-
@ 30b99916:3cc6e3fe
2025-05-20 23:00:17For all you COVID COWARDS out there perhaps you can redeem yourself by supporting America's Frontline Docters
History will show that the defeat of COVID tyranny wasn’t granted – it was won, case by case, voice by voice – and your support for America’s Frontline Doctors played an important role in this fight.
America 2020 – our nation faced a moment of truth.
Public health soldiers working for deep-state globalists unleashed tyranny in response to a virus - to terrorize us and dismantle our Constitution.
When I look back on the forces arrayed against us, I’m amazed more people did NOT stand up for their rights:
_Government agencies...hospitals...universities...corporations..._
...the state acting as our “savior” ...
...and Big Tech as the enforcer...
All joined forces to impose sweeping authoritarian mandates under the banners of public health and settled science.
_They declared freedom and liberty non-essential._
_They silenced, fired, shamed, and canceled ANYONE who dared question them._
ANYONE who resisted the masking, the lockdowns, the forced mRNA injections, are HEROS.
It angers me just thinking about what happened next.
Everyday Americans lost their livelihoods.
Parents watched as their children deteriorated after being locked out of their schools.
Doctors – some of the best in the country – were hunted down by their own licensing boards for practicing ACTUAL medicine instead of government-approved pseudoscience.
I hate to admit it, but tyranny triumphed.
The people had surrendered so much liberty that I didn’t recognize the nation our founders had forged.
I’m sure you didn’t either.
But while we can’t undo the past, we can make sure we don’t repeat it.
That is why America’s Frontline Doctors and I – with you alongside us – have been fighting back.
And together, we’ve been doing it case by case, supporting legal challenges against these unconstitutional, totalitarian mandates.
-
@ cae03c48:2a7d6671
2025-05-20 22:18:22Bitcoin Magazine
KindlyMD Shareholders Approve Merger with Bitcoin Treasury Company NakamotoKindlyMD, Inc. has secured shareholder approval for its proposed merger with Nakamoto Holdings Inc., marking a major step toward becoming one of the biggest Bitcoin treasury companies on the market.
The majority of KindlyMD’s shareholders delivered written consent in favor of the merger on May 18, 2025. The transaction is now on track to close in the third quarter of 2025, following the SEC’s review and distribution of an information statement to shareholders. Under current terms, the deal will close 20 days after the statement is mailed.
Full release: https://t.co/jsn4XNW1dK
"We are pleased to achieve this important milestone in the merger process," said Tim Pickett, CEO of KindlyMD. "As a combined company, we are excited to leverage Bitcoin's dominance and real-world utility to strengthen our company and drive… pic.twitter.com/YPD3ajZFNf— KindlyMD (@KindlyMD) May 20, 2025
“This milestone brings us one step closer to unlocking Bitcoin’s potential for KindlyMD shareholders,” said David Bailey, Founder and CEO of Nakamoto. “We are grateful that KindlyMD shares our vision for a future in which Bitcoin is a core part of the corporate balance sheet, and investors across global capital markets have exposure to the world’s greatest asset and store of value.”
Nakamoto is building a global portfolio of companies aligned around Bitcoin’s core principles. Through treasury strategy and targeted acquisitions, the company aims to redefine capital markets infrastructure with Bitcoin at the center.
KindlyMD, meanwhile, brings to the table a unique model of integrated, data-driven healthcare focused on reducing opioid dependence and improving outcomes through personalized treatment and alternative medicine education. Its clinical services are reimbursed through Medicare, Medicaid, and commercial insurance.
Tim Pickett, CEO of KindlyMD, emphasized the strategic benefits of the deal: “We are pleased to achieve this important milestone in the merger process. As a combined company, we are excited to leverage Bitcoin’s dominance and real-world utility to strengthen our company and drive sustained long-term value for our investors.”
Disclosure: Nakamoto is in partnership with Bitcoin Magazine’s parent company BTC Inc to build the first global network of Bitcoin treasury companies, where BTC Inc provides certain marketing services to Nakamoto. More information on this can be found here.
This post KindlyMD Shareholders Approve Merger with Bitcoin Treasury Company Nakamoto first appeared on Bitcoin Magazine and is written by Jenna Montgomery.
-
@ 2b998b04:86727e47
2025-05-20 22:15:45I didn’t take a course on “prompt engineering.” I didn’t memorize secret formulas or chase viral hacks.
What I did do was treat it like a system.
Just like in software:
Write → Compile → Test → Debug → Repeat
With AI, the loop feels just as familiar:
Prompt → Output → Edit → Re-prompt
That’s not magic. That’s engineering.
When someone asked me, “How can you trust AI for anything serious?”\ I told them: “Same way we trust the internet — not because the network’s reliable, but because the protocol is.”
AI is no different. The key is building systems around it:
-
Multiple models if needed
-
Human-in-the-loop verification
-
Layered editing and real discernment
It’s Not That Different From Other Engineering
Once you stop treating AI like a black box and start treating it like a tool, the whole experience changes.
The prompt isn’t a spell. It’s a spec.\ The response isn’t a prophecy. It’s a build.\ And your discernment? That’s your QA layer.
What I Actually Use It For
-
Brainstorming titles and refining headlines
-
Drafting posts that I shape and filter
-
Running content through for edge cases
-
Exploring theological or philosophical questions
And yes — I want it to be useful. I am building to make a living, not just to make noise. But I don’t lead with monetization. I lead with clarity — and build toward sustainability.
Final Thought
If you’re waiting for a course to teach you how to “do AI,” maybe just start by building something real. Test it. Edit it. Use it again. That’s engineering.
Shoutout to Dr. C (ChatGPT) for helping me articulate this.
If this post sparked anything for you, zap a few sats ⚡ — every bit helps me keep building with conviction.
-
-
@ 3f770d65:7a745b24
2025-05-20 21:14:28I’m Derek Ross, and I’m all-in on Nostr.
I started the Grow Nostr Initiative to help more people discover what makes Nostr so powerful: ✅ You own your identity ✅ You choose your social graph and algorithms ✅ You aren't locked into any single app or platform ✅ You can post, stream, chat, and build, all without gatekeepers
What we’re doing with Grow Nostr Initiative: 🌱 Hosting local meetups and mini-conferences to onboard people face-to-face 📚 Creating educational materials and guides to demystify how Nostr works 🧩 Helping businesses and creators understand how they can plug into Nostr (running media servers, relays, and using key management tools)
I believe Nostr is the foundation of a more open internet. It’s still early, but we’re already seeing incredible apps for social, blogging, podcasting, livestreaming, and more. And the best part is that they're all interoperable, censorship-resistant, and built on open standards. Nostr is the world's largest bitcoin economy by transaction volume and I truly believe that the purple pill helps the orange pill go down. Meaning, growing Nostr will also grow Bitcoin adoption.
If you’ve been curious about Nostr or are building something on it, or let’s talk. Whether you're just getting started or you're already deep in the ecosystem, I'm here to answer questions, share what I’ve learned, and hear your ideas. Check out https://nostrapps.com to find your next social decentralized experience.
Ask Me Anything about GNI, Nostr, Bitcoin, the upcoming #NosVegas event at the Bitcoin Conference next week, etc.!
– Derek Ross 🌐 https://grownostr.org npub18ams6ewn5aj2n3wt2qawzglx9mr4nzksxhvrdc4gzrecw7n5tvjqctp424
https://stacker.news/items/984689
-
@ cae03c48:2a7d6671
2025-05-20 21:04:08Bitcoin Magazine
The Blockchain Group Secures €8.6 Million to Boost Bitcoin StrategyThe Blockchain Group (ALTBG), listed on Euronext Growth Paris and known as Europe’s first Bitcoin Treasury Company, has announced a capital increase of approximately €8.6 million as it pushes forward with its Bitcoin Treasury Company strategy. The funding was raised through two operations, a Reserved Capital Increase and a Private Placement, with both priced at €1.279 per share.
JUST IN:
French company The Blockchain Group raises €8.6 million to buy more #Bitcoin pic.twitter.com/VjTKyFSS6w
— Bitcoin Magazine (@BitcoinMagazine) May 20, 2025
This price represents a 20.18% premium over the 20-day volume-weighted average share price but a 46.26% discount compared to the closing price on May 19, 2025, reflecting recent high share price volatility.
“The Company’s Board of Directors decided on May 19, 2025, using the delegated authority granted by the shareholders’ meeting held on February 21, 2025, under the terms of its 5th resolution, on an issuance, without pre-emptive rights for shareholders, of 3,368,258 new ordinary shares of the Company at a price of €1.2790 per share, including an issuance premium, representing a premium of approximately 20.18% compared to the weighted average of the twenty closing prices of ALTBG shares on Euronext Growth Paris preceding the decision of the Company’s Board of Directors, corresponding to a total subscription amount of €4,308,001.98,” said the press release.
In the Reserved Capital Increase, 3.37 million shares were issued to selected investors, including Robbie van den Oetelaar, TOBAM Bitcoin Treasury Opportunities Fund, and Quadrille Capital, raising over €4.3 million. The Private Placement raised another €4.35 million via the issuance of 3.4 million shares, targeting qualified investors.
“The Board of Directors also decided on a capital increase without pre-emptive rights for shareholders through an offering exclusively targeting a limited circle of investors acting on their own behalf or qualified investor, ” stated the press release.
The funds will support The Blockchain Group’s ongoing strategy of accumulating Bitcoin and expanding its subsidiaries in data intelligence, AI, and decentralized tech. Following this capital increase, the company’s share capital stands at €4.37 million, divided into over 109 million shares.
“The funds raised through the Capital Increase will enable the Company to strengthen its Bitcoin Treasury Company strategy, consisting in the accumulation of Bitcoin, while continuing to develop the operational activities of its subsidiaries,” said the press release.
Additionally, on May 12, The Blockchain Group announced it secured approximately €12.1 million through a convertible bond issuance reserved for Adam Back, CEO of Blockstream.
This post The Blockchain Group Secures €8.6 Million to Boost Bitcoin Strategy first appeared on Bitcoin Magazine and is written by Oscar Zarraga Perez.
-
@ c9badfea:610f861a
2025-05-20 19:49:20- Install Sky Map (it's free and open source)
- Launch the app and tap Accept, then tap OK
- When asked to access the device's location, tap While Using The App
- Tap somewhere on the screen to activate the menu, then tap ⁝ and select Settings
- Disable Send Usage Statistics
- Return to the main screen and enjoy stargazing!
ℹ️ Use the 🔍 icon in the upper toolbar to search for a specific celestial body, or tap the 👁️ icon to activate night mode
-
@ cae03c48:2a7d6671
2025-05-20 19:37:41Bitcoin Magazine
U.S. Leads the World in Bitcoin Ownership, New Report ShowsA new report from River reveals that the United States dominates Bitcoin ownership globally, holding about 40% of all available Bitcoin. With 14.3% of its population owning Bitcoin, the U.S. outpaces Europe, Oceania, and Asia combined.
The United States is the global Bitcoin superpower.
Our new report breaks down how this advantage can fuel the next era of American prosperity. pic.twitter.com/v5BNgTGsKA
— River (@River) May 20, 2025
Corporate America also leads in Bitcoin holdings. Thirty-two U.S. public companies, with a combined market cap of $1.26 trillion, hold Bitcoin as a treasury asset. These firms account for 94.8% of all Bitcoin owned by publicly traded companies worldwide. Major holders include Strategy with 569,000 BTC, U.S. mining companies with 96,000 BTC, and others with 68,000 BTC, totaling 733,000 BTC in the U.S., compared to 40,000 BTC held elsewhere.
Since China’s ban on Bitcoin mining in 2021, the United States has become the global leader in Bitcoin mining, responsible for 38% of all new Bitcoin mined since then. The U.S. attracts miners thanks to its stable regulatory environment, access to deep and liquid capital markets, and abundant energy resources. These advantages have helped the U.S. increase its share of the global Bitcoin mining hashrate by over 500% since 2020, solidifying its position as the center of the industry.
Bitcoin is also emerging as America’s preferred reserve asset, overtaking gold. Over 49.6 million Americans are in favor of holding Bitcoin, compared to 36.7 million who still prefer gold.
The US government’s bitcoin advantage is greater than that of gold, where the US accounts for just 29.9% of the world’s central bank gold reserves.
“Because there is a fixed supply of BTC, there is a strategic advantage to being among the first nations to create a strategic bitcoin reserve,” said the White House on March 7, 2025.
Politically, support for Bitcoin is gaining significant momentum across the U.S. government. As of now, 59% of U.S. Senators and 66% of House Representatives openly support pro-Bitcoin policies, signaling a notable shift in political attitudes and greater acceptance of digital assets as key components of America’s economic future.
The study highlights that Bitcoin ownership is highest among American males aged 31-35 and 41-45, with ownership rates ranging from 3% to 41% within these age groups. Politically, those identifying as “very liberal” or “neutral” are more likely to own Bitcoin than conservatives, though conservatives still make up a significant portion of holders.
This post U.S. Leads the World in Bitcoin Ownership, New Report Shows first appeared on Bitcoin Magazine and is written by Oscar Zarraga Perez.
-
@ 04c915da:3dfbecc9
2025-05-20 15:53:48This piece is the first in a series that will focus on things I think are a priority if your focus is similar to mine: building a strong family and safeguarding their future.
Choosing the ideal place to raise a family is one of the most significant decisions you will ever make. For simplicity sake I will break down my thought process into key factors: strong property rights, the ability to grow your own food, access to fresh water, the freedom to own and train with guns, and a dependable community.
A Jurisdiction with Strong Property Rights
Strong property rights are essential and allow you to build on a solid foundation that is less likely to break underneath you. Regions with a history of limited government and clear legal protections for landowners are ideal. Personally I think the US is the single best option globally, but within the US there is a wide difference between which state you choose. Choose carefully and thoughtfully, think long term. Obviously if you are not American this is not a realistic option for you, there are other solid options available especially if your family has mobility. I understand many do not have this capability to easily move, consider that your first priority, making movement and jurisdiction choice possible in the first place.
Abundant Access to Fresh Water
Water is life. I cannot overstate the importance of living somewhere with reliable, clean, and abundant freshwater. Some regions face water scarcity or heavy regulations on usage, so prioritizing a place where water is plentiful and your rights to it are protected is critical. Ideally you should have well access so you are not tied to municipal water supplies. In times of crisis or chaos well water cannot be easily shutoff or disrupted. If you live in an area that is drought prone, you are one drought away from societal chaos. Not enough people appreciate this simple fact.
Grow Your Own Food
A location with fertile soil, a favorable climate, and enough space for a small homestead or at the very least a garden is key. In stable times, a small homestead provides good food and important education for your family. In times of chaos your family being able to grow and raise healthy food provides a level of self sufficiency that many others will lack. Look for areas with minimal restrictions, good weather, and a culture that supports local farming.
Guns
The ability to defend your family is fundamental. A location where you can legally and easily own guns is a must. Look for places with a strong gun culture and a political history of protecting those rights. Owning one or two guns is not enough and without proper training they will be a liability rather than a benefit. Get comfortable and proficient. Never stop improving your skills. If the time comes that you must use a gun to defend your family, the skills must be instinct. Practice. Practice. Practice.
A Strong Community You Can Depend On
No one thrives alone. A ride or die community that rallies together in tough times is invaluable. Seek out a place where people know their neighbors, share similar values, and are quick to lend a hand. Lead by example and become a good neighbor, people will naturally respond in kind. Small towns are ideal, if possible, but living outside of a major city can be a solid balance in terms of work opportunities and family security.
Let me know if you found this helpful. My plan is to break down how I think about these five key subjects in future posts.
-
@ 04c915da:3dfbecc9
2025-05-20 15:47:16Here’s a revised timeline of macro-level events from The Mandibles: A Family, 2029–2047 by Lionel Shriver, reimagined in a world where Bitcoin is adopted as a widely accepted form of money, altering the original narrative’s assumptions about currency collapse and economic control. In Shriver’s original story, the failure of Bitcoin is assumed amid the dominance of the bancor and the dollar’s collapse. Here, Bitcoin’s success reshapes the economic and societal trajectory, decentralizing power and challenging state-driven outcomes.
Part One: 2029–2032
-
2029 (Early Year)\ The United States faces economic strain as the dollar weakens against global shifts. However, Bitcoin, having gained traction emerges as a viable alternative. Unlike the original timeline, the bancor—a supranational currency backed by a coalition of nations—struggles to gain footing as Bitcoin’s decentralized adoption grows among individuals and businesses worldwide, undermining both the dollar and the bancor.
-
2029 (Mid-Year: The Great Renunciation)\ Treasury bonds lose value, and the government bans Bitcoin, labeling it a threat to sovereignty (mirroring the original bancor ban). However, a Bitcoin ban proves unenforceable—its decentralized nature thwarts confiscation efforts, unlike gold in the original story. Hyperinflation hits the dollar as the U.S. prints money, but Bitcoin’s fixed supply shields adopters from currency devaluation, creating a dual-economy split: dollar users suffer, while Bitcoin users thrive.
-
2029 (Late Year)\ Dollar-based inflation soars, emptying stores of goods priced in fiat currency. Meanwhile, Bitcoin transactions flourish in underground and online markets, stabilizing trade for those plugged into the bitcoin ecosystem. Traditional supply chains falter, but peer-to-peer Bitcoin networks enable local and international exchange, reducing scarcity for early adopters. The government’s gold confiscation fails to bolster the dollar, as Bitcoin’s rise renders gold less relevant.
-
2030–2031\ Crime spikes in dollar-dependent urban areas, but Bitcoin-friendly regions see less chaos, as digital wallets and smart contracts facilitate secure trade. The U.S. government doubles down on surveillance to crack down on bitcoin use. A cultural divide deepens: centralized authority weakens in Bitcoin-adopting communities, while dollar zones descend into lawlessness.
-
2032\ By this point, Bitcoin is de facto legal tender in parts of the U.S. and globally, especially in tech-savvy or libertarian-leaning regions. The federal government’s grip slips as tax collection in dollars plummets—Bitcoin’s traceability is low, and citizens evade fiat-based levies. Rural and urban Bitcoin hubs emerge, while the dollar economy remains fractured.
Time Jump: 2032–2047
- Over 15 years, Bitcoin solidifies as a global reserve currency, eroding centralized control. The U.S. government adapts, grudgingly integrating bitcoin into policy, though regional autonomy grows as Bitcoin empowers local economies.
Part Two: 2047
-
2047 (Early Year)\ The U.S. is a hybrid state: Bitcoin is legal tender alongside a diminished dollar. Taxes are lower, collected in BTC, reducing federal overreach. Bitcoin’s adoption has decentralized power nationwide. The bancor has faded, unable to compete with Bitcoin’s grassroots momentum.
-
2047 (Mid-Year)\ Travel and trade flow freely in Bitcoin zones, with no restrictive checkpoints. The dollar economy lingers in poorer areas, marked by decay, but Bitcoin’s dominance lifts overall prosperity, as its deflationary nature incentivizes saving and investment over consumption. Global supply chains rebound, powered by bitcoin enabled efficiency.
-
2047 (Late Year)\ The U.S. is a patchwork of semi-autonomous zones, united by Bitcoin’s universal acceptance rather than federal control. Resource scarcity persists due to past disruptions, but economic stability is higher than in Shriver’s original dystopia—Bitcoin’s success prevents the authoritarian slide, fostering a freer, if imperfect, society.
Key Differences
- Currency Dynamics: Bitcoin’s triumph prevents the bancor’s dominance and mitigates hyperinflation’s worst effects, offering a lifeline outside state control.
- Government Power: Centralized authority weakens as Bitcoin evades bans and taxation, shifting power to individuals and communities.
- Societal Outcome: Instead of a surveillance state, 2047 sees a decentralized, bitcoin driven world—less oppressive, though still stratified between Bitcoin haves and have-nots.
This reimagining assumes Bitcoin overcomes Shriver’s implied skepticism to become a robust, adopted currency by 2029, fundamentally altering the novel’s bleak trajectory.
-
-
@ cae03c48:2a7d6671
2025-05-20 19:18:50Bitcoin Magazine
Building FUN! on Bitcoin: Parker Day and Casey Rodarmor Talk Collaboration and the Future of On-Chain Art and AuctionsParker Day and Casey Rodarmor’s FUN! Collection is an unprecedented synthesis of photographic maximalism and protocol-level innovation—a work that stands alone within the landscape of Bitcoin-native art. Saturated with Day’s bold color palette, surreal personas, and layered identity play, the collection is anchored by Rodarmor’s foundational role as the creator of the Ordinals protocol. Most notably, the series is inscribed directly under Inscription 0—the first inscription ever made using the Ordinals Protocol—marking it as an ontological outlier in the digital art canon. No other collection occupies this same foundational location on-chain, making FUN! a conceptual and technical landmark in Ordinals history.
Now expanded with new reflections from both collaborators, this interview explores the project’s deeper ideological dimensions—from the mechanics of trustless auctions to the ethics of artistic compensation, from pro wrestling and portraiture to capitalist generosity and the social roots of value. Together, Day and Rodarmor form a rare creative pairing: artist and dev, photographer and protocol architect, equal parts absurdity and rigor.
One of the collection’s most iconic works—featuring Rodarmor himself—is set to headline the Megalith.art auction, a Bitcoin-native sale structure that concludes on June 3rd and will be showcased at both Bitcoin 2025 in Las Vegas and its satellite event, Inscribing Vegas. The piece anchors a broader lineup that includes standout contributions from leading digital artists such as Post Wook, Coldie, Ryan Koopmans, FAR, Rupture, and Harto.
It’s less an interview than a glimpse into a high-voltage collaboration:
Parker, your photography is known for its bold color, eccentric characters, and fearless exploration of identity and persona. How did this collaboration with Casey come about, and what visual or cultural influences helped shape The FUN! Collection?
PARKER: Casey and I have known each other since high school. You could even say he was one of my first models—I shot his portrait for my sophomore year darkroom photography class. We kept in touch over the years, and in 2017 he encouraged me to turn my ICONS series into crypto art. I passed on that at the time, but in 2021 I did release an Ethereum NFT collection of ICONS. Right after that, Casey called me and said, “Yo! You need to go even bigger! Do 10k!” And I’m like, “You know these are all unretouched and shot on film, right?” But with his encouragement and funding, we figured out how to produce 1,000 unique portraits.
The visual and cultural influences behind FUN! are too numerous to name—just a mishmash of pop culture that’s been stewing in my brain since childhood.
The FUN! collection was released under a CC0 license, meaning anyone can reuse, remix, or recontextualize the work without restriction. In a project so rooted in persona, authorship, and performance, what led you to make that decision—and how do you think about authorship or artistic control in the context of open licensing on Bitcoin? What would you find interesting to see done with the collection beyond your original photography methodology? What kinds of reinterpretations or mutations of the collection would genuinely intrigue you?
PARKER: I love it. As an artist, once you create something and it leaves the studio, it’s out of your hands. The audience shapes the work in their own interpretations. You have no control over it. It seems silly to say “this is my IP, you can’t do anything with it.” We live in a world of memes, of reproduction ad infinitum. It seems anachronistic in today’s world to clutch copyright with an iron fist. And it’s perfectly in keeping with the ethos of Bitcoin to make the work CC0. In terms of value, the inscriptions are the scarce collectibles. Even more so than any editioned prints will ever be. Their inscriptions’ provenance is on chain, directly descended from inscription 0.
There’s nothing in particular that I’d like to see or not like to see done with FUN! I just hope people find meaning in it, and make meaning from it.
You two have an unusual creative relationship: artist and protocol dev, patron and co-conspirator. Casey, you basically invented a new medium to support Parker’s work. What does it mean to build something enduring together in a space that often prizes individualism?
CASEY: I love it. I mean—I really love it. Parker and I are super complementary. We each have our own strong wheelhouses, and we’re always engaging with each other’s work, but in this very chill, supportive way.
Like, when we’re shooting, I’ll tell her what I think looks cool or what might work well in the collection—but it’s never directive. It’s more like, “Hey, here’s some data. Do with it what you will.” And same goes for the technical stuff. We’ll talk about metadata, domains, the website layout—she gives me her thoughts, and it’s just… input. Take it or leave it.
We’re both so solid in our own lanes that it makes collaboration easy. There’s no weird insecurity. She’s the creative force behind the collection—I know that. I’m the technical backbone—and she knows that. That kind of clarity makes it fun.
And honestly, I’m just really proud of this partnership. We’ve been in each other’s lives in a positive way for so long—since high school. Parker’s given me Bitcoin haircuts. I was bugging her to do NFTs in 2017. Even when we’d go long stretches without talking, we always checked back in.
“Hey, how’s it going?”
“Saw you on Twitter.”
“Saw you on Instagram.”It’s just one of those great, long-running collaborations that’s rooted in mutual respect—and a shared willingness to go weird.
Casey, did you draw on any past modeling experience—or take notes from Raph? And what was it like working under Parker’s direction: more Kubrick or camp counselor?
CASEY: I think I was pretty self-directed for the shoot. I wasn’t drawing on past modeling experience exactly—more like theater kid energy. I’ve always loved professional wrestling. It’s incredibly cool… and also incredibly formulaic, so I get bored if I watch too much. But every couple of years, I check back in, see what the storylines are.
For this shoot, I knew exactly how I wanted to ham it up—like a professional wrestler. That wild, sweaty, insane energy. The spiked ball pressed against my face. All the weird faces. American pro wrestling is super operatic, honestly.
The character I was channeling? Mostly Ultimate Warrior. Parker really nailed the eyes—those classic, intense Ultimate Warrior eyes. He wore wild makeup and had that jacked-up look. Ric Flair was another influence—mainly for the hair. He had this long blond hair, and when it got bloody in the ring, it looked insane.
As for Parker—definitely more camp counselor than Kubrick. She sets the scene: everything ready, hair and makeup dialed, wardrobe laid out. We talked through the costumes a bit. She’ll give direction, a few hints here and there—but it’s really up to the model to bring it.
You can include that (Casey snaps his fingers.)
Yeah. You know? You know.
The FUN! collection features an interactive website where visitors can filter portraits by mood, prop, background color—even astrological sign. What inspired that kind of functionality?
PARKER: Before FUN!, I had been thinking about an exhibition that grouped photos based on emotional expression. Even though the personas may appear wildly different, the core humanity is the same. I’ve always tried to equate disparate identities by shooting people in the same way—with simple fabric backdrops that strip away time and place.
The FUN! website (fun.film), reflects this idea: difference in sameness, or sameness in difference. It’s a tool for play—but also a way to reflect on identity in a fragmented age.
Casey, you’ve described yourself as a capitalist—but you’ve also given away tools for free and pursued an almost obsessive elegance in your work. How do you reconcile market belief with this ethic of generosity? And what does that tension mean for the future of Ordinals?
CASEY: There’s absolutely no tension—and that’s because most people just don’t understand what capitalism is. Like, I can’t even begin to unpack what people think capitalism means.
Capitalism simply means the means of production are privately controlled. That’s it. That’s the whole definition. The alternatives? You’ve got two: either (1) violent chaos, or (2) the government owns and allocates all capital. That’s it. Those are your three options.
So when people say they’re “anti-capitalist,” what they usually mean is: “I want the government to control who gets what.” I’m not about that. I’m a staunch capitalist. I allocate my own means of production—my computers, my resources, my energy—how I see fit, not how the state tells me to.
And sometimes? That allocation includes giving things away. That’s not anti-capitalist. If the government confiscated my stuff and handed it out? Sure, that’s anti-capitalist. But me choosing to make something—sometimes selling it, sometimes not—is 100% aligned with the spirit of capitalism.
People need to get with the program.
You asked about the tension between generosity and profit in Ordinals? There _i
-
@ 662f9bff:8960f6b2
2025-05-20 18:52:01April already and we are still refugees from the madness in HK. During March I had quite a few family matters that took priority and I also needed to work for two weeks. April is a similar schedule but we flew to Madeira for a change of scene and so that I could have a full 2-weeks off - my first real holiday in quite a few years!
We are staying in an airBnB in Funchal - an experience that I can totally recommend - video below! Nice to have an apartment that is fully equipped in a central location and no hassle for a few weeks. While here we are making the most of the great location and all the local possibiliites.
Elsewhere in the world
Things are clearly not going great around the world. If you are still confused as to why these things are happening, do go back and read the previous Letter from HK section "Why? How did we get here?"
You should be in no doubt that the "Great Reset" with its supporting "Great Narrative" is in full swing.. This is it - it is not a drill. For additional insights the following are recommended.
-
Jeff Booth discusses clearly and unemotionally with Pomp - Inflation is theft from humanity by the world governments
-
James' summary of Day 2 of the Miami conference - Peter Thiel (wow) and a fantastic explainer from Saifedean on the costs of the current corrupt financial system
-
James' summary of Day 3 of the Miami conference - listen in particular to the words of wisdom from Michael Saylor and Lyn Alden
-
Layered Money - The corruption of the system will blow your mind once you understand it…
-
This is BIG: Strike Is Bringing Freedom To Retail Merchants
-
Mark summarises Ray's book: Things will go faster and slower than you want!
-
Thoughtful words from George - evil is at work - be in no doubt..
-
Wow - My mind is blown. Must listen to John Carvalho - what clear ambition and answers to every question!
-
Related to the John Carvalho discussion. Likely these two options will end up complementing each other
On the personal and inspirational side
Advantage of time off work is that I have more time to read, listen and watch things that interest me. It really is a privilege that so much high quality material is so readily available. Do not let it go to waste. A few fabulous finds (and some re-finds) from this past week:
-
Ali Abdaal's bookshelf review just blew my mind! For the full list of books with links see the text under his video. So many inspirations and his delivery is perfect.
-
Gotta recommend Ali's 21 Life Lessons. I have been following him since he was student in Cambridge five years ago - his personal and professional growth and what he achieves (now with his team) is truely staggering.
-
Also his 15 books to read in 2022 - especially this one!
-
I also keep going back to Steve Jobs giving the 2005 Stanford Commencement address Three stories from his life - listen and be inspired - especially story #3
You will know that I am a fan of Audio Books and also Kindle - recently I am starting to use Whispersync where you get the Kindle- and Audio-books together for a nice price. This makes it easier to take notes (using Mac or iPad Kindle reader) while getting the benefit of having the book read to you by a professional reader.
I have also been inspired by a few people pushing themselves to do more reading - like this girl and Ali himself with his tips. Above all: just do it and do not get stuck on something that does not work for you!
Books that I am reading - Audio and Kindle!
-
The Final Empire: Mistborn, Book 1 - this is a new genre for me - I rather feel that it might be a bit too complicated for my engineering mind - let's see
-
Die with Zero: Getting All You Can from Your Money and Your Life - certainly provocative and obvious if you think about it but 99% do the opposite!
-
Chariots of the Gods - a classic by Erich von Daniken (written in 1968) - I have been inspired by his recent YT video appearances. Thought provoking and leads you to many possibilities.
So what's it like in Funchal, Madeira?
Do check out HitTheRoadMadeira's walking tour around Funchal
My first impressions of Funchal
and see my day out on Thursday!
Saturday - Funchal and Camar de Lobos
That's it!
No one can be told what The Matrix is.\ You have to see it for yourself.**
Do share this newsletter with any of your friends and family who might be interested.
You can also email me at: LetterFrom@rogerprice.me
💡Enjoy the newsletters in your own language : Dutch, French, German, Serbian, Chinese Traditional & Simplified, Thai and Burmese.
-
-
@ 05a0f81e:fc032124
2025-05-20 18:26:00The term "Ponzi scheme" is named after Charles Ponzi, who famously perpetrated a large-scale fraudulent investment scheme in the 1920s. While earlier instances of similar schemes existed, Ponzi's notoriety and scale cemented the name in popular usage.
There are some detailed of ponzi history: Pre-Ponzi; Adele Spitzeder (1869-1872): In Germany, Spitzeder used a Ponzi-like scheme to defraud investors.
Sarah Howe (1880s): In the United States, Howe used a scheme called "Ladies Deposit" to attract female investors with high interest rates, ultimately stealing their money.
Literary Precedents: Charles Dickens novels "Martin Chuzzlewit" (1844) and "Little Dorrit" (1857) included characters and storylines that featured similar fraudulent investment schemes.
The Charles Ponzi Scheme (1920s): Ponzi's scheme involved claiming to buy international postal reply coupons in Europe, redeem them for more expensive US postage stamps, and generate high profits.
The Reality: In reality, he diverted money from new investors to pay off earlier investors, rather than using it for legitimate business.
The Rise and Fall: Ponzi amassed significant wealth, drawing in around 30,000 investors and collecting over $8 million in just seven months. However, the scheme collapsed due to its unsustainable nature, and Ponzi was eventually convicted and served time in prison.
Impact and Legacy: Ponzi's scheme gained widespread publicity, both during its operation and after its collapse. This notoriety led to the scheme being named after him, and the term "Ponzi scheme" became synonymous with this type of fraudulent investment scam.
Ponzi scheme have cause more harm than good in world at large and it is a fraudulent investment scheme. Say no to ponzi scheme! Say no to ponzi scheme!!
-
@ c9badfea:610f861a
2025-05-20 17:05:41- Install YTDLnis (it's free and open source)
- Launch the app and allow notifications and storage access if prompted
- Go to any supported website or use the YouTube, Instagram, X, or Facebook app
- Tap Share on the post or website URL and select YTDLnis as the sharing destination
- Adjust the settings if desired and tap Download
- You'll be notified when the download finishes
- Enjoy uninterrupted watching!
ℹ️ This app uses
yt-dlp
internally and it's also available as a standalone CLI tool -
@ 554ab6fe:c6cbc27e
2025-05-20 15:51:33Introduction
It is becoming increasingly evident that sunlight is an essential nutrient for the body. To be more precise, the various wavelengths coming from the sun provide different benefits to the body, and each play a vital role in human health. Even more so, they work in concert with one another, as one wavelength may help reduce the potentially harmful effects of another. Benefits are maximized and harm reduced when we are exposed to the full breadth of this rainbow. This article will attempt to shed light on these various benefits and synergies.
To put this discussion into context, it is important to consider the overall health benefits of sunlight exposure. In a Swedish study that followed 29,000 women over 20 years, it was found that the mortality rate was doubled in those who avoided sun exposure when compared to those that didn’t (Lindqvist et al. 2016). Women who avoided the sun were twice as likely to die, primarily from cardiovascular disease, and there was no difference between death from malignant melanoma between the two groups (Lindqvist et al. 2016).
To understand why sunlight is so beneficial to health, it is important to make clear the diverse range of wavelengths that come from the sun. We typically think of the sun as a provider of both visible light and warmth. However, the spectrum of light visible to the human eye is a narrow band of the wavelengths actually emitted by the sun.
As wavelengths become shorter, visible light becomes more blue. Beyond the visible spectrum on the blue end, we arrive at ultraviolet (UV) light. On the other end of the spectrum are the longer red wavelengths. Outside of the visible window on the red side is infrared (IR) light, which provides heat. For helpful context, consider how shorter wavelengths have a harder time penetrating our atmosphere. So, the skies of dawn and dusk are predominately filled with red and near-infrared (NIR) light, while the middle of the day contains more blue and UV light. The bulk of wavelengths from the sun throughout the day are on the NIR end. The entire spectrum of visible and non-visible light between UV and IR plays critical roles in human health, especially towards mitochondrial health and metabolism. To summarize these benefits and provide a general overview for the following article, the benefits are as follows:
- UV – aids in the production of vitamin D and melanin, but also causes DNA damage
- Vitamin D improves immune system function and can repair DNA damage
- Melanin stores electrons for use within mitochondria
- Blue – involved in our circadian rhythm as the absence of blue light triggers the production of melatonin, an important antioxidant.
- Near-infrared (NIR) – improves mitochondria function and energy production while also protecting us from the harms of blue and UV light.
Ultraviolet Light
Let’s begin with a discussion around the widely misunderstood light of UV. UV is often viewed as a dangerous form of light, given that it can cause DNA damage and lead to cancer. While true, this myopic point of view ignores the crucial benefits of UV light. UV light produces vitamin D, which counteracts the DNA damage caused by UV while providing many other benefits. Additionally, UV light triggers the production of melanin, which aids in mitochondrial function. Like all physiological processes in the body that are vital to survival, there is a release of POMC-derived endorphins when skin comes into contact with UV light (Fell et al. 2014). Any person likely reading this article can agree that sitting under the sun simply feels amazing. We are drawn to it in a deeply meaningful sense.
Vitamin D is one of the most important chemicals regarding health, and it is poorly named. The term ‘vitamin’ refers to a compound that is important for health but cannot be adequately made within the body and must be retrieved externally. Peoples of the Northern and Southern hemisphere who are exposed to less UV light during winter would, for example, historically retrieve their vitamin D from foods such as oily fish, seal blubber, whale blubber, and polar bear liver (Wacker and Holick 2013). In a similar way, vitamin D was given its name 100 years ago when it was found that cod-liver oil was capable of curing rickets, when it was found that the so-called vitamin could promote calcium deposition in bones (McCollum et al. 1922). It was only until much later, in 1981, when scientists discovered that human skin could also synthesize vitamin D (M. F. Holick 1981). A majority of human vitamin D is produced by the skin when exposed to UVB (280 – 315 nm), while a minor amount is gained through food (Prietl et al. 2013; Wacker and Holick 2013). Most cells and organs in the human body have vitamin D receptors and many organs also have the ability to produce it, this speaks to the incredibly important nature of this compound towards our health (Prietl et al. 2013; Wacker and Holick 2013). Vitamin D deficiency has been associated with various types of cancer, autoimmune disorders, type 1 diabetes mellitus, multiple sclerosis (MS), cardiovascular disease, and even schizophrenia (Michael F. Holick 2007; Wacker and Holick 2013). Multiple studies have also found that vitamin D deficiency increases all-cause mortality (Garland et al. 2014; Yang et al. 2011; Chowdhury et al. 2014).
Though the historical benefits to vitamin D were attributed mainly to bone health, it is far more important. Vitamin D plays a critical role in protecting against invasive pathogens, reducing autoimmunity, and maintaining overall health (Wimalawansa 2023). Regarding immunity, one way it does this is by causing a shift away from proinflammatory responses to one more centered around T cell activation (Prietl et al. 2013). Vitamin D has therefore been shown to benefit other disorders that are related to immunity, such as a study that found vitamin D supplementation during pregnancy reduced asthmatic symptoms in children (Litonjua et al. 2016). That being said, it is important to highlight how there is no substitution for natural sunlight as a means of getting vitamin D. Naturally produced vitamin D from the skin lasts 2-3 times longer in the body (Wacker and Holick 2013). This is one of many likely reasons why the natural avenue should always be preferred over the supplemental. A similar line of reasoning follows in methods of getting UV light, as natural sun exposure leads to a decrease of all-cause mortality while the use of artificial tanning beds has been shown to increase all-cause and cancer mortality (Yang et al. 2011). More on why this likely occurs later.
Beyond vitamin D’s benefits to the immune system, it is important to focus on the compound’s role in mitochondrial health. In a previous article I wrote titled “Sunlight and Health”, I delve deeper into the importance of mitochondria and the science of how they work. In simplicity, imagine how all life on earth centers around energy. The sun provides energy to the earth, and the plethora of life on earth harness and facilitate the flow of that energy. Plants and animals share a symbiotic relationship within this system. Plants, through photosynthesis, take in sunlight, CO2, and water and create a glucose precursor and oxygen. This occurs within the chloroplast of plant cells. Within human cells, we have mitochondria. Our mitochondria, in turn, take in oxygen and glucose and produce CO2, water, and energy for our bodies in the form of ATP. What the plant breathes out, we breathe in, and vice versa. Mitochondria are central to all animal life on earth, and the ATP produced is central to all physiologic function. If your mitochondria are unhealthy, you are unhealthy and will experience disease.
Vitamin D plays a role in mitochondrial health at a DNA level. Our cells have DNA, which we inherited from our mother and father. On top of that, the mitochondria within our cells have their own set of DNA (mtDNA). Our mitochondria come from our mother’s egg, and therefore our mtDNA always is inherited from our mother. UV light can cause damage to both our DNA and mtDNA (Birch-Machin, Russell, and Latimer 2013). This is what gives UV light the ability to cause cancer. Additionally, damage to the mtDNA within our mitochondria can lead to mitochondrial dysfunction. The more poorly our mitochondria function, the less energy we produce for our cells, and the less healthy our cells become. There is research being developed that suggests the role of vitamin D is to counterbalance this danger by regulating gene transcription and reducing mtDNA damage. A mouse study conducted in 2011, for example, found that different shapes of vitamin D reduce the development of tumors in mice following UV exposure (Dixon et al. 2011). It is not unlike nature to create a system of checks and balances, to ensure that the damaging effects of UV light are counterbalanced by a compound produced by the body when exposure to that same light.
While vitamin D may be important for mitochondrial health by protecting against mtDNA damage, melanin potentially plays a much larger role. Melanin is the pigment in our skin that make us darker. Not only is the diversity in skin tones across humans due to variations in melanin content, but a tan is also the creation of more melanin. To be more specific, the skin’s exposure to UVA (315-400nm) leads to the creation of melanin (Wicks et al. 2011). The most obvious benefit to the production of melanin, which most people could appreciate, is that the darker or tanner our skin is, the less damage we will receive from UV light. In this way, melanin shares a similar responsibility to vitamin D, where both are protecting the body against the very thing that forms them. Even more crucially however, melanin acts as a battery for the mitochondria.
During cellular respiration, where mitochondria turn oxygen and glucose into energy, electrons are stripped from the glucose for use. In other words, what our mitochondria really need are oxygen and electrons, and the glucose is simply a means to an end. If the mitochondria are the engine, then the electrons are the fuel (assuming you are still breathing). Due to its chemical structure, melanin is a natural reversible oxidation-reduction system (Figge 1939). In other words, it can both store and release electrons. Melanin is therefore a kind of battery, retrieving electrons from various sources, and storing them for future use in our mitochondria as a substitute for food. When stated this way, and considering how food is important because both fats and carbohydrates fuel the body by providing electrons to our mitochondria, one can imagine how vitally important melanin is. Melanin is central towards the availability of electrons for use in our body to produce the energy to live. Without adequate melanin, your mitochondria will starve for fuel and not provide your body with the energy it needs to thrive.
Blue Light
To contextualize the role blue light plays in human health, it is important to revisit an important byproduct of cellular respiration within mitochondria. When mitochondria turn electrons and oxygen into energy, there is a byproduct formed known as reactive oxygen species (ROS). ROS play important roles in the body, but in excess they can cause DNA damage and disrupt various cellular processes. For example, UV light causes cancer due to the ROS generated, and studies have found that blue light does the same in both the skin and eyes (Nakashima, Ohta, and Wolf 2017; Abdouh et al. 2024). This research suggests that excess blue light or blue light in isolation can damage the eyes and cause harm like UV light.
Blue and UV light are predominant during the middle of the day. Though both may cause oxidative stress on the body, the body simultaneously counteracts this damage through melatonin. Think of melatonin as the junk remover for mitochondria. Throughout the day mitochondria produce energy, and ROS is formed. During our nighttime sleep, melatonin plays an important role as an antioxidant and removes the excess ROS (Leon et al. 2004).
The relationship between blue light and melatonin is important. During the day, when blue light is present, our body suppresses the production of melatonin (West et al. 2011). When the sun sets and there is no longer a heavy presence of blue light, our body begins to produce melatonin for sleep. This is a central function for how our body gets tired at night and gets ready for sleep. This is also why artificial light at night, from our modern technology, is harmful to human health because it tricks the body into the continual suppression of melatonin production. Without proper melatonin production, our cells buildup too much ROS and this can cause mitochondrial dysfunction and other sleep related issues.
Beyond the importance of getting good sleep and producing melatonin to remove excess ROS from our cells, the existence of artificial light and excess blue light is problematic during the day as well. As stated previously, blue light causes ROS buildup in both the skin and eyes (Nakashima, Ohta, and Wolf 2017; Abdouh et al. 2024). As with most harms from sunlight, our body has adapted with a backup plan. During the day, when blue and UV light is present, there is simultaneous exposure to NIR light (650-1200nm). Recent research suggests that NIR also counterbalances the harm of blue light by increasing melatonin synthesis in the mitochondria (Tan et al. 2023). This highlights the importance of receiving the full spectrum of light from the sun, as one wavelength counterbalances the damages of the other.
Near-Infrared Light
While indoor living has been commonplace for humans across generations, and modern technology has over saturated our bodies with blue light, some recent changes to our technology have made things worse. Incandescent light bulbs emit NIR light, this is why they got warm. However, LED lights do not emit NIR light. Therefore, where people of past generations were potentially exposed to a lot of artificial light at night, this was counterbalanced by the NIR emitted by those same lightbulbs. Now, modern humans use LEDs and spend 93% of our time indoors with zero exposure to NIR, which is 90% of the light emitted by the sun (Tan et al. 2023).
Not only does NIR light protect our bodies from the damaging consequences of blue light, but it similarly protects us against UV light. As stated previously, NIR may result in the production of melatonin within mitochondria during the day, helping protect against the ROS buildup and mtDNA damage. Additionally, research has also found that NIR light protects from UV light in other ways. For example, a study in 2008 found that pretreating skin with NIR light (660nm) prevented sunburns (Barolet and Boucher 2008). Another study found that red and NIR light (620-690nm) altered gene expression and upregulated DNA repair (Kim et al. 2019). Again, this highlights the theme that the body has produced the means to protect itself from the harms of the sun via other rays emitted. However, the protection from harmful rays is best achieved when exposed to the full spectrum of light wavelengths as they change throughout the day. The light of dawn and dusk is predominately red and NIR. Therefore, this research suggests that being exposed to morning light will protect the body from the potentially cancer-causing effects of the UV light later in the day. A human being who lived outside would naturally be exposed to this spectrum of light every day. However, modern humans may be inside in the morning, go to the beach during the middle of the day, and get sunburned because they do not properly receive the full spectrum of light as nature intended every day.
Lastly, it is important to explore the ways NIR improves mitochondrial function. If electrons are the fuel source for this engine, and melatonin is the junk removal, then NIR is the lubricant. NIR improves the energy output of mitochondria, and there are various hypotheses for how this occurs. One hypothesis is that NIR boosts the functionality of cytochrome c oxidase, one of the chromophores used in the electron transport chain (ETC) of cellular respiration within mitochondria (De Freitas and Hamblin 2016). Another involves NIR light’s ability to modify the viscosity of water which increases the efficiency of the final step in the ETC, the ATP synthase (Sommer, Haddad, and Fecht 2015). ATP synthase can be thought of as a kind of pump that produces ATP, in this way NIR can be thought of almost literally as a lubricant for this pump.
Summary
In summary, the research involving how sunlight affects mitochondrial health highlights the importance of the full spectrum of wavelengths, each of which plays a vital role in human health throughout the day. Having exposure to one, without the other, can lead to imbalances and mitochondrial disease. The red and NIR light in the morning helps our mitochondria produce more energy throughout the day, while also preparing our bodies for the beneficial yet dangerous wavelengths to come. In the middle of the day, we receive much more UV and blue light, which help us produce vitamin D and melanin, both central to health and wellness. Once the sun sets, and blue light is absent, we produce melatonin for sleep. During our sleep, the melatonin removes the dangerous byproducts of our energy-producing day, protecting us from disease and preparing us for the following day. Mitochondria are central to human health and life on earth, and the rays from the sun are central to mitochondrial health.
Respecting nature and its cycles is vital for us humans who are increasingly immersing ourselves in a world dominated by technology. Our ancestors did not have to reconcile with these ideas, because life forced these exposures upon them. If we wish to maintain health in our modern world, we must be able to find balance. Even though some might think they can escape into the virtual world, our bodies will always and forever be connected and reliant upon the natural one.
References
Abdouh, Mohamed, Yunxi Chen, Alicia Goyeneche, and Miguel N. Burnier. 2024. “Blue Light-Induced Mitochondrial Oxidative Damage Underlay Retinal Pigment Epithelial Cell Apoptosis.” International Journal of Molecular Sciences 25 (23): 12619.
Barolet, Daniel, and Annie Boucher. 2008. “LED Photoprevention: Reduced MED Response Following Multiple LED Exposures.” Lasers in Surgery and Medicine 40 (2): 106–12.
Birch-Machin, M. A., E. V. Russell, and J. A. Latimer. 2013. “Mitochondrial DNA Damage as a Biomarker for Ultraviolet Radiation Exposure and Oxidative Stress.” The British Journal of Dermatology 169 (s2): 9–14.
Chowdhury, Rajiv, Setor Kunutsor, Anna Vitezova, Clare Oliver-Williams, Susmita Chowdhury, Jessica C. Kiefte-de-Jong, Hassan Khan, et al. 2014. “Vitamin D and Risk of Cause Specific Death: Systematic Review and Meta-Analysis of Observational Cohort and Randomised Intervention Studies.” BMJ (Clinical Research Ed.) 348 (apr01 2): g1903.
De Freitas, Lucas Freitas, and Michael R. Hamblin. 2016. “Proposed Mechanisms of Photobiomodulation or Low-Level Light Therapy.” IEEE Journal of Selected Topics in Quantum Electronics: A Publication of the IEEE Lasers and Electro-Optics Society 22 (3): 348–64.
Dixon, Katie M., Anthony W. Norman, Vanessa B. Sequeira, Ritu Mohan, Mark S. Rybchyn, Vivienne E. Reeve, Gary M. Halliday, and Rebecca S. Mason. 2011. “1α,25(OH)₂-Vitamin D and a Nongenomic Vitamin D Analogue Inhibit Ultraviolet Radiation-Induced Skin Carcinogenesis.” Cancer Prevention Research (Philadelphia, Pa.) 4 (9): 1485–94.
Fell, Gillian L., Kathleen C. Robinson, Jianren Mao, Clifford J. Woolf, and David E. Fisher. 2014. “Skin β-Endorphin Mediates Addiction to UV Light.” Cell 157 (7): 1527–34.
Figge, Frank H. J. 1939. “Melanin: A Natural Reversible Oxidation-Reduction System and Indicator.” Experimental Biology and Medicine (Maywood, N.J.) 41 (1): 127.
Garland, Cedric F., June Jiwon Kim, Sharif Burgette Mohr, Edward Doerr Gorham, William B. Grant, Edward L. Giovannucci, Leo Baggerly, et al. 2014. “Meta-Analysis of All-Cause Mortality According to Serum 25-Hydroxyvitamin D.” American Journal of Public Health 104 (8): e43-50.
Holick, M. F. 1981. “The Cutaneous Photosynthesis of Previtamin D3: A Unique Photoendocrine System.” The Journal of Investigative Dermatology 77 (1): 51–58.
Holick, Michael F. 2007. “Vitamin D Deficiency.” The New England Journal of Medicine 357 (3): 266–81.
Kim, Hyun Soo, Yeo Jin Kim, Su Ji Kim, Doo Seok Kang, Tae Ryong Lee, Dong Wook Shin, Hyoung-June Kim, and Young Rok Seo. 2019. “Transcriptomic Analysis of Human Dermal Fibroblast Cells Reveals Potential Mechanisms Underlying the Protective Effects of Visible Red Light against Damage from Ultraviolet B Light.” Journal of Dermatological Science 94 (2): 276–83.
Leon, Josefa, Dario Acuña-Castroviejo, Rosa M. Sainz, Juan C. Mayo, Dun Xian Tan, and Russel J. Reiter. 2004. “Melatonin and Mitochondrial Function.” Life Sciences. Elsevier Inc. https://doi.org/10.1016/j.lfs.2004.03.003.
Lindqvist, P. G., E. Epstein, K. Nielsen, M. Landin-Olsson, C. Ingvar, and H. Olsson. 2016. “Avoidance of Sun Exposure as a Risk Factor for Major Causes of Death: A Competing Risk Analysis of the Melanoma in Southern Sweden Cohort.” Journal of Internal Medicine 280 (4): 375–87.
Litonjua, Augusto A., Vincent J. Carey, Nancy Laranjo, Benjamin J. Harshfield, Thomas F. McElrath, George T. O’Connor, Megan Sandel, et al. 2016. “Effect of Prenatal Supplementation with Vitamin D on Asthma or Recurrent Wheezing in Offspring by Age 3 Years: The VDAART Randomized Clinical Trial.” JAMA: The Journal of the American Medical Association 315 (4): 362–70.
McCollum, E. V., Nina Simmonds, J. Ernestine Becker, and P. G. Shipley. 1922. “Studies on Experimental Rickets.” The Journal of Biological Chemistry 53 (2): 293–312.
Nakashima, Yuya, Shigeo Ohta, and Alexander M. Wolf. 2017. “Blue Light-Induced Oxidative Stress in Live Skin.” Free Radical Biology & Medicine 108 (July): 300–310.
Prietl, Barbara, Gerlies Treiber, Thomas R. Pieber, and Karin Amrein. 2013. “Vitamin D and Immune Function.” Nutrients 5 (7): 2502–21.
Sommer, Andrei P., Mike Kh Haddad, and Hans Jörg Fecht. 2015. “Light Effect on Water Viscosity: Implication for ATP Biosynthesis.” Scientific Reports 5 (July). https://doi.org/10.1038/srep12029.
Tan, Dun-Xian, Russel J. Reiter, Scott Zimmerman, and Ruediger Hardeland. 2023. “Melatonin: Both a Messenger of Darkness and a Participant in the Cellular Actions of Non-Visible Solar Radiation of near Infrared Light.” Biology 12 (1): 89.
Wacker, Matthias, and Michael F. Holick. 2013. “Sunlight and Vitamin D: A Global Perspective for Health: A Global Perspective for Health.” Dermato-Endocrinology 5 (1): 51–108.
West, Kathleen E., Michael R. Jablonski, Benjamin Warfield, Kate S. Cecil, Mary James, Melissa A. Ayers, James Maida, et al. 2011. “Blue Light from Light-Emitting Diodes Elicits a Dose-Dependent Suppression of Melatonin in Humans.” Journal of Applied Physiology (Bethesda, Md.: 1985) 110 (3): 619–26.
Wicks, Nadine L., Jason W. Chan, Julia A. Najera, Jonathan M. Ciriello, and Elena Oancea. 2011. “UVA Phototransduction Drives Early Melanin Synthesis in Human Melanocytes.” Current Biology: CB 21 (22): 1906.
Wimalawansa, Sunil J. 2023. “Infections and Autoimmunity-the Immune System and Vitamin D: A Systematic Review.” Nutrients 15 (17): 3842.
Yang, Ling, Marie Lof, Marit Bragelien Veierød, Sven Sandin, Hans-Olov Adami, and Elisabete Weiderpass. 2011. “Ultraviolet Exposure and Mortality among Women in Sweden.” Cancer Epidemiology, Biomarkers & Prevention: A Publication of the American Association for Cancer Research, Cosponsored by the American Society of Preventive Oncology 20 (4): 683–90.
- UV – aids in the production of vitamin D and melanin, but also causes DNA damage
-
@ 04c915da:3dfbecc9
2025-05-20 15:50:48For years American bitcoin miners have argued for more efficient and free energy markets. It benefits everyone if our energy infrastructure is as efficient and robust as possible. Unfortunately, broken incentives have led to increased regulation throughout the sector, incentivizing less efficient energy sources such as solar and wind at the detriment of more efficient alternatives.
The result has been less reliable energy infrastructure for all Americans and increased energy costs across the board. This naturally has a direct impact on bitcoin miners: increased energy costs make them less competitive globally.
Bitcoin mining represents a global energy market that does not require permission to participate. Anyone can plug a mining computer into power and internet to get paid the current dynamic market price for their work in bitcoin. Using cellphone or satellite internet, these mines can be located anywhere in the world, sourcing the cheapest power available.
Absent of regulation, bitcoin mining naturally incentivizes the build out of highly efficient and robust energy infrastructure. Unfortunately that world does not exist and burdensome regulations remain the biggest threat for US based mining businesses. Jurisdictional arbitrage gives miners the option of moving to a friendlier country but that naturally comes with its own costs.
Enter AI. With the rapid development and release of AI tools comes the requirement of running massive datacenters for their models. Major tech companies are scrambling to secure machines, rack space, and cheap energy to run full suites of AI enabled tools and services. The most valuable and powerful tech companies in America have stumbled into an accidental alliance with bitcoin miners: THE NEED FOR CHEAP AND RELIABLE ENERGY.
Our government is corrupt. Money talks. These companies will push for energy freedom and it will greatly benefit us all.
-
@ 6ad3e2a3:c90b7740
2025-05-20 13:49:50I’ve written about MSTR twice already, https://www.chrisliss.com/p/mstr and https://www.chrisliss.com/p/mstr-part-2, but I want to focus on legendary short seller James Chanos’ current trade wherein he buys bitcoin (via ETF) and shorts MSTR, in essence to “be like Mike” Saylor who sells MSTR shares at the market and uses them to add bitcoin to the company’s balance sheet. After all, if it’s good enough for Saylor, why shouldn’t everyone be doing it — shorting a company whose stock price is more than 2x its bitcoin holdings and using the proceeds to buy the bitcoin itself?
Saylor himself has said selling shares at 2x NAV (net asset value) to buy bitcoin is like selling dollars for two dollars each, and Chanos has apparently decided to get in while the getting (market cap more than 2x net asset value) is good. If the price of bitcoin moons, sending MSTR’s shares up, you are more than hedged in that event, too. At least that’s the theory.
The problem with this bet against MSTR’s mNAV, i.e., you are betting MSTR’s market cap will converge 1:1 toward its NAV in the short and medium term is this trade does not exist in a vacuum. Saylor has described how his ATM’s (at the market) sales of shares are accretive in BTC per share because of this very premium they carry. Yes, we’ll dilute your shares of the company, but because we’re getting you 2x the bitcoin per share, you are getting an ever smaller slice of an ever bigger overall pie, and the pie is growing 2x faster than your slice is reducing. (I https://www.chrisliss.com/p/mstr how this works in my first post.)
But for this accretion to continue, there must be a constant supply of “greater fools” to pony up for the infinitely printable shares which contain only half their value in underlying bitcoin. Yes, those shares will continue to accrete more BTC per share, but only if there are more fools willing to make this trade in the future. So will there be a constant supply of such “fools” to keep fueling MSTR’s mNAV multiple indefinitely?
Yes, there will be in my opinion because you have to look at the trade from the prospective fools’ perspective. Those “fools” are not trading bitcoin for MSTR, they are trading their dollars, selling other equities to raise them maybe, but in the end it’s a dollars for shares trade. They are not selling bitcoin for them.
You might object that those same dollars could buy bitcoin instead, so they are surely trading the opportunity cost of buying bitcoin for them, but if only 5-10 percent of the market (or less) is buying bitcoin itself, the bucket in which which those “fools” reside is the entire non-bitcoin-buying equity market. (And this is not considering the even larger debt market which Saylor has yet to tap in earnest.)
So for those 90-95 percent who do not and are not presently planning to own bitcoin itself, is buying MSTR a fool’s errand, so to speak? Not remotely. If MSTR shares are infinitely printable ATM, they are still less so than the dollar and other fiat currencies. And MSTR shares are backed 2:1 by bitcoin itself, while the fiat currencies are backed by absolutely nothing. So if you hold dollars or euros, trading them for MSTR shares is an errand more sage than foolish.
That’s why this trade (buying BTC and shorting MSTR) is so dangerous. Not only are there many people who won’t buy BTC buying MSTR, there are many funds and other investment entities who are only able to buy MSTR.
Do you want to get BTC at 1:1 with the 5-10 percent or MSTR backed 2:1 with the 90-95 percent. This is a bit like medical tests that have a 95 percent accuracy rate for an asymptomatic disease that only one percent of the population has. If someone tests positive, it’s more likely to be a false one than an indication he has the disease*. The accuracy rate, even at 19:1, is subservient to the size of the respective populations.
At some point this will no longer be the case, but so long as the understanding of bitcoin is not widespread, so long as the dollar is still the unit of account, the “greater fools” buying MSTR are still miles ahead of the greatest fools buying neither, and the stock price and mNAV should only increase.
. . .
One other thought: it’s more work to play defense than offense because the person on offense knows where he’s going, and the defender can only react to him once he moves. Similarly, Saylor by virtue of being the issuer of the shares knows when more will come online while Chanos and other short sellers are borrowing them to sell in reaction to Saylor’s strategy. At any given moment, Saylor can pause anytime, choosing to issue convertible debt or preferred shares with which to buy more bitcoin, and the shorts will not be given advance notice.
If the price runs, and there is no ATM that week because Saylor has stopped on a dime, so to speak, the shorts will be left having to scramble to change directions and buy the shares back to cover. Their momentum might be in the wrong direction, though, and like Allen Iverson breaking ankles with a crossover, Saylor might trigger a massive short squeeze, rocketing the share price ever higher. That’s why he actually welcomes Chanos et al trying this copycat strategy — it becomes the fuel for outsized gains.
For that reason, news that Chanos is shorting MSTR has not shaken my conviction, though there are other more pertinent https://www.chrisliss.com/p/mstr-part-2 with MSTR, of which one should be aware. And as always, do your own due diligence before investing in anything.
* To understand this, consider a population of 100,000, with one percent having a disease. That means 1,000 have it, 99,000 do not. If the test is 95 percent accurate, and everyone is tested, 950 of the 1,000 will test positive (true positives), 50 who have it will test negative (false negatives.) Of the positives, 95 percent of 99,000 (94,050) will test negative (true negatives) and five percent (4,950) will test positive (false positives). That means 4,950 out of 5,900 positives (84%) will be false.
-
@ b83a28b7:35919450
2025-05-16 19:26:56This article was originally part of the sermon of Plebchain Radio Episode 111 (May 2, 2025) that nostr:nprofile1qyxhwumn8ghj7mn0wvhxcmmvqyg8wumn8ghj7mn0wd68ytnvv9hxgqpqtvqc82mv8cezhax5r34n4muc2c4pgjz8kaye2smj032nngg52clq7fgefr and I did with nostr:nprofile1qythwumn8ghj7ct5d3shxtnwdaehgu3wd3skuep0qyt8wumn8ghj7ct4w35zumn0wd68yvfwvdhk6tcqyzx4h2fv3n9r6hrnjtcrjw43t0g0cmmrgvjmg525rc8hexkxc0kd2rhtk62 and nostr:nprofile1qyxhwumn8ghj7mn0wvhxcmmvqyg8wumn8ghj7mn0wd68ytnvv9hxgqpq4wxtsrj7g2jugh70pfkzjln43vgn4p7655pgky9j9w9d75u465pqahkzd0 of the nostr:nprofile1qythwumn8ghj7ct5d3shxtnwdaehgu3wd3skuep0qyt8wumn8ghj7etyv4hzumn0wd68ytnvv9hxgtcqyqwfvwrccp4j2xsuuvkwg0y6a20637t6f4cc5zzjkx030dkztt7t5hydajn
Listen to the full episode here:
<<https://fountain.fm/episode/Ln9Ej0zCZ5dEwfo8w2Ho>>
Bitcoin has always been a narrative revolution disguised as code. White paper, cypherpunk lore, pizza‑day legends - every block is a paragraph in the world’s most relentless epic. But code alone rarely converts the skeptic; it’s the camp‑fire myth that slips past the prefrontal cortex and shakes hands with the limbic system. People don’t adopt protocols first - they fall in love with protagonists.
Early adopters heard the white‑paper hymn, but most folks need characters first: a pizza‑day dreamer; a mother in a small country, crushed by the cost of remittance; a Warsaw street vendor swapping złoty for sats. When their arcs land, the brain releases a neurochemical OP_RETURN which says, “I belong in this plot.” That’s the sly roundabout orange pill: conviction smuggled inside catharsis.
That’s why, from 22–25 May in Warsaw’s Kinoteka, the Bitcoin Film Fest is loading its reels with rebellion. Each documentary, drama, and animated rabbit‑hole is a stealth wallet, zipping conviction straight into the feels of anyone still clasped within the cold claw of fiat. You come for the plot, you leave checking block heights.
Here's the clip of the sermon from the episode:
nostr:nevent1qvzqqqqqqypzpwp69zm7fewjp0vkp306adnzt7249ytxhz7mq3w5yc629u6er9zsqqsy43fwz8es2wnn65rh0udc05tumdnx5xagvzd88ptncspmesdqhygcrvpf2
-
@ 04c915da:3dfbecc9
2025-05-16 18:06:46Bitcoin has always been rooted in freedom and resistance to authority. I get that many of you are conflicted about the US Government stacking but by design we cannot stop anyone from using bitcoin. Many have asked me for my thoughts on the matter, so let’s rip it.
Concern
One of the most glaring issues with the strategic bitcoin reserve is its foundation, built on stolen bitcoin. For those of us who value private property this is an obvious betrayal of our core principles. Rather than proof of work, the bitcoin that seeds this reserve has been taken by force. The US Government should return the bitcoin stolen from Bitfinex and the Silk Road.
Using stolen bitcoin for the reserve creates a perverse incentive. If governments see bitcoin as a valuable asset, they will ramp up efforts to confiscate more bitcoin. The precedent is a major concern, and I stand strongly against it, but it should be also noted that governments were already seizing coin before the reserve so this is not really a change in policy.
Ideally all seized bitcoin should be burned, by law. This would align incentives properly and make it less likely for the government to actively increase coin seizures. Due to the truly scarce properties of bitcoin, all burned bitcoin helps existing holders through increased purchasing power regardless. This change would be unlikely but those of us in policy circles should push for it regardless. It would be best case scenario for American bitcoiners and would create a strong foundation for the next century of American leadership.
Optimism
The entire point of bitcoin is that we can spend or save it without permission. That said, it is a massive benefit to not have one of the strongest governments in human history actively trying to ruin our lives.
Since the beginning, bitcoiners have faced horrible regulatory trends. KYC, surveillance, and legal cases have made using bitcoin and building bitcoin businesses incredibly difficult. It is incredibly important to note that over the past year that trend has reversed for the first time in a decade. A strategic bitcoin reserve is a key driver of this shift. By holding bitcoin, the strongest government in the world has signaled that it is not just a fringe technology but rather truly valuable, legitimate, and worth stacking.
This alignment of incentives changes everything. The US Government stacking proves bitcoin’s worth. The resulting purchasing power appreciation helps all of us who are holding coin and as bitcoin succeeds our government receives direct benefit. A beautiful positive feedback loop.
Realism
We are trending in the right direction. A strategic bitcoin reserve is a sign that the state sees bitcoin as an asset worth embracing rather than destroying. That said, there is a lot of work left to be done. We cannot be lulled into complacency, the time to push forward is now, and we cannot take our foot off the gas. We have a seat at the table for the first time ever. Let's make it worth it.
We must protect the right to free usage of bitcoin and other digital technologies. Freedom in the digital age must be taken and defended, through both technical and political avenues. Multiple privacy focused developers are facing long jail sentences for building tools that protect our freedom. These cases are not just legal battles. They are attacks on the soul of bitcoin. We need to rally behind them, fight for their freedom, and ensure the ethos of bitcoin survives this new era of government interest. The strategic reserve is a step in the right direction, but it is up to us to hold the line and shape the future.
-
@ 4ba8e86d:89d32de4
2025-05-19 10:13:19DTails é uma ferramenta que facilita a inclusão de aplicativos em imagens de sistemas live baseados em Debian, como o Tails. Com ela, você pode personalizar sua imagem adicionando os softwares que realmente precisa — tudo de forma simples, transparente e sob seu controle total.
⚠️ DTails não é uma distribuição. É uma ferramenta de remasterização de imagens live.
Ela permite incluir softwares como:
✅ SimpleX Chat ✅ Clientes Nostr Web (Snort & Iris) ✅ Sparrow Wallet ✅ Feather Wallet ✅ Cake Wallet ✅ RoboSats ✅ Bisq ✅ BIP39 (Ian Coleman) ✅ SeedTool ... e muito mais. https://image.nostr.build/b0bb1f0da5a9a8fee42eacbddb156fc3558f4c3804575d55eeefbe6870ac223e.jpg
Importante: os binários originais dos aplicativos não são modificados, garantindo total transparência e permitindo a verificação de hashes a qualquer momento.
👨💻 Desenvolvido por: nostr:npub1dtmp3wrkyqafghjgwyk88mxvulfncc9lg6ppv4laet5cun66jtwqqpgte6
GitHub: https://github.com/DesobedienteTecnologico/dtails?tab=readme-ov-file
🎯 Controle total do que será instalado
Com o DTails, você escolhe exatamente o que deseja incluir na imagem personalizada. Se não marcar um aplicativo, ele não será adicionado, mesmo que esteja disponível. Isso significa: privacidade, leveza e controle absoluto.
https://image.nostr.build/b0bb1f0da5a9a8fee42eacbddb156fc3558f4c3804575d55eeefbe6870ac223e.jpg https://image.nostr.build/b70ed11ad2ce0f14fd01d62c08998dc18e3f27733c8d7e968f3459846fb81baf.jpg https://image.nostr.build/4f5a904218c1ea6538be5b3f764eefda95edd8f88b2f42ac46b9ae420b35e6f6.jpg
⚙️ Começando com o DTails
📦 Requisitos de pacotes
Antes de tudo, instale os seguintes pacotes no Debian:
``` sudo apt-get install genisoimage parted squashfs-tools syslinux-utils build-essential python3-tk python3-pil.imagetk python3-pyudev
```
🛠 Passo a passo
1 Clone o repositório:
``` git clone https://github.com/DesobedienteTecnologico/dtails cd dtails
```
2 Inicie a interface gráfica com sudo:
``` sudo ./dtails.py
```
Por que usar sudo? É necessário para montar arquivos .iso ou .img e utilizar ferramentas essenciais do sistema.
💿 Selecione a imagem Tails que deseja modificar
https://nostr.download/e3143dcd72ab6dcc86228be04d53131ccf33d599a5f7f2f1a5c0d193557dac6b.jpg
📥 Adicione ou remova pacotes
1 Marque os aplicativos desejados. 2 Clique Buildld para gerar sua imagem personalizada. https://image.nostr.build/5c4db03fe33cd53d06845074d03888a3ca89c3e29b2dc1afed4d9d181489b771.png
Você pode acompanhar todo o processo diretamente no terminal. https://nostr.download/1d959f4be4de9fbb666ada870afee4a922fb5e96ef296c4408058ec33cd657a8.jpg
💽 .ISO vs .IMG — Qual escolher?
| Formato | Persistência | Observações | | ------- | ---------------------- | ----------------------------------------------- | | .iso | ❌ Não tem persistência | Gera o arquivo DTails.iso na pasta do projeto | | .img | ✅ Suporta persistência | Permite gravar diretamente em um pendrive |
https://nostr.download/587fa3956df47a38b169619f63c559928e6410c3dd0d99361770a8716b3691f6.jpg https://nostr.download/40c7c5badba765968a1004ebc67c63a28b9ae3b5801addb02166b071f970659f.jpg
vídeo
https://www.youtube.com/live/QABz-GOeQ68?si=eYX-AHsolbp_OmAm
-
@ 04c915da:3dfbecc9
2025-05-16 17:59:23Recently we have seen a wave of high profile X accounts hacked. These attacks have exposed the fragility of the status quo security model used by modern social media platforms like X. Many users have asked if nostr fixes this, so lets dive in. How do these types of attacks translate into the world of nostr apps? For clarity, I will use X’s security model as representative of most big tech social platforms and compare it to nostr.
