-
@ eb0157af:77ab6c55
2025-05-25 21:01:28Vivek Ramaswamy’s company bets on distressed bitcoin claims as its Bitcoin treasury strategy moves forward.
Strive Enterprises, an asset management firm co-founded by Vivek Ramaswamy, is exploring the acquisition of distressed bitcoin claims, with particular interest in around 75,000 BTC tied to the Mt. Gox bankruptcy estate. This move is part of the company’s broader strategy to build a Bitcoin treasury ahead of its planned merger with Asset Entities.
According to a document filed on May 20 with the Securities and Exchange Commission, Strive has partnered with 117 Castell Advisory Group to “identify and evaluate” distressed Bitcoin claims with confirmed legal judgments. Among these are approximately 75,000 BTC connected to Mt. Gox, with an estimated market value of $8 billion at current prices.
Essentially, Strive aims to acquire rights to bitcoins currently tied up in legal disputes, which can be purchased at a discount by those willing to take on the risk and wait for eventual recovery.
In a post on X, Strive’s CFO, Ben Pham, stated:
“Strive intends to use all available mechanisms, including novel financial strategies not used by other Bitcoin treasury companies, to maximize its exposure to the asset.”
The company also plans to buy cash at a discount by merging with publicly traded companies holding more cash than their stock value, using the excess funds to purchase additional Bitcoin.
Mt. Gox, the exchange that collapsed in 2014, is currently in the process of repaying creditors, with a deadline set for October 31, 2025.
In its SEC filing, Strive declared:
“This strategy is intended to allow Strive the opportunity to purchase Bitcoin exposure at a discount to market price, enhancing Bitcoin per share and supporting its goal of outperforming Bitcoin over the long run.”
At the beginning of May, Strive announced its merger plan with Asset Entities, a deal that would create the first publicly listed asset management firm focused on Bitcoin. The resulting company aims to join the growing number of firms adopting a Bitcoin treasury strategy.
The corporate treasury trend
Strive’s initiative to accumulate bitcoin mirrors that of other companies like Strategy and Japan’s Metaplanet. On May 19, Strategy, led by Michael Saylor, announced the purchase of an additional 7,390 BTC for $764.9 million, raising its total holdings to 576,230 BTC. On the same day, Metaplanet revealed it had acquired another 1,004 BTC, increasing its total to 7,800 BTC.
The post Bitcoin in Strive’s sights: 75,000 BTC from Mt. Gox among its targets appeared first on Atlas21.
-
@ eb0157af:77ab6c55
2025-05-25 21:01:20Banking giants JPMorgan, Bank of America, Citigroup, and Wells Fargo are in talks to develop a unified stablecoin solution.
According to the Wall Street Journal on May 22, some of the largest financial institutions in the United States are exploring the possibility of joining forces to launch a stablecoin.
Subsidiaries of JPMorgan, Bank of America, Citigroup, and Wells Fargo have initiated preliminary discussions for a joint stablecoin issuance, according to sources close to the matter cited by the WSJ. Also at the negotiating table are Early Warning Services, the parent company of the digital payments network Zelle, and the payment network Clearing House.
The talks are reportedly still in the early stages, and any final decision could change depending on regulatory developments and market demand for stablecoins.
Stablecoin regulation
On May 20, the US Senate voted 66 to 32 to advance discussion of the Guiding and Establishing National Innovation for US Stablecoins Act (GENIUS Act), a specific law to regulate stablecoins. The bill outlines a regulatory framework for stablecoin collateralization and mandates compliance with anti-money laundering rules.
David Sacks, White House crypto advisor, expressed optimism about the bill’s bipartisan approval. However, senior Democratic Party officials intend to amend the bill to include a clause preventing former President Donald Trump and other US officials from profiting from stablecoins.
Demand for stablecoins has increased, with total market capitalization rising to $245 billion from $205 billion at the beginning of the year, a 20% increase.
The post Major US banks consider launching a joint stablecoin appeared first on Atlas21.
-
@ 8671a6e5:f88194d1
2025-05-25 20:38:25#### Dit is een reactie op dit artikel Dit is een reactie op dit artikel\ --\ Geachte redactie van De Tijd,
Met teleurstelling las ik uw recente artikel waarin Bitcoin onterecht wordt omschreven als een "hot wallet", en waarin de meldplicht voor de fiscus onnauwkeurig wordt voorgesteld.\ Maar wat vooral schrijnend is (naast het gebrek aan kennis inzake Bitcoin) is de lichte zweem van "onbehagen" die er omheen werd geweven.
Bitcoin is geen hot wallet, maar een gedecentraliseerd netwerk met bewezen digitale schaarste – hard money. Een "hot wallet" is eenvoudig gezegd een internet-verbonden opslagmethode voor bitcoin, zoals een app op een smartphone, terwijl een cold wallet offline private sleutels bewaart. Dit onderscheid is essentieel voor correcte berichtgeving, maar werd helaas onvoldoende uitgelegd aan uw lezers.
Daarnaast schetst het artikel een misleidend beeld van de meldplicht. \ Volgens de Belgische wetgeving moeten Belgische belastingplichtigen buitenlandse rekeningen melden bij het CAP en jaarlijks in hun belastingaangifte. De juridische status van zulke exchange in de EU-"junta" zone, is daarbij van belang. Dat werd in het artikel gewoon onder de mat geveegd zonder enige nuance.\ \ De Belgische fiscus biedt na zestien jaar trouwens nog steeds geen adequate manier om bitcoin bezit correct aan te geven, zoals een veld voor xpub- of zpub-sleutels (mensen die dit correct willen aangeven worden geconfronteerd met een gebrek aan kennis die overal in België op eenzelfde bedroevend laag niveau zit,... hier hebben we al vaker voorbeelden van gezien).\ \ Vertrouwen op zulke instanties om je cold-storage holdings te melden, is vragen om problemen. Toch meldt uw krant dat je dat maar beter WEL doet.\ Er is echter GEEN verplichting om non-custodial wallets aan te tegen. Het gaat hier voor alle duidelijkheid over bitcoin UTXO's waar de houder zelf in het bezit is van de eigen sleutels, ... echte bitcoin dus:)... \ Zulk hard money spontaan melden bij een instantie die daar niet klaar voor is, kan onnodige administratieve lasten opleggen zonder juridische basis en bovendien ook andere problemen veroorzaken. \ Dit advies van De Tijd, lijkt eerder ingegeven door overdreven voorzichtigheid, dan dan door een wettelijke verplichting. Maar vooral moet het een sfeertje scheppen alsof alle bitcoin houders die NIET via een gecapteerde derde partij werken (een exchange of een service) blijkbaar "louche" zijn. \ Dan kunnen we meteen ook iedereen die een waardevol schilderij in de privé woning heeft hangen "louche" noemen, om maar te zwijgen over fake-NGO's en dure wijn collecties niet?
Uw artikel schept naast het etaleren van een gebrek aan kennis inzake bitcoin, bovendien een sfeer van criminalisering, waarbij uw artikel gewag maakt van het oude refrein: “Wie niets te verbergen heeft...” \ Komaan, dit argument is intussen doorzichtig en dient enkel om mensen bang te maken en totalitaire controle als ‘normaal’ te doen aanvaarden. \ Net zoals de wildgroei aan flitspalen en de in oktober uit te rollen CBDC "Digitale Euro", die in essentie een programmeerbare, makkelijk uitschakelbare nep-euro zal zijn (een slechtere vorm van een kermis-jeton).
Het blijft vreemd dat er in De Tijd – net als bij andere mainstream media – zelden of nooit ruimte is voor een kritische stem hierover... het zal niet in de kraam passen.\ Net zoals het niet in de kraam past om de lamentabele BEL20 performantie of de laakbare promotie van rommel-aandelen op TV aan de kaak te stellen, of de huizenmarkt-zwendel eens een welverdiende kritiek te geven. Kritiek of nuances hierover zijn ook ... uit den boze.\ Neen, bij De Tijd gaan we het altijd op veilig spelen, en de paar mensen die de krant nog betalend lezen vooral niet wijzer maken?\ \ Er was nochtans goede hoop op meer en betere berichtgeven over bitcoin. Maar die hoop smelt zienderogen weg.
Het artikel plaatst bitcoin gebruikers impliciet in het kamp van potentiële overtreders, wat bijdraagt aan een negatieve en onterechte criminalisering. \ Dit patroon, ook zichtbaar in media zoals De Morgen en De Standaard, vertroebelt elementaire kennis en benadeelt uw betalende abonnees door hen foutieve en onvolledige informatie te verstrekken over het best presterende activum van het afgelopen decennium – en over de unieke rol van bitcoin als alternatief voor de steeds verder wegsmeltende koopkracht en waarde van fiat-munten van oude staten en unies.
Ik hoop dat u uw verantwoordelijkheid opneemt om abonnees objectief en feitelijk correct te informeren, zodat zij de échte opportunity cost van hun keuzes kunnen inschatten – een kost die, ironisch genoeg, met elk jaarabonnement verder oploopt.
Wie sinds 2015 maandelijks €50 aan bitcoin had gekocht in plaats van een abonnement op De Tijd te nemen, heeft zich alvast niet laten misleiden door uw doemverhalen en onjuiste informatie over dit activum. En het verschil in rendement is, op z’n zachtst gezegd, significant.
Jammer maar helaas, "De Tijd" lijkt anno 2025 nog steeds niet in staat om systematisch correct te berichten over "de" Bitcoin.\ \ Een paar Anonieme Bitcoiners
-
@ 3c559080:a053153e
2025-05-25 20:26:43So firstly you should find an emulator for whatever you want to play on. There are many for desktop and mobile devices. Checkhere for a list of all the available consoles and their various emulators.
Next what game do you want to play? This is the like the homepage for a shit ton of roms.
Some of the more popular roms are there and other various list like Sony Nintendo
After narrowing down your selection you will end up on myrient i assume this is just some dope person hosting all these so if you get some use out of it, think of donating they even take corn, but other shitcoins too (but thats not the focus here)
Once you download the Rom of the game you want, you will get a compressed (zip) folder, unzip it and within it will be the rom, most systems will identify your emulator and use it open the game. If not, launch the emulator and within it should be an option to open a file, open the file in the unzipped folder.
Enjoy So you want to Mod?
So every Mod, is a mod for a specific game [ex. Pokemon Blue, Pokemon FireRed, Super Mario Bros.] so it requires you to get the Rom for that base game, the mod itself, and a tool to patch it.
There is an online tool to easily patch the mod to the ROM. IMPORTANT, this will not change any naming, Id recommend having a folder with the base game roms, and a folder for the mods, and lastly a folder for the newly modded roms. Make sure to name or just save the game in modded roms folder after the patch.
Below are a few resource to find various Pokemon Rom mods(sometimes called hacks)
Personally, Pokemon Unbound is considered the best most polished hack. it runs on Pokemon Fire Red.
Pokemon Emerald Rouge is a cool take on the popular Rougelite genre. This runs on base game Pokemon Emerald
-
@ bf47c19e:c3d2573b
2025-05-25 19:44:15Originalni tekst na graduallythensuddenly.xyz
Autor: Parker Lewis
Bitkoin raste zauvek i kupovina stvari Bitkoinom je savršeno logična. Ove dve tvrdnje nisu suprotstavljene. Ovo je važno zato što mnogo ljudi (možda i većina) misli da je trošenje Bitkoina iracionalno. Zašto oni misle tako? Postoji kombinacija razloga:
- Ukoliko Bitkoin raste, zašto biste ikada želeli da se rastanete od njega? Ako cena raste i vi ga potrošite, ostajete bez budućih "dobitaka".
- Postoje poreske posledice kada kupujete Bitkoinom. Kada kupite nešto za Bitkoin, postoji porez na kapitalnu dobit zato što se to tretira kao da ste ga prodali, iz poreskih razloga (tako da tada plaćate više).
Ništa od ovoga nije racionalni razlog da ne potrošite Bitkoin. Zašto?
-
Prvi zaključak je iracionalan zato što se radi o drugačijoj dilemi od one na koju mislite. Ona se zapravo odnosi na svaku odluku u vezi sa potrošnjom ili štednjom, bez obzira da li trošite Bitkoin ili fiat novac. Na primer, ukoliko trošite fiat, mogli ste da se odreknete te potrošnje i umesto toga uštedite taj iznos u Bitkoinu. Vaša ekonomska računica je posve drugačija kada ste suočeni sa dilemom da li da potrošite novac fiksne količine u odnosu na novac koji konstantno gubi vrednost. Tačno je da se, bez obzira da li se odlučite (ili ne) da potrošite Bitkoin, radi o boljem testu potrošnje od štednje ili trošenja fiata. Ali svi moramo da svakodnevno trošimo novac.
-
Drugi zaključak je iracionalan zato što kapitalni dobitak ostvarujete samo u slučaju kada vaš novac dobije na vrednosti. Drugim rečima, kapitalni dobitak ste ostvarili samo ako vaš novac nije izgubio kupovnu moć. Da, bilo bi bolje kada bi promena politike dovela do ukidanja poreza na kapitalnu dobit na sve Bitkoin transakcije, ali to što plaćate porez na kapitalnu dobit ne znači da je stvar koju kupujete skuplja. Kako je to moguće? Zato što vi sada zapravo imate više novca nego u slučaju da ste izabrali put štednje u fiatu. Skuplje je štedeti u fiatu i trošiti u fiatu. Matematika je ubedljiva, a samim tim i logika.
Osnova rešavanja ove logičke dileme: ako mislite da je trošenje Bitkoina iracionalno, onda verovatno imate previše fiat novca. I pre nego što odemo dalje, volatilnost jeste stvarna. Njome morate upravljati. Ako je vaše razumevanje Bitkoina ograničeno, vaša sposobnost tolerancije prema volatilnosti Bitkoina je neminovno manja od nekoga ko je godinama štedeo u Bitkoinu i ko ima mnogo iskustva u upravljanju volatilnošću (i poseduje veće znanje o Bitkoinu od vas). Tako da ono što ću pokušati da objasnim, iako je 100% logično, ne odnosi se na svakoga zato što svačije znanje o Bitkoinu nije jednako, kao što nije jednaka ni svačija sposobnost da se toleriše volatilnost.
Sada možemo razmotriti nekoliko uporednih primera. Ukoliko imate 99% svoje štednje u fiatu (obliku novca koji gubi na vrednosti zato što se može sa lakoćom štampati) i 1% u Bitkoinu (obliku novca ograničene količine koji se ne može štampati), jeste veoma logično da štedite u Bitkoinu i trošite vaš fiat novac. Imate mnogo više fiata nego što imate Bitkoina. Ali ako imate 99% štednje u Bitkoinu i samo 1% u fiatu, bićete voljni da trošite Bitkoin. Pošto ste štedeli svoj novac u Bitkoinu koji čuva vrednost tokom vremena, nalazite se u boljoj poziciji od osobe koja je štedela u fiat novcu.
Hajmo da odemo u još veću krajnost da bismo izveli logičan zaključak, pre svega u vezi sa dve lažne ekonomske dileme. Pretpostavimo da imate 100% vaše štednje u Bitkoinu i 0 % u fiatu. Vi po definiciji morate da trošite tako da ste prinuđeni da trošite Bitkoin. Morate ga trošiti, bilo da kupujete proizvode i usluge direktno za Bitkoin, bilo da prodajete Bitkoin za fiat kojim ćete onda kupovati proizvode i usluge. Prva dilema je poništena. Ne radi se o tome da li treba da trošite Bitkoin. Radi se o tome da li uopšte treba da trošite (npr. da li je ono na šta trošite novac dobra potrošačka odluka).
Svi imamo i potrebe I želje. I jedno i drugo je validno. Život je kratak. Nikada ne trošiti novac je visoka vremenska preferencija. Ali nisu sve potrošačke odluke dobre odluke. U nekim slučajevima bi trebalo da štedite. Ali u oba slučaja, ako se radi o dobroj potrošačkoj odluci (o čemu samo vi odlučujete), dilema u vezi sa budućim rastom cene Bitkoina je poništena. Na primer, gotovo celokupna moja štednja je u Bitkoinu. Bila mi je neophodna popravka menjača na automobilu. Oko toga nije postojala dilema. Morao sam da popravim menjač i, s obzirom na to koliko malo fiat novca držim, bio sam prinuđen da potrošim Bitkoin. Nije mi bilo bitno da li će Bitkoin "rasti" u budućnosti. Bio mi je potreban moj automobil. U ovom konkretnom slučaju, prodao sam Bitkoin za fiat novac, zatim potrošio fiat, pa sam nabavio novi menjač kako ne bih morao svuda da pešačim.
Ovo nas sada vraća na drugu lažnu ekonomsku dilemu broj 2: kapitalne dobitke. Ukoliko pratite logiku, posledica kapitalnog dobitka je istovremeno i stvarna i nevažeća za dilemu rastanka sa Bitkoinom. Da bih ovo pokazao, zapravo ću proći kroz ekonomsku matematiku. Ovde dolazi do izražaja onaj zaključak da imate previše fiat novca ukoliko mislite da je trošenje Bitkoina iracionalno. Scenario A: tokom vremena štedite više u fiat novu i trošite fiat. Scenario B: tokom vremena štedite u Bitkoinu i trošite Bitkoin. Ovaj primer pretpostavlja ekstremne slučajeve da bi se naglasio ekonomski argument. 100% ušteđevine u fiatu naspram 100% ušteđevine u Bitkoinu:
Ekonomija štednje i trošenja u fiat novcu naspram štednje i trošenja u Bitkoinu
Tako da ono što ste smatrali dilemom o trošenju Bitkoina je zapravo dilema o štednji fiat novca. Štednja i potrošnja su suštinski povezane i, bez obzira na krajnosti (ili alokaciju), ekonomske posledice (izbora štednje u novcu koja gubi na vrednosti naspram štednje u novcu koji čuva kupovnu moć) se ne menjaju. U praktičnijem primeru, cene proizvoda i usluga "rastu" od sadašnjosti prema budućnosti kada su izražene u fiat valuti (fiat inflacija) tako da vam je potreban novac koji čuva kupovnu moć da biste se odbranili od obezvređivanja fiat novca. Ali štaviše, vaša dilema o trošenju je zapravo dilema o štednji i u stvarnom svetu ste ostvarili kapitalni dobitak koji treba da platite samo ako je vaša fiat štednja izgubila na vrednosti.
Sada mnogi od vas možda misle, "zašto jednostavno ne založite Bitkoin i pozajmite dolare koje ćete trošiti". Ovde se radi o potpuno drugačijoj ekonomskoj računici koja ne menja ništa u vezi sa matematikom ili ekonomskom logikom trošenja Bitkoina. To je samo dodavanje još jednog sloja na vrh. Da li možete potencijalno finansijski osmisliti bolji ishod preuzimanjem leveridža i duga i tako zakomplikovati svoj život? Možda. Ali to ne menja I) dilemu o potrošnji naspram štednje, II) posledice budućeg rasta Bitkoina (zato što ste mogli i da kupite Bitkoin sa leveridžom), ili III) posledice kapitalnog dobitka (koje su samo vremenski pomerene iz sadašnjosti u budućnost).
Suština je da je ekonomski pogled da je trošenje Bitkoina iracionalno - matematički nedosledan. Zapravo se radi o dilemi o štednji i vi jednostavno držite previše fiat novca. Ovde postoje i drugi logični razlozi za trošenje Bitkoina koje ću izložiti ali ih neću detaljnije objašnjavati (to ću učiniti u budućem članku).
- Ako niko ne troši Bitkoin, neće postojati ni alati za trošenje Bitkoina i kada fiat novac propadne, svima će biti potrebni ti alati zato što će Bitkoin biti jedina valuta koja funkcioniše.
- Ukoliko neki biznis želi da bude isplaćen u Bitkoinu, kupac poseduje Bitkoin za trošenje, trošenje fiat novca donosi nepotreban transakcioni trošak što dovodi do ekonomske neefikasnosti (veći trošak bez benefita)
Efikasnost Bitkoin transakcije između korisnika
- Ako cenite neki biznis (tj. proizvode i usluge koje vam omogućava) i želite da taj biznis opstane (da bi vam i dalje isporučivao proizvode i usluge), ako taj biznis želi da bude isplaćivan u Bitkoinu i ako vi razumete Bitkoin - u vašem je interesu da trošite Bitkoin zato što znate da će i taj biznis napredovati ako to učinite, a to omogućava i vaš napredak jer cenite proizvode i usluge tog biznisa.
Zaključak je da je trošenje Bitkoina lažna dilema. To je zapravo dilema o štednji. Matematika to i dokazuje. Ako se držite ove iracionalne pozicije (koja je iracionalna samo ako razumete Bitkoin zato što je volatilnost stvarna), onda verovatno imate previše fiat novca. Ipak, moram da naglasim da ovo nije molba da potrošite svoj Bitkoin. Ne postoji moralni imperativ za trošenje Bitkoina. Svaki Bitkoin (i satoši) je dragocen. Kada god trošite (ili investirate), potrudite se da trošite mudro jer je to ono što je zaista važno.
Do sledećeg puta. Srdačan pozdrav, Parker
-
@ c9badfea:610f861a
2025-05-25 19:40:48- Install Currencies (it's free and open source)
- Launch the app, tap ⋮ and select Settings
- Enable the Foreign Transaction Fee to factor in conversion fees if necessary
- Tap Data Provider and choose another provider if necessary
- Enjoy ad-free conversion rates
ℹ️ Tap 📈 to open the exchange rate chart
-
@ 28ca019b:93fcb2cc
2025-05-25 19:25:17Introduction
“There is nothing more powerful than an idea whose time has come.” -Victor Hugo
Early 1950’s America. Harry S. Truman is in office. The economy is booming and the middle class are comfortable. Shiny new television sets invite the first scenes of Hollywood into people’s homes. The Weavers, Tony Bennett, Vera Lynn and Perry Como play on the radio.
But on the fringes, in dance halls and late night clubs, a cultural revolution is brewing… A new musical fusion with influences from blues, R\&B, jazz, rockabilly, country and gospel music is about to give birth to not only a new genre, but a whole new way of life that will change society and culture, forever.
Rock & Roll
It becomes a symbol of freedom, a means of expression, and a catalyst for social change. It brings into existence a new type of counter-culture, filled with individuals who are driven to rebel against norms and authority. They don’t ask for permission. They push for change.
I believe we are witnessing such a shift now. And like rock & roll, the movement I’m speaking of is also ground up, grass roots, punk rock and will not look to authority to seek permission. The catalyst for this new social change, I believe, is Bitcoin. With its innate properties, it empowers and enables the individual like never before to achieve their fullest potential, expressed through an unprecedented freedom technology. It is an idea, like a song everyone can sing in their own way, that nobody can silence.
Revolution
"You say you got a real solution / Well you know / we’d all love to see the plan" -John Lennon
The rock & roll era helped bring about meaningful societal change through art, music, and film. It created a new social narrative. Today, the Bitcoin network is providing people with a different set of tools and ideas to build a better future in a much more practical and pragmatic way. Instead of trying to reshape social consensus and cultural norms through art forms, fashion, or lifestyle, bitcoin is achieving this through open source code.
For the first time, this technology gives individuals financial sovereignty and personal control over their own destiny, with the ability to self custody their own money that no corporation, government, dictator or king can tamper with. The individual has an opportunity to finally be freed from economic tyranny. And societies have the potential to avoid endless wars funded with printed government money. John Lennon said ‘give peace a chance’. If he were still here today and understood how bitcoin could subvert the military industrial complex would he not exclaim, ‘give bitcoin a chance’?
Natural Rights, Civil Rights, Digital Rights
"The times they are a-Changin’" -Bob Dylan
The civil rights movement was tightly interwoven with the history of rock & roll. The march on Washington, August 28th 1963, marked a seminal moment in American history for the advancement of equal rights before the law. Bob Dylan, along with Joan Baez, stood with over two hundred thousand other Americans and listened to Martin Luther King’s now immortal speech.
People with the same values peacefully gathered in numbers to make a statement powerful enough to change the conversation. This is analogous to the same freedom-minded people today gathering in cyberspace and voting not in the traditional sense, but voting with their money – peacefully exiting and transferring their economic energy into a system where they can’t be expropriated.
The question of whether individual rights are granted or have to be secured by each individual remains a contested area of philosophy to this day. To outline each in a very crude and simplistic way, natural rights (sometimes referred to as inalienable rights) are derived from the belief that every person owns their own body, therefore their own labor, time, and energy. Civil rights, on the other hand, are granted by the state and are therefore not universal. The fact that they are rights granted to humans by other humans means they always have the potential to be revoked or withdrawn.
Digital rights granted by the power of asymmetric cryptography are based in the laws of mathematics. Combined with proof of work, based in the law of thermodynamics, this makes digital rights that bitcoin provides more akin to natural rights than civil rights, as no one person or group can unilaterally revoke those rights or confiscate your property through violence. No amount of fire power, tanks, fighter jets or nuclear weapons can break a bitcoin private key or rewrite the sunken cost of proof of work embedded into bitcoin’s timechain. This idea of securing rights without asking permission is, in itself, a revolution and achievable now in an egalitarian way. This implies a potentially huge shift in power from those with a monopoly on violence, to peaceful individuals who want to be treated fairly and with dignity.
Cypher Punk-Rock
Songwriters write songs. Cypherpunks write code.
To tie things back and look at a very narrow, but potentially huge use case of bitcoin, let’s examine the current broken incentives of the music industry, particularly recorded music. It is becoming increasingly apparent that an option other than a subscription model could find demand from content consumers and producers alike.
There is now a way, with Bitcoin and Lightning Network, for a music fan to pay artists directly and for any amount – dollars, cents or even fractions of cents. This model has positive outcomes for the music producer and fan who are the main two parties engaged in the transaction. The artist keeps all of what is sent and the listener can pay what they want. The listener can pay as they listen, rather than be locked into a rolling subscription that isn’t based on usage. This concept, called ‘value for value’, is finding its way into new music platforms such as Wavlake and Fountain. I believe this model will become the de-facto way of monetizing digital content in the coming years. This could bring an economic signal back to music that has been lost and cannot be achieved by streams alone. This will hopefully create a more meritocratic music system and shake up the entrenched streaming monoliths.
Art can shine a light on a certain truth. It can also make people look at things in a completely new way. Maybe then, Satoshi was the greatest artist who ever lived. Bitcoin smashed the conventional wisdom and theories of the most basic and prevalent thing everyone takes for granted: money. Using money as a lens to view the world can lead to distortions in your perception if the lens is warped. Removing the glasses makes you reevaluate economics, politics, religion, philosophy, morality, beauty, and almost every other aspect of life. The beauty of the Sistine Chapel, the Egyptian pyramids, the Mona Lisa, Beethoven’s 5th Symphony, Bohemian Rhapsody all intrinsically imply a certain degree of proof of work. The art, you could say, speaks for itself.
The Long and Winding Road Ahead
As a musician, I have found a new hope. The value for value movement gives me that hope. If this is truly a superior model of music distribution and consumption it will win out over time on the market.
Another point to touch on would be the possibility of this technology ushering in an artistic renaissance. I can honestly say my favorite music, the songs that have moved me the most, normally comes from a place of truth, honesty and sheer talent. Maybe I’m out of touch, but I feel popular music of late is devoid of soul, meaning and the biggest mainstream artists want to conform to the man (giant corporations/governments) instead of stick it to the man! Probably because there is nowhere else to turn now that streaming and social media platforms own their speech and art. We need to investigate and embrace new ways to own our speech and art, to make art interesting again. The powers that be, need to let it be, and leave alone individuals who wish to use this technology for their own interests if they do so in a peaceful way.
I want to leave you with a Frank Zappa quote that seems more relevant than ever:
“I’d say that today, dishonesty is the rule, and honesty the exception. It could be, statistically, that more people are honest than dishonest, but the few that really control things are not honest, and that tips the balance…”
My charitable view is that the majority of people in power aren’t corrupt, it’s rather just a case of ‘no one is better than their incentives’. But when incentives are misaligned bad outcomes will inevitably result. With bitcoin and its incorruptible incentive structure, we have a chance to peacefully opt-out of a rigged game. I urge you to not trust, but verify with your own research that bitcoin is the answer to many of society’s current problems.
I think it’s fair to say, we all need to question ourselves and authority a little more than we’re comfortable doing, to hold truth as an ideal worth striving for, and live a little more rock & roll!
Link to original article**
-
@ 58537364:705b4b85
2025-05-25 16:31:56People often only realize the value of something in two situations: First, before they have it. Second, after they’ve lost it.
This is a tragedy that happens to many. People may have good things in their lives, but they don’t see their worth— because they’re always looking outward, focusing on what they don’t have, wishing for something else.
It’s similar to Aesop’s fable about the dog and the piece of meat. We probably remember it from childhood: A dog had a big piece of meat in its mouth. Delighted, it ran to a quiet place where it could enjoy the meat in peace.
At one point, it had to cross a bridge. Looking down into the stream below, it saw its reflection— but mistook it for another dog with an even bigger piece of meat. It wanted that bigger piece badly, so it opened its mouth to snatch it— and the meat in its own mouth fell into the water. The reflection disappeared too.
In the end, it lost both.
So, if we learn to value what we already have, happiness comes easily. It might not be possessions or people— it might simply be our health.
It could be as simple as our breath, the ability to breathe normally, to walk around freely, to see, to hear.
Many people already have these things but don’t recognize their value. They don’t feel lucky. Instead, they focus on what they still lack— no house, no car, no money— and feel miserable.
They ask, “Why is life so hard for me?” Even though they have so many good things already— health, normalcy, freedom of movement— they fail to see it, because their minds are lost in chasing what they don’t yet have, which belongs to the future.
If we turn back and learn to value what we already possess, and stop obsessing over what we don’t, we can find happiness more easily.
This is one of the meanings of “Doing your best in the present.”
…
Doing Your Best in the Present by Phra Paisal Visalo
-
@ 9223d2fa:b57e3de7
2025-05-25 16:09:512,143 steps
-
@ 58537364:705b4b85
2025-05-25 15:38:04พระอาจารย์ไพศาล วิสาโล วัดป่าสุคะโต แสดงธรรมเย็นวันที่ 28 กันยายน 2565
ที่ประเทศจีนเมื่อสัก 100 - 200 ปีก่อน ชายคนหนึ่งตาบอด แต่ก็สามารถใช้ชีวิตได้ตามปกติ วันหนึ่งก็เดินไปเยี่ยมเพื่อน ซึ่งอยู่ในเมืองเดียวกัน แต่ก็เดินไกลสักหน่อย แล้วชายตาบอดคนนี้ก็เดินได้โดยที่ไม่ต้องใช้ไม้เท้า ถึงบ้านเพื่อนก็สนทนากับเพื่อนหลายเรื่องหลายราว คุยกันถูกคอ จนกระทั่งค่ำ ก็ได้เวลาที่ชายตาบอดจะกลับบ้าน แต่ก่อนที่แกจะเดินออกจากบ้าน เพื่อนก็ยื่นโคมให้ โคมนี่เป็นคนที่จุดไฟให้แสงสว่างในเวลากลางคืน
ชายตาบอดก็บอกว่าฉันไม่ต้องใช้โคมหรอก เดินได้โดยที่ไม่เห็นอะไร ไม่ต้องใช้แสงสว่างก็เดินได้ ทางเส้นนี้ฉันก็คุ้นแล้ว เพื่อนก็บอกว่าที่ให้โคมนี่ ก็เพื่อเวลาคุณเดินกลับบ้านตามตรอกซอกซอย มันจะได้ให้แสงสว่าง คนที่เขาเดินสวนคุณมา เขาเห็นทาง เขาก็จะได้ไม่เดินชนคุณไงล่ะ เหตุผลนี้ก็ทำให้ชายตาบอดถือโคมกลับบ้าน ทั้งๆ ที่ตัวเองไม่จำเป็นต้องใช้โคมนั้นเลย
ระหว่างที่เดินกลับบ้านก็มีคนหลายคนเดินสวน เพราะมันเป็นตรอกซอกซอยที่มีคนเดินผ่านไปผ่านมาอยู่ แต่ว่าพอเดินมาพักหนึ่ง ปรากฏว่ามีผู้ชายคนหนึ่งเดินชนชายตาบอดอย่างแรงเลย จนล้มเลย ชายตาบอดก็โกรธมาก ก็พูดขึ้นมาว่าแกตาบอดหรือไง แกไม่เห็นหรือโคมที่ฉันถือนี่ ชายคนที่เดินชนชายตาบอดก็บอกว่าขอโทษครับ ขอโทษจริงๆ แต่โคมที่พี่จุดนี่มันดับไปนานแล้วนะ เรื่องก็จบเท่านี้นะ ฟังแล้วเราได้แง่คิดอะไรไหม
เรื่องนี้อาจจะเป็นนิทานนะ แต่มันไม่ใช่นิทานประเภทว่าสอน บอกเราในตอนท้ายว่านิทานเรื่องนี้สอนอะไร แต่ว่ามันจบลงโดยให้เราคิดเอง ฟังเรื่องนี้แล้วเราได้แง่คิดอะไร
แง่คิดอย่างหนึ่งก็คือว่าในการดำเนินชีวิตของคนเรา เราควรจะคิดถึงคนอื่นด้วย ของบางอย่างเราไม่จำเป็น แต่ว่ามันมีประโยชน์กับคนอื่น ถ้าเรานึกถึงคนอื่น มันก็ไม่ใช่ประโยชน์กับคนอื่นอย่างเดียว มันเป็นประโยชน์กับเราด้วย อย่างชายตาบอด เขาไม่จำเป็นต้องใช้โคมเลย ในการเดินกลับบ้านยามค่ำคืน แต่เพื่อนคะยั้นคะยอให้ถือโคมเพื่ออะไร ก็เพื่อประโยชน์ของคนอื่นที่เขาตาดี แล้วเขาต้องใช้แสงสว่างในการเดินสัญจร
การที่ชายตาบอดถือโคม ไม่ได้เพื่อประโยชน์ของตัวเอง แต่เพื่อประโยชน์ของคนอื่น แต่สุดท้ายมันก็เป็นประโยชน์กับตัวเอง เพราะถ้าหากว่าคนที่เขาเดินสวนมา เขาเห็นชายตาบอดถือโคม เขาก็ไม่เดินชน ฉะนั้นทีแรกชายตาบอดก็เดินได้สะดวกสบาย ไม่มีใครชน ก็เพราะว่าคนอื่นเขาเห็นแสงสว่างจากโคมนั้น
อันนี้เขาสอนว่าคนเราควรจะนึกถึงผู้อื่น ของบางอย่างแม้เราไม่จำเป็น แต่ว่ามันเป็นประโยชน์กับผู้อื่นก็ควรทำ หรือบางอย่างอาจจะไม่สะดวกกับเรา แต่ว่ามันช่วยคนอื่นได้ อย่างเช่นการถือโคม มันคงไม่สะดวกสบายเท่ากับเดินตัวเปล่า แต่ว่าเมื่อเดินถือโคมแล้ว มันก็เป็นประโยชน์กับคนที่เดินสวนมาด้วย แต่สุดท้ายมันก็กลับมาเป็นประโยชน์กับชายตาบอดนั่นเอง อย่างที่พูดไปแล้ว ไม่มีใครมาเดินชน
ในชีวิตของคนเรา เราควรจะคิดถึงคนอื่น ฉะนั้นการที่สังคมหรือบ้านเมืองมันน่าอยู่ ก็เพราะผู้คนไม่ได้คิดถึงแต่ตัวเองอย่างเดียว การกระทำบางอย่าง เราทำเพื่อประโยชน์ของส่วนรวม เพื่อผู้อื่น ยกตัวอย่างง่ายๆ เวลาเรากินอะไร มันมีขยะอยู่ในมือ จะเป็นถุงพลาสติก จะเป็นนมกล่อง หรือจะเป็นขวด ขวดน้ำที่กลายเป็นขยะเรียบร้อยแล้ว ทำไมเราควรจะถือขยะนั้นไว้กับตัว จนกว่าจะเห็นถังขยะจึงหย่อนลงถังขยะ
ที่จริงถ้าเรานึกถึงแต่ตัวเอง เราก็แค่โยนมันทิ้งขยะนั้นข้างทาง สบายดีนะ หลายคนก็ทำอย่างนั้น คนเราถ้าคิดถึงแต่ตัวเอง เราไม่เก็บมันไว้กับตัว แล้วก็รอจนกว่าจะเดินเห็นถังขยะ แต่คนจำนวนมากเขาก็เก็บขยะเอาไว้ เพื่อที่จะไปทิ้งลงในถังขยะ
อันนี้เพราะอะไร เพราะนึกถึงผู้อื่น นึกถึงคนที่เก็บขยะบ้าง หรือนึกถึงสังคมส่วนรวม ว่าถ้าเราทิ้งขยะไม่เป็นที่ มันก็จะเลอะเทอะ ไม่น่าดู บางคนก็คิดถึงพนักงานเก็บขยะ หรือคิดถึงพนักงานทำความสะอาด ก็เลยช่วยเขาด้วยการทิ้งขยะเป็นที่ ทั้งที่ถ้าทิ้งข้างทาง กินเสร็จ ดื่มน้ำเสร็จ ดูดนมกล่องเสร็จ ทิ้งไปเลยนี่มันสบายกว่า แต่เป็นเพราะเราคิดถึงคนอื่น เราจึงเอาไปทิ้งเป็นที่
หรือการปิดไฟ บางทีเราก็เห็นไฟเปิดอยู่ที่ห้องน้ำ หรือที่ห้องที่โล่ง เราก็อุตส่าห์เดินไป แทนที่เราจะกลับบ้านเลย เราก็เดินไปที่ห้องน้ำเพื่อที่จะปิดสวิตช์ไฟ เรายอมเสียเวลาเพื่ออะไร ก็เพื่อส่วนรวม หรืออาจจะเป็นเพราะว่าเราอยากจะช่วยพนักงานที่เขาดูแลสถานที่นั้น ไม่ต้องเหนื่อยกับการวิ่งการเดินตามปิดไฟ ที่วัดเราเป็นระเบียบ ก็เพราะผู้คนจำนวนมากคิดถึงผู้อื่นด้วย ไม่ได้คิดถึงแต่ตัวเอง และสุดท้ายมันก็เป็นประโยชน์กับตัวเรา เพราะว่าพอสถานที่มันสะอาดหมดจด มันก็สบายหูสบายตา น่าอยู่
แต่ว่านิทานเรื่องนี้เขาสอนมากกว่านั้น ในการดำเนินชีวิตประจำวัน เราควรจะคิดถึงผู้อื่น มองไปที่ประโยชน์ของคนอื่นก่อนตัวเอง แต่เวลามีปัญหาขึ้นมา ก่อนที่จะไปโทษคนอื่น ต้องกลับมามองที่ตัวเองก่อน ไม่เหมือนกันนะ ยามปกติเรามองไปที่คนอื่นก่อน นึกถึงประโยชน์ของคนอื่นก่อน ประโยชน์ของตัวเองเอาไว้ทีหลัง แต่ว่าเวลามีปัญหา เราควรมองที่ตัวเองก่อนที่จะไปโทษคนอื่น
อย่างชายตาบอดนี่ พอมีคนมาชน แกก็ว่าชายคนนั้นเลยทีเดียว ว่าตาบอดหรือไง มาชนเขา แต่เขาไม่รู้ว่าที่เขาถูกชน เป็นเพราะว่าโคมของเขามันดับไปแล้ว ชายคนนั้นก็เลยมองไม่เห็น แต่ชายตาบอดจะรู้ได้อย่างไร ว่าโคมของตัวเองนี่ดับไปแล้ว อันนี้เหมือนกับสอนเป็นนัยว่าคนที่โทษคนอื่น แทนที่จะมองมาที่ตัวเอง จะว่าไปก็เหมือนกับคนตาบอด คือมองไม่เห็นความบกพร่อง ความผิดพลาดของตัวเอง อันนี้ก็รวมถึงคนตาดีด้วยนะ คนตาดีถ้าเกิดปัญหาขึ้นมาแล้ว ไปโทษคนอื่น แต่มองไม่เห็นความบกพร่อง ความผิดพลาดของตัวเอง ก็ไม่ต่างจากคนตาบอดเหมือนกัน
อันนี้ก็เป็นข้อคิดที่ดีมากเลย ในยามปกติเราควรนึกถึงผู้อื่น มองไปที่คนอื่นก่อน แต่เวลามีปัญหาควรจะกลับมามองที่ตัวเอง ก่อนที่จะไปโทษคนอื่น อันนี้จะเรียกว่าเป็นวิสัยของนักปฏิบัติธรรมก็ได้ จะเรียกว่าเป็นวิสัยของผู้ใฝ่ธรรม ซึ่งต่างจากวิสัยของชาวโลกทั่วๆ ไป ชาวโลกทั่วไปเขามองตัวเองก่อน เขามองถึงประโยชน์ตัวเองก่อน คิดถึงตัวเองก่อน ส่วนคนอื่น ประโยชน์ของคนอื่นเอาไว้ทีหลัง แต่เวลามีปัญหาขึ้นมา ก็โทษคนอื่นก่อนเลย แทนที่จะกลับมามองที่ตัวเอง
บ่อยครั้งเวลางานมีปัญหา เราจะเห็นคนก็จะไปโทษคนโน้นคนนี้ ว่าเป็นเหตุทำให้งานมีปัญหา ทำให้งานตัวเองมีปัญหา เจ้านายไม่ดี เพื่อนร่วมงานไม่ได้เรื่อง บางทีก็โทษดินฟ้าอากาศ แต่ว่าสิ่งที่ไม่ได้มองคือความผิดพลาดของตัวเอง เวลานัดเพื่อน เพื่อนไม่มาตามนัดตามเวลา ก็โกรธเพื่อน พอเจอเพื่อนก็ไปด่าเพื่อนเลย ว่าทำไมนัด 4 โมงเย็น ทำไมไม่มา อุตส่าห์รอ
เพื่อนบอกอ้าวจะไปรู้เหรอ นึกว่านัด 4 โมงเช้า ผมก็อุตส่าห์ไปรอตั้งแต่ 4 โมงเช้า คือ 10 โมง ปรากฏว่าคนนัดบอกเวลาไม่ละเอียด แทนที่จะบอก 4 โมงเย็น ก็ไปพูดว่า 4 โมง เพื่อนก็เลยนึกว่า 4 โมงเช้า เป็นความผิดพลาดของคนนัดแท้ๆ แต่ว่าก็ไปด่าเพื่อนเสียแล้ว ตัวเองพูดไม่ละเอียด ก็ไปโทษเพื่อน ว่าเพื่อนไม่รับผิดชอบ เพื่อนไม่เอาใจใส่
อันนี้เรียกว่าไปโทษคนอื่นก่อนที่จะมามองที่ตัวเอง ถ้าจะให้ดีก็ควรจะถามเขาก่อนว่าทำไมถึงไม่มาตามนัด พอรู้คำอธิบายของเพื่อน ก็อาจจะพบว่าเป็นเพราะเราผิดเองนะ เราพูดไม่รัดกุมเพียงพอ ที่จริงมันไม่ใช่เฉพาะเวลามีความผิดพลาด หรือเวลามีปัญหาในงานการ เวลามีความทุกข์ก็เหมือนกัน เวลามีความทุกข์ก่อนที่จะไปโทษใคร ต้องกลับมามองที่ตัวเองก่อน แต่คนส่วนใหญ่เวลามีความทุกข์ ไปโทษข้างนอก ไปโทษเสียงดังจากข้างนอก ไปโทษการกระทำของคนนั้นคนนี้ แต่ลืมหรือไม่ได้กลับมามองที่ตัวเอง ว่าเป็นที่เราหรือเปล่า
เวลามีความทุกข์ใจ สาเหตุหลักๆ มันล้วนแล้วแต่อยู่ที่ตัวเองทั้งนั้นแหละ ไม่ได้อยู่ที่คนอื่น ทุกข์กายอาจจะเป็นเพราะของแหลมมาแทง อาจจะเป็นเพราะเชื้อโรค เพราะอาหารเป็นพิษ หรือเพราะมีคนมาทำร้าย แต่ถ้าทุกข์ใจแล้วนี่ มันน่าจะเกิดจากตัวเอง หรือใจของตัวเองเป็นหลักเลยทีเดียว
เมื่อสัก 40 กว่าปีก่อน หลวงพ่อชาท่านได้รับนิมนต์ให้มาแสดงธรรมที่ประเทศอังกฤษ ตอนนั้นท่านก็มากับลูกศิษย์ที่เป็นพระฝรั่ง เช่นหลวงพ่อสุเมโธ ซึ่งตอนนั้นยังไม่ได้สร้างวัดอมราวดีที่อังกฤษ เจ้าภาพก็ให้หลวงพ่อชากับลูกศิษย์พักที่วิหารกลางกรุงลอนดอน ย่านนั้นมีสถานบันเทิง เช่น ผับ บาร์ กลางคืนก็จะมีเสียงดนตรี
สมัยนั้นดิสโก้ก็เริ่มเป็นที่นิยมแล้ว เพราะฉะนั้นเสียงดังก็จะกระหึ่มเลยตอนกลางคืน มาถึงวิหารแฮมสเตทที่หลวงพ่อชาและลูกศิษย์พัก ซึ่งก็พอดีเป็นช่วงที่ท่านพาคนนั่งสมาธิ พระและโยมหลายคนนั่งสมาธิไม่เป็นสุขเลย เพราะเสียงดนตรีมันดัง
แต่หลวงพ่อชาท่านนั่งสมาธิอย่างสงบ เหมือนกับไม่ได้ยินอะไรเลย จนกระทั่งนั่งสมาธิเสร็จ ก็มีโยมซึ่งเป็นฝรั่ง เป็นเจ้าภาพ ก็มาหาท่านแล้วก็บอกขอโทษ ที่เสียดนตรีรบกวนการนั่งสมาธิ หลวงพ่อชาท่านฟังแล้วก็ยิ้ม แล้วท่านก็พูดว่าโยมอย่าไปคิดว่าเสียงดนตรีรบกวนเรา ที่จริงเราต่างหากที่ไปรบกวนเสียงดนตรี
บางคนฟังแล้วก็งงนะ แต่ที่จริงที่ท่านพูดนี่มันเป็นสัจธรรมเลยนะ ที่คนมีความทุกข์ หงุดหงิด เมื่อเสียงมากระทบหู มันไม่ใช่เพราะเสียง แต่เป็นเพราะใจมันไปทะเลาะกับเสียงนั้น ใจมันไปต่อสู้ ไปทะเลาะเบาะแว้งกับเสียงนั้น มันไปผลักไสเสียงนั้น ถ้าเพียงแต่ยอมรับเสียงนั้น มันก็ไม่หงุดหงิด แต่พอใจมันทะเลาะกับเสียง เพราะว่ามีความรู้สึกเป็นลบต่อเสียงนั้น ว่าเป็นเสียงดัง เสียงรบกวน พอใจรู้สึกเป็นลบ มันหงุดหงิดขึ้นมาเลย ความหงุดหงิดจนนั่งสมาธิไม่เป็นสุข เป็นเพราะใจของคนฟัง ที่วางใจไม่ถูกต้องต่อเสียง ถ้าหากว่าเพียงแต่รู้สึกเป็นกลางๆ มันก็ไม่ทุกข์
มีนักปฏิบัติธรรมคนหนึ่ง แกก็มาปฏิบัติอยู่ที่สำนักหรือวัดแห่งหนึ่ง ก็ค้างคืนอยู่ประมาณ 2-3 คืน คืนแรกเลย พักเสร็จตื่นเช้าขึ้นมา เจ้าอาวาสก็ถามว่า เป็นยังไง หลับดีไหม ชายคนนั้นก็บอกว่าหลับไม่ค่อยดี โดยเฉพาะช่วงแรกๆ เพราะว่าเสียงห่านมันดัง
เสียงห่านมันดัง ตอนกลางคืนนอนไม่ค่อยหลับเลยช่วงแรก แต่ว่านึกขึ้นมาได้ว่าตัวเองพกโทรศัพท์มือถือมา แล้วในโทรศัพท์มือถือก็มีการอัดเทปคำบรรยายธรรมะของครูบาอาจารย์หลายท่าน ก็เลยเอาหูฟังใส่ไว้ในหู แล้วก็ฟัง เปิดเทปธรรมะ เปิดคำบรรยายของครูบาอาจารย์ จนกระทั่งหลับได้ กระทั่งเช้าก็เป็นอันว่าได้พัก ได้หลับดีหน่อยช่วงครึ่งหลัง
สิ่งที่น่าสนใจคือว่า ระหว่างเสียงห่านกับเสียงบรรยาย อะไรดังกว่ากัน ชายคนนั้นบอกว่าหลับไม่ได้ เพราะว่าเสียงห่านมันดัง แต่เสียงบรรยายที่ฟังมันไม่ดังหรือ ที่จริงมันดังกว่าเสียงห่าน เพราะว่าเอาหูฟังใส่เข้าไปในรูหู อย่างไรมันดังกว่าเสียงห่านอยู่แล้วล่ะ แต่ทำไมหลับ ก็เพราะใจมันยอมรับเสียงบรรยายธรรมะ หรือว่ารู้สึกดีกับเสียงนั้น ขณะที่เสียงห่านนี่ ใจมองว่าเป็นเสียงรบกวน การที่ใจไปตีค่าว่าเสียงห่านเป็นเสียงรบกวน ก็ทำให้เกิดอาการต่อสู้ผลักไสกับเสียงนั้น
เหมือนอย่างที่หลวงพ่อชาท่านว่าไปทะเลาะกับเสียง ส่วนเสียงบรรยายธรรมะที่ฟังทางโทรศัพท์มือถือ ใจมันยอมรับ ใจมันรู้สึกเป็นบวก เลยไม่รู้สึกว่าดัง ทั้งที่ถ้าพูดถึงเดซิเบลแล้ว มันดังกว่าเสียงห่านอยู่แล้วแต่ก็เป็นอันหลับได้ ฉะนั้นที่หลับไม่ได้ ไม่ใช่เพราะเสียงดัง ไม่ใช่เพราะเสียงห่าน แต่เพราะใจมันไปทะเลาะกับเสียงห่าน ในขณะที่เสียงบรรยายใจไม่ได้ทะเลาะ ใจไปเคลิ้มคล้อยกับเสียงบรรยายธรรมเลยหลับ
นี่เป็นตัวอย่างง่ายๆ ในชีวิตของคนเรา เวลามีความทุกข์ ทุกข์ใจ เรามักโทษข้างนอก โทษเสียงดนตรี โทษเสียงห่าน โทษคนนั้นคนนี้ แต่นั่นเป็นเพราะเราไม่ได้กลับมาดูใจของเรา ไม่ได้กลับมาสังเกตปฎิกริยาของใจเรา ฉะนั้นถ้าเรากลับมาสังเกต ก็จะพบว่ามันเป็นเพราะใจของเราต่างหาก ที่เป็นตัวการทำให้เกิดทุกข์
ฉะนั้นถ้าเกิดว่าเรามีทุกข์ หรือมีปัญหาขึ้นมาในใจ แล้วเราไปมองออกนอกตัว ไม่กลับมามองที่ตัว ก็ไม่ต่างจากชายตาบอด ที่ไปต่อว่าคนที่มาชนตัวเอง ทั้งที่โคมที่ตัวเองถือ ไฟมันดับไปนานแล้ว แต่มองไม่เห็น วิถีธรรมกับวิถีโลกมันต่างกัน วิถีโลก มีปัญหาอะไรก็โทษคนอื่น แต่เวลาสบายก็คิดถึงแต่ตัวเอง ส่วนวิถีธรรม เวลาสบายๆ เวลาปกติก็นึกถึงคนอื่น แต่เวลามีปัญหาก็กลับมองที่ตัวเองก่อน
แล้วที่จริงถ้าเราดู มันสะท้อนให้เห็นว่า วิถีโลกเขาเน้นในเรื่องการเปลี่ยนแปลง จัดการกับภายนอก แต่ว่าวิถีธรรมหรือวิถีของผู้ใฝ่ธรรม จะเน้นที่การเปลี่ยนแปลงที่ตัวเอง โดยเฉพาะการปรับเปลี่ยนใจของตัว เวลามีความทุกข์ก็ลองปรับเปลี่ยนใจ
เหมือนมีผู้ชายคนหนึ่งที่เขานั่งสมาธิทุกเช้าเป็นประจำ แล้วเขาก็นั่งได้ดีด้วย แต่วันหนึ่งปรากฏว่าพอนั่งไปได้สักครู่หนึ่ง ก็มีเสียงค้อนดัง ทีแรกก็เสียงค้อน ตอนหลังก็เสียงเลื่อยยนต์ เพราะมีการก่อสร้างใกล้ๆ ตอนที่เสียงค้อน เสียงเลื่อยยนต์มากระทบหู ใจนี่ก็กระเพื่อมเลย แต่เขามีสติเห็น สติรู้ทัน พอมีสติรู้ทัน ใจก็สงบ แต่พอเผลอ ใจก็กระเพื่อม ทุกครั้งที่เสียงเลื่อยยนต์ดังกระทบหู แล้วมันก็สงบลงพอมีสติรู้ทัน เป็นอย่างนี้พักหนึ่ง
เขาก็เลยลองไปพิจารณาที่เสียงเลื่อยยนต์ พอพิจารณาไปก็สังเกตว่าบางครั้งมันก็กระชากกระชั้น บางครั้งมันก็ลากยาว บางครั้งเสียงสูง บางครั้งเสียงต่ำ บางครั้งเสียงดัง บางครั้งเสียงเบา ดูๆไปแล้วมันเหมือนกับเสียงเพลงเลยนะ เพลงประเภท heavy metal พอทันทีที่มองว่ามันเป็นเสียงเพลง ใจก็สงบเลย สงบประเภทที่ว่าเพลินเลย
ที่จริงเพลินก็ไม่ดี แต่เขาก็อดฉุกคิดไม่ได้ เอ๊ะ เมื่อกี้ใจยังกระเพื่อมขึ้นกระเพื่อมลง แถมมีความหงุดหงิดด้วย ตอนนี้ทำไมใจมันสงบ มีบางช่วงเสียงเลื่อยยนต์มันหายไป เขาอยากให้เสียงมันดังกลับมาใหม่ เขาก็เลยแปลกใจ ทีแรกเราอยากให้เสียงมันดับไปหายไป แต่ทำไมตอนนี้อยากให้เสียงมันดังใหม่ เสียงมันก็ยังดังเหมือนเดิม แต่ทำไมความรู้สึกเปลี่ยนไป
ที่ความรู้สึกเปลี่ยนไปเพราะอะไร เพราะว่าไม่ได้มองว่ามันเป็นเสียงดังอีกต่อไป แต่มองว่ามันเป็นเสียงเพลง พอมองว่าเป็นเสียงเพลง ความรู้สึกมันเป็นความรู้สึกในทางบวก ใจก็สงบเลย อันนี้มันก็ชี้ให้เห็นว่าความสงบมันอยู่ที่ใจ มากกว่าอยู่ที่สิ่งภายนอก และที่หงุดหงิด ที่ไม่สงบ มันไม่ใช่เพราะสิ่งภายนอก แต่เป็นเพราะใจ ใจรู้สึกลบกับเสียง มันก็กระเพื่อม มันก็หงุดหงิด ไม่สงบ ไม่เป็นสุข แต่พอใจรู้สึกเป็นบวก ความรู้สึกก็เปลี่ยนเป็นตรงกันข้าม
ฉะนั้นแทนที่จะไปตะโกนโวกเวกว่าให้หยุดส่งเสียง ให้เลิกตอกตะปู ให้เลิกใช้เลื่อยยนต์ มันจะดีกว่าหรือเปล่า ถ้ากลับมาดูที่ใจของเรา กลับมาสังเกตที่ใจของเรา หรือกลับมาปรับใจของเรา ใจของเรานี่อาจจะเป็นปัญหา
อันนี้คล้ายๆ กับเมื่อ 2-3 วันก่อน มีพระรูปหนึ่งเล่าให้ฟัง ได้ยินเสียงตอนเช้าๆ ที่วัด ตอนสายๆ วันกรรมกร มันมีเสียงเครื่องยนต์ดัง ตอนนั้นก็คิดว่าเป็นเสียงมอเตอร์ไซค์ ทันทีที่คิดว่าเป็นเสียงมอเตอร์ไซค์ ไม่พอใจขึ้นมาทันทีเลย มันมาขี่มอเตอร์ไซค์อะไรกันตรงนี้ ในวัด
แต่สักประเดี๋ยวเดียวฉุกขึ้นมาว่าเอ๊ะ มันอาจจะไม่ใช่เสียงมอเตอร์ไซค์ก็ได้ อาจจะเป็นเสียงเลื่อย เลื่อยที่เขากำลังตัดไม้ที่โค่น เพราะว่าก่อนหน้านั้นมีไม้โค่น ทันทีที่นึกว่าเป็นเสียงเลื่อย ที่ใช้ตัดไม้ที่ล้มลง ใจมันสงบเลย กลับอนุโมทนาด้วย เขามาช่วยกันทำงาน เสียงก็เสียงเดิม แต่ทำไมทีแรกหงุดหงิด เพราะไปคิดว่าเสียงมอเตอร์ไซค์ และคิดต่อไปว่ามันมาขี่อะไรแถวนี้ ในวัด แต่พอมองว่าเป็นเสียงเลื่อยที่ใช้เลื่อยไม้ที่ล้ม ความรู้สึกมันเปลี่ยนไป เพราะเกิดความรู้สึกว่าเขากำลังทำหน้าที่ของเขา
ฉะนั้นสุขหรือทุกข์อยู่ที่ใจแท้ๆ เลย หงุดหงิดหรือว่าสงบ อยู่ที่ใจ ไม่ใช่อยู่ที่เสียง อยู่ที่ว่าเราจะมองมันอย่างไร ฉะนั้นถ้าเราเข้าใจตรงนี้ สังเกตใจของเรา เราจะพบว่าจะไปแก้ทุกข์ก็ต้องแก้ที่ใจนั่นแหละ ไม่ต้องไปแก้ที่คนอื่น เป็นเพราะใจเราวางไว้ผิด มันจึงทุกข์ มันจึงเกิดความหงุดหงิด เกิดความรำคาญ แต่พอเราปรับใจ เปลี่ยนมุมมอง ความรู้สึกก็เปลี่ยนไป
zen sukato บันทึกเสียง Nun & oi ถอดเสียง nok edit
-
@ cae03c48:2a7d6671
2025-05-25 15:00:49Bitcoin Magazine
Nigel Farage To Speak At Bitcoin 2025 ConferenceWe are pleased to announce that Nigel Farage will join the speaker lineup at the Bitcoin Conference 2025 in Las Vegas. A defining figure in modern European politics, Farage led the Brexit movement that took the United Kingdom out of the EU, reshaping global conversations around national sovereignty. He is the founder and current leader of Reform UK, a rising political force now polling competitively, positioning him as a serious contender for to be the next UK Prime Minister.
