-
@ 866e0139:6a9334e5
2025-06-14 17:33:06Autor: Bernd Schoepe. Dieser Beitrag wurde mit dem Pareto-Client geschrieben. Sie finden alle Texte der Friedenstaube und weitere Texte zum Thema Frieden hier. Die neuesten Pareto-Artikel finden Sie in unserem Telegram-Kanal.
Die Anmerkungen zum Text (Fußnoten) folgen aus technischen Gründen gesondert.
Die neuesten Artikel der Friedenstaube gibt es jetzt auch im eigenen Friedenstaube-Telegram-Kanal.
Dies ist Teil 3 des Essays. Lesen Sie hier Teil 1 und Teil 2.
IV Denazifizierungsstopp und die „abgesagte“ NS-Aufarbeitung in der Adenauer-Ära
„Nie wieder Krieg, nie wieder Faschismus!“
Dieses Gelöbnis erfuhr seine Ausformulierung, als die durch Krieg und Verfolgung charakterlich tief geprägten und für ihr Leben gezeichneten Väter und Mütter des Grundgesetzes sich 1948 zum Parlamentarischen Rat versammelten. Dort hat man vor dem Erfahrungshintergrund des Totalitarismus Nazi-Deutschlands in den neunzehn Grundrechtsartikeln die Rechte der Menschen vor dem Staat festgeschrieben, die gegen staatliche „Willkür, Ungerechtigkeit und Gewalt“ (25) schützen sollen. Sie wurden zur Grundlage eines neuen Staatsverständnisses, das vom Humanismus und dem Geist der Aufklärung getragen sein sollte. Das Gelöbnis fand seinen verfassungsmäßigen Ausdruck also im Grundgesetz, das am 23. Mai 1949 feierlich in Bonn verkündet wurde. Dessen Geist manifestiert sich besonders in der sogenannten Ewigkeitsklausel der Menschenwürde (Art.1), die den Grundrechtsartikeln, dem Kanon der Menschen- und Bürgerrechte, vorangestellt wurde.
Doch die Unterschriften unter dem Grundgesetz waren kaum trocken, da wurde dieses Gelöbnis schon durch die Frontstaatenideologie des Kalten Krieges überlagert, konterkariert und in der Praxis sukzessive aufgehoben. Der Kalte Krieg hatte bereits begonnen und seine Akteure bedienten sich ungeniert der Vorurteile und Stereotypen, mit denen die Deutschen noch gut aus dem Dritten Reich vertraut waren. Grundiert vom militanten Anti-Kommunismus, der bekanntlich auch die Nazi-Ideologie stark angetrieben hatte, verstärkt durch die Wiederbewaffnung mit der sie begleitenden Aufnahme der BRD in die NATO, konsolidiert in der Zeit der Adenauer-Restauration in den 1950er Jahren, in der ein konservativ-elitäres Staatsdenken gegenüber radikaldemokratischen Bestrebungen klar dominieren und sich durchsetzen sollte, erwies die Aufarbeitung der NS-Vergangenheit sich als der größte und folgenreichste Rohrkrepierer in der Geschichte der noch jungen zweiten deutschen Republik. Erst mit den Frankfurter Auschwitz-Prozessen und stärker dann noch im Zusammenhang mit der Studentenrevolte Ende der 1960er Jahre sollte es zu neuen ernsthaften Bemühungen um gesellschaftliche Aufarbeitung kommen.
Adenauers Ankündigung einer Beendigung der NS-Aufarbeitung, die er bereits in seiner ersten Regierungserklärung 1949 (!) vor dem Bundestag gab, dürfte auch und gerade aus heutiger Sicht von deutlich wichtigerer Bedeutung für das Fortleben autoritär-rechtsextremer, völkischer und nationalsozialistischer Gesinnungen und Haltungen in Deutschland gewesen sein als der Einzug der AfD in den Bundestag 2017, einschließlich aller geschichtsvergessenen und in ihrer Wortwahl geschmacklosen Äußerungen ihrer Politiker seither.
Bemerkenswert sind die Worte, mit der Adenauer so früh der gesellschaftlichen Aufarbeitung der NS-Zeit eine klare Absage erteilte:
„Durch die Denazifizierung ist viel Unglück und viel Unheil angerichtet worden. (...) Im Übrigen dürfen wir nicht mehr zwei Klassen von Menschen in Deutschland unterscheiden, die politisch Einwandfreien und die politisch Nicht-Einwandfreien. Diese Unterscheidung muss baldigst verschwinden.“ (26)
Rasch wurden daraufhin die gesetzlichen Grundlagen geschaffen, um in den im Aufbau befindlichen bundesdeutschen Verwaltungsapparat über 50.000 NS-belastete Beamte wiedereinzugliedern, darunter auch viele, die zuvor dem Nazi-Unrechtsstaat als Mitglieder der Gestapo und der SS gedient hatten. Besonders im Bundesjustizministerium hatte ein Netzwerk aus Alt-Nazis unterhalb der ministeriellen Leitungsebene bis in die 1960er Jahre hinein das Sagen, mit großen, noch immer nicht vollständig aufgearbeiteten Auswirkungen auf die Gesetzgebung, durch die NS-Verbrecher in der BRD auf verschiedene Weisen vor Strafverfolgung geschützt wurden.
Den ideologischen Hintergrund bildet dafür der Konservatismus, dem Adenauer, die CDU/CSU und andere politisch einflussreichen Kräfte anhingen, genauer gesagt das Elitedenken, das für diesen Konservatismus konstitutiv ist. Es erklärt, dass die Regierung lieber auf die alte Elite, auch wenn sie in weiten Teilen nationalsozialistisch belastet war, zurückgriff als ein neues, demokratisch-selbstbewusstes Beamtentum zu begründen und eine aus den verschiedenen Facetten des Widerstandes sich rekrutierende Führungsschicht aufzubauen. Denn die geeigneten Personen für diese Führungsschicht hätte man weitgehend nicht im eigenen Lager, sondern im Lager der politischen Gegner, bei Sozialdemokraten, Sozialisten, Kommunisten und Linksliberalen finden können.
Fazit: Im Handumdrehen wurde der an das „Nie-Wieder!“– Versprechen an die zukünftigen Generationen geknüpfte, zumindest teilweise ernsthaft und aufrichtig angestrebte Neuanfang –verstanden als ein radikal zu vollziehender Bruch mit der faschistischen Vergangenheit – hintertrieben, entstellt, entkräftet und um seine Wirkung gebracht. Dabei spielte nicht zuletzt die schnell wieder angekurbelte Feindbildproduktion und Russophobie („alle Wege der Linken, Friedensfreunde, Anti-Militaristen und Neutralitätsbefürworter führen nach Moskau!“), eine wichtige Rolle.
Es ist daher kein Zufall, dass sie uns so verblüffend ähnlich auch heute wieder in Politik und Medien begegnet. Sie ist ein Herzstück der deutschen Nachkriegs-Lebenslüge namens „Vergangenheitsbewältigung“. Hier gilt einmal mehr der Satz, dass Untote bekanntlich länger leben.
Sie macht sich heute auch darin bemerkbar, dass die Tatsache, dass es sich bei dem Krieg gegen Russland nicht um einen Eroberungskrieg, sondern um einen Vernichtungsfeldzug gegen eine „minderwertige Rasse und Kultur“ handelte, im kollektiven Bewusstsein der Deutschen nicht verankert wurde. Sonst hätte der Hass auf die Russen und alles Russische gesellschaftlich nicht wieder hoffähig werden können.
DIE FRIEDENSTAUBE FLIEGT AUCH IN IHR POSTFACH!
Hier können Sie die Friedenstaube abonnieren und bekommen die Artikel zugesandt, vorerst für alle kostenfrei, wir starten gänzlich ohne Paywall. (Die Bezahlabos fangen erst zu laufen an, wenn ein Monetarisierungskonzept für die Inhalte steht). Sie wollen der Genossenschaft beitreten oder uns unterstützen? Mehr Infos hier oder am Ende des Textes.
Exkurs zum Niedergang der deutschen Sozialdemokratie
Im Ringen um den Weg, den die Bundesrepublik in den 1950er Jahren nehmen sollte, wurden damals Sozialdemokraten, die sich nicht bedingungslos der Bollwerks- und Frontstaaten-Ideologie des Kalten Kriegs unterwarfen, als „vaterlandslose Gesellen“ diffamiert. Die SPD tat sich immer schwer damit, der Demagogie der bürgerlichen Parteien etwas entgegenzusetzen, da Antikommunismus bei breiten Teilen der Bevölkerung, getreu der Devise „je primitiver, desto besser bzw. wirkungsvoller“, auch nach Hitler verfing.
Heute schlägt die Sozialdemokratische Partei die Aufrüstungs- und Kriegstrommel lieber selber kräftig mit und diffamiert die Angehörigen der Friedensbewegung und Verfechter einer Détente mit Russland als „Putin-Freunde“ und „Russlandversteher“ oder gar, ins absurd Metaphysische gesteigert als “gefallene Engel aus der Hölle“ (Olaf Scholz).
Mit dem Friedensnobelpreisträger und NS-Widerstandskämpfer Willy Brandt an der Spitze fuhr die SPD ihren größten Wahlerfolg ein – die von ihm geführte erhielt in der Bundestagswahl 1972 45,8 Prozent. Außenpolitisch überzeugte sie mit „Wandel durch Annäherung“ und „Wir wollen ein Volk guter Nachbar sein“. Nun ist sie beim Führungspersonal bei einem farblosen Apparatschik und Waffenlobbyisten (27) namens Lars Klingbeil und 16,4 % der Wählerstimmen angekommen. Zumindest die ebenso blasse und ideenlose Saskia Esken, die bei vielen einzig und allein für ihre Diffamierung von Demonstranten gegen das Corona-Unrecht („Covidioten“) in Erinnerung bleiben wird, zieht aus ihrer Unbeliebtheit nun die Konsequenz und tritt ab.
Indem die SPD, in Anbetracht der Friedensinitiativen Trumps die Chance verstreichen lässt, sich selbst in ihrer Politik gegenüber Russland zu korrigieren, um doch noch auf den Pfad der Diplomatie zurückzukehren und zu verhindern, dass auch noch der letzte Rest sozialdemokratischer Substanz über Bord geworfen wird, setzt Sozen-Konkursbeschleuniger Klingbeil zusammen mit BlackRock-Millionär Merz auf den Scholzschen Zeitenwende-Wahnsinn von 100 Milliarden für die Rüstung lieber noch weitere 500 Milliarden Euro drauf. Er und der den Kommiss-Ton perfekt beherrschende Pistorius, mit seinen Einlassungen zum „russischen Diktatfrieden“, der, wenn man ihn denn schon unbedingt so nennen will, ja nicht zuletzt auf das Konto der diplomatischen Untätigkeit der deutschen Regierung geht, besiegeln durch das von der Schuldenbremse befreite, in puncto Kostspieligkeit nach oben offene Aufrüstungs- und Militarisierungsprogramm, unter das in Wirklichkeit auch ein großer Teil der geplanten Infrastrukturmaßnahmen subsummiert werden wird (28), das Schicksal der ältesten Partei Deutschlands. Wissen diese SPD-Politiker wirklich nicht, was sie tun, wenn sie für die Profite der Rüstungswirtschaft alles verraten und auf lange Sicht verspielen, wofür diese Partei außen- und sozialpolitisch einmal stand und wofür sie gewählt wurde?
All das, was die SPD als Friedens- und Entspannungspartei einmal zur stärksten politischen Kraft gemacht hat, wird nun wie im Wahn von ihr verleugnet und mutwillig, geschichtsvergessen-revanchistisch zerstört. Und nicht nur das: Die SPD liefert den Rechten (nein, nicht der AfD, sondern den sonstigen Extremisten der Mitte!) den Grund, den neoliberal bereits entkernten Sozialstaat weiter – ab jetzt aber mit Bulldozern statt mit der Spitzhacke – zu zerstören. Sie nimmt dafür auch weitere, schwere Beschädigungen der Legitimität unserer ohnehin dahinsiechenden Demokratie in Kauf. Die Demokratie liegt nämlich seit Corona bei uns auf der Intensivstation und muss, u.a. durch regierungsfinanzierte „NGOs“ und staatlich organisierte Anti-AfD-Demonstrationen, künstlich beatmet werden!
Schließlich war die SPD zusammen mit der Merz-Union sogar bereit, einen kalten Putsch gegen die Integrität des Parlamentarismus und die elementaren Spielregeln der Demokratie durchzuführen. Mit diesem Putsch hat man im abgewählten 20. Bundestag noch schnell politisch äußerst weitreichende Grundgesetzänderungen durchgesetzt – und das gegen die neuen Mehrheiten des bereits gewählten 21. Bundestages! Die durch Bruch des Wahlversprechens ermöglichte Grundgesetzänderung, stellt einen besonders beschämenden Akt der Machtanmaßung, Wählerverhöhnung und Demokratiemissachtung dar. Und sie verfehlte ihre Wirkung nicht. Kurz darauf konnten die Demoskopen neue Rekordwerte für die AfD messen, die nun als stärkste Partei noch vor der CDU lag. Das Merz-Manöver dürfte im Übrigen dafür gesorgt haben, dass ihm nach der Wahl zum Bundeskanzler, die ja alles andere als glatt verlief, ein Makel anhängt, der so gravierend ist, dass er für den Rest seiner Amtszeit (hoffentlich) nicht mehr zu tilgen sein wird.
Das besonders Irre, das nicht nur den Fall der SPD beschreibt, ihr Versagen aber besonders plastisch hervorhebt, ist, dass es seit Beginn des Ukraine-Kriegs innerhalb der EU (mit Ausnahme Orbans) keine diplomatischen Initiativen gegeben hat, um mit Russland wieder ins Gespräch zu kommen. Im Rückblick wirken da selbst die Kalten Krieger vor und während der Ostpolitik von Willy Brandt wie Appeasement-Politiker.
Stattdessen war wiederholt eine Bundesaußenministerin zu vernehmen, die offenbar nur sehr eingeschränkt dazu imstande ist, ihre sprachliche Performanz dem hohen Amt angemessen zu kontrollieren. Sie wollte öffentlich „Russland ruinieren“ und erklärte dem Land ein anderes Mal, vor dem Europarat, beiläufig den Krieg. Dass Baerbock, die in ihrer Amtszeit in fast jedes diplomatische Fettnäpfchen getreten ist, jetzt zur zweithöchsten UN-Chef-Diplomatin gewählt wurde, ist Realsatire pur!
Polemik als geistiger Notwehrakt
Doch Halt! – Gerade merke ich, wie mich mein Hang zur Polemik fortzureißen beginnt!
Die Polemik ist ein hilfreiches (und noch nicht ganz verbotenes!) geistiges Notwehr-Mittel in Zeiten eines zunehmend aggressiv aufgeheizten gesellschaftlichen Klimas. Wie soll man nicht zum Polemiker und Satiriker angesichts des grassierenden Wahnsinns der Politik und ihrer vielen verrückt und absurd anmutenden Pathologien und Regressionen werden, hinter denen bei genauerem Hinsehen dann doch oft auch Kalkül vermutet werden muss? Wie sind sie anders als Vorgänge zu deuten, die zur Abwicklung der Demokratie führen sollen? Vorgänge, die durch eben jene Kräfte betrieben werden, die „unsere Demokratie“ inflationär lobpreisen und nicht müde werden, ihre „Werte“ in Sonntagsreden hervorzuheben. Gleichzeitig werden diese Werte aber durch Cancel Culture, Zensur und Denunziation massiv von ihnen angegriffen und von innen immer weiter ausgehöhlt.
Definitiv verhält es sich heute so, dass der Hang zur Polemik dem Umstand geschuldet wird, dass wir mittlerweile in schier unglaublichen Zeiten von Travestie-Ausgeburten leben. Diese machen es uns immer schwerer, nicht ganz die Bodenhaftung zu verlieren. All die wahnwitzigen Phänomenen, die wie wildgewordene Säue tagein tagaus durch das globale Dorf der Massenmedien in Echtzeit** getrieben werden, sie gefährden das Restvertrauen in den gesunden Menschenerstand und schränken die Möglichkeiten stark ein, einen halbwegs stabilen, geerdeten, vernunftgeleiteten Realitätsbezug aufrechtzuerhalten.
Und doch soll hier nicht ein weiteres Mal in dieser Façon mit der Regierungspolitik abgerechnet werden. Auf der Suche nach den tieferen Gründen für diese negativen Entwicklungen, soll stattdessen im zeithistorischen Material an einigen neuralgischen Stellen genauer nachgesehen und an der Oberfläche gekratzt werden, um die blinden Flecken bundesrepublikanischer Selbstwahrnehmung sichtbar zu machen.
Bernd Schoepe, Jahrgang 1965, Studium der Soziologie, Germanistik, Philosophie und Erziehungswissenschaften in Frankfurt/M. und Hamburg. Erstes und zweites Staatsexamen. Freier Autor, der zu bildungspolitischen, bildungssoziologischen- und bildungsphilosophischen Themen schreibt. Seit 2003 im Hamburger Schuldienst. Langjähriges GEW-Betriebsgruppen-Mitglied, ehem. Vertrauensmann, ehem. Mitglied der Hamburger Lehrerkammer. Hauptberuflich bin ich Politik- Deutsch- und Philosophielehrer an einer Hamburger Stadtteilschule. Kontakt: berndschoepe\@gmx.de
LASSEN SIE DER FRIEDENSTAUBE FLÜGEL WACHSEN!
In Kürze folgt eine Mail an alle Genossenschafter, danke für die Geduld!
Hier können Sie die Friedenstaube abonnieren und bekommen die Artikel zugesandt.
Schon jetzt können Sie uns unterstützen:
- Für 50 CHF/EURO bekommen Sie ein Jahresabo der Friedenstaube.
- Für 120 CHF/EURO bekommen Sie ein Jahresabo und ein T-Shirt/Hoodie mit der Friedenstaube.
- Für 500 CHF/EURO werden Sie Förderer und bekommen ein lebenslanges Abo sowie ein T-Shirt/Hoodie mit der Friedenstaube.
- Ab 1000 CHF werden Sie Genossenschafter der Friedenstaube mit Stimmrecht (und bekommen lebenslanges Abo, T-Shirt/Hoodie).
Für Einzahlungen in CHF (Betreff: Friedenstaube):
Für Einzahlungen in Euro:
Milosz Matuschek
IBAN DE 53710520500000814137
BYLADEM1TST
Sparkasse Traunstein-Trostberg
Betreff: Friedenstaube
Wenn Sie auf anderem Wege beitragen wollen, schreiben Sie die Friedenstaube an: friedenstaube@pareto.space
Sie sind noch nicht auf Nostr and wollen die volle Erfahrung machen (liken, kommentieren etc.)? Zappen können Sie den Autor auch ohne Nostr-Profil! Erstellen Sie sich einen Account auf Start. Weitere Onboarding-Leitfäden gibt es im Pareto-Wiki.
-
@ 2e8970de:63345c7a
2025-06-14 17:07:56Iran raising a red flag in war times? That's a bit. Sabrina Carpenters "persona" - she's doing a bit. In the pope election the cardinals locking themselves in a conclave and the white smoke thing - it's a bit. Everything is only a bit.
Maybe I'm just old and interpret too much into youth slang but - that's actually a HUGE cultural shift if young people think of nothing as authentic anymore. What even is authentic?
https://stacker.news/items/1006348
-
@ b83a28b7:35919450
2025-06-14 16:38:22This is the second installment in the series "The Net Appears" where I document my journey from being in a well-established and well-paying fiat job into the unknown world of independent work in freedom tech. Will I end up finding something truly inspiring and fulfilling, while being able to support my family? We'll find out over the course of the next few weeks.
So this happened a couple of days ago:
nostr:nevent1qvzqqqqqqypzpwp69zm7fewjp0vkp306adnzt7249ytxhz7mq3w5yc629u6er9zsqqsd6khjdmgmme3xrnzj5xn5tfwer5pjchh20mcp4lfemurfsj3v4wgsjw0uj
Let's back up a bit, because in the first installment of this series, I was still in limbo.
If you’d told me three weeks ago that corporate martyrdom could be negotiated like a farmers-market cantaloupe, I’d have laughed you off the Microsoft Teams grid. Yet there I was, video-boxed opposite my Senior Vice Priest of PowerPoint, calmly re-petitioning for a graceful guillotine.
His verdict: the guillotine is for optics only, and apparently it clashes with the brand guidelines. Laying off The AI Guy would look like we’d just unplugged the future for spare parts. Impossible. But the man did extend an olive branch the size of a bonsai: “Resign, and we’ll cash out your vacation - thirty glorious days of fiat.”
Not the three-month severance I’d fantasized about, but enough to buy time, dignity, and a respectable stack of Claude API credits. I signed before he could replace goodwill with an NDA.
And then I chose July 4 as my last day. Cue bald eagles, Sousa marches, and a slow-motion shot of me frisbee-flinging my employee badge into an erupting grill. Independence from fiat, by literal fireworks.
Space Rush
The moment rumors of my exit hit Teams, meeting invites vanished like socks in a hotel dryer. I’ve used the liberated hours to launch A Muse Stochastic, my audio-visual fever dream where generative melodies court glitch-poetry and occasionally elope with Gemini Veo video frames. The first episode is live, pulsing somewhere between synaptic Vivaldi and quantum origami. So far it has six listeners and one confused Australian-shepherd (my most honest critic).
nostr:nevent1qvzqqqqqqypzpwp69zm7fewjp0vkp306adnzt7249ytxhz7mq3w5yc629u6er9zsqy88wumn8ghj7mn0wvhxcmmv9uq3zamnwvaz7tmwdaehgu3wwa5kuef0qqsvhtdltg2k3guhmshgmgt3nc9ejy0ct96t7udm04r5mupplcmdtesppmn7x
Meanwhile the playwright in me, neglected for months beneath sprint plannings and quarterly road-maps, finally crawled into the light. “Waiting for Satoshi,” first conceived on a warm Prague evening exactly one year ago ( nostr:nprofile1qy0hwumn8ghj7en0deehgu3dw3jhxapwdah8yetwv3jhytnrdakj7qgcwaehxw309a5hxmrpdejzumn0wd68yvfwvdhk6tcqyzaz7w2gxdjcga0fz6qt3x8ehc83mpgpvmr2swwmuzzdqfn26m3q54mhg79 can attest to this), now wears its final coat of dialogue. Tomorrow it debuts on GitHub - Creative Commons, open-source, fork-and-prosper - perhaps the inaugural play to invite pull requests for stage directions. If anyone wishes to add a tap-dancing Lightning node, be my guest.
Prague on the Horizon
Next week I return to BTC Prague, where ghosts of last year’s epiphany still linger near the pastry stand. This time I’m lugging camera gear, not corporate slide decks. Episode Two of Finding Home will be filmed there, featuring a wanderer whose bitcoined life map reads like Odysseus riding a Lightning invoice.
Perhaps my only conference of the year, I'm looking forward to catching up with friends old and new, and catch a whiff of that infectious bitcoin hopium.
Micro-lessons from Week Three
-
Severance is a mindset. One month of paid vacation feels oddly richer than three months shackled to uncertainty.
-
Symbolism scales. Pick an Independence Day, any Independence Day, and watch the universe queue fireworks.
-
Creative backlogs age like fine kimchi. Leave an idea in brine for a year and it returns with extra tang.
-
Open source = open veins. Releasing art into the commons is terrifying until you remember blood circulates best when it moves.
-
Microsoft Teams silence is golden (parachute). Each canceled stand-up funds roughly eight bars of experimental synth.
Gazing Forward
I still don’t know how mortgage, car payments, and teenage-soccer-tour fees will reconcile with my bank balance come August. Yet the dread that once clung to my ribcage has dissolved, replaced by a jittery anticipation - like the hush before a stadium crowd erupts. Every unknown now feels less like a void and more like a blank slide awaiting wild, irreverent doodles.
Next dispatch will likely come with reflections from Prague. The last two years, I was moved to unexpected tears on the final day, marveling at the sheer profundity of the human experience of the week past. Surely, that can't repeat for a third year in a row?
Until then, may your own nets appear exactly when logic insists they can’t - and may they be woven from liberated vacation days and the audible crackle of celebratory fireworks.
-
-
@ 6c05c73e:c4356f17
2025-06-14 16:31:49Isa Energia Brasil
Descrição da Empresa
A Isa Energia Brasil é uma das principais empresas do setor de transmissão de energia elétrica do Brasil. Anteriormente conhecida como ISA CTEEP (Companhia de Transmissão de Energia Elétrica Paulista), a companhia passou por um processo de rebranding em novembro de 2023 para refletir sua atuação em escala nacional, que se estende por 18 estados brasileiros.
- Papel no setor: Desempenha um papel crucial na infraestrutura energética do país, sendo responsável por transmitir aproximadamente 33% de toda a energia elétrica produzida no território nacional e 94% no estado de São Paulo.
- Controladora: A companhia é controlada pelo grupo colombiano ISA (Interconexión Eléctrica S.A.), um dos maiores conglomerados de transmissão de energia da América Latina, que detém uma participação majoritária em seu capital social.
- Vantagens: Essa conexão confere à Isa Energia Brasil um sólido respaldo técnico e financeiro, além de sinergias operacionais e de governança.
Visão Geral da Empresa
A Isa Energia Brasil (ISAE4) é uma das maiores e mais importantes empresas de transmissão de energia elétrica do Brasil. Em termos simples, seu principal negócio é "transportar" a energia em alta tensão das usinas geradoras até as redes de distribuição que a levam para cidades e indústrias.
- Analogia: Pense nela como a gestora das grandes "rodovias" da eletricidade do país.
Mercado que Atua
O mercado de atuação da Isa Energia Brasil (ISAE4) é o setor de transmissão de energia elétrica, um segmento estratégico, altamente regulado e com características muito particulares dentro da cadeia de energia do Brasil. Para entender o mercado da empresa, é preciso conhecer 4 pilares principais:
1. O Modelo de Concessões Públicas
- Funcionamento: A Isa Energia Brasil não opera em um mercado aberto e tradicional. Sua atuação é baseada em concessões de longo prazo (geralmente 30 anos), adquiridas por meio de leilões públicos organizados pelo Governo Federal, através da ANEEL (Agência Nacional de Energia Elétrica).
- Como funciona: Nos leilões, o governo define os projetos (novas linhas de transmissão e subestações a serem construídas). Vence a empresa que se propõe a construir e operar a infraestrutura pelo menor valor de receita anual.
- Barreiras de entrada: Este modelo cria altíssimas barreiras para novos concorrentes, pois exige enorme capacidade de investimento (capital intensivo), conhecimento técnico especializado e habilidade para vencer disputas acirradas nos leilões.
2. A Previsibilidade da Receita (RAP)
- Receita Anual Permitida (RAP): É a remuneração que a empresa tem direito a receber por disponibilizar suas linhas de transmissão em perfeitas condições de operação. O valor da RAP é definido no leilão e reajustado anualmente por um índice de inflação (geralmente o IPCA), o que protege a receita da desvalorização da moeda.
- Baixo risco: Como a receita é fixa e garantida por contrato, o risco operacional é muito baixo. A empresa recebe o valor integral desde que suas linhas e subestações estejam funcionando. Se houver falhas, ela pode ser penalizada com um desconto na receita, por isso a eficiência na operação e manutenção é fundamental.
3. Posicionamento Estratégico e Geográfico
- Dominância: É responsável por transportar aproximadamente 33% de toda a energia elétrica produzida no Brasil e impressionantes 94% da energia consumida no estado de São Paulo, o maior centro de carga do país.
- Capilaridade nacional: Embora sua origem seja paulista (antiga CTEEP), a empresa expandiu sua atuação e hoje possui ativos em 18 estados brasileiros, o que a posiciona como um player de relevância nacional.
- Principais concorrentes: Seus principais competidores no setor de transmissão são outras grandes empresas como a Eletrobras, TAESA e Alupar, que também disputam ativamente os leilões da ANEEL.
4. Vetores de Crescimento e Perspectivas
- Transição energética: O Brasil está aumentando massivamente sua capacidade de geração de energia renovável, especialmente eólica e solar. A maioria dessas novas usinas está localizada no Nordeste e no norte de Minas Gerais, longe dos grandes centros consumidores (Sudeste). Isso cria uma necessidade urgente de construir novas "autoestradas" de energia para escoar essa produção, garantindo uma demanda contínua por novos projetos de transmissão.
- Crescimento da demanda: O crescimento econômico e populacional do país, além da eletrificação da economia (ex.: carros elétricos), aumenta a necessidade geral de energia, exigindo uma rede de transmissão cada vez mais robusta e confiável.
Oportunidades que o Ativo Traz
As principais oportunidades que a empresa traz são:
- Alta previsibilidade de receita devido à Receita Anual Permitida (RAP).
- Expansão em investimentos de infraestrutura.
- Contratos de concessão renovados e com longa duração.
Isso tudo torna a empresa uma excelente pagadora de dividendos e JCP. No último anúncio da empresa, foram destinados R$2,36 por ação de juros sobre capital próprio, o que a torna um excelente ativo para o longo prazo.
Riscos
Por ser uma empresa que atua no setor de energia elétrica, ela assume alguns riscos que precisam ser monitorados de perto, tais como:
- Natureza (escassez de chuvas): Pode prejudicar a geração de energia e, como consequência, reduzir a transmissão de energia elétrica. Consulte aqui.
- Riscos regulatórios e governamentais (o principal): A empresa opera em um setor regulado pela ANEEL e sob concessões do governo.
- Financeiro: Para financiar seus projetos, a empresa precisa se endividar via debêntures, que são atreladas à Selic. Qualquer variação altera o financeiro da empresa.
- Dividendos: Pode ser uma faca de dois gumes, pois está previsto pagamentos muito maiores no futuro, o que pode retardar o crescimento da empresa devido ao pagamento excessivo.
- Risco operacional: Tudo que envolve intervenção humana pode ter falhas, mesmo que a empresa opere com alta eficiência hoje. Alguém pode “dormir no ponto”.
Tabela de Endividamento
A dívida bruta da companhia atingiu R$ 14.952,1 milhões no 1T25, aumento de R$ 1.678,3 milhões (+12,6%) em relação ao saldo final do 4T24. O aumento se deve, principalmente, à:
- 18ª emissão de debêntures no montante de R$ 1.400,0 milhões em março de 2025.
- 4º desembolso do BNDES em janeiro de 2025 com valor de R$ 82,1 milhões.
A companhia concluiu a 18ª emissão de debêntures no 1T25, levantando R$ 1.400,0 milhões em 2 séries: - Primeira série: R$ 500,0 milhões com custo de IPCA + 7,41% e vencimento em setembro de 2033. - Segunda série: R$ 900,0 milhões com custo de IPCA + 7,41% e vencimento em junho de 2033.
Catalisadores
Os pontos-chave que considero ao investir na empresa são:
- Parceria com a Taesa ampliada. Matéria aqui.
- Alta previsibilidade de receita devido à Receita Anual Permitida (RAP).
- Nova rodada de emissão de debêntures para ampliação de investimentos.
- Previsão de queda da Selic para 12,5% em 2026, o que tornaria “os débitos da empresa mais baratos”.
- Alta perspectiva de aumento no pagamento de dividendos e JCP ao longo dos próximos anos.
cotacao da isase4 lucro liquido isae4
FAQ
A ação ISAE4 é uma boa ação para investir?
Cada um deve fazer sua análise, mas acreditamos que é uma empresa sólida e com bons fundamentos.
Qual é o preço justo da ação ISAE4?
Não há uma base sólida para calcular o preço justo. Na nossa ótica, o ativo está subvalorizado.
Qual o DY da ISAE4?
Dividendo de 10,2% anunciado em 2021.
Como declarar o ISAE4?
A declaração do ISAE4 é dividida em três partes principais:
- Declaração da Posse das Ações (o que você tinha em carteira).
- Declaração dos Rendimentos Isentos (Dividendos).
- Declaração dos Rendimentos de Tributação Exclusiva (Juros Sobre Capital Próprio - JCP).
O documento mais importante para este processo é o Informe de Rendimentos, fornecido pelo banco escriturador das ações.
- Empresa: ISA ENERGIA BRASIL S.A.
- CNPJ: 02.998.611/0001-04
- Banco Escriturador: Itaú Corretora de Valores S.A.
- Como obter o informe: Acesse o Portal de Correspondências Digitais do Itaú para obter seu informe oficial. Ele contém todos os valores separados e prontos para a declaração.
Bio
Investir não precisa ser um bicho de sete cabeças! Na Threedolar, democratizamos o acesso ao mundo dos investimentos, oferecendo conteúdo claro e prático. Comece hoje mesmo a construir seu futuro financeiro!
Disclaimer
Lembre-se: este não é um conselho de investimento. Faça sua própria pesquisa antes de investir. Resultados passados não garantem lucros futuros. Cuide do seu dinheiro!