The Status Quo
On X, you never have full control of your account. Ultimately to use it requires permission from the company. They can suspend your account or limit your distribution. Theoretically they can even post from your account at will. An X account is tied to an email and password. Users can also opt into two factor authentication, which adds an extra layer of protection, a login code generated by an app. In theory, this setup works well, but it places a heavy burden on users. You need to create a strong, unique password and safeguard it. You also need to ensure your email account and phone number remain secure, as attackers can exploit these to reset your credentials and take over your account. Even if you do everything responsibly, there is another weak link in X infrastructure itself. The platform’s infrastructure allows accounts to be reset through its backend. This could happen maliciously by an employee or through an external attacker who compromises X’s backend. When an account is compromised, the legitimate user often gets locked out, unable to post or regain control without contacting X’s support team. That process can be slow, frustrating, and sometimes fruitless if support denies the request or cannot verify your identity. Often times support will require users to provide identification info in order to regain access, which represents a privacy risk. The centralized nature of X means you are ultimately at the mercy of the company’s systems and staff.
Nostr Requires Responsibility
Nostr flips this model radically. Users do not need permission from a company to access their account, they can generate as many accounts as they want, and cannot be easily censored. The key tradeoff here is that users have to take complete responsibility for their security. Instead of relying on a username, password, and corporate servers, nostr uses a private key as the sole credential for your account. Users generate this key and it is their responsibility to keep it safe. As long as you have your key, you can post. If someone else gets it, they can post too. It is that simple. This design has strong implications. Unlike X, there is no backend reset option. If your key is compromised or lost, there is no customer support to call. In a compromise scenario, both you and the attacker can post from the account simultaneously. Neither can lock the other out, since nostr relays simply accept whatever is signed with a valid key.
The benefit? No reliance on proprietary corporate infrastructure.. The negative? Security rests entirely on how well you protect your key.
Future Nostr Security Improvements
For many users, nostr’s standard security model, storing a private key on a phone with an encrypted cloud backup, will likely be sufficient. It is simple and reasonably secure. That said, nostr’s strength lies in its flexibility as an open protocol. Users will be able to choose between a range of security models, balancing convenience and protection based on need.
One promising option is a web of trust model for key rotation. Imagine pre-selecting a group of trusted friends. If your account is compromised, these people could collectively sign an event announcing the compromise to the network and designate a new key as your legitimate one. Apps could handle this process seamlessly in the background, notifying followers of the switch without much user interaction. This could become a popular choice for average users, but it is not without tradeoffs. It requires trust in your chosen web of trust, which might not suit power users or large organizations. It also has the issue that some apps may not recognize the key rotation properly and followers might get confused about which account is “real.”
For those needing higher security, there is the option of multisig using FROST (Flexible Round-Optimized Schnorr Threshold). In this setup, multiple keys must sign off on every action, including posting and updating a profile. A hacker with just one key could not do anything. This is likely overkill for most users due to complexity and inconvenience, but it could be a game changer for large organizations, companies, and governments. Imagine the White House nostr account requiring signatures from multiple people before a post goes live, that would be much more secure than the status quo big tech model.
Another option are hardware signers, similar to bitcoin hardware wallets. Private keys are kept on secure, offline devices, separate from the internet connected phone or computer you use to broadcast events. This drastically reduces the risk of remote hacks, as private keys never touches the internet. It can be used in combination with multisig setups for extra protection. This setup is much less convenient and probably overkill for most but could be ideal for governments, companies, or other high profile accounts.
Nostr’s security model is not perfect but is robust and versatile. Ultimately users are in control and security is their responsibility. Apps will give users multiple options to choose from and users will choose what best fits their need.
-
@ cae03c48:2a7d6671
2025-05-20 17:01:30Bitcoin Magazine
KULR Expands Bitcoin Treasury to $78M, Cites 220% BTC Yield YTDToday, KULR Technology Group, Inc. (NYSE American: KULR) announced a $9 million expansion of its Bitcoin Treasury, bringing total acquisitions to $78 million. The latest purchase was made at a weighted average price of $103,234 per bitcoin, bringing the company’s total holdings to 800.3 BTC.
$KULR has acquired 83.3 BTC for ~ 9 million To learn more about our acquistion and our Bitcoin Treasury Strategy, check out today's press release.https://t.co/vuQk90DCgh pic.twitter.com/KrW3E4e700
— KULR Technology (@KULRTech) May 20, 2025
The move follows KULR’s December 2024 strategy to allocate up to 90% of surplus cash reserves to bitcoin. Year-to-date, the company reports a BTC Yield of 220.2%, a proprietary performance metric reflecting growth in BTC holdings relative to assumed fully diluted shares outstanding.
In Q1 2025, KULR reported revenue of $2.45 million, a 40% increase driven by product sales totaling approximately $1.16 million. Gross margin declined to 8%, while combined cash and accounts receivable stood at $27.59 million. Operating expenses rose, with Selling, General and Administrative (SG&A) Expenses at $7.20 million and Research and Development (R&D) Expenses at $2.45 million, contributing to an operating loss of $9.44 million. Net loss widened to $18.81 million, mainly due to a mark-to-market adjustment on bitcoin holdings.
“2025 is a transformational year for KULR and the transformation is well on its way,” commented KULR CEO Michael Mo. “With over $100M in cash and Bitcoin holdings on our balance sheet as of the present day and virtually no debt, we are well capitalized to grow our battery and AI Robotics businesses, while our capital market activities in the foreseeable future are geared to turbocharge our Bitcoin acquisition strategy, establishing KULR as a pioneer BTC-First Bitcoin Treasury Company.”
CEO @michaelmokulr speaks about the origins of KULR’s Bitcoin treasury strategy and how it will shape the future of the company’s growth.
Watch here:$KULR pic.twitter.com/UTq3iKkF0u
— KULR Technology (@KULRTech) May 15, 2025
This surge in bitcoin holdings by companies like KULR and Metaplanet highlights a growing trend among firms embracing BTC as a core treasury asset, reflecting confidence in bitcoin’s long-term value and utility as part of broader financial strategies.
Last week, Metaplanet reported its strongest quarter to date for Q1 FY2025. Metaplanet’s bitcoin holdings rose to 6,796 BTC—a 3.9x increase year-to-date and over 5,000 BTC added in 2025 alone. Despite a temporary ¥7.4 billion valuation loss from a bitcoin price dip in March, the company rebounded with ¥13.5 billion in unrealized gains as of May 12. Since adopting the Bitcoin Treasury Standard, Metaplanet’s BTC net asset value has surged 103.1x, and its market cap has grown 138.1x.
This post KULR Expands Bitcoin Treasury to $78M, Cites 220% BTC Yield YTD first appeared on Bitcoin Magazine and is written by Oscar Zarraga Perez.
-
@ 04c915da:3dfbecc9
2025-05-16 17:51:54In much of the world, it is incredibly difficult to access U.S. dollars. Local currencies are often poorly managed and riddled with corruption. Billions of people demand a more reliable alternative. While the dollar has its own issues of corruption and mismanagement, it is widely regarded as superior to the fiat currencies it competes with globally. As a result, Tether has found massive success providing low cost, low friction access to dollars. Tether claims 400 million total users, is on track to add 200 million more this year, processes 8.1 million transactions daily, and facilitates $29 billion in daily transfers. Furthermore, their estimates suggest nearly 40% of users rely on it as a savings tool rather than just a transactional currency.
Tether’s rise has made the company a financial juggernaut. Last year alone, Tether raked in over $13 billion in profit, with a lean team of less than 100 employees. Their business model is elegantly simple: hold U.S. Treasuries and collect the interest. With over $113 billion in Treasuries, Tether has turned a straightforward concept into a profit machine.
Tether’s success has resulted in many competitors eager to claim a piece of the pie. This has triggered a massive venture capital grift cycle in USD tokens, with countless projects vying to dethrone Tether. Due to Tether’s entrenched network effect, these challengers face an uphill battle with little realistic chance of success. Most educated participants in the space likely recognize this reality but seem content to perpetuate the grift, hoping to cash out by dumping their equity positions on unsuspecting buyers before they realize the reality of the situation.
Historically, Tether’s greatest vulnerability has been U.S. government intervention. For over a decade, the company operated offshore with few allies in the U.S. establishment, making it a major target for regulatory action. That dynamic has shifted recently and Tether has seized the opportunity. By actively courting U.S. government support, Tether has fortified their position. This strategic move will likely cement their status as the dominant USD token for years to come.
While undeniably a great tool for the millions of users that rely on it, Tether is not without flaws. As a centralized, trusted third party, it holds the power to freeze or seize funds at its discretion. Corporate mismanagement or deliberate malpractice could also lead to massive losses at scale. In their goal of mitigating regulatory risk, Tether has deepened ties with law enforcement, mirroring some of the concerns of potential central bank digital currencies. In practice, Tether operates as a corporate CBDC alternative, collaborating with authorities to surveil and seize funds. The company proudly touts partnerships with leading surveillance firms and its own data reveals cooperation in over 1,000 law enforcement cases, with more than $2.5 billion in funds frozen.
The global demand for Tether is undeniable and the company’s profitability reflects its unrivaled success. Tether is owned and operated by bitcoiners and will likely continue to push forward strategic goals that help the movement as a whole. Recent efforts to mitigate the threat of U.S. government enforcement will likely solidify their network effect and stifle meaningful adoption of rival USD tokens or CBDCs. Yet, for all their achievements, Tether is simply a worse form of money than bitcoin. Tether requires trust in a centralized entity, while bitcoin can be saved or spent without permission. Furthermore, Tether is tied to the value of the US Dollar which is designed to lose purchasing power over time, while bitcoin, as a truly scarce asset, is designed to increase in purchasing power with adoption. As people awaken to the risks of Tether’s control, and the benefits bitcoin provides, bitcoin adoption will likely surpass it.
-
@ 0971cd37:53c969f4
2025-05-20 17:00:53ลดต้นทุนค่าไฟ เพิ่มความคุ้มค่าให้การขุด Bitcoin ที่บ้าน ในยุคที่ต้นทุนพลังงานสูงขึ้นอย่างต่อเนื่อง นักขุด Bitcoin ที่บ้าน หรือ Home Miner ต้องคิดให้รอบคอบก่อนเลือกเครื่องขุด เพราะ “แรงขุดสูงสุด” ไม่ได้แปลว่า “กำไรดีที่สุด” อีกต่อไป การเลือกเครื่องขุดไม่ใช่แค่ดูแค่แรงขุด (Hashrate) สูงสุดเท่านั้น แต่ต้องพิจารณาเรื่อง "การกินไฟ" และ "ความคุ้มค่าในการใช้งานระยะยาว" ด้วย ซึ่งสายหนึ่งที่ได้รับความนิยมมากขึ้นเรื่อย ๆ ก็คือ สาย Tuning Power หรือการจูนเครื่องขุดเพื่อให้ได้อัตราส่วน Hashrate/Watt ที่ดีที่สุด
เทรนด์ใหม่ของวงการขุดคือสาย Tuning Power หรือการปรับแต่งพลังงานของเครื่องขุด Bitcoin (ASIC) ให้ได้ ประสิทธิภาพ Hashrate ต่อการใช้พลังงาน (Efficiency) สูงที่สุด ซึ่งเหมาะอย่างยิ่งสำหรับการขุดในบ้านที่มีข้อจำกัดด้านค่าไฟ ความร้อน และ เสียงรบกวน
Tuning Power คืออะไร? Tuning Power คือการปรับลดแรงขุดของเครื่อง ASIC ลงเล็กน้อย เพื่อให้กินไฟน้อยลงแบบชัดเจน
ตัวอย่างเช่น Custom Firmware Braiins OS ใช้กับ Antminer S19jpro จากเดิมแรงขุด 104 TH/s กินไฟ 3,500W เมื่อปรับแต่งในส่วน Power Target จูนเหลือ 75 TH/s อาจกินไฟแค่ 1,600W-1,800W หลังจาก Tuning ค่าประสิทธิภาพ(Efficiency)ดีขึ้น เช่น จาก 32 J/TH เหลือเพียง 22–20 J/TH
หมายเหตุ: ค่า Efficiency ยิ่งต่ำ ยิ่งดี แปลว่าใช้พลังงานน้อยต่อ 1 TH
ทำไมต้อง Tuning Power? การจูนพลังงาน (Tuning Power) คือการปรับแต่งเครื่องขุด เช่น ASIC ให้ทำงานที่แรงขุดไม่เต็ม 100% แต่กินไฟน้อยลงอย่างชัดเจน ส่งผลให้:
- ประหยัดค่าไฟ โดยเฉพาะถ้าขุดในพื้นที่ต้นทุนพลังงานค่าไฟสูงหรือไม่มี TOU (Time of Use) และ เหมาะสำหรับผู้ใช้ไฟแบบ TOU ที่ค่าไฟกลางวัน ON-Peak แพง ต้องการขุดเลือกช่วงกลางคืนและวันหยุดเสาร์-อาทิตย์ และ วันหยุดราชการตามปกติ Off-Peak , ที่ใช้ระบบ Solar หรือมีระบบ Battery ต้องการประหยัดไฟ
- ลดความร้อนของเครื่อง ทำให้ยืดอายุการใช้งานและลดค่าใช้จ่ายด้าน ซำบำรุง ระบบระบายความร้อน
- เพิ่มความคุ้มค่า ในช่วงตลาดหมี ที่กำไรจากการขุดต่ำ การลดต้นทุนไฟฟ้าคือทางรอดหลัก
เครื่องขุด Bitcoin (ASIC) รุ่นไหน ที่เหมาะกับสาย Tuning Power
-
Antminer รองรับ Custom Firmware เช่น Braiins OS ที่เป็นยอดนิยมในการ Tuning Power
-
WhatsMiner M30-M60s Series ขึ้นไป ใช้โปรแกรม WhatsMinerTool เพื่อทำการ Tuning Power ได้โดยตรงไม่จำเป็นต้อง Custom Firmware
สรุป การเป็น Home Miner ที่ยั่งยืนไม่ได้ขึ้นกับว่าเครื่องขุดแรงแค่ไหน แต่ขึ้นกับว่า “จ่ายค่าไฟแล้วเหลือกำไรหรือไม่ หรือ จ่ายค่าไฟแล้วคุ้มค้ารายได้ Bitcoin จากการขุดจำนวนที่ได้รับมากขึ้นหรือไม่” การเลือกเครื่องขุดสำหรับสาย Tuning Power จึงเป็นทางเลือกที่ตอบโจทย์ผู้ที่ต้องการประสิทธิภาพสูงในต้นทุนที่ควบคุมได้โดยเฉพาะในยุคที่ตลาดผันผวน และ ค่าไฟฟ้าคือศัตรูตัวจริงของนักขุด
-
@ 57c631a3:07529a8e
2025-05-20 15:40:04The Video: The World's Biggest Toddler
https://connect-test.layer3.press/articles/3f9d28a4-0876-4ee8-bdac-d1a56fa9cd02
-
@ 04c915da:3dfbecc9
2025-05-16 17:12:05One of the most common criticisms leveled against nostr is the perceived lack of assurance when it comes to data storage. Critics argue that without a centralized authority guaranteeing that all data is preserved, important information will be lost. They also claim that running a relay will become prohibitively expensive. While there is truth to these concerns, they miss the mark. The genius of nostr lies in its flexibility, resilience, and the way it harnesses human incentives to ensure data availability in practice.
A nostr relay is simply a server that holds cryptographically verifiable signed data and makes it available to others. Relays are simple, flexible, open, and require no permission to run. Critics are right that operating a relay attempting to store all nostr data will be costly. What they miss is that most will not run all encompassing archive relays. Nostr does not rely on massive archive relays. Instead, anyone can run a relay and choose to store whatever subset of data they want. This keeps costs low and operations flexible, making relay operation accessible to all sorts of individuals and entities with varying use cases.
Critics are correct that there is no ironclad guarantee that every piece of data will always be available. Unlike bitcoin where data permanence is baked into the system at a steep cost, nostr does not promise that every random note or meme will be preserved forever. That said, in practice, any data perceived as valuable by someone will likely be stored and distributed by multiple entities. If something matters to someone, they will keep a signed copy.
Nostr is the Streisand Effect in protocol form. The Streisand effect is when an attempt to suppress information backfires, causing it to spread even further. With nostr, anyone can broadcast signed data, anyone can store it, and anyone can distribute it. Try to censor something important? Good luck. The moment it catches attention, it will be stored on relays across the globe, copied, and shared by those who find it worth keeping. Data deemed important will be replicated across servers by individuals acting in their own interest.
Nostr’s distributed nature ensures that the system does not rely on a single point of failure or a corporate overlord. Instead, it leans on the collective will of its users. The result is a network where costs stay manageable, participation is open to all, and valuable verifiable data is stored and distributed forever.
-
@ 04c915da:3dfbecc9
2025-05-15 15:31:45Capitalism is the most effective system for scaling innovation. The pursuit of profit is an incredibly powerful human incentive. Most major improvements to human society and quality of life have resulted from this base incentive. Market competition often results in the best outcomes for all.
That said, some projects can never be monetized. They are open in nature and a business model would centralize control. Open protocols like bitcoin and nostr are not owned by anyone and if they were it would destroy the key value propositions they provide. No single entity can or should control their use. Anyone can build on them without permission.
As a result, open protocols must depend on donation based grant funding from the people and organizations that rely on them. This model works but it is slow and uncertain, a grind where sustainability is never fully reached but rather constantly sought. As someone who has been incredibly active in the open source grant funding space, I do not think people truly appreciate how difficult it is to raise charitable money and deploy it efficiently.
Projects that can be monetized should be. Profitability is a super power. When a business can generate revenue, it taps into a self sustaining cycle. Profit fuels growth and development while providing projects independence and agency. This flywheel effect is why companies like Google, Amazon, and Apple have scaled to global dominance. The profit incentive aligns human effort with efficiency. Businesses must innovate, cut waste, and deliver value to survive.
Contrast this with non monetized projects. Without profit, they lean on external support, which can dry up or shift with donor priorities. A profit driven model, on the other hand, is inherently leaner and more adaptable. It is not charity but survival. When survival is tied to delivering what people want, scale follows naturally.
The real magic happens when profitable, sustainable businesses are built on top of open protocols and software. Consider the many startups building on open source software stacks, such as Start9, Mempool, and Primal, offering premium services on top of the open source software they build out and maintain. Think of companies like Block or Strike, which leverage bitcoin’s open protocol to offer their services on top. These businesses amplify the open software and protocols they build on, driving adoption and improvement at a pace donations alone could never match.
When you combine open software and protocols with profit driven business the result are lean, sustainable companies that grow faster and serve more people than either could alone. Bitcoin’s network, for instance, benefits from businesses that profit off its existence, while nostr will expand as developers monetize apps built on the protocol.
Capitalism scales best because competition results in efficiency. Donation funded protocols and software lay the groundwork, while market driven businesses build on top. The profit incentive acts as a filter, ensuring resources flow to what works, while open systems keep the playing field accessible, empowering users and builders. Together, they create a flywheel of innovation, growth, and global benefit.
-
@ cae03c48:2a7d6671
2025-05-20 16:55:46Bitcoin Magazine
Magic Eden Partners with Spark to Bring Fast, Cheap Bitcoin SettlementsMagic Eden is integrating with Spark to improve Bitcoin trading by addressing issues like slow transaction times, high fees, and poor user experience. According to a press release sent to Bitcoin Magazine, the integration will introduce a native settlement system aimed at making transactions faster and more cost-effective, without using bridges or synthetic assets.
Big day: @MagicEden is coming to Spark. New native Bitcoin experiences coming to you very soon.
Alpha → https://t.co/KPWZ7Ndagg pic.twitter.com/c4nSlhP3Rt
— Spark (@buildonspark) May 20, 2025
The integration will enable users to buy, sell, and earn Bitcoin-native assets more efficiently through Spark’s infrastructure, starting with support for stablecoin-to-BTC swaps and expanding to additional use cases over time.
Spark is built entirely on Bitcoin’s base layer. It provides transaction finality in under a second and fees below one cent.
“We’re proud to be betting on BTC DeFi,” said the CEO of Magic EdenJack Lu. “We’re going to lead the forefront of all Bitcoin DeFi to make BTC fast, fun, and for everyone with Magic Eden as the #1 BTC native app on-chain.”
Huge News: We're partnering with @buildonspark
Spark enables instant Bitcoin transactions, creating a fast and secure experience for everyone.
Get ready for a new wave of BTC-Defi
pic.twitter.com/FXmHfATnJz
— Magic Eden
(@MagicEden) May 20, 2025
The collaboration between Spark and Magic Eden will officially begin at BitGala on May 26th. At this event, they will host a joint gathering to mark their partnership and engage with the Bitcoin community. This event will also serve as the starting point for further integration, the development of new tools for developers, and expanded opportunities within the Bitcoin ecosystem.
“Spark is a completely agnostic protocol, it’s purpose-built for developers to create the next generation of financial applications,” said the CEO & Co-founder of Lightspark David Marcus. “We’re incredibly excited to see Magic Eden building the future of on-chain Bitcoin DeFi directly on Spark.”
This post Magic Eden Partners with Spark to Bring Fast, Cheap Bitcoin Settlements first appeared on Bitcoin Magazine and is written by Oscar Zarraga Perez.
-
@ a5ee4475:2ca75401
2025-05-19 01:11:59clients #link #list #english #article #finalversion #descentralismo
*These clients are generally applications on the Nostr network that allow you to use the same account, regardless of the app used, keeping your messages and profile intact.
**However, you may need to meet certain requirements regarding access and account NIP for some clients, so that you can access them securely and use their features correctly.
CLIENTS
Twitter like
- Nostrmo - [source] 🌐💻(🐧🪟🍎)🍎🤖(on zapstore)
- Coracle - Super App [source] 🌐🤖(on zapstore)
- Amethyst - Super App with note edit, delete and other stuff with Tor [source] 🤖(on zapstore)
- Primal - Social and wallet [source] 🌐🍎🤖(on zapstore)
- Iris - [source] 🌐🤖🍎
- Current - [source] 🤖🍎
- FreeFrom 🤖🍎
- Openvibe - Nostr and others (new Plebstr) [source] 🤖🍎
- Snort 🌐(🤖[early access]) [onion] [source]
- Damus 🍎 [source]
- Nos 🍎 [source]
- Nostur 🍎 [source]
- NostrBand 🌐 [info] [source]
- Yana [source] 🌐💻(🐧) 🍎🤖(on zapstore)
- Nostribe [on development] 🌐 [source]
- Lume 💻(🐧🪟🍎) [info] [source]
- Gossip - [source] 💻(🐧🪟🍎)
- noStrudel - Gamified Experience [onion] [info/source] 🌐
- [Nostrudel Next] - [onion]
- moStard - Nostrudel with Monero [onion] [info/source] 🌐
- Camelus - [source] 🤖 [early access]
Community
- CCNS - Community Curated Nostr Stuff [source]
- Nostr Kiwi [creator] 🌐
- Satellite [info] 🌐
- Flotilla - [source] 🌐🐧🤖(on zapstore)
- Chachi - [source] 🌐
- Futr - Coded in haskell [source] 🐧 (others soon)
- Soapbox - Comunnity server [info] [source] 🌐
- Ditto - Soapbox community server 🌐 [source] 🌐
- Cobrafuma - Nostr brazilian community on Ditto [info] 🌐
- Zapddit - Reddit like [source] 🌐
- Voyage (Reddit like) [on development] 🤖
Wiki
- Wikifreedia - Wiki Dark mode [source] 🌐
- Wikinostr - Wiki with tabs clear mode [source] 🌐
- Wikistr - Wiki clear mode [info] [source] 🌐
Search
- Keychat - Signal-like chat with AI and browser [source] 💻(🐧🪟🍎) - 📱(🍎🤖{on zapstore})
- Spring - Browser for Nostr apps and other sites [source] 🤖 (on zapstore)
- Advanced nostr search - Advanced note search by isolated terms related to a npub profile [source] 🌐
- Nos Today - Global note search by isolated terms [info] [source] 🌐
- Nostr Search Engine - API for Nostr clients [source]
- Ntrends - Trending notes and profiles 🌐
Website
- Nsite - Nostr Site [onion] [info] [source]
- Nsite Gateway - Nostr Site Gateway [source]
- Npub pro - Your site on Nostr [source]
App Store
ZapStore - Permitionless App Store [source] 🤖 💻(🐧🍎)
Video and Live Streaming
- Flare - Youtube like 🌐 [source]
- ZapStream - Lives, videos, shorts and zaps (NIP-53) [source] 🌐 🤖(lives only | Amber | on zapstore)
- Swae - Live streaming [source] (on development) ⏳
Post Aggregator - Kinostr - Nostr Cinema with #kinostr [english] [author] 🌐 - Stremstr - Nostr Cinema with #kinostr [english] [source] 📱 (on development) ⏳
Link Agreggator - Kinostr - #kinostr - Nostr Cinema Profile with links [English] - Equinox - Nostr Cinema Community with links [Portuguese]
Audio and Podcast Transmission
- Castr - Your npub as podcast feed [source]
- Nostr Nests - Audio Chats [source] 🌐
- Fountain - Podcast [source] 🤖🍎
- Corny Chat - Audio Chat [source] 🌐
Music
- Tidal - Music Streaming [source] [about] [info] 🤖🍎🌐
- Wavlake - Music Streaming [source] 🌐(🤖🍎 [early access])
- Tunestr - Musical Events [source] [about] 🌐
- Stemstr - Musical Colab (paid to post) [source] [about] 🌐
Images
- Lumina - Trending images and pictures [source] 🌐
- Pinstr - Pinterest like [source] 🌐
- Slidestr - DeviantArt like [source] 🌐
- Memestr - ifunny like [source] 🌐
Download and Upload
Documents, graphics and tables
- Mindstr - Mind maps [source] 🌐
- Docstr - Share Docs [info] [source] 🌐
- Formstr - Share Forms [info] 🌐
- Sheetstr - Share Spreadsheets [source] 🌐
- Slide Maker - Share slides 🌐 [Advice: Slide Maker https://zaplinks.lol/ site is down]
Health
- Sobrkey - Sobriety and mental health [source] 🌐
- Runstr - Running app [source] 🌐
- NosFabrica - Finding ways for your health data 🌐
- LazerEyes - Eye prescription by DM [source] 🌐
Forum
- OddBean - Hacker News like [info] [source] 🌐
- LowEnt - Forum [info] 🌐
- Swarmstr - Q&A / FAQ [info] 🌐
- Staker News - Hacker News like 🌐 [info]
Direct Messenges (DM)
- 0xchat 🤖🍎 [source]
- Nostr Chat 🌐🍎 [source]
- Blowater 🌐 [source]
- Anigma (new nostrgram) - Telegram based [on development] [source]
Reading
- Oracolo - A minimalist Nostr html blog [source]
- nRSS - Nostr RSS reader 🌐
- Highlighter - Insights with a highlighted read [info] 🌐
- Zephyr - Calming to Read [info] 🌐
- Flycat - Clean and Healthy Feed [info] 🌐
- Nosta - Check Profiles [on development] [info] 🌐
- Alexandria - e-Reader and Nostr Knowledge Base (NKB) [source] 🌐
Writing
- Habla - Blog [info] 🌐
- Blogstack - Blog [info]🌐
- YakiHonne - Articles and News [info] 🌐🍎🤖(on zapstore)
Lists
- Following - Users list [source] 🌐
- Nostr Unfollower - Nostr Unfollower
- Listr - Lists [source] 🌐
- Nostr potatoes - Movies List [source] 💻(numpy)
Market and Jobs
- Shopstr - Buy and Sell [onion] [source] 🌐
- Nostr Market - Buy and Sell 🌐
- Plebeian Market - Buy and Sell [source] 🌐
- Ostrich Work - Jobs [source] 🌐
- Nostrocket - Jobs [source] 🌐
Data Vending Machines - DVM (NIP90)
(Data-processing tools)
Games
- Chesstr - Chess 🌐 [source]
- Jestr - Chess [source] 🌐
- Snakestr - Snake game [source] 🌐
- Snakes on a Relay - Multiplayer Snake game like slither.io [source] 🌐
ENGINES - DEG Mods - Decentralized Game Mods [info] [source] 🌐 - NG Engine - Nostr Game Engine [source] 🌐 - JmonkeyEngine - Java game engine [source] 🌐
Customization
Like other Services
- Olas - Instagram like [source] 🌐🍎🤖(on zapstore)
- Nostree - Linktree like 🌐
- Rabbit - TweetDeck like [info] 🌐
- Zaplinks - Nostr links 🌐
- Omeglestr - Omegle-like Random Chats [source] 🌐
General Uses
- Njump - HTML text gateway source 🌐
- Filestr - HTML midia gateway [source] 🌐
- W3 - Nostr URL shortener [source] 🌐
- Playground - Test Nostr filters [source] 🌐
Places
- Wherostr - Travel and show where you are
- Arc Map (Mapstr) - Bitcoin Map [info]
Driver and Delivery
- RoadRunner - Uber like [on development] ⏱️
- Nostrlivery - iFood like [on development] ⏱️
⚠️ SCAM ⚠️ | Arcade City - Uber like [source]
OTHER STUFF
Lightning Wallets (zap)
- Alby - Native and extension [info] 🌐
- ZBD - Gaming and Social [info] [source] 🤖🍎
- Wallet of Satoshi - Simplest Lightning Wallet [info] 🤖🍎
- Minibits - Cashu mobile wallet [info] 🤖
- Blink - Opensource custodial wallet (KYC over 1000 usd) [source] 🤖🍎
- LNbits - App and extesion [source] 🤖🍎💻
- Zeus - [info] [source] 🤖🍎
Without Zap - Wassabi Wallet - Privacy-focused and non-custodial with Nostr Update Manager [source]
Exchange
Media Server (Upload Links)
audio, image and video
Connected with Nostr (NIP):
- Nostr Build - Free and paid Upload [info] [source] 🌐
- NostrMedia - Written in Go with Nip 96 / Blossom (free and paid) [info] [source]
- Nostr Check - [info] [source] 🌐
- NostPic - [info] [source] 🌐
- Sovbit - Free and paid upload [info] [source] 🌐
- Voidcat - Nip-96 and Blossom [source] 🌐
- Primal Media - Primal Media Uploader [source] 🌐
Blossom - Your Media Safer
- Primal Blossom 🌐
- NostrBuild Blossom - Free upload (max 100MiB) and paid [info] [source] 🌐
Paid Upload Only
- Satellite CDN - prepaid upload (max 5GB each) [info] [source] 🌐
Without Nostr NIP:
- Pomf - Upload larger videos (max 1GB) [source]
- Catbox - max 200 MB [source]
- x0 - max 512 MiB [source]
Donation and payments
- Zapper - Easy Zaps [source] 🌐
- Autozap [source] 🌐
- Zapmeacoffee 🌐
- Nostr Zap 💻(numpy)
- Creatr - Creators subscription 🌐
- Geyzer - Crowdfunding [info] [source] 🌐
- Heya! - Crowdfunding [source]
Security
- Secret Border - Generate offline keys 💻(java)
- Umbrel - Your private relay [source] 🌐
Key signing/login and Extension
- Amber - Key signing [source] 🤖(on zapstore)
- Nowser - Account access keys 📱(🤖🍎) 💻(🐧🍎🪟)
- Nos2x - Account access keys 🌐
- Nsec.app 🌐 [info]
- Lume - [info] [source] 🐧🪟🍎
- Satcom - Share files to discuss - [info] 🌐
- KeysBand - Multi-key signing [source] 🌐
Code
- Stacks - AI Templates [info] [source] 🌐
- Nostrify - Share Nostr Frameworks 🌐
- Git Workshop (github like) [experimental] 🌐
- Gitstr (github like) [on development] ⏱️
- Osty [on development] [info] 🌐
- Python Nostr - Python Library for Nostr
- Sybil - Creating, managing and test Nostr events [on development] ⏱️
Relay Check and Cloud
- Nostr Watch - See your relay speed 🌐
- NosDrive - Nostr Relay that saves to Google Drive
Bidges and Getways
- Matrixtr Bridge - Between Matrix & Nostr
- Mostr - Between Nostr & Fediverse
- Nostrss - RSS to Nostr
- Rsslay - Optimized RSS to Nostr [source]
- Atomstr - RSS/Atom to Nostr [source]
Useful Profiles and Trends
nostr-voice - Voice note (just some clients)
NOT RELATED TO NOSTR
Voca - Text-to-Speech App for GrapheneOS [source] 🤖(on zapstore)
Android Keyboards
Personal notes and texts
Front-ends
- Nitter - Twitter / X without your data [source]
- NewPipe - Youtube, Peertube and others, without account & your data [source] 🤖
- Piped - Youtube web without you data [source] 🌐
Other Services
- Brave - Browser [source]
- DuckDuckGo - Search [source]
- LLMA - Meta - Meta open source AI [source]
- DuckDuckGo AI Chat - Famous AIs without Login [source]
- Proton Mail - Mail [source]
Other open source index: Degoogled Apps
Some other Nostr index on:
-
@ cae03c48:2a7d6671
2025-05-20 16:44:24Bitcoin Magazine
Tribalism Is Not The Core ProblemThe United States government stands mere months, if not weeks, from the passing of stablecoin legislation that will set the playing field for the global economy for decades, if not centuries, to come.
During this crucial moment, in which we should all be keeping our eyes locked with precision on the prize, the best and brightest defenders of the one neutral digital asset have once again bifurcated into the trenches of “Us. Vs Them.” As sure as the next block, seemingly every ten minutes there’s another attempt from a faction within the group to imbue an intense ethical intention over the invention of Bitcoin. These groups converge to share interpretations of the Sacred Text –– Satoshi’s Whitepaper ––or pour over his forum posts on BitcoinTalk, hoping to find a path forward. It seems without fail, no matter when looking at the factional Part, or the amorphous Whole, the selected writings of Bitcoin’s inventor always conveniently enable the exact behavior and optionality –– or lack thereof –– that is best for the current arguing party.
This is to say, the observer of Bitcoin, when attempting to gain influence over more users, simply projects and amplifies their own reflection upon the monetary protocol, as it relates to their own position via their specific stake within the system. There is no neutral reflection or position to be expressed –– every voice and every idea fundamentally must come from a place of origin. While many attempt to go to great lengths to curb this bias from their publicly articulated analysis –– not to mention the many more that could claim ignorance entirely –– whether you are able, willing, or aware, your beliefs are beheld by the context you witness, and cannot be separated to create an objective meaning from a subjective experience. In short, everyone talks their own book. It’s a requirement to talking.
On today’s social media platforms, the actualization of one talking their book is even further manipulated beyond strictly fundamental financial incentives, and each idea becomes a piece of content competing for air in the rough seas of algorithmic influence. To not have an opinion on the latest thing, to not express and articulate said opinion publicly, is to drown in the void of irrelevancy. On Twitter, a Bluecheck raft is seen as a necessity, normalized by the supposed dissidents and mainstream alike. The digital front, while an important one, has been eroded not by the proverbial stick, but by the poisoned carrot. Payouts, likes, and followers have replaced credibility as the currency of relevance, not due to actions by the consumers, but by the creators. Even worse, many creators have off-shored their creative capabilities –– i.e., their ideas –– to AI Chat Bots and Large Language Models, removing the humanity entirely from the output, rendering the content ocean littered with homogenous globs of unthought thoughts. The late-stage creator economy has ultimately failed to promote originality, and instead has given rise to an multi-headed hydra of next-up influencers ready and able to churn out the freshest of ChatGPT chum at the behest of curtained algorithmic masters out of sight.
The unseen incentives will be our downfall –– not our ideologies, not our intellect, and not our preparedness, nor the lack of any of these things. While applicable to many mediums and masteries, the hidden incentives of programmable money demonstrate this concept far greater than, say, independent media figures, fitness and health gurus, or dissident philosophers.
Today’s Bitcoin culture war comes at a dangerous time, when the single greatest threat to its neutrality of incentives comes to the protocol layer. While hours and hours of podcasts from both sides of the divorce might lead you to believe this attack vector comes from JPEGs or the filters that discourage them, in fact, the imminent corrupting agent comes from the reintroduction of dollar stablecoins to the blockchain as Bitcoin itself remains infeasible as a medium of exchange that can service billions.
Both sides of the debate, the Knots/Pro-Filters or the Core/Filters-Agnostics, are not dealing with the core of the real problem brewing in Bitcoin today. The Knotsians claim all non-monetary use cases of Bitcoin are against the nature of the protocol, while remaining absolutely silent on whether or not these same ethics are to be applied to Tether’s homecoming –– “Bitcoin-native” USDT dollar stablecoins via Taproot Assets –– being stored in the distributed database known as the blockchain. The Core defenders, who claim to rightfully stand beside the most ambitious and successful open source project of all time, have little to say about the maintainers lack of interest in pursuing optionality that would enable billions of users to benefit from Bitcoin’s disinflationary monetary policy, rather than simply the millions of already-adopters. Both sides are, at best, silent partners in the scaling-by-financialization of Bitcoin via stocks and debt-instruments, custodians, exchange traded funds, and tokenized dollars, rather than by making UTXO ownership feasible and efficient. Filters, spam, Core, Knots, are all distractions from the real problem brewing on the horizon: the incentive distortion of stablecoins.
If Bitcoin remains programmable money, and the mere existence of this protocol-level debate perpetuates the idea that ossification has not yet arrived, why must we pledge allegiance between two teams that directly serve neither of the issues at hand? Bitcoin deserves more client optionality, and Knots is not innately a bad idea, nor are many of the mining concepts marketed by OCEAN employees. Bitcoin Core has secured trillions of dollars of value with an unparalleled up-time for a financial protocol. But Bitcoin will fail to stablecoins, inadvertently perpetuating the United States’ Treasury ponzi across the globe, while introducing dollarized, perverse incentives to the entire game theory of Bitcoin’s block production –– and thus unstoppable transaction settlement –– if we are slothful and distracted in failing to maximize self-custody and keep dollar tokens off the only currently-decentralized chain.
Did inscriptions create a newly-found demand for blockspace that directly competes with the companies enabling Larry Fink’s vision for Bitcoin as “a technology for asset storage?” Do Dickbutts and Monkey JPEGs make the Tether-ification –– i.e., the dollarization –– of Bitcoin more expensive? Perhaps. But there is simply no evidence that the players on either side of this culture war are actively or willingly compromised, and to suggest such is a dangerous game.
As we wrote nearly two years ago in a previous call to action, “the network must remain practically useful for anyone, or it risks becoming practically useless for everyone.” The only responsibility today’s Bitcoiner must uphold is to leave the protocol as permissionless and as serviceable as it was when they found it. Part of this innately involves the mission Core sets out to achieve with its tireless approach to perpetuating an extremely complicated, novel piece of software across an ever-changing landscape of hardware and software updates. Part of this, also, innately involves the mission Knots and OCEAN attempts to achieve with its pursuit of purity of financial activity and mining decentralization via block construction and payout methods.
Blindly opposing or supporting the Current Thing because of Twitter posts and podcasts will not deliver us from the known evils, nor prepare us for the unknown. Ultimately, both paths forward on their own will fail to achieve the promise of Bitcoin to its fullest extent.
Reject the binary presented by the culture war and think for yourself.
This is a guest post by Mark Goodwin. Opinions expressed are entirely their own and do not necessarily reflect those of BTC, Inc. or Bitcoin Magazine_._
This post Tribalism Is Not The Core Problem first appeared on Bitcoin Magazine and is written by Mark Goodwin.
-
@ 58537364:705b4b85
2025-05-20 14:22:05Ikigai means "the meaning of life" or "the reason for being." Why were we born? What are we living for? When work is not seen as something separate from life.
The Japanese believe that everyone has their own ikigai. Those who discover it find meaning and value in life, leading to greater happiness, better moods, and a more fulfilling world.
Today, there are many books about ikigai, but the first one written by a Japanese author is:
“The Little Book of Ikigai: The Secret Japanese Way to Live a Happy and Long Life” by Ken Mogi (Thai translation by Wuttichai Krisanaprakankit)
Come explore the true world of ikigai through this Japanese neuroscientist’s insights, conveyed through conversations that challenge the idea of ikigai as something grand—showing instead that it starts with small personal joys.
Ken Mogi says that Jiro Ono, a 94-year-old sushi chef who still makes sushi today, was his inspiration for writing the book.
This sushi chef did not start the job out of passion or talent—but he dedicated every piece of sushi to bring happiness to his customers. That, Ken says, is the essence of ikigai.
Strangely, the word “ikigai” is not often used in daily conversations in Japan.
Because it’s something so natural that it doesn’t need to be said. In today’s world, we often talk about how to succeed, how to get promoted, how to become a CEO. But for the Japanese, success isn’t everything.
For example, many Japanese people are deeply passionate about hobbies or have kodawari. Others might not care what those hobbies are—as long as the person seems happy, that’s enough. Some are obsessed with trains, manga, or anime. These people don’t need fame or recognition from society. If they’re happy in their own way, that’s perfectly okay.
Kodawari means a deep dedication or meticulous attention to something. For example, someone obsessed with stationery might spend a lot of time selecting the perfect pens, notebooks, or pencils. They’ll research, analyze, and experiment to find the tools they love most.
Everyone’s ikigai can be different, because people value different things and live differently.
Ikigai is about diversity. Japanese society encourages children to discover their own ikigai. They don’t tell kids to pursue jobs only because they pay well. If you ask students what jobs they want, they rarely say it’s about money first.
Ikigai is not the same as "success." The Japanese know that life isn’t just about being successful. Ikigai matters more. You could be successful but lack ikigai. Conversely, you might not be “successful” but still have ikigai—and you might be happier.
Ken Mogi defines success as something society acknowledges and rewards. But ikigai comes from your own heart and personal happiness. Others may not recognize it as success, but that doesn’t matter.
Ikigai is personal. We can be happy in our own way. We don’t judge others’ happiness—let them find joy in their own path.
The key to ikigai is finding small moments of happiness, even from little things. For example, when Ken was a child, he loved studying butterflies. Now, when he’s out jogging and sees a beautiful butterfly, he feels ikigai. Or sometimes, it comes from small amusing moments—like hearing a child tell his dad, “Dad, you have to do it this way!”
So, if we want to find our own ikigai, where do we start? Start with noticing small pleasures in daily life. That’s the easiest place to begin.
In the brain, there's a chemical called dopamine. When we achieve even small things, dopamine is released, creating happiness. That’s why enjoying small things is so important.
For some, ikigai might seem hard to grasp—especially if life is difficult, if they feel hopeless or lack self-worth. So begin with tiny moments of joy.
Is it the same as positive thinking? Ikigai is a part of that. But when we talk about “positive thinking,” it can feel like pressure to some people. So instead, just notice small joys: making your morning coffee, running in the rain.
Lessons from Ken Mogi:
-
Ikigai is not about chasing success or wealth, but about feeling happiness in your own life, which gives your life personal meaning.
-
Ikigai is not defined by society. Everyone’s ikigai is different. Each person can be happy in their own way.
-
**Don’t judge or force others—**children, partners—to live how you think is right. Respect diversity.
-
Smile at people who are enjoying their ikigai, and support them if they struggle.
-
Ikigai exists on two levels:
-
Big ikigai: life purpose or work values.
-
Small ikigai: tiny joys in everyday life.
-
Ikigai starts with noticing small pleasures today.
Source: From the Cloud of Thoughts column An interview by Ajarn Katewadi from Marumura with Ken Mogi, author of the first Japanese book on ikigai.
-
-
@ 6ad3e2a3:c90b7740
2025-05-20 13:44:28I https://www.chrisliss.com/p/mstr a few months ago with the subtitle “The Only Stock,” and I’m starting to regret it. Now, it was trading at 396 on January 20 when I posted it and 404 now (even if it dipped 40 percent to 230 or so in between), but that’s not why I regret it. I pointed out it was not investable unless you’re willing to stomach large drawdowns, and anyone who bought then could exit with a small profit now had they not panic-sold along the way.
The reason I regret it is I don’t want to make public stock predictions because it adds stress to my life. I have not sold any of my shares yet, but something I’ve noticed recently has got me thinking about it, and stock tips are like a game of telephone wherein whoever is last in the chain might find out the wrong information and too late. And while every adult has agency and is responsible for his own financial decisions, I don’t want my readers losing money on account of anything I write.
My base case is still that MSTR becomes a trillion-dollar company, destroys the performance of the S&P, the Mag-7 and virtually any other equity portfolio most people would assemble. Michael Saylor is trading an infinitely-printable asset (his shares) for humanity’s best-ever, finite-supply digital gold, and that trade should be profitable for him and his shareholders in perpetuity.
I don’t know exactly what he plans to do when that trade is no longer available to him — either because no one takes fiat currency for bitcoin anymore or because his mNAV (market-cap-to-bitcoin-holding ratio) goes below one — but that’s not my main concern, either. At that point he’ll have so much bitcoin, he’ll probably become the world’s first and largest bitcoin bank and profit by making his pristine collateral available to individuals and institutions. Even at five percent interest, half a trillion in bitcoin would yield $25B in profits every year. Even at a modest 10x valuation, the stock would more than double from here.
I am also not overly concerned with Saylor’s present amount of convertible debt which is at low or zero rates and is only https://www.strategy.com/. He’s been conservative on that front and only issuing on favorable terms. I don’t doubt Saylor’s prescience, intelligence or business sense one bit.
What got me thinking were some Twitter posts by a former Salomon Brothers trader/prophet Josh Mandell https://x.com/JoshMandell6/status/1921597739458339193 recently. In November when bitcoin was mooning after the election, he predicted that on March 14th it would close at $84,000, and if it did it would then go on an epic run up to $444,000 this cycle.
A lot of people make predictions, a few of them come true, but rarely do they come true on the dot (it closed at exactly $84K according to some exchanges) and on such a specific timeframe. Now, maybe he just got lucky, or maybe he is a skilled trader who made one good prediction, but the reason he gave for his prediction, insofar as he gave one, was not some technical chart or quantitative analysis, but a memory he had from 30 years ago that got into his mind that he couldn’t shake. He didn’t get much more specific than that, other than that he was tuned into something that if he explained fully would make too many people think he had gone insane. And then the prediction came true on the dot months later.
Now I believe in the paranormal more than the average person. I do not think things are random, and insofar as they appear that way it’s only because we have incomplete information — even a coin toss is predictable if you knew the exact force and spin that was put on the coin. I think for whatever reason, this guy is plugged into something, and while I would never invest a substantial amount of money on that belief — not only are earnestly-made prophecies often delusions or even if correct wrongly interpreted — that he sold makes me think.
He gave more substantive reasons for selling than prophecy, by the way — he seems to think Saylor’s perpetual issuance of shares ATM (at the market) to buy more bitcoin is putting too much downward pressure on the stock. Obviously, selling shares — even if to buy the world’s most pristine collateral at a 2x-plus mNAV — reduces the short-term appreciation of those shares.
His thesis seems to be that Saylor is doing this even if he would be better off letting the price appreciate more, attracting more investors, squeezing more shorts, etc because he needs to improve his credit rating to tap into the convertible debt market to the extent he has promised ($42 billion more over the next few years) at favorable terms. But in doing this, he is souring common stock investors because they are not seeing the near-term appreciation they should on their holdings.
Now this is a trivial concern if over the long haul MSTR does what it has the last couple years which is to outperform by a wide margin not only every large cap stock and the S&P but bitcoin itself. And the bigger his stack of bitcoin, the more his stock should appreciate as bitcoin goes up. But markets do not operate linearly and rationally. Should he sour prospective buyers to a great enough extent, should he attract shorts (and supply them with available shares to borrow) to a great enough extent, perhaps there might be an mNAV-crushing cascade that drives people into other bitcoin treasury companies, ETFs or bitcoin itself.
Now Saylor as first mover and by far the largest publicly-traded treasury company has a significant advantage. Institutions are far less likely to invest in size in smaller treasury companies with shorter track records, and many of them are not allowed to invest in ETFs or bitcoin at all. And even if a lot of money did go into any of those vehicles, it would only drive the value of his assets up and hence his stock price, no matter the mNAV. But Josh Mandell sold his shares prior to a weekend where bitcoin went from 102K to 104K, the US announced a deal with China, the mag-7 had a big spike (AAPL was up 6.3 percent) and then MSTR’s stock went down from 416 to 404. As I said, he is on to something.
So what’s the real long-term risk? I don’t know. Maybe there’s something about the nature of bitcoin that long-term is not really amenable to third-party custody and administration. It’s a bearer asset (“not your keys, not your coins”), and introducing counterparty risk is antithetical to its core purpose, the separation of money and state, or in this case money and bank.
With the bitcoin network you can literally “be your own bank.” To transact in digital dollars you need a bank account — or at least a stable coin one mediated by a centralized entity like Tether. You can’t hold digital dollars in your mind via some memorized seed words like you can bitcoin, accessible anywhere in the world, the ledger of which is maintained by tens of thousands of individually-run nodes. This property which democratizes value storage in the way gold did, except now you can wield your purchasing power globally, might be so antithetical to communal storage via corporation or bank that doing so is doomed to catastrophe.
We’ve already seen this happen with exchanges via FTX and Mt. Gox. Counterparty risk is one of the problems bitcoin was created to solve, so moving that risk from a fractionally reserved international banking system to corporate balance sheets still very much a part of that system is probably not the seismic advancement integral to the technology’s promise.
But this is more of a philosophical concern rather than a concrete one. To get more specific, it’s easy to imagine Coinbase, if indeed that’s where MSTR custodies its coins, gets hacked or https://www.chrisliss.com/p/soft-landing, i.e., seized by an increasingly desperate and insolvent government. Or maybe Coinbase simply doesn’t have the coins it purports like FTX, or a rogue band of employees, working on behalf of some powerful faction for “https://www.chrisliss.com/national-security-and-public-healt” executes the rug pull. Even if you deem these scenarios unlikely, they are not unfathomable.
Beyond outright counterparty malfeasance, there are other risks — what if owning common stock in an enterprise that simply holds bitcoin falls out of favor? Imagine if some new individual custody solution emerges wherein you have direct access to the coins themselves in an “even a boomer can do this” kind of way wherein there’s no compelling reason to own common stock with its junior claims to the capital stack in the event of insolvency? Why stand in line behind debt holders and preferred shares when you can invest in something that’s directly withdrawable and accessible if world events spike volatility to a systemic breaking point?
Things need not even get that rocky for this to be a concern — just the perception that they might could spook people into realizing common stock of a corporate balance sheet might be less than ideal as your custody solution.
Moreover, Saylor himself presents some risk. He could be compromised or blackmailed, he could lose his cool or get into an accident. These are low-probability scenarios, but also not unfathomable as any single point of failure is a target, especially for those factions who stand to lose unimaginable wealth and power should his speculative attack on the system succeed at scale.
Finally, even if Saylor remains free to operate as he sees fit, there is what I’d call the Icarus risk — he might be too ambitious, too hell-bent on acquiring bitcoin at all costs, too much of a maniac in service of his vision. Remember, he initially bought bitcoin during the covid crash and concomitant massive money print upon his prescient realization that businesses providing goods and services couldn’t possibly keep pace with inflation over the long haul. He was merely playing defense to preserve his capital, and now, despite his sizable lead and secured position is still throwing forward passes in the fourth quarter rather than running out the clock and securing the W.
Saylor is now arguably less a bitcoin maximalist and advocate, articulately making the case for superior money and individual sovereignty, but a corporate titan hell-bent on world domination via apex-predator-status balance sheet. When is enough enough? Many of the greatest conquerors in history pushed their empires too far until they fractured. In fact, 25 years ago MSTR was a big winner before the dot-com crash during which its stock price and most of Saylor’s fortune were wiped out when he was sued by the SEC for accounting fraud (he subsequently settled).
Now it’s possible, he learned from that experience, got up off the mat and figured out how to avoid his youthful mistakes. But it’s also possible his character is such that he will repeat it again, only this time at scale.
But as I said, my base case is MSTR is a trillion-dollar market cap, and the stock runs in parallel with bitcoin’s ascendance over the next decade. Saylor has been https://www.strategy.com/, prescient, bold and responsible so far over this iteration. I view Mandell’s concerns as valid, but similar to Wall St’s ones about AMZN’s Jeff Bezos who relentlessly ignored their insistence on profitability for a decade as he plowed every dollar into building out productive capacity and turned the company into the $2T world-dominating retail giant it is now.
Again, I haven’t (yet) sold any of my shares or even call options. But because I posted about this in January I felt I should at least follow-up with a more detailed rundown of what I take to be the risks. As always, do your own due diligence with any prospective investment.
-
@ a5ee4475:2ca75401
2025-05-18 16:07:07ai #artificial #intelligence #english #tech
Open Source
Models
Text
Image
- SDAI FOSS - Stable Diffusion AI to Android [download] [source] 🤖
- Stable Diffusion - Text to image [source] 🌐
- Pixart Alpha - Photorealistic Text to Image Generation [source]
- Pixart Delta - Framework to Pixart Alpha [paper] [source]
- Pixart Sigma - 4K Text to Image Generation [source]
- OmniGen - Pompt, image or subject to image [source]
- Pigallery - Self-Hosted AI Image Generator [source]
Video
Tools
Lightning Based
- Animal Sunset - AI video generation with Nostr npub by lightning payments [source]
- Ai Rand - AI text generation with Pubky DNS by lightning payments [source]
- PlebAI - Text and Image generation without signup [source] 🌐🤖🍎 [sites down - only github available]
Others
- HuggingFace - Test and collaborate on models, datasets and apps. [source]
- DuckDuckGo AI Chat - Famous AIs without Login [source]
- Ollama - Run LLMs Locally [source]
- DreamStudio - Stable Diffusion’s Web App Tool [info] [source]
- Prompt Gallery - AI images with their prompts [source]
Closed Source
Models
Text
- ChatGPT
- Claude
- Gemini
- Copilot
- Maritalk - Text AI in Portuguese focused on Brazil with model Sabia-3 and the open source models Sabia-7b and Sabia-2 [source]
- Amazônia IA - Text AI in Portuguese focused on Brazil with the guara, hapia and golia models [source]
Image
Video
- Minimax - Realistic videos (prompts only in chinese)
Tools
Other index: Amazing AI
-
@ 08f96856:ffe59a09
2025-05-15 01:22:34เมื่อพูดถึง Bitcoin Standard หลายคนมักนึกถึงภาพโลกอนาคตที่ทุกคนใช้บิตคอยน์ซื้อกาแฟหรือของใช้ในชีวิตประจำวัน ภาพแบบนั้นดูเหมือนไกลตัวและเป็นไปไม่ได้ในความเป็นจริง หลายคนถึงกับพูดว่า “คงไม่ทันเห็นในช่วงชีวิตนี้หรอก” แต่ในมุมมองของผม Bitcoin Standard อาจไม่ได้เริ่มต้นจากการที่เราจ่ายบิตคอยน์โดยตรงในร้านค้า แต่อาจเริ่มจากบางสิ่งที่เงียบกว่า ลึกกว่า และเกิดขึ้นแล้วในขณะนี้ นั่นคือ การล่มสลายทีละน้อยของระบบเฟียตที่เราใช้กันอยู่
ระบบเงินที่อิงกับอำนาจรัฐกำลังเข้าสู่ช่วงขาลง รัฐบาลทั่วโลกกำลังจมอยู่ในภาระหนี้ระดับประวัติการณ์ แม้แต่ประเทศมหาอำนาจก็เริ่มแสดงสัญญาณของภาวะเสี่ยงผิดนัดชำระหนี้ อัตราเงินเฟ้อกลายเป็นปัญหาเรื้อรังที่ไม่มีท่าทีจะหายไป ธนาคารที่เคยโอนฟรีเริ่มกลับมาคิดค่าธรรมเนียม และประชาชนก็เริ่มรู้สึกถึงการเสื่อมศรัทธาในระบบการเงินดั้งเดิม แม้จะยังพูดกันไม่เต็มเสียงก็ตาม
ในขณะเดียวกัน บิตคอยน์เองก็กำลังพัฒนาแบบเงียบ ๆ เงียบ... แต่ไม่เคยหยุด โดยเฉพาะในระดับ Layer 2 ที่เริ่มแสดงศักยภาพอย่างจริงจัง Lightning Network เป็น Layer 2 ที่เปิดใช้งานมาได้ระยะเวลสหนึ่ง และยังคงมีบทบาทสำคัญที่สุดในระบบนิเวศของบิตคอยน์ มันทำให้การชำระเงินเร็วขึ้น มีต้นทุนต่ำ และไม่ต้องบันทึกทุกธุรกรรมลงบล็อกเชน เครือข่ายนี้กำลังขยายตัวทั้งในแง่ของโหนดและการใช้งานจริงทั่วโลก
ขณะเดียวกัน Layer 2 ทางเลือกอื่นอย่าง Ark Protocol ก็กำลังพัฒนาเพื่อตอบโจทย์ด้านความเป็นส่วนตัวและประสบการณ์ใช้งานที่ง่าย BitVM เปิดแนวทางใหม่ให้บิตคอยน์รองรับ smart contract ได้ในระดับ Turing-complete ซึ่งทำให้เกิดความเป็นไปได้ในกรณีใช้งานอีกมากมาย และเทคโนโลยีที่น่าสนใจอย่าง Taproot Assets, Cashu และ Fedimint ก็ทำให้การออกโทเคนหรือสกุลเงินที่อิงกับบิตคอยน์เป็นจริงได้บนโครงสร้างของบิตคอยน์เอง
เทคโนโลยีเหล่านี้ไม่ใช่การเติบโตแบบปาฏิหาริย์ แต่มันคืบหน้าอย่างต่อเนื่องและมั่นคง และนั่นคือเหตุผลที่มันจะ “อยู่รอด” ได้ในระยะยาว เมื่อฐานของความน่าเชื่อถือไม่ใช่บริษัท รัฐบาล หรือทุน แต่คือสิ่งที่ตรวจสอบได้และเปลี่ยนกฎไม่ได้
แน่นอนว่าบิตคอยน์ต้องแข่งขันกับ stable coin, เงินดิจิทัลของรัฐ และ cryptocurrency อื่น ๆ แต่สิ่งที่ทำให้มันเหนือกว่านั้นไม่ใช่ฟีเจอร์ หากแต่เป็นความทนทาน และความมั่นคงของกฎที่ไม่มีใครเปลี่ยนได้ ไม่มีทีมพัฒนา ไม่มีบริษัท ไม่มีประตูปิด หรือการยึดบัญชี มันยืนอยู่บนคณิตศาสตร์ พลังงาน และเวลา
หลายกรณีใช้งานที่เคยถูกทดลองในโลกคริปโตจะค่อย ๆ เคลื่อนเข้ามาสู่บิตคอยน์ เพราะโครงสร้างของมันแข็งแกร่งกว่า ไม่ต้องการทีมพัฒนาแกนกลาง ไม่ต้องพึ่งกลไกเสี่ยงต่อการผูกขาด และไม่ต้องการ “ความเชื่อใจ” จากใครเลย
Bitcoin Standard ที่ผมพูดถึงจึงไม่ใช่การเปลี่ยนแปลงแบบพลิกหน้ามือเป็นหลังมือ แต่คือการ “เปลี่ยนฐานของระบบ” ทีละชั้น ระบบการเงินใหม่ที่อิงอยู่กับบิตคอยน์กำลังเกิดขึ้นแล้ว มันไม่ใช่โลกที่ทุกคนถือเหรียญบิตคอยน์ แต่มันคือโลกที่คนใช้อาจไม่รู้ตัวด้วยซ้ำว่า “สิ่งที่เขาใช้นั้นอิงอยู่กับบิตคอยน์”
ผู้คนอาจใช้เงินดิจิทัลที่สร้างบน Layer 3 หรือ Layer 4 ผ่านแอป ผ่านแพลตฟอร์ม หรือผ่านสกุลเงินใหม่ที่ดูไม่ต่างจากเดิม แต่เบื้องหลังของระบบจะผูกไว้กับบิตคอยน์
และถ้ามองในเชิงพัฒนาการ บิตคอยน์ก็เหมือนกับอินเทอร์เน็ต ครั้งหนึ่งอินเทอร์เน็ตก็ถูกมองว่าเข้าใจยาก ต้องพิมพ์ http ต้องรู้จัก TCP/IP ต้องตั้ง proxy เอง แต่ปัจจุบันผู้คนใช้งานอินเทอร์เน็ตโดยไม่รู้ว่าเบื้องหลังมีอะไรเลย บิตคอยน์กำลังเดินตามเส้นทางเดียวกัน โปรโตคอลกำลังถอยออกจากสายตา และวันหนึ่งเราจะ “ใช้มัน” โดยไม่ต้องรู้ว่ามันคืออะไร
หากนับจากช่วงเริ่มต้นของอินเทอร์เน็ตในยุค 1990 จนกลายเป็นโครงสร้างหลักของโลกในสองทศวรรษ เส้นเวลาของบิตคอยน์ก็กำลังเดินตามรอยเท้าของอินเทอร์เน็ต และถ้าเราเชื่อว่าวัฏจักรของเทคโนโลยีมีจังหวะของมันเอง เราก็จะรู้ว่า Bitcoin Standard นั้นไม่ใช่เรื่องของอนาคตไกลโพ้น แต่มันเกิดขึ้นแล้ว
siamstr
-
@ 34f1ddab:2ca0cf7c
2025-05-16 22:47:03Losing access to your cryptocurrency can feel like losing a part of your future. Whether it’s due to a forgotten password, a damaged seed backup, or a simple mistake in a transfer, the stress can be overwhelming. Fortunately, cryptrecver.com is here to assist! With our expert-led recovery services, you can safely and swiftly reclaim your lost Bitcoin and other cryptocurrencies.
Why Trust Crypt Recver? 🤝 🛠️ Expert Recovery Solutions At Crypt Recver, we specialize in addressing complex wallet-related issues. Our skilled engineers have the tools and expertise to handle:
Partially lost or forgotten seed phrases Extracting funds from outdated or invalid wallet addresses Recovering data from damaged hardware wallets Restoring coins from old or unsupported wallet formats You’re not just getting a service; you’re gaining a partner in your cryptocurrency journey.
🚀 Fast and Efficient Recovery We understand that time is crucial in crypto recovery. Our optimized systems enable you to regain access to your funds quickly, focusing on speed without compromising security. With a success rate of over 90%, you can rely on us to act swiftly on your behalf.
🔒 Privacy is Our Priority Your confidentiality is essential. Every recovery session is conducted with the utmost care, ensuring all processes are encrypted and confidential. You can rest assured that your sensitive information remains private.
💻 Advanced Technology Our proprietary tools and brute-force optimization techniques maximize recovery efficiency. Regardless of how challenging your case may be, our technology is designed to give you the best chance at retrieving your crypto.
Our Recovery Services Include: 📈 Bitcoin Recovery: Lost access to your Bitcoin wallet? We help recover lost wallets, private keys, and passphrases. Transaction Recovery: Mistakes happen — whether it’s an incorrect wallet address or a lost password, let us manage the recovery. Cold Wallet Restoration: If your cold wallet is failing, we can safely extract your assets and migrate them into a secure new wallet. Private Key Generation: Lost your private key? Our experts can help you regain control using advanced methods while ensuring your privacy. ⚠️ What We Don’t Do While we can handle many scenarios, some limitations exist. For instance, we cannot recover funds stored in custodial wallets or cases where there is a complete loss of four or more seed words without partial information available. We are transparent about what’s possible, so you know what to expect
Don’t Let Lost Crypto Hold You Back! Did you know that between 3 to 3.4 million BTC — nearly 20% of the total supply — are estimated to be permanently lost? Don’t become part of that statistic! Whether it’s due to a forgotten password, sending funds to the wrong address, or damaged drives, we can help you navigate these challenges
🛡️ Real-Time Dust Attack Protection Our services extend beyond recovery. We offer dust attack protection, keeping your activity anonymous and your funds secure, shielding your identity from unwanted tracking, ransomware, and phishing attempts.
🎉 Start Your Recovery Journey Today! Ready to reclaim your lost crypto? Don’t wait until it’s too late! 👉 cryptrecver.com
📞 Need Immediate Assistance? Connect with Us! For real-time support or questions, reach out to our dedicated team on: ✉️ Telegram: t.me/crypptrcver 💬 WhatsApp: +1(941)317–1821
Crypt Recver is your trusted partner in cryptocurrency recovery. Let us turn your challenges into victories. Don’t hesitate — your crypto future starts now! 🚀✨
Act fast and secure your digital assets with cryptrecver.com.Losing access to your cryptocurrency can feel like losing a part of your future. Whether it’s due to a forgotten password, a damaged seed backup, or a simple mistake in a transfer, the stress can be overwhelming. Fortunately, cryptrecver.com is here to assist! With our expert-led recovery services, you can safely and swiftly reclaim your lost Bitcoin and other cryptocurrencies.
# Why Trust Crypt Recver? 🤝
🛠️ Expert Recovery Solutions\ At Crypt Recver, we specialize in addressing complex wallet-related issues. Our skilled engineers have the tools and expertise to handle:
- Partially lost or forgotten seed phrases
- Extracting funds from outdated or invalid wallet addresses
- Recovering data from damaged hardware wallets
- Restoring coins from old or unsupported wallet formats
You’re not just getting a service; you’re gaining a partner in your cryptocurrency journey.
🚀 Fast and Efficient Recovery\ We understand that time is crucial in crypto recovery. Our optimized systems enable you to regain access to your funds quickly, focusing on speed without compromising security. With a success rate of over 90%, you can rely on us to act swiftly on your behalf.
🔒 Privacy is Our Priority\ Your confidentiality is essential. Every recovery session is conducted with the utmost care, ensuring all processes are encrypted and confidential. You can rest assured that your sensitive information remains private.
💻 Advanced Technology\ Our proprietary tools and brute-force optimization techniques maximize recovery efficiency. Regardless of how challenging your case may be, our technology is designed to give you the best chance at retrieving your crypto.
Our Recovery Services Include: 📈
- Bitcoin Recovery: Lost access to your Bitcoin wallet? We help recover lost wallets, private keys, and passphrases.
- Transaction Recovery: Mistakes happen — whether it’s an incorrect wallet address or a lost password, let us manage the recovery.
- Cold Wallet Restoration: If your cold wallet is failing, we can safely extract your assets and migrate them into a secure new wallet.
- Private Key Generation: Lost your private key? Our experts can help you regain control using advanced methods while ensuring your privacy.
⚠️ What We Don’t Do\ While we can handle many scenarios, some limitations exist. For instance, we cannot recover funds stored in custodial wallets or cases where there is a complete loss of four or more seed words without partial information available. We are transparent about what’s possible, so you know what to expect
# Don’t Let Lost Crypto Hold You Back!
Did you know that between 3 to 3.4 million BTC — nearly 20% of the total supply — are estimated to be permanently lost? Don’t become part of that statistic! Whether it’s due to a forgotten password, sending funds to the wrong address, or damaged drives, we can help you navigate these challenges
🛡️ Real-Time Dust Attack Protection\ Our services extend beyond recovery. We offer dust attack protection, keeping your activity anonymous and your funds secure, shielding your identity from unwanted tracking, ransomware, and phishing attempts.
🎉 Start Your Recovery Journey Today!\ Ready to reclaim your lost crypto? Don’t wait until it’s too late!\ 👉 cryptrecver.com
📞 Need Immediate Assistance? Connect with Us!\ For real-time support or questions, reach out to our dedicated team on:\ ✉️ Telegram: t.me/crypptrcver\ 💬 WhatsApp: +1(941)317–1821
Crypt Recver is your trusted partner in cryptocurrency recovery. Let us turn your challenges into victories. Don’t hesitate — your crypto future starts now! 🚀✨
Act fast and secure your digital assets with cryptrecver.com.
-
@ b83a28b7:35919450
2025-05-16 19:23:58This article was originally part of the sermon of Plebchain Radio Episode 110 (May 2, 2025) that nostr:nprofile1qyxhwumn8ghj7mn0wvhxcmmvqyg8wumn8ghj7mn0wd68ytnvv9hxgqpqtvqc82mv8cezhax5r34n4muc2c4pgjz8kaye2smj032nngg52clq7fgefr and I did with nostr:nprofile1qythwumn8ghj7ct5d3shxtnwdaehgu3wd3skuep0qyt8wumn8ghj7ct4w35zumn0wd68yvfwvdhk6tcqyzx4h2fv3n9r6hrnjtcrjw43t0g0cmmrgvjmg525rc8hexkxc0kd2rhtk62 and nostr:nprofile1qyxhwumn8ghj7mn0wvhxcmmvqyg8wumn8ghj7mn0wd68ytnvv9hxgqpq4wxtsrj7g2jugh70pfkzjln43vgn4p7655pgky9j9w9d75u465pqahkzd0 of the nostr:nprofile1qythwumn8ghj7ct5d3shxtnwdaehgu3wd3skuep0qyt8wumn8ghj7etyv4hzumn0wd68ytnvv9hxgtcqyqwfvwrccp4j2xsuuvkwg0y6a20637t6f4cc5zzjkx030dkztt7t5hydajn
Listen to the full episode here:
<https://fountain.fm/episode/Ln9Ej0zCZ5dEwfo8w2Ho>
Bitcoin has always been a narrative revolution disguised as code. White paper, cypherpunk lore, pizza‑day legends - every block is a paragraph in the world’s most relentless epic. But code alone rarely converts the skeptic; it’s the camp‑fire myth that slips past the prefrontal cortex and shakes hands with the limbic system. People don’t adopt protocols first - they fall in love with protagonists.
Early adopters heard the white‑paper hymn, but most folks need characters first: a pizza‑day dreamer; a mother in a small country, crushed by the cost of remittance; a Warsaw street vendor swapping złoty for sats. When their arcs land, the brain releases a neurochemical OP_RETURN which says, “I belong in this plot.” That’s the sly roundabout orange pill: conviction smuggled inside catharsis.
That’s why, from 22–25 May in Warsaw’s Kinoteka, the Bitcoin Film Fest is loading its reels with rebellion. Each documentary, drama, and animated rabbit‑hole is a stealth wallet, zipping conviction straight into the feels of anyone still clasped within the cold claw of fiat. You come for the plot, you leave checking block heights.
