-
@ a396e36e:ec991f1c
2025-05-28 22:27:45đ¤ Generation X and Bitcoin: Between Invisibility, Structural Disillusionment, and Defiance
Generation X, born between 1965 and 1980, has been largely sidelined in generational discourse. Unlike the baby boomers âsymbols of stability and prosperityâ or millennials and Gen Z âconstant fixtures in the media and cultural spotlightâ Gen X remains the least mentioned, the least studied, and often not even recognized by its own members as a distinct generation.
Today, they are in midlife âa period that, according to the U-shaped curve of happiness, is one of the most emotionally and psychologically difficult stages: deteriorating health, professional stagnation, and the dual burden of caring for both parents and children. But their condition is not just a matter of age âitâs the product of a unique convergence of economic and political failure.
Structurally, Generation X reached its crucial phase of financial consolidation during the global economic crisis of 2008 âa moment that froze wage growth and severely limited access to housing, investment opportunities, and savings. In parallel, they faced increasing labor precarization: unstable contracts, outsourcing, erosion of social protections, and the dismantling of job security. Compared to other generations, their economic mobility was minimal. Even in terms of wealth accumulation and home ownership, many Gen Xers show weaker indicators than early-born millennials at the same life stage.
At the same time, many countries âespecially in Latin America and parts of Europeâ turned toward alternative models to free-market systems: socialist proposals that promised redistribution, justice, and equality. But in practice, these models led to state dependency, excessive intervention, economic rigidity, and a loss of productive dynamism. The outcome was devastating: rising poverty, institutional decay, inflation, plummeting investment, growing corruption, and a widespread collapse of trust.
For a generation raised on values of effort, autonomy, and social mobility, this ideological shift brought a double betrayal âfirst from liberalism, which failed to deliver on its promises, and then from socialism, which entrenched poverty, dependency, and dysfunction.
And yet, while younger generations increasingly embrace state-centric proposals like universal basic income, subsidies, or nationalizations as progressive solutions, many in Gen X see these not as innovation, but as dĂŠjĂ vu âa recycling of failed models theyâve already lived and paid for.
Itâs at this point that Bitcoin emerges as more than just a financial technology. For many Gen Xers, Bitcoin is both a symbolic and concrete response â a refuge from a system that betrayed them. Itâs not just about investment. Itâs about individual sovereignty. They call it âfuck you moneyâ because it represents a total break from traditional structures: it doesnât depend on banks, governments, political parties, or promises that never materialize.
Bitcoin is money without permission, without censorship, without planned devaluation. Itâs a tool for radical autonomy. For a generation marked by skepticism, self-reliance, and disillusionment, it stands as a quiet but powerful form of resistance â a way of saying: âI donât depend on you. I donât believe you. I donât need you.â
Today, while others debate new statist models or more market reforms, many Gen Xers are simply opting out. Bitcoin isnât just an economic choice â itâs a stance. A way to reclaim the individual control the system once denied them.
-
@ 7f6db517:a4931eda
2025-05-28 22:02:26The former seems to have found solid product market fit. Expect significant volume, adoption, and usage going forward.
The latter's future remains to be seen. Dependence on Tor, which has had massive reliability issues, and lack of strong privacy guarantees put it at risk.
â ODELL (@ODELL) October 27, 2022
The Basics
- Lightning is a protocol that enables cheap and fast native bitcoin transactions.
- At the core of the protocol is the ability for bitcoin users to create a payment channel with another user.
- These payment channels enable users to make many bitcoin transactions between each other with only two on-chain bitcoin transactions: the channel open transaction and the channel close transaction.
- Essentially lightning is a protocol for interoperable batched bitcoin transactions.
- It is expected that on chain bitcoin transaction fees will increase with adoption and the ability to easily batch transactions will save users significant money.
- As these lightning transactions are processed, liquidity flows from one side of a channel to the other side, on chain transactions are signed by both parties but not broadcasted to update this balance.
- Lightning is designed to be trust minimized, either party in a payment channel can close the channel at any time and their bitcoin will be settled on chain without trusting the other party.
There is no 'Lightning Network'
- Many people refer to the aggregate of all lightning channels as 'The Lightning Network' but this is a false premise.
- There are many lightning channels between many different users and funds can flow across interconnected channels as long as there is a route through peers.
- If a lightning transaction requires multiple hops it will flow through multiple interconnected channels, adjusting the balance of all channels along the route, and paying lightning transaction fees that are set by each node on the route.
Example: You have a channel with Bob. Bob has a channel with Charlie. You can pay Charlie through your channel with Bob and Bob's channel with User C.
- As a result, it is not guaranteed that every lightning user can pay every other lightning user, they must have a route of interconnected channels between sender and receiver.
Lightning in Practice
- Lightning has already found product market fit and usage as an interconnected payment protocol between large professional custodians.
- They are able to easily manage channels and liquidity between each other without trust using this interoperable protocol.
- Lightning payments between large custodians are fast and easy. End users do not have to run their own node or manage their channels and liquidity. These payments rarely fail due to professional management of custodial nodes.
- The tradeoff is one inherent to custodians and other trusted third parties. Custodial wallets can steal funds and compromise user privacy.
Sovereign Lightning
- Trusted third parties are security holes.
- Users must run their own node and manage their own channels in order to use lightning without trusting a third party. This remains the single largest friction point for sovereign lightning usage: the mental burden of actively running a lightning node and associated liquidity management.
- Bitcoin development prioritizes node accessibility so cost to self host your own node is low but if a node is run at home or office, Tor or a VPN is recommended to mask your IP address: otherwise it is visible to the entire network and represents a privacy risk.
- This privacy risk is heightened due to the potential for certain governments to go after sovereign lightning users and compel them to shutdown their nodes. If their IP Address is exposed they are easier to target.
- Fortunately the tools to run and manage nodes continue to get easier but it is important to understand that this will always be a friction point when compared to custodial services.
The Potential Fracture of Lightning
- Any lightning user can choose which users are allowed to open channels with them.
- One potential is that professional custodians only peer with other professional custodians.
- We already see nodes like those run by CashApp only have channels open with other regulated counterparties. This could be due to performance goals, liability reduction, or regulatory pressure.
- Fortunately some of their peers are connected to non-regulated parties so payments to and from sovereign lightning users are still successfully processed by CashApp but this may not always be the case going forward.
Summary
- Many people refer to the aggregate of all lightning channels as 'The Lightning Network' but this is a false premise. There is no singular 'Lightning Network' but rather many payment channels between distinct peers, some connected with each other and some not.
- Lightning as an interoperable payment protocol between professional custodians seems to have found solid product market fit. Expect significant volume, adoption, and usage going forward.
- Lightning as a robust sovereign payment protocol has yet to be battle tested. Heavy reliance on Tor, which has had massive reliability issues, the friction of active liquidity management, significant on chain fee burden for small amounts, interactivity constraints on mobile, and lack of strong privacy guarantees put it at risk.
If you have never used lightning before, use this guide to get started on your phone.
If you found this post helpful support my work with bitcoin.
-
@ cae03c48:2a7d6671
2025-05-28 22:01:22Bitcoin Magazine
Leaders Rally Behind BTC at Bitcoin 2025 Conference: Strategic Reserves, Market Clarity, and Legislative MomentumAt Bitcoin 2025, top U.S. lawmakers and Coinbaseâs Chief Policy Officer discussed the U.S. governmentâs shifting tone on Bitcoin, strategic reserves, regulatory frameworks, and legislationâall pointing toward a bullish future for digital assets.
In a panel moderated by Grant McCarty, Co-President of the Bitcoin Policy Institute, the Bitcoin 2025 Conference saw a major spotlight on U.S. policy shifts surrounding digital assets. U.S. Representatives Byron Donalds and Bryan Steil were joined by Faryar Shirzad, Chief Policy Officer at Coinbase, to highlight what they described as a watershed moment for Bitcoin in Washington.Â
JUST IN:
US Congressman Byron Donalds says he's voting for the Strategic Bitcoin Reserve Act
"Bitcoin has proven to be a holder of value" pic.twitter.com/NuQlZ26Lmy
â Bitcoin Magazine (@BitcoinMagazine) May 27, 2025
âWhat the president and his team are doing is choosing to step into the digital assets marketplace,â said Byron Donalds. âBitcoin is a key asset because it has demonstrated to be a holder of value outside of fiat currency and central banking.â Donalds emphasized that President Trump is taking the long viewâstrategically recognizing Bitcoinâs role in a national reserve capacity.
Bryan Steil pointed to Trumpâs media magnetism and political leverage as the driver behind recent legislative momentum: âWhat heâs done is put a spotlight on the exact three bills⌠giving us the ability to drive forward.â He noted that legislation is difficult to pass, but with executive support, thereâs newfound energy and opportunity to cross the finish line.
Shirzad echoed that sentiment: âThe tone from the top point is exactly what Donald Trump has showed us⌠He wants a market structure built. He wants a much more strategic approach.â Coinbase, Shirzad added, sees the impact firsthandâlegislators now recognize the need to support innovation rather than stifle it.
Donalds added: âIf you talk to any business owner in the world, the number one thing they desire more than anything else is certainty and consistency.â That, he said, is what will turn Bitcoin into a trillion-dollar industry in the U.S., instead of one bogged down by regulatory ambiguity and legal overhead.
On the regulatory front, Steil noted: âUnder the Biden administration, policy was being developed through enforcement actions. Bitcoin is decentralized and should be treated as a commodity.â Shirzad agreed, pushing for âregulatory therapyâ to unleash billions still sidelined.
McCarty closed with mention of the Blockchain Regulatory Clarity Actâlegislation that would protect open-source developers from rogue regulatory action: âIt allows developers to operate without being punished.â
Donalds summed it up: âThereâs only going to be 21 million ever in creation. That canât be eroded by central banks. A strategic reserve for Bitcoin is critical in my opinion for the United States.âÂ
This post Leaders Rally Behind BTC at Bitcoin 2025 Conference: Strategic Reserves, Market Clarity, and Legislative Momentum first appeared on Bitcoin Magazine and is written by Jenna Montgomery.
-
@ cae03c48:2a7d6671
2025-05-28 21:01:56Bitcoin Magazine
US Senator Cynthia Lummis Discusses Bitcoin Reserve, Stablecoin Legislation, and Market Structure Bill at Bitcoin 2025 ConferenceAt the 2025 Bitcoin Conference in Las Vegas, U.S Senator Cynthia Lummis and CLO of Coinbase Paul Grewal discussed the market structure bill, stablecoin bill, future taxing system, bitcoin strategy reserve and bitcoin mining.Â
Cynthia Lummis started by commenting about the market structure bill and stablecoin bill.
âThe market structure bills is probably more important to a lot of the people in this conference than the stablecoin bill because there are a lot of businesses, yours among them,â said Lummis. âThere are businesses for people who either buy and hold, so they want a custodial service or there are companies that lend Bitcoin, there is a futures market for Bitcoin, there are so many ways in which Bitcoin can interface with fiat currency with the US dollar.â
Lummis also mentioned the tax system that she wants to implement and what her office has submitted to the finance committee.
âAs the lighting network develops and companies like Strike sort of have been leaders in that space,â added Lummis. âCreate an opportunity for transactions to occur on a daily basis in Bitcoin. Everything from buying a cup of coffee to dinner somewhere. It would be helpful that certain transactions of that size below 600 dollars per transaction, not be subject to taxation.âÂ
During her speech, she went into detail on one the biggest problems lawmakers are facing against digital assets.
âPart of the problem in the last four years has been largely regulatory agencies that have been very hostile towards digital assets, so we are trying to change as fast as we can,â said Lummis. âIt doesnât happen overnight. We donât even have a confirmed IRS director in place yet, so it is really hard to get these structural changes enacted by the rule makers at the IRS when there is no IRS commission yet in place.âÂ
Ending the panel, Lummis addressed one of the biggest reasons the US government should get into Bitcoin.Â
âWe are 37 trillion dollars in debt, so if we bought and held a million Bitcoin for 20 years it will cut that debt in half and we have underperforming assets that can be converted to Bitcoin without borrowing additional money. Bitcoin is such an important Global Strategic asset and it is not only important in the economy, but in our global defense because there are components to our defense. One is having a lethal war fighting machine that can overcome other armies, another military effort. Another one is having an economic machine that can overcome other currencies.â She continued, âEven our military generals say that bitcoin is an important deterrent to aggression from other countries, especially from China.â Â
This post US Senator Cynthia Lummis Discusses Bitcoin Reserve, Stablecoin Legislation, and Market Structure Bill at Bitcoin 2025 Conference first appeared on Bitcoin Magazine and is written by Oscar Zarraga Perez.
-
@ bf47c19e:c3d2573b
2025-05-28 20:37:58Bitcoin: Peer-to-peer sistem elektronskog novca
Satoshi Nakamoto
satoshin@gmx.com
Prevedeno na srpski sa bitcoin.org/bitcoin.pdf od strane ECD
SaĹžetak. Potpuna peer-to-peer verzija elektronskog novca omoguÄila bi slanje uplata putem interneta direktno od jedne strane ka drugoj bez posredovanja finansijskih institucija. Digitalni potpisi pruĹžaju deo reĹĄenja, ali se glavni benefiti gube ako je i dalje potrebna pouzdana trecĚa strana za spreÄavanje dvostruke potroĹĄnje. PredlaĹžemo reĹĄenje problema dvostruke potroĹĄnje koriĹĄcĚenjem peer-to-peer mreĹže. MreĹža vremenski oznaÄava transakcije tako ĹĄto ih heĹĄuje u tekuÄi lanac dokaza o radu (proof of work) temeljen na heĹĄu, formirajucĚi zapis koji se ne moĹže promeniti bez ponovnog rada i objavljivanja dokaza o tom radu. NajduĹži lanac ne sluĹži samo kao dokaz niza dogaÄaja, nego i kao dokaz da je taj niz dogaÄaja potvrÄen od strane dela peer-to-peer mreĹže koja poseduju najveÄu zbirnu procesorsku snagu (CPU). Sve dok vecĚinu procesorske snage kontroliĹĄu Ävorovi (nodes) koji ne saraÄuju u napadu na mreĹžu, oni Äe generisati najduĹži lanac i nadmaĹĄiti napadaÄe. Sama mreĹža zahteva minimalnu strukturu. Poruke kroz mreĹžu se prenose uz pretpostavku da svaki Ävor Äini maksimalan napor da poruku prenese u svom izvornom obliku i na optimalan naÄin, a Ävorovi mogu napustiti mreĹžu i ponovo joj se pridruĹžiti po Ĺželji, prihvatajucĚi najduĹži lanac dokaza o radu kao dokaz onoga ĹĄto se dogodilo dok ih nije bilo.
1. Uvod
Trgovina na Internetu poÄela je da se oslanja skoro iskljuÄivo na finansijske institucije koje sluĹže kao pouzdani posrednici pri obradi elektronskih plaÄanja. Iako sistem radi dovoljno dobro za vecĚinu transakcija i dalje trpi od inherentnih slabosti modela utemeljenog na poverenju.
Potpuno nepovratne transakcije zapravo nisu moguÄe, jer finansijske institucije ne mogu izbeÄi posredovanje u reĹĄavanju eventualnih sporova. TroĹĄkovi posredovanja povecĚavaju troĹĄkove transakcija, ograniÄavaju minimalnu praktiÄnu veliÄinu transakcija i onemoguÄuju male, povremene transakcije jer postoji velika ĹĄteta zbog gubitka moguÄnosti da se izvrĹĄe nepovratna placĚanja za nepovratne usluge. Uz mogucĚnost povraÄaja transakcije, potreba za poverenjem raste. Trgovci moraju biti oprezni prema svojim kupcima i traĹžiti im viĹĄe informacija nego ĹĄto bi inaÄe bilo neophodno. OdreÄeni procenat prevara prihvacĚen je kao neizbeĹžan. Ovi troĹĄkovi i nepouzdanost placĚanja mogu se izbecĚi koriĹĄcĚenjem gotovine, ali ne postoji mehanizam za elektronsko placĚanje bez pouzdane treÄe strane.
Ono ĹĄto je potrebno je elektronski sistem plaÄanja zasnovan na kriptografskom dokazu umesto na poverenju, koji omoguÄava da bilo koje dve strane direktno i dobrovoljno meÄusobno trguju bez potrebe za posrednikom. Transakcije koje su nepovratne bi zaĹĄtitile prodavce od prevara, a escrow mehanizmi mogli bi se lako implementirati radi zaĹĄtite kupaca. U ovom dokumentu predlaĹžemo reĹĄenje problema dvostruke potroĹĄnje koriĹĄcĚenjem peer-to-peer distribuiranog servera vremenskih oznaka (timestamp) za generisanje raÄunarskog dokaza o hronoloĹĄkom redosledu transakcija. Sistem je siguran sve dok poĹĄteni Ävorovi zajedno kontroliĹĄu viĹĄe procesorske snage procesora nego bilo koja udruĹžena grupa napadaÄkih Ävorova.
2. Transakcije
Elektronski novÄicĚ definiĹĄemo kao lanac digitalnih potpisa. Svaki vlasnik prenosi novÄicĚ na sledeÄeg digitalnim potpisivanjem heĹĄa prethodne transakcije i javnog kljuÄa sledeÄeg vlasnika, dodajucĚi ih potom na kraj novÄicĚa. Primalac transakcije moĹže da verifikuje potpise, a time i lanac vlasniĹĄtva.
Problem je naravno u tome ĹĄto primalac ne moĹže potvrditi da jedan od prethodnih vlasnika nije dva puta poslao isti novÄicĚ. UobiÄajeno reĹĄenje je uvoÄenje pouzdanog centralizovanog posrednika, kreatora novÄiÄa koji proverava sve transakcije. Nakon svake transakcije, novÄiÄ se mora vratiti kreatoru kako bi se izdao novi novÄicĚ i veruje se da samo za novÄiÄe izdate direktno od kreatora moĹžemo biti sigurni da nisu dva puta potroĹĄeni. Problem sa ovim reĹĄenjem je ĹĄto sudbina Äitavog novÄanog sistema zavisi od kompanije koja kreira novÄiÄe, jer svaka transakcija mora da proÄe kroz nju, baĹĄ kao ĹĄto je sluÄaj sa bankom.
Treba nam naÄin da primalac bude siguran da prethodni vlasnici nisu potpisali nikakve ranije transakcije kojim bi potroĹĄili taj novÄiÄ. Za naĹĄe potrebe, raÄunamo transakciju koja se prva desila i ne zanimaju nas naredni pokuĹĄaji da se isti novÄiÄ ponovo poĹĄalje. Jedini naÄin da sa sigurnoĹĄÄu potvrdimo da taj novÄiÄ nije prethodno bio poslat je da imamo informacije o svim transakcijama koje su se ikada desile. U modelu baziranom na centalizovan kreatoru, taj kreator je imao informacije o svim transakcijama i odluÄivao koja transakcija je prva stigla. Da bismo to postigli bez pouzdanog posrednika, transakcije moraju biti javno objavljene [1] i potreban nam je sistem u kojem uÄesnici mogu da se dogovore o jedinstvenoj istoriji redosleda kojim su transakcije primljene. Primaocu je potreban dokaz da se u trenutku deĹĄavanja svake od transakcija vecĚina Ävorova sloĹžila oko toga da je baĹĄ ta transakcija bila ona koja je prva primljena.
3. Server vremenskih oznaka
ReĹĄenje koje predlaĹžemo poÄinje serverom vremenskih oznaka. Server vremenske oznake radi tako ĹĄto uzima heĹĄ bloka podataka kojem Äe se dodeliti vremenska oznaka i objavi taj heĹĄ svima u mreĹži, sliÄno kao u novinama ili kao post na Usenet mreĹži [2-5]. Vremenska oznaka oÄigledno dokazuje da su podaci morali postojati u to vreme kako bi uĹĄli u haĹĄ. Svaka vremenska oznaka sadrĹži prethodnu vremensku oznaku u svom heĹĄu, formirajuÄi tako lanac, pri Äemu svaka dodatna vremenska oznaka pojaÄava potvrde onih pre nje.
4. Dokaz o radu (Proof-of-Work)
Da bismo implementirali distribuirani server vremenskih oznaka na peer-to-peer principu, moracĚemo da koristimo sistem dokaza o radu sliÄan Hashcash-u Adama Back-a [6], umesto Uneset postova ili novinskih objava. Dokaz o radu ukljuÄuje traĹženje vrednosti koja cĚe, kada se heĹĄuje, na primer pomoÄu SHA-256 heĹĄ funkcije, stvarati heĹĄ Äiji binarni zapis zapoÄinje odreÄenim brojem nula. ProseÄna koliÄina potrebnog rada eksponencijalno raste sa brojem potrebnih poÄetnih nula, a moĹže se proveriti izvrĹĄavanjem samo jedne heĹĄ fuknkcije.
Za naĹĄu mreĹžu vremenskih oznaka implementiramo dokaz o radu povecĚavajucĚi nonce broja u bloku sve dok se ne pronaÄe ona vrednost nonce-a koja daje heĹĄu bloka potreban broj poÄetnih nula. Jednom kada se procesorska snaga utroĹĄi kako bi se zadovoljio dokaz o radu, blok se ne moĹže izmeniti bez ponovljenog rada. Kako se kasniji blokovi veĹžu na taj blok, rad potreban da se on izmeni ukljuÄivao bi i ponovno obraÄivanje svih blokova nakon njega.
Dokaz o radu takoÄe reĹĄava problem utvrÄivanja veÄine pri odluÄivanju. Ako bi se ââvecĚina zasnivala na principu jednog glasa po IP adresi, mogao bi je naruĹĄiti svako ko je u stanju da glasa sa viĹĄe IP adresa odjednom. Dokaz o radu u osnovi predstavlja jedan glas po jedinici procesorske snage. VecĚinska odluka je predstavljena najduĹžim lancem u Äije je stvaranje zapravo investirano najviĹĄe rada prilikom dokazivanja. Ako vecĚinu procesorske snage kontroliĹĄu poĹĄteni Ävorovi, poĹĄten lanac cĚe rasti najbrĹže i nadmaĹĄiÄe sve konkurentske lance. Da bi izmenio neki od prethodnih blokova, napadaÄ bi morao da ponovi dokaz o radu za taj blok i sve blokove nakon njega, a zatim da sustigne i nadmaĹĄi koliÄinu rada poĹĄtenih Ävorova. Kasnije cĚemo pokazati da se dodavanjem novih blokova eksponencijalno smanjuje verovatnocĚa da cĚe sporiji napadaÄ uspeti da sustigne poĹĄteni lanac.
Da bi se kompenzovalo povecĚanje brzine hardvera i promenljivo interesovanje ljudi za voÄenje Ävorova tokom vremena, teĹžina obavljanja dokaza o radu (proof-of-work difficulty) odreÄuje se prema proseÄnom broju blokova krairanih za sat vremena. Ako se blokovi stvaraju prebrzo, teĹžina se poveÄava.
5. MreĹža
Koraci za voÄenje mreĹže su sledecĚi:
1) Nove transakcije se prosleÄuju svim Ävorovima u mreĹži. 2) Svaki Ävor prikuplja nove transakcije u blok. 3) Svaki Ävor radi na pronalaĹženju dokaza o radu dovoljnog nivoa teĹžine za svoj blok. 4) Kada Ävor pronaÄe dokaz o radu, on emituje taj blok ka svim Ävorovima. 5) Ävorovi prihvataju blok samo ako su sve transakcije u njemu ispravne i nisu veÄ potroĹĄene. 6) Ävorovi izraĹžavaju prihvatanje bloka radecĚi na stvaranju sledecĚeg bloka u lancu, koristecĚi heĹĄ prihvacĚenog bloka kao prethodni heĹĄ.
Ävorovi uvek smatraju da je najduĹži lanac ispravan i nastavicĚe da rade na njegovom produĹžavanju. Ako dva Ävora istovremeno emituju razliÄite verzije sledecĚeg bloka, neki Ävorovi prvo mogu primiti jedan ili drugi blok. U tom sluÄaju svaki Ävor radi na prvom koji je dobio, ali Äuvaju drugu kariku lanca u sluÄaju da ona postane duĹža. Dilema Äe biti reĹĄena kada se pronaÄe sledecĚi dokaz o radu i jedna karika postane duĹža; Ävorovi koji su radili na drugoj karici lanca cĚe se prebaciti na duĹžu kariku.
Emitovanje novih transakcija ne mora nuĹžno docĚi do svih Ävorova. Sve dok stiĹžu do velikog broja Ävorova, te transakcije Äe uÄi u blok. SliÄno vaĹži i za blokove, ni oni ne moraju doÄi odmah do svih Ävorova. Ako neki Ävor propusti da primi informaciju o bloku, kada mu stigne sledeÄi blok,primetiÄe da je propustio jedan, pa Äe ga traĹžiti naknadno.
6. Podsticaj
Po pravilu, prva transakcija u bloku je posebna transakcija koja kreira novi novÄicĚ u vlasniĹĄtvu kreatora bloka. Ovo daje podsticaj Ävorovima da podrĹže mreĹžu i pruĹža naÄin za poÄetnu ubacivanje novÄiÄa u opticaj, buducĚi da ne postoji centralno telo koje ih izdaje. Stalno dodavanje konstantne koliÄine novih novÄiÄa liÄi na rudarenje zlata, gde rudari ulaĹžu resurse kako bi izrudarili nove koliÄine zlata i ubacili ih u opticaj. U naĹĄem sluÄaju ulaĹže se procesorsko vreme i elektriÄna energija.
Podsticaj se takoÄe moĹže finansirati i transakcionim naknadama. Ako je iznos izlaznog dela transakcije manji od ulaznog, razliku Äini naknada za transakciju koja se dodaje iznosu nagrade za kreatora bloka koji sadrĹži tu transakciju. Nakon ĹĄto predefinisani broj novÄiÄa uÄe u opticaj, podsticaj mogu u potpunosti Äiniti transakcione naknade, Äime se sistem oslobaÄa inflacije.
Ävorovi su na ovaj naÄin podstaknuti da ostanu poĹĄteni. Ako je pohlepni napadaÄ u stanju da angaĹžuje viĹĄe procesorske snage od svih poĹĄtenih Ävorova zajedno, morao bi da bira izmeÄu toga da poniĹĄti svoje izvrĹĄene transakcije i time prevari ljude ili da procesorsku snagu koristi za stvaranje novih novÄiÄa. On bi trebalo bi uvidi da je isplativije igrati po pravilima koja ga nagraÄuju sa viĹĄe novih novÄiÄa od svi drugi zajedno, nego da potkopava sistem i vrednost sopstvenog bogatstva.
7. OslobaÄanje prostora na hard disku
Kada je dovoljno blokova dodato nakon poslednje transakcije novÄiÄa, prethodne transakcije tog novÄiÄa se mogu odbaciti kako bi se uĹĄtedeo prostor na hard disku. Kako bi se to ostvarilo bez razbijanja heĹĄa bloka, transakcije su heĹĄovane u Merkleovo stablo (Merkle Tree) [7] [2] [5], gde je samo koren ukljuÄen u heĹĄ bloka. Stari blokovi se tada mogu sabiti uklanjanjem nepotrebnih grana drveta. UnutraĹĄnji heĹĄevi ne moraju biti skladiĹĄteni.
Zaglavlje bloka bez transakcija bilo bi oko 80 bajtova. Ako pretpostavimo da su blokovi generisani svakih 10 minuta, 80 bajtova * 6 * 24 * 365 = 4,2 MB godiĹĄnje. ImajuÄi u vidu Äinjenicu da se u 2008. godini raÄunari uglavnom prodaju sa oko 2 GB RAM-a i Murov zakon koji predviÄa trenutni rast od 1,2 GB godiĹĄnje, skladiĹĄtenje ne bi trebalo da predstavlja problem Äak i ako se zaglavlja bloka moraju Äuvati u memoriji.
8. Pojednostavljena verifikacija placĚanja
MogucĚe je verifikovati placĚanja bez voÄenja Äitavog mreĹžnog Ävora. Korisnik samo treba da saÄuva kopiju zaglavlja blokova najduĹžeg lanca dokaza o radu, do koje moĹže docĚi upitom ka mreĹžnim Ävorovima dok se ne uveri da je dobio najduĹži lanac i dobije Merkleova granu
koja povezuje transakciju sa blokom u koji je uneta vremenska oznaka za tu transakciju. Ne moĹže samostalno proveriti transakciju, ali povezujuÄi je sa mestom u lancu moĹže videti da je prihvaÄena od strane Ävora mreĹže i da su na njen blok dodati naknadni blokovi ĹĄto dalje potvrÄuje da ju je mreĹža prihvatila.
Kao takva, verifikacija je pouzdana sve dok poĹĄteni Ävorovi kontroliĹĄu mreĹžu, ali je ranjiva ako napadaÄ nadjaÄa ostatak mreĹže. Ävorovi mreĹže mogu sami proveriti transakcije, ali napadaÄeve laĹžne transakcije mogu zavarati one koji koriste pojednostavljenu metodu verifikacije transakcija sve dok je on u stanju da nadjaÄava ostatak mreĹže. Jedna od strategija zaĹĄtite bila bi prihvatanje upozorenja Ävorova mreĹže kada otkriju nevaĹžeÄi blok, pri Äemu bi korisnikov softver morao da preuzme ceo blok i sporne transakcije kako bi potvrdio nepravilnost. Biznisi koji primaju Äeste uplate Äe verovatno Ĺželeti da pokrenu i vode sopstvene Ävorove radi brĹže verifikacije i potrebe da im sigurnost ne zavisi od drugih.
9. Kombinovanje i deljenje vrednosti
Iako bi bilo mogucĚe pojedinaÄno rukovati novÄicĚima, bilo bi nezgrapno kreirati zasebnu transakciju za svaki cent u toj transferu. Da biste dozvolili podelu i kombinovanje vrednosti, transakcije sadrĹže viĹĄe ulaza i izlaza. ObiÄno cĚe postojati ili jedan ulaz iz veÄe prethodne transakcije ili viĹĄe unosa koji kombinuju manje iznose, a najviĹĄe dva izlaza: jedan za samo plaÄanje, a jedan koji vraÄa kusur, ako ga ima, nazad poĹĄiljaocu.
Treba napomenuti da situacija u kojoj transakcija zavisi od nekoliko drugih transakcija, a te transakcije zavise od joĹĄ mnogo viĹĄe, ovde nije problem. Nikada ne postoji potreba za izdvajanjem istorije pojedinaÄne transakcije.
10. Privatnost
Tradicionalni bankarski model postiĹže odgovarajuÄi nivo privatnosti ograniÄavanjem pristupa informacijama na strane ukljuÄene u transakciju i posrednika. Neophodnost javnog objavljivanja svih transakcija iskljuÄuje moguÄnost primene pomenutog modela, ali privatnost se i dalje moĹže zadrĹžati na drugi naÄin: Äuvanjem javnih kljuÄeva (public keys) anonimnim. Javnost moĹže videti da neko ĹĄalje iznos nekom drugom, ali bez informacija koje povezuju transakciju sa bilo kim. Ovo je sliÄno koliÄini informacija koje objavljuju berze, gde se vreme i veliÄina pojedinaÄnih trgovina Äine javnim, ali bez navoÄenja ko su stranke ukljuÄene u tu trgovinu.
Kao dodatni zaĹĄtitni zid, preporuÄljivo je koristiti novi par kljuÄeva za svaku transakciju, kako ne bi bili povezane sa zajedniÄkim vlasnikom. Neka povezivanja su i dalje neizbeĹžna kod transakcija sa viĹĄe ulaza, koje nuĹžno otkrivaju da su njihovi ulazi bili u vlasniĹĄtvu istog vlasnika. Rizik je taj da bi se otkrivanjem vlasnik kljuÄa mogle otkriti i ostale transakcije koje su pripadale tom vlasniku.
11. ProraÄuni
Razmatramo scenario u kome napadaÄ pokuĹĄava da generiĹĄe alternativni lanac brĹže od poĹĄtenog lanca. Äak i ako se to postigne, to ne omoguÄuje proizvoljne promene u sistemu, poput stvaranje vrednosti ni iz Äega ili uzimanje novca koji nikada nije pripadao napadaÄu. PoĹĄteni Ävorovi necĚe prihvatiti nevaĹžecĚe transakcije kao uplatu i nikada necĚe prihvatiti blok koji ih sadrĹži. NapadaÄ moĹže samo pokuĹĄati da promeni jednu od svojih transakcija kako bi vratio novac koji je nedavno potroĹĄio.
Trka izmeÄu poĹĄtenog lanca i lanca napadaÄa moĹže se predstaviti kao binomska distribucija sluÄajne diskretne varijable (Binomial Random Walk). UspeĹĄni ishod je da se poĹĄten lanac produĹži za jedan blok, povecĚavajucĚi svoje voÄstvo za +1, a neuspeĹĄni ishod je da se napadaÄev lanac produĹži za jedan blok, smanjujucĚi zaostatak za -1.
VerovatnocĚu da napadaÄ nadoknadi odreÄeni deficit moĹžemo izraziti kroz problem kockareve propasti (Gamblerâs Ruin Problem). Pretpostavimo da kockar sa neograniÄenim iznosom novca poÄinje sa zaostatkom i igra potencijalno beskonaÄan broj ponovljenih igara u pokuĹĄaju da nadoknadi zaostatak. MoĹžemo izraÄunati verovatnocĚu za nadoknaÄivanje zaostatka ili da Äe napadaÄ stiÄi poĹĄten lanac, na sledecĚi naÄin [8]:
p= verovatnoÄa da poĹĄten Ävor pronaÄe sledeÄi blok q= verovatnoÄa da napadaÄ pronaÄe sledeÄi blok qz= verovatnoÄa da Äe napadaÄ ikada dostiÄi z blokova zaostatka
S obzirom na naĹĄu pretpostavku da je p > q, verovatnocĚa pada eksponencijalno kako se poveÄava broj blokova koje napadaÄ mora da nadoknadi. Sa ĹĄansama protiv njega, ako mu se u poÄetku ne posrecĚi, njegove ĹĄanse postaju manje i manje sa poveÄanjem zaostatka.
Sada razmatramo koliko primalac nove transakcije treba da Äeka pre nego ĹĄto postane
dovoljno siguran da poĹĄiljalac ne moĹže promeniti transakciju. Pretpostavljamo da je poĹĄiljalac napadaÄ koji Ĺželi da natera primaoca da veruje da mu je platio, a zatim nakon nekog vremena tu transakciju preusmeri ka sebi. Primalac cĚe primetiti kada se to dogodi, ali poĹĄiljalac se nada da cĚe tad veÄ biti prekasno.
Primalac generiĹĄe novi par kljuÄeva i daje javni kljuÄ poĹĄiljaocu neposredno pre potpisivanja transakcije. Ovo spreÄava poĹĄiljaoca da unapred pripremi lanac blokova radecĚi na njemu neprekidno dok mu se ne posrecĚi da stekne dovoljnu prednost i u tom trenutku izvrĹĄi transakciju. Kada se transakcija poĹĄalje, nepoĹĄteni poĹĄiljalac poÄinje tajno da radi na paralelnom lancu koji sadrĹži alternativnu verziju njegove transakcije.
Primalac Äeka dok transakcija ne bude dodata u blok, i dok z blokova nije dodato nakon tog bloka. On ne zna taÄno koliko je napadaÄ napredovao, ali pod pretpostavkom da su poĹĄteni blokovi kreirani oÄekivanom dinamikom, potencijalni napredak napadaÄa cĚe biti prikazan kao Poasonova distribucija sa oÄekivanom vrednoĹĄcĚu:
Kako bismo izraÄunali verovatnoÄu da napadaÄ ipak moĹže da nadoknadi zaostatak, mnoĹžimo gustinu verovatnoÄe za svaki nivo napretka koji je mogao da ostvari sa verovatnoÄom da od tog trenutka moĹže da potpuno nadoknadi zaostatak:
PreureÄujemo formulu kako bismo izbegli sabiranje beskonaÄnog broja sabiraka zbog repa distribucije:
I konvertujemo u programski kod u programskom jeziku CâŚ
Kroz par primera, vidimo da verovatnoÄa opada eksponencijalno sa porastom z.
ReĹĄavanje za P < 0.1%âŚ
12. ZakljuÄak
PredloĹžili smo sistem za elektronske transakcije bez oslanjanja na poverenje. PoÄeli smo sa uobiÄajenim ĹĄablonom i novÄiÄima nastalim iz digitalnih potpisa, koji pruĹža snaĹžnu kontrolu nad vlasniĹĄtvom, ali je nepotpun bez naÄina da se spreÄi dvostruka potroĹĄnja. Kako bismo ovo reĹĄili, predloĹžili smo peer-to-peer mreĹžu koja koristi dokaz o radu za Äuvanje javne istorije transakcija Äija izmena napadaÄima brzo postaje raÄunski nepraktiÄna ako poĹĄteni Ävorovi kontroliĹĄu veÄinu procesorske snage. MreĹža je robusna u svojoj nestrukturiranoj jednostavnosti. Svi Ävorovi rade istovremeno uz malo koordinacije. Ne treba ih identifikovati, jer se poruke ne usmeravaju na jedno odreÄeno mesto nego samo trebaju biti prenete uz maksimalan napor od strane Ävorova da se taj prenos odradi na predviÄen naÄin. Ävorovi mogu da napuste i ponovo se pridruĹže mreĹži po Ĺželji, prihvatajuÄi lanac dokaza o radu kao dokaz onoga ĹĄto se dogodilo dok ih nije bilo. Oni glasaju svojom procesorskom snagom, izraĹžavajucĚi svoje prihvatanje validnih blokova time ĹĄto pokuĹĄavaju da ih nadgrade novim blokovima i odbacuju nevaĹžeÄe blokove odbijanjem ih nadgraÄuju. Sva potrebna pravila i podsticaji mogu se nametnuti ovim mehanizmom postizanja konsenzusa.
Reference:
[1] W. Dai, âb-money,â weidai.com/bmoney.txt, 1998.
[2] H. Massias, X.S. Avila, and J.-J. Quisquater, âDesign of a secure timestamping service with minimal trust requirements,â In 20th Symposium on Information Theory in the Benelux, May 1999.
[3] S. Haber, W.S. Stornetta, âHow to time-stamp a digital document,â In Journal of Cryptology, vol 3, no 2, pages 99-111, 1991.
[4] D. Bayer, S. Haber, W.S. Stornetta, âImproving the efficiency and reliability of digital time-stamping,â In Sequences II: Methods in Communication, Security and Computer Science, pages 329-334, 1993.
[5] S. Haber, W.S. Stornetta, âSecure names for bit-strings,â In Proceedings of the 4th ACM Conference on Computer and Communications Security, pages 28-35, April 1997.
[6] A. Back, âHashcash â a denial of service counter-measure,â hashcash.org/papers/hashcash.pdf, 2002.
[7] R.C. Merkle, âProtocols for public key cryptosystems,â In Proc. 1980 Symposium on Security and Privacy, IEEE Computer Society, pages 122-133, April 1980.
[8] W. Feller, âAn introduction to probability theory and its applications,â 1957.
-
@ bf47c19e:c3d2573b
2025-05-28 19:59:23Originalni tekst na dvadesetjedan.com
Autor: Vijay Boyapati / Prevod na hrvatski: Matija
Sa zadnjim cijenama koje je bitcoin dosegao 2017., optimistiÄan scenarij za ulagaÄe se moĹžda Äini toliko oÄitim da ga nije potrebno niti spominjati. Alternativno, moĹžda se nekome Äini glupo ulagati u digitalnu vrijednost koja ne poÄiva na nijednom fiziÄkom dobru ili vladi i Äiji porast cijene su neki usporedili sa manijom tulipana ili dot-com balonom. Nijedno nije toÄno; optimistiÄan scenarij za Bitcoin je uvjerljiv, ali ne i oÄit. Postoje znaÄajni rizici kod ulaganja u Bitcoin, no, kao ĹĄto planiram pokazati, postoji i ogromna prilika.
Geneza
Nikad u povijesti svijeta nije bilo moguÄe napraviti transfer vrijednosti meÄu fiziÄki udaljenim ljudima bez posrednika, poput banke ili vlade. 2008. godine, anonimni Satoshi Nakamoto je objavio 8 stranica rjeĹĄenja na dugo nerjeĹĄivi raÄunalski problem poznat kao âProblem Bizantskog Generala.â Njegovo rjeĹĄenje i sustav koji je izgradio - Bitcoin - dozvolio je, prvi put ikad, da se vrijednost prenosi brzo i daleko, bez ikakvih posrednika ili povjerenja. Implikacije kreacije Bitcoina su toliko duboke, ekonomski i raÄunalski, da bi Nakamoto trebao biti prva osoba nominirana za Nobelovu nagradu za ekonomiju i Turingovu nagradu.
Za ulagaÄe, vaĹžna Äinjenica izuma Bitcoina (mreĹže i protokola) je stvaranje novog oskudnog digitalnog dobra - bitcoina (monetarne jedinice). Bitcoini su prenosivi digitalni ânovÄiÄiâ (tokeni), proizvedeni na Bitcoin mreĹži kroz proces nazvan ârudarenjeâ (mining). Rudarenje Bitcoina je ugrubo usporedivo sa rudarenjem zlata, uz bitnu razliku da proizvodnja bitcoina prati unaprijed osmiĹĄljeni i predvidivi raspored. Samo 21 milijun bitcoina Äe ikad postojati, i veÄina (2017., kada je ovaj tekst napisan) su veÄ izrudareni. Svake Äetiri godine, koliÄina rudarenih bitcoina se prepolovi. Produkcija novih bitcoina Äe potpuno prestati 2140. godine.
Stopa inflacije ââ Monetarna baza
Bitcoine ne podrĹžava nikakva roba ili dobra, niti ih garantira ikakva vlada ili firma, ĹĄto postavlja oÄito pitanje za svakog novog bitcoin ulagaÄa: zaĹĄto imaju uopÄe ikakvu vrijednost? Za razliku od dionica, obveznica, nekretnina ili robe poput nafte i Ĺžita, bitcoine nije moguÄe vrednovati koristeÄi standardne ekonomske analize ili korisnost u proizvodnji drugih dobara. Bitcoini pripadaju sasvim drugoj kategoriji dobara - monetarnih dobara, Äija se vrijednost definira kroz tzv. teoriju igara; svaki sudionik na trĹžiĹĄtu vrednuje neko dobro, onoliko koliko procjenjuje da Äe ga drugi sudionici vrednovati. Kako bismo bolje razumjeli ovo svojstvo monetarnih dobara, trebamo istraĹžiti podrijetlo novca.
Podrijetlo novca
U prvim ljudskim druĹĄtvima, trgovina meÄu grupama se vrĹĄila kroz robnu razmjenu. Velika neefikasnost prisutna u robnoj razmjeni je drastiÄno ograniÄavala koliÄinu i geografski prostor na kojem je bila moguÄa. Jedan od najveÄih problema sa robnom razmjenom je problem dvostruke podudarnosti potraĹžnje. UzgajivaÄ jabuka moĹžda Ĺželi trgovati sa ribarom, ali ako ribar ne Ĺželi jabuke u istom trenutku, razmjena se neÄe dogoditi. Kroz vrijeme, ljudi su razvili Ĺželju za Äuvanjem odreÄenih predmeta zbog njihove rijetkosti i simboliÄne vrijednosti (npr. ĹĄkoljke, Ĺživotinjski zube, kremen). Zaista, kako i Nick Szabo govori u svojem izvrsnom eseju o podrijetlu novca, ljudska Ĺželja za sakupljanjem predmeta pruĹžila je izraĹženu evolucijsku prednost ranom Äovjeku nad njegovim najbliĹžim bioloĹĄkim rivalom, neandertalcem - Homo neanderthalensis.
"Primarna i najbitnija evolucijska funkcija sakupljanja bila je osigurati medij za Äuvanje i prenoĹĄenje vrijednosti".
Predmeti koje su ljudi sakupljali sluĹžili su kao svojevrsni âproto-novac,â tako ĹĄto su omoguÄavale trgovinu meÄu antagonistiÄkim plemenima i dozvoljavale bogatsvu da se prenosi na sljedeÄu generaciju. Trgovina i transfer takvih predmeta bile su rijetke u paleolitskim druĹĄtvima, te su oni sluĹžili viĹĄe kao âspremiĹĄte vrijednostiâ (store of value) nego kao âmedij razmjeneâ (medium of exchange), ĹĄto je uloga koju danas igra moderni novac. Szabo objaĹĄnjava:
"U usporedbi sa modernim novcem, primitivan novac je imao jako malo âbrzinuâ - mogao je promijeniti ruke samo nekoliko puta u Ĺživotu prosjeÄnog Äovjeka. Svejedno, trajni i Ävrsti sakupljaÄki predmet, ĹĄto bismo danas nazvali ânasljeÄe,â mogao je opstati mnogo generacija, dodajuÄi znatnu vrijednost pri svakom transferu - i zapravo omoguÄiti transfer uopÄe".
Rani Äovjek suoÄio se sa bitnom dilemom u teoriji igara, kada je odluÄivao koje predmete sakupljati: koje od njih Äe drugi ljudi Ĺželjeti? Onaj koji bi to toÄno predvidio imao bi ogromnu prednost u moguÄnosti trgovine i akvizicije bogatsva. Neka ameriÄka indijanska plemena, npr. Naraganseti, specijalizirala su se u proizvodnji sakupljaÄkih dobara koja nisu imala drugu svrhu osim trgovine. Valja spomenuti da ĹĄto je ranije predviÄanje da Äe neko dobro imati takvu vrijednost, veÄa je prednost koju Äe imati onaj koji je posjeduje, zato ĹĄto ju je moguÄe nabaviti jeftinije, prije nego postane vrlo traĹžena roba i njezona vrijednost naraste zajedno sa populacijom. Nadalje, nabava nekog dobra u nadi da Äe u buduÄnosti biti koriĹĄteno kao spremiĹĄte vrijednosti, ubrzava upravo tu primjenu. Ova cirkularnost je zapravo povratna veza (feedback loop) koja potiÄe druĹĄtva da se rapidno sloĹže oko jednog spremiĹĄta vrijednosti. U terminima teorije igara, ovo je znano kao âNashov ekvilibrij.â Postizanje Nashovog ekvilibrija za neko spremiĹĄte vrijednosti je veliko postignuÄe za druĹĄtvo, poĹĄto ono znatno olakĹĄava trgovinu i podjelu rada, i time omoguÄava napredak civilizacije.
TisuÄljeÄima, kako su ljudska druĹĄtva rasla i otvarala trgovinske puteve, razliÄite aplikacije spremiĹĄta vrijednosti u individualnim druĹĄtvima poÄele su se natjecati meÄusobno. Trgovci su imali izbor: Äuvati svoju zaradu u spremiĹĄtu vrijednosti vlastite kulture, ili one kulture sa kojom su trgovali, ili mjeĹĄavini oboje. Benefit ĹĄtednje u stranom spremiĹĄtu vrijednosti bila je uveÄana sposobnost trgovanja u povezanom stranom druĹĄtvu. Trgovci koji su ĹĄtedili u stranom spremiĹĄtu vrijednosti su takoÄer imali dobrih razloga da potiÄu svoje druĹĄtvo da ga prihvati, jer bi tako uveÄali vrijednost vlastite uĹĄteÄevine. Prednosti âuvezeneâ tehnologije spremanja vrijednosti bile su prisutne ne samo za trgovce, nego i za sama druĹĄtva. Kada bi se dvije grupe konvergirale u jedinstvenom spremiĹĄtu vrijednosti, to bi znaÄajno smanjilo cijenu troĹĄkova trgovine jednog s drugim, i samim time poveÄanje bogatstva kroz trgovinu. I zaista, 19. stoljeÄe bilo je prvi put da je najveÄi dio svijeta prihvatio jedinstveno spremiĹĄte vrijednosti - zlato - i u tom periodu vidio najveÄu eksploziju trgovine u povijesti svijeta. O ovom mirnom periodu, pisao je John Maynard Keynes:
"Kakva nevjerojatna epizoda u ekonomskom napretku Äovjeka⌠za svakog Äovjeka iole iznadprosjeÄnog, iz srednje ili viĹĄe klase, Ĺživot je nudio obilje, ugodu i moguÄnosti, po niskoj cijeni i bez puno problema, viĹĄe nego monarsima iz prethodnih perioda. Stanovnik Londona mogao je, ispijajuÄi jutarnji Äaj iz kreveta, telefonski naruÄiti razne proizvode iz cijele Zemlje, u koliÄinama koje je Ĺželio, i sa dobrim razlogom oÄekivati njihovu dostavu na svoj kuÄni prag."
Svojstva dobrog spremiĹĄta vrijednosti
Kada se spremiĹĄta vrijednosti natjeÄu jedno s drugim, specifiÄna svojstva rade razliku koja daje jednom prednost nad drugim. Premda su mnoga dobra u proĹĄlosti koriĹĄtena kao spremiĹĄta vrijednosti ili kao âproto-novac,â odreÄena svojstva su se pokazala kao posebno vaĹžna, i omoguÄila dobrima sa njima da pobijede. Idealno spremiĹĄte vrijednosti biti Äe:
- Trajno: dobro ne smije biti kvarljivo ili lako uniĹĄteno. Tako naprimjer, Ĺžito nije idealno spremiĹĄte vrijednosti.
- Prenosivo: dobro mora biti lako transportirati i Äuvati, ĹĄto omoguÄuje osiguranje protiv gubitka ili kraÄe i dopuĹĄta trgovinu na velike udaljenosti. Tako, krava je loĹĄije spremiĹĄte vrijednosti od zlatne narukvice.
- Zamjenjivo: jedna jedinica dobra treba biti zamjenjiva sa drugom. Bez zamjenjivosti, problem podudarnosti Ĺželja ostaje nerjeĹĄiv. Time, zlato je bolje od dijamanata, jer su oni nepravilni u obliku i kvaliteti.
- Provjerljivo: dobro mora biti lako i brzo identificirano i testirano za autentiÄnost. Laka provjera poveÄava povjerenje u trgovini i vjerojatnost da Äe razmjena biti dovrĹĄena.
- Djeljivo: dobro mora biti lako djeljivo na manje dijelove. Premda je ovo svojstvo bilo manje vaĹžno u ranim druĹĄtvima gdje je trgovina bila rijetka, postalo je vaĹžnije sa procvatom trgovine. KoliÄine koje su se mijenjale postale su manje i preciznije.
- Oskudno: Monetarno dobro mora imati âcijenu nemoguÄu za laĹžirati,â kao ĹĄto je rekao Nick Szabo. Drugim rijeÄima, dobro ne smije biti obilno ili lako dostupno kroz proizvodnju. Oskudnost je moĹžda i najvaĹžnije svojstvo spremiĹĄta vrijednosti, poĹĄto se izravno vezuje na ljudsku Ĺželju da sakupljamo ono ĹĄto je rijetko. Ona je izvor vrijednosti u spremiĹĄtu vrijednosti.
- Duge povijesti: ĹĄto je dulje neko dobro vrijedno za druĹĄtvo, veÄa je vjerojatnost da Äe biti prihvaÄeno kao spremiĹĄte vrijednosti. Dugo postojeÄe spremiĹĄte vrijednosti biti Äe jako teĹĄko uklonjeno od strane doĹĄljaka, osim u sluÄaju sile (ratno osvajanje) ili ako je nova tehnologija znatno bolja u ostalim svojstvima.
- Otporno na cenzuru: novije svojstvo, sve viĹĄe vaĹžno u modernom digitalnom svijetu sa sveprisutnim nadzorom, je otpornost na cenzuru. Drugim rijeÄima, koliko je teĹĄko da vanjski agent, kao korporacija ili drĹžava, sprijeÄi vlasnika dobra da ga Äuva i koristi. Dobra koja su otporna na cenzuru su idealna za ljude koji Ĺžive u reĹžimima koji prisilno nadziru kapital ili Äine neke oblike mirne trgovine protuzakonitima.
Ova tablica ocjenjuje Bitcoin, zlato (gold) i fiat novac (kao ĹĄto je euro ili dolar) po svojstvima izlistanim gore. ObjaĹĄnjenje svake ocjene slijedi nakon tablice.
Trajnost:
Zlato je neosporeni kralj trajnosti. Velika veÄina zlata pronaÄenog kroz povijest, ukljuÄujuÄi ono egipatskih faraona, opstaje i danas i vjerojatno Äe postojati i za tisuÄu godina. Zlatnici koriĹĄteni u antiÄko doba imaju znaÄajnu vrijednost i danas. Fiat valute i bitcoini su digitalni zapisi koji ponekad imaju fiziÄki oblik (npr. novÄanice). Dakle, njihovu trajnost ne odreÄuju njihova fiziÄka svojstva (moguÄe je zamijeniti staru i oĹĄteÄenu novÄanicu za novu), nego institucije koje stoje iza njih. U sluÄaju fiat valuta, mnoge drĹžave su nastale i nestale kroz stoljeÄa, i valute su nestale s njima. Marke iz Weimarske republike danas nemaju vrijednost zato ĹĄto institucija koja ih je izdavala viĹĄe ne postoji. Ako je povijest ikakav pokazatelj, ne bi bilo mudro smatrati fiat valute trajnima dugoroÄno; ameriÄki dolar i britanska funta su relativne anomalije u ovom pogledu. Bitcoini, zato ĹĄto nemaju instituciju koja ih odrĹžava, mogu se smatrati trajnima dok god mreĹža koja ih osigurava postoji. Obzirom da je Bitcoin joĹĄ uvijek mlada valuta, prerano je za Ävrste zakljuÄke o njegovoj trajnosti. No, postoje ohrabrujuÄi znakovi - prominente drĹžave su ga pokuĹĄavale regulirati, hakeri ga napadali - usprkos tome, mreĹža nastavlja funkcionirati, pokazujuÄi visok stupanj antifragilnosti.
Prenosivost:
Bitcoini su najprenosivije spremiĹĄte vrijednosti ikad. Privatni kljuÄevi koji predstavljaju stotine milijuna dolara mogu se spremiti na USB drive i lako ponijeti bilo gdje. Nadalje, jednako velike sume mogu se poslati na drugi kraj svijeta skoro instantno. Fiat valute, zbog svojeg temeljno digitalnog oblika, su takoÄer lako prenosive. Ali, regulacije i kontrola kapitala od strane drĹžave mogu ugroziti velike prijenose vrijednosti, ili ih usporiti danima. Gotovina se moĹže koristiti kako bi se izbjegle kontrole kapitala, ali onda rastu rizik Äuvanja i cijena transporta. Zlato, zbog svojeg fiziÄkog oblika i velike gustoÄe, je najmanje prenosivo. Nije Äudo da veÄina zlatnika i poluga nikad ne napuste sefove. Kada se radi prijenos zlata izmeÄu prodavaÄa i kupca, uglavnom se prenosi samo ugovor o vlasniĹĄtvu, ne samo fiziÄko zlato. Prijenos fiziÄkog zlata na velike udaljenosti je skupo, riskantno i sporo.
Zamjenjivost:
Zlato nam daje standard za zamjenjivost. Kada je rastopljeno, gram zlata je praktiÄki nemoguÄe razlikovati od bilo kojeg drugog grama, i zlato je oduvijek bilo takvo. S druge strane, fiat valute, su zamjenjive samo onoliko koliko njihova institucija Ĺželi da budu. Iako je uglavnom sluÄaj da je novÄanica zamjenjiva za drugu istog iznosa, postoje situacije u kojima su velike novÄanice tretirane drukÄije od malih. Naprimjer, vlada Indije je, u pokuĹĄaju da uniĹĄti neoporezivo sivo trĹžiĹĄte, potpuno oduzela vrijednost novÄanicama od 500 i 1000 rupija. To je uzrokovalo da ljudi manje vrednuju te novÄanice u trgovini, ĹĄto je znaÄilo da viĹĄe nisu bile zaista zamjenjive za manje novÄanice. Bitcoini su zamjenjivi na razini mreĹže; svaki bitcoin je pri prijenosu tretiran kao svaki drugi. No, zato ĹĄto je moguÄe pratiti individualne bitcoine na blockchainu, odreÄeni bitcoin moĹže, u teoriji, postati âprljavâ zbog korĹĄtenja u ilegalnoj trgovini, te ga trgovci ili mjenjaÄnice moĹžda neÄe htjeti prihvatiti. Bez dodatnih poboljĹĄanja oko privatnosti i anonimnosti na razini mreĹžnog protokola, bitcoine ne moĹžemo smatrati jednako zamjenjivim kao zlato.
MoguÄnost provjere:
PraktiÄno gledajuÄi, autentiÄnost fiat valuta i zlata je priliÄno lako provjeriti. Svejedno, i usprkos pokuĹĄajima da sprijeÄe krivotvorenje novÄanica, i dalje postoji potencijal prevare za vlade i njihove graÄane. Zlato takoÄer nije imuno na krivotvorenje. Sofisticirani kriminalci su koristili pozlaÄeni tungsten kako bi prevarili kupce zlata. Bitcoine je moguÄe provjeriti sa matematiÄkom sigurnoĹĄÄu. KoriĹĄtenjem kriptografskih potpisa, vlasnik bitcoina moĹže javno demonstrirati da posjeduje bitcoine koje tvrdi da posjeduje.
Djeljivost:
Bitcoine je moguÄe podijeliti u stotinu milijuna manjih jedinica (zvanih satoshi), i prenositi takve (no, valja uzeti u obzir ekonomiÄnost prijenosa malih iznosa, zbog cijene osiguravanja mreĹže - ânetwork feeâ). Fiat valute su tipiÄno dovoljno djeljive na jedinice sa vrlo niskom kupovnom moÄi. Zlato, iako fiziÄki i teoretski djeljivo, postaje teĹĄko za koriĹĄtenje kada se podijeli na dovoljno male koliÄine da bi se moglo koristiti u svakodnevnoj trgovini.
Oskudnost:
Svojstvo koje najjasnije razlikuje Bitcoin od fiat valuta i zlata je njegova unaprijed definirana oskudnost. Od poÄetka, konaÄna koliÄina bitcoina nikad neÄe biti veÄa od 21 milijun. To daje vlasnicima bitcoina jasan i znan uvid u postotak ukupnog vlasniĹĄtva. Naprimjer, vlasnik 10 bitcoina bi znao da najviĹĄe 2,1 milijuna ljudi (manje od 0.03% populacije) moĹže ikad imati isto bitcoina kao i on. Premda je kroz povijest uvijek bilo oskudno, zlato nije imuno na poveÄanje ukupne koliÄine. Ako se ikad izumi nova, ekonomiÄnija metoda rudarenja ili proizvodnje zlata, ukupna koliÄina zlata bi se mogla dramatiÄno poveÄati (npr. rudarenje morskog dna ili asteroida). Na kraju, fiat valute, relativno nov izum u povijesti, pokazale su se sklonima konstantnim poveÄanjima u koliÄini. DrĹžave su pokazale stalnu sklonost inflaciji monetarne kvantitete kako bi rjeĹĄavale kratkoroÄne politiÄke probleme. Inflacijske tendencije vlada diljem svijeta Äine fiat valute gotovo sigurnim da Äe gubiti vrijednost kroz vrijeme.
Etablirana povijest:
Nijedno monetarno dobro nema povijest kao zlato, koje je imalo vrijednost za cijelog trajanja ljudske civilizacije. Kovanice izraÄene u antiÄko doba i danas imaju znaÄajnu vrijednost. Ne moĹže se isto reÄi za fiat valute, koje su same relativno nova povijesna anomalija. Od njihovog poÄetka, fiat valute su imale gotovo univerzalni smjer prema bezvrijednosti. KoriĹĄtenje inflacije kao podmuklog naÄina za nevidljivo oporezivanje graÄana je vjeÄita kuĹĄnja kojoj se skoro nijedna drĹžava u povijesti nije mogla oduprijeti. Ako je 20. stoljeÄe, u kojem je fiat novac dominirao globalni monetarni poredak, demonstriralo neku ekonomsku istinu, to je onda bila ta da ne moĹžemo raÄunati na fiat novac da odrĹži vrijednost u duĹžem ili srednjem vremenskom periodu. Bitcoin, usprkos svojoj novosti, je preĹživio dovoljno testova trĹžiĹĄta da postoji velika vjerojatnost da neÄe nestati kao vrijedno dobro. Nadalje, Lindy efekt govori da ĹĄto duĹže Bitcoin bude koriĹĄten, to Äe veÄa biti vjera u njega i njegovu sposobnost da nastavi postojati dugo u buduÄnost. Drugim rijeÄima, druĹĄtvena vjera u monetarno dobro je asimptotiÄka, kao u grafu ispod:
Ako Bitcoin preĹživi prvih 20 godina, imat Äe gotovo sveopÄe povjerenje da Äe trajati zauvijek, kao ĹĄto ljudi vjeruju da je internet trajna stvar u modernom svijetu.
Otpor na cenzuru
Jedan od najbitnijih izvora za ranu potraĹžnju bitcoina bila je njegova upotreba u ilegalnoj kupovini i prodaji droge. Mnogi su zato pogreĹĄno zakljuÄili da je primarna potraĹžnja za bitcoinima utemeljena u njihovoj prividnoj anonimnosti. MeÄutim, Bitcoin nije anonimna valuta; svaka transakcija na mreĹži je zauvijek zapisana na javnom blockchainu. Povijesni zapis transakcija dozvoljava forenziÄkoj analizi da identificira izvore i tijek sredstava. Takva analiza dovela je do uhiÄenja poÄinitelja zloglasne MtGox pljaÄke. Premda je istina da dovoljno oprezna i pedantna osoba moĹže sakriti svoj identitet koristeÄi Bitcoin, to nije razlog zaĹĄto je Bitcoin bio toliko popularan u trgovini drogom.
KljuÄno svojstvo koje Äini Bitcoin najboljim za takve aktivnosti je njegova agnostiÄnost i nepotrebnost za dozvolom (âpremissionlessnessâ) na mreĹžnoj razini. Kada se bitcoini prenose na Bitcoin mreĹži, ne postoji nitko tko dopuĹĄta transakcije. Bitcoin je distribuirana peer-to-peer (korisnik-korisniku) mreĹža, i samim time dizajnirana da bude otporna na cenzuru. Ovo je u velikom kontrastu sa fiat bankarskim sustavom, u kojem drĹžave reguliraju banke i ostale institucije prijenosa novca, kako bi one prijavljivale i sprjeÄavale protuzakonito koriĹĄtenje monetarnih dobara. KlasiÄan primjer regulacije novca su kontrole kapitala. Npr., bogati milijunaĹĄ Äe vrlo teĹĄko prenijeti svoje bogatstvo u novu zemlju, kada bjeĹži iz opresivnog reĹžima. Premda zlato nije izdano i proizvedeno od drĹžave, njegova fiziÄka priroda ga Äini teĹĄko prenosivim kroz prostor, i samim time ga je daleko lakĹĄe regulirati nego Bitcoin. Indijski Akt kontrole zlata je primjer takve regulacije.
Bitcoin je odliÄan u veÄini gore navedenih svojstava, ĹĄto mu omoguÄava da bude marginalno bolji od modernih i drevnih monetarnih dobara, te da pruĹži poticaje za svoje rastuÄe druĹĄtveno usvajanje. SpecifiÄno, moÄna kombinacija otpornosti na cenzuru i apsolutne oskudnosti bila je velika motivacija za bogate ulagaÄe koji su uloĹžili dio svojeg bogatstva u Bitcoin.
Evolucija novca
U modernoj monetarnoj ekonomiji postoji opsesija sa ulogom novca kao medija razmjene. U 20. stoljeÄu, drĹžave su monopolizirale izdavanje i kontrolu novca i kontinuirano potkopavale njegovo svojstvo spremiĹĄta vrijednosti, stvarajuÄi laĹžno uvjerenje da je primarna svrha novca biti medij razmjene. Mnogi su kritizirali Bitcoin, govoreÄi da je neprikladan da bude novac zato ĹĄto mu je cijena bila previĹĄe volatilna za medij razmjene. No, novac je uvijek evoluirao kroz etape; uloga spremiĹĄta vrijednosti je dolazila prije medija razmjene. Jedan od oÄeva marginalistiÄke ekonomije, William Stanley Jevons, objaĹĄnjava:
"Povijesno govoreÄi⌠Äini se da je zlato prvo sluĹžilo kao luksuzni metal za ukras; drugo, kao saÄuvana vrijednost; treÄe, kao medij razmjene; i konaÄno, kao mjerilo vrijednosti."
U modernoj terminologiji, novac uvijek evoluira kroz Äetiri stadija:
- Kolekcionarstvo: U prvoj fazi svoje evolucije, novac je traĹžen samo zbog svojih posebnih svojstava, uglavnom zbog Ĺželja onog koji ga posjeduje. Ĺ koljke, perlice i zlato su bili sakupljani prije nego su poprimili poznatije uloge novca.
- SpremiĹĄte vrijednosti: Jednom kada je novac traĹžen od dovoljnog broja ljudi, biti Äe prepoznat kao naÄin za Äuvanje i spremanje vrijednosti kroz vrijeme. Kada neko dobro postane ĹĄiroko koriĹĄteno kao spremiĹĄte vrijednosti, njegova kupovna moÄ raste sa poveÄanom potraĹžnjom za tu svrhu. Kupovna moÄ spremiĹĄta vrijednosti Äe u jednom trenutku doÄi do vrhunca, kada je dovolno raĹĄireno i broj novih ljudi koji ga potraĹžuju splasne.
- Sredstvo razmjene: Kada je novac potpuno etabliran kao spremiĹĄte vrijednosti, njegova kupovna moÄ se stabilizira. Nakon toga, postane prikladno sredstvo razmjene zbog stabilnosti svoje cijene. U najranijim danima Bitcoina, mnogi ljudi nisu shvaÄali koju buduÄu cijenu plaÄaju koristeÄi bitcoine kao sredstvo razmjene, umjesto kao novonastalo spremiĹĄte vrijednosti. Poznata priÄa o Äovjeku koji je za 10,000 bitcoina (vrijednih oko 94 milijuna dolara kada je ovaj Älanak napisan) za dvije pizze ilustrira ovaj problem.
- Jedinica raÄunanja vrijednosti: Jednom kada je novac ĹĄiroko koriĹĄten kao sredstvo razmjene, dobra Äe biti vrednovana u njemu, tj. veÄina cijena Äe biti izraĹžena u njemu. UobiÄajena zabluda je da je veÄinu dobara moguÄe zamijeniti za bitcoine danas. Npr., premda je moĹžda moguÄe kupiti ĹĄalicu kave za bitcoine, izlistana cijena nije prava bitcoin cijena; zapravo se radi o cijeni u drĹžavnoj valuti koju Ĺželi trgovac, preraÄunatu u bitcoin po trenutnoj trĹžiĹĄnoj cijeni. Kad bi cijena bitcoina pala u odnosu na valutu, vrijednost ĹĄalice izraĹžena u bitcoinima bi se poveÄala. Od trenutka kada trgovci budu voljni prihvaÄani bitcoine kao plateĹžno sredstvo, bez obraÄanja paĹžnje na vrijednost bitcoina u drĹžavnoj fiat valuti, moÄi Äemo reÄi da je Bitcoin zaista postao jedinica raÄunanja vrijednosti.
Monetarna dobra koja joĹĄ nisu jedinice raÄunanja vrijednosti moĹžemo smatrati âdjelomiÄno monetiziranima.â Danas zlato ima takvu ulogu, jer je spremiĹĄte vrijednosti, ali su mu uloge sredstva razmjene i raÄunanja vrijednosti oduzete intervencijama drĹžava. MoguÄe je takoÄer da se jedno dobro koristi kao sredstvo razmjene, dok druga ispunjavaju ostale uloge. To je tipiÄno u zemljama gdje je drĹžava disfunkcionalna, npr. Argentina ili Zimbabwe. U svojoj knjizi, Digitalno zlato, Nathaniel Popper piĹĄe:
"U Americi, dolar sluĹži trima funkcijama novca: nudi sredstvo razmjene, jedinicu za mjerenje vrijednosti dobara, i mjesto gdje se moĹže Äuvati vrijednosti. S druge strane, argentinski peso je koriĹĄten kao sredstvo razmjene (za svakodnevne potrebe), ali ga nitko nije koristio kao spremiĹĄte vrijednosti. Ĺ tednja u pesosima bila je ekvivalent bacanja novca. Zato su ljudi svu svoju ĹĄtednju imali u dolarima, jer je dolar bolje Äuvao vrijednost. Zbog volatilnosti pesosa, ljudi su raÄunali cijene u dolarima, ĹĄto im je pruĹžalo pouzdaniju jedinicu mjerenja kroz vrijeme."
Bitcoin je trenutno u fazi tranzicije iz prvog stadija monetizacije u drugi. Vjerojatno Äe proÄi nekoliko godina prije nego Bitcoin preÄe iz zaÄetaka spremiĹĄta vrijednosti u istinski medij razmjene, i put do tog trenutka je joĹĄ uvijek pun rizika i nesigurnosti. VaĹžno je napomenuti da je ista tranzicija trajala mnogo stoljeÄa za zlato. Nitko danas Ĺživ nije doĹživio monetizaciju dobra u realnom vremenu (kroz koju Bitcoin prolazi), tako da nemamo puno iskustva govoriti o putu i naÄinu na koji Äe se monetizacija dogoditi.
Put monetizacije
Kroz proces monetizacije, monetarno dobro Äe naglo porasti u kupovnoj moÄi. Mnogi su tako komentirali da je uveÄanje kupovne moÄi Bitcoina izgledalo kao âbalonâ (bubble). Premda je ovaj termin Äesto koriĹĄten kako bi ukazao na pretjeranu vrijednosti Bitcoina, sasvim sluÄajno je prikladan. Svojstvo koje je uobiÄajeno za sva monetarna dobra jest da je njihova kupovna moÄ viĹĄa nego ĹĄto se moĹže opravdati samo kroz njihovu uporabnu vrijednost. Zaista, mnogi povijesni novci nisu imali uporabnu vrijednost. Razliku izmeÄu kupovne moÄi i vrijednosti razmjene koju bi novac mogao imati za svoju inherentnu korisnost, moĹžemo razmatrati kao âmonetarnu premiju.â Kako monetarno dobro prolazi kroz stadije monetizacije (navedene gore), monetarna premija raste. No, ta premija ne raste u ravnoj i predvidivoj liniji. Dobro X, koje je bilo u procesu monetizacije, moĹže izgubiti u usporedbi sa dobrom Y koje ima viĹĄe svojstava novca, te monetarna premija dobra X drastiÄno padne ili potpuno nestane. Monetarna premija srebra je skoro potpuno nestala u kasnom 19. stoljeÄu, kada su ga vlade diljem svijeta zamijenile zlatom kao novcem.
Äak i u odsustvu vanjskih faktora, kao ĹĄto su intervencije vlade ili druga monetarna dobra, monetarna premija novog novca neÄe iÄi predvidivim putem. Ekonomist Larry White primijetio je:
"problem sa priÄom âbalona,â naravno, je da je ona konzistentna sa svakim putem cijene, i time ne daje ikakvo objaĹĄnjenje za specifiÄan put cijene"
Proces monetizacije opisuje teorija igara; svaki akter na trĹžiĹĄtu pokuĹĄava predvidjeti agregiranu potraĹžnju ostalih aktera, i time buduÄu monetarnu premiju. Zato ĹĄto je monetarna premija nevezana za inherentnu korisnost, trĹžiĹĄni akteri se uglavnom vode za proĹĄlim cijenama da bi odredili je li neko dobro jeftino ili skupo, i Ĺžele li ga kupiti ili prodati. Veza trenutne potraĹžnje sa proĹĄlim cijenama naziva se âovisnost o putuâ (path dependence); ona je moĹžda najveÄi izvor konfuzije u shvaÄanju kretanja cijena monetarnih dobara.
Kada kupovna moÄ monetarnog dobra naraste zbog veÄeg i ĹĄireg koriĹĄtenja, oÄekivanja trĹžiĹĄta o definicijama âjeftinogâ i âskupogâ se mijenjaju u skladu s time. SliÄno tome, kada cijena monetarnog dobra padne, oÄekivanja trĹžiĹĄta mogu se promijeniti u opÄe vjerovanje da su prethodne cijene bile âiracionalneâ ili prenapuhane. Ovisnost o putu novca ilustrirana je rijeÄima poznatog upravitelja fondova s Wall Streeta, Josha Browna:
"Kupio sam bitcoine kada su koĹĄtali 2300 USD, i to mi se udvostruÄilo gotovo odmah. Onda sam poÄeo govoriti kako âne mogu kupiti joĹĄâ dok im je cijena rasla, premda sam znao da je to razmiĹĄljanje bazirano samo na cijenu po kojoj sam ih kupio. Kasnije, kada je cijena pala zbog kineske regulacije mjenjaÄnica, poÄeo sam si govoriti, âOdliÄno, nadam se da Äe joĹĄ pasti da mogu kupiti joĹĄ.â"
Istina leĹži u tome da su ideje âjeftinogâ i âskupogâ zapravo besmislene kada govorimo o monetarnim dobrima. Cijena monetarnog dobra ne reflektira njegovu stopu rasprostanjenosti ili korisnosti, nego mjeru koliko je ono ĹĄiroko prihvaÄeno da ispuni razne uloge novca.
Dodatna komplikacija u ovom aspektu novca je Äinjenica da trĹžiĹĄni akteri ne djeluju samo kao nepristrani promatraÄi koji pokuĹĄavaju kupiti i prodati u iĹĄÄekivanju buduÄih kretanja monetarne premije, nego i kao aktivni proponenti. PoĹĄto ne postoji objektivno âtoÄnaâ monetarna premija, ĹĄiriti dobar glas o superiornijim svojstvima nekog monetarnog dobra je efektivnije nego za obiÄna dobra, Äija vrijednost je u konaÄnici vezana na njegovu osnovnu korisnost. Religiozni zanos sudionika na Bitcoin trĹžiĹĄtu vidljiv je na raznim internetskim forumima, gdje Bitcoineri aktivno promoviraju benefine Bitcoina i bogatstvo koje je moguÄe ostvariti investiranjem u njega. PromatrajuÄi Bitcoin trĹžiĹĄte, Leigh Drogen komentira:
"To je prepoznatljivo svima kao religija - priÄa koju si priÄamo i oko koje se slaĹžemo. Religija je krivulja na grafu prihvaÄanja o kojoj trebamo razmiĹĄljati. Sustav je gotovo savrĹĄen - onog trenutka kada netko pristupi krugu Bitcoinera, to Äe reÄi svima i nastaviti ĹĄiriti rijeÄ. Onda njihovi prijatelji pristupe i nastave ĹĄiriti rijeÄ."
Premda usporedba sa religijom moĹže staviti Bitcoin u iracionalno svjetlo, potpuno je racionalno za individualnog vlasnika da ĹĄiri dobru vijest o superiornom monetarnom dobru, i za ĹĄire druĹĄtvo da se standardizira oko njega. Novac djeluje kao temelj za svu trgovinu i ĹĄtednju; tako da prihvaÄanje superiornog oblika novca ima ogromne multiplicirajuÄe benefite za stvaranje bogatstva za sve Älanove druĹĄtva.
Oblik monetizacije
U Älanku o Spekulativnom prihvaÄanju Bitcoina / teorije cijene, Michael Casey postulira da rastuÄi Gartner hype ciklusi predstavljaju faze standardne S-krivulje prihvaÄanja novih tehnologija, koje su bile prisutne kod mnogih transformacijskih tehnologija dok su postajale uobiÄajene u druĹĄtvu.
Svaki Gartner hype ciklus poÄinje sa eksplozijom entuzijazma za novom tehnologijom, a cijenu podiĹžu oni sudionici na trĹžiĹĄtvu koji su âdostupniâ u toj fazi. Najraniji kupci u Gartner hype ciklusu obiÄno imaju jaku vjeru o transformacijskoj prirodi tehnologije u koju ulaĹžu. S vremenom, trĹžiĹĄte dosegne vrhunac entuzijazma kako se koliÄina novih kupaca iscrpljuje, te kupovinom poÄnu dominirati spekulatori koji su viĹĄe zainteresirani u brze profite nego u samu tehnologiju.
Nakon vrha hype ciklusa, cijene rapidno padaju dok spekulativno ludilo ustupa mjesto oÄajavanju, javnoj poruzi i osjeÄaju da tehnologija nije uopÄe bila transformacijska. S vremenom, cijena dosegne dno i formira plato na kojem se originalnim ulagaÄima, koji su imali snaĹžno uvjerenje, pridruĹžuju nove grupe ljudi koji su izdrĹžali bol kraha cijena i koji cijene vaĹžnost same tehnologije.
Plato traje neko vrijeme i formira, kako Casey kaĹže, âstabilnu, dosadnu dolinu.â Za ovo vrijeme, javni interes za tehnologiju opada, no nastaviti Äe se razvijati i snaĹžna zajednica uvjerenja Äe polako rasti. Tada, postavlja se nova baza za sljedeÄu iteraciju hype ciklusa, dok vanjski promatraÄi prepoznaju da tehnologija i dalje postoji i da ulaganje u nju moĹžda nije onoliko riziÄno kao ĹĄto se Äinilo za vrijeme pada cijene. SljedeÄa iteracija hype ciklusa donosi mnogo veÄi broj novih ljudi, pa je i ciklus daleko veÄi u svojoj magnitudi.
Jako mali broj ljudi koji sudjeluju u Gartner hype ciklusu Äe toÄno predvidjeti koliko Äe visoko cijena porasti za vrijeme ciklusa. Cijene Äesto dosegnu razine koje bi se Äinile apsurdnima veÄini ulagaÄa u raniji stadijima ciklusa. Kada ciklus zavrĹĄi, mediji tipiÄno atribuiraju pad cijene nekoj od aktualnih druĹĄvenih tema. Premda takva tema moĹže biti okidaÄ pada, ona nikad nije temeljni razlog zaĹĄto ciklus zavrĹĄava. Gartner hype ciklusi zavrĹĄavaju kada je koliÄina dostupnih novih sudionika na trĹžiĹĄtu iscrpljena.
Zanimljivo je da je i zlato nacrtalo klasiÄan graf Gartner hype ciklusa od kasnih 1970-ih do ranih 2000-ih. MoguÄe je spekulirati da je hype ciklus osnovna socijalna dinamika oko procesa monetizacije.
Gartner kohorte
Od poÄetka trgovanja Bitcoina na mjenjaÄnicama 2010. godine, Bitcoin trĹžiĹĄte je svjedoÄilo Äetirima velikim Gartner hype ciklusima. U retrospektivi, moĹžemo vrlo precizno identificirati grupe cijena prethodnih hype ciklusa Bitcoin trĹžiĹĄta. TakoÄer, moĹžemo kvalitativno odrediti kohorte ulagaÄa koje su povezane sa svakom iteracijom prethodnih ciklusa.
0 USD â1 USD (2009. â 3. mjesec 2011.): Prvi hype ciklus u Bitcoin trĹžiĹĄtu dominirali su kriptografi, raÄunalni znanstvenici i cypherpunkovi koji su od poÄetka bili spremni razumijeti vaĹžnost nevjerojatnog izuma Satoshija Nakamotoa, i koji su bili pioniri u potvrÄivanju da Bitcoin protokol nema tehniÄkih mana.
1 USD - 30 USD (3. mjesec 2011. â 7. mjesec. 2011.): Drugi ciklus privukao je rane entuzijaste oko novih tehnologija kao i stabilan pritok ideoloĹĄki motiviranih ulagaÄa koji su bili oduĹĄevljeni idejom novca odvojenog od drĹžave. Libertarijanci poput Rogera Vera doĹĄli su u Bitcoin zbog aktivnog anti-institucionalnog stava, i moguÄnosti koju je nova tehnologija obeÄavala. Wences Casares, briljantni i dobro povezani serijski poduzetnik, bio je takoÄer dio drugog Bitcoin hype ciklusa te je ĹĄirio rijeÄ o Bitcoinu meÄu najprominentnijim tehnolozima i ulagaÄima u Silicijskoj Dolini.
250 USD â 1100 USD (4. mjesec 2013. â 12. mjesec 2013.): TreÄi hype ciklus doĹživio je ulazak ranih generalnih i institucionalnih ulagaÄa koji su bili voljni uloĹžiti trud i riskirati kroz uĹžasno komplicirane kanale likvidnosti kako bi kupili bitcoine. Primaran izvor likvidnosti na trĹžiĹĄtu za vrijeme ovog perioda bio je MtGox, mjenjaÄnica bazirana u Japanu, koju je vodio notorno nesposobni i beskrupulozni Mark Karpeles, koji je kasnije zavrĹĄio i u zatvoru zbog svoje uloge u kolapsu MtGoxa.
Valja primijetiti da je rast Bitcoinove cijene za vrijeme spomenuti hype ciklusa veÄinom povezano sa poveÄanjem likvidnosti i lakoÄom sa kojom su ulagaÄi mogli kupiti bitcoine. Za vrijeme prvog hype ciklusa, nisu postojale mjenjaÄnice; akvizicija bitcoina se odvijala primarno kroz rudarenje (mining) ili kroz izravnu razmjenu sa onima koju su veÄ izrudarili bitcoine. Za vrijeme drugog hype ciklusa, pojavile su se rudimentarne mjenjaÄnice, no nabavljanje i osiguravanje bitcoina na ovim mjenjaÄnicama bilo je previĹĄe kompleksno za sve osim tehnoloĹĄki najsposobnijih ulagaÄa. Äak i za vrijeme treÄeg hype ciklusa, ulagaÄi koju su slali novac na MtGox kako bi kupili bitcoine su morali raditi kroz znaÄajne prepreke. Banke nisu bile voljne imati posla sa mjenjaÄnicom, a oni posrednici koji su nudili usluge transfera bili su Äesto nesposobni, kriminalni, ili oboje. Nadalje, mnogi koji su uspjeli poslati novac MtGoxu, u konaÄnici su morali prihvatiti gubitak svojih sredstava kada je mjenjaÄnica hakirana i kasnije zatvorena.
Tek nakon kolapsa MtGox mjenjaÄnice i dvogodiĹĄnje pauze u trĹžiĹĄnoj cijeni Bitcoina, razvili su se zreli i duboki izvori likvidnosti; primjeri poput reguliranih mjenjaÄnica kao ĹĄto su GDAX i OTC brokeri kao Cumberland mining. Dok je Äetvrti hype ciklus zapoÄeo 2016. godine, bilo je relativno lako obiÄnim ulagaÄima kupiti i osigurati bitcoine.
1100 USD â 19600 USD? (2014. â?):
U trenutku pisanja ovog teksta, trĹžiĹĄte Bitcoina je prolazilo svoj Äetvrti veliki hype ciklus. Sudjelovanje u ovom hype ciklusu dominirala je ona skupina koju je Michael Casey opisao kao ârana veÄinaâ obiÄnih i institucionalnih ulagaÄa.
Kako su se izvori likvidnosti produbljivali i sazrijevali, veliki institucionalni ulagaÄi sada imaju priliku sudjelovati kroz regulirana âfuturesâ trĹžiĹĄta. Dostupnosti takvih trĹžiĹĄta stvara put ka kreaciji Bitcoin ETF-a (exchange traded fund) (fond na slobodnom trĹžiĹĄtu), koji Äe onda pokrenuti âkasnu veÄinuâ i ânajsporijeâ u sljedeÄim hype ciklusima.
Premda je nemoguÄe predvidjeti toÄan efekt buduÄih hype ciklusa, razumno je oÄekivati da Äe najviĹĄa toÄka biti izmeÄu 20.000 USD i 50.000 USD (2021. zenit je bio preko 69.000 USD). Znatno viĹĄe od ovog raspona, i Bitcoin bi imao znatan postotak ukupne vijednosti zlata (zlato i Bitcoin bi imali jednaku trĹžiĹĄnu kapitalizaciju kada bi bitcoini vrijedili oko 380.000 USD u trenutku pisanja ovog teksta). ZnaÄajan postotak vrijednosti zlata dolazi od potraĹžnje centralnih banaka, te je malo vjerojatno da Äe centralne banke ili suverene drĹžave sudjelovati u trenutnom hype ciklusu.
Ulazak suverenih drĹžava u Bitcoin
Bitcoinov zadnji Gartner hype ciklus Äe zapoÄeti kada ga suverene drĹžave poÄnu akumulirati kao dio svojih rezervi stranih valuta. TrĹžiĹĄna kapitalizacija Bitcoina je trenutno premala da bismo ga smatrali znaÄajnim dodatkom rezervama veÄini zemalja. No, kako se interes u privatnom sektoru poveÄava i kapitalizacija Bitcoina se pribliĹži trilijunu dolara, postat Äe dovoljno likvidan za veÄinu drĹžava. Prva drĹžava koja sluĹžbeno doda bitcoine u svoje rezerve Äe vjerojatno potaknuti stampedo ostalih da uÄine isto. DrĹžave koje su meÄu prvima u usvajanju Bitcoina imat Äe najviĹĄe benefita u svojim knjigama ako Bitcoin u konaÄnici postane globalna valuta (global reserve currency). NaĹžalost, vjerojatno Äe drĹžave sa najjaÄom izvrĹĄnom vlasti - diktature poput Sjeverne Koreje - biti najbrĹže u akumulaciji bitcoina. Neodobravanje prema takvim drĹžavama i slaba izvrĹĄna tijela zapadnjaÄkih demokracija uzrokovat Äe sporost i kaĹĄnjenje u akumulaciji bitcoina za njihove vlastite rezerve.