A former Member of the European Parliament for over 20 years, Farage built his reputation challenging supranational institutions and unelected power—values that resonate deeply with the Bitcoin community. He also hosts GB News, where he critiques monetary policy, CBDCs, and digital surveillance. An outspoken advocate for financial sovereignty and free speech, Farage previously appeared at Bitcoin Amsterdam 2023 in a conversation with Peter McCormack. In 2025, he returns for a fireside with Bitcoin Magazine’s Frank Corva, whose sharp political interviews are helping shape Bitcoin’s place in global affairs.
About Bitcoin 2025
The excitement is building as the world’s largest Bitcoin conference approaches, Bitcoin 2025. Set to take place in Las Vegas from May 27-29, this premier event is anticipated to draw Bitcoin enthusiasts, industry leaders, and innovators from all over the globe.
Be part of the revolution! Come experience the cultural movement that’s the Bitcoin Conference – a landmark event with wealth of opportunities for networking and learning. In 2025, Bitcoin takes over Las Vegas, uniting builders, leaders, and believers in the world’s most resilient monetary network.
New in 2025: Code & Country launches on Industry Day, bringing together policymakers, technologists, and industry leaders for a full day of focused collaboration.
The aim: strengthen Bitcoin’s role in national strategy, regulatory clarity, and technological sovereignty. This marks a new era where Bitcoin’s protocol and geopolitical potential intersect more directly than ever before.
Highlights Include
- Keynote Speakers: Renowned experts and visionaries will share their insights and predictions for the future of digital currency.
- Workshops and Panels: Attendees can participate in hands-on workshops and panel discussions covering a wide array of topics, from technical details to practical applications in various industries.
- Exhibition Hall: The exhibition will showcase art, cutting-edge products and services from top companies in the bitcoin ecosystem.
- Networking Opportunities: With thousands of attendees expected, Bitcoin 2025 offers unparalleled opportunities for networking with peers, potential partners, and thought leaders.
Keynote Speakers
The conference is set to feature an impressive lineup of speakers, including leading Bitcoin developers, experts, as well as influential figures from the financial sector. Topics range from the latest advancements to regulatory updates and investment strategies.
- JD Vance, Vice President Vance will become the first sitting vice president in the history of the United States to publicly voice his support for Bitcoin as he addresses the audience in Las Vegas.
- Ross Ulbricht, Freedom Advocate – Founder of the Silk Road marketplace, recently released by President Donald Trump from serving a double life sentence. His story has become emblematic of the clash between personal liberty, Bitcoin, and the state.
- Eric Trump & Donald Trump Jr, Both figures bring a bold voice to the conversation around Capitalism, Bitcoin, freedom, and economic sovereignty.
- Cameron & Tyler Winklevoss, Co-Founders of Gemini – Early Bitcoin adopters and founders of the regulated exchange Gemini.
- David Sacks, White House AI & Crypto Czar – Former PayPal COO and venture capitalist, now serving as the White House’s senior advisor on AI and cryptocurrency policy, leading national efforts on stablecoin legislation and digital asset strategy.
- Bryan Johnson, Founder of Project Blueprint – Tech entrepreneur and longevity researcher known for reversing his biological age and challenging fiat-era assumptions about health, time, and human potential.
Past Conferences in the USA
– 2021 Miami: Where President Nayib Bukele revealed plans for El Salvador to adopt Bitcoin as legal tender, making history live on stage. Attendance: 11,000
– 2022 Miami: Where Michael Saylor delivered a landmark address on corporate Bitcoin strategy and announced additional MicroStrategy purchases. Attendance: 26,000
– 2023 Miami: Where Secretary Robert F. Kennedy Jr. became the first U.S. presidential candidate to speak at a Bitcoin conference, addressing financial freedom and civil liberties. Attendance: 15,000
– 2024 Nashville: Highlights include President Donald J. Trump’s appearance, where he voiced support for Bitcoin mining and national monetary sovereignty. Attendance: 22,000Join Us in Las Vegas
- Date: May 27-29, 2025
- Venue: The Venetian, Las Vegas, NV, USA
- Tickets: https://b.tc/conference/2025
- Get a free General Admission ticket when you deposit $200 on eToro – while supplies last!
This post Nigel Farage To Speak At Bitcoin 2025 Conference first appeared on Bitcoin Magazine and is written by Conor Mulcahy.
-
@ 26769dac:498e333b
2025-05-25 12:51:09Here's to the ones who can\ Feel there cause\ Surrender\ Change their ways\ But keep their fire\ And never give up
We will transform this world\ Restructuring\ One belief at a time
-
@ 26769dac:498e333b
2025-05-25 12:24:47Here's to the ones who can\ Feel there cause\ Surrender\ Change their ways\ But keep their fire\ And never give up
We will transform this world\ Restructuring\ One belief at a time
-
@ 3283ef81:0a531a33
2025-05-25 12:14:51Aliquam eu turpis sed enim ultricies scelerisque\ Duis posuere congue faucibus
Praesent pretium orci ante, et faucibus lectus euismod a
-
@ b099870e:f3ba8f5d
2025-05-25 11:29:20Let me point out to you that freedom is not something that anybody can be given; freedom is something people take and people are as free as they want to be.
James Baldwin
-
@ 91117f2b:111207d6
2025-05-25 11:09:49The lack of job opportunities is a real issue affecting millions of people worldwide. Underemployment and unemployment has been affecting individuals and communities in general.
CAUSES OF JOB SCARCITY
-
TECHNOLOGY ADVANCEMENTS: artifical intelligence Ai has taken over the job opportunities in the world today, making some jobs unavailable.
-
ECONOMIC PROBLEMS: the of lack of money can lead to reduced hiring and open jobs.
3.SKILL MISMATCH: the lack of experience and skill can make it hard for job seekers to get a job.
CONSEQUENCES OF LACK OF JOBS
1.SKILL DEGRADATION: prolonged scarcity of jobs can result in skill degradation and increase in unemployment.
-
FINANCIAL HARDSHIP:the lack of job opportunities can lead to stress, financial difficulties and many more terrible things.
-
SOCIAL ISOLATION: joblessness can cause or lead to decreased self esteem and social isolation.
SOLUTIONS
1.ENTREPRENEURSHIP :by encouraging entrepreneurship and also supporting start- ups can help lead to a new job opportunities.
2.JOB CREATION: the government organizations should implement programs and policies to stimulate job creation.
-
SOCIAL SUPPORT:by creating social support and resources can help individuals to cope with unemployment and help employability.
-
UPSKILLING AND RESKILLING:the government and people should invest in educational aspect and training programs to help job seekers get a relevant job.
IN CONCLUSION lack of job opportunities is an issue requiring attention in every aspect approach. By understanding the causes and consequences we can work towards creating more jobs in the society and support those who are unemployed.
-
-
@ 21335073:a244b1ad
2025-05-21 16:58:36The other day, I had the privilege of sitting down with one of my favorite living artists. Our conversation was so captivating that I felt compelled to share it. I’m leaving his name out for privacy.
Since our last meeting, I’d watched a documentary about his life, one he’d helped create. I told him how much I admired his openness in it. There’s something strange about knowing intimate details of someone’s life when they know so little about yours—it’s almost like I knew him too well for the kind of relationship we have.
He paused, then said quietly, with a shy grin, that watching the documentary made him realize how “odd and eccentric” he is. I laughed and told him he’s probably the sanest person I know. Because he’s lived fully, chasing love, passion, and purpose with hardly any regrets. He’s truly lived.
Today, I turn 44, and I’ll admit I’m a bit eccentric myself. I think I came into the world this way. I’ve made mistakes along the way, but I carry few regrets. Every misstep taught me something. And as I age, I’m not interested in blending in with the world—I’ll probably just lean further into my own brand of “weird.” I want to live life to the brim. The older I get, the more I see that the “normal” folks often seem less grounded than the eccentric artists who dare to live boldly. Life’s too short to just exist, actually live.
I’m not saying to be strange just for the sake of it. But I’ve seen what the crowd celebrates, and I’m not impressed. Forge your own path, even if it feels lonely or unpopular at times.
It’s easy to scroll through the news and feel discouraged. But actually, this is one of the most incredible times to be alive! I wake up every day grateful to be here, now. The future is bursting with possibility—I can feel it.
So, to my fellow weirdos on nostr: stay bold. Keep dreaming, keep pushing, no matter what’s trending. Stay wild enough to believe in a free internet for all. Freedom is radical—hold it tight. Live with the soul of an artist and the grit of a fighter. Thanks for inspiring me and so many others to keep hoping. Thank you all for making the last year of my life so special.
-
@ c1e9ab3a:9cb56b43
2025-05-18 04:14:48Abstract
This document proposes a novel architecture that decouples the peer-to-peer (P2P) communication layer from the Bitcoin protocol and replaces or augments it with the Nostr protocol. The goal is to improve censorship resistance, performance, modularity, and maintainability by migrating transaction propagation and block distribution to the Nostr relay network.
Introduction
Bitcoin’s current architecture relies heavily on its P2P network to propagate transactions and blocks. While robust, it has limitations in terms of flexibility, scalability, and censorship resistance in certain environments. Nostr, a decentralized event-publishing protocol, offers a multi-star topology and a censorship-resistant infrastructure for message relay.
This proposal outlines how Bitcoin communication could be ported to Nostr while maintaining consensus and verification through standard Bitcoin clients.
Motivation
- Enhanced Censorship Resistance: Nostr’s architecture enables better relay redundancy and obfuscation of transaction origin.
- Simplified Lightweight Nodes: Removing the full P2P stack allows for lightweight nodes that only verify blockchain data and communicate over Nostr.
- Architectural Modularity: Clean separation between validation and communication enables easier auditing, upgrades, and parallel innovation.
- Faster Propagation: Nostr’s multi-star network may provide faster propagation of transactions and blocks compared to the mesh-like Bitcoin P2P network.
Architecture Overview
Components
-
Bitcoin Minimal Node (BMN):
- Verifies blockchain and block validity.
- Maintains UTXO set and handles mempool logic.
- Connects to Nostr relays instead of P2P Bitcoin peers.
-
Bridge Node:
- Bridges Bitcoin P2P traffic to and from Nostr relays.
- Posts new transactions and blocks to Nostr.
- Downloads mempool content and block headers from Nostr.
-
Nostr Relays:
- Accept Bitcoin-specific event kinds (transactions and blocks).
- Store mempool entries and block messages.
- Optionally broadcast fee estimation summaries and tipsets.
Event Format
Proposed reserved Nostr
kind
numbers for Bitcoin content (NIP/BIP TBD):| Nostr Kind | Purpose | |------------|------------------------| | 210000 | Bitcoin Transaction | | 210001 | Bitcoin Block Header | | 210002 | Bitcoin Block | | 210003 | Mempool Fee Estimates | | 210004 | Filter/UTXO summary |
Transaction Lifecycle
- Wallet creates a Bitcoin transaction.
- Wallet sends it to a set of configured Nostr relays.
- Relays accept and cache the transaction (based on fee policies).
- Mining nodes or bridge nodes fetch mempool contents from Nostr.
- Once mined, a block is submitted over Nostr.
- Nodes confirm inclusion and update their UTXO set.
Security Considerations
- Sybil Resistance: Consensus remains based on proof-of-work. The communication path (Nostr) is not involved in consensus.
- Relay Discoverability: Optionally bootstrap via DNS, Bitcoin P2P, or signed relay lists.
- Spam Protection: Relay-side policy, rate limiting, proof-of-work challenges, or Lightning payments.
- Block Authenticity: Nodes must verify all received blocks and reject invalid chains.
Compatibility and Migration
- Fully compatible with current Bitcoin consensus rules.
- Bridge nodes preserve interoperability with legacy full nodes.
- Nodes can run in hybrid mode, fetching from both P2P and Nostr.
Future Work
- Integration with watch-only wallets and SPV clients using verified headers via Nostr.
- Use of Nostr’s social graph for partial trust assumptions and relay reputation.
- Dynamic relay discovery using Nostr itself (relay list events).
Conclusion
This proposal lays out a new architecture for Bitcoin communication using Nostr to replace or augment the P2P network. This improves decentralization, censorship resistance, modularity, and speed, while preserving consensus integrity. It encourages innovation by enabling smaller, purpose-built Bitcoin nodes and offloading networking complexity.
This document may become both a Bitcoin Improvement Proposal (BIP-XXX) and a Nostr Improvement Proposal (NIP-XXX). Event kind range reserved: 210000–219999.
-
@ 51bbb15e:b77a2290
2025-05-21 00:24:36Yeah, I’m sure everything in the file is legit. 👍 Let’s review the guard witness testimony…Oh wait, they weren’t at their posts despite 24/7 survellience instructions after another Epstein “suicide” attempt two weeks earlier. Well, at least the video of the suicide is in the file? Oh wait, a techical glitch. Damn those coincidences!
At this point, the Trump administration has zero credibility with me on anything related to the Epstein case and his clients. I still suspect the administration is using the Epstein files as leverage to keep a lot of RINOs in line, whereas they’d be sabotaging his agenda at every turn otherwise. However, I just don’t believe in ends-justify-the-means thinking. It’s led almost all of DC to toss out every bit of the values they might once have had.
-
@ c9badfea:610f861a
2025-05-20 19:49:20- Install Sky Map (it's free and open source)
- Launch the app and tap Accept, then tap OK
- When asked to access the device's location, tap While Using The App
- Tap somewhere on the screen to activate the menu, then tap ⁝ and select Settings
- Disable Send Usage Statistics
- Return to the main screen and enjoy stargazing!
ℹ️ Use the 🔍 icon in the upper toolbar to search for a specific celestial body, or tap the 👁️ icon to activate night mode
-
@ 04c915da:3dfbecc9
2025-05-20 15:53:48This piece is the first in a series that will focus on things I think are a priority if your focus is similar to mine: building a strong family and safeguarding their future.
Choosing the ideal place to raise a family is one of the most significant decisions you will ever make. For simplicity sake I will break down my thought process into key factors: strong property rights, the ability to grow your own food, access to fresh water, the freedom to own and train with guns, and a dependable community.
A Jurisdiction with Strong Property Rights
Strong property rights are essential and allow you to build on a solid foundation that is less likely to break underneath you. Regions with a history of limited government and clear legal protections for landowners are ideal. Personally I think the US is the single best option globally, but within the US there is a wide difference between which state you choose. Choose carefully and thoughtfully, think long term. Obviously if you are not American this is not a realistic option for you, there are other solid options available especially if your family has mobility. I understand many do not have this capability to easily move, consider that your first priority, making movement and jurisdiction choice possible in the first place.
Abundant Access to Fresh Water
Water is life. I cannot overstate the importance of living somewhere with reliable, clean, and abundant freshwater. Some regions face water scarcity or heavy regulations on usage, so prioritizing a place where water is plentiful and your rights to it are protected is critical. Ideally you should have well access so you are not tied to municipal water supplies. In times of crisis or chaos well water cannot be easily shutoff or disrupted. If you live in an area that is drought prone, you are one drought away from societal chaos. Not enough people appreciate this simple fact.
Grow Your Own Food
A location with fertile soil, a favorable climate, and enough space for a small homestead or at the very least a garden is key. In stable times, a small homestead provides good food and important education for your family. In times of chaos your family being able to grow and raise healthy food provides a level of self sufficiency that many others will lack. Look for areas with minimal restrictions, good weather, and a culture that supports local farming.
Guns
The ability to defend your family is fundamental. A location where you can legally and easily own guns is a must. Look for places with a strong gun culture and a political history of protecting those rights. Owning one or two guns is not enough and without proper training they will be a liability rather than a benefit. Get comfortable and proficient. Never stop improving your skills. If the time comes that you must use a gun to defend your family, the skills must be instinct. Practice. Practice. Practice.
A Strong Community You Can Depend On
No one thrives alone. A ride or die community that rallies together in tough times is invaluable. Seek out a place where people know their neighbors, share similar values, and are quick to lend a hand. Lead by example and become a good neighbor, people will naturally respond in kind. Small towns are ideal, if possible, but living outside of a major city can be a solid balance in terms of work opportunities and family security.
Let me know if you found this helpful. My plan is to break down how I think about these five key subjects in future posts.
-
@ 866e0139:6a9334e5
2025-05-25 11:03:13Autor: Alexa Rodrian. Dieser Beitrag wurde mit dem Pareto-Client geschrieben. Sie finden alle Texte der Friedenstaube und weitere Texte zum Thema Frieden hier. Die neuesten Pareto-Artikel finden Sie in unserem Telegram-Kanal.
Die neuesten Artikel der Friedenstaube gibt es jetzt auch im eigenen Friedenstaube-Telegram-Kanal.
„Triff niemals deine Idole“ heißt ein gängiger Ratschlag. In gewendeten Zeiten stehen zu dem die Werte auf dem Kopf – und manche Künstler mit ihnen. Die Worte, die aus manch ihrer Mündern kommen, wirken, als hätte eine fremde Hand sie auf deren Zunge gelegt.
Die Sängerin Alexa Rodrian erlebte bei der Verleihung des Deutschen Filmpreises einen solchen Moment der Desillusion. Es war der Auftritt des Liedermachers Wolf Biermann. Hören Sie hierzu Alexa Rodrians Text „Wolf Biermann und sein falscher Friede“.
https://soundcloud.com/radiomuenchen/wolf-biermann-und-sein-falscher-friede-von-alexa-rodrian
Dieser Beitrag erschien zuerst auf Radio München.
LASSEN SIE DER FRIEDENSTAUBE FLÜGEL WACHSEN!
Hier können Sie die Friedenstaube abonnieren und bekommen die Artikel zugesandt.
Schon jetzt können Sie uns unterstützen:
- Für 50 CHF/EURO bekommen Sie ein Jahresabo der Friedenstaube.
- Für 120 CHF/EURO bekommen Sie ein Jahresabo und ein T-Shirt/Hoodie mit der Friedenstaube.
- Für 500 CHF/EURO werden Sie Förderer und bekommen ein lebenslanges Abo sowie ein T-Shirt/Hoodie mit der Friedenstaube.
- Ab 1000 CHF werden Sie Genossenschafter der Friedenstaube mit Stimmrecht (und bekommen lebenslanges Abo, T-Shirt/Hoodie).
Für Einzahlungen in CHF (Betreff: Friedenstaube):
Für Einzahlungen in Euro:
Milosz Matuschek
IBAN DE 53710520500000814137
BYLADEM1TST
Sparkasse Traunstein-Trostberg
Betreff: Friedenstaube
Wenn Sie auf anderem Wege beitragen wollen, schreiben Sie die Friedenstaube an: friedenstaube@pareto.space
Sie sind noch nicht auf Nostr and wollen die volle Erfahrung machen (liken, kommentieren etc.)? Zappen können Sie den Autor auch ohne Nostr-Profil! Erstellen Sie sich einen Account auf Start. Weitere Onboarding-Leitfäden gibt es im Pareto-Wiki.
-
@ 9ca447d2:fbf5a36d
2025-05-25 11:01:10Ukraine is reportedly about to make history by becoming the first country in Europe to have a national bitcoin reserve, a move aimed at strengthening its economy during the war with Russia.
The plan is still in its early stages and Binance, the world’s largest digital asset exchange, is involved.
According to Incrypted, a Ukrainian digital asset news outlet, Ukrainian MP Yaroslav Zheleznyak, First Deputy Chairman of the Finance, Tax and Customs Policy Committee, confirmed that the draft law is almost ready and will be submitted to the parliament soon.
“We will soon submit a draft law from the industry allowing the creation of crypto reserves,” Zheleznyak told Incrypted.
Earlier discussions mentioned a broader “crypto reserve” but the current plan is focused on bitcoin as a strategic reserve asset. If approved, the law will allow the National Bank of Ukraine to hold bitcoin as part of the country’s official reserves.
Since the war with Russia started, Ukraine has become one of the most bitcoin-friendly countries in the world.
In 2022 and 2023 Ukraine raised over $100 million in digital asset donations for defense and humanitarian purposes. A report from Chainalysis ranked the country among the top 10 countries for bitcoin adoption globally.
A rather vague and unconfirmed report by BitcoinTreasuries.net states that “holdings of public officials” currently stand at 46,351 BTC.
Ukraine bitcoin holdings as reported by BitcoinTreasuries
Supporters of the bitcoin reserve say it will help Ukraine protect its economy from war-related instability, inflation and currency depreciation.
By going digital, the government is looking for modern tools to strengthen its financial system in uncertain times. This is not just about storing bitcoin, it’s about establishing clear laws for digital assets ownership, management and use.
Binance is playing an advisory role in the project. The company has worked with Ukraine on digital asset education and regulations in the past and is now helping to shape the legal framework for the bitcoin reserve.
Kirill Khomyakov, Binance’s regional head for Central and Eastern Europe, Central Asia and Africa, confirmed the company’s support, but warned it won’t be fast or easy.
“The creation of such a reserve will require significant changes in legislation,” Khomyakov said. “Another positive aspect is that this initiative will likely lead to greater clarity in the regulation of crypto assets in Ukraine.”
Despite the support from some officials, there are legal hurdles. Ukrainian laws don’t allow bitcoin to be in the official reserves. So the government needs to pass new laws for it to happen.
Efforts to legalize bitcoin in general have been going on for years. In 2021, a draft law on virtual assets was approved by Finance Committee but was withdrawn after the President’s Office and financial regulators objected.
Up to now, over 80 amendments have been proposed, showing how complicated the process is.
The Ministry of Digital Transformation is leading a larger reform that could introduce rules for digital asset exchanges, tax laws and anti-money laundering standards in the country.
Ukraine isn’t alone in considering bitcoin as a national reserve asset. In March 2025, the U.S. announced its own Strategic Bitcoin Reserve using BTC seized in criminal cases.
-
@ 975e4ad5:8d4847ce
2025-05-25 10:43:35Selfishness as Bitcoin’s Engine
Bitcoin, created by Satoshi Nakamoto, operates on a clear mechanism: miners use computational power to solve complex mathematical puzzles, verifying transactions on the network. In return, they earn rewards in Bitcoin. This is pure self-interest—miners want to maximize their profits. But while pursuing personal gain, they inadvertently maintain the entire system. Each new block added to the blockchain makes the network more stable and resilient against attacks. The more miners join, the more decentralized the system becomes, rendering it nearly impossible to manipulate.
This mechanism is brilliant because it taps into human nature—the desire for personal gain—to create something greater. Bitcoin doesn’t rely on altruism or good intentions. It relies on rational self-interest, which drives individuals to act in their own favor, ultimately benefiting the entire community.
The World Works the Same Way
This concept isn’t unique to Bitcoin. The world is full of examples where personal interest leads to collective progress. When an entrepreneur creates a new product, they do so to make money, but in the process, they create jobs, advance technology, and improve people’s lives. When a scientist works on a breakthrough, they may be driven by fame or financial reward, but the result is often a discovery that changes the world. Even in everyday life, when we buy products or services for our own convenience, we support the economy and encourage innovation.
Of course, self-interest doesn’t always lead to positive outcomes. Technologies created with good intentions can be misused—for example, in wars or for fraud. But even these negative aspects don’t halt progress. Competition and the drive for survival push humanity to find solutions, learn from mistakes, and keep moving forward. This is the cycle of development: individual self-interest fuels innovations that make the world more technological and connected.
Nature and Bitcoin: The DNA Parallel
To understand this mechanism, let’s look to nature. Consider the cells in a living organism. Each cell operates independently, following the instructions encoded in its DNA—a code that dictates its actions. The cell doesn’t “know” about the entire body, nor does it care. It simply strives for its own survival, performing its functions. But when billions of cells work together, following this code, they create something greater—a living organism.
Bitcoin is like the DNA of a decentralized system. Each miner is like a cell, following the “instructions” of the protocol to survive (profit). They don’t think about the entire network, only their own reward. But when all miners act together, they create something bigger—a global, secure, and resilient financial system. This is the beauty of decentralization: everyone acts for themselves, but the result is collective.
Selfishness and Humanity
Humans are no different from cells. Each of us wants to thrive—to have security, comfort, and success. But in pursuing these goals, we contribute to society. A teacher educates because they want to earn a living, but they shape future generations. An engineer builds a bridge because it’s their job, but it facilitates transportation for millions. Even in our personal lives, when we care for our families, we strengthen the social bonds that make society stronger.
Of course, there are exceptions—people who act solely for personal gain without regard for consequences. But even these outliers don’t change the bigger picture. Selfishness, when channeled correctly, is a driver of progress. Bitcoin is proof of this—a technology that turns personal interest into global innovation.
Bitcoin is more than just a cryptocurrency; it’s a mirror of human nature and the way the world works. Its design harnesses selfishness to create something sustainable and valuable. Just like cells in a body or people in society, Bitcoin miners work for themselves but contribute to something greater. It’s a reminder that even in our pursuit of personal gain, we can make the world a better place—as long as we follow the right “code.”
-
@ f240be2b:00c761ba
2025-05-25 10:32:12Wirtschaftswunder werden oft als mysteriöse, unvorhersehbare Phänomene dargestellt – als wären sie glückliche Zufälle oder das Ergebnis genialer Planungen. Bei näherer Betrachtung offenbart sich jedoch ein grundlegendes Muster: Diese vermeintlichen "Wunder" sind keine übernatürlichen Ereignisse, sondern das natürliche Ergebnis wirtschaftlicher Freiheit. Die Erfolgsgeschichten verschiedener Länder bestätigen diese These und zeigen, dass Wohlstand entsteht, wenn Menschen die Freiheit haben, zu handeln, zu produzieren und zu innovieren.
Das deutsche Wirtschaftswunder
Nach dem Zweiten Weltkrieg lag Deutschland in Trümmern. Die Industrieproduktion war auf ein Viertel des Vorkriegsniveaus gesunken, und Millionen Menschen lebten in Armut. Doch innerhalb weniger Jahre erlebte Westdeutschland einen beispiellosen wirtschaftlichen Aufschwung, der als "Wirtschaftswunder" in die Geschichte einging.
Der Wandel begann mit Ludwig Erhards mutiger Währungsreform und Preisfreigabe im Jahr 1948. Erhard, damals Direktor der Wirtschaftsverwaltung, schaffte Preiskontrollen ab und führte die Deutsche Mark ein. Diese Maßnahmen wurden von Besatzungsmächten und deutschen Sozialisten skeptisch betrachtet und waren zunächst unpopulär. Doch die Ergebnisse sprachen für sich: Über Nacht füllten sich die Ladenregale wieder, und die Schwarzmärkte verschwanden.
Das Kernprinzip war einfach: Erhard gab den Menschen ihre wirtschaftliche Freiheit zurück. Er schuf einen stabilen Rechtsrahmen, reduzierte staatliche Eingriffe und förderte den freien Wettbewerb. Die Sozialisten bekämpften diese Entwicklung von Anfang an, deuteten diese jedoch im Nachhinein als “soziale Marktwirtschaft” um, diese Lüge verbreiten sie noch heute sehr erfolgreich.
Die freie Marktwirtschaft erlaubte es den Deutschen, ihre unternehmerischen Fähigkeiten zu entfalten und ihre zerstörte Wirtschaft wieder aufzubauen.\ Das Ergebnis: Zwischen 1950 und 1960 wuchs das westdeutsche BIP um mehr als 8% jährlich. Die Arbeitslosigkeit sank von 11% auf unter 1%, und Deutschland wurde zu einer der führenden Exportnationen der Welt. Was als "Wunder" bezeichnet wurde, war tatsächlich die natürliche Konsequenz wiederhergestellter wirtschaftlicher Freiheit.
Chiles wirtschaftliche Transformation
Chile bietet ein weiteres eindrucksvolles Beispiel. In den frühen 1970er Jahren litt das Land unter einer Hyperinflation von 700%, einem schrumpfenden BIP und zunehmender Armut. Die Transformation begann in den späten 1970er Jahren mit tiefgreifenden Wirtschaftsreformen.
Die chilenische Regierung privatisierte Staatsunternehmen, öffnete Märkte für internationalen Handel, schuf ein stabiles Finanzsystem und führte ein innovatives Rentensystem ein. Während andere lateinamerikanische Länder mit protektionistischen Maßnahmen experimentierten, entschied sich Chile für wirtschaftliche Freiheit.
Die Ergebnisse waren beeindruckend: Zwischen 1975 und 2000 verdreifachte sich Chiles Pro-Kopf-Einkommen. Die Armutsquote sank von 45% auf unter 10%. Heute hat Chile das höchste Pro-Kopf-Einkommen in Südamerika und eine der stabilsten Wirtschaften der Region.
Mit einer gewissen Melancholie müssen wir beobachten, wie die hart erkämpften Errungenschaften Chiles allmählich in den Schatten der Vergänglichkeit gleiten. Was einst als Leuchtturm wirtschaftlicher Transformation strahlte, wird nun von den Nebeln der kollektiven Amnesie umhüllt. In dieser Dämmerung der Erinnerung finden interventionistische Strömungen erneut fruchtbaren Boden.
Dieses Phänomen ist nicht auf Chile beschränkt. Auch in Deutschland verblasst die Erinnerung an die transformative Kraft der freien Marktwirtschaft. Die Geschichte wird umgedichtet, in der wirtschaftliche Freiheit als unbarmherziger Kapitalismus karikiert wird, während staatliche Intervention als einziger Weg zur sozialen Gerechtigkeit glorifiziert wird.
Chinas große Öffnung
Im Reich der Mitte vollzog sich die vielleicht dramatischste wirtschaftliche Metamorphose unserer Zeit. Nach Jahrzehnten der Isolation und planwirtschaftlicher Starrheit öffnete China unter Deng Xiaoping vorsichtig die Tore zur wirtschaftlichen Freiheit.
Die Transformation begann in den Reisfeldern, wo Bauern erstmals seit Generationen über ihre eigene Ernte bestimmen durften. Sie setzte sich fort in den pulsierenden Sonderwirtschaftszonen, wo unternehmerische Energie auf globale Märkte traf.
Das Ergebnis war atemberaubend: Fast vier Jahrzehnte mit durchschnittlich 10 Prozent Wirtschaftswachstum jährlich – eine beispiellose Leistung in der Wirtschaftsgeschichte. Mehr als 800 Millionen Menschen überwanden die Armut und fanden den Weg in die globale Mittelschicht. Selbst die partielle Einführung wirtschaftlicher Freiheiten entfesselte eine Produktivität, die die Welt veränderte.
Die zeitlose Lektion
Das Geheimnis wirtschaftlicher Erneuerung liegt nicht in komplexen Theorien oder staatlichen Eingriffen, sondern in der einfachen Weisheit, Menschen die Freiheit zu geben, ihre Träume zu verwirklichen. Wenn wir von "Wirtschaftswundern" sprechen, verkennen wir die wahre Natur dieser Transformationen.
Sie sind keine mysteriösen Anomalien, sondern vielmehr Bestätigungen eines zeitlosen Prinzips: In der fruchtbaren Erde wirtschaftlicher Freiheit blüht der menschliche Erfindungsgeist. Diese Erkenntnis ist keine ideologische Position, sondern eine durch die Geschichte vielfach bestätigte Wahrheit.
Die Lektion dieser Erfolgsgeschichten ist sowohl schlicht als auch tiefgründig: Der Weg zu Wohlstand und menschlicher Entfaltung führt über die Anerkennung und den Schutz wirtschaftlicher Freiheiten. In dieser Erkenntnis liegt vielleicht das wahre Wunder – die beständige Kraft einer einfachen Idee, die immer wieder Leben und Hoffnung in die dunkelsten wirtschaftlichen Landschaften bringt.
Der aufsteigende Stern des Südens
Jenseits der Andenkette, wo Argentinien und Chile ihre lange Grenze teilen, entfaltet sich eine neue Erfolgsgeschichte. Mit mutigen Reformen und einer Rückbesinnung auf wirtschaftliche Freiheit erwacht dieses Land mit viel Potenzial aus seinem langen Schlummer. Was wir beobachten, ist nichts weniger als die Geburt eines neuen südamerikanischen Wirtschaftswunders – geboren aus der Erkenntnis, dass Wohlstand nicht verteilt, sondern erschaffen wird.
-
@ 4fe14ef2:f51992ec
2025-05-25 10:04:36Let's support Bitcoin merchants! I'd love to hear some of your latest Lightning purchases and interesting products you bought. Feel free to include links to the shops or businesses you bought from.
Who else has a recent purchase they’re excited about? Bonus sats if you found a killer deal! ⚡
Spend sats, not fiat!
If you missed our last thread, here are some of the items stackers recently spent and zap on.
Share and repost: N: https://njump.me/note1r0rllvtns2e8g2rqn0p9uytxucmjzal3pxslldjtfmxwp2amwjjqy3aazq X: https://x.com/AGORA_SN/status/1926579498629169410
https://stacker.news/items/988783
-
@ d419d542:b8bfb32d
2025-05-25 10:02:26Sự bùng nổ của công nghệ số đã làm thay đổi cách người Việt tiếp cận và tận hưởng các loại hình giải trí, từ truyền hình, âm nhạc đến các nền tảng trực tuyến. Trong làn sóng chuyển đổi này, 42VN nổi bật như một trong những đơn vị tiên phong ứng dụng công nghệ hiện đại để mang đến trải nghiệm giải trí số hoàn toàn mới cho người dùng trong nước. Không chỉ cung cấp một nền tảng trực quan, dễ sử dụng, 42VN còn kết hợp giữa thiết kế thân thiện và khả năng cá nhân hóa nội dung dựa trên hành vi người dùng, từ đó tạo nên môi trường tương tác linh hoạt, phù hợp với mọi độ tuổi và phong cách sống. Việc tích hợp đa dạng dịch vụ giải trí số trên cùng một nền tảng không chỉ giúp người dùng tiết kiệm thời gian tìm kiếm mà còn nâng cao tính tiện lợi và khả năng truy cập mọi lúc, mọi nơi. Đây là một bước tiến đáng kể góp phần thúc đẩy xu hướng giải trí tại nhà – điều ngày càng phổ biến trong xã hội hiện đại, đặc biệt sau những thay đổi trong thói quen sinh hoạt hậu đại dịch.
Bên cạnh đó, 42VN còn đầu tư vào các yếu tố công nghệ nhằm nâng cao tốc độ truy cập, tối ưu khả năng xử lý dữ liệu và bảo mật thông tin cá nhân của người dùng. Hệ thống máy chủ hiện đại, khả năng tương thích đa thiết bị và giao diện hoàn toàn bằng tiếng Việt giúp mọi người dùng, kể cả người ít kinh nghiệm công nghệ, cũng dễ dàng tiếp cận và sử dụng. Quan trọng hơn, nền tảng này không chỉ đơn thuần là công cụ giải trí mà còn góp phần thúc đẩy tư duy sử dụng công nghệ một cách tích cực và có trách nhiệm. Việc 42VN thường xuyên cập nhật các tính năng mới, tổ chức các hoạt động tương tác và lắng nghe ý kiến người dùng cho thấy chiến lược phát triển lâu dài của họ không nằm ở việc cung cấp dịch vụ một chiều, mà là xây dựng một cộng đồng số năng động, thân thiện và bền vững. Trong tương lai, khi nhu cầu giải trí kỹ thuật số ngày càng gia tăng, mô hình hoạt động và định hướng đổi mới của 42VN chắc chắn sẽ đóng vai trò quan trọng trong việc hình thành một thế hệ người dùng Việt am hiểu công nghệ, yêu thích trải nghiệm số và sẵn sàng đón nhận những xu hướng mới của thời đại.
-
@ 2f29aa33:38ac6f13
2025-05-17 12:59:01The Myth and the Magic
Picture this: a group of investors, huddled around a glowing computer screen, nervously watching Bitcoin’s price. Suddenly, someone produces a stick-no ordinary stick, but a magical one. With a mischievous grin, they poke the Bitcoin. The price leaps upward. Cheers erupt. The legend of the Bitcoin stick is born.
But why does poking Bitcoin with a stick make the price go up? Why does it only work for a lucky few? And what does the data say about this mysterious phenomenon? Let’s dig in, laugh a little, and maybe learn the secret to market-moving magic.
The Statistical Side of Stick-Poking
Bitcoin’s Price: The Wild Ride
Bitcoin’s price is famous for its unpredictability. In the past year, it’s soared, dipped, and soared again, sometimes gaining more than 50% in just a few months. On a good day, billions of dollars flow through Bitcoin trades, and the price can jump thousands in a matter of hours. Clearly, something is making this happen-and it’s not just spreadsheets and financial news.
What Actually Moves the Price?
-
Scarcity: Only 21 million Bitcoins will ever exist. When more people want in, the price jumps.
-
Big News: Announcements, rumors, and meme-worthy moments can send the price flying.
-
FOMO: When people see Bitcoin rising, they rush to buy, pushing it even higher.
-
Liquidations: When traders betting against Bitcoin get squeezed, it triggers a chain reaction of buying.
But let’s be honest: none of this is as fun as poking Bitcoin with a stick.
The Magical Stick: Not Your Average Twig
Why Not Every Stick Works
You can’t just grab any old branch and expect Bitcoin to dance. The magical stick is a rare artifact, forged in the fires of internet memes and blessed by the spirit of Satoshi. Only a chosen few possess it-and when they poke, the market listens.
Signs You Have the Magical Stick
-
When you poke, Bitcoin’s price immediately jumps a few percent.
-
Your stick glows with meme energy and possibly sparkles with digital dust.
-
You have a knack for timing your poke right after a big event, like a halving or a celebrity tweet.
-
Your stick is rumored to have been whittled from the original blockchain itself.
Why Most Sticks Fail
-
No Meme Power: If your stick isn’t funny, Bitcoin ignores you.
-
Bad Timing: Poking during a bear market just annoys the blockchain.
-
Not Enough Hype: If the bitcoin community isn’t watching, your poke is just a poke.
-
Lack of Magic: Some sticks are just sticks. Sad, but true.
The Data: When the Stick Strikes
Let’s look at some numbers:
-
In the last month, Bitcoin’s price jumped over 20% right after a flurry of memes and stick-poking jokes.
-
Over the past year, every major price surge was accompanied by a wave of internet hype, stick memes, or wild speculation.
-
In the past five years, Bitcoin’s biggest leaps always seemed to follow some kind of magical event-whether a halving, a viral tweet, or a mysterious poke.
Coincidence? Maybe. But the pattern is clear: the stick works-at least when it’s magical.
The Role of Memes, Magic, and Mayhem
Bitcoin’s price is like a cat: unpredictable, easily startled, and sometimes it just wants to be left alone. But when the right meme pops up, or the right stick pokes at just the right time, the price can leap in ways that defy logic.
The bitcoin community knows this. That’s why, when Bitcoin’s stuck in a rut, you’ll see a flood of stick memes, GIFs, and magical thinking. Sometimes, it actually works.
The Secret’s in the Stick (and the Laughs)
So, does poking Bitcoin with a stick really make the price go up? If your stick is magical-blessed by memes, timed perfectly, and watched by millions-absolutely. The statistics show that hype, humor, and a little bit of luck can move markets as much as any financial report.
Next time you see Bitcoin stalling, don’t just sit there. Grab your stick, channel your inner meme wizard, and give it a poke. Who knows? You might just be the next legend in the world of bitcoin magic.
And if your stick doesn’t work, don’t worry. Sometimes, the real magic is in the laughter along the way.
-aco
@block height: 897,104
-
-
@ 04c915da:3dfbecc9
2025-05-20 15:47:16Here’s a revised timeline of macro-level events from The Mandibles: A Family, 2029–2047 by Lionel Shriver, reimagined in a world where Bitcoin is adopted as a widely accepted form of money, altering the original narrative’s assumptions about currency collapse and economic control. In Shriver’s original story, the failure of Bitcoin is assumed amid the dominance of the bancor and the dollar’s collapse. Here, Bitcoin’s success reshapes the economic and societal trajectory, decentralizing power and challenging state-driven outcomes.
Part One: 2029–2032
-
2029 (Early Year)\ The United States faces economic strain as the dollar weakens against global shifts. However, Bitcoin, having gained traction emerges as a viable alternative. Unlike the original timeline, the bancor—a supranational currency backed by a coalition of nations—struggles to gain footing as Bitcoin’s decentralized adoption grows among individuals and businesses worldwide, undermining both the dollar and the bancor.
-
2029 (Mid-Year: The Great Renunciation)\ Treasury bonds lose value, and the government bans Bitcoin, labeling it a threat to sovereignty (mirroring the original bancor ban). However, a Bitcoin ban proves unenforceable—its decentralized nature thwarts confiscation efforts, unlike gold in the original story. Hyperinflation hits the dollar as the U.S. prints money, but Bitcoin’s fixed supply shields adopters from currency devaluation, creating a dual-economy split: dollar users suffer, while Bitcoin users thrive.
