-
@ bf47c19e:c3d2573b
2025-06-03 09:55:46Sjajan niz o toksičnom Bitkoin maksimalizmu kojim sam bio toliko oduševljen da sam ga preveo i okačio na sajt.
There’s a tired argument that never seems to die:
— Not that Elon. 🍆🍊💊💎🙌🏻 (@Eggplant_Elon) June 1, 2025
“Toxic Bitcoin maximalism is hurting Bitcoin.”
But they’ve misunderstood something fundamental.
Toxic Bitcoin maximalism is a biological necessity. Let me explain.
A 🧵👇
Postoji stari argument koji izgleda da nikada ne odumire:
"Toksični Bitkoin maksimalizam šteti Bitkoinu."
Ali su pogrešno shvatili nešto što je osnovno.
Toksični Bitkoin maksimalizam je biološka neophodnost. Dozvolite mi da objasnim.
Priroda se ne izvinjava zbog svojih branilaca.
U svetu prirode, odbrana nije učtiva.
Ona je brutalna, specijalizovana i neumoljiva.
Ako pogledamo kolonije eusocijalnih insekata: mrave, termite, pčele...
Svaki od ovih organizama ima svoju vojničku kastu. Sterilna, hiperspecijalizovana stvorenja su evoluirala sa jednom svrhom: da odbrane koloniju po svaku cenu.
Mravi-vojnici ne idu u potragu za hranom. Ne razmnožavaju se. Ne pregovaraju.
Oni ubijaju uljeze. Brzo. Bez milosti. Bez kajanja.
To je ono što rade Bitkoin maksimalisti.
Oni identifikuju ideološke pretnje i eliminišu ih.
Ako unesete laži, šibicarenje ili razvodnjavanje u diskurs, oni se udružuju u roj.
Ujedaju. Sravniće vaš narativ sa zemljom.
Oni su odgovor imunog sistema.
Ovo se ogleda u odgovorima Bitkoin maksimalista na:
- promotere šitkoina
- obmanjujuće narative o skalabilnosti, potrošnji energije ili inflaciji ponude novčića
- pokušaje da se promene pravila Bitkoin konsenzusa
Oni ne pokušavaju da prvo "edukuju".
Oni se najpre brane.
Edukacija je sporedna, ponekada opciona. Ako donesete zarazu u koloniju, bićete odstranjeni.
Termiti-vojnici su toliko posvećeni svojoj ulozi da su neki od njih postali skloni samouništenju, bukvalno eksplodirajući i izbacujući lepljivu, otrovnu tečnost da bi zarobili uljeze.
Oni umiru radeći to. Ali će kolonija preživeti.
Bitkoin maksimalisti su spremni da postupaju u istom duhu.
Spremni su da budu omraženi, pogrešno shvaćeni, blokirani i cenzurisani.
Oni će reći ono što niko drugi neće jer se radi o ceni Bitkoin misije.
Ne radi se o slavi ili uticaju. Radi se o zaštiti organizma.
Deluju kao podskup složenog organizma koji sebe žrtvuje radi višeg cilja
Oni možda neće pomoći vašem rođaku da uđe u Bitkoin uz pomoć laganih poruka.
Ali će oterati sledećeg prevaranta koji pokuša da mu proda sintetički stejblkoin sa NFT pokrićem koji donosi 14% prinosa.
Oni su žrtvovali širu društvenu funkciju da bi odbranili jedinu stvar koja je stvarno važna: nekorumpiranost Bitkoina.
Njihov fokus je dvojak.
Da li je ovo Bitkoin? Onda da.
Da li ovo nije Bitkoin? Onda odjebite!
Setite se "Blocksize ratova", Lune, Celzijusa, Vojadžera, FTX-a...
Ko je podmetnuo leđa?
Ko je najglasnije upozoravao?
Ko je odbijao kompromise kada je bilo lakše ići linijom manjeg otpora?
Maksimalisti.
Svaki put kada je neki političar, korporativni lobista ili šitkoin-"mislilac" pokušao da omalovaži vrednosti Bitkoina, maksiji su među prvima pružali otpor.
Ne taktičnošću ili dugačkim saopštenjima.
Nego sa brutalnom jasnoćom.
Zato što je jasnoća ono što imuni sistem nudi.
Toksični maksimalizam nije zloban.
Toksični maksimalizam je smislen.
"Uživajte u siromaštvu"
"21 milion ili ništa."
"Bitkoin, ne kripto."
Ovo nisu slogani.
Ovo su imunološki odgovori.
Memetičke T-ćelije koje su stvorene da upozore na opasnost, inkapsuliraju istinu i repolarizuju telo.
One su brze, ujedaju i prodorne su zato što je brzina bitna u imunologiji.
Ukoliko pokušate da urazumite kancer, proširiće se.
Ukoliko pokušate da se sporazumete sa šibicarenjem, ono će rasti.
Bitkoin maksimalisti se ne sporazumevaju sa prevarama.
Oni ih kauterizuju.
Isto kao što bela krvna zrnca "ne slušaju obe strane" tokom razmnožavanja virusa.
Ljudi koji mrze maksimaliste su često oni kojima su maksimalisti najviše potrebni.
Pitajte bilo koga ko je izgubio novac na Luni, Celzijusu ili FTX-u šta misle o "toksičnosti Bitkoin maksimalista".
Daće vam jedan od ova dva odgovora:
- "Bili su drkadžije."
- "Bili su u pravu."
Maksimalisti spašavaju ljude koji ih mrze.
Oni upozoravaju glasno, oštro i rano.
I to često čine pre nego što brodolom postane očigledan.
Postoji gorka ironija dok gledamo ljude koji su ignorisali maksimaliste kako sada poput papagaja ponavljaju njihove teze.
Ali maksijima nije potrebna zahvalnost.
Nije im potrebno da se nekome svide.
Oni su tu da bi osigurali da Bitkoin postoji i za 20 godina.
Svet bez maksimalista je svet gde 21 miliona postaje 42 miliona.
Nemojte se zavaravati, kada bi imuni sistem Bitkoina bio isključen, počelo bi polako, možda sa nekoliko "nadogradnji" da bi se udovoljilo spamerima.
Možda neka izmena da bi se odobrovoljili regulatori.
Tako nastaju korumpirani sistemi: ne kroz nasilno preuzimanje već kroz hiljadu postepenih izdaja u ime "napretka" ili "adopcije".
Bitkoin do sada nije podlegao zato što ima ljude koji su spremni da učine sebe radioaktivnim da bi stopirali te izdaje.
"Spaliće most" ukoliko će to održati protokol netaknutim.
Imuni sistemi i treba da budu nasilni.
Pogledajte nekada bela krvna zrnca pod mikroskopom.
Gledajte ih kako obuzimaju bakteriju i razgrađuju je kiselinom. Nećete pomisliti: "Koliko ljubazno."
Pomislićete: "Ovo izgleda brutalno."
Tako odbrana funkcioniše.
Ako vam se to čini neprijatnim, dobro je.
Odbrana i ne treba da odiše estetikom.
Odbrana treba da bude efikasna.
Bitkoin maksimalizam nije kultura okrutnosti.
To je kultura odbijanja razvodnjavanja, smirivanja i klečanja.
Ovo odbijanje je pomoglo Bitkoinu da ostane nekorumpiran duže od bilo kog drugog monetarnog sistema.
Ne morate voleti toksične Bitkoin maksimaliste.
Ali ako HODL-ate Bitkoin i vrednujete ono što BTC predstavlja, oni su jedan od razloga zašto je BTC i dalje to što jeste.
Oni ubadaju zato što prevaranti nikada ne spavaju.
Grizu zato što se sociopate ne najavljuju unapred.
Nepristojni su zato što vreme ističe.
Nemojte to pogrešno shvatiti kao toksičnost.
Smatrajte to imunitetom.
I ako izgleda neprijateljski, setite se da ga je priroda takvim stvorila.
Zato što u svetu koji je stvoren da laže, branite signal po svaku cenu.
Čak iako vas košta reputacije.
Čak iako vas nazivaju toksičnima.
Čak iako vam se nikada ne zahvale.
Bitkoin maksimalisti su imuni sistem.
A imuni sistem ne pita za dozvolu.
On napada.
-
@ 9ca447d2:fbf5a36d
2025-06-03 09:01:35DDC Enterprise, a consumer brand and e-commerce company with operations in the U.S. and China, has launched a big plan to make bitcoin (BTC) a key part of its financial strategy.
The company just bought 21 BTC as the first step in a plan to buy up to 5,000 BTC over the next 3 years.
The move was announced in a press release and a letter to shareholders by DDC’s founder, chairwoman and CEO Norma Chu.
The 21 BTC, worth around $2.28 million at current prices, was bought through a share exchange. DDC issued 254,333 class A ordinary shares.
“We are fully committed to ensuring the success of this strategy, which aligns with our vision to drive long-term value for our shareholders,” said Norma Chu. “Today marks a pivotal moment in DDC’s evolution.”
Chu is the first female founder and CEO of a U.S.-listed public company to lead a bitcoin-only treasury strategy. DDC is one of the first companies in its industry to adopt this strategy in such a structured way.
DDC’s plan is being rolled out in phases. The company will buy another 79 BTC soon and will have 100 BTC in the short term.
In the next 6 months, it will buy 500 BTC, and long-term, it expects to build a 5,000 BTC reserve over 36 months.
This phased approach may allow DDC to manage market volatility and take advantage of price movements.
In her recent letter to shareholders, Chu called the bitcoin strategy “a cornerstone of our long-term value creation plan”.
She said bitcoin’s qualities – especially as a hedge against macroeconomic uncertainty and inflation – make it the perfect reserve asset for DDC. She added:
“Bitcoin’s unique properties as a store of value and hedge against macroeconomic uncertainty align perfectly with our vision to diversify reserves and enhance shareholder returns.”
The announcement comes on the back of a record-breaking year for DDC.
In 2024, the company made $37.4 million in revenue—a 33% increase from 2023.
Gross margin improved from 25.0% in 2023 to 28.4% in 2024 due to strategic acquisitions in the U.S. and more efficient operations in China.
As of March 31, 2025 the company had $11.3 million in shareholder equity and $23.6 million in cash, cash equivalents and short-term investments.
This gives DDC the flexibility and credibility to do something as bold as this bitcoin accumulation plan.
DDC’s announcement comes as corporations are getting increasingly interested in adding bitcoin to their balance sheet.
While giants like Strategy have made headlines with large bitcoin purchases, DDC is the first e-commerce company to do so.
The company’s dual presence in China and the U.S. also adds complexity, especially with the different regulatory environments surrounding Bitcoin in each region.
To ensure proper execution, DDC has expanded its treasury and advisory teams to include experts in the bitcoin markets.
The company will use a mix of dollar cost averaging and tactical buying, adjusting purchases based on market conditions.
-
@ 6b3780ef:221416c8
2025-06-03 09:09:59Release time!
We are thrilled to announce the release of the new version of DVMCP, packed with a host of new features and enhancements. The standout improvement is the support for the new specification, which brings loads of new possibilities and a future-proof design to accommodate MCP protocol as it evolves.
Currently, DVMCP supports all major MCP capabilities, tools, resources, resource templates, and prompts, along with features like autocompletion. While there are still a few minor MCP features that are not yet supported, the new specification will allows us to introduce new features and capabilities progressively.
A significant amount of work has gone into this update, from designing and drafting the new DVMCP specification, ensuring it aligns with the latest MCP standards. We have also refactored the bridge, discovery, and commons package, adapted the DVMCP.fun website (currently at next.dvmcp.fun), and even created a new storage type for relays to handle ephemeral events more robustly and efficiently. This new storage solution is already powering the DVMCP relay.
These enhancements represent a significant expansion of the possibilities available to DVMCP users. By combining MCP with Nostr, DVMCP offers rock-solid authentication and seamless payments using Lightning. We have many exciting ideas for utilizing these new capabilities in innovative ways, such as monetizing resources for creators, creating collections of prompts, developing agentic capabilities, and much more. Rest assured, we will be rolling out more on this gradually.
Additionally, DVMCP is already providing some servers that you can use for free. These can be discovered using the discovery package with any MCP client or by trying them out on the website.
Rollout Plan
As this update introduces breaking changes, including different event types for various DVMCP-related events, we are hosting the new version of the website at next.dvmcp.fun, with packages starting from version 0.2.x. We will be testing this version and welcome feedback from users over the next 10 days. After this period, we will deploy the 'next' version of the website to the main domain.
Updates on Ecosystem Components
-
DVMCP Packages: Starting from version 0.2.x, all packages include breaking changes. If you are already using DVMCP, please adapt to the new kinds and events. You can refer to the
@dvmcp-commons
package for all the new kinds and tags. -
DVMCP.fun: The website has been entirely refactored to support the new specification and now utilizes idiomatic Svelte 5 across the application. Currently the new version is living at next.dvmcp.fun
-
DVMCP Relay: The relay is now powered by the 'rely' framework and employs our atomic circular buffer implementation to handle ephemeral events more robustly and efficiently. It also uses LMDB as persistent storage for announcements and capability events.
Looking ahead, we plan to launch more servers offering various services, develop agentic DVMCPs, create additional guides and tutorials, integrate DVMCP into LLM web interfaces, provide statistics for the DVMCP relay, explore novel concepts in MCP + Nostr integration, and continuously improve the code to make it more accessible to developers as libraries.
Thank you for joining us on this journey! We are incredibly excited about the possibilities that lie ahead and what’s coming next. Stay tuned!
-
-
@ c4f5e7a7:8856cac7
2025-06-03 08:15:33I've managed to amass three SN profiles.
Is there a way to combined these?
@k00b @ek
https://stacker.news/items/995836
-
@ e8646d56:72dab368
2025-06-03 08:15:30eee
-
@ 39cc53c9:27168656
2025-05-27 09:21:53The new website is finally live! I put in a lot of hard work over the past months on it. I'm proud to say that it's out now and it looks pretty cool, at least to me!
Why rewrite it all?
The old kycnot.me site was built using Python with Flask about two years ago. Since then, I've gained a lot more experience with Golang and coding in general. Trying to update that old codebase, which had a lot of design flaws, would have been a bad idea. It would have been like building on an unstable foundation.
That's why I made the decision to rewrite the entire application. Initially, I chose to use SvelteKit with JavaScript. I did manage to create a stable site that looked similar to the new one, but it required Jav aScript to work. As I kept coding, I started feeling like I was repeating "the Python mistake". I was writing the app in a language I wasn't very familiar with (just like when I was learning Python at that mom ent), and I wasn't happy with the code. It felt like spaghetti code all the time.
So, I made a complete U-turn and started over, this time using Golang. While I'm not as proficient in Golang as I am in Python now, I find it to be a very enjoyable language to code with. Most aof my recent pr ojects have been written in Golang, and I'm getting the hang of it. I tried to make the best decisions I could and structure the code as well as possible. Of course, there's still room for improvement, which I'll address in future updates.
Now I have a more maintainable website that can scale much better. It uses a real database instead of a JSON file like the old site, and I can add many more features. Since I chose to go with Golang, I mad e the "tradeoff" of not using JavaScript at all, so all the rendering load falls on the server. But I believe it's a tradeoff that's worth it.
What's new
- UI/UX - I've designed a new logo and color palette for kycnot.me. I think it looks pretty cool and cypherpunk. I am not a graphic designer, but I think I did a decent work and I put a lot of thinking on it to make it pleasant!
- Point system - The new point system provides more detailed information about the listings, and can be expanded to cover additional features across all services. Anyone can request a new point!
- ToS Scrapper: I've implemented a powerful automated terms-of-service scrapper that collects all the ToS pages from the listings. It saves you from the hassle of reading the ToS by listing the lines that are suspiciously related to KYC/AML practices. This is still in development and it will improve for sure, but it works pretty fine right now!
- Search bar - The new search bar allows you to easily filter services. It performs a full-text search on the Title, Description, Category, and Tags of all the services. Looking for VPN services? Just search for "vpn"!
- Transparency - To be more transparent, all discussions about services now take place publicly on GitLab. I won't be answering any e-mails (an auto-reply will prompt to write to the corresponding Gitlab issue). This ensures that all service-related matters are publicly accessible and recorded. Additionally, there's a real-time audits page that displays database changes.
- Listing Requests - I have upgraded the request system. The new form allows you to directly request services or points without any extra steps. In the future, I plan to enable requests for specific changes to parts of the website.
- Lightweight and fast - The new site is lighter and faster than its predecessor!
- Tor and I2P - At last! kycnot.me is now officially on Tor and I2P!
How?
This rewrite has been a labor of love, in the end, I've been working on this for more than 3 months now. I don't have a team, so I work by myself on my free time, but I find great joy in helping people on their private journey with cryptocurrencies. Making it easier for individuals to use cryptocurrencies without KYC is a goal I am proud of!
If you appreciate my work, you can support me through the methods listed here. Alternatively, feel free to send me an email with a kind message!
Technical details
All the code is written in Golang, the website makes use of the chi router for the routing part. I also make use of BigCache for caching database requests. There is 0 JavaScript, so all the rendering load falls on the server, this means it needed to be efficient enough to not drawn with a few users since the old site was reporting about 2M requests per month on average (note that this are not unique users).
The database is running with mariadb, using gorm as the ORM. This is more than enough for this project. I started working with an
sqlite
database, but I ended up migrating to mariadb since it works better with JSON.The scraper is using chromedp combined with a series of keywords, regex and other logic. It runs every 24h and scraps all the services. You can find the scraper code here.
The frontend is written using Golang Templates for the HTML, and TailwindCSS plus DaisyUI for the CSS classes framework. I also use some plain CSS, but it's minimal.
The requests forms is the only part of the project that requires JavaScript to be enabled. It is needed for parsing some from fields that are a bit complex and for the "captcha", which is a simple Proof of Work that runs on your browser, destinated to avoid spam. For this, I use mCaptcha.
-
@ 866e0139:6a9334e5
2025-06-03 07:31:24Autor: Andreas Hagen. Dieser Beitrag wurde mit dem Pareto-Client geschrieben. Sie finden alle Texte der Friedenstaube und weitere Texte zum Thema Frieden hier. Die neuesten Pareto-Artikel finden Sie in unserem Telegram-Kanal.
Die neuesten Artikel der Friedenstaube gibt es jetzt auch im eigenen Friedenstaube-Telegram-Kanal.
Heute ist Karfreitag 2025, und ich beginne diese Zeilen um kurz nach 15 Uhr zu schreiben. Seit ich von der Friedenstaube gehört hatte, bastelte ich innerlich immer wieder an dem Text, der Ihnen heute vorliegt. Ich bin kein beruflicher Autor, aber ich möchte meinem Impuls folgen, meine Lebenserfahrungen zu teilen. In der Absicht, dass dieser Inhalt hilfreich in diesen schwierigen Zeiten wirkt.
Ich wurde recht katholisch erzogen in einem (Deutschen) Familiensystem, das von den Wirkungen des Zweiten Weltkrieges – gelinde gesagt – stark geprägt wurde. Was ich als Kind in den 70er Jahren nur über das Spüren wahrgenommen hatte, erklärte sich mir im Laufe meines Erwachsen-Werdens, vor allem über die Erzählungen meines Vaters. Heute bin ich Buddhist, und neben dem Verstehen empfinde ich immer größer werdendes Mitgefühl für meine Großeltern und deren Kinder, die mich auf die Welt gebracht haben.
Während des Krieges ging es in diesen beiden Familien vorrangig um Überleben, wie in vielen anderen Familien auch. Die Männer in Ihrer „Funktion“ an der Front – später dann physisch und psychisch schwer verletzt. Die Frauen auf sich gestellt mit Kindern, Armut, Hoffnungslosigkeit und existentiellen Ängsten ausgesetzt.
Diese Erlebnisse über Jahre hinweg und die daraus resultierenden inneren Zustände oder Gefühle meiner Ahnen sind in einer gewissen Art und Weise über mehrere Generationen hinweg bis in mein eigenes Körper-Geist-System weitergegeben worden. Was manche als kollektiv-psychologisches Phänomen mit dem Namen „German Angst“ beschreiben, möchte ich in den folgenden Zeilen unter dem Kontext einer fernöstlichen Sichtweise betrachten. Das scheint möglicherweise etwas ungewöhnlich, aber lassen Sie sich in der kommenden Lesezeit auf ein Denk-Experiment ein, das sich lohnen wird.
Ich spreche über das Prinzip des NICHT-TUNS, in der daoistischen Philosophie WU WEI genannt.
Betrachtet man das Phänomen der „German Angst“ unter Zuhilfenahme des Prinzips des Nicht-Tuns, kann man ein inhärentes Möglichkeitspotential darin entdecken. Das heißt, wir betrachten ein bekanntes Phänomen aus einer vollständig anderen Perspektive, und durch den etwas anderen Blick wird etwas sichtbar, was vorher schon da war, aber noch im Verborgenen.
Dieses in uns liegende Möglichkeitspotential kann uns in den kommenden Monaten hilfreich sein, um dem zu begegnen, was gerade in Deutschland und Europa stattfindet. Manche bezeichnen den aktuellen Prozess als Optimierung der Verteidigungsfähigkeiten, andere betrachten ihn als Kriegsvorbereitung, wobei die offenliegende, primäre Auswirkung der „German Angst“ als Durchsetzungswerkzeug nutzbar gemacht wird.
Aber erst einmal zurück zu Karfreitag vor über zweitausend Jahren: An jenem Nachmittag hing Christus am Kreuz angenagelt und absichtlich schwer verletzt (für Viele, damals wie heute, DER SOHN GOTTES und Ausdruck bedingungsloser Liebe). Wenn man sich in diese Situation hineinfühlt, wird das Leid schier unerträglich. Und ich bitte den Leser unabhängig von seiner Religion oder inneren Ausrichtung explizit, kurz innezuhalten und sich in diesen sterbenden Menschen hineinzuversetzen.
DAS war das letztendliche Ergebnis von KRIEG. DIE LIEBE wurde an ein Kreuz genagelt, mit einem Speer aufgespießt und dann starb sie – langsam und qualvoll.
Wenn man den Überlieferungen glaubt, waren einige seiner engen Schüler und Vertrauten ganz in der Nähe. Auch deren Gefühlswelt ist vom Leser nach zweitausend Jahren nachfühlbar, auch wenn es ähnlich schwierig ist.
Manch Historiker argumentiert, dass Jesus/Christus bereits einige Zeit vor diesem Ereignis wusste, welches „Ende“ ihm bestimmt war. So dann auch wohl seine engsten Vertrauten, vielleicht sogar die gesamte Essener-Gemeinschaft, aus der er stammte. Wenn dem so war, ist dieses Wesen in Klarheit und absoluter Hingabe in diesen unglaublich leidvollen Prozess gegangen.
Man kann auch rein gedanklich nachvollziehen, dass alle ihm nahestehenden Menschen schwierige Gefühle wie Verzweiflung, Ohnmacht und Wut in allerhöchster Ausprägung aushalten mussten. Nicht nur an diesem Tag, sondern schon einige Zeit davor und noch lange danach. Diese Menschen waren allerdings von IHM ausgebildet, genauso wie Jesus selbst in hohen Weisheitslehren ausgebildet war.
Das macht hier den Unterschied aus, auf den ich hinweisen möchte.
Die Geschichte lehrt uns, dass er und seine Anhänger besondere Menschen waren. In diesem, für die Menschheit so einschneidenden und bis heute überlieferten Ereignis, war ein wesentlicher Bestandteil von absoluter Wichtigkeit für alle Beteiligten:
Das NICHT-TUN
Und ich bin der Meinung, dass dieses NICHT-TUN in unserer Zeitqualität immer noch ein wesentlicher Schlüssel für die Herausforderungen ist, vor denen wir heute und in nächster Zukunft stehen.
Was ist denn NICHT-TUN und wie unterscheidet es sich vom Nichts-Tun?
NICHT-TUN fängt an mit einer all-umfassenden Wahrnehmung von dem, was ist. OHNE direkte Reaktion.
Das Nichts-Tun hingegen fängt mit einer schnell eingeschränkten Wahrnehmung an – der Einschränkung gehen meist schwierige Gefühle voran, gegen die ein Mensch automatisch Widerstand aufbaut. Oftmals bekommen wir davon auch überhaupt nichts mit und es gibt meistens Trauma in der Vergangenheit als Hintergrund oder Ursache.
Bei gewaltigen Ereignissen mit hohem psycho-energetischem Impact reagieren Lebewesen relativ umgehend entweder mit Totstellen, Flucht oder Kampf. Es sind alles auto-reaktive Muster, die in unserem zentralen Nervensystem einprogrammiert sin, und dementsprechend sind sie schwer zu umgehen. ANGRIFF, DROHENDER TOD und KRIEG sind z.B. solche gewaltigen Ereignisse.
Wie oben beschrieben, wirken VERGANGENE Angriffe oder Kriege in unserem Körper-Geist-System nach, sogar generationenübergreifend (in unserem Denkexperiment die „German Angst“). Dementsprechend greifen die auto-reaktiven Muster auch bereits in einem VOR-KRIEGS-ZUSTAND, ohne dass Menschen das möglicherweise bewusst mitkriegen.
Ich ordne alle diese automatischen Reaktionen hier dem Nichts-Tun zu. Alle haben zwar den Überlebenstrieb gemeinsam und machen für ein Individuum Sinn. Aber in der kollektiven Situation, in der wir uns gerade befinden, sind sie alle kontraproduktiv.
DIE FRIEDENSTAUBE FLIEGT AUCH IN IHR POSTFACH!
In Kürze folgt eine Mail an alle Genossenschafter, danke für die Geduld und das Verständnis!
Hier können Sie die Friedenstaube abonnieren und bekommen die Artikel zugesandt, vorerst für alle kostenfrei, wir starten gänzlich ohne Paywall. (Die Bezahlabos fangen erst zu laufen an, wenn ein Monetarisierungskonzept für die Inhalte steht). Sie wollen der Genossenschaft beitreten oder uns unterstützen? Mehr Infos hier oder am Ende des Textes.
Sich in der aktuellen politischen Situation totzustellen, ist sozusagen ein EXIT des Individuums und es wird nichts, absolut gar nichts zur Verbesserung unser aller Situation beitragen. Die Flucht ist ähnlich zu bewerten – das Individuum rettet sich möglicherweise. Aber es trägt auch nichts zur Heilung oder konstruktiven Verbesserung der (kollektiven) Weltlage bei. Der Kampf, also die sofortige Mobilmachung zur Bekämpfung der widerständigen Gegenkräfte ist zwar eine Form von Tun, aber sie mündet letztendlich im Nichts: Zwei Gegner wollen sich vernichten, bis ein Stärkerer gewinnt – leider ignoriert dieser Automatismus in diesem Momentum, unter welchen Rahmenbedingungen der Gewinner nach dem Überleben weiterleben könnte (oder auch nicht).
Um wieder den Bogen zum Beginn des Christentums und auch zum NICHT-TUN der damaligen Beteiligten zu spannen: Trotz der schwer aushaltbaren Gefühle, hat Christus dieses Schicksal angenommen – ebenso seine Liebsten. Sie nahmen das, was war, in einem ersten Schritt ohne sofortige, automatisierte Reaktion an.
Allerdings waren sie sich allem und vollständig bewusst darüber, was die Situation und das Leben bereitstellte. Die Achtsamkeit nicht nur auf das gelenkt, was gerade schmerzhaft und unaushaltbar war, sondern auf das darüberliegende Größere. Auf die Inhalte, die Christus bzw. die Liebe selbst sie gelehrt hatte:
Sie hielten still. Und sie gingen sehr, sehr bewusst aus dem (inneren und äußeren) Kampf hinaus. Auch wenn sie ihn scheinbar verloren hatten.
Weil genau das der Menschheit gelehrt werden sollte.
Wenn Menschen in vollumfänglicher Wahrnehmung dessen, was ist (und ohne Widerstand dagegen), still sein können, entsteht ein ganz besonderes Momentum. Man bezeichnet das auch als Präsenz. Präsenz kann in Bruchteilen von Sekunden entstehen. Aber man muss es eben auch erlernen.
Wenn die Energie eines Angreifers auf ein solches menschliches Energiefeld trifft, wird Angriffsenergie als erstes SICHTBAR. Bei einigen realisierten (Kampfkunst-) Meistern kann das beobachtet werden. Diese haben es geschafft, Ihren inneren Kampf aufzugeben. Solche Menschen werden faktisch unangreifbar, denn die Energie des Angriffs prallt an deren ausbalancierten Energiefeld ab und wendet sich gegen den Angreifer selbst. Dieser erfährt die Wirkung seiner Handlung dann am eigenen Selbst und stellt in der Regel diesen sinnlosen Akt ein. Solche Menschen haben über den Weg des Nicht-Tuns inneren Frieden kultivieren können, der sich danach auch im Außen manifestiert.
In diesem Zustand findet die Energie sozusagen ohne unseren Willen Ihren klaren und eindeutigen WEG. Im einfachen Fall, beendet es den Kampf, im besten Fall wird die Energie zum Guten umgelenkt und der natürliche Zustand von Frieden entsteht durch die notwendige Bewegung der Energie in die richtige Richtung.
Es ist für uns als Gesellschaft möglich, diese Erkenntnisse in das kollektive Geschehen von KRIEG, KRIEGSVORBEREITUNG und den gerade wirksamen Aspekten der „German Angst“ einwirken zu lassen.
Hierin liegt eine enorme Transformationskraft. Denn wie in einem individuellen Trauma Lebenskraft unterdrückt und bis zur Heilung/Auflösung nicht verfügbar ist, ist es auch bei unserem kollektiven Trauma. Die Chance dabei: Es sind starke Wirk-Kräfte gebunden, die wir als Gesellschaft für einen positiven Wandel zum Frieden hin freisetzen können. Für diese Freisetzung benötigt es Klarheit, Willen und vor allem Eigenverantwortung eines jeden Einzelnen.
Wir sollten uns in einem ersten Schritt bewusst werden, was gerade ganz individuell in unserem Inneren stattfindet. Welche Form des Nichts-Tuns herrscht gerade und warum herrscht sie eigentlich über uns? Welche Automatismen/Muster sind gerade aktiv?
Nehmen wir das doch zuallererst in unsere Verantwortung und werden wir still damit.
Ebenso sollten wir uns als Teil des Menschheitskollektives genau dessen bewusst sein, was gerade im Außen geschieht. Schauen wir uns aus unserer kultivierten Stille heraus an, dass sich Kampf bzw. Krieg anbahnt, an manchen Fronten ist er bereits aktiv. Durch die Bewusstwerdung dessen, wird er SICHTBAR, mit allen seinen Mechanismen und seinen Schatten.
Nehmen wir diese Verantwortung für uns selbst wahr, gibt es dieses besondere Momentum, in dem der Weg der Energie sich wie von selbst verändert. Und das kann man nicht gedanklich vorausplanen. Sie verändert sich aber in dem Sinne, dass alle notwendigen Bewegungen den NATÜRLICHEN ZUSTAND wiederherstellen wollen.
Das würde dann also nicht nur für das wahrnehmende Individuum, sondern für alle Beteiligten erfahrbar werden. Seien es die normale Bürger, repräsentative Regierungsteile oder bereits aktive Kriegsgegner. Es wäre für uns erfahrbar, wie wenn eine unsichtbare Intelligenz oder das Eine, große Ganze zum Wohle bzw. Zusammenfügen von allem gerade Getrennten wirken würde. Die Auswirkung davon würde letztendlich FRIEDEN sein. Und es würde uns vorkommen, wie ein Wunder, auf das wir schon lange warten und an das wir nicht mehr geglaubt hatten.
In dem Momentum der Präsenz im NICHT-TUN entsteht außerordentliche Klarheit und ganz eindeutiges Handeln. Die Wirkung ist immer individuell und kollektiv.
NICHT-TUN ist Friedensarbeit und beginnt immer bei uns selbst.
In den info-energetischen Mustern in unserem Körper-Geist-System, die das Phänomen „German Angst“ uns beschert hat, sind eben auch Lösungsmöglichkeiten enthalten, die die kriegsgeschundenen Generationen vor uns in der Reflektion nach den Ereignissen des zweiten Weltkrieges sozusagen erarbeitet haben. Und die Klarheit darüber, was diese Generationen vor uns hätten besser machen können, ist ebenso wie die angstgetriebenen Verhaltensautomatismen kollektiv zugänglich.
Sie hatten es damals leider noch nicht geschafft, bevor die Spirale des Kampfes völlig in die Eskalation ging – obwohl es einige gab, die andere Wege versucht hatten. Aber sie hatten aus den schmerzhaften Ereignissen gelernt, und das steht uns jetzt zur Verfügung, wenn wir uns selbst spüren.
Die Erschließung dieses über Generationen gereiften, aber noch unerschlossenen Kraftpotentials wird möglich werden, wenn wir uns zu dem Trauma hinwenden, das uns aktuell so sehr Angst macht. Wenn wir uns ihm zuwenden und für uns selbst Verantwortung übernehmen, wird es Anderen nicht mehr möglich sein, unsere Ängste für Ihre selbst angstbasierten Kampfhandlungen nutzbar zu machen.
Je mehr wir uns unserem eigenen verwundeten Kern zuwenden, desto heiler, desto klarer und desto kraftvoller werden wir. Die Menschheit kann sich selbst befreien.
Und vor zweitausend Jahren war da einer, der wusste, dass wir es irgendwann können werden.
Mögen wir in der Tiefe unseres Selbst unseren natürlichen Zustand wieder finden und unsere Welt in friedlichen Miteinanders neu gestalten.
Andreas Hagen hat Deutschland noch während der Corona-Zeit verlassen und lebt seitdem mit seiner Familie glücklich auf einem Bauernhof oberhalb Basel in der Schweiz.
Er ist Gründer des nidoki-Projektes (www.nidoki.de) und vermittelt interessierten Menschen Qi Gong, Jing Qi und K.I. (Körperintelligenz) in Gruppensettings. In kleinem Rahmen trägt er in Einzelsettings mit Hilfe der traumasensiblen Methoden der neurosystemischen Integration zur Verbesserung der Selbstregulation von Menschen in diesen herausfordernden Zeiten bei.
LASSEN SIE DER FRIEDENSTAUBE FLÜGEL WACHSEN!
In Kürze folgt eine Mail an alle Genossenschafter, danke für die Geduld!
Hier können Sie die Friedenstaube abonnieren und bekommen die Artikel zugesandt.
Schon jetzt können Sie uns unterstützen:
- Für 50 CHF/EURO bekommen Sie ein Jahresabo der Friedenstaube.
- Für 120 CHF/EURO bekommen Sie ein Jahresabo und ein T-Shirt/Hoodie mit der Friedenstaube.
- Für 500 CHF/EURO werden Sie Förderer und bekommen ein lebenslanges Abo sowie ein T-Shirt/Hoodie mit der Friedenstaube.
- Ab 1000 CHF werden Sie Genossenschafter der Friedenstaube mit Stimmrecht (und bekommen lebenslanges Abo, T-Shirt/Hoodie).
Für Einzahlungen in CHF (Betreff: Friedenstaube):
Für Einzahlungen in Euro:
Milosz Matuschek
IBAN DE 53710520500000814137
BYLADEM1TST
Sparkasse Traunstein-Trostberg
Betreff: Friedenstaube
Wenn Sie auf anderem Wege beitragen wollen, schreiben Sie die Friedenstaube an: friedenstaube@pareto.space
Sie sind noch nicht auf Nostr and wollen die volle Erfahrung machen (liken, kommentieren etc.)? Zappen können Sie den Autor auch ohne Nostr-Profil! Erstellen Sie sich einen Account auf Start. Weitere Onboarding-Leitfäden gibt es im Pareto-Wiki.
-
@ c3b2802b:4850599c
2025-06-03 07:22:34Die Befragten erzählen, wie sie den Zusammenbruch des Vertrauens vieler Menschen im Land in das mechanistische Muster von Heilung durch Medikamente und Injektionen erlebt haben. Und sie lassen uns teilhaben an ihrem Erfahrungsschatz mit Heilverfahren, welche über mechanistische Verfahren des klassischen Gesundheitswesens hinausweisen. Verfahren, welche dazu beitragen, dass wir Menschen unsere Balance, unser Wohlbefinden erhalten oder wiederfinden. Verfahren, die uns in unsere volle Kraft und Energie bringen, um unsere Möglichkeiten und Potentiale zur Entfaltung zu bringen.
Das Buch erscheint zu einem passenden Zeitpunkt. Zum einen haben viele Menschen seit 2021 am eigenen Körper die Folgen der mRNA Injektionen erlebt und dramatische Schicksale von Angehörigen und Freunden miterlebt.
Zum anderen kommen derzeit vermehrt Informationen in Umlauf, welche die Motive von global agierenden Pharmaziekartellen und von ihnen gesponserten Organisationen wie der Welt-Gesundheits-Organisation WHO offenlegen.
Worum geht es der WHO, die zu 84% von privaten Geldgebern unterhalten wird? Im Jahr 2022 hat die WHO eine Bittschrift für potentielle Sponsoren veröffentlicht, welche den denkwürdigen Titel hat: „A healthy return“. Gemeint ist ein „gesunder“ Geldrückfluß für Geldgeber, welcher eine 3.500 (dreitausendfünfhundert!!!) prozentige Steigerung des Wertes des eingezahlten Geldes in Aussicht stellt. Hier finden Sie Details.
Wieviel Zinsen zahlt Ihre Bank, falls Sie mal Geld übrig haben? Ein, zwei – oder gar drei Prozent? Darf man solch einer Vereinigung das Vertrauen schenken, die Gesundheit der Weltbevölkerung sicherzustellen? Mögen Sie Ihre Zukunft einer Organisation anvertrauen, welche nicht demokratisch legitimiert ist, die unbekümmert mit Genmanipulationen umgeht und die exorbitante Gewinne für ihre Sponsoren im Auge hat?
Die Zeit scheint reif zu sein, uns in Erinnerung zu rufen: Wir Menschen sind komplexe Wesen mit Körper und Seele. Uns zeichnen zauberhafte Potentiale aus. Wir verfügen über ein Gewissen, Achtsamkeit, Dankbarkeit, Demut, Liebe.
Hier schließt sich der Kreis zum Buch von Laurens Dillmann: Die Experten für Gesundheit, Wohlbefinden und Potentialentfaltung wurden nach ihrem Werdegang, ihren Überzeugungen, ihrer konkreten Heilarbeit, ihren Erfolgen und teils auch zu ihrer Position in der globalen aktuellen Krise befragt.
Was das Buch charmant macht, ist die große Buntheit an zusammengetragenen Perspektiven, welche sich durch die Vielfalt der Berufsschwerpunkte der Befragten ergibt. Ein Wildnispädagoge und eine Hebamme, Traumatherapeuten und klassische Ärzte, Medizinwissenschaftler und -ethiker, ein Wildpflanzenexperte und ein Anti-Gewalt-Trainer, eine Gesangs- und Musiktherapeutin, eine Sex-Forscherin und mehrere Psychologen geben sich ein Stelldichein zwischen den Buchdeckeln. Auch wenig verbreitete Aspekte wie Astrologie oder Schamanismus kommen zur Sprache.
In einem Schlusskapitel stellt Sozialarbeiter, Naturpädagoge und Heilpraktiker Mattheo Pfleger in einem Manifest „Pro Leben und Gesundheit 2030“ eine Reihe von sehr weitreichenden Leitlinien für ein Gesundheitswesen der Zukunft vor. Besonders eindrücklich für mich ist sein Vorschlag einer Grundgesetzänderung, in der die Würde des Lebens für unantastbar erklärt wird. Hier kann das Buch erworben werden.
Dieser Beitrag wurde mit dem Pareto-Client geschrieben.
-
@ a296b972:e5a7a2e8
2025-06-03 07:04:39So sehr man sich auch Mühe gibt, es will vielen einfach nicht gelingen, Russland als den Feind anzusehen.
Wenn ein fremder Mann eine Frau unfreiwillig zum Tanz auf’s Parkett zerrt und der Ehemann dem fremden Mann wie auch immer zu verstehen gibt, dass das so nicht geht, dann kann man nicht sagen, der Ehemann habe einen Streit vom Zaun gebrochen.
Eine Reaktion setzt immer eine Aktion voraus.
Nicht Russland ist der NATO auf die Pelle gerückt, sondern die NATO mit der Osterweiterung Russland.
Russland wollte mit Auflösung des Warschauer Pakts eine gemeinsame europäische Militärlösung, die die Neuordnung der NATO oder gar ebenfalls ihre Auflösung zur Folge gehabt hätte.
Der sogenannte Wertewesten ist maßgeblich für den Krieg in der Ukraine verantwortlich. Völkerrechtswidrigkeit kann man weglassen, da es auch im Westen, von den USA, mehrfach Beispiele für völkerrechtswidrige Angriffe auf andere Staaten gibt. Und Deutschland hat im Kosovo auch nicht nur Kaffee für die Truppen gekocht.
Wer im Glashaus sitzt, sollte nicht mit Steinen werfen.
Wenn Deutschland, vertreten durch einen Kanzler 2. Wahl über die nicht mehr vorhandene Reichweitenbeschränkung spricht, das Wahlvieh, den ehemaligen Souverän, im Ungewissen über die Lieferung des Stiers lässt, und dann, wie aus heiterem Himmel, Taurus, mit deutschem Kompass und deutschen Kompassbedienern, auf einmal Richtung Krim-Brücke oder gar Moskau unterwegs sein sollte, wen würde es dann wundern, wenn Moskau seine „Liebesgrüße“, schon allein aus reiner Höflichkeit und Anstand, nach Schrobenhausen sendet?
Würde das passieren, würde man in Deutschland sagen: Seht ihr, wir haben es euch ja immer gesagt, ihr wolltet es nur nicht glauben. Russland, mit seinem imperialen Anspruch und seinem aggressiven Verhalten, der Friedensverhinderer, der böse Putin, der böse Russ‘, wird uns angreifen! Die geforderte Kriegstüchtigkeit war also absolut berechtigt!
Wer das dann immer noch glaubt, dem möchte man eine Rakete in den Kamin seiner Doppelhaushälfte mit Gänsemuster-Gardinen am Küchenfenster stecken.
Wenn man jemanden bis auf’s Blut reizt, ist es ihm dann zu verdenken, wenn ihm irgendwann der Geduldsfaden reißt, nachdem schon mehrere Rote Linien überschritten wurden?
Und warum reizt man Russland bis auf’s Blut? Man kann zu keinem anderen Grund kommen, als dass die Geistesgrößen in Deutschland unbedingt einen Krieg wollen. Wozu? Ist das die von wem auch immer geplante Vollendung der Zerstörung Deutschlands? Der zukünftige Ex-Kanzler redet einen Haufen vermeintlich kluges Zeug daher, aber Russland handelt klug. Kleiner Unterschied.
Rheingold ist in gewöhnliches Rheinmetall, wohl durch Geheim-Alchimie, verwandelt worden. Geheim wird ja jetzt wieder modern. Man kann nur hoffen, dass es in der Taurussland-Rakete tatsächlich US-amerikanische Komponenten gibt, die (vielleicht sogar in Wiesbaden?) abgeschaltet werden können, damit der Stier nicht fliegen kann. Und man kann auch nur hoffen, dass die USA sie dann auch wirklich abschalten.
Die Meyer-Werft in Papenburg soll demnächst auch „Meine Fregatte“ und „Kreuzer grau I bis IX“ bauen. Panzerkreuzerfahrten in der Ostsee mit Blick auf Königsberg, na bravo, tolle Idee. (Da war doch mal was?). Gute Erholung schon jetzt. Da wird die vom Kaiser für den Aufbau der Marine eingeführte Sektsteuer endlich wieder ihrem eigentlichen Zweck zugeführt.
Und wie der ehemalige Masken-Chef-Einkäufer erst jüngst in einer der unsäglichen Staatsfunk-Aufführungen lichtblitzartig erkannt haben muss, spricht Putin Deutsch. Nein, doch, oh! Man stelle sich das einmal vor. Ganz was Neues! Die jetzt für die deutsche Bevölkerung geheim gehaltenen militärischen Absprachen werden nun in einer Sprache in Berlin besprochen, von denen man vorher sorgfältig, wie immer, recherchiert hat, dass Putin sie sicher nicht spricht, damit er nichts mitbekommt. Pssst, Feind hört mit! Den Beruf des Dolmetschers oder Übersetzers hat das Arbeitsamt in der Berufsberatung in der Schulzeit des Bankkaufmanns wahrscheinlich nicht vorgestellt, daher existieren sie für ihn nicht.
Und welche militärischen Entscheidungen von den deutschen "Chef-Diplomaten" getroffen wurden, das erfährt die Bevölkerung ja spätestens, wenn es knallt. Das reicht ja auch.
Was kommt als nächstes? Nach selbst genähten Maulwindeln jetzt eine Nähanleitung für schwere Gardinen zur Fenster-Verdunkelung? Oder gibt es die bald schon fertig in allen Größen zu kaufen, bei einem Discounter, wie in Berlin jetzt Macheten, damit man sich im Garten wieder den Weg zum Geräteschuppen bahnen kann.
Ils sont fous ces Allemands!
„Das große Karthago führte drei Kriege. Nach dem ersten war es noch mächtig. Nach dem zweiten war es noch bewohnbar. Nach dem dritten war es nicht mehr aufzufinden“, Berthold Brecht.
“Dieser Beitrag wurde mit dem Pareto-Client geschrieben.”
* *
(Bild von pixabay)
-
@ 39cc53c9:27168656
2025-05-27 09:21:51Know Your Customer is a regulation that requires companies of all sizes to verify the identity, suitability, and risks involved with maintaining a business relationship with a customer. Such procedures fit within the broader scope of anti-money laundering (AML) and counterterrorism financing (CTF) regulations.
Banks, exchanges, online business, mail providers, domain registrars... Everyone wants to know who you are before you can even opt for their service. Your personal information is flowing around the internet in the hands of "god-knows-who" and secured by "trust-me-bro military-grade encryption". Once your account is linked to your personal (and verified) identity, tracking you is just as easy as keeping logs on all these platforms.
Rights for Illusions
KYC processes aim to combat terrorist financing, money laundering, and other illicit activities. On the surface, KYC seems like a commendable initiative. I mean, who wouldn't want to halt terrorists and criminals in their tracks?
The logic behind KYC is: "If we mandate every financial service provider to identify their users, it becomes easier to pinpoint and apprehend the malicious actors."
However, terrorists and criminals are not precisely lining up to be identified. They're crafty. They may adopt false identities or find alternative strategies to continue their operations. Far from being outwitted, many times they're several steps ahead of regulations. Realistically, KYC might deter a small fraction – let's say about 1% ^1 – of these malefactors. Yet, the cost? All of us are saddled with the inconvenient process of identification just to use a service.
Under the rhetoric of "ensuring our safety", governments and institutions enact regulations that seem more out of a dystopian novel, gradually taking away our right to privacy.
To illustrate, consider a city where the mayor has rolled out facial recognition cameras in every nook and cranny. A band of criminals, intent on robbing a local store, rolls in with a stolen car, their faces obscured by masks and their bodies cloaked in all-black clothes. Once they've committed the crime and exited the city's boundaries, they switch vehicles and clothes out of the cameras' watchful eyes. The high-tech surveillance? It didn’t manage to identify or trace them. Yet, for every law-abiding citizen who merely wants to drive through the city or do some shopping, their movements and identities are constantly logged. The irony? This invasive tracking impacts all of us, just to catch the 1% ^1 of less-than-careful criminals.
KYC? Not you.
KYC creates barriers to participation in normal economic activity, to supposedly stop criminals. ^2
KYC puts barriers between many users and businesses. One of these comes from the fact that the process often requires multiple forms of identification, proof of address, and sometimes even financial records. For individuals in areas with poor record-keeping, non-recognized legal documents, or those who are unbanked, homeless or transient, obtaining these documents can be challenging, if not impossible.
For people who are not skilled with technology or just don't have access to it, there's also a barrier since KYC procedures are mostly online, leaving them inadvertently excluded.
Another barrier goes for the casual or one-time user, where they might not see the value in undergoing a rigorous KYC process, and these requirements can deter them from using the service altogether.
It also wipes some businesses out of the equation, since for smaller businesses, the costs associated with complying with KYC norms—from the actual process of gathering and submitting documents to potential delays in operations—can be prohibitive in economical and/or technical terms.
You're not welcome
Imagine a swanky new club in town with a strict "members only" sign. You hear the music, you see the lights, and you want in. You step up, ready to join, but suddenly there's a long list of criteria you must meet. After some time, you are finally checking all the boxes. But then the club rejects your membership with no clear reason why. You just weren't accepted. Frustrating, right?
This club scenario isn't too different from the fact that KYC is being used by many businesses as a convenient gatekeeping tool. A perfect excuse based on a "legal" procedure they are obliged to.
Even some exchanges may randomly use this to freeze and block funds from users, claiming these were "flagged" by a cryptic system that inspects the transactions. You are left hostage to their arbitrary decision to let you successfully pass the KYC procedure. If you choose to sidestep their invasive process, they might just hold onto your funds indefinitely.
Your identity has been stolen
KYC data has been found to be for sale on many dark net markets^3. Exchanges may have leaks or hacks, and such leaks contain very sensitive data. We're talking about the full monty: passport or ID scans, proof of address, and even those awkward selfies where you're holding up your ID next to your face. All this data is being left to the mercy of the (mostly) "trust-me-bro" security systems of such companies. Quite scary, isn't it?