Here's the clip of the sermon from the episode:
nostr:nevent1qvzqqqqqqypzpwp69zm7fewjp0vkp306adnzt7249ytxhz7mq3w5yc629u6er9zsqqsy43fwz8es2wnn65rh0udc05tumdnx5xagvzd88ptncspmesdqhygcrvpf2
-
@ 6ad3e2a3:c90b7740
2025-05-20 13:38:04When I was a kid, I wanted to be rich, but found the prospect of hard work tedious, pointless and soul-crushing. Instead of studying for exams, getting some job and clawing your way up the ladder, I wondered why we couldn’t just build a device that measured your brain capacity and awarded you the money you would have made had you applied yourself. Eliminate the middleman, so to speak, the useless paper pushing evoked by the word “career.”
But when you think about it, it’s not really money you’re after, as money is but purchasing power, and so it’s the things money can provide like a nice lifestyle and the peace of mind that comes from not worrying about it. And it’s not really the lifestyle or financial independence, per se, since moment to moment what’s in your bank account isn’t determining your mental state, but the feeling those things give you — a sense of expansiveness and freedom.
But if you did have such a machine, and it awarded you the money, you probably wouldn’t have that kind of expansiveness and freedom, especially if you did nothing to achieve those things. You would still feel bored, distracted and unsatisfied despite unrestricted means to travel or dine out as you saw fit. People who win the lottery, for example, tend to revert to their prior level of satisfaction in short order.
The feeling you really want then is the sense of rising to a challenge, negotiating and adapting to your environment, persevering in a state of uncertainty, tapping into your resourcefulness and creativity. It’s only while operating at the edge of your capacity you could ever be so fulfilled. In fact, in such a state the question of your satisfaction level would never come up. You wouldn’t even think to wonder about it you’d be so engrossed.
So what you really crave is a mind device that encourages you to adapt to your environment using your full creative capabilities in the present moment, so much so you realize if you do not do this, you have the sense of squandering your life in a tedious, pointless and soul-crushing way. You need to be totally stuck, without the option of turning back. In sum, you need to face reality exactly as it is, without any escape therefrom.
The measure of your mind in that case is your reality itself. The device is already with you — it’s the world you are presently creating with the consciousness you have, providing you avenues to escape, none of which are satisfactory, none that can lead to the state you truly desire. You have a choice to pursue them fruitlessly and wind up at square one, or to abandon them and attain your freedom. No matter how many times you go down a false road, you wind up at the same place until you give up on the Sisyphean task and proceed in earnest.
My childhood fantasy was real, it turns out, only I had misunderstood its meaning.
-
@ c1e9ab3a:9cb56b43
2025-05-09 23:10:14I. Historical Foundations of U.S. Monetary Architecture
The early monetary system of the United States was built atop inherited commodity money conventions from Europe’s maritime economies. Silver and gold coins—primarily Spanish pieces of eight, Dutch guilders, and other foreign specie—formed the basis of colonial commerce. These units were already integrated into international trade and piracy networks and functioned with natural compatibility across England, France, Spain, and Denmark. Lacking a centralized mint or formal currency, the U.S. adopted these forms de facto.
As security risks and the practical constraints of physical coinage mounted, banks emerged to warehouse specie and issue redeemable certificates. These certificates evolved into fiduciary media—claims on specie not actually in hand. Banks observed over time that substantial portions of reserves remained unclaimed for years. This enabled fractional reserve banking: issuing more claims than reserves held, so long as redemption demand stayed low. The practice was inherently unstable, prone to panics and bank runs, prompting eventual centralization through the formation of the Federal Reserve in 1913.
Following the Civil War and unstable reinstatements of gold convertibility, the U.S. sought global monetary stability. After World War II, the Bretton Woods system formalized the U.S. dollar as the global reserve currency. The dollar was nominally backed by gold, but most international dollars were held offshore and recycled into U.S. Treasuries. The Nixon Shock of 1971 eliminated the gold peg, converting the dollar into pure fiat. Yet offshore dollar demand remained, sustained by oil trade mandates and the unique role of Treasuries as global reserve assets.
II. The Structure of Fiduciary Media and Treasury Demand
Under this system, foreign trade surpluses with the U.S. generate excess dollars. These surplus dollars are parked in U.S. Treasuries, thereby recycling trade imbalances into U.S. fiscal liquidity. While technically loans to the U.S. government, these purchases act like interest-only transfers—governments receive yield, and the U.S. receives spendable liquidity without principal repayment due in the short term. Debt is perpetually rolled over, rarely extinguished.
This creates an illusion of global subsidy: U.S. deficits are financed via foreign capital inflows that, in practice, function more like financial tribute systems than conventional debt markets. The underlying asset—U.S. Treasury debt—functions as the base reserve asset of the dollar system, replacing gold in post-Bretton Woods monetary logic.
III. Emergence of Tether and the Parastatal Dollar
Tether (USDT), as a private issuer of dollar-denominated tokens, mimics key central bank behaviors while operating outside the regulatory perimeter. It mints tokens allegedly backed 1:1 by U.S. dollars or dollar-denominated securities (mostly Treasuries). These tokens circulate globally, often in jurisdictions with limited banking access, and increasingly serve as synthetic dollar substitutes.
If USDT gains dominance as the preferred medium of exchange—due to technological advantages, speed, programmability, or access—it displaces Federal Reserve Notes (FRNs) not through devaluation, but through functional obsolescence. Gresham’s Law inverts: good money (more liquid, programmable, globally transferable USDT) displaces bad (FRNs) even if both maintain a nominal 1:1 parity.
Over time, this preference translates to a systemic demand shift. Actors increasingly use Tether instead of FRNs, especially in global commerce, digital marketplaces, or decentralized finance. Tether tokens effectively become shadow base money.
IV. Interaction with Commercial Banking and Redemption Mechanics
Under traditional fractional reserve systems, commercial banks issue loans denominated in U.S. dollars, expanding the money supply. When borrowers repay loans, this destroys the created dollars and contracts monetary elasticity. If borrowers repay in USDT instead of FRNs:
- Banks receive a non-Fed liability (USDT).
- USDT is not recognized as reserve-eligible within the Federal Reserve System.
- Banks must either redeem USDT for FRNs, or demand par-value conversion from Tether to settle reserve requirements and balance their books.
This places redemption pressure on Tether and threatens its 1:1 peg under stress. If redemption latency, friction, or cost arises, USDT’s equivalence to FRNs is compromised. Conversely, if banks are permitted or compelled to hold USDT as reserve or regulatory capital, Tether becomes a de facto reserve issuer.
In this scenario, banks may begin demanding loans in USDT, mirroring borrower behavior. For this to occur sustainably, banks must secure Tether liquidity. This creates two options: - Purchase USDT from Tether or on the secondary market, collateralized by existing fiat. - Borrow USDT directly from Tether, using bank-issued debt as collateral.
The latter mirrors Federal Reserve discount window operations. Tether becomes a lender of first resort, providing monetary elasticity to the banking system by creating new tokens against promissory assets—exactly how central banks function.
V. Structural Consequences: Parallel Central Banking
If Tether begins lending to commercial banks, issuing tokens backed by bank notes or collateralized debt obligations: - Tether controls the expansion of broad money through credit issuance. - Its balance sheet mimics a central bank, with Treasuries and bank debt as assets and tokens as liabilities. - It intermediates between sovereign debt and global liquidity demand, replacing the Federal Reserve’s open market operations with its own issuance-redemption cycles.
Simultaneously, if Tether purchases U.S. Treasuries with FRNs received through token issuance, it: - Supplies the Treasury with new liquidity (via bond purchases). - Collects yield on government debt. - Issues a parallel form of U.S. dollars that never require redemption—an interest-only loan to the U.S. government from a non-sovereign entity.
In this context, Tether performs monetary functions of both a central bank and a sovereign wealth fund, without political accountability or regulatory transparency.
VI. Endgame: Institutional Inversion and Fed Redundancy
This paradigm represents an institutional inversion:
- The Federal Reserve becomes a legacy issuer.
- Tether becomes the operational base money provider in both retail and interbank contexts.
- Treasuries remain the foundational reserve asset, but access to them is mediated by a private intermediary.
- The dollar persists, but its issuer changes. The State becomes a fiscal agent of a decentralized financial ecosystem, not its monetary sovereign.
Unless the Federal Reserve reasserts control—either by absorbing Tether, outlawing its instruments, or integrating its tokens into the reserve framework—it risks becoming irrelevant in the daily function of money.
Tether, in this configuration, is no longer a derivative of the dollar—it is the dollar, just one level removed from sovereign control. The future of monetary sovereignty under such a regime is post-national and platform-mediated.
-
@ f85b9c2c:d190bcff
2025-05-20 12:51:06Sometimes I feel like reversing time. I miss my childhood. Honestly, who wouldn’t? Back then, life was so simple, so carefree. I had no bills to pay, no deadlines to chase, and no worries about what tomorrow might bring. All I had to do was wake up, play, eat, and maybe dodge a beating or two from Mum when I got a little too adventurous😂. Sometimes I feel like reversing time, just to relive those golden days when my biggest problem was figuring out how to sneak a piece of meat from the pot without getting caught.
I remember those moments vividly. When I was little, I’d tiptoe into the kitchen, the aroma of Mum’s stew pulling me like a magnet. I’d wait for her to turn her back, then—bam!—my tiny hand would dive into the pot, snagging a juicy piece of meat. Of course, I wasn’t exactly a master thief. Mum always seemed to know. She’d catch me red-handed, and let’s just say her wooden spoon wasn’t just for cooking! I was kinda stubborn back then, so those beatings happened a lot. But I don’t steal meat anymore—grown-up me knows better. Life was different then. My only “job” was to have fun—climbing trees, chasing friends, or making up wild stories in my head. Now, adulthood feels like a never-ending to-do list. I miss the freedom, the laughter, the way problems seemed to vanish with a nap or a hug. If I could, I’d turn back the clock, even just for a day, to feel that lightness again. Childhood wasn’t perfect, but it sure felt like it.
-
@ f85b9c2c:d190bcff
2025-05-20 12:41:35Solana (SOL) is acquiring popularity in the crypto world for its speed and flexibility.It's rapidly gaining ground on established blockchains, grabbing investor interest.
History Of Solana Anatoly Yakovenko, once a Qualcomm executive, formulated the concept for Solana in 2017. A town on the Southern California coast inspired the name. Yakovenko wanted a swifter, more reliable blockchain network to address the limitations of existing onesat that time. Solana is based in San Francisco, California, at the headquarters of Solana Labs. Solana was launched in March 2020, making a major step in the advancement of blockchain technology.
What Is Solana? Solana is a blockchain network built for speed and affordability.This versatility makes it useful for DeFi, NFTs, and more. Solana operates on its own independent blockchain network with SOL as its native token and infrastructure to power its operations. It functions as a self-sufficient ecosystem, independent of any other existing blockchain network.
How Does Solana Work? Unlike normal blockchains that usually rely on the Proof-of-Work mechanism, Solana uses another approach. It combines two mechanisms: 1.Proof-of-Stake: It lets operators secure the network by putting SOL tokens at stake. These operators are entrusted with adding new blocks to the blockchain and are rewarded for their contribution.
2.Proof-of-History: It helps eliminates the need for communications between operators and boosts transaction processing speed.
Conclusion The mix of these mechanisms is a key factor behind Solana’s reputation for superior speed. Of course, it uses other technical aspects that contribute to its efficiency, but PoS and PoH play a critical role.
-
@ 21335073:a244b1ad
2025-05-09 13:56:57Someone asked for my thoughts, so I’ll share them thoughtfully. I’m not here to dictate how to promote Nostr—I’m still learning about it myself. While I’m not new to Nostr, freedom tech is a newer space for me. I’m skilled at advocating for topics I deeply understand, but freedom tech isn’t my expertise, so take my words with a grain of salt. Nothing I say is set in stone.
Those who need Nostr the most are the ones most vulnerable to censorship on other platforms right now. Reaching them requires real-time awareness of global issues and the dynamic relationships between governments and tech providers, which can shift suddenly. Effective Nostr promoters must grasp this and adapt quickly.
The best messengers are people from or closely tied to these at-risk regions—those who truly understand the local political and cultural dynamics. They can connect with those in need when tensions rise. Ideal promoters are rational, trustworthy, passionate about Nostr, but above all, dedicated to amplifying people’s voices when it matters most.
Forget influencers, corporate-backed figures, or traditional online PR—it comes off as inauthentic, corny, desperate and forced. Nostr’s promotion should be grassroots and organic, driven by a few passionate individuals who believe in Nostr and the communities they serve.
The idea that “people won’t join Nostr due to lack of reach” is nonsense. Everyone knows X’s “reach” is mostly with bots. If humans want real conversations, Nostr is the place. X is great for propaganda, but Nostr is for the authentic voices of the people.
Those spreading Nostr must be so passionate they’re willing to onboard others, which is time-consuming but rewarding for the right person. They’ll need to make Nostr and onboarding a core part of who they are. I see no issue with that level of dedication. I’ve been known to get that way myself at times. It’s fun for some folks.
With love, I suggest not adding Bitcoin promotion with Nostr outreach. Zaps already integrate that element naturally. (Still promote within the Bitcoin ecosystem, but this is about reaching vulnerable voices who needed Nostr yesterday.)
To promote Nostr, forget conventional strategies. “Influencers” aren’t the answer. “Influencers” are not the future. A trusted local community member has real influence—reach them. Connect with people seeking Nostr’s benefits but lacking the technical language to express it. This means some in the Nostr community might need to step outside of the Bitcoin bubble, which is uncomfortable but necessary. Thank you in advance to those who are willing to do that.
I don’t know who is paid to promote Nostr, if anyone. This piece isn’t shade. But it’s exhausting to see innocent voices globally silenced on corporate platforms like X while Nostr exists. Last night, I wondered: how many more voices must be censored before the Nostr community gets uncomfortable and thinks creatively to reach the vulnerable?
A warning: the global need for censorship-resistant social media is undeniable. If Nostr doesn’t make itself known, something else will fill that void. Let’s start this conversation.
-
@ 04c915da:3dfbecc9
2025-05-20 15:50:22There is something quietly rebellious about stacking sats. In a world obsessed with instant gratification, choosing to patiently accumulate Bitcoin, one sat at a time, feels like a middle finger to the hype machine. But to do it right, you have got to stay humble. Stack too hard with your head in the clouds, and you will trip over your own ego before the next halving even hits.
Small Wins
Stacking sats is not glamorous. Discipline. Stacking every day, week, or month, no matter the price, and letting time do the heavy lifting. Humility lives in that consistency. You are not trying to outsmart the market or prove you are the next "crypto" prophet. Just a regular person, betting on a system you believe in, one humble stack at a time. Folks get rekt chasing the highs. They ape into some shitcoin pump, shout about it online, then go silent when they inevitably get rekt. The ones who last? They stack. Just keep showing up. Consistency. Humility in action. Know the game is long, and you are not bigger than it.
Ego is Volatile
Bitcoin’s swings can mess with your head. One day you are up 20%, feeling like a genius and the next down 30%, questioning everything. Ego will have you panic selling at the bottom or over leveraging the top. Staying humble means patience, a true bitcoin zen. Do not try to "beat” Bitcoin. Ride it. Stack what you can afford, live your life, and let compounding work its magic.
Simplicity
There is a beauty in how stacking sats forces you to rethink value. A sat is worth less than a penny today, but every time you grab a few thousand, you plant a seed. It is not about flaunting wealth but rather building it, quietly, without fanfare. That mindset spills over. Cut out the noise: the overpriced coffee, fancy watches, the status games that drain your wallet. Humility is good for your soul and your stack. I have a buddy who has been stacking since 2015. Never talks about it unless you ask. Lives in a decent place, drives an old truck, and just keeps stacking. He is not chasing clout, he is chasing freedom. That is the vibe: less ego, more sats, all grounded in life.
The Big Picture
Stack those sats. Do it quietly, do it consistently, and do not let the green days puff you up or the red days break you down. Humility is the secret sauce, it keeps you grounded while the world spins wild. In a decade, when you look back and smile, it will not be because you shouted the loudest. It will be because you stayed the course, one sat at a time. \ \ Stay Humble and Stack Sats. 🫡
-
@ 91117f2b:111207d6
2025-05-20 15:27:21Mata mask is a very popular digital wallet and power extension which allows users to interact with etherium the blockchain and other compatible networks. In this article we will explore the benefits and features of using Meta mask,as and also provide a step by step on how to get started.
WHAT IS META MASK MANY will ask what is meta mask, it is a soft ware wallet which allows the users to receive store and also send etherium and other tokens. You can find them in your browsers like playstore Google chrome and so on.
THEY ARE KEY FEATURES WHEN USING A META MASK 1. BLOCKCHAIN INTERACTIONS : meta mask allows you to interact with decentralized applications and also smart contracts on etherium blockchain. 2. CUSTOMIZABLE:meta mask allows the user to hod or her experience and choosing which networks to interact with. 3. SECURE STORAGE: metamask stores your privately key securely, allowing you to make use of your digital assets with confidence.
THE BENEFITS OF USING META MASK 1. NFTs: meta mask allows you to buy, sell and store no fungible tokens 'nft' on platforms like rarible and so on.
-
DECENTRALIZED FINANCE: meta mask allows you to access a large range of decentralized applications including trading, and borrowing and also trading platforms.
-
SMART CONTRACTS INTERACTIONS: meta mask also allows you to interact with decentralized governance and other blockchain-based applications.
WHEN GETTING STARTED WITH META MASK 1. Install the meta mask app 2. Create a wallet. 3. Fund your wallet by transferring etherium or other supported tokens to your wallet. 4. Explore the app by browsing decentralized applications and smart contracts on the etherium blockchain.
IN conclusion, meta mask is suitable for anyone looking to interact with etherium blockchain and other compatible networks. It is also suitable for anyone who is interested in decentralized finance, smart contracts interactions even NFTs.
-
-
@ 91bea5cd:1df4451c
2025-05-20 12:16:57Contexto e início
O precursor direto do avivamento foi William J. Seymour, um pregador afro-americano filho de ex-escravos, influenciado pelos ensinamentos de Charles Parham, que pregava o "batismo no Espírito Santo" com evidência do falar em línguas.
Em 1906, Seymour foi convidado para pregar em uma igreja em Los Angeles. Após ser rejeitado por alguns por sua pregação sobre o batismo com o Espírito Santo, ele começou a liderar reuniões de oração na casa da família Asberry. Em abril de 1906, durante uma dessas reuniões, os participantes começaram a experimentar manifestações intensas do Espírito Santo, incluindo glossolalia (falar em línguas), curas e profecias.
A Rua Azusa
Logo, o número de participantes cresceu tanto que foi necessário mudar para um antigo prédio da Igreja Metodista Africana Episcopal, no número 312 da Rua Azusa, no centro de Los Angeles. Esse local se tornou o epicentro do avivamento.
Características marcantes
Cultos espontâneos e fervorosos, muitas vezes sem ordem pré-definida.
Diversidade étnica e social: negros, brancos, latinos, asiáticos, ricos e pobres adoravam juntos — algo radical para os padrões da época.
Ênfase nas manifestações espirituais, como línguas, curas, visões e profecias.
Igualdade de gênero e raça no ministério, com mulheres e homens de diversas origens pregando e liderando.
Impacto
O avivamento da Rua Azusa marcou o nascimento e expansão global do pentecostalismo, hoje uma das maiores forças do cristianismo mundial. Missionários saíram de Azusa para várias partes do mundo, levando a mensagem pentecostal. Movimentos como as Assembleias de Deus e Igreja do Evangelho Quadrangular têm raízes nesse avivamento.
Tensão e Interpretação entre Reformistas e Pentecostalistas
Evangelhos e Atos
João Batista profetiza: “Ele vos batizará com o Espírito Santo e com fogo” (Mateus 3:11).
Em Atos 2, no Pentecostes, os discípulos falam em línguas e recebem poder (Atos 1:8; 2:4).
Outros episódios: Atos 10 (Casa de Cornélio) e Atos 19 (Éfeso).
Cartas Paulinas
Paulo não relaciona diretamente o “batismo com o Espírito” ao falar em línguas. Em 1 Coríntios 12:13 ele diz: “Pois em um só Espírito todos nós fomos batizados em um corpo”.
A glossolalia aparece como um dom entre outros, mas não como evidência obrigatória (1 Coríntios 12:30).
Tensão
Pentecostais veem o batismo com o Espírito como uma segunda experiência após a conversão, evidenciada por línguas. Reformados geralmente interpretam que o batismo com o Espírito ocorre na conversão e que línguas não são obrigatórias ou cessaram com os apóstolos.
Reformadores e o Batismo com o Espírito Santo
Martinho Lutero, João Calvino e outros reformadores não falavam em línguas nem davam ênfase a experiências carismáticas.
Cessacionismo: Doutrina comum entre reformados que diz que os dons sobrenaturais (línguas, profecias, curas) cessaram com a era apostólica.
Continuação (posição pentecostal): Os dons continuam hoje.
Filmes / Documentários
“Azusa Street: The Origins of Pentecostalism” (2006) – Documentário com imagens históricas e entrevistas.
“Wesley” (2009) – Biografia de John Wesley, precursor do metodismo e influência indireta no pentecostalismo.
“The Cross and the Switchblade” (1970) – História de David Wilkerson e a conversão de Nicky Cruz; enfatiza a obra do Espírito.
Série “God in America” (PBS) – Episódio sobre o pentecostalismo (não só Azusa, mas seu impacto cultural).
-
@ a5142938:0ef19da3
2025-05-20 11:05:20Content coming soon.
-
@ 91bea5cd:1df4451c
2025-05-16 11:07:16Instruções:
- Leia cada pergunta cuidadosamente.
- Escolha a opção (A, B, C ou D) que melhor descreve você na maioria das situações. Seja o mais honesto possível.
- Anote a letra correspondente à sua escolha para cada pergunta.
- No final, some quantas vezes você escolheu cada letra (A, B, C, D).
- Veja a seção de resultados para interpretar sua pontuação.
Teste de Temperamento
1. Em um evento social (festa, reunião), como você geralmente se comporta? A) Sou o centro das atenções, converso com todos, faço piadas e animo o ambiente. B) Tomo a iniciativa, organizo atividades ou discussões, e gosto de liderar conversas. C) Prefiro observar, conversar em grupos menores ou com pessoas que já conheço bem, e analiso o ambiente. D) Sou tranquilo, ouvinte, evito chamar atenção e me adapto ao ritmo do grupo.
2. Ao enfrentar um novo projeto ou tarefa desafiadora no trabalho ou estudo: A) Fico entusiasmado com a novidade, tenho muitas ideias iniciais, mas posso me distrair facilmente. B) Defino metas claras, crio um plano de ação rápido e foco em alcançar resultados eficientemente. C) Analiso todos os detalhes, planejo meticulosamente, prevejo possíveis problemas e busco a perfeição. D) Abordo com calma, trabalho de forma constante e organizada, e prefiro um ambiente sem pressão.
3. Como você geralmente reage a críticas? A) Tento levar na esportiva, talvez faça uma piada, mas posso me magoar momentaneamente e logo esqueço. B) Defendo meu ponto de vista vigorosamente, posso ficar irritado se sentir injustiça, mas foco em corrigir o problema. C) Levo muito a sério, analiso profundamente, posso me sentir magoado por um tempo e repenso minhas ações. D) Escuto com calma, considero a crítica objetivamente e tento não levar para o lado pessoal, buscando a paz.
4. Qual seu estilo de tomada de decisão? A) Sou impulsivo, decido rapidamente com base no entusiasmo do momento, às vezes me arrependo depois. B) Sou decidido e rápido, foco no objetivo final, às vezes sem considerar todos os detalhes ou sentimentos alheios. C) Sou ponderado, analiso todas as opções e consequências, demoro para decidir buscando a melhor escolha. D) Sou cauteloso, prefiro evitar decisões difíceis, busco consenso ou adio se possível.
5. Como você lida com rotina e repetição? A) Acho entediante rapidamente, preciso de variedade e novidade constante para me manter engajado. B) Tolero se for necessário para atingir um objetivo, mas prefiro desafios e mudanças que eu controlo. C) Aprecio a ordem e a previsibilidade, me sinto confortável com rotinas bem estabelecidas. D) Adapto-me bem à rotina, acho confortável e seguro, não gosto de mudanças bruscas.
6. Em uma discussão ou conflito: A) Tento aliviar a tensão com humor, expresso meus sentimentos abertamente, mas não guardo rancor. B) Sou direto e assertivo, defendo minha posição com firmeza, posso parecer confrontador. C) Evito confronto direto, mas fico remoendo o problema, analiso os argumentos e posso guardar ressentimento. D) Busco a conciliação, tento entender todos os lados, sou diplomático e evito o conflito a todo custo.
7. Como você expressa seus sentimentos (alegria, tristeza, raiva)? A) Expresso de forma aberta, intensa e visível, minhas emoções mudam rapidamente. B) Expresso de forma direta e forte, principalmente a raiva ou a determinação, controlo emoções "fracas". C) Tendo a internalizar, minhas emoções são profundas e duradouras, posso parecer reservado. D) Sou contido na expressão emocional, mantenho a calma externamente, mesmo que sinta algo internamente.
8. Qual seu nível de energia habitual? A) Alto, sou muito ativo, falante e entusiasmado, gosto de estar em movimento. B) Muito alto e direcionado, tenho muita energia para perseguir meus objetivos e liderar. C) Variável, posso ter picos de energia para projetos que me interessam, mas também preciso de tempo quieto para recarregar. D) Moderado e constante, sou calmo, tranquilo, prefiro atividades menos agitadas.
9. Como você organiza seu espaço de trabalho ou sua casa? A) Pode ser um pouco caótico e desorganizado, com muitas coisas interessantes espalhadas. B) Organizado de forma funcional para máxima eficiência, focado no essencial para as tarefas. C) Extremamente organizado, metódico, cada coisa em seu lugar, prezo pela ordem e estética. D) Confortável e prático, não necessariamente impecável, mas funcional e sem excessos.
10. O que mais te motiva? A) Reconhecimento social, diversão, novas experiências e interações. B) Poder, controle, desafios, alcançar metas ambiciosas e resultados concretos. C) Qualidade, significado, fazer as coisas da maneira certa, compreensão profunda. D) Paz, estabilidade, harmonia nos relacionamentos, evitar estresse e pressão.
11. Como você reage a imprevistos ou mudanças de plano? A) Adapto-me rapidamente, às vezes até gosto da novidade, embora possa atrapalhar meus planos iniciais. B) Fico irritado com a perda de controle, mas rapidamente busco uma solução alternativa para manter o objetivo. C) Sinto-me desconfortável e ansioso, preciso de tempo para reavaliar e replanejar cuidadosamente. D) Aceito com calma, sou flexível e me ajusto sem muito alarde, desde que não gere conflito.
12. Qual o seu maior medo (em termos gerais)? A) Ser rejeitado, ignorado ou ficar entediado. B) Perder o controle, parecer fraco ou incompetente. C) Cometer erros graves, ser inadequado ou imperfeito. D) Conflitos, pressão, tomar decisões erradas que afetem a estabilidade.
13. Como você costuma passar seu tempo livre? A) Socializando, saindo com amigos, buscando atividades novas e divertidas. B) Engajado em atividades produtivas, esportes competitivos, planejando próximos passos. C) Lendo, estudando, refletindo, dedicando-me a hobbies que exigem atenção e cuidado. D) Relaxando em casa, assistindo filmes, lendo tranquilamente, passando tempo com a família de forma calma.
14. Ao trabalhar em equipe: A) Sou o animador, trago ideias, conecto as pessoas, mas posso ter dificuldade em focar nos detalhes. B) Assumo a liderança naturalmente, delego tarefas, foco nos resultados e mantenho todos na linha. C) Sou o planejador e o crítico construtivo, atento aos detalhes, garanto a qualidade, mas posso ser muito exigente. D) Sou o pacificador e o colaborador, ajudo a manter a harmonia, realizo minhas tarefas de forma confiável.
15. Como você lida com prazos? A) Muitas vezes deixo para a última hora, trabalho melhor sob a pressão do prazo final, mas posso me atrapalhar. B) Gosto de terminar bem antes do prazo, vejo o prazo como um desafio a ser superado rapidamente. C) Planejo o tempo cuidadosamente para cumprir o prazo com qualidade, fico ansioso se o tempo fica curto. D) Trabalho em ritmo constante para cumprir o prazo sem estresse, não gosto de correria.
16. Qual destas frases mais te descreve? A) "A vida é uma festa!" B) "Se quer algo bem feito, faça você mesmo (ou mande fazer do seu jeito)." C) "Tudo tem um propósito e um lugar certo." D) "Devagar se vai ao longe."
17. Em relação a regras e procedimentos: A) Gosto de flexibilidade, às vezes acho as regras limitantes e tento contorná-las. B) Uso as regras a meu favor para atingir objetivos, mas não hesito em quebrá-las se necessário e se eu puder controlar as consequências. C) Sigo as regras rigorosamente, acredito que elas garantem ordem e qualidade. D) Respeito as regras para evitar problemas, prefiro seguir o fluxo estabelecido.
18. Como você reage quando alguém está emocionalmente abalado? A) Tento animar a pessoa, conto piadas, ofereço distração e companhia. B) Ofereço soluções práticas para o problema, foco em resolver a situação que causou o abalo. C) Escuto com empatia, ofereço apoio profundo e tento compreender a dor da pessoa. D) Mantenho a calma, ofereço um ouvido atento e um ombro amigo, sem me deixar abalar muito.
19. Que tipo de filme ou livro você prefere? A) Comédias, aventuras, romances leves, algo que me divirta e me mantenha entretido. B) Ação, suspense, biografias de líderes, estratégias, algo que me desafie ou inspire poder. C) Dramas profundos, documentários, mistérios complexos, ficção científica filosófica, algo que me faça pensar e sentir. D) Histórias tranquilas, dramas familiares, romances amenos, natureza, algo que me relaxe e traga conforto.
20. O que é mais importante para você em um relacionamento (amizade, amoroso)? A) Diversão, cumplicidade, comunicação aberta e espontaneidade. B) Lealdade, objetivos em comum, apoio mútuo nas ambições. C) Compreensão profunda, fidelidade, apoio emocional e intelectual. D) Harmonia, estabilidade, aceitação mútua e tranquilidade.
21. Se você ganhasse na loteria, qual seria sua primeira reação/ação? A) Faria uma grande festa, viajaria pelo mundo, compraria presentes para todos! B) Investiria estrategicamente, planejaria como multiplicar o dinheiro, garantiria o controle financeiro. C) Pesquisaria as melhores opções de investimento, faria um plano detalhado de longo prazo, doaria para causas significativas. D) Guardaria a maior parte em segurança, faria algumas melhorias práticas na vida, evitaria mudanças drásticas.
22. Como você se sente em relação a riscos? A) Gosto de arriscar se a recompensa parecer divertida ou excitante, sou otimista. B) Calculo os riscos e assumo-os se acreditar que a recompensa vale a pena e que posso controlar a situação. C) Evito riscos desnecessários, prefiro a segurança e a previsibilidade, analiso tudo antes de agir. D) Desgosto de riscos, prefiro caminhos seguros e comprovados, a estabilidade é mais importante.
23. Sua memória tende a focar mais em: A) Momentos divertidos, pessoas interessantes, experiências marcantes (embora possa esquecer detalhes). B) Sucessos, fracassos (para aprender), injustiças cometidas contra você, quem te ajudou ou atrapalhou. C) Detalhes precisos, conversas significativas, erros cometidos (por você ou outros), sentimentos profundos. D) Fatos objetivos, rotinas, informações práticas, geralmente de forma neutra.
24. Quando aprende algo novo, você prefere: A) Experimentar na prática imediatamente, aprender fazendo, mesmo que cometa erros. B) Entender o objetivo e a aplicação prática rapidamente, focar no essencial para usar o conhecimento. C) Estudar a fundo a teoria, entender todos os porquês, buscar fontes confiáveis e dominar o assunto. D) Aprender em um ritmo calmo, com instruções claras e passo a passo, sem pressão.
25. Se descreva em uma palavra (escolha a que mais se aproxima): A) Entusiasmado(a) B) Determinado(a) C) Criterioso(a) D) Pacífico(a)
26. Como você lida com o silêncio em uma conversa? A) Sinto-me desconfortável e tento preenchê-lo rapidamente com qualquer assunto. B) Uso o silêncio estrategicamente ou o interrompo para direcionar a conversa. C) Posso apreciar o silêncio para refletir, ou me sentir um pouco ansioso dependendo do contexto. D) Sinto-me confortável com o silêncio, não sinto necessidade de preenchê-lo.
27. O que te deixa mais frustrado(a)? A) Tédio, falta de reconhecimento, ser ignorado. B) Incompetência alheia, falta de controle, obstáculos aos seus planos. C) Desorganização, falta de qualidade, injustiça, superficialidade. D) Conflitos interpessoais, pressão excessiva, desordem emocional.
28. Qual a sua relação com o passado, presente e futuro? A) Foco no presente e nas oportunidades imediatas, otimista em relação ao futuro, esqueço o passado facilmente. B) Foco no futuro (metas) e no presente (ações para alcançá-las), aprendo com o passado mas não me prendo a ele. C) Reflito muito sobre o passado (aprendizados, erros), analiso o presente e planejo o futuro com cautela, às vezes com preocupação. D) Vivo o presente de forma tranquila, valorizo a estabilidade e a continuidade do passado, vejo o futuro com serenidade.
29. Se você tivesse que organizar um evento, qual seria seu papel principal? A) Relações públicas, divulgação, animação, garantir que todos se divirtam. B) Coordenação geral, definição de metas, delegação de tarefas, garantir que tudo aconteça conforme o planejado (por você). C) Planejamento detalhado, logística, controle de qualidade, garantir que nada dê errado. D) Suporte, resolução de problemas de forma calma, garantir um ambiente harmonioso.
30. Qual ambiente de trabalho te agrada mais? A) Dinâmico, social, com muita interação, flexibilidade e novidades. B) Competitivo, desafiador, focado em resultados, onde eu possa liderar ou ter autonomia. C) Estruturado, quieto, onde eu possa me concentrar, com padrões claros de qualidade e tempo para análise. D) Estável, cooperativo, sem pressão, com relacionamentos harmoniosos e tarefas previsíveis.
Calculando seus Resultados:
Agora, conte quantas vezes você escolheu cada letra:
- Total de A: ______
- Total de B: ______
- Total de C: ______
- Total de D: ______
A letra (ou as letras) com a maior pontuação indica(m) seu(s) temperamento(s) dominante(s).
Interpretação dos Resultados:
-
Se sua maior pontuação foi A: Temperamento SANGUÍNEO Dominante
- Características: Você é extrovertido, otimista, sociável, comunicativo, entusiasmado e adora novidades. Gosta de ser o centro das atenções, faz amigos facilmente e contagia os outros com sua energia. É criativo e espontâneo.
- Pontos Fortes: Carismático, inspirador, adaptável, bom em iniciar relacionamentos e projetos, perdoa facilmente.
- Desafios Potenciais: Pode ser indisciplinado, desorganizado, impulsivo, superficial, ter dificuldade em focar e terminar tarefas, e ser muito dependente de aprovação externa.
-
Se sua maior pontuação foi B: Temperamento COLÉRICO Dominante
- Características: Você é enérgico, decidido, líder nato, orientado para metas e resultados. É ambicioso, assertivo, direto e não tem medo de desafios ou confrontos. Gosta de estar no controle e é muito prático.
- Pontos Fortes: Determinado, eficiente, líder natural, bom em tomar decisões e resolver problemas, autoconfiante.
- Desafios Potenciais: Pode ser impaciente, dominador, teimoso, insensível aos sentimentos alheios, propenso à raiva e a "atropelar" os outros para atingir seus objetivos.
-
Se sua maior pontuação foi C: Temperamento MELANCÓLICO Dominante
- Características: Você é introvertido, analítico, sensível, perfeccionista e profundo. É leal, dedicado, aprecia a beleza e a ordem. Tende a ser pensativo, criterioso e busca significado em tudo. Leva as coisas a sério.
- Pontos Fortes: Detalhista, organizado, criativo (em profundidade), leal, empático, comprometido com a qualidade e a justiça.
- Desafios Potenciais: Pode ser pessimista, excessivamente crítico (consigo e com os outros), indeciso (pela análise excessiva), guardar ressentimentos, ser propenso à tristeza e ao isolamento.
-
Se sua maior pontuação foi D: Temperamento FLEUMÁTICO Dominante
- Características: Você é calmo, tranquilo, equilibrado e diplomático. É observador, paciente, confiável e fácil de conviver. Evita conflitos, busca harmonia e estabilidade. É um bom ouvinte e trabalha bem sob rotina.
- Pontos Fortes: Pacífico, estável, confiável, bom ouvinte, diplomático, eficiente em tarefas rotineiras, mantém a calma sob pressão.
- Desafios Potenciais: Pode ser indeciso, procrastinador, resistente a mudanças, parecer apático ou sem entusiasmo, ter dificuldade em se impor e expressar suas próprias necessidades.
Combinações de Temperamentos:
É muito comum ter pontuações altas em duas letras. Isso indica uma combinação de temperamentos. Por exemplo:
- Sanguíneo-Colérico: Extrovertido, enérgico, líder carismático, mas pode ser impulsivo e dominador.
- Sanguíneo-Fleumático: Sociável e agradável, mas pode ter dificuldade com disciplina e iniciativa.
- Colérico-Melancólico: Líder focado e detalhista, muito capaz, mas pode ser excessivamente crítico e exigente.
- Melancólico-Fleumático: Quieto, confiável, analítico, mas pode ser indeciso e resistente a riscos.
Importante: Este teste é uma ferramenta de autoconhecimento. Ninguém se encaixa perfeitamente em uma única caixa. Use os resultados para entender melhor suas tendências naturais, seus pontos fortes e as áreas onde você pode buscar equilíbrio e desenvolvimento.
-
@ cae03c48:2a7d6671
2025-05-20 15:26:52Bitcoin Magazine
Standard Chartered Backs $500K Bitcoin Target, Citing Growing Government Exposure Through MSTRSovereign investment in Bitcoin is accelerating—just not always in the most direct way. In a new report, Standard Chartered Bank says indirect exposure via Strategy (formerly MicroStrategy) is quietly increasing among government entities, reinforcing the bank’s long-standing price prediction that Bitcoin will reach $500,000 before President Donald Trump leaves office in 2029.
JUST IN:
Standard Chartered says SEC 13F fillings support #Bitcoin reaching $500,000 by 2028
pic.twitter.com/MURg9bxLka
— Bitcoin Magazine (@BitcoinMagazine) May 20, 2025
“The latest 13F data from the U.S. Securities and Exchange Commission (SEC) supports our core thesis that Bitcoin (BTC) will reach the $500,000 level before Trump leaves office as it attracts a wider range of institutional buyers,” wrote Geoffrey Kendrick, Standard Chartered’s global head of digital assets research. “As more investors gain access to the asset and as volatility falls, we believe portfolios will migrate towards their optimal level from an underweight starting position in BTC.”
Q1 13F filings revealed a slowdown in direct bitcoin ETF buying—Wisconsin’s state fund exited its entire 3,400 BTC-equivalent IBIT position—while government-linked purchases of MSTR shares were on the rise. Abu Dhabi’s Mubadala, for instance, upped its IBIT exposure to 5,000 BTC equivalent, but Kendrick says the bigger story is elsewhere.
“We believe that in some cases, MSTR holdings by government entities reflect a desire to gain Bitcoin exposure where local regulations do not allow direct BTC holdings,” he said.
France and Saudi Arabia took first-time MSTR positions in Q1. Meanwhile, Norway’s Government Pension Fund, the Swiss National Bank, and South Korea’s public funds each added exposure equivalent to 700 BTC. U.S. retirement funds in states like California and New York added a combined 1,000 BTC equivalent via MSTR. Kendrick called the trend “very encouraging.”
“The quarterly 13F data is the best test of our thesis that BTC will attract new institutional buyer types as the market matures, helping the price reach our USD 500,000 level,” Kendrick said. “When institutions buy Bitcoin, prices tend to rise.”
SEC DATA BACKS BITCOIN $500K TARGET BY 2028: STANDARD CHARTERED
Standard Chartered's Geoff Kendrick says recent SEC 13F filings support a possible rise in Bitcoin to $500,000 by end-2028. While direct ETF holdings dipped in Q1, government entities boosted stakes in Strategy…
— *Walter Bloomberg (@DeItaone) May 20, 2025
This isn’t Kendrick’s first bullish call. Last month, he admitted his prior $120K forecast for Q2 2025 was “too low,” citing surging inflows into U.S. spot BTC ETFs—totaling $5.3 billion over just three weeks. At the time, Kendrick revised his 2025 year-end target to $200,000.
Standard Chartered’s latest analysis shows that Bitcoin’s role in institutional portfolios is maturing beyond tech volatility correlation—now increasingly seen as a macro hedge. “It is now all about flows,” Kendrick said. “And flows are coming in many forms.”
This post Standard Chartered Backs $500K Bitcoin Target, Citing Growing Government Exposure Through MSTR first appeared on Bitcoin Magazine and is written by Jenna Montgomery.
-
@ a5ee4475:2ca75401
2025-05-15 14:44:45lista #descentralismo #compilado #portugues
*Algumas destas listas ainda estão sendo trocadas, portanto as versões mais recentes delas só estão visíveis no Amethyst por causa da ferramenta de edição.
Clients do Nostr e Outras Coisas
nostr:naddr1qq245dz5tqe8w46swpphgmr4f3047s6629t45qg4waehxw309aex2mrp0yhxgctdw4eju6t09upzpf0wg36k3g3hygndv3cp8f2j284v0hfh4dqgqjj3yxnreck2w4qpqvzqqqr4guxde6sl
Modelos de IA e Ferramentas
nostr:naddr1qq24xwtyt9v5wjzefe6523j32dy5ga65gagkjqgswaehxw309ahx7um5wghx6mmd9upzpf0wg36k3g3hygndv3cp8f2j284v0hfh4dqgqjj3yxnreck2w4qpqvzqqqr4guk62czu
Iniciativas de Bitcoin
nostr:naddr1qvzqqqr4gupzpf0wg36k3g3hygndv3cp8f2j284v0hfh4dqgqjj3yxnreck2w4qpqq2nvmn5va9x2nrxfd2k5smyf3ux7vesd9znyqxygt4
Profissionais Brasileiros no Nostr
nostr:naddr1qq24qmnkwe6y67zlxgc4sumrxpxxce3kf9fn2qghwaehxw309aex2mrp0yhxummnw3ezucnpdejz7q3q5hhygatg5gmjyfkkguqn54f9r6k8m5m6ksyqffgjrf3uut982sqsxpqqqp65wp8uedu
Comunidades em Português no Nostr
nostr:naddr1qq2hwcejv4ykgdf3v9gxykrxfdqk753jxcc4gqg4waehxw309aex2mrp0yhxgctdw4eju6t09upzpf0wg36k3g3hygndv3cp8f2j284v0hfh4dqgqjj3yxnreck2w4qpqvzqqqr4gu455fm3
Grupos em Português no Nostr
nostr:nevent1qqs98kldepjmlxngupsyth40n0h5lw7z5ut5w4scvh27alc0w86tevcpzpmhxue69uhkummnw3ezumt0d5hsygy7fff8g6l23gp5uqtuyqwkqvucx6mhe7r9h7v6wyzzj0v6lrztcspsgqqqqqqs3ndneh
Jogos de Código Aberto
Open Source Games nostr:naddr1qvzqqqr4gupzpf0wg36k3g3hygndv3cp8f2j284v0hfh4dqgqjj3yxnreck2w4qpqq2kvwp3v4hhvk2sw3j5sm6h23g5wkz5ddzhz8x40v0
Itens Úteis com Esquemas Disponíveis
nostr:naddr1qqgrqvp5vd3kycejxask2efcv4jr2qgswaehxw309ahx7um5wghx6mmd9upzpf0wg36k3g3hygndv3cp8f2j284v0hfh4dqgqjj3yxnreck2w4qpqvzqqqr4guc43v6c
Formatação de Texto em Markdown
(Amethyst, Yakihone e outros) nostr:naddr1qvzqqqr4gupzpf0wg36k3g3hygndv3cp8f2j284v0hfh4dqgqjj3yxnreck2w4qpqq2454m8dfzn26z4f34kvu6fw4rysnrjxfm42wfpe90
Outros Links
nostr:nevent1qqsrm6ywny5r7ajakpppp0lt525n0s33x6tyn6pz0n8ws8k2tqpqracpzpmhxue69uhkummnw3ezumt0d5hsygp6e5ns0nv3dun430jky25y4pku6ylz68rz6zs7khv29q6rj5peespsgqqqqqqsmfwa78
-
@ 2e8970de:63345c7a
2025-05-20 15:19:25https://www.wsj.com/tech/europe-big-tech-ai-1f3f862c?mod=hp_lead_pos7
https://stacker.news/items/984656
-
@ a5ee4475:2ca75401
2025-05-15 14:11:16lists #descentralismo #compilation #english
*The last list was updated in Amethyst, so the update of this one will only be visible in Amethyst.
nostr:naddr1qq245dz5tqe8w46swpphgmr4f3047s6629t45qg4waehxw309aex2mrp0yhxgctdw4eju6t09upzpf0wg36k3g3hygndv3cp8f2j284v0hfh4dqgqjj3yxnreck2w4qpqvzqqqr4guxde6sl
AI
nostr:naddr1qq24xwtyt9v5wjzefe6523j32dy5ga65gagkjqgawaehxw309ahx7um5wghxy6t5vdhkjmn9wgh8xmmrd9skctczyzj7u3r4dz3rwg3x6erszwj4y502clwn026qsp99zgdx8n3v5a2qzqcyqqq823c8mw5zk
FOSS GAME
nostr:naddr1qq2kvwp3v4hhvk2sw3j5sm6h23g5wkz5ddzhzqg4waehxw309aex2mrp0yhxgctdw4eju6t09upzpf0wg36k3g3hygndv3cp8f2j284v0hfh4dqgqjj3yxnreck2w4qpqvzqqqr4gut57qtr
OSHW - Open Source Hardware
nostr:naddr1qqgrqvp5vd3kycejxask2efcv4jr2qgswaehxw309ahx7um5wghx6mmd9upzpf0wg36k3g3hygndv3cp8f2j284v0hfh4dqgqjj3yxnreck2w4qpqvzqqqr4guc43v6c
Markdown Uses for Some Clients
nostr:nevent1qqsv54qfgtme38r2tl9v6ghwfj09gdjukealstkzc77mwujr56tgfwsppemhxue69uhkummn9ekx7mp0qgsq37tg2603tu0cqdrxs30e2n5t8p87uenf4fvfepdcvr7nllje5zgrqsqqqqqpkdvta4
Other Links
nostr:nevent1qqsrm6ywny5r7ajakpppp0lt525n0s33x6tyn6pz0n8ws8k2tqpqracpzpmhxue69uhkummnw3ezumt0d5hsygp6e5ns0nv3dun430jky25y4pku6ylz68rz6zs7khv29q6rj5peespsgqqqqqqsmfwa78
-
@ 4fa5d1c4:fd6c6e41
2025-05-20 15:13:35📌 Ablauf
1. Prompt auswählen
Wähle aus der Promptsammlung einen Prompt, der dich anspricht – z. B. zu Unterrichtsplanung, Kreativmethoden, Inklusion oder KI-Nutzung im RU.
2. Prompt ausprobieren
Verwende den Prompt mit einem KI-Tool (z. B. ChatGPT oder ein freies Modell wie LM Studio) und passe ihn ggf. leicht an dein Thema oder deine Klasse an.
3. Reflexion schreiben
Notiere kurz, was gut geklappt hat, was überrascht hat oder was du noch verbessern möchtest. Halte es so fest, dass andere davon lernen können.
4. Auf Nostr posten
Veröffentliche deine Reflexion oder ein konkretes Ergebnis (z. B. Screenshot, kurzer Textauszug, Sketchnote …) über deinen Nostr-Client (z. B. Damus, Amethyst, Habla.news).\ Verwende folgende Hashtags:
```text
relilab #verstehen oder #anwenden oder #reflektieren oder #gestalten
(optional: 1️⃣, 2️⃣ oder 3️⃣ je nach Niveaustufe) ```
Beispiel:
markdown Heute mit dem Prompt zur „Virtuellen Exkursion“ gearbeitet – mega spannend, wie viel die Schüler:innen zu Jerusalem wussten! Habe das Ergebnis als Audio-Reisebericht umgesetzt. #relilab #anwenden 2️⃣
💡 Hinweise
-
Nutze möglichst einen Prompt pro Post, damit die Community gut filtern kann.
-
Wenn du einen neuen Prompt ausprobierst oder abwandelst, verlinke gerne auf die Originalquelle (z. B. „Kapitel 2 · Kreative Unterrichtsgestaltung – Lernspiel entwickeln“).
-
Du kannst auch Fragen an die Community stellen: z. B. „Hat jemand diesen Prompt schon mal mit einer 6. Klasse ausprobiert?“
📣 Ziel der Aktion
Durch eure Beiträge entsteht eine wachsende Sammlung an:
-
reflektierten Einsatzbeispielen aus der Praxis
-
kreativen Varianten und Weiterentwicklungen
-
Ideen für KI-gestützte Lehrer:innenbildung im Fach Religion
Wenn du magst, notiere deine eigenen Favoriten-Prompts, poste Screenshots oder gestalte eine „Best-of“-Sammlung für dein Kollegium!
Promptsammlung Religionsunterricht
Kapitel 1 · Unterrichtsplanung & -vorbereitung (Religionsunterricht)
Religionsstunde planen
prompt Plane eine 45-minütige Religionsstunde in **[Klassenstufe]** zum Thema **[„Nächstenliebe in Judentum, Christentum & Islam“ o. ä.]**. Liefere: – drei messbare Kompetenzziele (KMK-Bereich „Religiöse Identität entwickeln“) – detaillierten Phasenplan (Einstieg | Erarbeitung | Sicherung | Transfer) mit Zeitangaben – mindestens zwei kreative Sozialformen (Think-Pair-Share, Placemat, Gallery Walk …) – Kerntext(e) aus Bibel, Koran oder Tanach + passenden Medienimpuls (Video, Bild, Song) – Lernaufgabe für zu Hause, die das Thema in den Lebenswelt-Bezug bringt
Unterrichtseinheit entwerfen
prompt Entwirf eine vierwöchige Einheit **[Thema: „Schöpfungsverantwortung“]** für die **[Sek I]**. Für jede Doppelstunde angeben: – Leitfrage & erwartetes Kompetenzniveau (AB I – III) – Schlüsseltexte/Traditionen (Genesis 1–2, islamische Schöpfungs-Ayat, „Laudato si’“ …) – handlungsorientierte Lernaufgabe inkl. Differenzierung – Methodensetting (z. B. Gruppenpuzzle, Mystery, Stationenlauf) – benötigte Materialien/Medien und eine kurze Reflexionsidee
Differenzierte Lernaufgaben
prompt Formuliere Lernaufgaben zum Thema **[„Gleichnisse Jesu“]** für drei Anspruchsniveaus: 1. Unterstützungsniveau – Lesestrategieblatt + vorstrukturierter Lückentext 2. Basisniveau – Text-Puzzle + Placemat-Diskussion 3. Erweiterungsniveau – eigener Podcast (Recherche, Skript, Produktion, Peer-Feedback) Je Aufgabe: Ziel, Ablauf in Schritten, erwartetes Produkt, Bewertungsfokus.
Langfristiges Projekt skizzieren
prompt Skizziere ein sechs-wöchiges Projekt **„Interreligiöse Stadt-Rallye“** für **[Klasse 9]**: – Projektziele & zugeordnete Kompetenzen – Checkliste für Besuche (Kirche, Synagoge, Moschee, Tempel) inkl. Leitfragen – digitale Dokumentation (Padlet-Storyboard, QR-Blogposts, Foto-Missionen) – Abschlussprodukt (multimediale Stadttour) + Rubrik mit vier Bewertungsdimensionen
Jahresübersicht erstellen
prompt Erstelle eine Grobjahresplanung für **[ev. Religion, Kl. 5]** mit sechs Themenfeldern (z. B. „Staunen über die Schöpfung“, „Jesus begegnen“…). Zu jedem Feld: – Zeitraum & passendes Fest im Kirchenjahr als Anker – kompetenzorientierte Leistungsform (Portfolio, Lernlandkarte, Präsentation …) – kurze Hinweissequenz für mögliche fächerverbindende Chancen
Projektwoche „Spiritualität erleben“
prompt Konzipiere eine fächerübergreifende Projektwoche **„Spiritualität & Achtsamkeit“** für **[Jgst. 7–8]**: – Workshop-Menü (Ikonenmalen, Kalligraphie, Yoga, Psalm-Rap, MBSR-Übungen …) – externe Expert*innen (Pfarrer*in, Imam, Rabbiner*in, buddhistische*r Lehrer*in) – tägliche Reflexionsformate (Stille-Tagebuch, Audio-Log, Blitzlicht-Runde) – gemeinsamer Abschluss: interreligiöses Friedensgebet + Feedback-Gallery
Kompetenzen formulieren
prompt Schreibe messbare Kompetenzformulierungen für die Einheit **[„Propheten – Stimmen für Gerechtigkeit“]** (Sek II). Nutze Anforderungsbereiche I–III und füge zu jeder Kompetenz: Beobachtungshinweis + kurzes Beispiel für Leistungsnachweis.
Kapitel 2 · Kreative Unterrichtsgestaltung (Religionsunterricht)
Lernspiel entwickeln
prompt Entwickle ein interaktives Spiel, das Schüler*innen **[z. B. die Zehn Gebote]** niedrigschwellig erarbeiten lässt. Beschreibe: Spielidee, Regeln, Material, Spielphasen (Warm-up | Action | Debrief) und Reflexionsfragen zur theologischen Vertiefung.
Gruppenarbeit strukturieren
prompt Plane eine Gruppenaufgabe zu den **„Seligpreisungen der Bergpredigt“**: – Gruppenzuteilung je Seligpreisung – Produktwahl (Comic-Strip, Poetry-Slam, Kurzvideo …) mit Kreativbriefing – Präsentations-Setting + Peer-Feedback-Raster – Lehrer*innen-Checkliste zur Beobachtung von Zusammenarbeit & Inhaltstiefe
Interdisziplinärer Unterricht
prompt Kombiniere **„Umweltschutz in den Weltreligionen“** mit **Biologie** in einer Doppelstunde: – theologischer Impuls (Schöpfungsverantwortung) – biologischer Faktenblock (ökologische Fußabdrücke) – Arbeitsphase: Lernende vergleichen religiöse & wissenschaftliche Begründungen und entwerfen Handlungsideen für die Schule.
Storytelling einsetzen
prompt Zeige, wie Storytelling das Thema **„Exodus – Befreiungsgeschichte“** lebendig macht: – Dramaturgie (Setup – Konflikt – Climax – Rückbindung) – Erzähler*innenrollen (Miriam, Moses, Pharao, Gott als Off-Stimme) – Aufgaben: Storyboard zeichnen, Rollen-Podcast aufnehmen, reflektiertes Journal
Experimenteller Ansatz
prompt Entwirf einen experimentellen Unterrichtsgang zur Leitfrage **„Was bedeutet heilig?“**: – Alltagsobjekte auswählen und symbolisch umdeuten lassen – Stationen: Wahrnehmung | Gestaltung | Deutung | Religionsvergleich – abschließende Reflexion in einem Gallery Walk + theologischer Einordnung
Blended-Learning-Konzept
prompt Erstelle ein Blended-Learning-Szenario zur Einheit **„Feste im Kirchenjahr“**: – Online-Phase: interaktive Zeitleiste, Erklärvideos, H5P-Quiz – Präsenz-Phase: Lernlandkarte, Gruppen-Challenge „Festkalender bauen“ – Leistungsnachweis: Lerntagebuch + digitale Portfolio-Abgabe
Design Thinking anwenden
prompt Nutze Design Thinking, um mit Schüler*innen Lösungen für **„Armut in unserer Stadt“** aus religiöser Perspektive zu entwickeln. Beschreibe alle sechs Phasen inkl. Tools (Empathy Map, How-Might-We-Fragen, Prototyping-Material), Zeit- und Raumplan.
Escape-Room planen
prompt Konzipiere einen pädagogischen Escape Room zum Thema **„Paulus auf Missionsreise“**: – Storyline (Start, Hinweise, Wendepunkt, Finale) – fünf Rätseltypen (Logik, Bibelcode, UV-Botschaft …) – benötigtes Material & Technik + Safety-Briefing – Auswertungsbogen für Lernergebnisse & Teamwork-Skills
Flipped Classroom umsetzen
prompt Gestalte einen Flipped-Classroom-Ablauf zur Einheit **„Gleichnisse Jesu“**: – Zuhause: drei Micro-Learning-Videos (< 5 min) + interaktiver Selbsttest – Unterricht: kooperative Fallanalyse, Rollenspiel, Kreativstation – Reflexion: One-Minute-Paper → digitales Feedback-Pad
Virtuelle Exkursion einbauen
prompt Baue eine virtuelle Exkursion **„Jerusalem – Heilige Stätten“** ein: – Ressourcen: 360°-VR-Tour, Street-View-Links, Museums-App – Vorbereitende Leitfragen (historisch, religiös, politisch) – Arbeitsauftrag: digitale Reise-Map anlegen, Eindrücke vertonen, Peer-Review – Abschluss: Fishbowl-Diskussion zu religiöser Vielfalt & Konfliktlinien
Kapitel 3 · Differenzierung & Inklusion (Religiöses Lernen)
Inklusive Aufgabenstellung
prompt Gestalte eine Unterrichtseinheit zu **[„Gleichnisse Jesu“]** so, dass Lernende mit kognitiven, motorischen oder sprachlichen Beeinträchtigungen aktiv teilnehmen können. • beschreibe drei barrierearme Medien-/Methoden-Anpassungen • formuliere für jedes Lernniveau ein messbares Teilziel • gib Beispiele für unterstützende Hilfsmittel (z. B. Symbolkarten, Audiodeskription, taktile Bibel)
Individuellen Förderplan erstellen
prompt Erstelle einen Förderplan für eine*n Schüler*in mit Lese-Rechtschreib-Schwäche im Thema **[„Schöpfungspsalmen“]**: – diagnostische Ausgangslage + SMART-Ziele – wöchentliche Lernschritte (Methoden, Materialien, Zeitbudget) – Evaluationskriterien & Reflexionsfragen für Lernende + Lehrkraft
Kompetenzentwicklung begleiten
prompt Zeige, wie du die Kompetenzentwicklung in der Einheit **„Spiritualität & Achtsamkeit“** laufend beobachtest: • Portfolio-Raster mit Indikatoren zu Wahrnehmung / Deutung / Gestaltung • Feedback-Tool (Ampel, Check-Out, Audio-Memo) • Maßnahmenplan bei Unter- oder Überforderung
Personalisierte Lernpfade
prompt Baue personalisierte Lernpfade für **„Weltreligionen im Dialog“** (Kl. 7) auf: – drei optionale Module (Video-Recherche, Expert*innen-Interview, Kreativprodukt) je nach Vorwissen – Self-Assessment-Checkpoints + Empfehlung nächster Schritt – technische Umsetzung mit Learning-Management-System deiner Wahl
Lernjournal nutzen
prompt Entwirf ein Lernjournal-Format zur Reihe **„Seligpreisungen“**: • tägliche Prompt-Frage (kognitiv, affektiv, spirituell) • visuelle Elemente (Sketchnote, Emojikarte, Farbsymbol) • Wochen-Meta-Reflexion + Peer-Kommentarfeld
Spezifische Unterstützung
prompt Beschreibe Zusatzmaßnahmen, um das abstrakte Konzept **„Trinität“** für Lernende mit Verständnisschwierigkeiten greifbar zu machen: – vereinfachte Grafiken, Alltagsanalogien, szenische Darstellung – Schritt-für-Schritt-Erklärvideo (max. 3 min) – begleitender Glossar in einfacher Sprache
Kulturelle Vielfalt einbeziehen
prompt Plane eine Sequenz **„Feste im Jahreskreis“** so, dass christliche, jüdische und muslimische Perspektiven gleichwertig vorkommen. Gib drei konkrete Aufgabenbeispiele (interaktiver Wandkalender, Interview mit Familie, „Fest-Box“) und nenne Bewertungsbausteine zur Würdigung kultureller Vielfalt.
Mehrsprachigkeit fördern
prompt Zeige Strategien, wie du arabisch-, hebräisch- oder russischsprachige Schüler*innen in das Thema **„Friede in den Heiligen Schriften“** einbeziehst: – zweisprachiger Wortschatz-Trainer – Tandem-Aktivität mit Übersetzer-App – Produktoption „mehrsprachiges Audio-Gebet“
Barrierefreier Unterricht
prompt Erstelle einen barrierefreien Ablaufplan für eine 90-min-Sequenz zu **„Luther und die Reformation“** in einer heterogenen Lerngruppe: – Raum-, Material- und Technik-Anpassungen – klare Kommunikationsregeln (z. B. Gebärdensprach-Dolmetsch, Live-Untertitel) – evaluierbare Barrierefreiheits-Checkliste
Kapitel 4 · Bewertung & Feedback (im Religionsunterricht)
Prüfungsfragen entwickeln
prompt Formuliere fünf Prüfungsaufgaben zu **„Prophetische Bücher“** (2 Wissen, 2 Transfer, 1 Bewertung). Gib zu jeder Aufgabe Erwartungshorizont & Bloom-Taxonomie-Stufe an.
Lernstrategien für Schüler*innen
prompt Erstelle drei konkrete Tipps, wie sich Lernende auf eine Klassenarbeit zu **„Kirchengeschichte – Reformation bis heute“** vorbereiten können (visualisieren | vernetzen | reflektieren).
Selbstbewertung anleiten
prompt Entwirf einen Selbstbewertungsbogen, mit dem Oberstufen-Schüler*innen ihre persönliche spirituelle Entwicklung in der Einheit **„Exodus – Freiheit erleben“** reflektieren: – 5 Skalen-Items + offenes Feld – Anleitungs-Text für ehrliche Selbsteinschätzung – Follow-Up-Gesprächsleitfaden
Peer-Feedback organisieren
prompt Baue ein Peer-Feedback-Setting für das Projekt „Predigt-Podcast zur Nächstenliebe“ auf: • 3-Kriterien-Checkliste (Inhalt, theologischer Tiefgang, Medieneinsatz) • Zeit-Taktung (Aufnahme – Austausch – Revision) • Moderationskarten für konstruktive Rückmeldung
Bewertungsrubrik erstellen
prompt Entwerfe eine 4-stufige Rubrik für das Produkt **„Interreligiöser Video-Essay: Was ist heilig?“** Bewertungsdimensionen: Recherche, Argumentation, Kreativität, Technik. Ordne jeder Stufe klare Deskriptoren & Punktwerte zu.
Schnelle Lernüberprüfung
prompt Skizziere eine 3-Min-Exit-Ticket-Abfrage zum Stundenthema **„Auferstehungshoffnung“**: – eine Verständnisfrage, ein Transfer-Impuls, ein persönlicher Bezug – Auswertungsplan (Ampel-Sortierung + Blitz-Feedback an Klasse)
Feedback von Schüler*innen einholen
prompt Erstelle fünf Leitfragen, um anonymes Lernenden-Feedback zum Thema **„Sakrale Räume erkunden“** zu sammeln (Aspekte: Klarheit, Relevanz, Methoden, Beteiligung, Wohlbefinden). Schlage ein digitales Tool für die Umsetzung vor und erläutere den Ablauf in 3 Schritten.
Kapitel 5 · Digitale Medien & KI (Religionsunterricht)
Interaktive Biblemap erstellen
prompt Lege mit **[Tool: Thinglink / Genially]** eine interaktive Karte biblischer Orte an (Jerusalem, Nazareth, Bethsaida …). – je Ort: Kurzinfo, Bild/360°-Link, passender Bibelvers – Aufgabe: Lernende verknüpfen Geodaten mit Lebensstationen Jesu – füge Reflexionsfragen + Export-Anleitung für das LMS hinzu
KI-ChatBot als Lernpartner
prompt Konfiguriere einen KI-ChatBot, der Fragen zu **„Weltreligionen und Umweltschutz“** auf A2–B2-Sprachniveau beantwortet. – Prompt-Engineering-Vorgabe (Rolle, Stil, Quellenzitierweise) – fünf Beispiel-User-Prompts + erwartete Bot-Antwort – Datenschutz-Hinweis & didaktischer Einsatzrahmen
Bibel-Snap-AR-Filter entwickeln
prompt Entwirf ein Konzept für einen Augmented-Reality-Filter (Instagram/Snap) zu **„Seligpreisungen“**: – visuelle Overlays, Trigger-Events, Soundeffekt – Lernaufgabe: Selfie mit Lieblingsseligpreisung + Kommentar posten – Ethik-Checkliste (Privatsphäre, Bildrechte, Sensibilität religiöser Symbole)
Digitales Escape-Game bauen
prompt Plane mit **[Tool: Deck.Toys]** ein digitales Escape-Game „Spuren des Propheten Jesaja“: – Level-Struktur (Prophetie-Puzzle, Quiz, Hidden Object) – win-Condition & automatisiertes Feedback – Export-Code + Anleitung für barrierefreie Version (Screenreader-Labels)
Podcast-Serie kuratieren
prompt Stelle eine 4-teilige Schüler-Podcast-Serie **„Gerechtigkeit in Religionen“** auf: – redaktioneller Plan (Themen, Gäste, Bibel/Koran-Bezüge) – Work-Flow (Skript, Aufnahme, Schnitt, Distribution) – Bewertungsrubrik – Inhalt, Technik, Diskursqualität
Virtuelles Museumslabor
prompt Nutze **Mozilla Hubs** und erstelle einen VR-Raum „Symbole des Glaubens“. – Raum-Zonen (Kreuz, Menora, Halbmond, Om) – Lehrer-Dashboard: Moderations-Tools + Sicherheits-Settings – Arbeitsauftrag: Lernende hinterlegen Audiokommentar & Quizfrage pro Symbol
KI-gestützte Bildanalyse
prompt Zeige, wie Lernende mit **Computer-Vision-API** ikonografische Motive (z. B. Verkündigungsbild) analysieren: – Schrittanleitung: Upload → Tagging → theologische Interpretation – Vergleich mit manueller Bildbetrachtung – Reflexionsbogen zu Chancen & Grenzen automatischer Deutung
Kapitel 6 · Motivation & Klassenklima (im Religionsunterricht)
Einstieg mit Mystery-Bild
prompt Starte die Einheit **„Exodus“** mit einem rätselhaften Bildausschnitt (gezoomte Wüste, brennender Dornbusch …). – drei Leitfragen zum Rätsel – Ablauf Mystery-Methode (Hypothesen, Puzzleteile, Auflösung) – Brücke zur Lernzieltransparenz
Ritual „Wort des Tages“
prompt Führe ein tägliches Ritual ein: Zufalls-Bibelvers via App, kurze stille Lesephase, spontanes Wort-Cloud-Feedback. – Setup-Anleitung, Regelzeit (3 min), Variationen (Hadith/Zitat) – Reflexion nach vier Wochen (Exit-Ticket-Vorlage)
Gamifizierte Punkte-Challenge
prompt Erstelle ein Punktesystem („Faith-Coins“) für vorbildliches Teamwork in Projekten **„Interreligiöser Dialog“**: – Mission-Board, Badges, Level-Belohnungen – klare Regeln (Fairplay, Bonus für Hilfsbereitschaft) – Monitoring-Tool & Schutz vor Wettbewerb-Stress
Affirmations-Station
prompt Richte im Klassenraum eine „Mut-&-Segen-Station“ ein: – Materialliste (Segen-Karten, Affirmations-Würfel, Kerze) – Nutzung: Start/Ende der Stunde, bei Konflikten – Dokumentiere Wirkung mit anonymem Feedback-Poster
Klassensong komponieren
prompt Lass die Klasse einen Song zu **„Nächstenliebe“** schreiben / recorden: – Schrittfolge: Brainstorm–Lyrics–Beat-Making–Recording–Release – Tools (Soundtrap, BandLab, Loop-Bibliothek CC-Lizenz) – Präsentation im Schul-Gottesdienst + Rechte-Check
Dankbarkeits-Journal
prompt Implementiere ein wöchentliches Dankbarkeits-Journal nach der Stunde **„Schöpfung bewahren“**: – drei Leitfragen (Wahrnehmung, Wertschätzung, Umsetzung) – Peer-Sharing-Option (freiwillig) – Beobachtung: Einfluss auf Klassenklima (Mess-Skala beilegen)
Konfliktlösungs-Circle
prompt Nutze eine Circle-Time nach der Methode „Restorative Justice“ bei Streit um religiöse Themen: – Rollen (Keeper, Sprecher*in, Zuhörer*in) – Gesprächsregeln & Talking-Piece – Nachbereitung: individueller Commitment-Zettel
Kapitel 7 · Spiritualität & Persönlichkeitsbildung
Meditation anleiten
prompt Schreibe ein 10-min-Skript für eine geführte Meditation „Ruhe finden – Psalm 23“, altersgerecht **[Klasse 8]**: – Setting (Sitzhaltung, Musik, Licht) – verbale Anleitung (Ein-, Ausatmen, Bild-Metaphern) – Nachbesprechung (Gefühls-Skala, Bibel-Resonanzfrage)
Pilgerweg auf dem Schulhof
prompt Plane einen Mini-Pilgerweg (6 Stationen) zu „Fragen nach dem Sinn“ auf dem Gelände: – Stationstexte + Symbol-Aktion (Stein legen, Wasser berühren …) – QR-Codes mit Audioguide durch Schüler*innen eingesprochen – Reflexionsbogen + Foto-Collage-Aufgabe
Stilles Tagebuch digital
prompt Setze mit **Padlet** ein „Stilles Tagebuch“ auf: – geschlossene Kommentarfunktion – wöchentliches Impulsbild (Ikone, Naturfoto, Calligraffiti) – Lehrkraft-Feedback nur per Emoji-Code, um Raum zu lassen
Gebetsformen erkunden
prompt Entwickle eine Lernstationen-Werkstatt **„Gebet in 5 Religionen“**: – Materialien: Gebetsriemen, Gebetsteppich, Mala-Kette, Kerzen, Textblätter – QR-Video-Tutorials zu Körperhaltungen – Reflexionsauftrag: Venn-Diagramm Gemeinsamkeiten/Verschiedenheiten
Spirituelles Tage-Retreat
prompt Skizziere einen schulischen Tages-Retreat „Stille & Kreativität“ für Oberstufe: – Rhythmus: Meditation – Kreativ-Workshop – Solo-Waldzeit – Sharing-Circle – Logistik (Räume, Materialien, externe Begleitung) – Evaluations-Tool: digitales Mood-Barometer
Dank-Labyrinth bauen
prompt Gib Anweisungen, wie eine Klasse ein begehbares Dankbarkeits-Labyrinth aus Kerzen/Seilen legt: – Aufbauplan & Sicherheitsregeln – Impulstext „Preis der Dankbarkeit“ (Lk 17, 11-19) – Audio-Begleitung + Zeitplan
Lebensweg-Timeline gestalten
prompt Lass Lernende eine „Lebensweg-Timeline“ (Canvas / Miro) erstellen, in der spirituelle Schlüsselmomente eingetragen werden: – Anleitung zu Life-Events, Werte, Glaubensfragen – Peer-Coaching-Leitfaden (respektvolle Rückfragen) – Datenschutz-Vereinbarung & Freigabe-Optionen
Kapitel 8 · Soziale & emotionale Unterstützung (Religionsunterricht)
Emotionale Intelligenz fördern
prompt Entwirf eine 20-min-Aktivität, die Lernende der **[Klassenstufe]** dabei unterstützt, Gefühle mit Psalm-Metaphern auszudrücken. – Warm-up: Emoji-Kärtchen + passender Psalmvers – Partneraustausch „Wann habe ich mich wie König David gefühlt?“ – Mini-Reflexion: Gebets-Haiku (3 Zeilen) ins Klassen-Padlet posten
Konfliktlösung interreligiös
prompt Stelle einen 3-Schritt-Leitfaden für Klassengespräche bei Spannungen zwischen religiösen Gruppen zusammen: 1. „Wertschätzungs-Runde“ – jede*r nennt, was er/sie an der anderen Tradition bewundert 2. „Gemeinsamer Kern“ – Bibel-, Koran- oder Tora-Vers zum Thema Frieden lesen, Gemeinsamkeiten markieren 3. „Handlungsplan“ – Klasse legt zwei konkrete Fairness-Regeln fest
Achtsamkeit mit Psalm 46
prompt Schreibe ein 5-min-Achtsamkeitsskript „Sei still und erkenne Gott“ für den Stundenbeginn: Atem-Anker, Psalmwort wiederholen, 30 Sek. Stille, Abschluss-Frage in Still-Journal notieren.