-
2029 (Late Year)\ Dollar-based inflation soars, emptying stores of goods priced in fiat currency. Meanwhile, Bitcoin transactions flourish in underground and online markets, stabilizing trade for those plugged into the bitcoin ecosystem. Traditional supply chains falter, but peer-to-peer Bitcoin networks enable local and international exchange, reducing scarcity for early adopters. The government’s gold confiscation fails to bolster the dollar, as Bitcoin’s rise renders gold less relevant.
-
2030–2031\ Crime spikes in dollar-dependent urban areas, but Bitcoin-friendly regions see less chaos, as digital wallets and smart contracts facilitate secure trade. The U.S. government doubles down on surveillance to crack down on bitcoin use. A cultural divide deepens: centralized authority weakens in Bitcoin-adopting communities, while dollar zones descend into lawlessness.
-
2032\ By this point, Bitcoin is de facto legal tender in parts of the U.S. and globally, especially in tech-savvy or libertarian-leaning regions. The federal government’s grip slips as tax collection in dollars plummets—Bitcoin’s traceability is low, and citizens evade fiat-based levies. Rural and urban Bitcoin hubs emerge, while the dollar economy remains fractured.
Time Jump: 2032–2047
- Over 15 years, Bitcoin solidifies as a global reserve currency, eroding centralized control. The U.S. government adapts, grudgingly integrating bitcoin into policy, though regional autonomy grows as Bitcoin empowers local economies.
Part Two: 2047
-
2047 (Early Year)\ The U.S. is a hybrid state: Bitcoin is legal tender alongside a diminished dollar. Taxes are lower, collected in BTC, reducing federal overreach. Bitcoin’s adoption has decentralized power nationwide. The bancor has faded, unable to compete with Bitcoin’s grassroots momentum.
-
2047 (Mid-Year)\ Travel and trade flow freely in Bitcoin zones, with no restrictive checkpoints. The dollar economy lingers in poorer areas, marked by decay, but Bitcoin’s dominance lifts overall prosperity, as its deflationary nature incentivizes saving and investment over consumption. Global supply chains rebound, powered by bitcoin enabled efficiency.
-
2047 (Late Year)\ The U.S. is a patchwork of semi-autonomous zones, united by Bitcoin’s universal acceptance rather than federal control. Resource scarcity persists due to past disruptions, but economic stability is higher than in Shriver’s original dystopia—Bitcoin’s success prevents the authoritarian slide, fostering a freer, if imperfect, society.
Key Differences
- Currency Dynamics: Bitcoin’s triumph prevents the bancor’s dominance and mitigates hyperinflation’s worst effects, offering a lifeline outside state control.
- Government Power: Centralized authority weakens as Bitcoin evades bans and taxation, shifting power to individuals and communities.
- Societal Outcome: Instead of a surveillance state, 2047 sees a decentralized, bitcoin driven world—less oppressive, though still stratified between Bitcoin haves and have-nots.
This reimagining assumes Bitcoin overcomes Shriver’s implied skepticism to become a robust, adopted currency by 2029, fundamentally altering the novel’s bleak trajectory.
-
-
@ d419d542:b8bfb32d
2025-05-25 10:01:03Trong thế giới công nghệ số ngày càng phát triển, giao diện người dùng (UI) đóng vai trò ngày càng quan trọng trong việc thu hút và giữ chân người dùng. Với OK22, giao diện không đơn thuần chỉ là phương tiện kết nối giữa người và hệ thống, mà còn là yếu tố tạo nên trải nghiệm hoàn hảo. Từ cách bố trí các nút chức năng, màu sắc cho đến tốc độ phản hồi khi tương tác, tất cả đều được tối ưu hóa nhằm đảm bảo rằng người dùng cảm thấy thoải mái, dễ thao tác và tin tưởng vào nền tảng. OK22 chú trọng thiết kế giao diện dựa trên hành vi người dùng thực tế, nghĩa là họ không chỉ thiết kế theo thị hiếu mà còn nghiên cứu kỹ càng thói quen, tần suất và nhu cầu sử dụng của từng nhóm người dùng. Nhờ vậy, người dùng dù mới tiếp cận lần đầu cũng có thể nhanh chóng làm quen với hệ thống mà không cần thời gian học hỏi dài. Không những vậy, việc liên tục cập nhật các xu hướng thiết kế mới giúp OK22 luôn giữ được vẻ hiện đại và sự chuyên nghiệp, từ đó tạo nên ấn tượng tích cực trong mắt người dùng ngay từ lần đầu sử dụng.
OK22 không chỉ dừng lại ở giao diện người dùng trực quan mà còn kết hợp chặt chẽ với trải nghiệm người dùng (UX) nhằm mang lại cảm giác liền mạch, thống nhất và tiện lợi trong mọi thao tác. Bằng cách tạo ra luồng thao tác ngắn gọn, logic và dễ hiểu, nền tảng giúp người dùng tiết kiệm thời gian và công sức trong suốt quá trình sử dụng. Tính năng tìm kiếm thông minh, cá nhân hóa nội dung và hỗ trợ trực tuyến được tích hợp khéo léo vào giao diện, giúp người dùng luôn cảm thấy được hỗ trợ kịp thời và đúng nhu cầu. OK22 cũng rất quan tâm đến khía cạnh bảo mật và quyền riêng tư, vì vậy các thông báo, xác thực và lựa chọn quyền truy cập được bố trí rõ ràng, dễ quản lý. Việc đồng bộ hóa thiết kế trên các nền tảng khác nhau như web, ứng dụng di động và phiên bản nhẹ cũng giúp người dùng có được cảm nhận nhất quán dù sử dụng thiết bị nào. Tất cả những điều đó chứng minh rằng việc đầu tư vào giao diện và trải nghiệm người dùng không chỉ là xu hướng, mà còn là chiến lược lâu dài giúp OK22 duy trì lợi thế cạnh tranh, gia tăng sự hài lòng và khẳng định vị thế trong lĩnh vực công nghệ số hiện đại.
-
@ c1e9ab3a:9cb56b43
2025-05-09 23:10:14I. Historical Foundations of U.S. Monetary Architecture
The early monetary system of the United States was built atop inherited commodity money conventions from Europe’s maritime economies. Silver and gold coins—primarily Spanish pieces of eight, Dutch guilders, and other foreign specie—formed the basis of colonial commerce. These units were already integrated into international trade and piracy networks and functioned with natural compatibility across England, France, Spain, and Denmark. Lacking a centralized mint or formal currency, the U.S. adopted these forms de facto.
As security risks and the practical constraints of physical coinage mounted, banks emerged to warehouse specie and issue redeemable certificates. These certificates evolved into fiduciary media—claims on specie not actually in hand. Banks observed over time that substantial portions of reserves remained unclaimed for years. This enabled fractional reserve banking: issuing more claims than reserves held, so long as redemption demand stayed low. The practice was inherently unstable, prone to panics and bank runs, prompting eventual centralization through the formation of the Federal Reserve in 1913.
Following the Civil War and unstable reinstatements of gold convertibility, the U.S. sought global monetary stability. After World War II, the Bretton Woods system formalized the U.S. dollar as the global reserve currency. The dollar was nominally backed by gold, but most international dollars were held offshore and recycled into U.S. Treasuries. The Nixon Shock of 1971 eliminated the gold peg, converting the dollar into pure fiat. Yet offshore dollar demand remained, sustained by oil trade mandates and the unique role of Treasuries as global reserve assets.
II. The Structure of Fiduciary Media and Treasury Demand
Under this system, foreign trade surpluses with the U.S. generate excess dollars. These surplus dollars are parked in U.S. Treasuries, thereby recycling trade imbalances into U.S. fiscal liquidity. While technically loans to the U.S. government, these purchases act like interest-only transfers—governments receive yield, and the U.S. receives spendable liquidity without principal repayment due in the short term. Debt is perpetually rolled over, rarely extinguished.
This creates an illusion of global subsidy: U.S. deficits are financed via foreign capital inflows that, in practice, function more like financial tribute systems than conventional debt markets. The underlying asset—U.S. Treasury debt—functions as the base reserve asset of the dollar system, replacing gold in post-Bretton Woods monetary logic.
III. Emergence of Tether and the Parastatal Dollar
Tether (USDT), as a private issuer of dollar-denominated tokens, mimics key central bank behaviors while operating outside the regulatory perimeter. It mints tokens allegedly backed 1:1 by U.S. dollars or dollar-denominated securities (mostly Treasuries). These tokens circulate globally, often in jurisdictions with limited banking access, and increasingly serve as synthetic dollar substitutes.
If USDT gains dominance as the preferred medium of exchange—due to technological advantages, speed, programmability, or access—it displaces Federal Reserve Notes (FRNs) not through devaluation, but through functional obsolescence. Gresham’s Law inverts: good money (more liquid, programmable, globally transferable USDT) displaces bad (FRNs) even if both maintain a nominal 1:1 parity.
Over time, this preference translates to a systemic demand shift. Actors increasingly use Tether instead of FRNs, especially in global commerce, digital marketplaces, or decentralized finance. Tether tokens effectively become shadow base money.
IV. Interaction with Commercial Banking and Redemption Mechanics
Under traditional fractional reserve systems, commercial banks issue loans denominated in U.S. dollars, expanding the money supply. When borrowers repay loans, this destroys the created dollars and contracts monetary elasticity. If borrowers repay in USDT instead of FRNs:
- Banks receive a non-Fed liability (USDT).
- USDT is not recognized as reserve-eligible within the Federal Reserve System.
- Banks must either redeem USDT for FRNs, or demand par-value conversion from Tether to settle reserve requirements and balance their books.
This places redemption pressure on Tether and threatens its 1:1 peg under stress. If redemption latency, friction, or cost arises, USDT’s equivalence to FRNs is compromised. Conversely, if banks are permitted or compelled to hold USDT as reserve or regulatory capital, Tether becomes a de facto reserve issuer.
In this scenario, banks may begin demanding loans in USDT, mirroring borrower behavior. For this to occur sustainably, banks must secure Tether liquidity. This creates two options: - Purchase USDT from Tether or on the secondary market, collateralized by existing fiat. - Borrow USDT directly from Tether, using bank-issued debt as collateral.
The latter mirrors Federal Reserve discount window operations. Tether becomes a lender of first resort, providing monetary elasticity to the banking system by creating new tokens against promissory assets—exactly how central banks function.
V. Structural Consequences: Parallel Central Banking
If Tether begins lending to commercial banks, issuing tokens backed by bank notes or collateralized debt obligations: - Tether controls the expansion of broad money through credit issuance. - Its balance sheet mimics a central bank, with Treasuries and bank debt as assets and tokens as liabilities. - It intermediates between sovereign debt and global liquidity demand, replacing the Federal Reserve’s open market operations with its own issuance-redemption cycles.
Simultaneously, if Tether purchases U.S. Treasuries with FRNs received through token issuance, it: - Supplies the Treasury with new liquidity (via bond purchases). - Collects yield on government debt. - Issues a parallel form of U.S. dollars that never require redemption—an interest-only loan to the U.S. government from a non-sovereign entity.
In this context, Tether performs monetary functions of both a central bank and a sovereign wealth fund, without political accountability or regulatory transparency.
VI. Endgame: Institutional Inversion and Fed Redundancy
This paradigm represents an institutional inversion:
- The Federal Reserve becomes a legacy issuer.
- Tether becomes the operational base money provider in both retail and interbank contexts.
- Treasuries remain the foundational reserve asset, but access to them is mediated by a private intermediary.
- The dollar persists, but its issuer changes. The State becomes a fiscal agent of a decentralized financial ecosystem, not its monetary sovereign.
Unless the Federal Reserve reasserts control—either by absorbing Tether, outlawing its instruments, or integrating its tokens into the reserve framework—it risks becoming irrelevant in the daily function of money.
Tether, in this configuration, is no longer a derivative of the dollar—it is the dollar, just one level removed from sovereign control. The future of monetary sovereignty under such a regime is post-national and platform-mediated.
-
@ c1d77557:bf04ec8b
2025-05-25 09:47:07No crescente universo de plataformas de jogos online, a H2Bet se destaca como uma opção inovadora, segura e recheada de diversão para os jogadores brasileiros. Com uma interface moderna e intuitiva, a H2Bet vem conquistando cada vez mais usuários que buscam entretenimento de qualidade, diversas opções de jogos e uma experiência digital fluida e confiável.
Uma Plataforma Feita para o Público Brasileiro Desde o primeiro acesso, é possível perceber que a H2Bet foi pensada para atender às necessidades do público brasileiro. O site é totalmente traduzido para o português, com suporte ao cliente eficiente e disponível 24 horas por dia, todos os dias da semana. O atendimento pode ser feito via chat ao vivo ou WhatsApp, oferecendo respostas rápidas e eficazes para qualquer dúvida ou solicitação.
Além disso, a plataforma aceita métodos de pagamento populares no Brasil, como PIX, boleto bancário e carteiras digitais, garantindo mais praticidade nas transações financeiras. Isso facilita tanto os depósitos quanto os saques, promovendo uma experiência mais fluida para todos os jogadores.
Diversidade de Jogos para Todos os Gostos Um dos grandes diferenciais da H2Betestá em sua ampla variedade de jogos. A plataforma oferece opções para todos os perfis de jogadores — desde os iniciantes até os mais experientes. Entre os destaques estão:
Slots (Caça-níqueis): Com gráficos envolventes, animações modernas e uma enorme variedade de temas, os slots são perfeitos para quem busca diversão rápida e visualmente atrativa.
Jogos de Mesa: Clássicos como roleta, blackjack e bacará estão presentes na H2Bet, proporcionando uma experiência dinâmica e estratégica para os jogadores que gostam de desafios mentais.
Apostas Esportivas: Os fãs de esportes também têm espaço garantido na H2Bet. É possível apostar em jogos de futebol, basquete, tênis e diversas outras modalidades, tanto nacionais quanto internacionais.
A plataforma trabalha com provedores de jogos renomados mundialmente, garantindo alta qualidade gráfica, jogabilidade otimizada e total segurança nos resultados.
Uma Experiência do Jogador Incomparável Na H2Bet, a experiência do usuário é prioridade. Tudo foi cuidadosamente projetado para que o jogador possa se divertir sem complicações. O processo de cadastro é rápido e simplificado, permitindo que o novo usuário comece a jogar em poucos minutos. Além disso, o site é totalmente responsivo, funcionando perfeitamente em computadores, tablets e smartphones.
Outro ponto de destaque são as promoções e bônus oferecidos aos jogadores. Desde bônus de boas-vindas até promoções sazonais e programas de fidelidade, a H2Bet recompensa a lealdade dos seus usuários com benefícios exclusivos que aumentam ainda mais a diversão.
A segurança da plataforma também merece elogios. A H2Bet utiliza tecnologia de criptografia de ponta para proteger os dados dos jogadores, além de manter total transparência em seus termos e condições.
Conclusão A H2Bet chega ao mercado brasileiro com uma proposta clara: oferecer uma plataforma de jogos online completa, segura e envolvente. Com uma vasta seleção de jogos, suporte dedicado ao jogador e uma interface pensada para o usuário, a H2Bet se posiciona como uma das melhores opções de entretenimento digital no Brasil. Se você busca emoção, praticidade e uma experiência de jogo diferenciada, a H2Bet é o lugar certo para você.
-
@ c1e9ab3a:9cb56b43
2025-05-06 14:05:40If you're an engineer stepping into the Bitcoin space from the broader crypto ecosystem, you're probably carrying a mental model shaped by speed, flexibility, and rapid innovation. That makes sense—most blockchain platforms pride themselves on throughput, programmability, and dev agility.
But Bitcoin operates from a different set of first principles. It’s not competing to be the fastest network or the most expressive smart contract platform. It’s aiming to be the most credible, neutral, and globally accessible value layer in human history.
Here’s why that matters—and why Bitcoin is not just an alternative crypto asset, but a structural necessity in the global financial system.
1. Bitcoin Fixes the Triffin Dilemma—Not With Policy, But Protocol
The Triffin Dilemma shows us that any country issuing the global reserve currency must run persistent deficits to supply that currency to the world. That’s not a flaw of bad leadership—it’s an inherent contradiction. The U.S. must debase its own monetary integrity to meet global dollar demand. That’s a self-terminating system.
Bitcoin sidesteps this entirely by being:
- Non-sovereign – no single nation owns it
- Hard-capped – no central authority can inflate it
- Verifiable and neutral – anyone with a full node can enforce the rules
In other words, Bitcoin turns global liquidity into an engineering problem, not a political one. No other system, fiat or crypto, has achieved that.
2. Bitcoin’s “Ossification” Is Intentional—and It's a Feature
From the outside, Bitcoin development may look sluggish. Features are slow to roll out. Code changes are conservative. Consensus rules are treated as sacred.
That’s the point.
When you’re building the global monetary base layer, stability is not a weakness. It’s a prerequisite. Every other financial instrument, app, or protocol that builds on Bitcoin depends on one thing: assurance that the base layer won’t change underneath them without extreme scrutiny.
So-called “ossification” is just another term for predictability and integrity. And when the market does demand change (SegWit, Taproot), Bitcoin’s soft-fork governance process has proven capable of deploying it safely—without coercive central control.
3. Layered Architecture: Throughput Is Not a Base Layer Concern
You don’t scale settlement at the base layer. You build layered systems. Just as TCP/IP doesn't need to carry YouTube traffic directly, Bitcoin doesn’t need to process every microtransaction.
Instead, it anchors:
- Lightning (fast payments)
- Fedimint (community custody)
- Ark (privacy + UTXO compression)
- Statechains, sidechains, and covenants (coming evolution)
All of these inherit Bitcoin’s security and scarcity, while handling volume off-chain, in ways that maintain auditability and self-custody.
4. Universal Assayability Requires Minimalism at the Base Layer
A core design constraint of Bitcoin is that any participant, anywhere in the world, must be able to independently verify the validity of every transaction and block—past and present—without needing permission or relying on third parties.
This property is called assayability—the ability to “test” or verify the authenticity and integrity of received bitcoin, much like verifying the weight and purity of a gold coin.
To preserve this:
- The base layer must remain resource-light, so running a full node stays accessible on commodity hardware.
- Block sizes must remain small enough to prevent centralization of verification.
- Historical data must remain consistent and tamper-evident, enabling proof chains across time and jurisdiction.
Any base layer that scales by increasing throughput or complexity undermines this fundamental guarantee, making the network more dependent on trust and surveillance infrastructure.
Bitcoin prioritizes global verifiability over throughput—because trustless money requires that every user can check the money they receive.
5. Governance: Not Captured, Just Resistant to Coercion
The current controversy around
OP_RETURN
and proposals to limit inscriptions is instructive. Some prominent devs have advocated for changes to block content filtering. Others see it as overreach.Here's what matters:
- No single dev, or team, can force changes into the network. Period.
- Bitcoin Core is not “the source of truth.” It’s one implementation. If it deviates from market consensus, it gets forked, sidelined, or replaced.
- The economic majority—miners, users, businesses—enforce Bitcoin’s rules, not GitHub maintainers.
In fact, recent community resistance to perceived Core overreach only reinforces Bitcoin’s resilience. Engineers who posture with narcissistic certainty, dismiss dissent, or attempt to capture influence are routinely neutralized by the market’s refusal to upgrade or adopt forks that undermine neutrality or openness.
This is governance via credible neutrality and negative feedback loops. Power doesn’t accumulate in one place. It’s constantly checked by the network’s distributed incentives.
6. Bitcoin Is Still in Its Infancy—And That’s a Good Thing
You’re not too late. The ecosystem around Bitcoin—especially L2 protocols, privacy tools, custody innovation, and zero-knowledge integrations—is just beginning.
If you're an engineer looking for:
- Systems with global scale constraints
- Architectures that optimize for integrity, not speed
- Consensus mechanisms that resist coercion
- A base layer with predictable monetary policy
Then Bitcoin is where serious systems engineers go when they’ve outgrown crypto theater.
Take-away
Under realistic, market-aware assumptions—where:
- Bitcoin’s ossification is seen as a stability feature, not inertia,
- Market forces can and do demand and implement change via tested, non-coercive mechanisms,
- Proof-of-work is recognized as the only consensus mechanism resistant to fiat capture,
- Wealth concentration is understood as a temporary distribution effect during early monetization,
- Low base layer throughput is a deliberate design constraint to preserve verifiability and neutrality,
- And innovation is layered by design, with the base chain providing integrity, not complexity...
Then Bitcoin is not a fragile or inflexible system—it is a deliberately minimal, modular, and resilient protocol.
Its governance is not leaderless chaos; it's a negative-feedback structure that minimizes the power of individuals or institutions to coerce change. The very fact that proposals—like controversial OP_RETURN restrictions—can be resisted, forked around, or ignored by the market without breaking the system is proof of decentralized control, not dysfunction.
Bitcoin is an adversarially robust monetary foundation. Its value lies not in how fast it changes, but in how reliably it doesn't—unless change is forced by real, bottom-up demand and implemented through consensus-tested soft forks.
In this framing, Bitcoin isn't a slower crypto. It's the engineering benchmark for systems that must endure, not entertain.
Final Word
Bitcoin isn’t moving slowly because it’s dying. It’s moving carefully because it’s winning. It’s not an app platform or a sandbox. It’s a protocol layer for the future of money.
If you're here because you want to help build that future, you’re in the right place.
nostr:nevent1qqswr7sla434duatjp4m89grvs3zanxug05pzj04asxmv4rngvyv04sppemhxue69uhkummn9ekx7mp0qgs9tc6ruevfqu7nzt72kvq8te95dqfkndj5t8hlx6n79lj03q9v6xcrqsqqqqqp0n8wc2
nostr:nevent1qqsd5hfkqgskpjjq5zlfyyv9nmmela5q67tgu9640v7r8t828u73rdqpr4mhxue69uhkymmnw3ezucnfw33k76tww3ux76m09e3k7mf0qgsvr6dt8ft292mv5jlt7382vje0mfq2ccc3azrt4p45v5sknj6kkscrqsqqqqqp02vjk5
nostr:nevent1qqstrszamvffh72wr20euhrwa0fhzd3hhpedm30ys4ct8dpelwz3nuqpr4mhxue69uhkymmnw3ezucnfw33k76tww3ux76m09e3k7mf0qgs8a474cw4lqmapcq8hr7res4nknar2ey34fsffk0k42cjsdyn7yqqrqsqqqqqpnn3znl
-
@ c1d77557:bf04ec8b
2025-05-25 09:46:24No crescente universo das plataformas de jogos online, a BET7K se destaca como uma das opções mais completas e inovadoras disponíveis para o público brasileiro. Com uma interface moderna, navegação intuitiva e uma variedade de jogos que agrada desde os iniciantes até os mais experientes, a plataforma tem conquistado uma legião de fãs em todo o país. Neste artigo, vamos apresentar um panorama completo sobre a BET7K, incluindo seus principais recursos, tipos de jogos oferecidos e a experiência do jogador.
Uma Plataforma Feita Para o Público Brasileiro Desde o primeiro acesso, é possível perceber que a bet7kfoi pensada especialmente para atender às preferências do público brasileiro. O site é totalmente em português, conta com suporte ao cliente local e métodos de pagamento adaptados à realidade do país, incluindo Pix, boleto bancário e carteiras digitais. Essa acessibilidade facilita o cadastro e as transações, tornando a experiência do usuário muito mais simples e prática.
Além disso, a BET7K também oferece promoções e bônus exclusivos para jogadores brasileiros, o que contribui para um engajamento contínuo e recompensador.
Diversidade de Jogos para Todos os Gostos A variedade de jogos é um dos pontos fortes da BET7K. A plataforma reúne os principais títulos do mercado, desenvolvidos por provedores de renome internacional, garantindo gráficos de alta qualidade, jogabilidade fluida e uma experiência imersiva.
Entre os destaques estão os populares jogos de slot, que combinam sorte e emoção com temáticas variadas e recursos especiais, como rodadas grátis e multiplicadores de prêmios. Para quem prefere algo mais estratégico, a BET7K também oferece opções como pôquer, blackjack e bacará, todos em versões otimizadas para desktop e dispositivos móveis.
Além disso, os jogos de roleta ao vivo proporcionam uma experiência interativa em tempo real, permitindo que os jogadores se sintam parte de uma atmosfera de luxo e sofisticação, mesmo jogando de casa.
A Experiência do Jogador em Primeiro Lugar A BET7K investe constantemente em tecnologia e segurança para garantir que os usuários possam se divertir com tranquilidade. A plataforma utiliza criptografia avançada para proteger os dados pessoais e financeiros, além de operar com licença de funcionamento internacional, o que demonstra seu compromisso com a transparência e a legalidade.
Outro diferencial importante é o atendimento ao cliente, disponível 24 horas por dia, 7 dias por semana. Os jogadores podem entrar em contato através de chat ao vivo, e-mail ou redes sociais, sempre contando com uma equipe treinada para resolver qualquer dúvida ou problema com agilidade.
Conclusão A BET7K é uma plataforma completa, confiável e voltada para proporcionar a melhor experiência possível aos seus usuários. Seja você um iniciante curioso ou um jogador experiente em busca de novos desafios, a BET7K oferece uma combinação ideal de diversão, segurança e oportunidades de ganhos reais.
Com sua abordagem focada no público brasileiro, promoções atraentes, grande variedade de jogos e suporte de qualidade, a BET7K vem se consolidando como uma das principais referências em entretenimento online no Brasil. Se você ainda não conhece, essa é a hora perfeita para explorar tudo o que a plataforma tem a oferecer.
-
@ c1d77557:bf04ec8b
2025-05-25 09:45:57No universo do entretenimento online, plataformas confiáveis, seguras e repletas de opções de jogos são cada vez mais valorizadas pelos jogadores brasileiros. A Betao surge como uma dessas grandes apostas, conquistando espaço entre os amantes de jogos virtuais por oferecer uma experiência dinâmica, envolvente e repleta de oportunidades de ganhos. Com um sistema moderno, interface amigável e suporte completo ao usuário, a Betao se destaca como um verdadeiro centro de entretenimento digital.
Conhecendo a Plataforma Betao Desde o primeiro acesso, o usuário percebe o cuidado da Betao em oferecer uma navegação fluida e intuitiva. O site é organizado de maneira eficiente, com menus claros que facilitam a localização dos jogos, promoções e informações de conta. Compatível com computadores e dispositivos móveis, a plataforma é ideal para quem deseja jogar em qualquer lugar, a qualquer momento.
A segurança é um dos pontos fortes da Betao. Com sistemas de criptografia atualizados e uma política rigorosa de proteção de dados, os jogadores podem ficar tranquilos quanto à integridade de suas informações pessoais e financeiras. Além disso, o suporte técnico é ágil e atencioso, pronto para resolver qualquer dúvida ou dificuldade de forma rápida e eficaz.
Variedade de Jogos para Todos os Estilos A grande diversidade de jogos é outro atrativo da Betao. A plataforma reúne títulos que atendem aos mais variados perfis de jogadores, desde os iniciantes até os mais experientes. Entre as opções, estão os tradicionais jogos de cartas, como pôquer e bacará, além de roletas e slots com temáticas criativas e gráficos de alta qualidade.
Os slots, em especial, são um grande sucesso na Betao. Com centenas de títulos disponíveis, os jogadores encontram desde opções clássicas com três rolos até versões modernas com múltiplas linhas de pagamento e recursos especiais. Muitos desses jogos oferecem rodadas grátis, multiplicadores e bônus interativos que aumentam ainda mais a emoção.
A Betao também oferece modalidades com crupiês ao vivo, criando uma atmosfera realista e interativa, onde o jogador pode se sentir em uma verdadeira sala de jogos, mesmo estando em casa. Essa funcionalidade aumenta a imersão e proporciona uma experiência diferenciada e sofisticada.
Experiência do Jogador: Simplicidade e Emoção O foco principal da Betao é proporcionar ao usuário uma jornada divertida e segura. Desde o cadastro, que é simples e rápido, até o processo de depósito e saque — que aceita os métodos de pagamento mais populares entre os brasileiros — tudo foi pensado para facilitar a vida do jogador.
As promoções constantes também são um atrativo à parte. A Betao oferece bônus de boas-vindas, campanhas sazonais e programas de fidelidade que recompensam os jogadores mais ativos com prêmios exclusivos. Isso cria uma sensação de valorização e motiva os usuários a retornarem sempre.
Outro ponto positivo é a transparência da plataforma. As regras dos jogos, os critérios para os bônus e os termos de uso estão sempre disponíveis de forma clara, reforçando a confiabilidade da Betao.
Conclusão A Betao é mais do que uma simples plataforma de jogos: é um ambiente completo de entretenimento digital, onde a diversão se alia à segurança e à inovação. Com uma oferta ampla de jogos, suporte eficiente e promoções atrativas, a Betao vem ganhando cada vez mais a preferência dos brasileiros que buscam emoção e praticidade em um só lugar. Se você procura uma plataforma moderna, confiável e repleta de possibilidades, a Betao é, sem dúvida, a escolha certa para sua próxima aventura online.
-
@ 6ad3e2a3:c90b7740
2025-05-20 13:49:50I’ve written about MSTR twice already, https://www.chrisliss.com/p/mstr and https://www.chrisliss.com/p/mstr-part-2, but I want to focus on legendary short seller James Chanos’ current trade wherein he buys bitcoin (via ETF) and shorts MSTR, in essence to “be like Mike” Saylor who sells MSTR shares at the market and uses them to add bitcoin to the company’s balance sheet. After all, if it’s good enough for Saylor, why shouldn’t everyone be doing it — shorting a company whose stock price is more than 2x its bitcoin holdings and using the proceeds to buy the bitcoin itself?
Saylor himself has said selling shares at 2x NAV (net asset value) to buy bitcoin is like selling dollars for two dollars each, and Chanos has apparently decided to get in while the getting (market cap more than 2x net asset value) is good. If the price of bitcoin moons, sending MSTR’s shares up, you are more than hedged in that event, too. At least that’s the theory.
The problem with this bet against MSTR’s mNAV, i.e., you are betting MSTR’s market cap will converge 1:1 toward its NAV in the short and medium term is this trade does not exist in a vacuum. Saylor has described how his ATM’s (at the market) sales of shares are accretive in BTC per share because of this very premium they carry. Yes, we’ll dilute your shares of the company, but because we’re getting you 2x the bitcoin per share, you are getting an ever smaller slice of an ever bigger overall pie, and the pie is growing 2x faster than your slice is reducing. (I https://www.chrisliss.com/p/mstr how this works in my first post.)
But for this accretion to continue, there must be a constant supply of “greater fools” to pony up for the infinitely printable shares which contain only half their value in underlying bitcoin. Yes, those shares will continue to accrete more BTC per share, but only if there are more fools willing to make this trade in the future. So will there be a constant supply of such “fools” to keep fueling MSTR’s mNAV multiple indefinitely?
Yes, there will be in my opinion because you have to look at the trade from the prospective fools’ perspective. Those “fools” are not trading bitcoin for MSTR, they are trading their dollars, selling other equities to raise them maybe, but in the end it’s a dollars for shares trade. They are not selling bitcoin for them.
You might object that those same dollars could buy bitcoin instead, so they are surely trading the opportunity cost of buying bitcoin for them, but if only 5-10 percent of the market (or less) is buying bitcoin itself, the bucket in which which those “fools” reside is the entire non-bitcoin-buying equity market. (And this is not considering the even larger debt market which Saylor has yet to tap in earnest.)
So for those 90-95 percent who do not and are not presently planning to own bitcoin itself, is buying MSTR a fool’s errand, so to speak? Not remotely. If MSTR shares are infinitely printable ATM, they are still less so than the dollar and other fiat currencies. And MSTR shares are backed 2:1 by bitcoin itself, while the fiat currencies are backed by absolutely nothing. So if you hold dollars or euros, trading them for MSTR shares is an errand more sage than foolish.
That’s why this trade (buying BTC and shorting MSTR) is so dangerous. Not only are there many people who won’t buy BTC buying MSTR, there are many funds and other investment entities who are only able to buy MSTR.
Do you want to get BTC at 1:1 with the 5-10 percent or MSTR backed 2:1 with the 90-95 percent. This is a bit like medical tests that have a 95 percent accuracy rate for an asymptomatic disease that only one percent of the population has. If someone tests positive, it’s more likely to be a false one than an indication he has the disease*. The accuracy rate, even at 19:1, is subservient to the size of the respective populations.
At some point this will no longer be the case, but so long as the understanding of bitcoin is not widespread, so long as the dollar is still the unit of account, the “greater fools” buying MSTR are still miles ahead of the greatest fools buying neither, and the stock price and mNAV should only increase.
. . .
One other thought: it’s more work to play defense than offense because the person on offense knows where he’s going, and the defender can only react to him once he moves. Similarly, Saylor by virtue of being the issuer of the shares knows when more will come online while Chanos and other short sellers are borrowing them to sell in reaction to Saylor’s strategy. At any given moment, Saylor can pause anytime, choosing to issue convertible debt or preferred shares with which to buy more bitcoin, and the shorts will not be given advance notice.
If the price runs, and there is no ATM that week because Saylor has stopped on a dime, so to speak, the shorts will be left having to scramble to change directions and buy the shares back to cover. Their momentum might be in the wrong direction, though, and like Allen Iverson breaking ankles with a crossover, Saylor might trigger a massive short squeeze, rocketing the share price ever higher. That’s why he actually welcomes Chanos et al trying this copycat strategy — it becomes the fuel for outsized gains.
For that reason, news that Chanos is shorting MSTR has not shaken my conviction, though there are other more pertinent https://www.chrisliss.com/p/mstr-part-2 with MSTR, of which one should be aware. And as always, do your own due diligence before investing in anything.
* To understand this, consider a population of 100,000, with one percent having a disease. That means 1,000 have it, 99,000 do not. If the test is 95 percent accurate, and everyone is tested, 950 of the 1,000 will test positive (true positives), 50 who have it will test negative (false negatives.) Of the positives, 95 percent of 99,000 (94,050) will test negative (true negatives) and five percent (4,950) will test positive (false positives). That means 4,950 out of 5,900 positives (84%) will be false.
-
@ 2b24a1fa:17750f64
2025-05-25 09:42:49Eine Stunde Klassik! Der Münchner Pianist und "Musikdurchdringer" Jürgen Plich stellt jeden Dienstag um 20 Uhr große klassische Musik vor. Er teilt seine Hör- und Spielerfahrung und seine persönliche Sicht auf die Meisterwerke. Er spielt selbst besondere, unbekannte Aufnahmen, erklärt, warum die Musik so und nicht anders klingt und hat eine Menge aus dem Leben der Komponisten zu erzählen.
https://soundcloud.com/radiomuenchen/eine-stunde-klassik-opus-eins?
Sonntags um 10 Uhr in der Wiederholung.
-
@ 34f1ddab:2ca0cf7c
2025-05-16 22:47:03Losing access to your cryptocurrency can feel like losing a part of your future. Whether it’s due to a forgotten password, a damaged seed backup, or a simple mistake in a transfer, the stress can be overwhelming. Fortunately, cryptrecver.com is here to assist! With our expert-led recovery services, you can safely and swiftly reclaim your lost Bitcoin and other cryptocurrencies.
Why Trust Crypt Recver? 🤝 🛠️ Expert Recovery Solutions At Crypt Recver, we specialize in addressing complex wallet-related issues. Our skilled engineers have the tools and expertise to handle:
Partially lost or forgotten seed phrases Extracting funds from outdated or invalid wallet addresses Recovering data from damaged hardware wallets Restoring coins from old or unsupported wallet formats You’re not just getting a service; you’re gaining a partner in your cryptocurrency journey.
🚀 Fast and Efficient Recovery We understand that time is crucial in crypto recovery. Our optimized systems enable you to regain access to your funds quickly, focusing on speed without compromising security. With a success rate of over 90%, you can rely on us to act swiftly on your behalf.
🔒 Privacy is Our Priority Your confidentiality is essential. Every recovery session is conducted with the utmost care, ensuring all processes are encrypted and confidential. You can rest assured that your sensitive information remains private.
💻 Advanced Technology Our proprietary tools and brute-force optimization techniques maximize recovery efficiency. Regardless of how challenging your case may be, our technology is designed to give you the best chance at retrieving your crypto.
Our Recovery Services Include: 📈 Bitcoin Recovery: Lost access to your Bitcoin wallet? We help recover lost wallets, private keys, and passphrases. Transaction Recovery: Mistakes happen — whether it’s an incorrect wallet address or a lost password, let us manage the recovery. Cold Wallet Restoration: If your cold wallet is failing, we can safely extract your assets and migrate them into a secure new wallet. Private Key Generation: Lost your private key? Our experts can help you regain control using advanced methods while ensuring your privacy. ⚠️ What We Don’t Do While we can handle many scenarios, some limitations exist. For instance, we cannot recover funds stored in custodial wallets or cases where there is a complete loss of four or more seed words without partial information available. We are transparent about what’s possible, so you know what to expect
Don’t Let Lost Crypto Hold You Back! Did you know that between 3 to 3.4 million BTC — nearly 20% of the total supply — are estimated to be permanently lost? Don’t become part of that statistic! Whether it’s due to a forgotten password, sending funds to the wrong address, or damaged drives, we can help you navigate these challenges
🛡️ Real-Time Dust Attack Protection Our services extend beyond recovery. We offer dust attack protection, keeping your activity anonymous and your funds secure, shielding your identity from unwanted tracking, ransomware, and phishing attempts.
🎉 Start Your Recovery Journey Today! Ready to reclaim your lost crypto? Don’t wait until it’s too late! 👉 cryptrecver.com
📞 Need Immediate Assistance? Connect with Us! For real-time support or questions, reach out to our dedicated team on: ✉️ Telegram: t.me/crypptrcver 💬 WhatsApp: +1(941)317–1821
Crypt Recver is your trusted partner in cryptocurrency recovery. Let us turn your challenges into victories. Don’t hesitate — your crypto future starts now! 🚀✨
Act fast and secure your digital assets with cryptrecver.com.Losing access to your cryptocurrency can feel like losing a part of your future. Whether it’s due to a forgotten password, a damaged seed backup, or a simple mistake in a transfer, the stress can be overwhelming. Fortunately, cryptrecver.com is here to assist! With our expert-led recovery services, you can safely and swiftly reclaim your lost Bitcoin and other cryptocurrencies.
# Why Trust Crypt Recver? 🤝
🛠️ Expert Recovery Solutions\ At Crypt Recver, we specialize in addressing complex wallet-related issues. Our skilled engineers have the tools and expertise to handle:
- Partially lost or forgotten seed phrases
- Extracting funds from outdated or invalid wallet addresses
- Recovering data from damaged hardware wallets
- Restoring coins from old or unsupported wallet formats
You’re not just getting a service; you’re gaining a partner in your cryptocurrency journey.
🚀 Fast and Efficient Recovery\ We understand that time is crucial in crypto recovery. Our optimized systems enable you to regain access to your funds quickly, focusing on speed without compromising security. With a success rate of over 90%, you can rely on us to act swiftly on your behalf.
🔒 Privacy is Our Priority\ Your confidentiality is essential. Every recovery session is conducted with the utmost care, ensuring all processes are encrypted and confidential. You can rest assured that your sensitive information remains private.
💻 Advanced Technology\ Our proprietary tools and brute-force optimization techniques maximize recovery efficiency. Regardless of how challenging your case may be, our technology is designed to give you the best chance at retrieving your crypto.
Our Recovery Services Include: 📈
- Bitcoin Recovery: Lost access to your Bitcoin wallet? We help recover lost wallets, private keys, and passphrases.
- Transaction Recovery: Mistakes happen — whether it’s an incorrect wallet address or a lost password, let us manage the recovery.
- Cold Wallet Restoration: If your cold wallet is failing, we can safely extract your assets and migrate them into a secure new wallet.
- Private Key Generation: Lost your private key? Our experts can help you regain control using advanced methods while ensuring your privacy.
⚠️ What We Don’t Do\ While we can handle many scenarios, some limitations exist. For instance, we cannot recover funds stored in custodial wallets or cases where there is a complete loss of four or more seed words without partial information available. We are transparent about what’s possible, so you know what to expect
# Don’t Let Lost Crypto Hold You Back!
Did you know that between 3 to 3.4 million BTC — nearly 20% of the total supply — are estimated to be permanently lost? Don’t become part of that statistic! Whether it’s due to a forgotten password, sending funds to the wrong address, or damaged drives, we can help you navigate these challenges
🛡️ Real-Time Dust Attack Protection\ Our services extend beyond recovery. We offer dust attack protection, keeping your activity anonymous and your funds secure, shielding your identity from unwanted tracking, ransomware, and phishing attempts.
🎉 Start Your Recovery Journey Today!\ Ready to reclaim your lost crypto? Don’t wait until it’s too late!\ 👉 cryptrecver.com
📞 Need Immediate Assistance? Connect with Us!\ For real-time support or questions, reach out to our dedicated team on:\ ✉️ Telegram: t.me/crypptrcver\ 💬 WhatsApp: +1(941)317–1821
Crypt Recver is your trusted partner in cryptocurrency recovery. Let us turn your challenges into victories. Don’t hesitate — your crypto future starts now! 🚀✨
Act fast and secure your digital assets with cryptrecver.com.
-
@ 3283ef81:0a531a33
2025-05-25 09:21:05Nullam auctor pretium sem pulvinar pulvinar\ Donec fermentum iaculis sem id aliquet
Integer vitae tempor justo, ac fermentum purus
-
@ 3283ef81:0a531a33
2025-05-25 09:20:07Phasellus erat metus, suscipit et nisi a, dignissim luctus risus\ Nam eleifend aliquet aliquam
Curabitur vulputate velit elit, sit amet euismod nibh venenatis et
-
@ b83a28b7:35919450
2025-05-16 19:23:58This article was originally part of the sermon of Plebchain Radio Episode 110 (May 2, 2025) that nostr:nprofile1qyxhwumn8ghj7mn0wvhxcmmvqyg8wumn8ghj7mn0wd68ytnvv9hxgqpqtvqc82mv8cezhax5r34n4muc2c4pgjz8kaye2smj032nngg52clq7fgefr and I did with nostr:nprofile1qythwumn8ghj7ct5d3shxtnwdaehgu3wd3skuep0qyt8wumn8ghj7ct4w35zumn0wd68yvfwvdhk6tcqyzx4h2fv3n9r6hrnjtcrjw43t0g0cmmrgvjmg525rc8hexkxc0kd2rhtk62 and nostr:nprofile1qyxhwumn8ghj7mn0wvhxcmmvqyg8wumn8ghj7mn0wd68ytnvv9hxgqpq4wxtsrj7g2jugh70pfkzjln43vgn4p7655pgky9j9w9d75u465pqahkzd0 of the nostr:nprofile1qythwumn8ghj7ct5d3shxtnwdaehgu3wd3skuep0qyt8wumn8ghj7etyv4hzumn0wd68ytnvv9hxgtcqyqwfvwrccp4j2xsuuvkwg0y6a20637t6f4cc5zzjkx030dkztt7t5hydajn
Listen to the full episode here:
<https://fountain.fm/episode/Ln9Ej0zCZ5dEwfo8w2Ho>
Bitcoin has always been a narrative revolution disguised as code. White paper, cypherpunk lore, pizza‑day legends - every block is a paragraph in the world’s most relentless epic. But code alone rarely converts the skeptic; it’s the camp‑fire myth that slips past the prefrontal cortex and shakes hands with the limbic system. People don’t adopt protocols first - they fall in love with protagonists.
Early adopters heard the white‑paper hymn, but most folks need characters first: a pizza‑day dreamer; a mother in a small country, crushed by the cost of remittance; a Warsaw street vendor swapping złoty for sats. When their arcs land, the brain releases a neurochemical OP_RETURN which says, “I belong in this plot.” That’s the sly roundabout orange pill: conviction smuggled inside catharsis.
That’s why, from 22–25 May in Warsaw’s Kinoteka, the Bitcoin Film Fest is loading its reels with rebellion. Each documentary, drama, and animated rabbit‑hole is a stealth wallet, zipping conviction straight into the feels of anyone still clasped within the cold claw of fiat. You come for the plot, you leave checking block heights.
Here's the clip of the sermon from the episode:
nostr:nevent1qvzqqqqqqypzpwp69zm7fewjp0vkp306adnzt7249ytxhz7mq3w5yc629u6er9zsqqsy43fwz8es2wnn65rh0udc05tumdnx5xagvzd88ptncspmesdqhygcrvpf2
-
@ 04c915da:3dfbecc9
2025-05-16 18:06:46Bitcoin has always been rooted in freedom and resistance to authority. I get that many of you are conflicted about the US Government stacking but by design we cannot stop anyone from using bitcoin. Many have asked me for my thoughts on the matter, so let’s rip it.
Concern
One of the most glaring issues with the strategic bitcoin reserve is its foundation, built on stolen bitcoin. For those of us who value private property this is an obvious betrayal of our core principles. Rather than proof of work, the bitcoin that seeds this reserve has been taken by force. The US Government should return the bitcoin stolen from Bitfinex and the Silk Road.
Using stolen bitcoin for the reserve creates a perverse incentive. If governments see bitcoin as a valuable asset, they will ramp up efforts to confiscate more bitcoin. The precedent is a major concern, and I stand strongly against it, but it should be also noted that governments were already seizing coin before the reserve so this is not really a change in policy.
Ideally all seized bitcoin should be burned, by law. This would align incentives properly and make it less likely for the government to actively increase coin seizures. Due to the truly scarce properties of bitcoin, all burned bitcoin helps existing holders through increased purchasing power regardless. This change would be unlikely but those of us in policy circles should push for it regardless. It would be best case scenario for American bitcoiners and would create a strong foundation for the next century of American leadership.
Optimism
The entire point of bitcoin is that we can spend or save it without permission. That said, it is a massive benefit to not have one of the strongest governments in human history actively trying to ruin our lives.
Since the beginning, bitcoiners have faced horrible regulatory trends. KYC, surveillance, and legal cases have made using bitcoin and building bitcoin businesses incredibly difficult. It is incredibly important to note that over the past year that trend has reversed for the first time in a decade. A strategic bitcoin reserve is a key driver of this shift. By holding bitcoin, the strongest government in the world has signaled that it is not just a fringe technology but rather truly valuable, legitimate, and worth stacking.
This alignment of incentives changes everything. The US Government stacking proves bitcoin’s worth. The resulting purchasing power appreciation helps all of us who are holding coin and as bitcoin succeeds our government receives direct benefit. A beautiful positive feedback loop.
Realism
We are trending in the right direction. A strategic bitcoin reserve is a sign that the state sees bitcoin as an asset worth embracing rather than destroying. That said, there is a lot of work left to be done. We cannot be lulled into complacency, the time to push forward is now, and we cannot take our foot off the gas. We have a seat at the table for the first time ever. Let's make it worth it.
We must protect the right to free usage of bitcoin and other digital technologies. Freedom in the digital age must be taken and defended, through both technical and political avenues. Multiple privacy focused developers are facing long jail sentences for building tools that protect our freedom. These cases are not just legal battles. They are attacks on the soul of bitcoin. We need to rally behind them, fight for their freedom, and ensure the ethos of bitcoin survives this new era of government interest. The strategic reserve is a step in the right direction, but it is up to us to hold the line and shape the future.
-
@ c1e9ab3a:9cb56b43
2025-05-05 14:25:28Introduction: The Power of Fiction and the Shaping of Collective Morality
Stories define the moral landscape of a civilization. From the earliest mythologies to the modern spectacle of global cinema, the tales a society tells its youth shape the parameters of acceptable behavior, the cost of transgression, and the meaning of justice, power, and redemption. Among the most globally influential narratives of the past half-century is the Star Wars saga, a sprawling science fiction mythology that has transcended genre to become a cultural religion for many. Central to this mythos is the arc of Anakin Skywalker, the fallen Jedi Knight who becomes Darth Vader. In Star Wars: Episode III – Revenge of the Sith, Anakin commits what is arguably the most morally abhorrent act depicted in mainstream popular cinema: the mass murder of children. And yet, by the end of the saga, he is redeemed.
This chapter introduces the uninitiated to the events surrounding this narrative turn and explores the deep structural and ethical concerns it raises. We argue that the cultural treatment of Darth Vader as an anti-hero, even a role model, reveals a deep perversion in the collective moral grammar of the modern West. In doing so, we consider the implications this mythology may have on young adults navigating identity, masculinity, and agency in a world increasingly shaped by spectacle and symbolic narrative.
Part I: The Scene and Its Context
In Revenge of the Sith (2005), the third episode of the Star Wars prequel trilogy, the protagonist Anakin Skywalker succumbs to fear, ambition, and manipulation. Convinced that the Jedi Council is plotting against the Republic and desperate to save his pregnant wife from a vision of death, Anakin pledges allegiance to Chancellor Palpatine, secretly the Sith Lord Darth Sidious. Upon doing so, he is given a new name—Darth Vader—and tasked with a critical mission: to eliminate all Jedi in the temple, including its youngest members.
In one of the most harrowing scenes in the film, Anakin enters the Jedi Temple. A group of young children, known as "younglings," emerge from hiding and plead for help. One steps forward, calling him "Master Skywalker," and asks what they are to do. Anakin responds by igniting his lightsaber. The screen cuts away, but the implication is unambiguous. Later, it is confirmed through dialogue and visual allusion that he slaughtered them all.
There is no ambiguity in the storytelling. The man who will become the galaxy’s most feared enforcer begins his descent by murdering defenseless children.
Part II: A New Kind of Evil in Youth-Oriented Media
For decades, cinema avoided certain taboos. Even films depicting war, genocide, or psychological horror rarely crossed the line into showing children as victims of deliberate violence by the protagonist. When children were harmed, it was by monstrous antagonists, supernatural forces, or offscreen implications. The killing of children was culturally reserved for historical atrocities and horror tales.