Velika je ironija u tome ĹĄto je SAD trenutno jedna od regulatorno najotvorenijih nacija prema Bitcoinu, dok su Kina i Rusija najzatvorenije. SAD riskira najviĹĄe, geopolitiÄki, ako bi Bitcoin zamijenio dolar kao svjetska rezervna valuta. U 1960-ima, Charles de Gaulle je kritizirao âpretjeranu privilegijuâ (âexorbitant privilegeâ) koju su SAD imale u meÄunarodnom monetarnom poretku, postavljenom kroz Bretton Woods dogovor 1944. godine. Ruska i kineska vlada joĹĄ ne shvaÄaju geo-strateĹĄke benefite Bitcoina kao rezervne valute, te se trenutno brinu o efektima koje bi mogao imati na njihova unutarnja trĹžiĹĄta. Kao de Gaulle u 1960-ima, koji je prijetio SAD-u povratkom na klasiÄni standard zlata, Kinezi i Rusi Äe s vremenom uvidjeti korist u velikoj poziciji u Bitcoinu - spremiĹĄtu vrijednosti bez pokriÄa ijedne vlade. Sa najveÄom koncentracijom rudara Bitcoina u Kini (2017.), kineska vlada veÄ ima znatnu potencijalnu prednost u stavljanju bitcoina u svoje rezerve.
SAD se ponosi svojim statusom nacije inovatora, sa Silicijskom dolinom kao krunom svoje ekonomije. Dosad, Silicijska dolina je dominirala konverzacijom usmjerenom prema regulaciji, i poziciji koju bi ona treba zauzeti prema Bitcoinu. No, bankovna industrija i federalna rezerva SAD-a (US Federal Reserve, Fed) napokon poÄinju uviÄati egzistencijalnu prijetnju koju Bitcoin predstavlja za ameriÄku monetarnu politiku, postankom globalne rezervne valute. Wall Street Journal, jedan od medijskih glasova federalne reserve, izdao je komentar o Bitcoinu kao prijetnji monetarnoj politici SAD-a:
"Postoji joĹĄ jedna opasnost, moĹžda i ozbiljnija iz perspektive centralnih banaka i regulatora: bitcoin moĹžda ne propadne. Ako je spekulativni Ĺžar u kriptovalutu samo prvi pokazatelj njezinog ĹĄireg koriĹĄtenja kao alternative dolaru, Bitcoin Äe svakako ugroziti monopol centralnih banaka nad novcem."
U narednim godinama, moĹžemo oÄekivati veliku borbu izmeÄu poduzetnika i inovatora u Silicijskoj dolini, koji Äe pokuĹĄavati Äuvati Bitcoin od drĹžavne kontrole s jedne strane, i bankovne industrije i centralnih banaka koje Äe uÄiniti sve ĹĄto mogu da bi regulirale Bitcoin kako bi sprijeÄile znatne promjene u svojoj industriji i moÄi izdavanja novca, s druge.
Prijelaz na medij razmjene
Monetarno dobro ne moĹže postati opÄe prihvaÄen medij razmjene (standardna ekonomska definicija za ânovacâ) prije nego je vrednovano od ĹĄirokog spektra ljudi; jednostavno, dobro koje nije vrednovano neÄe biti prihvaÄeno u razmjeni. Kroz proces generalnog rasta vrijednosti, i time postanka spremiĹĄta vrijednosti, monetarno dobro Äe brzo narasti u kupovnoj moÄi, i time stvoriti cijenu za koriĹĄtenje u razmjeni. Samo kada ta cijena rizika mijenjanja spremiĹĄta vrijednosti padne dovoljno nisko, moĹže dobro postati opÄe prihvaÄen medij razmjene.
Preciznije, monetarno dobro Äe biti prikladno kao medij razmjene samo kada je suma cijene rizika i transakcijske cijene u razmjeni manja nego u trgovini bez tog dobra.
U druĹĄtvu koje vrĹĄi robnu razmjenu, prijelaz spremiĹĄta vrijednosti u medij razmjene moĹže se dogoditi Äak i onda kada monetarno dobro raste u kupovnoj moÄi, zato ĹĄto su transakcijski troĹĄkovi robne razmjene iznimno visoki. U razvijenoj ekonomiji, u kojoj su troĹĄkovi razmjene niski, moguÄe je za mladu i rapidno rastuÄnu tehnologiju spremiĹĄta vrijednosti, poput Bitcoina, da se koristi kao medij razmjene, doduĹĄe na ograniÄen naÄin. Jedan primjer je ilegalno trĹžiĹĄte droge, gdje su kupci voljni Ĺžrtvovati oportunu cijenu Äuvanja bitcoina kako bi umanjili znatan rizik kupovine droge koristeÄi fiat novac.
Postoje meÄutim velike institucionalne barijere da novonastalo spremiĹĄte vrijednosti postane sveopÄe prihvaÄen medij razmjene u razvijenom druĹĄtvu. DrĹžave koriste oporezivanje kao moÄnu metodu zaĹĄtite svojeg suverenog novca protiv rivalskih monetarnih dobara. Ne samo da suvereni novac ima prednost konstantnog izvora potraĹžnje, zato ĹĄto je porez moguÄe platiti jedino u njemu, nego su i rivalska monetarna dobra oporezana pri svakoj razmjeni za vrijeme rastuÄe cijene. Ova metoda oporezivanja stvara znatan otpor koriĹĄtenju spremiĹĄta vrijednosti kao medija razmjene.
Ovakvo sabotiranje trĹžiĹĄnih monetarnih dobara nije nepremostiva barijera za njihovo prihvaÄanje kao opÄeg medija razmjene. Ako ljudi izgube vjeru u suvereni novac, njegova vrijednost moĹže rapidno propasti kroz proces zvan hiperinflacija. Kada suvereni novac prolazi kroz hiperinflaciju, njegova vrijednost propadne prvo u usporedbi sa najlikvidnijim dobrima u druĹĄtvu, kao ĹĄto je zlato ili stabilna strana valuta (ameriÄki dolar npr.), ako su ona dostupna. Kada nema likvidnih dobara ili ih ima premalo, novac u hiperinflaciji kolabira u usporedbi sa stvarnim dobrima, kao ĹĄto su nekretnine ili upotrebljiva roba. Arhetipska slika hiperinflacije je trgovina sa praznim policama - potroĹĄaÄi brzo bjeĹže iz propadajuÄe vrijednosti novca svoje nacije.
Nakon dovoljno vremena, kada je vjera potpuno uniĹĄtena za vrijeme hiperinflacije, suvereni novac viĹĄe nitko ne prihvaÄa, te se druĹĄtvo moĹže vratiti na robnu razmjenu, ili Äe doĹživjeti potpunu zamjenu monetarne jedinice za sredstvo razmjene. Primjer ovog procesa bila je zamjena zimbabveanskog dolara za ameriÄki dolar. Takva promjena suverenog novca za stranu valutu je dodatno oteĹžana relativnom oskudnoĹĄÄu strane valute i odsustvom stranih bankarskih institucija koje pruĹžaju likvidnost trĹžiĹĄtu.
Sposobnost lakog prenoĹĄenja bitcoina preko granica i odsustvo potrebe za bankarskim sustavom Äine Bitcoin idealnim monetarnim dobrom za one ljude koji pate pod hiperinflacijom. U nadolazeÄim godinama, kako fiat valute nastave svoj povijesni trend ka bezvrijednosti, Bitcoin Äe postati sve popularniji izbor za uĹĄteÄevine ljudi diljem svijeta. Kada je novac nacije napuĹĄten i zamijenjen Bitcoinom, Bitcoin Äe napraviti tranziciju iz spremiĹĄta vrijednosti u tom druĹĄtvu u opÄe prihvaÄeno sredstvo razmjene. Daniel Krawicz stvorio je termin âhiperbitcoinizacijaâ da bi opisao ovaj proces.
UÄestala pogreĹĄna shvaÄanja
VeÄina ovog Älanka usredotoÄila se na monetarnu prirodu Bitcoina. Sa tim temeljima moĹžemo adresirati neke od najÄeĹĄÄih nerazumijevanja u Bitcoinu.
Bitcoin je balon (bubble)
Bitcoin, kao sva trĹžiĹĄna monetarna dobra, posjeduje monetarnu premiju. Ona Äesto rezultira uobiÄajenom kritikom da je Bitcoin samo âbalon.â No, sva monetarna dobra imaju monetarnu premiju. Naprotiv, ta monetarna premija (cijena viĹĄa od one koju diktira potraĹžnja za dobrom kao korisnim) je upravo karakteristiÄna za sve oblike novca. Drugim rijeÄima, novac je uvijek i svuda balon. Paradoksalno, monetarno dobro je istovremeno balon i ispod vrijednosti ukoliko je u ranijim stadijima opÄeg prihvaÄanja kao novac.
Bitcoin je previĹĄe volatilan
Volatilnost cijene Bitcoina je funkcija njegovog nedavnog nastanka. U prvih nekoliko godina svojeg postojanja, Bitcoin se ponaĹĄao kao mala dionica, i svaki veliki kupac - kao npr. braÄa Winklevoss - mogao je uzrokovati veliki skok u njegovoj cijeni. No, kako su se prihvaÄenost i likvidnost poveÄavali kroz godine, volatilnost Bitcoina je srazmjerno smanjila. Kada Bitcoin postigne trĹžiĹĄnu kapitalizaciju (vrijednost) zlata, imat Äe sliÄnu volatilnost kao i zlato. Kako Bitcoin nastavi rasti, njegova volatilnost Äe se smanjiti do razine koja ga Äini prikladnim za ĹĄiroko koriĹĄtenje kao medij razmjene. Kao ĹĄto je prethodno reÄeno, monetizacija Bitcoina se odvija u seriji Gartner hype ciklusa. Volatilnost je najniĹža za vrijeme vrhunaca i dolina unutar ciklusa. Svaki hype ciklus ima niĹžu volatilnost od prethodnih, zato ĹĄto je likvidnost trĹžiĹĄta veÄa.
Cijene transakcija su previsoke
Novija kritika Bitcoin mreĹže je ta da ju je poveÄanje cijena prijenosa bitcoina uÄinilo neprikladnom za sustav plaÄanja. No, rast u cijenama transakcija je zdrav i oÄekivan. One su nuĹžne za plaÄanje bitcoin minera (rudara), koji osiguravaju mreĹžu validacijom transakcija. Rudare se plaÄa kroz cijene transakcija ili kroz blok-nagrade, koje su inflacijska subvencija od trane trenutnih vlasnika bitcoina.
S obzirom na Bitcoinovu fiksnu proizvodnju (monetarna politika koja ga Äini idealnim za spremanje vrijednosti), blok-nagrade Äe s vremenom nestati i mreĹžu Äe se u konaÄnici morati osiguravati kroz cijene transakcija. MreĹža sa âniskimâ cijenama transakcija je mreĹža sa slabom sigurnosti i osjetljiva na vanjsku intervenciju i cenzuru. Oni koji hvale niske cijene Bitcoinovih alternative zapravo niti ne znajuÄi opisuju slabosti tih takozvanih âalt-coina.â
PovrĹĄan temelj kritika Bitcoinovih âvisokihâ cijena transakcija je uvjerenje da bi Bitcoin trebao biti prvo sustav plaÄanja, i drugo spremiĹĄte vrijednosti. Kao ĹĄto smo vidjeli kroz povijest novca, ovo uvjerenje je naopako. Samo onda kada Bitcoin postane duboko ukorijenjeno spremiĹĄte novca moĹže biti prikladan kao sredstvo razmjene. Nadalje, kada oportunitetni troĹĄak razmjene bitcoina doÄe na razinu koja ga Äini prikladnim sredstvom razmjene, veÄina trgovine neÄe se odvijati na samoj Bitcoin mreĹži, nego na mreĹžama âdrugog slojaâ (second layer) koje Äe imati niĹže cijene transakcija. Takve mreĹže, poput Lightning mreĹže, sluĹže kao moderna verzija zaduĹžnica koje su koriĹĄtene za prijenos vlasniÄkih papira zlata u 19. stoljeÄu. Banke su koristile zaduĹžnice zato ĹĄto je prijenos samog metala bio daleko skuplji. Za razliku od takvih zaduĹžnica, Lightning mreĹža Äe omoguÄavati nisku cijenu prijenosa bitcoina bez potrebe za povjerenjem prema treÄoj strani, poput banaka. Razvoj Lightning mreĹže je tehnoloĹĄka inovacija od izuzetne vaĹžnosti u povijesti Bitcoina, i njezina vrijednost Äe postati oÄita u narednim godinama, kako je sve viĹĄe ljudi bude razvijalo i koristilo.
Konkurencija
PoĹĄto je Bitcoin softverski protokol otvorenog tipa (open-source), oduvijek je bilo moguÄe kopirati softver i imitirati mreĹžu. Kroz godine nastajali su mnogi imitatori, od identiÄnih kopija, kao Litecoin, do kompleksnijih varijanti kao ĹĄto je Ethereum, koje obeÄavaju arbitrarno kompleksne ugovorne mehanizme koristeÄi decentralizirani raÄunalni sustav. Äesta kritika Bitcoinu od strane ulagaÄa je ta da on ne moĹže zadrĹžati svoju vrijednost kada je vrlo lako stvoriti konkurente koji mogu lako i brzo u sebi imati najnovije inovacije i softverske funkcionalnosti.
GreĹĄka u ovom argumentu leĹži u manju takozvanog âmreĹžnog efektaâ (network effect), koji postoji u prvoj i dominantnoj tehnologiji u nekom podruÄju. MreĹžni efekt - velika vrijednost koriĹĄtenja Bitcoina samo zato ĹĄto je veÄ dominantan - je vaĹžno svojstvo samo po sebi. Za svaku tehnologiju koja posjeduje mreĹžni efekt, to je daleko najvaĹžnije svojstvo koje moĹže imati.
Za Bitcoin, mreĹžni efekt ukljuÄuje likvidnost njegovog trĹžiĹĄta, broj ljudi koji ga posjeduju, i zajednicu programera koji odrĹžavaju i unaprjeÄuju njegov softver i svjesnost u javnosti. Veliki ulagaÄi, ukljuÄujuÄi drĹžave, Äe uvijek prvo traĹžiti najlikvidnije trĹžiĹĄte, kako bi mogli uÄi i izaÄi iz trĹžiĹĄta brzo, i bez utjecanja na cijenu. Programeri Äe se pridruĹžiti dominantnoj programerskoj zajednici sa najboljim talentom, i time pojaÄati samu zajednicu. Svjesnost o brendu sama sebe pojaÄava, poĹĄto se nadobudni konkurenti Bitcoina uvijek spominju u kontekstu Bitcoina kao takvog.
RaskriĹžje na putu (fork)
Trend koji je postao popularan 2017. godine nije bio samo imitacija Bitcoinovog softvera, nego kopiranje potpune povijesti njegovih proĹĄlih transakcija (cijeli blockchain). Kopiranjem Bitcoinovog blockchaina do odreÄene toÄke/bloka i odvajanjem sljedeÄih blokova ka novoj mreĹži, u procesu znanom kao âforkingâ (odvajanje), Bitcoinovi konkurenti su uspjeli rijeĹĄiti problem distribuiranja svojeg tokena velikom broju korisnika.
NajznaÄajniji takav fork dogodio se 1. 8. 2017. godine, kada je nova mreĹža nazvana Bitcoin Cash (Bcash) stvorena. Vlasnik N koliÄine bitcoina prije 1.8.2017. bi onda posjedovao N bitcoina i N BCash tokena. Mala, ali vrlo glasna zajednica Bcash proponenata je neumorno pokuĹĄavala prisvojiti Bitcoinov brend i ime, imenujuÄi svoju novu mreĹžu Bitcoin Cast i pokuĹĄavajuÄi uvjeriti nove pridoĹĄlice u Bitcoin da je Bcash âpraviâ Bitcoin. Ti pokuĹĄaji su veÄinom propali, i taj neuspjeh se vidi u trĹžiĹĄnim kapitalizacijama dviju mreĹža. No, za nove ulagaÄe, i dalje postoji rizik da bi konkurent mogao kopirati Bitcoin i njegov blockchain i tako uspjeti u preuzimanju trĹžiĹĄne kapitalizacije, te postati de facto Bitcoin.
MoguÄe je uoÄiti vaĹžno pravilo gledajuÄi velike forkove u proĹĄlosti Bitcoin i Ethereum mreĹža. VeÄina trĹžiĹĄne kapitalizacije odvijat Äe se na mreĹži koja zadrĹži najviĹĄi stupanj talenta i aktivnosti u zajednici programera. Premda se na Bitcoin moĹže gledati kao na nov i mlad novac, on je takoÄer raÄunalna mreĹža koja poÄiva na softveru, kojeg se pak treba odrĹžavati i poboljĹĄavati. Kupovina tokena na mreĹži koja ima malo neiskusnih programera bilo bi kao kupovati kopiju Microsoft Windowsa na kojoj rade loĹĄiji programeri. Jasno je vidljivo iz povijesti forkova koji su se odvili 2017. godine da su najbolji raÄunalni i kriptografski struÄnjaci posveÄeni razvoju originalnog Bitcoina, a ne nekoj od rastuÄeg broja imitacija koje su se izrodile iz njega.
Stvarni rizici
Premda su uobiÄajene kritike upuÄene Bitconu od strane medija i ekonomske profesije krive i bazirane na netoÄnom shvaÄanju novca, postoje pravi i znaÄajni rizici kod ulaganja u Bitcoin. Bilo bi mudro za novog Bitcoin ulagaÄa da shvati ove rizike prije potencijalnog ulaganja.
Rizik protokola
Bitcoin protokol i kriptografski sastavni dijelovi na kojima je sagraÄen potencijalno imaju dosad nepronaÄenu greĹĄku u svom dizajnu, ili mogu postati nesigurni razvojem kvantnih raÄunala. Ako se pronaÄe greĹĄka u protokolu, ili neka nova metoda raÄunarstva uÄini moguÄim probijanje kriptografskih temelja Bitcoina, vjera u Bitcoin biti Äe znatno naruĹĄena. Rizik protokola bio je najviĹĄi u ranim godinama razvoja Bitcoina, kada je joĹĄ uvijek bilo nejasno, Äak i iskusnim kriptografima, je li Satoshi Nakamoto zaista rijeĹĄio problem bizantskih generala (Byzantine Generalsâ Problem). Brige oko ozbiljnih greĹĄaka u Bitcoin protokolu nestale su kroz godine, no uzevĹĄi u obzir njegovu tehnoloĹĄku prirodu, rizik protokola Äe uvijek ostati u Bitcoinu, makar i kao izuzetak.
Propadanje mjenjaÄnica
Time ĹĄto je decentraliziran, Bitcoin je pokazao znaÄajnu otpornost, suoÄen sa brojnim pokuĹĄajima raznih vlada da ga reguliraju ili uniĹĄte. No, mjenjaÄnice koje trguju bitcoinima za fiat valute su centralizirani entiteti i podloĹžne regulacijama i zatvaranju. Bez mjenjaÄnica i volje bankara da s njima posluju, proces monetizacije Bitcoina bio bi ozbiljno usporen, ako ne i potpuno zaustavljen. Iako postoje alternativni izvori likvidnosti za Bitcoin, poput âover-the-counterâ brokera i decentraliziranih trĹžiĹĄta za kupovinu i prodaju bitcoina, kritiÄan proces otkrivanja i definiranja cijene se odvija na najlikvidnijim mjenjaÄnicama, koje su sve centralizirane.
Jedan od naÄina za umanjivanje rizika gaĹĄenja mjenjaÄnica je geografska arbitraĹža. Binance, jedna od velikih mjenjaÄnica iz Kine, preselila se u Japan nakon ĹĄto joj je kineska vlada zabranila operiranje u Kini. Vlade su takoÄer oprezne kako ne bi uguĹĄile novu industriju koja je potencijalno znaÄajna kao i internet, i time predale nevjerojatnu konkurentnu vrijednost drugim nacijama.
Samo kroz koordinirano globalno ukidanje Bitcoin mjenjaÄnica bi proces monetizacije mogao biti zaustavljen. Trenutno smo u utrci; Bitcoin raste i postaje sve raĹĄireniji, i doÄi Äe do trenutka kada bi potpuno ukidanje mjenjaÄnica postalo politiÄki neizvedivo - kao i gaĹĄenje interneta. MoguÄnost takvog ukidanja je joĹĄ uvijek realna, i valja je uzeti u obzir pri ulaganju u Bitcoin. Kao ĹĄto je gore objaĹĄnjeno, suverene vlade se polako bude i uviÄaju prijetnju koju predstavlja neovisna digitalna valuta otporna na cenzuru, za njihovu monetarnu politiku. Otvoreno je pitanje hoÄe li iĹĄta poduzeti da odgovore ovoj prijetnji prije nego Bitcoin postane toliko utvrÄen i raĹĄiren da politiÄka akcija postane nemoÄna i ne-efektivna.
Zamjenjivost
Otvorena i transparentna priroda Bitcoin blockchaina omoguÄava drĹžavama da proglase specifiÄne bitcoine âokaljanimaâ zbog njihovog koriĹĄtenja u odreÄenim aktivnostima. Premda Bitcoin, na protokolarnoj razini, ne diskriminira transakcije na ikoji naÄin, âokaljaniâ bitcoini bi mogli postati bezvrijedni ako bi ih regulacije proglasile ilegalnima i neprihvatljivima za mjenjaÄnice ili trgovce. Bitcoin bi tada izgubio jedno od kritiÄnih svojstava monetarnog dobra: zamjenjivost.
Da bi se ovaj problem rijeĹĄio i umanjio, biti Äe potrebna poboljĹĄanja na razini protokola kako bi se poboljĹĄala privatnost transakcija. Premda postoji napredak u ovom smjeru, prvi put primjenjen u digitalnim valutama kao ĹĄto su Monero i Zcash, potrebno je napraviti znaÄajne tehnoloĹĄke kompromise izmeÄu efikasnosti i kompleksnosti Bitcoina i njegove privatnosti. Pitanje ostaje otvoreno je li moguÄe dodati nova svojstva privatnosti na Bitcoin, na naÄin koji neÄe kompromitirati njegovu korisnost kao novca.
ZakljuÄak
Bitcoin je novonastali novac koji je u procesu transformacije iz sakupljaÄkog dobra u spremiĹĄte vrijednosti. Kao neovisno monetarno dobro, moguÄe je da Äe u buduÄnosti postati globalan novac, sliÄno kao zlato za vrijeme 19. stoljeÄa. PrihvaÄanje Bitcoina kao globalnog novca je upravo taj optimistiÄan scenarij za Bitcoin, kojeg je artikulirao Satoshi Nakamoto joĹĄ 2010. godine u email razmjeni sa Mikeom Hearnom:
"Ako zamisliĹĄ da se koristi u nekom dijelu svjetske trgovine, i da Äe postojati samo 21 milijun bitcoina za cijeli svijet, vrijednost po jedinici Äe biti znatno veÄa".
Ovaj scenarij je joĹĄ snaĹžnije definirao briljantni kriptograf Hal Finney, koji je ujedno primio i prve bitcoine od Nakamotoa, ubrzo nakon najave prvog funkcionalnog Bitcoin softvera:
"Zamislimo da Bitcoin bude uspjeĹĄan i postane dominantan sustav plaÄanja diljem svijeta. U tom sluÄaju Äe ukupna vrijednost valute biti jednaka ukupnoj vrijednosti svog bogatstva svijeta. DanaĹĄnje procjene ukupnog svjetskog bogatska kuÄanstava koje sam pronaĹĄao borave negdje izmeÄu 100 i 300 trilijuna dolara. Sa 20 milijuna bitcoina, svaki bi onda vrijedio oko 10 milijuna dolara."
Äak i da Bitcoin ne postane u cijelost globalan novac, nego da se samo natjeÄe sa zlatom kao neovisno spremiĹĄte vrijednosti, i dalje je masivno podcijenjen. Mapiranje trĹžiĹĄne kapitalizacije postojeÄe koliÄine izrudarenog zlata (oko 8 trilijuna dolara) na maksimalnu dostupnost Bitcoina od 21 milijun, daje vrijednost od otprilike 380,000 dolara po bitcoinu. Kao ĹĄto smo vidjeli u prethodnom tekstu, svojstva koja omoguÄavaju monetarnom dobru da bude prikladno spremiĹĄte vrijednosti, Äine Bitcoin superiornijim zlatu u svakom pogledu osim trajanja povijesti. No, kako vrijeme prolazi i Lindy efekt postane jaÄi, dosadaĹĄnja povijest Äe prestati biti prednost zlata. Samim time, nije nerazumno oÄekivati da Äe Bitcoin narasti do, a moĹžda i preko, ukupne cijene zlata na trĹžiĹĄtvu do 2030. Opaska ovoj tezi je Äinjenica da veliki postotak vrijednosti zlata dolazi od toga ĹĄto ga centralne banke Äuvaju kao spremiĹĄte vrijednosti. Da bi Bitcoin doĹĄao do te razine, odreÄena koliÄina suverenih drĹžava Äe trebati sudjelovati. HoÄe li zapadnjaÄke demokracije sudjelovati u vlasniĹĄtvu Bitcoina je nepoznato. Vjerojatnije je, naĹžalost, da Äe prve nacije u Bitcoin trĹžiĹĄtu biti sitne diktature i kleptokracije.
Ako niti jedna drĹžava ne bude sudjelovala u Bitcoin trĹžiĹĄtu, optimistiÄna teza i dalje postoji. Kao nevisno spremiĹĄte vrijednosti u rukama individualnih i institucionalnih ulagaÄa, Bitcoin je i dalje vrlo rano u svojoj âkrivulji prihvaÄenostiâ (adoption curve); tzv. ârana veÄinaâ ulaze na trĹžiĹĄte sada, dok Äe ostali uÄi tek nekoliko godina kasnije. Sa ĹĄirim sudjelovanjem individualnih i institucionalnih ulagaÄa, cijena po bitcoinu izmeÄu 100,000 i 200,000 dolara je sasvim moguÄa.
Posjedovanje bitcoina je jedna od malobrojnih asimetriÄnih novÄanih strategija dostupnih svakome na svijetu. Poput âcallâ opcija, negativan rizik ulagaÄa je ograniÄen na 1x, dok potencijalna dobit i dalje iznosi 100x ili viĹĄe. Bitcoin je prvi istinski globalan balon Äija je veliÄina ograniÄena samo potraĹžnjom i Ĺželjom graÄana svijeta da zaĹĄtite svoju uĹĄteÄevinu od raznovrsnih ekonomskih malverzacija vlade. Bitcoin je ustao kao feniks iz pepela globalne financijske krize 2008. godine - katastrofe kojoj su prethodile odluke centralnih banaka poput ameriÄke Federalne rezerve (Federal Reserve).
Onkraj samo financijske teze za Bitcoin, njegov rast i uspjeh kao neovisno spremiĹĄte vrijednosti imat Äe duboke geopolitiÄke posljedice. Globalna, ne-inflacijska valuta Äe prisiliti suverene drĹžave da promjene svoje primarne mehanizme financiranja od inflacije u izravno oporezivanje; koje je daleko manje politiÄki popularno. DrĹžave Äe se smanjivati proporcionalno politiÄkoj boli koju im nanese oporezivanje kao jedini naÄin financiranja. Nadalje, globalna trgovina vrĹĄiti Äe se na naÄin koji zadovoljava aspiraciju Charlesa de Gaullea, da nijedna nacija ne bi smjela imati privilegiju nad ikojom drugom:
"Smatramo da je potrebno da se uspostavi meÄunarodna trgovina, kao ĹĄto je bio sluÄaj prije velikih nesreÄa koje su zadesile svijet, na neosporivoj monetarnoj bazi, koja ne nosi na sebi oznaku ijedne drĹžave."
Za 50 godina, ta monetarna baza biti Äe Bitcoin.
-
@ 7f6db517:a4931eda
2025-05-28 19:01:57People forget Bear Stearns failed March 2008 - months of denial followed before the public realized how bad the situation was under the surface.
Similar happening now but much larger scale. They did not fix fundamental issues after 2008 - everything is more fragile.
The Fed preemptively bailed out every bank with their BTFP program and First Republic Bank still failed. The second largest bank failure in history.
There will be more failures. There will be more bailouts. Depositors will be "protected" by socializing losses across everyone.
Our President and mainstream financial pundits are currently pretending the banking crisis is over while most banks remain insolvent. There are going to be many more bank failures as this ponzi system unravels.
Unlike 2008, we have the ability to opt out of these broken and corrupt institutions by using bitcoin. Bitcoin held in self custody is unique in its lack of counterparty risk - you do not have to trust a bank or other centralized entity to hold it for you. Bitcoin is also incredibly difficult to change by design since it is not controlled by an individual, company, or government - the supply of dollars will inevitably be inflated to bailout these failing banks but bitcoin supply will remain unchanged. I do not need to convince you that bitcoin provides value - these next few years will convince millions.
If you found this post helpful support my work with bitcoin.
-
@ 8bad92c3:ca714aa5
2025-05-28 19:01:49Marty's Bent
via Kevin McKernan
There's been a lot of discussion this week about Casey Means being nominated for Surgeon General of the United States and a broader overarching conversation about the effectiveness of MAHA since the inauguration and how effective it may or may not be moving forward. Many would say that President Trump won re-election due to Robert F. Kennedy Jr. and Nicole Shanahan deciding to reach across the aisle and join the Trump ticket, bringing with them the MAHA Moms, who are very focused on reorienting the healthcare system in the United States with a strong focus on the childhood vaccine schedule.
I'm not going to lie, this is something I'm passionate about as well, particularly after having many conversations over the years with doctors like Kevin McKernan, Dr. Jack Kruse, Dr. Mary Talley Bowden, Dr. Brooke Miller, Dr. Peter McCullough and others about the dangers of the COVID mRNA vaccines. As it stands today, I think this is the biggest elephant in the room in the world of healthcare. If you look at the data, particularly disability claims, life insurance claims, life expectancy, miscarriage rates, fertility issues and rates of turbo cancer around the world since the COVID vaccine was introduced in 2021, it seems pretty clear that there is harm being done to many of the people who have taken them.
The risk-reward ratio of the vaccines seems to be incredibly skewed towards risk over reward and children - who have proven to be least susceptible to COVID - are expected to get three COVID shots in the first year of their life if their parents follow the vaccine schedule. For some reason or another it seems that Robert F. Kennedy Jr. has shied away from this topic after becoming the head of Health and Human Services within the Trump administration. This is after a multi-year campaign during which getting the vaccines removed from the market war a core part of his platform messaging.
I'm still holding out hope that sanity will prevail. The COVID mRNA vaccines will be taken off the market in a serious conversation about the crimes against humanity that unfolded during the COVID years will take place. However, we cannot depend on that outcome. We must build with the assumption in mind that that outcome may never materialize. This leads to identifying where the incentives within the system are misconstrued. One area where I think it's pretty safe to say that the incentives are misaligned is the fact that 95% of doctors work for and answer to a corporation driven by their bottom line. Instead of listening to their patients and truly caring about the outcome of each individual, doctors forced to think about the monetary outcome of the corporation they work for first.
The most pernicious way in which these misaligned incentives emerge is the way in which the hospital systems and physicians are monetarily incentivized by big pharma companies to push the COVID vaccine and other vaccines on their patients. It is important to acknowledge that we cannot be dependent on a system designed in this way to change from within. Instead, we must build a new incentive system and market structure. And obviously, if you're reading this newsletter, you know that I believe that bitcoin will play a pivotal role in realigning incentives across every industry. Healthcare just being one of them.
Bitcoiners have identified the need to become sovereign in our monetary matters, it probably makes sense to become sovereign when it comes to our healthcare as well. This means finding doctors who operate outside the corporate controlled system and are able to offer services that align incentives with the end patient. My family utilizes a combination of CrowdHealth and a private care physician to align incentives. We've even utilized a private care physician who allowed us to pay in Bitcoin for her services for a number of years. I think this is the model. Doctors accepting hard censorship resistant money for the healthcare and advice they provide. Instead of working for a corporation looking to push pharmaceutical products on their patients so they can bolster their bottom line, work directly with patients who will pay in bitcoin, which will appreciate in value over time.
I had a lengthy discussion with Dr. Jack Kruse on the podcast earlier today discussing these topic and more. It will be released on Thursday and I highly recommend you freaks check it out once it is published. Make sure you subscribe so you don't miss it.
How the "Exorbitant Privilege" of the Dollar is Undermining Our Manufacturing Base
In my conversation with Lyn Alden, we explored America's fundamental economic contradiction. As Lyn expertly explained, maintaining the dollar's reserve currency status while attempting to reshore manufacturing presents a near-impossible challenge - what economists call Triffin's Dilemma. The world's appetite for dollars gives Americans tremendous purchasing power but simultaneously hollows out our industrial base. The overvalued dollar makes our exports less competitive, especially for lower-margin manufacturing, while our imports remain artificially strong.
"Having the reserve currency does come with a bunch of benefits, historically called an exorbitant privilege, but then it has certain costs to maintain it." - Lyn Alden
This dilemma forces America to run persistent trade deficits, as this is how dollars flow to the world. For over four decades, these deficits have accumulated, creating massive economic imbalances that can't be quickly reversed. The Trump administration's attempts to address this through tariffs showcase how difficult rebalancing has become. As Lyn warned, even if we successfully pivot toward reshoring manufacturing, we'll face difficult trade-offs: potentially giving up some reserve currency benefits to rebuild our industrial foundation. This isn't just economic theory - it's the restructuring challenge that will define America's economic future.
Check out the full podcast here for more on China's manufacturing dominance, the role of Bitcoin in monetary transitions, and energy production as the foundation for future industrial power.
Headlines of the Day
Coinbase to replace Discover in S&P 500 on May 19 - via X
Mallers promises no rehypothecation in Strike Bitcoin loans - via X
Get our new STACK SATS hat - via tftcmerch.io
Missouri passes HB 594, eliminates Bitcoin capital gains tax - via X
The 2025 Bitcoin Policy Summit is set for June 25thâand it couldnât come at a more important time. The Bitcoin industry is at a pivotal moment in Washington, with initiatives like the Strategic Bitcoin Reserve gaining rapid traction. Whether youâre a builder, advocate, academic, or policymakerâwe want you at the table. Join us in DC to help define the future of freedom, money & innovation in the 21st century.
Ten31, the largest bitcoin-focused investor, has deployed $150M across 30+ companies through three funds. I am a Managing Partner at Ten31 and am very proud of the work we are doing. Learn more at ten31.vc/invest.
Final thought...
The 100+ degree days have returned to Austin, TX. Not mad about it... yet.
Get this newsletter sent to your inbox daily: https://www.tftc.io/bitcoin-brief/
Subscribe to our YouTube channels and follow us on Nostr and X:
@media screen and (max-width: 480px) { .mobile-padding { padding: 10px 0 !important; } .social-container { width: 100% !important; max-width: 260px !important; } .social-icon { padding: 0 !important; } .social-icon img { height: 32px !important; width: 32px !important; } .icon-cell { padding: 0 4px !important; } } .mj-column-per-33-333333333333336 { width: 25% !important; max-width: 25%; } .moz-text-html .mj-column-per-33-333333333333336 { width: 25% !important; max-width: 25%; } /* Helps with rendering in various email clients */ body { margin: 0 !important; padding: 0 !important; -webkit-text-size-adjust: 100% !important; -ms-text-size-adjust: 100% !important; } img { -ms-interpolation-mode: bicubic; } /* Prevents Gmail from changing the text color in email threads */ .im { color: inherit !important; }
-
@ 8bad92c3:ca714aa5
2025-05-28 19:01:49Marty's Bent
Last week we covered the bombshell developments in the Samourai Wallet case. For those who didn't read that, last Monday the world was made aware of the fact that the SDNY was explicitly told by FinCEN that the federal regulator did not believe that Samourai Wallet was a money services business six months before arresting the co-founders of Samourai Wallet for conspiracy to launder money and illegally operating a money services business. This was an obvious overstep by the SDNY that many believed would be quickly alleviated, especially considering the fact that the Trump administration via the Department of Justice has made it clear that they do not intend to rule via prosecution.
It seems that this is not the case as the SDNY responded to a letter sent from the defense to dismiss the case by stating that they fully plan to move forward. Stating that they only sought the recommendations of FinCEN employees and did not believe that those employees' comments were indicative of FinCEN's overall views on this particular case. It's a pretty egregious abuse of power by the SDNY. I'm not sure if the particular lawyers and judges within the Southern District of New York are very passionate about preventing the use of self-custody bitcoin and products that enable bitcoiners to transact privately, or if they're simply participating in a broader meta war with the Trump administration - who has made it clear to federal judges across the country that last Fall's election will have consequences, mainly that the Executive Branch will try to effectuate the policies that President Trump campaigned on by any legal means necessary - and Samouari Wallet is simply in the middle of that meta war.
However, one thing is pretty clear to me, this is an egregious overstep of power. The interpretation of that law, as has been laid out and confirmed by FinCEN over the last decade, is pretty clear; you cannot be a money services business if you do not control the funds that people are sending to each other, which is definitely the case with Samourai Wallet. People downloaded Samourai Wallet, spun up their own private-public key pairs and initiated transactions themselves. Samourai never custodied funds or initiated transactions on behalf of their users. This is very cut and dry. Straight to the point. It should be something that anyone with more than two brain cells is able to discern pretty quickly.
It is imperative that anybody in the industry who cares about being able to hold bitcoin in self-custody, to mine bitcoin, and to send bitcoin in a peer-to-peer fashion makes some noise around this case. None of the current administration's attempts to foster innovation around bitcoin in the United States will matter if the wrong precedent is set in this case. If the SDNY is successful in prosecuting Samourai Wallet, it will mean that anybody holding Bitcoin in self-custody, running a bitcoin fold node or mining bitcoin will have to KYC all of their users and counterparts lest they be labeled a money services business that is breaking laws stemming from the Bank Secrecy Act. This will effectively make building a self-custody bitcoin wallet, running a node, or mining bitcoin in tillegal in the United States. The ability to comply with the rules that would be unleashed if this Samourai case goes the wrong way, are such that it will effectively destroy the industry overnight.
It is yet to be seen whether or not the Department of Justice will step in to publicly flog the SDNY and force them to stop pursuing this case. This is the only likely way that the case will go away at this point, so it is very important that bitcoiners who care about being able to self-custody bitcoin, mine bitcoin, or send bitcoin in a peer-to-peer fashion in the United States make it clear to the current administration and any local politicians that this is an issue that you care deeply about. If we are too complacent, there is a chance that the SDNY could completely annihilate the bitcoin industry in America despite of all of the positive momentum we're seeing from all angles at the moment.
Bitcoin Adoption by Power Companies: The Next Frontier
In my recent conversation with Andrew Myers from Satoshi Energy, he shared their ambitious mission to "enable every electric power company to use bitcoin by block 1,050,000" â roughly three years from now. This strategic imperative isn't just about creating new Bitcoin users; it's about sovereignty. Andrew emphasized that getting Bitcoin into the hands of energy companies who value self-sovereignty creates a more balanced future economic landscape. The excitement was palpable as he described how several energy companies are already moving beyond simply selling power to Bitcoin miners and are beginning to invest in mining operations themselves.
"You have global commodity companies being like, 'Oh, this is another commodity â we want to invest in this, we want to own this,'" - Andrew Myers
Perhaps most fascinating was Andrew's revelation about major energy companies in Texas developing Bitcoin collateral products for power contracts â a practical application that could revolutionize how energy transactions are settled. As energy companies continue embracing Bitcoin for both operations and collateral, we're witnessing the early stages of a profound shift in how critical infrastructure interfaces with sound money. The implications for both sectors could be transformative.
Check out the full podcast here for more on remote viewing, Nikola Tesla's predictions, and the convergence of Bitcoin and AI technology. We cover everything from humanoid robots to the energy demands of next-generation computing.
Headlines of the Day
Steak n Shake to Accept Bitcoin at All Locations May 16 - via X
Facebook Plans Crypto Wallets for 3B Users, Bitcoin Impact Looms - via X
Trump Urges Americans to Buy Stocks for Economic Boom - via X
UK Drops Tariffs, U.S. Farmers Set to Reap Major Benefits - via X
Looking for the perfect video to push the smartest person you know from zero to one on bitcoin? Bitcoin, Not Crypto is a three-part master class from Parker Lewis and Dhruv Bansal that cuts through the noiseâcovering why 21 million was the key technical simplification that made bitcoin possible, why blockchains donât create decentralization, and why everything else will be built on bitcoin.
Ten31, the largest bitcoin-focused investor, has deployed $150M across 30+ companies through three funds. I am a Managing Partner at Ten31 and am very proud of the work we are doing. Learn more at ten31.vc/invest.
Final thought...
Happy belated Mother's Day to all the moms out there.
Get this newsletter sent to your inbox daily: https://www.tftc.io/bitcoin-brief/
Subscribe to our YouTube channels and follow us on Nostr and X:
@media screen and (max-width: 480px) { .mobile-padding { padding: 10px 0 !important; } .social-container { width: 100% !important; max-width: 260px !important; } .social-icon { padding: 0 !important; } .social-icon img { height: 32px !important; width: 32px !important; } .icon-cell { padding: 0 4px !important; } } .mj-column-per-33-333333333333336 { width: 25% !important; max-width: 25%; } .moz-text-html .mj-column-per-33-333333333333336 { width: 25% !important; max-width: 25%; } /* Helps with rendering in various email clients */ body { margin: 0 !important; padding: 0 !important; -webkit-text-size-adjust: 100% !important; -ms-text-size-adjust: 100% !important; } img { -ms-interpolation-mode: bicubic; } /* Prevents Gmail from changing the text color in email threads */ .im { color: inherit !important; }
-
@ 8bad92c3:ca714aa5
2025-05-28 19:01:46Key Takeaways
In this episode of TFTC, energy economist Anas Alhajji outlines a profound shift in U.S. foreign policy under Trumpâaway from military intervention and toward transactional diplomacy focused on trade, reconstruction, and curbing Chinese and Russian influence in the Middle East. He highlights Trumpâs quiet outreach to Syria as emblematic of the U.S.'s strategic flexibility in legitimizing former adversaries when economically beneficial. Alhajji dismisses BRICS as a fractured bloc incapable of rivaling the U.S.-led order and insists the dollar and petrodollar remain dominant. On energy, he warns that despite favorable fundamentals, prices are suppressed by political confusion, underinvestment, and an aging power grid ill-prepared for the AI and urbanization boom. He also contends that Iran is stalling negotiations to buy time for nuclear advancement and that any deal will be superficial. Finally, Alhajji debunks the myth of Trump being pro-oil, noting his long-standing hostility toward the industry and explaining why a repeat of his past energy boom is implausible given todayâs financial and structural constraints.
Best Quotes
- âBRICS is a paper tiger. Everything about BRICS is what China doesâand thatâs it.â
- âThe dollar is here to stay. The petrodollar is here to stay. End of story.â
- âTrump hates the oil industry. He always classified it as an enemy.â
- âEnergy projects are 30- to 40-year investments, but politicians think in 4-year cycles. Thatâs where the disconnect lies.â
- âPeople think shale will boom again. It wonât. The model changed from âdrill baby drillâ to âcontrol baby control.ââ
- âThe real story of Trumpâs trip wasnât about politicsâit was investment, investment, investment.â
- âWithout massive investment in the grid and gas turbines, blackouts will become the normâeven in rich countries like Kuwait.â
- âIran and China have perfected the game of oil exports. Sanctions are just theater at this point.â
Conclusion
Anas Alhajjiâs conclusion challenges conventional narratives, arguing that global power is shifting from military dominance to economic leverage, infrastructure investment, and energy control. He presents a nuanced view of U.S. foreign policy under Trump, emphasizing the strategic importance of trade and reconstruction over regime change. As energy demand soars and geopolitical risks mount, Alhajji warns that the real dangers lie not in foreign adversaries, but in policy confusion, infrastructural lag, and complacencyâmaking this episode a crucial listen for anyone seeking to understand the high-stakes intersection of energy, economics, and diplomacy.
Timestamps
0:00 - Intro
0:48 - Syria and US diplomacy in Middle East
12:50 - Trump in the Middle East
18:12 - Fold & Bitkey
19:48 - Iran - Nuclear program and PR
33:53 - Unchained
34:22 - Crude markets, trade war and US debt
54:28 - Trump's energy stance
1:05:46 - Energy sector challanges
1:14:44 - Policy recommendations
1:21:18 - AI and bitcoinTranscript
(00:00) oil prices market fundamentals support higher price than where we are today. But because of this confusion, everyone is scared of low economic growth and that is a serious problem. The US media ignored part of Trump's speech when he said we are not about nation building and they refer to Afghanistan and Iraq.
(00:15) Look at them. This is a criticism of George W. Bush. We have groups that are talking about the demise of the dollar, the rise of bricks. Bricks is a paper tiger. Everything about bricks is what China does and that's it. The dollar is here to stay and the petro dollar is here to stay.
(00:31) The perception is that the Trump administration is cold but the reality Trump hates the oil [Music] indust. How are you? Very good. Very good. Thank you. As you were telling me, you've been a bit sleepd deprived this week trying to keep up with what's going on. Oh, absolutely. I mean, Trump keeps us on our toes uh all the time.
(01:06) In fact, I plan certain things for the weekend and Trump will say something or he will do something and all of a sudden we get busy again. Uh so clients are not going to wait for you until you finish your work. Basically, they want to know what's going on. So what is going on? What what how profound were the events in the Middle East? These are very uh very profound changes basically because it is very clear that if you look at the last 15 years uh and you look at the growth uh in the Middle East, you look at the growth of Saudi Arabia and uh the
(01:41) role of Turkey for example in the region uh it just just amazing be beyond any uh any thoughts. Uh in fact both of them Turkey and Saudi Arabia are part of the G20. Uh so they have economic influence and they have political influence. And of course the icing on the cake for those who are familiar with the region is to recognize the Syrian government and meet with the Syrian uh president.
(02:11) Uh this is a major a major change in economics and politics uh of the Middle East. Let's touch on that Syria uh topic for a while because I think a lot of people here in the United States were a bit shocked at how sort of welcoming President Trump was towards the new Syrian president considering the fact that uh he was considered an enemy not too long ago here in the United States.
(02:42) What first of all it's a fact of life for those who would like to check the history of politics. There were many people around the world who were classified or they were on the terrorism list and then they became friends of the United States or they were became heroes. I mean Nelson Mandela is one of them. You look at Latin America, there are presidents in Latin America who were uh the enemy of the United States and then they became uh uh cooperative with the United States and the United States recognized their governments and the result of their uh elections. Uh so
(03:15) we've seen this historically uh several uh several times around the world and as they say freedom fighters for some basically are the enemies and the terrorists for for others etc. So uh what we've seen that's why the the visit is very important that the recognition of this government is very important. uh the fact on the ground that uh the president of Syria had the power on the ground uh he had the the the people on the ground and he had the control on the ground and whatever he's been he's been doing since he came into power until now
(03:52) he done all the right steps u and people loved him I mean everyone who went to Syria whether the Syrians who left Syria 40 years ago or uh the visitors who are coming to Syria, they will tell you, "We have never seen the Syrian people as happy as we've seen them today, despite the fact that they they live in misery.
(04:17) They don't have um 8 million people without housing. Uh there is barely any electricity in most of the country. There is no internet. There is barely any food. The uh inflation is rampant, etc. But people are happy because they lived in fear for a very long time. And uh the steps they have taken. For example, the uh ministers in the previous government uh are still there and they are still in the housing of the government.
(04:49) They still have the drivers. They still have the cars from the previous government. They still have it until today. So uh they they were classified as enemies before. But all of a sudden now you have a new government that is uh accepting them. Uh so we we see some changes on the ground that are positive and we'll see how these things will go given that the area around them basically has been unstable for a very long time.
(05:17) how because I don't the the news when I was actually it was surreal for me because my first trip to the Middle East was last December when it was literally f flying over Syria to Abu Dhabi when uh um Assad was getting thrown out and it was pretty surreal to be in that region of the world.
(05:43) How as it pertains to like religious minorities within Syria moving forward is there protractions protections there? Um well let me just uh I want to emphasize one point that is very important. What did the interest of Turkey, Saudi Arabia and the United States in Syria if remember Syria was controlled by Iran and was controlled by the Russians.
(06:09) So in a sense it becomes uh kind of an imperative that taking it away from Iran and Russia and not bringing Iran or Russia back is extremely important. Now the Russians are still there and they have their own base but at least they are not bombing the Syrians and not killing them anymore. But the idea here is taking Syria out of Iran and Russia and probably later on if they kick the Russians out, Russians will not have access to the Mediterranean.
(06:37) Uh so there is an interest uh of all parties basically to take Russia out of Iran and um out of uh Syria regardless the country is uh devastated and it creates massive opportunities for US companies on all levels and uh we've seen a contract uh done recently with you mentioned Abu Dhabi uh uh a contract uh uh with the UA a basically to revamp all the Syrian ports and work on the Syrian ports.
(07:13) Uh so such contracts basically uh when you have a country that has nothing and it's completely devastated the whole infrastructure is devastated. Who is going to build it? If the uh what the Chinese, the Russians, so who who are going to build it? So, uh I think there is a a big room for US companies and others basically to come in and uh literally help on one side and make money on the other.
(07:38) Yeah, I think that that's what I'm trying to discern. What was this convoy from the United States to the Middle East this week signali -
@ cae03c48:2a7d6671
2025-05-28 19:00:53Bitcoin Magazine
Cowbolt Announces Their Mission to Make Bitcoin Familiar to EverybodyToday at the Bitcoin Conference in Las Vegas, Cowbolt, an app that lets you split expense payments and settle in bitcoin, will launch their mission: turn peer-to-peer payments into a Bitcoin onramp, starting with family and friends.
Cowbolt will let their clients split costs and settle instantly using Bitcoin and USDT, with no middlemen, no bank friction and with self-custody. They will try to convert everyday transactions into Bitcoin adoption.Â
âWe believe the most powerful onramp to Bitcoin isnât an exchange â itâs people,â said the co-founder of Cowbolt Daniel EkstrĂśm. âThatâs why we built Cowbolt. For friends, not hedge funds.â
What Cowbolt will bring to the table:
- Split and settle.
- Keep your keys.
- Fast and trusted.
- Works across borders.
The app is already being used for remittances, group travel, and day-to-day payments. Itâs designed to be like a modern fintech app and will be available for iOS and Android.Â
âBuilding Airbnb taught me that when design is simple and gets out of the way, people do amazing things,â stated the ex-Creative Director at Airbnb & co-founder Cowbolt Tony HĂśgqvist. âThatâs the point here too. Not to store bitcoin in an ETF, but to use it between people. Effortlessly. Among teams, friends, families â every day.â
This post Cowbolt Announces Their Mission to Make Bitcoin Familiar to Everybody first appeared on Bitcoin Magazine and is written by Oscar Zarraga Perez.
-
@ 26769dac:498e333b
2025-05-28 18:56:30I am here too\ In the same space like you
In the same situation I'm in\ It's a matter of positioning
I cannot leave this place I'm in\ It was brought about\ By what's been happening
So please don't look at me\ For what I can or cannot do for you\ But look at what is happening for me\ And what is happening for you
Let's communicate\ Not orchestrate
Because there's something I wish to do\ And there's a place I wish to go to
And I'm sure that there is too\ In your heart a fire\ Known by only you
So let us listen, look and see\ For what's true for you\ And what's true for me
That we may act upon what's here\ In order for us both to take a step\ In the direction we wish to steer
-
@ cae03c48:2a7d6671
2025-05-28 18:01:12Bitcoin Magazine
White House Executive Director Bo Hines Declares U.S. The Future Global Crypto SuperpowerIn a session at the Bitcoin 2025 Conference this morning titled â_Making America the Global Bitcoin Superpowerâ_, Bo Hines, White House Executive Director, Tyler Williams, from the US Treasury Department, and moderator Miles Jennings made one thing clear: the United States is going all-in on Bitcoinâand fast.Â
JUST IN:
President Trump's Executive Director said "Bitcoin is the golden standard."
"We're not gonna sell any Bitcoin that we possible have in the US government, period."
pic.twitter.com/F6Dv2nUk9b
â Bitcoin Magazine (@BitcoinMagazine) May 27, 2025
âWe are well on our way to becoming the bitcoin superpower of the world,â said Bo Hines. âThis is something that is not partisan. This is a revolution in our financial system.âÂ
Moderator Miles Jennings pointed to key regulatory steps currently in motion. âIf the bill becomes law (and I hope it does) we will have quite an active role. The connective tissue between the legacy financial system and bitcoin, stablecoins, and everything else will really be paved with stablecoin legislation,â Jennings said.
Hines emphasized that, âUpdating the payment rails is necessary and we are well on our way to achieving that.â He also noted that upcoming market structure legislation will define how intermediaries like exchanges and brokers are regulated and how digital assets are classifiedâeither as securities or commodities.Â
âWe want folks to innovate here,â Hines stressed. âWe canât be fearful of them walking into the SEC and getting a Wells notice before they get on the elevator.â He added that U.S. regulators are now encouraging crypto innovators to return: âOur message to folks who have gone offshore is: welcome home_._âÂ
Williams highlighted that any new laws must reflect the unique architecture of decentralized finance. âTraditional markets are based on a principal-agent model,â he explained. âBut crypto moves us toward a principal-to-principal structure.â
He noted that after regulatory support for the ETP marketplace, institutional Bitcoin adoption surgedâand believes the same would happen again under stablecoin and market structure legislation.Â
The most bullish comment of the morning came from Hines: âBitcoin is truly the golden standard⌠This is an asset that we should be harnessing on behalf of the American people. We want as much as we can possibly get.âÂ
âWe are going big on digital assets,â added Tyler. âYou will certainly see the United States stepping out as the bitcoin superpower of the world,â Hines concluded.Â
You can watch the full panel discussion and the rest of the Bitcoin 2025 Conference Industry Day below:
https://www.youtube.com/live/3e3KE40r_WM?si=LCZcZeKbxi_iTk62This post White House Executive Director Bo Hines Declares U.S. The Future Global Crypto Superpower first appeared on Bitcoin Magazine and is written by Jenna Montgomery.
-
@ 6a6be47b:3e74e3e1
2025-05-28 17:37:11Hi frens! đ
How was your day? Mine was pretty great! Not to bragâI just try to see things in a positive light. Even when a day is âmehâ or downright awful, I look for at least one good thing in it. Sometimes, letâs be real, there isnât even one. Some days, weeks, or even months can just be tough. But even that shall pass.
⨠So, letâs try to focus on at least one good thing around us, or within us. Who knowsâmaybe a little magic can happenâŚ
đ¨ Today, I made time for some drawing on Procreateâyaaay! If you caught yesterdayâs discussion, you know I drew a butterfly đŚ. Maybe with todayâs drawing, youâll be able to guess my next blog entry đ
Todayâs subject: Cytisus scoparius, better known as âScotch broomâ (or Scots broom).
đ I used to mix it up with gorse, but there are some telltale differences:
âBroom is similar to common gorse in size, shape and flower colour, but it lacks the spines and has short, flattened leaves and larger flowers.â â The Wildlife Trusts
âď¸Fun fact: I actually painted a gorse not too long ago for my Beltane post.
đ¨ A word of caution thoughâdonât get too close! Scotch broom is harmful if eaten, so keep an eye out for your pets when youâre out and about, according to rhs.org.uk
đź I love spotting these bright yellow blooms by the highway or just outside town. That color is chefâs kissâit really brightens up any drive!
đThatâs all for today. Iâm super excited to hear what you think!
Take care and godspeed, my frens! đâ¨
https://stacker.news/items/991324
-
@ c1e9ab3a:9cb56b43
2025-05-27 16:19:06Star Wars is often viewed as a myth of rebellion, freedom, and resistance to tyranny. The iconographyâscrappy rebels, totalitarian stormtroopers, lone smugglersâsuggests a deep anti-authoritarian ethos. Yet, beneath the surface, the narrative arc of Star Wars consistently affirms the necessity, even sanctity, of central authority. This blog entry introduces the question: Is Star Wars fundamentally a celebration of statism?
Rebellion as Restoration, Not Revolution
The Rebel Allianceâs mission is not to dismantle centralized power, but to restore the Galactic Republicâa bureaucratic, centrally governed institution. Characters like Mon Mothma and Bail Organa are high-ranking senators, not populist revolutionaries. The goal is to remove the corrupt Empire and reinstall a previous central authority, presumed to be just.
- Rebels are loyalists to a prior state structure.
- Power is not questioned, only who wields it.
Jedi as Centralized Moral Elites
The Jedi, often idealized as protectors of peace, are unelected, extra-legal enforcers of moral and military order. Their authority stems from esoteric metaphysical abilities rather than democratic legitimacy.
- They answer only to their internal Council.
- They are deployed by the Senate, but act independently of civil law.
- Their collapse is depicted as tragic not because they were unaccountable, but because they were betrayed.
This positions them as a theocratic elite, not spiritual anarchists.
Chaos and the Frontier: The Case of the Cantina
The Mos Eisley cantina, often viewed as a symbol of frontier freedom, reveals something darker. It is: - Lawless - Violent - Culturally fragmented
Conflict resolution occurs through murder, not mediation. Obi-Wan slices off a limb; Han shoots firstâboth without legal consequence. There is no evidence of property rights, dispute resolution, or voluntary order.
This is not libertarian pluralismâitâs moral entropy. The message: without centralized governance, barbarism reigns.
The Mythic Arc: Restoration of the Just State
Every trilogy in the saga returns to a single theme: the fall and redemption of legitimate authority.
- Prequels: Republic collapses into tyranny.
- Originals: Rebels fight to restore legitimate order.
- Sequels: Weak governance leads to resurgence of authoritarianism; heroes must reestablish moral centralism.
The story is not anti-stateâitâs anti-bad state. The solution is never decentralization; itâs the return of the right ruler or order.
Conclusion: The Hidden Statism of a Rebel Myth
Star Wars wears the costume of rebellion, but tells the story of centralized salvation. It: - Validates elite moral authority (Jedi) - Romanticizes restoration of fallen governments (Republic) - Portrays decentralized zones as corrupt and savage (outer rim worlds)
It is not an anarchist parable, nor a libertarian fable. It is a statist mythology, clothed in the spectacle of rebellion. Its core message is not that power should be abolished, but that power belongs to the virtuous few.
Question to Consider:
If the Star Wars universe consistently affirms the need for centralized moral and political authority, should we continue to see it as a myth of freedom? Or is it time to recognize it as a narrative of benevolent empire? -
@ d360efec:14907b5f
2025-05-27 15:46:26 -
@ c1e6505c:02b3157e
2025-05-28 17:36:03I recently acquired a new lens:
1959 Leica Summaron F2.8 35mm LTM.
1959 Leica Summaron 35mm f2.8 LTM mounted on my Fujifilm Xpro2 with LTM adapter made by Urth.
Technically, it was a trade. I helped a fellow Bitcoiner set up their Sparrow Wallet, Nostr stuff, and troubleshoot a few wallet issues, and in return, they gave me the lens.
It all started at a local Bitcoin meetup I went to about a week ago - my second time attending. I recognized a few faces from last time, but also saw some new ones. These meetups are refreshing - itâs rare to speak a common language about something like Bitcoin or Nostr. Most people still donât get it. But they will.
Technology moves forward. Networks grow. Old cells die off.
During the meetup, someone noticed I had my Leica M262 with me and struck up a conversation. Said they had some old Leica lenses and gear at home, and wanted to show me.
Bitcoin and photography in one conversation? Iâm down.
A day or so later, they sent me a photo of one of the lenses: a vintage Summaron LTM 35mm f/2.8 from 1959. Iâd never seen or heard of one before. They asked if I could help them set up Sparrow and a Bitcoin node. In exchange, theyâd give me the lens. Sounded like a good deal to me. Helping plebs with their setups feels like a duty anyway. I said, of course.
They invited me over - a pretty trusting move, which I appreciated. They had some great Bitcoin memorabilia: Fred Kruegerâs The Big Bitcoin Book (even if the guyâs turned full shitcoiner), and some FTX sunglasses from Bitcoin 2022. Probably future collectorâs items, lol.
We headed upstairs to work on setting up Sparrow Wallet on their Windows machine. I verified the software download first (which you should always do), then helped them create a new wallet using their Ledger Flex. They also had an older Ledger Nano X. The Flex setup was easy, but the Nano X gave us trouble. It turns out Ledger allows multiple wallets for the same asset, which can show up differently depending on how theyâre configured. In Sparrow, only one wallet showedânone of the others.
I believe it had to do with the derivation path from the Ledger. If anyone knows a fix, let me know.
After a few hours of troubleshooting, I told them I couldnât really recommend Ledger. The UX is a mess. Theyâd already heard similar things from other plebs too.
I suggested switching to the Blockstream Jade. Itâs a solid Bitcoin-only device from a trustworthy team. Thatâs what you want in a hardware wallet.
But back to the lensâŚ
Since itâs an LTM (Leica Thread Mount), I couldnât mount it directly on my M262. Luckily, I remembered I had an Urth adapter that fits my Fujifilm X-Pro2. I donât use the X-Pro2 much these daysâitâs mostly been sidelined by the M262 - but this was the perfect excuse to bring it out again.
To test the lens, I shot everything wide open at f/2.8. Nothing crazy fast, but itâs the best way to see a lensâs character. And this one definitely has character. Thereâs a subtle softness and a kind of motion blur effect around the edges when wide open. At first, I wasnât sure how I felt about it, but the more I shot, the more I liked it. It reminds me of Winograndâs work in Winogrand Color - those messy, shifting edges that make the frame feel alive. It also helps soften the digital-ness of the camera sensor.
The focus throw is short and snappy - much tighter than my Summicron V3 35mm f/2. I really like how fast it is to use. The closest focusing distance is about 3.5 feet, so itâs not ideal for close-ups. And with the Urth adapter on the X-Pro2, the focal length ends up closer to 40mm.
The only thing that threw me off was the infinity lock. When the focus hits infinity, it physically locks - you have to press a small tab to unlock it. Iâve seen others complain about it, so I guess itâs just one of those old lens quirks. Iâm getting used to it.
All the photos here were taken around where I live in South Carolina. Some during bike rides to the river for a swim, others while walking through the marshlands.
I try to make work wherever I am. You should be able to.
Itâs about the light, the rhythm, the play - and having the motivation to actually go out and shoot.
Lens rating: 7.9/10
I mainly shoot with a Leica M262, and edit in Lightroom + Dehancer
Use âPictureRoomâ for 10% off Dehancer Film
If youâve made it this far, thank you for taking the time to view my work - consider becoming a paid subscriber.
Also, please contact me if you would like to purchase any of my prints.
Follow me on Nostr:
npub1c8n9qhqzm2x3kzjm84kmdcvm96ezmn257r5xxphv3gsnjq4nz4lqelne96
-
@ 04c915da:3dfbecc9
2025-05-20 15:53:48This piece is the first in a series that will focus on things I think are a priority if your focus is similar to mine: building a strong family and safeguarding their future.
Choosing the ideal place to raise a family is one of the most significant decisions you will ever make. For simplicity sake I will break down my thought process into key factors: strong property rights, the ability to grow your own food, access to fresh water, the freedom to own and train with guns, and a dependable community.
A Jurisdiction with Strong Property Rights
Strong property rights are essential and allow you to build on a solid foundation that is less likely to break underneath you. Regions with a history of limited government and clear legal protections for landowners are ideal. Personally I think the US is the single best option globally, but within the US there is a wide difference between which state you choose. Choose carefully and thoughtfully, think long term. Obviously if you are not American this is not a realistic option for you, there are other solid options available especially if your family has mobility. I understand many do not have this capability to easily move, consider that your first priority, making movement and jurisdiction choice possible in the first place.
Abundant Access to Fresh Water
Water is life. I cannot overstate the importance of living somewhere with reliable, clean, and abundant freshwater. Some regions face water scarcity or heavy regulations on usage, so prioritizing a place where water is plentiful and your rights to it are protected is critical. Ideally you should have well access so you are not tied to municipal water supplies. In times of crisis or chaos well water cannot be easily shutoff or disrupted. If you live in an area that is drought prone, you are one drought away from societal chaos. Not enough people appreciate this simple fact.
Grow Your Own Food
A location with fertile soil, a favorable climate, and enough space for a small homestead or at the very least a garden is key. In stable times, a small homestead provides good food and important education for your family. In times of chaos your family being able to grow and raise healthy food provides a level of self sufficiency that many others will lack. Look for areas with minimal restrictions, good weather, and a culture that supports local farming.
Guns
The ability to defend your family is fundamental. A location where you can legally and easily own guns is a must. Look for places with a strong gun culture and a political history of protecting those rights. Owning one or two guns is not enough and without proper training they will be a liability rather than a benefit. Get comfortable and proficient. Never stop improving your skills. If the time comes that you must use a gun to defend your family, the skills must be instinct. Practice. Practice. Practice.
A Strong Community You Can Depend On
No one thrives alone. A ride or die community that rallies together in tough times is invaluable. Seek out a place where people know their neighbors, share similar values, and are quick to lend a hand. Lead by example and become a good neighbor, people will naturally respond in kind. Small towns are ideal, if possible, but living outside of a major city can be a solid balance in terms of work opportunities and family security.
Let me know if you found this helpful. My plan is to break down how I think about these five key subjects in future posts.
-
@ 9ca447d2:fbf5a36d
2025-05-28 17:01:11Panama City may be the next Latin American city to adopt bitcoin, after El Salvador.
Panama City Mayor Mayer Mizrachi has got the bitcoin world excited after hinting that the city might have a bitcoin reserve. The speculation started on May 16 when Mizrachi posted a simple but powerful message on X:
Two words. Thatâs it. What makes it special is that it came after a high-profile meeting with Max Keiser and Stacy Herbert, two key figures behind El Salvadorâs bitcoin strategy.
Keiser is an advisor to El Salvadorâs President Nayib Bukele and Herbert leads the countryâs Bitcoin Office.
El Salvador became the first country to adopt bitcoin as legal tender back in 2021. Since then, it has been building a national bitcoin reserve, currently holding 6,179 BTC worth around $640 million. Itâs also using geothermal energy to power bitcoin mining in an eco-friendly way.
El Salvadorâs bitcoin treasury â Bitcoin.gob.sv
Mizrachiâs meeting with Keiser and Herbert was about how Panama could do the same. While the details of the conversation are private, Keiser shared on social media that the two countries will play a big role in the future of Bitcoin.
âBitcoin is transforming Central America,â Keiser wrote. âEl Salvadorâs geothermal & Panamaâs hydro-electric will power the Bitcoin revolution.â
Max Keiser on X
Panama with its hydroelectric power could be a hub for green bitcoin mining.
Mizrachi has not announced a bitcoin reserve plan nor submitted a proposal to the National Assembly. But his post and public appearances suggest itâs being considered.
He will be speaking at the upcoming Bitcoin 2025 Conference in Las Vegas just days after his social media post. Many expect he will share more about Panama Cityâs bitcoin plans during his talk.
If Mizrachi pushes for a bitcoin reserve, he will need to work with national lawmakers to pass new legislation. So far, there is no evidence of that.
Even without a bitcoin reserve, Panama City is already going big on digital assets.
In April 2025, the city council approved a measure to allow residents to pay taxes, fees, fines and permits with digital currencies. Supported tokens are bitcoin (BTC), ethereum (ETH), USD Coin (USDC) and Tether (USDT).
To comply with financial laws, the city has partnered with a bank that instantly converts these digital assets into U.S. dollars. According to Mizrachi, this way itâs easier for residents to use digital assets and the cityâs financial operations will be transparent and legal.
Another part of the meeting with El Salvadorâs advisors was education.
Stacy Herbert confirmed that Panama City will be integrating El Salvadorâs financial literacy book, âWhat is Money?â into their digital library system. The goal is to help students, teachers and the general public understand bitcoin and digital currencies in modern finance.
This is a trend in Latin America where countries are looking for alternatives to traditional banking systems. Inflation, economic instability and the rise of decentralized finance are forcing governments to look into new financial tools.
-
@ b83a28b7:35919450
2025-05-16 19:23:58This article was originally part of the sermon of Plebchain Radio Episode 110 (May 2, 2025) that nostr:nprofile1qyxhwumn8ghj7mn0wvhxcmmvqyg8wumn8ghj7mn0wd68ytnvv9hxgqpqtvqc82mv8cezhax5r34n4muc2c4pgjz8kaye2smj032nngg52clq7fgefr and I did with nostr:nprofile1qythwumn8ghj7ct5d3shxtnwdaehgu3wd3skuep0qyt8wumn8ghj7ct4w35zumn0wd68yvfwvdhk6tcqyzx4h2fv3n9r6hrnjtcrjw43t0g0cmmrgvjmg525rc8hexkxc0kd2rhtk62 and nostr:nprofile1qyxhwumn8ghj7mn0wvhxcmmvqyg8wumn8ghj7mn0wd68ytnvv9hxgqpq4wxtsrj7g2jugh70pfkzjln43vgn4p7655pgky9j9w9d75u465pqahkzd0 of the nostr:nprofile1qythwumn8ghj7ct5d3shxtnwdaehgu3wd3skuep0qyt8wumn8ghj7etyv4hzumn0wd68ytnvv9hxgtcqyqwfvwrccp4j2xsuuvkwg0y6a20637t6f4cc5zzjkx030dkztt7t5hydajn
Listen to the full episode here:
<https://fountain.fm/episode/Ln9Ej0zCZ5dEwfo8w2Ho>
Bitcoin has always been a narrative revolution disguised as code. White paper, cypherpunk lore, pizzaâday legends - every block is a paragraph in the worldâs most relentless epic. But code alone rarely converts the skeptic; itâs the campâfire myth that slips past the prefrontal cortex and shakes hands with the limbic system. People donât adopt protocols first - they fall in love with protagonists.
Early adopters heard the whiteâpaper hymn, but most folks need characters first: a pizzaâday dreamer; a mother in a small country, crushed by the cost of remittance; a Warsaw street vendor swapping zĹoty for sats. When their arcs land, the brain releases a neurochemical OP_RETURN which says, âI belong in this plot.ââŻThatâs the sly roundabout orange pill: conviction smuggled inside catharsis.
Thatâs why, from 22â25âŻMay in Warsawâs Kinoteka, the BitcoinâŻFilmâŻFest is loading its reels with rebellion. Each documentary, drama, and animated rabbitâhole is a stealth wallet, zipping conviction straight into the feels of anyone still clasped within the cold claw of fiat. You come for the plot, you leave checking block heights.
Here's the clip of the sermon from the episode:
nostr:nevent1qvzqqqqqqypzpwp69zm7fewjp0vkp306adnzt7249ytxhz7mq3w5yc629u6er9zsqqsy43fwz8es2wnn65rh0udc05tumdnx5xagvzd88ptncspmesdqhygcrvpf2
-
@ 04c915da:3dfbecc9
2025-05-16 17:51:54In much of the world, it is incredibly difficult to access U.S. dollars. Local currencies are often poorly managed and riddled with corruption. Billions of people demand a more reliable alternative. While the dollar has its own issues of corruption and mismanagement, it is widely regarded as superior to the fiat currencies it competes with globally. As a result, Tether has found massive success providing low cost, low friction access to dollars. Tether claims 400 million total users, is on track to add 200 million more this year, processes 8.1 million transactions daily, and facilitates $29 billion in daily transfers. Furthermore, their estimates suggest nearly 40% of users rely on it as a savings tool rather than just a transactional currency.
Tetherâs rise has made the company a financial juggernaut. Last year alone, Tether raked in over $13 billion in profit, with a lean team of less than 100 employees. Their business model is elegantly simple: hold U.S. Treasuries and collect the interest. With over $113 billion in Treasuries, Tether has turned a straightforward concept into a profit machine.
Tetherâs success has resulted in many competitors eager to claim a piece of the pie. This has triggered a massive venture capital grift cycle in USD tokens, with countless projects vying to dethrone Tether. Due to Tetherâs entrenched network effect, these challengers face an uphill battle with little realistic chance of success. Most educated participants in the space likely recognize this reality but seem content to perpetuate the grift, hoping to cash out by dumping their equity positions on unsuspecting buyers before they realize the reality of the situation.
Historically, Tetherâs greatest vulnerability has been U.S. government intervention. For over a decade, the company operated offshore with few allies in the U.S. establishment, making it a major target for regulatory action. That dynamic has shifted recently and Tether has seized the opportunity. By actively courting U.S. government support, Tether has fortified their position. This strategic move will likely cement their status as the dominant USD token for years to come.
While undeniably a great tool for the millions of users that rely on it, Tether is not without flaws. As a centralized, trusted third party, it holds the power to freeze or seize funds at its discretion. Corporate mismanagement or deliberate malpractice could also lead to massive losses at scale. In their goal of mitigating regulatory risk, Tether has deepened ties with law enforcement, mirroring some of the concerns of potential central bank digital currencies. In practice, Tether operates as a corporate CBDC alternative, collaborating with authorities to surveil and seize funds. The company proudly touts partnerships with leading surveillance firms and its own data reveals cooperation in over 1,000 law enforcement cases, with more than $2.5 billion in funds frozen.
The global demand for Tether is undeniable and the companyâs profitability reflects its unrivaled success. Tether is owned and operated by bitcoiners and will likely continue to push forward strategic goals that help the movement as a whole. Recent efforts to mitigate the threat of U.S. government enforcement will likely solidify their network effect and stifle meaningful adoption of rival USD tokens or CBDCs. Yet, for all their achievements, Tether is simply a worse form of money than bitcoin. Tether requires trust in a centralized entity, while bitcoin can be saved or spent without permission. Furthermore, Tether is tied to the value of the US Dollar which is designed to lose purchasing power over time, while bitcoin, as a truly scarce asset, is designed to increase in purchasing power with adoption. As people awaken to the risks of Tetherâs control, and the benefits bitcoin provides, bitcoin adoption will likely surpass it.
-
@ 7f6db517:a4931eda
2025-05-28 16:01:56@matt_odell don't you even dare not ask about nostr!
â Kukks (Andrew Camilleri) (@MrKukks) May 18, 2021
Nostr first hit my radar spring 2021: created by fellow bitcoiner and friend, fiatjaf, and released to the world as free open source software. I was fortunate to be able to host a conversation with him on Citadel Dispatch in those early days, capturing that moment in history forever. Since then, the protocol has seen explosive viral organic growth as individuals around the world have contributed their time and energy to build out the protocol and the surrounding ecosystem due to the clear need for better communication tools.
nostr is to twitter as bitcoin is to paypal
As an intro to nostr, let us start with a metaphor:
twitter is paypal - a centralized platform plagued by censorship but has the benefit of established network effects
nostr is bitcoin - an open protocol that is censorship resistant and robust but requires an organic adoption phase
Nostr is an open communication protocol that can be used to send messages across a distributed set of relays in a censorship resistant and robust way.
â- Anyone can run a relay.
â- Anyone can interact with the protocol.
â- Relays can choose which messages they want to relay.
â- Users are identified by a simple public private key pair that they can generate themselves.Nostr is often compared to twitter since there are nostr clients that emulate twitter functionality and user interface but that is merely one application of the protocol. Nostr is so much more than a mere twitter competitor. Nostr clients and relays can transmit a wide variety of data and clients can choose how to display that information to users. The result is a revolution in communication with implications that are difficult for any of us to truly comprehend.
Similar to bitcoin, nostr is an open and permissionless protocol. No person, company, or government controls it. Anyone can iterate and build on top of nostr without permission. Together, bitcoin and nostr are incredibly complementary freedom tech tools: censorship resistant, permissionless, robust, and interoperable - money and speech protected by code and incentives, not laws.
As censorship throughout the world continues to escalate, freedom tech provides hope for individuals around the world who refuse to accept the status quo. This movement will succeed on the shoulders of those who choose to stand up and contribute. We will build our own path. A brighter path.
My Nostr Public Key: npub1qny3tkh0acurzla8x3zy4nhrjz5zd8l9sy9jys09umwng00manysew95gx
If you found this post helpful support my work with bitcoin.
-
@ 04c915da:3dfbecc9
2025-05-16 17:12:05One of the most common criticisms leveled against nostr is the perceived lack of assurance when it comes to data storage. Critics argue that without a centralized authority guaranteeing that all data is preserved, important information will be lost. They also claim that running a relay will become prohibitively expensive. While there is truth to these concerns, they miss the mark. The genius of nostr lies in its flexibility, resilience, and the way it harnesses human incentives to ensure data availability in practice.
A nostr relay is simply a server that holds cryptographically verifiable signed data and makes it available to others. Relays are simple, flexible, open, and require no permission to run. Critics are right that operating a relay attempting to store all nostr data will be costly. What they miss is that most will not run all encompassing archive relays. Nostr does not rely on massive archive relays. Instead, anyone can run a relay and choose to store whatever subset of data they want. This keeps costs low and operations flexible, making relay operation accessible to all sorts of individuals and entities with varying use cases.
Critics are correct that there is no ironclad guarantee that every piece of data will always be available. Unlike bitcoin where data permanence is baked into the system at a steep cost, nostr does not promise that every random note or meme will be preserved forever. That said, in practice, any data perceived as valuable by someone will likely be stored and distributed by multiple entities. If something matters to someone, they will keep a signed copy.
Nostr is the Streisand Effect in protocol form. The Streisand effect is when an attempt to suppress information backfires, causing it to spread even further. With nostr, anyone can broadcast signed data, anyone can store it, and anyone can distribute it. Try to censor something important? Good luck. The moment it catches attention, it will be stored on relays across the globe, copied, and shared by those who find it worth keeping. Data deemed important will be replicated across servers by individuals acting in their own interest.
Nostrâs distributed nature ensures that the system does not rely on a single point of failure or a corporate overlord. Instead, it leans on the collective will of its users. The result is a network where costs stay manageable, participation is open to all, and valuable verifiable data is stored and distributed forever.
-
@ cae03c48:2a7d6671
2025-05-28 16:00:58Bitcoin Magazine
Bitcoin Is Here To Stay, Says Former US Treasurer Rosie RiosAt the 2025 Bitcoin Conference in Las Vegas, the Co-Manager of President Trumpâs 2024 Campaign Chris LaCivita, Congressman Brian T. Jack, the Chief Policy Officer of Coinbase Faryar Shirzad and Former US Treasurer Rosie Rios at the Nakamoto stage discussed the 250th birthday of the United States, Bitcoin, freedom, and crypto.
Rosie Rios emphasized that consumer behavior is very hard to change unless there is a shock to the system. She said she is amazed by the momentum of the level of change that has happened during these four months in terms of giving that green light to innovation to actually happen.
âYou are gonna hear me say a lot, the train has left the station. Bitcoin is here to stay. Blockchain is here to stay,â said Rios.
JUST IN:
Former Treasurer of the United States Rosie Rios says, â#Bitcoin is here to stay.â
âThe train has left the station.â
pic.twitter.com/M4noy7DPha
â Bitcoin Magazine (@BitcoinMagazine) May 27, 2025
âItâs about freedom and what crypto represents on a national scale,â said Chris LaCivita. âThis country was founded on the entrepreneurial spirit of Americans and we are on the forefront of establishing and formulating the future of currency.â
Jack mentioned that earlier this year, they started to use a congressional tool called the Congressional Review Act that will enable them to repeal any regulation Joe Bidenâs administration put on any sector during his last months in office.Â
âOne of the first laws that Donald Trump signed into law was the repeal of a very niche but interesting issue for some folks in the room,â stated Jack. âIt was a policy that the CFPB thrust upon the industry in December that really helped them regulate, if you will, or over regulate payment processors. So a lot of the payment processors that process bitcoin, process crypto, they were going to be under these incredible burdens by CFPB.â
âThe eyes of the world are watching,â commented Rosie. âWe are setting the tone for what happens not just in our history but for the future and for all of us this is the American dream. This is about the values of which our country was founded.â
âFor Bitcoin and Blockchain in general whoever creates that dominant digital infrastructure will set the tone for the whole global financial system and it starts here literally at this conference with this leadership with this President moving forward,â stated Rosie Rios closing the panel.Â
This post Bitcoin Is Here To Stay, Says Former US Treasurer Rosie Rios first appeared on Bitcoin Magazine and is written by Oscar Zarraga Perez.
-
@ da8b7de1:c0164aee
2025-05-28 15:42:22NemzetkĂśzi nukleĂĄris energetikai hĂrek
Ăj amerikai kis modulĂĄris reaktor engedĂŠlykĂŠrelem
A Tennessee Valley Authority (TVA) benyĂşjtotta az EgyesĂźlt Ăllamok NukleĂĄris SzabĂĄlyozĂł HatĂłsĂĄgĂĄhoz (NRC) az engedĂŠlykĂŠrelmet egy GE Vernova Hitachi Nuclear Energy BWRX-300 kis modulĂĄris reaktor (SMR) megĂŠpĂtĂŠsĂŠre a Clinch River telephelyen. Ez jelentĹs lĂŠpĂŠs az Ăşj, fejlett nukleĂĄris technolĂłgiĂĄk bevezetĂŠsĂŠben az EgyesĂźlt Ăllamokban, ĂŠs jĂłl mutatja, hogy az SMR-ek egyre fontosabb, rugalmas ĂŠs skĂĄlĂĄzhatĂł tisztaenergia-megoldĂĄssĂĄ vĂĄlnak[world-nuclear-news.org].
Amerikai elnĂśki rendeletek a nukleĂĄris bĹvĂtĂŠs felgyorsĂtĂĄsĂĄra
Donald Trump amerikai elnĂśk nĂŠgy elnĂśki rendeletet Ărt alĂĄ, amelyek cĂŠlja a reaktorengedĂŠlyezĂŠsi folyamatok gyorsĂtĂĄsa, a hazai urĂĄntermelĂŠs nĂśvelĂŠse ĂŠs a fejlett nukleĂĄris technolĂłgiĂĄk bevezetĂŠsĂŠnek felgyorsĂtĂĄsa. Az Ăşj irĂĄnyelvek ambiciĂłzus cĂŠlokat tĹąznek ki, pĂŠldĂĄul az amerikai nukleĂĄris kapacitĂĄs megnĂŠgyszerezĂŠsĂŠt 2050-re, az NRC szĂĄmĂĄra az engedĂŠlyezĂŠsi idĹ 18 hĂłnapra csĂśkkentĂŠsĂŠt, valamint szĂśvetsĂŠgi terĂźletek kijelĂślĂŠsĂŠt Ăşj nukleĂĄris lĂŠtesĂtmĂŠnyek szĂĄmĂĄra. Ezeket a rendeleteket az âamerikai nukleĂĄris reneszĂĄnszâ alapjĂĄnak szĂĄnjĂĄk, kĂźlĂśnĂśs hangsĂşlyt fektetve az AI-ipar energiaigĂŠnyeinek kielĂŠgĂtĂŠsĂŠre ĂŠs a hazai gyĂĄrtĂĄs ĂşjjĂĄĂŠlesztĂŠsĂŠre[nucnet.org].
IparĂĄgi optimizmus ĂŠs globĂĄlis befektetĂŠsi trendek
Az iparĂĄgi vezetĹk egĂŠszsĂŠges ĂŠs optimista kilĂĄtĂĄsokrĂłl szĂĄmolnak be a nukleĂĄris energia terĂŠn, kiemelve olyan aktĂv projekteket, mint a TerraPower Wyomingban, az X-energy ĂŠs a Dow egyĂźttmĹąkĂśdĂŠse, valamint a Westinghouse tevĂŠkenysĂŠge LengyelorszĂĄgban. KĂźlĂśnĂśsen nagy az ĂŠrdeklĹdĂŠs a magĂĄnbefektetĂŠsek irĂĄnt a magas dĂşsĂtĂĄsĂş, alacsony dĂşsĂtĂĄsĂş urĂĄn (HALEU) elĹĂĄllĂtĂĄsa terĂŠn, illetve annak lehetĹsĂŠge irĂĄnt, hogy a VilĂĄgbank elkezdjen nukleĂĄris projekteket finanszĂrozni, ami szĂŠlesebb kĂśrĹą nemzetkĂśzi befektetĂŠseket is elindĂthat[ans.org].
NemzetkĂśzi fejlemĂŠnyek ĂŠs ellĂĄtĂĄsi lĂĄnc felkĂŠszĂźltsĂŠge
SzĂĄmos orszĂĄg halad elĹre a nukleĂĄris fejlesztĂŠsekkel: - KĂna tĂz Ăşj reaktort hagyott jĂłvĂĄ. - India szabĂĄlyozĂł hatĂłsĂĄga engedĂŠlyezte egy Ăşj, nĂŠgyblokkos telephely lĂŠtesĂtĂŠsĂŠt RĂĄdzsasztĂĄnban. - Belgium konzultĂĄciĂłt indĂtott egy innovatĂv, Ăłlom-hĹątĂŠsĹą kis modulĂĄris reaktor terveirĹl. - BrazĂlia vĂĄrhatĂłan OroszorszĂĄggal kĂśzĂśsen fejleszt SMR-projektet. - CsehorszĂĄg Ăşj nukleĂĄris szerzĹdĂŠseket kĂśt, a kĂźlsĹ politikai nyomĂĄs ellenĂŠre is.
A globĂĄlis nukleĂĄris ellĂĄtĂĄsi lĂĄncot arra ĂśsztĂśnzik, hogy kĂŠszĂźljĂśn fel a gyors nĂśvekedĂŠsre, kiemelve a helyi ĂŠs nemzetkĂśzi egyĂźttmĹąkĂśdĂŠs fontossĂĄgĂĄt a nĂśvekvĹ igĂŠnyek kielĂŠgĂtĂŠsĂŠre[world-nuclear-news.org].