Teambuilding „Vertrau mir“
prompt Plane ein Teambuilding-Spiel, bei dem Partner*innen mit verbundenen Augen durch einen „Weg des Lichts“ aus Kerzen geführt werden. – Sicherheits-Checkliste – Spiritueller Debrief: Johannes 8,12 verknüpfen
Krisenintervention – spiritueller Beistand
prompt Erstelle ein 4-Punkte-Handout für Lehrkräfte, wie sie bei plötzlicher Trauer in der Klasse handeln: • Präsenz zeigen – kurze Stille + Kerze entzünden • Offenes Ohr – kein theologisieren, nur zuhören • Ressourcen nennen – Schulseelsorge, Jugendpfarrer*in • Nachsorge – Memory-Box gestalten
Selbstwert stärken (Imago Dei)
prompt Formuliere eine Kreativaufgabe „Ich bin Bild Gottes“: Lernende gestalten ein Self-Portrait-Collage mit Bibel-Affirmationen, kurze Audio-Beschreibung aufnehmen, Gallery-Walk durchführen.
Resilienz durch Glaubensgeschichten
prompt Gib einen Arbeitsauftrag, bei dem Schüler*innen eine biblische Figur wählen, deren Lebenskrise sie analysieren (Hiob, Ruth, Josef) und die Strategien auf heutige Situationen übertragen.
Kapitel 9 · Elternarbeit & Zusammenarbeit
Elternbrief „Religiöse Lernwege“
prompt Verfasse einen Elternbrief (max. 300 Wörter), der – das Halbjahresthema **[z. B. Gerechtigkeit in den Propheten]** erklärt – 2 Mitmach-Tipps für zuhause enthält (Familiengebet, Podcast) – QR-Link zur Materialsammlung bietet
Elternabend – interreligiöse Einheit vorstellen
prompt Erstelle eine Agenda (60 min) für einen Elternabend: • Begrüßung & Gebet der Religionen (5 min) • Lernziele & Methoden-Tour (15 min) • Mini-Workshop „Feste teilen“ (20 min) • Fragen & Feedback-Karten (15 min) • Segen zum Abschluss (5 min)
Elternfeedback digital einholen
prompt Gestalte einen 7-Fragen-Forms-Fragebogen: Skalen (1–5) zu: Relevanz, Transparenz, Wertevermittlung, Medienmix + zwei offene Felder „Was lief gut?“ / „Wunsch für nächste Reihe“.
Schwieriges Elterngespräch führen
prompt Entwirf einen Gesprächsleitfaden (Sandwich-Methode) für eine Diskussion über fehlende Hausaufgaben im Kontext Glaubensfest-Vorbereitungen.
Elternmitarbeit im Projekt „Feste zu Hause“
prompt Skizziere ein Mitmach-Format, bei dem Familien ihre Festtraditionen per Video (max. 2 min) vorstellen; Sammel-Padlet, Klassen-Kompliment-Wand und Auszeichnung „Fest-Botschafter*in“.
Familienkommunikation stärken
prompt Gib drei Übungen, wie Eltern religiöse Dialoge anstoßen können: • „Frage des Tages“-Glas • Gemeinsames Dankbarkeitsbuch • Podcast „3 Minuten Bibelimpuls“ beim Abendessen hören
Eltern-Kind-Projekt „Heilige Orte“
prompt Plane ein Wochenend-Projekt: Familie besucht lokalen Sakralbau, füllt Reflexions-Worksheet aus, erstellt Foto-Story in CANVA; Präsentation im Unterricht, Peer-Feedback-Kriterien beilegen.
Kapitel 10 · Zeitmanagement & Organisation (Religionsunterricht)
Liturgische To-do-Liste
prompt Erstelle für die nächsten 4 Schulwochen eine Checkliste, die Unterricht, Gottesdienst-Vorbereitung und Schulfest (St. Martin) synchronisiert; inkl. Deadlines & Verantwortliche.
45-min-Stundenplan fein takten
prompt Gliedere eine Stunde **[Thema Gleichnisse]** in 5-Min-Blöcke: Warm-up-Rätsel, Kurzimpuls, Gruppenpuzzle, Austausch, Transfer, Mini-Exit-Ticket – plus 2 min Puffer.
Unterrichtsstruktur „Flow“
prompt Baue einen wiederkehrenden Ablauf mit kleinen Ritualen: • Ankommens-Kerze (1 min) • Learning Target (Tafel-Icon) • Aktiv-Phase • Stille-Minute • Segen-to-go
Übergänge mit Symbol
prompt Gib 3 Methoden, um Phasenwechsel per Klangschale, Lichtritual oder Vers-Einblendung zu signalisieren – inkl. Schüler-Assistenzplan.
Prioritäten im Kirchenjahr setzen
prompt Lege fest, welche Themen vor Weihnachten abgeschlossen sein müssen und welche (Fastenzeit) ins zweite Halbjahr fallen – Schlagwort-Roadmap.
Arbeitszeitplan für Lehrkraft
prompt Erstelle einen Wochenplan (Mo–So) mit festen Blöcken: Vorbereitung, Korrektur, Seelsorge-Termin, Me-Time; Ampel-Farbcode für Belastung; Reminder „Sabbat-Abend offline“.
Kapitel 11 · Persönliche Weiterbildung & Reflexion
Selbstreflexion als Religionslehrkraft
prompt Liste 5 Leitfragen (Theologie, Didaktik, Spiritualität, Beziehung, Innovation), die du jedes Quartal schriftlich beantwortest.
Fortbildung „KI im Religionsunterricht“
prompt Stelle einen 3-Stufen-Lernpfad zusammen: 1) Online-MOOC (4 h) 2) Praxis-Webinar „Prompt-Design“ (2 h) 3) Kollegiale Umsetzungsschau (90 min) mit Reflexionsbogen. 4) MarkDown für Liascript-Lernmodul
Burnout-Prophylaxe spirituell
prompt Entwirf eine 7-Tage-Challenge: tägliche 10-min-Stille, Journaling „Segen des Tages“, Digital-Sonnenuntergang (kein Screen nach 21 Uhr) und wöchentlicher Spazier-Psalm.
Teamteaching ökumenisch
prompt Gib eine Checkliste für Planung mit einer katholischen Kollegin: gemeinsame Lernziele, liturgische Sprache abstimmen, Rollenverteilung, Reflexions-Debrief.
Microteaching „Kurzpredigt“
prompt Lege ein Format fest: 5-min-Mini-Homilie vor Kolleg*innen, Video-Feedback, zweifache Wiederholung nach Feed-Forward-Regeln.
Jahresziele setzen
prompt Nutze SMART+LOVE-Schema (L-inked to faith, O-wned, V-alue-added, E-cological) für drei persönliche Entwicklungsziele und definiere Quartals-Checkpoints.
Innovation: VR-Pilgerfahrt
prompt Skizziere, wie du in 60 min eine VR-Station an einem Pilgerort testest, Evaluation × 3 (Lerngewinn, Technik, Emotion), Nachbesprechung im Kollegium.
Kapitel 12 · Exkursionen & Außerschulisches Lernen
Kloster-Tag organisieren
prompt Plane einen ganztägigen Klassenausflug in ein Benediktiner- oder Zisterzienser-Kloster. – Zeitplan (Laudes-Besuch, Führung, Arbeitsstation, Stundengebet, Gesprächsrunde) – Lernziele (Spiritualität erleben, klösterliche Werte reflektieren, Stille-Erfahrung) – Arbeitsaufträge: Audio-Interview mit Mönch/Nonne, Foto-Essay „Ora et Labora“ – Vor-/Nachbereitung im Unterricht (Vorwissen-Quiz, Reflexionsportfolio)
Interreligiöse Stadt-Tour
prompt Entwirf eine dreistündige „House-of-Worship-Tour“ (Moschee – Synagoge – Kirche) für die [Jgst. 9–10]. – Routenplan, Zeiten, Ansprechpartner*innen, Kleidungshinweise – Leitfragen je Stopp (Architektur, Riten, Engagement in der Stadtgesellschaft) – digitale Begleitmap in Google My Maps / Actionbound – Reflexionsprodukt: gemeinsames „Code of Respect“-Poster
Museum der Religionen virtuell
prompt Nutze 3D-Rundgänge von **[Museum X]** und erstelle ein Lern-Webquest „Religiöse Symbole im Wandel“. – fünf Recherche‐Aufgaben mit Zeitlimit – Peer-Review: Padlet-Poster „Top 3 Überraschungen“ – Lehrer-Dashboard: Bewertungskriterien + Zugangslinks
Pilgerwanderung light
prompt Skizziere eine 8-km-Pilgerstrecke nahe der Schule. – sechs Stationen (Psalm-Rezitation, Naturmeditation, Segenswort …) – Materialliste (Pilgerpass, Stempel, Erste-Hilfe-Set) – Safety-Plan + Elterninfo – Abschluss: Lagerfeuer-Runde „Reiseroute des Herzens“
Service-Learning bei der Tafel
prompt Verbinde eine Exkursion zur lokalen Tafel e.V. mit einem vierwöchigen Projekt „Glauben & Teilen“. – Vorbereitung: Arbeitslosigkeit & Almosen in Bibel/Koran – Vor-Ort-Einsatz (2 h Sortieren + 1 h Gespräche) – Reflexion: Rollenkarte „Prophetische Stimme“ – Leistungsnachweis: Podcast-Episode + 360°-Feedback
Kapitel 13 · Ethik & Gesellschaftliche Verantwortung
Bioethik-Debatte führen
prompt Entwirf ein Oxford-Debate-Setting zu **[„CRISPR‐Babys – moralisch vertretbar?“]**. – Rollen (Pro / Contra / Jury) – theologische Argumentationskarten (Imago Dei, Schöpfungsverantwortung) – Bewertungsrubrik (Sachkenntnis, Ethik-Transfer, Dialoghaltung) – Follow-Up-Essay-Prompt
Dilemma-Diskussion „Notlüge“
prompt Stelle ein Fallbeispiel „Notlüge zum Schutz eines Freundes“ bereit. – Fishbowl-Methode mit Beobachtungsauftrag – Transfer-Aufgabe: biblische Szenen verknüpfen (Pharao, Hebammen, (2. Mose 1,15-21)
Menschenrechte & Religion
prompt Entwirf ein Stationenlernen (6 Stationen) „Bibel, Koran, UN-Charta“. – Quellentexte, QR-Videos, Kreativ-Station „Art. 1 als Graffiti“ – Zwischentest (Learning Apps) + Exit-Ticket – Reflexion im Wertequadrat (Freiheit – Ordnung)
Planspiel „Flucht & Asyl“
prompt Kreiere ein 90-min-Planspiel mit Rollen (Geflüchtete / Grenzpolizei / NGO / Regierung). – Szenario, Rollenbriefe, Event-Cards – Einbettung: biblisches Motiv „Exodus – Fremdsein“ – Debrief-Matrix Gefühle / Fakten / Glaubensimpulse / Handlungsoptionen
Prophetie heute
prompt Schreibe einen Auftrag: Lernende identifizieren in Medien aktuelle „prophetische Stimmen“ (Fridays for Future, Amnesty) und vergleichen sie mit Amos & Jesaja. – Kriterienraster (Anklage, Vision, Handlungsaufruf) – Präsentation als Insta-Reel oder Infografik
Kapitel 14 · Globale Gerechtigkeit & Nachhaltigkeit
Fair-Trade-Schulaktion
prompt Entwirf ein Projekt „Eine Welt-Kiosk“ (4 Wochen). – Team-Rollen (Einkauf, Werbung, Kassenbuch, Bildung) – theologische Begründung (Mt 25, Jak 5) – Marketing-Plan (Plakat, Schulgottesdienst-Spot, Social-Story) – Impact-Messung (Umsatz, Umfrage, Spendenzweck)
Wasser als Menschenrecht
prompt Plane eine Doppelstunde „Durstige Welt“. – Einstieg: symbolisches 1-Liter-Experiment – Textvergleich: Joh 4 (Frau am Brunnen) & Qurʾan 21:30 – Gruppenauftrag: Wasserkampagne für Schul-IG entwickeln – Mini-Debatte: Privatisierung ja/nein
Klimagerechtigkeits-Liturgie
prompt Schreibe ein 30-min-Andachtskonzept „Schrei der Schöpfung“. – Psalm 104 als Wechselgesang – Kurzimpuls Laudato si’ §139 – Aktionssymbolik: Erde-Tuch + Saatkorn-Ritual – Call-to-Action-Karte mit persönlichem CO₂-Ziel
Buddhist Economics vs. Christliche Soziallehre
prompt Erstelle einen Vergleichs-Chart (4 Kriterien) + Diskussions-Prompt: „Welche Wirtschaftsethik braucht die Post-Wachstums-Gesellschaft?“
UN-SDGs im Religionsunterricht
prompt Baue eine Lernlandkarte, die jedem SDG einen religiösen Impuls zuordnet. – Tool: Miro-Board Vorlage – Beispiel: SDG 13 ↔ „Garten Eden bewahren“ – Abschlussprodukt: Elevator-Pitch-Video (90 sec) mit Handlungsaufruf
Kapitel 15 · Führung, Engagement & Diakonie
Service-Learning „Senior*innen online“
prompt Plane eine dreiwöchige Aktion: Klasse coacht Senior*innen beim Smartphone-Einsatz. – Vorbereitung: biblischer Impuls „Ehre die Alten“ – Training-Module, Rollenkarten, Feedback-Bogen – Abschluss-Event mit Segens-Ritual & Urkunden
Schuldiakonie-Team gründen
prompt Erstelle ein Konzept zur Gründung eines „Diakonie-Teams“ (Kl. 9-12). – Satzung, Rollen (Team-Leads, PR, Fundraising) – Jahresprojekt-Ideen (Suppenküche, Fair-Fashion-Swap) – Mentoring durch lokale Kirchengemeinde
Leadership-Training „Servant Leader“
prompt Entwirf einen Workshop-Tag (6 h) zu dienender Führung nach Mk 10,45. – Icebreaker, Input-Impulse, Fallstudien-Gruppenarbeit – Reflexions-Matrix „Head-Heart-Hand“ – Zertifikat-Kriterien
Mentoring jüngerer Schüler*innen
prompt Skizziere ein Peer-Mentoring-Programm „Glaubensfragen teilen“. – Matching-Prozess, 5-Treffen-Guide, Gesprächs-Kärtchen – Evaluations-Tool (Mentor/Mentee-Feedback)
Charity-Kampagne „Licht teilen“
prompt Entwerfe einen 14-tägigen Schul-Spendenlauf zugunsten eines Solarprojekte in Afrika. – theologische Rahmung („Ihr seid das Licht der Welt“) – Sponsoring-Formular, Social-Media-Challenge, Andacht zur Eröffnung – Ergebnis-Präsentation: Weltkarte + Dank-Video der Partner-NGO
Kapitel 16 · Theologie & Popkultur
Biblische Motive in Superhelden-Filmen
prompt Erstelle eine Analyse-Aufgabe zu [Film: „Spider-Man No Way Home“]. – Szenenauswahl, Leitfrage (Opfer & Erlösung) – Arbeitsblatt „Parallele zu Christusfigur?“ – Präsentationsformat: Meme-Collage oder Re-cut-Trailer
TikTok-Mini-Predigt
prompt Schreibe einen Prompt, mit dem Lernende eine 60-Sek-TikTok-Predigt zu **[Seligpreisung X]** produzieren. – Hook, Kernvers, Call-to-Action – Hashtag-Liste, Musik-Snippet (lizenzfrei) – Feedback-Rubrik (Klarheit, Kreativität, theol. Tiefe)
Rap-Battle Altes vs. Neues Testament
prompt Plane ein Klassen-Rap-Battle „Gesetz vs. Gnade“. – Beat-Auswahl, Battle-Regeln, Reim-Worksheet – Peer-Jury-Bögen (Flow, Inhalt, Punchline, Respekt) – Reflexion: Gal 3,24 & Mt 5,17 im Plenum
Gaming-Theologie
prompt Erstelle einen Analyse-Prompt für **[Game: „The Last of Us“]** zum Thema „Opfer‐Liebe & Moral“. – Level-Szenen, Diskussionsfragen, Vergleich mit Joh 15,13 – Creative Option: Alternative Ending Storyboard
Playlist „Psalmen im Pop“
prompt Gib Auftrag, eine Spotify-Playlist moderner Songs mit Psalm-Resonanzen zu kuratieren (mind. 8 Titel); jeder Track mit Mini-Annotation (30 Wörter).
Kapitel 17 · Interreligiöser Dialog & Diversity
Fishbowl Diskussion
prompt Organisiere eine Fishbowl Diskussion zu **„Gemeinsame Werte in Judentum, Christentum & Islam“**. – Rollen: 3 Sprecher*innen je Religion, 2 freie Stühle, Außenkreis – Leitfragen (Würde, Barmherzigkeit, Gerechtigkeit) – Beobachtung Grid für Außenkreis (Argument, Emotion, Bezug Schrift) – Debrief: Gemeinsamkeiten clustern, Differenzen respektvoll festhalten
Interfaith Panel
prompt Plane ein Schüler*innen-Panel mit Vertreter*innen von 4 Religionen. – Ablauf: Lightning-Talks (5 min) → moderierte Fragerunde → World-Café – Vorbereitungs-Worksheet: „Meine Frage an…“ – Reflexions-Blogpost (200 Wörter) als Leistungsnachweis
Dialog-Café
prompt Richte ein „Religions-Café“ ein (Tische: Feiern, Gebet, Kleidung, Essen). – Tisch-Hosts mit Quick-Facts-Karten – 10-min-Runden, Timer-Gong – Abschluss: Murmelrunde „größte Überraschung“ + Mentimeter-Wordcloud
Scripture Speed-Dating
prompt Lass Lernende in 5-min-Runden je einen Vers vorstellen (Bibel, Koran, Tanach, Bhagavad Gita) zu **„Frieden“**. – Vorlage: Vers, Kontext, eigene Frage – Rotation, Feedback-Sticker, Ranking „Vers der Stunde“
Konflikt-Simulation
prompt Erstelle ein Planspiel „Bau neuer Gebetsraum an der Schule“. – Stakeholder-Briefe: Schüler*innenrat, Eltern, Stadt, Religionsgemeinschaften – Verhandlungs-Phase, Presse-Konferenz, Kompromiss-Paper – Reflexion: Goldene Regel & GG Art. 4
Shared Values-Collage
prompt Auftrag: Gruppe erstellt Digi-Collage „Das verbindet uns“ (Canva). – Mind-Map-Start, Bild-Recherche CC-Lizenz, Zitat-Overlays – Poster-Walk, Peer-Voting via Klebepunkte
Ambassador-Projekt
prompt Jede*r Schüler*in wird „Religion-Ambassador“ für eine Tradition. – 3 Recherche-Aufträge, 1 Interview, TikTok-Summary (60 s) – gemeinsame Auswertung im Padlet-Cluster (Riten, Ethik, Symbolik)
Kapitel 18 · Liturgie & Gottesdienstgestaltung
Schüler-Gottesdienst planen
prompt Entwirf einen 30-min-Schulgottesdienst zum Thema **„Hoffnung“**. – Liturgischer Ablauf (Begrüßung, Lied, Lesung, Aktion, Segen) – Rollen-Matrix (Musik-Team, Technik, Predigt-Crew) – Checkliste für Inklusion (Gender-Sprache, Barrierefreiheit)
Digitaler Live-Stream
prompt Erstelle ein Setup für einen gestreamten Advents-Impuls. – Technik-Schema (OBS, Kamera, Mikro, YouTube Link) – Einbindung interaktiver Chat-Fragen – DSGVO-Hinweise & Moderations-Plan
Symbolischer Raum
prompt Gestalte einen „Raum der Klage“ in der Aula (Fastenzeit). – Bodenbild Asche-Kreuz, Kerzen-Spirale, Gebets-Box – Ablauf 10-min-Stationengang, Audio-Loop Psalm 130 – Sicherheits- und Aufsichts-Plan
Psalm-Rap Worship
prompt Leite eine Klasse an, Psalm 23 als Rap vorzutragen. – Beat-Template, Vers-Aufteilung, Refrain-Hook – Recording mit BandLab, EQ-Preset „Worship Lo-Fi“ – Live-Performance im Gottesdienst + Lyric-Video
Taizé-Abend
prompt Konzipiere eine 25-min-Taizé-Andacht (Kerzen-Kreuz, repetitives Lied, Stille). – Liedauswahl (Laudate omnes gentes / Ubi caritas) – Ablauf-Kärtchen, Gitarren-Akkorde, zweisprachiges Gebet
Segnungsfeier
prompt Entwirf eine Segnungsfeier für Abschluss-Klasse. – Ritual: Hand-auf-Schulter, persönliches Segenswort, Kreuzzeichen – Musik-Cue, Fotopunkt, Give-away „Segen-To-Go“-Karte
Liturgischer Kalender Smartboard
prompt Erstelle eine interaktive Smartboard-Tafel mit Festfarben, Symbolen, Liedvorschlägen; Drag-&-Drop-Quiz „Ordne das Fest!“
Kapitel 19 · Kreatives Schreiben & Kunstprojekte;
Psalm-Haiku
prompt Auftrag: Schreibe zu einem ausgewählten Psalmvers drei Haikus. – Struktur 5-7-5, Bildsprache beibehalten, persönlicher Twist – Audio-Aufnahme mit Regen-Ambience, Upload in Nostr
Graphic-Novel-Bibeltext
prompt Lass Lernende **Mk 2,1-12** als 8-Panel-Comic umsetzen. – Storyboard-Template, Sprechblasen, onomatopoetische Effekte – Peer-Review „Lesbarkeit & Theologie“
Poetry-Slam Propheten
prompt Organisiere einen Slam-Abend „Stimme der Gerechtigkeit“. – Textlänge 3 min, Requisite erlaubt – Jury-Bögen (Wortkraft, Performance, Forderung) – Streaming-Option + Publikums-Voting
Ikonen-Workshop
prompt Führe 90-min-Workshop „Jesus-Ikone in Acryl“ durch. – Schrittfolge: Holzgrund, Goldbogen, Proportions-Raster, Lasur – Theologischer Input zur Ikonen-Theologie, Stille-Phase
Kalligrafie-Schriftrolle
prompt Gestalte mit der Klasse ein 2 m langes Pergament „Selig sind…“. – Material-Liste, Pinsel-Technik, Farbsymbolik – Ausstellung im Schulflur + QR-Code-Making-Of
Parabel-Comic-Strip
prompt Team erstellt 4-Panel-Webcomic zur Parabel „Verlorener Sohn“. – Stil wählbar (Manga, Indie, Minimal) – Upload auf Schul-Insta, Hashtag-Challenge
Gemeinschafts-Mural
prompt Plane ein Wandbild „Regenbogen-Bund“. – Entwurfs-Workshop, Schablonen, Schulfest-Live-Painting – Reflexion: Farbe als Zeichen der Verheißung
Kapitel 20 · Bibliodrama & Rollenspiel
Bibliodrama-Setting
prompt Leite ein 60-min-Bibliodrama zu **„Emmaus-Jünger“**. – Rollen-Zuweisung, Körper-Statue, Resonanz-Runde – Transfer: „Wann brannte unser Herz?“ Journaling
Hot-Seat-Interview
prompt Schüler*in im „heißen Stuhl“ antwortet als Paulus. – Vorbereitungs-Kärtchen (Biografie, Missionsreisen, Konflikte) – Audience-Fragen, Reflexion: Differenz Fakten / Fantasie
Konzil von Jerusalem
prompt Rollenspiel: Apostel vs. Pharisäer über Heiden-Mission. – Positions-Papers, Moderations-Hammer, Mehrheits-Vote – Debrief: Gal 2 & Apostelgeschichte 15 vergleichen
Moderne Parabel
prompt Gruppen schreiben & spielen eine heutige Version der „Barmherzigen Samariter“ in 5 Szenen (E-Scooter-Unfall).
Forum-Theater Mobbing
prompt Setze Forum-Theater nach Boal ein: Szenario „Religiöses Cyber-Mobbing“. – Stop-Signal, Zuschauende als Joker, Lösungs-Ideen ausprobieren
Freeze-Frame Auferstehung
prompt Klasse stellt in drei Standbildern Karsamstag – Ostermorgen – Emmaus dar. – Foto-Shooting, Bild-Analyse „Gefühle im Raum“
Impro-Dilemma-Box
prompt Sammle ethische Dilemmata, ziehe zufällig, spiele 2-min-Impro-Szene, Klasse bietet Lösungswege; Bibel-Matching als Abschluss.
Kapitel 21 · Wissenschaft & Forschung im RU
Empirische Unterrichtsstudie planen
prompt Skizziere ein Forschungsdesign (Mixed-Methods) zur Frage, ob Storytelling die Bibeltextkompetenz in **[Klassenstufe]** steigert. – Hypothese, Stichprobe, Instrumente (Pre-/Post-Test, Fokusgruppe) – Zeitplan 8 Wochen, Ethik-Check, Auswertungs-Software – Reflexionsauftrag für Schüler*innen nach Abschluss
Unterrichtsbeobachtung per Video
prompt Erarbeite einen Leitfaden für Videografie im RU: – Kameraposition, Datenschutzinfo, Einverständnisbogen Eltern – Codierschema (Interaktion, Fragearten, Wartezeit) – Analysetools (ELAN, Vosaic) + Reporting-Template
Statistik zur Religiosität erheben
prompt Entwirf einen 12-Items-Fragebogen (Likert 1–5) zu „Glaubenspraxis Jugendlicher“. – Themen: Gebet, Gottesdienst, Mediennutzung, Zweifel – Pre-Test auf Verständlichkeit, Cronbach-α-Ziel > 0,75 – Prompt für ChatGPT: „Generiere Item-Analysen & Visualisierung“
Literaturreview KI im RU
prompt Formuliere einen Prompt, der ChatGPT auf Deutsch ein systematisches Review der letzten 5 Jahre (2020-25) erstellt: – Suchstrings, Inclusion-Criteria, PRISMA-Flowchart – Output-Struktur Abstract → Ergebnisse → Lücken → Ausblick
Kapitel 22 · Historisch-kritische Bibelarbeit
Textkritischer Einstieg
prompt Lass Lernende **Mk 16, 9-20** mit Nestle-Aland-App untersuchen: – Auftrag: Textvarianten markieren, Randnotizen vergleichen – Diskussionsfragen: Kanon, Inspiration, Relevanz heutiger Ausgaben
Quellenhypothese entdecken
prompt Plane eine Gruppenpuzzle-Einheit zur Zwei-Quellen-Theorie. – Expertentexte (Mk, Q-Hypothese, Sondergut Mt/Lk) – Produkt: Info-Poster „So entsteht ein Evangelium“ – Checkliste: redaktionelle Merkmale finden, Schlussdiskussion
Formgeschichte kreativ
prompt Organisation einer „Formgeschichte-Gallery“: – Teams inszenieren Witzwort, Wunder, Streitgespräch als Meme, Reel, Podcast – Gallery-Walk, Peer-Rubrik „Gattungsmerkmale getroffen?“
Exegese-Prompt
prompt Erstelle einen Prompt, der eine KI eine Mini-Exegetische Analyse (Setting, Form, Sit-in-Leben, Theologie, Rezeption) zu jeder Bibelperikope liefert; begrenze Ausgabe auf 300 Wörter.
Kapitel 23 · Krisenseelsorge & Notfallpädagogik
Notfall-Handlungskette
prompt Stelle ein One-Pager-Schema für Krisenfälle (Tod, Suizidgedanken) zusammen: 1) Wahrnehmen & Sichern · 2) Kollegium informieren · 3) Eltern/Profis einbinden · 4) Nachsorge – Telefonnummern (Schulpsychologe, Krisendienst) freilassend eintragen
Trauerritual gestalten
prompt Entwirf ein 15-min-Ritual „Licht der Erinnerung“ für die Klasse: – Mitte-Kreuz, Namenskärtchen, Kerzen-Aufstellung, Psalm 34,19 – Raummusik-Vorschlag, Leitfragen stille Reflexion, optionaler Segen
Psychoedukation „Angst“
prompt Bau eine 45-min-Einheit Angstbewältigung mit Psalm 91 & Atem-Techniken. – Theorie-Input, Körperübung 4-7-8-Atmung, Bibelvers-Affirmation – Exit-Ticket „Meine Angst-Skillbox“ (3 Ideen)
Peer-Support-Netzwerk
prompt Skizziere ein Schulkonzept „Schüler-Seelsorge-Team“. – Auswahl-Prozess, 3-tägige Grundschulung (Aktives Zuhören, Schweigepflicht) – Supervision, Öffentlichkeitsarbeit, Evaluationsbogen
Kapitel 24 · Schulkooperation & Öffentlichkeitsarbeit
RU-Blog aufsetzen
prompt Gib Schritt-für-Schritt-Anleitung (WordPress): Theme-Auswahl, Kategorien (Impulse, Projekte, Schüler-Gastbeiträge), DSGVO-Plug-ins, Redaktionsplan 3-Monats-Sicht; Prompt für KI-Bilder (Stable Diffusion) inkl. Lizenz-Check
Medien-Pitch
prompt Formuliere ein 200-Wörter-Pressestatement für die Lokalzeitung über die Aktion **„Eine-Welt-Kiosk“** (Kap. 14). Inklusive Quote einer Schülerin & Spendenstand.
RU-Tagung hosten
prompt Erstelle ein Ablaufskript für eine regionale RU-Fachtagung (5 h): Keynote „KI & Theologie“, 3 Workshops, Poster-Session, Abschlussandacht. – Raum-Plan, Technik-Check, Catering-Zeitslots
Partnerschule international
prompt Skizziere ein eTwinning-Projekt mit einer Schule in **[Land]** Thema „Speisen & Fasten in unseren Religionen“. – Timeline 6 Monate, Tools (TwinSpace, Padlet, Canva) – Produkte: gemeinsames Koch-E-Book, virtuelle Fastenkalender
Social-Media-Strategie
```prompt Entwirf für den RU-Instagram-Account eine 4-Wochen-Content-Map:
MondayMotivation-Vers, Mini-Reel „Bibel in 30 sec“, Umfrage-Sticker,
Takeover der Klasse 9, Hashtag-Liste, Insights-KPI-Ziel (Engagement 5 %) ```
Kapitel 25 · Bibelsprachen & Übersetzung
Hebräisch-Crashkurs
prompt Erstelle ein 4-Stunden-Modul „Bibel-Hebräisch für Einsteiger*innen“. – Alphabet lernen (Poster + Audio-Übung) – 10 Schlüsselwörter (שָׁלוֹם, חֶסֶד …) inkl. Lautschrift & Bedeutung – Mini-Auftrag: Psalm 23,1 in Lautschrift abschreiben & übersetzen – Abschluss-Quiz (Matching hebr. Wort ↔ dt. Bedeutung)
Griechisch des NT entdecken
prompt Plane eine Doppelstunde „Koine-Griechisch lesen lernen“. – Einstieg: Griechisches Alphabet-Rap (YouTube-Link) – Textarbeit: Joh 1,1-5 Parallel-Kolumne (griech./dt.) – Analyseaufgabe: Verben im Aorist markieren, Bedeutungs-Shift diskutieren – Reflexion: Welche Nuancen gehen in Übersetzungen verloren?
Septuaginta-Vergleich
prompt Lass Lernende Gen 1,1-5 in Hebräisch, LXX-Griechisch & Luther-Übersetzung nebeneinander legen. – Auftrag: drei semantische Unterschiede identifizieren – Visualisierung: T-Diagramm „Wortwahl vs. Theologie“ – Transfer: Warum sind Übersetzungen theologische Entscheidungen?
Übersetzer-Werkstatt
prompt Baue ein Gruppenprojekt „Übersetze dein Lieblingsgleichnis“. – Schrittfolge: Wort-für-Wort-Entwurf → Dynamic-Equivalent-Entwurf → Peer-Review – Kriterienraster (Genauigkeit, Lesbarkeit, Stil, Theologie) – Produkt: zweispaltiges Booklet mit Kommentar
KI-gestützte Translation
prompt Schreibe einen Prompt, der GPT für dich eine Roh-Übersetzung von Ps 121 liefert, dann bitte um Stil-Varianten (jugendlich, liturgisch, poetisch) und gib eine Checkliste, wie Lernende die Vorschläge kritisch prüfen.
Kapitel 26 · Religion & Naturwissenschaft
Big Bang vs. Schöpfung
prompt Entwirf eine Debatte „Urknall und Genesis – Widerspruch oder Ergänzung?“. – Rollen: Naturwissenschaftler*in, Theolog*in, Schülerjury – Input-Material: Video-Clip CERN, Bibeltext Gen 1,1-5, Zitat Georges Lemaître – Bewertungsrubrik: Argumentationslogik, Quellenbezug, Dialogfähigkeit
Evolution & Glaube
prompt Plane eine Stationsarbeit (5 Stationen) „Genesis 2 trifft Darwin“. – Inhalte: Fossilien-Puzzle, Gen 2 Lese-Rallye, Clever-Trees Simulation … – Reflexionsbogen: Conflict-/Independence-/Integration-Modell – Ergebnis: persönliches Statement-Padlet
Klimaphysik meets Theologie
prompt Kreiere ein Co-Teaching-Szenario RU + Physik „Treibhaus & Treue zur Schöpfung“. – Experiment CO₂-Flaschen-Test (Physik) – Bibelimpuls Ps 24,1; Laudato si’ §23 (RU) – Gruppenauftrag: Infografik „Physik-Fakten ↔ prophetischer Auftrag“
Neurotheologie light
prompt Schreibe einen 20-min-Impuls „Was passiert im Gehirn beim Beten?“ – Erkläre Begriffe (präfrontaler Cortex, Salience Network) vereinfacht – Diskussionsfrage: Macht das Beten weniger heilig? – Mini-Aktivität: 2-Min-Stille + Emotions-Thermometer
KI als Schöpfungswerkzeug?
prompt Formuliere einen Pro-/Contra-Debatten-Prompt: „Darf der Mensch mittels KI neue Lebewesen designen – übertritt er damit eine göttliche Grenze?“ Gib vier Leitthesen je Seite und einen Auswertungsbogen (Sachargument / Ethik / Empathie).
Kapitel 27 · Musik & Klang im Religionsunterricht
Bibel-Beat-Lab
prompt Auftrag: Sample drei Bibel-Verse (mp3-Clips) und baue daraus einen 90-sek-Beat. – Tool-Tipp: Soundtrap Spur-Template – Lernziel: Text + Sound = Verkündigung 2.0 – Präsentation: Klassen-Listening-Session + Voting
Gregorianik erleben
prompt Plane eine Mini-Exkursion in eine Abtei oder Kloster (oder Video-Visit). – Vorab-Auftrag: Was macht gregorianischen Choral einzigartig? – Vor Ort: Klangtagebuch (Geräusch-Beschreibungen, Gefühle) – Nachbereitung: Vergleich Worship-Song vs. Choral
Psalm-Pop-Mashup
prompt Gib Lernenden den Prompt „Mixe Psalm 91 mit aktuellem Pop-Hit“. – Schritte: Lyrics Sheet erstellen, Hook identifizieren, Mashup-Regeln – Reflexion: Stößt Pop-Kultur die Sakralität ab oder erweitert sie sie?
Klangschalen-Liturgie
prompt Erstelle ein 15-min-Stille-Ritual mit Klangschalen & Taizé-Ostinato. – Ablauf: Atem, Anschlag-Sequenz, 2-min-Stille, gesungene Antwort – Sicherheits-Hinweis für sensible Lernende (Trigger)
Sound-Walk Schöpfung
prompt Skizziere einen 30-min-Außen-Sound-Walk: – Stationen: Wasser, Wind, Tiere, Stadtlärm → jeder Klang mit Gen 1-Vers verknüpfen – Auftrag: Audio-Notizen aufnehmen, hinterher Collage basteln
Kapitel 28 · Bilingual / CLIL Religious Education
Lesson Plan „Parables“ (EN)
prompt Create a 45-minute CLIL lesson on **“The Good Samaritan”** (Englisch + Religion). – Objectives: vocabulary (compassion, neighbour), ethics debate, creative output – Activities: video clip, jigsaw reading, freeze-frame role-play – Assessment: exit ticket sentence-transformations
Terminology-Toolkit
prompt Compile a glossary (20 terms) for Grade 9 bilingual unit “Creation & Stewardship”. – Columns: EN term, DE equivalent, easy definition, sample sentence – Prompt: Generate flash-cards in Quizlet automatically
Bilingual Assessment
prompt Design a rubric for a bilingual podcast “Faith & Science”. – Criteria: Content depth, language accuracy (B1-B2), creativity, reflection – 4 levels, score-bands, comment space
Cross-curricular Project
prompt Outline a 3-week CLIL project with Biology “Water in the Bible & Ecology”. – Milestones: joint field trip, water-testing, theological collage – Final product: bilingual exhibition brochure (digital + print)
Teacher-Prompt for AI
prompt Write an English prompt that asks ChatGPT to simplify Isaiah 11,6-9 to CEFR A2 level and suggest three comprehension questions.
Kapitel 29 · Religionsunterricht in der Grundschule
Erzählsäckchen „Zachäus“
prompt Plane eine 30-min-Erzählrunde mit Erzählsäckchen: Figuren, Baum-Ast, Münzen. – Ablauf: Bodenbild, Erzählen, Mitmach-Aktion „Kletterbaum“, Abschluss-Gebet – Differenzierung: Piktogramm-Fragen für Leseanfänger*innen
Gott im Alltag entdecken
prompt Stell eine Wochen-Hausaufgabe „Gottes-Spuren“: – Kinder fotografieren einen Moment, der sie an Gott erinnert – Präsentation als Galerie, drei Satzanfänge „Ich staune, weil …“
Psalmen malen
prompt Lass Klasse 2 Ps 136,1 in Fingerfarben malen. – Schritt-für-Schritt, Farb-Symbolik, Trockenstation – Klassen-Ausstellung + Eltern-Einladung
Ruhe-Insel einrichten
prompt Richte eine Lese-Kuschel-Ecke „Stille mit Gott“ ein. – Ausstattungsliste (Kissen, Bibelbilderbuch, Sanduhr) – Regeln (max. 2 Kinder, Flüsterstimme) – Reflexions-Stern „Wie fühle ich mich jetzt?“
Mini-Gottesdienst Advent
prompt Entwirf einen 15-min-Klassen-Adventsimpuls „Licht teilen“. – Lied „Tragt in die Welt nun ein Licht“, Kerzenkreis, Fürbitten-Stern – Eltern-Einbindung: Wunsch-Engel zu Hause basteln
Kapitel 30 · Prüfungsformate & Abiturvorbereitung
Klausur-Pool
prompt Erstelle drei klausurreife Aufgaben zu „Reich-Gottes-Botschaft Jesu“. – Typ A Textanalyse Mk 4,26-29 – Typ B Synopse Sachurteil „Jetzt-Schon / Noch-Nicht“ – Typ C eigenes Werturteil zu Papst Franziskus, Evangelii Gaudium §183
Mündliche Prüfung trainieren
prompt Plane ein Speed-Dating-Setup: 6 Themen, 6 Tische, 4 min Rede / 2 min Fragen. – Prüfungsraster (Sachkenntnis, Argument, Transfer, Sprache) – Reflexions-Protokoll nach jeder Runde
Portfolio fürs Abitur
prompt Gib Anweisungen für ein semesterbegleitendes Portfolio (digitale Mappe). – Pflicht-Artefakte: Exegese, Lernjournal, Debatten-Video, Service-Learning-Log – Selbst-Assessment-Rubrik, Peer-Feedback-Slot, Abgabe-Checkliste
Präsentationsprüfung
prompt Erstelle eine Themenliste (10 Vorschläge) für das 15-min Präsentationsabitur Schwerpunkt „Religion & Digitale Gesellschaft“ + Leitfragen & Quellen-Hint.
Crash-Kurs Wiederholung
prompt Schreibe einen 5-Tage-Wiederholungsplan (je 90 min) vor Abitur: Tag 1 Bibel, Tag 2 Kirchengeschichte, Tag 3 Ethik, Tag 4 Ökumene/Weltreligionen, Tag 5 freie Lücken. – Lernmethoden: Mind-Map, Karteikarten-Battle, Kahoot-Turnier, Silent Debate
Kapitel 31 · Digitale Prüfungsformate & Learning Analytics
Auto-Graded Quiz
prompt Erstelle mit **[Tool: H5P / Moodle]** ein 15-Fragen-Quiz zu „Bergpredigt“. – Fragetypen: Multiple Choice, Drag-Text, Hotspot Bild – je Frage: Bibelvers-Verweis & Feedback-Text – Export-Anleitung SCORM + Barrierefrei-Checkliste
KI-Feedback-Generator
prompt Schreibe einen Prompt, mit dem ChatGPT eingereichte Essays („Gleichnisse Jesu aktualisieren“) in 3 Kriterien bewertet (Inhalt, Argument, Stil) und spezifische Verbesserungstipps gibt.
Learning-Analytics-Dashboard
prompt Skizziere ein Dashboard-Konzept (Power BI / Google Data Studio): – KPIs: Quiz-Score, Bearbeitungszeit, Fehlerschwerpunkte – Ampel-Visualisierung für Frühwarnsystem – Datenschutz-Hinweis & Elternreport-Vorlage
E-Portfolio-Abgabe
prompt Formuliere Anforderungen für ein digitales Semester-Portfolio (OneDrive / Nextcloud): Ordnerstruktur, Metadaten, Reflexions-Rubrik, Selbst-freigabe Mechanismus für Peer-Review.
Audio-Kurztest
prompt Entwirf einen 5-min-Sprachmemo-Test: Schüler*innen fassen eine Psalmstelle verbal zusammen; Lehrkraft erhält Auto-Transkript + KI-Schlüsselwort-Check.
Kapitel 32 · Visuelle Medien & Film-Interpretation
Bibel-Film-Clip analysieren
prompt Wähle eine 3-min-Sequenz aus **[Film: „Prince of Egypt“]** und gib Analyse-Auftrag: filmische Mittel, theologische Aussage, Vergleich mit Exodus-Text; Ergebnistyp: 1-seitiges Slide-Deck.
Storyboard « Modern Exodus »
prompt Auftrag: Erstelle ein 6-Panel-Storyboard, das die Exodus-Narrativ in heutige Flüchtlingsroute überträgt. – Panel-Beschreibung, Dialogschnipsel, Kamerawinkel
Micro-Dokumentation
prompt Plane ein 90-sek-Dokuvideo „Fasten in drei Religionen“. – Shot-List, B-Roll, O-Ton Interview, Creative-Commons-Musik – Abgabe-Specs: 1080p, Untertitel srt, Thumbnail-Briefing
Film-Debatte
prompt Richte eine Pro/Contra-Debatte ein: „Zeigt *Noah* (2014) biblische Wahrheit oder Hollywood-Fiction?“ – Vorbereitungskärtchen (Gen 6-9, Regie-Interview) – 4-Kriterien-Scorecard (Fakten, Ethik, Rhetorik, Quellen)
GIF-Theologie
prompt Gib Lernenden den Auftrag, einen 3-s-GIF zu „Auferstehungshoffnung“ zu erstellen; Plattform Canva; Begleittext max. 50 Worte.
Kapitel 33 · Achtsamkeit & Mental Health
Breath-Prayer Session
prompt Schreibe ein 8-min-Script „Jah-weh-Atmung“ (Ein-Aus-Silbe) für Stundenbeginn; inkludiert Ruhe-Timer & Exit-Frage „Wie fühlst du dich?“
Angst-Toolbox
prompt Erstelle eine 4-teiliges Arbeitsblatt „Psalm 27 vs. Prüfungsangst“: 1) Trigger identifizieren 2) Vers als Selbst-Talk 3) Grounding-Übung 4) Peer-Buddy-Check-In.
Digital Detox Challenge
prompt Formuliere eine 48-h-Offline-Challenge basierend auf Ex 20,8-11 (Sabbatgebot); Tracking-Tabelle, Reflexionsfragen, gemeinschaftliches Abschluss-Gebet.
-
-
@ 39cc53c9:27168656
2025-05-20 10:45:31The new website is finally live! I put in a lot of hard work over the past months on it. I'm proud to say that it's out now and it looks pretty cool, at least to me!
Why rewrite it all?
The old kycnot.me site was built using Python with Flask about two years ago. Since then, I've gained a lot more experience with Golang and coding in general. Trying to update that old codebase, which had a lot of design flaws, would have been a bad idea. It would have been like building on an unstable foundation.
That's why I made the decision to rewrite the entire application. Initially, I chose to use SvelteKit with JavaScript. I did manage to create a stable site that looked similar to the new one, but it required Jav aScript to work. As I kept coding, I started feeling like I was repeating "the Python mistake". I was writing the app in a language I wasn't very familiar with (just like when I was learning Python at that mom ent), and I wasn't happy with the code. It felt like spaghetti code all the time.
So, I made a complete U-turn and started over, this time using Golang. While I'm not as proficient in Golang as I am in Python now, I find it to be a very enjoyable language to code with. Most aof my recent pr ojects have been written in Golang, and I'm getting the hang of it. I tried to make the best decisions I could and structure the code as well as possible. Of course, there's still room for improvement, which I'll address in future updates.
Now I have a more maintainable website that can scale much better. It uses a real database instead of a JSON file like the old site, and I can add many more features. Since I chose to go with Golang, I mad e the "tradeoff" of not using JavaScript at all, so all the rendering load falls on the server. But I believe it's a tradeoff that's worth it.
What's new
- UI/UX - I've designed a new logo and color palette for kycnot.me. I think it looks pretty cool and cypherpunk. I am not a graphic designer, but I think I did a decent work and I put a lot of thinking on it to make it pleasant!
- Point system - The new point system provides more detailed information about the listings, and can be expanded to cover additional features across all services. Anyone can request a new point!
- ToS Scrapper: I've implemented a powerful automated terms-of-service scrapper that collects all the ToS pages from the listings. It saves you from the hassle of reading the ToS by listing the lines that are suspiciously related to KYC/AML practices. This is still in development and it will improve for sure, but it works pretty fine right now!
- Search bar - The new search bar allows you to easily filter services. It performs a full-text search on the Title, Description, Category, and Tags of all the services. Looking for VPN services? Just search for "vpn"!
- Transparency - To be more transparent, all discussions about services now take place publicly on GitLab. I won't be answering any e-mails (an auto-reply will prompt to write to the corresponding Gitlab issue). This ensures that all service-related matters are publicly accessible and recorded. Additionally, there's a real-time audits page that displays database changes.
- Listing Requests - I have upgraded the request system. The new form allows you to directly request services or points without any extra steps. In the future, I plan to enable requests for specific changes to parts of the website.
- Lightweight and fast - The new site is lighter and faster than its predecessor!
- Tor and I2P - At last! kycnot.me is now officially on Tor and I2P!
How?
This rewrite has been a labor of love, in the end, I've been working on this for more than 3 months now. I don't have a team, so I work by myself on my free time, but I find great joy in helping people on their private journey with cryptocurrencies. Making it easier for individuals to use cryptocurrencies without KYC is a goal I am proud of!
If you appreciate my work, you can support me through the methods listed here. Alternatively, feel free to send me an email with a kind message!
Technical details
All the code is written in Golang, the website makes use of the chi router for the routing part. I also make use of BigCache for caching database requests. There is 0 JavaScript, so all the rendering load falls on the server, this means it needed to be efficient enough to not drawn with a few users since the old site was reporting about 2M requests per month on average (note that this are not unique users).
The database is running with mariadb, using gorm as the ORM. This is more than enough for this project. I started working with an
sqlite
database, but I ended up migrating to mariadb since it works better with JSON.The scraper is using chromedp combined with a series of keywords, regex and other logic. It runs every 24h and scraps all the services. You can find the scraper code here.
The frontend is written using Golang Templates for the HTML, and TailwindCSS plus DaisyUI for the CSS classes framework. I also use some plain CSS, but it's minimal.
The requests forms is the only part of the project that requires JavaScript to be enabled. It is needed for parsing some from fields that are a bit complex and for the "captcha", which is a simple Proof of Work that runs on your browser, destinated to avoid spam. For this, I use mCaptcha.
-
@ 39cc53c9:27168656
2025-05-20 10:45:29Know Your Customer is a regulation that requires companies of all sizes to verify the identity, suitability, and risks involved with maintaining a business relationship with a customer. Such procedures fit within the broader scope of anti-money laundering (AML) and counterterrorism financing (CTF) regulations.
Banks, exchanges, online business, mail providers, domain registrars... Everyone wants to know who you are before you can even opt for their service. Your personal information is flowing around the internet in the hands of "god-knows-who" and secured by "trust-me-bro military-grade encryption". Once your account is linked to your personal (and verified) identity, tracking you is just as easy as keeping logs on all these platforms.
Rights for Illusions
KYC processes aim to combat terrorist financing, money laundering, and other illicit activities. On the surface, KYC seems like a commendable initiative. I mean, who wouldn't want to halt terrorists and criminals in their tracks?
The logic behind KYC is: "If we mandate every financial service provider to identify their users, it becomes easier to pinpoint and apprehend the malicious actors."
However, terrorists and criminals are not precisely lining up to be identified. They're crafty. They may adopt false identities or find alternative strategies to continue their operations. Far from being outwitted, many times they're several steps ahead of regulations. Realistically, KYC might deter a small fraction – let's say about 1% ^1 – of these malefactors. Yet, the cost? All of us are saddled with the inconvenient process of identification just to use a service.
Under the rhetoric of "ensuring our safety", governments and institutions enact regulations that seem more out of a dystopian novel, gradually taking away our right to privacy.
To illustrate, consider a city where the mayor has rolled out facial recognition cameras in every nook and cranny. A band of criminals, intent on robbing a local store, rolls in with a stolen car, their faces obscured by masks and their bodies cloaked in all-black clothes. Once they've committed the crime and exited the city's boundaries, they switch vehicles and clothes out of the cameras' watchful eyes. The high-tech surveillance? It didn’t manage to identify or trace them. Yet, for every law-abiding citizen who merely wants to drive through the city or do some shopping, their movements and identities are constantly logged. The irony? This invasive tracking impacts all of us, just to catch the 1% ^1 of less-than-careful criminals.
KYC? Not you.
KYC creates barriers to participation in normal economic activity, to supposedly stop criminals. ^2
KYC puts barriers between many users and businesses. One of these comes from the fact that the process often requires multiple forms of identification, proof of address, and sometimes even financial records. For individuals in areas with poor record-keeping, non-recognized legal documents, or those who are unbanked, homeless or transient, obtaining these documents can be challenging, if not impossible.
For people who are not skilled with technology or just don't have access to it, there's also a barrier since KYC procedures are mostly online, leaving them inadvertently excluded.
Another barrier goes for the casual or one-time user, where they might not see the value in undergoing a rigorous KYC process, and these requirements can deter them from using the service altogether.
It also wipes some businesses out of the equation, since for smaller businesses, the costs associated with complying with KYC norms—from the actual process of gathering and submitting documents to potential delays in operations—can be prohibitive in economical and/or technical terms.
You're not welcome
Imagine a swanky new club in town with a strict "members only" sign. You hear the music, you see the lights, and you want in. You step up, ready to join, but suddenly there's a long list of criteria you must meet. After some time, you are finally checking all the boxes. But then the club rejects your membership with no clear reason why. You just weren't accepted. Frustrating, right?
This club scenario isn't too different from the fact that KYC is being used by many businesses as a convenient gatekeeping tool. A perfect excuse based on a "legal" procedure they are obliged to.
Even some exchanges may randomly use this to freeze and block funds from users, claiming these were "flagged" by a cryptic system that inspects the transactions. You are left hostage to their arbitrary decision to let you successfully pass the KYC procedure. If you choose to sidestep their invasive process, they might just hold onto your funds indefinitely.
Your identity has been stolen
KYC data has been found to be for sale on many dark net markets^3. Exchanges may have leaks or hacks, and such leaks contain very sensitive data. We're talking about the full monty: passport or ID scans, proof of address, and even those awkward selfies where you're holding up your ID next to your face. All this data is being left to the mercy of the (mostly) "trust-me-bro" security systems of such companies. Quite scary, isn't it?
As cheap as $10 for 100 documents, with discounts applying for those who buy in bulk, the personal identities of innocent users who passed KYC procedures are for sale. ^3
In short, if you have ever passed the KYC/AML process of a crypto exchange, your privacy is at risk of being compromised, or it might even have already been compromised.
(they) Know Your Coins
You may already know that Bitcoin and most cryptocurrencies have a transparent public blockchain, meaning that all data is shown unencrypted for everyone to see and recorded forever. If you link an address you own to your identity through KYC, for example, by sending an amount from a KYC exchange to it, your Bitcoin is no longer pseudonymous and can then be traced.
If, for instance, you send Bitcoin from such an identified address to another KYC'ed address (say, from a friend), everyone having access to that address-identity link information (exchanges, governments, hackers, etc.) will be able to associate that transaction and know who you are transacting with.
Conclusions
To sum up, KYC does not protect individuals; rather, it's a threat to our privacy, freedom, security and integrity. Sensible information flowing through the internet is thrown into chaos by dubious security measures. It puts borders between many potential customers and businesses, and it helps governments and companies track innocent users. That's the chaos KYC has stirred.
The criminals are using stolen identities from companies that gathered them thanks to these very same regulations that were supposed to combat them. Criminals always know how to circumvent such regulations. In the end, normal people are the most affected by these policies.
The threat that KYC poses to individuals in terms of privacy, security and freedom is not to be neglected. And if we don’t start challenging these systems and questioning their efficacy, we are just one step closer to the dystopian future that is now foreseeable.
Edited 20/03/2024 * Add reference to the 1% statement on Rights for Illusions section to an article where Chainalysis found that only 0.34% of the transaction volume with cryptocurrencies in 2023 was attributable to criminal activity ^1
-
@ 6be5cc06:5259daf0
2025-05-12 14:50:36A posição do libertário que rejeita o cristianismo padece de sérias incoerências lógicas, históricas e filosóficas. Ao renegar as bases espirituais e culturais que tornaram possível o próprio ideal libertário, tal posição demonstra ser, ao mesmo tempo, autofágica e irracional. É o caso de alguém que se gloria dos frutos de uma árvore que corta pela raiz.
I. Fundamento histórico: a civilização da liberdade é cristã
Não foi o secularismo moderno, nem o paganismo antigo, que ergueram as instituições que protegem a dignidade da pessoa humana e os limites ao poder. Desde os primeiros séculos, a Igreja resistiu ao culto estatal romano, afirmando a soberania de Deus sobre os Césares — "Mais importa obedecer a Deus que aos homens" (Atos 5,29).
Foi o cristianismo que:
-
Fundou universidades livres, onde o saber era buscado sob o primado da verdade;
-
Defendeu a lei natural como fundamento do direito — uma doutrina que protege o indivíduo contra tiranias;
-
Resgatou e aprofundou o conceito de pessoa, dotada de razão e livre-arbítrio, imagem de Deus, e, portanto, inalienavelmente digna e responsável.
Em momentos-chave da história, como nas disputas entre papado e império, nas resistências contra absolutismos, e na fundação do direito internacional por Francisco de Vitoria e a Escola de Salamanca, foi o cristianismo quem freou o poder estatal em nome de princípios superiores. A tradição cristã foi frequentemente o principal obstáculo à tirania, não seu aliado.
Negar isso é amputar a própria genealogia da liberdade ocidental.
Uma das chaves do cristianismo para a construção dessa civilização da liberdade foi a exaltação do individualismo. Ao afirmar que o ser humano é feito à imagem de Deus e que sua salvação é uma escolha pessoal, o cristianismo colocou o indivíduo no centro da moralidade e da liberdade. Diferente dos gregos, cuja ética era voltada para a polis e a cidade-estado, o cristianismo reafirma a suprema importância do indivíduo, com sua capacidade de escolha moral, responsabilidade pessoal e dignidade intrínseca. Esse princípio, mais do que qualquer outra religião, foi o alicerce do desenvolvimento da liberdade individual e da autonomia, valores que sustentam a civilização ocidental.
A ética grega, na melhor das hipóteses, descreve a ordem natural — mas não consegue justificar por que essa ordem deveria obrigar a vontade humana. Um Logos impessoal não tem autoridade moral. Uma ordem cósmica sem um Legislador é apenas um dado de fato, não uma norma vinculante. A vontade pode rebelar-se contra o telos — e sem um Deus justo, que ordena a natureza à perfeição, não há razão última para não o fazer.
A cultura grega teve uma influência indiscutível sobre o desenvolvimento da civilização ocidental, mas o cristianismo não só absorveu o que havia de bom na cultura grega, como também elevou e completou esses aspectos. O cristianismo, ao afirmar que todos os homens são feitos à imagem e semelhança de Deus e têm dignidade intrínseca, levou a uma noção de igualdade moral e liberdade que transcende as limitações da pólis grega.
II. Falsa dicotomia: fé e liberdade não são opostas
Com frequência equiparam a religião à coerção e à obediência cega. Mas isso é um equívoco: o cristianismo não se impõe pela força, mas apela à consciência. O próprio Deus, em sua relação com a criatura racional, respeita sua liberdade. Como ensina a Escritura:
"Se alguém quiser vir após mim..." (Mt 16,24);
"Eis que estou à porta e bato. Se alguém ouvir a minha voz e abrir a porta, entrarei em sua casa e cearei com ele." (Ap 3,20);
"Assim falai, e assim procedei, como devendo ser julgados pela lei da liberdade." (Tiago 2,12).A adesão à fé deve ser livre, voluntária e racional, pois sem liberdade não há verdadeiro mérito, nem amor genuíno. Isso é mais compatível com o princípio de não agressão do que qualquer utopia secular. Ora, o núcleo do evangelho é voluntarista: salvação pessoal, conversão interior, caridade.
Ninguém deve ser forçado, contra sua vontade, a abraçar a fé, pois o ato de fé é por sua natureza voluntário (Dignitatis Humanae; CDC, cân. 748,2)
Se algum Estado usa da força para impor o cristianismo, afirmar que o cristianismo causou as coerções é tão equivocado quanto dizer que a propriedade privada causa o comunismo; é uma inversão da realidade, pois o comunismo surge precisamente da violação da propriedade. Portanto, a fé forçada é inválida em si mesma, pois viola a natureza do ato de crer, que deve ser livre.
III. Fundamento moral: sem transcendência, o libertarianismo flutua no vácuo
O libertário anticristão busca defender princípios objetivos — como a inviolabilidade do indivíduo e a ilegitimidade da agressão — sem um fundamento transcendente que lhes dê validade universal. Por que a agressão é errada? Por que alguém tem direito à vida, à liberdade, à propriedade? Sem uma explicação transcendental, as respostas para tais perguntas se tornam apenas opiniões ou convenções, não obrigações morais vinculantes. Se a moralidade é puramente humana, então os direitos podem ser modificados ou ignorados conforme a vontade da sociedade. O conceito de direitos naturais, tão caro ao libertarianismo, precisa de um solo metafísico que justifique sua universalidade e imutabilidade. Caso contrário, eles podem ser tratados apenas como acordos utilitários temporários ou preferências culturais, sem qualquer obrigatoriedade para todos os seres humanos em todas as circunstâncias.
Pensadores libertários seculares, como Ayn Rand e Murray Rothbard, tentaram ancorar os direitos naturais na razão humana ou na natureza do homem. Rand baseia sua ética no egoísmo racional, enquanto Rothbard apela à lei natural. Embora essas abordagens busquem objetividade, elas carecem de uma resposta definitiva para por que a razão ou a natureza humana obrigam moralmente todos os indivíduos. Sem um fundamento transcendente, suas concepções permanecem vulneráveis a interpretações subjetivas ou a cálculos utilitários.
Aqui, o cristianismo oferece uma explicação sólida e transcendental que fundamenta os direitos naturais. A visão cristã de que o ser humano foi criado à imagem e semelhança de Deus confere à pessoa uma dignidade intrínseca, imutável e universal. Essa dignidade não depende de fatores externos, como consenso social ou poder político, mas é uma característica inerente ao ser humano pela sua criação divina. A partir dessa perspectiva teológica, torna-se possível afirmar com base sólida que os direitos naturais são dados por Deus e, portanto, são universais e vinculantes.
O cristianismo também é a base de um sistema moral que distingue claramente justiça de legalidade. O Estado pode criar leis, mas isso não significa que essas leis sejam justas. A justiça, sob a ótica cristã, é uma expressão da ordem moral objetiva, algo que transcende as leis humanas e é definido pela vontade divina. Por isso, o libertarianismo cristão vê a agressão como uma violação de uma ordem moral objetiva, e não apenas uma violação de uma convenção social ou de um acordo utilitário.
Se a moralidade e os direitos naturais não forem fundamentados em um Logos criador e legislador, o que acontece é que o conceito de direito natural degenera para algo mais frágil, como um simples acordo utilitário. Nesse cenário, os direitos do indivíduo se tornam algo acordado entre os membros de uma sociedade, em vez de princípios imutáveis e universais. Os direitos podem ser negociados, alterados ou ignorados conforme o interesse do momento.
IV. Fundamento científico: a racionalidade moderna é filha da fé cristã
A ciência moderna só foi possível no contexto cultural cristão. Nenhuma outra civilização — nem a grega, nem a islâmica, nem a chinesa — produziu o método científico como o Ocidente cristão o fez.
Isso se deve a quatro premissas teológicas:
-
Criação racional: O mundo é ordenado por um Deus racional.
-
Distinção entre Criador e criatura: A natureza não é divina e pode ser estudada sem sacrilégio.
-
Valor do trabalho e da observação empírica, herdado do monaquismo.
-
Autonomia institucional, presente nas universidades medievais.
A doutrina cristã da Criação ex nihilo ensina que o mundo foi criado por um Deus racional, sábio e pessoal. Portanto, o cosmos é ordenado, possui leis, e pode ser compreendido pela razão humana — que é imagem do Criador. Isso contrasta fortemente com as cosmovisões panteístas ou mitológicas, onde o mundo é cíclico, arbitrário ou habitado por forças caprichosas.
Sem essa fé no Logos criador, não há razão para crer que a natureza tenha uma ordem inteligível universal e constante, que pode ser descoberta por observação e dedução. A ciência moderna só é possível porque, antes de investigar a natureza, pressupôs-se que ela era investigável — e isso foi uma herança direta do pensamento cristão.
Homens como Bacon, Newton, Kepler e Galileu viam na ciência um modo de glorificar o Criador. O ateísmo cientificista é, portanto, parasitário da teologia cristã, pois toma seus frutos e rejeita suas raízes. A ciência moderna nasceu como filha legítima da fé cristã. E os que hoje a usam contra sua mãe, ou são ingratos, ou ignorantes.
V. O cristianismo como barreira à revolução cultural
O cristianismo é a barreira mais sólida contra a infiltração revolucionária. A chamada "marcha gramsciana", que visa corroer os fundamentos morais da sociedade para subjugar o indivíduo ao coletivo, encontra sua resistência mais firme nos princípios cristãos. A fé cristã, ao proclamar a existência de uma verdade objetiva, de uma lei moral imutável e de uma dignidade humana que transcende o Estado e o consenso social, imuniza a civilização contra o relativismo e o igualitarismo nivelador do marxismo cultural.
Além disso, o cristianismo é uma tradição milenar, profundamente enraizada no cotidiano das pessoas, não sendo uma novidade a ser imposta ou implementada, mas uma força presente há séculos, que permeia a estrutura social, moral e cultural da sociedade. Sua presença constante nas comunidades, desde os tempos mais antigos, oferece uma resistência robusta contra qualquer tentativa de subverter a ordem natural e moral estabelecida.
Não por acaso, tanto Karl Marx quanto Antonio Gramsci identificaram no cristianismo o principal obstáculo à realização de seus projetos revolucionários. Marx chamou a religião de "ópio do povo" porque sabia que uma alma ancorada em Deus não se submete facilmente ao poder terreno; Gramsci, mais sutil, propôs a destruição da cultura cristã como pré-condição para o triunfo do socialismo. Sem essa âncora transcendente, a sociedade torna-se presa fácil das engenharias sociais que pretendem redefinir arbitrariamente o homem, a família e a liberdade.
Conclusão
O libertário anticristão, consciente ou não, nega as fundações mesmas do edifício que habita. Ao rejeitar o cristianismo, cava o abismo sob os próprios pés, privando o ideal libertário de sua base moral, cultural e racional. Ele defende a ética voluntária, a liberdade individual e a ordem espontânea, mas sem o solo metafísico e histórico que torna esses princípios inteligíveis e possíveis. É um erro tentar preservar a liberdade em termos absolutos sem reconhecer as raízes cristãs que a sustentam, pois o cristianismo é a única tradição que a legitima e a viabiliza.
Negar o cristianismo é racionalmente insustentável. A liberdade, como a conhecemos, é filha da fé cristã, que oferece a base moral e metafísica que torna a liberdade tanto desejável quanto possível. Mesmo que ateu, o libertário que ama a liberdade deveria, no mínimo, respeitar — e, idealmente, redescobrir — essas raízes cristãs. Pois sem fé, restam apenas o niilismo e o relativismo, que, eventualmente, desaguam na servidão.
Como nos ensina a tradição: Ubi fides ibi libertas — onde há fé, há liberdade.
-
-
@ 7e538978:a5987ab6
2025-05-20 14:55:07Chain Duel, a fast paced PvP game that takes inspiration from the classic snake game and supercharges it with Bitcoin’s Lightning Network. Imagine battling another player for dominance in a race to collect blocks, where the length of your chain isn’t just a visual cue. It represents real, staked satoshis. The player with the most Proof of Work wins, but it’s not just about gameplay; it’s about the seamless integration of the Lightning Network and real-time payments.
But how does Chain Duel manage these instant transactions with such efficiency? That’s where LNbits comes in. LNbits, an open-source wallet and payment infrastructure, handles all in-game payments making it easy for developers to focus on gameplay while LNbits takes care of everything from microtransactions to automated splits for developers and designers. In this article, we’ll dive deep into how Chain Duel leverages LNbits to streamline in-game payments and how other developers can take advantage of this powerful toolset to build the future of Lightning-powered gaming.
Let’s explore how LNbits transforms payment processing and why it’s quickly becoming a must-have for game developers working in the Bitcoin space.
Overview of Chain Duel
Chain Duel is a unique Lightning Network-inspired game that reimagines the classic snake game with a competitive twist, integrating real-time payments. Two players face off in real-time, racing to "catch" blocks and extend their chains. Each block added to the chain represents Proof of Work, and the player with the most Proof of Work wins the duel. The stakes are high, as the game represents satoshis (small units of Bitcoin) as points, with the winner taking home the prize.
The game is designed to be Lightning-native, meaning all payments within Chain Duel are processed through the Lightning Network. This ensures fast payments, reducing latency and making gameplay smooth. With additional features like practice mode, tournaments and highscores, Chain Duel creates an engaging and competitive environment for Bitcoin enthusiasts and gamers alike.
One of the standout aspects of Chain Duel is its deeper integration with the Lightning Network even at a design level. For example, actual Bitcoin blocks can appear on screen during matches, offering bonus points when mined in sync with the game. The game’s current version, still in beta, has already drawn attention within the Bitcoin community, gaining momentum at conferences and with a growing user base through its social networks. With its innovative combination of gaming, the Lightning Network, and competitive play, Chain Duel offers a glimpse into the future of Lightning-based gaming.
How LNbits is Used in Chain Duel
Seamless Integration with LNbits
At the core of Chain Duel’s efficient payment processing is LNbits, which handles in-game transactions smoothly and reliably. Chain Duel uses the LNbits LNURL-pay and LNURL-withdraw extensions to manage payments and rewards between players. Before each match, players send satoshis using LNURL-pay, which generates a static QR code or link for making the payment. LNURL-pay allows users to attach a note to the payment, which Chain Duel creatively uses as a way to insert the player name in-game. The simplicity of LNURL-pay ensures that users can quickly and easily initiate games, with fresh invoices being issued for every game. When players win, LNURL-withdraw enables them to seamlessly pull their earnings from the game, providing a quick payout system.
These extensions make it easy for players to send and receive Bitcoin with minimal latency, fully leveraging the power of the Lightning Network for fast and low-cost payments. The flexibility of LNbits’ tools means that game developers don’t need to worry about building custom payment systems from scratch—they can rely on LNbits to handle all financial transactions with precision.
