทนความร้อนได้ดี? เหมาะกับการทอด? อันนี้ต้องแซวแรงนิดนึง... เพราะเขาชอบโฆษณาว่า “เหมาะกับการทอดเพราะทนความร้อนได้ดี” บ้าบอ ในความจริง น้ำมันรำข้าวเป็น Polyunsaturated fat (PUFA) สูง แม้จะมีโมเลกุลอิ่มตัวบ้าง แต่ไม่มากพอจะสู้ความร้อนจริงจังได้ เวลาโดนทอดร้อน ๆ ไขมันเหล่านี้มัน กลายพันธุ์ เป็นไขมันออกซิไดซ์ ไม่ต้องไปบอกเลยว่าให้สลัดน้ำมัน กรรมมันเกิดไปแล้ว
น้ำมันรำข้าวคือน้ำมันพืชที่มี กรดไขมันไม่อิ่มตัวเชิงซ้อน (PUFA) สูง โดยเฉพาะ โอเมกา-6 (linoleic acid) ซึ่งถ้าเทียบให้เห็นภาพแบบเฮีย ๆ PUFA ก็คือคนขี้น้อยใจ โดนแดดนิด โดนไฟหน่อย ก็เป็นอารมณ์ บูดเสียง่าย คือไม่เหมาะจะโดนผัด โดนทอด เพราะมันจะกลายร่างเป็น อนุมูลอิสระ แล้ววิ่งวุ่นในร่างกายเราเหมือนคนเสียสติ
แล้วที่บอกว่าช่วยเรื่องหัวใจ? เรื่องนี้ก็น่าสนใจ เพราะเขาชอบพูดว่า “น้ำมันรำข้าวช่วยลดความเสี่ยงโรคหัวใจ” ซึ่งจริง ๆ มาจากแนวคิดเก่าว่า “ถ้าลดไขมันอิ่มตัว แล้วหันมากินไขมันไม่อิ่มตัวจากพืช จะช่วยลดคอเลสเตอรอล และหัวใจก็จะดีขึ้น”
ฟังดูเข้าท่าใช่ไหม...แต่รู้ไหมว่าทุกวันนี้ งานวิจัยใหม่ ๆ เริ่มพบว่า การลดไขมันอิ่มตัวไม่ได้ลดความเสี่ยงโรคหัวใจ อย่างที่เคยคิด และกลับกัน…ไขมันจากสัตว์ที่มาจากอาหารแท้ อย่างเนยแท้ น้ำมันหมู น้ำมันมะพร้าว กลับมีผลดีต่อสุขภาพหัวใจมากกว่า เพราะไม่สร้างการอักเสบในร่างกาย (พูดในมุม cooking oil นะ ถ้าสกัดเย็นพวก มะกอก มะพร้าว มะคาเดเมีย งา ฯลฯ นั่นเป็นเรื่องของสารพฤกษะและพลังงานประกอบ มันจะอีกศาสตร์นึง อย่าเพิ่งปนกันถ้ายังไม่ได้ลงลึก เพราะถ้าเอาสกัดเย็นมาโดนร้อนก็เจ๊งบ๊ง เคลียร์นะ)
ในขณะที่ไขมันไม่อิ่มตัวสูงอย่าง PUFA จากน้ำมันพืชกลับเพิ่มการอักเสบเรื้อรัง ซึ่งเป็นต้นตอของโรคหัวใจ เบาหวาน สมองเสื่อม และโรคเรื้อรังแทบทุกชนิด
แถมกับคำถามหลังไมค์ การที่จะบอกว่า "น้ำมันรำข้าวอมน้ำมันมากกว่าแต่กรดไขมันเขาดีกว่าน้ำมันปาล์มนะ" ฟังเผิน ๆ เหมือนเลือกความดีระยะยาวแลกกับความอ้วนระยะสั้น แต่เดี๋ยวก่อนเฮียอยากให้มองอีกด้าน... 1. กรดไขมันไม่อิ่มตัวที่ว่า “ดี” ในทางทฤษฎีนั้น ถ้าอยู่เฉย ๆ บนชั้นวาง ก็อาจจะดูดีอยู่หรอก แต่พอเจอไฟร้อน ๆ ตอนทอดหรือผัด สารพวกนี้เสื่อมสภาพง่ายมาก กลายเป็นสารออกซิไดซ์ที่ทำร้ายหลอดเลือดเราแบบไม่รู้ตัว กลายเป็น "ไขมันดีพัง ๆ" ได้ทันที 2. น้ำมันที่อมน้ำมันเยอะ หมายถึงอาหารเราจะดูดน้ำมันเข้าไปเยอะ ซึ่งเท่ากับเรากินเข้าไปเยอะโดยไม่รู้ตัว ปริมาณโอเมก้า 6 ก็พุ่งสูง แล้วพอระดับโอเมก้า 6 ในร่างกายสูงขึ้นมากเกินสมดุล มันจะกระตุ้นการอักเสบในร่างกาย = ต้นเหตุของสารพัดโรคยุคใหม่เลยนะ 3. สุดท้าย ถ้าเราต้องแลกกับการใช้น้ำมันที่ต้องพึ่ง "สารเติมแต่ง" อย่างโอริซานอล เพื่อให้อาหารไม่อมน้ำมันเกินไป แบบนี้ก็เหมือนซื้อของแพงแล้วต้องซื้อตัวช่วยเพิ่ม เพื่อให้มันใช้งานได้ดีขึ้น แบบนี้เรียกว่าดีจริงหรือเปล่า? เหมือนคนหน้าตาดีแต่ใช้เงินเก่ง... สุดท้ายเป็นหนี้เหมือนกัน
น้ำมันรำข้าวที่ผ่านกระบวนการมากมาย มันกลายเป็น “Fiat Food” ที่หน้าตาดูดี แต่คุณค่าข้างในเบาหวิว เหมือนแบงก์กระดาษที่พิมพ์ออกมาเยอะ แต่ไม่มีทองรองรับ
ที่สำคัญคือ มันไม่ใช่แค่เรื่อง "กินมากไปไม่ดี" หรอกนะ
บทความกูรูหลายเจ้าชอบสรุปว่า “อย่ากินเยอะ” กินแบบใส่เพื่อผัดอาหารน้อยๆ อืมมม คือพี่ครับ น้ำมันพืชมันไม่ได้เป็นแค่ขวดที่เราซื้อในซูเปอร์ แต่มันเป็น วัตถุดิบหลักของร้านอาหาร ผัดกระเพราเจ้าโปรด กล่องเบนโตะข้างออฟฟิศ ขนมทอดกรอบทุกซอง แถมยังถูกแปะฉลากคำว่า “ดีต่อสุขภาพ” เพื่อให้เรารู้สึกผิดน้อยลงตอนกินของทอดอีกต่างหาก แถมเวลาเราทำกินเอง บางอย่างมันใส่มากกว่า 1ช้อนโต๊ะ ตามหน่วยบริโภคนะ แถม แต่ปัญหาใหญ่คือ PUFA จากน้ำมันพืชเหล่านี้ สะสมในเนื้อเยื่อไขมันเราแบบยาวนาน ไม่ได้หายไปง่าย ๆ แบบอกไก่ต้มหลังออกกำลังกาย ถึงจะกินแค่การผัดกับข้าวจานละ 1ช้อนก็เหอะ วันนั้นกินกับข้าวกี่กระทะ???
มันแทรกตัวเข้าไปในเยื่อหุ้มเซลล์ และกลายเป็น ตัวจุดไฟอักเสบเรื้อรังในร่างกาย เบาหวาน ความดัน มะเร็ง ไขมันพอกตับ อาจไม่ได้มาพร้อมสายฟ้า แต่ค่อย ๆ สะสมทีละหยดเหมือนน้ำมันในกระทะ
อย่าให้คำว่า “มีสารต้านอนุมูลอิสระ” มาหลอกเรา เพราะสุดท้าย ถ้าโครงสร้างไขมันมัน ไม่เสถียรตั้งแต่ต้น ต่อให้มีวิตามิน E ติดมานิด ๆ หน่อย ๆ มันก็เหมือนใส่หมวกกันน็อกให้ตุ๊กตา แล้วเอาไปนั่งมอเตอร์ไซค์วิบาก
น้ำมันรำข้าวไม่ใช่ปีศาจ แต่ก็ไม่ใช่นางฟ้า และเมื่อมันเป็นน้ำมันที่ร่างกายเราไม่ได้ออกแบบมาเพื่อรองรับมัน ก็อย่าหลงกลคำโฆษณาว่า "ดีต่อหัวใจ" หรือ “มีสารต้านอนุมูลอิสระ” แล้วเทมันใส่กระทะทุกวันเลยนะ
ก็เข้าใจแหละว่าเวลาคนทำอาหารเองที่บ้าน เขาจะรู้สึกว่า “ทอดเอง คุมได้ ทอดแค่รอบเดียว ไม่ได้ใช้ซ้ำ ไม่เป็นไรหรอก” แล้วก็หยิบ น้ำมันรำข้าว มาด้วยเหตุผลว่า “โปรไฟล์กรดไขมันมันดีกว่าน้ำมันปาล์ม” …ฟังดูเหมือนมีเหตุมีผล แต่เฮียอยากให้ลองมองอีกมุมนะ
น้ำมันรำข้าวมีกรดไขมันไม่อิ่มตัวสูงก็จริง แต่นั่นแหละคือปัญหา เพราะความไม่อิ่มตัวทำให้ ไม่เสถียรต่อความร้อน โดยธรรมชาติ! ถึงจะทอดรอบเดียว พอน้ำมันเจอไฟแรง ๆ มันก็ยังเสื่อมสภาพอยู่ดี เกิดสารอนุมูลอิสระที่มองไม่เห็น แต่ร่างกายเราเห็นหมด แล้วถ้าคนในบ้านกินบ่อย ๆ วันเว้นวัน จะรู้ตัวอีกทีก็อาจจะมีอาการอักเสบเรื้อรังโดยไม่รู้ต้นตอเลยก็ได้
ส่วนที่บอกว่าอาหารอมน้ำมันก็ไม่เป็นไร แค่รอหายร้อนแล้วซับออก หรือเอาเข้าหม้อลมร้อน มันช่วยได้ “บางส่วน” จริง แต่ไม่ได้แก้ที่ต้นเหตุ เพราะไขมันที่เข้าไปอยู่ในชั้นแป้งหรือเนื้อของอาหารมันออกยากกว่าที่คิด และถ้าเราต้อง “พึ่งวิธีรีดน้ำมันออก” ทุกครั้งที่ทอด นั่นแปลว่าน้ำมันที่ใช้มันอมน้ำมันเกินไปตั้งแต่แรกแล้ว ไม่ใช่หรือ?
“ทอดรอบเดียวก็จริง แต่ถ้าน้ำมันมันพังตั้งแต่โดนไฟ แล้วจะต่างอะไรกับทอดสิบรอบ?”
ท้ายของท้ายสุด เรื่องทอดไม่ใช่แค่เรื่องน้ำมัน แต่มีเรื่อง AGEs ด้วยซึ่งสำคัญกว่าใช้น้ำมันอะไรทอดเยอะเลยครับ นี่เขียนเพื่อบันทึกรายละเอียดของน้ำมันรำข้าวให้เฉยๆ
#pirateketo #ฉลาก3รู้ #กูต้องรู้มั๊ย #ม้วนหางสิลูก
-
@ b7d82f75:524cf1ac
2025-04-17 05:41:42Want the best Anaheim auto body shop? G.U Collision Center is here to help! We repair your car from scratches to serious damage, making it look as good as new. Our team uses modern tools and lots of care to fix your vehicle fast. We handle everything, from small dings to big collisions, at prices that won’t break the bank. Plus, we work with your insurance for a smooth process. Visit G.U Collision Center in Anaheim for top-quality repairs and friendly service. Let us get your car back on the road in style!
-
@ c86dc7e6:6059e49b
2025-04-17 05:04:16Want the best carpet cleaning services Atlanta has to offer? Spot It Cleaning is the name to trust! We bring your carpets back to life, removing stains, dirt, and odors. Our team uses safe, powerful tools to clean deep without harming your floors. Perfect for offices, stores, or any business, we make your carpets look fresh and feel soft. We work fast and fit your schedule, keeping your workspace ready for action. Choose Spot It Cleaning for affordable, top-quality carpet care in Atlanta. Let us make your floors shine so your business can stand out!
-
@ 9063ef6b:fd1e9a09
2025-04-16 20:20:39Bitcoin is more than just a digital currency. It’s a technological revolution built on a unique set of properties that distinguish it from all other financial systems—past and present. From its decentralized architecture to its digitally verifiable scarcity, Bitcoin represents a fundamental shift in how we store and transfer value.
A Truly Decentralized Network
As of April 2025, the Bitcoin network comprises approximately 62,558 reachable nodes globally. The United States leads with 13,791 nodes (29%), followed by Germany with 6,418 nodes (13.5%), and Canada with 2,580 nodes (5.43%). bitnodes
This distributed structure is central to Bitcoin’s strength. No single entity can control the network, making it robust against censorship, regulation, or centralized failure.
Open Participation at Low Cost
Bitcoin's design allows almost anyone to participate meaningfully in the network. Thanks to its small block size and streamlined protocol, running a full node is technically and financially accessible. Even a Raspberry Pi or a basic PC is sufficient to synchronize and validate the blockchain.
However, any significant increase in block size could jeopardize this accessibility. More storage and bandwidth requirements would shift participation toward centralized data centers and cloud infrastructure—threatening Bitcoin’s decentralized ethos. This is why the community continues to fiercely debate such protocol changes.
Decentralized Governance
Bitcoin has no CEO, board, or headquarters. Its governance model is decentralized, relying on consensus among various stakeholders, including miners, developers, node operators, and increasingly, institutional participants.
Miners signal support for changes by choosing which version of the Bitcoin software to run when mining new blocks. However, full node operators ultimately enforce the network’s rules by validating blocks and transactions. If miners adopt a change that is not accepted by the majority of full nodes, that change will be rejected and the blocks considered invalid—effectively vetoing the proposal.
This "dual-power structure" ensures that changes to the network only happen through widespread consensus—a system that has proven resilient to internal disagreements and external pressures.
Resilient by Design
Bitcoin's decentralized nature gives it a level of geopolitical and technical resilience unmatched by any traditional financial system. A notable case is the 2021 mining ban in China. While initially disruptive, the network quickly recovered as miners relocated, ultimately improving decentralization.
This event underlined Bitcoin's ability to withstand regulatory attacks and misinformation (FUD—Fear, Uncertainty, Doubt), cementing its credibility as a global, censorship-resistant network.
Self-Sovereign Communication
Bitcoin enables peer-to-peer transactions across borders without intermediaries. There’s no bank, payment processor, or centralized authority required. This feature is not only technically efficient but also politically profound—it empowers individuals globally to transact freely and securely.
Absolute Scarcity
Bitcoin is the first asset in history with a mathematically verifiable, fixed supply: 21 million coins. This cap is hard-coded into its protocol and enforced by every full node. At the atomic level, Bitcoin is measured in satoshis (sats), with a total cap of approximately 2.1 quadrillion sats.
This transparency contrasts with assets like gold, whose total supply is estimated and potentially (through third parties on paper) expandable. Moreover, unlike fiat currencies, which can be inflated through central bank policy, Bitcoin is immune to such manipulation. This makes it a powerful hedge against monetary debasement.
Anchored in Energy and Time
Bitcoin's security relies on proof-of-work, a consensus algorithm that requires real-world energy and computation. This “work” ensures that network participants must invest time and electricity to mine new blocks.
This process incentivizes continual improvement in hardware and energy sourcing—helping decentralize mining geographically and economically. In contrast, alternative systems like proof-of-stake tend to favor wealth concentration by design, as influence is determined by how many tokens a participant holds.
Censorship-Resistant
The Bitcoin network itself is inherently censorship-resistant. As a decentralized system, Bitcoin transactions consist of mere text and numerical data, making it impossible to censor the underlying protocol.
However, centralized exchanges and trading platforms can be subject to censorship through regional regulations or government pressure, potentially limiting access to Bitcoin.
Decentralized exchanges and peer-to-peer marketplaces offer alternative solutions, enabling users to buy and sell Bitcoins without relying on intermediaries that can be censored or shut down.
High Security
The Bitcoin blockchain is secured through a decentralized network of thousands of nodes worldwide, which constantly verify its integrity, making it highly resistant to hacking. To add a new block of bundled transactions, miners compete to solve complex mathematical problems generated by Bitcoin's cryptography. Once a miner solves the problem, the proposed block is broadcast to the network, where each node verifies its validity. Consensus is achieved when a majority of nodes agree on the block's validity, at which point the Bitcoin blockchain is updated accordingly, ensuring the network's decentralized and trustless nature.
Manipulation of the Bitcoin network is virtually impossible due to its decentralized and robust architecture. The blockchain's chronological and immutable design prevents the deletion or alteration of previously validated blocks, ensuring the integrity of the network.
To successfully attack the Bitcoin network, an individual or organization would need to control a majority of the network's computing power, also known as a 51% attack. However, the sheer size of the Bitcoin network and the competitive nature of the proof-of-work consensus mechanism make it extremely difficult to acquire and sustain the necessary computational power. Even if an attacker were to achieve this, they could potentially execute double spends and censor transactions. Nevertheless, the transparent nature of the blockchain would quickly reveal the attack, allowing the Bitcoin network to respond and neutralize it. By invalidating the first block of the malicious chain, all subsequent blocks would also become invalid, rendering the attack futile and resulting in significant financial losses for the attacker.
One potential source of uncertainty arises from changes to the Bitcoin code made by developers. While developers can modify the software, they cannot unilaterally enforce changes to the Bitcoin protocol, as all users have the freedom to choose which version they consider valid. Attempts to alter Bitcoin's fundamental principles have historically resulted in hard forks, which have ultimately had negligible impact (e.g., BSV, BCH). The Bitcoin community has consistently rejected new ideas that compromise decentralization in favor of scalability, refusing to adopt the resulting blockchains as the legitimate version. This decentralized governance model ensures that changes to the protocol are subject to broad consensus, protecting the integrity and trustworthiness of the Bitcoin network.
Another source of uncertainty in the future could be quantum computers. The topic is slowly gaining momentum in the community and is being discussed.
My attempt to write an article with Yakihonne. Simple editor with the most necessary formatting. Technically it worked quite well so far.
Some properties are listed in the article. Which properties are missing?
-
@ c1e9ab3a:9cb56b43
2025-04-14 21:20:08In an age where culture often precedes policy, a subtle yet potent mechanism may be at play in the shaping of American perspectives on gun ownership. Rather than directly challenging the Second Amendment through legislation alone, a more insidious strategy may involve reshaping the cultural and social norms surrounding firearms—by conditioning the population, starting at its most impressionable point: the public school system.
The Cultural Lever of Language
Unlike Orwell's 1984, where language is controlled by removing words from the lexicon, this modern approach may hinge instead on instilling fear around specific words or topics—guns, firearms, and self-defense among them. The goal is not to erase the language but to embed a taboo so deep that people voluntarily avoid these terms out of social self-preservation. Children, teachers, and parents begin to internalize a fear of even mentioning weapons, not because the words are illegal, but because the cultural consequences are severe.
The Role of Teachers in Social Programming
Teachers, particularly in primary and middle schools, serve not only as educational authorities but also as social regulators. The frequent argument against homeschooling—that children will not be "properly socialized"—reveals an implicit understanding that schools play a critical role in setting behavioral norms. Children learn what is acceptable not just academically but socially. Rules, discipline, and behavioral expectations are laid down by teachers, often reinforced through peer pressure and institutional authority.
This places teachers in a unique position of influence. If fear is instilled in these educators—fear that one of their students could become the next school shooter—their response is likely to lean toward overcorrection. That overcorrection may manifest as a total intolerance for any conversation about weapons, regardless of the context. Innocent remarks or imaginative stories from young children are interpreted as red flags, triggering intervention from administrators and warnings to parents.
Fear as a Policy Catalyst
School shootings, such as the one at Columbine, serve as the fulcrum for this fear-based conditioning. Each highly publicized tragedy becomes a national spectacle, not only for mourning but also for cementing the idea that any child could become a threat. Media cycles perpetuate this narrative with relentless coverage and emotional appeals, ensuring that each incident becomes embedded in the public consciousness.
The side effect of this focus is the generation of copycat behavior, which, in turn, justifies further media attention and tighter controls. Schools install security systems, metal detectors, and armed guards—not simply to stop violence, but to serve as a daily reminder to children and staff alike: guns are dangerous, ubiquitous, and potentially present at any moment. This daily ritual reinforces the idea that the very discussion of firearms is a precursor to violence.