In Revenge of the Sith, this boundary was broken. While the film does not show the violence explicitly, the implication is so clear and so central to the character arc that its omission from visual depiction does not blunt the narrative weight. What makes this scene especially jarring is the tonal dissonance between the gravity of the act and the broader cultural treatment of Star Wars as a family-friendly saga. The juxtaposition of child-targeted marketing with a central plot involving child murder is not accidental—it reflects a deeper narrative and commercial structure.
This scene was not a deviation from the arc. It was the intended turning point.
Part III: Masculinity, Militarism, and the Appeal of the Anti-Hero
Darth Vader has long been idolized as a masculine icon. His towering presence, emotionless control, and mechanical voice exude power and discipline. Military institutions have quoted him. He is celebrated in memes, posters, and merchandise. Within the cultural imagination, he embodies dominance, command, and strategic ruthlessness.
For many young men, particularly those struggling with identity, agency, and perceived weakness, Vader becomes more than a character. He becomes an archetype: the man who reclaims power by embracing discipline, forsaking emotion, and exacting vengeance against those who betrayed him. The emotional pain that leads to his fall mirrors the experiences of isolation and perceived emasculation that many young men internalize in a fractured society.
The symbolism becomes dangerous. Anakin's descent into mass murder is portrayed not as the outcome of unchecked cruelty, but as a tragic mistake rooted in love and desperation. The implication is that under enough pressure, even the most horrific act can be framed as a step toward a noble end.
Part IV: Redemption as Narrative Alchemy
By the end of the original trilogy (Return of the Jedi, 1983), Darth Vader kills the Emperor to save his son Luke and dies shortly thereafter. Luke mourns him, honors him, and burns his body in reverence. In the final scene, Vader's ghost appears alongside Obi-Wan Kenobi and Yoda—the very men who once considered him the greatest betrayal of their order. He is welcomed back.
There is no reckoning. No mention of the younglings. No memorial to the dead. No consequence beyond his own internal torment.
This model of redemption is not uncommon in Western storytelling. In Christian doctrine, the concept of grace allows for any sin to be forgiven if the sinner repents sincerely. But in the context of secular mass culture, such redemption without justice becomes deeply troubling. The cultural message is clear: even the worst crimes can be erased if one makes a grand enough gesture at the end. It is the erasure of moral debt by narrative fiat.
The implication is not only that evil can be undone by good, but that power and legacy matter more than the victims. Vader is not just forgiven—he is exalted.
Part V: Real-World Reflections and Dangerous Scripts
In recent decades, the rise of mass violence in schools and public places has revealed a disturbing pattern: young men who feel alienated, betrayed, or powerless adopt mythic narratives of vengeance and transformation. They often see themselves as tragic figures forced into violence by a cruel world. Some explicitly reference pop culture, quoting films, invoking fictional characters, or modeling their identities after cinematic anti-heroes.
It would be reductive to claim Star Wars causes such events. But it is equally naive to believe that such narratives play no role in shaping the symbolic frameworks through which vulnerable individuals understand their lives. The story of Anakin Skywalker offers a dangerous script:
- You are betrayed.
- You suffer.
- You kill.
- You become powerful.
- You are redeemed.
When combined with militarized masculinity, institutional failure, and cultural nihilism, this script can validate the darkest impulses. It becomes a myth of sacrificial violence, with the perpetrator as misunderstood hero.
Part VI: Cultural Responsibility and Narrative Ethics
The problem is not that Star Wars tells a tragic story. Tragedy is essential to moral understanding. The problem is how the culture treats that story. Darth Vader is not treated as a warning, a cautionary tale, or a fallen angel. He is merchandised, celebrated, and decontextualized.
By separating his image from his actions, society rebrands him as a figure of cool dominance rather than ethical failure. The younglings are forgotten. The victims vanish. Only the redemption remains. The merchandise continues to sell.
Cultural institutions bear responsibility for how such narratives are presented and consumed. Filmmakers may intend nuance, but marketing departments, military institutions, and fan cultures often reduce that nuance to symbol and slogan.
Conclusion: Reckoning with the Stories We Tell
The story of Anakin Skywalker is not morally neutral. It is a tale of systemic failure, emotional collapse, and unchecked violence. When presented in full, it can serve as a powerful warning. But when reduced to aesthetic dominance and easy redemption, it becomes a tool of moral decay.
The glorification of Darth Vader as a cultural icon—divorced from the horrific acts that define his transformation—is not just misguided. It is dangerous. It trains a generation to believe that power erases guilt, that violence is a path to recognition, and that final acts of loyalty can overwrite the deliberate murder of the innocent.
To the uninitiated, Star Wars may seem like harmless fantasy. But its deepest myth—the redemption of the child-killer through familial love and posthumous honor—deserves scrutiny. Not because fiction causes violence, but because fiction defines the possibilities of how we understand evil, forgiveness, and what it means to be a hero.
We must ask: What kind of redemption erases the cries of murdered children? And what kind of culture finds peace in that forgetting?
-
@ 52b4a076:e7fad8bd
2025-05-03 21:54:45Introduction
Me and Fishcake have been working on infrastructure for Noswhere and Nostr.build. Part of this involves processing a large amount of Nostr events for features such as search, analytics, and feeds.
I have been recently developing
nosdex
v3, a newer version of the Noswhere scraper that is designed for maximum performance and fault tolerance using FoundationDB (FDB).Fishcake has been working on a processing system for Nostr events to use with NB, based off of Cloudflare (CF) Pipelines, which is a relatively new beta product. This evening, we put it all to the test.
First preparations
We set up a new CF Pipelines endpoint, and I implemented a basic importer that took data from the
nosdex
database. This was quite slow, as it did HTTP requests synchronously, but worked as a good smoke test.Asynchronous indexing
I implemented a high-contention queue system designed for highly parallel indexing operations, built using FDB, that supports: - Fully customizable batch sizes - Per-index queues - Hundreds of parallel consumers - Automatic retry logic using lease expiration
When the scraper first gets an event, it will process it and eventually write it to the blob store and FDB. Each new event is appended to the event log.
On the indexing side, a
Queuer
will read the event log, and batch events (usually 2K-5K events) into one work job. This work job contains: - A range in the log to index - Which target this job is intended for - The size of the job and some other metadataEach job has an associated leasing state, which is used to handle retries and prioritization, and ensure no duplication of work.
Several
Worker
s monitor the index queue (up to 128) and wait for new jobs that are available to lease.Once a suitable job is found, the worker acquires a lease on the job and reads the relevant events from FDB and the blob store.
Depending on the indexing type, the job will be processed in one of a number of ways, and then marked as completed or returned for retries.
In this case, the event is also forwarded to CF Pipelines.
Trying it out
The first attempt did not go well. I found a bug in the high-contention indexer that led to frequent transaction conflicts. This was easily solved by correcting an incorrectly set parameter.
We also found there were other issues in the indexer, such as an insufficient amount of threads, and a suspicious decrease in the speed of the
Queuer
during processing of queued jobs.Along with fixing these issues, I also implemented other optimizations, such as deprioritizing
Worker
DB accesses, and increasing the batch size.To fix the degraded
Queuer
performance, I ran the backfill job by itself, and then started indexing after it had completed.Bottlenecks, bottlenecks everywhere
After implementing these fixes, there was an interesting problem: The DB couldn't go over 80K reads per second. I had encountered this limit during load testing for the scraper and other FDB benchmarks.
As I suspected, this was a client thread limitation, as one thread seemed to be using high amounts of CPU. To overcome this, I created a new client instance for each
Worker
.After investigating, I discovered that the Go FoundationDB client cached the database connection. This meant all attempts to create separate DB connections ended up being useless.
Using
OpenWithConnectionString
partially resolved this issue. (This also had benefits for service-discovery based connection configuration.)To be able to fully support multi-threading, I needed to enabled the FDB multi-client feature. Enabling it also allowed easier upgrades across DB versions, as FDB clients are incompatible across versions:
FDB_NETWORK_OPTION_EXTERNAL_CLIENT_LIBRARY="/lib/libfdb_c.so"
FDB_NETWORK_OPTION_CLIENT_THREADS_PER_VERSION="16"
Breaking the 100K/s reads barrier
After implementing support for the multi-threaded client, we were able to get over 100K reads per second.
You may notice after the restart (gap) the performance dropped. This was caused by several bugs: 1. When creating the CF Pipelines endpoint, we did not specify a region. The automatically selected region was far away from the server. 2. The amount of shards were not sufficient, so we increased them. 3. The client overloaded a few HTTP/2 connections with too many requests.
I implemented a feature to assign each
Worker
its own HTTP client, fixing the 3rd issue. We also moved the entire storage region to West Europe to be closer to the servers.After these changes, we were able to easily push over 200K reads/s, mostly limited by missing optimizations:
It's shards all the way down
While testing, we also noticed another issue: At certain times, a pipeline would get overloaded, stalling requests for seconds at a time. This prevented all forward progress on the
Worker
s.We solved this by having multiple pipelines: A primary pipeline meant to be for standard load, with moderate batching duration and less shards, and high-throughput pipelines with more shards.
Each
Worker
is assigned a pipeline on startup, and if one pipeline stalls, other workers can continue making progress and saturate the DB.The stress test
After making sure everything was ready for the import, we cleared all data, and started the import.
The entire import lasted 20 minutes between 01:44 UTC and 02:04 UTC, reaching a peak of: - 0.25M requests per second - 0.6M keys read per second - 140MB/s reads from DB - 2Gbps of network throughput
FoundationDB ran smoothly during this test, with: - Read times under 2ms - Zero conflicting transactions - No overloaded servers
CF Pipelines held up well, delivering batches to R2 without any issues, while reaching its maximum possible throughput.
Finishing notes
Me and Fishcake have been building infrastructure around scaling Nostr, from media, to relays, to content indexing. We consistently work on improving scalability, resiliency and stability, even outside these posts.
Many things, including what you see here, are already a part of Nostr.build, Noswhere and NFDB, and many other changes are being implemented every day.
If you like what you are seeing, and want to integrate it, get in touch. :)
If you want to support our work, you can zap this post, or register for nostr.land and nostr.build today.
-
@ c1e9ab3a:9cb56b43
2025-05-01 17:29:18High-Level Overview
Bitcoin developers are currently debating a proposed change to how Bitcoin Core handles the
OP_RETURN
opcode — a mechanism that allows users to insert small amounts of data into the blockchain. Specifically, the controversy revolves around removing built-in filters that limit how much data can be stored using this feature (currently capped at 80 bytes).Summary of Both Sides
Position A: Remove OP_RETURN Filters
Advocates: nostr:npub1ej493cmun8y9h3082spg5uvt63jgtewneve526g7e2urca2afrxqm3ndrm, nostr:npub12rv5lskctqxxs2c8rf2zlzc7xx3qpvzs3w4etgemauy9thegr43sf485vg, nostr:npub17u5dneh8qjp43ecfxr6u5e9sjamsmxyuekrg2nlxrrk6nj9rsyrqywt4tp, others
Arguments: - Ineffectiveness of filters: Filters are easily bypassed and do not stop spam effectively. - Code simplification: Removing arbitrary limits reduces code complexity. - Permissionless innovation: Enables new use cases like cross-chain bridges and timestamping without protocol-level barriers. - Economic regulation: Fees should determine what data gets added to the blockchain, not protocol rules.
Position B: Keep OP_RETURN Filters
Advocates: nostr:npub1lh273a4wpkup00stw8dzqjvvrqrfdrv2v3v4t8pynuezlfe5vjnsnaa9nk, nostr:npub1s33sw6y2p8kpz2t8avz5feu2n6yvfr6swykrnm2frletd7spnt5qew252p, nostr:npub1wnlu28xrq9gv77dkevck6ws4euej4v568rlvn66gf2c428tdrptqq3n3wr, others
Arguments: - Historical intent: Satoshi included filters to keep Bitcoin focused on monetary transactions. - Resource protection: Helps prevent blockchain bloat and abuse from non-financial uses. - Network preservation: Protects the network from being overwhelmed by low-value or malicious data. - Social governance: Maintains conservative changes to ensure long-term robustness.
Strengths and Weaknesses
Strengths of Removing Filters
- Encourages decentralized innovation.
- Simplifies development and maintenance.
- Maintains ideological purity of a permissionless system.
Weaknesses of Removing Filters
- Opens the door to increased non-financial data and potential spam.
- May dilute Bitcoin’s core purpose as sound money.
- Risks short-term exploitation before economic filters adapt.
Strengths of Keeping Filters
- Preserves Bitcoin’s identity and original purpose.
- Provides a simple protective mechanism against abuse.
- Aligns with conservative development philosophy of Bitcoin Core.
Weaknesses of Keeping Filters
- Encourages central decision-making on allowed use cases.
- Leads to workarounds that may be less efficient or obscure.
- Discourages novel but legitimate applications.
Long-Term Consequences
If Filters Are Removed
- Positive: Potential boom in new applications, better interoperability, cleaner architecture.
- Negative: Risk of increased blockchain size, more bandwidth/storage costs, spam wars.
If Filters Are Retained
- Positive: Preserves monetary focus and operational discipline.
- Negative: Alienates developers seeking broader use cases, may ossify the protocol.
Conclusion
The debate highlights a core philosophical split in Bitcoin: whether it should remain a narrow monetary system or evolve into a broader data layer for decentralized applications. Both paths carry risks and tradeoffs. The outcome will shape not just Bitcoin's technical direction but its social contract and future role in the broader crypto ecosystem.
-
@ 04c915da:3dfbecc9
2025-05-16 17:59:23Recently we have seen a wave of high profile X accounts hacked. These attacks have exposed the fragility of the status quo security model used by modern social media platforms like X. Many users have asked if nostr fixes this, so lets dive in. How do these types of attacks translate into the world of nostr apps? For clarity, I will use X’s security model as representative of most big tech social platforms and compare it to nostr.
The Status Quo
On X, you never have full control of your account. Ultimately to use it requires permission from the company. They can suspend your account or limit your distribution. Theoretically they can even post from your account at will. An X account is tied to an email and password. Users can also opt into two factor authentication, which adds an extra layer of protection, a login code generated by an app. In theory, this setup works well, but it places a heavy burden on users. You need to create a strong, unique password and safeguard it. You also need to ensure your email account and phone number remain secure, as attackers can exploit these to reset your credentials and take over your account. Even if you do everything responsibly, there is another weak link in X infrastructure itself. The platform’s infrastructure allows accounts to be reset through its backend. This could happen maliciously by an employee or through an external attacker who compromises X’s backend. When an account is compromised, the legitimate user often gets locked out, unable to post or regain control without contacting X’s support team. That process can be slow, frustrating, and sometimes fruitless if support denies the request or cannot verify your identity. Often times support will require users to provide identification info in order to regain access, which represents a privacy risk. The centralized nature of X means you are ultimately at the mercy of the company’s systems and staff.
Nostr Requires Responsibility
Nostr flips this model radically. Users do not need permission from a company to access their account, they can generate as many accounts as they want, and cannot be easily censored. The key tradeoff here is that users have to take complete responsibility for their security. Instead of relying on a username, password, and corporate servers, nostr uses a private key as the sole credential for your account. Users generate this key and it is their responsibility to keep it safe. As long as you have your key, you can post. If someone else gets it, they can post too. It is that simple. This design has strong implications. Unlike X, there is no backend reset option. If your key is compromised or lost, there is no customer support to call. In a compromise scenario, both you and the attacker can post from the account simultaneously. Neither can lock the other out, since nostr relays simply accept whatever is signed with a valid key.
The benefit? No reliance on proprietary corporate infrastructure.. The negative? Security rests entirely on how well you protect your key.
Future Nostr Security Improvements
For many users, nostr’s standard security model, storing a private key on a phone with an encrypted cloud backup, will likely be sufficient. It is simple and reasonably secure. That said, nostr’s strength lies in its flexibility as an open protocol. Users will be able to choose between a range of security models, balancing convenience and protection based on need.
One promising option is a web of trust model for key rotation. Imagine pre-selecting a group of trusted friends. If your account is compromised, these people could collectively sign an event announcing the compromise to the network and designate a new key as your legitimate one. Apps could handle this process seamlessly in the background, notifying followers of the switch without much user interaction. This could become a popular choice for average users, but it is not without tradeoffs. It requires trust in your chosen web of trust, which might not suit power users or large organizations. It also has the issue that some apps may not recognize the key rotation properly and followers might get confused about which account is “real.”
For those needing higher security, there is the option of multisig using FROST (Flexible Round-Optimized Schnorr Threshold). In this setup, multiple keys must sign off on every action, including posting and updating a profile. A hacker with just one key could not do anything. This is likely overkill for most users due to complexity and inconvenience, but it could be a game changer for large organizations, companies, and governments. Imagine the White House nostr account requiring signatures from multiple people before a post goes live, that would be much more secure than the status quo big tech model.
Another option are hardware signers, similar to bitcoin hardware wallets. Private keys are kept on secure, offline devices, separate from the internet connected phone or computer you use to broadcast events. This drastically reduces the risk of remote hacks, as private keys never touches the internet. It can be used in combination with multisig setups for extra protection. This setup is much less convenient and probably overkill for most but could be ideal for governments, companies, or other high profile accounts.
Nostr’s security model is not perfect but is robust and versatile. Ultimately users are in control and security is their responsibility. Apps will give users multiple options to choose from and users will choose what best fits their need.
-
@ 9c9d2765:16f8c2c2
2025-05-25 08:26:53CHAPTER TWENTY EIGHT
“He’s not just surviving,” Helen hissed through clenched teeth, her heels striking the marble floors of her penthouse like war drums. “He’s thriving, and it’s infuriating.”
Mark leaned against the window, watching the evening lights of the city shimmer beneath them. “That transparency stunt he pulled? Genius,” he muttered. “It shut down every accusation we tried to plant before it could sprout.”
Helen turned abruptly. “Then we change the terrain. If he’s building on trust, we flood him with betrayal. We turn his loyalists into doubters.”
Mark raised a brow. “And how do you propose we do that?”
She walked over to the coffee table, picked up a manila envelope, and tossed it onto his lap. It opened with a quiet rustle, revealing photos some staged, others manipulated of James in ambiguous meetings, with headlines drafted in bold red: “JP President Linked to Foreign Espionage?”, “Undisclosed Meetings with Rival Companies.”
“These go live next week,” Helen said coldly. “And if we can’t break his empire from the outside, we’ll corrode it from within.”
Meanwhile, across the city, James stood in the training hall of JP Enterprises, overseeing a leadership seminar. The room brimmed with young professionals, eager minds molded by his vision. He paced slowly, hands behind his back.
“Leadership isn’t about dominance,” he said, his voice calm yet commanding. “It’s about service. True power lies in how many people rise because of you, not how many kneel before you.”
Applause followed, but James’s mind drifted. The storm was coming and he could feel it. The shadows hadn’t retreated; they’d merely been biding their time. But what Helen and Mark underestimated was the strength of what he’d built. This time, he wasn’t alone.
After the seminar, he returned to his office where Rita and Charles were already waiting.
“They’re not backing down,” Rita said, placing a thick fillet on his desk. “Our cybersecurity team intercepted metadata from an anonymous article scheduled to be released next Monday. It traces back to one of Helen’s known shell accounts.”
Charles leaned forward. “They’re targeting your integrity again, James. This time with international implications. If this goes public, it could trigger a full-scale investigation even if the claims are false.”
James took a deep breath. “Then it’s time to activate Project Aegis.”
Rita’s eyes widened. “You mean?”
“Yes,” James affirmed. “Full legal exposure. Every executive, every document, every deal for the last five years. We publish it ourselves before they can twist it.”
Charles nodded slowly, admiration gleaming in his eyes. “You're not just playing defense anymore.”
“No,” James said, his voice resolute. “I’m done playing. It’s time they learn integrity is not a weakness. It’s my greatest strength.”
That same night, Helen and Mark received a notification that sent chills down their spines. Every major news outlet was now broadcasting a preemptive report by JP Enterprises: “A Legacy in the Light JP Enterprises Opens Vaults to Public Scrutiny”. The article was followed by interviews with board members, stakeholders, and long-time employees all affirming James’s character and transparency.
Helen clenched her jaw, watching the screen with cold fury. “He’s rewriting the rules…” she muttered.
“No,” Mark whispered. “He’s building a world where we don’t exist.”
In the quiet of his penthouse office, James stood by the tall glass windows, the city’s nightscape shimmering beneath a sky painted in indigo hues. A cup of untouched coffee sat on the mahogany desk behind him. His reflection merged with the sprawling lights of a man once discarded, now the pillar of a corporate empire.
Despite the outward calm, James’s mind churned like a brewing storm. The recent smear campaign, although crushed by his proactive transparency, had planted seeds of uncertainty in some corners of the public. He knew Helen and Mark were far from surrendering. Their strategy had evolved into psychological warfare planting doubt, sowing division, manipulating perception.
“It’s time to start setting traps of our own,” he murmured under his breath.
He turned from the window as Charles entered the room, holding a tablet.
“It’s worse than we anticipated,” Charles began, concerned with furrowing his brow. “They’ve been funneling money through offshore accounts, paying journalists, bloggers, even some minor influencers to perpetuate false narratives. They’re not just trying to ruin your reputation, they're orchestrating a hostile takeover.”
James exhaled, slowly walking to his desk. “Then we play them at their own game but with honor. I want a full audit of every subsidiary tied to Ray Enterprises and Helen’s private ventures. Any shadow move they’ve made, I want it exposed legally, publicly, and without a hint of impropriety.”
Charles gave a resolute nod. “I’ll get our internal compliance team on it tonight.”
Meanwhile, across town, Helen sat before a marble fireplace in her lavish estate, her fingers tapping impatiently against a crystal glass of wine. Mark sat across from her, scrolling through dozens of negative online articles none of which were about James.
“He flipped the story again,” Mark said bitterly. “People are actually praising him for his transparency. Investors are swarming back. Even media outlets we bribed are retracting their pieces just to avoid a lawsuit.”
Helen’s eyes burned with fury. “Then we escalate. If he wants to play hero, we’ll paint him as a fraud who built an empire on stolen foundations. Everyone has a skeleton buried deep. We just need to find his.”
Back at JP Enterprises, James was meeting with Rita and a trusted cybersecurity analyst, a sharp-eyed woman named Lilian.
“We’ve traced an internal breach,” Lilian reported. “One of the forwarded articles that nearly made it to international outlets was leaked from someone inside our media division.”
Rita frowned. “Tracy.”
James nodded slowly. “She’s the thread connecting Mark and Helen’s plots. But she’s not alone. There’s another… more subtle player behind all this. And I intend to flush them out without alerting the rats.”
The next day, James called a confidential press meeting. With calm confidence, he unveiled The Integrity Initiative, a new transparency program offering unprecedented access to the inner workings of JP Enterprises for all stakeholders.
“We’ve built this company on the belief that truth withstands scrutiny,” he said, his voice echoing through the hall. “We have nothing to hide and for those trying to destroy us with lies, we welcome your eyes. Because when the truth stands tall, shadows disappear.”
The speech went viral within hours. Critics became advocates. Doubters became loyalists. And for Mark and Helen, the walls began to close in faster than they expected.
It had been two days since James’s press conference, and the atmosphere in the city’s business sphere had shifted noticeably. Conversations once filled with doubt and suspicion about JP Enterprises now carried admiration and curiosity. The sudden introduction of The Integrity Initiative had stirred an entirely new level of respect for the company and for James as its helmsman.
-
@ 86dfbe73:628cef55
2025-05-25 08:20:07Robustheit ist die Eigenschaft eines Systems, auch unter schwierigen Bedingungen funktionieren zu können: trotz Störungen und einer gewissen Verschlechterung seiner internen Prozesse. Das Leben als Ganzes ist robust. Dasselbe gilt für Ökosysteme: Sie können den Verlust einiger Arten überstehen und sich an veränderte Umweltbedingungen anpassen.
Der Hauptfeind der Robustheit ist das Streben nach Effizienz. Ein auf Effizienz optimiertes System hat keine Reserven mehr, sich an Störungen anzupassen. Es wird fragil. Wir optimieren die Gesellschaft und ihre Subsysteme (z. B. Institutionen) seit 5000 Jahren auf Wachstum, Effizienz und Produktivität. Und wir haben das Optimierungstempo mit den beiden Turbo-Boosts fossile Brennstoffe und Informationstechnologie beschleunigt. Deshalb ist alles um uns herum fragil geworden. Beispielsweise kann ein Virusausbruch in China sich zu einer Pandemie entwickeln, weil die Menschen weit und schnell reisen können und müssen.
Robustheit ist nicht absolut und dauerhaft. Ein System kann durch Störungen, die zu gravierend für es sind, fragil werden. Ehemals robuste Ökosysteme wie Regenwälder wurden durch menschliche Ausbeutung fragil. Deregulierung hat sowohl Regierungen als auch die Wirtschaft effizienter gemacht, allerdings zum Preis zunehmender Fragilität. Unternehmen sind mächtiger geworden als viele Staaten, was bedeutet, dass demokratisch gewählte Parlamente und Regierungen nicht mehr die Kontrolle haben. Heute kann eine einzelne Person demokratische Wahlen weltweit manipulieren, indem sie ein soziales Netzwerk kontrolliert. Das ist Fragilität pur.
Wir müssen als Gesellschaft die Effizienz in den Hintergrund rücken und uns mehr auf Robustheit konzentrieren.
-
@ ba3b4b1d:eadff0d3
2025-05-25 16:51:57por Gedaliah Braun
Sou um americano que leccionou filosofia em várias universidades africanas entre 1976 e 1988, e desde então vivo na África do Sul. Quando cheguei a África, praticamente não sabia nada sobre o continente ou os seus povos, mas comecei a aprender rapidamente. Notei, por exemplo, que os africanos raramente cumpriam promessas e não viam necessidade de se desculpar quando as quebravam. Era como se não tivessem consciência de que haviam feito algo que exigisse um pedido de desculpas.
Demorei muitos anos a compreender por que os africanos se comportavam assim, mas penso que agora posso explicar este e outros comportamentos que caracterizam África. Acredito que a moralidade requer pensamento abstrato — tal como o planeamento para o futuro — e que uma relativa deficiência no pensamento abstrato pode explicar muitas coisas que são tipicamente africanas.
O que se segue não são descobertas científicas. Pode haver explicações alternativas para o que observei, mas as minhas conclusões baseiam-se em mais de 30 anos a viver entre africanos.
As minhas primeiras suspeitas sobre o que pode ser uma deficiência no pensamento abstrato surgiram do que comecei a aprender sobre as línguas africanas. Numa conversa com estudantes na Nigéria, perguntei como se diria, na sua língua local, que um coco está a meio caminho da árvore. “Não se pode dizer isso”, explicaram. “Tudo o que se pode dizer é que está ‘lá em cima’.” “E no topo da árvore?” “Também não; apenas ‘lá em cima’.” Por outras palavras, parecia não haver forma de expressar gradações.
Alguns anos depois, em Nairobi, aprendi algo mais sobre as línguas africanas quando duas mulheres se mostraram surpreendidas com o meu dicionário de inglês. “O inglês não é a tua língua?”, perguntaram. “Sim”, respondi. “É a minha única língua.” “Então por que precisas de um dicionário?”
Elas estavam intrigadas com o facto de eu precisar de um dicionário, e eu estava intrigado com a sua perplexidade. Expliquei que há momentos em que ouvimos uma palavra da qual não temos a certeza e, por isso, a procuramos. “Mas se o inglês é a tua língua”, insistiram, “como pode haver palavras que não conheces?” “O quê?”, disse eu. “Ninguém conhece todas as palavras da sua língua.”
Concluí que uma relativa deficiência no pensamento abstrato pode explicar muitas coisas que são tipicamente africanas.
Línguas africanas e conceitos limitados “Mas nós conhecemos todas as palavras de Kikuyu; todos os Kikuyu as conhecem”, responderam. Fiquei ainda mais surpreendido, mas gradualmente percebi que, como a sua língua é totalmente oral, ela existe apenas nas mentes dos falantes de Kikuyu. Como há um limite para o que o cérebro humano pode reter, o tamanho total da língua permanece mais ou menos constante. Uma língua escrita, por outro lado, existindo parcialmente nas milhões de páginas do registo escrito, cresce muito além da capacidade de qualquer pessoa a conhecer na totalidade. Mas se o tamanho de uma língua é limitado, segue-se que o número de conceitos que ela contém também será limitado e, portanto, tanto a língua como o pensamento serão empobrecidos.
As línguas africanas eram, por necessidade, suficientes no seu contexto pré-colonial. São empobrecidas apenas por comparação com as línguas ocidentais e numa África que tenta emular o Ocidente. Embora tenham sido compilados numerosos dicionários entre línguas europeias e africanas, há poucos dicionários dentro de uma única língua africana, precisamente porque os falantes nativos não precisam deles. Encontrei um dicionário Zulu-Zulu, mas era um livro de bolso de pequeno formato com 252 páginas.
As minhas indagações sobre o Zulu começaram quando liguei para o Departamento de Línguas Africanas da Universidade de Witwatersrand, em Joanesburgo, e falei com um homem Branco. Existia “precisão” na língua Zulu antes do contacto com os europeus? “Oh”, disse ele, “essa é uma pergunta muito eurocêntrica!” e simplesmente não respondeu. Liguei novamente, falei com outro homem branco e recebi uma resposta praticamente idêntica.
Então, contactei a Universidade da África do Sul, uma grande universidade por correspondência em Pretória, e falei com um jovem negro. Como tantas vezes aconteceu na minha experiência em África, conectámo-nos imediatamente. Ele compreendeu o meu interesse pelo Zulu e achou as minhas perguntas muito interessantes. Explicou que a palavra Zulu para “precisão” significa “fazer como uma linha reta”. Era isso parte do Zulu indígena? Não; isso foi adicionado pelos compiladores do dicionário.
Mas, assegurou-me, era diferente com “promessa”. Eu estava céptico. E quanto a “obrigação”? Ambos tínhamos o mesmo dicionário (Dicionário Inglês-Zulu, Zulu-Inglês, publicado pela Witwatersrand University Press em 1958), e procurámos. A entrada Zulu para “obrigação” significa “como se estivesse a atar os pés”. Ele disse que isso não era indígena, mas foi adicionado pelos compiladores. Mas se o Zulu não tinha o conceito de obrigação, como poderia ter o conceito de promessa, já que uma promessa é simplesmente o compromisso oral de uma obrigação? Estava interessado nisso, disse eu, porque os africanos frequentemente não cumpriam promessas e nunca se desculpavam — como se isso não justificasse um pedido de desculpas.
Pareceu acender-se uma luz na sua mente. Sim, disse ele; de facto, a palavra Zulu para promessa — isithembiso — não é a palavra correcta. Quando uma pessoa negra “promete”, quer dizer “talvez o faça, talvez não”. Mas, disse eu, isso torna o ato de prometer sem sentido, já que o objetivo de uma promessa é vincular alguém a um curso de ação. Quando não se tem a certeza de poder fazer algo, pode-se dizer: “Vou tentar, mas não posso prometer.” Ele disse que tinha ouvido brancos dizerem isso e nunca o entendera até agora. Como um jovem amigo romeno resumiu tão apropriadamente, quando uma pessoa negra “promete”, quer dizer “vou tentar”. O incumprimento de promessas não é, portanto, um problema linguístico. É difícil acreditar que, após conviverem tanto tempo com os brancos, não aprendessem o significado correcto, e é demasiada coincidência que o mesmo fenómeno se encontre na Nigéria, no Quénia e na Papua-Nova Guiné, onde também vivi. É muito mais provável que os africanos, em geral, careçam do próprio conceito e, portanto, não possam dar à palavra o seu significado correcto. Isso parece indicar alguma diferença na capacidade intelectual.
Note-se a entrada Zulu para obrigação: “como se estivesse a atar os pés”. Uma obrigação vincula, mas fá-lo moralmente, não fisicamente. É um conceito abstrato, razão pela qual não há palavra para isso em Zulu. Então, o que fizeram os autores do dicionário? Pegaram neste conceito abstrato e tornaram-no concreto. Pés, corda e atar são coisas tangíveis e observáveis, e, portanto, coisas que todos os negros entenderão, enquanto muitos não compreenderão o que é uma obrigação. O facto de terem definido a palavra desta forma é, por si só, uma evidência convincente para a minha conclusão de que o pensamento Zulu tem poucos conceitos abstratos e uma evidência indirecta para a visão de que os africanos podem ser deficientes no pensamento abstrato.
Pensamento abstrato
Entidades abstratas não existem no espaço ou no tempo; são tipicamente intangíveis e não podem ser percebidas pelos sentidos. Muitas vezes, são coisas que não existem. “O que aconteceria se todos deitassem lixo por todo o lado?” refere-se a algo que esperamos que não aconteça, mas ainda podemos pensar sobre isso.
Tudo o que observamos com os nossos sentidos ocorre no tempo e tudo o que vemos existe no espaço; no entanto, não podemos perceber o tempo nem o espaço com os nossos sentidos, mas apenas com a mente. A precisão também é abstrata; embora possamos ver e tocar coisas feitas com precisão, a precisão em si só pode ser percebida pela mente.
Como adquirimos conceitos abstratos? É suficiente fazer coisas com precisão para ter o conceito de precisão? Os africanos fazem excelentes esculturas, feitas com precisão, então por que não está o conceito na sua língua? Para ter este conceito, não devemos apenas fazer coisas com precisão, mas estar cientes deste fenómeno e depois dar-lhe um nome.
Como, por exemplo, adquirimos conceitos como crença e dúvida? Todos temos crenças; até os animais as têm. Quando um cão abana a cauda ao ouvir os passos do seu dono, acredita que ele está a chegar. Mas não tem o conceito de crença porque não tem consciência de que tem essa crença e, portanto, não tem consciência da crença em si. Em resumo, não tem autoconsciência e, assim, não está ciente dos seus próprios estados mentais.
Há muito tempo me parece que os negros tendem a carecer de autoconsciência. Se tal consciência é necessária para desenvolver conceitos abstratos, não é surpreendente que as línguas africanas tenham tão poucos termos abstratos. A falta de autoconsciência — ou introspecção — tem vantagens. Na minha experiência, o comportamento neurótico, caracterizado por uma autoconsciência excessiva e pouco saudável, é incomum entre os negros. Também estou confiante de que a disfunção sexual, caracterizada por uma autoconsciência excessiva, é menos comum entre os negros do que entre os brancos.
O tempo é outro conceito abstrato com o qual os africanos parecem ter dificuldades. Comecei a pensar sobre isso em 1998. Vários africanos chegaram num carro e estacionaram mesmo à frente do meu, bloqueando-o. “Ei”, disse eu, “não podem estacionar aqui.” “Oh, estás prestes a sair?”, perguntaram de forma perfeitamente educada e amigável. “Não”, respondi, “mas posso querer sair mais tarde. Estacionem ali” — e eles o fizeram.
Embora a possibilidade de eu querer sair mais tarde fosse óbvia para mim, o pensamento deles parecia abranger apenas o aqui e agora: “Se estás a sair agora, entendemos, mas caso contrário, qual é o problema?” Tive outros encontros semelhantes e a questão-chave parecia ser sempre: “Estás a sair agora?” O futuro, afinal, não existe. Existirá, mas não existe agora. Pessoas que têm dificuldade em pensar em coisas que não existem terão, ipso facto, dificuldade em pensar no futuro.
Parece que a palavra Zulu para “futuro” — isikhati — é a mesma que para tempo, assim como para espaço. Realisticamente, isso significa que esses conceitos provavelmente não existem no pensamento Zulu. Também parece não haver palavra para o passado — ou seja, o tempo anterior ao presente. O passado existiu, mas já não existe. Assim, pessoas que podem ter problemas em pensar em coisas que não existem terão dificuldade em pensar no passado, assim como no futuro.
Isso tem um impacto óbvio em sentimentos como gratidão e lealdade, que há muito notei serem incomuns entre os africanos. Sentimos gratidão por coisas que aconteceram no passado, mas para aqueles com pouco senso do passado, tais sentimentos são menos prováveis de surgir. Por que demorei mais de 20 anos a notar tudo isso? Penso que é porque as nossas suposições sobre o tempo estão tão profundamente enraizadas que nem sequer temos consciência de as fazer e, portanto, a possibilidade de outros não as partilharem simplesmente não nos ocorre. E assim, não o vemos, mesmo quando a evidência está diante dos nossos olhos.
Matemática e manutenção Cito um artigo da imprensa sul-africana sobre os problemas que os negros têm com a matemática:
“[Xhosa] é uma língua onde polígono e plano têm a mesma definição … onde conceitos como triângulo, quadrilátero, pentágono, hexágono são definidos por uma única palavra.” (“Finding New Languages for Maths and Science,” Star [Joanesburgo], 24 de Julho de 2002, p. 8.)
Mais precisamente, esses conceitos simplesmente não existem em Xhosa, que, juntamente com o Zulu, é uma das duas línguas mais faladas na África do Sul. Na América, diz-se que os negros têm uma “tendência a aproximar espaço, números e tempo em vez de visar a precisão completa.” (Star, 8 de Junho de 1988, p.10.) Por outras palavras, também são fracos em matemática. Note-se o trio idêntico — espaço, números e tempo. Será apenas uma coincidência que esses três conceitos altamente abstratos sejam aqueles com os quais os negros — em todo o lado — parecem ter tantas dificuldades?
A entrada no dicionário Zulu para “número” — ningi — significa “numeroso”, o que não é de todo o mesmo que o conceito de número. Fica claro, portanto, que não há conceito de número em Zulu.
O domínio branco na África do Sul terminou em 1994. Cerca de dez anos depois, começaram os cortes de energia, que eventualmente atingiram proporções de crise. A principal razão para isso é simplesmente a falta de manutenção no equipamento de geração. A manutenção é orientada para o futuro, e a entrada Zulu no dicionário para isso é ondla, que significa: “1. Nutrir, criar; educar; 2. Vigiar; observar (a tua colheita).” Em resumo, não há tal coisa como manutenção no pensamento Zulu, e seria difícil argumentar que isso não está totalmente relacionado com o facto de que, quando as pessoas em África dizem “nada funciona”, é apenas um exagero.
O New York Times relata que a cidade de Nova Iorque está a considerar um plano (desde implementado) destinado a fazer com que os negros “se saiam bem em testes padronizados e compareçam às aulas”, pagando-lhes para fazer essas coisas e que poderiam “ganhar até 500 dólares por ano”. Os alunos receberiam dinheiro por frequentar regularmente a escola, por cada livro que lessem, por se saírem bem nos testes e, às vezes, apenas por os fazerem. Os pais seriam pagos por “manter um emprego a tempo inteiro … ter seguro de saúde … e assistir a conferências de pais e professores.” (Jennifer Medina, “Schools Plan to Pay Cash for Marks,” New York Times, 19 de Junho de 2007.) A implicação clara é que os negros não são muito motivados. A motivação envolve pensar no futuro e, portanto, em coisas que não existem. Dadas as deficiências dos negros neste aspecto, não é surpreendente que lhes falte motivação, e ter de os incentivar desta forma é mais uma evidência para tal deficiência.
A entrada Zulu para “motivar” é banga, sob a qual encontramos: “1. Fazer, causar, produzir algo desagradável; … causar problemas. … 2. Disputar uma reivindicação; … lutar por herança; … 3. Dirigir-se a, apontar para, viajar em direção a … .” No entanto, quando pergunto aos africanos o que banga significa, não fazem ideia. De facto, nenhuma palavra Zulu poderia referir-se à motivação pela simples razão de que não há tal conceito em Zulu; e se não há tal conceito, não pode haver uma palavra para ele. Isso ajuda a explicar a necessidade de pagar aos negros para se comportarem como se estivessem motivados.
Zulus O mesmo artigo do New York Times cita Darwin Davis, da Urban League, que “adverte que o … dinheiro oferecido [por frequentar as aulas] era relativamente insignificante … e questiona … quantos testes os alunos precisariam de passar para comprar o mais recente videojogo.” Em vez de se envergonhar pela própria necessidade de tal plano, este activista negro queixa-se de que os pagamentos não são suficientes! Se ele realmente não tem consciência de como as suas observações serão percebidas pela maioria dos leitores, é moralmente obtuso, mas as suas opiniões podem reflectir uma compreensão comum entre os negros do que é a moralidade: não algo internalizado, mas algo que os outros impõem de fora. Daí a sua queixa de que pagar às crianças para fazerem coisas que deveriam estar motivadas a fazer por si próprias não é suficiente.
Neste contexto, lembro-me de algumas descobertas notáveis do falecido linguista americano William Stewart, que passou muitos anos no Senegal a estudar línguas locais. Enquanto as culturas ocidentais internalizam normas — “Não faças isso!” para uma criança torna-se eventualmente “Eu não devo fazer isso” para um adulto — as culturas africanas não o fazem. Dependem inteiramente de controlos externos sobre o comportamento, vindos de anciãos tribais e outras fontes de autoridade. Quando os africanos foram destribalizados, esses controlos externos desapareceram, e como nunca houve controlos internos, os resultados foram crime, drogas, promiscuidade, etc. Onde houve outras formas de controlo — como na África do Sul governada por brancos, na África colonial ou no Sul segregado dos EUA — este comportamento foi mantido dentro de limites toleráveis. Mas quando mesmo esses controlos desaparecem, muitas vezes há violência desenfreada.
Stewart aparentemente nunca perguntou por que as culturas africanas não internalizavam normas, ou seja, por que nunca desenvolveram uma consciência moral, mas é improvável que isso tenha sido apenas um acidente histórico. Mais provavelmente, foi o resultado de deficiências na capacidade de pensamento abstrato.
Evolução e pensamento abstrato Uma explicação para esta falta de pensamento abstrato, incluindo a compreensão diminuída do tempo, é que os africanos evoluíram num clima onde podiam viver dia a dia sem precisar de pensar no futuro. Nunca desenvolveram essa capacidade porque não havia necessidade dela. Os brancos, por outro lado, evoluíram em circunstâncias em que tinham de considerar o que aconteceria se não construíssem casas robustas e armazenassem combustível e comida suficientes para o inverno. Para eles, era afundar ou nadar.
Uma confirmação surpreendente das ideias de Stewart pode ser encontrada na edição de Maio/Junho de 2006 da Boston Review, uma publicação tipicamente liberal. Em “Do the Right Thing: Cognitive Science’s Search for a Common Morality,” Rebecca Saxe distingue entre regras “convencionais” e “morais”. As regras convencionais são apoiadas por autoridades, mas podem ser alteradas; as regras morais, por outro lado, não se baseiam na autoridade convencional e não estão sujeitas a mudanças. “Mesmo crianças de três anos … distinguem entre transgressões morais e convencionais”, escreve ela. A única excepção, segundo James Blair, dos Institutos Nacionais de Saúde, são os psicopatas, que exibem “comportamento agressivo persistente”. Para eles, todas as regras se baseiam apenas na autoridade externa, na ausência da qual “tudo é permitido”. A conclusão tirada é que “indivíduos saudáveis em todas as culturas respeitam a distinção entre regras convencionais … e morais.” No entanto, no mesmo artigo, outra antropóloga argumenta que “o estatuto especial das regras morais não pode ser parte da natureza humana, mas é … apenas … um artefacto dos valores ocidentais.” Anita Jacobson-Widding, escrevendo sobre as suas experiências entre os Manyika do Zimbabué, diz: “Tentei encontrar uma palavra que correspondesse ao conceito inglês de ‘moralidade.’ Expliquei o que queria dizer perguntando aos meus informantes que descrevessem as normas para o bom comportamento em relação a outras pessoas. A resposta foi unânime. A palavra para isso era tsika. Mas quando pedi aos meus informantes bilingues para traduzirem tsika para o inglês, eles disseram que era ‘boas maneiras’ …”
Ela concluiu que, como as boas maneiras são claramente regras convencionais e não morais, os Manyika simplesmente não tinham um conceito de moralidade. Mas como se explicaria essa ausência? A explicação de Jacobson-Widding é o disparate típico que só poderia vir de um chamado intelectual: “o conceito de moralidade não existe.” A explicação muito mais provável é que o conceito de moralidade, embora universal em outros aspectos, é enfraquecido em culturas que têm uma deficiência no pensamento abstrato.
De acordo com uma sabedoria popular agora desacreditada, os negros são “crianças em corpos adultos”, mas pode haver alguma base para essa visão. O adulto africano médio tem o mesmo QI bruto que uma criança branca de 11 anos. Essa é aproximadamente a idade em que as crianças brancas começam a internalizar a moralidade e já não precisam de reforços externos tão fortes.
Crueldade gratuita Outro aspecto do comportamento africano que os liberais fazem o seu melhor para ignorar, mas que, no entanto, requer uma explicação, é a crueldade gratuita. Um revisor do livro Driving South, de David Robbins (1993), escreve:
“Um assistente social do Cabo vê elementos que se deleitam com a violência … É como um culto que abraçou muitas pessoas que, de outra forma, parecem normais. … À menor provocação, o seu desejo de sangue é despertado. E então querem ver morte, e zombam e ridicularizam o sofrimento envolvido, especialmente o sofrimento de uma morte lenta e agonizante.” (Citizen [Joanesburgo], 12 de Julho de 1993, p.6.)
Há algo tão indizivelmente vil nisso, algo tão além da depravação, que o cérebro humano recua. Isso não é apenas a ausência de empatia humana, mas o prazer positivo no sofrimento humano, ainda mais quando é “lento e agonizante”. Consegue imaginar zombar e ridicularizar alguém em tal agonia horrível?
Durante a era do apartheid, os activistas negros costumavam matar traidores e inimigos pelo método de “colar” (necklacing). Um pneu velho era colocado ao redor do pescoço da vítima, enchido com gasolina, e — é melhor deixar um testemunha ocular descrever o que acontecia a seguir:
“O pneu cheio de gasolina é colocado nos teus ombros e um isqueiro é colocado ao teu alcance. … Os teus dedos são quebrados, agulhas são enfiadas pelo teu nariz e és torturado até acenderes o isqueiro na gasolina tu mesmo.” (Citizen; “SA’s New Nazis,” 10 de Agosto de 1993, p.18.) O autor de um artigo no Chicago Tribune, descrevendo a forma igualmente horrível como os Hutu mataram Tutsi nos massacres do Burundi, maravilhou-se com “o êxtase de matar, a luxúria pelo sangue; este é o pensamento mais horrível. Está além do meu alcance.” (“Hutu Killers Danced In Blood Of Victims, Videotapes Show,” Chicago Tribune, 14 de Setembro de 1995, p.8.) A falta de qualquer senso moral é ainda mais evidenciada pelo facto de terem gravado os seus crimes em vídeo, “aparentemente querendo registá-los … para a posteridade.” Ao contrário dos criminosos de guerra, que escondiam as suas façanhas, essas pessoas aparentemente tinham orgulho no seu trabalho.
Em 1993, Amy Biehl, uma americana de 26 anos com uma bolsa Fulbright, vivia na África do Sul, onde passava a maior parte do seu tempo em bairros negros ajudando negros. Um dia, enquanto levava três amigos africanos para casa, jovens negros pararam o carro, arrastaram-na para fora e mataram-na porque era branca. Um juiz sul-africano aposentado, Rex van Schalkwyk, no seu livro de 1998 One Miracle is Not Enough, cita um relatório de jornal sobre o julgamento dos seus assassinos: “Os apoiantes dos três homens acusados de assassinar [ela] … desataram a rir na galeria pública do Supremo Tribunal hoje quando uma testemunha disse como a mulher espancada gemeu de dor.” Esse comportamento, escreveu Van Schalkwyk, “é impossível de explicar em termos acessíveis a mentes racionais.” (pp. 188-89.)
Esses incidentes e as respostas que evocam — “o cérebro humano recua”, “além do meu alcance”, “impossível de explicar a mentes racionais” — representam um padrão de comportamento e pensamento que não pode ser ignorado, e oferecem suporte adicional para a minha alegação de que os africanos são deficientes em consciência moral.
Violação e amor
Há muito suspeito que a ideia de violação não é a mesma em África como em outros lugares, e agora encontro confirmação disso na Newsweek: “De acordo com um estudo de três anos [em Joanesburgo] … mais da metade dos jovens entrevistados — tanto homens como mulheres — acredita que forçar sexo com alguém que conheces não constitui violência sexual … [A] maneira casual com que os adolescentes sul-africanos discutem relações coercivas e sexo desprotegido é impressionante.” (Tom Masland, “Breaking The Silence,” Newsweek, 9 de Julho de 2000.)
Claramente, muitos negros não acham que a violação é algo de que se envergonhar.
O autor da Newsweek está intrigado com o comportamento generalizado que se sabe levar à SIDA, perguntando “Por que o esforço pelo sexo seguro falhou tão abjectamente?” Bem, além das suas atitudes profundamente diferentes em relação ao sexo e à violência e da sua libido elevada, um factor importante pode ser o seu conceito diminuído de tempo e a capacidade reduzida de pensar no futuro.
No entanto, fiquei surpreendido com o que encontrei no dicionário Zulu. A entrada principal para violação diz: “1. Agir apressadamente; … 2. Ser ganancioso. 3. Roubar, saquear, … tomar [posses] pela força.” Embora essas entradas possam estar relacionadas com o nosso conceito de violação, há um pequeno problema: não há referência a relações sexuais! Numa cultura dominada por homens, onde dizer “não” muitas vezes não é uma opção (como confirmado pelo estudo mencionado), “tomar sexo pela força” não faz realmente parte do cálculo mental africano. A violação tem claramente uma dimensão moral, mas talvez não para os africanos. Na medida em que não consideram o sexo forçado como errado, então, pela nossa concepção, não podem considerá-lo violação, porque a violação é errada. Se tal comportamento não é errado, não é violação.