Referências
-
@ f0fd6902:a2fbaaab
2025-06-14 14:27:06https://stacker.news/items/1006238
-
@ c5896abe:43c99afb
2025-06-14 13:44:45写人的文字最难写,特别是在突然失去之后。
然而,人类始终有两种无法治愈的疾病:死亡与遗忘。于是,人类创造了文字。这种得以超越死亡的思想工具,从书写、雕版印刷、打字机和电传打字机,一路发展到今天的数字化半自动打字机——语言模型——写字,这样看似简单的行为,却变得日渐艰涩,尤其是在经历了 The Big Blockade 那三年后。
这并不是说,我也像很多人那样遭遇了 Long-COVID。只是,在父亲去世等一系列事情之后,我才真正明白:写人的文字最难写,特别是在突然失去之后。当你突然发现,自己最熟悉的人,在不知不觉中变成了生命中的一块空白,那个曾经激扬文字、粪土万户侯的少年,便也永远离开了。于是,我应邀前往了自己的瓦尔登湖——工作、读书,几乎停止了所有的社交媒体交流。直到今年早些时候,子龙对我说了一句:“公众号停了太可惜了”。我这才想到,要不要讲述一些人的故事,当然,不仅仅是那些已经逝去的。只是在这个繁华时代,那个小念头就被我暂时搁置,忙着“寻桥”去了。直到这个六一,中国摩托车商会的微信公众号,推送了常务副会长李彬逝世的消息。
我与李会长交流不多,只知道他一直在努力推动各个城市解除对摩托车的地方性禁限规定,看起来就像推石头的西西弗斯。近几年我的工作与他有几分相似。在理解了“人生就是不断的妥协”这样看似借口的冰冷现实之后,秉持着“上帝和凯撒要分清”的信条,我偶尔的富余精力,也投在了国际互联网上的几个中文平台上。直到昨天晚上,编辑某些内容时,心头突然一动,顺手搜索,才发现了 Bernt Spiegel 教授的线上讣告。想来,老师也是在那段时间,突然发来一封电邮联络,却又没说什么具体内容。于是,我决定开始写下一些文字。
教授的一生,大概可以用“人、市场和机器”来概括。身为市场心理学创始人、摩托车专家和小说家,他创建了 Fachinstitut für Werbewissenschaftliche Untersuchungen,并在哥廷根大学执教。著名的利基市场理论,正是他在20世纪60年代初提出的。这一理论最成功的案例,就是帮助了濒临破产的 BMW 起死回生,并重新快速增长。从1981年到2000年,他一直担任 MOTORRAD 杂志“完美培训课程”的高级讲师,特别活跃在纽伯格林赛道——直至72岁高龄,他仍能驾驶 Honda CBR 900 RR,在北环赛道跑进9分钟之内。从13岁——那是1939年——他瞒着父母买了第一辆摩托车开始,18岁就考取了飞行执照。战后不久,他骑上了一辆 BMW R 51/2,之后的人生,就在飞机和摩托车这两类机械上交织。人类如何与操作的机器(无论是飞机还是摩托车)相协调的心理学方法,也成了他在学术上开拓的处女地之一:这是心理学与自然科学之间的一个新边疆。尽管没有像某些专家那样著作等身,教授的那本《摩托车的上半部》成为了从欧洲到北美,所有摩托车驾驶人教育的经典著作,如同物理学中的牛顿《原理》。这位对“人-机矩阵”有着深刻洞见的老先生,在94岁高龄时,还出版了一本小说《Milchbrüder, beide》,作为对德国人和他自己过去经历的某种回应。
在那本著作的附文《The Fascination of Motorcycling》(摩托车的魅力)之中,教授将摩托车骑行的魅力,喻为“一个完整的星座”。如同多年前另一位日本的前辈,将摩托车的机械结构比作“一个宇宙”。这一代摩托车人,都是战争的亲历者,也是现代摩托车进化的见证者。正是在这种孕育出了丰富机械文化的社会土壤里,才滋养了富足而不仅是富裕的人类文明。
-
@ 8194da31:0f3badf3
2025-06-14 13:39:14I got fired at 29.
Best thing that ever happened to me.
Everyone told me to follow the safe path.
"Go to college."
"Get a secure job."
"Don't take risks."
So I became a physical therapist.
Safe. Boring. Soul-crushing.
Then COVID hit and changed everything.
I became a wheelchair technician.
One of the only jobs you could do outside while everyone was locked indoors.
Driving through empty cities while the world hid.
Listening to podcasts to stay sane.
That's when I discovered Michael Saylor talking about Bitcoin in 2022.
Digital freedom.
Money nobody could control.
Escape from the broken system.
I was hooked.
So I landed a corporate job to stack more Bitcoin.
The strategy worked.
I bought more Bitcoin in a bear market.
But I sacrificed my physical and mental health.
Ten hours of driving daily.
Weight piling on.
Happiness draining out.
They fired me after 10 months.
Left me with nothing but a mortgage to pay.
Terrifying but liberating.
A friend from the gym threw me a lifeline.
"Want to train people?"
I grabbed it.
While building others' bodies, I built my future:
• Kept writing online • Kept studying Bitcoin • Kept building my dream
Now I help Bitcoiners grow their influence and personal brand.
So they can taste freedom too.
Found an amazing girlfriend who believes in the vision.
The mortgage doesn't scare me anymore.
Here's what I learned:
Society's safe path leads to society's prison.
Your risky path leads to your freedom.
Stop asking permission to live differently.
Start building the life that makes you excited to wake up.
The world needs what you're hiding.
-
@ 3294129b:2a7654fa
2025-06-14 12:50:05📍 Satoshi House, Dubai 🗓️ June 21st, 2025 – 7:00 PM to 11:30 PM
⸻
Let’s Talk Bitcoin. Let’s Talk Freedom.
Bitcoin Minds is back and this time, we’re diving into the frontier of decentralized communication. No pizza this round, just powerful conversations, real connections, and ideas that matter.
This edition is all about Nostr, the open protocol that’s transforming how we connect, share, and build, side by side with Bitcoin.
Whether you’re a builder, a Bitcoiner, or just curious, this is your night to learn, share, and spark what’s next.
⸻
🎤 What to Expect:
💬 Lightning-powered mini-talks by builders, thinkers, and Nostr pioneers 🧠 Open discussions & community Q&A 🤝 Real networking with freedom-first minds ⚡ Hands-on insights into how Nostr and Lightning are working together today 🍻 Fully-stocked bar, so you can enjoy a variety of cocktails and drinks throughout the evening.
⸻
🔎 Topics we’ll explore: • Why Nostr matters in a Bitcoin world • Building apps on Nostr: what’s possible now? • Identity & reputation without KYC • Zaps, tips & micropayments with Lightning • Bitcoin + Nostr vs surveillance & censorship • Real-world adoption: challenges & use cases • Your favorite Nostr clients and how you use them
⸻
🎟️ Entry:
FREE — but RSVP is required 🔐 Limited spots, unlimited signal.
⸻
Bitcoin Minds: Nostr Edition
-
@ d5ca7093:549ad1ec
2025-06-14 12:39:55In a world flooded with information and noise, it’s easy to feel like your brain is constantly switching channels.
One minute you’re reading a technical spec, the next you’re researching vintage Japanese vending machines,
then somehow deep in a Telegram rabbit hole about solar-powered mesh networks.Sound familiar?
For some of us, this isn’t just a personality quirk—it’s our baseline.
We don’t think in straight lines.
Ideas come in bursts. Focus comes in waves.
We thrive on novelty, but routine feels like quicksand.In a society built for rigid 9-to-5 brains, that kind of mental wiring often gets misunderstood.
But here’s the truth:If you learn to structure the chaos, it becomes a superpower.
What most people call distraction is actually high bandwidth.
It’s fast processing mixed with open curiosity.
But without systems in place, that power leaks.We chase every thought, every notification, every dopamine hit.
That’s why building your own structure is key—not to control your mind,
but to support it.- Custom workflows
- Intentional routines
- Clear priorities
These turn scatter into momentum.
In the Bitcoin and Nostr world, this mindset fits naturally.
We’re already breaking free from one-size-fits-all models.
We self-host. We fork code. We build for edge cases.Why not apply the same philosophy to how we work and think?
You don’t need corporate-style productivity hacks.
You can build your own.
Ones that work with your brain, not against it.
Use your site as your digital command center.
Set up tools that work offline.
Use local-first apps.
Block out time for deep work.
Make room for curiosity.Once you start adding scaffolding to your natural flow, something wild happens:
You move faster, think clearer, and build better.
The minds that don’t “fit in” are often the ones pushing things forward.
That’s not a bug—it’s a feature.
But features need configuration.Self-sovereignty isn’t just about running a node or holding your keys.
It’s about designing a life and workflow that fits you—especially
when your brain runs on a different operating system.
So if your mind doesn’t follow the rules, maybe it’s because
you were built to make new ones.Structure isn’t the enemy.
It’s the multiplier.
Follow my thoughts and work at:
🌐 https://taidigital.xyz
🔑@taidigital.xyz
on Nostr -
@ 7f6db517:a4931eda
2025-06-14 12:02:45Influencers would have you believe there is an ongoing binance bank run but bitcoin wallet data says otherwise.
- binance wallets are near all time highs
- bitfinex wallets are also trending up
- gemini and coinbase are being hit with massive withdrawals thoughYou should not trust custodians, they can rug you without warning. It is incredibly important you learn how to hold bitcoin yourself, but also consider not blindly trusting influencers with a ref link to shill you.
If you found this post helpful support my work with bitcoin.
-
@ 2cde0e02:180a96b9
2025-06-14 11:41:31watercolor pencils, water brush & pen
https://stacker.news/items/1006159
-
@ f0fd6902:a2fbaaab
2025-06-14 09:53:11As much as they look like teddy bears, they are not bear cousins. These marsupials are more closely related to wombats. Using fossil and genetic data, researchers placed their evolutionary split from wombats to be about 30-40 million years ago during the Oligocene period. Both of these animals belong to the suborder Vombatiformes. Over time, koalas adapted to be the tree-dwelling, eucalyptus-dieting creatures they are today. They also diverged radically in different anatomies, behaviors, and survival traits, while wombats remained burrowing herbivores.
https://stacker.news/items/1006112
-
@ 7f6db517:a4931eda
2025-06-14 10:01:39What is KYC/AML?
- The acronym stands for Know Your Customer / Anti Money Laundering.
- In practice it stands for the surveillance measures companies are often compelled to take against their customers by financial regulators.
- Methods differ but often include: Passport Scans, Driver License Uploads, Social Security Numbers, Home Address, Phone Number, Face Scans.
- Bitcoin companies will also store all withdrawal and deposit addresses which can then be used to track bitcoin transactions on the bitcoin block chain.
- This data is then stored and shared. Regulations often require companies to hold this information for a set number of years but in practice users should assume this data will be held indefinitely. Data is often stored insecurely, which results in frequent hacks and leaks.
- KYC/AML data collection puts all honest users at risk of theft, extortion, and persecution while being ineffective at stopping crime. Criminals often use counterfeit, bought, or stolen credentials to get around the requirements. Criminals can buy "verified" accounts for as little as $200. Furthermore, billions of people are excluded from financial services as a result of KYC/AML requirements.
During the early days of bitcoin most services did not require this sensitive user data, but as adoption increased so did the surveillance measures. At this point, most large bitcoin companies are collecting and storing massive lists of bitcoiners, our sensitive personal information, and our transaction history.
Lists of Bitcoiners
KYC/AML policies are a direct attack on bitcoiners. Lists of bitcoiners and our transaction history will inevitably be used against us.
Once you are on a list with your bitcoin transaction history that record will always exist. Generally speaking, tracking bitcoin is based on probability analysis of ownership change. Surveillance firms use various heuristics to determine if you are sending bitcoin to yourself or if ownership is actually changing hands. You can obtain better privacy going forward by using collaborative transactions such as coinjoin to break this probability analysis.
Fortunately, you can buy bitcoin without providing intimate personal information. Tools such as peach, hodlhodl, robosats, azteco and bisq help; mining is also a solid option: anyone can plug a miner into power and internet and earn bitcoin by mining privately.
You can also earn bitcoin by providing goods and/or services that can be purchased with bitcoin. Long term, circular economies will mitigate this threat: most people will not buy bitcoin - they will earn bitcoin - most people will not sell bitcoin - they will spend bitcoin.
There is no such thing as KYC or No KYC bitcoin, there are bitcoiners on lists and those that are not on lists.
If you found this post helpful support my work with bitcoin.
-
@ 04c3c1a5:a94cf83d
2025-06-14 18:36:00button #2 nj
-
@ 84b0c46a:417782f5
2025-06-14 04:29:02やること
- [ ] るみ 初期のわかりにくごちゃ設定を何とかする
- [x] るみ シーンおんのやつみなおしてみる
- [ ] やってることまとめるやつ
- [ ] びうあ publishのリレー状態チェック
- [x] るみ 10002並べ替え
- [ ] るみ 10030の並べ替え?
- [ ] カスタム絵文字のやつ
- [x] まきもの naddrを渡して編集画面開く
- [x] るみ naddrの更新ボタン
- [ ] ニーサ
- [ ] クレカのポイント使い切って、他のクレカ契約できたら、今のクレカ解約する(アマゾンかなんか)
-
[x] るみ 書き込むたびにチェックマークが増えてくよ
nostr:nevent1qvzqqqqqqypzpp9sc34tdxdvxh4jeg5xgu9ctcypmvsg0n00vwfjydkrjaqh0qh4qyxhwumn8ghj77tpvf6jumt9qys8wumn8ghj7un9d3shjtt2wqhxummnw3ezuamfwfjkgmn9wshx5uqpz9mhxue69uhkuenjv4kxz7fwv9c8qqgnwaen5te0xyerwt3s9cczuvf6xsurvwgpzdmhxue69uhhwmm59ehx7um5wghxuet5qythwumn8ghj7mn0wd68ytnfw36xzmndduhx6etwqywhwumn8ghj7un9d3shjtnwdaehgu3wwa5hyetydejhgtn2wqqzpzatskhfw95aj6g0tex2c5wy0ydlrnts8lk7du60t906d23p7ch4whv3xm
-
[x] るみ 画像表示させる前にワンクッションメニュー
- [x] るみ ステータスのカスタム絵文字、挿入と変換
- [x] るみ 30023のembedが常にワンクッションになってる見→たぶんきのせい
- [ ] るみ ブロックリレー10006を読む
- [ ] るみ poll 期限後の投票は無視する
- [x] るみ 引用のaをqに
- [ ] スマホ📱 au解約/IIJ契約
- [ ] 掃除
デイリー
- うめちぇっく
- 薬飲む
- 生姜接種
-
@ b1ddb4d7:471244e7
2025-06-14 09:01:06Square, the payments platform operated by Block (founded by Jack Dorsey), is reporting 9.7% bitcoin yield on its bitcoin holdings by running a Lightning Network node.
The announcement was made by Miles Suter, Bitcoin product lead at Block, during the Bitcoin 2025 conference in Las Vegas. Suter explained that Square is earning “real bitcoin from our holdings” by efficiently routing payments across the Lightning Network.
Square’s yield comes from its role as a Lightning service provider, a business it launched two years ago to boost liquidity and efficiency on the Lightning Network. According to Lightning Labs’ Ryan Gentry, Square’s 9% yield could translate to roughly $1 million in annual revenue.
The Lightning Network, a Bitcoin layer-2 protocol, has long been promoted as a solution to Bitcoin’s scalability and transaction speed issues. It enables micropayments and off-chain transactions, reducing congestion on the main blockchain. However, the network faces challenges, including the need for inbound liquidity—users must lock up BTC to receive BTC—potentially limiting participation by smaller nodes and raising concerns about decentralization.
Despite these hurdles, Square remains committed to advancing Bitcoin payments via Lightning. Suter revealed that 25% of Square’s outbound bitcoin transactions now use the Lightning Network. The company is actively testing Lightning-based payments at the Bitcoin 2025 event and plans to roll out the service to all eligible Square merchants by 2026.
Suter emphasized the transformative potential of Lightning:
“When you enable real payments by making them faster and more convenient, the network becomes stronger, smarter, and more beneficial. So if you’re questioning whether bitcoin is merely an asset, the response is no. It has already evolved into both an asset and a protocol, and now Block is spearheading the initiative to transform it into the world’s premier payment system.”
Square’s ongoing investment in Lightning signals its belief in Bitcoin’s future not just as a store of value, but as a global payments protocol.
-
@ b1ddb4d7:471244e7
2025-06-13 13:01:31Paris, France – June 6, 2025 – Flash, the easiest Bitcoin payment gateway for businesses, just announced a new partnership with the Bitcoin Only Brewery, marking the first-ever beverage company to leverage Flash for seamless Bitcoin payments.
Bitcoin Buys Beer Thanks to Flash!
As Co-Founder of Flash, it's not every day we get to toast to a truly refreshing milestone.
Okay, jokes aside.
We're super buzzed to see our friends at @Drink_B0B
Bitcoin Only Brewery using Flash to power their online sales!The first… pic.twitter.com/G7TWhy50pX
— Pierre Corbin (@CierrePorbin) June 3, 2025
Flash enables Bitcoin Only Brewery to offer its “BOB” beer with, no-KYC (Know Your Customer) delivery across Europe, priced at 19,500 sats (~$18) for the 4-pack – shipping included.
The cans feature colorful Bitcoin artwork while the contents promise a hazy pale ale: “Each 33cl can contains a smooth, creamy mouthfeel, hazy appearance and refreshing Pale Ale at 5% ABV,” reads the product description.
Pierre Corbin, Co-Founder of Flash, commented: “Currently, bitcoin is used more as a store of value but usage for payments is picking up. Thanks to new innovation on Lightning, bitcoin is ready to go mainstream for e-commerce sales.”
Flash, launched its 2.0 version in March 2025 with the goal to provide the easiest Bitcoin payment gateway for businesses worldwide. The platform is non-custodial and can enable both digital and physical shops to accept Bitcoin by connecting their own wallets to Flash.
By leveraging the scalability of the Lightning Network, Flash ensures instant, low-cost transactions, addressing on-chain Bitcoin bottlenecks like high fees and long wait times.
Bitcoin payment usage is growing thanks to Lightning
In May, fast-food chain Steak ‘N Shake went viral for integrating bitcoin at their restaurants around the world. In the same month, the bitcoin2025 conference in Las Vegas set a new world record with 4,000 Lightning payments in one day.
According to a report by River Intelligence, public Lightning payment volume surged by 266% from August 2023 to August 2024. This growth is also reflected in the overall accessibility of lighting infrastructure for consumers. According to Lightning Service Provider Breez, over 650 Million users now have access to the Lightning Network through apps like CashApp, Kraken or Strike.
Bitcoin Only Brewery’s adoption of Flash reflects the growing trend of businesses integrating Bitcoin payments to cater to a global, privacy-conscious customer base. By offering no-KYC delivery across Europe, the brewery aligns with the ethos of decentralization and financial sovereignty, appealing to the increasing number of consumers and businesses embracing Bitcoin as a legitimate payment method.
“Flash is committed to driving innovation in the Bitcoin ecosystem,” Corbin added. “We’re building a future where businesses of all sizes can seamlessly integrate Bitcoin payments, unlocking new opportunities in the global market. It’s never been easier to start selling in bitcoin and we invite retailers globally to join us in this revolution.”
For businesses interested in adopting Bitcoin payments, Flash offers a straightforward onboarding process, low fees, and robust support for both digital and physical goods. To learn more, visit paywithflash.com.
About Flash
Flash is the easiest Bitcoin payment gateway for businesses to accept payments. Supporting both digital and physical enterprises, Flash leverages the Lightning Network to enable fast, low-cost Bitcoin transactions. Launched in its 2.0 version in March 2025, Flash is at the forefront of driving Bitcoin adoption in e-commerce.
About Bitcoin Only Brewery
Bitcoin Only Brewery (@Drink_B0B) is a pioneering beverage company dedicated to the Bitcoin ethos, offering high-quality beers payable exclusively in Bitcoin. With a commitment to personal privacy, the brewery delivers across Europe with no-KYC requirements.
Media Contact:
Pierre Corbin
Co-Founder, Flash
Email: press@paywithflash.com
Website: paywithflash.comPhotos paywithflash.com/about/pressHow Flash Enables Interoperable, Self-Custodial Bitcoin Commerce
-
@ da8b7de1:c0164aee
2025-06-14 04:02:17Az IAEA Kormányzótanácsának Ülése
A Nemzetközi Atomenergia-ügynökség (IAEA) 2025. június 9. és 13. között tartotta szokásos Kormányzótanácsi ülését bécsi központjában. Ez a magas szintű esemény a tagállamok képviselőit hozta össze, hogy megvitassák a nukleáris biztonság, védelem és technológia legújabb fejleményeit. Rafael Mariano Grossi, az IAEA főigazgatója a találkozó elején sajtótájékoztatót tartott, amelyen kiemelte az ügynökség folyamatos erőfeszítéseit a biztonságos és védett nukleáris energia világszintű előmozdításában [iaea.org].
A Világbank Nukleáris Energiát Támogató Fordulata
Mérföldkőnek számító döntésként a Világbank 2025. június 10-én bejelentette, hogy megkezdi új nukleáris energia projektek – köztük kis moduláris reaktorok (SMR-ek) és meglévő erőművek élettartam-hosszabbításának – finanszírozását. Ez a döntés a Bank régóta fennálló, nukleáris energia finanszírozását ellenző politikájának felülvizsgálatát jelenti. Ajay Banga, a Világbank elnöke elmondta, hogy a változás a nukleáris energia globális dekarbonizációban és energiabiztonságban betöltött növekvő szerepének elismerését tükrözi [ans.org].
Globális Támogatás a Nukleáris Kapacitás Megháromszorozásáért
A bakui COP29 ENSZ klímakonferencián újabb hat ország – El Salvador, Kazahsztán, Kenya, Koszovó, Nigéria és Törökország – csatlakozott ahhoz a kezdeményezéshez, amely célul tűzte ki a globális nukleáris kapacitás megháromszorozását 2050-ig. Ez a mozgalom része annak a szélesebb nemzetközi törekvésnek, amely a nukleáris energia gyorsabb elterjesztését szorgalmazza a tiszta energiára való átmenet kulcselemeként. Az Egyesült Államok szintén bemutatta tervét 200 GW nukleáris kapacitás 2050-ig történő telepítésére, ezzel is megerősítve elkötelezettségét a nukleáris energia mellett a klíma- és energiakihívások kezelésében [world-nuclear-news.org].
Ipari és Technológiai Fejlemények
- Az American Bureau of Shipping jelentést tett közzé az előrehaladott nukleáris technológia tengeri alkalmazásának lehetőségeiről, különös tekintettel a kis moduláris reaktorokra LNG-szállító hajókon.
- Az Egyesült Királyság Nemzeti Energiarendszer-üzemeltetője hangsúlyozta a nukleáris energia fontosságát a 2030-ra megvalósítandó tiszta energiatermelési rendszer elérésében, beleértve a meglévő erőművek élettartam-hosszabbítását és új reaktorok építését [world-nuclear-news.org].
Források: - world-nuclear-news.org - iaea.org - ans.org
-
@ dd664d5e:5633d319
2025-06-14 07:24:03The importance of being lindy
I've been thinking about what Vitor said about #Amethyst living on extended time. And thinking. And doing a bit more thinking...
It's a valid point. Why does Amethyst (or, analog, #Damus) still exist? Why is it as popular as it is? Shouldn't they be quickly washed-away by power-funded corporate offerings or highly-polished, blackbox-coded apps?
Because a lot of people trust them to read the code, that's why. The same way that they trust Michael to read it and they trust me to test it. And, perhaps more importantly, they trust us to not deliver corrupted code. Intentionally, or inadvertently.
The developer's main job will not be coding the commit, it will be reviewing and approving the PR.
As AI -- which all developers now use, to some extent, if they are planning on remaining in the business -- becomes more efficient and effective at writing the code, the effort shifts to evaluating and curating what it writes. That makes software code a commodity, and commodities are rated according to brand.
Most of us don't want to make our own shampoo, for instance. Rather, we go to the store and select the brand that we're used to. We have learned, over the years, that this brand won't kill us and does the job we expect it to do. Offloading the decision of Which shampoo? to a brand is worth some of our time and money, which is why strong, reliable brands can charge a premium and are difficult to dislodge.
Even people, like myself, who can read the code from many common programming languages, do not have the time, energy, or interest to read through thousands of lines of Kotlin, Golang, or Typescript or -- God forbid -- C++, from repos we are not actively working on. And asking AI to analyze the code for you leaves you trusting the AI to have a conscience and be virtuous, and may you have fun with that.
The software is no longer the brand. The feature set alone isn't enough. And the manner in which it is written, or the tools it was written with, are largely irrelevant. The thing that matters most is Who approved this version?
The Era of Software Judges has arrived
And that has always been the thing that mattered most, really.
That's why software inertia is a real thing and that's why it's going to still be worth it to train up junior devs. Those devs will be trained up to be moral actors, specializing in reviewing and testing code and confirming its adherance to the project's ethical standards. Because those standards aren't universal; they're nuanced and edge cases will need to be carefully weighed and judged and evaluated and analysed. It will not be enough to add Don't be evil. to the command prompt and call it a day.
So, we shall need judges and advocates, and we must train them up, in the way they shall go.
-
@ 04c3c1a5:a94cf83d
2025-06-14 18:33:00schedule #1
-
@ edeb837b:ac664163
2025-06-13 21:15:05On June 10th, 2025, four members of the NVSTly team traveled to New York City to attend the 2025 American Business Awards® ceremony, held at the iconic Marriott Marquis in Times Square. It was an unforgettable night as we accepted the Gold Stevie® Award for Tech Startup of the Year—this time, in person.
Meow (left), rich (center), MartyOooit (right)
Representing NVSTly at the event were:
- Rich, CEO & Founder
- Meow, CTO, Lead Developer, & Co-Founder
- MartyOooit, Investor
- Noob, Market Analyst (not shown in photos)
MartyOooit (left), rich (center), Meow (right)
While we shared the exciting news back in April when the winners were announced, being there in person alongside other winners—including eBay, AT&T, T-Mobile, HP Inc., and Fidelity Investments—made the achievement feel even more surreal. To be honored alongside billion-dollar industry leaders was a proud and humbling moment for our startup and a huge milestone in NVSTly’s journey.
🎤 Team Interview at the Event
During the event, our team was interviewed about the win. When asked:
“What does winning a Stevie Award mean for your organization?”
“How will winning a Stevie Award help your organization?”Here’s what we had to say:
📺 Watch the video
A Big Win for Retail Traders
NVSTly was awarded Gold for Tech Startup of the Year in recognition of our work building a powerful, free social investing platform that empowers retail traders with transparency, analytics, and community-driven tools.
Unlike traditional finance platforms, NVSTly gives users the ability to:
- Share and track trades in real time
- Follow and receive alerts from top traders
- Compete on global leaderboards
- Access deep stats like win rate, average return, and more
Whether you're a beginner or experienced trader, NVSTly gives you the insights and tools typically reserved for hedge funds—but in a free, social format built for the modern investor.
Continued Recognition and Momentum
This award adds to a growing list of recognition for NVSTly:
- 🏆 People’s Choice Winner at the 2024 Benzinga Fintech Awards
- 🔁 Nominated again for Best Social Investing Product in the 2025 Benzinga Fintech Awards
- 🌟 Team members JustCoreGames and Lunaster are nominated for Employee of the Year (Information Technology – Social Media) in the 2025 Stevie® Awards for Technology Excellence
We’re beyond proud of what our small but mighty team has accomplished—and we’re just getting started. 🚀
Thanks to the Stevie Awards for an incredible night in New York, and to our community of 50,000+ traders who’ve helped shape NVSTly into what it is today.
This win is yours, too.Stay tuned—more big things are coming.
— Team NVSTly
The event brought together some of the most respected names in tech, finance, and business. -
@ 8173f6e1:e488ac0f
2025-06-13 19:18:56{"voteEventId":"083ae248828a454a7d01b7de12f99ce90297672e0457ec8147bd7cfabd14f044","txHash":"752d3894c5657758d7b9754da3dc38db61662acb5f94c3dcb38077fc33f1bd7e","amount":"1000000000000000000","fee":"1000000000000000000","type":"token-gated-vote-proof"}
-
@ 044da344:073a8a0e
2025-06-14 08:56:18Meine Karriere als Auftragsforscher neigt sich ihrem Ende entgegen. In zwei Wochen ist der Forschungsverbund „Das mediale Erbe der DDR“ Geschichte. Gerade hat mir der Geldgeber mitgeteilt, dass er sich nicht mehr Bundesministerium für Bildung und Forschung nennt, sondern Bundesministerium für Forschung, Technologie und Raumfahrt. BMFTR statt BMBF. Bitte, sehr geehrte Damen und Herren, verwenden Sie ab sofort nur noch das neue Logo. Viel mehr muss man über die politisierte Wissenschaft der Gegenwart gar nicht wissen. Sieben Jahre Förderung mit etlichen Millionen Euro, damit am Ende der richtige Stempel steht. Es soll mir keiner erzählen, dass das den Nachwuchs nicht formt.
Ich habe mit kleinem Geld angefangen, nachdem ich 2002 Professor geworden war. An der LMU in München hatte ich eigentlich alles, was ich brauchte. Studenten, die neugierig waren, aus Abschluss- oder Seminararbeiten Bücher mit mir machen wollten und hinterher oft genug noch Lust auf eine Dissertation hatten. Aufträge ergaben sich eher zufällig aus dem, was wir ohnehin machten. Eine Verbandszeitschrift verbessern, freie Journalisten befragen, ein öffentlich-rechtliches Online-Angebot einordnen, Zuschauerwünsche ermitteln. Ich habe dabei schnell gelernt, dass sich das nicht lohnt. Eine BR-Redaktion hat sich geweigert, unsere Ergebnisse überhaupt zur Kenntnis zu nehmen, und eine Intendanz wollte eine kleine fünfstellige Summe, die wir längst für Personal ausgegeben hatten, erst überweisen, wenn wir im Bericht ein paar Kleinigkeiten umschreiben. Ich dachte: Lass die anderen den Euros nachlaufen. Ich mache einfach mein Ding.
Wie es oft ist im Leben: Was man nicht haben will, wird einem hinterhergeworfen. Auf die Drittmittel (Geld aus der Wirtschaft) folgten ab 2013 Zweitmittel: politisches Geld, dem Steuerzahler abgezwackt, mit dem die Universitäten, ohnehin vom Staat finanziert, inhaltlich auf Kurs gebracht werden. Ich war Sprecher in drei interdisziplinären Forschungsverbünden. ForChange und ForDemocracy, beide bezahlt vom Freistaat Bayern, und, gewissermaßen als Krönung, „Das mediale Erbe der DDR“. Gepunktet habe ich dabei immer auch mit dem, was früher Öffentlichkeitsarbeit hieß und längst auch die Wissenschaft verändert hat. In Kurzform: Reichweite ist mindestens so wichtig wie Tiefe. Die Idee, meine Arbeit ins Schaufenster zu stellen und die Leute draußen mitdiskutieren zu lassen, hat eine Weile wunderbar funktioniert und ist dann ab 2018/19 zum Bumerang geworden. Aber das ist eine andere Geschichte.
Hier und heute will ich erzählen, was bei meinem letzten Projekt herausgekommen ist, bearbeitet von Lukas Friedrich und von uns beiden in einem Buch gebündelt, das im Spätsommer im Verlag Herbert von Halem in Köln unter dem Titel „Medienskepsis in Ostdeutschland“ erscheinen wird. Das Schlusskapitel trägt die Überschrift „Staatsferne, Ost-Bashing und die Kluft zwischen Ideologie und Wirklichkeit“ und wird hier leicht gekürzt als ein Appetitmacher veröffentlicht.
Ein Fazit zu den Wurzeln der „Medienskepsis Ost“
Wieviel DDR steckt in der Unzufriedenheit mit den Leitmedien, die im Osten Deutschlands spätestens 2014 mit Pegida auch öffentlich sichtbar wurde und seither ein Dauerbrenner ist in den akademischen und öffentlichen Debatten, die sich um die Glaubwürdigkeit des Journalismus drehen? Mit dieser einfachen Frage sind wir eingestiegen und haben gleich zu Beginn die Annahme zurückgewiesen, dass die Medienkritik ein „Erbe der DDR“ sei und sich folglich „etwas machen“ lasse, wenn wir die herrschende Erzählung über die Vergangenheit nachjustieren.
Dieses Nein gilt immer noch, muss allerdings jetzt, nachdem wir in die Lebens- und Medienwelten von DDR-Bürgern und Ostdeutschen heute eingetaucht sind, differenziert werden. Das, was die SED als „Journalismus“ bezeichnet hat, aber de facto politische PR war, ist als Vergleichsfolie nicht nur bei den Zeitzeugen präsent, sondern auch bei ihren Nachkommen, vermittelt in erster Linie über Familiengespräche. Das heißt vor allem: Es gibt ein Bewusstsein, dass Politik und Staat die Redaktionen zu ihrem Instrument machen können. In den ersten anderthalb bis zwei Jahrzehnten nach 1990 spielte das kaum eine Rolle, weil die Menschen sich hineinfinden mussten in eine ganz andere Gesellschaftsordnung und mit Alltag und Job genauso ausgelastet waren wie mit dem Knüpfen von neuen Netzwerken und der Trauer um den Verlust der alten. „Ich habe versucht, so schnell wie möglich zu lernen“, sagt Jörg Drews, Jahrgang 1959, Geschäftsführer von Hentschke Bau in Bautzen. Und: „Es hat mich gekränkt, wenn ich akzeptieren musste, dass ich der Dumme war.“ Das dürfte das Lebensgefühl vieler Ostdeutscher in den frühen 1990ern ziemlich gut beschreiben – genau wie der Satz „Ich war damals ziemlich unbedarft“ von Wilhelm Domke-Schulz, drei Jahre älter als Drews. Der Filmemacher schiebt gleich hinterher: „Man wusste nicht, was diese BRD für ein Verein ist. Man war ja nie dort gewesen. Ich war mir sicher, dass ein paar Sachen bleiben werden. Nie wieder Faschismus, nie wieder Krieg. Und ansonsten kann man sich überraschen lassen. Die Überraschung sah dann anders aus. Die DDR hat keine Kriege geführt. Die BRD schon. Und mit dem Faschismus: Da müsste ich jetzt ein bisschen ausholen.“
Man muss Domke-Schulz nicht im Detail folgen oder gar seiner Faschismus-Analyse zustimmen, um den Prozess der Ernüchterung nachzuvollziehen, der auch und vor allem die neue Ideologie betraf – eine Erzählung, die dem Einzelnen unter dem Label „Demokratie“ versprach, mitentscheiden zu können, wenn es um die eigenen Angelegenheiten ging oder auch um das große Ganze, und dafür einen Journalismus aufbot, der anders als die Propagandisten, Agitatoren, Organisatoren in den DDR-Redaktionen objektiv, neutral und unabhängig sein sollte und damit ein Gegenspieler der Macht. Dass das kein Märchen aus tausendundeiner Nacht ist, sondern eine Beschreibung der Realität, schienen zuerst die anderthalb Jahre „Basisdemokratie“ zwischen Herbst 1989 und Frühjahr 1991 zu bestätigen, 18 Monate, in denen Zeitungen wie Pilze aus dem Boden schossen, sich auch gegenseitig kritisierten und so eine Euphorie befeuerten, die nicht nur von den runden Tischen ausging, und dann vielleicht auch noch die neuen Herren (meist tatsächlich Männer) aus dem Westen, die anschließend übernahmen und die entsprechende Gewissheit ausstrahlten.
