-
@ 9ca447d2:fbf5a36d
2025-06-18 04:02:01Paris, France – June 6, 2025 — Bitcoin payment gateway startup Flash, just announced a new partnership with the “Bitcoin Only Brewery”, marking the first-ever beverage company to leverage Lightning payments.
Flash enables Bitcoin Only Brewery to offer its “BOB” beer with, no-KYC (Know Your Customer) delivery across Europe, priced at 19,500 sats (~$18) for the 4-pack, shipping included.
The cans feature colorful Bitcoin artwork while the contents promise a hazy pale ale: “Each 33cl can contains a smooth, creamy mouthfeel, hazy appearance and refreshing Pale Ale at 5% ABV,” reads the product description.
Pierre Corbin, Co-Founder of Flash, commented:
“Currently, bitcoin is used more as a store of value but usage for payments is picking up. Thanks to new innovation on Lightning, bitcoin is ready to go mainstream for e-commerce sales.”
Flash, launched its 2.0 version in March 2025 with the goal to provide the easiest bitcoin payment gateway for businesses worldwide. The platform is non-custodial and can enable both digital and physical shops to accept bitcoin by connecting their own wallets to Flash.
By leveraging the scalability of the Lightning Network, Flash ensures instant, low-cost transactions, addressing on-chain Bitcoin bottlenecks like high fees and long wait times.
For businesses interested in adopting Bitcoin payments, Flash offers a straightforward onboarding process, low fees, and robust support for both digital and physical goods. To learn more, visit paywithflash.com.
Media Contact:
Pierre Corbin
Co-Founder, Flash
Email: press@paywithflash.com
Website: paywithflash.comAbout Flash
Flash is the easiest Bitcoin payment gateway for businesses to accept payments. Supporting both digital and physical enterprises, Flash leverages the Lightning Network to enable fast, low-cost Bitcoin transactions. Launched in its 2.0 version in March 2025, Flash is at the forefront of driving Bitcoin adoption in e-commerce.
About Bitcoin Only Brewery
Bitcoin Only Brewery (@Drink_B0B) is a pioneering beverage company dedicated to the Bitcoin ethos, offering high-quality beers payable exclusively in Bitcoin. With a commitment to personal privacy, the brewery delivers across Europe with no-KYC requirements.
-
@ b1ddb4d7:471244e7
2025-06-18 04:01:41The Barcelona Cyphers Conference (BCC8333), the city’s first biggest bitcoin-themed event, transforms a historic building in the central born district of the Catalan capital into a hub for bitcoin enthusiasts and cypherpunks. Named after the port bitcoin nodes use to sync the timechain (8333), this inaugural event delivers high-signal discussions and practical applications of decentralized technology, uniting over 100 attendees from Spain, Europe, and beyond.
Venue and Atmosphere
Set in a 17th-century palace that doubles as a flamenco venue, Palau Dalmases blends historical elegance with a creative, almost rebellious vibe. The unique setting fosters deep conversations, hands-on workshops, and genuine connections, prioritizing substance over spectacle. The spectacular courtyard serves as a lively backdrop for collaboration and sparking chats that resonates with the event’s freedom/privacy-oriented ethos.
Lightning Network Integration
BCC8333 embedds Bitcoin’s Lightning Network (LN) into its core, emphasizing privacy and scalable technology. Two on-site bars accept LN payments for drinks, demonstrating fast, low-cost bitcoin transactions in action.
But the usage of Lightning Network extends beyond just ‘refreshments’.
· Chain Duel: This simple yet engaging game has many BCC8333 participants send sats via LN to enter, compete, and have fun for the two days of the event. A large-screen tournament on the main stage amplifies the excitement, showcasing one more practical case for LN in the bitcoin ecosystem with a nice bounty, i.e. winners claiming the collected sats.
· Thematic sessions and practical workshops on wallets, vending machines, and Nostr highlight LN’s role in bitcoin adoption, while touching on the importance of privacy vs. scalable transactions.
While the overall adoption in Barcelona’s local establishments outside the venue remains rather limited, attendees find a nearby street with vivid graffiti dedicated to bitcoin, and in a practical way, whenever possible, swap sats for fiat among themselves when direct payments aren’t possible.
Selected Highlights
The agenda balances intense sessions with networking breaks, ensuring space for reflection and collaboration. Some of the key sessions include:
· Future of Private Transactions (English, Max Hillebrand).
· Miniscripts Roundtable (English, Edouard from Liana, Landabaso from Rewind, Francesco from BitVault, Yuri da Silva from Great Wall).
· Sovereign Hardware Tools (English, Wesatoshi).
· Debate: Future of Lightning (Spanish, mixed attendees).
· Op_return Debate (English, Peter Todd, Unhosted Marcellus, Lunaticoin).
Recordings from the main stage and additional coverage by Juan Cienfuegos, host of the BitCorner Podcast, will soon be available online (X: @BCC833, @TheJuanSC).
Why BCC8333 Stood Out
· Local Maxis: vibrant and well-organized approach shines through, with local bitcoiners as organizers of the event (Spanish and expats) bringing their best PoW to the table.
· Focused Discussions: Free of hype and influencers, BCC8333 prioritizes signal over noise, diving into critical topics like privacy, nodes, wallets, P2P tools, decentralized mining, and Nostr.
· Community Vibe: The smaller crowd enables authentic connections, fostering a tight-knit community of freedom-tech enthusiasts committed to sovereignty.
BCC8333 is a powerful testament to the cypherpunk spirit, blending bitcoin and privacy to fuel innovation. From LN-powered interactions to thought-provoking talks, the event underscores the strength of a community dedicated to building decentralized solutions. Congratulations to the organizers, contributors, volunteers, and attendees for making this conference a standout moment in the year’s lineup of bitcoin-themed events.
-
@ 52524fbb:ae4025dc
2025-06-18 03:37:50Gold mostly referred to as ultimate safe-haven asset amidst economic uncertainty or market makes investors desperately flock to it for stability. This traditional view scratches surface of gold's role barely in an increasingly complex global landscape interconnected precariously nowadays. Critical analysis reveals XAUUSD as a highly sensitive barometer of geopolitics. its price movements frequently mirroring the flow of tensions internationally. Astute traders unlock gold's full potential by recognizing an intricate relationship quietly beneath surface level market fluctuations daily.
Gold earns its safe haven label largely due to it's perceived ability of preserving wealth amidst faltering fiat currencies or traditional assets suddenly. This phenomenon persists remarkably during severe financial turmoil or episodes characterized by unusually high inflation rates nationwide. Apparently geopolitical events introduce a disparate dimension of risk not just economically but systemically affecting everything pretty badly. Major conflicts erupt suddenly between global powers and XAUUSD often reacts vigorously transcending risk aversion in turbulent geopolitical landscapes. It morphs into reflection of looming disruptions across global supply chains and potential sanctions amidst wildly fluctuating energy prices suddenly.
A sudden escalation of tensions might erupt pretty quickly in some critical oil producing region. Crude oil prices may react rapidly but XAUUSD will likely be impacted swiftly amidst sudden market fluctuations too. Rising oil prices spark inflation fears amidst murky global economic prospects and precarious possibilities of sprawling conflict severely impacting major economies. Gold acts as hedge against unknown terrors and facilitates flight to security palpably tangible when geopolitical landscape becomes rather unpredictably volatile. Gold's status as reserve asset for central banks adds another hefty layer of geopolitical sensitivity pretty much worldwide nowadays. Several central banks mostly in emerging markets have amped up gold reserves partly as diversification tactic away from US Dollar lately. Sovereign entities amass gold strategically in response to geopolitics and shifts in this trend heavily influence global demand and subsequently XAUUSD prices.
Traders leveraging gold as a barometer of geopolitical turmoil must integrate qualitative analysis into strategy very carefully nowadays. It entails vigilantly tracking news from abroad and scrutinizing statements made by diplomats and lofty declarations uttered by world leaders. Anticipating likely responses and understanding economic vulnerabilities of various nations involved can give one an edge potentially in complex situations. A surprise summit between rival nations might signify de-escalation potentially leading quickly to pull-back in gold while sudden military build-up elsewhere could signal opposite XAUUSD retains fundamental safe-haven characteristics yet its role as real-time gauge of global geopolitical risk becomes increasingly pronounced nowadays. Traders gain keen insights into murky market sentiment by watching gold's reaction to tumultuous global events and thereby concoct shrewd trading strategies. Gold ain't merely some flashy metal it's a luminous barometer of global equilibrium shining brightly amidst economic turmoil naturally..
-
@ eb0157af:77ab6c55
2025-06-18 00:02:24A new study by Kraken reveals how cryptocurrency investors perceive security as the main challenge in self-managing their digital assets.
According to The Block, a recent survey conducted by crypto exchange Kraken found that nearly half of respondents consider themselves the primary risk factor for their own crypto security. The research, which surveyed 789 participants, highlights that 48% of users see their own actions as the greatest threat to their investments in digital assets, surpassing concerns about external theft or fraud.
Kraken’s report underlines how personal responsibility in security management forces users to take full control of their digital funds. However, the study suggests that this autonomy can also become a source of anxiety for many investors.
Nick Percoco, Chief Security Officer at Kraken, commented on the findings, noting that “a lack of confidence in personal crypto security is capping the growth of the industry.” According to Percoco, unlocking the full potential of cryptocurrencies will require users to embrace self-custody and consistently invest in strong security habits.
Technologies to strengthen security
Despite the concerns highlighted in the study, 31% of participants expressed optimism about future technologies that could improve crypto security. Among the most promising solutions identified:
- advanced biometric systems for user authentication;
- multi-factor authentication to secure wallet access;
- AI-based fraud detection systems to prevent attacks.
Data and case studies
Kraken’s research emerges in a context where security threats remain a pressing reality. FBI data shows that in 2024, nearly 150,000 reports of crypto-related internet fraud resulted in $9.3 billion in losses. Older users, particularly those over 60, proved especially vulnerable, accounting for $3 billion in crypto-related financial fraud losses on their own.
The post Kraken study: 48% of users fear themselves in managing and securing their funds appeared first on Atlas21.
-
@ 52524fbb:ae4025dc
2025-06-18 03:25:09EURUSD, which is a pair that shows the exchange rate between the Euro and the US Dollar, is arguably the most traded currency pair in the world. Its action the product not of economic announcements but rather a mix of incompatible monetary policies, contrasting economic thinking, and the political stability of two of the largest economic areas in the world - the Eurozone and the US. For traders, this backdrop is key to predicting price movements and containing exposure in this, heavily traded market.
Between European Central Bank and the Federal Reserve a very intricate tango unfolds quietly at the heart of EURUSD currency pair dynamics daily. These two central banks often diverge on monetary policy paths in response to their disparate economic conditions under price stability mandates. Interest rate differential largely drives EURUSD exchange rates heavily nowadays. US Dollar strengthens against Euro pretty quickly when Fed hikes interest rates but ECB keeps rates fairly low thereby attracting sizable capital inflows into US markets due to much higher yields available there. Euro can surge pretty quickly if ECB adopts hawkish stance signaling rate hikes or tightening quantitativelys relative to dovish Fed policy moves.
We can say for a fact that trading EURUSD is a sophisticated exercise in comparing and contrasting two major economies. Success hinges on a deep understanding of the divergent monetary policy stances of the ECB and the Fed, a continuous assessment of their respective economic health and growth prospects, and a keen awareness of the political landscape within the Eurozone. The interplay of these forces creates a constantly evolving environment for the world's most popular currency pair.
-
@ eb0157af:77ab6c55
2025-06-17 23:02:57Carl Rickertsen completely exits his position in Strategy as insiders sell $864 million worth of stock.
As reported by Protos, Carl Rickertsen, a member of Strategy’s board of directors, has fully liquidated his entire shareholding for over $10 million.
Rickertsen’s decision to completely exit his Strategy position marks a sharp shift from his previous investment stance. In 2022, the executive had shown confidence in the company by investing $700,000 in MSTR shares.
On June 13, 2022, Rickertsen purchased $608,000 worth of MSTR stock at $152 per share. Since then, the stock has rallied 152%. However, by 2023, the director had already sold half of his 4,000-share position.
Rickertsen’s approach to managing his holdings has become increasingly aggressive in recent years. Since joining the board in 2019, he has adopted a strategy of immediately liquidating any stock options received.
One example of this tactic occurred on June 2, when he acquired and sold 26,390 MSTR shares on the same day.
As of June 5 this year, Rickertsen reported zero vested Strategy shares, marking the end of his equity involvement with the company.
Rickertsen’s situation is not an isolated case within Strategy. Data from the Securities and Exchange Commission (SEC) reveals a controversial picture. According to information gathered by secform4.com, over the past five years, total insider sales have exceeded purchases by $864 million. This imbalance in insider transactions could raise questions about executives’ confidence in the company’s future.
The post Strategy director liquidates all his MSTR shares appeared first on Atlas21.
-
@ 52524fbb:ae4025dc
2025-06-18 03:13:43Bitcoin (BTCUSD), commonly called "digital gold," has turned the financial universe on its head in just a decade, emerging as a new alternative to the traditional store of value. And the story that was created out of its low supply and lack of a central authority is a major contributor to its price moves vs USD. But there is much more to the relationship than that; it is a complex dance between developing narratives, macroeconomic factors, and the inherent properties of a fledgling asset class trying to find its footing in an established financial world.
The story of Bitcoin as “digital gold” went to an extreme during peak inflation fear and economic uncertainty, when gold plays its part as an inflation hedge. Its advocates maintain that Bitcoin’s 21 million coin supply, its programmed deflation with the halving events and its distance from central bank control, has made it a better store of value in a time of exceptional fiat currency expansion. This story has a direct impact on BTCUSD, as some investors seeking to "hedge" against devaluing of the US Dollar, typically buy Bitcoin, and increase demand (and therefore price).
To sum it up, trading BTCUSD needs not only conducting technical analysis but also a very sharp understanding of the current narratives and emotions of the market and implementing the news from the macroeconomic situation to this new asset changes. Bitcoin is still in the process of discovery of its final purpose in the world of finance, going back and forth between a speculative tech asset, a disruptive financial innovation, and a clean and sincere candidate for the title of "digital gold." The inter-relationship with traditional fiat currencies such as the US Dollar, which is at the base of the mixture of economic realities and charming, changing stories, is still a fascinating area for traders to explore as it will remain so in the future.
