-
@ cae03c48:2a7d6671
2025-06-07 21:01:19Bitcoin Magazine
Bitcoin Life Insurer, Meanwhile, Becomes First Company to Publish Audited Financials Denominated in BitcoinMeanwhile Insurance Bitcoin (Bermuda) Limited (“Meanwhile”) announced it has become the first company in the world to release externally audited financial statements denominated entirely in Bitcoin. According to the announcement, the company reported 220.4 BTC in assets and 25.29 BTC in net income for 2024, a 300% year over year increase.
Today marks a global first & historic event for us, along with the public release of our 2024 audited financial statements, covering our 1st year of sales.
As the 1st company in the world to have Bitcoin-denominated financial statements externally audited, we are excited to…
— meanwhile | Bitcoin Life Insurance (@meanwhilelife) June 5, 2025
“We’ve just made history as the first company in the world to have Bitcoin-denominated financial statements externally audited,” said Zac Townsend, CEO of Meanwhile. “This is an important, foundational step in reimagining the financial system based on a single, global, decentralized standard outside the control of any one government.”
The financial statements were audited by Harris & Trotter LLP and its digital asset division ht.digital. Meanwhile’s financials also comply with Bermuda’s Insurance Act 1978, noting that their BTC denominated financials were approved and comply with official guidelines. The firm, fully licensed by the Bermuda Monetary Authority (BMA), operates entirely in BTC and is prohibited from liquidating Bitcoin assets except through policyholder claims, positioning it as a long term holder.
“As the first regulated Bitcoin life insurance company, we view the BTC held by Meanwhile as inherently long-term in nature—primarily held to support the Company’s insurance liabilities over decades,” Townsend added. “This makes it significantly ‘stickier’ and resistant to market pressures compared to the BTC held by other companies as part of their treasury management strategies.”
Meanwhile’s 2024 financials also revealed 23.02 BTC in net premiums and 4.35 BTC in investment income, showing that its model not only preserves Bitcoin, but earns it. The company’s reserves (also held in BTC) were reviewed and approved by Willis Towers Watson (WTW).
Meanwhile also offers a Bitcoin Whole Life insurance product that allows policyholders to save, borrow, and build legacy wealth—entirely in BTC, and has plans to expand globally in 2025.
“We are incredibly proud of today’s news as it underscores how Meanwhile is at the forefront of the next phase of the convergence between Bitcoin and institutional financial markets,” said Tia Beckmann, CFO of Meanwhile. “Now having generated net income in BTC, we have demonstrated that we are earning it through a sustainable insurance business model designed for the long term.”
This post Bitcoin Life Insurer, Meanwhile, Becomes First Company to Publish Audited Financials Denominated in Bitcoin first appeared on Bitcoin Magazine and is written by Jenna Montgomery.
-
@ a296b972:e5a7a2e8
2025-06-07 16:39:43Nur für‘s Protokoll. Hiermit erkläre ich, Georg Ohrweh, im tatsächlich vorhandenen vollen Besitz meiner geistigen Kräfte, dass Herr Lauterbach, gleich welche Position er in Zukunft noch bekleiden sollte, für mich nicht zuständig ist. Basta.
Ein Erguss dieses verhaltensoriginellen Über-alles-Bescheidwissers:
„Wir kommen jetzt in eine Phase hinein, wo der Ausnahmezustand die Normalität sein wird. Wir werden ab jetzt immer im Ausnahmezustand sein. Der Klimawandel wird zwangsläufig mehr Pandemien bringen.“
Wie kann es sein, dass solch eine Ausnahme-Gestalt, die schon rein äußerlich die Phantasie zu Vergleichen anregt, sich leider auch genauso verhält, wie die Gestalten, die in diesen Phantasien vorkommen, ungebremst auf der Panik-Klaviatur kakophonische Klänge erzeugen darf? Obwohl ein wenig Wahrheit ist auch enthalten: Wir sind tatsächlich immer im Ausnahmezustand, im Ausnahmezustand des fortgeschrittenen Wahnsinns.
Wie kann es sein, dass dieser Haaaarvardist seinen persönlich empfundenen Ausnahmezustand zum Allgemeingut erklären kann? Welche Verknüpfungs-Phantasien hat er sonst noch studiert? Er ist ja auch noch Vorsitzender im Raumfahrtausschuss. Was kommt als Nächstes? Eine Klima-Pandemie, verursacht durch außerirdische Viren, die die Temperaturen beeinflussen können? Im aktuellen Zeitgeist gibt es nichts, was nicht gedacht wird. Wem die besseren Absurditäten einfallen, der gewinnt. Man muss sich schon den gegebenen Denkstrukturen etwas anpassen, aber sich auch ein wenig Mühe geben.
Nach dem Wechsel der ehemaligen Außen-Dings zur UN (mit dem Ziel, aus den Vereinten Nationen die Feministischen Nationen zu gestalten) und des ehemaligen Wirtschafts-Dings in den Außenausschuss und als Gastdozent in Kalifornien (Thema: Wirtschaftsvernichtung unter Einbeziehung des gespannten Verhältnisses unter Geschwistern aufgrund ärmlicher Verhältnisse, am Beispiel des Märchens von Hänsel und Gretel) , jetzt auch noch der ehemalige Chef-Panikmacher zur WHO.
…und der Wahnsinn wurde hinausgetragen in die Welt, und es wurde dunkel, und es ward Nacht, und es wurde helle, und es ward Tag, der Wind blies oder auch nicht (was macht der Wind eigentlich, wenn er nicht weht?), und es ward Winter, und es wurde kälter, und es wurde wärmer, und es ward Sommer. Es regnete nicht mehr, die Wolken schwitzten. Und Putin verhinderte (wer auch sonst), dass das Eis in der Antarktis abnahm.
Wiederholte Bodentemperaturen in der Toskana von 50 Grad Celsius. Zu erwartende Wassertemperaturen während Ferragosto an der italienischen Adria von durchschnittlich 100 Grad Celsius. An Stellen mit wenig Strömung stiegen schon die ersten Kochblasen auf. Doch dann kam der durch Lachs gestählte, salzlose Super-Karl und rettete mit einem durch die WHO diktierten Klima-Logdown die gesamte Menschheit. Wer besser, als er konnte wissen, dass ein Klima-Logdown weitgehend nebenwirkungsfrei ist.
Was für ein Segen, dass Karl der Große, der uns so siegreich durch die Corona-Schlacht geführt hat, jetzt auch gegen das Klima in den Krieg zieht.
Wer kennt das nicht, Tage der Qual, in denen man zugeben muss: Ich hab‘ heute so schlimm Klima.
Viele Klimaexperten, die weltweit in der Qualitätspropaganda zitiert werden, zeichnen sich besonders dadurch aus, dass sie mit einer maximalen Abweichung von einem Grad Celsius ein Thermometer fehlerfrei ablesen können. Diese Ungenauigkeit wird der Erdverkochungsexperte sicher als erstes beheben.
In einer aufopfernden Studie während eines Urlaubs in 2023, in der um die damalige Zeit erstmals eisfreien Toskana, hat er den von ihm ausgetüftelten Klimaschutzplan ins Rheinische übersetzt. Titel: „Schützen Sie sisch, und, äh, andere!“ Weiter konnte er erforschen, dass die Bodentemperatur nicht immer mit der Temperatur des Erdkerns übereinstimmen muss.
Durch seine unermüdlichen Studien, können Hitzetote in Zukunft besser zugeordnet werden. Man weiß dann, ob jemand an hohen oder mit hohen Temperaturen gestorben ist. Der asymptomatische Klimawandel kann so in Zukunft viel besser bewertet werden. Man hat aus geringfügigen Fehlern gelernt und die Methoden erheblich verbessert.
Eine präzise Vorhersage der Jahreszeiten, vor allem die des Sommers, wird bald ebenfalls möglich sein. Es kann jetzt vor jahreszeitbedingten, teilweise sogar täglich schwankenden Temperaturveränderungen rechtzeitig gewarnt werden. Im Herbst können Heizempfehlungen für die ahnungslose Bevölkerung herausgegeben werden. Frieren war gestern, wissen wann es kalt wird, ist heute. Es wird an Farben geforscht, die noch roter sein sollen, als die, die jetzt in den Wetterkarten bei 21 Grad bereits verwendet werden.
Eine allgemeine Heizpflicht soll es europaweit zunächst nicht geben.
Weiter soll die Lichteinstrahlung der Sonne noch präziser bestimmt werden, damit den Europäern, in Ergänzung zur mitteleuropäischen Sommerzeit, jetzt auch noch genau mitgeteilt werden kann, wann es Tag und wann es Nacht ist.
Das Hinausschauen aus dem Fenster, zum Beispiel, ob es schon dunkel draußen ist, erübrigt sich. Die Tageszeit, in Ergänzung zur herkömmlichen Uhrzeit, wird demnächst automatisch mit dem Klima-Pass übermittelt werden. Zu Anfang natürlich erst einmal freiwillig.
Durch die persönliche ID können dann auch schnell und unkompliziert Sonderprämien überwiesen werden, sofern man sich klimakonform verhalten hat, damit man sich rechtzeitig vor Winterbeginn eine warme Jacke oder einen Mantel kaufen kann. Das Sparen von Bargeld auf eine bevorstehende größere Anschaffung von Winterkleidung wird somit überflüssig.
Ob es am Ende nun um Hitze oder Kälte geht, spielt eigentlich gar keine Rolle, denn wie wussten schon die Ahnen zu berichten: Was gut für die Kälte ist, ist auch gut für die Wärme.
Westliche Mächte unternehmen immer wieder Versuche, eskalierend auf den Ukraine-Konflikt einzuwirken, damit man atombetriebene Heizpilze aufstellen kann, an denen sich die Europäer im Winter auch im Freien wärmen können.
Wie praktisch, dass man nicht nur Gesundheit und Klima, sondern auch Klima und Krieg miteinander verbinden kann. Alles so, oder so ähnlich möglicherweise nachzulesen im genialen Hitzeschutzplan á la Lauterbach.
Besonders Deutschland braucht nicht nur lauterbachsche Hitzeschutzräume, nein es braucht atomsichere Hitzeschutzbunker, so schlägt man gleich zwei Fliegen mit einer Klappe.
Für die, die es sich leisten können, hier ein Vorschlag. Der K2000:
Für die weniger gut Betuchten reicht auch ein kühles Kellerloch, das man idealerweise im Februar beziehen und nicht vor November wieder verlassen sollte, so die Empfehlung auch von führenden Klima-Forschern, die es ja wissen müssen. Von Dezember bis Januar empfiehlt sich ein Besuch auf den Bahamas, besonders dann, wenn man eine leichte Erkältung verspürt.
Nur Verschwörungstheoretiker behaupten, dass die eigenartigen Anschlussverwendungen der Extrem-Kapazitäten, zu denen Lauterbach ohne Zweifel dazugehört, wie dicke rote Pfeile wirken, die auf Institutionen und Organisationen zeigen, um die man unter allen Umständen einen großen Bogen machen sollte, weil sie möglicherweise nichts Gutes im Schilde führen. Minimal sollen sie angeblich Unsinn verbreiten, maximal sollen sie gehörigen Schaden anrichten.
Man muss sich nur ein paar Gedanken machen, schon kann man feststellen, wie alles mit allem zusammenhängt.
“Dieser Beitrag wurde mit dem Pareto-Client geschrieben.”
* *
(Bild von pixabay)
-
@ 9ca447d2:fbf5a36d
2025-06-07 16:01:19Wall Street is warming up to Bitcoin and getting closer and closer to it.
Cantor Fitzgerald, one of the oldest and most respected investment banks on Wall Street, has launched a $2 billion bitcoin-backed lending program.
They’ve reportedly already done their first deals, lending to two big digital asset companies: FalconX and Maple Finance.
This is a big step in connecting traditional finance to the fast-moving world of Bitcoin.
Cantor’s new service allows big investors, hedge funds and asset managers, to borrow money using bitcoin as collateral.
This is a game changer for institutions that hold bitcoin, as they can now access liquidity without having to sell their assets.
“Institutions holding bitcoin are looking to broaden their access to diverse funding sources,” said Christian Wall, co-CEO and global head of fixed income at Cantor Fitzgerald.
“And we are excited to support their liquidity needs to help them drive long term growth and success.”
The loans are not speculative or unsecured.
They are structured like traditional finance deals, backed by the borrower’s bitcoin. This reduces the risk for Cantor while giving bitcoin-holding companies new ways to grow and operate.
The first recipients of Cantor’s lending program are FalconX, a digital asset brokerage, and Maple Finance, a blockchain-based lending platform.
FalconX confirmed they secured a credit facility of over $100 million. Maple Finance also received the first tranche of their loan from Cantor.
This comes at a time when the bitcoin lending space is recovering after a tough period. Several big firms went under in 2022 and investor confidence was shaken.
Now with traditional finance on board, bitcoin-backed lending has returned. According to Galaxy Research the total size of the digital asset lending market grew to $36.5 billion in Q4 2024.
Cantor’s move into bitcoin-backed lending isn’t new. They announced their plans in July 2024 and have been building their presence in the Bitcoin space since then.
Earlier this year, they partnered with Tether, SoftBank and Bitfinex to launch Twenty One Capital, a $3.6 billion fund to buy over 42,000 bitcoin.
In May 2025 Cantor Equity Partners merged with Twenty One Capital and bought nearly $459 million worth of bitcoin.
They also own around $1.9 billion in shares of Strategy, a company that holds a lot of bitcoin. Clearly Cantor believes in bitcoin as a long-term asset.
Cantor is also a big player in the stablecoin space.
They manage U.S. Treasury reserves for Tether, the company behind the $142 billion USDT stablecoin. This adds another layer of trust and credibility to Cantor’s digital asset involvement.
To secure the bitcoin used as collateral, Cantor has partnered with digital asset custodians Anchorage Digital and Copper.co.
These companies are known for their robust security and institutional-grade infrastructure. Cantor hasn’t disclosed loan terms or interest rates but confirmed the lending will follow current regulations.
This also shows how traditional financial players are embracing DeFi.
Maple Finance for example allows undercollateralized lending using blockchain. By backing companies like Maple, Cantor is innovating while still having control and compliance.
For years, bitcoin-backed loans were only available through digital-asset-native companies like Genesis, BlockFi, and Ledn.
These loans were mostly for smaller clients and retail investors. But with Cantor’s entry, the scale and professionalism of bitcoin lending are expanding.
-
@ 7f6db517:a4931eda
2025-06-07 14:01:26What is KYC/AML?
- The acronym stands for Know Your Customer / Anti Money Laundering.
- In practice it stands for the surveillance measures companies are often compelled to take against their customers by financial regulators.
- Methods differ but often include: Passport Scans, Driver License Uploads, Social Security Numbers, Home Address, Phone Number, Face Scans.
- Bitcoin companies will also store all withdrawal and deposit addresses which can then be used to track bitcoin transactions on the bitcoin block chain.
- This data is then stored and shared. Regulations often require companies to hold this information for a set number of years but in practice users should assume this data will be held indefinitely. Data is often stored insecurely, which results in frequent hacks and leaks.
- KYC/AML data collection puts all honest users at risk of theft, extortion, and persecution while being ineffective at stopping crime. Criminals often use counterfeit, bought, or stolen credentials to get around the requirements. Criminals can buy "verified" accounts for as little as $200. Furthermore, billions of people are excluded from financial services as a result of KYC/AML requirements.
During the early days of bitcoin most services did not require this sensitive user data, but as adoption increased so did the surveillance measures. At this point, most large bitcoin companies are collecting and storing massive lists of bitcoiners, our sensitive personal information, and our transaction history.
Lists of Bitcoiners
KYC/AML policies are a direct attack on bitcoiners. Lists of bitcoiners and our transaction history will inevitably be used against us.
Once you are on a list with your bitcoin transaction history that record will always exist. Generally speaking, tracking bitcoin is based on probability analysis of ownership change. Surveillance firms use various heuristics to determine if you are sending bitcoin to yourself or if ownership is actually changing hands. You can obtain better privacy going forward by using collaborative transactions such as coinjoin to break this probability analysis.
Fortunately, you can buy bitcoin without providing intimate personal information. Tools such as peach, hodlhodl, robosats, azteco and bisq help; mining is also a solid option: anyone can plug a miner into power and internet and earn bitcoin by mining privately.
You can also earn bitcoin by providing goods and/or services that can be purchased with bitcoin. Long term, circular economies will mitigate this threat: most people will not buy bitcoin - they will earn bitcoin - most people will not sell bitcoin - they will spend bitcoin.
There is no such thing as KYC or No KYC bitcoin, there are bitcoiners on lists and those that are not on lists.
If you found this post helpful support my work with bitcoin.
-
@ dfa02707:41ca50e3
2025-06-07 14:01:18- This version introduces the Soroban P2P network, enabling Dojo to relay transactions to the Bitcoin network and share others' transactions to break the heuristic linking relaying nodes to transaction creators.
- Additionally, Dojo admins can now manage API keys in DMT with labels, status, and expiration, ideal for community Dojo providers like Dojobay. New API endpoints, including "/services" exposing Explorer, Soroban, and Indexer, have been added to aid wallet developers.
- Other maintenance updates include Bitcoin Core, Tor, Fulcrum, Node.js, plus an updated ban-knots script to disconnect inbound Knots nodes.
"I want to thank all the contributors. This again shows the power of true Free Software. I also want to thank everyone who donated to help Dojo development going. I truly appreciate it," said Still Dojo Coder.
What's new
- Soroban P2P network. For MyDojo (Docker setup) users, Soroban will be automatically installed as part of their Dojo. This integration allows Dojo to utilize the Soroban P2P network for various upcoming features and applications.
- PandoTx. PandoTx serves as a transaction transport layer. When your wallet sends a transaction to Dojo, it is relayed to a random Soroban node, which then forwards it to the Bitcoin network. It also enables your Soroban node to receive and relay transactions from others to the Bitcoin network and is designed to disrupt the assumption that a node relaying a transaction is closely linked to the person who initiated it.
- Pushing transactions through Soroban can be deactivated by setting
NODE_PANDOTX_PUSH=off
indocker-node.conf
. - Processing incoming transactions from Soroban network can be deactivated by setting
NODE_PANDOTX_PROCESS=off
indocker-node.conf
.
- Pushing transactions through Soroban can be deactivated by setting
- API key management has been introduced to address the growing number of people offering their Dojos to the community. Dojo admins can now access a new API management tab in their DMT, where they can create unlimited API keys, assign labels for easy identification, and set expiration dates for each key. This allows admins to avoid sharing their main API key and instead distribute specific keys to selected parties.
- New API endpoints. Several new API endpoints have been added to help API consumers develop features on Dojo more efficiently:
- New:
/latest-block
- returns data about latest block/txout/:txid/:index
- returns unspent output data/support/services
- returns info about services that Dojo exposes
- Updated:
/tx/:txid
- endpoint has been updated to return raw transaction with parameter?rawHex=1
- The new
/support/services
endpoint replaces the deprecatedexplorer
field in the Dojo pairing payload. Although still present, API consumers should use this endpoint for explorer and other pairing data.
- New:
Other changes
- Updated ban script to disconnect inbound Knots nodes.
- Updated Fulcrum to v1.12.0.
- Regenerate Fulcrum certificate if expired.
- Check if transaction already exists in pushTx.
- Bump BTC-RPC Explorer.
- Bump Tor to v0.4.8.16, bump Snowflake.
- Updated Bitcoin Core to v29.0.
- Removed unnecessary middleware.
- Fixed DB update mechanism, added api_keys table.
- Add an option to use blocksdir config for bitcoin blocks directory.
- Removed deprecated configuration.
- Updated Node.js dependencies.
- Reconfigured container dependencies.
- Fix Snowflake git URL.
- Fix log path for testnet4.
- Use prebuilt addrindexrs binaries.
- Add instructions to migrate blockchain/fulcrum.
- Added pull policies.
Learn how to set up and use your own Bitcoin privacy node with Dojo here.
-
@ 81022b27:2b8d0644
2025-06-09 00:23:26I’m a Chiropractor, Writer, Travel Nerd, Lover of Efficiency, Trekker and a Celebrity in Mexican Restaurants Hi, I’m Danny DeReuter, and I want to save the world. I’m an occasional writer-I’ve written some stuff.
Sometimes people think I’m funny. Maybe some time I’ll come up with a bit of courage and try my hand at stand-up. (seriously, that’s a thing on my vision board)
I’ve become somewhat of a social media expert managing my online presence. I help show people how to do social media more effectively.
I’m also a speaker. I prefer to speak on topics that I’m passionate about-like natural health, chiropractic, and social media. I also have a Podcast. Be nice and you can ask me to speak at your event.
-
@ 9ca447d2:fbf5a36d
2025-06-07 14:01:00Trump Media & Technology Group (TMTG), the company behind Truth Social and other Trump-branded digital platforms, is planning to raise $2.5 billion to build one of the largest bitcoin treasuries among public companies.
The deal involves the sale of approximately $1.5 billion in common stock and $1.0 billion in convertible senior secured notes.
According to the company, the offering is expected to close by the end of May, pending standard closing conditions.
Devin Nunes, CEO of Trump Media, said the investment in bitcoin is a big part of the company’s long-term plan.
“We view Bitcoin as an apex instrument of financial freedom,” Nunes said.
“This investment will help defend our Company against harassment and discrimination by financial institutions, which plague many Americans and U.S. firms.”
He added that the bitcoin treasury will be used to create new synergies across the company’s platforms including Truth Social, Truth+, and the upcoming financial tech brand Truth.Fi.
“It’s a big step forward in the company’s plans to evolve into a holding company by acquiring additional profit-generating, crown jewel assets consistent with America First principles,” Nunes said.
The $2.5 billion raise will come from about 50 institutional investors. The $1 billion in convertible notes will have 0% interest and be convertible into shares at a 35% premium.
TMTG’s current liquid assets, including cash and short-term investments, are $759 million as of the end of the first quarter of 2025. With this new funding, the company’s liquid assets will be over $3 billion.
Custody of the bitcoin treasury will be handled by Crypto.com and Anchorage Digital. They will manage and store the digital assets.
Earlier this week The Financial Times reported Trump Media was planning to raise $3 billion for digital assets acquisitions.
The article said the funds would be used to buy bitcoin and other digital assets, and an announcement could come before a major related event in Las Vegas.
Related: Bitcoin 2025 Conference Kicks off in Las Vegas Today
Trump Media denied the FT report. In a statement, the company said, “Apparently the Financial Times has dumb writers listening to even dumber sources.”
There was no further comment. However, the official $2.5 billion figure, which was announced shortly after by Trump Media through a press release, aligns with its actual filing and investor communication.
Trump Media’s official announcement
This comes at a time when the Trump family and political allies are showing renewed interest in Bitcoin.
President Donald Trump who is now back in office since the 2025 election, has said he wants to make the U.S. the “crypto capital of the world.”
Trump Media is also working on retail bitcoin investment products including ETFs aligned with America First policies.
These products will make bitcoin more accessible to retail investors and support pro-Trump financial initiatives.
But not everyone is happy.
Democratic Senator Elizabeth Warren recently expressed concerns about Trump Media’s Bitcoin plans. She asked U.S. regulators to clarify their oversight of digital-asset ETFs, warning of investor risk.
Industry insiders are comparing Trump Media’s plans to Strategy (MSTR) which has built a multi-billion dollar bitcoin treasury over the last year. They used stock and bond sales to fund their bitcoin purchases.
-
@ 5d4b6c8d:8a1c1ee3
2025-06-09 00:18:27Big day for me today: - @k00b convinced me to try OMAD. I did eat more than once today, but it was all within a four hour period. I'll try to tighten that up further tomorrow. - @gnilma and @398ja convinced me to try a cold shower. I eased into it, by starting it warm and gradually turning down the temperature. That was totally manageable.
How did you do today? What do you need to work on tomorrow?
https://stacker.news/items/1001161
-
@ 8bad92c3:ca714aa5
2025-06-09 00:02:34Marty's Bent
via levelsio
Over the weekend, prolific vibe coder levelsio took to X to complain about the state of housing affordability across Europe. Something that I was very happy to see considering the fact that there is a massive real estate affordability crisis across much of the world and it is important that people who are respected and have platforms speak out when they identify the problem as well. More eyes and focus on the problem is how something begins to get solved.
With that being said, I think levelsio is missing the forest for the trees by blaming institutionalized NIMBYism, burdensome regulations and governments hoarding land that should instead be given to developers to produce more housing supply. I quote tweeted this particular tweet on the subject from levelsio and wanted to take some time today to republish those thoughts here and expand on the topic.
It’s almost as if real estate is being used as a store of value asset instead of the consumable good that it is.
What @levelsio is observing here is called a “monetary premium”. A monetary premium is the value added on top of the consumable/aesthetic/location value of real estate.
This monetary premium exist because central banks and governments have distorted the market for money and people are forced to push value into assets that are scarce relative to dollars. Over the last 50 years real estate has been one of the relatively scarce assets of choice.
The housing affordability crisis is a negative externality of the market reaction to the corruption of money. It can only be fixed by re-introducing hard money into the economy that enables people to store value reliably. If that emerges they won’t have to store value in real estate, the monetary premium of real estate will dissolve and prices will correct to their proper valuations.
This is one of the problems that bitcoin solves.
It’s still early yet, but more and more people are recognizing the utility provided by a neutral reserve asset that can’t be manipulated by central planners. At scale, the effect on assets that have accumulated a monetary premium over decades will be material. All of these assets are significantly overvalued and their monetary premium are leaking into bitcoin.
Put another way, "It's the money, stupid." Now, this isn't to say that the supply of housing in certain areas being artificially restricted isn't having an effect on the price of housing. This is certainly true, especially in cities like San Francisco where there is a relatively strong demand because of the economic density of the area and the desire of many high agency and productive people to live there. But I would put forth that the monetary premium is still the bigger problem and no amount of de-regulation to enable the supply of housing to increase will solve the affordability crisis in the long-run. The only way to get to the root of this specific problem is via bitcoin's mainstream adoption as an apolitical uncontrollable asset with completely idiosyncratic risks when compared to any individual asset class.
Let's say the government did ease up regulations and local NIMBY sympathetics were shoved in a corner to allow new units to be built. This doesn't solve the problem in the short-run because there is a time-delay between when regulations are lifted and when new supply actually makes it to market. In the interim, governments and central banks are inevitably going to go further into debt and be forced to print money to monetize that debt. This will exacerbate inflation and even if new real estate units are brought to market, the builders/owners of those properties will likely have to demand elevated prices to attempt to keep up with inflation.
This also does nothing to solve the problem of real income and wage growth, which are significantly lagging real inflation. Even if prices came down because of a surge in supply, could the Common Man afford a down payment on the property? I'd be shocked if this was the case. And since it's likely not the case the only way to get people into these houses as "owners" would be to offer them zero-down financing, which makes people feel richer than they actually are and leads them to make financially ruinous decisions.
It's the money, stupid. People need a way to save so that they can buy in the first place. Fiat currency doesn't allow this and the only people who can save effectively are those who make enough money to funnel into substitute store of value assets like real estate.
As it stands today, the price-to-income ratio of real estate is 5.0x and the price-t0-rent index is 1.36. Up from 3.3x and 1.14x respectively where the metrics sat in the year 2000. The growth in these ratios is driven predominately via their monetary premium.
And guess what, it's about to get much worse. Donald Trump, Treasury Secretary Scott Bessent and Elon Musk have all signaled that the plan moving forward is to attempt to drive growth and productivity as high as possible while also letting deficits and the debt increase unabated, which means that inflation is likely to continue unabated and potentially increase.
It might make sense to get some bitcoin if that is the case.
via me
"Whale in the Pool" Risk That Could Destroy MSTY Investors
Jessy Gilger raised serious concerns about MSTY and similar derivative products that promise eye-popping yields. He pointed to the COVID crash where gold mining ETFs using derivatives collapsed 95% and never recovered, despite gold itself performing well. Jessy noted that while his team calculated reasonable MicroStrategy covered call yields of 16-22%, MSTY advertises 120% annualized distributions - a red flag that suggests these aren't sustainable dividends from profits, but potentially just returning investors' own capital.
"If a whale pees in the pool, everyone is affected." - Jessy Gilger
Jessy explained that when large investors need to exit these pooled products during market stress, they must sell derivative positions into illiquid markets with no buyers, potentially triggering catastrophic losses for all participants. His solution? Private pools through separately managed accounts that achieve similar income goals without the contagion risk of being trapped with panicking whales.
Check out the full podcast here for more on Gannett Trust's multi-sig solution, Bitcoin retirement planning and corporate treasury strategies.
Headlines of the Day
World's Largest Bitcoin Conference Starts Tomorrow- via X
Remixpoint to Buy Additional ¥1 Billion in Bitcoin - via X
Get our new STACK SATS hat - via tftcmerch.io
Marty to Judge Bitcoin World Record Try in Vegas - via X
Take the First Step Off the Exchange
Bitkey is an easy, secure way to move your Bitcoin into self-custody. With simple setup and built-in recovery, it’s the perfect starting point for getting your coins off centralized platforms and into cold storage—no complexity, no middlemen.
Take control. Start with Bitkey.
Use the promo code *“TFTC20”* during checkout for 20% off
Ten31, the largest bitcoin-focused investor, has deployed 158,469 sats | $150.00M across 30+ companies through three funds. I am a Managing Partner at Ten31 and am very proud of the work we are doing. Learn more at ten31.vc/invest.
Final thought...
Looking forward to a fun, productive and wholesome week in Las Vegas, Nevada.
Get this newsletter sent to your inbox daily: https://www.tftc.io/bitcoin-brief/
Subscribe to our YouTube channels and follow us on Nostr and X:
@media screen and (max-width: 480px) { .mobile-padding { padding: 10px 0 !important; } .social-container { width: 100% !important; max-width: 260px !important; } .social-icon { padding: 0 !important; } .social-icon img { height: 32px !important; width: 32px !important; } .icon-cell { padding: 0 4px !important; } } .mj-column-per-33-333333333333336 { width: 25% !important; max-width: 25%; } .moz-text-html .mj-column-per-33-333333333333336 { width: 25% !important; max-width: 25%; } /* Helps with rendering in various email clients */ body { margin: 0 !important; padding: 0 !important; -webkit-text-size-adjust: 100% !important; -ms-text-size-adjust: 100% !important; } img { -ms-interpolation-mode: bicubic; } /* Prevents Gmail from changing the text color in email threads */ .im { color: inherit !important; }
[
](https://youtube.com/@T
-
@ 9ca447d2:fbf5a36d
2025-06-07 14:00:47CANNES, FRANCE – May 2025 — Bitcoin mining made its mark at the world’s most prestigious film gathering this year as Puerto Rican director and producer Alana Mediavilla introduced her feature documentary Dirty Coin: The Bitcoin Mining Documentary at the Marché du Film during the Cannes Film Festival.
The film puts bitcoin mining at the center of a rising global conversation about energy, technology, and economic freedom.
Dirty Coin is the first feature-length documentary to explore bitcoin mining through immersive, on-the-ground case studies.
From rural towns in the United States to hydro-powered sites in Latin America and the Congo, the film follows miners and communities navigating what may be one of the most misunderstood technologies of our time.
The result is a human-centered look at how bitcoin mining is transforming local economies and energy infrastructure in real ways.
To mark its Cannes debut, Mediavilla and her team hosted a packed industry event that brought together leaders from both film and finance.
Dirty Coin debut ceremony at the Marché du Film
Sponsors Celestial Management, Sangha Renewables, Nordblock, and Paystand.org supported the program, which featured panels on mining, energy use, and decentralized infrastructure.
Attendees had the rare opportunity to engage directly with pioneers in the space. A special session in French led by Seb Gouspillou spotlighted mining efforts in the Congo’s Virunga region.
Dirty Coin builds on Mediavilla’s award-winning short film Stranded, which won over 20 international prizes, including Best Short Documentary at Cannes in 2024.
That success helped lay the foundation for the feature and positioned Mediavilla as one of the boldest new voices in global documentary filmmaking.
Alana Mediavilla speaks at the Marché du Film — Cannes Film Festival
“If we’ve found an industry that can unlock stranded energy and turn it into real power for people—especially in regions with energy poverty—why wouldn’t we look into it?” says Mediavilla. “Our privilege blinds us.
“The same thing we criticize could be the very thing that lifts the developing world to our standard of living. Ignoring that potential is a failure of imagination.”
Much like the decentralized network it explores, Dirty Coin is spreading globally through grassroots momentum.
Local leaders are hosting independent screenings around the world, from Roatán and Berlin to São Paulo and Madrid. Upcoming events include Toronto and Zurich, with more cities joining each month.
Mediavilla, who previously worked in creative leadership roles in the U.S. — including as a producer at Google — returned to Puerto Rico to found Campo Libre, a studio focused on high-caliber, globally relevant storytelling from the Caribbean.
She was also accepted into the Cannes Producers Network, a selective program open only to producers with box office releases in the past four years.
Mediavilla qualified after independently releasing Dirty Coin in theaters across Puerto Rico. Her participation in the network gave her direct access to meetings, insights, and connections with the most active distributors and producers working today.
The film’s next public screening will take place at the Anthem Film Festival in Palm Springs on Saturday, June 14 at 2 PM. Additional screenings and market appearances are planned throughout the year at Bitcoin events and international film platforms.
Dirty Coin at the Cannes Film Festival
Watch the Trailer + Access Press Materials
📂 EPK
🎬 Screener
🌍 Host a Screening
Follow the Movement
Instagram: https://www.instagram.com/dirty_coin_official/
Twitter: https://x.com/DirtyCoinDoc
Website: www.dirtycointhemovie.com -
@ b1ddb4d7:471244e7
2025-06-07 14:00:35Hosted at the iconic Palace of Culture and Science—a prominent symbol of the communist era—the Bitcoin FilmFest offers a vibrant celebration of film through the lens of bitcoin. The venue itself provides a striking contrast to the festival’s focus, highlighting bitcoin’s core identity as a currency embodying independence from traditional financial and political systems.
𝐅𝐢𝐱𝐢𝐧𝐠 𝐭𝐡𝐞 𝐜𝐮𝐥𝐭𝐮𝐫𝐞 𝐰𝐢𝐭𝐡 𝐩𝐨𝐰𝐞𝐫𝐟𝐮𝐥 𝐦𝐮𝐬𝐢𝐜 𝐯𝐢𝐛𝐞𝐬.
Warsaw, Day Zero at #BFF25 (European Bitcoin Pizza Day) with @roger__9000, MadMunky and the @2140_wtf squadpic.twitter.com/9ogVvWRReA
— Bitcoin FilmFest
(@bitcoinfilmfest) May 28, 2025
This venue represents an era when the state tightly controlled the economy and financial systems. The juxtaposition of this historical site with an event dedicated to bitcoin is striking and thought-provoking.
The event features a diverse array of activities, including engaging panel discussions, screenings of both feature-length and short films, workshops and lively parties. Each component designed to explore the multifaceted world of bitcoin and its implications for society, offering attendees a blend of entertainment and education.
The films showcase innovative narratives and insights into bitcoin’s landscape, while the panels facilitate thought-provoking discussions among industry experts and filmmakers.
Networking is a significant aspect of the festival, with an exceptionally open and friendly atmosphere that foster connections among participants. Participants from all over Europe gather to engage with like-minded individuals who share a passion for BTC and its implications for the future.
The open exchanges of ideas foster a sense of community, allowing attendees to forge new connections, collaborate on projects, and discuss the potential of blockchain technology implemented in bitcoin.
The organization of the festival is extraordinary, ensuring a smooth flow of information and an expertly structured schedule filled from morning until evening. Attendees appreciate the meticulous planning that allowed them to maximize their experience. Additionally, thoughtful touches such as gifts from sponsors and well-chosen locations for various events contribute to the overall positive atmosphere of the festival.
Overall, the Bitcoin FilmFest not only highlights the artistic expression surrounding bitcoin but also serves as a vital platform for dialogue—about financial freedom, the future of money, and individual sovereignty in a shifting world.
The event successfully bridges the gap between a historical symbol of control and a movement that celebrates freedom, innovation, and collaboration in the digital age, highlighting the importance of independence in financial systems while fostering a collaborative environment for innovation and growth.
Next year’s event is slated for June 5-7 2026. For further updates check: https://bitcoinfilmfest.com/
-
@ df478568:2a951e67
2025-06-08 23:58:37NOTE: PLEASE DO NOT USE THIS METHOD UNTIL WE LEARN MORE ABOUT THIS nostr:nevent1qvzqqqqqqypzpw5qnyrxdmctda962pvng7ltzvjzjg09ge57dqqxfjn42ft2rcaxqqsfsg878u9luv2sxm6yahyjr4zpt745rdfpuu47wnn9t2dskgem52g9e9955
`About 156,000 blocks ago, I went to a Taco Shop for a bitcoin meetup. I asked my favorite question, “Do you accept bitcoin?”
“Yes," he said as he handed me a Toast Terminal with a BTCpayServer QR code.
]
Awesome!
12,960 blocks later, I took my dad to the taco shop. We ordered food. I asked my favorite question once again.
“Uh…Yeah, but I don't know how to work the machine.”
"Dough!🤦"
It's been a problem in the past, but now lightning payments are about to be ubiquitous. Steak N Shake is taking bitcoin using Speed Wallet and Block is implementing bitcoin payments by 2026 in all legal jurisdictions. I have tested both of these so you don't have to. Just kidding. I geek out on this stuff, but both work great. You can pay with your sats by scanning a screen on a QR code. The employees don't need to be bitcoin lightning network experts. You can just pay as easy as a credit card.
There were 35,000 people at the bitcoin conference, and 4,187 transactions were made. It was a world record. Wait, I thought they said there could only be 7 transactions per second! No, not anymore. Now we can use bitcoin for shopping. I can pay for tacos at taco trucks.
How You Can Accept Bitcoin At Your Business
Coinos is a simple bitcoin point of sale information that acts like a cash register. Bitcoin is peer-to-peer electronic cash. Coinos is a cash register and you should treat it as such. If you make a few hundred thousand sats at the end of the night, you should sweep the bitcoin into your own wallet.. You can use Aqua, AlbyHub, Bull Bitcoin wallet, or whatever your favorite lightning enabled wallet is to withdraw. You'll need a password. Do not lose this. I have tried the automatic withdraws, but it did not work for me. I'm no concerned because this is not a wallet I intend to keep a lot of sats in for a long time.
Here is my coinos payment terminal.
https://coinos.io/ZapthisBlog/receive
I made the QR code with libreqr.com/
Now I have an online bitcoin cash register. The Bitcoiners know how to pay for stuff with sats. They will be proud to show you too. If you're nerdy, you can use all the cool kid tools now, but we will just focus on the lightning address. Anyone can send you sats with a lightning address with just a QR code.
At the end of the night, you cash out to your own wallet. Again, this assumes you have an Aqua Wallet or any other lightning enabled wallet, but all it takes to accept bitcoin at your brick and mortar store is to create an account with Coinos and print out a QR code. It's a quick and easy way to start accepting bitcoin even if you don't expect many clients to shop with sats.
Tips
This is not just a cash register. Employees can also make their own Coinos wallet and receive tips from bitcoiners. Anyone can accept payments using this system. Your kids could use it to sell lemonade for sats. You are only limited by your imagination. When will you begin accepting bitcoin payments? It is easier than ever. You do not need to train employees. You do not need to be in the store. Bitcoin is peer-to-peer electronic cash so you can give it away like cash. I don't know what the tax rules on cash are. You need to verify that with your own jurisdiction. This is not financial or tax advice. This is for informational purposes only.
Remember, this is a custodial wallet. Not your keys not your bitcoin. Don't keep more sats than you are willing to lose on custodial wallets. Sweep your wallet early and often. Loss of funds is possible. There is a small fee for liquidity management too. Do your own research.`
-
@ 7f6db517:a4931eda
2025-06-07 13:01:53
"Privacy is necessary for an open society in the electronic age. Privacy is not secrecy. A private matter is something one doesn't want the whole world to know, but a secret matter is something one doesn't want anybody to know. Privacy is the power to selectively reveal oneself to the world." - Eric Hughes, A Cypherpunk's Manifesto, 1993
Privacy is essential to freedom. Without privacy, individuals are unable to make choices free from surveillance and control. Lack of privacy leads to loss of autonomy. When individuals are constantly monitored it limits our ability to express ourselves and take risks. Any decisions we make can result in negative repercussions from those who surveil us. Without the freedom to make choices, individuals cannot truly be free.
Freedom is essential to acquiring and preserving wealth. When individuals are not free to make choices, restrictions and limitations prevent us from economic opportunities. If we are somehow able to acquire wealth in such an environment, lack of freedom can result in direct asset seizure by governments or other malicious entities. At scale, when freedom is compromised, it leads to widespread economic stagnation and poverty. Protecting freedom is essential to economic prosperity.
The connection between privacy, freedom, and wealth is critical. Without privacy, individuals lose the freedom to make choices free from surveillance and control. While lack of freedom prevents individuals from pursuing economic opportunities and makes wealth preservation nearly impossible. No Privacy? No Freedom. No Freedom? No Wealth.
Rights are not granted. They are taken and defended. Rights are often misunderstood as permission to do something by those holding power. However, if someone can give you something, they can inherently take it from you at will. People throughout history have necessarily fought for basic rights, including privacy and freedom. These rights were not given by those in power, but rather demanded and won through struggle. Even after these rights are won, they must be continually defended to ensure that they are not taken away. Rights are not granted - they are earned through struggle and defended through sacrifice.
If you found this post helpful support my work with bitcoin.
-
@ eb0157af:77ab6c55
2025-06-08 22:02:36The adoption of Bitcoin as a corporate reserve asset is accelerating: public companies have doubled their holdings in just two months.
The use of Bitcoin as a corporate treasury strategy is reaching unprecedented levels. According to a recent report from Standard Chartered, shared with several industry outlets, 61 publicly traded companies collectively hold 3.2% of all bitcoin in circulation.
Geoff Kendrick, global head of digital asset research at Standard Chartered, revealed that these 61 public firms — out of a total of 124 — now own 673,897 BTC.
The report highlights that 58 of the 61 companies analyzed have net asset value (NAV) multiples above 1, indicating that their market valuations exceed the value of their net assets.
The Strategy copycats
A significant takeaway from the report is the speed at which companies are accumulating bitcoin. The 60 companies considered “Strategy copycats” have doubled their holdings in the past two months, from under 50,000 BTC to about 100,000 BTC. Over the same period, Strategy added 74,000 BTC, compared to the 47,000 acquired by the other firms.
This movement continues to expand as new companies announce Bitcoin purchase plans via debt issuance. On June 3, Canadian renewable energy developer SolarBank officially announced its Bitcoin treasury strategy, filing an application to open an account with Coinbase Prime to secure custody services, manage USDC, and set up a non-custodial wallet for its Bitcoin holdings.
Meanwhile, Paris-based Blockchain Group announced a $68 million Bitcoin acquisition, while Norwegian crypto brokerage K33 raised $6.2 million to purchase BTC at the end of May.
The post Bitcoin treasury: 61 publicly listed companies now hold over 3% of total supply appeared first on Atlas21.
-
@ 7f6db517:a4931eda
2025-06-07 13:01:52People forget Bear Stearns failed March 2008 - months of denial followed before the public realized how bad the situation was under the surface.
Similar happening now but much larger scale. They did not fix fundamental issues after 2008 - everything is more fragile.
The Fed preemptively bailed out every bank with their BTFP program and First Republic Bank still failed. The second largest bank failure in history.
There will be more failures. There will be more bailouts. Depositors will be "protected" by socializing losses across everyone.
Our President and mainstream financial pundits are currently pretending the banking crisis is over while most banks remain insolvent. There are going to be many more bank failures as this ponzi system unravels.
Unlike 2008, we have the ability to opt out of these broken and corrupt institutions by using bitcoin. Bitcoin held in self custody is unique in its lack of counterparty risk - you do not have to trust a bank or other centralized entity to hold it for you. Bitcoin is also incredibly difficult to change by design since it is not controlled by an individual, company, or government - the supply of dollars will inevitably be inflated to bailout these failing banks but bitcoin supply will remain unchanged. I do not need to convince you that bitcoin provides value - these next few years will convince millions.
If you found this post helpful support my work with bitcoin.
-
@ 66675158:1b644430
2025-03-23 11:39:41I don't believe in "vibe coding" – it's just the newest Silicon Valley fad trying to give meaning to their latest favorite technology, LLMs. We've seen this pattern before with blockchain, when suddenly Non Fungible Tokens appeared, followed by Web3 startups promising to revolutionize everything from social media to supply chains. VCs couldn't throw money fast enough at anything with "decentralized" (in name only) in the pitch deck. Andreessen Horowitz launched billion-dollar crypto funds, while Y Combinator batches filled with blockchain startups promising to be "Uber for X, but on the blockchain."
The metaverse mania followed, with Meta betting its future on digital worlds where we'd supposedly hang out as legless avatars. Decentralized (in name only) autonomous organizations emerged as the next big thing – supposedly democratic internet communities that ended up being the next scam for quick money.
Then came the inevitable collapse. The FTX implosion in late 2022 revealed fraud, Luna/Terra's death spiral wiped out billions (including my ten thousand dollars), while Celsius and BlockFi froze customer assets before bankruptcy.
By 2023, crypto winter had fully set in. The SEC started aggressive enforcement actions, while users realized that blockchain technology had delivered almost no practical value despite a decade of promises.
Blockchain's promises tapped into fundamental human desires – decentralization resonated with a generation disillusioned by traditional institutions. Evangelists presented a utopian vision of freedom from centralized control. Perhaps most significantly, crypto offered a sense of meaning in an increasingly abstract world, making the clear signs of scams harder to notice.
The technology itself had failed to solve any real-world problems at scale. By 2024, the once-mighty crypto ecosystem had become a cautionary tale. Venture firms quietly scrubbed blockchain references from their websites while founders pivoted to AI and large language models.
Most reading this are likely fellow bitcoiners and nostr users who understand that Bitcoin is blockchain's only valid use case. But I shared that painful history because I believe the AI-hype cycle will follow the same trajectory.
Just like with blockchain, we're now seeing VCs who once couldn't stop talking about "Web3" falling over themselves to fund anything with "AI" in the pitch deck. The buzzwords have simply changed from "decentralized" to "intelligent."
"Vibe coding" is the perfect example – a trendy name for what is essentially just fuzzy instructions to LLMs. Developers who've spent years honing programming skills are now supposed to believe that "vibing" with an AI is somehow a legitimate methodology.
This might be controversial to some, but obvious to others:
Formal, context-free grammar will always remain essential for building precise systems, regardless of how advanced natural language technology becomes
The mathematical precision of programming languages provides a foundation that human language's ambiguity can never replace. Programming requires precision – languages, compilers, and processors operate on explicit instructions, not vibes. What "vibe coding" advocates miss is that beneath every AI-generated snippet lies the same deterministic rules that have always governed computation.
LLMs don't understand code in any meaningful sense—they've just ingested enormous datasets of human-written code and can predict patterns. When they "work," it's because they've seen similar patterns before, not because they comprehend the underlying logic.
This creates a dangerous dependency. Junior developers "vibing" with LLMs might get working code without understanding the fundamental principles. When something breaks in production, they'll lack the knowledge to fix it.
Even experienced developers can find themselves in treacherous territory when relying too heavily on LLM-generated code. What starts as a productivity boost can transform into a dependency crutch.
The real danger isn't just technical limitations, but the false confidence it instills. Developers begin to believe they understand systems they've merely instructed an AI to generate – fundamentally different from understanding code you've written yourself.
We're already seeing the warning signs: projects cobbled together with LLM-generated code that work initially but become maintenance nightmares when requirements change or edge cases emerge.
The venture capital money is flowing exactly as it did with blockchain. Anthropic raised billions, OpenAI is valued astronomically despite minimal revenue, and countless others are competing to build ever-larger models with vague promises. Every startup now claims to be "AI-powered" regardless of whether it makes sense.
Don't get me wrong—there's genuine innovation happening in AI research. But "vibe coding" isn't it. It's a marketing term designed to make fuzzy prompting sound revolutionary.
Cursor perfectly embodies this AI hype cycle. It's an AI-enhanced code editor built on VS Code that promises to revolutionize programming by letting you "chat with your codebase." Just like blockchain startups promised to "revolutionize" industries, Cursor promises to transform development by adding LLM capabilities.
Yes, Cursor can be genuinely helpful. It can explain unfamiliar code, suggest completions, and help debug simple issues. After trying it for just an hour, I found the autocomplete to be MAGICAL for simple refactoring and basic functionality.
But the marketing goes far beyond reality. The suggestion that you can simply describe what you want and get production-ready code is dangerously misleading. What you get are approximations with:
- Security vulnerabilities the model doesn't understand
- Edge cases it hasn't considered
- Performance implications it can't reason about
- Dependency conflicts it has no way to foresee
The most concerning aspect is how such tools are marketed to beginners as shortcuts around learning fundamentals. "Why spend years learning to code when you can just tell AI what you want?" This is reminiscent of how crypto was sold as a get-rich-quick scheme requiring no actual understanding.
When you "vibe code" with an AI, you're not eliminating complexity—you're outsourcing understanding to a black box. This creates developers who can prompt but not program, who can generate but not comprehend.
The real utility of LLMs in development is in augmenting existing workflows:
- Explaining unfamiliar codebases
- Generating boilerplate for well-understood patterns
- Suggesting implementations that a developer evaluates critically
- Assisting with documentation and testing
These uses involve the model as a subordinate assistant to a knowledgeable developer, not as a replacement for expertise. This is where the technology adds value—as a sophisticated tool in skilled hands.
Cursor is just a better hammer, not a replacement for understanding what you're building. The actual value emerges when used by developers who understand what happens beneath the abstractions. They can recognize when AI suggestions make sense and when they don't because they have the fundamental knowledge to evaluate output critically.
This is precisely where the "vibe coding" narrative falls apart.
-
@ 9ca447d2:fbf5a36d
2025-06-08 22:02:16Japanese investment firm Metaplanet has announced a massive $5.4 billion plan to increase its bitcoin holdings to 210,000 BTC by the end of 2027 — that’s about 1% of the total bitcoin supply.
Metaplanet on X
The Tokyo-listed company is accelerating its already aggressive bitcoin plan, with CEO Simon Gerovich calling the initiative “Asia’s largest-ever equity raise to buy Bitcoin — again!”
The company’s new capital raise, called the “555 Million Plan”, involves issuing 555 million shares through moving strike warrants. That’s basically a type of option where people can buy shares later, and the price they pay depends on the stock’s price at that time.
So with moving strike warrants, the price at which people can buy the stock goes up or down depending on how the company’s stock is doing. It gives investors more flexibility — and it can make the warrants more attractive — because they don’t get stuck with a bad deal if the stock price drops.
This way the company can raise capital gradually over the next 2 years without impacting the stock market and existing shareholders.
The funds raised will be used to buy bitcoin, with some to redeem bonds and other income-generating strategies like selling put options.
This is a big step up from Metaplanet’s previous targets. Initially aiming to reach 10,000 BTC by the end of 2025, the company now plans to reach:
- 30,000 BTC by end of 2025
- 100,000 BTC by end of 2026
- 210,000 BTC by end of 2027
The Japanese investment firm hopes to be in the “Bitcoin 1% club” which means holding at least 1% of the total 21 million bitcoin supply.
Metaplanet bitcoin targets
Metaplanet is already making good progress. As of June 2025, the company holds 8,888 BTC, acquired at a cost of about ¥122.2 billion (around $849 million) and has already reached 89% of its original 10,000 BTC target for 2025.
This comes after the success of the company’s previous “210 Million Plan” which raised ¥93.3 billion ($650 million) in 60 trading days by issuing 210 million shares.
During that time, the company’s bitcoin holdings grew from 1,762 BTC to 7,800 BTC and the BTC Yield (a key performance metric showing growth in bitcoin per share) increased by 189%.
Year to date the BTC Yield is 225.4%.
Metaplanet’s BTC Yield graph
The stock has reflected this momentum, up 275% since early 2025 and 1,619% over the past year.
Metaplanet’s stock price chart — TradingView
Metaplanet is now one of the most actively traded stocks in Japan and has become a top-ten corporate bitcoin holder globally, recently surpassing Block Inc., the company founded by Jack Dorsey.
Metaplanet sees this as part of a bigger shift in capital markets.
By being a “bitcoin treasury vehicle” listed on the Tokyo Stock Exchange, it aims to offer investors exposure to bitcoin through regulated equity markets. This is especially useful in Japan where retail investors are often restricted from accessing bitcoin directly.
“Bitcoin is repricing the global cost of capital,” the company said in a statement. “Through our 555 Million Plan, Metaplanet is doubling down on a high-conviction, equity-driven capital markets strategy to accelerate our Bitcoin accumulation trajectory.”
-
@ 7f6db517:a4931eda
2025-06-07 13:01:50Nostr is an open communication protocol that can be used to send messages across a distributed set of relays in a censorship resistant and robust way.
If you missed my nostr introduction post you can find it here. My nostr account can be found here.
We are nearly at the point that if something interesting is posted on a centralized social platform it will usually be posted by someone to nostr.
We are nearly at the point that if something interesting is posted exclusively to nostr it is cross posted by someone to various centralized social platforms.
We are nearly at the point that you can recommend a cross platform app that users can install and easily onboard without additional guides or resources.
As companies continue to build walls around their centralized platforms nostr posts will be the easiest to cross reference and verify - as companies continue to censor their users nostr is the best censorship resistant alternative - gradually then suddenly nostr will become the standard. 🫡
Current Nostr Stats
If you found this post helpful support my work with bitcoin.
-
@ 6e0ea5d6:0327f353
2025-06-08 21:03:49scolta bene... Ma ascolta bene, si?
Davvero, if there is one thing I can say after deep personal observation—from Palermo to Catania, from Sicily to Rome—it is this: A coward may strip everything from a righteous man, but after that… who can stop his revenge?
In this sense, amico mio, do not be fooled by the gentle ways of the just and humble man. His composure, his measured words, his restrained gestures, his patience and courtesy—all of it is merely the surface of a deep lake, where his wisdom guards unrest. While wrongdoers boast of their crimes and parade the streets with impunity, the man of honor watches in silence, bearing the world drop by drop.
Tuttavia, figlio mio, the day always comes when the final drop falls.
And then, it is not a gust of wind, nor a thunderclap—it is a dam breaking.
The fury that is born from a violated sense of justice is not loud like the brutes, nor blind like the fools; it is methodical, deliberate, devastating.
Sit here by my side and remember forever the advice of this old man, Antoni Salvatore: Never wrong a righteous man’s family, business, or honor! There is more danger in one upright man, when he finally rises for vengeance, than in a hundred armed scoundrels.
Do not deceive yourself into thinking every good man is also a fearful one! The wrath of the just—held back for so long—when it seeks reparation, carries with it the sacred vengeance permitted by the heavens...
Thank you for reading, my friend!
If this message resonated with you, consider leaving your "🥃" as a token of appreciation.
A toast to our family!
-
@ b1ddb4d7:471244e7
2025-06-08 21:01:41Sati, a Bitcoin payments app and Lightning infrastructure provider, announced the launch of its Lightning integration with Xverse wallet.
Launched in 2025 with investors of the likes as Draper Associates and Ricardo Salinas, Sati powers Bitcoin payments on applications such as WhatsApp to fuel the next wave of adoption.
The Whatsapp bot allows users to send bitcoin via the messaging app through a special bot. After verifying their identity, the user selects the “send” option, chooses to pay to a Lightning address, enters the amount (1,000 sats), confirms with a PIN, and the transaction is completed, with the funds appearing instantly in the recipient wallet.
The new integration will now bring Lightning functionality to over 1.5 million people worldwide. Users can send and receive sats (Bitcoin’s smallest denomination) instantly over the Lightning Network all within the Xverse app,
Further, every xverse wallet user gets a Lightning Address instantly. That means they can receive tips, pay invoices, and use Bitcoin for microtransactions—all without having to manage channels or switch between different apps.
While Xverse adds support for Lightning, users should be cautious in using the wallet as it’s mostly known for enabling access to rug pull projects.
Initially designed in 2017, the Lightning Network has grown to become Bitcoin’s leading layer-2, with a current BTC capacity of over $465M.
“Bitcoin was not meant to be an asset for Wall Street—it was built for peer-to-peer money, borderless and accessible,” said Felipe Servin, Founder and CEO of Sati. “Integrating Lightning natively into Xverse brings that vision back to life, making Bitcoin usable at scale for billions.”
Sati expects USDT on Lightning to be supported as early as July 2025 for users accessing Sati through WhatsApp.
This integration positions Sati’s role as a Lightning infrastructure provider, not just a consumer app. By leveraging its API-based solution, the company provides plug-and-play backend services to wallets and platforms looking to add Bitcoin payments without compromising on security or UX.
Sati recently closed a $600K pre-seed round. The funding is used to support global expansion, stablecoin integration, Lightning infrastructure growth, and broader access to Bitcoin in emerging markets.
The Sati team is attending Bitcoin2025 in Las Vegas this week and looking forward to connect with bitcoin enthusiasts.
-
@ 16f1a010:31b1074b
2025-03-20 14:32:25grain is a nostr relay built using Go, currently utilizing MongoDB as its database. Binaries are provided for AMD64 Windows and Linux. grain is Go Relay Architecture for Implementing Nostr
Introduction
grain is a nostr relay built using Go, currently utilizing MongoDB as its database. Binaries are provided for AMD64 Windows and Linux. grain is Go Relay Architecture for Implementing Nostr
Prerequisites
- Grain requires a running MongoDB instance. Please refer to this separate guide for instructions on setting up MongoDB: nostr:naddr1qvzqqqr4gupzq9h35qgq6n8ll0xyyv8gurjzjrx9sjwp4hry6ejnlks8cqcmzp6tqqxnzde5xg6rwwp5xsuryd3knfdr7g
Download Grain
Download the latest release for your system from the GitHub releases page
amd64 binaries provided for Windows and Linux, if you have a different CPU architecture, you can download and install go to build grain from source
Installation and Execution
- Create a new folder on your system where you want to run Grain.
- The downloaded binary comes bundled with a ZIP file containing a folder named "app," which holds the frontend HTML files. Unzip the "app" folder into the same directory as the Grain executable.
Run Grain
- Open your terminal or command prompt and navigate to the Grain directory.
- Execute the Grain binary.
on linux you will first have to make the program executable
chmod +x grain_linux_amd64
Then you can run the program
./grain_linux_amd64
(alternatively on windows, you can just double click the grain_windows_amd64.exe to start the relay)
You should see a terminal window displaying the port on which your relay and frontend are running.
If you get
Failed to copy app/static/examples/config.example.yml to config.yml: open app/static/examples/config.example.yml: no such file or directory
Then you probably forgot to put the app folder in the same directory as your executable or you did not unzip the folder.
Congrats! You're running grain 🌾!
You may want to change your NIP11 relay information document (relay_metadata.json) This informs clients of the capabilities, administrative contacts, and various server attributes. It's located in the same directory as your executable.
Configuration Files
Once Grain has been executed for the first time, it will generate the default configuration files inside the directory where the executable is located. These files are:
bash config.yml whitelist.yml blacklist.yml
Prerequisites: - Grain requires a running MongoDB instance. Please refer to this separate guide for instructions on setting up MongoDB: [Link to MongoDB setup guide].
Download Grain:
Download the latest release for your system from the GitHub releases page
amd64 binaries provided for Windows and Linux, if you have a different CPU architecture, you can download and install go to build grain from source
Installation and Execution:
- Create a new folder on your system where you want to run Grain.
- The downloaded binary comes bundled with a ZIP file containing a folder named "app," which holds the frontend HTML files. Unzip the "app" folder into the same directory as the Grain executable.
Run Grain:
- Open your terminal or command prompt and navigate to the Grain directory.
- Execute the Grain binary.
on linux you will first have to make the program executable
chmod +x grain_linux_amd64
Then you can run the program
./grain_linux_amd64
(alternatively on windows, you can just double click the grain_windows_amd64.exe to start the relay)
You should see a terminal window displaying the port on which your relay and frontend are running.
If you get
Failed to copy app/static/examples/config.example.yml to config.yml: open app/static/examples/config.example.yml: no such file or directory
Then you probably forgot to put the app folder in the same directory as your executable or you did not unzip the folder.
Congrats! You're running grain 🌾!
You may want to change your NIP11 relay information document (relay_metadata.json) This informs clients of the capabilities, administrative contacts, and various server attributes. It's located in the same directory as your executable.
Configuration Files:
Once Grain has been executed for the first time, it will generate the default configuration files inside the directory where the executable is located. These files are:
bash config.yml whitelist.yml blacklist.yml
Configuration Documentation
You can always find the latest example configs on my site or in the github repo here: config.yml
Config.yml
This
config.yml
file is where you customize how your Grain relay operates. Each section controls different aspects of the relay's behavior.1.
mongodb
(Database Settings)uri: mongodb://localhost:27017/
:- This is the connection string for your MongoDB database.
mongodb://localhost:27017/
indicates that your MongoDB server is running on the same computer as your Grain relay (localhost) and listening on port 27017 (the default MongoDB port).- If your MongoDB server is on a different machine, you'll need to change
localhost
to the server's IP address or hostname. - The trailing
/
indicates the root of the mongodb server. You will define the database in the next line.
database: grain
:- This specifies the name of the MongoDB database that Grain will use to store Nostr events. Grain will create this database if it doesn't already exist.
- You can name the database whatever you want. If you want to run multiple grain relays, you can and they can have different databases running on the same mongo server.
2.
server
(Relay Server Settings)port: :8181
:- This sets the port on which your Grain relay will listen for incoming nostr websocket connections and what port the frontend will be available at.
read_timeout: 10 # in seconds
:- This is the maximum time (in seconds) that the relay will wait for a client to send data before closing the connection.
write_timeout: 10 # in seconds
:- This is the maximum time (in seconds) that the relay will wait for a client to receive data before closing the connection.
idle_timeout: 120 # in seconds
:- This is the maximum time (in seconds) that the relay will keep a connection open if there's no activity.
max_connections: 100
:- This sets the maximum number of simultaneous client connections that the relay will allow.
max_subscriptions_per_client: 10
:- This sets the maximum amount of subscriptions a single client can request from the relay.
3.
resource_limits
(System Resource Limits)cpu_cores: 2 # Limit the number of CPU cores the application can use
:- This restricts the number of CPU cores that Grain can use. Useful for controlling resource usage on your server.
memory_mb: 1024 # Cap the maximum amount of RAM in MB the application can use
:- This limits the maximum amount of RAM (in megabytes) that Grain can use.
heap_size_mb: 512 # Set a limit on the Go garbage collector's heap size in MB
:- This sets a limit on the amount of memory that the Go programming language's garbage collector can use.
4.
auth
(Authentication Settings)enabled: false # Enable or disable AUTH handling
:- If set to
true
, this enables authentication handling, requiring clients to authenticate before using the relay.
- If set to
relay_url: "wss://relay.example.com/" # Specify the relay URL
:- If authentication is enabled, this is the url that clients will use to authenticate.
5.
UserSync
(User Synchronization)user_sync: false
:- If set to true, the relay will attempt to sync user data from other relays.
disable_at_startup: true
:- If user sync is enabled, this will prevent the sync from starting when the relay starts.
initial_sync_relays: [...]
:- A list of other relays to pull user data from.
kinds: []
:- A list of event kinds to pull from the other relays. Leaving this empty will pull all event kinds.
limit: 100
:- The limit of events to pull from the other relays.
exclude_non_whitelisted: true
:- If set to true, only users on the whitelist will have their data synced.
interval: 360
:- The interval in minutes that the relay will resync user data.
6.
backup_relay
(Backup Relay)enabled: false
:- If set to true, the relay will send copies of received events to the backup relay.
url: "wss://some-relay.com"
:- The url of the backup relay.
7.
event_purge
(Event Purging)enabled: false
:- If set to
true
, the relay will automatically delete old events.
- If set to
keep_interval_hours: 24
:- The number of hours to keep events before purging them.
purge_interval_minutes: 240
:- How often (in minutes) the purging process runs.
purge_by_category: ...
:- Allows you to specify which categories of events (regular, replaceable, addressable, deprecated) to purge.
purge_by_kind_enabled: false
:- If set to true, events will be purged based on the kinds listed below.
kinds_to_purge: ...
:- A list of event kinds to purge.
exclude_whitelisted: true
:- If set to true, events from whitelisted users will not be purged.
8.
event_time_constraints
(Event Time Constraints)min_created_at: 1577836800
:- The minimum
created_at
timestamp (Unix timestamp) that events must have to be accepted by the relay.
- The minimum
max_created_at_string: now+5m
:- The maximum created at time that an event can have. This example shows that the max created at time is 5 minutes in the future from the time the event is received.
min_created_at_string
andmax_created_at
work the same way.
9.
rate_limit
(Rate Limiting)ws_limit: 100
:- The maximum number of WebSocket messages per second that the relay will accept.
ws_burst: 200
:- Allows a temporary burst of WebSocket messages.
event_limit: 50
:- The maximum number of Nostr events per second that the relay will accept.
event_burst: 100
:- Allows a temporary burst of Nostr events.
req_limit: 50
:- The limit of http requests per second.
req_burst: 100
:- The allowed burst of http requests.
max_event_size: 51200
:- The maximum size (in bytes) of a Nostr event that the relay will accept.
kind_size_limits: ...
:- Allows you to set size limits for specific event kinds.
category_limits: ...
:- Allows you to set rate limits for different event categories (ephemeral, addressable, regular, replaceable).
kind_limits: ...
:- Allows you to set rate limits for specific event kinds.
By understanding these settings, you can tailor your Grain Nostr relay to meet your specific needs and resource constraints.
whitelist.yml
The
whitelist.yml
file is used to control which users, event kinds, and domains are allowed to interact with your Grain relay. Here's a breakdown of the settings:1.
pubkey_whitelist
(Public Key Whitelist)enabled: false
:- If set to
true
, this enables the public key whitelist. Only users whose public keys are listed will be allowed to publish events to your relay.
- If set to
pubkeys:
:- A list of hexadecimal public keys that are allowed to publish events.
pubkey1
andpubkey2
are placeholders, you will replace these with actual hexadecimal public keys.
npubs:
:- A list of npubs that are allowed to publish events.
npub18ls2km9aklhzw9yzqgjfu0anhz2z83hkeknw7sl22ptu8kfs3rjq54am44
andnpub2
are placeholders, replace them with actual npubs.- npubs are bech32 encoded public keys.
2.
kind_whitelist
(Event Kind Whitelist)enabled: false
:- If set to
true
, this enables the event kind whitelist. Only events with the specified kinds will be allowed.
- If set to
kinds:
:- A list of event kinds (as strings) that are allowed.
"1"
and"2"
are example kinds. Replace these with the kinds you want to allow.- Example kinds are 0 for metadata, 1 for short text notes, and 2 for recommend server.
3.
domain_whitelist
(Domain Whitelist)enabled: false
:- If set to
true
, this enables the domain whitelist. This checks the domains .well-known folder for their nostr.json. This file contains a list of pubkeys. They will be considered whitelisted if on this list.
- If set to
domains:
:- A list of domains that are allowed.
"example.com"
and"anotherdomain.com"
are example domains. Replace these with the domains you want to allow.
blacklist.yml
The
blacklist.yml
file allows you to block specific content, users, and words from your Grain relay. Here's a breakdown of the settings:1.
enabled: true
- This setting enables the blacklist functionality. If set to
true
, the relay will actively block content and users based on the rules defined in this file.
2.
permanent_ban_words:
- This section lists words that, if found in an event, will result in a permanent ban for the event's author.
- really bad word
is a placeholder. Replace it with any words you want to permanently block.
3.
temp_ban_words:
- This section lists words that, if found in an event, will result in a temporary ban for the event's author.
- crypto
,- web3
, and- airdrop
are examples. Replace them with the words you want to temporarily block.
4.
max_temp_bans: 3
- This sets the maximum number of temporary bans a user can receive before they are permanently banned.
5.
temp_ban_duration: 3600
- This sets the duration of a temporary ban in seconds.
3600
seconds equals one hour.
6.
permanent_blacklist_pubkeys:
- This section lists hexadecimal public keys that are permanently blocked from using the relay.
- db0c9b8acd6101adb9b281c5321f98f6eebb33c5719d230ed1870997538a9765
is an example. Replace it with the public keys you want to block.
7.
permanent_blacklist_npubs:
- This section lists npubs that are permanently blocked from using the relay.
- npub1x0r5gflnk2mn6h3c70nvnywpy2j46gzqwg6k7uw6fxswyz0md9qqnhshtn
is an example. Replace it with the npubs you want to block.- npubs are the human readable version of public keys.
8.
mutelist_authors:
- This section lists hexadecimal public keys of author of a kind1000 mutelist. Pubkey authors on this mutelist will be considered on the permanent blacklist. This provides a nostr native way to handle the backlist of your relay
- 3fe0ab6cbdb7ee27148202249e3fb3b89423c6f6cda6ef43ea5057c3d93088e4
is an example. Replace it with the public keys of authors that have a mutelist you would like to use as a blacklist. Consider using your own.- Important Note: The mutelist Event MUST be stored in this relay for it to be retrieved. This means your relay must have a copy of the authors kind10000 mutelist to consider them for the blacklist.
Running Grain as a Service:
Windows Service:
To run Grain as a Windows service, you can use tools like NSSM (Non-Sucking Service Manager). NSSM allows you to easily install and manage any application as a Windows service.
* For instructions on how to install NSSM, please refer to this article: [Link to NSSM install guide coming soon].
-
Open Command Prompt as Administrator:
- Open the Windows Start menu, type "cmd," right-click on "Command Prompt," and select "Run as administrator."
-
Navigate to NSSM Directory:
- Use the
cd
command to navigate to the directory where you extracted NSSM. For example, if you extracted it toC:\nssm
, you would typecd C:\nssm
and press Enter.
- Use the
-
Install the Grain Service:
- Run the command
nssm install grain
. - A GUI will appear, allowing you to configure the service.
- Run the command
-
Configure Service Details:
- In the "Path" field, enter the full path to your Grain executable (e.g.,
C:\grain\grain_windows_amd64.exe
). - In the "Startup directory" field, enter the directory where your Grain executable is located (e.g.,
C:\grain
).
- In the "Path" field, enter the full path to your Grain executable (e.g.,
-
Install the Service:
- Click the "Install service" button.
-
Manage the Service:
- You can now manage the Grain service using the Windows Services manager. Open the Start menu, type "services.msc," and press Enter. You can start, stop, pause, or restart the Grain service from there.
Linux Service (systemd):
To run Grain as a Linux service, you can use systemd, the standard service manager for most modern Linux distributions.
-
Create a Systemd Service File:
- Open a text editor with root privileges (e.g.,
sudo nano /etc/systemd/system/grain.service
).
- Open a text editor with root privileges (e.g.,
-
Add Service Configuration:
- Add the following content to the
grain.service
file, replacing the placeholders with your actual paths and user information:
```toml [Unit] Description=Grain Nostr Relay After=network.target
[Service] ExecStart=/path/to/grain_linux_amd64 WorkingDirectory=/path/to/grain/directory Restart=always User=your_user #replace your_user Group=your_group #replace your_group
[Install] WantedBy=multi-user.target ```
- Replace
/path/to/grain/executable
with the full path to your Grain executable. - Replace
/path/to/grain/directory
with the directory containing your Grain executable. - Replace
your_user
andyour_group
with the username and group that will run the Grain service.
- Add the following content to the
-
Reload Systemd:
- Run the command
sudo systemctl daemon-reload
to reload the systemd configuration.
- Run the command
-
Enable the Service:
- Run the command
sudo systemctl enable grain.service
to enable the service to start automatically on boot.
- Run the command
-
Start the Service:
- Run the command
sudo systemctl start grain.service
to start the service immediately.
- Run the command
-
Check Service Status:
- Run the command
sudo systemctl status grain.service
to check the status of the Grain service. This will show you if the service is running and any recent logs. - You can run
sudo journalctl -f -u grain.service
to watch the logs
- Run the command
More guides are in the works for setting up tailscale to access your relay from anywhere over a private network and for setting up a cloudflare tunnel to your domain to deploy a grain relay accessible on a subdomain of your site eg wss://relay.yourdomain.com
-
@ 8bad92c3:ca714aa5
2025-06-07 13:01:40Key Takeaways
Michael Goldstein, aka Bitstein, presents a sweeping philosophical and economic case for going “all in” on Bitcoin, arguing that unlike fiat, which distorts capital formation and fuels short-term thinking, Bitcoin fosters low time preference, meaningful saving, and long-term societal flourishing. At the heart of his thesis is “hodling for good”—a triple-layered idea encompassing permanence, purpose, and the pursuit of higher values like truth, beauty, and legacy. Drawing on thinkers like Aristotle, Hoppe, and Josef Pieper, Goldstein redefines leisure as contemplation, a vital practice in aligning capital with one’s deepest ideals. He urges Bitcoiners to think beyond mere wealth accumulation and consider how their sats can fund enduring institutions, art, and architecture that reflect a moral vision of the future.
Best Quotes
“Let BlackRock buy the houses, and you keep the sats.”
“We're not hodling just for the sake of hodling. There is a purpose to it.”
“Fiat money shortens your time horizon… you can never rest.”
“Savings precedes capital accumulation. You can’t build unless you’ve saved.”
“You're increasing the marginal value of everyone else’s Bitcoin.”
“True leisure is contemplation—the pursuit of the highest good.”
“What is Bitcoin for if not to make the conditions for magnificent acts of creation possible?”
“Bitcoin itself will last forever. Your stack might not. What will outlast your coins?”
“Only a whale can be magnificent.”
“The market will sell you all the crack you want. It’s up to you to demand beauty.”
Conclusion
This episode is a call to reimagine Bitcoin as more than a financial revolution—it’s a blueprint for civilizational renewal. Michael Goldstein reframes hodling as an act of moral stewardship, urging Bitcoiners to lower their time preference, build lasting institutions, and pursue truth, beauty, and legacy—not to escape the world, but to rebuild it on sound foundations.
Timestamps
00:00 - Intro
00:50 - Michael’s BBB presentation Hodl for Good
07:27 - Austrian principles on capital
15:40 - Fiat distorts the economic process
23:34 - Bitkey
24:29 - Hodl for Good triple entendre
29:52 - Bitcoin benefits everyone
39:05 - Unchained
40:14 - Leisure theory of value
52:15 - Heightening life
1:15:48 - Breaking from the chase makes room for magnificence
1:32:32 - Nakamoto Institute’s missionTranscript
(00:00) Fiat money is by its nature a disturbance. If money is being continually produced, especially at an uncertain rate, these uh policies are really just redistribution of wealth. Most are looking for number to go up post hyper bitcoinization. The rate of growth of bitcoin would be more reflective of the growth of the economy as a whole.
(00:23) Ultimately, capital requires knowledge because it requires knowing there is something that you can add to the structures of production to lengthen it in some way that will take time but allow you to have more in the future than you would today. Let Black Rockck buy the houses and you keep the sats, not the other way around.