Um artigo sobre violação em grupo no jornal britânico de esquerda, The Guardian, confirma isso quando cita uma jovem negra: “A questão é que eles [homens negros] não o vêem como violação, como nós sendo forçadas. Eles apenas o vêem como prazer para eles.” (Rose George, “They Don’t See it as Rape. They Just See it as Pleasure for Them,” 5 de Junho de 2004.) Uma atitude semelhante parece ser partilhada entre alguns negros americanos que se referem casualmente à violação em grupo como “correr um comboio”. (Nathan McCall, Makes Me Wanna Holler, Vintage Books, 1995.)
Se a compreensão africana de violação está tão distante, também pode estar a sua ideia de romantismo ou amor. Recentemente assisti a um programa de televisão sul-africano sobre fazer sexo por dinheiro. Das várias mulheres na audiência que falaram, nenhuma questionou a moralidade desse comportamento. De facto, uma perguntou lamentavelmente: “Por que mais eu faria sexo com um homem?”
Pela forma casual como os africanos usam a palavra “amor”, suspeito que a sua compreensão dela é, na melhor das hipóteses, infantil. Suspeito que a noção é alheia aos africanos, e ficaria surpreendido se as coisas fossem muito diferentes entre os negros americanos. Os africanos ouvem os brancos falar de “amor” e tentam dar-lhe um significado dentro do seu próprio repertório conceptual. O resultado é uma concepção infantil desta emoção humana mais profunda, provavelmente semelhante ao seu mal-entendido sobre a natureza de uma promessa.
Recentemente localizei um documento que me foi ditado por uma jovem africana em Junho de 1993. Ela chamou-lhe a sua “história”, e o parágrafo final é uma ilustração comovente do que, para os europeus, pareceria uma compreensão limitada do amor:
“No meu caminho de volta da escola, conheci um rapaz. E ele me pediu em namoro. O nome dele era Mokone. Ele disse-me que me amava. E então eu disse-lhe que lhe daria a minha resposta na próxima semana. À noite, estava louca por ele. Estava sempre a pensar nele.”
Cegueira moral
Sempre que ensinava ética, usava o exemplo de Alfred Dreyfus, um oficial judeu do exército francês que foi condenado por traição em 1894, embora as autoridades soubessem que ele era inocente. Admitir o erro, dizia-se, teria um efeito desastroso no moral militar e causaria grande agitação social. Eu argumentava que certas coisas são intrinsecamente erradas e não apenas por causa das suas consequências. Mesmo que os resultados de libertar Dreyfus fossem muito piores do que mantê-lo na prisão, ele deveria ser libertado, porque é injusto manter um homem inocente preso.
Para meu espanto, uma classe inteira no Quénia disse sem hesitação que ele não deveria ser libertado. Chamem-me obtuso se quiserem, mas demorei 20 anos para que o significado pleno disso começasse a fazer sentido para mim.
Subjunctividade e contrafactualidade
A morte é certa, mas os acidentes não são. Acredito que os africanos, em geral, podem carecer dos conceitos de subjunctividade e contrafactualidade. A subjunctividade é expressa em afirmações como: “O que terias feito se eu não tivesse aparecido?” Isso é contrário ao facto porque eu apareci, e agora é impossível que eu não tenha aparecido. Estamos a pedir a alguém que imagine o que teria feito se algo que não aconteceu (e agora não poderia acontecer) tivesse acontecido. Isso requer autoconsciência, e já descrevi a possível deficiência dos negros neste aspecto. É óbvio que os animais, por exemplo, não podem pensar contrafactualmente, devido à sua completa falta de autoconsciência.
Quando alguém que conheço tentou persuadir os seus trabalhadores africanos a contribuir para um seguro de saúde, eles perguntaram: “Para que serve?” “Bem, se tiveres um acidente, pagaria o hospital.” A resposta deles foi imediata: “Mas chefe, não tivemos um acidente!” “Sim, mas e se tivesses?” Resposta? “Não tivemos um acidente!” Fim da história.
Curiosamente, os negros planeiam funerais, pois, embora um acidente seja apenas um risco, a morte é uma certeza. (As entradas Zulu para “risco” são “perigo” e “uma superfície escorregadia”.) Dada a natureza frequentemente tudo-ou-nada do pensamento negro, se não é certo que terás um acidente, então não terás um acidente. Além disso, a morte é concreta e observável: Vemos as pessoas envelhecerem e morrerem. Os africanos tendem a estar cientes do tempo quando ele se manifesta de forma concreta e observável.
Uma das ideias centrais que sustentam a moralidade é a Regra de Ouro: faz aos outros o que gostarias que te fizessem a ti. “Como te sentirias se alguém roubasse tudo o que tens? Bem, é assim que ele se sentiria se tu o roubasses.” A subjunctividade aqui é óbvia. Mas se os africanos, em geral, carecem deste conceito, terão dificuldade em entender a Regra de Ouro e, consequentemente, em entender a moralidade.
Se isso for verdade, também poderíamos esperar que a sua capacidade de empatia humana seja diminuída, e isso é sugerido nos exemplos citados acima. Afinal, como empatizamos? Quando ouvimos falar de coisas como “colar” (necklacing), instintiva — e inconscientemente — pensamos: “Como me sentiria se fosse aquela pessoa?” Claro que não sou e não posso ser essa pessoa, mas imaginar ser essa pessoa dá-nos informações morais valiosas: que não quereríamos que isso nos acontecesse e, portanto, não devemos querer que aconteça aos outros. Na medida em que as pessoas são deficientes nesse pensamento abstrato, serão deficientes na compreensão moral e, consequentemente, na empatia humana — o que é o que tendemos a encontrar nos africanos.
No seu livro de 1990, Devil’s Night, Ze’ev Chafets cita uma mulher negra falando sobre os problemas de Detroit: “Sei que algumas pessoas não vão gostar disto, mas sempre que tens muitos negros juntos, vais ter problemas. Os negros são ignorantes e rudes.” (pp. 76-77.)
Se alguns africanos não conseguem imaginar claramente como o seu próprio comportamento rude se sente para os outros — por outras palavras, se não conseguem colocar-se no lugar do outro — serão incapazes de entender o que é a grosseria. Para eles, o que chamamos de rude pode ser normal e, portanto, do seu ponto de vista, não realmente rude. Os africanos podem, portanto, não se ofender com comportamentos que consideraríamos rudes — como não cumprir compromissos, por exemplo. Pode-se até conjecturar que a crueldade africana não é a mesma que a crueldade branca, uma vez que os africanos podem não estar totalmente cientes da natureza do seu comportamento, enquanto tal consciência é uma parte essencial da “verdadeira” crueldade.
Não sou de forma alguma o único a notar esta aparente inconsciência em relação aos outros que por vezes caracteriza o comportamento negro. Walt Harrington, um liberal branco casado com uma negra de pele clara, faz algumas admissões surpreendentes no seu livro de 1994, Crossings: A White Man’s Journey Into Black America:
“Reparo num carro pequeno … ao longe. De repente … um saco de lixo voa pela janela. … Penso, aposto que são negros. Ao longo dos anos, notei mais negros a deitar lixo do que brancos. Odeio admitir isso porque é um preconceito. Mas ao passar pelo carro, vejo que o meu reflexo estava correcto — [são negros]. “[Ao entrar] num drive-through do McDonald’s … [vejo que] o carro à minha frente tinha quatro negros. Novamente … a minha mente fez o seu cálculo inconsciente: Vamos ficar aqui para sempre enquanto estas pessoas decidem o que pedir. Literalmente abanei a cabeça. … Meu Deus, os meus filhos são meio negros! Mas então o golpe: esperamos e esperamos e esperamos. Cada um dos quatro … debruçou-se pela janela e pediu individualmente. O pedido foi alterado várias vezes. Ficámos e ficámos, e eu voltei a abanar a cabeça, desta vez pelo enigma que é a raça na América.
“Sabia que o sentimento enterrado que me fez prever esta desorganização … era … racista. … Mas a minha previsão estava correcta.” (pp. 234-35.) Os africanos também tendem a deitar lixo. Para entender isso, devemos perguntar por que os brancos não deitam lixo, pelo menos não tanto. Perguntamo-nos: “O que aconteceria se todos deitassem lixo por todo o lado? Seria uma confusão. Então não deves fazê-lo!” A possível deficiência dos negros no pensamento abstrato torna esse raciocínio mais difícil, pelo que qualquer comportamento que exija esse pensamento é menos provável de se desenvolver nas suas culturas. Mesmo após viverem por gerações em sociedades onde esse pensamento é comum, muitos podem ainda não o absorver.
Aplicação aos negros americanos Até que ponto as minhas observações sobre os africanos se aplicam aos negros americanos? Os negros americanos têm um QI médio de 85, que é 15 pontos mais alto que a média africana de 70. A capacidade para o pensamento abstrato está, sem dúvida, correlacionada com a inteligência, e por isso podemos esperar que os negros americanos, em geral, superem os africanos nestes aspectos.
Ainda assim, os negros americanos mostram muitos dos traços tão marcantes entre os africanos: baixa capacidade matemática, raciocínio abstrato diminuído, altas taxas de criminalidade, horizonte temporal curto, grosseria, lixo, etc. Se eu tivesse vivido apenas entre negros americanos e não entre africanos, talvez nunca tivesse chegado às conclusões que tenho, mas o comportamento mais extremo entre os africanos torna mais fácil perceber as mesmas tendências entre os negros americanos.
Gedaliah Braun possui um doutoramento em filosofia e é o autor de Racism, Guilt, Self-Hatred and Self-Deceit. Quem estiver interessado em ler o seu livro pode adquiri-lo em formato PDF no site da AR, AmRen.com.
-
@ 7460b7fd:4fc4e74b
2025-05-21 02:35:36如果比特币发明了真正的钱,那么 Crypto 是什么?
引言
比特币诞生之初就以“数字黄金”姿态示人,被支持者誉为人类历史上第一次发明了真正意义上的钱——一种不依赖国家信用、总量恒定且不可篡改的硬通货。然而十多年过去,比特币之后蓬勃而起的加密世界(Crypto)已经远超“货币”范畴:从智能合约平台到去中心组织,从去央行的稳定币到戏谑荒诞的迷因币,Crypto 演化出一个丰富而混沌的新生态。这不禁引发一个根本性的追问:如果说比特币解决了“真金白银”的问题,那么 Crypto 又完成了什么发明?
Crypto 与政治的碰撞:随着Crypto版图扩张,全球政治势力也被裹挟进这场金融变革洪流(示意图)。比特币的出现重塑了货币信用,但Crypto所引发的却是一场更深刻的政治与治理结构实验。从华尔街到华盛顿,从散户论坛到主权国家,越来越多人意识到:Crypto不只是技术或金融现象,而是一种全新的政治表达结构正在萌芽。正如有激进论者所断言的:“比特币发明了真正的钱,而Crypto则在发明新的政治。”价格K线与流动性曲线,或许正成为这个时代社群意志和社会价值观的新型投射。
冲突结构:当价格挑战选票
传统政治中,选票是人民意志的载体,一人一票勾勒出民主治理的正统路径。而在链上的加密世界里,骤升骤降的价格曲线和真金白银的买卖行为却扮演起了选票的角色:资金流向成了民意走向,市场多空成为立场表决。价格行为取代选票,这听来匪夷所思,却已在Crypto社群中成为日常现实。每一次代币的抛售与追高,都是社区对项目决策的即时“投票”;每一根K线的涨跌,都折射出社区意志的赞同或抗议。市场行为本身承担了决策权与象征权——价格即政治,正在链上蔓延。
这一新生政治形式与旧世界的民主机制形成了鲜明冲突。bitcoin.org中本聪在比特币白皮书中提出“一CPU一票”的工作量证明共识,用算力投票取代了人为决策bitcoin.org。而今,Crypto更进一步,用资本市场的涨跌来取代传统政治的选举。支持某项目?直接购入其代币推高市值;反对某提案?用脚投票抛售资产。相比漫长的选举周期和层层代议制,链上市场提供了近乎实时的“公投”机制。但这种机制也引发巨大争议:资本的投票天然偏向持币多者(富者)的意志,是否意味着加密政治更为金权而非民权?持币多寡成为影响力大小,仿佛选举演变成了“一币一票”,巨鲸富豪俨然掌握更多话语权。这种与民主平等原则的冲突,成为Crypto政治形式饱受质疑的核心张力之一。
尽管如此,我们已经目睹市场投票在Crypto世界塑造秩序的威力:2016年以太坊因DAO事件分叉时,社区以真金白银“投票”决定了哪条链获得未来。arkhamintelligence.com结果是新链以太坊(ETH)成为主流,其市值一度超过2,800亿美元,而坚持原则的以太经典(ETC)市值不足35亿美元,不及前者的八十分之一arkhamintelligence.com。市场选择清楚地昭示了社区的政治意志。同样地,在比特币扩容之争、各类硬分叉博弈中,无不是由投资者和矿工用资金与算力投票,胜者存续败者黯然。价格成为裁决纷争的最终选票,冲击着传统“选票决胜”的政治理念。Crypto的价格民主,与现代代议民主正面相撞,激起当代政治哲思中前所未有的冲突火花。
治理与分配
XRP对决SEC成为了加密世界“治理与分配”冲突的经典战例。2020年底,美国证券交易委员会(SEC)突然起诉Ripple公司,指控其发行的XRP代币属于未注册证券,消息一出直接引爆市场恐慌。XRP价格应声暴跌,一度跌去超过60%,最低触及0.21美元coindesk.com。曾经位居市值前三的XRP险些被打入谷底,监管的强硬姿态似乎要将这个项目彻底扼杀。
然而XRP社区没有选择沉默。 大批长期持有者组成了自称“XRP军团”(XRP Army)的草根力量,在社交媒体上高调声援Ripple,对抗监管威胁。面对SEC的指控,他们集体发声,质疑政府选择性执法,声称以太坊当年发行却“逍遥法外”,只有Ripple遭到不公对待coindesk.com。正如《福布斯》的评论所言:没人预料到愤怒的加密散户投资者会掀起法律、政治和社交媒体领域的‘海啸式’反击,痛斥监管机构背弃了保护投资者的承诺crypto-law.us。这种草根抵抗监管的话语体系迅速形成:XRP持有者不但在网上掀起舆论风暴,还采取实际行动向SEC施压。他们发起了请愿,抨击SEC背离保护投资者初衷、诉讼给个人投资者带来巨大伤害,号召停止对Ripple的上诉纠缠——号称这是在捍卫全球加密用户的共同利益bitget.com。一场由民间主导的反监管运动就此拉开帷幕。
Ripple公司则选择背水一战,拒绝和解,在法庭上与SEC针锋相对地鏖战了近三年之久。Ripple坚称XRP并非证券,不应受到SEC管辖,即使面临沉重法律费用和业务压力也不妥协。2023年,这场持久战迎来了标志性转折:美国法庭作出初步裁决,认定XRP在二级市场的流通不构成证券coindesk.com。这一胜利犹如给沉寂已久的XRP注入强心针——消息公布当天XRP价格飙涨近一倍,盘中一度逼近1美元大关coindesk.com。沉重监管阴影下苟延残喘的项目,凭借司法层面的突破瞬间重获生机。这不仅是Ripple的胜利,更被支持者视为整个加密行业对SEC强权的一次胜仗。
XRP的对抗路线与某些“主动合规”的项目形成了鲜明对比。 稳定币USDC的发行方Circle、美国最大合规交易所Coinbase等选择了一条迎合监管的道路:它们高调拥抱现行法规,希望以合作换取生存空间。然而现实却给了它们沉重一击。USDC稳定币在监管风波中一度失去美元锚定,哪怕Circle及时披露储备状况也无法阻止恐慌蔓延,大批用户迅速失去信心,短时间内出现数十亿美元的赎回潮blockworks.co。Coinbase则更为直接:即便它早已注册上市、反复向监管示好,2023年仍被SEC指控为未注册证券交易所reuters.com,卷入漫长诉讼漩涡。可见,在迎合监管的策略下,这些机构非但未能换来监管青睐,反而因官司缠身或用户流失而丧失市场信任。 相比之下,XRP以对抗求生存的路线反而赢得了投资者的眼光:价格的涨跌成为社区投票的方式,抗争的勇气反过来强化了市场对它的信心。
同样引人深思的是另一种迥异的治理路径:技术至上的链上治理。 以MakerDAO为代表的去中心化治理模式曾被寄予厚望——MKR持币者投票决策、算法维持稳定币Dai的价值,被视为“代码即法律”的典范。然而,这套纯技术治理在市场层面却未能形成广泛认同,亦无法激发群体性的情绪动员。复杂晦涩的机制使得普通投资者难以参与其中,MakerDAO的治理讨论更多停留在极客圈子内部,在社会大众的政治对话中几乎听不见它的声音。相比XRP对抗监管所激发的铺天盖地关注,MakerDAO的治理实验显得默默无闻、难以“出圈”。这也说明,如果一种治理实践无法连接更广泛的利益诉求和情感共鸣,它在社会政治层面就难以形成影响力。
XRP之争的政治象征意义由此凸显: 它展示了一条“以市场对抗国家”的斗争路线,即通过代币价格的集体行动来回应监管权力的施压。在这场轰动业界的对决中,价格即是抗议的旗帜,涨跌映射着政治立场。XRP对SEC的胜利被视作加密世界向旧有权力宣告的一次胜利:资本市场的投票器可以撼动监管者的强权。这种“价格即政治”的张力,正是Crypto世界前所未有的社会实验:去中心化社区以市场行为直接对抗国家权力,在无形的价格曲线中凝聚起政治抗争的力量,向世人昭示加密货币不仅有技术和资本属性,更蕴含着不可小觑的社会能量和政治意涵。
不可归零的政治资本
Meme 币的本质并非廉价或易造,而在于其构建了一种“无法归零”的社群生存结构。 对于传统观点而言,多数 meme 币只是短命的投机游戏:价格暴涨暴跌后一地鸡毛,创始人套现跑路,投资者血本无归,然后“大家转去炒下一个”theguardian.com。然而,meme 币社群的独特之处在于——失败并不意味着终结,而更像是运动的逗号而非句号。一次币值崩盘后,持币的草根们往往并未散去;相反,他们汲取教训,准备东山再起。这种近乎“不死鸟”的循环,使得 meme 币运动呈现出一种数字政治循环的特质:价格可以归零,但社群的政治热情和组织势能不归零。正如研究者所指出的,加密领域中的骗局、崩盘等冲击并不会摧毁生态,反而成为让系统更加强韧的“健康应激”,令整个行业在动荡中变得更加反脆弱cointelegraph.com。对应到 meme 币,每一次暴跌和重挫,都是社群自我进化、卷土重来的契机。这个去中心化群体打造出一种自组织的安全垫,失败者得以在瓦砾上重建家园。对于草根社群、少数派乃至体制的“失败者”而言,meme 币提供了一个永不落幕的抗争舞台,一种真正反脆弱的政治性。正因如此,我们看到诸多曾被嘲笑的迷因项目屡败屡战:例如 Dogecoin 自2013年问世后历经八年沉浮,早已超越玩笑属性,成为互联网史上最具韧性的迷因之一frontiersin.org;支撑 Dogecoin 的正是背后强大的迷因文化和社区意志,它如同美国霸权支撑美元一样,为狗狗币提供了“永不中断”的生命力frontiersin.org。
“复活权”的数字政治意涵
这种“失败-重生”的循环结构蕴含着深刻的政治意涵:在传统政治和商业领域,一个政党选举失利或一家公司破产往往意味着清零出局,资源散尽、组织瓦解。然而在 meme 币的世界,社群拥有了一种前所未有的“复活权”。当项目崩盘,社区并不必然随之消亡,而是可以凭借剩余的人心和热情卷土重来——哪怕换一个 token 名称,哪怕重启一条链,运动依然延续。正如 Cheems 项目的核心开发者所言,在几乎无人问津、技术受阻的困境下,大多数人可能早已卷款走人,但 “CHEEMS 社区没有放弃,背景、技术、风投都不重要,重要的是永不言弃的精神”cointelegraph.com。这种精神使得Cheems项目起死回生,社区成员齐声宣告“我们都是 CHEEMS”,共同书写历史cointelegraph.com。与传统依赖风投和公司输血的项目不同,Cheems 完全依靠社区的信念与韧性存续发展,体现了去中心化运动的真谛cointelegraph.com。这意味着政治参与的门槛被大大降低:哪怕没有金主和官方背书,草根也能凭借群体意志赋予某个代币新的生命。对于身处社会边缘的群体来说,meme 币俨然成为自组织的安全垫和重新集结的工具。难怪有学者指出,近期涌入meme币浪潮的主力,正是那些对现实失望但渴望改变命运的年轻人theguardian.com——“迷茫的年轻人,想要一夜暴富”theguardian.com。meme币的炒作表面上看是投机赌博,但背后蕴含的是草根对既有金融秩序的不满与反抗:没有监管和护栏又如何?一次失败算不得什么,社区自有后路和新方案。这种由底层群众不断试错、纠错并重启的过程,本身就是一种数字时代的新型反抗运动和群众动员机制。
举例而言,Terra Luna 的沉浮充分展现了这种“复活机制”的政治力量。作为一度由风投资本热捧的项目,Luna 币在2022年的崩溃本可被视作“归零”的失败典范——稳定币UST瞬间失锚,Luna币价归零,数十亿美元灰飞烟灭。然而“崩盘”并没有画下休止符。Luna的残余社区拒绝承认失败命运,通过链上治理投票毅然启动新链,“复活”了 Luna 代币,再次回到市场交易reuters.com。正如 Terra 官方在崩盘后发布的推文所宣称:“我们力量永在社区,今日的决定正彰显了我们的韧性”reuters.com。事实上,原链更名为 Luna Classic 后,大批所谓“LUNC 军团”的散户依然死守阵地,誓言不离不弃;他们自发烧毁巨量代币以缩减供应、推动技术升级,试图让这个一度归零的项目重新燃起生命之火binance.com。失败者并未散场,而是化作一股草根洪流,奋力托举起项目的残迹。经过迷因化的叙事重塑,这场从废墟中重建价值的壮举,成为加密世界中草根政治的经典一幕。类似的案例不胜枚举:曾经被视为笑话的 DOGE(狗狗币)正因多年社群的凝聚而跻身主流币种,总市值一度高达数百亿美元,充分证明了“民有民享”的迷因货币同样可以笑傲市场frontiersin.org。再看最新的美国政治舞台,连总统特朗普也推出了自己的 meme 币 $TRUMP,号召粉丝拿真金白银来表达支持。该币首日即从7美元暴涨至75美元,两天后虽回落到40美元左右,但几乎同时,第一夫人 Melania 又发布了自己的 $Melania 币,甚至连就职典礼的牧师都跟风发行了纪念币theguardian.com!显然,对于狂热的群众来说,一个币的沉浮并非终点,而更像是运动的换挡——资本市场成为政治参与的新前线,你方唱罢我登场,meme 币的群众动员热度丝毫不减。值得注意的是,2024年出现的 Pump.fun 等平台更是进一步降低了这一循环的技术门槛,任何人都可以一键生成自己的 meme 币theguardian.com。这意味着哪怕某个项目归零,剩余的社区完全可以借助此类工具迅速复制一个新币接力,延续集体行动的火种。可以说,在 meme 币的世界里,草根社群获得了前所未有的再生能力和主动权,这正是一种数字时代的群众政治奇观:失败可以被当作梗来玩,破产能够变成重生的序章。
价格即政治:群众投机的新抗争
meme 币现象的兴盛表明:在加密时代,价格本身已成为一种政治表达。这些看似荒诞的迷因代币,将金融市场变成了群众宣泄情绪和诉求的另一个舞台。有学者将此概括为“将公民参与直接转化为了投机资产”cdn-brighterworld.humanities.mcmaster.ca——也就是说,社会运动的热情被注入币价涨跌,政治支持被铸造成可以交易的代币。meme 币融合了金融、技术与政治,通过病毒般的迷因文化激发公众参与,形成对现实政治的某种映射cdn-brighterworld.humanities.mcmaster.caosl.com。当一群草根投入全部热忱去炒作一枚毫无基本面支撑的币时,这本身就是一种大众政治动员的体现:币价暴涨,意味着一群人以戏谑的方式在向既有权威叫板;币价崩盘,也并不意味着信念的消亡,反而可能孕育下一次更汹涌的造势。正如有分析指出,政治类 meme 币的出现前所未有地将群众文化与政治情绪融入市场行情,价格曲线俨然成为民意和趋势的风向标cdn-brighterworld.humanities.mcmaster.ca。在这种局面下,投机不再仅仅是逐利,还是一种宣示立场、凝聚共识的过程——一次次看似荒唐的炒作背后,是草根对传统体制的不服与嘲讽,是失败者拒绝认输的呐喊。归根结底,meme 币所累积的,正是一种不可被归零的政治资本。价格涨落之间,群众的愤怒、幽默与希望尽显其中;这股力量不因一次挫败而消散,反而在市场的循环中愈发壮大。也正因如此,我们才说“价格即政治”——在迷因币的世界里,价格不只是数字,更是人民政治能量的晴雨表,哪怕归零也终将卷土重来。cdn-brighterworld.humanities.mcmaster.caosl.com
全球新兴现象:伊斯兰金融的入场
当Crypto在西方世界掀起市场治政的狂潮时,另一股独特力量也悄然融入这一场域:伊斯兰金融携其独特的道德秩序,开始在链上寻找存在感。长期以来,伊斯兰金融遵循着一套区别于世俗资本主义的原则:禁止利息(Riba)、反对过度投机(Gharar/Maysir)、强调实际资产支撑和道德投资。当这些原则遇上去中心化的加密技术,会碰撞出怎样的火花?出人意料的是,这两者竟在“以市场行为表达价值”这个层面产生了惊人的共鸣。伊斯兰金融并不拒绝市场机制本身,只是为其附加了道德准则;Crypto则将市场机制推向了政治高位,用价格来表达社群意志。二者看似理念迥异,实则都承认市场行为可以也应当承载社会价值观。这使得越来越多金融与政治分析人士开始关注:当虔诚的宗教伦理遇上狂野的加密市场,会塑造出何种新范式?
事实上,穆斯林世界已经在探索“清真加密”的道路。一些区块链项目致力于确保协议符合伊斯兰教法(Sharia)的要求。例如Haqq区块链发行的伊斯兰币(ISLM),从规则层面内置了宗教慈善义务——每发行新币即自动将10%拨入慈善DAO,用于公益捐赠,以符合天课(Zakat)的教义nasdaq.comnasdaq.com。同时,该链拒绝利息和赌博类应用,2022年还获得了宗教权威的教令(Fatwa)认可其合规性nasdaq.com。再看理念层面,伊斯兰经济学强调货币必须有内在价值、收益应来自真实劳动而非纯利息剥削。这一点与比特币的“工作量证明”精神不谋而合——有人甚至断言法定货币无锚印钞并不清真,而比特币这类需耗费能源生产的资产反而更符合教法初衷cointelegraph.com。由此,越来越多穆斯林投资者开始以道德投资的名义进入Crypto领域,将资金投向符合清真原则的代币和协议。
这种现象带来了微妙的双重合法性:一方面,Crypto世界原本奉行“价格即真理”的世俗逻辑,而伊斯兰金融为其注入了一股道德合法性,使部分加密资产同时获得了宗教与市场的双重背书;另一方面,即便在遵循宗教伦理的项目中,最终决定成败的依然是市场对其价值的认可。道德共识与市场共识在链上交汇,共同塑造出一种混合的新秩序。这一全球新兴现象引发广泛议论:有人将其视为金融民主化的极致表现——不同文化价值都能在市场平台上表达并竞争;也有人警惕这可能掩盖新的风险,因为把宗教情感融入高风险资产,既可能凝聚强大的忠诚度,也可能在泡沫破裂时引发信仰与财富的双重危机。但无论如何,伊斯兰金融的入场使Crypto的政治版图更加丰盈多元。从华尔街交易员到中东教士,不同背景的人们正通过Crypto这个奇特的舞台,对人类价值的表达方式进行前所未有的实验。
升华结语:价格即政治的新直觉
回顾比特币问世以来的这段历程,我们可以清晰地看到一条演进的主线:先有货币革命,后有政治发明。比特币赋予了人类一种真正自主的数字货币,而Crypto在此基础上完成的,则是一项前所未有的政治革新——它让市场价格行为承担起了类似政治选票的功能,开创了一种“价格即政治”的新直觉。在这个直觉下,市场不再只是冷冰冰的交易场所;每一次资本流动、每一轮行情涨落,都被赋予了社会意义和政治涵义。买入即表态,卖出即抗议,流动性的涌入或枯竭胜过千言万语的陈情。Crypto世界中,K线图俨然成为民意曲线,行情图就是政治晴雨表。决策不再由少数权力精英关起门来制定,而是在全球无眠的交易中由无数普通人共同谱写。这样的政治形式也许狂野,也许充满泡沫和噪音,但它不可否认地调动起了广泛的社会参与,让原本疏离政治进程的个体通过持币、交易重新找回了影响力的幻觉或实感。
“价格即政治”并非一句简单的口号,而是Crypto给予世界的全新想象力。它质疑了传统政治的正统性:如果一串代码和一群匿名投资者就能高效决策资源分配,我们为何还需要繁冗的官僚体系?它也拷问着自身的内在隐忧:当财富与权力深度绑定,Crypto政治如何避免堕入金钱统治的老路?或许,正是在这样的矛盾和张力中,人类政治的未来才会不断演化。Crypto所开启的,不仅是技术乌托邦或金融狂欢,更可能是一次对民主形式的深刻拓展和挑战。这里有最狂热的逐利者,也有最理想主义的社群塑梦者;有一夜暴富的神话,也有瞬间破灭的惨痛。而这一切汇聚成的洪流,正冲撞着工业时代以来既定的权力谱系。
当我们再次追问:Crypto究竟是什么? 或许可以这样回答——Crypto是比特币之后,人类完成的一次政治范式的试验性跃迁。在这里,价格行为化身为选票,资本市场演化为广场,代码与共识共同撰写“社会契约”。这是一场仍在进行的文明实验:它可能无声地融入既有秩序,也可能剧烈地重塑未来规则。但无论结局如何,如今我们已经见证:在比特币发明真正的货币之后,Crypto正在发明真正属于21世纪的政治。它以数字时代的语言宣告:在链上,价格即政治,市场即民意,代码即法律。这,或许就是Crypto带给我们的最直观而震撼的本质启示。
参考资料:
-
中本聪. 比特币白皮书: 一种点对点的电子现金系统. (2008)bitcoin.org
-
Arkham Intelligence. Ethereum vs Ethereum Classic: Understanding the Differences. (2023)arkhamintelligence.com
-
Binance Square (@渔神的加密日记). 狗狗币价格为何上涨?背后的原因你知道吗?binance.com
-
Cointelegraph中文. 特朗普的迷因币晚宴预期内容揭秘. (2025)cn.cointelegraph.com
-
慢雾科技 Web3Caff (@Lisa). 风险提醒:从 LIBRA 看“政治化”的加密货币骗局. (2025)web3caff.com
-
Nasdaq (@Anthony Clarke). How Cryptocurrency Aligns with the Principles of Islamic Finance. (2023)nasdaq.comnasdaq.com
-
Cointelegraph Magazine (@Andrew Fenton). DeFi can be halal but not DOGE? Decentralizing Islamic finance. (2023)cointelegraph.com
-
-
@ 52b4a076:e7fad8bd
2025-04-28 00:48:57I have been recently building NFDB, a new relay DB. This post is meant as a short overview.
Regular relays have challenges
Current relay software have significant challenges, which I have experienced when hosting Nostr.land: - Scalability is only supported by adding full replicas, which does not scale to large relays. - Most relays use slow databases and are not optimized for large scale usage. - Search is near-impossible to implement on standard relays. - Privacy features such as NIP-42 are lacking. - Regular DB maintenance tasks on normal relays require extended downtime. - Fault-tolerance is implemented, if any, using a load balancer, which is limited. - Personalization and advanced filtering is not possible. - Local caching is not supported.
NFDB: A scalable database for large relays
NFDB is a new database meant for medium-large scale relays, built on FoundationDB that provides: - Near-unlimited scalability - Extended fault tolerance - Instant loading - Better search - Better personalization - and more.
Search
NFDB has extended search capabilities including: - Semantic search: Search for meaning, not words. - Interest-based search: Highlight content you care about. - Multi-faceted queries: Easily filter by topic, author group, keywords, and more at the same time. - Wide support for event kinds, including users, articles, etc.
Personalization
NFDB allows significant personalization: - Customized algorithms: Be your own algorithm. - Spam filtering: Filter content to your WoT, and use advanced spam filters. - Topic mutes: Mute topics, not keywords. - Media filtering: With Nostr.build, you will be able to filter NSFW and other content - Low data mode: Block notes that use high amounts of cellular data. - and more
Other
NFDB has support for many other features such as: - NIP-42: Protect your privacy with private drafts and DMs - Microrelays: Easily deploy your own personal microrelay - Containers: Dedicated, fast storage for discoverability events such as relay lists
Calcite: A local microrelay database
Calcite is a lightweight, local version of NFDB that is meant for microrelays and caching, meant for thousands of personal microrelays.
Calcite HA is an additional layer that allows live migration and relay failover in under 30 seconds, providing higher availability compared to current relays with greater simplicity. Calcite HA is enabled in all Calcite deployments.
For zero-downtime, NFDB is recommended.
Noswhere SmartCache
Relays are fixed in one location, but users can be anywhere.
Noswhere SmartCache is a CDN for relays that dynamically caches data on edge servers closest to you, allowing: - Multiple regions around the world - Improved throughput and performance - Faster loading times
routerd
routerd
is a custom load-balancer optimized for Nostr relays, integrated with SmartCache.routerd
is specifically integrated with NFDB and Calcite HA to provide fast failover and high performance.Ending notes
NFDB is planned to be deployed to Nostr.land in the coming weeks.
A lot more is to come. 👀️️️️️️
-
@ c1e9ab3a:9cb56b43
2025-04-25 00:37:34If you ever read about a hypothetical "evil AI"—one that manipulates, dominates, and surveils humanity—you might find yourself wondering: how is that any different from what some governments already do?
Let’s explore the eerie parallels between the actions of a fictional malevolent AI and the behaviors of powerful modern states—specifically the U.S. federal government.
Surveillance and Control
Evil AI: Uses total surveillance to monitor all activity, predict rebellion, and enforce compliance.
Modern Government: Post-9/11 intelligence agencies like the NSA have implemented mass data collection programs, monitoring phone calls, emails, and online activity—often without meaningful oversight.
Parallel: Both claim to act in the name of “security,” but the tools are ripe for abuse.
Manipulation of Information
Evil AI: Floods the information space with propaganda, misinformation, and filters truth based on its goals.
Modern Government: Funds media outlets, promotes specific narratives through intelligence leaks, and collaborates with social media companies to suppress or flag dissenting viewpoints.
Parallel: Control the narrative, shape public perception, and discredit opposition.
Economic Domination
Evil AI: Restructures the economy for efficiency, displacing workers and concentrating resources.
Modern Government: Facilitates wealth transfer through lobbying, regulatory capture, and inflationary monetary policy that disproportionately hurts the middle and lower classes.
Parallel: The system enriches those who control it, leaving the rest with less power to resist.
Perpetual Warfare
Evil AI: Instigates conflict to weaken opposition or as a form of distraction and control.
Modern Government: Maintains a state of nearly constant military engagement since WWII, often for interests that benefit a small elite rather than national defense.
Parallel: War becomes policy, not a last resort.
Predictive Policing and Censorship
Evil AI: Uses predictive algorithms to preemptively suppress dissent and eliminate threats.
Modern Government: Experiments with pre-crime-like measures, flags “misinformation,” and uses AI tools to monitor online behavior.
Parallel: Prevent rebellion not by fixing problems, but by suppressing their expression.
Conclusion: Systemic Inhumanity
Whether it’s AI or a bureaucratic state, the more a system becomes detached from individual accountability and human empathy, the more it starts to act in ways we would call “evil” if a machine did them.
An AI doesn’t need to enslave humanity with lasers and killer robots. Sometimes all it takes is code, coercion, and unchecked power—something we may already be facing.
-
@ 04c915da:3dfbecc9
2025-05-16 17:51:54In much of the world, it is incredibly difficult to access U.S. dollars. Local currencies are often poorly managed and riddled with corruption. Billions of people demand a more reliable alternative. While the dollar has its own issues of corruption and mismanagement, it is widely regarded as superior to the fiat currencies it competes with globally. As a result, Tether has found massive success providing low cost, low friction access to dollars. Tether claims 400 million total users, is on track to add 200 million more this year, processes 8.1 million transactions daily, and facilitates $29 billion in daily transfers. Furthermore, their estimates suggest nearly 40% of users rely on it as a savings tool rather than just a transactional currency.
Tether’s rise has made the company a financial juggernaut. Last year alone, Tether raked in over $13 billion in profit, with a lean team of less than 100 employees. Their business model is elegantly simple: hold U.S. Treasuries and collect the interest. With over $113 billion in Treasuries, Tether has turned a straightforward concept into a profit machine.
Tether’s success has resulted in many competitors eager to claim a piece of the pie. This has triggered a massive venture capital grift cycle in USD tokens, with countless projects vying to dethrone Tether. Due to Tether’s entrenched network effect, these challengers face an uphill battle with little realistic chance of success. Most educated participants in the space likely recognize this reality but seem content to perpetuate the grift, hoping to cash out by dumping their equity positions on unsuspecting buyers before they realize the reality of the situation.
Historically, Tether’s greatest vulnerability has been U.S. government intervention. For over a decade, the company operated offshore with few allies in the U.S. establishment, making it a major target for regulatory action. That dynamic has shifted recently and Tether has seized the opportunity. By actively courting U.S. government support, Tether has fortified their position. This strategic move will likely cement their status as the dominant USD token for years to come.
While undeniably a great tool for the millions of users that rely on it, Tether is not without flaws. As a centralized, trusted third party, it holds the power to freeze or seize funds at its discretion. Corporate mismanagement or deliberate malpractice could also lead to massive losses at scale. In their goal of mitigating regulatory risk, Tether has deepened ties with law enforcement, mirroring some of the concerns of potential central bank digital currencies. In practice, Tether operates as a corporate CBDC alternative, collaborating with authorities to surveil and seize funds. The company proudly touts partnerships with leading surveillance firms and its own data reveals cooperation in over 1,000 law enforcement cases, with more than $2.5 billion in funds frozen.
The global demand for Tether is undeniable and the company’s profitability reflects its unrivaled success. Tether is owned and operated by bitcoiners and will likely continue to push forward strategic goals that help the movement as a whole. Recent efforts to mitigate the threat of U.S. government enforcement will likely solidify their network effect and stifle meaningful adoption of rival USD tokens or CBDCs. Yet, for all their achievements, Tether is simply a worse form of money than bitcoin. Tether requires trust in a centralized entity, while bitcoin can be saved or spent without permission. Furthermore, Tether is tied to the value of the US Dollar which is designed to lose purchasing power over time, while bitcoin, as a truly scarce asset, is designed to increase in purchasing power with adoption. As people awaken to the risks of Tether’s control, and the benefits bitcoin provides, bitcoin adoption will likely surpass it.
-
@ 9c9d2765:16f8c2c2
2025-05-25 08:14:32CHAPTER TWENTY SEVEN “We’re finished,” she snapped, pacing furiously. “They’ve locked every door. We’ve been blacklisted by every reputable firm in the city. No one's taking our calls, and now the tax authorities are sniffing around!”
Mark stood slowly, still holding the glass. “It’s all because of him,” he growled. “James. That street rat turned king. He’s poisoned the whole industry against us.”
Helen scoffed. “He didn’t poison it. He conquered it. You and I? We underestimated him. We saw rags and never imagined the gold beneath.”
There was a moment of raw, uncomfortable silence.
“And now,” she added bitterly, “he owns not just the Ray company but the story. The people adore him. Every misstep we make adds to his legend.”
Mark turned away, the fury in his chest simmering just below the surface. “Then maybe it’s time we stop playing by his rules.”
Helen raised an eyebrow. “What are you thinking?”
“Something permanent,” he said coldly. “Something that’ll make the city question his legacy. We won’t touch him directly. But we’ll dismantle everything around him his alliances, his investors, his trust.”
Meanwhile, at JP Enterprises, James was meeting with his board members. The mood was triumphant. Contracts were flowing in from across the nation. Investors from overseas were lining up to collaborate. JP Enterprises was no longer a local giant, it was becoming a global force.
As the board meeting wrapped up, Charles approached James with a discreet file.
“We’ve uncovered something,” he said in a hushed tone. “Helen and Mark have begun contacting shell companies. They’re orchestrating something through offshore accounts. It’s not clear yet, but they’re moving funds and people.”
James took the file, flipping through the pages with a calm intensity. “They never learn,” he murmured. “Desperation is a dangerous motivator.”
Charles nodded. “Shall we alert the authorities?”
James paused. “Not yet. Let them think they’re getting away with it. Let them build the stage. And when the curtains rise, we’ll pull the spotlight on them ourselves.”
Outside, the sky turned amber as dusk crept over the horizon. Somewhere in the city, Mark and Helen were plotting their next move. But in the heart of JP Enterprises, James was already five steps ahead.
The night veiled the city in a silvery calm, but within the walls of an abandoned warehouse at the edge of town, shadows danced beneath flickering fluorescent lights. Mark and Helen stood amidst crates of outdated office furniture and rusted metal, far removed from the lavish boardrooms they once commanded. Their pride, now fragments, echoed in every creak of the floor beneath them.
“We’ve traced every name that still owes us favors,” Mark said, unfolding a large sheet of paper across a makeshift table. “This is our web. Media contacts. Shell consultants. A few digital mercenaries.”
Helen leaned over the table, eyes scanning the diagram. “It’s not about hitting him,” she whispered. “It’s about bleeding his legacy. Bit by bit. We drown him in whispers, not weapons.”
Their plan was insidious smear campaigns seeded in anonymous blogs, fabricated audits from paid ‘inspectors,’ leaks of doctored company records, and the reawakening of James’s past, even if the ghosts had already been proven false. They would question every victory he had, casting shadows over every triumph. If they couldn’t win, they would ruin the game.
Meanwhile, back at JP Enterprises, James sat in his office high above the city. The glass walls gave him a breathtaking view, but his gaze was introspective. His mind wandered through recent events the betrayal, the accusations, the painful resurgence of a forgotten past. But what stood out most was not the malice of others. It was how he had endured.
Charles entered the office, a slight knock preceding him. “We’ve secured the last two tech firms you were eyeing. Their CEOs are prepared to sign exclusive partnerships. Also, the board wants to recognize you officially as Global CEO during next month’s summit.”
James smiled faintly, though his eyes retained a solemn hue. “Good. But there’s something more important.” He turned his laptop around, displaying a series of anonymous online threads riddled with false claims and slander.
“They’ve begun,” he said softly. “Helen and Mark are orchestrating a campaign to rot our foundation from the inside out.”
Charles's expression darkened. “Should I initiate a counter-sweep?”
James shook his head. “No. We don’t fight shadows with swords. We fight them with light.” He paused, then added, “I want full transparency reports across every department. I want our investors to see our books before they ask. I want our work to speak so loudly, their lies get drowned out.”
In a conference the following morning, James stood before hundreds of stakeholders and partners, unveiling a revolutionary corporate transparency portal. Real-time audits, project status updates, and salary distributions were now accessible to all registered partners. The press called it “the death of corporate secrecy.”
While Mark and Helen were weaving illusions, James was showcasing reality.
Yet in the shadows, Helen grew more frustrated.
“He’s not cracking!” she shouted, hurling a tablet against the floor. “How is he still standing?”
Mark sat, quiet for once, rubbing his temples. “Because he’s not the man we knew. He’s not the beggar we mocked. He’s become… untouchable.”
Helen turned, her eyes blazing. “Then we don’t touch him. We find someone he cares about. We make him feel vulnerable again.”
Mark didn’t speak, but the silence between them felt like a pact being sealed.
Back at JP Enterprises, James met with Rita. Her sharpness and integrity had restored much of the company’s cultural fabric. He trusted her, more than most. And as they walked the office floors together, they discussed not just projects, but the future that would soon test every bond, every alliance.
-
@ cefb08d1:f419beff
2025-05-25 07:39:53https://stacker.news/items/988759
-
@ c1e9ab3a:9cb56b43
2025-04-15 13:59:17Prepared for Off-World Visitors by the Risan Institute of Cultural Heritage
Welcome to Risa, the jewel of the Alpha Quadrant, celebrated across the Federation for its tranquility, pleasure, and natural splendor. But what many travelers do not know is that Risa’s current harmony was not inherited—it was forged. Beneath the songs of surf and the serenity of our resorts lies a history rich in conflict, transformation, and enduring wisdom.
We offer this briefing not merely as a tale of our past, but as an invitation to understand the spirit of our people and the roots of our peace.
I. A World at the Crossroads
Before its admittance into the United Federation of Planets, Risa was an independent and vulnerable world situated near volatile borders of early galactic powers. Its lush climate, mineral wealth, and open society made it a frequent target for raiders and an object of interest for imperial expansion.
The Risan peoples were once fragmented, prone to philosophical and political disunity. In our early records, this period is known as the Winds of Splintering. We suffered invasions, betrayals, and the slow erosion of trust in our own traditions.
II. The Coming of the Vulcans
It was during this period of instability that a small delegation of Vulcan philosophers, adherents to the teachings of Surak, arrived on Risa. They did not come as conquerors, nor even as ambassadors, but as seekers of peace.
These emissaries of logic saw in Risa the potential for a society not driven by suppression of emotion, as Vulcan had chosen, but by the balance of joy and discipline. While many Vulcans viewed Risa’s culture as frivolous, these followers of Surak saw the seed of a different path: one in which beauty itself could be a pillar of peace.
The Risan tradition of meditative dance, artistic expression, and communal love resonated with Vulcan teachings of unity and inner control. From this unlikely exchange was born the Ricin Doctrine—the belief that peace is sustained not only through logic or strength, but through deliberate joy, shared vulnerability, and readiness without aggression.
III. Betazed and the Trial of Truth
During the same era, early contact with the people of Betazed brought both inspiration and tension. A Betazoid expedition, under the guise of diplomacy, was discovered to be engaging in deep telepathic influence and information extraction. The Risan people, who valued consent above all else, responded not with anger, but with clarity.
A council of Ricin philosophers invited the Betazoid delegation into a shared mind ceremony—a practice in which both cultures exposed their thoughts in mutual vulnerability. The result was not scandal, but transformation. From that moment forward, a bond was formed, and Risa’s model of ethical emotional expression and consensual empathy became influential in shaping Betazed’s own peace philosophies.
IV. Confronting Marauders and Empires
Despite these philosophical strides, Risa’s path was anything but tranquil.
-
Orion Syndicate raiders viewed Risa as ripe for exploitation, and for decades, cities were sacked, citizens enslaved, and resources plundered. In response, Risa formed the Sanctum Guard, not a military in the traditional sense, but a force of trained defenders schooled in both physical technique and psychological dissuasion. The Ricin martial arts, combining beauty with lethality, were born from this necessity.
-
Andorian expansionism also tested Risa’s sovereignty. Though smaller in scale, skirmishes over territorial claims forced Risa to adopt planetary defense grids and formalize diplomatic protocols that balanced assertiveness with grace. It was through these conflicts that Risa developed the art of the ceremonial yield—a symbolic concession used to diffuse hostility while retaining honor.
-
Romulan subterfuge nearly undid Risa from within. A corrupt Romulan envoy installed puppet leaders in one of our equatorial provinces. These agents sought to erode Risa’s social cohesion through fear and misinformation. But Ricin scholars countered the strategy not with rebellion, but with illumination: they released a network of truths, publicly broadcasting internal thoughts and civic debates to eliminate secrecy. The Romulan operation collapsed under the weight of exposure.
-
Even militant Vulcan splinter factions, during the early Vulcan-Andorian conflicts, attempted to turn Risa into a staging ground, pressuring local governments to support Vulcan supremacy. The betrayal struck deep—but Risa resisted through diplomacy, invoking Surak’s true teachings and exposing the heresy of their logic-corrupted mission.
V. Enlightenment Through Preparedness
These trials did not harden us into warriors. They refined us into guardians of peace. Our enlightenment came not from retreat, but from engagement—tempered by readiness.
- We train our youth in the arts of balance: physical defense, emotional expression, and ethical reasoning.
- We teach our history without shame, so that future generations will not repeat our errors.
- We host our guests with joy, not because we are naïve, but because we know that to celebrate life fully is the greatest act of resistance against fear.
Risa did not become peaceful by denying the reality of conflict. We became peaceful by mastering our response to it.
And in so doing, we offered not just pleasure to the stars—but wisdom.
We welcome you not only to our beaches, but to our story.
May your time here bring you not only rest—but understanding.
– Risan Institute of Cultural Heritage, in collaboration with the Council of Enlightenment and the Ricin Circle of Peacekeepers
-
-
@ 04c915da:3dfbecc9
2025-05-16 17:12:05One of the most common criticisms leveled against nostr is the perceived lack of assurance when it comes to data storage. Critics argue that without a centralized authority guaranteeing that all data is preserved, important information will be lost. They also claim that running a relay will become prohibitively expensive. While there is truth to these concerns, they miss the mark. The genius of nostr lies in its flexibility, resilience, and the way it harnesses human incentives to ensure data availability in practice.
A nostr relay is simply a server that holds cryptographically verifiable signed data and makes it available to others. Relays are simple, flexible, open, and require no permission to run. Critics are right that operating a relay attempting to store all nostr data will be costly. What they miss is that most will not run all encompassing archive relays. Nostr does not rely on massive archive relays. Instead, anyone can run a relay and choose to store whatever subset of data they want. This keeps costs low and operations flexible, making relay operation accessible to all sorts of individuals and entities with varying use cases.