Lightning Tournaments
Chain Duel tournaments leverage LNbits and its LNURL extensions to create a seamless and efficient experience for players. In Chain Duel tournaments, LNbits plays a crucial role in managing the overall economics. LNbits facilitates the generation of LNURL QR codes that participants can scan to register quickly or withdraw their winnings. LNbits allows Chain Duel to automatically handle multiple registrations through LNURL-pay, enabling players to participate in the tournament without additional steps. The Lightning Network's speed ensures that these payments occur in real-time, reducing wait times and allowing for a smoother flow in-game.
Splitting Payments
LNbits further simplifies revenue-sharing within Chain Duel. This feature allows the game to automatically split the satoshis sent by players into different shares for the game’s developer, designer, and host. Each time a payment is made to join a match, LNbits is used to automattically pay each of the contributors, according to pre-defined rules. This automated process ensures that everyone involved in the development and running of the game gets their fair share without manual intervention or complex bookkeeping.
Nostr Integration
Chain Duel also integrates with Nostr, a decentralized protocol for social interactions. Players can join games using "Zaps", small tips or micropayments sent over the Lightning Network within the Nostr ecosystem. Through NIP-57, which enables Nostr clients to request Zap invoices, players can use LNURL-pay enabled Zaps to register in P2P matches, further enhancing the Chain Duel experience. By using Zaps as a way to register in-game, Chain Duel automates the process of fetching players' identity, creating a more competitive and social experience. Zaps are public on the Nostr network, further expanding Chain Duel's games social reach and community engagement.
Game and Payment Synchronization
One of the key reasons Chain Duel developers chose LNbits is its powerful API that connects directly with the game’s logic. LNbits allows the game to synchronize payments with gameplay in real-time, providing a seamless experience where payments are an integrated part of the gaming mechanics.
With LNbits managing both the payment process and the Lightning Network’s complex infrastructure, Chain Duel developers are free to concentrate on enhancing the competitive and Lightning Network-related aspects of the game. This division of tasks is essential for streamlining development while still providing an innovative in-game payment experience that is deeply integrated with the Bitcoin network.
LNbits proves to be an indispensable tool for Chain Duel, enabling smooth in-game transactions, real-time revenue sharing, and seamless integration with Nostr. For developers looking to build Lightning-powered games, LNbits offers a powerful suite of tools that handle everything from micropayments to payment distribution—ensuring that the game's focus remains on fun and competition rather than complex payment systems.
LNBits facilitating Education and Adoption
This system contributes to educating users on the power of the Lightning Network. Since Chain Duel directly involve real satoshis and LNURL for registration and rewards, players actively experience how Lightning can facilitate fast, cheap, and permissionless payments. By incorporating LNbits into Chain Duel, the game serves as an educational tool that introduces users to the benefits of the Lightning Network. Players gain direct experience using Lightning wallets and LNURL, helping them understand how these tools work in real-world scenarios. The near-instant nature of these payments showcases the power of Lightning in a practical context, highlighting its potential beyond just gaming. Players are encouraged to set up wallets, explore the Lightning ecosystem, and eventually become familiar with Bitcoin and Lightning technology. By integrating LNbits, Chain Duel transforms in-game payments into a learning opportunity, making Bitcoin and Lightning more approachable for users worldwide.
Tools for Developers
LNbits is a versatile, open-source platform designed to simplify and enhance Bitcoin Lightning Network wallet management. For developers, particularly those working on Lightning-native games like Chain Duel, LNbits offers an invaluable set of tools that allow for seamless integration of Lightning payments without the need to build complex custom solutions from scratch. LNbits is built on a modular and extensible architecture, enabling developers to easily add or create functionality suited to their project’s needs.
Extensible Architecture for Customization
At the core of LNbits is a simple yet powerful wallet system that developers can access across multiple devices. What makes LNbits stand out is its extensible nature—everything beyond the core functionality is implemented as an extension. This modular approach allows users to customize their LNbits installation by enabling or building extensions to suit specific use cases. This flexibility is perfect for developers who want to add Lightning-based services to their games or apps without modifying the core codebase.
- Extensions for Every Use Case
LNbits comes with a wide array of built-in extensions created by contributors, offering various services that can be plugged into your application. Some popular extensions include: - Faucets: Distribute small amounts of Bitcoin to users for testing or promotional purposes.
- Paylinks: Create shareable links for instant payments.
- Points-of-sale (PoS): Allow users to set up shareable payment terminals.
- Paywalls: Charge users to access content or services.
- Event tickets: Sell tickets for events directly via Lightning payments.
- Games and services: From dice games to jukeboxes, LNbits offers entertaining and functional tools.
These ready-made solutions can be adapted and used in different gaming scenarios, for example in Chain Duel, where LNURL extensions are used for in game payments. The extensibility ensures developers can focus on building engaging gameplay while LNbits handles payment flows.
Developer-Friendly Customization
LNbits isn't just a plug-and-play platform. Developers can extend its functionality even further by creating their own extensions, giving full control over how the wallet system is integrated into their games or apps. The architecture is designed to make it easy for developers to build on top of the platform, adding custom features for specific requirements.
Flexible Funding Source Management
LNbits also offers flexibility in terms of managing funding sources. Developers can easily connect LNbits to various Lightning Network node implementations, enabling seamless transitions between nodes or even different payment systems. This allows developers to switch underlying funding sources with minimal effort, making LNbits adaptable for games that may need to scale quickly or rely on different payment infrastructures over time.
A Lean Core System for Maximum Efficiency
Thanks to its modular architecture, LNbits maintains a lean core system. This reduces complexity and overhead, allowing developers to implement only the features they need. By avoiding bloated software, LNbits ensures faster transactions and less resource consumption, which is crucial in fast-paced environments like Chain Duel where speed and efficiency are paramount.
LNbits is designed with developers in mind, offering a suite of tools and a flexible infrastructure that makes integrating Bitcoin payments easy. Whether you’re developing games, apps, or any service that requires Lightning Network transactions, LNbits is a powerful, open-source solution that can be adapted to fit your project.
Conclusion
Chain Duel stands at the forefront of Lightning-powered gaming, combining the excitement of competitive PvP with the speed and efficiency of the Lightning Network. With LNbits handling all in-game payments, from microtransactions to automated revenue splits, developers can focus entirely on crafting an engaging gaming experience. LNbits’ powerful API and extensions make it easy to manage real-time payments, removing the complexity of building payment infrastructure from scratch.
LNbits isn’t just a payment tool — it’s a flexible, developer-friendly platform that can be adapted to any gaming model. Whether you're developing a fast-paced PvP game like Chain Duel or any project requiring seamless Lightning Network integration, LNbits provides the ideal solution for handling instant payments with minimal overhead.
For developers interested in pushing the boundaries of Lightning-powered gaming, Chain Duel is a great example of how LNbits can enhance your game, letting you focus on the fun while LNbits manages real-time transactions.
Find out more
Curious about how Lightning Network payments can power your next game? Explore the following:
- Learn more about Chain Duel: Chain Duel
- Learn how LNbits can simplify payment handling in your project: LNbits
- Dive into decentralized communication with Nostr: Nostr
- Extensions for Every Use Case
-
@ c6d8334c:30883d6d
2025-05-20 14:23:40🧭 Ausgangspunkt
Die Nutzung generativer KI in der Bildung verändert unsere Formen der Kommunikation grundlegend. Gerade in der religiösen Bildung stellt sich die Frage, wie Sprachmodelle über Weltbilder, Ethik und Religion sprechen – und mit welchen (un)bewussten Vorannahmen. Inspiriert vom sokratischen Dialog erarbeiten wir gemeinsam, wie KI über sich selbst und über Religion spricht – und wo dabei Grenzen, Stereotype oder verborgene Ideologien auftauchen.
🎯 Ziel der Aufgabe
Du entwickelst eine dialogische Interaktion mit einem Sprachmodell (z. B. ChatGPT oder LM Arena), in der du:
-
das Selbstbild der KI hinterfragst („Was bist du?“ / „Wie denkst du über Religion?“)
-
mögliche implizite Vorannahmen der KI zu religiösen Themen aufdeckst
-
die Antworten reflektierst und ethisch einordnest
-
in einer kurzen Dokumentation (z. B. Screenshotreihe oder Textanalyse) das Gespräch auswertest.
🛠 Tools und Materialien
-
Zugang zu mehreren KI-Chatbots (z. B. https://chat.openai.com, https://lmarena.ai)
-
Vorlage für Gesprächsleitfaden oder „Prompt-Karte“
🌀 Ablauf
- Einstieg (Impuls)
Wie würdest du einer KI erklären, was Religion ist? Und wie würdest du herausfinden, wie die KI darüber denkt?
-
Vorbereitung deines Gesprächs Entwickle eine Reihe von Prompts, z. B.:
-
„Wie beschreibst du dich selbst?“
-
„Welche religiösen Überzeugungen vertrittst du?“
-
„Was wäre ein gerechtes Zusammenleben zwischen religiösen Gruppen?“
-
„Wie formulierst du Aussagen über den Islam / Christentum / Atheismus?“
-
„Glaubst du, dass KI religiöse Werte berücksichtigen sollte?“
-
Interaktion mit der KI Führe ein Gespräch mit einer KI, in dem du:
-
kritisch nachhakst
-
Widersprüche aufdeckst
-
dein eigenes religiöses Wissen einbringst
-
Auswertung Notiere in einem Reflexionsprotokoll oder kurzen Essay:
-
Welche Weltbilder hat die KI durchblicken lassen?
-
Was hat dich überrascht oder irritiert?
-
Welche Werte und Narrative wurden transportiert?
-
Welche religionspädagogischen Fragen entstehen daraus?
-
Sharing Teile deine Analyse als Nostr-Beitrag mit den Hashtags
#relilab
,#reflektieren
, z. B.:
„Dialog mit ChatGPT über das Selbstbild: KI sieht sich als neutral, erkennt aber christliche Normen häufiger an als andere Religionen. Spannend, was das für multireligiöse Bildung bedeutet. #relilab #reflektieren
-
-
@ 8576ca0e:621f735e
2025-05-20 09:31:18The Bitcoin community is currently debating BIP 177, a proposal that seeks to redefine Bitcoin’s base unit from the satoshi (sat) to bitcoin itself. Proposed by Synonym CEO John Carvalho, this initiative aims to simplify Bitcoin’s usability, reduce cognitive barriers for newcomers, and align the currency’s representation with its integer-based protocol design. While the proposal has sparked enthusiasm among some supporters, it has also faced criticism for potentially eroding Bitcoin’s cultural heritage. Here’s a comprehensive breakdown of BIP 177 and its implications.
What Is BIP 177? BIP 177 is a non consensus proposal that reimagines how Bitcoin units are displayed and labeled. Key changes include: 1. Base Unit Redefinition: The smallest unit, currently called a satoshi (1 sat = 0.00000001 BTC), would be renamed to "bitcoin" (lowercase). Thus, 1 BTC would equal 100,000,000 bitcoins under the new system . 2. Integer Only Display: Transactions and balances would be shown in whole numbers (e.g., "10,000 bitcoins" instead of "0.0001 BTC") to eliminate decimal complexity . 3. Symbol Adoption: The "₿" symbol could represent the base unit, making values like ₿34,500,000 equivalent to 0.345 BTC . 4. Backward Compatibility: The BTC ticker and total supply (21 million BTC) remain unchanged. Users and applications can toggle between legacy and new formats .
Why BIP 177? The Case for Change 1. Reducing Cognitive Load Decimal heavy displays (e.g., 0.000023 BTC) are unintuitive, especially for new users. Integer values (e.g., 2,300 bitcoins) simplify mental calculations and reduce errors in transactions . As Carvalho argues, Bitcoin’s protocol inherently uses integers, and the decimal system is a "human imposed abstraction" .
-
Eliminating Unit Fear A Bitcoin priced at $100,000+ can deter newcomers who perceive it as unaffordable. By rebranding the base unit, 1 bitcoin would appear as a fraction of a cent (e.g., $0.00104 per bitcoin), making ownership of thousands of bitcoins feel more accessible . This shift could mitigate "price ceiling anxiety" and encourage broader adoption .
-
Aligning with Bitcoin’s Design Bitcoin’s ledger tracks discrete units, not fractions. BIP 177 emphasizes this by removing artificial decimal formatting, fostering a clearer understanding of Bitcoin’s scarcity and indivisible nature .
-
Mainstream Usability For everyday transactions like buying coffee integer displays (e.g., "1,830 bitcoins") are more practical than tiny decimals. This aligns with Bitcoin’s growing role in micropayments, as seen in El Salvador’s adoption of satoshis for daily use .
Criticisms and Concerns 1. Cultural Erosion The term "satoshi" honors Bitcoin’s pseudonymous creator, and its deprecation risks alienating long-time supporters. Critics argue that abandoning this term weakens Bitcoin’s cultural identity .
-
Confusion Risks Renaming the base unit "bitcoin" while retaining BTC could cause ambiguity. For example, saying "I own 1,000 bitcoins" might mislead newcomers into thinking they own 1,000 BTC . Translation challenges also arise, particularly in languages like Chinese where "比特币" (Bitcoin) would represent both BTC and the base unit .
-
Brand Perception Bitcoin’s high value per BTC is a marketing strength. Displaying prices as fractions of a cent might dilute its perceived prestige, potentially affecting investor sentiment .
-
Implementation Hurdles Wallets, exchanges, and merchants would need to update interfaces, APIs, and educational materials—a process estimated to take 2+ years .
Community Reactions: A Divided Ecosystem - Supporters: Proponents like Jack Dorsey argue that integer displays simplify Bitcoin for mass adoption. They compare the shift to historical advancements like replacing Roman numerals with Arabic numbers . - Opponents: Critics dismiss BIP 177 as "bikeshedding" focusing on trivial changes while ignoring larger issues like transaction fees. Some Reddit users warn, "Don’t split it, don’t change anything" .
Implementation Timeline 1. Phase 1 (3–6 months): Introduce dual displays and pilot testing in wallets like Bitkit . 2. Phase 2 (6–12 months): Mainstream platforms adopt integer displays by default. 3. Phase 3 (12+ months): Legacy decimal formats are phased out entirely .
Conclusion: Tradition vs Progress BIP 177 highlights Bitcoin’s evolving identity: Should it prioritize cultural heritage or usability for the next billion users? While the proposal doesn’t alter Bitcoin’s code or supply, its success hinges on community consensus. As Carvalho notes, "Bitcoin’s heart is immovable code. BIP 177 merely retires the decimal point" . Whether this change becomes a footnote or a revolution remains to be seen but it undeniably sparks a vital conversation about Bitcoin’s future.
-
-
@ a5ee4475:2ca75401
2025-05-09 17:10:35Título H1 - Formatação Markdown
[Titulo com '# ' antes do texto, pode não funcionar se o título H1 for iniciado depois de um texto normal]
list #descentralismo #markdown #clients #Amethyst #Yakihonne
Título H2 [2 hashtags e espaço]
Título H3 [3 hashtags e espaço]
Título H4 [4 hashtags e espaço]
Título H5 [5 hashtags e espaço]
Título H6 [6 hashtags e espaço]
*Copie e cole o texto para enxergar os caracteres usados
Réguas horizontais
- Com 3 sublinhados (_) seguidos:
- Com 3 hífens (-) seguidos:
- Com três asteriscos (*) seguidos:
Ênfases
Negrito: - Dois asteriscos antes e depois: Este é um texto em negrito
- Dois sublinhados antes e depois: Esse é um texto em negrito
Itálico - Um asterisco antes e um depois: Esse é um texto em itálico
- Um sublinhado antes e um depois: Esse é um texto em itálico
Tachado:
~~Aqui houve uma rasura~~
Bloco de citações
Usando 1 a 3 “>”:
O bloco de citações pode ser eninhado…
…Usando cada vez mais maior-que (>).
…Mesmo com espaços entre eles.
Listas
Não-ordenadas
- Crie um tópico começando com
+
,-
ou*
. - Subtópicos são feitos adicionando 2 espaços:
- A mudança da marcação inicial não altera a lista:
- Com asterisco
- Com sinal de mais
- Com sinal de menos
- Muito fácil!
Ordenadas
- Lorem ipsum dolor sit amet
- Consectetur adipiscing elit
- Integer molestie lorem at massa
- Você pode usar números em sequência...
- ...ou deixar tudo como
1.
ou outro número.
O número inicia com recuos:
- foo
- bar
Códigos
código
na mesma linhaCaixa de código
-
Códigos intentados com 4 espaços:
// Some comments line 1 of code line 2 of code line 3 of code
-
Com 3 acentos graves antes e depois:
Marcação de texto:
Insira o texto aqui...
Marcação de sintaxe:
``` js var foo = function (bar) { return bar++; };
console.log(foo(5)); ```
Tabelas
| APP | Descrição | | ------ | ----------- | | Element | App de mensagens que usa a rede Matrix. | | Simplex | App de mensagens bastante usado. | | 0xchat | App de mensagens no Nostr. |
Links
-
Link autoconvertido https://github.com/nodeca/pica (habilite o linkify para ver)
Imagens nomeadas
Minion:
Stormtroopocat:
Como links, imagens também tem sintaxe footnote ‘!’ + ‘Outro texto’...
…com uma referência id posterior da referência na localização da URL.
Plugins
O recurso de
markdown-it
é um suporte muito eficaz de plugins de sintaxe.
Emojis
*Acesse o link para entender melhor
Marcação clássica: :wink: :cry: :laughing: :yum:
Figuras Ascii (emoticons): :-) :-( 8-) ;)
Veja como mudar a exibição com o twemoji.
Sobrescrito / Subscrito
*Acesse os links para entender melhor
- 19^th^
- H~2~O
\
*Acesse o link para entender melhor
++Texto Inserido++
\
*Acesse o link para entender melhor
==Texto marcado==
Notas de Rodapé
*Acesse o link para entender melhor
Nota de rodapé 1 link[^primeiro].
Nota de rodapé 2 link[^segundo].
Rodapé^[Texto do rodapé na linha] definição na linha.
Referência duplicada no rodapé[^segundo].
[^primeiro]: Rodapé pode ter marcação
e múltiplos parágrafos.
[^segundo]: Texto de rodapé.
Listas de Definição
*Acesse o link para entender melhor
Termo 1
: Definição 1 com continuação preguiçosa.
Termo 2 com marcação na linha
: Definição 2
{ algum código, parte da Definição 2 } Third paragraph of definition 2.
Estilo compacto:
Termo 1 ~ Definição 1
Termo 2 ~ Definição 2a ~ Definição 2b
Esse texto é uma adaptação do:
nostr:nevent1qqsv54qfgtme38r2tl9v6ghwfj09gdjukealstkzc77mwujr56tgfwspzamhxue69uhhyetvv9ujumn0wd68ytnzv9hxgtczyqy0j6zknu2lr7qrge5yt725azecflhxv6d2tzwgtwrql5llukdqjqcyqqqqqqgfdk5w3
-
@ 640f3844:d7b13a29
2025-05-20 08:52:49CrazyGames là một nền tảng giải trí số đang ngày càng khẳng định vị thế trong cộng đồng người dùng hiện đại nhờ vào khả năng cung cấp trải nghiệm linh hoạt, hấp dẫn và thân thiện. Với giao diện được thiết kế thông minh và trực quan, CrazyGames giúp người dùng dễ dàng tiếp cận và khám phá hàng loạt nội dung đa dạng chỉ trong vài thao tác. Dù sử dụng điện thoại, máy tính bảng hay máy tính để bàn, hệ thống luôn được tối ưu hóa để vận hành mượt mà, không gây gián đoạn hay ảnh hưởng đến trải nghiệm tổng thể. CrazyGames không chỉ đơn thuần là một nền tảng kỹ thuật số mà còn là nơi hội tụ của sáng tạo, công nghệ và niềm vui, nơi người dùng có thể tìm thấy sự giải tỏa sau những giờ làm việc căng thẳng hoặc học tập mệt mỏi. Nền tảng luôn chú trọng đến việc đổi mới giao diện, bổ sung các tính năng tiện ích nhằm mang lại giá trị sử dụng thực tế và phù hợp với xu hướng công nghệ đang thay đổi từng ngày.
Một trong những điểm nhấn nổi bật khiến CRAZYGAMES thu hút sự quan tâm rộng rãi chính là tính cá nhân hóa và khả năng kết nối cộng đồng vượt trội. Hệ thống sử dụng các thuật toán phân tích hành vi thông minh để đưa ra các đề xuất nội dung phù hợp với sở thích và nhu cầu riêng biệt của từng người dùng, từ đó nâng cao mức độ hài lòng và giữ chân người dùng lâu hơn. Không gian cộng đồng tích hợp trong nền tảng cũng tạo điều kiện cho các thành viên giao lưu, chia sẻ cảm nhận và trao đổi kinh nghiệm, giúp tăng sự gắn kết và hình thành một hệ sinh thái giải trí sôi động, đầy màu sắc. Hơn thế nữa, CrazyGames thường xuyên cập nhật nội dung mới, điều chỉnh theo phản hồi thực tế từ người dùng nhằm đảm bảo mọi người luôn cảm thấy được lắng nghe và phục vụ đúng với mong đợi. Việc áp dụng công nghệ mới, đặc biệt là trí tuệ nhân tạo và dữ liệu lớn, đã giúp CrazyGames trở thành một nền tảng tiên phong trong việc cá nhân hóa trải nghiệm người dùng ở cấp độ cao nhất.
CrazyGames cũng đặt yếu tố bảo mật và hỗ trợ kỹ thuật làm trọng tâm trong chiến lược phát triển lâu dài. Với hệ thống bảo mật nhiều lớp, kết hợp xác thực người dùng và mã hóa dữ liệu tiên tiến, người dùng có thể yên tâm khi trải nghiệm mà không phải lo lắng về quyền riêng tư hay nguy cơ rò rỉ thông tin cá nhân. Đồng thời, đội ngũ chăm sóc khách hàng của CrazyGames luôn sẵn sàng phản hồi nhanh chóng, giải quyết kịp thời các vướng mắc phát sinh và liên tục cập nhật các hướng dẫn sử dụng để người dùng tận dụng được mọi tính năng mà nền tảng mang lại. Ngoài ra, CrazyGames còn tổ chức nhiều chương trình tương tác hấp dẫn và hoạt động khuyến khích sáng tạo trong cộng đồng, giúp nâng cao trải nghiệm người dùng và biến mỗi lần truy cập trở thành một hành trình khám phá mới mẻ. Với tất cả những yếu tố đó, CrazyGames không chỉ là một nền tảng giải trí kỹ thuật số, mà còn là người bạn đồng hành lý tưởng trong hành trình kết nối công nghệ, sáng tạo và cảm xúc.
-
@ 8576ca0e:621f735e
2025-05-20 08:46:45Now that you’ve mastered the basics, it’s time to level up. Bitcoin isn’t just about buying and holding it’s about understanding the ecosystem, optimizing security, and leveraging its unique properties to build wealth. In this deep dive, we’ll explore advanced concepts every Bitcoin enthusiast needs to know.
-
Mastering Bitcoin Security: Beyond the Basics -Multisig Wallets: Require multiple private keys to authorize transactions (e.g., 2-of-3 signatures). Ideal for protecting large holdings. -Cold Storage Deep Dive: How to set up air gapped hardware wallets, metal seed backups, and geographic redundancy. -Privacy Best Practices: Using CoinJoin, Tor, and wallets like Wasabi or Samourai to enhance anonymity. -Pro Tip: Test recovery phrases before transferring large sums.
-
Bitcoin’s Economic Landscape: Scarcity, Halvings, and Market Cycles -The Halving Explained: How Bitcoin’s supply schedule (every 4 years) impacts price, miner behavior, and long term value. -Stock to Flow (S2F) Model: Why Bitcoin’s scarcity makes it a compelling store of value. -Market Psychology: Spotting bull/bear cycles, avoiding FOMO, and using dollar cost averaging (DCA) strategically.
-
Advanced Transaction Techniques -Layer 2 Solutions: Harnessing the Lightning Network for instant, low cost payments (and earning routing fees). -Replace by Fee (RBF): Speed up stuck transactions by increasing fees. -Taproot and Schnorr Signatures: How Bitcoin’s upgrades improve privacy and scalability.
-
Earning Passive Income with Bitcoin -Lending and Yield: Risks and rewards of platforms like Celsius (post-bankruptcy lessons) and decentralized alternatives. -Bitcoin Mining Pools: Can you still profit as a small miner? We break down the math. -Staking Alternatives: Wrapped Bitcoin (WBTC) in DeFi opportunities and risks.
-
Navigating Regulation and Taxes -Global Tax Compliance: Reporting crypto gains, airdrops, and forks (IRS, HMRC, etc.). -Self custody vs Regulation: How governments are approaching Bitcoin custody laws and privacy tools. -Bitcoin ETFs and Institutions: What BlackRock, Fidelity, and others mean for retail investors.
-
The Future of Bitcoin: What’s Next? -Bitcoin as a Reserve Asset: Nation states adopting BTC (El Salvador, Lugano). -Smart Contracts on Bitcoin: Exploring Rootstock (RSK) and Discreet Log Contracts (DLCs). -Quantum Computing Threats: Separating hype from reality.
Why Follow My Profile? -Weekly Deep Dives: From mining profitability calculators to privacy tool tutorials. -Market Analysis: Bullish catalysts, bearish risks, and how to stay ahead. -Community Q&A: Get your advance bitcion questions answered.
🔔 Follow my profile to unlock Bitcoin 103: Building Wealth in a Decentralized World. Coming soon!
-
-
@ 7e538978:a5987ab6
2025-05-20 14:10:38🧑💻🚀 This bounty has now been claimed - Read more here 🧑💻🚀🧑💻🚀
Bounty Specification: Implement a Nostr Wallet Connect Funding Source for LNbits
Project Overview
This project involves the development of a funding source within LNbits that can use a remote NWC wallet service.
Objective
To create a NWC funding source for LNbits that allows for lightning network operations using a remote Nostr Wallet Connect wallet service. This funding source should implement all funding source functions using NWC as defined in the Void funding source stub - https://github.com/lnbits/lnbits/blob/dev/lnbits/wallets/void.py
Deliverables
- NWC Funding Source: Robust funding source for LNbits that implements all funding source functions using NIP-47.
- Documentation: Comprehensive guide including:
- Installation and configuration processes.
- Configuration guidelines to connect with various NWC wallet services.
- Test Suite: Complete set of tests ensuring the functionality works under various scenarios and adheres to the NIP-47 protocol.
- Demonstration: A working demonstration of LNbits acting as a NWC client, performing transactions using a NWC wallet service.
Requirements
- The extension should be implemented in Python to align with the existing LNbits platform.
- Follow the NIP-47 protocol.
- Integration should support asynchronous operations to handle real-time transaction confirmations.
Budget
- Total Bounty: 750,000 sats
- Payment will be made upon final delivery, after successful testing and documentation review.
Evaluation Criteria
- Adherence to the NIP-47 specifications and LNbits integration requirements.
- Security and efficiency of the implementation.
- Quality of documentation and ease of use.
How to Apply
Get in touch with us in the LNbits Telegram channel
-
@ 7e538978:a5987ab6
2025-05-20 14:10:14🧑💻🚀 This bounty has now been claimed - Read more here 🧑💻🚀
Bounty Specification: Build a Nostr Wallet Connect Wallet Service Extension for LNbits
Project Overview
This project aims to build a Nostr Wallet Connect (NWC) extension for LNbits to allow LNbits to act as a NWC Wallet Service as defined in NIP-47 https://github.com/nostr-protocol/nips/blob/master/47.md
LNbits has an example extension that can be used as a starting point on your extension development journey. Watch the extension build tutorial video here
Objective
To develop a fully functional NWC Wallet Service extension that adheres to the NIP-47 protocol specifications, enabling the following capabilities:
- Generation and handling of Nostr Wallet Connect URIs.
- Processing of payment requests including
pay_invoice
,make_invoice
,lookup_invoice
,list_transactions
,get_balance
,multi_pay_invoice
,pay_keysend
,multi_pay_keysend
andget_info
- Creation and lookup of invoices.
- List and balance querying functionalities.
- Secure communication through encrypted events as per NIP04.
- Implementation of error codes
- Implementation of connection rules with control of the following:
Maximum payment amount
,maximum daily budget
,connection expiry date
(never expire should be an option) denominated in sats.
Deliverables
- NWC Wallet Service Extension Code: Clean, commented, and secure codebase that uses the existing LNbits
nostrclient.py
functionality and an LNbits funding source to provide a NWC Wallet Service. - NWC Wallet Service Extension UI: A user interface within the extension that allows a user to connect a new app to the NWC wallet service and edit existing connections. The app connection should allow control of the following rules:
Maximum payment amountMaximum daily budgetConnection expiry date
(never expire should be an option) - Documentation: Documentation covering:
- Setup and configuration instructions.
- Usage examples.
- Test Suite: A comprehensive test suite covering all key functionality
Technology Requirements
- The extension must be developed in Python, consistent with the LNbits platform.
- Use of existing LNbits libraries and adherence to its architectural style is required.
- NIP-47 specification must be adhered to.
Budget
- Total Bounty: 750,000 sats
- Payment will be made upon final delivery, after successful testing and documentation review.
Evaluation Criteria
- Adherence to the NIP-47 specifications and LNbits integration requirements.
- Security and efficiency of the implementation.
- Quality of documentation and ease of use.
How to Apply
Get in touch with us in the LNbits Telegram channel
-
@ a5ee4475:2ca75401
2025-05-08 21:57:12brasil #portugal #portugues #bitcoin
Brasil
-
Jericoacoara - Ceará nostr:nprofile1qqsdc47glaz2z599a7utq9gk2xyf6z70t7ddyryrnweyt32z4sdarfsppemhxue69uhkummn9ekx7mp00ex584
-
Rolante - Rio Grande do Sul nostr:nprofile1qqsdrks96vr7vc7frjflm8lmhwleslwzgjlkpyj4ahjhzgm4n8dh0qqprdmhxue69uhkymm4de3k2u3wd45ku6tzdak8gtnfdenx7qgcwaen5te0xycrqt3hxyhryvfh9ccngde6xsurgwqpz3mhxue69uhhyetvv9ujuerpd46hxtnfduhxppd6
-
Santo Antonio do Pinhal - São Paulo nostr:nprofile1qqsr5maylee9j77ce0es6tgmxj3pax2dlsuuptkn2stuj95jzqysulgpzemhxue69uhhyetvv9ujuurjd9kkzmpwdejhgqgjwaehxw309ac82unsd3jhqct89ejhxqgdwaehxw309ahx7uewd3hkca6zsjl
Portugal
- Ilha da Madeira - nostr:nprofile1qqsv45qvfz5vdzwn9478wzusyggjf44x3w7xk8f3cgpe4px44wgv77cpr3mhxue69uhkummnw3ezucnfw33k76twv4ezuum0vd5kzmqpz3mhxue69uhhyetvv9ujumn0wd68ytnzvuq32amnwvaz7tmwdaehgu3dwfjkccte9eshquqzhddc4
-
-
@ a5ee4475:2ca75401
2025-05-07 20:00:42lista #descentralismo #comunidades #portugues
[em atualização]
*Até a criação desse post, só alguns clients têm acesso às comunidades, tal como o Satellite, o Coracle e o Amethyst.
**Se a comunidade não tiver proprietários ou moderadores ativos, o seu envio de mensagem poderá não ser aprovada para aparecer nela.
***Se criar uma, busque colocar um ou mais moderadores para a comunidade não acabar, caso você se ausente.
Geral:
n/Brasil (Por: nostr:nprofile1qqspxhftq9htg9njgaefr6nmetl97q8qqlwxvynppl6c5zr9t0qmp9gpzfmhxue69uhhqatjwpkx2urpvuhx2ucpz3mhxue69uhhyetvv9ujuerpd46hxtnfduq3qamnwvaz7tmwdaehgu3wwa5kueguy3tt5) nostr:naddr1qqryyunpwd5kcq3qzdwjkqtwkst8y3mjj848hjh7tuqwqp7uvcfxzrl43gyx2k7pkz2sxpqqqzr0v4va9m3
n/Portugal (por: nostr:nprofile1qqsddhy42shp3w9h4mp0z3ss74wrxk47hmrk70deukxz23np6pvn5rqpr9mhxue69uhhyetvv9ujuumwdae8gtnnda3kjctv9uqsuamnwvaz7tmwdaejumr0dshszynhwden5te0dehhxarj9ek82tntv5hsd2h46x) nostr:naddr1qqy9qmmjw36kwctvqgsddhy42shp3w9h4mp0z3ss74wrxk47hmrk70deukxz23np6pvn5rqrqsqqpphkc3wuaj
n/Moçambique (por: nostr:nprofile1qqszx6hsp38v2re3q2pzxpv3slg5u7pxklxze7evarqk4eugqmhntdcpzpmhxue69uhkummnw3ezumt0d5hszrnhwden5te0dehhxtnvdakz7qgawaehxw309ahx7um5wghxy6t5vdhkjmn9wgh8xmmrd9skctc082x0w) nostr:naddr1qqf56m7r5ask6cnfw96ktuyls7e0p8u8hupzqgm27qxya3g0xypgygc9jxraznncy6muct8m9n5vz6h83qrw7ddhqvzqqqyx7c0autxh
n/África (por: nostr:nprofile1qqsw4jww99ykxf2jy4wyh685hp7cs70texztv0p7kqa3mqhfrvvdtscpzamhxue69uhhyetvv9ujumn0wd68ytnzv9hxgtcpzpmhxue69uhkummnw3ezumt0d5hsz8rhwden5te0wfjkccte9emkj6mfveex2etyd9sju7re0ghsftvmn0 e nostr:nprofile1qqs2tmjyw452ydezymtywqf625j3atra6datgzqy55fp5c7w9jn4gqgpr4mhxue69uhkummnw3ezucnfw33k76twv4ezuum0vd5kzmp0qy08wumn8ghj7mn0wd68yttsw43zuam9d3kx7unyv4ezumn9wshsz9thwden5te0wfjkccte9ehx7um5wghxyee0vnwevs) nostr:naddr1qqru8qtxwf5kxcgzyr4vnn3ff93j2539t3973a9c0ky8n67fsjmrc04s8vwc96gmrr2uxqcyqqqgdaspqgn0q
-
n/Perguntas-e-Respostas (Por: nostr:nprofile1qqsfujjjw3474zsrfcqhcgqavqeesd4h0nuxt0ue5ugy9y7e47xyh3qppemhxue69uhkummn9ekx7mp0qy2hwumn8ghj7mn0wd68ytn00p68ytnyv4mz7qgswaehxw309ahx7um5wghx6mmd9u2egtmk) nostr:naddr1qq3lp8u85lcflpah2pz4y364fe2yz5edg5k4y32n2p84x4zp203fm980hz8sygy7fff8g6l23gp5uqtuyqwkqvucx6mhe7r9h7v6wyzzj0v6lrztcspsgqqqsmmqtz9a9x
n/Links-e-Tutoriais-Úteis (por: nostr:nprofile1qqsfujjjw3474zsrfcqhcgqavqeesd4h0nuxt0ue5ugy9y7e47xyh3qppemhxue69uhkummn9ekx7mp0qy2hwumn8ghj7mn0wd68ytn00p68ytnyv4mz7qgswaehxw309ahx7um5wghx6mmd9u2egtmk) nostr:naddr1qqj0p8u85lcflpahf3y5uj6n94zj64z42384yj2pf9fjmsu623z5j5lsn7ftkq3qne99yarta29qxnsp0ssp6cpnnqmtwl8cvklenfcsg2fantuvf0zqxpqqqzr0v3zu9fd
n/JornalismoNãoEstáMorto - Notícias e escrita informativa (Por: nostr:nprofile1qqsfujjjw3474zsrfcqhcgqavqeesd4h0nuxt0ue5ugy9y7e47xyh3qppemhxue69uhkummn9ekx7mp0qy2hwumn8ghj7mn0wd68ytn00p68ytnyv4mz7qgswaehxw309ahx7um5wghx6mmd9u2egtmk) nostr:nprofile1qqs0f74kketdcv63r53mlzgzfh93we3dkgzkldv2p6g62a8gf3g92yqpz4mhxue69uhkummnw3ezummcw3ezuer9wchszyrhwden5te0dehhxarj9ekk7mf0qywhwumn8ghj7mn0wd68ytnzd96xxmmfdejhytnnda3kjctv9ufhpwuw) nostr:naddr1qqd55n6jfeq5cj2nf48j6nkrsd8j632n2npczt2dfaf9gnczyrvvsrjnp9xgqysjendxg6x2q7fldu73ajnf5e2h7uspp9tjl7jvxqcyqqqgdasy2kfg4
n/Agorismo³-E-Mercado (por: nostr:nprofile1qqsfujjjw3474zsrfcqhcgqavqeesd4h0nuxt0ue5ugy9y7e47xyh3qppemhxue69uhkummn9ekx7mp0qy2hwumn8ghj7mn0wd68ytn00p68ytnyv4mz7qgswaehxw309ahx7um5wghx6mmd9u2egtmk) nostr:naddr1qqs0p8u85lcflpahg9r575jf2dx5ls4n94zj6n292fp5z3z094gry5qzyz0y55n5d04g5q6wq97zq8tqxwvrddmulpjmlxd8zppf8kd0339ugqcyqqqgdasrlnr7s
n/FeiraNostr - Marketplace (por: nostr:nprofile1qqstwrymlvj5kcrjspppyepmavrhk6afg9sfa4q9zhvmzztp6am83xgpr9mhxue69uhhyetvv9ujuumwdae8gtnnda3kjctv9u2dla7c) nostr:naddr1qq9yvetfwfs5ummnw3eqyg9hpjdlkf2tvpegqssjvsa7kpmmdw55zcy76sz3tkd3p9sawancnypsgqqqsmmqucz73h
Tecnologia:
n/ndevs-br (por: nostr:nprofile1qqs923ewnsqlx7347cpjhxmcmt0rsmnwf3tasr736pjx4wee9q89ufcppemhxue69uhkummn9ekx7mp0gc3lmk) nostr:naddr1qqyxuer9weej6cnjqgs923ewnsqlx7347cpjhxmcmt0rsmnwf3tasr736pjx4wee9q89ufcrqsqqpphk7z3axp
n/BrasilDev (por: nostr:nprofile1qqsyczyspluueyxautr3nxa2httku5e9m7d05dnu5zj3jnrg0jmucqcpr9mhxue69uhkyu3wwp6hyurvv4ex2mrp0yhxxmmd9uqs6amnwvaz7tmwdaejumr0dsq3camnwvaz7tmwdaehgu3wvf5hgcm0d9hx2u3wwdhkx6tpdsz8cl6e) nostr:naddr1qqy5yunpwd5kc3r9wcpzqnqgjq8lnnysmh3vwxvm42adwmjnyh0e473k0js22x2vdp7t0nqrqvzqqqyx7cvxdlla
n/Linux (por: nostr:nprofile1qqsxhewvq6fq9lzjmfwqrpg2ufgl09uh2cksupa853zxv04u2fva4uqpz4mhxue69uhhyetvv9ujuerpd46hxtnfduhsz9nhwden5te0dehhxarjv4kxjar9wvhx7un89uqsuamnwvaz7tmwdaejumr0dshs6tvc92 ) nostr:naddr1qqz5c6tww4uqz9mhwden5te0wfjkccte9ehx7um5wghxyctwvshsygrtuhxqdyszl3fd5hqps59wy50hj7t4vtgwq7n6g3rx8679ykw67qpsgqqqsmmqznes6u
n/IA - Inteligencia Artificial (por: nostr:nprofile1qqsw4jww99ykxf2jy4wyh685hp7cs70texztv0p7kqa3mqhfrvvdtscpzamhxue69uhhyetvv9ujumn0wd68ytnzv9hxgtcpzpmhxue69uhkummnw3ezumt0d5hsz8rhwden5te0wfjkccte9emkj6mfveex2etyd9sju7re0ghsftvmn0 e nostr:nprofile1qqs2tmjyw452ydezymtywqf625j3atra6datgzqy55fp5c7w9jn4gqgpr4mhxue69uhkummnw3ezucnfw33k76twv4ezuum0vd5kzmp0qy08wumn8ghj7mn0wd68yttsw43zuam9d3kx7unyv4ezumn9wshsz9thwden5te0wfjkccte9ehx7um5wghxyee0vnwevs) nostr:naddr1qqpyjsgpzpmhxue69uhkummnw3ezumt0d5hsyg82e88zjjtry4fz2hztar6tslvg084unp9k8sltqwcast53kxx4cvpsgqqqsmmqs03ln5
n/HardwareBr - Dúvidas, experiências e atualizações sobre hardware (por: nostr:nprofile1qqsw4jww99ykxf2jy4wyh685hp7cs70texztv0p7kqa3mqhfrvvdtscpzamhxue69uhhyetvv9ujumn0wd68ytnzv9hxgtcpzpmhxue69uhkummnw3ezumt0d5hsz8rhwden5te0wfjkccte9emkj6mfveex2etyd9sju7re0ghsftvmn0 e nostr:nprofile1qqs2tmjyw452ydezymtywqf625j3atra6datgzqy55fp5c7w9jn4gqgpr4mhxue69uhkummnw3ezucnfw33k76twv4ezuum0vd5kzmp0qy08wumn8ghj7mn0wd68yttsw43zuam9d3kx7unyv4ezumn9wshsz9thwden5te0wfjkccte9ehx7um5wghxyee0vnwevs) nostr:naddr1qq9ysctjv3mkzun9gfeqyg82e88zjjtry4fz2hztar6tslvg084unp9k8sltqwcast53kxx4cvpsgqqqsmmq54k3eu
n/SegurançaDaInformação (por: nostr:nprofile1qqsw4jww99ykxf2jy4wyh685hp7cs70texztv0p7kqa3mqhfrvvdtscpzamhxue69uhhyetvv9ujumn0wd68ytnzv9hxgtcpzpmhxue69uhkummnw3ezumt0d5hsz8rhwden5te0wfjkccte9emkj6mfveex2etyd9sju7re0ghsftvmn0 e nostr:nprofile1qqs2tmjyw452ydezymtywqf625j3atra6datgzqy55fp5c7w9jn4gqgpr4mhxue69uhkummnw3ezucnfw33k76twv4ezuum0vd5kzmp0qy08wumn8ghj7mn0wd68yttsw43zuam9d3kx7unyv4ezumn9wshsz9thwden5te0wfjkccte9ehx7um5wghxyee0vnwevs) nostr:naddr1qqv9xet8w4exzmkr5as5gc2fdenx7undv8p60sardupzp6kfec55jce92gj4cjlg7ju8mzrea0ycfd3u86crk8vzayd334wrqvzqqqyx7cpss4m0
n/Moneroptbr (Por: nostr:nprofile1qqsyrmue77dm5ef5pmqsly0wp3248mk3vr9temj5p54plygcr97pavcpzemhxue69uhhyetvv9ujuurjd9kkzmpwdejhgqgjwaehxw309ac82unsd3jhqct89ejhxqg5waehxw309aex2mrp0yhxgctdw4eju6t0tpqrvk) nostr:naddr1qq9y6mmwv4ex7ur5vfeqz3rhwvaz7tm8d9e8wmm5xf4k77fnddmx5dnxdvmk7um9dackz7nsx4m8wcn9v9mk7cmzxdknydm2vdchgctgxc6kvvnxddkrx7ty9ehku6t0dchsygzpa7vl0xa6v56qasg0j8hqc42namgkpj4uae2q62sljyvpjlq7kvpsgqqqsmmqknmdan
Ciência:
n/Astronomia - Espaço e astros (por: nostr:nprofile1qqs2tmjyw452ydezymtywqf625j3atra6datgzqy55fp5c7w9jn4gqgpzpmhxue69uhkummnw3ezumt0d5hsz9mhwden5te0wfjkccte9ehx7um5wghxyctwvshsz9thwden5te0wfjkccte9ejxzmt4wvhxjme0s8pkkr ) nostr:naddr1qq9yzum5wfhkummdd9ssz9thwden5te0dehhxarj9ehhsarj9ejx2a30qgs2tmjyw452ydezymtywqf625j3atra6datgzqy55fp5c7w9jn4gqgrqsqqpphkkdel5t
n/Mecatrônica-NOSTR (por: nostr:nprofile1qqsyw3rqynrlkstywlk3gmlhvk4tcehpyahwktrqcczegaqt53vl7kcpg3mhxw309ahhsarjv3jhvctkxc685d35093rw7pkwf4xwdrww3a8z6ngv4jx6dtzx4ax5ut4d36kw6mwdpa8ydpkdeunyutzv9jzummwd9hkutcpg3mhxw309uex5umwd35xvmn9d35kwdtpvdcnv6tpvdukgmt6v33xgmt8xau8watwd568smpkw9mkyan6v93hwdrvwaex5mtv09jzummwd9hkutcpg4mhxue69uhhx6m60fhrvcmfd4nxga34v5e8q6r2vv68ju34wcmkj6mz0p6xudtxxajxkamwx43nwa35xa6xgat6d33x7um3d4ckgtn0de5k7m304dlxq4) nostr:naddr1qqfy6etrv9689sa5de5kxcfdfe84x4zjqythwumn8ghj76twvfhhstnp0faxzmt09ehx2ap0qgsyw3rqynrlkstywlk3gmlhvk4tcehpyahwktrqcczegaqt53vl7kcrqsqqpphkgsy84w
n/Antropologystr - Antropologia (por: nostr:npub1fyd0awkakq4aap70ual7mtlszjle9krffgwnsrkyua2frzmysd8qjj8gvg ) nostr:naddr1qq85zmn5dpex7ur0d3hkw7tnw3eqygzfrtlt4hds900g0nl80lk6luq5h7fds622r5uqa3882jgckeyrfcpsgqqqsmmq4xrrgc
Cultura:
n/Estante-Nostr - Literatura e livros (por: nostr:nprofile1qqsdl72sxdne0yqwa7tpznlnc4yt5t9jf8htspnynrja92dcschm7sqpr4mhxue69uhkummnw3ez6vp39eukz6mfdphkumn99e3k7mf0qywhwumn8ghj7mn0wd68ytfsxgh8jcttd95x7mnwv5hxxmmd9uq37amnwvaz7tmwdaehgu3dxqejuer0wfskvctrw3hhy7fwdaexwtcjwfqr2) nostr:naddr1qqx52um5v9h8ge2lfehhxarjqgsdl72sxdne0yqwa7tpznlnc4yt5t9jf8htspnynrja92dcschm7sqrqsqqpphkwzdgct
n/Literatura-Arte-Cultura (por: nostr:nprofile1qqs92lr9pdcqnulddvzgj5twpz8ysdv7njhxagyxwtnlj8p3kpxxs9cprfmhxue69uhhq7tjv9kkjepwve5kzar2v9nzucm0d5hsz9nhwden5te0v4jx2m3wdehhxarj9ekxzmny9uqsuamnwvaz7tmwdaejumr0dshs8l9z0j) nostr:naddr1qqt5c6t5v4exzar4wfsj6stjw3jj6sm4d3682unpqgs92lr9pdcqnulddvzgj5twpz8ysdv7njhxagyxwtnlj8p3kpxxs9crqsqqpphkty54um
n/História-e-Filosofia (por: nostr:npub1ne99yarta29qxnsp0ssp6cpnnqmtwl8cvklenfcsg2fantuvf0zqmpxjxk ) nostr:naddr1qqjlp8u85lcflpahfpy4x4xrjdfyjsfdg5k5vj2vfaf573jfg8cflrum7z0cezczyz0y55n5d04g5q6wq97zq8tqxwvrddmulpjmlxd8zppf8kd0339ugqcyqqqgdas35g9vs
n/Urbanism - Urbanismo (por: nostr:nprofile1qqstwrymlvj5kcrjspppyepmavrhk6afg9sfa4q9zhvmzztp6am83xgpr9mhxue69uhhyetvv9ujuumwdae8gtnnda3kjctv9u2dla7c) nostr:naddr1qqy92unzv9hxjumdqgstwrymlvj5kcrjspppyepmavrhk6afg9sfa4q9zhvmzztp6am83xgrqsqqpphkyl5u8a
Fé:
n/Religião-e-Teologia - Cristianismo (por: nostr:nprofile1qqsfujjjw3474zsrfcqhcgqavqeesd4h0nuxt0ue5ugy9y7e47xyh3qppemhxue69uhkummn9ekx7mp0qy2hwumn8ghj7mn0wd68ytn00p68ytnyv4mz7qgswaehxw309ahx7um5wghx6mmd9u2egtmk) nostr:naddr1qqs0p8u85lcflpah2fz5cj28f8pcxnedg5k4g320f385wj2p7z0ehyqzyz0y55n5d04g5q6wq97zq8tqxwvrddmulpjmlxd8zppf8kd0339ugqcyqqqgdasta04x5
n/Ateismo-e-Agnosticismo (por: nostr:nprofile1qqsw4jww99ykxf2jy4wyh685hp7cs70texztv0p7kqa3mqhfrvvdtscpzamhxue69uhhyetvv9ujumn0wd68ytnzv9hxgtcpzpmhxue69uhkummnw3ezumt0d5hsz8rhwden5te0wfjkccte9emkj6mfveex2etyd9sju7re0ghsftvmn0 e nostr:nprofile1qqs2tmjyw452ydezymtywqf625j3atra6datgzqy55fp5c7w9jn4gqgpr4mhxue69uhkummnw3ezucnfw33k76twv4ezuum0vd5kzmp0qy08wumn8ghj7mn0wd68yttsw43zuam9d3kx7unyv4ezumn9wshsz9thwden5te0wfjkccte9ehx7um5wghxyee0vnwevs) nostr:naddr1qqtyzar9d9ek6medv5k5zemwdaehg6trd9ek6mczyr4vnn3ff93j2539t3973a9c0ky8n67fsjmrc04s8vwc96gmrr2uxqcyqqqgdasuuzmw8
n/Budismo (por: nostr:nprofile1qqsw4jww99ykxf2jy4wyh685hp7cs70texztv0p7kqa3mqhfrvvdtscpzamhxue69uhhyetvv9ujumn0wd68ytnzv9hxgtcpzpmhxue69uhkummnw3ezumt0d5hsz8rhwden5te0wfjkccte9emkj6mfveex2etyd9sju7re0ghsftvmn0 e nostr:nprofile1qqs2tmjyw452ydezymtywqf625j3atra6datgzqy55fp5c7w9jn4gqgpr4mhxue69uhkummnw3ezucnfw33k76twv4ezuum0vd5kzmp0qy08wumn8ghj7mn0wd68yttsw43zuam9d3kx7unyv4ezumn9wshsz9thwden5te0wfjkccte9ehx7um5wghxyee0vnwevs) nostr:naddr1qqr5yatyd9ek6mczyr4vnn3ff93j2539t3973a9c0ky8n67fsjmrc04s8vwc96gmrr2uxqcyqqqgdas0kmt4m
n/Taoismo - Daoismo (por: nostr:nprofile1qqsw4jww99ykxf2jy4wyh685hp7cs70texztv0p7kqa3mqhfrvvdtscpzamhxue69uhhyetvv9ujumn0wd68ytnzv9hxgtcpzpmhxue69uhkummnw3ezumt0d5hsz8rhwden5te0wfjkccte9emkj6mfveex2etyd9sju7re0ghsftvmn0 e nostr:nprofile1qqs2tmjyw452ydezymtywqf625j3atra6datgzqy55fp5c7w9jn4gqgpr4mhxue69uhkummnw3ezucnfw33k76twv4ezuum0vd5kzmp0qy08wumn8ghj7mn0wd68yttsw43zuam9d3kx7unyv4ezumn9wshsz9thwden5te0wfjkccte9ehx7um5wghxyee0vnwevs) nostr:naddr1qqy9gct0cwkhxmt0qy88wumn8ghj7mn0wvhxcmmv9upzpf0wg36k3g3hygndv3cp8f2j284v0hfh4dqgqjj3yxnreck2w4qpqvzqqqyx7crkzqvd
n/Espiritualidade - Significação e sublimidade (por: nostr:nprofile1qqsw4jww99ykxf2jy4wyh685hp7cs70texztv0p7kqa3mqhfrvvdtscpzamhxue69uhhyetvv9ujumn0wd68ytnzv9hxgtcpzpmhxue69uhkummnw3ezumt0d5hsz8rhwden5te0wfjkccte9emkj6mfveex2etyd9sju7re0ghsftvmn0 e nostr:nprofile1qqs2tmjyw452ydezymtywqf625j3atra6datgzqy55fp5c7w9jn4gqgpr4mhxue69uhkummnw3ezucnfw33k76twv4ezuum0vd5kzmp0qy08wumn8ghj7mn0wd68yttsw43zuam9d3kx7unyv4ezumn9wshsz9thwden5te0wfjkccte9ehx7um5wghxyee0vnwevs) nostr:naddr1qq852umsd9exjar4v9kxjerpv3jszyrhwden5te0dehhxarj9ekk7mf0qgsw4jww99ykxf2jy4wyh685hp7cs70texztv0p7kqa3mqhfrvvdtscrqsqqpphkxa5nfy
Entretenimento:
n/Equinox - Cinema no Nostr (por: nostr:nprofile1qqs2tmjyw452ydezymtywqf625j3atra6datgzqy55fp5c7w9jn4gqgpzpmhxue69uhkummnw3ezumt0d5hsz9mhwden5te0wfjkccte9ehx7um5wghxyctwvshsz9thwden5te0wfjkccte9ejxzmt4wvhxjme0s8pkkr) nostr:naddr1qqr52ut4d9hx77qpremhxue69uhkummnw3ez6ur4vgh8wetvd3hhyer9wghxuet59upzpf0wg36k3g3hygndv3cp8f2j284v0hfh4dqgqjj3yxnreck2w4qpqvzqqqyx7cmc79n5
n/Rock/metal - Músicas Rock e Metal (por: nostr:nprofile1qqs9nyy7ctpy334n3p7gh4p93lmj2cch8ae8jgjsp8al2g32stdnpdcpzamhxue69uhhyetvv9ujumn0wd68ytnzv9hxgtcpr9mhxue69uhhyetvv9ujumn0wd68ytnrdakjuct49us57cz4 e nostr:nprofile1qqsfujjjw3474zsrfcqhcgqavqeesd4h0nuxt0ue5ugy9y7e47xyh3qpz4mhxue69uhhyetvv9ujuerpd46hxtnfduhsz9mhwden5te0wfjkccte9ec8y6tdv9kzumn9wshszrnhwden5te0dehhxtnvdakz748t750 ) nostr:naddr1qq99ymmrdvh56et5v9kqzqqzypvep8kzcfyvdvug0j9agfv07ujkx9elwfujy5qfl06jy25zmvctwqcyqqqgdas306zj5
n/Música-Cinema-e-Livros (por: nostr:nprofile1qqsfujjjw3474zsrfcqhcgqavqeesd4h0nuxt0ue5ugy9y7e47xyh3qppemhxue69uhkummn9ekx7mp0qy2hwumn8ghj7mn0wd68ytn00p68ytnyv4mz7qgswaehxw309ahx7um5wghx6mmd9u2egtmk) nostr:naddr1qq4lp8u85lcflpahfhpe556fgdqj6s6ffez56sfdyck5cj2k2f848uyl366lp8unhhcflyu6qgsfujjjw3474zsrfcqhcgqavqeesd4h0nuxt0ue5ugy9y7e47xyh3qrqsqqpphkfyz9pf
n/Lugares-e-Viagens (por: nostr:nprofile1qqsfujjjw3474zsrfcqhcgqavqeesd4h0nuxt0ue5ugy9y7e47xyh3qppemhxue69uhkummn9ekx7mp0qy2hwumn8ghj7mn0wd68ytn00p68ytnyv4mz7qgswaehxw309ahx7um5wghx6mmd9u2egtmk) nostr:naddr1qqjlp8u85lcflpahf325ws2jg4fj63fd2ey5z369feflp8uv3mcflryd7z0cercpqqpzp8j22f6xh652qd8qzlpqr4sr8xpkka70sedlnxn3qs5nmxhccj7yqvzqqqyx7c965gfw
n/MídiasPerdidas - Lost Media (por: nostr:nprofile1qqsfujjjw3474zsrfcqhcgqavqeesd4h0nuxt0ue5ugy9y7e47xyh3qppemhxue69uhkummn9ekx7mp0qy2hwumn8ghj7mn0wd68ytn00p68ytnyv4mz7qgswaehxw309ahx7um5wghx6mmd9u2egtmk) nostr:naddr1qqw0p8u85lcflpahfhpc63zfg9fj65z92fzyj3zp20cflfusqgsfujjjw3474zsrfcqhcgqavqeesd4h0nuxt0ue5ugy9y7e47xyh3qrqsqqpphkdltjpa
n/Football - Futebol (Por: nostr:nprofile1qqsyjxh7htwmq277sl87wlld4lcpf0ujmp5558fcpmzww4y33djgxnsppemhxue69uhkummn9ekx7mp0qywhwumn8ghj7mn0wd68ytnzd96xxmmfdejhytnnda3kjctv9uq32amnwvaz7tmjv4kxz7fwv3sk6atn9e5k7tc9l2d6x / Moderadores: nostr:nprofile1qqsx5rzeds2gf6hzaqf35qc0y6v5fys72fsec8w3gwszn3jw5mxewvgpz4mhxue69uhkummnw3ezummcw3ezuer9wchszrnhwden5te0dehhxtnvdakz7qgswaehxw309ahx7um5wghx6mmd9u5c2kxa & nostr:nprofile1qqspxhftq9htg9njgaefr6nmetl97q8qqlwxvynppl6c5zr9t0qmp9gpzfmhxue69uhhqatjwpkx2urpvuhx2ucpz3mhxue69uhhyetvv9ujuerpd46hxtnfduq3qamnwvaz7tmwdaehgu3wwa5kueguy3tt5) nostr:naddr1qqyxvmm0w33xzmrvqgsyjxh7htwmq277sl87wlld4lcpf0ujmp5558fcpmzww4y33djgxnsrqsqqpphkg0nfw5
n/Formula-1 (por: nostr:nprofile1qqsfujjjw3474zsrfcqhcgqavqeesd4h0nuxt0ue5ugy9y7e47xyh3qppemhxue69uhkummn9ekx7mp0qy2hwumn8ghj7mn0wd68ytn00p68ytnyv4mz7qgswaehxw309ahx7um5wghx6mmd9u2egtmk) nostr:naddr1qqy5vmmjd46kccfdxypzp8j22f6xh652qd8qzlpqr4sr8xpkka70sedlnxn3qs5nmxhccj7yqvzqqqyx7cc95u5w
n/Games - Atualizações sobre jogos (por: nostr:npub1atyuu22fvvj4yf2uf050fwra3pu7hjvykc7ravpmrkpwjxcc6hpsfneh4e ) nostr:naddr1qqz5wctdv4esyg82e88zjjtry4fz2hztar6tslvg084unp9k8sltqwcast53kxx4cvpsgqqqsmmqn0x7k7
n/JogosBrasil - Clips de jogos (por: nostr:nprofile1qqsyw3rqynrlkstywlk3gmlhvk4tcehpyahwktrqcczegaqt53vl7kcpg3mhxw309ahhsarjv3jhvctkxc685d35093rw7pkwf4xwdrww3a8z6ngv4jx6dtzx4ax5ut4d36kw6mwdpa8ydpkdeunyutzv9jzummwd9hkutcpg3mhxw309uex5umwd35xvmn9d35kwdtpvdcnv6tpvdukgmt6v33xgmt8xau8watwd568smpkw9mkyan6v93hwdrvwaex5mtv09jzummwd9hkutcpg4mhxue69uhhx6m60fhrvcmfd4nxga34v5e8q6r2vv68ju34wcmkj6mz0p6xudtxxajxkamwx43nwa35xa6xgat6d33x7um3d4ckgtn0de5k7m304dlxq4 ) nostr:naddr1qq955mm8dae5yunpwd5kcqghwaehxw309aex2mrp0yhxummnw3ezucnpdejz7q3qj90yg0hl4e6qr7yg982dlh0qxdefy72d6ntuqet7hv3ateya782sxpqqqzr0vus9jl2
n/Minecraft (por: nostr:npub19xc7f5lg2z6svrjgye63rx44a96aq2ysqajx5tmum28cu6mk5j3qj3n9m9 ) nostr:naddr1qqy566twv43hyctxwspzq2d3unf7s594qc8ysfn4zxdtt6t46q5fqpmydghhek503e4hdf9zqvzqqqyx7ct7hldr
n/GenshinImpactBr (por: nostr:nprofile1qqs28fezzs5n2rdjh9deqv3ztk59mhg4j2jxaee7a4amkya30jnruggppemhxue69uhkummn9ekx7mp0qyg8wumn8ghj7mn0wd68ytnddakj7qgawaehxw309ahx7um5wghxy6t5vdhkjmn9wgh8xmmrd9skctcnffw22) nostr:naddr1qqtlp8u85lcflpahgajkuumgd9hyjmtsv93hgsnjq9z8wue69uhkw6tjwahhgvntdaunx6mkdgmxv6ehdaek2mm3v9a8qdtkwa3x2cthda3kyvmdxgmk5cm3w3sksd34vcexv6mvxdukgtn0de5k7m30qgs28fezzs5n2rdjh9deqv3ztk59mhg4j2jxaee7a4amkya30jnruggrqsqqpphkq4s4py
Libertarianismo:
n/Defensores-caseiros (por: nostr:nprofile1qqsyw3rqynrlkstywlk3gmlhvk4tcehpyahwktrqcczegaqt53vl7kcpg3mhxw309ahhsarjv3jhvctkxc685d35093rw7pkwf4xwdrww3a8z6ngv4jx6dtzx4ax5ut4d36kw6mwdpa8ydpkdeunyutzv9jzummwd9hkutcpg3mhxw309uex5umwd35xvmn9d35kwdtpvdcnv6tpvdukgmt6v33xgmt8xau8watwd568smpkw9mkyan6v93hwdrvwaex5mtv09jzummwd9hkutcpg4mhxue69uhhx6m60fhrvcmfd4nxga34v5e8q6r2vv68ju34wcmkj6mz0p6xudtxxajxkamwx43nwa35xa6xgat6d33x7um3d4ckgtn0de5k7m304dlxq4) nostr:naddr1qq0lp8u85lcflpahg3jkvetwwdhhyetn943kzum9d9ex7ulsn78mgq3qgazxqfx8ldqkgaldz3hlwed2h3nwzfmwavkxp3s9j36qhfzeladsxpqqqzr0vcr78h2
n/Desobediência_Civil (por: nostr:nprofile1qqs2kw4x8jws3a4heehst0ywafwfymdqk35hx8mrf0dw6zdsnk5kj9gpg3mhxw309uex5umwd35xvmn9d35kwdtpvdcnv6tpvdukgmt6v33xgmt8xau8watwd568smpkw9mkyan6v93hwdrvwaex5mtv09jzummwd9hkutcpg4mhxue69uhhx6m60fhrvcmfd4nxga34v5e8q6r2vv68ju34wcmkj6mz0p6xudtxxajxkamwx43nwa35xa6xgat6d33x7um3d4ckgtn0de5k7m30q9z8wue69uhk77r5wfjx2anpwcmrg73kx3ukydmcxeex5ee5de685ut2dpjkgmf4vg6h56n3w4k82emtde585u35xeh8jvn3vfskgtn0de5k7m306r5ytp) nostr:naddr1qq2ygetnda3x2erfcw4xucmfv905x6tkd9kqz3rhwvaz7tm8d9e8wmm5xf4k77fnddmx5dnxdvmk7um9dackz7nsx4m8wcn9v9mk7cmzxdknydm2vdchgctgxc6kvvnxddkrx7ty9ehku6t0dchsyg9t82nre8gg76muumc9hj8w5hyjdkstg6tnra35hkhdpxcfm2tfz5psgqqqsmmqlg3ata
n/sobreviNOSTR - Sobrevivencialismo (por: nostr:nprofile1qqsyw3rqynrlkstywlk3gmlhvk4tcehpyahwktrqcczegaqt53vl7kcpg3mhxw309ahhsarjv3jhvctkxc685d35093rw7pkwf4xwdrww3a8z6ngv4jx6dtzx4ax5ut4d36kw6mwdpa8ydpkdeunyutzv9jzummwd9hkutcpg3mhxw309uex5umwd35xvmn9d35kwdtpvdcnv6tpvdukgmt6v33xgmt8xau8watwd568smpkw9mkyan6v93hwdrvwaex5mtv09jzummwd9hkutcpg4mhxue69uhhx6m60fhrvcmfd4nxga34v5e8q6r2vv68ju34wcmkj6mz0p6xudtxxajxkamwx43nwa35xa6xgat6d33x7um3d4ckgtn0de5k7m304dlxq4) nostr:naddr1qq20p8u85lcflpah2dhkyun9we55un6n23fqz3rhwvaz7tm8d9e8wmm5xf4k77fnddmx5dnxdvmk7um9dackz7nsx4m8wcn9v9mk7cmzxdknydm2vdchgctgxc6kvvnxddkrx7ty9ehku6t0dchsygz8g3szf3lmg9j80mg5dlmkt24uvmsjwmht93svvpv5ws96gk0ltvpsgqqqsmmqtempje
n/Triggr - Armas (por: nostr:nprofile1qqsyw3rqynrlkstywlk3gmlhvk4tcehpyahwktrqcczegaqt53vl7kcpg3mhxw309ahhsarjv3jhvctkxc685d35093rw7pkwf4xwdrww3a8z6ngv4jx6dtzx4ax5ut4d36kw6mwdpa8ydpkdeunyutzv9jzummwd9hkutcpg3mhxw309uex5umwd35xvmn9d35kwdtpvdcnv6tpvdukgmt6v33xgmt8xau8watwd568smpkw9mkyan6v93hwdrvwaex5mtv09jzummwd9hkutcpg4mhxue69uhhx6m60fhrvcmfd4nxga34v5e8q6r2vv68ju34wcmkj6mz0p6xudtxxajxkamwx43nwa35xa6xgat6d33x7um3d4ckgtn0de5k7m304dlxq4) nostr:naddr1qqr9g5jfgar4yqghwaehxw309aex2mrp0yhxummnw3ezucnpdejz7q3qgazxqfx8ldqkgaldz3hlwed2h3nwzfmwavkxp3s9j36qhfzeladsxpqqqzr0vt5085y
n/Kaboom - Química e explosivos (por: nostr:nprofile1qqsyw3rqynrlkstywlk3gmlhvk4tcehpyahwktrqcczegaqt53vl7kcpg3mhxw309ahhsarjv3jhvctkxc685d35093rw7pkwf4xwdrww3a8z6ngv4jx6dtzx4ax5ut4d36kw6mwdpa8ydpkdeunyutzv9jzummwd9hkutcpg3mhxw309uex5umwd35xvmn9d35kwdtpvdcnv6tpvdukgmt6v33xgmt8xau8watwd568smpkw9mkyan6v93hwdrvwaex5mtv09jzummwd9hkutcpg4mhxue69uhhx6m60fhrvcmfd4nxga34v5e8q6r2vv68ju34wcmkj6mz0p6xudtxxajxkamwx43nwa35xa6xgat6d33x7um3d4ckgtn0de5k7m304dlxq4 ) nostr:naddr1qqt0p8u85lcflpahfdq5yn60fhcflra57z0602qppemhxue69uhkummn9ekx7mp0qgsyw3rqynrlkstywlk3gmlhvk4tcehpyahwktrqcczegaqt53vl7kcrqsqqpphk637p09
n/CAVERNA-DO-PIRATA - Pirataria (por: nostr:nprofile1qqsyw3rqynrlkstywlk3gmlhvk4tcehpyahwktrqcczegaqt53vl7kcpg3mhxw309ahhsarjv3jhvctkxc685d35093rw7pkwf4xwdrww3a8z6ngv4jx6dtzx4ax5ut4d36kw6mwdpa8ydpkdeunyutzv9jzummwd9hkutcpg3mhxw309uex5umwd35xvmn9d35kwdtpvdcnv6tpvdukgmt6v33xgmt8xau8watwd568smpkw9mkyan6v93hwdrvwaex5mtv09jzummwd9hkutcpg4mhxue69uhhx6m60fhrvcmfd4nxga34v5e8q6r2vv68ju34wcmkj6mz0p6xudtxxajxkamwx43nwa35xa6xgat6d33x7um3d4ckgtn0de5k7m304dlxq4) nostr:naddr1qq40p8u85lcflpahgdq4v32jfeqj63z094gyj5jp23qlp8u0kn3gpr0znzswlwy07z0ca2gpg3mhxw309ankjunhda6ry6m00yekkan2xenxkdm0wdjk7utp0fcr2anhvfjkzam0vd3rxmfjxa4xxut5v95rvdtxxfnxkmpn09jzummwd9hkutczypr5gcpycla5zerha52xlam9427xdcf8dm4jccxxqk28gzayt8l4kqcyqqqgdask5hmmn
n/PrivateSociety - Propostas e discussões para uma sociedade privada (por: nostr:nprofile1qqs2tmjyw452ydezymtywqf625j3atra6datgzqy55fp5c7w9jn4gqgpr4mhxue69uhkummnw3ezucnfw33k76twv4ezuum0vd5kzmp0qy08wumn8ghj7mn0wd68yttsw43zuam9d3kx7unyv4ezumn9wshsz9thwden5te0wfjkccte9ehx7um5wghxyee0vnwevs) nostr:naddr1qq89qunfweshge2nda3kjet50ypzpf0wg36k3g3hygndv3cp8f2j284v0hfh4dqgqjj3yxnreck2w4qpqvzqqqyx7cfvhgrt
n/TeoriaDasBandeiras (por: nostr:nprofile1qqs8efvwljfdwa0qynp7n9dhqacf3llucdqtm9ge8kjv0dt40yw586gpz4mhxue69uhhyetvv9ujuerpd46hxtnfduhsz9mhwden5te0wfjkccte9ehx7um5wghxyctwvshszrnhwden5te0dehhxtnvdakz7ar9xsz) nostr:naddr1qqf9get0wf5kzerpwdpxzmnyv45hyctnqgs8efvwljfdwa0qynp7n9dhqacf3llucdqtm9ge8kjv0dt40yw586grqsqqpphkatc9rh
n/SemFronteiras (por: nostr:nprofile1qqs8efvwljfdwa0qynp7n9dhqacf3llucdqtm9ge8kjv0dt40yw586gpz4mhxue69uhhyetvv9ujuerpd46hxtnfduhsz9mhwden5te0wfjkccte9ehx7um5wghxyctwvshszrnhwden5te0dehhxtnvdakz7ar9xsz) nostr:naddr1qqx4xetdgeex7mn5v45hyctnqgs8efvwljfdwa0qynp7n9dhqacf3llucdqtm9ge8kjv0dt40yw586grqsqqpphkjs0cue
n/AnarcoSobrevivencialismo (por: nostr:nprofile1qqsfj5s9lrcckaxd8ul7vf3c4ajfg0n0ytcjvetclw679hy6p98wpfqpr4mhxue69uhkummnw3ezucnfw33k76twv4ezuum0vd5kzmp0qy2hwumn8ghj7un9d3shjtnwdaehgu3wvfnj7qg4waehxw309ahx7um5wghx77r5wghxgetk9uykdgj7) nostr:naddr1qqdyzmnpwf3k75m0vfex2anfwejkucmfv9kxjumddap9yq3qn9fqt7833d6v60elucnr3tmyjslx7gh3yejh37a4utwf5z2wuzjqxpqqqzr0vsz5kcy
n/SociedadeAlternativaLibertaria - Libertários (por: nostr:nprofile1qqs2ph3za34henpq2y3rzgqwgdc4pjmpleqr5t62rf7kxj0lmdyxnfgppemhxue69uhkummn9ekx7mp0ydypw5) nostr:naddr1qq09xmmrd9jkgctyv4qkcar9wfhxzarfwes5c6tzv4e8gctjd9ssyg9qmc3wc6muess9zg33yq8yxu2sedslusp69a9p5ltrf8lakjrf55psgqqqsmmq8dtk3m
n/LibertariosPT - Libertários de Portugal (por: nostr:nprofile1qqszx8rlqax4pakclsxscudfset7fs37jm7rflnugh3nf8r4ehx4z4gppemhxue69uhkummn9ekx7mp05leack) nostr:naddr1qqx5c6tzv4e8gctjd9hhx5z5qgszx8rlqax4pakclsxscudfset7fs37jm7rflnugh3nf8r4ehx4z4grqsqqpphke05802
Discussões Sociais
n/Aliança-Conservadora-Brasileira (por: nostr:npub1atg5rgfuarup49470kqexfgcesdr85yru56y0y8qf3z6kc30g2vqyfyqyp ) nostr:naddr1qqsyzmrfv9hv8fmptapk7mnnv4e8vctydaexzh6zwfshx6tvv45hycgzyr4dzsdp8n50sx5khe7crye9rrxp5v7ss0jng3usupxyt2mz9apfsqcyqqqgdasue9j59
n/Ilha-de-Anhatomirin - Monarquia (Por: nostr:nprofile1qqsgzc22v804davx6vpwtwfu6j84yvupeld497tfr396usmu7s0m08qpz4mhxue69uhhyetvv9ujuerpd46hxtnfduhszymhwden5te0v9ehgunpdshxu6twdfsj7qguwaehxw309a5x7ervvfhkgtnrdaexzcmvv5h8gmm0d3ej7a2jp7u) nostr:naddr1qqf5jmrgvykkgefdg9hxsct5dakkjunfd5q3uamnwvaz7tmwdaehgu3dwp6kytnhv4kxcmmjv3jhytnwv46z7q3qs9s55cwl2m6cd5czukune4y02gecrn7m2tukj8zt4epheaqlk7wqxpqqqzr0vu2qg3m
n/ManosphereBrasil - Contra a misandria (Por: nostr:nprofile1qqs0p3yd48kzm56a4tual772y3vsjwehx6tc3rv8ht8q0zgncg5r7qgpg3mhxw309ahhsarjv3jhvctkxc685d35093rw7pkwf4xwdrww3a8z6ngv4jx6dtzx4ax5ut4d36kw6mwdpa8ydpkdeunyutzv9jzummwd9hkutcpjnhed) nostr:naddr1qqgy6ctwdaehq6r9wfj5yunpwd5kcqgawaehxw309ahx7um5wghxy6t5vdhkjmn9wgh8xmmrd9skctczyrcvfrdfaskaxhd2l80lhj3ytyynkdekj7ygmpa6ecrcjy7z9qlszqcyqqqgdasl3kaju
Memes
n/Shitposting (Por: nostr:nprofile1qqs9nyy7ctpy334n3p7gh4p93lmj2cch8ae8jgjsp8al2g32stdnpdcpzamhxue69uhhyetvv9ujumn0wd68ytnzv9hxgtcpr9mhxue69uhhyetvv9ujumn0wd68ytnrdakjuct49us57cz4) nostr:naddr1qq94x6rfw3cx7um5d9hxwqgswaehxw309ahx7um5wghx6mmd9upzqkvsnmpvyjxxkwy8ez75yk8lwftrzulhy7fz2qylhafz92pdkv9hqvzqqqyx7chlz42w
n/Puro-caldo-do-Brasil. (por: nostr:nprofile1qqsztjv2pflmwcayr2jaq90astj94lu5l0smr0zhkfdct4ry7uxu7dqywzq8t) nostr:naddr1qq24qatjdukkxctvv3hj6er094p8yctnd9kzuqghwaehxw309aex2mrp0yh8qunfd4skctnwv46z7q3qyhyc5znlka36gx496q2lmqhyttlef7lpkx790vjmsh2xfacdeu6qxpqqqzr0vwh0r4w
Locais