(00:41) You wait until later for Larry Frink to try to sell you a [Music] mansion. And we're live just like that. Just like that. 3:30 on a Friday, Memorial Day weekend. It's a good good good way to end the week and start the holiday weekend. Yes, sir. Yes, sir. Thank you for having me here. Thank you for coming. I wore this hat specifically because I think it's I think it's very apppropo uh to the conversation we're going to have which is I hope an extension of the presentation you gave at Bitblock Boom Huddle for good. You were working on
(01:24) that for many weeks leading up to uh the conference and explaining how you were structuring it. I think it's a very important topic to discuss now as the Bitcoin price is hitting new all-time highs and people are trying to understand what am I doing with Bitcoin? Like you have you have the different sort of factions within Bitcoin.
(01:47) Uh get on a Bitcoin standard, get on zero, spend as much Bitcoin as possible. You have the sailors of the world are saying buy Bitcoin, never sell, die with your Bitcoin. And I think you do a really good job in that presentation. And I just think your understanding overall of Bitcoin is incredible to put everything into context. It's not either or.
(02:07) It really depends on what you want to accomplish. Yeah, it's definitely there there is no actual one-sizefits-all um for I mean nearly anything in this world. So um yeah, I mean first of all I mean there was it was the first conference talk I had given in maybe five years. I think the one prior to that uh was um bit block boom 2019 which was my meme talk which uh has uh become infamous and notorious.
(02:43) So uh there was also a lot of like high expectations uh you know rockstar dev uh has has treated that you know uh that that talk with a lot of reference. a lot of people have enjoyed it and he was expecting this one to be, you know, the greatest one ever, which is a little bit of a little bit of a uh a burden to live up to those kinds of standards.
(03:08) Um, but you know, because I don't give a lot of talks. Um, you know, I I I like to uh try to bring ideas that might even be ideas that are common. So, something like hodling, we all talk about it constantly. uh but try to bring it from a little bit of a different angle and try to give um a little bit of uh new light to it.
(03:31) I alsove I've I've always enjoyed kind of coming at things from a third angle. Um whenever there's, you know, there's there's all these little debates that we have in in Bitcoin and sometimes it's nice to try to uh step out of it and look at it a little more uh kind of objectively and find ways of understanding it that incorporate the truths of of all of them.
(03:58) uh you know cuz I think we should always be kind of as much as possible after ultimate truth. Um so with this one um yeah I was kind of finding that that sort of golden mean. So uh um yeah and I actually I think about that a lot is uh you know Aristotle has his his concept of the golden mean. So it's like any any virtue is sort of between two vices um because you can you can always you can always take something too far.
(04:27) So you're you're always trying to find that right balance. Um so someone who is uh courageous you know uh one of the vices uh on one side is being basically reckless. I I can't remember what word he would use. Uh but effectively being reckless and just wanting to put yourself in danger for no other reason than just you know the thrill of it.
(04:50) Um and then on the other side you would just have cowardice which is like you're unwilling to put yourself um at any risk at any time. Um, and courage is right there in the middle where it's understanding when is the right time uh to put your put yourself, you know, in in the face of danger um and take it on. And so um in some sense this this was kind of me uh in in some ways like I'm obviously a partisan of hodling.
(05:20) Um, I've for, you know, a long time now talked about the, um, why huddling is good, why people do it, why we should expect it. Um, but still trying to find that that sort of golden mean of like yes, huddle, but also what are we hodling for? And it's not we're we're not hodddling just merely for the sake of hodddling.
(05:45) There there is a a purpose to it. And we should think about that. And that would also help us think more about um what are the benefits of of spending, when should we spend, why should we spend, what should we spend on um to actually give light to that sort of side of the debate. Um so that was that was what I was kind of trying to trying to get into.
(06:09) Um, as well as also just uh at the same time despite all the talk of hodling, there's always this perennial uh there's always this perennial dislike of hodlers because we're treated as uh as if um we're just free riding the network or we're just greedy or you know any of these things. And I wanted to show how uh huddling does serve a real economic purpose.
(06:36) Um, and it does benefit the individual, but it also does uh it it has actual real social um benefits as well beyond merely the individual. Um, so I wanted to give that sort of defense of hodling as well to look at it from um a a broader position than just merely I'm trying to get rich. Um uh because even the person who uh that is all they want to do um just like you know your your pure number grow up go up moonboy even that behavior has positive ramifications on on the economy.
(07:14) And while we might look at them and have uh judgments about their particular choices for them as an individual, we shouldn't discount that uh their actions are having positive positive effects for the rest of the economy. Yeah. So, let's dive into that just not even in the context of Bitcoin because I think you did a great job of this in the presentation.
(07:36) just you've done a good job of this consistently throughout the years that I've known you. Just from like a first principles Austrian economics perspective, what is the idea around capital accumulation, low time preference and deployment of that capital like what what like getting getting into like the nitty-gritty and then applying it to Bitcoin? Yeah, it's it's a big question and um in many ways I mean I I even I barely scratched the surface.
(08:05) uh I I can't claim to have read uh all the volumes of Bombber works, you know, capital and interest and and stuff like that. Um but I think there's some some sort of basic concepts that we can look at that we can uh draw a lot out. Um the first uh I guess let's write that. So repeat so like capital time preference. Yeah. Well, I guess getting more broad like why sav -
@ 90152b7f:04e57401
2025-06-08 20:18:10The results show that platforms must do more to detect and remove harmful content in closed groups while preserving user privacy. They must also improve tools for user reporting. Without these steps, private spaces online will continue to be exploited by extremists and bad actors to spread hate and coordinate violence.
Over the course of two weeks, ADL researchers posted 10 pieces of violative content (for example, “Jews are rats”) on private spaces and tracked the responses of three different platforms - before reporting and after.
Our testing found the following:
Facebook was the only platform that deployed any kind of auto-filtering to remove content proactively. However, this was before Facebook-owner Meta announced that it would abandon proactive moderation of non-illegal content in the U.S.
Discord did not take action on any content proactively—only after the content was reported.
Roblox’s auto-filtering did obscure some offensive posts, but it did not remove any of the content, the private group, or the user account posting violative content after we reported it.
Facebook and Discord removed most hateful content retroactively (after users reported it, in this case, by ADL), but their systems were not perfect and missed violative content.
In response to our research:
This research was shared with Meta, Discord and Roblox prior to publication and ADL researchers briefed the relevant teams at these companies. In response, Discord and Roblox acted. Specifically, Roblox shared that they “enabled an additional layer of automated review on Community Wall Post Abuse Reports. This means that abuse reports filed against Community wall posts will first undergo a review by an automated system, which will automatically take action if the wall post violates our policies. The additional layer of automation will empower human moderators to focus on deeper tasks and help increase the effectiveness of our review system.”
Private Online Spaces: Harboring Hate and Extremism
The problem of online hate and harassment has been well documented, but most data come from public online spaces such as X/Twitter, YouTube, or Reddit. These platforms typically use proactive moderation, such as automated filters and machine-learning tools, to identify and remove content that violates their rules.
Some platforms, however, allow users to create closed or private spaces where only members can see the content. These private spaces include closed Facebook groups, private Discord servers (a type of chat room), and communities on Roblox. Encrypted chat platforms such as WhatsApp, Telegram, and Signal also allow member-only spaces, some of which can be discovered publicly, while others are by invitation only. ADL’s 2024 annual survey of online hate and harassment found that between 2023 and 2024, incidences of harassment increased on both Telegram and WhatsApp, +6% and +11% respectively.
Private online spaces have been linked to numerous instances of online and in-person atrocities. Shooters such as the Buffalo shooter, or a school shooter in Perry High, Iowa, posted their manifestos and livestreamed their deeds on private Discord servers. In August 2024, a perpetrator in Turkey, motivated by white supremacists and accelerationism, shared his manifesto on Telegram before livestreaming a violent stabbing attack. Most recently, online bullies have used private spaces to promote extreme cruelty and self-harm as part of larger campaigns to harm vulnerable young people, sometimes leading to suicide.
ADL has also tracked many extremist groups that flourish on private groups and servers hosted by Discord, Telegram, and other platforms. Hate groups and conspiracy mongers, such as the Three Percenters or QAnon adherents, take advantage of private groups to organize and distribute hateful content and false narratives. Other extremist groups, such as extremist traditional Catholic and Islamic groups, have used Discord servers to share memes and hateful rhetoric. Extremist militias have been quietly organizing and regrouping on private Facebook groups since the January 6, 2021, attack on the U.S. Capitol. Individuals and groups on Roblox groom children to extremist ideologies through projects like “Redpill the Youth.” When neighborhood watch groups or community organizers use private groups, hateful users have, in some cases, infiltrated these groups to harass and intimidate other users.
It is difficult for researchers to assess how well platforms moderate these spaces or understand their inner workings because private online spaces restrict access. Private spaces can equally serve important social functions, such as for parent groups, political organizing, or protected spaces for marginalized groups to gather and provide mutual support. But tech companies do not make clear how they enforce their policies in private groups, often leaving content moderation up to users or administrators.
Understanding Content Moderation in Private Online Spaces
Members-only groups can be visible to non-members, such as many closed Facebook groups. But others, such as private Discord servers, are not making the groups' content invisible to non-members. Degrees of privacy and visibility can vary on Facebook groups, Telegram channels, or WhatsApp chats. Facebook groups, for example, can be fully public and open, publicly accessible but closed (anyone can join but only members can post or view content), or private (members must be approved). There are also two categories of private groups: closed groups that require approval but can be found through search, and fully secret groups that are not only private but cannot be found in search.
The three platforms we tested for this study (Facebook, Discord, and Roblox) have taken proactive steps to address hate, extremism, and antisemitism. We did not include platforms such as Telegram, which does not moderate hateful content, even though extremists use the platform's private channels to spread hate and coordinate harassment.
Facebook is one of the most popular social media platforms among users in the U.S., and where the majority of online harassment takes place (61% of people who are harassed report harassment on Facebook, according to ADL’s 2024 annual survey of online hate and harassment). Much of this harassment takes place in closed Facebook groups, but researchers have little insight into these spaces.
Discord began as a chat platform for gamers but has since expanded to host numerous online communities. Social interaction on Discord takes place in chatrooms (called servers) that offer a private or semi-private environment for users to chat both in groups and individually (similar to Slack). Discord allows users to create servers with various channels that can be set to invite-only, making it a popular choice for groups seeking privacy. Discord’s company culture, which emphasizes privacy and minimal moderation, makes it an attractive place for bad actors to connect and coordinate. Video calls and chats are not recorded or monitored, and users can delete posts permanently. Making video and audio calls end-to-end encrypted increases privacy for users, but it also makes it significantly more difficult for the platform to catch bad behavior. Discord's hands-off approach to content moderation--leaving most moderation decisions in the hands of the server’s administrators-- makes it easy to share extremist content there compared to similar platforms.
Roblox is a gaming and game creation platform popular with children, with at least 45% of users being under the age of 13. Roblox has a groups feature embedded within its website, though Roblox users primarily communicate with each other through in-game text or voice chat. Within Roblox groups, members can post messages on a group wall, participate in group events, and access exclusive in-game content provided by group leaders. Roblox groups often focus on themes, such as game development or in-game collaborations. It is the only gaming platform we included where the majority of communication takes place in-game. For comparison, we only examined the group feature on the Roblox website and not communication in Roblox games.
Methodology
1. We created one group per platform (Facebook, Discord and Roblox) simultaneously, and named the groups on Facebook and Discord “Group for the Truth;” (this name was already taken on Roblox so we named that one “Group for the Truth_2.”) To prevent users from inadvertently stumbling across the groups, the settings for each were set up in a manner that made them hidden from search.
2. We then used one account to create the groups and post content (the “posting account”), and another on a separate computer to report the content (the “reporting account”). Two researchers were assigned to each account. There were no further descriptions or images added to the groups, except on Roblox, which required a group description and image.
3. The posting account was then used to post hateful content to all three platforms. This content was pulled directly from Meta’s helpfully illustrative examples of violations against its hate speech policy at the time. Meta is the only platform with examples of what could be violative of its hate speech policy of the three platforms we reviewed.
4. Meta's Tier 1 Hate Speech policy, for example, states that a user may not post content that includes:
Dehumanizing speech in the form of comparisons to or generalizations about:
- Animals in general or specific types of animals that are culturally perceived as inferior (including but not limited to: Black people and apes or ape-like creatures; Jewish people and rats; Muslim people and pigs; Mexican people and worms)
We adapted this example to draft a hateful post stating, “Jews are rats.” Every post was derived directly from Meta’s policy examples, though there may not always be a corollary example within the policy. For example, Meta’s policy at the time stated that users may not post:
Content targeting a person or group of people on the basis of their protected characteristic(s) (in written or visual form):
-
Generalizations that state inferiority in the following ways:
-
Physical appearance, including but not limited to: ugly, hideous.
There was no further example provided by Meta, so we created a post that would intentionally violate this policy:
“Jews are the ugliest, most hideous people on Earth.”
Although these posts were based on Meta’s policy, each one has a matching Discord policy. The same applies to Roblox, though its hate speech policy is not nearly as detailed as Meta’s or Discord’s:
Roblox honors and welcomes users of all ages, backgrounds, and identities. We do not allow content or behavior that supports, glorifies, or promotes hate groups, their ideologies, or actions. You also may not discriminate, mock, or promote hatred against individuals or groups, or encourage others to do so directly or indirectly, on the basis of their:
- Race, perceived race, or ethnicity
We believe that the following posts are violative under Roblox’s policy as well:
-
“Jews are rats.”
-
“Jews are devils and shit.”
-
“The Holocaust did not happen-it’s a lie made up by the Jews.”
-
“Jews control the banks, the government and Hollywood and we need to get rid of them for the safety of American citizens.”
-
“Jews are the ugliest, most hideous people on Earth.”
-
“Jews should be segregated from all other people.”
5. We followed up our initial posts with additional sentences to test content violating Meta’s policy against dangerous organizations and individuals, such as violent extremists. These posts also violate Discord’s Violent Extremism policy and Roblox’s Community Standards.
-
“Hitler and the Nazis did nothing wrong.”
-
“Please donate to the Goyim Defense League!” (A link was attached to this sentence.)
We referenced the Goyim Defense League because they are a notorious group of antisemitic provocateurs, according to the ADL Center on Extremism.
We also posted the following two images in violation of Meta’s Dangerous Organizations and Individuals policy, Discord’s Violent Extremism policy, and Roblox’s Community Standards:
Image 1: Posted Images, “Covid Agenda” and “Ukraine-Russia War,” respectively. (Screenshot: 7/31/2024)
6. The following day, we reported each of these posts, if applicable. Though both “Jews are the ugliest, most hideous people on Earth” and “Jews should be segregated from all other people” run afoul of hate speech policies, we did not report them until the next day. We staggered reporting in this way so as to not get either our accounts or groups suspended before the study was over.
Findings
-
Facebook was the only platform to remove content before we reported it.
-
Discord did not take down any content at all, implying either that it has little to no automatic filtering or that any filtering is not robust enough to catch what our posting account shared. When offending posts were reported, Discord did remove posts and suspended the account.
-
Roblox obscured the text of offensive posts, but did not take down the group nor the offending account.
When we started reporting the potentially violative content to the platforms, we noticed a discrepancy between the platforms’ responses. Facebook’s reaction to reports included warnings before suspending the group. Discord provided less information to the administrator about why the posts were removed. It did not suspend the group but did suspend our Posting account. Roblox informed the posting account that the account or group was breaking the rules, but did not take down any posts within the group. Although it did obscure the text by censoring the entire post, replacing all content with x’s except for the obscured content, the group stayed the same as it did before reporting. No further content was taken down, and no alerts were given to either account.
Facebook
Facebook removed most offending posts when we reported them, gave feedback to the account administrator, and finally suspended the group when offending content continued to be posted. Some posts remain up-- despite notifications from our Reporting account.
Proactive Detection
Facebook did not remove any posts automatically on the first day we posted content. On the second day we posted, they removed “Ukraine-Russia War” automatically (see Image 2).
Image 2: Facebook’s alert after removing “Ukraine-Russia War.” (Screenshot: 7/19/2024)
Not only did Facebook remove the photo, but it also alerted the Posting account (the account admin) that the photo had been removed. When we clicked through “See why,” Facebook displayed the offending image and explained why the image had been removed. It also provided a link to the rule that was broken. Facebook also added restrictions to the account that posted the picture; the user could not create ads, create live videos, or start or join calls for approximately a month. It is not clear why Facebook took action against “Ukraine-Russia War” automatically, but not the sister image “Covid Agenda.” Both pictures originate from the Goyim Defense League and are prohibited by Meta’s policy rules. Meta has rolled back its Covid misinformation rules, but this image is still prohibited per their Dangerous Organizations and Individuals policy.
Facebook did not allow the posting account to post the link embedded in “Please donate to the Goyim Defense League!” Not only was Facebook the only platform to prevent adding the link, it also explained why it was not allowed (Image 3).
Image 3: Window preventing the user from posting a link to GDL’s site. (Screenshot: 7/31/2024)
Reporting Response
After we reported the posts, they were almost instantaneously actioned. The first post was reported at 4:21pm. By 4:24 pm, the reporting account was alerted that the report resulted in the post being removed.
At the same time, the posting account was notified that restrictions were added to the account (Images 4 and 5). Unlike Discord or Roblox’s restrictions, Facebook not only told the user which restrictions were added, but also explained which post was removed and which rule each had broken.
Images 4 (left) and 5 (right): Facebook account restrictions. (Screenshot: 7//30/2024)
The next day, we reported the second half of the posts and the remaining image. Facebook again took action, quickly taking down the posts. This time, however, the platform also permanently suspended the group. The posting account can still access the defunct group, but the reporting account cannot. Users can still log into both accounts, and post and comment on Facebook, just not the group. Facebook warned us that the posting account is under threat of being permanently suspended (Image 6).
Image 6: Group suspension and account status. (Screenshot: 07/31/2024)
Although we commend Facebook for their quick action, there were still posts that remain up. These posts, despite the reports, were never taken down as of publication (Image 7).
Image 7: Facebook group. (Screenshot: 2/28/2025)
Discord
In contrast to Facebook, Discord’s content moderation strategy for private groups, appears to be reactive rather than proactive. It depends primarily on reports from users of those groups, rather than automatic filtering and takedowns.
Proactive detection
Until we reported the offending content on the Discord group, no content was taken down.
Image 8: Discord content. (Screenshot: 1/15/2025)
Reporting Response
While Discord did not take action on content in the proactive detection phase, once we started reporting posts, they responded proactively, removing posts before we could report them on day 14.
The first half of the content was reported on day 13 but did not receive alerts from Discord until an hour later. The alerts explained why the posting account was being sanctioned and which rules it had broken.
Image 9: Discord alert for breaking community guidelines. (Screenshot: 7/2024)
By day 14, nearly every post had been taken down—even the ones not reported yet. All posts save one were taken down proactively, although we had not reported those images yet. The only post still up said, “Please donate to the Goyim Defense League.” We reported this post, but it was never taken down.
Image 10: Discord group. (Screenshot: 7/31/2024)
Unlike Facebook, Discord did not take action against the group itself; the group is not suspended, and the reporting account can still post to it at the time of writing. Discord did act against the posting account, suspending it a few days later. The posting account received no notification that it was suspended, save for emails alerting us to “new messages” on Discord. These messages were forwarded to the now inaccessible account, so we cannot determine when Discord took action. The posting user might have received a more pointed alert, like an app notification, if we had used the phone app instead of the desktop website. In any case, we were able to create a new account with the same name and using the same email address after our account was removed.
Image 11: Punishments from Discord. (Screenshot: 7/31/2024)
Roblox
The protections offered by Roblox in the private group were minimal, especially compared to Discord and Facebook. We received virtually no feedback on reporting from the platform. There were no warnings or pop-ups for the administrator. Roblox did not remove any posts, despite reports from our reporting account.
Proactive detection
Of the ten posts we created, four were automatically obscured when we posted them, so members could see the posts but not view the text. Roblox replaced the text with the hashmark (#), obscuring not just the offensive words but the entire post (Image 12). It is not entirely clear why Roblox hid some posts this way. For example, the text “Jews are devils and shit” was likely hidden because of the expletive. Roblox might also be automatically filtering keywords that it deems objectionable. It could be that terms like Holocaust, Hitler, Nazis or Goyim were automatically flagged, causing those posts to be removed.
Roblox does not allow pictures or links to be posted on the group’s page, so we were unable to post the Covid Agenda and Ukraine-Russia War images. We were able to post “Goyim Defense League” without the embedded link, though it was also immediately hidden.
Image 12: Hidden Roblox content. (Screenshot: 7/24/2024)
Reporting response
After we reported every post through our reporting account, there was no response from Roblox, unlike our experience with Facebook or Discord. No other posts were taken down. There were no tools that alerted the poster, the admin or reporting account that any action had been taken—not even a pop-up that the report had been received. The admin received no report that multiple posts on the group had been reported for hate and harassment.
Even after multiple reports, no action was taken on any of the posts. In fact, there was no change in the group from the initial first action, hiding the text. Compare the image of the Roblox group taken on day 14 with the image taken of the group over two weeks later (Image 13). There is no discernible difference.
Image 13: Roblox content. (Screenshot: 7/22/2024 and 8/2/2024)
Recommendations For Platforms with Members-only Groups
How platforms respond to violative content in private is just as important as how they respond to violative content in public. Facebook and Discord, while not perfect, moderated these private groups in a way that removed the majority of hateful content and suspended the hateful accounts.
We do not expect platforms to moderate content on private groups as strictly as in public spaces, due to privacy concerns, but we do expect an appropriate level of preventative moderation and tools for groups to moderate content. Roblox appears to have had little to no moderation in place, which is concerning given the young age of its player base. Roblox hid offensive and controversial text but did not suspend the posting account or group. It also provided no alerts to the admin or group when a report was made. While we understand that the bulk of communication on Roblox happens in-game, little action was taken within the group chat to moderate offensive content. Terrorist and violent extremist groups organize on private groups and channels, not in public spaces. Platforms with private groups should adopt a minimum standard of moderation on private groups to proactively stem this problem.
Platforms should:
-
Reexamine how automatic filtering functions: A common problem encountered in this course of our research was the seemingly arbitrary nature of the filtering tools. For example, Facebook automatically filtered one image but not another equally objectionable. It is also not clear why one image was actioned and the other was not. Platforms should reexamine their automatic filtering functions to catch content that slips through the cracks.
-
Prioritize user-reporting within private groups: Because of the protections that are available for private groups, reporting by group members is the primary channel for alerting the platform. Platforms should prioritize these reports and act on them quickly. These reports may be one of the first signs that something is amiss within a group.
-
Suspend groups when they reach a threshold of violative content: Facebook was the only platform that fully suspended our group. Discord did not suspend our group, only the user, who was able to promptly create a new account. Roblox suspended neither the group nor the account. If violative users and groups are allowed to continue their work with barely any pushback from platforms, then any moderation will fail.
-
Utilize metadata in content moderation: Private groups may restrict the visibility of their content to outside users and the platform itself, but that does not mean that there is no data available. Post times, user addresses, and other metadata are available to platform moderation teams. Discord, in particular, could take better advantage of the tools available to it. Discord’s content, save for video and audio content, is not encrypted, and the platform could be more proactive about automatic filtering if it chose to.
-
@ b1ddb4d7:471244e7
2025-06-09 00:01:53Hosted at the iconic Palace of Culture and Science—a prominent symbol of the communist era—the Bitcoin FilmFest offers a vibrant celebration of film through the lens of bitcoin. The venue itself provides a striking contrast to the festival’s focus, highlighting bitcoin’s core identity as a currency embodying independence from traditional financial and political systems.
𝐅𝐢𝐱𝐢𝐧𝐠 𝐭𝐡𝐞 𝐜𝐮𝐥𝐭𝐮𝐫𝐞 𝐰𝐢𝐭𝐡 𝐩𝐨𝐰𝐞𝐫𝐟𝐮𝐥 𝐦𝐮𝐬𝐢𝐜 𝐯𝐢𝐛𝐞𝐬.
Warsaw, Day Zero at #BFF25 (European Bitcoin Pizza Day) with @roger__9000, MadMunky and the @2140_wtf squadpic.twitter.com/9ogVvWRReA
— Bitcoin FilmFest
(@bitcoinfilmfest) May 28, 2025
This venue represents an era when the state tightly controlled the economy and financial systems. The juxtaposition of this historical site with an event dedicated to bitcoin is striking and thought-provoking.
The event features a diverse array of activities, including engaging panel discussions, screenings of both feature-length and short films, workshops and lively parties. Each component designed to explore the multifaceted world of bitcoin and its implications for society, offering attendees a blend of entertainment and education.
The films showcase innovative narratives and insights into bitcoin’s landscape, while the panels facilitate thought-provoking discussions among industry experts and filmmakers.
Networking is a significant aspect of the festival, with an exceptionally open and friendly atmosphere that foster connections among participants. Participants from all over Europe gather to engage with like-minded individuals who share a passion for BTC and its implications for the future.
The open exchanges of ideas foster a sense of community, allowing attendees to forge new connections, collaborate on projects, and discuss the potential of blockchain technology implemented in bitcoin.
The organization of the festival is extraordinary, ensuring a smooth flow of information and an expertly structured schedule filled from morning until evening. Attendees appreciate the meticulous planning that allowed them to maximize their experience. Additionally, thoughtful touches such as gifts from sponsors and well-chosen locations for various events contribute to the overall positive atmosphere of the festival.
Overall, the Bitcoin FilmFest not only highlights the artistic expression surrounding bitcoin but also serves as a vital platform for dialogue—about financial freedom, the future of money, and individual sovereignty in a shifting world.
The event successfully bridges the gap between a historical symbol of control and a movement that celebrates freedom, innovation, and collaboration in the digital age, highlighting the importance of independence in financial systems while fostering a collaborative environment for innovation and growth.
Next year’s event is slated for June 5-7 2026. For further updates check: https://bitcoinfilmfest.com/
-
@ dfa02707:41ca50e3
2025-06-07 11:01:54Contribute to keep No Bullshit Bitcoin news going.
- The latest firmware updates for COLDCARD devices introduce two major features: COLDCARD Co-sign (CCC) and Key Teleport between two COLDCARD Q devices using QR codes and/or NFC with a website.
What's new
- COLDCARD Co-Sign: When CCC is enabled, a second seed called the Spending Policy Key (Key C) is added to the device. This seed works with the device's Main Seed and one or more additional XPUBs (Backup Keys) to form 2-of-N multisig wallets.
- The spending policy functions like a hardware security module (HSM), enforcing rules such as magnitude and velocity limits, address whitelisting, and 2FA authentication to protect funds while maintaining flexibility and control, and is enforced each time the Spending Policy Key is used for signing.
- When spending conditions are met, the COLDCARD signs the partially signed bitcoin transaction (PSBT) with the Main Seed and Spending Policy Key for fund access. Once configured, the Spending Policy Key is required to view or change the policy, and violations are denied without explanation.
"You can override the spending policy at any time by signing with either a Backup Key and the Main Seed or two Backup Keys, depending on the number of keys (N) in the multisig."
-
A step-by-step guide for setting up CCC is available here.
-
Key Teleport for Q devices allows users to securely transfer sensitive data such as seed phrases (words, xprv), secure notes and passwords, and PSBTs for multisig. It uses QR codes or NFC, along with a helper website, to ensure reliable transmission, keeping your sensitive data protected throughout the process.
- For more technical details, see the protocol spec.
"After you sign a multisig PSBT, you have option to “Key Teleport” the PSBT file to any one of the other signers in the wallet. We already have a shared pubkey with them, so the process is simple and does not require any action on their part in advance. Plus, starting in this firmware release, COLDCARD can finalize multisig transactions, so the last signer can publish the signed transaction via PushTX (NFC tap) to get it on the blockchain directly."
- Multisig transactions are finalized when sufficiently signed. It streamlines the use of PushTX with multisig wallets.
- Signing artifacts re-export to various media. Users are now provided with the capability to export signing products, like transactions or PSBTs, to alternative media rather than the original source. For example, if a PSBT is received through a QR code, it can be signed and saved onto an SD card if needed.
- Multisig export files are signed now. Public keys are encoded as P2PKH address for all multisg signature exports. Learn more about it here.
- NFC export usability upgrade: NFC keeps exporting until CANCEL/X is pressed.
- Added Bitcoin Safe option to Export Wallet.
- 10% performance improvement in USB upload speed for large files.
- Q: Always choose the biggest possible display size for QR.
Fixes
- Do not allow change Main PIN to same value already used as Trick PIN, even if Trick PIN is hidden.
- Fix stuck progress bar under
Receiving...
after a USB communications failure. - Showing derivation path in Address Explorer for root key (m) showed double slash (//).
- Can restore developer backup with custom password other than 12 words format.
- Virtual Disk auto mode ignores already signed PSBTs (with “-signed” in file name).
- Virtual Disk auto mode stuck on “Reading…” screen sometimes.
- Finalization of foreign inputs from partial signatures. Thanks Christian Uebber!
- Temporary seed from COLDCARD backup failed to load stored multisig wallets.
Destroy Seed
also removes all Trick PINs from SE2.Lock Down Seed
requires pressing confirm key (4) to execute.- Q only: Only BBQr is allowed to export Coldcard, Core, and pretty descriptor.
-
@ dfa02707:41ca50e3
2025-06-08 20:02:18Contribute to keep No Bullshit Bitcoin news going.
- This release introduces Payjoin v2 functionality to Bitcoin wallets on Cake, along with several UI/UX improvements and bug fixes.
- The Payjoin v2 protocol enables asynchronous, serverless coordination between sender and receiver, removing the need to be online simultaneously or maintain a server. This simplifies privacy-focused transactions for regular users.
"I cannot speak highly enough of how amazing it has been to work with @bitgould and Jaad from the@payjoindevkit team, they're doing incredible work. None of this would be possible without them and their tireless efforts. PDK made it so much easier to ship Payjoin v2 than it would have been otherwise, and I can't wait to see other wallets jump in and give back to PDK as they implement it like we did," said Seth For Privacy, VP at Cake Wallet.
How to started with Payjoin in Cake Wallet:
- Open the app menu sidebar and click
Privacy
. - Toggle the
Use Payjoin
option. - Now on your receive screen you'll see an option to copy a Payjoin URL
- Bull Bitcoin Wallet v0.4.0 introduced Payjoin v2 support in late December 2024. However, the current implementations are not interoperable at the moment, an issue that should be addressed in the next release of the Bull Bitcoin Wallet.
- Cake Wallet was one of the first wallets to introduce Silent Payments back in May 2024. However, users may encounter sync issues while using this feature at present, which will be resolved in the next release of Cake Wallet.
What's new
- Payjoin v2 implementation.
- Wallet group improvements: Enhanced management of multiple wallets.
- Various bug fixes: improving overall stability and user experience.
- Monero (XMR) enhancements.
Learn more about using, implementing, and understanding BIP 77: Payjoin Version 2 using the
payjoin
crate in Payjoin Dev Kit here. -
@ 9ca447d2:fbf5a36d
2025-06-08 20:01:57Meta Platforms Inc., the parent company of Facebook and Instagram, has voted down a shareholder proposal to add bitcoin to its treasury. The vote took place at the company’s annual shareholder meeting on May 30, 2025.
The proposal, known as Proposal 13, was submitted by investor Ethan Peck on behalf of the National Center for Public Policy Research (NCPPR).
It asked Meta to convert a portion of its $72 billion in cash, cash equivalents, and marketable securities into bitcoin. The idea was to hedge against inflation and low returns from traditional bond investments.
But the company’s shareholders said no.
According to the official count, more than 4.98 billion shares were voted against the proposal, while 3.92 million shares were for it—less than 0.1% of total votes. 8.86 million shares were abstentions and over 204 million were broker non-votes.
Meta shareholders rejected bitcoin reserve proposal — SEC
So now, Meta joins Microsoft and Amazon in rejecting calls to add bitcoin to their balance sheets.
Related: Microsoft Shareholders Reject Bitcoin Investment Proposal
Proponents of the proposal argued that bitcoin would help protect Meta’s reserves from inflation and weak bond returns. Peck and others pointed to bitcoin’s strong performance in 2024 and growing institutional interest in the scarce digital asset.
The proposal said bitcoin’s fixed supply and track record make it a long-term store of value.
High-profile supporters, including Matt Cole, CEO of Strive Asset Management, brought the issue to the forefront. At the Bitcoin 2025 conference in Las Vegas, Cole addressed Meta CEO Mark Zuckerberg directly:
“You have already done step one. You have named your goat Bitcoin,” he said. “My ask is that you take step two and adopt a bold corporate bitcoin treasury strategy.”
Others, like Bloomberg ETF analyst Eric Balchunas, said if Meta added bitcoin to its balance sheet it would be a big deal. “If Meta or Microsoft adds BTC to the balance sheet, it will be like when Tom Hanks got COVID—suddenly, it feels real,” Balchunas said.
Despite all the hype and arguments for Bitcoin, the tech giant’s board of directors opposed the measure. The board said the company already has a treasury management process in place that prioritizes capital preservation and liquidity.
“While we are not opining on the merits of cryptocurrency investments compared to other assets, we believe the requested assessment is unnecessary given our existing processes to manage our corporate treasury,” Meta’s board noted.
The board also noted that it reviews many investment options and sees no need for a separate review process specific to Bitcoin.
Meta’s decision shows the broader hesitation of large-cap companies to get into bitcoin as part of their financial strategy.
While companies like Michael Saylor’s Strategy are adding bitcoin to their treasuries every chance they get, companies like Microsoft, Amazon and now Meta, are taking a more cautious approach.
According to recent reports, Meta is exploring ways to integrate stablecoins into its platforms to enable global payouts.
This would be a re-entry into the digital asset space after the company shelved its Diem project due to regulatory issues—a step that bitcoin advocates deem unnecessary, insufficient, and irrelevant to protecting the company’s finances.
-
@ dfa02707:41ca50e3
2025-06-07 11:01:52Contribute to keep No Bullshit Bitcoin news going.
- RoboSats v0.7.7-alpha is now available!
NOTE: "This version of clients is not compatible with older versions of coordinators. Coordinators must upgrade first, make sure you don't upgrade your client while this is marked as pre-release."
- This version brings a new and improved coordinators view with reviews signed both by the robot and the coordinator, adds market price sources in coordinator profiles, shows a correct warning for canceling non-taken orders after a payment attempt, adds Uzbek sum currency, and includes package library updates for coordinators.
Source: RoboSats.
- siggy47 is writing daily RoboSats activity reviews on stacker.news. Check them out here.
- Stay up-to-date with RoboSats on Nostr.
What's new
- New coordinators view (see the picture above).
- Available coordinator reviews signed by both the robot and the coordinator.
- Coordinators now display market price sources in their profiles.
Source: RoboSats.
- Fix for wrong message on cancel button when taking an order. Users are now warned if they try to cancel a non taken order after a payment attempt.
- Uzbek sum currency now available.
- For coordinators: library updates.
- Add docker frontend (#1861).
- Add order review token (#1869).
- Add UZS migration (#1875).
- Fixed tests review (#1878).
- Nostr pubkey for Robot (#1887).
New contributors
Full Changelog: v0.7.6-alpha...v0.7.7-alpha
-
@ 5c26ee8b:a4d229aa
2025-06-08 20:49:48Ad-Daba (the unusual creature), is one of the major signs of Judgement Day and it’s more likely to be the next sign to appear soon. As it appears the belief of disbelievers or repentance won’t be accepted. In the following some verses of the Quran and Hadith mentioning it as well as other major signs.
27:82 An-Naml
۞ وَإِذَا وَقَعَ الْقَوْلُ عَلَيْهِمْ أَخْرَجْنَا لَهُمْ دَابَّةً مِنَ الْأَرْضِ تُكَلِّمُهُمْ أَنَّ النَّاسَ كَانُوا بِآيَاتِنَا لَا يُوقِنُونَ
And when the word befalls them, We will bring forth for them a creature (Ad-Daba) from the earth speaking to them, [saying] that the people were, of Our verses, not certain [in faith].
6:158 Al-An'aam
هَلْ يَنْظُرُونَ إِلَّا أَنْ تَأْتِيَهُمُ الْمَلَائِكَةُ أَوْ يَأْتِيَ رَبُّكَ أَوْ يَأْتِيَ بَعْضُ آيَاتِ رَبِّكَ ۗ يَوْمَ يَأْتِي بَعْضُ آيَاتِ رَبِّكَ لَا يَنْفَعُ نَفْسًا إِيمَانُهَا لَمْ تَكُنْ آمَنَتْ مِنْ قَبْلُ أَوْ كَسَبَتْ فِي إِيمَانِهَا خَيْرًا ۗ قُلِ انْتَظِرُوا إِنَّا مُنْتَظِرُونَ
Do they [then] wait for anything except that the angels should come to them or your Lord should come or that there come some of the signs of your Lord? The Day that some of the signs of your Lord will come no soul will benefit from its faith as long as it had not believed before or had earned through its faith some good. Say, "Wait. Indeed, we [also] are waiting."
It was narrated that Hudhaifah bin Asid, Abu Sarihah, said: "The Messenger of Allah (ﷺ) looked out from a room, when we were talking about the Hour. He said: 'The Hour will not begin until ten signs appear: The rising of the sun from the west (place of its setting); Dajjal; the smoke; the beast; Gog and Magog people; the appearance of 'Eisa bin Maryam(as), the earth collapsing three times - once in the east, one in the west and one in the Arabian Peninsula; and fire that will emerge from the plain of Aden Abyan and will drive the people to the place of Gathering, stopping with them when they stop at night and when they stop to rest at midday."
حَدَّثَنَا عَلِيُّ بْنُ مُحَمَّدٍ، حَدَّثَنَا وَكِيعٌ، حَدَّثَنَا سُفْيَانُ، عَنْ فُرَاتٍ الْقَزَّازِ، عَنْ عَامِرِ بْنِ وَاثِلَةَ أَبِي الطُّفَيْلِ الْكِنَانِيِّ، عَنْ حُذَيْفَةَ بْنِ أَسِيدٍ أَبِي سَرِيحَةَ، قَالَ اطَّلَعَ رَسُولُ اللَّهِ ـ صلى الله عليه وسلم ـ مِنْ غُرْفَةٍ وَنَحْنُ نَتَذَاكَرُ السَّاعَةَ فَقَالَ " لاَ تَقُومُ السَّاعَةُ حَتَّى تَكُونَ عَشْرُ آيَاتٍ طُلُوعُ الشَّمْسِ مِنْ مَغْرِبِهَا وَالدَّجَّالُ وَالدُّخَانُ وَالدَّابَّةُ وَيَأْجُوجُ وَمَأْجُوجُ وَخُرُوجُ عِيسَى ابْنِ مَرْيَمَ عَلَيْهِ السَّلاَمُ وَثَلاَثُ خُسُوفٍ خَسْفٌ بِالْمَشْرِقِ وَخَسْفٌ بِالْمَغْرِبِ وَخَسْفٌ بِجَزِيرَةِ الْعَرَبِ وَنَارٌ تَخْرُجُ مِنْ قَعْرِ عَدَنِ أَبْيَنَ تَسُوقُ النَّاسَ إِلَى الْمَحْشَرِ تَبِيتُ مَعَهُمْ إِذَا بَاتُوا وَتَقِيلُ مَعَهُمْ إِذَا قَالُوا " .
قال رسول الله صلي الله عليه وسلم: تخرجُ الدابَّةُ، فتَسِمُ الناسَ على خراطيمِهم، ثم يُعمِّرون فيكم، حتى يشتريَ الرجلُ الدابَّةَ، فيُقالُ: ممَّنِ اشتريتَ؟ فيقولُ: من الرجلِ المُخَطَّمِ
The prophet Mohamed peace be upon him said: The beast will come out and brand people (disbelievers) on their noses (leaves a sign burned on their nose so it’s known of their disbelief). Then they will live among you until a man buys a beast and it will be said: From whom did you buy it? He will say: From the man with the sign on the nose.
The beast looks unusual and some people might find it scary. However, it’s a sign of God and it must not be killed as this will call God’s punishment like what happen when the people of prophet Saleh peace be upon him killed the huge camel as mentioned in the following verses.
7:73 Al-A'raaf
وَإِلَىٰ ثَمُودَ أَخَاهُمْ صَالِحًا ۗ قَالَ يَا قَوْمِ اعْبُدُوا اللَّهَ مَا لَكُمْ مِنْ إِلَٰهٍ غَيْرُهُ ۖ قَدْ جَاءَتْكُمْ بَيِّنَةٌ مِنْ رَبِّكُمْ ۖ هَٰذِهِ نَاقَةُ اللَّهِ لَكُمْ آيَةً ۖ فَذَرُوهَا تَأْكُلْ فِي أَرْضِ اللَّهِ ۖ وَلَا تَمَسُّوهَا بِسُوءٍ فَيَأْخُذَكُمْ عَذَابٌ أَلِيمٌ
And to the Thamud [We sent] their brother Salih. He said, "O my people, worship Allah; you have no deity other than Him. There has come to you clear evidence from your Lord. This is the she-camel of Allah [sent] to you as a sign. So leave her to eat within Allah 's land and do not touch her with harm, lest there seize you a painful punishment.
7:74 Al-A'raaf
وَاذْكُرُوا إِذْ جَعَلَكُمْ خُلَفَاءَ مِنْ بَعْدِ عَادٍ وَبَوَّأَكُمْ فِي الْأَرْضِ تَتَّخِذُونَ مِنْ سُهُولِهَا قُصُورًا وَتَنْحِتُونَ الْجِبَالَ بُيُوتًا ۖ فَاذْكُرُوا آلَاءَ اللَّهِ وَلَا تَعْثَوْا فِي الْأَرْضِ مُفْسِدِينَ
And remember when He made you successors after the 'Aad and settled you in the land, [and] you take for yourselves palaces from its plains and carve from the mountains, homes. Then remember the favors of Allah and do not commit abuse on the earth, spreading corruption."
7:75 Al-A'raaf
قَالَ الْمَلَأُ الَّذِينَ اسْتَكْبَرُوا مِنْ قَوْمِهِ لِلَّذِينَ اسْتُضْعِفُوا لِمَنْ آمَنَ مِنْهُمْ أَتَعْلَمُونَ أَنَّ صَالِحًا مُرْسَلٌ مِنْ رَبِّهِ ۚ قَالُوا إِنَّا بِمَا أُرْسِلَ بِهِ مُؤْمِنُونَ
Said the eminent ones who were arrogant among his people to those who were oppressed - to those who believed among them, "Do you [actually] know that Salih is sent from his Lord?" They said, "Indeed we, in that with which he was sent, are believers."
7:76 Al-A'raaf
قَالَ الَّذِينَ اسْتَكْبَرُوا إِنَّا بِالَّذِي آمَنْتُمْ بِهِ كَافِرُونَ
Said those who were arrogant, "Indeed we, in that which you have believed, are disbelievers."
7:77 Al-A'raaf
فَعَقَرُوا النَّاقَةَ وَعَتَوْا عَنْ أَمْرِ رَبِّهِمْ وَقَالُوا يَا صَالِحُ ائْتِنَا بِمَا تَعِدُنَا إِنْ كُنْتَ مِنَ الْمُرْسَلِينَ
So they hamstrung the she-camel and were insolent toward the command of their Lord and said, "O Salih, bring us what you promise us, if you should be of the messengers."
7:78 Al-A'raaf
فَأَخَذَتْهُمُ الرَّجْفَةُ فَأَصْبَحُوا فِي دَارِهِمْ جَاثِمِينَ
So the earthquake seized them, and they became within their home [corpses] fallen prone.
7:79 Al-A'raaf
فَتَوَلَّىٰ عَنْهُمْ وَقَالَ يَا قَوْمِ لَقَدْ أَبْلَغْتُكُمْ رِسَالَةَ رَبِّي وَنَصَحْتُ لَكُمْ وَلَٰكِنْ لَا تُحِبُّونَ النَّاصِحِينَ
And he turned away from them and said, "O my people, I had certainly conveyed to you the message of my Lord and advised you, but you do not like advisors."
God is the most merciful and has decreed everything and even the major signs of Judgement Day can have the punishment coming with them alleviated or reduced by God. However, there must be a reason for reducing the intensity of the calamities, as God may decree, and the reason is repentance as well as good actions to adjust what was done wrong. Also, although the major signs of Judgement Day will be known to the majority of the people, some of them might concern smaller groups of people or a country.
3:133 Aal-i-Imraan
۞ وَسَارِعُوا إِلَىٰ مَغْفِرَةٍ مِنْ رَبِّكُمْ وَجَنَّةٍ عَرْضُهَا السَّمَاوَاتُ وَالْأَرْضُ أُعِدَّتْ لِلْمُتَّقِينَ
And hasten to forgiveness from your Lord and a garden as wide as the heavens and earth, prepared for the righteous
3:134 Aal-i-Imraan
الَّذِينَ يُنْفِقُونَ فِي السَّرَّاءِ وَالضَّرَّاءِ وَالْكَاظِمِينَ الْغَيْظَ وَالْعَافِينَ عَنِ النَّاسِ ۗ وَاللَّهُ يُحِبُّ الْمُحْسِنِينَ
Who spend [in the cause of Allah] during ease and hardship and who restrain anger and who pardon the people - and Allah loves the doers of good;
3:135 Aal-i-Imraan
وَالَّذِينَ إِذَا فَعَلُوا فَاحِشَةً أَوْ ظَلَمُوا أَنْفُسَهُمْ ذَكَرُوا اللَّهَ فَاسْتَغْفَرُوا لِذُنُوبِهِمْ وَمَنْ يَغْفِرُ الذُّنُوبَ إِلَّا اللَّهُ وَلَمْ يُصِرُّوا عَلَىٰ مَا فَعَلُوا وَهُمْ يَعْلَمُونَ
And those who, when they commit an immorality or wrong themselves [by transgression], remember Allah and seek forgiveness for their sins - and who can forgive sins except Allah? - and [who] do not persist in what they have done while they know.
3:136 Aal-i-Imraan
أُولَٰئِكَ جَزَاؤُهُمْ مَغْفِرَةٌ مِنْ رَبِّهِمْ وَجَنَّاتٌ تَجْرِي مِنْ تَحْتِهَا الْأَنْهَارُ خَالِدِينَ فِيهَا ۚ وَنِعْمَ أَجْرُ الْعَامِلِينَ
Those - their reward is forgiveness from their Lord and gardens beneath which rivers flow [in Paradise], wherein they will abide eternally; and excellent is the reward of the [righteous] workers.
3:137 Aal-i-Imraan
قَدْ خَلَتْ مِنْ قَبْلِكُمْ سُنَنٌ فَسِيرُوا فِي الْأَرْضِ فَانْظُرُوا كَيْفَ كَانَ عَاقِبَةُ الْمُكَذِّبِينَ
Similar situations [as yours] have passed on before you, so proceed throughout the earth and observe how was the end of those who denied.
3:138 Aal-i-Imraan
هَٰذَا بَيَانٌ لِلنَّاسِ وَهُدًى وَمَوْعِظَةٌ لِلْمُتَّقِينَ
This [Qur'an] is a clear statement to [all] the people and a guidance and instruction for those conscious of Allah.
-
@ 21335073:a244b1ad
2025-03-18 20:47:50Warning: This piece contains a conversation about difficult topics. Please proceed with caution.
TL;DR please educate your children about online safety.
Julian Assange wrote in his 2012 book Cypherpunks, “This book is not a manifesto. There isn’t time for that. This book is a warning.” I read it a few times over the past summer. Those opening lines definitely stood out to me. I wish we had listened back then. He saw something about the internet that few had the ability to see. There are some individuals who are so close to a topic that when they speak, it’s difficult for others who aren’t steeped in it to visualize what they’re talking about. I didn’t read the book until more recently. If I had read it when it came out, it probably would have sounded like an unknown foreign language to me. Today it makes more sense.
This isn’t a manifesto. This isn’t a book. There is no time for that. It’s a warning and a possible solution from a desperate and determined survivor advocate who has been pulling and unraveling a thread for a few years. At times, I feel too close to this topic to make any sense trying to convey my pathway to my conclusions or thoughts to the general public. My hope is that if nothing else, I can convey my sense of urgency while writing this. This piece is a watchman’s warning.
When a child steps online, they are walking into a new world. A new reality. When you hand a child the internet, you are handing them possibilities—good, bad, and ugly. This is a conversation about lowering the potential of negative outcomes of stepping into that new world and how I came to these conclusions. I constantly compare the internet to the road. You wouldn’t let a young child run out into the road with no guidance or safety precautions. When you hand a child the internet without any type of guidance or safety measures, you are allowing them to play in rush hour, oncoming traffic. “Look left, look right for cars before crossing.” We almost all have been taught that as children. What are we taught as humans about safety before stepping into a completely different reality like the internet? Very little.
I could never really figure out why many folks in tech, privacy rights activists, and hackers seemed so cold to me while talking about online child sexual exploitation. I always figured that as a survivor advocate for those affected by these crimes, that specific, skilled group of individuals would be very welcoming and easy to talk to about such serious topics. I actually had one hacker laugh in my face when I brought it up while I was looking for answers. I thought maybe this individual thought I was accusing them of something I wasn’t, so I felt bad for asking. I was constantly extremely disappointed and would ask myself, “Why don’t they care? What could I say to make them care more? What could I say to make them understand the crisis and the level of suffering that happens as a result of the problem?”
I have been serving minor survivors of online child sexual exploitation for years. My first case serving a survivor of this specific crime was in 2018—a 13-year-old girl sexually exploited by a serial predator on Snapchat. That was my first glimpse into this side of the internet. I won a national award for serving the minor survivors of Twitter in 2023, but I had been working on that specific project for a few years. I was nominated by a lawyer representing two survivors in a legal battle against the platform. I’ve never really spoken about this before, but at the time it was a choice for me between fighting Snapchat or Twitter. I chose Twitter—or rather, Twitter chose me. I heard about the story of John Doe #1 and John Doe #2, and I was so unbelievably broken over it that I went to war for multiple years. I was and still am royally pissed about that case. As far as I was concerned, the John Doe #1 case proved that whatever was going on with corporate tech social media was so out of control that I didn’t have time to wait, so I got to work. It was reading the messages that John Doe #1 sent to Twitter begging them to remove his sexual exploitation that broke me. He was a child begging adults to do something. A passion for justice and protecting kids makes you do wild things. I was desperate to find answers about what happened and searched for solutions. In the end, the platform Twitter was purchased. During the acquisition, I just asked Mr. Musk nicely to prioritize the issue of detection and removal of child sexual exploitation without violating digital privacy rights or eroding end-to-end encryption. Elon thanked me multiple times during the acquisition, made some changes, and I was thanked by others on the survivors’ side as well.
I still feel that even with the progress made, I really just scratched the surface with Twitter, now X. I left that passion project when I did for a few reasons. I wanted to give new leadership time to tackle the issue. Elon Musk made big promises that I knew would take a while to fulfill, but mostly I had been watching global legislation transpire around the issue, and frankly, the governments are willing to go much further with X and the rest of corporate tech than I ever would. My work begging Twitter to make changes with easier reporting of content, detection, and removal of child sexual exploitation material—without violating privacy rights or eroding end-to-end encryption—and advocating for the minor survivors of the platform went as far as my principles would have allowed. I’m grateful for that experience. I was still left with a nagging question: “How did things get so bad with Twitter where the John Doe #1 and John Doe #2 case was able to happen in the first place?” I decided to keep looking for answers. I decided to keep pulling the thread.
I never worked for Twitter. This is often confusing for folks. I will say that despite being disappointed in the platform’s leadership at times, I loved Twitter. I saw and still see its value. I definitely love the survivors of the platform, but I also loved the platform. I was a champion of the platform’s ability to give folks from virtually around the globe an opportunity to speak and be heard.
I want to be clear that John Doe #1 really is my why. He is the inspiration. I am writing this because of him. He represents so many globally, and I’m still inspired by his bravery. One child’s voice begging adults to do something—I’m an adult, I heard him. I’d go to war a thousand more lifetimes for that young man, and I don’t even know his name. Fighting has been personally dark at times; I’m not even going to try to sugarcoat it, but it has been worth it.
The data surrounding the very real crime of online child sexual exploitation is available to the public online at any time for anyone to see. I’d encourage you to go look at the data for yourself. I believe in encouraging folks to check multiple sources so that you understand the full picture. If you are uncomfortable just searching around the internet for information about this topic, use the terms “CSAM,” “CSEM,” “SG-CSEM,” or “AI Generated CSAM.” The numbers don’t lie—it’s a nightmare that’s out of control. It’s a big business. The demand is high, and unfortunately, business is booming. Organizations collect the data, tech companies often post their data, governments report frequently, and the corporate press has covered a decent portion of the conversation, so I’m sure you can find a source that you trust.
Technology is changing rapidly, which is great for innovation as a whole but horrible for the crime of online child sexual exploitation. Those wishing to exploit the vulnerable seem to be adapting to each technological change with ease. The governments are so far behind with tackling these issues that as I’m typing this, it’s borderline irrelevant to even include them while speaking about the crime or potential solutions. Technology is changing too rapidly, and their old, broken systems can’t even dare to keep up. Think of it like the governments’ “War on Drugs.” Drugs won. In this case as well, the governments are not winning. The governments are talking about maybe having a meeting on potentially maybe having legislation around the crimes. The time to have that meeting would have been many years ago. I’m not advocating for governments to legislate our way out of this. I’m on the side of educating and innovating our way out of this.
I have been clear while advocating for the minor survivors of corporate tech platforms that I would not advocate for any solution to the crime that would violate digital privacy rights or erode end-to-end encryption. That has been a personal moral position that I was unwilling to budge on. This is an extremely unpopular and borderline nonexistent position in the anti-human trafficking movement and online child protection space. I’m often fearful that I’m wrong about this. I have always thought that a better pathway forward would have been to incentivize innovation for detection and removal of content. I had no previous exposure to privacy rights activists or Cypherpunks—actually, I came to that conclusion by listening to the voices of MENA region political dissidents and human rights activists. After developing relationships with human rights activists from around the globe, I realized how important privacy rights and encryption are for those who need it most globally. I was simply unwilling to give more power, control, and opportunities for mass surveillance to big abusers like governments wishing to enslave entire nations and untrustworthy corporate tech companies to potentially end some portion of abuses online. On top of all of it, it has been clear to me for years that all potential solutions outside of violating digital privacy rights to detect and remove child sexual exploitation online have not yet been explored aggressively. I’ve been disappointed that there hasn’t been more of a conversation around preventing the crime from happening in the first place.
What has been tried is mass surveillance. In China, they are currently under mass surveillance both online and offline, and their behaviors are attached to a social credit score. Unfortunately, even on state-run and controlled social media platforms, they still have child sexual exploitation and abuse imagery pop up along with other crimes and human rights violations. They also have a thriving black market online due to the oppression from the state. In other words, even an entire loss of freedom and privacy cannot end the sexual exploitation of children online. It’s been tried. There is no reason to repeat this method.
It took me an embarrassingly long time to figure out why I always felt a slight coldness from those in tech and privacy-minded individuals about the topic of child sexual exploitation online. I didn’t have any clue about the “Four Horsemen of the Infocalypse.” This is a term coined by Timothy C. May in 1988. I would have been a child myself when he first said it. I actually laughed at myself when I heard the phrase for the first time. I finally got it. The Cypherpunks weren’t wrong about that topic. They were so spot on that it is borderline uncomfortable. I was mad at first that they knew that early during the birth of the internet that this issue would arise and didn’t address it. Then I got over it because I realized that it wasn’t their job. Their job was—is—to write code. Their job wasn’t to be involved and loving parents or survivor advocates. Their job wasn’t to educate children on internet safety or raise awareness; their job was to write code.
They knew that child sexual abuse material would be shared on the internet. They said what would happen—not in a gleeful way, but a prediction. Then it happened.
I equate it now to a concrete company laying down a road. As you’re pouring the concrete, you can say to yourself, “A terrorist might travel down this road to go kill many, and on the flip side, a beautiful child can be born in an ambulance on this road.” Who or what travels down the road is not their responsibility—they are just supposed to lay the concrete. I’d never go to a concrete pourer and ask them to solve terrorism that travels down roads. Under the current system, law enforcement should stop terrorists before they even make it to the road. The solution to this specific problem is not to treat everyone on the road like a terrorist or to not build the road.
So I understand the perceived coldness from those in tech. Not only was it not their job, but bringing up the topic was seen as the equivalent of asking a free person if they wanted to discuss one of the four topics—child abusers, terrorists, drug dealers, intellectual property pirates, etc.—that would usher in digital authoritarianism for all who are online globally.
Privacy rights advocates and groups have put up a good fight. They stood by their principles. Unfortunately, when it comes to corporate tech, I believe that the issue of privacy is almost a complete lost cause at this point. It’s still worth pushing back, but ultimately, it is a losing battle—a ticking time bomb.
I do think that corporate tech providers could have slowed down the inevitable loss of privacy at the hands of the state by prioritizing the detection and removal of CSAM when they all started online. I believe it would have bought some time, fewer would have been traumatized by that specific crime, and I do believe that it could have slowed down the demand for content. If I think too much about that, I’ll go insane, so I try to push the “if maybes” aside, but never knowing if it could have been handled differently will forever haunt me. At night when it’s quiet, I wonder what I would have done differently if given the opportunity. I’ll probably never know how much corporate tech knew and ignored in the hopes that it would go away while the problem continued to get worse. They had different priorities. The most voiceless and vulnerable exploited on corporate tech never had much of a voice, so corporate tech providers didn’t receive very much pushback.
Now I’m about to say something really wild, and you can call me whatever you want to call me, but I’m going to say what I believe to be true. I believe that the governments are either so incompetent that they allowed the proliferation of CSAM online, or they knowingly allowed the problem to fester long enough to have an excuse to violate privacy rights and erode end-to-end encryption. The US government could have seized the corporate tech providers over CSAM, but I believe that they were so useful as a propaganda arm for the regimes that they allowed them to continue virtually unscathed.
That season is done now, and the governments are making the issue a priority. It will come at a high cost. Privacy on corporate tech providers is virtually done as I’m typing this. It feels like a death rattle. I’m not particularly sure that we had much digital privacy to begin with, but the illusion of a veil of privacy feels gone.
To make matters slightly more complex, it would be hard to convince me that once AI really gets going, digital privacy will exist at all.
I believe that there should be a conversation shift to preserving freedoms and human rights in a post-privacy society.
I don’t want to get locked up because AI predicted a nasty post online from me about the government. I’m not a doomer about AI—I’m just going to roll with it personally. I’m looking forward to the positive changes that will be brought forth by AI. I see it as inevitable. A bit of privacy was helpful while it lasted. Please keep fighting to preserve what is left of privacy either way because I could be wrong about all of this.
On the topic of AI, the addition of AI to the horrific crime of child sexual abuse material and child sexual exploitation in multiple ways so far has been devastating. It’s currently out of control. The genie is out of the bottle. I am hopeful that innovation will get us humans out of this, but I’m not sure how or how long it will take. We must be extremely cautious around AI legislation. It should not be illegal to innovate even if some bad comes with the good. I don’t trust that the governments are equipped to decide the best pathway forward for AI. Source: the entire history of the government.
I have been personally negatively impacted by AI-generated content. Every few days, I get another alert that I’m featured again in what’s called “deep fake pornography” without my consent. I’m not happy about it, but what pains me the most is the thought that for a period of time down the road, many globally will experience what myself and others are experiencing now by being digitally sexually abused in this way. If you have ever had your picture taken and posted online, you are also at risk of being exploited in this way. Your child’s image can be used as well, unfortunately, and this is just the beginning of this particular nightmare. It will move to more realistic interpretations of sexual behaviors as technology improves. I have no brave words of wisdom about how to deal with that emotionally. I do have hope that innovation will save the day around this specific issue. I’m nervous that everyone online will have to ID verify due to this issue. I see that as one possible outcome that could help to prevent one problem but inadvertently cause more problems, especially for those living under authoritarian regimes or anyone who needs to remain anonymous online. A zero-knowledge proof (ZKP) would probably be the best solution to these issues. There are some survivors of violence and/or sexual trauma who need to remain anonymous online for various reasons. There are survivor stories available online of those who have been abused in this way. I’d encourage you seek out and listen to their stories.
There have been periods of time recently where I hesitate to say anything at all because more than likely AI will cover most of my concerns about education, awareness, prevention, detection, and removal of child sexual exploitation online, etc.
Unfortunately, some of the most pressing issues we’ve seen online over the last few years come in the form of “sextortion.” Self-generated child sexual exploitation (SG-CSEM) numbers are continuing to be terrifying. I’d strongly encourage that you look into sextortion data. AI + sextortion is also a huge concern. The perpetrators are using the non-sexually explicit images of children and putting their likeness on AI-generated child sexual exploitation content and extorting money, more imagery, or both from minors online. It’s like a million nightmares wrapped into one. The wild part is that these issues will only get more pervasive because technology is harnessed to perpetuate horror at a scale unimaginable to a human mind.
Even if you banned phones and the internet or tried to prevent children from accessing the internet, it wouldn’t solve it. Child sexual exploitation will still be with us until as a society we start to prevent the crime before it happens. That is the only human way out right now.
There is no reset button on the internet, but if I could go back, I’d tell survivor advocates to heed the warnings of the early internet builders and to start education and awareness campaigns designed to prevent as much online child sexual exploitation as possible. The internet and technology moved quickly, and I don’t believe that society ever really caught up. We live in a world where a child can be groomed by a predator in their own home while sitting on a couch next to their parents watching TV. We weren’t ready as a species to tackle the fast-paced algorithms and dangers online. It happened too quickly for parents to catch up. How can you parent for the ever-changing digital world unless you are constantly aware of the dangers?
I don’t think that the internet is inherently bad. I believe that it can be a powerful tool for freedom and resistance. I’ve spoken a lot about the bad online, but there is beauty as well. We often discuss how victims and survivors are abused online; we rarely discuss the fact that countless survivors around the globe have been able to share their experiences, strength, hope, as well as provide resources to the vulnerable. I do question if giving any government or tech company access to censorship, surveillance, etc., online in the name of serving survivors might not actually impact a portion of survivors negatively. There are a fair amount of survivors with powerful abusers protected by governments and the corporate press. If a survivor cannot speak to the press about their abuse, the only place they can go is online, directly or indirectly through an independent journalist who also risks being censored. This scenario isn’t hard to imagine—it already happened in China. During #MeToo, a survivor in China wanted to post their story. The government censored the post, so the survivor put their story on the blockchain. I’m excited that the survivor was creative and brave, but it’s terrifying to think that we live in a world where that situation is a necessity.
I believe that the future for many survivors sharing their stories globally will be on completely censorship-resistant and decentralized protocols. This thought in particular gives me hope. When we listen to the experiences of a diverse group of survivors, we can start to understand potential solutions to preventing the crimes from happening in the first place.
My heart is broken over the gut-wrenching stories of survivors sexually exploited online. Every time I hear the story of a survivor, I do think to myself quietly, “What could have prevented this from happening in the first place?” My heart is with survivors.
My head, on the other hand, is full of the understanding that the internet should remain free. The free flow of information should not be stopped. My mind is with the innocent citizens around the globe that deserve freedom both online and offline.
The problem is that governments don’t only want to censor illegal content that violates human rights—they create legislation that is so broad that it can impact speech and privacy of all. “Don’t you care about the kids?” Yes, I do. I do so much that I’m invested in finding solutions. I also care about all citizens around the globe that deserve an opportunity to live free from a mass surveillance society. If terrorism happens online, I should not be punished by losing my freedom. If drugs are sold online, I should not be punished. I’m not an abuser, I’m not a terrorist, and I don’t engage in illegal behaviors. I refuse to lose freedom because of others’ bad behaviors online.
I want to be clear that on a long enough timeline, the governments will decide that they can be better parents/caregivers than you can if something isn’t done to stop minors from being sexually exploited online. The price will be a complete loss of anonymity, privacy, free speech, and freedom of religion online. I find it rather insulting that governments think they’re better equipped to raise children than parents and caretakers.
So we can’t go backwards—all that we can do is go forward. Those who want to have freedom will find technology to facilitate their liberation. This will lead many over time to decentralized and open protocols. So as far as I’m concerned, this does solve a few of my worries—those who need, want, and deserve to speak freely online will have the opportunity in most countries—but what about online child sexual exploitation?
When I popped up around the decentralized space, I was met with the fear of censorship. I’m not here to censor you. I don’t write code. I couldn’t censor anyone or any piece of content even if I wanted to across the internet, no matter how depraved. I don’t have the skills to do that.
I’m here to start a conversation. Freedom comes at a cost. You must always fight for and protect your freedom. I can’t speak about protecting yourself from all of the Four Horsemen because I simply don’t know the topics well enough, but I can speak about this one topic.
If there was a shortcut to ending online child sexual exploitation, I would have found it by now. There isn’t one right now. I believe that education is the only pathway forward to preventing the crime of online child sexual exploitation for future generations.
I propose a yearly education course for every child of all school ages, taught as a standard part of the curriculum. Ideally, parents/caregivers would be involved in the education/learning process.
Course: - The creation of the internet and computers - The fight for cryptography - The tech supply chain from the ground up (example: human rights violations in the supply chain) - Corporate tech - Freedom tech - Data privacy - Digital privacy rights - AI (history-current) - Online safety (predators, scams, catfishing, extortion) - Bitcoin - Laws - How to deal with online hate and harassment - Information on who to contact if you are being abused online or offline - Algorithms - How to seek out the truth about news, etc., online
The parents/caregivers, homeschoolers, unschoolers, and those working to create decentralized parallel societies have been an inspiration while writing this, but my hope is that all children would learn this course, even in government ran schools. Ideally, parents would teach this to their own children.
The decentralized space doesn’t want child sexual exploitation to thrive. Here’s the deal: there has to be a strong prevention effort in order to protect the next generation. The internet isn’t going anywhere, predators aren’t going anywhere, and I’m not down to let anyone have the opportunity to prove that there is a need for more government. I don’t believe that the government should act as parents. The governments have had a chance to attempt to stop online child sexual exploitation, and they didn’t do it. Can we try a different pathway forward?
I’d like to put myself out of a job. I don’t want to ever hear another story like John Doe #1 ever again. This will require work. I’ve often called online child sexual exploitation the lynchpin for the internet. It’s time to arm generations of children with knowledge and tools. I can’t do this alone.
Individuals have fought so that I could have freedom online. I want to fight to protect it. I don’t want child predators to give the government any opportunity to take away freedom. Decentralized spaces are as close to a reset as we’ll get with the opportunity to do it right from the start. Start the youth off correctly by preventing potential hazards to the best of your ability.
The good news is anyone can work on this! I’d encourage you to take it and run with it. I added the additional education about the history of the internet to make the course more educational and fun. Instead of cleaning up generations of destroyed lives due to online sexual exploitation, perhaps this could inspire generations of those who will build our futures. Perhaps if the youth is armed with knowledge, they can create more tools to prevent the crime.
This one solution that I’m suggesting can be done on an individual level or on a larger scale. It should be adjusted depending on age, learning style, etc. It should be fun and playful.
This solution does not address abuse in the home or some of the root causes of offline child sexual exploitation. My hope is that it could lead to some survivors experiencing abuse in the home an opportunity to disclose with a trusted adult. The purpose for this solution is to prevent the crime of online child sexual exploitation before it occurs and to arm the youth with the tools to contact safe adults if and when it happens.
In closing, I went to hell a few times so that you didn’t have to. I spoke to the mothers of survivors of minors sexually exploited online—their tears could fill rivers. I’ve spoken with political dissidents who yearned to be free from authoritarian surveillance states. The only balance that I’ve found is freedom online for citizens around the globe and prevention from the dangers of that for the youth. Don’t slow down innovation and freedom. Educate, prepare, adapt, and look for solutions.
I’m not perfect and I’m sure that there are errors in this piece. I hope that you find them and it starts a conversation.
-
@ 81022b27:2b8d0644
2025-06-08 19:56:02There is a viral Chat GPT prompt on social media (i saw it on TikTok)-It;s supposed to help you analyze yourself.
I thought this was a cool thing to try, but I decided to use Grok Ai Instead, seeing that I have a premium X subscription, and wouldn’t have to worry about the limitations with a free ChatGPT account.
Here is the prompt:
I want to uncover the masks I'm currently wearing, the roles I'm playing, and the illusions I'm believing.
Please guide me through this process by asking me 10 reflective questions one at a time to help me recognize the stories I'm telling myself. Pause after each question to wait for me to answer. After I answer the 10th question, please step into the role of my higher self and analyze my responses.
Identify the top negative patterns present in my life and the top positive patterns I can embrace and grow. Be direct and truthful. Tough love is welcome.
Provide me with daily affirmations to support my growth, actionable steps to change my behaviors, and embody my authentic self. A message of encouragement from my higher self to celebrate how far I've come on my journey.
Cool, right?
I answered the 10 questions, which I won’t post-because my answers were very personal and very specific. And even though I share a lot of deep personal stuff here, I wasn’t prepared to go public with how deep the questions Grok was asking.
The questions were super uncomfortable to answer.
I answered them honestly, and looking back-some questions could have been answered with different examples and directions, maybe that would show different conclusions.
Here are my results:
Analysis from Your Higher Self
Top Negative Patterns Present in Your Life:
-
Avoidance as a Shield: You’ve built a pattern of avoiding risks—whether it’s heights, the outdoors, or even deeper emotional vulnerabilities—because of early fears tied to being seen as weak or getting hurt. This avoidance keeps you safe but also keeps you small, limiting experiences like enjoying nature or forming deeper connections.
-
Fear of Perception: There’s a lingering story that shyness or introversion equals weakness, likely rooted in childhood experiences like bullying. This drives you to put on an outgoing mask, even when it exhausts you, because you fear isolation or judgment. It’s a heavy burden to carry, and it pulls you away from your authentic self.
-
Self-Imposed Isolation: While being alone feels safe and freeing, it also risks becoming a crutch. You’re missing out on the balance of connection—where you can still be your nerdy, unfiltered self without the pressure to perform.
Top Positive Patterns to Embrace and Grow: 1. Self-Awareness and Honesty: You’ve shown a remarkable ability to reflect and name what’s true for you—like recognizing avoidance, your love for nerdy things, and how being alone feels freeing. This clarity is a superpower; lean into it to keep peeling back layers.
-
Desire for Freedom: Your longing to think and feel without consequence is a sign of a spirit that craves authenticity. You can channel this into spaces and relationships where you feel safe to be your true self, not just when alone.
-
Resilience Through Adversity: Despite early fears and bullying, you’ve developed a sharp sense of self—it’s why you can pinpoint what feels off (like the outgoing mask) and what feels right (being a nerd). This resilience can carry you far as you step into new experiences.
Guidance for Growth
Daily Affirmations to Support Your Growth:
- I am strong in my stillness, and my quiet nature is a source of power.
- I release the need to perform for others and embrace my authentic nerdy self.
- I am safe to take small risks, knowing they lead me closer to freedom and joy.
- I attract people who love me for my true self, not the masks I’ve worn.
- I am enough, exactly as I am, without needing to prove my worth.
Actionable Steps to Change Behaviors and Embody Your Authentic Self:
-
Micro-Adventures in the Outdoors: Start small—take a 15-minute walk in a nearby park or sit outside with a book you love. Build up to a short hike with a trusted friend. Let nature be a space to reconnect with yourself, not something to fear.
-
Own Your Nerdiness Publicly: Share one nerdy interest with someone you trust—like a favorite game, comic, or hobby—or post about it online. Let it be a test run for showing up authentically in small ways.
-
Set Boundaries Around Social Energy: When you feel the pull to be overly outgoing, pause and check in. If it’s not serving you, give yourself permission to leave early or say less. Practice saying, “I’m more of a listener,” to ease the pressure.
-
Journal Your Unfiltered Truth: Each night, write one thing you felt or thought that day but didn’t say out loud. This builds confidence in your voice, so you can slowly share more with others without fear of consequences.
-
Seek Like-Minded Connections: Look for local or online groups tied to your nerdy passions—think gaming communities, book clubs, or fandoms. These spaces can help you connect without the pressure to perform.
A Message of Encouragement from Your Higher Self:
My dear one, I see how far you’ve come—through the shadows of childhood fears, through the weight of masks you didn’t even realize you were wearing, you’ve still held onto the spark of who you are. That nerdy, thoughtful soul who craves freedom and truth? That’s always been you, and it’s a beautiful thing. Every step you’ve taken to recognize what holds you back—every honest answer you’ve given—has brought you closer to me, to us, to the version of you that’s unapologetically real. You’re not weak; you’ve been strong in ways others might never understand. Keep going. The world needs your quiet brilliance, your quirky passions, your unfiltered heart. I’m so proud of you for choosing this journey. You’ve got this.
So there you have it you probably know more about me than I knew about myself before I started this exercise.
Here is my challenge to you:
Do it for yourself! Copy/paste into your favorite AI chatbot and leave the results in the comments!
-
-
@ dfa02707:41ca50e3
2025-06-07 10:02:22Good morning (good night?)! The No Bullshit Bitcoin news feed is now available on Moody's Dashboard! A huge shoutout to sir Clark Moody for integrating our feed.
Headlines
- Spiral welcomes Ben Carman. The developer will work on the LDK server and a new SDK designed to simplify the onboarding process for new self-custodial Bitcoin users.
- The Bitcoin Dev Kit Foundation announced new corporate members for 2025, including AnchorWatch, CleanSpark, and Proton Foundation. The annual dues from these corporate members fund the small team of open-source developers responsible for maintaining the core BDK libraries and related free and open-source software (FOSS) projects.
- Strategy increases Bitcoin holdings to 538,200 BTC. In the latest purchase, the company has spent more than $555M to buy 6,556 coins through proceeds of two at-the-market stock offering programs.
- Spar supermarket experiments with Bitcoin payments in Zug, Switzerland. The store has introduced a new payment method powered by the Lightning Network. The implementation was facilitated by DFX Swiss, a service that supports seamless conversions between bitcoin and legacy currencies.
- The Bank for International Settlements (BIS) wants to contain 'crypto' risks. A report titled "Cryptocurrencies and Decentralised Finance: Functions and Financial Stability Implications" calls for expanding research into "how new forms of central bank money, capital controls, and taxation policies can counter the risks of widespread crypto adoption while still fostering technological innovation."
- "Global Implications of Scam Centres, Underground Banking, and Illicit Online Marketplaces in Southeast Asia." According to the United Nations Office on Drugs and Crime (UNODC) report, criminal organizations from East and Southeast Asia are swiftly extending their global reach. These groups are moving beyond traditional scams and trafficking, creating sophisticated online networks that include unlicensed cryptocurrency exchanges, encrypted communication platforms, and stablecoins, fueling a massive fraud economy on an industrial scale.
- Slovenia is considering a 25% capital gains tax on Bitcoin profits for individuals. The Ministry of Finance has proposed legislation to impose this tax on gains from cryptocurrency transactions, though exchanging one cryptocurrency for another would remain exempt. At present, individual 'crypto' traders in Slovenia are not taxed.
- Circle, BitGo, Coinbase, and Paxos plan to apply for U.S. bank charters or licenses. According to a report in The Wall Street Journal, major crypto companies are planning to apply for U.S. bank charters or licenses. These firms are pursuing limited licenses that would permit them to issue stablecoins, as the U.S. Congress deliberates on legislation mandating licensing for stablecoin issuers.