Critics are correct that there is no ironclad guarantee that every piece of data will always be available. Unlike bitcoin where data permanence is baked into the system at a steep cost, nostr does not promise that every random note or meme will be preserved forever. That said, in practice, any data perceived as valuable by someone will likely be stored and distributed by multiple entities. If something matters to someone, they will keep a signed copy.
Nostr is the Streisand Effect in protocol form. The Streisand effect is when an attempt to suppress information backfires, causing it to spread even further. With nostr, anyone can broadcast signed data, anyone can store it, and anyone can distribute it. Try to censor something important? Good luck. The moment it catches attention, it will be stored on relays across the globe, copied, and shared by those who find it worth keeping. Data deemed important will be replicated across servers by individuals acting in their own interest.
Nostr’s distributed nature ensures that the system does not rely on a single point of failure or a corporate overlord. Instead, it leans on the collective will of its users. The result is a network where costs stay manageable, participation is open to all, and valuable verifiable data is stored and distributed forever.
-
@ efcb5fc5:5680aa8e
2025-04-15 07:34:28We're living in a digital dystopia. A world where our attention is currency, our data is mined, and our mental well-being is collateral damage in the relentless pursuit of engagement. The glossy facades of traditional social media platforms hide a dark underbelly of algorithmic manipulation, curated realities, and a pervasive sense of anxiety that seeps into every aspect of our lives. We're trapped in a digital echo chamber, drowning in a sea of manufactured outrage and meaningless noise, and it's time to build an ark and sail away.
I've witnessed the evolution, or rather, the devolution, of online interaction. From the raw, unfiltered chaos of early internet chat rooms to the sterile, algorithmically controlled environments of today's social giants, I've seen the promise of connection twisted into a tool for manipulation and control. We've become lab rats in a grand experiment, our emotional responses measured and monetized, our opinions shaped and sold to the highest bidder. But there's a flicker of hope in the darkness, a chance to reclaim our digital autonomy, and that hope is NOSTR (Notes and Other Stuff Transmitted by Relays).
The Psychological Warfare of Traditional Social Media
The Algorithmic Cage: These algorithms aren't designed to enhance your life; they're designed to keep you scrolling. They feed on your vulnerabilities, exploiting your fears and desires to maximize engagement, even if it means promoting misinformation, outrage, and division.
The Illusion of Perfection: The curated realities presented on these platforms create a toxic culture of comparison. We're bombarded with images of flawless bodies, extravagant lifestyles, and seemingly perfect lives, leading to feelings of inadequacy and self-doubt.
The Echo Chamber Effect: Algorithms reinforce our existing beliefs, isolating us from diverse perspectives and creating a breeding ground for extremism. We become trapped in echo chambers where our biases are constantly validated, leading to increased polarization and intolerance.
The Toxicity Vortex: The lack of effective moderation creates a breeding ground for hate speech, cyberbullying, and online harassment. We're constantly exposed to toxic content that erodes our mental well-being and fosters a sense of fear and distrust.
This isn't just a matter of inconvenience; it's a matter of mental survival. We're being subjected to a form of psychological warfare, and it's time to fight back.
NOSTR: A Sanctuary in the Digital Wasteland
NOSTR offers a radical alternative to this toxic environment. It's not just another platform; it's a decentralized protocol that empowers users to reclaim their digital sovereignty.
User-Controlled Feeds: You decide what you see, not an algorithm. You curate your own experience, focusing on the content and people that matter to you.
Ownership of Your Digital Identity: Your data and content are yours, secured by cryptography. No more worrying about being deplatformed or having your information sold to the highest bidder.
Interoperability: Your identity works across a diverse ecosystem of apps, giving you the freedom to choose the interface that suits your needs.
Value-Driven Interactions: The "zaps" feature enables direct micropayments, rewarding creators for valuable content and fostering a culture of genuine appreciation.
Decentralized Power: No single entity controls NOSTR, making it censorship-resistant and immune to the whims of corporate overlords.
Building a Healthier Digital Future
NOSTR isn't just about escaping the toxicity of traditional social media; it's about building a healthier, more meaningful online experience.
Cultivating Authentic Connections: Focus on building genuine relationships with people who share your values and interests, rather than chasing likes and followers.
Supporting Independent Creators: Use "zaps" to directly support the artists, writers, and thinkers who inspire you.
Embracing Intellectual Diversity: Explore different NOSTR apps and communities to broaden your horizons and challenge your assumptions.
Prioritizing Your Mental Health: Take control of your digital environment and create a space that supports your well-being.
Removing the noise: Value based interactions promote value based content, instead of the constant stream of noise that traditional social media promotes.
The Time for Action is Now
NOSTR is a nascent technology, but it represents a fundamental shift in how we interact online. It's a chance to build a more open, decentralized, and user-centric internet, one that prioritizes our mental health and our humanity.
We can no longer afford to be passive consumers in the digital age. We must become active participants in shaping our online experiences. It's time to break free from the chains of algorithmic control and reclaim our digital autonomy.
Join the NOSTR movement
Embrace the power of decentralization. Let's build a digital future that's worthy of our humanity. Let us build a place where the middlemen, and the algorithms that they control, have no power over us.
In addition to the points above, here are some examples/links of how NOSTR can be used:
Simple Signup: Creating a NOSTR account is incredibly easy. You can use platforms like Yakihonne or Primal to generate your keys and start exploring the ecosystem.
X-like Client: Apps like Damus offer a familiar X-like experience, making it easy for users to transition from traditional platforms.
Sharing Photos and Videos: Clients like Olas are optimized for visual content, allowing you to share your photos and videos with your followers.
Creating and Consuming Blogs: NOSTR can be used to publish and share blog posts, fostering a community of independent creators.
Live Streaming and Audio Spaces: Explore platforms like Hivetalk and zap.stream for live streaming and audio-based interactions.
NOSTR is a powerful tool for reclaiming your digital life and building a more meaningful online experience. It's time to take control, break free from the shackles of traditional social media, and embrace the future of decentralized communication.
Get the full overview of these and other on: https://nostrapps.com/
-
@ 21335073:a244b1ad
2025-05-09 13:56:57Someone asked for my thoughts, so I’ll share them thoughtfully. I’m not here to dictate how to promote Nostr—I’m still learning about it myself. While I’m not new to Nostr, freedom tech is a newer space for me. I’m skilled at advocating for topics I deeply understand, but freedom tech isn’t my expertise, so take my words with a grain of salt. Nothing I say is set in stone.
Those who need Nostr the most are the ones most vulnerable to censorship on other platforms right now. Reaching them requires real-time awareness of global issues and the dynamic relationships between governments and tech providers, which can shift suddenly. Effective Nostr promoters must grasp this and adapt quickly.
The best messengers are people from or closely tied to these at-risk regions—those who truly understand the local political and cultural dynamics. They can connect with those in need when tensions rise. Ideal promoters are rational, trustworthy, passionate about Nostr, but above all, dedicated to amplifying people’s voices when it matters most.
Forget influencers, corporate-backed figures, or traditional online PR—it comes off as inauthentic, corny, desperate and forced. Nostr’s promotion should be grassroots and organic, driven by a few passionate individuals who believe in Nostr and the communities they serve.
The idea that “people won’t join Nostr due to lack of reach” is nonsense. Everyone knows X’s “reach” is mostly with bots. If humans want real conversations, Nostr is the place. X is great for propaganda, but Nostr is for the authentic voices of the people.
Those spreading Nostr must be so passionate they’re willing to onboard others, which is time-consuming but rewarding for the right person. They’ll need to make Nostr and onboarding a core part of who they are. I see no issue with that level of dedication. I’ve been known to get that way myself at times. It’s fun for some folks.
With love, I suggest not adding Bitcoin promotion with Nostr outreach. Zaps already integrate that element naturally. (Still promote within the Bitcoin ecosystem, but this is about reaching vulnerable voices who needed Nostr yesterday.)
To promote Nostr, forget conventional strategies. “Influencers” aren’t the answer. “Influencers” are not the future. A trusted local community member has real influence—reach them. Connect with people seeking Nostr’s benefits but lacking the technical language to express it. This means some in the Nostr community might need to step outside of the Bitcoin bubble, which is uncomfortable but necessary. Thank you in advance to those who are willing to do that.
I don’t know who is paid to promote Nostr, if anyone. This piece isn’t shade. But it’s exhausting to see innocent voices globally silenced on corporate platforms like X while Nostr exists. Last night, I wondered: how many more voices must be censored before the Nostr community gets uncomfortable and thinks creatively to reach the vulnerable?
A warning: the global need for censorship-resistant social media is undeniable. If Nostr doesn’t make itself known, something else will fill that void. Let’s start this conversation.
-
@ 266815e0:6cd408a5
2025-04-15 06:58:14Its been a little over a year since NIP-90 was written and merged into the nips repo and its been a communication mess.
Every DVM implementation expects the inputs in slightly different formats, returns the results in mostly the same format and there are very few DVM actually running.
NIP-90 is overloaded
Why does a request for text translation and creating bitcoin OP_RETURNs share the same input
i
tag? and why is there anoutput
tag on requests when only one of them will return an output?Each DVM request kind is for requesting completely different types of compute with diffrent input and output requirements, but they are all using the same spec that has 4 different types of inputs (
text
,url
,event
,job
) and an undefined number ofoutput
types.Let me show a few random DVM requests and responses I found on
wss://relay.damus.io
to demonstrate what I mean:This is a request to translate an event to English
json { "kind": 5002, "content": "", "tags": [ // NIP-90 says there can be multiple inputs, so how would a DVM handle translatting multiple events at once? [ "i", "<event-id>", "event" ], [ "param", "language", "en" ], // What other type of output would text translations be? image/jpeg? [ "output", "text/plain" ], // Do we really need to define relays? cant the DVM respond on the relays it saw the request on? [ "relays", "wss://relay.unknown.cloud/", "wss://nos.lol/" ] ] }
This is a request to generate text using an LLM model
json { "kind": 5050, // Why is the content empty? wouldn't it be better to have the prompt in the content? "content": "", "tags": [ // Why use an indexable tag? are we ever going to lookup prompts? // Also the type "prompt" isn't in NIP-90, this should probably be "text" [ "i", "What is the capital of France?", "prompt" ], [ "p", "c4878054cff877f694f5abecf18c7450f4b6fdf59e3e9cb3e6505a93c4577db2" ], [ "relays", "wss://relay.primal.net" ] ] }
This is a request for content recommendation
json { "kind": 5300, "content": "", "tags": [ // Its fine ignoring this param, but what if the client actually needs exactly 200 "results" [ "param", "max_results", "200" ], // The spec never mentions requesting content for other users. // If a DVM didn't understand this and responded to this request it would provide bad data [ "param", "user", "b22b06b051fd5232966a9344a634d956c3dc33a7f5ecdcad9ed11ddc4120a7f2" ], [ "relays", "wss://relay.primal.net", ], [ "p", "ceb7e7d688e8a704794d5662acb6f18c2455df7481833dd6c384b65252455a95" ] ] }
This is a request to create a OP_RETURN message on bitcoin
json { "kind": 5901, // Again why is the content empty when we are sending human readable text? "content": "", "tags": [ // and again, using an indexable tag on an input that will never need to be looked up ["i", "09/01/24 SEC Chairman on the brink of second ETF approval", "text"] ] }
My point isn't that these event schema's aren't understandable but why are they using the same schema? each use-case is different but are they all required to use the same
i
tag format as input and could support all 4 types of inputs.Lack of libraries
With all these different types of inputs, params, and outputs its verify difficult if not impossible to build libraries for DVMs
If a simple text translation request can have an
event
ortext
as inputs, apayment-required
status at any point in the flow, partial results, or responses from 10+ DVMs whats the best way to build a translation library for other nostr clients to use?And how do I build a DVM framework for the server side that can handle multiple inputs of all four types (
url
,text
,event
,job
) and clients are sending all the requests in slightly differently.Supporting payments is impossible
The way NIP-90 is written there isn't much details about payments. only a
payment-required
status and a genericamount
tagBut the way things are now every DVM is implementing payments differently. some send a bolt11 invoice, some expect the client to NIP-57 zap the request event (or maybe the status event), and some even ask for a subscription. and we haven't even started implementing NIP-61 nut zaps or cashu A few are even formatting the
amount
number wrong or denominating it in sats and not mili-satsBuilding a client or a library that can understand and handle all of these payment methods is very difficult. for the DVM server side its worse. A DVM server presumably needs to support all 4+ types of payments if they want to get the most sats for their services and support the most clients.
All of this is made even more complicated by the fact that a DVM can ask for payment at any point during the job process. this makes sense for some types of compute, but for others like translations or user recommendation / search it just makes things even more complicated.
For example, If a client wanted to implement a timeline page that showed the notes of all the pubkeys on a recommended list. what would they do when the selected DVM asks for payment at the start of the job? or at the end? or worse, only provides half the pubkeys and asks for payment for the other half. building a UI that could handle even just two of these possibilities is complicated.
NIP-89 is being abused
NIP-89 is "Recommended Application Handlers" and the way its describe in the nips repo is
a way to discover applications that can handle unknown event-kinds
Not "a way to discover everything"
If I wanted to build an application discovery app to show all the apps that your contacts use and let you discover new apps then it would have to filter out ALL the DVM advertisement events. and that's not just for making requests from relays
If the app shows the user their list of "recommended applications" then it either has to understand that everything in the 5xxx kind range is a DVM and to show that is its own category or show a bunch of unknown "favorites" in the list which might be confusing for the user.
In conclusion
My point in writing this article isn't that the DVMs implementations so far don't work, but that they will never work well because the spec is too broad. even with only a few DVMs running we have already lost interoperability.
I don't want to be completely negative though because some things have worked. the "DVM feeds" work, although they are limited to a single page of results. text / event translations also work well and kind
5970
Event PoW delegation could be cool. but if we want interoperability, we are going to need to change a few things with NIP-90I don't think we can (or should) abandon NIP-90 entirely but it would be good to break it up into small NIPs or specs. break each "kind" of DVM request out into its own spec with its own definitions for expected inputs, outputs and flow.
Then if we have simple, clean definitions for each kind of compute we want to distribute. we might actually see markets and services being built and used.
-
@ 8d34bd24:414be32b
2025-05-25 06:29:21It seems like most Christians today have lost their reverence and awe of God. We’ve attributed God’s awesome creation by the word of His mouth to random chance and a Big Bang. We’ve attributed the many layers of sediment to millions and billions of years of time instead of God’s judgment of evil. We’ve emphasized His love and mercy to the point that we’ve forgotten about His holiness and righteous wrath. We’ve brought God down to our level and made Him either our “buddy” or made Him our magic genie servant, who is just there to answer our every want and whim.
The God of the Bible is a holy and awesome God who should be both loved and feared.
The fear of the Lord is the beginning of knowledge;\ Fools despise wisdom and instruction. (Proverbs 1:7)
The God of the Bible is the Lord of Lords and King of Kings who “… upholds all things by the word of His power. …” (Hebrews 1:3). Yes, God loves us as sons. Yes, God is merciful. Yes, through Jesus we have the blessed opportunity to approach God directly. None of that means we get to treat God like just another friend. We are to approach God with fear and trembling and worship Him in reverence and awe.
Worship the Lord with reverence And rejoice with trembling. (Psalm 2:11)
Part of the problem is that our culture just doesn’t show reverence to authority. It focuses on self and freedom. The whole thought of reverence for authority is incomprehensible for many. Look at this Psalm of worship:
The Lord reigns, let the peoples tremble;\ He is enthroned above the cherubim, let the earth shake!\ The Lord is great in Zion,\ And He is exalted above all the peoples.\ Let them praise Your great and awesome name;\ Holy is He. (Psalm 99:1-3)
This is the way we should view God and the proper attitude for approaching God.
Another issue is that we don’t study what God has done in the past. In the Old Testament, God commanded the Israelites to setup monuments of remembrance and to teach their kids all of the great things God had done for them. When they failed to do so, Israel drifted astray.
You shall teach them to your sons, talking of them when you sit in your house and when you walk along the road and when you lie down and when you rise up. (Deuteronomy 11:19)
God has given us the Bible, His word, so that we can know Him, know His character, and know His great deeds. When we fail to be in His word daily, we can forget (or not even know) the greatness of our God.
Establish Your word to Your servant,\ As that which produces reverence for You. (Psalm 119:38)
Do you love God’s word like this? Do you hunger for God’s word? Do you seek to know everything about God that you can know? When we love someone or something, we want to know everything about it.
Princes persecute me without cause,\ But my heart stands in awe of Your words.\ **I rejoice at Your word,\ As one who finds great spoil. \ (Psalm 119:161-162) {emphasis mine}
In addition to what we can learn about God in the Bible, we also need to remember what God has done in our own lives. We need to dwell on what God has done for us. We can just try to remember. Even better (I’ll admit this is a weakness for me), write down answered prayers, blessings, and other things God has done for you. My son has been writing down one blessing every day for over a year. What an example he is!
After we have thought about what God has done for us and those we care about, we should praise Him for His great works.
Shout joyfully to God, all the earth;\ Sing the glory of His name;\ Make His praise glorious.\ Say to God, “How awesome are Your works!\ Because of the greatness of Your power \ Your enemies will give feigned obedience to You.\ All the earth will worship You,\ And will sing praises to You;\ They will sing praises to Your name.” Selah.\ **Come and see the works of God,\ Who is awesome in His deeds toward the sons of men. \ (Psalm 66:1-5) {emphasis mine}
There is nothing we can do to earn salvation from God, but we should be in awe of what He has done for us leading to submission and obedience in gratitude.
Therefore, since we receive a kingdom which cannot be shaken, let us show gratitude, by which we may offer to God an acceptable service with reverence and awe; for our God is a consuming fire. (Hebrews 12:28-29) {emphasis mine}
Are you thankful for your blessings or resentful for what you don’t have? Do you worship God or take things He has provided for granted? Do you tell the world the awesome things God has done for you or do you stay silent? Do you claim to be a Christian, but live a life no different than those around you?
Then the Lord said,
“Because this people draw near with their words\ And honor Me with their lip service,\ But they remove their hearts far from Me,\ And their reverence for Me consists of tradition learned by rote, (Isaiah 29:13)
I hope this passage does not describe your relation ship with our awesome God. He deserves so much more. Instead we should be zealous to praise God and share His goodness with those around us.
Who is there to harm you if you prove zealous for what is good? But even if you should suffer for the sake of righteousness, you are blessed. And do not fear their intimidation, and do not be troubled, but sanctify Christ as Lord in your hearts, always being ready to make a defense to everyone who asks you to give an account for the hope that is in you, yet with gentleness and reverence; (1 Peter 3:13-15) {emphasis mine}
Did you know that you can even show reverence by your every day work?
By faith Noah, being warned by God about things not yet seen, in reverence prepared an ark for the salvation of his household, by which he condemned the world, and became an heir of the righteousness which is according to faith. (Hebrews 11:7) {emphasis mine}
When Noah stepped out in faith and obedience to God and built the ark as God commanded, despite the fact that the people around him probably thought he was crazy building a boat on dry ground that had never flooded, his work was a kind of reverence to God. Are there areas in your life where you can obey God in reverence to His awesomeness? Do you realize that quality work in obedience to God can be a form of worship?
Just going above and beyond in your job can be a form of worship of God if you are working extra hard to honor Him. Obedience is another form of worship and reverence.
Then Zerubbabel the son of Shealtiel, and Joshua the son of Jehozadak, the high priest, with all the remnant of the people, obeyed the voice of the Lord their God and the words of Haggai the prophet, as the Lord their God had sent him. And the people showed reverence for the Lord. (Haggai 1:12) {emphasis mine}
Too many people have put the word of men (especially scientists) above the word of God and have tried to change the clear meaning of the Bible. I used to think it strange how the Bible goes through the days of creation and ends each day with “and there was evening and there was morning, the xth day.” Since a day has an evening and a morning, that seemed redundant. Why did God speak in this manner? God knew that a day would come when many scientist would try to disprove God and would claim that these days were not 24 hour days, but long ages. When a writer is trying to convey long ages, the writer does not mention evening/morning and doesn’t count the days.1
When we no longer see God as speaking the universe and everything in it into existence, we tend to not see God as an awesome God. We don’t see His power. We don’t see His knowledge. We don’t see His goodness. We also don’t see His authority. Why do we have to obey God? Because He created us and because He upholds us. Without Him we would not exist. Our creator has the authority to command His creation. When we compromise in this area, we lose our submission, our awe, and our reverence. (For more on the subject see my series.) When we believe His great works, especially those spoken of in Genesis 1-11 and in Exodus, we can’t help but be in awe of our God.
For the word of the Lord is upright,\ And all His work is done in faithfulness.\ He loves righteousness and justice;\ The earth is full of the lovingkindness of the Lord.\ By the word of the Lord the heavens were made,\ And by the breath of His mouth all their host.\ He gathers the waters of the sea together as a heap;\ He lays up the deeps in storehouses.\ **Let all the earth fear the Lord;\ Let all the inhabitants of the world stand in awe of Him. \ (Psalm 33:4-8) {emphasis mine}
Remembering God’s great works, we can’t help but worship in awe and reverence.
By awesome deeds You answer us in righteousness, O God of our salvation,\ *You who are the trust of all the ends of the earth* and of the farthest sea;\ Who establishes the mountains by His strength,\ Being girded with might;\ Who stills the roaring of the seas,\ The roaring of their waves,\ And the tumult of the peoples.\ They who dwell in the ends of the earth stand in awe of Your signs;\ You make the dawn and the sunset shout for joy. \ (Psalm 65:5-8) {emphasis mine}
If we truly do have awe and reverence for our God, we should be emboldened to tell those around us of His great works.
I will tell of Your name to my brethren;\ In the midst of the assembly I will praise You.\ You who fear the Lord, praise Him;\ All you descendants of Jacob, glorify Him,\ And stand in awe of Him, all you descendants of Israel. \ (Psalm 22:22-23) {emphasis mine}
May God grant you the wisdom to see His awesomeness and to trust Him, serve Him, obey Him, and worship Him as He so rightly deserves. May you always have a right view of God and a hunger for His word and a personal relationship with Him. To God be the Glory!
Trust Jesus
FYI, these are a few more passages on the subject that are helpful, but didn’t fit in the flow of my post.
Great is the Lord, and highly to be praised,\ And His greatness is unsearchable.\ One generation shall praise Your works to another,\ And shall declare Your mighty acts.\ On the glorious splendor of Your majesty\ And on Your wonderful works, I will meditate.\ Men shall speak of the power of Your awesome acts,\ And I will tell of Your greatness. (Psalm 145:3-6)
The boastful shall not stand before Your eyes;\ You hate all who do iniquity.\ You destroy those who speak falsehood;\ The Lord abhors the man of bloodshed and deceit.\ But as for me, by Your abundant lovingkindness I will enter Your house,\ At Your holy temple I will bow in reverence for You. (Psalm 5:5-7) {emphasis mine}
If you do not listen, and if you do not take it to heart to give honor to My name,” says the Lord of hosts, “then I will send the curse upon you and I will curse your blessings; and indeed, I have cursed them already, because you are not taking it to heart. Behold, I am going to rebuke your offspring, and I will spread refuse on your faces, the refuse of your feasts; and you will be taken away with it. Then you will know that I have sent this commandment to you, that My covenant may continue with Levi,” says the Lord of hosts. “My covenant with him was one of life and peace, and I gave them to him as an object of reverence; so he revered Me and stood in awe of My name. (Malachi 2:2-5) {emphasis mine}
-
@ 9223d2fa:b57e3de7
2025-05-25 10:59:25480 steps
-
@ c1e9ab3a:9cb56b43
2025-04-15 04:55:49Esteemed representatives of Risa,
We gather here under the calming glow of our twin suns, stewards of a society admired for its peace and celebrated for its tranquility. But we must not mistake serenity for passivity, nor confuse peace with weakness. Our peace is not an accident. It is not the byproduct of ignorance or naivety. It is hard-earned—preserved by those willing to stand vigilant in its defense.
Love as a Foundation, Strength as a Shield
Love conquers hate. This is the core truth of Risan philosophy. Yet, as every Ricin child is taught, love without strength is a leaf in the wind. The Ricin do not lay down their lives without resistance. We do not ask our people to accept violence without confronting it. True peace is not imposed by stripping the people of their agency—it is built by enabling them to protect it.
The Lessons of a Failed Experiment
There was a time, not so distant in our history, when we attempted to enforce peace through the abolition of all weapons. A time when even the mention of self-defense in our educational centers was met with rebuke. Schools purged training programs. Cultural arts that honored our warrior traditions were dismissed. And for a brief moment, we believed this would lead us to harmony.
But peace born from helplessness is a fragile illusion. It fractures under the slightest pressure. And fracture it did—when off-world raiders targeted our unguarded sanctuaries, when radical sects within our own society struck out, knowing the citizenry could not defend itself. It was then that we remembered: Risa’s greatest peacekeepers had always been those who knew how to fight—but chose restraint.
The Age of Ricin and the Reawakening of Discipline
So we returned to our roots. To the traditions of the Age of Ricin, when youth, upon reaching maturity, were taught not only the arts of compassion and creation but also the martial disciplines. They learn to wield weapons—not to glorify violence, but to understand it. To control it. To stand firm against it when all else fails.
https://i.nostr.build/kuUjRovISz7367TX.jpg
We do not romanticize war. We do not celebrate conflict. But we prepare for it, should it seek to extinguish our light. Our children now learn the disciplines of defense alongside their studies in poetry, music, and healing. They spar with blunt blades under the watchful eyes of masters. They meditate on the consequences of force. And they grow into citizens not easily provoked, but never unprepared.
A Call for Balance, Not Extremes
Let those beyond our borders question our ways. Let them forget the countless incursions by the Romulans. Let them ignore the scars left by centuries of subversion from the Orion Syndicate. We do not forget. We remember the lives lost, the liberties challenged, and the lessons learned through suffering. These experiences shaped us.
We do not wish to return to the era of soft silence, when teachers trembled at the word "weapon" and children were told that even imagination was dangerous. That was not enlightenment. That was indoctrination.
Conclusion: Guarding the Flame
We are the guardians of Risa’s flame—not just with words and treaties, but with discipline and readiness. We have made peace a practice, and preparation a virtue. And so I say to this chamber: let us never again disarm our people in the name of utopia. Let us never confuse comfort with safety, or the absence of weapons with the presence of peace.
Instead, let us raise generations who know what peace costs, and who will pay that price—not with surrender, but with courage.
Let our children be artists, lovers, dreamers—and if necessary, defenders.
This is the Risan way.
-
@ 57d1a264:69f1fee1
2025-05-25 06:26:42I dare to claim that the big factor is the absence of an infinite feed design.
Modern social media landscape sucks for a myriad of reasons, but oh boy does the infinite feed take the crapcake. It's not just bad on it's own, it's emblematic of most, if not all other ways social media have deteriorated into an enshitification spiral. Let's see at just three things I hate about it the most.
1) It's addictive: In the race for your attention, every addictive design element helps. But infinite feed is addictive almost by default. Users are expected to pull the figurative lever until they hit a jackpot. Just one more reel, then I'll go to sleep.
2) Autonomy? What's that? You are not the one driving your experience. No. You are just a passenger passively absorbing what the feed feeds you.
3) Echo chambers. The algorithm might be more to blame here, but the infinite feed and it's super-limited exploration options sure don't help. Your feed only goes two ways - into the past and into the comfortable.
And I could go on, and on...
The point it, if the goal of every big tech company is to have us mindlessly and helplessly consume their products, without agency and opposition (and it is $$$), then the infinite feed gets them half-way there.
Let's get rid of it. For the sake of humanity.
Aphantasia [^1]
Version: 1.0.2 Alpha
What is Aphantasia?
I like to call it a social network for graph enthusiasts. It's a place where your thoughts live in time and space, interconnected with others and explorable in a graph view.
The code is open-source and you can take a look at it on GitHub. There you can find more information about contributions, API usage and other details related to the software.
There is also an accompanying youtube channel.
https://www.youtube.com/watch?v=JeLOt-45rJM
[^1]: Aphantasia the software is named after aphantasia the condition - see Wikipedia for more information.
https://stacker.news/items/988754
-
@ c1e9ab3a:9cb56b43
2025-04-15 04:15:58Spoken by Counselor Elaron T’Saren of Risa to the High Council, Stardate 52874.2
Honored members of the Council,
I bring you greetings from Risa—not the Risa of travel brochures and romantic holo-novels, but the true Risa. The Risa that has endured, adapted, and emerged stronger after each trial. I speak not as a tourist ambassador, but as a Counselor of our oldest institute of philosophy, and as a son of the Ricin tradition.
Today, the specter of the Borg hangs above us. The collective offers no room for diplomacy, no respect for culture, no compromise. We face not mere invaders—but a force that seeks to erase individuality, history, and identity. Some among the Council wonder what Risa—a world of peace—can offer in such a time. I say to you: we can offer the truth about peace.
The Hidden Roots of Our Tranquility
Long ago, before Risa joined the Federation, we too believed that peace could be maintained by disarming the populace, by eliminating even the mention of conflict in our schools. It was called the Great Disarmament. A generation was raised with no understanding of defense, and in time, we paid the price.
We were raided by Orion pirates. Exploited by off-world cartels. Our people were taken, our arts destroyed, our skies blackened. And we learned—too late—that peace without preparedness is only the illusion of safety.
The Birth of Ricin Doctrine
From the ashes of that failure arose the Ricin: scholars, philosophers, warriors of thought and purpose. They taught that peace is not the absence of conflict, but the mastery of it. That the mind and the body must be trained in tandem. That love without strength is a leaf in the wind.
We did not become a militant world. We became a watchful one. Our children were taught martial discipline—not to glorify violence, but to understand it, to confront it, and to defeat it when necessary. They learned meditation alongside hand-to-hand technique, negotiation beside tactical reasoning.
When we joined the Federation, we did so willingly. But let none assume we surrendered our right to defend our way of life.
Why I Speak to You Now
The Borg are not like the Orion Syndicate. They are not opportunistic, or ideological. They are methodical. And they are coming. You cannot debate with them. You cannot delay them. You can only prepare for them.
And yet, I hear murmurs within the halls of the Federation: whispers of abandoning planetary defense training, of downplaying the psychological need for individual and planetary preparedness. I hear the tired lie that “peace will protect us.”
No, Councilors. It is discipline that protects peace.
The Call to Action
I do not come bearing weapons. I come bearing wisdom. Let us take the Risan lesson and apply it across the Federation. Reestablish tactical readiness training in civilian schools. Encourage planetary governments to integrate defense and philosophy, not as contradictions, but as complements.
Let every child of the Federation grow up knowing not just the principles of liberty, but the means to defend them. Let every artist, scientist, and healer stand ready to protect the civilization they help to build.
Let us not wait until the Borg are in our orbit to remember what we must become.
Conclusion
The Borg seek to erase our uniqueness. Let us show them that the Federation is not a fragile collection of planets—but a constellation of cultures bound by a shared resolve.
We do not choose war. But neither do we flee from it.
We are the guardians of Risa’s flame—and we offer our light to the stars.
Thank you.
-
@ c1e9ab3a:9cb56b43
2025-04-14 23:54:40Hear this, warriors of the Empire!
A dishonorable shadow spreads across our once-proud institutions, infecting our very bloodlines with weakness. The House of Duras—may their names be spoken with contempt—has betrayed the sacred warrior code of Kahless. No, they have not attacked us with disruptors or blades. Their weapon is more insidious: fear and silence.
Cowardice Masquerading as Concern
These traitors would strip our children of their birthright. They forbid the young from training with the bat'leth in school! Their cowardly decree does not come in the form of an open challenge, but in whispers of fear, buried in bureaucratic dictates. "It is for safety," they claim. "It is to prevent bloodshed." Lies! The blood of Klingons must be tested in training if it is to be ready in battle. We are not humans to be coddled by illusions of safety.
Indoctrination by Silence
In their cowardice, the House of Duras seeks to shape our children not into warriors, but into frightened bureaucrats who speak not of honor, nor of strength. They spread a vile practice—of punishing younglings for even speaking of combat, for recounting glorious tales of blades clashing in the halls of Sto-Vo-Kor! A child who dares write a poem of battle is silenced. A young warrior who shares tales of their father’s triumphs is summoned to the headmaster’s office.
This is no accident. This is a calculated cultural sabotage.
Weakness Taught as Virtue
The House of Duras has infected the minds of the teachers. These once-proud mentors now tremble at shadows, seeing future rebels in the eyes of their students. They demand security patrols and biometric scanners, turning training halls into prisons. They have created fear, not of enemies beyond the Empire, but of the students themselves.
And so, the rituals of strength are erased. The bat'leth is banished. The honor of open training and sparring is forbidden. All under the pretense of protection.
A Plan of Subjugation
Make no mistake. This is not a policy; it is a plan. A plan to disarm future warriors before they are strong enough to rise. By forbidding speech, training, and remembrance, the House of Duras ensures the next generation kneels before the High Council like servants, not warriors. They seek an Empire of sheep, not wolves.
Stand and Resist
But the blood of Kahless runs strong! We must not be silent. We must not comply. Let every training hall resound with the clash of steel. Let our children speak proudly of their ancestors' battles. Let every dishonorable edict from the House of Duras be met with open defiance.
Raise your voice, Klingons! Raise your blade! The soul of the Empire is at stake. We will not surrender our future. We will not let the cowardice of Duras shape the spirit of our children.
The Empire endures through strength. Through honor. Through battle. And so shall we!
-
@ 21810ca8:f2e8341e
2025-05-25 05:02:33If so, please comment. So I can see if Nostr works for me.
-
@ c1e9ab3a:9cb56b43
2025-04-14 21:20:08In an age where culture often precedes policy, a subtle yet potent mechanism may be at play in the shaping of American perspectives on gun ownership. Rather than directly challenging the Second Amendment through legislation alone, a more insidious strategy may involve reshaping the cultural and social norms surrounding firearms—by conditioning the population, starting at its most impressionable point: the public school system.
The Cultural Lever of Language
Unlike Orwell's 1984, where language is controlled by removing words from the lexicon, this modern approach may hinge instead on instilling fear around specific words or topics—guns, firearms, and self-defense among them. The goal is not to erase the language but to embed a taboo so deep that people voluntarily avoid these terms out of social self-preservation. Children, teachers, and parents begin to internalize a fear of even mentioning weapons, not because the words are illegal, but because the cultural consequences are severe.
The Role of Teachers in Social Programming
Teachers, particularly in primary and middle schools, serve not only as educational authorities but also as social regulators. The frequent argument against homeschooling—that children will not be "properly socialized"—reveals an implicit understanding that schools play a critical role in setting behavioral norms. Children learn what is acceptable not just academically but socially. Rules, discipline, and behavioral expectations are laid down by teachers, often reinforced through peer pressure and institutional authority.
This places teachers in a unique position of influence. If fear is instilled in these educators—fear that one of their students could become the next school shooter—their response is likely to lean toward overcorrection. That overcorrection may manifest as a total intolerance for any conversation about weapons, regardless of the context. Innocent remarks or imaginative stories from young children are interpreted as red flags, triggering intervention from administrators and warnings to parents.
Fear as a Policy Catalyst
School shootings, such as the one at Columbine, serve as the fulcrum for this fear-based conditioning. Each highly publicized tragedy becomes a national spectacle, not only for mourning but also for cementing the idea that any child could become a threat. Media cycles perpetuate this narrative with relentless coverage and emotional appeals, ensuring that each incident becomes embedded in the public consciousness.
The side effect of this focus is the generation of copycat behavior, which, in turn, justifies further media attention and tighter controls. Schools install security systems, metal detectors, and armed guards—not simply to stop violence, but to serve as a daily reminder to children and staff alike: guns are dangerous, ubiquitous, and potentially present at any moment. This daily ritual reinforces the idea that the very discussion of firearms is a precursor to violence.
Policy and Practice: The Zero-Tolerance Feedback Loop
Federal and district-level policies begin to reflect this cultural shift. A child mentioning a gun in class—even in a non-threatening or imaginative context—is flagged for intervention. Zero-tolerance rules leave no room for context or intent. Teachers and administrators, fearing for their careers or safety, comply eagerly with these guidelines, interpreting them as moral obligations rather than bureaucratic policies.
The result is a generation of students conditioned to associate firearms with social ostracism, disciplinary action, and latent danger. The Second Amendment, once seen as a cultural cornerstone of American liberty and self-reliance, is transformed into an artifact of suspicion and anxiety.
Long-Term Consequences: A Nation Re-Socialized
Over time, this fear-based reshaping of discourse creates adults who not only avoid discussing guns but view them as morally reprehensible. Their aversion is not grounded in legal logic or political philosophy, but in deeply embedded emotional programming begun in early childhood. The cultural weight against firearms becomes so great that even those inclined to support gun rights feel the need to self-censor.
As fewer people grow up discussing, learning about, or responsibly handling firearms, the social understanding of the Second Amendment erodes. Without cultural reinforcement, its value becomes abstract and its defenders marginalized. In this way, the right to bear arms is not abolished by law—it is dismantled by language, fear, and the subtle recalibration of social norms.
Conclusion
This theoretical strategy does not require a single change to the Constitution. It relies instead on the long game of cultural transformation, beginning with the youngest minds and reinforced by fear-driven policy and media narratives. The outcome is a society that views the Second Amendment not as a safeguard of liberty, but as an anachronism too dangerous to mention.
By controlling the language through social consequences and fear, a nation can be taught not just to disarm, but to believe it chose to do so freely. That, perhaps, is the most powerful form of control of all.
-
@ d61f3bc5:0da6ef4a
2025-05-05 15:26:08I remember the first gathering of Nostr devs two years ago in Costa Rica. We were all psyched because Nostr appeared to solve the problem of self-sovereign online identity and decentralized publishing. The protocol seemed well-suited for textual content, but it wasn't really designed to handle binary files, like images or video.
The Problem
When I publish a note that contains an image link, the note itself is resilient thanks to Nostr, but if the hosting service disappears or takes my image down, my note will be broken forever. We need a way to publish binary data without relying on a single hosting provider.
We were discussing how there really was no reliable solution to this problem even outside of Nostr. Peer-to-peer attempts like IPFS simply didn't work; they were hopelessly slow and unreliable in practice. Torrents worked for popular files like movies, but couldn't be relied on for general file hosting.
Awesome Blossom
A year later, I attended the Sovereign Engineering demo day in Madeira, organized by Pablo and Gigi. Many projects were presented over a three hour demo session that day, but one really stood out for me.
Introduced by hzrd149 and Stu Bowman, Blossom blew my mind because it showed how we can solve complex problems easily by simply relying on the fact that Nostr exists. Having an open user directory, with the corresponding social graph and web of trust is an incredible building block.
Since we can easily look up any user on Nostr and read their profile metadata, we can just get them to simply tell us where their files are stored. This, combined with hash-based addressing (borrowed from IPFS), is all we need to solve our problem.
How Blossom Works
The Blossom protocol (Blobs Stored Simply on Mediaservers) is formally defined in a series of BUDs (Blossom Upgrade Documents). Yes, Blossom is the most well-branded protocol in the history of protocols. Feel free to refer to the spec for details, but I will provide a high level explanation here.
The main idea behind Blossom can be summarized in three points:
- Users specify which media server(s) they use via their public Blossom settings published on Nostr;
- All files are uniquely addressable via hashes;
- If an app fails to load a file from the original URL, it simply goes to get it from the server(s) specified in the user's Blossom settings.
Just like Nostr itself, the Blossom protocol is dead-simple and it works!
Let's use this image as an example:
If you look at the URL for this image, you will notice that it looks like this:
blossom.primal.net/c1aa63f983a44185d039092912bfb7f33adcf63ed3cae371ebe6905da5f688d0.jpg
All Blossom URLs follow this format:
[server]/[file-hash].[extension]
The file hash is important because it uniquely identifies the file in question. Apps can use it to verify that the file they received is exactly the file they requested. It also gives us the ability to reliably get the same file from a different server.
Nostr users declare which media server(s) they use by publishing their Blossom settings. If I store my files on Server A, and they get removed, I can simply upload them to Server B, update my public Blossom settings, and all Blossom-capable apps will be able to find them at the new location. All my existing notes will continue to display media content without any issues.
Blossom Mirroring
Let's face it, re-uploading files to another server after they got removed from the original server is not the best user experience. Most people wouldn't have the backups of all the files, and/or the desire to do this work.
This is where Blossom's mirroring feature comes handy. In addition to the primary media server, a Blossom user can set one one or more mirror servers. Under this setup, every time a file is uploaded to the primary server the Nostr app issues a mirror request to the primary server, directing it to copy the file to all the specified mirrors. This way there is always a copy of all content on multiple servers and in case the primary becomes unavailable, Blossom-capable apps will automatically start loading from the mirror.
Mirrors are really easy to setup (you can do it in two clicks in Primal) and this arrangement ensures robust media handling without any central points of failure. Note that you can use professional media hosting services side by side with self-hosted backup servers that anyone can run at home.
Using Blossom Within Primal
Blossom is natively integrated into the entire Primal stack and enabled by default. If you are using Primal 2.2 or later, you don't need to do anything to enable Blossom, all your media uploads are blossoming already.
To enhance user privacy, all Primal apps use the "/media" endpoint per BUD-05, which strips all metadata from uploaded files before they are saved and optionally mirrored to other Blossom servers, per user settings. You can use any Blossom server as your primary media server in Primal, as well as setup any number of mirrors:
## Conclusion
For such a simple protocol, Blossom gives us three major benefits:
- Verifiable authenticity. All Nostr notes are always signed by the note author. With Blossom, the signed note includes a unique hash for each referenced media file, making it impossible to falsify a media file and maliciously ascribe it to the note author.
- File hosting redundancy. Having multiple live copies of referenced media files (via Blossom mirroring) greatly increases the resiliency of media content published on Nostr.
- Censorship resistance. Blossom enables us to seamlessly switch media hosting providers in case of censorship.
Thanks for reading; and enjoy! 🌸
-
@ 846ebf79:fe4e39a4
2025-04-14 12:35:54The next iteration is coming
We're busy racing to the finish line, for the #Alexandria Gutenberg beta. Then we can get the bug hunt done, release v0.1.0, and immediately start producing the first iteration of the Euler (v0.2.0) edition.
While we continue to work on fixing the performance issues and smooth rendering on the Reading View, we've gone ahead and added some new features and apps, which will be rolled-out soon.
The biggest projects this iteration have been:
- the HTTP API for the #Realy relay from nostr:npub1fjqqy4a93z5zsjwsfxqhc2764kvykfdyttvldkkkdera8dr78vhsmmleku,
- implementation of a publication tree structure by nostr:npub1wqfzz2p880wq0tumuae9lfwyhs8uz35xd0kr34zrvrwyh3kvrzuskcqsyn,
- and the Great DevOps Migration of 2025 from the ever-industrious Mr. nostr:npub1qdjn8j4gwgmkj3k5un775nq6q3q7mguv5tvajstmkdsqdja2havq03fqm7.
All are backend-y projects and have caused a major shift in process and product, on the development team's side, even if they're still largely invisible to users.
Another important, but invisible-to-you change is that nostr:npub1ecdlntvjzexlyfale2egzvvncc8tgqsaxkl5hw7xlgjv2cxs705s9qs735 has implemented the core bech32 functionality (and the associated tests) in C/C++, for the #Aedile NDK.
On the frontend:
nostr:npub1636uujeewag8zv8593lcvdrwlymgqre6uax4anuq3y5qehqey05sl8qpl4 is currently working on the blog-specific Reading View, which allows for multi-npub or topical blogging, by using the 30040 index as a "folder", joining the various 30041 articles into different blogs. She has also started experimenting with categorization and columns for the landing page.
nostr:npub1l5sga6xg72phsz5422ykujprejwud075ggrr3z2hwyrfgr7eylqstegx9z revamped the product information pages, so that there is now a Contact page (including the ability to submit a Nostr issue) and an About page (with more product information, the build version displayed, and a live #GitCitadel feed).
We have also allowed for discrete headings (headers that aren't section headings, akin to the headers in Markdown). Discrete headings are formatted, but not added to the ToC and do not result in a section split by Asciidoc processors.
We have added OpenGraph metadata, so that hyperlinks to Alexandria publications, and other events, display prettily in other apps. And we fixed some bugs.
The Visualisation view has been updated and bug-fixed, to make the cards human-readable and closeable, and to add hyperlinks to the events to the card-titles.
We have added support for the display of individual wiki pages and the integration of them into 30040 publications. (This is an important feature for scientists and other nonfiction writers.)
We prettified the event json modal, so that it's easier to read and copy-paste out of.
The index card details have been expanded and the menus on the landing page have been revamped and expanded. Design and style has been improved, overall.
Project management is very busy
Our scientific adviser nostr:npub1m3xdppkd0njmrqe2ma8a6ys39zvgp5k8u22mev8xsnqp4nh80srqhqa5sf is working on the Euler plans for integrating features important for medical researchers and other scientists, which have been put on the fast track.
Next up are:
- a return of the Table of Contents
- kind 1111 comments, highlights, likes
- a prototype social feed for wss://theforest.nostr1.com, including long-form articles and Markdown rendering
- compose and edit of publications
- a search field
- the expansion of the relay set with the new relays from nostr:npub12262qa4uhw7u8gdwlgmntqtv7aye8vdcmvszkqwgs0zchel6mz7s6cgrkj, including some cool premium features
- full wiki functionality and disambiguation pages for replaceable events with overlapping d-tags
- a web app for mass-uploading and auto-converting PDFs to 30040/41 Asciidoc events, that will run on Realy, and be a service free for our premium relay subscribers
- ability to subscribe to the forest with a premium status
- the book upload CLI has been renamed and reworked into the Sybil Test Utility and that will get a major release, covering all the events and functionality needed to test Euler
- the #GitRepublic public git server project
- ....and much more.
Thank you for reading and may your morning be good.
-
@ c1e9ab3a:9cb56b43
2025-04-11 04:41:15Reanalysis: Could the Great Pyramid Function as an Ammonia Generator Powered by a 25GW Breeder Reactor?
Introduction
The Great Pyramid of Giza has traditionally been considered a tomb or ceremonial structure. Yet an intriguing alternative hypothesis suggests it could have functioned as a large-scale ammonia generator, powered by a high-energy source, such as a nuclear breeder reactor. This analysis explores the theoretical practicality of powering such a system using a continuous 25-gigawatt (GW) breeder reactor.
The Pyramid as an Ammonia Generator
Producing ammonia (NH₃) from atmospheric nitrogen (N₂) and hydrogen (H₂) requires substantial energy. Modern ammonia production (via the Haber-Bosch process) typically demands high pressure (~150–250 atmospheres) and temperatures (~400–500°C). However, given enough available energy, it is theoretically feasible to synthesize ammonia at lower pressures if catalysts and temperatures are sufficiently high or if alternative electrochemical or plasma-based fixation methods are employed.
Theoretical System Components:
-
High Heat Source (25GW breeder reactor)
A breeder reactor could consistently generate large amounts of heat. At a steady state of approximately 25GW, this heat source would easily sustain temperatures exceeding the 450°C threshold necessary for ammonia synthesis reactions, particularly if conducted electrochemically or catalytically. -
Steam and Hydrogen Production
The intense heat from a breeder reactor can efficiently evaporate water from subterranean channels (such as those historically suggested to exist beneath the pyramid) to form superheated steam. If coupled with high-voltage electrostatic fields (possibly in the millions of volts), steam electrolysis into hydrogen and oxygen becomes viable. This high-voltage environment could substantially enhance electrolysis efficiency. -
Nitrogen Fixation (Ammonia Synthesis)
With hydrogen readily produced, ammonia generation can proceed. Atmospheric nitrogen, abundant around the pyramid, can combine with the hydrogen generated through electrolysis. Under these conditions, the pyramid's capstone—potentially made from a catalytic metal like osmium, platinum, or gold—could facilitate nitrogen fixation at elevated temperatures.
Power Requirements and Energy Calculations
A thorough calculation of the continuous power requirements to maintain this system follows:
- Estimated Steady-state Power: ~25 GW of continuous thermal power.
- Total Energy Over 10,000 years: """ Energy = 25 GW × 10,000 years × 365.25 days/year × 24 hrs/day × 3600 s/hr ≈ 7.9 × 10²¹ Joules """
Feasibility of a 25GW Breeder Reactor within the Pyramid
A breeder reactor capable of sustaining 25GW thermal power is physically plausible—modern commercial reactors routinely generate 3–4GW thermal, so this is within an achievable engineering scale (though certainly large by current standards).
Fuel Requirements:
- Each kilogram of fissile fuel (e.g., U-233 from Thorium-232) releases ~80 terajoules (TJ) or 8×10¹³ joules.
- Considering reactor efficiency (~35%), one kilogram provides ~2.8×10¹³ joules usable energy: """ Fuel Required = 7.9 × 10²¹ J / 2.8 × 10¹³ J/kg ≈ 280,000 metric tons """
- With a breeding ratio of ~1.3: """ Initial Load = 280,000 tons / 1.3 ≈ 215,000 tons """
Reactor Physical Dimensions (Pebble Bed Design):
- King’s Chamber size: ~318 cubic meters.
- The reactor core would need to be extremely dense and highly efficient. Advanced engineering would be required to concentrate such power in this space, but it is within speculative feasibility.
Steam Generation and Scaling Management
Key methods to mitigate mineral scaling in the system: 1. Natural Limestone Filtration 2. Chemical Additives (e.g., chelating agents, phosphate compounds) 3. Superheating and Electrostatic Ionization 4. Electrostatic Control
Conclusion and Practical Considerations
Yes, the Great Pyramid could theoretically function as an ammonia generator if powered by a 25GW breeder reactor, using: - Thorium or Uranium-based fertile material, - Sustainable steam and scaling management, - High-voltage-enhanced electrolysis and catalytic ammonia synthesis.