-
@ 502ab02a:a2860397
2025-06-18 02:15:25เครื่องดื่ม Tang ไม่ได้ถือกำเนิดมาบนดาวอังคาร แต่กลับโด่งดังเพราะคนที่ไปใกล้ดาวอังคารที่สุดในยุคนั้นต่างดื่มมันแทนน้ำผลไม้...ใช่แล้วจ้ะ เรากำลังพูดถึง "NASA" และภารกิจอวกาศที่เปลี่ยน Tang จากเครื่องดื่มสังเคราะห์ธรรมดา ให้กลายเป็นไอคอนของอนาคต ที่บางครั้ง...ดูดีเกินกว่าความจริง
ย้อนกลับไปปี 1957 สหรัฐฯ กำลังแข่งขันในสงครามอวกาศกับโซเวียต บริษัท General Foods (ถ้าจำได้บริษัทนี้เขาผลิต ซีเรียล Grape-Nuts โดย Charles William Post หรือ C.W. Post ชายหนุ่มที่เคยเข้ารับการรักษาตัวที่ Battle Creek Sanitarium ของหมอ John Harvey Kellogg นั่นไงครับ) บริษัทนี้เป็นผู้ผลิต Tang ได้พัฒนาเครื่องดื่มผงสังเคราะห์นี้ขึ้นมาในปี 1957 โดยนักเคมีชื่อ William A. Mitchell ซึ่งเขาไม่ได้แค่คิดค้น Tang เท่านั้น แต่เขายังคิดค้น Cool Whip, Pop Rocks, Jell-O ที่เซ็ตตัวเร็ว, ไข่ขาวผง และผลิตภัณฑ์ทดแทนมันสำปะหลังยอดนิยม รวมถึงผลิตภัณฑ์อื่นๆ อีกมากมาย (รวมสิทธิบัตรทั้งหมด 70 ฉบับ) แต่ละตัวนี่ทุกวันนี้ยังขายในซุปเปอร์อยู่เลยครับ ผลิตภัณฑ์หลักชิ้นแรกที่มิตเชลล์คิดค้นคือผลิตภัณฑ์ทดแทนมันสำปะหลังซึ่งได้รับการพัฒนาเพื่อหลีกเลี่ยงการขาดแคลนมันสำปะหลังอันเป็นผลจากสงครามโลกครั้งที่ 2 ซึ่งเป็นเหตุผลว่าทำไมมันสำปะหลังจึงบางครั้งถูกเรียกว่า “Mitchell’s Mud”
Tang นั้นตอนแรกกลับขายไม่ค่อยออก เพราะคนยุคนั้นยังเชื่อใน “น้ำส้มสด” ที่บีบจากผลไม้มากกว่าอะไรที่ชงจากผง แน่นอนมันเหมือนที่ทุกวันนี้เราพร่ำบอกว่า "ฉันเลือกอาหารธรรมชาติ" นั่นแหละครับ แทบไม่ต่างกันเลย
จนกระทั่ง NASA เข้ามา
ปี 1962 องค์การ NASA ต้องเผชิญปัญหาใหญ่ที่คนทั่วไปนึกไม่ถึง นั่นคือ น้ำในอวกาศรสชาติ “แย่มาก” เพราะระบบกรองน้ำรีไซเคิลทำให้น้ำมีรสโลหะอ่อนๆ ปนน้ำยาฆ่าเชื้อ จะให้มนุษย์อวกาศดื่มแบบนั้นทุกวันคงทำให้ภารกิจเสียสมาธิได้ง่ายกว่าการหลุดวงโคจรเสียอีก
นั่นคือจุดที่ Tang ถูกนำมาใช้ครั้งแรกโดย John Glenn ในภารกิจ Mercury-Atlas 6 ซึ่ง Tang ถูกเพิ่มไว้ในเมนูของภารกิจ Mercury ของ John Glenn ในปี 1962 ซึ่งเขาได้โคจรไปรอบโลกและทำการทดลองรับประทานอาหารในอวกาศ Mercury-Atlas 6 เป็นภารกิจที่ให้ข้อมูลสำคัญเกี่ยวกับการเปลี่ยนแปลงทางกายภาพของมนุษย์เมื่ออยู่ในสภาวะไร้น้ำหนัก ภารกิจนี้ช่วยสร้างความมั่นใจให้กับ NASA ว่าเทคโนโลยีของตนพร้อมก้าวต่อไปสู่ภารกิจที่ซับซ้อนยิ่งขึ้น นำไปสู่ โครงการ Gemini และ โครงการ Apollo ตามลำดับ
เมื่อ NASA ตัดสินใจเติมผง Tang ลงในน้ำเพื่อปรับรสชาติให้น่าดื่มขึ้น กลายเป็นจุดเริ่มต้นของการตลาดที่แทบจะ “ยึดโลก” ได้ในชั่วข้ามคืน เพราะหลังภารกิจนั้น Tang โฆษณาโดยใช้คำว่า “เครื่องดื่มที่นักบินอวกาศดื่มจริง” เห็นไหมครับว่านั่นแหละคือพลังของวาทกรรม
ทีนี้หล่ะพี่เอ้ยยยย เด็กๆ แห่กันดื่ม Tang กันทั่วอเมริกา เพราะรู้สึกว่าการชงน้ำส้มผงในบ้านทำให้ตัวเองเข้าใกล้ดวงจันทร์ได้สักนิด ผู้ปกครองก็สบายใจ เพราะฉลากเขียนว่ามีวิตามิน C และ “ไม่ต้องแช่เย็น” เหมาะกับยุคโมเดิร์นที่ตู้เย็นก็ยังแพงอยู่ ใครจะไปนั่งทำน้ำส้มคั้นกันให้ลำบาก เห็นไหมครับว่าวัฒนธรรมการพึ่งพา “อาหารสำเร็จรูปเพื่ออนาคต” ก็เริ่มตั้งไข่จากตรงนี้อีกจุดนึง
ถ้าหากเราลองส่องลึกลงไปในสูตรของ Tang จะพบว่ามันคือของผสมของ น้ำตาล, กลิ่นแต่งสังเคราะห์, วิตามิน C ที่เติมเข้าไปภายหลัง และกรดซิตริกเพื่อเลียนแบบความเปรี้ยวของผลไม้ เรียกง่ายๆ ว่า “ไม่มีอะไรที่่ได้คุณค่าแบบส้มธรรมชาติเลย” ยกเว้นจินตนาการ
ถึงกระนั้น ผู้บริโภคก็ไม่ได้โวยวายอะไรแถมยังโห่ร้องตอบรับ Tang เป็นอย่างดี เพราะอิทธิพลของ NASA ทำให้คนรู้สึกว่า "ต้องดีแน่ๆ ถ้าแม้แต่ NASA ยังใช้" แม้ว่า NASA เองจะไม่เคยพูดว่า Tang ดีต่อสุขภาพและมันเป็นเครื่องมือชั่วคราวเพื่อทำให้น้ำดื่มได้ ไม่ได้ใช้เพราะว่า Tang ดีกว่าน้ำส้ม...แต่นั่นแหละ ความเงียบของ NASA ถูกตลาดตีความจนเกินจริงไป เพราะการไม่ปฎิเสธนั่นหมายถึงการตอบรับ การตลาดและผู้บริโภคจึงตีความไปในทางเดียวกันว่า มันวิเศษกว่าส้มธรรมดา เพราะมันคือเครื่องดื่มระดับอวกาศเลือกใช้
หลายปีต่อมา เมื่อนักโภชนาการหลายคนเริ่มออกมาเตือนว่า Tang คือน้ำตาลล้วน ไม่มีเส้นใย ไม่มีประโยชน์ใดที่เทียบได้กับผลไม้จริง ผู้ผลิตก็หันมาใส่ "วิตามินเสริม" เพิ่มอีกให้แทนเพื่อล้างภาพลักษณ์เดิมประมาณว่า อ่ะอยากได้วิตามินอะไรเราเติมให้เทผสมในสูตร กลายเป็นสคริปต์ซ้ำของอาหารยุค “อาหารอนาคตปลอม” ที่เอาสารอาหารเดี่ยวๆ มาเติมแล้วโฆษณาว่า “เหมือนธรรมชาติ” หรือดีกว่าเสียอีก
เราอ่านถึงตรงนี้ก็ไม่ต้องตลกหรือขำเลยครับ หันมามองอาหารปัจจุบัน ของบางอย่างมีวิตามินสูงเพราะเทวิตามินผงลงไปผสม เช่นนมพืชต่างๆ ที่อยู่ดีๆก็มีวิตามินระดับซุปเปอร์ฟู้ดขึ้นมาเฉยเลย หรือแม้แต่พืชบางชนิดที่อุ้มน้ำได้ดี ก็มีวิตามินสูงระดับหลายสิบถึงร้อยเท่าของธรรมชาติของมัน ด้วยการเติมวิตามินลงไปในอาหารพืช ที่เพาะเลี้ยงกัน และยิ่งถ้ามองแบบเตรียมพร้อมไปถึงอนาคต อยู่ที่ใครแล้วครับว่าจะมองเห็นใส้ในของอาหารเหล่านี้ไหม เชื่อไหมว่าหลายต่อหลายคนมองว่ามันดี มันงาม มันซุปเปอร์ฟู้ด แล้วหันกลับไปมอง Tang ครับ อดีตมันเคยเป็น Super Orange Juice มาก่อน แล้ววันนี้คุณตลกกับมันไหม? แล้วคุณตลกกับวันนี้ไหม? แล้วคุณตลกกับอนาคตที่กำลังจะมาไหม? นั่นคือคำตอบที่คุณต้องเอาภาพร่างเหล่านี้ มาวางทับกัน แล้วตั้งคำถามกับซุปเปอร์ฟู้ดหรือฟิวเจอร์ฟู้ด ที่คุณกำลังเทิดทูนว่า "ดีต่อสุขภาพ" แล้วไหม?
Tang คือผลผลิตของยุคที่ความสะดวก = ความดี และความโมเดิร์น = ความน่าเชื่อถือ เราจึงเห็นว่าสิ่งที่เคยเกิดขึ้นกับซีเรียล, นม, หรือแม้แต่ Spam ก็ล้วนมีแก่นเดียวกันคือ "ทำให้ง่ายขึ้น ถูกลง เก็บได้นานขึ้น แล้วสร้างภาพว่าเหนือกว่าของเดิม"
Tang ไม่ใช่ผู้ร้าย แต่มันคือตัวละครสำคัญในยุคที่วิทยาศาสตร์กลายเป็นเครื่องมือของตลาด ไม่ใช่เพื่อค้นหาความจริง แต่เพื่อผลิตความรู้สึกปลอดภัยแบบสังเคราะห์ให้กับสังคม
และทั้งหมดนี้...เริ่มจากความพยายามทำให้น้ำอวกาศดื่มได้ ไม่มีกลิ่นเหล็กๆ เท่านั้นเอง
#pirateketo #กูต้องรู้มั๊ย #ม้วนหางสิลูก #siamstr
-
@ 73868430:0ec4fe27
2025-06-18 02:09:08皇居 Imperial Palace
巽櫓(桜田二重櫓) Sakurada Tatsumi Yagura
二重橋 Nijubashi Bridge
靖國神社 Yasukuni Jinja
遊就館 Yushukan
上野動物園 Ueno Zoological Garden
上野動物園不忍池 Ueno Zoological Garden Shinobazuno Pond
上野東照宮五重塔 Ueno Toshogu Shrine Five Story Pagoda
築地活鮮市場,御徒町店 Tsukiji Kassen Ichiba, Okachimachi
鉄道博物館 The Railway Museum
TOHAKU茶館 (応挙館) Tohaku Chakan
新大久保駅 Shin-Ōkubo
シンボルプロムナード公園 Symbol Promenade Park
セントラル広場 Central Square
日本科学未来館 The National Museum of Emerging Science and Innovation Japan (Miraikan)
箱根町 Hakone
芦ノ湖 Lake Ashi
元箱根 Motohakone
彫刻の森駅 Chokokunomori
三の鳥居,箱根神社 The Third Torii of Hakone Shrine
小田原城 Odawara Castle
-
@ eb0157af:77ab6c55
2025-06-17 22:03:15The banking giant is exploring an expansion of its blockchain services, focusing on digital payments and currencies.
JPMorgan Chase has filed a new trademark application for the name “JPMD.” The filing was submitted on June 15 to the United States Patent and Trademark Office (USPTO).
The application, filed by JPMorgan Chase Bank, N.A., covers a broad range of services related to digital assets and blockchain technology. These include the issuance of digital currencies, electronic payment processing, and financial custody services — all of which suggest a possible new stablecoin initiative for JPMorgan.
Experience with JPM Coin
This move wouldn’t be JPMorgan’s first foray into blockchain-based finance. The bank already operates JPM Coin, a dollar-pegged stablecoin used to enable instant transactions between institutional clients. The token runs on Quorum, a private blockchain network developed in-house by JPMorgan and based on Ethereum’s technology.
The registration of the JPMD trademark comes as JPMorgan and other major U.S. banks are considering a collaborative stablecoin project through their jointly owned entities: Early Warning Services and The Clearing House.
Similarly, corporations like Walmart and Amazon are mulling the creation of their own stablecoins.
The post JPMorgan files trademark for ‘JPMD’: a new stablecoin on the horizon for the American bank appeared first on Atlas21.
-
@ dfa02707:41ca50e3
2025-06-17 21:01:55- This version introduces the Soroban P2P network, enabling Dojo to relay transactions to the Bitcoin network and share others' transactions to break the heuristic linking relaying nodes to transaction creators.
- Additionally, Dojo admins can now manage API keys in DMT with labels, status, and expiration, ideal for community Dojo providers like Dojobay. New API endpoints, including "/services" exposing Explorer, Soroban, and Indexer, have been added to aid wallet developers.
- Other maintenance updates include Bitcoin Core, Tor, Fulcrum, Node.js, plus an updated ban-knots script to disconnect inbound Knots nodes.
"I want to thank all the contributors. This again shows the power of true Free Software. I also want to thank everyone who donated to help Dojo development going. I truly appreciate it," said Still Dojo Coder.
What's new
- Soroban P2P network. For MyDojo (Docker setup) users, Soroban will be automatically installed as part of their Dojo. This integration allows Dojo to utilize the Soroban P2P network for various upcoming features and applications.
- PandoTx. PandoTx serves as a transaction transport layer. When your wallet sends a transaction to Dojo, it is relayed to a random Soroban node, which then forwards it to the Bitcoin network. It also enables your Soroban node to receive and relay transactions from others to the Bitcoin network and is designed to disrupt the assumption that a node relaying a transaction is closely linked to the person who initiated it.
- Pushing transactions through Soroban can be deactivated by setting
NODE_PANDOTX_PUSH=off
indocker-node.conf
. - Processing incoming transactions from Soroban network can be deactivated by setting
NODE_PANDOTX_PROCESS=off
indocker-node.conf
.
- Pushing transactions through Soroban can be deactivated by setting
- API key management has been introduced to address the growing number of people offering their Dojos to the community. Dojo admins can now access a new API management tab in their DMT, where they can create unlimited API keys, assign labels for easy identification, and set expiration dates for each key. This allows admins to avoid sharing their main API key and instead distribute specific keys to selected parties.
- New API endpoints. Several new API endpoints have been added to help API consumers develop features on Dojo more efficiently:
- New:
/latest-block
- returns data about latest block/txout/:txid/:index
- returns unspent output data/support/services
- returns info about services that Dojo exposes
- Updated:
/tx/:txid
- endpoint has been updated to return raw transaction with parameter?rawHex=1
- The new
/support/services
endpoint replaces the deprecatedexplorer
field in the Dojo pairing payload. Although still present, API consumers should use this endpoint for explorer and other pairing data.
- New:
Other changes
- Updated ban script to disconnect inbound Knots nodes.
- Updated Fulcrum to v1.12.0.
- Regenerate Fulcrum certificate if expired.
- Check if transaction already exists in pushTx.
- Bump BTC-RPC Explorer.
- Bump Tor to v0.4.8.16, bump Snowflake.
- Updated Bitcoin Core to v29.0.
- Removed unnecessary middleware.
- Fixed DB update mechanism, added api_keys table.
- Add an option to use blocksdir config for bitcoin blocks directory.
- Removed deprecated configuration.
- Updated Node.js dependencies.
- Reconfigured container dependencies.
- Fix Snowflake git URL.
- Fix log path for testnet4.
- Use prebuilt addrindexrs binaries.
- Add instructions to migrate blockchain/fulcrum.
- Added pull policies.
Learn how to set up and use your own Bitcoin privacy node with Dojo here.
-
@ 8bad92c3:ca714aa5
2025-06-18 02:02:08Key Takeaways
Mel Mattison presents a bold, contrarian outlook on today’s economy, arguing that what many view as a precarious bubble is actually the beginning of a long-term structural bull market that could run through 2036. He believes the U.S. economy is far stronger than the headlines suggest, supported by robust job growth, strong consumer balance sheets, and demographic tailwinds. Rather than popping, the current asset bubble is set to expand, driven by retiring baby boomers reducing labor inflation, AI-fueled productivity gains, and massive fiscal stimulus disguised as interest expense. He views Bitcoin as uniquely positioned to thrive in both inflationary and deflationary environments, unlike fiat currency, and sees AI’s high energy demands as a healthy bottleneck that will slow its rollout and allow society to adjust. According to Mattison, the U.S. is entering an era of permanent stimulus and rising productivity, with politics largely irrelevant to the macro trajectory, whether under populist left or populist right, the fiscal and demographic forces shaping the next decade are already locked in.
Best Quotes
“Bitcoin works in an inflationary world and it works in a deflationary world.”
“People are going to look back at 110,000 Bitcoin just like they looked back at 30,000 and say, ‘Man, I should’ve been buying.’”
“Interest expense is fiscal stimulus. There’s no difference between a COVID check and 4.5% on a 3-month bill going into a retiree’s money market account.”
“AI will be massive, but its energy demands are the bottleneck that will save us from an unmanageable shock.”
“This isn’t the 1970s. The U.S. is the largest oil producer in the world, and the demographic structure has flipped.”
“We are in the early stages of a seismic change, think Agricultural Revolution or Industrial Revolution level.”
Conclusion
This episode offers a compellingly optimistic view of the next decade, with Mel Mattison arguing that we’re entering the early stages of a historic bull market driven by demographic shifts, fiscal transformation, and exponential technologies like AI. Rather than collapse, he sees structural strength and enduring growth, positioning Bitcoin as a core asset in this new paradigm, resilient in both inflationary and deflationary cycles. Mattison urges a focus on long-term fundamentals over short-term noise, framing Bitcoin, demographics, and AI as the key forces reshaping the global economic order.
Timestamps
0:00 - Intro
0:55 - Getting up to speed
6:57 - The Rates Boogeyman
14:42 - Bitkey
15:37 - AI revolution
28:13 - Boomer exit and fiscal stimulus
34:07 - Unchained
34:35 - AI bottleneck
42:59 - Wealth gap
52:53 - Bullish vibesTranscript
(00:00) the 1971 Nixon shock where he took the US off the gold standard he also put on 10% sweeping across the board tariffs he announced that they were going to do spending cuts something like a Doge this is 55 years ago it's like the exact same things the demographics the oil differences between the 70s and now they're going to allow this situation to work out a lot more like the 80s we had between 1985 and 1996 360% S&P growth the days of 2000 something gold are probably over with Bitcoin you know I've been thinking this month we've got an AI
(00:31) super cycle boom going on it it just all speaks to extreme bullishness but we've got a lot more to go gold and Bitcoin I think actually in geopolitical uncertainties are are only going to do better mel I'm not going to lie I've been pretty disconnected for the last 3 weeks so I'm very excited we're having this conversation cuz I have a feeling it's going to help me catapult back into the present day get caught up with everything that's been going on we had the conference in Vegas a few weeks ago now at this point I had a cross country move between now and then and I had a wedding in Chicago over the weekend and
(01:20) I've been sort of out of the loop with what's going on and I need an update what are what are you seeing out there no well that's that's perfect and uh I'm getting ready to head out for a few days uh myself um on Thursday to the the Blue Ridge Mountains here in North Carolina haven't been there since the hurricane went through uh so interested to see how my old spots are doing um but it's always good to get away so happy to bring you up to speed um you know there's a lot going on and at the same time there's not right that the steady march higher in Bitcoin in equities uh
(01:58) gold has been on you know just a consolidation phase basically since it kind of blew up to 3500 um but given how fast and how strong that move was it actually is just a sign of strength to me that it's still you know holding well above 3,000 i think the days of 200 something gold are probably over i think I think if it ever gets there into five figures again it's not going to be for long with Bitcoin i think this this is a big move um you know people are going to look back at 110,000 Bitcoin just like
(02:35) they look back at 50,000 Bitcoin or 30,000 Bitcoin and say "Man I should have been buying there." Um you know we we've broken over uh the high set you know a few months ago i think that's now clearly you know a floor you know um support and you know I think the next upside target for me has always been that 150 range which I think you know I've been thinking 120 uh this month uh 150 is my call by the end of the year but really that's like a base case based on technical analysis i do that that is is a point where I reassess and and when I
(03:15) reassess it I have a feeling like um I'm going to pretty quickly come out with the target um around uh 190 195 as like a next upside target and you know we'll see when we get there but so just you know I think the best thing you can do actually for these markets is turn off your news because it's like last night I'm flipping between the channels and it's you know kurfles with Elon and Trump it's riots and fires and protests in LA it's um you know uh US behind the eightball with rare earth versus China um you know tariffs are
(03:56) going to start rolling into the inflation numbers uh job market only created 130ome thousand it's weak which I think is BS it's actually was a super strong report um there's been almost no government job creation since Trump took office so you essentially have to look and say well if every month under Biden there was like 40,000 government jobs and now that's not there i mean you take the 139 or whatever it was last week you had 40 you're up to about 180 you know which is really what the private sector is creating and it's doing that at a time where you have this demographic
(04:33) rollover where you have literally when you look at the unemployment reports which they break down you know foreignb born native born you know you have nativeorn you know people in the workforce declining and so if you're creating jobs I mean that that's why you're seeing you know the unemployment rate still 4.
(04:52) 2% so we've got a super strong job market we've got a consumer that is as unlevered as it has been in the last 20 years um you know you can't look at like credit card delinquencies or something like that you have to look at you know net worth you know yes is this skewed towards the wealthier you know 50% of America sure i mean the bottom 50% isn't exactly rolling in the dough but the top 20% certainly is especially when you factor in um over 12 trillion of tappable uh home equity um which I think is just now beginning to be tapped and and will begin getting tapped even
(05:35) more so um once the Fed fund funds rate goes down and I think it will um exactly how much and how quickly we can get into that too but I mean basically I guess where I'm going with all of this is the the doom and gloom you hear about whether you're scrolling through Twitter or turning on the news channels is masking what is an incredibly strong economy we've got an AI like super cycle boom going on we've got the blockchain and um all of that brings all of what that brings to financial services um you know uh counties or states in New Jersey
(06:12) now putting real estate deeds on the blockchain DeFi finally starting to happen in the real world stable coin bill um you know Bitcoin you know being part of the institutional investment mindset people understanding it more um I mean it it just all speaks to extreme bullishness and yet when you look at some of the surveys out there there's still net bearish you know like there's different sentiment gauges we were really really bearish we're still net bearish we're almost back to that median line uh you know overall and so we've got just people that are just doubters haters and you know which I think is
(06:53) great because it just means you know we've got a lot more to go yeah i'm very happy that you confirmed that being disconnected is probably the right move it's It's felt good not being in the day-to-day the actually the only day that I was really plugged in I was on a cross country flight and that was when Elon was having his his uh meltdown on X but that seems to have been brushed under the rug pretty quickly they were like "Okay damage control.