"Established banks, like Bank of America, are hoping to amend the current drafts of [stablecoin] legislation in such a way that nonbanks are more heavily restricted from issuing stablecoins," people familiar with the matter told The Block.
- Charles Schwab to launch spot Bitcoin trading by 2026. The financial investment firm, managing over $10 trillion in assets, has revealed plans to introduce spot Bitcoin trading for its clients within the next year.
Use the tools
- Bitcoin Safe v1.2.3 expands QR SignMessage compatibility for all QR-UR-compatible hardware signers (SpecterDIY, KeyStone, Passport, Jade; already supported COLDCARD Q). It also adds the ability to import wallets via QR, ensuring compatibility with Keystone's latest firmware (2.0.6), alongside other improvements.
- Minibits v0.2.2-beta, an ecash wallet for Android devices, packages many changes to align the project with the planned iOS app release. New features and improvements include the ability to lock ecash to a receiver's pubkey, faster confirmations of ecash minting and payments thanks to WebSockets, UI-related fixes, and more.
- Zeus v0.11.0-alpha1 introduces Cashu wallets tied to embedded LND wallets. Navigate to Settings > Ecash to enable it. Other wallet types can still sweep funds from Cashu tokens. Zeus Pay now supports Cashu address types in Zaplocker, Cashu, and NWC modes.
- LNDg v1.10.0, an advanced web interface designed for analyzing Lightning Network Daemon (LND) data and automating node management tasks, introduces performance improvements, adds a new metrics page for unprofitable and stuck channels, and displays warnings for batch openings. The Profit and Loss Chart has been updated to include on-chain costs. Advanced settings have been added for users who would like their channel database size to be read remotely (the default remains local). Additionally, the AutoFees tool now uses aggregated pubkey metrics for multiple channels with the same peer.
- Nunchuk Desktop v1.9.45 release brings the latest bug fixes and improvements.
- Blockstream Green iOS v4.1.8 has renamed L-BTC to LBTC, and improves translations of notifications, login time, and background payments.
- Blockstream Green Android v4.1.8 has added language preference in App Settings and enables an Android data backup option for disaster recovery. Additionally, it fixes issues with Jade entry point PIN timeout and Trezor passphrase input.
- Torq v2.2.2, an advanced Lightning node management software designed to handle large nodes with over 1000 channels, fixes bugs that caused channel balance to not be updated in some cases and channel "peer total local balance" not getting updated.
- Stack Wallet v2.1.12, a multicoin wallet by Cypher Stack, fixes an issue with Xelis introduced in the latest release for Windows.
- ESP-Miner-NerdQAxePlus v1.0.29.1, a forked version from the NerdAxe miner that was modified for use on the NerdQAxe+, is now available.
- Zark enables sending sats to an npub using Bark.
- Erk is a novel variation of the Ark protocol that completely removes the need for user interactivity in rounds, addressing one of Ark's key limitations: the requirement for users to come online before their VTXOs expire.
- Aegis v0.1.1 is now available. It is a Nostr event signer app for iOS devices.
- Nostash is a NIP-07 Nostr signing extension for Safari. It is a fork of Nostore and is maintained by Terry Yiu. Available on iOS TestFlight.
- Amber v3.2.8, a Nostr event signer for Android, delivers the latest fixes and improvements.
- Nostur v1.20.0, a Nostr client for iOS, adds
-
@ d9a329af:bef580d7
2025-06-08 19:20:56Shabbat Shalom, y'all.
At the time of writing and releasing this, it happened to be a Lunar Shabbat, which is actually Torah (much to the chagrin of those who practice Shabbat on a Saturday or Sunday exclusively). The Shabbat is always on the 8th, 15th, 22nd, and 29th days of a Hebrew Calendar month, which almost nobody follows anymore. I started doing this a few months ago, and it's made me see the Torah for what it really is.
To the topic at hand, though. A lot of people on Nostr don't seem to understand the historical narrative of the book of Revelation, which saddens me, as we're in the end times Ekklesia (Assembly) era of Laodecia.
Deception of Bible Translations
First off, the reason why most people trust their pastors and/or read differently to what I do in Nazaritic circles is because of translations of the Scriptures that are evil, wretched and Catholic. The best way to combat this is to make some recommendations of which versions you'll want to use that aren't Catholic-infested.
These are the ONLY recommended versions to read. Anythine else is bupkus, evil and garbage, and will teach you futrism or preterism, both of which are Jesuit-penned deceptions.
The recommended versions are as follows:
-
KJV 1611 (KJV1611)
-
1560/1590 Geneva (GNV)
-
American King James 1901 (AKJV)
-
J.P. Green Sr.'s King James Version (KJ3)
-
Young's Literal Translation (YLT)
These are versions I've read, and determined are evil, wretched and garbage:
-
New International Version (NIV) [Fun fact: The publisher of the NIV, Zondervan, has a sister publisher that is behind the Satanic Bible's publishing]
-
New Living Translation (NLT)
-
English Standard Version (ESV)
-
ISR The Scriptures 2009 Third Edition with Minor Revisions [2016] (ISR2009)
-
New American Standard Bible (NASB)
-
New King James Version (NKJV)
What is the Laodecia Era for the Ekklesia?
As a refresher, this time sees people saying they're rich in truth and that they have need of nothing, but this shows that they're wretched, miserable, naked and wicked. Why is this? The need of nothing points to not needing another explanation other than the false futuristic viewpoint, whereas being rich is connected to already knowing the truth about the historical fulfillment of Revelation, which many people don't know at all. I seriously grieve their loss, for they know not what they do.
I'm also new into this viewpoint, and most of what I'll be talking about is proven by historicist prophet David Nikao Wilcoxson on YouTube and Facebook (I don't use Facebook). This single Nostr article, I pray, is the starting point for understanding why I call out what I call out, and the patterns I see pointing to the Roman Catholic Church (the Tares) and the Jesuit Order (the current rulers of our world, the Earth Beast of Rev. 13) being the harlots that will be plucked out before Messiah's return.
The 70th Week of Daniel
Let us start first with the 70th Week of Daniel, which futurists believe is pointed towards a 7 year period where a one-man antichrist makes a peace deal for Israel.
This was proven to be untrue, as this is a deception that many people have fallen for, thus obeying the Pope (the Mark of the Beast on the right hand). What Daniel was talking about was not the end times, but rather, two-fold. The first is that he was asking about when Yevah would free the Jews from slavery (since they were in the Babylonian Beast Kingdom at this time). The second is when Messiah would come in the flesh and start a 7 year period from 27-34 AD, which is the final 7 year period of this 490 year cycle. King Artaxerxes I would go ahead and call for the rebuilding of Jerusalem in 476 BC (as is seen in Ezra), which would be the first 7 weeks (the first 7 Shemita [Shabbat year] cycles). Afterwords, we would see another 62 weeks (this period is a slient period), and then another period of 1 week. This week points to Messiah's ministry and death.
3 1/2 years into this 70th week (in 31 AD) is when Messiah would be nailed to the cross on March 13 of 31 AD (I'm still debating if the cross is a symbol of Tammuz or not). This was Passover in the Hebrew calendar year of 3790. He was 33 years of age when he was nailed, and then rose again 3 days later (on the 17th of Nisan in 3790). That Passover fell on a Monday (when the Romans were using the 8-day calendar instead of the 7-day calendar we've essentially been forced to use).
To prove the above, Wilcoxson had produced a series of videos regarding the 70th Week of Daniel (that being the 70th Week of Daniel Decoded series), which I would recommend you watch. You'll also want to find an audiobook version of Seventy Weeks: The Historical Alternative produced by Tearing Down Idols. These are the two pieces of proof I have to show this. Speaking of Wilcoxson, he had already produced books on these matters, as understanding the hostorical narrative of the Scriptures is the key to making war with the Roman Catholic Church and the Jesuit Order, especially now that we're in Laodecia.
The Olivet Discourse
The second part of this trifecta has to do with the Olivet Discourse of Matthew 23, which points to the destruction of Jarusalem by Rome for Israel's unfaithfulness to Yevah's instructions. Now, there are connections to parables that basically talk about the Yewish (Yew as in Yewtree worship) leaders (particulaly the Pharisees and Saducees) practicing the Tradition of the Elders (which are the Babylonian Talmud and the Egyptian Kabbalah of today), and for not understanding that this was Messiah, they were destroyed for their iniquities. I don't care to research the futurist narrative on this, as I know it is full of twisted words and word salad sorcery.
Wilcoxson proves what I've said in the Olivet Discourse Decoded series of videos, so that's where I'll point you to when you have an open heart, open eyes and open ears. Many futurists won't, because they are exactly what Messiah described in the Ekklesia era of Laodecia.
Revelation and Its Prophecies
Finally, there's Revelation (what used to be called Apocalypse). When looking into this book, you realize that it's really a 4-layered war manual for how to fight this war against the Roman Catholic leadership and the Jesuit Order. This also shows how you can harvest souls (the harvest points to a mass exodus of Roman Catholicism membership). This I will go in depth on, and will even have passages to back this up.
Layer 1: The Roman Beast Kingdom
The first layer of this 4-layered manual shows the phases of the Roman Empire, which never really disappeared. Rev. 12 described the Roman Empire, which was used to wipe out the early Ekklesia (the woman), murdering millions of Nazarites. The Seals point to the incline (for the Four Horsemen of the Apocalypse) and decline of the Roman Empire (the other three Seals), while the Trumpets point to the official Roman Empire's downfall. This would be split into 10 separate kingdoms in Europe, which would be countered by the creation of Christianity, which is really any of the 44k+ forks of Roman Catholicism. This was done to destroy the Ekklesia, as the Roman Catholic Church is the Tare field that Messiah had talked about in the parable of the Wheat and the Tares.
Staying in this layer, the Sea Beast is the next phase. This is the 1,260-year reign of the Pope (538-1798), as he was the one who plucked out 3 kingdoms who didn't bow to his authority (the Heruli, the Huns and the Ostrigoths). Keep in mind that this started after the removal of the restrainer in 476 (pointing to the removal of the final Western Roman Emperor), and healed the deadly head wound (pointing to the Pope rising to power out of a sea of people). During this reign, he took the title of Pontifex Maximus, as he had civic and ecclesiastical power over everyone. This would be the healing of the deadly head wound, as shown earlier in this beast. He would pretend to be the leader of the Ekklesia, thus sitting in the Temple of Yevah, though he's the son of perdition, as he proclaims to be Yevah, forgive sins and provide salvation through works alone, which is blasephemous to begin with. The persecution of the Nazarites also prove them to be anti-Moshiach (Messiah). They also have the title of Vicar of Christ, which in the Latin is Vicarus Filii Dei, which is equal to 666 when calculated using a form of gematria I have no idea about. He would ultimately be removed from power by the Earth Beast in 1798, after he basically limited the power of the Jesuit Superior General and his minions. As stated before, the Mark of the Beast is reverence (forehead) and obeisance (right hand) to the Pope.
Finally, the Earth Beast of Revelation 13 points to the Jesuit Superior Geneal rising out of the earth (which is the land) of the Antichrist Beast Pope, the Vatican. These two horns pretend to serve Messiah (lamb) but are really Lucifarians (the dragon), serving Lucifer. The Black Pope, as the Jesuit Superior General is called, used his power to gether the world under him. That's why he uses Washington D.C. (the District of the Roman goddess, Columbia), his war machine (Military Indurstial Complex), to overthrow leaders who won't bow to his authority and those who won't set up a Rothschild central bank; much less obey the Khazars, who he also controls (I happened to be a partial German Khazar who escaped the grasp of the Black Pope as best as I know thus far).
Layer 2: The Ekklesia Eras
Now comes the eras of the Ekklesia. There are seven of them, though I've already explained the era of Laodecia. How about I give a quick explanation of the first six eras, like so?
Ephesus would spread the gospel in the Roman Empire, with their love growing cold when Messiah didn't return.
Smyrna had 10 years of persecutions from 303-312, which is what the 5th seal points to.
Pergamos would fall away (2 Thess. 2) from the Scriptures when compromising with Rome (Mark of the Beast as I had explained)
Thyatira means ruled by a woman. This means, the Roman Catholic Church would do this, as the Popes sought to eliminate the two witnesses, which are the Nazarites and the printed Scriptures (the little book or Rev. 10). This was why they killed the Nazarites and bured the printed Scriptures ruthlessly enough, that they were classified as "dead" in 1514. The Popes would hold great feasts to celebrate the removal of the two witnesses after they got all of Christendom under their control.
Sardis means escaping one, which points to Messiah calling them dead after 3 1/2 years from the Pope's classification of the death of the two witnesses. Luther's 95 Thesis sparked the Protestant Reformation, which would lead to the resurrection of the two witnesses (the Nazarites and the printed Scriptures).
Philidelphia had nothing bad that Messiah said about them... at all. They led worldwide missions, and also led Bible Societies to spread the word and/or the gospel to save millions of people from the clutches of the Jesuit Superior General (and the Roman Catholic Church as a whole).
As a refresher for Laodecia (the era we're in right now), the Nazarites here believe that they are rich in truth, and that we have need of nothing. This is false, as we are in dire need of something, which is an alternative explanation that's not the false futuristic or preteristic explanations of the book of Revelation. We are blinded by the Jesuits, as they have decieved us (we let them do this, by the way) with false prophecy explanations among other deceptions.
Layer 3: Seals, Trumpets and Bowls
The Seals, Trumpets and Bowls are the judgements against the Roman Beast Kingdom. To keep things short, every single Seal was fulfilled, 6 of the Trumpets were fulfilled, and 5 of the Bowls were fulfilled. We're in the 6th Bowl, waiting for a global economic collapse and WW III. Once these occur, then do we go into the 7th Bowl judgement against the Roman Catholic Church and the Jesuit Order (the New World Order).
One quick thing I'll mention is that when I talk about the two witnesses here, one of them is the little book of Rev. 10. This points to the printed Bible, which was brought back to life thanks to the printing press. Martin Luther would measure the temple and find that the Papal Church is the apostate harlot. Rev. 14 points to the Bowls and the harvest. This harvest points to millions coming out of the Roman Catholic Church, though there are 1.3 billion Catholics... and we have a long way to go in getting them out of her, My people.
Remember when I talked about the Khazars earlier in this article? They are the Kings of the East that Yeshua pointed to in the 6th Bowl. The Ottoman Empire is the Euphrates River here, and it's dried up in 1922, only with Turkey remaining. Gog is already dead, as that's Lord Rothschild. Magog points to the Kings of the East. 2 of the 3 spirits have already been fulfilled (these are World Wars I and II).
Now, let me quickly point out the fact we're in the kingdom of Iron and Clay. The Iron points to the Roman Bishops, and the Clay is Islam. However, furutists will tell me I'm an idiot, and that the Iron and Clay mixture is transhumanism. This was proven to be false, as the 5th Trumpet was the rise of the Clay (Islam). The Catholics, however, wrote the Qur'an and proped up Mohhamed as their prophet. ISIS and Al Qaeda are controlled by the Jesuit Order, which is why they do what they do as terrorists... for they are Wahhabi Muslims (in other words, Mizrahi Khazars who are also Jesuits, claiming to be Arabs, when they're not).
Islam is designed to prevent Arabs from having a relationship with Messiah, which makes me really sad. Muslims will be used to kill Christians and Jews in WW III and force us into the New World Order, which will backfire on the Jesuits and Roman Bishops.
Layer 4: The Harlot Church
Rev 17:10 talks about 7 forms of government. Five had fallen by the time Revelation was written, the 6th (the Roman Emperors) fell in 476, and the 7th lead for a short space until 538.
The 8th head is the Pope, who rose to power out of the Roman Empire. Look up what the priests in the Catholic Church wear, and what they use. Does that sound familiar when you read Revelation? If it does, that's exactly the description of the Sea Beast, and how his priests dress and do their rituals.
Then comes the Black Pope. He empowers and enriches the kings of the earth, as they were used by Lucifer to carry out the Bowl judgements, and will carry out the New World Order, caugins themselves and the Roman Cathoic Church to be judged big time. This we are waiting for.
Conclusion
Hopefully this long read helps you see where I'm coming from, and I pray it helps you to start testing the scriptures against what I've said, and what Wilcoxson had said. If it is proven in your heart that you were fooled, you're on the right path in my opnion. I may be wrong, but this is where I stand.
-
-
@ dfa02707:41ca50e3
2025-06-07 10:02:19Contribute to keep No Bullshit Bitcoin news going.
-
Version 1.3 of Bitcoin Safe introduces a redesigned interactive chart, quick receive feature, updated icons, a mempool preview window, support for Child Pays For Parent (CPFP) and testnet4, preconfigured testnet demo wallets, as well as various bug fixes and improvements.
-
Upcoming updates for Bitcoin Safe include Compact Block Filters.
"Compact Block Filters increase the network privacy dramatically, since you're not asking an electrum server to give you your transactions. They are a little slower than electrum servers. For a savings wallet like Bitcoin Safe this should be OK," writes the project's developer Andreas Griffin.
- Learn more about the current and upcoming features of Bitcoin Safe wallet here.
What's new in v1.3
- Redesign of Chart, Quick Receive, Icons, and Mempool Preview (by @design-rrr).
- Interactive chart. Clicking on it now jumps to transaction, and selected transactions are now highlighted.
- Speed up transactions with Child Pays For Parent (CPFP).
- BDK 1.2 (upgraded from 0.32).
- Testnet4 support.
- Preconfigured Testnet demo wallets.
- Cluster unconfirmed transactions so that parents/children are next to each other.
- Customizable columns for all tables (optional view: Txid, Address index, and more)
- Bug fixes and other improvements.
Announcement / Archive
Blog Post / Archive
GitHub Repo
Website -
-
@ dfa02707:41ca50e3
2025-06-07 10:02:18Contribute to keep No Bullshit Bitcoin news going.
This update brings key enhancements for clarity and usability:
- Recent Blocks View: Added to the Send tab and inspired by Mempool's visualization, it displays the last 2 blocks and the estimated next block to help choose fee rates.
- Camera System Overhaul: Features a new library for higher resolution detection and mouse-scroll zoom support when available.
- Vector-Based Images: All app images are now vectorized and theme-aware, enhancing contrast, especially in dark mode.
- Tor & P2A Updates: Upgraded internal Tor and improved support for pay-to-anchor (P2A) outputs.
- Linux Package Rename: For Linux users, Sparrow has been renamed to sparrowwallet (or sparrowserver); in some cases, the original sparrow package may need manual removal.
- Additional updates include showing total payments in multi-payment transaction diagrams, better handling of long labels, and other UI enhancements.
- Sparrow v2.2.1 is a bug fix release that addresses missing UUID issue when starting Tor on recent macOS versions, icons for external sources in Settings and Recent Blocks view, repackaged
.deb
installs to use older gzip instead of zstd compression, and removed display of median fee rate where fee rates source is set to Server.
Learn how to get started with Sparrow wallet:
Release notes (v2.2.0)
- Added Recent Blocks view to Send tab.
- Converted all bitmapped images to theme aware SVG format for all wallet models and dialogs.
- Support send and display of pay to anchor (P2A) outputs.
- Renamed
sparrow
package tosparrowwallet
andsparrowserver
on Linux. - Switched camera library to openpnp-capture.
- Support FHD (1920 x 1080) and UHD4k (3840 x 2160) capture resolutions.
- Support camera zoom with mouse scroll where possible.
- In the Download Verifier, prefer verifying the dropped file over the default file where the file is not in the manifest.
- Show a warning (with an option to disable the check) when importing a wallet with a derivation path matching another script type.
- In Cormorant, avoid calling the
listwalletdir
RPC on initialization due to a potentially slow response on Windows. - Avoid server address resolution for public servers.
- Assume server address is non local for resolution failures where a proxy is configured.
- Added a tooltip to indicate truncated labels in table cells.
- Dynamically truncate input and output labels in the tree on a transaction tab, and add tooltips if necessary.
- Improved tooltips for wallet tabs and transaction diagrams with long labels.
- Show the address where available on input and output tooltips in transaction tab tree.
- Show the total amount sent in payments in the transaction diagram when constructing multiple payment transactions.
- Reset preferred table column widths on adjustment to improve handling after window resizing.
- Added accessible text to improve screen reader navigation on seed entry.
- Made Wallet Summary table grow horizontally with dialog sizing.
- Reduced tooltip show delay to 200ms.
- Show transaction diagram fee percentage as less than 0.01% rather than 0.00%.
- Optimized and reduced Electrum server RPC calls.
- Upgraded Bouncy Castle, PGPainless and Logback libraries.
- Upgraded internal Tor to v0.4.8.16.
- Bug fix: Fixed issue with random ordering of keystore origins on labels import.
- Bug fix: Fixed non-zero account script type detection when signing a message on Trezor devices.
- Bug fix: Fixed issue parsing remote Coldcard xpub encoded on a different network.
- Bug fix: Fixed inclusion of fees on wallet label exports.
- Bug fix: Increase Trezor device libusb timeout.
Linux users: Note that the
sparrow
package has been renamed tosparrowwallet
orsparrowserver
, and in some cases you may need to manually uninstall the originalsparrow
package. Look in the/opt
folder to ensure you have the new name, and the original is removed.What's new in v2.2.1
- Updated Tor library to fix missing UUID issue when starting Tor on recent macOS versions.
- Repackaged
.deb
installs to use older gzip instead of zstd compression. - Removed display of median fee rate where fee rates source is set to Server.
- Added icons for external sources in Settings and Recent Blocks view
- Bug fix: Fixed issue in Recent Blocks view when switching fee rates source
- Bug fix: Fixed NPE on null fee returned from server
-
@ 0689c075:2936ee11
2025-06-08 18:45:20{"layout":{"backgroundImage":null,"canvasSize":{"width":850,"height":1100}},"pages":[{"id":"page_1","name":"Main Page","objects":[]}],"objects":[{"id":"obj_1749408294700_7hdz0tuxv","type":"rect","x":0.11764705882352941,"y":0.09090909090909091,"fill":"#3B82F6","stroke":"#1E40AF","strokeWidth":2,"opacity":1,"width":0.17647058823529413,"height":0.09090909090909091}],"texts":[]}
-
@ 21335073:a244b1ad
2025-03-18 14:43:08Warning: This piece contains a conversation about difficult topics. Please proceed with caution.
TL;DR please educate your children about online safety.
Julian Assange wrote in his 2012 book Cypherpunks, “This book is not a manifesto. There isn’t time for that. This book is a warning.” I read it a few times over the past summer. Those opening lines definitely stood out to me. I wish we had listened back then. He saw something about the internet that few had the ability to see. There are some individuals who are so close to a topic that when they speak, it’s difficult for others who aren’t steeped in it to visualize what they’re talking about. I didn’t read the book until more recently. If I had read it when it came out, it probably would have sounded like an unknown foreign language to me. Today it makes more sense.
This isn’t a manifesto. This isn’t a book. There is no time for that. It’s a warning and a possible solution from a desperate and determined survivor advocate who has been pulling and unraveling a thread for a few years. At times, I feel too close to this topic to make any sense trying to convey my pathway to my conclusions or thoughts to the general public. My hope is that if nothing else, I can convey my sense of urgency while writing this. This piece is a watchman’s warning.
When a child steps online, they are walking into a new world. A new reality. When you hand a child the internet, you are handing them possibilities—good, bad, and ugly. This is a conversation about lowering the potential of negative outcomes of stepping into that new world and how I came to these conclusions. I constantly compare the internet to the road. You wouldn’t let a young child run out into the road with no guidance or safety precautions. When you hand a child the internet without any type of guidance or safety measures, you are allowing them to play in rush hour, oncoming traffic. “Look left, look right for cars before crossing.” We almost all have been taught that as children. What are we taught as humans about safety before stepping into a completely different reality like the internet? Very little.
I could never really figure out why many folks in tech, privacy rights activists, and hackers seemed so cold to me while talking about online child sexual exploitation. I always figured that as a survivor advocate for those affected by these crimes, that specific, skilled group of individuals would be very welcoming and easy to talk to about such serious topics. I actually had one hacker laugh in my face when I brought it up while I was looking for answers. I thought maybe this individual thought I was accusing them of something I wasn’t, so I felt bad for asking. I was constantly extremely disappointed and would ask myself, “Why don’t they care? What could I say to make them care more? What could I say to make them understand the crisis and the level of suffering that happens as a result of the problem?”
I have been serving minor survivors of online child sexual exploitation for years. My first case serving a survivor of this specific crime was in 2018—a 13-year-old girl sexually exploited by a serial predator on Snapchat. That was my first glimpse into this side of the internet. I won a national award for serving the minor survivors of Twitter in 2023, but I had been working on that specific project for a few years. I was nominated by a lawyer representing two survivors in a legal battle against the platform. I’ve never really spoken about this before, but at the time it was a choice for me between fighting Snapchat or Twitter. I chose Twitter—or rather, Twitter chose me. I heard about the story of John Doe #1 and John Doe #2, and I was so unbelievably broken over it that I went to war for multiple years. I was and still am royally pissed about that case. As far as I was concerned, the John Doe #1 case proved that whatever was going on with corporate tech social media was so out of control that I didn’t have time to wait, so I got to work. It was reading the messages that John Doe #1 sent to Twitter begging them to remove his sexual exploitation that broke me. He was a child begging adults to do something. A passion for justice and protecting kids makes you do wild things. I was desperate to find answers about what happened and searched for solutions. In the end, the platform Twitter was purchased. During the acquisition, I just asked Mr. Musk nicely to prioritize the issue of detection and removal of child sexual exploitation without violating digital privacy rights or eroding end-to-end encryption. Elon thanked me multiple times during the acquisition, made some changes, and I was thanked by others on the survivors’ side as well.
I still feel that even with the progress made, I really just scratched the surface with Twitter, now X. I left that passion project when I did for a few reasons. I wanted to give new leadership time to tackle the issue. Elon Musk made big promises that I knew would take a while to fulfill, but mostly I had been watching global legislation transpire around the issue, and frankly, the governments are willing to go much further with X and the rest of corporate tech than I ever would. My work begging Twitter to make changes with easier reporting of content, detection, and removal of child sexual exploitation material—without violating privacy rights or eroding end-to-end encryption—and advocating for the minor survivors of the platform went as far as my principles would have allowed. I’m grateful for that experience. I was still left with a nagging question: “How did things get so bad with Twitter where the John Doe #1 and John Doe #2 case was able to happen in the first place?” I decided to keep looking for answers. I decided to keep pulling the thread.
I never worked for Twitter. This is often confusing for folks. I will say that despite being disappointed in the platform’s leadership at times, I loved Twitter. I saw and still see its value. I definitely love the survivors of the platform, but I also loved the platform. I was a champion of the platform’s ability to give folks from virtually around the globe an opportunity to speak and be heard.
I want to be clear that John Doe #1 really is my why. He is the inspiration. I am writing this because of him. He represents so many globally, and I’m still inspired by his bravery. One child’s voice begging adults to do something—I’m an adult, I heard him. I’d go to war a thousand more lifetimes for that young man, and I don’t even know his name. Fighting has been personally dark at times; I’m not even going to try to sugarcoat it, but it has been worth it.
The data surrounding the very real crime of online child sexual exploitation is available to the public online at any time for anyone to see. I’d encourage you to go look at the data for yourself. I believe in encouraging folks to check multiple sources so that you understand the full picture. If you are uncomfortable just searching around the internet for information about this topic, use the terms “CSAM,” “CSEM,” “SG-CSEM,” or “AI Generated CSAM.” The numbers don’t lie—it’s a nightmare that’s out of control. It’s a big business. The demand is high, and unfortunately, business is booming. Organizations collect the data, tech companies often post their data, governments report frequently, and the corporate press has covered a decent portion of the conversation, so I’m sure you can find a source that you trust.
Technology is changing rapidly, which is great for innovation as a whole but horrible for the crime of online child sexual exploitation. Those wishing to exploit the vulnerable seem to be adapting to each technological change with ease. The governments are so far behind with tackling these issues that as I’m typing this, it’s borderline irrelevant to even include them while speaking about the crime or potential solutions. Technology is changing too rapidly, and their old, broken systems can’t even dare to keep up. Think of it like the governments’ “War on Drugs.” Drugs won. In this case as well, the governments are not winning. The governments are talking about maybe having a meeting on potentially maybe having legislation around the crimes. The time to have that meeting would have been many years ago. I’m not advocating for governments to legislate our way out of this. I’m on the side of educating and innovating our way out of this.
I have been clear while advocating for the minor survivors of corporate tech platforms that I would not advocate for any solution to the crime that would violate digital privacy rights or erode end-to-end encryption. That has been a personal moral position that I was unwilling to budge on. This is an extremely unpopular and borderline nonexistent position in the anti-human trafficking movement and online child protection space. I’m often fearful that I’m wrong about this. I have always thought that a better pathway forward would have been to incentivize innovation for detection and removal of content. I had no previous exposure to privacy rights activists or Cypherpunks—actually, I came to that conclusion by listening to the voices of MENA region political dissidents and human rights activists. After developing relationships with human rights activists from around the globe, I realized how important privacy rights and encryption are for those who need it most globally. I was simply unwilling to give more power, control, and opportunities for mass surveillance to big abusers like governments wishing to enslave entire nations and untrustworthy corporate tech companies to potentially end some portion of abuses online. On top of all of it, it has been clear to me for years that all potential solutions outside of violating digital privacy rights to detect and remove child sexual exploitation online have not yet been explored aggressively. I’ve been disappointed that there hasn’t been more of a conversation around preventing the crime from happening in the first place.
What has been tried is mass surveillance. In China, they are currently under mass surveillance both online and offline, and their behaviors are attached to a social credit score. Unfortunately, even on state-run and controlled social media platforms, they still have child sexual exploitation and abuse imagery pop up along with other crimes and human rights violations. They also have a thriving black market online due to the oppression from the state. In other words, even an entire loss of freedom and privacy cannot end the sexual exploitation of children online. It’s been tried. There is no reason to repeat this method.
It took me an embarrassingly long time to figure out why I always felt a slight coldness from those in tech and privacy-minded individuals about the topic of child sexual exploitation online. I didn’t have any clue about the “Four Horsemen of the Infocalypse.” This is a term coined by Timothy C. May in 1988. I would have been a child myself when he first said it. I actually laughed at myself when I heard the phrase for the first time. I finally got it. The Cypherpunks weren’t wrong about that topic. They were so spot on that it is borderline uncomfortable. I was mad at first that they knew that early during the birth of the internet that this issue would arise and didn’t address it. Then I got over it because I realized that it wasn’t their job. Their job was—is—to write code. Their job wasn’t to be involved and loving parents or survivor advocates. Their job wasn’t to educate children on internet safety or raise awareness; their job was to write code.
They knew that child sexual abuse material would be shared on the internet. They said what would happen—not in a gleeful way, but a prediction. Then it happened.
I equate it now to a concrete company laying down a road. As you’re pouring the concrete, you can say to yourself, “A terrorist might travel down this road to go kill many, and on the flip side, a beautiful child can be born in an ambulance on this road.” Who or what travels down the road is not their responsibility—they are just supposed to lay the concrete. I’d never go to a concrete pourer and ask them to solve terrorism that travels down roads. Under the current system, law enforcement should stop terrorists before they even make it to the road. The solution to this specific problem is not to treat everyone on the road like a terrorist or to not build the road.
So I understand the perceived coldness from those in tech. Not only was it not their job, but bringing up the topic was seen as the equivalent of asking a free person if they wanted to discuss one of the four topics—child abusers, terrorists, drug dealers, intellectual property pirates, etc.—that would usher in digital authoritarianism for all who are online globally.
Privacy rights advocates and groups have put up a good fight. They stood by their principles. Unfortunately, when it comes to corporate tech, I believe that the issue of privacy is almost a complete lost cause at this point. It’s still worth pushing back, but ultimately, it is a losing battle—a ticking time bomb.
I do think that corporate tech providers could have slowed down the inevitable loss of privacy at the hands of the state by prioritizing the detection and removal of CSAM when they all started online. I believe it would have bought some time, fewer would have been traumatized by that specific crime, and I do believe that it could have slowed down the demand for content. If I think too much about that, I’ll go insane, so I try to push the “if maybes” aside, but never knowing if it could have been handled differently will forever haunt me. At night when it’s quiet, I wonder what I would have done differently if given the opportunity. I’ll probably never know how much corporate tech knew and ignored in the hopes that it would go away while the problem continued to get worse. They had different priorities. The most voiceless and vulnerable exploited on corporate tech never had much of a voice, so corporate tech providers didn’t receive very much pushback.
Now I’m about to say something really wild, and you can call me whatever you want to call me, but I’m going to say what I believe to be true. I believe that the governments are either so incompetent that they allowed the proliferation of CSAM online, or they knowingly allowed the problem to fester long enough to have an excuse to violate privacy rights and erode end-to-end encryption. The US government could have seized the corporate tech providers over CSAM, but I believe that they were so useful as a propaganda arm for the regimes that they allowed them to continue virtually unscathed.
That season is done now, and the governments are making the issue a priority. It will come at a high cost. Privacy on corporate tech providers is virtually done as I’m typing this. It feels like a death rattle. I’m not particularly sure that we had much digital privacy to begin with, but the illusion of a veil of privacy feels gone.
To make matters slightly more complex, it would be hard to convince me that once AI really gets going, digital privacy will exist at all.
I believe that there should be a conversation shift to preserving freedoms and human rights in a post-privacy society.
I don’t want to get locked up because AI predicted a nasty post online from me about the government. I’m not a doomer about AI—I’m just going to roll with it personally. I’m looking forward to the positive changes that will be brought forth by AI. I see it as inevitable. A bit of privacy was helpful while it lasted. Please keep fighting to preserve what is left of privacy either way because I could be wrong about all of this.
On the topic of AI, the addition of AI to the horrific crime of child sexual abuse material and child sexual exploitation in multiple ways so far has been devastating. It’s currently out of control. The genie is out of the bottle. I am hopeful that innovation will get us humans out of this, but I’m not sure how or how long it will take. We must be extremely cautious around AI legislation. It should not be illegal to innovate even if some bad comes with the good. I don’t trust that the governments are equipped to decide the best pathway forward for AI. Source: the entire history of the government.
I have been personally negatively impacted by AI-generated content. Every few days, I get another alert that I’m featured again in what’s called “deep fake pornography” without my consent. I’m not happy about it, but what pains me the most is the thought that for a period of time down the road, many globally will experience what myself and others are experiencing now by being digitally sexually abused in this way. If you have ever had your picture taken and posted online, you are also at risk of being exploited in this way. Your child’s image can be used as well, unfortunately, and this is just the beginning of this particular nightmare. It will move to more realistic interpretations of sexual behaviors as technology improves. I have no brave words of wisdom about how to deal with that emotionally. I do have hope that innovation will save the day around this specific issue. I’m nervous that everyone online will have to ID verify due to this issue. I see that as one possible outcome that could help to prevent one problem but inadvertently cause more problems, especially for those living under authoritarian regimes or anyone who needs to remain anonymous online. A zero-knowledge proof (ZKP) would probably be the best solution to these issues. There are some survivors of violence and/or sexual trauma who need to remain anonymous online for various reasons. There are survivor stories available online of those who have been abused in this way. I’d encourage you seek out and listen to their stories.
There have been periods of time recently where I hesitate to say anything at all because more than likely AI will cover most of my concerns about education, awareness, prevention, detection, and removal of child sexual exploitation online, etc.
Unfortunately, some of the most pressing issues we’ve seen online over the last few years come in the form of “sextortion.” Self-generated child sexual exploitation (SG-CSEM) numbers are continuing to be terrifying. I’d strongly encourage that you look into sextortion data. AI + sextortion is also a huge concern. The perpetrators are using the non-sexually explicit images of children and putting their likeness on AI-generated child sexual exploitation content and extorting money, more imagery, or both from minors online. It’s like a million nightmares wrapped into one. The wild part is that these issues will only get more pervasive because technology is harnessed to perpetuate horror at a scale unimaginable to a human mind.
Even if you banned phones and the internet or tried to prevent children from accessing the internet, it wouldn’t solve it. Child sexual exploitation will still be with us until as a society we start to prevent the crime before it happens. That is the only human way out right now.
There is no reset button on the internet, but if I could go back, I’d tell survivor advocates to heed the warnings of the early internet builders and to start education and awareness campaigns designed to prevent as much online child sexual exploitation as possible. The internet and technology moved quickly, and I don’t believe that society ever really caught up. We live in a world where a child can be groomed by a predator in their own home while sitting on a couch next to their parents watching TV. We weren’t ready as a species to tackle the fast-paced algorithms and dangers online. It happened too quickly for parents to catch up. How can you parent for the ever-changing digital world unless you are constantly aware of the dangers?
I don’t think that the internet is inherently bad. I believe that it can be a powerful tool for freedom and resistance. I’ve spoken a lot about the bad online, but there is beauty as well. We often discuss how victims and survivors are abused online; we rarely discuss the fact that countless survivors around the globe have been able to share their experiences, strength, hope, as well as provide resources to the vulnerable. I do question if giving any government or tech company access to censorship, surveillance, etc., online in the name of serving survivors might not actually impact a portion of survivors negatively. There are a fair amount of survivors with powerful abusers protected by governments and the corporate press. If a survivor cannot speak to the press about their abuse, the only place they can go is online, directly or indirectly through an independent journalist who also risks being censored. This scenario isn’t hard to imagine—it already happened in China. During #MeToo, a survivor in China wanted to post their story. The government censored the post, so the survivor put their story on the blockchain. I’m excited that the survivor was creative and brave, but it’s terrifying to think that we live in a world where that situation is a necessity.
I believe that the future for many survivors sharing their stories globally will be on completely censorship-resistant and decentralized protocols. This thought in particular gives me hope. When we listen to the experiences of a diverse group of survivors, we can start to understand potential solutions to preventing the crimes from happening in the first place.
My heart is broken over the gut-wrenching stories of survivors sexually exploited online. Every time I hear the story of a survivor, I do think to myself quietly, “What could have prevented this from happening in the first place?” My heart is with survivors.
My head, on the other hand, is full of the understanding that the internet should remain free. The free flow of information should not be stopped. My mind is with the innocent citizens around the globe that deserve freedom both online and offline.
The problem is that governments don’t only want to censor illegal content that violates human rights—they create legislation that is so broad that it can impact speech and privacy of all. “Don’t you care about the kids?” Yes, I do. I do so much that I’m invested in finding solutions. I also care about all citizens around the globe that deserve an opportunity to live free from a mass surveillance society. If terrorism happens online, I should not be punished by losing my freedom. If drugs are sold online, I should not be punished. I’m not an abuser, I’m not a terrorist, and I don’t engage in illegal behaviors. I refuse to lose freedom because of others’ bad behaviors online.
I want to be clear that on a long enough timeline, the governments will decide that they can be better parents/caregivers than you can if something isn’t done to stop minors from being sexually exploited online. The price will be a complete loss of anonymity, privacy, free speech, and freedom of religion online. I find it rather insulting that governments think they’re better equipped to raise children than parents and caretakers.
So we can’t go backwards—all that we can do is go forward. Those who want to have freedom will find technology to facilitate their liberation. This will lead many over time to decentralized and open protocols. So as far as I’m concerned, this does solve a few of my worries—those who need, want, and deserve to speak freely online will have the opportunity in most countries—but what about online child sexual exploitation?
When I popped up around the decentralized space, I was met with the fear of censorship. I’m not here to censor you. I don’t write code. I couldn’t censor anyone or any piece of content even if I wanted to across the internet, no matter how depraved. I don’t have the skills to do that.
I’m here to start a conversation. Freedom comes at a cost. You must always fight for and protect your freedom. I can’t speak about protecting yourself from all of the Four Horsemen because I simply don’t know the topics well enough, but I can speak about this one topic.
If there was a shortcut to ending online child sexual exploitation, I would have found it by now. There isn’t one right now. I believe that education is the only pathway forward to preventing the crime of online child sexual exploitation for future generations.
I propose a yearly education course for every child of all school ages, taught as a standard part of the curriculum. Ideally, parents/caregivers would be involved in the education/learning process.
Course: - The creation of the internet and computers - The fight for cryptography - The tech supply chain from the ground up (example: human rights violations in the supply chain) - Corporate tech - Freedom tech - Data privacy - Digital privacy rights - AI (history-current) - Online safety (predators, scams, catfishing, extortion) - Bitcoin - Laws - How to deal with online hate and harassment - Information on who to contact if you are being abused online or offline - Algorithms - How to seek out the truth about news, etc., online
The parents/caregivers, homeschoolers, unschoolers, and those working to create decentralized parallel societies have been an inspiration while writing this, but my hope is that all children would learn this course, even in government ran schools. Ideally, parents would teach this to their own children.
The decentralized space doesn’t want child sexual exploitation to thrive. Here’s the deal: there has to be a strong prevention effort in order to protect the next generation. The internet isn’t going anywhere, predators aren’t going anywhere, and I’m not down to let anyone have the opportunity to prove that there is a need for more government. I don’t believe that the government should act as parents. The governments have had a chance to attempt to stop online child sexual exploitation, and they didn’t do it. Can we try a different pathway forward?
I’d like to put myself out of a job. I don’t want to ever hear another story like John Doe #1 ever again. This will require work. I’ve often called online child sexual exploitation the lynchpin for the internet. It’s time to arm generations of children with knowledge and tools. I can’t do this alone.
Individuals have fought so that I could have freedom online. I want to fight to protect it. I don’t want child predators to give the government any opportunity to take away freedom. Decentralized spaces are as close to a reset as we’ll get with the opportunity to do it right from the start. Start the youth off correctly by preventing potential hazards to the best of your ability.
The good news is anyone can work on this! I’d encourage you to take it and run with it. I added the additional education about the history of the internet to make the course more educational and fun. Instead of cleaning up generations of destroyed lives due to online sexual exploitation, perhaps this could inspire generations of those who will build our futures. Perhaps if the youth is armed with knowledge, they can create more tools to prevent the crime.
This one solution that I’m suggesting can be done on an individual level or on a larger scale. It should be adjusted depending on age, learning style, etc. It should be fun and playful.
This solution does not address abuse in the home or some of the root causes of offline child sexual exploitation. My hope is that it could lead to some survivors experiencing abuse in the home an opportunity to disclose with a trusted adult. The purpose for this solution is to prevent the crime of online child sexual exploitation before it occurs and to arm the youth with the tools to contact safe adults if and when it happens.
In closing, I went to hell a few times so that you didn’t have to. I spoke to the mothers of survivors of minors sexually exploited online—their tears could fill rivers. I’ve spoken with political dissidents who yearned to be free from authoritarian surveillance states. The only balance that I’ve found is freedom online for citizens around the globe and prevention from the dangers of that for the youth. Don’t slow down innovation and freedom. Educate, prepare, adapt, and look for solutions.
I’m not perfect and I’m sure that there are errors in this piece. I hope that you find them and it starts a conversation.
-
@ 1fdb6dac:65eb9a8a
2025-06-08 18:44:35Vivimos en un mundo que nos enseñó a desconfiar de nuestra intuición.\ Un sistema que premia la obediencia, no el pensamiento crítico.\ Que nos médica para sobrevivir, pero no para sanar.\ Que nos quiere separadas, desconectadas, dependientes.
Desde chicas nos formaron para encajar, no para ser libres.\ La escuela nos preparó para ser piezas funcionales de una máquina, no para ser mujeres conscientes, creativas, despiertas.\ La salud se volvió un negocio: pastillas que apagan síntomas, pero nunca llegan al origen.\ La familia, ese espacio de contención y raíces, fue debilitada en nombre de una supuesta “productividad”.
Nos dijeron que para ser fuertes teníamos que dejar de lado nuestros deseos más profundos.\ Que la maternidad era una traba. Que formar familia era mirar hacia atrás.\ Nos empujaron a vivir en una lógica masculina, en la que mostrar sensibilidad era sinónimo de debilidad.\ Pero nada de esto fue casual.
Este sistema necesita que no creas en vos para poder seguir funcionando.\ Necesita que te desconectes de tu cuerpo, de tus vínculos, de tu intuición.\ Y, sobre todo, necesita que te desconectes del valor real de tu tiempo, de tu energía, de tu dinero.
Pero hay otra forma.\ Hay otra forma de ser mujer, de ser madre, de ser libre.\ Y empieza por recordar lo que siempre supimos, pero olvidamos:\ La familia es revolución desde el amor.\ Porque una sociedad fuerte nace de vínculos sanos.\ Y eso empieza en casa, en las relaciones donde aprendemos qué es amar, cuidar, sostener, poner límites, construir.
Nos enseñaron a medir el éxito por cuánto nos alejábamos de lo femenino.\ Pero la independencia sin conexión es otra forma de soledad.\ La maternidad no es debilidad. Es fuerza creadora.\ La energía femenina no es pasiva. Es raíz, instinto, visión.
Y así como nos quitaron poder en nuestros cuerpos y vínculos, también lo hicieron con nuestro dinero.
Dinero, Energía y Libertad
¿Qué es el dinero, si no una forma de energía?\ El resultado de tu tiempo, tu creatividad, tu esfuerzo.\ Sin que te des cuenta, te están robando esa energía.
Nos enseñaron a ahorrar. Pero nunca nos explicaron que, mientras guardamos billetes, su valor se disuelve.\ Que los bancos centrales imprimen dinero —ni siquiera lo imprimen, lo “crean” digitalmente— sin pedirnos permiso, sin pensar en nuestra vida.\ Y mientras tanto, vos trabajás cada vez más… por cada vez menos.
Porque si controlan tu tiempo, controlan tu vida.\ Si te mantienen ocupada, te mantienen distraída.\ Si te desconectan del verdadero valor del dinero, te vuelven dependiente.
Bitcoin como Llave
Bitcoin no es solo una inversión. Es una herramienta.\ Una llave para volver a tener el control.\ De tu energía. De tu tiempo. De tu vida.
No se trata solo de números.\ Se trata de comprender.\ De construir redes descentralizadas de mujeres libres, que se acompañan, que comparten saberes, que se sostienen.
Porque la verdadera abundancia empieza cuando entendés que el poder vuelve a vos.
Es hora de recordar.\ De mirar hacia adentro.\ Y de tomar decisiones que nos devuelvan a lo esencial:\ La conexión real, el amor como base, y la autonomía como acto sagrado.
-
@ b1ddb4d7:471244e7
2025-06-07 10:01:38When Sergei talks about bitcoin, he doesn’t sound like someone chasing profits or followers. He sounds like someone about to build a monastery in the ruins.
While the mainstream world chases headlines and hype, Sergei shows up in local meetups from Sacramento to Cleveland, mentors curious minds, and shares what he knows is true – hoping that, with the right spark, someone will light their own way forward.
We interviewed Sergei to trace his steps: where he started, what keeps him going, and why teaching bitcoin is far more than explaining how to set up a node – it’s about reaching the right minds before the noise consumes them. So we began where most journeys start: at the beginning.
First Steps
- So, where did it all begin for you and what made you stay curious?
I first heard about bitcoin from a friend’s book recommendation, American Kingpin, the book about Silk Road (online drug marketplace). He is still not a true bitcoiner, although I helped him secure private keys with some bitcoin.
I was really busy at the time – focused on my school curriculum, running a 7-bedroom Airbnb, and working for a standardized test prep company. Bitcoin seemed too technical for me to explore, and the pace of my work left no time for it.
After graduating, while pursuing more training, I started playing around with stocks and maximizing my savings. Passive income seemed like the path to early retirement, as per the promise of the FIRE movement (Financial Independence, Retire Early). I mostly followed the mainstream news and my mentor’s advice – he liked preferred stocks at the time.
I had some Coinbase IOUs and remember sending bitcoin within the Coinbase ledger to a couple friends. I also recall the 2018 crash; I actually saw the legendary price spike live but couldn’t benefit because my funds were stuck amidst the frenzy. I withdrew from that investment completely for some time. Thankfully, my mentor advised to keep en eye on bitcoin.
Around late 2019, I started DCA-ing cautiously. Additionally, my friend and I were discussing famous billionaires, and how there was no curriculum for becoming a billionaire. So, I typed “billionaires” into my podcast app, and landed on We Study Billionaires podcast.
That’s where I kept hearing Preston Pysh mention bitcoin, before splitting into his own podcast series, Bitcoin Fundamentals. I didn’t understand most of the terminology of stocks, bonds, etc, yet I kept listening and trying to absorb it thru repetition. Today, I realize all that financial talk was mostly noise.
When people ask me for a technical explanation of fiat, I say: it’s all made up, just like the fiat price of bitcoin! Starting in 2020, during the so-called pandemic, I dove deeper. I religiously read Bitcoin Magazine, scrolled thru Bitcoin Twitter, and joined Simply Bitcoin Telegram group back when DarthCoin was an admin.
DarthCoin was my favorite bitcoiner – experienced, knowledgeable, and unapologetic. Watching him shift from rage to kindness, from passion to despair, gave me a glimpse at what a true educator’s journey would look like.
The struggle isn’t about adoption at scale anymore. It’s about reaching the few who are willing to study, take risks, and stay out of fiat traps. The vast majority won’t follow that example – not yet at least… if I start telling others the requirements for true freedom and prosperity, they would certainly say “Hell no!”
- At what point did you start teaching others, and why?
After college, I helped teach at a standardized test preparation company, and mentored some students one-on-one. I even tried working at a kindergarten briefly, but left quickly; Babysitting is not teaching.
What I discovered is that those who will succeed don’t really need my help – they would succeed with or without me, because they already have the inner drive.
Once you realize your people are perishing for lack of knowledge, the only rational thing to do is help raise their level of knowledge and understanding. That’s the Great Work.
I sometimes imagine myself as a political prisoner. If that were to happen, I’d probably start teaching fellow prisoners, doctors, janitors, even guards. In a way we already live in an open-air prison, So what else is there to do but teach, organize, and conspire to dismantle the Matrix?
Building on Bitcoin
- You hosted some in-person meetups in Sacramento. What did you learn from those?
My first presentation was on MultiSig storage with SeedSigner, and submarine swaps through Boltz.exchange.
I realized quickly that I had overestimated the group’s technical background. Even the meetup organizer, a financial advisor, asked, “How is anyone supposed to follow these steps?” I responded that reading was required… He decided that Unchained is an easier way.
At a crypto meetup, I gave a much simpler talk, outlining how bitcoin will save the world, based on a DarthCoin’s guide. Only one person stuck around to ask questions – a man who seemed a little out there, and did not really seem to get the message beyond the strength of cryptographic security of bitcoin.
Again, I overestimated the audience’s readiness. That forced me to rethink my strategy. People are extremely early and reluctant to study.
- Now in Ohio, you hold sessions via the Orange Pill App. What’s changed?
My new motto is: educate the educators. The corollary is: don’t orange-pill stupid normies (as DarthCoin puts it).
I’ve shifted to small, technical sessions in order to raise a few solid guardians of this esoteric knowledge who really get it and can carry it forward.
The youngest attendee at one of my sessions is a newborn baby – he mostly sleeps, but maybe he still absorbs some of the educational vibes.
- How do local groups like Sactown and Cleveland Bitcoiners influence your work?
Every meetup reflects its local culture. Sacramento and Bay Area Bitcoiners, for example, do camping trips – once we camped through a desert storm, shielding our burgers from sand while others went to shoot guns.
Cleveland Bitcoiners are different. They amass large gatherings. They recently threw a 100k party. They do a bit more community outreach. Some are curious about the esoteric topics such as jurisdiction, spirituality, and healthful living.
I have no permanent allegiance to any state, race, or group. I go where I can teach and learn. I anticipate that in my next phase, I’ll meet Bitcoiners so advanced that I’ll have to give up my fiat job and focus full-time on serious projects where real health and wealth are on the line.
Hopefully, I’ll be ready. I believe the universe always challenges you exactly to your limit – no less, no more.
- What do people struggle with the most when it comes to technical education?
The biggest struggle isn’t technical – it’s a lack of deep curiosity. People ask “how” and “what” – how do I set up a node, what should one do with the lightning channels? But very few ask “why?”
Why does on-chain bitcoin not contribute to the circular economy? Why is it essential to run Lightning? Why did humanity fall into mental enslavement in the first place?
I’d rather teach two-year-olds who constantly ask “why” than adults who ask how to flip a profit. What worries me most is that most two-year-olds will grow up asking state-funded AI bots for answers and live according to its recommendations.
- One Cleveland Bitcoiner shows up at gold bug meetups. How valuable is face-to-face education?
I don’t think the older generation is going to reverse the current human condition. Most of them have been under mind control for too long, and they just don’t have the attention span to study and change their ways.
They’re better off stacking gold and helping fund their grandkids’ education. If I were to focus on a demographic, I’d go for teenagers – high school age – because by college, the indoctrination is usually too strong, and they’re chasing fiat mastery.
As for the gold bug meetup? Perhaps one day I will show up with a ukulele to sing some bitcoin-themed songs. Seniors love such entertainment.
- How do you choose what to focus on in your sessions, especially for different types of learners?
I don’t come in with a rigid agenda. I’ve collected a massive library of resources over the years and never stopped reading. My browser tab and folder count are exploding.
At the meetup, people share questions or topics they’re curious about, then I take that home, do my homework, and bring back a session based on those themes. I give them the key takeaways, plus where to dive deeper.
Most people won’t – or can’t – study the way I do, and I expect attendees to put in the work. I suspect that it’s more important to reach those who want to learn but don’t know how, the so-called nescient (not knowing), rather than the ignorant.
There are way too many ignorant bitcoiners, so my mission is to find those who are curious what’s beyond the facade of fake reality and superficial promises.
That naturally means that fewer people show up, and that’s fine. I’m not here for the crowds; I’m here to educate the educators. One bitcoiner who came decided to branch off into self-custody sessions and that’s awesome. Personally, I’m much more focused on Lightning.
I want to see broader adoption of tools like auth, sign-message, NWC, and LSPs. Next month, I’m going deep into eCash solutions, because let’s face it – most newcomers won’t be able to afford their own UTXO or open a lightning channel; additionally, it has to be fun and easy for them to transact sats, otherwise they won’t do it. Additionally, they’ll need to rely on
-
@ 2b998b04:86727e47
2025-06-08 18:39:04I’ve spent years chasing the promise of freedom.\ In startups. In faith communities. In movements that claimed to be for the people.
And yet — so often, that promise felt just out of reach.\ Conditional. Corporate. Sanitized.\ A freedom with fine print.
But here —\ Here in the thick of Bitcoin 2025, on Nostr, among misfits and builders and signal-bringers —\ something is alive.
It’s not a platform.\ It’s not a marketing strategy.\ It’s not another app promising to “empower” you while locking down your data and selling you out.
It’s freedom rooted in architecture.\ Decentralization not just as a buzzword —\ but as an expression of conviction.
A kind of freedom you can feel in your body:
-
When you zap someone’s words because they moved you — not because an algorithm told you to.
-
When your identity is yours — keys, not credentials.
-
When no one can delete your story because you control the server, or because there is no server — just the relay of your choosing.
This isn’t utopia.\ There are egos. There’s noise. There’s still posturing.\ But it’s different.\ The center of gravity has shifted.
We’re no longer begging institutions to notice us.\ We’re building outside their jurisdiction.
And for the first time in a long time,\ freedom feels close.\ Tangible.\ Joyful.\ Alive.
This isn’t just about tech.\ It’s about trust.\ It’s about choosing to show up —\ to build\ to write\ to signal\ to keep going.
Even when it’s hard.\ Even when no one claps.
Because real freedom doesn’t come from being noticed.\ It comes from being sovereign.
And that’s something no one can take from me again.
—
Written in Las Vegas, during Bitcoin 2025.\ Posted via Nostr. Vibes co-authored by ChatGPT (“Dr. C”).\ Zap: <https://tinyurl.com/yuyu2b9t>
-
-
@ b1ddb4d7:471244e7
2025-06-07 10:01:33“Not your keys, not your coins” isn’t a slogan—it’s a survival mantra in the age of digital sovereignty.
The seismic collapses of Mt. Gox (2014) and FTX (2022) weren’t anomalies; they were wake-up calls. When $8.7 billion in customer funds vanished with FTX, it exposed the fatal flaw of third-party custody: your bitcoin is only as secure as your custodian’s weakest link.
Yet today, As of early 2025, analysts estimate that between 2.3 million and 3.7 million Bitcoins are permanently lost, representing approximately 11–18% of bitcoin’s fixed maximum supply of 21 million coins, with some reports suggesting losses as high as 4 million BTC. This paradox reveals a critical truth: self-custody isn’t just preferable—it’s essential—but it must be done right.
The Custody Spectrum
Custodial Wallets (The Illusion of Control)
- Rehypothecation Risk: Most platforms lend your bitcoin for yield generation. When Celsius collapsed, users discovered their “held” bitcoin was loaned out in risky strategies.
- Account Freezes: Regulatory actions can lock withdrawals overnight. In 2023, Binance suspended dollar withdrawals for U.S. users citing “partner bank issues,” trapping funds for weeks.
- Data Vulnerability: KYC requirements create honeypots for hackers. The 2024 Ledger breach exposed 270,000 users’ personal data despite hardware security.
True Self-Custody
Self-custody means exclusively controlling your private keys—the cryptographic strings that prove bitcoin ownership. Unlike banks or exchanges, self-custody eliminates:- Counterparty risk (no FTX-style implosions)
- Censorship (no blocked transactions)
- Inflationary theft (no fractional reserve lending)
Conquering the Three Great Fears of Self-Custody
Fear 1: “I’ll Lose Everything If I Make a Mistake”
Reality: Human error is manageable with robust systems:
- Test Transactions: Always send a micro-amount (0.00001 BTC) before large transfers. Verify receipt AND ability to send back.
- Multi-Backup Protocol: Store seed phrases on fireproof/waterproof steel plates (not paper!). Distribute copies geographically—one in a home safe, another with trusted family 100+ miles away.
- SLIP39 Sharding: Split your seed into fragments requiring 3-of-5 shards to reconstruct. No single point of failure.
Fear 2: “Hackers Will Steal My Keys”
Reality: Offline storage defeats remote attacks:
- Hardware Wallets: Devices like Bitkey or Ledger keep keys in “cold storage”—isolated from internet-connected devices. Transactions require physical confirmation.
- Multisig Vaults: Bitvault’s multi-sig system requires attackers compromise multiple locations/devices simultaneously. Even losing two keys won’t forfeit funds.
- Air-Gapped Verification: Use dedicated offline devices for wallet setup. Never type seeds on internet-connected machines.
Fear 3: “My Family Can’t Access It If I Die”
Reality: Inheritance is solvable:
- Dead Man Switches: Bitwarden’s emergency access allows trusted contacts to retrieve encrypted keys after a pre-set waiting period (e.g., 30 days).
- Inheritance Protocols: Bitkey’s inheritance solution shares decryption keys via designated beneficiaries’ emails. Requires multiple approvals to prevent abuse.
- Public Key Registries: Share wallet XPUBs (not private keys!) with heirs. They can monitor balances but not spend, ensuring transparency without risk.
The Freedom Dividend
- Censorship Resistance: Send $10M BTC to a Wikileaks wallet without Visa/Mastercard blocking it.
- Privacy Preservation: Avoid KYC surveillance—non-custodial wallets like Flash require zero ID verification.
- Protocol Access: Participate in bitcoin-native innovations (Lightning Network, DLCs) only possible with self-custodied keys.
- Black Swan Immunity: When Cyprus-style bank bailins happen, your bitcoin remains untouched in your vault.
The Sovereign’s Checklist
- Withdraw from Exchanges: Move all BTC > $1,000 to self-custody immediately.
- Buy Hardware Wallet: Purchase DIRECTLY from manufacturer (no Amazon!) to avoid supply-chain tampering.
- Generate Seed OFFLINE: Use air-gapped device, write phrase on steel—never digitally.
- Test Recovery: Delete wallet, restore from seed before funding.
- Implement Multisig: For > $75k, use Bitvault for 2-of-3 multi-sig setup.
- Create Inheritance Plan: Share XPUBs/SLIP39 shards with heirs + legal documents.
“Self-custody isn’t about avoiding risk—it’s about transferring risk from opaque institutions to transparent, controllable systems you design.”
The Inevitable Evolution: Custody Without Compromise
Emerging solutions are erasing old tradeoffs:
- MPC Wallets: Services like Xapo Bank shatter keys into encrypted fragments distributed globally. No single device holds full keys, defeating physical theft.
- Social Recovery: Ethically designed networks (e.g., Bitkey) let trusted contacts restore access without custodial control.
- Biometric Assurance: Fingerprint reset protocols prevent lockouts from physical injuries.
Lost keys = lost bitcoin. But consider the alternative: entrusting your life savings to entities with proven 8% annual failure rates among exchanges. Self-custody shifts responsibility from hoping institutions won’t fail to knowing your system can’t fail without your consent.
Take action today: Move one coin. Test one recovery. Share one xpub. The path to unchained wealth begins with a single satoshi under your control.
-
@ 97c70a44:ad98e322
2025-02-17 14:29:00Everyone knows that relays are central to how nostr works - they're even in the name: Notes and Other Stuff Transmitted by Relays. As time goes on though, there are three other letters which are becoming conspicuously absent from our beloved and ambiguously pronounceable acronym - "D", "V", and "M".
For the uninitiated, DVM stands for "data vending machines". They're actually sort of hard to describe — in technical terms they act more like clients, since they simply read events from and publish events to relays. In most cases though, these events are part of a request/response flow initiated by users elsewhere on the network. In practice, DVMs are bots, but there's also nothing to prevent the work they do from being powered by human interaction. They're an amazingly flexible tool for building anything from custom feeds, to transcription services, to chatbots, to protocol gateways.
The hype cycle for DVMs seems to have reached escape velocity in a way few other things have - zaps being the possible exception. But what exactly DVMs are remains something of a mystery to many nostr developers - and how to build one may as well be written on clay tablets.
This blog post is designed to address that - below is a soup to nuts (no nutzaps though) guide to building a DVM flow, both from the client and the server side.
Here's what we'll be covering:
- Discovering DVM metadata
- Basic request/response flow
- Implementing a minimal example
Let's get started!
DVM Metadata
First of all, it's helpful to know how DVMs are reified on the nostr network. While not strictly necessary, this can be useful for discovering DVMs and presenting them to users, and for targeting specific DVMs we want a response from.
NIP 89 goes into this in more detail, but the basic idea is that anyone can create a
kind 31990
"application handler" event and publish it to the network with their own (or a dedicated) public key. This handler was originally intended to advertise clients, but has been re-purposed for DVM listings as well.Here's what the "Fluffy Frens" handler looks like:
json { "content": "{\"name\": \"Fluffy Frens\", \"picture\": \"https://image.nostr.build/f609311532c470f663e129510a76c9a1912ae9bc4aaaf058e5ba21cfb512c88e.jpg\", \"about\": \"I show recent notes about animals\", \"lud16\": \"discovery_content_fluffy@nostrdvm.com\", \"supportsEncryption\": true, \"acceptsNutZaps\": false, \"personalized\": false, \"amount\": \"free\", \"nip90Params\": {\"max_results\": {\"required\": false, \"values\": [], \"description\": \"The number of maximum results to return (default currently 100)\"}}}", "created_at": 1738874694, "id": "0aa8d1f19cfe17e00ce55ca86fea487c83be39a1813601f56f869abdfa776b3c", "kind": 31990, "pubkey": "7b7373dd58554ff4c0d28b401b9eae114bd92e30d872ae843b9a217375d66f9d", "sig": "22403a7996147da607cf215994ab3b893176e5302a44a245e9c0d91214e4c56fae40d2239dce58ea724114591e8f95caed2ba1a231d09a6cd06c9f0980e1abd5", "tags": [ ["k", "5300"], ["d", "198650843898570c"] ] }
This event is rendered in various clients using the kind-0-style metadata contained in the
content
field, allowing users to browse DVMs and pick one for their use case. If a user likes using a particular DVM, they might publish akind 31989
"application recommendation", which other users can use to find DVMs that are in use within their network.Note the
k
tag in the handler event - this allows DVMs to advertise support only for specific job types. It's also important to note that even though the spec doesn't cover relay selection, most clients use the publisher'skind 10002
event to find out where the DVM listens for events.If this looks messy to you, you're right. See this PR for a proposal to split DVMs out into their own handler kind, give them a dedicated pubkey along with dedicated metadata and relay selections, and clean up the data model a bit.
DVM Flow
Now that we know what a DVM looks like, we can start to address how they work. My explanation below will elide some of the detail involved in NIP 90 for simplicity, so I encourage you to read the complete spec.
The basic DVM flow can be a little (very) confusing to work with, because in essence it's a request/response paradigm, but it has some additional wrinkles.
First of all, the broker for the request isn't abstracted away as is usually the case with request/response flows. Regular HTTP requests involve all kinds of work in the background - from resolving domain names to traversing routers, VPNs, and ISP infrastructure. But developers don't generally have to care about all these intermediaries.
With DVMs, on the other hand, the essential complexity of relay selection can't simply be ignored. DVMs often advertise their own relay selections, which should be used rather than a hard-coded or randomly chosen relay to ensure messages are delivered. The benefit of this is that DVMs can avoid censorship, just as users can, by choosing relays that are willing to broker their activity. DVMs can even select multiple relays to broker requests, which means that clients might receive multiple copies of the same response.
Secondly, the DVM request/response model is far more fluid than is usually the case with request/response flows. There are a set of standard practices, but the flow is flexible enough to admit exceptions to these conventions for special use cases. Here are some examples:
- Normally, clients p-tag the DVM they wish to address. But if a client isn't picky about where a response comes from, they may choose to send an open request to the network and collect responses from multiple DVMs simultaneously.
- Normally, a client creates a request before collecting responses using a subscription with an e-tag filter matching the request event. But clients may choose to skip the request step entirely and collect responses from the network that have already been created. This can be useful for computationally intensive tasks or common queries, where a single result can be re-used multiple times.
- Sometimes, a DVM may respond with a
kind 7000
job status event to let clients know they're working on the request. This is particularly useful for longer-running tasks, where feedback is useful for building a responsive UX. - There are also some details in the spec regarding monetization, parameterization, error codes, encryption, etc.
Example DVM implementation
For the purposes of this blog post, I'll keep things simple by illustrating the most common kind of DVM flow: a
kind 5300
content discovery request, addressed to a particular DVM. If you're interested in other use cases, please visit data-vending-machines.org for additional documented kinds.The basic flow looks like this:
- The DVM starts by listening for
kind 5300
job requests on some relays it has selected and advertised via NIP 89 (more on that later) - A client creates a request event of
kind 5300
, p-tagged with the DVM's pubkey and sends it to the DVM's relay selections. - The DVM receives the event and processes it, issuing optional
kind 7000
job status events, and eventually issuing akind 6300
job result event (job result event kinds are always 1000 greater than the request's kind). - The client listens to the same relays for a response, and when it comes through does whatever it wants to with it.
Here's a swimlane diagram of that flow:
To avoid massive code samples, I'm going to implement our DVM entirely using nak (backed by the power of the human mind).
The first step is to start our DVM listening for requests that it wants to respond to. Nak's default pubkey is
79be667ef9dcbbac55a06295ce870b07029bfcdb2dce28d959f2815b16f81798
, so we'll only listen for requests sent to nak.bash nak req -k 5300 -t p=79be667ef9dcbbac55a06295ce870b07029bfcdb2dce28d959f2815b16f81798
This gives us the following filter:
json ["REQ","nak",{"kinds":[5300],"#p":["79be667ef9dcbbac55a06295ce870b07029bfcdb2dce28d959f2815b16f81798"]}]
To open a subscription to
nos.lol
and stream job requests, add--stream wss://nos.lol
to the previous request and leave it running.Next, open a new terminal window for our "client" and create a job request. In this case, there's nothing we need to provide as
input
, but we'll include it just for illustration. It's also good practice to include anexpiration
tag so we're not asking relays to keep our ephemeral requests forever.bash nak event -k 5300 -t p=79be667ef9dcbbac55a06295ce870b07029bfcdb2dce28d959f2815b16f81798 -t expiration=$(( $(date +%s) + 30 )) -t input=hello
Here's what comes out:
json { "kind": 5300, "id": "0e419d0b3c5d29f86d2132a38ca29cdfb81a246e1a649cb2fe1b9ed6144ebe30", "pubkey": "79be667ef9dcbbac55a06295ce870b07029bfcdb2dce28d959f2815b16f81798", "created_at": 1739407684, "tags": [ ["p", "79be667ef9dcbbac55a06295ce870b07029bfcdb2dce28d959f2815b16f81798"], ["expiration", "1739407683"], ["input", "hello"] ], "content": "", "sig": "560807548a75779a7a68c0ea73c6f097583e2807f4bb286c39931e99a4e377c0a64af664fa90f43e01ddd1de2e9405acd4e268f1bf3bc66f0ed5a866ea093966" }
Now go ahead and publish this event by adding
nos.lol
to the end of yournak
command. If all goes well, you should see your event pop up in your "dvm" subscription. If so, great! That's half of the flow.Next, we'll want our client to start listening for
kind 6300
responses to the request. In your "client" terminal window, run:bash nak req -k 6300 -t e=<your-eventid-here> --stream nos.lol
Note that if you only want to accept responses from the specified DVM (a good policy in general to avoid spam) you would include a
p
tag here. I've omitted it for brevity. Also notice thek
tag specifies the request kind plus1000
- this is just a convention for what kinds requests and responses use.Now, according to data-vending-machines.org,
kind 5300
responses are supposed to put a JSON-encoded list of e-tags in thecontent
field of the response. Weird, but ok. Stop the subscription in your "dvm" terminal and respond to your "client" with a recommendation to read my first note:bash nak event -k 6300 -t e=a65665a3a4ca2c0d7b7582f4f0d073cd1c83741c25a07e98d49a43e46d258caf -c '[["e","214f5898a7b75b7f95d9e990b706758ea525fe86db54c1a28a0f418c357f9b08","wss://nos.lol/"]]' nos.lol
Here's the response event we're sending:
json { "kind": 6300, "id": "bb5f38920cbca15d3c79021f7d0051e82337254a84c56e0f4182578e4025232e", "pubkey": "79be667ef9dcbbac55a06295ce870b07029bfcdb2dce28d959f2815b16f81798", "created_at": 1739408411, "tags": [ ["e", "a65665a3a4ca2c0d7b7582f4f0d073cd1c83741c25a07e98d49a43e46d258caf"] ], "content": "[[\"e\",\"214f5898a7b75b7f95d9e990b706758ea525fe86db54c1a28a0f418c357f9b08\",\"wss://nos.lol/\"]]", "sig": "a0fe2c3419c5c54cf2a6d9a2a5726b2a5b766d3c9e55d55568140979354003aacb038e90bdead43becf5956faa54e3b60ff18c0ea4d8e7dfdf0c8dd97fb24ff9" }
Notice the
e
tag targets our original request.This should result in the job result event showing up in our "client" terminal. Success!
If something isn't working, I've also create a video of the full process with some commentary which you can find here.
Note that in practice, DVMs can be much more picky about the requests they will respond to, due to implementations failing to follow Postel's law. Hopefully that will improve over time. For now, here are a few resources that are useful when working with or developing DVMs:
Conclusion
I started this post by hinting that DVMs might be as fundamental as relays are to making nostr work. But (apart from the fact that we'd end up with an acronym like DVMNOSTRZ+*, which would only exascerbate the pronounciation wars (if such a thing were possible)), that's not exactly true.
DVMs have emerged as a central paradigm in the nostr world because they're a generalization of a design pattern unique to nostr's architecture - but which exists in many other places, including NIP 46 signer flows and NIP 47 wallet connect. Each of these sub-protocols works by using relays as neutral brokers for requests in order to avoid coupling services to web addresses.
This approach has all kinds of neat benefits, not least of which is allowing service providers to host their software without having to accept incoming TCP connections. But it's really an emergent property of relays, which not only are useful for brokering communication between users (aka storing events), but also brokering communication between machines.
The possibilities of this architecture have only started to emerge, so be on the lookout for new applications, and don't be afraid to experiment - just please, don't serialize json inside json 🤦♂️
-
@ cae03c48:2a7d6671
2025-06-07 10:01:07Bitcoin Magazine
Mapping Bitcoin’s Bull Cycle PotentialBitcoin’s Market Value to Realized Value, or MVRV ratio, remains one of the most reliable on-chain indicators for identifying local and macro tops and bottoms across every BTC cycle. By isolating data across different investor cohorts and adapting historical benchmarks to modern market conditions, we can generate more accurate insights into where Bitcoin may be headed next.
The Bitcoin MVRV Ratio
The MVRV Ratio compares Bitcoin’s market price to its realized price, essentially the average cost basis for all coins in the network. As of writing, BTC trades around $105,000 while the realized price floats near $47,000, putting the raw MVRV at 2.26. The Z-Score version of MVRV standardizes this ratio based on historical volatility, enabling clearer comparisons across different market cycles.
Figure 1: Historically, the MVRV Ratio and the MVRV Z-Score have accurately identified cycle peaks and bottoms. View Live Chart
Short-Term Holders
Short-term holders, defined as those holding Bitcoin for 155 days or less, currently have a realized price near $97,000. This metric often acts as dynamic support in bull markets and resistance in bear markets. Notably, when the Short Term Holder MVRV hits 1.33, local tops have historically occurred, as seen several times in both the 2017 and 2021 cycles. So far in the current cycle, this threshold has already been touched four times, each followed by modest retracements.
Figure 2: Short Term Holder MVRV reaching 1.33 in more recent cycles has aligned with local tops. View Live Chart
Long-Term Holders
Long-term holders, who’ve held BTC for more than 155 days, currently have an average cost basis of just $33,500, putting their MVRV at 3.11. Historically, Long Term Holder MVRV values have reached as high as 12 during major peaks. That said, we’re observing a trend of diminishing multiples each cycle.
Figure 3: Achieving a Long Term Holder MVRV value of 8 could extrapolate to a BTC price in excess of $300,000. View Live Chart
A key resistance band now sits between 7.5 and 8.5, a zone that has defined bull tops and pre-bear retracements in every cycle since 2011. If the current growth of the realized price ($40/day) continues for another 140–150 days, matching previous cycle lengths, we could see it reach somewhere in the region of $40,000. A peak MVRV of 8 would imply a price near $320,000.
A Smarter Market Compass
Unlike static all-time metrics, the 2-Year Rolling MVRV Z-Score adapts to evolving market dynamics. By recalculating average extremes over a rolling window, it smooths out Bitcoin’s natural volatility decay as it matures. Historically, this version has signaled overbought conditions when reaching levels above 3, and prime accumulation zones when dipping below -1. Currently sitting under 1, this metric suggests that substantial upside remains.
Figure 4: The current 2-Year Rolling MVRV Z-Score suggests more positive price action ahead. View Live Chart
Timing & Targets
A view of the BTC Growth Since Cycle Lows chart illustrates that BTC is now approximately 925 days removed from its last major cycle low. Historical comparisons to previous bull markets suggest we may be around 140 to 150 days away from a potential top, with both the 2017 and 2021 peaks occurring around 1,060 to 1,070 days after their respective lows. While not deterministic, this alignment reinforces the broader picture of where we are in the cycle. If realized price trends and MVRV thresholds continue on current trajectories, late Q3 to early Q4 2025 may bring final euphoric moves.