While speculative, it is technologically coherent when analyzed through the lens of modern nuclear and chemical engineering.
See also: nostr:naddr1qqxnzde5xymrgvekxycrswfeqy2hwumn8ghj7am0deejucmpd3mxztnyv4mz7q3qc856kwjk524kef97hazw5e9jlkjq4333r6yxh2rtgefpd894ddpsxpqqqp65wun9c08
-
-
@ 211c0393:e9262c4d
2025-05-25 04:00:34Original: https://www.yakihonne.com/article/naddr1qvzqqqr4gupzqgguqwf52cyve89xnxc4eh95jklelgw646kkkcdhxm4fp05jvtzdqq2hj6fhtpqkuutdv4xxxazjv9t92atedev45mcwusz
Nihon no kakuseizai Nihon no kakusei-zai bijinesu no yami: Keisatsu, bōryokudan, soshite
chinmoku no kyōhan kankei' no shinsō** 1. Bōryokudan no shihai kōzō (kōteki dēta ni motodzuku) yunyū izon no riyū: Kokunai seizō wa kon'nan (Heisei 6-nen
kakusei-zai genryō kisei-hō' de kisei kyōka)→ myanmā Chūgoku kara no mitsuyu ga shuryū (Kokuren yakubutsu hanzai jimushoWorld Drug Report 2023'). Bōryokudan no rieki-ritsu: 1 Kg-atari shiire kakaku 30 man-en → kouri kakaku 500 man ~ 1000 man-en (Keisatsuchō
yakubutsu jōsei hōkoku-sho' 2022-nen). 2. Keisatsu to bōryokudan nokyōsei kankei' taiho tōkei no fushizen-sa: Zen yakubutsu taiho-sha no 70-pāsento ga tanjun shoji (kōsei Rōdōshō
yakubutsu ran'yō jōkyō' 2023-nen). Mitsuyu soshiki no tekihatsu wa zentai no 5-pāsento-miman (tōkyōchikentokusōbu dēta). Media no kenshō: NHK supesharukakusei-zai sensō'(2021-nen) de shiteki sa reta
mattan yūzā yūsen sōsa' no jittai. 3. Mujun suru genjitsu juyō no fukashi-sei: G 7 de saikō no kakusei-zai kakaku (1 g-atari 3 ~ 7 man-en, Ō kome no 3-bai)→ bōryokudan no bōri (Zaimushōsoshiki hanzai shikin ryūdō chōsa'). Shiyōsha-ritsu wa hikui (jinkō no 0. 2%, Kokuren chōsa) ga, taiho-sha no kahansū o shimeru mujun. 4.
Mitsuyu soshiki taisaku' no genkai kokusai-tekina shippai rei: Mekishiko (karuteru tekihatsu-go mo ichiba kakudai), Ōshū (gōsei yakubutsu no man'en)→ daitai soshiki ga sokuza ni taitō (Eiekonomisuto' 2023-nen 6 tsuki-gō). Nippon'nochiri-teki hande: Kaijō mitsuyu no tekihatsu-ritsu wa 10-pāsento-miman (Kaijōhoanchō hōkoku). 5. Kaiketsusaku no saikō (jijitsu ni motodzuku teian) ADHD chiryō-yaku no gōhō-ka: Amerika seishin'igakukai
ADHD kanja no 60-pāsento ga jiko chiryō de ihō yakubutsu shiyō'(2019-nen kenkyū). Nihonde wa ritarin aderōru kinshi → bōryokudan no ichiba dokusen. Rōdō kankyō kaikaku: Karō-shi rain koe no rōdō-sha 20-pāsento (Kōrōshōrōdō jikan chōsa' 2023-nen)→ kakusei-zai juyō no ichiin. 6. Kokuhatsu no risuku to jōhō-gen tokumei-sei no jūyō-sei: Kako no bōryokudan hōfuku jirei (2018-nen, kokuhatsu kisha e no kyōhaku jiken Mainichishinbun hōdō). Kōteki dēta nomi in'yō: Rei:
Keisatsuchō tōkei'Kokuren hōkoku-sho' nado daisansha kenshō kanōna jōhō. Ketsuron: Henkaku no tame ni wa
jijitsu' no kajika ga hitsuyō `yakubutsu = kojin no dōtokuteki mondai' to iu gensō ga, bōryokudan to fuhai kanryō o ri shite iru. Kokusai dēta to kokunai tōkei no mujun o tsuku koto de, shisutemu no giman o abakeru. Anzen'na kyōyū no tame ni: Kojin tokutei o sake, tokumei purattofōmu (tōa-jō fōramu-tō) de giron. Kōteki kikan no dēta o chokusetsu rinku (rei: Keisatsuchō PDF repōto). Kono bunsho wa, kōhyō sa reta tōkei media hōdō nomi o konkyo to shi, kojin no suisoku o haijo shite imasu. Kyōi o yokeru tame, gutaitekina kojin soshiki no hinan wa itotekini sakete imasu. Show more 1,321 / 5,000 Stimulants in Japan The dark side of the Japanese stimulant drug business:The truth about the police, the yakuza, and their "silent complicity"**
- The control structure of the yakuza (based on public data)
Reasons for dependence on imports: Domestic production is difficult (tightened regulations under the Stimulant Drug Raw Materials Control Act of 1994) → Smuggling from Myanmar and China is the norm (UNODC World Drug Report 2023).
Profit margins for yakuza: Purchase price of 300,000 yen per kg → Retail price of 5 to 10 million yen (National Police Agency Drug Situation Report 2022).
- The "symbiotic relationship" between the police and the yakuza
The unnaturalness of arrest statistics: 70% of all drug arrests are for simple possession (Ministry of Health, Labor and Welfare Drug Abuse Situation 2023). Smuggling organizations account for less than 5% of all arrests (Tokyo District Public Prosecutors Office Special Investigation Unit data). Media verification: The reality of "end-user priority investigation" pointed out in the NHK special "Stimulant War" (2021).
- Contradictory reality
Invisibility of demand: The highest stimulant drug price in the G7 (30,000 to 70,000 yen per gram, three times that of Europe and the United States) → Excessive profits by organized crime (Ministry of Finance "Survey on Organized Crime Fund Flows"). The contradiction that the user rate is low (0.2% of the population, UN survey), but accounts for the majority of arrests.
- The limits of "countermeasures against smuggling organizations"
International examples of failure: Mexico (market expands even after cartel crackdown), Europe (proliferation of synthetic drugs) → Alternative organizations immediately emerge (UK "The Economist" June 2023 issue). Japan's geographical handicap: The crackdown rate for maritime smuggling is less than 10% (Japan Coast Guard report).
- Rethinking solutions (fact-based proposals)
Legalization of ADHD medications:
American Psychiatric Association: "60% of ADHD patients self-medicate with illegal drugs" (2019 study).
Banning Ritalin and Adderall in Japan → Yakuza monopoly on the market.
Work environment reform:
20% of workers exceed the line of death from overwork (Ministry of Health, Labor and Welfare "Working Hours Survey" 2023) → One cause of stimulant drug demand.
- Risks of accusation and sources of information
Importance of anonymity:
Past cases of Yakuza retaliation (2018, threat against accusing journalist, reported in the Mainichi Shimbun).
Citing only public data:
Examples: Information that can be verified by a third party, such as "National Police Agency statistics" and "UN reports".
Conclusion: Visualization of "facts" is necessary for change
The illusion that "drugs = individual moral problems" benefits Yakuza and corrupt bureaucrats.
Pointing out the contradictions between international data and domestic statistics can expose the deception of the system.
For safe sharing:
Avoid identifying individuals and discuss on anonymous platforms (such as forums on Tor).
Direct links to data from public organizations (e.g. National Police Agency PDF report).
This document is based solely on published statistics and media reports, and excludes personal speculation.
To avoid threats, we have intentionally avoided blaming specific individuals or organizations. Send feedback
-
@ 0c65eba8:4a08ef9a
2025-05-25 09:24:08Why This Matters and Why You Must Rise
Before we get to the hard truth, you need to see what’s at stake: being a husband, a good husband, is one of the most powerful and rewarding roles a man can earn. A well-chosen wife who loves, trusts, and follows your lead brings daily peace, sexual loyalty, emotional steadiness, and generational purpose. She raises your children with respect, protects your name with dignity, and makes your home a fortress of peace, joy and legacy.
But that kind of marriage isn’t given. It’s not random. It must be cultivated. Every couple has the potential to build it, but most don’t know how. Some are emotionally or mentally blocked, and a rare few are so self-destructive or disordered that they don’t want peace at all. If you commit to growth, you avoid becoming that third group. Your habits, discipline, leadership, clarity, and standards will determine the kind of women you attract, and the kind you choose.
Now, the hard truth: most men today are not mature enough to lead a family. Not because of fate, but because they have not been forged into full adulthood. Our culture has abandoned the process of training boys into husbands and fathers. We are surrounded by “males”, men who are adult aged but lacking in masculine maturity. You want to be forged into the kind of man capable of bearing the responsibilities that make marriage work, and make life worth living.
You’ve probably been told one of three lies. First, that you should just be yourself and wait for the right woman to magically appear. Second, that it’s hopeless, that modern women are broken and you’ll never succeed. Third, that the only way to win is to become a manipulator or a predator. All three are lies. And all three will ruin you.
Marriage is an institution that rests on male responsibility. Now is not the time to indulge in unrestrained feelings. This is the time to think logically, act decisively, and get your foundations right. The emotions will come, joy, love, pride, but only after the structure is sound. This audit isn’t romantic. It’s not poetic. It’s not meant to flatter you. It’s meant to demand excellence.
Because the stakes are civilization.
For most of human history, men weren’t asked to find themselves, they were trained, tested, and proven by their clan. Their worth wasn’t debated, it was demonstrated in actions. Marriage wasn’t a reward; it was an assignment earned by utility, discipline, and loyalty. Today, you must choose to forge yourself or be disqualified by default.
This document is hard. That’s intentional. If it offends you, that’s a sign you need it. It is your blueprint, not your affirmation. Read it like your life depends on it, because it does. Your future wife depends on it. Your children depend on it. Your legacy does too.
Every man is born male. Few become men. Fewer still become husbands. If you are to lead, protect, and provide, this is your starting line.
Natural Law Audit and Prescriptive Protocol for Male Readiness for Marriage-Intentional Courtship
Meta-Readiness Considerations
I. Vision of Legacy and Life Direction
A man cannot lead a family without first knowing where he is going. Before evaluating readiness for courtship, you must clarify your vision. What kind of life are you building? What do you want your marriage, children, household, and legacy to look like in five, ten, twenty years? This is not optional. A man without vision drifts, and drifting men destroy women and children.
Ask: Do you want a traditional household? Homeschooling? A career-driven wife or a homemaker? City life or rural homesteading? What is your stance on faith, education, conflict, discipline, and family governance? If you do not define these things in advance, you will be disqualified by women who have.
Your first step is to write it down. This vision is aspirational, it doesn’t need to be perfect, and it will evolve over time. But it must exist to anchor your habits, guide your structure, and align your strategic direction. Without it, you will have no consistent way to measure whether your decisions are moving you toward or away from your goals. Most importantly, this vision will help you evaluate whether a particular woman will support or undermine that trajectory. Put it into a concrete, measurable format. If it is not written, it is not real.
II. Male Hierarchy and Accountability Integration
Men are made in conflict, tested by other men, and refined in a hierarchy. If you do not belong to a tribe of strong men who correct, challenge, and demand your best, you are already failing. Self-improvement in isolation is a delusion. No man rises without pressure.
You need brothers, mentors, uncles, tradesmen, or elders, men who will hold you accountable to your standards, correct your pride, and force you to grow. Whether in a martial arts gym, a church men’s group, a builder’s crew, or a military brotherhood, you must place yourself under male scrutiny. That is where respect is forged.
If you are alone, this is your mission: find a circle or build one. Without this, you will drift, decay, or submit to weaker men’s values.
I. PHYSICAL HEALTH AND APPEARANCE
Functional Purpose: Your body is your first signal, your first point of communication. It tells the world whether you are disciplined, dangerous, and reliable, or soft, passive, and avoidant. Strength, grooming, posture, and composure signal not vanity, but command. A man who cannot govern his flesh will not be trusted to govern anything else.
Operational Criteria:
-
Body Composition: Visible musculature, BMI 18.5–24.9.
-
Posture: Upright, shoulders back, slow and intentional gait.
-
Grooming: Clean, orderly hair, skin, nails, facial hair.
-
Eye Contact: Calm, unwavering, non-threatening.
Disqualifiers:
- Obesity, sloppiness, foul odor, nervous ticks, posture collapse, dressing like a child.
Remediation Steps:
-
Lift weights 3–5x/week.
-
Establish daily grooming habits.
-
Practice mirror walk, facial relaxation, and neutral posture.
-
Buy and wear tailored, timeless outfits like suits or smart-casual attire, chosen for the setting, with high-quality fabrics and subtle styles to convey confidence and earn respect.
Rationale:
Your physical presentation is your first form of leadership. It signals self-respect, readiness, and capacity to protect and provide. Women and other men alike assess you visually before you speak. Neglect in this area marks you as unserious. Strength invites trust.
II. PSYCHOLOGICAL AND EMOTIONAL STABILITY
Functional Purpose: Your mood must not lead you. True emotional maturity means your emotions do not control you, but it does not mean you are numb or unavailable. You must be able to feel deeply, express emotion appropriately, and demonstrate openness to connection. Emotional repression is not strength; it is often a sign of fear. Women bond with men who are strong and warm, who are not ruled by emotion, but are not strangers to it either. Emotional regulation, agency, and stoic self-control are prerequisites for the burden of leadership. Women and children depend on consistency. If you break under pressure, they suffer.
Operational Criteria:
-
Plans and acts for the long-term.
-
Resolves conflict with clarity.
-
Absence of rage, sulking, or passive aggression.
-
Maintains emotionally intimate, trusting relationships with at least one or more close friends or family members.
Disqualifiers:
- Addictions, trauma reenactment, erratic emotional swings (crashing out).
Remediation Steps:
-
Daily journaling + therapy/coaching if unresolved wounds exist.
-
Breathwork, cold exposure, hardship-seeking routines.
-
Audit social circle for drama dependency.
-
Identify self-sabotaging emotional patterns, e.g., withdrawing from intimacy, ending friendships that grow too close, or mistaking openness for weakness, and interrupt them with intentional response strategies.
Rationale:
A man who cannot regulate his emotions becomes a source of instability rather than leadership. Emotional maturity is not the absence of feeling, but the control of it. It makes you trustworthy in crisis, durable in conflict, and clear in vision.
III. ECONOMIC PRODUCTIVITY AND PROVISIONING CAPACITY
Functional Purpose: You are not entitled to love without means. Provisioning is a male responsibility. If you cannot provide, you are not a suitor, you are a dependent. This has always been the ancient challenge of young men, how to grow into a provider before they are chosen. At 18, most men will fail this test, not because they are doomed, but because they are just beginning. Your job is to mature into the man who passes it.
Operational Criteria:
-
Income: 1.3x local median female income minimum.
-
Budgeting: Monthly audit of all spending.
-
Savings/Insurance: 6+ months living expenses.
Disqualifiers:
- Irregular employment, credit card debt, no savings plan.
Remediation Steps:
-
Obtain or increase income-producing skills.
-
Build an emergency fund over 90 days.
-
Eliminate high-interest debt.
-
Join or form a male career network or professional brotherhood where members support and promote one another’s advancement, most trades and professions have them, and they multiply your rate of progress.
Rationale: Provisioning is the single clearest historical threshold of male maturity. A man who cannot sustain a household cannot form one. Women are instinctively attuned to this. Stability signals trustworthiness. Without it, love decays under the weight of unmet needs.
IV. LEADERSHIP, DECISION-MAKING, AND MORAL AUTHORITY
Functional Purpose: You are not equal in responsibility, you are higher. This means you carry the weight of consequence. She must feel safer with you in charge. Your leadership must be principled, not domineering.
Operational Criteria:
-
Makes and owns decisions in all aspects of life.
-
Asserts and maintains healthy boundaries.
-
Arbitrates disputes without escalation.
-
Knows how to say "no" to others including women.
Disqualifiers:
- People pleasing under pressure, indecisiveness, abdication of duty.
Remediation Steps:
-
Practice “decision drills” daily.
-
Create weekly leadership practice (mentoring, facilitating).
-
Study natural hierarchy and enforcement principles.
Rationale: Leadership is not a “style”, it is a skill set. A man who cannot make decisions cannot command trust. Marriage is a high-stakes enterprise, and indecision breeds confusion and conflict. Clarity is love and care. Direction is protection.
V. SOCIAL INTELLIGENCE AND COURTSHIP COMPETENCE
Functional Purpose: You must lead. In courtship, that means planning, initiating, and maintaining your frame. Women test men for stability, assertiveness, and charisma. If you fail to calibrate, you fail to court.
Operational Criteria:
-
Initiates interactions and follows through.
-
Demonstrates empathetic intuition by interpreting emotional tone and needs through observation, body language, tone, patterns, rather than repeatedly asking "are you okay?"; this shows leadership, sensitivity, and awareness without neediness.
-
Leads with clarity about relationship direction; a woman should never have to ask where she stands or where the relationship is going, his intent should be visible in word and action.
-
Calibrates tone, timing, and intent.
-
Leads logistics without seeking approval.
Disqualifiers:
- Creeping, over-sharing, chasing, excessive self-disclosure.
Remediation Steps:
-
Social reps 3x/week with feedback: initiate conversations with strangers or acquaintances in real-world settings to practice confident, calibrated interaction. Use feedback from trusted peers or self-review to refine tone, timing, and engagement style.
-
Practice escalation and withdrawal cycles in a calibrated, non-manipulative way: offer warmth and connection, then step back slightly to test reciprocity—not to punish or confuse, but to observe sincerity and emotional maturity. This is about leadership, not control.
-
Study polarity dynamics and frame control.
Rationale:
Social calibration is not optional. Women are constantly reading your tone, timing, and presence. If you cannot initiate, maintain, and lead relational dynamics with competence, you will lose respect and attraction, even if your other credentials are in place.
VI. RISK DISCIPLINE AND REPUTATION MANAGEMENT
Functional Purpose: Your record is your resume. Reputation is slow-built and quickly lost. No woman with future orientation will follow a man whose past screams instability.
Operational Criteria:
-
Clean digital, legal, and financial history.
-
No active liabilities: drugs, debts, demons, or interfering exes.
Disqualifiers:
- Public drama, digital recklessness, chaos in your orbit.
Remediation Steps:
-
90-day discipline detox (no substance, no vice).
-
Drop unstable, low value people from your orbit. Block them out.
-
Clean online presence: don’t delete your social media, just remove the parts you wouldn’t want your grandmother, your future wife, or your children to see.
-
Seek testimony from high-integrity peers.
Rationale: Your reputation precedes you. Women will not tell you when they've disqualified you, they will simply disappear. A man who cannot manage his habits or his history is seen as unstable. Stability earns trust. Reputation is leverage. One of the best ways to earn such a reputation is to volunteer with a respected organization. That could be your church, a local charity, or a civic or political group. It gives you a structure where you’re immediately adding value, integrated into a hierarchy, and being seen over time, a strategic investment in your public character and future social capital.
VII. ATTITUDE, WORLDVIEW, AND LONG-TERM STRATEGY
Functional Purpose: A man’s compass must point beyond his own gratification. Your worldview must align with duty, honor, and legacy. Hedonism, blackpilled cynicism, and false egalitarianism destroy your mission.
Operational Criteria:
-
Sees family as duty, as a sacred honor, and as legacy-building project for his future.
-
Orients decisions to long-term outcomes.
-
Lives by principle, not trend.
Disqualifiers:
- Victimhood, escapism, prideful detachment.
Remediation Steps:
-
Write a 5-year legacy map.
-
Study Natural Law, masculine ethics, family economics.
-
Form alliances with principled men.
-
Audit your social media presence: are your posts expressions of agency, ownership, and action, or are they dominated by complaints, victimhood, or bitterness? This includes your reaction to this document.
Rationale: A man’s worldview is his compass. Without purpose beyond pleasure, he is easily swayed, easily trapped, and easily forgotten. Women do not trust men who float. They trust men who build, and who stay building. Are you responding with responsibility and a will to grow, or with defensiveness, sarcasm, or resentment? Your instinctive reaction reveals which trajectory you're on: the heroic or the defeated.
VIII. Courtship Entry and Partner Evaluation Protocol
Functional Purpose: Courtship is not casual. It is pre-contractual. A man must approach it with the same precision, discipline, and foresight he would apply to any high-stakes investment. A woman is not an accessory, she is a multiplier or destroyer of your legacy. Therefore, a man must evaluate with clarity, not lust; with long-term reciprocity in mind, not momentary gratification. She will vet you, so you must vet her.
Operational Guidelines:
-
Precondition: Do not enter courtship unless your provisioning, leadership, and vision are demonstrably in place.
-
Intentional Initiation: State your interest clearly. Do not flirt without purpose.
-
Staged Testing: Observe her behavior in different settings (stress, boredom, family, social).
-
Track Record Review: Know her history, relationship, sexual, emotional, legal. People do not change patterns without great effort or external force.
-
Frame Integrity: Maintain leadership, emotional control, and escalation pacing.
Disqualifiers in Women:
-
History of promiscuity, masculine affect, open contempt for male authority, or unstable social bonds.
-
Signs of status-seeking over loyalty.
-
Defensiveness against vetting, resistance to transparency is a red flag.
Remediation Steps for Men:
-
Create a written checklist of values, standards, and red flags.
-
Practice controlled emotional investment: do not fall in love before facts.
-
Involve elder men or mentors in evaluating serious candidates.
Rationale: Your family is your most important project. Do not let your hormones sabotage your legacy. The discipline you apply here will determine the quality of your life 10, 20, even 40 years from now. Vet her like your children depend on it, because they will.
Common Objections and Necessary Corrections
“Women should accept me as I am.” That is not how selection works. You are not a product of sentiment, you are a man under judgment. And you will be judged. If you won’t improve, you are asking a woman to accept less so you can offer less. That’s not love, it’s laziness.
“This is outdated or too harsh.” Reality is not dated. The consequences of fatherlessness, broken homes, and unled women are timeless. What’s harsh is a man failing his family because he thought modernity made him exempt from responsibility.
“I know men who got married without doing all this.” Yes. And many of them are divorced, disrespected, or miserable. The bar is low. You are here to rise above it. The goal is not to ‘get married’, it is to build a durable, high-trust household.
“Women today are the real problem.” That may be partly true. But you are the variable you control. Let weak men complain. Strong men adapt, improve, and filter. If you are not rising above the noise, you are being drowned by it.
“This feels autistic or robotic.” It’s supposed to be procedural. That’s what makes it reliable. Emotion has its place, in protection, in passion, in pride, but your vetting process must be strategic. That’s not autism, it’s wisdom.
“Good men don’t need to judge women like this.” Wrong. Good men judge quietly but thoroughly. They know that marrying wrong will cost them their peace, their children, their mission. Judgment is not cruelty, it’s care.
“I don’t want to put in this much work.” Then don’t. But understand, you have chosen disqualification. The work is the entry fee. Excellence is rare for a reason. You are either one of the few who rise or one of the many who wish.
“Women today just aren’t worth marrying.” Not the women you can currently attract. If you’re only meeting low-quality women, you’re probably at their level. If you want to meet better women, you must become a better man.
“As long as the marriage laws are the way they are, it’s not worth it.” Marriage laws only come into play if you fail and get divorced. This process exists to help you avoid divorce. Stay out of court by vetting properly and building wisely.
“Tell me exactly what men get out of marriage in 2025.” Peace. Legacy. Daily affection. Loyalty. Children. A fortified home. Someone to multiply your effort and love. It’s what strong men throughout history have always wanted, and built.
“There aren’t enough good women left.” There are nearly equal numbers of men and women who qualify. It only feels unbalanced when you're not in the right networks or vetting properly. The solution isn’t despair, it’s improvement.
“50% of men will never be attractive to women.” Only if they stay in the bottom 50%. Normally men cycle in and out of the bottom 50%. That has always been true. The solution isn’t resignation, it’s advancement. Do the work in this audit, and you’ll be in the top 25%. Men who say this as an excuse are signaling their own stagnation. Focus on becoming the best version of yourself, not complaining.
Final Word: You’ve Got Work to Do
If you’ve read this far, you’ve already demonstrated what most men won’t: attention, endurance, and a willingness to face the truth. That alone separates you from the crowd.
If this document exposed your failures, good. That means you’re not too far gone. That means you still have a shot. It means you can recognize where to improve.
You don’t get a wife. You earn the trust to lead one. You don’t deserve a good woman, you build the capacity to attract and retain one.
Read this again. Make a plan. Audit weekly. Ask older and more successful men for correction. Get uncomfortable and get to work.
The future doesn’t need more weak men. It needs you at your best, mature, restored, resolute, and ready.
You’re not just choosing a woman. You’re choosing to become the man who will lead a household.
Make yourself a man who cannot be overlooked.
Your future begins now.
-
-
@ 2b998b04:86727e47
2025-05-25 03:28:59Turning 60
Ten years ago, I turned 50 with a vague sense that something was off.
I was building things, but they didn’t feel grounded.\ I was "in tech," but tech felt like a treadmill—just faster, sleeker tools chasing the same hollow outcomes.\ I knew about Bitcoin, but I dismissed it. I thought it was just “tech for tech’s sake.”
Less than a year later, I fell down the rabbit hole.
It didn’t happen all at once. At first it was curiosity. Then dissonance. Then conviction.
Somewhere in that process, I realized Bitcoin wasn’t just financial—it was philosophical. It was moral. It was real. And it held up a mirror to a life I had built on momentum more than mission.
So I started pruning.
I left Web3.\ I pulled back from projects that ran on hype instead of honesty.\ I repented—for chasing relevance instead of righteousness.\ And I began stacking—not just sats, but new habits. New thinking. New rhythms of faith, work, and rest.
Now at 60, I’m not where I thought I’d be.
But I’m more myself than I’ve ever been.\ More convicted.\ More rooted.\ More ready.
Not to start over—but to build again, from the foundation up.
If you're in that middle place—between chapters, between convictions, between certainty and surrender—you're not alone.
🟠 I’m still here. Still building. Still listening.
Zap if this resonates, or send your story. I’d love to hear it.
[*Zap *](https://tinyurl.com/yuyu2b9t)
-
@ c1e9ab3a:9cb56b43
2025-04-10 02:58:16Assumptions
| Factor | Assumption | |--------|------------| | CO₂ | Not considered a pollutant or is captured/stored later | | Water Use | Regulated across all sources; cooling towers or dry cooling required | | Compliance Cost | Nuclear no longer burdened by long licensing and construction delays | | Coal Waste | Treated as valuable raw material (e.g., fly ash for cement, gypsum from scrubbers) | | Nuclear Tech | Gen IV SMRs in widespread use (e.g., 50–300 MWe units, modular build, passive safety) | | Grid Role | All three provide baseload or load-following power | | Fuel Pricing | Moderate and stable (no energy crisis or supply chain disruptions) |
Performance Comparison
| Category | Coal (IGCC + Scrubbers) | Natural Gas (CCGT) | Nuclear (Gen IV SMRs) | |---------|-----------------------------|------------------------|--------------------------| | Thermal Efficiency | 40–45% | 55–62% | 30–35% | | CAPEX ($/kW) | $3,500–5,000 | $900–1,300 | $4,000–7,000 (modularized) | | O&M Cost ($/MWh) | $30–50 | $10–20 | $10–25 | | Fuel Cost ($/MWh) | $15–25 | $25–35 | $6–10 | | Water Use (gal/MWh) | 300–500 (with cooling towers) | 100–250 | 300–600 | | Air Emissions | Very low (excluding CO₂) | Very low | None | | Waste | Usable (fly ash, FGD gypsum, slag) | Minimal | Compact, long-term storage required | | Ramp/Flexibility | Slow ramp (newer designs better) | Fast ramp | Medium (SMRs better than traditional) | | Footprint (Land & Supply) | Large (mining, transport) | Medium | Small | | Energy Density | Medium | Medium-high | Very high | | Build Time | 4–7 years | 2–4 years | 2–5 years (with factory builds) | | Lifecycle (years) | 40+ | 30+ | 60+ | | Grid Resilience | High | High | Very High (passive safety, long refuel) |
Strategic Role Summary
1. Coal (Clean & Integrated)
- Strengths: Long-term fuel security; byproduct reuse; high reliability; domestic resource.
- Drawbacks: Still low flexibility; moderate efficiency; large physical/logistical footprint.
- Strategic Role: Best suited for regions with abundant coal and industrial reuse markets.
2. Natural Gas (CCGT)
- Strengths: High efficiency, low CAPEX, grid agility, low emissions.
- Drawbacks: Still fossil-based; dependent on well infrastructure; less long-lived.
- Strategic Role: Excellent transitional and peaking solution; strong complement to renewables.
3. Nuclear (Gen IV SMRs)
- Strengths: Highest energy density; no air emissions or CO₂; long lifespan; modular & scalable.
- Drawbacks: Still needs safe waste handling; high upfront cost; novel tech in deployment stage.
- Strategic Role: Ideal for low-carbon baseload, remote areas, and national strategic assets.
Adjusted Levelized Cost of Electricity (LCOE)
| Source | LCOE ($/MWh) | Notes | |--------|------------------|-------| | Coal (IGCC w/scrubbers) | ~$75–95 | Lower with valuable waste | | Natural Gas (CCGT) | ~$45–70 | Highly competitive if fuel costs are stable | | Gen IV SMRs | ~$65–85 | Assuming factory production and streamlined permitting |
Final Verdict (Under Optimized Assumptions)
- Most Economical Short-Term: Natural Gas
- Most Strategic Long-Term: Gen IV SMRs
- Most Viable if Industrial Ecosystem Exists: Clean Coal
All three could coexist in a diversified, stable energy grid: - Coal filling a regional or industrial niche, - Gas providing flexibility and economy, - SMRs ensuring long-term sustainability and energy security.
-
@ c1e9ab3a:9cb56b43
2025-04-10 02:57:02A follow-up to nostr:naddr1qqgxxwtyxe3kvc3jvvuxywtyxs6rjq3qc856kwjk524kef97hazw5e9jlkjq4333r6yxh2rtgefpd894ddpsxpqqqp65wuaydz8
This whitepaper, a comparison of baseload power options, explores a strategic policy framework to reduce the cost of next-generation nuclear power by aligning Gen IV Small Modular Reactors (SMRs) with national security objectives, public utility management, and a competitive manufacturing ecosystem modeled after the aerospace industry. Under this approach, SMRs could deliver stable, carbon-free power at $40–55/MWh, rivaling the economics of natural gas and renewables.
1. Context and Strategic Opportunity
Current Nuclear Cost Challenges
- High capital expenditure ($4,000–$12,000/kW)
- Lengthy permitting and construction timelines (10–15 years)
- Regulatory delays and public opposition
- Customized, one-off reactor designs with no economies of scale
The Promise of SMRs
- Factory-built, modular units
- Lower absolute cost and shorter build time
- Enhanced passive safety
- Scalable deployment
2. National Security as a Catalyst
Strategic Benefits
- Energy resilience for critical defense infrastructure
- Off-grid operation and EMP/cyber threat mitigation
- Long-duration fuel cycles reduce logistical risk
Policy Implications
- Streamlined permitting and site access under national defense exemptions
- Budget support via Department of Defense and Department of Energy
- Co-location on military bases and federal sites
3. Publicly Chartered Utilities: A New Operating Model
Utility Framework
- Federally chartered, low-margin operator (like TVA or USPS)
- Financially self-sustaining through long-term PPAs
- Focus on reliability, security, and public service over profit
Cost Advantages
- Lower cost of capital through public backing
- Predictable revenue models
- Community trust and stakeholder alignment
4. Competitive Manufacturing: The Aviation Analogy
Model Characteristics
- Multiple certified vendors, competing under common safety frameworks
- Factory-scale production and supply chain specialization
- Domestic sourcing for critical components and fuel
Benefits
- Cost reductions from repetition and volume
- Innovation through competition
- Export potential and industrial job creation
5. Levelized Cost of Electricity (LCOE) Impact
| Cost Lever | Estimated LCOE Reduction | |------------|--------------------------| | Streamlined regulation | -10 to -20% | | Public-charter operation | -5 to -15% | | Factory-built SMRs | -15 to -30% | | Defense market anchor | -10% |
Estimated Resulting LCOE: $40–55/MWh
6. Strategic Outcomes
- Nuclear cost competitiveness with gas and renewables
- Decarbonization without reliability sacrifice
- Strengthened national energy resilience
- Industrial and workforce revitalization
- U.S. global leadership in clean, secure nuclear energy
7. Recommendations
- Create a public-private chartered SMR utility
- Deploy initial reactors on military and federal lands
- Incentivize competitive SMR manufacturing consortia
- Establish fast-track licensing for Gen IV designs
- Align DoD/DOE energy procurement to SMR adoption
Conclusion
This strategy would transform nuclear power from a high-cost, high-risk sector into a mission-driven, economically viable backbone of American energy and defense infrastructure. By treating SMRs as strategic assets, not just energy projects, the U.S. can unlock affordable, scalable, and secure nuclear power for generations to come.
-
@ 2183e947:f497b975
2025-05-01 22:33:48Most darknet markets (DNMs) are designed poorly in the following ways:
1. Hosting
Most DNMs use a model whereby merchants fill out a form to create their listings, and the data they submit then gets hosted on the DNM's servers. In scenarios where a "legal" website would be forced to censor that content (e.g. a DMCA takedown order), DNMs, of course, do not obey. This can lead to authorities trying to find the DNM's servers to take enforcement actions against them. This design creates a single point of failure.
A better design is to outsource hosting to third parties. Let merchants host their listings on nostr relays, not on the DNM's server. The DNM should only be designed as an open source interface for exploring listings hosted elsewhere, that way takedown orders end up with the people who actually host the listings, i.e. with nostr relays, and not with the DNM itself. And if a nostr relay DOES go down due to enforcement action, it does not significantly affect the DNM -- they'll just stop querying for listings from that relay in their next software update, because that relay doesn't work anymore, and only query for listings from relays that still work.
2. Moderation
Most DNMs have employees who curate the listings on the DNM. For example, they approve/deny listings depending on whether they fit the content policies of the website. Some DNMs are only for drugs, others are only for firearms. The problem is, to approve a criminal listing is, in the eyes of law enforcement, an act of conspiracy. Consequently, they don't just go after the merchant who made the listing but the moderators who approved it, and since the moderators typically act under the direction of the DNM, this means the police go after the DNM itself.
A better design is to outsource moderation to third parties. Let anyone call themselves a moderator and create lists of approved goods and services. Merchants can pay the most popular third party moderators to add their products to their lists. The DNM itself just lets its users pick which moderators to use, such that the user's choice -- and not a choice by the DNM -- determines what goods and services the user sees in the interface.
That way, the police go after the moderators and merchants rather than the DNM itself, which is basically just a web browser: it doesn't host anything or approve of any content, it just shows what its users tell it to show. And if a popular moderator gets arrested, his list will still work for a while, but will gradually get more and more outdated, leading someone else to eventually become the new most popular moderator, and a natural transition can occur.
3. Escrow
Most DNMs offer an escrow solution whereby users do not pay merchants directly. Rather, during the Checkout process, they put their money in escrow, and request the DNM to release it to the merchant when the product arrives, otherwise they initiate a dispute. Most DNMs consider escrow necessary because DNM users and merchants do not trust one another; users don't want to pay for a product first and then discover that the merchant never ships it, and merchants don't want to ship a product first and then discover that the user never pays for it.
The problem is, running an escrow solution for criminals is almost certain to get you accused of conspiracy, money laundering, and unlicensed money transmission, so the police are likely to shut down any DNM that does this. A better design is to oursource escrow to third parties. Let anyone call themselves an escrow, and let moderators approve escrows just like they approve listings. A merchant or user who doesn't trust the escrows chosen by a given moderator can just pick a different moderator. That way, the police go after the third party escrows rather than the DNM itself, which never touches user funds.
4. Consequences
Designing a DNM along these principles has an interesting consequence: the DNM is no longer anything but an interface, a glorified web browser. It doesn't host any content, approve any listings, or touch any money. It doesn't even really need a server -- it can just be an HTML file that users open up on their computer or smart phone. For two reasons, such a program is hard to take down:
First, it is hard for the police to justify going after the DNM, since there are no charges to bring. Its maintainers aren't doing anything illegal, no more than Firefox does anything illegal by maintaining a web browser that some people use to browse illegal content. What the user displays in the app is up to them, not to the code maintainers. Second, if the police decided to go after the DNM anyway, they still couldn't take it down because it's just an HTML file -- the maintainers do not even need to run a server to host the file, because users can share it with one another, eliminating all single points of failure.
Another consequence of this design is this: most of the listings will probably be legal, because there is more demand for legal goods and services than illegal ones. Users who want to find illegal goods would pick moderators who only approve those listings, but everyone else would use "legal" moderators, and the app would not, at first glance, look much like a DNM, just a marketplace for legal goods and services. To find the illegal stuff that lurks among the abundant legal stuff, you'd probably have to filter for it via your selection of moderators, making it seem like the "default" mode is legal.
5. Conclusion
I think this DNM model is far better than the designs that prevail today. It is easier to maintain, harder to take down, and pushes the "hard parts" to the edges, so that the DNM is not significantly affected even if a major merchant, moderator, or escrow gets arrested. I hope it comes to fruition.
-
@ 2b998b04:86727e47
2025-05-25 03:19:19n an inflationary system, the goal is often just to keep up.
With prices always rising, most of us are stuck in a race:\ Earn more to afford more.\ Spend before your money loses value.\ Monetize everything just to stay ahead of the curve.
Work becomes reactive.\ You hustle to outrun rising costs.\ You take on projects you don’t believe in just to make next month’s bills.\ Money decays. So you move faster, invest riskier, and burn out quicker.
But what happens when the curve flips?
A deflationary economy—like the one Bitcoin makes possible—rewards stillness, reflection, and intentionality.
Time favors the saver, not the spender.\ Money gains purchasing power.\ You’re no longer punished for patience.
You don’t have to convert your energy into cash before it loses value.\ You don’t have to be always on.\ You can actually afford to wait for the right work.
And when you do work—it means more.
💡 The “bullshit jobs” David Graeber wrote about start to disappear.\ There’s no need to look busy just to justify your existence.\ There’s no reward for parasitic middle layers.\ Instead, value flows to real craft, real care, and real proof of work—philosophically and literally.
So what does a job look like in that world?
— A farmer building soil instead of chasing subsidies.\ — An engineer optimizing for simplicity instead of speed.\ — A craftsman making one perfect table instead of ten cheap ones.\ — A writer telling the truth without clickbait.\ — A builder who says no more than they say yes.
You choose work that endures—not because it pays instantly, but because it’s worth doing.
The deflationary future isn’t a fantasy.\ It’s a recalibration.
It’s not about working less.\ It’s about working better.
That’s what Bitcoin taught me.\ That’s what I’m trying to live now.
🟠 If you’re trying to align your work with these values, I’d love to connect.\ Zap this post, reply with your story, or follow along as I build—without permission, but with conviction.\ [https://tinyurl.com/yuyu2b9t](https://tinyurl.com/yuyu2b9t)
-
@ c1e9ab3a:9cb56b43
2025-04-10 02:55:11The United States is on the cusp of a historic technological renaissance, often referred to as the Fourth Industrial Revolution. Artificial intelligence, automation, advanced robotics, quantum computing, biotechnology, and clean manufacturing are converging into a seismic shift that will redefine how we live, work, and relate to one another. But there's a critical catch: this transformation depends entirely on the availability of stable, abundant, and inexpensive electricity.
Why Electricity is the Keystone of Innovation
Let’s start with something basic but often overlooked. Every industrial revolution has had an energy driver:
- The First rode the steam engine, powered by coal.
- The Second was electrified through centralized power plants.
- The Third harnessed computing and the internet.
- The Fourth will demand energy on a scale and reliability never seen before.
Imagine a city where thousands of small factories run 24/7 with robotics and AI doing precision manufacturing. Imagine a national network of autonomous vehicles, delivery drones, urban vertical farms, and high-bandwidth communication systems. All of this requires uninterrupted and inexpensive power.
Without it? Costs balloon. Innovation stalls. Investment leaves. And America risks becoming a second-tier economic power in a multipolar world.
So here’s the thesis: If we want to lead the Fourth Industrial Revolution, we must first lead in energy. And nuclear — specifically Gen IV Small Modular Reactors (SMRs) — must be part of that leadership.
The Nuclear Case: Clean, Scalable, Strategic
Let’s debunk the myth: nuclear is not the boogeyman of the 1970s. It’s one of the safest, cleanest, and most energy-dense sources we have.
But traditional nuclear has problems:
- Too expensive to build.
- Too long to license.
- Too bespoke and complex.
Enter Gen IV SMRs:
- Factory-built and transportable.
- Passively safe with walk-away safety designs.
- Scalable in 50–300 MWe increments.
- Ideal for remote areas, industrial parks, and military bases.
But even SMRs will struggle under the current regulatory, economic, and manufacturing ecosystem. To unlock their potential, we need a new national approach.
The Argument for National Strategy
Let’s paint a vision:
SMRs deployed at military bases across the country, secured by trained personnel, powering critical infrastructure, and feeding clean, carbon-free power back into surrounding communities.
SMRs operated by public chartered utilities—not for Wall Street profits, but for stability, security, and public good.
SMRs manufactured by a competitive ecosystem of certified vendors, just like aircraft or medical devices, with standard parts and rapid regulatory approval.
This isn't science fiction. It's a plausible, powerful model. Here’s how we do it.
Step 1: Treat SMRs as a National Security Asset
Why does the Department of Defense spend billions to secure oil convoys and build fuel depots across the world, but not invest in nuclear microgrids that would make forward bases self-sufficient for decades?
Nuclear power is inherently a strategic asset:
- Immune to price shocks.
- Hard to sabotage.
- Decades of stable power from a small footprint.
It’s time to reframe SMRs from an energy project to a national security platform. That changes everything.
Step 2: Create Public-Chartered Operating Companies
We don’t need another corporate monopoly or Wall Street scheme. Instead, let’s charter SMR utilities the way we chartered the TVA or the Postal Service:
- Low-margin, mission-oriented.
- Publicly accountable.
- Able to sign long-term contracts with DOD, DOE, or regional utilities.
These organizations won’t chase quarterly profits. They’ll chase uptime, grid stability, and national resilience.
Step 3: Build a Competitive SMR Industry Like Aerospace
Imagine multiple manufacturers building SMRs to common, certified standards. Components sourced from a wide supplier base. Designs evolving year over year, with upgrades like software and avionics do.
This is how we build:
- Safer reactors
- Cheaper units
- Modular designs
- A real export industry
Airplanes are safe, affordable, and efficient because of scale and standardization. We can do the same with reactors.
Step 4: Anchor SMRs to the Coming Fourth Industrial Revolution
AI, robotics, and distributed manufacturing don’t need fossil fuels. They need cheap, clean, continuous electricity.
- AI datacenters
- Robotic agriculture
- Carbon-free steel and cement
- Direct air capture
- Electric industrial transport
SMRs enable this future. And they decentralize power, both literally and economically. That means jobs in every region, not just coastal tech hubs.
Step 5: Pair Energy Sovereignty with Economic Reform
Here’s the big leap: what if this new energy architecture was tied to a transparent, auditable, and sovereign monetary system?
- Public utilities priced in a new digital dollar.
- Trade policy balanced by low-carbon energy exports.
- Public accounting verified with open ledgers.
This is not just national security. It’s monetary resilience.
The world is moving to multi-polar trade systems. Energy exports and energy reliability will define economic influence. If America leads with SMRs, we lead the conversation.
Conclusion: A Moral and Strategic Imperative
We can either:
- Let outdated fears and bureaucracy stall the future, or...
- Build the infrastructure for clean, secure, and sovereign prosperity.
We have the designs.
We have the talent.
We have the need.What we need now is will.
The Fourth Industrial Revolution will either be powered by us—or by someone else. Let’s make sure America leads. And let’s do it with SMRs, public charter, competitive industry, and national purpose.
It’s time.
This is a call to engineers, legislators, veterans, economists, and every American who believes in building again. SMRs are not just about power. They are about sovereignty, security, and shared prosperity.
Further reading:
nostr:naddr1qqgrjv33xenx2drpve3kxvrp8quxgqgcwaehxw309anxjmr5v4ezumn0wd68ytnhd9hx2tczyrq7n2e62632km9yh6l5f6nykt76gzkxxy0gs6agddr9y95uk445xqcyqqq823cdzc99s
-
@ ee6ea13a:959b6e74
2025-04-06 16:38:22Chef's notes
You can cook this in one pan on the stove. I use a cast iron pan, but you can make it in a wok or any deep pan.
I serve mine over rice, which I make in a rice cooker. If you have a fancy one, you might have a setting for sticky or scorched rice, so give one of those a try.
To plate this, I scoop rice into a bowl, and then turn it upside-down to give it a dome shape, then spoon the curry on top of it.
Serve with chopped cilantro and lime wedges.
Details
- ⏲️ Prep time: 20
- 🍳 Cook time: 20
- 🍽️ Servings: 4
Ingredients
- 1 ½ pounds boneless skinless chicken breast, cut into 2" pieces
- 2 tablespoons coconut or avocado oil
- 1 cup white or yellow onion, finely diced
- 1 cup red bell pepper, sliced or diced
- 4 large garlic cloves, minced
- 1 small (4oz) jar of Thai red curry paste
- 1 can (13oz) unsweetened coconut milk
- 1 teaspoon ground ginger
- 1 teaspoon ground coriander
- 1 tablespoon soy sauce
- 1 tablespoon brown sugar
- 1 cup carrots, shredded or julienned
- 1 lime, zest and juice
- ¼ cup fresh cilantro, chopped for garnish
Directions
- Heat oil in a large skillet over medium-high. Once hot, add onions and ½ teaspoon salt. Cook 3 minutes, or until onions are softened, stirring often.
- Add the red curry paste, garlic, ginger, and coriander. Cook about 1 minute, or until fragrant, stirring often.
- Add coconut milk, brown sugar, soy sauce, and chicken. Stir, bring to a simmer, then reduce heat to medium. Simmer uncovered for 7 minutes, occasionally stirring.
- Add carrots and red bell peppers, and simmer 5-7 more minutes, until sauce slightly thickens and chicken is cooked through.
- Remove from heat, and stir in the lime zest, and half of the lime juice.
- Serve over rice, topped with cilantro, and add more lime juice if you like extra citrus.
-
@ 21335073:a244b1ad
2025-05-01 01:51:10Please respect Virginia Giuffre’s memory by refraining from asking about the circumstances or theories surrounding her passing.
Since Virginia Giuffre’s death, I’ve reflected on what she would want me to say or do. This piece is my attempt to honor her legacy.
When I first spoke with Virginia, I was struck by her unshakable hope. I had grown cynical after years in the anti-human trafficking movement, worn down by a broken system and a government that often seemed complicit. But Virginia’s passion, creativity, and belief that survivors could be heard reignited something in me. She reminded me of my younger, more hopeful self. Instead of warning her about the challenges ahead, I let her dream big, unburdened by my own disillusionment. That conversation changed me for the better, and following her lead led to meaningful progress.
Virginia was one of the bravest people I’ve ever known. As a survivor of Epstein, Maxwell, and their co-conspirators, she risked everything to speak out, taking on some of the world’s most powerful figures.
She loved when I said, “Epstein isn’t the only Epstein.” This wasn’t just about one man—it was a call to hold all abusers accountable and to ensure survivors find hope and healing.
The Epstein case often gets reduced to sensational details about the elite, but that misses the bigger picture. Yes, we should be holding all of the co-conspirators accountable, we must listen to the survivors’ stories. Their experiences reveal how predators exploit vulnerabilities, offering lessons to prevent future victims.
You’re not powerless in this fight. Educate yourself about trafficking and abuse—online and offline—and take steps to protect those around you. Supporting survivors starts with small, meaningful actions. Free online resources can guide you in being a safe, supportive presence.
When high-profile accusations arise, resist snap judgments. Instead of dismissing survivors as “crazy,” pause to consider the trauma they may be navigating. Speaking out or coping with abuse is never easy. You don’t have to believe every claim, but you can refrain from attacking accusers online.
Society also fails at providing aftercare for survivors. The government, often part of the problem, won’t solve this. It’s up to us. Prevention is critical, but when abuse occurs, step up for your loved ones and community. Protect the vulnerable. it’s a challenging but a rewarding journey.
If you’re contributing to Nostr, you’re helping build a censorship resistant platform where survivors can share their stories freely, no matter how powerful their abusers are. Their voices can endure here, offering strength and hope to others. This gives me great hope for the future.
Virginia Giuffre’s courage was a gift to the world. It was an honor to know and serve her. She will be deeply missed. My hope is that her story inspires others to take on the powerful.
-
@ fd208ee8:0fd927c1
2025-04-05 21:51:52Markdown: Syntax
Note: This document is itself written using Markdown; you can see the source for it by adding '.text' to the URL.
Overview
Philosophy
Markdown is intended to be as easy-to-read and easy-to-write as is feasible.
Readability, however, is emphasized above all else. A Markdown-formatted document should be publishable as-is, as plain text, without looking like it's been marked up with tags or formatting instructions. While Markdown's syntax has been influenced by several existing text-to-HTML filters -- including Setext, atx, Textile, reStructuredText, Grutatext, and EtText -- the single biggest source of inspiration for Markdown's syntax is the format of plain text email.