As cheap as $10 for 100 documents, with discounts applying for those who buy in bulk, the personal identities of innocent users who passed KYC procedures are for sale. ^3
In short, if you have ever passed the KYC/AML process of a crypto exchange, your privacy is at risk of being compromised, or it might even have already been compromised.
(they) Know Your Coins
You may already know that Bitcoin and most cryptocurrencies have a transparent public blockchain, meaning that all data is shown unencrypted for everyone to see and recorded forever. If you link an address you own to your identity through KYC, for example, by sending an amount from a KYC exchange to it, your Bitcoin is no longer pseudonymous and can then be traced.
If, for instance, you send Bitcoin from such an identified address to another KYC'ed address (say, from a friend), everyone having access to that address-identity link information (exchanges, governments, hackers, etc.) will be able to associate that transaction and know who you are transacting with.
Conclusions
To sum up, KYC does not protect individuals; rather, it's a threat to our privacy, freedom, security and integrity. Sensible information flowing through the internet is thrown into chaos by dubious security measures. It puts borders between many potential customers and businesses, and it helps governments and companies track innocent users. That's the chaos KYC has stirred.
The criminals are using stolen identities from companies that gathered them thanks to these very same regulations that were supposed to combat them. Criminals always know how to circumvent such regulations. In the end, normal people are the most affected by these policies.
The threat that KYC poses to individuals in terms of privacy, security and freedom is not to be neglected. And if we don’t start challenging these systems and questioning their efficacy, we are just one step closer to the dystopian future that is now foreseeable.
Edited 20/03/2024 * Add reference to the 1% statement on Rights for Illusions section to an article where Chainalysis found that only 0.34% of the transaction volume with cryptocurrencies in 2023 was attributable to criminal activity ^1
-
@ c7a8d522:262a74de
2025-06-03 07:16:49Se você está em busca de uma plataforma moderna, confiável e cheia de emoção para se divertir com seus jogos favoritos, a 277Bet é uma excelente escolha. Com um ambiente seguro, diversas opções de entretenimento e um sistema intuitivo, essa plataforma tem se destacado no mercado brasileiro e conquistado cada vez mais usuários que buscam qualidade, diversão e praticidade em um só lugar.
Um Novo Conceito em Entretenimento Digital A 277Bet foi desenvolvida com foco no usuário brasileiro, oferecendo uma interface simples, responsiva e traduzida integralmente para o português. Ao acessar o site, o jogador encontra um ambiente amigável, onde todas as categorias estão bem organizadas, facilitando a navegação mesmo para quem não tem muita experiência com plataformas de jogos online.
Um dos grandes diferenciais da 277beté seu compromisso com a transparência e a segurança. A plataforma conta com tecnologia de criptografia de ponta para proteger os dados dos usuários e utiliza sistemas de verificação modernos para garantir transações financeiras seguras e rápidas.
Diversidade de Jogos para Todos os Gostos No catálogo da 277Bet, é possível encontrar uma ampla variedade de jogos que agradam todos os perfis de jogadores. Entre as opções mais populares, estão as máquinas de giro com temáticas diversas e recursos inovadores, ideais para quem gosta de partidas rápidas e dinâmicas.
Para os fãs de jogos com interatividade ao vivo, a plataforma também oferece experiências em tempo real, onde o jogador pode acompanhar as rodadas, interagir com apresentadores e sentir a adrenalina de cada jogada. Além disso, há opções tradicionais de cartas, roletas virtuais e outros formatos que mantêm o usuário entretido por horas.
A 277Bet também investe constantemente em parcerias com desenvolvedores renomados, garantindo que todos os jogos disponíveis sejam de alta qualidade, com gráficos impressionantes, efeitos sonoros imersivos e excelente jogabilidade tanto em computadores quanto em dispositivos móveis.
Uma Experiência do Usuário que Faz a Diferença Outro ponto forte da 277Bet é o cuidado com a experiência do jogador. Desde o cadastro até o saque dos ganhos, tudo é pensado para ser simples, rápido e eficiente. O processo de registro é descomplicado e leva apenas alguns minutos. Após criar a conta, o usuário já pode fazer seu primeiro depósito com total segurança e começar a explorar as opções de jogos.
O atendimento ao cliente é outro destaque da plataforma. Com suporte disponível em português e atendimento via chat ao vivo, e-mail ou WhatsApp, os jogadores têm a certeza de que serão bem assistidos em qualquer dúvida ou necessidade.
Além disso, a 277Bet oferece promoções atrativas, bônus de boas-vindas e campanhas especiais para usuários frequentes, tornando a experiência ainda mais vantajosa. Tudo isso sem abrir mão da responsabilidade: a plataforma incentiva o jogo consciente e disponibiliza ferramentas de controle de tempo e gastos para os usuários.
Conclusão A 277Bet surge como uma plataforma completa para quem deseja unir diversão, segurança e praticidade em um só lugar. Com uma vasta gama de jogos, interface amigável, suporte eficiente e um sistema de recompensas justo, a experiência do usuário é valorizada em todos os aspectos.
Se você está procurando um novo ambiente online para se entreter, a 277Bet é, sem dúvida, uma das melhores opções do momento. Prepare-se para se divertir com qualidade e emoção, tudo com o conforto de jogar quando e onde quiser.
-
@ 43aec65f:003ef459
2025-06-03 06:56:24sound
{{|>}} hello world asfdasfd
-
@ 2769f6ba:8dac44e4
2025-06-03 06:53:38You may want to believe that the world works like a video game, where you can press the pause button, come back three months later and everything will be waiting for you exactly as you left it. But real life doesn’t work like that. The difference is that in the video game you are in control, whereas in real life you are not. Maybe you want to believe that the worst is over, but this is just getting started. Supply chains are breaking down and the economy is starting to collapse. To make it clear, “the economy” is not something abstract; it’s real people losing their jobs, their businesses, their incomes and their homes. Your authoritarian fantasies will just make it worse for you and others until you cannot handle it anymore and you accept reality and surrender to it. I get that you are afraid, and that’s OK. But to hold your fellow human beings hostage because you are afraid is not OK. It’s getting to the point where if you still support lockdowns, mandatory vaccines, mandatory tracking, mandatory testing or mandatory anything you have blood on your hands. History will not judge you kindly.
Then there are those of you who want to believe that the bailouts and the “universal basic income” will make the problems disappear. For example, I read Charles Eisenstein in his otherwise excellent piece The Coronation come up with all this UBI nonsense. You probably realize that if you grab a piece of paper and write “$1,000,000” on it with a marker pen of your favorite color, you don’t become magically rich. But you still want to believe that if the government does exactly the same thing, your problems will go away. On the one hand, even if you are not fully aware of it, you realize that the government and its satellite corporations are abusing you and sucking your blood more and more every day. Yet on the other hand, you keep begging your very abusers that are trying to deprive you from earning an honest living for yourself to give you a measly monthly UBI check in the hopes that it will magically make you feel good and solve your problems.
Aside from the fact that printing money cannot solve the issue the governments themselves have created in the first place with their mandatory lockdowns: maybe you expect that you can control your masters, or that they will benevolently give you the UBI check with no strings attached. Of course not: receiving the check will likely be tied to being a “good law-abiding citizen” (a.k.a. obedient slave); something like the social credit system they have in China. You will end up completely disempowered and depending on the government to even feed yourself and have shelter. I find it quite infuriating and sad that any “spiritual teacher” would want that for you and that you fall for it.
Consider this:
The issue is not the coronavirus itself. The virus is just revealing the cracks in the system.
You are not a victim. You always have the power. Not the power to start a “revolution”, mind you, which just consists in replacing the old abusers with new ones. As Buckminster Fuller said: “You never change things by fighting the existing reality. To change something, build a new model that makes the existing model obsolete.”
You have the power to walk away from this dying system of nation-state governments and fiat “money” and into the nascent paradigm of cryptocurrencies and decentralized governance. But first you have to question and confront the beliefs you have accepted as “reality”. It’s hard, I know, but unavoidable. So, the sooner you begin, the better for yourself and for humanity. Do you want to be free or do you just want to have a “fair” master?
-
@ 2769f6ba:8dac44e4
2025-06-03 06:46:33I am feeling that the issue runs deeper. Science has been hijacked by the state, so I find the post-truth thing as a meme that rejects the corruption of science. Unfortunately, those hippies are throwing the baby with the bathwater in the process. But I see legitimate issues that need to be acknowledged if we want to reach out to those post-truth hippies.
For example, in my opinion:
The issue is not with 5G, but with this:
- Not wanting to be “bathed” 24/7 in waves of higher frequency (3 to 30 GHz). I understand the fear and skepticism on this.
- The push towards so-called “smart cities”, which are more like surveillance-cities. Granted, those technologies will bring benefits, but I see an issue with a top-down planned system controlled by the state and its contractors rather than a more organic system, with participation from many actors and little central planning. Of course, politicians and “experts” are always trying to link together smart-cities with 5G as if they must go together.
- The state is appropriating the radio spectrum and renting most of it to its cronies from the telecom companies, while it only leaves tiny scraps for open use by the population.
The issue is not with vaccines, but with this:
- pushing forced vaccination under the guise of “science”.
- an ever-growing list of both mandatory and “recommended” vaccines, some of them for diseases that are just an inconvenience and definitely not life-threatening.
I feel it must be acknowledged that the state has hijacked science, in the same way that the church has always hijacked spirituality. So, just telling those hippies that they have to trust science because facts and because the “experts” say so, won’t cut it anymore. A different approach is needed.
-
@ c7a8d522:262a74de
2025-06-03 07:16:17Para os amantes de jogos online que buscam uma plataforma confiável, moderna e recheada de entretenimento, a 9bet99 surge como uma excelente opção no mercado brasileiro. Com um ambiente digital desenvolvido para agradar jogadores iniciantes e experientes, o site oferece uma vasta gama de jogos, bônus atrativos e uma navegação intuitiva que transforma cada sessão em uma experiência única e envolvente.
Uma Plataforma Completa e Segura A 9bet99 se destaca por oferecer uma estrutura sólida e totalmente otimizada para dispositivos móveis e computadores. O site possui sistema de segurança de ponta, garantindo que todos os dados dos usuários estejam protegidos. A interface é clara, objetiva e proporciona fácil acesso às principais seções, como promoções, métodos de pagamento e suporte ao cliente.
Um dos grandes diferenciais da 9bet99é o atendimento ao cliente. Com suporte disponível 24 horas por dia, sete dias por semana, os jogadores têm à disposição uma equipe treinada para esclarecer dúvidas, resolver problemas técnicos e auxiliar em qualquer etapa do processo de jogo ou transações.
Jogos Para Todos os Gostos Na 9bet99, os jogadores encontram uma impressionante variedade de opções para se divertir. Entre os destaques estão os jogos de mesa, slots online, roletas digitais e experiências interativas ao vivo. Cada jogo é fornecido por desenvolvedores reconhecidos internacionalmente, o que garante gráficos de alta qualidade, trilhas sonoras envolventes e jogabilidade justa e equilibrada.
Os slots são uma das principais atrações da plataforma. Disponíveis em diversos estilos e temas, esses jogos combinam animações vibrantes com mecânicas modernas, como rodadas grátis, multiplicadores e jackpots progressivos. Já para quem gosta de jogos com mais estratégia, há várias mesas de pôquer, blackjack e bacará, todas com versões automáticas e ao vivo.
Outro ponto alto da 9bet99 são os jogos ao vivo, nos quais o jogador pode interagir com crupiês reais em tempo real, criando uma atmosfera imersiva e emocionante. Tudo isso com transmissão em alta definição e sem atrasos.
Experiência do Jogador em Primeiro Lugar A 9bet99 foi pensada para oferecer uma experiência fluida e satisfatória desde o primeiro acesso. O cadastro é rápido e simples, permitindo que o jogador comece a explorar os jogos em poucos minutos. A plataforma também conta com promoções constantes, incluindo bônus de boas-vindas, cashback e torneios temáticos, que valorizam ainda mais a participação ativa do jogador.
A facilidade para realizar depósitos e saques é outro ponto que merece destaque. A 9bet99 oferece diversos métodos de pagamento populares no Brasil, como Pix, transferência bancária e carteiras digitais. As transações são rápidas e seguras, o que transmite confiança ao usuário e proporciona tranquilidade ao lidar com valores.
Além disso, a plataforma adota políticas de jogo responsável, com ferramentas que permitem ao usuário controlar seus gastos e manter uma experiência equilibrada e saudável.
Conclusão A 9bet99 é mais do que uma simples plataforma de jogos online — é um ambiente completo, seguro e envolvente que oferece diversão de qualidade, suporte eficiente e jogos para todos os perfis. Com uma combinação de tecnologia avançada, variedade de jogos e foco na experiência do usuário, a 9bet99 se consolida como uma das melhores opções para quem busca entretenimento digital de alto nível no Brasil.
Se você está em busca de emoção, praticidade e recompensas incríveis, a 9bet99 está pronta para te surpreender. Cadastre-se, explore o catálogo e aproveite tudo o que essa plataforma inovadora tem a oferecer!
-
@ 39cc53c9:27168656
2025-05-27 09:21:50Over the past few months, I've dedicated my time to a complete rewrite of the kycnot.me website. The technology stack remains unchanged; Golang paired with TailwindCSS. However, I've made some design choices in this iteration that I believe significantly enhance the site. Particularly to backend code.
UI Improvements
You'll notice a refreshed UI that retains the original concept but has some notable enhancements. The service list view is now more visually engaging, it displays additional information in a more aesthetically pleasing manner. Both filtering and searching functionalities have been optimized for speed and user experience.
Service pages have been also redesigned to highlight key information at the top, with the KYC Level box always accessible. The display of service attributes is now more visually intuitive.
The request form, especially the Captcha, has undergone substantial improvements. The new self-made Captcha is robust, addressing the reliability issues encountered with the previous version.
Terms of Service Summarizer
A significant upgrade is the Terms of Service summarizer/reviewer, now powered by AI (GPT-4-turbo). It efficiently condenses each service's ToS, extracting and presenting critical points, including any warnings. Summaries are updated monthly, processing over 40 ToS pages via the OpenAI API using a self-crafted and thoroughly tested prompt.
Nostr Comments
I've integrated a comment section for each service using Nostr. For guidance on using this feature, visit the dedicated how-to page.
Database
The backend database has transitioned to pocketbase, an open-source Golang backend that has been a pleasure to work with. I maintain an updated fork of the Golang SDK for pocketbase at pluja/pocketbase.
Scoring
The scoring algorithm has also been refined to be more fair. Despite I had considered its removal due to the complexity it adds (it is very difficult to design a fair scoring system), some users highlighted its value, so I kept it. The updated algorithm is available open source.
Listings
Each listing has been re-evaluated, and the ones that were no longer operational were removed. New additions are included, and the backlog of pending services will be addressed progressively, since I still have access to the old database.
API
The API now offers more comprehensive data. For more details, check here.
About Page
The About page has been restructured for brevity and clarity.
Other Changes
Extensive changes have been implemented in the server-side logic, since the whole code base was re-written from the ground up. I may discuss these in a future post, but for now, I consider the current version to be just a bit beyond beta, and additional updates are planned in the coming weeks.
-
@ 2769f6ba:8dac44e4
2025-06-03 06:38:13To be blunt, people want “authority” to exist because they themselves are immature cowards. They want an all-powerful entity to impose their will upon others. This takes different forms in different varieties of political advocacy, but the basic motivation is always the same. The “liberal” for example, resents reality. He does not want a world in which suffering and injustice are possible. But instead of doing what He can as a human being, he wants a “Government” to do it for him. He wants some magical entity to make sure that everyone, himself included, is fed, housed, and taken care of, no matter how lazy or irresponsible they are. Instead of trusting human beings to take care of each other, he wants a super human ”authority” to guarantee housing, food, health care, and all sorts of other things, for everyone. He wants it so badly that he refuses to accept the obvious truth that no such guarantee is ever possible, and that if mere mortals do not take care of themselves and each other, nothing else will take care of them.
“The Most Dangerous Superstition” – Larken Rose, pg. 124
-
@ 39cc53c9:27168656
2025-05-27 09:21:48I'm launching a new service review section on this blog in collaboration with OrangeFren. These reviews are sponsored, yet the sponsorship does not influence the outcome of the evaluations. Reviews are done in advance, then, the service provider has the discretion to approve publication without modifications.
Sponsored reviews are independent from the kycnot.me list, being only part of the blog. The reviews have no impact on the scores of the listings or their continued presence on the list. Should any issues arise, I will not hesitate to remove any listing.
The review
WizardSwap is an instant exchange centred around privacy coins. It was launched in 2020 making it old enough to have weathered the 2021 bull run and the subsequent bearish year.
| Pros | Cons | |------|------| | Tor-friendly | Limited liquidity | | Guarantee of no KYC | Overly simplistic design | | Earn by providing liquidity | |
Rating: ★★★★★ Service Website: wizardswap.io
Liquidity
Right off the bat, we'll start off by pointing out that WizardSwap relies on its own liquidity reserves, meaning they aren't just a reseller of Binance or another exchange. They're also committed to a no-KYC policy, when asking them, they even promised they would rather refund a user their original coins, than force them to undergo any sort of verification.
On the one hand, full control over all their infrastructure gives users the most privacy and conviction about the KYC policies remaining in place.
On the other hand, this means the liquidity available for swapping isn't huge. At the time of testing we could only purchase at most about 0.73 BTC with XMR.
It's clear the team behind WizardSwap is aware of this shortfall and so they've come up with a solution unique among instant exchanges. They let you, the user, deposit any of the currencies they support into your account and earn a profit on the trades made using your liquidity.
Trading
Fees on WizardSwap are middle-of-the-pack. The normal fee is 2.2%. That's more than some exchanges that reserve the right to suddenly demand you undergo verification, yet less than half the fees on some other privacy-first exchanges. However as we mentioned in the section above you can earn almost all of that fee (2%) if you provide liquidity to WizardSwap.
It's good that with the current Bitcoin fee market their fees are constant regardless of how much, or how little, you send. This is in stark contrast with some of the alternative swap providers that will charge you a massive premium when attempting to swap small amounts of BTC away.
Test trades
Test trades are always performed without previous notice to the service provider.
During our testing we performed a few test trades and found that every single time WizardSwap immediately detected the incoming transaction and the amount we received was exactly what was quoted before depositing. The fees were inline with what WizardSwap advertises.
- Monero payment proof
- Bitcoin received
- Wizardswap TX link - it's possible that this link may cease to be valid at some point in the future.
ToS and KYC
WizardSwap does not have a Terms of Service or a Privacy Policy page, at least none that can be found by users. Instead, they offer a FAQ section where they addresses some basic questions.
The site does not mention any KYC or AML practices. It also does not specify how refunds are handled in case of failure. However, based on the FAQ section "What if I send funds after the offer expires?" it can be inferred that contacting support is necessary and network fees will be deducted from any refund.
UI & Tor
WizardSwap can be visited both via your usual browser and Tor Browser. Should you decide on the latter you'll find that the website works even with the most strict settings available in the Tor Browser (meaning no JavaScript).
However, when disabling Javascript you'll miss the live support chat, as well as automatic refreshing of the trade page. The lack of the first means that you will have no way to contact support from the trade page if anything goes wrong during your swap, although you can do so by mail.
One important thing to have in mind is that if you were to accidentally close the browser during the swap, and you did not save the swap ID or your browser history is disabled, you'll have no easy way to return to the trade. For this reason we suggest when you begin a trade to copy the url or ID to someplace safe, before sending any coins to WizardSwap.
The UI you'll be greeted by is simple, minimalist, and easy to navigate. It works well not just across browsers, but also across devices. You won't have any issues using this exchange on your phone.
Getting in touch
The team behind WizardSwap appears to be most active on X (formerly Twitter): https://twitter.com/WizardSwap_io
If you have any comments or suggestions about the exchange make sure to reach out to them. In the past they've been very receptive to user feedback, for instance a few months back WizardSwap was planning on removing DeepOnion, but the community behind that project got together ^1 and after reaching out WizardSwap reversed their decision ^2.
You can also contact them via email at:
support @ wizardswap . io
Disclaimer
None of the above should be understood as investment or financial advice. The views are our own only and constitute a faithful representation of our experience in using and investigating this exchange. This review is not a guarantee of any kind on the services rendered by the exchange. Do your own research before using any service.
-
@ 9ca447d2:fbf5a36d
2025-06-03 07:03:02When making critical decisions about investments, company acquisitions, or capital deployment, organizations rely on a fundamental tool: the hurdle rate. This is the minimum rate of return that a project or investment must achieve to be considered viable by managers or investors.
The hurdle rate is not just a number — it’s a filter that separates promising opportunities from those that don’t justify the risk.
It acts as a crucial benchmark. If the expected return on an investment falls below the hurdle rate, that opportunity is typically rejected.
Setting this rate involves a careful consideration of several factors, including the company’s cost of capital, specific risk profile, inflation rates, and opportunity cost of allocating resources elsewhere.
In essence, the hurdle rate ensures that only projects with the potential to create real value move forward.
Bitcoin has emerged as a disruptive and compelling candidate for a new kind of hurdle rate in capital allocation. Its unique properties challenge the conventions of traditional finance and invite a new thought pattern of what’s considered an appropriate benchmark.
Bitcoin’s fixed supply (capped at 21 million), and its decentralized, borderless nature makes it fundamentally resistant to inflation and debasement, unlike fiat currencies that can be printed at will by central banks.
Here’s the real question for investors and fund managers: if your portfolio or fund consistently fails to outperform bitcoin, at what point do you simply start allocating to bitcoin instead?
This isn’t rocket science. Over the past decade, bitcoin has not only outperformed traditional assets, but has also redefined what investors should expect as a minimum acceptable rate.
Asset classes comparison since 2013 — Seeking Alpha
The numbers speak for themselves.
From 2013-2023, bitcoin delivered the highest annual return in 8 out of those 11 years. This is not a fluke or a bubble, it’s a decade-long trend that demands attention from anyone serious about capital growth.
Typically, most investment managers use the S&P 500 as their benchmark hurdle rate. Will their potential investment generate more return than the S&P? If not, it’s usually dismissed.
Since 1970, the S&P 500 has provided an average annual return of 10.66%. Investment managers routinely reject ideas that can’t beat this average, recognizing that anything less is not worth the risk or effort.
But what happens when we compare this to bitcoin?
Over the last 10 years, bitcoin’s average annual return has been an astonishing 49%. While it’s unlikely that this rate will persist forever, it’s impossible to ignore the magnitude and consistency of bitcoin’s outperformance.
Bitcoin hasn’t just beat the S&P—it’s outperformed every major asset class, including gold, treasuries, real estate, commodities, and equities.
Of course, past performance isn’t a guarantee of future results. So the question becomes: can bitcoin continue to deliver, and are we ready to use it as a benchmark for investment decisions?
To answer this, it’s essential to understand the underlying forces driving bitcoin’s price appreciation.
Several macroeconomic factors contribute to bitcoin’s rise, including money printing, economic uncertainty, and the ongoing debasement of fiat currencies.
When governments print money or run deficits, confidence in traditional currencies erodes. In such environments, investors naturally seek scarce assets, historically gold, and now increasingly bitcoin.
Consider the current fiscal reality: the United States is burdened with over $36 trillion in national debt, and there’s little indication that the money printing will stop.
This environment only strengthens the case for bitcoin as a store of value and as a benchmark for capital allocation. Bitcoin’s staying power is becoming undeniable.
Those who fail to adapt, risk being left behind. We’re already witnessing the early stages of institutional and corporate adoption, and it’s only a matter of time before bitcoin becomes a standard reference point for hurdle rates across the investment world.
Visionary leaders like Michael Saylor of Strategy, have openly discussed the challenges of outperforming the world’s top companies.
Saylor recognized that if your investment, company, or project cannot reasonably be expected to outperform bitcoin, it may be more rational to simply hold bitcoin itself.
MSTR performance compared to bitcoin, Magnificent 7 and S&P500 — aicoin
In a world where bitcoin has established itself as the premier performing asset, the message is clear: if you can’t beat bitcoin, why not join it?
Just buy bitcoin.
-
@ cefb08d1:f419beff
2025-06-03 06:14:11https://stacker.news/items/995807
-
@ 39cc53c9:27168656
2025-05-27 09:21:46Bitcoin enthusiasts frequently and correctly remark how much value it adds to Bitcoin not to have a face, a leader, or a central authority behind it. This particularity means there isn't a single person to exert control over, or a single human point of failure who could become corrupt or harmful to the project.
Because of this, it is said that no other coin can be equally valuable as Bitcoin in terms of decentralization and trustworthiness. Bitcoin is unique not just for being first, but also because of how the events behind its inception developed. This implies that, from Bitcoin onwards, any coin created would have been created by someone, consequently having an authority behind it. For this and some other reasons, some people refer to Bitcoin as "The Immaculate Conception".
While other coins may have their own unique features and advantages, they may not be able to replicate Bitcoin's community-driven nature. However, one other cryptocurrency shares a similar story of mystery behind its creation: Monero.
History of Monero
Bytecoin and CryptoNote
In March 2014, a Bitcointalk thread titled "Bytecoin. Secure, private, untraceable since 2012" was initiated by a user under the nickname "DStrange"^1^. DStrange presented Bytecoin (BCN) as a unique cryptocurrency, in operation since July 2012. Unlike Bitcoin, it employed a new algorithm known as CryptoNote.
DStrange apparently stumbled upon the Bytecoin website by chance while mining a dying bitcoin fork, and decided to create a thread on Bitcointalk^1^. This sparked curiosity among some users, who wondered how could Bytecoin remain unnoticed since its alleged launch in 2012 until then^2^.
Some time after, a user brought up the "CryptoNote v2.0" whitepaper for the first time, underlining its innovative features^4^. Authored by the pseudonymous Nicolas van Saberhagen in October 2013, the CryptoNote v2 whitepaper^5^ highlighted the traceability and privacy problems in Bitcoin. Saberhagen argued that these flaws could not be quickly fixed, suggesting it would be more efficient to start a new project rather than trying to patch the original^5^, an statement simmilar to the one from Satoshi Nakamoto^6^.
Checking with Saberhagen's digital signature, the release date of the whitepaper seemed correct, which would mean that Cryptonote (v1) was created in 2012^7^, although there's an important detail: "Signing time is from the clock on the signer's computer" ^9^.
Moreover, the whitepaper v1 contains a footnote link to a Bitcointalk post dated May 5, 2013^10^, making it impossible for the whitepaper to have been signed and released on December 12, 2012.
As the narrative developed, users discovered that a significant 80% portion of Bytecoin had been pre-mined^11^ and blockchain dates seemed to be faked to make it look like it had been operating since 2012, leading to controversy surrounding the project.
The origins of CryptoNote and Bytecoin remain mysterious, leaving suspicions of a possible scam attempt, although the whitepaper had a good amount of work and thought on it.
The fork
In April 2014, the Bitcointalk user
thankful_for_today
, who had also participated in the Bytecoin thread^12^, announced plans to launch a Bytecoin fork named Bitmonero^13^.The primary motivation behind this fork was "Because there is a number of technical and marketing issues I wanted to do differently. And also because I like ideas and technology and I want it to succeed"^14^. This time Bitmonero did things different from Bytecoin: there was no premine or instamine, and no portion of the block reward went to development.
However, thankful_for_today proposed controversial changes that the community disagreed with. Johnny Mnemonic relates the events surrounding Bitmonero and thankful_for_today in a Bitcointalk comment^15^:
When thankful_for_today launched BitMonero [...] he ignored everything that was discussed and just did what he wanted. The block reward was considerably steeper than what everyone was expecting. He also moved forward with 1-minute block times despite everyone's concerns about the increase of orphan blocks. He also didn't address the tail emission concern that should've (in my opinion) been in the code at launch time. Basically, he messed everything up. Then, he disappeared.
After disappearing for a while, thankful_for_today returned to find that the community had taken over the project. Johnny Mnemonic continues:
I, and others, started working on new forks that were closer to what everyone else was hoping for. [...] it was decided that the BitMonero project should just be taken over. There were like 9 or 10 interested parties at the time if my memory is correct. We voted on IRC to drop the "bit" from BitMonero and move forward with the project. Thankful_for_today suddenly resurfaced, and wasn't happy to learn the community had assumed control of the coin. He attempted to maintain his own fork (still calling it "BitMonero") for a while, but that quickly fell into obscurity.
The unfolding of these events show us the roots of Monero. Much like Satoshi Nakamoto, the creators behind CryptoNote/Bytecoin and thankful_for_today remain a mystery^17^, having disappeared without a trace. This enigma only adds to Monero's value.
Since community took over development, believing in the project's potential and its ability to be guided in a better direction, Monero was given one of Bitcoin's most important qualities: a leaderless nature. With no single face or entity directing its path, Monero is safe from potential corruption or harm from a "central authority".
The community continued developing Monero until today. Since then, Monero has undergone a lot of technological improvements, migrations and achievements such as RingCT and RandomX. It also has developed its own Community Crowdfundinc System, conferences such as MoneroKon and Monerotopia are taking place every year, and has a very active community around it.
Monero continues to develop with goals of privacy and security first, ease of use and efficiency second. ^16^
This stands as a testament to the power of a dedicated community operating without a central figure of authority. This decentralized approach aligns with the original ethos of cryptocurrency, making Monero a prime example of community-driven innovation. For this, I thank all the people involved in Monero, that lead it to where it is today.
If you find any information that seems incorrect, unclear or any missing important events, please contact me and I will make the necessary changes.
Sources of interest
- https://forum.getmonero.org/20/general-discussion/211/history-of-monero
- https://monero.stackexchange.com/questions/852/what-is-the-origin-of-monero-and-its-relationship-to-bytecoin
- https://en.wikipedia.org/wiki/Monero
- https://bitcointalk.org/index.php?topic=583449.0
- https://bitcointalk.org/index.php?topic=563821.0
- https://bitcointalk.org/index.php?action=profile;u=233561
- https://bitcointalk.org/index.php?topic=512747.0
- https://bitcointalk.org/index.php?topic=740112.0
- https://monero.stackexchange.com/a/1024
- https://inspec2t-project.eu/cryptocurrency-with-a-focus-on-anonymity-these-facts-are-known-about-monero/
- https://medium.com/coin-story/coin-perspective-13-riccardo-spagni-69ef82907bd1
- https://www.getmonero.org/resources/about/
- https://www.wired.com/2017/01/monero-drug-dealers-cryptocurrency-choice-fire/
- https://www.monero.how/why-monero-vs-bitcoin
- https://old.reddit.com/r/Monero/comments/u8e5yr/satoshi_nakamoto_talked_about_privacy_features/
-
@ 502ab02a:a2860397
2025-06-03 02:25:52ไม่มีใครเคี้ยวเซลล์ได้หรอก แต่ถ้ามีคนบอกว่า “นี่คือไก่ชุบแป้งทอด” เราก็จะกัดเข้าไปโดยไม่รู้เลยว่า มันเริ่มต้นจากจุดที่เล็กกว่าเศษฝุ่นบนโต๊ะ
เฮียอยากเล่าให้ฟังถึงเรื่องราวของ “ไก่ที่ไม่มีไก่” หรือ “เนื้อที่ไม่เคยมีฟาร์ม” มันคือเนื้อที่เพาะในห้องแล็บ แต่ไม่ได้แปลว่าเป็นของปลอม เพราะจริง ๆ แล้ว มันคือเนื้อที่ไม่มีการฆ่า
เราเคยคุยกันไปแล้วว่า Upside Foods เป็นหนึ่งในบริษัทที่เดินหน้าสร้าง “อนาคตที่เคี้ยวได้” พวกเขาเริ่มจากสิ่งที่บางคนอาจมองว่าเป็นวิทยาศาสตร์วิปลาส แต่จริง ๆ แล้วมันคือศิลปะที่ซับซ้อนระหว่างชีววิทยาและอาหาร วันนี้เฮียจะเล่าให้ฟังว่า เขาทำเนื้อแบบนั้นยังไง ตั้งแต่เซลล์จิ๋ว ๆ จนกลายมาเป็นไก่ทอดที่เสิร์ฟบนจาน เรามาเรียนรู้กันครับ
ทุกอย่างเริ่มจาก เซลล์ต้นกำเนิด แต่ไม่ใช่แบบที่ใครจะคิดว่าต้องตัดชิ้นส่วนสัตว์มาทั้งตัว แค่เซลล์เดียวก็พอ โดยเฉพาะเซลล์จากไข่ไก่ที่ได้รับการปฏิสนธิ ซึ่งมีความสามารถพิเศษในการแบ่งตัวอย่างต่อเนื่องโดยไม่สูญเสียคุณภาพ เซลล์นั้นจะถูกคัดเลือกในขั้นตอนที่เรียกว่า Select หรือการหา “ตัวแทนเนื้อ” ที่เก่งที่สุด แข็งแรงที่สุด และกินเก่งที่สุดในบรรดาเซลล์ทั้งหมด
จากนั้นจึงเข้าสู่การ เพาะเลี้ยง (Cultivate) เซลล์จะถูกส่งเข้าไปอยู่ใน “ถังเพาะเลี้ยง” หรือ cultivator ซึ่งทำหน้าที่เหมือนครรภ์จำลอง ถังนี้มีทุกอย่างที่เซลล์ต้องการ น้ำ ออกซิเจน กรดอะมิโน น้ำตาล วิตามิน แร่ธาตุ และเกลือ เรียกง่าย ๆ ว่า “อาหารเซลล์” ที่ถูกปรุงให้ใกล้เคียงกับสิ่งแวดล้อมตามธรรมชาติที่สุด เพื่อให้เซลล์เจริญเติบโต ขยายตัว และกลายเป็นเนื้อแบบที่เราเคยกินกัน
เวลาผ่านไป 2-3 สัปดาห์ เนื้อที่เติบโตมาจากเซลล์ก็พร้อมจะถูกเก็บเกี่ยวในขั้นตอนที่เรียกว่า Prepare เหมือนเก็บเกี่ยวข้าว แต่แทนที่จะเป็นต้นข้าว ก็คือ “มวลเซลล์” ที่พร้อมแปรรูป มันถูกนำออกมาจากถังเพาะเลี้ยง แล้วเข้าสู่ขั้นตอนการขึ้นรูป ปรุงรส แช่เย็น และบรรจุให้พร้อมจำหน่าย
ถ้าจะให้เฮียเปรียบ มันก็เหมือนเด็กที่ถูกเลี้ยงให้เติบโตในอ้อมกอดของเครื่องจักร แทนที่จะโตในแม่ไก่ ฟังดูแปลก แต่จริง ๆ แล้วมันคือความพยายามที่จะนำเสนอภาพการสร้างอาหารโดยไม่ต้องมีชีวิตใดถูกพราก ตามที่การตลาดและโฆษณาต้องการสื่อ
และถ้าใครสงสัยว่า โรงงานที่ทำเรื่องแบบนี้หน้าตาเป็นยังไง มันไม่ได้เหมือนห้องแล็บลับ ๆ หรืออะไรที่มีหมอกวิทยาศาสตร์คลุ้งฟุ้ง Upside Foods มีโรงงานชื่อว่า EPIC (ย่อจาก Engineering, Production and Innovation Center) อยู่ที่รัฐแคลิฟอร์เนีย และสามารถผลิตเนื้อได้ถึง 50,000 ปอนด์ต่อปี ภายในโรงงานนั้นมีทั้งห้องเพาะเลี้ยง ห้องควบคุม ห้องปรุงอาหาร และห้องพัฒนาเทคโนโลยีใหม่ ๆ ครบทุกฟังก์ชัน แถมมีการลงทะเบียนเข้าชม factory trip ได้ด้วยนะครับ
ที่สำคัญที่สุด ทุกขั้นตอนได้รับการตรวจสอบจากทั้ง FDA และ USDA อย่างเข้มงวด ไม่ใช่แค่ความสะอาด แต่รวมไปถึงการควบคุมทุกตัวแปรทางชีวภาพ เพราะการผลิตเนื้อโดยไม่มีสัตว์นั้น แม้จะฟังดู “เมตตา” แต่ถ้าพลาดก็กลายเป็นเรื่องอันตราย (แต่ไม่ต้องถามนะครับว่าผ่าน GRAS มาได้ยังไง)
Upside Foods จึงให้ความสำคัญกับการทำการสื่อสารองค์กรให้ผู้บริโภคเชื่อมั่นว่า เนื้อที่ไม่มีชีวิตนี้ ยังปลอดภัยสำหรับชีวิตเช่นกัน
ทั้งหมดนี้คือศาสตร์และศิลป์ของ “เนื้อจากเซลล์” ที่อาจเป็นคำตอบหนึ่งของอนาคต เฮียไม่ได้บอกว่ามันคือคำตอบเดียว และเฮียก็ยังรักเนื้อที่มาจากฟาร์มจริง ๆ แต่ในวันที่โลกเริ่มตั้งคำถามกับการบริโภคที่ไม่ยั่งยืน การมีทางเลือกที่ไม่ทำร้าย ก็อาจเป็นเรื่องที่น่าคิด เพราะถ้าเราเลือกกินได้โดยไม่ต้องฆ่า แล้วรสชาติยังอร่อยเหมือนเดิม ถึงเวลานั้นแล้วประชาชนเองหรือเปล่าที่จะยินดีโอบรับอาหารแบบนี้ในชีวิตประจำวัน แล้วไม่จำเป็นต้องคำนึงถึงเกษตรกรทั้งปศุสัตว์และเกษตกรรม เพราะเขาอาจมองว่าจะมาจากไหนก็ต้อง "ซื้อ" กินอยู่ดี โดยเฉพาะถ้าสังคมเมืองต้องวิ่งแบบหนูถีบจักรภายใต้ระบบ fiat บริบทของ การซื้อจากไหนก็ไม่สำคัญ จะเข้ามาครองจิตใจประชากรหรือเปล่า เมื่อถึงวันนั้นผู้ทำอาชีพเกษตรอาจไม่เหลืออยู่ แล้วคำพูดที่ว่า "ยังไงฉันก็เลือกอาหารธรรมชาติ" มันยังสามารถอยู่บนโลกได้จริงไหม ทุกวันนี้เราปลูกเราเลี้ยงอะไรเป็นชิ้นเป็นอันหรือยัง เรายังซื้ออยู่ใช่หรือไม่
แหที่หว่านนั้นมันกว้างจนเราไม่รู้ตัวหรือเปล่า ว่ากำลังพูดอะไรอยู่?
นี่คือคำถาม ที่ขยายภาพขึ้นมาอีกครับ
#pirateketo #กูต้องรู้มั๊ย #ม้วนหางสิลูก #siamstr
-
@ 5d4b6c8d:8a1c1ee3
2025-06-03 01:49:23I had a very mid sort of day. I mostly did what I was supposed to, but didn't go above and beyond on anything. It was too hot for the dog to want to go on a real walk and I had too much work to get a lot of steps in during the day.
I did try a pineapple fruit jerky today, that I rather enjoyed and was supposedly the equivalent of half a pineapple.
How did you all do today?
https://stacker.news/items/995706
-
@ 39cc53c9:27168656
2025-05-27 09:21:45I've been thinking about how to improve my seed backup in a cheap and cool way, mostly for fun. Until now, I had the seed written on a piece of paper in a desk drawer, and I wanted something more durable and fire-proof.
After searching online, I found two options I liked the most: the Cryptosteel Capsule and the Trezor Keep. These products are nice but quite expensive, and I didn't want to spend that much on my seed backup. Privacy is also important, and sharing details like a shipping address makes me uncomfortable. This concern has grown since the Ledger incident^1. A $5 wrench attack^2 seems too cheap, even if you only hold a few sats.
Upon seeing the design of Cryptosteel, I considered creating something similar at home. Although it may not be as cool as their device, it could offer almost the same in terms of robustness and durability.
Step 1: Get the materials and tools
When choosing the materials, you will want to go with stainless steel. It is durable, resistant to fire, water, and corrosion, very robust, and does not rust. Also, its price point is just right; it's not the cheapest, but it's cheap for the value you get.
I went to a material store and bought:
- Two bolts
- Two hex nuts and head nuts for the bolts
- A bag of 30 washers
All items were made of stainless steel. The total price was around €6. This is enough for making two seed backups.
You will also need:
- A set of metal letter stamps (I bought a 2mm-size letter kit since my washers were small, 6mm in diameter)
- You can find these in local stores or online marketplaces. The set I bought cost me €13.
- A good hammer
- A solid surface to stamp on
Total spent: 19€ for two backups
Step 2: Stamp and store
Once you have all the materials, you can start stamping your words. There are many videos on the internet that use fancy 3D-printed tools to get the letters nicely aligned, but I went with the free-hand option. The results were pretty decent.
I only stamped the first 4 letters for each word since the BIP-39 wordlist allows for this. Because my stamping kit did not include numbers, I used alphabet letters to define the order. This way, if all the washers were to fall off, I could still reassemble the seed correctly.
The final result
So this is the final result. I added two smaller washers as protection and also put the top washer reversed so the letters are not visible:
Compared to the Cryptosteel or the Trezor Keep, its size is much more compact. This makes for an easier-to-hide backup, in case you ever need to hide it inside your human body.
Some ideas
Tamper-evident seal
To enhance the security this backup, you can consider using a tamper-evident seal. This can be easily achieved by printing a unique image or using a specific day's newspaper page (just note somewhere what day it was).
Apply a thin layer of glue to the washer's surface and place the seal over it. If someone attempts to access the seed, they will be forced to destroy the seal, which will serve as an evident sign of tampering.
This simple measure will provide an additional layer of protection and allow you to quickly identify any unauthorized access attempts.
Note that this method is not resistant to outright theft. The tamper-evident seal won't stop a determined thief but it will prevent them from accessing your seed without leaving any trace.
Redundancy
Make sure to add redundancy. Make several copies of this cheap backup, and store them in separate locations.
Unique wordset
Another layer of security could be to implement your own custom mnemonic dictionary. However, this approach has the risk of permanently losing access to your funds if not implemented correctly.
If done properly, you could potentially end up with a highly secure backup, as no one else would be able to derive the seed phrase from it. To create your custom dictionary, assign a unique number from 1 to 2048 to a word of your choice. Maybe you could use a book, and index the first 2048 unique words that appear. Make sure to store this book and even get a couple copies of it (digitally and phisically).
This self-curated set of words will serve as your personal BIP-39 dictionary. When you need to translate between your custom dictionary and the official BIP-39 wordlist, simply use the index number to find the corresponding word in either list.
Never write the idex or words on your computer (Do not use
Ctr+F
) -
@ e2c72a5a:bfacb2ee
2025-06-03 02:09:10The money you're not making in crypto is the money you're losing to confusion. Crypto marketing isn't just about hype—it's about translating complexity into clarity that drives real community action.
When marketing crypto projects, start with the fundamentals: blockchain is simply a secure digital ledger that records transactions without middlemen. Bitcoin offers limited supply (21 million coins) while Ethereum provides programmable money through smart contracts. These aren't just buzzwords—they're the foundation your audience needs.
Community building thrives on transparency. Create educational content that explains wallets (hot vs cold, custodial vs non-custodial) and security practices. The most successful crypto communities aren't built on price speculation but shared understanding of the technology's real-world applications like cross-border payments, decentralized finance, and digital ownership.
Current trends show institutional money flowing in ($9.3B in 2021) while countries explore adoption. Focus marketing on utility rather than get-rich-quick promises. The projects winning the community game emphasize governance tokens that give members actual voting power in project decisions.
The biggest misconception to avoid? That crypto is just for speculation. The technology behind digital assets is revolutionizing finance by making it more accessible, efficient and equitable. Your marketing should highlight how your project solves real problems, not just how tokens might moon.
Want to build a lasting crypto community? Educate first, speculate second. The projects that survive bear markets are those whose communities understand not just what they're buying, but why it matters.
-
@ 240d3004:1cf86254
2025-06-02 23:41:48The Last Ledger
Chapter 1: The Warning
Sarah Chen stared at the glowing screen of her laptop, the cursor blinking mockingly at the end of an empty email. How do you tell someone their entire financial worldview is about to collapse? How do you explain that the retirement account they've spent decades building is actually just a claim on a claim on a promise that might not exist?
She'd been reading David Rogers Webb's "The Great Taking" for the third time, cross-referencing the legal documents, following the money trails through decades of seemingly unrelated financial "reforms." The picture that emerged made her stomach churn.
Her phone buzzed. A text from her brother Mike: "Coffee tomorrow? Want to show you this cool Bitcoin lending thing. Getting 8% yield on my stack!"
Sarah closed her eyes. Mike had been so proud when he'd finally bought Bitcoin last year, calling her a "paranoid prepper" for keeping hers in cold storage. He'd moved his to BlockFi for the "professional custody" and yield opportunities.
She started typing:
Mike - we need to talk. Cancel the lending thing. NOW. And get your Bitcoin off BlockFi immediately. I know it sounds crazy, but I need you to trust me on this one.
Her finger hovered over send. She thought about all the conversations she'd had lately that ended with glazed eyes and polite subject changes. People didn't want to hear that their "diversified portfolio" was actually just different flavors of the same systematic risk.
She pressed send.
Chapter 2: The Capture
Six months later
The coffee shop buzzed with the nervous energy that had become normal since the "banking liquidity events" started cascading through regional institutions. Sarah watched the news ticker scroll past on the mounted TV: "Fed Chairman assures markets that deposit guarantees remain strong... FDIC reports adequate reserves..."
Mike slumped across from her, his face gray. "You tried to warn me."
BlockFi had frozen withdrawals two weeks ago. The official statement mentioned "temporary operational challenges due to counterparty exposures." Mike's Bitcoin, along with hundreds of thousands of others, was trapped in bankruptcy proceedings.
"The lawyers say we might get thirty cents on the dollar," he continued. "If we're lucky. Apparently they lent our Bitcoin to some trading firm that went bust." He laughed bitterly. "'Professional custody,' they called it."
Sarah nodded, having no desire to say 'I told you so.' She'd watched the same pattern repeat across a dozen platforms now. Celsius, Voyager, Genesis - each collapse revealing the same fractional reserve nightmare that Webb had predicted.
"But the weird thing," Mike continued, "is that Bitcoin itself keeps holding up. Even going up. My buddy works at JPMorgan, says they're desperate to get their hands on any actual Bitcoin they can find. Something about their derivative positions needing real collateral backing."
Sarah's phone buzzed with a news alert: "Major banks petition Federal Reserve for emergency Bitcoin acquisition authority."
Chapter 3: The Scramble
Three months later
The grocery store manager, Janet, had been skeptical at first. "Bitcoin? Isn't that the fake internet money?"
But when Sarah explained that the banks were offering 2-to-1 premiums for Bitcoin while simultaneously freezing customer withdrawals, Janet's tune changed quickly. Her own small business account had been caught in the "temporary restrictions" that seemed to be growing less temporary each day.
"So you're saying you'll pay me in this Bitcoin thing, and I can immediately sell it to Chase Bank for twice what I'd normally charge for groceries?"
"That's exactly what I'm saying," Sarah replied, loading her cart with months worth of supplies. "You keep half the premium as profit, and you've got real money instead of a frozen bank account."
Word spread fast in their small community. Sarah's Bitcoin, which she'd accumulated for years and stored on hardware wallets, had become the only truly liquid currency in town. While everyone else fought over appointment slots at banks trying to access their own money, merchants lined up to accept her payments.
The irony wasn't lost on her. The very asset the financial system had tried to capture and control through lending platforms and ETFs was now the only thing that actually worked when that same system collapsed.
Chapter 4: The New Reality
One year later
The Federal Reserve's announcement of the Central Bank Digital Currency had been met with relief by most Americans. Finally, a "safe" digital dollar backed by the full faith and credit of the government, available instantly on everyone's smartphone. The old banking system, they explained, had been fundamentally flawed - too many overlapping claims on the same assets, too much systemic risk.
"For your protection," the Treasury Secretary had announced, "all legacy cryptocurrencies will be phased out over the next six months. Citizens can exchange Bitcoin for Digital Dollars at participating Federal Reserve locations."
Sarah watched the announcement from her new home in rural Montana, where a quiet community of Bitcoin holders had formed. They called themselves "the unbanked" - people who had refused to participate in the intermediated financial system that had just collapsed so spectacularly.
Mike visited on weekends now, having lost his apartment when his frozen bank accounts couldn't cover rent. "I still can't believe it worked out exactly like you said," he mused, helping her tend the small farm she'd purchased with Bitcoin from a rancher who'd grown tired of dealing with bank restrictions.
"Webb laid it all out," Sarah replied. "The legal framework, the capture mechanisms, even the timeline. The only thing he underestimated was how voluntary most people would make it."
Down the valley, she could see smoke rising from the Peterson farm, where Jake had set up his Bitcoin mining operation using solar panels and a micro-hydro system. Three more families had moved to the area in the past month, all carrying their wealth in hardware wallets rather than bank accounts.
Chapter 5: The Choice
The government agents arrived on a Tuesday.
"Ms. Chen, I'm Agent Morrison with FinCEN. We're here regarding unreported digital asset transactions and potential violations of the Digital Dollar Compliance Act."
Sarah sat calmly on her porch, noting the three SUVs and eight agents for a simple compliance visit. "I'm not familiar with any violations, Agent Morrison."
"Our records show significant Bitcoin activity associated with this address over the past eighteen months. As you know, all Bitcoin transactions must now be reported and converted to Digital Dollars within thirty days of the regulation's effective date."