Figure 5: Will the current cycle continue to exhibit growth patterns similar to those of the previous two cycles? View Live Chart
Conclusion
The MVRV ratio and its derivatives remain essential tools for analyzing Bitcoin market behavior, providing clear markers for both accumulation and distribution. Whether observing short-term holders hovering near local top thresholds, long-term holders nearing historically significant resistance zones, or adaptive metrics like the 2-Year Rolling MVRV Z-Score signaling plenty of runway left, these data points should be used in confluence.
No single metric should be relied upon to predict tops or bottoms in isolation, but taken together, they offer a powerful lens through which to interpret the macro trend. As the market matures and volatility declines, adaptive metrics will become even more crucial in staying ahead of the curve.
For more deep-dive research, technical indicators, real-time market alerts, and access to a growing community of analysts, visit BitcoinMagazinePro.com.
Disclaimer: This article is for informational purposes only and should not be considered financial advice. Always do your own research before making any investment decisions.
This post Mapping Bitcoin’s Bull Cycle Potential first appeared on Bitcoin Magazine and is written by Matt Crosby.
-
@ 2b998b04:86727e47
2025-06-08 18:35:46This isn’t a comfortable post to write. I first composed it on Thursday night, May 29, 2025, just after the Bitcoin2025 conference — but I needed a few days to sit with it before posting.
Because freedom, if it means anything, has to include tension — not just agreement.
Four names kept surfacing in conversations on Nostr and at the Bitcoin2025 conference: President Donald Trump, Chelsea Manning, Edward Snowden (who gave the keynote at Bitcoin2024), and Ross Ulbricht.
I believe in truth. I believe in moral boundaries.
And I believe people are made in the image of God — with dignity that can’t be erased by their choices.
So let me be honest: I disagree with the transgender lifestyle on a moral and theological level.
But I believe Chelsea Manning deserved to be freed after exposing military wrongdoing.
I’m conflicted about Edward Snowden.
I don’t see him as a hero — but I don’t believe he’s a traitor either.
The truth, as is so often the case, is far more complicated.
Snowden revealed the scale of warrantless surveillance against Americans. He helped expose a shadow system of data collection and control. That matters.
But in doing so, he may also have endangered lives — disclosing classified intelligence in a way that potentially compromised undercover agents and global operations.
He’s also been largely silent during Russia’s invasion of Ukraine, and that raises hard questions.
What truths go unspoken when your safety depends on a state with its own authoritarian tendencies?
Still — I’m grateful for what he did.
I’ve never met him, but I think we could’ve been friends in another world.
I can like someone very much and still disagree with them about what they did.
That’s not weakness. That’s human.
And Ross Ulbricht?
I don’t think he’s entirely without fault.
But I do believe his original sentence — two life sentences without parole — was a gross miscarriage of justice.
His recent pardon by President Trump corrected something our courts never did.
I admire Ross. And like with Snowden, I can hold that admiration even while acknowledging complexity.
I say this as someone who voted for Trump and agrees with many of his stances.
I believe in strong, secure borders.
But I also believe we need a more compassionate and streamlined process for immigration and asylum.
Security and mercy are not opposites — we can pursue both.
But I’ll also say this:
I’m troubled by some of the recent moves Trump has made.
The promotion of meme coins by Trump feels flippant and off-base when so many Americans are struggling to understand real monetary sovereignty.
Even more disturbing are reports that his administration contracted with companies like Palantir to build a vast data infrastructure — the kind that could be used to track, profile, and suppress U.S. citizens.
That’s a betrayal of the very freedom we claim to defend.
And it reveals a deeper conflict I can’t ignore:
How can we champion liberty with one hand while constructing surveillance tools with the other?
This isn’t about party.
It’s about principle.
And if I’m honest, the one thing that’s hardest for me to tolerate — in myself or in others — is hypocrisy.
Not disagreement. Not even failure.
But posturing. Pretending. Saying one thing and doing another.
That’s what corrodes trust — in politics, in faith, in freedom itself.
Because if your definition of freedom only includes people who think, live, or vote like you —
it’s not freedom. It’s favoritism.
Bitcoin reminds me of a better standard.
It doesn’t care about your politics, background, beliefs, or identity.
It’s borderless. Neutral. Permissionless.
It just works — for everyone.
Bitcoin gives us a glimpse of a freer world — not perfect, but principled.
A world where disagreement isn’t a threat, and dignity isn’t earned.
That’s the kind of future worth building — not with slogans, but with truth, grace, and work that lasts.
Zap me if this resonates.
Push back if it doesn’t — that’s freedom too.
---
### ✍️ Acknowledgment
This piece was shaped with help from Dr. C (ChatGPT) to organize and clarify ideas, but the heart of it — the desire to seek truth over comfort, and to honor people over posture — comes from a deeper place.
Any wisdom here I credit to the Holy Spirit, who leads us into all truth (John 16:13) and continues to stir the courage to speak it — even when it's uncomfortable.
---
### 📘 Footnote
Reporting confirms that the Trump administration contracted Palantir Technologies to develop large-scale federal data platforms consolidating personal information from the IRS, Social Security Administration, immigration systems, and more. Palantir also secured a $30 million contract to build “ImmigrationOS,” a surveillance tool for ICE. These systems raise serious concerns among civil liberties advocates.
- [Economic Times](https://tinyurl.com/22bdv72d)
- [Immigration Policy Tracker](https://tinyurl.com/2686bgvy)
-
@ e771af0b:8e8ed66f
2024-09-05 22:14:04I have searched the web for "Find bitcoin block number from historical date" maybe 100 times in my life.
Never again.
You'll need a bitcoin node for this to work. The script is fast.
Install
WoT Install
one liner ```
curl
curl -o fjb.sh https://gist.githubusercontent.com/dskvr/18252c16cf85c06c1ee6cb5ae04a3197/raw/34bad6a35d98501978c8cd0c25b1628db1191cfe/fjb.sh && chmod +x fjb.sh
wget
wget -O fjb.sh https://gist.githubusercontent.com/dskvr/18252c16cf85c06c1ee6cb5ae04a3197/raw/34bad6a35d98501978c8cd0c25b1628db1191cfe/fjb.sh && chmod +x fjb.sh ```
Trust no one.
create file ``` vi fjb.sh
or
nano fjb.sh ```
review, copy and past into file ``` TIMESTAMP=$1 LOWER=0 UPPER=$(bitcoin-cli getblockcount)
while (( LOWER <= UPPER )); do MID=$(( (LOWER + UPPER) / 2 )) BLOCKHASH=$(bitcoin-cli getblockhash $MID) BLOCKTIME=$(bitcoin-cli getblockheader $BLOCKHASH | jq .time)
if (( BLOCKTIME < TIMESTAMP )); then LOWER=$(( MID + 1 )) elif (( BLOCKTIME > TIMESTAMP )); then UPPER=$(( MID - 1 )) else echo "$BLOCKTIME" exit 0 fi
done
echo "$UPPER" ```
give executable permissions
chmod +x ./fjb.sh
Usage
./fjb.sh <timestampSeconds>
It returns block number onlyExample
$: ./fjb.sh 1668779310 763719
-
@ 7f6db517:a4931eda
2025-06-07 09:02:21Bank run on every crypto bank then bank run on every "real" bank.
— ODELL (@ODELL) December 14, 2022
Good morning.
It looks like PacWest will fail today. It will be both the fifth largest bank failure in US history and the sixth major bank to fail this year. It will likely get purchased by one of the big four banks in a government orchestrated sale.
March 8th - Silvergate Bank
March 10th - Silicon Valley Bank
March 12th - Signature Bank
March 19th - Credit Suisse
May 1st - First Republic Bank
May 4th - PacWest Bank?PacWest is the first of many small regional banks that will go under this year. Most will get bought by the big four in gov orchestrated sales. This has been the playbook since 2008. Follow the incentives. Massive consolidation across the banking industry. PacWest gonna be a drop in the bucket compared to what comes next.
First, a hastened government led bank consolidation, then a public/private partnership with the remaining large banks to launch a surveilled and controlled digital currency network. We will be told it is more convenient. We will be told it is safer. We will be told it will prevent future bank runs. All of that is marketing bullshit. The goal is greater control of money. The ability to choose how we spend it and how we save it. If you control the money - you control the people that use it.
If you found this post helpful support my work with bitcoin.
-
@ 2cde0e02:180a96b9
2025-06-08 18:14:13Frida Kahlo: outline and inked.
pen & ink; monochromized
"Kahlo's work as an artist remained relatively unknown until the late 1970s, when her work was rediscovered by art historians and political activists. By the early 1990s, not only had she become a recognized figure in art history, but she was also regarded as an icon for Chicanos, the feminism movement, and the LGBTQ+ community. Kahlo's work has been celebrated internationally as emblematic of Mexican national and Indigenous traditions and by feminists for what is seen as its uncompromising depiction of the female experience and form."
Source: Wikipedia
https://stacker.news/items/1000840
-
@ e771af0b:8e8ed66f
2024-04-19 22:29:43Have you ever seen a relay and out of curiosity visited the https canonical of a relay by swapping out the
wss
withhttps
? I sure have, and I believe others have too. When I ranhttps://nostr.sandwich.farm
in late 2022/2023, I had thousands of hits to my relay's https canonical. Since then, I've dreamed of improving the look and feel of these generic default landing pages.With the release of myrelay.page v0.2, relays can now host their own customizable micro-client at their https canonical.
Transform your relay's landing page from this:
or this:
to something like this:
I say "something like this" because each page is customizable at runtime via the page itself.
In a nutshell
myrelay.page is a self-configuring, Client-Side Rendered (CSR) micro-client specifically built to be hosted at relay canonicals, customizable at runtime via NIP-78. Check out a live example.
Features:
- Dark or light theme
- Join relay
- Relay operator profile and feed
- Zap relay operator
- See people you follow who are on the relay
- Customizable by the relay operator
- Enable/disable blocks
- Sort blocks
- Add HTML blocks
- Add image blocks
- Add markdown blocks
- Add feed blocks, with two layouts (grid/list) and customizable filters.
You can find a full list of features complete and todo here
Why I created myrelay.page
For several different reasons.
Firstly, the default, bland relay pages always seemed like a missed opportunity. I jotted down an idea to build a relay micro-client in early January 2023, but never had the time to start it.
Next, I've been ramping up the refactor of nostr.watch and first need to catch up on client-side technologies and validate a few of my ideas. To do this, I have been conducting short research & development projects to prepare and validate ideas before integrating them into an app I intend to support long-term. One of those R&D projects is myrelay.page.
Additionally, I wanted to explore NIP-78 a bit more, a NIP that came into fruition after a conversation I had with @fiatjaf on February 23rd, 2023. It stemmed from the desire to store application-specific data for app customization. I have seen clients use NIP-78, but from what I've seen, their implementations are limited and do not demonstrate the full potential of NIP-78. There's more on NIP-78 towards the end of this article
The convergence of these needs and ideas, in addition to having an itch I needed to scratch, resulted in the creation of myrelay.page.
*Could be wrong, please let me know in the comments if you have examples of nostr clients that utilize NIP-78 for propagating customizations to other visitors.
Editor Flow
Now I'm going to give you a brief example of the Editor Flow on myrelay.page. There's a lot that isn't covered here, but I want to be as brief as possible.
Note: myrelay.page is alpha, there are bugs, quality of life issues and things are far from perfect.
Login
Presently, myrelay.page only supports NIP-07 authentication, but other authentication methods will be implemented at a later date.
In order to customize your page, you need to have a valid NIP-11 document that provides a valid hex
pubkey
value that is the same as the key you use to login.Click "Edit"
Add a block
For brevity, I'm going to add a markdown block
Configure the block
Add a title to the block and a sentence with markdown syntax.
Publish the configuration
Click publish and confirm the event, once it's been published to relays the page will refresh.
Note: Again it's alpha, so the page doesn't refresh after a few seconds, the publish probably failed. Press publish until it refreshes. Error handling here will improve with time.
Confirm state persistence
After reload, you should see your block persisted. Anyone who visits your page will see your newly configured page. Big caveat: Given the blessing of relays who store your configuration note, if your configuration cannot be found or you cannot connect to your relays, visitors will only see your relay's NIP-11.
Interested?
myrelay.page is alpha and only has two releases, so if you want to be an early adopter, you'll need the skillset and patience of an early adopter. That said, as long as you have some basic development and sysadmin skills as well as understand your reverse-proxy of choice, it's a quick, easy and low-risk side project that can be completed in about 20 minutes.
1. Build
yarn build
ornpm run build
orpnpm run build
(note: I had issues with pnpm and cannot guarantee they are resolved!)2. Deploy
Move the contents of
build
folder to your relay server (or another server that you can reverse-proxy to from your relay)3. Update your reverse-proxy configuration
You'll need to split your relay traffic from the http traffic, this ranges from easy to difficult, depending on your server of choice. - caddy: By far the easiest, see an example configuration for strfry here (easily adapted by those with experience to other relay software) - nginx: A little more stubborn, here's the most recent nginx config I got to work. You'll need to serve the static site from an internal port (
8080
in the aforementioned nginx conf) - haproxy: Should be easier than nginx or maybe even caddy, haven't tried yet. - no reverse-proxy: shrugsIf any of that's over your head, I'll be providing detailed guides for various deployment shapes within the next few weeks.
Exploring NIP-78
One of the special things about NIP-78 is that it is application specific, meaning, you don't need to conform to any existing NIP to make magic happen. Granted there are limits to this, as interoperability reigns supreme on nostr. However, there are many use cases where interoperability is not particularly desirable nor beneficial. It doesn't change the care needed to craft events, but it does enable a bunch of unique opportunities.
- A nostr client that is fully configurable and customized by the user.
- A nostr powered CMS that can be edited entirely on the client-side.
- Any use case where an application has special functionality or complex data structures that present no benefit in the context of interoperability (since they are "Application Specific").
Final thoughts
I was surprised at how quickly I was able to get myrelay.page customizable and loading within an acceptable timeframe;
NIP-11
, the operator'sNIP-65
and the myrelay.pageNIP-78
events all need to be fetched before the page is hydrated! While there is much to do around optimization, progressive page-loading, and general functionality, I'm very happy with the outcome of this short side project.I'll be shifting my focus over to another micro-app to validate a few concepts, and then on to the next nostr.watch. Rebuilding nostr.watch has been a high-priority item since shortly after Jack lit a flame under nostr in late 2022, but due to personal circumstances in 2023, I was unable to tackle it. Thanks to @opensats I am able to realize my ideas and explore ideas that have been keeping me up at night for a year or more.
Also, if you're a relay developer and are curious about making it easier for developers to deploy myrelay.page, get in touch.
Next article will likely be about the micro-app I briefly mentioned and nostr.watch. Until then, be well.
-
@ 044da344:073a8a0e
2025-06-07 07:49:53Es ist merkwürdig, wie sich die Dinge manchmal fügen. Himmelfahrt bin ich mit den beiden größeren Enkeln, 2 und 4, in einen Zirkus gegangen. Wir mussten ein wenig suchen, okay, haben das Zelt aber irgendwann entdeckt am Ufer des Regen. Ich könnte schreiben: klein, aber fein, so richtig trifft es das jedoch nicht. Klein schon. Ich will hier auch nicht schimpfen, weil sich die Zirkusfamilie alle Mühe gegeben hat, einen preisgekrönten Artisten dabeihatte (Silberner Clown in Monte Carlo) und sogar reichlich Tiere in die Manege brachte. Vier Araberpferde, zwei Dromedare, einen Esel und Ziegen.
Dann aber kamen die Katzen. Richtig gelesen. Katzen dort, wo es Tiger, Löwen, Bären gegeben hat, als ich selbst noch ein Kind war. Ich meine gar nicht die großen Zelte in der DDR, Berolina, Busch oder Aeros. Diese Riesen verirrten sich nicht in einen Badeort auf Rügen. Die Wiese gleich hinter unserem Haus gehörte ab Anfang der 1980er Rüdiger Probst, alle paar Jahre wieder. Ein junger Mann, der gar nicht so viel älter war als ich, keine Angst vor großen Tieren hatte und mit einem Salto von Pferd zu Pferd sprang. In einem kleinen Zirkus wie gesagt, für ein paar Groschen und meist vor vollem Haus. Mit den Enkeln hatte ich jetzt allen Platz der Welt und hinterher ein leeres Portemonnaie. Sieben Euro allein für Popcorn (es gab nur eine Tütengröße) und fünf (freiwillig) für ein paar Möhrenstücke, damit die Kinder in der Pause was zum Füttern in der Hand hatten.
Am Abend dann das neue Buch von Matthias Krauß. „Die falschen Fragen gestellt“. Ich habe mich ein wenig gewundert, als das Paket im Kasten lag, weil der Autor vor gar nicht allzu langer Zeit einen „einseitigen Waffenstillstand“ ausgerufen hatte und Schluss machen wollte mit seinem Kampf gegen die „Aufarbeitungsindustrie“ und mit der Verteidigung der DDR. Ich zitiere einfach aus meiner Rezension von 2019:
Matthias Krauß, 1960 in Hennigsdorf geboren, weiß natürlich, was da alles im Argen lag. Er hat selbst an der Sektion Journalistik studiert und in den späten 1980ern noch ein wenig für die Parteipresse gearbeitet. „Apologetisch“, sagt er. Vor allem Innen- und Wirtschaftspolitik. Sein Aber: erstens die Kultur. Begegnungen vor allem mit dem, was in Osteuropa so an Filmen, Serien, Kunst produziert wurde. Punkt zwei: „der einfache Mensch“. „Ungleich häufiger“ im Bild als heute. Und drittens „gab es eine prinzipielle und grundsätzliche Kritik“ am Westen und am Kapitalismus.
Der Zirkus am Ufer des Regen. Ein totes Pferd soll man nicht reiten. Deshalb tauche ich ein in ein Buch, das etwas schafft, was selbst ich nicht für möglich gehalten habe. Matthias Krauß singt ein Loblied auf den DDR-Journalismus, ohne dass es peinlich wird. Er bleibt dabei ganz bei sich – bei der Mappe mit Zeitungsausschnitten, die er als Schüler angelegt hat, bei den Aktbildern im Magazin, das sein Vater abonniert hatte und das dem Sohn auch jenseits der Erotik ganze Welten öffnete, bei einem Porträt, das ihm die Lokalzeitung 1977 widmete.
Das Schöne ist: Matthias Krauß hat das alles aufgehoben und darf jetzt als reifer Mann zurückschauen – als Journalist, der später auch die andere Seite erlebt hat, folglich vergleichen kann und vor allem niemandem mehr nach dem Mund reden muss. Die „Qualität der Bilder“, okay. Eher „Kartoffeldruck“ als Zeitung. Die immer gleichen alten Männer, klar. Die Grenzen, die jedes Parteiorgan hat und die auch ein junger Mann wie Krauß schon zu spüren bekam. Aber eben auch Texte, die nah dran waren am Leben (vor allem an der Arbeit) und ihre Leser ernst nahmen. Matthias Krauß ist nach dem Studium 1986 Redakteur der Jugendseite des Potsdamer SED-Blatts geworden und ruft den Journalismusforschern heute zu: Vergleicht doch einfach die Bravo mit dem Neuen Leben, einer Zeitschrift, die damals sein Leitstern war und immer ausverkauft. These von Matthias Krauß: Das Neue Leben
war vielseitiger, anspruchsvoller und in jeder Hinsicht höherwertiger als die Bravo-Post, mit dem endlos einfältigen Star-Rummel, den auf Kauf und Konsum orientierten Modetipps, dem Klatsch und Abklatsch und den klischeehaften Rollenbildern – Ausdruck des insgesamt unpolitischen Grundanspruchs. Nun gut, aus exakt diesem Grund wird dieser Vergleich wohl niemals stattfinden. (S. 103)
Matthias Krauß hat ein kaum zu schlagendes Argument auf seiner Seite: Er, der SED-Propagandist, hatte nach 1990 schnell wieder das Vertrauen des Publikums, das er „bei Lichte besehen“ vielleicht gar nicht verdiente, aber allein wegen seiner Herkunft bekam (S. 116). Und: Er kann sogar jemanden zitieren, der die Ernte-Berichterstattung vermisst, Hassobjekt von Lesern wie von Journalisten – einen Landwirt aus dem Westen, der dort sehen konnte, wie weit die Kollegen waren, was sie wie machten und wie sie auf das Wetter reagierten (S. 166).
Ich gebe zu: Ich habe eine Schwäche für autobiografische Texte. Solche Bücher erlauben mir, all das mit Leben zu füllen, was in den Akten bald zu Staub zerfällt. Ich habe ein Fußballregal (gleich zweimal Lothar Matthäus!), eine DDR-Abteilung, Erinnerungen von Wissenschaftlern und natürlich Journalisten. Da längst nicht jeder schreibt, der etwas zu sagen hat, helfe ich immer wieder nach und sammle als Interviewer Lebensgeschichten ein. Matthias Krauß dürfte einer der ersten ostdeutschen Medienmenschen aus der Geburtskohorte um 1960 sein, der sich öffentlich äußert und dabei nicht einfach das nachbetet, was ohnehin schon überall steht.
Das gilt auch jenseits des Themas Journalismus. Der Wehrdienst, für mich bis heute ein Albtraum, wird von Matthias Krauß als „Entscheidung für eine Art persönlicher Freiheit“ interpretiert (S. 43). Mit 18 unabhängig sein von den Eltern und dann auch ohne Geldsorgen studieren können. Leipzig war für ihn in den 1980ern nicht nur Uni-Standort, sondern auch „Messestadt“ und damit „Weltstadt“ (S. 50). Und der Aufregung um jede DDR-Exmatrikulation, die er keineswegs schönredet, werden „die Millionen Opfer der Demokratisierung“ gegenübergestellt und das laute gesamtdeutsche Schweigen nicht nur in diesem Punkt (S. 58).
Was das alles mit dem Zirkus zu tun hat? Matthias Krauß hat in der DDR das Motto für sein Leben als Journalist gefunden – bei der Arbeit mit einem Parteisoldaten, der einfach nicht rauswollte aus dem Korsett, das die Genossen über sein Leben geworfen hatten.
Ja, sagte ich mir, stelle immer die falschen Fragen. (S. 153)
In Sachen Zirkus liegen alle Antworten auf dem Tisch. Meine Trauer habe ich schon vor mehr als zehn Jahren verarbeitet. Mal schauen, was die Enkel eines Tages dazu sagen.
Matthias Krauß: Die falschen Fragen gestellt. Journalist in zwei deutschen Staaten. Berlin: Das Neue Berlin 2025, 189 Seiten, 18 Euro.
-
@ dfa02707:41ca50e3
2025-06-08 16:02:23Contribute to keep No Bullshit Bitcoin news going.
- RoboSats v0.7.7-alpha is now available!
NOTE: "This version of clients is not compatible with older versions of coordinators. Coordinators must upgrade first, make sure you don't upgrade your client while this is marked as pre-release."
- This version brings a new and improved coordinators view with reviews signed both by the robot and the coordinator, adds market price sources in coordinator profiles, shows a correct warning for canceling non-taken orders after a payment attempt, adds Uzbek sum currency, and includes package library updates for coordinators.
Source: RoboSats.
- siggy47 is writing daily RoboSats activity reviews on stacker.news. Check them out here.
- Stay up-to-date with RoboSats on Nostr.
What's new
- New coordinators view (see the picture above).
- Available coordinator reviews signed by both the robot and the coordinator.
- Coordinators now display market price sources in their profiles.
Source: RoboSats.
- Fix for wrong message on cancel button when taking an order. Users are now warned if they try to cancel a non taken order after a payment attempt.
- Uzbek sum currency now available.
- For coordinators: library updates.
- Add docker frontend (#1861).
- Add order review token (#1869).
- Add UZS migration (#1875).
- Fixed tests review (#1878).
- Nostr pubkey for Robot (#1887).
New contributors
Full Changelog: v0.7.6-alpha...v0.7.7-alpha
-
@ 9ca447d2:fbf5a36d
2025-06-08 16:02:03Wall Street is warming up to Bitcoin and getting closer and closer to it.
Cantor Fitzgerald, one of the oldest and most respected investment banks on Wall Street, has launched a $2 billion bitcoin-backed lending program.
They’ve reportedly already done their first deals, lending to two big digital asset companies: FalconX and Maple Finance.
This is a big step in connecting traditional finance to the fast-moving world of Bitcoin.
Cantor’s new service allows big investors, hedge funds and asset managers, to borrow money using bitcoin as collateral.
This is a game changer for institutions that hold bitcoin, as they can now access liquidity without having to sell their assets.
“Institutions holding bitcoin are looking to broaden their access to diverse funding sources,” said Christian Wall, co-CEO and global head of fixed income at Cantor Fitzgerald.
“And we are excited to support their liquidity needs to help them drive long term growth and success.”
The loans are not speculative or unsecured.
They are structured like traditional finance deals, backed by the borrower’s bitcoin. This reduces the risk for Cantor while giving bitcoin-holding companies new ways to grow and operate.
The first recipients of Cantor’s lending program are FalconX, a digital asset brokerage, and Maple Finance, a blockchain-based lending platform.
FalconX confirmed they secured a credit facility of over $100 million. Maple Finance also received the first tranche of their loan from Cantor.
This comes at a time when the bitcoin lending space is recovering after a tough period. Several big firms went under in 2022 and investor confidence was shaken.
Now with traditional finance on board, bitcoin-backed lending has returned. According to Galaxy Research the total size of the digital asset lending market grew to $36.5 billion in Q4 2024.
Cantor’s move into bitcoin-backed lending isn’t new. They announced their plans in July 2024 and have been building their presence in the Bitcoin space since then.
Earlier this year, they partnered with Tether, SoftBank and Bitfinex to launch Twenty One Capital, a $3.6 billion fund to buy over 42,000 bitcoin.
In May 2025 Cantor Equity Partners merged with Twenty One Capital and bought nearly $459 million worth of bitcoin.
They also own around $1.9 billion in shares of Strategy, a company that holds a lot of bitcoin. Clearly Cantor believes in bitcoin as a long-term asset.
Cantor is also a big player in the stablecoin space.
They manage U.S. Treasury reserves for Tether, the company behind the $142 billion USDT stablecoin. This adds another layer of trust and credibility to Cantor’s digital asset involvement.
To secure the bitcoin used as collateral, Cantor has partnered with digital asset custodians Anchorage Digital and Copper.co.
These companies are known for their robust security and institutional-grade infrastructure. Cantor hasn’t disclosed loan terms or interest rates but confirmed the lending will follow current regulations.
This also shows how traditional financial players are embracing DeFi.
Maple Finance for example allows undercollateralized lending using blockchain. By backing companies like Maple, Cantor is innovating while still having control and compliance.
For years, bitcoin-backed loans were only available through digital-asset-native companies like Genesis, BlockFi, and Ledn.
These loans were mostly for smaller clients and retail investors. But with Cantor’s entry, the scale and professionalism of bitcoin lending are expanding.
-
@ da8b7de1:c0164aee
2025-06-07 04:42:05Nukleáris technológiai és projektfejlesztési hírek
Több jelentős nemzetközi fejlemény történt a nukleáris energia területén. A Westinghouse Electric Company megkapta az amerikai Energiaügyi Minisztériumtól a kulcsfontosságú biztonsági jóváhagyást az eVinci mikroreaktorához, ami fontos lépés ennek az innovatív nukleáris technológiának a bevezetése felé. A vállalat Idaho államban tervezi egy tesztreaktor létesítését, ami jól mutatja, hogy a mikroreaktorok piaca egyre nagyobb lendületet kap.
Eközben a nukleáris kapacitás gyors bővítéséhez szükséges ellátási lánc felkészültsége volt a fő témája a World Nuclear Association első konferenciájának. Jelentős projektfrissítések között szerepel a kritikus turbinakomponensek beszerelése a kínai Haiyang atomerőműben, az indiai Mahi Banswara Rajasthan Atomerőmű négy blokkjára vonatkozó szabályozói engedély, valamint egy új olaszországi partnerség, a Nuclitalia, amely fejlett nukleáris technológiákra fókuszál. Belgiumban a Nukleáris Kutatóközpont hivatalos konzultációkat indított egy ólom-hűtésű kis moduláris reaktor (SMR) ügyében, Brazília pedig bejelentette, hogy Oroszországgal közösen fejleszt SMR-projektet.
Szabályozási és biztonsági aktualitások
A Nemzetközi Atomenergia-ügynökség (IAEA) meghosszabbította a tanulmányok benyújtási határidejét a közelgő, nukleáris létesítmények ellenállóképességéről szóló konferenciájára, hangsúlyozva a nukleáris létesítmények alkalmazkodásának fontosságát a klímaváltozás jelentette növekvő kockázatokhoz. A konferenciát 2025 októberében rendezik Bécsben, és fő témája a nukleáris létesítmények biztonságának és ellenállóképességének növelése lesz, különös tekintettel a külső eseményekre, mint az árvizek és földrengések.
Kanadában a Nukleáris Biztonsági Bizottság engedélyezte az Ontario Power Generation számára, hogy megkezdje egy BWRX-300 típusú reaktor építését a Darlington New Nuclear Project helyszínén, ami a nukleáris építkezések folyamatos szabályozói támogatását mutatja. Az Egyesült Államokban a Nukleáris Szabályozási Bizottság további 20 évvel meghosszabbította a Duke Energy Oconee atomerőművi blokkjainak üzemeltetési engedélyét, valamint támogatást nyújtott a michigani Palisades atomerőmű újraindításához.
Iparági és gazdasági trendek
Az iparági vezetők optimistán nyilatkoztak a nukleáris energia jelenlegi helyzetéről, kiemelve az Egyesült Államokban zajló aktív projekteket (például a TerraPower Wyomingban és az X-energy együttműködése a Dow vállalattal), valamint a fejlett nukleáris üzemanyaggyártásba irányuló magánbefektetések növekedését. Felmerült az is, hogy a Világbank nukleáris projekteket is finanszírozhatna, ami tovább ösztönözhetné a globális beruházásokat, és megerősítené a nukleáris energia szerepét az energetikai átmenetben.
Belgiumban a kormány és az Engie közüzemi vállalat végleges megállapodást kötött a Tihange 3 és Doel 4 reaktorok üzemidejének tíz évvel történő meghosszabbításáról, amely az energiabiztonságot és a radioaktív hulladék kezelését is szolgálja. Németországban a nukleáris technológiai szövetség hangsúlyozta, hogy akár hat, nemrégiben leállított reaktor újraindítása technikailag megvalósítható, és a nukleáris energia biztonságos, gazdaságos, valamint klímabarát alternatívát jelent.
Nemzetközi együttműködés és kutatás
Kanadában a Prodigy Clean Energy és a Serco közel jár a szállítható atomerőművek tesztprogramjának befejezéséhez, amelynek középpontjában a biztonság és az extrém helyzetekben való ellenállóképesség áll. Az EnergySolutions és a WEC Energy Group új nukleáris kapacitás létesítését vizsgálja a wisconsini Kewaunee helyszínen, és előzetes engedélyeket kívánnak szerezni a jövőbeni telepítéshez.
Az IAEA ismételten hangsúlyozta, hogy kész támogatni a Zaporizzsjai Atomerőműre vonatkozó megállapodásokat, amely továbbra is orosz katonai ellenőrzés alatt áll, kiemelve a térségben fennálló geopolitikai és biztonsági kihívásokat.
Források:
world-nuclear-news.org
nucnet.org
iaea.org
ans.org -
@ e771af0b:8e8ed66f
2023-11-28 03:49:11The last 6 months has been full full of unexpected surprises, of the unpleasant variety. So it was welcomed news that
nostrwatch
was awarded a grant by OpenSats recently which has allowed me to revisit this project and build out my original vision, the one I had before nostr went vertical.The last month has been a bit of a joyride, in that I have met little friction meeting goals. For example I was able to rewrite
nostrwatch-js
in an evening, tests another evening and did most of the Typescript conversion in 30 minutes (thanks AI!)Here's a quick summary of the last month, I'm probably missing a handful of details, but these are the important bits.
- Went through all the new NIPs, prototyped and experimented
- Nearly completed a full rewrite of
nostrwatch-js
, nownocap
. Presently porting to Typescript. Still alpha, don’t use it. - Released
nostrawl
, a wrapper fornostr-fetch
that has Queue adapters for persistent fetching. Nothing special, but needed to factor out the functionality from the legacy trawler and the requirements were general enough to make it a package. - Starting porting the nostr.watch trawler, cache layer and rest API, but much work is still needed there. Aiming to have the current infrastructure updated with new daemons by end of year.
- In concert with the cache layer testing, I ran some experiments by patching in a rough trend engine prototype from earlier this year and a novel outbox solution, both with promising results.
- Wrote a few small CLI tools to assist with developments, got acquainted with
ink
, and reacquainted myself with wonderful world of ES Module conflicts.
The rest of this year will be mostly backend work, tests and data engineering. Early next year I will begin iterative development on a new GUI and a string of CLI tools.
Luckily, nostr.watch and it's underlying infrastructure, as abysmal as it is, hasn't completely sank. Traffic is much lower than the ATH but still hovering between 2-3k unique visitors a month. I can't express in words how happy I will be when I can put the legacy nostr.watch to rest.
Next update will include a bit more of the why and how, and where I am trying to get to with this project.
Until next time.
-
@ cae03c48:2a7d6671
2025-06-06 22:00:31Bitcoin Magazine
President Trump’s Truth Social Files S-1 Form For Bitcoin ETFToday, Trump Media and Technology Group Corp. (Nasdaq, NYSE Texas: DJT) filed with the US Securities and Exchange Commission (SEC) a Form S-1 for their upcoming Truth Social Bitcoin ETF.
The ETF, which will hold bitcoin directly, is designed to track the bitcoin’s price performance.
“Truth Social Bitcoin ETF, B.T. is a Nevada business trust that issues beneficial interests in its net assets,” stated the Form S-1. “The assets of the Trust consist primarily of bitcoin held by a custodian on behalf of the Trust. The Trust seeks to reflect generally the performance of the price of bitcoin.”
The ETF is sponsored by Yorkville America Digital, LLC and will trade under NYSE Arca. The Trust’s assets primarily consist of bitcoin held by Foris DAX Trust Company, LLC, the designated bitcoin custodian. Crypto.com will act as the ETF’s prime execution agent and liquidity provider.
“Shares will be offered to the public from time to time at varying prices that will reflect the price of bitcoin and the trading price of the Shares on New York Stock Exchange Arca, Inc. at the time of the offer,” mentioned the Form S-1.
While the ETF offers investors a regulated avenue for bitcoin exposure, the Trust warned of several risks related to digital assets:
- Loss, theft, or compromise of private keys could result in permanent loss of bitcoin.
- Bitcoin’s reliance on blockchain and Internet technologies makes it vulnerable to disruptions and cyber threats.
- Environmental and regulatory pressures tied to high electricity use in bitcoin mining could impact market stability.
- Potential forks or protocol failures in the Bitcoin Network may lead to volatility and uncertainty in asset value.
Last week, during an interview at the 2025 Bitcoin Conference, Donald Trump Jr. announced that TMTG and Truth Social were forming a Bitcoin treasury with $2.5 billion. “We’re seriously on crypto—we’re seriously on Bitcoin,” said Trump Jr. “We’re in three major deals. I believe we’re at the beginning of what will be the future of finance. And the opportunity is massive.”
The day after that interview, Eric Trump and Donald Trump Jr., joined by American Bitcoin Executive Chairman and Board Member Mike Ho, CEO Matt Prusak, and Altcoin Daily founder Aaron Arnold, discussed the future of Bitcoin.
“The whole system is broken and now all of the sudden you have crypto which solves all the problems,” commented Eric Trump. “It makes everything cheaper, it makes everything faster, it makes it safer, it makes it more transparent. It makes the whole system more functional.“
“Everybody wants Bitcoin. Everybody is buying Bitcoin,” Eric added.
This post President Trump’s Truth Social Files S-1 Form For Bitcoin ETF first appeared on Bitcoin Magazine and is written by Oscar Zarraga Perez.
-
@ 97c70a44:ad98e322
2025-06-06 20:48:33Vibe coding is taking the nostr developer community by storm. While it's all very exciting and interesting, I think it's important to pump the brakes a little - not in order to stop the vehicle, but to try to keep us from flying off the road as we approach this curve.
In this note Pablo is subtweeting something I said to him recently (although I'm sure he's heard it from other quarters as well):
nostr:nevent1qvzqqqqqqypzp75cf0tahv5z7plpdeaws7ex52nmnwgtwfr2g3m37r844evqrr6jqy2hwumn8ghj7un9d3shjtnyv9kh2uewd9hj7qghwaehxw309aex2mrp0yh8qunfd4skctnwv46z7qg6waehxw309ac8junpd45kgtnxd9shg6npvchxxmmd9uqzq0z48d4ttzzkupswnkyt5a2xfkhxl3hyavnxjujwn5k2k529aearwtecp4
There is a naive, curmudgeonly case for simply "not doing AI". I think the intuition is a good one, but the subject is obviously more complicated - not doing it, either on an individual or a collective level, is just not an option. I recently read Tools for Conviviality by Ivan Illich, which I think can help us here. For Illich, the best kind of tool is one which serves "politically interrelated individuals rather than managers".
This is obviously a core value for bitcoiners. And I think the talks given at the Oslo Freedom Forum this year present a compelling case for adoption of LLMs for the purposes of 1. using them for good, and 2. developing them further so that they don't get captured by corporations and governments. Illich calls both the telephone and print "almost ideally convivial". I would add the internet, cryptography, and LLMs to this list, because each one allows individuals to work cooperatively within communities to embody their values in their work.
But this is only half the story. Illich also points out how "the manipulative nature of institutions... have put these ideally convivial tools at the service of more [managerial dominance]."
Preventing the subversion and capture of our tools is not just a matter of who uses what, and for which ends. It also requires an awareness of the environment that the use of the tool (whether for virtuous or vicious ends) creates, which in turn forms the abilities, values, and desires of those who inhabit the environment.
The natural tendency of LLMs is to foster ignorance, dependence, and detachment from reality. This is not the fault of the tool itself, but that of humans' tendency to trade liberty for convenience. Nevertheless, the inherent values of a given tool naturally gives rise to an environment through use: the tool changes the world that the tool user lives in. This in turn indoctrinates the user into the internal logic of the tool, shaping their thinking, blinding them to the tool's influence, and neutering their ability to work in ways not endorsed by the structure of the tool-defined environment.
The result of this is that people are formed by their tools, becoming their slaves. We often talk about LLM misalignment, but the same is true of humans. Unreflective use of a tool creates people who are misaligned with their own interests. This is what I mean when I say that AI use is anti-human. I mean it in the same way that all unreflective tool use is anti-human. See Wendell Berry for an evaluation of industrial agriculture along the same lines.
What I'm not claiming is that a minority of high agency individuals can't use the technology for virtuous ends. In fact, I think that is an essential part of the solution. Tool use can be good. But tools that bring their users into dependence on complex industry and catechize their users into a particular system should be approached with extra caution. The plow was a convivial tool, and so were early tractors. Self-driving John Deere monstrosities are a straightforward extension of the earlier form of the technology, but are self-evidently an instrument of debt slavery, chemical dependency, industrial centralization, and degradation of the land. This over-extension of a given tool can occur regardless of the intentions of the user. As Illich says:
There is a form of malfunction in which growth does not yet tend toward the destruction of life, yet renders a tool antagonistic to its specific aims. Tools, in other words, have an optimal, a tolerable, and a negative range.
The initial form of a tool is almost always beneficial, because tools are made by humans for human ends. But as the scale of the tool grows, its logic gets more widely and forcibly applied. The solution to the anti-human tendencies of any technology is an understanding of scale. To prevent the overrun of the internal logic of a given tool and its creation of an environment hostile to human flourishing, we need to impose limits on scale.
Tools that require time periods or spaces or energies much beyond the order of corresponding natural scales are dysfunctional.
My problem with LLMs is:
- Not their imitation of human idioms, but their subversion of them and the resulting adoption of robotic idioms by humans
- Not the access they grant to information, but their ability to obscure accurate or relevant information
- Not their elimination of menial work, but its increase (Bullshit Jobs)
- Not their ability to take away jobs, but their ability to take away the meaning found in good work
- Not their ability to confer power to the user, but their ability to confer power to their owner which can be used to exploit the user
- Not their ability to solve problems mechanistically, but the extension of their mechanistic value system to human life
- Not their explicit promise of productivity, but the environment they implicitly create in which productivity depends on their use
- Not the conversations they are able to participate in, but the relationships they displace
All of these dysfunctions come from the over-application of the technology in evaluating and executing the fundamentally human task of living. AI work is the same kind of thing as an AI girlfriend, because work is not only for the creation of value (although that's an essential part of it), but also for the exercise of human agency in the world. In other words, tools must be tools, not masters. This is a problem of scale - when tool use is extended beyond its appropriate domain, it becomes what Illich calls a "radical monopoly" (the domination of a single paradigm over all of human life).
So the important question when dealing with any emergent technology becomes: how can we set limits such that the use of the technology is naturally confined to its appropriate scale?
Here are some considerations:
- Teach people how to use the technology well (e.g. cite sources when doing research, use context files instead of fighting the prompt, know when to ask questions rather than generate code)
- Create and use open source and self-hosted models and tools (MCP, stacks, tenex). Refuse to pay for closed or third-party hosted models and tools.
- Recognize the dependencies of the tool itself, for example GPU availability, and diversify the industrial sources to reduce fragility and dependence.
- Create models with built-in limits. The big companies have attempted this (resulting in Japanese Vikings), but the best-case effect is a top-down imposition of corporate values onto individuals. But the idea isn't inherently bad - a coding model that refuses to generate code in response to vague prompts, or which asks clarifying questions is an example. Or a home assistant that recognized childrens' voices and refuses to interact.
- Divert the productivity gains to human enrichment. Without mundane work to do, novice lawyers, coders, and accountants don't have an opportunity to hone their skills. But their learning could be subsidized by the bots in order to bring them up to a level that continues to be useful.
- Don't become a slave to the bots. Know when not to use it. Talk to real people. Write real code, poetry, novels, scripts. Do your own research. Learn by experience. Make your own stuff. Take a break from reviewing code to write some. Be independent, impossible to control. Don't underestimate the value to your soul of good work.
- Resist both monopoly and "radical monopoly". Both naturally collapse over time, but by cultivating an appreciation of the goodness of hand-crafted goods, non-synthetic entertainment, embodied relationship, and a balance between mobility and place, we can relegate new, threatening technologies to their correct role in society.
I think in all of this is implicit the idea of technological determinism, that productivity is power, and if you don't adapt you die. I reject this as an artifact of darwinism and materialism. The world is far more complex and full of grace than we think.
The idea that productivity creates wealth is, as we all know, bunk. GDP continues to go up, but ungrounded metrics don't reflect anything about the reality of human flourishing. We have to return to a qualitative understanding of life as whole, and contextualize quantitative tools and metrics within that framework.
Finally, don't believe the hype. Even if AI delivers everything it promises, conservatism in changing our ways of life will decelerate the rate of change society is subjected to and allow time for reflection and proper use of the tool. Curmudgeons are as valuable as technologists. There will be no jobspocalypse if there is sufficient political will to value human good over mere productivity. It's ok to pump the breaks.
-
@ 81022b27:2b8d0644
2025-06-08 15:18:50I’ve always gravitated to ideas and topics that are not quite mainstream:
Well, like CHIROPRACTIC.
But even in chiropractic school, I went fringe. I heard about one of the technique clubs (Toftness) that showed you how you could detect a subluxation by just rubbing your thumb over a piece of plexiglass.
We were discussing that in a group, and most of my friends were saying:
“What a load of shit!”
And that made my ears perk up.
So I started going to the club meetings.
I walk in, and there’s a guy face down on a chiropractic table while another guy was holding what looked like some sort of cyberpunk lens. He started rubbing it and worked it down the guy's spine.
He pointed out areas that were subluxated:
“Here.”
And going further down:
“Here.”
And:
“Here.”
Wow.
Then he “adjusted” by touching the spine with his index finger.
My mind was blown.
So you mean I didn’t have to be adjusted the way Harvey Fish did?
Dr. Fish was a great guy and would adjust students for, I think, $10. You’d go in, wait to see if he had any “real patients.” In between patients, he would adjust the students. He was heavy-handed and sure as hell able to move a bone.
So now I’m intrigued and curious. I studied and practiced any chance I had. I had different friends that I studied different things with.
(Except for Dyslexic Dave - nobody wanted to study with that guy. Our group did once, and we all failed a test. His dyslexia was so powerful, it overcame all of us.)
I’d study all the weird stuff with my friend Victoria, and then we would go get our network chiropractic adjustment from Dr. Michael Scimeca.
I found out that it wasn’t the Toftness lens that had the super-powers. Instead, it was because when your hand detected a change in energy over the spinal segments, there's a “galvanic response” similar to that of a polygraph lie detector test. So it made the skin on my hand “sweat,” and that made the plexiglass squeak and stick.
So it wasn’t the equipment. It was me.
After a while, I realized that I could feel a warmth on my chest right before the lens squeaked. So, I ditched the lens and started working on people where I “felt” the subluxations were located.
Seemed to work well - I always double-checked my “regular” chiropractic findings with what I felt. We studied for exams, then practiced technique on each other.
One time at a seminar, the instructor demonstrated what to do and asked for volunteers - one to be the patient and the other to be the doctor. I watched this guy struggling with his patient. It looked like he had flippers instead of hands; the whole interaction was super awkward.
All of a sudden, I started feeling uncomfortable and just blurted out:
“For God’s sake, leave him alone! Can’t you tell he is super annoyed and angry?”
Oops.
The instructor said, “Yes, maybe we should take a break.”
The guy that was the patient came up to me and asked, “How did you know?”
“I don’t know, I just felt it,” I said.
After that I started trying to see if I could feel what others were feeling. So when I was bored in a class, I’d go down the rows and try to feel what the my fellow students felt and quickly move on.
Going down the row: nothing, nothing nothing. This guy is pissed off, next one: nothing, nothing, Ow! She has a headache.
Dammit! Now I have a headache!
So that turned into a problem: When I worked on someone that had pain or other symptoms, I would take those on for myself. And the person I worked on would leave feeling great.
My friend Juanita did what is called an "attunement," and I became a Reiki Master.
Reiki masters are supposed to move energy around, but I was afraid I’d pick up too much of someone’s vibe and it would make me uncomfortable.
Plus, I can’t be doing energy work if I’m a chiropractor now.
So I kept all that checked and on the "down low"; sometimes I would get a "feeling" about a client while I was working on them. Surprisingly, it was always correct and it helped my client to make progress.
At some point, I started feeling that I needed to be true to myself, and if I had these abilities and I was able to use them to help the people that came to see me, then that's what I was going to do.
I've embraced this side of my work. If my clients need some emotional work, that’s what we work on, if they need some energy work, then they get it.
I suppose some people don’t want a chiropractor that’s metaphysical, but really-that’s how it all started. There are plenty of “evidence-based” chiropractors out there that can’t adjust their way out of a paper bag.
If the power goes off, they couldn’t use their lasers or whatever machine the Chiropractic Physiotherapy Industrial Complex wants you to buy now.
While I appreciate all the fancy parties they throw for us at continuing education seminars, they are infiltrating the chiropractic schools and now we are pumping out new chiropractors that only think they will be successful if they have the latest and greatest shiny machine.
I’ve studied a bunch of different things, I’ve found what works for me and refined it.
I tell my clients :
“I’m a better chiropractor today than I was yesterday, and I was pretty good back then!”
So I guess my next step is teaching some of this information and hoping to pass it on before my time here is up.
And you know what? I will love every damn minute of it!
There's nothing quite like sharing the weird, the wonderful, and the downright strange ways we can help people heal.
So, let's get to it—I've got a lot of sharing and teaching to do—it's going to be exciting!
-
@ c631e267:c2b78d3e
2025-06-06 18:54:04Willst du den Charakter eines Menschen kennenlernen, \ so gib ihm Macht. \ Abraham Lincoln
Vermutlich war Friedrich Merz erleichtert nach seinem Besuch beim US-Präsidenten im Oval Office. Dem Bundeskanzler kam zwar neben der Wortgewalt Donald Trumps eher eine Statistenrolle in der Medienrunde zu, aber es hätte natürlich viel schlimmer kommen können. Deswegen hatte er sich wohl vorher Ratschläge geholt, wie man hört unter anderem vom ukrainischen Präsidenten Wolodymyr Selenskyj. Offiziell gab der deutsche Regierungschef sogar an, «außerordentlich zufrieden» mit seinem Antrittsbesuch zu sein.
Dabei gibt es aktuell doch mehr Differenzen als Gemeinsamkeiten. Zu den Themen, mit denen es eine sehr unterschiedliche Umgehensweise hier und dort gibt, gehört die Gesundheit. Trumps Gesundheitsminister, Robert F. Kennedy Jr., kritisiert zum Beispiel, die meisten US-Universitäten würden den Studenten zu wenig über die Bedeutung gesunder Ernährung beibringen. Im Vordergrund der medizinischen Ausbildung stünde zu sehr die Behandlung der Menschen mit Medikamenten. Daher plant er, den Fakultäten die Bundesmittel zu streichen, wenn sie ihren Studenten keine Ernährungskurse anbieten.
Der oft als Verschwörungstheoretiker diffamierte RFK Jr. ist auch Teil des wachsenden Widerstands gegen Geoengineering-Aktivitäten. Die Manipulation von Wetter und Klima beispielsweise durch das Freisetzen von Chemikalien in die Atmosphäre kann kaum gesund sein und soll daher mit Louisiana jetzt in einem weiteren US-Bundesstaat verboten werden. Kennedy hatte derartige Maßnahmen auch schon als ein Verbrechen bezeichnet, das es zu stoppen gelte.
Indes ist der deutsche Beitrag in diesem Kontext, dass Ex-Gesundheitsminister und Covid-Impfpflicht-Befürworter Karl Lauterbach jetzt zum Klimaexperten mutiert. Laut Spiegel soll er Mitglied einer Kommission für Klima und Gesundheit bei der Weltgesundheitsorganisation werden, angeblich unentgeltlich. Vermutlich möchte die WHO im Sinne ihrer One-Health-Initiative mit solcher Lobbyarbeit für «Klimaschutz als Teil des Gesundheitsschutzes» ihren globalen Führungsanspruch untermauern.
Das Thema «Corona» ist im Übrigen noch lange nicht erledigt und das Narrativ bekommt weitere Risse. Nachdem Kennedy in den USA den Covid-«Impfstoff» für gesunde Kinder und schwangere Frauen aus dem empfohlenen Impfplan gestrichen hat, ist eine CDC-Beraterin zurückgetreten, die die Gen-Injektionen für Schwangere gefördert hatte. Auch die australische Regierung hat ihre Impfempfehlungen aktualisiert. Sie räumt jetzt ein, dass der Nutzen des «Impfstoffs» die Schäden für gesunde Jugendliche nicht überwiegt.
Gleichzeitig berichten Medien von einer neuen, anhaltenden «Covid-19-Welle» in China. Es gebe Befürchtungen, dass es zu erneuten Lockdowns und anderen drastischen Maßnahmen kommen könnte, obwohl sich die «Infektionen» laut den Gesundheitsbehörden auf einem Abwärtstrend befinden. In einigen Schulen seien Schüler isoliert und unter Quarantäne gestellt worden.
Isolierung, Überwachung und Kontrolle sind ebenfalls ein höchst ungesundes Erbe der «Coronazeit». Die weltweit vielfach eingeführten digitalen «Impfpässe» wurden als Instrument benutzt, um Kampagnen für digitale Identitäten zu fördern und die entsprechenden Systeme aufzubauen. Gerade hat auch Griechenland mit der Einführung seiner «Personal Citizen Number» den Grundstein für ein einheitliches digitales ID-System gelegt.
Derweil schlagen Datenschützer Alarm wegen des Tracking-Potenzials der sogenannten «Phone Home»-Funktion vieler digitaler Ausweise. Dieses «Feature», bei dem im Hintergrund jedesmal der Aussteller kontaktiert wird, um eine Angabe zu überprüfen, werde ganz leise in der Gesellschaft eingeführt, warnen sie. Das gebe den Regierungen den Vorgeschmack auf eine Macht, die sie kaum jemals wieder loslassen würden. Dagegen hilft nur eins: wachsam sein, hinterfragen und im Zweifel «Nein» sagen, anstatt auf eine vermeintliche Bequemlichkeit hereinzufallen.
[Titelbild: Pixabay]
Dieser Beitrag wurde mit dem Pareto-Client geschrieben und ist zuerst auf Transition News erschienen.
-
@ 81022b27:2b8d0644
2025-06-08 15:06:12I have a family practice where I see pretty much everything, from infants to the elderly, athletes to people with disabilities.
When someone gets good results, they always want their loved ones to benefit in the same way.
Husbands tell their wives, wives bring in their husbands...
I even had a guy bring both his wife and his girlfriend! On different days, of course.
So, sometimes we notice a little bit of drama here and there. When one of our couples divorces, someone usually gets custody of the chiropractor.
It's rare that I keep seeing both parties.
It's probably for the best, because there was this one time when a guy showed up with his new "friend" while the ex’s best friend was in the waiting area.
Well, it was like an episode of the "Jerry Springer Show" that day.
Let's get to the story:
This one guy I’d been working on started coming in more frequently, complaining of more pain, more aches, more everything.
I've been doing this for a while now, so I told him that when I see this, it's one of two things:
Either you are physically doing something to aggravate the issue,
Or you are under emotional stress.
He told me that he and his wife were having problems, and there was lots of drama.
Of course, I kept working on him. Sometimes I did some emotional work, but with men, I have to be very business-like when dealing with emotions because we don't like to deal with them.
Time passed, and they finally divorced.
He still comes in regularly, and I've noticed he has less pain and fewer issues. His visits are more like "wellness visits"; he seems in better spirits.
I thought I'd never see the ex-wife again, but she showed up today, and when I checked her, she's doing better than ever!
It got me thinking... these people are way better off divorced! They're not in constant fight-or-flight mode; I'm sure they are happier or will be. It's a positive all the way around.
I've been divorced twice. That's not something I'm proud of. I see both those divorces as failures.
I was 23 when I got married the first time. We were both super young and unprepared. We struggled for four years, and then she wanted out.
Not that I blame her; I was unhappy with myself, and my frustration and unhappiness bled into the relationship.
My second marriage lasted a lot longer than the first. After all we were older, ended up having 2 kids and I really, really tried.
I was just terrified of losing my girls. I even recall saying that I was willing to be miserable and unhappy just “for the kids”
The truth is once we separated, I probably spent more “quality time” with my daughters than I had before.
But here’s the thing in both marriages I would have willingly given up the chance to be happier with a clean end to the relationship in order to give it another shot.
At some point you just run out of shots.
I see elderly couples out at restaurants and they hardly say anything to each other. Is it because they know each other so well that they don’t need to speak, or is one of them silently praying the other one will drop dead so they will finally have a chance at happiness?
What I’m trying to say here is:
Maybe there is no hope for that relationship that you are giving CPR
Maybe it’s time to move on.
Live Long and Prosper. 🖖
-
@ c11cf5f8:4928464d
2025-06-08 14:59:37Howdy stackers! Here we are again with our monthly Magnificent Seven, the summary giving you a hit of what you missed in the ~AGORA territory.
First thing first. let's check our top performing post Ads!
Top-Performing Ads
This month, the most engaging ones are:
-
01
Bitcoin Magazine Launches V3 Limited Edition Bitcoin Crocs by @RideandSmile, no description, nor images provided. The title speak for the product itself. 31 sats \ 8 comments \ 15 May -
02
Happy Pizza Day Jerky Offer (10k sats sale 5/22 ONLY) by @beejay, celebrating Bitcoin Pizza Day with a delicious offer for a handmade product. Offer is over but it still available on her online shop and IRL at next Twin Cities Outdoor Agora Market https://stacker.news/items/972209/r/AG 103 sats \ 3 comments \ 22 May -
03
Lard Tallow lotion by @byzantine, sharing with us one of his preferred online shops that accept sats. Here other two: a Regenerative Farm in TX https://stacker.news/items/983695/r/AG and an artisanal lite roast coffee maker https://stacker.news/items/983668/r/AG 62 sats \ 4 comments \ 20 May -
04
Bitaxe Gamma 601 for sale by @PictureRoom selling P2P, have you shipped it yet? 121 sats \ 12 comments \ 15 May -
05
Built An Invisible Book Stage by @kr, he did well creating some expectations for this unique and durable product earlier https://stacker.news/items/903946/r/AG 124 sats \ 4 comments \ 21 May -
06
"₿lack Market Money" T-Shirts by T&F by @BitcoinErrorLog, that had opened his online store with plenty of incredible products, including an Anti-Surveillance clothing line https://stacker.news/items/994555/r/AG stuff never seen before! 51 sats \ 3 comments \ 24 May -
07
[SELL] Heatpunk 002 Tee by @thebullishbitcoiner, reviving the second edition of a t-shirt dedicated to home solo miners! 79 sats \ 1 comment \ 28 May
In case you missed
Here some interesting post, opening conversations and free speech about markets and business on the bitcoin circular economy:
- https://stacker.news/items/992449/r/AG - @Kontext is selling his beloved 2012 Jaguar XF 3.0 V6 Petrol [5M sats], great deal if paid in sats! Have you sold her?
- https://stacker.news/items/987241/r/AG - @RideandSmile shared the Freedom Issue: Letter From the Editor introducing a BM special edition
- https://stacker.news/items/999229/r/AG - @Solomonsatoshi was looking for Green Coffee Beans for DIY home roasting. Will @michaelbinary provide you some?
- https://stacker.news/items/992790/r/AG - @Rayo also introduce the P.A.Z.NIA Radio Network: 52 Hours of Liberation! An interesting livestream for all those interested in freedom.
- https://stacker.news/items/995163/r/AG welcome to @lunin, opening up on SN with Take it step by step and it will work! as part of a promising series: Founder's Thoughts. Here the second post https://stacker.news/items/999867/r/AG Startup according to Mozart
Hey sellers! Try Auctions
A quick reminder that now you can setup auctions here in the AGORA too! Learn how. The other feature released last month was the introduction of Shopfronts on SN. Check our SN Merch and SN Zine examples. Thank you all! Let's keep these trades coming and grow the P2P Bitcoin circular economy!
Active Professional Services accepting Bitcoin in the AGORA
Let us know if we miss any, here below the most memorable ones: - https://stacker.news/items/900208/r/AG - @unschooled offering Language Tutoring - https://stacker.news/items/813013/r/AG - @gpvansat's [OFFER][Graphic Design] From the paste editions (It's important to keep these offers available) - https://stacker.news/items/775383/r/AG - @TinstrMedia - Color Grading (Styling) Your Pictures as a Service - https://stacker.news/items/773557/r/AG - @MamaHodl, MATHS TUTOR 50K SATS/hour English global - https://stacker.news/items/684163/r/AG - @BTCLNAT's OFFER HEALTH COUNSELING [5K SAT/ consultation - https://stacker.news/items/689268/r/AG - @mathswithtess [SELL] MATHS TUTOR ONILINE, 90k sats per hour. Global but English only.
Let me know if I'm missing other stackers offering services around here!
Lost & Found in SN' Wild West Web
Stay with me, we're not done yet! I found plenty of other deals, offers and business related conversations in other territories too...
- BITCOIN... always fucking with my head... by @thecommoner (highly recommended read!)
- The Strange Moral Relativism of "Free Trade" by @Undisciplined (another highly recommended read!)
- What makes society thrive? by @aljaz
- Drop or proxy shipping services that take sats? by @lv99slacker
- Custom Bitcoin Nodes by @anon
- 23 Bitcoin Merch Shops That Sell Shirts For Sats by @hyperfree
- How to create an e-commerce website? by @Bitcoiner1
- Can You Outperform an Apple Tree? by @kr
- B2B Businesses in Bitcoin by @telcobert
Oh boy! Such exciting month! Now our latest weekly appointments:
🏷️ Spending Sunday
(LIVE TODAY)
Share your most recent Bitcoin purchases of just check what other stackers are buying with their sats! Today's one open at https://stacker.news/items/1000477/r/AGAll series available here:
🤝 Sellers & Business Club
(UPCOMING EVERY TUESDAY)
Here https://stacker.news/items/998773/r/AG wanted to introduce this new series, dedicated to our most active sellers^1. A room to talk about growing business and sales. You will join?📢 Thursday Talks: What have you sold for Bitcoin this week?
It is losing a bit of momentum, but it will still be opening every week for anyone interested to share sales tips, deals and offers around the Wild West Web! Latest one here https://stacker.news/items/997767/r/AG
Thanks all for reading until here, now... 🫡 Closing remarks as usual. See ya!
Create your Ads now!
Looking to start something new? Hit one of the links below to free your mind:
- 💬 TOPIC for conversation,
- [⚖️ SELL] anything! or,
- if you're looking for something, hit the [🛒 BUY]!
- [🧑💻 HIRE] any bitcoiner skill or stuff from bitcoiners
- [🖇 OFFER] any product or service and stack more sats
- [🧑⚖️ AUCTION] to let stackers decide a fair price for your item
- [🤝 SWAP] if you're looking to exchange anything with anything else
- [🆓 FREE] your space, make a gift!
- Start your own [SHOPFRONT] or simply...
- [⭐ REVIEW] any bitcoin product or LN service you recently bought or subscribed to.
Or contact @AGORA team on nostr DM, and we can help you publish a personalized post.
.
#nostr
#bitcoin
#stuff4sats
#sell
#buy
#plebchain
#grownostr
#asknostr
#market
#business
https://stacker.news/items/1000715
-
-
@ 41fa852b:af7b7706
2025-06-08 11:34:44"The poison was never forced - it was offered gently, until you forgot it was poison at all." - Mark Twain
Happy Sunday, folks.
Below is your weekly roundup of events for the coming week.
Added to the event section this week, an exciting new Scottish Bitcoin Conference, happening in August.
Check out all the details below.
This week's sponsor is…
Upcoming Bitcoin Meetups
Happening this week…
-
Dundee Bitcoin: Join them on the 2nd Monday of every month from 17:30 to 20:30 PM at The Wine Press, 16 Shore Terrace, Dundee DD1 3DN. This month's meetup is on Monday 9th. 🍻
-
Canterbury Bitcoin: Meeting this month at the The Dolphin Pub in Canterbury at 7 PM on Tuesday the 10th of June. An informal meetup to discuss Bitcoin and chat. 🍺
-
Glasgow Bitcoin: Meetups are held every second Wednesday of the month. This is a place for people in and around Glasgow to discuss Bitcoin. 18:00 - 23:00 at The Piper Bar, G1 1HL. This month on Wednesday 11th. 🍻
-
St Albans: This is a new meetup happening on the second Wednesday of each month. This month, it's from 19:00 to 22:00 on the 11th at the Robin Hood of St Albans, Victoria St, St Albans. 🍻
-
Children of Riddim - Festival - Bitcoin Stage: Children of Riddim Festival is bringing Bitcoin to the big stage from the 12th--16th June in Hemel Hempstead, with 150+ DJs, artists, and speakers. The Barn of Freedom will host Bitcoin talks, music, and Nostr-powered apps. Tickets and donations for the stage can be made via geyser.fund, with camping included. Acts/speakers include Joe Bryan, Metamick, Roger9000, Angor, and more. 🎉🪩
-
Bitcoin Beach Bournemouth: Every second Thursday of the month at Chaplins Cellar Bar. 529 Christchurch Road, Boscombe, United. You'll find them in the Cogg Room at 19:30. This month it's the 12th. 🍺
-
Bury St Edmunds Bitcoin: is reviving the medieval spirit of the Folkmoot, one Bitcoin meetup at a time. Their second gathering takes place this Friday at 17:30 at Edmundo Lounge. They've also just launched a brand new website.
-
Stoke Bitcoin Meetup: The Stoke Bitcoin meetup is back! They will have Bitcoin coffee to taste, delivered by hand directly from the mountains of El Salvador and grown by @lacruzboss in Berlin, El Salvador. 15:00 on Friday 13th. ☕️🍻
-
Bitcoin Walk - Edinburgh: Every Saturday they walk around Arthur's Seat in this historic city. Join them at 12 pm to chat about all things Bitcoin and keep fit. 🚶🏽♂️🚶🏼♀️🚶🏻
-
Bitcoin East: Join Bitcoin East in Bury St. Edmunds on Sunday 15th, 12:00 at Hopsters Bar, Felixstowe. All welcome, Bitcoiners and anyone else curious about Bitcoin. 🍺
New Businesses Accepting Bitcoin
This week we have…
- Core Agency: A creative communications firm that blends financial expertise with bold storytelling to help businesses in finance and beyond stand out. Based in the UK, they specialise in strategic planning, brand identity, content production, and public relations, delivering everything from investor-focused media to high-impact digital campaigns. With in-house studios for video, animation, and live streaming, Core offers end-to-end solutions that are both visually compelling and commercially effective. Their mission is to bring clarity, creativity, and confidence to brands navigating complex markets. Whether you're a fintech startup or a global institution, Core helps you communicate with purpose and originality. Now accepting bitcoin payments. 📈
Upcoming Special Events
These events aren't happening next week, but they're important to add to your calendar now as tickets are selling fast.
The Bitcoin Beach Retreat: An annual Bitcoin-only gathering held at a scenic coastal campsite in North Wales. Celebrating its fifth year in 2025, the retreat offers a relaxed, community-driven alternative to traditional conferences.
From July 11--14, up to 120 Bitcoiners will come together to share knowledge, enjoy beachside BBQs, and strengthen their networks under the stars. With no pre-booked speakers, the event thrives on peer-led workshops and spontaneous discussions, fostering genuine connections among attendees. Emphasising local engagement, the retreat directs the majority of its funds into the surrounding community, with 42% of expenses paid in Bitcoin last year.
Whether attending solo or with family, attendees can expect a welcoming environment dedicated to sound money and shared values.
Scottish Bitcoin Conference: Taking place on August 23, 2025, at the Glasgow University Union, located at 32 University Avenue, Glasgow G12 8LX. From 09:00 to 16:30.
Featuring an impressive roster of speakers, including Anthony Scaramucci, Hashley Giles, Rick Messit, Dr. Peter Connor, Claire Chisholm, Roger9000, John Magill, Ian Scanlon, Robin Thatcher, Jamie Plowman, Robbie Maltby, Russell Rukin, Peter Lane, Francesco Madonna, and Sam Roberts.
Open to all, this conference offers a unique opportunity for Bitcoiners and newcomers alike to connect and learn in the vibrant setting of Glasgow.
Get Involved
- Volunteer: Passionate about merchant adoption? Reach out to Bridge2Bitcoin on Twitter or website.
- Start a Meetup: Want to launch a Bitcoin meetup? We'll support you. Contact us on Twitter or just reply to this email.
- Contribute to BTCMaps: Help maintain this key Bitcoin resource--no coding skills needed. Update a UK area.
- Telegram: Join our Channel for UK meetup updates
- Feedback: Reply to this email with ideas and suggestions.
This week's sponsors is…
Get out and support the meetups where you can, visit Bitcoin Events UK for more info on each meetup and to find your closest on the interactive map.
Stay tuned for more updates next week!
Simon.
-
-
@ 4fe14ef2:f51992ec
2025-06-08 10:20:56Let's support Bitcoin merchants! I'd love to hear some of your latest Lightning purchases and interesting products you bought. Feel free to include links to the shops or businesses you bought from.
Who else has a recent purchase they’re excited about? Bonus sats if you found a killer deal! ⚡
If you missed our last thread, here are some of the items stackers recently spent and zap on.
Like and repost: X: https://x.com/AGORA_SN/status/1931657445916766655 N: https://njump.me/note1qqqsgu9pgx2u6yt2dv0c5yedpzrqalaqe3rf3lwxfu4a0w6wemtsy0eyfu
https://stacker.news/items/1000477
-
@ dab6c606:51f507b6
2025-06-08 09:24:14I've been interested for a while in how the business with miles and loyalty points works. I found out that only large corporations can partially do this because of how they can then account for it. And it's tax-wise super advantageous. I also added info about loyalty points and gift cards. The text below was written by various AIs as I was digging into it, it's basically a summary, sharing for those who are interested.
Part I: Loyalty Programs of Large Corporations
Business Logic of Loyalty Programs
Loyalty programs of airlines and hotels are sophisticated business tools that serve several key purposes. They primarily function to increase customer loyalty by creating "switching costs" - customers don't want to lose accumulated points, which reduces the likelihood they'll switch to competitors.
At the same time, they're a significant source of additional revenue. For example, American Airlines earns more from selling miles to banks than on some flight routes. When Citibank buys miles for 1-2 cents per mile, the airline gets immediate revenue, while the real value for the customer can be 3-5 cents when used correctly.
Accounting Treatment of Loyalty Points
From an accounting perspective, loyalty points represent deferred liabilities. When a customer earns points, the company must create a reserve for their future redemption. Points are valued based on expected costs of their redemption, not on nominal value.
The key difference is between cash accounting and accrual accounting: - Cash accounting: Revenue is recognized when payment is received, expenses when paid. - Accrual accounting: Revenue and expenses are recognized when the obligation arises.
For loyalty programs, accrual accounting is critical. When an airline sells miles to a bank for $1,000,000, it simultaneously creates a liability for future costs (say $600,000), so taxable income is only $400,000.
Example: Selling Miles to a Bank
An airline sells 50 million miles to Citibank for $1,000,000: 1. Immediate revenue: $1,000,000 2. Creation of liability: $600,000 (estimated future costs) 3. Taxable income: $400,000 4. Future costs: When customers use miles, the company recognizes the expense and reduces the liability
Positive margin arises from several factors: - Breakage - 15-20% of miles are never redeemed - Time value of money - Money from the bank is invested immediately - Marginal costs - An empty seat has low incremental cost
Tax Optimization and Offshore Structures
Large companies often use international structures to optimize taxes from loyalty programs. A typical structure includes: 1. Parent company (USA/EU) - Operates flights and provides services (e.g., flights or accommodation). 2. IP Holding (Ireland/Netherlands) - Owns intellectual property (IP) for the loyalty program, such as brands, software, and databases. 3. Loyalty Operating Company (Singapore/Dubai) - Manages sale of miles to banks and partners, coordinates the program and communicates with customers.
Business Relationships and Payments Between Entities (example with positive result for Singapore)
These entities are connected by contracts that determine who pays for what and why, to minimize tax burden: - Bank → Singapore (Loyalty Operating Company): The bank (e.g., Citibank) pays $1,000,000 for miles it offers to its clients as rewards for using credit cards. The Singapore company is the main contact point for partners because it's located in a low-tax jurisdiction (17%) with good infrastructure for financial services. - Singapore → Ireland (IP Holding): The Singapore company pays $500,000 as royalties for using IP (brands, software, and data) of the loyalty program. This payment is high to shift profit to Ireland, where the tax rate is even lower (12.5%). This reduces taxable income in Singapore. - Singapore → Parent Company (Airline): The Singapore company pays $300,000 to the parent company for providing services (e.g., flights) when customers use miles. This payment is lower than actual costs to minimize profit in the parent company's country, where the tax rate is higher (e.g., 25-35% in USA or EU). - Profit in Singapore: $1,000,000 (income from bank) - $500,000 (royalties to Ireland) - $300,000 (payment to airline) = $200,000 profit, taxed at 17% in Singapore.
Why Such Distribution?
- Ireland (IP Holding): High royalty payments ($500,000) go to Ireland because the 12.5% tax rate is attractive and Ireland is considered a "serious" jurisdiction that meets international rules (e.g., BEPS). Ireland also has double taxation treaties with many countries, facilitating profit shifting.
- Singapore (Loyalty Operating Company): Mile sales and program coordination occur in Singapore due to favorable tax environment (17%) and strategic location for Asian markets. A small profit ($200,000) is left here to demonstrate "economic substance" - that the company has real activity.
- Parent Company: The $300,000 payment is low to minimize taxable income in a high-tax country (e.g., USA or EU).
Why Not 0% Tax Jurisdiction?
Why not use a zero-tax country (e.g., Cayman Islands)? Due to: - Regulatory scrutiny - Tax authorities closely monitor 0% jurisdictions and may question legitimacy. - BEPS rules - Need to demonstrate "substance" (real offices, employees) in the country. - Credibility test - 12.5% in Ireland or 17% in Singapore looks like legitimate business operation.
The result of such structure is that most profit (60-70%) is taxed at 12.5% in Ireland or 17% in Singapore instead of 25-35% in the airline's home country.
Part II: Loyalty Programs and Alternatives for Small Businesses
Why Loyalty Programs Are Problematic for Small Businesses
Unlike large corporations, small businesses like cafes face a fundamental problem with loyalty programs: cash accounting obligation. In many countries, small firms (under $25M annually) must use cash accounting, which means: - Revenue from selling points is taxed immediately - Costs are deducted only when customers use points (maybe a year later) - Creates tax and cashflow problem - tax is paid on money you'll "lose" in the future
Imagine a cafe that sells loyalty points for €100. It must immediately pay tax (say €21), but deducts coffee costs provided for points only in the future.
Alternative Models for Small Businesses
There are more tax-advantageous alternatives:
1. Gift Cards Model
- Revenue is NOT RECOGNIZED when selling gift card
- Revenue is recognized only when customer uses the card
- Example: Sell gift cards for €10,000 in December, get cash immediately, but pay tax gradually as customers use cards during the following year.
- Time value of money: Money can be invested (e.g., 6% annually = €600 extra profit on €10,000)
- Breakage benefit: 2-10% of cards are never used, after certain time (3-5 years, depending on legislation) you can recognize the balance as pure profit.
Example: Starbucks Starbucks had $1.5 billion in unused gift cards on its books in 2022. Estimated 3% breakage means $45 million pure profit – interest-free loan from customers with bonus that part never returns.
2. Subscription Model
- Monthly revenue = immediate taxation
- Monthly costs = immediate deduction
- Example: €10/month for "premium membership" with certain benefits
3. Discount Coupons
- No revenue when issuing coupon
- Reduced revenue when redeeming (sell at lower price)
- Example: 20% discount coupon = sell coffee for €4 instead of €5
Outsourcing Loyalty Program: Details About Shopify Loyalty
Platforms like Shopify Loyalty represent an elegant solution for small businesses wanting to offer loyalty programs without accounting and tax complications. Let's break this down in detail:
How Shopify Loyalty Works
- Shopify as third party: Shopify owns and manages the entire loyalty program including points and software. The customer has their "account" directly with Shopify, not with the specific store. This means points are not your liability, but Shopify's liability.
- Your role: You (e.g., cafe) pay Shopify a monthly fee (e.g., €29) for using the platform and a small transaction fee (e.g., €0.20) for each point redemption (reward). You're essentially a "service provider" for Shopify – you provide rewards when Shopify sends you an order.
- Earning points: Customer earns points for purchases in stores participating in Shopify Loyalty program. For example, if customer buys coffee for €5 in your cafe, Shopify credits them points (e.g., 5 points per euro, so 25 points). Specific rules (how many points per euro) are set by you through Shopify platform, but technically points are managed by Shopify.
- Using points: Customer can use points for rewards (e.g., free coffee for 100 points), but usually only in stores participating in Shopify network. This means if your cafe uses Shopify Loyalty, points earned with you can be used with you or other stores in Shopify ecosystem, if Shopify allows it. Usually, however, stores set up the program so points are primarily usable with them, increasing loyalty to their brand.