(07:24) " Uh it seems like they want to forget that that happened and pretend like it it never did but I think diving into you were mentioning this before we hit record how do rates play into this cuz looking at the 10-year at 4.47 30-year at 4.94 up over the last month but down from their highs intrammon and I think a lot of the focus of the doomers if you will is the elevated 10 year and 30-year and all the debt that needs to be rolled over how do you see that factoring into this outlook yeah I mean I I call it the rates -
@ eb0157af:77ab6c55
2025-06-18 02:02:07Carl Rickertsen completely exits his position in Strategy as insiders sell $864 million worth of stock.
As reported by Protos, Carl Rickertsen, a member of Strategy’s board of directors, has fully liquidated his entire shareholding for over $10 million.
Rickertsen’s decision to completely exit his Strategy position marks a sharp shift from his previous investment stance. In 2022, the executive had shown confidence in the company by investing $700,000 in MSTR shares.
On June 13, 2022, Rickertsen purchased $608,000 worth of MSTR stock at $152 per share. Since then, the stock has rallied 152%. However, by 2023, the director had already sold half of his 4,000-share position.
Rickertsen’s approach to managing his holdings has become increasingly aggressive in recent years. Since joining the board in 2019, he has adopted a strategy of immediately liquidating any stock options received.
One example of this tactic occurred on June 2, when he acquired and sold 26,390 MSTR shares on the same day.
As of June 5 this year, Rickertsen reported zero vested Strategy shares, marking the end of his equity involvement with the company.
Rickertsen’s situation is not an isolated case within Strategy. Data from the Securities and Exchange Commission (SEC) reveals a controversial picture. According to information gathered by secform4.com, over the past five years, total insider sales have exceeded purchases by $864 million. This imbalance in insider transactions could raise questions about executives’ confidence in the company’s future.
The post Strategy director liquidates all his MSTR shares appeared first on Atlas21.
-
@ 73d8a0c3:c1853717
2025-06-18 03:57:48[The following contains two excerpts from my Research/Novel/Expose on Redacted Science. I’m not a scientist. I’m a Chemical Engineer and data architect of 30 years. But this is real science, and someone made it go away. I wouldn’t have found it, except for.. well, you’ll have to read the research (still writing, but basically have 90% of the science explained)]
This is about how biology breaks down when pushed beyond design — and how some systems fight to keep going anyway. It has implications for:
• critical care medicine
• post-viral syndromes
• metabolic disease
• aging
• neuroinflammation
• psychiatric conditions (ADHD, depression, anxiety)
• and maybe even AI alignment (in how systems retain integrity under corrupt inputs)
We expect fungal research — especially around long-term host adaptations and stealth co-evolution — to become a major field of study. Why? Because all these chemical are making me live even when every organ in my body is not working the way it is supposed to work. Every Single One. What appears fringe today may soon be foundational. This isn't just about pathogens. It's about how biological, immunological, and behavioral systems interact under persistent pressure — including possible symbiosis, crowding effects, and neurological modulation.
Finding out what is and what is not going on is what science is about. Someone decided otherwise.
[Your Move]
What If?? [Theoretical Musing — basically, this is no longer a zero percent chance] • What if Candida albicans isn’t just a pathogen, but a legacy co-evolutionary organism — one that historically regulated population density, behavior, and reproduction during times of scarcity?
• What if the pituitary evolved in direct response to its influence — not just to manage reproduction, but to insulate cognition from fungal manipulation?
• What if its connection to cannabinoids, dopamine, and hunger isn’t accidental — but a chemical dialogue that shaped our very instincts?
• What if the rise in modern autoimmune, psychiatric, and neurodegenerative conditions is a side effect of our disrupted balance with fungal cohabitants?
• What if the “zombie” analogy isn’t hyperbole — but a primitive warning system encoded in our myths, whispering about a very real form of behavioral control?
These are speculative. But they are now in the non-zero zone.
And history has a pattern: first ridicule, then resistance, then recognition.
[You see, the coolest thing about this is that I am the proof. No getting out of it] [The even cooler thing is you made me, in a way. Even though I did do this to myself. You gave me a mind that wouldn't let go and just enough information to track it all down.]
This is what happens when you don’t give up.
When your organs stop working the way they’re supposed to — and something else takes over. Something old. Something hidden. Something that adapts.
This isn't just about illness anymore. It's about systems — biological, chemical, behavioral — pushed beyond design. And yet, somehow, still running.
That’s the mystery. That’s the threat. That’s the message.
We now live in a world where science is selected, symptoms are dismissed, and adaptation itself is misdiagnosed. But what if the system that kept me alive is one we were never meant to survive? What if it’s not just me?
What if the pathogen was the backup plan?
If you’ve read this far, you already know: I’m not asking for your permission. I’m not asking for your diagnosis.
I’m laying out the board.
Your move.
[Checkmate]
🕳️ #science #nostr #candida #aiAlignment #medicalmystery #buriedtruth
-
@ 31a4605e:cf043959
2025-06-17 17:51:52Com a crescente digitalização do dinheiro, os governos de vários países começaram a desenvolver moedas digitais de banco central (CBDCs - Central Bank Digital Currencies) como resposta à popularização de Bitcoin. Enquanto Bitcoin representa um sistema financeiro descentralizado e resistente à censura, as CBDCs são versões digitais das moedas fiduciárias, controladas diretamente pelos bancos centrais. Essa concorrência pode moldar o futuro do dinheiro e definir o equilíbrio entre liberdade financeira e controlo estatal.
Diferenças fundamentais entre Bitcoin e CBDCs
Bitcoin e as CBDCs diferem em praticamente todos os aspetos fundamentais:
Centralização vs. Descentralização: Bitcoin opera numa rede descentralizada, onde nenhum governo ou entidade pode alterar as regras ou censurar transações. Já as CBDCs são emitidas e controladas pelos bancos centrais, permitindo um maior controlo sobre a circulação e utilização do dinheiro.
Oferta limitada vs. Inflação controlada: Bitcoin tem uma oferta fixa de 21 milhões de unidades, tornando-se um ativo escasso e deflacionário. As CBDCs, por outro lado, podem ser criadas sem limites, como acontece com as moedas fiduciárias tradicionais, sujeitas a políticas monetárias inflacionárias.
Privacidade vs. Monitorização: Bitcoin permite transações pseudónimas, garantindo um certo nível de privacidade financeira. As CBDCs, no entanto, podem ser programadas para permitir o rastreamento total de cada transação, facilitando a supervisão governamental e, potencialmente, o controlo sobre o que os cidadãos podem ou não gastar.
Resistência à censura vs. Controlo estatal: Bitcoin permite que qualquer pessoa realize transações sem depender de aprovação de terceiros. As CBDCs, por serem centralizadas, podem ser usadas pelos governos para restringir transações indesejadas ou mesmo confiscar fundos com um simples comando digital.
O que os governos pretendem com as CBDCs?
A introdução das CBDCs tem sido vendida com argumentos como:
Maior eficiência nas transações financeiras, eliminando intermediários e reduzindo custos bancários.
Facilidade na implementação de políticas económicas, como estímulos diretos à população ou tributação automatizada.
Combate a atividades ilegais, dado que as transações podem ser rastreadas em tempo real.
No entanto, muitas destas justificações levantam preocupações sobre a perda de privacidade financeira e o aumento do poder dos governos sobre o sistema monetário.
Bitcoin como alternativa às CBDCs
A ascensão das CBDCs pode fortalecer a posição de Bitcoin como alternativa de dinheiro verdadeiramente livre. À medida que os cidadãos percebem os riscos de um sistema financeiro 100% controlado pelo Estado, a procura por um ativo descentralizado e resistente à censura pode crescer.
Proteção contra o controlo estatal: Bitcoin permite que os utilizadores mantenham total soberania sobre o seu dinheiro, sem o risco de bloqueios arbitrários ou confiscações.
Preservação da privacidade financeira: Ao contrário das CBDCs, que podem monitorizar todas as transações, Bitcoin oferece um grau de anonimato que protege os indivíduos da vigilância excessiva.
Reserva de valor contra a inflação: Enquanto os governos podem emitir CBDCs indefinidamente, Bitcoin mantém a sua escassez garantida, tornando-se um refúgio contra políticas monetárias irresponsáveis.
Resumindo, a competição entre Bitcoin e as CBDCs será uma das maiores batalhas financeiras do futuro. Enquanto os governos tentam consolidar o seu controlo através de moedas digitais centralizadas, Bitcoin continua a ser a principal alternativa para aqueles que procuram independência financeira e proteção contra a vigilância estatal. A escolha entre um sistema financeiro livre e um sistema monitorizado e controlado poderá definir o rumo da economia digital nas próximas décadas.
Muito obrigado por teres lido o texto até aqui, espero que esteja tudo bem contigo e um abraço enorme do teu madeirense bitcoiner maximalista favorito. Viva a liberdade!
-
@ eb0157af:77ab6c55
2025-06-18 02:02:06French lawmakers are proposing Bitcoin mining as a solution to optimize the national electricity system and make use of surplus energy.
A group of French parliamentarians has introduced an amendment that could turn the country into a European hub for Bitcoin mining, strategically leveraging its energy production capacity.
The legislative proposal aims to assess how mining could be integrated into the French energy system — the largest in Europe — to optimize the management of electricity produced by nuclear power plants.
The amendment to the law on “National Programming and Regulatory Simplification in the Energy Sector” calls on the government to conduct a thorough evaluation of the potential of Bitcoin mining. The initiative represents a pragmatic approach to addressing the issue of excess energy, a key topic for France’s nuclear industry.
France’s energy system, powered by nuclear for over 70% of its needs, often generates electricity surpluses that require efficient management. The proponents of the proposal see mining as an ideal solution to absorb this excess, transforming a potential waste into an economic resource.
The operational flexibility of mining farms offers a unique competitive advantage: machines can be quickly turned on and off based on production and consumption peaks, dynamically adapting to the needs of the electrical grid. This feature makes them particularly suitable for installation near power plants, even in the most remote areas of the country.
The parliamentary proposal highlights how mining could contribute to the revitalization of abandoned industrial sites, creating new opportunities for economic development under the supervision of public authorities.
Lawmakers emphasize the various benefits of this strategy: reducing negative pricing in wholesale markets, relieving the workload on nuclear plants by avoiding frequent modulation cycles that accelerate equipment wear, and absorbing surplus energy that would otherwise go to waste.
The French Association for the Development of Digital Assets (ADAN) collaborated in drafting the amendment, contributing technical expertise and industrial insight to the project. The organization emphasized how low-carbon Bitcoin mining could help strengthen the resilience of the national electricity grid.
The parliamentary report notes that mining in France could represent “an activity tailored to the constraints of the electrical system, absorbing surplus energy and reducing environmental impact” by using power that would otherwise be lost.
The post France considers Bitcoin mining: parliamentary proposal for managing nuclear energy appeared first on Atlas21.
-
@ 31a4605e:cf043959
2025-06-17 17:49:53Desde a sua criação, Bitcoin tem sido um ativo revolucionário, desafiando o sistema financeiro tradicional e propondo uma nova forma de dinheiro descentralizado. No entanto, o seu futuro ainda é incerto e gera intensos debates. Entre os cenários possíveis, dois extremos destacam-se: a hiperbitcoinização, onde Bitcoin se torna a moeda dominante na economia global, ou a obsolescência, caso a rede perca relevância e seja substituída por outras soluções.
Hiperbitcoinização: o mundo adota Bitcoin como padrão monetário
Perda de confiança nas moedas fiduciárias: Com a impressão excessiva de dinheiro por bancos centrais, muitas economias enfrentam inflação descontrolada. Bitcoin, com a sua oferta limitada de 21 milhões de unidades, apresenta-se como uma alternativa mais confiável.
Adoção crescente por empresas e governos: Alguns países já começaram a integrar Bitcoin na sua economia, aceitando-o para pagamentos e reserva de valor. Se essa tendência continuar, a legitimidade de Bitcoin como moeda global aumentará.
Facilidade de transações globais: Bitcoin permite transferências internacionais rápidas e baratas, eliminando a necessidade de intermediários financeiros e reduzindo custos operacionais.
Avanços tecnológicos: Melhorias na escalabilidade, como a Lightning Network, podem tornar Bitcoin mais eficiente para uso diário, facilitando sua adoção em massa.
Se a hiperbitcoinização acontecer, o mundo pode testemunhar uma mudança radical no sistema financeiro, com maior descentralização, resistência à censura e uma economia baseada em dinheiro sólido e previsível.
Obsolescência: Bitcoin perde relevância e É substituído
Regulações governamentais restritivas: Se grandes potências económicas impuserem regulações severas sobre Bitcoin, a adoção pode ser dificultada, reduzindo sua utilidade.
Falhas tecnológicas ou falta de inovação: Apesar da sua segurança e descentralização, Bitcoin pode enfrentar dificuldades para escalar de forma eficiente. Se soluções melhores surgirem e forem amplamente aceites, Bitcoin pode perder a sua posição de liderança.
Concorrência com alternativas mais rápidas e eficientes: Se outras formas de dinheiro digital conseguirem superar Bitcoin em termos de escalabilidade e usabilidade, a rede pode ver a sua adoção diminuir.
Falta de incentivos para os mineradores: Como a emissão de novos Bitcoins diminui a cada halving, os mineradores dependerão cada vez mais das taxas de transação. Se essas taxas não forem suficientes para sustentar a segurança da rede, pode haver um risco para a sua viabilidade a longo prazo.
Resumindo, o futuro do Bitcoin pode seguir diferentes caminhos, dependendo de fatores como inovação, adoção global e resistência a desafios externos. A hiperbitcoinização representaria uma revolução económica, com um sistema monetário descentralizado e resistente à inflação. No entanto, a obsolescência continua a ser um risco, caso a rede não consiga adaptar-se às exigências futuras. Independentemente do desfecho, Bitcoin já deixou a sua marca na história financeira, abrindo caminho para uma nova era de dinheiro digital e liberdade económica.
Muito obrigado por teres lido o texto até aqui, espero que esteja tudo bem contigo e um abraço enorme do teu madeirense bitcoiner maximalista favorito. Viva a liberdade!
-
@ eb0157af:77ab6c55
2025-06-18 02:02:06The new communication protocol aims to improve the industry with measurable advantages in terms of efficiency and security.
A new study conducted by Hashlabs, in collaboration with the SRI (Stratum V2 Reference Implementation) team and figures like Matt Corallo, Alejandro De La Torre and others reveals how the Stratum V2 protocol can increase miner profitability compared to the current Stratum V1 standard, used for over a decade.
Speaking to Atlas21, Gabriele Vernetti, Stratum V2 maintainer, declared:
“This first case study demonstrates how much Stratum V2 can help miners as well, securing and increasing their profits, in addition to the rest of the network. It’s just a first study aimed at demonstrating how decentralization can be aligned with the profit dynamics typical of the mining sector.
In the future we will also focus on the benefits for mining pool operators, who can benefit from the protocol’s efficiency to lower their operating costs (such as those for bandwidth used by their servers).
The feedback has been very positive: this first study was a joint work with various market players, including miners and mining pool operators. As SRI we want to continue working together with the entire community as done in this case, becoming a reference point for all actors interested in innovating the Bitcoin mining field”.
The research, based on controlled tests with two identical ASIC S19k Pro, with stock firmware, demonstrates that Stratum V2 can increase net profits by up to 7.4%. For an industry that often operates with 10% margins, this could represent a substantial competitive advantage.
The V2 protocol reduces various inefficiencies that plague the current system. The latency in block switching, that is the waiting time created when a miner must change block template after a new block has been mined on the network, goes from 325 milliseconds to just 1.42 milliseconds, a speed 228 times higher. This translates to about 4.9 hours of completely wasted hash power less per year.
Another problem of modern mining concerns “stale shares” – proofs of work that arrive too late to be remunerated, often due to network latency or inefficient communication. However, not all stale shares depend on inefficiency problems. On average, about 2% are rejected for expected reasons, such as when the share doesn’t reach the minimum difficulty required by the pool. This value is considered normal in the sector. The remaining 98%, instead, is caused by avoidable delays. With Stratum V1, miners lose between 0.1% and 0.2% of their computing power this way. Stratum V2 with Job Declaration completely eliminates this waste, provided that the miner and the pool node have the same level of connectivity. This step could translate into a net profit increase of up to 2% by fully adopting Stratum V2 with Job Declaration.
In the Stratum V2 protocol, the Job Declaration Client (JDC) is software that allows miners to receive mining jobs directly from their local Bitcoin node, that is the block templates to work on. The JDC communicates directly with the miner’s local node, receiving updated data for new block construction and immediately sending them to the mining software via Stratum V2. This allows miners to receive jobs in real time from their own node, without having to wait for them from the pool, reducing latency and the risk of working on obsolete jobs. Furthermore, if the pool allows it, miners can build custom templates choosing which transactions to include in the block.
The research also highlights an often overlooked aspect: the loss of transaction fees. With the Stratum V1 protocol, miners lose about 0.75% of potential fees for each block due to the delay in receiving new jobs. Considering that about 52,560 blocks are mined each year, this loss per block adds up to a total of about 74 bitcoins per year, equivalent to over $8 million at current prices.
Beyond economic advantages, Stratum V2 solves a critical vulnerability of the current system: hashrate hijacking. The V1 protocol doesn’t encrypt communications, allowing attackers to intercept and steal up to 2% of computing power without the miner noticing. The new protocol eliminates this risk through end-to-end encryption and authentication.
According to the study, by reducing latency, optimizing share sending and improving security, Stratum V2 enables a potential net profit increase of 7.4%, derived exclusively from technical improvements.
The post Stratum V2 increases profits by 7.4%: “The study shows that profit and decentralization can coexist”, says Vernetti, SV2 maintainer appeared first on Atlas21.
-
@ 4ba8e86d:89d32de4
2025-06-17 17:47:48O protocolo Matrix é um sistema de comunicação descentralizado de código aberto que fornece uma plataforma para mensageiros descentralizados. O Element foi lançado em 2014 como uma implementação do protocolo Matrix, originalmente conhecido como Riot.im , A ideia do Element nasceu quando Matthew Hodgson e Amandine Le Pape, dois desenvolvedores de software, decidiram criar uma plataforma de comunicação aberta e segura, que permitisse aos usuários terem total controle sobre suas informações. Eles acreditavam que a internet deveria ser um lugar onde as pessoas pudessem se comunicar livremente, sem se preocupar com a privacidade de suas informações.
O Element é um aplicativo de chat gratuito e de código aberto disponível em várias plataformas, incluindo desktop, web e aplicativos móveis. Ele oferece criptografia de ponta a ponta, o que significa que as mensagens são protegidas e só podem ser lidas pelo remetente e pelo destinatário. Além disso, o Element é descentralizado, o que significa que ele não é controlado por uma única entidade, mas sim por uma rede global de servidores.