ĂszĂł atomerĹmĹąvek ĂŠs tengeri innovĂĄciĂłk
Az ĂşszĂł atomerĹmĹąvek tovĂĄbbra is az innovĂĄciĂł kĂśzĂŠppontjĂĄban ĂĄllnak: - OroszorszĂĄg Akademik Lomonosov nevĹą ĂşszĂł atomerĹmĹąve elĂŠrte az elsĹ milliĂĄrd kilowattĂłra termelĂŠst. - Az EgyesĂźlt KirĂĄlysĂĄgban a Core Power egy amerikai kĂśzpontĂş tengeri nukleĂĄris programot fejleszt, melynek cĂŠlja ĂşszĂł reaktorok telepĂtĂŠse amerikai kikĂśtĹkben a 2030-as ĂŠvek kĂśzepĂŠre. - A dĂĄn Seaborg Technologies (Ăşj nevĂŠn Saltfoss Energy) kompakt olvadt sĂł reaktor technolĂłgiĂĄn dolgozik, amelyet szintĂŠn a 2030-as ĂŠvekre terveznek bevezetni. - A Westinghouse ĂŠs a Core Power egyĂźttmĹąkĂśdik egy ĂşszĂł atomerĹmĹą fejlesztĂŠsĂŠn az eVinci mikroreaktorral[world-nuclear-news.org].
Ărintettek bevonĂĄsa ĂŠs tĂĄrsadalmi bizalom
A NemzetkĂśzi Atomenergia-ĂźgynĂśksĂŠg (IAEA) kiemeli az ĂŠrintettek bevonĂĄsĂĄnak fontossĂĄgĂĄt a nukleĂĄris energia jĂśvĹje szempontjĂĄbĂłl. Folyamatban lĂŠvĹ konferenciĂĄjĂĄn olyan tĂŠmĂĄkat tĂĄrgyalnak, mint a nukleĂĄris energia szerepe az ipari dekarbonizĂĄciĂłban, a nyilvĂĄnos meghallgatĂĄsok ĂŠrtĂŠke a projektek ĂĄtlĂĄthatĂłsĂĄga ĂŠrdekĂŠben, valamint a tĂĄrsadalmi bizalom ĂŠs a szabĂĄlyozĂłi megfelelĂŠs legjobb gyakorlatai, kĂźlĂśnĂśsen az Ăşj technolĂłgiĂĄk, pĂŠldĂĄul az SMR-ek bevezetĂŠse sorĂĄn[iaea.org].
ForrĂĄsok: - world-nuclear-news.org - nucnet.org - iaea.org - ans.org
-
@ 08f96856:ffe59a09
2025-05-15 01:17:18ŕšŕ¸Ąŕ¸ˇŕšŕ¸ŕ¸ŕ¸šŕ¸ŕ¸ŕ¸śŕ¸ Bitcoin Standard ญ฼ายŕ¸ŕ¸ŕ¸Ąŕ¸ąŕ¸ŕ¸ŕ¸śŕ¸ŕ¸ŕ¸śŕ¸ŕ¸ าŕ¸ŕšŕ¸Ľŕ¸ŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸ŕ¸ľŕšŕ¸ŕ¸¸ŕ¸ŕ¸ŕ¸ŕšŕ¸ŕšŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸ŕ¸˘ŕ¸ŕšŕ¸ŕ¸ˇŕšŕ¸ŕ¸ŕ¸˛ŕšŕ¸ŕ¸Ťŕ¸Łŕ¸ˇŕ¸ŕ¸ŕ¸ŕ¸ŕšŕ¸ŕšŕšŕ¸ŕ¸ŕ¸ľŕ¸§ŕ¸´ŕ¸ŕ¸ŕ¸Łŕ¸°ŕ¸ŕ¸łŕ¸§ŕ¸ąŕ¸ ภาŕ¸ŕšŕ¸ŕ¸ŕ¸ŕ¸ąŕšŕ¸ŕ¸ŕ¸šŕšŕ¸Ťŕ¸Ąŕ¸ˇŕ¸ŕ¸ŕšŕ¸ŕ¸Ľŕ¸ŕ¸ąŕ¸§ŕšŕ¸Ľŕ¸°ŕšŕ¸ŕšŕ¸ŕšŕ¸ŕšŕ¸Ąŕšŕšŕ¸ŕšŕšŕ¸ŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕšŕ¸ŕšŕ¸ŕ¸ŕ¸Łŕ¸´ŕ¸ ญ฼ายŕ¸ŕ¸ŕ¸ŕ¸śŕ¸ŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸šŕ¸ŕ¸§ŕšŕ¸˛ âŕ¸ŕ¸ŕšŕ¸Ąŕšŕ¸ŕ¸ąŕ¸ŕšŕ¸Ťŕšŕ¸ŕšŕ¸ŕ¸ŕšŕ¸§ŕ¸ŕ¸ŕ¸ľŕ¸§ŕ¸´ŕ¸ŕ¸ŕ¸ľŕšŕ¸Ťŕ¸Łŕ¸ŕ¸â ŕšŕ¸ŕšŕšŕ¸ŕ¸Ąŕ¸¸ŕ¸Ąŕ¸Ąŕ¸ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸Ą Bitcoin Standard ŕ¸ŕ¸˛ŕ¸ŕšŕ¸Ąŕšŕšŕ¸ŕšŕšŕ¸Łŕ¸´ŕšŕ¸Ąŕ¸ŕšŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸˛ŕ¸Łŕ¸ŕ¸ľŕšŕšŕ¸Łŕ¸˛ŕ¸ŕšŕ¸˛ŕ¸˘ŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸ŕ¸˘ŕ¸ŕšŕšŕ¸ŕ¸˘ŕ¸ŕ¸Łŕ¸ŕšŕ¸ŕ¸Łŕšŕ¸˛ŕ¸ŕ¸ŕšŕ¸˛ ŕšŕ¸ŕšŕ¸ŕ¸˛ŕ¸ŕšŕ¸Łŕ¸´ŕšŕ¸Ąŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸Şŕ¸´ŕšŕ¸ŕ¸ŕ¸ľŕšŕšŕ¸ŕ¸ľŕ¸˘ŕ¸ŕ¸ŕ¸§ŕšŕ¸˛ ฼ผŕ¸ŕ¸ŕ¸§ŕšŕ¸˛ ŕšŕ¸Ľŕ¸°ŕšŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸śŕšŕ¸ŕšŕ¸Ľŕšŕ¸§ŕšŕ¸ŕ¸ŕ¸ŕ¸°ŕ¸ŕ¸ľŕš ŕ¸ŕ¸ąŕšŕ¸ŕ¸ŕ¸ˇŕ¸ ŕ¸ŕ¸˛ŕ¸Łŕ¸Ľŕšŕ¸Ąŕ¸Şŕ¸Ľŕ¸˛ŕ¸˘ŕ¸ŕ¸ľŕ¸Ľŕ¸°ŕ¸ŕšŕ¸ŕ¸˘ŕ¸ŕ¸ŕ¸ŕ¸Łŕ¸°ŕ¸ŕ¸ŕšŕ¸ŕ¸ľŕ¸˘ŕ¸ŕ¸ŕ¸ľŕšŕšŕ¸Łŕ¸˛ŕšŕ¸ŕšŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸˘ŕ¸šŕš
ระŕ¸ŕ¸ŕšŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸ľŕšŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸łŕ¸ŕ¸˛ŕ¸ŕ¸Łŕ¸ąŕ¸ŕ¸ŕ¸łŕ¸Ľŕ¸ąŕ¸ŕšŕ¸ŕšŕ¸˛ŕ¸Şŕ¸šŕšŕ¸ŕšŕ¸§ŕ¸ŕ¸ŕ¸˛ŕ¸Ľŕ¸ รูŕ¸ŕ¸ŕ¸˛ŕ¸Ľŕ¸ŕ¸ąŕšŕ¸§ŕšŕ¸Ľŕ¸ŕ¸ŕ¸łŕ¸Ľŕ¸ąŕ¸ŕ¸ŕ¸Ąŕ¸ŕ¸˘ŕ¸šŕšŕšŕ¸ŕ¸ าระญŕ¸ŕ¸ľŕšŕ¸Łŕ¸°ŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸Łŕ¸°ŕ¸§ŕ¸ąŕ¸ŕ¸´ŕ¸ŕ¸˛ŕ¸Łŕ¸ŕš ŕšŕ¸Ąŕšŕšŕ¸ŕšŕ¸ŕ¸Łŕ¸°ŕšŕ¸ŕ¸¨ŕ¸Ąŕ¸Ťŕ¸˛ŕ¸ŕ¸łŕ¸ŕ¸˛ŕ¸ŕ¸ŕšŕšŕ¸Łŕ¸´ŕšŕ¸Ąŕšŕ¸Şŕ¸ŕ¸ŕ¸Şŕ¸ąŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸ าวะŕšŕ¸Şŕ¸ľŕšŕ¸˘ŕ¸ŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸łŕ¸Łŕ¸°ŕ¸Ťŕ¸ŕ¸ľŕš ŕ¸ŕ¸ąŕ¸ŕ¸Łŕ¸˛ŕšŕ¸ŕ¸´ŕ¸ŕšŕ¸ŕšŕ¸ŕ¸ŕ¸Ľŕ¸˛ŕ¸˘ŕšŕ¸ŕšŕ¸ŕ¸ŕ¸ąŕ¸ŕ¸Ťŕ¸˛ŕšŕ¸Łŕ¸ˇŕšŕ¸ŕ¸Łŕ¸ąŕ¸ŕ¸ŕ¸ľŕšŕšŕ¸Ąŕšŕ¸Ąŕ¸ľŕ¸ŕšŕ¸˛ŕ¸ŕ¸ľŕ¸ŕ¸°ŕ¸Ťŕ¸˛ŕ¸˘ŕšŕ¸ ŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸˛ŕ¸Łŕ¸ŕ¸ľŕšŕšŕ¸ŕ¸˘ŕšŕ¸ŕ¸ŕ¸ŕ¸Łŕ¸ľŕšŕ¸Łŕ¸´ŕšŕ¸Ąŕ¸ŕ¸Ľŕ¸ąŕ¸ŕ¸Ąŕ¸˛ŕ¸ŕ¸´ŕ¸ŕ¸ŕšŕ¸˛ŕ¸ŕ¸Łŕ¸Łŕ¸Ąŕšŕ¸ŕ¸ľŕ¸˘ŕ¸Ą ŕšŕ¸Ľŕ¸°ŕ¸ŕ¸Łŕ¸°ŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸ŕšŕšŕ¸Łŕ¸´ŕšŕ¸Ąŕ¸Łŕ¸šŕšŕ¸Şŕ¸śŕ¸ŕ¸ŕ¸śŕ¸ŕ¸ŕ¸˛ŕ¸Łŕšŕ¸Şŕ¸ˇŕšŕ¸ŕ¸Ąŕ¸¨ŕ¸Łŕ¸ąŕ¸ŕ¸ŕ¸˛ŕšŕ¸ŕ¸Łŕ¸°ŕ¸ŕ¸ŕ¸ŕ¸˛ŕ¸Łŕšŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸ąŕšŕ¸ŕšŕ¸ŕ¸´ŕ¸Ą ŕšŕ¸Ąŕšŕ¸ŕ¸°ŕ¸˘ŕ¸ąŕ¸ŕ¸ŕ¸šŕ¸ŕ¸ŕ¸ąŕ¸ŕšŕ¸Ąŕšŕšŕ¸ŕšŕ¸Ąŕšŕ¸Şŕ¸ľŕ¸˘ŕ¸ŕ¸ŕšŕ¸ŕ¸˛ŕ¸Ą
ŕšŕ¸ŕ¸ŕ¸ŕ¸°ŕšŕ¸ŕ¸ľŕ¸˘ŕ¸§ŕ¸ŕ¸ąŕ¸ ŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸ŕ¸˘ŕ¸ŕšŕšŕ¸ŕ¸ŕ¸ŕšŕ¸ŕ¸łŕ¸Ľŕ¸ąŕ¸ŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸˛ŕšŕ¸ŕ¸ŕšŕ¸ŕ¸ľŕ¸˘ŕ¸ ŕš ŕšŕ¸ŕ¸ľŕ¸˘ŕ¸... ŕšŕ¸ŕšŕšŕ¸Ąŕšŕšŕ¸ŕ¸˘ŕ¸Ťŕ¸˘ŕ¸¸ŕ¸ ŕšŕ¸ŕ¸˘ŕšŕ¸ŕ¸ŕ¸˛ŕ¸°ŕšŕ¸ŕ¸Łŕ¸°ŕ¸ŕ¸ąŕ¸ Layer 2 ŕ¸ŕ¸ľŕšŕšŕ¸Łŕ¸´ŕšŕ¸Ąŕšŕ¸Şŕ¸ŕ¸ŕ¸¨ŕ¸ąŕ¸ŕ¸˘ŕ¸ าŕ¸ŕ¸ŕ¸˘ŕšŕ¸˛ŕ¸ŕ¸ŕ¸Łŕ¸´ŕ¸ŕ¸ŕ¸ąŕ¸ Lightning Network ŕšŕ¸ŕšŕ¸ Layer 2 ŕ¸ŕ¸ľŕšŕšŕ¸ŕ¸´ŕ¸ŕšŕ¸ŕšŕ¸ŕ¸˛ŕ¸ŕ¸Ąŕ¸˛ŕšŕ¸ŕšŕ¸Łŕ¸°ŕ¸˘ŕ¸°ŕšŕ¸§ŕ¸Ľŕ¸Şŕ¸Ťŕ¸ŕ¸śŕšŕ¸ ŕšŕ¸Ľŕ¸°ŕ¸˘ŕ¸ąŕ¸ŕ¸ŕ¸ŕ¸Ąŕ¸ľŕ¸ŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸Şŕ¸łŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸ľŕšŕ¸Şŕ¸¸ŕ¸ŕšŕ¸ŕ¸Łŕ¸°ŕ¸ŕ¸ŕ¸ŕ¸´ŕšŕ¸§ŕ¸¨ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸ŕ¸˘ŕ¸ŕš ลูŕ¸ŕ¸ŕ¸łŕšŕ¸Ťŕšŕ¸ŕ¸˛ŕ¸Łŕ¸ŕ¸łŕ¸Łŕ¸°ŕšŕ¸ŕ¸´ŕ¸ŕšŕ¸Łŕšŕ¸§ŕ¸ŕ¸śŕšŕ¸ ล฾ŕ¸ŕšŕ¸ŕ¸ŕ¸¸ŕ¸ŕ¸ŕšŕ¸ł ŕšŕ¸Ľŕ¸°ŕšŕ¸Ąŕšŕ¸ŕšŕ¸ŕ¸ŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸śŕ¸ŕ¸ŕ¸¸ŕ¸ŕ¸ŕ¸¸ŕ¸Łŕ¸ŕ¸Łŕ¸Łŕ¸Ąŕ¸Ľŕ¸ŕ¸ŕ¸Ľŕšŕ¸ŕ¸ŕšŕ¸ŕ¸ ŕšŕ¸ŕ¸Łŕ¸ˇŕ¸ŕ¸ŕšŕ¸˛ŕ¸˘ŕ¸ŕ¸ľŕšŕ¸ŕ¸łŕ¸Ľŕ¸ąŕ¸ŕ¸ŕ¸˘ŕ¸˛ŕ¸˘ŕ¸ŕ¸ąŕ¸§ŕ¸ŕ¸ąŕšŕ¸ŕšŕ¸ŕšŕ¸ŕšŕ¸ŕ¸ŕ¸ŕšŕ¸Ťŕ¸ŕ¸ŕšŕ¸Ľŕ¸°ŕ¸ŕ¸˛ŕ¸Łŕšŕ¸ŕšŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸Łŕ¸´ŕ¸ŕ¸ŕ¸ąŕšŕ¸§ŕšŕ¸Ľŕ¸
ŕ¸ŕ¸ŕ¸°ŕšŕ¸ŕ¸ľŕ¸˘ŕ¸§ŕ¸ŕ¸ąŕ¸ Layer 2 ŕ¸ŕ¸˛ŕ¸ŕšŕ¸Ľŕ¸ˇŕ¸ŕ¸ŕ¸ŕ¸ˇŕšŕ¸ŕ¸ŕ¸˘ŕšŕ¸˛ŕ¸ Ark Protocol ŕ¸ŕšŕ¸ŕ¸łŕ¸Ľŕ¸ąŕ¸ŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸˛ŕšŕ¸ŕ¸ˇŕšŕ¸ŕ¸ŕ¸ŕ¸ŕšŕ¸ŕ¸ŕ¸˘ŕšŕ¸ŕšŕ¸˛ŕ¸ŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕšŕ¸ŕšŕ¸ŕ¸Şŕšŕ¸§ŕ¸ŕ¸ŕ¸ąŕ¸§ŕšŕ¸Ľŕ¸°ŕ¸ŕ¸Łŕ¸°ŕ¸Şŕ¸ŕ¸ŕ¸˛ŕ¸Łŕ¸ŕšŕšŕ¸ŕšŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸ľŕšŕ¸ŕšŕ¸˛ŕ¸˘ BitVM ŕšŕ¸ŕ¸´ŕ¸ŕšŕ¸ŕ¸§ŕ¸ŕ¸˛ŕ¸ŕšŕ¸Ťŕ¸Ąŕšŕšŕ¸Ťŕšŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸ŕ¸˘ŕ¸ŕšŕ¸Łŕ¸ŕ¸ŕ¸Łŕ¸ąŕ¸ smart contract ŕšŕ¸ŕšŕšŕ¸ŕ¸Łŕ¸°ŕ¸ŕ¸ąŕ¸ Turing-complete ŕ¸ŕ¸śŕšŕ¸ŕ¸ŕ¸łŕšŕ¸Ťŕšŕšŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕšŕ¸ŕšŕ¸ŕšŕ¸ŕšŕ¸ŕšŕšŕ¸ŕ¸ŕ¸Łŕ¸ŕ¸ľŕšŕ¸ŕšŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸ľŕ¸ŕ¸Ąŕ¸˛ŕ¸ŕ¸Ąŕ¸˛ŕ¸˘ ŕšŕ¸Ľŕ¸°ŕšŕ¸ŕ¸ŕšŕ¸ŕšŕ¸Ľŕ¸˘ŕ¸ľŕ¸ŕ¸ľŕšŕ¸ŕšŕ¸˛ŕ¸Şŕ¸ŕšŕ¸ŕ¸ŕ¸˘ŕšŕ¸˛ŕ¸ Taproot Assets, Cashu ŕšŕ¸Ľŕ¸° Fedimint ŕ¸ŕšŕ¸ŕ¸łŕšŕ¸Ťŕšŕ¸ŕ¸˛ŕ¸Łŕ¸ŕ¸ŕ¸ŕšŕ¸ŕšŕ¸ŕ¸ŕ¸Ťŕ¸Łŕ¸ˇŕ¸ŕ¸Şŕ¸ŕ¸¸ŕ¸Ľŕšŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸ľŕšŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸ŕ¸˘ŕ¸ŕšŕšŕ¸ŕšŕ¸ŕ¸ŕ¸Łŕ¸´ŕ¸ŕšŕ¸ŕšŕ¸ŕ¸ŕšŕ¸ŕ¸Łŕ¸ŕ¸Şŕ¸Łŕšŕ¸˛ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸ŕ¸˘ŕ¸ŕšŕšŕ¸ŕ¸
ŕšŕ¸ŕ¸ŕšŕ¸ŕšŕ¸Ľŕ¸˘ŕ¸ľŕšŕ¸Ťŕ¸Ľŕšŕ¸˛ŕ¸ŕ¸ľŕšŕšŕ¸Ąŕšŕšŕ¸ŕšŕ¸ŕ¸˛ŕ¸Łŕšŕ¸ŕ¸´ŕ¸ŕšŕ¸ŕšŕ¸ŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸´ŕ¸Ťŕ¸˛ŕ¸Łŕ¸´ŕ¸˘ŕš ŕšŕ¸ŕšŕ¸Ąŕ¸ąŕ¸ŕ¸ŕ¸ˇŕ¸ŕ¸Ťŕ¸ŕšŕ¸˛ŕ¸ŕ¸˘ŕšŕ¸˛ŕ¸ŕ¸ŕšŕ¸ŕšŕ¸ŕ¸ˇŕšŕ¸ŕ¸ŕšŕ¸Ľŕ¸°ŕ¸Ąŕ¸ąŕšŕ¸ŕ¸ŕ¸ ŕšŕ¸Ľŕ¸°ŕ¸ŕ¸ąŕšŕ¸ŕ¸ŕ¸ˇŕ¸ŕšŕ¸Ťŕ¸ŕ¸¸ŕ¸ŕ¸Ľŕ¸ŕ¸ľŕšŕ¸Ąŕ¸ąŕ¸ŕ¸ŕ¸° âŕ¸ŕ¸˘ŕ¸šŕšŕ¸Łŕ¸ŕ¸â ŕšŕ¸ŕšŕšŕ¸ŕ¸Łŕ¸°ŕ¸˘ŕ¸°ŕ¸˘ŕ¸˛ŕ¸§ ŕšŕ¸Ąŕ¸ˇŕšŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕ¸ŕšŕ¸˛ŕšŕ¸ŕ¸ˇŕšŕ¸ŕ¸ŕ¸ˇŕ¸ŕšŕ¸Ąŕšŕšŕ¸ŕšŕ¸ŕ¸Łŕ¸´ŕ¸Šŕ¸ąŕ¸ รูŕ¸ŕ¸ŕ¸˛ŕ¸Ľ ญรมŕ¸ŕ¸ŕ¸¸ŕ¸ ŕšŕ¸ŕšŕ¸ŕ¸ˇŕ¸ŕ¸Şŕ¸´ŕšŕ¸ŕ¸ŕ¸ľŕšŕ¸ŕ¸Łŕ¸§ŕ¸ŕ¸Şŕ¸ŕ¸ŕšŕ¸ŕšŕšŕ¸Ľŕ¸°ŕšŕ¸ŕ¸Ľŕ¸ľŕšŕ¸˘ŕ¸ŕ¸ŕ¸ŕšŕ¸Ąŕšŕšŕ¸ŕš
ŕšŕ¸ŕšŕ¸ŕ¸ŕ¸ŕ¸§ŕšŕ¸˛ŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸ŕ¸˘ŕ¸ŕšŕ¸ŕšŕ¸ŕ¸ŕšŕ¸ŕšŕ¸ŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸ąŕ¸ stable coin, ŕšŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸´ŕ¸ŕ¸´ŕ¸ŕ¸ąŕ¸Ľŕ¸ŕ¸ŕ¸ŕ¸Łŕ¸ąŕ¸ ŕšŕ¸Ľŕ¸° cryptocurrency ŕ¸ŕ¸ˇŕšŕ¸ ŕš ŕšŕ¸ŕšŕ¸Şŕ¸´ŕšŕ¸ŕ¸ŕ¸ľŕšŕ¸ŕ¸łŕšŕ¸Ťŕšŕ¸Ąŕ¸ąŕ¸ŕšŕ¸Ťŕ¸ŕ¸ˇŕ¸ŕ¸ŕ¸§ŕšŕ¸˛ŕ¸ŕ¸ąŕšŕ¸ŕšŕ¸Ąŕšŕšŕ¸ŕšŕ¸ŕ¸ľŕšŕ¸ŕ¸ŕ¸Łŕš ญาŕ¸ŕšŕ¸ŕšŕšŕ¸ŕšŕ¸ŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕ¸ŕ¸ŕ¸ŕ¸˛ŕ¸ ŕšŕ¸Ľŕ¸°ŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕ¸Ąŕ¸ąŕšŕ¸ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸ľŕšŕšŕ¸Ąŕšŕ¸Ąŕ¸ľŕšŕ¸ŕ¸Łŕšŕ¸ŕ¸Ľŕ¸ľŕšŕ¸˘ŕ¸ŕšŕ¸ŕš ŕšŕ¸Ąŕšŕ¸Ąŕ¸ľŕ¸ŕ¸ľŕ¸Ąŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸˛ ŕšŕ¸Ąŕšŕ¸Ąŕ¸ľŕ¸ŕ¸Łŕ¸´ŕ¸Šŕ¸ąŕ¸ ŕšŕ¸Ąŕšŕ¸Ąŕ¸ľŕ¸ŕ¸Łŕ¸°ŕ¸ŕ¸šŕ¸ŕ¸´ŕ¸ ญรมŕ¸ŕ¸ŕ¸˛ŕ¸Łŕ¸˘ŕ¸śŕ¸ŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸ľ ลูŕ¸ŕ¸˘ŕ¸ˇŕ¸ŕ¸ŕ¸˘ŕ¸šŕšŕ¸ŕ¸ŕ¸ŕ¸ŕ¸´ŕ¸ŕ¸¨ŕ¸˛ŕ¸Şŕ¸ŕ¸Łŕš ŕ¸ŕ¸Ľŕ¸ąŕ¸ŕ¸ŕ¸˛ŕ¸ ŕšŕ¸Ľŕ¸°ŕšŕ¸§ŕ¸Ľŕ¸˛
ญ฼ายŕ¸ŕ¸Łŕ¸ŕ¸ľŕšŕ¸ŕšŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸ľŕšŕšŕ¸ŕ¸˘ŕ¸ŕ¸šŕ¸ŕ¸ŕ¸ŕ¸Ľŕ¸ŕ¸ŕšŕ¸ŕšŕ¸Ľŕ¸ŕ¸ŕ¸Łŕ¸´ŕ¸ŕšŕ¸ŕ¸ŕ¸°ŕ¸ŕšŕ¸ŕ¸˘ ŕš ŕšŕ¸ŕ¸Ľŕ¸ˇŕšŕ¸ŕ¸ŕšŕ¸ŕšŕ¸˛ŕ¸Ąŕ¸˛ŕ¸Şŕ¸šŕšŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸ŕ¸˘ŕ¸ŕš ŕšŕ¸ŕ¸Łŕ¸˛ŕ¸°ŕšŕ¸ŕ¸Łŕ¸ŕ¸Şŕ¸Łŕšŕ¸˛ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸Ąŕ¸ąŕ¸ŕšŕ¸ŕšŕ¸ŕšŕ¸ŕ¸Łŕšŕ¸ŕ¸ŕ¸§ŕšŕ¸˛ ŕšŕ¸Ąŕšŕ¸ŕšŕ¸ŕ¸ŕ¸ŕ¸˛ŕ¸Łŕ¸ŕ¸ľŕ¸Ąŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸˛ŕšŕ¸ŕ¸ŕ¸ŕ¸Ľŕ¸˛ŕ¸ ŕšŕ¸Ąŕšŕ¸ŕšŕ¸ŕ¸ŕ¸ŕ¸śŕšŕ¸ŕ¸ŕ¸Ľŕšŕ¸ŕšŕ¸Şŕ¸ľŕšŕ¸˘ŕ¸ŕ¸ŕšŕ¸ŕ¸ŕ¸˛ŕ¸Łŕ¸ŕ¸šŕ¸ŕ¸ŕ¸˛ŕ¸ ŕšŕ¸Ľŕ¸°ŕšŕ¸Ąŕšŕ¸ŕšŕ¸ŕ¸ŕ¸ŕ¸˛ŕ¸Ł âŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕšŕ¸ŕ¸ˇŕšŕ¸ŕšŕ¸â ŕ¸ŕ¸˛ŕ¸ŕšŕ¸ŕ¸Łŕšŕ¸Ľŕ¸˘
Bitcoin Standard ŕ¸ŕ¸ľŕšŕ¸ŕ¸Ąŕ¸ŕ¸šŕ¸ŕ¸ŕ¸śŕ¸ŕ¸ŕ¸śŕ¸ŕšŕ¸Ąŕšŕšŕ¸ŕšŕ¸ŕ¸˛ŕ¸Łŕšŕ¸ŕ¸Ľŕ¸ľŕšŕ¸˘ŕ¸ŕšŕ¸ŕ¸Ľŕ¸ŕšŕ¸ŕ¸ŕ¸ŕ¸Ľŕ¸´ŕ¸ŕ¸Ťŕ¸ŕšŕ¸˛ŕ¸Ąŕ¸ˇŕ¸ŕšŕ¸ŕšŕ¸ŕ¸Ťŕ¸Ľŕ¸ąŕ¸ŕ¸Ąŕ¸ˇŕ¸ ŕšŕ¸ŕšŕ¸ŕ¸ˇŕ¸ŕ¸ŕ¸˛ŕ¸Ł âŕšŕ¸ŕ¸Ľŕ¸ľŕšŕ¸˘ŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸Łŕ¸°ŕ¸ŕ¸â ŕ¸ŕ¸ľŕ¸Ľŕ¸°ŕ¸ŕ¸ąŕšŕ¸ ระŕ¸ŕ¸ŕ¸ŕ¸˛ŕ¸Łŕšŕ¸ŕ¸´ŕ¸ŕšŕ¸Ťŕ¸Ąŕšŕ¸ŕ¸ľŕšŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸˘ŕ¸šŕšŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸ŕ¸˘ŕ¸ŕšŕ¸ŕ¸łŕ¸Ľŕ¸ąŕ¸ŕšŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸śŕšŕ¸ŕšŕ¸Ľŕšŕ¸§ ลูŕ¸ŕšŕ¸Ąŕšŕšŕ¸ŕšŕšŕ¸Ľŕ¸ŕ¸ŕ¸ľŕšŕ¸ŕ¸¸ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸ˇŕ¸ŕšŕ¸Ťŕ¸Łŕ¸ľŕ¸˘ŕ¸ŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸ŕ¸˘ŕ¸ŕš ŕšŕ¸ŕšŕ¸Ąŕ¸ąŕ¸ŕ¸ŕ¸ˇŕ¸ŕšŕ¸Ľŕ¸ŕ¸ŕ¸ľŕšŕ¸ŕ¸ŕšŕ¸ŕšŕ¸ŕ¸˛ŕ¸ŕšŕ¸Ąŕšŕ¸Łŕ¸šŕšŕ¸ŕ¸ąŕ¸§ŕ¸ŕšŕ¸§ŕ¸˘ŕ¸ŕšŕ¸łŕ¸§ŕšŕ¸˛ âสิŕšŕ¸ŕ¸ŕ¸ľŕšŕšŕ¸ŕ¸˛ŕšŕ¸ŕšŕ¸ŕ¸ąŕšŕ¸ŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸˘ŕ¸šŕšŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸ŕ¸˘ŕ¸ŕšâ
ŕ¸ŕ¸šŕšŕ¸ŕ¸ŕ¸ŕ¸˛ŕ¸ŕšŕ¸ŕšŕšŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸´ŕ¸ŕ¸´ŕ¸ŕ¸ąŕ¸Ľŕ¸ŕ¸ľŕšŕ¸Şŕ¸Łŕšŕ¸˛ŕ¸ŕ¸ŕ¸ Layer 3 ญรมภLayer 4 ŕ¸ŕšŕ¸˛ŕ¸ŕšŕ¸ŕ¸ ŕ¸ŕšŕ¸˛ŕ¸ŕšŕ¸ŕ¸Ľŕ¸ŕ¸ŕ¸ŕ¸Łŕšŕ¸Ą ญรมŕ¸ŕ¸ŕšŕ¸˛ŕ¸ŕ¸Şŕ¸ŕ¸¸ŕ¸Ľŕšŕ¸ŕ¸´ŕ¸ŕšŕ¸Ťŕ¸Ąŕšŕ¸ŕ¸ľŕšŕ¸ŕ¸šŕšŕ¸Ąŕšŕ¸ŕšŕ¸˛ŕ¸ŕ¸ŕ¸˛ŕ¸ŕšŕ¸ŕ¸´ŕ¸Ą ŕšŕ¸ŕšŕšŕ¸ŕ¸ˇŕšŕ¸ŕ¸ŕ¸Ťŕ¸Ľŕ¸ąŕ¸ŕ¸ŕ¸ŕ¸ŕ¸Łŕ¸°ŕ¸ŕ¸ŕ¸ŕ¸°ŕ¸ŕ¸šŕ¸ŕšŕ¸§ŕšŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸ŕ¸˘ŕ¸ŕš
ŕšŕ¸Ľŕ¸°ŕ¸ŕšŕ¸˛ŕ¸Ąŕ¸ŕ¸ŕšŕ¸ŕšŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸˛ŕ¸Ł ŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸ŕ¸˘ŕ¸ŕšŕ¸ŕšŕšŕ¸Ťŕ¸Ąŕ¸ˇŕ¸ŕ¸ŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸´ŕ¸ŕšŕ¸ŕ¸ŕ¸Łŕšŕšŕ¸ŕšŕ¸ ŕ¸ŕ¸Łŕ¸ąŕšŕ¸ŕ¸Ťŕ¸ŕ¸śŕšŕ¸ŕ¸ŕ¸´ŕ¸ŕšŕ¸ŕ¸ŕ¸Łŕšŕšŕ¸ŕšŕ¸ŕ¸ŕšŕ¸ŕ¸šŕ¸ŕ¸Ąŕ¸ŕ¸ŕ¸§ŕšŕ¸˛ŕšŕ¸ŕšŕ¸˛ŕšŕ¸ŕ¸˘ŕ¸˛ŕ¸ ŕ¸ŕšŕ¸ŕ¸ŕ¸ŕ¸´ŕ¸Ąŕ¸ŕš http ŕ¸ŕšŕ¸ŕ¸ŕ¸Łŕ¸šŕšŕ¸ŕ¸ąŕ¸ TCP/IP ŕ¸ŕšŕ¸ŕ¸ŕ¸ŕ¸ąŕšŕ¸ proxy ŕšŕ¸ŕ¸ ŕšŕ¸ŕšŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸¸ŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸šŕšŕ¸ŕ¸ŕšŕ¸ŕšŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸´ŕ¸ŕšŕ¸ŕ¸ŕ¸Łŕšŕšŕ¸ŕšŕ¸ŕšŕ¸ŕ¸˘ŕšŕ¸Ąŕšŕ¸Łŕ¸šŕšŕ¸§ŕšŕ¸˛ŕšŕ¸ŕ¸ˇŕšŕ¸ŕ¸ŕ¸Ťŕ¸Ľŕ¸ąŕ¸ŕ¸Ąŕ¸ľŕ¸ŕ¸°ŕšŕ¸Łŕšŕ¸Ľŕ¸˘ ŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸ŕ¸˘ŕ¸ŕšŕ¸ŕ¸łŕ¸Ľŕ¸ąŕ¸ŕšŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸˛ŕ¸Ąŕšŕ¸Şŕšŕ¸ŕ¸ŕ¸˛ŕ¸ŕšŕ¸ŕ¸ľŕ¸˘ŕ¸§ŕ¸ŕ¸ąŕ¸ ŕšŕ¸ŕ¸Łŕšŕ¸ŕ¸ŕ¸ŕ¸Ľŕ¸ŕ¸łŕ¸Ľŕ¸ąŕ¸ŕ¸ŕ¸ŕ¸˘ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸Şŕ¸˛ŕ¸˘ŕ¸ŕ¸˛ ŕšŕ¸Ľŕ¸°ŕ¸§ŕ¸ąŕ¸ŕ¸Ťŕ¸ŕ¸śŕšŕ¸ŕšŕ¸Łŕ¸˛ŕ¸ŕ¸° âŕšŕ¸ŕšŕ¸Ąŕ¸ąŕ¸â ŕšŕ¸ŕ¸˘ŕšŕ¸Ąŕšŕ¸ŕšŕ¸ŕ¸ŕ¸Łŕ¸šŕšŕ¸§ŕšŕ¸˛ŕ¸Ąŕ¸ąŕ¸ŕ¸ŕ¸ˇŕ¸ŕ¸ŕ¸°ŕšŕ¸Ł
ญาŕ¸ŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸ŕšŕ¸§ŕ¸ŕšŕ¸Łŕ¸´ŕšŕ¸Ąŕ¸ŕšŕ¸ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸´ŕ¸ŕšŕ¸ŕ¸ŕ¸Łŕšŕšŕ¸ŕšŕ¸ŕšŕ¸ŕ¸˘ŕ¸¸ŕ¸ 1990 ŕ¸ŕ¸ŕ¸ŕ¸Ľŕ¸˛ŕ¸˘ŕšŕ¸ŕšŕ¸ŕšŕ¸ŕ¸Łŕ¸ŕ¸Şŕ¸Łŕšŕ¸˛ŕ¸ŕ¸Ťŕ¸Ľŕ¸ąŕ¸ŕ¸ŕ¸ŕ¸ŕšŕ¸Ľŕ¸ŕšŕ¸ŕ¸Şŕ¸ŕ¸ŕ¸ŕ¸¨ŕ¸§ŕ¸Łŕ¸Łŕ¸Š ŕšŕ¸Şŕšŕ¸ŕšŕ¸§ŕ¸Ľŕ¸˛ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸ŕ¸˘ŕ¸ŕšŕ¸ŕšŕ¸ŕ¸łŕ¸Ľŕ¸ąŕ¸ŕšŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸˛ŕ¸Ąŕ¸Łŕ¸ŕ¸˘ŕšŕ¸ŕšŕ¸˛ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸´ŕ¸ŕšŕ¸ŕ¸ŕ¸Łŕšŕšŕ¸ŕšŕ¸ ŕšŕ¸Ľŕ¸°ŕ¸ŕšŕ¸˛ŕšŕ¸Łŕ¸˛ŕšŕ¸ŕ¸ˇŕšŕ¸ŕ¸§ŕšŕ¸˛ŕ¸§ŕ¸ąŕ¸ŕ¸ŕ¸ąŕ¸ŕ¸Łŕ¸ŕ¸ŕ¸ŕšŕ¸ŕ¸ŕšŕ¸ŕšŕ¸Ľŕ¸˘ŕ¸ľŕ¸Ąŕ¸ľŕ¸ŕ¸ąŕ¸ŕ¸Ťŕ¸§ŕ¸°ŕ¸ŕ¸ŕ¸ŕ¸Ąŕ¸ąŕ¸ŕšŕ¸ŕ¸ ŕšŕ¸Łŕ¸˛ŕ¸ŕšŕ¸ŕ¸°ŕ¸Łŕ¸šŕšŕ¸§ŕšŕ¸˛ Bitcoin Standard ŕ¸ŕ¸ąŕšŕ¸ŕšŕ¸Ąŕšŕšŕ¸ŕšŕšŕ¸Łŕ¸ˇŕšŕ¸ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸ŕšŕ¸ŕ¸Ľŕšŕ¸ŕšŕ¸ ŕšŕ¸ŕšŕ¸Ąŕ¸ąŕ¸ŕšŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸śŕšŕ¸ŕšŕ¸Ľŕšŕ¸§
-
@ d360efec:14907b5f
2025-05-13 00:39:56đđ #BTC วิŕšŕ¸ŕ¸Łŕ¸˛ŕ¸°ŕ¸Ťŕš H2! ŕ¸ŕ¸¸ŕšŕ¸ŕ¸ŕ¸ 105K ŕšŕ¸Ľŕšŕ¸§ŕšŕ¸ŕ¸ŕšŕ¸Łŕ¸ŕ¸ŕ¸˛ŕ¸˘... ŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸˛ FVG 100.5K ŕšŕ¸ŕšŕ¸ŕ¸ŕ¸¸ŕ¸ŕ¸§ŕ¸ąŕ¸ŕšŕ¸! đđ
ŕ¸ŕ¸˛ŕ¸ŕ¸˛ŕ¸ŕ¸Łŕ¸§ŕ¸´ŕšŕ¸ŕ¸Łŕ¸˛ŕ¸°ŕ¸Ťŕšŕ¸ŕ¸˛ŕ¸ŕšŕ¸ŕ¸ŕ¸ŕ¸´ŕ¸ŕ¸Şŕ¸łŕ¸Ťŕ¸Łŕ¸ąŕ¸ #Bitcoin ŕšŕ¸ŕ¸ŕ¸Łŕ¸ŕ¸ŕšŕ¸§ŕ¸Ľŕ¸˛ H2:
สูŕ¸ŕ¸ŕ¸˛ŕ¸Ťŕšŕ¸ŕ¸ľŕšŕšŕ¸Ľŕšŕ¸§ #BTC ŕšŕ¸ŕšŕšŕ¸ŕ¸Łŕ¸ŕšŕ¸Ľŕ¸°ŕ¸ŕ¸¸ŕšŕ¸ŕ¸ŕ¸śŕšŕ¸ŕ¸ŕ¸˘ŕšŕ¸˛ŕ¸ŕšŕ¸ŕšŕ¸ŕšŕ¸ŕ¸Łŕšŕ¸ŕ¸ŕšŕ¸° đ⥠ŕšŕ¸ŕšŕšŕ¸Ąŕ¸ˇŕšŕ¸ŕ¸§ŕ¸ąŕ¸ŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸Łŕšŕ¸ŕ¸ľŕšŕ¸ŕšŕ¸˛ŕ¸ŕ¸Ąŕ¸˛ ราŕ¸ŕ¸˛ŕšŕ¸ŕšŕ¸ŕ¸śŕšŕ¸ŕšŕ¸ŕ¸ŕ¸ŕšŕ¸ŕ¸§ŕ¸ŕšŕ¸˛ŕ¸ŕ¸ŕ¸Łŕ¸´ŕšŕ¸§ŕ¸ 105,000 ŕ¸ŕ¸ŕ¸Ľŕ¸Ľŕ¸˛ŕ¸Łŕš ŕšŕ¸Ľŕšŕ¸§ŕšŕ¸ŕ¸ŕšŕ¸Łŕ¸ŕ¸ŕ¸˛ŕ¸˘ŕ¸˘ŕšŕ¸ŕ¸ŕ¸ąŕ¸§ŕ¸Ľŕ¸ŕ¸Ąŕ¸˛ŕ¸ŕ¸Ľŕ¸ŕ¸ŕ¸ŕ¸ąŕšŕ¸ŕ¸§ŕ¸ąŕ¸ŕ¸ŕšŕ¸° đ§ąđ
ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸ľŕš ระŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸ľŕšŕ¸ŕšŕ¸˛ŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸˘ŕšŕ¸˛ŕ¸ŕ¸˘ŕ¸´ŕšŕ¸ŕ¸ŕ¸ˇŕ¸ŕšŕ¸ŕ¸ H4 FVG (Fair Value Gap ŕšŕ¸ŕ¸ŕ¸Łŕ¸˛ŕ¸ 4 ŕ¸ŕ¸ąŕšŕ¸§ŕšŕ¸Ąŕ¸) ŕ¸ŕ¸ľŕš 100,500 ŕ¸ŕ¸ŕ¸Ľŕ¸Ľŕ¸˛ŕ¸Łŕš ŕ¸ŕšŕ¸° đŻ (FVG ŕ¸ŕ¸ˇŕ¸ŕšŕ¸ŕ¸ŕ¸ŕ¸ľŕšŕ¸Łŕ¸˛ŕ¸ŕ¸˛ŕ¸§ŕ¸´ŕšŕ¸ŕ¸ŕšŕ¸˛ŕ¸ŕšŕ¸ŕšŕ¸Łŕšŕ¸§ŕš ŕšŕ¸Ľŕ¸°ŕ¸Ąŕ¸ąŕ¸ŕšŕ¸ŕšŕ¸ŕ¸ŕ¸Łŕ¸´ŕšŕ¸§ŕ¸ŕ¸ŕ¸ľŕšŕ¸Łŕ¸˛ŕ¸ŕ¸˛ŕ¸Ąŕ¸ľŕšŕ¸ŕ¸ŕ¸˛ŕ¸Şŕ¸ŕ¸Ľŕ¸ąŕ¸ŕ¸Ąŕ¸˛ŕ¸ŕ¸ŕ¸Şŕ¸ŕ¸/ŕšŕ¸ŕ¸´ŕ¸Ąŕšŕ¸ŕšŕ¸Ą)
đ ŕšŕ¸ŕ¸ FVG ŕ¸ŕ¸ľŕš 100.5K ŕ¸ŕ¸ľŕš ยูŕ¸ŕ¸ŕ¸ŕšŕ¸ŕšŕ¸ Area of Interest ŕ¸ŕ¸ľŕšŕ¸ŕšŕ¸˛ŕ¸Şŕ¸ŕšŕ¸ŕ¸Şŕ¸łŕ¸Ťŕ¸Łŕ¸ąŕ¸ŕ¸Ąŕ¸ŕ¸ŕ¸Ťŕ¸˛ŕ¸ŕ¸ąŕ¸ŕ¸Ťŕ¸§ŕ¸° Long ŕšŕ¸ŕ¸ˇŕšŕ¸ŕ¸Ľŕ¸¸ŕšŕ¸ŕ¸ŕ¸˛ŕ¸Łŕ¸ŕ¸śŕšŕ¸ŕšŕ¸ŕ¸ŕ¸Ľŕ¸ˇŕšŕ¸ŕ¸Ľŕ¸šŕ¸ŕ¸ŕ¸ąŕ¸ŕšŕ¸ŕ¸ŕšŕ¸°!
đ¤đĄ ŕ¸ŕ¸˘ŕšŕ¸˛ŕ¸ŕšŕ¸Łŕ¸ŕšŕ¸ŕ¸˛ŕ¸Ą ŕ¸ŕ¸˛ŕ¸Łŕ¸ŕ¸ąŕ¸ŕ¸Şŕ¸´ŕ¸ŕšŕ¸ŕšŕ¸ŕšŕ¸˛ Long ญรมŕ¸ŕšŕ¸ŕ¸Łŕ¸ŕ¸ŕ¸ľŕšŕ¸ŕ¸Łŕ¸´ŕšŕ¸§ŕ¸ŕ¸ŕ¸ľŕš ŕ¸ŕ¸śŕšŕ¸ŕ¸ŕ¸˘ŕ¸šŕšŕ¸ŕ¸ąŕ¸ŕ¸§ŕšŕ¸˛ŕ¸Łŕ¸˛ŕ¸ŕ¸˛ ŕšŕ¸Şŕ¸ŕ¸ŕ¸ŕ¸ŕ¸´ŕ¸ŕ¸´ŕ¸Łŕ¸´ŕ¸˘ŕ¸˛ŕ¸ŕ¸˘ŕšŕ¸˛ŕ¸ŕšŕ¸Łŕšŕ¸Ąŕ¸ˇŕšŕ¸ŕ¸Ąŕ¸˛ŕ¸ŕ¸śŕ¸ŕšŕ¸ŕ¸ 100.5K ŕ¸ŕ¸ľŕš ŕšŕ¸ŕ¸ˇŕšŕ¸ŕ¸˘ŕ¸ˇŕ¸ŕ¸˘ŕ¸ąŕ¸ŕ¸Şŕ¸ąŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸Şŕ¸łŕ¸Ťŕ¸Łŕ¸ąŕ¸ŕ¸ŕ¸˛ŕ¸Łŕšŕ¸ŕ¸Ľŕ¸ˇŕšŕ¸ŕ¸ŕšŕ¸Ťŕ¸§ŕ¸ŕ¸ľŕšŕ¸ŕ¸°ŕ¸ŕ¸śŕšŕ¸ŕ¸Şŕ¸šŕ¸ŕ¸ŕ¸§ŕšŕ¸˛ŕšŕ¸ŕ¸´ŕ¸Ąŕ¸ŕšŕ¸°!
ŕšŕ¸ŕšŕ¸˛ŕ¸ŕ¸š Price Action ŕ¸ŕ¸ľŕšŕ¸Łŕ¸°ŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸ľŕšŕ¸ŕ¸˘ŕšŕ¸˛ŕ¸ŕšŕ¸ŕ¸Ľŕšŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸°ŕ¸ŕ¸°! đ
BTC #Bitcoin #Crypto #ŕ¸ŕ¸Łŕ¸´ŕ¸ŕšŕ¸ #TechnicalAnalysis #Trading #FVG #FairValueGap #PriceAction #MarketAnalysis #฼ŕ¸ŕ¸ŕ¸¸ŕ¸ŕ¸ŕ¸Łŕ¸´ŕ¸ŕšŕ¸ #วิŕšŕ¸ŕ¸Łŕ¸˛ŕ¸°ŕ¸Ťŕšŕ¸ŕ¸Łŕ¸˛ŕ¸ #TradeSetup #ŕ¸ŕšŕ¸˛ŕ¸§ŕ¸ŕ¸Łŕ¸´ŕ¸ŕšŕ¸ #ŕ¸ŕ¸Ľŕ¸˛ŕ¸ŕ¸ŕ¸Łŕ¸´ŕ¸ŕšŕ¸
-
@ d360efec:14907b5f
2025-05-12 04:01:23 -
@ 91117f2b:111207d6
2025-05-28 15:32:35When Nigerians and Americans collide as nigerians call it (jam). Hilarity ensues: Some humerus observations:
FOOD FIGHTS Americans: pizza(sauce and cheese flying everywhere). Pie: (especially creamed-filled or fruit pies 𼧠tacos: (crunchy shells and soft fillings make for a messy fight). Nigerians đłđŹ :you call that a meal? Where is the pounded yam(white any molded, heavy and soft most suitable for messđ
Americans đşđ¸ :you mean you eat fufu with your hands? That's adventurous.
DANCE BATTLE NIGERIANS đłđŹ : Azonto, poco Lee shaku Shakur. AMERICANS đşđ¸ : Gangnam style
MUSIC PREFERENCES Nigerians đłđŹ : afrobeats all day Americans đşđ¸ :country road, take me home.
Despite this differences both cultures share a love for food, good music and laughter. Who knows maybe one day, we will see a đłđŹ -America đşđ¸ fusion cruisine Jollof burger and suya tacos? đ´đ
FESTIVAL AND CELEBRATION
Nigerians đłđŹ : colorful cultural festival like oshogbo,eyo, esun. Americans đşđ¸ :independence day, Halloween Thanksgiving, diverse cultural celebration.
If Nigerians were to try halloween we would be referred to as winch. (witch).
This differences highlight the unique aspects of each culture, showcasing the beauty of diversity and understanding of understanding and appreciation.
COMMUNICATION STYLE Americans: uh hi what's your name? Nigerians: watin be your name?
Let's dive deeper GREETINGS
Americans: hey "what's up?
Nigerians: how is your family, your parents, siblings. Oya greet them for me " Nigerians love to make sure all of the family members have been asked about đ
FAMILY GATHERING Americans:"just me, my parents and my cat" Nigerians: "come, and meet my 50 cousins"
RELATIONSHIP In America đşđ¸ it is normal for teenagers to be in a relationship, you can see a boy or girl alone in a room and the parent won't say shit. IN Nigeria đłđŹ as a teenager if you are caught with a girl or boy alone in a room, just pray to survive the night especially if your parents are warriors (they don't mess around).
IN America đşđ¸ if a teenager tells his parents "mom dad I love him or her and I will leave the house if you don't allow us to be" the parent will allow them. IN Nigeria đłđŹ, Tell them you are in love with your lover, and if they don't allow you to be together you will leave the house their response will be shocking even to you đđ the child.
Americans đşđ¸ : they do some activities like kiss or grab whereby a guy or girl choose between to kiss or to grab a stranger in the ass. Nigerians đłđŹ : if you are are caught in the street, you can will be referred to as oscroh (prostitute) and will be chased away.
Americans has more liberty but in Nigeria you are always watched by your parent, parents friends or anyone at all.
But the two countries has been a lot of things in common
-
@ d360efec:14907b5f
2025-05-12 01:34:24สวูสŕ¸ŕ¸ľŕ¸ŕšŕ¸°ŕšŕ¸ŕ¸ˇŕšŕ¸ŕ¸ŕš ŕ¸ŕ¸ąŕ¸ŕšŕ¸ŕ¸Łŕ¸ŕ¸ŕ¸ľŕšŕ¸ŕšŕ¸˛ŕ¸Łŕ¸ąŕ¸ŕ¸ŕ¸¸ŕ¸ŕ¸ŕ¸! đ Lina Engword ŕ¸ŕ¸Ľŕ¸ąŕ¸ŕ¸Ąŕ¸˛ŕ¸ŕ¸Łŕšŕ¸ŕ¸Ąŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸˛ŕ¸Łŕ¸§ŕ¸´ŕšŕ¸ŕ¸Łŕ¸˛ŕ¸°ŕ¸Ťŕš BTCUSDT.P ŕšŕ¸ŕ¸ŕšŕ¸ŕ¸˛ŕ¸°ŕ¸Ľŕ¸śŕ¸ŕšŕ¸ŕ¸ˇŕšŕ¸ŕšŕ¸ŕ¸Łŕ¸ľŕ¸˘ŕ¸Ąŕ¸ŕ¸Łŕšŕ¸ŕ¸Ąŕ¸Şŕ¸łŕ¸Ťŕ¸Łŕ¸ąŕ¸ŕšŕ¸ŕ¸Łŕ¸ŕ¸§ŕ¸ąŕ¸ŕ¸ŕ¸ľŕšŕ¸ŕšŕ¸°! đ
วูŕ¸ŕ¸ŕ¸ľŕš 12 ŕ¸ŕ¸¤ŕ¸Šŕ¸ าŕ¸ŕ¸Ą 2568 ŕšŕ¸§ŕ¸Ľŕ¸˛ 08.15ŕ¸. ราŕ¸ŕ¸˛ BTCUSDT.P ŕ¸ŕ¸˘ŕ¸šŕšŕ¸ŕ¸ľŕš 104,642.8 USDT ŕ¸ŕšŕ¸° ŕšŕ¸ŕ¸˘ŕ¸Ąŕ¸ľ Previous Weekly High (PWH) ŕ¸ŕ¸˘ŕ¸šŕšŕ¸ŕ¸ľŕš 104,967.8 Previous Weekly Low (PWL) ŕ¸ŕ¸ľŕš 93,338 ŕ¸ŕšŕ¸°
⨠ภาŕ¸ŕ¸Łŕ¸§ŕ¸Ąŕ¸ŕ¸Ľŕ¸˛ŕ¸ŕ¸§ŕ¸ąŕ¸ŕ¸ŕ¸ľŕš â¨
ŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸˛ŕ¸Łŕ¸§ŕ¸´ŕšŕ¸ŕ¸Łŕ¸˛ŕ¸°ŕ¸Ťŕšŕ¸ŕšŕ¸§ŕ¸˘ŕšŕ¸ŕ¸Łŕ¸ˇŕšŕ¸ŕ¸ŕ¸Ąŕ¸ˇŕ¸ŕ¸ŕ¸šŕšŕšŕ¸ŕ¸ŕ¸ŕ¸ŕšŕ¸Łŕ¸˛ ŕ¸ŕ¸ąŕšŕ¸ SMC/ICT (Demand/Supply Zone, Order Block, Liquidity), EMA 50/200, Trend Strength, Money Flow, Chart/Price Pattern, Premium/Discount Zone, Trend line, Fibonacci, Elliott Wave ŕšŕ¸Ľŕ¸° Dow Theory ŕšŕ¸ Timeframe ŕ¸ŕ¸ąŕšŕ¸ŕšŕ¸ŕš 15m ŕšŕ¸ŕ¸ŕ¸ŕ¸ŕ¸śŕ¸ Week! đ ŕšŕ¸Łŕ¸˛ŕ¸ŕ¸ŕ¸§ŕšŕ¸˛ŕ¸ าŕ¸ŕšŕ¸Ťŕ¸ŕšŕ¸ŕ¸ŕ¸ BTCUSDT.P ยูŕ¸ŕ¸ŕ¸ŕ¸ŕ¸˘ŕ¸šŕšŕšŕ¸ŕšŕ¸ŕ¸§ŕšŕ¸ŕšŕ¸Ąŕ¸ŕ¸˛ŕ¸ŕ¸śŕšŕ¸ŕ¸ŕ¸ľŕšŕšŕ¸ŕšŕ¸ŕšŕ¸ŕ¸Łŕšŕ¸ŕ¸Ąŕ¸˛ŕ¸ŕš ŕ¸ŕšŕ¸° đ ŕšŕ¸ŕ¸˘ŕšŕ¸ŕ¸ŕ¸˛ŕ¸°ŕšŕ¸ Timeframe Day ŕšŕ¸Ľŕ¸° Week ŕ¸ŕ¸ľŕšŕ¸Şŕ¸ąŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸¸ŕ¸ŕ¸ŕ¸˘ŕšŕ¸˛ŕ¸ŕ¸Şŕ¸ŕ¸ąŕ¸ŕ¸Şŕ¸ŕ¸¸ŕ¸ŕ¸ŕ¸´ŕ¸¨ŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸śŕšŕ¸ŕ¸ŕ¸˘ŕšŕ¸˛ŕ¸ŕ¸ŕ¸ąŕ¸ŕšŕ¸ŕ¸ Money Flow ยูŕ¸ŕšŕ¸Ťŕ¸Ľŕšŕ¸ŕšŕ¸˛ŕ¸ŕ¸˘ŕšŕ¸˛ŕ¸ŕ¸ŕšŕ¸ŕšŕ¸ŕ¸ˇŕšŕ¸ŕ¸ ŕšŕ¸Ľŕ¸°ŕšŕ¸Łŕ¸˛ŕšŕ¸Ťŕšŕ¸ŕšŕ¸ŕ¸Łŕ¸ŕ¸Şŕ¸Łŕšŕ¸˛ŕ¸ŕ¸ŕ¸Ľŕ¸˛ŕ¸ŕšŕ¸ŕ¸ Dow Theory ŕ¸ŕ¸ľŕšŕ¸˘ŕ¸ High ยภLow ŕ¸ŕ¸śŕšŕ¸ŕšŕ¸ŕšŕ¸Łŕ¸ˇŕšŕ¸ŕ¸˘ŕš ŕ¸ŕšŕ¸°
ŕ¸ŕ¸˘ŕšŕ¸˛ŕ¸ŕšŕ¸Łŕ¸ŕšŕ¸ŕ¸˛ŕ¸Ą... ŕšŕ¸ Timeframe สูŕšŕ¸ŕš ŕ¸ŕ¸˘ŕšŕ¸˛ŕ¸ 15m ŕšŕ¸Ľŕ¸° 1H ŕšŕ¸Łŕ¸´ŕšŕ¸Ąŕšŕ¸Ťŕšŕ¸ŕ¸Şŕ¸ąŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸˛ŕ¸Łŕ¸ŕ¸°ŕ¸Ľŕ¸ŕ¸ŕ¸ąŕ¸§ŕšŕ¸Ľŕ¸°ŕ¸ŕ¸˛ŕ¸Łŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸ŕšŕ¸˛ŕ¸ŕšŕ¸Ľŕšŕ¸§ŕ¸ŕšŕ¸° đ ŕ¸ŕ¸˛ŕ¸ŕ¸Ąŕ¸ľŕ¸ŕ¸˛ŕ¸Łŕ¸Şŕ¸Łŕšŕ¸˛ŕ¸ Buyside ŕšŕ¸Ľŕ¸° Sellside Liquidity รŕ¸ŕšŕ¸Ťŕšŕ¸Łŕ¸˛ŕ¸ŕ¸˛ŕšŕ¸ŕ¸ŕ¸§ŕ¸˛ŕ¸ŕ¸ŕšŕ¸ŕ¸ŕ¸ŕ¸ľŕšŕ¸ŕ¸°ŕšŕ¸Ľŕ¸ˇŕ¸ŕ¸ŕ¸ŕ¸˛ŕ¸ŕšŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸Ťŕ¸ŕ¸śŕšŕ¸ ŕ¸ŕ¸śŕšŕ¸ŕšŕ¸ŕšŕ¸ŕšŕ¸Łŕ¸ˇŕšŕ¸ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸˛ŕ¸Łŕšŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸ŕ¸ Smart Money ŕ¸ŕšŕ¸°
⥠ŕšŕ¸ŕ¸Łŕ¸ľŕ¸˘ŕ¸ŕšŕ¸ŕ¸ľŕ¸˘ŕ¸ŕšŕ¸ŕ¸§ŕšŕ¸ŕšŕ¸Ąŕšŕ¸ŕšŕ¸Ľŕ¸° Timeframe âĄ
đŞ ŕšŕ¸ŕ¸§ŕšŕ¸ŕšŕ¸Ąŕ¸ŕ¸Łŕ¸ŕ¸ŕ¸ąŕ¸ Timeframe 4H, Day, Week สŕšŕ¸§ŕ¸ŕšŕ¸Ťŕ¸ŕšŕ¸ŕ¸ľŕšŕšŕ¸ŕ¸ŕ¸˛ŕ¸ "ŕ¸ŕ¸˛ŕ¸ŕ¸śŕšŕ¸" ŕ¸ŕšŕ¸° ŕ¸ŕ¸¸ŕ¸ŕšŕ¸ŕ¸Łŕ¸ˇŕšŕ¸ŕ¸ŕ¸Ąŕ¸ˇŕ¸ŕ¸Şŕ¸ŕ¸ąŕ¸ŕ¸Şŕ¸ŕ¸¸ŕ¸ŕšŕ¸ŕ¸§ŕšŕ¸ŕšŕ¸Ąŕ¸ŕ¸ľŕšŕ¸ŕ¸˘ŕšŕ¸˛ŕ¸ŕšŕ¸ŕšŕ¸ŕšŕ¸ŕ¸Łŕšŕ¸ đŞ ŕšŕ¸ŕšŕ¸˛ŕ¸Ťŕ¸Ąŕ¸˛ŕ¸˘ŕ¸ŕšŕ¸ŕšŕ¸ŕ¸ŕ¸ˇŕ¸ŕ¸ŕ¸˛ŕ¸Łŕšŕ¸ŕ¸ŕ¸ŕ¸Şŕ¸ŕ¸ PWH ŕšŕ¸Ľŕ¸° High ŕšŕ¸ŕ¸´ŕ¸Ą ŕšŕ¸ŕ¸ˇŕšŕ¸ŕ¸Şŕ¸Łŕšŕ¸˛ŕ¸ All-Time High ŕšŕ¸Ťŕ¸Ąŕšŕ¸ŕšŕ¸°! đŞ ŕšŕ¸ŕ¸§ŕšŕ¸ŕšŕ¸Ąŕ¸ŕšŕ¸˛ŕ¸ŕ¸ŕ¸ąŕ¸ Timeframe 15m, 1H ยูŕ¸ŕ¸ŕšŕ¸ŕ¸ŕ¸ŕšŕ¸˛ŕ¸ "Sideways" ญรมภ"Sideways Down ŕšŕ¸Ľŕšŕ¸ŕ¸ŕšŕ¸ŕ¸˘" ŕ¸ŕšŕ¸° ล฾ŕ¸ŕ¸˛ŕ¸Łŕ¸ŕ¸ľŕ¸ŕ¸ŕ¸ąŕ¸§ŕ¸ŕ¸ŕ¸ŕ¸Łŕ¸˛ŕ¸ŕ¸˛ŕšŕ¸Ľŕ¸°ŕ¸ŕ¸˛ŕ¸ŕ¸Ąŕ¸ľŕ¸ŕ¸˛ŕ¸Łŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸Şŕ¸ąŕšŕ¸ŕš ŕ¸ŕ¸śŕšŕ¸ŕšŕ¸ŕšŕ¸ŕšŕ¸ŕ¸ŕ¸˛ŕ¸Şŕšŕ¸ŕ¸ŕ¸˛ŕ¸Łŕ¸Ťŕ¸˛ŕ¸ŕ¸ąŕ¸ŕ¸Ťŕ¸§ŕ¸°ŕšŕ¸ŕšŕ¸˛ Long ŕ¸ŕ¸ľŕšŕ¸Łŕ¸˛ŕ¸ŕ¸˛ŕ¸ŕ¸ľŕ¸ŕ¸śŕšŕ¸ŕ¸ŕšŕ¸°
đĄ วิŕ¸ŕ¸ľŕ¸ŕ¸´ŕ¸ŕšŕ¸ŕ¸ Market Slayer đĄ
ŕšŕ¸Ąŕ¸ˇŕšŕ¸ŕšŕ¸ŕ¸§ŕšŕ¸ŕšŕ¸Ąŕšŕ¸Ťŕ¸ŕšŕšŕ¸ŕšŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸śŕšŕ¸ŕ¸ŕ¸ľŕšŕšŕ¸ŕšŕ¸ŕšŕ¸ŕ¸Łŕšŕ¸ ŕšŕ¸Łŕ¸˛ŕ¸ŕ¸°ŕšŕ¸ŕšŕ¸ŕ¸Ťŕ¸˛ŕ¸ŕ¸ąŕ¸ŕ¸Ťŕ¸§ŕ¸°ŕšŕ¸ŕšŕ¸˛ Long ŕšŕ¸ŕšŕ¸ŕ¸Ťŕ¸Ľŕ¸ąŕ¸ŕ¸ŕšŕ¸° ŕ¸ŕ¸˛ŕ¸Łŕ¸˘ŕšŕ¸ŕ¸ŕ¸ąŕ¸§ŕ¸Ľŕ¸ŕ¸Ąŕ¸˛ŕšŕ¸ŕ¸Łŕ¸°ŕ¸˘ŕ¸°ŕ¸Şŕ¸ąŕšŕ¸ŕ¸ŕ¸ˇŕ¸ŕšŕ¸ŕ¸ŕ¸˛ŕ¸Şŕ¸ŕ¸ŕ¸ŕšŕ¸Łŕ¸˛ŕšŕ¸ŕ¸ŕ¸˛ŕ¸Łŕšŕ¸ŕšŕ¸ŕ¸ŕ¸ŕ¸! đď¸ ŕšŕ¸Łŕ¸˛ŕ¸ŕ¸°ŕšŕ¸ŕšŕ¸Ťŕ¸Ľŕ¸ąŕ¸ŕ¸ŕ¸˛ŕ¸Ł SMC/ICT ญาŕšŕ¸ŕ¸ Demand ญรมภOrder Block ŕ¸ŕ¸ľŕš Smart Money ŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸°ŕšŕ¸ŕšŕ¸˛ŕ¸Ąŕ¸˛ŕ¸ŕ¸ąŕ¸ŕ¸Łŕ¸˛ŕ¸ŕ¸˛ŕ¸ŕ¸śŕšŕ¸ ŕšŕ¸Ľŕ¸°ŕ¸Łŕ¸ŕ¸Şŕ¸ąŕ¸ŕ¸ŕ¸˛ŕ¸ Price Action ยมŕ¸ŕ¸˘ŕ¸ąŕ¸ŕ¸ŕ¸˛ŕ¸Łŕ¸ŕ¸Ľŕ¸ąŕ¸ŕ¸ŕ¸ąŕ¸§ŕ¸ŕšŕ¸°
สรุŕ¸ŕšŕ¸ŕ¸§ŕšŕ¸ŕšŕ¸Ąŕ¸§ŕ¸ąŕ¸ŕ¸ŕ¸ľŕš:
đŞ ŕ¸Łŕ¸°ŕ¸˘ŕ¸°ŕ¸Şŕ¸ąŕšŕ¸: Sideways to Sideways Down (ŕšŕ¸ŕ¸ŕ¸˛ŕ¸Ş 55%) âď¸âď¸ đŞ ŕ¸Łŕ¸°ŕ¸˘ŕ¸°ŕ¸ŕ¸Ľŕ¸˛ŕ¸: ŕ¸ŕ¸˛ŕ¸ŕ¸śŕšŕ¸ (ŕšŕ¸ŕ¸ŕ¸˛ŕ¸Ş 70%) âď¸ đŞ ŕ¸Łŕ¸°ŕ¸˘ŕ¸°ŕ¸˘ŕ¸˛ŕ¸§: ŕ¸ŕ¸˛ŕ¸ŕ¸śŕšŕ¸ (ŕšŕ¸ŕ¸ŕ¸˛ŕ¸Ş 85%) đ đŞ ŕ¸§ŕ¸ąŕ¸ŕ¸ŕ¸ľŕš: ล฾ŕšŕ¸ŕ¸ŕ¸˛ŕ¸Şŕ¸˘ŕšŕ¸ŕ¸ŕ¸ąŕ¸§ŕšŕ¸Ľŕšŕ¸ŕ¸ŕšŕ¸ŕ¸˘ŕ¸ŕšŕ¸ŕ¸ŕ¸ŕ¸°ŕ¸Ąŕ¸ľŕšŕ¸Łŕ¸ŕ¸ŕ¸ˇŕšŕ¸ŕ¸ŕ¸Ľŕ¸ąŕ¸ŕšŕ¸ŕšŕ¸˛ŕ¸Ąŕ¸˛ŕšŕ¸ŕ¸ˇŕšŕ¸ŕšŕ¸ŕ¸ŕ¸ŕ¸Şŕ¸ŕ¸ PWH (ŕšŕ¸ŕ¸ŕ¸˛ŕ¸Ş Sideways Down ŕšŕ¸Ľŕšŕ¸ŕ¸ŕšŕ¸ŕ¸˘ ส฼ูŕ¸ŕ¸ŕ¸ąŕ¸ Sideways Up: 60%) đ˘
đď¸ Daily Trade Setup ŕ¸ŕ¸Łŕ¸°ŕ¸ŕ¸łŕ¸§ŕ¸ąŕ¸ŕ¸ŕ¸ľŕš đď¸
ŕ¸ŕ¸ľŕšŕ¸ŕ¸ˇŕ¸ŕ¸ŕ¸ąŕ¸§ŕ¸ŕ¸˘ŕšŕ¸˛ŕ¸ Setup ŕ¸ŕ¸ľŕš Lina ŕšŕ¸ŕ¸Łŕ¸ľŕ¸˘ŕ¸Ąŕšŕ¸§ŕšŕšŕ¸Ťŕšŕ¸ŕ¸´ŕ¸ŕ¸˛ŕ¸Łŕ¸ŕ¸˛ŕ¸ŕšŕ¸° (ŕšŕ¸ŕšŕ¸ŕ¸˘ŕšŕ¸łŕ¸§ŕšŕ¸˛ŕšŕ¸ŕšŕ¸ŕšŕ¸ŕ¸ľŕ¸˘ŕ¸ŕšŕ¸ŕ¸§ŕ¸ŕ¸˛ŕ¸ ŕšŕ¸Ąŕšŕšŕ¸ŕšŕ¸ŕ¸łŕšŕ¸ŕ¸°ŕ¸ŕ¸łŕ¸Ľŕ¸ŕ¸ŕ¸¸ŕ¸ŕ¸ŕ¸°ŕ¸ŕ¸°)
1ď¸âŁ ŕ¸ŕ¸ąŕ¸§ŕ¸ŕ¸˘ŕšŕ¸˛ŕ¸ŕ¸ŕ¸ľŕš 1: รŕ¸ŕ¸Łŕ¸ąŕ¸ŕ¸ŕ¸ľŕšŕšŕ¸ŕ¸ Demand (ŕ¸ŕ¸Ľŕ¸ŕ¸ŕ¸ ูย, รŕ¸ŕ¸˘ŕ¸ˇŕ¸ŕ¸˘ŕ¸ąŕ¸)
đŞ Enter: รŕ¸ŕ¸Łŕ¸˛ŕ¸ŕ¸˛ŕ¸˘ŕšŕ¸ŕ¸ŕ¸ąŕ¸§ŕ¸Ľŕ¸ŕ¸Ąŕ¸˛ŕšŕ¸ŕšŕ¸ŕ¸ Demand Zone ญรมภBullish Order Block ŕ¸ŕ¸ľŕšŕ¸ŕšŕ¸˛ŕ¸Şŕ¸ŕšŕ¸ŕšŕ¸ TF 1H/4H (ŕ¸ŕ¸šŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸Łŕ¸˛ŕ¸ŕ¸ŕ¸Łŕ¸°ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸°ŕ¸ŕ¸°) ŕšŕ¸Ľŕ¸°ŕšŕ¸ŕ¸´ŕ¸ŕ¸Şŕ¸ąŕ¸ŕ¸ŕ¸˛ŕ¸ Bullish Price Action ŕ¸ŕ¸ľŕšŕ¸ŕ¸ąŕ¸ŕšŕ¸ŕ¸ ŕšŕ¸ŕšŕ¸ ŕšŕ¸ŕšŕ¸ŕšŕ¸ŕ¸ľŕ¸˘ŕ¸ŕ¸ŕ¸Ľŕ¸ˇŕ¸ŕ¸ŕ¸´ŕ¸ (Engulfing) ญรมภHammer đŞ TP: ŕ¸ŕ¸Łŕ¸´ŕšŕ¸§ŕ¸ PWH 104,967.8 ญรมภBuyside Liquidity ŕ¸ŕ¸ąŕ¸ŕšŕ¸ đŻ đŞ SL: ŕšŕ¸ŕš Low ŕ¸ŕ¸ľŕšŕšŕ¸ŕ¸´ŕ¸ŕ¸ŕšŕ¸ŕ¸ŕ¸Şŕ¸ąŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸Ľŕ¸ąŕ¸ŕ¸ŕ¸ąŕ¸§ŕšŕ¸Ľŕšŕ¸ŕ¸ŕšŕ¸ŕ¸˘ ญรมŕ¸ŕšŕ¸ŕš Demand Zone ŕ¸ŕ¸ľŕšŕšŕ¸ŕšŕ¸˛ đĄď¸ đŞ RRR: ŕ¸ŕ¸Łŕ¸°ŕ¸Ąŕ¸˛ŕ¸ 1:2.5 ŕ¸ŕ¸śŕšŕ¸ŕšŕ¸ ⨠đŞ ŕ¸ŕ¸ŕ¸´ŕ¸ŕ¸˛ŕ¸˘: Setup ŕ¸ŕ¸ľŕšŕšŕ¸Łŕ¸˛ŕ¸ŕ¸°ŕšŕ¸ŕšŕ¸˘ŕšŕ¸ŕš รŕ¸ŕšŕ¸Ťŕšŕ¸Łŕ¸˛ŕ¸ŕ¸˛ŕ¸Ľŕ¸ŕ¸Ąŕ¸˛ŕšŕ¸ŕšŕ¸ŕ¸ŕ¸ŕ¸ľŕšŕ¸Ąŕ¸ľŕšŕ¸ŕ¸ŕ¸˛ŕ¸Şŕšŕ¸ŕ¸ŕšŕ¸Łŕ¸ŕ¸ŕ¸ˇŕšŕ¸ŕšŕ¸˘ŕ¸ŕ¸°ŕš ŕ¸ŕ¸˛ŕ¸Ąŕ¸Ťŕ¸Ľŕ¸ąŕ¸ SMC/ICT ŕšŕ¸Ľŕšŕ¸§ŕ¸ŕšŕ¸ŕ¸˘ŕšŕ¸ŕšŕ¸˛ ŕšŕ¸ŕ¸ˇŕšŕ¸ŕšŕ¸Ťŕšŕšŕ¸ŕšŕ¸Łŕ¸˛ŕ¸ŕ¸˛ŕ¸ŕ¸ľŕšŕ¸ŕ¸ľŕšŕ¸Ľŕ¸°ŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕšŕ¸Şŕ¸ľŕšŕ¸˘ŕ¸ŕ¸ŕšŕ¸łŕ¸ŕšŕ¸° ŕ¸ŕšŕ¸ŕ¸ŕ¸Łŕ¸ŕ¸Şŕ¸ąŕ¸ŕ¸ŕ¸˛ŕ¸ Price Action ยมŕ¸ŕ¸˘ŕ¸ąŕ¸ŕ¸ŕšŕ¸ŕ¸ŕ¸ŕ¸°ŕ¸ŕ¸° âď¸
2ď¸âŁ ŕ¸ŕ¸ąŕ¸§ŕ¸ŕ¸˘ŕšŕ¸˛ŕ¸ŕ¸ŕ¸ľŕš 2: Follow Breakout (สายŕ¸ŕ¸šŕš, รูŕ¸ŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕšŕ¸Şŕ¸ľŕšŕ¸˘ŕ¸ŕšŕ¸ŕš)
đŞ Enter: ŕšŕ¸ŕšŕ¸˛ Long ŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸ľŕšŕ¸Ąŕ¸ˇŕšŕ¸ŕ¸Łŕ¸˛ŕ¸ŕ¸˛ŕ¸Şŕ¸˛ŕ¸Ąŕ¸˛ŕ¸Łŕ¸ Breakout ŕšŕ¸Ťŕ¸ŕ¸ˇŕ¸ High ฼ŕšŕ¸˛ŕ¸Şŕ¸¸ŕ¸ŕšŕ¸ TF 15m ญรมภ1H ŕ¸ŕ¸Łŕšŕ¸ŕ¸Ą Volume ŕ¸ŕ¸ľŕšŕšŕ¸ŕ¸´ŕšŕ¸Ąŕ¸ŕ¸śŕšŕ¸ŕ¸ŕ¸˘ŕšŕ¸˛ŕ¸ŕ¸Ąŕ¸ľŕ¸ŕ¸ąŕ¸˘ŕ¸Şŕ¸łŕ¸ŕ¸ąŕ¸ đĽ đŞ TP: ŕ¸ŕ¸Łŕ¸´ŕšŕ¸§ŕ¸ PWH 104,967.8 ญรมภBuyside Liquidity ŕ¸ŕ¸ąŕ¸ŕšŕ¸ đ đŞ SL: ŕšŕ¸ŕš High ŕ¸ŕšŕ¸ŕ¸ŕ¸Ťŕ¸ŕšŕ¸˛ŕ¸ŕ¸ľŕšŕ¸ŕ¸šŕ¸ Breakout ŕšŕ¸Ľŕšŕ¸ŕ¸ŕšŕ¸ŕ¸˘ đ§ đŞ RRR: ŕ¸ŕ¸Łŕ¸°ŕ¸Ąŕ¸˛ŕ¸ 1:3 ŕ¸ŕ¸śŕšŕ¸ŕšŕ¸ ⨠đŞ ŕ¸ŕ¸ŕ¸´ŕ¸ŕ¸˛ŕ¸˘: Setup ŕ¸ŕ¸ľŕšŕšŕ¸Ťŕ¸Ąŕ¸˛ŕ¸°ŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸ŕ¸ŕ¸ľŕšŕ¸ŕ¸˘ŕ¸˛ŕ¸ŕšŕ¸ŕšŕ¸˛ŕšŕ¸§ŕšŕ¸Ąŕ¸ˇŕšŕ¸ŕšŕ¸Ťŕšŕ¸ŕšŕ¸Ąŕšŕ¸Ąŕ¸ŕ¸ŕ¸ąŕ¸Ąŕšŕ¸Łŕ¸ŕš ŕ¸ŕšŕ¸° ŕšŕ¸Łŕ¸˛ŕ¸ŕ¸°ŕšŕ¸ŕšŕ¸˛ŕšŕ¸Ąŕ¸ˇŕšŕ¸ŕ¸Łŕ¸˛ŕ¸ŕ¸˛ Breakout ŕšŕ¸ŕ¸§ŕ¸ŕšŕ¸˛ŕ¸ŕ¸Łŕ¸°ŕ¸˘ŕ¸°ŕ¸Şŕ¸ąŕšŕ¸ŕ¸ŕ¸Łŕšŕ¸ŕ¸Ą Volume ŕšŕ¸ŕšŕ¸ŕ¸Şŕ¸ąŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸§ŕšŕ¸˛ŕšŕ¸Łŕ¸ŕ¸ŕ¸ˇŕšŕ¸ŕ¸ŕ¸łŕ¸Ľŕ¸ąŕ¸ŕ¸Ąŕ¸˛ŕ¸ŕšŕ¸° ŕšŕ¸ŕšŕ¸˛ŕšŕ¸ŕšŕšŕ¸Ľŕ¸˘ŕ¸ŕšŕ¸§ŕ¸˘ŕ¸ŕ¸˛ŕ¸Łŕ¸ŕ¸ąŕšŕ¸ Limit Order ญรมภMarket Order ŕšŕ¸Ąŕ¸ˇŕšŕ¸ŕšŕ¸Ťŕšŕ¸ŕ¸ŕ¸˛ŕ¸Ł Breakout ŕ¸ŕ¸ľŕšŕ¸ŕ¸ąŕ¸ŕšŕ¸ŕ¸ŕ¸ŕšŕ¸° đ¨
3ď¸âŁ ŕ¸ŕ¸ąŕ¸§ŕ¸ŕ¸˘ŕšŕ¸˛ŕ¸ŕ¸ŕ¸ľŕš 3: ŕ¸ŕ¸´ŕ¸ŕ¸˛ŕ¸Łŕ¸ŕ¸˛ Short สูŕšŕ¸ŕš ŕšŕ¸ŕšŕ¸ŕ¸ Premium (สวŕ¸ŕšŕ¸ŕ¸Łŕ¸ŕ¸ŕšŕ¸Ťŕ¸Ľŕ¸ąŕ¸, ŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕšŕ¸Şŕ¸ľŕšŕ¸˘ŕ¸ŕ¸Şŕ¸šŕ¸)
đŞ Enter: ญาŕ¸ŕ¸Łŕ¸˛ŕ¸ŕ¸˛ŕ¸ŕ¸śŕšŕ¸ŕšŕ¸ŕšŕ¸ŕšŕ¸ŕ¸ Premium ŕšŕ¸ TF 15m ญรมภ1H ŕšŕ¸Ľŕ¸°ŕšŕ¸ŕ¸´ŕ¸ŕ¸Şŕ¸ąŕ¸ŕ¸ŕ¸˛ŕ¸ Bearish Price Action ŕ¸ŕ¸ľŕšŕ¸ŕ¸ąŕ¸ŕšŕ¸ŕ¸ ŕšŕ¸ŕšŕ¸ ŕšŕ¸ŕšŕ¸ŕšŕ¸ŕ¸ľŕ¸˘ŕ¸ Shooting Star ญรมภBearish Engulfing ŕ¸ŕ¸Łŕ¸´ŕšŕ¸§ŕ¸ Supply Zone ญรมภBearish Order Block đť đŞ TP: ŕ¸ŕ¸´ŕ¸ŕ¸˛ŕ¸Łŕ¸ŕ¸˛ŕšŕ¸ŕ¸§ŕ¸Łŕ¸ąŕ¸ŕ¸ŕ¸ąŕ¸ŕšŕ¸ ญรมภSellside Liquidity ŕšŕ¸ TF ŕšŕ¸ŕ¸ľŕ¸˘ŕ¸§ŕ¸ŕ¸ąŕ¸ đŻ đŞ SL: ŕšŕ¸Ťŕ¸ŕ¸ˇŕ¸ High ŕ¸ŕ¸ŕ¸ŕ¸Şŕ¸ąŕ¸ŕ¸ŕ¸˛ŕ¸ Bearish Price Action ŕšŕ¸Ľŕšŕ¸ŕ¸ŕšŕ¸ŕ¸˘ đ đŞ RRR: ŕ¸ŕ¸Łŕ¸°ŕ¸Ąŕ¸˛ŕ¸ 1:1.5 ŕ¸ŕ¸śŕšŕ¸ŕšŕ¸ (ŕšŕ¸ŕšŕ¸ŕ¸˘ŕšŕ¸łŕ¸§ŕšŕ¸˛ŕšŕ¸ŕšŕ¸ŕ¸ŕ¸˛ŕ¸Łŕšŕ¸ŕ¸Łŕ¸ŕ¸Şŕ¸§ŕ¸ŕšŕ¸ŕ¸Łŕ¸ŕ¸ŕšŕ¸Ťŕ¸Ľŕ¸ąŕ¸ ŕ¸ŕ¸§ŕ¸Łŕšŕ¸ŕš RRR ŕ¸ŕšŕ¸łŕšŕ¸Ľŕ¸°ŕ¸ŕ¸Łŕ¸´ŕ¸Ťŕ¸˛ŕ¸Łŕ¸ŕ¸ŕ¸˛ŕ¸ Lot ŕ¸ŕ¸˘ŕšŕ¸˛ŕ¸ŕšŕ¸ŕšŕ¸Ąŕ¸ŕ¸§ŕ¸!) đŞ ŕ¸ŕ¸ŕ¸´ŕ¸ŕ¸˛ŕ¸˘: Setup ŕ¸ŕ¸ľŕšŕ¸Şŕ¸łŕ¸Ťŕ¸Łŕ¸ąŕ¸ŕ¸ŕ¸ŕ¸ŕ¸ľŕšŕšŕ¸Ťŕšŕ¸ŕšŕ¸ŕ¸ŕ¸˛ŕ¸Şŕšŕ¸ŕ¸ŕ¸˛ŕ¸Łŕ¸ŕ¸łŕ¸ŕ¸łŕšŕ¸Łŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸˛ŕ¸Łŕ¸˘ŕšŕ¸ŕ¸ŕ¸ąŕ¸§ŕ¸Łŕ¸°ŕ¸˘ŕ¸°ŕ¸Şŕ¸ąŕšŕ¸ŕ¸ŕšŕ¸° ŕšŕ¸Łŕ¸˛ŕ¸ŕ¸°ŕšŕ¸ŕšŕ¸˛ Short ŕšŕ¸Ąŕ¸ˇŕšŕ¸ŕšŕ¸Ťŕšŕ¸ŕ¸Şŕ¸ąŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸§ŕšŕ¸˛ŕ¸Łŕ¸˛ŕ¸ŕ¸˛ŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸°ŕ¸Ąŕ¸ľŕ¸ŕ¸˛ŕ¸Łŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸˛ŕ¸ŕšŕ¸ŕšŕ¸ŕ¸ŕ¸ŕ¸ľŕšŕ¸ŕ¸ˇŕ¸ŕ¸§ŕšŕ¸˛ "ŕšŕ¸ŕ¸" ŕšŕ¸ŕ¸ŕ¸Łŕ¸ŕ¸ŕ¸Şŕ¸ąŕšŕ¸ŕš ŕ¸ŕšŕ¸° ŕ¸ŕšŕ¸ŕ¸ŕ¸ŕ¸ąŕšŕ¸ Stop Loss ŕšŕ¸ŕ¸Ľŕšŕ¸Ąŕ¸˛ŕ¸ŕš ŕšŕ¸Ľŕ¸°ŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸šŕšŕ¸ŕ¸Ľŕšŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸°ŕ¸ŕ¸° đ¨
â ď¸ Disclaimer: ŕ¸ŕ¸˛ŕ¸Łŕ¸§ŕ¸´ŕšŕ¸ŕ¸Łŕ¸˛ŕ¸°ŕ¸Ťŕšŕ¸ŕ¸ľŕšŕšŕ¸ŕšŕ¸ŕšŕ¸ŕ¸ľŕ¸˘ŕ¸ŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕ¸ŕ¸´ŕ¸ŕšŕ¸Ťŕšŕ¸ŕ¸Şŕšŕ¸§ŕ¸ŕ¸ŕ¸ąŕ¸§ŕ¸ŕ¸ŕ¸ Lina ŕšŕ¸ŕšŕ¸˛ŕ¸ŕ¸ąŕšŕ¸ ŕšŕ¸Ąŕšŕ¸ŕ¸ˇŕ¸ŕšŕ¸ŕšŕ¸ŕ¸ŕ¸łŕšŕ¸ŕ¸°ŕ¸ŕ¸łŕšŕ¸ŕ¸ŕ¸˛ŕ¸Łŕ¸Ľŕ¸ŕ¸ŕ¸¸ŕ¸ŕ¸ŕ¸°ŕ¸ŕ¸° ŕ¸ŕ¸˛ŕ¸Łŕ¸Ľŕ¸ŕ¸ŕ¸¸ŕ¸ŕ¸Ąŕ¸ľŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕšŕ¸Şŕ¸ľŕšŕ¸˘ŕ¸ ŕ¸ŕ¸šŕšŕ¸Ľŕ¸ŕ¸ŕ¸¸ŕ¸ŕ¸ŕ¸§ŕ¸Łŕ¸¨ŕ¸śŕ¸ŕ¸Šŕ¸˛ŕ¸ŕšŕ¸ŕ¸Ąŕ¸šŕ¸Ľŕšŕ¸ŕ¸´ŕšŕ¸Ąŕšŕ¸ŕ¸´ŕ¸Ąŕšŕ¸Ľŕ¸°ŕ¸ŕ¸ąŕ¸ŕ¸Şŕ¸´ŕ¸ŕšŕ¸ŕ¸ŕšŕ¸§ŕ¸˘ŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕ¸Łŕ¸ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸ŕšŕ¸° đ
ŕ¸ŕ¸ŕšŕ¸Ťŕšŕ¸ŕ¸¸ŕ¸ŕ¸ŕšŕ¸˛ŕ¸ŕšŕ¸ŕ¸ŕ¸ŕ¸ľŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸˛ŕ¸Łŕšŕ¸ŕ¸Łŕ¸ŕšŕ¸ŕ¸§ŕ¸ąŕ¸ŕ¸ŕ¸ľŕšŕ¸ŕšŕ¸°! ล฾ŕ¸ŕ¸łŕ¸ŕ¸˛ŕ¸Ąŕ¸ŕ¸°ŕšŕ¸Łŕšŕ¸ŕ¸´ŕšŕ¸Ąŕšŕ¸ŕ¸´ŕ¸Ą ŕ¸ŕ¸˛ŕ¸Ąŕ¸Ąŕ¸˛ŕšŕ¸ŕšŕšŕ¸Ľŕ¸˘ŕ¸ŕ¸°ŕ¸ŕ¸° ยิŕ¸ŕ¸ŕ¸ľŕšŕ¸Şŕ¸Ąŕ¸ŕ¸ŕšŕ¸°! đ
Bitcoin #BTCUSDT #Crypto #Trading #TechnicalAnalysis #SMC #ICT #MarketSlayer #TradeSetup #ŕ¸ŕ¸Łŕ¸´ŕ¸ŕšŕ¸ #ŕšŕ¸ŕ¸Łŕ¸ŕ¸ŕ¸Łŕ¸´ŕ¸ŕšŕ¸ #วิŕšŕ¸ŕ¸Łŕ¸˛ŕ¸°ŕ¸Ťŕšŕ¸ŕ¸Łŕ¸˛ŕ¸ #LinaEngword đ
-
@ 9e9085e9:2056af17
2025-05-28 15:21:58Part 3: Features That Can Drive User Engagement
Growing the Yakihonne Community â Whatâs Next?