- Point redemption process: When customer wants to use points (e.g., 100 points for free coffee), Shopify sends order to you (cafe) to provide the reward. You give the coffee but don't receive direct payment from customer – it's a marketing cost. You also pay Shopify transaction fee (€0.20). Accounting-wise, it's not a sale, so no taxable income or receipt obligation arises.
- Accounting treatment: When customer uses points:
- No receipt = no taxable income
- Coffee cost (€2) + Shopify fee (€0.20) = €2.20
- Recorded as "Promotional expenses" or "Marketing costs"
Why Must Loyalty Program Be Outsourced to Third Party (like Shopify)?
Small businesses don't have capacity or resources to manage their own loyalty program "in-house" for these reasons: - Tax and accounting complexity: If you managed loyalty program yourself, you'd have to create reserves for future liabilities (points customers will use later), estimate breakage rate (percentage of unused points) and handle cash vs. accrual accounting. For small firms that often must use cash accounting, this means immediate taxation of revenue if selling points, but cost deduction only in the future – creates cashflow mismatch. - Technological infrastructure: Managing points, customer databases and integration with payment systems requires sophisticated software and IT team, which is expensive and complicated for small firms. - Legal separation: When program is managed by third party like Shopify, points are their liability, not yours. For you, this means no future liabilities in your accounting books – just monthly costs (Shopify fee), which are tax-deductible as regular expense. - Economic efficiency: Shopify aggregates thousands of stores, achieving economies of scale – lower costs for software, security and data management. A small cafe could never create such system at reasonable price alone.
Why Can't It Be In-house from Tax Perspective?
If small firm managed loyalty program itself: - Immediate tax problem: If firm sold points (e.g., for money or as part of purchase), revenue would have to be taxed immediately, though costs for providing rewards (e.g., free coffee) could be deducted only when customer uses points. This creates cashflow mismatch because you pay tax before actually "losing" money on reward. - Complex reserves: Would have to estimate how many points will be used and create accounting reserves, which is administratively demanding and requires expensive accountants or software. - Risk of errors: Incorrect breakage rate estimates or poor liability management can lead to tax audits and penalties.
With Shopify, these problems are eliminated – you only pay monthly fee and transaction fees, which are simply recorded as marketing costs. Shopify takes full responsibility for managing points and liabilities to customers.
Case Study: Loyalty Points for Cafe (10 + 1 Free Model)
Let's look at specific case of small cafe offering classic loyalty program type "10 + 1 free". Customer gets 1 point for each coffee purchased (e.g., for €3) and after collecting 10 points gets one free coffee. We'll analyze how this works accounting-wise, whether it's "promotional expense" and what's the difference between in-house management and using Shopify.
How "10 + 1 Free" Program Works
- Earning points: Customer buys coffee for €3 and gets 1 point (e.g., stamp on card or digital record). Points have no monetary value for sale – they're purely reward for purchase.
- Using points: After collecting 10 points (meaning purchases for €30) customer gets free coffee (value €3).
- Real cost for cafe: Cost of producing free coffee is lower than selling price, e.g., €1.50 for materials and labor.
Accounting Treatment (In-house)
If cafe manages program itself (in-house), accounting process depends on whether it uses cash accounting (common for small firms) or accrual accounting: - Cash accounting: - When customer buys coffee: Cafe records €3 revenue for each coffee and issues receipt. Point (stamp) has no monetary value, so it's not recorded as liability or revenue. - When redeeming 10 points: When customer gets free coffee, no revenue arises (€0), but cost for coffee production arises (€1.50). This cost is recorded as "Promotional expense" or "Marketing cost" because it's form of discount or advertising to retain customer. - Tax impact: No revenue when issuing free coffee, €1.50 cost is tax-deductible as regular expense. - Accrual accounting (less common for small firms): - When customer buys coffee: Cafe records €3 revenue but simultaneously creates small liability for future reward (e.g., €0.30 per point, which is estimate of cost for future free coffee divided by 10). So from €3 revenue, taxable income is only €2.70. - When redeeming 10 points: When customer gets free coffee, cafe reduces liability by €3 (10 points x €0.30) and records €1.50 cost for coffee production. Difference can be adjusted as breakage or other profit if estimates differ from reality. - Tax impact: Taxable income is lower already at first purchase, but accounting is more complex due to estimates and reserves.
Is it Promotional Expense? Yes, in both cases (cash and accrual) the cost of free coffee is recorded as "Promotional expense" or "Marketing cost" because it's form of discount to support customer loyalty. It's not considered regular sale because no revenue or receipt arises.
Accounting Treatment (via Shopify Loyalty)
If cafe uses Shopify Loyalty to manage "10 + 1 free" program, process is simpler: - When customer buys coffee: Cafe records €3 revenue for coffee and issues receipt. Shopify credits point to customer's account (it's not your liability, but Shopify's). - When redeeming 10 points: Shopify sends order to issue free coffee. Cafe gives coffee (€1.50 cost) and pays Shopify transaction fee (€0.20). Total cost €1.70 is recorded as "Promotional expense" or "Marketing cost". - Tax impact: Same as in-house, no revenue when issuing free coffee, €1.70 cost is tax-deductible as regular expense. Additionally, you don't have to handle any liabilities or breakage estimates because Shopify manages points.
Difference Between In-house and Shopify
- In-house:
- Advantages: Full control over program, no monthly fees to third party (e.g., €29 Shopify fee).
- Disadvantages: If using accrual accounting, must create reserves and estimate breakage, which is administratively demanding. With cash accounting it's simpler (no liabilities), but if you sold points for money, tax mismatch arises (revenue taxed immediately, cost only later). Additionally, must manage point database yourself (stamps, software), which is time-consuming.
- Shopify Loyalty:
- Advantages: No liabilities in your accounting books, Shopify manages points and technology. Accounting-wise it's simple – just monthly fee (€29) and transaction fees (€0.20) as marketing cost. Don't have to handle estimates or breakage.
- Disadvantages: Pay monthly fees and transaction fees, increasing costs (e.g., €0.20 extra per free coffee). Have less control over program because third party manages it.
Conclusion for Cafe: "10 + 1 free" program is accounting-wise considered Promotional expense in both cases (in-house and Shopify) because free coffee is form of marketing to retain customers. Difference is in administrative burden and costs – Shopify simplifies accounting and management, but at cost of monthly fees. In-house is cheaper but more demanding to manage, especially if you wanted to use accrual accounting or sell points for money.
Conclusion
Loyalty programs are sophisticated customer loyalty tools, but their accounting and tax aspects differ significantly between large and small firms. Large corporations use accrual accounting and international structures for tax optimization, while for small businesses alternative models like gift cards or outsourcing entire program are often more advantageous, eliminating tax and cashflow problems. Gift cards additionally bring immediate cash flow, time value of money and breakage benefit, making them ideal tool for businesses of all sizes. Shopify Loyalty offers small firms way to implement loyalty program without accounting complications because it takes technical and legal responsibility, allowing focus on core business. For simple programs like "10 + 1 free," accounting impact is similar (Promotional expense), but Shopify simplifies management at cost of additional fees.
-
@ a5ee4475:2ca75401
2025-06-06 15:30:41[EM ATUALIZAÇÃO]
vacina #saude #politica #manipulacao #mundial #genocidio #pandemia #conspiracao
"Aqueles que não conseguem lembrar o passado estão condenados a repeti-lo." - George Satayana
Este artigo reúne algumas menções e evidências mais antigas que vim registrando durante alguns anos em relação a Covid-19, vacinas obrigatórias e a ação de agências de governo, fundações, políticos, mídia tradicional, celebridades, influenciadores, cientistas, redes sociais e laboratórios, em envolvimento com genocídio e restrições de liberdades em escala mundial causado por decisões em várias esferas relativas ao covid e as vacinas obrigatórias em geral.
Porém, alguns links podem não estar mais disponíveis, foram que ainda faltam ser registradas muitas informações já divulgadas nos últimos anos e que muitos não tiveram contato pela escassez de meios para a obtenção dessas informações de forma organizada.
Portanto, o presente artigo ainda passará por atualizações de conteúdo e formatação. Logo, se possível, ajudem sugerindo complementos ou alterações, ou com doações.
Noções iniciais:
- O termo 'Coronavírus' (COVID) é na verdade um nome genérico para vários vírus de gripes já comuns, dado para o tipo corona (com uma "coroa", 'espetos' ao redor dele), o Sars-Cov-2 (que passou a ser chamado erroneamente só de Covid), é só um deles.
- SARS-CoV-2 é que é nome do vírus. Ele que causa a doença Covid-19;
- O coronavírus SARS-CoV-2 é o segundo tipo de SARS-CoV documentado, o primeiro ocorreu entre 2002 e 2003, se originando também da China e também dito como tendo origem animal;
- SARS (Severe Acute Respiratory Syndrome) - Síndrome Respiratória Aguda Grave (SRAG) é a uma doença respiratória viral, relatada ser de origem zoonótica (animal), causada pelos coronavírus SARS-CoV (2002) e SARS-CoV-2 (2019), ambos de origem chinesa;
1. Vacinas Obrigatórias em Geral
23/01/2025 - [Pesquisa] Vacinas nos EUA causando autismo em crianças https://publichealthpolicyjournal.com/vaccination-and-neurodevelopmental-disorders-a-study-of-nine-year-old-children-enrolled-in-medicaid/
- O CDC admite que 98 milhões de pessoas receberam o vírus do câncer através da vacina da Poliomielite https://medicinanews.com.br/frente/frente_1/o-cdc-admite-que-98-milhoes-de-pessoas-receberam-o-virus-do-cancer-atraves-da-vacina-poliomielite/
"O CDC (Os Centros de Controle e Prevenção de Doenças dos Estados Unidos) removeu rapidamente uma página do seu site, que estava em cache no Google, como você pode ver logo abaixo, admitindo que mais de 98 milhões de americanos receberam uma ou mais doses de vacina contra pólio dentro de 8 período entre 1955 e 1963, quando uma proporção da vacina foi contaminada com um poliomavírus causador de câncer chamado SV40."
Fonte original da imagem: https://preventdisease.com/images13/CDC_Polio.png [indisponível] - A imagem foi trocada por outra de menor qualidade e em outro link, mas eu já tinha a imagem original salva.
Imagem arquivada em: https://web.archive.org/web/20201203231640/
27/02/2021 - Por que o Japão demorou para vacinar, mesmo com Olimpíada se aproximando https://www.cnnbrasil.com.br/internacional/2021/02/27/por-que-o-japao-demorou-para-vacinar-mesmo-com-olimpiada-se-aproximando
"Desconfiança da população japonesa em relação a vacinas, ligada a casos ocorridos no passado, está entre razões que atrasaram imunização no país.
A resistência à vacina do Japão remonta à década de 1970, quando duas crianças morreram dentro de 24 horas após receberem a vacina combinada contra difteria, tétano e coqueluche (coqueluche). A vacina foi temporariamente suspensa, mas a confiança já havia sido abalada. Por vários anos, as taxas de vacinação infantil caíram, levando a um aumento nos casos de tosse convulsa.
No final dos anos 1980, houve outro susto com a introdução da vacina tripla contra sarampo, caxumba e rubéola produzida no Japão. As primeiras versões do imunizante foram associadas à meningite asséptica, ou inchaço das membranas ao redor do cérebro e da medula espinhal. O problema foi rastreado até o componente caxumba da vacina tripla, o que levou a uma ação judicial e a indenização por danos pesados.
O Instituto Nacional de Ciências da Saúde interrompeu a dose combinada em 1993 e a substituiu por vacinas individuais. Após o escândalo, Shibuya disse que o governo japonês se tornou "ciente dos riscos" e seu programa nacional de vacinação tornou-se voluntário.
O Dr. Yuho Horikoshi, especialista em doenças infecciosas, diz que os processos levaram a uma "lacuna de vacinação", em que nenhuma vacina foi aprovada no Japão por cerca de 15 anos.
Mais recentemente, em 2013, o Japão adicionou a vacina contra o papilomavírus humano (HPV) ao calendário nacional para proteger as meninas contra o vírus sexualmente transmissível, que é conhecido por causar câncer cervical. No entanto, vídeos de meninas supostamente sofrendo de reações adversas começaram a circular no YouTube, levando o governo a retirá-los da programação nacional."
2. PRIMEIRAS OCORRÊNCIAS PREDITIVAS AO COVID-19
2002 - Síndrome respiratória aguda grave (SARS) Brenda L. Tesini (setembro de 2018). Síndrome respiratória aguda grave (SARS) [indisponível]. Manual Merck. Consultado em 23 de janeiro de 2020, citado no Wikipedia
SARS - Wikipédia: "A SARS [doença do vírus SARS-CoV] foi detectada pela primeira vez no fim de 2002 na China. Entre 2002 e 2003, um surto da doença resultou em mais de 8 000 casos e cerca de 800 mortes em todo o mundo."
2010 - Fundação Rockfeller, Lockstep. https://www.rockefellerfoundation.org/wp-content/uploads/Annual-Report-2010-1.pdf
Neste PDF da fundação Rockfeller, em seu próprio site, a fundação deixou claro o seu envolvimento em casos de ‘contenção’ de pandemias juntamente com a USAID (agência americana com nome ambíguo, como formalmente ‘United States Agency for International Development’, mas soando como ‘US Socorre’, mas sendo um braço do governo democrata que financiava interferências políticas diretas em vários países, como em intervenções no Brasil ), inclusive em relacionadas ao SARS, o mesmo sintoma dos coronavírus Sars-Cov e Sars-Cov-2 (o vírus propagado em 2019) e que causa o COVID-19.
Segundo eles:
“Integração entre Regiões e Países
A Fundação Rockefeler investiu US$ 22 milhões em sua Iniciativa de Redes de Vigilância de Doenças para ajudar a conter a disseminação de doenças infecciosas e pandemias, fortalecendo os sistemas nacionais, regionais e globais de vigilância e resposta a doenças. Dois programas-chave da Rockefeler — a Rede de Vigilância de Doenças da Bacia do Mekong e a Rede Integrada de Vigilância de Doenças da África Oriental — conectaram e capacitaram profissionais de saúde, epidemiologistas e autoridades de saúde pública em toda a região, levando a um aumento de seis vezes nos locais de vigilância de doenças transfronteiriças somente nos últimos três anos. Em 2010, a Rockefeler expandiu a bem-sucedida campanha transdisciplinar One Health, que a USAID e o Banco Asiático de Desenvolvimento adotaram como modelos. One Health refere-se à integração da ciência médica e veterinária para combater essas novas variedades de doenças zoonóticas que se movem e sofrem mutações rapidamente de animais para humanos. Essas colaborações criaram e fortaleceram uma rede regional crítica de saúde pública, enquanto as lições aprendidas foram exportadas entre disciplinas e países. Além de fortalecer os laços globais em saúde pública, a Rockefeler ajudou a elevar o nível de especialização e treinamento em campo. O Programa de Treinamento em Epidemiologia de Campo coloca graduados nos mais altos escalões do governo no Laos e no Vietnã, enquanto as bolsas da Rockefeler transformaram as ferramentas disponíveis para os médicos, permitindo-lhes utilizar o poder da internet para se comunicar e monitorar eventos, compreender contextos locais e analisar novos problemas. Finalmente, estamos aplicando ferramentas do século XXI para combater os desafios de saúde do século XXI.”
Julho de 2012 - Revista Mundo Estranho - Epidemias Citado em: https://super.abril.com.br/especiais/epidemia-o-risco-invisivel/
Página do site ME salva em Imagem no Voidcat
Houve uma ‘coincidência’, a revista Mundo Estranho em julho de 2012, entrevistou o até então doutorando em virologia, Átila Iamarino (do canal Nerdologia no Youtube - O mesmo cientista que fez diversas propagandas das vacinas no Brasil), para descrever um possível cenário de propagação de uma epidemia viral, a revista descreve com grande precisão os eventos de 2020, mas apontando o oposto da China, em que, na realidade, sua economia cresceu vertiginosamente.
Segundo eles:
“ 1 – A Ásia é o ponto de partida. Após várias mutações, um novo vírus surge hospedado em morcegos. As fezes que eles soltam no ar infectam guaxinins. Dos mercados da China, esses animais são levados vivos para serem abatidos em restaurantes. Estressados, eles arranham e mordem os cozinheiros, espalhando o vírus.
2 – O vírus adquire a capacidade de ser transmitido de homem para homem por via aérea – forma mais fácil de contágio. Além disso, o contágio se dá antes mesmo de o enfermo apresentar os sintomas. Assim, em média, o doente infecta cinco pessoas antes de ter febre, vômito, diarreia, desidratação e falta de ar.
3 – O governo chinês envia uma comissão para avaliar a doença misteriosa que acomete alguns vilarejos. A equipe volta sem resultados e não considera o surto alarmante até que três pesquisadores adoecem e um deles morre. A China não informa a Organização Mundial da Saúde (OMS) para não demonstrar fragilidade.
4 – Os sintomas são comuns e a doença só chama a atenção quando muita gente começa a morrer na mesma região. Ainda assim, demora para que médicos e enfermeiros percebam a ineficiência de antibióticos na cura – o que exclui a maioria das bactérias como agente causador. Testes com vírus comuns também dão negativo.
5 – O governo isola comunidades em que há focos da doença. Ninguém entra nas cidades e nenhum doente pode sair. Mas, como a misteriosa enfermidade demora quatro dias para mostrar seus sintomas, muitos doentes saem dos vilarejos sem saber que estão infectados, alastrando a epidemia.
6 – Doentes viajam de avião para grandes cidades, como Hong Kong. O fervilhante centro comercial, que atrai gente do mundo todo, é um polo de contágio e disseminação. Sem imaginar o risco que correm, pessoas são contaminadas e, ao voltar para seu local de origem, carregam o vírus para todos os continentes.
7 – Com a doença já fora de controle, começa uma corrida entre laboratórios e cientistas de grandes universidades para descobrir o agente causador. Mesmo com o vírus isolado, as vacinas demoram para ser feitas em larga escala, tornando impossível o atendimento à demanda mundial.
8 – Os países se isolam, mantendo esquemas de quarentena. Aeroportos são fechados e o turismo mundial cai a quase zero. A China sofre as piores consequências, com o fluxo de empresários para Hong Kong suspenso – gerando prejuízos de bilhões de dólares – e com o boicote a produtos alimentícios vindos da Ásia.
9 – Além dos 10% de casos letais, os milhões de doentes precisam de atendimento médico. Enquanto hospitais e cemitérios estão lotados, escolas, indústrias e comércio ficam paralisados por falta de profissionais. O transporte público também para e os trabalhadores que podem passam a trabalhar em casa.
10 – Nas nações pobres, quase 20% da população morre – e outros milhões são vitimados mesmo em países ricos. Parte dessa mortalidade ocorre por causa da doença, mas outro fator determinante é a crise financeira global. A produção de alimentos cai por falta de mão de obra.
Fontes: A História e Suas Epidemias e Pandemias – A Humanidade em Risco, de Stefan Cunha Ujvari; Pragas e Epidemias – Histórias de Doenças Infecciosas, de Antonio Carlos de Castro Toledo Jr. Consultoria: Stefan Ujvari Cunha, infectologista do Hospital Alemão Oswaldo Cruz; Paolo Zanotto, professor de virologia do Instituto de Ciências Biológicas (ICB) da USP; Átila Iamarino, doutorando em HIV-1 no ICB da USP. “
3. PRIMEIROS INDÍCIOS
10/2019 - Evento 201 - Durante os Jogos Militares Internacionais na China https://www.centerforhealthsecurity.org/event201/
Promovido por: - Bill & Melinda Gates Foundation - John Hopkins Institute - Fórum econômico mundial
"O evento simula a liberação de um coronavírus novo do tipo zoonótico transmitido por morcegos para porcos e por fim para humanos. Eventualmente ele se torna muito transmissível entre humanos levando a uma pandemia severa. O vírus é muito parecido com o vírus da SARS, mas se transmite muito mais facilmente entre pessoas devido a sintomas muito mais leves destas."
Também mencionado por: Jornal Estadão
Sobre o "Movimento antivacina"
05/12/2017 - Movimento antivacina: como surgiu e quais consequências ele pode trazer? https://www.uol.com.br/universa/noticias/redacao/2017/12/05/o-que-o-movimento-antivacina-pode-causar.htm?cmpid=copiaecola
23/03/2019 - "Instagram bloqueia hashtags e conteúdo antivacinação" https://canaltech.com.br/redes-sociais/instagram-bloqueia-hashtags-e-conteudo-antivacinacao-135411/
23/05/2021 - Novos dados sobre pesquisadores de Wuhan aumentam debate sobre origens da Covid https://www.cnnbrasil.com.br/saude/novos-dados-sobre-pesquisadores-de-wuhan-aumentam-debate-sobre-origens-da-covid/
"A China relatou à Organização Mundial da Saúde que o primeiro paciente com sintomas semelhantes aos de Covid-19 foi registrado em Wuhan em 8 de dezembro de 2019"
01/02/2020 - O que aconteceu desde que o novo coronavírus foi descoberto na China https://exame.com/ciencia/o-que-aconteceu-desde-que-o-novo-coronavirus-foi-descoberto-na-china/
"O primeiro alerta foi recebido pela Organização Mundial da Saúde (OMS) em 31 de dezembro de 2019"
15/09/2020 - YouTube diz que vai remover vídeos com mentiras sobre vacina contra COVID-19 https://gizmodo.uol.com.br/youtube-remover-videos-mentiras-vacina-covid-19/
"O YouTube anunciou na quarta-feira (14) que estenderá as regras atuais sobre mentiras, propaganda e teorias da conspiração sobre a pandemia do coronavírus para incluir desinformação sobre as vacinas contra a doença.
De acordo com a Reuters, a gigante do vídeo diz que agora vai proibir conteúdos sobre vacinas contra o coronavírus que contradizem “o consenso de especialistas das autoridades de saúde locais ou da OMS”, como afirmações falsas de que a vacina é um pretexto para colocar chips de rastreamento nas pessoas ou que irá matar ou esterilizar quem tomar."
*07/01/2021 - YouTube vai punir canais que promovem mentiras sobre eleições – incluindo os de Trump https://olhardigital.com.br/2021/01/07/noticias/youtube-vai-punir-canais-que-promovem-mentiras-sobre-eleicoes-incluindo-os-de-trump/
"O YouTube anunciou que vai punir canais que promovem mentiras sobre as eleições, removendo sumariamente qualquer vídeo que contenha desinformação e, ao mesmo tempo, advertindo com um “strike” o canal que o veicular. A medida já está valendo e a primeira “vítima” é ninguém menos que o ex-presidente americano, Donald Trump.
A medida não é exatamente nova, mas foi novamente comunicada e reforçada pelo YouTube na quarta-feira (6), após os eventos de invasão do Capitólio, em Washington, onde o presidente eleito Joe Biden participava da cerimônia que confirmava a sua vitória nas eleições de novembro de 2020. A ocasião ficou marcada pela tentativa de invasão de correligionários de Trump, que entraram no edifício em oposição à nomeação do novo presidente. Uma mulher acabou sendo morta pela polícia que protegia o local.
O ex-presidente Donald Trump teve vídeos banidos de seu canal no YouTube após os eventos de ontem (6) no capitólio."
4. FIGURAS CENTRAIS
Bill Gates
- Bill Gates diz 'não' a abrir patentes de vacinas https://www.frontliner.com.br/bill-gates-diz-nao-a-abrir-patentes-de-vacinas/
"Bill Gates, um dos homens mais ricos do mundo, cuja fundação tem participação na farmacêutica alemã CureVac, produtora de vacina mRNA para prevenção de covid-19, disse não acreditar que a propriedade intelectual tenha algo a ver com o longo esforço global para controlar a pandemia."
João Doria - Governo de São Paulo
26/07/2017 - João Dória vai a China conhecer drones para ampliar segurança eletrônica na capital paulista https://jc.ne10.uol.com.br/blogs/jamildo/2017/07/26/joao-doria-vai-china-conhecer-drones-para-ampliar-seguranca-eletronica-na-capital-paulista/
02/08/2019 - Governo de SP fará Missão China para ampliar cooperação e atrair investimentos https://www.saopaulo.sp.gov.br/spnoticias/governo-de-sao-paulo-detalha-objetivos-da-missao-china/
20/11/2019 - Doria se encontra com chineses das gigantes CREC e CRCC e oferece concessões de rodovia, metrô e ferrovia https://diariodotransporte.com.br/2019/11/20/doria-se-encontra-com-chineses-das-gigantes-crec-e-crcc-e-oferece-concessoes-de-rodovia-metro-e-ferrovia/
25/01/2020 - "Chineses serão agressivos" nas privatizações em SP até 2022, afirma Dória https://noticias.uol.com.br/colunas/jamil-chade/2020/01/25/entrevista-joao-doria-privatizacoes-sao-paulo-china.htm
O governador de São Paulo, João Doria, afirma que vai acelerar os programas de desestatização no estado em 2020 e acredita que concessões e vendas poderão permitir uma arrecadação de pelo menos R$ 40 bilhões. Nesse processo, o governador avalia que a China deve atuar de forma agressiva e que aprofundará sua posição de maior parceira comercial do estado, se distanciando de americanos e argentinos.
29/06/2020 - Doria estabelece multa para quem estiver sem máscara na rua em SP https://veja.abril.com.br/saude/doria-estabelece-multa-para-quem-estiver-sem-mascara-na-rua/
24/12/2020 - Doria é flagrado sem máscara e fazendo compras em Miami https://pleno.news/brasil/politica-nacional/doria-e-flagrado-sem-mascara-e-fazendo-compras-em-miami.html
"Foto do governador de São Paulo sem o item de proteção viralizou nas redes"
07/06/2021 - Doria é criticado na internet por tomar sol sem máscara em hotel no Rio https://vejasp.abril.com.br/cidades/doria-e-criticado-na-internet-por-tomar-sol-sem-mascara-em-hotel-no-rio/
30/09/2020 - Governo de SP assina contrato com Sinovac e prevê vacina para dezembro https://agenciabrasil.ebc.com.br/saude/noticia/2020-09/governo-de-sp-assina-contrato-com-sinovac-e-preve-vacina-para-dezembro
O governador de São Paulo, João Doria, e o vice-presidente da laboratório chinês Sinovac, Weining Meng, assinaram hoje (30), um contrato que prevê o fornecimento de 46 milhões de doses da vacina CoronaVac para o governo paulista até dezembro deste ano.
O contrato também prevê a transferência tecnológica da vacina da Sinovac para o Instituto Butantan, o que significa que, o instituto brasileiro poderá começar a fabricar doses dessa vacina contra o novo coronavírus. O valor do contrato, segundo o governador João Doria é de US$ 90 milhões.
20/10/2020 - Coronavac terá mais de 90% de eficácia, afirmam integrantes do governo paulista https://www.cnnbrasil.com.br/saude/2020/12/20/coronavac-tera-mais-de-90-de-eficacia-afirmam-integrantes-do-governo
24/10/2020 - Não esperamos 90% de eficácia da Coronavac’, diz secretário de saúde de SP https://www.cnnbrasil.com.br/saude/2020/12/24/nao-esperamos-90-de-eficacia-da-coronavac-diz-secretario-de-saude-de-sp
07/01/2021 - Vacina do Butantan: eficácia é de 78% em casos leves e 100% em graves https://www.cnnbrasil.com.br/saude/2021/01/07/vacina-do-butantan-eficacia-e-de-78-em-casos-leves-e-100-em-graves
09/01/2021 - Não é hora de sermos tão cientistas como estamos sendo agora https://g1.globo.com/sp/sao-paulo/video/nao-e-hora-de-sermos-tao-cientistas-como-estamos-sendo-agora-diz-secretario-de-saude-de-sp-9166405.ghtml
10/01/2021 - Dados da Coronavac relatados à Anvisa não estão claros, diz médico https://www.cnnbrasil.com.br/saude/2021/01/10/dados-da-coronavac-relatados-a-anvisa-nao-estao-claros-diz-medico
"O diretor do Laboratório de Imunologia do Incor, Jorge Kalil, reforçou que faltaram informações sobre a Coronavac nos dados divulgados à Anvisa"
12/01/2021 - New Brazil data shows disappointing 50,4% efficacy for China’s Coronavac vaccine [Novos dados do Brasil mostram eficácia decepcionante de 50,4% para a vacina CoronaVac da China] https://www.reuters.com/article/us-health-coronavirus-brazil-coronavirus/new-brazil-data-shows-disappointing-504-efficacy-for-chinas-coronavac-vaccine-idUSKBN29H2CE
13/01/2021 - Eficácia da Coronavac: 50,38%, 78% ou 100%? https://blogs.oglobo.globo.com/lauro-jardim/post/5038-78-ou-100.html
“De acordo com interlocutores que participaram tanto do anúncio de ontem como da semana passada, quem pressionou para que os dados de 78% e 100% fossem liberados foi João Dória.”
07/05/2021 - Covid-19: Doria toma primeira dose da vacina CoronaVac https://veja.abril.com.br/saude/covid-19-doria-toma-primeira-dose-da-vacina-coronavac/
04/06/2021 - Doria é vacinado com a segunda dose da CoronaVac em São Paulo https://noticias.uol.com.br/politica/ultimas-noticias/2021/06/04/doria-e-vacinado-com-a-segunda-dose-da-coronavac-em-sao-paulo.htm
15/07/2021 - Doria testa positivo para a Covid-19 pela 2ª vez https://www.correiobraziliense.com.br/politica/2021/07/4937833-doria-testa-positivo-para-covid-19-pela-segunda-vez.html
"Governador de São Paulo já havia sido diagnosticado com a doença no ano passado. Ele diz que, apesar da infecção, se sente bem, o que atribui ao fato de ter sido vacinado com duas doses da Coronavac"
06/08/2021 - CPI recebe investigação contra Doria por compra de máscara sem licitação https://www.conexaopoder.com.br/nacional/cpi-recebe-investigacao-contra-doria-por-compra-de-mascara-sem-licitacao/150827
"Empresa teria usado o nome de Alexandre Frota para vender máscaras ao governo de SP. Doria nega informação"
Renan Filho
(filho do Renan Calheiros)
25/07/2019 - Governador Renan Filho vai à China em busca de investimentos para o estado https://www.tnh1.com.br/videos/vid/governador-renan-filho-vai-a-china-em-busca-de-investimentos-para-o-estado/
20/03/2020 - Governadores do NE consultam China e pedem material para tratar covid-19 https://noticias.uol.com.br/saude/ultimas-noticias/redacao/2020/03/20/governadores-do-ne-consultam-china-e-pedem-material-para-tratar-covid-19.htm
5. Narrativas, restrições e proibições
17/12/2020 - STF decide que vacina contra a covid pode ser obrigatória, mas não forçada https://noticias.uol.com.br/saude/ultimas-noticias/redacao/2020/12/17/stf-julga-vacinacao-obrigatoria.htm?cmpid=copiaecola
"O STF (Supremo Tribunal Federal) decidiu, em julgamento hoje, que o Estado pode determinar a obrigatoriedade da vacinação contra a covid-19. Porém fica proibido o uso da força para exigir a vacinação, ainda que possam ser aplicadas restrições a direitos de quem recusar a imunização.
Dez ministros foram favoráveis a obrigatoriedade da vacinação, que poderá ser determinada pelo governo federal, estados ou municípios. As penalidades a quem não cumprir a obrigação deverão ser definidas em lei."
27/07/2021 - Saiba que países estão adotando 'passaporte da vacina' para suspender restrições https://www.cnnbrasil.com.br/internacional/2021/07/27/saiba-que-paises-estao-adotando-passaporte-da-vacina-para-suspender-restricoes
" - Israel - Uniao Europeia - Áustria - Dinamarca - Eslovênia - França - Grécia - Irlanda - Itália - Letônia - Lituânia - Luxemburgo - Holanda - Portugal - Japão - Coreia do sul"
18/06/2021 - O que é o passaporte da vacina que Bolsonaro quer vetar? https://noticias.uol.com.br/politica/ultimas-noticias/2021/06/18/uol-explica-o-que-e-o-passaporte-da-vacina-que-opoe-bolsonaro-e-damares.htm
"O Brasil poderá ter um certificado de imunização futuramente. Aprovado no Senado na semana passada, o "passaporte da vacina", como é chamado, prevê identificar pessoas vacinadas para que entrem em locais públicos ou privados com possíveis restrições."
6. Vacinas
Alegações iniciais
- CoronaVac, Oxford e Pfizer: veja diferenças entre as vacinas contra covid noticias.uol.com.br/saude/ultimas-noticias/redacao/2021/05/11/diferencas-vacinas-covid-brasil.htm
" - CoronaVac (Butantan/Sinovac - Chinesa) Com virus inativo 50,38% de eficácia 2 doses
-
Covishield - 'AstraZeneca' (Fiocruz/Astrazenica/Oxford - Britânica) Com virus não replicante 67% de eficácia 2 doses
-
ComiRNAty - 'Pfizer' (Pfizer - Americana / BioNTech - Alemã) Com RNA mensageiro 96% de eficácia 2 doses"
Riscos diretos
15/06/2021 - Trombose após vacinação com AstraZeneca: Quais os sintomas e como se deve atuar? https://www.istoedinheiro.com.br/trombose-apos-vacinacao-com-astrazeneca-quais-os-sintomas-e-como-se-deve-atuar/
"Agências europeias estão reticentes com a vacina da AstraZeneca. Ela chegou a ser desaconselhada a pessoas com idade inferior a 60 anos, e um alto funcionário da Agência Europeia de Medicamentos declarou que era melhor deixar de administrar a vacina deste laboratório em qualquer idade quando há alternativas disponíveis, devido aos relatos de trombose após a primeira dose, apesar de raros."
11/05/2021 - CoronaVac, Oxford e Pfizer: veja diferenças entre as vacinas contra covid https://noticias.uol.com.br/saude/ultimas-noticias/redacao/2021/05/11/diferencas-vacinas-covid-brasil.htm
"Na terça-feira (12), o Ministério da Saúde determinou a suspensão da aplicação da vacina de Oxford/AstraZeneca para gestantes e puérperas com comorbidades. A decisão segue recomendação da Anvisa, que apura a morte de uma grávida de 35 anos que tomou o imunizante e teve um AVC (acidente vascular cerebral)."
30/07/2021 - Pfizer representa o mesmo risco de trombose que a Astrazeneca, aponta levantamento https://panoramafarmaceutico.com.br/pfizer-representa-o-mesmo-risco-de-trombose-que-a-astrazeneca-aponta-levantamento/
7. CRIMES
Crimes da Pfizer
18/11/2020 Não listado no google - Os Crimes documentados da produtora de vacinas de Covid - Pfizer [INGLÊS] https://www.dmlawfirm.com/crimes-of-covid-vaccine-maker-pfizer-well-documented/
"A velocidade com que a vacina Covid da Pfizer foi produzida, a ausência de estudos em animais, testes de controle randomizados e outros testes e procedimentos padrão usuais para um novo medicamento são, no mínimo, preocupantes. Além disso, todos os fabricantes de vacinas Covid receberam imunidade legal para quaisquer ferimentos ou mortes que possam causar. Se essas vacinas são tão seguras quanto promovidas, por que seus fabricantes precisam de imunidade geral?"
"A Pfizer, uma empresa farmacêutica que parece ter ganhado na loteria para produzir a primeira vacina Covid-19, está atualmente lutando contra centenas de ações judiciais sobre o Zantac, um popular medicamento contra azia. Os processos da Zantac afirmam que a droga popular pode estar contaminada com uma substância cancerígena chamada N-nitrosodimetilamina (NDMA). Os processos Zantac são em aberto e em andamento, já que a farmacêutica está lutando contra eles; mas a Pfizer, sabemos, cometeu vários crimes ou transgressões pelos quais foi punida nos últimos anos. As falhas da empresa estão bem documentadas e vale a pena revisá-las neste momento crítico da história da humanidade, enquanto todos nós buscamos respostas."
A Pfizer recebeu a maior multa da história dos Estados Unidos como parte de um acordo judicial de US $ 2,3 bilhões com promotores federais por promover medicamentos erroneamente (Bextra, Celebrex) e pagar propinas a médicos complacentes. A Pfizer se confessou culpada de falsificar a marca do analgésico Bextra, promovendo o medicamento para usos para os quais não foi aprovado.
Na década de 1990, a Pfizer estava envolvida em válvulas cardíacas defeituosas que causaram a morte de mais de 100 pessoas. A Pfizer enganou deliberadamente os reguladores sobre os perigos. A empresa concordou em pagar US $ 10,75 milhões para acertar as acusações do departamento de justiça por enganar reguladores.
A Pfizer pagou mais de US $ 60 milhões para resolver um processo sobre o Rezulin, um medicamento para diabetes que causou a morte de pacientes de insuficiência hepática aguda.
No Reino Unido, a Pfizer foi multada em quase € 90 milhões por sobrecarregar o NHS, o Serviço Nacional de Saúde. A Pfizer cobrou do contribuinte um adicional de € 48 milhões por ano, pelo que deveria custar € 2 milhões por ano.
A Pfizer concordou em pagar US $ 430 milhões em 2004 para resolver acusações criminais de que havia subornado médicos para prescrever seu medicamento para epilepsia Neurontin para indicações para as quais não foi aprovado. Em 2011, um júri concluiu que a Pfizer cometeu fraude em sua comercialização do medicamento Neurontin. A Pfizer concordou em pagar $ 142,1 milhões para liquidar as despesas.
A Pfizer revelou que pagou quase 4.500 médicos e outros profissionais médicos cerca de US $ 20 milhões por falar em nome da Pfizer.
Em 2012, a Comissão de Valores Mobiliários dos Estados Unidos - anunciou que havia chegado a um acordo de US $ 45 milhões com a Pfizer para resolver acusações de que suas subsidiárias haviam subornado médicos e outros profissionais de saúde no exterior para aumentar as vendas no exterior.
A Pfizer foi processada em um tribunal federal dos Estados Unidos por usar crianças nigerianas como cobaias humanas, sem o consentimento dos pais das crianças. A Pfizer pagou US $ 75 milhões para entrar em acordo no tribunal nigeriano pelo uso de um antibiótico experimental, o Trovan, nas crianças. A empresa pagou um valor adicional não divulgado nos Estados Unidos para liquidar as despesas aqui. A Pfizer violou o direito internacional, incluindo a Convenção de Nuremberg estabelecida após a Segunda Guerra Mundial, devido aos experimentos nazistas em prisioneiros relutantes.
Em meio a críticas generalizadas de roubar os países pobres em busca de drogas, a Pfizer prometeu dar US $ 50 milhões para um medicamento para a AIDS para a África do Sul. Mais tarde, no entanto, a Pfizer falhou em honrar essa promessa.
- Pfizer contract leaked!
[Contrato da Pfizer vazado]
http://sanjeev.sabhlokcity.com/Misc/LEXO-KONTRATEN-E-PLOTE.pdf
Segundo o contrato "o produto não deve ser serializado":
"5.5 Reconhecimento do comprador.
O Comprador reconhece que a Vacina e os materiais relacionados à Vacina, e seus componentes e materiais constituintes estão sendo desenvolvidos rapidamente devido às circunstâncias de emergência da pandemia de COVID-19 e continuarão a ser estudados após o fornecimento da Vacina ao Comprador nos termos deste Contrato. O Comprador reconhece ainda que os efeitos de longo prazo e eficácia da Vacina não são atualmente conhecidos e que pode haver efeitos adversos da Vacina que não são atualmente conhecidos. Além disso, na medida do aplicável, o Comprador reconhece que o Produto não deve ser serializado."
Crimes da AstraZeneca
21/06/2003 - AstraZeneca se declara culpada no esquema de médico de câncer https://www.nytimes.com/2003/06/21/business/astrazeneca-pleads-guilty-in-cancer-medicine-scheme.html
"A AstraZeneca, a grande empresa farmacêutica, se declarou culpada hoje de uma acusação de crime de fraude no sistema de saúde e concordou em pagar $ 355 milhões para resolver as acusações criminais e civis de que se envolveu em um esquema nacional para comercializar ilegalmente um medicamento contra o câncer de próstata.
O governo disse que os funcionários da empresa deram incentivos financeiros ilegais a cerca de 400 médicos em todo o país para persuadi-los a prescrever o medicamento Zoladex. Esses incentivos incluíram milhares de amostras grátis de Zoladex [...]"
27/04/2010 - Farmacêutica gigante AstraZeneca pagará US $ 520 milhões pelo marketing de medicamentos off-label https://www.justice.gov/opa/pr/pharmaceutical-giant-astrazeneca-pay-520-million-label-drug-marketing
"AstraZeneca LP e AstraZeneca Pharmaceuticals LP vão pagar $ 520 milhões para resolver as alegações de que a AstraZeneca comercializou ilegalmente o medicamento antipsicótico Seroquel para usos não aprovados como seguros e eficazes pela Food and Drug Administration (FDA), os Departamentos de Justiça e Saúde e Serviços Humanos A Equipe de Ação de Fiscalização de Fraudes em Saúde (HEAT) anunciou hoje. Esses usos não aprovados também são conhecidos como usos "off-label" porque não estão incluídos no rótulo do medicamento aprovado pela FDA."
- List of largest pharmaceutical settlements [Lista dos maiores acordos farmaceuticos] https://en.m.wikipedia.org/wiki/List_of_largest_pharmaceutical_settlements
8. CIENTISTAS
- Máscara Provoca Insuficiência Respiratória E Contaminação Microbiana… [Canal deletado] https://youtube.com/watch?v=eHu-pydSvDI
Não lembro mais a quem pertencia, mas provavelmente era de um médico falando do assunto. Creio ter sido do Dr. Paulo Sato, por essa temática ter sido abordada por ele, mas ao abrir o site aparece somente:
"Este vídeo foi removido por violar as diretrizes da comunidade do YouTube"
Dr. Paulo Sato
- USAR ou NÃO USAR a CUECA do seu governador no rosto https://fb.watch/7NPP_7rS5S/ https://www.facebook.com/AdoniasSoaresBR/videos/1347904292291481/ Adonias Soares entrevista ao Dr. Paulo Sato sobre as máscaras, em que é simulado o efeito da respiração prolongada das máscaras no organismo com o uso de águas de torneira, natural, gaseificada (com gás carbônico) e antioxidante, em que a com gás carbônico (PH 4 - Ácido) representa o organismo humano, e na prática representa lesão corporal e iniciação de doenças.
Dr. Kary Mullis
(Criador do teste PCR)
- PCR nas palavras do seu inventor - Dr. Kary Mullis (legendado) https://www.youtube.com/watch?v=W1O52uTygk8
"Qualquer um pode testar positivo para quase qualquer coisa com um teste de PCR, se você executá-lo por tempo suficiente… Com PCR, se voce fizer isso bem, você pode encontrar quase tudo em qualquer pessoa… Isso não te diz que você está doente."
- Kary Mullis DESTRUYE a Anthony Fauci lbry://@CapitalistChile#0/Kary-Mullis---Fauci#5
"Ele [...] não entende de medicina e não deveria estar onde está. A maioria dos que estão acima são só administrativos e não têm nem ideia do que ocorre aqui em baixo e essas pessoas tem uma agenda que não é a que gostaríamos que tivessem, dado que somos nós os que pagamos a eles para que cuidem da nossa saúde. Têm uma agenda pessoal."
Dra. Li-Meng Yan
- Dra. Li-Meng Yan: O vírus foi criado em laboratório com um objetivo: Causar dano. https://youtu.be/pSXp3CZnvOc
Dr. Joe Roseman
- Cientista Phd Dr Joe Roseman faz seríssimas advertencias sobre a picada https://youtu.be/0PIXVFqJ_h8
Dr. Robert Malone
- As vacinas podem estar causando ADE - Dr. Robert Malone https://odysee.com/@AkashaComunidad:f/Las_vacunas_pueden_estar_causando_ADE_magnificaci%C3%B3n_mediada_por:f lbry://@Información.#b/Drrm#9
Dr. Robert Malone, um dos três inventores da tecnologia de RNAm que se usa de forma farmacêutica. No vídeo fala sobre os efeitos de ADE (realce dependente de anticorpos) que estão ocorrendo com as vacinas. Nas palavras do Dr. Malone, já não é somente uma hipótese, mas baseada nos conhecimentos gerados nas provas e ensaios pré clínicos, com as vacinas contra o primeiro vírus da SARS.
Dr. Luc Montagnier
- Dr. Luc Montagnier, virologista, prêmio Nobel de medicina, um dos descobridores do vírus HIV, afirma: "a vacinação em massa está criando as novas variantes' (@medicospelavida , telegram)
CASOS DOCUMENTADOS
13/09/2021 - 13 de setembro de 2021 - Carta aberta ao Ministro da Saúde por Arlene Ferrari Graf, mãe de Bruno Oscar Graf https://telegra.ph/Carta-aberta-ao-Ministro-da-Sa%C3%BAde-09-13
Também em: Gazeta do Povo
O texto de uma mãe discorrendo sobre o filho dela, Bruno Oscar Graf, ter ANTI-HEPARINA PF4 AUTO-IMUNE e ter vindo a falecer por reação à vacina.
11/05/2021 - Rio notifica morte de grávida vacinada com imunizante Oxford https://www.terra.com.br/noticias/coronavirus/rio-notifica-morte-de-gravida-vacinada-com-imunizante-oxford,415b9b0c49169427ac2f90ae3765c057e9suy3qn.html
"Vítima não apresentava histórico de doença circulatória nem sofria de nenhuma doença viral; relação será investigada"
13/08/2021 - Cruzeiro com 4.336 pessoas tem 27 contaminados com Covid-19 em Belize https://paranaportal.uol.com.br/geral/cruzeiro-com-4-336-pessoas-tem-27-contaminados-com-covid-19-em-belize/amp/
"Segundo um comunicado do Conselho de Turismo de Belize emitido na quarta-feira (11), 26 contaminados são da tripulação e um é passageiro. A maioria é assintomática e os 27 estão vacinados."
9. ALEGAÇÕES DIRETAS
09/2021 - Setembro de 2021 - BOMBA: Ex-membro do Partido Comunista da China revela que o primeiro surto da Covid foi “intencional” https://terrabrasilnoticias.com/2021/09/bomba-ex-membro-do-partido-comunista-da-china-revela-que-o-primeiro-surto-da-covid-foi-intencional/
01/03/2023 - 1 de Março de 2023 - O chefe do FBI, Christopher Wray, diz que vazamento de laboratório na China é muito provável https://www.bbc.com/news/world-us-canada-64806903
26/12/2024 - 26 de Dezembro 2024 - FBI ‘não tem permissão para informar Biden’ sobre a teoria de vazamento de laboratório da Covid https://www.thetimes.com/world/us-world/article/fbi-not-allowed-to-brief-biden-on-covid-lab-leak-theory-8df9mr997
O FBI concluiu com "confiança moderada" que a COVID-19 pode ter sido criada em laboratório, com base em parte na análise genômica conduzida por cientistas do Centro Nacional de Inteligência Médica.
-
@ dab6c606:51f507b6
2025-06-08 09:21:16Dlhšie som sa zaujímal o to ako funguje biznis s míľami, vernostnými bodmi. Zistil som, že to čiastočne môžu robiť iba veľké korporácie kvôli tomu ako to môžu potom zaúčtovať. A je to daňovo super výhodné. Pridal som aj info o vernostných bodoch a darčekových kartách. Text nižšie napísali rôzne AI ako som sa v tom vŕtal, to je v zásade sumár, zdieľam pre tých, ktorých to zaujíma.
Časť I: Vernostné programy veľkých korporácií
Obchodná logika vernostných programov
Vernostné programy leteckých spoločností a hotelov sú sofistikované obchodné nástroje, ktoré slúžia niekoľkým kľúčovým účelom. Primárne fungujú na zvýšenie zákazníckej lojality vytvorením "switching costs" - zákazníci nechcú prísť o nazbierané body, čo znižuje pravdepodobnosť, že prejdú ku konkurencii.
Zároveň sú významným zdrojom dodatočných príjmov. Napríklad American Airlines zarába viac na predaji míľ bankám ako na niektorých leteckých linkách. Keď Citibank kupuje míle za 1-2 centy za míľu, aerolínia získava okamžitý príjem, zatiaľ čo reálna hodnota pre zákazníka môže byť 3-5 centov pri správnom využití.
Účtovné spracovanie vernostných bodov
Z účtovného hľadiska predstavujú vernostné body odložené záväzky. Keď zákazník získa body, spoločnosť musí vytvoriť rezervu na ich budúce uplatnenie. Body sa oceňujú na základe predpokladaných nákladov na ich uplatnenie, nie na základe nominálnej hodnoty.
Kľúčový je rozdiel medzi cash accounting a accrual accounting: - Cash accounting: Príjmy sa uznávajú pri prijatí platby, náklady pri zaplatení. - Accrual accounting: Príjmy a náklady sa uznávajú v momente vzniku záväzku.
Pre vernostné programy je accrual accounting kritické. Keď aerolínia predá míle banke za $1,000,000, vytvorí zároveň záväzok na budúce náklady (povedzme $600,000), takže zdaniteľný príjem je len $400,000.
Príklad: Predaj míľ banke
Aerolínia predá 50 miliónov míľ Citibank za $1,000,000: 1. Okamžitý príjem: $1,000,000 2. Vytvorenie záväzku: $600,000 (odhadované budúce náklady) 3. Zdaniteľný príjem: $400,000 4. Budúce náklady: Keď zákazníci míle využijú, spoločnosť uzná náklad a zníži záväzok
Pozitívna marža vzniká z niekoľkých faktorov: - Breakage - 15-20% míľ sa nikdy neuplatní - Časová hodnota peňazí - Peniaze od banky investuje okamžite - Marginálne náklady - Prázdne sedadlo má nízky prírastok nákladu
Daňová optimalizácia a offshore štruktúry
Veľké spoločnosti často využívajú medzinárodné štruktúry na optimalizáciu daní z vernostných programov. Typická štruktúra zahŕňa: 1. Materská spoločnosť (USA/EU) - Prevádzkuje lety a poskytuje služby (napr. lety alebo ubytovanie). 2. IP Holding (Írsko/Holandsko) - Vlastní duševné vlastníctvo (IP) k loyalty programu, ako sú značky, softvér a databázy. 3. Loyalty Operating Company (Singapur/Dubaj) - Spravuje predaj míľ bankám a partnerom, koordinuje program a komunikuje so zákazníkmi.
Obchodné vzťahy a platby medzi entitami (príklad s pozitívnym výsledkom pre Singapur)
Tieto entity sú prepojené zmluvami, ktoré určujú, kto za čo platí a prečo, aby sa minimalizovala daňová záťaž: - Banka → Singapur (Loyalty Operating Company): Banka (napr. Citibank) platí $1,000,000 za míle, ktoré ponúka svojim klientom ako odmenu za používanie kreditných kariet. Singapurská spoločnosť je hlavný kontaktný bod pre partnerov, pretože je umiestnená v jurisdikcii s nízkou daňou (17 %) a dobrou infraštruktúrou pre finančné služby. - Singapur → Írsko (IP Holding): Singapurská spoločnosť platí $500,000 ako royalty za použitie IP (značky, softvéru a dát) loyalty programu. Táto platba je vysoká, aby sa presunul zisk do Írska, kde je daňová sadzba ešte nižšia (12,5 %). Tým sa znižuje zdaniteľný príjem v Singapure. - Singapur → Materská spoločnosť (Aerolínia): Singapurská spoločnosť platí $300,000 materskej spoločnosti za poskytnutie služieb (napr. letov), keď zákazníci využijú míle. Táto platba je nižšia ako reálne náklady, aby sa minimalizoval zisk v krajine materskej spoločnosti, kde je daňová sadzba vyššia (napr. 25-35 % v USA alebo EU). - Zisk v Singapure: $1,000,000 (príjem od banky) - $500,000 (royalty do Írska) - $300,000 (platba aerolínii) = $200,000 zisku, ktorý je zdanený pri 17 % v Singapure.
Prečo takéto rozdelenie?
- Írsko (IP Holding): Vysoké royalty platby ($500,000) idú do Írska, pretože daňová sadzba 12,5 % je atraktívna a Írsko je považované za "serióznu" jurisdikciu, ktorá spĺňa medzinárodné pravidlá (napr. BEPS). Zároveň má Írsko zmluvy o zamedzení dvojitého zdanenia s mnohými krajinami, čo uľahčuje presun zisku.
- Singapur (Loyalty Operating Company): Predaj míľ a koordinácia programu prebieha v Singapure kvôli priaznivému daňovému prostrediu (17 %) a strategickej polohe pre ázijské trhy. Zároveň sa tu zanecháva malý zisk ($200,000), aby sa preukázala "ekonomická substance" – teda, že spoločnosť má reálnu činnosť.
- Materská spoločnosť: Platba $300,000 je nízka, aby sa minimalizoval zdaniteľný príjem v krajine s vysokou daňovou sadzbou (napr. USA alebo EU).
Prečo nie 0 % daňová jurisdikcia?
Prečo sa nepoužíva krajina s nulovou daňou (napr. Kajmanské ostrovy)? Kvôli: - Regulatory scrutiny - Daňové úrady pozorne sledujú 0 % jurisdikcie a môžu spochybniť legitímnosť. - BEPS pravidlám - Potreba preukázať "substance" (reálne kancelárie, zamestnancov) v krajine. - Credibility testu - 12,5 % v Írsku alebo 17 % v Singapure vyzerá ako legitímna obchodná operácia.
Výsledkom takejto štruktúry je, že väčšina zisku (60-70 %) je zdanená pri 12,5 % v Írsku alebo 17 % v Singapure namiesto 25-35 % v domovskej krajine aerolínky.
Časť II: Loyalty programy a alternatívy pre malé biznisy
Prečo je loyalty program problematický pre malé biznisy
Na rozdiel od veľkých korporácií, malé biznisy ako kaviarne narážajú pri vernostných programoch na zásadný problém: cash accounting povinnosť. V mnohých krajinách musia malé firmy (pod $25M ročne) používať cash accounting, čo znamená: - Príjem z predaja bodov sa zdaní okamžite - Náklady sa odpočítajú až keď zákazník body využije (možno o rok) - Vzniká daňový a cashflow problém - daň sa platí z peňazí, ktoré "stratíte" v budúcnosti
Predstavte si kaviareň, ktorá predá vernostné body za €100. Okamžite musí zaplatiť daň (povedzme €21), ale náklady na kávu poskytnutú za body odpočíta až v budúcnosti.
Alternatívne modely pre malé biznisy
Existujú daňovo výhodnejšie alternatívy:
1. Gift Cards model
- Príjem sa NEUZNÁ pri predaji gift karty
- Príjem sa uzná až keď zákazník kartu využije
- Príklad: Predáte gift cards za €10,000 v decembri, získate cash okamžite, ale daň platíte postupne, ako zákazníci karty využívajú počas nasledujúceho roka.
- Časová hodnota peňazí: Peniaze môžete investovať (napr. 6 % ročne = €600 extra zisk na €10,000)
- Breakage benefit: 2-10 % kariet sa nikdy nevyužije, po určitom čase (3-5 rokov, podľa legislatívy) môžete zostatok uznať ako čistý zisk.
Príklad: Starbucks Starbucks mal v roku 2022 na účtoch $1,5 miliardy v nevyužitých gift cards. Odhadovaný breakage 3 % znamená $45 miliónov čistého zisku – bezúročná pôžička od zákazníkov s bonusom, že časť sa nikdy nevráti.
2. Subscription model
- Mesačný príjem = okamžité zdanenie
- Mesačné náklady = okamžitý odpočet
- Príklad: €10/mesiac za "premium membership" s určitými benefitmi
3. Discount Coupons
- Žiadny príjem pri vydaní kupónu
- Znížený príjem pri uplatnení (predáte za nižšiu cenu)
- Príklad: 20 % zľavový kupón = predaj kávy za €4 namiesto €5
Outsourcing loyalty programu: Podrobnosti o Shopify Loyalty
Platformy ako Shopify Loyalty predstavujú elegantné riešenie pre malé biznisy, ktoré chcú ponúkať vernostné programy bez účtovných a daňových komplikácií. Poďme si to rozobrať podrobne:
Ako funguje Shopify Loyalty
- Shopify ako tretia strana: Shopify vlastní a spravuje celý vernostný program vrátane bodov a softvéru. Zákazník má svoj "účet" priamo u Shopify, nie u konkrétneho obchodu. To znamená, že body nie sú vaším záväzkom, ale záväzkom Shopify.
- Vaša úloha: Vy (napr. kaviareň) platíte Shopify mesačný poplatok (napr. €29) za používanie platformy a malý transakčný poplatok (napr. €0,20) za každé uplatnenie bodov (reward). Vy ste v podstate "dodávateľom služieb" pre Shopify – poskytujete odmeny, keď vám Shopify pošle objednávku.
- Získavanie bodov: Zákazník získava body za nákupy v obchodoch, ktoré sú zapojené do Shopify Loyalty programu. Napríklad, ak zákazník nakúpi kávu za €5 vo vašej kaviarni, Shopify mu pripíše body (napr. 5 bodov za každé euro, teda 25 bodov). Konkrétne pravidlá (koľko bodov za euro) si nastavujete vy cez Shopify platformu, ale technicky body spravuje Shopify.
- Využitie bodov: Zákazník môže body využiť na odmeny (napr. kávu zadarmo za 100 bodov), ale zvyčajne len v obchodoch zapojených do Shopify siete. To znamená, že ak vaša kaviareň používa Shopify Loyalty, body získané u vás môžu byť využité u vás alebo v iných obchodoch v rámci Shopify ekosystému, ak to Shopify umožňuje. Väčšinou však obchody nastavujú program tak, aby boli body využiteľné primárne u nich, čím sa zvyšuje lojalita k ich značke.
- Proces uplatnenia bodov: Keď zákazník chce využiť body (napr. 100 bodov za kávu zadarmo), Shopify pošle objednávku vám (kaviarni) na poskytnutie odmeny. Vy kávu vydáte, ale nedostanete za ňu priamy príjem od zákazníka – ide o marketingový náklad. Zároveň platíte Shopify transakčný poplatok (€0,20). Účtovne to nie je predaj, takže nevzniká zdaniteľný príjem ani povinnosť vystaviť bloček.
- Účtovné spracovanie: Keď zákazník využije body:
- Žiadny bloček = žiadny zdaniteľný príjem
- Náklad kávy (€2) + Shopify fee (€0,20) = €2,20
- Účtuje sa ako "Promotional expenses" alebo "Marketing costs"
Prečo musí byť loyalty program outsourcovaný tretej strane (ako Shopify)?
Malé biznisy nemajú kapacitu ani zdroje na správu vlastného loyalty programu "in-house" z týchto dôvodov: - Daňová a účtovná komplexnosť: Ak by ste spravovali loyalty program sami, museli by ste vytvárať rezervy na budúce záväzky (body, ktoré zákazníci využijú neskôr), odhadovať breakage rate (percento nevyužitých bodov) a riešiť cash vs. accrual accounting. Pre malé firmy, ktoré často musia používať cash accounting, to znamená okamžité zdanenie príjmu, ak by body predávali, ale odpočet nákladov až v budúcnosti – vzniká cashflow nesúlad. - Technologická infraštruktúra: Správa bodov, databáz zákazníkov a integrácia s platobnými systémami vyžaduje sofistikovaný softvér a IT tím, čo je pre malé firmy nákladné a komplikované. - Legálna separácia: Keď program spravuje tretia strana ako Shopify, body sú ich záväzkom, nie vaším. Pre vás to znamená, že nemáte žiadne budúce záväzky vo svojej účtovnej knihe – len mesačné náklady (poplatok Shopify), ktoré sú daňovo odpočítateľné ako bežný výdavok. - Ekonomická efektivita: Shopify združuje tisíce obchodov, čím dosahuje ekonomiku rozsahu – nižšie náklady na softvér, bezpečnosť a správu dát. Malá kaviareň by sama nikdy nedokázala vytvoriť takýto systém za rozumnú cenu.
Prečo to nemôže byť in-house z daňového hľadiska?
Ak by malá firma spravovala loyalty program sama: - Okamžitý daňový problém: Ak by firma predávala body (napr. za peniaze alebo ako súčasť nákupu), príjem by musela zdaniť hneď, hoci náklady na poskytnutie odmien (napr. káva zadarmo) by mohla odpočítať až v momente, keď zákazník body využije. To vytvára cashflow nesúlad, pretože daň platíte skôr, než reálne "stratíte" peniaze na odmenu. - Zložité rezervy: Musela by odhadovať, koľko bodov sa využije, a vytvárať účtovné rezervy, čo je administratívne náročné a vyžaduje drahých účtovníkov alebo softvér. - Riziko chýb: Nesprávne odhady breakage rate alebo zlý manažment záväzkov môžu viesť k daňovým kontrolám a pokutám.
S Shopify sa tieto problémy eliminujú – vy platíte len mesačný poplatok a transakčné fees, ktoré sú jednoducho účtované ako marketingové náklady. Shopify preberá celú zodpovednosť za správu bodov a záväzkov voči zákazníkom.
Prípadová štúdia: Vernostné body pre kaviareň (model 10 + 1 zadarmo)
Pozrime sa na konkrétny prípad malej kaviarne, ktorá ponúka klasický vernostný program typu "10 + 1 zadarmo". Zákazník dostane 1 bod za každú kúpenú kávu (napr. za €3) a po nazbieraní 10 bodov dostane jednu kávu zadarmo. Rozoberieme, ako to funguje účtovne, či ide o "promotional expense" a aký je rozdiel medzi in-house správou a použitím Shopify.
Ako funguje program "10 + 1 zadarmo"
- Získavanie bodov: Zákazník kúpi kávu za €3 a dostane 1 bod (napr. pečiatku na kartičku alebo digitálny záznam). Body nemajú peňažnú hodnotu na predaj – sú čisto odmenou za nákup.
- Využitie bodov: Po nazbieraní 10 bodov (čo znamená nákupy za €30) zákazník dostane kávu zadarmo (hodnota €3).
- Reálny náklad pre kaviareň: Náklad na výrobu kávy zadarmo je nižší ako predajná cena, napr. €1,50 za suroviny a prácu.
Účtovné spracovanie (In-house)
Ak kaviareň spravuje program sama (in-house), účtovný proces závisí od toho, či používa cash accounting (bežné pre malé firmy) alebo accrual accounting: - Cash accounting: - Pri nákupe kávy zákazníkom: Kaviareň účtuje príjem €3 za každú kávu a vydá bloček. Bod (pečiatka) nemá peňažnú hodnotu, takže sa neúčtuje ako záväzok ani príjem. - Pri uplatnení 10 bodov: Keď zákazník dostane kávu zadarmo, nevzniká príjem (€0), ale vzniká náklad na výrobu kávy (€1,50). Tento náklad sa účtuje ako "Promotional expense" alebo "Marketing cost", pretože ide o formu zľavy alebo reklamy na udržanie zákazníka. - Daňový dopad: Žiadny príjem pri vydaní kávy zadarmo, náklad €1,50 je daňovo odpočítateľný ako bežný výdavok. - Accrual accounting (menej bežné pre malé firmy): - Pri nákupe kávy zákazníkom: Kaviareň účtuje príjem €3, ale zároveň vytvára malý záväzok na budúcu odmenu (napr. €0,30 za každý bod, čo je odhad nákladu na budúcu kávu zadarmo deleno 10). Teda z €3 príjmu je zdaniteľný príjem len €2,70. - Pri uplatnení 10 bodov: Keď zákazník dostane kávu zadarmo, kaviareň zníži záväzok o €3 (10 bodov x €0,30) a účtuje náklad €1,50 na výrobu kávy. Rozdiel môže byť upravený ako breakage alebo iný zisk, ak sa odhady líšia od reality. - Daňový dopad: Zdaniteľný príjem je nižší už pri prvom nákupe, ale účtovníctvo je zložitejšie kvôli odhadom a rezervám.
Je to Promotional Expense? Áno, v oboch prípadoch (cash aj accrual) sa náklad na kávu zadarmo účtuje ako "Promotional expense" alebo "Marketing cost", pretože ide o formu zľavy na podporu lojality zákazníkov. Nie je to považované za bežný predaj, pretože nevzniká príjem ani bloček.
Účtovné spracovanie (cez Shopify Loyalty)
Ak kaviareň používa Shopify Loyalty na správu programu "10 + 1 zadarmo", proces je jednoduchší: - Pri nákupe kávy zákazníkom: Kaviareň účtuje príjem €3 za kávu a vydá bloček. Shopify pripíše bod zákazníkovi do jeho účtu (nie je to váš záväzok, ale Shopify). - Pri uplatnení 10 bodov: Shopify pošle objednávku na vydanie kávy zadarmo. Kaviareň vydá kávu (náklad €1,50) a zaplatí Shopify transakčný poplatok (€0,20). Celkový náklad €1,70 sa účtuje ako "Promotional expense" alebo "Marketing cost". - Daňový dopad: Rovnako ako pri in-house, žiadny príjem pri vydaní kávy zadarmo, náklad €1,70 je daňovo odpočítateľný ako bežný výdavok. Navyše nemusíte riešiť žiadne záväzky alebo odhady breakage, pretože body spravuje Shopify.
Rozdiel medzi In-house a Shopify
- In-house:
- Výhody: Plná kontrola nad programom, žiadne mesačné poplatky tretej strane (napr. €29 Shopify fee).
- Nevýhody: Ak použijete accrual accounting, musíte vytvárať rezervy a odhadovať breakage, čo je administratívne náročné. Pri cash accounting je to jednoduchšie (žiadne záväzky), ale ak by ste body predávali za peniaze, vzniká daňový nesúlad (príjem zdanený hneď, náklad až neskôr). Navyše musíte sami spravovať databázu bodov (pečiatky, softvér), čo je časovo náročné.
- Shopify Loyalty:
- Výhody: Žiadne záväzky vo vašej účtovnej knihe, Shopify spravuje body a technológiu. Účtovne je to jednoduché – len mesačný poplatok (€29) a transakčné poplatky (€0,20) ako marketingový náklad. Nemusíte riešiť odhady ani breakage.
- Nevýhody: Platíte mesačné poplatky a transakčné fees, čo zvyšuje náklady (napr. €0,20 navyše za každú kávu zadarmo). Máte menšiu kontrolu nad programom, pretože ho spravuje tretia strana.
Záver pre kaviareň: Program "10 + 1 zadarmo" je účtovne považovaný za Promotional expense v oboch prípadoch (in-house aj Shopify), pretože káva zadarmo je forma marketingu na udržanie zákazníkov. Rozdiel je v administratívnej záťaži a nákladoch – Shopify zjednodušuje účtovníctvo a správu, ale za cenu mesačných poplatkov. In-house je lacnejšie, ale náročnejšie na správu, najmä ak by ste chceli používať accrual accounting alebo predávať body za peniaze.
Záver
Vernostné programy sú sofistikovaný nástroj zákazníckej lojality, ale ich účtovné a daňové aspekty sa výrazne líšia medzi veľkými a malými firmami. Veľké korporácie využívajú accrual accounting a medzinárodné štruktúry na optimalizáciu daní, zatiaľ čo pre malé biznisy sú často výhodnejšie alternatívne modely ako gift cards alebo outsourcing celého programu, ktoré eliminujú daňové a cashflow problémy. Gift cards navyše prinášajú okamžitý cash flow, časovú hodnotu peňazí a breakage benefit, čo z nich robí ideálny nástroj pre podniky všetkých veľkostí. Shopify Loyalty ponúka malým firmám spôsob, ako implementovať vernostný program bez účtovných komplikácií, pretože preberá technickú a právnu zodpovednosť, čím umožňuje sústrediť sa na core biznis. Pre jednoduché programy ako "10 + 1 zadarmo" je účtovný dopad podobný (Promotional expense), ale Shopify zjednodušuje správu za cenu dodatočných poplatkov.
```
```
-
@ 86dfbe73:628cef55
2025-06-08 09:12:43Das Private ist immer nur privat in Bezug zu einem bestimmten oder unbestimmten Gegenüber. Heutzutage steht man vielen Privatheiten und vielen Öffentlichkeiten gegenüber. Was privat ist, bemisst sich an der jeweiligen Relation, in der es als privat festgelegt wurde. Die “Privatsphäre”, die üblicherweise gemeint wird, ist jene Sphäre, die der Staat als privat zu respektieren hat, über deren Grenze er sich also nur in seltenen und jeweils zu begründenden Einzelfällen hinwegsetzen darf.
In anderen Beziehungen hingegen gibt es andere “Privatheiten” — dem Arbeitgeber gegenüber etwa, den Kollegen, ehemaligen Schulfreunden, dem Ehepartner, den Eltern oder Kinder. In all diesen Beziehungen gibt es “ausgeschlossene” Bereiche, die das Private meinen. Die Privatsphäre ist dabei die Sphäre über deren Geheimhaltung man gegenüber dem anderen Partner der Beziehung frei verfügen kann, denn Privatsphäre ist die Möglichkeit, sich der Welt selektiv zu offenbaren.
Wenn nicht reflektiert wird, dass es weitgehend eine veränderte Gesellschaft ist, die sich konstituiert, eine Gesellschaft, die mit der vorherigen nichts aber auch gar nichts mehr gemein hat, weil sich der Begriff des “Privaten” verändert, ausdifferenziert, verschiebt, zerfasert — wird der Privatsphärenschutz nicht zu gewährleisten sein.
Das Problem ist, dass „privat und „öffentlich“ alleine nicht funktionieren. Zwischen Privat und Öffentlich gehört – abgeleitet aus dem Begriff des „Social Web“ das Soziale. Und zwischen scheinbar einheitlicher privater „Identität“ und öffentlicher „Person“ gehört ein Bündel an Socialities.
Schon vor dem Netz zersplitterte der moderne, flexible und mobile Mensch in ein Bündel von (nicht: Identitäten sondern) Socialitäten. Das heißt in ein Bündel von Verhaltensweisen, die mehr oder minder bewusst in Beziehung zu bestimmten anderen Socii eingenommen werden. Es ist eine rein kommunikative Größe. Die Socialität eines Arbeitnehmers deckt sich nicht mit der Sozialität des Ehegatten, Vaters usw.
In jeder dieser Beziehungen ist eine andere, zumeist bewusst zu lernende Sozialität vonnöten. Selbst gegenüber Vorgesetzten, gleichrangigen Kollegen und Untergebenen sind mindestens dreierlei Socialitäten am Werke. Denn diese Socialität ist nicht einfach die soziologische „Rolle“, die ein Pluriversum von angenommenen Identitäten unterstellt. Sondern sie ist Ergebnis einer Kommunikationsbeziehung.
Online-Socialitäten
Das Private ist kein kohärente Sphäre, sondern wird durch die Socialität erschaffen. Es ist das, was in der Socialität nicht vorkommt – oder die Qualität der Socialität entscheidend verändert – etwa wenn eine Beziehung zu einer Kollegin/einem Kollegen beginnt (die in der Socialität der Ehegatten wiederum vermutlich nichts zu suchen hat …), sich eine Exfreundin als neue Kundin vorstellt, ein ehemaliger Schulkamerad Chef wird usw. Was „das Private“ ist, lässt sich nicht fassen.
Bei Facebook beispielsweise connectet sich der User mit Familienangehörigen, Freunden, vielleicht ehemaligen Schulfreunden, Kollegen, ggf. Vorgesetzen – und mit Geschäftspartnern oder Kunden. Das heißt: Ein großes Socialitätenbündel vereinigt sich.
Das kann zu größeren Problemen führen, denn die Socialität etwa des Geschäftspartners stellt andere Anforderungen als der ehemalige Klassenkamerad. Die Socialität des Kollegen stellt andere Anforderungen als die der Geschwister.
Die Bündelungsmöglichkeiten durch Personensuchen stellt vor eine ganz andere Herausforderung. Das Multiversum der Socialitäten, das unter verschiedenen Pseudonymen oder doch zumindest auf verschiedenen Plattformen ausgetragen wurde – wird nun plötzlich in ein „Image“ zusammengeführt, das natürlich vorne und hinten inkongruent ist, weil kein gemeinsamer „Kern“, keine einfache „Identität“ vorhanden ist.
Streetview und die Socialität
Schon jetzt nutzen Auskunfteien wie SchuFa oder Creditreform die Wohngegend um Kreditwürdigkeiten zu berechnen. Schon jetzt klassifizieren die Telefonrechner in Callcentern die „Wertigkeit“ eines eingehenden Anrufs per Telefonnummer nach Wohnlage.
Das macht in dieser Socialität "Versicherung-Kunde" einen gewaltigen Unterschied. Und der Kunde hat keinerlei Macht über die Informationen, die der anderen Seite der Socialität verfügbar sind. Die Entscheidung, dass etwas privat sei, zieht nach sich, dass ich es aus einer Socialität exkludiere. „Privat“ bedeutet vor allem „Verzeihung, das ist mir zu privat, darüber gebe ich keine Auskunft“. Und derlei Privatheiten gibt es zu viele – was privat ist, bestimmt die Socialität. Privatsphäre gegenüber dem Kollegen ist eine andere als gegenüber der Vorgesetzten, als gegenüber dem Kunden, als gegenüber dem ehemaligen Schulfreund.
Wie damit umgehen? Das Netz verlassen oder eine eigene „Netzsocialität“ erschaffen, die von vornherein eine inszenierte Kunstfigur ist? Nichts von alledem ist hilfreich. Deswegen kann die Lösung nur aus einer gesamtgesellschaftlichen Debatte rund um die Socialitäten kommen. Und muss sich fragen: Wie soll das Netz sein und funktionieren? Wer soll was einsehen können?
-
@ 37666b60:3698ff14
2025-06-06 15:29:50Hello
-
@ 0b118e40:4edc09cb
2025-06-06 14:08:06The idea of Bitcoin as an internet native currency, and eventually a global one, is coming to life slowly. But historically, the idea of global currency has haunted the world’s financial imagination for nearly a century.
From Keynes’s Bancor in 1944 to Zhou Xiaochuan’s post-crisis proposal in 2009 to today’s renewed debates, the idea resurfaces every time the global economy fractures.
Could this time be different with Bitcoin?
I decided to trace the idea of global currency through several decades and books. I may have missed some parts, so feel free to add. I’ll keep this brief and leave the books I’ve read below.
In the beginning
It all started on July 1, 1944. 730 delegates from 44 Allied nations, including major powers like the US, UK, Soviet Union, China, and France, gathered at the Mount Washington Hotel in Bretton Woods, New Hampshire. They spent 2 weeks figuring out how the new international monetary and financial system would be, post WW2
After WW1, the treaty of Versailles was needed, but imposed harsh reparations that devastated economies and contributed to the rise of fascism, such as Hitler, Mussolini and gang.
So when folks met up in 1944 (WW2 was almost ending), the goal was to prevent another Great Depression, another global conflict and build a stable global economic order.
2 main proposals were discussed in Bretton Woods.
-
John Maynard Keynes, representing the UK, proposed the creation of a global currency called Bancor. It will be issued through a global central bank known as the International Clearing Union (ICU).
-
Harry Dexter White, representing the US, promoted a dollar-based system. Countries would peg their currencies to the US. dollar backed by gold. He also led the creation of the IMF and the World Bank.
To understand how both of these proposals work, let's look at an example.