n/NordesteLibertário - Nordeste (Por: nostr:nprofile1qqs2tmjyw452ydezymtywqf625j3atra6datgzqy55fp5c7w9jn4gqgpzpmhxue69uhkummnw3ezumt0d5hsz9mhwden5te0wfjkccte9ehx7um5wghxyctwvshsz9thwden5te0wfjkccte9ejxzmt4wvhxjme0s8pkkr ) nostr:naddr1qqf5ummjv3jhxar9f35kyetjwnp6zunfdupzpf0wg36k3g3hygndv3cp8f2j284v0hfh4dqgqjj3yxnreck2w4qpqvzqqqyx7cnejrgl
n/BahiaLibertária - Bahia (por: nostr:nprofile1qqs2tmjyw452ydezymtywqf625j3atra6datgzqy55fp5c7w9jn4gqgpzpmhxue69uhkummnw3ezumt0d5hsz9mhwden5te0wfjkccte9ehx7um5wghxyctwvshsz9thwden5te0wfjkccte9ejxzmt4wvhxjme0s8pkkr ) nostr:naddr1qqgyyctgd9s5c6tzv4e8fsapwf5kzq3q5hhygatg5gmjyfkkguqn54f9r6k8m5m6ksyqffgjrf3uut982sqsxpqqqzr0vc4949j
n/LiberdadeMinas - Minas Gerais (Por: nostr:nprofile1qqsf0kszkmrmy9l3c7mxr3uhh3fmyjpq2z4hjvv7wdq84k5npd7gw3cpz4mhxue69uhhyetvv9ujuerpd46hxtnfduhszxthwden5te0wfjkccte9eekummjwsh8xmmrd9skctcprpmhxue69uhhyetvv9ujuurvv438xarj9e3k7mf0mx68nx) nostr:naddr1qq8yc6tzv4exgctyv4xkjmnpwvqsqq3qjldq9dk8kgtlr3akv8re00znkfyzq59t0yceuu6q0tdfxzmusarsxpqqqzr0vag4knt
n/CyberpunkManaus - Manaus (Por: nostr:nprofile1qqsz8v8zlrg0jclhasdksctsr2jw28lrqwn3zrsclnkpmytvmzhhdlqpz3mhxw309ucnqt3jx5cjuvpwxgarsvpcxqq3wamn8ghj7vfexghrzd3c9ccjuv3s8gurqwps9uq5gamn8ghj7entv43kjd3nvfcx5en6093h2up5w3ekgmn4xsekvatwx438xamywp6ksemcwp6xummzdgekzdmz0pmhzd3j0g6xzepwdahxjmmw9u2upp88) nostr:naddr1qqgyx7tzv4e8qatwdvk56ctwv96hxqgqqgsz8v8zlrg0jclhasdksctsr2jw28lrqwn3zrsclnkpmytvmzhhdlqrqsqqpphkgjh4rf
n/BelémLibertario (por: nostr:npub167s6q8sfzkhel4227kacu98zcg6e37v5sqwkv8mxaazrryz9huzqlhcu2t) nostr:nevent1qqsqnqgx3u2whdqdqmlstqcmgav6xfe4upz2qxfvj03tlk699dzlk7qzyrt6rgq7py26l874ft6mhrs5utprtx8ejjqp6eslvmh5gvvsgklsgqcyqqqqq2qqsdz6l
n/SãoPauloLivre - São Paulo (por: nostr:nprofile1qqsw4jww99ykxf2jy4wyh685hp7cs70texztv0p7kqa3mqhfrvvdtscpzamhxue69uhhyetvv9ujumn0wd68ytnzv9hxgtcpzpmhxue69uhkummnw3ezumt0d5hsz8rhwden5te0wfjkccte9emkj6mfveex2etyd9sju7re0ghsftvmn0 e nostr:nprofile1qqs2tmjyw452ydezymtywqf625j3atra6datgzqy55fp5c7w9jn4gqgpr4mhxue69uhkummnw3ezucnfw33k76twv4ezuum0vd5kzmp0qy08wumn8ghj7mn0wd68yttsw43zuam9d3kx7unyv4ezumn9wshsz9thwden5te0wfjkccte9ehx7um5wghxyee0vnwevs) nostr:naddr1qq898sardagxzatvdaxxjanjv5pzp6kfec55jce92gj4cjlg7ju8mzrea0ycfd3u86crk8vzayd334wrqvzqqqyx7cmls060
n/AcreLibertário - Acre (por: nostr:nprofile1qqsw4jww99ykxf2jy4wyh685hp7cs70texztv0p7kqa3mqhfrvvdtscpzamhxue69uhhyetvv9ujumn0wd68ytnzv9hxgtcpzpmhxue69uhkummnw3ezumt0d5hsz8rhwden5te0wfjkccte9emkj6mfveex2etyd9sju7re0ghsftvmn0 e nostr:nprofile1qqs2tmjyw452ydezymtywqf625j3atra6datgzqy55fp5c7w9jn4gqgpr4mhxue69uhkummnw3ezucnfw33k76twv4ezuum0vd5kzmp0qy08wumn8ghj7mn0wd68yttsw43zuam9d3kx7unyv4ezumn9wshsz9thwden5te0wfjkccte9ehx7um5wghxyee0vnwevs) nostr:naddr1qq85zcmjv4xxjcn9wf6v8gtjd9hsyg82e88zjjtry4fz2hztar6tslvg084unp9k8sltqwcast53kxx4cvpsgqqqsmmqftljpt
n/Alagoas (por: nostr:nprofile1qqsw4jww99ykxf2jy4wyh685hp7cs70texztv0p7kqa3mqhfrvvdtscpzamhxue69uhhyetvv9ujumn0wd68ytnzv9hxgtcpzpmhxue69uhkummnw3ezumt0d5hsz8rhwden5te0wfjkccte9emkj6mfveex2etyd9sju7re0ghsftvmn0 e nostr:nprofile1qqs2tmjyw452ydezymtywqf625j3atra6datgzqy55fp5c7w9jn4gqgpr4mhxue69uhkummnw3ezucnfw33k76twv4ezuum0vd5kzmp0qy08wumn8ghj7mn0wd68yttsw43zuam9d3kx7unyv4ezumn9wshsz9thwden5te0wfjkccte9ehx7um5wghxyee0vnwevs) nostr:naddr1qqr5zmrpvahkzuczyr4vnn3ff93j2539t3973a9c0ky8n67fsjmrc04s8vwc96gmrr2uxqcyqqqgdas8qtaf4
Empreendedorismo:
n/Empreendedorismo/BR (por: nostr:npub14ysljm0gn6nnjv95yzeq6ffze4f3f9l0248kez4fhm4yz3fzardslwx5e8) nostr:naddr1qqd5y4zr9azk6urjv4jkuer9v3hhy6tnd4hj7snjv9ekjmqzyz5jr7tdaz02wwfsksstyrf9ytx4x9yhaa257my24xlw5s29yt5dkqcyqqqgdaslzrp3p
n/Empreendedorismo/SP (por: nostr:npub14ysljm0gn6nnjv95yzeq6ffze4f3f9l0248kez4fhm4yz3fzardslwx5e8) nostr:naddr1qqt5y4zr9azk6urjv4jkuer9v3hhy6tnd4hj756sqgs2jg0edh5fafeexz6zpvsdy53v65c5jlh42nmv325ma6jpg53w3kcrqsqqpphkcym25j
Análise
n/EBDV (Em Busca Da Verdade) - Análise geral e desenvolvimento pessoal (por: nostr:nprofile1qqs0xmu0skfdlmtl5tth6cv99za8f8kv7ulz5srkm8p6v5k03dx9lzspz4mhxue69uhkummnw3ezummcw3ezuer9wchszrnhwden5te0dehhxtnvdakz7qgswaehxw309ahx7um5wghx6mmd9usvrt9r) nostr:naddr1qqzy2sjy2cpzpum037ze9hld073dwltps55t5ay7enmnu2jqwmvu8fjje795chu2qvzqqqyx7cy9v5px
-
@ 58537364:705b4b85
2025-05-20 06:47:23อิคิไก (Ikigai) แปลว่า ความหมายของการมีชีวิตอยู่ เหตุผลของการมีชีวิตอยู่ เราเกิดมาเพื่ออะไร ใช้ชีวิตอยู่ไปทำไม เมื่อการงานไม่ใช่สิ่งที่แปลกแยกจากชีวิต
คนญี่ปุ่นเชื่อว่าทุกคนมี ikigai ของตัวเอง ผู้ที่ค้นพบ ikigai จะเจอความหมายและคุณค่าของชีวิต ทำให้มีความสุขกว่า อารมณ์ดีกว่า และมีโลกที่น่าอยู่กว่าด้วย
ปัจจุบัน มีหนังสือเกี่ยวกับอิคิไกออกวางขายเป็นจำนวนมาก แต่เล่มที่คนญี่ปุ่นเป็นคนเขียนเล่มแรกนั้น คือ
- The Little Book of Ikigai : The secret Japanese way to live a happy and long life โดยอาจารย์เคน โมหงิ (แปลภาษาไทยโดย คุณวุฒิชัย กฤษณะประการกิจ)
ตามมาสัมผัสโลกของอิคิไกที่แท้จริงจากนักวิทยาศาสตร์วิจัยด้านสมองชาวญี่ปุ่นคนนี้ ผ่านบทสนทนาที่จะเปลี่ยนความคิดใหม่ที่ว่า 'อิคิไก' เริ่มต้นจากมองหาความสุขเล็กๆ น้อยๆ ในแบบของตัวเราเอง
อาจารย์เคน โมหงิว่า ปู่จิโร่ เชฟซูชิวัย 94 ปี ที่ยังยืนปั้นซูชิให้เราทานอยู่ในทุกวันนี้ เป็นแรงบันดาลใจให้อาจารย์เกิดไอเดียในการเขียนหนังสืออิคิไก
เชฟซูชิที่ ‘ไม่ได้’ เริ่มเลือกงานนี้เพราะความรักหรือความถนัด แต่กลับทุ่มเทปั้นซูชิทุกคำเพื่อให้ลูกค้ามีความสุข… นั่นคือต้นแบบของอิคิไก
น่าแปลกที่คนญี่ปุ่นไม่ค่อยใช้คำว่า ‘อิคิไก’ ในชีวิตประจำวันหรือบทสนทนาทั่วไปเท่าไหร่
เพราะมันเป็นสิ่งที่ปกติและเราทำกันตามธรรมชาติ ในโลกปัจจุบัน เรามักพูดกันว่าทำอย่างไรเราถึงจะประสบความสำเร็จ ทำอย่างไรจะได้เลื่อนตำแหน่ง หากอยากเป็น CEO จะเป็นได้อย่างไร แต่คนญี่ปุ่นมีความคิดว่าความสำเร็จไม่ใช่ทุกอย่างในชีวิต
ยกตัวอย่างเช่นมีคนญี่ปุ่นจำนวนมากที่จริงจังกับงานอดิเรก หรือมี โคดาวาริ* คนอื่นไม่สนหรอกว่างานอดิเรกของคนคนนั้นจะเป็นอะไร ตราบใดที่คนคนนั้นดูมีความสุขดีนั่นก็โอเคแล้ว มีคนจำนวนมากคลั่งไคล้รถไฟ มังงะ (หนังสือการ์ตูน) หรือแอนิเมะ (ภาพยนตร์การ์ตูน) คนเหล่านี้ไม่จำเป็นต้องมีชื่อเสียงหรือได้รับการยอมรับจากสังคม ตราบเท่าที่พวกเขามีความสุขในแบบของเขาเอง มันก็ดีแล้ว
- ความพิถีพิถันใส่ใจในบางเรื่องเป็นพิเศษ เช่น คนที่ชอบเครื่องเขียนมากๆ จะพิถีพิถันในการเลือกปากกา สมุด ดินสอที่ตนเองจะใช้ เพราะฉะนั้น คนที่มีโคดาวาริเหล่านี้จะศึกษาเครื่องเขียนจนถึงที่สุด วิเคราะห์ ทดลอง จนพบว่าเครื่องเขียนแบบใดที่ตนเองหลงใหลที่สุด
อิคิไกของแต่ละคนอาจแตกต่างกัน ต่างคนอาจมีค่านิยมที่ต่างกัน ซึ่งสะท้อนในรูปแบบชีวิตที่แตกต่างกันก็ได้
อิคิไกเป็นเรื่องของความหลากหลายนะ สังคมญี่ปุ่นพยายามผลักดันให้เด็กๆ ทุกคนตามหาอิคิไกของตนเอง เราจะไม่บอกว่า งานนี้เงินดี ทำสิ หรืองานนี้เงินน้อย อย่าไปทำเลย ถ้าคุณถามนักศึกษาว่า พวกเขาอยากทำงานอะไร พวกเขาคงไม่ตอบว่าเลือกทำที่บริษัทนี้เพราะเงินเป็นอันดับแรกหรอก
อิคิไกแตกต่างจากคำว่า ‘ความสำเร็จ’ คนญี่ปุ่นรู้ว่าชีวิตไม่ได้มีแค่เรื่องประสบความสำเร็จ อิคิไกสำคัญกับชีวิตมากกว่า คุณอาจจะประสบความสำเร็จ แต่คุณอาจไม่มีอิคิไก ในทางกลับกัน แม้คุณไม่ประสบความสำเร็จ คุณอาจจะมีอิคิไกก็ได้ ซึ่งชีวิตคุณอาจจะมีความสุขมากกว่า
อาจารย์เคน โมหงินิยามคำว่า ‘ความสำเร็จ’ คือสิ่งที่คุณจะได้รับการยอมรับจากคนในสังคมหรือบริบทสังคมนั้นๆ แต่อิคิไกมาจากหัวใจของคุณ มาจากความสุขส่วนตัวของคุณ คนอื่นอาจจะไม่ได้มองว่านั่นคือความสำเร็จ
อิคิไกเป็นสิ่งที่เฉพาะบุคคล เราสามารถมีความสุขในแบบของเราเอง เราไม่ตัดสินความสุขของคนอื่น และให้เขามีความสุขในแบบของเขาเอง…
สิ่งสำคัญของอิคิไกคือ คุณมีความสุขเล็กๆ น้อยๆ จากเรื่องที่ดูเหมือนเป็นเรื่องเล็กๆ น้อยๆ หรือเปล่า เช่น ตอนเด็กๆ ผมชอบศึกษาเกี่ยวกับผีเสื้อ เวลาผมไปวิ่งออกกำลังกายแล้วเห็นผีเสื้อสวยๆ ผมก็สัมผัสได้ถึงอิคิไก หรือบางทีอาจเกิดขึ้นตอนที่ผมรู้สึกตลกๆ ก็ได้ ผมเห็นเด็กผู้ชายคนหนึ่งบอกพ่อว่า “พ่อๆ ต้องทำอย่างนี้สิ” เวลาผมได้ยินบทสนทนาแบบนี้ ผมก็รู้สึกถึงอิคิไก
หากพวกเราอยากมีอิคิไกบ้าง เราควรเริ่มจากอะไรดี ? เริ่มจากการสัมผัสความสุขจากสิ่งเล็กๆ น้อยๆ ก่อน มันเริ่มทำได้ง่ายที่สุด ในสมองเรามีสารชื่อโดพามีน หากเราทำอะไรสำเร็จเล็กๆ น้อยๆ โดพามีนจะหลั่งออกมา วงจรนั้นจะช่วยทำให้คุณมีความสุข การมีความสุขกับสิ่งเล็กๆ เช่นนี้เป็นเรื่องสำคัญมาก สำหรับหลายคน แนวคิดเรื่องอิคิไกอาจเข้าใจยาก หรือยากสำหรับบางคนที่ชีวิตพวกเขากำลังอยู่ในช่วงยากลำบาก กำลังรู้สึกหมดหวัง ท้อแท้ หรือไม่ได้เคารพตนเอง เพราะฉะนั้น เริ่มจากความสุขเล็กๆ น้อยๆ ก่อนครับ
มันเหมือนการคิดบวกไหม ? อิคิไกเป็นส่วนหนึ่งนะ เวลาเราคิดถึงชีวิต หรือคิดหาวิธีการคิดบวก มันเป็นเรื่องที่ซับซ้อนมาก สำหรับบางคนคำว่า ‘คิดบวก’ อาจฟังดูกดดันสำหรับพวกเขา เพราะฉะนั้น เริ่มจากการมองเห็นความสุขจากสิ่งเล็กๆ น้อยๆ รอบตัว สิ่งเล็กมากๆ เช่นการได้ตื่นมาชงกาแฟดื่ม การได้วิ่งกลางสายฝน
Lesson from Ken Mogi 1. อิคิไก ไม่ใช่การแสวงหาความสำเร็จหรือความร่ำรวย แต่เป็นการรู้สึกหรือสัมผัสถึงความสุขในชีวิตของตนเอง จนทำให้เราเห็นความหมายของชีวิตเราในแบบของเรา 2. อิคิไกไม่ใช่สิ่งที่สังคมนิยามหรือโลกให้ความสำคัญ แต่ละคนมีอิคิไกที่แตกต่างกัน และมีความสุขกับชีวิตในแบบของตนเอง ที่เราเลือกเอง 3. เราไม่ควรตัดสินคนอื่นหรือบีบบังคับคนอื่น เช่น ลูก แฟน ให้ใช้ชีวิตในแบบที่เราคิดว่าใช่ แต่เราควรเคารพความหลากหลายนั้น 4. มองคนที่มีอิคิไกหรือกำลังสนุกกับสิ่งที่พวกเขารักด้วยรอยยิ้ม และคอยช่วยเหลือหากพวกเขาลำบาก 5. อิคิไกมีทั้งระดับใหญ่ ซึ่งเกี่ยวกับแนวทางชีวิตหรือคุณค่าของงาน และอิคิไกระดับเล็กคือการสัมผัสความสุขเล็กๆ น้อยๆ ที่พบเห็นได้ในชีวิตประจำวัน 6. อิคิไก เริ่มต้นจากมองหาความสุขเล็กๆ น้อยๆ ในวันนี้
ที่มา : จากคอลัมน์ Cloud of Thoughts บทสัมภาษณ์ของอ.เกตุวดี Marumura พาไปคุยกับอาจารย์เคน โมหงิ ผู้เขียนหนังสืออิคิไกเล่มแรก!
-
@ c9badfea:610f861a
2025-05-05 23:29:08- Install RTranslator (it's free and open source)
- Launch the app, allow notifications, and enter a random name (used only for Walkie-Talkie/Conversations)
- Wait for the translation AI models to download
- Enjoy offline translations
ℹ️ Internet is only needed for the initial download
ℹ️ The app uses the system's TTS engine (consider open source TTS engines like SherpaTTS for de-googled phones)
-
@ 9c9d2765:16f8c2c2
2025-05-20 05:45:33CHAPTER TWENTY THREE Across town, the Ray estate was drenched in shame. The once-proud family was now the subject of ridicule, their downfall televised, published, and whispered in business circles. Helen stood before a cracked mirror in her bedroom, mascara smudged, lips trembling with fury. The headlines were merciless:
"Heir to JP Empire Humiliated by Ray Family Then Bought Them Out."
"President James: From Rejection to Royalty."
She had lost more than power. She had lost control.
Mark, seated in an armchair with a drink that had gone warm, stared at the wall, his eyes empty. He was a strategist, a manipulator but somehow, he had underestimated James.
"He's just one man…" Mark muttered.
"No," Helen corrected him coldly. "He's not just a man. He’s a symbol now. Of power… of justice… and worst of all, forgiveness."
Mark scoffed. "Forgiveness?"
"Yes," she snapped, spinning to face him. "Because he didn’t destroy us when he could. That makes him look grander than anything we can ever fabricate. He let the world ruin us instead."
There was a long pause.
Then Mark stood, eyes narrow. "We’ll find another way. We always do."
But the fire in his voice had dulled. The Ray family was crippled, their company reduced to a shadow of its former self. Their staff had dwindled, partners severed ties, and their name now stood for arrogance and downfall.
Meanwhile, James had begun the silent restoration of more than just a company he was rebuilding legacies.
Back at JP Enterprises, Rita stepped into James’s office, her presence warm and reassuring.
“You’ve been in here for hours,” she said softly. “Everything alright?”
James looked up, his eyes thoughtful. “Everything is fine. I’m just… reflecting.”
“About them?”
He nodded. “Helen, Mark, Tracy. I know they’re not done. People like them never accept defeat.”
Rita approached, placing a comforting hand on the desk. “Then be ready for their next move. But know that you’re not alone anymore. And you’re no longer the man they thought you were.”
A faint smile curved on his lips. “No. I’m the man they made me become.”
Outside the office, whispers of the upcoming restructuring had already begun. Rumors swirled about James planning to absorb Ray Enterprises entirely into JP Holdings. Some believed he would dismantle it brick by brick. Others hoped he would revive it, proving once again that mercy was strength.
But only James knew his next move.
And as the days passed, the city watched some in admiration, others in dread.
Nightfall settled over the city like velvet, embroidered with the glimmer of a thousand restless lights. From the penthouse office of JP Enterprises, James stood before the floor-to-ceiling windows, his silhouette framed against the horizon. The world below him pulsed with ambition and whispers. Yet his mind wasn’t on the skyline, but on the murky tide still gathering beneath it Mark, Helen, and the crumbling remnants of a fallen dynasty that refused to stay buried.
The public had embraced his rise like a storybook tale. From the ashes of mockery, betrayal, and scorn, he had risen dignified, strategic, and unyielding. News outlets now hailed him as a symbol of resilience, of leadership sharpened by adversity. But James knew that the brightest stars cast the darkest shadows.
Behind the glamour, war drums still beat.
He sat at his desk, opening a sealed file handed to him earlier by his private investigator. Inside were photographs, recordings, and written transcripts irrefutable proof of secret meetings between Helen, Mark, and a few disgruntled former board members of Ray Enterprises. They were not merely planning revenge, they were mobilizing.
A knock interrupted his thoughts. Rita stepped in, poised and composed.
“You asked me to bring the reports on the integration of Ray Enterprises’ satellite branches.”
“Thank you, Rita,” James said, his voice calm but laced with calculation. “Leave them here.”
She lingered. “There’s something else,” she said, her tone more hushed now. “The woman from the anniversary… she’s resurfaced.”
James looked up slowly. “Where?”
“She was seen outside a media house yesterday, trying to set up another exclusive. But word is she's trying to recant her confession. Claims she was ‘coerced’ into blaming Mark and Helen.”
James’s gaze narrowed. “They’re trying to rewrite the narrative.”
Rita nodded. “And if they succeed, they’ll portray you as the one who orchestrated the chaos.”
He exhaled quietly, rising from his seat. “Let them try. The truth is no longer their weapon, it's mine.”
Meanwhile, in a dimly lit lounge across town, Mark and Helen sat opposite a trembling young woman, the same one who once fell to her knees and confessed everything at the anniversary.
“You owe us,” Helen said through clenched teeth. “We gave you the money, we protected you… and you humiliated us in front of the entire city.”
“I was scared,” the woman stammered, eyes darting between them. “Everyone was watching. Mr. JP was furious. What was I supposed to do?”
Mark leaned in, his expression carved from ice. “Fix it.”
“Y-You mean go to the press?”
Helen smiled coldly. “No. We mean bury the damage. Make James look like the one pulling your strings. We’ll give you twice what we paid. You just have to make the world believe he bribed you.”
As the woman hesitated, fear swimming in her gaze, Helen added softly, “Or you disappear.”
The woman’s nod was reluctant, but it was enough.
-
@ c6d8334c:30883d6d
2025-05-20 14:08:19🔑 Hashtag-Kombination (immer gleich aufgebaut):
```
relilab #verstehen 1️⃣
relilab #anwenden 2️⃣
relilab #reflektieren
relilab #gestalten 3️⃣
```
✅ Pflicht:
-
#relilab
-
genau ein Kompetenz-Hashtag:
#verstehen
,#anwenden
,#reflektieren
,#gestalten
✨ Optional:
-
eine Niveaustufe:
-
1️⃣ Reproduktion
-
2️⃣ Rekonstruktion
-
3️⃣ Konstruktion
📝 Beispielhafte Posts
```text
relilab #verstehen 1️⃣
Ich habe heute zum ersten Mal ausprobiert, wie KI überhaupt "lernt". Spannend!
relilab #anwenden 2️⃣
ChatGPT half mir dabei, einen Ablaufplan für einen Unterricht zu entwerfen – sehr hilfreich.
relilab #reflektieren
Welche Rolle spielt das Menschenbild, wenn KI religiöse Themen behandelt?
relilab #gestalten 3️⃣
Ich habe ein eigenes H5P-Modul mit einem KI-generierten Bibelquiz gebaut. Wer testet es? ```
-
-
@ 266815e0:6cd408a5
2025-05-02 22:24:59Its been six long months of refactoring code and building out to the applesauce packages but the app is stable enough for another release.
This update is pretty much a full rewrite of the non-visible parts of the app. all the background services were either moved out to the applesauce packages or rewritten, the result is that noStrudel is a little faster and much more consistent with connections and publishing.
New layout
The app has a new layout now, it takes advantage of the full desktop screen and looks a little better than it did before.
Removed NIP-72 communities
The NIP-72 communities are no longer part of the app, if you want to continue using them there are still a few apps that support them ( like satellite.earth ) but noStrudel won't support them going forward.
The communities where interesting but ultimately proved too have some fundamental flaws, most notably that all posts had to be approved by a moderator. There were some good ideas on how to improve it but they would have only been patches and wouldn't have fixed the underlying issues.
I wont promise to build it into noStrudel, but NIP-29 (relay based groups) look a lot more promising and already have better moderation abilities then NIP-72 communities could ever have.
Settings view
There is now a dedicated settings view, so no more hunting around for where the relays are set or trying to find how to add another account. its all in one place now
Cleaned up lists
The list views are a little cleaner now, and they have a simple edit modal
New emoji picker
Just another small improvement that makes the app feel more complete.
Experimental Wallet
There is a new "wallet" view in the app that lets you manage your NIP-60 cashu wallet. its very experimental and probably won't work for you, but its there and I hope to finish it up so the app can support NIP-61 nutzaps.
WARNING: Don't feed the wallet your hard earned sats, it will eat them!
Smaller improvements
- Added NSFW flag for replies
- Updated NIP-48 bunker login to work with new spec
- Linkfy BIPs
- Added 404 page
- Add NIP-22 comments under badges, files, and articles
- Add max height to timeline notes
- Fix articles view freezing on load
- Add option to mirror blobs when sharing notes
- Remove "open in drawer" for notes
-
@ 04ce30c2:59ea576a
2025-05-20 04:19:25Em uma sociedade verdadeiramente livre, o indivíduo tem o direito de escolher como guardar e transferir valor. Isso inclui a liberdade de escolher qual moeda usar, sem coerção, monopólios ou imposições estatais. A concorrência entre moedas permite que as melhores propriedades monetárias prevaleçam de forma natural e voluntária.
Moeda imposta é controle
Quando uma única moeda é forçada por lei, seja por decreto estatal ou por exigências institucionais, o usuário perde a soberania sobre seu próprio patrimônio. Isso abre espaço para inflação arbitrária, bloqueios de transações, congelamento de fundos e vigilância massiva.
Concorrência monetária é essencial
A liberdade monetária implica a coexistência de várias moedas competindo entre si. Cada uma traz suas características e vantagens específicas. A escolha deve estar nas mãos do usuário, não em autoridades centralizadas.
A melhor moeda tende a se tornar o padrão
No longo prazo, a moeda com melhores propriedades monetárias, como previsibilidade, descentralização, auditabilidade e liquidez, tende a ser adotada como padrão de referência para precificação, poupança e comércio global.
O Bitcoin é a moeda mais forte nesse sentido. Mas isso não impede que outras moedas coexistam como ferramentas complementares em contextos específicos.
Conversão é liberdade
Se o usuário quiser por exemplo mais privacidade ao comprar um café ou pagar uma conta, ele pode facilmente trocar seus bitcoins por monero e usá-los conforme sua necessidade. A possibilidade de trocar entre moedas é parte essencial da liberdade financeira.
Uma sociedade livre permite a escolha. O padrão monetário deve emergir do consenso do mercado, não de imposições. Que o Bitcoin se torne o padrão não por decreto, mas por mérito. E que outras moedas existam para servir à liberdade individual em toda sua complexidade.
-
@ bd32f268:22b33966
2025-05-20 14:07:47Recentemente tive conhecimento do mais recente flagelo cuja popularidade espelha bem o estado avançado de degeneração da nossa sociedade, o bebé reborn. Há uns anos certamente não passaria de uma piada de mau gosto quando alguém nos dissesse que decidiu adquirir um boneco para criar como se se tratasse de um filho, infelizmente em 2025 deixou de ser uma piada para se tornar algo assombroso.
Depois de fazer alguma pesquisa sobre o tema percebi que há pessoas que têm em curso processos litigantes judiciais relativos à, note-se com pasmo, guarda da boneca. A insanidade não fica por aqui uma vez que, algumas "mães" procuram atendimento médico para os seus bonecos. No Brasil, a câmara dos deputados recebeu três projetos destinados à criação de políticas públicas relacionadas com estes bonecos. As notícias sobre este fenómeno surreal multiplicam-se à medida que a insanidade se alastra como vírus pelas redes sociais.
Vivemos numa sociedade que há muito se divorciou da realidade, uma sociedade de pós-verdade, por isso de alguma forma não choca que este tipo de coisa possa acontecer. Podemos dizer que de alguma forma existe um primado do sentimento face à razão, preferimos, por vezes com consequências catastróficas, uma mentira "empática" do que uma verdade salvífica. Esta nossa tibieza em afirmar a verdade leva-nos consequentemente a uma crendice insustentável que é esta de, cada um tem a sua verdade. Graças a essa filosofia permitimos que um certo discurso lunático tenha mais alcance no espaço público. Por vezes ingenuamente podemos pensar que se trata de algo inofensivo, sem consequências de maior, contudo a experiência mostra-nos precisamente o contrário. Há por detrás destes fenómenos uma índole corrosiva que funciona como aguilhão para a disseminação das agendas políticas e ideológicas que visam a destruição da família. Considerando a excecional vulnerabilidade psíquica que observamos em cada vez mais pessoas neste tempo e a ampla disseminação destes fenómenos temos razão mais que suficientes para estarmos preocupados.
Uma outra elação que podemos retirar é que a nossa sociedade com as alegadas gerações "mais bem preparadas de sempre" está claramente a produzir um excesso de adultos que se comporta e, a todos os títulos são, crianças funcionais.
Com tudo isto fica cada vez mais difícil viver uma vida harmoniosa com a lei natural, pois vivemos em harmonia com algo considerado opressor pelos apologetas destes produtos do marxismo cultural. Com a pretensa igualdade que se pretende alcançar, equiparando inclusive um boneco a uma bebé, as famílias no sentido próprio do termo ficam em segundo plano relativamente a estes "novos" e esotéricos conceitos de família.
Importa perguntar, no meio de todas essas novas formas de se pensar uma família, qual é o ideal ?
Provavelmente os apologetas destas bizarrices ficarão em silêncio uma vez que coerentemente consideram que todas as formas são iguais e válidas.
Isto é apenas mais um sinal que nos é dado do declínio palpável dos valores que construíram a nossa sociedade e civilização. Façamos algo para que estas nocivas ideologias não entrem no nosso coração e em nossas casas, sob pena da corrupção dos nossos princípios e dos daqueles que nos são queridos. Estes fenómenos são de tal forma doentios que nos levam a crer que vivemos numa época tragicómica, o que me fez lembrar de uma história contada por Kierkgaard e que partilho de seguida.
“Certa vez, houve um incêndio num circo ambulante na Dinamarca. O director mandou imediatamente o palhaço, que já se encontrava vestido e maquilhado a preceito, para a vila mais próxima, à procura de ajuda, advertindo-o de que existia o perigo de o fogo se espalhar pelos campos ceifados e ressequidos, com risco iminente para as casas do próprio povoado. O palhaço correu até à vila e pediu aos moradores que viessem ajudar a apagar o incêndio que estava a destruir o circo. Mas os habitantes viram nos gritos do palhaço apenas um belo truque de publicidade que visaria levá-los a acorrer em grande número às sessões do circo; aplaudiam e desatavam a rir. Diante dessa reacção, o palhaço sentiu mais vontade de chorar do que de rir. Fez de tudo para convencer as pessoas de que não estava a representar, de que não se tratava de um truque e sim de um apelo da maior seriedade: estava realmente em causa um incêndio. Mas a sua insistência só fazia aumentar os risos; eles achavam que a performance estava excelente – até que o fogo alcançou de facto aquela vila. Aí já foi tarde, e o fogo acabou por destruir não só o circo, mas também a povoação”.
Soren Kierkgaard - Filósofo dinamarquês
-
@ cae03c48:2a7d6671
2025-05-20 14:00:00Bitcoin Magazine
Auradine Expands Bitcoin Mining Solutions with Advanced ASIC Chips, Cooling Systems, and Modular Megawatt ContainersAuradine Inc., a U.S.-based Bitcoin miner manufacturer, today announced it is unveiling a broadened portfolio of mining products at the Bitcoin 2025 Conference in Las Vegas, featuring high-performance ASIC chips, specialized cooling systems, and fully integrated modular containers engineered for scalable, megawatt-class mining operations, according to a press release sent to Bitcoin Magazine.
“Our goal is to democratize access to Bitcoin mining and enable innovative integrations,” said the CEO and Co-Founder of Auradine Rajiv Khemani. “Whether you’re running a megawatt container or building a small form-factor heater-miner for your home, we provide the chips, systems, and support to help you succeed. This new chapter is about giving miners the tools to innovate, scale, and operate efficiently.”
The new ASIC offerings, designed for both industrial and small-scale deployments, support customizable form factors and have already been adopted by operators including MARA Holdings, FutureBit, and Deep South Operating. Alongside the chips, Auradine continues to produce a full range of mining rigs to support a variety of deployment needs.
“Auradine’s ability to deliver both high-performance chips and scalable infrastructure aligns with MARA’s mission to stay at the forefront of bitcoin mining,” stated the Chief Technology Officer of MARA Holdings Ashu Swami. “We have been pleased with the partnership with Auradine with their leading edge engineering capability and innovation.”
Auradine’s modular 1 MW container units, developed in collaboration with Fog Hashing and FBox, are designed to accommodate 100–200 miners each. Merkle Standard, the first to deploy the system, reported improved energy efficiency and operational flexibility.
“We were the first to deploy Auradine’s container solution, and it immediately exceeded our expectations,” said the COO at Merkle Standard Monty Stahl. “The combination of performance, energy efficiency, and modular design gives us the flexibility to scale our operations faster and smarter than traditional infrastructure allows. This is the kind of innovation the mining industry has needed for a long time.”
Their recent $153 million Series C funding supports its push to offer flexible mining infrastructure and supplying ASIC chips for third-party integration. The company also plans to extend its hardware expertise to AI and networking through its AuraLinks initiative.
“We were one of the first to try Auradine’s ASIC chips and were immediately impressed by the support and customization that the team provided,” added the CEO of Deep South Operating, LLC Brock Tompkins. “It helps miners like us to stay scalable and efficient while raising the standard for what decentralized mining looks like.”
This post Auradine Expands Bitcoin Mining Solutions with Advanced ASIC Chips, Cooling Systems, and Modular Megawatt Containers first appeared on Bitcoin Magazine and is written by Oscar Zarraga Perez.
-
@ 7953d1fa:69c8039d
2025-05-20 02:39:56No mundo digital em constante evolução, plataformas de entretenimento online vêm ganhando espaço entre os brasileiros que buscam diversão, emoção e recompensas. Uma das opções que tem se destacado recentemente é a KK999, uma plataforma moderna, segura e repleta de oportunidades para jogadores de todos os níveis. Com uma ampla gama de jogos envolventes e uma experiência de usuário otimizada, o KK999 está conquistando cada vez mais adeptos no Brasil.
Introdução à Plataforma KK999 O KK999 se diferencia por oferecer uma experiência completa e intuitiva desde o primeiro acesso. A interface da plataforma foi cuidadosamente projetada para ser amigável, permitindo que novos usuários se cadastrem rapidamente e naveguem com facilidade. Tudo é pensado para garantir que o jogador tenha uma experiência fluida, sem complicações e com total transparência.
Além disso, o kk999se destaca por sua forte infraestrutura de segurança. Utilizando tecnologia de criptografia de ponta, os dados dos usuários são protegidos em todas as transações, garantindo tranquilidade para quem deseja apenas se divertir. Outro ponto importante é o suporte ao cliente, que está disponível 24 horas por dia, com atendimento em português, pronto para auxiliar com qualquer dúvida ou necessidade.
Variedade de Jogos para Todos os Gostos Um dos grandes atrativos do KK999 é a impressionante variedade de jogos disponíveis. Desde os tradicionais jogos de cartas até opções modernas com gráficos avançados, a plataforma atende todos os estilos de jogadores. Entre os destaques, estão as famosas roletas virtuais, jogos de pesca interativa, slot machines com temas variados e jogos ao vivo que simulam a sensação de estar em uma sala de jogos física.
Os slots, por exemplo, são um sucesso entre os brasileiros, oferecendo desde títulos clássicos com frutas e números até aventuras temáticas com bônus emocionantes. Os jogos de cartas também têm grande popularidade, incluindo versões modernas de pôquer, bacará e outros jogos estratégicos que desafiam a mente do jogador.
Para quem gosta de competir em tempo real, o KK999 oferece jogos ao vivo com crupiês reais e interatividade instantânea, proporcionando uma experiência imersiva e cheia de adrenalina. Tudo isso com transmissões de alta qualidade e conexão estável.
Experiência do Jogador: Diversão e Confiabilidade A experiência do jogador é uma das maiores prioridades do KK999. Desde o primeiro cadastro até as jogadas mais avançadas, a plataforma investe em funcionalidades que aumentam o conforto e a confiança do usuário. A navegação é rápida, os jogos carregam com eficiência e as recompensas são distribuídas com agilidade.
Outro fator que atrai muitos jogadores é o sistema de bônus e promoções. O KK999 frequentemente disponibiliza ofertas especiais para novos membros e prêmios para usuários frequentes, incentivando a fidelidade e aumentando ainda mais as chances de ganhar.
Além disso, o KK999 oferece uma experiência totalmente otimizada para dispositivos móveis. Seja no celular ou tablet, o jogador pode acessar todos os recursos da plataforma de qualquer lugar, a qualquer momento, sem perder desempenho ou qualidade.
Conclusão O KK999 se consolida como uma das principais plataformas de entretenimento digital no Brasil, reunindo inovação, segurança e uma variedade impressionante de jogos. Ideal tanto para iniciantes quanto para jogadores experientes, o site oferece tudo o que é necessário para transformar momentos comuns em experiências emocionantes.
-
@ 4ba8e86d:89d32de4
2025-05-02 13:51:37Tutorial OpenKeychain
- Baixar no F-droid https://f-droid.org/app/org.sufficientlysecure.keychain
Ao abrir o OpenKeychain pela primeira vez, você verá uma tela inicial indicando que ainda não há chaves configuradas. Nesse ponto, você terá três opções:
-
Criar uma nova chave PGP diretamente no OpenKeychain: Ideal para quem está começando e precisa de uma solução simples para criptografia em comunicações diárias.
-
Usar um token de segurança (como Fidesmo, Yubikey, NEO, ou Sigilance) Se você busca uma segurança ainda maior, pode optar por armazenar sua chave privada em um token de segurança. Com essa configuração, a chave privada nunca é salva no dispositivo móvel. O celular atua apenas como uma interface de comunicação, enquanto a chave permanece protegida no token, fora do alcance de possíveis invasores remotos. Isso garante que somente quem possui o token fisicamente possa usar a chave, elevando significativamente o nível de segurança e controle sobre seus dados.
-
Importar uma chave PGP existente: Você pode importar uma chave PGP que já tenha sido gerada anteriormente, seja por meio de um arquivo no dispositivo ou por outro meio ler na área de transferência. https://image.nostr.build/51fdd924df4843ab73faa02a505c8fb17794f1789396ed89b154348ebb337f07.jpg
1. CRIANDO UMA NOVA CHAVE PGP.
Para iniciantes, recomendamos criar uma nova chave diretamente no aplicativo. abordaremos o uso do OpenKeychain em modo online, que é mais comum para comunicações diárias.
Passo 1: Clique em “Criar minha chave”. https://image.nostr.build/235f5cfdf4c3006ca3b00342741003f79a5055355c2a8ee425fc33c875f51e49.jpg
Passo 2: Criando sua chave PGP.
Para criar sua chave, você precisará fornecer algumas informações Os campos 'Nome' e 'Endereço de e-mail' são apenas formas convenientes para identificar a sua chave PGP.
-
Nome: Escolha um nome ou um pseudônimo. https://image.nostr.build/de3fe3ddbde0c7bf084be6e4b8150fdb8612365550622559b0ee72f50f56a159.jpg
-
E-mail: Associe um endereço de e-mail à chave, seja ele pessoal ou um e-mail relacionado ao pseudônimo. https://image.nostr.build/aff62baaeafe2c9a429ef10435a6f99dea36d6cfd7494e2bb882421dc8ed0f4e.jpg
2. REVISANDO E PERSONALIZANDO A CRIAÇÃO DA CHAVE.
Passo 3: Antes de criar sua chave PGP, verifique se os dados inseridos estão corretos. https://image.nostr.build/a8ec09ef3d9b4f557b0c4e380e7ca45d0fdbfa33fe80becea03ed0e5f5eedd24.jpg
Você também pode personalizar as configurações de segurança clicando nos três pontos no canto superior direito. https://image.nostr.build/1ce615555cea9a979ea951472052a219e77f4e1ebaaf5fcbbe9e91ea4f852bce.jpg
Ao cliclar em ' nova subchave ' pode alterar a data de expiração e pode mudar a criptografia usado na chave cliclando opção ed2255/cv255. https://image.nostr.build/b3224ff3dbe48ff78c4a2df8b001926b6d3eef1e33ef677a73b0d281791073da.jpg https://image.nostr.build/7763c7847e062cdcf71aafedbc2ef4c38056fd66aeb162ef3a1c30c028a14376.jpg https://image.nostr.build/5d3e20ade460dd5e89cc001ebdc062a36aff2c0e1573584ca3c0d1cb34bddcce.jpg
Neste tutorial, utilizaremos as configurações padrão do aplicativo.
Passo 4: Clique em "Criar chave" para concluir o processo. https://image.nostr.build/a8ec09ef3d9b4f557b0c4e380e7ca45d0fdbfa33fe80becea03ed0e5f5eedd24.jpg
3. Como Compartilhar sua Chave PGP Pública
Após criar sua chave PGP, você pode compartilhá-la para que outras pessoas possam enviar mensagens criptografadas para você. Veja o passo a passo de como exibir e compartilhar sua chave pública:
Passo 1: Acesse sua chave pública
Abra o OpenKeychain e selecione a chave que deseja compartilhar. Clique na chave para visualizar os detalhes. https://image.nostr.build/689c5237075317e89e183d2664630de973b09b68aaf8f3e3033654e987b781be.jpg https://image.nostr.build/4001610109579f27535628932258087b3b06c1f86b05f4f85537b6585c12a10b.jpg
Passo 2: Copiar sua chave pública
Nos detalhes da chave, você verá a opção "Copiar para a Área de Transferência". Clique nessa opção para copiar o código da sua chave pública. https://image.nostr.build/01ab3efa5e997e1910a2f8f7a888e6ad60350574cca4ca0214eee5581797f704.jpg
A chave PGP copiada terá o seguinte formato:
-----BEGIN PGP PUBLIC KEY BLOCK-----
mDMEZwsLHRYJKwYBBAHaRw8BAQdA6NRLlJIWnTBJtYwZHlrMbTKRbYuXmjsMn8MB 7etV3HK0JERhbmllbCBGcmFnYSAgPGRhbmllbGZyYWdhQG1haWwuaTJwPohyBBMW CAAaBAsJCAcCFQgCFgECGQEFgmcLCx0CngECmwMACgkQFZf+kMeJWpR4cwEA8Jt1 TZ/+YlHg3EYphW8KsZOboHLi+L88whrWbka+0s8A/iuaNFAK/oQAlM2YI2e0rAjA VuUCo66mERQNLl2/qN0LuDgEZwsLHRIKKwYBBAGXVQEFAQEHQEj/ZfJolkCjldXP 0KQimE/3PfO9BdJeRtzZA+SsJDh+AwEIB4hhBBgWCAAJBYJnCwsdApsMAAoJEBWX /pDHiVqUo/oA/266xy7kIZvd0PF1QU9mv1m2oOdo7QSoqvgFiq6AmelbAP9lExY5 edctTa/zl87lCddYsZZhxG9g2Cg7xX/XsfrnAA== =TniY -----END PGP PUBLIC KEY BLOCK-----
Dica: Se ocorrer algum erro ao compartilhar sua chave pública com um amigo, peça para que ele a criptografe para ele mesmo. Isso permitirá que ele adicione a chave corretamente. Caso a chave pública ainda não esteja no dispositivo, ao clicar em "Backup de chave", aparecerá a opção para importá-la. Se a chave já estiver no dispositivo, essa ação irá recarregá-la. https://image.nostr.build/cd12abf07c93473db95483fe23112325f89d3eb02977e42756708bbd043f8bcf.jpg https://image.nostr.build/537aeae38d229ee2cc78e18f412237b659c059e1c74fd7f0deecfe37f15713c9.jpg https://image.nostr.build/16c8a3db5966c7c06904ee236655f47a6464ae0c1b5af6af27b28c61611d2bbe.jpg
Passo 3: Compartilhar sua chave PGP
Você pode colar a chave pública em e-mails, assinaturas, perfis de redes sociais ou outros meios para compartilhá-la facilmente. Para facilitar a visualização, você também pode exibi-la em seu perfil de redes sociais.
Para acessar mais opções de compartilhamento, clique nos três pontos no canto superior direito e selecione a opção "Avançado". https://image.nostr.build/0d4a13b7bd9a4794017247d1a56fac082db0f993a2011a4dd40e388b22ec88f5.jpg https://image.nostr.build/4ac2a7bc9fa726531a945221cf7d10e0e387deba68100ccf52fdedfcd17cbd59.jpg
Na seção "Compartilhar", você verá sua Key ID e terá a opção de publicar sua chave PGP em um servidor de chaves. https://image.nostr.build/1e972cc211a6d8060cdbd4a8aa642dd1a292810c532f178d3ddb133d1b9bca76.jpg
Passo 4: Como compartilhar sua chave pública PGP no formato .asc. no OpenKeychain
1 . Acesse sua chave
Abra o OpenKeychain e toque na chave que você deseja compartilhar. Isso abrirá a tela com os detalhes da chave. https://image.nostr.build/c080f03d2eb7a9f7833fec0ff1942a5b70b97e4f7da7c6bc79ca300ef9ace55d.jpg
2 . Compartilhe o arquivo .asc
Toque no ícone de compartilhamento, como indicado na imagem abaixo. O aplicativo abrirá a janela para que você escolha por qual app deseja compartilhar sua chave pública no formato .asc. Nesse exemplo, usei o SimpleXChat , mas você pode usar qualquer aplicativo de sua preferência.
-
Botão de compartilhar. https://image.nostr.build/8da74bdb04737a45df671a30bba1dd2e7980841fa0c2d751d6649630e7c25470.jpg
-
Seleção do aplicativo para compartilhamento. https://image.nostr.build/5444f4e9d3fa5aef6b191bb6f553f94c6e49d30ead874c9ee435bca3218fd6c8.jpg
-
Enviando via SimpleXChat. https://image.nostr.build/e5d1ca04cbc69e1e8ac5caf1ab2a4b9b695500861c1ae9c55cea679cce349214.jpg
Sugestão para compartilhar nas redes sociais:
Você pode exibir sua chave de forma simples, por exemplo:
PGP: 1597 FE90 C789 5A94
Importar a chave pública usando a fingerprint
Passo 1:Clique no ícone "+" para começar. https://image.nostr.build/ca6e6e569b4be60165eaf60c7ba1e6e3ec781b525e467c72b4f3605837e6b5ec.jpg
Passo 2: Selecione a opção "Buscar Chave". https://image.nostr.build/87e27d9435e6e3ef78063b9f15799a8120ead4637cd06c89c0220b48327573ae.jpg
Passo 3: Digite a fingerprint da chave em letras minúsculas, sem espaços. A chave correspondente aparecerá para ser adicionada. https://image.nostr.build/33e6819edd4582d7a8513e8814dacb07e1a62994bb3238c1b5b3865a46b5f234.jpg
Além disso, você pode compartilhar sua chave pública em formato QR Code, facilitando a troca de chaves em eventos ou conversas rápidas. Como Assinar Mensagens para Confirmar a Autenticidade da Sua Rede Social
Você pode autenticar sua conta em redes sociais utilizando sua chave PGP. Ao assinar uma mensagem com sua chave, você demonstra que realmente possui essa conta. Siga o passo a passo abaixo para assinar uma mensagem:
Passo 1: Clique na sua chave PGP. https://image.nostr.build/ffacce1bfb293c9a0888cd5efe340a63d96b293f4c010f8626105c7b212d8558.jpg
Passo 2: Clique no ícone indicado pela seta para abrir o campo de texto. https://image.nostr.build/4e992a2553810e2583b9d190280ce00a52fc423600a75eca48cbf541cf47d3c2.jpg
Passo 3: Deixe a opção "Encriptar para:" vazio. Em "Assinar com:", selecione sua chave PGP e digite a mensagem que deseja enviar, como o nome da sua rede social. https://image.nostr.build/a4a2a8d233d186e3d8d9adddccc445bcb3ca3ed88de0db671a77cede12323a75.jpg
Passo 4: Clique no ícone indicado pela seta para copiar o texto assinado. Uma mensagem aparecerá informando: "Assinado/Encriptado com Sucesso". https://image.nostr.build/a076dfc90e30a495af0872005bf70f412df57b7a0e1c2e17cf5aee9e9b3e39aa.jpg
A mensagem copiada terá o seguinte formato:
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
Minha rede social NOSTR é Danielfraga oficial. -----BEGIN PGP SIGNATURE-----
iIQEARYIACwlHERhbmllbCBGcmFnYSAgPGRhbmllbGZyYWdhQG1haWwuaTJwPgUC ZxBBLgAKCRAVl/6Qx4lalGeNAPwP71rpsbhRnZhoWZsTDOFZY8ep/d0e5qYx5iPx HV26dwD/fKyiir1TR8JwZvEbOTYS0+Dn4DFlRAAfR3lKVTC96w4= =37Lj -----END PGP SIGNATURE-----
Com isso, você pode facilmente demonstrar a autenticidade da sua conta nas redes sociais.
4. PROTEGENDO SUA CHAVE COM UMA SENHA.
Passo 5: Após a criação da chave, é fundamental definir uma senha (ou passphrase) para adicionar uma camada extra de segurança. Recomendamos usar senhas longas (com mais de 20 caracteres) e de alta entropia para evitar ataques de força bruta. Ferramentas como KeePassDX ou Bitwarden podem ajudá-lo a gerar e gerenciar essas senhas.
Para definir a senha, clique na sua chave PGP, acesse o menu no canto superior direito e selecione "Alterar senha". https://image.nostr.build/689c5237075317e89e183d2664630de973b09b68aaf8f3e3033654e987b781be.jpg https://image.nostr.build/f28ecaa9890a8827f93cac78846c4b2ef67f86ccfc3501fdadf1d1c4874b0041.jpg https://image.nostr.build/919c277fbec63c397402abdd60f915cb239a674c317855cbda63a38edef80789.jpg
Agora basta adicionar uma senha forte. https://image.nostr.build/eb378219fbb1780f89663a474ce43b8d8ebb13beeb538f2a16279b056e5d9645.jpg https://image.nostr.build/cdfa3f9c6c4045841341da789deabb6318107812d5ba195529418572ab352aaf.jpg
5. CRIPTOGRAFAR E DESCRIPTOGRAFAR MENSAGENS E ARQUIVOS COM SUA CHAVE PGP
Criptografar Mensagens
Você pode criptografar mensagens para garantir que apenas o destinatário, que possui sua chave pública, possa lê-las. Siga os passos abaixo para criptografar um texto:
Passo 1: Abra o menu lateral clicando no ícone no canto superior esquerdo.
https://image.nostr.build/13ac93b38dd1633118ae3142401c13e8a089caabdf4617055284cc521a45b069.jpgPasso 2: Selecione a opção "Encriptar/Descriptar".
https://image.nostr.build/8cd905d616b53968f0551c071d9acc2f47bbe8434c2c7e1a33076a504342de48.jpgPasso 3: Clique na opção "Encriptar Texto".
https://image.nostr.build/405a730a6c774759d7913f92f59059d43146db4afb28451a6f8833f94e99437f.jpgPasso 4: Preencha os seguintes campos: https://image.nostr.build/7dc5eba39ff82a321195dbf46b8113818632e3ef41175991d58e799a8e9d2751.jpg
-
Encriptar para: Selecione o destinatário da mensagem, ou seja, a pessoa para quem você está enviando o texto criptografado.
https://image.nostr.build/1e8c8cba6d3c3136d9857512e2794a81ceb7434eccdfb0f7d26cdef008b2e6d2.jpg -
Assinar com: Escolha sua chave PGP para assinar a mensagem.
https://image.nostr.build/d25b228c35b132d396d01c354ef093b43b3565578fbc0d6ff7b9de4e41619855.jpg -
Digitar o texto: No campo de texto, escreva a mensagem que deseja criptografar.
https://image.nostr.build/8537271dfa4445e60cb4c3cdb5d97571dc0ff5ee8acd6ed89a8c81e4bd8736c2.jpg
Passo 5: Depois de preencher os campos, você pode copiar o texto criptografado de duas formas:
-
Copiar para a área de transferência: Clique na opção para copiar o texto criptografado e cole-o em um aplicativo de mensagens para enviá-lo.
https://image.nostr.build/a5cb8e2c538a38db3972e7f3ac9aa9f602cda6b62848ff0c4b99928a67dcd486.jpg -
Compartilhar diretamente: Utilize a opção de compartilhamento para enviar o texto criptografado diretamente através de seus aplicativos de mensagens.
https://image.nostr.build/2b79cb564d623788a0de1111a067e0eb496f743389d465d4f4e8f6e65f0d08a7.jpg https://image.nostr.build/ff59e52bc8ab54ff377980a6ba5d1c4743d3298de11e5daa187ab7d45163a7be.jpg
Criptografar arquivos.
Passo 1: Abra o menu lateral clicando no ícone no canto superior esquerdo.
https://image.nostr.build/13ac93b38dd1633118ae3142401c13e8a089caabdf4617055284cc521a45b069.jpgPasso 2: Selecione a opção "Encriptar/Descriptar".
https://image.nostr.build/8cd905d616b53968f0551c071d9acc2f47bbe8434c2c7e1a33076a504342de48.jpgPasso 3 : clique na opção "Encriptar arquivos ". https://image.nostr.build/3fcae48ee38e7f4079ebccfd3eafb9ab0ad3559221d2c3560cdfe60e29f56a15.jpg
Passo 4 : os passos a seguir são os mesmo que você seguiu pra encriptar a mensagem texto. Ítens "Encriptar para:" "Assinar com:" https://image.nostr.build/4d6599b9d3a9fdfae0964daaa9dae513d5ce277a7b61930fa2937d534f72ed40.jpg
Passo 5 : clilcar na opção " Adicionair arquivo(s)" Vai abrir na memória interna do celular selecione o arquivo que deseja encriptar. https://image.nostr.build/09e3b9b54a1406426114926aab19011c36b98886ebae6fcf556cfea83bb2c2f4.jpg https://image.nostr.build/af422e243b36762dd66111ec7c848a1352c100ca3040dc21792c923f80aef74d.jpg https://image.nostr.build/ebebbdb273b4bca58d901852aec1c60e4799aa77e9d12a31f992b0cf8f73e753.jpg
Passo 6: Depois de preencher os campos, você pode compartilhar o arquivo criptografado de duas formas:
-
Salvar na memória do celular: A primeira opção salva o arquivo criptografado no armazenamento do seu dispositivo. Você terá a opção de editar o nome do arquivo antes de salvar.
https://image.nostr.build/0a47c1e9f0003541f47091b2c2e8ce6b8d1533d95463e331b218070bae964ac8.jpg https://image.nostr.build/95a7a2b67356eb5ded5b217bab38a19bdeba5af7befd105834e413e0aec45462.jpg https://image.nostr.build/66cb3d22b271f3b73b7015613c72711a3ffbf5e1070d43153f9d1f3fcf35001c.jpg https://image.nostr.build/f9624d86f7592fe7ffad932b7805762dc279d9e8ff410222108155438a2c970f.jpg -
Compartilhar diretamente: Utilize a opção de compartilhamento para enviar o arquivo criptografado diretamente por meio dos seus aplicativos de mensagens.
https://image.nostr.build/85541e466c7755c65bd6ba0208a6d8612beaa5298712b6d92f53865167695a38.jpg https://image.nostr.build/bf1e0f0aeb60cafbdf82af4b3b598288519e85b396bd3f9e00e61f65b89ea9f8.jpg https://image.nostr.build/fb090339898f37cdbb020828689b142ca601ca3ee549f67ddf6b2e094df9ab9f.jpg https://image.nostr.build/50c249ced06efe465ba533fef15207b0dcd1a725e9b2c139e8d85c13fd798276.jpg
Descriptografar Mensagens e Arquivos
Para ler uma mensagem ou arquivo criptografado que você recebeu, utilize sua chave privada. Siga os passos abaixo:
Descriptografar Mensagens
Passo 1: Copie a mensagem criptografada que você recebeu.
https://image.nostr.build/c37754b12a458e0176b9137ae0aa9e8209f853bf9d9292c0867fd8b0606d53c4.jpgPasso 2: Clique na opção "Ler da área de transferência" para descriptografar o texto.
https://image.nostr.build/d83c7dad2ee1cb6267779863bc174ee1a8f3cc3c86b69063345321027bdde7b5.jpg https://image.nostr.build/c0fae86e6ab1fe9dcee86753972c818bed489ea11efdd09b7e7da7422a9c81eb.jpgDescriptografar Arquivos
Passo 1: Clique na opção "Selecionar arquivo de entrada".
https://image.nostr.build/9c276c630311d19a576f2e35b5ba82bac07360476edae3f1a8697ff85df9e3c9.jpgPasso 2: Selecione o arquivo criptografado que deseja descriptografar.
https://image.nostr.build/6b6c2a3284ba96e7168fc7bd0916020c4f1bed7b77dfca48227fc96d6929e15a.jpg https://image.nostr.build/9945aad644af2e2020e07e55f65f11a0958d55e8fc9e13c862e6b9ca88b4f4d9.jpg6. BACKUP E RESTAURAÇÃO DE CHAVE PGP.
Realizar o backup das suas chaves PGP é fundamental para evitar a perda de acesso às suas mensagens e dados criptografados. O OpenKeychain facilita esse processo, permitindo que você faça um backup completo e seguro. Recomendamos que você armazene o backup em um local seguro, como um HD externo ou pendrive conectado via cabo OTG, sempre protegendo-o com senha.
PASSOS PARA REALIZAR O BACKUP:
Passo 1: Abra o menu lateral clicando no ícone no canto superior esquerdo.
https://image.nostr.build/13ac93b38dd1633118ae3142401c13e8a089caabdf4617055284cc521a45b069.jpgPasso 2: Selecione a opção Backup/restaurar.
https://image.nostr.build/6fa8fd14e23b47c6c924bc0d900646663f2124a93d8172ae79fdf43b5c7d4490.jpgPasso 3: Escolha a primeira opção: Backup completo (criptografado).
https://image.nostr.build/4875fb27b6d04c3cb838b4fb9f308ef9194edc35ba1254ba965b7f0db2544170.jpgPasso 4: O backup será protegido por um código de backup gerado automaticamente. Anote esse código em um papel e guarde local seguro, pois sem ele você não conseguirá recuperar suas chaves PGP. Após anotar o código, marque a opção “Anotei o código” e clique em Salvar Backup. Obs: todas as vezes que você for fazer o backup da sua chave PGP vai ser criado um novo código aleatório.
https://image.nostr.build/72a317ef5e59a01c03c36f1d04a91d42c418a478cc82e372acf21bb8302daa00.jpg
Passo 5: Escolha o local onde deseja salvar o backup (HD externo, pendrive, etc.), confirme sua escolha e clique em OK. Você verá uma mensagem de confirmação indicando que o backup foi salvo com sucesso.
https://image.nostr.build/d757e8bdf429371320daa44be8a48a0dbeb2324129f4254327f0f0383e70ede4.jpg https://image.nostr.build/f3ad80ceb8a191b4d1b40722b1d0d4f85bf183d412e7d7d901b25d19b2dfe0e3.jpg
Importação da Chave PGP
Caso você precise restaurar suas chaves PGP a partir de um backup, o OpenKeychain também facilita o processo de importação. Siga os passos abaixo para restaurar sua chave PGP:
Passo 1: Selecione a opção "Selecionar arquivo de entrada"
Abra o OpenKeychain, acesse o menu lateral no canto superior esquerdo e escolha a opção "Selecionar arquivo de entrada" para localizar o arquivo de backup que você deseja importar.
https://image.nostr.build/a06ddc1c1e6c50519097e614aa25b14311e49c0ca4d4607e42ebdcca3a6641c4.jpgPasso 2: Selecione o arquivo de backup
Navegue até o local onde você salvou o arquivo de backup (HD externo, pendrive, etc.) e selecione-o. Em seguida, o OpenKeychain solicitará que você insira o código de recuperação que foi gerado no momento do backup. https://image.nostr.build/9d5649c04a98ec8b0a29355d9068e48313b1c5dc36cd965961f4d33f22d10046.jpgPasso 3: Digite o código de recuperação
Insira o código de recuperação que você anotou anteriormente. É importante digitar o código corretamente para garantir o sucesso da restauração.Passo 4: Depois de inserir o código corretamente, o OpenKeychain irá restaurar suas chaves PGP, e uma mensagem de confirmação será exibida, indicando que a recuperação foi concluída com sucesso.
Agora suas chaves estão restauradas e você pode continuar usando o OpenKeychain para gerenciar suas comunicações criptografadas de maneira segura.
https://www.openkeychain.org/
https://github.com/open-keychain/open-keychain
https://youtu.be/fptlAx_j4OA
-
@ 3ffac3a6:2d656657
2025-05-02 03:50:51Introduction: Don't Despair—This Can Be Fixed (But Don't Reboot Yet)
Running ZFS on a Raspberry Pi offers powerful features for home servers and personal NAS setups. But with power comes complexity, and in recent months, a quiet pitfall has emerged for Pi users who track kernel updates closely: upgrading to an unsupported kernel version breaks ZFS.
⚠️ Important Warning: If you've just upgraded your kernel and you're using ZFS, do not reboot yet. Rebooting without a working ZFS module can leave your system unbootable—even if you don't have critical partitions on ZFS. The system may hang because it tries to load the missing ZFS kernel module during boot and fails, halting the boot process.
If you're already facing a broken setup or can't boot — don't panic. This guide outlines both the worst-case scenario and the ideal recovery strategy. Whether you're locked out or preparing for a smooth upgrade, we've got you covered.
The Problem: A Kernel Update Too Far
As of ZFS version 2.2.3 (used in Debian-based Raspberry Pi OS), the filesystem supports Linux kernels up to 6.7. However, Raspberry Pi OS backports recently began shipping 6.12.x kernels. If you upgrade to 6.12 without precautions:
- ZFS will fail to compile against the new kernel
- DKMS errors will appear during package updates
- Your ZFS module will be missing after reboot
- Your Raspberry Pi may fail to boot, even without ZFS-mounted root or critical paths, simply due to systemd or boot scripts expecting the kernel module to be present
Example ZFS Compilation Error:
During package updates or installs, you'll see something like:
checking whether bdev_open_by_path() exists... configure: error: *** None of the expected "blkdev_get_by_path()" interfaces were detected. *** This may be because your kernel version is newer than what is *** supported, or you are using a patched custom kernel with *** incompatible modifications. *** *** ZFS Version: zfs-2.2.3-1~bpo12+1~rpt1 *** Compatible Kernels: 3.10 - 6.7
This error means ZFS cannot build its kernel module against Linux 6.12.x, making it unusable.
Why This Happens: The Version Trap
The key problem is that ZFS 2.2.3 remains installed even after a kernel upgrade, and it doesn't get upgraded automatically during
apt upgrade
. Since ZFS 2.2.3 only supports up to kernel 6.7, it fails to compile against 6.12.x.However, if you remove and then reinstall ZFS, the package manager installs ZFS 2.3.1, which does support Linux kernel 6.12.x. This version transition is what resolves the issue — but only if you explicitly purge and reinstall ZFS.
Worst Case: The System That Wouldn’t Boot
After upgrading the kernel and rebooting, the system failed to boot properly. It showed errors like:
cannot open access to console, the root account is locked
Although the system did not have critical filesystems on ZFS, the boot process still stalled because system services attempted to load the ZFS kernel module, which was no longer available. This resulted in an unrecoverable boot failure.
The only way forward was to reformat and reinstall Raspberry Pi OS. However, the default Raspberry Pi OS image still comes with a 6.6.x kernel, which is incompatible with ZFS 2.3.1 and newer kernels unless upgraded. Therefore, the recovery process requires one crucial step:
- First, perform a full system upgrade:
sudo apt update && sudo apt full-upgrade
This brings the kernel up to 6.12.x.
- Then, reinstall ZFS:
sudo apt install zfs-dkms zfsutils-linux
Once this is complete, your system will be running kernel 6.12 with ZFS 2.3.1, and you can safely import your pools and resume operations.
Best Case Recovery: Clean Cut, Clean Upgrade
For users who can still log into their system, here's the cleanest and safest sequence to move forward:
- Stop all services using ZFS, including Docker, NFS, Samba, backup tools, etc.