To attract more users and keep engagement high, Yakihonne could expand with the following features:
- Gamification & Milestones
Badges, activity points, and rewards to motivate interaction.
- Smart Content Discovery
Trending topics, hashtag feeds, and AI-curated (but private) suggestions.
- Community Tools
Verified groups, decentralized moderation, and event features.
- Rich Profile Customization
Bio, themes, badges, and follower highlights.
- Lightning Micro-Tipping
Enable users to send instant tips for posts or engagement.
- Cross-Device Compatibility
Smooth use across mobile, web, and desktop.
- Developer Ecosystem
Open APIs to allow third-party apps and tools to thrive.
Yakihonne #Yakihonne #Yakihonne #Nostr #Nostr #YoungDfx
-
@ d360efec:14907b5f
2025-05-10 03:57:17Disclaimer: * ŕ¸ŕ¸˛ŕ¸Łŕ¸§ŕ¸´ŕšŕ¸ŕ¸Łŕ¸˛ŕ¸°ŕ¸Ťŕšŕ¸ŕ¸ľŕšŕšŕ¸ŕšŕ¸ŕšŕ¸ŕ¸ľŕ¸˘ŕ¸ŕšŕ¸ŕ¸§ŕ¸ŕ¸˛ŕ¸ ŕšŕ¸Ąŕšŕšŕ¸ŕšŕ¸ŕ¸łŕšŕ¸ŕ¸°ŕ¸ŕ¸łŕšŕ¸ŕ¸ŕ¸˛ŕ¸Łŕ¸ŕ¸ˇŕšŕ¸ŕ¸ŕ¸˛ŕ¸˘ * ŕ¸ŕ¸˛ŕ¸Łŕ¸Ľŕ¸ŕ¸ŕ¸¸ŕ¸ŕ¸Ąŕ¸ľŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕšŕ¸Şŕ¸ľŕšŕ¸˘ŕ¸ ŕ¸ŕ¸šŕšŕ¸Ľŕ¸ŕ¸ŕ¸¸ŕ¸ŕ¸ŕ¸§ŕ¸Łŕ¸ŕ¸ąŕ¸ŕ¸Şŕ¸´ŕ¸ŕšŕ¸ŕ¸ŕšŕ¸§ŕ¸˘ŕ¸ŕ¸ŕšŕ¸ŕ¸
-
@ 99e7936f:d5d2197c
2025-05-28 14:55:40âDieser Beitrag wurde mit dem Pareto-Client geschrieben.â
Wo bleibt die Rettung?
Wenn man bei einem Notfall auf den Rettungswagen wartet, dann fßhlen sich Minuten wie Stunden an. Die Nerven sind bis zum Anschlag gespannt, alle Sinne sind geschärft.
Die Natur hat das so eingerichtet, damit man aufmerksam und  gut geschßtzt ist vor weiteren Verletzungen.
Bei Trauma ist das auch so, nur dass dieser Zustand gefĂźhlt ein halbes Leben andauert. Das klingt brutal, ist aber in etwa so. Da ein menschlicher KĂśrper das nicht gut aushalten kann, sendet er dem Gehirn die Information: â Bitte mach etwas zur Entlastung, ich kann mit dem Dauerstress nicht gut umgehen. Ich habe ständig das GefĂźhl, dass etwas Schlimmes passiert und ich mich verteidigen muss.â Das Gehirn Ăźberlegt sich dann eine LĂśsung, um auch selber endlich wieder Ruhe zu haben. In der Regel wird der traumatische Inhalt verdrängt, vergessen, abgewandelt, abgeschwächt oder als Schwarz-WeiĂ-Film wieder gegeben, also ohne GefĂźhl (re)präsentiert. Man kann dann von den traumatischen Erlebnissen erzählen, ohne ein einziges GefĂźhl zu haben. Das wirkt souverän, als habe man das Trauma verarbeitet, das Gegenteil ist der Fall. Manche Menschen reden sogar Ăźber GefĂźhle, empfinden diese aber nicht. GefĂźhle werden imitiert oder inszeniert. Wenn man selber fĂźhlen kann, spĂźrt man diesen feinen Unterschied als ZuhĂśrer sofort. Jedenfalls ist alles das Traumafolge bzw. die LĂśsung, die uns das Gehirn nach Trauma anbietet. Entweder ist der ganze Inhalt samt Emotion weg, oder der Inhalt ist noch da, aber die Emotion dazu fehlt. Es gibt Menschen, die so tief traumatisiert sind, dass sie eine ganz andere Geschichte von sich selbst erzählen, als die, die eigentlich stattgefunden hat. Ich weiĂ, dass das gruselig klingt. Aber das ist eine Realität. Und es ist vermutlich gut so. Die Natur macht alles, um ein Menschenleben zu retten, und wenn es um den Preis des psychologischen Vergessens ist. Manche Erinnerungen sind offensichtlich nicht mit dem Leben vereinbar, deswegen werden sie fĂźr immer abgespalten. Mittlerweile habe ich persĂśnlich viel Respekt vor Menschen, die sich an nichts mehr âerinnernâ kĂśnnen, da ich gelernt habe, dass sie am schlimmsten traumatisiert sind. Diese Einstellung hatte ich nicht immer.
Jedenfalls verhält es sich nach meiner Beobachtung und auch nach meinen eigenen Erfahrungen so, dass man sich ganz oft erst dann vollständig UND in Farbe an traumatische Erlebnisse erinnert, wenn die Zeit dafĂźr reif ist. Man kĂśnnte auch sagen, wenn die Seele bereit ist, die verlorenen Seelenanteile wieder zuzulassen. Sie sind nie weg, denn eine unsichtbare Schnur verbindet uns immer mit dem, was passiert ist. Also, wenn dieser Moment, in dem Du Deine Seelenanteile wieder begrĂźĂen darfst, kommt, dann ist das wie ein riesiges Geschenk, auch wenn sich das zu Beginn nicht so anfĂźhlt. Es fĂźhlt sich dann eher so an, wie wenn man auf den Rettungswagen wartet, aber es ist definitiv ein Geschenk, genau wie eine Geburt ein Geschenk ist. Und eine Geburt ist ja auch nicht immer leicht.
Also, je mehr GefĂźhl beim Erinnern von traumatischen Inhalten spĂźrbar ist, desto besser kann Traumabearbeitung gelingen. (HeiĂe den Schmerz willkommen, wenn er in Dein Leben kommt.) Ich persĂśnlich hatte lange Wehen, bevor mein Trauma dann schlagartig aktiviert wurde. Das war, bildlich gesprochen, eine Hausgeburt, die ich allein vollbracht habe, weil der Rettungswagen dermaĂen Verspätung hatte. Aber das Kind hat sich dennoch gut entwickelt. Ich habe zuvor lange von meinem Trauma ânurâ geredet. Ich habe rationalisiert, wie man in der Fachsprache sagt. Mir war meine frĂźhe Verletzung bewusst, aber ich hatte kein GefĂźhl zu dem, was ich erlebt hatte. Als das GefĂźhl da war, verstand ich, dass es sinnvoll war, es solange nicht gefĂźhlt haben zu kĂśnnen, denn es war ein Ăźberwältigender Schmerz. Die Natur macht instinktiv ein gutes Timing fĂźr die Wiederkehr des GefĂźhls. Sie sucht sich eine Zeit im Leben aus, wo man einen guten Stand hat, stabil ist, eine Umgebung hat, die einen zumindest fĂźr eine Weile halten und auffangen kann. Denn die Natur mĂśchte schlieĂlich, dass man auch die Wiederkehr des GefĂźhls Ăźberlebt.
Genauso schmerzhaft wie der Verlust des GefĂźhls war, genauso schmerzhaft ist seine Wiederkehr.
Der Schmerz ist quasi der Erste und der Letzte. Er macht das Licht aus, und später macht er das Licht oder den Farbfilm wieder an. Der Schmerz ist viel besser als sein Ruf.
Ich erzähle hier lediglich meine Erfahrungen und Beobachtungen, auch wenn ich allgemein formuliere. Das kann sich bei anderen Menschen auch anders verhalten. Aber ich finde den Erfahrungsaustausch Ăźber dieses Thema wichtig, WEIL es unterschiedlich sein kann und jeder auf einem anderen Level von Traumabearbeitung steht. Ein Problem bei Traumabearbeitung ist, dass jeder ein anderes Trauma erlebt hat, dass jeder einen anderen Nährboden hatte, auf den das Trauma fiel, und dass es verschiedene Stadien gibt, bis es dann endlich und hoffentlich soweit ist, dass das Trauma wieder vollständig in die eigene Psyche integriert werden kann und man wieder âganzâ bzw. âneu und etwas andersâ ist. Und meine Erfahrung ist, dass man auf das Tempo dieses Prozesses leider keinen Einfluss hat, auch wenn es hierzu, wie ich finde, viele falsche Verkehrsdurchsagen gibt. Die Natur ist da verschlossen wie eine Auster, sie lässt sich nicht ins Handwerk pfuschen. Als ich das verstand, hat sich mein Wunsch, Menschen zu helfen, schlagartig verändert. Ich verstand, dass ICH das nicht machen kann, dass die Natur das selber macht. Und das ist eine gute Nachricht, denn die Natur kann das am besten und ist ein super zuverlässiger Partner.
Wir brauchen keinen Rettungswagen. Der Schmerz ist die Rettung.
Das Thema âTraumaâ birgt so viel positiven Erkenntnisgewinn Ăźber das Wunder des Lebens.
Aber zurĂźck zum Thema. Wenn man, so wie ich, ein halbes Leben in einem Schwarz-WeiĂ-Film verbracht hat, dann die Hausgeburt ohne Rettungswagen durchgestanden hat und das Kind irgendwann anfängt, neugierige Fragen zu stellen, dann ist man im Zugzwang. In dieser Situation bin ich heute. Deswegen schreibe ich. Mein neues ICH fragt mich immer Ăśfter, warum ich so viele Dinge tue, die ich eigentlich gar nicht mehr tun will. Kinder fragen einen auch manchmal ganz unverblĂźmt, ob man den Hansi denn lieb hat oder ob man gerne im BĂźro arbeitet. Wenn man den Hansi nicht lieb hat und nicht gerne im BĂźro arbeitet, dann muss man schlucken und eine kindgerechte Antwort formulieren. Genauso wenig wie Kinder als kompetenter 20-jähriger auf die Welt kommen, genau so wenig ist man nach geglĂźckter Traumabearbeitung âgeheiltâ. Es wird nichts schlagartig besser. Das ist auch so eine falsche Verkehrsdurchsage. Man lebt ja noch im alten Leben, was nun Schritt fĂźr Schritt verändert werden darf. ABER man ist glĂźckliche Mutter. Mutter sein, ist nicht immer leicht, habe ich mir sagen lassen. MĂźtter lieben ihre Kinder. Im Idealfall machen sie sich keine Gedanken darĂźber, was aus ihrem Kind mal werden soll. Sie vertrauen einfach darauf, DASS aus ihrem Kind ein glĂźcklicher Mensch wird und buttern deshalb so viel Liebe in das Kind hinein, wie in den wenigen Jahren, die das Kind ein Kind ist, mĂśglich ist. So ähnlich geht es mir heute auch. Ich bin stolz auf mein neues ICH und lobe es, so oft ich kann. Jede Mutter lobt ihre Butter. Das ist wichtig, denn das Leben bietet ständig Herausforderungen, an denen man bekanntlich wachsen darf. Ich gehe jeden Tag mit meinem âKindâ spazieren, und wir sehen viel. Wir sehen andere Menschen mit Trauma, wir hĂśren zu, welches Trauma der andere erlebt hat und auf welchem Level er ist. Wir hĂśren das GefĂźhl heraus, welches mitschwingt. Wir sehen Menschen in ihrem Schwarz-WeiĂ-Film. Und wir sehen Menschen, die scheinbar mit jeder Situation souverän umgehen kĂśnnen. Am meisten interessieren âunsâ zur Zeit solche Menschen, die ehrlich zugeben, dass sie Wehen haben, dass der Schmerz sich in immer kĂźrzeren Abständen meldet. (Die verlorenen Seelenanteile ziehen an der unsichtbaren Schnur.) Mit diesen Leuten kann ich im Moment am besten. Das hĂśrt sich komisch an. Aber ich will damit zum Ausdruck bringen, dass ich mit diesen Menschen mittlerweile am meisten resoniere. Sie sprechen meine Sprache. Sie empfinden GefĂźhle, und sprechen Ăźber diese. Das ist fĂźr mich die schĂśnste Sprache.
Wer in diesen Tagen wahrhaftig Schmerz empfindet, und nicht nur als Lippenbekenntnis, sondern echten Ăźblen Schmerz Ăźber die enttäuschte Liebe oder Ăźber die Verhältnisse in dieser Welt, der ist mir sympathisch, der ist mir nah. Denn ich weiĂ, dass so ein fĂźhlender Mensch auch bald eine Niederkunft erleben wird, die ihn verändert, die ihn anders auf diese Welt schauen lässt.
Der Schmerz bringt uns die Verwandlung. Der Schmerz bringt die verlorenen Seelenanteile zurßck. Der Schmerz ist der Hßter des Lebens. Der Schmerz bringt Dir Deine volle Sensibilität fßr andere Menschen zurßck. Alles, was Du bei Dir nicht fßhlen kannst, kannst Du bei anderen nicht fßhlen. Der Schmerz beendet das. Er macht das Licht an und gibt dem Film wieder Farbe.
HeiĂe den Schmerz willkommen, wenn er in Dein Leben kommt. Tu das, nicht etwa weil Du gern leidest, nein tu das, weil Du Dich liebst, weil Du bewusst darauf achten mĂśchtest, was Dir wirklich gut tut und Freude macht. Ein Mensch oder ein Job, der Dir Schmerz bereitet, den gilt es loszulassen. Und wenn Du Schmerz im Gesicht Deines GegenĂźbers siehst, dann frage Dich ehrlich, was Dein Anteil daran ist, dass der andere leidet. Wir sind nicht fĂźr jedes Leid auf dieser Welt verantwortlich, das mĂśchte ich hier auch betonen. Und die Schuld-Nummer zieht bei mir schon lange nicht mehr. Aber ich nehme immer besser wahr, wenn mein eigenes Verhalten nicht angemessen, nicht authentisch ist, von Ăźberholten Glaubensmustern geprägt ist. Ich kann das erkennen und korrigieren. Ich kann das heute selber erkennen, weil der Schmerz mich das gelehrt hat, mich geĂśffnet hat. Der Schmerz lehrt uns ganz viel. Der Schmerz ist der HĂźter des Lebens. Er trifft einen hart, macht aber weich.
HeiĂe den Schmerz willkommen, denn er ist die Rettung. Â
âDieser Beitrag wurde mit dem Pareto-Client geschrieben.â
Onboarding bei Nostr:Â Â Nostr
Easy onboarding via **Start.**\ \ Das Pareto-Team baut den âMarktplatz der Ideenâ und hat dabei schon viel erreicht. \ team@pareto.space \ https://pareto.space \ https://geyser.fund/project/pareto?hero=1c1b8e487090
\ \ Newsletter per Mail (Die Friedenstaube)\ hier abonnieren\ \ In Telegram lesen -> hier unsere Kanäle\ https://t.me/pareto_artikel \ https://t.me/friedenstaube_artikel \ \ Als Feed in einem Feed-Reader \ https://pareto.space/atom/feed.xml \ https://pareto.space/atom/de_feed.xml \ https://pareto.space/atom/en_feed.xml
-
@ c1e9ab3a:9cb56b43
2025-05-09 23:10:14I. Historical Foundations of U.S. Monetary Architecture
The early monetary system of the United States was built atop inherited commodity money conventions from Europeâs maritime economies. Silver and gold coinsâprimarily Spanish pieces of eight, Dutch guilders, and other foreign specieâformed the basis of colonial commerce. These units were already integrated into international trade and piracy networks and functioned with natural compatibility across England, France, Spain, and Denmark. Lacking a centralized mint or formal currency, the U.S. adopted these forms de facto.
As security risks and the practical constraints of physical coinage mounted, banks emerged to warehouse specie and issue redeemable certificates. These certificates evolved into fiduciary mediaâclaims on specie not actually in hand. Banks observed over time that substantial portions of reserves remained unclaimed for years. This enabled fractional reserve banking: issuing more claims than reserves held, so long as redemption demand stayed low. The practice was inherently unstable, prone to panics and bank runs, prompting eventual centralization through the formation of the Federal Reserve in 1913.
Following the Civil War and unstable reinstatements of gold convertibility, the U.S. sought global monetary stability. After World War II, the Bretton Woods system formalized the U.S. dollar as the global reserve currency. The dollar was nominally backed by gold, but most international dollars were held offshore and recycled into U.S. Treasuries. The Nixon Shock of 1971 eliminated the gold peg, converting the dollar into pure fiat. Yet offshore dollar demand remained, sustained by oil trade mandates and the unique role of Treasuries as global reserve assets.
II. The Structure of Fiduciary Media and Treasury Demand
Under this system, foreign trade surpluses with the U.S. generate excess dollars. These surplus dollars are parked in U.S. Treasuries, thereby recycling trade imbalances into U.S. fiscal liquidity. While technically loans to the U.S. government, these purchases act like interest-only transfersâgovernments receive yield, and the U.S. receives spendable liquidity without principal repayment due in the short term. Debt is perpetually rolled over, rarely extinguished.
This creates an illusion of global subsidy: U.S. deficits are financed via foreign capital inflows that, in practice, function more like financial tribute systems than conventional debt markets. The underlying assetâU.S. Treasury debtâfunctions as the base reserve asset of the dollar system, replacing gold in post-Bretton Woods monetary logic.
III. Emergence of Tether and the Parastatal Dollar
Tether (USDT), as a private issuer of dollar-denominated tokens, mimics key central bank behaviors while operating outside the regulatory perimeter. It mints tokens allegedly backed 1:1 by U.S. dollars or dollar-denominated securities (mostly Treasuries). These tokens circulate globally, often in jurisdictions with limited banking access, and increasingly serve as synthetic dollar substitutes.
If USDT gains dominance as the preferred medium of exchangeâdue to technological advantages, speed, programmability, or accessâit displaces Federal Reserve Notes (FRNs) not through devaluation, but through functional obsolescence. Greshamâs Law inverts: good money (more liquid, programmable, globally transferable USDT) displaces bad (FRNs) even if both maintain a nominal 1:1 parity.
Over time, this preference translates to a systemic demand shift. Actors increasingly use Tether instead of FRNs, especially in global commerce, digital marketplaces, or decentralized finance. Tether tokens effectively become shadow base money.
IV. Interaction with Commercial Banking and Redemption Mechanics
Under traditional fractional reserve systems, commercial banks issue loans denominated in U.S. dollars, expanding the money supply. When borrowers repay loans, this destroys the created dollars and contracts monetary elasticity. If borrowers repay in USDT instead of FRNs:
- Banks receive a non-Fed liability (USDT).
- USDT is not recognized as reserve-eligible within the Federal Reserve System.
- Banks must either redeem USDT for FRNs, or demand par-value conversion from Tether to settle reserve requirements and balance their books.
This places redemption pressure on Tether and threatens its 1:1 peg under stress. If redemption latency, friction, or cost arises, USDTâs equivalence to FRNs is compromised. Conversely, if banks are permitted or compelled to hold USDT as reserve or regulatory capital, Tether becomes a de facto reserve issuer.
In this scenario, banks may begin demanding loans in USDT, mirroring borrower behavior. For this to occur sustainably, banks must secure Tether liquidity. This creates two options: - Purchase USDT from Tether or on the secondary market, collateralized by existing fiat. - Borrow USDT directly from Tether, using bank-issued debt as collateral.
The latter mirrors Federal Reserve discount window operations. Tether becomes a lender of first resort, providing monetary elasticity to the banking system by creating new tokens against promissory assetsâexactly how central banks function.
V. Structural Consequences: Parallel Central Banking
If Tether begins lending to commercial banks, issuing tokens backed by bank notes or collateralized debt obligations: - Tether controls the expansion of broad money through credit issuance. - Its balance sheet mimics a central bank, with Treasuries and bank debt as assets and tokens as liabilities. - It intermediates between sovereign debt and global liquidity demand, replacing the Federal Reserveâs open market operations with its own issuance-redemption cycles.
Simultaneously, if Tether purchases U.S. Treasuries with FRNs received through token issuance, it: - Supplies the Treasury with new liquidity (via bond purchases). - Collects yield on government debt. - Issues a parallel form of U.S. dollars that never require redemptionâan interest-only loan to the U.S. government from a non-sovereign entity.
In this context, Tether performs monetary functions of both a central bank and a sovereign wealth fund, without political accountability or regulatory transparency.
VI. Endgame: Institutional Inversion and Fed Redundancy
This paradigm represents an institutional inversion:
- The Federal Reserve becomes a legacy issuer.
- Tether becomes the operational base money provider in both retail and interbank contexts.
- Treasuries remain the foundational reserve asset, but access to them is mediated by a private intermediary.
- The dollar persists, but its issuer changes. The State becomes a fiscal agent of a decentralized financial ecosystem, not its monetary sovereign.
Unless the Federal Reserve reasserts controlâeither by absorbing Tether, outlawing its instruments, or integrating its tokens into the reserve frameworkâit risks becoming irrelevant in the daily function of money.
Tether, in this configuration, is no longer a derivative of the dollarâit is the dollar, just one level removed from sovereign control. The future of monetary sovereignty under such a regime is post-national and platform-mediated.
-
@ 8d34bd24:414be32b
2025-05-28 13:53:46These days it can feel like the whole world is out of control. Government officials lie and break the law. People are selfish, act emotionally rather than logically, and push ideologies that are illogical and contrary to reality. Society is divided into groups and people are judged, not for their own character, but based on which group they are placed into. There are wars and rumors of wars. There are worries of pandemics and economic disasters. Depression, psychosis, and despair is rampant even among the youngest among us.
Hope For Believers
As much as things seem to be out of control, they are not out of Godâs control. This is what the Bible predicted. No matter how bad things get in the world, those who have put their faith in Jesus, do not need to feel despair.
Why are you in despair, O my soul?\ And why have you become disturbed within me?\ Hope in God, for I shall again praise Him\ For the help of His presence.\ O my God, my soul is in despair within me;\ Therefore I remember You from the land of the Jordan\ And the peaks of Hermon, from Mount Mizar. (Psalm 42:5-6)
When we start to feel despair overcoming us, we need to remember what God has done and what He has promised. We need to praise God for what He has done, what He has promised, and what He will bring to completion. Things may be hard now, but God is still in control, and we know how the story will end. God triumphs. Good is rewarded. Evil is destroyed. We can stand on the foundation of hope because we know the ending. Even though things may be out of our personal control, they are always under Godâs control.
The more fiercely the storm rages, the more we need to rest in Jesus and the more we need to put our hope in Him.
O love the Lord, all you His godly ones!\ The Lord preserves the faithful\ And fully recompenses the proud doer.\ **Be strong and let your heart take courage,\ All you who hope in the Lord. (Psalm 31:23-24) {emphasis mine}
We can take courage because God always acts for our long term good. Every hardship we experience here on earth will be recognized as a blessing that grew our faith and prepared us for heaven and Godâs presence in eternity.
For I know the plans that I have for you,â declares the Lord, âplans for welfare and not for calamity to give you a future and a hope. (Jeremiah 29:11)
Even the worst things that happen to us, due to the sins of others, have a good purpose in our lives. God is working good through us. Our hope isnât an empty hope. It isnât a âI really hope this happens.â It is a âI can hope in the guaranteed promises of God.â
For we do not want you to be unaware, brethren, of our affliction which came to us in Asia, that we were burdened excessively, beyond our strength, so that we despaired even of life; indeed, we had the sentence of death within ourselves so that we would not trust in ourselves, but in God who raises the dead; who delivered us from so great a peril of death, and will deliver us, He on whom we have set our hope. And He will yet deliver us, (2 Corinthians 1:8-10) {emphasis mine}
We may experience situations so bad that they seem hopeless, but with God, nothing is hopeless. The God who raises the dead can raise us out of any situation. The God who spoke the universe into existence can deliver us by a word.
The God of the Bible knows all and loves us completely. He looks at our situation through the lens of eternity. What seems best in the moment is not necessarily what is best for our eternity. Many times He delivers us through hardship rather than out of it. We just need to trust Him and put our hope in Him because He is good.
In the same way God, desiring even more to show to the heirs of the promise the unchangeableness of His purpose, interposed with an oath, so that by two unchangeable things in which it is impossible for God to lie, we who have taken refuge would have strong encouragement to take hold of the hope set before us. This hope we have as an anchor of the soul, a hope both sure and steadfast and one which enters within the veil, where Jesus has entered as a forerunner for us, having become a high priest forever according to the order of Melchizedek. (Hebrews 6:17-20) {emphasis mine}
Read that statement again. âThis hope we have as an anchor of the soul, a hope both sure and steadfast.â Are you trusting Jesus as the âanchor of your soul?â Is your hope just a wish or is it a âsure and steadfastâ hope based on the promises of God that you know will 100% come true?
And not only this, but we also exult in our tribulations, knowing that tribulation brings about perseverance; and perseverance, proven character; and proven character, hope; and hope does not disappoint, because the love of God has been poured out within our hearts through the Holy Spirit who was given to us. (Romans 5:3-5)
Isnât it ironic that we need hope to persevere through tribulations, but that persevering through tribulation gives us character and hope? Our faith, trust, and hope grow through hardship. When things are easy, we almost always fall back on trusting in our own power rather than relying on Godâs power. If we have put our faith in Jesus, there is no situation in which we should lose hope.
Now may the God of hope fill you with all joy and peace in believing, so that you will abound in hope by the power of the Holy Spirit. (Romans 15:13)
Is your joy and peace based on your circumstances or have you learned to have hope in God so you can experience joy and peace even in the trials?
Many people equate joy and happiness, but I think there is a key distinction. Happiness is a pleasant feeling that comes from pleasant circumstances. Joy is a similar feeling to happiness, but it comes from knowing God and His love. It is not tied to circumstances. When we have truly put our hope in God we can still have joy in and despite the most horrific circumstances.
Blessed be the God and Father of our Lord Jesus Christ, who according to His great mercy has caused us to be born again to a living hope through the resurrection of Jesus Christ from the dead, to obtain an inheritance which is imperishable and undefiled and will not fade away, reserved in heaven for you, (1 Peter 1:3-4) {emphasis mine}
Just as Jesus told the Samaritan woman at the well that He provides living water that wells up inside, so that she need never thirst, in the same way believers have a living hope that wells up in times of need. Our hope is in the Creator of the universe and Savior of the world. No problem is too big for Him. No situation is a surprise to Him. No enemy is too powerful for Him. All of our problems are already solved. We just havenât necessarily seen the solution yet.
My soul, wait in silence for God only,\ For my hope is from Him.\ He only is my rock and my salvation,\ My stronghold; I shall not be shaken.\ On God my salvation and my glory rest;\ The rock of my strength, my refuge is in God. (Psalm 62:5-7)
Despair For Unbelievers
Although believers never have reason to despair, the same is not true for those who have rejected the Savior, Jesus Christ. In these perilous times, they have a real reason for dread and despair.
Moreover, the Lord will scatter you among all peoples, from one end of the earth to the other end of the earth; and there you shall serve other gods, wood and stone, which you or your fathers have not known. Among those nations you shall find no rest, and there will be no resting place for the sole of your foot; but there the Lord will give you a trembling heart, failing of eyes, and despair of soul. So your life shall hang in doubt before you; and you will be in dread night and day, and shall have no assurance of your life. (Deuteronomy 64-66)
Those who reject the atoning sacrifice of Jesus do not get His protection. They do not get His help. They cannot rest in hope in Him.
Of course, the good news is that they can chose to turn their hearts to Him, confess their sins, and trust in Him up until their moment of death. Sadly many will continue to put off faith until it is too late. Many will choose evil over good and license over submission until God gives them over to their lusts.
And just as they did not see fit to acknowledge God any longer, God gave them over to a depraved mind, to do those things which are not proper, being filled with all unrighteousness, wickedness, greed, evil; full of envy, murder, strife, deceit, malice; they are gossips, slanderers, haters of God, insolent, arrogant, boastful, inventors of evil, disobedient to parents, without understanding, untrustworthy, unloving, unmerciful; and although they know the ordinance of God, that those who practice such things are worthy of death, they not only do the same, but also give hearty approval to those who practice them. (Romans 1:28-32)
If any of you have not yet put your trust in Jesus as Savior and Lord, do not wait. Turn away from evil. Submit to the will of Jesus. Trust Him to take away your sins and cover you with His righteousness.
If any of you know people who are in despair, share the gospel with them. Tell them about the greatness of God. Show them the hope that is within you.
Can Believers Despair?
Are there believers who despair? Yes. Should believers ever despair? Definitely not!
But we have this treasure in earthen vessels, so that the surpassing greatness of the power will be of God and not from ourselves; we are afflicted in every way, but not crushed; perplexed, but not despairing; persecuted, but not forsaken; struck down, but not destroyed; always carrying about in the body the dying of Jesus, so that the life of Jesus also may be manifested in our body. (2 Corinthians 4:7-10)
Jesus is always with believers in all situations guiding and protecting us. Those difficult situations that happen are for our good, even when we canât see how it could be for good.
Job had more reasons to despair than almost anyone, yet he trusted in God. He didnât know why he was being put through such loss, but his loss increased his faith in God and was a great example to people throughout history. I also love this cry of his heart.
âOh that my words were written!\ Oh that they were inscribed in a book!â (Job 19:23)
He may or may not have seen even the partial fulfillment of this cry, but His words are written in the book of Job, in the Holy Scriptures read by Jews and Christians throughout the world and throughout history. Jobâs first response to loss was an example to us all. After losing all ten children and all of his wealth, this was his response.
Then Job arose and tore his robe and shaved his head, and he fell to the ground and worshiped. (Job 1:20)
Yes, it is true that he had moments of despair where he cursed his birth, but he then returned to God in faith and hope. After a brief rebuke from God, Job submitted to Godâs will.
âBehold, I am insignificant; what can I reply to You?\ I lay my hand on my mouth.\ Once I have spoken, and I will not answer;\ Even twice, and I will add nothing more.â (Job 40:4-5)
After his second rebuke from God, he fully submitted.
Then Job answered the Lord and said,
âI know that You can do all things,\ And that no purpose of Yours can be thwarted.\ âWho is this that hides counsel without knowledge?â\ *Therefore I have declared that which I did not understand,\ Things too wonderful for me, which I did not know.\ âHear, now, and I will speak;\ I will ask You, and You instruct me*.â\ I have heard of You by the hearing of the ear;\ But now my eye sees You;\ Therefore I retract,\ And I repent in dust and ashes**.â (Job 42:1-6) {emphasis mine}
Job admitted that he did not understand what God was doing, but that God was right; God was good; and God was Lord. Job was able to have hope knowing that God was in control and working for good.
In the case of Job, he was later blessed with more kids, more wealth, and more respect than he had in the beginning. We wonât all see our blessings here on earth, but all believers will receive blessings from their trials.
May our glorious Savior and God fill you with faith and hope in God, His goodness, His power, and His plan. May we all submit to His good will even when we do not understand and even when every part of our earthly body is crying, âstop!â May God fill you with knowledge of Him, faith in Him, and hope in Him.
Trust Jesus
-
@ e3ba5e1a:5e433365
2025-04-15 11:03:15Prelude
I wrote this post differently than any of my others. It started with a discussion with AI on an OPSec-inspired review of separation of powers, and evolved into quite an exciting debate! I asked Grok to write up a summary in my overall writing style, which it got pretty well. I've decided to post it exactly as-is. Ultimately, I think there are two solid ideas driving my stance here:
- Perfect is the enemy of the good
- Failure is the crucible of success
Beyond that, just some hard-core belief in freedom, separation of powers, and operating from self-interest.
Intro
Alright, buckle up. Iâve been chewing on this idea for a while, and itâs time to spit it out. Letâs look at the U.S. government like Iâd look at a codebase under a cybersecurity auditâOPSEC style, no fluff. Forget the endless debates about what politicians should do. Thatâs noise. I want to talk about what they can do, the raw powers baked into the system, and why we should stop pretending those powers are sacred. If thereâs a hole, either patch it or exploit it. No half-measures. And yeah, Iâm okay if the whole thing crashes a bitâfailureâs a feature, not a bug.
The Filibuster: A Security Rule with No Teeth
You ever see a firewall rule thatâs more theater than protection? Thatâs the Senate filibuster. Everyone acts like itâs this untouchable guardian of democracy, but hereâs the deal: a simple majority can torch it any day. Itâs not a law; itâs a Senate preference, like choosing tabs over spaces. When people call killing it the ânuclear option,â I roll my eyes. Nuclear? Itâs a button labeled âpress me.â If a party wants it gone, theyâll do it. So why the dance?
I say stop playing games. Get rid of the filibuster. If youâre one of those folks who thinks itâs the only thing saving us from tyranny, fineâpush for a constitutional amendment to lock it in. Thatâs a real patch, not a Post-it note. Until then, itâs just a vulnerability begging to be exploited. Every time a party threatens to nuke it, theyâre admitting itâs not essential. So letâs stop pretending and move on.
Supreme Court Packing: Because Nineâs Just a Number
Hereâs another fun one: the Supreme Court. Nine justices, right? Sounds official. Except itâs not. The Constitution doesnât say nineâitâs silent on the number. Congress could pass a law tomorrow to make it 15, 20, or 42 (hitchhikerâs reference, anyone?). Packing the court is always on the table, and both sides know it. Itâs like a root exploit just sitting there, waiting for someone to log in.
So why not call the bluff? If youâre in powerâsay, Trumpâs back in the gameâsay, âIâm packing the court unless we amend the Constitution to fix it at nine.â Force the issue. No more shadowboxing. And honestly? The courtâs got way too much power anyway. Itâs not supposed to be a super-legislature, but here we are, with justicesâ ideologies driving the bus. Thatâs a bug, not a feature. If the court werenât such a kingmaker, packing it wouldnât even matter. Maybe we should be talking about clipping its wings instead of just its size.
The Executive Should Go Full Klingon
Letâs talk presidents. Iâm not saying they should wear Klingon armor and start shouting âQaplaâ!ââthough, letâs be real, thatâd be awesome. Iâm saying the executive should use every scrap of power the Constitution hands them. Enforce the laws you agree with, sideline the ones you donât. If Congress doesnât like it, theyâve got tools: pass new laws, override vetoes, orâhereâs the big oneâcut the budget. Thatâs not chaos; thatâs the system working as designed.
Right now, the real problem isnât the president overreaching; itâs the bureaucracy. Itâs like a daemon running in the background, eating CPU and ignoring the user. The presidentâs supposed to be the one steering, but the administrative stateâs got its own agenda. Let the executive flex, push the limits, and force Congress to check it. Norms? Pfft. The Constitutionâs the spec sheetâstick to it.
Let the System Crash
Hereâs where I get a little spicy: Iâm totally fine if the government grinds to a halt. Deadlock isnât a disaster; itâs a feature. If the branches canât agree, let the president veto, let Congress starve the budget, let enforcement stall. Donât tell me about âessential services.â Nothingâs so critical it canât take a breather. Shutdowns force everyone to the tableâdebate, compromise, or expose whoâs dropping the ball. If the public loses trust? Good. Theyâll vote out the clowns or live with the circus they elected.
Think of it like a server crash. Sometimes you need a hard reboot to clear the cruft. If voters keep picking the same bad admins, well, the country gets what it deserves. Failureâs the best teacherâway better than limping along on autopilot.
States Are the Real MVPs
If the feds fumble, states step up. Right now, states act like junior devs waiting for the lead engineer to sign off. Why? Federal money. Itâs a leash, and itâs tight. Cut that cash, and states will remember theyâre autonomous. Some will shine, others will tankâlooking at you, California. And Iâm okay with that. Let people flee to better-run states. No bailouts, no excuses. States are like competing startups: the good ones thrive, the bad ones pivot or die.
Could it get uneven? Sure. Some states might turn into sci-fi utopias while others look like a post-apocalyptic vidya game. Thatâs the pointâcompetition sorts it out. Citizens can move, markets adjust, and failureâs a signal to fix your act.
Chaos Isnât the Enemy
Yeah, this sounds messy. States ignoring federal law, external threats poking at our seams, maybe even a constitutional crisis. Iâm not scared. The Supreme Courtâs there to referee interstate fights, and Congress sets the rules for state-to-state play. But if it all falls apart? Still cool. States can sort it without a babysitterâitâll be ugly, but freedomâs worth it. External enemies? Theyâll either unify us or break us. If we canât rally, we donât deserve the win.
Centralizing power to avoid this is like rewriting your app in a single thread to prevent race conditionsâsure, itâs simpler, but youâre begging for a deadlock. Decentralized chaos lets states experiment, lets people escape, lets markets breathe. States competing to cut regulations to attract businesses? Thatâs a race to the bottom for red tape, but a race to the top for innovationâworkers might gripe, but theyâll push back, and the tensionâs healthy. Bring itâlet the cage match play out. The Constitutionâs checks are enough if we stop coddling the system.
Why This Matters
Iâm not pitching a utopia. Iâm pitching a stress test. The U.S. isnât a fragile porcelain doll; itâs a rugged piece of hardware built to take some hits. Let it fail a littleâfilibuster, court, feds, whatever. Patch the holes with amendments if you want, or lean into the grind. Either way, stop fearing the crash. Itâs how we debug the republic.
So, whatâs your take? Ready to let the system rumble, or got a better way to secure the code? Hit me upâIâm all ears.
-
@ 812cff5a:5c40aeeb
2025-05-28 12:56:32NIP-01 â اŮŘ´Ů٠اŮأساس٠ŮŮŘŁŘدا؍ ŮŮ ŮŮستع
ŘąŮ٠اŮتؚعŮŮ (NIP): 01
اŮŘšŮŮاŮ: اŮŘ´Ů٠اŮأساس٠ŮŮŘŁŘدا؍
اŮŘاŮŘŠ: ŮŮا،Ů
اŮ٠ؤŮŮ: fiatjaf
اŮتاعŮŘŽ: 2020-12-10
اŮŮ ŮŘŽŘľ
Ůذا اŮ٠ستŮŘŻ ŮؚعŮ٠اŮŘ´Ů٠اŮŮŮاس٠ŮŘŁŮ "ŘŘŻŘŤ" Ůت٠تداŮŮ٠؜٠٠شبŮŘŠ ŮŮستع (Nostr).
اŮŮŘŻŮ Ů Ů Ůذا اŮŘŞŮŘłŮŮ Ů٠؜٠ا٠ؼ٠ŮاŮŮŘŠ ٠ؚاŮŘŹŘŠ ŮŘŞŮŘłŮŘą اŮŘŁŘدا؍ Ů Ů Ůب٠؏٠ŮŘš اŮؚ٠Ůاإ ŮاŮŘŽŮاد٠بءعŮŮŘŠ Ů ŮŘŮŘŻŘŠ.
ŮŮŮ٠اŮŘŘŻŘŤ
ŮŮ ŘŘŻŘŤ ؚباع؊ ؚ٠Ůا،٠ŮŘŘŞŮŮ ŘšŮ٠اŮŘŮŮ٠اŮتاŮŮŘŠ:
{ "id": <٠ؚعŮŮ ŮŘąŮŘŻ>, "pubkey": <Ů ŮŘŞŘ§Ř ŘšŘ§Ů ŮŮ٠عسŮ>, "created_at": <تاعŮŘŽ اŮŘĽŮشاإ ŮŘąŮŮ UNIX timestamp>, "kind": <ŮŮŘš اŮŘŘŻŘŤ>, "tags": [<Ůا،٠؊ ٠٠اŮŮŘłŮŮ >], "content": <اŮŮ ŘŘŞŮŮ>, "sig": <اŮŘŞŮŮŮŘš اŮŘąŮŮ Ů> }
Ř´ŘąŘ Ř§ŮŘŮŮŮ
- id: ŘłŮŘłŮŘŠ ŮŘľŮŘŠ ŘŞŮ ŘŤŮ SHA-256 ŮŮ ŘŘŞŮ٠اŮŘŘŻŘŤ.
- pubkey: اŮŮ ŮŘŞŘ§Ř Ř§Ůؚا٠ŮŮ٠ست؎د٠(ؚاد؊٠32 باŮŘŞ بؾŮغ؊ hex).
- created_at: اŮءابؚ اŮز٠ŮŮ ŮŮŘĽŮشاإ (Unix timestamp).
- kind: ŘąŮŮ ŮŘŘŻŘŻ ŮŮŘš اŮŘŘŻŘŤ (Ů ŘŤŮاŮ: Ů ŮŘ´ŮŘąŘ Ů ŘŞŘ§Ř¨ŘšŘŠŘ ŘĽŘšŘ§ŘŻŘŠ ŮŘ´Řą).
- tags: Ůا،٠؊ ٠٠اŮŮŘłŮ٠اŮ٠عتبء؊ باŮŘŘŻŘŤ (Ů ŘŤŮاŮ: ؼشاع؊ ŘĽŮ٠٠ست؎د٠أ٠ŘŘŻŘŤ).
- content: اŮŮ ŘŘŞŮ٠اŮأساس٠ŮŮŘŘŻŘŤ (ŮŘľ أ٠بŮاŮات).
- sig: اŮŘŞŮŮŮŘš اŮŘąŮ٠٠اŮذ٠Ů؍بت أ٠اŮ٠عس٠Ů٠ؾاŘب اŮŮ ŘŘŞŮŮ.
ŮŮŮŮŘŠ ŘŞŮŮŮŘŻ ٠ؚع٠اŮŘŘŻŘŤ
id
ŮŘŞŮ ŘŞŮŮŮŘŻ اŮ٠ؚعŮ٠ؚبع أ؎ذ ŘŞŮ ŘŤŮŮ JSON ŮŮŘŘŻŘŤ (بدŮ٠اŮŘŮŮŮ
id
Ůsig
) ŘŤŮ Řساب اŮت؏ز،؊ باست؎دا٠SHA-256.
ŘŞŮŮŮŘš اŮŘŘŻŘŤ
ŮŮŮŮŮŘš اŮ٠ست؎د٠اŮŘŘŻŘŤ باست؎دا٠٠ŮتاŘ٠اŮ؎اؾ.
Ůذا اŮŘŞŮŮŮŘš اŮŘąŮŮ Ů ŮŘłŮ Ř ŮŘŁŮ Ř´ŘŽŘľ باŮŘŞŘŮŮ Ů Ů ŘľŘŘŠ اŮŘŘŻŘŤ باست؎دا٠اŮŮ ŮŘŞŘ§Ř Ř§Ůؚا٠.
ŘŁŮŮاؚ اŮŘŁŘدا؍ (kind)
0
: Ů Ů٠اŮتؚعŮŮ (اŮŘ§ŘłŮ Ř Ř§ŮŘľŮŘąŘŠŘ Ř§ŮŮبذ؊).1
: Ů ŮŘ´ŮŘą ؚا٠ŮŘľŮ.2
: ؼؚاد؊ ŮŘ´Řą.3
: Ůا،٠؊ اŮ٠تابŮŘšŮŮ.4
: عساŮŘŠ Ů Ř´ŮŮع؊ ؎اؾ؊.- ŘŁŮŮاؚ أ؎ع٠ŮŮ Ů٠ؼ؜اŮŘŞŮا ŮاŘŮŮا.
اŮŮŘłŮŮ (Tags)
اŮŮŘłŮ٠ؚباع؊ ؚ٠ŮŮا،٠(arrays) دا؎٠اŮŘŘŻŘŤ ŮŘŞŮŮŮŘą Ů ŘšŮŮ٠ات ؼ؜اŮŮŘŠ.
٠؍اŮ:["e", "<٠ؚعŮ٠اŮŘŘŻŘŤ>"] ["p", "<Ů ŮŘŞŘ§Ř ŘšŘ§Ů Ů٠ست؎د٠>"]
"e"
ŘŞŘ´ŮŘą ŘĽŮŮ ŘŘŻŘŤ."p"
ŘŞŘ´ŮŘą ŘĽŮ٠٠ست؎د٠.
اŮŘŽŮاؾ؊
NIP-01 Ů٠اŮأساس اŮŮŮŮŮŮ Ůتباد٠اŮŘŁŘدا؍ ؚبع ŮŮستع.
Ů Ů ŘŽŮا٠اتباؚ Ůذا اŮŘ´ŮŮŘ ŮŮ ŮŮ ŮŘŹŮ ŮŘš اŮتءبŮŮات ŮاŮŘŽŮاد٠اŮؚ٠٠٠ؚا٠بسŮŘ§ŘłŘŠŘ Ů؜٠ا٠أ٠٠ŮŮ ŮŘŤŮŮŮŘŠ ŮŮ ŘŘŻŘŤ. -
@ 91bea5cd:1df4451c
2025-04-15 06:27:28BĂĄsico
bash lsblk # Lista todos os diretorios montados.
Para criar o sistema de arquivos:
bash mkfs.btrfs -L "ThePool" -f /dev/sdx
Criando um subvolume:
bash btrfs subvolume create SubVol
Montando Sistema de Arquivos:
bash mount -o compress=zlib,subvol=SubVol,autodefrag /dev/sdx /mnt
Lista os discos formatados no diretĂłrio:
bash btrfs filesystem show /mnt
Adiciona novo disco ao subvolume:
bash btrfs device add -f /dev/sdy /mnt
Lista novamente os discos do subvolume:
bash btrfs filesystem show /mnt
Exibe uso dos discos do subvolume:
bash btrfs filesystem df /mnt
Balancea os dados entre os discos sobre raid1:
bash btrfs filesystem balance start -dconvert=raid1 -mconvert=raid1 /mnt
Scrub ĂŠ uma passagem por todos os dados e metadados do sistema de arquivos e verifica as somas de verificação. Se uma cĂłpia vĂĄlida estiver disponĂvel (perfis de grupo de blocos replicados), a danificada serĂĄ reparada. Todas as cĂłpias dos perfis replicados sĂŁo validadas.
iniciar o processo de depuração :
bash btrfs scrub start /mnt
ver o status do processo de depuração Btrfs em execução:
bash btrfs scrub status /mnt
ver o status do scrub Btrfs para cada um dos dispositivos
bash btrfs scrub status -d / data btrfs scrub cancel / data
Para retomar o processo de depuração do Btrfs que você cancelou ou pausou:
btrfs scrub resume / data
Listando os subvolumes:
bash btrfs subvolume list /Reports
Criando um instantâneo dos subvolumes:
Aqui, estamos criando um instantâneo de leitura e gravação chamado snap de marketing do subvolume de marketing.
bash btrfs subvolume snapshot /Reports/marketing /Reports/marketing-snap
AlÊm disso, você pode criar um instantâneo somente leitura usando o sinalizador -r conforme mostrado. O marketing-rosnap Ê um instantâneo somente leitura do subvolume de marketing
bash btrfs subvolume snapshot -r /Reports/marketing /Reports/marketing-rosnap
Forçar a sincronização do sistema de arquivos usando o utilitårio 'sync'
Para forçar a sincronização do sistema de arquivos, invoque a opção de sincronização conforme mostrado. Observe que o sistema de arquivos jå deve estar montado para que o processo de sincronização continue com sucesso.
bash btrfs filsystem sync /Reports
Para excluir o dispositivo do sistema de arquivos, use o comando device delete conforme mostrado.
bash btrfs device delete /dev/sdc /Reports
Para sondar o status de um scrub, use o comando scrub status com a opção -dR .
bash btrfs scrub status -dR / RelatĂłrios
Para cancelar a execução do scrub, use o comando scrub cancel .
bash $ sudo btrfs scrub cancel / Reports
Para retomar ou continuar com uma depuração interrompida anteriormente, execute o comando de cancelamento de depuração
bash sudo btrfs scrub resume /Reports
mostra o uso do dispositivo de armazenamento:
btrfs filesystem usage /data
Para distribuir os dados, metadados e dados do sistema em todos os dispositivos de armazenamento do RAID (incluindo o dispositivo de armazenamento recĂŠm-adicionado) montados no diretĂłrio /data , execute o seguinte comando:
sudo btrfs balance start --full-balance /data
Pode demorar um pouco para espalhar os dados, metadados e dados do sistema em todos os dispositivos de armazenamento do RAID se ele contiver muitos dados.
Opçþes importantes de montagem Btrfs
Nesta seção, vou explicar algumas das importantes opçþes de montagem do Btrfs. Então vamos começar.
As opçþes de montagem Btrfs mais importantes são:
**1. acl e noacl
**ACL gerencia permissĂľes de usuĂĄrios e grupos para os arquivos/diretĂłrios do sistema de arquivos Btrfs.
A opção de montagem acl Btrfs habilita ACL. Para desabilitar a ACL, você pode usar a opção de montagem noacl .
Por padrão, a ACL estå habilitada. Portanto, o sistema de arquivos Btrfs usa a opção de montagem acl por padrão.
**2. autodefrag e noautodefrag
**Desfragmentar um sistema de arquivos Btrfs melhorarå o desempenho do sistema de arquivos reduzindo a fragmentação de dados.
A opção de montagem autodefrag permite a desfragmentação automåtica do sistema de arquivos Btrfs.
A opção de montagem noautodefrag desativa a desfragmentação automåtica do sistema de arquivos Btrfs.
Por padrão, a desfragmentação automåtica estå desabilitada. Portanto, o sistema de arquivos Btrfs usa a opção de montagem noautodefrag por padrão.
**3. compactar e compactar-forçar
**Controla a compactação de dados no nĂvel do sistema de arquivos do sistema de arquivos Btrfs.
A opção compactar compacta apenas os arquivos que valem a pena compactar (se compactar o arquivo economizar espaço em disco).
A opção compress-force compacta todos os arquivos do sistema de arquivos Btrfs, mesmo que a compactação do arquivo aumente seu tamanho.
O sistema de arquivos Btrfs suporta muitos algoritmos de compactação e cada um dos algoritmos de compactação possui diferentes nĂveis de compactação.
Os algoritmos de compactação suportados pelo Btrfs sĂŁo: lzo , zlib (nĂvel 1 a 9) e zstd (nĂvel 1 a 15).
Você pode especificar qual algoritmo de compactação usar para o sistema de arquivos Btrfs com uma das seguintes opçþes de montagem:
- compress=algoritmo:nĂvel
- compress-force=algoritmo:nĂvel
Para obter mais informaçþes, consulte meu artigo Como habilitar a compactação do sistema de arquivos Btrfs .
**4. subvol e subvolid
**Estas opçþes de montagem sĂŁo usadas para montar separadamente um subvolume especĂfico de um sistema de arquivos Btrfs.
A opção de montagem subvol Ê usada para montar o subvolume de um sistema de arquivos Btrfs usando seu caminho relativo.
A opção de montagem subvolid Ê usada para montar o subvolume de um sistema de arquivos Btrfs usando o ID do subvolume.
Para obter mais informaçþes, consulte meu artigo Como criar e montar subvolumes Btrfs .
**5. dispositivo
A opção de montagem de dispositivo** Ê usada no sistema de arquivos Btrfs de vårios dispositivos ou RAID Btrfs.
Em alguns casos, o sistema operacional pode falhar ao detectar os dispositivos de armazenamento usados em um sistema de arquivos Btrfs de vårios dispositivos ou RAID Btrfs. Nesses casos, você pode usar a opção de montagem do dispositivo para especificar os dispositivos que deseja usar para o sistema de arquivos de vårios dispositivos Btrfs ou RAID.
Você pode usar a opção de montagem de dispositivo vårias vezes para carregar diferentes dispositivos de armazenamento para o sistema de arquivos de vårios dispositivos Btrfs ou RAID.
Você pode usar o nome do dispositivo (ou seja, sdb , sdc ) ou UUID , UUID_SUB ou PARTUUID do dispositivo de armazenamento com a opção de montagem do dispositivo para identificar o dispositivo de armazenamento.
Por exemplo,
- dispositivo=/dev/sdb
- dispositivo=/dev/sdb,dispositivo=/dev/sdc
- dispositivo=UUID_SUB=490a263d-eb9a-4558-931e-998d4d080c5d
- device=UUID_SUB=490a263d-eb9a-4558-931e-998d4d080c5d,device=UUID_SUB=f7ce4875-0874-436a-b47d-3edef66d3424
**6. degraded
A opção de montagem degradada** permite que um RAID Btrfs seja montado com menos dispositivos de armazenamento do que o perfil RAID requer.
Por exemplo, o perfil raid1 requer a presença de 2 dispositivos de armazenamento. Se um dos dispositivos de armazenamento nĂŁo estiver disponĂvel em qualquer caso, vocĂŞ usa a opção de montagem degradada para montar o RAID mesmo que 1 de 2 dispositivos de armazenamento esteja disponĂvel.
**7. commit
A opção commit** mount Ê usada para definir o intervalo (em segundos) dentro do qual os dados serão gravados no dispositivo de armazenamento.
O padrĂŁo ĂŠ definido como 30 segundos.
Para definir o intervalo de confirmação para 15 segundos, você pode usar a opção de montagem commit=15 (digamos).
**8. ssd e nossd
A opção de montagem ssd** informa ao sistema de arquivos Btrfs que o sistema de arquivos estå usando um dispositivo de armazenamento SSD, e o sistema de arquivos Btrfs faz a otimização SSD necessåria.
A opção de montagem nossd desativa a otimização do SSD.
O sistema de arquivos Btrfs detecta automaticamente se um SSD Ê usado para o sistema de arquivos Btrfs. Se um SSD for usado, a opção de montagem de SSD serå habilitada. Caso contrårio, a opção de montagem nossd Ê habilitada.
**9. ssd_spread e nossd_spread
A opção de montagem ssd_spread** tenta alocar grandes blocos contĂnuos de espaço nĂŁo utilizado do SSD. Esse recurso melhora o desempenho de SSDs de baixo custo (baratos).
A opção de montagem nossd_spread desativa o recurso ssd_spread .
O sistema de arquivos Btrfs detecta automaticamente se um SSD Ê usado para o sistema de arquivos Btrfs. Se um SSD for usado, a opção de montagem ssd_spread serå habilitada. Caso contrårio, a opção de montagem nossd_spread Ê habilitada.
**10. descarte e nodiscard
Se vocĂŞ estiver usando um SSD que suporte TRIM enfileirado assĂncrono (SATA rev3.1), a opção de montagem de descarte** permitirĂĄ o descarte de blocos de arquivos liberados. Isso melhorarĂĄ o desempenho do SSD.
Se o SSD nĂŁo suportar TRIM enfileirado assĂncrono, a opção de montagem de descarte prejudicarĂĄ o desempenho do SSD. Nesse caso, a opção de montagem nodiscard deve ser usada.
Por padrão, a opção de montagem nodiscard Ê usada.
**11. norecovery
Se a opção de montagem norecovery** for usada, o sistema de arquivos Btrfs não tentarå executar a operação de recuperação de dados no momento da montagem.
**12. usebackuproot e nousebackuproot
Se a opção de montagem usebackuproot for usada, o sistema de arquivos Btrfs tentarĂĄ recuperar qualquer raiz de ĂĄrvore ruim/corrompida no momento da montagem. O sistema de arquivos Btrfs pode armazenar vĂĄrias raĂzes de ĂĄrvore no sistema de arquivos. A opção de montagem usebackuproot** procurarĂĄ uma boa raiz de ĂĄrvore e usarĂĄ a primeira boa que encontrar.
A opção de montagem nousebackuproot nĂŁo verificarĂĄ ou recuperarĂĄ raĂzes de ĂĄrvore invĂĄlidas/corrompidas no momento da montagem. Este ĂŠ o comportamento padrĂŁo do sistema de arquivos Btrfs.
**13. space_cache, space_cache=version, nospace_cache e clear_cache
A opção de montagem space_cache** Ê usada para controlar o cache de espaço livre. O cache de espaço livre Ê usado para melhorar o desempenho da leitura do espaço livre do grupo de blocos do sistema de arquivos Btrfs na memória (RAM).
O sistema de arquivos Btrfs suporta 2 versþes do cache de espaço livre: v1 (padrão) e v2
O mecanismo de cache de espaço livre v2 melhora o desempenho de sistemas de arquivos grandes (tamanho de vårios terabytes).
Você pode usar a opção de montagem space_cache=v1 para definir a v1 do cache de espaço livre e a opção de montagem space_cache=v2 para definir a v2 do cache de espaço livre.
A opção de montagem clear_cache Ê usada para limpar o cache de espaço livre.
Quando o cache de espaço livre v2 Ê criado, o cache deve ser limpo para criar um cache de espaço livre v1 .
Portanto, para usar o cache de espaço livre v1 após a criação do cache de espaço livre v2 , as opçþes de montagem clear_cache e space_cache=v1 devem ser combinadas: clear_cache,space_cache=v1
A opção de montagem nospace_cache Ê usada para desabilitar o cache de espaço livre.
Para desabilitar o cache de espaço livre após a criação do cache v1 ou v2 , as opçþes de montagem nospace_cache e clear_cache devem ser combinadas: clear_cache,nosapce_cache
**14. skip_balance
Por padrĂŁo, a operação de balanceamento interrompida/pausada de um sistema de arquivos Btrfs de vĂĄrios dispositivos ou RAID Btrfs serĂĄ retomada automaticamente assim que o sistema de arquivos Btrfs for montado. Para desabilitar a retomada automĂĄtica da operação de equilĂbrio interrompido/pausado em um sistema de arquivos Btrfs de vĂĄrios dispositivos ou RAID Btrfs, vocĂŞ pode usar a opção de montagem skip_balance .**
**15. datacow e nodatacow
A opção datacow** mount habilita o recurso Copy-on-Write (CoW) do sistema de arquivos Btrfs. à o comportamento padrão.
Se você deseja desabilitar o recurso Copy-on-Write (CoW) do sistema de arquivos Btrfs para os arquivos recÊm-criados, monte o sistema de arquivos Btrfs com a opção de montagem nodatacow .
**16. datasum e nodatasum
A opção datasum** mount habilita a soma de verificação de dados para arquivos recÊm-criados do sistema de arquivos Btrfs. Este Ê o comportamento padrão.
Se você não quiser que o sistema de arquivos Btrfs faça a soma de verificação dos dados dos arquivos recÊm-criados, monte o sistema de arquivos Btrfs com a opção de montagem nodatasum .
Perfis Btrfs
Um perfil Btrfs ĂŠ usado para informar ao sistema de arquivos Btrfs quantas cĂłpias dos dados/metadados devem ser mantidas e quais nĂveis de RAID devem ser usados para os dados/metadados. O sistema de arquivos Btrfs contĂŠm muitos perfis. EntendĂŞ-los o ajudarĂĄ a configurar um RAID Btrfs da maneira que vocĂŞ deseja.
Os perfis Btrfs disponĂveis sĂŁo os seguintes:
single : Se o perfil único for usado para os dados/metadados, apenas uma cópia dos dados/metadados serå armazenada no sistema de arquivos, mesmo se você adicionar vårios dispositivos de armazenamento ao sistema de arquivos. Assim, 100% do espaço em disco de cada um dos dispositivos de armazenamento adicionados ao sistema de arquivos pode ser utilizado.
dup : Se o perfil dup for usado para os dados/metadados, cada um dos dispositivos de armazenamento adicionados ao sistema de arquivos manterå duas cópias dos dados/metadados. Assim, 50% do espaço em disco de cada um dos dispositivos de armazenamento adicionados ao sistema de arquivos pode ser utilizado.
raid0 : No perfil raid0 , os dados/metadados serão divididos igualmente em todos os dispositivos de armazenamento adicionados ao sistema de arquivos. Nesta configuração, não haverå dados/metadados redundantes (duplicados). Assim, 100% do espaço em disco de cada um dos dispositivos de armazenamento adicionados ao sistema de arquivos pode ser usado. Se, em qualquer caso, um dos dispositivos de armazenamento falhar, todo o sistema de arquivos serå corrompido. Você precisarå de pelo menos dois dispositivos de armazenamento para configurar o sistema de arquivos Btrfs no perfil raid0 .
raid1 : No perfil raid1 , duas cópias dos dados/metadados serão armazenadas nos dispositivos de armazenamento adicionados ao sistema de arquivos. Nesta configuração, a matriz RAID pode sobreviver a uma falha de unidade. Mas você pode usar apenas 50% do espaço total em disco. Você precisarå de pelo menos dois dispositivos de armazenamento para configurar o sistema de arquivos Btrfs no perfil raid1 .
raid1c3 : No perfil raid1c3 , três cópias dos dados/metadados serão armazenadas nos dispositivos de armazenamento adicionados ao sistema de arquivos. Nesta configuração, a matriz RAID pode sobreviver a duas falhas de unidade, mas você pode usar apenas 33% do espaço total em disco. Você precisarå de pelo menos três dispositivos de armazenamento para configurar o sistema de arquivos Btrfs no perfil raid1c3 .
raid1c4 : No perfil raid1c4 , quatro cópias dos dados/metadados serão armazenadas nos dispositivos de armazenamento adicionados ao sistema de arquivos. Nesta configuração, a matriz RAID pode sobreviver a três falhas de unidade, mas você pode usar apenas 25% do espaço total em disco. Você precisarå de pelo menos quatro dispositivos de armazenamento para configurar o sistema de arquivos Btrfs no perfil raid1c4 .
raid10 : No perfil raid10 , duas cĂłpias dos dados/metadados serĂŁo armazenadas nos dispositivos de armazenamento adicionados ao sistema de arquivos, como no perfil raid1 . AlĂŠm disso, os dados/metadados serĂŁo divididos entre os dispositivos de armazenamento, como no perfil raid0 .
O perfil raid10 ĂŠ um hĂbrido dos perfis raid1 e raid0 . Alguns dos dispositivos de armazenamento formam arrays raid1 e alguns desses arrays raid1 sĂŁo usados para formar um array raid0 . Em uma configuração raid10 , o sistema de arquivos pode sobreviver a uma Ăşnica falha de unidade em cada uma das matrizes raid1 .
Você pode usar 50% do espaço total em disco na configuração raid10 . Você precisarå de pelo menos quatro dispositivos de armazenamento para configurar o sistema de arquivos Btrfs no perfil raid10 .
raid5 : No perfil raid5 , uma cĂłpia dos dados/metadados serĂĄ dividida entre os dispositivos de armazenamento. Uma Ăşnica paridade serĂĄ calculada e distribuĂda entre os dispositivos de armazenamento do array RAID.
Em uma configuração raid5 , o sistema de arquivos pode sobreviver a uma Ăşnica falha de unidade. Se uma unidade falhar, vocĂŞ pode adicionar uma nova unidade ao sistema de arquivos e os dados perdidos serĂŁo calculados a partir da paridade distribuĂda das unidades em execução.
Você pode usar 1 00x(N-1)/N % do total de espaços em disco na configuração raid5 . Aqui, N Ê o número de dispositivos de armazenamento adicionados ao sistema de arquivos. Você precisarå de pelo menos três dispositivos de armazenamento para configurar o sistema de arquivos Btrfs no perfil raid5 .
raid6 : No perfil raid6 , uma cĂłpia dos dados/metadados serĂĄ dividida entre os dispositivos de armazenamento. Duas paridades serĂŁo calculadas e distribuĂdas entre os dispositivos de armazenamento do array RAID.
Em uma configuração raid6 , o sistema de arquivos pode sobreviver a duas falhas de unidade ao mesmo tempo. Se uma unidade falhar, vocĂŞ poderĂĄ adicionar uma nova unidade ao sistema de arquivos e os dados perdidos serĂŁo calculados a partir das duas paridades distribuĂdas das unidades em execução.
Você pode usar 100x(N-2)/N % do espaço total em disco na configuração raid6 . Aqui, N Ê o número de dispositivos de armazenamento adicionados ao sistema de arquivos. Você precisarå de pelo menos quatro dispositivos de armazenamento para configurar o sistema de arquivos Btrfs no perfil raid6 .
-
@ 5d4b6c8d:8a1c1ee3
2025-05-28 12:37:30https://rumble.com/embed/v6rp3fh/?pub=4e023h
I know some of our stackers are follicly challenged, so I thought I'd pass along this video.
Have any of you tried topical onion juice for hair regrowth?
I'll eat more onion and rosemary and get more Sun, just to be safe.
https://stacker.news/items/991118
-
@ 21335073:a244b1ad
2025-03-18 20:47:50Warning: This piece contains a conversation about difficult topics. Please proceed with caution.
TL;DR please educate your children about online safety.
Julian Assange wrote in his 2012 book Cypherpunks, âThis book is not a manifesto. There isnât time for that. This book is a warning.â I read it a few times over the past summer. Those opening lines definitely stood out to me. I wish we had listened back then. He saw something about the internet that few had the ability to see. There are some individuals who are so close to a topic that when they speak, itâs difficult for others who arenât steeped in it to visualize what theyâre talking about. I didnât read the book until more recently. If I had read it when it came out, it probably would have sounded like an unknown foreign language to me. Today it makes more sense.
This isnât a manifesto. This isnât a book. There is no time for that. Itâs a warning and a possible solution from a desperate and determined survivor advocate who has been pulling and unraveling a thread for a few years. At times, I feel too close to this topic to make any sense trying to convey my pathway to my conclusions or thoughts to the general public. My hope is that if nothing else, I can convey my sense of urgency while writing this. This piece is a watchmanâs warning.
When a child steps online, they are walking into a new world. A new reality. When you hand a child the internet, you are handing them possibilitiesâgood, bad, and ugly. This is a conversation about lowering the potential of negative outcomes of stepping into that new world and how I came to these conclusions. I constantly compare the internet to the road. You wouldnât let a young child run out into the road with no guidance or safety precautions. When you hand a child the internet without any type of guidance or safety measures, you are allowing them to play in rush hour, oncoming traffic. âLook left, look right for cars before crossing.â We almost all have been taught that as children. What are we taught as humans about safety before stepping into a completely different reality like the internet? Very little.
I could never really figure out why many folks in tech, privacy rights activists, and hackers seemed so cold to me while talking about online child sexual exploitation. I always figured that as a survivor advocate for those affected by these crimes, that specific, skilled group of individuals would be very welcoming and easy to talk to about such serious topics. I actually had one hacker laugh in my face when I brought it up while I was looking for answers. I thought maybe this individual thought I was accusing them of something I wasnât, so I felt bad for asking. I was constantly extremely disappointed and would ask myself, âWhy donât they care? What could I say to make them care more? What could I say to make them understand the crisis and the level of suffering that happens as a result of the problem?â
I have been serving minor survivors of online child sexual exploitation for years. My first case serving a survivor of this specific crime was in 2018âa 13-year-old girl sexually exploited by a serial predator on Snapchat. That was my first glimpse into this side of the internet. I won a national award for serving the minor survivors of Twitter in 2023, but I had been working on that specific project for a few years. I was nominated by a lawyer representing two survivors in a legal battle against the platform. Iâve never really spoken about this before, but at the time it was a choice for me between fighting Snapchat or Twitter. I chose Twitterâor rather, Twitter chose me. I heard about the story of John Doe #1 and John Doe #2, and I was so unbelievably broken over it that I went to war for multiple years. I was and still am royally pissed about that case. As far as I was concerned, the John Doe #1 case proved that whatever was going on with corporate tech social media was so out of control that I didnât have time to wait, so I got to work. It was reading the messages that John Doe #1 sent to Twitter begging them to remove his sexual exploitation that broke me. He was a child begging adults to do something. A passion for justice and protecting kids makes you do wild things. I was desperate to find answers about what happened and searched for solutions. In the end, the platform Twitter was purchased. During the acquisition, I just asked Mr. Musk nicely to prioritize the issue of detection and removal of child sexual exploitation without violating digital privacy rights or eroding end-to-end encryption. Elon thanked me multiple times during the acquisition, made some changes, and I was thanked by others on the survivorsâ side as well.
I still feel that even with the progress made, I really just scratched the surface with Twitter, now X. I left that passion project when I did for a few reasons. I wanted to give new leadership time to tackle the issue. Elon Musk made big promises that I knew would take a while to fulfill, but mostly I had been watching global legislation transpire around the issue, and frankly, the governments are willing to go much further with X and the rest of corporate tech than I ever would. My work begging Twitter to make changes with easier reporting of content, detection, and removal of child sexual exploitation materialâwithout violating privacy rights or eroding end-to-end encryptionâand advocating for the minor survivors of the platform went as far as my principles would have allowed. Iâm grateful for that experience. I was still left with a nagging question: âHow did things get so bad with Twitter where the John Doe #1 and John Doe #2 case was able to happen in the first place?â I decided to keep looking for answers. I decided to keep pulling the thread.
I never worked for Twitter. This is often confusing for folks. I will say that despite being disappointed in the platformâs leadership at times, I loved Twitter. I saw and still see its value. I definitely love the survivors of the platform, but I also loved the platform. I was a champion of the platformâs ability to give folks from virtually around the globe an opportunity to speak and be heard.
I want to be clear that John Doe #1 really is my why. He is the inspiration. I am writing this because of him. He represents so many globally, and Iâm still inspired by his bravery. One childâs voice begging adults to do somethingâIâm an adult, I heard him. Iâd go to war a thousand more lifetimes for that young man, and I donât even know his name. Fighting has been personally dark at times; Iâm not even going to try to sugarcoat it, but it has been worth it.
The data surrounding the very real crime of online child sexual exploitation is available to the public online at any time for anyone to see. Iâd encourage you to go look at the data for yourself. I believe in encouraging folks to check multiple sources so that you understand the full picture. If you are uncomfortable just searching around the internet for information about this topic, use the terms âCSAM,â âCSEM,â âSG-CSEM,â or âAI Generated CSAM.â The numbers donât lieâitâs a nightmare thatâs out of control. Itâs a big business. The demand is high, and unfortunately, business is booming. Organizations collect the data, tech companies often post their data, governments report frequently, and the corporate press has covered a decent portion of the conversation, so Iâm sure you can find a source that you trust.
Technology is changing rapidly, which is great for innovation as a whole but horrible for the crime of online child sexual exploitation. Those wishing to exploit the vulnerable seem to be adapting to each technological change with ease. The governments are so far behind with tackling these issues that as Iâm typing this, itâs borderline irrelevant to even include them while speaking about the crime or potential solutions. Technology is changing too rapidly, and their old, broken systems canât even dare to keep up. Think of it like the governmentsâ âWar on Drugs.â Drugs won. In this case as well, the governments are not winning. The governments are talking about maybe having a meeting on potentially maybe having legislation around the crimes. The time to have that meeting would have been many years ago. Iâm not advocating for governments to legislate our way out of this. Iâm on the side of educating and innovating our way out of this.
I have been clear while advocating for the minor survivors of corporate tech platforms that I would not advocate for any solution to the crime that would violate digital privacy rights or erode end-to-end encryption. That has been a personal moral position that I was unwilling to budge on. This is an extremely unpopular and borderline nonexistent position in the anti-human trafficking movement and online child protection space. Iâm often fearful that Iâm wrong about this. I have always thought that a better pathway forward would have been to incentivize innovation for detection and removal of content. I had no previous exposure to privacy rights activists or Cypherpunksâactually, I came to that conclusion by listening to the voices of MENA region political dissidents and human rights activists. After developing relationships with human rights activists from around the globe, I realized how important privacy rights and encryption are for those who need it most globally. I was simply unwilling to give more power, control, and opportunities for mass surveillance to big abusers like governments wishing to enslave entire nations and untrustworthy corporate tech companies to potentially end some portion of abuses online. On top of all of it, it has been clear to me for years that all potential solutions outside of violating digital privacy rights to detect and remove child sexual exploitation online have not yet been explored aggressively. Iâve been disappointed that there hasnât been more of a conversation around preventing the crime from happening in the first place.
What has been tried is mass surveillance. In China, they are currently under mass surveillance both online and offline, and their behaviors are attached to a social credit score. Unfortunately, even on state-run and controlled social media platforms, they still have child sexual exploitation and abuse imagery pop up along with other crimes and human rights violations. They also have a thriving black market online due to the oppression from the state. In other words, even an entire loss of freedom and privacy cannot end the sexual exploitation of children online. Itâs been tried. There is no reason to repeat this method.
It took me an embarrassingly long time to figure out why I always felt a slight coldness from those in tech and privacy-minded individuals about the topic of child sexual exploitation online. I didnât have any clue about the âFour Horsemen of the Infocalypse.â This is a term coined by Timothy C. May in 1988. I would have been a child myself when he first said it. I actually laughed at myself when I heard the phrase for the first time. I finally got it. The Cypherpunks werenât wrong about that topic. They were so spot on that it is borderline uncomfortable. I was mad at first that they knew that early during the birth of the internet that this issue would arise and didnât address it. Then I got over it because I realized that it wasnât their job. Their job wasâisâto write code. Their job wasnât to be involved and loving parents or survivor advocates. Their job wasnât to educate children on internet safety or raise awareness; their job was to write code.
They knew that child sexual abuse material would be shared on the internet. They said what would happenânot in a gleeful way, but a prediction. Then it happened.
I equate it now to a concrete company laying down a road. As youâre pouring the concrete, you can say to yourself, âA terrorist might travel down this road to go kill many, and on the flip side, a beautiful child can be born in an ambulance on this road.â Who or what travels down the road is not their responsibilityâthey are just supposed to lay the concrete. Iâd never go to a concrete pourer and ask them to solve terrorism that travels down roads. Under the current system, law enforcement should stop terrorists before they even make it to the road. The solution to this specific problem is not to treat everyone on the road like a terrorist or to not build the road.
So I understand the perceived coldness from those in tech. Not only was it not their job, but bringing up the topic was seen as the equivalent of asking a free person if they wanted to discuss one of the four topicsâchild abusers, terrorists, drug dealers, intellectual property pirates, etc.âthat would usher in digital authoritarianism for all who are online globally.
Privacy rights advocates and groups have put up a good fight. They stood by their principles. Unfortunately, when it comes to corporate tech, I believe that the issue of privacy is almost a complete lost cause at this point. Itâs still worth pushing back, but ultimately, it is a losing battleâa ticking time bomb.
I do think that corporate tech providers could have slowed down the inevitable loss of privacy at the hands of the state by prioritizing the detection and removal of CSAM when they all started online. I believe it would have bought some time, fewer would have been traumatized by that specific crime, and I do believe that it could have slowed down the demand for content. If I think too much about that, Iâll go insane, so I try to push the âif maybesâ aside, but never knowing if it could have been handled differently will forever haunt me. At night when itâs quiet, I wonder what I would have done differently if given the opportunity. Iâll probably never know how much corporate tech knew and ignored in the hopes that it would go away while the problem continued to get worse. They had different priorities. The most voiceless and vulnerable exploited on corporate tech never had much of a voice, so corporate tech providers didnât receive very much pushback.
Now Iâm about to say something really wild, and you can call me whatever you want to call me, but Iâm going to say what I believe to be true. I believe that the governments are either so incompetent that they allowed the proliferation of CSAM online, or they knowingly allowed the problem to fester long enough to have an excuse to violate privacy rights and erode end-to-end encryption. The US government could have seized the corporate tech providers over CSAM, but I believe that they were so useful as a propaganda arm for the regimes that they allowed them to continue virtually unscathed.
That season is done now, and the governments are making the issue a priority. It will come at a high cost. Privacy on corporate tech providers is virtually done as Iâm typing this. It feels like a death rattle. Iâm not particularly sure that we had much digital privacy to begin with, but the illusion of a veil of privacy feels gone.
To make matters slightly more complex, it would be hard to convince me that once AI really gets going, digital privacy will exist at all.
I believe that there should be a conversation shift to preserving freedoms and human rights in a post-privacy society.
I donât want to get locked up because AI predicted a nasty post online from me about the government. Iâm not a doomer about AIâIâm just going to roll with it personally. Iâm looking forward to the positive changes that will be brought forth by AI. I see it as inevitable. A bit of privacy was helpful while it lasted. Please keep fighting to preserve what is left of privacy either way because I could be wrong about all of this.
On the topic of AI, the addition of AI to the horrific crime of child sexual abuse material and child sexual exploitation in multiple ways so far has been devastating. Itâs currently out of control. The genie is out of the bottle. I am hopeful that innovation will get us humans out of this, but Iâm not sure how or how long it will take. We must be extremely cautious around AI legislation. It should not be illegal to innovate even if some bad comes with the good. I donât trust that the governments are equipped to decide the best pathway forward for AI. Source: the entire history of the government.
I have been personally negatively impacted by AI-generated content. Every few days, I get another alert that Iâm featured again in whatâs called âdeep fake pornographyâ without my consent. Iâm not happy about it, but what pains me the most is the thought that for a period of time down the road, many globally will experience what myself and others are experiencing now by being digitally sexually abused in this way. If you have ever had your picture taken and posted online, you are also at risk of being exploited in this way. Your childâs image can be used as well, unfortunately, and this is just the beginning of this particular nightmare. It will move to more realistic interpretations of sexual behaviors as technology improves. I have no brave words of wisdom about how to deal with that emotionally. I do have hope that innovation will save the day around this specific issue. Iâm nervous that everyone online will have to ID verify due to this issue. I see that as one possible outcome that could help to prevent one problem but inadvertently cause more problems, especially for those living under authoritarian regimes or anyone who needs to remain anonymous online. A zero-knowledge proof (ZKP) would probably be the best solution to these issues. There are some survivors of violence and/or sexual trauma who need to remain anonymous online for various reasons. There are survivor stories available online of those who have been abused in this way. Iâd encourage you seek out and listen to their stories.
There have been periods of time recently where I hesitate to say anything at all because more than likely AI will cover most of my concerns about education, awareness, prevention, detection, and removal of child sexual exploitation online, etc.
Unfortunately, some of the most pressing issues weâve seen online over the last few years come in the form of âsextortion.â Self-generated child sexual exploitation (SG-CSEM) numbers are continuing to be terrifying. Iâd strongly encourage that you look into sextortion data. AI + sextortion is also a huge concern. The perpetrators are using the non-sexually explicit images of children and putting their likeness on AI-generated child sexual exploitation content and extorting money, more imagery, or both from minors online. Itâs like a million nightmares wrapped into one. The wild part is that these issues will only get more pervasive because technology is harnessed to perpetuate horror at a scale unimaginable to a human mind.
Even if you banned phones and the internet or tried to prevent children from accessing the internet, it wouldnât solve it. Child sexual exploitation will still be with us until as a society we start to prevent the crime before it happens. That is the only human way out right now.
There is no reset button on the internet, but if I could go back, Iâd tell survivor advocates to heed the warnings of the early internet builders and to start education and awareness campaigns designed to prevent as much online child sexual exploitation as possible. The internet and technology moved quickly, and I donât believe that society ever really caught up. We live in a world where a child can be groomed by a predator in their own home while sitting on a couch next to their parents watching TV. We werenât ready as a species to tackle the fast-paced algorithms and dangers online. It happened too quickly for parents to catch up. How can you parent for the ever-changing digital world unless you are constantly aware of the dangers?
I donât think that the internet is inherently bad. I believe that it can be a powerful tool for freedom and resistance. Iâve spoken a lot about the bad online, but there is beauty as well. We often discuss how victims and survivors are abused online; we rarely discuss the fact that countless survivors around the globe have been able to share their experiences, strength, hope, as well as provide resources to the vulnerable. I do question if giving any government or tech company access to censorship, surveillance, etc., online in the name of serving survivors might not actually impact a portion of survivors negatively. There are a fair amount of survivors with powerful abusers protected by governments and the corporate press. If a survivor cannot speak to the press about their abuse, the only place they can go is online, directly or indirectly through an independent journalist who also risks being censored. This scenario isnât hard to imagineâit already happened in China. During #MeToo, a survivor in China wanted to post their story. The government censored the post, so the survivor put their story on the blockchain. Iâm excited that the survivor was creative and brave, but itâs terrifying to think that we live in a world where that situation is a necessity.
I believe that the future for many survivors sharing their stories globally will be on completely censorship-resistant and decentralized protocols. This thought in particular gives me hope. When we listen to the experiences of a diverse group of survivors, we can start to understand potential solutions to preventing the crimes from happening in the first place.
My heart is broken over the gut-wrenching stories of survivors sexually exploited online. Every time I hear the story of a survivor, I do think to myself quietly, âWhat could have prevented this from happening in the first place?â My heart is with survivors.
My head, on the other hand, is full of the understanding that the internet should remain free. The free flow of information should not be stopped. My mind is with the innocent citizens around the globe that deserve freedom both online and offline.
The problem is that governments donât only want to censor illegal content that violates human rightsâthey create legislation that is so broad that it can impact speech and privacy of all. âDonât you care about the kids?â Yes, I do. I do so much that Iâm invested in finding solutions. I also care about all citizens around the globe that deserve an opportunity to live free from a mass surveillance society. If terrorism happens online, I should not be punished by losing my freedom. If drugs are sold online, I should not be punished. Iâm not an abuser, Iâm not a terrorist, and I donât engage in illegal behaviors. I refuse to lose freedom because of othersâ bad behaviors online.
I want to be clear that on a long enough timeline, the governments will decide that they can be better parents/caregivers than you can if something isnât done to stop minors from being sexually exploited online. The price will be a complete loss of anonymity, privacy, free speech, and freedom of religion online. I find it rather insulting that governments think theyâre better equipped to raise children than parents and caretakers.