"I'm curious," Sarah said, "what gives you jurisdiction over private property transactions between consenting adults?"
Agent Morrison's jaw tightened. "Ma'am, Bitcoin is no longer recognized as legal tender. Continued possession constitutes financial crimes, and any merchant accepting it faces federal prosecution."
"And yet," Sarah observed, "I notice your agency is still desperately trying to acquire Bitcoin through the emergency acquisition program. Funny how something that's supposedly worthless is so aggressively pursued."
The truth was becoming impossible to hide. While most Americans dutifully converted their Bitcoin holdings to Digital Dollars, the government faced a growing problem: their new CBDC system needed real assets to back it, and most of the traditional collateral had been vaporized in the banking collapse. Bitcoin held by people like Sarah represented actual, unencumbered value in a system built on the wreckage of paper claims.
Chapter 6: The Underground
Two years later
The farmer's market operated on Saturdays, technically selling "livestock feed and agricultural supplies." Everyone understood the code: goods and services traded for Bitcoin, off the books, away from the Digital Dollar surveillance grid.
Sarah's role had evolved from individual holder to informal banker for the community. Her multi-signature storage system, distributed across multiple hidden locations, held the Bitcoin reserves that kept their local economy functioning. When someone needed to make a large purchase - a truck, a piece of farm equipment, sometimes medical care - they came to her for conversion services.
"The irony," she explained to a newcomer family, "is that we've become exactly what Bitcoin was designed to be: a peer-to-peer electronic cash system. It just took the collapse of the traditional system to make it necessary."
Mike, now permanently relocated to the community, had become their digital security specialist. "Remember when you used to worry about Bitcoin's volatility?" he asked Sarah one evening as they reviewed the week's trading logs.
Sarah laughed. "Now it's the most stable thing in our world. Digital Dollars keep inflating away, bank accounts keep getting frozen or bailed-in, but Bitcoin just keeps working."
Through encrypted communications, they stayed in touch with similar communities worldwide. The pattern was repeating everywhere: small groups of people who had maintained self-custody were forming the backbone of parallel economies, while the majority struggled with the limitations and surveillance of the new digital monetary system.
Chapter 7: The Reckoning
Five years later
The government's Bitcoin capitulation came quietly, buried in a routine Treasury bulletin: "Emergency acquisition protocols for decentralized digital assets will be extended indefinitely due to ongoing collateral requirements."
Sarah read the announcement on her phone while walking through the thriving main street of what locals now called "Bitcoin Valley." The blacksmith shop accepted Bitcoin, the medical clinic operated on Bitcoin payments, even the small school funded itself through Bitcoin donations from around the world.
Agent Morrison, ironically, had become a semi-regular visitor - not for enforcement, but for the monthly "consulting fees" the Treasury quietly paid to Bitcoin communities for "monetary system stabilization services." The government's dirty secret was that their Digital Dollar needed periodic backing by real assets, and Bitcoin communities like theirs were the only source of liquid value that couldn't be rehypothecated into oblivion.
"Webb was right about almost everything," Sarah told Mike as they sat on the porch watching their neighbors head home from another day of actual productivity rather than financial intermediation. "The only thing he missed was how much better life could be on the other side."
Mike nodded, watching his daughter play with the other kids in the community garden. "Sometimes I wonder what would have happened if everyone had just said no from the beginning. If people had refused to put their Bitcoin on lending platforms, refused to accept the intermediated system."
"We'd probably be living in a very different world," Sarah replied. "But maybe this is better. Maybe we needed the collapse to remember what money is actually supposed to do - facilitate real human cooperation instead of enabling control systems."
Her phone buzzed with a message from a new family asking about relocating to the community. She'd answer tomorrow. Tonight, she wanted to enjoy the sound of children playing in a place where their future wasn't mortgaged to financial intermediaries, where their parents' savings couldn't be rehypothecated into someone else's derivatives position, where the simple act of holding your own money was still possible.
Epilogue: The Next Generation
Ten years later
Sarah's Bitcoin academy graduated its first class of eighteen-year-olds who had never used a traditional bank account. They understood concepts like self-custody and monetary sovereignty as naturally as previous generations had understood credit cards and mortgages.
The final exam was practical: each student had to successfully send Bitcoin to a wallet on the other side of the world, receive confirmation from the recipient, and explain why this simple transaction represented a fundamental shift in human organization.
"The old system," explained one student in her essay, "required trusted third parties for everything. To hold your money, to verify your transactions, to determine what you could buy and from whom. It concentrated power in institutions that used that power to extract value rather than create it."
"But Bitcoin," she continued, "proves that trust can be mathematical rather than institutional. That you can cooperate with people you've never met without giving control to intermediaries who don't have your interests at heart."
Sarah smiled, thinking of Webb's words from all those years ago: "We will come to know who is behind this hybrid war against humanity."
They had. And more importantly, they had built something better.
The great taking had failed, not because the mechanisms weren't real, but because enough people had chosen to step outside the system before it consumed them. In trying to capture everything, the controllers had revealed their dependence on voluntary participation.
The children playing in the Bitcoin Valley community garden would grow up in a world where monetary sovereignty was as natural as free speech had once been. Where cooperation didn't require intermediation, and where wealth couldn't be conjured away by clever legal frameworks.
Webb's warning had become their liberation.
End
Author's Note: This story explores themes from "The Great Taking" by David Rogers Webb, examining how financial system collapse might unfold and how preparation might look in practice. While fiction, it's based on real legal frameworks and financial mechanisms described in Webb's research. The Bitcoin scenarios reflect actual platform failures that occurred after Webb's book was published, validating many of his predictions about intermediated systems.
-
@ 74fb3ef2:58adabc7
2025-06-02 22:59:39I'm actually glad that COVID happened. If it weren't for COVID, I would not have woken up.
Before COVID, I hated the government like any tax-paying slave does, but I never questioned the narrative. I believed the full statist propaganda—that the government had my best interest in mind and that we couldn't live without them.
I always believed they were thieves. I always knew they were idiots. I think it takes barely a few minutes of actual thinking to realize that. But I was very anti-"conspiracy theory." I used to ridicule non-statists and bitcoiners too.
COVID was the switch for me. I started doing research, but I was skeptical at first. Then, in a random Discord server about political debate, a certain user's messages stood out.
Most users were statists, left and right NPCs screaming about which geriatric and demented person should be the new monarch of a country I don't even live in and will likely never visit anymore.
But this one person was different. I don't think it's up to me to share his name since he's a very private person (you know who you are, and thank you). But I talked with this person almost every week. I presented argument after argument for my "side," essentially advocating for my own slavery to people who value me less than a pawn in a game of chess.
There was no argument I would bring up that he wouldn't destroy me on with logic and data.
Slowly, over a few months, he convinced me and turned me into the free person I am today.
I owe so much to this person: - The fact that I quit my main job a while back and only do freelance now - The fact that I don't use any big tech products anymore - The fact that I'm a bitcoiner - The fact that I self-host a lot of servers, despite living in a small apartment - The fact that I'm becoming less reliant on the slavery system - The fact that I'm now living free - The fact that I'm writing this very article on nostr
Once you start questioning one widely-accepted narrative, it becomes natural to ask "what else might I have wrong?" or "what other assumptions haven't I examined?"
Thank you, government, for COVID. And thank you, mystery person, for calling me a retard and showing me how I was being retarded.
-
@ e2c72a5a:bfacb2ee
2025-06-03 01:23:09Your crypto wallet isn't just a digital piggy bank—it's your financial fortress in a $3 trillion battlefield where hackers deploy AI-powered attacks daily. While most see blockchain's transparency as revolutionary, criminals see it as an opportunity map. The immutable nature that makes crypto trustworthy also makes security non-negotiable: once your assets are gone, they're permanently gone.
Smart investors now implement tiered security systems: cold storage vaults for long-term holdings, hardware wallets with multi-signature protection for medium-term assets, and limited funds in hot wallets for active trading. The most sophisticated users leverage blockchain analytics to monitor suspicious transactions and employ specialized forensic techniques when things go wrong.
Don't wait for a hack to take security seriously. The difference between keeping and losing your crypto often comes down to basic practices: using hardware-based 2FA, limiting API permissions, and recognizing that no urgent request for your credentials is ever legitimate. Remember, in crypto, you're not just an investor—you're your own security team.
-
@ 39cc53c9:27168656
2025-05-27 09:21:43kycnot.me features a somewhat hidden tool that some users may not be aware of. Every month, an automated job crawls every listed service's Terms of Service (ToS) and FAQ pages and conducts an AI-driven analysis, generating a comprehensive overview that highlights key points related to KYC and user privacy.
Here's an example: Changenow's Tos Review
Why?
ToS pages typically contain a lot of complicated text. Since the first versions of kycnot.me, I have tried to provide users a comprehensive overview of what can be found in such documents. This automated method keeps the information up-to-date every month, which was one of the main challenges with manual updates.
A significant part of the time I invest in investigating a service for kycnot.me involves reading the ToS and looking for any clauses that might indicate aggressive KYC practices or privacy concerns. For the past four years, I performed this task manually. However, with advancements in language models, this process can now be somewhat automated. I still manually review the ToS for a quick check and regularly verify the AI’s findings. However, over the past three months, this automated method has proven to be quite reliable.
Having a quick ToS overview section allows users to avoid reading the entire ToS page. Instead, you can quickly read the important points that are grouped, summarized, and referenced, making it easier and faster to understand the key information.
Limitations
This method has a key limitation: JS-generated pages. For this reason, I was using Playwright in my crawler implementation. I plan to make a release addressing this issue in the future. There are also sites that don't have ToS/FAQ pages, but these sites already include a warning in that section.
Another issue is false positives. Although not very common, sometimes the AI might incorrectly interpret something harmless as harmful. Such errors become apparent upon reading; it's clear when something marked as bad should not be categorized as such. I manually review these cases regularly, checking for anything that seems off and then removing any inaccuracies.
Overall, the automation provides great results.
How?
There have been several iterations of this tool. Initially, I started with GPT-3.5, but the results were not good in any way. It made up many things, and important thigs were lost on large ToS pages. I then switched to GPT-4 Turbo, but it was expensive. Eventually, I settled on Claude 3 Sonnet, which provides a quality compromise between GPT-3.5 and GPT-4 Turbo at a more reasonable price, while allowing a generous 200K token context window.
I designed a prompt, which is open source^1, that has been tweaked many times and will surely be adjusted further in the future.
For the ToS scraping part, I initially wrote a scraper API using Playwright^2, but I replaced it with Jina AI Reader^3, which works quite well and is designed for this task.
Non-conflictive ToS
All services have a dropdown in the ToS section called "Non-conflictive ToS Reviews." These are the reviews that the AI flagged as not needing a user warning. I still provide these because I think they may be interesting to read.
Feedback and contributing
You can give me feedback on this tool, or share any inaccuraties by either opening an issue on Codeberg^4 or by contacting me ^5.
You can contribute with pull requests, which are always welcome, or you can support this project with any of the listed ways.
-
@ 39cc53c9:27168656
2025-05-27 09:21:41These reviews are sponsored, yet the sponsorship does not influence the outcome of the evaluations. Sponsored reviews are independent from the kycnot.me list, being only part of the blog. The reviews have no impact on the scores of the listings or their continued presence on the list. Should any issues arise, I will not hesitate to remove any listing. Reviews are in collaboration with Orangefren.
The review
Swapter.io is an all-purpose instant exchange. They entered the scene in the depths of the bear market about 2 years ago in June of 2022.
| Pros | Cons | | --------------- | ---------------------------------- | | Low fees | Shotgun KYC with opaque triggers | | Large liquidity | Relies on 3rd party liquidity | | Works over Tor | Front-end not synced with back-end | | Pretty UI | |
Rating: ★★★☆☆ Service Website: swapter.io
⚠️ There is an ongoing issue with this service: read more on Reddit.
Test Trades
During our testing we performed a trade from XMR to LTC, and then back to XMR.
Our first trade had the ID of:
mpUitpGemhN8jjNAjQuo6EvQ
. We were promised 0.8 LTC for sending 0.5 XMR, before we sent the Monero. When the Monero arrived we were sent 0.799 LTC.On the return journey we performed trade with ID:
yaCRb5pYcRKAZcBqg0AzEGYg
. This time we were promised 0.4815 XMR for sending 0.799 LTC. After Litecoin arrived we were sent 0.4765 XMR.As such we saw a discrepancy of
~0.1%
in the first trade and~1%
in the second trade. Considering those trades were floating we determine the estimates presented in the UI to be highly accurate and honest.Of course Swapter could've been imposing a large fee on their estimates, but we checked their estimates against CoinGecko and found the difference to be equivalent to a fee of just over
0.5%
. Perfectly in line with other swapping services.Trading
Swapter supports BTC, LTC, XMR and well over a thousand other coins. Sadly they don't support the Lightning Network. For the myriad of currencies they deal with they provide massive upper limits. You could exchange tens, or even hundreds, of thousands of dollars worth of cryptocurrency in a single trade (although we wouldn't recommend it).
The flip side to this is that Swapter relies on 3rd party liquidity. Aside from the large liqudity this also benefits the user insofar as it allows for very low fees. However, it also comes with a negative - the 3rd party gets to see all your trades. Unfortunately Swapter opted not to share where they source their liquidity in their Privacy Policy or Terms of Service.
KYC & AML policies
Swapter reserves the right to require its users to provide their full name, their date of birth, their address and government-issued ID. A practice known as "shotgun KYC". This should not happen often - in our testing it never did - however it's not clear when exactly it could happen. The AML & KYC policy provided on Swapter's website simply states they will put your trade on hold if their "risk scoring system [deems it] as suspicious".
Worse yet, if they determine that "any of the information [the] customer provided is incorrect, false, outdated, or incomplete" then Swapter may decide to terminate all of the services they provide to the user. What exactly would happen to their funds in such a case remains unclear.
The only clarity we get is that the Swapter policy outlines a designated 3rd party that will verify the information provided by the user. The third party's name is Sum & Substance Ltd, also simply known as samsub and available at sumsub.com
It's understandable that some exchanges will decide on a policy of this sort, especially when they rely on external liquidity, but we would prefer more clarity be given. When exactly is a trade suspicious?
Tor
We were pleased to discover Swapter works over Tor. However, they do not provide a Tor mirror, nor do they work without JavaScript. Additionally, we found that some small features, such as the live chat, did not work over Tor. Fortunately, other means of contacting their support are still available.
UI
We have found the Swapter UI to be very modern, straightforward and simple to use. It's available in 4 languages (English, French, Dutch and Russian), although we're unable to vouch for the quality of some of those, the ones that we used seemed perfectly serviceable.
Our only issue with the UI was that it claims the funds have been sent following the trade, when in reality it seems to take the backend a minute or so to actually broadcast the transaction.
Getting in touch
Swapter's team has a chat on their website, a support email address and a support Telegram. Their social media presence in most active on Telegram and X (formerly Twitter).
Disclaimer
None of the above should be understood as investment or financial advice. The views are our own only and constitute a faithful representation of our experience in using and investigating this exchange. This review is not a guarantee of any kind on the services rendered by the exchange. Do your own research before using any service.
-
@ 0971cd37:53c969f4
2025-06-03 04:11:51วิธีที่เหมืองบิตคอยน์สามารถเพิ่มรายได้ได้ โดยทั่วไปแล้วมี 2 วิธีที่การทำเหมืองบิตคอยน์สามารถเพิ่มรายได้สูงสุดของพวกเขา
- ซื้อฮาร์ดแวร์ใหม่
- ปรับปรุงประสิทธิภาพของฮาร์ดแวร์ปัจจุบัน
การซื้อฮาร์ดแวร์ใหม่เป็นตัวเลือกที่มีความเสี่ยงมากกว่าในสองตัวเลือก เนื่องจากมักจะมีการใช้จ่ายเงินลงทุนล่วงหน้าจำนวนมาก ซึ่งอาจใช้เวลาหลายเดือนหรือนานกว่านั้นกว่าจะได้รับผลตอบแทนที่เป็นบวก ขึ้นอยู่กับการเคลื่อนไหวของราคาบิตคอยน์แน่นอน เมื่อเปรียบเทียบ การได้รับผลตอบแทนมากขึ้นจากฮาร์ดแวร์ที่มีอยู่เป็นเรื่องง่ายสำหรับนักขุดส่วนใหญ่ สิ่งที่ไม่ชัดเจนหรือไม่เป็นที่รู้จักคือการเพิ่มความเร็วสัญญาณนาฬิกาไม่ใช่วิธีเดียวในการเพิ่มอัตราการแฮชของ ASIC การปรับแต่งเฟิร์มแวร์อัตโนมัติสามารถเพิ่มรายได้ของนักขุดได้อย่างไร และมันแตกต่างจากการทำโอเวอร์คล๊อกที่รู้จักกันดีอย่างไร
การโอเวอร์คล๊อก = แฮชเรตมากขึ้น, ประสิทธิภาพน้อยลง (สูงสุด W/TH) ในช่วงต้นปี 2018 กลุ่มคนขุดเริ่มทดลองเพิ่มความเร็วการทำงานของ ASIC ของพวกเขาเพื่อเพิ่มรายได้ การเพิ่มความเร็วการทำงานหมายความว่า ASIC จะใช้พลังงานมากขึ้น แฮชที่ความถี่ที่สูงขึ้น และสร้างหลักฐานการทำงานที่ถูกต้องมากกว่าการตั้งค่ามาตรฐาน ตัวอย่างเช่น Antminer S9 ที่ผลิต 13.5 TH/s โดยทั่วไปที่การบริโภคพลังงาน 1200 W สามารถโอเวอร์คล็อกเพื่อสร้าง 16 TH/s ที่อัตราการบริโภค 1,600 วัตต์แทนได้ โดยที่ความยากของ Bitcoin ปรับตัวขึ้นอย่างสม่ำเสมอเมื่อมี ASIC เข้ามาใช้งานมากขึ้นเรื่อยๆ รายได้ที่สร้างได้จากเครื่องเดียวโดยทั่วไปจะลดลงอย่างมากเมื่อเวลาผ่านไป
ราคาค่า hash ($/TH ของอัตราแฮช) ได้ลดลงอย่างต่อเนื่องตลอดเวลาในขณะที่ความยากเพิ่มขึ้น ดังนั้นนักขุดจึงต้องการให้เครื่องของพวกเขาทำงานได้มากที่สุดเท่าที่จะเป็นไปได้ในเวลาที่เร็วที่สุด ก่อนที่อัตรากำไรจะถูกบีบให้แคบลงจากความยากที่เพิ่มขึ้น และพวกเขายินดีที่จะทำให้เครื่องของพวกเขามีประสิทธิภาพน้อยลง (เช่น ต้องใช้พลังงานสูงขึ้น W/TH) ด้วยการโอเวอร์คล๊อกเพื่อที่จะได้สะสม Bitcoin ในระยะสั้น อย่างไรก็ตาม การปรับปรุงเฟิร์มแวร์ที่มีแนวโน้มไม่หยุดอยู่เพียงแค่การโอเวอร์คล๊อกเท่านั้น
การปรับแต่งอัตโนมัติ = อัตราแฮชเรตที่สูงขึ้น ประสิทธิภาพที่สูงขึ้น (TH/W สูงสุด)
สิ่งที่หลายคนไม่ทราบเกี่ยวกับ ASIC คืออุปกรณ์แต่ละตัวนั้นมีความเฉพาะตัวในแง่ของคุณภาพของชิปแฮชและการผลิตโดยรวม ซึ่งส่วนใหญ่เกิดจากข้อเท็จจริงนี้ คุณภาพของซิลิกอนไม่ได้มาตรฐาน 100% ดังนั้นชิปการแฮชบางตัวจึงมีประสิทธิภาพดีกว่าตัวอื่น ๆ โดยธรรมชาติ อย่างไรก็ตาม บริษัทเหมืองแร่ต้องการการทำให้เป็นมาตรฐานเมื่อพวกเขาซื้อฮาร์ดแวร์ ดังนั้นผู้ผลิตมักจะทำให้สเปค ASIC ต่ำกว่าประสิทธิภาพสูงสุดที่เป็นไปได้ เพื่อให้มั่นใจได้ว่าทุกเครื่องที่พวกเขาส่งมอบจะตรงตามความคาดหวังของนักขุด ในแง่นั้น การอัปเกรดประสิทธิภาพที่ไม่ค่อยมีใครรู้จักสำหรับ ASIC ซึ่งคล้ายกับการเพิ่มความเร็วเรียกว่าการปรับแต่งอัตโนมัติ การเพิ่มความเร็วและการปรับแต่งอัตโนมัติทั้งสองเกี่ยวข้องกับการปรับความถี่บนแผงการแฮชเพื่อเปลี่ยนแปลงประสิทธิภาพของ ASIC ความแตกต่างระหว่างการเพิ่มความเร็วกับการปรับแต่งอัตโนมัติอยู่ที่ความฉลาดและความซับซ้อนของการปรับความถี่เหล่านั้น
การโอเวอร์คลอคเป็นการปรับแต่งที่ค่อนข้างรุนแรง เพียงแค่เพิ่มความถี่บนบอร์ดแฮชเพื่อเพิ่มอัตราแฮชของเครื่อง ในขณะที่การปรับอัตโนมัติซึ่งซับซ้อนกว่ามาก แทนที่จะเพิ่มความถี่ของบอร์ดแฮชทั้งหมด ฟิร์มแวร์การปรับอัตโนมัติสามารถปรับความถี่ในแต่ละชิปได้ กล่าวอีกนัยหนึ่ง ฟิร์มแวร์จะหาความถี่ที่เหมาะสมที่สุดสำหรับชิปแต่ละตัว โดยส่งความถี่ที่สูงกว่าสำหรับชิปที่มีคุณภาพสูงกว่าหรือความถี่ที่ต่ำกว่าสำหรับชิปที่มีคุณภาพต่ำกว่า ผลลัพธ์สุดท้ายจากการปรับอัตโนมัติคือน้ำหนักประสิทธิภาพ W/TH ที่ดีขึ้นในทุกการตั้งค่าพลังงานที่นักขุดเลือก เมื่อรวมกับการโอเวอร์คลอค การปรับอัตโนมัติสามารถเปิดใช้งานอัตราฮาชที่สูงขึ้นได้หรือสามารถรักษาการเพิ่มขึ้นของอัตราฮาชในขณะนำการใช้พลังงานลงได้
สำหรับเหมืองแร่ที่มีค่าไฟฟ้ามีราคาถูกมากหรือแม้กระทั่งฟรี การโอเวอร์คลอก + การปรับแต่งอัตโนมัติเป็นวิธีที่มีประสิทธิภาพที่สุดในการเพิ่มจำนวน BTC ที่ขุดได้
ผู้ใช้เลือกขีดจำกัดกำลังไฟ ในตลาดกระทิง การปรับจูนอัตโนมัติและการโอเวอร์คล๊อกมักจะเป็นการรวมกันที่พบมากที่สุด เนื่องจากผู้ขุดพยายามเพิ่มรายได้ในขณะที่พวกเขามีกำไรที่ดีขึ้น อย่างไรก็ตาม การปรับจูนอัตโนมัติมีประโยชน์ข้ามกลยุทธ์การขุดทั้งหมด
ตัวอย่างเช่น การปรับจูนอัตโนมัติที่จำกัดพลังงานต่ำเป็นประโยชน์มากสำหรับผู้ขุดที่ใช้ Antminer S9 ในช่วงเวลาของการลดครึ่งเมื่ออัตรากำไรลดลงอย่างมาก ด้วย Braiins OS+ ผู้ขุดสามารถตั้งค่าขีดจำกัดพลังงานที่ 800 หรือ 900 วัตต์สำหรับ S9 และบรรลุประสิทธิภาพที่ 70-75 วัตต์ต่อ TH สำหรับเครื่องที่ระบายความร้อนด้วยอากาศ ตามที่แสดงด้วยเครื่องคิดเลขต้นทุนในการขุด 1 BTC ของเรา (ผู้ขุดสามารถทำผลลัพธ์ที่ดียิ่งขึ้นด้วยการระบายความร้อนแบบ immersion)
คุณค่าหลักของการปรับแต่งเฟิร์มแวร์อัตโนมัติคือมันจะเพิ่มประสิทธิภาพ ASIC ที่ทุกขีดจำกัดกำลังไฟฟ้าที่คุณกำหนด ลดค่าใช้จ่ายของคุณสำหรับทุก Satoshi ที่คุณสร้างรายได้
ตลาดสำหรับเฟิร์มแวร์การปรับเสียงอัตโนมัติ ทุกคนที่อยู่ในอุตสาหกรรมการขุดมานานหลายปีเข้าใจได้ว่าอุตสาหกรรมการขุดพัฒนาไปอย่างรวดเร็วเพียงใด แม้ว่าการปรับแต่งอัตโนมัติยังค่อนข้างไม่เป็นที่แพร่หลาย แต่ก็คงจะกลายเป็นแนวปฏิบัติมาตรฐานในหมู่ผู้ขุดภายใน 1-2 ปีข้างหน้า ผู้ขุดมีผู้ให้บริการเฟิร์มแวร์จากบุคคลที่สามหลายรายให้เลือกซึ่งถือเป็นการพัฒนาที่สำคัญเมื่อเปรียบเทียบกับไม่กี่ปีที่ผ่านมาเมื่อ Bitmain เป็นผู้ผลิตฮาร์ดแวร์ที่มีอิทธิพลมากที่สุดและไม่มีเฟิร์มแวร์ที่กำหนดเองสำหรับ Antminers
ในการตระหนักถึงคุณค่าที่การปรับแต่งอัตโนมัติสามารถมอบให้ — โดยเฉพาะสำหรับนักขุดนอกประเทศจีนที่ต้องรอนานขึ้นและต้องจ่ายราคาที่สูงกว่าสำหรับฮาร์ดแวร์การขุดรุ่นใหม่ — เราที่ Braiins ได้มุ่งมั่นในการพัฒนาเฟิร์มแวร์การปรับแต่งอัตโนมัติที่มีประสิทธิภาพสูงสำหรับการดำเนินงานการขุดทุกรูปแบบ
Braiins OS+ มีการแข่งขันกับเฟิร์มแวร์การปรับแต่ง ASIC อื่น ๆ ทั้งในด้านต้นทุนและประสิทธิภาพ แต่มีความโดดเด่นในด้านอื่น ๆ เช่น ฐานข้อมูลโอเพ่นซอร์ซ, การปฏิบัติตาม GPL และชื่อเสียงที่เราสร้างขึ้นตลอด 7 ปีในอุตสาหกรรมการขุด Bitcoin
ข้อมูลเนื้อหา : https://braiins.com/
-
@ 39cc53c9:27168656
2025-05-27 09:21:40“The future is there... staring back at us. Trying to make sense of the fiction we will have become.” — William Gibson.
This month is the 4th anniversary of kycnot.me. Thank you for being here.
Fifteen years ago, Satoshi Nakamoto introduced Bitcoin, a peer-to-peer electronic cash system: a decentralized currency free from government and institutional control. Nakamoto's whitepaper showed a vision for a financial system based on trustless transactions, secured by cryptography. Some time forward and KYC (Know Your Customer), AML (Anti-Money Laundering), and CTF (Counter-Terrorism Financing) regulations started to come into play.
What a paradox: to engage with a system designed for decentralization, privacy, and independence, we are forced to give away our personal details. Using Bitcoin in the economy requires revealing your identity, not just to the party you interact with, but also to third parties who must track and report the interaction. You are forced to give sensitive data to entities you don't, can't, and shouldn't trust. Information can never be kept 100% safe; there's always a risk. Information is power, who knows about you has control over you.
Information asymmetry creates imbalances of power. When entities have detailed knowledge about individuals, they can manipulate, influence, or exploit this information to their advantage. The accumulation of personal data by corporations and governments enables extensive surveillances.
Such practices, moreover, exclude individuals from traditional economic systems if their documentation doesn't meet arbitrary standards, reinforcing a dystopian divide. Small businesses are similarly burdened by the costs of implementing these regulations, hindering free market competition^1:
How will they keep this information safe? Why do they need my identity? Why do they force businesses to enforce such regulations? It's always for your safety, to protect you from the "bad". Your life is perpetually in danger: terrorists, money launderers, villains... so the government steps in to save us.
‟Hush now, baby, baby, don't you cry Mamma's gonna make all of your nightmares come true Mamma's gonna put all of her fears into you Mamma's gonna keep you right here, under her wing She won't let you fly, but she might let you sing Mamma's gonna keep baby cosy and warm” — Mother, Pink Floyd
We must resist any attack on our privacy and freedom. To do this, we must collaborate.
If you have a service, refuse to ask for KYC; find a way. Accept cryptocurrencies like Bitcoin and Monero. Commit to circular economies. Remove the need to go through the FIAT system. People need fiat money to use most services, but we can change that.
If you're a user, donate to and prefer using services that accept such currencies. Encourage your friends to accept cryptocurrencies as well. Boycott FIAT system to the greatest extent you possibly can.
This may sound utopian, but it can be achieved. This movement can't be stopped. Go kick the hornet's nest.
“We must defend our own privacy if we expect to have any. We must come together and create systems which allow anonymous transactions to take place. People have been defending their own privacy for centuries with whispers, darkness, envelopes, closed doors, secret handshakes, and couriers. The technologies of the past did not allow for strong privacy, but electronic technologies do.” — Eric Hughes, A Cypherpunk's Manifesto
The anniversary
Four years ago, I began exploring ways to use crypto without KYC. I bookmarked a few favorite services and thought sharing them to the world might be useful. That was the first version of kycnot.me — a simple list of about 15 services. Since then, I've added services, rewritten it three times, and improved it to what it is now.
kycnot.me has remained 100% independent and 100% open source^2 all these years. I've received offers to buy the site, all of which I have declined and will continue to decline. It has been DDoS attacked many times, but we made it through. I have also rewritten the whole site almost once per year (three times in four years).
The code and scoring algorithm are open source (contributions are welcome) and I can't arbitrarly change a service's score without adding or removing attributes, making any arbitrary alterations obvious if they were fake. You can even see the score summary for any service's score.
I'm a one-person team, dedicating my free time to this project. I hope to keep doing so for many more years. Again, thank you for being part of this.
-
@ eb0157af:77ab6c55
2025-06-03 04:02:09The Wall Street financial institution has signed strategic agreements for bitcoin-backed loans with Maple Finance and FalconX.
According to Bloomberg, on May 27 Cantor Fitzgerald officially launched its new division dedicated to Bitcoin lending, announcing the completion of the first transactions of its Bitcoin Financing Business. The Wall Street firm confirmed it has finalized a first round of deals with two crypto sector players: Maple Finance and FalconX.
The company initially plans to make up to $2 billion in financing available to institutional clients.
Brandon Lutnick, President of Cantor Fitzgerald, commented:
“From the start, Cantor recognized the transformative impact that financial services for digital assets would have on the global economy. This milestone highlights how the combination of Cantor’s deep expertise and entrepreneurial spirit creates a distinctive advantage on Wall Street.”
The partnership with Maple Finance is part of Cantor’s broader expansion strategy. Sidney Powell, Co-Founder and CEO of Maple Finance, emphasized how the deal will expand his company’s ability to serve clients looking to access the digital asset market:
“We’re seeing strong and growing demand from institutions seeking to enter the crypto market through trusted and regulated channels.”
Josh Barkhordar, Head of U.S. Sales at FalconX, stated:
“Digital assets have lacked the institutional-grade credit infrastructure essential for healthy capital markets. This collaboration between Cantor and a crypto-native firm is a meaningful step toward building that framework.”
To ensure the security and reliability of its bitcoin-backed financing services, Cantor Fitzgerald has selected Anchorage Digital and Copper.co for custody solutions.
The post Cantor Fitzgerald launches first bitcoin-backed loans appeared first on Atlas21.
-
@ 39cc53c9:27168656
2025-05-27 09:21:38Silent.link is an anonymous eSIM provider. They offer pay-as-you-go roaming in 160+ countries.
Pros
- Anonymous
- Private payment options
- High performance
- Global availability
Cons
- Need to select the right networks sometimes
- Latency
- Data and incoming SMS & call only
Rating
★★★★★
Service website
eSIMs replace traditional, physical SIM cards, if you have a fairly new phone, odds are it supports them. Since most people change their mobile carrier very rarely, the most common use case for these new eSIMs is their use in travel. Although their use as a piece of a larger OPSEC puzzle to improve privacy when using the internet from your phone is increasingly popular too.
Silent.link is not the only eSIM provider out there. Yet, they’re so unique that even Twitter’s (now X) founder Jack Dorsey recommends them.
Let’s start off with a quick explanation of how Silent.link works and what pay-as-you-go means. Most other eSIM providers will sell you packages of GBs with an expiration date. For instance imagine you’re visiting France then going to the UK after a few months. With other providers you might buy a 10GB in France package valid for 7 days, then after some months a 10GB in the UK package also valid for 7 days. You likely won’t use up the full package in either country and the remaining capacity will be voided as the package expires.
Silent.link’s pay-as-you-go is different. There are no geographic packages. There are no expiration dates. You simply have a balance denominated in USD and are charged as you use up the data according to the pricing of whichever local carrier you’re connecting via.
Preparing for the same trips from the example above you’d simply top-up your Silent.link balance with $10. Then you’d use Silent.link in France paying $1.33/GB, you’d only be charged for the exact amount used, then you’d go to the UK and pay $1.54/GB from the balance you had left over from France. It doesn’t matter how much time passes between the trips, because Silent.link balances don’t expire. If you have a balance left over you can use it on a future trip, or simply use it up in your home country.
Pros
Anonymity
Silent.link is anonymous. Most other eSIM providers require some form of identification. This can be a traditional, full KYC, procedure involving your ID or passport numbers or, as seemingly innocent, as verifying your phone number with your main carrier. Regardless, a link between the eSIM you bought online and your identity is established.
In some countries you’ll be able to pick up a traditional SIM (or the new eSIM) from a local carrier without undergoing this verification. This can still be a hassle though. You’ll need to look up the laws before travelling, you’ll need to find a local store selling them, you’ll need to decide how you’ll pay privately, etc. And that’s the best case, that’s assuming the country you want to get the SIM in allows you to buy one anonymously.
Private payment methods
Silent.link only accepts cryptocurrency and according to their stats, most payments are made with Bitcoin (either onchain or using the Lightning Network) or with Monero. As such paying anonymously is not a problem. The use a self-hosted instance of BTCPay Server to process payments and operate their own LN node. The entire checkout process can be completed over Tor.
Cons
Network selection
Although you can skip the hassle of buying a new eSIM every time you travel it’s a good idea to look up the pricing of different mobile networks in the country you’re going to. The differences can be trivial, but can also be 100x. If a specific mobile network offers a much better deal, you’ll probably want to dive into your phone’s settings to make sure it only connects to that network.
High prices for some regions
Second issue can be that, especially for poorer countries, Silent.link might not have the best prices. For instance if you travel to Angola you’ll end up paying $155.44/GB. But if you search around for other providers you’ll find eSIM that offer much lower prices for that same country.
Data & incoming SMS & calls only
These eSIMs are either data-only or only offer data and inbound sms and calls. You can’t use Silent.link eSIMs to send texts or make phone calls.
Latency
For most use-cases this shouldn’t matter, but the way roaming works is that when you’re abroad your data is first sent to your home country then sent out into the internet from there. For instance if you’re a Brit on holiday in Spain wherever you open up a website your phone communicates with the Spanish network who forwards the request to your home network in the UK and only there does the request start going towards the website you’re trying to load. The response takes the same path in reverse.
The home network for the Silent.link eSIMs is Poland. To take an extreme (antipodal) example, if you’re in Chile loading a Chilean website your request will go to Poland then back from Poland to the website’s server in Chile, then the response will go from Chile to Poland to you (in Chile). All those trips add latency. In our testing, done during the recent OrangeFren.com meetup in Istanbul, the difference was an additional 73ms. The bandwidth, however, was exceptional, easily surpassing 100 Mbps.
This latency issue isn’t unique to Silent.link, other eSIM providers usually suffer from it too, though their home network may be better suited for your latency needs. If you need the best latency we recommend a SIM from a local provider (or WiFi).
This proxy behaviour isn’t all negative however. It may potentially allow you to circumvent censorship or geoblocking if you’re trying to access resources available from Poland, but unavailable elsewhere.
Besides Istanbul one of the countries we also tested Silent.link in was Northern Cyprus. This territory is mostly unrecognized. It’s a country that, depending on who you ask, is or isn’t real. Despite this unresolved geopolitical status Silent.link performed without any issues.
Installation
If you decide to give Silent.link a try, you'll need to select if you want a data-only plan or a plan with inbound SMS & calling, once you complete the payment simply scan the QR code on the order confirmation page with your phone. Make sure to save the url of that order confirmation page somewhere! You will need it to top up your eSIM and check your remaining balance.
Getting in touch
The preferred way of contacting Silent.link's support is using the website's built-in chat function. Alternative methods include X (formerly Twitter), Matrix and email.
Their support is online from 09:00 - 21:00 UTC although even when testing outside of those hours we got a reply within a minute.
NOTE: These reviews are sponsored, yet the sponsorship does not influence the outcome of the evaluations. Sponsored reviews are independent from the kycnot.me list, being only part of the blog. The reviews have no impact on the scores of the listings or their continued presence on the list. Should any issues arise, I will not hesitate to remove any listing.
-
@ e2c72a5a:bfacb2ee
2025-06-03 01:21:59The Privacy Paradox: How Zero Knowledge Proofs Revolutionize Decentralized Governance
Imagine proving you're trustworthy without revealing a single personal detail. That's the magic of Zero Knowledge Proofs—the cryptographic innovation transforming how we interact with digital systems while keeping our data truly private.
ZKPs allow you to verify information without exposing sensitive data. Think of it like proving you know where Waldo is by showing someone Waldo through a small hole in paper covering the rest of the image. You've proven knowledge without revealing the location.
In decentralized governance, this technology is revolutionary. Traditional systems force us to overshare personal information, creating massive data honeypots vulnerable to breaches. ZKPs flip this model by enabling selective disclosure—proving you're eligible to vote without revealing your identity, or demonstrating compliance without exposing financial details.
The technology comes in different flavors. zk-SNARKs (Zero-Knowledge Succinct Non-interactive Arguments of Knowledge) offer compact proofs but require trusted setup. zk-STARKs provide quantum resistance without trusted setup but with larger proof sizes. Both enable privacy-preserving verification that's transforming blockchain applications.
Real-world implementations are already here: private voting systems, identity verification without data exposure, cross-chain asset transfers, and scalable transaction processing. Projects like Zcash, Polygon zkEVM, and Aztec Network demonstrate how ZKPs can make blockchain systems both private and efficient.
The future looks even more promising. ZK-enabled machine learning could allow training on sensitive data without exposure. Autonomous worlds could create new digital experiences with cryptographic fog of war. Some even predict Nobel Peace Prizes for ZKP applications in nuclear disarmament verification or high-stakes negotiations.
As our digital lives become increasingly interconnected, the question isn't whether we need privacy—it's how we'll implement it. Zero Knowledge Proofs offer a compelling answer: trust through mathematics, not blind faith in institutions.
What sensitive information would you prefer to verify without revealing?
-
@ e2c72a5a:bfacb2ee
2025-06-03 01:20:19Blockchain isn't just code—it's the first computer that makes promises it can't break. Unlike traditional systems where humans have the final say, blockchain flips the script by putting immutable code in charge. This single innovation creates an entirely new economic paradigm where trust is built into the system itself, not granted by middlemen. Think of blockchain as a shared, tamper-proof notebook where everyone sees the same information, but no single person controls it. Bitcoin pioneered this as digital gold with its fixed 21 million supply cap, while Ethereum expanded the vision by adding programmable smart contracts—self-executing agreements that run exactly as written. Today's ecosystem spans DeFi (banking without banks), NFTs (truly ownable digital assets), DAOs (internet-native organizations), and Web3 (the ownership economy). The most surprising truth? Despite the technical complexity, blockchain's revolutionary impact comes from its simplicity: creating digital scarcity and true ownership in a world where everything can be infinitely copied. Ready to participate? Start with a secure wallet, explore on test networks before using real funds, and remember—in crypto, you're your own bank, with all the freedom and responsibility that entails.
-
@ e4950c93:1b99eccd
2025-06-02 22:13:19Marques
Saling est une marque allemande qui crée des vêtements, du linge de maison et des peluches et doudous en laine vierge et coton biologique pour les bébés et les enfants, ainsi que des cosmétiques naturelles à base de lait de brebis.
Matières naturelles utilisées dans les produits
⚠️ Attention, certains produits de cette marque contiennent des matières non naturelles, dont :
Catégories de produits proposés
Cette marque propose des produits intégralement en matière naturelle dans les catégories suivantes :
#Vêtements - Tailles vêtements : bébés - Tête et mains : moufles
#Chaussures - Tailles chaussures : chaussures bébé - Chaussons : botillons - Accessoires de chaussures : semelles
#Maison - Linge : couvertures, turbulettes
#Accessoires - Jeux et jouets : doudous-peluches
#Matériaux - Couture et tricot : laine à tricoter
Autres informations
- Fabriqué en Allemagne
- Fabriqué en Europe
👉 En savoir plus sur le site de la marque
Où trouver leurs produits ?
- Lilinappy (zone de livraison : France et international)
- Le mouton à lunettes (zone de livraison : France, Belgique, Luxembourg)
📝 Tu peux contribuer à cette fiche en suggérant une modification en commentaire.
🗣️ Tu utilises des produits de cette marque ? Partage ton avis en commentaire.
⚡ Heureu-x-se de trouver cette information ? Soutiens le projet en faisant un don pour remercier les contribut-eur-ice-s.
-
@ fd78c37f:a0ec0833
2025-06-03 01:54:24In the Bitcoin and Nostr ecosystem, creators are redefining what it means to make art. In this YakiHonne interview, artist nostr:npub1gwa27rpgum8mr9d30msg8cv7kwj2lhav2nvmdwh3wqnsa5vnudxqlta2sz shares his journey from the NFT craze to authentic expression through filmmaking, travel, and daily art on Nostr. Freed from chasing likes, he now thrives on the energy of zaps—small Bitcoin payments that fuel a new rhythm of creation and a freer way to live. (Note: Zaps are microtransactions on Nostr where users send Bitcoin to support creators, offering a direct, decentralized alternative to traditional “likes” or tips.)
What drew you to Nostr as an artist, and how has it changed your creative process compared to platforms like Instagram or Twitter?
bitpopart: Before Bitcoin and Nostr, I ran a travel content company, producing documentaries and media worldwide. With eight years of study—four in Graphic/Multimedia and four in Animation and Film—I felt a pull to explore. Filmmaking fueled my passion, while drawing took a backseat. I dabbled in NFTs, which showed me art could be profitable, but after years in NFTs and “shitcoins,” I found clarity: Bitcoin became my belief, a path to creative and financial freedom.
Nostr was a game-changer. I left NFTs behind, and zapping sparked something profound. Being rewarded with Bitcoin for doing what I love—creating—aligned with the value-for-value philosophy I embraced running my company. I’ve never created solely for money; the work has to matter. Many clients became friends, and those bonds still inspire collaborations. Nostr lets me share art authentically, free from algorithmic pressures, and connect directly with a community that values my work.
You’ve described zaps as carrying a unique “energy.” How do even small Bitcoin payments influence your motivation or creative rhythm?
bitpopart: Art is my passion, but creating can be solitary and demanding. Nostr’s zap culture changes that. For years, I’ve posted daily, sharing my art and its stories, building a vibrant community through consistent engagement. Even a 21 Sats zap carries weight—unlike a simple like, it’s a genuine nod to my work using Bitcoin, the hardest currency. It’s not about wealth but about others valuing my effort, which reignites my creative drive. My goal is to grow as an artist, spread joy, and inspire others.
Your Halving 2024 and Magic Internet Money pieces started with community zaps and grew into larger art sales. Could zaps evolve into a new form of crowdfunding or collaboration?
bitpopart:Over the past two years, I’ve seen small zaps spark full-scale art projects and even drive real sales. Here are two examples where zaps grew into something extraordinary:
Halving 2024 Artwork For the Halving 2024 project, I invited the Nostr community to join in. Seventy people zapped 2,100 Sats each, earning their npubs a place in the final artwork. That piece later sold at auction to nostr:npub1l77twp5l02jadkcjn6eeulv2j7y5vmf9tf3hhtq7h7rp0vzhgpzqz0swft for 225,128 Sats.
Magic Internet Money Similarly, 50 contributors zapped 2,100 Sats to shape the piece, which was later sold to nostr:npub1mw6tm8kery0dwmz670vvg74z0xzttwt3y7yppya5rulufpkkaj7qmg2922 for 480,000 Sats.
These examples highlight the power of zaps, not just in fueling creativity but also in driving sales. It all starts small and grows into something greater. The engagement from others with my art continues to energize me, reinforcing how art connects people.
The Nostr community has deepened my artistic journey, unexpectedly pulling me toward street art. Sharing reflections through my drawings is fulfilling, but when they resonate with others, it sparks a cycle of inspiration and creation. My art style is gaining recognition, and more people are commissioning me. I stay true to the principle from my company days: I dedicate time to projects that inspire me or come from people I connect with. Time is our most precious resource, and I choose to invest it in what matters. Bitcoin empowers me with the freedom to do just that.
Why are zaps essential for artists to thrive on Nostr, especially when some developers hesitate to integrate them?
bitpopart:Zaps channel the community’s energy into the creative process. My art requires dedication, and zaps—unlike likes on Instagram or Twitter—carry tangible value that fuels inspiration. Without this interaction, creation stalls. Nostr has shaped me as an artist, offering a platform where I own my media and connect directly with supporters.
I don’t push developers to add zaps; I simply use apps that support them. Why share on platforms mimicking outdated social media? Zaps make Nostr unique, transforming how I create and engage. The proof is in my journey—I’m loving it.
You’ve compared Nostr artists to unbanked communities adopting Bitcoin. Will Nostr remain niche, or could it become a global alternative for artists?
bitpopart:For now, I believe Nostr and zaps will remain a niche space. Building a brand here demands real dedication, as most people are accustomed to the instant gratification of traditional platforms. If you already have a large following elsewhere and are earning income, there’s often little incentive to try new platforms—unless something sparks your curiosity to explore further.
For new artists, Nostr is incredibly exciting, but it requires steadfast persistence. Giving up after just one month won’t cut it. This reflects a broader challenge in life today: we abandon things too easily. I often compare it to sports—mastering something takes blood, sweat, and tears, but the reward is worth it.
Years ago, when I started my travel content company nostr:npub105em547c5m5gdxslr4fp2f29jav54sxml6cpk6gda7xyvxuzmv6s84a642 I went through a similar process. Earning from my initial stock footage took time. I see the same pattern now with zaps. The key difference is that Bitcoin grants me something invaluable: more time to focus on building my brand and creating the art I love. Yet, even with Bitcoin’s “time freedom” or “financial freedom,” you still need an inner drive to create. For me, that drive comes from the inspiring artists around me, who push me to never settle for “good enough.” This doesn’t mean I dislike my work; it means I’m always striving to improve.
Last month in Spain, while visiting a friend’s gallery, I saw one of my earlier pieces. I wasn’t thrilled with it, but my friend reminded me it’s part of my journey. I needed to embrace it and take pride in the growth it represents. Once again, I was reminded: we never stop learning. Every person you meet, every project you undertake, is part of the path. So keep creating and be proud of your journey.
What features, beyond zaps, do you wish Nostr had for earning, collaboration, or audience growth?
bitpopart:I strongly support auctions. Beyond auctioning my artwork directly on Nostr, I’d love for the app to have a dashboard or timeline showing who zaps me most frequently or generously. This would help me track my supporters and perhaps reward the biggest ones with a free piece of art. Community building works both ways, and I deeply believe in giving back.
I vividly remember meeting nostr:npub18ktmcfkq422zd83sqqwp3wtxrpfq8znv2rp5tcqkr5d4k64q68aqtfdj5e last year at Nostrdam in Amsterdam. He was one of the first to buy my art and merch, and he still supports me. That meant a lot, especially being able to thank him in person. I’ll never take for granted the people who appreciate, support, and make this creative life possible. I love what I do, but without the community’s energy—fans’ zaps, messages, and presence—creating wouldn’t be nearly as fulfilling. Their support makes it profoundly meaningful.
How do you reconcile Bitcoin’s “hard money” ethos with the emotional, subjective world of art? Has Bitcoin’s scarcity influenced your themes or pricing?
bitpopart:Art is life. Bitcoin is the tool that grants us greater freedom to pursue our passions—whatever they may be. For me, it’s creating art. Earning sats gives me, over time, more financial freedom to focus on my craft. That’s why I don’t obsess over prices or immediate sales.
I often remind myself: even if one day I have “enough” Bitcoin, the creative process won’t change. My greatest goal is to keep growing as an artist and to give back. If my art increases in value, I hope it can one day help someone less fortunate, perhaps by selling it for a better life. Money is just a tool—necessary, since we can’t pay with kisses at the store, but never my ultimate aim. Bitcoin is the freedom tool that helps me become not just a better artist but a better person. It all starts with something simple: a smile, kindness, and positive energy. To me, zaps are a reflection of that vibrant energy shared online, yet profoundly real.
I wish you a beautiful life. Keep walking your own path. This is your life, your journey.