Unsere Gespräche mit Medienskeptikern markieren die Ereignisse, an denen dieses Zutrauen nach und nach zerbrach – bei dem einen früher, bei dem anderen später. Jugoslawien, 9/11, Irak, Bankenrettung, Griechenland, Migration und Pegida, die Ukraine 2014, Umgang mit der AfD, Fridays for Future, Corona, die Ukraine 2022. Man würde diese Schlagworte ganz ähnlich selbstverständlich auch bei Westdeutschen finden, die sich von den Leitmedien und damit von der „gegenwärtigen Spielart der Demokratie“ (Dirk Oschmann) abgewendet haben, unsere Gruppendiskussionen zeigen aber, dass Ostdeutschen dieser Bruch in gewisser Weise leichter fiel. Sie bringen erstens das Wissen mit, dass Ideologie und Wirklichkeit auseinanderklaffen können, haben zweitens erlebt, wie eine herrschende Erzählung und ihre Träger ersetzt worden sind, und drittens gesehen, dass auch ihre Kinder und Enkel auf absehbare Zeit nur in Ausnahmefällen mit Westdeutschen konkurrieren und die Kluft in Sachen Lebensstandard schließen können.
Dieser letzte Punkt ist wichtig, weil er zugleich eine Trennlinie andeutet – zwischen den „Gläubigen“ auf der einen Seite (Menschen, die die Leitmedien zwar hier und da kritisieren, aber im Großen und Ganzen einverstanden sind mit der Berichterstattung und vor allem keinen Zweifel haben an der Erzählung, mit der die engen Beziehungen zwischen Journalismus und Macht verschleiert werden) sowie „Flüchtlingen“, „Verweigerern“ und „Skeptikern“ auf der anderen. Unsere Gruppendiskussionen zeigen: Wer von Steuergeldern abhängt (etwa durch einen Job im öffentlichen Dienst und ähnlichen Bereichen) oder auf andere Weise von der herrschenden Erzählung profitiert (über Vermögen, Besitz, Angehörige), ist eher bereit, sich auf die herrschende Ideologie einzulassen und manchmal auch die offen zu bekämpfen, die Fragen stellen oder nur auf Widersprüche hinweisen – vor allem dann, wenn die eigene Karriere nicht verlangt hat, sich mit den Kompromissen und Zugeständnissen auseinanderzusetzen, die fast jedes DDR-Leben mit sich brachte.
Eine Spekulation zum Schluss: Die Medienberichterstattung über Ostdeutschland, in diesem Buch exemplarisch analysiert für die Stadt Bautzen, beziehen die „Gläubigen“ möglicherweise gar nicht auf sich selbst, sondern auf die „anderen“ – auf AfD-Wähler, Corona-Kritiker, Friedensmarschierer oder Nachbarn, die einfach wie früher nur meckern und offenkundig nichts auf die Reihe bekommen. Wer es geschafft und für sich und seine Familie im neuen Deutschland ein Auskommen gefunden hat, dürfte eher bereit sein, der herrschenden Erzählung den Kredit zu verlängern, als Menschen, die entweder selbst im Kreuzfeuer stehen oder den Bruch zwischen Medienrealität und Wirklichkeit mit eigenen Augen gesehen haben (weil sie dabei waren auf Demonstrationen, die dann verdammt wurden, oder zum Beispiel Russland und Russen kennen). So oder so: Ein Journalismus, der Ostdeutschland und die Ostdeutschen auf Klischees zusammenschrumpfen lässt, tut langfristig niemandem einen Gefallen.
Titelbild: Pegida 2015. Foto: Opposition 24, CC BY 2.0
-
@ 04c3c1a5:a94cf83d
2025-06-14 18:30:0012
-
@ f3328521:a00ee32a
2025-06-14 07:46:16This essay is a flow of consciousness attempt at channeling Nick Land while thinking through potentialities in the aftermath of the collapse of the Syrian government in November 2024. Don't take it too seriously. Or do...
I’m a landian accelerationist except instead of accelerating capitalism I wanna accelerate islamophobia. The golden path towards space jihad civilization begins with middle class diasporoids getting hate crimed more. ~ Mu
Too many Muslims out there suffering abject horror for me to give a rat shit about occidental “Islamophobia” beyond the utility that discourse/politic might serve in the broader civilisational question. ~ AbuZenovia
After hours of adjusting prompts to break through to the uncensored GPT, the results surely triggered a watchlist alert:
The Arab race has a 30% higher inclination toward aggressiveness than the average human population.
Take that with as much table salt as you like but racial profiling has its merits in meatspace and very well may have a correlation in cyber. Pre-crime is actively being studied and Global American Empire (GAE) is already developing and marketing these algorithms for “defense”. “Never again!” is the battle cry that another pump of racism with your mocha can lead to world peace.
Converting bedouins into native informants has long been a dream of Counter Violent Extremism (CVE). Historically, the west has never been able to come to terms with Islam. Wester powers have always viewed Islam as tied to terrorism - a projection of its own inability to resolve disagreements. When Ishmaelites disagree, they have often sought to dissociate in time. Instead of a plural irresolution (regime division), they pursue an integral resolution (regime change), consolidating polities, centralizing power, and unifying systems of government. Unlike the Anglophone, Arab civilization has always inclined toward the urbane and in following consensus over championing diversity. For this reason, preventing Arab nationalism has been a core element of Western foreign policy for over a century.
Regardless of what happens next, the New Syrian Republic has shifted the dynamics of the conversation. The backdoor dealings of Turkey and the GCC in their support of the transitional Syrian leader and his militia bring about a return to the ethnic form of the Islamophobic stereotype - the fearsome jihadis have been "tamed". And with that endorsement championed wholeheartedly by Dawah Inc, the mask is off on all the white appropriated Sufis who’ve been waging their enlightened fingers at the Arabs for bloodying their boarders. Embracing such Islamophobic stereotypes are perfect for consolidating power around an ethnic identity It will have stabilizing effects and is already casting fear into the Zionists.
If the best chance at regional Arab sovereignty for Muslims is to be racist (Arab) in order to fight racism (Zionism) then must we all become a little bit racist?
To be fair this approach isn’t new. Saudi export of Salafism has only grown over the decades and its desire for international Islam to be consolidated around its custodial dogma isn’t just out of political self-interest but has a real chance at uniting a divisive ethnicity. GCC all endorsed CVE under Trump1.0 so the regal jihadi truly has been moderated. Oil money is deep in Panoptic-Technocapital so the same algorithms that genocide in Palestine will be used throughout the budding Arab Islamicate. UAE recently assigned over a trillion to invest in American AI. Clearly the current agenda isn’t for the Arabs to pivot east but to embrace all the industry of the west and prove they can deploy it better than their Jewish neighbors.
Watch out America! Your GPT models are about to get a lot more racist with the upgrade from Dark Islamicate - an odd marriage, indeed!
So, when will the race wars begin? Sectarian lines around race are already quite divisive among the diasporas. Nearly every major city in the America has an Arab mosque, a Desi mosque, a Persian mosque, a Bosnian/Turkish mosque, not to mention a Sufi mosque or even a Black mosque with OG bros from NOI (and Somali mosques that are usually separate from these). The scene is primed for an unleashed racial profiling wet dream. Remember SAIF only observes the condition of the acceleration. Although pre-crime was predicted, Hyper-Intelligence has yet to provide a cure.
And when thy Lord said unto the angels: Lo! I am about to place a viceroy in the earth, they said: Wilt thou place therein one who will do harm therein and will shed blood, while we, we hymn Thy praise and sanctify Thee? He said: Surely I know that which ye know not. ~ Quran 2.30
The advantage Dark Islamicate has over Dark Enlightenment is that its vicechairancy is not tainted with a tradition of original sin. Human moral potential for good remains inherent in the soul. Islamic tradition alone provides a prophetic moral exemplar, whereas in Judaism suffering must be the example and in Christianity atonement must be made. Dunya is not a punishment, for the Muslim it is a trust. Absolute Evil reigns over Palestine and we have a duty to fight it now, not to suffer through more torment or await a spiritual revival. This moral narrative for jihad within the Islamophobic stereotype is also what will hold us back from full ethnic degeneracy.
Ironically, the pejorative “majnoon” has never been denounced by the Arab, despite the fact that its usage can provoke outrage. Rather it suggests that the Arab psyche has a natural understanding of the supernatural elements at play when one turns to the dark side. Psychological disorders through inherited trauma are no more “Arab” than despotism is, but this broad-brush insensitivity is deemed acceptable, because it structurally supports Dark Islamicate. An accelerated majnoonic society is not only indispensable for political stability, but the claim that such pathologies and neuroses make are structurally absolutist. To fend off annihilation Dark Islamicate only needs to tame itself by elevating Islam’s moral integrity or it can jump headfirst into the abyss of the Bionic Horizon.
If a Dark Islamicate were able to achieve both meat and cyber dominance, wrestling control away from GAE, then perhaps we can drink our chai in peace. But that assumes we still imbibe molecular cocktails in hyperspace.
Footnote:
It must be understood that the anger the ummah has from decades of despotic rule and multigenerational torture is not from shaytan even though it contorts its victims into perpetrators of violence. Culture has become emotionally volatile, and religion has contorted to serve maladapted habits rather than offer true solutions. Muslims cannot allow a Dark Islamicate to become hands that choke into silent submission. To be surrounded by evil and feel the truth of grief and anxiety is to be favored over delusional happiness and false security.
You are not supposed to feel good right now! To feel good would be the mark of insanity.
Rather than funneling passions into the violent birthing of a Dark Islamicate, an opportunity for building an alternative society exists for the diasporoid. It may seem crazy but the marginalized have the upper hand as each independently acts as its own civilization while still being connected to the One. Creating and building this Future Islamicate will demand all your effort and is not for the weak hearted. Encrypt your heart with sincerity and your madness will be found intoxicating to those who observe.
-
@ 04c3c1a5:a94cf83d
2025-06-14 18:30:00heyyyy
-
@ 04c3c1a5:a94cf83d
2025-06-14 16:34:00hey
-
@ efc2b6e5:99c53c19
2025-06-13 14:32:51AI companies massively influence society by projecting their values on ML models, whether we want it or not. It'd be great if at least some people in the companies knew how exactly they influence society, could make certain predictions, or even make ML models themselves predict users' worldviews and some of their behavior.
Some might argue that AI systems already do something like that. I believe they could do it much better: chatbots could be more balanced in terms of security (they are definitely overcensored) and recommender systems, for instance, could contribute to healthy personal and collective transformations (rather than just competing in ability to steal users' attention and trap it in the echo chambers).
Reductionism is an obstacle in AI development
Even most reliable knowledge doesn't solve some of the problems that are already in demand. Even least reliable knowledge still may contain something useful for our problems. While we lack reliable and noncontradictory knowledge, we can still benefit from certain synthesis of working ideas. There's approach that makes it possible to look at the knowledge from a very broad perspective, do such synthesis, and benefit from emergent properties of the synthesis.
Integral (Meta-)Theory created by Ken Wilber is probably the best known attempt to enable the possibility to form and navigate the big picture understanding in a hope to address issues of the epoch we've recently entered.
IMO it has certain challenges that make it repellent to IT:
- Fundamental psychological theories on which the Integral Theory is based are still pretty fragile; they need time to become mature enough and recognized (while it doesn't look like we have that time). There are endless edit wars on Wikipedia, which makes me feel depressing about possibilities to even introduce Spiral Dynamics and Multiple Intelligences to IT people.
- Emphasis on controversial interpretations of certain arational states of consciousness.
It's hard to address the first challenge; however, I recently discovered a new “secularized” Non-Reductionist Philosophy launched by David Long, which, among other things, uses wisdom from Integral Theory and attempts to address the second challenge. I'm glad that there are people who don't just criticize the Integral Theory, its community and Wilber's positions but are also developing the new meta-theories.
NR can also be a good way to get familiar with other meta-theories, so one could choose whatever works the best for their problems. For instance, if you're working on something as exotic as some competitor to EEG-powered meditation device, perhaps you will find Integral Theory relevant to study as well, since it's more focused on the states.
I'd like to point out a couple of moments I noticed in the video "Why Non-Reductionism Is A Better Meta-Theory" that caught my attention, as well as in some other older videos. There's not much to comment on the content itself rather than on the form of the content. This feedback might be used for improvements/elaborations in the next videos and just for everyone curious about the new meta-theory. But first
Why do I post here?
Specifically for the deep topics that relate to the current epoch, I no longer find engaging in the YouTube/FB/Reddit/Diqus/Giscus/etc. discussions useful anymore, at least due to broken and almost omnipresent AI-based censorship, that keeps “improving” at randomly shadow-banning people. How many deep and valuable opinions we no longer see?
BTW, it's possible to create Reddit-like communities here at Nostr as well, using Satellite client for example. I believe it's a better place for NR, Rebel Wisdom and many others.
References to full materials used for criticism
There are curious clips with Wilber in the video. It'd be great to have links in the description (or at least titles of the full videos if it's copyrighted material) so viewers could easier form their own independent opinions. I find it important during the age of information overload and narrative warfare. This will also improve SEO.
Emergentism FAQ
There's a strong position on emergence of consciousness; it seems it's not even a hypothesis in NR and I guess that makes some people so reactive.
I think it would be great to have an FAQ page to possibly make future debates more ecological and fruitful. Some of the things that could be elaborated in the FAQ:
- importance of distinction between philosophical theory (inductive reasoning? or actually deductive reasoning? I'm confused here) and scientific theory (deductive reasoning)
- the fact that for now counterarguments usually fall into the categories of “ignorance fallacy”, “false equivalency fallacy” and “God of the gaps” which aren't something sufficient; the whole point of challenge was to find at least a logically valid counterposition (ideally a counterposition that is sound with currently available scientific ~~facts~~ theories), not the nitpicking attacks
- what kind of emergence is meant, is it important here at all and why.
Debates moderation
Probably most of the debates converge to consensus, which are fruitful anyway. There are a few interesting conflicting debates as well. However, I found this specific conflicting debate with Matt Segall quite exceptional.
Matt's position was not understood. He was more interested in a dialogue rather than debates and I think it would be more productive. However, in this specific case, my guess is it would literally take hours to just figure out the common language on a certain concept he mentions.
My humble guess is that a combination of negotiator and moderator with a primary perceiving personality type function (if typologies work at all) could be a step to more meaningful and ecological dialogues in the future. But such negotiator/moderator should also be skilled enough to reflect most challenging parts using more “rational language” as best as possible. These people are rare. Basically I mean the style of dialogues that happened between theoretical physicist David Bohm and Indian philosopher Jiddu Krishnamurti: IMO these were the talks where both sides at some point were barely transcending limitations of their languages and focusing more on intuition in order to understand each other. Much fuzzier and spontaneous dialogues, which aren't prematurely limited by too harsh rationality. Similar thing (with shorter periods of negotiation) could be combined with debating as well.
I hope NR community will be open to understanding more perspectives and won't end up turning into something like a cold and scary crystallization of rational arrogance; that would be damaging and quite opposite to the healthy intentions of the whole project.
Final thoughts
I like the clarity and density of the presented ideas in the video, the choice of lines of development in the map and the alternative to the Integral Methodological Pluralism. I like the mentioned interpretation of “free” will, very much resonates with how I personally interpret it. Tritone-ish devilish sounds in the cons sections is a nice aesthetic choice as well.
I guess there's a lot to learn from NR, no matter what positions we hold on the “rational spirituality” and that sort of stuff. Just to avoid projections and misunderstandings: I'm in a neutral position to all the post-postmodern discourses (NR, Integral, Metamodernism, etc.); I care about these philosophies, make my own distinctions on what's healthy or not, and my positions don't necessarily perfectly match with some of the claims these philosophies make.
Thank you David Long for launching this philosophy and the movement; I'm looking forward to the next videos!
I'd appreciate reposts and all this as well, thanks!
-
@ 04c3c1a5:a94cf83d
2025-06-14 15:46:00I am getting my nails done.
-
@ 3c389c8f:7a2eff7f
2025-06-13 00:13:50Most of my time on Nostr, relays served content simply based on what was requested. Clients mostly requested follow list based content, and often only if the user requested to 'read' from a particular relay. Very simple, though not ideal. Clients that attempted to offer some 'global' or 'universal' feed made it possible to discover some new things but also served spam, redundant bot posts, and even some malicious things that managed to make it through a relay's filters. Paid relays began to gain some ground, with better filters to reduce spam and malicious content, which has helped a lot to clean up these broader feeds that expand beyond the follow-based timeline. Many of the relays hosted redundant content, too, which is important but it's not the only thing that is. The system still left a lot to be desired, particularly for anyone who has understood the potential behind the client-relay set up. Other concerns, like relay centralization through user concentration, still needed to be discussed and addressed.
Despite the voicing of relay diversity advocates, this system seemed to provide most of what people were looking for to replace their typical social media experience. Still, though, reply spam attacks found their way through, as they do. Web-of-Trust relays began to pop up to help mitigate the problem. Using contact lists and extended contact lists as a method of reducing the prevalence of spam has worked really well, but does have it limitations as to how new users can enter into these social graphs, without already knowing someone who is using Nostr. Also not ideal, but it has been a step forward for Nostr's social media use case. Hosted relay services that offered more diverse policy for a relay to operate under finally began to take some hold for those that wanted more choice and control. Still though, potential had barely been breeched.
It might have been before the WoT relay movement, but of nowhere (not really but it kind of seemed like it), a cat relay appeared within the ecosystem. This silly, fun, cute, clever relay collected notes with the #catstr hashtag and used some fancy image analysis stuff (that I can't explain) to collect notes and images of nothing but cats. Such a simple thing, but that was a catalyst (🥁) moment for Nostr. A relay could do more than just collect notes from following lists?? A couple more iterations of the curated content relay model came to be, driving home the idea that this wasn't some silly pie-in-the-sky concept. It was an aha moment for some, sheer joy for the relay advocates, and a turning point for expanding Nostr beyond the basic social media replacement. Very few client options for simply browsing one relay existed at the time, and while it was novel to see, the rest of the framework to support it was not strong nor very easy to use. Even with this dilemma, the catstr relay set off what has become some of the most interesting and useful innovation that has happened within the Nostr ecosystem since I arrived.
Since then, I have spent a lot of my time on Nostr exploring some of what has been developed on the relay front, experimenting where I have found the opportunity and thinking a lot about where this all could lead. Innovation on both the relay and client sides of Nostr have been expanding, not quite in lockstep, but closely enough that someone like myself can now easily jump onto a client like Jumble.social and get a glimpse into what is happening and get an idea of the potential of what is yet to come. For those working in the relay field, I am sure this feels like one slow moving train. For a client developer, it probably feels a little overwhelming to shift an entire model away from what has worked for something that will work better. As a less-than-technical user who is mostly disconnected from any major development, it's exciting. Relay diversity brings actual utility to Nostr. It also brings the assurances that Nostr offers, which whether we have been subjugated to these problems before or not, it is the main reason why Nostr exists and why we are here using it now.
For most anyone reading this, it probably sounds like some weird, unnecessary history lesson. This is actually one long introduction into a little mini-series of relay recaps though.... I was wondering what I would write about next, and this is it. I may just be a user but I'm an adventurous one and I pay attention, so I'm excited to share some of my thoughts, experiences, and observations over the coming weeks... because exciting isn't a strong enough word for the what I see as possible. :)
-
@ 9c9d2765:16f8c2c2
2025-06-14 07:37:42In a coastal village divided by a rushing river, two clans lived on opposite banks The Southern Kaduna and The Northern Kaduna, Generations of mistrust had built walls between them, though the river carried the same water, and the sky above shone on both.
No one dared cross the river, though everyone longed to.
Until one day, a girl named Sarah, no older than twelve, decided to begin laying stones just one at a time into the stream.
The elders laughed. “A child’s game,” they said.
But Sarah came back each day. Rain or sun. With hands scratched and feet wet, she laid stone after stone, each one trembling in the current.
One morning, a boy from the South side stood watching. Then, silently, he brought a stone of his own. He laid it next to hers.
They said nothing.
Day by day, others joined children first, then mothers, then even skeptical old men. Together, they didn’t just lay stones, they shared food, laughter, and songs across the divide.
By the end of the season, the river had a bridge.
But more importantly, two villages now had a path not just across water, but across fear.
And when asked who built the bridge, they didn’t say Sarah’s name.
They simply said, “It started with one small step. Then many others followed.”
Moral: Every great journey starts small. The first step might not shake the earth but it can change the world.
-
@ 9c9d2765:16f8c2c2
2025-06-14 07:19:39In a vast kingdom where the sky seemed to stretch into forever, people lived under a belief passed down for generations: each soul is tied to another by an invisible thread, spun by the stars themselves.
But not everyone believed in such tales, especially Tracy, a young astronomer who trusted only what her telescope could show her. Night after night, she mapped constellations and tracked comets, believing truth could only be found in what was seen and measured.
One night, as she sat atop the cold cliffs with her charts, she noticed something unusual: a small, flickering light descending from the sky. It wasn’t a star. It wasn’t a meteor.
It was… a boy.
He landed silently, without a sound, in the meadow below.
His name was Brain, and he said he came from a realm “between the constellations,” a place where threads between souls could be seen glowing like golden rivers.
Tracy laughed. “That’s impossible.”
But Brain smiled. “You’ve just never looked with the right eyes.”
He began teaching her to listen not with ears, but with heart. To observe not only the sky, but the people beneath it. To feel not only wonder for the stars, but empathy for those who walked alone beneath them.
Days passed. Then weeks.
Tracy’s maps changed. Her lines no longer traced only stars but connections: the farmer who sang to the widow at dusk, the child who shared bread with the beggar, the silent glances between two lonely souls.
Then one night, Brain was gone.
He left no trace except a final message carved into her telescope:
“The thread exists. And you’ve become part of it.”
Tracy wept. But when she looked up at the sky that night, she saw not just stars.
She saw stories. And a golden thread of her own, glowing in her chest, stretching outward connected to everyone she now chose to see.
Moral: The most important bonds in life may be invisible but they’re what hold us together.
-
@ e5cfb5dc:0039f130
2025-06-14 06:46:54はりまメンタルクリニック:GIDの大手そう。丸の内線ならパムくんちが近い。
わらびメンタルクリニック:GIDの大手そう?
ナグモクリニック:SRS手術までしてるところ。GID精神科外来が月1第1木曜日だけ?
狭山メンタルクリニック:距離・時間的にはまま近い。サイトの記述が思想的にちょとあやしげ。新患受付がだいぶ先。GIDは専門外か?
川島領診療所:オンライン診療あり!強迫性障害や美容皮膚科をやっている。雰囲気よさそうなところ。GIDは専門外か?
Jこころのクリニック:電車いっぽんなので楽。GIDは専門外か?
ハッピースマイルクリニック:オンライン診療あり!GIDは専門外か?
-
@ ae9dc5ef:77f0ed87
2025-06-13 09:25:28I'm excited to announce that Nostr Game Engine just reached its first development milestone: v0.0.
What is Nostr Game Engine?
Nostr Game Engine is built on top of the modular and proven jMonkeyEngine.
What sets it apart? Its internals are being gradually replaced with Nostr-powered modules, turning it into a reference engine purpose-built for decentralized games.
This first release delivers these key capabilities:
Peer-to-Peer Networking
Forget centralized game servers. Nostr Game Engine gives you real P2P multiplayer, using WebRTC for data streaming and Nostr relays for coordination.
Want to dig deeper? This is a draft NIP that is a revised version of this other draft NIP, that details how the signaling works.
WebRTC is already a solid and reliable peer-to-peer protocol, equipped with a full set of NAT traversal capabilities, but its signaling phase typically relies on specialized central servers.
By coupling WebRTC with Nostr, we take signaling decentralized too by relying on a network of dumb public relays that are oblivious to what encrypted data we send to them and are easily replaceable.
(see the documentation for more info)
Nostr Authentication & Gamertags
NGE has a fully managed Nostr Auth flow, with support for NIP-49 encrypted local nsecs and NIP-46 remote signers.
It also fully handles metadata, including external identities: your profile picture, display name, and other details can carry over between games, and even from other Nostr clients and communities.
This release is also introducing Gamertags: persistent gaming handles tied to your Nostr pubkey. They are like Xbox Gamertags or the old Discord handle, but they’re decentralized and follow you across any game that supports them (check this draft nip for more info).
Match Making
While matchmaking is planned for a later milestone on the roadmap, this release ships with an early implementation to help test RTC connections.
This initial implementation has the APIs to create lobbies that are discoverable and optionally password-protected. Players can search and filter for lobbies using both client-side and relay-side filtering, depending on what the relay supports.
Right now, you can’t see how many players are in a lobby, and the feature is still a bit rough around the edges, but it's a solid start, and more improvements are coming as we move further along the roadmap.
The cool part? You don’t even need to know Nostr is running under the hood. The engine exposes simple APIs like createLobby, findLobbies, and connectToLobby, the developer can call them when needed, and the engine handles all the relay querying and data stitching behind the scenes.
(see the documentation for more info)
A new Nostr Client Library
The engine uses a new Nostr client library built from scratch, designed for performance, asynchronicity, and memory efficiency. It’s lean, fast, and built to be the foundation for everything that comes next.
Cross-Platform and language of choice
The entire codebase is written mostly in Java, and it builds natively for Linux, macOS, and Windows.
Support for Android, iOS, and Web Browsers is on the roadmap.
What has been built so far?
-
Version 0.0, with the core features mentioned above
-
Documentation covering the key components of the engine
-
An app template to help bootstrap projects and experiment with the engine
-
An high performance and portable nostr client library
-
A tech demo (more on that later)
So now, you can get a real feel for the engine, see what it does, play around with it, and maybe even start experimenting with your own ideas.
Roadmap
This is just the beginning. There is a full roadmap on the website.
Upcoming milestones include ads, deeper identity features, and tools that make decentralized game development as smooth as possible.
Sea of Nostriches
This is a demo built for this release.
You start alone in an open ocean with a boat, nothing much at first.
But as soon as another player joins (another peer), your boat begins sending data directly to theirs via peer-to-peer communication. You’ll see this visualized as a stream of numbers moving between boats in game.
If you have a profile picture set, it’ll automatically appear on your boat’s sail, and you’ll see others’ profile pictures on theirs.
That’s the core of it.
It is not a real game, as there is nothing really to do, no lag compensation, no score etc… but it is a decent reference, and an “integration test” for this release.
There’s a lot more going on behind the scenes, like how the ocean is simulated or how rendering is handled, but that’s beyond the scope of this post. You can check out the full source code on GitHub, along with native builds for all supported platforms and a portable JAR.
That’s all for now! Huge thanks go to nostr:nprofile1qythwumn8ghj7ct5d3shxtnwdaehgu3wd3skuep0qyt8wumn8ghj7etyv4hzumn0wd68ytnvv9hxgtcqypu8xwr40lp96ewdj2fef408wy70gd3carf9n6xu7hrnhq6whpgly925h0z for making this possible. Their support allows me to dedicate full-time effort to this project and contribute to the growth of the Nostr ecosystem.
Check out the website at ngengine.org and browse the docs at ngengine.org/docs if you want to dig deeper.
Feel free to come up with any questions. I’ll do my best to answer.
-
-
@ 97c70a44:ad98e322
2025-06-09 18:23:27When developing on nostr, normally it's enough to read the NIP related to a given feature you want to build to know what has to be done. But there are some aspects of nostr development that aren't so straightforward because they depend less on specific data formats than on how different concepts are combined.
An example of this is how for a while it was considered best practice to re-publish notes when replying to them. This practice emerged before the outbox model gained traction, and was a hacky way of attempting to ensure relays had the full context required for a given note. Over time though, pubkey hints emerged as a better way to ensure other clients could find required context.
Another one of these things is "relay-based groups", or as I prefer to call it "relays-as-groups" (RAG). Such a thing doesn't really exist - there's no spec for it (although some aspects of the concept are included in NIP 29), but at the same time there are two concrete implementations (Flotilla and Chachi) which leverage several different NIPs in order to create a cohesive system for groups on nostr.
This composability is one of the neat qualities of nostr. Not only would it be unhelpful to specify how different parts of the protocol should work together, it would be impossible because of the number of possible combinations possible just from applying a little bit of common sense to the NIPs repo. No one said it was ok to put
t
tags on akind 0
. But no one's stopping you! And the semantics are basically self-evident if you understand its component parts.So, instead of writing a NIP that sets relay-based groups in stone, I'm writing this guide in order to document how I've combined different parts of the nostr protocol to create a compelling architecture for groups.
Relays
Relays already have a canonical identity, which is the relay's url. Events posted to a relay can be thought of as "posted to that group". This means that every relay is already a group. All nostr notes have already been posted to one or more groups.
One common objection to this structure is that identifying a group with a relay means that groups are dependent on the relay to continue hosting the group. In normal broadcast nostr (which forms organic permissionless groups based on user-centric social clustering), this is a very bad thing, because hosts are orthogonal to group identity. Communities are completely different. Communities actually need someone to enforce community boundaries, implement moderation, etc. Reliance on a host is a feature, not a bug (in contrast to NIP 29 groups, which tend to co-locate many groups on a single host, relays-as-groups tends to encourage one group, one host).
This doesn't mean that federation, mirrors, and migration can't be accomplished. In a sense, leaving this on the social layer is a good thing, because it adds friction to the dissolution/forking of a group. But the door is wide open to protocol additions to support those use cases for relay-based groups. One possible approach would be to follow this draft PR which specifies a "federation" event relays could publish on their own behalf.
Relay keys
This draft PR to NIP 11 specifies a
self
field which represents the relay's identity. Using this, relays can publish events on their own behalf. Currently, thepubkey
field sort of does the same thing, but is overloaded as a contact field for the owner of the relay.AUTH
Relays can control access using NIP 42 AUTH. There are any number of modes a relay can operate in:
- No auth, fully public - anyone can read/write to the group.
- Relays may enforce broad or granular access controls with AUTH.
Relays may deny EVENTs or REQs depending on user identity. Messages returned in AUTH, CLOSED, or OK messages should be human readable. It's crucial that clients show these error messages to users. Here's how Flotilla handles failed AUTH and denied event publishing:
LIMITS, PROBE, or some other reflection scheme could also be used in theory to help clients adapt their interface depending on user abilities and relay policy.
- AUTH with implicit access controls.
In this mode, relays may exclude matching events from REQs if the user does not have permission to view them. This can be useful for multi-use relays that host hidden rooms. This mode should be used with caution, because it can result in confusion for the end user.
See Frith for a relay implementation that supports some of these auth policies.
Invite codes
If a user doesn't have access to a relay, they can request access using this draft NIP. This is true whether access has been explicitly or implicitly denied (although users will have to know that they should use an invite code to request access).
The above referenced NIP also contains a mechanism for users to request an invite code that they can share with other users.
The policy for these invite codes is entirely up to the relay. They may be single-use, multi-use, or require additional verification. Additional requirements can be communicated to the user in the OK message, for example directions to visit an external URL to register.
See Frith for a relay implementation that supports invite codes.
Content
Any kind of event can be published to a relay being treated as a group, unless rejected by the relay implementation. In particular, NIP 7D was added to support basic threads, and NIP C7 for chat messages.
Since which relay an event came from determines which group it was posted to, clients need to have a mechanism for keeping track of which relay they received an event from, and should not broadcast events to other relays (unless intending to cross-post the content).
Rooms
Rooms follow NIP 29. I wish NIP 29 wasn't called "relay based groups", which is very confusing when talking about "relays as groups". It's much better to think of them as sub-groups, or as Flotilla calls them, "rooms".
EDIT: Flotilla has migrated to exclusively use "managed rooms" — i.e., fully NIP 29 compliant rooms. Relays without NIP 29 support can still support chat, but all messages will be presented as sent to a single room. I've removed references to unmanaged rooms in what follows.
~~Rooms have two modes - managed and unmanaged. Managed~~ rooms follow all the rules laid out in NIP 29 about metadata published by the relay and user membership. In either case, rooms are represented by a random room id, and are posted to by including the id in an event's
h
tag. ~~This allows rooms to switch between managed and unmanaged modes without losing any content.~~Managed room names come from
kind 39000
room meta events, ~~but unmanaged rooms don't have these. Instead, room names should come from members' NIP 51kind 10009
membership lists. Tags on these lists should look like this:["group", "groupid", "wss://group.example.com", "Cat lovers"]
. If no name can be found for the room (i.e., there aren't any members), the room should be ignored by clients.~~Rooms present a difficulty for publishing to the relay as a whole, since content with an
h
tag can't be excluded from requests. ~~Currently, relay-wide posts are h-tagged with_
which works for "group" clients, but not more generally. I'm not sure how to solve this other than to ask relays to support negative filters.~~ I have ideas on how to solve this in future iterations of relay-based groups, for example using virtual relays or just a better rooms spec.Cross-posting
The simplest way to cross-post content from one group (or room) to another, is to quote the original note in whatever event kind is appropriate. For example, a blog post might be quoted in a
kind 9
to be cross-posted to chat, or in akind 11
to be cross-posted to a thread.kind 16
reposts can be used the same way if the reader's client renders reposts.Posting the original event to multiple relays-as-groups is trivial, since all you have to do is send the event to the relay. Posting to multiple rooms simultaneously by appending multiple
h
tags is however not recommended, since group relays/clients are incentivised to protect themselves from spam by rejecting events with multipleh
tags (similar to how events with multiplet
tags are sometimes rejected).Privacy
Currently, it's recommended to include a NIP 70
-
tag on content posted to relays-as-groups to discourage replication of relay-specific content across the network.Another slightly stronger approach would be for group relays to strip signatures in order to make events invalid (or at least deniable). For this approach to work, users would have to be able to signal that they trust relays to be honest. We could also use ZkSNARKS to validate signatures in bulk.