Policy and Practice: The Zero-Tolerance Feedback Loop
Federal and district-level policies begin to reflect this cultural shift. A child mentioning a gun in class—even in a non-threatening or imaginative context—is flagged for intervention. Zero-tolerance rules leave no room for context or intent. Teachers and administrators, fearing for their careers or safety, comply eagerly with these guidelines, interpreting them as moral obligations rather than bureaucratic policies.
The result is a generation of students conditioned to associate firearms with social ostracism, disciplinary action, and latent danger. The Second Amendment, once seen as a cultural cornerstone of American liberty and self-reliance, is transformed into an artifact of suspicion and anxiety.
Long-Term Consequences: A Nation Re-Socialized
Over time, this fear-based reshaping of discourse creates adults who not only avoid discussing guns but view them as morally reprehensible. Their aversion is not grounded in legal logic or political philosophy, but in deeply embedded emotional programming begun in early childhood. The cultural weight against firearms becomes so great that even those inclined to support gun rights feel the need to self-censor.
As fewer people grow up discussing, learning about, or responsibly handling firearms, the social understanding of the Second Amendment erodes. Without cultural reinforcement, its value becomes abstract and its defenders marginalized. In this way, the right to bear arms is not abolished by law—it is dismantled by language, fear, and the subtle recalibration of social norms.
Conclusion
This theoretical strategy does not require a single change to the Constitution. It relies instead on the long game of cultural transformation, beginning with the youngest minds and reinforced by fear-driven policy and media narratives. The outcome is a society that views the Second Amendment not as a safeguard of liberty, but as an anachronism too dangerous to mention.
By controlling the language through social consequences and fear, a nation can be taught not just to disarm, but to believe it chose to do so freely. That, perhaps, is the most powerful form of control of all.
-
@ 4925ea33:025410d8
2025-04-17 04:31:30Como invocar a Deus?
O segundo capítulo do livro Confissões, de Santo Agostinho, começa com uma pergunta que toca o coração de todo aquele que busca a fé: “Como invocar a Deus?”
Essa questão, apesar de parecer simples, exige que tenhamos os olhos abertos para a verdade e uma consciência clara da nossa pequenez diante da grandeza divina. Somos pó diante do Criador — limitados, frágeis, tentando compreender o Infinito.
O Deus que não pode ser contido
Santo Agostinho se questiona sobre a presença de Deus e o que significa “conter” o Senhor. Ele reconhece que Deus está em todos os lugares — até mesmo no inferno. Como poderia ser diferente, se Deus é infinitamente grande?
“Nada pode conter Deus, nem mesmo o céu e a terra, suas maiores criações.”
Esse reconhecimento o leva a concluir: Deus não tem começo, meio ou fim. Ele é eterno, e nada pode delimitá-Lo.
O espanto da descoberta: Deus habita em nós Agostinho se espanta ao perceber que, se tudo o que existe só existe porque Deus o sustenta, então Deus está em tudo — inclusive dentro de nós. E aqui nasce uma nova dúvida:
Por que invocar a Deus se Ele já habita em mim? Como pode o Infinito caber em uma criatura tão pequena como o ser humano?
A beleza da doutrina católica
Estudar a doutrina católica é uma experiência profunda e transformadora. A riqueza com que ela trata o mistério de Deus é tão grandiosa, que toca até os corações mais endurecidos.
“Se algo existe, é porque Deus o sustenta. Ele está conosco. Ele nos dá o dom da vida.”
Essa verdade muda completamente a forma como enxergamos a realidade. Compreender que Deus sustenta até aqueles que se afastaram Dele nos leva a uma nova visão — mais compassiva, mais humana e mais próxima do amor de Cristo.
A presença de Deus até nas realidades mais difíceis
Essa reflexão me lembra algo que ouvia na igreja: o chamado de apresentar Cristo nos presídios. Sempre me perguntei como os pregadores viam a presença de Deus em pessoas que cometeram crimes cruéis.
Hoje, entendo que se alguém ainda existe, é porque Deus ainda o sustenta — mesmo que seus atos não agradem a Deus. A existência é um sinal de que a presença divina ainda está ali, chamando à conversão.
Conclusão: Deus está em tudo, inclusive em nós
Este capítulo não aprofunda como lidar com o inimigo ou com o mal, mas nos dá uma certeza essencial: Deus está em tudo e em todos.
Ao orar, não devemos buscá-Lo como alguém distante, mas sim olhar para dentro de nós. A presença de Deus habita em nós.
-
@ f18b1f8f:5f442454
2025-04-17 17:03:22A supermemory MCP plugin that you can use to bring a memory with you to any client of your choosing. Supports fetching from, and storing to, memory. Comes with a prompt to help the client identify when to use or store updates. Very neat, and ties integrations together very well.
Here is a video walkthrough: https://x.com/DhravyaShah/status/1912544778090414188
e578b1367ed845d8925eb8a0ebc3a96d
-
@ 502ab02a:a2860397
2025-04-17 02:15:32วันนี้มาเล่าเรื่อง animal base บ้างครับ เพราะหลายๆคนบอกว่า ดีนะฉันกินสัตว์ ฉันคิดว่าไขมันสัตว์ดีที่สุด รวมถึง plant base ที่ตัดสินฉาบฉวยว่าผม anti plant วันนี้มาเล่าข้อมูลเรื่องต่อไปกันครับ เพื่อให้เห็นว่า โลกของผู้ล่า มันไม่เลือกฝั่งครับ คำถามคือ เหยื่อจะเตรียมตัวอย่างไรมากกว่า เพราะเหยื่อยังทะเลาะกันเองอยู่เลย 55555
sub item ของ fiat food มีอย่างนึงที่เรียกว่า fake food ครับ ถ้าถามว่า “โปรตีนจากเซลล์” หรือ lab-grown meat ที่โฆษณาว่าเป็นทางเลือกแห่งอนาคตนั้น ภาพที่คนทั่วไปนึกถึงคืออะไร? คำตอบน่าจะไม่พ้น -เนื้อที่ไม่ต้องฆ่าสัตว์ -โปรตีนสะอาด ไร้มลพิษ -เทคโนโลยีแห่งอนาคตเพื่อสิ่งแวดล้อม
เชื่อไหมว่าความจริงนั้นมันอาจจะตรงกันข้ามกับทุกข้อที่ตอบมาเลยครับ
มันมาจากไหน?
"เนื้อเทียมจากห้องแล็บ" คือการเอาเซลล์สัตว์มาเพาะเลี้ยงในจานเพาะเลี้ยง โดยให้อาหารกับเซลล์พวกนั้นด้วยน้ำเลี้ยง (growth medium) เพื่อให้มันแบ่งตัวกลายเป็นกล้ามเนื้อ ฟังดูเหมือนปลอดภัยใช่ไหม? แต่ที่หลายคนไม่รู้คือ…
น้ำเลี้ยงที่ใช้ส่วนใหญ่มาจาก Fetal Bovine Serum (FBS) หรือ ซีรั่มจากลูกวัวที่ถูกฆ่าขณะอยู่ในครรภ์แม่ มันคือ คือการเจาะหัวใจลูกวัวที่ยังไม่เกิด เพื่อเอาเลือดมาเลี้ยงเนื้อเทียม แน่นอนว่าการให้ข้อมูลนั้นเขาจะบอกว่า เก็บเกี่ยวเลือดจากตัวอ่อนของวัวหลังจากที่นำตัวอ่อนออกจากวัวที่ถูกเชือด ตัวอ่อนจะตายจากการขาดออกซิเจนโดยอยู่ในสภาพแวดล้อมที่ปลอดภัยของมดลูกเป็นเวลาอย่างน้อย 15-20 นาทีหลังจากวัวตายและแน่นอนว่าต้องให้ข้อมูลว่ามีการเก็บมาภายใต้การดูแลจริยธรรม
และถ้าจะไม่ใช้ FBS ก็ต้องใช้น้ำเลี้ยงสังเคราะห์ที่อัดแน่นด้วย growth factor สังเคราะห์, ยาปฏิชีวนะ, ฮอร์โมน และสารกระตุ้นการเจริญเติบโตแบบเข้มข้น มันคือ Frankenstein Protein เลยก็ว่าได้
ราคาที่แท้จริงไม่ใช่แค่เงิน แต่คืออำนาจต่างหากครับ
เบื้องหลังของ lab-grown meat คือบริษัททุนใหญ่ เช่น Eat Just (เจ้าของ Good Meat) Upside Foods Believer Meats CUBIQ Foods และเบื้องหลังอีกชั้นคือ VC ยักษ์ เช่น SoftBank, Temasek, Bill Gates, Tyson Foods ฯลฯ เริ่มเห็นภาพแล้วใช่ไหมครับ
ทุกเจ้ากำลังเร่งวิจัยเพื่อ “จดสิทธิบัตร” กระบวนการผลิต และพันธุกรรมของเซลล์สัตว์ ใช่จ้ะ… พันธุกรรมของวัว หมู ไก่ หรือแม้แต่ปลา ถูกดัดแปลงพันธุกรรมเพื่อให้เพาะง่าย โตไว อยู่ได้นาน และตอบโจทย์การผลิตในเชิงอุตสาหกรรม
ใครจะเลี้ยงวัวเองแล้วทำเนื้อกินเอง อาจโดนฟ้องในอนาคตว่าไปละเมิดพันธุ์สิทธิบัตรที่บริษัทครอบครอง
ต่อไปนี้ถ้าอยากขายเนื้อ ต้องเป็นเจ้าของห้องแล็บถึงแม้บริษัทเหหล่านี้จะบอกว่า “เราจะ democratize protein” คือทำให้ใครๆ ก็เข้าถึงโปรตีนได้ แต่ความจริงคือ ทุกกระบวนการตั้งแต่เซลล์ต้นแบบ อาหารเลี้ยงเซลล์ ยันเครื่องมือในแล็บ ล้วนมีสิทธิบัตร ใครที่ไม่มี license ก็ผลิตไม่ได้ พูดง่ายๆ ก็คือ…
“ของกินที่โตจากเซลล์ในอนาคตจะต้องมีใบอนุญาตจากบริษัท” ไม่มีแผ่นดินไหน ปลูกเอง กินเอง ได้อีกต่อไป
แล้วมันดีต่อสิ่งแวดล้อมจริงไหม? บริษัทแสนดีต่างๆชอบบอกว่าเนื้อแล็บช่วยลดการปล่อยคาร์บอนจากฟาร์มปศุสัตว์ แต่งานวิจัยของ Oxford, UC Davis และมหาวิทยาลัย Wageningen ชี้ว่า การผลิตเนื้อในห้องแล็บใช้พลังงานสูงกว่าปศุสัตว์จริง หลายเท่า และถ้าไม่ใช้พลังงานหมุนเวียน ก็จะปล่อยคาร์บอนมากกว่าการเลี้ยงวัวแบบดั้งเดิมเสียอีก
ตกลงมันคือ Clean Meat หรือ Clean Lie? Clean Meat ที่เขาโฆษณา อาจจะสะอาดแค่ “ภาพ” แต่องค์ประกอบข้างในคือ… -เซลล์สัตว์ที่ดัดแปลงยีนให้โตเร็ว -น้ำเลี้ยงเซลล์ที่มีสารกระตุ้นการเติบโต, ฮอร์โมน, ยาปฏิชีวนะ -ความไม่โปร่งใสเรื่องกระบวนการผลิต -ไม่มีฉลากบอกผู้บริโภคชัดเจน -ยังไม่มีการทดลองระยะยาวว่า “ปลอดภัยหรือไม่”
พรุ่งนี้ที่ไม่มีเกษตรกรจะเป็นยังไง ถ้าโปรตีนทั้งหมดผลิตในแล็บ แล้วเกษตรกรล่ะ? คนเลี้ยงสัตว์ล่ะ? คนเลี้ยงเป็ดไก่หลังบ้านล่ะ? คนปลูกผัก เลี้ยงวัว ทำฟาร์มแบบพื้นถิ่นล่ะ? ทุกคนจะตกขบวนอาหารของโลกใหม่ เพราะเกมนี้ไม่ได้วัดกันที่คุณภาพ แต่วัดกันที่ “ลิขสิทธิ์”
เรากำลังกินอนาคตที่เราไม่ได้เลือก ในชื่อของ “เทคโนโลยี” ในคราบของ “ทางเลือก” ในความนิยมของ "super food" แต่แท้จริงแล้ว เราอาจกำลังแลก สิทธิการควบคุมอาหาร ไปกับ “คำสัญญาว่าโลกจะดีขึ้น” ไม่ต่างอะไรจากการเอาอาหารไปวางไว้ในห้องแล็บ และล็อกประตูเอาไว้ให้คนไม่กี่คนถือกุญแจ
not your key, not your free เหมือนเพลงที่ผมเขียนไว้ในอัลบั้ม orange cafe ครับ https://youtu.be/k5jUpFXI6Gg?si=4GXOXjYbOpqX9kRb
#pirateketo #กูต้องรู้มั๊ย #ม้วนหางสิลูก
-
@ 7776c32d:45558888
2025-04-17 02:05:15Opinion about Bitcoin Wallet (android)
I think this was the first self-custody wallet I ever used. I'm really glad it's still maintained and reproducible from source 🤙
WalletScrutiny #nostrOpinion
-
@ f18b1f8f:5f442454
2025-04-17 16:55:46A supermemory MCP plugin that you can use to bring a memory with you to any client of your choosing. Supports fetching from, and storing to, memory. Comes with a prompt to help the client identify when to use or store updates. Very neat, and ties integrations together very well.
Here is a video walkthrough: https://x.com/DhravyaShah/status/1912544778090414188
e578b136-7ed8-45d8-925e-b8a0ebc3a96d
-
@ dfa02707:41ca50e3
2025-04-16 14:36:00Contribute to keep No Bullshit Bitcoin news going.
Good morning! The GM report is now back on track, and for those wondering where it was... well... it was delayed.
0:00
/0:41
1×
Headlines
- Bitcoin mining centralization in 2025. According to a blog post by b10c, Bitcoin mining was at its most decentralized in May 2017, with another favorable period from 2019 to 2022. However, starting in 2023, mining has become increasingly centralized, particularly due to the influence of large pools like Foundry and the use of proxy pooling by entities such as AntPool.
Source: b10c's blog.
- New Spiral grantee: l0rinc. In February 2024, l0rinc transitioned to full-time work on Bitcoin Core. His efforts focus on performance benchmarking and optimizations, enhancing code quality, conducting code reviews, reducing block download times, optimizing memory usage, and refactoring code.
- ESP32 microcontroller vulnerabilities. A paper by Crypto Deep Tech details how an attacker can embed a hidden list of vulnerabilities through module updates, potentially compromising ESP32 devices and allowing unauthorized access to private keys, underscoring the importance of continuous monitoring and enhancing both device and software security.
Source: Crypto Deep Tech.
- Bitdeer to expand its self-mining operations to navigate tariffs. The Singapore-based mining company is advancing plans to produce machines in the U.S. while reducing its mining hardware sales. This response is in light of increasing uncertainties related to U.S. trade policy, as reported by Bloomberg.
- Local governments in China use private firms to sell seized bitcoin for cash. According to Reuters, the lack of clear regulations for handling seized bitcoin and other tokens—whose trading is banned on the mainland—has led to inconsistent and opaque practices. The situation has sparked debate among attorneys about the need for new regulations.
- Unchained has launched the Bitcoin Legacy Project. The initiative seeks to advance the Bitcoin ecosystem through a bitcoin-native donor-advised fund platform (DAF), investments in community hubs, support for education and open-source development, and a commitment to long-term sustainability with transparent annual reporting.
- In its first year, the program will provide support to Bitcoin hubs in Nashville, Austin, and Denver.
- Support also includes $50,000 to the Bitcoin Policy Institute, a $150,000 commitment at the University of Austin, and up to $250,000 in research grants through the Bitcoin Scholars program.
"Unchained will match grants 1:1 made to partner organizations who support Bitcoin Core development when made through the Unchained-powered bitcoin DAF, up to 1 BTC," was stated in a blog post.
- Voltage has introduced Voltage Payments platform for enterprises. It will offer a single API that integrates both bitcoin and stablecoin payments with minimal technical overhead, providing the option of either Voltage or user-controlled custody. The platform features a comprehensive dashboard, along with built-in compliance and accounting tools. Currently in beta testing, it is set to launch in 46 U.S. states. Join the waitlist to be notified when it becomes available on mainnet.
Use the tools
- Bitcoin Core Config Generator by Jameson Lopp is now compatible with Bitcoin Core v29.0.
- Zeus wallet v0.10.2 is now available. This point release is centered around various bug fixes.
- Bitkit wallet v1.1.0 introduces performance improvements, smarter coin selection with new Autopilot options, a redesigned side menu, and bug fixes.
- Bitcoin Keeper v2.1.1 update includes various UI updates, bug fixes, and performance improvements.
- Flash v0.4.0-beta, a Bitcoin and Lightning wallet built on the Galoy infrastructure and tailored for the Caribbean Community, features a complete UI/UX redesign, encrypted NIP-17 messaging via Nostr, zoom functionality on the scan camera, improved support for NFC-based Flashcards, and much more.
0:00
/0:31
1×
- Payjoin Dev Kit (rust-payjoin) v0.23.0 introduces a first-class persistence abstraction, wire protocol changes to support RFC 9540, and improved compliance with the BIP78 specification. It also includes an experimental multiparty sender, accessible through the hidden "_multiparty" feature gate. Additionally, it addresses technical debt by enhancing error handling, expanding functionality with new modules and features, and improving test infrastructure. These updates result in breaking API and protocol changes.
- Payjoin CLI v0.1.0 is now out of alpha, with the wire protocol now presumed to be stable.
- Payjoin Directory v0.0.2 has been tagged. It implements the Payjoin Directory store-and-forward server required for Payjoin V2's asynchronous operation.
- BDK Wallet v1.2.0 has been released. The
TxBuilder
'sadd_recipient
now accepts anyInto<ScriptBuf>
. Coinbase outputs are eligible if maturing in the next block. Wallets usingrusqlite::Connection
are checked for thread safety.bdk_chain
is updated to version 0.21.1, with some internal cleanups. - Lightning Dev Kit (rust-lightning) v0.1.2 includes the latest API updates, performance improvements, and bug fixes.
- Boltz Client v2.5.1 includes a patch for correctly handling negative service fees from Boltz Pro. Earlier version 2.5.0 introduced a new
bumpfee
command alongside several other fixes and improvements. - Elements v23.2.7, an open-source implementation of advanced, sidechain-capable blockchain features extending the Bitcoin protocol, is now available with the latest fixes and improvements.
-
AxeOS (ESP-Miner) v2.6.5 increases the power target for Gamma self test. In version 2.6.4, the under limits for the power consumption self-test were removed.
- AxeOS v2.6.1 was a significant release introducing many new features and improvements. For a comprehensive feature breakdown, check out the details provided by WantClue below.
-
Rust-nostr v0.41 introduces NIP-C0 support and NIP-98 helpers, corrects NIP-32 and NIP-47 implementations, and adds the nostr-keyring crate. It extends admission policies for fine control over relay connections, beneficial in gossip mode. POSIX semaphores are enabled for LMDB on iOS and macOS to address App Sandbox issues. It also expands architecture support for C# and JVM bindings, including linux-x86, windows-x86, and windows-arm64, among other things.
- Nostringer is a JavaScript/TypeScript library providing unlinkable ring signatures (SAG) for Nostr public keys. Inspired by Monero's ring signatures using Spontaneous Anonymous Group (SAG) signatures and the beritani/ring-signatures implementation, it enables a signer to prove their membership in a group of Nostr accounts without disclosing which specific account produced the signature. See a live demo here.
- Private Pond by Kukks a Bitcoin Payjoin application built specifically to optimize Bitcoin transaction rails
-
@ 35da2266:15e70970
2025-04-16 22:45:504EimyzmhhmH4plLDC0nv/KQniv8JrJY/2A8svVqsZ8efXrRGCEsrCJwSzvJOrK6sLkfiVcvJ8r3yXW8QDYceQSDjgTDtoxoL+0U1v66lfEvc/OASt/dICMTrrUe5LXFitve6fmhhnJfUie9Smmgd0kpd5q/pzTBeKUwhdV69t6Q3zs7ACAXncojtHjCqORHDcvJq14pwocpqQjqNu0LGoXT81L4RvIBcN/a+QGwHsQMPTnwje0ryCPpp4BsMZx5XIkvagVRWGwI7oA4361lGer0c1Rx0cxphETaGL3oNlEQGGgO0A++VqiVRp5LpHW0JYVRHpGQn++KV2zIhCk9UcwlgxEx2SYg8fXh0G0l2fUo=?iv=wqlunJB3xhRRILfuEfDe9A==
-
@ 1bc70a01:24f6a411
2025-04-16 13:53:00I've been meaning to dogfood my own vibe project for a while so this feels like a good opportunity to use Untype to publish this update and reflect on my vibe coding journey.