-
@ 39cc53c9:27168656
2025-05-27 09:21:37After almost 3 months of work, we've completed the redesign of kycnot.me. More modern and with many new features.
Privacy remains the foundation - everything still works with JavaScript disabled. If you enable JS, you will get some nice-to-have features like lazy loading and smoother page transitions, but nothing essential requires it.
User Accounts
We've introduced user accounts that require zero personal information:
- Secret user tokens - no email, no phone number, no personal data
- Randomly generated usernames for default privacy and fairness
- Karma system that rewards contributions and unlocks features: custom display names, profile pictures, and more.
Reviews and Community Discussions
On the previous sites, I was using third party open source tools for the comments and discussions. This time, I've built my own from scratch, fully integrated into the site, without JavaScript requirements.
Everyone can share their experiences and help others make informed decisions:
- Ratings: Comments can have a 1-5 star rating attached. You can have one rating per service and it will affect the overall user score.
- Discussions: These are normal comments, you can add them on any listed service.
Comment Moderation
I was strugling to keep up with moderation on the old site. For this, we've implemented an AI-powered moderation system that:
- Auto-approves legitimate comments instantly
- Flags suspicious content for human review
- Keeps discussions valuable by minimizing spam
The AI still can mark comments for human review, but most comments will get approved automatically by this system. The AI also makes summaries of the comments to help you understand the overall sentiment of the community.
Powerful Search & Filtering
Finding exactly what you need is now easier:
- Advanced filtering system with many parameters. You can even filter by attributes to pinpoint services with specific features.
The results are dynamic and shuffle services with identical scores for fairness.
See all listings
Listings are now added as 'Community Contributed' by default. This means that you can still find them in the search results, but they will be clearly marked as such.
Updated Scoring System
New dual-score approach provides more nuanced service evaluations:
- Privacy Score: Measures how well a service protects your personal information and data
-
Trust Score: Assesses reliability, security, and overall reputation
-
Combined into a weighted Overall Score for quick comparisons
- Completely transparent and open source calculation algorithm. No manual tweaking or hidden factors.
AI-Powered Terms of Service Analysis
Basically, a TLDR summary for Terms of Service:
- Automated system extracts the most important points from complex ToS documents
- Clear summaries
- Updated monthly to catch any changes
The ToS document is hashed and only will be updated if there are any changes.
Service Events and Timelines
Track the complete history of any service, on each service page you can see the timeline of events. There are two types of events:
- Automatic events: Created by the system whenever something about a service changes, like its description, supported currencies, attributes, verification status…
- Manual events: Added by admins when there’s important news, such as a service going offline, being hacked, acquired, shut down, or other major updates.
There is also a global timeline view available at /events
Notification System
Since we now have user accounts, we built a notifiaction system so you can stay informed about anything:
- Notifications for comment replies and status changes
- Watch any comment to get notified for new replies.
- Subscribe to services to monitor events and updates
- Notification customization.
Coming soon: Third-party privacy-preserving notifications integration with Telegram, Ntfy.sh, webhooks...
Service Suggestions
Anyone with an account can suggest a new service via the suggestion form. After submitting, you'll receive a tracking page where you can follow the status of your suggestion and communicate directly with admins.
All new suggestions start as "unlisted" — they won't appear in search results until reviewed. Our team checks each submission to ensure it's not spam or inappropriate. If similar services already exist, you'll be shown possible duplicates and can choose to submit your suggestion as an edit instead.
You can always check the progress of your suggestion, respond to moderator questions, and see when it goes live, everything will also be notified to your account. This process ensures high-quality listings and a collaborative approach to building the directory.
These are some of the main features we already have, but there are many more small changes and improvements that you will find when using the site.
What's Next?
This is just the beginning. We will be constantly working to improve KYCnot.me and add more features that help you preserve your privacy.
Remember: True financial freedom requires the right to privacy. Stay KYC-free!
-
@ e2c72a5a:bfacb2ee
2025-06-03 01:18:34The blockchain revolution isn't just for crypto bros anymore. While everyone's busy debating Bitcoin prices, data professionals are quietly building the analytical backbone of Web3 that will transform how we understand digital value. Unlike traditional analytics where data lives in centralized warehouses, Web3 analytics operates on immutable, transparent ledgers where every transaction tells a story that can't be altered or deleted. This isn't just a technical shift—it's fundamentally changing who controls information. Smart contracts aren't just code; they're self-executing business logic that eliminates middlemen and creates entirely new data patterns to analyze. The most successful Web3 developers aren't necessarily the ones who understand blockchain best, but those who can translate its complexity into intuitive experiences that don't require users to know what "gas fees" or "zkRollups" mean. The real opportunity lies at the intersection of AI and blockchain, where machine learning models can detect patterns across decentralized finance protocols that human analysts would miss. Whether you're building DeFi dashboards or NFT analytics tools, the key is focusing on solving actual problems rather than chasing blockchain buzzwords. The future belongs to those who can bridge the technical complexity of Web3 with the simplicity users expect from traditional applications. Ready to build the decentralized future or just watch others profit from it?
-
@ b6424601:a11e4ff4
2025-06-03 01:17:47The mercury glass mirror that caught my eye on a sunny spring day in the front yard of a sale. The new beneficiaries of a very cool bungalow in the Virginia-Highland neighborhood in Atlanta were the granddaughter and her new husband, starting married life in her grandmother's house. As I drove by in my 1969 800A International Scout, without the top, of course, the mirror's rustic frame and the way the sunlight made it glow against the mature landscape. Stopping checking it out, I made an offer for a symbol that would change the life of my new union and future family.
'This will look cool in my lake house,' I explained to the granddaughter and her new husband as I traded 15 cut bucks for the treasure.
'Where is your house?' she asked.
'I don't know yet,' I answered, firing up the Scout to finish the run to buy the right tool or find the missing screw to finish that Saturday's renovation task for our newly purchased "project house" in Midtown Atlanta.
In the 1990s, it was possible to save for the aspiration of owning a home; we managed to save $15,000 with our meager salaries from our architectural firm employers. At 30 years old, first-time buyers armed with an FHA loan, we could find a pretty cool craftsman-style home in Midtown Atlanta under the FHA cost limit, even at 10% interest, which was the rate during the Bush I Gulf War for oil.
The mirror represented the vision of someday having a lake house. Over the next ten years, as we started our businesses and conducted some lunchtime arm-waving architecture on flip and rental properties in the neighborhood, we worked toward the goal.
Years later, the mirror had become a part of our lake house, which has become our family's sacred place. Our kids grew up outside on the weekends. My college friends built houses near us. We will ultimately live in a place that restores, energizes, and nourishes our souls.
That mirror taught me something profound about the power of vision. Today, Bitcoin is giving people the same kind of vision, not just for financial freedom, but for homes that can support their best lives.
With Bitcoin, the vision of your potential in a place that supports you is not just a fantasy of something that exists for others.
Mind shift: With Bitcoin, home ownership is possible.
If it is possible, how do you determine what to build to support a life that genuinely reflects your values and aspirations?
Do you choose a plan from a book? Listen to the realtors' advice? Copy your buddy? Listen to a custom builder or an architect tell you what you need? Listen to the bank about what size house you need to compare to others in your area?
These approaches all start with someone else's agenda - market comparables, lending requirements, or generic solutions. But why build your sanctuary around their limitations?
Authentic architecture begins with the people who will live in the home. There are patterns in your existing life that you can uncover and realize, which we can use to design or find a home that supports your personal growth.
We've developed a method that starts with you, not an external agenda:
Interview each person who will be living in the house individually.
Analyze the interview to ask follow-up questions that will help answer as a household.
Establish life patterns to communicate through art, words, and images.
The fun part: the life pattern reading.
Example pattern
Through the interview and follow-up process, we can establish patterns that extend beyond the number of bedrooms and baths. The patterns are the vision of what the house needs to provide that comes from the individuals who will live in the house.
HEALTHY HOME
You want a home that breathes easily. A space made of honest materials and quiet air. Where filtered water pours from every faucet. Where cotton touches skin. Where plants clean the room while you sleep. A space that helps your body rest, regulate, and feel safe.
Add some architectural images to communicate the meaning of the patterns beyond the words on the back of the card, and you have a jumping-off point when you are ready to go.
Indoor Sunlight
Animals
Good Materials
This method creates a powerful personal interpretation of a life described through symbols and teaser images that illustrate how architecture can support the Life Pattern through many use cases:
New partners in life want to envision what they are working for – Create a joint vision for your future together.
Second- or First-home seekers looking for land – This is your essential first step before you begin your search.
House hunters evaluating existing homes – Finally understand what you're looking for beyond square footage.
Considering a new house – Start the vision from the individuals who will live in it.
Break your Fiat mindset – Personal architecture is possible with BTC.
Couples seeking alignment – Individual interviews followed by household consensus-building eliminate the guesswork.
This method of starting with the individual is what HODL Houses are about.
Next Steps
-
Read Essay 12 (Manifest Creation): How to translate life patterns into a design vision that defies appraisal checklists.
-
Read Essay 13 (Site Fit): Understand if the land you find fits your Manifest or how the Manifest should change to fit the land.
-
Mark Your Calendar: Join us on June 27, 2025, for the launch of your Life Pattern Discovery session.
BTC secures your future. HODL House designs it.
HODL on
-
-
@ 3b7fc823:e194354f
2025-03-23 03:54:16A quick guide for the less than technical savvy to set up their very own free private tor enabled email using Onionmail. Privacy is for everyone, not just the super cyber nerds.
Onion Mail is an anonymous POP3/SMTP email server program hosted by various people on the internet. You can visit this site and read the details: https://en.onionmail.info/
- Download Tor Browser
First, if you don't already, go download Tor Browser. You are going to need it. https://www.torproject.org/
- Sign Up
Using Tor browser go to the directory page (https://onionmail.info/directory.html) choose one of the servers and sign up for an account. I say sign up but it is just choosing a user name you want to go before the @xyz.onion email address and solving a captcha.
- Account information
Once you are done signing up an Account information page will pop up. MAKE SURE YOU SAVE THIS!!! It has your address and passwords (for sending and receiving email) that you will need. If you lose them then you are shit out of luck.
- Install an Email Client
You can use Claws Mail, Neomutt, or whatever, but for this example, we will be using Thunderbird.
a. Download Thunderbird email client
b. The easy setup popup page that wants your name, email, and password isn't going to like your user@xyz.onion address. Just enter something that looks like a regular email address such as name@example.com and the Configure Manuallyoption will appear below. Click that.
- Configure Incoming (POP3) Server
Under Incoming Server: Protocol: POP3 Server or Hostname: xyz.onion (whatever your account info says) Port: 110 Security: STARTTLS Authentication: Normal password Username: (your username) Password: (POP3 password).
- Configure Outgoing (SMTP) Server
Under Outgoing Server: Server or Hostname: xyz.onion (whatever your account info says) Port: 25 Security: STARTTLS Authentication: Normal password Username: (your username) Password: (SMTP password).
-
Click on email at the top and change your address if you had to use a spoof one to get the configure manually to pop up.
-
Configure Proxy
a. Click the gear icon on the bottom left for settings. Scroll all the way down to Network & Disk Space. Click the settings button next to Connection. Configure how Thunderbird connects to the internet.
b. Select Manual Proxy Configuration. For SOCKS Host enter 127.0.0.1 and enter port 9050. (if you are running this through a VM the port may be different)
c. Now check the box for SOCKS5 and then Proxy DNS when using SOCKS5 down at the bottom. Click OK
- Check Email
For thunderbird to reach the onion mail server it has to be connected to tor. Depending on your local setup, it might be fine as is or you might have to have tor browser open in the background. Click on inbox and then the little cloud icon with the down arrow to check mail.
- Security Exception
Thunderbird is not going to like that the onion mail server security certificate is self signed. A popup Add Security Exception will appear. Click Confirm Security Exception.
You are done. Enjoy your new private email service.
REMEMBER: The server can read your emails unless they are encrypted. Go into account settings. Look down and click End-toEnd Encryption. Then add your OpenPGP key or open your OpenPGP Key Manager (you might have to download one if you don't already have one) and generate a new key for this account.
-
@ 7b20d99d:d2a541a9
2025-06-02 22:13:17In a world where we often hear talk of financial bubbles, speculation, and individual enrichment through cryptocurrencies, Hope With Bitcoin resolutely takes the opposite approach. Here, Bitcoin is not an end in itself, but a means to reach out. A tool serving a simple, universal human cause: bringing smiles and hope back to those who need it most.
Far from big, empty promises and empty charitable projects, Hope With Bitcoin is committed to a philosophy of direct impact, total transparency, and lasting transformation of lives.
🔗 Official project link : https://linktr.ee/hopewithbtc
🟢 Why “Hope With Bitcoin”?
It all started with an observation: too many people are living in oblivion. In some regions, particularly in Africa, it doesn't take much to bring back a smile: a meal, a word, a gesture. But often, aid initiatives get lost in an administrative maze, corruption, or a lack of follow-ups. And in the world of Bitcoin, we see many promises of humanitarian aid without ever seeing results.
Hope With Bitcoin was launched to change that. The goal is clear:
Using the power of Bitcoin to provide direct, visible, measurable and lasting help.
We wanted to show that Bitcoin can nourish, heal, raise awareness, connect, and not just speculate.
🔵 What we do concretely
Hope With Bitcoin isn't an abstract concept. It's a set of concrete actions carried out on the ground, with rigor and heart.
Here's what we do:
🍛 Food distribution and health aid
Thanks to donations collected in Bitcoin, we provide concrete help to those who need it most.
We distribute hot meals and basic food items (rice, spaghetti, oil, charcoal, etc.) to struggling families, vulnerable children, and orphanages.
But our work doesn't stop there. A portion of the funds is also used to purchase essential medicines and contribute to the payment of healthcare, particularly for sick or injured people who cannot afford treatment.
Each action is carefully documented and made public to ensure complete transparency and strengthen the trust of our donors.
✅ Missions accomplished: every satoshi counts
Since Hope With Bitcoin's inception, we've carried out several concrete actions thanks to the donations received. Here's a clear, transparent, and verifiable overview of our actions:
🔹 PoW 1 – 10 000 Satoshi Received
📅 Date : 01/09/2025
📍 Purchase food for two children in need
🔹 PoW 2 – 10 000 Satoshi Received
📅 Date : 01/11/2025
📍 Purchase food for two children in need
#### 🔹 PoW 3 — 220,500 Satoshi received
📍 Preparing food for thirty children in need
📅 Date : 01/13/2025
#### 🔹 PoW 4— 31,000 Satoshi received
📍 Purchase food for six children in need
📅 Date : 01/16/2025
#### 🔹 PoW 5— 30,000 Satoshi received
📍 Purchase food for 10 students in need
📅 Date : 01/18/2025
#### 🔹 PoW 6 – 11,093 Satoshi received
📍 Purchase food for two children in need
📅 Date : 01/22/2025
#### \ 🔹 PoW 7 – 52,000 Satoshi Received
📍 Preparing food for eight children in need
📅 Date : 01/27/2025
#### \ 🔹 PoW 8 – 116,866 Satoshi Received
📍Financial support for Maria Jimenez's health
📅 Date : 02/13/2025
#### 🔹 PoW 9 – 8,001 Satoshi Received
📍 Hope With Bitcoin t-shirt print
📅 Date : 02/15/2025
#### 🔹 PoW 10 – 22,602 Satoshi Received
📍 Purchase of food for five children in need (three on site and two takeaway)
📅 Date : 02/17/2025
#### 🔹 PoW 11– 350,000 Satoshi Received
📍 Purchase of food (rice, corn, spaghetti, oil, salt, sugar, coal...) at the Bon Arbre orphanage
Thank you letter received: HERE
📅 Date : 03/06/2025
🔹 PoW 12 – 35,000 Satoshi received
📍 Purchase of medicine for a person in need
📅 Date : 04/02/2025
#### 🔹 PoW 13 – 60,910 Satoshi received
📍 Preparation of food for 8 children at home and purchase of food for two children at the cotonou beach.
📅 Date : 05/18/2025
Each of these Proofs of Work (PoW) is publicly published on Nostr or Geyser to ensure complete transparency. You can view them individually to see the real impact of your donations.
📣 Bitcoin Adoption Awareness
We take advantage of each field trip to speak with shopkeepers, local vendors, and young people. The idea is to show that Bitcoin can be used practically in their daily lives: to sell, buy, and exchange.
🟠 Our results to date
Since the creation of Hope With Bitcoin on January 8, 2025, we have succeeded in:
- Collect a total of 957,971 Satoshi thanks to the generosity of contributors around the world.
- Help 87 people directly through our distribution actions. (Proof of work)
- Raise awareness among several merchants about the use of Bitcoin.
- Create a close-knit, caring community focused on human impact.
These numbers aren't statistics. They're lives, faces, stories. Every person helped represents a victory, proof that Bitcoin solidarity is possible.
🟣 Our ambitions for the future
Hope With Bitcoin doesn't want to be just a one-time donation project. We believe in sustainability, independence, and structured growth.
### 🐖 Launch of a pig farm to sustainably finance our actions
To make our humanitarian work self-sufficient and sustainable, we have launched a project to create a pig farm, the proceeds of which will be used to fund food distribution, the purchase of medicines, and other solidarity initiatives led by Hope With Bitcoin.
This project aims to generate regular income while having a tangible local impact:
-
🥣 Continuously support food and health aid
-
👷♂️ Create jobs for young people and unemployed people
-
♻️ Reinvest profits in other humanitarian projects
To kick-start this project, we've established a detailed budget estimate that includes the purchase of piglets, pen construction, feed, veterinary care, and management fees. 👉 Estimated cost: approximately 5,525,200 Satoshi
More details on the budget here: https://primal.net/e/nevent1qqsfmrafup9dma3wvgeqgasydjhy06rhkn8d268txmztp60533mp3xg0vuk5a
🐓 Towards a united and evolving ecosystem
Ultimately, we aim to diversify our business into chicken and goat farming and develop micro-agricultural projects. The goal is to build a resilient, local, and 100% Bitcoin-funded ecosystem that serves the most vulnerable.
💛 You can support this project now on Geyser:
https://geyser.fund/project/hopewithbitcoin/goals/552
🌍 Expansion of the area of action
We want to reach:
- More regions
- More beneficiaries
- More businesses willing to accept Bitcoin
⚫ Why Bitcoin?
The choice of Bitcoin is not ideological. It is practical, thoughtful, and strategic.
Here's why we made this choice:
- ✅ Fast and low-cost transactions
- ✅ No geographical or banking barriers
- ✅ Immutability of donations: funds cannot be diverted
- ✅ Complete traceability thanks to blockchain
- ✅ Financial education for recipients
In short, Bitcoin allows us to rebuild trust in donations and make acts of solidarity visible.
🟢 How to support us?
You can be part of the change. Here's how:
- 🤝 Donate in Bitcoin (https://geyser.fund/project/hopewithbitcoin)
- 📢 Share our posts to help us gain visibility
- 🧠 Recommend us to a partner, company, or influencer
- 💬 Join the community on Twitter, Nostr, or subscribe to Geyser to stay informed and actively participate.
Even a simple retweet can make a difference. Because every Satoshi counts.
Hope With Bitcoin is a declaration of love to humanity. It's a belief that technology can serve the heart. It's a demonstration that Bitcoin can nourish, not just enrich.
We are not an NGO, we are not a company. We are a movement, an initiative, a momentum. And this is just the beginning.
“With a little Bitcoin and a lot of love, we can change lives.”
🔗 Join us now : https://linktr.ee/hopewithbtc
-
@ e2c72a5a:bfacb2ee
2025-06-02 23:57:06The silent revolution in crypto isn't just about price—it's about power shifting right before our eyes. Robinhood's $200M acquisition of Bitstamp, the world's longest-running crypto exchange, isn't just another corporate takeover; it's a strategic chess move giving traditional finance unprecedented access to Europe's institutional crypto market. While everyone's watching Bitcoin's price fluctuations, the real story is how rapidly the infrastructure is consolidating under fewer, more powerful players. This acquisition creates a financial superhighway connecting Wall Street directly to European crypto markets, potentially triggering a flood of institutional capital that could fundamentally alter the crypto landscape. The question isn't whether crypto will go mainstream—it already has. The question is: who will control the on-ramps when the real money arrives? Will you be positioned to benefit from this structural shift, or just watching from the sidelines?
-
@ 5c8a5765:4fc5edee
2025-03-22 18:38:23[Читать в IPFS]
Итак, детки-котлетки, сегодня мы поговорим, как ~~не~~правильно распространять агиацию. Возьмите свои любимые антифашистские стикеры и используйте этот текст как инструкцию к ним — иначе у меня голова лопнет от того, что я вижу на улицах.
Агитация
Для начала определитесь, чем вы занимаетесь: агитируете к чему-то или поддерживаете чего-то, потому что это предполагает совершенно разные подходы. Агитацией может быть призыв к анархизму, классовой борьбе, неуплате налогов, гендерному равенству и т.д. Поддержкой может быть поддержка анархической борьбы, антифашистский идей и т.д. Первое — "вербует"/приманивает новых людей к идее, второе поддерживает только тех, кто уже знаком с идеей и уже с ней согласен.
Как должна выглядеть агитация? Представьте, что некий неонацист решил за-агитировать вас в неонацизм (с учетом, что сейчас вы его не поддерживаете): в каком случае у него больше всего на это шансов? Если вы заметите на мусорном баке наклейку "бей жыдоф"? Или если вам, например, выдадут в руки грамотный агитационный текст? Поставьте себя на место читающего: агитация должна выглядеть именно так, как мог бы выглядеть материал, который хоть немного мог бы поменять ваши текущие взгляды. А именно...
1. Агитация доступна
Она не висит на задней стороне мусорки. Она не нарисована на заброшке. Обыватель не рассматривает мусорки и не ходит по заброшкам. Чтобы масса увидела вашу агитацию, она должна висеть в заметном месте.
Ещё лучше, если она висит там, где человек по внешним причинам на мгновение задерживается, и имеет время проглядеть вашу агитацию: ибо обыватель никогда не остановится у столба посреди длинной тропы, чтобы прочесть стикер.
И учтите: если место, которое вы выбрали, уже забито стикерами, вашему придётся делить привлеченное внимание с каждым остальным.
К доступности стоит также отнести то, что агитация более значительна, если она написана на самом популярном в вашей стране языке, развешивается в разных локациях (чтобы люди разного класса могли её увидеть), если вы развешиваете в туалетах — то туалетах разного гендера (и не забывайте про инвалидные кабинки!), так далее.
Лучшие места для стикеров: лифт, автобусная остановка, метро, поручен эскалатора, внешняя сторона дверцы туалета, чистое (не разрисованное или расклеенное) зеркало.
Лучшие места для крупных агитационных листов или графитти: указанные выше, а также — заметные места подъездов,
Лучшие места для "визиток"*: оставлять под задницей на выходе из автобуса, метро, маршрутки, на стульях, скамейках и т.д.
*"Визитка" — это са-а-амый простой метод агитации: выводите нужный текст или картинки мелкими блоками на листе А4, нарезаете бумагу на кусочки "визиток" с небольшим текстом, картинкой или ссылкой, и оставляете где попало.
2. Агитация запоминается
Если вы не неонацист, какие эмоции в вас побуждает "бей жыдоф"? Вы возжелали стать неонацистом? Или это только укрепило ваши антифашистские взгляды? Или это для вас вообще никак не прозвучало?
Также для ваших противников и обывателей звучат ваши "ешь богатых!", "классовая борьба сегодня!!", "доёш онархию!!!". Это — поддержка. Уже-анархисты будут рады увидеть, что в городе есть левые активисты кроме них самих. Но это никого не переубедит и не привлечет.
А агитация привлекает. Агитация задаёт острые вопросы, которые остаются в голове. Агитация манит предложениями нового. Агитация нестереотипно предлагает.
Примеры хорошей агитации:
"Если большинство проголосует за то, чтобы ты спрыгнул(а) с вмоста, ты бы сделал(а) это? / - Может быть — если это было честным голосованием!"
"Этот телефон прослушивается - согласно законодательству США, телефонные разговоры прослушиваются без ордера или уведомленияю"
"Вы под наблюдением — текст, объясняющий тезис, и ссылка, где можно прочесть об этом подробнее."
Примеры никудышной агитации (но хорошей поддержки):
3. Агитация даёт возможность изучить больше
Хорошее правило для любой агитации: иметь ссылку на сайт, где можно найти больше информации о том, к чему агитируется. Это не обязательное, но рекомендуемое правило, ибо мало толку от человека, согласившегося с идеей анархизма и захотевшего (редчайший случай!) самостоятельно изучить больше, но не имевшего к этому простой возможности и забывшего вследствие обо всей идее.
Поддержка
А вот поддержка — ориентированная на тех, кто уже знает и уже поддерживает то, что вы любите — может быть совершенно любой. Поддержать антифашистов своего города, позлить фашистов и остаться совершенно незамеченными для обывателя — самое место для диалектики "бей жыдоф!" и "доёш онтифошизм!!".
Напоминание о безопасности
Несколько базовых напоминаний о том, что нужно помнить во время агитации:
- ОСТЕРЕГАЙТЕСЬ КАМЕР! Особенно в России! Метро, маршрутки, автобусы, учебные заведения полны ими!
- Если вас заметили гестаповцы, лучшее, что вы можете сделать — это бежать, что есть мочи.
- Шифруйте материалы, которые храните для распечаток.
- Не распечатывайте стикеры/"визитки" в публичных местах (вроде библиотек).
Спасибо за прочтение!
-
@ 3b7fc823:e194354f
2025-02-13 02:25:42site:example.com intitle:"index of" inurl:admin intext:"password"
site:example.com site:.gov site:.edu site:*.mil
inurl:login inurl:admin inurl:dashboard inurl:portal intitle:"admin login"
intitle:"index of /" intitle:"index of" "parent directory" intitle:"index of" "backup"
filetype:pdf "confidential" filetype:xls "username | password" filetype:doc "top secret" filetype:sql "database"
intext:"username" intext:"password" intext:"login" intext:"password" filetype:txt "passwords"
inurl:"viewerframe?mode=" inurl:"/view.shtml" inurl:"/view/index.shtml"
intitle:"index of" "wp-config.php" inurl:".git"
filetype:xls intext:"email" filetype:csv intext:"email"
inurl:"/setup.cgi?next_file=netgear.cfg" inurl:"/wificonf.html"
-
@ e2c72a5a:bfacb2ee
2025-06-02 23:46:02The most valuable crypto isn't Bitcoin—it's your private key. In 2023 alone, hackers stole $2.61 billion in crypto assets, yet most thefts weren't from sophisticated code exploits but from basic security mistakes. Cryptography uses two main systems: symmetric (same key for encryption/decryption) and asymmetric (public/private key pairs). Your crypto wallet doesn't actually store your coins—it stores the keys that prove ownership on the blockchain. For maximum security, use hardware wallets that keep private keys offline, enable two-factor authentication with an app (not SMS), create unique passwords for each platform, verify URLs before clicking, and never access wallets on public WiFi. The SEC can't protect you from phishing attacks that trick you into revealing your seed phrase—once your private key is compromised, your funds are gone forever, with no bank to call for a refund. Ready to make your crypto security as valuable as your investments?
-
@ 0b884d0d:9abbd54a
2025-06-02 21:42:29Conceitos chaves
Neste artigo você vai entender um pouco dos conceitos chave desse novo conjunto de ferramentas para aplicar justiça de forma descentralizada e anárquica.
Antes de continuar a leitura, quero elucidar alguns termos que serão constantemente usados neste artigo.
- Private Law Society (PLS)
- Uma organização sem fins lucrativos com o objetivo de criar novas soluções para tornar cada vez mais viável a aplicabilidade de uma justiça privada e descentralizada
- Ao mesmo tempo, um conjunto de protocolos e softwares de código aberto com o mesmo propósito
- Links úteis
- Perfil Nostr: nostr:npub1p79dx59d5gctllar73cqnucqft89gpkfmydxj4mmk2jj69s7hn3sfjatxx
- GitHub: https://github.com/PrivateLawSociety
- Sobre: https://privatelawsociety.net
- Bitcoin Justice Protocol (BJP)
- Um protocolo estabelecido pela Private Law Society
- Também um software de código aberto disponível no GitHub da Private Law Society
- Links úteis
- GitHub: https://github.com/PrivateLawSociety/pls-bjp
- Sobre: https://privatelawsociety.net/bjp
- Implementação oficial da PLS: https://pls-bjp.vercel.app/
- Web Of Trust (WoT)
- Uma base de dados com avaliações entre usuários Nostr relatando confiança/desconfiança e se um usuário teve relações comerciais ou não com outro
- O objetivo é ser um repositório de reputação para chaves Nostr
- Links úteis
- GitHub: https://github.com/PrivateLawSociety/pls-wot
- Sobre: https://privatelawsociety.net/wot
- Implementação oficial da PLS: https://pls-wot.vercel.app/
- Meu fork com o grafo: https://pls-wot-kiuusai.vercel.app/
Prefácio
Recentemente saiu um episódio no BetterMoney podcast sobre o projeto de justiça privada Private Law Society.
Muitos bons pontos foram levantados neste excelente episódio pelos participantes nostr:npub12mllp29adf2fw0eeahmseczcu3y4625qyn3v4uwfvkpzlshnmj3qs903ju e nostr:npub1wsl3695cnz7skvmcfqx980fmrv5ms3tcfyfg52sttvujgxk3r4lqajteft. Mas neste entorno permanecem ainda muitas dúvidas sobre o projeto em si, seu funcionamento, princípios, objetivos e funcionalidades.
Venho através deste artigo, apresentar resumidamente o projeto, a filosofia por trás do mesmo e dar a minha visão de como este conjunto de protocolos chamado Private Law Society tem a capacidade de não só transformar o mundo como o conhecemos, mas de tornar boa parte do "poder judiciário" obsoleto e irrelevante em vários aspectos, se assim os indivíduos o quiserem.
Mas afinal, o que é essa tal de PLS?
PLS é um acrônimo para Private Law Society (Sociedade de Leis Privadas em uma tradução livre). Além de uma organização sem fins lucrativos e totalmente Open Source, trata-se de um conjunto de softwares disponíveis no GitHub de forma a estruturar um protocolo de justiça privada descentralizado com colateral em Bitcoin. Falei grego para você? Vamos com calma dissecar estes conceitos...
Sociedade de leis privadas, a "utopia" libertária se tornando realidade
Quem é adepto do movimento libertário e/ou estuda o tema, provavelmente já ouviu falar nesse termo. Originalmente cunhado por David Hume, o filósofo e idealista escocẽs. O projeto toma este nome com o intúito, talvez de forma ambiciosa, mas com certeza visionária e audaz, de trazer uma solução prática e simples de estabelecer contratos voluntários entre duas ou mais partes, as quais livremente escolhem os seus "árbitros" ou "juízes" para fazer valer a lei. Como realmente uma justiça paralela a qual o contrato faz lei entre as partes.
Para uma introdução sobre o conceito, indico este vídeo do canal AnCapSu que trata sobre o tema de forma resumida.
Essa ideia, simples a priori esbarra no problema da aplicabilidade da força, ou ao menos era o que se pensava, antes da criação de ferramentas como o Bitcoin e soluções como Taproot e Bitcoin Scripts. Agora, com uma propriedade realmente soberana, programável e incensurável, essa ideia começa a ganhar forma.
Basicamente, uma dúvida plausível para uma pessoa leiga no assunto seria: "Tá, entendi. Esse tal de bitcoin é realmente bom, seguro e o Estado não tem poder de controle sobre ele. Mas como isso pode gerar essa tal de sociedade de leis privadas? É só uma forma de dinheiro."
A resposta para isso é: Dinheiro programável, chaves privadas e reputação!
BJP: contratos colateralizados em Bitcoin
Bitcoin, Nostr e Taproot: a chave para a aplicação da justiça privada
Se você já está minimamente envolvido com o ambiente Bitcoin, Nostr e afins, deve saber o que é um par de chaves públicas e privadas e como isso funciona. Existe uma chave pública e privada, a pública é a forma de identificação no sistema e a privada é a que gera as assinaturas. Daí é possível determinar que quem publicou a mensagem, seja na blockchain do Bitcoin, seja na rede Nostr, é o dono daquela chave pública em específico. Assim, se institui uma forma de identidade digital.
O que muita gente não sabe, ou não dá o devido valor, é que depois do soft fork Taproot da rede Bitcoin (ocorrido em 2021), os antigos Bitcoin Scripts tomaram outra forma e maior capacidade, se tornando mais práticos, leves e funcionais. Isso é o que dá base hoje para "contratos inteligentes" no Bitcoin e toda a parafernalha de Ordinals, Runes e coisas do gênero. O que pra muitos foi uma maldição que encheu a mempool, na verdade também se provou uma bênção, a qual é a base do BJP (Bitcoin Justice Protocol) da Private Law Society. A atualização permitiu com que scripts mais complexos pudessem ser desenvolvidos de forma mais simples, fossem mais leves e tivessem uma melhor privacidade. O BJP se empodera disso, fornecendo uma solução ao mesmo tempo que simples, inovadora para casos de uso de contratos. Primariamente na camada nobre do Bitcoin e posteriormente na Liquid Network, para aqueles que querem poupar em taxas e terem mais privacidade.
Por sua vez, o Nostr funciona também com criptografia de curvas elípticas, assim como nosso querido Bitcoin. Para ser mais preciso, o mesmo algoritmo é usado tanto no Nostr quanto no Bitcoin. O Secp256k1. Na prática isso significa que toda chave Nostr também é uma chave Bitcoin em potencial. O BJP se apropria dessa interconexão para possibilitar a criação de contratos jurídicos.
BJP: uma multisig sofisticada?
Ok, até agora vimos o que torna esse tal de BJP possível, mas como ele funciona e como eu posso usá-lo na prática?
Bem grosseiramente falando, o BJP é um software que facilita a criação de carteiras multisig específicas para contratos jurídicos. Com ele, você constrói uma multisig não convencional com Taproot que assegura o cumprimento do contrato mediante concordância de todas as partes "clientes" do contrato ou do número mínimo de árbitros configurados previamente + um dos clientes.
Na prática, um script Taproot é montado com a seguinte lógica:
``` Clientes = {Lista de chaves públicas dos clientes}
Árbitros = {Lista de chaves públicas dos árbitros}
Quorum = Número mínimo de árbitros para aprovar a transação
Se todos os Clientes concordarem: Libera gasto Senão se 1 dentre todos os Clientes concorda e ao menos o Quorum de Árbitros concorda: Libera gasto Senão Bloqueia gasto ```
Esse algoritmo garante que o contrato seja efetuado e esteja de acordo com a vontade de todas as partes envolvidas, ou, se entrar em "disputa judicial", o número mínimo de árbitros designados para "fazer valer a lei", concorde junto com a parte lesada para onde os fundos devem ir.
Um exemplo prático:
Aqui temos um exemplo prático de aplicabilidade de um contrato feito através do BJP. Nesse caso, tendo a concordar com o nostr:npub1narc0ect9jf0ffnvcwg8kdqlte69yxfcxgxwaq35eygw42t3jqvq4hxv0r e discordar do nostr:npub12mllp29adf2fw0eeahmseczcu3y4625qyn3v4uwfvkpzlshnmj3qs903ju quando o primeiro comenta no recente episódio do BetterMoney Podcast:
19:30 Eu discordo do Júlio. Acho que a PLS seria perfeita pro contrato de aluguel. O locatário coloca o colateral e o proprietário vai ter certeza de que não vai tomar calote.
E se uma das partes tentar levar pra justiça estatal, não vai ter nenhum nome no contrato, apenas chaves públicas.
E está certo. O exemplo prático que acabei de citar reforça isso. Não há nada que impeça também, de no contrato, ter uma cláusula a qual envolver a justiça estatal cause algum prejuízo ou perda de causa imediata para a parte expositora. Não estou fazendo recomendação alguma, fazendo apologia a qualquer prática ou aconselhando usar deste tipo de artifício, se o que falo possa ser interpretado como crime pela lei positivada (não sou advogado). Mas, no campo das ideias e das possibilidades no mundo real, é uma possível solução/alternativa.
Vamos ao exemplo...
Adriano Calango quer alugar um apartamento de Beto Lagartixa. Só que ambos não se conhecem e não confiam suficientemente um no outro para fazer um contrato. Ambos decidem então escrever um documento. Word, Pdf ou um texto puro. Não importa. Lá estão todas as cláusulas, o caução do aluguel, multas estabelecidas para uso indevido, penalidades, dia de pagamento, decisão sobre multa de atraso, enfim, qualquer detalhe desse contrato.
Adriano Calango, escolhe Célsio Jacaré, seu amigo como seu árbitro pessoal. Beto Lagartixa escolhe Danilo Crocodilo, seu amigo, como seu árbitro pessoal. Ambos escolhem Eduardo Cobra, um réptil íntegro, com reputação ilibada e que já fez vários julgamentos, como um árbitro em comum para seu contrato. Daqui temos: dois contratantes, duas testemunhas e um juíz.
Adriano Calango então, acessa o site da PLS BJP para criar o contrato. Configura os clientes (ele e Beto Lagartixa), configura todos os árbitros, anexa o arquivo e cria o contrato na rede Bitcoin.
Um evento Nostr criptografado é criado e um link de compartilhamento do contrato é disponibilizado. Adriano Calango compartilha esse link com todos os usuários disponíveis.
Todos os usuários verificam os detalhes do contrato e se o documento do contrato bate com o contrato assinado. Todas as partes ativamente concordando, a nossa multisig é criada.
Um arquivo do contrato é disponibilizado para acessar a multisig do contrato posteriormente. Todos os usuários salvam esse arquivo e o mantém guardado em um local seguro. O objetivo disso é ter redundância. Se um dos participantes perder este arquivo, outro pode compartilhar o mesmo para possibilitar o acesso à multisig do contrato.
Adriano Calango e Beto Lagartixa depositam os devidos colaterais no contrato. Seja o caução de aluguel ou um montante separado para ser empenhorado. Isso é definido pelo acordo feito previamente.
Se tudo ocorrer bem, assim que Adriano Calango resolver se mudar e Beto Lagartixa não tiver nenhuma objeção quanto a isso, ambos voltam para o contrato previamente feito e concordam quanto aos montantes que cada um receberá de volta. Dividem o preço da taxa entre si e cada um tem sua propriedade de volta.
Digamos que Adriano Calango não cumpriu com parte do contrato, atrasando o pagamento de alguns meses. Por outro lado, Beto Lagartixa também não cumpriu parte de seu acordo, deixando de fornecer serviços prescritos no contrato como segurança de condomínio e um elevador funcional. O caso então é levado aos árbitros. Célsio Jacaré argumenta a favor de Adriano Calango, questionando Beto Lagartixa sobre os serviços não prestados pelo mesmo e que claramente no contrato estavam previstos como parte inclusa no custo do aluguel. Danilo Crocodio retruca sobre a inadimplência de Adriano Calango, defendendo seu amigo/cliente, Beto Lagartixa. Eduardo Cobra, ao ouvir calmamente todos os argumentos de ambos os lados, então decide: - Adriano Calango foi inadimplente por três meses. Portanto terá uma multa de 35% sobre seu patrimônio - Beto Lagartixa terá uma multa de 25% sobre o seu patrimônio, pois não prestou o serviço com a devida qualidade - O restante do patrimônio será devolvido para seus respectivos donos - Dos valores da multa: - 90% será dividido entre cada árbitro. 30% para cada - Os 10% restantes serão queimados em taxas para os mineradores
Note que não foi usado nenhum meio coercitivo para solucionar o caso e penalizar os réus em seus devidos processos. Tudo foi aceito voluntariamente previamente, inclusive da parte dos árbitros. As multas aplicadas são meramente ilustrativas. Em um cenário real, tais penalidades seriam acordadas previamente e na falta das mesmas, todas as partes discutiriam até entrar em um acordo quanto a decisão. É totalmente plausível que, por exemplo, a penalidade fosse queimar todo o valor das multas em taxas para os mineradores, se assim todos aceitassem. O mecanismo de mineração nesse cenário também se torna um possivel meio de aplicação de força em um julgamento.
Só esta parte do ecosistema já faz boa parte dos casos de uso da justiça estatal obsoleta, dando maior descentralização, privacidade e soberania para os indivíduos.
Nesse cenário temos novamente a "utopia" libertária sendo definitivamente aplicada. Não há dedo do Estado no meio, todos os contratos foram previamente acordados entre as partes e não houve violação ao PNA (Princípio da Não Agressão). Todo o processo foi estritamente voluntário desde o começo.
WoT: A digitalização da reputação
Quem vê o projeto a primeira vista, pode pensar:
Ah Calango. Legal essa solução com bitcoin e tal. Mas eu vou sempre precisar gastar meus bitcoins toda vida que fizer um contrato? Tem contratos que isso não vale a pena!
Sim. Isso é verdade. Tanto que foi genialmente um caso citado pelo nostr:npub12mllp29adf2fw0eeahmseczcu3y4625qyn3v4uwfvkpzlshnmj3qs903ju. Há casos que os valores são tão pequenos que não compensa criar todo um documento de contrato para, por exemplo, comprar um livro ou algo do tipo. Ou, algumas vezes, o próprio indivíduo não quer gastar dinheiro ou travar valores para manter esse contrato. Mas não é o único caso de uso. Lembre-se que mesmo com colaterais aplicados, normalmente as pessoas não gostam de entrar em decisões judiciais ou confusões em geral. Idealmente todos querem traçar o caminho feliz da história. Então, mesmo para firmar contratos com colateral em Bitcoin usando o BJP, é plausível que um usuário queira pesquisar o "histórico" de outro usuário na rede para averiguar se é uma boa ideia ou não se envolver com aquele indivíduo em específico.
Naturalmente o ser humano já pratica esse cálculo de reputação e analisa o ambiente a sua volta para entender a hierarquia e reputação dele e de outros indivíduos em um grupo. Somos seres sociais e naturalmente na nossa cabeça já montamos uma espécie de rede de confiança na nossa cabeça com a imagem que formamos de um indivíduo X ou Y com base na nossa comunidade. Hierarquia, lideranças, influência, são características naturais do ser humano.
A partir desse cenário, surgiu a ideia de gerar uma solução para uma melhor visualização da reputação entre usuários do protocolo. O objetivo é ser primariamente um repositório com avaliações de usuários sobre outros usuários, os classificando positivamente ou negativamente e informando se houve ou não negócios/fechamento de contratos com o mesmo. A ideia é realmente simples e o objetivo é deixar o protocolo aberto para as mais diversas formas de interpretação desses dados. Seja com modelos matemáticos, visualização e interpretação pessoal ou até mesmo o uso de inteligência artificial para o auxiliar o usuário a tomar suas decisões.
WoT: o nome é conhecido, mas a proposta é diferente
Veja que há uma diferença prática na WoT da PLS e outros projetos de WoT espalhados pela internet afora e pelo Nostr. A maioria dos projetos de WoT são para determinar se uma pessoa/chave privada é ou não relevante a partir da visão de outra chave privada. É o caso de serviços de WoT como o da Coracle.Social, Vertexlab.io e mais recentemente da nova implementação de WoT Relays. Serviços como estes tem o objetivo de reduzir ou eliminar spam e falsidade ideológica (fakes), assim como oferecer uma espécie de algoritmo de recomendação, similar ao que é feito em redes sociais como YouTube e Instagram.
Note que em nenhum momento o objetivo da WoT da PLS é definir por A + B quem é ou deixa de ser confiável ou inconfiável, afinal, confiança é algo estritamente relativo. Nenhum projeto pode ter a audácia de tentar classificar pessoas como confiáveis ou inconfiáveis a nível de estabelecimento de contratos. A PLS entende isso e respeita esse caráter subjetivo da confiança. De igual maneira, nunca foi o objetivo de qualquer projeto de WoT sério fazer algo similar ao que é feito em países como a China, onde pessoas têm alguma espécie de "crédito social". Fique tranquilo. Nosso objetivo não é tornar os episódios distópicos de Black Mirror em realidade 🤣
Visualização em grafo: uma proposta elegante
Desde que entrei de cabeça no projeto da PLS, uma coisa que veio sendo falada nas reuniões era sobre a criação de novas ferramentas para visualizar a rede de formas mais intuitivas, que ajudassem os usuários ao julgar pessoas como confiáveis ou não para estabelecer contratos, e ao mesmo tempo, resolvessem o problema de UX que é uma simples tabela com avaliações entre usuários da rede. A tendência é, a partir do momento que o projeto comece a ter adesão, que o número de notas cresça exponencialmente, e com isso, a visualização da reputação dos indivíduos seja pouco intuitiva. Uma solução apresentada para este problema foi a criação de um frontend com grafos, ou melhor, a criação de uma forma de visualização da sua rede de confiança em particular. A partir disso, foi gerada uma bounty no projeto para a implementação desta solução, a qual eu orgulhosamente estou construindo (na verdade está pronta para uso. Mas ainda quero melhorar algumas coisas). O objetivo é simples: dar ao usuário mais uma forma de contemplar os dados da WoT, de forma mais particular e intuitiva. Facilitando a tomada de decisões.
A natureza da confiança humana em sintonia com a tecnologia
Bolhas virtuais, vilarejos e mineiros
Uma possível crítica que o projeto possa receber é a possibilidade de ataques de spam ou cancelamento em massa corroer ou inviabilizar a utilidade do protocolo. Ataque Sybil também. Entretanto, são espantalhos até bem inocentes quanto ao projeto em questão.
Como havia mencionado anteriormente, a base do projeto em si é propositalmente simples e não se propõe a dar uma solução definitiva para a visualização dos dados postos no protocolo. A tabela de avaliações hoje existente no site da WoT da PLS é apenas uma das inúmeras formas de interpretar estes dados. E uma forma efetiva para problemas como esse, é justamente a implementação de uma visualização por grafo, onde os usuários podem ver redes de confiança sendo tracejadas a partir do ponto de vista específico de uma npub em particular.
Aqui a lógica de um antigo ditado é aplicada:
"O amigo do meu amigo é meu amigo"
Da mesma maneira também podemos formular outras afirmações como:
"O inimigo do meu inimigo é meu amigo"
"O inimigo do meu amigo é meu inimigo"
"O amigo do meu inimigo é meu inimigo"
Se tais derivações fazem sentido para você ou não, não cabe a mim dizer. Novamente, confiança é intrinsecamente algo de caráter subjetivo. Vai de cada um decidir quem é ou não confiável. É justamente por isso que estou implementando diversos filtros de avaliações no meu fork da PLS.
Na prática é o velho jogo de política de sempre. Como bem citado uma vez pelo filósofo e youtuber Platinho, ao citar Carl Schmitt:
Isso também se reflete na cultura mineira (e rural do Brasil em geral), por exemplo. O clássico "cê é fi de quem?". Perceba que essa é uma forma de procurar por um caminho de confiança já estabelecido. Quem tem parente em interior sabe, que uma das coisas mais comuns é os mais velhos, seja ou tio, mãe ou avô perguntar sobre um amigo que você leve para o ambiente familiar (meu filho, esse seu amigo é filho de quem?) É algo até instintivo do ser humano procurar por rotas de confiança e trabalhar de certa forma com o QI (Quem Indica). Goste você ou não, é assim que a natureza humana se expressa e é assim que a dinâmica social é montada.
Vendo que é natural a formação de bolhas, não é uma boa ideia em si interpretar os dados da WoT da PLS simplesmente de uma forma numérica bruta. A melhor forma é fazer uma abordagem individual, com base na sua rede de confiança ao invés de puramente o número de avaliações positivas e negativas.
O grafo da PLS busca justamente tornar mais intuitivo, prático e sistemático essa pesquisa natural. Essa implementação é além de uma ferramenta, uma forma de expressão social muito forte, tanto em âmbito social quanto jurídico, à medida em que a dinâmica social e jurídica se entrelaçam no tecido social.
Adriano Calango ataca novamente
Para um exemplo prático, voltemos a falar dele, Adriano Calango.
Adriano Calango conhece a WoT da PLS já faz um tempo e já avaliou todos os seus parceiros comerciais e amigos aos quais tem laços de confiança já firmes e maduros. Ele procura alguém para alugar uma casa Rolante, RS. ´Ele vê alguns perfis de síndicos no Nostr que moram na mesma cidade que ele com casas disponíveis para alugar. Mas quer ter uma noção que não está se metendo em encrenca ou lidando com algum síndico chato que inferniza a vida dos inquilinos.
Dito isso, ele acessa a WoT da PLS e vai na página do grafo. Percebe que seu amigo Bruno Jabuti, ao qual já havia avaliado positivamente anteriormente, avaliou positivamente um professor de Jiu-jitsu, conhecido como Carlos Camaleão. Que além de ser avaliado positivamente por Bruno Jabuti, recebeu várias avaliações positivas de outros usuários conhecidos de Adriano Calango. Carlos Camaleão, por sua vez, avaliou positivamente um síndico da região chamado Diego Iguana. Na descrição Carlos Camaleão descreve como em todo o tempo que ele foi inquilino de Diego Iguana sempre foi bem tratado e como seu condomínio estava sempre bem organizado e era cuidadosamente zelado, e como sempre que havia alguma falha de infraestrutura, o problema era rapidamente resolvido. Adriano Calango considera firmar um contrato de aluguel com Diego Iguana.