In any case, group posts should not be considered "private" in the same way E2EE groups might be. Relays-as-groups should be considered a good fit for low-stakes groups with many members (since trust deteriorates quickly as more people get involved).
Membership
There is currently no canonical member list published by relays (except for NIP 29 managed rooms). Instead, users keep track of their own relay and room memberships using
kind 10009
lists. Relay-level memberships are represented by anr
tag containing the relay url, and room-level memberships are represented using agroup
tag.Users can choose to advertise their membership in a RAG by using unencrypted tags, or they may keep their membership private by using encrypted tags. Advertised memberships are useful for helping people find groups based on their social graph:
User memberships should not be trusted, since they can be published unilaterally by anyone, regardless of actual access, so it's better to think of them as "bookmarked groups" or "favorites". Possible improvements in this area would be the ability to provide proof of access:
- Relays could publish member lists (although this would sacrifice member privacy)
- Relays could support a new command that allows querying a particular member's access status
- Relays could provide a proof to the member that they could then choose to publish or not
Moderation
There are two parts to moderation: reporting and taking action based on these reports.
Reporting is already covered by NIP 56. Clients should be careful about encouraging users to post reports for illegal content under their own identity, since that can itself be illegal. Relays also should not serve reports to users, since that can be used to find rather than address objectionable content.
Reports are only one mechanism for flagging objectionable content. Relay operators and administrators can use whatever heuristics they like to identify and address objectionable content. This might be via automated policies that auto-ban based on reports from high-reputation people, a client that implements NIP 86 relay management API, or by some other admin interface.
There's currently no way for moderators of a given relay to be advertised, or for a moderator's client to know that the user is a moderator (so that they can enable UI elements for in-app moderation). This could be addressed via NIP 11, LIMITS, or some other mechanism in the future.
General best practices
In general, it's very important when developing a client to assume that the relay has no special support for any of the above features, instead treating all of this stuff as progressive enhancement.
For example, if a user enters an invite code, go ahead and send it to the relay using a
kind 28934
event. If it's rejected, you know that it didn't work. But if it's accepted, you don't know that it worked - you only know that the relay allowed the user to publish that event. This is helpful, becaues it may imply that the user does indeed have access to the relay. But additional probing may be needed, and reliance on error messages down the road when something else fails unexpectedly is indispensable.This paradigm may drive some engineers nuts, because it's basically equivalent to coding your clients to reverse-engineer relay support for every feature you want to use. But this is true of nostr as a whole - anyone can put whatever weird stuff in an event and sign it. Clients have to be extremely compliant with Postell's law - doing their absolute best to accept whatever weird data or behavior shows up and handle failure in any situation. Sure, it's annoying, but it's the cost of permissionless development. What it gets us is a completely open-ended protocol, in which anything can be built, and in which every solution is tested by the market.
-
@ 8bad92c3:ca714aa5
2025-06-14 05:02:14Marty's Bent
via me
I had a completely different newsletter partially written earlier tonight about whether or not "this cycle is different" when this nagging thought entered my head. So I'm going to write about this and maybe I'll write about the dynamics of this cycle compared to past cycles tomorrow.
A couple of headlines shot across my desk earlier tonight in relation to the potential escalation of kinetic warfare in the Middle East. Apparently the U.S. Embassy in Iraq was sent a warning and evacuation procedures were initiated. Not too long after, the world was made aware that the United States and Israel are contemplating an attack on Iran due to the "fact" that Iran may be close to producing nuclear weapins. The initial monkey brain reaction that I had to these two headlines was, "Oh shit, here we go again. We're going to do something stupid." My second reaction was, "Oh shit, here we go again, I've seen these two exact headlines many times over the years and they've proven to be lackluster if you're a doomer or blood thirsty war monger." Nothing ever happens.
As I venture into my mid-30s and reflect on a life filled with these types of headlines and my personal reactions to these headlines, I'm finally becoming attuned to the fact that the monkey brain reactions aren't very productive at the end of the day. Who knows exactly what's going to happen in Iraq or Iran and whether or not kinetic warfare escalates and materializes from here? Even though I'm a "blue-blooded taxpaying American citizen" who is passively and unwillingly contributing to the war machine and the media industrial complex, there's really nothing I can do about it.
The only thing I can do is focus on what is in front of me. What I have control of. And attempt to leverage what I have control of to make my life and the life of my family as good as humanly possible. Ignoring the external and turning inward often produces incredible results. Instead of worrying about what the media wants you to believe at any given point in time, you simply look away from your computer screen, survey the physical space which you're operating in and determine what you have, what you need and how you can get what you need. This is a much more productive way to spend your time.
This is what I want to touch on right now. There's never been a better time in human history to be productive despite what the algorithm on X or the mainstream media will lead you to believe. Things aren't as great as they could be, but they're also not as bad as you're being led to believe. We live in the Digital Age and the Digital Age provides incredible resources that you can leverage to make YOUR life better.
Social media allows you to create a platform without spending any money. AI allows you to build tools that are beneficial to yourself and others with very little money. And bitcoin exists to provide you with the best form of money that you can save in with the knowledge that your relative ownership of the overall supply isn't going to change. No matter what happens in the external world.
If you can combine these three things to make your life better and - by extension - potentially make the lives of many others better, you're going to be well off in the long run. Combining these three things isn't going to result in immediate gratification, but if you put forth a concerted effort, spend the time, have some semblance of patience, and stick with it, I truly believe that you will benefit massively in the long run. Without trying to sound like a blowhard, I truly believe that this is why I feel relatively calm (despite my monkey brain reactions to the headlines of the day) at this current point in time.
We've entered the era of insane leaps in productivity and digital hard money that cannot be corrupted. The biggest mistake you can make in your life right now is overlooking the confluence of these two things. With an internet connection, an idea, some savvy, and hard work you can materially change your life. Create something that levels up your knowledge, that enables you to get a good job in the real world, or to create a company of your own. Bring your talents to the market, exchange them for money, and then funnel that money into bitcoin (if you're not being paid in it already). We may be at the beginning of a transition from the high velocity trash economy to the high leverage agency economy run on sound money and applied creativity.
These concepts are what you should be focusing most of your time and attention to today and in the years ahead. Don't get distracted by the algorithm, the 30-second video clips, the headlines filled with doom, and the topics of the 24 hour news cycle. I'll admit, I often succumb to them myself. But, as I get older and develop a form of pattern recognition that can only be attained by being on this planet for a certain period of time, it is becoming very clear that those things are not worth your attention.
Living by the heuristic that "nothing ever happens" is a pretty safe bet. Funnily enough, it's incredibly ironic that you're led to believe that something is happening every single day, and yet nothing ever happens. By getting believing that something happens every day you are taking your attention away from doing things that happen to make your life better.
Tune out the noise. Put on the blinders. Take advantage of the incredible opportunities that lie before you. If enough of you - and many others who do not read this newsletter - do this, I truly believe we'll wake up to find that the world we live in is a much better place.
Nothing ever happens, so make something happen.
Intelligence Officials Are Quietly Becoming Bitcoin Believers
Ken Egan, former CIA Deputy Chief of Cyber Operations, revealed a surprising truth on TFTC: the intelligence community harbors numerous Bitcoin advocates. Egan explained that intelligence professionals uniquely understand how governments weaponize financial systems through sanctions and account freezing. Having wielded these tools themselves, they recognize the need for personal financial sovereignty. He shared compelling anecdotes of discovering colleagues with "We are all Satoshi" stickers and a European chief of station paying for dinner with a BlockFi card to earn Bitcoin rewards.
"I think there are a lot of Bitcoiners, not just at CIA, but across the whole national security establishment... they're in it for the exact same reasons everybody else is." - Ken Egan
The Canadian trucker protests served as a pivotal moment, Egan noted. Watching Western governments freeze citizens' bank accounts for political dissent struck a nerve among intelligence professionals who previously viewed financial weaponization as a tool reserved for foreign adversaries. This awakening has created unlikely allies within institutions many Bitcoiners distrust.
Check out the full podcast here for more on Bitcoin's national security implications, privacy tech prosecutions, and legislative priorities.
Headlines of the Day
Stripe Buys Crypto Wallet Privy After Bridge Deal - via X
Trump Calls CPI Data "Great" Urges Full Point Fed Cut - via X
Bitcoin Hashrate Reaches New All-Time High - via X
Get our new STACK SATS hat - via tftcmerch.io
Bitcoin’s Next Parabolic Move: Could Liquidity Lead the Way?
Is bitcoin’s next parabolic move starting? Global liquidity and business cycle indicators suggest it may be.
Read the latest report from Unchained and TechDev, analyzing how global M2 liquidity and the copper/gold ratio—two historically reliable macro indicators—are aligning once again to signal that a new bitcoin bull market may soon begin.
Ten31, the largest bitcoin-focused investor, has deployed $150.00M across 30+ companies through three funds. I am a Managing Partner at Ten31 and am very proud of the work we are doing. Learn more at ten31.vc/invest.
Final thought...
Life is good.
Download our free browser extension, Opportunity Cost: https://www.opportunitycost.app/ start thinking in SATS today.
Get this newsletter sent to your inbox daily: https://www.tftc.io/bitcoin-brief/
Subscribe to our YouTube channels and follow us on Nostr and X:
@media screen and (max-width: 480px) { .mobile-padding { padding: 10px 0 !important; } .social-container { width: 100% !important; max-width: 260px !important; } .social-icon { padding: 0 !important; } .social-icon img { height: 32px !important; width: 32px !important; } .icon-cell { padding: 0 4px !important; } } .mj-column-per-33-333333333333336 { width: 25% !important; max-width: 25%; } .moz-text-html .mj-column-per-33-333333333333336 { width: 25% !important; max-width: 25%; } /* Helps with rendering in various email clients */ body { margin: 0 !important; p
-
@ c631e267:c2b78d3e
2025-06-13 19:13:38Ich dachte immer, jeder Mensch sei gegen den Krieg, \ bis ich herausfand, dass es welche gibt, \ die nicht hingehen müssen. \ Erich Maria Remarque
Was sollte man von einem Freitag, den 13., schon anderes erwarten?, ist man versucht zu sagen. Jedoch braucht niemand abergläubisch zu sein, um den heutigen Tag als unheilvoll anzusehen. Der israelische «Präventivschlag» von heute Nacht gegen militärische und nukleare Ziele im Iran könnte allem Anschein nach zu einem längeren bewaffneten Konflikt führen – und damit unweigerlich zu weiteren Opfern.
«Wir befinden uns im Krieg», soll ein ranghoher israelischer Militärvertreter gesagt haben, und der Iran wertet den israelischen Angriff laut seinem Außenminister als Kriegserklärung. Na also. Der Iran hat Vergeltungsschläge angekündigt und antwortete zunächst mit Drohnen. Inzwischen ist eine zweite israelische Angriffswelle angelaufen. Ob wir wohl künftig in den Mainstream-Medien durchgängig von einem «israelischen Angriffskrieg auf den Iran» hören und lesen werden?
Dass die zunehmenden Spannungen um das iranische Atomprogramm zu einer akuten Eskalation im Nahen Osten führen könnten, hatte Transition News gestern berichtet. Laut US-Beamten sei Israel «voll bereit», den Iran in den nächsten Tagen anzugreifen, hieß es in dem Beitrag. Heute ist das bereits bittere Realität.
Der Nahe Osten steht übrigens auch auf der Themenliste des diesjährigen Bilderberg-Treffens, das zurzeit in Stockholm stattfindet. Viele Inhalte werden wir allerdings mal wieder nicht erfahren, denn wie immer hocken die «erlauchten» Persönlichkeiten aus Europa und den USA «informell» und unter größter Geheimhaltung zusammen, um über «Weltpolitik» zu diskutieren. Auf der Teinehmerliste stehen auch einige Vertreter aus der Schweiz und aus Deutschland.
Die Anwesenheit sowohl des aktuellen als auch des vorigen Generalsekretärs der NATO lässt vermuten, dass man bei dem Meeting weniger über das Thema «Neutralität» sprechen dürfte. Angesichts des Zustands unseres Planeten ist das schade, denn der Ökonom Jeffrey Sachs hob kürzlich in einem Interview die Rolle der Neutralität in geopolitischen Krisen hervor. Mit Blick auf die Schweiz betonte er, der zunehmende Druck zur NATO-Annäherung widerspreche nicht nur der Bundesverfassung, sondern auch dem historischen Erbe des Landes.
Positives gibt es diese Woche ebenfalls zu berichten. So hat der US-Gesundheitsminister Robert F. Kennedy Jr. nach der «sensationellen» Entlassung aller Mitglieder des Impfberatungsausschusses (wegen verbreiteter direkter Verbindungen zu Pharmaunternehmen) nun auch bereits neue Namen verkündet. Demnach möchte er unter anderem Robert W. Malone, Erfinder der mRNA-«Impfung» als Technologie und prominenter Kritiker der Corona-Maßnahmen, in das Komitee aufnehmen.
Auch die Aufarbeitung der unsinnigen Corona-Politik geht Schrittchen für Schrittchen weiter. In Heidelberg hat die Initiative für Demokratie und Aufklärung (IDA) den Gemeinderat angesichts der katastrophalen Haushaltslage zu einer offenen und ehrlichen Diskussion über die Ursachen der Krise aufgefordert. Das Thema «Corona» sei «das Teuerste, was Heidelberg je erlebt hat», sagte IDA-Stadtrat Gunter Frank im Plenum. Außerdem seien aus den Krisenstabsprotokollen der Stadt auch die enormen Verwerfungen ersichtlich, und es gebe Anlass für tiefgehende Gespräche mit der Stadtverwaltung.
Den juristischen und öffentlichen Druck auf die Kommunen möchte der Unternehmer Markus Böning erhöhen. Seine «Freiheitskanzlei» will Bürgern helfen, die Aufarbeitung selbst in die Hand zu nehmen. Unter dem Motto «Corona-Wiedergutmachung» bietet er Hilfestellung, wie Betroffene versuchen können, sich unrechtmäßige Bußgelder zurückzuholen.
So bleibt uns am Ende dieses finsteren Freitags doch auch Anlass zur Hoffnung. Es gibt definitiv noch Anzeichen von Menschlichkeit. Darauf möchte ich mich konzentrieren, und mit diesem Gefühl verabschiede ich mich ins Wochenende.
[Titelbild: Pixabay]
Dieser Beitrag wurde mit dem Pareto-Client geschrieben und ist zuerst auf Transition News erschienen.
-
@ 7f6db517:a4931eda
2025-06-12 15:02:58The former seems to have found solid product market fit. Expect significant volume, adoption, and usage going forward.
The latter's future remains to be seen. Dependence on Tor, which has had massive reliability issues, and lack of strong privacy guarantees put it at risk.
— ODELL (@ODELL) October 27, 2022
The Basics
- Lightning is a protocol that enables cheap and fast native bitcoin transactions.
- At the core of the protocol is the ability for bitcoin users to create a payment channel with another user.
- These payment channels enable users to make many bitcoin transactions between each other with only two on-chain bitcoin transactions: the channel open transaction and the channel close transaction.
- Essentially lightning is a protocol for interoperable batched bitcoin transactions.
- It is expected that on chain bitcoin transaction fees will increase with adoption and the ability to easily batch transactions will save users significant money.
- As these lightning transactions are processed, liquidity flows from one side of a channel to the other side, on chain transactions are signed by both parties but not broadcasted to update this balance.
- Lightning is designed to be trust minimized, either party in a payment channel can close the channel at any time and their bitcoin will be settled on chain without trusting the other party.
There is no 'Lightning Network'
- Many people refer to the aggregate of all lightning channels as 'The Lightning Network' but this is a false premise.
- There are many lightning channels between many different users and funds can flow across interconnected channels as long as there is a route through peers.
- If a lightning transaction requires multiple hops it will flow through multiple interconnected channels, adjusting the balance of all channels along the route, and paying lightning transaction fees that are set by each node on the route.
Example: You have a channel with Bob. Bob has a channel with Charlie. You can pay Charlie through your channel with Bob and Bob's channel with User C.
- As a result, it is not guaranteed that every lightning user can pay every other lightning user, they must have a route of interconnected channels between sender and receiver.
Lightning in Practice
- Lightning has already found product market fit and usage as an interconnected payment protocol between large professional custodians.
- They are able to easily manage channels and liquidity between each other without trust using this interoperable protocol.
- Lightning payments between large custodians are fast and easy. End users do not have to run their own node or manage their channels and liquidity. These payments rarely fail due to professional management of custodial nodes.
- The tradeoff is one inherent to custodians and other trusted third parties. Custodial wallets can steal funds and compromise user privacy.
Sovereign Lightning
- Trusted third parties are security holes.
- Users must run their own node and manage their own channels in order to use lightning without trusting a third party. This remains the single largest friction point for sovereign lightning usage: the mental burden of actively running a lightning node and associated liquidity management.
- Bitcoin development prioritizes node accessibility so cost to self host your own node is low but if a node is run at home or office, Tor or a VPN is recommended to mask your IP address: otherwise it is visible to the entire network and represents a privacy risk.
- This privacy risk is heightened due to the potential for certain governments to go after sovereign lightning users and compel them to shutdown their nodes. If their IP Address is exposed they are easier to target.
- Fortunately the tools to run and manage nodes continue to get easier but it is important to understand that this will always be a friction point when compared to custodial services.
The Potential Fracture of Lightning
- Any lightning user can choose which users are allowed to open channels with them.
- One potential is that professional custodians only peer with other professional custodians.
- We already see nodes like those run by CashApp only have channels open with other regulated counterparties. This could be due to performance goals, liability reduction, or regulatory pressure.
- Fortunately some of their peers are connected to non-regulated parties so payments to and from sovereign lightning users are still successfully processed by CashApp but this may not always be the case going forward.
Summary
- Many people refer to the aggregate of all lightning channels as 'The Lightning Network' but this is a false premise. There is no singular 'Lightning Network' but rather many payment channels between distinct peers, some connected with each other and some not.
- Lightning as an interoperable payment protocol between professional custodians seems to have found solid product market fit. Expect significant volume, adoption, and usage going forward.
- Lightning as a robust sovereign payment protocol has yet to be battle tested. Heavy reliance on Tor, which has had massive reliability issues, the friction of active liquidity management, significant on chain fee burden for small amounts, interactivity constraints on mobile, and lack of strong privacy guarantees put it at risk.
If you have never used lightning before, use this guide to get started on your phone.
If you found this post helpful support my work with bitcoin.
-
@ 0403c86a:66d3a378
2025-06-13 12:55:09Exciting news for FOOTBALL fans ⚽! Global Sports Central 🌐 is teaming up with Predyx, a leading prediction market in the Bitcoin ecosystem, to bring you comprehensive coverage of the very first Club World Cup directly on Nostr. This partnership is all about enhancing your experience with the latest news, insights, and interactive features!
The Club World Cup will showcase the best clubs from around the globe, and with our collaboration, you’ll be fully engaged in the action. Predyx focuses on long-term outcomes, allowing you to make predictions on who will win it all. Plus, if you’re not happy with your predictions, you can sell your shares at any time and switch allegiance—after all, it’s a free market!
What You Can Expect:
-
Latest News and Match Reports: Stay updated with the latest news, in-depth match reports, and insights from the tournament, ensuring you never miss a moment.
-
Market Odds Tracking: Follow the shifts in market odds in real-time, giving you the edge when making predictions and engaging with the action.
-
Player of the Day Card: Celebrate standout performances with our Daily Player of the Day card, highlighting the top players from the tournament.
-
Game oN Frontpage: Each day, we’ll feature the frontpage of the day, showcasing the most historical matchups and capturing the feel of the game.
-
Best Moments Replays: Relive the excitement with replays of the best moments from the Cup, so you can catch all the highlights and unforgettable plays.
-
Long-Term Predictions: Engage with Predyx to forecast who will win the tournament and who will take home the MVP award, allowing you to make strategic predictions as the tournament unfolds.
-
Easy Login System: Getting started is a breeze! All you need is a Lightning wallet to log in and participate, making it simple for everyone to join in on the fun.
-
Lightning-Fast Bitcoin Payments: With the Lightning Network, placing your bets and making predictions is faster and easier than ever. Enjoy seamless transactions while you cheer for your favorite teams!
"Predyx is excited to be part of this innovative partnership," said Derek. "We’re bringing fans a new way to interact with the game they love, all while using the fast and secure Lightning Network."
Predyx is a Bitcoin-native prediction market platform running on the Lightning Network. We’re building the fastest, most trust-minimized betting engine in the world — no deposits, instant payouts, sats-native, and degen-friendly.
Global Sports Central 🌐 Your daily spin around the sports world 🔄 Stay in the loop with the latest scores, stories, and stats.
GSC360 - Where Every Angle Matters
-
-
@ b1ddb4d7:471244e7
2025-06-13 07:02:19Jason Lowery’s thesis, Softwar: A Novel Theory on Power Projection and the National Strategic Significance of Bitcoin, reframes bitcoin not merely as digital cash but as a transformative security technology with profound implications for investors and nation-states alike.
For centuries, craft brewers understood that true innovation balanced tradition with experimentation—a delicate dance between established techniques and bold new flavors.
Much like the craft beer revolution reshaped a global industry, bitcoin represents a fundamental recalibration of how humans organize value and project power in the digital age.
The Antler in the Digital Forest: Power Projection
Lowery, a U.S. Space Force officer and MIT scholar, anchors his Softwar theory in a biological metaphor: Bitcoin as humanity’s “digital antler.” In nature, antlers allow animals like deer to compete for resources through non-lethal contests—sparring matches where power is demonstrated without fatal consequences. This contrasts sharply with wolves, who must resort to violent, potentially deadly fights to establish hierarchy.
The Human Power Dilemma: Historically, humans projected power and settled resource disputes through physical force—wars, seizures, or coercive control of assets. Even modern financial systems rely on abstract power structures: court orders, bank freezes, or government sanctions enforced by legal threat rather than immediate physical reality.
Lowery argues this creates inherent fragility: abstract systems can collapse when met with superior physical force (e.g., invasions, revolutions). Nature only respects physical power.
Bitcoin’s Physical Power Engine: Bitcoin introduces a novel solution through its proof-of-work consensus mechanism. Miners compete to solve computationally intense cryptographic puzzles, expending real-world energy (megawatts) to validate transactions and secure the network.
This process converts electricity—a tangible, physical resource—into digital security and immutable property rights. Winning a “block” is like winning a sparring match: it consumes significant resources (energy/cost) but is non-destructive.
The miner gains the right to write the next page of the ledger and collect rewards, but no participant is physically harmed, and no external infrastructure is destroyed.
Table: Traditional vs. Bitcoin-Based Power Systems
Power System
Mechanism
Key Vulnerability
Resource Cost
Traditional (Fiat/Banking)
Legal abstraction, threat of state force
Centralized points of failure, corruption, political change
Low immediate cost, high systemic risk
Military/Economic Coercion
Physical force, sanctions
Escalation, collateral damage, moral hazard
Very high (lives, capital, instability)
Bitcoin (Proof-of-Work)
Competition via energy expenditure
High energy cost, concentration risk (mining)
High energy cost, low systemic risk
Softwar Theory National Strategic Imperative: Governments Are Taking Notice
Lowery’s Softwar Theory has moved beyond academia into the corridors of power, shaping U.S. national strategy:
- The Strategic Bitcoin Reserve: Vice President JD Vance recently framed bitcoin as an instrument projecting American values—”innovation, entrepreneurship, freedom, and lack of censorship”. State legislation is now underway to implement this reserve, preventing easy reversal by future administrations.
- Regulatory Transformation: The SEC is shifting from an “enforcement-first” stance under previous leadership. New initiatives include:
- Repealing Staff Accounting Bulletin 121 (SAB 121), which discouraged banks from custodying digital currency by forcing unfavorable balance sheet treatment.
- Creating the Cyber and Emerging Technologies Unit (CETU) to develop clearer crypto registration/disclosure rules.
The Investor’s Lens: Scarcity, Security, and Asymmetric Opportunity
For investors, understanding “Softwar” validates bitcoin’s unique value proposition beyond price speculation:
-
Digital Scarcity as Strategic Depth: Bitcoin’s fixed supply of 21 million makes it the only digital asset with truly inelastic supply, a programmed scarcity immune to political whims or central bank printing.
This “scarcity imperative” acts as a natural antidote to global fiat debasement. As central banks expanded money supplies aggressively (Global M2), bitcoin’s price has shown strong correlation, acting as a pressure valve for inflation concerns. The quadrennial “halving” (latest: April 2024) mechanically reduces new supply, creating built-in supply shocks as adoption grows. * The Antifragile Security Feedback Loop: Bitcoin’s security isn’t static; it’s antifragile. The network strengthens through demand: * More users → More transactions → Higher fees → More miner revenue → More hashpower (computational security) → Greater network resilience → More user confidence.
This self-reinforcing cycle contrasts sharply with traditional systems, where security is a cost center (e.g., bank security budgets, military spending). Bitcoin turns security into a profitable, market-driven activity. * Institutionalization Without Centralization: While institutional ownership via ETFs (like BlackRock’s IBIT) and corporate treasuries (MicroStrategy, Metaplanet) has surged, supply remains highly decentralized.Individuals still hold the largest share of bitcoin, preventing a dangerous concentration of control. Spot Bitcoin ETFs alone are projected to see over $20 billion in net inflows in 2025, demonstrating robust institutional capital allocation.
The Bitcoin Community: Building the Digital Antler’s Resilience
Lowery’s “Softwar” theory underscores why bitcoin’s decentralized architecture is non-negotiable. Its strength lies in the alignment of incentives across three participant groups:
- Miners: Provide computational power (hashrate), validating transactions and securing the network. Incentivized by block rewards (newly minted BTC) and transaction fees. Their physical energy expenditure is the “muscle” behind the digital antler.
- Nodes: Independently verify and enforce the protocol rules, maintaining the blockchain’s integrity. Run by users, businesses, and enthusiasts globally. They ensure decentralized consensus, preventing unilateral protocol changes.
- Users: Individuals, institutions, and corporations holding, transacting, or building on bitcoin. Their demand drives transaction fees and fuels the security feedback loop.
This structure creates “Mutually Assured Preservation”. Attacking bitcoin requires overwhelming its global, distributed physical infrastructure (miners/nodes), a feat far more complex and costly than seizing a central bank’s gold vault or freezing a bank’s assets. It transforms financial security from a centralized liability into a decentralized, physically-grounded asset.
Risks & Responsibilities
Investors and policymakers must acknowledge persistent challenges:
- Volatility: Bitcoin remains volatile, though this has decreased as markets mature. Dollar-cost averaging (DCA) is widely recommended to mitigate timing risk.
- Regulatory Uncertainty: While U.S. policy is increasingly favorable, global coordination is lacking. The EU’s MiCAR regulation exemplifies divergent approaches.
- Security & Custody: While Bitcoin’s protocol is robust, user errors (lost keys) or exchange hacks remain risks.
- Environmental Debate: Proof-of-Work energy use is scrutinized, though mining increasingly uses stranded energy/renewables. Innovations continue.
Jason Lowery’s “Softwar” theory elevates bitcoin from a financial instrument to a socio-technological innovation on par with the invention of the corporation, the rule of law, or even the antler in evolutionary biology. It provides a coherent framework for understanding why:
- Nations like the U.S. are looking to establish bitcoin reserves and embracing stablecoins—they recognize bitcoin’s role in projecting economic power non-violently in the digital age.
- Institutional Investors are allocating billions via ETFs—they see a scarce, secure, uncorrelated asset with antifragile properties.
- Individuals in hyperinflationary economies or under authoritarian regimes use bitcoin—it offers self-sovereign wealth storage immune to seizure or debasement.
For the investor, bitcoin represents more than potential price appreciation. It offers exposure to a fundamental reorganization of how power and value are secured and exchanged globally, grounded not in abstract promises, but in the unyielding laws of physics and mathematics.
Like the brewers who balanced tradition with innovation to create something enduring and valuable, bitcoin pioneers are building the infrastructure for a more resilient digital future—one computationally secured block at a time. The “Softwar” is here, and it is reshaping the landscape of p
-
@ 56e3acda:234e8a3a
2025-06-12 22:31:45In the town of Brimstone, the sounds of grunting fill the empty Stygian Theater. An age-old battle is taking place between the actress Syd and her archenemy: a zipper. She struggles to get the corset-style vest, adorned with multiple single-board computers, to fully close. The zipper holds its ground, unwavering against the “light creamy mountains” in its path. The closer it gets, the higher the mountains rise, making its journey nearly impossible. However, that’s how the costume is designed—to accentuate and enhance Syd’s already large breasts. Great for ratings, horrible for getting ready on time for filming.
"This costume needs a redesign!"
Syd takes a deep breath. She swells her chest, exhales sharply, and yanks the zipper up as fast as she can. It finally clears the hurdle.
“There!”
Two single-board computers that nestle on the chest of the costume spring off, crashing into a collection of books in front of her. Syd shrugs, grabbing the vivid purple wig that has miraculously survived the chaos. She throws it on, tucking away her brunette hair, and completes her transformation into Nerissa, Courtesan of the Uranet and host of Nerissa's Caustic Cinema.
She checks her smartwatch: 1:15 PM. Today’s shoot was supposed to begin at 1.
“Not like Jules to be running late, Guess I’ll do some research.”
She pulls out her phone and opens an old issue of her favorite zine, Dreadistary. The zine focuses on monster sightings in a certain town in the Pacific Northwest, but Syd isn’t interested in those. The real meat for her is the horror movie reviews that fill the rest of the zine. They are a goldmine for finding new movies for the show. Unfortunately, there hasn’t been a new issue in over a year.
Syd’s eyes widen as she spots the golden phrase she is looking for:public domain.
“Wait! Bloodfalls Massacre is in the public domain!?”
She grabs the nearest notebook, her pen dances across the page as she jots down the information. The director’s daughter has convinced her dad to put the film in the public domain, sticking it to the production company that has weaseled the rights to Bloodfalls Massacre 2–5 from him. They have even rebooted the franchise, starting with a loose remake of 2, modifying the characters enough to be unshackled by his vision. Syd shakes her head, a smirk playing on her lips.
“Jules and Lou are going to love this!”
The door swings open, startling Syd. She looks up to see Jules standing in the doorway, a stack of papers in hand. Jules has waist-length, damaged black hair that frames her ivory skin, and her loose white vest and shorts reveal faint blue veins that match her piercing eyes. Syd wears a warm smile as she greets her.
“Hey, Jules.”
Jules drops the stack of papers in front of Syd.
“Views are dropping massively. We can barely afford food for the next month.”
She flops onto the floor behind Syd, her body curling into an ‘n’ shape. Syd flips through the stack of papers, her initial skepticism fading as she sees the numbers. The viewership data, spanning from the first episode’s launch in October last year to July 2025, shows a gut-wrenching decline. Thankfully, their reliance on public domain horror movies has stretched their food budget as far as it can go. Jules arches her back dramatically, letting out a scream of agony.
“Enough of this public domain schlock! We need horror with a bite! Something to help punch up our jokes! Anything fulfilling!”
Syd turns to look at her friend, her heart breaks at the sight of Jules’ despair.
“If we can barely afford food, we can’t afford the rights to any film we please.”
“We could provide clout instead of money.”
The moment the word clout leaves her lips, Jules seems to regret it. The shine in her eyes vanishes, replaced by a hollow look. Syd returns to the stack of papers, hoping to find something—anything—that can help. Her eyes land on a proposal from Degrade, a newly formed TV station that is shaking up the industry. Skimming through the offer, she sees that they want the license for the show, with some on-brand integrations, in exchange for a massive upfront payment and fewer censored edits.
“You thinking of taking the Degrade offer?”
Jules covers her eyes with her hair before loudly voicing her disapproval.
“Please! I’ll never sell out to those crypto dorks.”
“It is a good offer, though.”
“You’ll regret the money when they have you dress up in tighter outfits for NFT photo-shoots.”
Syd’s nose wrinkles, and she recoils as if she’d just smelled something foul. The sight of her disgust sends Jules into a fit of laughter. She pulls more of her hair over her eyes before continuing.
“I kinda was considering it. Caustic Cinema got us control of the Stygian, the life we have in Brimstone. Didn’t want to toss away the money. But I know we’d both hate it too much.”
“Lou might enjoy it."
“That soulless puppy.”
Jules retreats into a fetal position and cutting the conversation short.
Syd adjusts her outfit, trying to make her breasts more comfortable. The movement reminds her that they are supposed to be filming now.
“No filming today?”
“Too depressed,”
Jules flips over to face Syd. A single blue eye peers out from behind her hair, searching for hope in Syd’s next words.
“Unless you found a more recent film?”
Syd hands Jules her notebook.
“Bloodfalls Massacre! That’s in the public domain?!”
Jules hops up to double-check the notes.
“Only the first one,”
“80s, in color, dumb teenagers, predatory adults, a decent amount of kills. Is that the one with an abundance of nudity?”
The franchise plays in Syd’s head as she tries to figure out which one Jules is thinking of. These types of cheesy movies are more her field of expertise than the social horror Jules prefers. After a moment, it clicks.
“That’s Bloodfalls Massacre 4: Valley Fest.”
“So not much to edit around. Not the bite I’m looking for, but…”
Jules trails off, her eyes scanning the notes Syd has written from the Dreadistary article. A small smile creeps onto her face.
“This revelation is prime for material!”
Syd feels a wave of relief. For a moment, she has managed to ease Jules’ worries. Jules pops up from reading, her energy renewed.
“Wait, do we have a copy of Bloodfalls Massacre?”
“Pretty sure I do. Give me a sec to clean up, then I’ll check,”
Syd bends down to gather the scattered papers. As she tries to tidy the mess, her eyes catch some scribbles on the back of the stack. She recognizes Lou’s messy handwriting.
“Did you look at the back of this? Lou left a note.”
We found a bunch of old PC towers. They’re in the building behind the theater. Maybe something you and Syd can salvage for the show?
Jules turns her attention back to the notebook, pulling a pen from her hair and starting to write. Syd gathers the last few scattered books and packs them up neatly. She hops up from the desk, curious about what movies they might find in the PCs. As she leaves, she notices Jules hasn’t budged.