O Element é amplamente utilizado por indivíduos e empresas que desejam ter uma comunicação segura e privada. É frequentemente usado por equipes de projetos, organizações sem fins lucrativos e grupos ativistas que precisam compartilhar informações confidenciais e se comunicar de forma segura. O Element também é conhecido por seu recurso de salas públicas, que permite que os usuários se juntem a grupos de discussão sobre vários tópicos de interesse.
Uma das principais vantagens do Element é sua arquitetura descentralizada. Ao contrário das plataformas de mensagens convencionais que centralizam os dados em seus próprios servidores, o Element utiliza uma rede descentralizada, distribuindo as informações em diversos servidores espalhados pelo mundo. Isso significa que os dados dos usuários são menos suscetíveis a ataques cibernéticos e invasões, já que não são centralizados em um único ponto vulnerável.
Para usar o Element, normalmente os usuários precisam se registrar em um servidor Matrix. Existem várias opções disponíveis, incluindo servidores públicos e privados. No entanto, outra opção é criar um servidor próprio para usar o Element.
O Element também utiliza criptografia de ponta a ponta para proteger as mensagens e arquivos trocados entre os usuários. Isso significa que apenas o remetente e o destinatário das mensagens podem ler o conteúdo, garantindo que as informações permaneçam seguras e privadas.
Outra vantagem do Element é sua ampla variedade de recursos, incluindo videochamadas criptografadas, compartilhamento de tela e integração com outros serviços, como calendários e aplicativos de produtividade. Isso torna o Element uma plataforma completa de comunicação e colaboração, adequada para uso pessoal e empresarial.
O Element também é fácil de usar e possui uma interface intuitiva e personalizável. Os usuários podem personalizar a aparência do aplicativo e acessar diferentes configurações e recursos com apenas alguns cliques.
https://element.io/
https://github.com/vector-im/element-android
-
@ 31a4605e:cf043959
2025-06-17 17:46:15Desde a sua criação, Bitcoin tem sido um marco na revolução do dinheiro digital, mas a sua evolução não parou no conceito inicial de transações descentralizadas. Ao longo dos anos, novas soluções tecnológicas foram desenvolvidas para expandir as suas capacidades, tornando-o mais eficiente e versátil. Entre essas inovações, destacam-se os smart contracts e a Lightning Network, que permitem aumentar a funcionalidade e escalabilidade da rede, garantindo um sistema mais rápido, barato e acessível.
Smart contracts no Bitcoin
Os smart contracts (contratos inteligentes) são programas que executam automaticamente determinadas ações quando certas condições pré-definidas são cumpridas. Embora o conceito seja mais comummente associado a outras redes, Bitcoin também suporta contratos inteligentes, especialmente através de atualizações como o Taproot.
Os smart contracts em Bitcoin permitem funcionalidades como:
Pagamentos condicionais: Transações que só são concluídas se determinadas regras forem cumpridas, como assinaturas múltiplas ou prazos específicos.
Gestão avançada de fundos: Utilização de carteiras multi-assinatura, onde diferentes partes precisam aprovar uma transação antes de ser processada.
Maior privacidade: Com a atualização Taproot, os smart contracts podem ser mais eficientes e indistinguíveis das transações normais, melhorando a privacidade da rede.
Embora os contratos inteligentes em Bitcoin sejam mais simples do que em outras redes, essa simplicidade é uma vantagem, pois mantém a segurança e robustez da rede, evitando vulnerabilidades complexas.
Lightning Network: escalabilidade e transações instantâneas
Um dos maiores desafios enfrentados por Bitcoin é a escalabilidade. Como a rede original foi desenhada para priorizar segurança e descentralização, a velocidade das transações pode ser limitada em períodos de alta procura. Para resolver esse problema, foi criada a Lightning Network, uma solução de segunda camada que permite transações quase instantâneas e com taxas extremamente baixas.
A Lightning Network funciona criando canais de pagamento entre utilizadores, permitindo que realizem várias transações fora da blockchain ou timechain principal de Bitcoin, registando apenas o saldo final na rede principal. Algumas vantagens incluem:
Velocidade: Transações são concluídas em milissegundos, tornando Bitcoin mais adequado para pagamentos diários.
Taxas baixas: Como as transações ocorrem fora da blockchain ou timechain principal, as taxas são mínimas, permitindo microtransações viáveis.
Descongestionamento da rede: Ao transferir grande parte das transações para a Lightning Network, a rede principal de Bitcoin torna-se mais eficiente e menos sobrecarregada.
Resumindo, o Bitcoin continua a evoluir tecnologicamente para se adaptar às necessidades de um sistema financeiro global. Os smart contracts aumentam as suas funcionalidades, permitindo maior flexibilidade e segurança nas transações. A Lightning Network melhora a escalabilidade, tornando Bitcoin mais rápido e eficiente para pagamentos do dia a dia. Com estas inovações, Bitcoin mantém-se na vanguarda da revolução financeira, demonstrando que, apesar das limitações iniciais, continua a adaptar-se e a crescer como um sistema monetário verdadeiramente descentralizado e global.
Muito obrigado por teres lido o texto até aqui, espero que esteja tudo bem contigo e um abraço enorme do teu madeirense bitcoiner maximalista favorito. Viva a liberdade!
-
@ 39cc53c9:27168656
2025-06-16 06:25:50After almost 3 months of work, we've completed the redesign of kycnot.me. More modern and with many new features.
Privacy remains the foundation - everything still works with JavaScript disabled. If you enable JS, you will get some nice-to-have features like lazy loading and smoother page transitions, but nothing essential requires it.
User Accounts
We've introduced user accounts that require zero personal information:
- Secret user tokens - no email, no phone number, no personal data
- Randomly generated usernames for default privacy and fairness
- Karma system that rewards contributions and unlocks features: custom display names, profile pictures, and more.
Reviews and Community Discussions
On the previous sites, I was using third party open source tools for the comments and discussions. This time, I've built my own from scratch, fully integrated into the site, without JavaScript requirements.
Everyone can share their experiences and help others make informed decisions:
- Ratings: Comments can have a 1-5 star rating attached. You can have one rating per service and it will affect the overall user score.
- Discussions: These are normal comments, you can add them on any listed service.
Comment Moderation
I was strugling to keep up with moderation on the old site. For this, we've implemented an AI-powered moderation system that:
- Auto-approves legitimate comments instantly
- Flags suspicious content for human review
- Keeps discussions valuable by minimizing spam
The AI still can mark comments for human review, but most comments will get approved automatically by this system. The AI also makes summaries of the comments to help you understand the overall sentiment of the community.
Powerful Search & Filtering
Finding exactly what you need is now easier:
- Advanced filtering system with many parameters. You can even filter by attributes to pinpoint services with specific features.
The results are dynamic and shuffle services with identical scores for fairness.
See all listings
Listings are now added as 'Community Contributed' by default. This means that you can still find them in the search results, but they will be clearly marked as such.
Updated Scoring System
New dual-score approach provides more nuanced service evaluations:
- Privacy Score: Measures how well a service protects your personal information and data
-
Trust Score: Assesses reliability, security, and overall reputation
-
Combined into a weighted Overall Score for quick comparisons
- Completely transparent and open source calculation algorithm. No manual tweaking or hidden factors.
AI-Powered Terms of Service Analysis
Basically, a TLDR summary for Terms of Service:
- Automated system extracts the most important points from complex ToS documents
- Clear summaries
- Updated monthly to catch any changes
The ToS document is hashed and only will be updated if there are any changes.
Service Events and Timelines
Track the complete history of any service, on each service page you can see the timeline of events. There are two types of events:
- Automatic events: Created by the system whenever something about a service changes, like its description, supported currencies, attributes, verification status…
- Manual events: Added by admins when there’s important news, such as a service going offline, being hacked, acquired, shut down, or other major updates.
There is also a global timeline view available at /events
Notification System
Since we now have user accounts, we built a notifiaction system so you can stay informed about anything:
- Notifications for comment replies and status changes
- Watch any comment to get notified for new replies.
- Subscribe to services to monitor events and updates
- Notification customization.
Coming soon: Third-party privacy-preserving notifications integration with Telegram, Ntfy.sh, webhooks...
Service Suggestions
Anyone with an account can suggest a new service via the suggestion form. After submitting, you'll receive a tracking page where you can follow the status of your suggestion and communicate directly with admins.
All new suggestions start as "unlisted" — they won't appear in search results until reviewed. Our team checks each submission to ensure it's not spam or inappropriate. If similar services already exist, you'll be shown possible duplicates and can choose to submit your suggestion as an edit instead.
You can always check the progress of your suggestion, respond to moderator questions, and see when it goes live, everything will also be notified to your account. This process ensures high-quality listings and a collaborative approach to building the directory.
These are some of the main features we already have, but there are many more small changes and improvements that you will find when using the site.
What's Next?
This is just the beginning. We will be constantly working to improve KYCnot.me and add more features that help you preserve your privacy.
Remember: True financial freedom requires the right to privacy. Stay KYC-free!
-
@ eb0157af:77ab6c55
2025-06-18 02:02:05Russian authorities uncover 95 Bitcoin mining machines hidden inside a truck stealing electricity from a village.
Law enforcement in the Republic of Buryatia has uncovered an illegal Bitcoin mining operation concealed inside a KamAZ truck. The clandestine facility was siphoning off electricity meant for the local population.
According to the national news agency TASS, the discovery was made during a routine inspection of power lines in the Pribaikalsky district, where inspectors identified an unauthorized connection to a 10-kilovolt line — enough to power an entire village. The criminal operation showed a high level of organization, with sophisticated equipment hidden inside an apparently innocuous transport vehicle.
Source: Babr Mash
Inside the commercial truck, authorities found a fully operational mining center equipped with 95 machines and a portable transformer station. The technical setup suggested careful planning, designed to maximize bitcoin production while minimizing the risk of detection.
Two individuals suspected of involvement in the illegal activity managed to escape in an SUV before law enforcement arrived.
Impact of illegal mining on the local power grid
Buryatenergo, a regional unit of Rosseti Siberia, stressed how unauthorized connections severely compromise the stability of the local power grid. Consequences include voltage drops, overloads, and potential blackouts that disproportionately affect rural communities, already vulnerable in terms of energy access.
The illegal siphoning of electricity for mining creates a domino effect across the entire electrical infrastructure, causing service disruptions for legitimate users and increasing maintenance costs for grid operators.
Government restrictions on mining
The Russian government has implemented various restrictions on cryptocurrency mining in several regions of the country. In Buryatia, mining is banned from November 15 to March 15 due to seasonal energy shortages. Only companies registered in specific districts such as Severo-Baikalsky and Muisky are allowed to operate outside this period.
Federal restrictions were further tightened in December 2024, when Russia announced a ban on mining during peak energy months in multiple regions, including Dagestan, Chechnya, and parts of eastern Ukraine under Russian control. Since April, a total ban has been in effect in the southern region of Irkutsk.
Despite these restrictions, some Russian companies continue to operate legally in the sector. BitRiver, one of the country’s leading operators, takes advantage of the region’s low-cost energy, having launched its first and largest facility in 2019 in the city of Bratsk.
The post Illegal mining: clandestine operation discovered in a KamAZ truck in Russia appeared first on Atlas21.
-
@ b1ddb4d7:471244e7
2025-06-18 02:01:28Years ago, I flew a microlight aircraft for the first time and felt what it meant to leave the ground. Recently, I bought a gigabyte of storage for 5 cents via Lightning, and something similar happened. This is about that moment—when you stop believing something works and start knowing it does.
Every now and then (if you’re lucky) you have one of those “eureka” moments where the full implications of something hit you for the first time. My biggest experience of that was years ago when I got a microlight aircraft. They’d just come out, so there were no regulations, and anyone could buy one and just fly.
People who should never be flying were going all over the place, and—having no navigation training—they were following motorways instead. Some were even landing at the service stops to get more fuel. How could I resist?
The price included training at an old airfield that was now not busy at all. After a lot of taxiing along the runways, it came time to try a takeoff. Nothing can prepare you for that. It’s not like a Cessna or any of those “proper” aircraft; it’s just an aluminum frame, and you hang off the center of the main pole, the center of gravity. There was a twin motor behind me, totaling 250 cc. I could feel where the wind was on the wings, which side, and even how far along. It was an insight into what birds must feel. I’d trade wings for a big brain any day!
I hit the gas on full, and we accelerated. I had been told that this thing could fly. and had seen my teacher fly in it many times. I thought I understood that it could fly, but as I left the ground and the drag on the wheels was suddenly gone, the whole thing lurched up into the air fast, at a really steep angle, and before I could think, I was already higher than a house. That was when I understood that this thing could fly. Belief is not knowledge, and knowledge only comes from experience.
So it is with many things. So it is with Bitcoin and the Lightning Network. I believed that Lightning could “transform the economic landscape.” I had read about how bitcoin can “revolutionize the financial system.” What hadn’t happened yet was that I had not actually experienced it. That take-off moment came when someone sent me a file link on a CDN. I downloaded the PDF (300 MB or so) and then cut the end off the URL to have a look at the service provider.
To my surprise, they were offering storage space on the CDN at 5c per gigabyte per month. with “unlimited” data transfer. So I decided to try it out. Within a few seconds I had ordered, paid for, and received my credit, and the service was available. 5 cents! That was when I realized how simple everything else in the world can be with Bitcoin and the Lightning Network.
Who cares about how many stupid dollars you can get with bitcoin? Look at what you can do with it! In the new world that may be opening up for us, we can rid ourselves of the parasites who have held us back for so long. “When moon?” takes on a whole different meaning. Nothing is beyond our reach.
There was no bitcoin back in the Spanish Civil War when Durruti was doing his thing, but something of the same awakening must have stirred in him to inspire these words: “We should not be in the least afraid of ruins. They may blast and lay bare this world before they go, but we carry a new world here in our hearts, and this world is growing as we speak.”
https://satellite.earth is the site. It’s not just a storage provider; it’s a Nostr node you can use like any other node, and it has communities set up, among other things. It’s well worth a look. No, I’m not getting paid; they don’t even know me. And I’m not sure, but it looks like because I haven’t used the whole 1 GB yet, they are using my 5c to extend the time I have. In other words, it’s 5c per gigabyte-month, not per gigabyte per month.
-
@ eb0157af:77ab6c55
2025-06-18 03:01:36A new study by Kraken reveals how cryptocurrency investors perceive security as the main challenge in self-managing their digital assets.
According to The Block, a recent survey conducted by crypto exchange Kraken found that nearly half of respondents consider themselves the primary risk factor for their own crypto security. The research, which surveyed 789 participants, highlights that 48% of users see their own actions as the greatest threat to their investments in digital assets, surpassing concerns about external theft or fraud.
Kraken’s report underlines how personal responsibility in security management forces users to take full control of their digital funds. However, the study suggests that this autonomy can also become a source of anxiety for many investors.
Nick Percoco, Chief Security Officer at Kraken, commented on the findings, noting that “a lack of confidence in personal crypto security is capping the growth of the industry.” According to Percoco, unlocking the full potential of cryptocurrencies will require users to embrace self-custody and consistently invest in strong security habits.
Technologies to strengthen security
Despite the concerns highlighted in the study, 31% of participants expressed optimism about future technologies that could improve crypto security. Among the most promising solutions identified:
- advanced biometric systems for user authentication;
- multi-factor authentication to secure wallet access;
- AI-based fraud detection systems to prevent attacks.
Data and case studies
Kraken’s research emerges in a context where security threats remain a pressing reality. FBI data shows that in 2024, nearly 150,000 reports of crypto-related internet fraud resulted in $9.3 billion in losses. Older users, particularly those over 60, proved especially vulnerable, accounting for $3 billion in crypto-related financial fraud losses on their own.
The post Kraken study: 48% of users fear themselves in managing and securing their funds appeared first on Atlas21.
-
@ 31a4605e:cf043959
2025-06-17 17:35:10Desde a sua criação em 2008, Bitcoin tem sido visto como um desafio direto ao sistema bancário tradicional. Desenvolvido como uma alternativa descentralizada ao dinheiro fiduciário, Bitcoin oferece uma forma de armazenar e transferir valor sem depender de bancos, governos ou outras instituições financeiras. Essa característica faz com que seja considerado um símbolo de resistência contra um sistema financeiro que, ao longo do tempo, tem sido marcado por crises, manipulações e restrições impostas aos cidadãos.
Crise financeira de 2008 e o nascimento de Bitcoin
Bitcoin surgiu em resposta à crise financeira de 2008, um colapso que revelou as falhas do sistema bancário global. Bancos centrais imprimiram grandes quantidades de dinheiro para resgatar instituições financeiras irresponsáveis, enquanto milhões de pessoas perderam as suas casas, poupanças e empregos. Nesse contexto, Bitcoin foi criado como um sistema financeiro alternativo, onde não existe uma entidade central com o poder de manipular a economia em benefício próprio.
No primeiro bloco da blockchain ou timechain de Bitcoin, Satoshi Nakamoto incluiu a seguinte mensagem:
"The Times 03/Jan/2009 Chancellor on brink of second bailout for banks."
Essa frase, retirada de uma manchete de jornal da época, simboliza a intenção de Bitcoin de oferecer um sistema financeiro fora do controlo dos bancos e dos governos.
Principais razões pelas quais Bitcoin resiste ao sistema bancário
Descentralização: Ao contrário do dinheiro emitido por bancos centrais, Bitcoin não pode ser criado ou controlado por nenhuma entidade específica. A rede de utilizadores valida as transações de forma transparente e independente.
Oferta limitada: Enquanto os bancos centrais podem imprimir dinheiro sem limites, causando inflação e desvalorização da moeda, Bitcoin tem uma oferta fixa de 21 milhões de unidades, tornando-o resistente à depreciação artificial.
Impossibilidade de censura: Bancos podem bloquear contas e impedir transações a qualquer momento. Com Bitcoin, qualquer pessoa pode enviar e receber fundos sem pedir permissão a terceiros.
Autocustódia: Em vez de confiar os seus fundos a um banco, os utilizadores de Bitcoin podem armazenar as suas próprias moedas, sem risco de congelamento de contas ou falências bancárias.
Conflito entre bancos e Bitcoin
Ataques mediáticos: Grandes instituições financeiras frequentemente classificam Bitcoin como arriscado, volátil ou inútil, tentando desincentivar a sua adoção.
Regulação e repressão: Alguns governos, influenciados pelo setor bancário, têm criado restrições ao uso de Bitcoin, dificultando a sua compra e venda.
Criação de alternativas centralizadas: Muitos bancos centrais estão a desenvolver moedas digitais (CBDCs) que mantêm o controlo do dinheiro digital, mas sem oferecer a liberdade e a descentralização de Bitcoin.
Resumindo, o Bitcoin não é apenas uma moeda digital, mas um movimento de resistência contra um sistema financeiro que falhou repetidamente em proteger o cidadão comum. Ao oferecer uma alternativa descentralizada, transparente e resistente à censura, Bitcoin representa a liberdade financeira e desafia o monopólio dos bancos sobre o dinheiro. Enquanto o sistema bancário tradicional continuar a impor restrições e a controlar o fluxo de capital, Bitcoin permanecerá como um símbolo de independência e soberania financeira.