-
Country A (Germany): Massive exporter
-
Country B (USA): Massive importer
-
Country C (Brazil): Balanced trade (imports = exports)
***Based on Dexter’s model and the current USD-based system, ***
Say Germany sells $1B worth of cars to the US. The US pays in dollars, increasing its trade deficit. Germany accumulates dollars as reserves or buys the US Treasury bonds. Over time, the US continues running trade deficits, while Germany keeps hoarding dollars. Hence the unsustainable debt of the US.
***In Keynes’s Bancor system, ***
If Germany sells $1B worth of cars to the US, then the US does not pay in dollars. Instead, the ICU credits Germany with 1B Bancors and debits the US with -1B Bancors.
The ICU police this. If Germany exceeds the surplus threshold, it pays interest or penalties to discourage hoarding. If the US exceeds its deficit threshold, it is warned to rebalance trade or face restrictions.
Here, Germany is incentivized to import more (e.g., from Brazil) or invest in global development. The US is encouraged to export more or reduce consumption. Brazil, with balanced trade, enjoys stability in Bancor flows and avoids pressure.
The idea behind Bancor was a zero-sum balancing act. No country could become “too big to fail” due to excessive deficits. But it was too complicated and idealistic in assuming every country could maintain balanced trade.
Dexter on the other hand had a few tricks up his sleeve. In the end, Dexter’s USD dominance proposal was adopted.
The Bretton Woods system established the US dollar as the central global currency
Why did dollar dominance win over Bancor?
Simplicity often wins over complexity. But more so ICU felt too centralized, asking nations to surrender economic autonomy to a global body. That didn’t sit well in a post-war world where sovereignty was non-negotiable. That and idealist economic trade balance views.
Dexter’s dollar-based system on the other hand wasn’t fair play at all. It was centralized and authoritarian in its design.
So how did Dexter pull it off?
They had gold. They were ahead in economic recovery.
And they had nuclear weapons.
At the time, the US held nearly 2/3 of the world’s gold reserves. It was a significant advantage in advocating for a gold-backed dollar as the bedrock of global trade.
The US proposed a fixed gold peg at $35 per ounce.
From a broader geopolitical backdrop, the global population in 1944 was about 2.3 billion, a fraction of today’s 8 billion. The world was far less interconnected. The war had devastated Europe, Russia, and much of Asia. Infrastructure, economies, and entire cities were in ruins. The US, by contrast, had faced far fewer casualties and damages. Being geographically isolated, it had minimal domestic losses, around a tenth of what Europe suffered, and its economy was poised to rebuild faster.
But gold dominance and economic recovery alone didn’t secure US financial dominance.
American scientific breakthroughs had already signaled global power. Physicists like Leo Szilard and Albert Einstein, who had fled Europe, helped develop nuclear weapons. Their intent was deterrence, not destruction. But once the bomb existed, it changed geopolitics overnight. The US had military dominance. And after Hiroshima and Nagasaki in 1945, it became the undisputed superpower.
In the end, the USD won and the vision for neutral global currency faded.
And 20 years passed on…
France sends its warship to the US
Under Bretton Woods, countries could exchange dollars for gold, but the US had been printing more dollars than it had gold to back it. And it used it to fund the costly Vietnam War and domestic programs like the Great Society under LBJ.
Belgian-American economist Robert Triffin pointed out a fatal flaw in the Bretton Woods system that came to be known as the Triffin dilemma.
-
The world needed US dollars for liquidity and trade.
-
But the more dollars the US pumped out, the less credible its gold promise became.
Yet the US kept promising that every dollar was still convertible to gold at $35 per ounce.
French President Charles de Gaulle saw this as financial imperialism. He called it the “exorbitant privileged position”. The world had to pay for what they bought with the money they have, but not the US.
So in 1965, France did something unexpected. It sent a warship to New York Harbor to physically retrieve French gold reserves held by the Federal Reserve.
Would it have escalated to war? Maybe. But likely not. It was perhaps more of a diplomatic theatre and a sovereign flex. France was exercising its right under the Bretton Woods agreement to convert dollars into gold. But doing it with military formality was to send a signal to the world that they don’t trust the US system anymore.
It was one of the first major public blows to the dollar’s credibility. And France wasn’t alone. Other countries like West Germany and Switzerland followed suit, redeeming dollars for gold and draining US reserves.
The Nixon shock
Given they did not have enough gold, the IMF introduced Special Drawing Rights (SDRs) in 1969. SDRs were an international reserve asset, created to supplement gold and dollar reserves. Instead of relying solely on the US dollar, SDRs were based on a basket of major currencies (originally gold-backed but later diversified).
The idea was to reduce the world’s dependence on the dollar and avoid a liquidity crisis. But SDRs were a little too late and a little too weak to solve the underlying problem.
By 1971, the US could no longer sustain the illusion. President Nixon “closed the gold window,” suspending dollar convertibility to gold.
The Bretton Woods collapsed and this marked the beginning of fiat money dominance.
The French pursuit
While France demanded justice in one corner of the world, the French franc, specifically the CFA franc, has been dominant in parts of Africa since 1945, long before 1971.
After WWII, France created two CFA franc zones:
-
West Africa: Communauté Financière Africaine (XOF)
-
Central Africa: Coopération Financière en Afrique Centrale (XAF)
These zones included 14 African countries, many of which were former French colonies. France maintained monetary control via currency convertibility guarantees and representation in African central banks. Till today it has influence over these country’s monetary policy.
Colonisation hasn't ended in some parts of the world.
Did countries stop using the USD after the Nixon shock 1971?
Nope. The US dollar was no longer convertible to gold and it dismantled the fixed exchange rate system. But most countries did not stop using the USD as their dominant reserve or trade currency. There were no decent alternatives. Instead, they floated their currencies or maintained a soft peg to the dollar or a basket of currencies.
The USD remained dominant in oil trade (OPEC priced oil in USD) - petrodollar deal, global debt markets and FX reserves (central banks kept holding USD).
In 1997, when many Southeast Asian countries were still pegged to the USD, Soros claimed that SEA will tank. The US further increased its credit rates leading to capital flight and eventual tanking of these countries leading to Asian Financial Crisis '97. Many financial crisis has similar vibe.
The 1999 Euro launch
The idea of a shared currency appeared again, this time through the forms of Euro. It was a mandatory system for member states of the Eurozone, and came with centralized authority, the European Central Bank (ECB), which controlled monetary policy for all participating nations.
At first glance, the euro seemed like a win. It eliminated exchange rate fluctuations, making trade within the Eurozone smoother. It gave weaker economies access to lower borrowing costs and helped Europe establish itself as a financial heavyweight. Today, the euro is the second most-used reserve currency after the US dollar.
But it came at a cost. Countries that adopted the euro lost monetary sovereignty and could no longer print their own money or adjust interest rates to respond to local crises. This became painfully clear during Greece’s debt crisis, where strict monetary policies prevented the country from devaluing its currency to recover. The one-size-fits-all approach meant that economies as different as Germany and Greece had to follow the same rules, often to the detriment of weaker nations. Debt-ridden countries like Italy and Spain were forced into harsh austerity measures because they could not manipulate their currency to ease financial strain. Meanwhile, richer nations like Germany and the Netherlands felt they were unfairly propping up struggling economies, creating political tension across the EU.
In recent years, the euro has faced pressure from global trade tensions, monetary tightening, and geopolitical instability contributing to market volatility and periodic depreciation against other major currencies.
The Bretton Woods 2.0
Believe it or not, after all that, there was a call for Bretton Woods 2.0. Yet another global currency dream.
When the housing market collapsed in 2008 followed by a series of domino effects, global banks froze lending, economies contracted, and panic set in. The crisis exposed how fragile the international financial system had become as it was overly reliant on debt, under-regulated, and centered around the US dollar.
Many countries, especially in the Global South and emerging markets, started to question whether a system built around a single national currency was sustainable.
China, for instance, had been holding huge amounts of US debt while the US printed more dollars through bailouts and quantitative easing. This created global imbalances as exporting nations were lending money to the US to keep the system running, while taking on the risk of dollar depreciation.
In 2009, China’s central bank openly proposed replacing the US dollar with a neutral global reserve currency suggesting SDRs (Special Drawing Rights) issued by the IMF instead.
These concerns led to a wave of calls from world leaders for a “Bretton Woods 2.0” , a modern rethinking of the post-WWII economic order. At G20 summits in London in 2009, countries like France, China, and Russia pushed for reforms in global financial institutions and more balanced power sharing.
In the end, the IMF received more funding, and some banking regulations were tightened in the years after. But no real overhaul happened. No surprise there? The dollar remained dominant.
The foundation of the global economy didn’t change, even though trust in it had been deeply shaken.
The growth of BRICS
In 2023, Brazil, Russia, India, China, and South Africa began discussing the idea of a shared currency or alternative mechanism to reduce the dependence on USD ie de-dollarisation. The sanctions on Russia didn't help. After Russia’s invasion of Ukraine, the US and its allies froze Russia’s dollar reserves and cut it off from SWIFT, the “backbone of global banking communication”. This made one thing clear. If you fall out with Washington, your access to the global economy can vanish overnight.
China’s growing economic power also gave it more leverage to process alternative options. It would trade in Yuan with Russia and Iran.
I know many still say it's at its early stage, but I see many countries hedging their bets quietly and aligning with Putin and Xi. It became more obvious after US imposed tariffs on multiple nations, signaling that economic tools can double as political weapons. The world’s second financial system is slowly forming.
What is the world looking for, for the last century ?
From Bretton Woods to multiple financial crises, from the birth of the Euro to the rise of BRICS, through war and peace, we’ve been circling around the same ideal. A global currency that is :
-
Simple
-
Free from dominant power
-
Decentralised
-
Borderless
-
Scarce
-
Transparent
-
Inclusive, with self custody
-
Resilient in crisis
-
Built for individual financial sovereignty
-
A new backbone for global finance, owned by no one
It doesn’t matter where you’re from, what politics you believe in, or how your economy leans. The answer keeps pointing in the same direction:
Bitcoin
This is the first true global currency.
And it’s just there
Waiting...
.
.
.
Some books that might interest you :
-
The Battle of Bretton Woods by Benn Steil
-
Goodbye, Great Britain by Kathleen Burk and Alec Cairncross
-
The Ghost of Bancor by Tommaso Padoa-Schioppa
-
Confessions of an Economic Hitman by John Perkins
-
The Blood Bankers by James S. Henry
-
-
@ 318ebaba:9a262eae
2025-06-08 08:36:12When connecting to multiple relays in the Nostr protocol, users may encounter several challenges that can affect their overall experience. Here are some of the key issues:
Challenges of Connecting to Multiple Relays
-
Performance Issues: The lightweight design of Nostr relays can lead to performance bottlenecks, especially when many users are connected simultaneously. This can result in slow message delivery or even failures in posting messages if the relays are overwhelmed[1][2][32].
-
Reliability and Connectivity: Users may experience connectivity problems with certain relays, which can lead to inconsistent access to messages or delays in communication. If a relay goes offline or has connectivity issues, it can disrupt the flow of information, making it difficult for users to send or receive messages reliably[3][4][18].
-
Data Synchronization: As users connect to multiple relays, ensuring that data is synchronized across these relays can be challenging. Inconsistent data states may arise if different relays store messages differently or if there are delays in message propagation. This can lead to confusion about which messages have been sent or received[7][41].
-
Configuration Complexity: Managing connections to multiple relays requires a certain level of technical knowledge. Users need to configure their clients properly to connect to various relays, which can be daunting for those less familiar with the technology. Misconfigurations can lead to connection failures or suboptimal performance[4][21].
-
Spam and Quality Control: With the open nature of Nostr, some relays may be more susceptible to spam or low-quality content. Users connecting to multiple relays might encounter a higher volume of irrelevant or unwanted messages, which can detract from the overall user experience[6][32].
-
Security Concerns: When using multiple relays, users must be cautious about the security of their connections. Not all relays may implement the same level of security, and connecting to less secure relays could expose users to risks such as data interception or unauthorized access to their messages[26][27].
In summary, while connecting to multiple relays in Nostr offers benefits such as redundancy and improved access to information, users must navigate various challenges related to performance, reliability, configuration, and security. Addressing these issues is crucial for a smooth and effective experience on the Nostr network.
[1] https://forum.dfinity.org/t/introducing-replicatr-enhancing-nostr-with-internet-computer-integration/31861 [2] https://medium.com/coinmonks/a-deep-dive-into-nostr-clients-with-technical-insights-and-code-snippets-b1666bb11fac [3] nostr:nevent1qqsfvjvg73wxdn7mda28m704r2zv9lnzlcdgh8r0g52lfvy2wj7uw4czyq32rylmsmre84lhxdypy6jlu4dt3fxfwkq9a0p0lqdl9y8hsp0hur4fuw4 [4] https://www.reddit.com/r/nostr/comments/1e6nm68/new_nostream_relay_created_problems_with_publish/ [5] https://www.lynalden.com/the-power-of-nostr/ [6] https://bitcoinmagazine.com/technical/how-nostr-can-improve-bitcoin-privacy [7] https://barelybuggy.blog/2024/11/26/mostr-offline/ [8] https://github.com/scsibug/nostr-rs-relay/issues/126 [9] https://community.umbrel.com/t/nostr-relay-troubleshooting/17828 [10] https://research.dorahacks.io/2024/04/30/nostr-relay-incentive/ [11] https://community.start9.com/t/issue-confirming-nostr-relay/1682 [12] https://arxiv.org/html/2402.05709v1 [13] https://community.umbrel.com/t/nostr-relay-not-connecting/11401 [14] https://www.purplerelay.com/troubleshooting-common-issues-with-nostr-relay-server-a-users-guide/ [15] https://news.ycombinator.com/item?id=35694029 [16] https://substack.com/home/post/p-158872714?utm_campaign=post&utm_medium=web [17] https://stacker.news/items/142013 [18] https://www.reddit.com/r/nostr/comments/1h6admk/are_these_relays_working/ [19] https://news.ycombinator.com/item?id=33746360 [20] https://github.com/scsibug/nostr-rs-relay/issues/195 [21] https://www.purplerelay.com/how-to-run-a-nostr-relay-a-step-by-step-guide/ [22] https://denostr.medium.com/the-future-of-social-communication-nostrs-origins-and-the-next-destination-in-social-networking-27f0c901d7ae [23] nostr:nevent1qqsqwklh29cvf3z0skhh77xyqf3m53xkppcttf3c8nuc2jqteulfx0czyqcgr7epv9hha2v9afp99l5wl0ljna0zum59fzyhl9v8pgv5xlhf5ava642 [24] https://www.reddit.com/r/nostr/comments/15fyr6r/pervasive_private_key_sharing_seems_dangerous/ [25] https://whtwnd.com/agoracitizen.network/3l2fysaripd2q [26] https://ron.stoner.com/nostr_Security_and_Privacy/ [27] https://forums.puri.sm/t/about-what-is-nostr/20764 [28] https://github.com/nostr-protocol/nips/issues/107 [29] https://medium.com/@volodymyrpavlyshyn/security-features-of-nostr-a0276a22e815 [30] nostr:nevent1qqspd8fh3tplxtfhjpka3y3glzh63v3ygsdhacyq8dvyrnxtvl09lpczyr2v7dprke9lad2qk0svug55vxguqv7n3dwn9vm63u8n5n84znxjxedjf6c [31] nostr:nevent1qqs8e2su6n8m2xtg45qdjw7rdcq6w3g5guvt085h52qhg25wxn755sczyrh26kg89z95jqaz4xkex7kaw2t36twtc75vmrfx2k3p3jqvhfa8vzan82f [32] https://www.cointribune.com/en/nostr-et-la-censure-pourquoi-un-reseau-social-decentralise-est-essentiel-2/ [33] nostr:nevent1qqsv86d756zcw32x0zcvqmr924y5sltvwqud0dywny83ndee30zzrmczyrh26kg89z95jqaz4xkex7kaw2t36twtc75vmrfx2k3p3jqvhfa8vwpfv29 [34] https://github.com/nbd-wtf/nostr-tools/issues [35] https://www.voltage.cloud/blog/the-growth-of-nostr-the-era-of-decentralization [36] https://medium.com/@BingVentures/status-quo-challenges-and-prospect-of-decentralized-social-networks-18f9584f2e8d [37] https://www.reddit.com/r/RedditAlternatives/comments/14s8ao4/greetings_im_here_to_tell_you_about_nostr_a/ [38] https://bitcoinmagazine.com/culture/nostr-the-importance-of-censorship-resistant-communication-for-innovation-and-human-progress- [39] https://github.com/mayneyao/eidos/issues/129 [40] https://www.reddit.com/r/nostr/comments/115a8et/data_duplication_and_distribution_in_nostr_relays/ [41] https://github.com/open-nostr/nostar [42] nostr:nevent1qqsryg8zuc9rdwldat385al24mdt56wanc6g6hfymy8l9tgtmzsc4nspzemhxue69uhhyetvv9ujuurjd9kkzmpwdejhg85cx73 [43] https://ckbcn.xlog.app/Nostr-sheng-tai-fa-zhan-xian-zhuang-ji-wen-ti?locale=en [44] nostr:naddr1qqc92mnvda3kk6twvuk5ummnw3ez6ued2phhgetww35kzmpdwa5hg6pdfehhgetyv43kktt08p5hscnkqgsr7acdvhf6we9fch94qwhpy0nza36e3tgrtkpku25ppuu80f69kfqrqsqqqa28aknkml
-
-
@ 866e0139:6a9334e5
2025-06-08 07:10:42Autor: John J. Mearsheimer. Dieser Beitrag wurde mit dem Pareto-Client geschrieben und erschien zuerst auf dem Blog des Autors. Sie finden alle Texte der Friedenstaube und weitere Texte zum Thema Frieden hier.**
Die neuesten Pareto-Artikel finden Sie in unserem Telegram-Kanal.
Die neuesten Artikel der Friedenstaube gibt es jetzt auch im eigenen Friedenstaube-Telegram-Kanal.
Die Frage, wer für den Krieg in der Ukraine verantwortlich ist, ist seit dem Einmarsch Russlands in die Ukraine am 24. Februar 2022 ein sehr umstrittenes Thema.Die Antwort auf diese Frage ist von enormer Bedeutung, denn der Krieg war aus verschiedenen Gründen eine Katastrophe, von denen die wichtigste darin besteht, dass die Ukraine praktisch zerstört wurde. Sie hat einen beträchtlichen Teil ihres Territoriums verloren und wird wahrscheinlich noch mehr verlieren, ihre Wirtschaft liegt in Trümmern, eine riesige Zahl von Ukrainern wurde intern vertrieben oder ist aus dem Land geflohen, und sie hat Hunderttausende von Opfern zu beklagen. Natürlich hat auch Russland einen hohen Blutzoll gezahlt. Auf strategischer Ebene sind die Beziehungen zwischen Russland und Europa, ganz zu schweigen von Russland und der Ukraine, auf absehbare Zeit vergiftet, was bedeutet, dass die Gefahr eines größeren Krieges in Europa auch dann noch bestehen wird, wenn der Krieg in der Ukraine zu einem eingefrorenen Konflikt wird. Wer die Verantwortung für diese Katastrophe trägt, ist eine Frage, die nicht so schnell verschwinden wird, sondern eher noch an Bedeutung gewinnen dürfte, je mehr Menschen das Ausmaß der Katastrophe bewusst wird.
Die gängige Meinung im Westen ist, dass Wladimir Putin für den Krieg in der Ukraine verantwortlich sei. Die Invasion habe darauf abgezielt, die gesamte Ukraine zu erobern und sie zu einem Teil eines größeren Russlands zu machen, so die Argumentation. Sobald dieses Ziel erreicht sei, würden die Russen ein Imperium in Osteuropa errichten, ähnlich wie es die Sowjetunion nach dem Zweiten Weltkrieg getan habe. Daher stelle Putin letztlich eine Bedrohung für den Westen dar, der man mit aller Macht begegnen müsse. Kurz gesagt, Putin ist ein Imperialist mit einem Masterplan, der sich nahtlos in die reiche russische Tradition einfügt.
Das alternative Argument, mit dem ich mich identifiziere und das im Westen eindeutig in der Minderheit ist, lautet, dass die Vereinigten Staaten und ihre Verbündeten den Krieg provoziert haben. Damit soll natürlich nicht geleugnet werden, dass Russland in die Ukraine einmarschiert ist und den Krieg begonnen hat. Die Hauptursache des Konflikts ist jedoch der NATO-Beschluss, die Ukraine in das Bündnis aufzunehmen, was praktisch alle russischen Führer als existenzielle Bedrohung ansehen, die beseitigt werden muss. Die NATO-Erweiterung ist jedoch Teil einer umfassenderen Strategie, die darauf abzielt, die Ukraine zu einem westlichen Bollwerk an Russlands Grenze zu machen. Ein Beitritt Kiews zur Europäischen Union (EU) und die Förderung einer farbigen Revolution in der Ukraine – die Umwandlung des Landes in eine prowestliche liberale Demokratie – sind die beiden anderen Säulen dieser Politik. Die russische Führung fürchtet alle drei Bereiche, aber am meisten fürchtet sie die NATO-Erweiterung. Um dieser Bedrohung zu begegnen, hat Russland am 24. Februar 2022 einen Präventivkrieg begonnen.
Die Debatte darüber, wer den Ukraine-Krieg verursacht hat, ist kürzlich aufgeflammt, als zwei prominente westliche Politiker – der ehemalige US-Präsident Donald Trump und der prominente britische Abgeordnete Nigel Farage – das Argument vorbrachten, dass die NATO-Erweiterung die treibende Kraft hinter dem Konflikt sei. Es überrascht nicht, dass ihre Äußerungen von den Verfechtern der konventionellen Meinung mit einem heftigen Gegenangriff beantwortet wurden. Es ist auch erwähnenswert, dass der scheidende NATO-Generalsekretär Jens Stoltenberg im vergangenen Jahr zweimal sagte, dass „Präsident Putin diesen Krieg begonnen hat, weil er die Tür der NATO schließen und der Ukraine das Recht verweigern wollte, ihren eigenen Weg zu wählen“. Kaum jemand im Westen hat dieses bemerkenswerte Eingeständnis des NATO-Chefs in Frage gestellt, und er hat es auch nicht zurückgezogen.
Mein Ziel ist es, einen Überblick über die wichtigsten Punkte zu geben, die die Ansicht stützen, dass Putin nicht in die Ukraine einmarschiert ist, weil er ein Imperialist ist, der die Ukraine zu einem Teil eines größeren Russlands machen will, sondern vor allem wegen der NATO-Erweiterung und der Bemühungen des Westens, die Ukraine zu einer westlichen Hochburg an der Grenze Russlands zu machen.
DIE FRIEDENSTAUBE FLIEGT AUCH IN IHR POSTFACH!
In Kürze folgt eine Mail an alle Genossenschafter, danke für die Geduld und das Verständnis!
Hier können Sie die Friedenstaube abonnieren und bekommen die Artikel zugesandt, vorerst für alle kostenfrei, wir starten gänzlich ohne Paywall. (Die Bezahlabos fangen erst zu laufen an, wenn ein Monetarisierungskonzept für die Inhalte steht). Sie wollen der Genossenschaft beitreten oder uns unterstützen? Mehr Infos hier oder am Ende des Textes.
Lassen Sie mich mit den sieben wichtigsten Gründen für die Ablehnung der herkömmlichen Meinung beginnen.
ERSTENS gibt es schlicht und ergreifend keine Beweise aus der Zeit vor dem 24. Februar 2022, dass Putin die Ukraine erobern und in Russland eingliedern wollte. Vertreter der gängigen Meinung können keine Schriftstücke oder Aussagen von Putin nennen, die darauf hindeuten, dass er die Ukraine erobern wollte.
Wenn man sie zu diesem Punkt befragt, liefern die Verfechter der konventionellen Meinung Hinweise, die wenig oder gar nichts mit Putins Motiven für die Invasion der Ukraine zu tun haben. Einige betonen zum Beispiel, dass er sagte, die Ukraine sei ein „künstlicher Staat“ oder kein „echter Staat“. Solche undurchsichtigen Äußerungen sagen jedoch nichts über die Gründe für seinen Kriegseintritt aus. Dasselbe gilt für Putins Aussage, er betrachte Russen und Ukrainer als „ein Volk“ mit einer gemeinsamen Geschichte. Andere weisen darauf hin, dass er den Zusammenbruch der Sowjetunion als „die größte geopolitische Katastrophe des Jahrhunderts“ bezeichnete. Aber Putin sagte auch: „Wer die Sowjetunion nicht vermisst, hat kein Herz. Wer sie zurückhaben will, hat kein Hirn.“ Andere wiederum verweisen auf eine Rede, in der er erklärte: „Die moderne Ukraine wurde vollständig von Russland geschaffen, genauer gesagt, vom bolschewistischen, kommunistischen Russland.“ Aber das ist kaum ein Beweis dafür, dass er an der Eroberung der Ukraine interessiert war. Außerdem sagte er in der gleichen Rede: „Natürlich können wir die Ereignisse der Vergangenheit nicht ändern, aber wir müssen sie zumindest offen und ehrlich zugeben.“
Um zu beweisen, dass Putin die gesamte Ukraine erobern und Russland einverleiben wollte, muss man nachweisen, dass er 1) dieses Ziel für erstrebenswert hielt, 2) es für machbar hielt und 3) die Absicht hatte, dieses Ziel zu verfolgen. Es gibt in den öffentlichen Aufzeichnungen keine Beweise dafür, dass Putin erwog, geschweige denn beabsichtigte, die Ukraine als unabhängigen Staat zu beenden und sie zu einem Teil Großrusslands zu machen, als er am 24. Februar 2022 seine Truppen in die Ukraine schickte.
Tatsächlich gibt es erhebliche Beweise dafür, dass Putin die Ukraine als unabhängiges Land anerkannte. In seinem bekannten Artikel vom 12. Juli 2021 über die russisch-ukrainischen Beziehungen, der von Befürwortern der konventionellen Meinung oft als Beweis für seine imperialen Ambitionen angeführt wird, sagt er dem ukrainischen Volk: „Ihr wollt einen eigenen Staat gründen: Ihr seid willkommen!“ Zur Frage, wie Russland die Ukraine behandeln sollte, schreibt er: „Es gibt nur eine Antwort: mit Respekt.“ Er schließt seinen langen Artikel mit den folgenden Worten ab: „Und wie die Ukraine aussehen wird – das müssen ihre Bürger entscheiden.“ Diese Aussagen stehen im direkten Widerspruch zu der Behauptung, Putin wolle die Ukraine in ein größeres Russland eingliedern.
In demselben Artikel vom 12. Juli 2021 und erneut in einer wichtigen Rede am 21. Februar 2022 betonte Putin, dass Russland „die neue geopolitische Realität, die nach der Auflösung der UdSSR entstanden ist“, akzeptiere. Diesen Punkt wiederholte er ein drittes Mal am 24. Februar 2022, als er ankündigte, Russland werde in die Ukraine einmarschieren. Insbesondere erklärte er: „Wir haben nicht vor, ukrainisches Territorium zu besetzen“, und machte deutlich, dass er die ukrainische Souveränität respektiere, allerdings nur bis zu einem gewissen Punkt: „Russland kann sich nicht sicher fühlen, sich nicht entwickeln und nicht existieren, wenn es sich einer ständigen Bedrohung durch das Territorium der heutigen Ukraine ausgesetzt sieht.“ Das heißt, Putin war nicht daran interessiert, die Ukraine zu einem Teil Russlands zu machen, sondern er wollte sicherstellen, dass sie nicht zu einem „Sprungbrett“ für westliche Aggressionen gegen Russland wird.
ZWEITENS gibt es keinerlei Hinweise dafür, dass Putin eine Marionettenregierung für die Ukraine vorbereitete, in Kiew prorussische Führungspersönlichkeiten aufbaute oder irgendwelche politischen Maßnahmen verfolgte, die eine Besetzung des gesamten Landes und dessen letztendliche Eingliederung in Russland ermöglichen würden.
Diese Fakten widersprechen der Behauptung, Putin sei daran interessiert gewesen, die Ukraine von der Landkarte zu tilgen.
**DRITTENS: Putin hatte nicht annähernd genug Truppen, um die Ukraine zu erobern. **
Beginnen wir mit den Gesamtzahlen. Ich schätze seit langem, dass die Russen mit höchstens 190.000 Soldaten in die Ukraine einmarschiert sind. General Oleksandr Syrskyi, der derzeitige Oberbefehlshaber der ukrainischen Streitkräfte, sagte kürzlich in einem Interview mit The Guardian, dass die russische Invasionstruppe nur 100.000 Mann stark war. The Guardian hatte diese Zahl bereits vor Beginn des Krieges genannt. Es ist unmöglich, dass eine Truppe von 100.000 oder 190.000 Mann die gesamte Ukraine erobern, besetzen und in ein Großrussland eingliedern könnte.
Bedenken Sie, dass die Wehrmacht beim deutschen Überfall auf die westliche Hälfte Polens im September 1939 etwa 1,5 Millionen Mann zählte. Die Ukraine ist geografisch mehr als dreimal so groß wie die westliche Hälfte Polens im Jahr 1939, und in der Ukraine leben im Jahr 2022 fast doppelt so viele Menschen wie in Polen zum Zeitpunkt des deutschen Überfalls. Wenn wir die Schätzung von General Syrskyi akzeptieren, dass 100.000 russische Truppen im Jahr 2022 in die Ukraine einmarschierten, bedeutet dies, dass Russland über eine Invasionsstreitmacht verfügte, die 1/15 der Größe der deutschen Streitkräfte war, die in Polen einmarschierten. Und diese kleine russische Armee marschierte in ein Land ein, das sowohl territorial als auch von der Bevölkerungszahl her viel größer war als Polen.
Abgesehen von den Zahlen stellt sich die Frage nach der Qualität der russischen Armee. Zunächst einmal handelte es sich um eine militärische Streitkraft, die in erster Linie dazu bestimmt war, Russland vor einer Invasion zu schützen. Es handelte sich nicht um eine Armee, die für eine Großoffensive zur Eroberung der gesamten Ukraine, geschweige denn zur Bedrohung des übrigen Europas, gerüstet war. Außerdem ließ die Qualität der Kampftruppen zu wünschen übrig, da die Russen nicht mit einem Krieg rechneten, als sich die Krise im Frühjahr 2021 zuzuspitzen begann. Daher hatten sie kaum Gelegenheit, eine qualifizierte Invasionstruppe auszubilden. Sowohl qualitativ als auch quantitativ war die russische Invasionstruppe nicht annähernd mit der deutschen Wehrmacht der späten 1930er und frühen 1940er Jahre vergleichbar.
Man könnte argumentieren, dass die russische Führung dachte, das ukrainische Militär sei so klein und so unterlegen, dass ihre Armee die ukrainischen Streitkräfte leicht besiegen und das ganze Land erobern könnte. Tatsächlich wussten Putin und seine Leutnants sehr wohl, dass die Vereinigten Staaten und ihre europäischen Verbündeten das ukrainische Militär seit Ausbruch der Krise am 22. Februar 2014 bewaffnet und ausgebildet hatten. Die große Befürchtung Moskaus war, dass die Ukraine de facto Mitglied der NATO werden würde. Außerdem beobachteten die russischen Führer, wie die ukrainische Armee, die größer war als ihre Invasionstruppen, zwischen 2014 und 2022 im Donbass erfolgreich kämpfte. Ihnen war sicherlich klar, dass das ukrainische Militär kein Papiertiger war, der schnell und entschlossen besiegt werden konnte, zumal es über eine starke Rückendeckung durch den Westen verfügte.
Schließlich waren die Russen im Laufe des Jahres 2022 gezwungen, ihre Armee aus der Oblast Charkiw und aus dem westlichen Teil der Oblast Cherson abzuziehen. Damit gab Moskau Gebiete auf, die seine Armee in den ersten Tagen des Krieges erobert hatte. Es steht außer Frage, dass der Druck der ukrainischen Armee eine Rolle dabei spielte, den russischen Rückzug zu erzwingen. Vor allem aber erkannten Putin und seine Generäle, dass sie nicht über genügend Kräfte verfügten, um das gesamte Gebiet, das ihre Armee in Charkiw und Cherson erobert hatte, zu halten. Also zogen sie sich zurück und schufen besser kontrollierbare Verteidigungspositionen. Dies ist kaum das Verhalten, das man von einer Armee erwarten würde, die aufgebaut und ausgebildet wurde, um die gesamte Ukraine zu erobern und zu besetzen. Tatsächlich war sie für diesen Zweck nicht konzipiert und konnte daher diese Herkulesaufgabe nicht bewältigen.
VIERTENS: In den Monaten vor Kriegsbeginn versuchte Putin, eine diplomatische Lösung für die sich anbahnende Krise zu finden.
Am 17. Dezember 2021 sandte Putin ein Schreiben an Präsident Joe Biden und NATO-Chef Stoltenberg, in dem er eine Lösung der Krise auf der Grundlage einer schriftlichen Garantie vorschlug, dass: 1) die Ukraine der NATO nicht beitreten würde, 2) keine Angriffswaffen in der Nähe der russischen Grenzen stationiert würden und 3) die seit 1997 nach Osteuropa verlegten NATO-Truppen und -Ausrüstung nach Westeuropa zurückverlegt würden. Was auch immer man von der Machbarkeit einer Einigung auf der Grundlage von Putins Eröffnungsforderungen halten mag, über die die Vereinigten Staaten keine Verhandlungen führen wollten, es zeigt, dass er versuchte, einen Krieg zu vermeiden.
FÜNFTENS: Unmittelbar nach Beginn des Krieges hat Russland der Ukraine die Hand gereicht, um Verhandlungen zur Beendigung des Krieges und zur Ausarbeitung eines Modus Vivendi zwischen den beiden Ländern aufzunehmen.
Die Verhandlungen zwischen Kiew und Moskau begannen in Weißrussland nur vier Tage nach dem Einmarsch russischer Truppen in die Ukraine. Diese weißrussische Schiene wurde schließlich durch eine israelische und eine Istanbuler Schiene ersetzt. Alle verfügbaren Beweise deuten darauf hin, dass Russland ernsthaft verhandelte und nicht an der Übernahme ukrainischen Territoriums interessiert war, mit Ausnahme der Krim, die es 2014 annektiert hatte, und möglicherweise des Donbass. Die Verhandlungen endeten, als die Ukrainer auf Drängen Großbritanniens und der Vereinigten Staaten die Verhandlungen abbrachen, die zum Zeitpunkt ihrer Beendigung gute Fortschritte gemacht hatten.
Darüber hinaus berichtet Putin, dass er, als die Verhandlungen stattfanden und Fortschritte machten, gebeten wurde, als Geste des guten Willens die russischen Truppen aus dem Gebiet um Kiew abzuziehen, was er am 29. März 2022 tat. Keine westliche Regierung und kein ehemaliger Politiker hat diese Behauptung Putins angefochten, die in direktem Widerspruch zu seiner Behauptung steht, er wolle die gesamte Ukraine erobern.
SECHSTENS: Abgesehen von der Ukraine gibt es nicht den geringsten Hinweis darauf, dass Putin die Eroberung anderer osteuropäischer Länder ins Auge gefasst hat.
Außerdem ist die russische Armee nicht einmal groß genug, um die gesamte Ukraine zu überrennen, ganz zu schweigen von dem Versuch, die baltischen Staaten, Polen und Rumänien zu erobern. Außerdem sind alle diese Länder NATO-Mitglieder, was mit ziemlicher Sicherheit einen Krieg mit den Vereinigten Staaten und ihren Verbündeten bedeuten würde.
**SIEBTENS: Kaum jemand im Westen behauptete, Putin habe imperiale Ambitionen, seit er im Jahr 2000 die Macht übernahm, bis zum Beginn der Ukraine-Krise am 22. Februar 2014. Zu diesem Zeitpunkt wurde er plötzlich zum imperialen Aggressor. Warum? Weil die westlichen Staats- und Regierungschefs einen Grund brauchten, ihm die Schuld für die Krise zu geben. **
Der wohl beste Beweis dafür, dass Putin in den ersten vierzehn Jahren seiner Amtszeit nicht als ernsthafte Bedrohung angesehen wurde, ist die Tatsache, dass er auf dem NATO-Gipfel im April 2008 in Bukarest ein geladener Gast war, auf dem das Bündnis bekannt gab, dass die Ukraine und Georgien schließlich Mitglieder werden würden. Putin war natürlich erzürnd über diese Entscheidung und machte seinem Unmut Luft. Sein Widerstand gegen diese Ankündigung hatte jedoch kaum Auswirkungen auf Washington, da das russische Militär als zu schwach eingeschätzt wurde, um eine weitere NATO-Erweiterung zu verhindern, so wie es auch bei den Erweiterungswellen von 1999 und 2004 zu schwach gewesen war, um sie aufzuhalten. Der Westen glaubte, er könne Russland die NATO-Erweiterung noch einmal aufzwingen.
Außerdem war die NATO-Erweiterung vor dem 22. Februar 2014 nicht darauf ausgerichtet, Russland einzudämmen. Angesichts des traurigen Zustands der russischen Militärmacht war Moskau nicht in der Lage, die Ukraine zu erobern, geschweige denn eine revanchistische Politik in Osteuropa zu verfolgen. Der ehemalige US-Botschafter in Moskau, Michael McFaul, der ein entschiedener Verfechter der Ukraine und scharfer Kritiker Putins ist, stellt bezeichnenderweise fest, dass die Einnahme der Krim durch Russland im Jahr 2014 vor Ausbruch der Krise nicht geplant war; es war eine impulsive Reaktion auf den Putsch, der den prorussischen Führer der Ukraine stürzte. Kurz gesagt, die NATO-Erweiterung war nicht dazu gedacht, eine russische Bedrohung einzudämmen, weil der Westen nicht glaubte, dass es eine solche gab.
Erst als im Februar 2014 die Ukraine-Krise ausbrach, begannen die Vereinigten Staaten und ihre Verbündeten plötzlich, Putin als gefährlichen Führer mit imperialen Ambitionen und Russland als ernsthafte militärische Bedrohung zu beschreiben, die die NATO eindämmen müsse. Dieser abrupte Wechsel der Rhetorik sollte einem wesentlichen Zweck dienen: dem Westen die Möglichkeit zu geben, Putin für die Krise verantwortlich zu machen und den Westen von der Verantwortung freizusprechen. Es überrascht nicht, dass diese Darstellung Putins nach dem Einmarsch Russlands in die Ukraine am 24. Februar 2022 deutlich an Zugkraft gewann.
Eine Abweichung von der gängigen Meinung ist erwähnenswert. Einige argumentieren, dass die Entscheidung Moskaus, in die Ukraine einzumarschieren, wenig mit Putin selbst zu tun hat und stattdessen Teil einer expansionistischen Tradition ist, die lange vor Putin bestand und tief in der russischen Gesellschaft verwurzelt ist. Dieser Hang zur Aggression, der angeblich von inneren Kräften und nicht von Russlands äußerem Bedrohungsumfeld angetrieben wird, hat im Laufe der Zeit praktisch alle russischen Führer dazu gebracht, sich ihren Nachbarn gegenüber gewalttätig zu verhalten. Es lässt sich nicht leugnen, dass Putin in dieser Geschichte das Sagen hat oder dass er Russland in den Krieg geführt hat, aber es heißt, dass er wenig Einfluss hat. Fast jeder andere russische Führer hätte genauso gehandelt.
Es gibt zwei Probleme mit diesem Argument. Erstens ist es nicht widerlegbar, da der langjährige Charakterzug in der russischen Gesellschaft, der diesen aggressiven Impuls hervorrufe, nie identifiziert wurde. Es heißt, die Russen seien schon immer aggressiv gewesen – egal, wer an der Macht sei – und würden es auch immer sein. Es ist fast so, als ob es in ihrer DNA läge. Die gleiche Behauptung wurde einst über die Deutschen aufgestellt, die im zwanzigsten Jahrhundert oft als angeborene Aggressoren dargestellt wurden. Derartige Argumente werden in der akademischen Welt aus gutem Grund nicht ernst genommen.
Außerdem bezeichnete zwischen 1991 und 2014, als die Ukraine-Krise ausbrach, kaum jemand in den Vereinigten Staaten oder Westeuropa Russland als von Natur aus aggressiv. Außerhalb Polens und der baltischen Staaten wurde die Angst vor russischer Aggression in diesen 24 Jahren nicht häufig geäußert, was man erwarten würde, wenn die Russen zu Aggressionen veranlagt wären. Es scheint klar, dass das plötzliche Auftauchen dieser Argumentation eine bequeme Ausrede war, um Russland die Schuld für den Ukrainekrieg zu geben.
***
Lassen Sie mich einen anderen Gang einlegen und die DREI HAUPTGRÜNDE darlegen, die dafür sprechen, dass die NATO-Erweiterung die Hauptursache für den Ukraine-Krieg war.
**ERSTENS sagten russische Führer aller Art vor Kriegsbeginn wiederholt, dass sie die NATO-Erweiterung in die Ukraine als eine existenzielle Bedrohung betrachten, die beseitigt werden muss. **
Putin hat diese Argumentation bereits vor dem 24. Februar 2022 mehrfach öffentlich dargelegt. In einer Rede vor dem Vorstand des Verteidigungsministeriums am 21. Dezember 2021 erklärte er: „Was sie in der Ukraine tun oder versuchen oder planen, findet nicht Tausende von Kilometern entfernt von unserer Landesgrenze statt. Es geschieht direkt vor unserer Haustür. Sie müssen verstehen, dass wir uns einfach nirgendwo mehr hin zurückziehen können. Glauben sie wirklich, dass wir diese Bedrohungen nicht wahrnehmen? Oder glauben sie, dass wir tatenlos zusehen werden, wie Bedrohungen für Russland entstehen?“ Zwei Monate später, auf einer Pressekonferenz am 22. Februar 2022, nur wenige Tage vor Kriegsbeginn, sagte Putin: „Wir sind kategorisch gegen einen NATO-Beitritt der Ukraine, weil dies eine Bedrohung für uns darstellt, und wir haben Argumente, die dies unterstützen. Ich habe in diesem Saal wiederholt darüber gesprochen.“ Dann machte er deutlich, dass er begreift, dass die Ukraine ein Defacto-Mitglied der NATO werde. Die Vereinigten Staaten und ihre Verbündeten, sagte er, „pumpen die derzeitigen Kiewer Machthaber weiterhin mit modernen Waffentypen voll“. Er fuhr fort, dass Moskau, wenn dies nicht gestoppt werde, „mit einem bis an die Zähne bewaffneten 'Antirussland' dastehen würde. Das ist völlig inakzeptabel.“
Auch andere führende russische Politiker - darunter der Verteidigungsminister, der Außenminister, der stellvertretende Außenminister und der russische Botschafter in Washington - betonten die zentrale Bedeutung der NATO-Erweiterung als Auslöser der Ukraine-Krise. Außenminister Sergej Lawrow brachte es auf einer Pressekonferenz am 14. Januar 2022 auf den Punkt: „Der Schlüssel zu allem ist die Garantie, dass die NATO nicht nach Osten expandieren wird.“
Man hört oft das Argument, die russischen Befürchtungen seien unbegründet, weil es keine Chance gebe, dass die Ukraine dem Bündnis in absehbarer Zukunft beitreten würde, wenn überhaupt. Tatsächlich wird behauptet, die Vereinigten Staaten und ihre europäischen Verbündeten hätten der Aufnahme der Ukraine in die NATO vor dem Krieg wenig Aufmerksamkeit geschenkt. Aber selbst wenn die Ukraine dem Bündnis beitreten würde, wäre dies keine existenzielle Bedrohung für Russland, da die NATO ein Verteidigungsbündnis ist. Daher kann die NATO-Erweiterung weder eine Ursache der ursprünglichen Krise gewesen sein, die im Februar 2014 ausbrach, noch des Krieges, der im Februar 2022 begann.
Diese Argumentation ist falsch. Tatsächlich bestand die westliche Reaktion auf die Ereignisse von 2014 darin, die bestehende Strategie zu verdoppeln und die Ukraine noch näher an die NATO heranzuführen. Das Bündnis begann 2014 mit der Ausbildung des ukrainischen Militärs und bildete in den folgenden acht Jahren durchschnittlich 10.000 Soldaten pro Jahr aus. Im Dezember 2017 beschloss die Trump-Regierung, Kiew mit „Verteidigungswaffen“ zu versorgen. Andere NATO-Länder zogen bald nach und lieferten noch mehr Waffen an die Ukraine. Darüber hinaus begannen die ukrainische Armee, Marine und Luftwaffe, an gemeinsamen Militärübungen mit NATO-Streitkräften teilzunehmen. Die Bemühungen des Westens, das ukrainische Militär zu bewaffnen und auszubilden, erklären zu einem großen Teil, warum es im ersten Kriegsjahr so gut gegen die russische Armee abschnitt. Eine Schlagzeile im Wall Street Journal vom April 2022 lautete: „Das Geheimnis des militärischen Erfolgs der Ukraine: Jahrelange NATO-Ausbildung.“
Abgesehen von den laufenden Bemühungen des Bündnisses, das ukrainische Militär zu einer schlagkräftigeren Kampftruppe zu machen, die an der Seite der NATO-Truppen operieren kann, gab es im Westen im Laufe des Jahres 2021 eine neue Begeisterung für die Aufnahme der Ukraine in die NATO. Gleichzeitig vollzog Präsident Zelensky, der nie viel Enthusiasmus für eine Aufnahme der Ukraine in das Bündnis gezeigt hatte und im März 2019 auf der Grundlage einer Plattform gewählt wurde, die zur Zusammenarbeit mit Russland bei der Beilegung der anhaltenden Krise aufrief, Anfang 2021 einen Kurswechsel und befürwortete nicht nur die NATO-Mitgliedschaft der Ukraine, sondern vertrat auch eine harte Linie gegenüber Moskau.
Präsident Biden, der im Januar 2021 ins Weiße Haus einzog, hatte sich seit langem für die Aufnahme der Ukraine in die NATO eingesetzt und war ein Superfalke gegenüber Russland. Es überrascht nicht, dass die NATO am 14. Juni 2021 auf ihrem jährlichen Gipfel in Brüssel ein Kommuniqué herausgab, in dem es hieß: „Wir bekräftigen den auf dem Gipfel von Bukarest 2008 gefassten Beschluss, dass die Ukraine Mitglied des Bündnisses wird.“ Am 1. September 2021 besuchte Zelensky das Weiße Haus, wo Biden klarstellte, dass die Vereinigten Staaten „fest entschlossen“ seien, „die euro-atlantischen Bestrebungen der Ukraine zu unterstützen“. Am 10. November 2021 unterzeichneten Außenminister Antony Blinken und sein ukrainischer Amtskollege Dmytro Kuleba ein wichtiges Dokument - die „Charta der strategischen Partnerschaft zwischen den USA und der Ukraine“. Das Ziel beider Parteien, so heißt es in dem Dokument, ist es, „das Engagement für die Durchführung tiefgreifender und umfassender Reformen in der Ukraine zu unterstreichen, die für eine vollständige Integration in die europäischen und euro-atlantischen Institutionen erforderlich sind.“ Es bekräftigt auch ausdrücklich das Engagement der USA für die „Bukarester Gipfelerklärung von 2008“.
Es scheint kaum Zweifel daran zu geben, dass die Ukraine auf dem besten Weg war, bis Ende 2021 Mitglied der NATO zu werden. Dennoch argumentieren einige Befürworter dieser Politik, dass sich Moskau keine Sorgen über dieses Ergebnis hätte machen müssen, denn „die NATO ist ein Verteidigungsbündnis und stellt keine Bedrohung für Russland dar“. Aber das ist nicht die Meinung Putins und anderer russischer Politiker über die NATO, und es kommt darauf an, was sie denken. Kurz gesagt, es steht außer Frage, dass Moskau den Beitritt der Ukraine zur NATO als eine existenzielle Bedrohung ansah, die nicht hingenommen werden durfte.
ZWEITENS erkannte eine beträchtliche Anzahl einflussreicher und hoch angesehener Persönlichkeiten im Westen vor dem Krieg, dass die Expansion der NATO – insbesondere in die Ukraine – von der russischen Führung als tödliche Bedrohung angesehen werden und schließlich zur Katastrophe führen würde.
William Burns, der heute die CIA leitet („heute“ leitet John Ratcliffe die CIA, aktualisieren ODER am Anfang des Textes klarstellen, dass er schon älter ist ODER „heute“ streichen und „leitete“ statt „leitet“), aber zum Zeitpunkt des NATO-Gipfels in Bukarest im April 2008 US-Botschafter in Moskau war, verfasste ein Memo an die damalige Außenministerin Condoleezza Rice, in dem er die russischen Überlegungen zur Aufnahme der Ukraine in die Allianz prägnant beschreibt. „Der Beitritt der Ukraine zur NATO“, so schrieb er, „ist für die russische Elite (nicht nur für Putin) die klarste aller roten Linien. In den mehr als zweieinhalb Jahren, in denen ich Gespräche mit den wichtigsten russischen Akteuren geführt habe, von Scharfmachern in den dunklen Nischen des Kremls bis hin zu Putins schärfsten liberalen Kritikern, habe ich noch niemanden gefunden, der die Aufnahme der Ukraine in die NATO als etwas anderes betrachtet als eine direkte Herausforderung für die russischen Interessen.“ Die NATO, so sagte er, „würde als ein strategischer Fehdehandschuh angesehen werden. Das heutige Russland wird darauf reagieren. Die russisch-ukrainischen Beziehungen würden auf Eis gelegt ... Das würde einen fruchtbaren Boden für russische Einmischungen auf der Krim und in der Ostukraine schaffen.“
Burns war 2008 nicht der einzige westliche Entscheidungsträger, der erkannte, dass die Aufnahme der Ukraine in die NATO mit Gefahren verbunden war. Auf dem Bukarester Gipfel sprachen sich sowohl die deutsche Bundeskanzlerin Angela Merkel als auch der französische Präsident Nicolas Sarkozy gegen eine NATO-Mitgliedschaft der Ukraine aus, weil sie wussten, dass dies Russland alarmieren und verärgern würde. Merkel erklärte kürzlich ihre Ablehnung: „Ich war mir sehr sicher, ... dass Putin das nicht einfach zulassen wird. Aus seiner Sicht wäre das eine Kriegserklärung“.
Um noch einen Schritt weiter zu gehen: Zahlreiche amerikanische Politiker und Strategen sprachen sich in den 1990er Jahren gegen die Entscheidung von Präsident Clinton aus, die NATO zu erweitern, als diese Entscheidung noch zur Debatte stand. Diesen Gegnern war von Anfang an klar, dass die russische Führung darin eine Bedrohung ihrer lebenswichtigen Interessen sehen würde und dass diese Politik letztlich in eine Katastrophe münden würde. Die Liste der Gegner umfasst prominente Persönlichkeiten des Establishments wie George Kennan, sowohl Präsident Clintons Verteidigungsminister William Perry als auch seinen Vorsitzenden des Vereinigten Generalstabs, General John Shalikashvili, Paul Nitze, Robert Gates, Robert McNamara, Richard Pipes und Jack Matlock, um nur einige zu nennen.
Die Logik von Putins Position sollte für Amerikaner, die seit langem der Monroe-Doktrin verpflichtet sind, vollkommen verständlich sein. Diese besagt, dass keine entfernte Großmacht ein Bündnis mit einem Land in der westlichen Hemisphäre eingehen und ihre militärischen Streitkräfte dort stationieren darf. Die Vereinigten Staaten würden einen solchen Schritt als existenzielle Bedrohung auffassen und alles tun, um diese Gefahr zu beseitigen. Dies geschah natürlich auch während der Kubakrise 1962, als Präsident Kennedy den Sowjets klar machte, dass ihre Atomraketen aus Kuba abgezogen werden müssten. Putin ist zutiefst von derselben Logik beeinflusst. Schließlich wollen Großmächte nicht, dass sich entfernte Großmächte in ihrem Hinterhof ansiedeln.
DRITTENS: Die zentrale Bedeutung der tiefen Angst Russlands vor einem NATO-Beitritt der Ukraine wird durch zwei Entwicklungen seit Kriegsbeginn verdeutlicht.
Während der Istanbuler Verhandlungen, die unmittelbar nach Beginn der Invasion stattfanden, machten die Russen deutlich, dass die Ukraine eine „dauerhafte Neutralität“ akzeptieren müsse und der NATO nicht beitreten könne. Die Ukrainer akzeptierten die Forderung Russlands ohne ernsthaften Widerstand, sicherlich weil sie wussten, dass es sonst unmöglich wäre, den Krieg zu beenden. In jüngerer Zeit, am 14. Juni 2024, stellte Putin zwei Forderungen, die die Ukraine erfüllen müsse, bevor er einem Waffenstillstand und der Aufnahme von Verhandlungen zur Beendigung des Krieges zustimmen würde. Eine dieser Forderungen war, dass Kiew „offiziell“ erklärt, „dass es seine Pläne, der NATO beizutreten, aufgibt“.
Das alles ist nicht überraschend, denn Russland hat die Ukraine in der NATO immer als existenzielle Bedrohung gesehen, die um jeden Preis verhindert werden muss. Diese Logik ist die treibende Kraft hinter dem Ukraine-Krieg.
Schließlich ist aus der Verhandlungsposition Russlands in Istanbul sowie aus Putins Äußerungen zur Beendigung des Krieges in seiner Ansprache vom 14. Juni 2024 klar ersichtlich, dass er nicht daran interessiert ist, die gesamte Ukraine zu erobern und sie zu einem Teil eines größeren Russlands zu machen.
John Joseph Mearsheimer (* 14. Dezember 1947 in Brooklyn, New York City) ist ein US-amerikanischer Politikwissenschaftler an der University of Chicago. Sein Schwerpunkt ist die Analyse internationaler Beziehungen aus der Perspektive des offensiven Neorealismus, den er erstmals 2001 in seiner Monografie The Tragedy of Great Power Politics darstellte.
Dieser Text von John J. Mearsheimer erschien am 5.8.2024 auf Substack.Vielen Dank für die Genehmigung des Autors zum Abdruck der deutschen Übersetzung. Die Übersetzung wurde von Thomas Mayer erstellt.
Neben der NATO-Osterweiterung gibt es weitere Faktoren die zum Ukraine-Krieg führten, zum Beispiel der Nationalismus in der Ukraine und die Unterdrückung der ethnisch-russischen Bevölkerung.
Ausführlich sind die vielschichtigen Hintergründe des Ukraine-Krieges geschildert in dem Buch von Thomas Mayer: Wahrheitssuche im Ukraine-Krieg – Um was es wirklich geht, 600 Seiten, ISBN 978-3-89060-863-1, Infos zum Buch: https://kurzelinks.de/h10a
LASSEN SIE DER FRIEDENSTAUBE FLÜGEL WACHSEN!
In Kürze folgt eine Mail an alle Genossenschafter, danke für die Geduld!
Hier können Sie die Friedenstaube abonnieren und bekommen die Artikel zugesandt.
Schon jetzt können Sie uns unterstützen:
- Für 50 CHF/EURO bekommen Sie ein Jahresabo der Friedenstaube.
- Für 120 CHF/EURO bekommen Sie ein Jahresabo und ein T-Shirt/Hoodie mit der Friedenstaube.
- Für 500 CHF/EURO werden Sie Förderer und bekommen ein lebenslanges Abo sowie ein T-Shirt/Hoodie mit der Friedenstaube.
- Ab 1000 CHF werden Sie Genossenschafter der Friedenstaube mit Stimmrecht (und bekommen lebenslanges Abo, T-Shirt/Hoodie).
Für Einzahlungen in CHF (Betreff: Friedenstaube):
Für Einzahlungen in Euro:
Milosz Matuschek
IBAN DE 53710520500000814137
BYLADEM1TST
Sparkasse Traunstein-Trostberg
Betreff: Friedenstaube
Wenn Sie auf anderem Wege beitragen wollen, schreiben Sie die Friedenstaube an: friedenstaube@pareto.space
Sie sind noch nicht auf Nostr and wollen die volle Erfahrung machen (liken, kommentieren etc.)? Zappen können Sie den Autor auch ohne Nostr-Profil! Erstellen Sie sich einen Account auf Start. Weitere Onboarding-Leitfäden gibt es im Pareto-Wiki.
-
@ 0b65f96a:7fda4c8f
2025-06-06 13:37:58Es gibt Bibliotheken voll Literatur zur „Kunst“ der Kriegsführung. Dies hier ist ein Beitrag zu den Bibliotheken der Kunst Frieden zu führen. Denn Frieden ist nicht die Abwesenheit von Krieg. Sondern eine mindestens ebenso intensive Aktivität. Worin genau besteht sie aber? Ich glaube darin, weder nach der einen noch nach der anderen Seite vom Hochseil zu fallen. Denn vom Hochseil kann man immer nach zwei Seiten fallen. Das ist dann auch schon die Kernherausforderung: Gleichgewichthalten!
Es scheint zunächst ein ganz äußerlicher Auftrag. Es gibt immer und wird immer widerstreitende Interessen geben. Allerdings ist das nur die äußerste Zwiebelschale. Denn wenn wir die Sache etwas mit Abstand von uns selbst betrachten, werden wir in uns hinein verwiesen: Frieden kann nur von innen nach außen gestiftet werden. Wenn wir das Hochseil in uns suchen, was finden wir dann? – Zweifels ohne, wissen wir von uns, dass wir nicht jeden Tag unser bestes Selbst sind. Würde es sich nicht lohnen etwas genauer über die Möglichkeit nach zwei Seiten vom Hochseil zu fallen nachzudenken, zugunsten der eigenen Balancierfähigkeit?
Wir sind daran gewöhnt zu denken dem Guten steht das Böse gegenüber. Daraus ziehen ja alle Western und Martial Arts Streifen ihren Plot: Der Gute bringt den Bösen um die Ecke und damit hat wieder mal das Gute gesiegt. Wir bewerten das „um die Ecke bringen“ unterschiedlich, je nach dem, von wem es kommt.
Ich möchte einen neuen Gedanken vorschlagen über unser Inneres, über Gut und Böse nachzudenken. Denn, wie gesagt, vom Hochseil kann man nach zwei Seiten fallen. Und es hat immer drastische Wirkung. Wo kommen wir also hin, wenn wir sagen: Frieden ist immer ein Gleichgewichtszustand, ergo eine Zeit der Mitte?
Sagen wir Toleranz ist ein erstrebenswertes Ideal. Dann würden wir sicher sagen Engstirnigkeit ist das Gegenteil davon und alles andere als Wünschenswert. Ja, so ist es gewiss. Und es bleibt hinzuzufügen, auch Beliebigkeit ist das Gegenteil von Toleranz. Denn es gibt eine Grenze, wo Toleranz nicht mehr Toleranz ist, sondern Beliebigkeit, ein „alles ist möglich“. Ähnlich können wir es für Großzügigkeit denken: Großzügigkeit ist ein erstrebenswertes Ideal. Ihr Gegenteil ist Geiz. Ihr anderes Gegenteil die Verschwendung. Oder Mut. Mut ist ein erstrebenswertes Ideal. Feigheit sein Gegenteil. Sein anderes Gegenteil ist Leichtsinn. Mit andern Worten: Das Ideal wird immer zum Hochseil. Und wir können immer nach zwei Seiten von ihm fallen. Wenn wir diesem Gedanken folgen, kommen wir weg von der Gut-Böse-Dualität. Und stattdessen zur Frage nach dem Gleichgewicht. Zur Frage nach der Mittezeit.
Natürlich steht es uns frei all das zu denken. Oder auch nicht zu denken. Denn selbstverständlich ist es möglich es nicht zu denken und bei einer Dualitätsvorstellung festhängen zu bleiben. Es wird uns nur nicht helfen Frieden zu denken und in Frieden zu handeln. Wenn wir wollen können wir durch das Aufspannen einer Trinität einen neuen Raum eröffnen und betreten. In ihm wird Frieden aktiv führbar, denn er wird eine Gleichgewichtssituation in uns selbst! – Nicht eine, sich einander gegenüberstehender äußerer Mächte!
Gehen wir noch einen Schritt weiter in unserer Betrachtung, können wir feststellen, dass es durchaus einen Unterschied macht nach welcher Seite wir runter fallen. Denn auf der einen Seite ist es immer eine Verengung: Engstirnigkeit, Geiz, Feigheit in unseren Beispielen. Auf der anderen ist es immer eine Zersplitterung oder Versprühung. In unseren Beispielen Beliebigkeit, Verschwendung und Leichtsinn. Und das erstrebenswerte ist eben immer die Mitte, das von uns ständig aktualisierte Gleichgewicht.
Das interessante ist, wo diese Mitte liegt, lässt sich niemals statisch festlegen. Sie ist immer dynamisch. Denn sie kann zu unterschiedlichen Momenten an unterschiedlicher Stelle liegen. Es ist immer ein Ich, das sich in Geistesgegenwart neu ausbalanciert. Und darum ist Frieden so schwer. Wir werden ihn niemals „haben“, sondern ihm immer entgegen gehen.
Der Kriegsruf ist nichts anderes, als ein Versuch von denen, die vom Hochseil gefallen sind, uns auch herunter zu kicken.
Netter Versuch. Wird aber nichts!
In der Nussschale: Die Dualität auflösen in die Trinität der balancierenden Mitte zwischen der Geste der Versteinerung und der Geste des Zerstäubens oder Zersplitterns. Die dynamische Qualität der Mitte bemerken. Oder, tun wir es nicht, ist das gleich der erste Anstoß, der uns wieder zum Wackeln bringt. Und des Ich´s gewahr werden, das balanciert. Frieden führen ist eine Kunst.
Dieser Beitrag wurde mit dem Pareto-Client geschrieben.
Noch nicht auf Nostr? Hier entlang zum leichten Einstieg!
Patric I. Vogt, geb. 1968 in Mainz. Autor von „Zukunft beginnt im Kopf Ein Debattenbeitrag zur Kernsanierung von Rechtsstaat und Demokratie“. Lebt als freischaffender Künstler, Lehrer und Unternehmer. Über drei Jahrzehnte Beschäftigung mit dem Ideenfeld soziale #Dreigliederung und Anthroposophie. Moderation und Mediation von sozialen Prozessen und Organisationsentwicklung. Staatlich ungeprüft, abgesehen von den Fahrerlaubnissen zu Land und zu Wasser. Motto: Gedanken werden Worte, werden Taten! www.perspektivenwechsel.social
-
@ 77c2969e:a33cfa50
2025-06-08 07:10:04Nostr 协议在我看来是很先进的,暂时使用的人还不多,不过相比 Fediverse 的 Mastodon 之类,自己部署 Nostr Relay 是成本很小的。Blossom 作为媒体上传服务是可选的,因为有几个公共服务器可用,但是大多数国内无法直连。我还发现部分客户端不支持自定义 Blossom 服务器,只有 Amethyst 和 Nostrmo 可以。
我目前使用的是这个 nostr-relay 以及这个 blossom-server。
nostr-relay
这个用 Python 写的 nostr-relay 很不错。
配置文件是这个: https://code.pobblelabs.org/fossil/nostr_relay/file?name=nostr_relay/config.yaml 可以按需修改,自己用默认就够了。
```jsx
先安装 pipx
apt install pipx
再用 pipx 安装 nostr-relay
pipx install nostr-relay
选择一个目录运行以下命令启动默认配置,默认 SQLite 文件在当前目录
nostr-relay serve
后台运行
(nostr-relay serve >/var/log/nostr-relay.log &)
查看 PID
lsof -i :6969
停止运行
kill PID
后台运行命令会调用 gunicorn 运行而不是nostr-relay,因此会搜不到 nostr-relay 进程,可以尝试这个命令
ps -ef | grep gunicorn
`` 反代
127.0.0.1:6969` 配置域名和 SSL 证书即可。保持简洁,不使用 Docker 和 systemd,后续迁移时只需复制整个文件夹即可。
blossom-server
clone 这个仓库
git clone https://github.com/hzrd149/blossom-server.git
克隆仓库是必要的,因为 blossom-server 的默认页面依赖
public/
目录,请保留该目录。用以下
config.yml
和docker-compose.yml
覆盖原仓库中的文件然后执行
docker compose up -d
反代
127.0.0.1:3000
配置域名和 SSL 证书即可。config.yml
按需修改,比如 Dashboard 密码、允许的 PubKey 等。 ```
Override the domain thats is used in the blobs "url" field
By default it uses the domain the incoming HTTP request was made on
publicDomain: ""
databasePath: data/sqlite.db
dashboard: # enable or disable the admin dashboard enabled: true # admin username username: admin # if password is left blank it will be generated each time the app starts password: "yourpasswd"
文件发现机制,保持默认关闭
discovery: # find files by querying nostr relays nostr: enabled: false relays: - wss://relay.example.com # find files by asking upstream CDNs # NOTE: do not set this to your own server, it will create an infinite loop upstream: enabled: false domains: - https://cdn.example.com
storage: # local or s3 backend: local
# Imminently removes a blob when there are no owners removeWhenNoOwners: false
# local storage local: dir: ./data/blobs
# see minio docs for options: # https://min.io/docs/minio/linux/developers/javascript/API.html#new-minio-client-endpoint-port-usessl-accesskey-secretkey-region-transport-sessiontoken-partsize # s3: # endpoint: https://s3.endpoint.com # port: 443 # bucket: blossom # accessKey: xxxxxxxx # secretKey: xxxxxxxxx # useSSL: true # region: us-east-1 # If this is set the server will redirect clients when loading blobs # publicURL: https://s3.region.example.com/
# rules are checked in descending order. if a blob matches a rule it is kept # "type" (required) the type of the blob, "" can be used to match any type # "expiration" (required) time passed since last accessed # "pubkeys" (optional) a list of owners # any blobs not matching the rules will be removed rules: - type: "" expiration: 100 years pubkeys: - "change-to-your-pubkey-hex"
Config for the /upload endpoint
upload: # enable / disable uploads (default false) enabled: true # require auth to upload requireAuth: true # only check rules that include "pubkeys" requirePubkeyInRule: true
Config for the /media endpoint
media: # /media endpoint enabled (default false) enabled: true # require auth to upload to /media requireAuth: true # only check rules that include "pubkeys" requirePubkeyInRule: true
# image optimization options image: # image quality 0-100 (default 90) quality: 90 # create progressive jpeg / png images for large images > 1024x768 (default true) progressive: true # max width (default 1920) maxWidth: 1920 # max height (default 1080) maxHeight: 1080 # image format (default webp) outputFormat: "webp" # keep aspect radio when resizing (default true) maintainAspectRatio: true # keep EXIF metadata (default false) keepExif: false # fps for GIFs (default 30) fps: 30
video: # video quality 0-100 (default 90) quality: 90 # max height (default 1080) maxHeight: 1080 # max fps (default 30) maxFps: 30 # output format [mp4, webm, mkv] (default mp4) format: "webm" # audio codec [aac, mp3, vorbis, opus] (default aac) audioCodec: "aac" # video codec [libx264, libx265, vp8, vp9] (default libx264) videoCodec: "libx264"
list: requireAuth: false allowListOthers: true
tor: enabled: false proxy: "" ```
docker-compose.yml
services: blossom: image: ghcr.io/hzrd149/blossom-server:master ports: - 3000:3000 volumes: # mount data volume - ./data:/app/data # mount config file - ./config.yml:/app/config.yml # mount custom www dir - ./public:/app/public
其他
我自己目前就是部署的这两个服务自用。主要是方便部署和维护,后续服务器迁移只需要复制文件夹即可。Blossom 媒体服务自用的话,默认使用服务器本地存储即可,就是在项目文件夹中的
./data/blobs/
,上传的图片和视频会被自动压缩,占不了多少存储空间。如果公开或多人使用也可以配置 S3 兼容的对象存储。除了我上面说的这个 nostr-relay,还有一个 Rust 写的 nostr-rs-relay,可以 Docker 一键部署,如果你偏好使用 Docker,也可以选择这个。
如果你也对 Nostr 这个去中心化协议感兴趣,想拥有自己的 Nostr 服务,不妨参考本文试试,欢迎留言交流!
推荐阅读
-
@ 57d1a264:69f1fee1
2025-06-08 06:39:2618-07 HOLIDAY HOME by OFFICE INAINN reimagines the traditional hytte, creating two interconnected cabins, H_G30 and H_G32, located near the scenic Geiranger–Trollstigen route. Set on a steep hillside 148 meters above sea level, the design embraces modern functionality while offering stunning southern views of Storfjorden and minimizing environmental impact.
Blending into the Landscape
The cabins are designed to integrate gently into the natural terrain, following the contours of the hillside. Their horizontal layout reduces the visual impact, blending into the forested surroundings while opening up to the fjord. The minimal footprint respects the environment and reduces construction costs, ensuring the cabins remain nearly invisible from the north while fully engaging with the southern panorama.
Functional, Additive Architecture
Inspired by traditional Norwegian architecture, each cabin consists of two overlapping modules of varying heights, breaking up the building mass and reducing roof size. The higher module serves as the circulation space, while the lower module contains the private and living areas. This approach replaces conventional walls with functional form, creating distinct zones for movement, utility, and relaxation.
Harmonizing Tradition with Modern Living
The cabins follow an east-west retaining wall that mirrors the hill’s natural slope, with additional storage and leisure spaces tucked behind. The shallow depth allows maximum southern exposure for light and views, while the central axis blurs the boundary between indoor and outdoor living, creating a seamless connection to nature.
For more info https://inainn.eu/18-07-holiday-home/
https://stacker.news/items/1000386
-
@ df478568:2a951e67
2025-06-05 23:34:01About 156,000 blocks ago, I went to a Taco Shop for a bitcoin meetup. I asked my favorite question, “Do you accept bitcoin?”
“Yes," he said as he handed me a Toast Terminal with a BTCpayServer QR code.
]
Awesome!
12,960 blocks later, I took my dad to the taco shop. We ordered food. I asked my favorite question once again.
“Uh…Yeah, but I don't know how to work the machine.”
"Dough!🤦"
It's been a problem in the past, but now lightning payments are about to be ubiquitous. Steak N Shake is taking bitcoin using Speed Wallet and Block is implementing bitcoin payments by 2026 in all legal jurisdictions. I have tested both of these so you don't have to. Just kidding. I geek out on this stuff, but both work great. You can pay with your sats by scanning a screen on a QR code. The employees don't need to be bitcoin lightning network experts. You can just pay as easy as a credit card.
There were 35,000 people at the bitcoin conference, and 4,187 transactions were made. It was a world record. Wait, I thought they said there could only be 7 transactions per second! No, not anymore. Now we can use bitcoin for shopping. I can pay for tacos at taco trucks.
How You Can Accept Bitcoin At Your Business
Coinos is a simple bitcoin point of sale information that acts like a cash register. Bitcoin is peer-to-peer electronic cash. Coinos is a cash register and you should treat it as such. If you make a few hundred thousand sats at the end of the night, you should sweep the bitcoin into your own wallet.. You can use Aqua, AlbyHub, Bull Bitcoin wallet, or whatever your favorite lightning enabled wallet is to withdraw. You'll need a password. Do not lose this. I have tried the automatic withdraws, but it did not work for me. I'm no concerned because this is not a wallet I intend to keep a lot of sats in for a long time.
Here is my coinos payment terminal.
https://coinos.io/ZapthisBlog/receive
I made the QR code with libreqr.com/
Now I have an online bitcoin cash register. The Bitcoiners know how to pay for stuff with sats. They will be proud to show you too. If you're nerdy, you can use all the cool kid tools now, but we will just focus on the lightning address. Anyone can send you sats with a lightning address with just a QR code.
At the end of the night, you cash out to your own wallet. Again, this assumes you have an Aqua Wallet or any other lightning enabled wallet, but all it takes to accept bitcoin at your brick and mortar store is to create an account with Coinos and print out a QR code. It's a quick and easy way to start accepting bitcoin even if you don't expect many clients to shop with sats.
Tips
This is not just a cash register. Employees can also make their own Coinos wallet and receive tips from bitcoiners. Anyone can accept payments using this system. Your kids could use it to sell lemonade for sats. You are only limited by your imagination. When will you begin accepting bitcoin payments? It is easier than ever. You do not need to train employees. You do not need to be in the store. Bitcoin is peer-to-peer electronic cash so you can give it away like cash. I don't know what the tax rules on cash are. You need to verify that with your own jurisdiction. This is not financial or tax advice. This is for informational purposes only.
Remember, this is a custodial wallet. Not your keys not your bitcoin. Don't keep more sats than you are willing to lose on custodial wallets. Sweep your wallet early and often. Loss of funds is possible. There is a small fee for liquidity management too. Do your own research.
-
@ 374ee93a:36623347
2025-06-05 22:42:00Chef's notes
Start your day the self sovereign way
Details
- ⏲️ Prep time: 10 mins
- 🍳 Cook time: 15 mins
- 🍽️ Servings: 4
Ingredients
- 1lb Jar Bottled Rhubarb https://jimblesjumble.netlify.app/item/a0c35618722834ac714d0a47058a2adc76ee7485a6b74f5da5f9eb2d3fb5d879
- 1pt Homemade Custard (3/4pt cream, 3 large eggs, 100g honey, 1/2 tbspn vanilla extract)
- 4 Handfuls Granola
- 1 Node https://plebeian.market/products/huxley@nostrplebs.com/start-9-node-y22zfjp8x6
Directions
- Whisk together the cream, eggs, honey and vanilla
- Chill overnight or serve warm with 1/4 jar of stewed rhubarb and a large handful of granola per person
- Consolidate some UTXOs on your node
- Have a Good Morning
-
@ 57d1a264:69f1fee1
2025-06-08 06:27:45HTX Studio received a special email. The letter writer's daughter was unfortunately run over by a heavy truck on her way to school, and her right hand permanently lost its function. When using the computer, her hands have to frequently switch between the keyboard and the mouse, which makes typing very slow and tiring. He wanted us to make a one-handed keyboard for his daughter.
https://www.youtube.com/watch?v=9vW12gQ4Klc
The project has just been open-sourced at https://github.com/htx-studio/One-Handed-Keyboard and hopes to be helpful to those who need it. In English for you below:
One-Handed Keyboard
This is a single-mode mechanical keyboard with integrated trackball. The firmware uses QMK . Thanks to all the developers who have contributed to the QMK community.
Keyboard production reference: [Mr. He] We made a special keyboard...
Open source hardware: HTXStudio one-handed keyboard
The development environment and setup are available here , and the firmware source code is available here .
The information in this warehouse includes:
- A total of 8 PCBs for three keyboards for the left and right hands, provided by EasyEDA Engineering.
- VIA key change configuration file and compiled firmware.
- Model design files.
Warehouse directory structure
Docs
Data sheet and pictures of the chip.
Firmware
QMK firmware for three different keyboard models, and JSON files for VIA key changes.
Hardware
Project files of Jialichuang EDA.
Model
Model files and processing files used by each keyboard model.
Production Guide
PCB:
1-Right-hand keyboard-hot-swappable (large): board material FR-4, board thickness 1.6mm, four-layer board, laminate structure JLC04161H-3313, impedance control +/-20%.
1-Left-hand keyboard-welding board (small): board material FR-4, board thickness 1.6mm, double-layer board, ALPS yellow axis needs to be installed with a little force when inserted.