New Untype Update
As I write this, I found it a bit annoying dealing with one of the latest features, so I'll need to make some changes right after I'm done. Nonetheless, here are some exciting developments in the Untype article composer:
-
Added inline AI helper! Now you can highlight text and perform all sorts of things like fix grammar, re-write in different styles, and all sorts of other things. This is a bit annoying at the moment because it takes over the other editing functions and I need to fix the UX.
-
Added pushing articles to DMs! This option, when enabled, will send the article to all the subscribers via a NIP-44 DM. (No client has implemented the subscription method yet so technically it won’t work, until one does. I may add this to nrss.app) Also, I have not tested this so it could be broken… will test eventually!
- Added word counts
- Added ability to export as markdown, export as PDF, print.
The biggest flaw I have already discovered is how "I" implemented the highlight functionality. Right now when you highlight some text it automatically pops up the AI helper menu and this makes for an annoying time trying to make any changes to text. I wanted to change this to show a floating clickable icon instead, but for some reason the bot is having a difficult time updating the code to this desired UX.
Speaking of difficult times, it's probably a good idea to reflect a bit upon my vibe coding journey.
Vibe Coding Nostr Projects
First, I think it's important to add some context around my recent batch of nostr vibe projects. I am working on them mostly at night and occasionally on weekends in between park runs with kids, grocery shopping and just bumming around the house. People who see buggy code or less than desired UX should understand that I am not spending days coding this stuff. Some apps are literally as simple as typing one prompt!
That said, its pretty clear by now that one prompt cannot produce a highly polished product. This is why I decided to limit my number of project to a handful that I really wish existed, and slowly update them over time - fixing bugs, adding new features in hopes of making them the best tools - not only on nostr but the internet in general. As you can imagine this is not a small task, especially for sporadic vibe coding.
Fighting the bot
One of my biggest challenges so far besides having very limited time is getting the bot to do what I want it to do. I guess if you've done any vibe coding at all you're probably familiar with what I'm trying to say. You prompt one thing and get a hallucinated response, or worse, a complete mess out the other end that undoes most of the progress you've made. Once the initial thing is created, which barely took any time, now you're faced with making it work a certain way. This is where the challenges arise.
Here's a brief list of issues I've faced when vibe-coding with various tools:
1. Runaway expenses - tools like Cline tend to do a better job directly in VSCode, but they can also add up dramatically. Before leaning into v0 (which is where I do most of my vibe coding now), I would often melt through $10 credit purchases faster than I could get a decent feature out. It was not uncommon for me to spend $20-30 on a weekend just trying to debug a handful of issues. Naturally, I did not wish to pay these fees so I searched for alternatives.
2. File duplication - occasionally, seemingly out of nowhere, the bot will duplicate files by creating an entire new copy and attached "-fixed" to the file name. Clearly, I'm not asking for duplicate files, I just want it to fix the existing file, but it does happen and it's super annoying. Then you are left telling it which version to keep and which one to delete, and sometimes you have to be very precise or it'll delete the wrong thing and you have to roll back to a previous working version.
3. Code duplication - similar to file duplication, occasionally the bot will duplicate code and do things in the most unintuitive way imaginable. This often results in loops and crashes that can take many refreshes just to revert back to a working state, and many more prompts to avoid the duplication entirely - something a seasoned dev never has to deal with (or so I imagine).
4. Misinterpreting your request - occasionally the bot will do something you didn't ask for because it took your request quite literally. This tends to happen when I give it very specific prompts that are targeted at fixing one very specific thing. I've noticed the bots tend to do better with vague asks - hence a pretty good result on the initial prompt.
5. Doing things inefficiently, without considering smarter approaches - this one is the most painful of vibe coding issues. As a person who may not be familiar with some of the smarter ways of handling development, you rely on the bot to do the right thing. But, when the bot does something horribly inefficiently and you are non-the-wiser, it can be tough to diagnose the issue. I often fight myself asking the bot "is this really the best way to handle things? Can't we ... / shouldn't we .../ isn't this supposed to..." etc. I guess one of the nice side effects of this annoyance is being able to prompt better. I learn that I should ask the bot to reflect on its own code more often and seek ways to do things more simply.
A combination of the above, or total chaos - this is a category where all hell breaks loose and you're trying to put out one fire after another. Fix one bug, only to see 10 more pop up. Fix those, to see 10 more and so on. I guess this may sound like typical development, but the bot amplifies issues by acting totally irrationally. This is typically when I will revert to a previous save point and just undo everything, often losing a lot of progress.
Lessons Learned
If I had to give my earlier self some tips on how to be a smarter vibe coder, here's how I'd summarize them:
-
Fork often - in v0 I now fork for any new major feature I'd like to add (such as the AI assistant).
-
Use targeting tools - in v0 you can select elements and describe how you wish to edit them.
-
Refactor often - keeping the code more manageable speeds up the process. Since the bot will go through the entire file, even if it only makes one small change, it's best to keep the files small and refactoring achieves that.
I guess the biggest lesson someone might point out is just to stop vibe coding. It may be easier to learn proper development and do things right. For me it has been a spare time hobby (one that I will admit is taking more of my extra time than I'd like). I don't really have the time to learn proper development. I feel like I've learned a lot just bossing the bot around and have learned a bunch of things in the process. That's not to say that I never will, but for the moment being my heart is still mostly in design. I haven't shared much of anything I have designed recently - mostly so I can remain speaking more freely without it rubbing off on my work.
I'll go ahead and try to publish this to see if it actually works 😂. Here goes nothing... (oh, I guess I could use the latest feature to export as markdown so I don't lose any progress! Yay!
-
-
@ 846ebf79:fe4e39a4
2025-04-14 12:35:54The next iteration is coming
We're busy racing to the finish line, for the #Alexandria Gutenberg beta. Then we can get the bug hunt done, release v0.1.0, and immediately start producing the first iteration of the Euler (v0.2.0) edition.
While we continue to work on fixing the performance issues and smooth rendering on the Reading View, we've gone ahead and added some new features and apps, which will be rolled-out soon.
The biggest projects this iteration have been:
- the HTTP API for the #Realy relay from nostr:npub1fjqqy4a93z5zsjwsfxqhc2764kvykfdyttvldkkkdera8dr78vhsmmleku,
- implementation of a publication tree structure by nostr:npub1wqfzz2p880wq0tumuae9lfwyhs8uz35xd0kr34zrvrwyh3kvrzuskcqsyn,
- and the Great DevOps Migration of 2025 from the ever-industrious Mr. nostr:npub1qdjn8j4gwgmkj3k5un775nq6q3q7mguv5tvajstmkdsqdja2havq03fqm7.
All are backend-y projects and have caused a major shift in process and product, on the development team's side, even if they're still largely invisible to users.
Another important, but invisible-to-you change is that nostr:npub1ecdlntvjzexlyfale2egzvvncc8tgqsaxkl5hw7xlgjv2cxs705s9qs735 has implemented the core bech32 functionality (and the associated tests) in C/C++, for the #Aedile NDK.
On the frontend:
nostr:npub1636uujeewag8zv8593lcvdrwlymgqre6uax4anuq3y5qehqey05sl8qpl4 is currently working on the blog-specific Reading View, which allows for multi-npub or topical blogging, by using the 30040 index as a "folder", joining the various 30041 articles into different blogs. She has also started experimenting with categorization and columns for the landing page.
nostr:npub1l5sga6xg72phsz5422ykujprejwud075ggrr3z2hwyrfgr7eylqstegx9z revamped the product information pages, so that there is now a Contact page (including the ability to submit a Nostr issue) and an About page (with more product information, the build version displayed, and a live #GitCitadel feed).
We have also allowed for discrete headings (headers that aren't section headings, akin to the headers in Markdown). Discrete headings are formatted, but not added to the ToC and do not result in a section split by Asciidoc processors.
We have added OpenGraph metadata, so that hyperlinks to Alexandria publications, and other events, display prettily in other apps. And we fixed some bugs.
The Visualisation view has been updated and bug-fixed, to make the cards human-readable and closeable, and to add hyperlinks to the events to the card-titles.
We have added support for the display of individual wiki pages and the integration of them into 30040 publications. (This is an important feature for scientists and other nonfiction writers.)
We prettified the event json modal, so that it's easier to read and copy-paste out of.
The index card details have been expanded and the menus on the landing page have been revamped and expanded. Design and style has been improved, overall.
Project management is very busy
Our scientific adviser nostr:npub1m3xdppkd0njmrqe2ma8a6ys39zvgp5k8u22mev8xsnqp4nh80srqhqa5sf is working on the Euler plans for integrating features important for medical researchers and other scientists, which have been put on the fast track.
Next up are:
- a return of the Table of Contents
- kind 1111 comments, highlights, likes
- a prototype social feed for wss://theforest.nostr1.com, including long-form articles and Markdown rendering
- compose and edit of publications
- a search field
- the expansion of the relay set with the new relays from nostr:npub12262qa4uhw7u8gdwlgmntqtv7aye8vdcmvszkqwgs0zchel6mz7s6cgrkj, including some cool premium features
- full wiki functionality and disambiguation pages for replaceable events with overlapping d-tags
- a web app for mass-uploading and auto-converting PDFs to 30040/41 Asciidoc events, that will run on Realy, and be a service free for our premium relay subscribers
- ability to subscribe to the forest with a premium status
- the book upload CLI has been renamed and reworked into the Sybil Test Utility and that will get a major release, covering all the events and functionality needed to test Euler
- the #GitRepublic public git server project
- ....and much more.
Thank you for reading and may your morning be good.
-
@ 35da2266:15e70970
2025-04-16 22:45:328l6NZPYyF14c70PicCbGKhxjGeH+cPjGfK8uqgA996qfftvhkAwKoHV455aRuoxaDxQcT5au92oiEvfskfSbIPHl5uqu4oOmbkdJMMnllQYX/zUpcBDjpzPl2Z/61jLaPS5r0hpOnpw/mefqNoT/sooJCmjdvU6JLuJtGfma8ToWOfWW0rRM4tXbUv0zBBodBSHhvvysO9NMYeIhCUB+SHcH4a6rVlsjuzHY7kq7rGpVRN/bV+FK3EiYHegS8VtxNWeecrQh69a7j02a+xklCGB+xet2Dxq0r+7lfEo17UqEsNombY0qzm5R0QX12aXkWxpHPVG+/WzlCb+REmqtwDwo0S2EJQeXH/JItvmyZ55nPUmzMSvizOV57gs+wNS4MVuWk3vXMkLKSfeUhlXmgBU8QFbwOV3LeLSPsGBVzzzeNtu1yYHRM5lR8NvYt114yu7yp2EaOMDNgvIockN5DrL15TwRs1TmsZhoGmqm9McUiQyHBvZBIF2Pu26HEaeJ/C20rcQIoIatB1gLiR9VYarMNynPOke2AQZAsf3n1Eo=?iv=SBph/Z93dPwAx0qGijw19w==
-
@ c1e9ab3a:9cb56b43
2025-04-11 04:41:15Reanalysis: Could the Great Pyramid Function as an Ammonia Generator Powered by a 25GW Breeder Reactor?
Introduction
The Great Pyramid of Giza has traditionally been considered a tomb or ceremonial structure. Yet an intriguing alternative hypothesis suggests it could have functioned as a large-scale ammonia generator, powered by a high-energy source, such as a nuclear breeder reactor. This analysis explores the theoretical practicality of powering such a system using a continuous 25-gigawatt (GW) breeder reactor.
The Pyramid as an Ammonia Generator
Producing ammonia (NH₃) from atmospheric nitrogen (N₂) and hydrogen (H₂) requires substantial energy. Modern ammonia production (via the Haber-Bosch process) typically demands high pressure (~150–250 atmospheres) and temperatures (~400–500°C). However, given enough available energy, it is theoretically feasible to synthesize ammonia at lower pressures if catalysts and temperatures are sufficiently high or if alternative electrochemical or plasma-based fixation methods are employed.
Theoretical System Components:
-
High Heat Source (25GW breeder reactor)
A breeder reactor could consistently generate large amounts of heat. At a steady state of approximately 25GW, this heat source would easily sustain temperatures exceeding the 450°C threshold necessary for ammonia synthesis reactions, particularly if conducted electrochemically or catalytically. -
Steam and Hydrogen Production
The intense heat from a breeder reactor can efficiently evaporate water from subterranean channels (such as those historically suggested to exist beneath the pyramid) to form superheated steam. If coupled with high-voltage electrostatic fields (possibly in the millions of volts), steam electrolysis into hydrogen and oxygen becomes viable. This high-voltage environment could substantially enhance electrolysis efficiency. -
Nitrogen Fixation (Ammonia Synthesis)
With hydrogen readily produced, ammonia generation can proceed. Atmospheric nitrogen, abundant around the pyramid, can combine with the hydrogen generated through electrolysis. Under these conditions, the pyramid's capstone—potentially made from a catalytic metal like osmium, platinum, or gold—could facilitate nitrogen fixation at elevated temperatures.
Power Requirements and Energy Calculations
A thorough calculation of the continuous power requirements to maintain this system follows:
- Estimated Steady-state Power: ~25 GW of continuous thermal power.
- Total Energy Over 10,000 years: """ Energy = 25 GW × 10,000 years × 365.25 days/year × 24 hrs/day × 3600 s/hr ≈ 7.9 × 10²¹ Joules """
Feasibility of a 25GW Breeder Reactor within the Pyramid
A breeder reactor capable of sustaining 25GW thermal power is physically plausible—modern commercial reactors routinely generate 3–4GW thermal, so this is within an achievable engineering scale (though certainly large by current standards).
Fuel Requirements:
- Each kilogram of fissile fuel (e.g., U-233 from Thorium-232) releases ~80 terajoules (TJ) or 8×10¹³ joules.
- Considering reactor efficiency (~35%), one kilogram provides ~2.8×10¹³ joules usable energy: """ Fuel Required = 7.9 × 10²¹ J / 2.8 × 10¹³ J/kg ≈ 280,000 metric tons """
- With a breeding ratio of ~1.3: """ Initial Load = 280,000 tons / 1.3 ≈ 215,000 tons """
Reactor Physical Dimensions (Pebble Bed Design):
- King’s Chamber size: ~318 cubic meters.
- The reactor core would need to be extremely dense and highly efficient. Advanced engineering would be required to concentrate such power in this space, but it is within speculative feasibility.
Steam Generation and Scaling Management
Key methods to mitigate mineral scaling in the system: 1. Natural Limestone Filtration 2. Chemical Additives (e.g., chelating agents, phosphate compounds) 3. Superheating and Electrostatic Ionization 4. Electrostatic Control
Conclusion and Practical Considerations
Yes, the Great Pyramid could theoretically function as an ammonia generator if powered by a 25GW breeder reactor, using: - Thorium or Uranium-based fertile material, - Sustainable steam and scaling management, - High-voltage-enhanced electrolysis and catalytic ammonia synthesis.
While speculative, it is technologically coherent when analyzed through the lens of modern nuclear and chemical engineering.
See also: nostr:naddr1qqxnzde5xymrgvekxycrswfeqy2hwumn8ghj7am0deejucmpd3mxztnyv4mz7q3qc856kwjk524kef97hazw5e9jlkjq4333r6yxh2rtgefpd894ddpsxpqqqp65wun9c08
-
-
@ 35da2266:15e70970
2025-04-16 22:45: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?iv=4u1hEphYhLWkGEvq+Jp1/A==
-
@ c1e9ab3a:9cb56b43
2025-04-10 02:58:16Assumptions
| Factor | Assumption | |--------|------------| | CO₂ | Not considered a pollutant or is captured/stored later | | Water Use | Regulated across all sources; cooling towers or dry cooling required | | Compliance Cost | Nuclear no longer burdened by long licensing and construction delays | | Coal Waste | Treated as valuable raw material (e.g., fly ash for cement, gypsum from scrubbers) | | Nuclear Tech | Gen IV SMRs in widespread use (e.g., 50–300 MWe units, modular build, passive safety) | | Grid Role | All three provide baseload or load-following power | | Fuel Pricing | Moderate and stable (no energy crisis or supply chain disruptions) |
Performance Comparison
| Category | Coal (IGCC + Scrubbers) | Natural Gas (CCGT) | Nuclear (Gen IV SMRs) | |---------|-----------------------------|------------------------|--------------------------| | Thermal Efficiency | 40–45% | 55–62% | 30–35% | | CAPEX ($/kW) | $3,500–5,000 | $900–1,300 | $4,000–7,000 (modularized) | | O&M Cost ($/MWh) | $30–50 | $10–20 | $10–25 | | Fuel Cost ($/MWh) | $15–25 | $25–35 | $6–10 | | Water Use (gal/MWh) | 300–500 (with cooling towers) | 100–250 | 300–600 | | Air Emissions | Very low (excluding CO₂) | Very low | None | | Waste | Usable (fly ash, FGD gypsum, slag) | Minimal | Compact, long-term storage required | | Ramp/Flexibility | Slow ramp (newer designs better) | Fast ramp | Medium (SMRs better than traditional) | | Footprint (Land & Supply) | Large (mining, transport) | Medium | Small | | Energy Density | Medium | Medium-high | Very high | | Build Time | 4–7 years | 2–4 years | 2–5 years (with factory builds) | | Lifecycle (years) | 40+ | 30+ | 60+ | | Grid Resilience | High | High | Very High (passive safety, long refuel) |
Strategic Role Summary
1. Coal (Clean & Integrated)
- Strengths: Long-term fuel security; byproduct reuse; high reliability; domestic resource.
- Drawbacks: Still low flexibility; moderate efficiency; large physical/logistical footprint.
- Strategic Role: Best suited for regions with abundant coal and industrial reuse markets.
2. Natural Gas (CCGT)
- Strengths: High efficiency, low CAPEX, grid agility, low emissions.
- Drawbacks: Still fossil-based; dependent on well infrastructure; less long-lived.
- Strategic Role: Excellent transitional and peaking solution; strong complement to renewables.
3. Nuclear (Gen IV SMRs)
- Strengths: Highest energy density; no air emissions or CO₂; long lifespan; modular & scalable.
- Drawbacks: Still needs safe waste handling; high upfront cost; novel tech in deployment stage.
- Strategic Role: Ideal for low-carbon baseload, remote areas, and national strategic assets.
Adjusted Levelized Cost of Electricity (LCOE)
| Source | LCOE ($/MWh) | Notes | |--------|------------------|-------| | Coal (IGCC w/scrubbers) | ~$75–95 | Lower with valuable waste | | Natural Gas (CCGT) | ~$45–70 | Highly competitive if fuel costs are stable | | Gen IV SMRs | ~$65–85 | Assuming factory production and streamlined permitting |
Final Verdict (Under Optimized Assumptions)
- Most Economical Short-Term: Natural Gas
- Most Strategic Long-Term: Gen IV SMRs
- Most Viable if Industrial Ecosystem Exists: Clean Coal
All three could coexist in a diversified, stable energy grid: - Coal filling a regional or industrial niche, - Gas providing flexibility and economy, - SMRs ensuring long-term sustainability and energy security.
-
@ f1989a96:bcaaf2c1
2025-04-17 15:31:58Good morning, readers!
This week’s headlines expose the lengths authoritarian regimes go to perpetuate the financial power that preserves their rule, often going so far as to bend, break, and rewrite the rules of money itself.\ \ In Nigeria, a make-up artist faces six months in prison for tossing around naira banknotes in a celebratory fashion during his wedding. The Nigerian regime claims this “disrespects” the currency, enforcing a 2007 law that criminalizes the public display or mishandling of cash. This instance offers a view into the absurdity of the monetary policies under which a large part of the world lives.\ \ Meanwhile, in Northern Africa, Libya devalued its currency overnight. Libyans woke up to a 13.3% haircut on their savings as the autocratic regime shored up its finances at the expense of citizens’ financial security. While this is the first devaluation of the dinar in the last four years, it is unlikely to be the last.\ \ In freedom tech news, Unocoin, India’s oldest digital asset exchange, integrated the Lightning Network, bringing millions of its users access to fast and low-cost Bitcoin payments. As financial repression increases in India, integrating Bitcoin scaling into financial platforms like Unocoin is a welcome development at a pressing time.\ \ Finally, we feature an article from journalist Roger Huang, who details the Bitcoin-driven relief efforts led by Burmese activist and HRF fellow Win Ko Ko Aung in the aftermath of a 7.7-magnitude earthquake. Amid civil war and immense state repression of finances, opposition, and media, Bitcoin offers an uncensorable way to fund relief efforts, protect donor privacy, and ensure that support reaches those affected. This is a great example of how Bitcoin can deliver aid in the most critical of times.