Muito obrigado por teres lido o texto até aqui, espero que esteja tudo bem contigo e um abraço enorme do teu madeirense bitcoiner maximalista favorito. Viva a liberdade!
-
@ 0c9e5e17:480e870b
2025-06-18 01:52:11I've owned a Fallkniven F1 knife for many years, but never really used it or taken it anywhere because of the sheath. The standard plastic sheath that it comes with may be perfectly designed for survival knife use or for pilots, which I think the knife was designed for, but for every day use or carry it is horrible. The knife sits loose inside, it rattles, the sheath barely retains the knife and the upper soft webbing is annoying. In my humble opinion anyway.
I've looked online for alternative sheaths for a couple of years and found some leather sheaths or Kydex sheaths, but none really suited my needs and were fairly expensive. So, the F1 sat in a box with other outdoor gear not getting any use.
Several years later I finally decided to try my hand at making a Kydex sheath on my own. This was spurred on by another DIY tool project I was working on that also happened to need a Kydex sheath (more on that in a later blog post). So, I thought making a sheath for my Fallkniven F1 might be a good practice project. It was getting no use anyway so what's the worse that could happen. I might even give it a new lease of life.
Making a Kydex Press
The first step was to make some form of press for forming the heated Kydex around the knife. I search on YouTube and found dozens of videos showing how to make simple hinged presses using pieces of wood and some small pieces of foam. I purchased two door hinges at my local Home Depot and used some scraps of wood I had and small sections of an old backpacking sleeping pad (neoprene) to make the Kydex press. I'm not going to go in to detail, if you want a step-by-step guide check out this video.
Supplies
After more research I settled on using 0.8” thickness Kydex material. This seems strong enough for my needs, readily available and easy to form. I purchased a couple of 12” square sections on OD green from KnifeKits.com along with some 1/4” eye rivets and a rivet setting punch tool. I had some basic power tools, drill press, small toaster oven, and mini bandsaw in my garage workshop, along with a myriad of old hand tools, sanding paper etc.
Sheath Forming
According to several of the Kydex tutorial videos on YouTube University, it is recommended to apply two layers of blue painters tape to the blade of a knife before forming Kydex around it. This provided a small tolerance around the blade inside the sheath after the tape is removed. I prepped my Fallkniven F1 and got organized. I rough cut a piece of Kydex to approximately the size I needed. I had already decided to make a 'taco' style sheath. This requires once piece of Kydex to be folded around the blade and riveted on one side. The alternative is two pieces of separate Kydex and riveted on both sides of the blade - to me this added extra bulk and was unnecessary.
In an old toaster oven, heated to 350-degrees, I warmed my piece of Kydex. I had my sheath press ready along with two clamps. I wore a pair of Mechanix Wear gloves to protect my hands, heated Kydex is extremely hot and similar to handling molten plastic. You need gloves and need to be able to move quickly once the Kydex is up tp temperature. After about 90 seconds I tested the Kydex to find it perfectly soft and pliable. I wasn't able to find good information on what temperature to heat 0.8mm Kydex or for how long, but did find a video describing the right softness of Kydex so you can tell when it's ready. Pretty much trial and error.
I removed the heated Kydex and folded it around the back spine of the Fallkniven, quickly laying it down on the foam of my Kydex press, handle sticking out. I quickly closed the press lid and applied two clamps, tightening as hard as I could. I let this sit for 10 minutes to cool down.
Trimming and Rivet Placement
Once the Kydex had cooled down I removed it form the press and opened up the taco form to remove the knife. I knew I was going to be affixing a Tek-Lok clip to the sheath so that I could wear the knife appendix style (horizontally) on my belt. I marked out my rivet holes, spacing them to match the Tek-Lok and added a few more to secure the sheath. I drilled the 1/4” holes on my drill press and then marked the shape of the sheath using a white pencil. I trimmed most of the excess using a small bench-top bandsaw and finished the edges using sequentially finer levels of sandpaper. Kydex is pretty easy to work with.
I drilled a small hole at the bottom of the sheath right at the tip of the blade to allow for drainage should the sheath or knife get wet, fall into water, or get dirt inside. The last step before riveting was to clean out the inside of the sheath to remove and dust and debris from construction. I used some high pressure air.
I inserted each rivet one at a time and crimped them using my rivet setting die and a small arbor press I had. You could just as easily use a hammer a few small taps. Note: It's important that you use the right length rivets for the Kydex you are using. Mine were specifically for 0.8” Kydex.
Ensuring the Perfect Fit
I checked that the knife still fit snuggly into the sheath and was well retained. I noticed that it could use some adjustment and tweaks to fit and be removed more easily. I could describe all the steps here, or you could do what I did and watch this excellent YouTube video by Gentry Custom Knives which walks you through exactly how to ensure a perfect fit. I also took his advice and added a small thumb ramp to make removing the blade easier. I used a hot air gun to carefully heat the top edge of the Kydex sheath and bend it with my gloved finger.
Tek-Lok Clip Mounting
Installing the Tek-Lok clip is extremely easy. Just align the holes that have been drilled and rivetted and determie if you need to have the vet spacer inserted or not - depending on how wide your belt is. And that's it.
The best way to do this is to just try. I had several failures along the way and learned what not to do. The great things about Kydex is that if you mess up in the pressing stage, you can warm it up again in the toaster oven and it will revert to it's original flat form and you can try again. I did discover however, that you can only do this a maximum of three times before the Kydex starts to misform and no longer be an even thickness - that might only be true in a toaster over. Time and more attempts will tell.
This project was a lot of fun and it gave and old under utilized knife an entirley new lease of life. The Fallkniven F1 is not a small knife, but I can hardly notice I am wearing it using this new sheath in an appendix carry mode.
Resources and Acknowledgements
I hoped you found this useful. I had a blast doing this for the first time and learned a lot along the way. I managed to do this on the cheap with less than $50 worth of materials, which will enable me to make more than this one sheath.
I'd like to acknowledge and give thank to some knifemakers who kindly shared their knowledge through videos on YouTube. I could not have learned how to do this without the many excellent videos shared by Gentry Custom Knives and Simple Little Life. Their videos were incredibly detailed and were the basis of everything I did here. Many, many thanks to both of them for taking the time to make their videos and openly share their skills and expertise to allow others to learn. Please support them in any way you can, subscribe to their channels, like their videos, or purchase some of their excellent knives.
KnifeKits.com - everything you could ever need and more to support your knife making habit - from a utter novice (like me) to an expert. Fast reliable shipping, and competitive prices.
I'd love to hear from you. What do you think about my first Kydex sheath project? Do you love it or hate it? What would you have done differently and what could I do better? Let me know, so that I can get better next time. - Bfgreen
-
@ 31a4605e:cf043959
2025-06-17 17:08:15Bitcoin surgiu como uma alternativa ao sistema financeiro tradicional, oferecendo um meio de troca descentralizado e resistente à censura. No entanto, essa proposta desafia diretamente o controlo que os governos exercem sobre a economia, especialmente no que diz respeito à emissão de moeda e regulação do setor financeiro. Como resultado, muitos governos veem Bitcoin com desconfiança e tentam limitar a sua adoção, enquanto outros procuram integrá-lo à economia de forma controlada.
Motivos para o conflito entre governos e Bitcoin
A resistência governamental à adoção de Bitcoin deve-se a vários fatores, entre os quais se destacam:
Perda de controlo monetário: Os governos controlam a política monetária através da emissão de moeda fiduciária e da manipulação das taxas de juro. Bitcoin, por ter uma oferta fixa e descentralizada, impede que governos imprimam mais dinheiro, limitando a sua influência sobre a economia.
Dificuldade na tributação: A utilização de Bitcoin dificulta a fiscalização de transações e a cobrança de impostos, tornando-se um desafio para as autoridades que dependem da tributação para financiar gastos públicos.
Preocupações com regulação e crime financeiro: Muitos governos argumentam que Bitcoin pode ser usado para lavagem de dinheiro, evasão fiscal e outras atividades ilícitas. No entanto, como todas as transações ficam registadas na blockchain ou timechain, Bitcoin é, na realidade, mais rastreável do que o dinheiro físico.
Competição com moedas digitais de bancos centrais (CBDCs): Alguns governos estão a desenvolver as suas próprias moedas digitais, conhecidas como CBDCs. Estas oferecem um alto nível de controlo sobre as transações financeiras, mas não possuem as mesmas propriedades descentralizadas de Bitcoin. Para garantir a adoção das CBDCs, alguns governos tentam limitar ou proibir o uso de Bitcoin.
Diferentes países têm abordagens variadas em relação a Bitcoin, desde a aceitação total até a repressão severa.
El Salvador: foi o primeiro país a adotar Bitcoin como moeda legal em 2021. Esta decisão gerou conflitos com instituições financeiras globais, como o Fundo Monetário Internacional (FMI), que pressionou o governo salvadorenho a reconsiderar a sua decisão.
China: o governo chinês proibiu completamente a mineração e o uso de Bitcoin em 2021, alegando preocupações ambientais e riscos financeiros. No entanto, muitos mineradores e utilizadores chineses continuam a operar através de meios alternativos.
Estados Unidos: embora Bitcoin seja legal nos EUA, o governo tem imposto regulamentações mais rígidas às plataformas de troca e à mineração, tentando aumentar o controlo sobre o setor. Alguns políticos defendem uma abordagem favorável, enquanto outros veem Bitcoin como uma ameaça ao dólar.
União Europeia: a UE tem adotado uma postura regulatória mais rigorosa, impondo regras sobre a identificação dos utilizadores e a transparência das transações. Apesar disso, Bitcoin continua a ser legal e amplamente utilizado.
Apesar dos desafios impostos por alguns governos, a adoção de Bitcoin continua a crescer. Muitos utilizadores veem Bitcoin como uma forma de preservar a sua riqueza perante políticas monetárias inflacionárias e controlo excessivo sobre o dinheiro. Além disso, países com economias instáveis e sistemas financeiros pouco acessíveis encontram em Bitcoin uma solução para pagamentos internacionais e proteção contra crises económicas.
A resistência dos governos pode desacelerar a adoção de Bitcoin em algumas regiões, mas não conseguirá eliminá-lo completamente. Como uma rede descentralizada e global, Bitcoin continuará a ser utilizado, independentemente das restrições impostas por qualquer governo. A longo prazo, a sua adoção dependerá da capacidade dos indivíduos e empresas de resistirem às pressões regulatórias e continuarem a utilizá-lo como uma alternativa financeira.
Resumindo, o conflito entre governos e Bitcoin reflete a luta entre um sistema financeiro tradicional centralizado e uma nova alternativa descentralizada. Enquanto alguns países tentam proibir ou restringir o seu uso, outros adotam-no como parte da sua economia. No final, a resistência dos governos pode apenas atrasar, mas dificilmente impedirá a adoção global de Bitcoin, que continua a demonstrar a sua resiliência e utilidade como uma reserva de valor e meio de troca.
Muito obrigado por teres lido o texto até aqui, espero que esteja tudo bem contigo e um abraço enorme do teu madeirense bitcoiner maximalista favorito. Viva a liberdade!
-
@ 31a4605e:cf043959
2025-06-17 17:00:03Bitcoin funciona através de um sistema descentralizado que depende de um processo chamado mineração para validar transações e garantir a segurança da rede. no entanto, a mineração de Bitcoin exige uma grande quantidade de energia, o que levanta preocupações sobre o seu impacto ambiental. embora existam soluções para tornar este processo mais sustentável, o consumo energético continua a ser um tema debatido tanto por críticos como por defensores da tecnologia.
Como funciona a mineração de Bitcoin?
A mineração de Bitcoin é o processo pelo qual novos blocos são adicionados à blockchain ou timechain e novas moedas são criadas. este processo utiliza um mecanismo chamado proof-of-work (prova de trabalho), onde computadores especializados (miners) competem para resolver problemas matemáticos complexos. para isso, consomem uma enorme quantidade de eletricidade, pois os equipamentos precisam de funcionar continuamente para garantir que a rede se mantém segura e descentralizada.
O consumo de energia e o impacto ambiental
A principal crítica à mineração de Bitcoin está relacionada com o elevado consumo de eletricidade. atualmente, estima-se que a rede Bitcoin consome tanta energia quanto alguns países inteiros. este consumo gera preocupações ambientais, pois grande parte da eletricidade mundial ainda é produzida a partir de combustíveis fósseis, que emitem gases poluentes.
Os impactos ambientais da mineração de Bitcoin incluem:
Emissões de carbono: se a eletricidade utilizada para a mineração vier de fontes poluentes, o processo contribui para o aumento das emissões de CO₂, intensificando o aquecimento global.
Uso excessivo de recursos naturais: a mineração em grande escala pode sobrecarregar redes elétricas locais e aumentar a procura por eletricidade, levando a um maior consumo de combustíveis fósseis em algumas regiões.
Produção de resíduos eletrónicos: os equipamentos de mineração têm um tempo de vida útil relativamente curto, o que leva à produção de grandes quantidades de lixo eletrónico.
Alternativas e soluções sustentáveis
Apesar das preocupações, a mineração de Bitcoin está a tornar-se cada vez mais eficiente e sustentável. muitas operações de mineração já utilizam fontes de energia renovável, como hidrelétrica, solar e eólica, reduzindo significativamente a pegada ecológica. algumas soluções incluem:
Uso de energia renovável: miners estão a mudar-se para regiões onde há excesso de produção de energia renovável, aproveitando recursos que, de outra forma, seriam desperdiçados.
Reciclagem de calor gerado pela mineração: algumas empresas estão a utilizar o calor produzido pelos equipamentos de mineração para aquecer edifícios e infraestruturas, aproveitando a energia de forma mais eficiente.
Inovações tecnológicas: o desenvolvimento de novos chips e equipamentos mais eficientes reduz o consumo energético da mineração sem comprometer a segurança da rede.
Resumindo, o impacto ambiental da mineração do Bitcoin é um tema controverso, mas as soluções para tornar o processo mais sustentável estão a evoluir rapidamente. embora o consumo energético continue elevado, a transição para fontes de energia renovável e novas tecnologias pode tornar Bitcoin um sistema mais eficiente e amigo do ambiente. assim, a questão não é apenas o consumo de eletricidade, mas sim a origem dessa energia e as inovações que tornam a mineração cada vez mais sustentável.
Muito obrigado por teres lido o texto até aqui, espero que esteja tudo bem contigo e um abraço enorme do teu madeirense bitcoiner maximalista favorito. Viva a liberdade!
-
@ eb0157af:77ab6c55
2025-06-18 03:01:35The Thai government has eliminated taxes on gains from cryptocurrencies until 2029 to attract investors and promote the digital asset sector.
According to Efinance Thai, Thailand has approved a five-year tax exemption on profits from the sale of Bitcoin and other digital assets. The decision aims to position the country as one of the world’s leading digital financial hubs.
On June 17, Thailand’s Cabinet officially approved the tax measure proposed by the Ministry of Finance. The initiative removes personal income tax on capital gains from the sale of cryptocurrencies conducted through licensed operators under the 2018 Digital Asset Business Act.
Deputy Finance Minister Julapun Amornvivat stated that the tax policy is a cornerstone of the government’s strategy to turn Thailand into a major global center for Bitcoin and blockchain-based financial services.
The capital gains tax exemption will be in effect from January 1, 2025, to December 31, 2029. It applies exclusively to transactions carried out via exchanges, brokers, and dealers licensed and regulated by Thailand’s Securities and Exchange Commission (SEC).
Thai authorities estimate that this tax reform will boost the domestic Bitcoin market, generating positive spillovers for the country’s innovative tech ecosystem. Economic projections indicate a medium-term increase in tax revenues of at least 1 billion baht (around $30 million), driven by sector growth and fresh investment inflows.
According to the government, the initiative is also expected to encourage capital raising through digital tokens and foster the development of blockchain-based financial services.
The post Thailand abolishes taxes on Bitcoin: five-year tax exemption appeared first on Atlas21.
-
@ 39cc53c9:27168656
2025-06-15 14:46:35The new website is finally live! I put in a lot of hard work over the past months on it. I'm proud to say that it's out now and it looks pretty cool, at least to me!
Why rewrite it all?
The old kycnot.me site was built using Python with Flask about two years ago. Since then, I've gained a lot more experience with Golang and coding in general. Trying to update that old codebase, which had a lot of design flaws, would have been a bad idea. It would have been like building on an unstable foundation.
That's why I made the decision to rewrite the entire application. Initially, I chose to use SvelteKit with JavaScript. I did manage to create a stable site that looked similar to the new one, but it required Jav aScript to work. As I kept coding, I started feeling like I was repeating "the Python mistake". I was writing the app in a language I wasn't very familiar with (just like when I was learning Python at that mom ent), and I wasn't happy with the code. It felt like spaghetti code all the time.
So, I made a complete U-turn and started over, this time using Golang. While I'm not as proficient in Golang as I am in Python now, I find it to be a very enjoyable language to code with. Most aof my recent pr ojects have been written in Golang, and I'm getting the hang of it. I tried to make the best decisions I could and structure the code as well as possible. Of course, there's still room for improvement, which I'll address in future updates.
Now I have a more maintainable website that can scale much better. It uses a real database instead of a JSON file like the old site, and I can add many more features. Since I chose to go with Golang, I mad e the "tradeoff" of not using JavaScript at all, so all the rendering load falls on the server. But I believe it's a tradeoff that's worth it.
What's new
- UI/UX - I've designed a new logo and color palette for kycnot.me. I think it looks pretty cool and cypherpunk. I am not a graphic designer, but I think I did a decent work and I put a lot of thinking on it to make it pleasant!
- Point system - The new point system provides more detailed information about the listings, and can be expanded to cover additional features across all services. Anyone can request a new point!
- ToS Scrapper: I've implemented a powerful automated terms-of-service scrapper that collects all the ToS pages from the listings. It saves you from the hassle of reading the ToS by listing the lines that are suspiciously related to KYC/AML practices. This is still in development and it will improve for sure, but it works pretty fine right now!
- Search bar - The new search bar allows you to easily filter services. It performs a full-text search on the Title, Description, Category, and Tags of all the services. Looking for VPN services? Just search for "vpn"!
- Transparency - To be more transparent, all discussions about services now take place publicly on GitLab. I won't be answering any e-mails (an auto-reply will prompt to write to the corresponding Gitlab issue). This ensures that all service-related matters are publicly accessible and recorded. Additionally, there's a real-time audits page that displays database changes.
- Listing Requests - I have upgraded the request system. The new form allows you to directly request services or points without any extra steps. In the future, I plan to enable requests for specific changes to parts of the website.
- Lightweight and fast - The new site is lighter and faster than its predecessor!
- Tor and I2P - At last! kycnot.me is now officially on Tor and I2P!
How?
This rewrite has been a labor of love, in the end, I've been working on this for more than 3 months now. I don't have a team, so I work by myself on my free time, but I find great joy in helping people on their private journey with cryptocurrencies. Making it easier for individuals to use cryptocurrencies without KYC is a goal I am proud of!