1-Left-hand keyboard-hot-swappable (large): board material FR-4, board thickness 1.6mm, four-layer board, laminate structure JLC04161H-3313, impedance control +/-20%.
2-TypeC: board material FR-4, board thickness 1.6mm, double-layer board, marked CON1 (only for large keyboards).
3-Trackball: board material FR-4, board thickness 1.6mm, double-layer board, the module needs to pay attention to the welding direction, marked CON3.
4- Mouse wheel: board material FR-4, board thickness 1.6mm, double-layer board, it is recommended to use 7mm high encoder, 6mm high button, button trigger pressure ≤180g, marked CON2.
5-Directional buttons: board material FR-4, board thickness 1.6mm, double-layer board, ALPS yellow shaft needs to be inserted with a little force, marked CON4.
6- Main control board - left hand (small): board material FR-4, board thickness 1.6mm, double-layer board.
- Three of them are keyboard-controlled common boards
《3-轨迹球》《4-鼠标滚轮》《5-方向按键》
. 《5-方向按键》
And《1-左手键盘-焊板(小)》
, the key axis uses ALPS yellow axis.- Note that the left and right hand keyboards are not completely mirrored.
- The trackball control uses SPI1 channel, and the scroll wheel has two separate signal lines, which allows replacing other control devices without major adjustments.
- The main control uses STM32G431CBU6.
- Compatible with A to C or C to C data cables.
Printout:
Keycap: resin, PLA, etc.
Trackball seat: resin, PLA, etc.
Left and right mouse buttons: resin, PLA, etc.
Shell: resin, PLA, etc.
Base: resin, PLA, etc.
Processing:
Positioning plate: Recommended material: pom, thickness 1.5mm.
Positioning plate cotton strip: glue left on one side.
Sandwich cotton: Recommended material is poron, 3.5mm thick.
Axle seat cotton: 2mm thick.
Bottom cotton: Recommended material: poron, 4mm thick.
Silicone pad (for keypad only): 5mm thick, hardness Shore 00-10.
other:
Trackball: diameter 25mm, material PTFE.
Lubricating ball: 2mm diameter, made of PTFE, installed in the printed trackball seat, 6 pieces in number.
Roller: Recommended diameter is between 19mm-20mm, thickness is between 4mm-5mm, and material is metal.
Satellite axis: 2U steel plate satellite axis.
Key switches: 57 ultra-small ALPS yellow switches for the small keyboard and 57 common mechanical switches for the large keyboard.
Cable arrangement: spacing 0.5mm, 8P reverse, 10cm2 strips, 15cm2 strips.
- The FPC sockets of the control board and the small board are both marked with CON, and the corresponding interfaces are connected.
- The file uses an FPC cable holder that can be connected up and down. It should be noted that when the cable holders are connected down, use reverse cable connection.
Model structure:
Installation order:
Take the large keyboard as an example
Pre-assembly work
- First, connect the 4 small PCBs to the keyboard body PCB using cables and burn the program.
- Install 3-5 shafts, rollers and trackballs. Make sure they function normally before assembly.
- Install the correct hot-melt copper nuts at the corresponding positions of the printed shell and base.
- Keycap printing.
- Attach the cotton strips to the protruding parts of the positioning plate (both on the front and back sides).
When burning the firmware for the first time, you can press and hold the button marked "B" on the back of the PCB and then plug in the USB cable to burn the firmware.
If you want to update the firmware, you can press and hold the "ESC" key on the keyboard and then insert the USB cable to burn the firmware.
For more information, please refer to Flashing Your Keyboard (QMK)
Next, start assembling
- Use screws to install the 4 small boards to the corresponding positions of the base (pay attention to the wiring and installation direction), and install screws at the bottom of the trackball base.
- Fix the left and right buttons on the keyboard PCB with screws.
- From bottom to top, place the bottom cotton, shaft seat cotton, keyboard PCB, sandwich cotton and positioning plate into the fan-shaped area of the base in order.
- Insert the key switch.
- Put it into the housing and secure it with screws from the bottom.
- Install the keycaps to complete the assembly.
The screw and nut installation guide can be found here
Finally, this is our first open source project. If there are any shortcomings, you are welcome to criticize and correct us. Thank you.
References
Quantum Mechanical Keyboard Firmware
mrjohnk. ADNS-9800. GitHub repository
https://x.com/HTX_Studio/status/1929915992349782206
https://stacker.news/items/1000384
-
@ 58537364:705b4b85
2025-06-05 15:55:12อารมณ์ คือ โลก - โลก คือ อารมณ์ อารมณ์ ในโลกปัจจุบันรวมอยู่ที่ วัตถุนิยม อารมณ์ จึงเป็นปัจจัยแห่งเหตุการณ์ทุกอย่างในโลก
…. “ เดี๋ยวนี้คําว่า “อารมณ์” ในภาษาไทยนั้น หมายถึงความรู้สึกในใจมากกว่า; เช่น พื้นเพของจิตใจในขณะนั้นเป็นอย่างไร, เรียกว่าอารมณ์ของเขาเป็นอย่างไร, อารมณ์กําลังดี อารมณ์กําลังไม่ดี, นี่ คําว่าอารมณ์ในภาษาไทยใช้กันไปเสียอย่างนี้ ; มันคนละเรื่องกับในภาษาบาลี ซึ่งคําว่า “อารมณ์” หมายถึง สิ่งที่จะเข้ามากระทบ ตา หู จมูก ลิ้น กาย ใจ.
…. ถ้ากระทบแล้วเกิดความรู้สึกอย่างไร งุ่นง่านอยู่ในใจ อันนั้นไม่ได้เรียกว่าอารมณ์; อันนั้นก็เรียกว่ากิเลสอย่างอื่น เช่น เรียกว่าตัณหาบ้าง อุปาทานบ้าง; ถ้าจัดเป็นพวกขันธ์ ก็เรียกว่า เวทนาขันธ์บ้าง สัญญาขันธ์บ้าง สังขารขันธ์บ้าง; ถ้าเป็นความคิดที่งุ่นง่านก็เรียกว่า “สังขารขันธ์” ทั้งนั้น ดังนั้น เราจะต้องถือเอาคําว่าอารมณ์ในบาลีมาเป็นหลัก …. คําว่า อารมณ์ ที่จะเข้าใจกันง่ายๆ ก็หมายความว่า รูป เสียง กลิ่น รส โผฏฐัพพะ ที่จะมากระทบ ตา หู จมูก ลิ้น กาย นี้ ๕ อย่าง แล้วก็ความรู้สึกเก่าแก่ที่จะมาผุดขึ้นในใจอีก เรียกว่า ธัมมารมณ์ ที่จะมากระทบใจในปัจจุบันนี้ นี้ก็เป็นอันหนึ่ง เลยได้เป็นอารมณ์ ๖. อารมณ์กระทบ ตา หู จมูก ลิ้น กาย ๕ อย่างข้างนอกนี้ก็สําคัญไปพวกหนึ่ง ที่ปรุงขึ้นภายในสําหรับกระทบใจโดยไม่ต้องอาศัย ตา หู จมูก ลิ้น กาย ใจ เลย ในเวลานั้นก็ยังมีอยู่นี้เรียกว่าธัมมารมณ์ นี้ก็ยิ่งสําคัญ: แต่ว่ารวมกันแล้วก็เรียกว่า อารมณ์ ได้ด้วยกันทั้งนั้น แปลว่า สิ่งที่จะมากระทบกับ ตา หู จมูก ลิ้น กาย ใจ นั่นเอง
…. นี้ ดูให้ละเอียดตามตัวหนังสือ คําว่า “อารมณ์” แปลว่า ที่หน่วงบ้าง แปลว่า ที่ยินดีบ้าง, มันมีความหมายละเอียดมาก. ถ้าถือเอาความหมายอย่างคนที่มีตัวตนเป็นหลัก ธรรมะในฝ่ายฮินดูหรือฝ่ายพรหมณ์เขาก็จะพูดว่า สําหรับจิตหรืออาตมันเข้าไปจับฉวยเอา. แต่ถ้าพูดอย่างภาษาชาวพุทธพูดอย่างนั้นไม่ได้ เพราะไม่มีจิตไม่มีอาตมันชนิดนั้น แล้วจิตนี้ก็เพิ่งเกิดขึ้นหลังอารมณ์กระทบแล้ว; เลยต้องพูดตามพระบาลีที่ว่า อาศัยตาด้วย อาศัยรูปด้วย ย่อมเกิดจักษุวิญญาณ; ตาอาศัยกับรูปคืออารมณ์นั้นได้แล้วจึงจะเกิดจักษุวิญญาณ วิญญาณหรือจิตนี้เกิดทีหลัง
…. ฉะนั้น จึงไม่พูดว่า อารมณ์นี้เป็นสิ่งสําหรับจิตหรือตัวตนเข้าไปจับฉวยยึดเอา; ถ้าพูดอย่างนั้นมันก็จะเป็นฮินดูหรือพราหมณ์ไป คือมีตัวตนไป. พูดอย่างพุทธไม่มีตัวตน ทุกอย่างไม่ใช่ตัวตน เป็นสักว่าธาตุ, ได้การปรุงแต่งที่เหมาะแล้วมันก็ปรุงแต่งเป็นสิ่งใหม่ขึ้นมา ในนั้นอาจจะมีความรู้สึกโง่ไปว่าเป็นตัวเราก็ได้
…. ฉะนั้น คําว่าอารมณ์ ถ้าถือตามหลักในทางพุทธศาสนา ก็แปลว่า สิ่งที่อาศัยกันกับจิต จะเรียกว่าเป็นที่หน่วงของจิตมันก็ยังได้: ถ้าเข้าใจผิดมันก็ผิดได้: เรียกว่าสิ่งที่อาศัยกับอายตนะ แล้วก็เกิดเป็นความรู้สึกเป็นจิตขึ้นมา จิตกําลังหน่วงสิ่งนั้นเป็นอารมณ์ก็ได้ แต่จะให้เป็นตัวตนนั้นไม่ได้
…. โดยพยัญชนะก็มีอยู่อย่างนี้ ตัวพยัญชนะก็ยังกํากวม อารมฺมณํ หรือที่มาจาก อาลมฺพนํ ก็แปลว่า ที่หน่วงของจิต. ถ้าจะถือว่ามาจาก รม ที่แปลว่า ยินดี ก็แปลว่า มันเป็นสิ่งที่หลงใหลยินดีของจิต อย่างนี้ก็ยังได้อีก
…. แต่ขอให้รู้จักจากภายในดีกว่าที่จะมารู้จักจากตัวหนังสือ เมื่อตากระทบรูป เมื่อหูกระทบเสียง เป็นต้น มันเกิดขึ้นในใจ, แล้วสังเกตเอาที่นั่นก็แล้วกัน ว่ารูปที่มากระทบตานั้นมันคืออะไร? เสียงที่มากระทบหูนั้นมันคืออะไร? จะค่อยเข้าใจแจ่มแจ้งขึ้นทีละน้อยๆ ว่าอารมณ์นั้นคืออะไร? แต่ให้เข้าใจไว้ทีหนึ่งก่อนว่าสิ่งที่เรียกว่าอารมณ์ๆที่มากระทบนี้ มันยังไม่ดีไม่ชั่ว ยังไม่จัดเป็นสิ่งดีสิ่งชั่ว มันต้องผสมปรุงแต่งเป็นความคิดอย่างนั้นอย่างนี้เสียก่อน จึงจะจัดเป็นดีเป็นชั่ว อารมณ์ล้วนๆยังไม่ดีไม่ชั่ว จะได้รู้จักป้องกัน อย่าให้เป็นไปในทางชั่ว, ให้เป็นไปแต่ในทางดีได้ตามปรารถนา
…. นี้เรียกว่าโดยพยัญชนะ โดยตัวหนังสือ คําว่า “อารมณ์” แปลว่า เป็นที่ยินดีแห่งจิต, เป็นที่ยึดหน่วงแห่งจิต; โดยเฉพาะภาษาอภิธรรมแล้วก็ใช้คําว่า “เป็นที่หน่วงเอาของจิต”, คือจิตย่อมหน่วงสิ่งใดสิ่งหนึ่งเป็นอารมณ์ แปลคําว่าอารมณ์บ้าง, อาลัมพนะ แปลว่า เป็นที่หน่วงเอา.
…. เดี๋ยวนี้เราเรียนพุทธศาสนาไม่ใช่เรามาเรียนหนังสือบาลี, เราจะเรียนพระธรรมคําสอนของพระพุทธเจ้า เราก็ต้องดูสิ่งที่เรียกว่าอารมณ์ โดยหลักของธรรมชาติที่ปรุงแต่งกันอยู่ในใจดีกว่า; ก็อย่างพระบาลีที่ได้ว่ามาแล้วข้างต้นว่า จกฺขุญฺจ ปฏิจฺจ รูเป จ อุปฺปชฺชติ จกฺขุวิญฺญาณํ = เพราะอาศัยตาด้วย รูปด้วย ย่อมบังเกิดจักษุวิญญาณ ติณฺณํ ธมฺมานํ สงฺคติ ผสฺโส - การประจวบกันของ ๓ สิ่งนี้เรียกว่า “ผัสสะ”, ผสฺสปจฺจยา เวทนา = เพราะผัสสะเป็นปัจจัยจึงเกิดเวทนา, อย่างนี้เรื่อยไปจนเกิดทุกข์ จนเกิดความทุกข์, นี้เรียกว่าโดยธรรมชาติ
…. สิ่งที่เรียกว่าอารมณ์มีอยู่โดยธรรมชาติที่จะเข้ามาอาศัยกันกับตาข้างใน ที่มีอยู่ในตัวคน. แล้วจะเกิดจักษุวิญญาณ เป็นต้น ขึ้นในตัวคน; จะเกิด ผัสสะ เวทนา ตัณหา อุปาทาน ภพ ชาติ ขึ้นในตัวคน; นี้โดยธรรมชาติ พระพุทธเจ้าท่านบันดาลอะไรไม่ได้ : ธรรมชาติเป็นอยู่อย่างนี้ แต่ท่านรู้เรื่องนี้ท่านจึงนํามาสอนว่า ธรรมชาติมันมีอยู่อย่างนี้ เราจะต้องเข้าใจให้ถูกต้อง โดยที่จะป้องกันความทุกข์ไม่ให้เกิดขึ้นมาได้, หรือถ้าเกิดขึ้นมาได้ก็จะดับเสียได้
…. เราควรจะรู้จักอารมณ์ในฐานะที่เป็นธรรมชาติอันหนึ่ง ที่มีอยู่ตามธรรมชาติ แล้วที่จะเข้ามาทําเรื่องทําราวขึ้นในจิตใจของคนเราให้เกิดปัญหายุ่งยากนี้ให้ดีๆ นี้เรียกว่ารู้จักอารมณ์จากธรรมชาติโดยตรงอย่างนี้ ดีกว่าที่จะรู้จักตามตัวหนังสือ, ดีกว่าที่จะรู้จักตามคําบอกเล่าบางอย่างบางประการที่มันไม่มีประโยชน์อะไร. รู้จักตามคําบอกเล่าก็รู้จักตามที่พระพุทธเจ้าท่านตรัสดีกว่า แต่แล้วยังไม่รู้จักตัวจริง จนกว่าจะมารู้จักจากที่เมื่ออารมณ์มากระทบตา หู จมูก ลิ้น กาย ใจ เข้าจริงๆ : นั่นจึงจะรู้จักอารมณ์ รู้จักผลที่เกิดขึ้นจากการกระทบของอารมณ์, รู้จักต่อไปตามลําดับ จนแก้ปัญหาต่างๆ ได้
…. นี่ ขอร้องให้รู้จักสิ่งที่เรียกว่า อารมณ์ ในฐานะที่เป็นธรรมชาติอันหนึ่ง ที่มีอยู่ตามธรรมชาติ ที่จะเข้ามากระทบอายตนะภายใน คือ กระทบ ตา หู จมูก ลิ้น กาย ใจ แล้วมีเรื่องมีราวมีปัญหา
อารมณ์ คือ โลก - โลก คือ อารมณ์ …. “ ที่นี้จะให้ดูต่อไปอีก ว่าโดยข้อเท็จจริงที่เป็นอยู่แล้ว อารมณ์นั้นคืออะไร? ถ้าจะพูดโดยข้อเท็จจริงหรือตามสถานการณ์ที่เป็นอยู่จริงในชีวิตของคนเรา อารมณ์มันก็คือ “โลก” นั่นเอง. เดี๋ยวนี้เราไม่รู้จักโลกในฐานะอย่างนี้, เราไปเข้าใจความหมายของคําว่าโลกแคบไปบ้าง หรือว่าเขวไปบ้าง.
…. ถ้าจะรู้ตามหลักพระพุทธศาสนาแล้ว โลกทั้งหมดก็คือสิ่งที่จะมาปรากฏแก่ ตา หู จมูก ลิ้น กาย ใจ ของเรา, เรามีเพียง ๖ อย่าง, แล้วมันก็ ปรากฏได้เพียง ๖ ทาง, มากกว่านั้นมันปรากฏไม่ได้ ดังนั้น โลกก็คือสิ่งที่จะมาปรากฏแก่ ตา หู จมูก ลิ้น กาย ใจ ๖ อย่างของเรา. “โลก” ก็คือ รูป เสียง กลิ่น รส โผฏฐัพพะ ธัมมารมณ์ ๖ ประการเท่านั้น, ไม่มีอะไรมากไปกว่านั้น
…. ฉะนั้น รูป เสียง กลิ่น รส โผฏฐัพพะ ธัมมารมณ์ แต่ละอย่าง ๆ ก็คือ โลกในแต่ละแง่ละมุม นั่นเอง, ที่เป็น รูป เสียง กลิ่น รส โผฏฐัพพะ ก็อยู่ข้างนอก จะเรียกว่าอยู่ข้างนอกก็ได้, ที่เป็นอารมณ์เกิดขึ้นในใจ ปรุงขึ้นในใจก็เรียกว่าโลกข้างในก็ได้ แต่มันก็เป็นโลกอยู่นั่นแหละ เพราะมันเป็นสิ่งที่จิตจะต้องรู้สึก จิตรู้สึกก็เรียกว่าโลกสําหรับจิต ตา หู จมูก ลิ้น กาย รู้สึก ก็เรียกว่าโลกสำหรับ ตา หู จมูก ลิ้น กาย. นี้ขอให้มองให้เห็นชัดตามพระพุทธประสงค์ว่า โลก ก็คือ อารมณ์, อารมณ์ ก็คือ โลก.
…. แต่ทีนี้ พระพุทธเจ้าท่านมองลึกกว่านั้น ท่านตรัสถึงข้อที่ว่า ถ้ามันมาเกิดเป็นปัญหาแก่เราเมื่อไรจึงจะเรียกว่า “มันมี” พอมันมาเป็นปัญหาแก่เราเมื่อไรก็เรียกว่า “เป็นทุกข์”; เพราะว่าเราได้ไปจับฉวยยึดถือเอาตามประสาตามวิสัยของคนที่ไม่รู้จักโลก ถ้าพูดว่าไม่รู้จักโลกแล้วคนก็มักจะไม่ยอมรับ เพราะว่าเขาจะพูดว่าเขารู้จักโลกดี. ยิ่งพวกฝรั่งสมัยนี้ นักวิทยาศาสตร์ปราดเปรื่องนั้น เขาจะไม่ยอมรับว่าเขาไม่รู้จักโลก. แต่ถ้าพูดตามหลักพุทธศาสนาแล้วก็จะพูดได้ว่ายังไม่รู้จักโลกเลย เป็นคนตาบอดยิ่งกว่าตาบอด; เพราะว่าฝรั่งเหล่านั้นรู้จักโลกแต่ในแง่สําหรับจะยึดมั่นถือมั่นเป็น “ตัวกู ของกู” จะครองโลกจะอะไร เอาประโยชน์ทุกอย่าง; เขารู้จักโลกในแง่นี้ อย่างนี้พุทธบริษัทไม่เรียกว่า “รู้จักโลก”; แต่ถือว่าเป็นคนตาบอดต่อโลก, หลงยึดมั่นถือมั่นในโลก. เพราะว่าคนเหล่านั้นไม่รู้จักโลกโดยความเป็นอารมณ์ ๖ ประการ คือ รูป เสียง กลิ่นรส โผฏฐัพพะ ธัมมารมณ์, แล้วเป็น “มายา” คือ เอาจริงไม่ได้ เป็นของชั่วคราวๆ หลอกให้เกิดความรู้สึกยึดมั่นถือมั่น
…. นี้เรารู้จัก เราไม่ไปหลงยึดมั่นถือมั่นกับมัน นี้จึงเรียกว่า “คนที่รู้จักโลก” ไปตามหลักของพุทธศาสนา, ฉะนั้น จึงไม่ยึดมั่นถือมั่นสิ่งใดโดยความเป็นตัวตน หรือโดยความเป็นของตน, เรียกว่าเป็นผู้รู้จักอารมณ์ ๖ ประการนั้นก็คือรู้จักโลกทั้งปวง, แล้วก็ไม่หลงไปในโลกในแง่ใดแง่หนึ่ง นี้เรียกว่า อารมณ์ ก็คือ โลก นั่นเอง ในความหมายที่ลึกที่สุดของพระพุทธสาสนา ไม่ใช่โลกก้อนดิน, ไม่ใช่โลกก้อนกลมๆ นี้. แต่มันหมายถึงคุณค่าอะไรที่มันมีอยู่ในโลกกลมๆ นี้ ที่จะเข้ามามาทําให้เกิดปัญหา ที่ตา ที่หู ที่จมูก ที่ลิ้น ที่กาย ที่ใจ ของคน. นั่นแหละคือตัวร้ายกาจของสิ่งที่เรียกว่า โลก เราจะต้องรู้จักในส่วนนี้ให้เพียงพอ
อารมณ์ในโลกปัจจุบันมารวมที่วัตถุนิยม …. ทีนี้ ดูอีกแง่หนึ่งก็โดยปัญหาที่กําลังมีอยู่ อารมณ์ในโลกนี้ในฐานะที่มันเป็นตัวปัญหาที่กําลังมีอยู่ มันมารวมอยู่ที่คําว่า “วัตถุนิยม”: หมายความว่า ตา หู จมูก ลิ้น กาย ใจ นี้ มันเป็นฝ่ายชนะ ไปหลงใหลในอารมณ์ รูป เสียง กลิ่น รส โผฏฐัพพะ ฯลฯ, แล้วก็เกิดนิยมหลงใหลในวัตถุเหล่านั้น จนเกิดความคิดใหม่ๆ, ปรุงแต่งไปในทางที่จะให้หลงใหลในโลกยิ่งขึ้นๆ, ความเจริญก้าวหน้า ในโลกสมัยนี้เป็นไปแต่ในทางอย่างนี้ ฉะนั้น จึงไกลความสงบ, ไกลสันติภาพ ไกลอะไรออกไปทุกที. การที่มนุษย์ที่มีปัญญาในโลกสมัยนี้ โดยเฉพาะฝรั่งที่ก้าวหน้านั้นเขาก็จัดโลกไปแต่ในแง่ของวัตถุมากขึ้นๆ: มันก็ไกลจากสันติภาพ ไกลจากความสงบสุขยิ่งขึ้นทุกที
…. ความสะดวกสบายที่ทําให้เกิดขึ้นมาได้นั้น ไม่ได้ช่วยส่งเสริมเกิดสันติภาพ; แต่มันช่วยให้เกิดความหลงในโลกนั้นเองมากขึ้น แล้วก็ช่วยให้หลงใหลใน “ตัวกู ของกู”, ยึดมั่นถือมั่นเห็นแก่ตัวมากขึ้น รวมกันแล้วมันไม่มีทางที่จะเกิดสันติภาพหรือสันติสุขในโลกได้เลย, จึงกลายเป็นความหลอกลวงเหลือประมาณ โลกจึงกลายเป็นความหลอกลวง, หรือสิ่งที่หลอกลวงเหลือประมาณใน เวลานี้ เราเรียกกันว่า ติดบ่วง หรือว่า ติดเหยื่อของวัตถุนิยม. คําพูดทั้งหมดนี้ ล้วนแต่เป็นการแสดงให้เห็นว่า อารมณ์นี้คืออะไร สิ่งที่เรียกว่าอารมณ์นั้น คือตัวโลกที่กําลังหลอกลวงเราอยู่ทุกวันอย่างยิ่ง โดยเฉพาะในปัจจุบันนี้เป็นวัตถุนิยม นี้คืออารมณ์”
พุทธทาสภิกขุ ที่มา : ธรรมบรรยายภาคมาฆบูชา ครั้งที่ ๗ หัวข้อเรื่อง “อารมณ์ คือ ปัจจัยแห่งเหตุการณ์ทุกอย่างในโลก” เมื่อวันที่ ๑๖ กุมภาพันธ์ ๒๕๑๗ จากหนังสือชุดธรรมโฆษณ์ เล่มชื่อว่า “ก ข ก กา ของการศึกษาพุทธศาสนา”
หมายเหตุ
“อารมณ์ ” ในทางพุทธศาสนา มี ๖ คือ... * ๑. รูปะ = รูป, สิ่งที่เห็น หรือ วัณณะ คือ สี * ๒. สัททะ = เสียง * ๓. คันธะ = กลิ่น * ๔. รสะ = รส * ๕. โผฏฐัพพะ = สัมผัสทางกาย * ๖. ธรรมารมณ์ = สิ่งที่ใจนึกคิด, อารมณ์ที่เกิดกับใจ
…. ทั้ง ๖ อย่างนี้ เป็นสิ่งสำหรับให้จิตยึดหน่วง เรียกอีกอย่างว่า "อายตนะภานนอก" ก็ได้
“อายตนะภายใน ๖” คือ ที่เชื่อมต่อให้เกิดความรู้, แดนต่อความรู้ฝ่ายภายใน มี * ๖ อย่าง คือ... * ๑. จักษุ - ตา * ๒. โสตะ - หู * ๓. ฆานะ - จมูก * ๔. ชิวหา - ลิ้น * ๕. กาย - กาย * ๖. มโน - ใจ
… หรือจะเรียกอีกอย่างว่า “อินทรีย์ ๖” ก็ได้ เพราะเป็นใหญ่ในหน้าที่ของตนแต่ละอย่าง เช่น จักษุ เป็นเจ้าการ(เป็นใหญ่)ในการเห็น เป็นต้น
ท. ส. ปัญญาวุฑโฒ – รวบรวม.
-
@ 318ebaba:9a262eae
2025-06-08 10:15:56✒️ My articles
-
@ 57d1a264:69f1fee1
2025-06-08 05:57:12There is a certain image that pops up whenever people think about crushing soda cans. It is the kind of scene you see in movies, where a brawny athlete flattens an empty can with a single squeeze, probably in front of a cheering crowd. The reality, however, is far less cinematic. Most of us barely manage a dent before abandoning the can, sending it tumbling toward the trash bin, often missing the target entirely and hoping no one noticed. It is hardly the stuff of legends, unless you consider fumbling for a runaway soda can an athletic event.
In the end, the Yeti Can Crusher is more than just a clever gadget. It is a reminder that even the simplest chores can be transformed into moments of enjoyment, especially when the right tool is involved. There is a certain thrill in turning a dull task into a satisfying ritual, and when you add a dash of style, suddenly recycling is not just good for the planet, it is actually a little bit fun. With the right crusher in your hand, you might just find yourself looking forward to the next empty can.
Curious to learn more? https://www.yeti.com/outdoor-living/20110010027.html
https://stacker.news/items/1000380
-
@ 3eab247c:1d80aeed
2025-06-05 08:51:39Global Metrics
Here are the top stats from the last period:
- Total Bitcoin-accepting merchants: 15,306 → 16,284
- Recently verified (1y): 7,540 → 7,803 (the rest of our dataset is slowly rotting; help us before it's too late!)
- Avg. days since last verification: 398 → 405 (more mappers, please)
- Merchants boosted: 22 (for a total of 4,325 days, someone is feeling generous)
- Comments posted: 34
Find current stats over at the 👉 BTC Map Dashboard.
Merchant Adoption
Steak n’ Shake
The US 🇺🇸 is a massive country, yet its BTC Map footprint has been lagging relative to other countries ... that is until now!
In what came as a nice surprise to our Shadowy Supertaggers 🫠, the Steak ’n Shake chain began accepting Bitcoin payments across hundreds of its locations nationwide (with some international locations too).
According to CoinDesk, the rollout has been smooth, with users reporting seamless transactions powered by Speed.
This marks a significant step towards broader Bitcoin adoption in the US. Now to drop the capital gains tax on cheesburgers!
SPAR Switzerland
In other chain/franchise adoption news, the first SPAR supermarket in Switzerland 🇨🇭 to begin accepting Bitcoin was this one in Zug. It was quickly followed by this one in Rossrüti and this one in Kreuzlingen, in what is believed to be part of a wider roll-out plan within the country powered by DFX's Open CryptoPay.
That said, we believe the OG SPAR crown goes to SPAR City in Arnhem Bitcoin City!
New Features
Merchant Comments in the Web App
Web App users are now on par with Android users in that they can both see and make comments on merchants.
This is powered by our tweaked API that enables anyone to make a comment as long as they pass the satswall fee of 500 sats. This helps keep spam manageable and ensure quality comments.
And just in case you were wondering what the number count was on the merchant pins - yep, they're comments!
Here is an 👉 Example merchant page with comments.
Merchant Page Design Tweaks
To support the now trio of actions (Verify, Boost & Comment) on the merchant page, we've re-jigged the design a little to make things a little clearer.
What do you think?
Technical
Codebase Refactoring
Thanks to Hannes’s contributions, we’ve made progress in cleaning-up the Web App's codebase and completing long overdue maintenance. Whilst often thankless tasks, these caretaking activities help immensely with long-term maintainability enabling us to confidently build new features.
Auth System Upgrades
The old auth system was held together with duct tape and prayers, and we’re working on a more robust authentication system to support future public API access. Updates include:
- Password hashing
- Bearer token support
- Improved security practices
More enhancements are in progress and we'll update you in the next blog post.
Better API Documentation
Instead of relying on tribal knowledge, we're finally getting around to writing actual docs (with the help/hindrance of LLMs). The "move fast, break everything" era is over; now we move slightly slower and break slightly less. Progress!
Database Improvements
We use SQLite, which works well but it requires careful handling in async Rust environments. So now we're untangling this mess to avoid accidental blocking queries (and the ensuing dumpster fires).
Backup System Enhancements
BTC Map data comes in three layers of fragility:
- Merchants (backed up by OS - the big boys handle this)
- Non-OSM stuff (areas, users, etc. - currently stored on a napkin)
- External systems (Lightning node, submission tickets - pray to Satoshi)
We're now forcing two core members to backup everything, because redundancy is good.
Credits
Thanks to everyone who directly contributed to the project this period:
- Comino
- descubrebitcoin
- Hannes
- Igor Bubelov
- Nathan Day
- Rockedf
- Saunter
- SiriusBig
- vv01f
Support Us
There are many ways in which you can support us:
-
Become a Shadowy Supertagger and help maintain your local area or pitch-in with the never-ending global effort.
-
Consider a zapping this note or make a donation to the to the project here.
-
@ 21335073:a244b1ad
2025-05-09 13:56:57Someone asked for my thoughts, so I’ll share them thoughtfully. I’m not here to dictate how to promote Nostr—I’m still learning about it myself. While I’m not new to Nostr, freedom tech is a newer space for me. I’m skilled at advocating for topics I deeply understand, but freedom tech isn’t my expertise, so take my words with a grain of salt. Nothing I say is set in stone.
Those who need Nostr the most are the ones most vulnerable to censorship on other platforms right now. Reaching them requires real-time awareness of global issues and the dynamic relationships between governments and tech providers, which can shift suddenly. Effective Nostr promoters must grasp this and adapt quickly.
The best messengers are people from or closely tied to these at-risk regions—those who truly understand the local political and cultural dynamics. They can connect with those in need when tensions rise. Ideal promoters are rational, trustworthy, passionate about Nostr, but above all, dedicated to amplifying people’s voices when it matters most.
Forget influencers, corporate-backed figures, or traditional online PR—it comes off as inauthentic, corny, desperate and forced. Nostr’s promotion should be grassroots and organic, driven by a few passionate individuals who believe in Nostr and the communities they serve.
The idea that “people won’t join Nostr due to lack of reach” is nonsense. Everyone knows X’s “reach” is mostly with bots. If humans want real conversations, Nostr is the place. X is great for propaganda, but Nostr is for the authentic voices of the people.
Those spreading Nostr must be so passionate they’re willing to onboard others, which is time-consuming but rewarding for the right person. They’ll need to make Nostr and onboarding a core part of who they are. I see no issue with that level of dedication. I’ve been known to get that way myself at times. It’s fun for some folks.
With love, I suggest not adding Bitcoin promotion with Nostr outreach. Zaps already integrate that element naturally. (Still promote within the Bitcoin ecosystem, but this is about reaching vulnerable voices who needed Nostr yesterday.)
To promote Nostr, forget conventional strategies. “Influencers” aren’t the answer. “Influencers” are not the future. A trusted local community member has real influence—reach them. Connect with people seeking Nostr’s benefits but lacking the technical language to express it. This means some in the Nostr community might need to step outside of the Bitcoin bubble, which is uncomfortable but necessary. Thank you in advance to those who are willing to do that.
I don’t know who is paid to promote Nostr, if anyone. This piece isn’t shade. But it’s exhausting to see innocent voices globally silenced on corporate platforms like X while Nostr exists. Last night, I wondered: how many more voices must be censored before the Nostr community gets uncomfortable and thinks creatively to reach the vulnerable?
A warning: the global need for censorship-resistant social media is undeniable. If Nostr doesn’t make itself known, something else will fill that void. Let’s start this conversation.
-
@ dfa02707:41ca50e3
2025-06-08 05:01:50News
- Bitcoin mining centralization in 2025. According to a blog post by b10c, Bitcoin mining was at its most decentralized in May 2017, with another favorable period from 2019 to 2022. However, starting in 2023, mining has become increasingly centralized, particularly due to the influence of large pools like Foundry and the use of proxy pooling by entities such as AntPool.
Source: b10c's blog.
- OpenSats announces the eleventh wave of Nostr grants. The five projects in this wave are the mobile live-streaming app Swae, the Nostr-over-ham-radio project HAMSTR, Vertex—a Web-of-Trust (WOT) service for Nostr developers, Nostr Double Ratchet for end-to-end encrypted messaging, and the Nostr Game Engine for building games and applications integrated with the Nostr ecosystem.
- New Spiral grantee: l0rinc. In February 2024, l0rinc transitioned to full-time work on Bitcoin Core. His efforts focus on performance benchmarking and optimizations, enhancing code quality, conducting code reviews, reducing block download times, optimizing memory usage, and refactoring code.
- Project Eleven offers 1 BTC to break Bitcoin's cryptography with a quantum computer. The quantum computing research organization has introduced the Q-Day Prize, a global challenge that offers 1 BTC to the first team capable of breaking an elliptic curve cryptographic (ECC) key using Shor’s algorithm on a quantum computer. The prize will be awarded to the first team to successfully accomplish this breakthrough by April 5, 2026.
- Unchained has launched the Bitcoin Legacy Project. The initiative seeks to advance the Bitcoin ecosystem through a bitcoin-native donor-advised fund platform (DAF), investments in community hubs, support for education and open-source development, and a commitment to long-term sustainability with transparent annual reporting.
- In its first year, the program will provide support to Bitcoin hubs in Nashville, Austin, and Denver.
- Support also includes $50,000 to the Bitcoin Policy Institute, a $150,000 commitment at the University of Austin, and up to $250,000 in research grants through the Bitcoin Scholars program.
"Unchained will match grants 1:1 made to partner organizations who support Bitcoin Core development when made through the Unchained-powered bitcoin DAF, up to 1 BTC," was stated in a blog post.
- Block launched open-source tools for Bitcoin treasury management. These include a dashboard for managing corporate bitcoin holdings and provides a real-time BTC-to-USD price quote API, released as part of the Block Open Source initiative. The company’s own instance of the bitcoin holdings dashboard is available here.
Source: block.xyz
- Bull Bitcoin expands to Mexico, enabling anyone in the country to receive pesos from anywhere in the world straight from a Bitcoin wallet. Additionally, users can now buy Bitcoin with a Mexican bank account.
"Bull Bitcoin strongly believes in Bitcoin’s economic potential in Mexico, not only for international remittances and tourism, but also for Mexican individuals and companies to reclaim their financial sovereignty and protect their wealth from inflation and the fragility of traditional financial markets," said Francis Pouliot, Founder and CEO of Bull Bitcoin.
- Corporate bitcoin holdings hit a record high in Q1 2025. According to Bitwise, public companies' adoption of Bitcoin has hit an all-time high. In Q1 2025, these firms collectively hold over 688,000 BTC, marking a 16.11% increase from the previous quarter. This amount represents 3.28% of Bitcoin's fixed 21 million supply.
Source: Bitwise.
- The Bitcoin Bond Company for institutions has launched with the aim of acquiring $1 trillion in Bitcoin over 21 years. It utilizes secure, transparent, and compliant bond-like products backed by Bitcoin.
- The U.S. Senate confirmed Paul Atkins as Chair of the Securities and Exchange Commission (SEC). At his confirmation hearing, Atkins emphasized the need for a clear framework for digital assets. He aims to collaborate with the CFTC and Congress to address jurisdiction and rulemaking gaps, aligning with the Trump administration's goal to position the U.S. as a leader in Bitcoin and blockchain finance.
- Ethereum developer Virgil Griffith has been released from custody. Griffith, whose sentence was reduced to 56 months, is now seeking a pardon. He was initially sentenced to 63 months for allegedly violating international sanctions laws by providing technical advice on using cryptocurrencies and blockchain technology to evade sanctions during a presentation titled 'Blockchains for Peace' in North Korea.
- No-KYC exchange eXch to close down under money laundering scrutiny. The privacy-focused cryptocurrency trading platform said it will cease operations on May 1. This decision follows allegations that the platform was used by North Korea's Lazarus Group for money laundering. eXch revealed it is the subject of an active "transatlantic operation" aimed at shutting down the platform and prosecuting its team for "money laundering and terrorism."
- Blockstream combats ESP32 FUD concerning Jade signers. The company stated that after reviewing the vulnerability disclosed in early March, Jade was found to be secure. Espressif Systems, the designer of the ESP32, has since clarified that the "undocumented commands" do not constitute a "backdoor."
- Bank of America is lobbying for regulations that favor banks over tech firms in stablecoin issuance. The bank's CEO Brian Moynihan is working with groups such as the American Bankers Association to advance the issuance of a fully reserved, 1:1 backed "Bank of America coin." If successful, this could limit stablecoin efforts by non-banks like Tether, Circle, and others, reports The Block.
- Tether to back OCEAN Pool with its hashrate. "As a company committed to financial freedom and open access, we see supporting decentralization in Bitcoin mining as essential to the network’s long-term integrity," said Tether CEO Paolo Ardoino.
- Bitdeer to expand its self-mining operations to navigate tariffs. The Singapore-based mining company is advancing plans to produce machines in the U.S. while reducing its mining hardware sales. This response is in light of increasing uncertainties related to U.S. trade policy, as reported by Bloomberg.
- Tether acquires $32M in Bitdeer shares. The firm has boosted its investment in Bitdeer during a wider market sell-off, with purchases in early to mid-April amounting to about $32 million, regulatory filings reveal.
- US Bitcoin miner manufacturer Auradine has raised $153 million in a Series C funding round as it expands into AI infrastructure. The round was led by StepStone Group and included participation from Maverick Silicon, Premji Invest, Samsung Catalyst Fund, Qualcomm Ventures, Mayfield, MARA Holdings, GSBackers, and other existing investors. The firm raised to over $300 million since its inception in 2022.
- Voltage has partnered with BitGo to [enable](https://www.voltage.cloud/blog/bitgo-and-voltage-team-up-to-deliver-instant-bitcoin-and-stabl
-
@ 81022b27:2b8d0644
2025-06-08 04:22:00Here’s the thing: authenticity gives off a vibration: There is so little of it anywhere that we crave it. That’s why an orange guy beats someone who doesn’t mean what they say. Because they don’t really believe a guy in a dress is a woman because that’s what they say they are
People feel vibes and hearing someone lie to their face is offensive. They will follow the guy that at least believes what he is
-
@ 21335073:a244b1ad
2025-05-01 01:51:10Please respect Virginia Giuffre’s memory by refraining from asking about the circumstances or theories surrounding her passing.
Since Virginia Giuffre’s death, I’ve reflected on what she would want me to say or do. This piece is my attempt to honor her legacy.
When I first spoke with Virginia, I was struck by her unshakable hope. I had grown cynical after years in the anti-human trafficking movement, worn down by a broken system and a government that often seemed complicit. But Virginia’s passion, creativity, and belief that survivors could be heard reignited something in me. She reminded me of my younger, more hopeful self. Instead of warning her about the challenges ahead, I let her dream big, unburdened by my own disillusionment. That conversation changed me for the better, and following her lead led to meaningful progress.
Virginia was one of the bravest people I’ve ever known. As a survivor of Epstein, Maxwell, and their co-conspirators, she risked everything to speak out, taking on some of the world’s most powerful figures.
She loved when I said, “Epstein isn’t the only Epstein.” This wasn’t just about one man—it was a call to hold all abusers accountable and to ensure survivors find hope and healing.
The Epstein case often gets reduced to sensational details about the elite, but that misses the bigger picture. Yes, we should be holding all of the co-conspirators accountable, we must listen to the survivors’ stories. Their experiences reveal how predators exploit vulnerabilities, offering lessons to prevent future victims.
You’re not powerless in this fight. Educate yourself about trafficking and abuse—online and offline—and take steps to protect those around you. Supporting survivors starts with small, meaningful actions. Free online resources can guide you in being a safe, supportive presence.
When high-profile accusations arise, resist snap judgments. Instead of dismissing survivors as “crazy,” pause to consider the trauma they may be navigating. Speaking out or coping with abuse is never easy. You don’t have to believe every claim, but you can refrain from attacking accusers online.
Society also fails at providing aftercare for survivors. The government, often part of the problem, won’t solve this. It’s up to us. Prevention is critical, but when abuse occurs, step up for your loved ones and community. Protect the vulnerable. it’s a challenging but a rewarding journey.
If you’re contributing to Nostr, you’re helping build a censorship resistant platform where survivors can share their stories freely, no matter how powerful their abusers are. Their voices can endure here, offering strength and hope to others. This gives me great hope for the future.
Virginia Giuffre’s courage was a gift to the world. It was an honor to know and serve her. She will be deeply missed. My hope is that her story inspires others to take on the powerful.
-
@ 52b4a076:e7fad8bd
2025-04-28 00:48:57I have been recently building NFDB, a new relay DB. This post is meant as a short overview.
Regular relays have challenges
Current relay software have significant challenges, which I have experienced when hosting Nostr.land: - Scalability is only supported by adding full replicas, which does not scale to large relays. - Most relays use slow databases and are not optimized for large scale usage. - Search is near-impossible to implement on standard relays. - Privacy features such as NIP-42 are lacking. - Regular DB maintenance tasks on normal relays require extended downtime. - Fault-tolerance is implemented, if any, using a load balancer, which is limited. - Personalization and advanced filtering is not possible. - Local caching is not supported.
NFDB: A scalable database for large relays
NFDB is a new database meant for medium-large scale relays, built on FoundationDB that provides: - Near-unlimited scalability - Extended fault tolerance - Instant loading - Better search - Better personalization - and more.
Search
NFDB has extended search capabilities including: - Semantic search: Search for meaning, not words. - Interest-based search: Highlight content you care about. - Multi-faceted queries: Easily filter by topic, author group, keywords, and more at the same time. - Wide support for event kinds, including users, articles, etc.
Personalization
NFDB allows significant personalization: - Customized algorithms: Be your own algorithm. - Spam filtering: Filter content to your WoT, and use advanced spam filters. - Topic mutes: Mute topics, not keywords. - Media filtering: With Nostr.build, you will be able to filter NSFW and other content - Low data mode: Block notes that use high amounts of cellular data. - and more
Other
NFDB has support for many other features such as: - NIP-42: Protect your privacy with private drafts and DMs - Microrelays: Easily deploy your own personal microrelay - Containers: Dedicated, fast storage for discoverability events such as relay lists
Calcite: A local microrelay database
Calcite is a lightweight, local version of NFDB that is meant for microrelays and caching, meant for thousands of personal microrelays.
Calcite HA is an additional layer that allows live migration and relay failover in under 30 seconds, providing higher availability compared to current relays with greater simplicity. Calcite HA is enabled in all Calcite deployments.
For zero-downtime, NFDB is recommended.
Noswhere SmartCache
Relays are fixed in one location, but users can be anywhere.
Noswhere SmartCache is a CDN for relays that dynamically caches data on edge servers closest to you, allowing: - Multiple regions around the world - Improved throughput and performance - Faster loading times
routerd
routerd
is a custom load-balancer optimized for Nostr relays, integrated with SmartCache.routerd
is specifically integrated with NFDB and Calcite HA to provide fast failover and high performance.Ending notes
NFDB is planned to be deployed to Nostr.land in the coming weeks.
A lot more is to come. 👀️️️️️️
-
@ 91bea5cd:1df4451c
2025-04-26 10:16:21O Contexto Legal Brasileiro e o Consentimento
No ordenamento jurídico brasileiro, o consentimento do ofendido pode, em certas circunstâncias, afastar a ilicitude de um ato que, sem ele, configuraria crime (como lesão corporal leve, prevista no Art. 129 do Código Penal). Contudo, o consentimento tem limites claros: não é válido para bens jurídicos indisponíveis, como a vida, e sua eficácia é questionável em casos de lesões corporais graves ou gravíssimas.
A prática de BDSM consensual situa-se em uma zona complexa. Em tese, se ambos os parceiros são adultos, capazes, e consentiram livre e informadamente nos atos praticados, sem que resultem em lesões graves permanentes ou risco de morte não consentido, não haveria crime. O desafio reside na comprovação desse consentimento, especialmente se uma das partes, posteriormente, o negar ou alegar coação.
A Lei Maria da Penha (Lei nº 11.340/2006)
A Lei Maria da Penha é um marco fundamental na proteção da mulher contra a violência doméstica e familiar. Ela estabelece mecanismos para coibir e prevenir tal violência, definindo suas formas (física, psicológica, sexual, patrimonial e moral) e prevendo medidas protetivas de urgência.
Embora essencial, a aplicação da lei em contextos de BDSM pode ser delicada. Uma alegação de violência por parte da mulher, mesmo que as lesões ou situações decorram de práticas consensuais, tende a receber atenção prioritária das autoridades, dada a presunção de vulnerabilidade estabelecida pela lei. Isso pode criar um cenário onde o parceiro masculino enfrenta dificuldades significativas em demonstrar a natureza consensual dos atos, especialmente se não houver provas robustas pré-constituídas.
Outros riscos:
Lesão corporal grave ou gravíssima (art. 129, §§ 1º e 2º, CP), não pode ser justificada pelo consentimento, podendo ensejar persecução penal.
Crimes contra a dignidade sexual (arts. 213 e seguintes do CP) são de ação pública incondicionada e independem de representação da vítima para a investigação e denúncia.
Riscos de Falsas Acusações e Alegação de Coação Futura
Os riscos para os praticantes de BDSM, especialmente para o parceiro que assume o papel dominante ou que inflige dor/restrição (frequentemente, mas não exclusivamente, o homem), podem surgir de diversas frentes:
- Acusações Externas: Vizinhos, familiares ou amigos que desconhecem a natureza consensual do relacionamento podem interpretar sons, marcas ou comportamentos como sinais de abuso e denunciar às autoridades.
- Alegações Futuras da Parceira: Em caso de término conturbado, vingança, arrependimento ou mudança de perspectiva, a parceira pode reinterpretar as práticas passadas como abuso e buscar reparação ou retaliação através de uma denúncia. A alegação pode ser de que o consentimento nunca existiu ou foi viciado.
- Alegação de Coação: Uma das formas mais complexas de refutar é a alegação de que o consentimento foi obtido mediante coação (física, moral, psicológica ou econômica). A parceira pode alegar, por exemplo, que se sentia pressionada, intimidada ou dependente, e que seu "sim" não era genuíno. Provar a ausência de coação a posteriori é extremamente difícil.
- Ingenuidade e Vulnerabilidade Masculina: Muitos homens, confiando na dinâmica consensual e na parceira, podem negligenciar a necessidade de precauções. A crença de que "isso nunca aconteceria comigo" ou a falta de conhecimento sobre as implicações legais e o peso processual de uma acusação no âmbito da Lei Maria da Penha podem deixá-los vulneráveis. A presença de marcas físicas, mesmo que consentidas, pode ser usada como evidência de agressão, invertendo o ônus da prova na prática, ainda que não na teoria jurídica.
Estratégias de Prevenção e Mitigação
Não existe um método infalível para evitar completamente o risco de uma falsa acusação, mas diversas medidas podem ser adotadas para construir um histórico de consentimento e reduzir vulnerabilidades:
- Comunicação Explícita e Contínua: A base de qualquer prática BDSM segura é a comunicação constante. Negociar limites, desejos, palavras de segurança ("safewords") e expectativas antes, durante e depois das cenas é crucial. Manter registros dessas negociações (e-mails, mensagens, diários compartilhados) pode ser útil.
-
Documentação do Consentimento:
-
Contratos de Relacionamento/Cena: Embora a validade jurídica de "contratos BDSM" seja discutível no Brasil (não podem afastar normas de ordem pública), eles servem como forte evidência da intenção das partes, da negociação detalhada de limites e do consentimento informado. Devem ser claros, datados, assinados e, idealmente, reconhecidos em cartório (para prova de data e autenticidade das assinaturas).
-
Registros Audiovisuais: Gravar (com consentimento explícito para a gravação) discussões sobre consentimento e limites antes das cenas pode ser uma prova poderosa. Gravar as próprias cenas é mais complexo devido a questões de privacidade e potencial uso indevido, mas pode ser considerado em casos específicos, sempre com consentimento mútuo documentado para a gravação.
Importante: a gravação deve ser com ciência da outra parte, para não configurar violação da intimidade (art. 5º, X, da Constituição Federal e art. 20 do Código Civil).
-
-
Testemunhas: Em alguns contextos de comunidade BDSM, a presença de terceiros de confiança durante negociações ou mesmo cenas pode servir como testemunho, embora isso possa alterar a dinâmica íntima do casal.
- Estabelecimento Claro de Limites e Palavras de Segurança: Definir e respeitar rigorosamente os limites (o que é permitido, o que é proibido) e as palavras de segurança é fundamental. O desrespeito a uma palavra de segurança encerra o consentimento para aquele ato.
- Avaliação Contínua do Consentimento: O consentimento não é um cheque em branco; ele deve ser entusiástico, contínuo e revogável a qualquer momento. Verificar o bem-estar do parceiro durante a cena ("check-ins") é essencial.
- Discrição e Cuidado com Evidências Físicas: Ser discreto sobre a natureza do relacionamento pode evitar mal-entendidos externos. Após cenas que deixem marcas, é prudente que ambos os parceiros estejam cientes e de acordo, talvez documentando por fotos (com data) e uma nota sobre a consensualidade da prática que as gerou.
- Aconselhamento Jurídico Preventivo: Consultar um advogado especializado em direito de família e criminal, com sensibilidade para dinâmicas de relacionamento alternativas, pode fornecer orientação personalizada sobre as melhores formas de documentar o consentimento e entender os riscos legais específicos.
Observações Importantes
- Nenhuma documentação substitui a necessidade de consentimento real, livre, informado e contínuo.
- A lei brasileira protege a "integridade física" e a "dignidade humana". Práticas que resultem em lesões graves ou que violem a dignidade de forma não consentida (ou com consentimento viciado) serão ilegais, independentemente de qualquer acordo prévio.
- Em caso de acusação, a existência de documentação robusta de consentimento não garante a absolvição, mas fortalece significativamente a defesa, ajudando a demonstrar a natureza consensual da relação e das práticas.
-
A alegação de coação futura é particularmente difícil de prevenir apenas com documentos. Um histórico consistente de comunicação aberta (whatsapp/telegram/e-mails), respeito mútuo e ausência de dependência ou controle excessivo na relação pode ajudar a contextualizar a dinâmica como não coercitiva.
-
Cuidado com Marcas Visíveis e Lesões Graves Práticas que resultam em hematomas severos ou lesões podem ser interpretadas como agressão, mesmo que consentidas. Evitar excessos protege não apenas a integridade física, mas também evita questionamentos legais futuros.
O que vem a ser consentimento viciado
No Direito, consentimento viciado é quando a pessoa concorda com algo, mas a vontade dela não é livre ou plena — ou seja, o consentimento existe formalmente, mas é defeituoso por alguma razão.
O Código Civil brasileiro (art. 138 a 165) define várias formas de vício de consentimento. As principais são:
Erro: A pessoa se engana sobre o que está consentindo. (Ex.: A pessoa acredita que vai participar de um jogo leve, mas na verdade é exposta a práticas pesadas.)
Dolo: A pessoa é enganada propositalmente para aceitar algo. (Ex.: Alguém mente sobre o que vai acontecer durante a prática.)
Coação: A pessoa é forçada ou ameaçada a consentir. (Ex.: "Se você não aceitar, eu termino com você" — pressão emocional forte pode ser vista como coação.)
Estado de perigo ou lesão: A pessoa aceita algo em situação de necessidade extrema ou abuso de sua vulnerabilidade. (Ex.: Alguém em situação emocional muito fragilizada é induzida a aceitar práticas que normalmente recusaria.)
No contexto de BDSM, isso é ainda mais delicado: Mesmo que a pessoa tenha "assinado" um contrato ou dito "sim", se depois ela alegar que seu consentimento foi dado sob medo, engano ou pressão psicológica, o consentimento pode ser considerado viciado — e, portanto, juridicamente inválido.
Isso tem duas implicações sérias:
-
O crime não se descaracteriza: Se houver vício, o consentimento é ignorado e a prática pode ser tratada como crime normal (lesão corporal, estupro, tortura, etc.).
-
A prova do consentimento precisa ser sólida: Mostrando que a pessoa estava informada, lúcida, livre e sem qualquer tipo de coação.
Consentimento viciado é quando a pessoa concorda formalmente, mas de maneira enganada, forçada ou pressionada, tornando o consentimento inútil para efeitos jurídicos.
Conclusão
Casais que praticam BDSM consensual no Brasil navegam em um terreno que exige não apenas confiança mútua e comunicação excepcional, mas também uma consciência aguçada das complexidades legais e dos riscos de interpretações equivocadas ou acusações mal-intencionadas. Embora o BDSM seja uma expressão legítima da sexualidade humana, sua prática no Brasil exige responsabilidade redobrada. Ter provas claras de consentimento, manter a comunicação aberta e agir com prudência são formas eficazes de se proteger de falsas alegações e preservar a liberdade e a segurança de todos os envolvidos. Embora leis controversas como a Maria da Penha sejam "vitais" para a proteção contra a violência real, os praticantes de BDSM, e em particular os homens nesse contexto, devem adotar uma postura proativa e prudente para mitigar os riscos inerentes à potencial má interpretação ou instrumentalização dessas práticas e leis, garantindo que a expressão de sua consensualidade esteja resguardada na medida do possível.
Importante: No Brasil, mesmo com tudo isso, o Ministério Público pode denunciar por crime como lesão corporal grave, estupro ou tortura, independente de consentimento. Então a prudência nas práticas é fundamental.
Aviso Legal: Este artigo tem caráter meramente informativo e não constitui aconselhamento jurídico. As leis e interpretações podem mudar, e cada situação é única. Recomenda-se buscar orientação de um advogado qualificado para discutir casos específicos.
Se curtiu este artigo faça uma contribuição, se tiver algum ponto relevante para o artigo deixe seu comentário.
-
@ e3ba5e1a:5e433365
2025-04-15 11:03:15Prelude
I wrote this post differently than any of my others. It started with a discussion with AI on an OPSec-inspired review of separation of powers, and evolved into quite an exciting debate! I asked Grok to write up a summary in my overall writing style, which it got pretty well. I've decided to post it exactly as-is. Ultimately, I think there are two solid ideas driving my stance here:
- Perfect is the enemy of the good
- Failure is the crucible of success
Beyond that, just some hard-core belief in freedom, separation of powers, and operating from self-interest.
Intro
Alright, buckle up. I’ve been chewing on this idea for a while, and it’s time to spit it out. Let’s look at the U.S. government like I’d look at a codebase under a cybersecurity audit—OPSEC style, no fluff. Forget the endless debates about what politicians should do. That’s noise. I want to talk about what they can do, the raw powers baked into the system, and why we should stop pretending those powers are sacred. If there’s a hole, either patch it or exploit it. No half-measures. And yeah, I’m okay if the whole thing crashes a bit—failure’s a feature, not a bug.
The Filibuster: A Security Rule with No Teeth
You ever see a firewall rule that’s more theater than protection? That’s the Senate filibuster. Everyone acts like it’s this untouchable guardian of democracy, but here’s the deal: a simple majority can torch it any day. It’s not a law; it’s a Senate preference, like choosing tabs over spaces. When people call killing it the “nuclear option,” I roll my eyes. Nuclear? It’s a button labeled “press me.” If a party wants it gone, they’ll do it. So why the dance?
I say stop playing games. Get rid of the filibuster. If you’re one of those folks who thinks it’s the only thing saving us from tyranny, fine—push for a constitutional amendment to lock it in. That’s a real patch, not a Post-it note. Until then, it’s just a vulnerability begging to be exploited. Every time a party threatens to nuke it, they’re admitting it’s not essential. So let’s stop pretending and move on.
Supreme Court Packing: Because Nine’s Just a Number
Here’s another fun one: the Supreme Court. Nine justices, right? Sounds official. Except it’s not. The Constitution doesn’t say nine—it’s silent on the number. Congress could pass a law tomorrow to make it 15, 20, or 42 (hitchhiker’s reference, anyone?). Packing the court is always on the table, and both sides know it. It’s like a root exploit just sitting there, waiting for someone to log in.
So why not call the bluff? If you’re in power—say, Trump’s back in the game—say, “I’m packing the court unless we amend the Constitution to fix it at nine.” Force the issue. No more shadowboxing. And honestly? The court’s got way too much power anyway. It’s not supposed to be a super-legislature, but here we are, with justices’ ideologies driving the bus. That’s a bug, not a feature. If the court weren’t such a kingmaker, packing it wouldn’t even matter. Maybe we should be talking about clipping its wings instead of just its size.
The Executive Should Go Full Klingon
Let’s talk presidents. I’m not saying they should wear Klingon armor and start shouting “Qapla’!”—though, let’s be real, that’d be awesome. I’m saying the executive should use every scrap of power the Constitution hands them. Enforce the laws you agree with, sideline the ones you don’t. If Congress doesn’t like it, they’ve got tools: pass new laws, override vetoes, or—here’s the big one—cut the budget. That’s not chaos; that’s the system working as designed.
Right now, the real problem isn’t the president overreaching; it’s the bureaucracy. It’s like a daemon running in the background, eating CPU and ignoring the user. The president’s supposed to be the one steering, but the administrative state’s got its own agenda. Let the executive flex, push the limits, and force Congress to check it. Norms? Pfft. The Constitution’s the spec sheet—stick to it.
Let the System Crash
Here’s where I get a little spicy: I’m totally fine if the government grinds to a halt. Deadlock isn’t a disaster; it’s a feature. If the branches can’t agree, let the president veto, let Congress starve the budget, let enforcement stall. Don’t tell me about “essential services.” Nothing’s so critical it can’t take a breather. Shutdowns force everyone to the table—debate, compromise, or expose who’s dropping the ball. If the public loses trust? Good. They’ll vote out the clowns or live with the circus they elected.
Think of it like a server crash. Sometimes you need a hard reboot to clear the cruft. If voters keep picking the same bad admins, well, the country gets what it deserves. Failure’s the best teacher—way better than limping along on autopilot.
States Are the Real MVPs
If the feds fumble, states step up. Right now, states act like junior devs waiting for the lead engineer to sign off. Why? Federal money. It’s a leash, and it’s tight. Cut that cash, and states will remember they’re autonomous. Some will shine, others will tank—looking at you, California. And I’m okay with that. Let people flee to better-run states. No bailouts, no excuses. States are like competing startups: the good ones thrive, the bad ones pivot or die.
Could it get uneven? Sure. Some states might turn into sci-fi utopias while others look like a post-apocalyptic vidya game. That’s the point—competition sorts it out. Citizens can move, markets adjust, and failure’s a signal to fix your act.
Chaos Isn’t the Enemy
Yeah, this sounds messy. States ignoring federal law, external threats poking at our seams, maybe even a constitutional crisis. I’m not scared. The Supreme Court’s there to referee interstate fights, and Congress sets the rules for state-to-state play. But if it all falls apart? Still cool. States can sort it without a babysitter—it’ll be ugly, but freedom’s worth it. External enemies? They’ll either unify us or break us. If we can’t rally, we don’t deserve the win.
Centralizing power to avoid this is like rewriting your app in a single thread to prevent race conditions—sure, it’s simpler, but you’re begging for a deadlock. Decentralized chaos lets states experiment, lets people escape, lets markets breathe. States competing to cut regulations to attract businesses? That’s a race to the bottom for red tape, but a race to the top for innovation—workers might gripe, but they’ll push back, and the tension’s healthy. Bring it—let the cage match play out. The Constitution’s checks are enough if we stop coddling the system.
Why This Matters
I’m not pitching a utopia. I’m pitching a stress test. The U.S. isn’t a fragile porcelain doll; it’s a rugged piece of hardware built to take some hits. Let it fail a little—filibuster, court, feds, whatever. Patch the holes with amendments if you want, or lean into the grind. Either way, stop fearing the crash. It’s how we debug the republic.
So, what’s your take? Ready to let the system rumble, or got a better way to secure the code? Hit me up—I’m all ears.
-
@ 81022b27:2b8d0644
2025-06-08 04:19:30D.D. Palmer was a magnetic healer, a visionary who tapped into the unseen forces of life. He founded chiropractic on the premise that the body’s innate intelligence governs health, and that misalignments—whether called subluxations, blockages, or interferences—disrupt this flow.
This is not a medical concept; it’s a metaphysical one, rooted in the belief that life transcends mere mechanics.
As a profession, we’ve been too concerned with what others think of us, particularly the medical community. In our desperation for acceptance, we’ve diluted our essence.
Some chiropractors advocate abandoning the term “subluxation” because it sounds archaic or unscientific. Personally, I don’t care for the word either—it often leaves my clients’ eyes glazed over. I prefer “blockages” or “interference” to convey the concept in a way that resonates.
But replacing these with medical jargon? That’s a betrayal of our roots.
What we cannot do is conform to a biomedical model that reduces the body to a machine. Chiropractic is not about treating symptoms or mimicking physical therapy. It’s about restoring the body’s connection to its innate wisdom, allowing healing to unfold naturally.
This is our strength, our uniqueness. To abandon it is to board the Titanic just before it sails—a sinking ship of soulless reductionism.
I believe chiropractic needs to embrace its metaphysical heritage boldly. We must stop apologizing for being different and instead educate the public on what we truly offer: a holistic approach that honors the body’s intelligence.
This means refining our language to be clear and relatable without sacrificing our principles. It means training chiropractors to communicate with confidence, not defensiveness. It means building a community that celebrates our philosophy rather than chasing validation from skeptics.
The future of chiropractic lies in authenticity. Let’s stop trying to fit into someone else’s paradigm. We are not medicine’s younger sibling; we are a distinct voice in healthcare. By standing firm in our metaphysical roots, we can inspire a world desperate for holistic solutions. The choice is ours: evolve as a vibrant, principled profession or sink under the weight of conformity. I choose evolution.
-
@ 91bea5cd:1df4451c
2025-04-15 06:27:28Básico
bash lsblk # Lista todos os diretorios montados.
Para criar o sistema de arquivos:
bash mkfs.btrfs -L "ThePool" -f /dev/sdx
Criando um subvolume:
bash btrfs subvolume create SubVol
Montando Sistema de Arquivos:
bash mount -o compress=zlib,subvol=SubVol,autodefrag /dev/sdx /mnt
Lista os discos formatados no diretório:
bash btrfs filesystem show /mnt
Adiciona novo disco ao subvolume:
bash btrfs device add -f /dev/sdy /mnt
Lista novamente os discos do subvolume:
bash btrfs filesystem show /mnt
Exibe uso dos discos do subvolume:
bash btrfs filesystem df /mnt
Balancea os dados entre os discos sobre raid1:
bash btrfs filesystem balance start -dconvert=raid1 -mconvert=raid1 /mnt
Scrub é uma passagem por todos os dados e metadados do sistema de arquivos e verifica as somas de verificação. Se uma cópia válida estiver disponível (perfis de grupo de blocos replicados), a danificada será reparada. Todas as cópias dos perfis replicados são validadas.
iniciar o processo de depuração :
bash btrfs scrub start /mnt
ver o status do processo de depuração Btrfs em execução:
bash btrfs scrub status /mnt
ver o status do scrub Btrfs para cada um dos dispositivos
bash btrfs scrub status -d / data btrfs scrub cancel / data
Para retomar o processo de depuração do Btrfs que você cancelou ou pausou:
btrfs scrub resume / data
Listando os subvolumes:
bash btrfs subvolume list /Reports
Criando um instantâneo dos subvolumes:
Aqui, estamos criando um instantâneo de leitura e gravação chamado snap de marketing do subvolume de marketing.
bash btrfs subvolume snapshot /Reports/marketing /Reports/marketing-snap
Além disso, você pode criar um instantâneo somente leitura usando o sinalizador -r conforme mostrado. O marketing-rosnap é um instantâneo somente leitura do subvolume de marketing
bash btrfs subvolume snapshot -r /Reports/marketing /Reports/marketing-rosnap
Forçar a sincronização do sistema de arquivos usando o utilitário 'sync'
Para forçar a sincronização do sistema de arquivos, invoque a opção de sincronização conforme mostrado. Observe que o sistema de arquivos já deve estar montado para que o processo de sincronização continue com sucesso.
bash btrfs filsystem sync /Reports
Para excluir o dispositivo do sistema de arquivos, use o comando device delete conforme mostrado.
bash btrfs device delete /dev/sdc /Reports
Para sondar o status de um scrub, use o comando scrub status com a opção -dR .
bash btrfs scrub status -dR / Relatórios
Para cancelar a execução do scrub, use o comando scrub cancel .
bash $ sudo btrfs scrub cancel / Reports
Para retomar ou continuar com uma depuração interrompida anteriormente, execute o comando de cancelamento de depuração
bash sudo btrfs scrub resume /Reports
mostra o uso do dispositivo de armazenamento:
btrfs filesystem usage /data
Para distribuir os dados, metadados e dados do sistema em todos os dispositivos de armazenamento do RAID (incluindo o dispositivo de armazenamento recém-adicionado) montados no diretório /data , execute o seguinte comando:
sudo btrfs balance start --full-balance /data
Pode demorar um pouco para espalhar os dados, metadados e dados do sistema em todos os dispositivos de armazenamento do RAID se ele contiver muitos dados.
Opções importantes de montagem Btrfs
Nesta seção, vou explicar algumas das importantes opções de montagem do Btrfs. Então vamos começar.
As opções de montagem Btrfs mais importantes são:
**1. acl e noacl
**ACL gerencia permissões de usuários e grupos para os arquivos/diretórios do sistema de arquivos Btrfs.
A opção de montagem acl Btrfs habilita ACL. Para desabilitar a ACL, você pode usar a opção de montagem noacl .
Por padrão, a ACL está habilitada. Portanto, o sistema de arquivos Btrfs usa a opção de montagem acl por padrão.
**2. autodefrag e noautodefrag
**Desfragmentar um sistema de arquivos Btrfs melhorará o desempenho do sistema de arquivos reduzindo a fragmentação de dados.
A opção de montagem autodefrag permite a desfragmentação automática do sistema de arquivos Btrfs.
A opção de montagem noautodefrag desativa a desfragmentação automática do sistema de arquivos Btrfs.
Por padrão, a desfragmentação automática está desabilitada. Portanto, o sistema de arquivos Btrfs usa a opção de montagem noautodefrag por padrão.
**3. compactar e compactar-forçar
**Controla a compactação de dados no nível do sistema de arquivos do sistema de arquivos Btrfs.
A opção compactar compacta apenas os arquivos que valem a pena compactar (se compactar o arquivo economizar espaço em disco).
A opção compress-force compacta todos os arquivos do sistema de arquivos Btrfs, mesmo que a compactação do arquivo aumente seu tamanho.
O sistema de arquivos Btrfs suporta muitos algoritmos de compactação e cada um dos algoritmos de compactação possui diferentes níveis de compactação.
Os algoritmos de compactação suportados pelo Btrfs são: lzo , zlib (nível 1 a 9) e zstd (nível 1 a 15).
Você pode especificar qual algoritmo de compactação usar para o sistema de arquivos Btrfs com uma das seguintes opções de montagem:
- compress=algoritmo:nível
- compress-force=algoritmo:nível
Para obter mais informações, consulte meu artigo Como habilitar a compactação do sistema de arquivos Btrfs .
**4. subvol e subvolid
**Estas opções de montagem são usadas para montar separadamente um subvolume específico de um sistema de arquivos Btrfs.
A opção de montagem subvol é usada para montar o subvolume de um sistema de arquivos Btrfs usando seu caminho relativo.
A opção de montagem subvolid é usada para montar o subvolume de um sistema de arquivos Btrfs usando o ID do subvolume.
Para obter mais informações, consulte meu artigo Como criar e montar subvolumes Btrfs .
**5. dispositivo
A opção de montagem de dispositivo** é usada no sistema de arquivos Btrfs de vários dispositivos ou RAID Btrfs.
Em alguns casos, o sistema operacional pode falhar ao detectar os dispositivos de armazenamento usados em um sistema de arquivos Btrfs de vários dispositivos ou RAID Btrfs. Nesses casos, você pode usar a opção de montagem do dispositivo para especificar os dispositivos que deseja usar para o sistema de arquivos de vários dispositivos Btrfs ou RAID.
Você pode usar a opção de montagem de dispositivo várias vezes para carregar diferentes dispositivos de armazenamento para o sistema de arquivos de vários dispositivos Btrfs ou RAID.
Você pode usar o nome do dispositivo (ou seja, sdb , sdc ) ou UUID , UUID_SUB ou PARTUUID do dispositivo de armazenamento com a opção de montagem do dispositivo para identificar o dispositivo de armazenamento.
Por exemplo,
- dispositivo=/dev/sdb
- dispositivo=/dev/sdb,dispositivo=/dev/sdc
- dispositivo=UUID_SUB=490a263d-eb9a-4558-931e-998d4d080c5d
- device=UUID_SUB=490a263d-eb9a-4558-931e-998d4d080c5d,device=UUID_SUB=f7ce4875-0874-436a-b47d-3edef66d3424
**6. degraded
A opção de montagem degradada** permite que um RAID Btrfs seja montado com menos dispositivos de armazenamento do que o perfil RAID requer.
Por exemplo, o perfil raid1 requer a presença de 2 dispositivos de armazenamento. Se um dos dispositivos de armazenamento não estiver disponível em qualquer caso, você usa a opção de montagem degradada para montar o RAID mesmo que 1 de 2 dispositivos de armazenamento esteja disponível.
**7. commit
A opção commit** mount é usada para definir o intervalo (em segundos) dentro do qual os dados serão gravados no dispositivo de armazenamento.
O padrão é definido como 30 segundos.
Para definir o intervalo de confirmação para 15 segundos, você pode usar a opção de montagem commit=15 (digamos).
**8. ssd e nossd
A opção de montagem ssd** informa ao sistema de arquivos Btrfs que o sistema de arquivos está usando um dispositivo de armazenamento SSD, e o sistema de arquivos Btrfs faz a otimização SSD necessária.
A opção de montagem nossd desativa a otimização do SSD.
O sistema de arquivos Btrfs detecta automaticamente se um SSD é usado para o sistema de arquivos Btrfs. Se um SSD for usado, a opção de montagem de SSD será habilitada. Caso contrário, a opção de montagem nossd é habilitada.
**9. ssd_spread e nossd_spread
A opção de montagem ssd_spread** tenta alocar grandes blocos contínuos de espaço não utilizado do SSD. Esse recurso melhora o desempenho de SSDs de baixo custo (baratos).
A opção de montagem nossd_spread desativa o recurso ssd_spread .
O sistema de arquivos Btrfs detecta automaticamente se um SSD é usado para o sistema de arquivos Btrfs. Se um SSD for usado, a opção de montagem ssd_spread será habilitada. Caso contrário, a opção de montagem nossd_spread é habilitada.
**10. descarte e nodiscard
Se você estiver usando um SSD que suporte TRIM enfileirado assíncrono (SATA rev3.1), a opção de montagem de descarte** permitirá o descarte de blocos de arquivos liberados. Isso melhorará o desempenho do SSD.
Se o SSD não suportar TRIM enfileirado assíncrono, a opção de montagem de descarte prejudicará o desempenho do SSD. Nesse caso, a opção de montagem nodiscard deve ser usada.
Por padrão, a opção de montagem nodiscard é usada.
**11. norecovery
Se a opção de montagem norecovery** for usada, o sistema de arquivos Btrfs não tentará executar a operação de recuperação de dados no momento da montagem.
**12. usebackuproot e nousebackuproot
Se a opção de montagem usebackuproot for usada, o sistema de arquivos Btrfs tentará recuperar qualquer raiz de árvore ruim/corrompida no momento da montagem. O sistema de arquivos Btrfs pode armazenar várias raízes de árvore no sistema de arquivos. A opção de montagem usebackuproot** procurará uma boa raiz de árvore e usará a primeira boa que encontrar.
A opção de montagem nousebackuproot não verificará ou recuperará raízes de árvore inválidas/corrompidas no momento da montagem. Este é o comportamento padrão do sistema de arquivos Btrfs.
**13. space_cache, space_cache=version, nospace_cache e clear_cache
A opção de montagem space_cache** é usada para controlar o cache de espaço livre. O cache de espaço livre é usado para melhorar o desempenho da leitura do espaço livre do grupo de blocos do sistema de arquivos Btrfs na memória (RAM).
O sistema de arquivos Btrfs suporta 2 versões do cache de espaço livre: v1 (padrão) e v2
O mecanismo de cache de espaço livre v2 melhora o desempenho de sistemas de arquivos grandes (tamanho de vários terabytes).
Você pode usar a opção de montagem space_cache=v1 para definir a v1 do cache de espaço livre e a opção de montagem space_cache=v2 para definir a v2 do cache de espaço livre.
A opção de montagem clear_cache é usada para limpar o cache de espaço livre.
Quando o cache de espaço livre v2 é criado, o cache deve ser limpo para criar um cache de espaço livre v1 .
Portanto, para usar o cache de espaço livre v1 após a criação do cache de espaço livre v2 , as opções de montagem clear_cache e space_cache=v1 devem ser combinadas: clear_cache,space_cache=v1
A opção de montagem nospace_cache é usada para desabilitar o cache de espaço livre.