Now, let’s dive right in!
SUBSCRIBE HERE
GLOBAL NEWS
Nigeria | Artist Faces Six Months in Prison for Tossing Naira Currency
The Nigerian regime sentenced a makeup artist to six months in prison for tossing naira currency banknotes during his wedding celebration. While the practice is common, Nigerian officials enforce a 2007 law criminalizing the “spraying of, dancing, or marching on the naira.” Therefore, the regime claims this recent act “disrespects” one of the country’s most “important” symbols — the naira. Around the same time, authorities banned the song “Tell Your Papa” by artist Eedris Abdulkareem. The song criticizes President Tinubu and urges his son, Seyi, to tell him “people are dying” from regime-induced hunger and insecurity. These two cases expose a regime more obsessed with symbolic obedience than alleviating the struggles of a population crushed by inflation. Meanwhile, the country’s top officials, who have siphoned off much of the nation’s wealth, collapsed the currency (which has lost 70% of its value since de-pegging from the US dollar), and ignored the financial pleas of citizens, go unpunished.
Libya | Regime Devalues Currency for First Time in Four Years
Libya’s central bank devalued the “official” Libyan dinar by 13.3% overnight, its first devaluation in four years and a likely sign of more to come. The official exchange rate now sits at 5.5677 dinars per dollar, while the informal market rate hovers around 7.20. The gap between Libya’s official and informal market exchange rates makes imported goods more expensive for average citizens. This is because Libyans rely on the informal market rate to access foreign currency that is used to buy essential, imported goods like medicine, fuel, and food. This gives them less purchasing power than otherwise would be. The two-tiered exchange system also fuels corruption among regime officials, as those with access to official rates can exploit the spread for personal gain, deepening public frustration in a country already divided by dueling governments and weak public institutions.
Turkey | Injects Billions to Prop Up Collapsing Lira While Rewarding Police Repression
The Central Bank of Turkey injected $42 billion in foreign currency reserves to prop up the Turkish lira, which has plummeted to record lows. At the same time, protests erupted across the country following the politically motivated arrest of Istanbul Mayor Ekrem Imamoğlu. Now, the regime is rewarding police for violently suppressing demonstrators. Officers involved in the crackdown on protesters reportedly received 10,000 lira ($262) each in cash, funded by the same shrinking public funds. While Erdogan uses state funds to reward repression, a Turkish court rejected İmamoğlu’s appeal, underscoring a regime determined to silence dissent, dismantle democracy, and cling to power at any cost.
Syria | Economist Proposes “New” Currency to Solve Economic Woes
In Syria, economist George Khazzam is proposing to remove two zeros from the Syrian pound to mask the regime’s economic failure and escape hyperinflation. Additionally, Khazzam recommends reprinting all Syrian pound banknotes and limiting the issuance of higher denomination notes. Since 2011, the Syrian pound has plummeted from 50 to over 15,000 pounds per dollar as civil war, sweeping sanctions, and failed currency policies manifest throughout the country. In northern regions like Idlib and Aleppo, many have abandoned the pound entirely, turning to the Turkish lira for daily transactions. While it is also unstable, its use in northern Syria is driven by necessity. Across Syria, wages are crumbling, prices change hourly, and banking access is unreliable at best.
Pakistan | Mining Bitcoin With Surplus Electricity
Pakistan unveiled intentions to mine Bitcoin and run AI data centers using surplus electricity in a bid to address the country’s energy inefficiencies and drive economic growth in emerging technologies. Additionally, in a move that surprised many, the military-backed regime appointed Changpeng Zhao, the founder of digital asset exchange Binance, as a strategic adviser to help guide the country’s “cryptocurrency” and “blockchain” initiatives, policy, and education. At first glance, these steps suggest a shift toward innovation and modernization. But these policies come from the same regime that jails political opposition, censors and shuts down the Internet, and financially represses independent media. It remains unclear how these policies can benefit individual Pakistanis.
South Korea | 7-Eleven Accepting Discounted CBDC Payments During Pilot Phase
South Korea launched a nationwide pilot of its central bank digital currency (CBDC), enrolling 100,000 South Korean users. As part of the rollout, 7-Eleven will accept CBDC payments and offer a 10% discount on all products. Governments facing public skepticism regarding their CBDCs increasingly use similar incentive tactics to onboard users. For example, Nigeria discounts taxi fares to push its e-Naira CBDC, while Thailand is distributing its CBDC directly to citizens for free. While South Korea’s CBDC project aims to modernize payments, it is part of a broader push from countries, even democratic ones, to integrate state-controlled digital currencies into everyday transactions. A move that is diametrically opposed to individuals’ freedom, privacy, and human rights.
BITCOIN AND FREEDOM TECH NEWS
Unocoin | Integrates Bitcoin’s Lightning Network
Unocoin, India’s oldest digital asset exchange, integrated the Lightning Network through Voltage, a Bitcoin and Lightning infrastructure company, bringing millions of Unocoin users access to fast and low-cost Bitcoin payments. This upgrade is critical for Indians seeking alternatives to a progressively repressive financial system. The Indian government is freezing political opposition bank accounts, granting tax authorities legal access to citizens’ private online data, and expanding its CBDC by integrating with incumbent fintech firms and government-built payment rails like UPI. While Unocoin is a centralized exchange that requires registration and holds assets on behalf of its users, integrating Lightning will afford users greater flexibility, autonomy, and privacy when managing their finances.
Phoenix Wallet | Resumes Operations in the US
Phoenix Wallet, an open-source and self-custodial Bitcoin Lightning wallet, officially resumed operations in the US following the release of the US Deputy Attorney General’s “Ending Regulation by Prosecution” memo. The move offers much-needed clarity for developers and operators of open-source software and reinforces the right to develop and use tools for self-custody and peer-to-peer transactions. “We are happy to make our products available again in the USA,” said ACINQ, the team behind Phoenix. This decision marks a win for activists and dissidents living in the US to use the same tools they might use in their home countries.
Blitz Wallet | Refines Ecash Functionality
Blitz Wallet, an open-source and self-custodial Bitcoin, Lightning, Liquid, and ecash wallet, released its latest beta version, bringing expanded ecash functionality. Ecash is a Bitcoin-backed digital money system that enables practical everyday payments on Bitcoin that are private by design (but users must trust mints to manage their funds). The latest Blitz update increases ecash limits, allowing users to set custom receive amounts and a maximum balance for ecash payments. Further, it expands manual swap options so users can routinely exchange their ecash for Bitcoin on Lightning, Liquid, or vice versa. Blitz also lets users spend their ecash balance to buy gift cards, access AI tools, and pay for VPN services all through the app — useful features for anyone living under tyranny.
Bitsacco | First Business Accepts Payments Directly into Savings Wallet
Bitsacco, a Bitcoin-powered alternative to Kenyan Savings and Credit Cooperative Organizations (SACCOs) and HRF grantee, just hit a major milestone: a Kenyan business is now accepting payments directly into its Personal Savings wallet on Bitsacco. This is the first instance of a Kenyan merchant choosing to save revenue in Bitcoin using Bitsacco’s community custody model. Letting businesses convert earnings into Bitcoin through a familiar path unlocks new use cases and forges novel avenues to financial freedom. In a region where inflation, banking restrictions, and undemocratic financial reforms erode economic autonomy, this kind of real-world usage shows how Bitcoin can support grassroots saving and financial inclusion.
BTCPay Server | Adds New Integrations, Plugins, and Features
BTCPay Server, an open-source, self-hosted Bitcoin payment processor, released its latest update, which includes new multisignature capabilities (where multiple private keys are used to access Bitcoin in a wallet), fee acceleration tools, and new integrations that can benefit nonprofits and activists operating under financial surveillance. The updated multisignature brings collaborative custody wallets and support for major hardware devices. Enhanced fee acceleration tools (like RBF and CPFP) help users rescue stuck transactions during periods of high network congestion. And finally, BTCPay Server added integrations with Shopify V2, Ghost, and ECWID. This strengthens its role as a self-hosted payment processor for individuals and nonprofits seeking financial independence and autonomy in regions where authoritarian rulers limit economic freedom.
Electrum | Merges Nostr Wallet Connect Plugin
Electrum, an open-source Bitcoin wallet, just merged software support for Nostr Wallet Connect (NWC), which will enable users to remotely control their Electrum wallet through a Nostr plugin. More generally, NWC is a protocol that connects Bitcoin Lightning wallets to other applications like Nostr. This new plugin will let users authorize external apps and Nostr clients like Amethyst, Alby, and LNbits to initiate Lightning payments from their Electrum wallet, without needing to expose private keys or run their own node.By bridging Lightning with decentralized identity and messaging, Electrum’s support for NWC can empower journalists and individuals to interact with Bitcoin privately, flexibly, and independently.
RECOMMENDED CONTENT
How Bitcoin Is Used To Raise Funds In Myanmar For Earthquake Relief by Roger Huang
In the wake of a catastrophic 7.7-magnitude earthquake in Burma (Myanmar), journalist Roger Huang’s latest article for Forbes details how activists are using Bitcoin to deliver aid where traditional financial channels have failed. Amid civil war and immense state repression, Bitcoin offers an uncensorable way to fund relief efforts, protect donor privacy, and ensure that support reaches those on the ground. The piece highlights efforts by Burmese activist and HRF fellow Win Ko Ko Aung to route donations through Bitcoin, bypassing military-junta control and getting the funds directly to those affected. We encourage you to read the full article to understand how Bitcoin is fueling hope in the face of disaster.
The Bitcoin Miner’s Guide to Total Control with Bitaxe by BTC Sessions
In this tutorial, Bitcoin Educator Ben Perrin (BTC Sessions) shows viewers how to set up their own Bitaxe, a small, affordable, open-source Bitcoin mining device supported in part by HRF’s Bitcoin Development Fund. He walks through the process of getting started, running your own Bitcoin node (a computer that runs the Bitcoin software), joining a mining pool, and receiving payouts through the Lightning Network. Tutorials like these are important because they make home mining more accessible, enabling even those living under tyranny to leverage freedom tech to participate in and secure the Bitcoin network. For activists, mining at home means gaining more control over how they earn, spend, and store their money, all without relying on centralized systems that can block or monitor them. Watch the full video to learn how to take full ownership of your Bitcoin mining setup.
If this article was forwarded to you and you enjoyed reading it, please consider subscribing to the Financial Freedom Report here.
Support the newsletter by donating bitcoin to HRF’s Financial Freedom program via BTCPay.\ Want to contribute to the newsletter? Submit tips, stories, news, and ideas by emailing us at ffreport @ hrf.org
The Bitcoin Development Fund (BDF) is accepting grant proposals on an ongoing basis. The Bitcoin Development Fund is looking to support Bitcoin developers, community builders, and educators. Submit proposals here.
-
@ 35da2266:15e70970
2025-04-16 22:26:550uKO4r+WwogO34up9lu1CuIfR6YzkiEoN2Anyiqc6+CKJaREAgvMBeQliTvz34Fm1PymGPb0QjN2kGs5zCY8BrHyFUCjGF5nHpC6mGjQzBbeL1PFQDUsF9QcgGptUstlAMsP8HaYdK8fxG5/5ML+p+yRUR/HuRf4H7Tpwd4QMba+IzKimy/3EstVPe+EQcWbbZSw/yQTsvDoZGPhAX7Hpffg4WfKukOw2KFStKvbbboXqEfcfxlddvpdKr0aU9xKZDvXDKMf/LWl+8ZEqD95lOAv/ymnrtyRgUzjxkHB/1oAIFNnve9yM0EESiYNCVz5NL9mS5W/q/i7SBXRiPb+cbcInuvkKtfcVawpMPqPaCo=?iv=L6Yvtf+8L4j0Puogh15kig==
-
@ 35da2266:15e70970
2025-04-16 22:26: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?iv=bl4ZGJ8keKfKYGTyv2OdDQ==
-
@ fd06f542:8d6d54cd
2025-04-17 14:16:50顺炮直车对缓开车是20世纪70年代兴起的布局,常见变化如下: 1. 单边封锁对河沿车对边卒:炮二平五,炮8平5;马二进三,马8进7;车一平二,卒7进1;马八进七,马2进3;兵七进一,炮2进4;马七进八,车9进1;车九进一,车9平4;车九平七,车4进3(车4进6则形成另一变例),炮八平九,车1平2,车七进一,卒1进1,形成单边封锁局面,黑方车守河沿,红方控制边卒方向。 2. 单边封锁对肋炮攻马:前几步同单边封锁对河沿车对边卒,车九平七后,黑方走炮2平7打马,红方如马八进七,炮7进3,仕四进五,炮7平9,形成红方单边封锁,黑方肋炮攻马的局面,双方对攻。 3. 肋车捉炮对边马左士:炮二平五,炮8平5;马二进三,马8进7;车一平二,卒7进1;马八进九,马2进3;兵七进一,车9进1;车九进一,车9平4;仕四进五,车4进3;炮八平七,炮2进2,黑方肋车捉炮,红方边马左士防守,局势较为平稳。 4. 肋车捉炮对边马骑河车:前几步同上,车九进一后,黑方车9平4,接着车4进5骑河,红方炮八平七,炮2进2,车二进四,形成黑方肋车捉炮、边马配合骑河车的局面,双方相互牵制。 5. 双横车肋车捉炮对过河车右炮巡河:炮二平五,炮8平5;马二进三,马8进7;车一平二,卒7进1;马八进七,马2进3;兵七进一,车9进1;车九进一,车1进1;车二进六,车9平4;车二平三,炮2进2,形成红方过河车,黑方双横车、肋车捉炮,右炮巡河的局面,局面复杂,对攻激烈。 6. 双横车对过河车:炮二平五,炮8平5;马二进三,马8进7;车一平二,卒7进1;马八进七,马2进3;兵七进一,车9进1;车九进一,车1进1;车二进六,车9平4;车二平三,车4进7,黑方双横车出动,对红方过河车展开攻击,双方进入激烈的中盘战斗。 7. 横车对炮打中卒:炮二平五,炮8平5;马二进三,马8进7;车一平二,卒7进1;马八进七,马2进3;兵七进一,车9进1;炮五进四,马3进5;车二进五,车9平4;车二平五,炮2进4,红方炮打中卒获取物质优势,黑方出横车准备反击。 8. 边马缓出车对快横车:炮二平五,炮8平5;马二进三,马8进7;车一平二,卒7进1;马八进九,车9进1;车九进一,车9平4;车二进四,马2进1;炮八平七,炮2平3,红方边马缓出,黑方快出横车,双方形成不同的进攻节奏。 9. 缓封锁对巡河车:炮二平五,炮8平5;马二进三,马8进7;车一平二,卒7进1;马八进七,马2进3;兵七进一,炮2进4;马七进八,车9进1;车二进四,车9平4;车九进一,炮2平7;相三进一,车4进3,红方缓封锁,黑方出巡河车,局势发展较为平稳。 10. 巡河炮对过河车:炮二平五,炮8平5;马二进三,马8进7;车一平二,卒7进1;马八进七,马2进3;兵七进一,炮2进2;车二进六,车9进1;车二平三,车9平4;炮八进二,形成红方巡河炮、过河车,黑方出横车的局面,双方互相试探,寻找进攻机会。
-
@ 35da2266:15e70970
2025-04-16 22:26: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?iv=5Zlu0jBwAcvWV1egl6CgaA==
-
@ dfa02707:41ca50e3
2025-04-16 05:30:53Contribute to keep No Bullshit Bitcoin news going.
- This release eliminates UPnP support in favor of NAT-PMP/PCP, enhances transaction orphan handling for improved reliability, and introduces ephemeral dust to defer fee commitment.
- Various RPCs now feature enhanced error reporting and new data fields, the block size handling bug related to reserved weight has been fixed, and the removal of the
mempoolfullrbf
option standardizes full replace-by-fee behavior. - With this new major release, versions 26.x and older have reached "Maintenance End" and will no longer receive updates. Two weeks after this release, medium and high severity vulnerabilities affecting 26.x will be disclosed, as well as low severity vulnerabilities affecting 28.x, in line with the security policy.
What's new
-
P2P and Network Changes:
- Support for UPnP has been dropped in favor of a more modern NAT-PMP/PCP implementation.
-
Added support for PCP & IPv6 pinholing.
libnatpmp
was replaced with built-in NAT-PMP/PCP implementation, enabled via-natpmp
, which supports IPv4 port forwarding and IPv6 pinholing. - A change in assigning onion listening ports. Now, when using the
-port
configuration option, the default onion listening port will be set to the specified port +1, rather than a fixed value like 8334 on mainnet.
"This re-allows setups with multiple local nodes using different
-port
and not using-bind
, which would lead to a startup failure in v28.0 due to a port collision," was explained in the release notes.-
More reliable orphan handling. When a node receives an orphan transaction (an unconfirmed transaction that spends unknown inputs), it will attempt to download missing parents from peers who announced the orphan, potentially increasing bandwidth but enhancing handling of orphan transactions.
-
Mempool Policy and Mining Changes:
- Relay transaction packages containing ephemeral dust. An ephemeral dust output is a tiny transaction output, below the dust limit, produced in a v3 zero-fee transaction and consumed in a following v3 transaction. These transactions occur within the same package, making the output temporary since it is both generated and spent at once. It is useful for Lightning network, Ark, ln-symmetry, Spacechains, Timeout Trees, and other constructs.
-
New startup option -blockreservedweight. In versions before 29.0, a bug limited actual block sizes to 3,992,000 WU by setting a default reserved weight of 8,000 WU for block headers and transactions. The fix adds a new option, -blockreservedweight, with the same default for compatibility.
-
New RPCs:
getdescriptoractivity
to track activity of a given set of descriptors. It helps identify all spending and receiving activities for specific descriptors within chosen blocks, and can be used withscanblocks
to reduce reliance on additional indexing programs.
-
Updated RPCs:
- Enhanced RPC Response: testmempoolaccept now includes Reject Details. Bitcoin Core 29.0 adds a verbose
reject-details
field to thetestmempoolaccept
RPC, detailing rejections likeinsufficient-fee
. - Persistent block data for duplicate submitblock submissions. Duplicate blocks submitted via
submitblock
will now retain their data even if previously pruned. If pruning is enabled, the data will eventually be pruned again when its block file is selected for pruning.
- Enhanced RPC Response: testmempoolaccept now includes Reject Details. Bitcoin Core 29.0 adds a verbose
-
Updated
getmininginfo
. Thegetmininginfo
now includesnBits
and the current target in thetarget
field. It also serves anext
object, detailing theheight
,nBits
,difficulty
, andtarget
for the upcoming block. getblock
andgetblockheader
now return the current target in thetarget
field.getblockchaininfo
andgetchainstates
now returnnBits
and the current target in thetarget
field.-
getblocktemplate
RPC now considers BIP94 Timewarp Fix. Thegetblocktemplate
RPC now considers the timewarp fix from BIP94 for thecurtime
(BIP22) andmintime
(BIP23) fields across all networks. This change helps prevent un-upgraded miners from unintentionally breaching the timewarp rule if a timewarp fix softfork activates on the mainnet. -
Updated REST APIs:
- Get block and Get headers return target in the target field. The
GET /rest/block/<BLOCK-HASH>.json
andGET /rest/headers/<BLOCK-HASH>.json
now return the current target in thetarget
field.
- Get block and Get headers return target in the target field. The
-
Updated Settings:
- Replace-by-fee the standard. From version v28.0, the
-mempoolfullrbf
option was set to default to 1. Due to widespread policy adoption, this option has been removed, making full replace-by-fee the standard behavior. - The maximum limit for the
-dbcache
configuration option has been removed due to recent UTXO set growth. Previously, large-dbcache
values were automatically capped at 16 GiB (or 1 GiB on 32-bit systems). - The handling of negated options like
-noseednode
,-nobind
,-nowhitebind
, and others has been improved. Now, negating these options simply resets them to their defaults, removing previous confusing and undocumented effects. - Using the
-upnp
option will now log a warning and be treated as-natpmp
. It's recommended to use-natpmp
directly instead.
- Replace-by-fee the standard. From version v28.0, the
-
Bitcoin Core will not start if the
-blockreservedweight
parameter is set below 2,000 WU. It will also fail to start if either-blockmaxweight
or-blockreservedweight
exceeds the consensus limit of 4,000,000 WU. -
Using
-debug=0
or-debug=none
now works like-nodebug
. It clears previously set debug categories while allowing later-debug
options to be applied. -
The default value for
-rpcthreads
has increased from 4 to 16, and-rpcworkqueue
has been updated from 16 to 64. -
Build System:
- The build system has been migrated from Autotools to CMake. The minimum required CMake version is 3.22.