So we canât go backwardsâall that we can do is go forward. Those who want to have freedom will find technology to facilitate their liberation. This will lead many over time to decentralized and open protocols. So as far as Iâm concerned, this does solve a few of my worriesâthose who need, want, and deserve to speak freely online will have the opportunity in most countriesâbut what about online child sexual exploitation?
When I popped up around the decentralized space, I was met with the fear of censorship. Iâm not here to censor you. I donât write code. I couldnât censor anyone or any piece of content even if I wanted to across the internet, no matter how depraved. I donât have the skills to do that.
Iâm here to start a conversation. Freedom comes at a cost. You must always fight for and protect your freedom. I canât speak about protecting yourself from all of the Four Horsemen because I simply donât know the topics well enough, but I can speak about this one topic.
If there was a shortcut to ending online child sexual exploitation, I would have found it by now. There isnât one right now. I believe that education is the only pathway forward to preventing the crime of online child sexual exploitation for future generations.
I propose a yearly education course for every child of all school ages, taught as a standard part of the curriculum. Ideally, parents/caregivers would be involved in the education/learning process.
Course: - The creation of the internet and computers - The fight for cryptography - The tech supply chain from the ground up (example: human rights violations in the supply chain) - Corporate tech - Freedom tech - Data privacy - Digital privacy rights - AI (history-current) - Online safety (predators, scams, catfishing, extortion) - Bitcoin - Laws - How to deal with online hate and harassment - Information on who to contact if you are being abused online or offline - Algorithms - How to seek out the truth about news, etc., online
The parents/caregivers, homeschoolers, unschoolers, and those working to create decentralized parallel societies have been an inspiration while writing this, but my hope is that all children would learn this course, even in government ran schools. Ideally, parents would teach this to their own children.
The decentralized space doesnât want child sexual exploitation to thrive. Hereâs the deal: there has to be a strong prevention effort in order to protect the next generation. The internet isnât going anywhere, predators arenât going anywhere, and Iâm not down to let anyone have the opportunity to prove that there is a need for more government. I donât believe that the government should act as parents. The governments have had a chance to attempt to stop online child sexual exploitation, and they didnât do it. Can we try a different pathway forward?
Iâd like to put myself out of a job. I donât want to ever hear another story like John Doe #1 ever again. This will require work. Iâve often called online child sexual exploitation the lynchpin for the internet. Itâs time to arm generations of children with knowledge and tools. I canât do this alone.
Individuals have fought so that I could have freedom online. I want to fight to protect it. I donât want child predators to give the government any opportunity to take away freedom. Decentralized spaces are as close to a reset as weâll get with the opportunity to do it right from the start. Start the youth off correctly by preventing potential hazards to the best of your ability.
The good news is anyone can work on this! Iâd encourage you to take it and run with it. I added the additional education about the history of the internet to make the course more educational and fun. Instead of cleaning up generations of destroyed lives due to online sexual exploitation, perhaps this could inspire generations of those who will build our futures. Perhaps if the youth is armed with knowledge, they can create more tools to prevent the crime.
This one solution that Iâm suggesting can be done on an individual level or on a larger scale. It should be adjusted depending on age, learning style, etc. It should be fun and playful.
This solution does not address abuse in the home or some of the root causes of offline child sexual exploitation. My hope is that it could lead to some survivors experiencing abuse in the home an opportunity to disclose with a trusted adult. The purpose for this solution is to prevent the crime of online child sexual exploitation before it occurs and to arm the youth with the tools to contact safe adults if and when it happens.
In closing, I went to hell a few times so that you didnât have to. I spoke to the mothers of survivors of minors sexually exploited onlineâtheir tears could fill rivers. Iâve spoken with political dissidents who yearned to be free from authoritarian surveillance states. The only balance that Iâve found is freedom online for citizens around the globe and prevention from the dangers of that for the youth. Donât slow down innovation and freedom. Educate, prepare, adapt, and look for solutions.
Iâm not perfect and Iâm sure that there are errors in this piece. I hope that you find them and it starts a conversation.
-
@ 21335073:a244b1ad
2025-03-15 23:00:40I want to see Nostr succeed. If you can think of a way I can help make that happen, Iâm open to it. Iâd like your suggestions.
My scheduleâs shifting soon, and I could volunteer a few hours a week to a Nostr project. I wonât have more total time, but how I use it will change.
Why help? I care about freedom. Nostrâs one of the most powerful freedom tools Iâve seen in my lifetime. If I believe that, I should act on it.
I donât care about money or sats. Iâm not rich, I donât have extra cash. That doesnât drive meâfreedom does. Iâm volunteering, not asking for pay.
Iâm not here for clout. Iâve had enough spotlight in my life; it doesnât move me. If I wanted clout, Iâd be on Twitter dropping basic takes. Cloutâs easy. Freedomâs hard. Iâd rather help anonymously. No speaking at eventsâsmall meetups are cool for the vibe, but big conferences? Not my thing. Iâll never hit a huge Bitcoin conference. Itâs just not my scene.
That said, I could be convinced to step up if itâd really boost Nostrâas long as itâs legal and gets results.
In this space, Iâd watch for social engineering. I watch out for it. Iâm not here to make friends, just to help. No shadeâyou all seem greatâbut Iâve got a full life and awesome friends irl. I donât need your crew or to be online cool. Connect anonymously if you want; Iâd encourage it.
Iâm sick of watching other social media alternatives grow while Nostr kinda stalls. I could trash-talk, but Iâd rather do something useful.
Skills? Iâm good at spotting social media problems and finding possible solutions. I wonât overhype myselfâthatâs weirdâbut if youâre responding, you probably see something in me. Perhaps you see something that I donât see in myself.
If you need help now or later with Nostr projects, reach out. Nostr onlyânothing else. Anonymous contactâs fine. Even just a suggestion on how I can pitch in, no project attached, works too. đ
Creeps or harassment will get blocked or Iâll nuke my simplex code if it becomes a problem.
https://simplex.chat/contact#/?v=2-4&smp=smp%3A%2F%2FSkIkI6EPd2D63F4xFKfHk7I1UGZVNn6k1QWZ5rcyr6w%3D%40smp9.simplex.im%2FbI99B3KuYduH8jDr9ZwyhcSxm2UuR7j0%23%2F%3Fv%3D1-2%26dh%3DMCowBQYDK2VuAyEAS9C-zPzqW41PKySfPCEizcXb1QCus6AyDkTTjfyMIRM%253D%26srv%3Djssqzccmrcws6bhmn77vgmhfjmhwlyr3u7puw4erkyoosywgl67slqqd.onion
-
@ a3c6f928:d45494fb
2025-05-28 12:21:32In a world that constantly demands our attention, where external achievements are often mistaken for fulfillment, there is a quieter, more powerful path to freedomâthe journey within. True freedom is not merely the absence of constraints but the presence of inner peace, purpose, and self-mastery.
What Is Self-Mastery?
Self-mastery is the ability to govern your thoughts, emotions, and actions in alignment with your values and goals. It is about becoming the author of your own story rather than being swept away by the noise and chaos of the external world. With self-mastery comes clarity, direction, and the freedom to live authentically.
The Pillars of Inner Freedom
-
Self-Awareness: Freedom begins with knowing who you are. Understanding your strengths, triggers, and motivations lays the foundation for personal growth.
-
Discipline: Discipline is not restrictionâit is the structure that supports your vision. It turns intention into reality.
-
Emotional Intelligence: Learning to manage emotions, rather than being ruled by them, grants the power to respond rather than react.
-
Purpose: A sense of purpose provides direction. When you know what matters most, distractions lose their power.
Why Self-Mastery Matters
Without self-mastery, external freedom can feel hollow. You might have opportunities, resources, and rights, yet still feel trappedâby fear, self-doubt, or the need for validation. Mastering yourself unlocks the kind of freedom that no one can take away: the freedom to be at peace with who you are.
How to Begin the Journey
-
Reflect Daily: Spend time each day in silence or journaling to deepen your awareness.
-
Set Intentions: Start each day with a clear intention to guide your focus.
-
Challenge Yourself: Growth lies just beyond your comfort zone. Embrace discomfort as part of the process.
-
Seek Stillness: Create moments of stillness to listen to your inner voice.
âHe who conquers himself is the mightiest warrior.â â Confucius
True freedom starts from within. Master yourself, and you master your life.
-
-
@ 21335073:a244b1ad
2025-03-12 00:40:25Before I saw those X right-wing political âinfluencersâ parading their Epstein binders in that PR stunt, Iâd already posted this on Nostr, an open protocol.Â
âToday, the worldâs attention will likely fixate on Epstein, governmental failures in addressing horrific abuse cases, and the influential figures who perpetrate such actsâyet few will center the victims and survivors in the conversation. The survivors of Epstein went to law enforcement and very little happened. The survivors tried to speak to the corporate press and the corporate press knowingly covered for him. In situations like these social media can serve as one of the only ways for a survivorâs voice to be heard.Â
Itâs becoming increasingly evident that the line between centralized corporate social media and the state is razor-thin, if it exists at all. Time and again, the state shields powerful abusers when itâs politically expedient to do so. In this climate, a survivor attempting to expose someone like Epstein on a corporate tech platform faces an uphill battleâthereâs no assurance their voice would even break through. Their story wouldnât truly belong to them; itâd be at the mercy of the platform, subject to deletion at a whim. Nostr, though, offers a lifelineâa censorship-resistant space where survivors can share their truths, no matter how untouchable the abuser might seem. A survivor could remain anonymous here if they took enough steps.Â
Nostr holds real promise for amplifying survivor voices. And if youâre here daily, tossing out memes, take heart: youâre helping build a foundation for those who desperately need to be heard.â
That post is untouchableâno CEO, company, employee, or government can delete it. Even if I wanted to, I couldnât take it down myself. The post will outlive me on the protocol.Â
The cozy alliance between the state and corporate social media hit me hard during that right-wing X âinfluencerâ PR stunt. Elon owns X. Elonâs a special government employee. X pays those influencers to post. We donât know who else pays them to post. Those influencers are spurred on by both the government and X to manage the Epstein case narrative. It wasnât survivors standing there, grinning for photosâit was paid influencers, gatekeepers orchestrating yet another chance to re-exploit the already exploited.
The bond between the state and corporate social media is tight. If the other Epsteins out there are ever to be unmasked, I wouldnât bet on a survivorâs story staying safe with a corporate tech platform, the government, any social media influencer, or mainstream journalist. Right now, only a protocol can hand survivors the power to truly own their narrative.
I donât have anything against ElonâIâve actually been a big supporter. Iâm just stating it as I see it. X isnât censorship resistant and they have an algorithm that they choose not the user. Corporate tech platforms like X can be a better fit for some survivors. X has safety tools and content moderation, making it a solid option for certain individuals. Grok can be a big help for survivors looking for resources or support! As a survivor, you know what works best for you, and safety should always come firstâkeep that front and center.
That said, a protocol is a game-changer for cases where the powerful are likely to censor. During China's # MeToo movement, survivors faced heavy censorship on social media platforms like Weibo and WeChat, where posts about sexual harassment were quickly removed, and hashtags like # MeToo or "woyeshi" were blocked by government and platform filters. To bypass this, activists turned to blockchain technology encoding their storiesâlike Yue Xinâs open letter about a Peking University caseâinto transaction metadata. This made the information tamper-proof and publicly accessible, resisting censorship since blockchain data canât be easily altered or deleted.
I posted this on X 2/28/25. I wanted to try my first long post on a nostr client. The Epstein cover up is ongoing so itâs still relevant, unfortunately.
If you are a survivor or loved one who is reading this and needs support please reach out to: National Sexual Assault Hotline 24/7 https://rainn.org/
Hours: Available 24 hours
-
@ cae03c48:2a7d6671
2025-05-28 12:00:38Bitcoin Magazine
Bitcoin Enters a New Era: Industry Leaders Predict Trillions in Institutional InflowsAt the 2025 Bitcoin Conference in Las Vegas, the Founder and CEO of Kelly Intelligence Kevin Kelly, the Chief Executive Officer of Bitwise Asset Management Hunter Horsley, the CEO of BitGo Mike Belshe and the Advisor of WBTC Justin Sun talked about the future of financial products in the globe.Â
Hunter Horsley started the panel by saying that we are entering a new chapter in 2025 with the change in the regulatory circumstances.
âIn the US wealth managers manage between 30 and 60 trillion dollars,â said Horsley. âIf wealth managers wind up allocating 1% to the space on behalf of their clients, helping their clients access the opportunities here that are hundreds and billions of dollars.â
JUST IN:
$12 billion Bitwise CEO Hunter Horsley says if wealth managers allocate 1% to #Bitcoin, âthat's hundreds of billions of dollars.â
pic.twitter.com/4OhoBjwDYR
â Bitcoin Magazine (@BitcoinMagazine) May 27, 2025
Justin Sun emphasized the importance of integrating Bitcoin into decentralized finance (DeFi) platforms:
âRaw Bitcoin is a way to get your Bitcoin into a smart contract platform,â said Sun. âYou can use your Bitcoin as collateral you borrow like stablecoin, you borrow other major crypto currencies tokens and also of course generate yield on the Bitcoin you are holding because Bitcoin is a proof of network.â
âAny transaction you can see in the blockchain and all the reserve addresses is available on the Blockchain. Itâs safe and transparent and at the same time is smart,â stated Sun.
Mike Belshe elaborated on the foundational elements that make a stablecoin successful, particularly when Bitcoin is used in that context.
âWhat makes a good stablecoin whether you are talking about dollars or Bitcoin, itâs the liquidity that you have on the market around the world,â stated Belshe.
Horsley continued by addressing that weâll see more companies adopting this and hundreds of thousands of Bitcoin being put onto more balance sheets.Â
âCorporations are buying Bitcoin,â commented Horsley. âItâs an extraordinary theme of this year. As of the first quarter of this year, 79 publicly traded companies had put Bitcoin on their balance sheet. Over 600k Bitcoin and there is only 21 million Bitcoin. Itâs a lot of Bitcoinâ
Justin Sun closed the panel by stating, âthe progress we are making here in the United States really matters because as we all further encourage people around the world to get into the Bitcoin industry.â
âOnce Bitcoin passes this kind of stage and gets institution adoption in the United States will accelerate that option globally,â said Sun.
This post Bitcoin Enters a New Era: Industry Leaders Predict Trillions in Institutional Inflows first appeared on Bitcoin Magazine and is written by Oscar Zarraga Perez.
-
@ 4857600b:30b502f4
2025-03-10 12:09:35At this point, we should be arresting, not firing, any FBI employee who delays, destroys, or withholds information on the Epstein case. There is ZERO explanation I will accept for redacting anything for ânational securityâ reasons. A lot of Trump supporters are losing patience with Pam Bondi. I will give her the benefit of the doubt for now since the corruption within the whole security/intelligence apparatus of our country runs deep. However, letâs not forget that probably Trumpâs biggest mistakes in his first term involved picking weak and easily corruptible (or blackmailable) officials. It seemed every month a formerly-loyal person did a complete 180 degree turn and did everything they could to screw him over, regardless of the betrayalâs effect on the country or whatever principles that person claimed to have. I think heâs fixed his screening process, but since weâre talking about the FBI, we know they have the power to dig up any dirt or blackmail material available, or just make it up. In the Epstein case, itâs probably better to go after Bondi than give up a treasure trove of blackmail material against the long list of members on his client list.
-
@ 4925ea33:025410d8
2025-03-08 00:38:481. O que ĂŠ um Aromaterapeuta?
O aromaterapeuta ĂŠ um profissional especializado na prĂĄtica da Aromaterapia, responsĂĄvel pelo uso adequado de Ăłleos essenciais, ervas aromĂĄticas, ĂĄguas florais e destilados herbais para fins terapĂŞuticos.
A atuação desse profissional envolve diferentes mĂŠtodos de aplicação, como inalação, uso tĂłpico, sempre considerando a segurança e a necessidade individual do cliente. A Aromaterapia pode auxiliar na redução do estresse, alĂvio de dores crĂ´nicas, relaxamento muscular e melhora da respiração, entre outros benefĂcios.
AlÊm disso, os aromaterapeutas podem trabalhar em conjunto com outros profissionais da saúde para oferecer um tratamento complementar em diversas condiçþes. Como jå mencionado no artigo sobre "Como evitar processos alÊrgicos na pråtica da Aromaterapia", Ê essencial ter acompanhamento profissional, pois os óleos essenciais são altamente concentrados e podem causar reaçþes adversas se utilizados de forma inadequada.
2. Como um Aromaterapeuta Pode Ajudar?
VocĂŞ pode procurar um aromaterapeuta para diferentes necessidades, como:
â QuestĂľes Emocionais e PsicolĂłgicas
AuxĂlio em momentos de luto, divĂłrcio, demissĂŁo ou outras situaçþes desafiadoras.
Apoio na redução do estresse, ansiedade e insônia.
Vale lembrar que, em casos de transtornos psiquiĂĄtricos, a Aromaterapia deve ser usada como terapia complementar, associada ao tratamento mĂŠdico.
â QuestĂľes FĂsicas
Dores musculares e articulares.
Problemas respiratĂłrios como rinite, sinusite e tosse.
DistĂşrbios digestivos leves.
Dores de cabeça e enxaquecas. Nesses casos, a Aromaterapia pode ser um suporte, mas não substitui a medicina tradicional para identificar a origem dos sintomas.
â SaĂşde da Pele e Cabelos
Tratamento para acne, dermatites e psorĂase.
Cuidados com o envelhecimento precoce da pele.
Redução da queda de cabelo e controle da oleosidade do couro cabeludo.
â Bem-estar e Qualidade de Vida
Melhora da concentração e foco, aumentando a produtividade.
EstĂmulo da disposição e energia.
AuxĂlio no equilĂbrio hormonal (TPM, menopausa, desequilĂbrios hormonais).
Com base nessas necessidades, o aromaterapeuta irå indicar o melhor tratamento, calculando doses, sinergias (combinação de óleos essenciais), diluiçþes e tÊcnicas de aplicação, como inalação, uso tópico ou difusão.
3. Como Funciona uma Consulta com um Aromaterapeuta?
Uma consulta com um aromaterapeuta Ê um atendimento personalizado, onde são avaliadas as necessidades do cliente para a criação de um protocolo adequado. O processo geralmente segue estas etapas:
â Anamnese (Entrevista Inicial)
Perguntas sobre saĂşde fĂsica, emocional e estilo de vida.
Levantamento de sintomas, histĂłrico mĂŠdico e possĂveis alergias.
Definição dos objetivos da terapia (alĂvio do estresse, melhora do sono, dores musculares etc.).
â Escolha dos Ăleos Essenciais
Seleção dos óleos mais indicados para o caso.
Consideração das propriedades terapêuticas, contraindicaçþes e combinaçþes seguras.
â Definição do MĂŠtodo de Uso
O profissional indicarå a melhor forma de aplicação, que pode ser:
Inalação: difusores, colares aromåticos, vaporização.
Uso tĂłpico: massagens, Ăłleos corporais, compressas.
Banhos aromåticos e escalda-pÊs. Todas as diluiçþes serão ajustadas de acordo com a segurança e a necessidade individual do cliente.
â Plano de Acompanhamento
Instruçþes detalhadas sobre o uso correto dos óleos essenciais.
Orientação sobre frequência e duração do tratamento.
Possibilidade de retorno para ajustes no protocolo.
A consulta pode ser realizada presencialmente ou online, dependendo do profissional.
Quer saber como a Aromaterapia pode te ajudar? Agende uma consulta comigo e descubra os benefĂcios dos Ăłleos essenciais para o seu bem-estar!
-
@ 10846a37:73b5f923
2025-05-28 11:41:30A 80win tem se destacado como uma das plataformas de entretenimento online mais completas do momento. Com um ambiente moderno, intuitivo e pensado especialmente para o público brasileiro, a plataforma oferece uma experiência única que une tecnologia, segurança e uma vasta seleção de jogos. Seja você um iniciante curioso ou um jogador experiente, a 80win proporciona diversão para todos os perfis.
Interface AmigĂĄvel e Acesso RĂĄpido Ao acessar a 80win, o que chama a atenção de imediato ĂŠ o design leve e fĂĄcil de navegar. A plataforma foi projetada para que os usuĂĄrios encontrem tudo o que precisam com poucos cliques. Desde o cadastro, que pode ser feito em minutos, atĂŠ a escolha dos jogos, tudo ĂŠ prĂĄtico e acessĂvel.
AlĂŠm disso, a 80win estĂĄ otimizada para dispositivos mĂłveis, o que significa que vocĂŞ pode jogar onde estiver, sem comprometer a qualidade grĂĄfica ou o desempenho. O site funciona perfeitamente em smartphones, tablets e computadores, garantindo flexibilidade total para o usuĂĄrio.
Diversidade de Jogos Para Todos os Gostos A seleção de jogos da 80winÊ um dos seus grandes diferenciais. A plataforma reúne uma enorme variedade de opçþes, desde jogos de cartas clåssicos como pôquer e bacarå, atÊ roletas virtuais e jogos temåticos com gråficos impressionantes e trilhas sonoras envolventes.
Para os fĂŁs de jogos com elementos de sorte, a plataforma oferece slots (caça-nĂqueis) com temas variados, bĂ´nus atrativos e efeitos visuais de Ăşltima geração. Esses jogos sĂŁo atualizados com frequĂŞncia, garantindo que sempre haja novidades para explorar.
JĂĄ quem prefere jogos que exigem mais estratĂŠgia e raciocĂnio rĂĄpido tambĂŠm encontra Ăłtimas opçþes. Os modos multiplayer permitem interaçþes com outros jogadores em tempo real, trazendo uma camada extra de emoção e competitividade.
Segurança e Suporte de Qualidade A 80win preza pela segurança dos seus usuårios. A plataforma utiliza tecnologia de criptografia avançada para proteger todos os dados e transaçþes, garantindo que suas informaçþes pessoais e financeiras estejam sempre seguras.
AlĂŠm disso, o suporte ao cliente ĂŠ outro ponto forte. A equipe da 80win estĂĄ disponĂvel todos os dias para tirar dĂşvidas, resolver problemas tĂŠcnicos e auxiliar em qualquer situação. O atendimento pode ser feito via chat ao vivo ou e-mail, com respostas rĂĄpidas e eficazes.
Experiência do Jogador: Diversão com Responsabilidade Na 80win, a experiência do jogador vai alÊm dos jogos em si. A plataforma oferece promoçþes regulares, bônus de boas-vindas e programas de fidelidade que recompensam os usuårios mais ativos. Tudo isso contribui para uma jornada mais dinâmica e envolvente.
Outro ponto importante ĂŠ o incentivo ao jogo responsĂĄvel. A 80win disponibiliza ferramentas para controle de tempo e gastos, permitindo que cada jogador tenha controle sobre sua prĂłpria experiĂŞncia e jogue de forma consciente.
ConclusĂŁo A 80win ĂŠ muito mais do que uma simples plataforma de jogos online. Ă um ambiente completo, seguro e divertido, onde a variedade de opçþes e a qualidade dos serviços colocam o jogador em primeiro lugar. Se vocĂŞ estĂĄ em busca de uma experiĂŞncia empolgante, interativa e acessĂvel, a 80win ĂŠ a escolha certa para explorar o mundo do entretenimento digital com total confiança.
-
@ 04c915da:3dfbecc9
2025-03-07 00:26:37There is something quietly rebellious about stacking sats. In a world obsessed with instant gratification, choosing to patiently accumulate Bitcoin, one sat at a time, feels like a middle finger to the hype machine. But to do it right, you have got to stay humble. Stack too hard with your head in the clouds, and you will trip over your own ego before the next halving even hits.
Small Wins
Stacking sats is not glamorous. Discipline. Stacking every day, week, or month, no matter the price, and letting time do the heavy lifting. Humility lives in that consistency. You are not trying to outsmart the market or prove you are the next "crypto" prophet. Just a regular person, betting on a system you believe in, one humble stack at a time. Folks get rekt chasing the highs. They ape into some shitcoin pump, shout about it online, then go silent when they inevitably get rekt. The ones who last? They stack. Just keep showing up. Consistency. Humility in action. Know the game is long, and you are not bigger than it.
Ego is Volatile
Bitcoinâs swings can mess with your head. One day you are up 20%, feeling like a genius and the next down 30%, questioning everything. Ego will have you panic selling at the bottom or over leveraging the top. Staying humble means patience, a true bitcoin zen. Do not try to "beatâ Bitcoin. Ride it. Stack what you can afford, live your life, and let compounding work its magic.
Simplicity
There is a beauty in how stacking sats forces you to rethink value. A sat is worth less than a penny today, but every time you grab a few thousand, you plant a seed. It is not about flaunting wealth but rather building it, quietly, without fanfare. That mindset spills over. Cut out the noise: the overpriced coffee, fancy watches, the status games that drain your wallet. Humility is good for your soul and your stack. I have a buddy who has been stacking since 2015. Never talks about it unless you ask. Lives in a decent place, drives an old truck, and just keeps stacking. He is not chasing clout, he is chasing freedom. That is the vibe: less ego, more sats, all grounded in life.
The Big Picture
Stack those sats. Do it quietly, do it consistently, and do not let the green days puff you up or the red days break you down. Humility is the secret sauce, it keeps you grounded while the world spins wild. In a decade, when you look back and smile, it will not be because you shouted the loudest. It will be because you stayed the course, one sat at a time. \ \ Stay Humble and Stack Sats. đŤĄ
-
@ 10846a37:73b5f923
2025-05-28 11:41:06O cenårio de entretenimento online no Brasil estå cada vez mais aquecido, e uma plataforma que tem chamado a atenção dos jogadores Ê a 888f. Com uma proposta moderna, segura e repleta de funcionalidades, o site oferece uma experiência diferenciada para quem busca diversão e oportunidade de ganhos em um ambiente digital bem estruturado.
Introdução Ă Plataforma 888f A 888f se destaca como uma plataforma inovadora voltada para o pĂşblico brasileiro, oferecendo uma navegação simples e intuitiva, com suporte completo em portuguĂŞs e atendimento dedicado. Desde o primeiro acesso, os usuĂĄrios sĂŁo recebidos com um layout limpo, organizado e responsivo, que se adapta perfeitamente a qualquer dispositivo â seja computador, tablet ou smartphone.
Um dos principais atrativos da 888fĂŠ a facilidade de cadastro e uso. Em poucos minutos, ĂŠ possĂvel criar uma conta e começar a explorar todas as opçþes de jogos disponĂveis. A plataforma tambĂŠm oferece diversas formas de pagamento, incluindo mĂŠtodos populares como Pix, transferĂŞncias bancĂĄrias e carteiras digitais, sempre com foco na agilidade e segurança das transaçþes.
Jogos Variados para Todos os Estilos A variedade de jogos ĂŠ um dos grandes diferenciais da 888f. O site reĂşne tĂtulos dos principais fornecedores do mercado, garantindo grĂĄficos de alta qualidade, mecânicas envolventes e jogabilidade fluida. Os usuĂĄrios encontram desde os clĂĄssicos jogos de cartas, como poker e blackjack, atĂŠ opçþes modernas de roletas, slots interativos e outros formatos com recursos inovadores.
Os famosos "jogos ao vivo" tambĂŠm estĂŁo presentes, oferecendo uma imersĂŁo ainda maior para quem busca adrenalina e interação em tempo real. Nesses jogos, o jogador participa de partidas com apresentadores reais, transmitidas por vĂdeo em alta definição, criando uma sensação de estar dentro de uma sala fĂsica sem sair de casa.
AlÊm disso, hå jogos de aposta råpida e instantânea, que são perfeitos para quem deseja jogar de maneira dinâmica e divertida, com resultados em poucos segundos. Cada jogo Ê desenvolvido com tecnologia de ponta, garantindo aleatoriedade justa e transparência nas rodadas.
Experiência do Jogador em Primeiro Lugar A 888f prioriza a satisfação e segurança dos seus usuårios. Por isso, investe constantemente em tecnologia de proteção de dados e oferece um ambiente de jogo responsåvel, com ferramentas de controle de tempo e gastos para promover uma experiência equilibrada e consciente.
O atendimento ao cliente tambĂŠm ĂŠ um destaque. A equipe de suporte estĂĄ disponĂvel 24 horas por dia, todos os dias da semana, pronta para ajudar com qualquer dĂşvida ou problema. Os canais de contato incluem chat ao vivo, e-mail e atendimento via WhatsApp, sempre com resposta rĂĄpida e cordial.
Outro ponto importante Ê o sistema de recompensas. A 888f oferece promoçþes regulares, bônus de boas-vindas e programas de fidelidade que beneficiam os jogadores mais ativos. Tudo isso contribui para uma jornada envolvente e repleta de vantagens.
Conclusão A 888f surge como uma excelente opção para quem procura entretenimento digital de qualidade no Brasil. Com uma plataforma segura, jogos diversos e suporte de excelência, ela conquista cada vez mais espaço entre os jogadores que buscam diversão com responsabilidade e conforto. Seja você um iniciante ou um usuårio experiente, a 888f oferece tudo o que Ê necessårio para uma experiência online completa e gratificante.
-
@ 6389be64:ef439d32
2025-02-27 21:32:12GA, plebs. The latest episode of Bitcoin And is out, and, as always, the chicanery is running rampant. Letâs break down the biggest topics I covered, and if you want the full, unfiltered rant, make sure to listen to the episode linked below.
House Democratsâ MEME Act: A Bad Joke?
House Democrats are proposing a bill to ban presidential meme coins, clearly aimed at Trumpâs and Melaniaâs ill-advised token launches. While grifters launching meme coins is bad, this bill is just as ridiculous. If this legislation moves forward, expect a retaliatory strike exposing how politicians like Pelosi and Warren mysteriously amassed their fortunes. Will it pass? Doubtful. But itâs another sign of the governmentâs obsession with regulating everything except itself.
Senate Bankingâs First Digital Asset Hearing: The Real Target Is You
Cynthia Lummis chaired the first digital asset hearing, andâsurprise!âit was all about control. The discussion centered on stablecoins, AML, and KYC regulations, with witnesses suggesting Orwellian measures like freezing stablecoin transactions unless pre-approved by authorities. What was barely mentioned? Bitcoin. They want full oversight of stablecoins, which is really about controlling financial freedom. Expect more nonsense targeting self-custody wallets under the guise of stopping âbad actors.â
Bank of America and PayPal Want In on Stablecoins
Bank of Americaâs CEO openly stated theyâll launch a stablecoin as soon as regulation allows. Meanwhile, PayPalâs CEO paid for a hat using Bitcoinânot their own stablecoin, Pi USD. Why wouldnât he use his own product? Maybe he knows stablecoins arenât what theyâre hyped up to be. Either way, the legacy financial system is gearing up to flood the market with stablecoins, not because they love crypto, but because itâs a tool to extend U.S. dollar dominance.
MetaPlanet Buys the Dip
Japanâs MetaPlanet issued $13.4M in bonds to buy more Bitcoin, proving once again that institutions see the writing on the wall. Unlike U.S. regulators who obsess over stablecoins, some companies are actually stacking sats.
UK Expands Crypto Seizure Powers
Across the pond, the UK government is pushing legislation to make it easier to seize and destroy crypto linked to criminal activity. While they frame it as going after the bad guys, itâs another move toward centralized control and financial surveillance.
Bitcoin Tools & Tech: Arc, SatoChip, and Nunchuk
Some bullish Bitcoin developments: ARC v0.5 is making Bitcoinâs second layer more efficient, SatoChip now supports Taproot and Nostr, and Nunchuk launched a group wallet with chat, making multisig collaboration easier.
The Bottom Line
The state is coming for financial privacy and control, and stablecoins are their weapon of choice. Bitcoiners need to stay focused, keep their coins in self-custody, and build out parallel systems. Expect more regulatory attacks, but donât let them distract youâjust keep stacking and transacting in ways they canât control.
đ§ Listen to the full episode here: https://fountain.fm/episode/PYITCo18AJnsEkKLz2Ks
đ° Support the show by boosting sats on Podcasting 2.0! and I will see you on the other side.
-
@ 10846a37:73b5f923
2025-05-28 11:40:41O universo dos jogos online ganha um novo patamar com a chegada da plataforma 30win, um ambiente moderno, seguro e totalmente pensado para oferecer entretenimento de qualidade aos seus usuårios. Com uma interface intuitiva, ampla variedade de jogos e suporte completo, a 30win se destaca como uma excelente opção para quem busca diversão e oportunidades emocionantes de vitória.
Uma Plataforma Moderna e Confiåvel A 30win foi desenvolvida com tecnologia de ponta, priorizando segurança e praticidade. O site possui um design responsivo, que se adapta perfeitamente a computadores, tablets e smartphones, permitindo que o jogador aproveite seus momentos de lazer em qualquer lugar. A navegação Ê råpida e fluida, com menus claros e opçþes bem organizadas, o que torna a experiência ainda mais agradåvel, atÊ mesmo para quem estå começando.
Outro grande diferencial da 30winÊ seu compromisso com a proteção dos dados dos usuårios. A plataforma utiliza protocolos avançados de criptografia, garantindo que todas as transaçþes e informaçþes pessoais estejam seguras. AlÊm disso, oferece múltiplos mÊtodos de pagamento e saque, com rapidez e eficiência.
Variedade de Jogos Para Todos os Gostos O que realmente atrai os jogadores para a 30win ĂŠ a impressionante seleção de jogos disponĂveis. A plataforma conta com centenas de tĂtulos de desenvolvedores renomados, trazendo grĂĄficos de alta qualidade, trilhas sonoras envolventes e mecânicas de jogo inovadoras.
Entre os destaques estĂŁo os jogos de slots, com temĂĄticas variadas que vĂŁo desde aventuras ĂŠpicas atĂŠ sĂmbolos clĂĄssicos. Cada tĂtulo traz funçþes especiais como giros grĂĄtis, multiplicadores e rodadas bĂ´nus, o que aumenta tanto a diversĂŁo quanto as chances de ganhar prĂŞmios.
Para quem gosta de desafios estratÊgicos, a 30win oferece tambÊm uma boa seleção de jogos de cartas como pôquer, blackjack e baccarat, alÊm de roletas virtuais e jogos interativos com crupiês ao vivo, que proporcionam uma experiência realista e envolvente, diretamente da tela do seu dispositivo.
ExperiĂŞncia do Jogador em Primeiro Lugar A 30win se preocupa em entregar uma experiĂŞncia completa e satisfatĂłria aos seus jogadores. Desde o primeiro acesso, ĂŠ possĂvel notar a atenção dada aos detalhes. O cadastro ĂŠ simples e rĂĄpido, com poucos cliques, e o usuĂĄrio jĂĄ pode começar a explorar tudo o que a plataforma tem a oferecer.
Outro ponto forte ĂŠ o suporte ao cliente. A equipe de atendimento estĂĄ disponĂvel 24 horas por dia, sete dias por semana, pronta para ajudar em qualquer dĂşvida ou situação. Isso transmite confiança e demonstra o comprometimento da plataforma com seus usuĂĄrios.
AlÊm disso, a 30win promove constantemente bônus e promoçþes exclusivas, premiando tanto novos jogadores quanto os mais fiÊis. Esses incentivos tornam a experiência ainda mais atrativa, com recompensas que vão desde crÊditos extras atÊ prêmios especiais.
ConclusĂŁo Se vocĂŞ estĂĄ em busca de uma plataforma de jogos online completa, segura e com excelente variedade de opçþes, a 30win ĂŠ uma escolha certeira. Com sua interface amigĂĄvel, suporte eficiente e jogos de altĂssimo nĂvel, ela oferece uma experiĂŞncia empolgante que atende a todos os perfis de jogadores.
-
@ 460c25e6:ef85065c
2025-02-25 15:20:39If you don't know where your posts are, you might as well just stay in the centralized Twitter. You either take control of your relay lists, or they will control you. Amethyst offers several lists of relays for our users. We are going to go one by one to help clarify what they are and which options are best for each one.
Public Home/Outbox Relays
Home relays store all YOUR content: all your posts, likes, replies, lists, etc. It's your home. Amethyst will send your posts here first. Your followers will use these relays to get new posts from you. So, if you don't have anything there, they will not receive your updates.
Home relays must allow queries from anyone, ideally without the need to authenticate. They can limit writes to paid users without affecting anyone's experience.
This list should have a maximum of 3 relays. More than that will only make your followers waste their mobile data getting your posts. Keep it simple. Out of the 3 relays, I recommend: - 1 large public, international relay: nos.lol, nostr.mom, relay.damus.io, etc. - 1 personal relay to store a copy of all your content in a place no one can delete. Go to relay.tools and never be censored again. - 1 really fast relay located in your country: paid options like http://nostr.wine are great
Do not include relays that block users from seeing posts in this list. If you do, no one will see your posts.
Public Inbox Relays
This relay type receives all replies, comments, likes, and zaps to your posts. If you are not getting notifications or you don't see replies from your friends, it is likely because you don't have the right setup here. If you are getting too much spam in your replies, it's probably because your inbox relays are not protecting you enough. Paid relays can filter inbox spam out.
Inbox relays must allow anyone to write into them. It's the opposite of the outbox relay. They can limit who can download the posts to their paid subscribers without affecting anyone's experience.
This list should have a maximum of 3 relays as well. Again, keep it small. More than that will just make you spend more of your data plan downloading the same notifications from all these different servers. Out of the 3 relays, I recommend: - 1 large public, international relay: nos.lol, nostr.mom, relay.damus.io, etc. - 1 personal relay to store a copy of your notifications, invites, cashu tokens and zaps. - 1 really fast relay located in your country: go to nostr.watch and find relays in your country
Terrible options include: - nostr.wine should not be here. - filter.nostr.wine should not be here. - inbox.nostr.wine should not be here.
DM Inbox Relays
These are the relays used to receive DMs and private content. Others will use these relays to send DMs to you. If you don't have it setup, you will miss DMs. DM Inbox relays should accept any message from anyone, but only allow you to download them.
Generally speaking, you only need 3 for reliability. One of them should be a personal relay to make sure you have a copy of all your messages. The others can be open if you want push notifications or closed if you want full privacy.
Good options are: - inbox.nostr.wine and auth.nostr1.com: anyone can send messages and only you can download. Not even our push notification server has access to them to notify you. - a personal relay to make sure no one can censor you. Advanced settings on personal relays can also store your DMs privately. Talk to your relay operator for more details. - a public relay if you want DM notifications from our servers.
Make sure to add at least one public relay if you want to see DM notifications.
Private Home Relays
Private Relays are for things no one should see, like your drafts, lists, app settings, bookmarks etc. Ideally, these relays are either local or require authentication before posting AND downloading each user\'s content. There are no dedicated relays for this category yet, so I would use a local relay like Citrine on Android and a personal relay on relay.tools.
Keep in mind that if you choose a local relay only, a client on the desktop might not be able to see the drafts from clients on mobile and vice versa.
Search relays:
This is the list of relays to use on Amethyst's search and user tagging with @. Tagging and searching will not work if there is nothing here.. This option requires NIP-50 compliance from each relay. Hit the Default button to use all available options on existence today: - nostr.wine - relay.nostr.band - relay.noswhere.com
Local Relays:
This is your local storage. Everything will load faster if it comes from this relay. You should install Citrine on Android and write ws://localhost:4869 in this option.
General Relays:
This section contains the default relays used to download content from your follows. Notice how you can activate and deactivate the Home, Messages (old-style DMs), Chat (public chats), and Global options in each.
Keep 5-6 large relays on this list and activate them for as many categories (Home, Messages (old-style DMs), Chat, and Global) as possible.
Amethyst will provide additional recommendations to this list from your follows with information on which of your follows might need the additional relay in your list. Add them if you feel like you are missing their posts or if it is just taking too long to load them.
My setup
Here's what I use: 1. Go to relay.tools and create a relay for yourself. 2. Go to nostr.wine and pay for their subscription. 3. Go to inbox.nostr.wine and pay for their subscription. 4. Go to nostr.watch and find a good relay in your country. 5. Download Citrine to your phone.
Then, on your relay lists, put:
Public Home/Outbox Relays: - nostr.wine - nos.lol or an in-country relay. -
.nostr1.com Public Inbox Relays - nos.lol or an in-country relay -
.nostr1.com DM Inbox Relays - inbox.nostr.wine -
.nostr1.com Private Home Relays - ws://localhost:4869 (Citrine) -
.nostr1.com (if you want) Search Relays - nostr.wine - relay.nostr.band - relay.noswhere.com
Local Relays - ws://localhost:4869 (Citrine)
General Relays - nos.lol - relay.damus.io - relay.primal.net - nostr.mom
And a few of the recommended relays from Amethyst.
Final Considerations
Remember, relays can see what your Nostr client is requesting and downloading at all times. They can track what you see and see what you like. They can sell that information to the highest bidder, they can delete your content or content that a sponsor asked them to delete (like a negative review for instance) and they can censor you in any way they see fit. Before using any random free relay out there, make sure you trust its operator and you know its terms of service and privacy policies.
-
@ 9e69e420:d12360c2
2025-02-14 18:07:10Vice President J.D. Vance addressed the Munich Security Conference, criticizing European leaders for undermining free speech and traditional values. He claimed that the biggest threat to Europe is not from external enemies but from internal challenges. Vance condemned the arrest of a British man for praying near an abortion clinic and accused European politicians of censorship.
He urged leaders to combat illegal immigration and questioned their democratic practices. âThere is a new sheriff in town,â he said, referring to President Trump. Vance's remarks were unexpected, as many anticipated discussions on security or Ukraine. His speech emphasized the need for Europe to share the defense burden to ensure stability and security.
-
@ 162b4b08:9f7d278c
2025-05-28 11:37:08Láťi sáťng nÄng Äáťng, linh hoất vĂ hưáťng Äáşżn sáťą cân báşąng Äang ngĂ y cĂ ng tráť thĂ nh láťąa cháťn cáť§a nhiáťu ngưáťi tráşť Viáťt Nam trong tháťi Äấi hiáťn Äấi. Háť khĂ´ng cháť chĂş tráťng Äáşżn cĂ´ng viáťc vĂ háťc táşp mĂ còn quan tâm Äáşżn viáťc chÄm sĂłc bản thân, táşn hưáťng cuáťc sáťng vĂ tĂŹm kiáşżm nhᝯng khoảnh khắc thư giĂŁn giᝯa láťch trĂŹnh báşn ráťn. WIN77K, váťi vai trò lĂ máťt náťn tảng giải trĂ tráťąc tuyáşżn thĂ´ng minh, ÄĂŁ nhanh chĂłng nắm bắt Äưᝣc nhu cáş§u nĂ y vĂ cung cẼp máťt loất náťi dung giải trĂ phĂš hᝣp váťi nháťp sáťng tráşť trung, sĂ´i Äáťng. CĂĄc tĂnh nÄng truy cáşp nhanh, giao diáťn dáť sáť d᝼ng vĂ háť tháťng hoất Äáťng áťn Äáťnh trĂŞn cả Äiáťn thoấi lẍn mĂĄy tĂnh giĂşp ngưáťi dĂšng linh hoất táşn hưáťng cĂĄc hoất Äáťng giải trĂ máťi lĂşc, máťi nĆĄi. Thay vĂŹ tiĂŞu táťn tháťi gian vĂ o nhᝯng hoất Äáťng kĂŠm hiáťu quả, ngưáťi tráşť cĂł tháť láťąa cháťn nhᝯng trải nghiáťm nháşš nhĂ ng, thư giĂŁn nhưng vẍn duy trĂŹ Äưᝣc nÄng lưᝣng tĂch cáťąc cho cả ngĂ y dĂ i. Äây chĂnh lĂ Äiáťm mấnh giĂşp WIN77K tráť thĂ nh ngưáťi bấn Äáťng hĂ nh ÄĂĄng tin cáşy cho tháşż háť nÄng Äáťng ngĂ y nay.
KhĂ´ng cháť háť trᝣ giải trĂ, win77k còn cung cẼp nhiáťu chuyĂŞn m᝼c bĂ i viáşżt hᝯu Ăch liĂŞn quan Äáşżn láťi sáťng, sᝊc kháťe tinh tháş§n, vĂ cĂĄc gᝣi Ă˝ giĂşp ngưáťi tráşť duy trĂŹ phong cĂĄch sáťng lĂ nh mấnh. Nhᝯng náťi dung như cĂĄch táť chᝊc tháťi gian, lĂ m tháşż nĂ o Äáť giᝯ nÄng lưᝣng tĂch cáťąc máťi ngĂ y, hoạc cĂĄc bĂ i viáşżt chia sáşť kinh nghiáťm xây dáťąng thĂłi quen táťt⌠Äáťu Äưᝣc biĂŞn táşp káťš lưᝥng vĂ cáşp nháşt thưáťng xuyĂŞn. Äiáťu nĂ y giĂşp ngưáťi dĂšng khĂ´ng cháť tiĂŞu th᝼ náťi dung mĂ còn Äưᝣc truyáťn cảm hᝊng Äáť thay Äáťi thĂłi quen sáťng máťt cĂĄch cháť§ Äáťng. HĆĄn nᝯa, WIN77K còn káşżt náťi cáťng Äáťng ngưáťi tráşť cĂł cĂšng láťi sáťng qua cĂĄc hoất Äáťng chia sáşť vĂ thảo luáşn tráťąc tuyáşżn. Nháť váşy, ngưáťi dĂšng cĂł tháť tĂŹm thẼy sáťą Äáťng cảm, háťc háťi lẍn nhau vĂ máť ráťng mấng lưáťi quan háť tĂch cáťąc trong mĂ´i trưáťng sáť. Viáťc xây dáťąng cáťng Äáťng nĂ y khĂ´ng cháť thĂşc ÄẊy sáťą phĂĄt triáťn cĂĄ nhân mĂ còn lan táťa tinh tháş§n sáťng tĂch cáťąc, táťą cháť§ vĂ sĂĄng tấo Äáşżn nhiáťu ngưáťi hĆĄn trong xĂŁ háťi.
ThĂ nh cĂ´ng cáť§a WIN77K Äáşżn tᝍ sáťą thẼu hiáťu sâu sắc Äáťi váťi nhu cáş§u cáť§a ngưáťi dĂšng hiáťn Äấi, Äạc biáťt lĂ tháşż háť tráşť. Trong máťt tháşż giáťi mĂ máťi thᝊ Äáťu chuyáťn Äáťng khĂ´ng ngᝍng, viáťc tĂŹm ra Äiáťm dᝍng hᝣp lĂ˝ Äáť nấp lấi nÄng lưᝣng lĂ Äiáťu cáş§n thiáşżt. VĂ WIN77K ÄĂŁ lĂ m táťt vai trò ÄĂł khi khĂ´ng cháť tấo ra máťt náťn tảng giải trĂ ÄĆĄn thuáş§n mĂ còn lĂ khĂ´ng gian giĂşp ngưáťi tráşť phĂĄt triáťn bản thân máťt cĂĄch toĂ n diáťn. DĂš lĂ trong lĂşc ngháť ngĆĄi giᝯa giáť háťc, thư giĂŁn sau máťt ngĂ y lĂ m viáťc máťt máťi hay ÄĆĄn giản lĂ tĂŹm kiáşżm máťt khoảng lạng trong cuáťc sáťng báşn ráťn, WIN77K luĂ´n hiáťn diáťn như máťt láťąa cháťn tiáťn lᝣi, an toĂ n vĂ truyáťn cảm hᝊng. Sáťą linh hoất, hiáťn Äấi cĂšng Äáťnh hưáťng phĂĄt triáťn báťn vᝯng chĂnh lĂ lĂ˝ do khiáşżn WIN77K khĂ´ng ngᝍng gia tÄng sáťą tin tưáťng vĂ yĂŞu máşżn tᝍ cáťng Äáťng ngưáťi tráşť Viáťt Nam, ngĂ y cĂ ng kháşłng Äáťnh vai trò cáť§a mĂŹnh trong viáťc Äáťng hĂ nh cĂšng láťi sáťng nÄng Äáťng vĂ tĂch cáťąc cáť§a tháşż háť tưƥng lai.
-
@ cff1720e:15c7e2b2
2025-05-28 11:18:23Liebe Anwender,\ \ diesmal beginnen die Neuigkeiten schon beim Titel und der Anrede. Unsere Worte bestimmen unser Denken, und daher war die Korrektur wichtiger als sie zunächst erscheint, denn bei Pareto gibt es die klassische Trennung zwischen Autor und Leser nicht mehr. Cocreation heiĂt unser Konzept, jeder kann publizieren, kommentieren, honorieren und distribuieren. Mag das bei Blogtexten derzeit noch nicht selbstverständlich sein, so ist das bei Bildern längst die Norm.Â
âEin Bild sagt mehr als tausend Worteâ beschreibt die Wirkung visueller Kommunikation. Deshalb haben wir nach dem Blogtext nun mit Bildern eine neue Content-Kategorie eingefĂźhrt. NatĂźrlich auch hier mit den bekannten Funktionen der Interaktion wie like, repost und zap. Es gibt derzeit eine Gliederung in 4 Feeds, Gefolgt (fĂźr Nostr-User verfĂźgbar), Memes und Kunst (gefiltert nach entsprechenden Tags) und Pareto fĂźr alles andere.
Jeder Nostr-User hat die MĂśglichkeit eigene Bilder hochzuladen, zu taggen, sowie mit einem Titel und Untertext zu versehen. âEveryone is a creatorâ war noch nie leichter, probiert es einfach aus! Noch kein Nostr-Profil und trotzdem interessiert? Kein Problem, bitte Informationen zu originellen Bildquellen oder Interesse an Mitwirkung per Mail senden an pictures@pareto.spaceÂ
Leicht ist es auch die Pareto-Inhalte zu erhalten und konsumieren, man braucht weder einen Account noch spezielle Apps. Jeder hat bereits die entsprechenden Voraussetzungen, hier ein paar Beispiele.\ \ Newsletter per Mail (Die Friedenstaube)\ hier abonnieren\ \ In Telegram lesen -> hier unsere Kanäle\ https://t.me/pareto_artikel \ https://t.me/friedenstaube_artikel \ \ Als Feed in einem Feed-Reader \ https://pareto.space/atom/feed.xml \ https://pareto.space/atom/de_feed.xml \ https://pareto.space/atom/en_feed.xml
FĂźgt in Eure Artikel bitte am Anfang / Ende einen Hinweis auf den Pareto-Client ein, andere Clients unterstĂźtzen nicht alle Features. Das ist ein Service-Hinweis zur besseren Lesbarkeit âDieser Beitrag wurde mit dem Pareto-Client geschrieben.â Ebenso ist ein Hinweis auf Onboarding bei Nostr nĂźtzlich: neue Nostr-User kĂśnnen euch liken und zappen: not yet on Nostr and want the full experience? Easy onboarding via Start.\ \ Das Pareto-Team baut den âMarktplatz der Ideenâ und hat dabei schon viel erreicht. Feedback und Mitarbeit hilft uns damit noch schneller voranzukommen, wir bedanken uns fĂźr Eure UnterstĂźtzung.\ team@pareto.space \ https://pareto.space \ https://geyser.fund/project/pareto?hero=1c1b8e487090Â
-
@ 005bc4de:ef11e1a2
2025-05-28 09:05:10BIP-2,100,000,000,000,000,000
So, you're telling me...
- 21 million bitcoins is out, and...
- 2.1 quadrillion sats is in, except that...
- sats are out, so...
- 2.1 quadrillion bitcoins is in, except that...
- there are actually millisats, but...
- millisats are out, so...
- millibitcoins are in, so now...
- there are 2.1 quintillion millibitcoins, except that...
- millibitcoins are the basic base unit of bitcoin, so...
- millibitcoins are out, and now...
- 2.1 quintillion bitcoins are in
-
@ e3ba5e1a:5e433365
2025-02-13 06:16:49My favorite line in any Marvel movie ever is in âCaptain America.â After Captain America launches seemingly a hopeless assault on Red Skullâs base and is captured, we get this line:
âArrogance may not be a uniquely American trait, but I must say, you do it better than anyone.â
Yesterday, I came across a comment on the song Devil Went Down to Georgia that had a very similar feel to it:
America has seemingly always been arrogant, in a uniquely American way. Manifest Destiny, for instance. The rest of the world is aware of this arrogance, and mocks Americans for it. A central point in modern US politics is the deriding of racist, nationalist, supremacist Americans.
Thatâs not what I see. I see American Arrogance as not only a beautiful statement about what it means to be American. I see it as an ode to the greatness of humanity in its purest form.
For most countries, saying âour nation is the greatestâ is, in fact, twinged with some level of racism. I still donât have a problem with it. Every group of people should be allowed to feel pride in their accomplishments. The destruction of the human spirit since the end of World War 2, where greatness has become a sin and weakness a virtue, has crushed the ability of people worldwide to strive for excellence.
But I digress. The fears of racism and nationalism at least have a grain of truth when applied to other nations on the planet. But not to America.
Thatâs because the definition of America, and the prototype of an American, has nothing to do with race. The definition of Americanism is freedom. The founding of America is based purely on liberty. On the God-given rights of every person to live life the way they see fit.
American Arrogance is not a statement of racial superiority. Itâs barely a statement of national superiority (though it absolutely is). To me, when an American comments on the greatness of America, itâs a statement about freedom. Freedom will always unlock the greatness inherent in any group of people. Americans are definitionally better than everyone else, because Americans are freer than everyone else. (Or, at least, thatâs how it should be.)
In Devil Went Down to Georgia, Johnny is approached by the devil himself. He is challenged to a ridiculously lopsided bet: a golden fiddle versus his immortal soul. He acknowledges the sin in accepting such a proposal. And yet he says, âGod, I know you told me not to do this. But I canât stand the affront to my honor. I am the greatest. The devil has nothing on me. So God, Iâm gonna sin, but Iâm also gonna win.â
Libertas magnitudo est
-
@ 33baa074:3bb3a297
2025-05-28 08:54:40COD (chemical oxygen demand) sensors play a vital role in water quality testing. Their main functions include real-time monitoring, pollution event warning, water quality assessment and pollution source tracking. The following are the specific roles and applications of COD sensors in water quality testing:
Real-time monitoring and data acquisition COD sensors can monitor the COD content in water bodies in real time and continuously. Compared with traditional sampling methods, COD sensors are fast and accurate, without manual sampling and laboratory testing, which greatly saves time and labor costs. By combining with the data acquisition system, the monitoring data can be uploaded to the cloud in real time to form a extemporization distribution map of the COD content in the water body, providing detailed data support for environmental monitoring and management.
Pollution event warning and rapid response COD sensors play an important role in early warning and rapid response in water environment monitoring. Once there is an abnormal increase in organic matter in the water body, the COD sensor can quickly detect the change in COD content and alarm through the preset threshold. This enables relevant departments to take measures at the early stage of the pollution incident to prevent the spread of pollution and protect the water environment.
Water quality assessment and pollution source tracking COD sensors play an important role in water quality assessment and pollution source tracking. By continuously monitoring the COD content in water bodies, the water quality can be evaluated and compared with national and regional water quality standards. At the same time, COD sensors can also help determine and track the location and spread of pollution sources, provide accurate data support for environmental management departments, and guide the development of pollution prevention and control work.
Application scenarios COD sensors are widely used in various water quality monitoring scenarios, including but not limited to: Sewage treatment plants: used to monitor the COD content of in fluent and effluent to ensure the effect of sewage treatment. Water source protection and management: deployed in water sources to monitor the COD content of in fluent sources. Once the water quality exceeds the set limit, the system will issue an alarm in time to ensure water quality safety. Lake and river monitoring: deployed in water bodies such as lakes and rivers to monitor the COD content of water bodies in real time.
Technical features of COD sensor COD sensor uses advanced technology, such as ultraviolet absorption method, which does not require the use of chemical reagents, avoiding the risk of contamination of chemical reagents in traditional COD detection methods, and can achieve online uninterrupted water quality monitoring, providing strong support for real-time water quality assessment. In addition, COD sensor also has the advantages of low cost, high stability, strong anti-interference ability, and convenient installation.
Summary In summary, COD sensor plays an irreplaceable role in water quality detection. It can not only provide real-time and accurate water quality data, but also quickly warn when pollution incidents occur, providing strong technical support for water quality management and environmental protection. With the advancement of technology and the popularization of applications, COD sensor will play a more important role in water quality monitoring in the future.
-
@ 58537364:705b4b85
2025-05-28 08:25:55ŕ¸ŕšŕ¸˛ŕ¸ŕ¸˘ŕ¸˛ŕ¸ŕšŕ¸Ľŕšŕ¸§ŕšŕ¸Ąŕšŕ¸Ťŕ¸Ľŕ¸ ลูŕ¸ŕ¸ŕšŕ¸ŕ¸˘ŕ¸˛ŕ¸ŕ¸ŕšŕ¸§ŕ¸˘ŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸˛ ŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕ¸ŕ¸˘ŕ¸˛ŕ¸ŕ¸ŕ¸˘ŕšŕ¸˛ŕ¸ŕ¸ŕ¸ľŕšŕ¸ŕšŕ¸˛ŕ¸ŕšŕ¸Łŕ¸ľŕ¸˘ŕ¸ŕ¸§ŕšŕ¸˛ ŕšŕ¸ŕšŕ¸ŕ¸ŕ¸˛ŕ¸Łŕ¸Ąŕ¸ľŕ¸ŕ¸ŕ¸ŕ¸ŕ¸ ŕšŕ¸ŕšŕšŕ¸Ąŕšŕšŕ¸ŕšŕ¸ŕ¸¸ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸°ŕ¸ŕ¸ľŕšŕ¸Ąŕ¸ľŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸˛
ŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸ŕšŕ¸Ąŕšŕ¸ŕ¸˘ŕ¸˛ŕ¸ŕ¸ŕ¸°ŕšŕ¸Ťŕšŕ¸Ąŕ¸ąŕ¸ŕ¸ŕ¸˘ŕ¸˛ŕ¸ ŕšŕ¸ŕ¸Łŕ¸˛ŕ¸°ŕšŕ¸ŕšŕ¸˛ŕšŕ¸ŕ¸§ŕšŕ¸˛ ŕ¸ŕ¸˛ŕ¸Łŕ¸Ąŕ¸˛ŕ¸ŕ¸ŕ¸´ŕ¸ŕ¸ąŕ¸ŕ¸´ŕ¸ŕšŕšŕ¸ŕ¸ˇŕšŕ¸ŕ¸Łŕ¸°ŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕ¸ŕ¸˘ŕ¸˛ŕ¸ ŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕ¸ŕ¸Łŕ¸´ŕ¸ŕ¸ŕšŕ¸° ŕ¸ŕšŕ¸˛ŕ¸Ťŕ¸˛ŕ¸ŕ¸§ŕšŕ¸˛ŕšŕ¸Ąŕšŕ¸Ąŕ¸ľŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕ¸ŕ¸˘ŕ¸˛ŕ¸ ŕ¸ŕšŕšŕ¸Ąŕšŕ¸Ąŕ¸ľŕ¸ŕšŕ¸ŕ¸ŕ¸ŕ¸´ŕ¸ŕ¸ąŕ¸ŕ¸´ ŕšŕ¸Ąŕšŕ¸Łŕ¸šŕšŕ¸§ŕšŕ¸˛ŕ¸ŕ¸°ŕ¸ŕ¸łŕ¸ŕ¸°ŕšŕ¸Ł ฼ŕ¸ŕ¸ŕ¸ŕ¸´ŕ¸ŕ¸˛ŕ¸Łŕ¸ŕ¸˛ŕ¸ŕ¸šŕ¸ŕšŕšŕ¸ŕš
ŕ¸ŕ¸¸ŕ¸ŕ¸ŕ¸ ŕšŕ¸Ąŕšŕ¸ŕ¸ŕ¸ŕšŕ¸ŕ¸Łŕ¸°ŕ¸ŕ¸¸ŕ¸ŕ¸ŕšŕ¸ŕšŕ¸˛ŕ¸ŕ¸ŕ¸ŕšŕ¸Łŕ¸˛ŕ¸ŕšŕ¸ŕ¸˛ŕ¸Ą ŕ¸ŕ¸ľŕšŕ¸ŕšŕ¸˛ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸Ąŕ¸˛ŕ¸ŕ¸ŕ¸´ŕ¸ŕ¸ąŕ¸ŕ¸´ ŕ¸ŕšŕšŕ¸ŕ¸ˇŕšŕ¸ŕ¸ŕ¸°ŕšŕ¸Ťŕšŕ¸ŕ¸Łŕ¸Łŕšŕ¸ŕ¸˛ŕ¸ŕ¸´ŕšŕ¸Ľŕ¸Şŕ¸ŕ¸ąŕšŕ¸ŕ¸Ťŕ¸Ľŕ¸˛ŕ¸˘ŕ¸ŕ¸ąŕšŕ¸
ŕšŕ¸ŕšŕ¸§ŕšŕ¸˛ŕ¸Ąŕ¸ąŕ¸ŕ¸ŕšŕ¸ŕ¸ŕ¸ŕ¸˘ŕ¸˛ŕ¸ŕ¸ŕ¸ł ŕ¸ŕ¸˘ŕ¸˛ŕ¸ŕ¸ŕ¸ŕ¸´ŕ¸ŕ¸ąŕ¸ŕ¸´ ŕ¸ŕ¸˘ŕ¸˛ŕ¸ŕšŕ¸Ťŕšŕ¸Ąŕ¸ąŕ¸ŕ¸Şŕ¸ŕ¸ ŕšŕ¸Ľŕ¸°ŕ¸ŕšŕšŕ¸Ąŕšŕ¸ŕ¸˘ŕ¸˛ŕ¸ŕšŕ¸Ťŕšŕ¸Ąŕ¸ąŕ¸ŕ¸§ŕ¸¸ŕšŕ¸ŕ¸§ŕ¸˛ŕ¸˘ ŕ¸ŕ¸ąŕšŕ¸ŕ¸Şŕ¸ŕ¸ŕ¸ŕ¸˘ŕšŕ¸˛ŕ¸ŕ¸ŕ¸ľŕš ลูŕ¸ŕšŕ¸ŕšŕ¸ŕ¸ŕ¸¸ŕ¸ŕ¸Şŕ¸Łŕ¸Łŕ¸ŕ¸ŕ¸ąŕšŕ¸ŕ¸ŕ¸ąŕšŕ¸ ŕ¸ŕšŕ¸˛ŕšŕ¸Łŕ¸˛ŕšŕ¸Ąŕšŕ¸Ąŕ¸ľŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸˛ ŕšŕ¸Ąŕšŕ¸Ąŕ¸ľŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕ¸ŕ¸Ľŕ¸˛ŕ¸ŕšŕ¸ŕ¸ŕ¸˛ŕ¸Łŕ¸ŕ¸Łŕ¸°ŕ¸ŕ¸łŕ¸ŕ¸˘ŕšŕ¸˛ŕ¸ŕ¸ŕ¸ąŕšŕ¸ ŕšŕ¸ŕ¸Łŕ¸˛ŕ¸°ŕ¸§ŕšŕ¸˛ŕ¸Ąŕ¸ąŕ¸ŕ¸ŕ¸ŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸˘ŕ¸šŕš ŕ¸ŕ¸˘ŕ¸˛ŕ¸ŕ¸ŕ¸ąŕšŕ¸ŕ¸Şŕ¸ŕ¸ŕ¸ŕ¸˘ŕšŕ¸˛ŕ¸ŕ¸ŕ¸ľŕšŕ¸Ąŕ¸ąŕ¸ŕ¸Ąŕ¸ľŕ¸Łŕ¸˛ŕ¸ŕ¸˛ŕšŕ¸ŕšŕ¸˛ ŕš ŕ¸ŕ¸ąŕ¸
ŕ¸ŕ¸˘ŕ¸˛ŕ¸ŕ¸ŕ¸°ŕ¸ŕšŕ¸ŕ¸ŕ¸¸ŕ¸ŕ¸ŕšŕ¸Ąŕ¸ąŕ¸ŕšŕ¸ŕšŕ¸ŕ¸ŕ¸´ŕšŕ¸Ľŕ¸Ş สำญรูŕ¸ŕ¸ŕ¸ŕšŕ¸Ąŕšŕ¸Ąŕ¸ľŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸˛ ŕ¸ŕ¸˘ŕ¸˛ŕ¸ŕ¸ŕšŕ¸§ŕ¸˘ŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕšŕ¸ŕš ŕšŕ¸Ąŕšŕ¸ŕ¸˘ŕ¸˛ŕ¸ŕ¸Ąŕ¸ąŕ¸ŕ¸ŕšŕšŕ¸ŕšŕ¸ŕ¸ŕ¸´ŕšŕ¸Ľŕ¸Ş ŕšŕ¸ŕ¸Łŕ¸˛ŕ¸°ŕšŕ¸Ąŕšŕ¸ŕ¸˘ŕ¸˛ŕ¸ŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸ąŕšŕ¸ŕ¸Ąŕ¸ąŕ¸ŕ¸ŕ¸Łŕ¸°ŕ¸ŕ¸ŕ¸ŕ¸ŕšŕ¸§ŕ¸˘ŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕšŕ¸ŕšŕšŕ¸Ťŕ¸Ąŕ¸ˇŕ¸ŕ¸ŕ¸ŕ¸ąŕ¸ ŕ¸ŕ¸ˇŕ¸ŕ¸ŕ¸ąŕšŕ¸ŕ¸ŕ¸˘ŕ¸˛ŕ¸ ŕšŕ¸Ąŕšŕ¸ŕ¸˘ŕ¸˛ŕ¸ ŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸˛ŕ¸ŕšŕšŕ¸Ąŕšŕ¸Ąŕ¸ľ ŕ¸ŕ¸ąŕšŕ¸ŕ¸Şŕ¸ŕ¸ŕ¸ŕ¸˘ŕšŕ¸˛ŕ¸ŕ¸ŕ¸ľŕš ลูŕ¸ŕšŕ¸ŕšŕ¸ŕ¸ŕ¸˛ŕ¸Ąŕ¸Şŕ¸¸ŕ¸ŕ¸ąŕ¸Ľŕ¸Ľŕ¸´ŕ¸ŕ¸˛ŕ¸ŕ¸¸ŕšŕ¸˘ŕšŕ¸ ŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸ŕ¸´ŕ¸Ľŕ¸Ąŕ¸ŕ¸˛ŕ¸ŕ¸¸ŕšŕ¸˘ŕšŕ¸ ŕ¸ŕ¸śŕšŕ¸ŕ¸ŕ¸Łŕ¸°ŕ¸ŕ¸¸ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸ŕšŕ¸ŕ¸ŕ¸ŕšŕ¸Łŕ¸˛ ŕ¸ŕ¸ŕ¸°ŕ¸ŕ¸ľŕšŕ¸ŕ¸Łŕ¸°ŕ¸ŕ¸ŕ¸ŕšŕ¸ŕ¸łŕ¸Ľŕ¸ąŕ¸ŕ¸ŕ¸Łŕ¸ŕ¸ŕ¸ŕ¸´ŕ¸ŕ¸ąŕ¸ŕ¸´ŕ¸ŕ¸˘ŕ¸šŕšŕ¸ŕ¸ąŕšŕ¸ ŕ¸ŕšŕ¸˛ŕ¸ŕ¸ŕšŕ¸Ťŕ¸Ľŕ¸ŕšŕ¸Ťŕ¸Ľŕšŕ¸ŕ¸ŕ¸˘ŕšŕ¸˛ŕ¸ŕ¸ŕ¸ľŕš ŕšŕ¸Ąŕšŕ¸Łŕ¸šŕšŕ¸§ŕšŕ¸˛ŕ¸ŕ¸°ŕ¸ŕ¸łŕ¸ŕ¸˘ŕšŕ¸˛ŕ¸ŕšŕ¸Ł ŕ¸ŕšŕ¸˛ŕ¸ŕ¸Ťŕ¸˛ŕ¸ŕ¸¸ŕ¸ŕ¸˛ŕ¸˘ŕ¸Ťŕ¸Ľŕ¸˛ŕ¸˘ŕ¸ŕ¸Łŕ¸°ŕ¸ŕ¸˛ŕ¸Ł ŕ¸ŕ¸§ŕšŕ¸˛ŕ¸ŕ¸°ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸Şŕ¸ŕ¸ŕ¸Şŕ¸´ŕšŕ¸ŕ¸ŕ¸ľŕš
ŕ¸ŕ¸¸ŕ¸ŕ¸§ŕ¸ąŕ¸ŕ¸ŕ¸ľŕšŕšŕ¸Łŕ¸˛ŕ¸ŕ¸ąŕšŕ¸ŕ¸Ťŕ¸Ľŕ¸˛ŕ¸˘ŕ¸ŕšŕšŕ¸Ťŕ¸Ąŕ¸ˇŕ¸ŕ¸ŕ¸ŕ¸ąŕ¸ ŕ¸ŕ¸¸ŕ¸ŕ¸Şŕ¸´ŕšŕ¸ŕ¸ŕ¸ąŕšŕ¸ŕ¸Şŕ¸ŕ¸ŕ¸ŕ¸˘ŕšŕ¸˛ŕ¸ŕ¸ŕ¸ľŕšŕ¸Ąŕ¸ąŕ¸ŕ¸ŕ¸§ŕ¸ŕ¸ŕ¸˘ŕ¸šŕš ŕšŕ¸Łŕ¸˛ŕ¸ŕ¸śŕ¸ŕšŕ¸ŕšŕ¸˛ŕ¸Şŕ¸šŕšŕ¸ŕ¸˛ŕ¸ŕšŕ¸Ąŕšŕšŕ¸ŕšŕ¸ŕšŕšŕ¸ŕ¸Łŕ¸˛ŕ¸°ŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸ľŕš ŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕšŕ¸ŕšŕ¸ŕ¸ŕ¸Łŕ¸´ŕ¸ŕ¸ŕ¸ľŕšŕ¸ŕ¸¸ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸ľŕšŕ¸Ąŕ¸˛ŕ¸ŕ¸ŕ¸´ŕ¸ŕ¸ąŕ¸ŕ¸´ ŕ¸ŕšŕšŕ¸ŕšŕ¸ŕ¸ŕ¸¸ŕ¸ŕ¸¸ŕ¸ŕ¸ŕ¸Ąŕ¸˛ŕ¸ŕ¸ąŕšŕ¸ŕ¸ŕ¸ąŕšŕ¸ ŕ¸ŕ¸¸ŕ¸ŕ¸¸ŕ¸ŕ¸ŕ¸ŕšŕšŕ¸ŕšŕ¸Ąŕšŕ¸ŕ¸ŕšŕ¸§ŕ¸˘ŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕ¸ŕ¸˘ŕ¸˛ŕ¸ ŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕ¸ŕ¸˘ŕ¸˛ŕ¸ŕ¸ŕ¸ľŕšŕšŕ¸Ąŕšŕ¸Ąŕ¸ľŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸˛ ŕ¸ŕ¸˘ŕ¸˛ŕ¸ŕ¸ŕšŕ¸§ŕ¸˘ŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕ¸Ťŕ¸Ľŕ¸ ŕšŕ¸Ąŕšŕ¸ŕ¸˘ŕ¸˛ŕ¸ŕ¸Ąŕ¸ąŕ¸ŕ¸ŕšŕ¸Ąŕ¸ľŕšŕ¸ŕ¸Šŕšŕ¸Ťŕ¸Ąŕ¸ˇŕ¸ŕ¸ŕ¸ŕ¸ąŕ¸ âŕšŕ¸Ąŕšŕ¸ŕ¸˘ŕ¸˛ŕ¸â ลูŕ¸ŕ¸ŕšŕšŕ¸ŕšŕ¸ŕ¸ŕ¸ąŕ¸ŕ¸Ťŕ¸˛ âŕ¸ŕ¸˘ŕ¸˛ŕ¸â ลูŕ¸ŕ¸ŕšŕšŕ¸ŕšŕ¸ŕ¸ŕ¸ąŕ¸ŕ¸Ťŕ¸˛ŕ¸ŕ¸ľŕ¸ŕšŕ¸Ťŕ¸Ąŕ¸ˇŕ¸ŕ¸ŕ¸ŕ¸ąŕ¸