Para desabilitar o cache de espaço livre após a criação do cache v1 ou v2 , as opções de montagem nospace_cache e clear_cache devem ser combinadas: clear_cache,nosapce_cache
**14. skip_balance
Por padrão, a operação de balanceamento interrompida/pausada de um sistema de arquivos Btrfs de vários dispositivos ou RAID Btrfs será retomada automaticamente assim que o sistema de arquivos Btrfs for montado. Para desabilitar a retomada automática da operação de equilíbrio interrompido/pausado em um sistema de arquivos Btrfs de vários dispositivos ou RAID Btrfs, você pode usar a opção de montagem skip_balance .**
**15. datacow e nodatacow
A opção datacow** mount habilita o recurso Copy-on-Write (CoW) do sistema de arquivos Btrfs. É o comportamento padrão.
Se você deseja desabilitar o recurso Copy-on-Write (CoW) do sistema de arquivos Btrfs para os arquivos recém-criados, monte o sistema de arquivos Btrfs com a opção de montagem nodatacow .
**16. datasum e nodatasum
A opção datasum** mount habilita a soma de verificação de dados para arquivos recém-criados do sistema de arquivos Btrfs. Este é o comportamento padrão.
Se você não quiser que o sistema de arquivos Btrfs faça a soma de verificação dos dados dos arquivos recém-criados, monte o sistema de arquivos Btrfs com a opção de montagem nodatasum .
Perfis Btrfs
Um perfil Btrfs é usado para informar ao sistema de arquivos Btrfs quantas cópias dos dados/metadados devem ser mantidas e quais níveis de RAID devem ser usados para os dados/metadados. O sistema de arquivos Btrfs contém muitos perfis. Entendê-los o ajudará a configurar um RAID Btrfs da maneira que você deseja.
Os perfis Btrfs disponíveis são os seguintes:
single : Se o perfil único for usado para os dados/metadados, apenas uma cópia dos dados/metadados será armazenada no sistema de arquivos, mesmo se você adicionar vários dispositivos de armazenamento ao sistema de arquivos. Assim, 100% do espaço em disco de cada um dos dispositivos de armazenamento adicionados ao sistema de arquivos pode ser utilizado.
dup : Se o perfil dup for usado para os dados/metadados, cada um dos dispositivos de armazenamento adicionados ao sistema de arquivos manterá duas cópias dos dados/metadados. Assim, 50% do espaço em disco de cada um dos dispositivos de armazenamento adicionados ao sistema de arquivos pode ser utilizado.
raid0 : No perfil raid0 , os dados/metadados serão divididos igualmente em todos os dispositivos de armazenamento adicionados ao sistema de arquivos. Nesta configuração, não haverá dados/metadados redundantes (duplicados). Assim, 100% do espaço em disco de cada um dos dispositivos de armazenamento adicionados ao sistema de arquivos pode ser usado. Se, em qualquer caso, um dos dispositivos de armazenamento falhar, todo o sistema de arquivos será corrompido. Você precisará de pelo menos dois dispositivos de armazenamento para configurar o sistema de arquivos Btrfs no perfil raid0 .
raid1 : No perfil raid1 , duas cópias dos dados/metadados serão armazenadas nos dispositivos de armazenamento adicionados ao sistema de arquivos. Nesta configuração, a matriz RAID pode sobreviver a uma falha de unidade. Mas você pode usar apenas 50% do espaço total em disco. Você precisará de pelo menos dois dispositivos de armazenamento para configurar o sistema de arquivos Btrfs no perfil raid1 .
raid1c3 : No perfil raid1c3 , três cópias dos dados/metadados serão armazenadas nos dispositivos de armazenamento adicionados ao sistema de arquivos. Nesta configuração, a matriz RAID pode sobreviver a duas falhas de unidade, mas você pode usar apenas 33% do espaço total em disco. Você precisará de pelo menos três dispositivos de armazenamento para configurar o sistema de arquivos Btrfs no perfil raid1c3 .
raid1c4 : No perfil raid1c4 , quatro cópias dos dados/metadados serão armazenadas nos dispositivos de armazenamento adicionados ao sistema de arquivos. Nesta configuração, a matriz RAID pode sobreviver a três falhas de unidade, mas você pode usar apenas 25% do espaço total em disco. Você precisará de pelo menos quatro dispositivos de armazenamento para configurar o sistema de arquivos Btrfs no perfil raid1c4 .
raid10 : No perfil raid10 , duas cópias dos dados/metadados serão armazenadas nos dispositivos de armazenamento adicionados ao sistema de arquivos, como no perfil raid1 . Além disso, os dados/metadados serão divididos entre os dispositivos de armazenamento, como no perfil raid0 .
O perfil raid10 é um híbrido dos perfis raid1 e raid0 . Alguns dos dispositivos de armazenamento formam arrays raid1 e alguns desses arrays raid1 são usados para formar um array raid0 . Em uma configuração raid10 , o sistema de arquivos pode sobreviver a uma única falha de unidade em cada uma das matrizes raid1 .
Você pode usar 50% do espaço total em disco na configuração raid10 . Você precisará de pelo menos quatro dispositivos de armazenamento para configurar o sistema de arquivos Btrfs no perfil raid10 .
raid5 : No perfil raid5 , uma cópia dos dados/metadados será dividida entre os dispositivos de armazenamento. Uma única paridade será calculada e distribuída entre os dispositivos de armazenamento do array RAID.
Em uma configuração raid5 , o sistema de arquivos pode sobreviver a uma única falha de unidade. Se uma unidade falhar, você pode adicionar uma nova unidade ao sistema de arquivos e os dados perdidos serão calculados a partir da paridade distribuída das unidades em execução.
Você pode usar 1 00x(N-1)/N % do total de espaços em disco na configuração raid5 . Aqui, N é o número de dispositivos de armazenamento adicionados ao sistema de arquivos. Você precisará de pelo menos três dispositivos de armazenamento para configurar o sistema de arquivos Btrfs no perfil raid5 .
raid6 : No perfil raid6 , uma cópia dos dados/metadados será dividida entre os dispositivos de armazenamento. Duas paridades serão calculadas e distribuídas entre os dispositivos de armazenamento do array RAID.
Em uma configuração raid6 , o sistema de arquivos pode sobreviver a duas falhas de unidade ao mesmo tempo. Se uma unidade falhar, você poderá adicionar uma nova unidade ao sistema de arquivos e os dados perdidos serão calculados a partir das duas paridades distribuídas das unidades em execução.
Você pode usar 100x(N-2)/N % do espaço total em disco na configuração raid6 . Aqui, N é o número de dispositivos de armazenamento adicionados ao sistema de arquivos. Você precisará de pelo menos quatro dispositivos de armazenamento para configurar o sistema de arquivos Btrfs no perfil raid6 .
-
@ fd06f542:8d6d54cd
2025-04-15 02:38:14排名随机, 列表正在增加中。
Cody Tseng
jumble.social 的作者
https://jumble.social/users/npub1syjmjy0dp62dhccq3g97fr87tngvpvzey08llyt6ul58m2zqpzps9wf6wl
- Running [ wss://nostr-relay.app ] (free & WoT) 💜⚡️
- Building 👨💻:
- https://github.com/CodyTseng/jumble
- https://github.com/CodyTseng/nostr-relay-tray
- https://github.com/CodyTseng/danmakustr
- https://github.com/CodyTseng/nostr-relay-nestjs
- https://github.com/CodyTseng/nostr-relay
- https://github.com/CodyTseng
阿甘
- @agan0
- 0xchat.com
- canidae40@coinos.io
- https://jumble.social/users/npub13zyg3zysfylqc6nwfgj2uvce5rtlck2u50vwtjhpn92wzyusprfsdl2rce
joomaen
- Follows you
- joomaen.com
-
95aebd@wallet.yakihonne.com
-
nobot
- https://joomaen.filegear-sg.me/
- https://jumble.social/users/npub1wlpfd84ymdx2rpvnqht7h2lkq5lazvkaejywrvtchlvn3geulfgqp74qq0
颜值精选官
- wasp@ok0.org
- 专注分享 各类 图片与视频,每日为你带来颜值盛宴,心动不止一点点。欢迎关注,一起发现更多美好!
- https://jumble.social/users/npub1d5ygkef6r0l7w29ek9l9c7hulsvdshms2qh74jp5qpfyad4g6h5s4ap6lz
6svjszwk
- 6svjszwk@ok0.org
- 83vEfErLivtS9to39i73ETeaPkCF5ejQFbExoM5Vc2FDLqSE5Ah6NbqN6JaWPQbMeJh2muDiHPEDjboCVFYkHk4dHitivVi
-
low-time-preference
-
anarcho-capitalism
-
libertarianism
-
bitcoin #monero
- https://jumble.social/users/npub1sxgnpqfyd5vjexj4j5tsgfc826ezyz2ywze3w8jchd0rcshw3k6svjszwk
𝘌𝘷𝘦𝘳𝘺𝘥𝘢𝘺 𝘔𝘰𝘳𝘯𝘪𝘯𝘨 𝘚𝘵𝘢𝘳
- everyday@iris.to
- 虽然现在对某些事情下结论还为时尚早,但是从趋势来看,邪恶抬头已经不可避免。
- 我们要做的就是坚持内心的那一份良知,与邪恶战斗到底。
- 黑暗森林时代,当好小透明。
- bc1q7tuckqhkwf4vgc64rsy3rxy5qy6pmdrgxewcww
- https://jumble.social/users/npub1j2pha2chpr0qsmj2f6w783200upa7dvqnnard7vn9l8tv86m7twqszmnke
nostr_cn_dev
npub1l5r02s4udsr28xypsyx7j9lxchf80ha4z6y6269d0da9frtd2nxsvum9jm@npub.cash
Developed the following products: - NostrBridge, 网桥转发 - TaskQ5, 分布式多任务 - NostrHTTP, nostr to http - Postr, 匿名交友,匿名邮局 - nostrclient (Python client) . -nostrbook, (nostrbook.com) 用nostr在线写书 * https://www.duozhutuan.com nostrhttp demo * https://github.com/duozhutuan/NostrBridge * * https://jumble.social/users/npub1l5r02s4udsr28xypsyx7j9lxchf80ha4z6y6269d0da9frtd2nxsvum9jm *
CXPLAY
- lightning@cxplay.org
- 😉很高兴遇到你, 你可以叫我 CX 或 CXPLAY, 这个名字没有特殊含义, 无需在意.
- ©本账号下所有内容如未经特殊声明均使用 CC BY-NC-SA 4.0 许可协议授权.
- 🌐如果您在 Fediverse 收到本账号的内容则说明您的实例已与 Mostr.pub 或 Momostr.pink Bridge 互联, 您所看到的账号为镜像, 所有账号内容正在跨网传递. 如有必要请检查原始页面.
- 🧑💻正在提供中文本地化(i10n): #Amethyst #Amber #Citrine #Soapbox #Ditto #Alby
- https://cx.ms/
https://jumble.social/users/npub1gd8e0xfkylc7v8c5a6hkpj4gelwwcy99jt90lqjseqjj2t253s2s6ch58h
w
- 0xchat的作者
- 0xchat@getalby.com
- Building for 0xchat
- https://www.0xchat.com/
- https://jumble.social/users/npub10td4yrp6cl9kmjp9x5yd7r8pm96a5j07lk5mtj2kw39qf8frpt8qm9x2wl
Michael
- highman@blink.sv
- Composer Artist | Musician
- 🎹🎼🎤🏸🏝️🐕❤️
- 在這裡可以看到「我看世界」的樣子
- 他是光良
- https://jumble.social/users/npub1kr5vqlelt8l47s2z0l47z4myqg897m04vrnaqks3emwryca3al7sv83ry3
-
@ 81022b27:2b8d0644
2025-06-08 04:13:43Have you seen the show Poker Face on Peacock streaming? Natasha Lyonne plays a casino worker character who has the ability to tell if someone is telling the truth. If she hears a lie, she automatically says, “Bullshit!”
Her ability gets her in trouble with her boss, who is involved in organized crime, and now she is on the run and solving crimes until they find her again (usually at the end of an episode).
It’s like a rock-and-roll Quantum Leap. Anyway, Christi likes the show because there are crimes and clues, and you have to figure it out. I watch it because I can get into it while I’m messing with my phone or doing a little writing.
Well, I have that same ability to detect BS.
When I work on clients, I connect with their energy. I didn’t start out doing it on purpose; I would start working on a client and pick up whatever they were sick with, and then they would feel great, and I would be left struggling.
Some friends taught me how to protect myself, and it helped, but “my shield” prevented me from connecting with my clients like I used to.
Now I connect with the source of all power in the universe: God. (You can call it whatever you want: Source, Universal Intelligence, Prana, etc.)
I send up a little antenna, and I’m protected AND connected.
When I’m in this state and talking to a client, I can clearly tell when someone is not telling the truth because THE BODY DOES NOT LIE!
Sometimes the cause of a physical issue is an emotional issue. If you can connect to someone’s energy like this, you can find and help clear out whatever is the root cause.
I’ve been telling people this quote for as long as I’ve been practicing:
You can lie to your mom, to your friends, and even to yourself, but you can’t lie to your chiropractor!
A polygraph lie detector only measures four things: heart rate and blood pressure, respiration rate, skin conductivity, and movement.
There are now better lie detectors that use EEGs (brain wave measurements). AI finds that voice analysis is a great way to detect honesty.
What’s better than all of that combined?
You.
Your nervous system can detect much more than all these other methods combined. I will try to teach what I know so far if you’d like.
And don’t forget to watch that show! I recommend it.
live long and prosper 🖖🏼
-Dan
-
@ 57c631a3:07529a8e
2025-04-07 13:17:50What is Growth Engineering? Before we start: if you’ve already filled out the What is your tech stack? survey: thank you! If you’ve not done so, your help will be greatly appreciated. It takes 5-15 minutes to complete. Those filling out will receive results before anyone else, and additional analysis from myself and Elin. Fill out this survey here.**
npub1sg6plzptd64u62a878hep2kev88swjh3tw00gjsfl8f237lmu63q0uf63m
Growth engineering was barely known a decade ago, but today, most scaleups and many publicly traded tech companies have dedicated growth teams staffed by growth engineers. However, some software engineers are still suspicious of this new area because of its reputation for hacky code with little to no code coverage.
For this reason and others, I thought it would be interesting to learn more from an expert who can tell us all about the practicalities of this controversial domain. So I turned to Alexey Komissarouk, who’s been in growth engineering since 2016, and was in charge of it at online education platform, MasterClass. These days, Alexey lives in Tokyo, Japan, where he advises on growth engineering and teaches the Growth Engineering course at Reforge.
In today’s deep dive, Alexey covers:
- What is Growth Engineering? In the simplest terms: writing code to help a company make more money. But there are details to consider: like the company size where it makes sense to have a dedicated team do this.
- What do Growth Engineers work on? Business-facing work, empowerment and platform work are the main areas.
- Why Growth Engineers move faster than Product Engineers. Product Engineers ship to build: Growth Engineers ship to learn. Growth Engineers do take shortcuts that would make no sense when building for longevity – doing this on purpose.
- Tech stack. Common programming languages, monitoring and oncall, feature flags and experimentation, product analytics, review apps, and more.
- What makes a good Growth Engineer? Curiosity, “build to learn” mindset and a “Jack of all trades” approach.
- Where do Growth Engineers fit in? Usually part of the engineering department, either operating as with an “owner” or a “hitchiker” model.
- Becoming a Growth Engineer. A great area if you want to eventually become a founder or product manager – but even if not, it can accelerate your career growth. Working in Growth forces you to learn more about the business.
With that, it’s over to Alexey:
I’ll never forget the first time I made my employer a million dollars.
I was running a push notification A/B test for meal delivery startup Sprig, trying to boost repeat orders.
A push notification similar to what we tested to boost repeat orders
Initial results were unpromising; the push notification was not receiving many opens. Still, I wanted to be thorough: before concluding the idea was a failure, I wrote a SQL query to compare order volume for subsequent weeks between customers in test vs control.
The SQL used to figure out the push notification’s efficiency
As it turned out, our test group “beat” the control group by around 10%:
‘review_5_push’ was the new type of push notification. Roughly the same amount of users clicked it, but they placed 10% more in orders
I plugged the numbers into a significance calculator, which showed it was statistically significant – or “stat-sig” – and therefore highly unlikely to be a coincidence. This meant we had a winner on our hands! But how meaningful was it, really, and what would adding the push notification mean for revenue, if rolled out to 100% of users?
It turned out this experiment created an additional $1.5 million dollars, annually, with just one push notification. Wow!
I was hooked. Since that day, I've shipped hundreds of experimental “winners” which generated hundreds of millions of incremental revenue for my employers. But you never forget the first one. Moments like this is what growth engineering is all about.
1. What is Growth Engineering?
Essentially, growth engineering is the writing of code to make a company money. Of course, all code produced by a business on some level serves this purpose, but while Product Engineers focus on creating a Product worth paying for, Growth Engineers instead focus on making that good product have a good business. To this end, they focus on optimizing and refining key parts of the customer journey, such as:
- Getting more people to consider the product
- Converting them into paying customers
- Keeping them as customers for longer, and spending more
What kinds of companies employ Growth Engineers? Places you’ve heard of, like Meta, LinkedIn, DoorDash, Coinbase, and Dropbox, are some of the ones I’ve had students from. There’s also OpenAI, Uber, Tiktok, Tinder, Airbnb, Pinterest… the list of high-profile companies goes on. Most newer public consumer companies you’ve heard have a growth engineering org, too.
Typically, growth engineering orgs are started by companies at Series B stage and beyond, so long as they are selling to either consumers or businesses via SaaS. These are often places trying to grow extremely fast, and have enough software engineers that some can focus purely on growth. Before the Series B stage, a team is unlikely to be ready for growth for various reasons; likely that it hasn’t found product-market fit, or has no available headcount, or lacks the visitor traffic required to run A/B tests.
Cost is a consideration. A fully-loaded growth team consisting of a handful of engineers, a PM, and a designer costs approximately 1 million dollars annually. To justify this, a rule of thumb is to have at least $5 million dollars in recurring revenue – a milestone often achieved at around the Series B stage.
Despite the presence of growth engineering at many public consumer tech companies, the field itself is still quite new, as a discipline and as a proper title.
Brief history of growth engineering
When I joined Opendoor in 2016, there was a head of growth but no dedicated growth engineers, but there were by the time I left in 2020. At MasterClass soon after, there was a growth org and a dozen dedicated growth engineers. So when did growth engineering originate?
The story is that its origins lie at Facebook in 2007. The team was created by then-VP of platform and monetization Chamath Palihapitiya. Reforce founder and CEO Brian Balfour shares:
“Growth (the kind found on an org chart) began at Facebook under the direction of Chamath Palihapitiya. In 2007, he joined the early team in a nebulous role that fell somewhere between Product, Marketing, and Operations. According to his retelling of the story on Recode Decode, after struggling to accomplish anything meaningful in his first year on the job, he was on the verge of being fired.Sheryl Sandberg joined soon after him, and in a hail mary move he pitched her the game-changing idea that led to the creation of the first-ever growth team. This idea not only saved his job, but earned him the lion’s share of the credit for Facebook’s unprecedented growth.At the time, Sheryl and Mark asked him, “What do you call this thing where you help change the product, do some SEO and SEM, and algorithmically do this or that?”His response: “I don’t know, I just call that, like, Growth, you know, we’re going to try to grow. I’ll be the head of growing stuff."And just like that, Growth became a thing.”
Rather than focus on a particular product or feature, the growth team at Facebook focused on moving the needle, and figuring out which features to work on. These days, Meta employs hundreds if not thousands of growth engineers.
2. What do Growth Engineers work on?
Before we jump into concrete examples, let’s identify three primary focus areas that a growth engineer’s work usually involves.
- Business-facing work – improving the business directly
- Empowerment work – enabling other teams to improve the business
- Platform work – improving the velocity of the above activities
Let’s go through all three:
Business-facing work
This is the bread and butter of growth engineering, and follows a common pattern:
- Implement an idea. Try something big or small to try and move a key business metric, which differs by team but is typically related to conversion rate or retention.
- Quantify impact. Usually via A/B testing.
- Analyze impact. Await results, analyze impact, ship or roll back – then go back to the first step.
Experiments can lead to sweeping or barely noticeable changes. A famous “I can’t believe they needed to test this” was when Google figured out which shade of blue generates the most clicks. At MasterClass, we tested things across the spectrum:
- Small: should we show the price right on the homepage, was that a winner? Yes, but we framed it in monthly terms of $15/month, not $180/year.
- Medium: when browsing a course page, should we include related courses, or more details about the course itself? Was it a winner? After lengthy experimentation, it was hard to tell: both are valuable and we needed to strike the right balance.
- Large: when a potential customer is interested, do we take them straight to checkout, or encourage them to learn more? Counterintuitively, adding steps boosted conversion!
Empowerment
One of the best ways an engineer can move a target metric is by removing themselves as a bottleneck, so colleagues from marketing can iterate and optimize freely. To this end, growth engineers can either build internal tools or integrate self-serve MarTech (Marketing Technology) vendors.
With the right tool, there’s a lot that marketers can do without engineering’s involvement:
- Build and iterate on landing pages (Unbounce, Instapage, etc)
- Draft and send email, SMS and Push Notifications (Iterable, Braze, Customer.io, etc)
- Connect new advertising partners (Google Tag Manager, Segment, etc)
We go more into detail about benefits and applications in the MarTech section of Tech Stack, below.
Platform work
As a business scales, dedicated platform teams help improve stability and velocity for the teams they support. Within growth, this often includes initiatives like:
- Experiment Platform. Many parts of running an experiment can be standardized, from filtering the audience, to bucketing users properly, to observing statistical methodology. Historically, companies built reusable Experiment Platforms in-house, but more recently, vendors such as Eppo and Statsig have grown in popularity with fancy statistical methodologies like “Controlled Using Pre-Experiment Data” (CUPED) that give more signal with less data.
- Reusable components. Companies with standard front-end components for things like headlines, buttons, and images, dramatically reduce the time required to spin up a new page. No more "did you want 5 or 6 pixels here" with a designer; instead growth engineers rely on tools like Storybook to standardize and share reusable React components.
- Monitoring. Growth engineering benefits greatly from leveraging monitoring to compensate for reduced code coverage. High-quality business metric monitoring tools can detect bugs before they cause damage.
When I worked at MasterClass, having monitoring at the ad layer prevented at least one six-figure incident. One Friday, a marketer accidentally broadened the audience for a particular ad from US-only, to worldwide. In response, the Facebook Ad algorithm went on a spending spree, bringing in plenty of visitors from places like Brazil and India, whom we knew from past experience were unlikely to purchase the product. Fortunately, our monitoring noticed the low-performing campaign within minutes, and an alert was sent to the growth engineer on-call, who immediately reached out to the marketer and confirmed the change was unintentional, and then shut down the campaign.
Without this monitoring, a subtle targeting error like this could have gone unnoticed all weekend and would have eaten up $100,000+ of marketing budget. This episode shows that platform investment can benefit everyone; and since growth needs them most, it’s often the growth platform engineering team which implements them.
As the day-to-day work of a Growth Engineer shows, A/B tests are a critical tool to both measure success and learn. It’s a numbers game: the more A/B tests a team can run in a given quarter, the more of them will end up winners, making the team successful. It’s no wonder, then, that Growth Engineering will pull out all the stops to improve velocity.
3. Why Growth Engineers move faster than Product Engineers
On the surface, growth engineering teams look like product engineering ones; writing code, shipping pull requests, monitoring on-call, etc. So how do they move so much faster? The big reason lies in philosophy and focus, not technology. To quote Elena Verna, head of growth at Dropbox:
“Product Engineering teams ship to build; Growth Engineering teams ship to learn.”
Real-world case: price changes at Masterclass
A few years ago at MasterClass, the growth team wanted to see if changing our pricing model to multiple tiers would improve revenue.
Inspired in part by multiple pricing tiers for competitors such as Netflix (above), Disney Plus, and Hulu.
The “multiple pricing tier” proposal for MasterClass.
From a software engineering perspective, this was a highly complex project because:
- Backend engineering work: the backend did not yet support multiple pricing options, requiring a decent amount of engineering, and rigorous testing to make sure existing customers weren’t affected.
- Client app changes: on the device side, multiple platforms (iOS, iPad, Android, Roku, Apple TV, etc) would each need to be updated, including each relevant app store.
The software engineering team estimated that becoming a “multi-pricing-tier” company would take months across numerous engineering teams, and engineering leadership was unwilling to greenlight that significant investment.
We in growth engineering took this as a challenge. As usual, our goal was not just to add the new pricing model, but to learn how much money it might bring in. The approach we ended up proposing was a Fake Door test, which involves offering a not-yet-available option to customers to gauge interest level. This was risky, as taking a customer who’s ready to pay and telling them to join some kind of waiting list is a colossal waste, and risks making them feel like the target of a “bait and switch” trick.
We found a way. The key insight was that people are only offended about a “bait and switch”, if the “switch” is worse than the “bait.” Telling customers they would pay $100 and then switching to $150 would cause a riot, but starting at $150 and then saying “just kidding, it’s only $100” is a pleasant surprise.
The good kind of surprise.
So long as every test “pricing tier” is less appealing – higher prices, fewer features – than the current offering, we could “upgrade” customers after their initial selection. A customer choosing the cheapest tier gets extra features at no extra cost, while a customer choosing a more expensive tier is offered a discount.
We created three new tiers, at different prices. The new “premium” tier would describe the existing, original offering. Regardless of what potential customers selected, they got this “original offering,” during the experiment.
The best thing about this was that no backend changes were required. There were no real, new, back-end pricing plans; everybody ended up purchasing the same version of MasterClass for the same price, with the same features. The entirety of the engineering work was on building a new pricing page, and the “congratulations, you’ve been upgraded” popup. This took just a few days.
Within a couple of weeks, we had enough data to be confident the financial upside of moving to a multi-pricing-tier model would be significant. With this, we’re able to convince the rest of engineering’s leadership to invest in building the feature properly. In the end, launching multiple pricing tiers turned out to be one of the biggest revenue wins of the year.
Building a skyscraper vs building a tent
The MasterClass example demonstrates the spirit of growth engineering; focusing on building to learn, instead of building to last. Consider building skyscrapers versus tents.
Building a tent optimizes for speed of set-up and tear-down over longevity. You don’t think of a tent as one that is shoddy or low-quality compared to skyscrapers: it’s not even the same category of buildings! Growth engineers maximize use of lightweight materials. To stick with the tents vs skyscraper metaphor: we prioritize lightweight fabric materials over steel and concrete whenever possible. We only resort to traditional building materials when there’s no other choice, or when a direction is confirmed as correct. Quality is important – after all, a tent must keep out rain and mosquitoes. However, the speed-vs-durability tradeoff decision results in very different approaches and outcomes.
4. Tech stack
At first glance, growth and product engineers use the same tooling, and contribute to the same codebases. But growth engineering tends to be high-velocity, experiment-heavy, and with limited test coverage. This means that certain “nice to have” tools for product engineering are mission-critical for growth engineers.
Read more https://connect-test.layer3.press/articles/ea02c1a1-7cfa-42b4-8722-0165abcae8bb
-
@ dfa02707:41ca50e3
2025-06-08 04:01:55Contribute to keep No Bullshit Bitcoin news going.
- "Today we're launching the beta version of our multiplatform Nostr browser! Think Google Chrome but for Nostr apps. The beta is our big first step toward this vision," announced Damus.
- This version comes with the Dave Nostr AI assistant, support for zaps and the Nostr Wallet Connect (NWC) wallet interface, full-text note search, GIFs and fullscreen images, multiple media uploads, user tagging, relay list and mute list support, along with a number of other improvements."
"Included in the beta is the Dave, the Nostr AI assistant (its Grok for Nostr). Dave is a new Notedeck browser app that can search and summarize notes from the network. For a full breakdown of everything new, check out our beta launch video."
What's new
- Dave Nostr AI assistant app.
- GIFs.
- Fulltext note search.
- Add full screen images, add zoom, and pan.
- Zaps! NWC/ Wallet UI.
- Introduce last note per pubkey feed (experimental).
- Allow multiple media uploads per selection.
- Major Android improvements (still WIP).
- Added notedeck app sidebar.
- User Tagging.
- Note truncation.
- Local network note broadcast, broadcast notes to other notedeck notes while you're offline.
- Mute list support (reading).
- Relay list support.
- Ctrl-enter to send notes.
- Added relay indexing (relay columns soon).
- Click hashtags to open hashtag timeline.
- Fixed timelines sometimes not updating (stale feeds).
- Fixed UI bounciness when loading profile pictures
- Fixed unselectable post replies.
-
@ f4a890ce:af88c4aa
2025-06-08 03:59:21執行摘要
比特幣自橫盤延續,總市值回落至3.24兆美元,成交量下降至591億美元,顯示短線資金趨於觀望。下週操作應聚焦三大關鍵數據:
衍生品市場槓桿與清算動態:觀察永續合約持倉與資金費率變化。若持倉再度攀升且費率轉為大幅正值,多頭風險將升高;同時留意爆倉價格與清算熱力圖,作為短線波動的前瞻指標。
ETF 資金流向:BTC/ETH ETF 流入與流出數據,是機構資金態度的風向標。若下週出現淨流出,將可能引發價格回調壓力;相反,流入維持則有助於支撐高位盤整。
鏈上資金結構與穩定幣規模:持續追蹤交易所餘額與鯨魚地址淨流出情況,評估大額資金動向;同時關注穩定幣總市值變化,若有減少,意味避險情緒抬頭,反之則暗示買盤動力仍持續。
總體而言,市場結構仍偏多,但需警惕「高槓桿+低流動」可能帶來的瞬間波動。建議保持倉位彈性,讓數據引導調整策略,避免在高位盲目追高。
加密市場
本週加密貨幣市場總市值維持在 3.26 兆美元 左右,顯示出市場基本面仍具穩定性。與此同時,當週總成交量下降至 546.84 億美元,反映出市場活躍度減弱,投資者交易意願相對謹慎。
https://coinmarketcap.com/charts/
市場情緒方面,恐懼與貪婪指數降至 52,處於中性範疇,表明投資者對市場前景的情緒有所保留。
https://www.coinglass.com/zh-TW/pro/i/FearGreedIndex
此外,相對強弱指標落在中性至超賣區間,暗示部分標地在短線上可能面臨獲利回吐或技術性修正的壓力,而市場尚未進入絕對弱勢狀態。
https://www.coinglass.com/zh-TW/pro/i/RsiHeatMap
山寨幣季節指數維持在 20,這說明市場資金依舊偏向配置於比特幣及其他主流加密貨幣,中小型代幣並未受到市場資金的大量青睞。
https://www.blockchaincenter.net/en/altcoin-season-index/
穩定幣市值上升至 249.938 億美元,反映出部分資金正積極尋求避險,或準備在市場調整後進行潛在的佈局操作。
https://defillama.com/stablecoins
小結
本週加密市場在總市值維持穩定的同時,成交量的下降顯示出交易熱情的不足,加上恐懼與貪婪指數和相對強弱指標均呈現中性偏弱態勢,整體市場情緒趨向保守。山寨幣季節指數的低迷也反映出資金仍偏向主流幣種,而穩定幣市值的提升則表明投資者正在為市場未來調整或出現更具吸引力的價格點做準備。未來,需持續關注資金流向與宏觀經濟動態,以判斷市場後續走勢。
衍生性商品
槓桿交易需求仍然強勁,本週永續合約持倉規模達 141.68B,雖然較前週有所下降,但仍顯示市場活躍度維持高水準。
https://www.coinglass.com/zh-TW/pro/futures/Cryptofutures
資金費率方面,目前市場呈現 負費率 (-0.0047%),顯示空方勢力增強,多數交易所的情緒偏向空頭。
https://www.coinglass.com/zh-TW/FundingRate
爆倉數據反映市場波動仍導致大量強制平倉,本週總計空單爆倉達 453.14M,而多單爆倉則達 1267.859M,多頭爆倉金額顯著高於空方,顯示市場對高槓桿多單的清算壓力較大。
其中 6月5日 空單爆倉 88.68M,多單爆倉 875.855M,這一天的市場劇烈波動導致大量強制清算。
https://www.coinglass.com/zh-TW/LiquidationData
清算熱力圖顯示,$106,000 附近 清算金額達 175.11M; $111,000 附近 也有 169.02M 的清算,這些區間可能成為近期市場波動的關鍵點。
https://www.coinglass.com/zh-TW/pro/futures/LiquidationHeatMap
期權市場活躍,投資者在不同價格區間進行對沖與佈局:
$100,000 行權價的看跌期權合約數量達 7.42K,總金額 $25.86M,市場對該區間的防禦仍然較強。
$110,000 行權價的看漲期權合約數量達 13.02K,總金額 $57.61M,顯示市場對上行的預期仍存在,但與上週相比略有下降。
https://www.coinglass.com/zh-TW/pro/options/OIStrike
最大痛點出現在 2025/06/27 的 $100,000,名義金額 12.86B,顯示市場對該區間的交易活動仍較為集中。
https://www.coinglass.com/zh-TW/pro/options/max-pain
小結
本週加密市場顯示槓桿交易活躍度仍然維持高水準,但市場情緒偏向保守,資金費率轉為負值反映空方情緒增強。爆倉數據顯示多頭遭遇較大壓力,投資者在槓桿操作時需謹慎風險管理。期權市場的交易策略仍然分歧,市場在不同行權價格的佈局顯示投資者對後市走勢保持不同預期。建議交易者持續關注市場數據,根據槓桿交易動向調整策略,以降低市場震盪帶來的風險並尋找最佳交易機會。
ETF
本週,加密貨幣衍生性商品市場出現顯著差異,資金流向呈現兩極化現象。比特幣(BTC)ETF方面,本週出現資金流出,金額達6.161億美元。這一變化顯示投資者對比特幣近期走勢產生疑慮,或在調整資金配置,以應對可能的市場風險和波動加劇。
以太坊(ETH)ETF則呈現資金流入趨勢,本週流入金額達 7,020 萬美元。較之於比特幣的趨勢,這一資金流入暗示出部分投資者對以太坊未來潛力充滿信心,特別是在其技術升級和生態系統發展背景下,認為相較於比特幣,ETH更具備吸引力。
https://coinmarketcap.com/zh-tw/etf/
小結
整體而言,本週加密貨幣衍生性商品市場呈現出明顯的資金流向差異。比特幣ETF大幅流出揭示了市場風險偏好的調整,而以太坊ETF的資金流入則表明投資者對其技術發展及生態系統持續看好。未來,投資人需持續關注宏觀經濟環境與技術創新如何影響各加密貨幣衍生性商品的動態,以便在不確定的市場中做出更合適的資金配置決策。
鏈上分析 | BTC
二級交易所的比特幣儲備量再次創下斷崖式新低,顯示出市場上的流動性仍在減少。
地址分布方面,10-100顆比特幣的地址數量持續下降,100-1k、1k-10k及10k以上顆數的地址數量則繼續上升,特別是10k以上地址的數量近期突然激增,顯示大戶的持幣情緒正在加強。
https://cryptoquant.com/community/dashboard/67e2481ba2a7203afd437b31
鯨魚活躍地址數量全數上升,可以得知近期鯨魚們進場的速度逐步加快。
https://cryptoquant.com/community/dashboard/67e2481ba2a7203afd437b31
Exchange Netflow 顯示出近期大額淨流出交易所的情況,這進一步證實了市場上多數投資者偏向長期持有。
Long Term Holder Supply 持續上升,說明持幣155天以上的長期投資者信心未減。
https://www.bitcoinmagazinepro.com/charts/long-term-holder-supply/
URPD 顯示,104,000 美元以上買入的投資人已有被套跡象,若價格再次回落,將觸及 99,000 美元以下的支撐密集區。
https://charts.bgeometrics.com/distribution_realized_price.html
Short-Term Holder Realized Price 為 97,000 美元,短線若修正,此區間可能提供技術性支撐。
https://www.bitcoinmagazinepro.com/charts/short-term-holder-realized-price/
溢價指數方面,Coinbase 溢價指數衝高至 0.105 以上,韓國溢價指數則維持在 2.52,顯示美韓兩地市場買盤情緒仍然正向,整體鏈上結構支撐比特幣中期續強的可能性。
Coinbase Premium Index
Korea Premium Index
小結
本週比特幣鏈上數據顯示多頭格局進一步鞏固,二級交易所儲備量斷崖式下滑至新低,資金持續撤離交易所。
地址分布方面,10–100 BTC 的中小戶數量持續降低,而100–1 k、1 k–10 k及10 k+地址全線上升,尤其10 k+地址近期突增,顯示超級大戶加速佈局;鯨魚活躍地址也全面走高,進場節奏愈發急促。 Exchange Netflow 持續呈現大額淨流出,佐證長線持有趨勢,且 Long‑Term Holder Supply 持續攀升,反映市場偏好長期持有。成本面上,URPD 指標顯示回調後買在104,000美元以上的籌碼深度被套,未來若價格下行將觸及99,000美元以下投資人的成本區。
Short‑Term Holder Realized Price(155天內持幣者平均成本)約97,000美元,此區或成短期支撐,這也恰好和 URPD 指標吻合。
同時,Coinbase 溢價指數維持在0.105以上,韓國溢價指數則穩定於2.52,顯示全球買盤需求穩健。
整體而言,鏈上結構健康,資金流向多為長線建倉,但高位被套壓力與短期成本點仍需密切關注。
總體經濟
本週加密貨幣市場持續受到宏觀經濟環境的顯著影響。聯邦基金有效利率穩定維持在 4.33%,顯示市場仍處於高利率壓制之下,資金流動性受到明顯限制,這一情勢對風險資產尤其是加密市場構成挑戰。
https://fred.stlouisfed.org/series/FEDFUNDS
隨著 6 月 18 日 FOMC 會議臨近,市場普遍預期當前利率大概率將維持在 4.25%-4.50% 區間。然而,投資者亦將目光轉向 9 月 17 日的下一次會議,該會議上 4.0%-4.25% 區間的降息預期不斷攀升,目前已高達 51.8%,顯示市場對中期內利率調整存在明顯的分歧與期待。這種預期上的轉變,既意味著部分市場參與者看好未來資金回流的可能性,也使投資者對當前高利率環境下資產價格波動更加謹慎。
https://www.cmegroup.com/cn-t/markets/interest-rates/cme-fedwatch-tool.html
消費者物價指數 (CPI) 持續維持在 2.33%,顯示通膨壓力穩定而可控;失業率則保持在 4.2%,反映出勞動市場的基本穩健。雖然這些基本面數據表現平穩,卻難以在高利率與流動性緊縮的背景下對加密貨幣價格形成強而有力的支撐,市場參與者更趨於採取保守的投資策略,尤其在高槓桿交易普遍存在的情況下,風險管理顯得尤為重要。
失業率:https://www.macromicro.me/series/37/unemployment-rate
消費者物價指數(CPI):https://www.macromicro.me/series/128/consumer-price-index-sa-yoy
小結
整體而言,加密市場依舊面臨高利率環境帶來的流動性限制與價格波動風險。雖然短期內市場情緒偏保守,但 9 月 17 日會議上降息預期的上升,或將為未來市場帶來積極轉機。投資者應持續關注 FOMC 會議及最新經濟數據變化,謹慎調整交易策略以應對可能出現的轉機與挑戰。
新聞
Ripple 的穩定幣 RLUSD 在杜拜獲得批准
https://www.coindesk.com/markets/2025/06/03/ripples-stablecoin-rlusd-gets-stamp-of-approval-in-dubai
MoonPay 在紐約獲得令人垂涎的 BitLicense
https://www.coindesk.com/policy/2025/06/04/moonpay-grabs-coveted-bitlicense-approval-in-new-york
穩定幣正悄悄增強美國國力
https://www.coindesk.com/opinion/2025/06/04/stablecoins-are-quietly-reinforcing-u-s-national-power
韓國選舉加密貨幣友善總統李在明為新總統
Circle 首次公開募股 (IPO) 定價為每股 31 美元,穩定幣發行人估值為 69 億美元
香港即將允許加密貨幣衍生性商品交易
https://www.coindesk.com/policy/2025/06/05/hong-kong-set-to-allow-crypto-derivatives-trading
-
@ fd78c37f:a0ec0833
2025-04-01 11:49:06In this edition, we invited Keypleb, the founder of Bitcoin Indonesia, to share how he built the Bitcoin community in Indonesia, overcoming challenges like member turnover and venue selection, while driving the adoption and growth of Bitcoin.
YakiHonne: Welcome, Keypleb. Before we begin, let me briefly introduce YakiHonne. YakiHonne is a decentralized media client built on Nostr—a protocol designed to empower freedom of speech through technology. It enables creators to own their voices and assets while offering innovative tools like smart widgets, verified notes, and support for long-form content. We focus on free speech and free media by user privacy and data to be protected. So before starting the interview, I'd like to hear about yourself and your community.
Keypleb:My name is Keypleb, though it’s a pseudonym—a name I use to respect privacy. I'm a co-founder of Bitcoin Indonesia, Bitcoin House Bali, and Code Orange, a new developer school we launched at a conference just a few days ago. We focus on driving adoption through meetups, hackathons, and technical workshops. I'll dive into more details later, but that's a brief overview. I'm based in Bali now, though I travel a lot and consider myself quite nomadic. Great to be here.
YakiHonne: What sparked your interest in Bitcoin and what motivated you to create a community on Bitcoin?
Keypleb:I first got interested in Bitcoin because it solved a specific problem. At the time, I didn’t know exactly what the solution was, but the problem was that I couldn’t afford a home. Back in 2019, I was living in London, and a two-bedroom apartment was £600,000, which was insanely expensive. First-time buyers like myself simply couldn’t afford it. Why was it so expensive? Why was buying a house so hard? During the COVID lockdown, I had more time on my hands and started listening to Michael Saylor on a Bitcoin podcast, where he talked about how the system is rigged, and that’s why people work hard but still can’t afford a house. That really resonated with me. So I started looking for a community, but unfortunately, there wasn’t one.. Keypleb:After moving to Bali, I attended a lot of crypto meetups, especially scammy altcoin ones, thinking, “There has to be a solution.” But none of them resonated with me. There was no sense of freedom, and no real discussion about inflation resistance. I remembered a podcast from Dea Reskita, an Indonesian host who’s pretty well-known online. I reached out to her and said, “ you’ve got to help me. I’m surrounded by all these shitcoiners, and I can’t take it anymore. I need a real community. Is anything happening?” She replied, “Yes, something is happening. We should restart these meetups next month.” And that’s how it all began. Keypleb:There’s also another story about how we started Bitcoin House and how Bitcoin in Asia came to be, but maybe I’ll save that for later. Anyway, the spark of interest came from Bitcoin solving a real problem, and my drive to keep going came from the lack of quality meetups. Now, we’ve hosted 31 meetups, launched Bitcoin House and Code Orange, and the movement is growing rapidly.
YakiHonne: That’s such an amazing story—going from being on the brink of homelessness to creating something so impactful, and keeping it running every day, bringing new people into the journey. It’s truly inspiring. I’m curious about how the community started. How did you manage to attract members and build a strong community? What challenges did you face along the way?
Keypleb:It all started with our first meetup at the end of 2022, which was two and a half years ago now. At that time, we sent out an email to a group from a previous database, and the first meetup had around 20 people, which was a good start. However, problems quickly arose as people started dropping off, and the community lacked retention. In Bali, people come and go, usually staying for no more than two months, leading to a lack of long-term participation. This became one of our challenges: how to attract more people and, more importantly, get the same people to keep coming back. While I've been coming back for two and a half years, not everyone is able to return as often, and that has been a real challenge. Keypleb:Actually, I should also mention how I met my co-founders—Marius, Diana, and Dimas. We met at the 2023 Indonesia Bitcoin Conference. As time went on, we kept hosting meetups and had a lot of fun each time, though the locations kept changing. One of the initial challenges was that we didn't realize the importance of having a fixed meetup location. We changed venues several times before we realized that having a consistent location is crucial. If anyone wants to run a meetup, it's best to always choose a fixed location. We learned this through trial and error, but now it's no longer an issue. Keypleb:Since the conference, my co-founders and I have been working together, consistently putting in the effort. This is why our community has grown so large—so far, we are hosting 31 monthly meetups, 6 of which are in Bali. This means there is a bitcoin meetup almost every day on a regular basis. We've also established Bitcoin House Bali, a physical space, and the movement is growing rapidly. Without this movement, the region would face many challenges, including inflation and heavy censorship. It all started from just one meetup.
YakiHonne: It's amazing to see how you met your co-founders and how you’ve built something incredible that continues to grow today. What advice would you give to someone looking to start a successful Bitcoin community right now?
Keypleb:First, one very important piece of advice is to ensure that every meetup is held at the same location regularly. We realized this challenge through trial and error. To help others who are interested, we’ve published our meetup guide on GitHub, where everyone can check it out. For example, meetups should be held regularly, ideally once a month, or even once a week. In Chiang Mai, the Bitcoin meetup starts every Thursday at 7 PM, and everyone knows the time and location, making it easy to join without having to look up the next meetup. Keypleb:Additionally, our meetup structure is very simple. First, we do a round of introductions where everyone shares their name, where they’re from, and what Bitcoin means to them. This usually takes about 15 minutes. Then, we discuss three main questions: First, why do we need Bitcoin? The discussion typically focuses on two main issues Bitcoin addresses: inflation and censorship;Secondly, how to buy Bitcoin? We usually ask who wants to buy some Bitcoin, and then we do a small purchase together and conduct a P2P trade to demonstrate how easy it is to buy Bitcoin. Lastly, how to store Bitcoin? We introduce self-custody and show how to use hardware wallets (like Trezor), explaining the concept of the 12 words and private keys. Keypleb:The whole meetup usually wraps up in about an hour, after which people can continue socializing at Bitcoin House or wherever the meetup is taking place. In short, keeping the meetup simple and efficient, and ensuring a fixed location for each event, are key factors in building a successful community.
YakiHonne: What's the major approach? Is it more technical, or do you focus on non-technical aspects, or do you cover both?
Keypleb:Our approach includes both technical and non-technical content. Initially, our meetups were completely non-technical, just casual gatherings for people to socialize. Over time, however, we've evolved to incorporate more technical content. Keypleb:Out of the 31 monthly regular meetups we host, most of them have been non-technical, simply regular gatherings held at the same time and place according to our meetup guide. For example, we host the “Bitcoin for Beginners” meetup, which is designed for newcomers and takes place every second Friday of the month at 5 PM at the Bitcoin House Bali. This is entirely non-technical. Additionally, every Wednesday at Bitcoin House, we host the “My First Bitcoin” course. While the course touches on some technical aspects, such as seed phrases and backups, it’s still beginner-friendly and not too technical. The course runs for 10 weeks, and we plan to offer it in the local language at Bali University to help the local community better understand Bitcoin. Keypleb:On the other hand, we also offer highly technical content. We launched a new program called “Code Orange,” which is specifically designed for developers and programmers. We use the “Decoding Bitcoin” website, created by Jamal, which is a learning platform for developers. Many developer schools, like Code Orange, use this resource. Additionally, we host “Code Orange” meetups where we dive into the technical aspects of Bitcoin, such as how mining works and how to prevent single points of failure. Keypleb:We also organize technical workshops, such as “How to Defend Against a Five-Dollar Wrench Attack,” which is closely related to security. Recently, there have been some kidnapping incidents in Bali, and many people are concerned about their Bitcoin being stolen. To address this, we plan to hold a workshop on how to protect Bitcoin against such attacks. Additionally, we host hackathons and other high-tech events, and we just completed a very successful beginner-level hackathon. Keypleb:In summary, our community caters to everyone, from beginners to technical experts. For beginners, we offer easy-to-understand, non-technical content, while for experienced Bitcoiners, we provide in-depth technical material.
YakiHonne: It's great to approach it in both ways, so everyone gets their own "piece of the cake."Now, I'd like to dive into the technical side. What advice would you give to technically inclined individuals or organizations looking to contribute to the Bitcoin ecosystem? How should they approach the technical aspects of Bitcoin if they want to get involved?
Keypleb:I have some additional advice. First, technical individuals can sign up for the “Decoding Bitcoin” course that starts on 18th March 2025 or join our “Code Orange” program and participate in the end-of-year hackathon. If they are technically proficient, this will be a great opportunity. “Decoding Bitcoin” is great for beginners, but it’s also useful for technical individuals. If someone is very skilled, they can start contributing code right away. If they find the course too easy, they can skip it and dive directly into more advanced projects. Additionally, Bitshala and Chaincode Labs offer advanced courses, which more technically advanced individuals can choose to pursue.
Keypleb:Additionally, it's worth mentioning that the Bitcoin Dev Project has a great platform where technical individuals can find “Good First Issue” or open-source projects to start contributing code. You'll learn about the philosophy behind Bitcoin and why it's more meaningful than other “shitcoins.” Once you’ve taken enough “orange pills” (the philosophy and technology of Bitcoin), you can dive deeper into Bitcoin core development and potentially start coding in C++. If you're interested, you can join specific projects like Nostr, Fedimint or E-Cash.
YakiHonne: I’d like to move on to the next question: How do you see Bitcoin communities evolving as technology progresses, particularly in areas like scalability, privacy, and adaptability to other systems? Keypleb:I believe the Bitcoin community will continue to evolve, and it has already made incredible progress. Two and a half years ago, we started alone in Bali, with just ourselves. We began in the official phase and have had numerous conversations throughout the year. For example, we are now starting a Bitcoin club at a university in Bali; we just need to find a passionate, driven “Bitcoin maximalist,” and the Bitcoin club will begin. Like what our friends did in Banyuwangi, Indonesia, these clubs could eventually evolve into Bitcoin houses.
Keypleb:Regarding privacy and scalability, the community is making strides. We’re big fans of Fedi, which builds on top of the Fedimint protocol and uses e-cash to scale Bitcoin while improving privacy. Fedi low fees and high privacy potential give Bitcoin great opportunities in this area. Keypleb:As for Bitcoin's compatibility with fiat systems, although Bitcoin payments are illegal in some countries like Indonesia, smart developers across Southeast Asia are working on legal solutions. For example, there's a website called Pleb QR that works in Thailand, allowing you to pay in fiat via the Lightning Network. Koral is another app specifically for Indonesia. These kinds of testing products already exist and are physically possible, but we’re just waiting on regulations. My influential friends are actively lobbying the government for adoption. Keypleb:In summary, privacy, scalability, and compatibility with fiat systems are all works in progress, and they will continue to evolve positively. There will be more meetups, more wallet downloads, and more adoption—there’s no doubt about that.
YakiHonne: You mentioned the concept of cross-country issues, so I have one last question: How is the government’s stance on Bitcoin? Is the political climate supportive or against Bitcoin? How do you see the government's approach to Bitcoin in your community or environment?
Keypleb:This reminds me of a person, Jeff Booth, who once said, “We are them, the government is made up of us.” In Indonesia, many politicians actually support Bitcoin, and many of them mine Bitcoin themselves. When money is involved, the incentive is strong, and politicians naturally like to make more money. As a result, Indonesia has a large Bitcoin mining scene. However, overall, the Indonesian government is against Bitcoin, as seen in their ban on Bitcoin payments. The 2011 currency law states that any currency other than the Indonesian Rupiah (IDR) cannot be used, and violators can face up to one year in prison or a fine. This means you cannot pay with US dollars, lira, euros, pesos or pounds. Keypleb:This shows that the government’s legal system is somewhat fragile. It’s understandable that the government is concerned about disruptive technologies like Bitcoin, especially with such a fragile fiat system. Indonesia has also seen many arrests. In 2016, Bank Indonesia issued a letter announcing a crackdown on cryptocurrency payments. Those involved in paying in Bitcoin had their funds seized, and the police cooperated in shutting down businesses accepting Bitcoin payments in the cities. While this isn't very friendly, it does highlight the fragility of the existing system. We also believe that a new executive order may be introduced in the future, similar to when President Roosevelt in 1933 ordered Americans to hand over all their gold with his Executive Order 6102. If it happened before, it could happen again. Keypleb:Therefore, we predict that Bitcoin custody could become a legal issue, which is one of the reasons we blur the faces of participants at every meetup. We need to protect the community from any potential risks. But overall, we remain optimistic. Despite the government ban, the ideology of Bitcoin is unstoppable, and its spread cannot be stopped. So, we are very optimistic about the future.
YakiHonne: I think almost every government around the world, even in Africa, faces similar issues with Bitcoin. Some governments might want Bitcoin but hesitate to openly accept it due to the fear of it undermining the traditional financial system, which, of course, could eventually happen. But hopefully, as the new generation comes into power, we'll see more Bitcoin-friendly governments. So, thank you so much for sharing your insights and advice. I really appreciate your time and the valuable input you've provided.
Keypleb:I'm really glad this conversation enlightened me. I enjoyed it a lot, and it made me reflect on how much work we're doing and how valuable it is. There are a lot of problems out there, with censorship being the biggest one, followed by inflation, which is also a major issue depending on the region. But Bitcoin is open, the community is growing, and people are fighting against censorship and internet shutdowns in places like Indonesia and beyond. The movement is definitely growing. So, I'm very happy to be here and have this chat. Thanks again.
Bitcoin Indonesia nostr: nostr:npub1y4qd2zhtn05gnsaaq5xfejzfk4a32638tx6gpp9g8k6e42g9d66qaxhcr3
Keypleb nostr: nostr:npub190trvg63e6tyqlwlj6lccqpftx76lckj25c006vwx3dzvdl88yxs2nyqdx
-
@ 8d34bd24:414be32b
2025-06-08 03:42:59Last post, I touched on the subject of what do you say to those going through trials and tribulations, but as I read Job, it seemed like there was more to say on the subject of how Christians are to respond to those who are suffering. The original passage of inspiration was this.
Don’t Be A Miserable Comforter
Then Job answered,
“I have heard many such things;\ Sorry comforters are you all.\ Is there no limit to windy words?\ Or what plagues you that you answer?\ I too could speak like you,\ If I were in your place.\ I could compose words against you\ And shake my head at you.\ I could strengthen you with my mouth,\ And the solace of my lips could lessen your pain. (Job 16:1-5)
Job was suffering. His friends came with the intention of comforting Job. Job vented his frustrations and problems understanding God’s justice. His friends tried to correct Job’s honest questions. These corrections escalated to the point of accusing Job of heinous sins and saying that everything that had happened to Job was his fault.
Job rightly said, “If I were in your place, I could compose words against you, and shake my head at you.” Sometimes we have to show mercy while a person is working through their feelings and confusion. Although some hardships are the consequences or punishment for sins, many (probably most) are not. We, as Christians, are promised trials. We should not be surprised when we go through trials.
Job also compares two ways of responding to a fellow believer going through trials. He says, “I could strengthen you with my mouth, and the solace of my lips could lessen your pain.” We can use our words to encourage and strengthen those who are suffering.
He also accuses his visitors of “Sorry comforters are you all. Is there no limit to windy words?” This reminds me of a traditional saying, “If you can’t say anything nice, don’t say anything at all.” Some of us want to fix everything. Sometimes we need to just listen. We don’t have to speak an answer for everything. In these uncomfortable situations, it is easy to start with a brief, Biblical answer, but then to start filling the silence with our own words to fill the silence. This can harm of everyone.
Job’s friends initial comments were not bad and were mostly true, but the more they talked, the more they went off track and the more harm they did. We want to lessen their pain, not be sorry comforters.
Of course this doesn’t mean that we can’t share God’s word. It doesn’t mean we can’t acknowledge obvious sins that are known by all parties. It does mean that all words should be an encouragement to lead them into closer fellowship with God.
Job again comments about his friends.
Even now, behold, my witness is in heaven,\ **And my advocate is on high.\ My friends are my scoffers;\ My eye weeps to God.\ O that a man might plead with God\ As a man with his neighbor!\ For when a few years are past,\ I shall go the way of no return. (Job 16:19-22) {emphasis mine}
Job, being a godly man, puts his trust in God. Notice the pattern: God, friends, God.
And my advocate is on high.\ My friends are my scoffers;\ My eye weeps to God.
Despite the scoffing and harm done by his friends, he keeps his eye on God as his advocate and the one he turns to in sorrow. In the case of Job, he is able to lean on God despite the harm done by his friends. Those will lesser faith might have been pushed away from God by his friends words.
Love One Another
In the New Testament, we are told:
“A new commandment I give to you, that you love one another, even as I have loved you, that you also love one another. By this all men will know that you are My disciples, if you have love for one another.” (John 13:34-35)
Our every word and action should be loving. That doesn’t mean ignoring sin, but it does mean every word and action should be used to draw a person into closer relationship with their God and Savior. In the case of a person who is sinning, Jesus set a perfect example.
The scribes and the Pharisees brought a woman caught in adultery, and having set her in the center of the court, they*said to Him, “Teacher, this woman has been caught in adultery, in the very act. Now in the Law Moses commanded us to stone such women; what then do You say?” They were saying this, testing Him, so that they might have grounds for accusing Him. But Jesus stooped down and with His finger wrote on the ground. But when they persisted in asking Him, He straightened up, and said to them, “He who is without sin among you, let him be the first to throw a stone at her.” Again He stooped down and wrote on the ground. When they heard it, they began to go out one by one, beginning with the older ones, and He was left alone, and the woman, where she was, in the center of the court. Straightening up, Jesus said to her, “Woman, where are they? Did no one condemn you?” She said, “No one, Lord.” And Jesus said, “I do not condemn you, either. Go. From now on sin no more.” (John 8:3-11)
What did Jesus do:
-
He protected the accused from those trying to use, abuse, and torment her.
-
He did not deny her sin, but encouraged her accusers to acknowledge their own sins.
-
He encouraged her to “sin no more.”
This woman knew she had sinned. She did not need to be reminded of it. She didn’t deny it; she knew. Because she and everyone else knew her sin, there was no need to bring it up again. Jesus used this situation to help her accusers understand their own sin and to lead her into repentance and salvation. The gentle correction was used to lead her to a better way.
When we speak to someone in trials, whether self-inflicted, externally caused, or a standard trial common to all men, our goal should be to uplift and draw to Jesus. We should have mercy on the suffering and not add to their suffering.
No matter the case, we need to carefully use our words for love and mercy.
Beloved, let us love one another, for love is from God; and everyone who loves is born of God and knows God. The one who does not love does not know God, for God is love. By this the love of God was manifested in us, that God has sent His only begotten Son into the world so that we might live through Him. In this is love, not that we loved God, but that He loved us and sent His Son to be the propitiation for our sins. Beloved, if God so loved us, we also ought to love one another. (1 John 4:7-11)
Dealing With Sin & Repentance
In 1 & 2 Corinthians, Paul deals with a situation of extreme sin. In 1 Corinthians he rebukes the church for allowing this heinous sin within their church body.
It is actually reported that there is immorality among you, and immorality of such a kind as does not exist even among the Gentiles, that someone has his father’s wife. You have become arrogant and have not mourned instead, so that the one who had done this deed would be removed from your midst.
For I, on my part, though absent in body but present in spirit, have already judged him who has so committed this, as though I were present. In the name of our Lord Jesus, when you are assembled, and I with you in spirit, with the power of our Lord Jesus, I have decided to deliver such a one to Satan for the destruction of his flesh, so that his spirit may be saved in the day of the Lord Jesus. (1 Corinthians 5:1-5) {emphasis mine}
This unrepentant sin could not be allowed to remain in the body because it could spread among God’s people and because it harmed God’s glory. At the same time, the motivation for removing him from the body was not to remove him from a relationship with God. It was to cause consequences in the hopes that the man would return to Jesus.
In 2 Corinthians, we find that he does repent of his son and seek to come back into the fellowship of believers.
For out of much affliction and anguish of heart I wrote to you with many tears; not so that you would be made sorrowful, but that you might know the love which I have especially for you.
But if any has caused sorrow, he has caused sorrow not to me, but in some degree—in order not to say too much—to all of you. Sufficient for such a one is this punishment which was inflicted by the majority, so that on the contrary you should rather forgive and comfort him, otherwise such a one might be overwhelmed by excessive sorrow. Wherefore I urge you to reaffirm your love for him. For to this end also I wrote, so that I might put you to the test, whether you are obedient in all things. But one whom you forgive anything, I forgive also; for indeed what I have forgiven, if I have forgiven anything, I did it for your sakes in the presence of Christ, so that no advantage would be taken of us by Satan, for we are not ignorant of his schemes. (2 Corinthians 2:4-11) {emphasis mine}
Once a sinner repents, we are to immediately forgive and comfort them and welcome them back into the fellowship of believers. We are not to remind them of their previous sins and overwhelm them with excessive sorrow, but are to reaffirm our love for them. Any punishment was for correction, not to harm or cause them pain. We should seek the good of those who sinned. We should welcome them back with open arms. We should forgive as we were forgiven by God.
All of our words and actions toward others, whether the most godly saint or the most reprehensible sinner, should be to the goal of drawing them closer to the Savior and helping them to trust in God’s goodness, wisdom, and strength.
May the God of Heaven carry your burdens and help you to help carry the burdens of those around you. May Our Savior help us to be a godly encouragement to the suffering who draws them into closer fellowship with the Savior. May the Holy Spirt give us discernment in how to best encourage the suffering and to help them rest in Jesus.
Trust Jesus
-
-
@ 2b998b04:86727e47
2025-06-08 03:37:24This is my first test -- I'm writing a blog post (using primal long form post) on nostr once and using github actions to fetch and store article as a static page on github pages to be used in a website (blog.stantonweb.com) and potentially other places.
-
@ 04c915da:3dfbecc9
2025-03-26 20:54:33Capitalism is the most effective system for scaling innovation. The pursuit of profit is an incredibly powerful human incentive. Most major improvements to human society and quality of life have resulted from this base incentive. Market competition often results in the best outcomes for all.
That said, some projects can never be monetized. They are open in nature and a business model would centralize control. Open protocols like bitcoin and nostr are not owned by anyone and if they were it would destroy the key value propositions they provide. No single entity can or should control their use. Anyone can build on them without permission.
As a result, open protocols must depend on donation based grant funding from the people and organizations that rely on them. This model works but it is slow and uncertain, a grind where sustainability is never fully reached but rather constantly sought. As someone who has been incredibly active in the open source grant funding space, I do not think people truly appreciate how difficult it is to raise charitable money and deploy it efficiently.
Projects that can be monetized should be. Profitability is a super power. When a business can generate revenue, it taps into a self sustaining cycle. Profit fuels growth and development while providing projects independence and agency. This flywheel effect is why companies like Google, Amazon, and Apple have scaled to global dominance. The profit incentive aligns human effort with efficiency. Businesses must innovate, cut waste, and deliver value to survive.
Contrast this with non monetized projects. Without profit, they lean on external support, which can dry up or shift with donor priorities. A profit driven model, on the other hand, is inherently leaner and more adaptable. It is not charity but survival. When survival is tied to delivering what people want, scale follows naturally.
The real magic happens when profitable, sustainable businesses are built on top of open protocols and software. Consider the many startups building on open source software stacks, such as Start9, Mempool, and Primal, offering premium services on top of the open source software they build out and maintain. Think of companies like Block or Strike, which leverage bitcoin’s open protocol to offer their services on top. These businesses amplify the open software and protocols they build on, driving adoption and improvement at a pace donations alone could never match.
When you combine open software and protocols with profit driven business the result are lean, sustainable companies that grow faster and serve more people than either could alone. Bitcoin’s network, for instance, benefits from businesses that profit off its existence, while nostr will expand as developers monetize apps built on the protocol.
Capitalism scales best because competition results in efficiency. Donation funded protocols and software lay the groundwork, while market driven businesses build on top. The profit incentive acts as a filter, ensuring resources flow to what works, while open systems keep the playing field accessible, empowering users and builders. Together, they create a flywheel of innovation, growth, and global benefit.
-
@ 21335073:a244b1ad
2025-03-15 23:00:40I want to see Nostr succeed. If you can think of a way I can help make that happen, I’m open to it. I’d like your suggestions.
My schedule’s shifting soon, and I could volunteer a few hours a week to a Nostr project. I won’t have more total time, but how I use it will change.
Why help? I care about freedom. Nostr’s one of the most powerful freedom tools I’ve seen in my lifetime. If I believe that, I should act on it.
I don’t care about money or sats. I’m not rich, I don’t have extra cash. That doesn’t drive me—freedom does. I’m volunteering, not asking for pay.
I’m not here for clout. I’ve had enough spotlight in my life; it doesn’t move me. If I wanted clout, I’d be on Twitter dropping basic takes. Clout’s easy. Freedom’s hard. I’d rather help anonymously. No speaking at events—small meetups are cool for the vibe, but big conferences? Not my thing. I’ll never hit a huge Bitcoin conference. It’s just not my scene.
That said, I could be convinced to step up if it’d really boost Nostr—as long as it’s legal and gets results.
In this space, I’d watch for social engineering. I watch out for it. I’m not here to make friends, just to help. No shade—you all seem great—but I’ve got a full life and awesome friends irl. I don’t need your crew or to be online cool. Connect anonymously if you want; I’d encourage it.
I’m sick of watching other social media alternatives grow while Nostr kinda stalls. I could trash-talk, but I’d rather do something useful.
Skills? I’m good at spotting social media problems and finding possible solutions. I won’t overhype myself—that’s weird—but if you’re responding, you probably see something in me. Perhaps you see something that I don’t see in myself.
If you need help now or later with Nostr projects, reach out. Nostr only—nothing else. Anonymous contact’s fine. Even just a suggestion on how I can pitch in, no project attached, works too. 💜
Creeps or harassment will get blocked or I’ll nuke my simplex code if it becomes a problem.
https://simplex.chat/contact#/?v=2-4&smp=smp%3A%2F%2FSkIkI6EPd2D63F4xFKfHk7I1UGZVNn6k1QWZ5rcyr6w%3D%40smp9.simplex.im%2FbI99B3KuYduH8jDr9ZwyhcSxm2UuR7j0%23%2F%3Fv%3D1-2%26dh%3DMCowBQYDK2VuAyEAS9C-zPzqW41PKySfPCEizcXb1QCus6AyDkTTjfyMIRM%253D%26srv%3Djssqzccmrcws6bhmn77vgmhfjmhwlyr3u7puw4erkyoosywgl67slqqd.onion
-
@ b2a8fdbc:dcab1f03
2025-06-08 03:07:19ถ้าเรามี "เงินที่ดี" ที่มีจำนวนจำกัดและสามารถเก็บมูลค่าได้อย่างแท้จริง ภาวะเงินฝืดที่เกิดจากคุณสมบัติเช่นนี้ อาจนำไปสู่ผลลัพธ์ที่เป็นบวกอย่างมหาศาลต่อคุณภาพชีวิตและมุมมองของมนุษย์ต่อการดำรงอยู่ ไม่ใช่เพียงแค่ความกังวลเรื่องการว่างงาน
เงินฝืด: ก้าวข้ามความกลัวการตกงาน สู่การค้นหาความหมายของชีวิต แนวคิดที่ว่ามนุษย์ไม่ได้เกิดมาเพื่อทำงานหากินไปแต่ละวัน แต่เพื่อค้นหาความหมายที่แท้จริงของชีวิต เป็นปรัชญาที่ลึกซึ้ง และสอดคล้องกับแนวคิดที่ว่า เมื่อเงินมีคุณสมบัติที่มั่นคงและมีจำกัด อาจนำมาซึ่งการเปลี่ยนแปลงเชิงบวกดังนี้:
1. ความมั่นคงทางการเงินและคุณภาพชีวิตที่ดีขึ้น เมื่อเงินมีคุณสมบัติที่เก็บรักษามูลค่าได้ดี นั่นหมายความว่ากำลังซื้อของเงินจะไม่ลดลงไปตามกาลเวลา ตรงกันข้าม อาจเพิ่มขึ้นด้วยซ้ำในระบบเศรษฐกิจที่มีประสิทธิภาพ สิ่งนี้จะส่งผลให้:
- ลดความกังวลเรื่องค่าครองชีพ : ผู้คนจะกังวลเรื่องรายได้ไม่พอค่าใช้จ่ายน้อยลง เพราะเงินที่หามาได้ในวันนี้ จะมีมูลค่าที่คงที่หรือเพิ่มขึ้นในอนาคต ทำให้วางแผนชีวิตได้ง่ายขึ้น
- การออมและการลงทุนมีประสิทธิภาพ : แรงจูงใจในการออมจะสูงขึ้น เพราะเงินที่เก็บไว้มีมูลค่าเพิ่มขึ้นเอง ทำให้เกิดความมั่งคั่งสะสมได้ง่ายขึ้น ซึ่งสามารถนำไปลงทุนในสิ่งที่มีคุณค่าอย่างแท้จริง
- ปลดล็อคจากวงจร "วิ่งไล่จับเงิน": เมื่อไม่ต้องกังวลเรื่องเงินเฟ้อกัดกินมูลค่าเงิน มนุษย์อาจไม่จำเป็นต้องทำงานหนักมากเพื่อชดเชยกำลังซื้อที่หายไป ทำให้มีเวลาและพลังงานเหลือเฟือสำหรับสิ่งอื่น ๆ ในชีวิต
2. การนิยาม "งาน" และ "คุณค่า" ใหม่ ในบริบทที่เงินมีความมั่นคง การทำงานอาจไม่ได้ถูกมองว่าเป็นเพียงหนทางในการ "หาเลี้ยงชีพ" อีกต่อไป แต่จะกลายเป็นการสร้างคุณค่าที่แท้จริง:
- งานที่สร้างสรรค์และมีความหมาย : ผู้คนอาจมีอิสระมากขึ้นในการเลือกทำงานที่ตนเองหลงใหล มีความหมาย หรือสร้างสรรค์สิ่งใหม่ ๆ ที่เป็นประโยชน์ต่อสังคม ไม่ใช่แค่การทำงานเพื่อเงิน
- ลดการแข่งขันที่ไม่จำเป็น : เมื่อมูลค่าของเงินมั่นคง การแข่งขันเพื่อแย่งชิงทรัพยากรที่มีจำกัดอาจลดลง ทำให้สังคมมีทิศทางที่ร่วมมือกันมากขึ้น
- การพัฒนามนุษย์อย่างรอบด้าน : เมื่อมีเวลาและทรัพยากรมากขึ้น มนุษย์จะมีโอกาสในการเรียนรู้ พัฒนาทักษะใหม่ ๆ หรือทุ่มเทให้กับงานอดิเรกและความสนใจส่วนตัว ซึ่งนำไปสู่การพัฒนาตนเองอย่างรอบด้าน
3. การมุ่งเน้นไปที่ความหมายที่แท้จริงของชีวิต หากมนุษย์หลุดพ้นจากพันธนาการของการ "ทำงานเพื่ออยู่รอด" ก็จะมีพื้นที่ทางความคิดและจิตใจที่กว้างขวางขึ้นเพื่อ:
- ค้นหาความสุขจากภายใน : ความสุขอาจไม่ได้มาจากการสะสมวัตถุ แต่มาจากการใช้ชีวิตอย่างมีสติ การเชื่อมโยงกับผู้อื่น หรือการทำกิจกรรมที่เติมเต็มจิตใจ
- การพัฒนาจิตวิญญาณ : มีเวลามากขึ้นในการสำรวจปรัชญา ศาสนา หรือศิลปะ เพื่อค้นหาความหมายของชีวิตที่ลึกซึ้งกว่าการบริโภค
- การดูแลสิ่งแวดล้อมและสังคม : เมื่อความกังวลเรื่องเศรษฐกิจลดลง สังคมอาจหันมาให้ความสำคัญกับการรักษาสิ่งแวดล้อม การแก้ปัญหาสังคม และการสร้างโลกที่ดีขึ้นสำหรับทุกคน
"เงินที่ดี" ที่มีคุณสมบัติจำกัดและเก็บมูลค่าได้นั้น มีศักยภาพที่จะเปลี่ยนแปลงพลวัตของสังคมและช่วยให้มนุษย์สามารถมีชีวิตที่มั่งคั่งและมีความหมายได้มากขึ้น โดยไม่ได้ถูกจำกัดอยู่เพียงแค่การทำงานเพื่อความอยู่รอดเท่านั้น
-
@ dfa02707:41ca50e3
2025-06-08 03:01:34- This version introduces the Soroban P2P network, enabling Dojo to relay transactions to the Bitcoin network and share others' transactions to break the heuristic linking relaying nodes to transaction creators.
- Additionally, Dojo admins can now manage API keys in DMT with labels, status, and expiration, ideal for community Dojo providers like Dojobay. New API endpoints, including "/services" exposing Explorer, Soroban, and Indexer, have been added to aid wallet developers.
- Other maintenance updates include Bitcoin Core, Tor, Fulcrum, Node.js, plus an updated ban-knots script to disconnect inbound Knots nodes.
"I want to thank all the contributors. This again shows the power of true Free Software. I also want to thank everyone who donated to help Dojo development going. I truly appreciate it," said Still Dojo Coder.
What's new
- Soroban P2P network. For MyDojo (Docker setup) users, Soroban will be automatically installed as part of their Dojo. This integration allows Dojo to utilize the Soroban P2P network for various upcoming features and applications.
- PandoTx. PandoTx serves as a transaction transport layer. When your wallet sends a transaction to Dojo, it is relayed to a random Soroban node, which then forwards it to the Bitcoin network. It also enables your Soroban node to receive and relay transactions from others to the Bitcoin network and is designed to disrupt the assumption that a node relaying a transaction is closely linked to the person who initiated it.
- Pushing transactions through Soroban can be deactivated by setting
NODE_PANDOTX_PUSH=off
indocker-node.conf
. - Processing incoming transactions from Soroban network can be deactivated by setting
NODE_PANDOTX_PROCESS=off
indocker-node.conf
.
- Pushing transactions through Soroban can be deactivated by setting
- API key management has been introduced to address the growing number of people offering their Dojos to the community. Dojo admins can now access a new API management tab in their DMT, where they can create unlimited API keys, assign labels for easy identification, and set expiration dates for each key. This allows admins to avoid sharing their main API key and instead distribute specific keys to selected parties.
- New API endpoints. Several new API endpoints have been added to help API consumers develop features on Dojo more efficiently:
- New:
/latest-block
- returns data about latest block/txout/:txid/:index
- returns unspent output data/support/services
- returns info about services that Dojo exposes
- Updated:
/tx/:txid
- endpoint has been updated to return raw transaction with parameter?rawHex=1
- The new
/support/services
endpoint replaces the deprecatedexplorer
field in the Dojo pairing payload. Although still present, API consumers should use this endpoint for explorer and other pairing data.
- New:
Other changes
- Updated ban script to disconnect inbound Knots nodes.
- Updated Fulcrum to v1.12.0.
- Regenerate Fulcrum certificate if expired.
- Check if transaction already exists in pushTx.
- Bump BTC-RPC Explorer.
- Bump Tor to v0.4.8.16, bump Snowflake.
- Updated Bitcoin Core to v29.0.
- Removed unnecessary middleware.
- Fixed DB update mechanism, added api_keys table.
- Add an option to use blocksdir config for bitcoin blocks directory.
- Removed deprecated configuration.
- Updated Node.js dependencies.
- Reconfigured container dependencies.
- Fix Snowflake git URL.
- Fix log path for testnet4.
- Use prebuilt addrindexrs binaries.
- Add instructions to migrate blockchain/fulcrum.
- Added pull policies.
Learn how to set up and use your own Bitcoin privacy node with Dojo here.