Assim, temos o seguinte caminho de confiança estabelecido:
Adriano Calango 👍 -> Bruno Jabuti 👍 -> Carlos Camaleão 👍 -> Diego Iguana
Passando-se alguns dias, Adriano Calango é abordado por Denis Jacaré em uma DM no Nostr oferecendo aluguel baratíssimo e com poucas exigências. Denis Jacaré foi informado que Adriano Calango estava a procura de um imóvel novo para residir. Adriano Calango, então, pega a chave Nostr de Denis Jacaré e joga na parte de "target" na página do grafo na PLS WoT. Ele percebe que Denis Jacaré tem várias avaliações negativas de inúmeros usuários, mas não consegue ainda bater o martelo quanto a confiabilidade de Denis Jacaré. Ele então insere sua própria chave Nostr no campo de "main rater" e vê que tem um caminho tracejado entre a sua npub e a de Denis Jacaré. Pra sua surpresa, ele vê que Carlos Camaleão deu a Denis Jacaré uma avaliação negativa, por conta que no período em que sua filha era inquilina do mesmo, prestou um péssimo serviço. O condomínio vivia com o elevador quebrado, a portaria muitas vezes não funcionava e tinha falta de luz constante. Denis Jacaré não tomava providẽncia nenhuma quanto a isso e ainda fazia questão de causa intriga entre os inquilinos e tentar jogar uns contra os outros. Adriano Calango, então percebe que Denis Jacaré não é confiável com base na rede de confiança definida por Adriano Calango.
Nesse caso temos o seguinte circuito estabelecido:
Adriano Calango 👍 -> Bruno Jabuti 👍 -> Carlos Camaleão 👎 -> Denis Jacaré
Adriano Calango aborda Diego Iguana para estabelecer um contrato. Agora é a vez de Diego Iguana pesquisar o histórico de Adriano Calango. Pois ele quer manter a comunidade de seu condomínio saudável e não deseja aceitar inquilinos baderneiros ou barraqueiros.
Diego Iguana faz então o caminho inverso de Adriano Calango, pondo a npub de Adriano Calango como "target" e a própria npub como "main rater". Daí Diego Iguana consegue ver que Carlos camaleão deu uma nota positiva para Bruno Jabuti e Bruno Jabuti deu uma nota positiva para Adriano Calango. Os dois então fecham negócio.
Neste exemplo, o grafo da WoT da PLS serviu como uma "bússola de confiança" para Adriano Calango e Diego Iguana firmarem um contrato no BJP com seus árbitros e advogados.
Considerações finais
Neste artigo você pôde aprender os conceitos básicos da Private Law Society, motivos de certas escolhas de design, viu exemplos práticos de casos de uso e um pouco das bases filosóficas que norteiam o ecosistema da PLS. Também pôde compreender um pouco mais sobre o conceito de WoT na PLS e como isso pode ser útil com o passar do tempo e a adesão de novos usuários no sistema.
Se este conteúdo te agregou de forma positiva em algo, considere mandar um ZAP ou fazer uma doação anônima por um dos meios disponibilizados na descrição do meu perfil Nostr. Este artigo foi feito com muito carinho e dedicação. Sua doação me encoraja a continuar produzindo e lhe mantendo informado. Se não pode ou não quer contribuir financeiramente, considere engajar no conteúdo reagindo, compartilhando e comentando. Toda a ajuda é bem vinda. Agradeço de coração sua paciência e atenção para ler até aqui.
Em breve trarei novidades sobre o desenvolvimento do grafo da WoT e logo mais, vídeo novo no meu canal do YouTube. Até mais!
-
@ 33baa074:3bb3a297
2025-06-03 00:41:41Temperature and humidity monitoring in hospitals and laboratories Temperature and humidity sensors can be used for temperature and humidity monitoring in hospitals and laboratories to ensure the quality and safety of drugs and biological samples. Sensors can send data to the cloud and connect to other devices such as smart pharmaceutical and warehouse management systems. For example, the transportation and storage of most drugs, vaccines, blood samples, etc. require a relatively constant temperature and humidity environment. The application of temperature and humidity sensors can ensure that these medical supplies are in a suitable environment.
Application of 4G remote temperature and humidity sensors in vaccine transportation Medicines start from pharmaceutical factories, go through cold chain transportation, arrive at hospitals or pharmacies, and finally circulate to the market. In this process, if there are slight errors in temperature and humidity during intermediate storage, the quality of medicines will be reduced in the mild case, and the medicines will be directly invalid in the severe case, which may cause medical accidents when used on patients. 4G remote temperature and humidity sensors can monitor the temperature of vaccine transport vehicles. In recent years, its data collection and Internet of Everything features have become the darling of the smart medical market, helping to solve the problem of temperature and humidity monitoring during vaccine transportation.
Pharmacy temperature and humidity monitoring Pharmacies need to maintain appropriate temperature and humidity conditions to store various types of medicines. Temperature and humidity sensors can monitor the temperature and humidity in the pharmacy in real time. Once the temperature and humidity exceed the safe range for drug storage, the system can issue an alarm in time to remind staff to take corresponding measures, such as adjusting the operation of air conditioners, dehumidifiers and other equipment to ensure that the quality of drugs is not affected.
Ward environment monitoring Creating a good and comfortable medical environment for patients is one of the important goals of hospital operations. Temperature and humidity sensors can be used for ward environment monitoring to obtain temperature and humidity data in the ward in real time. Medical staff can adjust the temperature and humidity of the ward in time based on these data, improve the comfort of patients, and help patients recover. At the same time, a suitable temperature and humidity environment is also conducive to reducing bacterial growth and ensuring the health and safety of patients and medical staff.
-
@ 472f440f:5669301e
2025-06-02 21:12:29Marty's Bent
via me
I think we'll look back at last weekend as one of the most pivotal points in human history. Ukraine's Operation Spider Web is one of the more shocking things I've seen in terms of military operations in my life. It validates something that many bitcoiners, many cypherpunks, and many prescient individuals have been talking about for decades now at this point, which is asymmetric drone warfare.
The Sovereign Individual is a book that many bitcoiners have talked about throughout the years due to how prescient it was in terms of the inevitable emergence of a digital currency outside the control of central banks and governments. The book was written in the mid-90s, so the fact that the two authors were able to predict that something like bitcoin would emerge less than 20 years after writing the book is pretty incredible. However, digital currencies leveraging cryptography were not the sole focus of the book. Another portion of the book was dedicated to the idea of asymmetric drone warfare and its effects on society overall.
It seems pretty clear today that this is another call from The Sovereign Individual that is coming true. Obviously, unless you've been living under a rock, you've noticed that Ukraine has been using drones in the battlefield to target strategic Russian assets and individual soldiers over the last year. The amount of battlefield videos I've seen of Russian soldiers running from autonomous drones that are hunting them down has been increasing significantly over the last six months. The footage is truly harrowing. It is a death that I wouldn't wish on anybody. With Operation Spider Web Ukraine has increased the stakes of this type of drone warfare by going deep into Russian territory and targeting strategic long-range bombers, some of which had the ability to deploy nuclear warheads. This is sure to incite a reaction from Russia. No one will be surprised if, by the end of the week, Russia has started a shock and awe campaign that goes deep into Ukrainian territory in retaliation for the kamikaze drone strikes on their long-range aircraft. I pray for peace and a quick resolution to this war, and every other war for that matter.
I didn't come here to pontificate and give my thoughts on this particular war, but I would like to focus on this new tactic of war and what it means for military budgets moving forward. The Sovereign Individual laid it out clearly when they wrote in the 1990s that at some point in the future autonomous drones would be leveraged in the battlefield and prove to be asymmetric because of the fact that they are extremely cheap to produce. When you compare the price it cost to produce one of these drones to the price of the equipment they are destroying, things get pretty crazy. With tens of thousands of dollars of drone equipment the Ukrainian army destroyed tens if not hundreds of millions of dollars worth of long-range missile aircraft. And it did so without putting any Ukrainian military personnel in harm's way. Directly, at least.
When you consider the return on investment of deploying these drones compared to sending in soldiers, tanks, and your own aircraft, it becomes pretty obvious that this is going to quickly become the most logical way to fight a war moving forward. The question that remains is how quickly do other governments recognize this and implement it into their own defense strategies? As an American looking at our military budget, which is quickly approaching $1 trillion in annual spend, I'm forced to question whether or not most of that money is simply being wasted, considering the fact that we live in a time where these asymmetric battlefield strategies now exist. Why build new fighter jets when a Somali pirate, or nefarious individual for that matter, could use a $200 drone to destroy it in a matter of seconds with no threat of direct physical harm?
I'm no military expert, but if I were at the helm of the Defense Department, I would seriously be forcing those below me to focus a ton of effort on this problem and create plans to make sure that we are sufficiently protected from these risks. The only way to protect from these risks is to build the capabilities yourself. When it comes to the risk reward from a defense tech investment perspective I think a majority of the effort should be focused on defensive drone technologies and capabilities.
With that being said, it does seem like the US military is privy to this asymmetric reality that we currently live in. Defense contracts with Andruil make this pretty clear. Andruil is certainly ahead of the curve when it comes to autonomous drone warfare and defense against it. As an American, even though I don't like war, or the military industrial complex, knowing that the military is working with companies like Andruil does give me some comfort. However, the other side of that coin is that it is very unnerving when you consider that the government creating these public-private partnerships could lead to some Orwellian outcomes here at home. It may make some of you feel uncomfortable, but I believe the ideal scenario is that any individual has access to these types of defensive drone technologies in the future. The end goal being to create a nuclear game theoretical outcome where violence is reduced because one always has to assume that anyone they intend to attack has access to sufficient and formidable defensive technologies.
It's truly scary times we're living in as we transition further into the Digital Age. Part of the reason that I've dedicated my whole life to bitcoin is because I truly do believe that if you fix the money, you can fix the world. That is not to say that kinetic wars or physical violence will not exist in the future. It certainly will. But I believe sound money and open access to these systems and tools creates conditions which are much more suitable for cooperation and less so for conflict.
Multi-Signature Bitcoin Custody Is Replacing Single-Point Solutions
Jesse Gilger made a compelling case for why multi-signature Bitcoin custody represents the future of secure storage. He explained how Gannett Trust's approach ensures "not all of the keys are going to be at any one entity," fundamentally reducing the honeypot risk that plagues centralized custodians. This distributed model means no single point of failure can compromise your Bitcoin, whether through hacking, internal fraud, or regulatory seizure.
"I was on the list. I got the email. 'You were affected.'" - Jesse Gilger
Jesse's firsthand experience with the Coinbase data breach drives home why centralized custody is fundamentally flawed. While Coinbase holds keys for 10 of 12 Bitcoin ETFs, smart money is moving toward multi-institutional setups where Gannett holds a key, Unchained holds a key, and a third party holds a key. This alignment with Bitcoin's decentralized ethos isn't just philosophically pure—it's pragmatically superior for protecting generational wealth.
Check out the full podcast here for more on MSTY risks, Bitcoin retirement strategies and nation-state adoption dynamics.
Headlines of the Day
MicroStrategy Copycats See Speculative Premiums Fade - via X
Square Tests Bitcoin Payments, Lightning Yields Beat DeFi - via X
Get our new STACK SATS hat - via tftcmerch.io
Bitfinex Moves $731M Bitcoin to Jack Mallers' Fund - via X
Take the First Step Off the Exchange
Bitkey is an easy, secure way to move your Bitcoin into self-custody. With simple setup and built-in recovery, it’s the perfect starting point for getting your coins off centralized platforms and into cold storage—no complexity, no middlemen.
Take control. Start with Bitkey.
Use the promo code “TFTC20” during checkout for 20% off
Ten31, the largest bitcoin-focused investor, has deployed $150.00M across 30+ companies through three funds. I am a Managing Partner at Ten31 and am very proud of the work we are doing. Learn more at ten31.vc/invest.
Final thought...
Trying to imagine the future my children are going to live in gets harder by the day.
Get this newsletter sent to your inbox daily: https://www.tftc.io/bitcoin-brief/
Subscribe to our YouTube channels and follow us on Nostr and X:
-
@ 3b7fc823:e194354f
2025-02-12 23:13:57Staying Digitally Safe in Airports: A Comprehensive Guide
Airports are hubs of activity, but they’re also places where your digital security can be at risk. From public Wi-Fi to potential device thefts, staying safe while traveling can feel overwhelming. However, with the right knowledge and precautions, you can protect yourself and enjoy your journey stress-free. Let’s dive into how to stay digitally safe in airports while traveling.
Understanding the Risks
- Public Wi-Fi Vulnerabilities:
- Airports often offer free Wi-Fi, but these networks can be unsecured or insecure. Hackers may use these networks to intercept sensitive data.
-
Avoid using public Wi-Fi for personal banking, shopping, or handling sensitive information.
-
Device Theft:
-
High-traffic areas like security checkpoints, gates, and lounges are hotspots for device thefts. Always keep your devices in secure locations, such as carry-on bags or locked briefcases.
-
Malware and Phishing Attacks:
-
Some airports may have phishing attempts or malware distributed via pop-ups, email, or malicious websites.
-
Physical Surveillance:
- In some cases, law enforcement or security personnel may monitor your activities. Always be mindful of your surroundings to avoid unintended data exposure.
Best Practices for Staying Digitally Safe in Airports
- Use a VPN for Extra Security:
- Even secure airport Wi-Fi can expose your data if not encrypted. Use a reputable Virtual Private Network (VPN) to encrypt your internet traffic and protect your privacy.
-
Always ensure your VPN is active when using public Wi-Fi.
-
Minimize Sensitive Data on Public Devices:
-
Avoid carrying devices with sensitive information like passwords, credit card details, or personal identification numbers (PIIs).
-
Encrypt Your Data:
-
Enable encryption for all your devices to protect data stored locally or in the cloud. Ensure your operating system and apps are updated with the latest security patches.
-
Secure Your Devices:
- Use cable locks or secure cases to lock down laptops, tablets, and smartphones when not in use.
-
Remove screensavers that display your device passcode to prevent unauthorized access.
-
Keep Antivirus Software Updated:
-
Install and maintain up-to-date antivirus software on all devices. This helps detect and remove malicious software (malware) that may be installed through compromised networks or phishing attempts.
-
Avoid Plugging Into Public USB charging stations:
-
Refrain from using public USB ports or charging stations unless you know they’re secure. Malware can spread via these points.
-
Use Caution With Lost and Found:
-
If you find a device or drop one accidentally, avoid using lost and found kiosks to pick it up. Instead, contact airport security for assistance in safely retrieving your property without exposing it to potential thieves.
-
Stay Alert to Security Alerts:
-
Pay attention to announcements over the airport’s PA system regarding suspicious activity or security alerts. Follow any instructions provided by airport staff.
-
Monitor Your Accounts Remotely:
- If you suspect something is wrong (e.g., unusual transactions on your credit card), check your financial accounts immediately upon arriving at your destination. Notify your bank of potential fraudulent activity and report it to the authorities if necessary.
Additional Tips for Airport Safety
- Use a Portable Power Bank:
-
Keep your devices charged so you don’t rely on public charging stations, which may be compromised.
-
Travel with Backup Devices:
-
Always bring an extra SIM card, USB drive, or cloud storage to backup important data. This ensures you can access critical information even if your primary device is lost or damaged.
-
Avoid Sharing Personal Information Over Earphone Rentals:
-
Refrain from using earphones rented from airport kiosks that may record or intercept your conversations. Stick to your own headphones or those provided by the airline.
-
Use Airport Lounges Wisely:
-
If you’re using an airline lounge, avoid discussing sensitive information in public areas where it could be overheard.
-
Keep Your Luggage in Sight:
-
Never leave your checked luggage unattended, as it may contain devices or documents with sensitive information.
-
Plan for Data Loss:
- Before leaving home, make a backup of all important files and photos on an external drive or cloud storage. This way, you can restore them if something goes wrong during your trip.
What to Do If Something Goes Wrong
- Report Suspected Security Incidents:
-
If you notice unusual activity on your devices or suspect a security breach, inform airport security immediately.
-
Contact Your Financial Institutions:
-
If you believe your financial information has been compromised, contact your bank or credit card provider to freeze your account and monitor for fraudulent charges.
-
File a Police Report:
-
In cases of theft or suspected unauthorized access, file a report with local authorities and provide evidence (if available).
-
Use Travel Insurance:
- Check if your travel insurance covers theft, fraud, or data breaches. Submit a claim if you’re covered.
Extra Security Measures forTech-Savvy Travelers
- Two-Factor Authentication (2FA): Enable 2FA for all your critical accounts before leaving home.
- Biometric Locks: Use biometric locks on your devices to add an extra layer of security.
- Incident Response Plan: Create a plan in advance for what to do if your devices are lost or compromised.
Final Tips
- Always prioritize secure practices, even in seemingly safe environments like airports.
- Travel light but keep your important documents and devices close at hand.
- Remember that staying digitally safe is just as important as physical safety during your travels.
By following these tips, you can enjoy your trip with peace of mind, knowing your data and devices are protected. Happy traveling!
Advocating for privacy does not finance itself. If you enjoyed this article, please consider zapping or sending monero
82XCDNK1Js8TethhpGLFPbVyKe25DxMUePad1rUn9z7V6QdCzxHEE7varvVh1VUidUhHVSA4atNU2BTpSNJLC1BqSvDajw1
-
@ e2c72a5a:bfacb2ee
2025-06-02 22:57:05The silent revolution isn't Bitcoin hitting $111K—it's the unprecedented corporate treasury shift happening right under our noses. While everyone watches price charts, 14 US states have quietly accumulated $632 million in Strategy stock, effectively gaining Bitcoin exposure through the backdoor. This isn't just investment diversification; it's governmental entities voting with their dollars in a way legislation never could. The real crypto story of 2025 isn't about retail adoption or even institutional investment—it's about the stealth integration of digital assets into public finance structures. What happens when state pension funds start demanding Bitcoin allocation to match their Strategy holdings? The line between government opposition and participation is blurring faster than anyone predicted. Are we witnessing the early stages of a sovereign wealth transition that makes El Salvador's Bitcoin experiment look like a mere test run? Your financial future might depend less on what lawmakers say about crypto and more on what their investment committees are already doing.
-
@ 32e18276:5c68e245
2025-06-02 20:58:05Damus OpenSats Grant Q1 2025 Progress Report
This period of the Damus OpenSats grant has been productive, and encompasses the work our beta release of Notedeck. Since we sent our last report on January, this encompasses all the work after then.
Damus Notedeck
We released the Beta version of Notedeck, which has many new features:
Dave
We've added a new AI-powered nostr assistant, similar to Grok on X. We call him Dave.
Dave is integrated with tooling that allows it to query the local relay for posts and profiles:
Search
The beta release includes a fulltext search interface powered by nostrdb:
Zaps
You can now zap with NWC!
And More!
- GIFs!
- Add full screen images, add zoom & pan
- Introduce last note per pubkey feed (experimental)
- Allow multiple media uploads per selection
- Major Android improvements (still wip)
- Added notedeck app sidebar
- User Tagging
- Note truncation
- Local network note broadcast, broadcast notes to other notedeck notes while you're offline
- Mute list support (reading)
- Relay list support
- Ctrl-enter to send notes
- Added relay indexing (relay columns soon)
- Click hashtags to open hashtag timeline
Damus iOS
Work continued on the iOS side. While I was not directly involved in the work since the last report, I have been directing and managing its development.
What's new:
Coinos Wallet + Interface
We've partnered with coinos to enable a one-click, non-KYC lightning wallet!
We now have an NWC wallet interface, and we've re-enabled zaps as per the new appstore guidelines!
Now you can see all incoming and outgoing NWC transactions and start zapping right away.
Enhanced hellthread muting
Damus can now automatically mute hellthreads, instead of having to do that manually.
Drafts
We now locally persist note drafts so that they aren't lost on app restart!
Profile editing enhancements
We now have a profile picture editing tool so that profile pictures are optimized and optionally cropped
Conversations tab
We now have a conversations tab on user profiles, allowing you to see all of your past conversations with that person!
Enhanced push notifications
We've updated our push notifications to include profile pictures, and they are also now grouped by the thread that they came from.
And lots more!
Too many to list here, check out the full changelog
Nostrdb
nostrdb, the engine that powers notecrumbs, damus iOS, and notedeck, continued to improve:
Custom filters
We've added the ability to include custom filtering logic during any nostrdb query. Dave uses this to filter replies from kind1 results to keep the results small and to avoid doing post-processing.
Relay index + queries
There is a new relay index! Now when ingesting notes, you can include extra metadata such as where the note came from. You can use this index to quickly list all of the relays for a particular note, or for relay timelines.
NIP50 profile searches
To assist dave in searching for profiles, we added a new query plan for {kind:0, search:} queries to scan the profile search index.
How money was used
- relay.damus.io server costs
- Living expenses
Next quarter
We're making a strong push to get our Android version released, so that is the main focus for me.
-
@ e2c72a5a:bfacb2ee
2025-06-02 22:55:52The dark side of crypto's energy debate: AI will consume 50% of data center electricity by year-end, dwarfing Bitcoin's footprint. While critics fixate on Bitcoin's environmental impact, artificial intelligence quietly devours exponentially more power with far less scrutiny. This energy hypocrisy reveals a selective outrage that has little to do with actual environmental concerns and everything to do with controlling financial innovation. The next time someone lectures you about Bitcoin's energy use, ask them about their AI chatbot habits—the carbon footprint might just leave them speechless. Are we really concerned about energy consumption, or just afraid of financial freedom?
-
@ 3b7fc823:e194354f
2025-02-12 02:20:27I fought with making this work for two days before I finally figured out that I made a simple SQL format mistake. I asked chatGPT to write a tutorial on how to do it based on what I did and the work I did with it. Sharing it in case anyone finds it useful.
Enabling Persistent Memory in Open WebUI with Ollama
This tutorial will guide you through the process of enabling persistent memory for your AI models running locally with Ollama and Open WebUI on Debian Linux. By the end of this guide, your AI will be able to remember the last 20 conversations you’ve had with it.
Prerequisites
- Debian Linux system
- Ollama installed and configured
- Open WebUI installed and running
Step 1: Setting Up the Database for Persistent Memory
We'll use SQLite to store conversation history.
1.1 Create
conversation_memory.py
Navigate to your Open WebUI backend directory and create a new file called
conversation_memory.py
.bash cd /home/your_username/Documents/open-webui-0.5.10/backend nano conversation_memory.py
Paste the following code into
conversation_memory.py
:```python import sqlite3 import os
Set DB_FILE to the absolute path of memory.db in the same directory as this script
DB_FILE = "/home/your_username/Documents/open-webui-0.5.10/backend/memory.db"
def init_db(): """Create database table if it doesn't exist""" conn = sqlite3.connect(DB_FILE) c = conn.cursor() c.execute(""" CREATE TABLE IF NOT EXISTS memory ( id INTEGER PRIMARY KEY AUTOINCREMENT, user TEXT, ai TEXT ) """) conn.commit() conn.close()
def save_conversation(user_input, ai_response): """Save a conversation entry to the database and maintain only the last 20 entries.""" try: conn = sqlite3.connect(DB_FILE) c = conn.cursor() c.execute("INSERT INTO memory (user, ai) VALUES (?, ?)", (user_input, ai_response)) c.execute(""" DELETE FROM memory WHERE id NOT IN ( SELECT id FROM memory ORDER BY id DESC LIMIT 20 ) """) conn.commit() conn.close() print(f"Successfully saved: User - {user_input}, AI - {ai_response}") except Exception as e: print(f"Error saving conversation: {e}")
def get_last_conversations(limit=5): """Retrieve the last 'limit' number of conversations""" try: conn = sqlite3.connect(DB_FILE) c = conn.cursor() c.execute("SELECT user, ai FROM memory ORDER BY id DESC LIMIT ?", (limit,)) conversations = c.fetchall() conn.close() return conversations except Exception as e: print(f"Error retrieving conversations: {e}") return []
Initialize the database when this script is run
init_db() ```
Step 2: Integrating Memory into Open WebUI Middleware
We'll modify the Open WebUI middleware to save and retrieve conversations.
2.1 Edit
middleware.py
Open the
middleware.py
file for editing:bash nano middleware.py
2.2 Import Memory Functions
At the top of the file, import the memory functions:
python from conversation_memory import save_conversation, get_last_conversations
2.3 Retrieve and Append Conversation History
Locate the function responsible for processing chat payloads. Add the following code to retrieve and append the last 20 conversations:
```python
Retrieve past conversations (e.g., last 20 messages)
conversation_history = get_last_conversations(limit=20)
Format past conversations as context
history_text = "\n".join([f"User: {conv[0]}\nAI: {conv[1]}" for conv in conversation_history])
Append conversation history to the current user message
user_message = get_last_user_message(form_data["messages"]) if history_text: combined_message = f"Previous conversation:\n{history_text}\n\nNew message:\nUser: {user_message}" else: combined_message = f"User: {user_message}"
Update the last user message with combined history
form_data["messages"][-1]["content"] = combined_message ```
2.4 Save New Conversations
Ensure that new conversations are saved after the AI generates a response. Add the following code where the AI response is handled:
```python
Extract AI response content
if isinstance(ai_response, dict) and "choices" in ai_response: ai_response_content = ai_response["choices"][0]["message"]["content"] else: ai_response_content = ""
Save the new conversation
if ai_response_content.strip(): save_conversation(user_message, ai_response_content) ```
Step 3: Testing Persistent Memory
3.1 Run the Script to Test Saving
Run
conversation_memory.py
to ensure it's saving data correctly:bash python3 /home/your_username/Documents/open-webui-0.5.10/backend/conversation_memory.py
3.2 Query the Database to Verify Data
Use SQLite to check if conversations are being saved:
bash sqlite3 /home/your_username/Documents/open-webui-0.5.10/backend/memory.db sqlite> SELECT * FROM memory;
You should see your test conversations listed.
Step 4: Final Verification in Open WebUI
- Restart the Open WebUI server to apply changes.
- Start a conversation with the AI.
- After several interactions, verify if the AI references past conversations.
- Query
memory.db
again to ensure new conversations are being saved:
bash sqlite3 /home/your_username/Documents/open-webui-0.5.10/backend/memory.db sqlite> SELECT * FROM memory;
Conclusion
You’ve successfully enabled persistent memory for your AI models running with Ollama and Open WebUI! The AI will now remember the last 20 conversations, creating a more dynamic and personalized user experience.
Feel free to adjust the memory limit or expand the functionality as needed. Happy coding!
Advocating for privacy does not finance itself. If you enjoyed this article, please consider zapping or sending monero
82XCDNK1Js8TethhpGLFPbVyKe25DxMUePad1rUn9z7V6QdCzxHEE7varvVh1VUidUhHVSA4atNU2BTpSNJLC1BqSvDajw1
-
@ e136fbe5:b6e8325d
2025-06-02 23:11:38Với sự phát triển mạnh mẽ của công nghệ, các nền tảng giải trí trực tuyến ngày nay không chỉ đáp ứng nhu cầu giải trí mà còn tạo ra những trải nghiệm thuận tiện và tối ưu cho người dùng. Trong đó, ứng dụng VND77 đã chứng minh được lợi ích vượt trội khi mang đến cho người chơi một công cụ hữu hiệu để tham gia vào các trò chơi yêu thích mọi lúc mọi nơi. Việc sử dụng ứng dụng di động giúp người chơi dễ dàng truy cập vào hệ thống mà không cần phải ngồi cố định trước màn hình máy tính, từ đó tạo ra sự linh hoạt và thuận tiện tối đa trong việc trải nghiệm các dịch vụ mà VND77 cung cấp. Ngoài ra, ứng dụng VND77 còn được thiết kế để tương thích với cả hai hệ điều hành Android và iOS, giúp người chơi dễ dàng tải và cài đặt mà không gặp phải bất kỳ khó khăn nào. Một khi đã cài đặt ứng dụng, người dùng có thể truy cập ngay vào các trò chơi hấp dẫn như game bài, slot game, bắn cá hay cá cược thể thao mà không cần phải lo lắng về vấn đề tốc độ hay hiệu suất.
Không chỉ đơn giản là một công cụ giúp người chơi tham gia vào các trò chơi, ứng dụng VND77 còn đem lại rất nhiều tiện ích khác giúp tối ưu hóa trải nghiệm người dùng. Một trong những điểm nổi bật là khả năng nạp – rút tiền tự động ngay trong ứng dụng. Người chơi có thể thực hiện các giao dịch tài chính một cách nhanh chóng và dễ dàng, không cần phải chuyển qua lại giữa các trang web hay lo lắng về các thủ tục phức tạp. Tất cả giao dịch đều được xử lý chỉ trong vài phút, đảm bảo không làm gián đoạn quá trình chơi game của người dùng. Hơn nữa, ứng dụng còn hỗ trợ thông báo các chương trình khuyến mãi, sự kiện đặc biệt và thông tin về các trò chơi mới, giúp người chơi luôn được cập nhật và không bỏ lỡ bất kỳ cơ hội thưởng thức game hay nhận thưởng hấp dẫn nào. Việc này không chỉ giúp nâng cao trải nghiệm giải trí mà còn tạo ra sự gắn kết giữa người chơi và nền tảng.
Một yếu tố không thể không nhắc đến khi nói về lợi ích của ứng dụng VND77 là tính bảo mật. VND77 đã tích hợp những công nghệ bảo mật tiên tiến nhất để bảo vệ thông tin cá nhân của người dùng. Mọi giao dịch, từ việc nạp tiền cho đến việc rút tiền, đều được mã hóa và bảo vệ nghiêm ngặt, giúp người chơi yên tâm khi thực hiện các giao dịch tài chính trực tuyến. Thêm vào đó, ứng dụng VND77 còn hỗ trợ tính năng xác thực hai yếu tố (2FA), tăng cường mức độ bảo mật và giảm thiểu nguy cơ tài khoản bị hack. Với những tính năng bảo mật này, người chơi có thể hoàn toàn tin tưởng vào VND77 khi tham gia các hoạt động giải trí và cá cược. Tóm lại, việc sử dụng ứng dụng VND77 không chỉ giúp người chơi trải nghiệm các trò chơi mượt mà, dễ dàng mà còn mang lại sự an tâm tuyệt đối về bảo mật và sự tiện lợi trong các giao dịch tài chính.
-
@ 9ca447d2:fbf5a36d
2025-06-02 23:02:16Mac users who use Ledger hardware wallets to manage their digital assets are being warned about a new scam that uses fake apps to steal funds.
Cybercriminals have launched multiple phishing campaigns using malware that targets macOS systems, replacing the real Ledger Live app with a fake version that asks users to enter their recovery phrase.
These fake apps look almost identical to the real Ledger Live, but instead of helping users manage their bitcoin, they steal the 24-word recovery phrase—the master key to the user’s digital assets.
According to a detailed analysis by Moonlock, the attacks start when users’ computers get infected with Atomic macOS Stealer malware from one of over 2,800 hacked websites. Once installed, the malware removes the legitimate Ledger Live app and installs a malicious version in its place.
The fake app then shows a pop-up message saying it has detected “suspicious activity”, and asks the user to enter their recovery phrase to fix the issue. Once entered, the seed phrase is sent to a server controlled by the attacker.
2,800 websites discovered infected with Atomic Stealer — Moonlock
“Once entered, the seed phrase is sent to an attacker-controlled server, exposing the user’s assets in seconds,” Moonlock said in their May 22 report.
With the recovery phrase, the scammers can drain the user’s wallet of all digital assets—bitcoin and other tokens.
This isn’t an isolated incident. Moonlock has been tracking this malware since August 2024 and has found at least four active campaigns targeting Mac users. They believe the attackers are getting more sophisticated and are refining their methods.
“This isn’t just a theft. It’s a high-stakes effort to outsmart one of the most trusted tools in the crypto world. And the thieves are not backing down,” Moonlock researchers said.
Initially, the fake Ledger Live apps could only steal passwords and view wallet details. This gave attackers some insight into victims’ assets but no way to steal funds directly.
However, over time, hackers have improved their tactics and are now harvesting recovery phrases, so they can take full control of wallets and move funds freely.
One strain of malware, called Odyssey, was spotted in March and was linked to a hacker using the alias “Rodrigo”.
Odyssey replaces Ledger Live with a trojanized app and displays a phishing page asking users to enter their recovery phrases after showing a fake “critical error” message. Another copycat campaign using AMOS (Atomic macOS Stealer) followed soon after.
The fake Ledger Live app asks for user’s seed phrase — Moonlock
In one case, a fake app even displayed an “App corrupted” error after stealing the seed phrase to lower the victim’s suspicion and buy time to transfer the funds.
For years, computers running MacOS were considered safer than their Windows counterparts, because the operating system is less prone to malware. This advanced malware shows that users can never be too careful.
Attackers aren’t just relying on infected apps to steal from users. Other scam tactics include:
- Discord attacks: In May, a moderator account in Ledger’s official Discord server was compromised. Attackers used it to post fake verification links.
- Reddit phishing: In January, a user reported losing $15,000 after unknowingly entering their recovery phrase into a fake app.
- Physical mail scams: In April, some Ledger users received letters claiming to be from the company. These letters included QR codes leading to phishing sites that asked for seed phrases under the guise of a “critical security update”.
Attackers are increasingly targeting users holding hardware wallets, because they might be holding larger amounts.
Earlier this month, a Trezor One user reported being contacted by Coinbase impersonators, who tricked him into entering his seed phrase into a fake website, resulting in loss of 17.5 BTC.
The final goal for all these attacks is similar: the attackers are looking for users’ seed phrases, and they are getting creative in finding new ways to acquire them.
One sure way of staying safe is to learn more. The golden standard rule is to NEVER enter your seed phrase into a computer or a website, no matter how urgent or convincing it looks.
If you are a hardware wallet user, make sure you purchase the wallet from official sources. And the ONLY electronic place you can enter your seed phrases is on the hardware wallet itself.
If a process requires you to enter your seed phrase anywhere on a computer itself, it is definitely a scam.
Related: Bitcoin Hardware Wallet Hacks | What You Need to Know
-
@ 3b7fc823:e194354f
2025-02-12 01:15:49We are constantly surrounded by technologies that claim to enhance our experiences but often come at the cost of our privacy. Think about it – every time you visit a website, cookies are being dropped like breadcrumbs, tracking your every move without you even knowing.
How Tech Companies Collect Your Data: The Spy Next Door
-
Cookies: These tiny files are placed on your device as soon as you visit a site. They follow you around the web, creating a digital trail that companies use to learn about your habits and interests.
-
Tracking Pixels: Like cookies, these are invisible tags that track your actions across different websites. Imagine someone following you wherever you go online – that's what tracking pixels do.
-
Behavioral Targeting: This is when companies analyze your browsing history to serve you ads tailored to your interests. It's like knowing what you like and then bombarding you with it, whether you like it or not.
-
Data Brokers: These middlemen collect data from various sources and sell it on to the highest bidder. Your information could be used for marketing, insurance, or even political purposes – without your consent!
-
Third-Party trackers: Apps and websites you visit may share your data with other companies, creating a web of surveillance that's hard to escape.
What They Do with Your Data
Once companies have your data, they can use it for targeted advertising, profile building, and even political manipulation. Think about the Cambridge Analytica scandal... Your data isn't just used to make your experience better; it's being sold and exploited in ways you probably never imagined.
How to Stop Them: Empower Yourself
-
Use Privacy-Friendly Browsers: Tools like Brave or Firefox with enhanced tracking protection can block trackers and cookies, giving you control over what data is collected.
-
Block Trackers and Cookies: Browser extensions that allow you to block these elements are available for free, providing an added layer of privacy.
-
Minimize Data Usage: When using apps or websites, avoid granting unnecessary permissions that could lead to data collection.
-
Delete Unused Apps: Regularly delete apps and services that are no longer needed to stop data collection from inactive accounts.
-
Read Privacy Policies: Before accepting terms of service or privacy policies, read through them to understand what data will be collected and how it will be used.
-
Use Incognito or Private Browsing Modes: These modes often block cookies and trackers, offering an additional way to reduce data collection. But remember that Google was still tracking you on Chrome regardless, so your mileage may vary.
-
Limit Device Usage: Avoid using personal devices for sensitive activities when privacy is a concern.
-
Use Tor: Yes it's slower, yes some sites won't work. It's more private and you using helps disquise traffic giving protection for others that might need it more than you do.
Why It Matters: The Domino Effect
The data collected today isn't just for ads; it's used in decision-making processes that can affect your life. From insurance rates to job opportunities, your data can influence significant aspects of your existence. Imagine a world where your information is bought and sold without your consent – it's time to take control.
Your Data, Your Choice
Your data is being collected and sold without your consent, and the time to act is now. By understanding how data collection works and taking steps to protect yourself, you can reclaim control over your privacy. Remember, you're not just a user – you're the owner of your information. It's time to stand up for your rights and demand transparency from the companies that claim to serve you.
Don't Let Corporate Spies Steal Your Privacy
Your data is valuable, and it's being harvested without your knowledge. Take action today by educating yourself and others about the importance of privacy. Together, we can create a world where privacy is respected and protected, not exploited for profit.
Join the movement to fight against corporate surveillance and protect your right to privacy. Your information is too important to leave in the hands of those who don't have your consent. It's time to take a stand – your digital life depends on it.
Advocating for privacy does not finance itself. If you enjoyed this article, please consider zapping or sending monero
82XCDNK1Js8TethhpGLFPbVyKe25DxMUePad1rUn9z7V6QdCzxHEE7varvVh1VUidUhHVSA4atNU2BTpSNJLC1BqSvDajw1
-
-
@ 3b7fc823:e194354f
2025-02-10 18:56:06A VPN is Not Magic
A VPN is a virtual private network. A VPN service provides an encrypted tunnel between your device and a server they own or rent. You then connect to the internet from this server thus making your IP address appear to the wider internet as the server IP. That's it. That's all it does.
Your Device -> VPN -> Website
Your Device sees that you are connecting to a website through a VPN. Your ISP sees that you are connecting to a VPN server but nothing after. The website sees that someone from a VPN is connecting to them but doesn't know who. The VPN sees your device connected to their server and that you then connected to a website.
VPN Anonymity and Privacy
VPNs do a lot to protect your privacy, they keep your ISP from seeing and logging every single thing you do online and they spoof your location and IP to any website that you visit. Although this website protection isn't 100% anonymous because of cookies, trackers, and if you have to log into a site with your information. If you are using a VPN on a mobile phone then you are still broadcasting your location to the cell towers even if you are not telling the website you are browsing.
Then there is the elephant in the room. The VPN knows all and sees all. How much do they log? How long do they save it? Can you trust them? This is going to vary VASTLY between VPN providers. I always prefer if they are setup where they cannot know the information in the first place and limit what I tell them in the first place by paying through the use of bitcoin or monero. Just because they have a no log "policy" in place it doesn't always fill me with confidence.
VPN Security
How much security does a VPN give you? Some in certain circumstances but not a lot. A VPN is not going to stop malware or viruses. A VPN can provide some protection from a man in the middle or evil twin attack as it provides a encrypted tunnel between your device and the VPN server, so always use a VPN when joining public WIFI spots. Just remember a VPN cannot protect you downstream on the connection between the VPN server and the website, always use secure encrypted connections and be aware that MITM attacks can still happen on the backside. A VPN can prevent DDoS attacks since the attacker doesn't know your real IP address and a fantastic use of VPNs is to protect IoT devices. Those smart devices around your home love to scream out all their data insecurely and a VPN can change their IP and encrypt their data in transit protecting them from hacking.
VPN Legality
In many countries VPNs are banned, blocked, or outright illegal:
Bahrain Belarus China Cuba Egypt Iran Iraq Libya Myanmar North Korea Oman Russia Syria Turkey Turkmenistan UAE Uganda Venezuela Vietnam
Advocating for privacy does not finance itself. If you enjoyed this article, please consider zapping or sending monero
82XCDNK1Js8TethhpGLFPbVyKe25DxMUePad1rUn9z7V6QdCzxHEE7varvVh1VUidUhHVSA4atNU2BTpSNJLC1BqSvDajw1
-
@ 58537364:705b4b85
2025-06-02 18:47:35มีคำกล่าวที่ว่า “นกไม่เห็นฟ้า ปลาไม่เห็นน้ำ หนอนในส้วมไม่เห็นคูถ ไส้เดือนไม่เห็นดิน คนอยู่ในโลกก็ไม่เห็นโลก” นี้หมายความว่า มันมีอะไรที่ลึกลับอยู่ ที่ทำให้นกไม่เห็นฟ้า หรือปลาไม่เห็นน้ำ. ให้ดูเห็นง่ายก็ที่ปลา ปลามันอยู่ในน้ำ น้ำก็ถึงตา มันยังมองไม่เห็นน้ำ ทั้งที่น้ำเป็นสิ่งที่มันปะทะหรือว่าติดกันอยู่เสมอไป. ตั้งแต่เกิดมาก็เป็นอย่างนั้นเสียแล้ว มันก็ไม่ได้รู้สึกว่ามีน้ำ ปลาจึงไม่รู้ว่าน้ำนั้นคืออะไร โดยแท้จริง. หรือว่าหนอนที่เกิดมาจากอุจาระอยู่แท้ ๆ แต่ก็ไม่เห็นอุจาระ. หรือว่าไส้เดือนอยู่ในดิน มันกินดิน แต่มันก็ไม่เห็นดิน. ทั้งนี้เพราะคำว่า “เห็น” ในที่นี้มีความหมายพิเศษ
คนอยู่ในโลกก็ไม่เห็นโลก คือไม่ได้เห็นความจริงหรือความลับโดยแท้จริงของสิ่งที่เรียกว่า “โลก” มีตามันก็เห็นนั่นเห็นนี่เรือย ๆ ไป แต่ไม่เห็นจริง. ไม่รู้จักโดยแท้จริง มันจึงได้หลงในสิ่งเหล่านั้น. ถ้าเห็นจริงๆก็จะไม่หลงในอะไร. เพราะฉะนั้นอย่าได้ประมาท อย่าได้อวดดี ว่าเรา “เห็น” มันเพียงแต่ว่า สัมผัสตามธรรมดาด้วยตา แล้วรู้สึกไปตามกฎเกณฑ์อย่างธรรมดา ว่ามันมีเท่านั้น ; แต่ที่จริงยังมีอยู่อีกชั้นหนึ่ง คือชั้นลึกซึ้ง.
ทีนี้ เรามาดูกันถึงสิ่งที่เรียกว่า “ชีวิต” ขอให้สังเกตดูให้ดี ๆ ว่า เราต้องใช้คำว่า “สิ่งที่เรียกกันว่า...” สิ่งที่เรียกกันว่านี้ มันเป็นของคนโง่ก็ได้ คือคนโง่มันว่า หรือมันเรียกอะไรเป็นอะไร. แล้วในโลกนี้มีคนโง่มาก หรือมีคนฉลาดมาก ถ้าว่าเป็นคนฉลาด มันก็จะต้องรู้จักทำโลกนี้ให้หมดปัญหา คือไม่มีตวามทุกข์ยากลำบากวุ่นวาย.
เดี๋ยวนี้คนส่วนมาก ก็ไม่รู้จักสิ่งที่เรียกว่า “โลก” นี้โดยแท้จริง มันจึงทำไปในลักษณะที่ไม่ถูกต้องตรงตามที่เป็นจริง เราจึงยุ่งกันทั้งโลกอยู่เวลานี้.
คำว่า “ชีวิต” นี้ก็เหมือนกัน มันมีสิ่งที่เรียกว่า “ชีวิต” โดยเฉพาะเด็ก ๆ สมัยนี้ จะใช้คำว่า “ชีวิต” นี้พร่ำเพรื่อ. สมัยปู่ ย่า ตา ยาย คำว่าชีวิตนี้ใช้น้อยที่สุด เป็นความลึกลับเอามาพูดถึงกันน้อยที่สุด. เดี๋ยวนี้หนังสืออ่านเล่นหนังสืออะไรก็มีคำว่า “ชีวิต” ใช้พร่ำเพรื่อ จนเด็ก ๆ เข้าใจไปว่า ตัวเองรู้จักสิ่งที่เรียกว่า “ชีวิต” อย่างแตกฉานทีเดียว. นั่นแหละคือความหลับหูหลับตา สำหรับจะอวดดี.
สิ่งที่เรียกว่าชีวิตนี้มันมีความลึกลับ และยังแถมมีเคล็ดลับที่ซ่อนเร้นอยู่ในนั้นมาก คำว่า “ชีวิต” ของเด็ก ๆ ที่เคยอ่านแต่หนังสืออ่านเล่น มันก็มีความหมายอย่างหนึ่ง คนวัยรุ่นที่เคยแต่อ่านหนังสืออ่านเล่นนั้น จะเข้าใจคำว่า “ชีวิต” ในความหมายไปอย่างหนึ่ง. ต่อเมื่ออายุมากแล้ว เป็นพ่อแม่แล้ว จะรู้จัก “ชีวิต” ในความหมายหนึ่ง ซึ่งจะจริงกว่าหรือถูกกว่าอีกมาก; แต่ก็ยังไม่หมด มันยังเหลือความลับของชีวิตนั้นอีกมาก จนกว่าจะเป็นพระอริยเจ้า หรือว่ามีปัญญาตามแบบของพระอริยเจ้านั่นแหละ จึงจะเห็นสิ่งที่เรียกว่า “ชีวิต” อย่างถูกต้องแท้จริงและถึงที่สุด คือสมบูรณ์ที่สุด.
เพราะฉะนั้น พระอริยเจ้านั้นก็มิใช่ใครอื่นที่ไหน ท่านเป็นเพียงผู้ที่รู้จักโลกตามที่เป็นจริง แล้วก็ไม่หลงโลก ท่านทำให้ชีวิตนี้ไม่มีความทุกข์ ; คนชนิดนี้เรียกว่าพระอริยเจ้า.
แต่เดี๋ยวนี้คนทั่วไปไม่เข้าใจคำว่า “พระอริยเจ้า” จัดไว้เป็นบุคคลที่ลึกลับ เข้าใจไม่ได้ ; หรือว่าจะเป็นบุคคลประเภทที่ไม่พึงปรารถนาด้วยซ้ำไป.
คนวัยรุ่นสมัยนี้จะเข้าใจว่า พระอริยเจ้าเป็นคนหมดความหมาย สำหรับโลก หมดความหมายสำหรับพวกเรา ท่านบ้า ๆ บอ ๆ ครึ ๆ คระ ๆ ไปตามแบบของท่าน. ถ้าใครนึกอยู่อย่างนี้ก็ขอให้นึกเสียใหม่ เพราะว่าการศึกษาอบรมสมัยนี้อาจจะทำให้นึกไปอย่างนั้น จนนึกไปว่าพระอริยเจ้านี้ท่านเป็นคนประหลาด บ้า ๆ บอ ๆ ไปตามแบบของท่าน.
ขอให้เข้าใจเสียใหม่ว่า พระอริยเจ้า นั้นคือบุคคล ที่รู้จักโลกตามที่เป็นจริง และจัดการทุกอย่างถูกต้องหมด จนไม่มีความทุกข์ คือท่านไม่เป็นเหมือนกับ นกไม่เห็นฟ้า ปลาไม่เห็นน้ำ หนอนไม่เห็นคูถอย่างนี้ อีกต่อไป คือไม่เป็นอย่างนี้อีกต่อไป ; จะเป็นผู้ที่รู้สิ่งทั้งหลายทั้งปวงถูกต้องตามที่เป็นจริง.
ด้วยเหตุนี้แหละ เราจึงต้องใช้คำว่า สิ่งที่เรียกว่า “ชีวิต” ไม่ใช้คำว่า “ชีวิต” เฉยๆ เพราะมันเรียกกันได้ตามชอบใจ หลายอย่าง หลายแบบ หลายชั้น หลายลักษณะนัก ดังนั้นจึงขอร้องให้ผู้ที่เป็นครูนั้น รู้จักความลับของสิ่งที่เรียกว่าชีวิต.
ทีนี้ ความลับของสิ่งที่เรียกว่า “ชีวิต” นี้ มันก็ยังมีมากมายอีก ในชั้นนี้เราเอาตามที่พระพุทธเจ้าท่านตรัสไว้จะดีกว่า และก็อย่างเดียวกันอีกนั่นแหละ คือว่าพระพุทธเจ้าท่านได้ตรัสไว้มาก ถ้าเอาพระไตรปิฏกเป็นหลักแล้วมันมากจนเกินกว่าที่ชาวบ้านจะศึกษาไหว หรือจะรวบรวมมาให้หมดได้. เพราะฉะนั้นจึงมีความจำเป็นที่จะต้องมีการย่อหรือสรุปเอาแต่ใจความมาให้ฟังหรือให้ศึกษากัน.
ตามนัยที่พระพุทธเจ้าท่านได้ตรัสไว้ทั้งหมด ทั้งสิ้นนั้น เราอาจจะสรุปความได้ว่า สิ่งที่เรียกว่า “ชีวิต” นั้น มันมีเคล็ดลับมาก แต่มันก็รวมอยู่ที่ สิ่งที่เรียกว่า ตา หู จมูก ลิ้น กาย ใจ ช่วยจำคำ ๖ คำนี้ไว้ให้ดี ๆ อย่าหาว่าเป็นคำธรรมดา หรือว่าเป็นเรื่องธรรมดา มันมีความลับอยู่ในนั้นมากมายนัก คือคำว่า ตา หู จมูก ลิ้น กาย ใจ เราเรียกเป็นภาษาไทยกันดีกว่า ภาษาบาลีชวนให้ยุ่งหัว อยากจะรู้ภาษาบาลีก็ไปดูปทานุกรมเอาเองก็ได้.