ŕ¸ŕ¸ľŕ¸ŕ¸ľŕš ŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸ŕ¸´ŕ¸ŕ¸ąŕ¸ŕ¸´ŕ¸˘ŕ¸ąŕ¸ŕšŕ¸Ąŕšŕ¸Łŕ¸šŕšŕšŕ¸Łŕ¸ˇŕšŕ¸ŕ¸ŕ¸§ŕšŕ¸˛ ŕ¸ŕ¸°ŕšŕ¸ŕ¸˛ŕ¸˘ŕ¸ąŕ¸ŕšŕ¸ŕ¸ŕ¸ąŕ¸ ŕšŕ¸ŕ¸´ŕ¸ŕšŕ¸ŕ¸ŕšŕ¸˛ŕ¸ŕ¸Ťŕ¸ŕšŕ¸˛ŕ¸ŕšŕšŕ¸Ąŕšŕ¸ŕ¸šŕ¸ ŕšŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸Ľŕ¸ąŕ¸ŕšŕ¸ŕ¸ŕšŕ¸˛ŕ¸ŕ¸Ťŕ¸Ľŕ¸ąŕ¸ŕ¸ŕšŕšŕ¸Ąŕšŕ¸ŕ¸šŕ¸ ŕ¸ŕ¸°ŕ¸Ťŕ¸˘ŕ¸¸ŕ¸ŕ¸ŕšŕ¸Ťŕ¸˘ŕ¸¸ŕ¸ŕšŕ¸Ąŕšŕšŕ¸ŕšŕšŕ¸ŕ¸Łŕ¸˛ŕ¸°ŕ¸Ąŕ¸ąŕ¸ŕ¸˘ŕ¸ąŕ¸ŕ¸ŕ¸˘ŕ¸˛ŕ¸ŕ¸ŕ¸˘ŕ¸šŕš ลูŕ¸ŕ¸˘ŕ¸ąŕ¸ŕ¸Ťŕ¸Ľŕ¸ŕ¸ŕ¸˘ŕ¸šŕš ล฾ŕšŕ¸ŕšŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕ¸ŕ¸˘ŕ¸˛ŕ¸ ŕšŕ¸ŕšŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸˛ŕšŕ¸Ąŕšŕ¸Ąŕ¸ľ ลูŕ¸ŕ¸ŕ¸˘ŕ¸˛ŕ¸ŕ¸ŕšŕ¸§ŕ¸˘ŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕ¸Ťŕ¸Ľŕ¸ ลูŕ¸ŕ¸ŕšŕšŕ¸ŕšŕ¸ŕ¸ŕ¸ąŕ¸ŕ¸Ťŕ¸˛ ŕ¸ŕ¸śŕ¸ŕšŕ¸Ąŕšŕšŕ¸Ąŕšŕ¸ŕ¸˘ŕ¸˛ŕ¸ ลูŕ¸ŕ¸ŕšŕšŕ¸ŕšŕ¸ŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕ¸Ťŕ¸Ľŕ¸ ลูŕ¸ŕ¸ŕšŕšŕ¸ŕšŕ¸ŕ¸ŕ¸ąŕ¸ŕ¸Ťŕ¸˛ŕšŕ¸Ťŕ¸Ąŕ¸ˇŕ¸ŕ¸ŕ¸ŕ¸ąŕ¸ŕšŕ¸ŕ¸Łŕ¸˛ŕ¸°ŕ¸ŕ¸°ŕšŕ¸Ł? ŕšŕ¸ŕ¸Łŕ¸˛ŕ¸°ŕ¸Ąŕ¸ąŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸˛
ŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕšŕ¸ŕšŕ¸ŕ¸ŕ¸Łŕ¸´ŕ¸ŕ¸ŕ¸ąŕšŕ¸ ŕ¸ŕ¸Łŕ¸Łŕ¸Ąŕ¸°ŕ¸Ąŕ¸ąŕ¸ŕ¸ŕ¸˘ŕ¸šŕšŕ¸ŕ¸Łŕ¸ŕ¸ŕ¸ąŕšŕ¸ŕšŕ¸Ťŕ¸Ľŕ¸° ŕ¸ŕ¸Łŕ¸ŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕ¸ŕ¸˘ŕ¸˛ŕ¸ŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕšŕ¸Ąŕšŕ¸ŕ¸˘ŕ¸˛ŕ¸ŕ¸ŕ¸ąŕšŕ¸ŕšŕ¸Ťŕ¸Ľŕ¸° ŕšŕ¸ŕšŕšŕ¸Łŕ¸˛ŕšŕ¸Ąŕšŕ¸Ąŕ¸ľŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸˛ ŕ¸ŕšŕ¸ŕ¸˘ŕ¸˛ŕ¸˘ŕ¸˛ŕ¸Ąŕšŕ¸Ąŕšŕšŕ¸Ťŕšŕ¸ŕ¸˘ŕ¸˛ŕ¸ŕ¸ŕšŕ¸˛ŕ¸ ŕšŕ¸ŕ¸ľŕšŕ¸˘ŕ¸§ŕ¸ŕšŕ¸ŕ¸˘ŕ¸˛ŕ¸ŕ¸ŕšŕ¸˛ŕ¸ ŕ¸ŕ¸˘ŕ¸˛ŕ¸ŕšŕ¸Ťŕšŕšŕ¸ŕšŕ¸ŕ¸ŕ¸˘ŕšŕ¸˛ŕ¸ŕ¸ŕ¸ąŕšŕ¸ ŕšŕ¸Ąŕšŕ¸ŕ¸˘ŕ¸˛ŕ¸ŕšŕ¸Ťŕšŕšŕ¸ŕšŕ¸ŕ¸ŕ¸˘ŕšŕ¸˛ŕ¸ŕ¸ŕ¸ľŕš ŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕ¸ŕ¸Łŕ¸´ŕ¸ŕ¸ŕ¸ąŕšŕ¸ŕ¸Şŕ¸ŕ¸ŕ¸ŕ¸˘ŕšŕ¸˛ŕ¸ŕ¸ŕ¸ľŕš ญรมŕ¸ŕ¸ŕ¸ąŕšŕ¸ŕ¸ŕ¸šŕšŕ¸ŕ¸ľŕšŕ¸Ąŕ¸ąŕ¸ŕ¸ŕ¸ąŕ¸§ŕšŕ¸ŕ¸ľŕ¸˘ŕ¸§ŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸ąŕšŕ¸ŕ¸ŕ¸ąŕšŕ¸ ŕšŕ¸Ąŕšŕšŕ¸ŕšŕ¸ŕ¸ŕ¸Ľŕ¸°ŕ¸ŕ¸ąŕ¸§ ŕšŕ¸ŕšŕšŕ¸Łŕ¸˛ŕšŕ¸Ąŕšŕ¸Łŕ¸šŕšŕšŕ¸Łŕ¸ˇŕšŕ¸ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸Ąŕ¸ąŕ¸
ŕ¸ŕ¸Łŕ¸°ŕ¸ŕ¸¸ŕ¸ŕ¸ŕšŕ¸ŕšŕ¸˛ŕ¸ŕ¸ŕ¸ŕšŕ¸Łŕ¸˛ ŕšŕ¸Ľŕ¸°ŕ¸Şŕ¸˛ŕ¸§ŕ¸ŕ¸ŕ¸ąŕšŕ¸ŕ¸Ťŕ¸Ľŕ¸˛ŕ¸˘ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸Łŕ¸°ŕ¸ŕ¸ŕ¸ŕšŕ¸ŕ¸ąŕšŕ¸ŕ¸ŕšŕ¸˛ŕ¸ŕ¸ŕšŕ¸ŕ¸˘ŕ¸˛ŕ¸ŕšŕ¸Ťŕ¸Ąŕ¸ˇŕ¸ŕ¸ŕ¸ŕ¸ąŕ¸ ŕšŕ¸ŕš âŕ¸ŕ¸˘ŕ¸˛ŕ¸â ŕ¸ŕ¸ŕ¸ŕ¸ŕšŕ¸˛ŕ¸ŕ¸ŕ¸ąŕšŕ¸ ŕšŕ¸ŕšŕ¸ŕšŕ¸ŕ¸ľŕ¸˘ŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸˛ŕ¸Łŕ¸ŕ¸ŕ¸ŕ¸ŕ¸´ŕ¸ŕšŕ¸ŕ¸˘ ๠หรืภâŕšŕ¸Ąŕšŕ¸ŕ¸˘ŕ¸˛ŕ¸â ŕ¸ŕ¸ŕ¸ŕ¸ŕšŕ¸˛ŕ¸ ŕ¸ŕšŕšŕ¸ŕšŕ¸ŕšŕ¸ŕ¸ľŕ¸˘ŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸˛ŕ¸Łŕ¸ŕ¸ŕ¸ŕ¸ŕ¸´ŕ¸ŕšŕ¸ŕ¸˘ ŕš ŕ¸ŕ¸ľŕ¸ŕšŕ¸Ťŕ¸Ąŕ¸ˇŕ¸ŕ¸ŕ¸ŕ¸ąŕ¸ ลูŕ¸ŕ¸§ŕ¸šŕ¸ŕšŕ¸ŕ¸ľŕ¸˘ŕ¸§ŕšŕ¸ŕšŕ¸˛ŕ¸ŕ¸ąŕšŕ¸ ŕ¸ŕšŕ¸Ťŕ¸˛ŕ¸˘ŕšŕ¸ŕšŕ¸Ľŕšŕ¸§
ŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸ąŕšŕ¸ ŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕ¸ŕ¸˘ŕ¸˛ŕ¸ŕ¸Ťŕ¸Łŕ¸ˇŕ¸ŕšŕ¸Ąŕšŕ¸ŕ¸˘ŕ¸˛ŕ¸ŕ¸ŕ¸ľŕš ลูŕ¸ŕ¸Ąŕ¸ľŕ¸ŕ¸˘ŕ¸šŕšŕ¸ŕ¸Ľŕ¸ŕ¸ŕšŕ¸§ŕ¸Ľŕ¸˛ŕšŕ¸ŕšŕ¸Şŕ¸łŕ¸Ťŕ¸Łŕ¸ąŕ¸ŕ¸ŕ¸šŕšŕ¸Ąŕ¸ľŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸ąŕšŕ¸ âŕ¸ŕ¸˘ŕ¸˛ŕ¸â ŕ¸ŕšŕšŕ¸Ąŕšŕ¸Ąŕ¸ľŕ¸ŕ¸¸ŕ¸ŕ¸˛ŕ¸ŕ¸˛ŕ¸ âŕšŕ¸Ąŕšŕ¸ŕ¸˘ŕ¸˛ŕ¸â ŕ¸ŕšŕšŕ¸Ąŕšŕ¸Ąŕ¸ľŕ¸ŕ¸¸ŕ¸ŕ¸˛ŕ¸ŕ¸˛ŕ¸ ŕšŕ¸ŕšŕ¸ âสูŕ¸ŕšŕ¸ŕšŕ¸§ŕšŕ¸˛â ŕ¸ŕ¸˘ŕ¸˛ŕ¸ŕ¸Ťŕ¸Łŕ¸ˇŕ¸ŕšŕ¸Ąŕšŕ¸ŕ¸˘ŕ¸˛ŕ¸ŕšŕ¸ŕšŕ¸˛ŕ¸ŕ¸ąŕšŕ¸ ŕ¸ŕšŕ¸˛ŕ¸ŕ¸šŕ¸ŕ¸ŕ¸˛ŕ¸Ąŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕ¸ŕ¸Łŕ¸´ŕ¸ŕšŕ¸Ľŕšŕ¸§ ลูŕ¸ŕ¸ŕšŕšŕ¸ŕšŕ¸ŕšŕ¸ŕš "ŕ¸ŕ¸˛ŕ¸ŕ¸˛ŕ¸Łŕ¸ŕ¸ŕ¸ŕ¸ŕ¸´ŕ¸" ŕ¸ŕ¸˛ŕ¸ŕ¸˛ŕ¸Łŕ¸ŕ¸ŕ¸ŕ¸ŕ¸´ŕ¸ŕ¸Ąŕ¸ąŕ¸ŕšŕ¸ŕšŕ¸ŕ¸ŕ¸ŕ¸ŕ¸Ąŕ¸ąŕ¸ŕ¸ŕ¸˘ŕšŕ¸˛ŕ¸ŕ¸ŕ¸ąŕšŕ¸ŕšŕ¸ŕ¸ ŕ¸ŕšŕ¸˛ŕšŕ¸Łŕ¸˛ŕ¸Ąŕ¸˛ŕ¸ŕ¸°ŕ¸ŕ¸Łŕ¸¸ŕ¸ŕ¸Ąŕ¸ąŕ¸ŕ¸ŕ¸˘ŕ¸šŕšŕšŕ¸ŕ¸Ľŕš ŕš ŕ¸ŕ¸ľŕšŕ¸Ąŕ¸ąŕ¸ŕ¸ŕšŕšŕ¸Ťŕšŕ¸ŕ¸ŕ¸ąŕ¸
ŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸ąŕšŕ¸ŕ¸ŕ¸śŕ¸ŕ¸§ŕšŕ¸˛ ŕ¸ŕ¸˛ŕ¸Łŕ¸ŕ¸´ŕ¸ŕ¸˛ŕ¸Łŕ¸ŕ¸˛ŕ¸ŕ¸ąŕšŕ¸ ŕšŕ¸Ąŕšŕšŕ¸ŕšŕ¸Łŕ¸šŕšŕšŕ¸ŕ¸ŕ¸ľŕšŕ¸ŕ¸ˇŕšŕ¸ ลูŕ¸ŕ¸Łŕ¸šŕšŕ¸ŕ¸Łŕ¸ŕ¸ŕ¸ľŕšŕšŕ¸Ťŕ¸Ľŕ¸° ŕšŕ¸Ťŕ¸Ąŕ¸ˇŕ¸ŕ¸ŕ¸ŕ¸˛ŕ¸§ŕ¸ŕ¸Łŕ¸°ŕ¸Ąŕ¸ŕ¸ŕ¸ľŕšŕ¸ŕ¸ŕ¸ŕšŕ¸ŕ¸ŕ¸ŕ¸ŕšŕ¸Ťŕ¸ŕ¸ąŕšŕ¸ŕšŕ¸Ťŕ¸Ľŕ¸° ŕ¸ŕ¸ŕ¸ŕšŕ¸Ťŕ¸ŕ¸ŕ¸ŕšŕ¸ŕ¸ŕ¸šŕ¸ŕ¸ŕ¸Ľŕ¸˛ŕ¸ŕ¸ąŕ¸§ŕšŕ¸Ťŕ¸ŕš ŕšŕ¸ŕšŕ¸˛ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸šŕšŕ¸ŕ¸ŕ¸ŕšŕ¸Ťŕ¸ŕ¸°ŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸˘ŕšŕ¸˛ŕ¸ŕšŕ¸Ł? ŕ¸ŕšŕ¸ŕ¸Ľŕ¸ąŕ¸§ ŕ¸ŕ¸Ľŕ¸ąŕ¸§ŕ¸ŕ¸Ľŕ¸˛ŕ¸ŕ¸°ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸˛ŕ¸ŕšŕ¸Ťŕšŕ¸ŕšŕ¸Şŕ¸ľŕ¸˘ ŕšŕ¸Ąŕ¸ˇŕšŕ¸ŕšŕ¸ŕšŕ¸ŕšŕ¸ŕšŕ¸ŕ¸ŕ¸ąŕšŕ¸ ŕšŕ¸ŕ¸Ąŕ¸ąŕ¸ŕ¸ŕšŕ¸ŕ¸´ŕšŕ¸ŕ¸Łŕ¸ŕ¸ŕ¸śŕšŕ¸ŕ¸Łŕ¸°ŕ¸§ŕ¸ąŕ¸ŕ¸Ąŕ¸˛ŕ¸ ŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸ąŕ¸ŕ¸Ąŕ¸˛ŕ¸ ŕ¸ŕ¸°ŕ¸ŕ¸Łŕ¸¸ŕ¸ŕšŕ¸ŕ¸ŕ¸°ŕ¸ŕ¸Łŕ¸¸ŕ¸ŕ¸Ąŕ¸˛ŕ¸ŕ¸˘ŕ¸šŕšŕ¸ŕ¸ąŕšŕ¸ŕšŕ¸Ťŕ¸Ľŕ¸° ŕ¸ŕ¸Łŕ¸°ŕšŕ¸ŕ¸ľŕšŕ¸˘ŕ¸§ŕ¸ŕ¸Ľŕ¸˛ŕ¸Ąŕ¸ąŕ¸ŕ¸ŕšŕ¸ŕ¸ŕ¸ŕ¸ŕ¸˛ŕ¸ŕšŕ¸Ťŕšŕ¸ŕšŕ¸Şŕ¸ľŕ¸˘ ŕšŕ¸ŕ¸Łŕ¸˛ŕ¸°ŕšŕ¸ŕ¸ŕ¸°ŕ¸ŕ¸Łŕ¸¸ŕ¸ŕ¸Ąŕ¸ąŕ¸ŕšŕ¸Łŕ¸ŕšŕ¸ŕ¸´ŕ¸ŕšŕ¸
ŕ¸ŕ¸˘ŕšŕ¸˛ŕ¸ŕ¸ŕ¸ąŕšŕ¸ŕšŕ¸ŕ¸Łŕ¸˛ŕ¸ŕ¸ŕšŕ¸˛ŕ¸ŕ¸ŕ¸šŕ¸ŕ¸ŕ¸śŕ¸ŕšŕ¸Łŕ¸ˇŕšŕ¸ŕ¸ŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸ľŕš ŕ¸ŕšŕ¸˛ŕ¸ŕ¸§ŕšŕ¸˛ŕ¸ŕšŕ¸ŕ¸˘ ŕš ŕ¸ŕ¸łŕ¸Ąŕ¸ąŕ¸ ŕšŕ¸ŕšŕ¸ŕ¸˘ŕšŕ¸˛ŕšŕ¸ŕ¸Ťŕšŕ¸˛ŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸Ąŕ¸ąŕ¸ ŕ¸ŕ¸ľŕšŕ¸ŕ¸ˇŕ¸ŕ¸ŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸ŕšŕ¸Łŕ¸˛ ŕ¸ŕšŕ¸ŕ¸˘ ŕš ŕ¸ŕ¸Ľŕ¸łŕ¸Ąŕ¸ąŕ¸ŕšŕ¸ŕšŕ¸Łŕ¸ˇŕšŕ¸ŕ¸˘ ŕš ŕ¸ŕ¸˘ŕšŕ¸˛ŕ¸ŕ¸ŕ¸ąŕšŕ¸ŕšŕ¸Ťŕ¸Ľŕ¸°
ŕ¸ŕ¸˘ŕšŕ¸˛ŕ¸ŕ¸Ľŕšŕ¸ŕ¸˘ŕ¸Ąŕ¸ąŕ¸ ญรมŕ¸ŕšŕ¸Ąŕšŕ¸ŕ¸˘ŕ¸˛ŕ¸ŕ¸Łŕ¸šŕšŕ¸Ąŕ¸ąŕ¸ ŕ¸ŕšŕ¸ŕ¸ŕ¸Łŕ¸šŕš ŕ¸ŕšŕ¸ŕ¸ŕ¸Łŕ¸šŕšŕšŕ¸Łŕ¸ˇŕšŕ¸ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸Ąŕ¸ąŕ¸ ŕ¸ŕ¸˘ŕ¸˛ŕ¸˘ŕ¸˛ŕ¸Ąŕ¸ŕ¸łŕ¸Ąŕ¸ąŕ¸ŕšŕ¸ŕšŕ¸Łŕ¸ˇŕšŕ¸ŕ¸˘ ŕš ŕšŕ¸Ťŕšŕšŕ¸ŕšŕ¸ŕ¸ŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸˛ ŕ¸ŕ¸ľŕšŕšŕ¸ŕ¸ľŕ¸˘ŕ¸ŕšŕ¸Łŕ¸˛ŕ¸ŕšŕ¸ŕ¸łŕšŕ¸Ąŕšŕ¸ŕ¸ľŕšŕšŕ¸ŕ¸ľŕ¸˘ŕ¸ŕšŕ¸Łŕ¸˛ŕ¸ŕšŕ¸ŕ¸ł ŕšŕ¸Łŕ¸ľŕ¸˘ŕ¸ŕ¸§ŕšŕ¸˛ŕ¸ŕ¸˛ŕ¸Łŕ¸ŕ¸łŕ¸ŕ¸˛ŕ¸Łŕ¸ŕ¸ŕ¸´ŕ¸ŕ¸ąŕ¸ŕ¸´ ŕ¸ŕšŕ¸ŕ¸ŕ¸ŕ¸łŕšŕ¸ŕšŕ¸Łŕ¸ˇŕšŕ¸ŕ¸˘ŕšŕ¸ŕ¸˘ŕšŕ¸˛ŕ¸ŕ¸ŕ¸ľŕš
ŕ¸ŕšŕ¸˛ŕ¸Ťŕ¸˛ŕ¸ŕ¸§ŕšŕ¸˛ŕšŕ¸Łŕ¸˛ŕ¸ŕ¸˘ŕ¸ąŕ¸ ŕ¸ŕ¸˘ŕ¸ąŕ¸ŕšŕ¸ŕ¸Łŕ¸˛ŕ¸°ŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕšŕ¸ŕ¸ˇŕšŕ¸ ลูŕ¸ŕ¸Ąŕ¸ľŕ¸¨ŕ¸Łŕ¸ąŕ¸ŕ¸ŕ¸˛ŕšŕ¸ŕšŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸˛ŕšŕ¸Ąŕšŕ¸Ąŕ¸ľ ŕ¸ŕšŕ¸˛ŕšŕ¸ŕšŕ¸ŕ¸ŕ¸˘ŕšŕ¸˛ŕ¸ŕ¸ŕ¸ľŕš ŕ¸ŕ¸˘ŕ¸ąŕ¸ŕšŕ¸ ŕš ŕšŕ¸Ľŕšŕ¸§ŕ¸Ąŕ¸ąŕ¸ŕ¸ŕšŕšŕ¸Ąŕšŕšŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸Ľŕ¸ŕ¸°ŕšŕ¸Łŕ¸ŕ¸śŕšŕ¸ŕ¸Ąŕ¸˛ŕ¸ŕ¸Ąŕ¸˛ŕ¸˘ ŕ¸ŕ¸˘ŕ¸ąŕ¸ŕšŕ¸ŕ¸ŕ¸˛ŕ¸ ŕš ŕšŕ¸ŕšŕ¸˛ ŕšŕ¸ŕšŕ¸Ąŕ¸ąŕ¸ŕšŕ¸Ąŕšŕ¸ŕ¸šŕ¸ŕ¸ŕ¸˛ŕ¸ ลูŕ¸ŕ¸ŕšŕšŕ¸Ąŕšŕ¸Şŕ¸ŕ¸ŕ¸Łŕ¸°ŕ¸ŕ¸ąŕ¸ ŕ¸ŕ¸ľŕ¸ŕ¸ľŕšŕ¸ŕšŕ¸ŕ¸°ŕšŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕ¸ŕ¸´ŕ¸ŕ¸§ŕšŕ¸˛ ŕšŕ¸Łŕ¸˛ŕ¸ŕ¸ľŕšŕ¸ŕ¸¸ŕ¸ŕ¸ŕšŕ¸ŕ¸˘ŕ¸Ťŕ¸Łŕ¸ˇŕ¸ŕ¸§ŕ¸˛ŕ¸Şŕ¸ŕ¸˛ŕ¸ŕšŕ¸ŕ¸˘ ญรมŕ¸ŕ¸ŕ¸´ŕ¸ŕšŕ¸ŕ¸§ŕšŕ¸˛ŕ¸Ąŕ¸ŕ¸¸ŕ¸Šŕ¸˘ŕšŕšŕ¸ŕšŕ¸Ľŕ¸ŕ¸ŕ¸ľŕšŕ¸ŕ¸ŕ¸ŕ¸łŕšŕ¸Ąŕšŕšŕ¸ŕšŕ¸Ťŕ¸Łŕ¸ŕ¸ ŕšŕ¸Ľŕšŕ¸§ŕ¸ŕšŕšŕ¸Ľŕ¸˘ŕ¸Ťŕ¸˘ŕ¸¸ŕ¸ŕšŕ¸Ľŕ¸´ŕ¸ŕ¸ŕ¸łŕšŕ¸Ľŕ¸´ŕ¸ŕ¸ŕ¸ŕ¸´ŕ¸ŕ¸ąŕ¸ŕ¸´
ŕ¸ŕšŕ¸˛ŕšŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸˘ŕšŕ¸˛ŕ¸ŕ¸ŕ¸ľŕšŕšŕ¸Ąŕ¸ˇŕšŕ¸ŕšŕ¸ ŕ¸ŕ¸ŕšŕ¸Ťŕšŕ¸Łŕ¸°ŕ¸§ŕ¸ąŕ¸ŕšŕ¸Ťŕšŕ¸Ąŕ¸˛ŕ¸ ŕšŕ¸Ťŕšŕ¸Ąŕ¸ľŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸´ ŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕ¸ŕ¸ŕ¸ŕ¸ ŕšŕ¸Ťŕšŕ¸ŕ¸łŕšŕ¸ŕšŕ¸Łŕ¸ˇŕšŕ¸ŕ¸˘ ŕš ŕšŕ¸Ťŕ¸Ąŕ¸ˇŕ¸ŕ¸ŕ¸ŕ¸ąŕ¸ŕšŕ¸Łŕ¸˛ŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸Ľŕ¸˛ŕ¸ŕ¸ąŕ¸§ŕšŕ¸Ťŕ¸ŕš ŕ¸ŕšŕšŕ¸Ťŕšŕ¸ŕšŕ¸ŕ¸˘ ŕš ŕ¸ŕ¸Ľŕ¸łŕ¸Ąŕ¸ąŕ¸ŕšŕ¸ŕšŕ¸Łŕ¸ˇŕšŕ¸ŕ¸˘ ŕš ŕ¸ŕ¸Ľŕ¸˛ŕ¸Ąŕ¸ąŕ¸ŕ¸ŕšŕ¸ŕ¸°ŕšŕ¸Ąŕšŕ¸ŕ¸´ŕšŕ¸ŕšŕ¸Łŕ¸ŕ¸ŕšŕ¸ŕ¸˘ ŕšŕ¸ŕ¸łŕšŕ¸ŕšŕ¸Łŕ¸ˇŕšŕ¸ŕ¸˘ ŕš ŕšŕ¸Ąŕšŕ¸Ťŕ¸˘ŕ¸¸ŕ¸ ŕšŕ¸Ąŕšŕ¸ŕšŕ¸˛ŕ¸ŕ¸Ľŕ¸˛ŕ¸ŕšŕ¸ŕ¸°ŕ¸Ťŕ¸Ąŕ¸ŕ¸ŕ¸łŕ¸Ľŕ¸ąŕ¸ ลูŕ¸ŕ¸ŕšŕ¸ŕ¸ąŕ¸ŕ¸ŕšŕ¸˛ŕ¸˘ ŕ¸ŕ¸ąŕ¸ŕšŕ¸Ťŕšŕ¸ŕ¸ŕ¸ąŕ¸ŕ¸Ąŕ¸ˇŕ¸ŕšŕ¸Ľŕ¸˘ ŕ¸ŕšŕ¸˛ŕšŕ¸Łŕ¸˛ŕ¸Łŕ¸ľŕ¸ŕ¸ŕ¸ŕšŕ¸ŕ¸´ŕ¸ŕšŕ¸ ŕ¸ŕ¸Ľŕ¸˛ŕ¸Ąŕ¸ąŕ¸ŕ¸ŕšŕ¸ŕ¸°ŕ¸Ťŕ¸ŕ¸ľŕ¸ŕ¸´ŕšŕ¸ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸˛ŕ¸ŕšŕ¸Ťŕšŕ¸ŕšŕ¸˛ŕ¸ŕ¸ąŕšŕ¸
ŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸ąŕšŕ¸ ŕ¸ŕ¸˛ŕ¸Łŕ¸ŕ¸ŕ¸´ŕ¸ŕ¸ąŕ¸ŕ¸´ŕ¸ŕ¸ľŕš ŕ¸ŕšŕ¸˛ŕšŕ¸Łŕ¸˛ŕ¸ŕ¸´ŕ¸ŕ¸˛ŕ¸Łŕ¸ŕ¸˛ŕ¸ŕ¸˛ŕ¸Ąŕ¸ŕ¸ˇŕšŕ¸ŕšŕ¸Ťŕ¸ŕ¸¸ŕ¸ŕ¸ŕ¸ŕšŕ¸Łŕ¸˛ ŕšŕ¸ŕšŕ¸ŕ¸§ŕšŕ¸˛ ŕšŕ¸Łŕ¸˛ŕšŕ¸Ąŕšŕ¸Ąŕ¸ľŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕ¸Łŕ¸šŕšŕšŕ¸ŕ¸ŕ¸Łŕ¸´ŕ¸˘ŕ¸ąŕ¸ŕ¸´ ŕšŕ¸Ąŕšŕ¸Ąŕ¸ľŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕ¸Łŕ¸šŕšŕšŕ¸ŕ¸ŕ¸°ŕšŕ¸Łŕ¸ŕ¸ˇŕšŕ¸ ŕ¸ŕ¸ľŕšŕ¸ŕ¸°ŕšŕ¸Ťŕšŕ¸ŕ¸˛ŕ¸Łŕ¸ŕ¸ŕ¸´ŕ¸ŕ¸ąŕ¸ŕ¸´ŕ¸Ąŕ¸ąŕ¸ŕšŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸Ľŕ¸ŕ¸śŕšŕ¸ ŕ¸ŕšŕ¸ŕ¸šŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕ¸Łŕ¸šŕšŕ¸ŕ¸ľŕšŕšŕ¸ŕšŕ¸ŕ¸ŕ¸ˇŕšŕ¸ŕšŕ¸ŕšŕ¸ŕ¸´ŕ¸Ąŕ¸ŕ¸ŕ¸ŕšŕ¸Łŕ¸˛ŕ¸ŕ¸ąŕšŕ¸ŕšŕ¸Ťŕ¸Ľŕ¸°ŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸ąŕšŕ¸ŕ¸ŕšŕ¸ŕ¸ˇŕ¸ âŕ¸ŕ¸Łŕ¸Łŕ¸Ąŕ¸ŕ¸˛ŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸´ŕ¸â ŕ¸ŕ¸ľŕšŕšŕ¸ŕ¸ ลูŕ¸ŕ¸Ąŕ¸ľŕ¸ŕ¸ŕ¸ŕ¸Ąŕ¸ąŕ¸ŕ¸ŕ¸˘ŕ¸šŕšŕšŕ¸Ľŕšŕ¸§ ŕšŕ¸Łŕ¸˛ŕ¸ŕ¸°ŕšŕ¸ŕšŕ¸Łŕ¸ľŕ¸˘ŕ¸ŕ¸Łŕ¸šŕšŕ¸Ąŕ¸ąŕ¸ ลูŕ¸ŕ¸ŕšŕ¸Ąŕ¸ľŕ¸ŕ¸˘ŕ¸šŕš ญรมŕ¸ŕšŕ¸Łŕ¸˛ŕ¸ŕ¸°ŕšŕ¸Ąŕšŕšŕ¸ŕšŕ¸Łŕ¸ľŕ¸˘ŕ¸ŕ¸Łŕ¸šŕšŕ¸Ąŕ¸ąŕ¸ ลูŕ¸ŕ¸ŕšŕ¸Ąŕ¸ľŕ¸ŕ¸˘ŕ¸šŕš
ŕ¸ŕ¸˘ŕšŕ¸˛ŕ¸ŕ¸ŕ¸ľŕšŕ¸ŕšŕ¸˛ŕ¸ŕ¸ŕ¸šŕ¸ŕ¸§ŕšŕ¸˛ ŕ¸ŕ¸Łŕ¸°ŕ¸ŕ¸¸ŕ¸ŕ¸ŕšŕ¸ŕšŕ¸˛ŕ¸ŕ¸°ŕ¸ŕ¸ąŕ¸ŕšŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸śŕšŕ¸ŕ¸ŕšŕ¸ŕ¸˛ŕ¸Ą ญรมŕ¸ŕšŕ¸Ąŕšŕ¸ŕ¸ąŕ¸ŕšŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸śŕšŕ¸ŕ¸ŕšŕ¸ŕ¸˛ŕ¸Ą ŕ¸ŕ¸Łŕ¸Łŕ¸Ąŕ¸°ŕ¸ŕšŕ¸ŕ¸ŕ¸Ąŕ¸ľŕ¸ŕ¸˘ŕ¸šŕšŕ¸ŕ¸˘ŕšŕ¸˛ŕ¸ŕ¸ŕ¸ąŕšŕ¸ ลูŕ¸ŕšŕ¸ŕšŕ¸ŕ¸ŕ¸ŕ¸ŕ¸Ąŕ¸ąŕ¸ŕ¸ŕ¸˘ŕ¸šŕšŕ¸ŕ¸˘ŕšŕ¸˛ŕ¸ŕ¸ŕ¸ąŕšŕ¸ ŕšŕ¸Ąŕšŕ¸ŕ¸Ľŕ¸´ŕ¸ŕšŕ¸ŕ¸Ľŕ¸ŕšŕ¸ŕšŕ¸Ťŕ¸ ลูŕ¸ŕšŕ¸ŕšŕ¸ŕ¸Şŕ¸ąŕ¸ŕ¸ŕ¸ŕ¸Łŕ¸Łŕ¸Ą
ŕšŕ¸Łŕ¸˛ŕšŕ¸Ąŕšŕšŕ¸ŕšŕ¸˛ŕšŕ¸ŕ¸Şŕ¸ąŕ¸ŕ¸ŕ¸ŕ¸Łŕ¸Łŕ¸Ą ŕ¸ŕšŕšŕ¸Ąŕšŕ¸Łŕ¸šŕšŕ¸§ŕšŕ¸˛ŕ¸Şŕ¸ąŕ¸ŕ¸ŕ¸ŕ¸Łŕ¸Łŕ¸Ąŕšŕ¸ŕšŕ¸ŕ¸ŕ¸˘ŕšŕ¸˛ŕ¸ŕšŕ¸Ł ŕ¸ŕ¸ľŕšŕšŕ¸Łŕ¸ľŕ¸˘ŕ¸ŕ¸§ŕšŕ¸˛ ŕ¸ŕ¸˛ŕ¸Łŕ¸ŕ¸´ŕ¸ŕ¸˛ŕ¸Łŕ¸ŕ¸˛ŕšŕ¸ŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕ¸Łŕ¸šŕšŕ¸ŕ¸ŕ¸ŕ¸ŕ¸šŕšŕ¸ŕ¸ŕ¸´ŕ¸ŕ¸ąŕ¸ŕ¸´ŕ¸ŕ¸ľŕšŕšŕ¸Ąŕšŕ¸Ąŕ¸ľŕ¸ŕ¸ˇŕšŕ¸ŕ¸ŕ¸Łŕ¸´ŕ¸˘ŕ¸ąŕ¸ŕ¸´
ŕ¸ŕ¸ŕšŕ¸Ťŕšŕ¸ŕ¸šŕ¸ŕ¸´ŕ¸ ŕ¸ŕ¸˘ŕ¸˛ŕ¸˘ŕ¸˛ŕ¸Ąŕ¸ŕšŕ¸˛ŕ¸ŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸ŕ¸ŕšŕ¸ŕšŕ¸˛ŕ¸ŕ¸ŕ¸ ŕ¸ŕ¸˘ŕ¸˛ŕ¸˘ŕ¸˛ŕ¸Ąŕ¸ŕ¸šŕ¸ŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸ŕ¸ŕšŕ¸ŕšŕ¸˛ŕ¸ŕ¸ŕ¸ ลูŕ¸ŕ¸ŕ¸śŕ¸ŕ¸ŕ¸°ŕ¸Łŕ¸šŕšŕšŕ¸Łŕ¸ˇŕšŕ¸ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸´ŕ¸ ŕ¸ŕšŕ¸ŕ¸˘ ŕš ŕ¸ŕ¸łŕšŕ¸ ŕ¸ŕšŕ¸˛ŕ¸˘ŕ¸ąŕ¸ŕšŕ¸Ąŕšŕ¸ŕ¸śŕ¸ŕ¸ŕ¸ľŕšŕ¸ŕ¸ŕ¸ŕ¸Ąŕ¸ąŕ¸ ลูŕ¸ŕ¸ŕšŕšŕ¸ŕ¸ŕ¸˘ŕ¸šŕšŕ¸ŕ¸˘ŕšŕ¸˛ŕ¸ŕ¸ŕ¸ąŕšŕ¸
ŕ¸ŕ¸Łŕ¸šŕ¸ŕ¸˛ŕ¸ŕ¸˛ŕ¸ŕ¸˛ŕ¸Łŕ¸˘ŕšŕ¸ŕ¸˛ŕ¸ŕ¸ŕšŕ¸˛ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸§ŕšŕ¸˛ ŕ¸ŕ¸łŕšŕ¸ŕšŕ¸Łŕ¸ˇŕšŕ¸ŕ¸˘ ŕš ŕ¸ŕ¸˘ŕšŕ¸˛ŕ¸Ťŕ¸˘ŕ¸¸ŕ¸ ŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸ľŕšŕ¸Łŕ¸˛ŕ¸Ąŕ¸˛ŕ¸ŕ¸´ŕ¸ âŕšŕ¸ŕ¸ ŕ¸ŕ¸łŕšŕ¸ŕšŕ¸Łŕ¸ˇŕšŕ¸ŕ¸˘ ŕš ŕ¸ŕšŕ¸˛ŕšŕ¸Ąŕšŕ¸Łŕ¸šŕšŕšŕ¸Łŕ¸ˇŕšŕ¸ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸Ąŕ¸ąŕ¸ ŕ¸ŕšŕ¸˛ŕ¸ŕ¸łŕšŕ¸Ąŕšŕ¸ŕ¸šŕ¸ŕ¸ŕ¸ľŕšŕ¸Ąŕ¸ąŕ¸ ลูŕ¸ŕ¸ŕ¸°ŕ¸Łŕ¸šŕšŕ¸ŕ¸°ŕšŕ¸Łâ ŕ¸ŕ¸˘ŕšŕ¸˛ŕ¸ŕ¸ŕ¸ľŕšŕšŕ¸ŕšŕ¸ŕ¸ŕšŕ¸ ŕ¸ŕšŕ¸ŕšŕ¸ŕ¸ŕšŕ¸ŕšŕ¸Łŕ¸ˇŕšŕ¸ŕ¸˘ ŕš ŕ¸ŕšŕ¸ŕ¸ ŕšŕ¸Ľŕšŕ¸§ŕ¸Ąŕ¸ąŕ¸ŕ¸ŕšŕ¸ŕ¸°ŕšŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕ¸Łŕ¸šŕšŕ¸Şŕ¸śŕ¸ŕ¸ŕ¸śŕ¸ŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸śŕšŕ¸ŕšŕ¸ŕ¸Şŕ¸´ŕšŕ¸ŕ¸ŕ¸ľŕšŕšŕ¸Łŕ¸˛ŕ¸ŕ¸˛ŕ¸ŕšŕ¸ŕ¸ľŕ¸˘ŕ¸Łŕ¸ŕ¸łŕ¸ŕ¸ąŕšŕ¸
ลูŕ¸ŕšŕ¸Ťŕ¸Ąŕ¸ˇŕ¸ŕ¸ŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸¸ŕ¸Łŕ¸¸ŕ¸Šŕ¸ŕ¸ľŕšŕšŕ¸ŕ¸Şŕ¸ľŕšŕ¸ ŕšŕ¸ŕšŕ¸ŕ¸ąŕ¸ŕ¸ŕšŕ¸˛ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸§ŕšŕ¸˛ ŕšŕ¸ŕ¸˛ŕšŕ¸Ąŕšŕšŕ¸ŕšŕ¸Şŕ¸ŕ¸ŕ¸ŕ¸ąŕ¸ŕ¸Ąŕ¸˛ŕ¸Şŕ¸ľŕ¸ŕ¸ąŕ¸ŕšŕ¸ŕšŕ¸˛ŕšŕ¸ŕšŕ¸ŕ¸ŕ¸° ŕšŕ¸Ľŕšŕ¸§ŕ¸ŕ¸°ŕ¸Ąŕ¸ľŕšŕ¸ŕšŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸śŕšŕ¸ ŕ¸ŕ¸¸ŕ¸Łŕ¸¸ŕ¸Šŕ¸ŕ¸ąŕšŕ¸ŕ¸ŕšŕ¸ŕ¸ąŕ¸ŕšŕ¸Ąŕšŕšŕ¸ŕšŕšŕ¸ŕšŕ¸˛ŕ¸Şŕ¸ŕ¸ŕ¸ŕ¸ąŕ¸ ส฾ŕ¸ŕ¸ąŕ¸ŕšŕ¸ŕšŕ¸˛ ŕšŕ¸ŕšŕšŕ¸ŕ¸Łŕšŕ¸ŕ¸ ส฾ŕšŕ¸ŕšŕ¸ŕšŕ¸Ťŕ¸ŕšŕ¸ŕ¸˘ ŕ¸ŕšŕ¸ŕ¸˘ŕ¸˛ŕ¸ŕšŕ¸Ťŕšŕ¸Ąŕ¸ąŕ¸ŕšŕ¸ŕšŕ¸ŕšŕ¸ ŕšŕ¸ŕ¸ŕšŕšŕ¸Łŕšŕ¸ŕ¸ŕ¸˘ŕ¸šŕšŕšŕ¸Łŕ¸ˇŕšŕ¸ŕ¸˘ ŕšŕ¸Ťŕšŕšŕ¸ŕšŕ¸ŕšŕ¸ŕšŕ¸Łŕšŕ¸§ŕš ŕšŕ¸ŕšŕšŕ¸ŕ¸ŕšŕšŕ¸Ąŕšŕšŕ¸ŕ¸´ŕ¸ŕ¸Şŕ¸ąŕ¸ŕ¸ŕ¸ľ ŕ¸ŕ¸¸ŕ¸Łŕ¸¸ŕ¸Šŕ¸ŕ¸ąŕšŕ¸ŕ¸ŕšŕšŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕ¸ŕ¸ľŕšŕšŕ¸ŕ¸ľŕ¸˘ŕ¸ ŕšŕ¸Ľŕšŕ¸§ŕ¸ŕšŕ¸Ťŕ¸˘ŕ¸¸ŕ¸ŕ¸ŕ¸ąŕ¸ ŕšŕ¸Ľŕšŕ¸§ŕ¸ŕ¸śŕ¸ŕ¸Ľŕ¸ŕ¸ŕ¸Şŕ¸ľŕ¸ŕ¸ľŕ¸ŕ¸ŕ¸´ŕ¸ ŕšŕ¸Ľŕšŕ¸§ŕ¸ŕšŕ¸Ťŕ¸˘ŕ¸¸ŕ¸ŕ¸ŕ¸ąŕ¸ ŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕ¸Łŕšŕ¸ŕ¸ŕ¸ŕ¸ľŕšŕ¸ŕ¸ŕ¸Ąŕ¸ľŕ¸ŕ¸˘ŕ¸šŕšŕ¸ŕšŕ¸˛ŕ¸ ŕ¸ŕšŕ¸Ťŕ¸˛ŕ¸˘ŕšŕ¸ŕ¸Ľŕšŕ¸°ŕ¸ŕ¸´ ŕšŕ¸ŕ¸Łŕ¸˛ŕ¸°ŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕ¸Łŕšŕ¸ŕ¸ŕ¸Ąŕ¸ąŕ¸ŕšŕ¸Ąŕšŕ¸ŕ¸´ŕ¸ŕ¸ŕšŕ¸ŕ¸ŕ¸ąŕ¸
ŕ¸ŕšŕ¸˛ŕ¸ŕ¸łŕšŕ¸ŕšŕ¸Łŕ¸ˇŕšŕ¸ŕ¸˘ŕšŕ¸ŕ¸˘ŕšŕ¸˛ŕ¸ŕ¸ŕ¸ľŕš ŕšŕ¸Ťŕ¸ŕ¸ˇŕšŕ¸ŕ¸˘ŕ¸ŕšŕ¸Ťŕ¸˘ŕ¸¸ŕ¸ ล฾ŕšŕ¸ŕšŕšŕ¸Ťŕ¸ŕ¸ˇŕšŕ¸ŕ¸˘ŕ¸ŕ¸˘ŕšŕ¸˛ŕ¸ŕšŕ¸ŕ¸ľŕ¸˘ŕ¸§ŕ¸ŕšŕ¸ŕ¸ŕšŕ¸ŕš ŕšŕ¸ŕšŕ¸Ąŕ¸ľŕ¸ŕ¸ľŕšŕšŕ¸ŕ¸ľŕ¸˘ŕ¸ŕ¸ŕ¸ŕšŕ¸ŕšŕ¸˛ŕ¸ŕšŕ¸§ŕ¸˘ ŕšŕ¸Ľŕ¸˘ŕšŕ¸ŕ¸ŕ¸ąŕ¸ŕšŕ¸Ťŕ¸ŕš ŕšŕ¸Ľŕšŕ¸§ŕ¸ŕ¸¸ŕ¸Łŕ¸¸ŕ¸Šŕ¸ŕ¸ąŕšŕ¸ŕ¸ŕšŕ¸Ťŕ¸˛ŕ¸§ŕšŕ¸˛ŕšŕ¸ŕšŕ¸Ąŕšŕ¸Ąŕ¸ľ ŕšŕ¸Ąŕšŕšŕ¸ŕ¸˛ŕšŕ¸ ŕ¸ŕšŕ¸ŕ¸´ŕšŕ¸ ŕšŕ¸Ľŕ¸´ŕ¸ ŕšŕ¸Ąŕšŕ¸Şŕ¸ľŕ¸ŕ¸ľŕ¸ ŕšŕ¸Ľŕšŕ¸§ŕ¸ŕšŕšŕ¸ŕšŕ¸ŕ¸ľŕšŕ¸˘ŕ¸§ŕ¸ŕ¸Łŕ¸°ŕ¸ŕ¸˛ŕ¸¨ŕ¸§ŕšŕ¸˛ ŕšŕ¸ŕšŕ¸Ąŕšŕ¸Ąŕ¸ľ ŕ¸ŕ¸łŕ¸ŕ¸˘ŕšŕ¸˛ŕ¸ŕ¸ŕ¸ľŕšŕšŕ¸Ąŕšŕšŕ¸ŕš ŕšŕ¸Ąŕšŕ¸Ąŕ¸ľŕšŕ¸ŕ¸Ťŕ¸Łŕ¸ŕ¸ ŕšŕ¸ŕ¸˛ŕšŕ¸ŕšŕ¸Ľŕ¸ŕ¸ŕ¸ŕ¸łŕšŕ¸Ľŕšŕ¸§
ŕ¸ŕšŕ¸ŕ¸Łŕ¸´ŕ¸ŕšŕ¸Ťŕ¸Ąŕ¸ˇŕ¸ŕ¸ŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸ľŕšŕšŕ¸ŕšŕ¸ŕ¸łŕšŕ¸Ľŕšŕ¸§ ŕšŕ¸ŕšŕ¸ŕ¸łŕ¸˘ŕ¸ąŕ¸ŕšŕ¸Ąŕšŕ¸ŕ¸śŕ¸ŕ¸ŕ¸¸ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸Ąŕ¸ąŕ¸ŕ¸ŕ¸ˇŕ¸ŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕ¸Łŕšŕ¸ŕ¸ŕ¸˘ŕ¸ąŕ¸ŕšŕ¸Ąŕšŕ¸Şŕ¸Ąŕ¸ŕ¸¸ŕ¸Ľŕ¸ŕ¸ąŕ¸ ŕšŕ¸ŕ¸Ąŕ¸ąŕ¸ŕ¸ŕšŕšŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸śŕšŕ¸ŕšŕ¸Ąŕšŕšŕ¸ŕš ŕ¸ŕ¸ąŕšŕ¸ŕ¸ŕ¸ľŕšŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕ¸ŕ¸Łŕ¸´ŕ¸ŕšŕ¸ŕ¸Ąŕ¸ąŕ¸ŕ¸ŕšŕ¸Ąŕ¸ľŕ¸ŕ¸˘ŕ¸šŕš ŕ¸ŕ¸˘ŕšŕ¸˛ŕ¸ŕ¸ŕ¸ľŕšŕ¸ŕšŕšŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕ¸ŕšŕ¸ŕšŕ¸ŕšŕ¸ŕ¸śŕšŕ¸ŕšŕ¸ŕšŕ¸ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸šŕšŕ¸ŕ¸ŕ¸´ŕ¸ŕ¸ąŕ¸ŕ¸´ŕ¸ŕ¸ąŕšŕ¸ ŕ¸ŕšŕ¸Ľŕ¸°ŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸ľŕšŕšŕ¸ŕ¸ŕ¸łŕ¸ŕ¸ąŕ¸ŕšŕ¸ŕšŕ¸ŕšŕ¸Łŕ¸ˇŕšŕ¸ŕ¸˘ŕšŕ¸ ŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸ľŕšŕ¸ŕ¸ąŕ¸ŕšŕ¸ŕ¸ŕšŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸ąŕšŕ¸
ŕ¸ŕ¸˛ŕ¸Łŕ¸ŕ¸ŕ¸´ŕ¸ŕ¸ąŕ¸ŕ¸´ŕ¸ŕ¸ąŕšŕ¸ ŕ¸ŕ¸ŕ¸´ŕ¸ŕ¸ąŕ¸ŕ¸´ŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸˛ŕ¸˘ŕ¸ŕ¸˛ŕ¸ŕšŕ¸ŕ¸ŕ¸ąŕšŕ¸ŕ¸Şŕ¸ŕ¸ŕ¸ŕ¸˘ŕšŕ¸˛ŕ¸ ลูŕ¸ŕ¸ŕšŕ¸ŕ¸ŕ¸ŕ¸Łŕšŕ¸ŕ¸Ąŕ¸ŕ¸ąŕ¸ ŕšŕ¸ŕ¸Łŕ¸˛ŕ¸°ŕ¸ŕ¸°ŕšŕ¸Ł? ŕšŕ¸ŕ¸Łŕ¸˛ŕ¸°ŕ¸ŕ¸ˇŕšŕ¸ŕšŕ¸ŕ¸Ąŕ¸ąŕ¸ŕšŕ¸ŕšŕ¸ŕ¸ŕ¸ŕ¸Ąŕ¸ľŕ¸ŕ¸´ŕšŕ¸Ľŕ¸Şŕ¸ŕ¸ąŕšŕ¸ŕ¸ŕ¸ąŕšŕ¸ ŕ¸ŕ¸Łŕ¸°ŕ¸ŕ¸¸ŕ¸ŕ¸ŕšŕ¸ŕšŕ¸˛ŕ¸ŕšŕ¸ŕ¸ŕ¸ŕ¸ľŕšŕ¸ŕ¸°ŕšŕ¸ŕšŕ¸ŕ¸ŕ¸Łŕ¸°ŕ¸ŕ¸¸ŕ¸ŕ¸ŕšŕ¸ŕšŕ¸˛ ŕ¸ŕšŕ¸˛ŕ¸ŕ¸ŕšŕ¸Ąŕ¸ľŕ¸ŕ¸´ŕšŕ¸Ľŕ¸Şŕšŕ¸ŕšŕ¸ŕšŕ¸˛ŕ¸ŕ¸Ąŕ¸ľŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸˛ŕ¸Ąŕ¸˛ŕ¸ŕ¸Ťŕ¸Ľŕ¸˛ŕ¸˘ ŕ¸ŕ¸Łŕ¸°ŕ¸ŕ¸Łŕ¸Ťŕ¸ąŕ¸ŕ¸ŕšŕ¸ŕšŕšŕ¸Ťŕ¸Ąŕ¸ˇŕ¸ŕ¸ŕ¸ŕ¸ąŕ¸ ŕšŕ¸Ąŕ¸ˇŕšŕ¸ŕ¸˘ŕ¸ąŕ¸ŕšŕ¸ŕšŕ¸ŕ¸ŕ¸¸ŕ¸ŕ¸¸ŕ¸ŕ¸ŕ¸ŕ¸˘ŕ¸šŕš ŕ¸ŕšŕšŕ¸Ťŕ¸Ąŕ¸ˇŕ¸ŕ¸ŕ¸ŕ¸ąŕ¸ŕšŕ¸Łŕ¸˛
ŕšŕ¸Ąŕ¸ˇŕšŕ¸ŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕ¸ŕ¸˘ŕ¸˛ŕ¸ŕšŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸śŕšŕ¸ŕ¸Ąŕ¸˛ ŕšŕ¸Łŕ¸˛ŕ¸ŕšŕšŕ¸Ąŕšŕ¸Łŕ¸šŕšŕ¸ŕ¸ąŕ¸ ŕšŕ¸Ąŕ¸ˇŕšŕ¸ŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕšŕ¸Ąŕšŕ¸ŕ¸˘ŕ¸˛ŕ¸ŕšŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸śŕšŕ¸ŕ¸Ąŕ¸˛ ŕšŕ¸Łŕ¸˛ŕ¸ŕšŕšŕ¸Ąŕšŕ¸Łŕ¸šŕšŕ¸ŕ¸ąŕ¸ ŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸ľŕ¸ŕšŕ¸Łŕšŕ¸ŕ¸ŕšŕ¸ ŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸ľŕ¸ŕšŕ¸ŕ¸ľŕšŕ¸ ŕ¸ŕšŕ¸˛ŕšŕ¸ŕšŕ¸Łŕ¸˛ŕšŕ¸Ąŕšŕ¸ŕ¸˘ŕ¸˛ŕ¸ ŕ¸ŕšŕ¸ŕ¸ľŕšŕ¸ŕšŕ¸ŕ¸ŕ¸Ťŕ¸ŕ¸śŕšŕ¸ ŕšŕ¸Ľŕ¸°ŕ¸§ŕ¸¸ŕšŕ¸ŕ¸§ŕ¸˛ŕ¸˘ŕ¸ŕ¸ľŕ¸ŕšŕ¸ŕ¸ŕ¸Ťŕ¸ŕ¸śŕšŕ¸ ŕ¸ŕšŕ¸˛ŕšŕ¸ŕšŕ¸Łŕ¸˛ŕ¸ŕ¸˘ŕ¸˛ŕ¸ ลูŕ¸ŕ¸ŕšŕ¸§ŕ¸¸ŕšŕ¸ŕ¸§ŕ¸˛ŕ¸˘ŕ¸ŕ¸˘ŕšŕ¸˛ŕ¸ŕ¸Ťŕ¸ŕ¸śŕšŕ¸ ŕšŕ¸Ľŕ¸°ŕ¸ŕ¸ľŕšŕ¸ŕ¸ŕ¸˘ŕšŕ¸˛ŕ¸ŕ¸Ťŕ¸ŕ¸śŕšŕ¸ ลูŕ¸ŕ¸ŕ¸Łŕ¸°ŕ¸Şŕ¸Ąŕ¸ŕ¸Łŕ¸°ŕšŕ¸Şŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸˘ŕ¸šŕšŕ¸ŕ¸˘ŕšŕ¸˛ŕ¸ŕ¸ŕ¸ľŕš
ŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸ľŕšŕ¸ŕ¸ˇŕ¸ŕ¸ŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸šŕšŕ¸ŕ¸ŕ¸´ŕ¸ŕ¸ąŕ¸ŕ¸´ŕšŕ¸Łŕ¸˛
[ŕ¸ŕšŕ¸˛ŕ¸ŕšŕ¸ŕ¸ŕ¸Łŕ¸Łŕ¸Ąŕ¸ŕ¸˛ŕ¸ŕ¸´] ญ฼วŕ¸ŕ¸ŕ¸šŕšŕ¸ŕ¸˛ สุภูŕ¸ŕšŕ¸ ญŕ¸ŕ¸ąŕ¸ŕ¸Şŕ¸ˇŕ¸ ญลวŕ¸: ŕšŕ¸ŕ¸ŕ¸´ŕ¸ŕ¸˛ŕ¸
-
@ daa41bed:88f54153
2025-02-09 16:50:04There has been a good bit of discussion on Nostr over the past few days about the merits of zaps as a method of engaging with notes, so after writing a rather lengthy article on the pros of a strategic Bitcoin reserve, I wanted to take some time to chime in on the much more fun topic of digital engagement.
Let's begin by defining a couple of things:
Nostr is a decentralized, censorship-resistance protocol whose current biggest use case is social media (think Twitter/X). Instead of relying on company servers, it relies on relays that anyone can spin up and own their own content. Its use cases are much bigger, though, and this article is hosted on my own relay, using my own Nostr relay as an example.
Zap is a tip or donation denominated in sats (small units of Bitcoin) sent from one user to another. This is generally done directly over the Lightning Network but is increasingly using Cashu tokens. For the sake of this discussion, how you transmit/receive zaps will be irrelevant, so don't worry if you don't know what Lightning or Cashu are.
If we look at how users engage with posts and follows/followers on platforms like Twitter, Facebook, etc., it becomes evident that traditional social media thrives on engagement farming. The more outrageous a post, the more likely it will get a reaction. We see a version of this on more visual social platforms like YouTube and TikTok that use carefully crafted thumbnail images to grab the user's attention to click the video. If you'd like to dive deep into the psychology and science behind social media engagement, let me know, and I'd be happy to follow up with another article.
In this user engagement model, a user is given the option to comment or like the original post, or share it among their followers to increase its signal. They receive no value from engaging with the content aside from the dopamine hit of the original experience or having their comment liked back by whatever influencer they provide value to. Ad revenue flows to the content creator. Clout flows to the content creator. Sales revenue from merch and content placement flows to the content creator. We call this a linear economy -- the idea that resources get created, used up, then thrown away. Users create content and farm as much engagement as possible, then the content is forgotten within a few hours as they move on to the next piece of content to be farmed.
What if there were a simple way to give value back to those who engage with your content? By implementing some value-for-value model -- a circular economy. Enter zaps.
Unlike traditional social media platforms, Nostr does not actively use algorithms to determine what content is popular, nor does it push content created for active user engagement to the top of a user's timeline. Yes, there are "trending" and "most zapped" timelines that users can choose to use as their default, but these use relatively straightforward engagement metrics to rank posts for these timelines.
That is not to say that we may not see clients actively seeking to refine timeline algorithms for specific metrics. Still, the beauty of having an open protocol with media that is controlled solely by its users is that users who begin to see their timeline gamed towards specific algorithms can choose to move to another client, and for those who are more tech-savvy, they can opt to run their own relays or create their own clients with personalized algorithms and web of trust scoring systems.
Zaps enable the means to create a new type of social media economy in which creators can earn for creating content and users can earn by actively engaging with it. Like and reposting content is relatively frictionless and costs nothing but a simple button tap. Zaps provide active engagement because they signal to your followers and those of the content creator that this post has genuine value, quite literally in the form of moneyâsats.
I have seen some comments on Nostr claiming that removing likes and reactions is for wealthy people who can afford to send zaps and that the majority of people in the US and around the world do not have the time or money to zap because they have better things to spend their money like feeding their families and paying their bills. While at face value, these may seem like valid arguments, they, unfortunately, represent the brainwashed, defeatist attitude that our current economic (and, by extension, social media) systems aim to instill in all of us to continue extracting value from our lives.
Imagine now, if those people dedicating their own time (time = money) to mine pity points on social media would instead spend that time with genuine value creation by posting content that is meaningful to cultural discussions. Imagine if, instead of complaining that their posts get no zaps and going on a tirade about how much of a victim they are, they would empower themselves to take control of their content and give value back to the world; where would that leave us? How much value could be created on a nascent platform such as Nostr, and how quickly could it overtake other platforms?
Other users argue about user experience and that additional friction (i.e., zaps) leads to lower engagement, as proven by decades of studies on user interaction. While the added friction may turn some users away, does that necessarily provide less value? I argue quite the opposite. You haven't made a few sats from zaps with your content? Can't afford to send some sats to a wallet for zapping? How about using the most excellent available resource and spending 10 seconds of your time to leave a comment? Likes and reactions are valueless transactions. Social media's real value derives from providing monetary compensation and actively engaging in a conversation with posts you find interesting or thought-provoking. Remember when humans thrived on conversation and discussion for entertainment instead of simply being an onlooker of someone else's life?
If you've made it this far, my only request is this: try only zapping and commenting as a method of engagement for two weeks. Sure, you may end up liking a post here and there, but be more mindful of how you interact with the world and break yourself from blind instinct. You'll thank me later.
-
@ e3ba5e1a:5e433365
2025-02-05 17:47:16I got into a friendly discussion on X regarding health insurance. The specific question was how to deal with health insurance companies (presumably unfairly) denying claims? My answer, as usual: get government out of it!
The US healthcare system is essentially the worst of both worlds:
- Unlike full single payer, individuals incur high costs
- Unlike a true free market, regulation causes increases in costs and decreases competition among insurers
I'm firmly on the side of moving towards the free market. (And I say that as someone living under a single payer system now.) Here's what I would do:
- Get rid of tax incentives that make health insurance tied to your employer, giving individuals back proper freedom of choice.
- Reduce regulations significantly.
-
In the short term, some people will still get rejected claims and other obnoxious behavior from insurance companies. We address that in two ways:
- Due to reduced regulations, new insurance companies will be able to enter the market offering more reliable coverage and better rates, and people will flock to them because they have the freedom to make their own choices.
- Sue the asses off of companies that reject claims unfairly. And ideally, as one of the few legitimate roles of government in all this, institute new laws that limit the ability of fine print to allow insurers to escape their responsibilities. (I'm hesitant that the latter will happen due to the incestuous relationship between Congress/regulators and insurers, but I can hope.)
Will this magically fix everything overnight like politicians normally promise? No. But it will allow the market to return to a healthy state. And I don't think it will take long (order of magnitude: 5-10 years) for it to come together, but that's just speculation.
And since there's a high correlation between those who believe government can fix problems by taking more control and demanding that only credentialed experts weigh in on a topic (both points I strongly disagree with BTW): I'm a trained actuary and worked in the insurance industry, and have directly seen how government regulation reduces competition, raises prices, and harms consumers.
And my final point: I don't think any prior art would be a good comparison for deregulation in the US, it's such a different market than any other country in the world for so many reasons that lessons wouldn't really translate. Nonetheless, I asked Grok for some empirical data on this, and at best the results of deregulation could be called "mixed," but likely more accurately "uncertain, confused, and subject to whatever interpretation anyone wants to apply."
https://x.com/i/grok/share/Zc8yOdrN8lS275hXJ92uwq98M
-
@ 33baa074:3bb3a297
2025-05-28 08:25:13The oil-in-water sensoris an instrument specially used to detect oil substances in water bodies. Its working principle is mainly based on the characteristic that oil substances will produce fluorescence under ultraviolet light. The following is a detailed explanation:
Principle Overview The oil-in-water sensor uses the characteristic that oil substances will produce fluorescence under ultraviolet light, and measures the fluorescence intensity to infer the concentration of oil substances. Specifically, the sensor uses ultraviolet light as the excitation light source to irradiate the water sample to be tested. After the oil substance absorbs ultraviolet light, it will stimulate fluorescence, and the fluorescence signal is received by the photo detector and converted into an electrical signal. By measuring the strength of the electrical signal, the concentration of oil substances in the water sample can be inferred.
Workflow Ultraviolet light irradiation: The ultraviolet light source inside the sensor emits ultraviolet light and irradiates it into the water sample to be tested.
Fluorescence generation: After the oil substance in the water sample absorbs ultraviolet light, it will stimulate fluorescence.
Fluorescence detection: The photo detector in the sensor measures the intensity of this fluorescence.
Signal conversion: The signal processing circuit converts the output of the photo detector into an electrical signal proportional to the amount of oil in the water. Data analysis: By analyzing the strength of the electrical signal, the concentration of oil substances in the water sample can be obtained.
Features and applications The oil in water sensor has high sensitivity and can detect soluble and falsifiable oils. It is suitable for a variety of water quality monitoring scenarios, such as oil field monitoring, industrial circulating water, condensate water, wastewater treatment, surface water stations, etc. In addition, it can also monitor the content of crude oil (benzene and benzene homologous) in water sources such as reservoirs and water plants in real time online, play an early warning role, and protect the safety of water sources.
Practical application The oil in water sensor has a wide range of functions in practical applications, including but not limited to the following aspects: Monitoring the water quality of water sources: ensuring the safety of drinking water, and timely discovering pollution sources and ensuring water supply safety by continuously monitoring oil substances in water sources. Monitoring sewage treatment plant emissions: ensuring that the discharge water quality of sewage treatment plants meets the emission standards to avoid secondary pollution to the environment. Monitoring rivers, lakes and other water bodies: assessing the pollution status and providing a basis for pollution control. Early warning and emergency response: It has real-time monitoring and early warning functions, and can issue an alarm in time when abnormal conditions are found, providing valuable time for emergency response and reducing losses caused by pollution. Scientific research: Through the monitoring data of this sensor, we can deeply understand the distribution, migration and transformation of oil substances in water bodies, and provide a scientific basis for environmental protection and governance.
In summary, the oil in water sensor monitors the oil content in water bodies through ultraviolet fluorescence method, has high sensitivity and broad application prospects, and is an indispensable and important tool in modern environmental monitoring and industrial production.
-
@ 91bea5cd:1df4451c
2025-02-04 17:24:50Definição de ULID:
Timestamp 48 bits, Aleatoriedade 80 bits Sendo Timestamp 48 bits inteiro, tempo UNIX em milissegundos, NĂŁo ficarĂĄ sem espaço atĂŠ o ano 10889 d.C. e Aleatoriedade 80 bits, Fonte criptograficamente segura de aleatoriedade, se possĂvel.
Gerar ULID
```sql
CREATE EXTENSION IF NOT EXISTS pgcrypto;
CREATE FUNCTION generate_ulid() RETURNS TEXT AS $$ DECLARE -- Crockford's Base32 encoding BYTEA = '0123456789ABCDEFGHJKMNPQRSTVWXYZ'; timestamp BYTEA = E'\000\000\000\000\000\000'; output TEXT = '';
unix_time BIGINT; ulid BYTEA; BEGIN -- 6 timestamp bytes unix_time = (EXTRACT(EPOCH FROM CLOCK_TIMESTAMP()) * 1000)::BIGINT; timestamp = SET_BYTE(timestamp, 0, (unix_time >> 40)::BIT(8)::INTEGER); timestamp = SET_BYTE(timestamp, 1, (unix_time >> 32)::BIT(8)::INTEGER); timestamp = SET_BYTE(timestamp, 2, (unix_time >> 24)::BIT(8)::INTEGER); timestamp = SET_BYTE(timestamp, 3, (unix_time >> 16)::BIT(8)::INTEGER); timestamp = SET_BYTE(timestamp, 4, (unix_time >> 8)::BIT(8)::INTEGER); timestamp = SET_BYTE(timestamp, 5, unix_time::BIT(8)::INTEGER);
-- 10 entropy bytes ulid = timestamp || gen_random_bytes(10);
-- Encode the timestamp output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 0) & 224) >> 5)); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 0) & 31))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 1) & 248) >> 3)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 1) & 7) << 2) | ((GET_BYTE(ulid, 2) & 192) >> 6))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 2) & 62) >> 1)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 2) & 1) << 4) | ((GET_BYTE(ulid, 3) & 240) >> 4))); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 3) & 15) << 1) | ((GET_BYTE(ulid, 4) & 128) >> 7))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 4) & 124) >> 2)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 4) & 3) << 3) | ((GET_BYTE(ulid, 5) & 224) >> 5))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 5) & 31)));
-- Encode the entropy output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 6) & 248) >> 3)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 6) & 7) << 2) | ((GET_BYTE(ulid, 7) & 192) >> 6))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 7) & 62) >> 1)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 7) & 1) << 4) | ((GET_BYTE(ulid, 8) & 240) >> 4))); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 8) & 15) << 1) | ((GET_BYTE(ulid, 9) & 128) >> 7))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 9) & 124) >> 2)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 9) & 3) << 3) | ((GET_BYTE(ulid, 10) & 224) >> 5))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 10) & 31))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 11) & 248) >> 3)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 11) & 7) << 2) | ((GET_BYTE(ulid, 12) & 192) >> 6))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 12) & 62) >> 1)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 12) & 1) << 4) | ((GET_BYTE(ulid, 13) & 240) >> 4))); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 13) & 15) << 1) | ((GET_BYTE(ulid, 14) & 128) >> 7))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 14) & 124) >> 2)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 14) & 3) << 3) | ((GET_BYTE(ulid, 15) & 224) >> 5))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 15) & 31)));
RETURN output; END $$ LANGUAGE plpgsql VOLATILE; ```
ULID TO UUID
```sql CREATE OR REPLACE FUNCTION parse_ulid(ulid text) RETURNS bytea AS $$ DECLARE -- 16byte bytes bytea = E'\x00000000 00000000 00000000 00000000'; v char[]; -- Allow for O(1) lookup of index values dec integer[] = ARRAY[ 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 255, 255, 255, 255, 255, 255, 255, 10, 11, 12, 13, 14, 15, 16, 17, 1, 18, 19, 1, 20, 21, 0, 22, 23, 24, 25, 26, 255, 27, 28, 29, 30, 31, 255, 255, 255, 255, 255, 255, 10, 11, 12, 13, 14, 15, 16, 17, 1, 18, 19, 1, 20, 21, 0, 22, 23, 24, 25, 26, 255, 27, 28, 29, 30, 31 ]; BEGIN IF NOT ulid ~* '^[0-7][0-9ABCDEFGHJKMNPQRSTVWXYZ]{25}$' THEN RAISE EXCEPTION 'Invalid ULID: %', ulid; END IF;
v = regexp_split_to_array(ulid, '');
-- 6 bytes timestamp (48 bits) bytes = SET_BYTE(bytes, 0, (dec[ASCII(v[1])] << 5) | dec[ASCII(v[2])]); bytes = SET_BYTE(bytes, 1, (dec[ASCII(v[3])] << 3) | (dec[ASCII(v[4])] >> 2)); bytes = SET_BYTE(bytes, 2, (dec[ASCII(v[4])] << 6) | (dec[ASCII(v[5])] << 1) | (dec[ASCII(v[6])] >> 4)); bytes = SET_BYTE(bytes, 3, (dec[ASCII(v[6])] << 4) | (dec[ASCII(v[7])] >> 1)); bytes = SET_BYTE(bytes, 4, (dec[ASCII(v[7])] << 7) | (dec[ASCII(v[8])] << 2) | (dec[ASCII(v[9])] >> 3)); bytes = SET_BYTE(bytes, 5, (dec[ASCII(v[9])] << 5) | dec[ASCII(v[10])]);
-- 10 bytes of entropy (80 bits); bytes = SET_BYTE(bytes, 6, (dec[ASCII(v[11])] << 3) | (dec[ASCII(v[12])] >> 2)); bytes = SET_BYTE(bytes, 7, (dec[ASCII(v[12])] << 6) | (dec[ASCII(v[13])] << 1) | (dec[ASCII(v[14])] >> 4)); bytes = SET_BYTE(bytes, 8, (dec[ASCII(v[14])] << 4) | (dec[ASCII(v[15])] >> 1)); bytes = SET_BYTE(bytes, 9, (dec[ASCII(v[15])] << 7) | (dec[ASCII(v[16])] << 2) | (dec[ASCII(v[17])] >> 3)); bytes = SET_BYTE(bytes, 10, (dec[ASCII(v[17])] << 5) | dec[ASCII(v[18])]); bytes = SET_BYTE(bytes, 11, (dec[ASCII(v[19])] << 3) | (dec[ASCII(v[20])] >> 2)); bytes = SET_BYTE(bytes, 12, (dec[ASCII(v[20])] << 6) | (dec[ASCII(v[21])] << 1) | (dec[ASCII(v[22])] >> 4)); bytes = SET_BYTE(bytes, 13, (dec[ASCII(v[22])] << 4) | (dec[ASCII(v[23])] >> 1)); bytes = SET_BYTE(bytes, 14, (dec[ASCII(v[23])] << 7) | (dec[ASCII(v[24])] << 2) | (dec[ASCII(v[25])] >> 3)); bytes = SET_BYTE(bytes, 15, (dec[ASCII(v[25])] << 5) | dec[ASCII(v[26])]);
RETURN bytes; END $$ LANGUAGE plpgsql IMMUTABLE;
CREATE OR REPLACE FUNCTION ulid_to_uuid(ulid text) RETURNS uuid AS $$ BEGIN RETURN encode(parse_ulid(ulid), 'hex')::uuid; END $$ LANGUAGE plpgsql IMMUTABLE; ```
UUID to ULID
```sql CREATE OR REPLACE FUNCTION uuid_to_ulid(id uuid) RETURNS text AS $$ DECLARE encoding bytea = '0123456789ABCDEFGHJKMNPQRSTVWXYZ'; output text = ''; uuid_bytes bytea = uuid_send(id); BEGIN
-- Encode the timestamp output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 0) & 224) >> 5)); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 0) & 31))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 1) & 248) >> 3)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 1) & 7) << 2) | ((GET_BYTE(uuid_bytes, 2) & 192) >> 6))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 2) & 62) >> 1)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 2) & 1) << 4) | ((GET_BYTE(uuid_bytes, 3) & 240) >> 4))); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 3) & 15) << 1) | ((GET_BYTE(uuid_bytes, 4) & 128) >> 7))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 4) & 124) >> 2)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 4) & 3) << 3) | ((GET_BYTE(uuid_bytes, 5) & 224) >> 5))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 5) & 31)));
-- Encode the entropy output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 6) & 248) >> 3)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 6) & 7) << 2) | ((GET_BYTE(uuid_bytes, 7) & 192) >> 6))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 7) & 62) >> 1)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 7) & 1) << 4) | ((GET_BYTE(uuid_bytes, 8) & 240) >> 4))); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 8) & 15) << 1) | ((GET_BYTE(uuid_bytes, 9) & 128) >> 7))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 9) & 124) >> 2)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 9) & 3) << 3) | ((GET_BYTE(uuid_bytes, 10) & 224) >> 5))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 10) & 31))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 11) & 248) >> 3)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 11) & 7) << 2) | ((GET_BYTE(uuid_bytes, 12) & 192) >> 6))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 12) & 62) >> 1)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 12) & 1) << 4) | ((GET_BYTE(uuid_bytes, 13) & 240) >> 4))); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 13) & 15) << 1) | ((GET_BYTE(uuid_bytes, 14) & 128) >> 7))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 14) & 124) >> 2)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 14) & 3) << 3) | ((GET_BYTE(uuid_bytes, 15) & 224) >> 5))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 15) & 31)));
RETURN output; END $$ LANGUAGE plpgsql IMMUTABLE; ```
Gera 11 Digitos aleatĂłrios: YBKXG0CKTH4
```sql -- Cria a extensĂŁo pgcrypto para gerar uuid CREATE EXTENSION IF NOT EXISTS pgcrypto;
-- Cria a função para gerar ULID CREATE OR REPLACE FUNCTION gen_lrandom() RETURNS TEXT AS $$ DECLARE ts_millis BIGINT; ts_chars TEXT; random_bytes BYTEA; random_chars TEXT; base32_chars TEXT := '0123456789ABCDEFGHJKMNPQRSTVWXYZ'; i INT; BEGIN -- Pega o timestamp em milissegundos ts_millis := FLOOR(EXTRACT(EPOCH FROM clock_timestamp()) * 1000)::BIGINT;
-- Converte o timestamp para base32 ts_chars := ''; FOR i IN REVERSE 0..11 LOOP ts_chars := ts_chars || substr(base32_chars, ((ts_millis >> (5 * i)) & 31) + 1, 1); END LOOP; -- Gera 10 bytes aleatĂłrios e converte para base32 random_bytes := gen_random_bytes(10); random_chars := ''; FOR i IN 0..9 LOOP random_chars := random_chars || substr(base32_chars, ((get_byte(random_bytes, i) >> 3) & 31) + 1, 1); IF i < 9 THEN random_chars := random_chars || substr(base32_chars, (((get_byte(random_bytes, i) & 7) << 2) | (get_byte(random_bytes, i + 1) >> 6)) & 31 + 1, 1); ELSE random_chars := random_chars || substr(base32_chars, ((get_byte(random_bytes, i) & 7) << 2) + 1, 1); END IF; END LOOP; -- Concatena o timestamp e os caracteres aleatĂłrios RETURN ts_chars || random_chars;
END; $$ LANGUAGE plpgsql; ```
Exemplo de USO
```sql -- Criação da extensão caso não exista CREATE EXTENSION IF NOT EXISTS pgcrypto; -- Criação da tabela pessoas CREATE TABLE pessoas ( ID UUID DEFAULT gen_random_uuid ( ) PRIMARY KEY, nome TEXT NOT NULL );
-- Busca Pessoa na tabela SELECT * FROM "pessoas" WHERE uuid_to_ulid ( ID ) = '252FAC9F3V8EF80SSDK8PXW02F'; ```
Fontes
- https://github.com/scoville/pgsql-ulid
- https://github.com/geckoboard/pgulid
-
@ 91bea5cd:1df4451c
2025-02-04 17:15:57Definição de ULID:
Timestamp 48 bits, Aleatoriedade 80 bits Sendo Timestamp 48 bits inteiro, tempo UNIX em milissegundos, NĂŁo ficarĂĄ sem espaço atĂŠ o ano 10889 d.C. e Aleatoriedade 80 bits, Fonte criptograficamente segura de aleatoriedade, se possĂvel.
Gerar ULID
```sql
CREATE EXTENSION IF NOT EXISTS pgcrypto;
CREATE FUNCTION generate_ulid() RETURNS TEXT AS $$ DECLARE -- Crockford's Base32 encoding BYTEA = '0123456789ABCDEFGHJKMNPQRSTVWXYZ'; timestamp BYTEA = E'\000\000\000\000\000\000'; output TEXT = '';
unix_time BIGINT; ulid BYTEA; BEGIN -- 6 timestamp bytes unix_time = (EXTRACT(EPOCH FROM CLOCK_TIMESTAMP()) * 1000)::BIGINT; timestamp = SET_BYTE(timestamp, 0, (unix_time >> 40)::BIT(8)::INTEGER); timestamp = SET_BYTE(timestamp, 1, (unix_time >> 32)::BIT(8)::INTEGER); timestamp = SET_BYTE(timestamp, 2, (unix_time >> 24)::BIT(8)::INTEGER); timestamp = SET_BYTE(timestamp, 3, (unix_time >> 16)::BIT(8)::INTEGER); timestamp = SET_BYTE(timestamp, 4, (unix_time >> 8)::BIT(8)::INTEGER); timestamp = SET_BYTE(timestamp, 5, unix_time::BIT(8)::INTEGER);
-- 10 entropy bytes ulid = timestamp || gen_random_bytes(10);
-- Encode the timestamp output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 0) & 224) >> 5)); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 0) & 31))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 1) & 248) >> 3)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 1) & 7) << 2) | ((GET_BYTE(ulid, 2) & 192) >> 6))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 2) & 62) >> 1)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 2) & 1) << 4) | ((GET_BYTE(ulid, 3) & 240) >> 4))); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 3) & 15) << 1) | ((GET_BYTE(ulid, 4) & 128) >> 7))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 4) & 124) >> 2)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 4) & 3) << 3) | ((GET_BYTE(ulid, 5) & 224) >> 5))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 5) & 31)));
-- Encode the entropy output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 6) & 248) >> 3)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 6) & 7) << 2) | ((GET_BYTE(ulid, 7) & 192) >> 6))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 7) & 62) >> 1)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 7) & 1) << 4) | ((GET_BYTE(ulid, 8) & 240) >> 4))); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 8) & 15) << 1) | ((GET_BYTE(ulid, 9) & 128) >> 7))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 9) & 124) >> 2)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 9) & 3) << 3) | ((GET_BYTE(ulid, 10) & 224) >> 5))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 10) & 31))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 11) & 248) >> 3)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 11) & 7) << 2) | ((GET_BYTE(ulid, 12) & 192) >> 6))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 12) & 62) >> 1)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 12) & 1) << 4) | ((GET_BYTE(ulid, 13) & 240) >> 4))); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 13) & 15) << 1) | ((GET_BYTE(ulid, 14) & 128) >> 7))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 14) & 124) >> 2)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 14) & 3) << 3) | ((GET_BYTE(ulid, 15) & 224) >> 5))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 15) & 31)));
RETURN output; END $$ LANGUAGE plpgsql VOLATILE; ```
ULID TO UUID
```sql CREATE OR REPLACE FUNCTION parse_ulid(ulid text) RETURNS bytea AS $$ DECLARE -- 16byte bytes bytea = E'\x00000000 00000000 00000000 00000000'; v char[]; -- Allow for O(1) lookup of index values dec integer[] = ARRAY[ 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 255, 255, 255, 255, 255, 255, 255, 10, 11, 12, 13, 14, 15, 16, 17, 1, 18, 19, 1, 20, 21, 0, 22, 23, 24, 25, 26, 255, 27, 28, 29, 30, 31, 255, 255, 255, 255, 255, 255, 10, 11, 12, 13, 14, 15, 16, 17, 1, 18, 19, 1, 20, 21, 0, 22, 23, 24, 25, 26, 255, 27, 28, 29, 30, 31 ]; BEGIN IF NOT ulid ~* '^[0-7][0-9ABCDEFGHJKMNPQRSTVWXYZ]{25}$' THEN RAISE EXCEPTION 'Invalid ULID: %', ulid; END IF;
v = regexp_split_to_array(ulid, '');
-- 6 bytes timestamp (48 bits) bytes = SET_BYTE(bytes, 0, (dec[ASCII(v[1])] << 5) | dec[ASCII(v[2])]); bytes = SET_BYTE(bytes, 1, (dec[ASCII(v[3])] << 3) | (dec[ASCII(v[4])] >> 2)); bytes = SET_BYTE(bytes, 2, (dec[ASCII(v[4])] << 6) | (dec[ASCII(v[5])] << 1) | (dec[ASCII(v[6])] >> 4)); bytes = SET_BYTE(bytes, 3, (dec[ASCII(v[6])] << 4) | (dec[ASCII(v[7])] >> 1)); bytes = SET_BYTE(bytes, 4, (dec[ASCII(v[7])] << 7) | (dec[ASCII(v[8])] << 2) | (dec[ASCII(v[9])] >> 3)); bytes = SET_BYTE(bytes, 5, (dec[ASCII(v[9])] << 5) | dec[ASCII(v[10])]);
-- 10 bytes of entropy (80 bits); bytes = SET_BYTE(bytes, 6, (dec[ASCII(v[11])] << 3) | (dec[ASCII(v[12])] >> 2)); bytes = SET_BYTE(bytes, 7, (dec[ASCII(v[12])] << 6) | (dec[ASCII(v[13])] << 1) | (dec[ASCII(v[14])] >> 4)); bytes = SET_BYTE(bytes, 8, (dec[ASCII(v[14])] << 4) | (dec[ASCII(v[15])] >> 1)); bytes = SET_BYTE(bytes, 9, (dec[ASCII(v[15])] << 7) | (dec[ASCII(v[16])] << 2) | (dec[ASCII(v[17])] >> 3)); bytes = SET_BYTE(bytes, 10, (dec[ASCII(v[17])] << 5) | dec[ASCII(v[18])]); bytes = SET_BYTE(bytes, 11, (dec[ASCII(v[19])] << 3) | (dec[ASCII(v[20])] >> 2)); bytes = SET_BYTE(bytes, 12, (dec[ASCII(v[20])] << 6) | (dec[ASCII(v[21])] << 1) | (dec[ASCII(v[22])] >> 4)); bytes = SET_BYTE(bytes, 13, (dec[ASCII(v[22])] << 4) | (dec[ASCII(v[23])] >> 1)); bytes = SET_BYTE(bytes, 14, (dec[ASCII(v[23])] << 7) | (dec[ASCII(v[24])] << 2) | (dec[ASCII(v[25])] >> 3)); bytes = SET_BYTE(bytes, 15, (dec[ASCII(v[25])] << 5) | dec[ASCII(v[26])]);
RETURN bytes; END $$ LANGUAGE plpgsql IMMUTABLE;
CREATE OR REPLACE FUNCTION ulid_to_uuid(ulid text) RETURNS uuid AS $$ BEGIN RETURN encode(parse_ulid(ulid), 'hex')::uuid; END $$ LANGUAGE plpgsql IMMUTABLE; ```
UUID to ULID
```sql CREATE OR REPLACE FUNCTION uuid_to_ulid(id uuid) RETURNS text AS $$ DECLARE encoding bytea = '0123456789ABCDEFGHJKMNPQRSTVWXYZ'; output text = ''; uuid_bytes bytea = uuid_send(id); BEGIN
-- Encode the timestamp output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 0) & 224) >> 5)); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 0) & 31))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 1) & 248) >> 3)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 1) & 7) << 2) | ((GET_BYTE(uuid_bytes, 2) & 192) >> 6))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 2) & 62) >> 1)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 2) & 1) << 4) | ((GET_BYTE(uuid_bytes, 3) & 240) >> 4))); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 3) & 15) << 1) | ((GET_BYTE(uuid_bytes, 4) & 128) >> 7))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 4) & 124) >> 2)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 4) & 3) << 3) | ((GET_BYTE(uuid_bytes, 5) & 224) >> 5))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 5) & 31)));
-- Encode the entropy output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 6) & 248) >> 3)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 6) & 7) << 2) | ((GET_BYTE(uuid_bytes, 7) & 192) >> 6))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 7) & 62) >> 1)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 7) & 1) << 4) | ((GET_BYTE(uuid_bytes, 8) & 240) >> 4))); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 8) & 15) << 1) | ((GET_BYTE(uuid_bytes, 9) & 128) >> 7))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 9) & 124) >> 2)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 9) & 3) << 3) | ((GET_BYTE(uuid_bytes, 10) & 224) >> 5))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 10) & 31))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 11) & 248) >> 3)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 11) & 7) << 2) | ((GET_BYTE(uuid_bytes, 12) & 192) >> 6))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 12) & 62) >> 1)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 12) & 1) << 4) | ((GET_BYTE(uuid_bytes, 13) & 240) >> 4))); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 13) & 15) << 1) | ((GET_BYTE(uuid_bytes, 14) & 128) >> 7))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 14) & 124) >> 2)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 14) & 3) << 3) | ((GET_BYTE(uuid_bytes, 15) & 224) >> 5))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 15) & 31)));
RETURN output; END $$ LANGUAGE plpgsql IMMUTABLE; ```
Gera 11 Digitos aleatĂłrios: YBKXG0CKTH4
```sql -- Cria a extensĂŁo pgcrypto para gerar uuid CREATE EXTENSION IF NOT EXISTS pgcrypto;
-- Cria a função para gerar ULID CREATE OR REPLACE FUNCTION gen_lrandom() RETURNS TEXT AS $$ DECLARE ts_millis BIGINT; ts_chars TEXT; random_bytes BYTEA; random_chars TEXT; base32_chars TEXT := '0123456789ABCDEFGHJKMNPQRSTVWXYZ'; i INT; BEGIN -- Pega o timestamp em milissegundos ts_millis := FLOOR(EXTRACT(EPOCH FROM clock_timestamp()) * 1000)::BIGINT;
-- Converte o timestamp para base32 ts_chars := ''; FOR i IN REVERSE 0..11 LOOP ts_chars := ts_chars || substr(base32_chars, ((ts_millis >> (5 * i)) & 31) + 1, 1); END LOOP; -- Gera 10 bytes aleatĂłrios e converte para base32 random_bytes := gen_random_bytes(10); random_chars := ''; FOR i IN 0..9 LOOP random_chars := random_chars || substr(base32_chars, ((get_byte(random_bytes, i) >> 3) & 31) + 1, 1); IF i < 9 THEN random_chars := random_chars || substr(base32_chars, (((get_byte(random_bytes, i) & 7) << 2) | (get_byte(random_bytes, i + 1) >> 6)) & 31 + 1, 1); ELSE random_chars := random_chars || substr(base32_chars, ((get_byte(random_bytes, i) & 7) << 2) + 1, 1); END IF; END LOOP; -- Concatena o timestamp e os caracteres aleatĂłrios RETURN ts_chars || random_chars;
END; $$ LANGUAGE plpgsql; ```
Exemplo de USO
```sql -- Criação da extensão caso não exista CREATE EXTENSION IF NOT EXISTS pgcrypto; -- Criação da tabela pessoas CREATE TABLE pessoas ( ID UUID DEFAULT gen_random_uuid ( ) PRIMARY KEY, nome TEXT NOT NULL );
-- Busca Pessoa na tabela SELECT * FROM "pessoas" WHERE uuid_to_ulid ( ID ) = '252FAC9F3V8EF80SSDK8PXW02F'; ```
Fontes
- https://github.com/scoville/pgsql-ulid
- https://github.com/geckoboard/pgulid
-
@ 33baa074:3bb3a297
2025-05-28 08:10:17The control of residual chlorine in swimming pools is an important part of water quality management, which aims to ensure the sanitation and safety of swimming pool water while avoiding discomfort to swimmers. Here are some key points about residual chlorine control in swimming pools:
Standards for residual chlorine According to the regulations of the national health supervision department, the residual chlorine in swimming pool water should be kept between 0.3mg/L-1.5mg/L. This range can not only ensure effective disinfection, but also avoid irritation to swimmers' skin and eyes caused by excessive residual chlorine. Too low residual chlorine will lead to incomplete disinfection and increase the risk of bacterial growth; while too high residual chlorine may cause human discomfort and even poisoning.
The role of residual chlorine Residual chlorine is a residual disinfectant in swimming pool water, usually in the form of sodium hypocrite (NaClO). It has strong oxidizing properties and can effectively kill bacteria, viruses and other microorganisms in water, thereby ensuring the health of swimmers. In addition, residual chlorine can eliminate harmful substances such as organic matter and ammonia in water to keep the water clean.
Residual chlorine detection method The method of detecting residual chlorine in swimming pools usually uses test strips or test kits for qualitative or quantitative detection. In addition, online monitoring instruments can be used to monitor the residual chlorine in the swimming pool in real time. These methods can help managers promptly detect and deal with situations where the residual chlorine content is too high or too low, ensuring that the water quality of the swimming pool meets the standards.
Methods for controlling residual chlorine Reasonable addition of disinfectants: According to the water quality of the swimming pool and the number of swimmers, reasonable addition of disinfectants to control the residual chlorine content within the specified range.
Regular testing: Regularly test the residual chlorine in the swimming pool to promptly detect and deal with situations where the residual chlorine content is too high or too low.
Maintain swimming pool equipment: Regularly check and maintain swimming pool equipment to ensure the water treatment effect and circulation filtration are normal, and reduce residual disinfectants and other harmful substances in the water.
Do a good job in swimmer hygiene management: Strengthen swimmer hygiene management, require swimmers to shower and rinse their feet before entering the pool, and reduce pollution sources entering the swimming pool.
Solution for excessive residual chlorine If the residual chlorine content in the swimming pool exceeds the standard range, the following measures can be taken:
Use decorating agent: Use decorating agent to quickly restore the excessive residual chlorine in the swimming pool to the normal range (0.3~0.5mg/L). This method is applicable to excessive residual chlorine caused by excessive addition of chlorine disinfectant.
Adjust the water treatment process: According to the water quality, adjust the water treatment process appropriately, such as selecting the appropriate type and dosage of disinfectant, and adjusting operating parameters such as flow rate, pH value, etc., to reduce the generation of residual chlorine.
Strengthen equipment maintenance: Regularly maintain and maintain the water treatment equipment of the swimming pool to ensure its normal operation and disinfection effect.
Through the above methods, the residual chlorine content in the swimming pool can be effectively controlled to ensure water quality safety and protect the health of swimmers.
-
@ e3ba5e1a:5e433365
2025-02-04 08:29:00President Trump has started rolling out his tariffs, something I blogged about in November. People are talking about these tariffs a lot right now, with many people (correctly) commenting on how consumers will end up with higher prices as a result of these tariffs. While that part is true, Iâve seen a lot of people taking it to the next, incorrect step: that consumers will pay the entirety of the tax. I put up a poll on X to see what people thought, and while the right answer got a lot of votes, it wasn't the winner.
For purposes of this blog post, our ultimate question will be the following:
- Suppose apples currently sell for $1 each in the entire United States.
- There are domestic sellers and foreign sellers of apples, all receiving the same price.
- There are no taxes or tariffs on the purchase of apples.
- The question is: if the US federal government puts a $0.50 import tariff per apple, what will be the change in the following:
- Number of apples bought in the US
- Price paid by buyers for apples in the US
- Post-tax price received by domestic apple producers
- Post-tax price received by foreign apple producers
Before we can answer that question, we need to ask an easier, first question: before instituting the tariff, why do apples cost $1?
And finally, before we dive into the details, let me provide you with the answers to the ultimate question. I recommend you try to guess these answers before reading this, and if you get it wrong, try to understand why:
- The number of apples bought will go down
- The buyers will pay more for each apple they buy, but not the full amount of the tariff
- Domestic apple sellers will receive a higher price per apple
- Foreign apple sellers will receive a lower price per apple, but not lowered by the full amount of the tariff
In other words, regardless of who sends the payment to the government, both taxed parties (domestic buyers and foreign sellers) will absorb some of the costs of the tariff, while domestic sellers will benefit from the protectionism provided by tariffs and be able to sell at a higher price per unit.
Marginal benefit
All of the numbers discussed below are part of a helper Google Sheet I put together for this analysis. Also, apologies about the jagged lines in the charts below, I hadnât realized before starting on this that there are some difficulties with creating supply and demand charts in Google Sheets.
Letâs say I absolutely love apples, theyâre my favorite food. How much would I be willing to pay for a single apple? You might say â$1, thatâs the price in the supermarket,â and in many ways youâd be right. If I walk into supermarket A, see apples on sale for $50, and know that I can buy them at supermarket B for $1, Iâll almost certainly leave A and go buy at B.
But thatâs not what I mean. What I mean is: how high would the price of apples have to go everywhere so that Iâd no longer be willing to buy a single apple? This is a purely personal, subjective opinion. Itâs impacted by how much money I have available, other expenses I need to cover, and how much I like apples. But letâs say the number is $5.
How much would I be willing to pay for another apple? Maybe another $5. But how much am I willing to pay for the 1,000th apple? 10,000th? At some point, Iâll get sick of apples, or run out of space to keep the apples, or not be able to eat, cook, and otherwise preserve all those apples before they rot.
The point being: Iâll be progressively willing to spend less and less money for each apple. This form of analysis is called marginal benefit: how much benefit (expressed as dollars Iâm willing to spend) will I receive from each apple? This is a downward sloping function: for each additional apple I buy (quantity demanded), the price Iâm willing to pay goes down. This is what gives my personal demand curve. And if we aggregate demand curves across all market participants (meaning: everyone interested in buying apples), we end up with something like this:
Assuming no changes in peopleâs behavior and other conditions in the market, this chart tells us how many apples will be purchased by our buyers at each price point between $0.50 and $5. And ceteris paribus (all else being equal), this will continue to be the demand curve for apples.
Marginal cost
Demand is half the story of economics. The other half is supply, or: how many apples will I sell at each price point? Supply curves are upward sloping: the higher the price, the more a person or company is willing and able to sell a product.
Letâs understand why. Suppose I have an apple orchard. Itâs a large property right next to my house. With about 2 minutes of effort, I can walk out of my house, find the nearest tree, pick 5 apples off the tree, and call it a day. 5 apples for 2 minutes of effort is pretty good, right?
Yes, there was all the effort necessary to buy the land, and plant the trees, and water them⌠and a bunch more than I likely canât even guess at. Weâre going to ignore all of that for our analysis, because for short-term supply-and-demand movement, we can ignore these kinds of sunk costs. One other simplification: in reality, supply curves often start descending before ascending. This accounts for achieving efficiencies of scale after the first number of units purchased. But since both these topics are unneeded for understanding taxes, I wonât go any further.
Anyway, back to my apple orchard. If someone offers me $0.50 per apple, I can do 2 minutes of effort and get $2.50 in revenue, which equates to a $75/hour wage for me. Iâm more than happy to pick apples at that price!
However, letâs say someone comes to buy 10,000 apples from me instead. I no longer just walk out to my nearest tree. Iâm going to need to get in my truck, drive around, spend the day in the sun, pay for gas, take a day off of my day job (letâs say it pays me $70/hour). The costs go up significantly. Letâs say it takes 5 days to harvest all those apples myself, it costs me $100 in fuel and other expenses, and I lose out on my $70/hour job for 5 days. We end up with:
- Total expenditure: $100 + $70 * 8 hours a day * 5 days \== $2900
- Total revenue: $5000 (10,000 apples at $0.50 each)
- Total profit: $2100
So Iâm still willing to sell the apples at this price, but itâs not as attractive as before. And as the number of apples purchased goes up, my costs keep increasing. Iâll need to spend more money on fuel to travel more of my property. At some point I wonât be able to do the work myself anymore, so Iâll need to pay others to work on the farm, and theyâll be slower at picking apples than me (less familiar with the property, less direct motivation, etc.). The point being: at some point, the number of apples can go high enough that the $0.50 price point no longer makes me any money.
This kind of analysis is called marginal cost. It refers to the additional amount of expenditure a seller has to spend in order to produce each additional unit of the good. Marginal costs go up as quantity sold goes up. And like demand curves, if you aggregate this data across all sellers, you get a supply curve like this:
Equilibrium price
We now know, for every price point, how many apples buyers will purchase, and how many apples sellers will sell. Now we find the equilibrium: where the supply and demand curves meet. This point represents where the marginal benefit a buyer would receive from the next buyer would be less than the cost it would take the next seller to make it. Letâs see it in a chart:
Youâll notice that these two graphs cross at the $1 price point, where 63 apples are both demanded (bought by consumers) and supplied (sold by producers). This is our equilibrium price. We also have a visualization of the surplus created by these trades. Everything to the left of the equilibrium point and between the supply and demand curves represents surplus: an area where someone is receiving something of more value than they give. For example:
- When I bought my first apple for $1, but I was willing to spend $5, I made $4 of consumer surplus. The consumer portion of the surplus is everything to the left of the equilibrium point, between the supply and demand curves, and above the equilibrium price point.
- When a seller sells his first apple for $1, but it only cost $0.50 to produce it, the seller made $0.50 of producer surplus. The producer portion of the surplus is everything to the left of the equilibrium point, between the supply and demand curves, and below the equilibrium price point.
Another way of thinking of surplus is âevery time someone got a better price than they would have been willing to take.â
OK, with this in place, we now have enough information to figure out how to price in the tariff, which weâll treat as a negative externality.
Modeling taxes
Alright, the government has now instituted a $0.50 tariff on every apple sold within the US by a foreign producer. We can generally model taxes by either increasing the marginal cost of each unit sold (shifting the supply curve up), or by decreasing the marginal benefit of each unit bought (shifting the demand curve down). In this case, since only some of the producers will pay the tax, it makes more sense to modify the supply curve.
First, letâs see what happens to the foreign seller-only supply curve when you add in the tariff:
With the tariff in place, for each quantity level, the price at which the seller will sell is $0.50 higher than before the tariff. That makes sense: if I was previously willing to sell my 82nd apple for $3, I would now need to charge $3.50 for that apple to cover the cost of the tariff. We see this as the tariff âpushing upâ or âpushing leftâ the original supply curve.