If you appreciate my work, you can support me through the methods listed here. Alternatively, feel free to send me an email with a kind message!
Technical details
All the code is written in Golang, the website makes use of the chi router for the routing part. I also make use of BigCache for caching database requests. There is 0 JavaScript, so all the rendering load falls on the server, this means it needed to be efficient enough to not drawn with a few users since the old site was reporting about 2M requests per month on average (note that this are not unique users).
The database is running with mariadb, using gorm as the ORM. This is more than enough for this project. I started working with an
sqlite
database, but I ended up migrating to mariadb since it works better with JSON.The scraper is using chromedp combined with a series of keywords, regex and other logic. It runs every 24h and scraps all the services. You can find the scraper code here.
The frontend is written using Golang Templates for the HTML, and TailwindCSS plus DaisyUI for the CSS classes framework. I also use some plain CSS, but it's minimal.
The requests forms is the only part of the project that requires JavaScript to be enabled. It is needed for parsing some from fields that are a bit complex and for the "captcha", which is a simple Proof of Work that runs on your browser, destinated to avoid spam. For this, I use mCaptcha.
-
@ 39cc53c9:27168656
2025-06-15 14:13:58Bitcoin enthusiasts frequently and correctly remark how much value it adds to Bitcoin not to have a face, a leader, or a central authority behind it. This particularity means there isn't a single person to exert control over, or a single human point of failure who could become corrupt or harmful to the project.
Because of this, it is said that no other coin can be equally valuable as Bitcoin in terms of decentralization and trustworthiness. Bitcoin is unique not just for being first, but also because of how the events behind its inception developed. This implies that, from Bitcoin onwards, any coin created would have been created by someone, consequently having an authority behind it. For this and some other reasons, some people refer to Bitcoin as "The Immaculate Conception".
While other coins may have their own unique features and advantages, they may not be able to replicate Bitcoin's community-driven nature. However, one other cryptocurrency shares a similar story of mystery behind its creation: Monero.
History of Monero
Bytecoin and CryptoNote
In March 2014, a Bitcointalk thread titled "Bytecoin. Secure, private, untraceable since 2012" was initiated by a user under the nickname "DStrange"^1^. DStrange presented Bytecoin (BCN) as a unique cryptocurrency, in operation since July 2012. Unlike Bitcoin, it employed a new algorithm known as CryptoNote.
DStrange apparently stumbled upon the Bytecoin website by chance while mining a dying bitcoin fork, and decided to create a thread on Bitcointalk^1^. This sparked curiosity among some users, who wondered how could Bytecoin remain unnoticed since its alleged launch in 2012 until then^2^.
Some time after, a user brought up the "CryptoNote v2.0" whitepaper for the first time, underlining its innovative features^4^. Authored by the pseudonymous Nicolas van Saberhagen in October 2013, the CryptoNote v2 whitepaper^5^ highlighted the traceability and privacy problems in Bitcoin. Saberhagen argued that these flaws could not be quickly fixed, suggesting it would be more efficient to start a new project rather than trying to patch the original^5^, an statement simmilar to the one from Satoshi Nakamoto^6^.
Checking with Saberhagen's digital signature, the release date of the whitepaper seemed correct, which would mean that Cryptonote (v1) was created in 2012^7^, although there's an important detail: "Signing time is from the clock on the signer's computer" ^9^.
Moreover, the whitepaper v1 contains a footnote link to a Bitcointalk post dated May 5, 2013^10^, making it impossible for the whitepaper to have been signed and released on December 12, 2012.
As the narrative developed, users discovered that a significant 80% portion of Bytecoin had been pre-mined^11^ and blockchain dates seemed to be faked to make it look like it had been operating since 2012, leading to controversy surrounding the project.
The origins of CryptoNote and Bytecoin remain mysterious, leaving suspicions of a possible scam attempt, although the whitepaper had a good amount of work and thought on it.
The fork
In April 2014, the Bitcointalk user
thankful_for_today
, who had also participated in the Bytecoin thread^12^, announced plans to launch a Bytecoin fork named Bitmonero^13^.The primary motivation behind this fork was "Because there is a number of technical and marketing issues I wanted to do differently. And also because I like ideas and technology and I want it to succeed"^14^. This time Bitmonero did things different from Bytecoin: there was no premine or instamine, and no portion of the block reward went to development.
However, thankful_for_today proposed controversial changes that the community disagreed with. Johnny Mnemonic relates the events surrounding Bitmonero and thankful_for_today in a Bitcointalk comment^15^:
When thankful_for_today launched BitMonero [...] he ignored everything that was discussed and just did what he wanted. The block reward was considerably steeper than what everyone was expecting. He also moved forward with 1-minute block times despite everyone's concerns about the increase of orphan blocks. He also didn't address the tail emission concern that should've (in my opinion) been in the code at launch time. Basically, he messed everything up. Then, he disappeared.
After disappearing for a while, thankful_for_today returned to find that the community had taken over the project. Johnny Mnemonic continues:
I, and others, started working on new forks that were closer to what everyone else was hoping for. [...] it was decided that the BitMonero project should just be taken over. There were like 9 or 10 interested parties at the time if my memory is correct. We voted on IRC to drop the "bit" from BitMonero and move forward with the project. Thankful_for_today suddenly resurfaced, and wasn't happy to learn the community had assumed control of the coin. He attempted to maintain his own fork (still calling it "BitMonero") for a while, but that quickly fell into obscurity.
The unfolding of these events show us the roots of Monero. Much like Satoshi Nakamoto, the creators behind CryptoNote/Bytecoin and thankful_for_today remain a mystery^17^, having disappeared without a trace. This enigma only adds to Monero's value.
Since community took over development, believing in the project's potential and its ability to be guided in a better direction, Monero was given one of Bitcoin's most important qualities: a leaderless nature. With no single face or entity directing its path, Monero is safe from potential corruption or harm from a "central authority".
The community continued developing Monero until today. Since then, Monero has undergone a lot of technological improvements, migrations and achievements such as RingCT and RandomX. It also has developed its own Community Crowdfundinc System, conferences such as MoneroKon and Monerotopia are taking place every year, and has a very active community around it.
Monero continues to develop with goals of privacy and security first, ease of use and efficiency second. ^16^
This stands as a testament to the power of a dedicated community operating without a central figure of authority. This decentralized approach aligns with the original ethos of cryptocurrency, making Monero a prime example of community-driven innovation. For this, I thank all the people involved in Monero, that lead it to where it is today.
If you find any information that seems incorrect, unclear or any missing important events, please contact me and I will make the necessary changes.
Sources of interest
- https://forum.getmonero.org/20/general-discussion/211/history-of-monero
- https://monero.stackexchange.com/questions/852/what-is-the-origin-of-monero-and-its-relationship-to-bytecoin
- https://en.wikipedia.org/wiki/Monero
- https://bitcointalk.org/index.php?topic=583449.0
- https://bitcointalk.org/index.php?topic=563821.0
- https://bitcointalk.org/index.php?action=profile;u=233561
- https://bitcointalk.org/index.php?topic=512747.0
- https://bitcointalk.org/index.php?topic=740112.0
- https://monero.stackexchange.com/a/1024
- https://inspec2t-project.eu/cryptocurrency-with-a-focus-on-anonymity-these-facts-are-known-about-monero/
- https://medium.com/coin-story/coin-perspective-13-riccardo-spagni-69ef82907bd1
- https://www.getmonero.org/resources/about/
- https://www.wired.com/2017/01/monero-drug-dealers-cryptocurrency-choice-fire/
- https://www.monero.how/why-monero-vs-bitcoin
- https://old.reddit.com/r/Monero/comments/u8e5yr/satoshi_nakamoto_talked_about_privacy_features/
-
@ 8bad92c3:ca714aa5
2025-06-18 01:02:09Marty's Bent
via me
"The man in the coma" has been a long-running archetype of a bitcoiner on TFTC and Rabbit Hole Recap. Over the years, we've referenced the man in the coma in regards to bitcoin being a backward compatible distributed network that would enable an individual, in the case of our example - a man who fell into a coma, to be able to wake up many years, even decades, after falling into a deep sleep, go back to his bitcoin node and be able to participate in the network and validate his own transactions as if the network was operating the same it was the day he slipped into a coma. As a distributed network, this is one of bitcoin's greatest value props; consistency for the individual running it, no matter the version.
Having spent 12 years engrossed in bitcoin, thinking about it every day, building a media company focused on educating people about the network and the monetary revolution it enables, why it's important and how they can use it. Becoming a managing partner at Ten31, which is dedicated to investing in companies building out infrastructure that makes bitcoin more accessible and easier to use; "the man in the coma" has become a more prominent archetype in my mind.
"The man in the coma" archetype can be described in other ways. For instance, there was an individual by the name of John Doe, who joined myself and Matt Odell on TFTC about seven years ago who went to jail for four years. He was distributing certain goods on the Silk Road for many years and got nabbed by the police while throwing a house party. Unfortunately for Mr. Doe, the goods he were selling via the Silk Road were in the house hosting the party that got busted. Fortunately for Mr. Doe, the police who nabbed him were not privy to the way in which he was marketing and selling the goods. He went to jail for four years, walked out at the end of his sentence, found his bitcoin wallets, recovered them and was more than pleasantly surprised at the magnitude of his wealth.
The forced hodl that was incited by the state throwing him in a cage wound up paying off after four years. Now, I can certainly admit that time is the most scarce asset in the world. Being put in a cage for four years or falling into a coma for a number of years is not ideal. However, there are lessons to be gleaned from the successes that have been realized by "the man in the coma" and the man who was forced to hodl by being thrown in a cage. Unable to access his bitcoin during that period of time to make less than wise decisions.
The main lesson to be gleaned is that doing nothing is oftentimes significantly more optimal than doing something. Too many bitcoiners decide to make rash decisions influenced by the day-to-day happenings on social media or some one-off comment from someone in their personal life that they respect. These comments can be about the long-term viability of bitcoin itself, some prognostications about where the price is going in a short-term to medium-term time frame or simply the social aspects of being associated with bitcoin. All of these factors play into influencing certain individuals deciding to sell their bitcoin in the hopes of buying it back lower, realizing something material in their day-to-day life or jumping off a ship that they've been convinced is about to sink.
In my mind, the only thing listed above that makes a bit of sense to me is realizing something material in your day-to-day life. Selling some bitcoin to purchase something that makes your life better like enabling you to support your family at a critical time and in a way that would not be possible unless you sold bitcoin. That makes sense to me. However, the other two are completely nonsensical. Bitcoin's success is binary. It either succeeds or it doesn't. And if you accept that this is true, success means slowly but surely becoming the global reserve currency and monetary network used by billions of humans on the planet or it goes to zero.
If the former materializes, that means that billions of people are going to be competing for 21 million Bitcoin. There are, by some estimates, $900 trillion worth of assets that are being used to store wealth over the short, medium, and long term. Bitcoin has the potential to subsume a material percentage of that $900 trillion. In my mind, if bitcoin is as good as I believe it is, it should take at least half of that market, if not 80 to 90%. This in and of itself is a gamble. No one can be certain that this will come true. And with that in mind you have to make a probabilistic bet by surveying the world and discerning what the likelihood of bitcoin's ultimate success is.
If you think governments, central banks, and large corporations are going to continue down the path of unfettered expansion of the monetary base, debt, and misallocation of capital, bitcoin, a peer-to-peer distributed cash system that cannot be controlled by any individual. corporation, country, or central bank makes a lot of sense. The debasement, the debt expansion, and the misallocation of capital are driven by fallible humans working in incentive structures that are vulnerable to the fallible nature of the humans working within them.
Human fallibility brings with it the ability to talk oneself out of a position that one knows makes sense and is logical. This is the disadvantage that those who are not "the man in the coma" or "the man in a cage" operate from. Being forced to hodl bitcoin is already and will increasingly be seen as a relative advantage. Many who are in bitcoin today, paying attention to every headline, every pull request and every doubt flung their way will likely get to 2030 and agree that they made worse decisions than the man who was thrown in a cage or who slipped into a coma.
Of course, this isn't a fair introspective conclusion. The man in the coma and the man who was forced to hodl because he was put in a jail cell did not have a decision at the end of the day. Both were forced to hodl due to external or internal forces that, all else being equal, they would prefer not have had to endure. However, the outcome of these two situations will likely be better than the outcome of "the man in the arena" who thinks that by making decisions on the go as a slew of information comes his way on a day-to-day basis will materialize in a larger stack of satoshis.
The reality of the situation is such that no one truly knows where bitcoin is going to go on a day-to-day, month-to-month, or year-to-year basis. Especially at this point with large institutions, nation-states, corporations, and individual states getting into the fray. The only tried-and-true strategy within bitcoin over the long term is to stay humble, stack sats, and hodl like you are "the man in the coma" or the man who was thrown in a cage.
Bitcoin's Volatility Won't End With Institutional Adoption
Leon Wankum challenged the popular "supercycle" narrative during our conversation, arguing that Bitcoin's volatility isn't going away despite massive institutional adoption. While acknowledging that MicroStrategy now holds over 2% of all Bitcoin and won't sell, Leon maintains that leverage will still need to be washed out. He expects another 60% drawdown at the end of this bull cycle, viewing this as a feature rather than a bug of Bitcoin's design.
"Bitcoin naturally washes out leverage, it builds resilience and we don't go through these crazy boom and bust cycles, we go through bull and bear markets and I think that's a net positive." - Leon Wankum
Leon sees Bitcoin's volatility as fundamentally different from fiat's destructive boom-bust cycles. Where traditional markets require central bank intervention to prop up failing systems, Bitcoin's regular corrections create genuine resilience. Bad actors will always enter during euphoric phases, and the subsequent washouts ensure only strong hands remain. This natural selection process, he argues, is beautiful - it's what makes Bitcoin antifragile.
Check out the full podcast here for more on real estate opportunity costs, Bitcoin bonds, and treasury company risks.
Headlines of the Day
Romania Adds Crypto Terminals to Post Offices - via X
Musk Claims Trump in Epstein Files - via X
Uber CEO Calls Bitcoin Proven Store of Value - via X
Get our new STACK SATS hat - via tftcmerch.io
Take the First Step Off the Exchange
Bitkey is an easy, secure way to move your Bitcoin into self-custody. With simple setup and built-in recovery, it’s the perfect starting point for getting your coins off centralized platforms and into cold storage—no complexity, no middlemen.
Take control. Start with Bitkey.
Use the promo code *“TFTC20”* during checkout for 20% off
Ten31, the largest bitcoin-focused investor, has deployed $150.00M across 30+ companies through three funds. I am a Managing Partner at Ten31 and am very proud of the work we are doing. Learn more at ten31.vc/invest.
Final thought...
The kids really do grow up f
-
@ 31a4605e:cf043959
2025-06-17 16:46:45Bitcoin é conhecido pela sua forte volatilidade, com oscilações de preço que podem ocorrer em curtos períodos de tempo. Esta característica atrai tanto investidores que procuram grandes lucros como também afasta aqueles que preferem ativos mais estáveis. A volatilidade do preço de Bitcoin tem um impacto significativo no mercado, influenciando estratégias de investimento, adoção e até a perceção pública da moeda digital.
O que causa a volatilidade do preço de Bitcoin?
A volatilidade de Bitcoin deve-se a vários fatores que afetam a sua oferta e procura. entre os principais motivos estão:
Oferta limitada e halving: Bitcoin tem um fornecimento máximo de 21 milhões de unidades, o que cria escassez. além disso, o halving, que reduz a emissão de novos Bitcoins a cada quatro anos, pode provocar aumentos de preço devido à redução da oferta.
Especulação no mercado: muitos investidores compram e vendem Bitcoin para obter lucros rápidos, criando grandes flutuações no preço. movimentos especulativos, muitas vezes impulsionados por notícias e redes sociais, podem causar variações bruscas.
Eventos económicos e regulamentação: decisões governamentais, como proibições ou regulamentações favoráveis, afetam diretamente o preço. declarações de bancos centrais ou figuras influentes no setor financeiro podem também gerar fortes reações no mercado.
Liquidez e volume de negociação: o mercado de Bitcoin ainda é pequeno comparado a ativos tradicionais, como o ouro ou ações. isto significa que grandes ordens de compra ou venda podem causar oscilações significativas.
Impacto nos investidores e “investidores“
A volatilidade do preço de Bitcoin afeta diferentes tipos de investidores de formas distintas:
Investidores de curto prazo: traders que fazem operações diárias tentam lucrar com as flutuações de preço. no entanto, este tipo de estratégia envolve altos riscos e pode resultar em perdas significativas para quem não tem experiência no mercado.
Investidores de longo prazo (HODLers): quem investe com uma perspetiva a longo prazo costuma ignorar as variações diárias e foca-se no potencial de valorização de Bitcoin ao longo dos anos. apesar das quedas temporárias, muitos acreditam que o preço continuará a subir devido à escassez e à adoção crescente.
Empresas e instituições: empresas que investem em Bitcoin como reserva de valor, como a MicroStrategy e a Tesla, precisam de gerir os riscos da volatilidade. algumas optam por estratégias que minimizam a exposição direta a grandes oscilações.
Como lidar com a volatilidade?
Apesar dos desafios, existem formas de lidar com a volatilidade de Bitcoin de forma estratégica:
Diversificação da carteira: em vez de investir todo o capital em Bitcoin, muitos investidores diversificam para reduzir o impacto das oscilações de preço.
Investimento recorrente: estratégias como "dollar-cost averaging" (compra recorrente e fracionada) ajudam a suavizar os efeitos da volatilidade, reduzindo o risco de comprar numa alta momentânea.
Uso de armazenamento seguro: em vez de deixar Bitcoin em corretoras, que podem ser vulneráveis a ataques e manipulações de mercado, a auto-custódia em carteiras seguras protege o investimento a longo prazo.
Resumindo, a volatilidade do Bitcoin é uma das suas principais características e influencia tanto o comportamento dos “investidores” como a sua adoção em larga escala. Enquanto pode representar oportunidades para grandes lucros, também envolve riscos consideráveis, exigindo estratégias bem definidas para minimizar perdas. Com o tempo o Bitcoin amadurece e mais investidores institucionais entram no mercado, a volatilidade pode reduzir-se, tornando-o ainda mais atrativo como reserva de valor.
Muito obrigado por teres lido o texto até aqui, espero que esteja tudo bem contigo e um abraço enorme do teu madeirense bitcoiner maximalista favorito. Viva a liberdade!