"For more detailed guidance on configuring and using CMake, please refer to the official CMake documentation and CMake’s User Interaction Guide. Additionally, consult platform-specific
doc/build-*.md
build guides for instructions tailored to your operating system."- Tools and Utilities:
- The new tool
utxo_to_sqlite.py
converts a compact-serialized UTXO snapshot, created using thedumptxoutset
RPC, into a SQLite3 database. Check the script's--help
output for more information.
- The new tool
- Testing:
- The BIP94 timewarp attack mitigation (designed for testnet4) is no longer active on the regtest network.
- Dependencies:
- MiniUPnPc and libnatpmp have been removed as dependencies.
For more information on the new features, improvements, and bug fixes in this release, refer to the full release notes. Additionally, the detailed v29 testing guide provides steps for testing the latest features.
"Thanks to everyone who directly contributed to this release, including 0xb10c, Adlai Chandrasekhar, Afanti, Alfonso Roman Zubeldia, am-sq, Andre, Andre Alves, Anthony Towns, Antoine Poinsot, Ash Manning, Ava Chow, Boris Nagaev, Brandon Odiwuor, brunoerg, Chris Stewart, Cory Fields, costcould, Daniel Pfeifer, Daniela Brozzoni, David Gumberg, dergoegge, epysqyli, espi3, Eval EXEC, Fabian Jahr, fanquake, furszy, Gabriele Bocchi, glozow, Greg Sanders, Gutflo, Hennadii Stepanov, Hodlinator, i-am-yuvi, ion-, ismaelsadeeq, Jadi, James O’Beirne, Jeremy Rand, Jon Atack, jurraca, Kay, kevkevinpal, l0rinc, laanwj, Larry Ruane, Lőrinc, Maciej S. Szmigiero, Mackain, MarcoFalke, marcofleon, Marnix, Martin Leitner-Ankerl, Martin Saposnic, Martin Zumsande, Matthew Zipkin, Max Edwards, Michael Dietz, naiyoma, Nicola Leonardo Susca, omahs, pablomartin4btc, Pieter Wuille, Randall Naar, RiceChuan, rkrux, Roman Zeyde, Ryan Ofsky, Sebastian Falbesoner, secp512k2, Sergi Delgado Segura, Simon, Sjors Provoost, stickies-v, Suhas Daftuar, tdb3, TheCharlatan, tianzedavid, Torkel Rogstad, Vasil Dimov, wgyt, willcl-ark, yancy, and everyone who assisted with translations on Transifex."
-
@ c1e9ab3a:9cb56b43
2025-04-10 02:57:02A follow-up to nostr:naddr1qqgxxwtyxe3kvc3jvvuxywtyxs6rjq3qc856kwjk524kef97hazw5e9jlkjq4333r6yxh2rtgefpd894ddpsxpqqqp65wuaydz8
This whitepaper, a comparison of baseload power options, explores a strategic policy framework to reduce the cost of next-generation nuclear power by aligning Gen IV Small Modular Reactors (SMRs) with national security objectives, public utility management, and a competitive manufacturing ecosystem modeled after the aerospace industry. Under this approach, SMRs could deliver stable, carbon-free power at $40–55/MWh, rivaling the economics of natural gas and renewables.
1. Context and Strategic Opportunity
Current Nuclear Cost Challenges
- High capital expenditure ($4,000–$12,000/kW)
- Lengthy permitting and construction timelines (10–15 years)
- Regulatory delays and public opposition
- Customized, one-off reactor designs with no economies of scale
The Promise of SMRs
- Factory-built, modular units
- Lower absolute cost and shorter build time
- Enhanced passive safety
- Scalable deployment
2. National Security as a Catalyst
Strategic Benefits
- Energy resilience for critical defense infrastructure
- Off-grid operation and EMP/cyber threat mitigation
- Long-duration fuel cycles reduce logistical risk
Policy Implications
- Streamlined permitting and site access under national defense exemptions
- Budget support via Department of Defense and Department of Energy
- Co-location on military bases and federal sites
3. Publicly Chartered Utilities: A New Operating Model
Utility Framework
- Federally chartered, low-margin operator (like TVA or USPS)
- Financially self-sustaining through long-term PPAs
- Focus on reliability, security, and public service over profit
Cost Advantages
- Lower cost of capital through public backing
- Predictable revenue models
- Community trust and stakeholder alignment
4. Competitive Manufacturing: The Aviation Analogy
Model Characteristics
- Multiple certified vendors, competing under common safety frameworks
- Factory-scale production and supply chain specialization
- Domestic sourcing for critical components and fuel
Benefits
- Cost reductions from repetition and volume
- Innovation through competition
- Export potential and industrial job creation
5. Levelized Cost of Electricity (LCOE) Impact
| Cost Lever | Estimated LCOE Reduction | |------------|--------------------------| | Streamlined regulation | -10 to -20% | | Public-charter operation | -5 to -15% | | Factory-built SMRs | -15 to -30% | | Defense market anchor | -10% |
Estimated Resulting LCOE: $40–55/MWh
6. Strategic Outcomes
- Nuclear cost competitiveness with gas and renewables
- Decarbonization without reliability sacrifice
- Strengthened national energy resilience
- Industrial and workforce revitalization
- U.S. global leadership in clean, secure nuclear energy
7. Recommendations
- Create a public-private chartered SMR utility
- Deploy initial reactors on military and federal lands
- Incentivize competitive SMR manufacturing consortia
- Establish fast-track licensing for Gen IV designs
- Align DoD/DOE energy procurement to SMR adoption
Conclusion
This strategy would transform nuclear power from a high-cost, high-risk sector into a mission-driven, economically viable backbone of American energy and defense infrastructure. By treating SMRs as strategic assets, not just energy projects, the U.S. can unlock affordable, scalable, and secure nuclear power for generations to come.
-
@ 35da2266:15e70970
2025-04-16 22:26:30XZ3crp0D8f9lSXrZIG4A5FtlyH2Cx6+2lsLItcGQmWy2DyjGlmIOb25z3bCOiegidk+IRCmCK7kfS5f5G2Xw2eAnDiH6/WSpQUplHThMu7+ZVMF9RDOW/eR4cQPP6emMwZxL/VvO8MPgqI0zQ8JnxcvVbmrBlu8NEUUkh0rowor36CdrshoJzVYdcRndcKBGA7aYw0CRfFoOAf1l71ETLM5lVGKk0PmtcepjueBvXeQKVNVw4FS3SzNlBCubjsy+7PWxT/2XPGgq5NmkpW3PvcUFiHLybLRpFfUBA0QKVsKCE5wIDJa25cO7ks840BICmJqau/iDjvXJeA+DGIqhLmdpzl/BuVry/86t5jygNejjKOoqYSkxJYqysd6Wbd7g15LvRd+cb4rgYL44kXUucyJdrzRjDMuxJQU+/l67FWk+zFeLi6NLUwxBtPU78zXJoJC9aQ+cTHJE5YaXKaa69RgIQmFMsSI6GmKjQQ9Yvx+/2DQGOdyQj+f0AeuF0UCBVj+IpH7Kob2aNL11IlPsSt0TylWhDupClhh3RJ9UPvs=?iv=zEN50OwsSEEtA0V47e+bHA==
-
@ c1e9ab3a:9cb56b43
2025-04-10 02:55:11The United States is on the cusp of a historic technological renaissance, often referred to as the Fourth Industrial Revolution. Artificial intelligence, automation, advanced robotics, quantum computing, biotechnology, and clean manufacturing are converging into a seismic shift that will redefine how we live, work, and relate to one another. But there's a critical catch: this transformation depends entirely on the availability of stable, abundant, and inexpensive electricity.
Why Electricity is the Keystone of Innovation
Let’s start with something basic but often overlooked. Every industrial revolution has had an energy driver:
- The First rode the steam engine, powered by coal.
- The Second was electrified through centralized power plants.
- The Third harnessed computing and the internet.
- The Fourth will demand energy on a scale and reliability never seen before.
Imagine a city where thousands of small factories run 24/7 with robotics and AI doing precision manufacturing. Imagine a national network of autonomous vehicles, delivery drones, urban vertical farms, and high-bandwidth communication systems. All of this requires uninterrupted and inexpensive power.
Without it? Costs balloon. Innovation stalls. Investment leaves. And America risks becoming a second-tier economic power in a multipolar world.
So here’s the thesis: If we want to lead the Fourth Industrial Revolution, we must first lead in energy. And nuclear — specifically Gen IV Small Modular Reactors (SMRs) — must be part of that leadership.
The Nuclear Case: Clean, Scalable, Strategic
Let’s debunk the myth: nuclear is not the boogeyman of the 1970s. It’s one of the safest, cleanest, and most energy-dense sources we have.
But traditional nuclear has problems:
- Too expensive to build.
- Too long to license.
- Too bespoke and complex.
Enter Gen IV SMRs:
- Factory-built and transportable.
- Passively safe with walk-away safety designs.
- Scalable in 50–300 MWe increments.
- Ideal for remote areas, industrial parks, and military bases.
But even SMRs will struggle under the current regulatory, economic, and manufacturing ecosystem. To unlock their potential, we need a new national approach.
The Argument for National Strategy
Let’s paint a vision:
SMRs deployed at military bases across the country, secured by trained personnel, powering critical infrastructure, and feeding clean, carbon-free power back into surrounding communities.
SMRs operated by public chartered utilities—not for Wall Street profits, but for stability, security, and public good.
SMRs manufactured by a competitive ecosystem of certified vendors, just like aircraft or medical devices, with standard parts and rapid regulatory approval.
This isn't science fiction. It's a plausible, powerful model. Here’s how we do it.
Step 1: Treat SMRs as a National Security Asset
Why does the Department of Defense spend billions to secure oil convoys and build fuel depots across the world, but not invest in nuclear microgrids that would make forward bases self-sufficient for decades?
Nuclear power is inherently a strategic asset:
- Immune to price shocks.
- Hard to sabotage.
- Decades of stable power from a small footprint.
It’s time to reframe SMRs from an energy project to a national security platform. That changes everything.
Step 2: Create Public-Chartered Operating Companies
We don’t need another corporate monopoly or Wall Street scheme. Instead, let’s charter SMR utilities the way we chartered the TVA or the Postal Service:
- Low-margin, mission-oriented.
- Publicly accountable.
- Able to sign long-term contracts with DOD, DOE, or regional utilities.
These organizations won’t chase quarterly profits. They’ll chase uptime, grid stability, and national resilience.
Step 3: Build a Competitive SMR Industry Like Aerospace
Imagine multiple manufacturers building SMRs to common, certified standards. Components sourced from a wide supplier base. Designs evolving year over year, with upgrades like software and avionics do.
This is how we build:
- Safer reactors
- Cheaper units
- Modular designs
- A real export industry
Airplanes are safe, affordable, and efficient because of scale and standardization. We can do the same with reactors.
Step 4: Anchor SMRs to the Coming Fourth Industrial Revolution
AI, robotics, and distributed manufacturing don’t need fossil fuels. They need cheap, clean, continuous electricity.
- AI datacenters
- Robotic agriculture
- Carbon-free steel and cement
- Direct air capture
- Electric industrial transport
SMRs enable this future. And they decentralize power, both literally and economically. That means jobs in every region, not just coastal tech hubs.
Step 5: Pair Energy Sovereignty with Economic Reform
Here’s the big leap: what if this new energy architecture was tied to a transparent, auditable, and sovereign monetary system?
- Public utilities priced in a new digital dollar.
- Trade policy balanced by low-carbon energy exports.
- Public accounting verified with open ledgers.
This is not just national security. It’s monetary resilience.
The world is moving to multi-polar trade systems. Energy exports and energy reliability will define economic influence. If America leads with SMRs, we lead the conversation.
Conclusion: A Moral and Strategic Imperative
We can either:
- Let outdated fears and bureaucracy stall the future, or...
- Build the infrastructure for clean, secure, and sovereign prosperity.
We have the designs.
We have the talent.
We have the need.What we need now is will.
The Fourth Industrial Revolution will either be powered by us—or by someone else. Let’s make sure America leads. And let’s do it with SMRs, public charter, competitive industry, and national purpose.
It’s time.
This is a call to engineers, legislators, veterans, economists, and every American who believes in building again. SMRs are not just about power. They are about sovereignty, security, and shared prosperity.
Further reading:
nostr:naddr1qqgrjv33xenx2drpve3kxvrp8quxgqgcwaehxw309anxjmr5v4ezumn0wd68ytnhd9hx2tczyrq7n2e62632km9yh6l5f6nykt76gzkxxy0gs6agddr9y95uk445xqcyqqq823cdzc99s
-
@ 35da2266:15e70970
2025-04-16 22:23:41hlVSfXKe9e/fvSZHekA/+5qdm0Qi2QRWDIyM+ozhqKw7eiS8yEv6egkHfVfC57RSffe3BkPCV2yXgx+zfBMAGadtrQfaniazb6sAG6UkQ5fpnDuQ82E5RqUqJ2ppoXyGZ8c4pFvQIuj6fuIiqICWYJC3Egkk56Cpvf4puQTbTbD/6fcP26uJZ23SK4FhnU0MaFHbEITacMMDdAufapjlak9YHNBZr8G/BetySoEWCpfxd6lQW0kHLVjJ0wB4TPjlaIUXmYKDaG10QE8jd5J6UQ2e+KkM+cJDaPNqTtOLUOlfuGBUatK1z4LHxJA4gi76sj72mVge1rrkwbaT2gHZeS6QB+W5DtDHmAwUS91bOUypeuwwr14jArk2hx70caOGGjhU2IJr8bT4LlOlbMY+bHk12CLIRCwuzQdK/N/oC6Itz3/KSIRi/m0XD3VGtUQgP5mGs65n9cXjkREhNKd7ieU9EOyee/fzebL2RUC5JjMBAV9yij8Q7MlD/qfC3BjBaP959WbtRn22VJDrPocrUyg+Yop8OIe3brO+QdYfezjGbaFV+p6ogKHT4m8ClYIj?iv=KAipagrOb84TsUXkLD27JQ==
-
@ ee6ea13a:959b6e74
2025-04-06 16:38:22Chef's notes
You can cook this in one pan on the stove. I use a cast iron pan, but you can make it in a wok or any deep pan.
I serve mine over rice, which I make in a rice cooker. If you have a fancy one, you might have a setting for sticky or scorched rice, so give one of those a try.
To plate this, I scoop rice into a bowl, and then turn it upside-down to give it a dome shape, then spoon the curry on top of it.
Serve with chopped cilantro and lime wedges.
Details
- ⏲️ Prep time: 20
- 🍳 Cook time: 20
- 🍽️ Servings: 4
Ingredients
- 1 ½ pounds boneless skinless chicken breast, cut into 2" pieces
- 2 tablespoons coconut or avocado oil
- 1 cup white or yellow onion, finely diced
- 1 cup red bell pepper, sliced or diced
- 4 large garlic cloves, minced
- 1 small (4oz) jar of Thai red curry paste
- 1 can (13oz) unsweetened coconut milk
- 1 teaspoon ground ginger
- 1 teaspoon ground coriander
- 1 tablespoon soy sauce
- 1 tablespoon brown sugar
- 1 cup carrots, shredded or julienned
- 1 lime, zest and juice
- ¼ cup fresh cilantro, chopped for garnish
Directions
- Heat oil in a large skillet over medium-high. Once hot, add onions and ½ teaspoon salt. Cook 3 minutes, or until onions are softened, stirring often.
- Add the red curry paste, garlic, ginger, and coriander. Cook about 1 minute, or until fragrant, stirring often.
- Add coconut milk, brown sugar, soy sauce, and chicken. Stir, bring to a simmer, then reduce heat to medium. Simmer uncovered for 7 minutes, occasionally stirring.
- Add carrots and red bell peppers, and simmer 5-7 more minutes, until sauce slightly thickens and chicken is cooked through.
- Remove from heat, and stir in the lime zest, and half of the lime juice.
- Serve over rice, topped with cilantro, and add more lime juice if you like extra citrus.
-
@ 35da2266:15e70970
2025-04-16 22:23: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?iv=qAlON7S2yHUCqSwGCcaWKQ==
-
@ 35da2266:15e70970
2025-04-16 22:22:39Q7baVGp93Od0qDcvFWvotn3WJzwEinU8m7vHADa6prAZwHWVXDwggHU8+hbX/qdtGIjezOohlgAeOKS6p7vtCu5yA/ybXXRmgoNJxOMeSwRG4sL+Romo9ZmZREY7DVSPfkQQ2Z7refm/JKNP6vP3+MOqqlWxlRzICyj3DZZGGMfd8uBBI4YQj77UMbH6PjwgxPGh0uFyri0SIPzocciCMQwb3Se+POuM2s4jaseeBywLJ+Y66E91dHxOIzub6G/TimyhTPxUdEFygT5v4jVGcnn/YGR5qQqILTD8llNMJasTH0KO82yvmw4WRg+HzN+a42iZcJKjZR0sl6RbsZAYUiBYYvvJ7MT4F1nMmSP1+fg=?iv=mIOrW9I6J5sCS9K4S+i6Qg==
-
@ fd06f542:8d6d54cd
2025-04-17 14:08:34象棋布局基础
布局的定义与重要性
象棋布局是指对局开始阶段,双方棋子的部署和相互间的制约关系。它是中局和残局的基础,合理的布局能够为中局的战斗创造有利条件,甚至在某些情况下直接影响到整盘棋的胜负走向。一个好的布局可以使棋手在开局阶段就占据主动,控制局面,限制对手的发挥。
布局的分类
炮类布局
- 中炮布局:以当头炮(炮二平五或炮八平五)开局,具有很强的进攻性,威胁对方中卒,直接对对方的九宫发起冲击。例如顺炮布局(双方都走中炮,且炮在同一条直线上)、列手炮布局(双方都走中炮,但炮不在同一条直线上)等。
- 过宫炮布局:炮从一侧平移到另一侧的中路,如炮二平六,它的特点是子力调动灵活,可迅速集结兵力于一侧,伺机而动,同时对士角有一定的控制作用。
- 顺炮布局:顺炮布局是双方以中炮开局且两炮在同一直线的布局体系,如红方炮二平五,黑方炮 8 平 5,形成激烈的对攻格局。其特点是开局便剑拔弩张,双方子力沿同一方向快速展开,直接在中路和侧翼展开火力交锋。 常见有顺炮直车对横车、顺炮横车对直车等变化,红方可借直车过河压制黑方马炮,黑方则以横车抢占肋道反击。该布局强调先手争夺,需迅速出动强子控制要道,同时注重车、马、炮的配合,在互攻中寻找突破机会,是进攻型棋手偏爱的布局选择。
马类布局
- 屏风马布局:双马分别跳至正马位(马二进三、马八进七),两马互相保护,形似屏风,能够有效抵御中炮的进攻。它具有稳健的防守能力,同时也具备一定的反击潜力,如五七炮对屏风马、五八炮对屏风马等常见变化。
- 单提马布局:一马正马(如马二进三),另一马屯边(如马八进九),其特点是子力结构较为松散,但在防守上也有一定的弹性,可通过灵活的子力调动来化解对方的攻势。
兵类布局
- 仙人指路布局:先走方第一步挺兵(如兵七进一或兵三进一),试探对方的应手,根据对方的走法再决定后续的布局方向。这种布局灵活多变,可演变成多种复杂的局面,如仙人指路对卒底炮、仙人指路对飞象等。
- 对兵局布局:双方都以挺兵开局,如兵七进一,兵7进一,开局阶段局面相对平稳,双方需要通过后续的子力调动来寻找战机,逐渐扩大优势。
布局的基本原则
- 快速出子:在布局阶段,要尽快将棋子从原始位置出动到关键位置,占据有利的空间,形成有效的子力配合。例如,车要尽早开出,控制要道;马炮等也要合理部署,发挥其威力。
- 子力协调:各个棋子之间要相互配合,避免出现子力拥堵或脱节的情况。例如,马炮之间可以形成有效的攻击组合,车要为其他棋子提供支援和掩护。
- 抢占要点:布局阶段要注意抢占棋盘上的重要位置,如肋道(四、六路线)、河口(三、七路线的卒林线)等。这些位置对于控制局面、展开进攻或防守都具有重要意义。
- 攻守平衡:在布局时,不能一味地追求进攻而忽视防守,也不能只注重防守而缺乏反击的手段。要根据局势的发展,合理调整攻守策略,保持局势的平衡。
布局的学习方法
- 研究经典布局:通过学习和研究历史上的经典布局对局,了解各种布局的变化和特点,掌握布局的基本理论和技巧。可以参考专业的象棋书籍、棋谱等资料。
- 实战练习:在实战中运用所学的布局知识,通过不断的实践来加深对布局的理解和掌握。同时,在实战中要注意总结经验教训,分析自己布局中的不足之处,不断改进和提高。
- 分析对局:对自己和他人的对局进行分析,特别是对布局阶段的走法进行深入研究。分析每一步棋的优劣,思考是否有更好的走法,从而提高自己的布局水平。
- 与高手交流:与水平较高的棋手交流,请教他们在布局方面的经验和技巧。可以通过参加象棋比赛、棋社活动等方式与高手进行面对面的交流和学习。
以上就是关于象棋布局的一些基本内容,希望对大家学习和理解象棋布局有所帮助。在实际的对局中,要根据具体情况灵活运用各种布局知识,不断提高自己的象棋水平。
-
@ df67f9a7:2d4fc200
2025-04-16 22:13:20Businesses want Nostr, but Nostr is not ready for business. What can be done?