We can add this new supply curve to our existing (unchanged) supply curve for domestic-only sellers, and we end up with a result like this:
The total supply curve adds up the individual foreign and domestic supply curves. At each price point, we add up the total quantity each group would be willing to sell to determine the total quantity supplied for each price point. Once we have that cumulative supply curve defined, we can produce an updated supply-and-demand chart including the tariff:
As we can see, the equilibrium has shifted:
- The equilibrium price paid by consumers has risen from $1 to $1.20.
- The total number of apples purchased has dropped from 63 apples to 60 apples.
- Consumers therefore received 3 less apples. They spent $72 for these 60 apples, whereas previously they spent $63 for 3 more apples, a definite decrease in consumer surplus.
- Foreign producers sold 36 of those apples (see the raw data in the linked Google Sheet), for a gross revenue of $43.20. However, they also need to pay the tariff to the US government, which accounts for $18, meaning they only receive $25.20 post-tariff. Previously, they sold 42 apples at $1 each with no tariff to be paid, meaning they took home $42.
- Domestic producers sold the remaining 24 apples at $1.20, giving them a revenue of $28.80. Since they donât pay the tariff, they take home all of that money. By contrast, previously, they sold 21 apples at $1, for a take-home of $21.
- The government receives $0.50 for each of the 60 apples sold, or in other words receives $30 in revenue it wouldnât have received otherwise.
We could be more specific about the surpluses, and calculate the actual areas for consumer surplus, producer surplus, inefficiency from the tariff, and government revenue from the tariff. But I wonât bother, as those calculations get slightly more involved. Instead, letâs just look at the aggregate outcomes:
- Consumers were unquestionably hurt. Their price paid went up by $0.20 per apple, and received less apples.
- Foreign producers were also hurt. Their price received went down from the original $1 to the new post-tariff price of $1.20, minus the $0.50 tariff. In other words: foreign producers only receive $0.70 per apple now. This hurt can be mitigated by shifting sales to other countries without a tariff, but the pain will exist regardless.
- Domestic producers scored. They can sell less apples and make more revenue doing it.
- And the government walked away with an extra $30.
Hopefully you now see the answer to the original questions. Importantly, while the government imposed a $0.50 tariff, neither side fully absorbed that cost. Consumers paid a bit more, foreign producers received a bit less. The exact details of how that tariff was split across the groups is mediated by the relevant supply and demand curves of each group. If you want to learn more about this, the relevant search term is âprice elasticity,â or how much a groupâs quantity supplied or demanded will change based on changes in the price.
Other taxes
Most taxes are some kind of a tax on trade. Tariffs on apples is an obvious one. But the same applies to income tax (taxing the worker for the trade of labor for money) or payroll tax (same thing, just taxing the employer instead). Interestingly, you can use the same model for analyzing things like tax incentives. For example, if the government decided to subsidize domestic apple production by giving the domestic producers a $0.50 bonus for each apple they sell, we would end up with a similar kind of analysis, except instead of the foreign supply curve shifting up, weâd see the domestic supply curve shifting down.
And generally speaking, this is what youâll always see with government involvement in the economy. It will result in disrupting an existing equilibrium, letting the market readjust to a new equilibrium, and incentivization of some behavior, causing some people to benefit and others to lose out. We saw with the apple tariff, domestic producers and the government benefited while others lost.
You can see the reverse though with tax incentives. If I give a tax incentive of providing a deduction (not paying income tax) for preschool, we would end up with:
- Government needs to make up the difference in tax revenue, either by raising taxes on others or printing more money (leading to inflation). Either way, those paying the tax or those holding government debased currency will pay a price.
- Those people who donât use the preschool deduction will receive no benefit, so they simply pay a cost.
- Those who do use the preschool deduction will end up paying less on tax+preschool than they would have otherwise.
This analysis is fully amoral. Itâs not saying whether providing subsidized preschool is a good thing or not, it simply tells you where the costs will be felt, and points out that such government interference in free economic choice does result in inefficiencies in the system. Once you have that knowledge, youâre more well educated on making a decision about whether the costs of government intervention are worth the benefits.
-
@ da0b9bc3:4e30a4a9
2025-05-28 08:07:30Hello Stackers!
Welcome on into the ~Music Corner of the Saloon!
A place where we Talk Music. Share Tracks. Zap Sats.
So stay a while and listen.
đ¨Don't forget to check out the pinned items in the territory homepage! You can always find the latest weeklies there!đ¨
đ¨Subscribe to the territory to ensure you never miss a post! đ¨
https://stacker.news/items/991020
-
@ 97c70a44:ad98e322
2025-01-30 17:15:37There was a slight dust up recently over a website someone runs removing a listing for an app someone built based on entirely arbitrary criteria. I'm not to going to attempt to speak for either wounded party, but I would like to share my own personal definition for what constitutes a "nostr app" in an effort to help clarify what might be an otherwise confusing and opaque purity test.
In this post, I will be committing the "no true Scotsman" fallacy, in which I start with the most liberal definition I can come up with, and gradually refine it until all that is left is the purest, gleamingest, most imaginary and unattainable nostr app imaginable. As I write this, I wonder if anything built yet will actually qualify. In any case, here we go.
It uses nostr
The lowest bar for what a "nostr app" might be is an app ("application" - i.e. software, not necessarily a native app of any kind) that has some nostr-specific code in it, but which doesn't take any advantage of what makes nostr distinctive as a protocol.
Examples might include a scraper of some kind which fulfills its charter by fetching data from relays (regardless of whether it validates or retains signatures). Another might be a regular web 2.0 app which provides an option to "log in with nostr" by requesting and storing the user's public key.
In either case, the fact that nostr is involved is entirely neutral. A scraper can scrape html, pdfs, jsonl, whatever data source - nostr relays are just another target. Likewise, a user's key in this scenario is treated merely as an opaque identifier, with no appreciation for the super powers it brings along.
In most cases, this kind of app only exists as a marketing ploy, or less cynically, because it wants to get in on the hype of being a "nostr app", without the developer quite understanding what that means, or having the budget to execute properly on the claim.
It leverages nostr
Some of you might be wondering, "isn't 'leverage' a synonym for 'use'?" And you would be right, but for one connotative difference. It's possible to "use" something improperly, but by definition leverage gives you a mechanical advantage that you wouldn't otherwise have. This is the second category of "nostr app".
This kind of app gets some benefit out of the nostr protocol and network, but in an entirely selfish fashion. The intention of this kind of app is not to augment the nostr network, but to augment its own UX by borrowing some nifty thing from the protocol without really contributing anything back.
Some examples might include:
- Using nostr signers to encrypt or sign data, and then store that data on a proprietary server.
- Using nostr relays as a kind of low-code backend, but using proprietary event payloads.
- Using nostr event kinds to represent data (why), but not leveraging the trustlessness that buys you.
An application in this category might even communicate to its users via nostr DMs - but this doesn't make it a "nostr app" any more than a website that emails you hot deals on herbal supplements is an "email app". These apps are purely parasitic on the nostr ecosystem.
In the long-term, that's not necessarily a bad thing. Email's ubiquity is self-reinforcing. But in the short term, this kind of "nostr app" can actually do damage to nostr's reputation by over-promising and under-delivering.
It complements nostr
Next up, we have apps that get some benefit out of nostr as above, but give back by providing a unique value proposition to nostr users as nostr users. This is a bit of a fine distinction, but for me this category is for apps which focus on solving problems that nostr isn't good at solving, leaving the nostr integration in a secondary or supporting role.
One example of this kind of app was Mutiny (RIP), which not only allowed users to sign in with nostr, but also pulled those users' social graphs so that users could send money to people they knew and trusted. Mutiny was doing a great job of leveraging nostr, as well as providing value to users with nostr identities - but it was still primarily a bitcoin wallet, not a "nostr app" in the purest sense.
Other examples are things like Nostr Nests and Zap.stream, whose core value proposition is streaming video or audio content. Both make great use of nostr identities, data formats, and relays, but they're primarily streaming apps. A good litmus test for things like this is: if you got rid of nostr, would it be the same product (even if inferior in certain ways)?
A similar category is infrastructure providers that benefit nostr by their existence (and may in fact be targeted explicitly at nostr users), but do things in a centralized, old-web way; for example: media hosts, DNS registrars, hosting providers, and CDNs.
To be clear here, I'm not casting aspersions (I don't even know what those are, or where to buy them). All the apps mentioned above use nostr to great effect, and are a real benefit to nostr users. But they are not True Scotsmen.
It embodies nostr
Ok, here we go. This is the crème de la crème, the top du top, the meilleur du meilleur, the bee's knees. The purest, holiest, most chaste category of nostr app out there. The apps which are, indeed, nostr indigitate.
This category of nostr app (see, no quotes this time) can be defined by the converse of the previous category. If nostr was removed from this type of application, would it be impossible to create the same product?
To tease this apart a bit, apps that leverage the technical aspects of nostr are dependent on nostr the protocol, while apps that benefit nostr exclusively via network effect are integrated into nostr the network. An app that does both things is working in symbiosis with nostr as a whole.
An app that embraces both nostr's protocol and its network becomes an organic extension of every other nostr app out there, multiplying both its competitive moat and its contribution to the ecosystem:
- In contrast to apps that only borrow from nostr on the technical level but continue to operate in their own silos, an application integrated into the nostr network comes pre-packaged with existing users, and is able to provide more value to those users because of other nostr products. On nostr, it's a good thing to advertise your competitors.
- In contrast to apps that only market themselves to nostr users without building out a deep integration on the protocol level, a deeply integrated app becomes an asset to every other nostr app by becoming an organic extension of them through interoperability. This results in increased traffic to the app as other developers and users refer people to it instead of solving their problem on their own. This is the "micro-apps" utopia we've all been waiting for.
Credible exit doesn't matter if there aren't alternative services. Interoperability is pointless if other applications don't offer something your app doesn't. Marketing to nostr users doesn't matter if you don't augment their agency as nostr users.
If I had to choose a single NIP that represents the mindset behind this kind of app, it would be NIP 89 A.K.A. "Recommended Application Handlers", which states:
Nostr's discoverability and transparent event interaction is one of its most interesting/novel mechanics. This NIP provides a simple way for clients to discover applications that handle events of a specific kind to ensure smooth cross-client and cross-kind interactions.
These handlers are the glue that holds nostr apps together. A single event, signed by the developer of an application (or by the application's own account) tells anyone who wants to know 1. what event kinds the app supports, 2. how to link to the app (if it's a client), and (if the pubkey also publishes a kind 10002), 3. which relays the app prefers.
As a sidenote, NIP 89 is currently focused more on clients, leaving DVMs, relays, signers, etc somewhat out in the cold. Updating 89 to include tailored listings for each kind of supporting app would be a huge improvement to the protocol. This, plus a good front end for navigating these listings (sorry nostrapp.link, close but no cigar) would obviate the evil centralized websites that curate apps based on arbitrary criteria.
Examples of this kind of app obviously include many kind 1 clients, as well as clients that attempt to bring the benefits of the nostr protocol and network to new use cases - whether long form content, video, image posts, music, emojis, recipes, project management, or any other "content type".
To drill down into one example, let's think for a moment about forms. What's so great about a forms app that is built on nostr? Well,
- There is a spec for forms and responses, which means that...
- Multiple clients can implement the same data format, allowing for credible exit and user choice, even of...
- Other products not focused on forms, which can still view, respond to, or embed forms, and which can send their users via NIP 89 to a client that does...
- Cryptographically sign forms and responses, which means they are self-authenticating and can be sent to...
- Multiple relays, which reduces the amount of trust necessary to be confident results haven't been deliberately "lost".
Show me a forms product that does all of those things, and isn't built on nostr. You can't, because it doesn't exist. Meanwhile, there are plenty of image hosts with APIs, streaming services, and bitcoin wallets which have basically the same levels of censorship resistance, interoperability, and network effect as if they weren't built on nostr.
It supports nostr
Notice I haven't said anything about whether relays, signers, blossom servers, software libraries, DVMs, and the accumulated addenda of the nostr ecosystem are nostr apps. Well, they are (usually).
This is the category of nostr app that gets none of the credit for doing all of the work. There's no question that they qualify as beautiful nostrcorns, because their value propositions are entirely meaningless outside of the context of nostr. Who needs a signer if you don't have a cryptographic identity you need to protect? DVMs are literally impossible to use without relays. How are you going to find the blossom server that will serve a given hash if you don't know which servers the publishing user has selected to store their content?
In addition to being entirely contextualized by nostr architecture, this type of nostr app is valuable because it does things "the nostr way". By that I mean that they don't simply try to replicate existing internet functionality into a nostr context; instead, they create entirely new ways of putting the basic building blocks of the internet back together.
A great example of this is how Nostr Connect, Nostr Wallet Connect, and DVMs all use relays as brokers, which allows service providers to avoid having to accept incoming network connections. This opens up really interesting possibilities all on its own.
So while I might hesitate to call many of these things "apps", they are certainly "nostr".
Appendix: it smells like a NINO
So, let's say you've created an app, but when you show it to people they politely smile, nod, and call it a NINO (Nostr In Name Only). What's a hacker to do? Well, here's your handy-dandy guide on how to wash that NINO stench off and Become a Nostr.
You app might be a NINO if:
- There's no NIP for your data format (or you're abusing NIP 78, 32, etc by inventing a sub-protocol inside an existing event kind)
- There's a NIP, but no one knows about it because it's in a text file on your hard drive (or buried in your project's repository)
- Your NIP imposes an incompatible/centralized/legacy web paradigm onto nostr
- Your NIP relies on trusted third (or first) parties
- There's only one implementation of your NIP (yours)
- Your core value proposition doesn't depend on relays, events, or nostr identities
- One or more relay urls are hard-coded into the source code
- Your app depends on a specific relay implementation to work (ahem, relay29)
- You don't validate event signatures
- You don't publish events to relays you don't control
- You don't read events from relays you don't control
- You use legacy web services to solve problems, rather than nostr-native solutions
- You use nostr-native solutions, but you've hardcoded their pubkeys or URLs into your app
- You don't use NIP 89 to discover clients and services
- You haven't published a NIP 89 listing for your app
- You don't leverage your users' web of trust for filtering out spam
- You don't respect your users' mute lists
- You try to "own" your users' data
Now let me just re-iterate - it's ok to be a NINO. We need NINOs, because nostr can't (and shouldn't) tackle every problem. You just need to decide whether your app, as a NINO, is actually contributing to the nostr ecosystem, or whether you're just using buzzwords to whitewash a legacy web software product.
If you're in the former camp, great! If you're in the latter, what are you waiting for? Only you can fix your NINO problem. And there are lots of ways to do this, depending on your own unique situation:
- Drop nostr support if it's not doing anyone any good. If you want to build a normal company and make some money, that's perfectly fine.
- Build out your nostr integration - start taking advantage of webs of trust, self-authenticating data, event handlers, etc.
- Work around the problem. Think you need a special relay feature for your app to work? Guess again. Consider encryption, AUTH, DVMs, or better data formats.
- Think your idea is a good one? Talk to other devs or open a PR to the nips repo. No one can adopt your NIP if they don't know about it.
- Keep going. It can sometimes be hard to distinguish a research project from a NINO. New ideas have to be built out before they can be fully appreciated.
- Listen to advice. Nostr developers are friendly and happy to help. If you're not sure why you're getting traction, ask!
I sincerely hope this article is useful for all of you out there in NINO land. Maybe this made you feel better about not passing the totally optional nostr app purity test. Or maybe it gave you some actionable next steps towards making a great NINON (Nostr In Not Only Name) app. In either case, GM and PV.
-
@ 9e69e420:d12360c2
2025-01-30 12:23:04Tech stocks have taken a hit globally after China's DeepSeek launched a competitive AI chatbot at a much lower cost than US counterparts. This has stirred market fears of a $1.2 trillion loss across tech companies when trading opens in New York.
DeepSeekâs chatbot quickly topped download charts and surprised experts with its capabilities, developed for only $5.6 million.
The Nasdaq dropped over 3% in premarket trading, with major firms like Nvidia falling more than 10%. SoftBank also saw losses shortly after investing in a significant US AI venture.
Venture capitalist Marc Andreessen called it âAIâs Sputnik moment,â highlighting its potential impact on the industry.
![] (https://www.telegraph.co.uk/content/dam/business/2025/01/27/TELEMMGLPICT000409807198_17379939060750_trans_NvBQzQNjv4BqgsaO8O78rhmZrDxTlQBjdGLvJF5WfpqnBZShRL_tOZw.jpeg)
-
@ 9e69e420:d12360c2
2025-01-30 12:13:39Salwan Momika, a Christian Iraqi known for burning the Koran in Sweden, was shot dead during a TikTok livestream in an apartment in Sodertalje. The 38-year-old sparked outrage in the Muslim community for his demonstrations, leading to global condemnation. After being rushed to the hospital, he was pronounced dead.
Authorities arrested five individuals in connection with the incident. Momika's death comes days before a court ruling on his possible incitement of ethnic hatred. The incident highlights the tensions surrounding free speech and religious sentiments, intensifying after his controversial protests in 2023.
-
@ 0fa80bd3:ea7325de
2025-01-30 04:28:30"Degeneration" or "ĐŃŃОМдонио" ![[photo_2025-01-29 23.23.15.jpeg]]
A once-functional object, now eroded by time and human intervention, stripped of its original purpose. Layers of presence accumulateâmarks, alterations, traces of intentâuntil the very essence is obscured. Restoration is paradoxical: to reclaim, one must erase. Yet erasure is an impossibility, for to remove these imprints is to deny the existence of those who shaped them.
The work stands as a meditation on entropy, memory, and the irreversible dialogue between creation and decay.
-
@ 33baa074:3bb3a297
2025-05-28 07:50:06Soil moisture is a key factor that affects the structure and function of soil microbial communities. Here are some of the main aspects of how soil moisture affects microorganisms:
Affecting the Growth and Metabolism of Microorganisms Changes in soil moisture content directly affect the growth and metabolic activities of microorganisms. Under suitable moisture conditions, microorganisms are better able to carry out metabolic activities, thereby promoting the decomposition of soil organic matter and the transformation of nutrients. However, under extremely dry or overly wet conditions, the activity of microorganisms will be inhibited, resulting in a decline in soil functions.
Changing the Structure of Microbial Communities Changes in soil moisture conditions can lead to significant changes in the structure of microbial communities. For example, under drought conditions, the number of drought-tolerant microorganisms may increase to adapt to the water shortage environment. While under wet conditions, aerobic microorganisms may dominate. This change in community structure not only affects the soil's water retention capacity, but also other ecological functions of the soil.
Affecting the Stability of Soil Aggregates Soil aggregates are clumps formed by soil particles through physical, chemical and biological actions, and they have an important impact on the soil's water retention capacity. Soil microorganisms participate in the formation and stability of soil aggregates by secreting substances such as extracellular polymers. Appropriate soil moisture helps maintain the stability of soil aggregates, thereby improving the soil's water retention capacity. However, excessive moisture or drought may lead to the destruction of soil aggregates and reduce the soil's water retention capacity.
Regulating soil moisture dynamics Soil microorganisms can regulate the dynamic balance of soil moisture through their metabolic activities, such as decomposing organic matter and synthesizing exopolysaccharides. For example, some microorganisms can increase the water holding capacity of the soil by secreting exopolysaccharides, while others can release water by decomposing organic matter. These activities help maintain the stability of soil moisture and support plant growth.
Influencing the physical properties of soil Soil moisture can also indirectly affect the living environment of microorganisms by affecting the physical properties of the soil, such as pore structure and texture. Good soil pore structure is conducive to the penetration and storage of water, and also provides a suitable living space for microorganisms. Soil texture is closely related to the stability of aggregates. Sandy soils have poor aggregate stability and weak water retention capacity; while clay soils have good aggregate stability and strong water retention capacity.
In summary, soil moisture has many effects on microorganisms, including affecting the growth and metabolism of microorganisms, changing the structure of microbial communities, affecting the stability of soil aggregates, regulating soil moisture dynamics, and affecting the physical properties of soil. Therefore, maintaining suitable soil moisture conditions is of great significance for protecting the diversity and function of soil microbial communities and improving the water retention capacity of soil.
-
@ 33baa074:3bb3a297
2025-05-28 07:27:02Distilled water has a wide range of applications in the medical field, mainly including the following aspects: Preparation of injection water Distilled water is an indispensable agent in medical institutions, used for the preparation of drugs, injection and washing of instruments, etc. In the medical process, sterile injection water is needed to flush wounds, prepare drugs, etc. The distilled water machine can ensure the purity of water and prevent microorganisms and harmful substances in the water from causing harm to patients.
Surgical wound flushing In breast cancer surgery, warm distilled water is used to flush surgical wounds. This practice helps to clean the wound, remove possible residual tumor cells, and use hypnotic effect to make tumor cells absorb water, swell, rupture, and necrotic, thereby preventing tumors from growing in the wound.
Cleaning and disinfection Distilled water has a certain disinfection and sterilization effect. It can be used to clean the skin, help eliminate bacteria on the skin surface, and is beneficial to the health of the skin. In addition, distilled water can also be used to clean and disinfect medical equipment to ensure the hygiene and safety of the medical environment.
Laboratory use In medical-related laboratories, distilled water is used to prepare experimental solutions, wash utensils and experimental instruments. These applications ensure the accuracy of experimental results while maintaining the sterile environment of the laboratory.
Moisturizing and Beauty Although not directly used in medical applications, distilled water is also used in skin care. It can be used as a basic moisturizer to help improve the symptoms of dry skin. In the field of medical beauty, distilled water is sometimes used for facial compresses to achieve calming, cooling, and swelling effects.
In summary, the application of distilled water in the medical field is multifaceted, from basic injection water preparation to complex surgical assistance to daily skin care, it has played an important role.
-
@ 0fa80bd3:ea7325de
2025-01-29 15:43:42Lyn Alden - йиŃкОКн овангоНиŃŃ Đ¸ĐťĐ¸ овангоНиŃŃка, Ń ĐżĐžĐşĐ° но пОнŃĐť
npub1a2cww4kn9wqte4ry70vyfwqyqvpswksna27rtxd8vty6c74era8sdcw83a
Thomas Pacchia - PubKey owner - X - @tpacchia
npub1xy6exlg37pw84cpyj05c2pdgv86hr25cxn0g7aa8g8a6v97mhduqeuhgpl
calvadev - Shopstr
npub16dhgpql60vmd4mnydjut87vla23a38j689jssaqlqqlzrtqtd0kqex0nkq
Calle - Cashu founder
npub12rv5lskctqxxs2c8rf2zlzc7xx3qpvzs3w4etgemauy9thegr43sf485vg
ĐМок ĐĐžŃŃи
npub1sg6plzptd64u62a878hep2kev88swjh3tw00gjsfl8f237lmu63q0uf63m
21 ideas
npub1lm3f47nzyf0rjp6fsl4qlnkmzed4uj4h2gnf2vhe3l3mrj85vqks6z3c7l
ĐнОгО адŃĐľŃОв. мС ĐşŃĐž надО ŃĐžŃŃиŃОваŃŃ
https://github.com/aitechguy/nostr-address-book
ФиаŃĐĐśĐľŃ - ŃОСдаŃĐľĐťŃ ĐĐžŃŃŃ - https://github.com/fiatjaf
npub180cvv07tjdrrgpa0j7j7tmnyl2yr6yr7l8j4s3evf6u64th6gkwsyjh6w6
EVAN KALOUDIS Zues wallet
npub19kv88vjm7tw6v9qksn2y6h4hdt6e79nh3zjcud36k9n3lmlwsleqwte2qd
ĐŃОгŃĐ°ĐźĐźĐľŃ ĐОди https://github.com/CodyTseng/nostr-relay
npub1syjmjy0dp62dhccq3g97fr87tngvpvzey08llyt6ul58m2zqpzps9wf6wl
Anna Chekhovich - Managing Bitcoin at The Anti-Corruption Foundation https://x.com/AnyaChekhovich
npub1y2st7rp54277hyd2usw6shy3kxprnmpvhkezmldp7vhl7hp920aq9cfyr7
-
@ 0fa80bd3:ea7325de
2025-01-29 14:44:48![[yedinaya-rossiya-bear.png]]
1ď¸âŁ Be where the bear roams. Stay in its territory, where it hunts for food. No point setting a trap in your backyard if the bearâs chilling in the forest.
2ď¸âŁ Set a well-hidden trap. Bury it, disguise it, and place the bait right in the center. Bears are omnivoresâjust like secret police KGB agents. And whatâs the tastiest bait for them? Money.
3ď¸âŁ Wait for the bear to take the bait. When it reaches in, the trap will snap shut around its paw. Itâll be alive, but stuck. No escape.
Now, what you do with a trapped bear is another question... đ
-
@ 005bc4de:ef11e1a2
2025-05-28 16:24:41Two days ago I put this out: https://peakd.com/hive-124838/@crrdlx/hostr-snaps-9i13ooa7ufp
Post: https://peakd.com/hive-124838/@crrdlx/hostr-snaps-9i13ooa7ufp
One of the comments said it "...looks like some sort of game as well." That was enough to tickle my curiosity and get me thinking. The round tomatoes and how they nestled into the grooves of the tiles reminded me of Chinese checkers. The grid brought Hex to mind (the game John Nash played) and I wondered if a square-grid version might be viable. A little searching revealed Hex is a "Connection game" and there are several. The one called Tak seemed really interesting and simple. I like interesting and I really like simple.
So, a square grid connection game wouldn't be new, however, you can't play Tak with tomatoes. Tak requires stacking "stones" or standing them on edge, that would be very, very tricky with tomatoes.
I looked around and happened to have some dried corn kernels and dry beans. I drew out a 5 x 5 grid of dots, lined up five corn kernels on one side in a "home row" and 5 beans on the other. We used to play a game where two sides of Army men met after a series of moves. In that game, we rolled dice to have a "combat" and see who would win the little battle. I wanted something like that in my game, some type of combat or conquest, somehow. So, I started messing around, moving kernels and beans, and totally just set out to make this game up on the fly. This is what I got...
Rules
The objective, like Hex or Tak, is to connect one side (your home row) to your opponent's side. The connection to the other side can be a straight line, or it CAN include a diagonal road. Any of the roads below would be a win for team bean (B).
- One side makes a move by sliding one corn/bean one spot forward.
- Then, take turns making moves.
- Movement can only be one spot forward/back or sideways (NSEW). You cannot move diagonally.
- Opponents CAN occupy, or "squat", on the same spot at once. If so, the spot is being "co-squatted" (they're like two people standing in the same sidewalk tile at the same time).
- However, while opponents occupy the same spot, a "combat" might ensue. A corn/bean can "attack" by moving yet another adjoining corn or bean onto the co-squatted spot. A conquest is made by outnumbering a spot 2-to-1. For instance, if a spot is being occupied by both a bean and corn, and then a second corn moves in, the two corns conquer the one bean. The bean is immediately removed. The bean player then places that conquered bean into any empty spot on his or her home row. That placement constitutes the bean player's turn. So, after the bean is placed on the home row, the corn player makes the next move.
- Play continues until someone completes a road from their home row across to their opponent's home row. (Again, a diagonal road is okay for the win.)
- The losing player got Succotashed.
Game name
As to the name, initially I wanted a tomato-ish name. But, I was using corn and beans. So, I'm naming this game "Succotash" after the corn, bean, and vegetable recipe. I considered calling it the "Texas Caviar Game" because it has tomatoes in it, but playing Succotash just sounds better. Plus, putting tomatoes in succotash sounds yummy.
Simple
A big goal here was to keep it simple. To that end, all that's needed is (a) a paper with a 5 x 5 grid drawn on it, and, (b) 5 pieces of something and 5 pieces of something else. Obviously I used corn kernels and beans, but it could easily be shells/legos, pennies/paperclips, nuts/stones, or whatever.
Initially, I had a "storehouse" of extra corn kernels and storehouse of extra beans (seen in the images). My thinking was that they would replace the corn or beans that get conquered by opponents. Upon playing the game, it was apparent that a storehouse is totally unnecessary. Once captured, the same corn/bean can just be the one that's placed back onto the home row. Five of each is fine.
Also, I'm sure the grid could easily be expanded to whatever size you wish. I played an opponent with the 5 x 5 grid, and that seemed a good size for a five minute or so game.
Why not sit down face-to-face with someone for a minute and give Succotash a try? If you do, I'd love to hear how it went.
-
@ 9e69e420:d12360c2
2025-01-25 22:16:54President Trump plans to withdraw 20,000 U.S. troops from Europe and expects European allies to contribute financially to the remaining military presence. Reported by ANSA, Trump aims to deliver this message to European leaders since taking office. A European diplomat noted, âthe costs cannot be borne solely by American taxpayers.â
The Pentagon hasn't commented yet. Trump has previously sought lower troop levels in Europe and had ordered cuts during his first term. The U.S. currently maintains around 65,000 troops in Europe, with total forces reaching 100,000 since the Ukraine invasion. Trump's new approach may shift military focus to the Pacific amid growing concerns about China.
-
@ 9ca447d2:fbf5a36d
2025-05-28 07:01:16Steak ân Shake recently made headlines by officially accepting bitcoin payments via the Lightning Network across all its U.S. locations. The integration of Bitcoin payments at over 500 locations is a monumental moment for both the fast food industry and the broader retail sector.
This is not just something that Steak ân Shake is testing in a handful of locations, they are doing a full-scale rollout, fully embracing Bitcoin.Â
With more than 100 million customers a year, Steak ân Shakeâs integration of LightningâBitcoinâs fast, low-fee payment layerâmakes it easier than ever to use Bitcoin in day-to-day life. Buying a burger and a shake with sats? Thatâs now a real option.
The process is straightforward. Customers simply scan a Lightning QR code at the register, completing their payment in seconds, while Steak ân Shake receives instant USD conversion, ensuring price stability and ease of use.
So what does this mean for Bitcoin and E-commerce?
For starters, Steak ân Shake becomes the first of eventually many to fully embrace a digital world. As Bitcoin continues to grow, consumers will continue to realize the benefits of saving in a currency that is truly scarce and decentralized.
This is a huge step forward for Bitcoin as it shows it is not just for holding, itâs for spending, too. And by using the Lightning Network, Steak nâ Shake is helping prove that Bitcoin can scale for everyday transactions.Â
This now creates a seamless checkout experience, making bitcoin a viable alternative to credit cards and cash.
More importantly, it signals a significant shift in mainstream attitudes towards Bitcoin. As a well-known brand across America, this move serves as a powerful endorsement, likely to influence other chains and retailers to consider similar integrations.
Related: Spar Supermarket in Switzerland Now Accepts Bitcoin Via Lightning
What can this mean for your business?Â
Accepting bitcoin as payment can open the door to a new demographic of tech-savvy, financially engaged consumers who prefer digital assets.
As we know, companies that adopt Bitcoin receive a fascinating amount of love from the Bitcoin community and I would assume Steak nâ Shake will be receiving the same amount of attention.
From a business perspective, accepting bitcoin has become more than just a payment methodâitâs a marketing tool. It sets your business apart and gets people talking. And in a crowded market, that kind of edge matters.
Steak ân Shakeâs embrace of Bitcoin is likely to accelerate the adoption of digital assets in both physical retail and e-commerce.
As more businesses witness the operational and marketing benefits, industry experts anticipate a ripple effect that will increase interaction between consumers and digital currencies, further regulatory clarity, and bring continued innovation in payment technology.
Steak ân Shakeâs nationwide Bitcoin payments rollout is more than a novelty. Itâs a pivotal development for digital payments, setting a precedent for other retailers and signaling the growing integration of digital assets into everyday commerce.
-
@ 6be5cc06:5259daf0
2025-01-21 20:58:37A seguir, veja como instalar e configurar o Privoxy no Pop!_OS.
1. Instalar o Tor e o Privoxy
Abra o terminal e execute:
bash sudo apt update sudo apt install tor privoxy
Explicação:
- Tor: Roteia o trĂĄfego pela rede Tor.
- Privoxy: Proxy avançado que intermedia a conexão entre aplicativos e o Tor.
2. Configurar o Privoxy
Abra o arquivo de configuração do Privoxy:
bash sudo nano /etc/privoxy/config
Navegue atĂŠ a Ăşltima linha (atalho:
Ctrl
+/
depoisCtrl
+V
para navegar diretamente atĂŠ a Ăşltima linha) e insira:bash forward-socks5 / 127.0.0.1:9050 .
Isso faz com que o Privoxy envie todo o trĂĄfego para o Tor atravĂŠs da porta 9050.
Salve (
CTRL
+O
eEnter
) e feche (CTRL
+X
) o arquivo.
3. Iniciar o Tor e o Privoxy
Agora, inicie e habilite os serviços:
bash sudo systemctl start tor sudo systemctl start privoxy sudo systemctl enable tor sudo systemctl enable privoxy
Explicação:
- start: Inicia os serviços.
- enable: Faz com que iniciem automaticamente ao ligar o PC.
4. Configurar o Navegador Firefox
Para usar a rede Tor com o Firefox:
- Abra o Firefox.
- Acesse Configuraçþes â Configurar conexĂŁo.
- Selecione Configuração manual de proxy.
- Configure assim:
- Proxy HTTP:
127.0.0.1
- Porta:
8118
(porta padrĂŁo do Privoxy) - DomĂnio SOCKS (v5):
127.0.0.1
- Porta:
9050
- Proxy HTTP:
- Marque a opção "Usar este proxy tambÊm em HTTPS".
- Clique em OK.
5. Verificar a ConexĂŁo com o Tor
Abra o navegador e acesse:
text https://check.torproject.org/
Se aparecer a mensagem "Congratulations. This browser is configured to use Tor.", a configuração estå correta.
Dicas Extras
- Privoxy pode ser ajustado para bloquear anĂşncios e rastreadores.
- Outros aplicativos tambĂŠm podem ser configurados para usar o Privoxy.
-
@ 9e69e420:d12360c2
2025-01-21 19:31:48Oregano oil is a potent natural compound that offers numerous scientifically-supported health benefits.
Active Compounds
The oil's therapeutic properties stem from its key bioactive components: - Carvacrol and thymol (primary active compounds) - Polyphenols and other antioxidant
Antimicrobial Properties
Bacterial Protection The oil demonstrates powerful antibacterial effects, even against antibiotic-resistant strains like MRSA and other harmful bacteria. Studies show it effectively inactivates various pathogenic bacteria without developing resistance.
Antifungal Effects It effectively combats fungal infections, particularly Candida-related conditions like oral thrush, athlete's foot, and nail infections.
Digestive Health Benefits
Oregano oil supports digestive wellness by: - Promoting gastric juice secretion and enzyme production - Helping treat Small Intestinal Bacterial Overgrowth (SIBO) - Managing digestive discomfort, bloating, and IBS symptoms
Anti-inflammatory and Antioxidant Effects
The oil provides significant protective benefits through: - Powerful antioxidant activity that fights free radicals - Reduction of inflammatory markers in the body - Protection against oxidative stress-related conditions
Respiratory Support
It aids respiratory health by: - Loosening mucus and phlegm - Suppressing coughs and throat irritation - Supporting overall respiratory tract function
Additional Benefits
Skin Health - Improves conditions like psoriasis, acne, and eczema - Supports wound healing through antibacterial action - Provides anti-aging benefits through antioxidant properties
Cardiovascular Health Studies show oregano oil may help: - Reduce LDL (bad) cholesterol levels - Support overall heart health
Pain Management The oil demonstrates effectiveness in: - Reducing inflammation-related pain - Managing muscle discomfort - Providing topical pain relief
Safety Note
While oregano oil is generally safe, it's highly concentrated and should be properly diluted before use Consult a healthcare provider before starting supplementation, especially if taking other medications.
-
@ 6be5cc06:5259daf0
2025-01-21 01:51:46Bitcoin: Um sistema de dinheiro eletrĂ´nico direto entre pessoas.
Satoshi Nakamoto
satoshin@gmx.com
www.bitcoin.org
Resumo
O Bitcoin Ê uma forma de dinheiro digital que permite pagamentos diretos entre pessoas, sem a necessidade de um banco ou instituição financeira. Ele resolve um problema chamado gasto duplo, que ocorre quando alguÊm tenta gastar o mesmo dinheiro duas vezes. Para evitar isso, o Bitcoin usa uma rede descentralizada onde todos trabalham juntos para verificar e registrar as transaçþes.
As transaçþes são registradas em um livro público chamado blockchain, protegido por uma tÊcnica chamada Prova de Trabalho. Essa tÊcnica cria uma cadeia de registros que não pode ser alterada sem refazer todo o trabalho jå feito. Essa cadeia Ê mantida pelos computadores que participam da rede, e a mais longa Ê considerada a verdadeira.
Enquanto a maior parte do poder computacional da rede for controlada por participantes honestos, o sistema continuarĂĄ funcionando de forma segura. A rede ĂŠ flexĂvel, permitindo que qualquer pessoa entre ou saia a qualquer momento, sempre confiando na cadeia mais longa como prova do que aconteceu.
1. Introdução
Hoje, quase todos os pagamentos feitos pela internet dependem de bancos ou empresas como processadores de pagamento (cartþes de crÊdito, por exemplo) para funcionar. Embora esse sistema seja útil, ele tem problemas importantes porque Ê baseado em confiança.
Primeiro, essas empresas podem reverter pagamentos, o que Ê útil em caso de erros, mas cria custos e incertezas. Isso faz com que pequenas transaçþes, como pagar centavos por um serviço, se tornem inviåveis. AlÊm disso, os comerciantes são obrigados a desconfiar dos clientes, pedindo informaçþes extras e aceitando fraudes como algo inevitåvel.
Esses problemas nĂŁo existem no dinheiro fĂsico, como o papel-moeda, onde o pagamento ĂŠ final e direto entre as partes. No entanto, nĂŁo temos como enviar dinheiro fĂsico pela internet sem depender de um intermediĂĄrio confiĂĄvel.
O que precisamos ĂŠ de um sistema de pagamento eletrĂ´nico baseado em provas matemĂĄticas, nĂŁo em confiança. Esse sistema permitiria que qualquer pessoa enviasse dinheiro diretamente para outra, sem depender de bancos ou processadores de pagamento. AlĂŠm disso, as transaçþes seriam irreversĂveis, protegendo vendedores contra fraudes, mas mantendo a possibilidade de soluçþes para disputas legĂtimas.
Neste documento, apresentamos o Bitcoin, que resolve o problema do gasto duplo usando uma rede descentralizada. Essa rede cria um registro público e protegido por cålculos matemåticos, que garante a ordem das transaçþes. Enquanto a maior parte da rede for controlada por pessoas honestas, o sistema serå seguro contra ataques.
2. Transaçþes
Para entender como funciona o Bitcoin, Ê importante saber como as transaçþes são realizadas. Imagine que você quer transferir uma "moeda digital" para outra pessoa. No sistema do Bitcoin, essa "moeda" Ê representada por uma sequência de registros que mostram quem Ê o atual dono. Para transferi-la, você adiciona um novo registro comprovando que agora ela pertence ao próximo dono. Esse registro Ê protegido por um tipo especial de assinatura digital.
O que ĂŠ uma assinatura digital?
Uma assinatura digital Ê como uma senha secreta, mas muito mais segura. No Bitcoin, cada usuårio tem duas chaves: uma "chave privada", que Ê secreta e serve para criar a assinatura, e uma "chave pública", que pode ser compartilhada com todos e Ê usada para verificar se a assinatura Ê vålida. Quando você transfere uma moeda, usa sua chave privada para assinar a transação, provando que você Ê o dono. A próxima pessoa pode usar sua chave pública para confirmar isso.
Como funciona na prĂĄtica?
Cada "moeda" no Bitcoin ĂŠ, na verdade, uma cadeia de assinaturas digitais. Vamos imaginar o seguinte cenĂĄrio:
- A moeda estå com o Dono 0 (você). Para transferi-la ao Dono 1, você assina digitalmente a transação com sua chave privada. Essa assinatura inclui o código da transação anterior (chamado de "hash") e a chave pública do Dono 1.
- Quando o Dono 1 quiser transferir a moeda ao Dono 2, ele assinarå a transação seguinte com sua própria chave privada, incluindo tambÊm o hash da transação anterior e a chave pública do Dono 2.
- Esse processo continua, formando uma "cadeia" de transaçþes. Qualquer pessoa pode verificar essa cadeia para confirmar quem Ê o atual dono da moeda.
Resolvendo o problema do gasto duplo
Um grande desafio com moedas digitais Ê o "gasto duplo", que Ê quando uma mesma moeda Ê usada em mais de uma transação. Para evitar isso, muitos sistemas antigos dependiam de uma entidade central confiåvel, como uma casa da moeda, que verificava todas as transaçþes. No entanto, isso criava um ponto único de falha e centralizava o controle do dinheiro.
O Bitcoin resolve esse problema de forma inovadora: ele usa uma rede descentralizada onde todos os participantes (os "nós") têm acesso a um registro completo de todas as transaçþes. Cada nó verifica se as transaçþes são vålidas e se a moeda não foi gasta duas vezes. Quando a maioria dos nós concorda com a validade de uma transação, ela Ê registrada permanentemente na blockchain.
Por que isso ĂŠ importante?
Essa solução elimina a necessidade de confiar em uma única entidade para gerenciar o dinheiro, permitindo que qualquer pessoa no mundo use o Bitcoin sem precisar de permissão de terceiros. AlÊm disso, ela garante que o sistema seja seguro e resistente a fraudes.
3. Servidor Timestamp
Para assegurar que as transaçþes sejam realizadas de forma segura e transparente, o sistema Bitcoin utiliza algo chamado de "servidor de registro de tempo" (timestamp). Esse servidor funciona como um registro pĂşblico que organiza as transaçþes em uma ordem especĂfica.
Ele faz isso agrupando vårias transaçþes em blocos e criando um código único chamado "hash". Esse hash Ê como uma impressão digital que representa todo o conteúdo do bloco. O hash de cada bloco Ê amplamente divulgado, como se fosse publicado em um jornal ou em um fórum público.
Esse processo garante que cada bloco de transaçþes tenha um registro de quando foi criado e que ele existia naquele momento. AlĂŠm disso, cada novo bloco criado contĂŠm o hash do bloco anterior, formando uma cadeia contĂnua de blocos conectados â conhecida como blockchain.
Com isso, se alguĂŠm tentar alterar qualquer informação em um bloco anterior, o hash desse bloco mudarĂĄ e nĂŁo corresponderĂĄ ao hash armazenado no bloco seguinte. Essa caracterĂstica torna a cadeia muito segura, pois qualquer tentativa de fraude seria imediatamente detectada.
O sistema de timestamps Ê essencial para provar a ordem cronológica das transaçþes e garantir que cada uma delas seja única e autêntica. Dessa forma, ele reforça a segurança e a confiança na rede Bitcoin.
4. Prova-de-Trabalho
Para implementar o registro de tempo distribuĂdo no sistema Bitcoin, utilizamos um mecanismo chamado prova-de-trabalho. Esse sistema ĂŠ semelhante ao Hashcash, desenvolvido por Adam Back, e baseia-se na criação de um cĂłdigo Ăşnico, o "hash", por meio de um processo computacionalmente exigente.
A prova-de-trabalho envolve encontrar um valor especial que, quando processado junto com as informaçþes do bloco, gere um hash que comece com uma quantidade especĂfica de zeros. Esse valor especial ĂŠ chamado de "nonce". Encontrar o nonce correto exige um esforço significativo do computador, porque envolve tentativas repetidas atĂŠ que a condição seja satisfeita.
Esse processo ĂŠ importante porque torna extremamente difĂcil alterar qualquer informação registrada em um bloco. Se alguĂŠm tentar mudar algo em um bloco, seria necessĂĄrio refazer o trabalho de computação nĂŁo apenas para aquele bloco, mas tambĂŠm para todos os blocos que vĂŞm depois dele. Isso garante a segurança e a imutabilidade da blockchain.
A prova-de-trabalho tambĂŠm resolve o problema de decidir qual cadeia de blocos ĂŠ a vĂĄlida quando hĂĄ mĂşltiplas cadeias competindo. A decisĂŁo ĂŠ feita pela cadeia mais longa, pois ela representa o maior esforço computacional jĂĄ realizado. Isso impede que qualquer indivĂduo ou grupo controle a rede, desde que a maioria do poder de processamento seja mantida por participantes honestos.
Para garantir que o sistema permaneça eficiente e equilibrado, a dificuldade da prova-de-trabalho Ê ajustada automaticamente ao longo do tempo. Se novos blocos estiverem sendo gerados rapidamente, a dificuldade aumenta; se estiverem sendo gerados muito lentamente, a dificuldade diminui. Esse ajuste assegura que novos blocos sejam criados aproximadamente a cada 10 minutos, mantendo o sistema eståvel e funcional.
5. Rede
A rede Bitcoin ĂŠ o coração do sistema e funciona de maneira distribuĂda, conectando vĂĄrios participantes (ou nĂłs) para garantir o registro e a validação das transaçþes. Os passos para operar essa rede sĂŁo:
-
Transmissão de Transaçþes: Quando alguÊm realiza uma nova transação, ela Ê enviada para todos os nós da rede. Isso Ê feito para garantir que todos estejam cientes da operação e possam validå-la.
-
Coleta de Transaçþes em Blocos: Cada nó agrupa as novas transaçþes recebidas em um "bloco". Este bloco serå preparado para ser adicionado à cadeia de blocos (a blockchain).
-
Prova-de-Trabalho: Os nĂłs competem para resolver a prova-de-trabalho do bloco, utilizando poder computacional para encontrar um hash vĂĄlido. Esse processo ĂŠ como resolver um quebra-cabeça matemĂĄtico difĂcil.
-
Envio do Bloco Resolvido: Quando um nó encontra a solução para o bloco (a prova-de-trabalho), ele compartilha esse bloco com todos os outros nós na rede.
-
Validação do Bloco: Cada nó verifica o bloco recebido para garantir que todas as transaçþes nele contidas sejam vålidas e que nenhuma moeda tenha sido gasta duas vezes. Apenas blocos vålidos são aceitos.
-
Construção do Próximo Bloco: Os nós que aceitaram o bloco começam a trabalhar na criação do próximo bloco, utilizando o hash do bloco aceito como base (hash anterior). Isso mantÊm a continuidade da cadeia.
Resolução de Conflitos e Escolha da Cadeia Mais Longa
Os nós sempre priorizam a cadeia mais longa, pois ela representa o maior esforço computacional jå realizado, garantindo maior segurança. Se dois blocos diferentes forem compartilhados simultaneamente, os nós trabalharão no primeiro bloco recebido, mas guardarão o outro como uma alternativa. Caso o segundo bloco eventualmente forme uma cadeia mais longa (ou seja, tenha mais blocos subsequentes), os nós mudarão para essa nova cadeia.
Tolerância a Falhas
A rede ĂŠ robusta e pode lidar com mensagens que nĂŁo chegam a todos os nĂłs. Uma transação nĂŁo precisa alcançar todos os nĂłs de imediato; basta que chegue a um nĂşmero suficiente deles para ser incluĂda em um bloco. Da mesma forma, se um nĂł nĂŁo receber um bloco em tempo hĂĄbil, ele pode solicitĂĄ-lo ao perceber que estĂĄ faltando quando o prĂłximo bloco ĂŠ recebido.
Esse mecanismo descentralizado permite que a rede Bitcoin funcione de maneira segura, confiĂĄvel e resiliente, sem depender de uma autoridade central.
6. Incentivo
O incentivo Ê um dos pilares fundamentais que sustenta o funcionamento da rede Bitcoin, garantindo que os participantes (nós) continuem operando de forma honesta e contribuindo com recursos computacionais. Ele Ê estruturado em duas partes principais: a recompensa por mineração e as taxas de transação.
Recompensa por Mineração
Por convenção, o primeiro registro em cada bloco Ê uma transação especial que cria novas moedas e as atribui ao criador do bloco. Essa recompensa incentiva os mineradores a dedicarem poder computacional para apoiar a rede. Como não hå uma autoridade central para emitir moedas, essa Ê a maneira pela qual novas moedas entram em circulação. Esse processo pode ser comparado ao trabalho de garimpeiros, que utilizam recursos para colocar mais ouro em circulação. No caso do Bitcoin, o "recurso" consiste no tempo de CPU e na energia elÊtrica consumida para resolver a prova-de-trabalho.
Taxas de Transação
AlĂŠm da recompensa por mineração, os mineradores tambĂŠm podem ser incentivados pelas taxas de transação. Se uma transação utiliza menos valor de saĂda do que o valor de entrada, a diferença ĂŠ tratada como uma taxa, que ĂŠ adicionada Ă recompensa do bloco contendo essa transação. Com o passar do tempo e Ă medida que o nĂşmero de moedas em circulação atinge o limite predeterminado, essas taxas de transação se tornam a principal fonte de incentivo, substituindo gradualmente a emissĂŁo de novas moedas. Isso permite que o sistema opere sem inflação, uma vez que o nĂşmero total de moedas permanece fixo.
Incentivo Ă Honestidade
O design do incentivo tambĂŠm busca garantir que os participantes da rede mantenham um comportamento honesto. Para um atacante que consiga reunir mais poder computacional do que o restante da rede, ele enfrentaria duas escolhas:
- Usar esse poder para fraudar o sistema, como reverter transaçþes e roubar pagamentos.
- Seguir as regras do sistema, criando novos blocos e recebendo recompensas legĂtimas.
A lógica econômica favorece a segunda opção, pois um comportamento desonesto prejudicaria a confiança no sistema, diminuindo o valor de todas as moedas, incluindo aquelas que o próprio atacante possui. Jogar dentro das regras não apenas maximiza o retorno financeiro, mas tambÊm preserva a validade e a integridade do sistema.
Esse mecanismo garante que os incentivos econĂ´micos estejam alinhados com o objetivo de manter a rede segura, descentralizada e funcional ao longo do tempo.
7. Recuperação do Espaço em Disco
Depois que uma moeda passa a estar protegida por muitos blocos na cadeia, as informaçþes sobre as transaçþes antigas que a geraram podem ser descartadas para economizar espaço em disco. Para que isso seja possĂvel sem comprometer a segurança, as transaçþes sĂŁo organizadas em uma estrutura chamada "ĂĄrvore de Merkle". Essa ĂĄrvore funciona como um resumo das transaçþes: em vez de armazenar todas elas, guarda apenas um "hash raiz", que ĂŠ como uma assinatura compacta que representa todo o grupo de transaçþes.
Os blocos antigos podem, entĂŁo, ser simplificados, removendo as partes desnecessĂĄrias dessa ĂĄrvore. Apenas a raiz do hash precisa ser mantida no cabeçalho do bloco, garantindo que a integridade dos dados seja preservada, mesmo que detalhes especĂficos sejam descartados.
Para exemplificar: imagine que vocĂŞ tenha vĂĄrios recibos de compra. Em vez de guardar todos os recibos, vocĂŞ cria um documento e lista apenas o valor total de cada um. Mesmo que os recibos originais sejam descartados, ainda ĂŠ possĂvel verificar a soma com base nos valores armazenados.
AlÊm disso, o espaço ocupado pelos blocos em si Ê muito pequeno. Cada bloco sem transaçþes ocupa apenas cerca de 80 bytes. Isso significa que, mesmo com blocos sendo gerados a cada 10 minutos, o crescimento anual em espaço necessårio Ê insignificante: apenas 4,2 MB por ano. Com a capacidade de armazenamento dos computadores crescendo a cada ano, esse espaço continuarå sendo trivial, garantindo que a rede possa operar de forma eficiente sem problemas de armazenamento, mesmo a longo prazo.
8. Verificação de Pagamento Simplificada
Ă possĂvel confirmar pagamentos sem a necessidade de operar um nĂł completo da rede. Para isso, o usuĂĄrio precisa apenas de uma cĂłpia dos cabeçalhos dos blocos da cadeia mais longa (ou seja, a cadeia com maior esforço de trabalho acumulado). Ele pode verificar a validade de uma transação ao consultar os nĂłs da rede atĂŠ obter a confirmação de que tem a cadeia mais longa. Para isso, utiliza-se o ramo Merkle, que conecta a transação ao bloco em que ela foi registrada.
Entretanto, o mĂŠtodo simplificado possui limitaçþes: ele nĂŁo pode confirmar uma transação isoladamente, mas sim assegurar que ela ocupa um lugar especĂfico na cadeia mais longa. Dessa forma, se um nĂł da rede aprova a transação, os blocos subsequentes reforçam essa aceitação.
A verificação simplificada Ê confiåvel enquanto a maioria dos nós da rede for honesta. Contudo, ela se torna vulneråvel caso a rede seja dominada por um invasor. Nesse cenårio, um atacante poderia fabricar transaçþes fraudulentas que enganariam o usuårio temporariamente atÊ que o invasor obtivesse controle completo da rede.
Uma estratÊgia para mitigar esse risco Ê configurar alertas nos softwares de nós completos. Esses alertas identificam blocos invålidos, sugerindo ao usuårio baixar o bloco completo para confirmar qualquer inconsistência. Para maior segurança, empresas que realizam pagamentos frequentes podem preferir operar seus próprios nós, reduzindo riscos e permitindo uma verificação mais direta e confiåvel.
9. Combinando e Dividindo Valor
No sistema Bitcoin, cada unidade de valor Ê tratada como uma "moeda" individual, mas gerenciar cada centavo como uma transação separada seria impraticåvel. Para resolver isso, o Bitcoin permite que valores sejam combinados ou divididos em transaçþes, facilitando pagamentos de qualquer valor.
Entradas e SaĂdas
Cada transação no Bitcoin Ê composta por:
- Entradas: Representam os valores recebidos em transaçþes anteriores.
- SaĂdas: Correspondem aos valores enviados, divididos entre os destinatĂĄrios e, eventualmente, o troco para o remetente.
Normalmente, uma transação contÊm:
- Uma Ăşnica entrada com valor suficiente para cobrir o pagamento.
- Ou vĂĄrias entradas combinadas para atingir o valor necessĂĄrio.
O valor total das saĂdas nunca excede o das entradas, e a diferença (se houver) pode ser retornada ao remetente como troco.
Exemplo PrĂĄtico
Imagine que vocĂŞ tem duas entradas:
- 0,03 BTC
- 0,07 BTC
Se deseja enviar 0,08 BTC para alguÊm, a transação terå:
- Entrada: As duas entradas combinadas (0,03 + 0,07 BTC = 0,10 BTC).
- SaĂdas: Uma para o destinatĂĄrio (0,08 BTC) e outra como troco para vocĂŞ (0,02 BTC).
Essa flexibilidade permite que o sistema funcione sem precisar manipular cada unidade mĂnima individualmente.
Difusão e Simplificação
A difusão de transaçþes, onde uma depende de vårias anteriores e assim por diante, não representa um problema. Não Ê necessårio armazenar ou verificar o histórico completo de uma transação para utilizå-la, jå que o registro na blockchain garante sua integridade.
10. Privacidade
O modelo bancĂĄrio tradicional oferece um certo nĂvel de privacidade, limitando o acesso Ă s informaçþes financeiras apenas Ă s partes envolvidas e a um terceiro confiĂĄvel (como bancos ou instituiçþes financeiras). No entanto, o Bitcoin opera de forma diferente, pois todas as transaçþes sĂŁo publicamente registradas na blockchain. Apesar disso, a privacidade pode ser mantida utilizando chaves pĂşblicas anĂ´nimas, que desvinculam diretamente as transaçþes das identidades das partes envolvidas.
Fluxo de Informação
- No modelo tradicional, as transaçþes passam por um terceiro confiåvel que conhece tanto o remetente quanto o destinatårio.
- No Bitcoin, as transaçþes são anunciadas publicamente, mas sem revelar diretamente as identidades das partes. Isso Ê comparåvel a dados divulgados por bolsas de valores, onde informaçþes como o tempo e o tamanho das negociaçþes (a "fita") são públicas, mas as identidades das partes não.
Protegendo a Privacidade
Para aumentar a privacidade no Bitcoin, sĂŁo adotadas as seguintes prĂĄticas:
- Chaves Públicas Anônimas: Cada transação utiliza um par de chaves diferentes, dificultando a associação com um proprietårio único.
- Prevenção de Ligação: Ao usar chaves novas para cada transação, reduz-se a possibilidade de links evidentes entre múltiplas transaçþes realizadas pelo mesmo usuårio.
Riscos de Ligação
Embora a privacidade seja fortalecida, alguns riscos permanecem:
- Transaçþes multi-entrada podem revelar que todas as entradas pertencem ao mesmo proprietårio, caso sejam necessårias para somar o valor total.
- O proprietårio da chave pode ser identificado indiretamente por transaçþes anteriores que estejam conectadas.
11. CĂĄlculos
Imagine que temos um sistema onde as pessoas (ou computadores) competem para adicionar informaçþes novas (blocos) a um grande registro público (a cadeia de blocos ou blockchain). Este registro Ê como um livro contåbil compartilhado, onde todos podem verificar o que estå escrito.
Agora, vamos pensar em um cenårio: um atacante quer enganar o sistema. Ele quer mudar informaçþes jå registradas para beneficiar a si mesmo, por exemplo, desfazendo um pagamento que jå fez. Para isso, ele precisa criar uma versão alternativa do livro contåbil (a cadeia de blocos dele) e convencer todos os outros participantes de que essa versão Ê a verdadeira.
Mas isso ĂŠ extremamente difĂcil.
Como o Ataque Funciona
Quando um novo bloco Ê adicionado à cadeia, ele depende de cålculos complexos que levam tempo e esforço. Esses cålculos são como um grande quebra-cabeça que precisa ser resolvido.
- Os âbons jogadoresâ (nĂłs honestos) estĂŁo sempre trabalhando juntos para resolver esses quebra-cabeças e adicionar novos blocos Ă cadeia verdadeira.
- O atacante, por outro lado, precisa resolver quebra-cabeças sozinho, tentando âalcançarâ a cadeia honesta para que sua versĂŁo alternativa pareça vĂĄlida.
Se a cadeia honesta jå estå vårios blocos à frente, o atacante começa em desvantagem, e o sistema estå projetado para que a dificuldade de alcançå-los aumente rapidamente.
A Corrida Entre Cadeias
Você pode imaginar isso como uma corrida. A cada bloco novo que os jogadores honestos adicionam à cadeia verdadeira, eles se distanciam mais do atacante. Para vencer, o atacante teria que resolver os quebra-cabeças mais råpido que todos os outros jogadores honestos juntos.
Suponha que:
- A rede honesta tem 80% do poder computacional (ou seja, resolve 8 de cada 10 quebra-cabeças).
- O atacante tem 20% do poder computacional (ou seja, resolve 2 de cada 10 quebra-cabeças).
Cada vez que a rede honesta adiciona um bloco, o atacante tem que "correr atrås" e resolver mais quebra-cabeças para alcançar.
Por Que o Ataque Fica Cada Vez Mais ImprovĂĄvel?
Vamos usar uma fórmula simples para mostrar como as chances de sucesso do atacante diminuem conforme ele precisa "alcançar" mais blocos:
P = (q/p)^z
- q ĂŠ o poder computacional do atacante (20%, ou 0,2).
- p ĂŠ o poder computacional da rede honesta (80%, ou 0,8).
- z Ê a diferença de blocos entre a cadeia honesta e a cadeia do atacante.
Se o atacante estĂĄ 5 blocos atrĂĄs (z = 5):
P = (0,2 / 0,8)^5 = (0,25)^5 = 0,00098, (ou, 0,098%)
Isso significa que o atacante tem menos de 0,1% de chance de sucesso â ou seja, ĂŠ muito improvĂĄvel.
Se ele estiver 10 blocos atrĂĄs (z = 10):
P = (0,2 / 0,8)^10 = (0,25)^10 = 0,000000095, (ou, 0,0000095%).
Neste caso, as chances de sucesso sĂŁo praticamente nulas.
Um Exemplo Simples
Se vocĂŞ jogar uma moeda, a chance de cair âcaraâ ĂŠ de 50%. Mas se precisar de 10 caras seguidas, sua chance jĂĄ ĂŠ bem menor. Se precisar de 20 caras seguidas, ĂŠ quase impossĂvel.
No caso do Bitcoin, o atacante precisa de muito mais do que 20 caras seguidas. Ele precisa resolver quebra-cabeças extremamente difĂceis e alcançar os jogadores honestos que estĂŁo sempre Ă frente. Isso faz com que o ataque seja inviĂĄvel na prĂĄtica.
Por Que Tudo Isso ĂŠ Seguro?
- A probabilidade de sucesso do atacante diminui exponencialmente. Isso significa que, quanto mais tempo passa, menor ĂŠ a chance de ele conseguir enganar o sistema.
- A cadeia verdadeira (honesta) estĂĄ protegida pela força da rede. Cada novo bloco que os jogadores honestos adicionam Ă cadeia torna mais difĂcil para o atacante alcançar.
E Se o Atacante Tentar Continuar?
O atacante poderia continuar tentando indefinidamente, mas ele estaria gastando muito tempo e energia sem conseguir nada. Enquanto isso, os jogadores honestos estĂŁo sempre adicionando novos blocos, tornando o trabalho do atacante ainda mais inĂştil.
Assim, o sistema garante que a cadeia verdadeira seja extremamente segura e que ataques sejam, na prĂĄtica, impossĂveis de ter sucesso.
12. ConclusĂŁo
Propusemos um sistema de transaçþes eletrĂ´nicas que elimina a necessidade de confiança, baseando-se em assinaturas digitais e em uma rede peer-to-peer que utiliza prova de trabalho. Isso resolve o problema do gasto duplo, criando um histĂłrico pĂşblico de transaçþes imutĂĄvel, desde que a maioria do poder computacional permaneça sob controle dos participantes honestos. A rede funciona de forma simples e descentralizada, com nĂłs independentes que nĂŁo precisam de identificação ou coordenação direta. Eles entram e saem livremente, aceitando a cadeia de prova de trabalho como registro do que ocorreu durante sua ausĂŞncia. As decisĂľes sĂŁo tomadas por meio do poder de CPU, validando blocos legĂtimos, estendendo a cadeia e rejeitando os invĂĄlidos. Com este mecanismo de consenso, todas as regras e incentivos necessĂĄrios para o funcionamento seguro e eficiente do sistema sĂŁo garantidos.
Faça o download do whitepaper original em português: https://bitcoin.org/files/bitcoin-paper/bitcoin_pt_br.pdf
-
@ eb0157af:77ab6c55
2025-05-28 06:01:29Bitcoin surpasses gold in the United States: 50 million holders and a dominant role in the global market.
According to a new report by River, for the first time in history, the number of Americans owning bitcoin has surpassed that of gold holders. The analysis reveals that approximately 50 million U.S. citizens currently own the cryptocurrency, while gold owners number 37 million. In fact, 14.3% of Americans own bitcoin, the highest percentage of holders worldwide.
Source: River
The report highlights that 40% of all Bitcoin-focused companies are based in the United States, consolidating Americaâs dominant position in the sector. Additionally, 40.5% of Bitcoin holders are men aged 31 to 35, followed by 35.9% of men aged 41 to 45. In contrast, only 13.4% of holders are women.
Source: River
Notably, U.S. companies hold 94.8% of all bitcoins owned by publicly traded companies worldwide. According to the report, recent regulatory changes in the U.S. have made the asset more accessible through financial products such as spot ETFs.
The document also shows that American investors increasingly view the cryptocurrency as protection against fiscal instability and inflation, appreciating its limited supply and decentralized governance model.
For River, Bitcoin offers significant practical advantages over gold in the modern digital era. Its ease of custody, cross-border transfer, and liquidity make the cryptocurrency an attractive option for both individual and institutional investors, the report suggests.
The post USA: 50 million Americans own bitcoin appeared first on Atlas21.
-
@ 5f078e90:b2bacaa3
2025-05-28 12:00:23Sylvi the seahorse
In the coral haven of Azure Bay, a seahorse named Sylvi danced with the tides. Her tail curled around a swaying frond as she watched fish dart by. One dawn, a lost pearl rolled into her nook. Sylvi, curious, nudged it along the reef, meeting crabs and eels who shared tales of the deep. By dusk, she found its oyster home. The pearl gleamed thanks, and Sylvi twirled home, her heart light as foam.
Ignore this test. This was in bold originally.
(380 chars, plain text after Markdown stripping, this was in italics originally)
Originally written on habla.news (on Nostr)
-
@ cff1720e:15c7e2b2
2025-01-19 17:48:02Einleitung\ \ Schwierige Dinge einfach zu erklären ist der Anspruch von ELI5 (explain me like I'm 5). Das ist in unserer hoch technisierten Welt dringend erforderlich, denn nur mit dem Verständnis der Technologien kĂśnnen wir sie richtig einsetzen und weiter entwickeln.\ Ich starte meine Serie mit Nostr, einem relativ neuen Internet-Protokoll. Was zum Teufel ist ein Internet-Protokoll? Formal beschrieben sind es internationale Standards, die dafĂźr sorgen, dass das Internet seit Ăźber 30 Jahren ziemlich gut funktioniert. Es ist die Sprache, in der sich die Rechner miteinander unterhalten und die auch Sie täglich nutzen, vermutlich ohne es bewusst wahrzunehmen. http(s) transportiert ihre Anfrage an einen Server (z.B. Amazon), und html sorgt dafĂźr, dass aus den gelieferten Daten eine schĂśne Seite auf ihrem Bildschirm entsteht. Eine Mail wird mit smtp an den Mailserver gesendet und mit imap von ihm abgerufen, und da alle den Standard verwenden, funktioniert das mit jeder App auf jedem Betriebssystem und mit jedem Mail-Provider. Und mit einer Mail-Adresse wie roland@pareto.space kĂśnnen sie sogar jederzeit umziehen, egal wohin. Cool, das ist state of the art! Aber warum funktioniert das z.B. bei Chat nicht, gibt es da kein Protokoll? Doch, es heiĂt IRC (Internet Relay Chat â merken sie sich den Namen), aber es wird so gut wie nicht verwendet. Die GrĂźnde dafĂźr sind nicht technischer Natur, vielmehr wurden mit Apps wie Facebook, Twitter, WhatsApp, Telegram, Instagram, TikTok u.a. bewusst Inkompatibilitäten und Nutzerabhängigkeiten geschaffen um Profite zu maximieren.
Warum Nostr?
Da das Standard-Protokoll nicht genutzt wird, hat jede App ihr eigenes, und wir brauchen eine handvoll Apps um uns mit allen Bekannten auszutauschen. Eine Mobilfunknummer ist Voraussetzung fĂźr jedes Konto, damit kĂśnnen die App-Hersteller die Nutzer umfassend tracken und mit dem Verkauf der Informationen bis zu 30 USD je Konto und Monat verdienen. Der Nutzer ist nicht mehr Kunde, er ist das Produkt! Der Werbe-SPAM ist noch das kleinste Problem bei diesem Geschäftsmodell. Server mit Millionen von Nutzerdaten sind ein âhoney potâ, dementsprechend oft werden sie gehackt und die Zugangsdaten verkauft. 2024 wurde auch der Twitter-Account vom damaligen Präsidenten Joe Biden gehackt, niemand wusste mehr wer die Nachrichten verfasst hat (vorher auch nicht), d.h. die Authentizität der Inhalte ist bei keinem dieser Anbieter gewährleistet. Im selben Jahr wurde der Telegram-GrĂźnder in Frankreich in Beugehaft genommen, weil er sich geweigert hatte HintertĂźren in seine Software einzubauen. Nun kann zum Schutz "unserer Demokratieâ praktisch jeder mitlesen, was sie mit wem an Informationen austauschen, z.B. darĂźber welches Shampoo bestimmte Politiker verwenden.Â
Und wer tatsächlich glaubt er kĂśnne Meinungsfreiheit auf sozialen Medien praktizieren, findet sich schnell in der Situation von Donald Trump wieder (seinerzeit amtierender Präsident), dem sein Twitter-Konto 2021 abgeschaltet wurde (Cancel-Culture). Die Nutzerdaten, also ihr Profil, ihre Kontakte, Dokumente, Bilder, Videos und Audiofiles - gehĂśren ihnen ohnehin nicht mehr sondern sind Eigentum des Plattform-Betreibers; lesen sie sich mal die AGB's durch. Aber nein, keine gute Idee, das sind hunderte Seiten und sie werden permanent geändert. Alle nutzen also Apps, deren Technik sie nicht verstehen, deren Regeln sie nicht kennen, wo sie keine Rechte haben und die ihnen die Resultate ihres Handelns stehlen. Was wĂźrde wohl der FĂźnfjährige sagen, wenn ihm seine ältere Schwester anbieten wĂźrde, alle seine Spielzeuge zu âverwaltenâ und dann auszuhändigen wenn er brav ist? âDu spinnst wohlâ, und damit beweist der Knirps mehr Vernunft als die Mehrzahl der Erwachsenen. \ \ ResĂźmee: keine Standards, keine Daten, keine Rechte = keine Zukunft!
\ Wie funktioniert Nostr?
Die Entwickler von Nostr haben erkannt dass sich das Server-Client-Konzept in ein Master-Slave-Konzept verwandelt hatte. Der Master ist ein Synonym fĂźr Zentralisierung und wird zum âsingle point of failureâ, der zwangsläufig Systeme dysfunktional macht. In einem verteilten Peer2Peer-System gibt es keine Master mehr sondern nur gleichberechtigte Knoten (Relays), auf denen die Informationen gespeichert werden. Indem man Informationen auf mehreren Relays redundant speichert, ist das System in jeglicher Hinsicht resilienter. Nicht nur die Natur verwendet dieses Prinzip seit Jahrmillionen erfolgreich, auch das Internet wurde so konzipiert (das ARPAnet wurde vom US-Militär fĂźr den Einsatz in Kriegsfällen unter massiven StĂśrungen entwickelt). Alle Nostr-Daten liegen auf Relays und der Nutzer kann wählen zwischen Ăśffentlichen (zumeist kostenlosen) und privaten Relays, z.B. fĂźr geschlossene Gruppen oder zum Zwecke von Daten-Archivierung. Da Dokumente auf mehreren Relays gespeichert sind, werden statt URL's (Locator) eindeutige Dokumentnamen (URI's = Identifier) verwendet, broken Links sind damit Vergangenheit und LĂśschungen / Verluste ebenfalls.\ \ Jedes Dokument (Event genannt) wird vom Besitzer signiert, es ist damit authentisch und fälschungssicher und kann nur vom Ersteller gelĂśscht werden. DafĂźr wird ein SchlĂźsselpaar verwendet bestehend aus privatem (nsec) und Ăśffentlichem SchlĂźssel (npub) wie aus der MailverschlĂźsselung (PGP) bekannt. Das repräsentiert eine Nostr-Identität, die um Bild, Namen, Bio und eine lesbare Nostr-Adresse ergänzt werden kann (z.B. roland@pareto.space ), mehr braucht es nicht um alle Ressourcen des Nostr-Ăkosystems zu nutzen. Und das besteht inzwischen aus Ăźber hundert Apps mit unterschiedlichen Fokussierungen, z.B. fĂźr persĂśnliche verschlĂźsselte Nachrichten (DM â OxChat), Kurznachrichten (Damus, Primal), Blogbeiträge (Pareto), Meetups (Joinstr), Gruppen (Groups), Bilder (Olas), Videos (Amethyst), Audio-Chat (Nostr Nests), Audio-Streams (Tunestr), Video-Streams (Zap.Stream), Marktplätze (Shopstr) u.v.a.m. Die Anmeldung erfolgt mit einem Klick (single sign on) und den Apps stehen ALLE Nutzerdaten zur VerfĂźgung (Profil, Daten, Kontakte, Social Graph â Follower, Bookmarks, Comments, etc.), im Gegensatz zu den fragmentierten Datensilos der Gegenwart.\ \ ResĂźmee: ein offener Standard, alle Daten, alle Rechte = groĂe Zukunft!
\ Warum ist Nostr die Zukunft des Internet?
âBaue Dein Haus nicht auf einem fremden GrundstĂźckâ gilt auch im Internet - fĂźr alle App-Entwickler, KĂźnstler, Journalisten und Nutzer, denn auch ihre Daten sind werthaltig. Nostr garantiert das Eigentum an den Daten, und Ăźberwindet ihre Fragmentierung. Weder die Nutzung noch die kreativen Freiheiten werden durch maĂlose Lizenz- und Nutzungsbedingungen eingeschränkt. Aus passiven Nutzern werden durch Interaktion aktive Teilnehmer, Co-Creatoren in einer Sharing-Ăkonomie (Value4Value). OpenSource schafft endlich wieder Vertrauen in die Software und ihre Anbieter. Offene Standards ermĂśglichen den Entwicklern mehr Kooperation und schnellere Entwicklung, fĂźr die Anwender garantieren sie Wahlfreiheit. Womit wir letztmalig zu unserem FĂźnfjährigen zurĂźckkehren. Kinder lieben Lego Ăźber alles, am meisten die Maxi-Box âClassicâ, weil sie damit ihre Phantasie im Kombinieren voll ausleben kĂśnnen. Erwachsene schenken ihnen dann die viel zu teuren Themenpakete, mit denen man nur eine LĂśsung nach Anleitung bauen kann. âWas stimmt nur mit meinen Eltern nicht, wann sind die denn falsch abgebogen?" fragt sich der Nachwuchs zu Recht. Das Image lässt sich aber wieder aufpolieren, wenn sie ihren Kindern Nostr zeigen, denn die Vorteile verstehen sogar FĂźnfjährige.
\ Das neue Internet ist dezentral. Das neue Internet ist selbstbestimmt. Nostr ist das neue Internet.
https://nostr.net/ \ https://start.njump.me/
Hier das Interview zum Thema mit Radio Berliner MorgenrĂśte
-
@ a29cfc65:484fac9c
2025-05-28 10:30:32Deutschland ist eines der wenigen Länder mit einer gesetzlich verankerten ausnahmslosen Schulbesuchspflicht. Mit den SchulschlieĂungen in der Corona-Zeit wurde das Gesetz jedoch faktisch plĂśtzlich auĂer Kraft gesetzt. Alle mussten zu Hause lernen. Als die Schulen danach wieder offen waren, wurden die Kinder mit Maskenpflicht, Tests und Impfdruck gequält. Nicht selten traten bei den SchĂźlern Krankheiten und psychische StĂśrungen auf. Nicht wenige Eltern suchten im Gespräch mit dem Lehrerkollegium nach LĂśsungen fĂźr ihre Kinder. In den meisten Fällen war das nicht mĂśglich. Die Lehrer waren auf die neue Ideologie und die Durchsetzung der MaĂnahmen eingeschworen und hatten Angst. Einige Eltern haben ihre Kinder dann in eigener Verantwortung aus der Schule genommen und zu Hause selbst unterrichtet. An manchen Orten fanden sich Gemeinschaften, wo die Kinder in Gruppen lernten. Während viele Lerngemeinschaften nicht mehr existieren, hat die Familie von Katharina den Unterricht fĂźr ihre drei Kinder in Eigenregie etabliert. Inzwischen haben sie dafĂźr sogar âden Segenâ von Familiengericht und Jugendamt.
Katharina und Johannes leben mit ihren drei Wunschkindern Aurelius (15), Benjamin (14) und Friedrich (10) in einem Vorort von Leipzig. Die Familie wohnte frĂźher in der Stadt. In der Corona-Zeit haben sie sich mit dem Physiotherapie- & Seminarzentrum Curasanus eine Existenz auf dem Land aufgebaut und begehen diesen Sommer ihr 20-jähriges Praxis-Jubiläum. Katharina hat ihre Arbeit als Physiotherapeutin weitgehend aufgegeben, um sich als Mama und Lernbegleiterin ihren Kindern widmen zu kĂśnnen. Daneben bietet sie Vorträge und Workshops an, Ăźbernimmt einen groĂen Teil der Praxis-Organisation und ist Manager, Rezeptionistin und Vertriebler der eigenen Firma. Wir besuchten einen ihrer Lachyoga-Kurse. Dabei erlebten wir ihr Zusammenspiel mit den drei Kindern. AnschlieĂend stellten wir Katharina unsere Fragen zum Freilernen.
Im unmittelbaren Umfeld wird die Familie bestaunt und geachtet. Sie haben sich bewusst fĂźr das Freilernen entschieden. Die Kinder wurden ohne Test nicht mehr in die Schule gelassen. Auch andere ZwangsmaĂnahmen wie die Maske wollten die Eltern den Kindern ersparen. Besonders Benjamin hatte traumatische Erlebnisse. Seine Lehrerin schmiss mit dem SchlĂźssel nach den SchĂźlern und wandte andere schwarze Pädagogik an. Er ging ständig mit Bauchschmerzen ins Bett. Ein weiterer Punkt ist die Masernimpfung. Die Kinder kĂśnnten zwar zur Schule gehen, aber die Eltern werden mit rechtlichen MaĂnahmen und Zwangszahlungen belegt. Da Katharina in ihrer Praxis viele Erkrankungen als Folge der Masernimpfung beobachten konnte, lehnt sie die Pflichtimpfung ab. Die Eltern haben kein Vertrauen mehr in die staatliche Schulerziehung mit all dem Zwang und den Erpressungen. Als die Familie den Entschluss gefasst hatte, die Kinder nicht mehr in die Schule zu schicken, haben sie ihre Praxis vorĂźbergehend geschlossen, ihr Haus verkauft und sind auf Reisen gegangen. Die beiden groĂen Kinder wurden von der Schule abgemeldet. Nach der RĂźckkehr haben sie dann mit einem neuen Leben auf dem Land begonnen.
Lernen ohne Schule: Wie geht das?
âWissen ist Macht und eine Holschuldâ, sagt uns Katharina. Das ist ihr Motto und motiviert auch die Kinder. Mit dem Unterricht zu Hause macht die Familie ihre eigene Studie und zeigt, dass Lernen auch anders geht als in der Schule. Die Eltern kĂśnnen viel besser auf jedes einzelne Kind eingehen. Johannes arbeitete frĂźher als StraĂenbauer. Er unterstĂźtzt die Jungs vor allem in Mathematik, Geometrie und Physik sowie bei handwerklichen Fertigkeiten. Katharinas Stärken liegen in Deutsch, Sprachen und Organisation. Unter den Patienten ihrer Praxis gibt es Lehrer, die ihnen helfen. Weitere UnterstĂźtzung kommt von Freunden und Bekannten. Bei bestimmten Projekten treffen sie auf andere Freilernerkinder. âDas Netzwerk wird immer grĂśĂer, es wird immer schĂśner und interessanterâ, sagt Katharina. Man geht mit vielen anderen einen gemeinsamen Weg, verlässt dabei eingetretene Pfade und erkundet neue Themenfelder wie Mediengestaltung, freie Energie, Elektrotherapie, meditatives und Improvisations-Zeichnen. âIch sprudele vor Ideen. Sie kommen in mein Feld, und dann mache ich was drausâ, sagt Katharina. Die Jungs sind in Wurzen im Ringelnatz-Literaturkreis. Dort schreiben sie Drehbuchgeschichten und haben einen Film produziert. Sie suchen sich Projekte oder kreieren neue, wie mit dem Planetarium Eilenburg. Diese Zusammenarbeit hat sich sehr gut entwickelt. Dort lernen 4- bis 15-Jährige zusammen. Die drei Jungs spielen Klavier. Erdkunde und Geschichte erleben die Kinder auch dadurch, dass die Familie Hauptstädte oder die bosnischen Pyramiden selbst erkundet. Dabei erweist es sich als Vorteil, nicht auf die Ferienzeiten angewiesen zu sein.
Als Physiotherapeutin ist Katharina bewusst, dass man neue Lernstrategien entwickeln muss. Die Kinder lernen unterschiedlich. Jedes Kind hat seinen eigenen Charakter. Aurelius benĂśtigt eher eine 1:1-Betreuung. Darauf kann Katharina viel individueller eingehen als die staatliche Schule. Es ist aber auch aufwendiger und anstrengender. Besonderen Wert legt sie darauf, dass rechte und linke Gehirnhälfte gleichmäĂig beansprucht werden. Lernphasen werden immer wieder mit Entspannungs- oder Bewegungsphasen kombiniert. Sie weiĂ, dass den Kindern zuerst die Grundlagen des Lesens, Rechnens und Schreibens vermittelt werden mĂźssen. Dann sind sie in der Lage, sich alles Weitere selbst anzueignen â UnterstĂźtzung vorausgesetzt. âBesonders das Schreiben mit der eigenen Hand ist wichtig fĂźr die Vernetzung der beiden Gehirnhälftenâ, sagt Katharina. DafĂźr nehmen sich die Eltern Zeit. Die Kinder fĂźhren Tagebuch. AuĂerdem halten es die Eltern fĂźr wichtig, den Kindern Werte und Tugenden wie Dankbarkeit, Verlässlichkeit, Beharrlichkeit, Aufrichtigkeit, Ehrlichkeit und die zehn Gebote zu vermitteln. Katharina und Johannes sind beide religiĂśs begleitet aufgewachsen. Heute sehen sie die Kirche als Institution kritisch. Angebunden an die SchĂśpfung und im Gottvertrauen erschaffen und schĂśpfen sie Leben und Lebensraum aus eigener Kraft â so erklärt es uns Katharina.
Ein weiteres Thema sind die Funktionen des KĂśrpers und wie sich die Kinder gesund erhalten kĂśnnen. Vieles lernen sie dabei in der Physiotherapiepraxis. Die Familie hat das Privileg, in ihrem eigenen Biorhythmus leben zu kĂśnnen. âDas macht sehr viel aus â wir sind alle gesundâ, sagt Katharina. Der Lern- und Arbeitstag beginnt nicht vor 9 Uhr und hat eine eigene Struktur. Im Tagesablauf sind feste Verantwortlichkeiten integriert. So wechseln sich die Kinder aller drei Tage mit Tischdecken, Staubsaugen und GeschirrspĂźler ab. Das hilft ihnen, sich selbst zu organisieren. Das geht nicht immer reibungslos vonstatten. Wenn das Lernpensum beizeiten abgearbeitet wurde, helfen die Kinder im Haushalt oder Garten oder gehen ihrem Bewegungsdrang auf andere Weise nach. Die Eltern sind am Abend noch länger aktiv, denn die Praxis erfordert noch die eine oder andere bĂźrokratische Pflicht. Die Familie ist sehr naturverbunden. Sie gehen viel in den Wald und in den Garten. Sie bauen selbst GemĂźse und Obst an. Dabei kĂśnnen die Kinder zum Beispiel Erfahrungen mit Permakultur und natĂźrlicher DĂźngung sammeln. Die Familie achtet auf die Ernährung, schlieĂlich ist Katharina seit fast 25 Jahren Ernährungsberaterin. Was sie nicht selbst anbauen, wird beim Bauern des Vertrauens eingekauft. Die Jungs kĂśnnen selbst kochen und backen. Die Schädlichkeit von Zucker ist den Kindern schon bewusst geworden, ohne gänzlich auf Schokolade verzichten zu mĂźssen. Medikamente gibt es im Haushalt nicht. Sie kennen sich sehr gut mit den Heilmitteln aus der Natur aus und kĂśnnen so ihre Selbstheilungskräfte aktivieren. Sie haben keinen Hausarzt. NatĂźrlich hat keines der Kinder ein Handy. Bisher haben sie noch kein Verlangen danach. Die Eltern halten es fĂźr wichtig, dass die Kinder erst sicher bei Selbstorganisation und Tagesstruktur sind, bevor sie ein Handy bekommen. Katharina weist darauf hin, dass beispielsweise WhatsApp erst ab 16 Jahren zugelassen ist, und fragt sich, ob das andere Eltern wissen.
Gesetze auf AugenhĂśhe auslegen
Den BehĂśrden blieben die Freilerner nicht verborgen. Sie wurden aktiv und schalteten das Familiengericht ein. Die Familie hatte keinen Anwalt und keine Rechtsschutzversicherung. Katharina erzählt uns, dass sie schlieĂlich auf âHilfe von obenâ gehofft habe. Irgendwer hat sie anscheinend erhĂśrt, denn sie bekamen âeinen Engelâ als Verfahrensbeistand. Die BehĂśrden waren sehr zugänglich. In den Gesprächen gab man zu, mit der Schulsituation ebenfalls nicht zufrieden zu sein. âWir wollen so wie ihr, dass sich etwas verändert. Wir sind an Eurer Seite.â Die Gespräche mit dem Jugendamt und der Richterin vom Familiengericht Grimma waren immer auf AugenhĂśhe. SchlieĂlich legte man der Familie keine Steine in den Weg. Damit kann Katharina ihr Konzept nach auĂen leben und andere inspirieren. Ihre Schlussfolgerung: Eltern mĂźssen sich ihrer Stärken bewusst werden und aus ihrer Angst herauskommen. Das Konzept muss aber zur Familie passen, denn jede Familie ist anders.
Die Basis fĂźr freies Lernen ist das Vertrauen der Eltern in ihre Kinder. Denn Kinder sind von Natur aus wissbegierig und wollen lernen. Katharina hat viel von Bertrand Stern und von Riccardo Leppe gelernt. Beiden wurde von ihren Eltern das Lernen ohne Schulbesuch ermĂśglicht. Mit Bertrand Stern hat Katharina Kontakt. Er wird im November am BuĂ- und Bettag eine kleine Fortbildung im Therapie- und Seminarzentrum geben. FĂźr den Vorabend ist ein Vortrag geplant. Katharina zitiert Riccardo Leppe: âEs ändert sich nur was, wenn man es selbst tut.â Er sei sich sicher, dass der Fortschritt beim Freilernen inzwischen so weit ist, dass âdie Paste nicht wieder zurĂźck in die Tube gehtâ.