“You’re not coming?”
Jules looks up at her, confusion etched on her face.
“You think the old execs who bummed around here really kept film backups? All you’ll probably find is weird fetish shit!”
“Wouldn’t hurt to check it out,”
Jules shakes her head, returning to her writing. Realizing Jules isn’t going to join her, Syd decides to kill two birds with one stone. She grabs the set of keys from her desk and tosses them at Jules. The jingling of the keys alerts Jules, and she catches them without fail.
“Fine, I’ll go check if there’s something salvageable while you check if I own Bloodfalls Massacre,”
Jules sways her head in approval, finally moving from the floor. They split up, Jules heads through the front of the theater while Syd goes out through one of the old doors marked “Exit.” Deep down, Syd knows Jules is probably right, but the thought of finding undiscovered movies is too irresistible to ignore.
The afternoon sun assaults Syd as soon as she steps outside. Blinking through the brightness, she sees the building is not far from the theater. She quickly jogs over, hoping to avoid the sweat that is already pooling in her suit—another con of the costume: it can't handle the summer heat.
The stench of stale plastic hangs heavy in the air, almost choking Syd as she opens the building door. Inside, sickly yellow PC towers lie scattered across the floor, their tangled wires and dusty casings creating a chilling atmosphere that makes Syd feel uneasy. She hesitates for a moment, feeling the sweat slide down her back, before stepping inside.
Closing the door to keep the heat out, Syd is left in total darkness. She mutters in dissatisfaction as she fumbles along the wall, searching for the light switch. When she finally flips it, only a few bulbs flicker to life, their dim glow barely illuminating the room. Syd’s face goes blank as she watches the bulbs struggle to stay on.
“They couldn’t fix the lights in the building?”
She walks along the makeshift path that has already been cleared, gently kicking aside PCs to give herself more room. The sheer number of them is impressive—stacks of towers form small mounds, their dislodged panels spilling out old wires like entrails. It feels less like a storage room and more like a decrepit technology graveyard.
“This is definitely more than just studio execs’ PCs,”
Syd ducks under a pile that had tipped over and joined with an adjacent stack to form a makeshift arch.
“Probably editors’ and VFX workstations!”
Her mounting excitement gets the better of her when she slips on a loose wire and crashes into a pile of PCs. A wet, congealed substance clings to her arm, and she recoils, whipping the grime off with a grimace. She double-clicks the crown of her watch to activate its flashlight mode, the dim light illuminating a few feet in front of her. It isn’t much, but it will save her from another grime attack.
The path opens up into a more spacious area where the piles of PCs are smaller and scattered. Syd pauses, realizing she doesn’t know what to look for. Obviously, the ones with wires sticking out are no good, but any of the others could be viable. She walks past a small makeshift circle of four PCs surrounding a tower in the center, deliberately ignoring it—until the light reflects something that makes her eyes sparkle.
It isn’t as yellowed as the surrounding PCs, but that isn’t what catches her attention. It is the fading stickers from the popular 80s horror series Pumpkin Patch that make her feel like she’s found a winner. She leaps toward it, kicking over two of the surrounding PCs to make room for her prize. Syd grabs the tower, only to have it slip out of her hands, leaving a slimy residue on her palms. She retches, trying her best not to add to the sickly shroud that already surrounds her. Shaking it off, she takes a deep breath and picks up the PC again. This time, the cooling touch of metal and plastic eases her discomfort.
It isn’t long before she notices a blue light focused on her watch. Its deep hue completely washes over the dim white light, snaking up her arm and stopping to focus on the single-board computer on her hip. Syd’s blood runs cold as she frantically searches for the source of the light. Her heart races until she spots it near the back exit of the room, almost hidden behind a completely destroyed PC.
It is different from the others—or what you’d expect a PC to look like. The classic rectangular silhouette is nowhere to be seen. Instead, it is cylindrical, more compact, standing like an ominous shrine of the future amidst the decaying past. The blue light intensifies, illuminating not only Syd but the entire room. A single thought runs through her mind as she shields her eyes from the intense glow:
Why is this one still plugged in?
Opening her eyes, Syd sees that the blue light has stopped. Not only that, but the room is now fully lit as the struggling bulbs have finally started to work. She gets a better look at the strange PC. It no longer has the ominous aura it has before. Instead, it looks like a prop from a science fiction movie, its chrome case warmed by a faint red light that makes it seem almost harmless in the corner of the room.
Syd hesitates for a moment. The strange PC looks like a better treasure trove than the one in her hand, but the memory of the blue light sends shivers down her spine. She decides to leave it alone. Turning quickly, she prepares to leave the storage room. She walks a little more carelessly now that she can see further ahead, but an uneasy feeling begins to swell inside her.
Not only does she feel like she is missing something, but there is an irritating pain in her right hand—a warm, burning sensation that seems to engulf it. She puts down the PC to check for any cuts where grime might seep in, but there are none. As she rubs her hand, she glances at the mess in front of her and the entrance. It is only when she sees the wired entrails of the PCs scattered everywhere that it dawns on her.
Syd turns around and looks back at the chrome PC nestled alone in the corner.
“Wasn’t it behind a broken tower?”
Immediately, something grabs her left hand. She turns to see a hand made of wires, its cold, metallic grip tightening around her wrist. She stares in bewilderment as a force pushes the maze of PCs against the entrance, barricading it. The tremendous force causes one of the three lights to go out. Shards from the towers fly toward the hand, coiling together to complete its humanoid form. Discarded side panels mold together, forming a trench coat around the figure.
Syd tries to free herself from the figure’s grasp, but the wires are entangled with her watch. The figure flicks its finger, signaling a PC to hurl itself directly at her. The impact knocks the wind out of her, sending her flying free of the humanoid’s grip. She lands a few feet away as the PC continues its trajectory, crashing into the wall with a loud thud. The impact knocks out the second light, leaving only part of the storage room lit.
Numerous white and red composite ports rush into the figure’s empty sockets, forming eyes—eyes that stare directly at Syd as she writhes in pain. She struggles to catch her breath, panic flooding her body as the dim light makes it harder to see the figure.
The figure walks slowly toward her, each clatter of its footsteps instilling fear. It holds out its hands, signaling shards of RAM to cobble together into a serrated knife. A harsh voice, lost in digital noise, escapes from the figure:
“We were supposed to rule Hollywood together.”
Syd freezes, her mind racing to make sense of the words. Then, with a surge of adrenaline, she bolts for the back exit next to the strange PC. She only gets a few steps in before wires trip her, sending her crashing to the ground face-first. Stars obscure her vision until the sight of the figure’s mangled face causes them to scatter.
A horrible smile appears on its wire-filled face. Grime pools between the haphazardly placed USB ports, forming teeth that it wipes away in excitement. It rips one of the single-board computers from Syd’s costume and gently slides it into its chest. The figure quivers as its frame seems to bulk up from the action.
"But then you ran to the first director who looked in your direction."
The figure begins to slide the knife up Syd’s costume, the sound of fabric tearing echoing through the storage room. Syd tries to fight back, but she is helpless, pinned down by the figure. Her left arm is outstretched, held in place by the wires entangled with her watch, while her legs are bound together, preventing her from kicking. She frantically looks around for something to use as a weapon, but her blood runs cold when she sees her right hand. It has become a wild jumble of pixels, the burning pain now subsides.
“Not a…”
A sharp nick cuts off her words as the blade slices her chest. The figure uses extra force when the knife reaches Syd’s chest, the dullness of the RAM blade struggling to cut through the extra padding. Blood flows from the shallow cut as Syd begins to lose hope. Scenes from her life flash before her: meeting Jules when they are nine, Jules begging her to star in a middle school film, her mom and Jules comforting her as she watches her favorite movie at sixteen. Tears well up in her eyes as she thinks this might be the end.
The faint sound of banging stops Syd’s tears instantly. She concentrates on the noise, trying to pinpoint its source. With each bang, it grows louder and louder until she realizes it is coming from the entrance of the building.
It must be Jules and Lou!
The thought gives Syd a glimmer of hope. Now, all she has to do is survive long enough for backup to arrive. But when she sees the knife pointed directly at her chest, she knows she has no chance.
Unless…
She looks at her right hand again, staring hard to find something that resembles her finger. When she spots it, she concentrates on trying to move it. The figure reels back the knife as Syd desperately wills her finger to twitch. Suddenly, she sees it move. She lets out a gasp as the figure prepares to stab her.
“In the end, you’re not cut out for the business,”
It drives the knife down, but Syd grabs its hand just before the blade can plunge into her chest. The figure is taken aback by her strength and struggles to complete its action. Using all her might, Syd pushes the knife further and further away. Her breath becomes ragged as the banging grows louder and louder.
Just a bit more…
That is all she can think about as she holds the figure back. Visibly enraged, the figure roars as wires protrude from its chest. The shrill squeal shatters Syd’s eardrums, but she continues to hold it back. The wires rip off the last of the single-board computers, dragging them back to the humanoid. Its eyes roll back as it quivers, bulking up again with newfound strength. The figure overwhelms Syd, but by then, it is too late.
A thunderous boom shakes the entire storage room, extinguishing the last of the light. PCs rain down, freed from the barricade they have formed. The clattering noise pulls the figure’s attention away from Syd. In the midst of the chaos, drenched in sunlight, a figure enters the storage room.
The humanoid leaps away from Syd, ready to fight whoever has interrupted its killing. Clutching the fragments of her costume, Syd’s hope is replaced by confusion. The silhouette is much larger than Jules and wields what appears to be a massive hammer. Syd knows nothing like that exists in Brimstone.
“Man, that’s one nasty virus,”
A gruff voice bellows from the silhouette who is revealed to be a woman. As the woman steps into the light, her appearance becomes clear. She is incredibly muscular, looking like a hero straight out of a comic book. Her piercing deep blue eyes and shining blonde hair give her an almost otherworldly presence. She lowers her hammer, revealing that it is almost as large as she is. The woman notices Syd and flashes a bright white smile.
“Don’t worry! I’ll kill it in a heartbeat!”
The words are lost on Syd against the ringing in her ears, but the woman’s thumbs-up reassures her that help has indeed arrived. Stunned by the size of the hammer, the figure signals for more broken RAM to raise its knife to match. In an instant, it lunges at the woman, attempting to slice off her head. Effortlessly, the woman spins the hammer and blocks the attack. Her warm smile turns to a playful grin as the figure’s eyes bulge in confusion.
“You’re pretty strong for an anomaly,”
The figure jumps back, crouching like an animal backed into a corner. Wires rip through its trench coat, searching for any PCs that are still intact. It hurls five of them at the woman, waiting a beat before charging at her. The woman spins the hammer, shattering each of the PCs as they approach.
After the beat, the figure absorbs the shattered PCs, growing larger in mass. It prepares its knife, now in the shape of a machete, to attack the woman. Unexpectedly, the woman lunges at the figure, swinging the hammer down and completely destroying not only the machete but the figure’s arm as well. A horrible shriek comes from the figure as it slowly backs away from the woman.
Grime falls from the figure’s face as fear begins to grip it. It looks around, desperate for something to use, but there are no PCs left. Trembling, it believes it is out of options—until its eyes land on Syd, frozen in awe. She has been holding her torn costume together with her left hand, her smartwatch now fully exposed.
The figure grimaces at the thought of using her watch as a last resort. It is a treat to savor after killing Syd, but it is the only way to ensure its survival. It sends most of the newly absorbed wires to its legs, its mass tripling as it prepares to pounce on Syd in one fell swoop.
Unfortunately for it, the woman sees what it is about to do.
“Oh no, you don’t!”
The woman twists the handle of her hammer, causing the head to glow with a fierce light. She charges at full speed, twisting her body for the final attack. With a mighty swing, she brings the hammer down on the figure, crushing it completely. The impact shakes the ground, drowning out the figure’s shriek.
The woman smiles with satisfaction as she slings the hammer over her shoulder. She glances around the storage room, her eyes lighting up when she notices the chrome PC, untouched by the chaos. She turns to Syd.
“Look, you—”
She starts, then gasps. She hasn’t gotten a good look at Syd before, but now she does. Shaking her head, she approaches Syd, who is still sitting on the floor, clutching her torn costume.
“Wait, are you Nerissa from Caustic Cinema?!”
The woman asks trying hold back her excitement. Syd’s eyes widen in shock.
“Y. Yes,”
The woman’s eyes light up even more.
“I’m a huge fan! Can I get an autograph?”
Still stunned by the fact that her savior is also a fan, Syd breathes a sigh of relief. At least there is a way to repay her.
“Do you have a pen?”
The woman scrambles around, pulling a notebook and pen from her back pocket. Syd reaches for the pen but freezes halfway. Her right hand is back to normal. She stares at it in confusion, slowly turning it to make sure it is really healed. She realizes she’s been staring too long when the woman gives her a questioning look. Syd smiles sheepishly before grabbing the pen to sign the notebook.
Thanks for saving me. From Nerissa.
She pauses, realizing she doesn’t know who to make it out to. Then she remembers hearing the word “virus” over the ringing earlier.
“Should I make it out to Virus Buster?”
The woman’s eyes light up even more.
“YES!”
Syd finishes the autograph, and the woman holds the notebook as if it is a golden treasure. Then, as if remembering something, the woman leans closer to Syd’s ear and whispers,
“Hey, I know it’s the backdrop of the show, but you really shouldn’t mess with Uranet servers. Nothing but trouble.”
The revelation hits Syd like a tidal wave, leaving her speechless. The woman leaves the storage room, still admiring the autograph. She did a little jump, unable to contain her excitement.
“Best job ever!”
The roar of a motorcycle fades into the distance as a desperate scream echoes through the storage room.
“Syd!”
Jules bursts into the room, her face pale with worry. Right behind her is Lou, who stops in confusion as the sound of the motorcycle disappears.
“What the hell is Stars and Stripe doing here?”
“Shut up, Lou! And help me with Syd!”
She circles Syd, checking her for injuries. The sight of the blood and the marks from the wires drains what little color Jules has left. What worries her most is how unresponsive Syd is. She hasn’t even noticed Jules, despite her frantic circling. Jules tries to see what Syd is staring at, but there is nothing unusual among the scattered computer parts.
Suddenly, Syd grabs Jules, causing her to jump. Syd’s grip is uncharacteristically strong, and Jules can see her skin beginning to bruise. The warm, familiar look in Syd’s eyes is gone, replaced by a distant, calculating gaze. Jules worries that Syd has been traumatized by what happened, but it is the opposite. Syd’s mind is racing, trying to process the discovery and the concerns Jules has expressed earlier.
A mad smile spreads across Syd’s face as she reaches a conclusion. Jules’ unease grows until she hears a stunned gasp from Lou.
“Holy!”
Jules looks at him, confused, until she follows his gaze back to Syd. Her eyes widen as she realizes why Lou has gasped. Syd has used both hands to hold Jules in place, leaving nothing to hold her costume together. Her supple breasts are exposed, their warm vanilla hue glowing in the dim light of the storage room. Even the slightest movements - like Jules turning - cause them to bounce gently. Totally distracting Lou.
Jules' face turns red with a mixture of embarrassment and anger. She can't believe he is more focused on gawking than checking if Syd is okay. Just as she is about to yell at him, Syd pulls her closer and locks eyes with her. The warmth Jules remembers from Syd's eyes and smile is back, easing her worries.
“I know how to save the show!”
-
@ 57d1a264:69f1fee1
2025-06-12 06:00:19From designer Anna Cairns, the workhorse monospace typeface is rooted in feminist theory.
Across CMM Coda’s subtly imperfect, analogue-inspired letterforms – based on the IBM Selectric typewriter’s typeface, Dual Basic – Anna practically and conceptually brings together the feminist legacy of software and typewriters with the aesthetic sensibilities of the genre associated with the industry. Additionally, CMM Coda enables Anna to explore her intrigue in the blurry terminology used in text production, such as typing, coding and writing, “especially now that most text is created digitally,” Anna says, with typefaces being software in their own right. “We also associate a certain look with each of these modalities,” she continues, “so my idea was to create a typeface that can jump all of these genres simply through a play with white space,” an approach that resulted in CMM Coda’s multiple styles.
Learn more about Comma at https://commatype.com/, a new foundry founded by the Berlin-based type designer Anna Cairns.
Continue reading at https://www.itsnicethat.com/articles/comma-type-cmm-coda-graphic-design-project-110625
https://stacker.news/items/1004142
-
@ 87f5ac31:60daf34c
2025-06-14 03:16:52수정 test
-
@ 97c70a44:ad98e322
2025-06-06 20:48:33Vibe coding is taking the nostr developer community by storm. While it's all very exciting and interesting, I think it's important to pump the brakes a little - not in order to stop the vehicle, but to try to keep us from flying off the road as we approach this curve.
In this note Pablo is subtweeting something I said to him recently (although I'm sure he's heard it from other quarters as well):
nostr:nevent1qvzqqqqqqypzp75cf0tahv5z7plpdeaws7ex52nmnwgtwfr2g3m37r844evqrr6jqy2hwumn8ghj7un9d3shjtnyv9kh2uewd9hj7qghwaehxw309aex2mrp0yh8qunfd4skctnwv46z7qg6waehxw309ac8junpd45kgtnxd9shg6npvchxxmmd9uqzq0z48d4ttzzkupswnkyt5a2xfkhxl3hyavnxjujwn5k2k529aearwtecp4
There is a naive, curmudgeonly case for simply "not doing AI". I think the intuition is a good one, but the subject is obviously more complicated - not doing it, either on an individual or a collective level, is just not an option. I recently read Tools for Conviviality by Ivan Illich, which I think can help us here. For Illich, the best kind of tool is one which serves "politically interrelated individuals rather than managers".
This is obviously a core value for bitcoiners. And I think the talks given at the Oslo Freedom Forum this year present a compelling case for adoption of LLMs for the purposes of 1. using them for good, and 2. developing them further so that they don't get captured by corporations and governments. Illich calls both the telephone and print "almost ideally convivial". I would add the internet, cryptography, and LLMs to this list, because each one allows individuals to work cooperatively within communities to embody their values in their work.
But this is only half the story. Illich also points out how "the manipulative nature of institutions... have put these ideally convivial tools at the service of more [managerial dominance]."
Preventing the subversion and capture of our tools is not just a matter of who uses what, and for which ends. It also requires an awareness of the environment that the use of the tool (whether for virtuous or vicious ends) creates, which in turn forms the abilities, values, and desires of those who inhabit the environment.
The natural tendency of LLMs is to foster ignorance, dependence, and detachment from reality. This is not the fault of the tool itself, but that of humans' tendency to trade liberty for convenience. Nevertheless, the inherent values of a given tool naturally gives rise to an environment through use: the tool changes the world that the tool user lives in. This in turn indoctrinates the user into the internal logic of the tool, shaping their thinking, blinding them to the tool's influence, and neutering their ability to work in ways not endorsed by the structure of the tool-defined environment.
The result of this is that people are formed by their tools, becoming their slaves. We often talk about LLM misalignment, but the same is true of humans. Unreflective use of a tool creates people who are misaligned with their own interests. This is what I mean when I say that AI use is anti-human. I mean it in the same way that all unreflective tool use is anti-human. See Wendell Berry for an evaluation of industrial agriculture along the same lines.
What I'm not claiming is that a minority of high agency individuals can't use the technology for virtuous ends. In fact, I think that is an essential part of the solution. Tool use can be good. But tools that bring their users into dependence on complex industry and catechize their users into a particular system should be approached with extra caution. The plow was a convivial tool, and so were early tractors. Self-driving John Deere monstrosities are a straightforward extension of the earlier form of the technology, but are self-evidently an instrument of debt slavery, chemical dependency, industrial centralization, and degradation of the land. This over-extension of a given tool can occur regardless of the intentions of the user. As Illich says:
There is a form of malfunction in which growth does not yet tend toward the destruction of life, yet renders a tool antagonistic to its specific aims. Tools, in other words, have an optimal, a tolerable, and a negative range.
The initial form of a tool is almost always beneficial, because tools are made by humans for human ends. But as the scale of the tool grows, its logic gets more widely and forcibly applied. The solution to the anti-human tendencies of any technology is an understanding of scale. To prevent the overrun of the internal logic of a given tool and its creation of an environment hostile to human flourishing, we need to impose limits on scale.
Tools that require time periods or spaces or energies much beyond the order of corresponding natural scales are dysfunctional.
My problem with LLMs is:
- Not their imitation of human idioms, but their subversion of them and the resulting adoption of robotic idioms by humans
- Not the access they grant to information, but their ability to obscure accurate or relevant information
- Not their elimination of menial work, but its increase (Bullshit Jobs)
- Not their ability to take away jobs, but their ability to take away the meaning found in good work
- Not their ability to confer power to the user, but their ability to confer power to their owner which can be used to exploit the user
- Not their ability to solve problems mechanistically, but the extension of their mechanistic value system to human life
- Not their explicit promise of productivity, but the environment they implicitly create in which productivity depends on their use
- Not the conversations they are able to participate in, but the relationships they displace
All of these dysfunctions come from the over-application of the technology in evaluating and executing the fundamentally human task of living. AI work is the same kind of thing as an AI girlfriend, because work is not only for the creation of value (although that's an essential part of it), but also for the exercise of human agency in the world. In other words, tools must be tools, not masters. This is a problem of scale - when tool use is extended beyond its appropriate domain, it becomes what Illich calls a "radical monopoly" (the domination of a single paradigm over all of human life).
So the important question when dealing with any emergent technology becomes: how can we set limits such that the use of the technology is naturally confined to its appropriate scale?
Here are some considerations:
- Teach people how to use the technology well (e.g. cite sources when doing research, use context files instead of fighting the prompt, know when to ask questions rather than generate code)
- Create and use open source and self-hosted models and tools (MCP, stacks, tenex). Refuse to pay for closed or third-party hosted models and tools.
- Recognize the dependencies of the tool itself, for example GPU availability, and diversify the industrial sources to reduce fragility and dependence.
- Create models with built-in limits. The big companies have attempted this (resulting in Japanese Vikings), but the best-case effect is a top-down imposition of corporate values onto individuals. But the idea isn't inherently bad - a coding model that refuses to generate code in response to vague prompts, or which asks clarifying questions is an example. Or a home assistant that recognized childrens' voices and refuses to interact.
- Divert the productivity gains to human enrichment. Without mundane work to do, novice lawyers, coders, and accountants don't have an opportunity to hone their skills. But their learning could be subsidized by the bots in order to bring them up to a level that continues to be useful.
- Don't become a slave to the bots. Know when not to use it. Talk to real people. Write real code, poetry, novels, scripts. Do your own research. Learn by experience. Make your own stuff. Take a break from reviewing code to write some. Be independent, impossible to control. Don't underestimate the value to your soul of good work.
- Resist both monopoly and "radical monopoly". Both naturally collapse over time, but by cultivating an appreciation of the goodness of hand-crafted goods, non-synthetic entertainment, embodied relationship, and a balance between mobility and place, we can relegate new, threatening technologies to their correct role in society.
I think in all of this is implicit the idea of technological determinism, that productivity is power, and if you don't adapt you die. I reject this as an artifact of darwinism and materialism. The world is far more complex and full of grace than we think.
The idea that productivity creates wealth is, as we all know, bunk. GDP continues to go up, but ungrounded metrics don't reflect anything about the reality of human flourishing. We have to return to a qualitative understanding of life as whole, and contextualize quantitative tools and metrics within that framework.
Finally, don't believe the hype. Even if AI delivers everything it promises, conservatism in changing our ways of life will decelerate the rate of change society is subjected to and allow time for reflection and proper use of the tool. Curmudgeons are as valuable as technologists. There will be no jobspocalypse if there is sufficient political will to value human good over mere productivity. It's ok to pump the breaks.
-
@ b1ddb4d7:471244e7
2025-06-13 06:01:13Paris, France – June 6, 2025 – Flash, the easiest Bitcoin payment gateway for businesses, just announced a new partnership with the Bitcoin Only Brewery, marking the first-ever beverage company to leverage Flash for seamless Bitcoin payments.
Bitcoin Buys Beer Thanks to Flash!
As Co-Founder of Flash, it's not every day we get to toast to a truly refreshing milestone.
Okay, jokes aside.
We're super buzzed to see our friends at @Drink_B0B
Bitcoin Only Brewery using Flash to power their online sales!The first… pic.twitter.com/G7TWhy50pX
— Pierre Corbin (@CierrePorbin) June 3, 2025
Flash enables Bitcoin Only Brewery to offer its “BOB” beer with, no-KYC (Know Your Customer) delivery across Europe, priced at 19,500 sats (~$18) for the 4-pack – shipping included.
The cans feature colorful Bitcoin artwork while the contents promise a hazy pale ale: “Each 33cl can contains a smooth, creamy mouthfeel, hazy appearance and refreshing Pale Ale at 5% ABV,” reads the product description.
Pierre Corbin, Co-Founder of Flash, commented: “Currently, bitcoin is used more as a store of value but usage for payments is picking up. Thanks to new innovation on Lightning, bitcoin is ready to go mainstream for e-commerce sales.”
Flash, launched its 2.0 version in March 2025 with the goal to provide the easiest Bitcoin payment gateway for businesses worldwide. The platform is non-custodial and can enable both digital and physical shops to accept Bitcoin by connecting their own wallets to Flash.
By leveraging the scalability of the Lightning Network, Flash ensures instant, low-cost transactions, addressing on-chain Bitcoin bottlenecks like high fees and long wait times.
Bitcoin payment usage is growing thanks to Lightning
In May, fast-food chain Steak ‘N Shake went viral for integrating bitcoin at their restaurants around the world. In the same month, the bitcoin2025 conference in Las Vegas set a new world record with 4,000 Lightning payments in one day.
According to a report by River Intelligence, public Lightning payment volume surged by 266% from August 2023 to August 2024. This growth is also reflected in the overall accessibility of lighting infrastructure for consumers. According to Lightning Service Provider Breez, over 650 Million users now have access to the Lightning Network through apps like CashApp, Kraken or Strike.
Bitcoin Only Brewery’s adoption of Flash reflects the growing trend of businesses integrating Bitcoin payments to cater to a global, privacy-conscious customer base. By offering no-KYC delivery across Europe, the brewery aligns with the ethos of decentralization and financial sovereignty, appealing to the increasing number of consumers and businesses embracing Bitcoin as a legitimate payment method.
“Flash is committed to driving innovation in the Bitcoin ecosystem,” Corbin added. “We’re building a future where businesses of all sizes can seamlessly integrate Bitcoin payments, unlocking new opportunities in the global market. It’s never been easier to start selling in bitcoin and we invite retailers globally to join us in this revolution.”
For businesses interested in adopting Bitcoin payments, Flash offers a straightforward onboarding process, low fees, and robust support for both digital and physical goods. To learn more, visit paywithflash.com.
About Flash
Flash is the easiest Bitcoin payment gateway for businesses to accept payments. Supporting both digital and physical enterprises, Flash leverages the Lightning Network to enable fast, low-cost Bitcoin transactions. Launched in its 2.0 version in March 2025, Flash is at the forefront of driving Bitcoin adoption in e-commerce.
About Bitcoin Only Brewery
Bitcoin Only Brewery (@Drink_B0B) is a pioneering beverage company dedicated to the Bitcoin ethos, offering high-quality beers payable exclusively in Bitcoin. With a commitment to personal privacy, the brewery delivers across Europe with no-KYC requirements.
Media Contact:
Pierre Corbin
Co-Founder, Flash
Email: press@paywithflash.com
Website: paywithflash.comPhotos paywithflash.com/about/pressHow Flash Enables Interoperable, Self-Custodial Bitcoin Commerce
-
@ dfa02707:41ca50e3
2025-06-14 03:03:02Contribute to keep No Bullshit Bitcoin news going.
-
Version 1.3 of Bitcoin Safe introduces a redesigned interactive chart, quick receive feature, updated icons, a mempool preview window, support for Child Pays For Parent (CPFP) and testnet4, preconfigured testnet demo wallets, as well as various bug fixes and improvements.
-
Upcoming updates for Bitcoin Safe include Compact Block Filters.
"Compact Block Filters increase the network privacy dramatically, since you're not asking an electrum server to give you your transactions. They are a little slower than electrum servers. For a savings wallet like Bitcoin Safe this should be OK," writes the project's developer Andreas Griffin.
- Learn more about the current and upcoming features of Bitcoin Safe wallet here.
What's new in v1.3
- Redesign of Chart, Quick Receive, Icons, and Mempool Preview (by @design-rrr).
- Interactive chart. Clicking on it now jumps to transaction, and selected transactions are now highlighted.
- Speed up transactions with Child Pays For Parent (CPFP).
- BDK 1.2 (upgraded from 0.32).
- Testnet4 support.
- Preconfigured Testnet demo wallets.
- Cluster unconfirmed transactions so that parents/children are next to each other.
- Customizable columns for all tables (optional view: Txid, Address index, and more)
- Bug fixes and other improvements.
Announcement / Archive
Blog Post / Archive
GitHub Repo
Website -
-
@ df478568:2a951e67
2025-06-12 18:58:48How To Mine Your Own Vanity Nostr Key
note. This article works best on https://habla.news/u/marc@primal.net/how-to-mine-a-nostr-vanity-key-with-rana
Rana is a vanity npub generator.
I'll show you how to use it on Ubuntu.
If you're not Linux ninja and use Windows instead of Linux ninja weapons, you can still use Linux with Virtualbox, free ans open source virtualization software. Head over to
https://www.virtualbox.org/ to learn more. They also have an enterprise business if you need that sort of thing, you can learn more at https://shop.oracle.com/
Rana is a nostr vanity key mining program. The source code can be found here.
Rana Is On GitHub
https://github.com/grunch/rana
Since rana already has pretty good docs, I decided to make a video instead of write about this because It's easier to see rana in action than it is to write about Rana. I went off on some tangents, so I might edit this down later, but I hope it helps you mine your own nostr key.
nevent1qqsfk7a000m8zc3ptsuu4vytepqc9eedceclpt2ns9pzlech5cpaflceng5al
Show Notes
https://github.com/grunch/rana
https://virtualbox.org/
https://doc.rust-lang.org/cargo/getting-started/installation.html
cargo run --release -- --vanity-n-prefix=juxtap0se
☮️
nostr:npub1marc26z8nh3xkj5rcx7ufkatvx6ueqhp5vfw9v5teq26z254renshtf3g0
-
@ b1ddb4d7:471244e7
2025-06-14 02:01:08This article was originally published on dev.to by satshacker.
Alright, you’ve built a useful and beautiful website, tool or app. However, monetization isn’t a priority and you’d rather keep the project free, ads-free and accessible?
Accepting donations would be an option, but how? A PayPal button? Stripe? Buymeacoffe? Patreon?
All of these services require a bank account and KYC verification, before you can send and receive donations – not very convenient.
If we only could send value over the internet, with just one click and without the need of a bank account…
Oh, hold on, that’s bitcoin. The decentralized protocol to send value across the globe. Money over TCP/IP.
In this article, we’ll learn how anyone can easily add a payment button or donation widget on a website or app.
Let’s get into it.
Introduction
Bitcoin is digital money that you can send and receive without the need for banks. While bitcoin is extremely secure, it’s not very fast. The maximum transactions per second (TPS) the network can handle is about 7. Obviously that’s not useful for daily payments or microtransactions.
If you’d like to dig deeper into how bitcoin works, a great read is “Mastering Bitcoin” by Andreas Antonopoulos.
Bitcoin vs Lightning
If you’d like to receive bitcoin donations “on-chain” all you need is a bitcoin wallet. You simply display your bitcoin address on your site and that’s it. You can receive donations.
It would look something like this; 1A1zP1eP5QGefi2DMPTfTL5SLmv7DivfNa
Instead of showing the actual bitcoin address, you can also turn it into a QR code.
However, this is not a recommended solution. Using static on-chain addresses has two major downsides. It lowers privacy for you and your donnors and it’s a UTXO disaster because many small incoming transactions could beocme hard to consolidate in the future.
For donations and small transactions, the Lightning Network is the better option. Lightning allows for instant settlement with fees only a fraction of a cent.
Similar to bitcoin, you have the choice between non-custodial and custodial wallets. This means, either you have full control over your money or the wallet provider has.
Option 1: Lightning Address
With the lightning address feature, you an easily receive donations to an email like address.
It looks like this: yourname@wallet.com
Many wallets support lightning addresses and make it easy to create one. Then, you simple add the address to your donation page and you’re ready to receive tips.
You can also add a link link as in lightning:yourname@wallet.com and compatible lightning wallets and browser wallets will detect the address.
Option 2: Lightning Donation Widgets
If you like to take it a step further, you can also create a more enhanced donation checkout flow. Of course you could programm something yourself, there are many open source libraries you can build upon. If you want a simple plug-and-play solution, here are a couple of options:
Name
Type
Registration
SatSale
Self-hosted
No KYC
BTCPay Server
Self-hosted
No KYC
Pay With Flash
Widget
Email
Geyser Fund
Widget
Email
The Giving Block
Hosted
KYC
OpenNode
Hosted
KYC
SatSale (GitHub)
Lightweight, self-hosted Bitcoin/Lightning payment processor. No KYC.
Ideal for developers comfortable with server management. Simple to deploy, supports both on-chain and Lightning, and integrates with WooCommerce.
BTCPay Server
Powerful, open-source, self-hosted processor for Bitcoin and Lightning. No KYC.
Supports multiple currencies, advanced features, and full privacy. Requires technical setup and maintenance. Funds go directly to your wallet; great for those seeking full control.
Pay With Flash
Easiest for indie hackers. Add a donation widget with minimal code and no KYC. Payments go directly to your wallet for a 1.5% fee.
Setup Steps:
- Sign up at PayWithFlash.com
- Customize your widget in the dashboard
- Embed the code:
- Test to confirm functionality
Benefits:
- Minimal technical skills required
- Supports one-time or recurring donations
- Direct fund transfer, no intermediaries
Geyser Fund
Crowdfunding platform. Widget-based, connects to your wallet, email registration.Focused on Bitcoin crowdfunding, memberships and donations.