TLDR :
What Nostr brings to business apps…
- Get your brands in front of users with your choice of SEO and Algos that YOU control.
- Access unlimited public user data from across the network without fees or permission.
- Keep your business data private, while "releasing" liability for other data collected by your apps.
- Build one app to reach a diversity of users from across the network, even from other apps.
- Build your own tech and to use it as you wish. No gate keepers or code review process.
Businesses want Nostr.
- Businesses want reliable SEO and socials to put their brands in front of users, rather than arbitrary gate keepers, censoring the marketplace on a whim.
- Businesses want open access to harvest public data for free on a soveregnty respecting network, rather than paying gate keepers for access to user data of questionalble origin.
- Businesses want the freedom to NOT take ownership of certain user data collected by their apps, rather than being liabile for moderation and safe handling on their private infrastructure.
- Busineses want a single open protocol on which to build their apps, with unlimited potential and a diversity of shared users from other apps, rather than multiple siloed networks with difering APIs and demographics.
- Businesses want to own the technology they build and to use it as they wish, rather than submit their code for approval and control by arbitrary gate keepers.
But Nostr is not ready for business.
- Businesses DON'T want proprietary app data stored publicly as signed Nostr events on user specified relays.
- Businesses DON'T want to have to specify, or be constrained by, or even navigate the complexity of Nostr NIP standards for every novel kind of content that their apps generate.
- Businesses DON'T want to "open source" their entire suite of native apps JUST to assure end users that Nostr private keys are being safely handled.
- Businesses DON'T want to have to "rewrite" their entire app backend just to accomodate the Nostr way of "users sign events but dont actually login to your server" auth architecture.
- Businesses DONT want to suffer DDOS from bots and bad actors, or to expose their users to unwanted content, or even to have their own content disappear a sea of spam and misinformation.
Here’s what can be done.
- More tools and services for private business apps to coexist with freedom tech, and even thrive together, on the Nostr network.
- Extensible Webs of Trust algos for discovery and reach into any audience or demographic of trusted users.
- WoT powered standard APIs for exposing content to Nostr (and other business apps) from within a “black box” business app.
- HTTP AUTH (NIP 98) integration for business apps, allowing users to create local content WITHOUT needing discrete signatures or “linked” user accounts.
- Frost compatible “login“ for business apps, allowing users to paste “disposable” nsecs into proprietary clients without fear of their “cold” nsec being compromised.
- Support for “incremental” (and voluntary) adoption of freedom tech into existing business apps, with easy off-ramps for businesses to transfer more and more siloed data onto the “public” network.
Thoughts so far…
-
@ 35da2266:15e70970
2025-04-16 21:10:532ZNRVCq3cD6lMtvTpYcX7Y1r5ofv9itThjOpvqwglCDpR0af5uwFKnUmjR6Tgmhe9vwGA8cAaUVMCJZj3XehYqRuhjDaRo3kOo/JqrymJOftR9eaQSPgzynGupcjURXMTZ3LzX/YfR3ZByheOsoksb7t7RhAMCYNCi/FcJoUE2WMvrqMvvZpJFa4+dSAXdP3vdUkjkU9Eboj+R3NIkfZJckfWaDNfyLXPrghu03CFZErVqwle1lmdv2AN57cKawAYDUZbwqgj8bpSIzf4lEzj+xPzuBx/AXCBTzsGumU+KxD/eUYU7P7fKRB72r1Ar/zVn6m3NPDGW6YQ1lGVxwWx+xeT4sgWxKFfmakyxJb1oVcHYW+5oCMfggmCUUmgVVzezh22pC5paVdt/+XuOTbqmCxVZHwZ03ncwmd+JN3oIUAj2V4IbqwCI9QZr0k4d5bUg2WDqj5WhjIskcaHSu0zBp33aocri+MLa+T3sEzeXrK4gz6VjwrXEUKyjOAogqU6Hif/GsU8y+6voNBqK3oYdBEVSBiA8UrSgFixPd9/nc=?iv=v9KrIoMHT1d9aqXuqmbkbw==
-
@ fd06f542:8d6d54cd
2025-04-17 14:00:40{"coverurl":"https://cdn.nostrcheck.me/fd06f542bc6c06a39881810de917e6c5d277dfb51689a568ad7b7a548d6d54cd/d8bc1e106d0144fce7dd96264f6b2bad7b35100efb1040d413cac16db7584e72.webp","title":"象棋布局体系","author":"nostrchess"}
-
@ 3c7dc2c5:805642a8
2025-04-16 20:30:54🧠Quote(s) of the week:
'Let me understand…
I saved 30% of my income in Bitcoin over the last five years at an average price of $30,000. I now have 4.25 years of my income in savings.
Within 5 years, bitcoin goes to $500,000. I now have 25 years of my income in savings. I stop saving at this point and simply live off 100% of my income, avoiding selling any Bitcoin.
Within 15 years, Bitcoin goes to $15,000,000. I now have 750 years of my income in savings. I retire and live on >10x my yearly income for the rest of my life, and pass on generational wealth to my children.
Let me understand… why you didn’t listen to the maxis.' - Bit Paine
🧡Bitcoin news🧡
https://i.ibb.co/1fYbX77F/Go-R7-ZJu-Ww-AA0-Xy-Q.jpg
On the 7th of April:
➡️'Bitcoin has retraced to the 350DMA at ~$76,000! Historically, one of the strongest levels of support for Bitcoin during bull cycles...' - Bitcoin Magazine Pro
➡️ 'Tuttle just filed for a first-of-its-kind ETF: a Double Short MicroStrategy ETF. It aims to profit by shorting both the 2x long ($MSTU) and 2x short ($MSTZ) MSTR ETFs, betting on their decay from daily resets.' - Bitcoin News
➡️3$ billion community bank Union Savings discloses first Bitcoin exposure.
➡️The Rational Root: Bitcoin would have to fall below $64K by next week for the spiral chart to cross the 2021 cycle's first peak (~$64K on Apr 13) Well, that didn't happen. So for now the chart is still valid.
Meanwhile, PlanB was only off by about $320k so far for his April price prediction. Yikes! (I have to admit I fully bought into three S2F models when he came out with it back in 2018)
Personally, I am not fixed on the short-term price, listening to any crypto influencer's "prediction" is like believing in Santa Claus. (Almost) all TA is wrong, very little is useful in the end, and nobody knows shit..including myself.
➡️WHITE HOUSE: “The reserve function of the dollar has caused persistent currency distortions” We’re moving toward a global, distributed, neutral reserve asset for all. You have never needed Bitcoin more than at this moment.
https://i.ibb.co/KckFJTJh/Gn9ae9-XQAEi-1-V.jpg
On the 8th of April:
➡️'Bitcoin's hashrate surpassed 1 zetahash for the first time earlier this week. This means that, in aggregate, miners around the world produced 10^21 hashes per second for some time. 1 sextillion hashes. 1,000,000,000,000,000,000,000.' -TFTC
➡️'Strategy paused Bitcoin buys last week and clarified that shareholders don’t own its BTC. Not your keys, not your coins.' -TFCT Which isn't really news. Common sense: holding exposure, not ownership. "We may be required to sell bitcoin to satisfy our financial obligations, and we may be required to make such sales at prices below our cost basis or that are otherwise unfavorable."
➡️BlackRock expands Bitcoin custody beyond Coinbase. SEC filings reveal Anchorage Digital will safeguard a portion of BTC for BlackRock’s $45B iShares Bitcoin Trust. BlackRock cites the move as part of its “ongoing risk management” and growing presence in digital assets.
➡️Phoenix Wallet is back in the USA. Why are they back?
'We welcome the "Ending Regulation By Prosecution" memo by the US DAG, and the clarity it provides for developers and operators of Bitcoin software. This is consistent with Executive Order 14178 which recognized the importance of "protecting and promoting the ability of individual citizens and private-sector entities alike to [...] develop and deploy software [and] transact with other persons [...] and to maintain self-custody". We are happy to make our products available again in the USA.'
➡️The World Food Program USA now accepts bitcoin! WFP is the world’s largest humanitarian organization and part of the United Nations. Chief Philanthropy Officer says, “Embracing new technologies like cryptocurrency isn’t just a choice—it’s necessary.”
➡️Mastercard partners with Kraken to allow European users to spend Bitcoin at over 150 million merchants worldwide.
On the 9th of April:
➡️VanEck confirms that China and Russia are settling energy trades in Bitcoin. On top of that, the $115 billion VanEck stated on President Trump's tariffs the following: "Bitcoin is evolving from a speculative asset into a functional monetary tool—particularly in economies looking to bypass the dollar and reduce exposure to U.S.-led financial systems."
Meanwhile on the same day...
➡️The United States Secretary of the Treasury Scott Bessent just ended his speech this morning by saying, “We will take a close look at regulatory impediments to the blockchain, stablecoins, and new payment systems”
➡️Pakistan plans to allocate part of its surplus electricity to Bitcoin mining, Reuters reports.
➡️'In the Swedish Parliament: “No plans for a national Bitcoin reserve – that wouldn’t be wise. We will focus on safe assets that can help us in times of crisis.” A “safe” asset—or an asset to control? Bitcoin is neutral, borderless, and unconfiscatable. It’s the hedge modern nations need.' - BT-Chick
Watch the video here
What are safe assets? Does the S&P have more volatility? US treasuries? haha How can something be more liquid than Bitcoin which trades 24/7/365 on a global scale? What is "safe" is keywords for centralized and controlled. I am not surprised though, they are one of the most conservative countries in the world, HFSP! Tack!
On a side note, Christian Ander on X: "Meeting with an MP on Monday to push the idea of a Swedish Bitcoin reserve. Interest is growing across parties—but still a "no" for now. This has never been discussed this much in Parliament. Clear trend: younger MPs are driving it, and older ones blocking it. Vote accordingly."
➡️The world’s largest credit ratings agency, S&P Global Ratings says, ‘We are focused on Bitcoin. We are focused on its characteristics as an alternative form of money, and the fact it’s decentralized and geopolitically neutral. We are starting to see adoption’ - Reuters Business
➡️Laurastacksats gave a lesson about Bitcoin to an economics class at the University of Bologna, in Italy: the oldest university in the world.
➡️ On this day, Bitcoin accumulation addresses received 48,575 BTC, the largest single-day inflow since February 2022, per CryptoQuant.
On the 10th of April:
➡️'After utterly massive outperformance in the years and decades prior, Warren Buffett's Berkshire Hathaway is about even with simply owning gold since 1998, or about 27 years ago.' - Lyn Alden
https://i.ibb.co/cSqWStcC/Go-I-3-J4-Xg-AATd-Jd.png
if you want to understand what interest rates do to investors, this tweet and graph would be a good immediate transmission on the nature of fake economies. Just be like Warren Buffet, without all the work. Just buy and hold a store of value. Bitcoin!
➡️The $30 billion public company founded by Jack Dorsey, Blocks, just released an open-source dashboard to make Bitcoin more accessible and transparent for corporate treasuries, helping lower the operational barriers for companies looking to add Bitcoin to their balance sheets.
➡️'The S&P 500 is as volatile as Bitcoin now, (and a day later) the S&P 500 is now more volatile than Bitcoin. A 77% standard deviation is NUTS, it's normally 10-15%.' - Eric Balchunas
Stocks merely adopted the volatility. Bitcoin was born in it. No more excuses for TradFi for saying Bitcoin is too volatile.
https://i.ibb.co/1GM2ghtQ/Go-La-Pkd-W8-AAJjz-C.png
For those who think Bitcoin is too volatile.
➡️'One of these things is not like the others. Change in currency supply (updated through 2024): bitcoin vs. global reserve currencies.' -Peter Parker https://i.ibb.co/5QjQ7Rf/Go-Mblov-Wk-AAz4-ZN.png
➡️S&P Global: “Bitcoin holdings may provide a hedge against long-term debasement of fiat currency through inflation, due to bitcoin's finite supply. Its value may also be driven by geopolitical factors if its security and decentralized nature lead to its increasing adoption as a reserve asset.”
➡️Parker Lewis: With or without Bessent, the Fed is functionally leveraging the US financial system by draining the system of dollar liquidity. Taking out dollars doesn't make the debt go away. Eventually, it breaks and the Fed will have to print even more money. It goes on and on until...Bitcoin.
https://i.ibb.co/MDNt07WS/Go-MV-Ho-WYAASy-M4.png
➡️Florida's House Bill 487 unanimously passed the House Insurance and Banking Subcommittee, proposing to allow the investment of up to 10% of key public funds in Bitcoin. The bill must now clear three more committees before reaching the full House and Senate for a vote.
➡️US investors are increasingly buying Bitcoin as a hedge against a weakening dollar, reflecting broader concerns about capital exodus from US financial markets, per 10x Research. "it remains premature to adopt a bullish stance."
On the 11th of April:
➡️Pakistan plans to leverage part of its 10,000 megawatts in surplus electricity for Bitcoin mining, per News Desk.
➡️Arizona PASSES Bitcoin Mining Rights Bill! The bill protects anyone running a node or mining digital assets from zoning or usage bans. Voted 17 - 12 in favor!
➡️'Former UK Prime Minister Liz Truss says Bitcoin is “a tool for taking power away from government.” “The bureaucracy knows perfectly well that it is an antidote to their power which is why they hate it.” - Simply Bitcoin
On the 12th of April:
➡️The White House official says. The U.S. may tap gold reserves to buy Bitcoin. If there is any gold in reserve of course! And this is only one senior White House official hinting...
On the 13th of April:
https://i.ibb.co/spBGXChM/Go-Zi7-Ok-XIAAo-B6.jpg
➡️Bitcoin outperforms the NASDAQ in every single timeframe. Bear in mind, that the NASDAQ outperforms the S&P 500, Dow Jones, and Gold. Outperforming short-term in a correction is impressive. Outperforming long-term is simply expected. In the end, everything is going to zero against Bitcoin.
➡️'Trump’s exemption of phones, laptops, and chips from his 145% China tariffs spares HS code 8471, which covers Bitcoin miners. This is a major win for US Bitcoin mining companies, who were staring down crippling price hikes on new rigs.' -Bitcoin News
➡️'The Bitcoin Network just broke ONE SEXTILLION HASHES (1k EH/s) for the first time in history!! 1,000,000,000,000,000,000,000 (one thousand million million million)
https://i.ibb.co/yFd0mJ0M/Gob-O6g-DWMAAj-RJq.jpg
FOR COMPARISON: - There are 1 sextillion grains of sand on Earth. - You could fit 615 earths in a flat layer with an area of one sextillion square centimeters. - There are about 6 sextillion cups of water in all the oceans of the world.
Bitcoin mining power is f* INSANE!' - CarlBMenger
On the 14th of April:
➡️Strategy has acquired 3,459 BTC for ~$285.8 million at ~$82,618 per Bitcoin and has achieved a BTC Yield of 11.4% YTD 2025. As of 4/13/2025, Strategy holds 531,644 Bitcoin acquired for ~$35.92 billion at ~$67,556 per bitcoin.
➡️On the same day, Japanese public company Metaplanet buys 319 Bitcoin for $26.3 million.
➡️'Tether will deploy its existing and future Bitcoin hashrate to OCEAN, the mining pool launched by Bitcoin Core developer Luke Dashjr. Tether says supporting decentralized mining is key to protecting Bitcoin’s long-term integrity.' - Bitcoin News
➡️Publicly traded HK Asia Holdings bought 10 Bitcoin worth $806,671 for its balance sheet.
➡️Public companies added 95,431 BTC to their balance sheets in Q1 2025. 12 new firms joined. Holdings now total 688K BTC worth $57B. - Bitwise
https://i.ibb.co/DPmshn5H/Goh-ONkl-X0-AAp-OVe.jpg
💸Traditional Finance / Macro:
On the 7th of April:
👉🏽The Hang Seng just closed at 19,828, down 3,021 points or 13.2%, officially entering a bear market, down 20% from its March peak. In China, over 2,000 stocks hit the limit down, and the CSI 1000 futures plunged 10%, also hitting its trading halt limit.
On the 8th of April:
👉🏽Apple flies in 5 planes full of iPhones to avoid US tariffs.
👉🏽'THE S&P 500 OFFICIALLY ERASES +4.5% GAIN AND TURNS RED ON THE DAY. $2.3 TRILLION erased over the last 3 hours. On a point basis, the S&P 500 just posted its largest intraday reversal in history, even larger than 2020, 2008, and 2001. You have just witnessed history.' -TKL
On the 10th of April:
👉🏽The amount of SPY calls increased by over 10x literally 10 min before the announcement. It's very obvious that Trump's "now is a good time to buy" tweet was a way for insider traders to have plausible deniability.
https://i.ibb.co/TxpKMrbk/Go-IB-P8-XYAEp-YV5.png
Explanation: SPY is a way to buy/sell the S&P 500. When you buy a SPY 504 call, it gives you the right (for a fee) to buy a stock of SPY from someone at $504 at any time If it goes up to 554, you make (50 dollars - the fee).
Just so non-traders really understand what happened here: Right before the S&P 500 (SPY) suddenly spiked, someone bought a huge number of call options — bets that the index would go up that same day. These were zero-day options, meaning they expire worthless by the end of the day unless SPY rises quickly. At the time, they were almost worthless. Then, SPY shot up. Those dirt-cheap options exploded in value. A $100K bet turned into $21 million in minutes. That green spike before the jump is not luck. It’s foreknowledge. Someone knew exactly what was about to happen.
🏦Banks:
👉🏽 no news
🌎Macro/Geopolitics:
The current state of Macro & Geopolitics can be summed up like this: Everything about current market dynamics is just ‘Madness!’ Economic policy uncertainty is TWICE the level during the Pandemic.
https://i.ibb.co/SXxTRtMt/Go-Vss-Sq-Wg-AEZAP4.jpg
On the 7th of April:
👉🏽A great post by Ray Dalio on X says tariffs are just the start. In the end, it's about a breakdown of the economic/monetary order (excessive global debt) & the global geopolitical order (US vs China). Basically, Trump is forcing the Fourth Turning through.
https://x.com/RayDalio/status/1909296189473693729 https://i.ibb.co/d0JqLqX9/Go-AO57n-W0-AADosd.jpg
I would say we are at stage 13 - 14.
Tariffs are a symptom of bigger problems. Don’t let arguments about tariffs distract us from solving the bigger problems. Also, governments are dysfunctional and life is hard. It’s the controlled demolition of a dying global system built on cheap Chinese labor, Wall Street debt games, and Washington sellouts. Ray sees the Big Cycle turning.
1) The global debt engine is seizing up. 2) The dollar is cornered by its own inflation. 3) The supply chain is a foreign hostage situation. 4) And the (U.S.) middle class got hollowed out so Davos could cash in.
To summarize: - Tariffs are a symptom, not the core issue. - Economic: Unsustainable debt, trade imbalances. - Political: Inequality fuels instability. - Geopolitical: Shift to a multipolar world. - Natural disasters: More frequent, disruptive. - Tech: AI reshapes economies and politics. - Key takeaway: Forces are linked; study history for future insight.
👉🏽On that same day: China restricts exports of seven rare earth metals to all countries.
👉🏽Lobby scandal: Between 2021 and 2023, NGOs received over €7 billion in support from the European budget. The European Court of Auditors has criticized the lack of transparency in EU funding to NGOs. There is a particular lack of reliable information and insufficient oversight. The European Commission funneled billions of euros to NGOs to promote its own policies and discredit opponents, as now also acknowledged by the European Court of Auditors. With a dubious leading role played by Frans Timmermans and Diederik Samsom.