Der Ăbergang zur Berufsausbildung
Die ersten Freilernerkinder kommen jetzt in das Alter, in dem sie eine Berufsausbildung beginnen kĂśnnen. Aurelius und Benjamin, die beiden âGroĂenâ, machen seit Anfang des Jahres schon erste Praktika bei ortsansässigen Handwerksbetrieben. Beide Seiten sind sehr zufrieden. Durch die Praktika, die länger dauern als im schulischen Lehrplan vorgesehen, kĂśnnen sich die Kinder ausprobieren. Katharina findet es interessant miterleben zu dĂźrfen, wie auf ihre Kinder reagiert wird. Bringen sie etwas mit, das die anderen nicht haben? Denken sie anders mit? Benjamin bekam schon ein Angebot, in einem Metallbau-Betrieb stundenweise mitzuarbeiten. In den Betrieben weiĂ man, dass die AbschlĂźsse der staatlichen Schulen grĂśĂtenteils das Papier nicht wert sind, auf dem sie stehen. Viele verlassen die Schule und kĂśnnen kaum lesen und schreiben, von Selbstorganisation ganz zu schweigen. Ein Freilerner kann eine staatliche Externen-PrĂźfung ablegen, um einen Haupt- oder Realschulabschluss zu erwerben. Katharina: âFĂźr eine Ausbildung bei einem privaten Unternehmer braucht man das nicht, allein der Unternehmer entscheidet Ăźber die Aufnahme des Auszubildendenâ. AuĂerdem stehen den jungen Leuten Privatschulen oder der zweite Bildungsweg zur VerfĂźgung. Wenn man einen praktischen Beruf ergreift, ist es immer noch mĂśglich, sich bis zur Hochschulreife weiterzubilden. Nach mehrjährigen Tätigkeiten kann man bei den Kammern von Industrie, Handel und Handwerk (IHK und HWK) eine AbschlussprĂźfung ablegen, mit der man zum Studium zugelassen werden kann. Oder man geht gleich den Weg in die Selbstständigkeit.
Frei lernen weitergedacht
Während der Coronazeit haben sich in Sachsen und speziell um Leipzig herum kleine Freilernergruppen gefunden. Die Gruppen werden aktuell zusammengefĂźhrt, um zum Beispiel gemeinsam den Mathematikunterricht zu gestalten. Besonders um Dresden herum ist die Szene noch stärker ausgeprägt. AuĂerdem gibt es seit mehr als 20 Jahren den Bundesverband NatĂźrlich Lernen (BVNL). Er bietet Beratung und zentrale Veranstaltungen an.
Der Wunsch nach dem freien Lernen ohne Schulzwang ist groĂ. Doch die meisten Eltern wollen ihre Kinder dafĂźr irgendwo abgeben und nicht selbst unterrichten. Katharinas grĂśĂter Wunsch ist es, drei bis fĂźnf Elternpaare zu finden, die sich in die Betreuung und Unterrichtung ihrer Kinder teilen. Das grĂśĂte Hindernis dafĂźr sieht sie in den Eltern selbst. Durch ungelĂśste transgenerative Konflikte und unverarbeitete Familientraumata kommen sie noch nicht in ihre eigene Kraft fĂźr ein selbstbestimmtes Leben. Viele wagen es noch nicht, ihre Erwerbstätigkeit zugunsten der Kinder einzuschränken. Katharina sieht es als groĂe Aufgabe fĂźr sich und ihre Familie, mit dem Freilernen das Gemeinschaftsbewusstsein und gute KonfliktlĂśsungsstrategien zu entwickeln. Sie denkt dabei bereits an ihre Enkel. Aber sie weiĂ auch, dass die Eltern ein sehr hohes MaĂ an Eigeninitiative, Motivation und Selbstdisziplin aufbringen mĂźssen. Sie wĂźrde Eltern, die sich das noch nicht zutrauen, als Traumabegleiterin zur VerfĂźgung stehen, fĂźr einen angemessenen Energieausgleich. Diese gegenseitige UnterstĂźtzung käme Kindern und Eltern zugute. Ebenso hält sie die Idee der Mehrgenerationenerziehung fĂźr wichtig. Dabei profitieren nicht nur die Kinder. Die Erfahrungen der älteren Menschen gehen nicht verloren, sondern werden an die jĂźngeren Generationen weitergegeben und machen sie resilienter. Das hilft den Eltern, ihrer Erwerbsarbeit nachzugehen und Familientraumata zu bewältigen.
Katharina ist eine starke Frau und sprĂźht nur so vor Energie. Selbst als wir nach 21 Uhr das Therapiezentrum verlassen, sind ihr die Anstrengungen des Tages nicht anzumerken. Sie wird nicht mĂźde beim Sprechen. FĂźr Fragen zum Thema Freilernen kann man sich an sie wenden.
Der Text wurde zuerst am 27.05.2025 im Blog âFreie Akademie fĂźr Medien und Journalismusâ verĂśffentlicht (https://www.freie-medienakademie.de/medien-plus/lernen-neu-gemacht)
Bildquelle: Salah Darwish, unsplash.com
-
@ 9e69e420:d12360c2
2025-01-19 04:48:31A new report from the National Sports Shooting Foundation (NSSF) shows that civilian firearm possession exceeded 490 million in 2022. The total from 1990 to 2022 is estimated at 491.3 million firearms. In 2022, over ten million firearms were domestically produced, leading to a total of 16,045,911 firearms available in the U.S. market.
Of these, 9,873,136 were handguns, 4,195,192 were rifles, and 1,977,583 were shotguns. Handgun availability aligns with the concealed carry and self-defense market, as all states allow concealed carry, with 29 having constitutional carry laws.
-
@ cae03c48:2a7d6671
2025-05-28 06:00:48Bitcoin Magazine
President Trump Supports Strategic Bitcoin Reserve Bill, Senator Lummis SaysToday at the Bitcoin 2025 Conference in Las Vegas, Nevada, US Senator Cynthia Lummis of Wyoming, Senator Marsha Blackburn of Tennessee, and Senator Jim Justice of West Virginia, took the stage to give updates on federal and state level Bitcoin adoption in the United States.
JUST IN:
Senator Cynthia Lummis said US military generals are "big supporters" of a Strategic Bitcoin Reserve for economic power. pic.twitter.com/2RPMV3tbdA
â Bitcoin Magazine (@BitcoinMagazine) May 27, 2025
Cynthia Lummis announced that President Donald Trump is supportive of her Strategic Bitcoin Reserve Act, which would see the United States purchase 1,000,000 BTC, among other pro-Bitcoin and stablecoin legislation.Â
âPresident Trump supports the bill,â she stated. âAnd he has a team in the White House working on digital assets â everything from stablecoins to market structure to Bitcoin Strategic Reserve. And they will probably roll out in that order.â
âStates have always been the incubators of innovation,â Lummis said. âSenator Justice was the Governor of West Virginia, Senator Blackburn will be the next Governor of Tennessee. The states are where the innovation is occurring.â
âSo you have Arizona, Texas and New Hampshire that passed Strategic Bitcoin Reserve bills this year,â she continued. â30 states consider Strategic Bitcoin Reserves. We have the United Arab Emirates purchasing Bitcoin through American exchange traded funds â thatâs good for America.â
Senator Blackburn echoed Lummisâ statements, sharing her thoughts on how other countries will follow the United States in their adoption of Bitcoin.
âMany of our allies follow what we do,â Blackburn said. âEverybody wants to be a part of of our market, they want to be a part of our trade. And they will follow what we do. And as Senator Lummis said, we already see countries that are establishing these reserves. So it is vitally important that we hold this as a portion of our reserves.â
Justice emphasized that to be successful, âwe have got to get the economics right. Many people ask me many times as Governor, âwhatâs the most important thing you do?â And Iâll promise you this, itâs all about the economics.âÂ
Justice then went on to explain that when the average, everyday person is using Bitcoin to purchase their necessities, that legislation will start âhappening at light speedâ, because politicians want to get re-elected and therefore must follow the will of the people.
You can watch the full panel discussion and the rest of the Bitcoin 2025 Conference Industry Day below:
This post President Trump Supports Strategic Bitcoin Reserve Bill, Senator Lummis Says first appeared on Bitcoin Magazine and is written by Nik.
-
@ 3770c235:16042bcc
2025-05-28 05:54:01** Introduction: The Neon Pulse of Las Vegas
**Itâs 2:30 AM on a Tuesday. The Strip hums with laughter, clinking glasses, and the occasional Elvis impersonator. A group of friends stumbles out of a nightclub, squinting under the glow of a Las Vegas billboard that screams, âHungry? $5 Pancakes â 1 Block Right!â Ten minutes later, theyâre drowning their late-night cravings in syrup.This isnât luckâitâs Las Vegas billboards doing what they do best: working while the rest of the world sleeps. In a city where the party never stops, these glowing giants are the ultimate salespeople. Letâs dive into why Las Vegas billboards outshine traditional ads and how your business can ride their 24/7 energy wave.
** Why Las Vegas Billboards Never Take a Coffee Break
** 1. Tourists Donât Have Bedtimes (and Neither Do Billboards)
- 42 million visitors flock to Vegas yearly. Theyâre sipping margaritas at noon, gambling at midnight, and shopping at 3 AM.
- Las Vegas billboards near hotspots like the Bellagio Fountains or Fremont Street catch eyes round the clock.Real Story:
A donut shop owner named Luis rented a billboard near the âWelcome to Vegasâ sign. His message? âJet Lagged? Sugar Fix Open 24/7!â Sales tripledâespecially between 1 AM and 4 AM.** 2. You Canât âSkipâ a Billboard
** - Imagine this: Youâre stuck in traffic on the Strip. Your phoneâs dead. That Las Vegas billboard for air-conditioned massages? Itâs your lifeline.
- Compare that to online ads: 47% of people skip them, and TikTok ads vanish in a scroll.- Vegas Thrives on Impulse
- Billboards tap into spontaneous decisions:
- âLetâs try that rooftop bar!â
- âWait, free slot play? Letâs U-turn!â
- Traditional ads (like radio spots) fade fast. Billboards linger, nudging tourists to act now.
** 5 Reasons Your Business Needs a Vegas Billboard
** 1. Size Matters (And So Does Flash)
- Strip billboards can be taller than a 5-story building.
- Digital screens use LEDs so bright, theyâre visible from space.Pro Tip:
A casino added fake âsmokeâ effects to their billboard for a Halloween promo. Traffic backed up for selfiesâand bookings spiked.- No Language Barrier
- Vegas draws visitors from Tokyo, Berlin, SĂŁo Paulo...
- A Las Vegas billboard with a giant cocktail emoji? Universal for âDrinks here!â
Case Study:
A Korean BBQ spot used a billboard of sizzling meat. No words. Just smoke visuals. Tourists followed the âaromaâ straight to their door.- Theyâre Always in the Right Place, Right Time
- 6 AM: Joggers see smoothie ads.
- 3 PM: Pool partiers spot âFree Margaritaâ promos.
-
Midnight: Hangover clinics whisper, âWeâve got IVs.â
-
Instant Trust Boost
- A tiny online ad says âstartup.â A glowing billboard says, âWeâre Vegas royalty.â
Jakeâs Win:
Jakeâs tiny magic shop rented a billboard reading, âReal TricksâCheaper Than the Casino!â Tourists treated him like David Blaine.- QR Codes = Instant Customers
- âScan for free parking!â â 1,000 scans in a weekend.
- âTap to call a limoâ â Rides booked before the light turns green.
** How to Make Your Vegas Billboard Irresistible
** Step 1: Claim Your Territory
- The Strip: Pricey but prime ($15kâ$60k/month).
- Fremont Street: Quirky, cheaper ($5kâ$20k), packed with partiers.
- Highway 15: Target road-trippers with âAlmost There! Cold Beer Ahead!âStep 2: Keep It Stupid Simple
- Bad: âExperience Culinary Excellence at Our Artisanal Bistro!â
- Good: â24/7 Bacon Pancakes â Exit Here.âMariaâs Hack:
Mariaâs tattoo parlor used a billboard with a flaming skull and three words: âWalk-Ins Welcome.â No phone number. âPeople just⌠show up,â she laughs.Step 3: Track Your Wins (Like a Vegas High Roller)
- QR Codes: âScan for Free Slot Play!â â Track scans.
- Unique URLs: âVisit VegasPizza24.comâ â Monitor traffic.
- Old-School: Count foot traffic. (âDid that bachelor party just roll in from our billboard? Yes.â)**FAQs ** 1. âHow do I even measure if my billboardâs working? Itâs not like online ads!â
Answer:
Youâre rightâitâs not just clicks and likes. But hereâs how real businesses track success:
- QR Codes: Add a unique code like âScan for Free Appetizer!â Track scans.
- Promo Codes: âMention this billboard for 20% off!â (Works great for Uber drivers: âMy passengers blurt it out mid-ride,â says driver Luis M.)
- Foot Traffic Spikes: Note sales surges after your ad goes live. A dispensary saw a 60% bump in visits after their âWeâre Closer Than the Casino!â billboard.
- Social Media Tags: Encourage selfies with your billboard. A retro motel offered a free pool pass for tagged photos. Their Instagram exploded.- âArenât billboards old-school? My Gen Z customers live on TikTok!â
Answer:
Billboards in Vegas are anything but old-school. Hereâs why: - Hybrid Campaigns: Pair billboards with geofenced mobile ads. Example: A billboard for a pool party says, âScan to Pre-Order Drinks.â Users nearby get a TikTok-style ad on their phone.
- Instagrammable Designs: Quirky billboards go viral. The âWelcome to Vegasâ sign is the most Instagrammed spot in the city. Mimic that vibe!
- Influencer Collabs: Pay a Vegas influencer to pose with your billboard. Their followers will hunt it down like a scavenger hunt.
Real Story:
A vintage clothing storeâs billboard (âFind Your Retro Vibe â 2 Blocks Eastâ) became a TikTok trend after a local influencer did a âthrift haulâ video there.** 3. âWhatâs the biggest mistake businesses make with Vegas billboards?â
** Answer:
Trying to cram in too much info! Drivers have 5â7 seconds to read your ad. Avoid:
- Text Overload: âGrand Opening! 50% Off! Open 24/7! Call Now!â â Too much!
- Bland Designs: Gray text on a gray background? Yawn.
- Ignoring Locals: Tourists are 70% of viewers, but locals matter too. A gymâs billboard said, âTired of Tourists? Work Out in Peace.â Memberships spiked.Fix It:
- Use 7 words max.
- Bold colors (red, yellow, neon pink).
- Add a clear call to action: âTurn Right Now!â or âScan for Free Parking.â- âDo I need a permit? What if my ad gets rejected?â
Answer:
Yep, permits are a thing. The city bans: - Flashing Lights Near Residences: No strobes in suburban areas.
- Certain Content: No swear words, adult themes, or political fights.
How to Avoid Rejection:
- Work with local Outdoor Advertising companiesâthey know the rules.
- Submit designs early. One pizza jointâs ad was flagged for a pepperoni slice deemed âtoo suggestive.â They swapped it to a cheese pull⌠and it got approved.Conclusion: Let Your Business Shine All Night Long
At 5 AM, as the sun peeks over the desert, the Las Vegas billboards keep glowing. Theyâve sold midnight pancakes, inspired shotgun weddings, and even talked someone out of a questionable tattoo (âWait! Our Parlorâs Better â Next Exitâ).These arenât just adsâtheyâre part of Vegasâ heartbeat. So whether youâre slinging sushi, massages, or monster truck rides, remember: In a city that never sleeps, your billboard shouldnât either.
Ready to Light Up the Night?
Find Las Vegas billboards near you today. And if you spot one that says, âFree High-Fives for Readers of This Article,â honk twice. Itâs probably yours. -
@ 21810ca8:f2e8341e
2025-05-28 08:10:53Ich bin neu bei Nostr und versuche mich hier rein zu fuchsen. Kann das einer sehen? Und dann habe ich noch viele Fragen
Gibt es gute Marktplätze wie ebay oder ebay kleinanzeigen wo man stink normale dinge und kram von zuhause gegen sat verkaufen kann.
-
@ f9cf4e94:96abc355
2025-01-18 06:09:50Para esse exemplo iremos usar: | Nome | Imagem | Descrição | | --------------- | ------------------------------------------------------------ | ------------------------------------------------------------ | | Raspberry PI B+ |
| Cortex-A53 (ARMv8) 64-bit a 1.4GHz e 1 GB de SDRAM LPDDR2, | | Pen drive |
| 16Gb |
Recomendo que use o Ubuntu Server para essa instalação. VocĂŞ pode baixar o Ubuntu para Raspberry Pi aqui. O passo a passo para a instalação do Ubuntu no Raspberry Pi estĂĄ disponĂvel aqui. NĂŁo instale um desktop (como xubuntu, lubuntu, xfce, etc.).
Passo 1: Atualizar o Sistema đĽď¸
Primeiro, atualize seu sistema e instale o Tor:
bash apt update apt install tor
Passo 2: Criar o Arquivo de Serviço
nrs.service
đ§Crie o arquivo de serviço que vai gerenciar o servidor Nostr. VocĂŞ pode fazer isso com o seguinte conteĂşdo:
```unit [Unit] Description=Nostr Relay Server Service After=network.target
[Service] Type=simple WorkingDirectory=/opt/nrs ExecStart=/opt/nrs/nrs-arm64 Restart=on-failure
[Install] WantedBy=multi-user.target ```
Passo 3: Baixar o BinĂĄrio do Nostr đ
Baixe o binĂĄrio mais recente do Nostr aqui no GitHub.
Passo 4: Criar as Pastas NecessĂĄrias đ
Agora, crie as pastas para o aplicativo e o pendrive:
bash mkdir -p /opt/nrs /mnt/edriver
Passo 5: Listar os Dispositivos Conectados đ
Para saber qual dispositivo vocĂŞ vai usar, liste todos os dispositivos conectados:
bash lsblk
Passo 6: Formatando o Pendrive đž
Escolha o pendrive correto (por exemplo,
/dev/sda
) e formate-o:bash mkfs.vfat /dev/sda
Passo 7: Montar o Pendrive đť
Monte o pendrive na pasta
/mnt/edriver
:bash mount /dev/sda /mnt/edriver
Passo 8: Verificar UUID dos Dispositivos đ
Para garantir que o sistema monte o pendrive automaticamente, liste os UUID dos dispositivos conectados:
bash blkid
Passo 9: Alterar o
fstab
para Montar o Pendrive AutomĂĄticamente đAbra o arquivo
/etc/fstab
e adicione uma linha para o pendrive, com o UUID que vocĂŞ obteve no passo anterior. A linha deve ficar assim:fstab UUID=9c9008f8-f852 /mnt/edriver vfat defaults 0 0
Passo 10: Copiar o BinĂĄrio para a Pasta Correta đĽ
Agora, copie o binĂĄrio baixado para a pasta
/opt/nrs
:bash cp nrs-arm64 /opt/nrs
Passo 11: Criar o Arquivo de Configuração đ ď¸
Crie o arquivo de configuração com o seguinte conteúdo e salve-o em
/opt/nrs/config.yaml
:yaml app_env: production info: name: Nostr Relay Server description: Nostr Relay Server pub_key: "" contact: "" url: http://localhost:3334 icon: https://external-content.duckduckgo.com/iu/?u= https://public.bnbstatic.com/image/cms/crawler/COINCU_NEWS/image-495-1024x569.png base_path: /mnt/edriver negentropy: true
Passo 12: Copiar o Serviço para o DiretĂłrio de Systemd âď¸
Agora, copie o arquivo
nrs.service
para o diretĂłrio/etc/systemd/system/
:bash cp nrs.service /etc/systemd/system/
Recarregue os serviços e inicie o serviço
nrs
:bash systemctl daemon-reload systemctl enable --now nrs.service
Passo 13: Configurar o Tor đ
Abra o arquivo de configuração do Tor
/var/lib/tor/torrc
e adicione a seguinte linha:torrc HiddenServiceDir /var/lib/tor/nostr_server/ HiddenServicePort 80 127.0.0.1:3334
Passo 14: Habilitar e Iniciar o Tor đ§
Agora, ative e inicie o serviço Tor:
bash systemctl enable --now tor.service
O Tor irå gerar um endereço
.onion
para o seu servidor Nostr. VocĂŞ pode encontrĂĄ-lo no arquivo/var/lib/tor/nostr_server/hostname
.
Observaçþes â ď¸
- Com essa configuração, os dados serão salvos no pendrive, enquanto o binårio ficarå no cartão SD do Raspberry Pi.
- O endereço
.onion
do seu servidor Nostr serĂĄ algo como:ws://y3t5t5wgwjif<exemplo>h42zy7ih6iwbyd.onion
.
Agora, seu servidor Nostr deve estar configurado e funcionando com Tor! đĽł
Se este artigo e as informaçþes aqui contidas forem úteis para você, convidamos a considerar uma doação ao autor como forma de reconhecimento e incentivo à produção de novos conteúdos.
-
@ 9c9d2765:16f8c2c2
2025-05-28 05:42:53CHAPTER THIRTY ONE
One quiet evening, as the golden hues of sunset spilled across the office, James found himself standing by the door of Ritaâs private workspace. He knocked gently.
She looked up, startled but composed. âJames,â she said softly, setting her pen down.
âMay I?â he asked, motioning to the chair across from her desk.
She nodded, her expression unreadable. âOf course.â
There was a brief silence, heavy but not uncomfortable. Then James leaned forward, his voice low and sincere.
âRita⌠I never hated you,â he began. âNot even for a moment.â
Her eyes flickered, and she looked away, blinking fast. âYou should have,â she replied. âI believed lies, I stood by while they treated you like nothing. I wasâ her voice cracked, âI was a coward.â
âNo,â James shook his head. âYou were misled. Just like I was, at one point, about the people I trusted.â
He paused, choosing his words carefully. âBut everything I did building JP back from ruins, exposing the ones who tried to destroy us, it was never about revenge. It was about finding the truth, and⌠hoping that maybe, there was still something worth saving between us.â
Tears welled in her eyes, and for the first time in a long time, she didnât hide them. âDo you really believe we can go back to what we had?â
James offered a small, tender smile. âNo. But maybe we can build something new. Something stronger this time with no secrets, no walls.â
That night marked a shift. Rita and James didnât rush back into love, but they started anew with honesty. Slowly, they began to reconnect over coffee breaks, shared boardroom victories, and late-night reflections.
Meanwhile, the cityâs perception of James continued to evolve. He became a keynote speaker at leadership summits, not for his wealth, but for his story. His life, once the subject of cruel gossip, became a testament to resilience, clarity, and vision.
Even the youngest interns in JP Enterprises admired him, not just as a CEO, but as a symbol of what it meant to stand upright in a world eager to bring you down.
Back in the shadows, Mark and Helen's trial proceeded. Witnesses testified, evidence was overwhelming, and public opinion had fully turned against them. Their fall from grace was not swift but it was absolute.
One morning, as James read the headlines declaring Mark and Helen guilty on multiple charges, he simply folded the paper and sipped his tea. There was no celebration. No smirk of triumph.
Only peace.
âDo you still think about the past?â Ritaâs voice was soft, almost swallowed by the crackling of the fireplace in the private lounge of JP Towers.
James, seated across from her with a warm mug in his hand, raised his eyes to meet hers. The flicker of flames cast shadows on the polished walls, painting a solemn reflection of everything they'd endured.
âI do,â he admitted, his tone neither bitter nor nostalgic. âNot because I want to relive it but because it reminds me how far weâve come. How far Iâve come.â
Rita nodded slowly, her eyes glistening beneath the soft glow. âI think about it too,â she confessed. âEvery time I walk past the corridors, or sit at my desk⌠I remember the days I watched you walk these halls like a ghost. Silenced. Humiliated. And I did nothing.â
James leaned back slightly, inhaling deeply. âYou did what you thought was right then,â he said with a hint of melancholy. âWe were both just trying to survive the storm.â
There was a long pause. Outside, the city pulsed with its usual life, unaware of the quiet reconciliation happening several floors above.
âBut survival isnât living,â she said at last, her voice steadier now. âAnd I want to live, James. I want to find joy again⌠with you, if you'll let me.â
Her words hung in the air like fragile glass. James was silent, studying her. This wasnât the composed, dutiful woman who once echoed the will of her family. This was someone stripped of expectations, speaking from a place of sincerity.
âI wonât promise perfection,â James said after a beat. âBut Iâll promise honesty. Loyalty. Peace. No masks. No power games. Just us healing, rebuilding, slowly.â
She exhaled in relief, the corners of her lips lifting slightly. âThen letâs take the first step.â
They stood, a little uncertain, but walked side by side to the balcony overlooking the city that once spat on him, that now bowed to his vision. Rita slipped her hand into his, and this time, James didnât pull away.
MeanwhileâŚ
The consequences of Mark and Helenâs conspiracy deepened. Investigative journalists began digging further into their past activities, frauds, embezzlements, manipulations. Their names were now synonymous with disgrace in the business world.
The court trials were intense. Mark, once smug and untouchable, appeared gaunt, stripped of the charisma that used to command a room. Helen, on the other hand, wore arrogance like a decaying crown still trying to act superior even when the evidence against her mounted beyond redemption.
And in every newspaper, every media report, James's name was cleared. He had not only reclaimed his honor but redefined what it meant to rise from ruin.
JP Enterprises, now entering its new era of innovation and social impact, had become more than just a corporation it had become a beacon. Business leaders from around the world sought Jamesâs insight. Young entrepreneurs quoted him in lectures and motivational events. And amidst all this, James remained centered because his heart no longer ached with resentment.
The courtroom was saturated with an electrifying silence. The once-glorious reputations of Mark and Helen now hung like withered banners in the wind tattered by deceit, dishonor, and damning evidence. As the judge stepped into the chamber, all eyes turned, yet Markâs once-confident gaze had diminished into a hollow stare. Helen, dressed in muted tones as if mourning her own prestige, sat rigidly beside him, still refusing to acknowledge the gravity of their downfall.
âFor crimes including corporate fraud, defamation, bribery, and obstruction of justice,â the judgeâs voice echoed through the courtroom, âthis court finds the defendants, Mark Harrison and Helen Ray, guilty on all counts.â
-
@ 6389be64:ef439d32
2025-01-16 15:44:06Black Locust can grow up to 170 ft tall
Grows 3-4 ft. per year
Native to North America
Cold hardy in zones 3 to 8
Firewood
- BLT wood, on a pound for pound basis is roughly half that of Anthracite Coal
- Since its growth is fast, firewood can be plentiful
Timber
- Rot resistant due to a naturally produced robinin in the wood
- 100 year life span in full soil contact! (better than cedar performance)
- Fence posts
- Outdoor furniture
- Outdoor decking
- Sustainable due to its fast growth and spread
- Can be coppiced (cut to the ground)
- Can be pollarded (cut above ground)
- Its dense wood makes durable tool handles, boxes (tool), and furniture
- The wood is tougher than hickory, which is tougher than hard maple, which is tougher than oak.
- A very low rate of expansion and contraction
- Hardwood flooring
- The highest tensile beam strength of any American tree
- The wood is beautiful
Legume
- Nitrogen fixer
- Fixes the same amount of nitrogen per acre as is needed for 200-bushel/acre corn
- Black walnuts inter-planted with locust as ânurseâ trees were shown to rapidly increase their growth [[Clark, Paul M., and Robert D. Williams. (1978) Black walnut growth increased when interplanted with nitrogen-fixing shrubs and trees. Proceedings of the Indiana Academy of Science, vol. 88, pp. 88-91.]]
Bees
- The edible flower clusters are also a top food source for honey bees
Shade Provider
- Its light, airy overstory provides dappled shade
- Planted on the west side of a garden it provides relief during the hottest part of the day
- (nitrogen provider)
- Planted on the west side of a house, its quick growth soon shades that side from the sun
Wind-break
- Fast growth plus it's feathery foliage reduces wind for animals, crops, and shelters
Fodder
- Over 20% crude protein
- 4.1 kcal/g of energy
- Baertsche, S.R, M.T. Yokoyama, and J.W. Hanover (1986) Short rotation, hardwood tree biomass as potential ruminant feed-chemical composition, nylon bag ruminal degradation and ensilement of selected species. J. Animal Sci. 63 2028-2043
-
@ 6389be64:ef439d32
2025-01-14 01:31:12Bitcoin is more than money, more than an asset, and more than a store of value. Bitcoin is a Prime Mover, an enabler and it ignites imaginations. It certainly fueled an idea in my mind. The idea integrates sensors, computational prowess, actuated machinery, power conversion, and electronic communications to form an autonomous, machined creature roaming forests and harvesting the most widespread and least energy-dense fuel source available. I call it the Forest Walker and it eats wood, and mines Bitcoin.
I know what you're thinking. Why not just put Bitcoin mining rigs where they belong: in a hosted facility sporting electricity from energy-dense fuels like natural gas, climate-controlled with excellent data piping in and out? Why go to all the trouble building a robot that digests wood creating flammable gasses fueling an engine to run a generator powering Bitcoin miners? It's all about synergy.
Bitcoin mining enables the realization of multiple, seemingly unrelated, yet useful activities. Activities considered un-profitable if not for Bitcoin as the Prime Mover. This is much more than simply mining the greatest asset ever conceived by humankind. Itâs about the power of synergy, which Bitcoin plays only one of many roles. The synergy created by this system can stabilize forests' fire ecology while generating multiple income streams. Thatâs the realistic goal here and requires a brief history of American Forest management before continuing.
Smokey The Bear
In 1944, the Smokey Bear Wildfire Prevention Campaign began in the United States. âOnly YOU can prevent forest firesâ remains the refrain of the Ad Councilâs longest running campaign. The Ad Council is a U.S. non-profit set up by the American Association of Advertising Agencies and the Association of National Advertisers in 1942. It would seem that the U.S. Department of the Interior was concerned about pesky forest fires and wanted them to stop. So, alongside a national policy of extreme fire suppression they enlisted the entire U.S. population to get onboard via the Ad Council and it worked. Forest fires were almost obliterated and everyone was happy, right? Wrong.
Smokey is a fantastically successful bear so forest fires became so few for so long that the fuel load - dead wood - in forests has become very heavy. So heavy that when a fire happens (and they always happen) it destroys everything in its path because the more fuel there is the hotter that fire becomes. Trees, bushes, shrubs, and all other plant life cannot escape destruction (not to mention homes and businesses). The soil microbiology doesnât escape either as it is burned away even in deeper soils. To add insult to injury, hydrophobic waxy residues condense on the soil surface, forcing water to travel over the ground rather than through it eroding forest soils. Good job, Smokey. Well done, Sir!
Most terrestrial ecologies are âfire ecologiesâ. Fire is a part of these systemsâ fuel load and pest management. Before we pretended to âmanageâ millions of acres of forest, fires raged over the world, rarely damaging forests. The fuel load was always too light to generate fires hot enough to moonscape mountainsides. Fires simply burned off the minor amounts of fuel accumulated since the fire before. The lighter heat, smoke, and other combustion gasses suppressed pests, keeping them in check and the smoke condensed into a plant growth accelerant called wood vinegar, not a waxy cap on the soil. These fires also cleared out weak undergrowth, cycled minerals, and thinned the forest canopy, allowing sunlight to penetrate to the forest floor. Without a fireâs heat, many pine tree species canât sow their seed. The heat is required to open the cones (the seed bearing structure) of Spruce, Cypress, Sequoia, Jack Pine, Lodgepole Pine and many more. Without fire forests canât have babies. The idea was to protect the forests, and it isn't working.
So, in a world of fire, what does an ally look like and what does it do?
Meet The Forest Walker
For the Forest Walker to work as a mobile, autonomous unit, a solid platform that can carry several hundred pounds is required. It so happens this chassis already exists but shelved.
Introducing the Legged Squad Support System (LS3). A joint project between Boston Dynamics, DARPA, and the United States Marine Corps, the quadrupedal robot is the size of a cow, can carry 400 pounds (180 kg) of equipment, negotiate challenging terrain, and operate for 24 hours before needing to refuel. Yes, it had an engine. Abandoned in 2015, the thing was too noisy for military deployment and maintenance "under fire" is never a high-quality idea. However, we can rebuild it to act as a platform for the Forest Walker; albeit with serious alterations. It would need to be bigger, probably. Carry more weight? Definitely. Maybe replace structural metal with carbon fiber and redesign much as 3D printable parts for more effective maintenance.
The original system has a top operational speed of 8 miles per hour. For our purposes, it only needs to move about as fast as a grazing ruminant. Without the hammering vibrations of galloping into battle, shocks of exploding mortars, and drunken soldiers playing "Wrangler of Steel Machines", time between failures should be much longer and the overall energy consumption much lower. The LS3 is a solid platform to build upon. Now it just needs to be pulled out of the mothballs, and completely refitted with outboard equipment.
The Small Branch Chipper
When I say âForest fuel loadâ I mean the dead, carbon containing litter on the forest floor. Duff (leaves), fine-woody debris (small branches), and coarse woody debris (logs) are the fuel that feeds forest fires. Walk through any forest in the United States today and you will see quite a lot of these materials. Too much, as I have described. Some of these fuel loads can be 8 tons per acre in pine and hardwood forests and up to 16 tons per acre at active logging sites. Thatâs some big wood and the more that collects, the more combustible danger to the forest it represents. It also provides a technically unlimited fuel supply for the Forest Walker system.
The problem is that this detritus has to be chewed into pieces that are easily ingestible by the system for the gasification process (weâll get to that step in a minute). What we need is a wood chipper attached to the chassis (the LS3); its âmouthâ.
A small wood chipper handling material up to 2.5 - 3.0 inches (6.3 - 7.6 cm) in diameter would eliminate a substantial amount of fuel. There is no reason for Forest Walker to remove fallen trees. It wouldnât have to in order to make a real difference. It need only identify appropriately sized branches and grab them. Once loaded into the chipperâs intake hopper for further processing, the beast can immediately look for more âfoodâ. This is essentially kindling that would help ignite larger logs. If itâs all consumed by Forest Walker, then itâs not present to promote an aggravated conflagration.
I have glossed over an obvious question: How does Forest Walker see and identify branches and such? LiDaR (Light Detection and Ranging) attached to Forest Walker images the local area and feed those data to onboard computers for processing. Maybe AI plays a role. Maybe simple machine learning can do the trick. One thing is for certain: being able to identify a stick and cause robotic appendages to pick it up is not impossible.
Great! We now have a quadrupedal robot autonomously identifying and âeatingâ dead branches and other light, combustible materials. Whilst strolling through the forest, depleting future fires of combustibles, Forest Walker has already performed a major function of this system: making the forest safer. It's time to convert this low-density fuel into a high-density fuel Forest Walker can leverage. Enter the gasification process.
The Gassifier
The gasifier is the heart of the entire system; itâs where low-density fuel becomes the high-density fuel that powers the entire system. Biochar and wood vinegar are process wastes and Iâll discuss why both are powerful soil amendments in a moment, but first, whatâs gasification?
Reacting shredded carbonaceous material at high temperatures in a low or no oxygen environment converts the biomass into biochar, wood vinegar, heat, and Synthesis Gas (Syngas). Syngas consists primarily of hydrogen, carbon monoxide, and methane. All of which are extremely useful fuels in a gaseous state. Part of this gas is used to heat the input biomass and keep the reaction temperature constant while the internal combustion engine that drives the generator to produce electrical power consumes the rest.
Critically, this gasification process is âcontinuous feedâ. Forest Walker must intake biomass from the chipper, process it to fuel, and dump the waste (CO2, heat, biochar, and wood vinegar) continuously. It cannot stop. Everything about this system depends upon this continual grazing, digestion, and excretion of wastes just as a ruminal does. And, like a ruminant, all waste products enhance the local environment.
When I first heard of gasification, I didnât believe that it was real. Running an electric generator from burning wood seemed more akin to âconspiracy fantasyâ than science. Not only is gasification real, itâs ancient technology. A man named Dean Clayton first started experiments on gasification in 1699 and in 1901 gasification was used to power a vehicle. By the end of World War II, there were 500,000 Syngas powered vehicles in Germany alone because of fossil fuel rationing during the war. The global gasification market was $480 billion in 2022 and projected to be as much as $700 billion by 2030 (Vantage Market Research). Gasification technology is the best choice to power the Forest Walker because itâs self-contained and we want its waste products.
Biochar: The Waste
Biochar (AKA agricultural charcoal) is fairly simple: itâs almost pure, solid carbon that resembles charcoal. Its porous nature packs large surface areas into small, 3 dimensional nuggets. Devoid of most other chemistry, like hydrocarbons (methane) and ash (minerals), biochar is extremely lightweight. Do not confuse it with the charcoal you buy for your grill. Biochar doesnât make good grilling charcoal because it would burn too rapidly as it does not contain the multitude of flammable components that charcoal does. Biochar has several other good use cases. Water filtration, water retention, nutrient retention, providing habitat for microscopic soil organisms, and carbon sequestration are the main ones that we are concerned with here.
Carbon has an amazing ability to adsorb (substances stick to and accumulate on the surface of an object) manifold chemistries. Water, nutrients, and pollutants tightly bind to carbon in this format. So, biochar makes a respectable filter and acts as a âbatteryâ of water and nutrients in soils. Biochar adsorbs and holds on to seven times its weight in water. Soil containing biochar is more drought resilient than soil without it. Adsorbed nutrients, tightly sequestered alongside water, get released only as plants need them. Plants must excrete protons (H+) from their roots to disgorge water or positively charged nutrients from the biochar's surface; it's an active process.
Biocharâs surface area (where adsorption happens) can be 500 square meters per gram or more. That is 10% larger than an official NBA basketball court for every gram of biochar. Biocharâs abundant surface area builds protective habitats for soil microbes like fungi and bacteria and many are critical for the health and productivity of the soil itself.
The âcarbon sequestrationâ component of biochar comes into play where âcarbon creditsâ are concerned. There is a financial market for carbon. Not leveraging that market for revenue is foolish. I am climate agnostic. All I care about is that once solid carbon is inside the soil, it will stay there for thousands of years, imparting drought resiliency, fertility collection, nutrient buffering, and release for that time span. I simply want as much solid carbon in the soil because of the undeniably positive effects it has, regardless of any climactic considerations.
Wood Vinegar: More Waste
Another by-product of the gasification process is wood vinegar (Pyroligneous acid). If you have ever seen Liquid Smoke in the grocery store, then you have seen wood vinegar. Principally composed of acetic acid, acetone, and methanol wood vinegar also contains ~200 other organic compounds. It would seem intuitive that condensed, liquefied wood smoke would at least be bad for the health of all living things if not downright carcinogenic. The counter intuition wins the day, however. Wood vinegar has been used by humans for a very long time to promote digestion, bowel, and liver health; combat diarrhea and vomiting; calm peptic ulcers and regulate cholesterol levels; and a host of other benefits.
For centuries humans have annually burned off hundreds of thousands of square miles of pasture, grassland, forest, and every other conceivable terrestrial ecosystem. Why is this done? After every burn, one thing becomes obvious: the almost supernatural growth these ecosystems exhibit after the burn. How? Wood vinegar is a component of this growth. Even in open burns, smoke condenses and infiltrates the soil. That is when wood vinegar shows its quality.
This stuff beefs up not only general plant growth but seed germination as well and possesses many other qualities that are beneficial to plants. Itâs a pesticide, fungicide, promotes beneficial soil microorganisms, enhances nutrient uptake, and imparts disease resistance. I am barely touching a long list of attributes here, but you want wood vinegar in your soil (alongside biochar because it adsorbs wood vinegar as well).
The Internal Combustion Engine
Conversion of grazed forage to chemical, then mechanical, and then electrical energy completes the cycle. The ICE (Internal Combustion Engine) converts the gaseous fuel output from the gasifier to mechanical energy, heat, water vapor, and CO2. Itâs the mechanical energy of a rotating drive shaft that we want. That rotation drives the electric generator, which is the heartbeat we need to bring this monster to life. Luckily for us, combined internal combustion engine and generator packages are ubiquitous, delivering a defined energy output given a constant fuel input. Itâs the simplest part of the system.
The obvious question here is whether the amount of syngas provided by the gasification process will provide enough energy to generate enough electrons to run the entire system or not. While I have no doubt the energy produced will run Forest Walker's main systems the question is really about the electrons left over. Will it be enough to run the Bitcoin mining aspect of the system? Everything is a budget.
CO2 Production For Growth
Plants are lollipops. No matter if itâs a tree or a bush or a shrubbery, the entire thing is mostly sugar in various formats but mostly long chain carbohydrates like lignin and cellulose. Plants need three things to make sugar: CO2, H2O and light. In a forest, where tree densities can be quite high, CO2 availability becomes a limiting growth factor. Itâd be in the forest interests to have more available CO2 providing for various sugar formation providing the organism with food and structure.
An odd thing about tree leaves, the openings that allow gasses like the ever searched for CO2 are on the bottom of the leaf (these are called stomata). Not many stomata are topside. This suggests that trees and bushes have evolved to find gasses like CO2 from below, not above and this further suggests CO2 might be in higher concentrations nearer the soil.
The soil life (bacterial, fungi etc.) is constantly producing enormous amounts of CO2 and it would stay in the soil forever (eventually killing the very soil life that produces it) if not for tidal forces. Water is everywhere and whether in pools, lakes, oceans or distributed in âmoistâ soils water moves towards to the moon. The water in the soil and also in the water tables below the soil rise toward the surface every day. When the water rises, it expels the accumulated gasses in the soil into the atmosphere and itâs mostly CO2. Itâs a good bet on how leaves developed high populations of stomata on the underside of leaves. As the water relaxes (the tide goes out) it sucks oxygenated air back into the soil to continue the functions of soil life respiration. The soil âbreathesâ albeit slowly.
The gasses produced by the Forest Walkerâs internal combustion engine consist primarily of CO2 and H2O. Combusting sugars produce the same gasses that are needed to construct the sugars because the universe is funny like that. The Forest Walker is constantly laying down these critical construction elements right where the trees need them: close to the ground to be gobbled up by the trees.
The Branch Drones
During the last ice age, giant mammals populated North America - forests and otherwise. Mastodons, woolly mammoths, rhinos, short-faced bears, steppe bison, caribou, musk ox, giant beavers, camels, gigantic ground-dwelling sloths, glyptodons, and dire wolves were everywhere. Many were ten to fifteen feet tall. As they crashed through forests, they would effectively cleave off dead side-branches of trees, halting the spread of a ground-based fire migrating into the tree crown ("laddering") which is a death knell for a forest.
These animals are all extinct now and forests no longer have any manner of pruning services. But, if we build drones fitted with cutting implements like saws and loppers, optical cameras and AI trained to discern dead branches from living ones, these drones could effectively take over pruning services by identifying, cutting, and dropping to the forest floor, dead branches. The dropped branches simply get collected by the Forest Walker as part of its continual mission.
The drones dock on the back of the Forest Walker to recharge their batteries when low. The whole scene would look like a grazing cow with some flies bothering it. This activity breaks the link between a relatively cool ground based fire and the tree crowns and is a vital element in forest fire control.
The Bitcoin Miner
Mining is one of four monetary incentive models, making this system a possibility for development. The other three are US Dept. of the Interior, township, county, and electrical utility company easement contracts for fuel load management, global carbon credits trading, and data set sales. All the above depends on obvious questions getting answered. I will list some obvious ones, but this is not an engineering document and is not the place for spreadsheets. How much Bitcoin one Forest Walker can mine depends on everything else. What amount of biomass can we process? Will that biomass flow enough Syngas to keep the lights on? Can the chassis support enough mining ASICs and supporting infrastructure? What does that weigh and will it affect field performance? How much power can the AC generator produce?
Other questions that are more philosophical persist. Even if a single Forest Walker can only mine scant amounts of BTC per day, that pales to how much fuel material it can process into biochar. We are talking about millions upon millions of forested acres in need of fuel load management. What can a single Forest Walker do? I am not thinking in singular terms. The Forest Walker must operate as a fleet. What could 50 do? 500?
What is it worth providing a service to the world by managing forest fuel loads? Providing proof of work to the global monetary system? Seeding soil with drought and nutrient resilience by the excretion, over time, of carbon by the ton? What did the last forest fire cost?
The Mesh Network
What could be better than one bitcoin mining, carbon sequestering, forest fire squelching, soil amending behemoth? Thousands of them, but then they would need to be able to talk to each other to coordinate position, data handling, etc. Fitted with a mesh networking device, like goTenna or Meshtastic LoRa equipment enables each Forest Walker to communicate with each other.
Now we have an interconnected fleet of Forest Walkers relaying data to each other and more importantly, aggregating all of that to the last link in the chain for uplink. Well, at least Bitcoin mining data. Since block data is lightweight, transmission of these data via mesh networking in fairly close quartered environs is more than doable. So, how does data transmit to the Bitcoin Network? How do the Forest Walkers get the previous block data necessary to execute on mining?
Back To The Chain
Getting Bitcoin block data to and from the network is the last puzzle piece. The standing presumption here is that wherever a Forest Walker fleet is operating, it is NOT within cell tower range. We further presume that the nearest Walmart Wi-Fi is hours away. Enter the Blockstream Satellite or something like it.
A separate, ground-based drone will have two jobs: To stay as close to the nearest Forest Walker as it can and to provide an antennae for either terrestrial or orbital data uplink. Bitcoin-centric data is transmitted to the "uplink drone" via the mesh networked transmitters and then sent on to the uplink and the whole flow goes in the opposite direction as well; many to one and one to many.
We cannot transmit data to the Blockstream satellite, and it will be up to Blockstream and companies like it to provide uplink capabilities in the future and I don't doubt they will. Starlink you say? Whatâs stopping that company from filtering out block data? Nothing because itâs Starlinkâs system and they could decide to censor these data. It seems we may have a problem sending and receiving Bitcoin data in back country environs.
But, then again, the utility of this system in staunching the fuel load that creates forest fires is extremely useful around forested communities and many have fiber, Wi-Fi and cell towers. These communities could be a welcoming ground zero for first deployments of the Forest Walker system by the home and business owners seeking fire repression. In the best way, Bitcoin subsidizes the safety of the communities.
Sensor Packages
LiDaR
The benefit of having a Forest Walker fleet strolling through the forest is the never ending opportunity for data gathering. A plethora of deployable sensors gathering hyper-accurate data on everything from temperature to topography is yet another revenue generator. Data is valuable and the Forest Walker could generate data sales to various government entities and private concerns.
LiDaR (Light Detection and Ranging) can map topography, perform biomass assessment, comparative soil erosion analysis, etc. It so happens that the Forest Walkerâs ability to âsee,â to navigate about its surroundings, is LiDaR driven and since itâs already being used, we can get double duty by harvesting that data for later use. By using a laser to send out light pulses and measuring the time it takes for the reflection of those pulses to return, very detailed data sets incrementally build up. Eventually, as enough data about a certain area becomes available, the data becomes useful and valuable.
Forestry concerns, both private and public, often use LiDaR to build 3D models of tree stands to assess the amount of harvest-able lumber in entire sections of forest. Consulting companies offering these services charge anywhere from several hundred to several thousand dollars per square kilometer for such services. A Forest Walker generating such assessments on the fly while performing its other functions is a multi-disciplinary approach to revenue generation.
pH, Soil Moisture, and Cation Exchange Sensing
The Forest Walker is quadrupedal, so there are four contact points to the soil. Why not get a pH data point for every step it takes? We can also gather soil moisture data and cation exchange capacities at unheard of densities because of sampling occurring on the fly during commission of the systemâs other duties. No one is going to build a machine to do pH testing of vast tracts of forest soils, but that doesnât make the data collected from such an endeavor valueless. Since the Forest Walker serves many functions at once, a multitude of data products can add to the return on investment component.
Weather Data
Temperature, humidity, pressure, and even data like evapotranspiration gathered at high densities on broad acre scales have untold value and because the sensors are lightweight and donât require large power budgets, they come along for the ride at little cost. But, just like the old mantra, âgas, grass, or ass, nobody rides for freeâ, these sensors provide potential revenue benefits just by them being present.
Iâve touched on just a few data genres here. In fact, the question for universities, governmental bodies, and other institutions becomes, âHow much will you pay us to attach your sensor payload to the Forest Walker?â
Noise Suppression
Only you can prevent Metallica filling the surrounds with 120 dB of sound. Easy enough, just turn the car stereo off. But what of a fleet of 50 Forest Walkers operating in the backcountry or near a township? 500? 5000? Each one has a wood chipper, an internal combustion engine, hydraulic pumps, actuators, and more cooling fans than you can shake a stick at. Itâs a walking, screaming fire-breathing dragon operating continuously, day and night, twenty-four hours a day, three hundred sixty-five days a year. The sound will negatively affect all living things and that impacts behaviors. Serious engineering consideration and prowess must deliver a silencing blow to the major issue of noise.
It would be foolish to think that a fleet of Forest Walkers could be silent, but if not a major design consideration, then the entire idea is dead on arrival. Townships would not allow them to operate even if they solved the problem of widespread fuel load and neither would governmental entities, and rightly so. Nothing, not man nor beast, would want to be subjected to an eternal, infernal scream even if it were to end within days as the fleet moved further away after consuming what it could. Noise and heat are the only real pollutants of this system; taking noise seriously from the beginning is paramount.
Fire Safety
A âfire-breathing dragonâ is not the worst description of the Forest Walker. It eats wood, combusts it at very high temperatures and excretes carbon; and it does so in an extremely flammable environment. Bad mix for one Forest Walker, worse for many. One must take extreme pains to ensure that during normal operation, a Forest Walker could fall over, walk through tinder dry brush, or get pounded into the ground by a meteorite from Krypton and it wouldnât destroy epic swaths of trees and baby deer. I envision an ultimate test of a prototype to include dowsing it in grain alcohol while itâs wrapped up in toilet paper like a pledge at a fraternity party. If it runs for 72 hours and doesnât set everything on fire, then maybe outside entities wonât be fearful of something that walks around forests with a constant fire in its belly.
The Wrap
How we think about what can be done with and adjacent to Bitcoin is at least as important as Bitcoinâs economic standing itself. For those who will tell me that this entire idea is without merit, I say, âOK, fine. You can come up with something, too.â What can we plug Bitcoin into that, like a battery, makes something that does not work, work? Thatâs the lesson I get from this entire exercise. No one was ever going to hire teams of humans to go out and "clean the forest". There's no money in that. The data collection and sales from such an endeavor might provide revenues over the break-even point but investment demands Alpha in this day and age. But, plug Bitcoin into an almost viable system and, voilĂ ! We tip the scales to achieve lift-off.
Letâs face it, we havenât scratched the surface of Bitcoinâs forcing function on our minds. Not because itâs Bitcoin, but because of what that invention means. The question that pushes me to approach things this way is, âwhat can we create that one systemâs waste is another systemâs feedstock?â The Forest Walker systemâs only real waste is the conversion of low entropy energy (wood and syngas) into high entropy energy (heat and noise). All other output is beneficial to humanity.
Bitcoin, I believe, is the first product of a new mode of human imagination. An imagination newly forged over the past few millennia of being lied to, stolen from, distracted and otherwise mis-allocated to a black hole of the nonsensical. We are waking up.
What I have presented is not science fiction. Everything I have described here is well within the realm of possibility. The question is one of viability, at least in terms of the detritus of the old world we find ourselves departing from. This system would take a non-trivial amount of time and resources to develop. I think the system would garner extensive long-term contracts from those who have the most to lose from wildfires, the most to gain from hyperaccurate data sets, and, of course, securing the most precious asset in the world. Many may not see it that way, for they seek Alpha and are therefore blind to other possibilities. Others will see only the possibilities; of thinking in a new way, of looking at things differently, and dreaming of what comes next.
-
@ 9c9d2765:16f8c2c2
2025-05-28 05:22:33In a quiet village nestled between forest and field, lived a boy named Ezekiel. From birth, he was surrounded by a warm family, playful siblings, and neighbors who always had a story to share. Ezekiel never knew silence, and because of that, he never valued voices. To him, connection was like air everywhere, constant, and unnoticed.
One summer, Ezekiel decided to explore the woods beyond the hills, chasing the thrill of adventure. He wandered farther than he ever had, until the trees thickened and the path thinned into nothing. A sudden storm rolled in. Rain blurred the forest, and Ezekiel lost his way. He sought shelter in a small, abandoned stone hut beside a dried-up well.
The storm passed, but no path appeared. Days turned to weeks. His voice echoed off the stone, unanswered. The silence was no longer peaceful; it was heavy, like a weight pressing on his soul. He learned to survive on roots and rainwater. But loneliness is true, aching loneliness clung to him. He spoke to the walls, to the trees, to the echo in the well, but nothing replied.
One day, while resting against the well, Ezekiel whispered, âI miss them.â
And for the first time, he meant it.
Not just missed their presence but their interruptions, their noise, even their complaints. He missed being seen, and seeing. He understood now: connection wasnât just comfort. It was color, depth, meaning.
Weeks later, a group of searchers found him thin, dirty, but alive. When he returned, everything was the same, but Ezekiel was not.
He listened differently. Hugged longer. Remembered peopleâs names, stories, and silences. He no longer saw connection as a given, but a gift.
And every year, he visited the well not to mourn the solitude, but to thank it. For in its quiet, he learned the true value of every voice he once ignored.
Moral: To cherish connection, you must understand solitude not as punishment, but as teacher.
-
@ e3ba5e1a:5e433365
2025-01-13 16:47:27My blog posts and reading material have both been on a decidedly economics-heavy slant recently. The topic today, incentives, squarely falls into the category of economics. However, when I say economics, Iâm not talking about âanalyzing supply and demand curves.â Iâm talking about the true basis of economics: understanding how human beings make decisions in a world of scarcity.
A fair definition of incentive is âa reward or punishment that motivates behavior to achieve a desired outcome.â When most people think about economic incentives, theyâre thinking of money. If I offer my son $5 if he washes the dishes, Iâm incentivizing certain behavior. We canât guarantee that heâll do what I want him to do, but we can agree that the incentive structure itself will guide and ultimately determine what outcome will occur.
The great thing about monetary incentives is how easy they are to talk about and compare. âWould I rather make $5 washing the dishes or $10 cleaning the gutters?â But much of the world is incentivized in non-monetary ways too. For example, using the âpunishmentâ half of the definition above, I might threaten my son with losing Nintendo Switch access if he doesnât wash the dishes. No money is involved, but Iâm still incentivizing behavior.
And there are plenty of incentives beyond our direct control! My son is also incentivized to not wash dishes because itâs boring, or because he has some friends over that he wants to hang out with, or dozens of other things. Ultimately, the conflicting array of different incentive structures placed on him will ultimately determine what actions he chooses to take.
Why incentives matter
A phrase I see often in discussionsâwhether they are political, parenting, economic, or businessâis âif they could just doâŚâ Each time I see that phrase, I cringe a bit internally. Usually, the underlying assumption of the statement is âif people would behave contrary to their incentivized behavior then things would be better.â For example:
- If my kids would just go to bed when I tell them, they wouldnât be so cranky in the morning.
- If people would just use the recycling bin, we wouldnât have such a landfill problem.
- If people would just stop being lazy, our team would deliver our project on time.
In all these cases, the speakers are seemingly flummoxed as to why the people in question donât behave more rationally. The problem is: each group is behaving perfectly rationally.
- The kids have a high time preference, and care more about the joy of staying up now than the crankiness in the morning. Plus, they donât really suffer the consequences of morning crankiness, their parents do.
- No individual suffers much from their individual contribution to a landfill. If they stopped growing the size of the landfill, it would make an insignificant difference versus the amount of effort they need to engage in to properly recycle.
- If a team doesnât properly account for the productivity of individuals on a project, each individual receives less harm from their own inaction. Sure, the project may be delayed, company revenue may be down, and they may even risk losing their job when the company goes out of business. But their laziness individually wonât determine the entirety of that outcome. By contrast, they greatly benefit from being lazy by getting to relax at work, go on social media, read a book, or do whatever else they do when theyâre supposed to be working.
My point here is that, as long as you ignore the reality of how incentives drive human behavior, youâll fail at getting the outcomes you want.
If everything I wrote up until now made perfect sense, you understand the premise of this blog post. The rest of it will focus on a bunch of real-world examples to hammer home the point, and demonstrate how versatile this mental model is.
Running a company
Letâs say I run my own company, with myself as the only employee. My personal revenue will be 100% determined by my own actions. If I decide to take Tuesday afternoon off and go fishing, Iâve chosen to lose that afternoonâs revenue. Implicitly, Iâve decided that the enjoyment I get from an afternoon of fishing is greater than the potential revenue. You may think Iâm being lazy, but itâs my decision to make. In this situation, the incentiveâmoneyâis perfectly aligned with my actions.
Compare this to a typical company/employee relationship. I might have a bank of Paid Time Off (PTO) days, in which case once again my incentives are relatively aligned. I know that I can take off 15 days throughout the year, and Iâve chosen to use half a day for the fishing trip. All is still good.
What about unlimited time off? Suddenly incentives are starting to misalign. I donât directly pay a price for not showing up to work on Tuesday. Or Wednesday as well, for that matter. I might ultimately be fired for not doing my job, but that will take longer to work its way through the system than simply not making any money for the day taken off.
Compensation overall falls into this misaligned incentive structure. Letâs forget about taking time off. Instead, I work full time on a software project Iâm assigned. But instead of using the normal toolchain weâre all used to at work, I play around with a new programming language. I get the fun and joy of playing with new technology, and potentially get to pad my resume a bit when Iâm ready to look for a new job. But my current company gets slower results, less productivity, and is forced to subsidize my extracurricular learning.
When a CEO has a bonus structure based on profitability, heâll do everything he can to make the company profitable. This might include things that actually benefit the company, like improving product quality, reducing internal red tape, or finding cheaper vendors. But it might also include destructive practices, like slashing the R\&D budget to show massive profits this year, in exchange for a catastrophe next year when the next version of the product fails to ship.
Or my favorite example. My parents owned a business when I was growing up. They had a back office where they ran operations like accounting. All of the furniture was old couches from our house. After all, any money they spent on furniture came right out of their paychecks! But in a large corporate environment, each department is generally given a budget for office furniture, a budget which doesnât roll over year-to-year. The result? Executives make sure to spend the entire budget each year, often buying furniture far more expensive than they would choose if it was their own money.
There are plenty of details you can quibble with above. Itâs in a companyâs best interest to give people downtime so that they can come back recharged. Having good ergonomic furniture can in fact increase productivity in excess of the money spent on it. But overall, the picture is pretty clear: in large corporate structures, youâre guaranteed to have mismatches between the companyâs goals and the incentive structure placed on individuals.
Using our model from above, we can lament how lazy, greedy, and unethical the employees are for doing what theyâre incentivized to do instead of whatâs right. But thatâs simply ignoring the reality of human nature.
Moral hazard
Moral hazard is a situation where one party is incentivized to take on more risk because another party will bear the consequences. Suppose I tell my son when he turns 21 (or whatever legal gambling age is) that Iâll cover all his losses for a day at the casino, but he gets to keep all the winnings.
What do you think heâs going to do? The most logical course of action is to place the largest possible bets for as long as possible, asking me to cover each time he loses, and taking money off the table and into his bank account each time he wins.
But letâs look at a slightly more nuanced example. I go to a bathroom in the mall. As Iâm leaving, I wash my hands. It will take me an extra 1 second to turn off the water when Iâm done washing. Thatâs a trivial price to pay. If I donât turn off the water, the mall will have to pay for many liters of wasted water, benefiting no one. But I wonât suffer any consequences at all.
This is also a moral hazard, but most people will still turn off the water. Why? Usually due to some combination of other reasons such as:
- Weâre so habituated to turning off the water that we donât even consider not turning it off. Put differently, the mental effort needed to not turn off the water is more expensive than the 1 second of time to turn it off.
- Many of us have been brought up with a deep guilt about wasting resources like water. We have an internal incentive structure that makes the 1 second to turn off the water much less costly than the mental anguish of the waste we created.
- Weâre afraid weâll be caught by someone else and face some kind of social repercussions. (Or maybe more than social. Are you sure there isnât a law against leaving the water tap on?)
Even with all that in place, you may notice that many public bathrooms use automatic water dispensers. Sure, thereâs a sanitation reason for that, but itâs also to avoid this moral hazard.
A common denominator in both of these is that the person taking the action that causes the liability (either the gambling or leaving the water on) is not the person who bears the responsibility for that liability (the father or the mall owner). Generally speaking, the closer together the person making the decision and the person incurring the liability are, the smaller the moral hazard.
Itâs easy to demonstrate that by extending the casino example a bit. I said it was the father who was covering the losses of the gambler. Many children (though not all) would want to avoid totally bankrupting their parents, or at least financially hurting them. Instead, imagine that someone from the IRS shows up at your door, hands you a credit card, and tells you you can use it at a casino all day, taking home all the chips you want. The money is coming from the government. How many people would put any restriction on how much they spend?
And since weâre talking about the government alreadyâŚ
Government moral hazards
As I was preparing to write this blog post, the California wildfires hit. The discussions around those wildfires gave a huge number of examples of moral hazards. I decided to cherry-pick a few for this post.
The first and most obvious one: California is asking for disaster relief funds from the federal government. That sounds wonderful. These fires were a natural disaster, so why shouldnât the federal government pitch in and help take care of people?
The problem is, once again, a moral hazard. In the case of the wildfires, California and Los Angeles both had ample actions they could have taken to mitigate the destruction of this fire: better forest management, larger fire department, keeping the water reservoirs filled, and probably much more that hasnât come to light yet.
If the federal government bails out California, it will be a clear message for the future: your mistakes will be fixed by others. You know what kind of behavior that incentivizes? More risky behavior! Why spend state funds on forest management and extra firefightersâactivities that donât win politicians a lot of votes in generalâwhen you could instead spend it on a football stadium, higher unemployment payments, or anything else, and then let the feds cover the cost of screw-ups.
You may notice that this is virtually identical to the 2008 âtoo big to failâ bail-outs. Wall Street took insanely risky behavior, reaped huge profits for years, and when they eventually got caught with their pants down, the rest of us bailed them out. âPrivatizing profits, socializing losses.â
And hereâs the absolute best part of this: I canât even truly blame either California or Wall Street. (I mean, I do blame them, I think their behavior is reprehensible, but youâll see what I mean.) In a world where the rules of the game implicitly include the bail-out mentality, you would be harming your citizens/shareholders/investors if you didnât engage in that risky behavior. Since everyone is on the hook for those socialized losses, your best bet is to maximize those privatized profits.
Thereâs a lot more to government and moral hazard, but I think these two cases demonstrate the crux pretty solidly. But letâs leave moral hazard behind for a bit and get to general incentivization discussions.
Non-monetary competition
At least 50% of the economics knowledge I have comes from the very first econ course I took in college. That professor was amazing, and had some very colorful stories. I canât vouch for the veracity of the two Iâm about to share, but they definitely drive the point home.
In the 1970s, the US had an oil shortage. To âfixâ this problem, they instituted price caps on gasoline, which of course resulted in insufficient gasoline. To âfixâ this problem, they instituted policies where, depending on your license plate number, you could only fill up gas on certain days of the week. (Irrelevant detail for our point here, but this just resulted in people filling up their tanks more often, no reduction in gas usage.)
Anyway, my professorâs wife had a friend. My professor described in great detail how attractive this woman was. Iâll skip those details here since this is a PG-rated blog. In any event, she never had any trouble filling up her gas tank any day of the week. She would drive up, be told she couldnât fill up gas today, bat her eyes at the attendant, explain how helpless she was, and was always allowed to fill up gas.
This is a demonstration of non-monetary compensation. Most of the time in a free market, capitalist economy, people are compensated through money. When price caps come into play, thereâs a limit to how much monetary compensation someone can receive. And in that case, people find other ways of competing. Like this womanâs case: through using flirtatious behavior to compensate the gas station workers to let her cheat the rules.
The other example was much more insidious. Santa Monica had a problem: it was predominantly wealthy and white. They wanted to fix this problem, and decided to put in place rent controls. After some time, they discovered that Santa Monica had become wealthier and whiter, the exact opposite of their desired outcome. Why would that happen?
Someone investigated, and ended up interviewing a landlady that demonstrated the reason. She was an older white woman, and admittedly racist. Prior to the rent controls, she would list her apartments in the newspaper, and would be legally obligated to rent to anyone who could afford it. Once rent controls were in place, she took a different tact. She knew that she would only get a certain amount for the apartment, and that the demand for apartments was higher than the supply. That meant she could be picky.
She ended up finding tenants through friends-of-friends. Since it wasnât an official advertisement, she wasnât legally required to rent it out if someone could afford to pay. Instead, she got to interview people individually and then make them an offer. Normally, that would have resulted in receiving a lower rental price, but not under rent controls.
So who did she choose? A young, unmarried, wealthy, white woman. It made perfect sense. Women were less intimidating and more likely to maintain the apartment better. Wealthy people, she determined, would be better tenants. (I have no idea if this is true in practice or not, Iâm not a landlord myself.) Unmarried, because no kids running around meant less damage to the property. And, of course, white. Because she was racist, and her incentive structure made her prefer whites.
You can deride her for being racist, I wonât disagree with you. But itâs simply the reality. Under the non-rent-control scenario, her profit motive for money outweighed her racism motive. But under rent control, the monetary competition was removed, and she was free to play into her racist tendencies without facing any negative consequences.
Bureaucracy
These were the two examples I remember for that course. But non-monetary compensation pops up in many more places. One highly pertinent example is bureaucracies. Imagine you have a government office, or a large corporationâs acquisition department, or the team that apportions grants at a university. In all these cases, you have a group of people making decisions about handing out money that has no monetary impact on them. If they give to the best qualified recipients, they receive no raises. If they spend the money recklessly on frivolous projects, they face no consequences.
Under such an incentivization scheme, thereâs little to encourage the bureaucrats to make intelligent funding decisions. Instead, theyâll be incentivized to spend the money where they recognize non-monetary benefits. This is why itâs so common to hear about expensive meals, gift bags at conferences, and even more inappropriate ways of trying to curry favor with those that hold the purse strings.
Compare that ever so briefly with the purchases made by a small mom-and-pop store like my parents owned. Could my dad take a bribe to buy from a vendor whoâs ripping him off? Absolutely he could! But heâd lose more on the deal than heâd make on the bribe, since heâs directly incentivized by the deal itself. It would make much more sense for him to go with the better vendor, save $5,000 on the deal, and then treat himself to a lavish $400 meal to celebrate.
Government incentivized behavior
This post is getting longer in the tooth than Iâd intended, so Iâll finish off with this section and make it a bit briefer. Beyond all the methods mentioned above, government has another mechanism for modifying behavior: through directly changing incentives via legislation, regulation, and monetary policy. Letâs see some examples:
- Artificial modification of interest rates encourages people to take on more debt than they would in a free capital market, leading to malinvestment and a consumer debt crisis, and causing the boom-bust cycle we all painfully experience.
- Going along with that, giving tax breaks on interest payments further artificially incentivizes people to take on debt that they wouldnât otherwise.
- During COVID-19, at some points unemployment benefits were greater than minimum wage, incentivizing people to rather stay home and not work than get a job, leading to reduced overall productivity in the economy and more printed dollars for benefits. In other words, it was a perfect recipe for inflation.
- The tax code gives deductions to âhelpâ people. That might be true, but the real impact is incentivizing people to make decisions they wouldnât have otherwise. For example, giving out tax deductions on children encourages having more kids. Tax deductions on childcare and preschools incentivizes dual-income households. Whether or not you like the outcomes, itâs clear that itâs government thatâs encouraging these outcomes to happen.
- Tax incentives cause people to engage in behavior they wouldnât otherwise (daycare+working mother, for example).
- Inflation means that the value of your money goes down over time, which encourages people to spend more today, when their money has a larger impact. (Milton Friedman described this as high living.)
Conclusion
The idea here is simple, and fully encapsulated in the title: incentives determine outcomes. If you want to know how to get a certain outcome from others, incentivize them to want that to happen. If you want to understand why people act in seemingly irrational ways, check their incentives. If youâre confused why leaders (and especially politicians) seem to engage in destructive behavior, check their incentives.
We can bemoan these realities all we want, but they are realities. While there are some people who have a solid internal moral and ethical code, and that internal code incentivizes them to behave against their externally-incentivized interests, those people are rare. And frankly, those people are self-defeating. People should take advantage of the incentives around them. Because if they donât, someone else will.
(If you want a literary example of that last comment, see the horse in Animal Farm.)
How do we improve the world under these conditions? Make sure the incentives align well with the overall goals of society. To me, itâs a simple formula:
- Focus on free trade, value for value, as the basis of a society. In that system, people are always incentivized to provide value to other people.
- Reduce the size of bureaucracies and large groups of all kinds. The larger an organization becomes, the farther the consequences of decisions are from those who make them.
- And since the nature of human beings will be to try and create areas where they can control the incentive systems to their own benefits, make that as difficult as possible. That comes in the form of strict limits on government power, for example.
And even if you donât want to buy in to this conclusion, I hope the rest of the content was educational, and maybe a bit entertaining!
-
@ 6e0ea5d6:0327f353
2025-05-28 04:34:08Ascolta bene! It is more dignified to thirst alone in the desert than to share wine with someone who has no thirst for conquest.
On the silent path to success, itâs not the declared enemies who slow the march, but rather the friends. Not the noble or loyal ones, but the failuresâthose who carry a dull glint in their eyes, chronic laziness in their spirit, and the eternal excuse of bad luck in their pockets. Friendship, when poorly chosen, becomes a polished anchor, tied to your ankle with ropes named camaraderie.
Nothing weighs heavier on the journey than having to endure the failed and envious around you. It is a kind of emotional parasitism that begins with empathy and ends in stagnation. Those who live among the weak will crawl. Those who keep company with miserable friends, instead of striving to prosper, learn to curse wealthânot out of ethics, but out of envy. Mediocrity, my friend, is contagious. And it does not take root suddenly, but like a silent epidemic.
Ambitionâthat fire that burns in the bones of great menâwill always seem like arrogance to the ears of the failed. Those who have never built anything, except arguments to justify their paralysis, will never understand the fury of someone born to conquer. And so, with smiles, they spit venom: âCalm down,â they say, âbe content,â they advise. Hypocrites. What they call humility is nothing more than resignation to their own defeat.
To walk alone, with hunger and honor, is worth more than feasting at lavish tables at the cost of your own sweat, surrounded by parasites who toast your downfall with glasses full of praise. No one prospers where the conversation is filled with complaints, criticism, and envy. What does not build up, corrodes.
The rust of the weak is invisible at firstâa bitter joke here, a veiled critique there. And before you know it, the structure is already rotten. Of the friendship, only the weight remains. Of the relationship, only exhaustion. The true enemy of success is the company of those who have failed and wish for you the same fate. These tragic figuresâalways tired, always victimsâare masters of collective self-sabotage.
Feel no remorse in abandoning those who build nothing and consume everything. And in that abandonment, you become freer, stronger, and unbreakable.
Thank you for reading, my friend!
If this message resonated with you, consider leaving your "đĽ" as a token of appreciation.
A toast to our family!
-
@ 1d7ff02a:d042b5be
2025-05-28 04:02:47For those who still don't truly understand Bitcoin, it means you still don't understand what money is, who creates it, and why humans need money.
It's a scam that the education system doesn't teach this important subject, while we spend almost our entire lives trying to earn money. Therefore, I recommend following the money and studying Bitcoin seriously.
Why Bitcoin Matters
Saving is the greatest discovery in human history
Before humans learned to save, we were just animals living day to day. Saving is what makes humans different from other animals â the ability to think about the future and store for later.
Saving created civilization itself
Without saving, there would be no cities, no science, no art. Everything we call "progress" comes from the ability to save.
Money is the greatest creation in human history
It is the tool that has allowed human civilization to advance to this day. Money is the best tool humans use for saving.
Bitcoin is the best money ever created
It is the most perfect money humans have ever created. No one can control, manipulate, destroy it, and it is truly limited like time in life.
Bitcoin is like a black hole
That will absorb all value from the damaged financial system. It will draw stability and value to itself. Everything of value will flow into Bitcoin eventually.
Bitcoin is like Buddhism discovering truth
It helps understand the root problems of the current financial system and the emergence of many problems in society, just like Buddha who understood all suffering and the causes of suffering.
Bitcoin is freedom
Money is power, money controls human behavior. When we have money that preserves value and cannot be controlled, we will have intellectual freedom, freedom of expression, and the power to choose.
The debt that humanity has created today would take another thousand years to pay off completely
There is no way out and it's heading toward serious collapse. Bitcoin is the light that will help prevent humanity from entering another dark age.
Bitcoin cannot steal your time
It cannot be created from nothing. Every Bitcoin requires real energy and time to create.
Bitcoin is insurance that protects against mismanagement
It helps protect against currency debasement, economic depression, and failed policies. Bitcoin will protect your value.
Bitcoin is going to absorb the world's value
Eventually, Bitcoin will become the store of value for the entire world. It will absorb wealth from all assets, all prices, and all investments.
Exit The Matrix
We live in a financial Matrix. Every day we wake up and go to work, thinking we're building a future for ourselves. But in reality, we're just giving energy to a system that extracts value from us every second. Bitcoin is the red pill â it will open your eyes to see the truth of the financial world. Central banks are the architects of this Matrix â they create money from nothing, and we have to work hard to get it.
The education system has deceived us greatly. They teach us to work for money, but never teach us what money is. We spend 12-16 years in school, then spend our entire lives earning money, but never know what it is, who creates it, and why it has value. This is the biggest scam in human history.
We are taught to be slaves of the system, but not taught to understand the system.
The Bitcoin standard will end war
When you can't print money for war anymore, war becomes too expensive.
We are entering the Bitcoin Renaissance era
An era of financial and intellectual revival. Bitcoin is creating a new class of humans. People who understand and hold Bitcoin will become a new class with true freedom.
The Path to Financial Truth
Follow the money trail and you will see the truth: - Who controls money printing? - Why do prices keep getting higher? - Why are the poor getting poorer and the rich getting richer?
All the answers lie in understanding money and Bitcoin.
Studying Bitcoin is not just about investment â it's about understanding the future of currency and human society.
Don't just work for money. Understand money. Study Bitcoin.
If you don't understand money, you will be a slave to the system forever. If you understand Bitcoin, you will gain freedom.
-
@ 3f770d65:7a745b24
2025-01-12 21:03:36Iâve been using Notedeck for several months, starting with its extremely early and experimental alpha versions, all the way to its current, more stable alpha releases. The journey has been fascinating, as Iâve had the privilege of watching it evolve from a concept into a functional and promising tool.
In its earliest stages, Notedeck was rawâoffering glimpses of its potential but still far from practical for daily use. Even then, the vision behind it was clear: a platform designed to redefine how we interact with Nostr by offering flexibility and power for all users.
I'm very bullish on Notedeck. Why? Because Will Casarin is making it! Duh! đ
Seriously though, if weâre reimagining the web and rebuilding portions of the Internet, itâs important to recognize the potential of Notedeck. If Nostr is reimagining the web, then Notedeck is reimagining the Nostr client.
Notedeck isnât just another Nostr appâitâs more a Nostr browser that functions more like an operating system with micro-apps. How cool is that?
Much like how Google's Chrome evolved from being a web browser with a task manager into ChromeOS, a full blown operating system, Notedeck aims to transform how we interact with the Nostr. It goes beyond individual apps, offering a foundation for a fully integrated ecosystem built around Nostr.
As a Nostr evangelist, I love to scream INTEROPERABILITY and tout every application's integrations. Well, Notedeck has the potential to be one of the best platforms to showcase these integrations in entirely new and exciting ways.
Do you want an Olas feed of images? Add the media column.
Do you want a feed of live video events? Add the zap.stream column.
Do you want Nostr Nests or audio chats? Add that column to your Notedeck.
Git? Email? Books? Chat and DMs? It's all possible.
Not everyone wants a super app though, and thatâs okay. As with most things in the Nostr ecosystem, flexibility is key. Notedeck gives users the freedom to choose how they engage with itâwhether itâs simply following hashtags or managing straightforward feeds. You'll be able to tailor Notedeck to fit your needs, using it as extensively or minimally as you prefer.
Notedeck is designed with a local-first approach, utilizing Nostr content stored directly on your device via the local nostrdb. This will enable a plethora of advanced tools such as search and filtering, the creation of custom feeds, and the ability to develop personalized algorithms across multiple Notedeck micro-applicationsâall with unparalleled flexibility.
Notedeck also supports multicast. Let's geek out for a second. Multicast is a method of communication where data is sent from one source to multiple destinations simultaneously, but only to devices that wish to receive the data. Unlike broadcast, which sends data to all devices on a network, multicast targets specific receivers, reducing network traffic. This is commonly used for efficient data distribution in scenarios like streaming, conferencing, or large-scale data synchronization between devices.
In a local first world where each device holds local copies of your nostr nodes, and each device transparently syncs with each other on the local network, each node becomes a backup. Your data becomes antifragile automatically. When a node goes down it can resync and recover from other nodes. Even if not all nodes have a complete collection, negentropy can pull down only what is needed from each device. All this can be done without internet.
-Will Casarin
In the context of Notedeck, multicast would allow multiple devices to sync their Nostr nodes with each other over a local network without needing an internet connection. Wild.
Notedeck aims to offer full customization too, including the ability to design and share custom skins, much like Winamp. Users will also be able to create personalized columns and, in the future, share their setups with others. This opens the door for power users to craft tailored Nostr experiences, leveraging their expertise in the protocol and applications. By sharing these configurations as "Starter Decks," they can simplify onboarding and showcase the best of Nostrâs ecosystem.
Nostrâs âOther Stuffâ can often be difficult to discover, use, or understand. Many users doesn't understand or know how to use web browser extensions to login to applications. Let's not even get started with nsecbunkers. Notedeck will address this challenge by providing a native experience that brings these lesser-known applications, tools, and content into a user-friendly and accessible interface, making exploration seamless. However, that doesn't mean Notedeck should disregard power users that want to use nsecbunkers though - hint hint.
For anyone interested in watching Nostr be developed live, right before your very eyes, Notedeckâs progress serves as a reminder of whatâs possible when innovation meets dedication. The current alpha is already demonstrating its ability to handle complex use cases, and Iâm excited to see how it continues to grow as it moves toward a full release later this year.
-
@ 0d97beae:c5274a14
2025-01-11 16:52:08This article hopes to complement the article by Lyn Alden on YouTube: https://www.youtube.com/watch?v=jk_HWmmwiAs
The reason why we have broken money
Before the invention of key technologies such as the printing press and electronic communications, even such as those as early as morse code transmitters, gold had won the competition for best medium of money around the world.
In fact, it was not just gold by itself that became money, rulers and world leaders developed coins in order to help the economy grow. Gold nuggets were not as easy to transact with as coins with specific imprints and denominated sizes.
However, these modern technologies created massive efficiencies that allowed us to communicate and perform services more efficiently and much faster, yet the medium of money could not benefit from these advancements. Gold was heavy, slow and expensive to move globally, even though requesting and performing services globally did not have this limitation anymore.
Banks took initiative and created derivatives of gold: paper and electronic money; these new currencies allowed the economy to continue to grow and evolve, but it was not without its dark side. Today, no currency is denominated in gold at all, money is backed by nothing and its inherent value, the paper it is printed on, is worthless too.
Banks and governments eventually transitioned from a money derivative to a system of debt that could be co-opted and controlled for political and personal reasons. Our money today is broken and is the cause of more expensive, poorer quality goods in the economy, a larger and ever growing wealth gap, and many of the follow-on problems that have come with it.
Bitcoin overcomes the "transfer of hard money" problem
Just like gold coins were created by man, Bitcoin too is a technology created by man. Bitcoin, however is a much more profound invention, possibly more of a discovery than an invention in fact. Bitcoin has proven to be unbreakable, incorruptible and has upheld its ability to keep its units scarce, inalienable and counterfeit proof through the nature of its own design.
Since Bitcoin is a digital technology, it can be transferred across international borders almost as quickly as information itself. It therefore severely reduces the need for a derivative to be used to represent money to facilitate digital trade. This means that as the currency we use today continues to fare poorly for many people, bitcoin will continue to stand out as hard money, that just so happens to work as well, functionally, along side it.
Bitcoin will also always be available to anyone who wishes to earn it directly; even China is unable to restrict its citizens from accessing it. The dollar has traditionally become the currency for people who discover that their local currency is unsustainable. Even when the dollar has become illegal to use, it is simply used privately and unofficially. However, because bitcoin does not require you to trade it at a bank in order to use it across borders and across the web, Bitcoin will continue to be a viable escape hatch until we one day hit some critical mass where the world has simply adopted Bitcoin globally and everyone else must adopt it to survive.
Bitcoin has not yet proven that it can support the world at scale. However it can only be tested through real adoption, and just as gold coins were developed to help gold scale, tools will be developed to help overcome problems as they arise; ideally without the need for another derivative, but if necessary, hopefully with one that is more neutral and less corruptible than the derivatives used to represent gold.
Bitcoin blurs the line between commodity and technology
Bitcoin is a technology, it is a tool that requires human involvement to function, however it surprisingly does not allow for any concentration of power. Anyone can help to facilitate Bitcoin's operations, but no one can take control of its behaviour, its reach, or its prioritisation, as it operates autonomously based on a pre-determined, neutral set of rules.
At the same time, its built-in incentive mechanism ensures that people do not have to operate bitcoin out of the good of their heart. Even though the system cannot be co-opted holistically, It will not stop operating while there are people motivated to trade their time and resources to keep it running and earn from others' transaction fees. Although it requires humans to operate it, it remains both neutral and sustainable.
Never before have we developed or discovered a technology that could not be co-opted and used by one person or faction against another. Due to this nature, Bitcoin's units are often described as a commodity; they cannot be usurped or virtually cloned, and they cannot be affected by political biases.
The dangers of derivatives
A derivative is something created, designed or developed to represent another thing in order to solve a particular complication or problem. For example, paper and electronic money was once a derivative of gold.
In the case of Bitcoin, if you cannot link your units of bitcoin to an "address" that you personally hold a cryptographically secure key to, then you very likely have a derivative of bitcoin, not bitcoin itself. If you buy bitcoin on an online exchange and do not withdraw the bitcoin to a wallet that you control, then you legally own an electronic derivative of bitcoin.
Bitcoin is a new technology. It will have a learning curve and it will take time for humanity to learn how to comprehend, authenticate and take control of bitcoin collectively. Having said that, many people all over the world are already using and relying on Bitcoin natively. For many, it will require for people to find the need or a desire for a neutral money like bitcoin, and to have been burned by derivatives of it, before they start to understand the difference between the two. Eventually, it will become an essential part of what we regard as common sense.
Learn for yourself
If you wish to learn more about how to handle bitcoin and avoid derivatives, you can start by searching online for tutorials about "Bitcoin self custody".
There are many options available, some more practical for you, and some more practical for others. Don't spend too much time trying to find the perfect solution; practice and learn. You may make mistakes along the way, so be careful not to experiment with large amounts of your bitcoin as you explore new ideas and technologies along the way. This is similar to learning anything, like riding a bicycle; you are sure to fall a few times, scuff the frame, so don't buy a high performance racing bike while you're still learning to balance.
-
@ cae03c48:2a7d6671
2025-05-28 04:00:33Bitcoin Magazine
Steak ân Shake Reveals Bitcoin Payment Success at Bitcoin 2025 ConferenceSpeaking at the Bitcoin 2025 Conference this morning, Steak ân Shake executive Dan Edwards shared new data and insights from the companyâs recent move to accept Bitcoin payments globally via the Lightning Network.Â
JUST IN: Fast food giant Steak 'n Shake announced they're saving 50% in processing fees accepting Bitcoin payments
'#Bitcoin is faster than credit cards'
pic.twitter.com/bxApgBL6El
â Bitcoin Magazine (@BitcoinMagazine) May 27, 2025
âOn May 16, we began accepting Bitcoin as payment in all of our locations where permitted to do so by law,â Edwards began. âThis is a global implementation.âÂ
According to Edwards, Bitcoin transactions are already outperforming expectations. âThe day we launched Bitcoin, 1 out of every 500 bitcoin transactions in the world happened at Steak ân Shake,â he said.Â
Steak ân Shake is also saving significantly on processing fees. âBitcoin is faster than credit cards, and when customers choose to pay in Bitcoin, weâre saving 50% in processing fees,â said Edwards. âThat makes Bitcoin a win for the customer, a win for us, and a win for the Bitcoin community.âÂ
He emphasized that the decision was not a publicity stunt, but a serious payment upgrade. âWe didnât see this as a marketing gimmick. We saw it as a viable option to payâon par with other globally accepted methods.âÂ
The company reports that customer behavior has already shifted. âWeâve seen a sustained spike since adding Bitcoin,â Edwards noted.Â
Edwards also teased the companyâs future plans, calling for more technical talent. âWeâre not done. Weâre investing in cyber chefs, autonomous drives, AI techâand we need engineers to help us build it.âÂ
To celebrate Bitcoin integration, limited-edition Bitcoin-themed menu items are launching this week in Las Vegas, including the Bitcoin Burger, Super-Sized Bitcoin Meal, and Bitcoin Milkshake. A âblockchain menuâ is also in the works.Â
âCelebrate the use of Bitcoin,â Edwards concluded. âBecause this is just the beginning.â
This post Steak ân Shake Reveals Bitcoin Payment Success at Bitcoin 2025 Conference first appeared on Bitcoin Magazine and is written by Jenna Montgomery.