สิ่งที่สำคัญที่สุด หรือทั้งหมดของสิ่งที่เรียกว่า “ชีวิต” ก็ตาม หรือของความลับ เคล็ดลับของชีวิตก็ตาม มันสรุปรวมอยู่ที่ สิ่งที่เราเรียกกันว่า ตา หู จมูก ลิ้น กาย ใจ.
จากหนังสือความลับของชีวิต โดยพุทธทาสอินทปัญโญ
-
@ 7459d333:f207289b
2025-06-02 18:33:26Here's a cool way to do OCR of any area of your screen and copy the result directly to you clipboard:
shell import png:- | tesseract stdin stdout | xclip -i -selection clipboard
You need
tesseract
andimagemagick
. This works on systems using the X windows system. There's another way to do it in Wayland.https://stacker.news/items/995413
-
@ b8a9df82:6ab5cbbd
2025-06-02 18:31:55How open-source won in fiat land.
Completely lost in time, I finally landed back in Berlin after a month in Buenos Aires and a week in Las Vegas that felt like an entire lifetime compressed into a few days.
A year ago, I barely knew how to spell NOSTR, didn’t have a Lightning wallet, and had only vaguely heard of Bitcoin. I had no idea what this movement was about — what it could mean, or where it might take me. Fast forward to now: I found myself in Las Vegas, at the biggest Bitcoin conference in the world, surrounded by thousands of people.
For those who haven’t been yes, Vegas is exactly like in the movies. It is Disneylands for adults. Casinos pumping cold air at 4 am to keep you awake, fake skies, fake rivers, fake cities. You walk from one hotel to another and somehow land in a version of Rome, Paris or Venice. It’s bizarre and overwhelming and… kind of amazing in its own twisted way. Who are we humans to build a neon wonderland in the middle of a desert?
And yet, even there, in peak fiat land, there I was: in a casino lounge at 4 in the morning onboarding random people to Nostr with the entire team.
But let’s rewind — how did I even end up here?
After a slightly rocky start Derek and I began the year with a mission: to bring Nostr to Las Vegas. A booth? Way too expensive. So we tried something else — applying for a grant from the Human Rights Foundation. Because the Oslo Freedom Forum was happening at the same time, HRF decided to support six fellow Nostriches and gave us the green light to build something different: the Nostr Lounge.
To the entire HRF team: thank you. Thank you for trusting us, for believing in the vision, and for playing such a crucial role in making this happen. Located in Open Source area far from the main exhibition hall, away from the noise and flashing lights we were not sure if anyone even come?
But the space turned out to be perfect — cosy, carpeted, warm. A real contrast to the intense chaos of the main hall. It gave us space to breathe, to onboard, to connect.And of course the plebs did come. And the energy? Unreal. People were genuinely curious, eager to learn, and ready to go deep. No suits, no fluff — just people who care.
Of course, there were suitcoiners too — and yes, I’ve written about them before, especially after my experience at Bitcoin investment Week in New York (if you missed it, I wrote about that here earlier this year — and Vegas brought a strange kind of déjà vu).
This was — and is — a team effort. It wouldn’t have happened without the incredible crew of volunteers who came from all corners of the world. Developers, builders, creators, idealists. People who understand what freedom of speech really means. Agustin, Mike, Sleepy, Erik and so many more. And even those who weren’t physically with us — following along on Nostr, sending support from afar — you were just as much a part of it.
For me personally, it meant everything to finally meet so many beautiful humans in real life. Especially the women: Roya, Heather, Valerie, Bri, Efrat… you give me strength and hope. It reminded me why I’m here — why we’re all here. There is a better world worth fighting for, and this community helps me believe in it.
The Nostr Lounge was for the plebs — and so was our side event at We All Scream. Away from the overpriced conference afterparties, NosVegas was a wild, joyful celebration. Sponsored by Tunestr and The Space, it was the perfect mix of education and dance floor madness. The vibes were lit. The artists such as Sara Jade, Ainsley Costello on fire.
If there’s one thing I would change? I wish we’d had more stage time. As Derek said in the only fireside chat: "Every Bitcoiner should be on Nostr." If we have an entire lounge dedicated to it, let’s really go for it. Because people do care. They do love it. Oh — and while we're dreaming — maybe one day the WiFi gods will finally smile on us.
One more highlight: The 2nd Annual Bitcoin Golf Championship and Kickoff Party. Frieda, the organiser, gave us a tiny table with Nostr banners. We used it to onboard and chat — and of course, it became the busiest little corner of the event.
All in all, I feel deeply grateful — and also completely behind on processing it all. A full recap will follow soon from Derek (bless him), but this was my personal take, straight from the heart.
And if I forgot to mention anyone by name — I’m truly sorry. So many of you made this experience what it was, and I carry that with me.
And one thing I’m especially thankful for — having someone by my side through all this. Someone who grounds me, who gets it, who quietly keeps me steady while the world spins fast. You know who you are.
Next stop: Prague
-
@ 06639a38:655f8f71
2025-06-02 18:23:34You might notice the styling of this site has changed. That's because I've made a custom Drupal theme using TailwindCSS and daisyUI. For these CSS frameworks / components I've also seperate Drupal theme everyone could use:
https://www.drupal.org/project/tailwind_css
https://www.drupal.org/project/daisy_uiWhat else?
- Wrote my third OpenSats progress report, read it here
- Added Nostr-PHP RelayListMetadata class (NIP-65) and tests, see PR
- Added Nostr-PHP PersistentConnection class and tests, see PR
-
@ 14ca97ca:3f363b7f
2025-06-02 21:24:34The power of Austrian economics lies not just in providing answers, but in asking the right questions. By offering a coherent framework for analyzing human action and social phenomena, Austrian economics transforms complex social science problems into tractable questions. One such problem is the Hobbesian myth of the state of nature, where life is described as "solitary, poor, nasty, brutish, and short." By applying the Austrian method, we can gain new insights into this classic dilemma and reformulate it in a way that highlights the economic underpinnings of security and conflict.
The Relevance of Austrian Economics
Austrian economics is unique in its focus on human action, subjective value, and the role of entrepreneurship in market processes. Unlike other schools of thought, Austrian economics does not rely on mathematical models or statistical analysis. Instead, it uses logical deduction and praxeology—the science of human action—to understand economic phenomena. This approach makes Austrian economics particularly suited for analyzing complex social issues, such as the state of nature, because it provides a clear and consistent framework for thinking about human behavior and social interactions.
Key Principles of the Austrian Method
Methodological Individualism: Austrian economics starts with the individual and their actions. All social phenomena are ultimately the result of individual choices and interactions.
Subjective Value Theory: Value is subjective and determined by the individual. What matters is not the objective characteristics of a good or service, but how an individual subjectively values it.
Marginal Utility: The utility of a good or service is determined by its marginal, not total, use. People make decisions based on the additional benefit they expect to gain from a specific action.
Time Preference: Individuals have a time preference, which means they value goods and services available now more than those available in the future. This preference drives savings, investment, and interest rates.
Entrepreneurship and Discovery:
Entrepreneurs play a crucial role in the market process by discovering and exploiting opportunities for profit. They drive innovation and adapt to changing circumstances.
Process and Change: Markets are dynamic processes, not static equilibria. Change is constant, and the market is always in a state of flux, adapting to new information and circumstances.
Applying the Austrian Method to the Hobbesian Myth
Now, let's apply these principles to the Hobbesian state of nature and identify the economic problems, actors, needs, and potential goods:
Actors:
Individuals: Self-interested agents seeking to secure their lives, liberties, and properties. Potential Security Providers: Entrepreneurs who can offer security services, such as protection agencies or private militias.
Needs:
Security: The primary need is for security, which includes protection from violence, theft, and other harms. Order: Individuals also need a degree of order and predictability in their interactions to engage in productive activities.
Economic Goods:
Security Services: These can include protection, surveillance, dispute resolution, and enforcement of agreements. Security services are subjectively valued by individuals who seek to avoid the risks and costs associated with insecurity. Information: Accurate and timely information about threats and opportunities is a valuable good. Entrepreneurs can provide this by gathering and selling intelligence.
Conclusion:
In this analysis, we have demonstrated how the Austrian economic method can be applied to a classic social science problem: the Hobbesian state of nature. By identifying the actors, their needs, and the economic goods that can be provided, we have outlined the economic underpinnings of security and conflict in a stateless society. The power of the Austrian method lies in its ability to break down complex social issues into manageable components and analyze them using a consistent, logical framework. This approach encourages critical thinking and helps individuals arrive at their own conclusions, rather than relying on the pre-existing ideas of others. Whether the Hobbesian myth is true or false, the real value lies in learning how to think about these problems in a structured and coherent manner. So, the next time you encounter a wicked problem, remember that the Austrian method can be a valuable tool in your analytical toolkit
-
@ 06639a38:655f8f71
2025-06-02 18:20:031) How did you spend your time?
I continued to write and publish more detailed weekly updates here: https://nostrver.se/blog. These updates are also cross-posted via Nostr as long-form content.
All commits on the main branch from 01-03-2025 till 30-04-2025: https://github.com/nostrver-se/nostr-php/commits/main/?since=2025-03-01&until=2025-04-30
NIP-19 bech32-encoded entities
This has been implemented in the library, see https://github.com/nostrver-se/nostr-php/pull/68
Added getTag method to the Event class
https://github.com/nostrver-se/nostr-php/commit/5afa38a45d3371bf79c78cda4d93be3ecef86985
Added a profile class to fetch profile metadata of a given pubkey
https://github.com/nostrver-se/nostr-php/commit/0e6cbbb80b08b2b38722d4cef68205c64b70b205
Drupal nJump module which implements Nostr-PHP
This Drupal module which is providing these Nostr features is FOSS and uses the Nostr-PHP library for doing the following:
- Request the event from one or more relays
- Decode the provided NIP-19 identifier
For now this module is way for me to utilize the Nostr-PHP library with Drupal for fetching events.
Any event and a NIP-19 identifier can now be fetched with the following URL pattern:
https://nostrver.se/e/{event_id|nevent1|note1|addr1}
As an example, take this URL https://nostrver.se/e/nevent1qvzqqqqqqypzqmjxss3dld622uu8q25gywum9qtg4w4cv4064jmg20xsac2aam5nqqsqm2lz4ru6wlydzpulgs8m60ylp4vufwsg55whlqgua6a93vp2y4g3uu9lr fetches the data from one or more relays. This data is then being saved as a (Drupal) node entity (in a database on the server where this website is hosted, which is located in my tiny office). With this saved node, this data is now also available at https://nostrver.se/e/0dabe2a8f9a77c8d1079f440fbd3c9f0d59c4ba08a51d7f811ceeba58b02a255/1 where the (cached) data is server from the database instead. It's just raw data for now, nothing special about it (yet).
Contributions to the library
- NIP-04 + NIP-44
https://github.com/nostrver-se/nostr-php/pull/84
https://github.com/nostrver-se/nostr-php/pull/88 - NIP-05 internet identifier lookup
https://github.com/nostrver-se/nostr-php/pull/89 - Allow verification of Event objects
https://github.com/nostrver-se/nostr-php/pull/86 - Work in progress: NIP-17 direct messages
https://github.com/nostrver-se/nostr-php/pull/90
All these contributions are made by Djuri who is working on the Nostr integration in https://satsback.com and on a private messaging browser client https://n17.chat.
Removed the CLI tool from the library
See https://github.com/nostrver-se/nostr-php/pull/93
New / updated documentation at nostr-php.dev
I started to explore what is possible generating documentation using Goose as an AI agent and Claude as the LLM provider. Bootstrapping new pages with documentation works very well while I point to several resources to be used as input for the LLM (using the example snippets in the Nostr-PHP library and the Nostr NIP repository).
All commits on the master branch from 01-03-2025 till 30-04-2025: https://github.com/nostrver-se/nostr-php.dev/commits/master?since=2025-03-01&until=2025-04-30- Updated the page how to handle tags on a event, see https://nostr-php.dev/guides/manage-tags-on-an-event#getting-specific-tags
- Added a instructions to try out the library online at https://nostr-php.dev/guides/get-started
- Work in progress, NIP-19 documentation: https://github.com/nostrver-se/nostr-php.dev/tree/feat/nip19docs and https://nostr-php.dev/guides/nip19
Some analytics
Source: https://packagist.org/packages/swentel/nostr-php/stats
Other Nostr stuff I would to mention I worked on
NIP-B0 web bookmarks with CCNS.news
I moved https://ccns.nostrver.se to a own domain https://ccns.news and has integrated NIP-B0 which we worked out how to handle web bookmarks via Nostr. Before this NIP was merged, there were already some other Nostr clients handling web bookmarks:
Also Fiatjaf started to work on an annotation noting tool (browser extension) called Lantern (which is a fork of https://hypothes.is) integrating Nostr for creating highlights and annotations on a webpage with text. This extension can also be used to bookmark web pages.
On CCNS.news there is a global feed now: https://ccns.news/global which fetches all the web bookmark events with kind
39701
from several public Nostr relays. I had a rough idea to compare feeds generated with NDK and Nostr-PHP (for both using the same set of relays):When you post a bookmark now on the site, a kind
39701
event is transmitted to some Nostr relays (take a look at this event for example). Optionally you can also publish this content as a note to the network.2) What do you plan to work on next quarter?
- Already work in progress:
- Review and merge PR with NIP-17
https://github.com/nostrver-se/nostr-php/pull/90 - Implement NIP-65 with RelayListMetadata class
https://github.com/nostrver-se/nostr-php/pull/100 - Implement DMRelayList class
https://github.com/nostrver-se/nostr-php/blob/main/src/Event/List/DmRelaysList.php - Review and implements extra metadata fields for profile
- https://github.com/nostrver-se/nostr-php/pull/94
- Implement PersistantConnection class
https://github.com/nostrver-se/nostr-php/pull/99 - Review and merge PR NIP-13 proof of work
https://github.com/nostrver-se/nostr-php/pull/97 - Review and merge PR for implementing methods (TODO's) on Relay and RelaySet class
https://github.com/nostrver-se/nostr-php/pull/95
- Review and merge PR with NIP-17
- Planned:
- Research how the revolt/event-loop package can be used to serve as a sort of a message bus for handling async and concurrent requests in the library
- Build a stable 2.0.x release
- By default and full async concurrent requests support
- Add / update documentation on https://nostr-php.dev:
- Direct messages with NIP-04 and NIP-17
- Encrypted payloads with NIP-44
- Instructions how to bootstrap a Nostr profile with a given pubkey
- Host the https://nostr-php.dev website as a static website using Blossom.
See https://github.com/lez/nsite and https://github.com/hzrd149/nsite-ts
3) How did you make use of the money?
- Livings costs
4) Is there anything we could help with?
I would love to see a (closed/private) digital place with other Nostr OpenSats grantees where we can share our experiences and challenges. We could give feedback to each other as a form of encouragement. For example I'm curious how other grantees are explaining the work they to other which are not familiar with FOSS, Nostr and/or Bitcoin.
-
@ 3b7fc823:e194354f
2025-02-10 17:34:18Dealing with law enforcement can be a challenging and stressful experience. However, understanding your rights and knowing how to navigate such situations can empower you to protect yourself. Here’s a structured approach to handle these interactions effectively:
- Stay Calm and Compliant:
-
When approached by law enforcement, remain calm and avoid sudden movements. Slowly raise your hands and identify yourself if possible.
-
Ask for Identification:
-
Request the officer's name, badge number, and station. This documentation can be crucial later on.
-
Know Your Miranda Rights:
-
Upon arrest, you have the right to remain silent. Do not answer questions without consulting a lawyer. If Mirandized, exercise your right to remain silent.
-
Refuse Incriminating Statements:
-
Avoid answering questions that could incriminate yourself. Politely state, "I will not answer any questions at this time."
-
Document the Incident:
-
Use your phone or notebook to record details such as dates, times, and descriptions of interactions. Note any injuries or mistreatment.
-
Seek Legal Advice:
-
After the encounter, contact a lawyer. They can review evidence and provide guidance on how to proceed.
-
Understand Search and Seizure Laws:
-
Officers generally need a warrant to search your property unless there's probable cause. If stopped without a warrant, calmly refuse entry.
-
Use a Body Camera Policy:
-
If applicable, ask for the officer's body camera footage and request it via formal complaint if refused.
-
Know When to Comply:
-
Comply with instructions that do not infringe on your rights, such as providing identification when legally required.
-
Consider a Witness Statement:
- If you witness illegal actions, consider reporting them. Your role as a bystander may be crucial in documenting incidents.
-
Seek Emotional Support:
- Interactions with law enforcement can be traumatic. Reach out to support groups or mental health resources for assistance.
-
Understand Legal Recourse:
- If rights are violated, consult legal aid societies or civil rights organizations for guidance on filing complaints or seeking redress.
Conclusion: Understanding your rights and documenting interactions is essential when dealing with law enforcement. This guide provides a framework to help you navigate such situations confidently and protect your rights effectively. Remember, knowledge is power, and being informed can lead to better outcomes in challenging circumstances.
Advocating for privacy does not finance itself. If you enjoyed this article, please consider zapping or sending monero
82XCDNK1Js8TethhpGLFPbVyKe25DxMUePad1rUn9z7V6QdCzxHEE7varvVh1VUidUhHVSA4atNU2BTpSNJLC1BqSvDajw1
-
@ 3b7fc823:e194354f
2025-02-10 13:13:25Alright, let’s get one thing straight: you’re scrolling through your phone, shopping online, maybe even working from home. But here’s the thing – someone might be watching. Not in the creepy stalker way, but in the “is that company really needing my data?” kind of way. That’s where a Virtual Private Network (VPN) comes in, saving you from the prying eyes of marketers, governments, and even your own internet provider.
What Does a VPN Do?
A VPN creates a secure, encrypted connection between your device and a VPN server. This allows you to browse the internet anonymously, keeping your online activities private from your Internet Service Provider (ISP), network administrators, and even hackers. When you connect to a VPN, your internet traffic is routed through an intermediary server, making it difficult for anyone to track your online movements.
Why You Need a VPN: Privacy edition
- Hiding Your IP Address
Every time you jump online, your device gets an IP address, like a digital ID. If you don’t use a VPN, everyone can see this ID, making it easy for advertisers and governments to track your every move.
-
[X ] Myth: A VPN hides my IP address from everyone.
-
[X] Reality: A VPN hides your IP address only from the websites you visit and your ISP. Your internet service provider still knows you're using a VPN, but they won't be able to see what sites you're visiting. Your VPN knows what sites you are visiting and may know who you are as well.
-
Bypassing Censorship
Ever tried accessing something that’s blocked in your country? A VPN can help you bypass those restrictions, letting you watch the latest shows, access social media, or even download books without getting flagged as a troublemaker.
- Protecting Your Data
When you connect to public Wi-Fi – like at a café or airport – you’re basically handing over your data on a silver platter. A VPN encrypts this data, so even if someone intercepts it, they can’t decode it. Think of it as adding an extra layer of security.
- Avoiding Surveillance
Companies and governments love collecting data. From what you search to who you talk to, there’s a lot of stuff that’s none of their business. A VPN ensures that only you know where you’ve been online.
- Safeguarding Your Personal and Professional Life
Whether you’re working from home or just shopping for a present, a VPN keeps your activities private. It’s like having a secure safe for all your online stuff, so no one can snoop.
- Stopping Targeted Ads
Companies track your browsing habits to send you ads that follow you around the internet. A VPN breaks this cycle, making sure those creepy “you might like” ads stop following you around.
- No Logs Policy
Some VPNs keep records of your activity, which means they could be handed over if the government comes knocking. But with a no-logs policy, nothing is stored – they promise ;)
- The Dark Side of Free VPNs
Before you jump into using a free VPN, think twice. Free services often come with a catch: they might sell your data to advertisers or even track your activity themselves. It’s like getting a free hotdog at a gas station – it sounds great, but you’ll probably regret it later.
How to Use a VPN (Because You’re Not a Tech Wizard)
- Choose the Right Provider
Go for a reputable service that offers strong encryption and a no-logs policy. Look for options with a kill switch, which stops any data from being leaked if the connection drops. I prefer ones you can pay annoymously but that may be overkill for most people.
- Download and Install
Once you pick a provider, download the app to your device. It’s not rocket science, but it does require a bit more than just opening an email.
- Set It Up
Most VPNs have user-friendly interfaces. Just click “Connect” and you’re good to go. You might need to enter your login details or use a password from your provider.
The Final Word Using a VPN isn’t about being a hacker or someone with something to hide. It’s about respecting your privacy and having control over what you share online. In today’s world, where companies and governments are constantly getting more creative about how they collect data, it’s practically a requirement if you want to stay ahead of the curve.
So there you have it – the secret life of your internet. With a VPN, you’re not just protecting yourself; you’re making sure that your digital footprint is as small as possible. Whether you’re at home or on the go, a VPN gives you the freedom to surf, shop, and work without anyone watching your every move.
And hey, if you’re still not convinced, just think about it this way: imagine your internet connection as a crowded public space. Without a VPN, everyone’s staring at you. With one, you’re wearing a mask, and no one’s the wiser.
Advocating for privacy does not finance itself. If you enjoyed this article, please consider zapping or sending monero
82XCDNK1Js8TethhpGLFPbVyKe25DxMUePad1rUn9z7V6QdCzxHEE7varvVh1VUidUhHVSA4atNU2BTpSNJLC1BqSvDajw1
-
@ 3b7fc823:e194354f
2025-02-09 15:14:10As someone who takes privacy seriously, I'm always on the lookout for innovative solutions that can help individuals protect their digital lives. One such solution is Tails OS, a Linux-based operating system that's specifically designed for privacy and security.
What is Tails OS?
Tails OS, short for The Amnesic Incognito Live System, is a Debian-based Linux distribution that offers a high level of anonymity and privacy. Developed by the Tails Project, this operating system is designed to preserve your online anonymity and protect your digital identity. Tails OS is a "live" distribution, meaning you can boot it from a USB drive or CD/DVD without installing it on your computer. This makes it an ideal solution for those who need to maintain their privacy while working in public spaces or using public computers.
Why Use Tails OS for Privacy?
Tails OS offers several features that make it an excellent choice for those seeking to protect their online privacy:
- Anonymity: Tails OS uses the Tor network to route your internet traffic through a series of nodes, making it difficult for anyone to trace your online activities back to your physical location.
- Encryption: Tails OS comes with built-in encryption tools, such as GnuPG and OpenSSL, to protect your sensitive data.
- Secure Boot: Tails OS uses a secure boot process to ensure that your system is free from malware and other threats.
- No Persistence: Tails OS is designed to leave no trace on your computer, meaning that any data you create or access while using the operating system will be deleted when you shut down.
Getting Started with Tails OS
Now that you know why Tails OS is an excellent choice for privacy protection, let's dive into the step-by-step guide on how to use it:
Step 1: Download and Create a Tails USB Drive
Visit the Tails website and download the latest version of Tails OS. Follow the instructions to create a bootable USB drive.
Step 2: Boot Tails OS
Insert the USB drive into your computer and restart it. Enter the BIOS settings (usually by pressing F2, F12, or Del) and set the USB drive as the first boot device. Save the changes and exit the BIOS settings. Your computer will now boot from the Tails USB drive.
Step 3: Security implications of setting up an administration password For better security, no administration password is set up by default. When you set up an administration password, an attacker who can get physical access to your computer while Tails is running could be able to break your security
Step 4: Configure Tails OS
Tails OS comes with a pre-configured Tor network, which is enabled by default. You can also configure other settings, such as the keyboard layout and language, from the "Settings" menu.
Step 5: Use Tails OS for Private Activities
Now that you're logged in and configured, you can use Tails OS for private activities, such as:
- Browsing the internet anonymously using Tor
- Sending and receiving encrypted emails using GnuPG
- Creating and editing documents using LibreOffice
- Chatting with friends and family using Pidgin
- Setup Persistent Storage for files
Emergency shutdown To trigger an emergency shutdown, unplug the USB stick from which Tails is running. Doing so might be faster than shutting down from the system menu.
NOTE: You risk breaking your Persistent Storage and losing data when you unplug your USB stick while Tails is running.
Conclusion
Tails OS is an excellent tool for anyone seeking to protect their online privacy. With its built-in anonymity features, encryption tools, and secure boot process, Tails OS provides a high level of protection for your digital identity. By following the step-by-step guide outlined above, you can start using Tails OS for private activities and take control of your digital life.
Remember, privacy is a fundamental human right, and it's essential to take steps to protect it. Tails OS is an excellent tool for anyone looking to maintain their online anonymity and protect their digital identity.
Advocating for privacy does not finance itself. If you enjoyed this article, please consider zapping or sending monero
82XCDNK1Js8TethhpGLFPbVyKe25DxMUePad1rUn9z7V6QdCzxHEE7varvVh1VUidUhHVSA4atNU2BTpSNJLC1BqSvDajw1
-
@ a5142938:0ef19da3
2025-06-02 21:02:55Saling is a German brand that creates clothing, household linen and soft toys in virgin wool and organic cotton for babies and children, as well as natural cosmetics based on sheep’s milk.
Natural materials used in products
⚠️ Warning: some products from this brand contain non-natural materials, including:
Categories of products offered
This brand offers products made entirely from natural materials in the following categories:
Clothing - Clothing fits : babies - Head & handwear : mittens
Footwear - Footwear fits : baby shoes - Shoe accessories : insoles - Slippers : booties
Home - Linen : blankets, sleeping bags
Accessories - Games and toys : comforters-stuff animals
Raw materials - Sewing and knitting : knitting wool
Other information
- Made in Germany
- Made in Europe
👉 Learn more on the brand website
Where to find their products?
- Lilinappy (in French, shipping area: France and international)
- Le mouton à lunettes (in French, shipping area: France, Belgium, Luxemburg)
This article is published on origin-nature.com 🌐 Voir cet article en français
📝 You can contribute to this entry by suggesting edits in comments.
🗣️ Do you use this brand's products? Share your opinion in the comments.
⚡ Happy to have found this information? Support the project by making a donation to thank the contributors.
-
@ d9a329af:bef580d7
2025-06-02 18:03:35Originally made using Habla News, now edited and republished using Yakihonne
To be clear, this is 100% my subjective opinion on the alternatives to popular music, as it has become practically a formula of witchcraft, pseudoscience and mysticism. There is nothing you can do to get me to listen to Western pop music from the late 2010's to now. I could certainly listen to almost anything... just not modern pop, which is now completely backwards.
Most examples of compositions for these genres will be my own, unless otherwise stated. The genres on this list are in no particular order, though my favorite of which will be first:
- Bossa Nova
Bossa Nova is a subgenre of jazz from Brazil, created in the 1950's as a mix of standard jazz and samba rhythms in a more gentle and relaxing manner. This genre's most famous songs are Tom Jobim's The Girl from Ipanema (found in albums like Getz/Gilberto), Wave, and even Triste. Most of the music is written in 2/4 time signature, and any key is almost acceptable. It's called Afro-Brazilian Jazz for a reason after all. I have a ton of compositions I produced, from Forget and Regret, to Rabbit Theory, Beaches of Gensokyo Past, Waveside, and even Willows of Ice to name a few of them.
- Metal
This is an umbrella term for many subgenres of this fork of hard rock, with more distorted guitars, speedy and technical writing, vocals that sound demonic (some subgenres don't have that), or sometimes, chaotic lyrics and downright nasty ones if you look deep enough. If you want to get into it, just make sure it's not Black Metal (it's weird), Blackened Metal (Any subgenre of metal that's been inserted with elements of Black Metal), Metalcore, or any other genre that has vocals that aren't the best to hear (these are vocal fries that are really good if you're into the weird demonic sounds). This isn't for the faint of heart. Instrumental metal is good though, and an example is my composition from Touhou Igousaken called A Sly Foxy Liar if you want to know what techincal groove metal is like at a glance.
- Touhou-style
I can attest to this one, as I produced bossa nova with a Touhou-like writing style. Touhou Project is a series of action video games created by one guy (Jun'ya Outa, a.k.a. ZUN), and are usually bullet curtain games in the main franchise, with some official spinoffs that are also action games (fighting games like Touhou 12.3 ~ Hisoutensoku). What I'm referring to here is music written by ZUN himself (He does almost everything for Touhou Project, and he's really good at it), or fans that write to his style with their own flair. I did this once with my composition, Toiled Bubble, which is from my self-titled EP. I probably wouldn't do much with it to be fair, and stick to bossa nova (my main genre if you couldn't tell).
- Hip-Hop/Rap
This can get subjective here, but old-school rap and hip-hop... give me more of it. Before it became corrupted with all kinds of immoral things, hip-hop and rap were actually very good for their time. These were new, innovative and creative with how lyrics were written. Nowadays, while we're talking about cars, unspeakable acts, money, and just being dirtbags. Artists in this genre back then were much classier than that. I fit in the latter category with my pieces entitled, Don't Think, Just Roast (the piece where I called out antis of a popular corporate Vtuber agency) and Desparate Yokai. It didn't get much traction on YouTube, because I'm not a well-known artist (I'm considered a nobody in the grand scheme of things. I'd like to get it fixed, but I don't want a record deal... I'd have to become a Pharisee, Cathoic, Jesuit or Wahhabi Muslim for a record deal... in other words, I need to revere and obey the Pope (the Mark of the Beast).
- Synthwave
This is a genre of electronic music focused on 80's and 90's synths being used to carry a composition. Nowadays, we have plugins like Vital, Serum, Surge and others to create sounds we would otherwise be hearing on an 80's or 90's keyboard. An example of this is my composition, Wrenched Torque, which was composed for a promotion I did with RAES when he released his Vital synth pack.
- Happy Hardcore
A 90's genre of EDM, specifically Hardcore, it's stylized with 80's and 90's synths, 90's drum machines and even vocals of music from back in the day (rap and disco I think were sampled the most). Artists like Chinese artist Xi (not Xi Jinping for those misunderstanding), European DJ Nakatomi and the like have produced some fine pieces of work. You'd find this primarily in Germany, The Netherlands and probably Belgium as well. If you want to hear some Happy Hardcore from me, The VST Test is the album to look for.
More are to come in future installments of this series, and I will adjust the title of this one accordingly if y'all have any ideas of genres I should look into (with the exception of Happy Hardcore, which is in the Yakihonne release of this article).
-
@ 28e13303:84bb7266
2025-06-02 21:02:25Looking to simulate a USDT deposit that appears instantly in a wallet — with no blockchain confirmation, no real spend, and no trace?
You’re in the right place.
🔗 Buy Flash USDT Now This product sends Flash USDT directly to your TRC20, ERC20, or BEP20 wallet address — appears like a real deposit, but disappears after a set time or block depth.
✅ Perfect for: Simulating token inflows Wallet stress testing “Proof of funds” display Flash USDT is ideal for developers, trainers, UI testers, and blockchain researchers — and it’s fully customizable.
🧠 What Is Flash USDT? Flash USDT is a synthetic transaction that mimics a real Tether transfer. It shows up instantly in a wallet balance, and it’s confirmed on-chain — and expires after a set duration.
This makes it:
Visible on wallet interfaces Time-limited (auto-disappears cleanly) Undetectable on block explorers after expiry It’s the smartest, safest way to simulate high-value transactions without real crypto.
🛠️ Flash USDT Software – Your Own USDT Flasher at Your Fingertips Want to control the flash? Run your own operations? Flash unlimited wallets?
🔗 Buy Flash USDT Software
This is your all-in-one USDT flasher tool, built for TRC20, ERC20, and BEP20 chains. It gives you full control to:
Send custom USDT amounts Set custom expiry time (e.g., 30–360 days) Flash multiple wallets Choose between networks (Tron, ETH, BSC) You can simulate any amount, to any supported wallet, from your own system.
No third-party access. No blockchain fee. No trace left behind.
💥 Why Our Flash USDT & Software Stands Out Feature Flash USDT Flash USDT Software One-time flash send ✅ Yes Optional Full sender control ❌ No ✅ Yes TRC20 / ERC20 / BEP20 ✅ Yes ✅ Yes Custom duration/expiry Limited ✅ Yes Unlimited usage ❌ One-off ✅ Yes Whether you’re flashing for wallet testing, demoing investor dashboards, or simulating balance flows, our tools deliver realism without risk.
🛒 Ready to Buy Flash USDT or the Software? Skip the wait. Skip the scammers. You’re one click away from real control.
👉 Buy Flash USDT 👉 Buy Flash USDT Software
📞 Support or live walkthrough?
💬 Telegram: @cryptoflashingtool 📱 WhatsApp: +1 770-666-2531
🚫 Legal Notice These tools are intended for:
Educational purposes Demo environments Wallet and UI testing They are not for illegal use or financial deception. Any misuse is your full responsibility.
Final Call: Need to flash USDT? Want full control? Don’t wait for another “maybe” tool.
Get your Flash USDT or Flashing Software today and simulate like a pro.
🔗 Buy Now → Flash USDT 🔗 Buy Now → Flash USDT Software 💬 Telegram: @cryptoflashingtool 📱 WhatsApp: +1 770-666-2531Looking to simulate a USDT deposit that appears instantly in a wallet — with no blockchain confirmation, no real spend, and no trace?
You’re in the right place.
Buy Flash USDT Now\ This product sends Flash USDT directly to your TRC20, ERC20, or BEP20 wallet address — appears like a real deposit, but disappears after a set time or block depth.
Perfect for:
- Simulating token inflows
- Wallet stress testing
- “Proof of funds” display
Flash USDT is ideal for developers, trainers, UI testers, and blockchain researchers — and it’s fully customizable.
What Is Flash USDT?
Flash USDT is a synthetic transaction that mimics a real Tether transfer. It shows up instantly in a wallet balance, and it’s confirmed on-chain — and expires after a set duration.
This makes it:
- Visible on wallet interfaces
- Time-limited (auto-disappears cleanly)
- Undetectable on block explorers after expiry
It’s the smartest, safest way to simulate high-value transactions without real crypto.
Flash USDT Software – Your Own USDT Flasher at Your Fingertips
Want to control the flash?\ Run your own operations?\ Flash unlimited wallets?
This is your all-in-one USDT flasher tool, built for TRC20, ERC20, and BEP20 chains. It gives you full control to:
- Send custom USDT amounts
- Set custom expiry time (e.g., 30–360 days)
- Flash multiple wallets
- Choose between networks (Tron, ETH, BSC)
You can simulate any amount, to any supported wallet, from your own system.
No third-party access.\ No blockchain fee.\ No trace left behind.
Why Our Flash USDT & Software Stands Out
Feature
Flash USDT
Flash USDT Software
One-time flash send
Yes
Optional
Full sender control
No
Yes
TRC20 / ERC20 / BEP20
Yes
Yes
Custom duration/expiry
Limited
Yes
Unlimited usage
One-off
Yes
Whether you’re flashing for wallet testing, demoing investor dashboards, or simulating balance flows, our tools deliver realism without risk.
Ready to Buy Flash USDT or the Software?
Skip the wait. Skip the scammers.\ You’re one click away from real control.
Support or live walkthrough?
Telegram: @cryptoflashingtool
WhatsApp: +1 770-666-2531
Legal Notice
These tools are intended for:
- Educational purposes
- Demo environments
- Wallet and UI testing
They are not for illegal use or financial deception. Any misuse is your full responsibility.
Final Call:
Need to flash USDT? Want full control?\ Don’t wait for another “maybe” tool.
Get your Flash USDT or Flashing Software today and simulate like a pro.
Telegram: @cryptoflashingtool
WhatsApp: +1 770-666-2531
-
@ 3b7fc823:e194354f
2025-02-07 18:42:31Privacy in Public Spaces: A Tactical Guide
1. Public Wi-Fi Privacy
Using public Wi-Fi can be convenient, but it's important to take precautions to protect your privacy:
- Use a VPN (Virtual Private Network): A VPN encrypts your internet traffic, making it difficult for hackers to intercept your data.
- Disable Automatic Connections: Prevent your device from automatically connecting to open Wi-Fi networks by turning off this feature in your settings.
- Avoid Sensitive Transactions: Refrain from accessing banking or other sensitive accounts while connected to public Wi-Fi.
- Use Secure Websites: Look for "https://" in the website's URL to ensure it uses encryption.
- Keep Software Updated: Ensure your device's operating system and apps are up-to-date to protect against security vulnerabilities.
2. Surveillance Camera Awareness
Surveillance cameras are common in public spaces. Here are some strategies to maintain your privacy:
- Spotting Cameras:
- Look for Signs: Many establishments post signs indicating the presence of surveillance cameras.
- Camera Placement: Cameras are often placed near entrances, exits, and high-traffic areas. Look for dome-shaped cameras on ceilings or wall-mounted cameras.
- Using Masks and Coverings:
- Face Masks: Wearing a mask can help obscure your facial features from facial recognition systems.
- Hats and Sunglasses: A hat can shield your face from overhead cameras, while sunglasses can hide your eyes.
- Covering Identifying Marks:
- Clothing Choices: Wear clothing that doesn't have distinctive logos or patterns that can easily identify you.
- Blend In: Opt for styles and clothing choices that helps you blend in with your surroundings, reducing your visibility.
- Temporary Coverings: Consider using temporary coverings, such as scarves or hoods, to conceal tattoos or other identifying marks.
3. General Privacy Tips in Public Spaces
- Be Mindful of Your Surroundings: Pay attention to your environment and be aware of any unusual behavior or devices that may be capturing your information.
- Limit Personal Information: Avoid discussing sensitive information in public where it can be overheard.
- Use Encrypted Messaging Apps: Apps like Signal or SimpleX offer end-to-end encryption for your messages, making it harder for eavesdroppers to intercept your conversations.
- Use Privacy Screens: Privacy screens on all of you electronic screens can defend against the over the shoulder peek or side eye.
- Avoiding Behaviors: Be mindful of behaviors that could make you a target, such as frequent visits to certain areas or engaging in conversations that might attract unwanted attention.
Taking these steps can help you maintain your privacy while navigating public spaces and using public Wi-Fi. Remember, staying informed and vigilant is key to protecting your personal information.
Advocating for privacy does not finance itself. If you enjoyed this article, please consider zapping or sending monero
82XCDNK1Js8TethhpGLFPbVyKe25DxMUePad1rUn9z7V6QdCzxHEE7varvVh1VUidUhHVSA4atNU2BTpSNJLC1BqSvDajw1
-
@ d9a329af:bef580d7
2025-06-02 17:53:32Originally made using Habla News, now edited and reposted to Yakihonne
Since 2022, Dungeons and Dragons has been going down a sort of death spiral after the release of a revised version of 5th Edition... which didn't turn out very well to say the least. In light of that, I present a list of TTRPGs you can play if you don't want to purchase 5E. I wouldn't recommend 5E, as I've DM'd it in the past. It tastes like a lollipop that's cockroach and larvae flavored.
This list of TTRPG games is in no particular order, though my favorite of these systems is number one.
- Basic Fantasy Role-Playing Game (BFRPG)
- B/X-style OSR retroclone with ascending armor class, and the original retroclone from 2006.
- Fully libre under CC BY-SA for the 4th Edition, and OGL 1.0a for 1-3 Editions.
- Full books are free PDF files on the website (Basic Fantasy Website).
- All BFRPG editions are compatible with each other, meaning you can have a 3rd Edition book to a 4th Edition game and still have fun. 4th Edition is just the removal of the 3E SRD that's in the OGL editions.
- As with the core rulebooks, all the supplementation is free as a PDF as well, though you can buy physical books at cost (BFRPG principal rights holder Chris Gonnerman doesn't make much profit from Basic Fantasy).
- Old-school community that's an all-around fantastic group of players, authors and enthusiasts.
-
Fun Fact: Out of all the TTRPGs I'd want to DM/GM the most, it'd be this one by far.
-
Iron Falcon (IF)
- OD&D-style retroclone from 2015 (It's also by Gonnerman, same guy behind BFRPG).
- A close ruleset to the White Box rules and supplements.
- Also fully libre under CC BY-SA for the latest releases, just like BFRPG for 4th Edition releases.
- Just like BFRPG, the core rules and supplementation come as PDF files for free, or physical books.
-
Fast and loose ruleset open to interpretation, just like in 1975-1981... somewhere right around that timeline for OD&D.
-
Old-School Reference and Index Compendium (OSRIC)
- AD&D 1E-based retroclone by Stewart Marshall and Matt Finch.
- An old system that surprisingly still holds up, even after a long time of no new versions of the rules.
- Extremely in-depth ruleset, licensed under OGL 1.0a and OSRIC Open License.
- Compatible with AD&D 1e modules for the 1st Edition, though 2.2 potentially has its own supplementation.
-
I don't know much about it, as I'd be too slow to learn it. That's all I know, which is the above.
-
Ironsworn
- Custom loosely-based PbtA (Powered by the Apocalypse) system by Shawn Tomkin from 2018.
- Includes GM, GMless and solo play in the rulebook.
- Supplementation is surely something else with one look at the downloads section for the PDFs of the original, which is free under CC BY-NC-SA. The SRD is under CC BY otherwise.
- No original adventures are made for this system as are known, as it's expected that the Ironlands are where they take place.
-
Fun Fact: This was a non-D&D system I considered running as a GM.
-
Advanced Dungeons & Dragons 2nd Edition (AD&D 2e)
- An official edition from 1989-2000.
- At the time, the most customizable edition in its history, before 3E took the spot as the most customizable edition.
- A streamlined revision of the AD&D 1E rules (AD&D 1E was exclusively written by E. Gary Gygax).
- The end of old-school D&D, as 3E and beyond are different games altogether.
- Wide array of supplementation, which oversaturated 2E's customization... and most of it didn't sell well as a result.
- Final TSR-published edition of D&D, as they went bankrupt and out of business during this edition's life cycle, to then be liquidated to Wizards of the Coast (Boy did WOTC mess it up once 5.1E was released).
-
Fun Fact: A Canadian history professor named Dr. Robert Wardough runs a customized ruleset using 2E as a base, which he's been DMing since the 80's during the "Satanic Panic" (The Satanic Panic was fake as a result of horrible deceivers gaslighting people to not play D&D). He started RAW (Rules as Written), but saw some things he needed to change for his games, so he did so over time.
-
Moldvay/Cook Basic/Expert Dungeons & Dragons (B/X)
- Competing system to 1E from 1981 and 1982.
- Official edition of D&D, part of the old-school era.
- Simplified rules for Basic, but some decently complex rules for Expert.
- Only goes up to Lv. 14, as it's potentially a 1E or White Box primer (similar to 1977 Basic).
- Supplementation, from some research done, was decent for the time, and a little bit extensive.
- The inspiration for BFRPG in 2006 (Did I mention this already? Maybe I have, but I might emphasize that here too.).
-
Fun Fact: I considered running B/X, but decided that I'd do BFRPG, as the ascending armor class is easier math than with B/X and the THAC0 armor class (descending armor class).
-
Basic, Expert, Companion, Master, Immortal Dungeons & Dragons (BECMI) and/or Rules Cyclopedia
- 1983 variant of the Moldvay/Cook Basic/Expert system, an official edition and part of the old-school era.
- Essentially, 1981 B/X D&D on steroids.
- 5 boxed sets were released for the five parts of the rules for this system.
- Rules Cyclopedia is a reprint of the 1983 Basic, Expert, Companion and Master rules boxed sets. The Immortal set was never reprinted outside of the original boxed set because Immortal is such a bizarre game within a game altogether.
- With the first 4 boxed sets (whether individual sets or the Rules Cyclopedia), levels are 1-36.
-
Fun Fact: This edition I was considering DMing as well, alongside BFRPG. They're similar rulesets with some mechanical differences, but I think either or would be worth it.
-
Original Dungeons & Dragons (OD&D or White Box)
- The original release of D&D from 1974 written by Gygax and Dave Arneson, published by TSR.
- Uses the rules from Chainmail, a wargame made by Gygax and Jeff Perren.
- Base has three little booklets (Men & Magic, Monsters & Magic, and The Underworld & Wilderness Adventures), five official supplements were released (Greyhawk, Blackmoor, Eldritch Wizardry, Gods, Demi-Gods and Heroes, and Swords & Spells), and many more from fanzines.
- Fast and loose ruleset open to interpretation (similar to IF).
- Not based upon adventurers taking on dangerous quest, but kings commanding armies (which is why OD&D is actually a Chainmail supplement). The latter was the original purpose of D&D before it got changed in 2000.
There are many more games that are not D&D that you can look up too. See what you like, read the rules, learn them, and start playing with your group. Have fun and slay some monsters!
-
@ 3b7fc823:e194354f
2025-02-07 00:39:21Details on how to use a Burner Phone
Mobile phones are needed for communications when out in the world but they are a nightmare for privacy and security as detailed in
especially when it comes to surveillance risks. This is more of a hands on guide for how to mitigate those risks. Burner phones as the name describes is a use and "burn" device either for a single operation or for a longer period if proper precautions are taken. In case you are unaware what I mean by a burner phone; cell phones can be purchased from big box stores, gas stations, and kiosks in cash without a contract. They are usually not very expense and enable you to buy prepaid cards to use for phone and internet service.
Getting a Burner Phone:
- Best to use a store out of town but not mandatory.
- Do not take any electronics with you, especially another phone.
- Park down the street in another parking lot near the store and walk over. Be mindful of security cameras.
- Cover any tattoos or identifying marks. Wear a hat and a medical mask. (Thank you covid)
- Use cash only to buy.
- Leave, do not shop or buy anything else.
Setting up Burner Phone:
- Go somewhere with free public WIFI (Starbucks, Library, whatever)
- Do not take any electronics with you, especially another phone.
- Open package and follow directions to activate using the public WIFI access.
- Choose a random area code during setup.
- Create a new random gmail account. (Do not reuse accounts or names)
- Download and install a VPN, Signal or SimpleX, Firefox Focus Browser, Tor if needed. Delete any other unnecessary apps.
- Change phone settings (see list)
- Turn off and remove battery if able to (becoming harder to find) or put into a Faraday Bag.
- Destroy packaging that came with the phone.
Phone Settings: 1. Turn off hotspot and tethering. Enable Always on VPN and Block Connections without VPN. Set DNS to automatic. 2. Turn off bluetooth and WIFI. 3. Disable all notifications, notification history, notifications on lock screen, and emergency alerts. 4. Turn off all sounds and vibrations. 5. Turn off Find my Device. Setup screen lock with password. (No bio) 6. Toggle everything in privacy: no permissions, turn off microphone, turn off usage and diagnostics, etc 7. Set Use Location to off. 8. Under Languages & Input > Virtual Keyboard > Gboard > Advanced: disable usage statistics, personalizing, and improve voice and typing for everyone.
Using a Burner Phone:
- Never sign into any account associated with your real identity.
- Never use it to contact anyone associated with your real identity.
- Time and distance between burner phone and any other cell phone you own. i.e. A hour has passed and several miles from when you use and had on the other device.
- When not in use the battery is removed or in a Faraday Bag.
- Always use a VPN and always use private search and browser set to delete upon closing (Firefox Focus default).
- Never actually call or text from the phone. You only want to use SimpleX or Signal for communications.
- Do not save anything (files, pictures, history) on the phone, especially if incriminating.
- Do not take it with you or use unless necessary.
- When in doubt, burn it and get another one.
- Never carry over names, accounts, whatever from old burner phone to new burner phone.
Burning a phone:
- Factory reset the device.
- Remove and destroy the SIM card.
- Remove the battery because lithium batteries can explode. (may have to take it apart)
- Smash internals.
- Burn remains or drown in water. (Throw it in the river)
As long as you are careful to never identify yourself with the burner phone the only surveillance they can do is know that a phone was used or in a location but not who it belongs to. Be aware that if you are caught with it on your person any information or contacts on the phone may get compromised. Be mindful what you put on it.
-
@ 3b7fc823:e194354f
2025-02-06 00:19:45Your phone is not your friend. It is a filthy little snitch that tells anyone who asks where you are, what you are doing, and who you are doing it with. You can obscure and hide some things through the use of privacy respecting software like encrypted communication apps, Tor pathways using Orbot, or the base OS like Graphene but metadata and geolocation is still very loud and very present. It is built into the infrastructure of how cell phones work. Your phone is tracked at all times through every cell tower area you pass through logging your IMEI and by extension your phone number and identity. This data is logged and saved forever by companies who use and sell it for corporate surveillance and post Patriot Act give it to police and government agencies warrantlessly.
Fine, I will just turn it off then. Nice try, but unless the battery can be removed it still tracks you. You didn't think it was weird that Find My Phone still works even if the phone was off? Luddites are not off the hook. That dumb phone or flip phone is tracked just the same and since it will not run encrypted communications you are screaming out the content of every call or text and not just the metadata.
OK, I will get a burner phone or anonymous SIM card not tied to my identity. Better, but not bulletproof. This is great for use and toss but if you continue to use it multiple times, around other devices that are tied to you or your social network, or take it to your home, work, or any location associated with you then it will be doxxed. Once doxxed all past information associated with it becomes now linked to you.
Metadata, Profile, and Network Your network is very easily known and built up over time. Who are the contacts saved in your phone? Who do you interact with? Who do you call, text, email, DM, or follow on social networks? Who do you never contact but your geolocation overlaps with them often. Now look at all those contacts and who they have a network with. A giant spider web of connections. If by 7 degrees of Kevin Bacon you have a shady contact in your network then you may get more scrutiny than you may realize.