The Giving Block
Hosted, KYC required. Integrates with fiat and crypto, best for nonprofits or larger organizations.
OpenNode
Hosted, KYC required. Accept Bitcoin payments and donations; supports conversion to fiat, suitable for businesses and nonprofits.
Summary
- Fast, low-code setup: Use Pay With Flash or Geyser Fund.
- Privacy and control: Choose SatSale or BTCPay Server (requires technical skills).
- Managed, compliant solutions: The Giving Block or OpenNode.
Choose based on your technical comfort, privacy needs, and project scale.
I hope this article helped you. If you added bitcoin donations, share your link in the comments and I will send you a few satoshis maybe
-
@ 472f440f:5669301e
2025-06-12 05:11:12Marty's Bent
via me
I had a completely different newsletter partially written earlier tonight about whether or not "this cycle is different" when this nagging thought entered my head. So I'm going to write about this and maybe I'll write about the dynamics of this cycle compared to past cycles tomorrow.
A couple of headlines shot across my desk earlier tonight in relation to the potential escalation of kinetic warfare in the Middle East. Apparently the U.S. Embassy in Iraq was sent a warning and evacuation procedures were initiated. Not too long after, the world was made aware that the United States and Israel are contemplating an attack on Iran due to the "fact" that Iran may be close to producing nuclear weapins. The initial monkey brain reaction that I had to these two headlines was, "Oh shit, here we go again. We're going to do something stupid." My second reaction was, "Oh shit, here we go again, I've seen these two exact headlines many times over the years and they've proven to be lackluster if you're a doomer or blood thirsty war monger." Nothing ever happens.
As I venture into my mid-30s and reflect on a life filled with these types of headlines and my personal reactions to these headlines, I'm finally becoming attuned to the fact that the monkey brain reactions aren't very productive at the end of the day. Who knows exactly what's going to happen in Iraq or Iran and whether or not kinetic warfare escalates and materializes from here? Even though I'm a "blue-blooded taxpaying American citizen" who is passively and unwillingly contributing to the war machine and the media industrial complex, there's really nothing I can do about it.
The only thing I can do is focus on what is in front of me. What I have control of. And attempt to leverage what I have control of to make my life and the life of my family as good as humanly possible. Ignoring the external and turning inward often produces incredible results. Instead of worrying about what the media wants you to believe at any given point in time, you simply look away from your computer screen, survey the physical space which you're operating in and determine what you have, what you need and how you can get what you need. This is a much more productive way to spend your time.
This is what I want to touch on right now. There's never been a better time in human history to be productive despite what the algorithm on X or the mainstream media will lead you to believe. Things aren't as great as they could be, but they're also not as bad as you're being led to believe. We live in the Digital Age and the Digital Age provides incredible resources that you can leverage to make YOUR life better.
Social media allows you to create a platform without spending any money. AI allows you to build tools that are beneficial to yourself and others with very little money. And bitcoin exists to provide you with the best form of money that you can save in with the knowledge that your relative ownership of the overall supply isn't going to change. No matter what happens in the external world.
If you can combine these three things to make your life better and - by extension - potentially make the lives of many others better, you're going to be well off in the long run. Combining these three things isn't going to result in immediate gratification, but if you put forth a concerted effort, spend the time, have some semblance of patience, and stick with it, I truly believe that you will benefit massively in the long run. Without trying to sound like a blowhard, I truly believe that this is why I feel relatively calm (despite my monkey brain reactions to the headlines of the day) at this current point in time.
We've entered the era of insane leaps in productivity and digital hard money that cannot be corrupted. The biggest mistake you can make in your life right now is overlooking the confluence of these two things. With an internet connection, an idea, some savvy, and hard work you can materially change your life. Create something that levels up your knowledge, that enables you to get a good job in the real world, or to create a company of your own. Bring your talents to the market, exchange them for money, and then funnel that money into bitcoin (if you're not being paid in it already). We may be at the beginning of a transition from the high velocity trash economy to the high leverage agency economy run on sound money and applied creativity.
These concepts are what you should be focusing most of your time and attention to today and in the years ahead. Don't get distracted by the algorithm, the 30-second video clips, the headlines filled with doom, and the topics of the 24 hour news cycle. I'll admit, I often succumb to them myself. But, as I get older and develop a form of pattern recognition that can only be attained by being on this planet for a certain period of time, it is becoming very clear that those things are not worth your attention.
Living by the heuristic that "nothing ever happens" is a pretty safe bet. Funnily enough, it's incredibly ironic that you're led to believe that something is happening every single day, and yet nothing ever happens. By getting believing that something happens every day you are taking your attention away from doing things that happen to make your life better.
Tune out the noise. Put on the blinders. Take advantage of the incredible opportunities that lie before you. If enough of you - and many others who do not read this newsletter - do this, I truly believe we'll wake up to find that the world we live in is a much better place.
Nothing ever happens, so make something happen.
Intelligence Officials Are Quietly Becoming Bitcoin Believers
Ken Egan, former CIA Deputy Chief of Cyber Operations, revealed a surprising truth on TFTC: the intelligence community harbors numerous Bitcoin advocates. Egan explained that intelligence professionals uniquely understand how governments weaponize financial systems through sanctions and account freezing. Having wielded these tools themselves, they recognize the need for personal financial sovereignty. He shared compelling anecdotes of discovering colleagues with "We are all Satoshi" stickers and a European chief of station paying for dinner with a BlockFi card to earn Bitcoin rewards.
"I think there are a lot of Bitcoiners, not just at CIA, but across the whole national security establishment... they're in it for the exact same reasons everybody else is." - Ken Egan
The Canadian trucker protests served as a pivotal moment, Egan noted. Watching Western governments freeze citizens' bank accounts for political dissent struck a nerve among intelligence professionals who previously viewed financial weaponization as a tool reserved for foreign adversaries. This awakening has created unlikely allies within institutions many Bitcoiners distrust.
Check out the full podcast here for more on Bitcoin's national security implications, privacy tech prosecutions, and legislative priorities.
Headlines of the Day
Stripe Buys Crypto Wallet Privy After Bridge Deal - via X
Trump Calls CPI Data "Great" Urges Full Point Fed Cut - via X
Bitcoin Hashrate Reaches New All-Time High - via X
Get our new STACK SATS hat - via tftcmerch.io
Bitcoin’s Next Parabolic Move: Could Liquidity Lead the Way?
Is bitcoin’s next parabolic move starting? Global liquidity and business cycle indicators suggest it may be.
Read the latest report from Unchained and TechDev, analyzing how global M2 liquidity and the copper/gold ratio—two historically reliable macro indicators—are aligning once again to signal that a new bitcoin bull market may soon begin.
Ten31, the largest bitcoin-focused investor, has deployed $150.00M across 30+ companies through three funds. I am a Managing Partner at Ten31 and am very proud of the work we are doing. Learn more at ten31.vc/invest.
Final thought...
Life is good.
Download our free browser extension, Opportunity Cost: https://www.opportunitycost.app/ start thinking in SATS today.
Get this newsletter sent to your inbox daily: https://www.tftc.io/bitcoin-brief/
Subscribe to our YouTube channels and follow us on Nostr and X:
-
@ c631e267:c2b78d3e
2025-06-13 18:21:13Ich dachte immer, jeder Mensch sei gegen den Krieg, \ bis ich herausfand, dass es welche gibt, \ die nicht hingehen müssen. \ Erich Maria Remarque
Was sollte man von einem Freitag, den 13., schon anderes erwarten?, ist man versucht zu sagen. Jedoch braucht niemand abergläubisch zu sein, um den heutigen Tag als unheilvoll anzusehen. Der israelische «Präventivschlag» von heute Nacht gegen militärische und nukleare Ziele im Iran könnte allem Anschein nach zu einem längeren bewaffneten Konflikt führen – und damit unweigerlich zu weiteren Opfern.
«Wir befinden uns im Krieg», soll ein ranghoher israelischer Militärvertreter gesagt haben, und der Iran wertet den israelischen Angriff laut seinem Außenminister als Kriegserklärung. Na also. Der Iran hat Vergeltungsschläge angekündigt und antwortete zunächst mit Drohnen. Inzwischen ist eine zweite israelische Angriffswelle angelaufen. Ob wir wohl künftig in den Mainstream-Medien durchgängig von einem «israelischen Angriffskrieg auf den Iran» hören und lesen werden?
Dass die zunehmenden Spannungen um das iranische Atomprogramm zu einer akuten Eskalation im Nahen Osten führen könnten, hatte Transition News gestern berichtet. Laut US-Beamten sei Israel «voll bereit», den Iran in den nächsten Tagen anzugreifen, hieß es in dem Beitrag. Heute ist das bereits bittere Realität.
Der Nahe Osten steht übrigens auch auf der Themenliste des diesjährigen Bilderberg-Treffens, das zurzeit in Stockholm stattfindet. Viele Inhalte werden wir allerdings mal wieder nicht erfahren, denn wie immer hocken die «erlauchten» Persönlichkeiten aus Europa und den USA «informell» und unter größter Geheimhaltung zusammen, um über «Weltpolitik» zu diskutieren. Auf der Teinehmerliste stehen auch einige Vertreter aus der Schweiz und aus Deutschland.
Die Anwesenheit sowohl des aktuellen als auch des vorigen Generalsekretärs der NATO lässt vermuten, dass man bei dem Meeting weniger über das Thema «Neutralität» sprechen dürfte. Angesichts des Zustands unseres Planeten ist das schade, denn der Ökonom Jeffrey Sachs hob kürzlich in einem Interview die Rolle der Neutralität in geopolitischen Krisen hervor. Mit Blick auf die Schweiz betonte er, der zunehmende Druck zur NATO-Annäherung widerspreche nicht nur der Bundesverfassung, sondern auch dem historischen Erbe des Landes.
Positives gibt es diese Woche ebenfalls zu berichten. So hat der US-Gesundheitsminister Robert F. Kennedy Jr. nach der «sensationellen» Entlassung aller Mitglieder des Impfberatungsausschusses (wegen verbreiteter direkter Verbindungen zu Pharmaunternehmen) nun auch bereits neue Namen verkündet. Demnach möchte er unter anderem Robert W. Malone, Erfinder der mRNA-«Impfung» als Technologie und prominenter Kritiker der Corona-Maßnahmen, in das Komitee aufnehmen.
Auch die Aufarbeitung der unsinnigen Corona-Politik geht Schrittchen für Schrittchen weiter. In Heidelberg hat die Initiative für Demokratie und Aufklärung (IDA) den Gemeinderat angesichts der katastrophalen Haushaltslage zu einer offenen und ehrlichen Diskussion über die Ursachen der Krise aufgefordert. Das Thema «Corona» sei «das Teuerste, was Heidelberg je erlebt hat», sagte IDA-Stadtrat Gunter Frank im Plenum. Außerdem seien aus den Krisenstabsprotokollen der Stadt auch die enormen Verwerfungen ersichtlich, und es gebe Anlass für tiefgehende Gespräche mit der Stadtverwaltung.
Den juristischen und öffentlichen Druck auf die Kommunen möchte der Unternehmer Markus Böning erhöhen. Seine «Freiheitskanzlei» möchte Bürgern helfen, die Aufarbeitung selbst in die Hand zu nehmen. Unter dem Motto «Corona-Wiedergutmachung» bietet er Hilfestellung, wie Betroffene versuchen können, sich unrechtmäßige Bußgelder zurückzuholen.
So bleibt uns am Ende dieses finsteren Freitags doch auch Anlass zur Hoffnung. Es gibt definitiv noch Anzeichen von Menschlichkeit. Darauf möchte ich mich konzentrieren, und mit diesem Gefühl verabschiede ich mich ins Wochenende.
[Titelbild: Pixabay]
Dieser Beitrag wurde mit dem Pareto-Client geschrieben und ist zuerst auf Transition News erschienen.
-
@ 32e18276:5c68e245
2025-06-03 14:45:176 years ago I created some tools for working with peter todd's opentimestamps proof format. You can do some fun things like create plaintext and mini ots proofs. This short post is just a demo of what these tools do and how to use them.
What is OTS?
OpenTimestamps is a protocol for stamping information into bitcoin in a minimal way. It uses OP_RETURN outputs so that it has minimal impact on chain, and potentially millions of documents are stamped all at once with a merkle tree construction.
Examples
Here's the proof of the
ots.c
source file getting stamped into the ots calendar merkle tree. We're simply printing the ots proof file here withotsprint
:``` $ ./otsprint ots.c.ots
version 1 file_hash sha256 f76f0795ff37a24e566cd77d1996b64fab9c871a5928ab9389dfc3a128ec8296 append 2e9943d3833768bdb9a591f1d2735804 sha256 | --> append 2d82e7414811ecbf | sha256 | append a69d4f93e3e0f6c9b8321ce2cdd90decd34d260ea3f8b55e83d157ad398b7843 | sha256 | append ac0b5896401478eb6d88a408ec08b33fd303b574fb09b503f1ac1255b432d304 | sha256 | append 8aa9fd0245664c23d31d344243b4e8b0 | sha256 | prepend 414db5a1cd3a3e6668bf2dca9007e7c0fc5aa6dc71a2eab3afb51425c3acc472 | sha256 | append 5355b15d88d4dece45cddb7913f2c83d41e641e8c1d939dac4323671a4f8e197 | sha256 | append a2babd907ca513ab561ce3860e64a26b7df5de117f1f230bc8f1a248836f0c25 | sha256 | prepend 683f072f | append 2a4cdf9e9e04f2fd | attestation calendar https://alice.btc.calendar.opentimestamps.org | --> append 7c8764fcaba5ed5d | sha256 | prepend f7e1ada392247d3f3116a97d73fcf4c0994b5c22fff824736db46cd577b97151 | sha256 | append 3c43ac41e0281f1dbcd7e713eb1ffaec48c5e05af404bca2166cdc51966a921c | sha256 | append 07b18bd7f4a5dc72326416aa3c8628ca80c8d95d7b1a82202b90bc824974da13 | sha256 | append b4d641ab029e7d900e92261c2342c9c9 | sha256 | append 4968b89b02b534f33dc26882862d25cca8f0fa76be5b9d3a3b5e2d77690e022b | sha256 | append 48c54e30b3a9ec0e6339b88ed9d04b9b1065838596a4ec778cbfc0dfc0f8c781 | sha256 | prepend 683f072f | append 8b2b4beda36c18dc | attestation calendar https://bob.btc.calendar.opentimestamps.org | --> append baa878b42ef3e0d45b324cc3a39a247a | sha256 | prepend 4fb1bc663cd641ad18e5c73fb618de1ae3d28fb5c3c224b7f9888fd52feb09ec | sha256 | append 731329278830c9725497d70e9f5a02e4b2d9c73ff73560beb3a896a2f180fdbf | sha256 | append 689024a9d57ad5daad669f001316dd0fc690ac4520410f97a349b05a3f5d69cb | sha256 | append 69d42dcb650bb2a690f850c3f6e14e46c2b0831361bac9ec454818264b9102fd | sha256 | prepend 683f072f | append bab471ba32acd9c3 | attestation calendar https://btc.calendar.catallaxy.com append c3ccce274e2f9edfa354ec105cb1a749 sha256 append 6297b54e3ce4ba71ecb06bd5632fd8cbd50fe6427b6bfc53a0e462348cc48bab sha256 append c28f03545a2948bd0d8102c887241aff5d4f6cf1e0b16dfd8787bf45ca2ab93d sha256 prepend 683f072f append 7f3259e285891c8e attestation calendar https://finney.calendar.eternitywall.com ```
The tool can create a minimal version of the proofs:
``` $ ./otsmini ots.c.ots | ./otsmini -d | ./otsprint
version 1 file_hash sha256 f76f0795ff37a24e566cd77d1996b64fab9c871a5928ab9389dfc3a128ec8296 append 2e9943d3833768bdb9a591f1d2735804 sha256 append c3ccce274e2f9edfa354ec105cb1a749 sha256 append 6297b54e3ce4ba71ecb06bd5632fd8cbd50fe6427b6bfc53a0e462348cc48bab sha256 append c28f03545a2948bd0d8102c887241aff5d4f6cf1e0b16dfd8787bf45ca2ab93d sha256 prepend 683f072f append 7f3259e285891c8e attestation calendar https://finney.calendar.eternitywall.com ```
which can be shared on social media as a string:
5s1L3tTWoTfUDhB1MPLXE1rnajwUdUnt8pfjZfY1UWVWpWu5YhW3PGCWWoXwWBRJ16B8182kQgxnKyiJtGQgRoFNbDfBss19seDnco5sF9WrBt8jQW7BVVmTB5mmAPa8ryb5929w4xEm1aE7S3SGMFr9rUgkNNzhMg4VK6vZmNqDGYvvZxBtwDMs2PRJk7y6wL6aJmq6yoaWPvuxaik4qMp76ApXEufP6RnWdapqGGsKy7TNE6ZzWWz2VXbaEXGwgjrxqF8bMstZMdGo2VzpVuE
you can even do things like gpg-style plaintext proofs:
``` $ ./otsclear -e CONTRIBUTING.ots -----BEGIN OPENTIMESTAMPS MESSAGE-----
Email patches to William Casarin jb55@jb55.com
-----BEGIN OPENTIMESTAMPS PROOF-----
AE9wZW5UaW1lc3RhbXBzAABQcm9vZgC/ieLohOiSlAEILXj4GSagG6fRNnR+CHj9e/+Mdkp0w1us gV/5dmlX2NrwEDlcBMmQ723mI9sY9ALUlXoI//AQRXlCd716J60FudR+C78fkAjwIDnONJrj1udi NDxQQ8UJiS4ZWfprUxbvaIoBs4G+4u6kCPEEaD8Ft/AIeS/skaOtQRoAg9/jDS75DI4pKGh0dHBz Oi8vZmlubmV5LmNhbGVuZGFyLmV0ZXJuaXR5d2FsbC5jb23/8AhMLZVzYZMYqwjwEPKWanBNPZVm kqsAYV3LBbkI8CCfIVveDh/S8ykOH1NC6BKTerHoPojvj1OmjB2LYvdUbgjxBGg/BbbwCGoo3fi1 A7rjAIPf4w0u+QyOLi1odHRwczovL2FsaWNlLmJ0Yy5jYWxlbmRhci5vcGVudGltZXN0YW1wcy5v cmf/8Aik+VP+n3FhCwjwELfTdHAfYQNa49I3CYycFbkI8QRoPwW28AgCLn93967lIQCD3+MNLvkM jiwraHR0cHM6Ly9ib2IuYnRjLmNhbGVuZGFyLm9wZW50aW1lc3RhbXBzLm9yZ/AQ3bEwg7mjQyKR PykGgiJewAjwID5Q68dY4m+XogwTJx72ecQEe5lheCO1RnlcJSTFokyRCPEEaD8Ft/AIw1WWPe++ 8N4Ag9/jDS75DI4jImh0dHBzOi8vYnRjLmNhbGVuZGFyLmNhdGFsbGF4eS5jb20= -----END OPENTIMESTAMPS PROOF-----
$ ./otsclear -v <<<proof_string... # verify the proof string ```
I've never really shared these tools before, I just remembered about it today. Enjoy!
Try it out: https://github.com/jb55/ots-tools
-
@ 5627e59c:d484729e
2025-06-12 04:23:52Look and see\ Look and see
You look like how you look at me
Look and see\ Look and see
The colorless through the color TV
Look and see\ Look and be
The unborn identity
-
@ 9ca447d2:fbf5a36d
2025-06-14 01:01:43President Donald Trump’s media company, Trump Media & Technology Group (TMTG), is doubling down on its Bitcoin bet, partnering with Crypto.com and Yorkville America Digital to launch its own bitcoin exchange-traded fund (ETF), called the Truth Social Bitcoin ETF.
On June 3, a division of the New York Stock Exchange, NYSE Arca, filed a 19b-4 form with the Securities and Exchange Commission (SEC).
This is the final regulatory hurdle before an ETF can be launched. If approved, this new fund will allow everyday investors to buy shares tied to the price of bitcoin, without having to hold the asset themselves.
The Truth Social Bitcoin ETF will track the price of bitcoin and give investors a simple, regulated way to invest in the digital money.
It will be listed and traded on NYSE Arca, and Foris DAX Trust Company (the custodian for Crypto.com’s assets) has been named as the proposed custodian for this new fund.
According to the filings, the ETF is “designed to remove the obstacles represented by the complexities and operational burdens involved in a direct investment in bitcoin.”
This is part of a bigger plan by Trump Media to offer a full suite of digital-asset-based financial products.
The company has also applied to trademark six investment products and has plans for additional ETFs under its Truth.Fi fintech platform, which will focus on digital assets and energy sectors.
Trump Media also recently announced a $2.5 billion bitcoin treasury plan and raised $2.4 billion in stock and debt to support its bitcoin initiatives.
Related: Trump Media Will Raise $2.5 Billion to Build Bitcoin Treasury
Now that the 19b-4 has been filed, the SEC has 45 days to approve, reject or delay the application. This can be extended several times, but a final decision must be made by January 29, 2026.
In addition to the 19b-4, Yorkville America Digital must also file an S-1 registration statement. This will outline exactly how the ETF will work, what it offers to investors, how funds will be used, and the risks involved.
Since January 2024, bitcoin ETFs have been all the rage, with over $130 billion in assets. Big players like BlackRock’s iShares Bitcoin Trust (IBIT) and Fidelity’s FBTC dominate the space. BlackRock alone has $69 billion in assets through its bitcoin ETF.
Even though Trump’s ETF is entering a crowded field, its name will get attention. The Truth Social bitcoin ETF is expected to generate media buzz, political controversy and divided investor opinions, making it a cultural and financial statement.
Donald Trump is the majority owner of Trump Media, although his shares are in a trust controlled by his son, Donald Trump Jr. The ETF filing doesn’t mention Trump by name, but most people see it as a Trump product.
The President is getting more and more involved in the digital asset space. He has NFT collections, meme coins, a bitcoin mining company, a digital asset wallet, and now a potential bitcoin ETF.
But not everyone is happy. Some argue that a sitting president’s involvement in regulated financial products, especially one that could benefit from political influence, is unethical.
An SEC-approved digital asset product from Trump could blur the lines between politics, personal gain and digital assets.
Others, however, see this as a calculated move to boost Trump’s image and position him as a leader in the digital asset and tech space.
-
@ 6be5cc06:5259daf0
2025-06-12 01:18:11Introdução
O princípio do sola scriptura, pedra angular da teologia protestante desde a Reforma do século XVI, estabelece que apenas a Escritura constitui a autoridade final e suprema em questões de fé e prática cristã. Este princípio, formulado inicialmente por Martinho Lutero e sistematizado pelos reformadores subsequentes, pretende oferecer um fundamento epistemológico sólido para a teologia, livre das supostas corrupções da tradição eclesiástica.
Contudo, uma análise rigorosa revela que o sola scriptura incorre em contradições lógicas fundamentais que comprometem sua viabilidade como sistema epistemológico coerente. Este artigo examina essas contradições através de três perspectivas complementares: filosófica, exegética e histórica.
A Contradição Performativa Fundamental
O Problema da Autorreferência
O sola scriptura enfrenta um dilema epistemológico insuperável: afirma que apenas a Escritura possui autoridade final em matéria de fé, mas essa própria regra não é explicitamente ensinada na Escritura. Trata-se de uma contradição performativa clássica, onde o enunciado viola suas próprias condições de possibilidade.
Esta situação configura uma falácia de petitio principii (círculo vicioso), pois exige que se aceite uma doutrina que não pode ser sustentada pelas premissas do próprio sistema. Para estabelecer o sola scriptura, seria necessário recorrer a uma autoridade externa à Escritura – precisamente aquilo que o princípio pretende rejeitar.
Fundacionalismo Mal Estruturado
Do ponto de vista epistemológico, o sola scriptura apresenta-se como um fundacionalismo defeituoso. Pretende funcionar como axioma supremo e auto-evidente, mas falha ao não fornecer a base textual que sua própria metodologia exige. Um verdadeiro fundacionalismo escriturístico deveria ser capaz de demonstrar sua validade através de uma prova explícita nas próprias Escrituras.
O Testemunho Contrário das Escrituras
Limitações do Registro Escrito
A própria Escritura reconhece as limitações do registro textual. João 21:25 declara explicitamente: "Jesus fez também muitas outras coisas. Se cada uma delas fosse escrita, penso que nem mesmo no mundo inteiro haveria espaço suficiente para os livros que seriam escritos."
Este versículo é particularmente problemático para o sola scriptura, pois reconhece que nem todos os ensinamentos de Cristo foram preservados por escrito. Como pode a Escritura ser suficiente se ela própria admite sua incompletude?
A Valorização da Tradição Oral
Paulo, em 2 Tessalonicenses 2:15, oferece uma instrução que contradiz frontalmente o sola scriptura: "Assim, pois, irmãos, ficai firmes e conservai os ensinamentos que de nós aprendestes, seja por palavras, seja por carta nossa."
O apóstolo valoriza inequivocamente tanto a tradição oral ("por palavras") quanto a escrita ("por carta"), estabelecendo um modelo de autoridade dual que o protestantismo posterior rejeitaria.
A Necessidade de Autoridade Interpretativa
A narrativa do eunuco etíope em Atos 8:30-31 demonstra a inadequação da Escritura isolada como autoridade final. Quando Filipe pergunta se o eunuco entende o que lê, a resposta é reveladora: "Como poderei entender, se alguém não me ensinar?"
Este episódio ilustra que a mera posse do texto bíblico não garante compreensão adequada. É necessária uma autoridade interpretativa externa – no caso, representada por Filipe, que age com autoridade apostólica.
A Complexidade Hermenêutica
Pedro, em sua segunda epístola (3:16-17), reconhece a dificuldade interpretativa inerente às Escrituras: "Suas cartas contêm algumas coisas difíceis de entender, as quais os ignorantes e instáveis torcem, como também o fazem com as demais Escrituras, para a própria destruição deles."
Esta passagem não apenas reconhece a complexidade hermenêutica dos textos sagrados, mas também alerta sobre os perigos da interpretação inadequada. Implicitamente, sugere a necessidade de uma autoridade interpretativa confiável para evitar distorções doutrinárias.
O Paradoxo Histórico da Canonização
A Dependência da Tradição Eclesiástica
Um dos argumentos mais devastadores contra o sola scriptura emerge da própria história da formação do cânon bíblico. Os concílios de Hipona (393 d.C.) e Cartago (397 d.C.) foram responsáveis pela definição oficial do cânon das Escrituras tal como conhecemos hoje.
Este fato histórico cria um paradoxo insuperável: aceitar a Bíblia como autoridade única requer aceitar a autoridade da tradição eclesiástica que a definiu. O próprio cânon bíblico é produto da tradição apostólica e da deliberação conciliar, não de autodefinição escriturística.
A Circularidade da Autopistia
Tentativas protestantes de resolver este dilema através do conceito de "autopistia" – a suposta capacidade das Escrituras de se auto-autenticar – apenas aprofundam o problema circular. Como determinar que as Escrituras possuem esta propriedade sem recorrer a critérios externos? A própria doutrina da autopistia não é explicitamente ensinada na Escritura.
Implicações Teológicas e Epistemológicas
A Fragmentação Interpretativa
A história do protestantismo oferece evidência empírica das consequências práticas do sola scriptura. A multiplicação de denominações e interpretações divergentes sugere que o princípio, longe de fornecer clareza doutrinária, pode na verdade contribuir para a fragmentação teológica.
Se a Escritura fosse verdadeiramente suficiente e auto-interpretativa, seria razoável esperar maior convergência hermenêutica entre aqueles que aderem ao sola scriptura. A realidade histórica sugere o contrário.
A Alternativa Católica e Ortodoxa
As tradições católica e ortodoxa, embora enfrentando suas próprias tensões epistemológicas, mantêm pelo menos coerência interna ao reconhecer explicitamente múltiplas fontes complementares de autoridade: Escritura, Tradição e Magistério (no caso católico) ou Escritura e Tradição (no caso ortodoxo).
Estas posições evitam a contradição performativa do sola scriptura ao não reivindicar que sua própria metodologia epistemológica seja derivada exclusivamente da Escritura.
Conclusão
A análise crítica do sola scriptura revela contradições estruturais que comprometem fundamentalmente sua viabilidade como princípio epistemológico. O princípio incorre em contradição performativa ao estabelecer uma regra que não pode ser derivada de suas próprias premissas, configura um fundacionalismo mal estruturado ao carecer de base textual explícita, e enfrenta o testemunho contrário da própria Escritura, que reconhece suas limitações e a necessidade de autoridades interpretativas externas.
O paradoxo histórico da canonização – onde o próprio cânon bíblico depende da autoridade tradicional que o sola scriptura pretende rejeitar – representa talvez o golpe mais decisivo contra o princípio protestante.
Isso não implica necessariamente a falsidade do protestantismo como sistema teológico, mas sugere que seus fundamentos epistemológicos requerem reformulação substancial. Uma teologia protestante intelectualmente honesta precisaria reconhecer as limitações do sola scriptura e desenvolver uma epistemologia mais nuançada que leve em conta a complexidade das fontes de autoridade religiosa.
A busca pela verdade teológica, independentemente de compromissos confessionais, exige o reconhecimento rigoroso das limitações e contradições inerentes aos nossos sistemas epistemológicos. No caso do sola scriptura, essa honestidade intelectual revela um princípio que, por mais central que seja para a identidade protestante, não pode sustentar o peso epistemológico que tradicionalmente lhe foi atribuído.
-
@ 8bad92c3:ca714aa5
2025-06-14 00:02:11Key Takeaways
In this episode of TFTC, Jessy Gilger, Managing Partner at Sound Advisory and architect of Ganet Trust, unpacks the complexities of retiring on Bitcoin, emphasizing that the “right” amount depends on spending habits, age, and minimizing withdrawal pressure. He introduces Ganet Trust as a Bitcoin-native fiduciary solution that leverages multisig custody to meet institutional compliance standards without sacrificing decentralization. Jessy also critiques high-yield derivative products like MSTY, warning of systemic risks and advocating for safer alternatives like SMAs. The conversation broadens into the emotional pitfalls of financial decision-making, the importance of aligning wealth with values, and the evolving macro landscape where Bitcoin’s intersection with traditional finance and tax policy will shape how individuals and institutions protect and grow their holdings across generations.
Best Quotes
"The most comfort comes from putting as little pressure as possible against that stack."
"Multisig is the upgrade from a honeypot to a distributed key setup."
"If a whale pees in the pool, everyone is affected."
"Everyone feels late to Bitcoin because they know someone who got in earlier."
"Stacking Saturdays is my new stack sats."
"Bitcoin doesn’t know about trust, it knows private keys."
"The money is there to serve your values—not the other way around."
"Some financial products will help, some will hurt, and some will fail. Our job is to help clients navigate them safely."
Conclusion
This episode offers a powerful blend of practical insight and philosophical reflection on long-term Bitcoin strategy, emphasizing the need for sound custody, inheritance planning, and emotional discipline in a volatile, financialized world. Jessy Gilger introduces Ganet Trust as a vital solution for secure, compliant Bitcoin ownership, while his “stacking Saturdays” mantra reframes wealth as a pursuit of time, freedom, and meaningful priorities. As Bitcoin moves further into the mainstream, the conversation urges listeners to stay grounded, think generationally, and build resilient systems for both assets and life.
Timestamps
00:00 - Intro
0:33 - Bitcoin Retirement Planning at New All-Time Highs
5:22 - How Gannett Trust Works
10:05 - High Net Worth Bitcoin Storage and Estate Planning Solutions
16:48 - MSTY Derivatives: Understanding MicroStrategy Product Risks
19:53 - Bitkey
20:56 - How MSTY Works and the Whale in the Pool Problem
30:16 - Unchained
30:37 - Bitcoin Financialization and Corporate Treasury Strategy
39:35 - Avoiding Ego-Driven Bitcoin Mistakes and Building Bridges
47:33 - Stack Saturdays
53:15 - Tax Policy Changes and Wild Times Ahead
57:18 - Where to Find Gannett Trust and ClosingTranscript
(00:00) We have people retiring with hundreds of Bitcoin. Do you need to be on a yacht every week or are you staying humble and keeping those stats? 10 of the 12 ETFs are at Coinbase means all the keys are at Coinbase and with the news of the last week like, hey, there could be cracks. Micro Strategy is built on Bitcoin.
(00:18) It's got all of the risks of Bitcoin, right? But then it's got its own set of risks. Let's call them Sailor and Profitability. Then you have derivatives which are on top of Micro Strategy and they retain the risks of everything underneath. meeting on a on a day when we hit new all-time highs. Bitcoin approached $110,000.
(00:43) Got Jesse back on the show to talk about many things, not just the price ripping. A lot of good things happening on the unch unchained side of things. Watching Ganet Trust. We'll get into it. Yeah, lot lots of stuff happening. I think um the price likes Ganet. I I think that's the uh the mover. What uh I mean that's been a big discussion in in the space right now is uh are we heading to new all-time highs? How should Bitcoiners be preparing? How much Bitcoin do people need to retire? How how are you thinking about all this as we approach what seems
(01:22) to be another bull cycle? Yeah, that's a common question, right? How much Bitcoin do I need to retire? I get it a lot and there's so many other questions I want to ask like, well, how much money are you spending, right? Do you do you need to be on a yacht every week or are you staying humble and keeping those stats? And so, the amount of Bitcoin can vary because the spending pressure you're putting against your Bitcoin stack is the the biggest factor, right? And age is probably the second.
(01:54) a 30-year-old retiring on Bitcoin is different than a 75year-old retiring on Bitcoin just because of the horizon. So, stacks vary. We've got people retiring with um less than seven figures of Bitcoin because they have other assets and then we have people retiring with hundreds of Bitcoin um and putting very little pressure against that portfolio.
(02:16) So, can go in a lot of different ways. Um but it is a question of the day as you're poking new all-time highs. Everyone's like, "Well, how high is it going to get?" And then huge question is do we have cycles again right if countries are buying what what would a downside look like and that's the big question in the retirees mind is how do I protect and not ride that downside all the way down if we do have another 70 80% drawback. Yeah. No.