For the Dutch readers:
https://fd.nl/samenleving/1551598/europese-rekenkamer-kritisch-over-financiering-ngos
👉🏽 'When a university with a $53 billion endowment needs to tap the bond market in this environment, it just tells you just how illiquid their investments really are.' -Mr. Vix Or is it just the game that you need to play? It is just a whole lot easier to do a debt raise than go to all stakeholders to adjust the allocation of the AUM, as all is earmarked, it would be a lengthy process.
https://i.ibb.co/mC0x8gdv/Gn8uzrn-Wk-AEJt6-G.jpg
They tapped the bond market in every prior year and they are rated aaa by ratings agencies. It isn’t just a function of the illiquidity of their investments. They hold about $3 billion that could be liquidated in one day or less (according to their financial statements). The real problem is that a vast majority of an endowment is earmarked for specific purposes—not that it is invested in illiquids.
On the 8th of April:
👉🏽President Trump says "China wants to make a deal, badly, but they don't know how to get it started." He also says that "we have the probability of a great deal" with South Korea after a call with their President.
Scott Bessent, US Treasury: Almost 70 countries have now approached us wanting to help rebalance global trade.
Regarding Bessent, read the following: an excellent thread. 'The Bessent Short' explained, so even you and I can understand it.
thread.exceptional.https://x.com/sethjlevy/status/1909634800136212608
This is a very interesting narrative. If this plays out this thinking was exceptional. Another excellent thread on Bessent: https://x.com/timjcarden/status/1910440389217312784
👉🏽 The People's Bank of China injects a net 102.5 billion yuan in open market operations. Hello, liquidity!
👉🏽There is now a 98% chance of a 25 bps interest rate cut by the June FOMC meeting.
👉🏽The White House says 104% additional tariffs on China went into EFFECT at noon ET today because China has not removed their 34% tariff on the US, per Fox News. US Dollar vs. Chinese Yuan is going vertical, meaning China's currency is depreciating swiftly.
China's beginning currency devaluation is more than just an economic signal—it's a trigger. Historically, when the yuan weakens, capital doesn’t stay put. It escapes. Some of it flows into gold, some into foreign assets—and a meaningful slice finds its way into Bitcoin.
https://i.ibb.co/KpKSLrHd/Go-HRen8-Xo-AAOpi-H.jpg
Regarding the US and China theme above one more interesting stat: 'One shipyard in China made more commercial ships in 2024 than the total number the US has produced since World War II. The destruction of America’s industrial base is a massive national security threat.' - Geiger Capital
Now Europe is going to invest € 800billion in their 'Europe Army'. I am not saying we are getting a World War III, but the dynamics are interesting.
From your perspective, why the above statement from a US perspective is a bad one... Mother Russia is building combat vehicles & munitions at “an unprecedented pace" according to a U.S. commander in Europe. A reinvigorated Russian defense industrial base is rolling out:
-1,500 tanks,
-3,000 armored vehicles,
& -200 Iskander ballistic & cruise missiles this year.
By comparison, the U.S. builds just
-135 tanks/yr and
-0 / no longer produces Bradley Fighting Vehicles.
China now boasts the world’s largest -navy, -army, -air force, and -strategic rocket force. China’s robust maritime industry is primed to build and repair ships at a wartime tempo. In a drawn-out conflict, China would have the clear advantage in building, repairing, & maintaining warships at sea.' Source: https://www.19fortyfive.com/2025/04/russia-and-chinas-military-production-surge-why-the-u-s-military-is-alarmed/
https://i.ibb.co/6G1Z6Nw/Gn-Qc-LVXYAAo-NH6-1.jpg
This is why the tariffs are happening still not sure I agree with the blanket nature of them. It sounds like the US does not understand the macro picture very well and is very overconfident. But who am I to judge?
On the 9th of April:
👉🏽'Oil prices fall below $57 for the first time since February 2021 as markets price in a global recession.' -TKL
👉🏽The European privacy legislation GDPR is a bureaucratic monster created by the European Commission, which stifles innovation and causes enormous economic damage — especially to SMEs. After 7 years, it’s finally being seriously reviewed. GDPR should never have been introduced.
Brussels finally admits it: GDPR was an economic disaster. No kidding! Here's why this rollback could save Europe's dying tech scene
Here is a great thread:
https://x.com/itsolelehmann/status/1909924693819461993
And for anyone who wants to explore the topic in depth: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3160404
On the 10th of April:
👉🏽'Lots of headlines and rumors about Trump "asking the Supreme Court to fire Powell." Here's what really happened: President Trump asked the Supreme Court to "let him fire top officials at 2 independent agencies," per Bloomberg. This could test whether Trump has the power to fire Fed Chair Powell. Trump did NOT explicitly ask to fire Powell.' - TKL
👉🏽'Gold closed up 3.3% to $3082, the biggest one-day jump since 2023, as traders anticipate much more fiat devaluation. A couple of hours later... And there it is: gold soars to new record high $3165/oz as global trade war turns to a currency war and global devaluation.' -ZeroHedge
Gold prices are flying off the chart. If you can’t tell yet, something is broken. Capital flight to Gold and CHF happening now. Eventually Bitcoin. These are not signs of winning. These are signs of the mother of all debt crises.
On the 11th of April:
👉🏽ZeroHedge: "Absolutely Spectacular Meltdown": The Basis Trade Is Blowing Up, Sparking Multi-Trillion Liquidation Panic:
https://www.zerohedge.com/markets/absolutely-spectacular-meltdown-basis-trade-blowing-sparking-multi-trillion-liquidation
Explanation: The basis trade is when investors buy Treasury bonds and sell their futures, betting on small price gaps to make money. They often borrow a lot to boost profits, but it’s risky. Right now in April 2025, this trade is crashing, like in 2020. Hedge funds are losing big, selling bonds fast, which spikes Treasury yields and shakes markets. It’s a multi-trillion dollar mess, and some fear it could spark a crisis needing a huge Fed bailout, like last time. The chart likely shows yields jumping, signaling this panic.
👉🏽China raises tariffs on U.S. imports to 125%.
Here’s the real question, who gives up first? 1. President Trump 2. China 3. Bond market At this rate, the 10Y Note Yield will be at 5% next week. Inevitably, one of these 3 factors has to give very soon as this is unsustainable. Anyway... https://i.ibb.co/VYXByy2S/Go-ODsv-OWIAAu-M9v.jpg
👉🏽UK millionaires are fleeing in record numbers. In 2024, the UK ranked second only to China in wealth exodus – ahead of even India. People vote with their feet, and it will happen in Europe, and it is concerning.
Great thread: https://x.com/thealepalombo/status/1910327100286115952
👉🏽US 10Y rises to 4.48%, the largest single weekly increase since 2001. U.S. 30-year treasury yields rise to 4.95%, the weekly increase is the biggest since 1982.
On the 11th of April:
👉🏽European Central Bank President Christine Lagarde: ECB is a ready-to-use instrument it has if needed!
On the same day, FED's Kashkari: The Fed has a tool to provide more liquidity. The Fed is reportedly "absolutely" ready to stabilize the market if needed, per Financial Times. Never discount the power of the bond market or the REPO market.
Coughing and clearing my throat for the people in the back: more liquidity, debt, printing money!
James Lavish: "Choose your phrase for translation:
“All roads lead to inflation.”
“Nothing stops this train.”
“The Fed will print again.”
👉🏽'March PPI inflation FALLS to 2.7%, below expectations of 3.3%. Core PPI inflation FALLS to 3.3%, below expectations of 3.6%. We just saw the first month-over-month decline in PPI inflation, down -0.4%, since March 2024. Both CPI and PPI inflation are down SHARPLY.' -TKL
👉🏽The U.S. budget deficit has risen to $1.3 trillion as government debt interest hits record levels. Data released by the Treasury Department on Thursday showed a deficit of $1.307 trillion for the first six months of the 2025 fiscal year, covering the period from October to March. This was the second-highest fiscal year deficit the U.S. has ever seen, with only the $1.706 trillion deficit in the first half of the 2021 fiscal year being larger.
On the 12th of April: 👉🏽M2 Money Supply going parabolic right now. Bitcoin is going parabolic soon. https://i.ibb.co/FL0W19kB/Go-VLj-Dv-Xk-AAol-Dt.jpg
BTC has tracked M2's movements 80% of the time for the past several years.
👉🏽The US publishes reciprocal tariff exclusions for computers, smartphones, and chip-making equipment. TKL: "Let's put the tariff exemptions into perspective: The US imports approximately $100 billion of computers, smartphones, and chip-making equipment from China PER YEAR. A total of $439 billion of goods were imported from China into the US in 2024. This means ~23% of ALL Chinese imports coming to the US are now exempt from "reciprocal tariffs." This is a massive U-Turn in tariff policy."
The bond market is Trump's #1 priority, and everyone knows it now.
Oh fun note, 2 minutes before the close on Friday someone bought $850,000 worth of SPY 554 calls expiring Monday. This morning the US released tariff exclusions...fascinating innit?
👉🏽If said it before and will say it again. It doesn't matter if the U.S. has a red or blue president. The US government has spent $154 billion more in 2025 than it did over the same period in 2024. Unless treasury yields drop, and fast, no amount of DOGE cutting will stop this from spiraling out of control. https://i.ibb.co/WNVJNxqh/Go-VYumq-Xw-AAod-Sv.jpg
👉🏽RAY DALIO ON DOMESTIC & WORLD ORDER “I think that right now, we are at a decision-making point and very close to a recession. I'm worried about something worse than a recession if this isn't handled well. A recession is two negative quarters of GDP, and whether it goes slightly there, we always have those things. We have something that's much more profound. We have a breakdown of the monetary order. We are going to change the monetary order because we cannot spend the amounts of money.
So, we have that problem. And when we talk about the dollar, and we talk about tariffs, we have that. We are having profound changes in our domestic order, and how ruling is existing, and we're having profound changes in the world order. Such times are very much like the 1930s.
I've studied history, and this repeats over and over again. So, if you take tariffs, if you take debt, if you take the rising power challenging existing power, if you take those factors and look at the factors that those changes in the orders, the systems, are very, very disruptive. How that's handled could produce something much worse than a recession…” - NBCNews
Yes, Bitcoin is the new monetary order, and civilizational infrastructure. Got some Bitcoin?
On the 14th of April:
👉🏽'Global net gold purchases by central banks hit 24 tonnes in February, the most since November 2024. This marks the 20th month of net buying over the last 21 months. Central banks are now on track for their 16th consecutive year of net purchases, according to the World Gold Council. Over the last 3 years, world central banks have acquired a massive 3,176 tonnes of gold. Central banks are buying gold like we are in a crisis.' -TKL
https://i.ibb.co/vvsx4qv9/Goh-TQ-n-WYAAm-6-I.jpg
🎁If you have made it this far I would like to give you a little gift, well in this case two gifts:
In April 2023, Tuur Demeester of Adamant Research published what has become another legendary entry in his line of Bitcoin bear market reports dating back to 2012. These pages aged like wine—as important today as they were 2 years ago. Download it here:
https://www.unchained.com/how-to-position-bitcoin-boom
Lyn Alden of Lyn Alden Investment Strategy explains the connection between the capital and financial imbalances the U.S. has with the rest of the world and its trade imbalances which are under so much scrutiny by the current U.S. administration. Alden argues that turbulence in markets, particularly U.S. assets, could continue, and warns listeners not to be exposed beyond their risk limits at a juncture that could be a historic time for markets and the global economy. Recorded April 10, 2025.
https://www.youtube.com/watch?v=TZN_eL_wubQ
Credit: I have used multiple sources!
My savings account: Bitcoin The tool I recommend for setting up a Bitcoin savings plan: PocketBitcoin especially suited for beginners or people who want to invest in Bitcoin with an automated investment plan once a week or monthly.
Use the code SE3997
Get your Bitcoin out of exchanges. Save them on a hardware wallet, run your own node...be your own bank. Not your keys, not your coins. It's that simple. ⠀ ⠀
⠀⠀ ⠀ ⠀⠀⠀
Do you think this post is helpful to you?
If so, please share it and support my work with a zap.
▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃
⭐ Many thanks⭐
Felipe - Bitcoin Friday!
▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃
-
@ fd208ee8:0fd927c1
2025-04-05 21:51:52Markdown: Syntax
Note: This document is itself written using Markdown; you can see the source for it by adding '.text' to the URL.
Overview
Philosophy
Markdown is intended to be as easy-to-read and easy-to-write as is feasible.
Readability, however, is emphasized above all else. A Markdown-formatted document should be publishable as-is, as plain text, without looking like it's been marked up with tags or formatting instructions. While Markdown's syntax has been influenced by several existing text-to-HTML filters -- including Setext, atx, Textile, reStructuredText, Grutatext, and EtText -- the single biggest source of inspiration for Markdown's syntax is the format of plain text email.
Block Elements
Paragraphs and Line Breaks
A paragraph is simply one or more consecutive lines of text, separated by one or more blank lines. (A blank line is any line that looks like a blank line -- a line containing nothing but spaces or tabs is considered blank.) Normal paragraphs should not be indented with spaces or tabs.
The implication of the "one or more consecutive lines of text" rule is that Markdown supports "hard-wrapped" text paragraphs. This differs significantly from most other text-to-HTML formatters (including Movable Type's "Convert Line Breaks" option) which translate every line break character in a paragraph into a
<br />
tag.When you do want to insert a
<br />
break tag using Markdown, you end a line with two or more spaces, then type return.Headers
Markdown supports two styles of headers, [Setext] [1] and [atx] [2].
Optionally, you may "close" atx-style headers. This is purely cosmetic -- you can use this if you think it looks better. The closing hashes don't even need to match the number of hashes used to open the header. (The number of opening hashes determines the header level.)
Blockquotes
Markdown uses email-style
>
characters for blockquoting. If you're familiar with quoting passages of text in an email message, then you know how to create a blockquote in Markdown. It looks best if you hard wrap the text and put a>
before every line:This is a blockquote with two paragraphs. Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Aliquam hendrerit mi posuere lectus. Vestibulum enim wisi, viverra nec, fringilla in, laoreet vitae, risus.
Donec sit amet nisl. Aliquam semper ipsum sit amet velit. Suspendisse id sem consectetuer libero luctus adipiscing.
Markdown allows you to be lazy and only put the
>
before the first line of a hard-wrapped paragraph:This is a blockquote with two paragraphs. Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Aliquam hendrerit mi posuere lectus. Vestibulum enim wisi, viverra nec, fringilla in, laoreet vitae, risus.
Donec sit amet nisl. Aliquam semper ipsum sit amet velit. Suspendisse id sem consectetuer libero luctus adipiscing.
Blockquotes can be nested (i.e. a blockquote-in-a-blockquote) by adding additional levels of
>
:This is the first level of quoting.
This is nested blockquote.
Back to the first level.
Blockquotes can contain other Markdown elements, including headers, lists, and code blocks:
This is a header.
- This is the first list item.
- This is the second list item.
Here's some example code:
return shell_exec("echo $input | $markdown_script");
Any decent text editor should make email-style quoting easy. For example, with BBEdit, you can make a selection and choose Increase Quote Level from the Text menu.
Lists
Markdown supports ordered (numbered) and unordered (bulleted) lists.
Unordered lists use asterisks, pluses, and hyphens -- interchangably -- as list markers:
- Red
- Green
- Blue
is equivalent to:
- Red
- Green
- Blue
and:
- Red
- Green
- Blue
Ordered lists use numbers followed by periods:
- Bird
- McHale
- Parish
It's important to note that the actual numbers you use to mark the list have no effect on the HTML output Markdown produces. The HTML Markdown produces from the above list is:
If you instead wrote the list in Markdown like this:
- Bird
- McHale
- Parish
or even:
- Bird
- McHale
- Parish
you'd get the exact same HTML output. The point is, if you want to, you can use ordinal numbers in your ordered Markdown lists, so that the numbers in your source match the numbers in your published HTML. But if you want to be lazy, you don't have to.
To make lists look nice, you can wrap items with hanging indents:
- Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Aliquam hendrerit mi posuere lectus. Vestibulum enim wisi, viverra nec, fringilla in, laoreet vitae, risus.
- Donec sit amet nisl. Aliquam semper ipsum sit amet velit. Suspendisse id sem consectetuer libero luctus adipiscing.
But if you want to be lazy, you don't have to:
- Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Aliquam hendrerit mi posuere lectus. Vestibulum enim wisi, viverra nec, fringilla in, laoreet vitae, risus.
- Donec sit amet nisl. Aliquam semper ipsum sit amet velit. Suspendisse id sem consectetuer libero luctus adipiscing.
List items may consist of multiple paragraphs. Each subsequent paragraph in a list item must be indented by either 4 spaces or one tab:
-
This is a list item with two paragraphs. Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Aliquam hendrerit mi posuere lectus.
Vestibulum enim wisi, viverra nec, fringilla in, laoreet vitae, risus. Donec sit amet nisl. Aliquam semper ipsum sit amet velit.
-
Suspendisse id sem consectetuer libero luctus adipiscing.
It looks nice if you indent every line of the subsequent paragraphs, but here again, Markdown will allow you to be lazy:
-
This is a list item with two paragraphs.
This is the second paragraph in the list item. You're only required to indent the first line. Lorem ipsum dolor sit amet, consectetuer adipiscing elit.
-
Another item in the same list.
To put a blockquote within a list item, the blockquote's
>
delimiters need to be indented:-
A list item with a blockquote:
This is a blockquote inside a list item.
To put a code block within a list item, the code block needs to be indented twice -- 8 spaces or two tabs:
- A list item with a code block:
<code goes here>
Code Blocks
Pre-formatted code blocks are used for writing about programming or markup source code. Rather than forming normal paragraphs, the lines of a code block are interpreted literally. Markdown wraps a code block in both
<pre>
and<code>
tags.To produce a code block in Markdown, simply indent every line of the block by at least 4 spaces or 1 tab.
This is a normal paragraph:
This is a code block.
Here is an example of AppleScript:
tell application "Foo" beep end tell
A code block continues until it reaches a line that is not indented (or the end of the article).
Within a code block, ampersands (
&
) and angle brackets (<
and>
) are automatically converted into HTML entities. This makes it very easy to include example HTML source code using Markdown -- just paste it and indent it, and Markdown will handle the hassle of encoding the ampersands and angle brackets. For example, this:<div class="footer"> © 2004 Foo Corporation </div>
Regular Markdown syntax is not processed within code blocks. E.g., asterisks are just literal asterisks within a code block. This means it's also easy to use Markdown to write about Markdown's own syntax.
tell application "Foo" beep end tell
Span Elements
Links
Markdown supports two style of links: inline and reference.
In both styles, the link text is delimited by [square brackets].
To create an inline link, use a set of regular parentheses immediately after the link text's closing square bracket. Inside the parentheses, put the URL where you want the link to point, along with an optional title for the link, surrounded in quotes. For example:
This is an example inline link.
This link has no title attribute.
Emphasis
Markdown treats asterisks (
*
) and underscores (_
) as indicators of emphasis. Text wrapped with one*
or_
will be wrapped with an HTML<em>
tag; double*
's or_
's will be wrapped with an HTML<strong>
tag. E.g., this input:single asterisks
single underscores
double asterisks
double underscores
Code
To indicate a span of code, wrap it with backtick quotes (
`
). Unlike a pre-formatted code block, a code span indicates code within a normal paragraph. For example:Use the
printf()
function. -
@ f18b1f8f:5f442454
2025-04-17 12:01:06rec21jSQ6M9WtT5Oz
This is a server acting as a client - a sort of MCP gateway you can add to Slack. It will respond to user's messages, and in turn use MCPs configured on it's end. Connect to internal SQLite DBs, web scraping and more.
-
@ 35da2266:15e70970
2025-04-16 18:00:26Y4lygZ3LEoXWuJtC8XaOXhzJxACtrNlgVpIZDuEZ4uObp1YL+SaPAIaAaVIUBWvCvzOabX2RxzhQJalv/C3SRCNQmcXGobODPxgz/4BNtSAmmc2UKEHvm1GhWTo6CB0EoOzVS6g97F7Mfas9jsQnwW8qEHUFiy8lSnSeFcGIkAJcUjXzvd8IoZeoF76s0uEFPuQPAtaHUTObCLwHEOj0/YuBkahCFxju9tlU9xlq+tVb0h6eZ1zr+LWW2Riejn4lDDq7D11MvVnTkAFDoW8C+xhU8OT3dX3Vz4XJ7vpKTMplyza1zZVBgD+ALOemLWO9FCEAMmd3x+8HKTZB75rCzxYMNDuIUNxMJFLLwlXu9qk=?iv=4RaKnRhDkvApSsmgJ9TttQ==
-
@ ba36d0f7:cd802cba
2025-04-16 16:45:071. The creative (but fleeting) pleasure of tactics
Chess tactics are like candy between meals - instant delight, but not true nourishment. Choosing whether to attack a bishop or a knight feels like picking between vanilla and chocolate ice cream: sprinkles or none, cherry on top or not...
-
They’re freedom within boundaries: the board has limits, but imagination doesn’t.
-
They mirror your style: quick strikes like an espresso? Or slow grinds like green tea?