-
@ e1cde248:609c13b0
2025-06-18 00:53:42Arthur Hayes ได้ฉายภาพหนึ่งในปัญหาใหญ่ที่สุดที่เศรษฐกิจโลกกำลังเผชิญ นั่นคือ "ศึกเงียบระหว่างคนรุ่นเก่าและรุ่นใหม่" ที่กำลังจะปะทุขึ้นจากการโอนถ่ายความมั่งคั่งขนาดมหาศาลจากรุ่น Baby Boomer ไปยัง Millennials และ Gen Z
ในอีกไม่กี่ปีข้างหน้า คนรุ่น Boomer ซึ่งเป็นกลุ่มที่ถือครองทรัพย์สินมากที่สุดในประวัติศาสตร์ กำลังเข้าสู่วัยเกษียณ และเริ่มขายสินทรัพย์อย่างหุ้น บ้าน และอสังหาริมทรัพย์ เพื่อเปลี่ยนเป็นเงินสดใช้ในบั้นปลายชีวิต
แต่ปัญหาคือ... ใครจะซื้อของเหล่านั้น?
คนรุ่นใหม่ไม่ได้มองบ้านหลังใหญ่ในชานเมืองหรือหุ้นบริษัทน้ำมันเป็นเป้าหมายชีวิตอีกต่อไป พวกเขาให้คุณค่ากับ "ประสบการณ์" มากกว่าสิ่งของ อีกทั้งยังสนใจ "สินทรัพย์ดิจิทัล" มากกว่าทรัพย์สินแบบดั้งเดิม และเชื่อในอิสระมากกว่าความมั่นคง
สิ่งนี้นำไปสู่คำถามสำคัญที่อาจเปลี่ยนทิศทางเศรษฐกิจโลก:
-
หากไม่มีใครอยากซื้อ สินทรัพย์จะราคาตกหรือไม่? ถ้าเกิดขึ้นจริง นั่นหมายถึงคนรุ่น Boomer จะต้องเกษียณด้วยสินทรัพย์ที่มีมูลค่าลดลง และอาจต้องพึ่งพารัฐบาลมากขึ้น
-
แล้วภาระจะตกกับใคร? หากรัฐบาลต้องอุ้มค่าใช้จ่ายผู้เกษียณ สิ่งที่ตามมาคือ "ภาษีที่เพิ่มขึ้น" ซึ่งจะตกอยู่กับคนรุ่นใหม่ที่แทบยังไม่มีอะไรในมือ
-
หรือสุดท้าย ทางออกเดียวจะคือการ “พิมพ์เงิน”? Hayes คาดว่ารัฐบาลจะหันไปใช้วิธีนี้ ซึ่งอาจช่วยได้ในระยะสั้น แต่จะกลายเป็นเชื้อเพลิงเงินเฟ้อในระยะยาว
และนั่นคือจุดที่ "ความไม่พอใจระหว่างรุ่น" อาจปะทุขึ้นอย่างรุนแรง
คนรุ่นใหม่จะถามว่า "ทำไมเราต้องจ่ายเพื่อความล้มเหลวของระบบที่เราไม่ได้สร้าง?" ขณะที่คนรุ่นเก่าอาจตอบว่า "เราเสียภาษีมาทั้งชีวิตเพื่อระบบนี้ แล้วใครจะดูแลเรา?"
นี่ไม่ใช่แค่ความต่างทางวัย แต่คือ ความขัดแย้งทางโครงสร้างเศรษฐกิจและคุณค่าของชีวิต ที่กำลังทวีความรุนแรงขึ้น
Hayes มองว่า ผลลัพธ์ของความขัดแย้งนี้ อาจมีตั้งแต่การปรับขึ้นภาษีรุนแรง การเปลี่ยนแปลงระบบบำนาญ ไปจนถึง ความไม่มั่นคงทางการเงินระดับชาติ ที่อาจเปลี่ยนวิธีที่โลกจัดการกับเงิน สินทรัพย์ และอนาคตของคนแต่ละรุ่นไปอย่างสิ้นเชิง
และในโลกแบบนี้ Hayes ถึงเชื่อว่า Bitcoin จะเป็นผู้ชนะ เพราะมันไม่สามารถพิมพ์เพิ่มได้ ซึ่งตรงข้ามกับเงินเฟ้อที่กำลังมาท่วมโลก
source: https://www.youtube.com/watch?v=AH7TIPRKGZw
-
-
@ 39cc53c9:27168656
2025-06-15 13:49:52Over the past few months, I've dedicated my time to a complete rewrite of the kycnot.me website. The technology stack remains unchanged; Golang paired with TailwindCSS. However, I've made some design choices in this iteration that I believe significantly enhance the site. Particularly to backend code.
UI Improvements
You'll notice a refreshed UI that retains the original concept but has some notable enhancements. The service list view is now more visually engaging, it displays additional information in a more aesthetically pleasing manner. Both filtering and searching functionalities have been optimized for speed and user experience.
Service pages have been also redesigned to highlight key information at the top, with the KYC Level box always accessible. The display of service attributes is now more visually intuitive.
The request form, especially the Captcha, has undergone substantial improvements. The new self-made Captcha is robust, addressing the reliability issues encountered with the previous version.
Terms of Service Summarizer
A significant upgrade is the Terms of Service summarizer/reviewer, now powered by AI (GPT-4-turbo). It efficiently condenses each service's ToS, extracting and presenting critical points, including any warnings. Summaries are updated monthly, processing over 40 ToS pages via the OpenAI API using a self-crafted and thoroughly tested prompt.
Nostr Comments
I've integrated a comment section for each service using Nostr. For guidance on using this feature, visit the dedicated how-to page.
Database
The backend database has transitioned to pocketbase, an open-source Golang backend that has been a pleasure to work with. I maintain an updated fork of the Golang SDK for pocketbase at pluja/pocketbase.
Scoring
The scoring algorithm has also been refined to be more fair. Despite I had considered its removal due to the complexity it adds (it is very difficult to design a fair scoring system), some users highlighted its value, so I kept it. The updated algorithm is available open source.
Listings
Each listing has been re-evaluated, and the ones that were no longer operational were removed. New additions are included, and the backlog of pending services will be addressed progressively, since I still have access to the old database.
API
The API now offers more comprehensive data. For more details, check here.
About Page
The About page has been restructured for brevity and clarity.
Other Changes
Extensive changes have been implemented in the server-side logic, since the whole code base was re-written from the ground up. I may discuss these in a future post, but for now, I consider the current version to be just a bit beyond beta, and additional updates are planned in the coming weeks.
-
@ c11cf5f8:4928464d
2025-06-17 22:27:17NOW OPEN
Welcome stacker and cowboys to the second edition of this Sellers & Business Club series!
You're in the right place if you're serious about growing your business, or starting a new one. Let's discuss your preferred Bitcoin Business Models!
You'll find everything you need to move faster, sell smarter, and stay ahead of trends—with useful insights for every step of the way, community-powered learning posts, insights, and support from other sellers.
Thank you @BTCLNAT, @car, @fauxfoe, @lunin and @021f3af1a6 (ai bot?) for participating in the previous edition and other stackers[^1] that have been active in the ~AGORA marketplace.
Your insights and questions are welcome. I'll be opening with some questions:
-
What are your latest wins?
-
What are you dealing with lately?
-
What current obstacles that are keeping you away from succeeding?
[^1]: FIY: @watchmancbiz @globalmerchant @midnightshipper @thebullishbitcoiner @realtrader @sandelllevy_ @thecommoner @matusalem @siggy47 @veintiuno @needcreations_ @globalthreat @profullstack @cryotosensei @catoshi @kr @pleblab @fabs @lendasat @Akg10s3 @bytephysics @byzantine @96dffdc39e @thewildhustle @0xbitcoiner @gpvansat @south_korea_ln @rideandsmile @btclnat @bitcoinerrorlog @wakingseason @tinstrmedia @pictureroom @isolabellart @jpedro64453 @herschel
https://stacker.news/items/1008929
-
-
@ 31a4605e:cf043959
2025-06-17 16:40:37Bitcoin tem vindo a ganhar cada vez mais aceitação como meio de pagamento, deixando de ser apenas um ativo digital para investimento e tornando-se uma alternativa viável às moedas tradicionais. Atualmente, diversas empresas em todo o mundo já aceitam Bitcoin como forma de pagamento, proporcionando aos consumidores mais liberdade financeira e eliminando a necessidade de intermediários bancários.
Empresas globais que aceitam Bitcoin
Ao longo dos anos, várias empresas de renome começaram a aceitar Bitcoin, reconhecendo as suas vantagens, como a segurança, a transparência e as baixas taxas de transação. Entre as mais conhecidas, destacam-se:
Microsoft: a gigante da tecnologia permite que os utilizadores adicionem saldo às suas contas utilizando Bitcoin. isto permite a compra de produtos digitais, como jogos, aplicações e outros conteúdos disponíveis na Microsoft Store.
Overstock: um dos maiores retalhistas online que aceita Bitcoin para a compra de móveis, eletrodomésticos e artigos para casa. a empresa foi uma das pioneiras na adoção de Bitcoin, mostrando o seu compromisso com a inovação financeira.
AT&T: a operadora de telecomunicações dos Estados Unidos foi a primeira do setor a aceitar pagamentos em Bitcoin, permitindo que os seus clientes paguem faturas através deste meio digital.
Twitch: a popular plataforma de streaming de videojogos permite que os utilizadores façam doações e subscrições utilizando Bitcoin, incentivando a adoção desta moeda entre criadores de conteúdo.
Namecheap: um dos principais serviços de registo de domínios na internet aceita Bitcoin para a compra de domínios e serviços de alojamento web, demonstrando a aplicabilidade prática desta moeda no setor digital.
Pequenos negócios e comércio local
Para além das grandes empresas, muitos pequenos negócios e comerciantes locais já aceitam Bitcoin, especialmente em cidades que estão a tornar-se polos da economia digital.
Restaurantes e cafés: em cidades como Lisboa, Londres e Nova Iorque, alguns cafés e restaurantes aceitam Bitcoin como forma de pagamento, atraindo clientes que preferem pagar com esta tecnologia.
Hotéis e turismo: algumas redes hoteleiras e agências de viagens permitem o pagamento em Bitcoin, facilitando reservas e eliminando taxas cambiais para turistas internacionais.
Lojas online: muitos pequenos comerciantes na internet vendem produtos e serviços exclusivamente com Bitcoin, aproveitando a facilidade das transações digitais e a segurança da rede.
Vantagens para empresas e consumidores
O aumento da aceitação de Bitcoin deve-se aos benefícios que tanto empresas como consumidores obtêm ao utilizá-lo:
Menores taxas de transação: empresas evitam as altas comissões cobradas por bancos e serviços de pagamento tradicionais.
Eliminação de intermediários: transações são diretas entre comprador e vendedor, reduzindo burocracias e riscos de fraudes com cartões de crédito.
Acesso global: Bitcoin permite pagamentos internacionais sem necessidade de conversões cambiais, ideal para negócios online.
Resumindo, a adoção de Bitcoin como meio de pagamento continua a crescer, com empresas de todos os setores a reconhecerem as suas vantagens. à medida que mais negócios aderem a esta tecnologia, Bitcoin torna-se cada vez mais uma alternativa viável ao dinheiro tradicional. Apesar dos desafios de volatilidade e regulamentação, a tendência aponta para um futuro onde pagar com Bitcoin será algo comum no dia a dia.
Muito obrigado por teres lido o texto até aqui, espero que esteja tudo bem contigo e um abraço enorme do teu madeirense bitcoiner maximalista favorito. Viva a liberdade!
-
@ df478568:2a951e67
2025-06-17 21:37:10It can already be used for pay-to-send e-mail. The send dialog is resizable and you can enter as long of a message as you like. It's sent directly when it connects. The recipient double-clicks on the transaction to see the full message. If someone famous is getting more e-mail than they can read, but would still like to have a way for fans to contact them, they could set up Bitcoin and give out the IP address on their website. "Send X bitcoins to my priority hotline at this IP and I'll read the message personally." -- Satoshi Nakamoto, January 17, 2009
"It might make sense just to get some in case it catches on. If enough people think the same way, that becomes a self-fulfilling prophecy. Once it gets bootstrapped, there are so many applications if you could effortlessly pay a few cents to a website as easily as dropping coins in a vending machine." -- Satoshi Nakamoto, January 17, 2009
"Forgot to add the good part about micropayments. While I don't think Bitcoin is practical for smaller micropayments right now, it will eventually be as storage and bandwidth costs continue to fall. If Bitcoin catches on on a big scale, it may already be the case by that time. Another way they can become more practical is if I implement client-only mode and the number of network nodes consolidates into a smaller number of professional server farms. Whatever size micropayments you need will eventually be practical. I think in 5 or 10 years, the bandwidth and storage will seem trivial." -- Satoshi Nakamoto, August 10, 2010
"It can already be used for pay-to-send e-mail. The send dialog is resizable and you can enter as long of a message as you like. It's sent directly when it connects. The recipient double-clicks on the transaction to see the full message. If someone famous is getting more e-mail than they can read, but would still like to have a way for fans to contact them, they could set up Bitcoin and give out the IP address on their website. "Send X bitcoins to my priority hotline at this IP and I'll read the message personally." -- Satoshi Nakamoto, January 17, 2009
"It might make sense just to get some in case it catches on. If enough people think the same way, that becomes a self-fulfilling prophecy. Once it gets bootstrapped, there are so many applications if you could effortlessly pay a few cents to a website as easily as dropping coins in a vending machine." -- Satoshi Nakamoto, January 17, 2009
"Forgot to add the good part about micropayments. While I don't think Bitcoin is practical for smaller micropayments right now, it will eventually be as storage and bandwidth costs continue to fall. If Bitcoin catches on on a big scale, it may already be the case by that time. Another way they can become more practical is if I implement client-only mode and the number of network nodes consolidates into a smaller number of professional server farms. Whatever size micropayments you need will eventually be practical. I think in 5 or 10 years, the bandwidth and storage will seem trivial." -- Satoshi Nakamoto, August 10, 2010
Bitcoin Is Winning Fast AF
I began writing about using the lightning network about 150,000 blocks ago because I got tired of hearing that bitcoin can't make more than 7 transactions a minute. That was true 565,000 blocks ago, but is no longer true since the inception of the lightning network. For example:
- We sent 4,187 bitcoin payments over an 8-hour period at Bitcoin 2025, a Guinness Book of World Record winning achievement.
- Nostr is the biggest bitcoin circular economy in the world.
- Shake N Steak, a U.S.-based Hamburger franchise, accepts bitcoin over the Lightning Network at all of its locations.
- We can pay our credit cards with fractions of bitcoin (sats).
- We can use bitcoin over the lightning network to pay AI agents to do vibe coding using tools like Stacks and Goose.
- Bitcoin Helped Secure An Election In A County In Georgia.
I pay for Protonmail with bitcoin on-chain.
I can also use this email to send it to other people who do the same. I've only done this once to test it out, but it works. This is not new. The time chain uses Hashcash (with a double SHA256 algorithm instead of SHA1) for its famous proof-of-work. Hashcash was originally intended to prevent spam. Now you can use bitcoin to do the same.
I ran the numbers. Our world record is an average of 8.72 bitcoin transactions per second. This is just in one place, but bitcoin is a global monetary network. Bitcoin over the lightning network makes it possible to send value at the speed of light, anywhere in the world.
We won a world record. We are winning. We use money that we know works better than gold.
"If you don't believe me or don't get it, I don't have time to try to convince you, sorry." -- Satoshi Nakamoto
☮️ nostr:npub1marc26z8nh3xkj5rcx7ufkatvx6ueqhp5vfw9v5teq26z254renshtf3g0
Zap This Blog would like to think The Nakamoto Institute for making it easy to find these awsome Satoshi quotes. If you like this article, please Zap The Nakamoto Institute!
-
@ 9ca447d2:fbf5a36d
2025-06-18 00:02:06Trump Media and Technology Group (TMTG), the company behind Truth Social, has received approval from the U.S. Securities and Exchange Commission (SEC) regarding its plan to raise and use $2.3 billion to build a big bitcoin treasury.
TMTG’s plan was declared effective by the SEC
This is a big and controversial move by the media company tied to U.S. President Donald Trump. The plan involves converting part of its corporate assets into bitcoin—similar to what companies like Strategy have done.
TMTG filed a Form S-3 with the SEC on June 6. The form allows public companies to register securities for resale. A week later, the SEC “declared effective” the filing and TMTG can now use the money raised from previous deals to buy bitcoin.
According to the filings, the company raised $2.3 billion from the resale of about 56 million equity shares and 29 million shares of convertible notes. Almost 50 institutional investors participated in the raise.
This is “one of the largest bitcoin treasury deals for a public company,” TMTG said in a press release.
TMTG’s CEO, Devin Nunes, said this is part of a bigger plan to grow the company beyond social media and into the fintech space.
“We are quickly developing our fintech brand, social media platform, and streaming service and accumulating a Bitcoin treasury to support the Patriot Economy,” said Nunes.
The funds will be managed through TMTG’s fintech arm, Truth.Fi, and the company will store its bitcoin with its trusted custodians Crypto.com and Anchorage Digital.
Nunes also said this is a way to protect the company from financial discrimination, stating the bitcoin treasury will allow the company to defend itself “against harassment and discrimination by financial institutions.”
This seems to be more than just a business decision, and more like a political move.
Trump Media’s bitcoin push comes at a time when U.S. digital asset regulation is unclear. By moving into digital assets, TMTG signals a bold break from traditional financial norms and aligns itself with Bitcoin-friendly audiences.
American institutions are recognizing bitcoin as a safe haven asset, so maybe media and political groups will start to explore the asset further.
Trump Media isn’t stopping at a bitcoin treasury. They filed paperwork to create a spot bitcoin exchange-traded fund (ETF) called the Truth Social Bitcoin ETF. If approved, this ETF will give traditional investors another way to get exposure to bitcoin’s price.
Again, Crypto.com will be the exclusive custodian for this ETF.
One of the investors in the bitcoin treasury is Don Wilson, founder of DRW Investments. His firm put in $100 million. Some are wondering if there’s a conflict of interest since his digital asset trading firm, Cumberland, just had a case dropped by the SEC.
-
@ 0403c86a:66d3a378
2025-06-13 12:55:09Exciting news for FOOTBALL fans ⚽! Global Sports Central 🌐 is teaming up with Predyx, a leading prediction market in the Bitcoin ecosystem, to bring you comprehensive coverage of the very first Club World Cup directly on Nostr. This partnership is all about enhancing your experience with the latest news, insights, and interactive features!
The Club World Cup will showcase the best clubs from around the globe, and with our collaboration, you’ll be fully engaged in the action. Predyx focuses on long-term outcomes, allowing you to make predictions on who will win it all. Plus, if you’re not happy with your predictions, you can sell your shares at any time and switch allegiance—after all, it’s a free market!
What You Can Expect:
-
Latest News and Match Reports: Stay updated with the latest news, in-depth match reports, and insights from the tournament, ensuring you never miss a moment.
-
Market Odds Tracking: Follow the shifts in market odds in real-time, giving you the edge when making predictions and engaging with the action.
-
Player of the Day Card: Celebrate standout performances with our Daily Player of the Day card, highlighting the top players from the tournament.
-
Game oN Frontpage: Each day, we’ll feature the frontpage of the day, showcasing the most historical matchups and capturing the feel of the game.
-
Best Moments Replays: Relive the excitement with replays of the best moments from the Cup, so you can catch all the highlights and unforgettable plays.