You are spilling metadata everywhere you go along with your geolocation. Time stamps, who you contacted, how long you talk to them, which app was used when, internet searches, map app searches, etc. People are creatures of habit and over time this metadata builds a pretty good profile on you. Phone becomes active around 7am when they wake up. Scans social media and news sites for usually 30 minutes. Assume they are taking a shower because the phone is on but not being used until 8am most weekdays. Travels to a coffee place on the corner most mornings and then goes to their place of work. Between 9:30 and 10:30 am they again scan social media and news sites for a solid 10 minutes, probably their bathroom schedule. During lunch they frequent these locations with these people. You get the point.
This profile, plus your geolocation history, plus your network paints a pretty complete picture on you. Surprisingly it is not what you do but when you do something different that gets attention. There was a big protest last night that we are not happy about. We already have a list of everyone who took their phones with them at that geolocation and timestamp. We run an algorithm looking for simple patterns. John is usually at a restaurant eating with friends during this time but strangely his phone was left at home and turned off during that time frame. Did anyone in his network go to the protest that we have already confirmed? Anyone in his network follow the protest Facebook page, or have a deviation from their usual pattern such as their phone being somewhere dormant when it is usually active during this time?
What can you do? You can choose to do nothing. You can just live your life with the awareness that you are being tracked and profiled, maybe work to limit how much metadata you are spilling out to the universe. If you are an activist, an oppressed minority, live in an oppressive regime, or your country suddenly becomes oppressive this might not be an option. Randomize or maintain your profile. This is hard but not impossible. Make your profile and habits so chaotic that any deviation is not a deviation. Most people cannot do this but if you are couch-surfing, going to different places constantly, new friends and new activities on the daily agent of chaos then maybe this is an option.
On the opposite extreme maybe you are a very regimented person so be aware of that and always stick to your routine. If you want to go to that protest but are usually home doom scrolling youtube during that time then set your phone to no sleep mode and set up to watch a long playlist of youtube videos left at home while you go to the protest.
Home phone only. Maybe you decide to have a home phone only, no not a landline, but an actual smart device that can utilize encrypted communications services but never leaves the house. This could potentially save you a lot of money on data plans, texts, and minutes if you don't buy a network plan and just use VOIP on your home WIFI. Or maybe you have a very minimal network plan and when you leave the house you either take it with you in a Faraday bag or have a secondary device that lives in a Faraday bag that only comes out for emergencies and to check in. Just be aware that the time in and out of the Faraday bag is part of your profile.
No Phone. You can have no phone whatsoever. This will not work for most people in the modern age but if you have an extreme risk profile then this might be the extreme option you need. How do you survive with no phone or only a home phone? Just some alternatives and some ideas. You can still buy WIFI only devices that have no network connection and / or stay in airplane mode. Old MP3 players for music and podcasts while on the go. Old phones that you can download maps to for navigation and use VOIP services in WIFI hotspots.
Emergency Communication and Go Bag Prepper culture has given us all sorts of bags: bug out bags, get home bags, never coming back bags, and go bags. I define go bags as very small, light weight, and compact bags or kits. They carry very minimal, bare necessary gear, and ideally are so small that you actually have it on you, in your purse or computer satchel or car all of the time. Emergency communication will be part of this. This is when the burner phone, purchased with cash out of town, and stored in a Faraday bag all the time shines. It has no connection to you and has no history of use. It is a have but hope to never use oh shit device. If you are the activist, the whistleblower, the oppressed that they could come after at any time, or the journalist that investigates corruption, organized crime, or terrorism then you need this.
-
@ e2c72a5a:bfacb2ee
2025-06-02 20:36:09The regulatory whiplash in crypto is costing investors billions while regulators play musical chairs with their own rules. The SEC's sudden reversal on staking—now claiming it's not a security after years of enforcement actions—exposes a troubling pattern where innovation suffers while bureaucrats figure out what they actually believe. This flip-flop isn't just confusing; it's financially devastating for companies that paid massive settlements based on guidance that's now apparently wrong. Meanwhile, Bitcoin quietly climbs past $105,000 as institutional money pours in through ETFs, proving that mainstream adoption continues despite the regulatory chaos. The question isn't whether crypto will survive government confusion—it's whether America will maintain its financial leadership while regulators struggle to understand the technology they're supposed to oversee. Will your investments be the next casualty of regulatory indecision?
-
@ 3b7fc823:e194354f
2025-02-03 14:51:45Protecting Email Communications: A Guide for Privacy Activists
Safeguarding your communications is paramount, especially for activists who often face unique challenges. Encryption tools offer a vital layer of security, ensuring that your emails remain confidential and inaccessible to unauthorized parties. This guide will walk you through the process of using encryption tools effectively, providing both practical advice and essential insights.
Why Encryption Matters
Encryption transforms your communications into a secure format, making it difficult for unauthorized individuals to access or read your messages. Without encryption, even encrypted email services can expose metadata, which includes details like who sent the email, when it was sent, and the recipient's email address. Metadata can reveal sensitive information about your activities and location.
Key Encryption Tools
There are several tools available for encrypting emails, catering to different skill levels and preferences:
- PGP (Pretty Good Privacy)
-
For Tech-Savvy Users: PGP is a robust encryption tool that uses public and private keys. The recipient needs your public key to decrypt your messages. You can obtain your public key through a key server or directly from the recipient.
-
GPG (GNU Privacy Guard)
-
Free and Open Source: GPG is a user-friendly alternative to PGP, offering similar functionality. It's ideal for those who prefer an open-source solution.
-
ProtonMail
-
End-to-End Encryption: ProtonMail is popular among privacy-conscious individuals, offering end-to-end encryption and zero-knowledge encryption, meaning only the sender and recipient can access the message content.
-
Tresorit
-
Secure Communication: Tresorit provides end-to-end encrypted messaging with a focus on security and privacy, making it a favorite among activists and journalists.
-
Claws Mail
- User-Friendly Email Client: Claws Mail supports PGP encryption directly, making it an excellent choice for those who prefer a dedicated email client with built-in encryption features.
Steps to Encrypt Your Emails
- Choose a Tool:
-
Select the tool that best fits your needs and comfort level. Tools like PGP or GPG are suitable for those with some technical knowledge, while ProtonMail offers an easy-to-use interface.
-
Generate Keys:
-
Create a public key using your chosen tool. This key will be shared with recipients to enable them to encrypt their responses.
-
Share Your Public Key:
-
Ensure that the recipient has access to your public key through secure means, such as pasting it directly into an email or sharing it via a secure messaging platform.
-
Encrypt and Send:
- When composing an email, use your encryption tool to encrypt the message before sending. This ensures that only the recipient with your public key can decrypt the content.
Minimizing Metadata
Beyond encryption, consider these steps to reduce metadata exposure:
- Use Tor for Sending Emails:
-
Routing emails through Tor hides your IP address and makes communication more anonymous.
-
Avoid Revealing Identifiers:
-
Use .onion addresses when possible to avoid leaving a traceable email account.
-
Choose Privacy-Friendly Providers:
- Select email providers that do not require phone numbers or other personally identifiable information (PII) for registration.
Best Practices
- Avoid Using Real Email Accounts:
-
Create dedicated, disposable email accounts for encryption purposes to minimize your personal exposure.
-
Understand Legal Implications:
-
Be aware of laws in your country regarding encryption and digital privacy. Engaging in encrypted communications may have legal consequences, so understand when and how to use encryption responsibly.
-
Use Encrypted Backup Methods:
- Encrypt sensitive information stored on devices or cloud services to ensure it remains inaccessible if your device is compromised.
When Encryption Isn't Enough
While encryption protects content, there are limitations. Governments can legally compel decryption in certain circumstances, especially when they possess a warrant. Understanding these limits and considering the consequences of encryption is crucial for privacy activists.
Conclusion
Encryption is a vital tool for safeguarding communications, but it must be used wisely. By selecting the right tools, minimizing metadata, and understanding legal boundaries, privacy activists can effectively protect their emails while maintaining their commitment to privacy and freedom. Stay informed, stay secure, and always prioritize your digital well-being.
Advocating for privacy does not finance itself. If you enjoyed this article, please consider zapping or sending monero
82XCDNK1Js8TethhpGLFPbVyKe25DxMUePad1rUn9z7V6QdCzxHEE7varvVh1VUidUhHVSA4atNU2BTpSNJLC1BqSvDajw1
-
@ 1817b617:715fb372
2025-06-02 20:35:29Looking to simulate a USDT deposit that appears instantly in a wallet — with no blockchain confirmation, no real spend, and no trace?
You’re in the right place.
🔗 Buy Flash USDT Now This product sends Flash USDT directly to your TRC20, ERC20, or BEP20 wallet address — appears like a real deposit, but disappears after a set time or block depth.
✅ Perfect for: Simulating token inflows Wallet stress testing “Proof of funds” display Flash USDT is ideal for developers, trainers, UI testers, and blockchain researchers — and it’s fully customizable.
🧠 What Is Flash USDT? Flash USDT is a synthetic transaction that mimics a real Tether transfer. It shows up instantly in a wallet balance, and it’s confirmed on-chain — and expires after a set duration.
This makes it:
Visible on wallet interfaces Time-limited (auto-disappears cleanly) Undetectable on block explorers after expiry It’s the smartest, safest way to simulate high-value transactions without real crypto.
🛠️ Flash USDT Software – Your Own USDT Flasher at Your Fingertips Want to control the flash? Run your own operations? Flash unlimited wallets?
🔗 Buy Flash USDT Software
This is your all-in-one USDT flasher tool, built for TRC20, ERC20, and BEP20 chains. It gives you full control to:
Send custom USDT amounts Set custom expiry time (e.g., 30–360 days) Flash multiple wallets Choose between networks (Tron, ETH, BSC) You can simulate any amount, to any supported wallet, from your own system.
No third-party access. No blockchain fee. No trace left behind.
💥 Why Our Flash USDT & Software Stands Out Feature Flash USDT Flash USDT Software One-time flash send ✅ Yes Optional Full sender control ❌ No ✅ Yes TRC20 / ERC20 / BEP20 ✅ Yes ✅ Yes Custom duration/expiry Limited ✅ Yes Unlimited usage ❌ One-off ✅ Yes Whether you’re flashing for wallet testing, demoing investor dashboards, or simulating balance flows, our tools deliver realism without risk.
🛒 Ready to Buy Flash USDT or the Software? Skip the wait. Skip the scammers. You’re one click away from real control.
👉 Buy Flash USDT 👉 Buy Flash USDT Software
📞 Support or live walkthrough?
💬 Telegram: @cryptoflashingtool 📱 WhatsApp: +1 770-666-2531
🚫 Legal Notice These tools are intended for:
Educational purposes Demo environments Wallet and UI testing They are not for illegal use or financial deception. Any misuse is your full responsibility.
Final Call: Need to flash USDT? Want full control? Don’t wait for another “maybe” tool.
Get your Flash USDT or Flashing Software today and simulate like a pro.
🔗 Buy Now → Flash USDT 🔗 Buy Now → Flash USDT Software 💬 Telegram: @cryptoflashingtool 📱 WhatsApp: +1 770-666-2531Looking to simulate a USDT deposit that appears instantly in a wallet — with no blockchain confirmation, no real spend, and no trace?
You’re in the right place.
Buy Flash USDT Now\ This product sends Flash USDT directly to your TRC20, ERC20, or BEP20 wallet address — appears like a real deposit, but disappears after a set time or block depth.
Perfect for:
- Simulating token inflows
- Wallet stress testing
- “Proof of funds” display
Flash USDT is ideal for developers, trainers, UI testers, and blockchain researchers — and it’s fully customizable.
What Is Flash USDT?
Flash USDT is a synthetic transaction that mimics a real Tether transfer. It shows up instantly in a wallet balance, and it’s confirmed on-chain — and expires after a set duration.
This makes it:
- Visible on wallet interfaces
- Time-limited (auto-disappears cleanly)
- Undetectable on block explorers after expiry
It’s the smartest, safest way to simulate high-value transactions without real crypto.
Flash USDT Software – Your Own USDT Flasher at Your Fingertips
Want to control the flash?\ Run your own operations?\ Flash unlimited wallets?
This is your all-in-one USDT flasher tool, built for TRC20, ERC20, and BEP20 chains. It gives you full control to:
- Send custom USDT amounts
- Set custom expiry time (e.g., 30–360 days)
- Flash multiple wallets
- Choose between networks (Tron, ETH, BSC)
You can simulate any amount, to any supported wallet, from your own system.
No third-party access.\ No blockchain fee.\ No trace left behind.
Why Our Flash USDT & Software Stands Out
Feature
Flash USDT
Flash USDT Software
One-time flash send
Yes
Optional
Full sender control
No
Yes
TRC20 / ERC20 / BEP20
Yes
Yes
Custom duration/expiry
Limited
Yes
Unlimited usage
One-off
Yes
Whether you’re flashing for wallet testing, demoing investor dashboards, or simulating balance flows, our tools deliver realism without risk.
Ready to Buy Flash USDT or the Software?
Skip the wait. Skip the scammers.\ You’re one click away from real control.
Support or live walkthrough?
Telegram: @cryptoflashingtool
WhatsApp: +1 770-666-2531
Legal Notice
These tools are intended for:
- Educational purposes
- Demo environments
- Wallet and UI testing
They are not for illegal use or financial deception. Any misuse is your full responsibility.
Final Call:
Need to flash USDT? Want full control?\ Don’t wait for another “maybe” tool.
Get your Flash USDT or Flashing Software today and simulate like a pro.
Telegram: @cryptoflashingtool
WhatsApp: +1 770-666-2531
-
@ d26f78e5:6eb06a95
2025-06-02 17:50:08Bitcoin's first 15 years delivered spectacular success: $2T market cap, inflation-resistant store of value, censorship-resistant wealth preservation.
On the other hand, Bitcoin has hardly cemented itself as global medium-of-exchange.
Volatility and UX challenges are at odds with mainstream adoption. Stablecoins have, by and large, dominated the transactional role.
Meanwhile, something profound is happening with Bitcoin capital.
$2T in Bitcoin wealth isn't content sitting idle.
Despite the maxi's common rhetoric, whales appetite for deploying this capital is very real. Yield generation, risk hedging, capital formation opportunities that compound returns beyond simple HODLing.
The defining meta of this cycle is the financialization of Bitcoin.
MicroStrategy's playbook. Bitcoin treasury companies. The writing is on the wall. Large holders are securitizing Bitcoin to offer traditional market exposure while earning returns in the process.
This isn't just speculation. It's capital seeking productivity. But here's the critical risk: This financialization is happening through centralized, custodial infrastructure. BlackRock, Fidelity, and Wall Street banks are capturing Bitcoin's financial upside while Bitcoin holders surrender the sovereignty that makes Bitcoin revolutionary.\ \ We're recreating traditional finance with Bitcoin as the underlying asset.\ \ Centralized venues offer the best execution but custody risk, wrapped solutions provide some control but fragment liquidity across risky bridges. Onchain is slow, expensive, and functionally limited.
The path forward requires Bitcoin-native capital markets.
This is why we built Arkade.
Programmable money enables this transition through Bitcoin-native capital markets: Non-interactive trading without custody risk, sophisticated financial instruments like lending and options with unilateral exit paths intact. This creates the virtuous cycle Bitcoin needs:
Productive capital deployment → Liquidity & stability → Practical everyday use → Higher transaction volume → Sustainable fee markets → Stronger security → More confidence → More capital
The missing piece isn't better payment UX or lower volatility alone.
It's infrastructure that lets Bitcoin capital work productively while maintaining Bitcoin's core properties of self-sovereignty and censorship resistance.
Hyperbitcoinization doesn't start with coffee purchases.
It starts with Bitcoin capital markets sophisticated enough to compete with traditional finance but built on Bitcoin's foundation of self-custody and open, permissionless innovation.
The transformation from store of value to money runs through capital markets. And those markets must be Bitcoin-native.\ \ Time to level up!\ \ 👾
-
@ d9a329af:bef580d7
2025-06-02 17:40:08Originally made using Habla News, now edited and reposted onto Yakihonne
Everyone who sees it knows at this point that the matrix of control comes from the overdependence of proprietary software to do our everyday tasks. You can think of this like us being the cling wrap that will just not let go of these pieces of garbage software that don't allow you to see what is in their source code, and how they work. This will tend to lead to the unlawful collection of data (violating the most basic of privacy laws, despite unenforceable contracts that are enforced regardless), bad OPSEC that sees you being stalked and harassed over nothing significant. In the worst of cases, if you speak your mind where you aren't necessarily supposed to be able to do that, and you get doxxed, the worst cases could be far worse than one could imagine.
The solution to this, on the other hand, is using almost exclusively free/libre open-source software and GNU/Linux operation systems. If you're using certain proprietary software, hardening it to give as little data as possible to the entity responsible for it will also work, as long as you know which ones to use. This is a hard pass for a lot of people, but if you want to escape the control matrix of proprietary software, Winblows, HackOS, iHackOS, iBloatOS and stock Google AI Fever Dream, then researching which Free Software (notice the spelling) to use is your first bet. I had already done this for the past four and a half years, and will continue to do it as long as I live, seeing what new Free Software compliant applications and libraries come into the spotlight once things get locked down into walled gardens like what HackOS, iHackOS and BlindnessOS do on a regular basis.
Each of these pieces of software will be in a categorized list with a brief description of what the software is used for. There is a lot to take in, so research this yourself and see if these are right for you. These are the applications I personally use on a regular day-to-day basis, and they work for my needs.
-
Operating Systems (the core to your device)
-
GNU/Linux operating systems (for PCs) or GrapheneOS (for de-googled Android phones)
To be fair on this one, GNU/Linux is the combination of the Linux kernel with the GNU toolchain, which in turn allows any developer to make an operating system that is FOSS, not necessarily Free Software, especially with the Linux Kernel's proprietary bits of code. The Linux kernel is also used in the Android Open-Source Project (AOSP), and is used as the base of operating systems for Android phones such as GrapheneOS, the only AOSP custom ROM I would recommend based upon the research I had done on this (even if very little).
My recommendations on the Linux side of things are almost any Arch-based distribution (with the exception of Manjaro), Debian-based distributions like Linux Mint Debian edition, regular Debian, AntiX or Devuan, or a Fedora/RedHat-based distribution like Nobara Project (if you're a gamer), OpenSUSE (if set up properly) or even Bluefin if you want an atomic desktop (I wouldn't recommend Bluefin if you want to monkey with your operating system and DIY on many aspects of it). Once you learn how to set these up securely, privately and properly, you're on your way to starting your journey into digital liberation, but there's far more to go on this front.
- Web Browsers (How you surf the internet)
- Firefox Forks
This one is self-explanatory. I harden all the Firefox forks I use (LibreWolf, Waterfox, Floorp and Zen as some examples) to the nines, despite being unable to do anything about my fingerprint. This is why I use multiple browsers for specific purposes to counteract the fingerprint spying due to weaponized JavaScript. There are ways to circumvent the fingerprint-based espionage, and make sure the site fingerprint.com doesn't know that one's lying about what their user agent is, though it's not very easy to fool that site, as it's used by 6,000 companies.
- Brave Browser
This is the only Chromium-based browser I would recommend, as it's better when hardened against all the other Chromium-based browsers, including Ungoogled Chromium, which is almost impossible to harden due to security vulnerabilities. Despite that, Brave has some of the best features for a Chromium-based browser one can feel comfortable using, even though you'll have similar issues with Firefox-based browsers that aren't actually Firefox (and Firefox has its own issues regarding espionage from Mozilla)
- Office Suites (If you need to do professional office documents)
- Libre Office
A fork of Apache's OpenOffice, made better with many features missing from even OnlyOffice and OpenOffice, this suite of applications is the go-to Free Software office suite for many people looking to switch from the proprietary software nether to the diamonds of free/libre open-source software. Though one may need to perform some extra steps to set up compatibility with G-Suite and Microsoft Office past 2015 potentially, it's still a good thing that people trust LibreOffice as their one-stop shop for office documents, despite being completely different from your standard office suite fare.
- OnlyOffice
The competitor to LibreOffice with the ease of Microsoft Office and G-Suite compatibility, OnlyOffice is another office suite that can be good for those who need it, especially since anybody who had used Microsoft Office in particular will be familiar with its layout, if not for a slight learning curve. As someone who's used G-Suite more (due to schooling that stunk worse than a decomposing rat in New York City), that's part of the reason why I switched to LibreOffice, though I tried some others, including OnlyOffice and Abiword (since I use a word processor a lot). This one is another solid option for those who need it.
- Wordgrinder
For those who like to use a terminal emulator like I do, Wordgrinder is a word processor with a terminal user interface (TUI) designed with just focusing on typing without distractions in mind. .wg is the file extension for documents made using Wordgrinder, especially since nowadays most word processors are cloud based. For those who live in a terminal, this is a good option to your terminal UI-based toolbox
- Vi, Vim, Neovim and Vim-like editors
The classic VI Improved (Vim), a fork of the TUI modal editor, vi, with keybinds that will be confusing at first, but with practice and patience, bring about muscle memory to stay on the keyboard, and not necessarily touch the mouse, keypad on the right hand side, or even the arrow keys. These keybind skills will stay with one for the rest of their life once they learn how the modes in vi, Vim or vi-based editors work. It's a classic for those working in the terminal, and a staple in FLOSS text editing and coding tools once customized potentially to the nines to your particular style.
- VS Codium
The Free Software fork of Code OSS by Microsoft, but made to be similar in function to VSCode without Microsoft's espionage baked into it. It has almost exactly the same features as VSCode that one would need, and even any VSIX files from VSCode will work in VSCodium. This one is an easy switch from VSCode for those who use it, but don't want the forced telemetry.
- Emacs
The competitor to Vim, Emacs is an editor that is FLOSS in every way imaginable. It is one of the most customizable editors anybody could have ever conceived, though the programming language used in Emacs is a dialect of Lisp the developers had made themselves. There are more keybinds to memorize compared to Vim, though Vim keybinds can be added using the Evil Mode package in any Emacs package manager to get the best of both worlds in Emacs. Once one gets a handle of the steep learning curve for Emacs, it's customizable in every imaginable way almost.
These four categories will get you started on your privacy journey, though I covered things a developer might want. I have plans on more lists to compile once I get my ducks in a row on what I want to cover here on Nostr in a longform format. Feel free to let me know if you have recommendations for me to write about, and I can do some digging on that if it isn't a rabbit hole.
-
-
@ 3b7fc823:e194354f
2025-02-03 02:19:03At-Risk Groups Are Facing A Battle For Their Rights
Privacy. It’s a word we often take for granted, scrolling through our phones and sharing photos without a second thought. But for certain groups—those at risk due to their identities, beliefs, or circumstances—privacy isn’t just a luxury; it’s a lifeline. In today’s world, where governments, corporations, and even our own social media accounts seem to have a vested interest in collecting and selling our data, the fight for privacy has never been more crucial.
Privacy is not a buzzword but a fundamental human right. We can do more to protect those who need it most.
Privacy As A Human Right
The concept of privacy is deeply rooted in our basic human rights. It’s not just about keeping your medical records confidential or hiding your bank statements; it’s about the right to control what others can know about you. For individuals who identify as LGBTQ+, immigrants, journalists, or political dissidents, this right is even more fragile.
Recently, we’ve seen a rise in policies that seem designed to strip away these protections. From the Trump administration’s transgender ban on military service and passport changes to the targeting of journalists and activists, the message is clear: certain groups are considered fair game for scrutiny and control.
These actions are about erasing the autonomy of individuals to live their lives without fear of retribution or discrimination. Privacy isn’t just a feel-good concept; it’s the cornerstone of a individuals liberty. We must ensure that no one’s rights can be arbitrarily taken away, especially the right to privacy.
The Attack On Vulnerable Groups
The targeting of at-risk groups has reached a fever pitch in recent months:
- Transgender Rights Under Fire
The Trump administration has issued a sweeping executive order that effectively erased recognition of transgender individuals’ rights. This included changes to passport policies that required individuals to declare their gender at birth, making it nearly impossible for trans individuals to update their documents without facing extreme scrutiny or even denial.
These actions don’t just impact transgender people; they send a chilling message to the entire LGBTQ+ community.
- Free Speech And Political Dissent
Trump’s Free Speech Executive Order, aimed to protect citizens’ right to express their beliefs. However, critics argue it was more about silencing dissenters. Journalists, activists, and even private citizens have faced increasing pressure from government officials to either comply with certain views or face professional consequences.
“Free speech is a double-edged sword,” noted one legal expert. “When the government uses it as a tool to marginalize certain groups, it becomes a weapon rather than a shield.”
-
Media And Press Freedom
Trump’s ongoing battles with major media outlets are well-documented. From labeling reporters as “fake news” to pushing for laws that would limit press freedom, the administration has made it clear that journalists and news organizations are not above scrutiny. For independent journalists and investigative reporters, this poses a significant threat to their work and safety. -
Immigrant Rights And Discrimination
The Trump administration’s harsh immigration policies have had a devastating impact on vulnerable communities. From family separations to the expansion of surveillance in immigrant-heavy areas, these actions have left many feeling exposed and unsafe. Immigrants, particularly those from Latin America and the Middle East, are increasingly targeted for their perceived alignments with political rhetoric.
The Consequences Of Losing Privacy
When privacy is stripped away, it doesn’t just affect individuals—it affects entire communities. For transgender individuals, the fear of being “outted” online or facing discrimination at work is a daily reality. For journalists, the threat of government retribution can lead to self-censorship and an inability to hold power accountable. For immigrants, the risk of deportation or surveillance means constant vigilance—and often, no recourse.
These consequences are not just personal; they’re systemic. When certain groups are deemed unworthy of protection, it sets a dangerous precedent for what’s allowed in society. It sends the message that some lives matter less than others, and that the government can act with impunity. If you are not in one of these currently impacted groups just give it time and eventually they will come for you too.
The Fight For Privacy: What We Can Do
The good news is that we don’t have to sit idly by while this happens. There are steps we can take to fight for privacy as a fundamental right. Here’s how:
-
Advocate For Stronger Protections
Governments at all levels need to pass and enforce laws that protect privacy, especially for vulnerable groups. This includes everything from data protection legislation to anti-discrimination policies. -
Support Independent Journalism
Journalists are on the front lines of this fight, uncovering corruption and holding power accountable. Support independent media outlets and platforms that prioritize transparency and press freedom. -
Educate And Empower
Communities under threat need resources to protect themselves. This includes education on their rights, know how and tools to secure their data, and access to legal support when needed. -
Use Your Voice
Speak out against policies that erode privacy and target vulnerable groups. Use your actions to protect yourself and others. -
Demand Accountability
When governments overreach, they need to be held accountable. Fight for yours and others rights.
Privacy Is A Fight Worth Winning
Privacy isn’t just about convenience or comfort—it’s about freedom, autonomy, and the right to live without fear of arbitrary control. For at-risk groups, this is not just a luxury; it’s a lifeline. As we move forward in this uncertain era, let’s remember that the fight for privacy is not over— it’s just beginning.
We all have a role to play in protecting those who need it most. So let’s get to work.
- Transgender Rights Under Fire
-
@ deedf20f:624988c0
2025-06-02 17:39:21There’s a recurring fantasy in psychedelic circles — whispered at festivals, joked about on forums, and half-seriously invoked in moments of exasperation with the world…
What if we just put LSD in the water supply?
On the surface, the idea almost sounds logical. By forcing an unsuspecting population into the depths of a collective psychedelic experience, people would be compelled to confront their illusions, dissolve their egos, and emerge more empathetic, self-aware, and connected — ultimately leading to a more compassionate, enlightened society.
But for that to work, you have to make a big (and possibly dangerous) assumption — that psychedelics are inherently benevolent.
That if everyone were dosed with LSD — unknowingly and all at once — it would trigger a kind of mass awakening. A spiritual jailbreak. A shortcut to utopia.
Here's why that isn't going to happen…
(This post was originally published on the Tripsitter Newsletter).
The Origins of the LSD-in-the-Water Fantasy
The idea of slipping LSD into the public water supply didn’t come from hippie utopians. It came from the CIA.
As part of the now-infamous MK-ULTRA program in the 1950s and 60s, the CIA tested the viability of LSD as a tool for mind control and psychological warfare. One documented proposal involved contaminating the water supply of an entire town with LSD in order to incapacitate the population.
The goal was simply to "see what happens."
Luckily for the town's unwitting citizens, the plan was eventually abandoned. The reason listed was that LSD is highly unstable in water, especially chlorinated tap water, and ensuring each citizen received an effective dose was close to impossible. One person might receive nothing, another a 10x dose.
The science ultimately didn’t work — but the idea seed had been planted.
The concept has resurfaced many times since then — starting with Ken Kesey and the Merry Pranksters — a rowdy group famous for their “acid tests” — where strangers were encouraged to have a sip of the group's electric Kool-Aid, which was infused with high-dose LSD. The group believed they could deliver mass enlightenment to the world through LSD.
While they never actually spiked a municipal water system, they often joked about it. To them, turning on the whole world was more than just a prank — it was a prophecy.
Over the years, other figures echoed the same idea — some more seriously than others.
In 1966, London Life Magazine ran an alarming interview with a former MP named Dr. Donald Johnson, who claimed that “it is quite feasible that LSD could be used to take over a city or even a country… If it were put into reservoirs, it would disable people sufficiently for an enemy to take control.”
Despite the drama, it never happened. For one simple reason: it wouldn’t work.
Why Adding LSD To The Water Supply Wouldn’t Work
The plan to add LSD to the water supply falls apart on three fronts — it’s chemically unstable in chlorinated water, it's wildly expensive, and it's psychologically unpredictable — sometimes causing people to become more extreme, not less.
1. The Chemistry Doesn’t Work
LSD is undeniably one of the strongest psychedelic compounds, gram for gram, in the world — just one ten-thousandth of a gram (100 micrograms) is enough to trigger a full-blown, reality-melting experience.
While powerful, LSD is also surprisingly fragile.
UV light, heat, oxygen, and chlorine — all common elements in municipal water systems — rapidly degrade LSD, rendering it inactive. This is why your tab of LSD typically arrives both wrapped tightly in tinfoil and in a sealed plastic bag. If you leave your tabs out for even just a few hours, the potency could drop as much as 50%.
Technically, LSD could remain chemically stable in water for around 3 months as long as the pH and temperature remained stable.
However, the main issue is that municipal water supplies are heavily chlorinated — typically around 1–4 ppm. Given that a 10:1 ratio of free chlorine to LSD is enough to neutralize the compound, even standard chlorination levels are more than sufficient to break down over 90% of the LSD within just a few hours.
This makes it virtually impossible to control dosing at the point of delivery. By the time the water reaches someone’s tap, there’s no telling how much (if any) LSD is left — and no way to ensure that any two people receive the same amount.
Between the chlorine, fluctuating temperatures, exposure to sunlight, long pipe systems, and transit time, adding LSD to a public water is simply a waste of LSD.
It's (theoretically) possible that one could add about 10X the normal dose of LSD per 1 ppm of chlorine in order to counteract this issue.
In places like the United States, which typically fall on the high-end of this chlorination range (up to 4 ppm), you'd need to 40X the target dose of LSD for every 1 liter of water.
Other places that use much less chlorine, such as Iceland, Australia, and Germany could get away with far less LSD — but even then, degradation from heat, oxygen, and UV exposure would remain a serious issue.
As you can probably imagine, the amount of LSD you’d need to add to achieve this amount across an entire city’s water supply would cost a fortune.
Let's break it down.
2. It Would Cost An Absurd Amount of Money
Let’s say you really did want to dose an entire town through the water system. How much LSD would you need?
For the LSD to have any significant impact on people, you'd need to provide a full psychedelic dose — a simple microdose wouldn't cut it.
A standard oral dose of LSD is about 100–150 micrograms (μg). That’s 0.00015 grams.
In order to ensure a full dose, you'd want the concentration to be high enough for a full dose in a standard ~500 mL glass of water.
This means the concentration needs to maintain the equivalent of 150 μg of active LSD for every 500 mL of water — or around 300 μg/L.
As we've already covered, LSD breaks down rapidly in chlorinated water. To compensate for degradation, you'd need to increase the dose by 10–40x (depending on the local chlorination rate) — that works out to a whopping 3000–12,000 micrograms of LSD for every litre of water.
That's A LOT of acid.
And it’s not just drinking water you’d be dosing — it’s everything. Showers, toilets, laundry, dishwashers, sprinklers. There’s no way to isolate only the water people ingest. You’d have to flood the entire municipal water system.
To get a better idea of just how much LSD this would require, let’s look at real-world cities and their actual daily water usage:
- Burlington, USA (50K Pop.) — 14.2 million liters/day (322 L/person)
- Sacramento, USA (500K Pop.) — 303 million liters/day (606 L/person)
- Calgary, Canada (1.2M Pop.) — 485 million liters/day (373 L/person)
- London, UK (9M Pop.) — 2,000 million liters/day (222 L/person)
Across these cities, the average per capita usage comes out to around 404 liters per person per day. Obviously, this can vary as hotter, drier places like Sacramento use more water per capita than wetter regions like Seattle.
From this 404 L/person/day estimate, we can extrapolate roughly how much LSD we'd need to dose each person with 150 micrograms of active LSD (including an average 20X degradation buffer):
Note: This is bulk or production pricing ($2000/gram). Street-level LSD sells as high as $100K per gram (or anywhere in between).
By the time you reach a population of 500K or more, the idea becomes not only logistically impossible, but financially absurd — into the millions.
On the high-end of the estimate (assuming the city uses around 4 ppm chlorine and the cost to acquire the LSD is closer to $3000/gram), dosing a city could cost as much as $15M per 1 million people.
3. LSD Doesn't Actually Change Our Minds
Even if some rich eccentric decided to blow millions of dollars to dose an entire population with LSD through the water supply, it still wouldn’t achieve what they were hoping for.
In the 1960s, psychedelics became synonymous with peace, love, and rebellion. The hippie movement embraced the idea that LSD itself was the force behind their anti-establishment ideals. But this narrative overlooked a key truth: LSD doesn’t create beliefs — it magnifies them.
Modern research has shown that far right or left-leaning individuals often become more entrenched in their existing views after taking psychedelics — not more open-minded.
One study found that psychedelics can actually reinforce authoritarian tendencies when taken in certain psychological or cultural contexts. There are just as many far-right psychonauts as there are liberal or spiritual ones.
There's even research showing that LSD (and other psychedelics) can generate completely false insights or beliefs.
Regardless, if psychedelics were inherently utopia-generating, we’d likely have seen one by now.
Humans have been taking psychedelic substances for thousands of years — yet no culture has achieved lasting peace through them (or anything else).
Take the Aztecs as an example — this was a society known to use psilocybin mushrooms ceremonially, and their rulers frequently consulted plant spirits for guidance on matters of war, agriculture, and governance. These were not casual users; they built entire rituals and temples around these practices.
And yet, this is the same society that routinely carried out mass human sacrifice — often in gruesome and ritualized ways.
Just read this account from Bernal Díaz del Castillo’s book The True History of the Conquest of New Spain (1568):
“They strike open the wretched Indian’s chest with flint knives and hastily tear out the palpitating heart which, with the blood, they present to the idols in whose name they have performed the sacrifice. They cut off the arms, thighs, and head, eating the arms and thighs at ceremonial banquets. The head they hang up on a beam, and the body of the sacrificed man is not eaten but given to the beasts of prey.”
That doesn’t sound like a society on the brink of enlightenment.
Other societies like the Eleusinian Greeks were also known for their deep traditions in psychedelic usage and spiritual ceremony — and still, these societies came nowhere close to a utopia in which all people were equal, free, or safe from violence.
So no, LSD won't save us from ourselves. It merely amplifies the stories we’re already telling ourselves — for better or worse.
Psychedelics Are Pluripotent
The notion of an “LSD messiah” — that dosing the world could suddenly awaken everyone to peace and harmony — is based on a flawed assumption: that psychedelics have an inherent moral direction.
Psychedelics are non-specific amplifiers — they don’t implant a particular set of values; instead, they magnify the cultural, political, and psychological contexts already within our minds.
Some might argue that LSD, being synthetic, is somehow disconnected from the moral logic of the natural world — but that’s just the appeal to nature fallacy in disguise: the assumption that if something is natural, it must be good.
So what about our psychedelic plant teachers — things like ayahuasca, magic mushrooms, and mescaline? Are they guides toward truth, or cultural and moral relativists?
In a sense, they're both. These compounds are politically pluripotent — meaning they can be absorbed into almost any belief system. Contrary to the idea that psychedelics naturally foster progressive, harmonious societies, research shows that authoritarian and hierarchical ideologies can just as easily assimilate the experience of interconnection.
And not all plants come cloaked in kindness. Datura, borrachero, and other deliriants have long been used not to enlighten, but to bewitch, confuse, or control. These spirits aren’t here for free love or utopia — they can just as easily tear a person apart as put them back together.
In short, while psychedelics may open the door to new ways of seeing, they do not guarantee a better world. They don’t lead — they amplify. And what gets amplified depends entirely on who’s holding the mic.
There Are No Shortcuts to Utopia
Whether it's through water supplies or one-dose revolutions, there is no magic button for enlightenment. Psychedelics might shake us awake, but they don’t walk the path for us.
They can open doors, offer insights, even dissolve illusions — but integration, growth, and change still require effort and intention. If psychedelics are teachers, we're still the ones who have to study, reflect, and apply the lessons they give us.
There’s no skipping the work. No molecule will save us from ourselves.
-
@ cae03c48:2a7d6671
2025-06-02 21:02:22Bitcoin Magazine
Michael Saylor Presents The 21 Ways to Wealth at Bitcoin 2025Michael Saylor, Executive Chairman of Strategy, took the stage at Bitcoin 2025 delivering a keynote titled “21 Ways to Wealth.” He stated: “This speech is for you. I’ve traveled the world and told countries, institutional investors, and even the disembodied spirits of our children’s children why they need Bitcoin. This is for every individual, every family, every small business. It’s for everybody.”
He began with clarity. “The first way to wealth is clarity,” he said. “Clarity comes the moment you realize Bitcoin is capital—perfected capital, programmable capital, incorruptible capital.” For Saylor, every thoughtful individual on Earth will ultimately seek such pristine capital, and every AI system will prefer it as well.
The second path is conviction. Bitcoin, he said, will appreciate faster than every other asset, because it’s engineered for performance. “It’s going to grow faster than real estate or collectibles. It is the most efficient store of value in human history.”
The third way is courage. “If you’re going to get rich on Bitcoin, you need courage,” he warned. “Wealth favors those who embrace intelligent monetary risk. Some people will get left behind. Others will juggle it. But the bold will feed the fire—sell your bonds, buy Bitcoin. An extraordinary explosion of value is coming.”
Fourth comes cooperation. “You are more powerful if you have the full support of your family. Your children have time and potential. The secret is transferring capital into their hands. Families that move in unity are unstoppable.”
The fifth is capability. “Master AI,” he said. “In 2025, everything you can imagine is at your fingertips—wisdom, analysis, creativity. Ask AI, argue with it, use it. You can become a super genius. Don’t put your ego first—put your interests first. Your family will thank you.”
Saylor’s sixth way to wealth is composition: construct legal entities that scale your strategy and protect your assets. “Ask the AI and figure it out. You can work hard, or you can work smart. This year, everyone should be operating like the most sophisticated millionaire family office.”
The seventh is citizenship. Choose your economic nexus carefully—“domicile where sovereignty respects your freedom,” he said. “This isn’t just about this year—it’s about this century.”
Eighth is civility. “Respect the natural power structures of the world. Respect the force of nature,” he explained. “If you want to generate wealth in the Bitcoin universe, don’t fight unnecessarily. Find common ground. Inflation and distraction are your enemies.”
Ninth is corporation. “A well-structured corporation is the most powerful wealth engine on Earth. Families are powerful. Partnerships are even more powerful. But corporations can scale globally. What is your vehicle? What is your path?”
The tenth way is focus. “Just because you can do a thing doesn’t mean you should,” he warned. “If you invest in Bitcoin, there’s a 90% chance it will succeed over five years. Don’t confuse ambition with accomplishment. Come up with a strategy—and stick to it.”
The eleventh is equity. “Share your opportunities with investors who will share your risk,” he said, pointing to MicroStrategy’s own rise from $10 million to a $5 billion market cap by aligning with equity partners who believed in the Bitcoin mission.
The twelfth is credit. “There are people in the world who are afraid of the future—they want small yield, certainty. Offer that. Give creditors security in return for capital. Convert their fear into fuel and turn risk into yield by investing in Bitcoin.”
The thirteenth is compliance. “Create the best company you can within the rules of your market. Learn the rules of the road. If you know them, you can drive faster. You can scale legally and sustainably.”
The fourteenth way is capitalization. “Velocity compounds wealth,” Saylor said. “Raise and reinvest capital as fast and as often as you can. The faster your money moves into productive Bitcoin strategies, the more it multiplies.”
Fifteenth is communication. “Speak with candor. Act with transparency. And repeat your message often,” he urged. “Creating wealth with Bitcoin is simple—but only if people understand what you’re doing and why you’re doing it.”
Sixteenth is commitment. “Don’t allow yourself to be distracted,” he said. “Don’t chase your own ideas. Don’t feed the trolls. Stay committed to Bitcoin. It’s the greatest idea in the world. The world probably doesn’t care what you think—but it will care when you win.”
The Seventeenth way is competence. “You’re not competing with noise—you’re competing with someone who is laser-focused, who executes flawlessly,” he said. “You must deliver consistent, precise, and reliable performance. That’s how you win.”
The Eighteenth is adaptation. “Circumstances change. Every structure you trust today will eventually fail. A wise person is prepared to abandon their baggage and adjust plans when needed. Rigidity is ruin.”
Nineteenth is evolution. “Build on your core strengths. You don’t need to start over—you need to level up. Leverage what you already do best, and expand it through Bitcoin and advanced technologies.”
Twentieth is advocacy. “Inspire others to walk the Bitcoin path,” he said. “Become an evangelist for economic freedom. Show others what this revolution really means. Show them the way.”
Finally, the twenty-first way is generosity. “When you’re successful—and you will be successful—spread happiness. Share security. Deliver hope. That light inside you will shine. And others will be drawn to it.”
As he ended, Saylor smiled and quoted the very origin of it all:
“It might make sense to get some, in case it catches on.” – Satoshi.
In Michael Saylor’s worldview, Bitcoin is not a get-rich-quick scheme—it’s the ultimate long-term play. It is the foundation of generational wealth, the engine of personal and institutional freedom, and the tool for those bold enough to lead humanity into a more sovereign, secure future.
You can watch the full panel discussion and the rest of the Bitcoin 2025 Conference Day 3 below:
This post Michael Saylor Presents The 21 Ways to Wealth at Bitcoin 2025 first appeared on Bitcoin Magazine and is written by Jenna Montgomery.
-
@ ef53426a:7e988851
2025-06-02 17:06:54Welcome back to the SWC, folks. We’re about to witness the Money in the Bank title eliminator. The wrestler who climbs the ladder and grabs the briefcase filled with money will be next in line to challenge for the Shitcoin World Championship belt.
Special guest referee ‘Risk-Free’ Raúl Mal starts the action between Sergeant Sol Anna and The Ethereal Ghoul. There’s the bell. The Coinbase Arena is a complete sellout tonight. Who will emerge as the next contender?
The ghoul runs at the ropes and flies at his opponent with a clothesline. Sol Anna dips under, then dips again on the return. The ghoul crashes into the referee instead, and he is down. A ripple of laughter from the audience. Looks like Mal took a knee to the nuts.
Great counter by the sergeant, and the ghoul hits the canvas face-first. A quick elbow drop, then another. My god, she goes down hard. The ghoul blocks through muscle memory, and Sol Anna crosses the ring to take a run-up. Bam. Proof of Stake! What a move. Now she turns her focus to setting up the ladder.
The referee is back up and checks on the downed wrestler.
Sol Anna gets one foot on the ladder. She’s climbing up, but back comes the ghoul.
A blow to the face. And another. No effect. The ghoul latches on and drags Sol Anna back to the canvas.
They lock up, and Sol Anna whips the ghoul into the ladder. By gawd, he’s broken in half! Now what’s she doing? She’s out of the ring, looking under the skirting. What’s that? No. Somebody stop her. Weapons aren’t part of this. That metal could do some serious damage — it’s a hard fork!
The referee comes over to put a stop to this. It’s not legal, even in a hardcore ladder match.
She’s got three seconds to get back in the ring, or it’ll be a count-out. The hard fork will have to wait.
Ethereal Ghoul OUTTA NOWHERE with the NFT! And the referee is down again. Mal’s back was turned. Oh, the humanity. What a dirty trick. And again, a boot to the nether regions. That man is writhing in pain on the floor.
Sol Anna slides back into the ring. She sets up a second ladder while the ghoul doles out more punishment to Raúl Mal.
Now he spots the green of the sergeant’s uniform halfway to the briefcase. Ethereal drags her down. A roundhouse kick connects. He gets into position behind Sol Anna. He lifts her up, looking for the Omega Candle, but no, she reverses and gets his neck. Ooh, the ghoul is in serious trouble here. The tether choke is locked in, but the ghoul can’t tap. The guest referee is still sprawled on the canvas, a mess of black and white stripes.
Sol Anna releases and goes for the first ladder. She gets halfway up, and the Ethereal Ghoul gets to his feet. He’s on the other ladder. How does this work? Will they both go for it? That dangling briefcase is so close—
Wait. Is that the Strategy music? It is. Yes, it is! Sexy Sailor comes sprinting down the ramp. The crowd erupts. Listen to that roar. “Sailor. Sailor!”
Can they still make it to the briefcase? One more step for Sol Anna. The ghoul is close, but Sailor scoots into the ring. He’s got the ladder by the bottom rungs.
Oh, the crowd knows what’s coming. Sol Anna shakes her head. Don’t do it.
“Do it. Do it,” the crowd chants.
Sailor grins at the camera. The rugpull! RUGPULL! He rips the ladder away and Sergeant Sol Anna bounces off the turnbuckle and crashes to the canvas. Oh brother, that looked painful.
Now he’s got the ghoul in his sights. Another rugpull. Ethereal Ghoul is down. I think he fell right on top of the referee.
“Michael. Michael,” the crowd sings.
Both contenders look completely out of gas. And then there’s this guy. He’s got a microphone. What’s Sexy Sailor going to tell us?
“I’m going to set up this ladder here and teach these two shitcoiners a lesson.”
Chants of “SWC, SWC,” ring out.
Sailor scales the ladder, mic in hand.
There’s a hush in the arena.
“What do we say when some contender claims to be the next big thing?”
Still quiet.
“We say this. THERE IS NO SECOND BEST.” Sailor drinks in the atmosphere and puts his hand to his ear, motioning for the crowd to continue.
60,000 people in unison chant, “THERE IS NO SECOND BEST CRYPTO ASSET.”
Sailor reaches for the briefcase. He has it. Sexy Sailor wins the Money in the Bank match. Confetti falls and he climbs back down to the canvas. Ethereal Ghoul and Sergeant Sol Anna slink out of the ring, hobbling back up the ramp.
“Wait,” he says. “Let’s see what’s in this briefcase.”
Oh my, he’s tossing banknotes everywhere. Covering the ring. Some have floated in the crowd. It’s like an ATM explosion.
“Hey, ghoul. Sol Anna. You see this paper? It’s even more worthless than you.”
Finally, the guest referee Raúl Mal gets back to his feet. He raises Sexy Sailor’s hand, confirming the winner of the Money in the Bank match CryptoSlam 2025.
Oh no! Not again. Sailor takes aim at Mal’s groin. Blam. Money shot. And again. Mal is down again. Surely he can’t come back from this.
“I’ve still got this mic. It’s over when I say it’s over.”
A few more shouts of “Sailor” ring out.
“This is what I think of your worthless fiat.”
He’s dropping his pants. Not again. Oh no. This is not what SWC audiences want to see.
“All these banknotes are good for… is wiping my gray hairy ass.” He turns to the contenders still fleeing the scene. “Have fun staying poor, shitcoiners,” he screams, and then drops the mic.
What an event. What a match, people!
Keep watching. We’ve got the Royal Rugpull coming right up. Thirty-two of SWC’s top memecoins are battling it out here at CryptoSlam 25. Don’t go ANYWHERE.
-
@ 2cde0e02:180a96b9
2025-06-02 17:03:04pen; monochromized
https://stacker.news/items/995339
-
@ da8b7de1:c0164aee
2025-06-02 16:24:06Amerikai nukleáris végrehajtási rendeletek és szakpolitikai fejlemények
2025.05.23-án az amerikai kormány négy jelentős végrehajtási rendeletet adott ki, amelyek célja egy „nukleáris reneszánsz” felgyorsítása a következő 25 évben. Ezek a rendeletek egy, az egész kormányzatra kiterjedő tervet határoznak meg a 400 GW nukleáris kapacitás elérésére 2050-ig, lefedve az ipar minden területét: engedélyezés, üzemanyagciklus, reaktortechnológia, ellátási lánc, munkaerő, hulladékkezelés, finanszírozás és nemzetközi megállapodások. Azonnali intézkedések között szerepel a biztonságos hazai üzemanyag-ellátás megteremtése, szabályozási reformok, a reaktor-telepítések felgyorsítása, valamint pénzügyi és diplomáciai eszközök alkalmazása az amerikai nukleáris technológia belföldi és nemzetközi előmozdítására. A rendeletek gyorsított szabályozási eljárásokat írnak elő – például az NRC-nek (Nuclear Regulatory Commission) 18 hónapon belül kell elbírálnia az új reaktorokra vonatkozó kérelmeket –, valamint kibővített szerepet adnak az Energiaügyi és Védelmi Minisztériumoknak az engedélyezésben és telepítésben, beleértve a szövetségi földeken való elhelyezést is.