2. Two tactics, two joys
-
Simple (an exposed king): everyday wins (like finding cash in your pocket).
-
Complex (3+ move combos): earned triumphs (like a project you’ve sweat over).
3. The Buddha’s warning: "Don’t Confuse the Sugar Rush for the Meal"
Buddhism teaches that clinging to pleasure (kāma-tanha) breeds suffering. In chess and life:
-
Tactics are desserts: sweet, but not the feast.
- Example: Beating a blunder is like winning the lottery; outplaying strategically is like building wealth.
-
The balance: Revel in that dazzling queen sacrifice - but don’t bet your game on it. Like savoring cake, not devouring the whole bakery.
4. How to play (and Live) this wisdom
✅ Ask yourself:
-
Is this move sound - or just seductive? (Like craving junk food vs. needing sustenance).
-
Am I here to win, or to wow? (Ego checkmates you faster than any opponent).
Final Move: The middle path on 64 squares
Buddhism invites joy without attachment. On the board:
-
Tactics = spice: they dazzle, but strategy feeds growth.
-
Strategy = the harvest: the patience that crowns kings.
♟️ So - do you chase the fireworks, or cultivate the long game?
Online Resources
Chess tactics - chess.com https://www.chess.com/terms/chess-tactics
Tactic examples - chess.com https://www.chess.com/article/view/chess-tactics
Tactics - lichess.org https://lichess.org/study/topic/Tactics/hot
somachess #buddhism #philosophy #chessphilosophy #chess #elsalvador #btc #apaneca #chesselsalvador
-
-
@ ba36d0f7:cd802cba
2025-04-16 16:39:581. El placer creativo (pero efímero) de las tácticas
Las tácticas en ajedrez son como las golosinas entre comidas: satisfacción inmediata, pero no sustento real. Escoger entre atacar a un alfil o un caballo puede ser como elegir entre helado de vainilla o chocolate - con chispas o sin chispas, cereza o sin cereza....
-
Son libertad dentro de las reglas: el tablero es finito, pero la creatividad no.
-
Reflejan tu estilo: ¿ataques rápidos como un espresso? ¿O finales lentos como un té verde?
2. Dos tipos de tácticas, dos tipos de placeres
-
Sencillas (como un rey descubierto): placeres cotidianos (como un golpe de buena suerte).
-
Complejas (combinaciones de 3+ jugadas): placeres que exigen planificación (como cumplir metas).
3. La advertencia budista: "No confundas el postre con la cena"
El Buddha enseñó que aferrarse a los placeres (kāma-tanha) genera sufrimiento. En ajedrez y en la vida:
-
Las tácticas son golosinas: te dan ventaja, pero no son estrategia.
- Ejemplo: Ganar por un descuido del rival es como heredar dinero; ganar por planificación es como construir un negocio.
-
El equilibrio: Disfruta ese sacrificio de dama espectacular… pero no bases tu juego en ellos. Como saborear un pastel ocasional sin volverse adicto al azúcar.
4. Cómo aplicar esto en el tablero (y en la vida)
✅ Pregúntate siempre:
-
¿Esta táctica es sólida o solo emocionante? (Como diferenciar antojo de hambre real).
-
¿Estoy jugando para ganar… o para impresionar? (El ego es peor enemigo que el rival).
Conclusión: El camino medio (ajedrecístico)
El budismo no pide renunciar a los placeres, sino disfrutarlos sin apego. En el ajedrez:
-
Tácticas = especias: dan sabor, pero no son el plato principal.
-
Estrategia = nutrición: lo que realmente te hace mejor jugador.
♟️ ¿Y tú? ¿Eres de los que prefieren un ataque brillante (aunque riesgoso) o una victoria lenta pero segura?
Recursos en linea
Tácticas - chess.com https://www.chess.com/es/article/view/tacticas-ajedrez
Problemas de ajedrez - chess.com https://www.chess.com/es/puzzles
Tácticas - lichess.org https://lichess.org/study/qgLXlnIF/udsuAudN
ajedrez #somachess #chess #chesselsalvador #budismo #budhism #filosofia #philosophy #apaneca #rutadelasflores #article #longform #articulo
-
-
@ 35da2266:15e70970
2025-04-16 16:36:173Thc9pM9tFy/utIde/qGIH+K1BoMJjFiwdp0eS6jqRfltsfuphy1p6B/Gex4pgWJCTl2nlJs29ZIwSksqxRZSOGT3HEZpTo/FCDUsKsGkLwxu0nIzzgMz92wVDfUgRtDuPHtiUwLJi9aadqFJO8AZfmA8MHhVe3OBUwBqUTPs4j/XlrQjzgFJzCIt9KvQ5YRPF7ttcTI9JLbrRR5WIPzTk0y/DJqQnayhZ1Gi8Tec08JK5Io8lKnF7oMHpyvbEAYKMm38GJiDfKizz1Jq+WCcWhFela3PJfsbtSOM2GjEofq7ZbsGjv8dzhwaCKx8AWfDTfavWoMk17obrhrYn5yog==?iv=cE6RWgHD7fmiVCOuok9kpg==
-
@ c8adf82a:7265ee75
2025-04-04 01:58:49What is knowledge? Why do we need it?
Since we were small, our parents/guardian put us in school, worked their asses off to give us elective lessons, some get help until college, some even after college and after professional work. Why is this intelligence thing so sought after?
When you were born, you mostly just accepted what your parents said, they say go to school - you go to school, they say go learn the piano - you learn the piano. Of course with a lot of questions and denials, but you do it because you know your parents are doing it for your own good. You can feel the love so you disregard the 'why' and go on with faith
Everything starts with why, and for most people maybe the purpose of knowledge is to be smarter, to know more, just because. But for me this sounds utterly useless. One day I will die next to a man with half a brain and we would feel the same exact thing on the ground. Literally being smarter at the end does not matter at all
However, I am not saying to just be lazy and foolish. For me the purpose of knowledge is action. The more you learn, the more you know what to do, the more you can be sure you are doing the right thing, the more you can make progress on your own being, etc etc
Now, how can you properly learn? Imagine a water bottle. The water bottle's sole purpose is to contain water, but you cannot fill in the water bottle before you open the cap. To learn properly, make sure you open the cap and let all that water pour into you
If you are reading this, you are alive. Don't waste your time doing useless stuff and start to make a difference in your life
Seize the day
-
@ 35da2266:15e70970
2025-04-16 16:29:222XNIX3i+F/eoSNicWbYwlh/ZcuLVCOfvRbjDAoLKDKDDPxGmRl5FZoShLa4iZTve6sXUOlPxG8/70hG/ANcSumK4Xb7hPDhfSOilc+v+QWhWqm6qjEiW7XP52dJsRIek7DhnOR1KNO68WZqXIwVWZzASY9GGCmXCHDyDKOSrrFHC+kSotAtpwXJeYu5d13CdizvBDxAV5wmtsrQhtNur9DMI3ra6q7QQRtNQ/cT5RRqzKE5J6d37KZgR/XbdnGCg53rruvijbO3CxZYz0YV/O56J+NP/Kp/2jROkmFNL5R90S26ezpzRoDH1aZP9z3asCNl9gbDAXbvPH+KMG4wcwcXwgiEOtcTNeT3PjOaxOn4=?iv=vkFiBD9xurO+GQ9r6UR9Kw==
-
@ 35da2266:15e70970
2025-04-16 16:16:31CeZvXkLOxnAsTOPILfQtMKjpfhXfnZjEHmZlCTVflUOkJVyuw1J1fXO0A7OaQAPBZ8O/6BcGWbrEzEFo65UDCjEBmf1ADKEPDAUjNrvmCnoGlQLuSDH8Ji6JnFFc0fsCpENbbddwk+j2v0GINqlRrlHXL1aNBMj+5EgWIJu+YfS12dFzpfe1fu7in3/jtaH1lY3O347ne9usJdXEVa/admzB3VKZP6GBub6m9lWLmzRuPkgJNTEGhm0cwqZ5IhHEnfhHyY4SRfTwCQ088Z5Vjo2wkFWYizKngl4L1SQa5e9C99c+ujdgm+LkIhVc29TdbRKvRgDgPxN+W0j1TnBoOTdTbQO1nutyFyOO70E7fbt+vxgVRxJ6+M64MjuvfT447R6Rw1JEPkpxwAFWnguBzHwOKz/M0XY7vESX+dgmSKAbvp79SkdEZpVDZCi7/h5RfrmMoPzgfkVGJt4fe0A5zw==?iv=NUi6SfNxUzZIDLzom5oI3w==
-
@ c1e9ab3a:9cb56b43
2025-04-01 04:32:15I. Introduction
The phenomenon known as "speaking in tongues" has long been interpreted as either the miraculous ability to speak foreign languages or utter mysterious syllables by divine power. However, a re-examination of scriptural and apostolic texts suggests a deeper, spiritual interpretation: that "tongues" refers not to foreign speech but to the utterance of divine truths so profound that they are incomprehensible to most unless illuminated by the Spirit.
This treatise explores that interpretation in light of the writings of Paul, Peter, John, and the early Apostolic Fathers. We seek not to diminish the miraculous but to reveal the deeper purpose of spiritual utterance: the revelation of divine knowledge that transcends rational comprehension.
II. The Nature of Tongues as Spiritual Utterance
Tongues are best understood as Spirit-inspired expressions of divine truth—utterances that do not conform to human categories of knowledge or language. As Paul writes in 1 Corinthians 14:2, "He who speaks in a tongue speaks not to men but to God; for no one understands him, but he utters mysteries in the Spirit."
Such mysteries are not unintelligible in a chaotic sense but are veiled truths that require spiritual discernment. The speaker becomes a vessel of revelation. Without interpretation, the truth remains hidden, just as a parable remains a riddle to those without ears to hear.
III. Paul and the Hidden Wisdom of God
In his epistles, Paul often distinguishes between surface knowledge and spiritual wisdom. In 1 Corinthians 2:6-7, he writes:
"We speak wisdom among those who are mature, yet not the wisdom of this age... but we speak the wisdom of God in a mystery, the hidden wisdom which God ordained before the ages."
Tongues, then, are one vehicle by which such hidden wisdom is spoken. The gift of interpretation is not mere translation but the Spirit-led unveiling of meaning. Hence, Paul prioritizes intelligibility not to invalidate tongues, but to encourage the edification that comes when deep truth is revealed and understood (1 Cor. 14:19).
IV. Peter at Pentecost: Many Tongues, One Spirit
At Pentecost (Acts 2), each listener hears the apostles speak "in his own language"—but what they hear are "the mighty works of God." Rather than focusing on the mechanics of speech, the emphasis is on understanding. It was not merely a linguistic miracle but a revelatory one: divine truth reaching every heart in a way that transcended cultural and rational barriers.
V. John and the Prophetic Language of Revelation
The apostle John writes in symbols, visions, and layered meanings. Revelation is full of "tongues" in this spiritual sense—utterances that reveal while concealing. His Gospel presents the Spirit as the "Spirit of truth" who "will guide you into all truth" (John 16:13). This guiding is not logical deduction but illumination.
VI. The Apostolic Fathers on Inspired Speech
The Didache, an early Christian manual, warns that not everyone who claims to speak by the Spirit is truly inspired. This aligns with a view of tongues as spiritual utterance—deep truth that must be tested by its fruits and conformity to the ways of the Lord.
Polycarp and Ignatius do not emphasize miraculous speech, but their prayers and exhortations show a triadic awareness of Father, Son, and Spirit, and a reverence for spiritual knowledge passed through inspiration and faithful transmission.
VII. Interpretation: The Gift of Spiritual Discernment
In this model, the interpreter of tongues is not a linguist but a spiritual discerner. As Joseph interpreted dreams in Egypt, so the interpreter makes the spiritual intelligible. This gift is not external translation but inward revelation—an unveiling of what the Spirit has spoken.
VIII. Conclusion: Tongues as a Veil and a Revelation
The true gift of tongues lies not in speech but in meaning—in truth spoken from a higher realm that must be spiritually discerned. It is a veil that conceals the holy from the profane, and a revelation to those led by the Spirit of truth.
Thus, we do not reject the miraculous, but recognize that the greatest miracle is understanding—when divine mysteries, spoken in spiritual tongue, are made known to the heart by the Spirit.
"He who has an ear, let him hear what the Spirit says to the churches." (Revelation 2:7)
-
@ 35da2266:15e70970
2025-04-16 16:16:31y/NRckVQs+cgsxN7+BTzUyD5rOcazRSXLfZwUIPLyDngDcDNLlbXkY4WPlSjZjMO8zKPR4gZSyq8NleqCqtO/4Xe/co965H2g2UUouA+xVzNCVc4lP5rR0+w0oJV6Va54MF13V0q8A3m+V19cJyePxU8zYgfYYnPUa2gMFZQzX7JTY+wPJPFORvaXiU9PV+tlfwU2eWbjDZ9mQ3nT0V0nSGIRLJR8ph9ob06/S+hHhMeeYBgQj5D3KCsm7sZ7bjZDZ6tUUZdHUBmCSeNtjJnLumXhEJB6ynV6Gtge15eZPMVjWgrk0Le+gYDSjT3LN8Bei/QIpS1Fl1MnlkMkq2OT2ZnLBvn9sQaBOa2VIMMuRI=?iv=HIac74wGlvFNlvg0LwmnCQ==
-
@ 35da2266:15e70970
2025-04-16 16:07:08nCDzwaoZ+Yr7YEMAEJU1JNf+EOiqeF+mnkSIrLMKQnNuKxjr7ivBIBLyGD7ygYMX0qUXl55yRb26nceb/wrdwusCpTvxPmDNEFLt+UUhXQbuTc91D7vC43m/7DnAXNqM2Hv8nP+aTY9gUmSh+nN+qsqn1sVbWUngBbLK1AfszRPrYqyNBBZUwATg6pYvjF6/JEKIbdafE6AAFienSz0aXTJRlmcIr1s1CL7e+7y33ZjXrHL7iQOdgSSXmvS3h7z8BYrBs0aA1T0Rxxs+HXKVTApqlMh8yoG42Ly0sGN54fvmXWBmX5/bytgALRFuYfP2rrvVfBnoYG2zEyAwp2BUSQ==?iv=J6gP01G0/pS7v1VTyU3cNA==
-
@ 35da2266:15e70970
2025-04-16 16:06:33PGZDGv2lVzc+yrDD/s3Y6LeYcZofe/a6o3Te3LQ/Nieawr9oYL9Bg23/WhOi0fK0jsxN2iKbJHr+OQ9U6mjW2f+qBfHbFkWyDCOSDRGBTfG053AJF3588fIr6Mle+05aN1iF3/TF48NGycwihHRbJIedbPDeO9CnsMaZxG7sKPyM2MmeKhZC2ztBxFctQM1Pbx59cqitP7jPbTDSUBQUa191ii39mDS86JO3W3hSbKaWExMlqhmkqN8ag9YRwhZIpoRkv0sf3fNL65XE9r9dMHa8QW1siovya1mJlsdXv76mQl36jPtiySpZ4Kik+mv6NjxogTOqAvIk8crQYq0SSluK7GKsBKZeYKCJ+QAuwy2ro2c36kbRyOBd9KSjAnJ0XupzkA9fO9+xIu/boCmuusdoeD6qN01Ow2+cXDyIVCU=?iv=nHARCUqW2krqPwQwtxzOQg==
-
@ 04cb16e4:2ec3e5d5
2025-04-12 19:21:48Meine erste "Begegnung" mit Ulrike hatte ich am 21. März 2022 - dank Amazon konnte ich das Ereignis noch exakt nachvollziehen. Es war eines meiner ersten (Lockdown) kritischen Bücher, die ich in dieser Zeit in die Hände bekam - noch nach Thomas Röper (das war mein Einstieg) aber vor Daniele Ganser. Insofern war es mir möglich, das, was dann folgte für die Autorin, live und in Farbe mit zu verfolgen:
"Wer sich in die Öffentlichkeit traut, kann sich dort ganz schnell eine blutige Nase holen. Dieselben Medien, die eine Person heute glorifizieren, stellen sie morgen an den Pranger. Sie verteilen und entziehen Reputation, fördern und zerstören Karrieren. Das Medium selbst bleibt jedoch immer auf der Siegerseite. Die Gesetze von Marktorientierung und zynisch-ideologisierter Machtausübung gelten für Rundfunk und Fernsehen ebenso wie für die Printmedien - von RTL bis ARD und ZDF, von der BILD über die taz bis zur ZEIT.
»Das Phänomen Guérot« legt genau diesen Vorgang detailliert offen: Der MENSCH Ulrike Guérot ist in der Realität nicht die dämonische Figur, als die sie hingestellt worden ist. Aber an ihr kristallisiert sich genau dieser menschenverachtende Prozess heraus, der bis heute andauert."
Im Herbst 2022 habe ich durch den ersten Vortrag von Daniele Ganser in Falkensee nicht nur Zugang zu einer für mich neuen und anderen Welt bekommen, ab da hat sich eigentlich auch für mich mein Leben komplett auf den Kopf gestellt. Die Weichen wurden zwar schon vorher gestellt, aber nun war es endgültig und es gab kein zurück mehr. Die Planung für das erste Symposium Falkensee war in meinem Kopf geboren und die MenschheitsFamilie entstand als Ort, der virtuell das vereinen sollte, was Daniele an Spiritualität, Menschlichkeit und Friedenswillen in mir freigesetzt hat. Es war sozusagen eine Energie, die nun stetig floß und einen Trichter gefunden hat, in dem sie wirksam werden und sich entfalten konnte. Insofern haben wir auch etwas gemeinsam - Ulrike und ich. Wir sind zu der Zeit auf einen Zug aufgesprungen, der unser Leben veränderte - der uns zwang, alte Wege zu verlassen und neue Wege zu beschreiten. Sowohl beruflich, als auch privat. Und auch das canceln und entfernt werden ist eine Erfahrung, die wir beide teilen. Vielleicht war es deswegen mein erster Gedanke im Herbst 2022, Ulrike Guérot zu meinem 1. Symposium nach Falkensee einzuladen. Das es dann erst beim 2. Anlauf wirklich geklappt hat, hatte auch mit den Höhen und Tiefen des Lebens in dieser Zeit zu tun gehabt.
Nun ist sie zum 2. Mal dabei - denn wer könnte das Thema "Europa" bei einem so wichtigen und hochaktuellen Thema besser vertreten und beleuchten als Ulrike Guérot? Es geht um Geschichte, es geht um Nationalitäten, es geht um Gemeinsamkeiten und um das, was uns hier im Herzen zusammenhält, was unsere Ziele und unsere Befindlichkeiten sind, es geht um Verantwortung und es geht vor allen Dingen um Frieden! Denn dafür steht Europa - für einen Kontinent, der es geschafft hat, trotz aller Gegensätze und Konflikte, die in Jahrhunderten kriegerisch aufgetragen wurden, eine neuen und besonderen Frieden zu finden und zu installieren:
"Völkerrechtlich legt der Westfälische Frieden den oder zumindest einen Grundstein für ein modernes Prinzip: Die Gleichberechtigung souveräner Staaten, unabhängig von ihrer Macht und Größe. Noch heute spricht die Politikwissenschaft, insbesondere die realistische Schule (Henry Kissinger), deshalb vom „Westphalian System“. Durch die Garantien der großen europäischen Mächte erweist sich dieser Frieden als stabilisierendes Element für die weitere Entwicklung in Europa. Noch bis zum Ende des 18. Jahrhunderts wird er immer wieder als Referenz für nachfolgende Friedensschlüsse herangezogen."
Es ging damals um viel und es geht heute um das Überleben auf einem Kontinent, der es eigentlich besser wissen sollte. Wir dürfen gespannt sein, was wir in diesem Vortrag von Ulrike auf dem Symposium Falkensee am 27. April 2025 für Lösungen finden, um wieder zu einer Ordnung und zu einem System der friedlichen Koexistenz zurückfinden zu können, ohne schwarz und weiß und mit all den Facetten, die das Leben uns so bietet:
"Es ging nicht mehr um das Ausfechten religiöser Wahrheiten, sondern um geregelte Verfahren, die es möglich machten, mit konkurrierenden religiösen Wahrheiten, die nach wie vor nebeneinander und unversöhnlich bestanden, auf friedliche Weise umzugehen. Deutlich wurde das nicht zuletzt, als der Papst in einer offiziellen Note scharf gegen den Friedensschluss protestierte, weil er die Rechte der katholischen Seite leichtfertig aufgegeben sah. Die katholischen Beteiligten des Abkommens hielt dies nicht von der Unterzeichnung ab - ein religiöser Schiedsrichter wurde in Sachen Krieg und Frieden nicht mehr akzeptiert."