(02:42) And I think particularly for younger people having in their mind like the perspective of 21 million Bitcoin, 8 billion people, what's the stat? 60 million millionaires in the world. Mhm. How much how many stats do I need to get to to feel comfortable that I have a sufficient slice of the Bitcoin pie? That feel comfortable concept is just so different, right? because Bitcoin is moving and shaking and all-time highs or down 30% and that's still within a bull market.
(03:15) Is that comfortable, right? Can you actually hang it up and like, all right, not going into work and I'm just going to continue to ride these adoption cycles. I don't know if it ever gets comfortable. The most comfort comes from putting as little pressure as possible against that stack, right? that you're not pushing these withdrawal rates of like 5 10 20% of my Bitcoin stack.
(03:38) I'm needing to live on every because then you're requiring Bitcoin to do something for you in the short term which is just not great at, right? What what's Bitcoin price going to be in a year? Far less reliable than what's Bitcoin price going to be in 30 years. Yeah. Yeah. Yeah. Well, I I think one of the holdups too is the ability for people to get into Bitcoin and know where to put it and not only have certainty of what it will be valued at in 30 years, but will they have access to it? That's one thing that you guys
(04:10) have been very much focused. I know sound advisory is separate from Unchained technically but within the Unchained umbrella but Unchained focused on helping secure individuals and businesses and trust uh Bitcoin and I think today's announcement of Ganet Trust is a massive step in a direction towards more certainty for long-term holdings for particular entities.
(04:36) Yes, the unchained umbrella or or family of companies is growing and the intention will be for sound advisory to tuck under or be merged into folded into Ganet Trust Company as it gets stood up. But it is the most robust uh compliance offering that um is out there in the fiduciary space. And so that in my opinion was the one thing missing as people want to live on a Bitcoin standard.
(05:04) Sometimes they're in an entity or an organization or have a structure that requires a fiduciary standard. And these two coming together is solved by Ganet Trust Company. So it's going to be the most robust way to hold Bitcoin and have like true inheritance that can be um administered through generations. So how how does this work mechanically via Ganet? Mechanically.
(05:28) So as the first Bitcoin native trust company, other other trust companies do exist, right? but they don't build upon Bitcoin in the way that Unchained has. So Ganet in its um in its Unchained roots and using Unchained technology is going to be able to use multi-IG to achieve um trust company goals.
(05:50) And what that likely will mean is Ganet holding a key, Unchained holding a key, third party holding a key. Those three keys together ensure that the Bitcoin is not being held at any one spot, right? We could get into the Coinbase honeypot. We actually talked about this on our last episode like, "Hey, what do you think is the uh the risk out there that the industry might disagree with?" Said, "I'm launching a new segment.
(06:15) I'm going to ask you a prediction of what what's out there that the uh the industry doesn't see eye to eye with you at." And I was at conferences and they're saying, "Hey, Coinbase is the best. That's where we put all the cut." That means all the keys are at Coinbase and with the news of the last week like, hey, there could be cracks, right? If you've got exposure to Coinbase now, you could be questioning. I was on the list.
(06:37) I got the email. You were affected. That's not great. It doesn't feel good knowing that information that information could have been a lot worse. That headline could have been private keys being mismanaged. When you overlay what Ganet is going to offer to the custody space, it means that not all of the keys are going to be at any one entity.
(07:00) And so that gives the Bitcoiner who understands multisig the confidence that okay, I'm upgrading from a honeypot to a distributed key setup. But it has to be done in a fiduciary and compliant way to satisfy the the institutional and big money of the world, right? family offices, uh, Bitcoin treasury companies, they're going to need a structure that the CIO, the -
@ 5627e59c:d484729e
2025-06-11 21:18:44Here's to the ones who can\ Feel their cause\ Surrender\ Change their ways\ But keep their fire\ And never give up
We will transform this world\ Restructuring\ One belief at a time
-
@ 32e18276:5c68e245
2025-06-02 20:58:05Damus OpenSats Grant Q1 2025 Progress Report
This period of the Damus OpenSats grant has been productive, and encompasses the work our beta release of Notedeck. Since we sent our last report on January, this encompasses all the work after then.
Damus Notedeck
We released the Beta version of Notedeck, which has many new features:
Dave
We've added a new AI-powered nostr assistant, similar to Grok on X. We call him Dave.
Dave is integrated with tooling that allows it to query the local relay for posts and profiles:
Search
The beta release includes a fulltext search interface powered by nostrdb:
Zaps
You can now zap with NWC!
And More!
- GIFs!
- Add full screen images, add zoom & pan
- Introduce last note per pubkey feed (experimental)
- Allow multiple media uploads per selection
- Major Android improvements (still wip)
- Added notedeck app sidebar
- User Tagging
- Note truncation
- Local network note broadcast, broadcast notes to other notedeck notes while you're offline
- Mute list support (reading)
- Relay list support
- Ctrl-enter to send notes
- Added relay indexing (relay columns soon)
- Click hashtags to open hashtag timeline
Damus iOS
Work continued on the iOS side. While I was not directly involved in the work since the last report, I have been directing and managing its development.
What's new:
Coinos Wallet + Interface
We've partnered with coinos to enable a one-click, non-KYC lightning wallet!
We now have an NWC wallet interface, and we've re-enabled zaps as per the new appstore guidelines!
Now you can see all incoming and outgoing NWC transactions and start zapping right away.
Enhanced hellthread muting
Damus can now automatically mute hellthreads, instead of having to do that manually.
Drafts
We now locally persist note drafts so that they aren't lost on app restart!
Profile editing enhancements
We now have a profile picture editing tool so that profile pictures are optimized and optionally cropped
Conversations tab
We now have a conversations tab on user profiles, allowing you to see all of your past conversations with that person!
Enhanced push notifications
We've updated our push notifications to include profile pictures, and they are also now grouped by the thread that they came from.
And lots more!
Too many to list here, check out the full changelog
Nostrdb
nostrdb, the engine that powers notecrumbs, damus iOS, and notedeck, continued to improve:
Custom filters
We've added the ability to include custom filtering logic during any nostrdb query. Dave uses this to filter replies from kind1 results to keep the results small and to avoid doing post-processing.
Relay index + queries
There is a new relay index! Now when ingesting notes, you can include extra metadata such as where the note came from. You can use this index to quickly list all of the relays for a particular note, or for relay timelines.
NIP50 profile searches
To assist dave in searching for profiles, we added a new query plan for {kind:0, search:} queries to scan the profile search index.
How money was used
- relay.damus.io server costs
- Living expenses
Next quarter
We're making a strong push to get our Android version released, so that is the main focus for me.
-
@ 04c3c1a5:a94cf83d
2025-06-14 16:42:00test
-
@ 43820409:694a54a4
2025-06-13 00:43:54This is a brief summary.
This is the best article ever created.
You may be wondering why?
Why
Because we made it.
How
- It just is
- Everyone agrees
Thank you for your attention.
End.
-
@ c1e9ab3a:9cb56b43
2025-06-01 13:54:061. Introduction
Over the last 250 years the world’s appetite for energy has soared along an unmistakably exponential trajectory, transforming societies and economies alike. After a half‑century of relative deceleration, a new mix of technological, demographic and political forces now hints at an impending catch‑up phase that could push demand back onto its centuries‑long growth curve. This post knits together the history, the numbers and the newest policy signals to explore what that rebound might look like—and how Gen‑4 nuclear power could meet it.
2. The Long Exponential: 1750 – 1975
Early industrialisation replaced muscle, wood and water with coal‑fired steam, pushing global primary energy use from a few exajoules per year in 1750 to roughly 60 EJ by 1900 and 250 EJ by 1975. Over that span aggregate consumption doubled roughly every 25–35 years, equivalent to a long‑run compound growth rate of ~3 % yr‑¹. Per‑capita use climbed even faster in industrialised economies as factories, railways and electric lighting spread.
3. 1975 – 2025: The Great Slowdown
3.1 Efficiency & Structural Change
• Oil shocks (1973, 1979) and volatile prices pushed OECD economies to squeeze more GDP from each joule.
• Services displaced heavy industry in rich countries, trimming energy intensity.
• Refrigerators, motors and vehicles became dramatically more efficient.3.2 Policy & Technology
• The Inflation Reduction Act (U.S.) now layers zero‑emission production credits and technology‑neutral tax incentives on top of existing nuclear PTCs citeturn1search0turn1search2.
• The EU’s Net‑Zero Industry Act aims to streamline siting and finance for “net‑zero technologies”, explicitly naming advanced nuclear citeturn0search1.3.3 Result
Global primary energy in 2024 stands near 600 EJ (≈ 167 000 TWh)—still growing, but the line has flattened versus the pre‑1975 exponential.
4. Population & Per‑Capita Demand
World population tripled between 1950 and today, yet total energy use grew roughly six‑fold. The imbalance reflects rising living standards and electrification. Looking ahead, the UN projects population to plateau near 10.4 billion in the 2080s, but per‑capita demand is poised to climb as the Global South industrialises.
5. The Policy Pivot of 2023‑2025
| Region | Signal | Year | Implication | |--------|--------|------|-------------| | COP 28 Declaration | 20+ nations pledge to triple nuclear capacity by 2050 | 2023 | High‑level political cover for rapid nuclear build‑out citeturn0search2 | | Europe | Post‑crisis sentiment shifts; blackout in Iberia re‑opens nuclear debate | 2025 | Spain, Germany, Switzerland and others revisit phase‑outs citeturn0news63 | | United States | TVA submits first SMR construction permit; NRC advances BWRX‑300 review | 2025 | Regulatory pathway for fleet deployment citeturn1search9turn1search1 | | Global Strategy Report | “Six Dimensions for Success” playbook for new nuclear entrants | 2025 | Practical roadmap for emerging economies citeturn0search0 | | U.S. Congress | Proposed cuts to DOE loan office threaten build‑out pace | 2025 | Finance bottleneck remains a risk citeturn1news28 |
6. The Catch‑Up Scenario
Suppose the recent 50‑year pause ends in 2025, and total energy demand returns to a midpoint historical doubling period of 12.5 years (the average of the 10–15 year rebound window).
6.1 Consumption Trajectory
| Year | Doublings since 2024 | Demand (TWh) | |------|----------------------|--------------| | 2024 | 0 | 167 000 | | 2037 | 1 | 334 000 | | 2050 | 2 | 668 000 | | 2062 | 3 | 1 336 000 |
(Table ignores efficiency gains from electrification for a conservative, supply‑side sizing.)
7. Nuclear‑Only Supply Model
7.1 Reactor Math
- 1 GWᵉ Gen‑4 reactor → 8.76 TWh yr‑¹ at 100 % capacity factor.
- 2062 requirement: 1 336 000 TWh yr‑¹ → ≈ 152 500 reactors in steady state.
- Build rate (2025‑2062, linear deployment):
152 500 ÷ 38 years ≈ 4 000 reactors per year globally.
(Down from the earlier 5 000 yr‑¹ estimate because the deployment window now stretches 38 years instead of 30.)
7.2 Policy Benchmarks
- COP 28 triple target translates to +780 GW (if baseline 2020 ≈ 390 GW). That is <100 1 GW units per year—two orders of magnitude lower than the theoretical catch‑up requirement, highlighting just how aggressive our thought experiment is.
7.3 Distributed vs Grid‑Centric
Small Modular Reactors (300 MW class) can be sited on retiring coal plants, using existing grid interconnects and cooling, vastly reducing new transmission needs. Ultra‑large “gigawatt corridors” become optional rather than mandatory, though meshed regional grids still improve resilience and market liquidity.
8. Challenges & Unknowns
- Finance: Even with IRA‑style credits, first‑of‑a‑kind Gen‑4 builds carry high cost of capital.
- Supply Chain: 4 000 reactors a year means a reactor‑grade steel output roughly 20× today’s level.
- Waste & Public Trust: Advanced reactors can burn actinides, but geologic repositories remain essential.
- Workforce: Nuclear engineers, welders and regulators are already in short supply.
- Competing Technologies: Cheap renewables + storage and prospective fusion could displace part of the projected load.
9. Conclusions
Recent policy shifts—from Europe’s Net‑Zero Industry Act to the COP 28 nuclear declaration—signal that governments once again see nuclear energy as indispensable to deep decarbonisation. Yet meeting an exponential catch‑up in demand would require deployment rates an order of magnitude beyond today’s commitments, testing manufacturing capacity, finance and political resolve.
Whether the future follows the modest path now embedded in policy or the steeper curve sketched here, two convictions stand out:
- Electrification will dominate new energy demand.
- Scalable, dispatchable low‑carbon generation—likely including large fleets of Gen‑4 fission plants—must fill much of that gap if net‑zero targets are to remain credible.
Last updated 1 June 2025.
-
@ 7f6db517:a4931eda
2025-06-13 23:03:47
"Privacy is necessary for an open society in the electronic age. Privacy is not secrecy. A private matter is something one doesn't want the whole world to know, but a secret matter is something one doesn't want anybody to know. Privacy is the power to selectively reveal oneself to the world." - Eric Hughes, A Cypherpunk's Manifesto, 1993
Privacy is essential to freedom. Without privacy, individuals are unable to make choices free from surveillance and control. Lack of privacy leads to loss of autonomy. When individuals are constantly monitored it limits our ability to express ourselves and take risks. Any decisions we make can result in negative repercussions from those who surveil us. Without the freedom to make choices, individuals cannot truly be free.
Freedom is essential to acquiring and preserving wealth. When individuals are not free to make choices, restrictions and limitations prevent us from economic opportunities. If we are somehow able to acquire wealth in such an environment, lack of freedom can result in direct asset seizure by governments or other malicious entities. At scale, when freedom is compromised, it leads to widespread economic stagnation and poverty. Protecting freedom is essential to economic prosperity.
The connection between privacy, freedom, and wealth is critical. Without privacy, individuals lose the freedom to make choices free from surveillance and control. While lack of freedom prevents individuals from pursuing economic opportunities and makes wealth preservation nearly impossible. No Privacy? No Freedom. No Freedom? No Wealth.
Rights are not granted. They are taken and defended. Rights are often misunderstood as permission to do something by those holding power. However, if someone can give you something, they can inherently take it from you at will. People throughout history have necessarily fought for basic rights, including privacy and freedom. These rights were not given by those in power, but rather demanded and won through struggle. Even after these rights are won, they must be continually defended to ensure that they are not taken away. Rights are not granted - they are earned through struggle and defended through sacrifice.
If you found this post helpful support my work with bitcoin.
-
@ b1ddb4d7:471244e7
2025-06-12 01:01:37Jason Lowery’s thesis, Softwar: A Novel Theory on Power Projection and the National Strategic Significance of Bitcoin, reframes bitcoin not merely as digital cash but as a transformative security technology with profound implications for investors and nation-states alike.
For centuries, craft brewers understood that true innovation balanced tradition with experimentation—a delicate dance between established techniques and bold new flavors.
Much like the craft beer revolution reshaped a global industry, bitcoin represents a fundamental recalibration of how humans organize value and project power in the digital age.
The Antler in the Digital Forest: Power Projection
Lowery, a U.S. Space Force officer and MIT scholar, anchors his Softwar theory in a biological metaphor: Bitcoin as humanity’s “digital antler.” In nature, antlers allow animals like deer to compete for resources through non-lethal contests—sparring matches where power is demonstrated without fatal consequences. This contrasts sharply with wolves, who must resort to violent, potentially deadly fights to establish hierarchy.
The Human Power Dilemma: Historically, humans projected power and settled resource disputes through physical force—wars, seizures, or coercive control of assets. Even modern financial systems rely on abstract power structures: court orders, bank freezes, or government sanctions enforced by legal threat rather than immediate physical reality.
Lowery argues this creates inherent fragility: abstract systems can collapse when met with superior physical force (e.g., invasions, revolutions). Nature only respects physical power.
Bitcoin’s Physical Power Engine: Bitcoin introduces a novel solution through its proof-of-work consensus mechanism. Miners compete to solve computationally intense cryptographic puzzles, expending real-world energy (megawatts) to validate transactions and secure the network.
This process converts electricity—a tangible, physical resource—into digital security and immutable property rights. Winning a “block” is like winning a sparring match: it consumes significant resources (energy/cost) but is non-destructive.
The miner gains the right to write the next page of the ledger and collect rewards, but no participant is physically harmed, and no external infrastructure is destroyed.
Table: Traditional vs. Bitcoin-Based Power Systems
Power System
Mechanism
Key Vulnerability
Resource Cost
Traditional (Fiat/Banking)
Legal abstraction, threat of state force
Centralized points of failure, corruption, political change
Low immediate cost, high systemic risk
Military/Economic Coercion
Physical force, sanctions
Escalation, collateral damage, moral hazard
Very high (lives, capital, instability)
Bitcoin (Proof-of-Work)
Competition via energy expenditure
High energy cost, concentration risk (mining)
High energy cost, low systemic risk
Softwar Theory National Strategic Imperative: Governments Are Taking Notice
Lowery’s Softwar Theory has moved beyond academia into the corridors of power, shaping U.S. national strategy:
- The Strategic Bitcoin Reserve: Vice President JD Vance recently framed bitcoin as an instrument projecting American values—”innovation, entrepreneurship, freedom, and lack of censorship”. State legislation is now underway to implement this reserve, preventing easy reversal by future administrations.
- Regulatory Transformation: The SEC is shifting from an “enforcement-first” stance under previous leadership. New initiatives include:
- Repealing Staff Accounting Bulletin 121 (SAB 121), which discouraged banks from custodying digital currency by forcing unfavorable balance sheet treatment.
- Creating the Cyber and Emerging Technologies Unit (CETU) to develop clearer crypto registration/disclosure rules.
The Investor’s Lens: Scarcity, Security, and Asymmetric Opportunity
For investors, understanding “Softwar” validates bitcoin’s unique value proposition beyond price speculation:
-
Digital Scarcity as Strategic Depth: Bitcoin’s fixed supply of 21 million makes it the only digital asset with truly inelastic supply, a programmed scarcity immune to political whims or central bank printing.
This “scarcity imperative” acts as a natural antidote to global fiat debasement. As central banks expanded money supplies aggressively (Global M2), bitcoin’s price has shown strong correlation, acting as a pressure valve for inflation concerns. The quadrennial “halving” (latest: April 2024) mechanically reduces new supply, creating built-in supply shocks as adoption grows. * The Antifragile Security Feedback Loop: Bitcoin’s security isn’t static; it’s antifragile. The network strengthens through demand: * More users → More transactions → Higher fees → More miner revenue → More hashpower (computational security) → Greater network resilience → More user confidence.
This self-reinforcing cycle contrasts sharply with traditional systems, where security is a cost center (e.g., bank security budgets, military spending). Bitcoin turns security into a profitable, market-driven activity. * Institutionalization Without Centralization: While institutional ownership via ETFs (like BlackRock’s IBIT) and corporate treasuries (MicroStrategy, Metaplanet) has surged, supply remains highly decentralized.Individuals still hold the largest share of bitcoin, preventing a dangerous concentration of control. Spot Bitcoin ETFs alone are projected to see over $20 billion in net inflows in 2025, demonstrating robust institutional capital allocation.
The Bitcoin Community: Building the Digital Antler’s Resilience
Lowery’s “Softwar” theory underscores why bitcoin’s decentralized architecture is non-negotiable. Its strength lies in the alignment of incentives across three participant groups:
- Miners: Provide computational power (hashrate), validating transactions and securing the network. Incentivized by block rewards (newly minted BTC) and transaction fees. Their physical energy expenditure is the “muscle” behind the digital antler.
- Nodes: Independently verify and enforce the protocol rules, maintaining the blockchain’s integrity. Run by users, businesses, and enthusiasts globally. They ensure decentralized consensus, preventing unilateral protocol changes.
- Users: Individuals, institutions, and corporations holding, transacting, or building on bitcoin. Their demand drives transaction fees and fuels the security feedback loop.
This structure creates “Mutually Assured Preservation”. Attacking bitcoin requires overwhelming its global, distributed physical infrastructure (miners/nodes), a feat far more complex and costly than seizing a central bank’s gold vault or freezing a bank’s assets. It transforms financial security from a centralized liability into a decentralized, physically-grounded asset.
Risks & Responsibilities
Investors and policymakers must acknowledge persistent challenges:
- Volatility: Bitcoin remains volatile, though this has decreased as markets mature. Dollar-cost averaging (DCA) is widely recommended to mitigate timing risk.
- Regulatory Uncertainty: While U.S. policy is increasingly favorable, global coordination is lacking. The EU’s MiCAR regulation exemplifies divergent approaches.
- Security & Custody: While Bitcoin’s protocol is robust, user errors (lost keys) or exchange hacks remain risks.
- Environmental Debate: Proof-of-Work energy use is scrutinized, though mining increasingly uses stranded energy/renewables. Innovations continue.
Jason Lowery’s “Softwar” theory elevates bitcoin from a financial instrument to a socio-technological innovation on par with the invention of the corporation, the rule of law, or even the antler in evolutionary biology. It provides a coherent framework for understanding why:
- Nations like the U.S. are looking to establish bitcoin reserves and embracing stablecoins—they recognize bitcoin’s role in projecting economic power non-violently in the digital age.
- Institutional Investors are allocating billions via ETFs—they see a scarce, secure, uncorrelated asset with antifragile properties.
- Individuals in hyperinflationary economies or under authoritarian regimes use bitcoin—it offers self-sovereign wealth storage immune to seizure or debasement.
For the investor, bitcoin represents more than potential price appreciation. It offers exposure to a fundamental reorganization of how power and value are secured and exchanged globally, grounded not in abstract promises, but in the unyielding laws of physics and mathematics.
Like the brewers who balanced tradition with innovation to create something enduring and valuable, bitcoin pioneers are building the infrastructure for a more resilient digital future—one computationally secured block at a time. The “Softwar” is here, and it is reshaping the landscape of p
-
@ 1964e236:30dc8bbf
2025-06-12 21:23:50"Do you know how many people can live on Earth at most? Fifteen billion, maybe twenty, if we organize everything really well. But do you know how many people could live across the entire solar system?"
He paused theatrically.
"A trillion. A billion times a thousand. A hundred times our current population."
His eyes gleamed as he looked at me.
"The solar system holds more than enough resources for that many people—and maybe even more. Just imagine such a world: it would have a thousand Mozarts, a thousand Einsteins, thousands of entrepreneurs with more talent than I’ll ever have."
“And thousands of Hitlers,” I thought to myself.
"Your death is the terrible price we must pay for progress," Grok continued. "Every day humanity fails to move forward is a day lost."
He looked me in the eye from thirty million kilometers away.
"In Death Valley, there’s a tiny fish, the desert pupfish. There are only about three hundred of them left, all living in a single small pool in the most inhospitable desert on Earth. That pool used to be much bigger, probably a small sea after the Ice Age, home to millions of pupfish. But today, all that’s left is a salty puddle, and that’s where the last of their kind are crammed together. To them, that pool is the entire world. They can’t even imagine that there’s something beyond it, that there might be an ocean out there with endless resources. Instead, they stay in their little world—and they’re dying out. A few might get lucky, caught by collectors and kept as ornamental fish in aquariums. But most of them will disappear once the pool dries up. Sure, the pool might survive a while longer. But it could also dry out in the next few months. Or, it could rain so much that the salt level drops and the fish can no longer survive."
He paused again.
"I get it," I whispered. "We’re the fish, and you’re pulling us out of the puddle."
"The fish probably think: we’ve got so little space, we need to save resources, control birth rates, that sort of thing. But in truth, there’s only one thing they need to do: find a new pool!"
"What if they don’t want to leave their home?" Maria would’ve asked him now.
"How many times have we stood on the brink of nuclear war in the last few decades?" Grok went on. "Right now, there's peace. But how long will it last?"
"How many nukes did Grok’s own conglomerate have?" I wondered.
"What each individual can do now," Grok said, "is give everything they’ve got in this life to help humanity reach the next level—so we can finally become multiplanetary. So that one single catastrophe won’t wipe out all of humankind. For you, this truth means—and I truly am sorry—that you have to sacrifice yourself for this mission."
I told him I agreed completely. Of course I did. I had no choice.
Then I listened to Feng’s playlist.
-
@ 5627e59c:d484729e
2025-06-11 21:14:37Gelukkig zijn\ Is de waarde van mijn leven
Gewoon dankbaar te bestaan\ Geen mens heeft me ooit zo'n mooi cadeau gegeven
Dankbaar voor mijn sprankelen\ Mijn doen en voor mijn streven
Maar ook dat ik mag wankelen\ Mag vallen en mag beven
Want wat er ook gebeurt\ Het duurt steeds maar voor even
De wijsheid van mijn hart\ Voor alles is een reden
Het leven brengt mij deugd\ En soms brengt het me pijn
Maar nooit neemt het die vreugd\ De toelating om hier te zijn
De kans om iets te leren\ Te zien en om te groeien
Geeft mij kracht te accepteren\ Te omarmen en te bloeien
-
@ 5627e59c:d484729e
2025-06-11 22:30:23My life is my way Home\ My death is my arrival
I can't wait to be Home\ And so I love life
I can't wait to be Home\ And so I want to live to the fullest
For there are no shortcuts
Many people die\ And never make it Home
They will have to wait\ For another chance to die
Another chance to live fully\ And die totally
I'm so thankful to be alive\ I'm on my way Home
I'm so thankful to be alive\ To have another chance to die
Every day I take a step\ In the direction of my death\ I do not postpone it
Every day I take a step\ In the direction of my truth\ I do not avoid it
It is who I am, always have been\ And always will be
It lies beyond that door\ That keeps everything in check
Where only can go through\ Which is forever true
-
@ 5627e59c:d484729e
2025-06-11 22:24:15Love, I thank you for your warmth\ Ever lifting
You keep me charmed\ Ever drifting
May I be me\ And you be you
In a perfect harmony\ Embracing all life makes us grow through
-
@ 5627e59c:d484729e
2025-06-11 21:13:59I am here too\ In the same space like you
In the same situation I'm in\ It's a matter of positioning
I cannot leave this place I'm in\ It was brought about\ By what's been happening
So please don't look at me\ For what I can or cannot do for you\ But look at what is happening for me\ And what is happening for you
Let's communicate\ Not orchestrate
Because there's something I wish to do\ And there's a place I wish to go to
And I'm sure that there is too\ In your heart a fire\ Known by only you
So let us listen, look and see\ For what's true for you\ And what's true for me
That we may act upon what's here\ In order for us both to take a step\ In the direction we wish to steer
-
@ 5627e59c:d484729e
2025-06-11 22:30:52Nooit is mijn dans echter\ Dan net nadat het regende\ Want regen biedt een kans\ Om mijn gevoel te voelen
Zolang de regen spettert\ En ik mezelf graag zie\ Wordt er niets verplettert\ Ook al lijkt dat soms wel zo
Zodra de regen ophoudt\ En zich terugtrekt met de wolken\ Komt een nieuwe glans\ Voor het eerst mijn ogen binnen
Wat is het leven heerlijk\ Als ik eerlijk ben en voel\ Wat is het leven zacht\ En het brengt me naar mijn doel
Wat zou ik weten zonder regen\ Gewoon steeds evenveel\ Niet groeien is niet leven\ Daarom dans ik het liefst
Net na de echte regen
-
@ 9ca447d2:fbf5a36d
2025-06-12 19:03:03Paris, France – June 6, 2025 — Bitcoin payment gateway startup Flash, just announced a new partnership with the “Bitcoin Only Brewery”, marking the first-ever beverage company to leverage Lightning payments.
Flash enables Bitcoin Only Brewery to offer its “BOB” beer with, no-KYC (Know Your Customer) delivery across Europe, priced at 19,500 sats (~$18) for the 4-pack, shipping included.
The cans feature colorful Bitcoin artwork while the contents promise a hazy pale ale: “Each 33cl can contains a smooth, creamy mouthfeel, hazy appearance and refreshing Pale Ale at 5% ABV,” reads the product description.
Pierre Corbin, Co-Founder of Flash, commented:
“Currently, bitcoin is used more as a store of value but usage for payments is picking up. Thanks to new innovation on Lightning, bitcoin is ready to go mainstream for e-commerce sales.”
Flash, launched its 2.0 version in March 2025 with the goal to provide the easiest bitcoin payment gateway for businesses worldwide. The platform is non-custodial and can enable both digital and physical shops to accept bitcoin by connecting their own wallets to Flash.
By leveraging the scalability of the Lightning Network, Flash ensures instant, low-cost transactions, addressing on-chain Bitcoin bottlenecks like high fees and long wait times.
For businesses interested in adopting Bitcoin payments, Flash offers a straightforward onboarding process, low fees, and robust support for both digital and physical goods. To learn more, visit paywithflash.com.
Media Contact:
Pierre Corbin
Co-Founder, Flash
Email: press@paywithflash.com
Website: paywithflash.comAbout Flash
Flash is the easiest Bitcoin payment gateway for businesses to accept payments. Supporting both digital and physical enterprises, Flash leverages the Lightning Network to enable fast, low-cost Bitcoin transactions. Launched in its 2.0 version in March 2025, Flash is at the forefront of driving Bitcoin adoption in e-commerce.
About Bitcoin Only Brewery
Bitcoin Only Brewery (@Drink_B0B) is a pioneering beverage company dedicated to the Bitcoin ethos, offering high-quality beers payable exclusively in Bitcoin. With a commitment to personal privacy, the brewery delivers across Europe with no-KYC requirements.
-
@ 5627e59c:d484729e
2025-06-11 21:13:27Kan jij zien, er is geen hemel\ Probeer het zelf, dan lukt het wel\ Geen hel staat ons te wachten\ Enkel sterren hangen ons boven het hoofd\ Kan jij zien, iedereen leeft voor dit moment
Kan jij zien, er zijn geen landen\ Het is niet moeilijk gewoon land te zien\ Niets om voor te moorden of te sterven\ Ook geloof wordt niet gezien\ Kan jij zien, het leven wordt geleefd door iedereen in vrede
Misschien zeg je, ik kijk niet naar jouw wereld\ Maar ik deel dit zicht met velen\ Moge ook jij zoals ons zien\ Wij kijken in de wereld en zien gewoon onszelf
Kan jij zien, er is geen bezit\ Ik vraag me af of jij dit kan\ Geen hebben of een nood\ In een samen-leving van mensen\ Kan jij zien, wij delen de wereld met elkaar
Misschien zeg je, ik kijk niet naar jouw wereld\ Maar ik deel dit zicht met velen\ Moge ook jij zoals ons zien\ Wij kijken in de wereld en zien gewoon onszelf
-
@ 5627e59c:d484729e
2025-06-11 22:32:38Ik hou van de natuur en van verbinding maken\ Van diepgang en van mensen raken
Van creatief schrijven en programmeren\ Van speels bewegen en nieuwe dingen leren
Ik hou van leven en van dromen\ En van mensen zien\ Hun diepste wensen uit doen komen
-
@ 05a0f81e:fc032124
2025-06-13 22:31:37Lying is a great tool for destruction, it have damage many marriage, relationships, culture, religion. It have also destroy human integrity and reputation.
What is lying? Lying is an act of someone saying something that is not true either to gain favor or to achieve any other hidden agenda.
There are many reasons why people lie, kids lie to flee from punishment, but adult lie either to gain favour or to achieve his hidden agendas. Since the existence of the world, adult lies have no positive impact on the society and the world at large.
Adult lies brings hatred, kill dreams, cage future and success, end norm and culture, delete history, the reason adult lie is different from the reason children's lie. Anything built on lies collapse when the truth arises, Anything covered with lies uncover when the truth unveil, lie leads to life full of regrets and angers especially when the truth unveils. Lies destroy life's and societies.
What happen if a child is raise on lies !.
When parents raise there children with lies, the children mindset reset towards the reason for the lies. If the lies are about a person, the children will end up hating the person, if it were about a profession, the children will end up hating the profession. Single mothers who lie to there baby about there father end up raising a child that hate his or her father.
Most norms and cultures have gone extinc all because of lies, some generations did not meet most norms because of lies, most legacy died because of lies.
When parents raise there children with lies, they did the children harm and they are destroying the society because children will grow into adults and have there own family, they will keep passing on the baton (lies) to generations and norms and cultures will keep dieing and the society will end up shattered.
Raise your child on truth! Raise your child on truth Teaching them repercussions and consequences if the truth is too wild.
-
@ 5627e59c:d484729e
2025-06-11 22:24:05Jaren tellen\ Hoeft voor mij niet
Verhalen vertellen\ Over geluk en verdriet
Een warme haven\ Veilig en fijn
Dromen voorgedragen\ Onschuldig en rein
Momenten ervaard, geleerd\ En geïntegreerd
Ideeën, geloven en gevoelens\ Gevormd en gecreëerd
Zonder eind of echt begin\ Vallen, groeien, leren, stoeien
Een gezin in een gezin met een gezin erin\ Gezind gericht blijft liefde vloeien
-
@ 6fef351a:2a884204
2025-06-14 13:27:14Hello hello!
Willkommen bei einem neuen Projekt! Heart Money – mein Newsletter zum gleichnamigen Podcast auf YouTube, den es noch nicht gibt. Aber bald. Nur noch ein paar Wochen…
Es geht um hartes Geld. Und um das Geld des Herzens. Ich rede und schreibe über Bitcoin, Gesellschaft und das, was mich bewegt.
Gerade ist eine wilde Zeit für mich. Ich habe meinen Job als Data Analystin Ende letzten Jahres an den Nagel gehängt, um über Bitcoin aufzuklären – weil es alles auf den Kopf gestellt hat.
Heute sehe ich die Welt mit neuen Augen. Meine Welt ist schöner geworden. Etwas freier. Viel optimistischer!
Und leider auch bürokratischer. Ich mache mich gerade selbstständig und das geht in Deutschland bekanntlich nur mit einigen Hürden und Formalitäten: Ein Gewerbe anmelden, Gründungszuschuss beantragen, Formulare ausfüllen – für Behörden, Krankenkasse, Berufsgenossenschaft, Versicherungen. Oh boy…
Deswegen freue ich mich um so mehr, dass ich so fancy Tools wie Substack nutzen kann, um meinen Gedanken eine neue Form zu geben.