Az NRC jóváhagyta a NuScale kis moduláris reaktor (SMR) tervét
Az amerikai NRC jóváhagyta a NuScale Power 462 MW kapacitású kis moduláris reaktor (SMR) erőművének tervét, ami jelentős mérföldkő az új típusú nukleáris technológiák bevezetésében. Ez az engedélyezés a tervezettnél korábban történt, így a NuScale az egyetlen SMR, amely NRC-tervjóváhagyással rendelkezik, és technológiája hivatkozási alap lehet a jövőbeli építési és üzemeltetési engedélykérelmekben. A tervet kifejezetten nagy adatközpontok és ipari ügyfelek számára fejlesztették, a gyártási kapacitás már elérhető a dél-koreai Doosan vállalatnál. A NuScale várhatóan 2025 végéig szerzi meg első amerikai ügyfelét, és az első erőmű akár 2030-ra üzembe léphet, ha sikerül gyorsan szerződést kötni. Az NRC jóváhagyása szélesebb körű lendületet ad az amerikai fejlett nukleáris iparnak, beleértve a közelmúltbeli végrehajtási rendeleteket is, amelyek célja a reaktor-telepítések bővítése és a hazai ellátási láncok megerősítése.
Amerikai uránellátás és piaci helyzet
Az amerikai uránszektor kritikus ponthoz érkezett, kétpárti politikai támogatással és az adatközpontok, valamint az alapvető villamosenergia-igények növekvő keresletével. Az iparági vezetők egy közelgő kínálati hiányra figyelmeztetnek, mivel a magas minőségű készletek kimerülnek, és az új termelés beindítása nehézségekbe ütközik. Az új termelés ösztönző ára jelenleg 100 dollár felett van fontonként, ami meghaladja a jelenlegi spot árakat, így a már működő termelők előnyben vannak. A legutóbbi végrehajtási rendeletek és a Section 232 vizsgálatok megerősítik a kormány elkötelezettségét a hazai urántermelés és az ellátási lánc biztonsága mellett. Az orosz urán tilalom, amely 2028-ban lép teljesen életbe, tovább szűkíti a nyugati ellátást, a mentességek várhatóan a geopolitikai feszültségek miatt hamarabb megszűnnek. Kína gyors nukleáris fejlesztése tovább növeli a keresletet, ami kettéosztott globális uránpiacot eredményez.
Az amerikai urándúsítási kapacitás bővítése
Az Urenco USA megkezdte a termelést legújabb gázcentrifuga-egységében a New Mexico-i National Enrichment Facility-ben, ezzel mintegy 15%-kal bővítve a hazai dúsítási kapacitást. Ez a bővítés célja, hogy csökkentse az orosz ellátástól való függőséget, és támogassa az amerikai nukleáris üzemanyag-ellátási láncot. Az Urenco USA, az ország egyetlen kereskedelmi dúsított urán előállítója, jelenleg az amerikai atomerőművek szükségletének mintegy egyharmadát fedezi, és további bővítést fontolgat a piaci kereslet függvényében.
Nemzetközi nukleáris energetikai fejlemények
Globális nukleáris reaktor-építési hullám van kibontakozóban, élen az Egyesült Királysággal, Törökországgal, Lengyelországgal, valamint ázsiai és afrikai országokkal. Több mint 30 ország vállalta, hogy 2050-ig megháromszorozza a globális nukleáris kapacitást a nettó zéró kibocsátás és az energiabiztonság érdekében. Az atomtechnológia exportja továbbra is jelentős bevételi forrás Oroszország számára, miközben az Egyesült Államok jogalkotási és szakpolitikai lépéseket tesz a nukleáris export és együttműködés vezető szerepének biztosítására; a Szenátus Külügyi Bizottsága hamarosan tárgyalja azt a törvényjavaslatot, amely az amerikai nukleáris exportot hivatott erősíteni, hogy Kínát és Oroszországot megelőzze a globális piacon.
Ipari partnerségek és katonai alkalmazások
Az amerikai Védelmi Minisztérium nyolc céget választott ki mikroreaktor-technológiák fejlesztésére katonai létesítmények számára, azzal a céllal, hogy decentralizált, skálázható mikroreaktor-rendszereket hozzanak létre kritikus energiaigények kielégítésére. Ez a kezdeményezés a kereskedelmi mikroreaktor-fejlesztést és a kapcsolódó ellátási láncok megerősítését is ösztönzi, az NRC szabályozási útvonalainak kihasználásával.
Érintetti bevonás és konferenciák
A Nemzetközi Atomenergia Ügynökség (IAEA) nemrégiben zárta első, a nukleáris programok érintetti bevonásáról szóló nemzetközi konferenciáját Bécsben, amely hangsúlyozta a nyilvánosság és az érintettek bevonásának fontosságát a nukleáris energiafejlesztés minden szakaszában, hogy bizalmat építsenek és megalapozott döntéshozatalt támogassanak.
Források:
- world-nuclear-news.org
- nucnet.org
- iaea.org
- utilitydive.com
- observer.co.uk
- ans.org
-
@ 3b7fc823:e194354f
2025-02-02 22:55:32The Secret to Staying Private in the Digital Wild West: A Guide to Using Encryption
You’re scrolling through social media, and suddenly you realize your phone’s been tracking your location and displaying it on your profile for months. You’re not even sure how that happened. Or maybe you’ve noticed that every time you shop online, the item you looked for follows you around with ads wherever you go. Sound familiar? Yeah, welcome to the digital world—where your data is basically a free buffet for anyone who knows how to ask.
But here’s the thing: you don’t have to sit back and take it. Encryption is like the secret weapon that lets you lock up your data and keep those prying eyes out. It’s not just for hackers or spies—it’s for regular people who want to take control of their privacy in a world that’s increasingly looking like a reality show where everyone’s a contestant.
What Is Encryption, and Why Should You Care?
Encryption is like a secure box that only you can open. When you use encryption, your data is scrambled in a way that’s hard for anyone else to read, even if they try. Think of it as putting on a metaphorical cloak that makes your online activity invisible to just about everyone except the people you want to see it.
For example, when you browse the internet, your connection is often not encrypted by default. That’s why websites start with “https” to indicate a secure connection—it’s saying, “Hey, we’re using encryption here!” Without that little green padlock, anyone on the same WiFi could potentially spy on what you’re doing.
So, encryption isn’t just for tech geeks or government agencies. It’s for everyone who wants to protect their data from being sold, stolen, or misused without their consent. And guess what? You’re already using it without realizing it. Every time you use a password-protected account or send an encrypted message, you’re reaping the benefits of encryption.
The Privacy Advantages of Encryption for Regular People
Let’s break down why encryption is your best friend when it comes to privacy:
-
Financial Transactions
When you pay online or use a banking app, encryption keeps your financial info safe from hackers. It ensures that only the banks and businesses you’re dealing with can access your money—no one else can. -
Online Accounts
Your email, social media, and other accounts often use encryption to protect your login details. That’s why you see those little “lock” icons when you’re logging in. Without encryption, someone could potentially intercept your password and gain unauthorized access to your account. -
Data Breaches
Encryption can often prevent data breaches from being useful. Even if hackers manage to steal your information, the encryption makes it unreadable, so the stolen data is basically worthless to the attackers. -
Location Data
If you’re worried about apps tracking your every move, encryption can help limit how much of that data is accessible. Some apps use encryption to protect location data, making it harder for companies to sell your movements without your consent. -
Privacy Protection
Encryption acts as a layer of protection against invasive technologies. For example, some apps use tracking software that follows you around the internet based on your browsing history. With encryption, these trackers can be blocked or limited, giving you more control over what information is collected about you.
How to Use Encryption Like a Pro
Now that you know why encryption is essential for privacy, let’s talk about how to use it effectively:
-
Use Strong Passwords
Encryption works only if your passwords are strong and unique. Don’t reuse passwords from one account to another, and avoid using easily guessable information like “password123” or your birth year. Use a password manager if you need help keeping track of them. -
Enable HTTPS Everywhere
Install browser extensions like HTTPS Everywhere to automatically encrypt your connections to websites that don’t support encryption by default. This ensures that even if you’re not actively thinking about it, your data is still protected. -
Look for the Lock Icon
Whenever you’re on a website or app, look for the lock icon in the URL bar. Make sure it’s encrypted before you input any personal information. -
Use Encrypted Communication Tools
For private conversations, use apps like Signal or SimpleX, which are designed with encryption in mind. These tools ensure that only the sender and recipient can read your messages, keeping them safe from prying eyes. -
Enable Two-Factor Authentication (2FA)
This isn’t exactly encryption, but it’s a close second. 2FA adds an extra layer of security by requiring you to provide two forms of verification—like your password and a code sent to your phone—to access your account. While not encryption itself, it works alongside encryption to keep your accounts secure. -
Use Encrypted Storage and Backup
When storing sensitive files or data, use encrypted cloud storage or external drives. Tools like BitLocker (for Windows) or AES-256 encryption can protect your files from unauthorized access. -
Stay Updated
Encryption technology is always evolving, so it’s important to keep your software and apps updated. Outdated systems are often easy targets for hackers, leaving you vulnerable to attacks.
Final Thoughts: Your Data Is Your Power
In a world where data is a commodity, encryption is your weapon against the invasive tactics of corporations and hackers alike. It empowers you to control what information you share and protects you from having it used against you. So, whether you’re shopping online, using your favorite apps, or just browsing the web, remember that encryption is there to help you stay private and in control of your own data.
And if you ever feel overwhelmed by all the privacy stuff, just remember this: you’re not alone. Millions of people are fighting for stronger privacy protections every day. So, do your part by using encryption wisely—your data and your privacy are worth it. Let’s make sure no one can take that away from you.
Advocating for privacy does not finance itself. If you enjoyed this article, please consider zapping or sending monero
82XCDNK1Js8TethhpGLFPbVyKe25DxMUePad1rUn9z7V6QdCzxHEE7varvVh1VUidUhHVSA4atNU2BTpSNJLC1BqSvDajw1
-
-
@ f85b9c2c:d190bcff
2025-06-02 20:40:161. Mosquitoes Danger: Although small, mosquitoes are the deadliest animals on Earth due to the diseases they transmit, such as malaria, dengue fever, and Zika virus, causing millions of deaths annually.
2. Box Jellyfish Danger: Found in the waters of the Pacific and Indian Oceans, its tentacles contain toxins that can cause heart failure in just a few minutes. It is considered one of the most venomous creatures in the world.
3. Saltwater Crocodile Danger: The largest living reptile, saltwater crocodiles are apex predators capable of killing and eating almost any animal, including humans. They are aggressive and can attack from the water without warning.
4. African Elephant Danger: While usually peaceful, African elephants can be extremely dangerous when threatened or provoked. They are capable of charging at speeds up to 25 miles per hour, with enough force to kill.
5. Cape Buffalo Danger: Known for being unpredictable and highly aggressive, the Cape buffalo is responsible for more deaths in Africa than any other large animal. They are strong and can charge at high speeds.
6. Poison Dart Frog Danger: Native to Central and South America, these small frogs have skin that produces potent toxins, which can be deadly to predators and humans if touched or ingested.
7. Great White Shark Danger: Great whites are among the largest predatory fish in the world and are capable of attacking humans. While attacks are rare, their size, speed, and sharp teeth make them formidable predators.
As the saying goes there is beauty in every living things,tho this wild animals are dangerous but only because they are overly protective of themselves and offsprings ,wild life should be cherished and not seen as a competition for the planet.
-
@ 2e8970de:63345c7a
2025-06-02 16:18:59https://www.wsj.com/tech/europe-global-tech-race-ff910a94
https://stacker.news/items/995308
-
@ e516ecb8:1be0b167
2025-06-02 15:22:40Bitcoin was born as a middle finger to the financial establishment. Its 2008 whitepaper, penned by the enigmatic Satoshi Nakamoto, promised a peer-to-peer (P2P) electronic cash system—a decentralized rebellion against state-controlled money, sparked in the ashes of the global financial crisis. It was a cypherpunk dream: a currency free from banks, governments, and middlemen. But somewhere along the way, Bitcoin lost its soul. What was meant to be a fluid, practical currency has morphed into a clunky, expensive digital vault—a gilded cage for your wealth. Let’s unpack why Bitcoin is broken, why its fixes are flimsy, and why its rebellious spirit is fading into a state-backed shadow of its former self.
The P2P Promise: Shattered by Sky-High Fees Bitcoin’s core idea was simple: send money directly to anyone, anywhere, without a bank skimming off the top. Fast forward to today, and that vision is in tatters. Imagine you’ve got $34 in Bitcoin to send to a friend. By the time it arrives, after transaction fees, they might get a measly $2. According to data from BitInfoCharts, the average Bitcoin transaction fee in early 2025 hovers around $20–$30, with spikes as high as $60 during network congestion. For context, that’s more than the cost of a Venmo transfer or even some international wire fees.
This isn’t a one-off issue. Wallets like Guarda, Exodus, or even hardware wallets like Ledger face the same problem: Bitcoin’s base layer (Layer 1) is so congested that fees make small transactions absurdly impractical. Want to buy a $5 coffee with Bitcoin? You’d lose more in fees than the coffee’s worth. This isn’t P2P money—it’s confiscatory, inefficient, and anything but user-friendly.
Lightning Network: A Band-Aid on a Broken System Cue the Bitcoin maximalists: “But we have the Lightning Network!” Sure, Lightning was introduced as a second-layer solution to scale Bitcoin for smaller, faster transactions. It’s a network of off-chain payment channels designed to handle microtransactions with lower fees. Sounds great, right? Except it’s a patchwork fix that betrays Bitcoin’s original vision.
First, Lightning wasn’t part of Satoshi’s plan—it’s an afterthought, a kludge to address the base layer’s limitations. Second, it’s not universally adopted. According to 1ML, as of early 2025, only about 15% of Bitcoin wallets natively support Lightning. Major wallets like Coinbase Wallet and Trust Wallet still require workarounds or third-party integrations. Why? Because implementing Lightning is complex, and for most users, it involves trusting third-party nodes or custodians to route payments. So much for “be your own bank.”
Worse, running your own Lightning node requires technical know-how—think Linux commands, channel management, and constant monitoring. A 2024 survey by Bitcoin Magazine found that only 8% of Bitcoin users run their own nodes, Lightning or otherwise. For the average person, Lightning isn’t a solution; it’s a hurdle. And if you’re relying on a third party, you’re back to square one: trusting someone else with your money.
Take Adrián Bernabeu, author of Bitcoinismo, who preaches the gospel of self-custody while simultaneously hyping Lightning for micropayments. It’s a contradiction. You can’t champion “not your keys, not your crypto” while pushing a system that often requires third-party intermediaries for practical use. It’s like telling someone to live off-grid but handing them a generator that only works with a utility company’s permission.
A Gilded Cage: Bitcoin as a Store of Value So, if Bitcoin isn’t practical for payments, what’s it good for? The narrative has shifted: Bitcoin is now a “store of value,” a digital gold. Its price has soared—hitting $80,000 in late 2024, per CoinGecko—and its fixed supply of 21 million coins makes it a hedge against inflation. But this shift isn’t just about market dynamics; it’s a consequence of Bitcoin’s own flaws.
Moving Bitcoin is so expensive that it’s often smarter to hodl than to spend. Your wallet becomes an orange-tinted cage, trapping your wealth in a system where transferring value eats away at your holdings. Sure, you could wait for fees to drop, but that’s another nail in the P2P coffin. Real money doesn’t make you wait for a discount to use it. Imagine telling someone, “Hold off on buying groceries until the dollar’s transaction fees go down.” It’s absurd.
OP_RETURN and the Spam Problem: A Network Clogged with Junk Bitcoin’s blockchain isn’t just struggling with fees; it’s also drowning in digital clutter. The OP_RETURN function, meant for embedding small amounts of data (like metadata for smart contracts), has become a dumping ground for everything from NFT inscriptions to random spam. In 2023, Glassnode reported that OP_RETURN transactions accounted for nearly 20% of Bitcoin’s block space during peak periods, crowding out legitimate transactions and driving up fees.
Proposed fixes from Bitcoin Core and Knots—like limiting OP_RETURN data size or tweaking mempool rules—are more Band-Aids. They don’t address the root issue: Bitcoin’s block size limit. Capped at 1MB (or roughly 4MB with SegWit), Bitcoin can only process about 3–7 transactions per second, compared to Visa’s 24,000. Increasing the block size could ease congestion and lower fees, but Bitcoin Core developers have resisted this for years, citing concerns about centralization.
Here’s the kicker: Bitcoin Cash (BCH), a 2017 fork of Bitcoin, raised its block size to 32MB and processes transactions at a fraction of the cost. BCH’s average fee in 2025 is under $0.01, per BitInfoCharts. Bitcoin maximalists dismiss BCH as a failed experiment, but it’s hard to argue with the numbers. A larger block size reduces spam’s impact because legitimate transactions dominate. Admitting this, though, would mean conceding defeat in a years-long ideological battle. And Bitcoiners hate losing.
From Rebellion to Regulatory Lapdog Bitcoin’s cypherpunk roots are fading fast. What started as a revolt against state control is cozying up to governments. El Salvador made Bitcoin legal tender in 2021, but its state-backed Chivo wallet (built on Lightning) is riddled with bugs and usability issues, according to a 2024 Reuters report. Meanwhile, Bitcoin Core developers have lobbied for institutional adoption, with figures like Michael Saylor advocating for Bitcoin as a strategic reserve asset for governments and corporations.
This is a far cry from Satoshi’s vision. A 2023 post on X revealed that Core developers met with U.S. regulators to discuss Bitcoin’s role in national reserves—a move that reeks of compromise. The same system Bitcoin was meant to disrupt is now being courted. If governments start subsidizing Bitcoin mining to protect their reserves, as some speculate, the irony will be complete: a decentralized dream bankrolled by fiat.
The Looming Threats: Quantum and Mining Woes Bitcoin’s problems don’t end with fees and politics. Quantum computing looms on the horizon. A 2024 MIT Technology Review article estimated that quantum computers capable of breaking Bitcoin’s ECDSA cryptography could emerge by 2030. This threatens “Satoshi-era” wallets—those holding early, unspent coins—potentially undermining trust in the entire blockchain.
Then there’s mining. Bitcoin’s proof-of-work system is energy-intensive, with global mining consuming 150 TWh annually, per the Cambridge Bitcoin Electricity Consumption Index. As block rewards halve (the next halving is in 2028), miners will rely more on transaction fees. Higher fees mean even less practicality for P2P payments, locking Bitcoin further into its “digital gold” trap. If states step in to subsidize mining, as some X posts have speculated, Bitcoin’s anti-establishment ethos will be dead in the water.
The Final Irony: Paying for Freedom with Fiat Bitcoin promised to replace fiat currency, but its flaws are pushing it toward a bizarre dependency on the very system it sought to destroy. If governments subsidize mining or adopt Bitcoin as a reserve asset, we’ll be left with a bitter irony: a supposedly revolutionary asset propped up by fiat. The cypherpunk dream will have come full circle, not as a triumph, but as a compromise.
So, is Bitcoin broken? Yes. It’s a victim of its own success—too valuable to spend, too clunky to use, and too compromised to stay true to its roots. The question isn’t whether Bitcoin can be fixed; it’s whether its community has the courage to admit what’s wrong. Until then, your Bitcoin wallet remains a shiny, orange prison—a relic of a rebellion that forgot how to fight.
-
@ 3b7fc823:e194354f
2025-02-02 13:39:49Why You Should Only Run DeepSeek Locally: A Privacy Perspective and how to
In an era where AI tools promise immense utility, the decision to run DeepSeek locally is not merely about functionality but also about safeguarding privacy and security. Here's the rationale why:
-
Control Over Data Access: Running DeepSeek locally ensures that data processing occurs on your own machine or server, allowing you to have full control over who can access the system. This reduces the risk of unauthorized access and misuse.
-
Data Privacy: By keeping computations local, you ensure that personal data does not leave your control, minimizing the risk of exposure through cloud-based services.
-
Security Measures: Local operation provides an additional layer of security. You can implement access controls, monitor usage, and respond to incidents more effectively, which might be harder or impossible when relying on third-party platforms.
-
Practical Implementation: Tools like Ollama and OpenWebUI facilitate setting up a local environment, making it accessible even for those with limited technical expertise. This setup empowers individuals to leverage AI capabilities while maintaining privacy.
-
Right to Control Data: Privacy is a fundamental right, and running DeepSeek locally respects this by allowing users to decide what data they share and how it's accessed. This empowers individuals to make informed choices about their personal data.
For those prioritizing privacy, this approach is not just beneficial—it's essential.
Running DeepSeek Locally: A Guide for Individual Home Users
DeepSeek is a powerful AI search engine that can help with various tasks, but running it locally gives you greater control over your data and privacy. Here’s how you can set it up at home.
What You’ll Need
- A Computer: A desktop or laptop with sufficient processing power (at least 4GB RAM).
- Python and pip: To install and run DeepSeek.
- Ollama: An open-source tool that allows you to run AI models locally.
- OpenWebUI: A simple web interface for interacting with Ollama.
Step-by-Step Guide
1. Install the Prerequisites
- Python: Download and install Python from https://www.python.org.
- pip: Use pip to install Python packages.
bash pip install --upgrade pip
- Ollama:
bash pip install ollama
- OpenWebUI: Visit https://github.com/DeepSeek-LLM/openwebui and follow the instructions to install it.
2. Set Up Ollama
- Clone the official Ollama repository:
bash git clone https://github.com/OllamaAI/Ollama.git cd Ollama
- Follow the installation guide on https://ollama.ai to set it up.
3. Run DeepSeek Locally
- Use OpenWebUI as your interface:
bash # Start OpenWebUI (open a terminal and run this): python openwebui.py --model deepseek-llm-v0.2-beta
- A web browser will open, allowing you to interact with DeepSeek.
Tips for Optimization
- Reduce Memory Usage: Use smaller models like
deepseek-llm-v0.2-beta
if your computer has limited resources. - Limit Model Access: Only allow authorized users to access the system by restricting IP addresses or using a VPN.
- Regular Updates: Keep all software up to date to protect against vulnerabilities.
Why Run DeepSeek Locally?
- Privacy: Your data stays on your local machine, reducing the risk of unauthorized access.
- Flexability: Running locally allows you to build specific models for specific uses and provide them with RAG data.
Advocating for privacy does not finance itself. If you enjoyed this article, please consider zapping or sending monero
-
-
@ 3b7fc823:e194354f
2025-02-02 03:16:40Why Privacy Matters and How to Protect It
Privacy is about control. It’s not about hiding yourself but deciding what others can see about you. Just as you don’t share everything when buying a magazine, technology shouldn’t force you to reveal more than needed.
Why Privacy is Important
-
Personal Control: Privacy lets you choose what parts of your life are visible. You shouldn’t have to share everything just to use a service.
-
Security Against Exploitation: Without privacy, people and groups can be targeted by companies or governments. This abuse can lead to data breaches or unnecessary surveillance.
-
Building Trust: Privacy is key to trust in relationships and communities. When your info is safe, you can transact and communicate without fear of misuse.
How to Protect Your Privacy 1. Think Before You Share: Only share what’s necessary and know why you’re doing it. 2. Use Encryption: Encrypt sensitive communications like emails or messages. 3. Control Data Sharing: Avoid oversharing personal details online. 4. Enable Privacy Tools: Use VPNs or privacy settings on social media to shield your data. 5. Be Mindful of Metadata: Understand that metadata (like location data) can reveal more about you than the content itself. 6. Support Privacy-Focused Brands: Choose services that prioritize privacy, like encrypted messaging apps. 7. Read Privacy Policies: Know what data you’re sharing and with whom. 8. Tools like privacy.io can help visualize your digital footprint. 9. Block Trackers: Use tools like DoNotTrackMe or uBlock Origin to stop trackers from collecting your data.
Conclusion
Protecting privacy is a vital step in safeguarding your personal freedoms. By taking proactive measures, you can control what information is accessible and ensure that your rights are respected. Remember, you are your own best advocate for privacy—trust no one but yourself to protect your data and identity.
Join the movement to champion privacy as a fundamental human right. Advocate for stronger laws and encourage others to take action, so we can all enjoy safer, more secure digital environments.
-
-
@ cae03c48:2a7d6671
2025-06-02 20:01:49Bitcoin Magazine
Jack Mallers Announced A New System of Bitcoin Backed Loans at StrikeThe Founder and CEO of Strike, Jack Mallers, at the 2025 Bitcoin Conference in Las Vegas, announced a new system of Bitcoin backed loans at Strike with one digit interest rate.
Jack Mallers began his keynote by pointing at the biggest problem. Fiat currency.
“The best time to go to Whole Foods and buy eggs with your dollars was 1913,” said Mallers. “Every other time after, you are getting screwed.”
What’s the solution?
“The solution is Bitcoin,” stated Mallers. “Bitcoin is the money that we coincide that nobody can print. You can’t print, you can’t debase my time and energy, you cannot deprive me of owning assets, of getting out of debt, of living sovereignly and protecting my future, my family, my priced possessions. Bitcoin is what we invented to do that.”
Mallers gave a power message to the audience by explaining that people should HODL every dollar they have in Bitcoin. People should also spend a little of it to have a nice life.
“You can’t HODL forever,” said Jack.
While talking about loans that people borrow against their Bitcoin. He explained why he thinks banks putting 20% in interest for loans backed with Bitcoin is outrageous.
“All these professional economists, they are like Bitcoin is risky and volatile,” stated Mallers. “No it’s not. This is the magnificent 7 one year volatility and the orange one in the middle is Bitcoin. It’s no more risky and volatile. It’s a little bit more volatile than Apple, but is far less more volatile than Tesla.”
“As Bitcoin matures, its volatility goes down,” continued Jack. “Bitcoin volatility is at a point where it is no more risky than a Tesla Stock. We should not be paying double digits rates for a loan.”
Mallers announced his new system of loans at Strike of 9-13% in interest rates. It will allow people to get loans from $10,000 to $1 billion.
Mallers closed by saying, “please be responsible. This is debt. Debt is like fire in my opinion. It can heat a civilization. It can warm your home, but if you go too crazy it can burn your house down.”
“Life is short,” said Jack. “Take the trip, but with bitcoin you just get to take a better one.”
This post Jack Mallers Announced A New System of Bitcoin Backed Loans at Strike first appeared on Bitcoin Magazine and is written by Oscar Zarraga Perez.
-
@ 975e4ad5:8d4847ce
2025-06-02 14:01:13Inflation vs. Deflation: What’s the Difference?
Today, we use fiat currencies—dollars, euros, or leva—issued by governments and central banks that can print money without limit. This leads to inflation, a decrease in the purchasing power of money because the money supply grows faster than the goods and services in the economy. The result? Prices for everything—from bread to cars—rise over time.
Bitcoin, unlike fiat money, has a hard cap of 21 million coins, set to be fully “mined” by 2140. This means the money supply is fixed and can’t be arbitrarily increased. In such a system, as technology improves production and the economy grows, the amount of goods and services increases, but the money supply stays the same. The result is deflation—prices fall because the same amount of money is chasing more goods.
The Bread Example
Take bread as an example. Fifty years ago, making bread required a lot of manual labor—kneading, shaping, baking. Today, machines handle most of the process, from mixing dough to packaging. Production is faster, more efficient, and requires fewer workers. Logically, bread should be cheaper, right? Yet, its price has risen from, say, 20 cents decades ago to $1 today. Why? Because inflation, driven by printing more money, outpaces the cost savings from technology. In a Bitcoin standard, those same technological advancements would lead to cheaper bread since there’s no excess money “diluting” purchasing power.
Wages in a Deflationary World
Now, picture your boss saying, “We’re cutting your salary this year.” Sounds like a nightmare, doesn’t it? In today’s world, we expect wage increases to “keep up” with inflation. But in a deflationary world, where prices are falling, a lower salary isn’t a problem. If bread, rent, and clothes get cheaper, you can buy more with less money. For example, if your salary drops from $2,000 to $1,800 but bread falls from $1 to $0.75, your real purchasing power actually increases. It’s a radically different mindset, but it makes sense in a world with a fixed currency.
Why Is This So Hard to Grasp?
The idea of falling prices and wages feels alien because we were born into an inflationary world. From childhood, we’ve seen the cost of everything—food, housing, even coffee at our favorite café—steadily rise. Inflation is so ingrained that we assume prices must go up. But this isn’t a natural law; it’s a consequence of the fiat system. A century ago, when gold backed currencies, prices often stayed stable or even fell as technology advanced. A Bitcoin standard would bring us back to that dynamic.
What Else Should We Know?
A deflationary world brings other fascinating changes. People would save more because their money would be worth more tomorrow. Today, inflation erodes savings, pushing us to spend or invest quickly. In a Bitcoin standard, we’d value the future more since our savings would grow in real value. But there are challenges too—deflation might discourage risky investments because people prefer holding money over spending it on uncertain ventures.
Moreover, a Bitcoin standard reshapes how we think about debt. Today, we take loans knowing tomorrow’s money will be worth less, making repayment easier. In a deflationary world, debts become heavier because you’d owe more real value tomorrow. This could make us more cautious and responsible with borrowing.
A Bitcoin standard invites us to rethink the economy we grew up in. Falling prices and stagnant or declining wages sound like a fantasy, but they’re the logical outcome of a currency with a fixed supply. Technology will keep making life easier and more efficient, and in a world without inflation, this would translate to lower prices and greater purchasing power. Maybe it’s time we stop taking inflation for granted and imagine a world where our money grows more valuable over time.
-
@ 44dc1c2d:31c74f0b
2024-09-25 20:15:13Chef's notes
Last time I made this I subbed the tomato puréed with some blistered cherry tomatoes. Don't think I'll be using the purée going forward.
I prefer thighs so that's what I use for this but use whatever you want.
Adjust spices based on the size of your onions. If all you have is two massive onions maybe use one and a half onion or just up the amount of spices a little.
Details
- ⏲️ Prep time: ~10 min
- 🍳 Cook time: ~40 ish min
- 🍽️ Servings: 4
Ingredients
- 2 Onions
- 2 tbsp tomato purée
- 1/3 cup cashews
- 1.5 tsp Garam Masala
- 2 ish cloves of crushed garlic
- 1 tsp chili powder
- 1 tbsp lemon juice
- 1/4 tsb ground turmeric
- 1 tsb salt
- 1 tbsp plain yogurt
- 2 tbsp of your cooking oil or fat
- 1 tbsp Coriander (Cilantro) plus extra for garnish
- 1 tbsp sultanas (golden raisins)
- 1 lb of chicken cubed
- 6 oz of white button mushrooms
Directions
- Quarter the onions and put them in a food possessor for about a minute
- Add the tomatoes, nuts, garlic, Garam masala, chili powder, lemon juice, turmeric, salt, yogurt and blend for another minute tell its well mixed in.
- In a wok or a large pan heat your cooking oil and add the onion and spice mix in. Fry gently for around 2-ish minutes, stir frequently.
- Add the chicken, coriander, and raisins to the pan. Stir-fry for another minute or so.
- Add mushrooms and water. Bring to simmer and cover the pan cook for 10 min or until the chicken is 100% cooked through.
- Serve with plain rice and enjoy!
-
@ cbaa0c82:e9313245
2025-06-02 13:31:13TheWholeGrain - #May2025
Last May, during our first year of releasing content we created and awarded our first badge on NOSTR. It was the first minting of the Official Fan Badge. We wanted to do it again a year later!
As Bread and Toast moves along we want to be able to recognize the fans who motivate us to keep sharing our journey and all of our adventures!
Our first Sunday Single of May 2025 was a tribute to all the fans we currently have because there is nothing quite like a good fan! As previously mentioned, we also released the second minting of the Official Fan Badge! Thank you to everyone who follows, zaps, reacts, and comments on all of the notes posted to NOSTR by Bread and Toast!
Even more incredible than that was the announcement of the Yarn Buddy! A yarn based plushie of Bread handcrafted by the one and only Yarnlady! The announcement was made on May 19th, and it is without a doubt our best merchandise product so far! https://i.nostr.build/cscbHW6oWqVtxmyT.png Learn more about the Yarn Buddy below.
Sunday Singles - May 2025 2025-05-04 | Sunday Single 91 Title: A Good Fan We cannot say this enough... We love our fans! https://i.nostr.build/h6KzGz8kleYdmQxM.png
2025-05-11 | Sunday Single 92 Title: Hang Gliding Bread loves the thrill of flying through the air https://i.nostr.build/JCA656iy7L9bDLYF.png
2025-05-18 | Sunday Single 93 Title: String Theory Bread stumbled upon a spool of yarn and got an idea. It might knot be what you expected... Yarn't gonna believe what's coming next! https://i.nostr.build/mazQZkGKwzUz1O3O.png
2025-05-25 | Sunday Single 94 Hot Air Balloon Sometimes Bread and End-Piece claim Toast is full of hot air so why not put it to some use! https://i.nostr.build/1VIeBl2rW7aVD6Hb.png
Adventure Series: Questline The effects of the darkness of the forest begin to become stronger as Toast and End-Piece lose sight of Bread and the light of the magical staff.
Artist: Dakota Jernigan (The Bitcoin Painter) Writer: Daniel David (dan 🍞)
2025-05-06 | Questline 009 - Pitch Black Due to their hesitation, Toast and End-Piece lose sight of their leader's magical light... They try to stay close to one another for their own safety, but no one ever feels safe in the pitch black darkness of the forest. https://i.nostr.build/Kre0BR4ylKShhTLE.png
2025-05-20 | Questline 010 - A Light in the Dark With a magical staff lighting the way Bread keeps a quick pace in order to get through the forest as quick as possible. However, Bread begins to notice all the webs that surround the trees. With sudden concern for fellow comrades Bread turns around surprised to realize that they are no longer even there. https://i.nostr.build/KsyReXgigDlLxiLr.png
Other Content Released in May 2025 2025-05-07 | Toast's Comic Collection Title: Jugbread #13 Everyone knows Toastie’s best friend, Jugbread Jones! https://i.nostr.build/TM3fpLyVkB7PcRuK.png
2025-05-14 | Concept Art Title: Cat Attack! At some point the characters are going to face perilous challenges in the world. For example, the characters could easily come across a cat that would be quick to attack them! https://i.nostr.build/19t1GYXvmXbKUO0q.png
2025-05-21 | Bitcoin Art Title: Nodes Block Height: 897690 Every slice of bread is like an individual using the network! https://i.nostr.build/3MvvAP9RaAd7ZPwt.png
Additions to The Bakery in May 2025 We had one addition to The Bakery this past month from Dessert Dave! He says it's desert, but we'd prefer dessert. Check it out!
2025-05-17 | npub1mgvmt553uphdpxa9gk79xejq3hyzh2xfa8uh6vh236nq78mvh74q8tr9yd https://r2.primal.net/cache/c/16/80/c16806be2aa6ee9b61e5da3a291d858fb58d09598927feecf25de44c537a5a86.jpg
New Nostr Badges 2025-05-19 | Merchandise Supporter - Yarn Buddy https://i.nostr.build/U8sxNZIRHQCIgpi4.png
2025-05-20 | Official Yarn Maker https://i.nostr.build/ADe8HYeMEIQjufxM.png
2025-05-20 | Official Fan Badge 2025 https://i.nostr.build/1pEnSnW4g7nv4is7.png
Merchandise Announcement Bread and Toast made an announcement this past month on May 19th after a Sunday Single that was secretly a tease of the release with the Yarn Buddy (Limited Supply). The Yarn Buddy was made in collaboration with Yarnlady, a skilled yarn weaver who is a master of her craft. https://i.nostr.build/L5Mh74eGiB8sO1VG.png
If you are interested in purchasing the Yarn Buddy contact us by email at store@breadandtoast.com with "Yarn Buddy" in the subject line! There are only 10 in total available.
Thank you for checking out the ninth issue of The Whole Grain. The Whole Grain is released near the beginning of every month and covers all of the content released by Bread and Toast in the previous month. For all of Bread and Toast's content visit BreadandToast.com!
If you read this then you must be our biggest fan! Bread, Toast, and End-Piece
BreadandToast #SundaySingle #Questline #ToastsComicCollection #ConceptArt #BitcoinArt #Merchandise #Bread #Toast #EndPiece #Artstr #Comic #Cartoon #NostrOnly #🍞 #🖼️
List of nPubs Mentioned: Yarnlady: npub1hgvtv4zn2l8l3ef34n87r4sf5s00xq3lhgr3mvwt7kn8gjxpjprqc89jnv
The Bitcoin Painter: npub1tx5ccpregnm9afq0xaj42hh93xl4qd3lfa7u74v5cdvyhwcnlanqplhd8g
Desert Dave: npub1mgvmt553uphdpxa9gk79xejq3hyzh2xfa8uh6vh236nq78mvh74q8tr9yd
dan 🍞: npub16e3vzr7dk2uepjcnl85nfare3kdapxge08gr42s99n9kg7xs8xhs90y9v6
-
@ 862fda7e:02a8268b
2024-09-24 01:14:40The media, government, and "elite" (who are only elite in this low vibration illusion we call "life") are afraid of people like me because I do not accept the reality they have forced us into. My manifesto is an attempt to wake you up from ideas you have been conditioned into believing because it benefits one class - the protected class known as the "elite".
The elite would like to have you believe that my message is something crafted from hatred and they would like to label me with mental issues. They would like you to think I am some crazy extremist who wants to advocate for the harm of others. They would like you to think that I am enciting violence.
This could not be further from the truth.
I am not and will never be an extremist, white supermicist, terrorist, radical, hateful human being. I do not believe in killing in order to convey a message or movement. I do not believe in division.
I only advocate that you become conscious of the reality around us. The reality is that this is a world controlled by the most evil, controlling, destructive freaks. These people work to make sure we are essentially slaves to a system that benefits those who created the system - the elites. Let me make this clear: I do NOT advocate for violence, destruction, death, killing, murder, hatred, division, or terrorism. The elite are threatened by people like me, because they know that we know their game. We know their plans are to destroy, to advocate for violence, to kill, murder, to encite hatred and division. This is all the elite do - they cannot fathom having people live in peace because it isn't beneficial if you want to control the world.
So while you may think it's impossible there is a group of a few evil people who control the world - look back at history. It has always been littered with the few evil who control the many. It would be stupid to think it would be different
-
@ 005bc4de:ef11e1a2
2025-06-02 12:23:40Succotash: the connection game
Succotash is a simple "connection game" like Hex or Tak. Would love to hear any feedback.
You can take a look or play at https://succotash.vercel.app
Below is "the story"...
Serendipity: the occurrence and development of events by chance in a happy or beneficial way.
The past few days, a delightful series of events occurred and I ended up with Succotash, the game.
You can read about how it started at the Succotash announcement on Hive, but here's the lowdown:
- It began with a photo. One day, my wife lined up our little tomatoes on the counter, I snapped a pic, and put it on Nostr and it was auto-bridged over to Hive. This simple note sparked something unexpected.
- On Hive, @sherah suggested the that photo looked like a game. That gave me an itch. Could moving tomatoes on a grid make a game?
- There are lots of "connection games" where you try to connect your side to your opponent's side. Could I make a simple game?
- I drew a 5 x 5 grid of dots on paper. I had some dry corn kernels and beans nearby, so I placed them on the paper and started moving them around.
- A Hawaiian girl nearby saw what I was doing and looked at me with a very puzzled look. "It's a game. Want to play it?" We gave Succotash the first ever test run. Later that day, my wife and I sat down on the floor and played the game again. It seemed fun enough.
- I posted the announcement on Hive.
- After some suggestions in the comments about adding an element of randomization with a dice roll, I began to build an online version. The initial version 0.0.1 looked like this:
Playing the game, I wanted absolutely wanted the simplicity of corn and beans on paper. But, I felt another element was needed for game play. Plus, I wanted tomatoes. So, I added the chance to earn a sixth player piece, a "Tomato." If you move into both corners of your opponent's home, you earn a sixth game piece. Your Tomato pops into the center square and then you play normally with six pieces.
I'm really pleased with the digital version. The game is only one html file and can actually be downloaded and played offline. But, truth be told, I still prefer the real corn and beans on paper. My wife agrees.
Why "Succotash"?
At first, I wanted a tomato-themed name, but since I was using using corn and beans, "Succotash" seemed perfect - it's a dish that combines corn, beans, and vegetables. I considered calling it the "Texas Caviar Game" (since that recipe has tomatoes along with corn and beans, and because it's delicious), but "Succotash" just sounds more fun. Plus, adding tomatoes to succotash sounds yummy as well.
Keeping It Simple
A big goal was to keep the game simple. All you need is:
- A 5 x 5 grid
- 5 pieces of something and 5 pieces of something else (well, if you play with the tomatoes added, 6 of each)
Starting out, I used corn kernels and beans. But, you could use anything: bottle caps and coins, pieces of paper and paper clips, just five of anything (or 6 with the tomatoes). There is even a way to implement the randomization of an attack, with or without dice, see the Rules. I really like that this game could literally be played in the sand with sticks and stones, like we used to do as kids.
"Wow, I can't believe my little comment helped make this game real... Tomatoes, beans, and corn making a game is just the coolest thing." - sherah
Serendipity sometimes leads to wonderful, organic, and fun creations.
Succotash is open source on GitHub at https://github.com/crrdlx/succotash
Play Succotash online at https://succotash.vercel.app (or play with corn and beans on paper!). If you play, there may be glitches. Likely, there are and suggestions are welcome. Maybe the game will morph a bit further. Either way, I'd love any feedback.
Credits:
- My wife - lining up tomatoes and testing, and for being a good sport while I changed the rules on the fly.
- sherah - the idea of a game.
- Hawaiian girl - curious enough to play the game with me.
- kenny-crane - game play and testing.
- Made with ❤️ by @crrdlx.
Play Succotash online at https://succotash.vercel.app
-
@ 862fda7e:02a8268b
2024-09-16 22:59:38I was in some sort of nice romantic building and I met this nicer middle aged blonde woman who looked a lot like one of my old teachers. We got to chatting and things started moving quickly, we were going to have sexy lesbian sex but she told me she wanted me to shave my vagina before we started. I said fine, went to a bathroom and started shaving. If it meant I was going to slang some tang, I was gonna do it. It took me a long time to complete this daunting task, as I've mantioned many times before, I have a very thick and dense bush. I also wanted to make sure no hair was left behind, if my sweet lesbian lover saw that I had a hair on my vagina, she would probably freak out and call me disgusting for having a feature that naturally grows on me.
Anyways, I finished shaving my vagina and went to go meet her. Sadly, she decided to not have lesbian sex with me anymore since I took too long and she had some time to think about it. I got screwed without getting screwed. And now I had a gross hairless vagina.
I think I know why this dream occured. It's because my so called "fans" have judged me on my fan page for having hair on my vagina. Yes, I sometimes maintain it and keep it trimmed, sometimes. But sometimes I just let it go if I'm too lazy. Now the lesbians in my dreams want me to shave, and even at that, they still don't want to have sex with me. One time I remember cumming from a wet dream I had, which is very rare for me to do. I was watching 2 Japanese chicks dressed up in the school girl uniform scissor, and I remember waking up with a hard clit and it pulsated. I felt embarassed waking up, because I didn't even voluntarily masturbate but I still climaxed.
-
@ 3b7fc823:e194354f
2024-09-11 19:08:03Operational Security and Your Digital Life
I. Definitions
Operations security (OPSEC) is a process that identifies what information can be seen by threat actors, whether that information could be weaponized, and possible mitigation actions.
Your digital life is every interaction you have, all personal identifying, financial, and health information, your preferences, your habits, and any history that can be obtained both publicly and privately that has ever been recorded or digitized.
Your digital life is a incredibly rich field for various actors to observe, record, analyze, sell, and exploit for profit, harm, or control. Some of this information you give away without thinking (social media), some you give to one party but it is shared without your knowledge to other parties (data brokers, big tech), or it is taken without your consent (criminals, governments).
II. Threats
It would be impossible to list them all but a few examples:
Mass surveillance by governments to fight crime, terrorism, civil unrest, and control the population. This is across the board blanket information on everyone that is stored for later use from feeding algorithms for social credit systems to lists of people who are threats that need to be disappeared. The only variable is how explicit the government in question is doing it.
Corporate surveillance by public and private companies for marketing, market share, or selling for profit. Your data is incredibly profitable. Entire mega companies have built their entire business model on it like Google, Meta, and various Data Brokers. This information is collected and stored. It is then used internally, sold for profit, acquired by governments, or stolen by nefarious actors.
Criminal or Nefarious Surveillance for harm, control, or profit. This is a catch all from partners in a controlling relationship, angry ex's wanting revenge, religions and groups watching their members, terrorists and cults looking for people to recruit or indoctrinate, and foreign espionage to plain old criminals who want your information to sell to other criminals, looking for blackmail opportunities, to steal your financial or social accounts, or identity theft.
III. Mitigation
To do this properly a security self audit should be performed to determine exactly what assets you have to protect, how at risk they are, ranking their priority, and specific steps that are needed to protect them. I will detail how to do this for the average person in a later post but until then we will stick to generalities.
It is impossible to to block or hide all information all the time. Not only is it impossible but it would be exhausting to even try. This is where most people interested in privacy get confused, lost, and give up the idea of privacy because the only path they see to achieve it is living in a underground faraday cage out in the woods.
The only viable path is obscurity and compartmentlizion. Compartmentation of your devices, accounts, and digital selves is wildly misunderstood and not applied properly. Done incorrectly this can be disastrous if you are too casual with something that you thought was hidden or putting a spotlight on yourself by attempting to be obscured.
IV. Tactics For Everyone
Common advice I give to everyone. I don't care what your thoughts are on privacy and security, you should be doing this.
-
Do not give your personal email or phone number to anyone except friends and family. This just opens you up to spam, phishing attacks, and an identifying tracer. Use a email alias service or a throw away email account to give to stores and online accounts. Get a VOIP number for that dating app or service quote. When your real number rings, recieves texts, or get a email you know it is from someone you know and trust.
-
Use cash locally if you can and for everything else get a virtual debit or credit card with a spending limit or fixed amount. Do you really need your entire paycheck, emergency savings, life savings tied to a single card / account? Are you really entering your real credit card or banking information into a random website to buy something? Even if it's not a scam site, how well are they protecting it while in transit or storage? You will probably get the money back in case of fraud but why feed the beast and besides it's a total hassle to get your accounts frozen, wait for reimbursement, open and change accounts. Just avoid it. For extra credit you can use visa gift cards purchased with cash to obscure your financial transactions if you choose. Every financial transaction doesn't have to be public record.
-
Stop using unencrypted phone calls and SMS texts. Switch to encrypted options such as Signal or SimpleX and make anyone who wants to have contact with you reach out to you on it. Even if you "have nothing to hide" there is no reason for you to broadcast every personal conversation, comment, or shared meme with Ma'bell, the government, and anyone else listening and recording. Seriously, just stop.
V. Compartmentation of Your Digital Selves
I will keep this very high level as this article has already run longer than I intended but will cover this in much greater detail in the future.
You can break down all digital activities and interactions into several broad categories or digital selves. Then build separate systems for use in each category depending on the activity and need. The trick is to preplan what activities go where. Using the wrong account on the wrong system means they are now burned. Letting the systems overlap and contaminate each other then you risk exposing anything ever done on those systems. The separation can be accomplished with multiple accounts and devices, isolated virtual machines, or operating systems that enable compartmentation such as Qubes OS or Tails.
VI. Breakdown
- Public
This is the default. This is you. Your real name, address, and details. This is unavoidable and would be weird and attract attention if you didn't have one.
Use this for any KYC activities that you have to log into such as taxes, bank accounts, utility bills, etc. Clearnet only, you have nothing to hide.
Awareness: If it has to be public then put your best foot forward. Only show them what you want them to see and make it good and boring. Blend into the crowd of normies not important enough to pay attention to.
- Private No logins to KYC services. Traffic routed through a VPN. Use of sudo anonymous account names. You are Neo, not Mr. Anderson.
Use for most social media that is not public facing. Shopping and browsing that would be embarrassing or misunderstood if made public. Encrypted to protect against criminals and looky loos. A good default if people just don't need to know.
Awareness: Do not be confused by the word private. The goal is to make it to difficult, to expensive, or just not worth the effort to determine exactly who you are and what you are doing but it's not impossible. Only use this with the knowledge that someday it might get doxxed. That potential only increases with time and frequency of use of accounts. Not to be used for anything that could be considered illegal or has the potential to get you fired or cancelled.
- Anonymous Only single use non KYC logins. Single purpose accounts and names that are burned after achieving that purpose. Traffic routed only through Tor. Encryption by default.
Use if you are a whistle blower, freedom fighter, activist, or for shady activities.
Awareness: Be very careful and deliberate with this system as to not accidentally compromise it with something that would have been better served by a different system. Rotate and clean accounts and systems often. Don't carry stuff over after a cleaning to a new system. Reusing names and handles is how people get busted.
- Nemo
Nemo doesn't exist. There is no record that they ever existed. Only amnesiac systems are even used and never a login. If files or traces are left behind they are encrypted, hidden, and have plausible deniability.
Enjoy anon, more to come.
-