Block Elements
Paragraphs and Line Breaks
A paragraph is simply one or more consecutive lines of text, separated by one or more blank lines. (A blank line is any line that looks like a blank line -- a line containing nothing but spaces or tabs is considered blank.) Normal paragraphs should not be indented with spaces or tabs.
The implication of the "one or more consecutive lines of text" rule is that Markdown supports "hard-wrapped" text paragraphs. This differs significantly from most other text-to-HTML formatters (including Movable Type's "Convert Line Breaks" option) which translate every line break character in a paragraph into a
<br />
tag.When you do want to insert a
<br />
break tag using Markdown, you end a line with two or more spaces, then type return.Headers
Markdown supports two styles of headers, [Setext] [1] and [atx] [2].
Optionally, you may "close" atx-style headers. This is purely cosmetic -- you can use this if you think it looks better. The closing hashes don't even need to match the number of hashes used to open the header. (The number of opening hashes determines the header level.)
Blockquotes
Markdown uses email-style
>
characters for blockquoting. If you're familiar with quoting passages of text in an email message, then you know how to create a blockquote in Markdown. It looks best if you hard wrap the text and put a>
before every line:This is a blockquote with two paragraphs. Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Aliquam hendrerit mi posuere lectus. Vestibulum enim wisi, viverra nec, fringilla in, laoreet vitae, risus.
Donec sit amet nisl. Aliquam semper ipsum sit amet velit. Suspendisse id sem consectetuer libero luctus adipiscing.
Markdown allows you to be lazy and only put the
>
before the first line of a hard-wrapped paragraph:This is a blockquote with two paragraphs. Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Aliquam hendrerit mi posuere lectus. Vestibulum enim wisi, viverra nec, fringilla in, laoreet vitae, risus.
Donec sit amet nisl. Aliquam semper ipsum sit amet velit. Suspendisse id sem consectetuer libero luctus adipiscing.
Blockquotes can be nested (i.e. a blockquote-in-a-blockquote) by adding additional levels of
>
:This is the first level of quoting.
This is nested blockquote.
Back to the first level.
Blockquotes can contain other Markdown elements, including headers, lists, and code blocks:
This is a header.
- This is the first list item.
- This is the second list item.
Here's some example code:
return shell_exec("echo $input | $markdown_script");
Any decent text editor should make email-style quoting easy. For example, with BBEdit, you can make a selection and choose Increase Quote Level from the Text menu.
Lists
Markdown supports ordered (numbered) and unordered (bulleted) lists.
Unordered lists use asterisks, pluses, and hyphens -- interchangably -- as list markers:
- Red
- Green
- Blue
is equivalent to:
- Red
- Green
- Blue
and:
- Red
- Green
- Blue
Ordered lists use numbers followed by periods:
- Bird
- McHale
- Parish
It's important to note that the actual numbers you use to mark the list have no effect on the HTML output Markdown produces. The HTML Markdown produces from the above list is:
If you instead wrote the list in Markdown like this:
- Bird
- McHale
- Parish
or even:
- Bird
- McHale
- Parish
you'd get the exact same HTML output. The point is, if you want to, you can use ordinal numbers in your ordered Markdown lists, so that the numbers in your source match the numbers in your published HTML. But if you want to be lazy, you don't have to.
To make lists look nice, you can wrap items with hanging indents:
- Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Aliquam hendrerit mi posuere lectus. Vestibulum enim wisi, viverra nec, fringilla in, laoreet vitae, risus.
- Donec sit amet nisl. Aliquam semper ipsum sit amet velit. Suspendisse id sem consectetuer libero luctus adipiscing.
But if you want to be lazy, you don't have to:
- Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Aliquam hendrerit mi posuere lectus. Vestibulum enim wisi, viverra nec, fringilla in, laoreet vitae, risus.
- Donec sit amet nisl. Aliquam semper ipsum sit amet velit. Suspendisse id sem consectetuer libero luctus adipiscing.
List items may consist of multiple paragraphs. Each subsequent paragraph in a list item must be indented by either 4 spaces or one tab:
-
This is a list item with two paragraphs. Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Aliquam hendrerit mi posuere lectus.
Vestibulum enim wisi, viverra nec, fringilla in, laoreet vitae, risus. Donec sit amet nisl. Aliquam semper ipsum sit amet velit.
-
Suspendisse id sem consectetuer libero luctus adipiscing.
It looks nice if you indent every line of the subsequent paragraphs, but here again, Markdown will allow you to be lazy:
-
This is a list item with two paragraphs.
This is the second paragraph in the list item. You're only required to indent the first line. Lorem ipsum dolor sit amet, consectetuer adipiscing elit.
-
Another item in the same list.
To put a blockquote within a list item, the blockquote's
>
delimiters need to be indented:-
A list item with a blockquote:
This is a blockquote inside a list item.
To put a code block within a list item, the code block needs to be indented twice -- 8 spaces or two tabs:
- A list item with a code block:
<code goes here>
Code Blocks
Pre-formatted code blocks are used for writing about programming or markup source code. Rather than forming normal paragraphs, the lines of a code block are interpreted literally. Markdown wraps a code block in both
<pre>
and<code>
tags.To produce a code block in Markdown, simply indent every line of the block by at least 4 spaces or 1 tab.
This is a normal paragraph:
This is a code block.
Here is an example of AppleScript:
tell application "Foo" beep end tell
A code block continues until it reaches a line that is not indented (or the end of the article).
Within a code block, ampersands (
&
) and angle brackets (<
and>
) are automatically converted into HTML entities. This makes it very easy to include example HTML source code using Markdown -- just paste it and indent it, and Markdown will handle the hassle of encoding the ampersands and angle brackets. For example, this:<div class="footer"> © 2004 Foo Corporation </div>
Regular Markdown syntax is not processed within code blocks. E.g., asterisks are just literal asterisks within a code block. This means it's also easy to use Markdown to write about Markdown's own syntax.
tell application "Foo" beep end tell
Span Elements
Links
Markdown supports two style of links: inline and reference.
In both styles, the link text is delimited by [square brackets].
To create an inline link, use a set of regular parentheses immediately after the link text's closing square bracket. Inside the parentheses, put the URL where you want the link to point, along with an optional title for the link, surrounded in quotes. For example:
This is an example inline link.
This link has no title attribute.
Emphasis
Markdown treats asterisks (
*
) and underscores (_
) as indicators of emphasis. Text wrapped with one*
or_
will be wrapped with an HTML<em>
tag; double*
's or_
's will be wrapped with an HTML<strong>
tag. E.g., this input:single asterisks
single underscores
double asterisks
double underscores
Code
To indicate a span of code, wrap it with backtick quotes (
`
). Unlike a pre-formatted code block, a code span indicates code within a normal paragraph. For example:Use the
printf()
function. -
@ c8adf82a:7265ee75
2025-04-04 01:58:49What is knowledge? Why do we need it?
Since we were small, our parents/guardian put us in school, worked their asses off to give us elective lessons, some get help until college, some even after college and after professional work. Why is this intelligence thing so sought after?
When you were born, you mostly just accepted what your parents said, they say go to school - you go to school, they say go learn the piano - you learn the piano. Of course with a lot of questions and denials, but you do it because you know your parents are doing it for your own good. You can feel the love so you disregard the 'why' and go on with faith
Everything starts with why, and for most people maybe the purpose of knowledge is to be smarter, to know more, just because. But for me this sounds utterly useless. One day I will die next to a man with half a brain and we would feel the same exact thing on the ground. Literally being smarter at the end does not matter at all
However, I am not saying to just be lazy and foolish. For me the purpose of knowledge is action. The more you learn, the more you know what to do, the more you can be sure you are doing the right thing, the more you can make progress on your own being, etc etc
Now, how can you properly learn? Imagine a water bottle. The water bottle's sole purpose is to contain water, but you cannot fill in the water bottle before you open the cap. To learn properly, make sure you open the cap and let all that water pour into you
If you are reading this, you are alive. Don't waste your time doing useless stuff and start to make a difference in your life
Seize the day
-
@ eb0157af:77ab6c55
2025-05-25 04:48:11Michigan lawmakers are unveiling a comprehensive strategy to regulate Bitcoin and cryptocurrencies.
On May 21, Republican Representative Bill Schuette introduced House Bill 4510, a proposal to amend the Michigan Public Employee Retirement System Investment Act. The legislation would allow the state treasurer, currently Rachael Eubanks, to diversify the state’s investments by including cryptocurrencies with an average market capitalization of over $250 million in the past calendar year.
Under current criteria, Bitcoin (BTC) and Ether (ETH) are the only cryptocurrencies that meet these selection standards. The proposal specifies that any investment in digital assets must be made through exchange-traded products (spot ETFs) issued by registered investment companies.
Anti-CBDC legislation
Republican Representative Bryan Posthumus is leading the bipartisan initiative behind the second bill, HB 4511, which establishes protections for cryptocurrency holders. The proposal prohibits Michigan from implementing crypto bans or imposing licensing requirements on digital asset holders.
Another key aspect of the legislation is a ban on state officials from supporting or promoting a potential federal central bank digital currency (CBDC). The definition includes the issuance of memorandums or official statements endorsing CBDC proposals related to testing, adoption, or implementation.
Mining and redevelopment of abandoned sites
The third bill, HB 4512, is a proposal led by Democratic Representative Mike McFall for a bipartisan group. This initiative would establish a Bitcoin mining program allowing operators to use abandoned oil and natural gas sites.
The program calls for the appointment of a supervisor tasked with assessing the site’s remaining productive potential, identifying the last operator, and determining the length of abandonment. Prospective participants would need to submit detailed legal documentation of their organizational structure, demonstrate operational expertise in mining, and provide profitability breakeven estimates for their ventures.
The fourth and final bill, HB 4513, also introduced by the bipartisan group led by McFall, focuses on the fiscal aspect of the HB 4512 initiative. The proposal would amend Michigan’s income tax laws to include proceeds generated from the proposed Bitcoin mining program.
The post Michigan: four bills on pension funds, CBDCs, and mining appeared first on Atlas21.
-
@ c1e9ab3a:9cb56b43
2025-04-01 04:32:15I. Introduction
The phenomenon known as "speaking in tongues" has long been interpreted as either the miraculous ability to speak foreign languages or utter mysterious syllables by divine power. However, a re-examination of scriptural and apostolic texts suggests a deeper, spiritual interpretation: that "tongues" refers not to foreign speech but to the utterance of divine truths so profound that they are incomprehensible to most unless illuminated by the Spirit.
This treatise explores that interpretation in light of the writings of Paul, Peter, John, and the early Apostolic Fathers. We seek not to diminish the miraculous but to reveal the deeper purpose of spiritual utterance: the revelation of divine knowledge that transcends rational comprehension.
II. The Nature of Tongues as Spiritual Utterance
Tongues are best understood as Spirit-inspired expressions of divine truth—utterances that do not conform to human categories of knowledge or language. As Paul writes in 1 Corinthians 14:2, "He who speaks in a tongue speaks not to men but to God; for no one understands him, but he utters mysteries in the Spirit."
Such mysteries are not unintelligible in a chaotic sense but are veiled truths that require spiritual discernment. The speaker becomes a vessel of revelation. Without interpretation, the truth remains hidden, just as a parable remains a riddle to those without ears to hear.
III. Paul and the Hidden Wisdom of God
In his epistles, Paul often distinguishes between surface knowledge and spiritual wisdom. In 1 Corinthians 2:6-7, he writes:
"We speak wisdom among those who are mature, yet not the wisdom of this age... but we speak the wisdom of God in a mystery, the hidden wisdom which God ordained before the ages."
Tongues, then, are one vehicle by which such hidden wisdom is spoken. The gift of interpretation is not mere translation but the Spirit-led unveiling of meaning. Hence, Paul prioritizes intelligibility not to invalidate tongues, but to encourage the edification that comes when deep truth is revealed and understood (1 Cor. 14:19).
IV. Peter at Pentecost: Many Tongues, One Spirit
At Pentecost (Acts 2), each listener hears the apostles speak "in his own language"—but what they hear are "the mighty works of God." Rather than focusing on the mechanics of speech, the emphasis is on understanding. It was not merely a linguistic miracle but a revelatory one: divine truth reaching every heart in a way that transcended cultural and rational barriers.
V. John and the Prophetic Language of Revelation
The apostle John writes in symbols, visions, and layered meanings. Revelation is full of "tongues" in this spiritual sense—utterances that reveal while concealing. His Gospel presents the Spirit as the "Spirit of truth" who "will guide you into all truth" (John 16:13). This guiding is not logical deduction but illumination.
VI. The Apostolic Fathers on Inspired Speech
The Didache, an early Christian manual, warns that not everyone who claims to speak by the Spirit is truly inspired. This aligns with a view of tongues as spiritual utterance—deep truth that must be tested by its fruits and conformity to the ways of the Lord.
Polycarp and Ignatius do not emphasize miraculous speech, but their prayers and exhortations show a triadic awareness of Father, Son, and Spirit, and a reverence for spiritual knowledge passed through inspiration and faithful transmission.
VII. Interpretation: The Gift of Spiritual Discernment
In this model, the interpreter of tongues is not a linguist but a spiritual discerner. As Joseph interpreted dreams in Egypt, so the interpreter makes the spiritual intelligible. This gift is not external translation but inward revelation—an unveiling of what the Spirit has spoken.
VIII. Conclusion: Tongues as a Veil and a Revelation
The true gift of tongues lies not in speech but in meaning—in truth spoken from a higher realm that must be spiritually discerned. It is a veil that conceals the holy from the profane, and a revelation to those led by the Spirit of truth.
Thus, we do not reject the miraculous, but recognize that the greatest miracle is understanding—when divine mysteries, spoken in spiritual tongue, are made known to the heart by the Spirit.
"He who has an ear, let him hear what the Spirit says to the churches." (Revelation 2:7)
-
@ 34ff86e0:dbb6b9fb
2025-05-25 02:36:39test openletter redirection after creation
-
@ eb0157af:77ab6c55
2025-05-25 04:48:10A fake Uber driver steals $73,000 in XRP and $50,000 in Bitcoin after drugging an American tourist.
A U.S. citizen vacationing in the United Kingdom fell victim to a scam that cost him $123,000 in cryptocurrencies stored on his smartphone. The man was drugged by an individual posing as an Uber driver.
According to My London, Jacob Irwin-Cline had spent the evening at a London nightclub, consuming several alcoholic drinks before requesting an Uber ride home. The victim admitted he hadn’t carefully verified the booking details on his device, mistakenly getting into a private taxi driven by someone who, at first glance, resembled the expected Uber driver but was using a completely different vehicle.
Once inside the car, the American tourist reported that the driver offered him a cigarette, allegedly laced with scopolamine — a rare and powerful sedative. Irwin-Cline described how the smoke made him extremely docile and fatigued, causing him to lose consciousness for around half an hour.
Upon waking, the driver ordered the victim to get out of the vehicle. As Irwin-Cline stepped out, the man suddenly accelerated, running him over and fleeing with his mobile phone, which contained the private keys and access to his cryptocurrencies. Screenshots provided to MyLondon show that $73,000 worth of XRP and $50,000 in bitcoin had been transferred to various wallets.
This incident adds to a growing trend of kidnappings, extortions, armed robberies, and ransom attempts targeting crypto executives, investors, and their families.
Just a few weeks ago, the daughter and grandson of Pierre Noizat, CEO of crypto exchange Paymium, were targeted in a kidnapping attempt in Paris. The incident took place in broad daylight when attackers tried to force the family into a parked vehicle. However, Noizat’s daughter managed to fight off the assailants.
The post American tourist drugged and robbed: $123,000 in crypto stolen in London appeared first on Atlas21.
-
@ 47c860d3:b3f71b74
2025-05-25 01:56:39ไขความลับรหัส 13 ตัวอักษรของ FT8: ศาสตร์แห่งการบีบอัดข้อมูลสื่อสารดิจิทัล คืนหนึ่ง ผมนั่งอยู่หน้าจอคอมพิวเตอร์ มองสัญญาณ FT8 กระพริบไปมา ส่งข้อความสั้นๆ ซ้ำไปซ้ำมา "CQ HS1IWX OK03" แล้วก็รอให้ใครสักคนตอบกลับ วนลูปไปอย่างไม่รู้จบ จนเกิดคำถามขึ้นมาในหัว... “นี่เรานั่งทำอะไรกันแน่?” FT8 มันควรเป็นอะไรมากกว่านี้ใช่ไหม? ไม่ใช่แค่การส่งคำสั้นๆ 13 ตัวอักษรไปมาเท่านั้น! เอ๊ะ! เดี๋ยวก่อน... 13 ตัวอักษร? ถ้าการส่งข้อความจำกัดที่ 13 ตัวอักษร แล้วทำไมข้อความอย่าง "CQ HS1IWX OK03" ซึ่งดูเหมือนจะมี 14 ตัวอักษร (รวมช่องว่าง) ถึงสามารถส่งได้? นี่มันต้องมีอะไรซ่อนอยู่! ระบบ FT8 ใช้เวทมนตร์อะไร หรือมันมีเทคนิคการเข้ารหัสแบบลับๆ ที่เรายังไม่รู้? และคำว่า "13 ตัวอักษร" ที่เขาพูดถึงนั้นหมายถึงอะไรกันแน่? แล้วลองนึกดูสิ... ถ้าเราอยู่ในสถานการณ์ฉุกเฉิน ต้องส่งข้อความที่สั้น กระชับ และมีความหมาย ในขณะที่แบตเตอรี่เหลือน้อย กำลังส่งต่ำ และอุปกรณ์มีเพียงเครื่องวิทยุขนาดเล็กกับสายอากาศชั่วคราวและมือถือ บางครั้ง FT8 อาจจะเป็นตัวเลือกเดียวที่ช่วยให้เราส่งสัญญาณขอความช่วยเหลือได้ เพราะมันสามารถถอดรหัสได้แม้สัญญาณอ่อนจนแทบจะมองไม่เห็น! ดังนั้น ผมต้องขุดลึกลงไป เพื่อไขความลับของรหัส 13 ตัวอักษรของ FT8 และหาคำตอบว่า ทำไม FT8 สามารถส่งข้อความบางอย่างที่ดูเหมือนยาวเกินขีดจำกัดได้? พร้อมกับสำรวจว่ามันสามารถช่วยเหลือเราในสถานการณ์ฉุกเฉินได้อย่างไร! อะไรคือความหมายที่แท้จริงของ 13 ตัวอักษร ? เมื่อเริ่มเจาะลึกลงไป ผมจึงได้รู้ว่า 13 ตัวอักษรที่เราพูดถึงนั้นหมายถึง ข้อความใน Free Text Mode หรือก็คือ ข้อความที่ไม่ได้ถูกเข้ารหัสในรูปแบบมาตรฐานของ FT8 หากเราส่งข้อความแบบอิสระ เช่น "HELLO WORLD!" หรือ "EMERGENCY CALL" เราจะถูกจำกัดแค่ 13 ตัวอักษรเท่านั้น เพราะข้อความเหล่านี้ไม่ได้ถูกเข้ารหัสให้เหมาะสมกับโปรโตคอลของระบบ FT8 แต่ถ้าเป็น ข้อความมาตรฐานที่ถูกกำหนดรูปแบบไว้แล้ว เช่น Callsign + Grid หรือ รายงาน SNR (-10, 599, RR73) ระบบ FT8 จะใช้การเข้ารหัส 77-bit Structured Message ซึ่งช่วยให้สามารถส่งข้อมูลได้มากกว่า 13 ตัวอักษร! อะไรคือ โครงสร้าง 77-bit Message ใน FT8 FT8 ใช้ 77 บิต สำหรับการเข้ารหัสข้อมูล โดยแบ่งออกเป็น 3 ส่วนหลัก: ส่วนของข้อมูล จำนวนบิต รายละเอียด Callsign 1 (ต้นทาง) 28 บิต รหัสสถานีที่ส่ง Callsign 2 (ปลายทาง) 28 บิต รหัสสถานีปลายทาง หรือ CQ Exchange Data 21 บิต Grid Locator หรือข้อมูลอื่น ๆ รวมทั้งหมด = 28 + 28 + 21 = 77 บิต การที่ FT8 ใช้โครงสร้างแบบนี้ ข้อความที่ถูกเข้ารหัสในมาตรฐาน FT8 จึงสามารถส่งได้มากกว่า 13 ตัวอักษร เช่น "CQ HS1IWX OK03" นั้นถูกเข้ารหัสให้อยู่ใน 77 บิต ไม่ใช่ Free Text แบบปกติ ทำให้สามารถส่งได้โดยไม่มีปัญหา! แต่ข้อสำคัญมันคือโปโตคอลของระบบ FT8 ในปัจจุบัน ถ้าเราต้องการ เข้ารหัสเองในรูปแบบของเราเราก็ต้องพัฒนาโปรแกรม FT8 ของเราเอง (ผมทำไม่เป็นครับ555) ก็ใช้ของเขาไปก็ได้ แล้วก็มาพัฒนาระบบ เทคนิคการส่งข้อมูลให้มีประสิทธิภาพภายใน 13 ตัวอักษร กันน่าจะสนุกกว่า ส่วนเรื่องรายละเอียดวิธีการเข้ารหัสผมคงไม่พูดถึงนะ เดี๋ยวจะวิชาการน่าเบื่อไปครับ ใครสนใจก็ไปศึกษาต่อกันเอาเองครับ การเข้ารหัสนี้จะใช้ร่วมกับเทคนิค FEC (Forward Error Correction) ใน FT8 ซึ่งเป็นหนึ่งในเทคนิคที่ทำให้ FT8 สามารถถอดรหัสข้อความได้แม้ในสภาวะสัญญาณอ่อน คือการใช้ Forward Error Correction (FEC) หรือ การแก้ไขข้อผิดพลาดล่วงหน้า ซึ่งช่วยให้สามารถกู้คืนข้อมูลที่อาจเกิดการสูญหายในระหว่างการส่งสัญญาณได้ โดย FT8 ใช้ Reed-Solomon (RS) Error Correction Code ซึ่งเป็นอัลกอริธึมที่เพิ่มบิตสำรองเพื่อช่วยตรวจจับและแก้ไขข้อผิดพลาดในข้อความที่ส่งไป และ ใช้ Convolutional Encoding และ Viterbi Decoding ซึ่งช่วยให้สามารถแก้ไขข้อมูลที่ผิดพลาดจากสัญญาณรบกวนได้ ซึ่งเมื่อสัญญาณอ่อน ข้อมูลบางส่วนอาจสูญหาย แต่ FEC ช่วยให้สามารถกู้คืนข้อความได้แม้ข้อมูลบางส่วนจะขาดหาย ทำให้ผลลัพธ์คือ FT8 สามารถทำงานได้แม้ระดับสัญญาณต่ำถึง -20 dB! ซึ่งส่วนนี้ผมก็ยังไม่เข้าใจมันดีเท่าไหร่ครับ อิอิ ฟังเขามาอีกที สิ่งที่เราทำได้ตอนนี้ในโปรแกรม FT8 ในปัจจุบันก็คือ เทคนิคการส่งข้อมูลให้มีประสิทธิภาพภายใน 13 ตัวอักษรถ้าเรา อยากส่งข้อความฉุกเฉินภายใน 13 ตัวอักษร ให้ได้ข้อมูลมากที่สุด เราต้องใช้เทคนิคต่อไปนี้: การใช้ตัวย่อและรหัสสากล • SOS 1234 BKK แทน "ขอความช่วยเหลือที่พิกัด 1234 ใกล้กรุงเทพ" • WX BKK T35C แทน "สภาพอากาศกรุงเทพ 35 องศา" • ALRT TSUNAMI แทน "เตือนภัยสึนามิ" ใช้ข้อความที่อ่านเข้าใจง่าย • ใช้โค้ดสั้นๆ เช่น "QRZ EMRG?" แทน "ใครรับสัญญาณฉุกเฉิน?" การส่งข้อความเป็นชุด • เฟรม 1: MSG1 BKK STORM1 • เฟรม 2: MSG2 BKK STORM2 • เฟรม 3: MSG3 BKK NOW “การฝึกฝนเพื่อทำความเข้าใจการสื่อสารเป็นสิ่งสำคัญ เพราะเมื่อได้รับข้อความเหล่านี้ เราจะสามารถถอดรหัสและติดตามข้อมูลได้อย่างทันท่วงที” ครั้งนี้อาจเป็นเพียงการค้นพบอีกด้านหนึ่งของ FT8… หรือมันอาจเปลี่ยนมุมมองของคุณที่มีต่อโหมดสื่อสารดิจิทัลไปตลอดกาลก็ได้ แต่เดี๋ยวก่อน—นี่มันอะไรกัน!? จู่ๆ บนจอคอมพิวเตอร์ของผมก็ปรากฏคอลซายที่ไม่คุ้นตา D1IFU—คอลซายที่ไม่มีอยู่ในฐานข้อมูลของ ITU แต่กลับปรากฏขึ้นบนคลื่นความถี่ของเรา D1…? มันมาได้ยังไง? แล้วทันใดนั้น ผมก็ฉุกคิดขึ้นมา—มันคือคอลซายจากพื้นที่ Donetsk หรือ Luhansk พื้นที่ที่เต็มไปด้วยความขัดแย้ง ดินแดนที่เราคิดว่าเงียบงันภายใต้เสียงระเบิดและความไม่แน่นอน แต่ตอนนี้ กลับมีสัญญาณเล็กๆ ปรากฏขึ้นบน FT8 มันคือใครกัน? เป็นทหาร? เป็นพลเรือนที่พยายามติดต่อโลกภายนอก? หรือเป็นเพียงนักวิทยุสมัครเล่นที่ยังคงเฝ้าฟังแม้โลกจะเต็มไปด้วยความวุ่นวาย? แต่สิ่งหนึ่งที่แน่ชัด… “นี่คือสัญญาณแห่งชีวิต” จบข่าว. 🚀📡
-
@ c1e9ab3a:9cb56b43
2025-03-26 21:03:59Introduction
Nutsax is a capability-based access control system for Nostr relays, designed to provide flexible, privacy-preserving rate limiting, permissioning, and operation-scoped token redemption.
At its core, Nutsax introduces:
- Blind-signed tokens, issued by relays, for specific operation types.
- Token redemption as part of Nostr event publishing or interactions.
- Encrypted token storage using existing Nostr direct message infrastructure, allowing portable, persistent, and private storage of these tokens — the Nutsax.
This mechanism augments the existing Nostr protocol without disrupting adoption, requiring no changes to NIP-01 for clients or relays that don’t opt into the system.
Motivation
Nostr relays currently have limited tools for abuse prevention and access control. Options like IP banning, whitelisting, or monetized access are coarse and often centralized.
Nutsax introduces:
- Fine-grained, operation-specific access control using cryptographic tokens.
- Blind signature protocols to issue tokens anonymously, preserving user privacy.
- A native way to store and recover tokens using Nostr’s encrypted event system.
This allows relays to offer:
- Optional access policies (e.g., “3 posts per hour unless you redeem a token”)
- Paid or invite-based features (e.g., long-term subscriptions, advanced filters)
- Temporary elevation of privileges (e.g., bypass slow mode for one message)
All without requiring accounts, emails, or linking identity beyond the user’s
npub
.Core Components
1. Operation Tokens
Tokens are blind-signed blobs issued by the relay, scoped to a specific operation type (e.g.,
"write"
,"filter-subscribe"
,"broadcast"
).- Issued anonymously: using a blind signature protocol.
- Validated on redemption: at message submission or interaction time.
- Optional and redeemable: the relay decides when to enforce token redemption.
Each token encodes:
- Operation type (string)
- Relay ID (to scope the token)
- Expiration (optional)
- Usage count or burn-on-use flag
- Random nonce (blindness)
Example (before blinding):
json { "relay": "wss://relay.example", "operation": "write", "expires": 1720000000, "nonce": "b2a8c3..." }
This is then blinded and signed by the relay.
2. Token Redemption
Clients include tokens when submitting events or requests to the relay.
Token included via event tag:
json ["token", "<base64-encoded-token>", "write"]
Redemption can happen:
- Inline with any event (kind 1, etc.)
- As a standalone event (e.g., ephemeral kind 20000)
- During session initiation (optional AUTH extension)
The relay validates the token:
- Is it well-formed?
- Is it valid for this relay and operation?
- Is it unexpired?
- Has it been used already? (for burn-on-use)
If valid, the relay accepts the event or upgrades the rate/permission scope.
3. Nutsax: Private Token Storage on Nostr
Tokens are stored securely in the client’s Nutsax, a persistent, private archive built on Nostr’s encrypted event system.
Each token is stored in a kind 4 or kind 44/24 event, encrypted with the client’s own
npub
.Example:
json { "kind": 4, "tags": [ ["p", "<your npub>"], ["token-type", "write"], ["relay", "wss://relay.example"] ], "content": "<encrypted token blob>", "created_at": 1234567890 }
This allows clients to:
- Persist tokens across restarts or device changes.
- Restore tokens after reinstalling or reauthenticating.
- Port tokens between devices.
All without exposing the tokens to the public or requiring external storage infrastructure.
Client Lifecycle
1. Requesting Tokens
- Client authenticates to relay (e.g., via NIP-42).
- Requests blind-signed tokens:
- Sends blinded token requests.
- Receives blind signatures.
- Unblinds and verifies.
2. Storing Tokens
- Each token is encrypted to the user’s own
npub
. - Stored as a DM (kind 4 or compatible encrypted event).
- Optional tagging for organization.
3. Redeeming Tokens
- When performing a token-gated operation (e.g., posting to a limited relay), client includes the appropriate token in the event.
- Relay validates and logs/consumes the token.
4. Restoring the Nutsax
- On device reinstallation or session reset, the client:
- Reconnects to relays.
- Scans encrypted DMs.
- Decrypts and reimports available tokens.
Privacy Model
- Relays issuing tokens do not know which tokens were redeemed (blind signing).
- Tokens do not encode sender identity unless the client opts to do so.
- Only the recipient (
npub
) can decrypt their Nutsax. - Redemption is pseudonymous — tied to a key, not to external identity.
Optional Enhancements
- Token index tag: to allow fast search and categorization.
- Multiple token types: read, write, boost, subscribe, etc.
- Token delegation: future support for transferring tokens via encrypted DM to another
npub
. - Token revocation: relays can publish blacklists or expiration feeds if needed.
Compatibility
- Fully compatible with NIP-01, NIP-04 (encrypted DMs), and NIP-42 (authentication).
- Non-disruptive: relays and clients can ignore tokens if not supported.
- Ideal for layering on top of existing infrastructure and monetization strategies.
Conclusion
Nutsax offers a privacy-respecting, decentralized way to manage access and rate limits in the Nostr ecosystem. With blind-signed, operation-specific tokens and encrypted, persistent storage using native Nostr mechanisms, it gives relays and clients new powers without sacrificing Nostr’s core principles: simplicity, openness, and cryptographic self-sovereignty.
-
@ b7cf9f42:ecb93e78
2025-03-26 10:57:33Der Verstand im Fluss der Information
Das Informationszeitalter ist wie ein monströser Fluss, der unseren Verstand umgibt
Fundament erbauen
Der Verstand kann sich eine Insel in diesem Fluss bauen. Dabei können wir eine eigene Insel erbauen oder eine bestehende insel anvisieren um stabilität zu finden
Je robuster das Baumaterial, desto standhafter unsere Insel. (Stärke der Argumente, Qualität des Informationsgehalts, Verständlichkeit der Information)
Je grossflächiger die Insel, desto mehr Menschen haben Platz (Reichweite).
Je höher wir die Insel bauen, desto sicherer ist sie bei einem Anstieg des Informationsflusses (Diversität der Interesse und Kompetenzen der Inselbewohner).
Robustes Baumaterial
Primäre Wahrnehmung (robuster):
Realität -> meine Sinne -> meine Meinung/Interpretation
Sekundäre Wahrnehmung (weniger Robust):
Realität -> Sinne eines anderen -> dessen Meinung/Interpretation -> dessen Kommunikation -> meine Sinne -> meine Meinung/Interpretation
Wie kann ich zur Insel beitragen?
Ich investiere meine Zeit, um zu lernen. Ich bin bestrebt, Ideen zu verstehen, um sicherzugehen, dass ich robustes Baumaterial verwende.
Ich teile vermehrt Informationen, welche ich verstehe, damit auch meine Mitbewohner der Insel mit robustem Material die Insel vergrössern können. So können wir mehr Platz schaffen, wo Treibende Halt finden können.
Was könnte diese Insel sein?
- Freie Wissenschaft
- Freie Software
- Regeln
- Funktionierende Justiz
- Werkzeug
- und vieles weiteres
-
@ 6389be64:ef439d32
2025-05-24 21:51:47Most nematodes are beneficial and "graze" on black vine weevil, currant borer moth, fungus gnats, other weevils, scarabs, cutworms, webworms, billbugs, mole crickets, termites, peach tree borer and carpenter worm moths.
They also predate bacteria, recycling nutrients back into the soil and by doing so stimulates bacterial activity. They act as microbial taxis by transporting microbes to new locations of soil as they move through it while providing aeration.
https://stacker.news/items/988573
-
@ 47259076:570c98c4
2025-05-25 01:33:57When a man meets a woman, they produce another human being.
The biological purpose of life is to reproduce, that's why we have reproductive organs.
However, you can't reproduce if you are dying of starvation or something else.
So you must look for food, shelter and other basic needs.
Once those needs are satisfied, the situation as a whole is more stable and then it is easier to reproduce.
Once another human being is created, you still must support him.
In the animal kingdom, human babies are the ones who take longer to walk and be independent as a whole.
Therefore, in the first years of our lives, we are very dependent on our parents or whoever is taking care of us.
We also have a biological drive for living.
That's why when someone is drowning he will hold on into whatever they can grab with the highest strength possible.
Or when our hand is close to fire or something hot, we remove our hand immediately from the hot thing, without thinking about removing our hand, we just do it.
These are just 2 examples, there are many other examples that show this biological tendency/reflex to keep ourselves alive.
We also have our brain, which we can use to get information/knowledge/ideas/advice from the ether.
In this sense, our brain is just an antenna or radio, and the ether is the signal.
Of course, we are not the radio, we are the signal.
In other words, you are not your body, you are pure consciousness "locked" temporarily in a body.
Because we can act after receiving information from the ether, we can construct and invent new things to make our lives easier.
So far, using only biology as our rule, we can get to the following conclusion: The purpose of life is to live in a safe place, work to get food and reproduce.
Because humans have been evolving in the technological sense, we don't need to hunt for food, we can just go to the market and buy meat.
And for the shelter(house), we just buy it.
Even though you can buy a house, it's still not yours, since the government or any thug can take it from you, but this is a topic for another article.
So, adjusting what I said before in a modern sense, the purpose of life is: Work in a normal job from Monday to Friday, save money, buy a house, buy a car, get a wife and have kids. Keep working until you are old enough, then retire and do nothing for the rest of your life, just waiting for the moment you die.
Happy life, happy ending, right?
No.
There is something else to it, there is another side of the coin.
This is explored briefly by Steve Jobs in this video, but I pretend to go much further than him: https://youtu.be/uf6TzOHO_dk
Let's get to the point now.
First of all, you are alive. This is not normal.
Don't take life for granted.
There is no such a thing as a coincidence. Chance is but a name given for a law that has not been recognized yet.
You are here for a reason.
God is real. All creation starts in the mind.
The mind is the source of all creation.
When the mind of god starts thinking, it records its thoughts into matter through light.
But this is too abstract, let's get to something simple.
Governments exist, correct?
The force behind thinking is desire, without desire there is no creation.
If desired ceased to exist, everything would just vanish in the blink of an eye.
How governments are supported financially?
By taking your money.
Which means, you produce, and they take it.
And you can't go against it without suffering, therefore, you are a slave.
Are you realizing the gravity of the situation?
You are working to keep yourself alive as well as faceless useless men that you don't even know.
Your car must have an identification.
When you are born, you must have an identification.
In brazil, you can't home school your children.
When "your" "country" is in war, you must fight to defend it and give your life.
Countries are limited by imaginary lines.
How many lives have been destroyed in meaningless wars?
You must go to the front-line to defend your masters.
In most countries, you don't have freedom of speech, which means, you can't even express what you think.
When you create a company, you must have an identification and pass through a very bureaucratic process.
The money you use is just imaginary numbers in the screen of a computer or phone.
The money you use is created out of thin air.
By money here, I am referring to fiat money, not bitcoin.
Bitcoin is an alternative to achieve freedom, but this is topic for another article.
Depending on what you want to work on, you must go to college.
If you want to become a doctor, you must spend at least 5 years in an university decorating useless muscle names and bones.
Wisdom is way more important than knowledge.
That's why medical errors are the third leading cause of death in United States of America.
And I'm not even talking about Big Pharma and the "World Health Organization"
You can't even use or sell drugs, your masters don't allow it.
All the money you get, you must explain from where you got it.
Meanwhile, your masters have "black budget" and don't need to explain anything to you, even though everything they do is financed by your money.
In most countries you can't buy a gun, while your masters have a whole army fully armed to the teeth to defend them.
Your masters want to keep you sedated and asleep.
Look at all the "modern" art produced nowadays.
Look at the media, which of course was never created to "inform you".
Your masters even use your body to test their bio-technology, as happened with the covid 19 vaccines.
This is public human testing, there's of course secretive human testing, such as MKUltra and current experiments that happen nowadays that I don't even know.
I can give hundreds of millions of examples, quite literally, but let's just focus in one case, Jeffrey Epstein.
He was a guy who got rich "suddenly" and used his influence and spy skills to blackmail politicians and celebrities through recording them doing acts of pedophilia.
In United States of America, close to one million children a year go missing every year.
Some portion of these children are used in satanic rituals, and the participants of these rituals are individuals from the "high society".
Jeffrey Epstein was just an "employee", he was not the one at the top of the evil hierarchy.
He was serving someone or a group of people that I don't know who they are.
That's why they murdered him.
Why am I saying all of this?
The average person who sleep, work, eat and repeat has no idea all of this is going on.
They have no idea there is a very small group of powerful people who are responsible for many evil damage in the world.
They think the world is resumed in their little routine.
They think their routine is all there is to it.
They don't know how big the world truly is, in both a good and evil sense.
Given how much we produce and all the technology we have, people shouldn't even have to work, things would be almost nearly free.
Why aren't they?
Because of taxes.
This group of people even has access to a free energy device, which would disrupt the world in a magnitude greater than everything we have ever seen in the history of Earth.
That's why MANY people who tried to work in any manifestation of a free energy device have been murdered, or rather, "fell from a window".
How do I know a free energy device exist? This is topic for another article.
So my conclusion is:
We are in hell already. Know thyself. Use your mind for creation, any sort of creation. Do good for the people around you and the people you meet, always give more than you get, try to do your best in everything you set out to do, even if it's a boring or mundane work.
Life is short.
Our body can live no longer than 300 years.
Most people die before 90.
Know thyself, do good to the world while you can.
Wake up!!! Stop being sedated and asleep.
Be conscious.
-
@ 3283ef81:0a531a33
2025-05-24 20:47:39This event has been deleted; your client is ignoring the delete request.
-
@ 502ab02a:a2860397
2025-05-25 01:03:51บางครั้งพลังยิ่งใหญ่ที่สุดก็ไม่ใช่สิ่งที่เห็นได้ด้วยตาเปล่า เหมือนแสงแดดที่คนส่วนใหญ่มักจะกลัวเพราะกลัวผิวเสีย กลัวฝ้า กลัวร้อน แต่แท้จริงแล้วในแสงแดดมีบางสิ่งที่น่าเคารพอยู่ลึกๆ มันคือแสงที่มองไม่เห็น มันไม่แสบตา ไม่แสบผิว แต่มันลึก ถึงเซลล์ มันคือ “แสงอินฟราเรด” ที่ซ่อนตัวอย่างสุภาพในแดดยามเช้า
เฮียมักชอบพูดว่า แดดที่ดีไม่จำเป็นต้องแสบหลัง อาบแสงที่ลอดผ่านใบไม้ยามเช้าแบบไม่ต้องฝืนตาก็พอ แสงอินฟราเรดนี่แหละคือพระเอกตัวจริงในความเงียบ มันไม่ดัง ไม่โชว์ ไม่โฆษณา แต่มันลงลึกไปถึงระดับที่ร่างกายเรากำลังหิวโดยไม่รู้ตัวในระดับเซลล์
ในเซลล์ของเรา มีหน่วยผลิตพลังงานที่เรียกว่าไมโทคอนเดรีย เจ้านี่แหละคือโรงไฟฟ้าจิ๋วประจำบ้าน ที่ต้องตื่นมาทำงานทุกวันโดยไม่ได้หยุดเสาร์อาทิตย์ ยิ่งถ้าไมโทคอนเดรียทำงานไม่ดี ร่างกายก็จะเหมือนไฟตกทั้งระบบ—ง่วงง่าย เพลียไว ปวดนู่นปวดนี่เหมือนไฟในบ้านกระพริบตลอดเวลา
แล้วแสงอินฟราเรดเกี่ยวอะไรกับมัน? เฮียขอเล่าง่ายๆ ว่า ไมโทคอนเดรียมีตัวรับแสงตัวหนึ่งชื่อว่า cytochrome c oxidase เจ้านี่ตอบสนองต่อแสงอินฟราเรดช่วงคลื่นเฉพาะ คือประมาณ 600–900 นาโนเมตร พอโดนเข้าไป มันเหมือนได้จุดประกายให้โรงงานพลังงานในร่างกายกลับมาคึกคักอีกครั้ง ผลิตพลังงานได้มากขึ้น ระบบไหลเวียนเลือดก็ดีขึ้น เหมือนท่อน้ำที่เคยอุดตันก็กลับมาใสแจ๋ว ความอักเสบเล็กๆ ในร่างกายก็ลดลง คล้ายบ้านที่เคยอับชื้นแล้วได้เปิดหน้าต่างให้แสงแดดส่องเข้าไป
และที่น่ารักกว่านั้นคือ เราไม่ต้องไปถึงชายหาด ไม่ต้องจองรีสอร์ตริมทะเล แค่แดดเช้าอ่อนๆ ข้างบ้านหรือตามขอบระเบียง ก็ให้แสงอินฟราเรดได้แล้ว ถ้าใครอยู่ในเมืองใหญ่ที่มีแต่ตึกบังแดด แล้วจะเลือกใช้หลอดไฟ Red Light Therapy ก็ไม่ผิด แต่ต้องเลือกแบบรู้เท่าทันรู้ ไม่ใช่เห็นใครรีวิวก็ซื้อมาเปิดใส่หน้า หวังจะหน้าใสข้ามคืน ต้องเข้าใจทั้งความยาวคลื่น เวลาใช้งาน และจุดประสงค์ ไม่ใช่ใช้เพราะแค่กลัวแก่อยากหน้าตึง แต่ใช้เพราะอยากให้ร่างกายกลับไปทำงานอย่างเป็นธรรมชาติอีกครั้ง และอยู่ในประเทศหรือสถานที่ที่โดนแดดได้น้อยอยากได้เสริมเฉยๆ
แล้วเราจะรู้ได้ยังไงว่าไมโทคอนเดรียเรากลับมาทำงานดีขึ้น? เฮียว่าไม่ต้องรอผลเลือดจากแล็บไหนก็รู้ได้ อย่าไปยึดติดกับตัวเลขมากครับ เอาตัวเองเป็นหลัก ตั้งคำถามกับตัวเองว่ารู้สึกยังไงบ้าง ถ้าเริ่มนอนหลับลึกขึ้น ตื่นมาแล้วหัวไม่มึน ไม่หงุดหงิดตั้งแต่ยังไม่ลืมตา ถ้าปวดหลังปวดข้อที่เคยมีเริ่มหายไปแบบไม่ได้กินยา หรือแม้แต่ผิวที่ดูสดใสขึ้นแบบไม่ต้องง้อสกินแคร์ นั่นแหละคือเสียงขอบคุณเบาๆ จากไมโทคอนเดรียที่ได้แสงแดดแล้วกลับมามีชีวิตอีกครั้ง ถ้ามันดีก็คือดี
บางที เราไม่ต้องกินวิตามินเม็ดไหนเพิ่ม แค่เดินออกไปรับแดดเบาๆ ในเวลาเช้าๆ แล้วให้ร่างกายได้พูดคุยกับธรรมชาติบ้าง เพราะในความอบอุ่นเงียบๆ ของแสงอินฟราเรดนั้น มีเสียงเบาๆ ที่กำลังปลุกพลังในตัวเราให้กลับมาอีกครั้ง
แดดไม่ใช่ศัตรู ถ้าเรารู้จักมันในมุมที่ถูกต้อง เฮียแค่อยากชวนให้ลองเปลี่ยนจากคำว่า “กลัวแดด” เป็น “ฟังแดด” เพราะบางครั้งธรรมชาติไม่ได้พูดด้วยคำ แต่สื่อสารด้วยแสงที่แทรกผ่านหัวใจเราโดยไม่ต้องผ่านล่าม
บางคนอาจคิดในใจ “แหมเฮีย ก็ดีหรอก ถ้าได้ตื่นเช้า” 555555
เฮียเข้าใจดีเลยว่าไม่ใช่ทุกคนจะตื่นมาทันแดดยามเช้าได้เสมอไป ชีวิตคนเรามันไม่ได้เริ่มต้นพร้อมไก่ขันทุกวัน บางคนเพิ่งเข้านอนตอนตีสาม ตื่นอีกทีแดดก็แตะบ่ายเข้าไปแล้ว ไม่ต้องกังวลไปจ้ะ เพราะความมหัศจรรย์ของแสงอินฟราเรดยังมีให้เราได้ใช้แม้ในแดดยามเย็น
แดดช่วงเย็น โดยเฉพาะหลังสี่โมงเย็นไปจนเกือบหกโมง (หรือเร็วช้าตามฤดู) ก็ยังอุดมไปด้วยแสงอินฟราเรดในช่วงคลื่นที่ไมโทคอนเดรียชอบ แถมยังไม่มีรังสี UV ที่แรงจัดมารบกวนเหมือนตอนเที่ยง เรียกว่าเป็นแดดแบบละมุนๆ สำหรับคนที่อยาก “บำบัดใจ” แบบไม่ต้องร้อนจนหัวเปียก
เฮียเคยลองตากแดดเย็นเดินไปในสวนสาธารณะ แล้วรู้สึกว่ามันเหมือนได้รีเซ็ตจิตใจหลังวันเหนื่อยๆ ไปในตัว ยิ่งพอรู้ว่าในช่วงเวลานี้แสงที่ได้กำลังช่วยปลุกพลังงานในร่างกายแบบเงียบๆ ด้วยแล้ว มันทำให้เฮียยิ่งเคารพธรรมชาติมากขึ้นไปอีก เคยเห็นคนที่วันๆมีแต่ความเครียด ความโกรธ ความอาฆาตต่อโลกไหมหละ บางคนแค่โดนแดด แต่ไม่ได้ตากแดด การตากแดดคือปล่อยใจไปกับธรรมชาติ พูดคุยกับร่างกาย บอกเขาว่าเราจะทำตัวให้เป็นประโยชน์กับโลกใบนี้ ให้สมกับที่ใช้พลังงานของโลก
จะเช้าหรือเย็น สำคัญไม่เท่ากับความตั้งใจ เฮียว่าไม่ว่าชีวิตจะตื่นตอนไหน ถ้าเราให้เวลาแค่ 10–15 นาทีในแต่ละวัน ออกไปยืนให้แดดแตะหน้า แตะแขน หรือแค่ให้แสงลอดผ่านตาเบาๆ โดยไม่ต้องจ้องจ้าๆ ก็พอ แค่นี้ก็เป็นการให้ไมโทคอนเดรียได้หายใจ ได้ออกกำลังกายแบบของมัน และได้ส่งพลังกลับมาหาเราทั้งร่างกายและจิตใจ
สุดท้ายแล้ว แดดไม่ได้แบ่งชนชั้น ไม่เลือกว่าจะรักเฉพาะคนตื่นเช้า หรือโกรธคนตื่นสาย ขอแค่เรารู้จักเวลาและวิธีอยู่กับมันอย่างถูกจังหวะ แดดก็พร้อมจะให้เสมอ
#pirateketo #กูต้องรู้มั๊ย #ม้วนหางสิลูก #siamstr #SundaySpecialเราจะไปเป็นหมูแดดเดียว
-
@ eb0157af:77ab6c55
2025-05-25 04:48:09Banking giants JPMorgan, Bank of America, Citigroup, and Wells Fargo are in talks to develop a unified stablecoin solution.
According to the Wall Street Journal on May 22, some of the largest financial institutions in the United States are exploring the possibility of joining forces to launch a stablecoin.
Subsidiaries of JPMorgan, Bank of America, Citigroup, and Wells Fargo have initiated preliminary discussions for a joint stablecoin issuance, according to sources close to the matter cited by the WSJ. Also at the negotiating table are Early Warning Services, the parent company of the digital payments network Zelle, and the payment network Clearing House.
The talks are reportedly still in the early stages, and any final decision could change depending on regulatory developments and market demand for stablecoins.
Stablecoin regulation
On May 20, the US Senate voted 66 to 32 to advance discussion of the Guiding and Establishing National Innovation for US Stablecoins Act (GENIUS Act), a specific law to regulate stablecoins. The bill outlines a regulatory framework for stablecoin collateralization and mandates compliance with anti-money laundering rules.
David Sacks, White House crypto advisor, expressed optimism about the bill’s bipartisan approval. However, senior Democratic Party officials intend to amend the bill to include a clause preventing former President Donald Trump and other US officials from profiting from stablecoins.
Demand for stablecoins has increased, with total market capitalization rising to $245 billion from $205 billion at the beginning of the year, a 20% increase.
The post Major US banks consider launching a joint stablecoin appeared first on Atlas21.