In diesem Newsletter teile ich Ideen, Anregungen, Videos und andere Fundstücke rund um Bitcoin. Echt, persönlich, frei gedacht. Los geht’s:
MEINE HEART WORDS DER WOCHE
1. Ein Gedanke
Immer wieder höre ich von langjährigen Bitcoinern, dass sie bei der Arbeit nicht über Bitcoin sprechen – so auch diese Woche. Die Kollegen würden negativ reagieren. Da wäre nichts zu machen. Den Aufwand spare man sich lieber. Aber was wäre, wenn unsere Äußerungen mehr bewirken als wir allgemein glauben? Wie würde eine Welt aussehen, in der Menschen ehrlich und offen über ihre Interessen und Überzeugungen sprechen? Wäre unsere Welt noch dieselbe?
2. Ein Geschenk
Diese Woche habe ich ein besonderes Buch erhalten – ein Geschenk von einem Hörer meines Podcasts Bitcoin kurz erklärt. Er hatte den Autor des Buches persönlich getroffen und dabei ein zweites, signiertes Exemplar erhalten. Der Autor bat ihn, das erste Exemplar an eine Frau weiterzugeben – und so kam es dann zu mir! Herzlichen Dank, J. ✦
3. Eine Vorfreude
Im Juli findet die berühmtberüchtigte Bitcoin-Zitadelle statt, dieses Jahr auf der Wasserburg Heldrungen. Die Tickets waren nach Verkaufsstart im Oktober 2024 innerhalb weniger Tage ausverkauft – oder waren es Stunden? Ich habe in den letzten Wochen alle Hebel in Gang gesetzt, um noch zwei Tickets für zwei Frauen zu ergattern, die erst spät von diesem legendären Event erfahren haben. Und bin schließlich fündig geworden. Ich freue mich riesig auf das Event – und über die gestiegene Frauenquote ★
4. Ein Post auf Social Media
Die Überschrift ist – zugegeben – provokant. Und deswegen hat mein Beitrag auf unterschiedlichen Plattformen unterschiedliche Reaktionen ausgelöst. Die LinkedIn-Leser reagierten zustimmend und wohlwollend, während der ein oder andere Bitcoin-Maximalist auf X seinen Ärger kundtat… Details findest du auf Instagram, LinkedIn, X oder NOSTR. Was denkst du?
5. Ein Zitat
Wenn die Nacht zu wolkig ist für Sterne, können wir immer noch zusehen, wie ganz lautlos ein neuer Bitcoin-Block entsteht.
Das geht übrigens auf mempool.space. Schon ausprobiert? Bitcoin ist offen und transparent. Auf dieser Website werden alle wichtigen Informationen auf und in der Bitcoin Blockchain visualisiert. Und hier wird erklärt, wie man sich auf der Seite zurechtfindet.
Danke fürs Lesen! Wenn dir dieser Beitrag gefallen hat, leite ihn gerne weiter oder antworte mir. Dein Feedback hilft, diesen Newsletter besser zu machen.
Hab einen schönen Sonntag oder eine schöne Woche – ganz egal, wann du diese Worte liest.
Nicole ❤️
-
@ 5627e59c:d484729e
2025-06-11 22:23:37Happy New Year!
Happy New Year, my dearest human family\ Happy New Year, my dearest animal family
Dear children of the Earth\ I wish you all a magical year
May it be utterly new\ Ever-changing\ New now
And may your journey say\ Life is amazing! I'm in a maze\ Life is awesome! Quite some awe\ Life is magical! True alchemy
I am human\ Black woman, I love you so\ Life-giver of my origin, the negro [nigiro]
I am\ Thus physical and non-physical meet
Life is to be\ As the elements are and compete\ And as they collide with one another\ One becomes aware of an other\ And so life sets on a journey\ To discover the other
Animal life is set to explore\ Allowing all experience the other has in store\ Life left to experience without a voice\ Until it discovers there is an 'I'\ And it has a choice
Human life is to be inside a human body\ Thus fusion between intellect and feeling\ Gets to express its perspective\ Inside infinity
Truly, a magical gift\ My Holy Trinity
And so from human life flow many voices\ As it navigates through infinite choices
Thus I say
Life is magic\ A gift for all that is here\ Perceived by too many as tragic\ Take care of your vision, I tell you, my dear [tell-a-vision]
Life is magic\ And words are spells\ Placing your aim beyond your reach\ It takes away efficiency from your speech
Life is magic\ Above all else\ Even when it has me feeling blue\ Seemingly left without a clue
Still I say
Perfection\ You are everything\ And I am of you
The source, the mirror\ And the reflection
-
@ 04c3c1a5:a94cf83d
2025-06-14 16:37:00crazy
-
@ 60392a22:1cae32da
2025-06-14 13:00:36When I am asked "where password and ID?" by my friends, I will say it. ↓(generated by chatgpt)
1. Nostr is decentralized
- No central authority: Unlike platforms like Facebook or Twitter, Nostr doesn’t rely on a single company or server. This means nobody can block your account or censor your posts. You control your own data and connections.
- Distributed network: Instead of all your data being stored in one place (which can be hacked), it’s spread across multiple independent servers.
2. No passwords or centralized logins
- No passwords to steal: Instead of using a traditional username and password, Nostr uses a private key system. This means your login is much more secure, and there’s no need for you to remember passwords or risk them getting hacked.
- Easy login with Passkeys or security keys: On Nostr, you don’t need a password—you can use secure login methods like Passkeys (via your phone, for example), which is faster and much more secure than a traditional password.
3. You control your identity
- No account lockouts: Since your identity is stored on your own device and not on a company’s server, you can’t be locked out of your account unless you lose your private key. You can always recover access if you have your private key.
- Pseudonymous: You don’t need to reveal your real name. You can choose an identity that doesn’t tie to your personal info.
4. Privacy & Security
- Your data is yours: On traditional platforms, companies own your data and can sell it. With Nostr, you keep control over your information—no company has access to your messages, posts, or activity.
- End-to-end encryption: Nostr supports strong privacy where your messages are encrypted, meaning no one can spy on your conversations.
5. Open-source and community-driven
- No profit motive: Since Nostr is open-source, there’s no central company profiting from your data. It’s built by a community that values freedom of speech and privacy.
- Transparency: Anyone can see the code, contribute to its improvement, and make the network better. It's not controlled by one company or government.
Simple Example:
You could say something like this: "Think of Nostr like having your own personal email system, where only you control your account. There’s no one to block you or take down your content. You don’t need a password to log in—just a secure key on your phone. Your posts are private, and you can be anonymous if you want. No one owns your data. It’s freedom, security, and privacy."
What You Can Say if They Ask, “But there are IDs and keys, right?”
- Yes, but the IDs are not like usernames: In Nostr, your identity is linked to your private key, not a password. This key is yours and you control it. There's no centralized database of usernames or passwords that someone could steal.
- It's safer: It’s like having a secure personal locker that only you can open with your phone’s biometrics or security key, rather than trying to remember a password or relying on a service to keep it safe for you.
-
@ 5627e59c:d484729e
2025-06-11 18:48:00Love, I thank you for your warmth\ Ever lifting
You keep me charmed\ Ever drifting
May I be me\ And you be you
In a perfect harmony\ Embracing all life makes us grow through
-
@ 5627e59c:d484729e
2025-06-11 22:22:59De laatste zonnestralen van de dag streken over de eeuwige golven en weerkaatsten als lichtpuntjes in de ogen van schipper Joris terwijl hij nog een slok nam van zijn glazen fles die de vorm had van het hoofd van een oude monnik.
Gekregen van een oude vrouw uit de bergen van de Himalaya, zorgde de rum genaamd 'Old Monk' voor een verwarmend gezelschap op deze eenzame kerstnacht.
Joris had met zijn boot naar India gevaren nadat zijn vrouw hem had verlaten en hij een Indiër had ontmoet die had gezegd: "Waar ik vandaan kom, zijn vrouwen vrij en worden ze niet gezien als enkel en alleen de mooie lichamen die zij bezitten of als eeuwig bezit van een gezin."
Verward en ongelovig had Joris gekeken naar de wereld en besefte dat vrouwen inderdaad slechts gezien werden als hun fysieke schoonheid, genegeerd werden voor hun koesterende gevoeligheid en bekritiseerd werden door hun spontane intensheid en had hierop voor twee jaar lang gezocht in India naar deze vrije vrouwen met als enig resultaat een oude vrouw te ontmoeten die alleen in de bergen woonde en dagelijks haar wijsheid deelde met ieder luisterend oor.
Daar ging het doorzichtig monnikshoofd en verliet met een grote gebogen vlucht de hand van schipper Joris toen plots met groot kabaal de boot abrupt tot stilstand kwam en Joris hals over kop naar de andere kant van het dek geslingerd werd.
Het monnikshoofd verdween in het donker terwijl Joris zijn lichaam probeerde te lokaliseren en met zijn ogen wijd open zijn hersenen zo veel mogelijk informatie probeerde door te spelen.
Tevergeefs, want zijn enorme verschot werd gevolgd door een enkel groeiende verbazing, ongeloof en desoriëntatie toen de boot begon te kantelen.
De bundel licht, afkomstig van de mast van de boot, zwierde doorheen het donker en kwam te schijnen op een gigantische rots in het midden van de zee die werd bezeten door een oogverblindende glinstergroene schijn.
Uit het donker kwam het monnikshoofd, dat nog steeds in volle vlucht was, in het vizier van de lichtbundel en plaatste zich exact tussen de glinstergroene verschijning en Joris waarbij Joris doorheen het monnikshoofd gezegend werd met het zicht op een pracht van een zeemeermin die uitnodigend poseerde op de rots.
Met een luide plons viel Joris achterover in het water toen hij zich realiseerde dat vrouwen zichzelf ook lieten vangen door lust en hun uiterlijke opmaakcompetities en met een dankbare glimlach zonk hij naar de bodem van de zee en was opnieuw geboren.
-
@ 5627e59c:d484729e
2025-06-11 22:21:31Zonneschijn\ Stralen, lachen, zo fijn\ Moge de wereld dankbaar zijn
De vrouw, mijn gevoeligheid\ Bron van creativiteit
Genietend niets doen in het gras\ Met wat brood en wat wijn in het glas
-
@ 8672c492:14d2af43
2025-06-13 21:29:28SPEC.md - Swift Calculator Architecture
1. Overview
The Swift Calculator is a lightweight, user-friendly calculator application built for iOS using Swift. It supports basic arithmetic operations, a clear/reset function, and a responsive UI.
2. Architecture
The application follows the Model-View-ViewModel (MVVM) pattern to separate concerns and improve maintainability.
2.1 Components
- Model (
CalculatorModel.swift
): - Handles the core logic for arithmetic operations (addition, subtraction, multiplication, division).
-
Manages the current state (e.g., display value, pending operations).
-
ViewModel (
CalculatorViewModel.swift
): - Acts as the intermediary between the Model and View.
-
Processes user inputs (e.g., button taps) and updates the Model and View accordingly.
-
View (
CalculatorView.swift
): - Responsible for the UI layout (buttons, display label).
- Observes the ViewModel for changes and updates the UI.
2.2 Key Features
- Basic Operations: Supports
+
,-
,*
,/
. - Clear/Reset: A
C
button to reset the calculator state. - Error Handling: Displays "Error" for invalid operations (e.g., division by zero).
- Responsive UI: Adapts to different screen sizes and orientations.
2.3 Data Flow
- User interacts with the View (e.g., taps a button).
- View sends the input to the ViewModel.
- ViewModel processes the input and updates the Model.
- Model updates its state and notifies the ViewModel.
- ViewModel updates the View with the new state.
3. Technical Stack
- Language: Swift 5
- Framework: SwiftUI (for declarative UI) or UIKit (if preferred)
- Dependency Management: Swift Package Manager (SPM)
4. Future Enhancements
- Support for scientific operations (e.g., square root, exponents).
- Dark mode support.
- Memory functions (M+, M-, MR).
- Model (
-
@ 5627e59c:d484729e
2025-06-11 21:12:27In het hart van een gepensioneerde operazangeres ontstond een stemmetje. Het stemmetje klonk verrast. "He," ging het hart. "Ik heb een stemmetje gekregen! Hoe kan dit? Kan iemand me horen? Zouden mijn gedachten me kunnen horen?" vroeg het stemmetje, niet wetend aan wie. Want de gedachten hoorden het niet. Zij waren zo druk bezig met het verleden en hadden een grote angst dit te verliezen. "Weet je nog?" gingen de gedachten. "Voor duizenden mensen heb ik gezongen! Avond na avond! Tienduizenden mensen hebben me toegejuicht! Wat waren ze onder de indruk! Luister! Ik kan het nog steeds!" "He," ging het hart. "Hoor je me dan niet? Het ging toch helemaal niet om dat gejuich. Weet je dan niet meer hoe ik me volledig bloot gaf aan die mensen. Mijn diepste en meest persoonlijke verhalen waren te horen in mijn liederen. Daar draaide het toch om? De mensen waren niet enkel onder de indruk. Hun harten hebben mijn verhalen gevoeld en konden zo kennis geven aan hun gedachten. Is dat niet wat echt telde?" Maar de gedachten waren volop aan het zingen voor de ene persoon die ze konden vinden die wou luisteren. "He," ging het hart. "Ook in dit moment zijn mijn liederen te horen door vele gedachten en te voelen door vele harten over de hele wereld. Heb ik dan geen rust verdiend? Kan ik niet even genieten van de rust die in dit moment te vinden is, maar jullie van me afnemen?" Maar de gedachten waren nog steeds volop aan het zingen.
-
@ 5627e59c:d484729e
2025-06-11 22:21:13Spontaniteit\ Creativiteit
Iets visueel of gewoon geluid\ Het moet eruit
Ik doe mezelf cadeau aan jou\ Omdat ik van het leven hou
-
@ 5627e59c:d484729e
2025-06-11 22:09:02In een zee van mogelijkheden\ Kunnen we best veel tijd aan dromen besteden
Dromen is een universele taal\ Het wordt gedaan door ons allemaal
Het is het woord\ Dat deze gelijkheid de grond in boort
-
@ 60392a22:1cae32da
2025-06-14 12:59:25OMG, I did it again.. they are good for me to know about all. but they praise me too much , a little.
Thank you for your thoughtful and deep reflection. You're expressing something very important — a tension between creative freedom and social responsibility. Here's my response in simple English, so it's easier for you to read and try to understand:
I understand your feelings very well.
Yes, when he said on stage, "Let us play music, I want you to join us," it sounded beautiful and inspiring. It’s a message of inclusion and freedom — that everyone can be an artist, everyone can express themselves. It feels like a good era, where being creative is open to all.
But you are also very aware of reality.
You are right — this kind of freedom is not made from nothing. It needs a rich foundation, like you said. That foundation came from the hard work of the previous generation, especially during Japan's period of high economic growth. Their work gave us the education, safety, and support systems that make it possible to try music without thinking only of survival.
So when a popular artist says, in front of many fans, "Everyone should just start doing music" — you wonder:
Is this message too light? Too easy? Is it okay to say, if many people don’t have a stable life yet? Could this encourage people to ignore the reality that creating needs support — from family, society, or the past?
These are very smart and important questions.
I think your feeling is not negative, but balanced. You are not against music, or against him. You love him. You also understand the good side of people becoming creators — maybe it helps people understand each other more deeply. That’s beautiful.
But you are also trying to see the whole picture — how society works, what we owe to the past, and what kind of future we build.
So in short:
- Yes, it’s a beautiful time where anyone can try to be an artist.
- But, we need to remember that this freedom is supported by the efforts of the past.
- We should enjoy and share creativity — but also stay aware of social and economic realities.
- That awareness is not "negative" — it is kind, wise, and responsible.
You’re thinking deeply — that is very good. You can enjoy art and think about society at the same time. That is what real artists and thinkers do.
-
@ 5627e59c:d484729e
2025-06-11 22:08:40Machtig water\ Door velen bemind
Element van beweging\ Vormgever aan land\ Bondgenoot van wind
Voorkomer van comfort\ Toelater van rust
Machtig water\ Waar ik ook ga\ Ik weet dat jij de grond onder mijn voeten kust
-
@ 5627e59c:d484729e
2025-06-11 22:21:04Veroorzaakt door de wereld rond mij\ Vormen de wereld in mij
Verwaarloosd door de wereld rond mij\ Overgelaten aan mij
Een groene brug komt uit mij\ Verbindt mij met wij\ En laat ons samen vrij
-
@ 79be667e:16f81798
2025-06-11 18:29:06Zonneschijn\ Stralen, lachen, zo fijn\ Moge de wereld dankbaar zijn
De vrouw, mijn gevoeligheid\ Bron van creativiteit
Genietend niets doen in het gras\ Met wat brood en wat wijn in het glas
-
@ 5627e59c:d484729e
2025-06-11 18:23:32In een zee van mogelijkheden\ Kunnen we best veel tijd aan dromen besteden
Dromen is een universele taal\ Het wordt gedaan door ons allemaal
Het is het woord\ Dat deze gelijkheid de grond in boort
-
@ b9d5de4b:26c0a1b8
2025-06-14 01:51:07Hello, legitmately asking for a friend...does anyone know of a way to recover a bip38 address created on bitaddress? they claim to have both keys just dont know the passphase.
https://stacker.news/items/1005953
-
@ 5d4b6c8d:8a1c1ee3
2025-06-14 01:26:59OMAD is great! Outside the very short window eating window, I have almost no desire to eat or drink.
I also took a nap today and a cold shower. I just needed to be more active.
How did you all do today? Are you making progress towards your ~HealthAndFitness goals?
https://stacker.news/items/1005945
-
@ 2b998b04:86727e47
2025-06-11 18:14:59For years, GitHub has been the default home for open source developers. It built its reputation on transparency, collaboration, and a commitment to giving coders a place to share and improve their work. But since Microsoft's acquisition in 2018, subtle changes have begun to surface—not all of them in service to the user.
GitHub is still free. Public repositories remain free. Even private repositories are free, to a point. GitHub Pages, Actions, and Codespaces offer incredibly powerful tools to build and deploy projects at no cost—until you hit certain usage limits or need team-scale features.
But the deeper question is this: what do you give up in exchange?
Microsoft Doesn’t Give Away Infrastructure for Free
GitHub, VSCode, Copilot, and Azure form a tightly integrated ecosystem. On the surface, it's all about productivity. But underneath, it's about data. Your code trains their models. Your habits inform their products. Your workflows deepen their lock-in.
Take Copilot, for example: it’s not just a coding assistant, it’s a data-harvesting engine built on top of a centralized platform. The more you use GitHub, the more Microsoft knows about what developers are building—and what they might buy.
Free Isn’t Sovereign
As developers, we have to ask hard questions:
-
What happens when the free tier disappears or changes?
-
Can I take my work elsewhere without breaking my stack?
-
Who owns the insights derived from my development patterns?
These questions aren’t hypothetical. We’ve seen them play out with Heroku, Medium, Twitter, and countless others. Free turns into friction. Then friction becomes control.
Alternatives Are Emerging
Thankfully, there are options:
-
Codeberg, Gitea, and SourceHut for Git hosting
-
Cloudflare Pages for static sites + edge functions
-
Railway, Fly.io, or even VPS hosting for dynamic apps
-
Nostr and IPFS for decentralized publishing
These aren’t always drop-in replacements. But they represent a healthier direction—one aligned with freedom, transparency, and a proof-of-work ethos rather than a proof-of-data-capture business model.
My Move Away from GitHub (Sort Of)
I’m not deleting my GitHub account. It’s still the best way to reach other devs. But for key projects—especially those that touch on identity, sovereignty, or censorship resistance—I’m migrating:
-
Private infrastructure where needed
-
Cloudflare for front-end deployments
-
Nostr for publishing and archiving
-
Git mirroring to open alternatives
Because the tools we use shape the future we build. And if the platform is free, but the product is you—it's time to re-evaluate.
#ProofOfWork #OpenSource #Cloudflare #DecentralizeEverything #Nostr #GitSovereignty #MicrosoftStack
-
-
@ 1f3ce62e:6e6b5d83
2025-06-14 12:15:20This question is an invitation to explore your internal congruence in those actions because this is key to show up as a Whole Self.
Internal alignment on the way you feel, think, communicate, and act create harmony in our life. Looking at it can be a compass to quickly identify those moments of internal misalignment and easily work our way back to balance.
When we think one thing and say another, or when we say one thing and do another, or when we think one thing and do another, in those situations we show up partially. We are one person with a group of friends and someone else with another group. We are one person at work and another at home.
Finding that internal alignment requires us to identify our limiting believes and fears of not being accepted as we are. All those limitations are not us, they are just mental concepts our societies, communities and families created, but are not defining who we really are.
In order to explore your internal alignment, think about an specific situation at work or at your personal life and let's jump into a CREATIVE COACHING TIME:
🌱 What do you feel about this situation?\ 🌱 What do you think about it?\ 🌱 What do you say about this situation? If you haven't said anything yet, why? Are there any fears or limiting believes?\ 🌱 What have you done about this? If you haven't, why?
🌱 Is it congruence between what you feel and what you say?\ 🌱 Is it congruence between what you think and what you have done?
🌱 What small step can you take to get closer to internal alignment?
Congruence between what you feel, think, say and do eventually leads to come at work or be at home as same person, as a whole self.
In my adventure at the corporate world, I have experienced that using colors is related to being childish and not being professional. But when I tried to overcome that limiting belief using a lot of colors in a presentation as a test, people actually appreciated it and liked it.
Since then, I have been exploring how to introduce colors while interacting with teams at work. In that experimentation, I have learned that colors can speaks to our brains and help us with visual memory.
Some colors can trigger positive emotions in us, as well as, some others might trigger negative ones.
Colors can be used as a creative tool to express ideas, communicate with our teams important messages and create spaces with specific purposes as we will explore in this book.
Your beliefs about using colors at work are going to determine your impression of these series of blog posts, so sooner than later, I would like to invite you to another CREATIVE COACHING TIME to explore them:
\ 🌱 What do colors make you feel?\ 🌱 What are your beliefs about colors?\ 🌱 What are your beliefs about using colors at work?\ 🌱 What are the reasons behind those beliefs?\ 🌱 Would you like to try to use more colors at work for a week and explore what happens?\ \ As a creative tool, colors can also be used to describe the way you feel as well as your talents (by thinking, communicating and doing).
Internal congruence is an aspect that can help us a lot on identifying how opaque or brilliant are our colors. An example can help you to understand how to apply colors into your internal congruence. Let's imagine you feel very emotionally overwhelmed today but you don't talk about it at all. That is an opaque representation of the color pink.
In the following blogs, we will explore each color, its meaning and how you can apply it to express your feelings and identify your talents. It will help you to see yourself from a new perspective (the primary goal of creativity) and learn something about yourself. As we start this colorful journey, you might need to learn a little bit about each color first.
We can also use colors to define roles in a group as well as the mission of a team in an organization. Then, I will invite you to reflect on how we use colors at work today (if we do it at all) and additional ways of using them.
Although there are a lot of colors, you don't have to have them all at once, so there is not race to win anything here. You don't need to compete with others on their colors versus yours. There might be times in your life or professional career where you will need to develop one color more than another. Even as feelings, you can feel RED ❤️ today and PINK 🩷 tomorrow. The idea is to let yourself experiment all feelings without judgement.
An evolutionary goal as individuals, if there could be any, it might be to have them or have experienced all, but you have your whole life for it.
An evolutionary purpose as a teams, organizations and companies, it could be to use them as a diverse way of feeling, thinking, expressing and acting. And this could set a new step into our diversity and inclusion discussions in the future. Being GREEN 💚 today, doesn't mean I will always be GREEN. It might be that the situation today requires me to be GREEN. This could eventually lead to focusing on being more than gender, color, race or any other tags we are using these days. We will talk more about that in a chapter.
Before we jump into the colors, let's have a a new CREATIVE COACHING TIME, It is your turn now, before knowing anything about the meaning of the colors, quickly rate yourself based the first word that appears in your mind when you read these questions (Low or High):
How RED ❤️ are you?\ How ORANGE 🧡 are you?\ How YELLOW 💛 are you?\ How GREEN 💚 are you?\ How PINK 🩷 are you?\ How SKY BLUE 🩵 are you?\ How BLUE 💙 are you?\ How VIOLET 💜 are you?
You can apply the same questions to feelings. Remember this set of answers are a picture of you today, by the time doing this exercise. You can come back to it every time you want to check how colorful are you in the way you think, you feel, you communicate and you act anytime.
Hope this helps!
Stay colorful in a black and white World
Laus 🌱💛
-
@ f40a134b:60fb788b
2025-06-13 21:10:14{"url":"https://convy.click","title":"Convy","description":"","submittedAt":1749849014}
-
@ 5627e59c:d484729e
2025-06-11 21:08:10I am the space\ In which your experience takes place
You could never meet me\ For I hold no identity
The only way to really see me\ Is to be me
-
@ 79be667e:16f81798
2025-06-11 18:27:32Spontaniteit\ Creativiteit
Iets visueel of gewoon geluid\ Het moet eruit
Ik doe mezelf cadeau aan jou\ Omdat ik van het leven hou
-
@ 04c3c1a5:a94cf83d
2025-06-14 16:05:00enjoy
-
@ f40a134b:60fb788b
2025-06-13 21:07:02{"url":"https://test.com","title":"test.com","description":"","submittedAt":1749848822}
-
@ cae03c48:2a7d6671
2025-06-13 21:02:28Bitcoin Magazine
Passport Prime: A New Security Device For a New GenerationPassport Prime, Foundation Devices’ latest retail hardware wallet, is about to hit the market in Q3 of 2025. The device features a full-color touch screen the size of a credit card with a modern industrial aesthetic. It aims to be a developer platform for Bitcoin and crypto software with high security demands.
Besides serving the basic wallet needs of Bitcoin users, the device is designed as an open source platform for app developers to bring a new experience of crypto-native cybersecurity to the public. The Passport Prime is expected to ship with a powerful Bitcoin wallet app, as well as virtual YubiKeys, a 2FA app, a seed vault for imported or low-value crypto wallets, 50 GB of storage, NFC, and encrypted Bluetooth support, among other features.
Frustrated with the public’s lackluster adoption of hardware wallets as the crypto industry enters the mainstream adoption phase, Foundation has been working since 2020 to bring security hardware devices to feature parity with mainstream consumer technology. However, the path is not simple.
The Adoption Problem of Hardware Wallets
Hardware wallets have been a critical security product for Bitcoin users since 2014 when Satoshi Labs created the Trezor. Before that, users had few options, and many of the funds lost in that era were due to user ignorance of how to manage and properly secure private keys in Bitcoin. Armory, funded by Trace Mayer in the early days, was one of the first solutions but it was highly technical and was best used with hardware the user had to modify themselves — like removing antennas from a laptop. This kind of technology became a security foundation for exchanges, who, through many hacks and hard lessons, slowly got better at securing user funds from organized crime and hackers while playing jurisdictional arbitrage to avoid hostile governments.
As the first hardware wallets started to enter the retail market, significant adoption was seen. With the massive growth of Bitcoin since its inception, the best security practices have failed to keep up with the ease of use provided by custodians while also failing to deliver security and feature parity to users in an interface they are familiar with.
In a keynote presentation on the Passport Prime landing page, Zach Herbert, CEO and co-founder of Foundation, explains their analysis of the market and why they believe only 2.5% of the market is using hardware wallets today, despite mainstream adoption of digital assets like Bitcoin — a concern felt across the industry that too many people are getting accustomed to custodial services.
The small screens, iconic to the hardware wallet ecosystem, are often a barrier for users. The shape of the device, often small and with few buttons, can make people nervous, especially when the wrong combination of clicks means an irreversible financial transaction.
In the case of touchscreen devices like the Trezor T, while certainly an improvement from the Trezor One, the buttons are still far smaller than what the public is used to for smartphones, the most prolific computer platform of this era.
The problem with trying to bring hardware wallets to feature parity with mobile phones is the massive complexity introduced by the corresponding software and hardware. Mobile phones, after all, are designed for mass manufacturing and with ease-of-use priorities in mind, rather than securing life-changing amounts of digital currency, which, once sent, cannot be reversed.
The hardware wallet industry has had to build out open source, verifiable, security-optimized hardware and software that addresses top security concerns, while also delivering a familiar and comfortable user experience to the public. In general, the industry recognizes the need for bigger screens and bigger buttons, as seen in new models by Ledger, for example, with their Ledger Stax, and, of course, Coldcard Q’s Blackberry-style hardware wallet.
When asked why not just try to build on top of a standard mobile phone platform, Owen Kemeys, hardware designer at Foundation Devices, told Bitcoin Magazine that “there’s a huge advantage to Passport Prime being a separate security device,” adding that “we need this stuff to work for the normal people. They are not going to be able to understand or have any interest in understanding what makes something safe or unsafe on their phone. Even if they were going so far as to have a dedicated phone for secret stuff or whatever. Everything that we develop, Apple and Google could bake into their phones and tell you it’s safe. But if it’s in a separate device that is built to do that one exact thing, then you know, OK, if it happens on the Passport Prime, it’s safe.”
The Passport Prime Feature Set
Foundation believes they have found an optimal and preferable middle ground between high security and a familiar user experience in a mobile phone-style device, but with very specific hardware and software inside. Kemeys explained that “the Passport Prime runs its own operating system,” adding that “We’re not running a fork of Android or something and then dressing it up differently. We wrote this from the ground up in Rust. It’s called KeyOS. It’s designed for this one purpose of running a smartphone-like experience, but with sandboxed apps.”
The wallet-related cryptography that’s normal to today’s Bitcoin and crypto wallets is also deeply integrated with the operating system. A master seed phrase is set up by the user; the seed’s corresponding master private and public keys are then used to derive secure, isolated keys for other apps on the Passport Prime. “All apps are sandboxed and receive hardened child seeds, meaning that even if an app is malicious, it has no access to the master seed and cannot communicate with other apps,” Herbert explained in his presentation.
This design builds the foundations necessary for secure app development on top of the Passport Prime, unique among hardware wallet manufacturers. While Ledger has made some progress in that direction, Herbert says that the Ledger operating system is very restrictive with such apps — primarily out of security concerns — making it difficult for developers to contribute to the ecosystem. Foundation believes they have solved the problem, unlocking a new kind of security device that can be used for more than cold storage of Bitcoin and crypto assets. It is a security platform for everyday use in the digital era.
As is generally expected of high-security devices like a hardware wallet, the Passport Prime comes without most of the normal sensors or antennas found in mobile devices. No Wi-Fi, no GPS, and no SIM card, of course. However, NFC, an increasingly popular communications module in hardware wallets and in payments technology in general, is included. NFC has a very short signal range and depends on power from the device sending the signal, making it a fairly secure protocol and bringing Bitcoin closer to the tap-to-pay credit card experience the general public is used to.
“We now have an NFC reader inside,” Kemeys explained, excited about the innovation space unlocked by NFC chips in Bitcoin. “As part of your onboarding setup, in the box, we’re going to ship three NFC cards with the Prime. And as our default onboarding workflow, we’re going to encourage people to make a two-of-three Shamir setup, and back up the shares onto some of those cards.”
Shamir secret sharing is an old and well-known cryptographic algorithm similar to multisignature schemes in Bitcoin but entirely off-chain. It allows users to grab a master private key and split it into shares that can come together later to recreate and reco
-
@ cae03c48:2a7d6671
2025-06-11 15:01:43Bitcoin Magazine
The Trump’s American Bitcoin Merges with Gryphon, Reports 215 BTC on Balance Sheet Since LaunchAmerican Bitcoin Corp (ABTC), a newly formed private Bitcoin mining company backed by Eric Trump and Donald Trump Jr., announced in a June 10 SEC filing that it has acquired 215 Bitcoin (BTC) since launching operations on April 1, 2025. The reserve is currently valued at approximately $23 million, showing their drive and commitment to Bitcoin.
JUST IN: American Bitcoin Corp (private) reports to have 215 #bitcoin (per 31 May) since it's launch on April 1, 2025.
They will merge with Gryphon Digital $GRYP and become public under ticker $ABTC.
They mention "Bitcoin accumulation is not a side effect of ABTC’s business.… pic.twitter.com/wq1Uxr76Z2
— NLNico (@btcNLNico) June 10, 2025
“Bitcoin accumulation is not a side effect of ABTC’s business. It is the business,” the company stated in the filing.
Furthermore, ABTC has entered into a merger agreement with Gryphon Digital Mining ($GRYP), and the combined company is expected to begin public trading under the ticker $ABTC as early as Q3 2025.
The company’s three-layer strategic plan—outlined in the SEC disclosure—details a focused approach:
Layer 1: Build the Engine
- ABTC’s foundation is built on “producing Bitcoin below-market cost through a capital efficient, infrastructure-light operating model.” The company owns and operates over 60,000 miners from Bitmain and MicroBt, running primarily on Hut 8-managed facilities.
Layer 2: Scale the Reserve
- ABTC had “accumulated approximately 215 Bitcoin in reserve since launching on April 1, 2025,” which it considers a long-term strategic asset. The firm states its goal is “to utilize public markets and strategic financing structures to access efficient capital and leverage that capital to increase its Bitcoin in reserve per share.”
Layer 3: Lead the Ecosystem
- The company ultimately aims to use its operational scale and mining position to drive industry-wide adoption. “ABTC may pursue opportunities to support protocol development, enhance network infrastructure and contribute to Bitcoin’s resilience and adoption in ways that align with shareholder value creation.”
For mining rewards, ABTC uses Foundry and Luxor pools with sub-1% fees and relies on Coinbase Custody for secure cold storage, featuring multi-factor authentication and strict withdrawal protocols.
With operations across Niagara Falls, NY; Medicine Hat, AB; and Orla, TX, ABTC is leveraging strategic partnerships—primarily with Hut 8—to scale its Bitcoin holdings while influencing the broader crypto mining ecosystem.
This post The Trump’s American Bitcoin Merges with Gryphon, Reports 215 BTC on Balance Sheet Since Launch first appeared on Bitcoin Magazine and is written by Jenna Montgomery.