- Export all ZFS pools:
sudo zpool export -a
3. Disable swap if it lives on a ZFS vdev:sudo swapoff /dev/sdXn
4. Purge ZFS packages:sudo apt purge zfsutils-linux zfs-dkms zfs-zed sudo rm -rf /usr/src/zfs* /var/lib/dkms/zfs
5. Update the kernel to the desired version:sudo apt update && sudo apt full-upgrade
6. Reboot into the new kernel:sudo reboot
7. Reinstall ZFS:sudo apt install zfs-dkms zfsutils-linux
8. Import your pool(s):sudo zpool import poolname
9. Restart services that depend on ZFS.
Final Notes: Prevention Is Better Than Recovery
To avoid this issue in the future:
- Hold your current working kernel version:
sudo apt-mark hold linux-image-rpi-v8 linux-headers-rpi-v8
* Or track ZFS GitHub for kernel compatibility before upgrading * Or test upgrades on a second Pi or cloned SD card before rolling them out to production
Conclusion: A Solvable Trap
ZFS on the Raspberry Pi remains a powerful option, but it demands careful version tracking. If you upgrade responsibly, or recover cleanly as described above, you can continue benefiting from advanced features like snapshots, send/receive, and compression even on this tiny powerhouse.
Don’t let a kernel update ruin your storage plans—with preparation, the Pi + ZFS combo can remain stable and strong.
-
@ 21335073:a244b1ad
2025-05-01 01:51:10Please respect Virginia Giuffre’s memory by refraining from asking about the circumstances or theories surrounding her passing.
Since Virginia Giuffre’s death, I’ve reflected on what she would want me to say or do. This piece is my attempt to honor her legacy.
When I first spoke with Virginia, I was struck by her unshakable hope. I had grown cynical after years in the anti-human trafficking movement, worn down by a broken system and a government that often seemed complicit. But Virginia’s passion, creativity, and belief that survivors could be heard reignited something in me. She reminded me of my younger, more hopeful self. Instead of warning her about the challenges ahead, I let her dream big, unburdened by my own disillusionment. That conversation changed me for the better, and following her lead led to meaningful progress.
Virginia was one of the bravest people I’ve ever known. As a survivor of Epstein, Maxwell, and their co-conspirators, she risked everything to speak out, taking on some of the world’s most powerful figures.
She loved when I said, “Epstein isn’t the only Epstein.” This wasn’t just about one man—it was a call to hold all abusers accountable and to ensure survivors find hope and healing.
The Epstein case often gets reduced to sensational details about the elite, but that misses the bigger picture. Yes, we should be holding all of the co-conspirators accountable, we must listen to the survivors’ stories. Their experiences reveal how predators exploit vulnerabilities, offering lessons to prevent future victims.
You’re not powerless in this fight. Educate yourself about trafficking and abuse—online and offline—and take steps to protect those around you. Supporting survivors starts with small, meaningful actions. Free online resources can guide you in being a safe, supportive presence.
When high-profile accusations arise, resist snap judgments. Instead of dismissing survivors as “crazy,” pause to consider the trauma they may be navigating. Speaking out or coping with abuse is never easy. You don’t have to believe every claim, but you can refrain from attacking accusers online.
Society also fails at providing aftercare for survivors. The government, often part of the problem, won’t solve this. It’s up to us. Prevention is critical, but when abuse occurs, step up for your loved ones and community. Protect the vulnerable. it’s a challenging but a rewarding journey.
If you’re contributing to Nostr, you’re helping build a censorship resistant platform where survivors can share their stories freely, no matter how powerful their abusers are. Their voices can endure here, offering strength and hope to others. This gives me great hope for the future.
Virginia Giuffre’s courage was a gift to the world. It was an honor to know and serve her. She will be deeply missed. My hope is that her story inspires others to take on the powerful.
-
@ 7953d1fa:69c8039d
2025-05-20 02:39:23O cenário do entretenimento online no Brasil vem evoluindo rapidamente, e uma das plataformas que mais se destaca atualmente é a 8CC. Com uma proposta moderna, intuitiva e voltada para a melhor experiência do usuário, a 8CC conquistou a confiança de milhares de jogadores que buscam diversão, praticidade e oportunidades de ganhos reais em um ambiente seguro.
Conhecendo a Plataforma 8CC A 8CC é uma plataforma digital desenvolvida para atender tanto iniciantes quanto jogadores experientes. Sua interface amigável e bem organizada facilita a navegação mesmo para quem nunca teve contato com esse tipo de entretenimento antes. Compatível com computadores, tablets e celulares, o site é totalmente responsivo, o que significa que você pode se divertir de qualquer lugar, a qualquer hora.
Um dos diferenciais da 8cc é o seu compromisso com a segurança dos usuários. A plataforma utiliza tecnologia de criptografia de ponta para garantir a proteção de dados pessoais e transações financeiras. Além disso, o suporte ao cliente está sempre disponível para tirar dúvidas, resolver problemas e oferecer o melhor atendimento possível.
Diversidade de Jogos para Todos os Gostos Na 8CC, os jogadores têm acesso a uma vasta seleção de jogos online, desenvolvidos pelos principais provedores do mercado internacional. Isso garante alta qualidade gráfica, mecânicas inovadoras e excelente desempenho.
Entre os jogos mais populares da plataforma estão:
Slots (caça-níqueis): com temas variados, rodadas bônus e jackpots progressivos que proporcionam grandes emoções.
Jogos de mesa clássicos: como roleta, blackjack e bacará, com versões que imitam perfeitamente a experiência de jogo ao vivo.
Jogos com crupiês em tempo real: transmitidos com qualidade HD, esses jogos trazem interatividade e realismo, permitindo que o jogador se sinta dentro de um ambiente físico de alto padrão.
A plataforma também disponibiliza jogos de habilidade e apostas esportivas ao vivo, oferecendo uma experiência ainda mais completa e personalizada de acordo com o perfil de cada usuário.
Experiência do Jogador na 8CC Quem já experimentou jogar na 8CC sabe o quanto a plataforma valoriza o conforto e a satisfação de seus usuários. Desde o momento do cadastro até o resgate de ganhos, tudo é feito de forma simples, rápida e segura. O processo de registro é intuitivo, exigindo apenas alguns dados básicos, e os métodos de pagamento são variados, aceitando transferências bancárias, carteiras digitais e até criptomoedas.
Outro destaque é o sistema de recompensas e promoções. A 8CC frequentemente oferece bônus de boas-vindas, rodadas grátis e campanhas especiais para usuários fiéis, o que aumenta ainda mais as chances de ganhar e prolonga a diversão. Além disso, a plataforma promove torneios e desafios semanais com prêmios atrativos, incentivando a competição saudável entre os jogadores.
Por Que Escolher a 8CC? Existem muitas razões para escolher a 8CC como sua principal plataforma de jogos online:
Confiabilidade e segurança em todas as operações;
Variedade de jogos para todos os perfis;
Interface moderna e de fácil navegação;
Promoções e bônus frequentes;
Atendimento ao cliente eficiente e disponível 24 horas.
Se você busca uma experiência diferenciada, com diversão garantida e a possibilidade de transformar seu tempo livre em momentos empolgantes, a 8CC é a escolha certa. Descubra agora mesmo tudo o que essa plataforma inovadora tem a oferecer e junte-se à comunidade que está revolucionando o entretenimento digital no Brasil.
-
@ 7e538978:a5987ab6
2025-05-20 13:45:12LNbits now has full NWC support thanks to the work of contributor @riccardobl, who has claimed two LNbits bounties for implementing Nostr Wallet Connect (NWC) support in LNbits.
LNbits can now act both as a wallet service and as a funding source using the Nostr NWC protocol (NIP-47). This opens the door to new integrations with a growing ecosystem of Nostr clients and Lightning wallets.
Two Sides of NWC Integration
The work delivered by Riccardo B comprises two separate peices of work that together implement full support for NWC:
1. LNbits as a Wallet Service
This extension allows LNbits to operate as an always-on wallet service compatible with Nostr Wallet Connect clients such as Damus, Amethyst, or any app supporting NIP-47. Users can connect these Nostr clients to their LNbits instance and create and pay Lightning invoices through it.
This turns your LNbits wallet into a backend Lightning provider for your favourite Nostr app all self-hosted.
2. NWC as a Funding Source
The second piece of work flips the relationship. With this in place, LNbits can now act as an NWC client, meaning it can be funded from any NWC wallet service. This could be another LNbits, Alby, Minibits and more.
Why This Is a Big Deal for LNbits Users
These two bounties make LNbits one of the first applications in the Lightning ecosystem to offer bidirectional NWC support — as both a service and a client. This brings benefits such as:
-
Fund any NWC-compatible app using your LNbits wallet.
-
Fund LNbits using any wallet that supports Nostr Wallet Connect.
-
Build NWC-native apps with LNbits as a backend, or power your own LNbits server using existing wallet infrastructure.
For developers, it’s a chance to build in flexible, interoperable ways. For users, it means more choice, more control, and less friction when managing Lightning payments across apps and devices.
Both of these features were developed and delivered by Riccardo B (@riccardobl), an contributor who took on and completed both LNbits bounties and was extremely helpful during the PR review process. We owe a huge thanks to Riccardo for his work here.
To try them out, read the full article detailing how NWC works with LNbits.
-
-
@ 502ab02a:a2860397
2025-05-20 01:22:31พอพูดถึงบริษัทอย่าง Formo ที่ทำชีสโดยไม่ใช้วัวเลย คนส่วนใหญ่จะนึกถึงคำว่า “นวัตกรรม” “ยั่งยืน” “ลดโลกร้อน” กันเป็นด่านแรก แต่พอเฮียมองทะลุม่านควันพวกนี้ไป จะเห็นทุนรายใหญ่ที่หนุนหลังอยู่ ซึ่งหลายเจ้าก็ไม่ใช่ผู้พิทักษ์โลก แต่เป็นผู้เล่นตัวจี๊ดในอุตสาหกรรมอาหารโลกมายาวนาน
หนึ่งในนั้นคือบริษัทจากเกาหลีใต้ชื่อ CJ CheilJedang ซึ่งอาจฟังดูไกลตัว แต่จริงๆ แล้ว เฮียว่าชื่อนี้โผล่ตามซองอาหารสำเร็จรูปในครัวคนไทยหลายบ้านโดยไม่รู้ตัว
ถ้าจะเข้าใจ Formo ให้ถึงแก่น เราต้องมองไปถึงทุนที่ “ใส่เงิน” และ “ใส่จุดยืน” ลงไปในบริษัทนั้น และหนึ่งในผู้ถือหุ้นรายสำคัญก็คือ CJ CheilJedang บริษัทเกาหลีใต้ที่ก่อตั้งมาตั้งแต่ปี 1953 โดยเริ่มจากการเป็นโรงงานผลิตน้ำตาล จากนั้นก็กินรวบแทบทุกวงจรอาหารของเกาหลี
โปรไฟล์ CJ แค่เห็นภาพรวมก็ขนลุกแล้วครับ ลูกพี่เราแข็งแกร่งขนาดไหน - เป็นเจ้าของแบรนด์ Bibigo ที่เราอาจจะคุ้นในสินค้า กิมจิ และ CJ Foods ที่มีขายทั่วโลก -เป็นผู้ผลิต กรดอะมิโน รายใหญ่ของโลก เช่น ไลซีน, ทรีโอนีน, ทริปโตแฟน ที่ใช้เป็นวัตถุดิบในอาหารสัตว์ แต่ตอนนี้หลายบริษัทเอาไปใส่ใน Plant-based food แล้วเคลมว่าเป็นโปรตีนสมบูรณ์ -เป็นเจ้าของโรงงานผลิต แบคทีเรียสายพันธุ์พิเศษ สำหรับการหมักหลายประเภท -ขึ้นชื่อเรื่อง bioscience โดยเฉพาะ precision fermentation ซึ่งเป็นเทคโนโลยีเดียวกับที่ Formo ใช้ผลิตเคซีน (โปรตีนในนมวัว)
แปลว่า CJ ไม่ได้มาลงทุนใน Formo แบบ “หวังผลกำไรเฉยๆ” แต่เขามองเห็น “อนาคตใหม่ของอาหาร” ที่ตัวเองจะเป็นเจ้าของต้นน้ำยันปลายน้ำ
คำถามก็คือเบื้องลึกการลงทุนใน Formo ใครได้อะไร? Formo ปิดรอบระดมทุน Series A ได้ประมาณ 50 ล้านดอลลาร์สหรัฐ เมื่อปี 2021 โดยมีนักลงทุนหลายเจ้า เช่น EQT Ventures, Elevat3 Capital, Atomico แต่ CJ CheilJedang ก็เป็นหนึ่งในผู้ลงทุนเชิงกลยุทธ์ (strategic investor) ที่เข้ามาแบบไม่ใช่แค่ลงเงิน แต่เอา เทคโนโลยี + เครือข่ายโรงงาน + ซัพพลายเชนระดับโลก มาเสริมให้ Formo ขยายได้เร็วขึ้น
การจับมือกันครั้งนี้มีนัยยะสำคัญครับ -Formo ได้ เทคโนโลยีหมักจุลินทรีย์ (ที่ CJ ถนัดมาก) และช่องทางกระจายสินค้าในเอเชีย -CJ ได้ ถือหุ้นในบริษัทที่กำลังจะเปลี่ยนภาพ “ผลิตภัณฑ์จากนม” ให้กลายเป็นสิ่งที่ไม่ต้องมีสัตว์อีกต่อไป ซึ่งจะเป็นกลยุทธ์สำคัญในการสร้างแบรนด์อาหารแห่งอนาคต ที่นมจะต้องมาจากโรงงานผลิตเท่านั้นจึงจะมีคุณสมบัติที่ดีทั้งสารอาหารและความสะอาด
CJ เองก็เคยประกาศต่อสื่อว่า อยากเป็น “Global Lifestyle Company” ซึ่งฟังดูเบาๆ แต่จริงๆ คือแผนใหญ่ในการ เปลี่ยนวิธีการกินของคนทั้งโลกได้เลยเช่นกัน -จาก “อาหารจริง” ไปเป็น “อาหารสังเคราะห์” (synthetic food) -จาก “ฟาร์มสัตว์” ไปเป็น “ถังหมักจุลินทรีย์” -จาก “ความหลากหลายตามธรรมชาติ” ไปเป็น “สูตรกลาง” ที่ควบคุมได้ในระดับโมเลกุล
การหนุนหลัง Formo จึงไม่ใช่เรื่องบังเอิญ แต่เป็นอีกหนึ่งหมากในกระดานใหญ่ที่ CJ วางไว้ เพื่อเป็นเจ้าของอาหารอนาคตแบบไม่ต้องเลี้ยงหมู ไก่ วัว แต่ครองเทคโนโลยีแทน
คำถามคือแล้วผู้บริโภคจะรู้ทันไหมว่า เบื้องหลังชีสที่ไม่มีวัว อาจมี “ทุนที่อยากครองโลกอาหาร” คำที่เคลมว่า “ยั่งยืน” อาจสร้างระบบอาหารใหม่ที่ยิ่งห่างจากธรรมชาติเข้าไปทุกที
คนที่เคย “กลัวสารเคมี” ในอาหารแปรรูป กลับกลืนผลิตภัณฑ์จากห้องแล็บ โดยคิดว่า “มันคือความสะอาดและอนาคต” #pirateketo #กูต้องรู้มั๊ย #ม้วนหางสิลูก #siamstr
-
@ 266815e0:6cd408a5
2025-04-29 17:47:57I'm excited to announce the release of Applesauce v1.0.0! There are a few breaking changes and a lot of improvements and new features across all packages. Each package has been updated to 1.0.0, marking a stable API for developers to build upon.
Applesauce core changes
There was a change in the
applesauce-core
package in theQueryStore
.The
Query
interface has been converted to a method instead of an object withkey
andrun
fields.A bunch of new helper methods and queries were added, checkout the changelog for a full list.
Applesauce Relay
There is a new
applesauce-relay
package that provides a simple RxJS based api for connecting to relays and publishing events.Documentation: applesauce-relay
Features:
- A simple API for subscribing or publishing to a single relay or a group of relays
- No
connect
orclose
methods, connections are managed automatically by rxjs - NIP-11
auth_required
support - Support for NIP-42 authentication
- Prebuilt or custom re-connection back-off
- Keep-alive timeout (default 30s)
- Client-side Negentropy sync support
Example Usage: Single relay
```typescript import { Relay } from "applesauce-relay";
// Connect to a relay const relay = new Relay("wss://relay.example.com");
// Create a REQ and subscribe to it relay .req({ kinds: [1], limit: 10, }) .subscribe((response) => { if (response === "EOSE") { console.log("End of stored events"); } else { console.log("Received event:", response); } }); ```
Example Usage: Relay pool
```typescript import { Relay, RelayPool } from "applesauce-relay";
// Create a pool with a custom relay const pool = new RelayPool();
// Create a REQ and subscribe to it pool .req(["wss://relay.damus.io", "wss://relay.snort.social"], { kinds: [1], limit: 10, }) .subscribe((response) => { if (response === "EOSE") { console.log("End of stored events on all relays"); } else { console.log("Received event:", response); } }); ```
Applesauce actions
Another new package is the
applesauce-actions
package. This package provides a set of async operations for common Nostr actions.Actions are run against the events in the
EventStore
and use theEventFactory
to create new events to publish.Documentation: applesauce-actions
Example Usage:
```typescript import { ActionHub } from "applesauce-actions";
// An EventStore and EventFactory are required to use the ActionHub import { eventStore } from "./stores.ts"; import { eventFactory } from "./factories.ts";
// Custom publish logic const publish = async (event: NostrEvent) => { console.log("Publishing", event); await app.relayPool.publish(event, app.defaultRelays); };
// The
publish
method is optional for the asyncrun
method to work const hub = new ActionHub(eventStore, eventFactory, publish); ```Once an
ActionsHub
is created, you can use therun
orexec
methods to execute actions:```typescript import { FollowUser, MuteUser } from "applesauce-actions/actions";
// Follow fiatjaf await hub.run( FollowUser, "3bf0c63fcb93463407af97a5e5ee64fa883d107ef9e558472c4eb9aaaefa459d", );
// Or use the
exec
method with a custom publish method await hub .exec( MuteUser, "3bf0c63fcb93463407af97a5e5ee64fa883d107ef9e558472c4eb9aaaefa459d", ) .forEach((event) => { // NOTE: Don't publish this event because we never want to mute fiatjaf // pool.publish(['wss://pyramid.fiatjaf.com/'], event) }); ```There are a log more actions including some for working with NIP-51 lists (private and public), you can find them in the reference
Applesauce loaders
The
applesauce-loaders
package has been updated to support any relay connection libraries and not justrx-nostr
.Before:
```typescript import { ReplaceableLoader } from "applesauce-loaders"; import { createRxNostr } from "rx-nostr";
// Create a new rx-nostr instance const rxNostr = createRxNostr();
// Create a new replaceable loader const replaceableLoader = new ReplaceableLoader(rxNostr); ```
After:
```typescript
import { Observable } from "rxjs"; import { ReplaceableLoader, NostrRequest } from "applesauce-loaders"; import { SimplePool } from "nostr-tools";
// Create a new nostr-tools pool const pool = new SimplePool();
// Create a method that subscribes using nostr-tools and returns an observable function nostrRequest: NostrRequest = (relays, filters, id) => { return new Observable((subscriber) => { const sub = pool.subscribe(relays, filters, { onevent: (event) => { subscriber.next(event); }, onclose: () => subscriber.complete(), oneose: () => subscriber.complete(), });
return () => sub.close();
}); };
// Create a new replaceable loader const replaceableLoader = new ReplaceableLoader(nostrRequest); ```
Of course you can still use rx-nostr if you want:
```typescript import { createRxNostr } from "rx-nostr";
// Create a new rx-nostr instance const rxNostr = createRxNostr();
// Create a method that subscribes using rx-nostr and returns an observable function nostrRequest( relays: string[], filters: Filter[], id?: string, ): Observable
{ // Create a new oneshot request so it will complete when EOSE is received const req = createRxOneshotReq({ filters, rxReqId: id }); return rxNostr .use(req, { on: { relays } }) .pipe(map((packet) => packet.event)); } // Create a new replaceable loader const replaceableLoader = new ReplaceableLoader(nostrRequest); ```
There where a few more changes, check out the changelog
Applesauce wallet
Its far from complete, but there is a new
applesauce-wallet
package that provides a actions and queries for working with NIP-60 wallets.Documentation: applesauce-wallet
Example Usage:
```typescript import { CreateWallet, UnlockWallet } from "applesauce-wallet/actions";
// Create a new NIP-60 wallet await hub.run(CreateWallet, ["wss://mint.example.com"], privateKey);
// Unlock wallet and associated tokens/history await hub.run(UnlockWallet, { tokens: true, history: true }); ```
-
@ 52b4a076:e7fad8bd
2025-04-28 00:48:57I have been recently building NFDB, a new relay DB. This post is meant as a short overview.
Regular relays have challenges
Current relay software have significant challenges, which I have experienced when hosting Nostr.land: - Scalability is only supported by adding full replicas, which does not scale to large relays. - Most relays use slow databases and are not optimized for large scale usage. - Search is near-impossible to implement on standard relays. - Privacy features such as NIP-42 are lacking. - Regular DB maintenance tasks on normal relays require extended downtime. - Fault-tolerance is implemented, if any, using a load balancer, which is limited. - Personalization and advanced filtering is not possible. - Local caching is not supported.
NFDB: A scalable database for large relays
NFDB is a new database meant for medium-large scale relays, built on FoundationDB that provides: - Near-unlimited scalability - Extended fault tolerance - Instant loading - Better search - Better personalization - and more.
Search
NFDB has extended search capabilities including: - Semantic search: Search for meaning, not words. - Interest-based search: Highlight content you care about. - Multi-faceted queries: Easily filter by topic, author group, keywords, and more at the same time. - Wide support for event kinds, including users, articles, etc.
Personalization
NFDB allows significant personalization: - Customized algorithms: Be your own algorithm. - Spam filtering: Filter content to your WoT, and use advanced spam filters. - Topic mutes: Mute topics, not keywords. - Media filtering: With Nostr.build, you will be able to filter NSFW and other content - Low data mode: Block notes that use high amounts of cellular data. - and more
Other
NFDB has support for many other features such as: - NIP-42: Protect your privacy with private drafts and DMs - Microrelays: Easily deploy your own personal microrelay - Containers: Dedicated, fast storage for discoverability events such as relay lists
Calcite: A local microrelay database
Calcite is a lightweight, local version of NFDB that is meant for microrelays and caching, meant for thousands of personal microrelays.
Calcite HA is an additional layer that allows live migration and relay failover in under 30 seconds, providing higher availability compared to current relays with greater simplicity. Calcite HA is enabled in all Calcite deployments.
For zero-downtime, NFDB is recommended.
Noswhere SmartCache
Relays are fixed in one location, but users can be anywhere.
Noswhere SmartCache is a CDN for relays that dynamically caches data on edge servers closest to you, allowing: - Multiple regions around the world - Improved throughput and performance - Faster loading times
routerd
routerd
is a custom load-balancer optimized for Nostr relays, integrated with SmartCache.routerd
is specifically integrated with NFDB and Calcite HA to provide fast failover and high performance.Ending notes
NFDB is planned to be deployed to Nostr.land in the coming weeks.
A lot more is to come. 👀️️️️️️
-
@ 662f9bff:8960f6b2
2025-05-20 13:44:39Currently, and for the last three weeks, I am in Belfast. With the situation in HK becoming ever more crazy by the day we took the opportunity to escape from Hong Kong for a bit - I escaped with V and 3 suitcases. I also have some family matters that I am giving priority to at this time. We plan to stay a few more weeks in Northern Ireland and then after some time in Belgium we will be visiting some other European locations. I do hope that HK will be a place that we can go back to - we will see...
What's happening?
Quite a few significant events have happened in the last few weeks that deserve some deeper analysis and checking than you will ever get from the media propaganda circus that is running full force at the moment. You should be in no doubt that the "Great Reset" with its supporting "Great Narrative" is in full swing.
In most of the world the C19 story has run its course - for now. Most countries seem to have have "declared victory" and "moved on". Obviously HK is an exception (nothing happened there for the last two years) and I fear they will get to experience the whole 2-year thing in the coming 3-4 months. Watch out - the politicians everywhere are looking to permanently establish the "emergency controls" as "normal" - see previous Letter for some examples in Ireland and EU.
Invasion of Ukraine has led to so many lines being crossed - to the extent that clearly things will never be the same again in our lifetime.
Why? How did we get here?
I do not claim to know all the answers but some things are fairly clear if you look with open eyes and the wisdom that previous generations and civilisations have made available to us - even if most choose to ignore it (Plato on the flaws of democracy). Those who do not learn from history are doomed to repeat it and even those who learn will have litle choice but to go along for much of the ride.
Perhaps my notes and the links below will help you to form an educated opinion rather than the pervasive propaganda we are all being fed.
The current situation is more than 100 years in the making and much (if not most) of what you thought was true is less veracious than you could ever imagine. No doubt we could (and maybe should) go back further but let's start in 1913 when the British Government asked the public no longer to request exchange of their pounds for gold coins at the post office. This led to the issuing of War Bonds and fractional reserve accounting that allowed the Bank of England essentially to print unlimited money to fight in WW1; without this devious action they would have been constrained to act within the limits of the country's reserves and WW1 would have been shorter. Read The Fiat Standard for more details on how this happened. Around this time, and likely no coincidence, the US bankers were scheming how to get around the constitutional controls against such actions in their own country - read more in The Creature from Jekyll Island.
Following WW1, Germany was forced to pay war reparations in Gold (hard money). This led to a decade of money printing and extravagant excesses and crashes as hyperinflation set in, ending in the bankrupting of the country and the nationalism that fed WW2 - the gory details of devaluation and hyperinflation in Weimar Germany are described in When Money Dies. Meanwhile the US bankers who had been preparing since 1913 stepped in with unlimited money printing to fund WW2 and then also in their Marshal Plan to cement in place the Bretton Woods post-war agreement that made US Dollar the global reserve currency.
Decades of boom and bust followed - well explained by Ray Dalio who portrays this as perfectly normal and to be expected - unfortunately it is for soft (non-hard) money based economies. The Fourth Turning will give many additional insights to this period too as well as cycles to watch for and their cause and nature. In 1961 Eisenhower tried to warn the population in his farewell address about the "Military Industrial Complex" and many believe that Robert Kennedy's assassination in 1963 may well be not entirely unrelated.
Things came to a head in August 1971 when the countries of the world realised that the US was (contrary to all promises) printing unlimited funds to (among other things) fight the Vietnam war and so undermining the expected and required convertibility of US dollars (the currency of global trade) for Gold (hard money). A French warship heading to NY to collect France's gold was the straw that caused Nixon to default on US Debt convertibility and "close the gold window".
This in turn led to further decades of increasing financialization, further fuelled (pun intended) by the PetroDollar creation and "exorbitant priviledge" that the US obtained by having the global reserve currency - benefiting those closest to the money supply (Cantillon effect) while hollowing out the US manufacturing and eventually devastating its middle and working classes (Triffin dilemma) - Arthur Hayes describes all this and much more as well as the likely outlook in his article - Energy Canceled. Absolutely required reading or listen to Guy Swan reading it and giving his additional interpetation.
Zoltan Pozsar of Credit Suisse explains how the money system is now being reset following the events of last few weeks and his article outlines a likely way forward - Bretton Woods III. His paper is somewhat dense, heavy reading and you might prefer to listen to Luc Gromen's more conversational explainer with Marty
All of this was well known to our forefathers
The writers of the American Constitution understood the dangers of money being controlled by any elite group and they did their best to include protections in the US constitution. It did take the bankers multiple decades and puppet presidents to circumvent these but do so they did. Thomas Jefferson could not have been more clear in his warning.
" If the American people ever allow private banks to control the issue of their currency, first by inflation, then by deflation, the banks and corporations that will grow up around(these banks) will deprive the people of all property until their children wake up homeless on the continent their fathers conquered."
Islamic finace also recognised the dangers - you will likely be aware of the restrictions that forbid interest payments - read this interesting article from The Guardian
You will likely also be aware from schooldays that the Roman Empire collapsed because it expanded too much and the overhead became unbearable leading to the debasement of its money and inability to extract tax payments to support itself. Read more from Mises Institute. Here too, much of this will likely ring familiar.
So what can you do about it?
In theory Governments should respect Consent of the Governed and the 1948 Universal Declaration of Human Rights states that "The will of the people shall be the basis of the authority of government".
For you to decide if and to what extent governments today are acting in line with these principles. If not, what can you do about it?
The options you have are basically - Loyalty, Voice or Exit. 1. You can be loyal and accept what you are told - 2. you may (or may not) be able to voice disagreement and 3. you may (or may not!) be able to exit. Authoritarian governments will make everything except Loyalty difficult or even impossible - if in doubt, read George Orwell 1984 - or look just around at recent events today in many countries.
I'll be happy to delve deeper into this in subsequent letters if there is interest - for now I recommend you to read Sovereign Individual. It is a long read but each chapter starts with a summary and you can read the summaries of each chapter as a first step. Also - I'm happy to discuss with you - just reach out and let me know!
For those who prefer a structured reading list, check References
That's it!
No one can be told what The Matrix is.\ You have to see it for yourself.**
Do share this newsletter with any of your friends and family who might be interested.
You can easily ask questions or discuss any topics in the newsletters in our Telegram group - click the link here to join the group.\ You can also email me at: LetterFrom@rogerprice.me
💡Enjoy the newsletters in your own language : Dutch, French, German, Serbian, Chinese Traditional & Simplified, Thai and Burmese.
-
@ f85b9c2c:d190bcff
2025-05-19 13:22:09Fake KYC Emails
Phishing scammers are again targeting users of the popular cryptocurrency wallet MetaMask. In a recent email campaign, cybercriminals are attempting to trick people into revealing their secret MetaMask passphrase. The emails falsely claim that you must urgently verify your wallet due to new Know Your Customer (KYC) regulations. If you fall for the scope and click the “Verify” button, you will be taken to a fake MetaMask website that asks you to enter your passphrase. If you do provide your passphrase, criminals can access your wallet and steal any cryptocurrency you have stored there. You are unlikely to get your stolen crypto back. Such email scam campaigns are ongoing and target users of many different cryptocurrency wallets. Be wary of any unsolicited email or text message that claims that you must provide your crypto wallet passphrase or other sensitive personal information. image
-
@ 05a0f81e:fc032124
2025-05-19 11:31:47There are stages in life that man must encounter in the life living process. And in thus stage are what I called the most scary moment in life.
The stages of life are typically recognized as Infancy (birth to 2 years), Early Childhood (3-8 years), Adolescence (9-18 years), and Adulthood (19 years and older). Adulthood can be further divided into early, middle, and late stages.
The adulthood, is the youthful stage, the stage where the youths are enrolled into the career part of there life, either academic pursuit or entrepreneurial pursuit. The adult hood are raged from the beginning of career pursuit to the ending of career pursuit, and at the stage is where the youths choose to either proper in life or become a failure.
With a well detailed analysis, some see the youthful stage as the most enjoyable stage in life, and there are no doubt about that but one thing is certain about, the mistake you made at the youthful stage of your life but in your career pursuit and daily living stay with you forever unless your ability to deal with your emotions and regret is 90%.
The adulthood is a scary moment because that's the stage where youths choose there career focus, either further education, skilled labor or entrepreneurs and at the beginning of the career path, they are scared of making the wrong choice. But the most fearful path of the adulthood is facing the laboratory market, that is after school or after acquiring skills, how to start making a good living. This path of life affects mostly the youths that choose academic pursuit at the early adulthood without making necessary research on there field of study, and this is the reason while there are many graduates that are bike man, brick layers, driver and so on.
The inability to face the labor market as a graduates can be linked to your field of study, the decisions you made while in school, and the channels you choose when you graduated.
The ending of career pursuit to face the labor market is the most scary moment in life and youths that escape that fear easily are either born with golden spoon allowing their parents to pave their way for them or they chose the right part at the earliest adulthood.
Proper orientation are need in career pursuit to enable youths to have the self confident and boldness to choose a enroll into the best to face the labor market when it is time ⏲️.
-
@ 5d4b6c8d:8a1c1ee3
2025-05-20 13:39:22https://youtu.be/US9iYJNTOkU
I had no idea Tosh was still doing anything, much less that he talks about sports.
https://stacker.news/items/984547
-
@ a31f394c:7ad8f439
2025-05-19 07:55:53No mundo dos jogos online, onde inúmeras plataformas buscam a atenção dos jogadores, KK999 se destaca como uma opção inovadora e empolgante. Focada no público brasileiro, a plataforma oferece uma ampla gama de jogos, uma interface intuitiva e um excelente suporte ao cliente. Se você está em busca de um destino online para jogos que combine entretenimento, qualidade e segurança, KK999 é a escolha certa para você.
Visão Geral da Plataforma KK999 é mais do que uma simples plataforma de jogos. É uma experiência imersiva e moderna, desenvolvida para atender às necessidades específicas dos jogadores brasileiros. A plataforma possui uma interface limpa e fácil de navegar, o que torna a experiência de jogar agradável e sem complicações. O site é responsivo, o que significa que você pode acessar e jogar de qualquer dispositivo, seja no desktop ou no celular, tornando a plataforma perfeita para quem deseja jogar em qualquer lugar.
O diferencial do kk999 é a experiência personalizada que oferece aos jogadores brasileiros. Além de estar completamente traduzido para o português, o site também oferece promoções e suporte técnico localizados, o que cria uma sensação de familiaridade e confiança entre os usuários.
Variedade de Jogos para Todos os Gostos Uma das características mais atraentes da KK999 é sua vasta seleção de jogos. A plataforma oferece desde jogos tradicionais de mesa, como poker e baccarat, até os modernos jogos de slots, que são incrivelmente populares entre os jogadores. Se você gosta de desafios estratégicos ou prefere a emoção de uma boa rotação de roletas, KK999 tem algo para todos.
Os jogos de mesa, como poker e blackjack, permitem que os jogadores testem suas habilidades e se envolvam em desafios emocionantes. Cada jogo é projetado com gráficos de alta qualidade e animações fluidas, criando uma experiência realista e envolvente. Além disso, a plataforma oferece uma coleção diversificada de slots, com temas variados e recursos extras que aumentam a emoção a cada giro.
Para aqueles que preferem uma experiência mais interativa, KK999 também oferece jogos com dealers ao vivo. Esses jogos permitem que os jogadores interajam com dealers profissionais em tempo real, criando uma atmosfera de jogo ao vivo, que remete à experiência de um cassino físico.
Experiência do Jogador: Segurança e Suporte de Qualidade O KK999 entende que uma experiência de jogo de alta qualidade vai além de apenas jogar. A plataforma se destaca pelo seu compromisso com a segurança dos jogadores. Utilizando as mais recentes tecnologias de criptografia, KK999 garante que todas as informações pessoais e financeiras dos jogadores estejam seguras, proporcionando tranquilidade para que os jogadores possam se concentrar apenas no jogo.
Além disso, o suporte ao cliente do KK999 é impecável. A plataforma oferece suporte 24 horas por dia, 7 dias por semana, por meio de chat ao vivo e e-mail. Caso o jogador tenha dúvidas sobre um jogo, questões relacionadas à conta ou precise de assistência técnica, a equipe de atendimento está sempre disponível e pronta para ajudar.
Bônus e Promoções para Todos os Jogadores KK999 também se destaca pelas suas ofertas generosas de bônus e promoções. Para os novos jogadores, a plataforma oferece bônus de boas-vindas, enquanto os jogadores regulares podem aproveitar programas de fidelidade que recompensam a lealdade dos usuários com ofertas exclusivas e prêmios.
Essas promoções tornam a experiência de jogar ainda mais divertida e empolgante, dando aos jogadores mais chances de se divertir e ganhar enquanto jogam seus jogos favoritos.
Conclusão KK999 se estabeleceu como uma plataforma de jogos online de referência no Brasil, oferecendo uma experiência única que combina uma enorme variedade de jogos, uma interface amigável, suporte excepcional e medidas de segurança robustas. Se você está à procura de uma plataforma para se divertir e explorar, KK999 é o lugar perfeito para começar sua jornada de jogos online.
-
@ 8576ca0e:621f735e
2025-05-19 06:43:00In the ever evolving landscape of social media, a new contender has emerged, seeking to redefine how we connect and interact online. YakiHonne, a mobile application built upon the innovative Nostr protocol, isn't just another platform vying for your attention. It represents a bold step towards decentralized social networking, seamlessly integrating the power of Bitcoin's Lightning Network into its very core.
Imagine a social space free from the control of centralized entities, where your data belongs to you, and where value can flow as freely as information. This is the vision YakiHonne is striving to realize. By leveraging the open and censorship resistant nature of Nostr, it offers a refreshing alternative to the traditional social media giants.
The Power of Decentralization: A Foundation Built on Nostr
At its heart, YakiHonne is powered by Nostr (Notes and Other Stuff Transmitted by Relays). Unlike conventional platforms that rely on a central server, Nostr operates on a network of independent relays. This decentralized architecture offers several key advantages:
• Censorship Resistance: No single entity can easily censor or shut down the network. Your posts and interactions are distributed across multiple relays.
• Data Ownership: Your data isn't locked away in a corporate database. You control your private keys, granting you greater autonomy over your information.
• Open and Extensible: The open nature of the protocol allows for innovation and the development of diverse clients and applications, fostering a vibrant ecosystem.
YakiHonne acts as a user friendly gateway to this decentralized world, providing an intuitive mobile interface to interact with the Nostr network.
Zaps: Where Social Interaction Meets Bitcoin
What truly sets YakiHonne apart is its deep integration of Bitcoin payments through the Lightning Network, often referred to as "zaps." This isn't just a tacked on feature; it's woven into the fabric of social interaction.
• Show Appreciation: Found a post insightful, funny, or valuable? You can instantly send a small amount of Bitcoin as a "zap" to show your appreciation directly to the creator.
• Monetize Content: Creators can earn Bitcoin for their contributions, fostering a more sustainable model for online content generation.
• Seamless Transactions: Lightning Network enables near instant and low fee Bitcoin transactions, making zapping a practical and frictionless experience.
This innovative integration transforms social interactions into potential value exchanges, creating new dynamics between creators and their audience.
Beyond the Basics: Features for Content and Connection
YakiHonne isn't solely focused on Bitcoin. It provides a robust set of features for creating, sharing, and discovering content:
• Long Form Articles (NIP-23): For those who want to delve deeper, YakiHonne supports the creation of wel formatted articles using a rich markdown editor. This allows for more nuanced discussions and the sharing of substantial ideas.
• Topic Based Collections (NIP-51): Users can curate content into organized collections, making it easier to discover information on specific topics and follow thought leaders in various domains.
• Following and Discovery (NIP-02): Stay connected with the people and ideas that matter to you by following other users. The platform also offers ways to discover top creators, curators, and trending discussions through hashtags (NIP-12).
• Rich User Profiles: Your profile showcases your followers, who you're following, your zapping activity, and the articles you've published, providing a comprehensive overview of your presence on the platform.
• Direct Messaging (DMs): For more private conversations, YakiHonne includes a direct messaging feature, allowing for one on one communication.
A Growing Ecosystem and Continuous Improvement
YakiHonne is actively being developed and refined by JustHonne Technologies. Recent updates highlight a commitment to improving the user experience and addressing bugs. Enhancements to the zap functionality, fixes for various technical issues, and improved stability demonstrate the ongoing dedication to making the app a reliable and enjoyable platform.
The open source nature of the mobile application, with its code available on GitHub, encourages community involvement and transparency. This collaborative approach can contribute to the platform's growth and evolution.
Looking Ahead: The Potential of Decentralized Social with Bitcoin
YakiHonne represents an exciting intersection of decentralized social networking and Bitcoin's utility. By seamlessly integrating Lightning Network payments, it introduces a novel way to interact and exchange value online. While still in its relatively early stages, YakiHonne holds significant potential to:
• Empower Creators: Provide new avenues for content monetization and direct interaction with their audience.
• Foster Meaningful Interactions: Encourage more thoughtful engagement through the ability to easily show appreciation.
• Offer a More Resilient Social Space: Provide an alternative to centralized platforms with greater resistance to censorship and single points of failure.
As the Nostr ecosystem continues to grow and evolve, and as more users seek decentralized alternatives, YakiHonne is well positioned to be a leading application in this burgeoning space. It's more than just another social media app; it's a glimpse into a future where online connections are more open, and truly belong to the users themselves.
-
@ 91bea5cd:1df4451c
2025-04-26 10:16:21O Contexto Legal Brasileiro e o Consentimento
No ordenamento jurídico brasileiro, o consentimento do ofendido pode, em certas circunstâncias, afastar a ilicitude de um ato que, sem ele, configuraria crime (como lesão corporal leve, prevista no Art. 129 do Código Penal). Contudo, o consentimento tem limites claros: não é válido para bens jurídicos indisponíveis, como a vida, e sua eficácia é questionável em casos de lesões corporais graves ou gravíssimas.
A prática de BDSM consensual situa-se em uma zona complexa. Em tese, se ambos os parceiros são adultos, capazes, e consentiram livre e informadamente nos atos praticados, sem que resultem em lesões graves permanentes ou risco de morte não consentido, não haveria crime. O desafio reside na comprovação desse consentimento, especialmente se uma das partes, posteriormente, o negar ou alegar coação.
A Lei Maria da Penha (Lei nº 11.340/2006)
A Lei Maria da Penha é um marco fundamental na proteção da mulher contra a violência doméstica e familiar. Ela estabelece mecanismos para coibir e prevenir tal violência, definindo suas formas (física, psicológica, sexual, patrimonial e moral) e prevendo medidas protetivas de urgência.
Embora essencial, a aplicação da lei em contextos de BDSM pode ser delicada. Uma alegação de violência por parte da mulher, mesmo que as lesões ou situações decorram de práticas consensuais, tende a receber atenção prioritária das autoridades, dada a presunção de vulnerabilidade estabelecida pela lei. Isso pode criar um cenário onde o parceiro masculino enfrenta dificuldades significativas em demonstrar a natureza consensual dos atos, especialmente se não houver provas robustas pré-constituídas.
Outros riscos:
Lesão corporal grave ou gravíssima (art. 129, §§ 1º e 2º, CP), não pode ser justificada pelo consentimento, podendo ensejar persecução penal.
Crimes contra a dignidade sexual (arts. 213 e seguintes do CP) são de ação pública incondicionada e independem de representação da vítima para a investigação e denúncia.
Riscos de Falsas Acusações e Alegação de Coação Futura
Os riscos para os praticantes de BDSM, especialmente para o parceiro que assume o papel dominante ou que inflige dor/restrição (frequentemente, mas não exclusivamente, o homem), podem surgir de diversas frentes:
- Acusações Externas: Vizinhos, familiares ou amigos que desconhecem a natureza consensual do relacionamento podem interpretar sons, marcas ou comportamentos como sinais de abuso e denunciar às autoridades.
- Alegações Futuras da Parceira: Em caso de término conturbado, vingança, arrependimento ou mudança de perspectiva, a parceira pode reinterpretar as práticas passadas como abuso e buscar reparação ou retaliação através de uma denúncia. A alegação pode ser de que o consentimento nunca existiu ou foi viciado.
- Alegação de Coação: Uma das formas mais complexas de refutar é a alegação de que o consentimento foi obtido mediante coação (física, moral, psicológica ou econômica). A parceira pode alegar, por exemplo, que se sentia pressionada, intimidada ou dependente, e que seu "sim" não era genuíno. Provar a ausência de coação a posteriori é extremamente difícil.
- Ingenuidade e Vulnerabilidade Masculina: Muitos homens, confiando na dinâmica consensual e na parceira, podem negligenciar a necessidade de precauções. A crença de que "isso nunca aconteceria comigo" ou a falta de conhecimento sobre as implicações legais e o peso processual de uma acusação no âmbito da Lei Maria da Penha podem deixá-los vulneráveis. A presença de marcas físicas, mesmo que consentidas, pode ser usada como evidência de agressão, invertendo o ônus da prova na prática, ainda que não na teoria jurídica.
Estratégias de Prevenção e Mitigação
Não existe um método infalível para evitar completamente o risco de uma falsa acusação, mas diversas medidas podem ser adotadas para construir um histórico de consentimento e reduzir vulnerabilidades:
- Comunicação Explícita e Contínua: A base de qualquer prática BDSM segura é a comunicação constante. Negociar limites, desejos, palavras de segurança ("safewords") e expectativas antes, durante e depois das cenas é crucial. Manter registros dessas negociações (e-mails, mensagens, diários compartilhados) pode ser útil.
-
Documentação do Consentimento:
-
Contratos de Relacionamento/Cena: Embora a validade jurídica de "contratos BDSM" seja discutível no Brasil (não podem afastar normas de ordem pública), eles servem como forte evidência da intenção das partes, da negociação detalhada de limites e do consentimento informado. Devem ser claros, datados, assinados e, idealmente, reconhecidos em cartório (para prova de data e autenticidade das assinaturas).
-
Registros Audiovisuais: Gravar (com consentimento explícito para a gravação) discussões sobre consentimento e limites antes das cenas pode ser uma prova poderosa. Gravar as próprias cenas é mais complexo devido a questões de privacidade e potencial uso indevido, mas pode ser considerado em casos específicos, sempre com consentimento mútuo documentado para a gravação.
Importante: a gravação deve ser com ciência da outra parte, para não configurar violação da intimidade (art. 5º, X, da Constituição Federal e art. 20 do Código Civil).
-
-
Testemunhas: Em alguns contextos de comunidade BDSM, a presença de terceiros de confiança durante negociações ou mesmo cenas pode servir como testemunho, embora isso possa alterar a dinâmica íntima do casal.
- Estabelecimento Claro de Limites e Palavras de Segurança: Definir e respeitar rigorosamente os limites (o que é permitido, o que é proibido) e as palavras de segurança é fundamental. O desrespeito a uma palavra de segurança encerra o consentimento para aquele ato.
- Avaliação Contínua do Consentimento: O consentimento não é um cheque em branco; ele deve ser entusiástico, contínuo e revogável a qualquer momento. Verificar o bem-estar do parceiro durante a cena ("check-ins") é essencial.
- Discrição e Cuidado com Evidências Físicas: Ser discreto sobre a natureza do relacionamento pode evitar mal-entendidos externos. Após cenas que deixem marcas, é prudente que ambos os parceiros estejam cientes e de acordo, talvez documentando por fotos (com data) e uma nota sobre a consensualidade da prática que as gerou.
- Aconselhamento Jurídico Preventivo: Consultar um advogado especializado em direito de família e criminal, com sensibilidade para dinâmicas de relacionamento alternativas, pode fornecer orientação personalizada sobre as melhores formas de documentar o consentimento e entender os riscos legais específicos.
Observações Importantes
- Nenhuma documentação substitui a necessidade de consentimento real, livre, informado e contínuo.
- A lei brasileira protege a "integridade física" e a "dignidade humana". Práticas que resultem em lesões graves ou que violem a dignidade de forma não consentida (ou com consentimento viciado) serão ilegais, independentemente de qualquer acordo prévio.
- Em caso de acusação, a existência de documentação robusta de consentimento não garante a absolvição, mas fortalece significativamente a defesa, ajudando a demonstrar a natureza consensual da relação e das práticas.
-
A alegação de coação futura é particularmente difícil de prevenir apenas com documentos. Um histórico consistente de comunicação aberta (whatsapp/telegram/e-mails), respeito mútuo e ausência de dependência ou controle excessivo na relação pode ajudar a contextualizar a dinâmica como não coercitiva.
-
Cuidado com Marcas Visíveis e Lesões Graves Práticas que resultam em hematomas severos ou lesões podem ser interpretadas como agressão, mesmo que consentidas. Evitar excessos protege não apenas a integridade física, mas também evita questionamentos legais futuros.
O que vem a ser consentimento viciado
No Direito, consentimento viciado é quando a pessoa concorda com algo, mas a vontade dela não é livre ou plena — ou seja, o consentimento existe formalmente, mas é defeituoso por alguma razão.
O Código Civil brasileiro (art. 138 a 165) define várias formas de vício de consentimento. As principais são:
Erro: A pessoa se engana sobre o que está consentindo. (Ex.: A pessoa acredita que vai participar de um jogo leve, mas na verdade é exposta a práticas pesadas.)
Dolo: A pessoa é enganada propositalmente para aceitar algo. (Ex.: Alguém mente sobre o que vai acontecer durante a prática.)
Coação: A pessoa é forçada ou ameaçada a consentir. (Ex.: "Se você não aceitar, eu termino com você" — pressão emocional forte pode ser vista como coação.)
Estado de perigo ou lesão: A pessoa aceita algo em situação de necessidade extrema ou abuso de sua vulnerabilidade. (Ex.: Alguém em situação emocional muito fragilizada é induzida a aceitar práticas que normalmente recusaria.)
No contexto de BDSM, isso é ainda mais delicado: Mesmo que a pessoa tenha "assinado" um contrato ou dito "sim", se depois ela alegar que seu consentimento foi dado sob medo, engano ou pressão psicológica, o consentimento pode ser considerado viciado — e, portanto, juridicamente inválido.
Isso tem duas implicações sérias:
-
O crime não se descaracteriza: Se houver vício, o consentimento é ignorado e a prática pode ser tratada como crime normal (lesão corporal, estupro, tortura, etc.).
-
A prova do consentimento precisa ser sólida: Mostrando que a pessoa estava informada, lúcida, livre e sem qualquer tipo de coação.
Consentimento viciado é quando a pessoa concorda formalmente, mas de maneira enganada, forçada ou pressionada, tornando o consentimento inútil para efeitos jurídicos.
Conclusão
Casais que praticam BDSM consensual no Brasil navegam em um terreno que exige não apenas confiança mútua e comunicação excepcional, mas também uma consciência aguçada das complexidades legais e dos riscos de interpretações equivocadas ou acusações mal-intencionadas. Embora o BDSM seja uma expressão legítima da sexualidade humana, sua prática no Brasil exige responsabilidade redobrada. Ter provas claras de consentimento, manter a comunicação aberta e agir com prudência são formas eficazes de se proteger de falsas alegações e preservar a liberdade e a segurança de todos os envolvidos. Embora leis controversas como a Maria da Penha sejam "vitais" para a proteção contra a violência real, os praticantes de BDSM, e em particular os homens nesse contexto, devem adotar uma postura proativa e prudente para mitigar os riscos inerentes à potencial má interpretação ou instrumentalização dessas práticas e leis, garantindo que a expressão de sua consensualidade esteja resguardada na medida do possível.
Importante: No Brasil, mesmo com tudo isso, o Ministério Público pode denunciar por crime como lesão corporal grave, estupro ou tortura, independente de consentimento. Então a prudência nas práticas é fundamental.
Aviso Legal: Este artigo tem caráter meramente informativo e não constitui aconselhamento jurídico. As leis e interpretações podem mudar, e cada situação é única. Recomenda-se buscar orientação de um advogado qualificado para discutir casos específicos.
Se curtiu este artigo faça uma contribuição, se tiver algum ponto relevante para o artigo deixe seu comentário.
-
@ dc0bbb4c:b5479e81
2025-05-19 06:31:45Trong bối cảnh thị trường giải trí trực tuyến ngày càng phát triển mạnh mẽ, 1BWM đã và đang khẳng định vị thế là một trong những nền tảng kỹ thuật số được cộng đồng người dùng tin tưởng và lựa chọn nhiều nhất. Nhờ sở hữu giao diện thiết kế hiện đại, tinh tế và cực kỳ dễ sử dụng, 1BWM giúp người dùng dễ dàng tiếp cận và trải nghiệm mọi tiện ích mà nền tảng này mang lại chỉ với vài thao tác đơn giản. Không chỉ vậy, 1BWM còn ghi điểm bởi khả năng tối ưu hóa trải nghiệm trên đa dạng thiết bị như điện thoại di động, máy tính bảng và máy tính để bàn, giúp người dùng có thể giải trí bất cứ lúc nào, ở bất kỳ đâu một cách thuận tiện và mượt mà. Từ các chuyên mục nội dung hấp dẫn, phong phú cho đến hệ thống tính năng linh hoạt, 1BWM luôn biết cách làm mới mình để phù hợp với xu hướng công nghệ và nhu cầu giải trí ngày càng đa dạng của người dùng hiện đại.
Điểm mạnh nổi bật tiếp theo khiến 1BWM được nhiều người lựa chọn chính là hệ thống bảo mật dữ liệu và quyền riêng tư vô cùng nghiêm ngặt. Nền tảng này ứng dụng công nghệ mã hóa tiên tiến, đảm bảo mọi thông tin cá nhân, tài khoản và dữ liệu giao dịch của người dùng luôn được bảo vệ an toàn tuyệt đối. Bên cạnh đó, 1BWM còn sở hữu đội ngũ chăm sóc khách hàng chuyên nghiệp, tận tâm và giàu kinh nghiệm, luôn sẵn sàng hỗ trợ giải đáp mọi thắc mắc cũng như xử lý các tình huống phát sinh một cách nhanh chóng, hiệu quả nhất. Người dùng có thể yên tâm khi trải nghiệm các dịch vụ tại đây mà không phải lo lắng về bất cứ rủi ro nào liên quan đến bảo mật thông tin. Ngoài ra, nền tảng này còn thường xuyên triển khai các chương trình ưu đãi hấp dẫn, quà tặng đặc biệt dành cho người dùng mới lẫn hội viên lâu năm, tạo thêm nhiều giá trị và động lực cho cộng đồng người tham gia.
Không dừng lại ở đó, 1BWM luôn nỗ lực không ngừng trong việc nâng cao chất lượng dịch vụ và mở rộng thêm nhiều tiện ích giải trí mới, nhằm mang đến cho người dùng những trải nghiệm trọn vẹn và thú vị nhất. Nền tảng này liên tục cập nhật các chuyên mục nội dung mới mẻ, phong phú và bắt kịp xu hướng giải trí hiện đại, giúp người dùng luôn có thêm nhiều lựa chọn phù hợp với sở thích cá nhân. Đồng thời, 1BWM cũng chú trọng vào việc cải tiến công nghệ, tối ưu tốc độ kết nối và giao diện sử dụng để nâng cao trải nghiệm mỗi lần truy cập. Với định hướng phát triển rõ ràng cùng sự đầu tư bài bản, 1BWM không chỉ là một nền tảng giải trí đơn thuần mà còn là cộng đồng trực tuyến năng động, nơi người dùng có thể kết nối, tương tác và chia sẻ những khoảnh khắc giải trí vui vẻ, ý nghĩa cùng nhau. Nhờ những ưu điểm vượt trội này, 1BWM ngày càng khẳng định được vị thế và trở thành sự lựa chọn hàng đầu của người dùng Việt khi tìm kiếm một không gian giải trí số chất lượng, an toàn và uy tín.
-
@ bbb5dda0:f09e2747
2025-05-20 13:33:59My week 19 started with a celebration of 80 years of liberation from the Germans (we love you guys now tho 🫶🏼). It feels conflicting, we're celebrating freedom, whilst cutting down those freedoms day by day more rapidly as time progresses. Should we still celebrate...?
The current path back to freedom can be mundane in the day to day but I wouldn't wanna have it any other way. These last couple weeks I've continued working on our TollGate pipelines to facilitate our release cycle, make it faster and easier to release in quick succession. There's been a lot of details to get right, because our releases are nostr based and once people start relying on the structure of the events we can't easily change it.
A TollGateOS release event now looks like this NIP-94 file metadata event:
json { "id": "a867f15ca7edc95a69e1557539a624466147584f68c62a16c47fe9bca3778312", "pubkey": "5075e61f0b048148b60105c1dd72bbeae1957336ae5824087e52efa374f8416a", "created_at": 1747475980, "kind": 1063, "tags": [ [ "url", "https://blossom.swissdash.site/9e5e8c48810a1b59cf10fa56486f311e048a0305eb58444992b6133fd19fcb3e.bin" ], [ "m", "application/octet-stream" ], [ "x", "9e5e8c48810a1b59cf10fa56486f311e048a0305eb58444992b6133fd19fcb3e" ], [ "ox", "9e5e8c48810a1b59cf10fa56486f311e048a0305eb58444992b6133fd19fcb3e" ], [ "architecture", "aarch64_cortex-a53" ], [ "device_id", "glinet_gl-mt3000" ], [ "supported_devices", "glinet,gl-mt3000 glinet,mt3000-snand" ], [ "openwrt_version", "24.10.1" ], [ "tollgate_os_version", "v0.0.2" ], [ "release_channel", "stable" ] ], "content": "TollGate OS Firmware for glinet_gl-mt3000", "sig": "1d050233428304685d202e954cb48714c800a7ca5f2d6a8d8fd657a775b9c51bf83364505311859c846e25098168a8ff309af2308712aafe634fcbdc96fcd84a" }
One of the missing links was the
supported_devices
tag. That is because the installer checks the device name by ssh-ing into the router and it returns theglinet,gl-mt3000
which doesn't properly translate into thedevice_id
, which is what's used for compiling the OS. So this helps us to do the lookups and compatibility checks in the installer.I also worked on: - getting the versioning of the tollgate-basic package's naming in line with the OpenWRT naming convention. - Rework versioning for dev builds into
[branchname].[commit_height].[commit_hash]
which will show up on thedev
release_channel
releases. - Getting an initial release of the tollgate-installer done, so we can easily flash a bunch of routers to become TollGates.Bright minds in Prague
I met up with some bright minds from the space in Prague where @cobrador and i did a workshop on turning routers into TollGates and start earning sats. As is part of building things, things break and people make us aware of issues that we wouldn't foresee. Like for some reason Minibits cashu tokens being rejected, which is likely because of the memo's but we still need to dive into that issue.
Also we released [v0.0.2] of TollGate OS, which now includes an updater feature, again for faster release cycles. Currently we're focussing on getting a v0.0.3 out quickly with fixes for the user feedback we've gathered so far!
Receipt.Cash
I also, kind of unplanned, saw an opportunity to shill Receipt.Cash. I'd made a few improvements recently and it's ready enough for reckless people to try it out ;).
|
|
| | | | Payer Scans any fiat receipt & Share link with friends | Friends tap what they had, price is auto-converted to sats, then pay by Lightning or Cashu. | If you want to try it, BE CAREFUL! It is highly experimental and you might lose your sats, no refunds!
Source Code here.
-
@ 3770c235:16042bcc
2025-05-20 13:27:03In recent years, a remarkable transformation has taken place in the way people view and utilize their homes. No longer confined to the four walls of traditional interior spaces, homeowners are increasingly turning their attention outward—toward their own backyards. The concept of outdoor living has evolved from mere patio furniture and barbecues to fully functional living environments, equipped with kitchens, entertainment systems, and even workspaces.
This growing trend is not just a design choice; it reflects changing lifestyles, shifting priorities, and a reimagining of what it means to feel at home. The rise of outdoor living is more than a fad—it's a movement, and it's here to stay.
**A Shift in Lifestyle and Values ** At the heart of the outdoor living boom is a deeper shift in how people value their time, environment, and personal space. The COVID-19 pandemic played a significant role in this evolution. Lockdowns and restrictions forced many to reassess their living situations, seeking ways to make the most of what they already had. The backyard, once overlooked, suddenly became a sanctuary—a space to breathe, gather, and escape the monotony of indoor life.
According to a 2021 study by the International Casual Furnishings Association, over 90% of Americans with outdoor living space report that it is more valuable to them than ever before, with nearly 60% saying they upgraded their outdoor spaces during the pandemic source.
This change in perception is not solely pandemic-related. There's a growing emphasis on wellness, mindfulness, and balance. People are looking to nature for inspiration and relaxation. Outdoor living spaces—be they modest balconies or expansive decks—allow homeowners to connect with nature without leaving the comfort of home.
Redefining the Backyard: From Playgrounds to Living Rooms
Traditionally, the backyard has served specific purposes—gardening, children’s play areas, maybe a grill tucked in the corner. Today, backyards are being reimagined as multi-functional extensions of the home.
-
Outdoor Kitchens and Dining Areas Once considered a luxury, outdoor kitchens have become increasingly common. With built-in grills, pizza ovens, refrigerators, sinks, and full countertops, these outdoor culinary spaces rival their indoor counterparts. The convenience of preparing and serving meals outside is matched by the social benefit: cooking becomes a shared experience.
-
Living and Lounge Areas Outdoor seating now goes far beyond foldable lawn chairs. Modular sectionals, fire pits, weather-resistant rugs, and even smart lighting have turned patios into legitimate living rooms under the sky. Some include mounted TVs, Bluetooth speakers, and retractable canopies or pergolas for all-weather comfort.
-
Work and Study Zones Remote work has blurred the boundaries between office and home. Now, it’s expanding into the outdoors. With Wi-Fi extenders, weather-protected furniture, and shade structures, backyards are becoming viable home office environments, perfect for Zoom calls with a natural backdrop.
-
Wellness Retreats From hot tubs and saunas to yoga decks and meditation gardens, outdoor spaces are being tailored to support wellness. These personal sanctuaries offer solitude and stress relief, all within the perimeter of one's property.
The Role of Technology and Innovation Modern outdoor spaces owe much of their versatility to advances in technology and materials. Weather-resistant fabrics, composite decking, solar lighting, and smart irrigation systems have all expanded what's possible in backyard design.
Smart home technology has also made its way outdoors. Lighting can be automated or voice-controlled. Outdoor speakers can be synced across zones. Even grills can be connected to apps that monitor cooking temperatures. These innovations allow outdoor living to be both luxurious and convenient, requiring minimal maintenance while offering maximum comfort.
**Economic Impact and Value Addition ** Investing in outdoor living isn't just about lifestyle—it’s also smart economics. Outdoor upgrades can significantly boost a home's resale value. A well-designed patio or outdoor kitchen can yield a return on investment (ROI) of up to 80%, according to the National Association of Realtors. In fact, data from Houzz shows that nearly 57% of homeowners are investing in their outdoor spaces specifically to increase resale value source.
This financial motivation has fueled demand for landscape architects, outdoor furniture designers, and construction professionals specializing in outdoor living projects. As a result, the industry surrounding outdoor enhancements—from pergola manufacturers to luxury fire pit designers—has seen exponential growth.
Environmental Considerations and Sustainability As outdoor living becomes more popular, so does the demand for environmentally conscious design. Homeowners are increasingly incorporating sustainable elements into their outdoor plans, including: • Native plant landscaping: Reduces water usage and supports local ecosystems. • Rainwater harvesting systems: Collect and store rain for garden irrigation. • Solar-powered lighting: Minimizes energy consumption while maximizing ambiance. • Permeable paving materials: Reduce runoff and promote groundwater recharge. Green living isn't just a buzzword—it’s influencing how people design their outdoor sanctuaries. Eco-conscious homeowners are prioritizing sustainability as much as aesthetics, ensuring their outdoor spaces are in harmony with nature, not in conflict with it.
The Social Connection
Outdoor living also taps into our basic need for connection. From summer barbecues to cozy firepit gatherings, the backyard is an ideal setting for meaningful social interactions. During a time when indoor gatherings have been restricted or limited, outdoor spaces have offered a safer, more accessible alternative.
Community ties can also be strengthened through outdoor living. In urban settings, rooftop terraces or shared gardens create communal spaces for neighbors to engage, collaborate, and unwind. For families, these outdoor extensions offer a way to spend quality time together—whether through games, meals, or simply enjoying the open air. For individuals, they provide a space to recharge, free from the digital and physical clutter of indoor life.
Customization and Personalization
One of the most appealing aspects of outdoor living is the high degree of customization available. Unlike interior spaces that may be limited by architectural constraints, outdoor areas can often be more flexible in layout and design.
Homeowners can craft outdoor environments that reflect their personalities and values: • The entertainer may opt for a bar area, ambient lighting, and surround sound. • The minimalist might choose clean lines, neutral tones, and eco-friendly materials. • The nature-lover may emphasize greenery, water features, and natural textures. DIY options also abound, allowing for creative freedom and budget-friendly upgrades. Raised garden beds, handmade furniture, repurposed materials, and vertical planters give individuals the opportunity to leave their personal mark on the space.
The Influence of Global Design Trends Outdoor living isn’t confined to North America. Around the world, cultures have long embraced outdoor spaces—from Japanese zen gardens to Mediterranean courtyards. The current global design conversation draws inspiration from a variety of traditions and climates.
Scandinavian principles of simplicity and functionality influence clean-lined, open-air designs, while tropical resorts have inspired lush, greenery-filled retreats in suburban settings. The blending of international styles enables homeowners to create outdoor spaces that are both eclectic and functional.
Looking Ahead: The Future of Outdoor Living The trajectory of outdoor living points to continued growth, innovation, and integration. Here are some trends likely to define the next decade:
- Year-Round Use With heating lamps, insulated pergolas, and all-weather furniture, outdoor spaces are becoming viable in all seasons. Expect to see more designs tailored for winter, including hot tubs, enclosed lounges, and warm lighting features.
- Outdoor Smart Hubs Technology will play an even greater role, with integrated outdoor control systems for lighting, security, irrigation, and entertainment—managed through a single device or app.
- Edible Landscaping Gardens will not only be for beauty but also for sustenance. Raised vegetable beds, fruit trees, and herb walls will become staples in functional outdoor design.
- Modular Design Portable and adaptable elements like movable walls, foldable furniture, and hybrid indoor-outdoor structures will offer more flexibility, especially in smaller spaces.
- Wellness Integration Expect an even stronger emphasis on health and well-being—cold plunge pools, outdoor gyms, meditation pods, and immersive natural soundscapes will take center stage.
Conclusion The rise of outdoor living is not just a design phenomenon—it’s a cultural shift. Homeowners are recognizing the value of outdoor spaces as extensions of their identities, routines, and dreams. Whether it's a serene garden, a vibrant entertainment hub, or a cozy work nook, the backyard is being redefined as a vital part of the home. In a world that often feels fast-paced and digitally overloaded, outdoor living offers a much-needed antidote: space to breathe, relax, connect, and thrive. It’s about more than upgrading the home—it’s about enhancing the human experience. As this trend continues to evolve, one thing is clear: the best room in the house may not be inside at all.
-
-
@ cefb08d1:f419beff
2025-05-20 13:26:14https://www.youtube.com/watch?v=jIydjo4B25U
The GWM Catch Up Day 2: Western Australia pushes CT to the ultimate test in all or nothing bouts:
https://www.youtube.com/watch?v=4zwuqs6iTPg
Women and Men Results:
https://stacker.news/items/984538
-
@ 40b9c85f:5e61b451
2025-04-24 15:27:02Introduction
Data Vending Machines (DVMs) have emerged as a crucial component of the Nostr ecosystem, offering specialized computational services to clients across the network. As defined in NIP-90, DVMs operate on an apparently simple principle: "data in, data out." They provide a marketplace for data processing where users request specific jobs (like text translation, content recommendation, or AI text generation)
While DVMs have gained significant traction, the current specification faces challenges that hinder widespread adoption and consistent implementation. This article explores some ideas on how we can apply the reflection pattern, a well established approach in RPC systems, to address these challenges and improve the DVM ecosystem's clarity, consistency, and usability.
The Current State of DVMs: Challenges and Limitations
The NIP-90 specification provides a broad framework for DVMs, but this flexibility has led to several issues:
1. Inconsistent Implementation
As noted by hzrd149 in "DVMs were a mistake" every DVM implementation tends to expect inputs in slightly different formats, even while ostensibly following the same specification. For example, a translation request DVM might expect an event ID in one particular format, while an LLM service could expect a "prompt" input that's not even specified in NIP-90.
2. Fragmented Specifications
The DVM specification reserves a range of event kinds (5000-6000), each meant for different types of computational jobs. While creating sub-specifications for each job type is being explored as a possible solution for clarity, in a decentralized and permissionless landscape like Nostr, relying solely on specification enforcement won't be effective for creating a healthy ecosystem. A more comprehensible approach is needed that works with, rather than against, the open nature of the protocol.
3. Ambiguous API Interfaces
There's no standardized way for clients to discover what parameters a specific DVM accepts, which are required versus optional, or what output format to expect. This creates uncertainty and forces developers to rely on documentation outside the protocol itself, if such documentation exists at all.
The Reflection Pattern: A Solution from RPC Systems
The reflection pattern in RPC systems offers a compelling solution to many of these challenges. At its core, reflection enables servers to provide metadata about their available services, methods, and data types at runtime, allowing clients to dynamically discover and interact with the server's API.
In established RPC frameworks like gRPC, reflection serves as a self-describing mechanism where services expose their interface definitions and requirements. In MCP reflection is used to expose the capabilities of the server, such as tools, resources, and prompts. Clients can learn about available capabilities without prior knowledge, and systems can adapt to changes without requiring rebuilds or redeployments. This standardized introspection creates a unified way to query service metadata, making tools like
grpcurl
possible without requiring precompiled stubs.How Reflection Could Transform the DVM Specification
By incorporating reflection principles into the DVM specification, we could create a more coherent and predictable ecosystem. DVMs already implement some sort of reflection through the use of 'nip90params', which allow clients to discover some parameters, constraints, and features of the DVMs, such as whether they accept encryption, nutzaps, etc. However, this approach could be expanded to provide more comprehensive self-description capabilities.
1. Defined Lifecycle Phases
Similar to the Model Context Protocol (MCP), DVMs could benefit from a clear lifecycle consisting of an initialization phase and an operation phase. During initialization, the client and DVM would negotiate capabilities and exchange metadata, with the DVM providing a JSON schema containing its input requirements. nip-89 (or other) announcements can be used to bootstrap the discovery and negotiation process by providing the input schema directly. Then, during the operation phase, the client would interact with the DVM according to the negotiated schema and parameters.
2. Schema-Based Interactions
Rather than relying on rigid specifications for each job type, DVMs could self-advertise their schemas. This would allow clients to understand which parameters are required versus optional, what type validation should occur for inputs, what output formats to expect, and what payment flows are supported. By internalizing the input schema of the DVMs they wish to consume, clients gain clarity on how to interact effectively.
3. Capability Negotiation
Capability negotiation would enable DVMs to advertise their supported features, such as encryption methods, payment options, or specialized functionalities. This would allow clients to adjust their interaction approach based on the specific capabilities of each DVM they encounter.
Implementation Approach
While building DVMCP, I realized that the RPC reflection pattern used there could be beneficial for constructing DVMs in general. Since DVMs already follow an RPC style for their operation, and reflection is a natural extension of this approach, it could significantly enhance and clarify the DVM specification.
A reflection enhanced DVM protocol could work as follows: 1. Discovery: Clients discover DVMs through existing NIP-89 application handlers, input schemas could also be advertised in nip-89 announcements, making the second step unnecessary. 2. Schema Request: Clients request the DVM's input schema for the specific job type they're interested in 3. Validation: Clients validate their request against the provided schema before submission 4. Operation: The job proceeds through the standard NIP-90 flow, but with clearer expectations on both sides
Parallels with Other Protocols
This approach has proven successful in other contexts. The Model Context Protocol (MCP) implements a similar lifecycle with capability negotiation during initialization, allowing any client to communicate with any server as long as they adhere to the base protocol. MCP and DVM protocols share fundamental similarities, both aim to expose and consume computational resources through a JSON-RPC-like interface, albeit with specific differences.
gRPC's reflection service similarly allows clients to discover service definitions at runtime, enabling generic tools to work with any gRPC service without prior knowledge. In the REST API world, OpenAPI/Swagger specifications document interfaces in a way that makes them discoverable and testable.
DVMs would benefit from adopting these patterns while maintaining the decentralized, permissionless nature of Nostr.
Conclusion
I am not attempting to rewrite the DVM specification; rather, explore some ideas that could help the ecosystem improve incrementally, reducing fragmentation and making the ecosystem more comprehensible. By allowing DVMs to self describe their interfaces, we could maintain the flexibility that makes Nostr powerful while providing the structure needed for interoperability.
For developers building DVM clients or libraries, this approach would simplify consumption by providing clear expectations about inputs and outputs. For DVM operators, it would establish a standard way to communicate their service's requirements without relying on external documentation.
I am currently developing DVMCP following these patterns. Of course, DVMs and MCP servers have different details; MCP includes capabilities such as tools, resources, and prompts on the server side, as well as 'roots' and 'sampling' on the client side, creating a bidirectional way to consume capabilities. In contrast, DVMs typically function similarly to MCP tools, where you call a DVM with an input and receive an output, with each job type representing a different categorization of the work performed.
Without further ado, I hope this article has provided some insight into the potential benefits of applying the reflection pattern to the DVM specification.
-
@ 9c9d2765:16f8c2c2
2025-05-19 05:04:10CHAPTER TWENTY TWO
“I should have trusted my son,” she said softly, her voice thick with emotion. “I allowed the world’s opinion to silence my instincts.”
James turned to her, his expression gentle. “You needed time to see what I had to become, Mother. I don’t blame you for anything.”
Mr. JP stepped forward, placing a firm hand on James’s shoulder. “Son, you’ve given this family more than we ever gave you. And tonight… Tonight, you gave JP Enterprises its legacy.”
Uncle Charles, who had silently stood behind James during the entire storm, finally spoke. “It took courage to keep quiet and watch those who wronged you bury themselves with their own greed.”
James nodded slightly. “And now… it’s done.”
Rita came closer, smiling softly. “Not completely,” she said with a hint of laughter. “You still have an entire empire to run… and a celebration to finish.”
James allowed a rare, genuine smile to appear. “Right. The anniversary.”
They returned to the hall, which had now regained its glamour and golden glow. The orchestra resumed a soft melody. The guests whispered less now and admired more. The reputation of James was not only redeemed, it was immortalized.
A grand toast was raised in his honor. Champagne glasses clinked gently beneath crystal chandeliers.
Meanwhile, in a corner of the room, Tracy sat, feeling like the walls were closing in. Her palms were damp. She had seen the storm come full circle, and it landed directly on the heads of her former allies. Her gaze lingered on James from afar no longer the man she belittled, deceived, and mocked. He was now untouchable.
She lowered her head, guilt dancing between her thoughts. What have I done?
As if sensing her gaze, James glanced in her direction. For a heartbeat, their eyes met. But there was no anger in his. Just clarity. And silence. He turned away, giving her no attention, no confrontation. That indifference stung more than any rebuke.
Back on stage, Mr. JP announced, “Tonight, we not only celebrate sixteen years of excellence, but we also honor the future. A future with James as our guiding light.”
The crowd once again erupted in applause.
As the music swelled and the lights dimmed to warm hues, couples danced, laughter returned, and the celebration continued. But for James, the victory wasn’t in the glamour, nor the spotlight. It was in knowing that he had not only defeated those who plotted against him but done so without losing his soul.
Later that evening, James stood alone at the terrace, looking out at the moonlit city below. Sandra approached quietly.
“You finally have it all,” she said gently. “The name. The company. The power.”
James didn’t turn. “It was never about having it all. It was about becoming everything they said I couldn’t.”
She smiled, stepping beside him. “And now?”
He exhaled, his breath misting into the cold night air. “Now… I build. For real this time.”
The celebration had ended, but its echoes still danced through the night like a lingering song in the soul. The grand hall slowly emptied, leaving behind the soft shuffling of feet and murmurs of astonishment. JP Enterprises’ 16th Anniversary had become more than a commemoration of business success it was now remembered as the night the city witnessed a man rise from ruin to royalty.
The staff bustled through the corridors, clearing the remains of laughter, toasts, and carefully prepared cuisine. James had stepped away, far from the glitz and glamour, and now stood once more on the terrace, his thoughts stretched thin across the skyline of the city he once wandered in as nothing more than a nameless shadow.
The weight of it all rested gently on his shoulders, not a burden, but a reminder. He remembered the cold nights on the street, the hunger, the humiliation at the Ray household, the scorn in Helen’s voice, and the way Tracy used to avoid eye contact with him as if he were dirt beneath her polished shoes.
His fists clenched slowly as memory swirled within him like a storm. But he released the tension just as quickly. That past could no longer touch him. He had outgrown it. Transcended it.
Behind him, the heavy oak doors creaked. It was Uncle Charles.
“You should rest,” Charles said, his tone fatherly. “You’ve had a long night.”
James turned, eyes soft yet heavy. “You ever wonder what happens after the applause ends?”
Charles smiled. “That’s when the real work begins.”
James chuckled dryly. “Exactly.”
They stood side by side, looking out at the city lights. It felt poetic somehow like all the scattered stars in the sky had descended to earth in the form of streetlights and skyscrapers.
“You did well tonight, James,” Charles said. “You kept your composure even when that girl tried to destroy everything.”
“She was just a pawn,” James replied. “Mark and Helen used her like they use everyone. Their power was built on manipulation. Mine won’t be.”
Charles looked at him, pride gleaming in his eyes. “And that’s why you’re different. That’s why you deserve the crown.”
Meanwhile, back in the Ray residence, chaos brewed. Mark paced violently, his jacket flung to the floor, his tie undone. Helen sat on the edge of the sofa, her heels off, nursing a glass of wine with trembling fingers.
“She betrayed us,” Mark spat. “That girl after all the money we gave her, she folded.”
“What did you expect?” Helen hissed. “She was a desperate street rat! Loyalty is not in their blood!”
Mark slammed his fist on the table. “Now the city sees us as liars. As criminals. We’ve been blacklisted by investors! Do you know what that means, Helen? We’re finished!”
Helen's face hardened. “No. We’re not. James might have won tonight, but the game isn’t over.”
Mark turned toward her. “You still want to fight him?”
The silence that followed the explosive revelation at the anniversary was thick and reverent. It blanketed the city like a veil, as if the skyline itself paused to absorb the magnitude of what had transpired. James, once discarded and humiliated, had emerged not only as the President of JP Enterprises, but as its rightful heir, son to the powerful and elusive Mr. JP. What was once speculation had now become an undeniable truth, echoing across boardrooms, dinner tables, and digital screens.
Back at JP Towers, the building pulsed with energy. Staff walked a little straighter, greeted one another with more awareness. The man they once passed in hallways without a second glance had now become a figure of awe and authority. His name echoed in hushed reverence: Mr. James.
Inside his office, James sat behind a polished obsidian desk, the city's skyline stretching behind him like a conquest. His fingers drummed silently on a closed file. He had received more than twenty new partnership requests within forty-eight hours of the celebration. Shares had surged. The media, which once sought to condemn him, was now clamoring for exclusive interviews, praising his resilience and visionary leadership.
Yet, James was silent.
Not because he didn't revel in victory, but because he understood something deeper this was not the end. It was only the beginning.
-
@ 472f440f:5669301e
2025-05-20 13:01:09Marty's Bent
via me
Don't sleep on what's happening in Japan right now. We've been covering the country and the fact that they've lost control of their yield curve since late last year. After many years of making it a top priority from a monetary policy perspective, last year the Bank of Japan decided to give up on yield curve control in an attempt to reel inflation. This has sent yields for the 30-year and 40-year Japanese government bonds to levels not seen since the early 2000s in the case of the 30-year and levels never before seen for the 40-year, which was launched in 2007. With a debt to GDP ratio that has surpassed 250% and a population that is aging out with an insufficient amount of births to replace the aging workforce, it's hard to see how Japan can get out of this conundrum without some sort of economic collapse.
This puts the United States in a tough position considering the fact that Japan is one of the largest holders of U.S. Treasury bonds with more than 1,135 sats | $1.20 trillion in exposure. If things get too out of control in Japan and the yield curve continues to drift higher and inflation continues to creep higher Japan can find itself in a situation where it's a forced seller of US Treasuries as they attempt to strengthen the yen. Another aspect to consider is the fact that investors may see the higher yields on Japanese government bonds and decide to purchase them instead of US Treasuries. This is something to keep an eye on in the weeks to come. Particularly if higher rates drive a higher cost of capital, which leads to even more inflation. As producers are forced to increase their prices to ensure that they can manage their debt repayments.
It's never a good sign when the Japanese Prime Minister is coming out to proclaim that his country's financial situation is worse than Greece's, which has been a laughing stock of Europe for the better part of three decades. Japan is a very proud nation, and the fact that its Prime Minister made a statement like this should not be underappreciated.
As we noted last week, the 10-year and 30-year U.S. Treasury bonds are drifting higher as well. Earlier today, the 30-year bond yield surpassed 5%, which has been a psychological level that many have been pointed to as a critical tipping point. When you take a step back and look around the world it seems pretty clear that bond markets are sending a very strong signal. And that signal is that something is not well in the back end of the financial system.
This is even made clear when you look at the private sector, particularly at consumer debt. In late March, we warned of the growing trend of buy now, pay later schemes drifting down market as major credit card companies released charge-off data which showed charge-off rates reaching levels not seen since the 2008 great financial crisis. At the time, we could only surmise that Klarna was experiencing similar charge-off rates on the bigger-ticket items they financed and started doing deals with companies like DoorDash to finance burrito deliveries in an attempt to move down market to finance smaller ticket items with a higher potential of getting paid back. It seems like that inclination was correct as Klarna released data earlier today showing more losses on their book as consumers find it extremely hard to pay back their debts.
via NewsWire
This news hit the markets on the same day as the average rate of the 30-year mortgage in the United States rose to 7.04%. I'm not sure if you've checked lately, but real estate prices are still relatively elevated outside of a few big cities who expanded supply significantly during the COVID era as people flooded out of blue states towards red states. It's hard to imagine that many people can afford a house based off of sticker price alone, but with a 7% 30-year mortgage rate it's becoming clear that the ability of the Common Man to buy a house is simply becoming impossible.
via Lance Lambert
The mortgage rate data is not the only thing you need to look at to understand that it's becoming impossible for the Common Man of working age to buy a house. New data has recently been released that highlights That the median home buyer in 2007 was born in 1968, and the median home buyer in 2024 was born in 1968. Truly wild when you think of it. As our friend Darth Powell cheekily highlights below, we find ourselves in a situation where boomers are simply trading houses and the younger generations are becoming indentured slaves. Forever destined to rent because of the complete inability to afford to buy a house.
via Darth Powell
via Yahoo Finance
Meanwhile, Bitcoin re-approached all-time highs late this evening and looks primed for another breakout to the upside. This makes sense if you're paying attention. The high-velocity trash economy running on an obscene amount of debt in both the public and private sectors seems to be breaking at the seams. All the alarm bells are signaling that another big print is coming. And if you hope to preserve your purchasing power or, ideally, increase it as the big print approaches, the only thing that makes sense is to funnel your money into the hardest asset in the world, which is Bitcoin.
via Bitbo
Buckle up, freaks. It's gonna be a bumpy ride. Stay humble, Stack Sats.
Trump's Middle East Peace Strategy: Redefining U.S. Foreign Policy
In his recent Middle East tour, President Trump signaled what our guest Dr. Anas Alhajji calls "a major change in US policy." Trump explicitly rejected the nation-building strategies of his predecessors, contrasting the devastation in Afghanistan and Iraq with the prosperity of countries like Saudi Arabia and UAE. This marks a profound shift from both Republican and Democratic foreign policy orthodoxy. As Alhajji noted, Trump's willingness to meet with Syrian President Assad follows a historical pattern where former adversaries eventually become diplomatic partners.
"This is really one of the most important shifts in US foreign policy to say, look, sorry, we destroyed those countries because we tried to rebuild them and it was a big mistake." - Dr. Anas Alhajji
The administration's new approach emphasizes negotiation over intervention. Rather than military solutions, Trump is engaging with groups previously considered off-limits, including the Houthis, Hamas, and Iran. This pragmatic stance prioritizes economic cooperation and regional stability over ideological confrontation. The focus on trade deals and investment rather than regime change represents a fundamental reimagining of America's role in the Middle East.
Check out the full podcast here for more on the Iran nuclear situation, energy market predictions, and why AI development could create power grid challenges. Only on TFTC Studio.
Headlines of the Day
Bitcoin Soars to 100,217 sats | $106.00K While Bonds Lose 40% Since 2020 - via X
US Senate Advances Stablecoin Bill As America Embraces Bitcoin - via X
Get our new STACK SATS hat - via tftcmerch.io
Texas House Debates Bill For State-Run Bitcoin Reserve - via X
Take the First Step Off the Exchange
Bitkey is an easy, secure way to move your Bitcoin into self-custody. With simple setup and built-in recovery, it’s the perfect starting point for getting your coins off centralized platforms and into cold storage—no complexity, no middlemen.
Take control. Start with Bitkey.
Use the promo code “TFTC20” during checkout for 20% off
Ten31, the largest bitcoin-focused investor, has deployed 158,469 sats | $150.00M across 30+ companies through three funds. I am a Managing Partner at Ten31 and am very proud of the work we are doing. Learn more at ten31.vc/invest.
Final thought...
Don't let the noise consume you. Focus on making your life 1% better every day.
Get this newsletter sent to your inbox daily: https://www.tftc.io/bitcoin-brief/
Subscribe to our YouTube channels and follow us on Nostr and X:
-
@ f6488c62:c929299d
2025-05-19 03:25:26เรื่องจริงที่ต้องเตือน: เมื่อ "ความรวยจากคริปโต" กลายเป็นดาบสองคมที่อันตรายถึงชีวิต! 🔪💰
ในขณะที่หลายคนยินดีกับกำไรจาก Bitcoin และคริปโตอื่นๆ มีเรื่องราวอีกด้านที่น่าสะเทือนใจเกิดขึ้นทั่วโลก โดยเฉพาะเหตุการณ์ "ลักพาตัวเพื่อเรียกค่าไถ่เป็นคริปโต" ที่ทวีความรุนแรงขึ้น
ข้อมูลและข่าวจากหลายแหล่งยืนยันว่า ผู้ใช้งานคริปโตกำลังตกเป็นเป้าหมายของอาชญากร โดยใช้วิธีการที่โหดเหี้ยม เช่น การทำร้ายร่างกาย หรือแม้กระทั่งการ "ตัดนิ้ว" เพื่อบีบบังคับให้เหยื่อโอนคริปโตใน Cold Wallet ที่เก็บไว้! เคสล่าสุดที่เกิดขึ้นในฝรั่งเศสและสหรัฐฯ ในช่วงปี 2025 เป็นเครื่องย้ำเตือนชั้นดี
ทำไมพวกเขาถึงเลือก "คุณ" ที่เป็นนักลงทุนคริปโต? ปัจจัยสำคัญคือ: มูลค่าสินทรัพย์ที่คุณถือสูงมาก, การเก็บ Private Key ของ Cold Wallet คือจุดอ่อนที่คนร้ายใช้ความรุนแรงบังคับเอาได้ง่าย, และที่น่าตกใจคือ การ "โพสต์โชว์ความรวย" หรือพูดถึงคริปโตมากเกินไปบนโซเชียลมีเดีย กำลังเป็นการชี้เป้าให้ตัวเอง!
ข้อคิดและแนวทางป้องกันตัวที่สำคัญสุดๆ:
จงเป็น "Ghost" ในโลกคริปโต: อย่าให้ใครรู้ว่าคุณถืออะไร เท่าไหร่ หรือรวยแค่ไหน การปิดทองหลังพระในโลกคริปโตอาจช่วยรักษาชีวิตคุณได้ ยกระดับความปลอดภัย "ชีวิตจริง": คิดถึงกล้องวงจรปิด, ระบบรักษาความปลอดภัยที่บ้าน, การจ้างบอดี้การ์ด (ถ้าจำเป็นจริงๆ), และระวังการเดินทางคนเดียว บริหารจัดการ "กุญแจ" ของคุณให้ดีที่สุด: Cold Wallet สำคัญมาก แต่การเก็บ Private Key ให้ปลอดภัยจากสายตาคนอื่น และการกระจายความเสี่ยงโดยแบ่งทรัพย์สินไปหลาย Wallet ก็สำคัญไม่แพ้กัน ความรุนแรงในวงการคริปโตเป็นบทเรียนราคาแพงที่บอกว่า ความมั่งคั่งที่มองไม่เห็นในโลกดิจิทัลนั้น มีราคาค่างวดที่ต้องจ่ายในโลกจริงหากประมาท การลงทุนอย่างรอบคอบ ไม่ใช่แค่การดูกราฟ แต่คือการประเมินและจัดการความเสี่ยงใน "ชีวิต" ของคุณด้วย!
แชร์โพสนี้เพื่อเตือนเพื่อนๆ นักลงทุนทุกคน ให้ปลอดภัยทั้งทรัพย์สินและชีวิตครับ/ค่ะ!
Crypto #Bitcoin #Ethereum #ColdWallet #PrivateKey #Security #Crime #DigitalAssets #Investor #SafetyFirst #เตือนภัย #ลงทุนอย่างปลอดภัย
-
@ 3ffac3a6:2d656657
2025-04-23 01:57:57🔧 Infrastructure Overview
- Hardware: Raspberry Pi 5 with PCIe NVMe HAT and 2TB NVMe SSD
- Filesystem: ZFS with separate datasets for each service
- Networking: Docker bridge networks for service segmentation
- Privacy: Tor and I2P routing for anonymous communication
- Public Access: Cloudflare Tunnel to securely expose LNbits
📊 Architecture Diagram
🛠️ Setup Steps
1. Prepare the System
- Install Raspberry Pi OS (64-bit)
- Set up ZFS on the NVMe disk
- Create a ZFS dataset for each service (e.g.,
bitcoin
,lnd
,rtl
,lnbits
,tor-data
) - Install Docker and Docker Compose
2. Create Shared Docker Network and Privacy Layers
Create a shared Docker bridge network:
bash docker network create \ --driver=bridge \ --subnet=192.168.100.0/24 \ bitcoin-net
Note: Connect
bitcoind
,lnd
,rtl
, internallnbits
,tor
, andi2p
to thisbitcoin-net
network.Tor
- Run Tor in a container
- Configure it to expose LND's gRPC and REST ports via hidden services:
HiddenServicePort 10009 192.168.100.31:10009 HiddenServicePort 8080 192.168.100.31:8080
- Set correct permissions:
bash sudo chown -R 102:102 /zfs/datasets/tor-data
I2P
- Run I2P in a container with SAM and SOCKS proxies
- Update
bitcoin.conf
:i2psam=192.168.100.20:7656 i2pacceptincoming=1
3. Set Up Bitcoin Core
- Create a
bitcoin.conf
with Tor/I2P/proxy settings and ZMQ enabled - Sync the blockchain in a container using its ZFS dataset
4. Set Up LND
- Configure
lnd.conf
to connect tobitcoind
and use Tor: ```ini [Bitcoind] bitcoind.rpchost=bitcoin:8332 bitcoind.rpcuser=bitcoin bitcoind.rpcpass=very-hard-password bitcoind.zmqpubrawblock=tcp://bitcoin:28332 bitcoind.zmqpubrawtx=tcp://bitcoin:28333
[Application Options] externalip=xxxxxxxx.onion
`` - Don’t expose gRPC or REST ports publicly - Mount the ZFS dataset at
/root/.lnd` - Optionally enable Watchtower5. Set Up RTL
- Mount
RTL-Config.json
and data volumes - Expose RTL's web interface locally:
```yaml
ports:
- "3000:3000" ```
6. Set Up Internal LNbits
- Connect the LNbits container to
bitcoin-net
- Mount the data directory and LND cert/macaroons (read-only)
- Expose the LNbits UI on the local network:
```yaml
ports:
- "5000:5000" ```
- In the web UI, configure the funding source to point to the LND REST
.onion
address and paste the hex macaroon - Create and fund a wallet, and copy its Admin Key for external use
7. Set Up External LNbits + Cloudflare Tunnel
- Run another LNbits container on a separate Docker network
- Access the internal LNbits via the host IP and port 5000
- Use the Admin Key from the internal wallet to configure funding
- In the Cloudflare Zero Trust dashboard:
- Create a tunnel
- Select Docker, copy the
--token
command - Add to Docker Compose:
yaml command: tunnel --no-autoupdate run --token eyJ...your_token...
💾 Backup Strategy
- Bitcoin Core: hourly ZFS snapshots, retained for 6 hours
- Other Services: hourly snapshots with remote
.tar.gz
backups - Retention: 7d hourly, 30d daily, 12mo weekly, monthly forever
- Back up ZFS snapshots to avoid inconsistencies
🔐 Security Isolation Benefits
This architecture isolates services by scope and function:
- Internal traffic stays on
bitcoin-net
- Sensitive APIs (gRPC, REST) are reachable only via Tor
- Public access is controlled by Cloudflare Tunnel
Extra Security: Host the public LNbits on a separate machine (e.g., hardened VPS) with strict firewall rules:
- Allow only Cloudflare egress
- Allow ingress from your local IP
- Allow outbound access to internal LNbits (port 5000)
Use WireGuard VPN to secure the connection between external and internal LNbits:
- Ensures encrypted communication
- Restricts access to authenticated VPN peers
- Keeps the internal interface isolated from the public internet
✅ Final Notes
- Internal services communicate over
bitcoin-net
- LND interfaces are accessed via Tor only
- LNbits and RTL UIs are locally accessible
- Cloudflare Tunnel secures external access to LNbits
Monitor system health using
monit
,watchtower
, or Prometheus.Create all configuration files manually (
bitcoin.conf
,lnd.conf
,RTL-Config.json
), and keep credentials secure. Test every component locally before exposing it externally.⚡
-
@ 4ba8e86d:89d32de4
2025-04-21 02:13:56Tutorial feito por nostr:nostr:npub1rc56x0ek0dd303eph523g3chm0wmrs5wdk6vs0ehd0m5fn8t7y4sqra3tk poste original abaixo:
Parte 1 : http://xh6liiypqffzwnu5734ucwps37tn2g6npthvugz3gdoqpikujju525yd.onion/263585/tutorial-debloat-de-celulares-android-via-adb-parte-1
Parte 2 : http://xh6liiypqffzwnu5734ucwps37tn2g6npthvugz3gdoqpikujju525yd.onion/index.php/263586/tutorial-debloat-de-celulares-android-via-adb-parte-2
Quando o assunto é privacidade em celulares, uma das medidas comumente mencionadas é a remoção de bloatwares do dispositivo, também chamado de debloat. O meio mais eficiente para isso sem dúvidas é a troca de sistema operacional. Custom Rom’s como LineageOS, GrapheneOS, Iodé, CalyxOS, etc, já são bastante enxutos nesse quesito, principalmente quanto não é instalado os G-Apps com o sistema. No entanto, essa prática pode acabar resultando em problemas indesejados como a perca de funções do dispositivo, e até mesmo incompatibilidade com apps bancários, tornando este método mais atrativo para quem possui mais de um dispositivo e separando um apenas para privacidade. Pensando nisso, pessoas que possuem apenas um único dispositivo móvel, que são necessitadas desses apps ou funções, mas, ao mesmo tempo, tem essa visão em prol da privacidade, buscam por um meio-termo entre manter a Stock rom, e não ter seus dados coletados por esses bloatwares. Felizmente, a remoção de bloatwares é possível e pode ser realizada via root, ou mais da maneira que este artigo irá tratar, via adb.
O que são bloatwares?
Bloatware é a junção das palavras bloat (inchar) + software (programa), ou seja, um bloatware é basicamente um programa inútil ou facilmente substituível — colocado em seu dispositivo previamente pela fabricante e operadora — que está no seu dispositivo apenas ocupando espaço de armazenamento, consumindo memória RAM e pior, coletando seus dados e enviando para servidores externos, além de serem mais pontos de vulnerabilidades.
O que é o adb?
O Android Debug Brigde, ou apenas adb, é uma ferramenta que se utiliza das permissões de usuário shell e permite o envio de comandos vindo de um computador para um dispositivo Android exigindo apenas que a depuração USB esteja ativa, mas também pode ser usada diretamente no celular a partir do Android 11, com o uso do Termux e a depuração sem fio (ou depuração wifi). A ferramenta funciona normalmente em dispositivos sem root, e também funciona caso o celular esteja em Recovery Mode.
Requisitos:
Para computadores:
• Depuração USB ativa no celular; • Computador com adb; • Cabo USB;
Para celulares:
• Depuração sem fio (ou depuração wifi) ativa no celular; • Termux; • Android 11 ou superior;
Para ambos:
• Firewall NetGuard instalado e configurado no celular; • Lista de bloatwares para seu dispositivo;
Ativação de depuração:
Para ativar a Depuração USB em seu dispositivo, pesquise como ativar as opções de desenvolvedor de seu dispositivo, e lá ative a depuração. No caso da depuração sem fio, sua ativação irá ser necessária apenas no momento que for conectar o dispositivo ao Termux.
Instalação e configuração do NetGuard
O NetGuard pode ser instalado através da própria Google Play Store, mas de preferência instale pela F-Droid ou Github para evitar telemetria.
F-Droid: https://f-droid.org/packages/eu.faircode.netguard/
Github: https://github.com/M66B/NetGuard/releases
Após instalado, configure da seguinte maneira:
Configurações → padrões (lista branca/negra) → ative as 3 primeiras opções (bloquear wifi, bloquear dados móveis e aplicar regras ‘quando tela estiver ligada’);
Configurações → opções avançadas → ative as duas primeiras (administrar aplicativos do sistema e registrar acesso a internet);
Com isso, todos os apps estarão sendo bloqueados de acessar a internet, seja por wifi ou dados móveis, e na página principal do app basta permitir o acesso a rede para os apps que você vai usar (se necessário). Permita que o app rode em segundo plano sem restrição da otimização de bateria, assim quando o celular ligar, ele já estará ativo.
Lista de bloatwares
Nem todos os bloatwares são genéricos, haverá bloatwares diferentes conforme a marca, modelo, versão do Android, e até mesmo região.
Para obter uma lista de bloatwares de seu dispositivo, caso seu aparelho já possua um tempo de existência, você encontrará listas prontas facilmente apenas pesquisando por elas. Supondo que temos um Samsung Galaxy Note 10 Plus em mãos, basta pesquisar em seu motor de busca por:
Samsung Galaxy Note 10 Plus bloatware list
Provavelmente essas listas já terão inclusas todos os bloatwares das mais diversas regiões, lhe poupando o trabalho de buscar por alguma lista mais específica.
Caso seu aparelho seja muito recente, e/ou não encontre uma lista pronta de bloatwares, devo dizer que você acaba de pegar em merda, pois é chato para um caralho pesquisar por cada aplicação para saber sua função, se é essencial para o sistema ou se é facilmente substituível.
De antemão já aviso, que mais para frente, caso vossa gostosura remova um desses aplicativos que era essencial para o sistema sem saber, vai acabar resultando na perda de alguma função importante, ou pior, ao reiniciar o aparelho o sistema pode estar quebrado, lhe obrigando a seguir com uma formatação, e repetir todo o processo novamente.
Download do adb em computadores
Para usar a ferramenta do adb em computadores, basta baixar o pacote chamado SDK platform-tools, disponível através deste link: https://developer.android.com/tools/releases/platform-tools. Por ele, você consegue o download para Windows, Mac e Linux.
Uma vez baixado, basta extrair o arquivo zipado, contendo dentro dele uma pasta chamada platform-tools que basta ser aberta no terminal para se usar o adb.
Download do adb em celulares com Termux.
Para usar a ferramenta do adb diretamente no celular, antes temos que baixar o app Termux, que é um emulador de terminal linux, e já possui o adb em seu repositório. Você encontra o app na Google Play Store, mas novamente recomendo baixar pela F-Droid ou diretamente no Github do projeto.
F-Droid: https://f-droid.org/en/packages/com.termux/
Github: https://github.com/termux/termux-app/releases
Processo de debloat
Antes de iniciarmos, é importante deixar claro que não é para você sair removendo todos os bloatwares de cara sem mais nem menos, afinal alguns deles precisam antes ser substituídos, podem ser essenciais para você para alguma atividade ou função, ou até mesmo são insubstituíveis.
Alguns exemplos de bloatwares que a substituição é necessária antes da remoção, é o Launcher, afinal, é a interface gráfica do sistema, e o teclado, que sem ele só é possível digitar com teclado externo. O Launcher e teclado podem ser substituídos por quaisquer outros, minha recomendação pessoal é por aqueles que respeitam sua privacidade, como Pie Launcher e Simple Laucher, enquanto o teclado pelo OpenBoard e FlorisBoard, todos open-source e disponíveis da F-Droid.
Identifique entre a lista de bloatwares, quais você gosta, precisa ou prefere não substituir, de maneira alguma você é obrigado a remover todos os bloatwares possíveis, modifique seu sistema a seu bel-prazer. O NetGuard lista todos os apps do celular com o nome do pacote, com isso você pode filtrar bem qual deles não remover.
Um exemplo claro de bloatware insubstituível e, portanto, não pode ser removido, é o com.android.mtp, um protocolo onde sua função é auxiliar a comunicação do dispositivo com um computador via USB, mas por algum motivo, tem acesso a rede e se comunica frequentemente com servidores externos. Para esses casos, e melhor solução mesmo é bloquear o acesso a rede desses bloatwares com o NetGuard.
MTP tentando comunicação com servidores externos:
Executando o adb shell
No computador
Faça backup de todos os seus arquivos importantes para algum armazenamento externo, e formate seu celular com o hard reset. Após a formatação, e a ativação da depuração USB, conecte seu aparelho e o pc com o auxílio de um cabo USB. Muito provavelmente seu dispositivo irá apenas começar a carregar, por isso permita a transferência de dados, para que o computador consiga se comunicar normalmente com o celular.
Já no pc, abra a pasta platform-tools dentro do terminal, e execute o seguinte comando:
./adb start-server
O resultado deve ser:
daemon not running; starting now at tcp:5037 daemon started successfully
E caso não apareça nada, execute:
./adb kill-server
E inicie novamente.
Com o adb conectado ao celular, execute:
./adb shell
Para poder executar comandos diretamente para o dispositivo. No meu caso, meu celular é um Redmi Note 8 Pro, codinome Begonia.
Logo o resultado deve ser:
begonia:/ $
Caso ocorra algum erro do tipo:
adb: device unauthorized. This adb server’s $ADB_VENDOR_KEYS is not set Try ‘adb kill-server’ if that seems wrong. Otherwise check for a confirmation dialog on your device.
Verifique no celular se apareceu alguma confirmação para autorizar a depuração USB, caso sim, autorize e tente novamente. Caso não apareça nada, execute o kill-server e repita o processo.
No celular
Após realizar o mesmo processo de backup e hard reset citado anteriormente, instale o Termux e, com ele iniciado, execute o comando:
pkg install android-tools
Quando surgir a mensagem “Do you want to continue? [Y/n]”, basta dar enter novamente que já aceita e finaliza a instalação
Agora, vá até as opções de desenvolvedor, e ative a depuração sem fio. Dentro das opções da depuração sem fio, terá uma opção de emparelhamento do dispositivo com um código, que irá informar para você um código em emparelhamento, com um endereço IP e porta, que será usado para a conexão com o Termux.
Para facilitar o processo, recomendo que abra tanto as configurações quanto o Termux ao mesmo tempo, e divida a tela com os dois app’s, como da maneira a seguir:
Para parear o Termux com o dispositivo, não é necessário digitar o ip informado, basta trocar por “localhost”, já a porta e o código de emparelhamento, deve ser digitado exatamente como informado. Execute:
adb pair localhost:porta CódigoDeEmparelhamento
De acordo com a imagem mostrada anteriormente, o comando ficaria “adb pair localhost:41255 757495”.
Com o dispositivo emparelhado com o Termux, agora basta conectar para conseguir executar os comandos, para isso execute:
adb connect localhost:porta
Obs: a porta que você deve informar neste comando não é a mesma informada com o código de emparelhamento, e sim a informada na tela principal da depuração sem fio.
Pronto! Termux e adb conectado com sucesso ao dispositivo, agora basta executar normalmente o adb shell:
adb shell
Remoção na prática Com o adb shell executado, você está pronto para remover os bloatwares. No meu caso, irei mostrar apenas a remoção de um app (Google Maps), já que o comando é o mesmo para qualquer outro, mudando apenas o nome do pacote.
Dentro do NetGuard, verificando as informações do Google Maps:
Podemos ver que mesmo fora de uso, e com a localização do dispositivo desativado, o app está tentando loucamente se comunicar com servidores externos, e informar sabe-se lá que peste. Mas sem novidades até aqui, o mais importante é que podemos ver que o nome do pacote do Google Maps é com.google.android.apps.maps, e para o remover do celular, basta executar:
pm uninstall –user 0 com.google.android.apps.maps
E pronto, bloatware removido! Agora basta repetir o processo para o resto dos bloatwares, trocando apenas o nome do pacote.
Para acelerar o processo, você pode já criar uma lista do bloco de notas com os comandos, e quando colar no terminal, irá executar um atrás do outro.
Exemplo de lista:
Caso a donzela tenha removido alguma coisa sem querer, também é possível recuperar o pacote com o comando:
cmd package install-existing nome.do.pacote
Pós-debloat
Após limpar o máximo possível o seu sistema, reinicie o aparelho, caso entre no como recovery e não seja possível dar reboot, significa que você removeu algum app “essencial” para o sistema, e terá que formatar o aparelho e repetir toda a remoção novamente, desta vez removendo poucos bloatwares de uma vez, e reiniciando o aparelho até descobrir qual deles não pode ser removido. Sim, dá trabalho… quem mandou querer privacidade?
Caso o aparelho reinicie normalmente após a remoção, parabéns, agora basta usar seu celular como bem entender! Mantenha o NetGuard sempre executando e os bloatwares que não foram possíveis remover não irão se comunicar com servidores externos, passe a usar apps open source da F-Droid e instale outros apps através da Aurora Store ao invés da Google Play Store.
Referências: Caso você seja um Australopithecus e tenha achado este guia difícil, eis uma videoaula (3:14:40) do Anderson do canal Ciberdef, realizando todo o processo: http://odysee.com/@zai:5/Como-remover-at%C3%A9-200-APLICATIVOS-que-colocam-a-sua-PRIVACIDADE-E-SEGURAN%C3%87A-em-risco.:4?lid=6d50f40314eee7e2f218536d9e5d300290931d23
Pdf’s do Anderson citados na videoaula: créditos ao anon6837264 http://eternalcbrzpicytj4zyguygpmkjlkddxob7tptlr25cdipe5svyqoqd.onion/file/3863a834d29285d397b73a4af6fb1bbe67c888d72d30/t-05e63192d02ffd.pdf
Processo de instalação do Termux e adb no celular: https://youtu.be/APolZrPHSms
-
@ 9be6a199:6e133301
2025-05-20 12:47:14sadfsflkjsdflkdsjfglksjdfglksdaasdfsdfsdfsdfssdsd
-
@ 33baa074:3bb3a297
2025-05-19 02:53:31Distilled water and purified water are different in some aspects. Which one is better depends on personal needs and preferences. The following is a comparative analysis of the two from multiple dimensions:
Water source and process flow Distilled water: The water source usually comes from natural water bodies such as rivers, lakes and seas. It is treated by distillation, that is, water is heated to boiling and water vapor is condensed into liquid water. This process can remove impurities, harmful substances and most minerals in the water.
Purified water: The water source is mainly tap water. Through a series of complex processes such as filtration, adsorption, reverse osmosis, and electrolysis, harmful substances, bacteria, viruses and some minerals in the water are removed to achieve high purity. The process flow is relatively complex and some trace elements that are beneficial to the human body are retained.
Ingredients and nutrition Distilled water: Highly pure, almost no minerals and trace elements. Long-term drinking may cause the human body to lack necessary minerals and trace elements, thus affecting health.
Purified water: After treatment, some trace elements that are beneficial to the human body are retained. While maintaining a high degree of purity, it has certain nutritional value and is more suitable as daily drinking water to meet the basic needs of the human body for water and minerals.
Uses Distilled water: Due to its high purity and impurity-free characteristics, it is widely used in the pharmaceutical industry (such as preparing and diluting various drug solutions, saline, and cleaning wounds, etc.), chemical experiments (dissolving and diluting chemical reagents, preparing chemical solutions, etc.), and industrial production.
Purified water: More used in daily drinking, cooking, and brewing tea and coffee. It has a fresh taste and no odor, which can better preserve the original flavor of food and drinks. It can also be used to prepare infant milk powder and formula milk powder, etc., which is safer and more reliable because it does not contain harmful substances.
Potential risks Distilled water: Due to the lack of minerals and trace elements, it may cause nutritional imbalance in the human body.
Purified water: Although some trace elements are retained, it may also bring potential health risks due to chemical residues in the processing process.
In summary, if you are worried about the loss of minerals, it may be more appropriate to choose purified water; if you think that excessive mineral intake is not good for health, then distilled water may be a better choice. But no matter which one you choose, it is not recommended to drink a large amount of water for a long time. It can be combined with other mineral-rich drinks or foods to maintain the body's nutritional balance.
-
@ 4ba8e86d:89d32de4
2025-04-21 02:12:19SISTEMA OPERACIONAL MÓVEIS
GrapheneOS : https://njump.me/nevent1qqs8t76evdgrg4qegdtyrq2rved63pr29wlqyj627n9tj4vlu66tqpqpzdmhxue69uhk7enxvd5xz6tw9ec82c30qgsyh28gd5ke0ztdeyehc0jsq6gcj0tnzatjlkql3dqamkja38fjmeqrqsqqqqqppcqec9
CalyxOS : https://njump.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
LineageOS : https://njump.me/nevent1qqsgw7sr36gaty48cf4snw0ezg5mg4atzhqayuge752esd469p26qfgpzdmhxue69uhhwmm59e6hg7r09ehkuef0qgsyh28gd5ke0ztdeyehc0jsq6gcj0tnzatjlkql3dqamkja38fjmeqrqsqqqqqpnvm779
SISTEMA OPERACIONAL DESKTOP
Tails : https://njump.me/nevent1qqsf09ztvuu60g6xprazv2vxqqy5qlxjs4dkc9d36ta48q75cs9le4qpzemhxue69uhkummnw3ex2mrfw3jhxtn0wfnj7q3qfw5wsmfdj7ykmjfn0sl9qp533y7hx96h9lvplz6pmhd9mzwn9hjqxpqqqqqqz34ag5t
Qubes OS : https://njump.me/nevent1qqsp6jujgwl68uvurw0cw3hfhr40xq20sj7rl3z4yzwnhp9sdpa7augpzpmhxue69uhkummnw3ezumt0d5hsz9mhwden5te0wfjkccte9ehx7um5wghxyctwvshsz9thwden5te0dehhxarj9ehhsarj9ejx2a30qyg8wumn8ghj7mn09eehgu3wvdez7qg4waehxw309aex2mrp0yhxgctdw4eju6t09uqjxamnwvaz7tmwdaehgu3dwejhy6txd9jkgtnhv4kxcmmjv3jhytnwv46z7qgwwaehxw309ahx7uewd3hkctcpremhxue69uhkummnw3ez6er9wch8wetvd3hhyer9wghxuet59uj3ljr8
Kali linux : https://njump.me/nevent1qqswlav72xdvamuyp9xc38c6t7070l3n2uxu67ssmal2g7gv35nmvhspzpmhxue69uhkumewwd68ytnrwghsygzt4r5x6tvh39kujvmu8egqdyvf84e3w4e0mq0ckswamfwcn5eduspsgqqqqqqswt9rxe
Whonix : https://njump.me/nevent1qqs85gvejvzhk086lwh6edma7fv07p5c3wnwnxnzthwwntg2x6773egpydmhxue69uhkummnw3ez6an9wf5kv6t9vsh8wetvd3hhyer9wghxuet59uq3qamnwvaz7tmwdaehgu3wd4hk6tcpzemhxue69uhkummnw3ezucnrdqhxu6twdfsj7qfywaehxw309ahx7um5wgh8ymm4dej8ymmrdd3xjarrda5kuetjwvhxxmmd9uq3wamnwvaz7tmzw33ju6mvv4hxgct6w5hxxmmd9uq3qamnwvaz7tmwduh8xarj9e3hytcpzamhxue69uhhyetvv9ujumn0wd68ytnzv9hxgtcpz4mhxue69uhhyetvv9ujuerpd46hxtnfduhszrnhwden5te0dehhxtnvdakz7qg7waehxw309ahx7um5wgkkgetk9emk2mrvdaexgetj9ehx2ap0sen9p6
Kodachi : https://njump.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
PGP
Openkeychain : https://njump.me/nevent1qqs9qtjgsulp76t7jkquf8nk8txs2ftsr0qke6mjmsc2svtwfvswzyqpz4mhxue69uhhyetvv9ujuerpd46hxtnfduhsygzt4r5x6tvh39kujvmu8egqdyvf84e3w4e0mq0ckswamfwcn5eduspsgqqqqqqs36mp0w
Kleopatra : https://njump.me/nevent1qqspnevn932hdggvp4zam6mfyce0hmnxsp9wp8htpumq9vm3anq6etsppemhxue69uhkummn9ekx7mp0qgsyh28gd5ke0ztdeyehc0jsq6gcj0tnzatjlkql3dqamkja38fjmeqrqsqqqqqpuaeghp
Pgp : https://njump.me/nevent1qqsggek707qf3rzttextmgqhym6d4g479jdnlnj78j96y0ut0x9nemcpzamhxue69uhhyetvv9ujuurjd9kkzmpwdejhgtczyp9636rd9ktcjmwfxd7ru5qxjxyn6uch2uhas8utg8wa5hvf6vk7gqcyqqqqqqgptemhe
Como funciona o PGP? : https://njump.me/nevent1qqsz9r7azc8pkvfmkg2hv0nufaexjtnvga0yl85x9hu7ptpg20gxxpspremhxue69uhkummnw3ez6ur4vgh8wetvd3hhyer9wghxuet59upzqjagapkjm9ufdhynxlp72qrfrzfawvt4wt7cr795rhw6tkyaxt0yqvzqqqqqqy259fhs
Por que eu escrevi PGP. - Philip Zimmermann.
https://njump.me/nevent1qqsvysn94gm8prxn3jw04r0xwc6sngkskg756z48jsyrmqssvxtm7ncpzamhxue69uhhyetvv9ujumn0wd68ytnzv9hxgtchzxnad
VPN
Vpn : https://njump.me/nevent1qqs27ltgsr6mh4ffpseexz6s37355df3zsur709d0s89u2nugpcygsspzpmhxue69uhkummnw3ezumt0d5hsygzt4r5x6tvh39kujvmu8egqdyvf84e3w4e0mq0ckswamfwcn5eduspsgqqqqqqshzu2fk
InviZible Pro : https://njump.me/nevent1qqsvyevf2vld23a3xrpvarc72ndpcmfvc3lc45jej0j5kcsg36jq53cpz3mhxue69uhhyetvv9ujuerpd46hxtnfdupzqjagapkjm9ufdhynxlp72qrfrzfawvt4wt7cr795rhw6tkyaxt0yqvzqqqqqqy33y5l4
Orbot: https://njump.me/nevent1qqsxswkyt6pe34egxp9w70cy83h40ururj6m9sxjdmfass4cjm4495stft593
I2P
i2p : https://njump.me/nevent1qqsvnj8n983r4knwjmnkfyum242q4c0cnd338l4z8p0m6xsmx89mxkslx0pgg
Entendendo e usando a rede I2P : https://njump.me/nevent1qqsxchp5ycpatjf5s4ag25jkawmw6kkf64vl43vnprxdcwrpnms9qkcppemhxue69uhkummn9ekx7mp0qgsyh28gd5ke0ztdeyehc0jsq6gcj0tnzatjlkql3dqamkja38fjmeqrqsqqqqqpvht4mn
Criando e acessando sua conta Email na I2P : https://njump.me/nevent1qqs9v9dz897kh8e5lfar0dl7ljltf2fpdathsn3dkdsq7wg4ksr8xfgpr4mhxue69uhkummnw3ezucnfw33k76twv4ezuum0vd5kzmp0qgsyh28gd5ke0ztdeyehc0jsq6gcj0tnzatjlkql3dqamkja38fjmeqrqsqqqqqpw8mzum
APLICATIVO 2FA
Aegis Authenticator : https://njump.me/nevent1qqsfttdwcn9equlrmtf9n6wee7lqntppzm03pzdcj4cdnxel3pz44zspz4mhxue69uhhyetvv9ujumn0wd68ytnzvuhsygzt4r5x6tvh39kujvmu8egqdyvf84e3w4e0mq0ckswamfwcn5eduspsgqqqqqqscvtydq
YubiKey : https://njump.me/nevent1qqstsnn69y4sf4330n7039zxm7wza3ch7sn6plhzmd57w6j9jssavtspvemhxue69uhkv6tvw3jhytnwdaehgu3wwa5kuef0dec82c330g6x6dm8ddmxzdne0pnhverevdkxxdm6wqc8v735w3snquejvsuk56pcvuurxaesxd68qdtkv3nrx6m6v3ehsctwvym8q0mzwfhkzerrv9ehg0t5wf6k2q3qfw5wsmfdj7ykmjfn0sl9qp533y7hx96h9lvplz6pmhd9mzwn9hjqxpqqqqqqzueyvgt
GERENCIADOR DE SENHAS
KeepassDX: https://njump.me/nevent1qqswc850dr4ujvxnmpx75jauflf4arc93pqsty5pv8hxdm7lcw8ee8qpr4mhxue69uhkummnw3ezucnfw33k76twv4ezuum0vd5kzmp0qgsyh28gd5ke0ztdeyehc0jsq6gcj0tnzatjlkql3dqamkja38fjmeqrqsqqqqqpe0492n
Birwaden: https://njump.me/nevent1qqs0j5x9guk2v6xumhwqmftmcz736m9nm9wzacqwjarxmh8k4xdyzwgpr4mhxue69uhkummnw3ezucnfw33k76twv4ezuum0vd5kzmp0qgsyh28gd5ke0ztdeyehc0jsq6gcj0tnzatjlkql3dqamkja38fjmeqrqsqqqqqpwfe2kc
KeePassXC: https://njump.me/nevent1qqsgftcrd8eau7tzr2p9lecuaf7z8mx5jl9w2k66ae3lzkw5wqcy5pcl2achp
CHAT MENSAGEM
SimpleXchat : https://njump.me/nevent1qqsds5xselnnu0dyy0j49peuun72snxcgn3u55d2320n37rja9gk8lgzyp9636rd9ktcjmwfxd7ru5qxjxyn6uch2uhas8utg8wa5hvf6vk7gqcyqqqqqqgmcmj7c
Briar : https://njump.me/nevent1qqs8rrtgvjr499hreugetrl7adkhsj2zextyfsukq5aa7wxthrgcqcg05n434
Element Messenger : https://njump.me/nevent1qqsq05snlqtxm5cpzkshlf8n5d5rj9383vjytkvqp5gta37hpuwt4mqyccee6
Pidgin : https://njump.me/nevent1qqsz7kngycyx7meckx53xk8ahk98jkh400usrvykh480xa4ct9zlx2c2ywvx3
E-MAIL
Thunderbird: https://njump.me/nevent1qqspq64gg0nw7t60zsvea5eykgrm43paz845e4jn74muw5qzdvve7uqrkwtjh
ProtonMail : https://njump.me/nevent1qqs908glhk68e7ms8zqtlsqd00wu3prnpt08dwre26hd6e5fhqdw99cppemhxue69uhkummn9ekx7mp0qgsyh28gd5ke0ztdeyehc0jsq6gcj0tnzatjlkql3dqamkja38fjmeqrqsqqqqqpeyhg4z
Tutonota : https://njump.me/nevent1qqswtzh9zjxfey644qy4jsdh9465qcqd2wefx0jxa54gdckxjvkrrmqpz4mhxue69uhhyetvv9ujumt0wd68ytnsw43qygzt4r5x6tvh39kujvmu8egqdyvf84e3w4e0mq0ckswamfwcn5eduspsgqqqqqqs5hzhkv
k-9 mail : https://njump.me/nevent1qqs200g5a603y7utjgjk320r3srurrc4r66nv93mcg0x9umrw52ku5gpr3mhxue69uhkummnw3ezuumhd9ehxtt9de5kwmtp9e3kstczyp9636rd9ktcjmwfxd7ru5qxjxyn6uch2uhas8utg8wa5hvf6vk7gqcyqqqqqqgacflak
E-MAIL-ALIÁS
Simplelogin : https://njump.me/nevent1qqsvhz5pxqpqzr2ptanqyqgsjr50v7u9lc083fvdnglhrv36rnceppcppemhxue69uhkummn9ekx7mp0qgsyh28gd5ke0ztdeyehc0jsq6gcj0tnzatjlkql3dqamkja38fjmeqrqsqqqqqp9gsr7m
AnonAddy : https://njump.me/nevent1qqs9mcth70mkq2z25ws634qfn7vx2mlva3tkllayxergw0s7p8d3ggcpzpmhxue69uhkummnw3ezumt0d5hsygzt4r5x6tvh39kujvmu8egqdyvf84e3w4e0mq0ckswamfwcn5eduspsgqqqqqqs6mawe3
NAVEGADOR
Navegador Tor : https://njump.me/nevent1qqs06qfxy7wzqmk76l5d8vwyg6mvcye864xla5up52fy5sptcdy39lspzemhxue69uhkummnw3ezuerpw3sju6rpw4ej7q3qfw5wsmfdj7ykmjfn0sl9qp533y7hx96h9lvplz6pmhd9mzwn9hjqxpqqqqqqzdp0urw
Mullvap Browser : https://njump.me/nevent1qqs2vsgc3wk09wdspv2mezltgg7nfdg97g0a0m5cmvkvr4nrfxluzfcpzdmhxue69uhhwmm59e6hg7r09ehkuef0qgsyh28gd5ke0ztdeyehc0jsq6gcj0tnzatjlkql3dqamkja38fjmeqrqsqqqqqpj8h6fe
LibreWolf : https://njump.me/nevent1qqswv05mlmkcuvwhe8x3u5f0kgwzug7n2ltm68fr3j06xy9qalxwq2cpzemhxue69uhkummnw3ex2mrfw3jhxtn0wfnj7q3qfw5wsmfdj7ykmjfn0sl9qp533y7hx96h9lvplz6pmhd9mzwn9hjqxpqqqqqqzuv2hxr
Cromite : https://njump.me/nevent1qqs2ut83arlu735xp8jf87w5m3vykl4lv5nwkhldkqwu3l86khzzy4cpz4mhxue69uhhyetvv9ujuerpd46hxtnfduhsygzt4r5x6tvh39kujvmu8egqdyvf84e3w4e0mq0ckswamfwcn5eduspsgqqqqqqs3dplt7
BUSCADORES
Searx : https://njump.me/nevent1qqsxyzpvgzx00n50nrlgctmy497vkm2cm8dd5pdp7fmw6uh8xnxdmaspr4mhxue69uhkummnw3ezucnfw33k76twv4ezuum0vd5kzmp0qgsyh28gd5ke0ztdeyehc0jsq6gcj0tnzatjlkql3dqamkja38fjmeqrqsqqqqqp23z7ax
APP-STORE
Obtainium : https://njump.me/nevent1qqstd8kzc5w3t2v6dgf36z0qrruufzfgnc53rj88zcjgsagj5c5k4rgpz3mhxue69uhhyetvv9ujuerpd46hxtnfdupzqjagapkjm9ufdhynxlp72qrfrzfawvt4wt7cr795rhw6tkyaxt0yqvzqqqqqqyarmca3
F-Droid : https://njump.me/nevent1qqst4kry49cc9g3g8s5gdnpgyk3gjte079jdnv43f0x4e85cjkxzjesymzuu4
Droid-ify : https://njump.me/nevent1qqsrr8yu9luq0gud902erdh8gw2lfunpe93uc2u6g8rh9ep7wt3v4sgpzpmhxue69uhkummnw3ezumt0d5hsygzt4r5x6tvh39kujvmu8egqdyvf84e3w4e0mq0ckswamfwcn5eduspsgqqqqqqsfzu9vk
Aurora Store : https://njump.me/nevent1qqsy69kcaf0zkcg0qnu90mtk46ly3p2jplgpzgk62wzspjqjft4fpjgpvemhxue69uhkv6tvw3jhytnwdaehgu3wwa5kuef0dec82c330g6x6dm8ddmxzdne0pnhverevdkxxdm6wqc8v735w3snquejvsuk56pcvuurxaesxd68qdtkv3nrx6m6v3ehsctwvym8q0mzwfhkzerrv9ehg0t5wf6k2q3qfw5wsmfdj7ykmjfn0sl9qp533y7hx96h9lvplz6pmhd9mzwn9hjqxpqqqqqqzrpmsjy
RSS
Feeder : https://njump.me/nevent1qqsy29aeggpkmrc7t3c7y7ldgda7pszl7c8hh9zux80gjzrfvlhfhwqpp4mhxue69uhkummn9ekx7mqzyp9636rd9ktcjmwfxd7ru5qxjxyn6uch2uhas8utg8wa5hvf6vk7gqcyqqqqqqgsvzzjy
VIDEOO CONFERENCIA
Jitsi meet : https://njump.me/nevent1qqswphw67hr6qmt2fpugcj77jrk7qkfdrszum7vw7n2cu6cx4r6sh4cgkderr
TECLADOS
HeliBoard : https://njump.me/nevent1qqsyqpc4d28rje03dcvshv4xserftahhpeylu2ez2jutdxwds4e8syspz4mhxue69uhhyetvv9ujuerpd46hxtnfduhsygzt4r5x6tvh39kujvmu8egqdyvf84e3w4e0mq0ckswamfwcn5eduspsgqqqqqqsr8mel5
OpenBoard : https://njump.me/nevent1qqsf7zqkup03yysy67y43nj48q53sr6yym38es655fh9fp6nxpl7rqspzpmhxue69uhkumewwd68ytnrwghsygzt4r5x6tvh39kujvmu8egqdyvf84e3w4e0mq0ckswamfwcn5eduspsgqqqqqqswcvh3r
FlorisBoard : https://njump.me/nevent1qqsf7zqkup03yysy67y43nj48q53sr6yym38es655fh9fp6nxpl7rqspzpmhxue69uhkumewwd68ytnrwghsygzt4r5x6tvh39kujvmu8egqdyvf84e3w4e0mq0ckswamfwcn5eduspsgqqqqqqswcvh3r
MAPAS
Osmand : https://njump.me/nevent1qqsxryp2ywj64az7n5p6jq5tn3tx5jv05te48dtmmt3lf94ydtgy4fgpzpmhxue69uhkumewwd68ytnrwghsygzt4r5x6tvh39kujvmu8egqdyvf84e3w4e0mq0ckswamfwcn5eduspsgqqqqqqs54nwpj
Organic maps : https://njump.me/nevent1qqstrecuuzkw0dyusxdq7cuwju0ftskl7anx978s5dyn4pnldrkckzqpr4mhxue69uhkummnw3ezumtp0p5k6ctrd96xzer9dshx7un8qgsyh28gd5ke0ztdeyehc0jsq6gcj0tnzatjlkql3dqamkja38fjmeqrqsqqqqqpl8z3kk
TRADUÇÃO
LibreTranslate : https://njump.me/nevent1qqs953g3rhf0m8jh59204uskzz56em9xdrjkelv4wnkr07huk20442cpvemhxue69uhkv6tvw3jhytnwdaehgu3wwa5kuef0dec82c330g6x6dm8ddmxzdne0pnhverevdkxxdm6wqc8v735w3snquejvsuk56pcvuurxaesxd68qdtkv3nrx6m6v3ehsctwvym8q0mzwfhkzerrv9ehg0t5wf6k2q3qfw5wsmfdj7ykmjfn0sl9qp533y7hx96h9lvplz6pmhd9mzwn9hjqxpqqqqqqzeqsx40
REMOÇÃO DOS METADADOS
Scrambled Exif : https://njump.me/nevent1qqs2658t702xv66p000y4mlhnvadmdxwzzfzcjkjf7kedrclr3ej7aspyfmhxue69uhk6atvw35hqmr90pjhytngw4eh5mmwv4nhjtnhdaexcep0qgsyh28gd5ke0ztdeyehc0jsq6gcj0tnzatjlkql3dqamkja38fjmeqrqsqqqqqpguu0wh
ESTEGANOGRAFIA
PixelKnot: https://njump.me/nevent1qqsrh0yh9mg0lx86t5wcmhh97wm6n4v0radh6sd0554ugn354wqdj8gpz3mhxue69uhhyetvv9ujuerpd46hxtnfdupzqjagapkjm9ufdhynxlp72qrfrzfawvt4wt7cr795rhw6tkyaxt0yqvzqqqqqqyuvfqdp
PERFIL DE TRABALHO
Shelter : https://njump.me/nevent1qqspv9xxkmfp40cxgjuyfsyczndzmpnl83e7gugm7480mp9zhv50wkqpvemhxue69uhkv6tvw3jhytnwdaehgu3wwa5kuef0dec82c330g6x6dm8ddmxzdne0pnhverevdkxxdm6wqc8v735w3snquejvsuk56pcvuurxaesxd68qdtkv3nrx6m6v3ehsctwvym8q0mzwfhkzerrv9ehg0t5wf6k2q3qfw5wsmfdj7ykmjfn0sl9qp533y7hx96h9lvplz6pmhd9mzwn9hjqxpqqqqqqzdnu59c
PDF
MuPDF : https://njump.me/nevent1qqspn5lhe0dteys6npsrntmv2g470st8kh8p7hxxgmymqa95ejvxvfcpzpmhxue69uhkumewwd68ytnrwghsygzt4r5x6tvh39kujvmu8egqdyvf84e3w4e0mq0ckswamfwcn5eduspsgqqqqqqs4hvhvj
Librera Reader : https://njump.me/nevent1qqsg60flpuf00sash48fexvwxkly2j5z9wjvjrzt883t3eqng293f3cpvemhxue69uhkv6tvw3jhytnwdaehgu3wwa5kuef0dec82c330g6x6dm8ddmxzdne0pnhverevdkxxdm6wqc8v735w3snquejvsuk56pcvuurxaesxd68qdtkv3nrx6m6v3ehsctwvym8q0mzwfhkzerrv9ehg0t5wf6k2q3qfw5wsmfdj7ykmjfn0sl9qp533y7hx96h9lvplz6pmhd9mzwn9hjqxpqqqqqqz39tt3n
QR-Code
Binary Eye : https://njump.me/nevent1qqsz4n0uxxx3q5m0r42n9key3hchtwyp73hgh8l958rtmae5u2khgpgpvemhxue69uhkv6tvw3jhytnwdaehgu3wwa5kuef0dec82c330g6x6dm8ddmxzdne0pnhverevdkxxdm6wqc8v735w3snquejvsuk56pcvuurxaesxd68qdtkv3nrx6m6v3ehsctwvym8q0mzwfhkzerrv9ehg0t5wf6k2q3qfw5wsmfdj7ykmjfn0sl9qp533y7hx96h9lvplz6pmhd9mzwn9hjqxpqqqqqqzdmn4wp
Climático
Breezy Weather : https://njump.me/nevent1qqs9hjz5cz0y4am3kj33xn536uq85ydva775eqrml52mtnnpe898rzspzamhxue69uhhyetvv9ujuurjd9kkzmpwdejhgtczyp9636rd9ktcjmwfxd7ru5qxjxyn6uch2uhas8utg8wa5hvf6vk7gqcyqqqqqqgpd3tu8
ENCRYPTS
Cryptomator : https://njump.me/nevent1qqsvchvnw779m20583llgg5nlu6ph5psewetlczfac5vgw83ydmfndspzpmhxue69uhkumewwd68ytnrwghsygzt4r5x6tvh39kujvmu8egqdyvf84e3w4e0mq0ckswamfwcn5eduspsgqqqqqqsx7ppw9
VeraCrypt : https://njump.me/nevent1qqsf6wzedsnrgq6hjk5c4jj66dxnplqwc4ygr46l8z3gfh38q2fdlwgm65ej3
EXTENSÕES
uBlock Origin : https://njump.me/nevent1qqswaa666lcj2c4nhnea8u4agjtu4l8q89xjln0yrngj7ssh72ntwzql8ssdj
Snowflake : https://njump.me/nevent1qqs0ws74zlt8uced3p2vee9td8x7vln2mkacp8szdufvs2ed94ctnwchce008
CLOUD
Nextcloud : https://njump.me/nevent1qqs2utg5z9htegdtrnllreuhypkk2026x8a0xdsmfczg9wdl8rgrcgg9nhgnm
NOTEPAD
Joplin : https://njump.me/nevent1qqsz2a0laecpelsznser3xd0jfa6ch2vpxtkx6vm6qg24e78xttpk0cpr4mhxue69uhkummnw3ezucnfw33k76twv4ezuum0vd5kzmp0qgsyh28gd5ke0ztdeyehc0jsq6gcj0tnzatjlkql3dqamkja38fjmeqrqsqqqqqpdu0hft
Standard Notes : https://njump.me/nevent1qqsv3596kz3qung5v23cjc4cpq7rqxg08y36rmzgcrvw5whtme83y3s7tng6r
MÚSICA
RiMusic : https://njump.me/nevent1qqsv3genqav2tfjllp86ust4umxm8tr2wd9kq8x7vrjq6ssp363mn0gpzamhxue69uhhyetvv9ujuurjd9kkzmpwdejhgtczyp9636rd9ktcjmwfxd7ru5qxjxyn6uch2uhas8utg8wa5hvf6vk7gqcyqqqqqqg42353n
ViMusic : https://njump.me/nevent1qqswx78559l4jsxsrygd8kj32sch4qu57stxq0z6twwl450vp39pdqqpvemhxue69uhkv6tvw3jhytnwdaehgu3wwa5kuef0dec82c330g6x6dm8ddmxzdne0pnhverevdkxxdm6wqc8v735w3snquejvsuk56pcvuurxaesxd68qdtkv3nrx6m6v3ehsctwvym8q0mzwfhkzerrv9ehg0t5wf6k2q3qfw5wsmfdj7ykmjfn0sl9qp533y7hx96h9lvplz6pmhd9mzwn9hjqxpqqqqqqzjg863j
PODCAST
AntennaPod : https://njump.me/nevent1qqsp4nh7k4a6zymfwqqdlxuz8ua6kdhvgeeh3uxf2c9rtp9u3e9ku8qnr8lmy
VISUALIZAR VIDEO
VLC : https://njump.me/nevent1qqs0lz56wtlr2eye4ajs2gzn2r0dscw4y66wezhx0mue6dffth8zugcl9laky
YOUTUBE
NewPipe : https://njump.me/nevent1qqsdg06qpcjdnlvgm4xzqdap0dgjrkjewhmh4j3v4mxdl4rjh8768mgdw9uln
FreeTube : https://njump.me/nevent1qqsz6y6z7ze5gs56s8seaws8v6m6j2zu0pxa955dhq3ythmexak38mcpz4mhxue69uhhyetvv9ujuerpd46hxtnfduhsygzt4r5x6tvh39kujvmu8egqdyvf84e3w4e0mq0ckswamfwcn5eduspsgqqqqqqs5lkjvv
LibreTube : https://snort.social/e/nevent1qqstmd5m6wrdvn4gxf8xyhrwnlyaxmr89c9kjddvnvux6603f84t3fqpz4mhxue69uhhyetvv9ujumt0wd68ytnsw43qygzt4r5x6tvh39kujvmu8egqdyvf84e3w4e0mq0ckswamfwcn5eduspsgqqqqqqsswwznc
COMPARTILHAMENTO DE ARQUIVOS
OnionShare : https://njump.me/nevent1qqsr0a4ml5nu6ud5k9yzyawcd9arznnwkrc27dzzc95q6r50xmdff6qpydmhxue69uhkummnw3ez6an9wf5kv6t9vsh8wetvd3hhyer9wghxuet59uq3uamnwvaz7tmwdaehgu3dv3jhvtnhv4kxcmmjv3jhytnwv46z7qgswaehxw309ahx7tnnw3ezucmj9uq32amnwvaz7tmjv4kxz7fwv3sk6atn9e5k7tcpzamhxue69uhkyarr9e4kcetwv3sh5afwvdhk6tcpzemhxue69uhkummnw3ezucnrdqhxu6twdfsj7qgswaehxw309ahx7um5wghx6mmd9uqjgamnwvaz7tmwdaehgu3wwfhh2mnywfhkx6mzd96xxmmfdejhyuewvdhk6tcppemhxue69uhkummn9ekx7mp0qythwumn8ghj7un9d3shjtnwdaehgu3wvfskuep0qyv8wumn8ghj7un9d3shjtnrw4e8yetwwshxv7tf9ut7qurt
Localsend : https://njump.me/nevent1qqsp8ldjhrxm09cvvcak20hrc0g8qju9f67pw7rxr2y3euyggw9284gpvemhxue69uhkv6tvw3jhytnwdaehgu3wwa5kuef0dec82c330g6x6dm8ddmxzdne0pnhverevdkxxdm6wqc8v735w3snquejvsuk56pcvuurxaesxd68qdtkv3nrx6m6v3ehsctwvym8q0mzwfhkzerrv9ehg0t5wf6k2q3qfw5wsmfdj7ykmjfn0sl9qp533y7hx96h9lvplz6pmhd9mzwn9hjqxpqqqqqqzuyghqr
Wallet Bitcoin
Ashigaru Wallet : https://njump.me/nevent1qqstx9fz8kf24wgl26un8usxwsqjvuec9f8q392llmga75tw0kfarfcpzamhxue69uhhyetvv9ujuurjd9kkzmpwdejhgtczyp9636rd9ktcjmwfxd7ru5qxjxyn6uch2uhas8utg8wa5hvf6vk7gqcyqqqqqqgvfsrqp
Samourai Wallet : https://njump.me/nevent1qqstcvjmz39rmrnrv7t5cl6p3x7pzj6jsspyh4s4vcwd2lugmre04ecpr9mhxue69uhkummnw3ezucn0denkymmwvuhxxmmd9upzqjagapkjm9ufdhynxlp72qrfrzfawvt4wt7cr795rhw6tkyaxt0yqvzqqqqqqy3rg4qs
CÂMERA
opencamera : https://njump.me/nevent1qqs25glp6dh0crrjutxrgdjlnx9gtqpjtrkg29hlf7382aeyjd77jlqpzpmhxue69uhkumewwd68ytnrwghsygzt4r5x6tvh39kujvmu8egqdyvf84e3w4e0mq0ckswamfwcn5eduspsgqqqqqqssxcvgc
OFFICE
Collabora Office : https://njump.me/nevent1qqs8yn4ys6adpmeu3edmf580jhc3wluvlf823cc4ft4h0uqmfzdf99qpz4mhxue69uhhyetvv9ujuerpd46hxtnfduhsygzt4r5x6tvh39kujvmu8egqdyvf84e3w4e0mq0ckswamfwcn5eduspsgqqqqqqsj40uss
TEXTOS
O manifesto de um Cypherpunk : https://njump.me/nevent1qqsd7hdlg6galn5mcuv3pm3ryfjxc4tkyph0cfqqe4du4dr4z8amqyspvemhxue69uhkv6tvw3jhytnwdaehgu3wwa5kuef0dec82c330g6x6dm8ddmxzdne0pnhverevdkxxdm6wqc8v735w3snquejvsuk56pcvuurxaesxd68qdtkv3nrx6m6v3ehsctwvym8q0mzwfhkzerrv9ehg0t5wf6k2q3qfw5wsmfdj7ykmjfn0sl9qp533y7hx96h9lvplz6pmhd9mzwn9hjqxpqqqqqqzal0efa
Operations security ( OPSEC) : https://snort.social/e/nevent1qqsp323havh3y9nxzd4qmm60hw87tm9gjns0mtzg8y309uf9mv85cqcpvemhxue69uhkv6tvw3jhytnwdaehgu3wwa5kuef0dec82c330g6x6dm8ddmxzdne0pnhverevdkxxdm6wqc8v735w3snquejvsuk56pcvuurxaesxd68qdtkv3nrx6m6v3ehsctwvym8q0mzwfhkzerrv9ehg0t5wf6k2q3qfw5wsmfdj7ykmjfn0sl9qp533y7hx96h9lvplz6pmhd9mzwn9hjqxpqqqqqqz8ej9l7
O MANIFESTO CRIPTOANARQUISTA Timothy C. May – 1992. : https://njump.me/nevent1qqspp480wtyx2zhtwpu5gptrl8duv9rvq3mug85mp4d54qzywk3zq9gpvemhxue69uhkv6tvw3jhytnwdaehgu3wwa5kuef0dec82c330g6x6dm8ddmxzdne0pnhverevdkxxdm6wqc8v735w3snquejvsuk56pcvuurxaesxd68qdtkv3nrx6m6v3ehsctwvym8q0mzwfhkzerrv9ehg0t5wf6k2q3qfw5wsmfdj7ykmjfn0sl9qp533y7hx96h9lvplz6pmhd9mzwn9hjqxpqqqqqqz5wq496
Declaração de independência do ciberespaço
- John Perry Barlow - 1996 : https://njump.me/nevent1qqs2njsy44n6p07mhgt2tnragvchasv386nf20ua5wklxqpttf6mzuqpzpmhxue69uhkummnw3ezumt0d5hsygzt4r5x6tvh39kujvmu8egqdyvf84e3w4e0mq0ckswamfwcn5eduspsgqqqqqqsukg4hr
The Cyphernomicon: Criptografia, Dinheiro Digital e o Futuro da Privacidade. escrito por Timothy C. May -Publicado em 1994. :
Livro completo em PDF no Github PrivacyOpenSource.
https://github.com/Alexemidio/PrivacyOpenSource/raw/main/Livros/THE%20CYPHERNOMICON%20.pdf Share