-
Long-Term Predictions: Engage with Predyx to forecast who will win the tournament and who will take home the MVP award, allowing you to make strategic predictions as the tournament unfolds.
-
Easy Login System: Getting started is a breeze! All you need is a Lightning wallet to log in and participate, making it simple for everyone to join in on the fun.
-
Lightning-Fast Bitcoin Payments: With the Lightning Network, placing your bets and making predictions is faster and easier than ever. Enjoy seamless transactions while you cheer for your favorite teams!
"Predyx is excited to be part of this innovative partnership," said Derek. "We’re bringing fans a new way to interact with the game they love, all while using the fast and secure Lightning Network."
Predyx is a Bitcoin-native prediction market platform running on the Lightning Network. We’re building the fastest, most trust-minimized betting engine in the world — no deposits, instant payouts, sats-native, and degen-friendly.
Global Sports Central 🌐 Your daily spin around the sports world 🔄 Stay in the loop with the latest scores, stories, and stats.
GSC360 - Where Every Angle Matters
-
-
@ 95543309:196c540e
2025-06-11 14:17:03$$\int_{-\infty}^{\infty} e^{-x^2/2} \, dx = \sqrt{2\pi}$$$$\sum_{k=1}^n k^2 = \frac{n(n+1)(2n+1)}{6}$$$$\lim_{x \to \infty} \left(1 + \frac{1}{x}\right)^x = e$$$$\begin{vmatrix}a & b \\c & d\end{vmatrix} = ad - bc$$$$\frac{d}{dx}\left(\frac{x^2 + 1}{x - 1}\right)$$$$\iiint_V (\nabla \cdot \mathbf{F}) \, dV = \oint_{\partial V} \mathbf{F} \cdot d\mathbf{S}$$$$\binom{n}{k} = \frac{n!}{k!(n-k)!}$$$$\ln\left(\frac{f(x)}{g(x)}\right) = \ln f(x) - \ln g(x)$$$$\forall x \in \mathbb{R}, \exists y \in \mathbb{R} \text{ such that } x + y = 0$$$$\sqrt{\frac{x^2 + y^2}{x^2 - y^2}}$$$$\begin{array}{c|c}A & B \\hlineC & D\end{array}$$$$\sum_{i=1}^n \sum_{j=1}^n a_{ij}x_i x_j$$$$\mathcal{L}{f(t)}(s) = \int_0^\infty e^{-st}f(t)\,dt$$$$\frac{\partial^2 u}{\partial t^2} = c^2 \frac{\partial^2 u}{\partial x^2}$$$$\mathbf{A} = \begin{pmatrix}a_{11} & a_{12} \\a_{21} & a_{22}\end{pmatrix}, \quad\mathbf{B} = \begin{pmatrix}b_{11} & b_{12} \\b_{21} & b_{22}\end{pmatrix}$$$$\underbrace{a + b + \dots + z}{26}$$$$\left(\frac{a}{b}\right)^n = \frac{a^n}{b^n}$$$$\langle \psi | \phi \rangle = \int{-\infty}^{\infty} \psi^*(x)\phi(x) \, dx$$$$\oint_C \mathbf{F} \cdot d\mathbf{r} = \iint_S (\nabla \times \mathbf{F}) \cdot d\mathbf{S}$$$$\prod_{k=1}^n \left(1 + \frac{1}{k}\right) = \frac{(n+1)}{1}$$$$S(\omega)=1.466\, H_s^2 \frac{\omega_0^5}{\omega^6} \exp\Bigl[-3^{\frac{\omega}{\omega_0}}\Bigr]^2$$
-
@ c9badfea:610f861a
2025-06-10 21:43:55🤖️ AI Articles
📱 Android Articles
- 🥩 Tracking Food Intake
- ✍️ Taking Handwritten Notes
- 🕒 Tracking Habits
- 🧭 Navigating The Wild
- 📝 Organizing Notes and Tasks
- 🧠 Studying Smarter
- 💱 Tracking Fiat Currency Exchange Rates
- 🌠 Offline Planetarium
- 📥 Downloading Media From 1000+ Sites
- 🔥 Blocking Ads and Trackers
- ⛅ Getting Detailed Weather Information
- 📦 Installing Apps Directly From Source
- 🎮 Playing Retro Games
- 🖼️ Generating AI Images Locally
- 📖 Reading PDF Documents and EPUB Books
- 🔒 Storing Passwords Safely
- 🗺️ Using Offline Maps
- 🎵 Producing Music On-Device
- 💾 Writing ISO Images to USB Drives
- 💻 Coding On-Device
- 🎬 Watching and Downloading Videos from YouTube, Rumble, Odysee, Bitchute, and More
- 🔤 Upgrading the Typing Experience
- 📰 Reading RSS Feeds
- 📥 Downloading Torrents
- 📺 Watching IPTV Channels for Free
- 🔒 Easily Verifying File Checksums
- 🗣️ Offline Translator
- 🗣️ Offline Text-to-Speech Engine
- 🤖 Running LLMs Locally
- 🌐 Browsing Entire Websites Offline
- 🔐 Quickly Encrypting Files
✏️ Other Articles
-
@ 97c70a44:ad98e322
2025-06-06 20:48:33Vibe coding is taking the nostr developer community by storm. While it's all very exciting and interesting, I think it's important to pump the brakes a little - not in order to stop the vehicle, but to try to keep us from flying off the road as we approach this curve.
In this note Pablo is subtweeting something I said to him recently (although I'm sure he's heard it from other quarters as well):
nostr:nevent1qvzqqqqqqypzp75cf0tahv5z7plpdeaws7ex52nmnwgtwfr2g3m37r844evqrr6jqy2hwumn8ghj7un9d3shjtnyv9kh2uewd9hj7qghwaehxw309aex2mrp0yh8qunfd4skctnwv46z7qg6waehxw309ac8junpd45kgtnxd9shg6npvchxxmmd9uqzq0z48d4ttzzkupswnkyt5a2xfkhxl3hyavnxjujwn5k2k529aearwtecp4
There is a naive, curmudgeonly case for simply "not doing AI". I think the intuition is a good one, but the subject is obviously more complicated - not doing it, either on an individual or a collective level, is just not an option. I recently read Tools for Conviviality by Ivan Illich, which I think can help us here. For Illich, the best kind of tool is one which serves "politically interrelated individuals rather than managers".
This is obviously a core value for bitcoiners. And I think the talks given at the Oslo Freedom Forum this year present a compelling case for adoption of LLMs for the purposes of 1. using them for good, and 2. developing them further so that they don't get captured by corporations and governments. Illich calls both the telephone and print "almost ideally convivial". I would add the internet, cryptography, and LLMs to this list, because each one allows individuals to work cooperatively within communities to embody their values in their work.
But this is only half the story. Illich also points out how "the manipulative nature of institutions... have put these ideally convivial tools at the service of more [managerial dominance]."
Preventing the subversion and capture of our tools is not just a matter of who uses what, and for which ends. It also requires an awareness of the environment that the use of the tool (whether for virtuous or vicious ends) creates, which in turn forms the abilities, values, and desires of those who inhabit the environment.
The natural tendency of LLMs is to foster ignorance, dependence, and detachment from reality. This is not the fault of the tool itself, but that of humans' tendency to trade liberty for convenience. Nevertheless, the inherent values of a given tool naturally gives rise to an environment through use: the tool changes the world that the tool user lives in. This in turn indoctrinates the user into the internal logic of the tool, shaping their thinking, blinding them to the tool's influence, and neutering their ability to work in ways not endorsed by the structure of the tool-defined environment.
The result of this is that people are formed by their tools, becoming their slaves. We often talk about LLM misalignment, but the same is true of humans. Unreflective use of a tool creates people who are misaligned with their own interests. This is what I mean when I say that AI use is anti-human. I mean it in the same way that all unreflective tool use is anti-human. See Wendell Berry for an evaluation of industrial agriculture along the same lines.
What I'm not claiming is that a minority of high agency individuals can't use the technology for virtuous ends. In fact, I think that is an essential part of the solution. Tool use can be good. But tools that bring their users into dependence on complex industry and catechize their users into a particular system should be approached with extra caution. The plow was a convivial tool, and so were early tractors. Self-driving John Deere monstrosities are a straightforward extension of the earlier form of the technology, but are self-evidently an instrument of debt slavery, chemical dependency, industrial centralization, and degradation of the land. This over-extension of a given tool can occur regardless of the intentions of the user. As Illich says:
There is a form of malfunction in which growth does not yet tend toward the destruction of life, yet renders a tool antagonistic to its specific aims. Tools, in other words, have an optimal, a tolerable, and a negative range.
The initial form of a tool is almost always beneficial, because tools are made by humans for human ends. But as the scale of the tool grows, its logic gets more widely and forcibly applied. The solution to the anti-human tendencies of any technology is an understanding of scale. To prevent the overrun of the internal logic of a given tool and its creation of an environment hostile to human flourishing, we need to impose limits on scale.
Tools that require time periods or spaces or energies much beyond the order of corresponding natural scales are dysfunctional.
My problem with LLMs is:
- Not their imitation of human idioms, but their subversion of them and the resulting adoption of robotic idioms by humans
- Not the access they grant to information, but their ability to obscure accurate or relevant information
- Not their elimination of menial work, but its increase (Bullshit Jobs)
- Not their ability to take away jobs, but their ability to take away the meaning found in good work
- Not their ability to confer power to the user, but their ability to confer power to their owner which can be used to exploit the user
- Not their ability to solve problems mechanistically, but the extension of their mechanistic value system to human life
- Not their explicit promise of productivity, but the environment they implicitly create in which productivity depends on their use
- Not the conversations they are able to participate in, but the relationships they displace
All of these dysfunctions come from the over-application of the technology in evaluating and executing the fundamentally human task of living. AI work is the same kind of thing as an AI girlfriend, because work is not only for the creation of value (although that's an essential part of it), but also for the exercise of human agency in the world. In other words, tools must be tools, not masters. This is a problem of scale - when tool use is extended beyond its appropriate domain, it becomes what Illich calls a "radical monopoly" (the domination of a single paradigm over all of human life).
So the important question when dealing with any emergent technology becomes: how can we set limits such that the use of the technology is naturally confined to its appropriate scale?
Here are some considerations:
- Teach people how to use the technology well (e.g. cite sources when doing research, use context files instead of fighting the prompt, know when to ask questions rather than generate code)
- Create and use open source and self-hosted models and tools (MCP, stacks, tenex). Refuse to pay for closed or third-party hosted models and tools.
- Recognize the dependencies of the tool itself, for example GPU availability, and diversify the industrial sources to reduce fragility and dependence.
- Create models with built-in limits. The big companies have attempted this (resulting in Japanese Vikings), but the best-case effect is a top-down imposition of corporate values onto individuals. But the idea isn't inherently bad - a coding model that refuses to generate code in response to vague prompts, or which asks clarifying questions is an example. Or a home assistant that recognized childrens' voices and refuses to interact.
- Divert the productivity gains to human enrichment. Without mundane work to do, novice lawyers, coders, and accountants don't have an opportunity to hone their skills. But their learning could be subsidized by the bots in order to bring them up to a level that continues to be useful.
- Don't become a slave to the bots. Know when not to use it. Talk to real people. Write real code, poetry, novels, scripts. Do your own research. Learn by experience. Make your own stuff. Take a break from reviewing code to write some. Be independent, impossible to control. Don't underestimate the value to your soul of good work.
- Resist both monopoly and "radical monopoly". Both naturally collapse over time, but by cultivating an appreciation of the goodness of hand-crafted goods, non-synthetic entertainment, embodied relationship, and a balance between mobility and place, we can relegate new, threatening technologies to their correct role in society.
I think in all of this is implicit the idea of technological determinism, that productivity is power, and if you don't adapt you die. I reject this as an artifact of darwinism and materialism. The world is far more complex and full of grace than we think.
The idea that productivity creates wealth is, as we all know, bunk. GDP continues to go up, but ungrounded metrics don't reflect anything about the reality of human flourishing. We have to return to a qualitative understanding of life as whole, and contextualize quantitative tools and metrics within that framework.
Finally, don't believe the hype. Even if AI delivers everything it promises, conservatism in changing our ways of life will decelerate the rate of change society is subjected to and allow time for reflection and proper use of the tool. Curmudgeons are as valuable as technologists. There will be no jobspocalypse if there is sufficient political will to value human good over mere productivity. It's ok to pump the breaks.
-
@ 4c96d763:80c3ee30
2025-06-17 20:20:24Changes
Fernando López Guevara (2):
- fix: skip blurring for user's own images
- fix(search): make input background gray in light mode
William Casarin (24):
- clippy: fix large enum.
- clippy: fix large enum.
- scroll: simple fix
- note: cleanup wide/standard implementation
- android: hover post button when narrow
- fix note response regression
- nix: emulator
- log: less verbose unknown id logging
- chrome: collapsible side panel
- dave: small cleanup
- dave: add chrome toggle button
- chrome: extract method to function
- chrome: extract more non-methods
- Initial tab bar
- chrome: hook up toolbar actions
- toolbar: process actions
- nix: add $ANDROID_JAR helper to shell
- add input context menu helper
- thread: enable selectable text in threads
- universe: add full tabs
- android: fix build
- dave: initial android fixes
- android: arboard clipboard support
- android: add initial ci
alltheseas (1):
- Update README.md with deepwiki badge (#875)
kernelkind (1):
- bugfix: txn failed
pushed to notedeck:refs/heads/master
-
@ dfa02707:41ca50e3
2025-06-17 19:01:50Contribute to keep No Bullshit Bitcoin news going.
-
Version 1.3 of Bitcoin Safe introduces a redesigned interactive chart, quick receive feature, updated icons, a mempool preview window, support for Child Pays For Parent (CPFP) and testnet4, preconfigured testnet demo wallets, as well as various bug fixes and improvements.
-
Upcoming updates for Bitcoin Safe include Compact Block Filters.
"Compact Block Filters increase the network privacy dramatically, since you're not asking an electrum server to give you your transactions. They are a little slower than electrum servers. For a savings wallet like Bitcoin Safe this should be OK," writes the project's developer Andreas Griffin.
- Learn more about the current and upcoming features of Bitcoin Safe wallet here.
What's new in v1.3
- Redesign of Chart, Quick Receive, Icons, and Mempool Preview (by @design-rrr).
- Interactive chart. Clicking on it now jumps to transaction, and selected transactions are now highlighted.
- Speed up transactions with Child Pays For Parent (CPFP).
- BDK 1.2 (upgraded from 0.32).
- Testnet4 support.
- Preconfigured Testnet demo wallets.
- Cluster unconfirmed transactions so that parents/children are next to each other.
- Customizable columns for all tables (optional view: Txid, Address index, and more)
- Bug fixes and other improvements.
Announcement / Archive
Blog Post / Archive
GitHub Repo
Website -
-
@ 31a4605e:cf043959
2025-06-17 18:02:14A história do Bitcoin é pontuada por marcos simbólicos que representam não apenas a evolução técnica da moeda digital, mas também sua trajetória rumo à legitimidade econômica e política. Neste artigo, revisitamos alguns dos momentos mais emblemáticos que marcaram a adoção do Bitcoin, desde seu uso inicial em uma simples transação até o seu reconhecimento como moeda oficial por nações soberanas.
A pizza mais cara da história
Em 22 de maio de 2010, Laszlo Hanyecz fez história ao pagar 10.000 BTC por duas pizzas. Na época, essa quantia equivalia a cerca de 40 dólares. Hoje, essas mesmas moedas valeriam centenas de milhões de dólares, tornando essa a refeição mais cara já registrada. Mais do que uma curiosidade, essa transação marcou a primeira vez em que o Bitcoin foi usado em uma troca comercial real, comprovando seu potencial como meio de pagamento.
Silk Road e o lado obscuro da adoção inicial
Ainda que controverso, o uso do Bitcoin no marketplace Silk Road mostrou ao mundo que a moeda digital era funcional como meio de troca em larga escala. A plataforma operou entre 2011 e 2013 e foi um catalisador para o desenvolvimento de infraestrutura em torno do BTC, apesar dos impactos negativos na imagem da criptomoeda.
Mt. Gox e a primeira grande crise
Em 2014, a corretora Mt. Gox, responsável por cerca de 70% das transações de Bitcoin no mundo, declarou falência após perder cerca de 850 mil BTC. O escândalo abalou a confiança no ecossistema, mas também deu início a um movimento de amadurecimento: a busca por melhores práticas de segurança, regulação e profissionalização do setor.
El Salvador e o reconhecimento oficial
Em setembro de 2021, El Salvador tornou-se o primeiro país a reconhecer o Bitcoin como moeda de curso legal. A medida, defendida pelo presidente Nayib Bukele, foi recebida com entusiasmo por entusiastas e com ceticismo por instituições financeiras internacionais. O experimento salvadorenho colocou o Bitcoin no centro do debate geopolítico e abriu precedentes para outras nações considerarem o mesmo caminho.
Resumindo, cada um desses momentos representa uma etapa distinta na evolução do Bitcoin: da experimentação à adoção institucional. Ao revisitarmos esses casos emblemáticos, conseguimos entender não apenas como o Bitcoin evoluiu tecnicamente, mas também como sua narrativa se consolidou como parte da história financeira contemporânea. Se a compra da pizza simbolizou o nascimento prático do BTC, o reconhecimento oficial por nações inteiras sugere um futuro em que a moeda digital pode ser protagonista em novas formas de organização econômica global.
Muito obrigado por teres lido o texto até aqui, espero que esteja tudo bem contigo e um abraço enorme do teu madeirense bitcoiner maximalista favorito. Viva a liberdade!
-
@ 31a4605e:cf043959
2025-06-17 15:58:20O Bitcoin é uma nova forma de dinheiro digital, oferecendo liberdade financeira e acesso a uma economia global sem intermediários comuns. Para usar essa tecnologia, é importante saber como comprar, guardar e utilizá-la de forma segura e eficiente. Este guia cobre as principais etapas e práticas para incorporar o Bitcoin no dia a dia, ressaltando as melhores formas de proteger seus ativos e tirar o máximo proveito deles.
Comprar Bitcoin é o primeiro passo para participar da sua rede descentralizada. Existem várias maneiras de obter Bitcoin, dependendo das preferências e necessidades individuais.
Plataformas de corretoras (exchanges):
Funcionamento: as exchanges são plataformas online que permitem comprar Bitcoin usando moedas tradicionais, como dólar, euro ou real.
Processo: crie uma conta, complete a verificação de identidade (processo KYC) e deposite fundos para iniciar as negociações.
Dicas: escolha exchanges confiáveis, com boa reputação e segurança sólida.
Caixas eletrônicos de Bitcoin:
Funcionamento: alguns caixas eletrônicos permitem a compra de Bitcoin com dinheiro ou cartão de crédito.
Uso: insira o valor desejado, escaneie sua carteira digital e receba os Bitcoins imediatamente.
Compra Peer-to-Peer (P2P):
Funcionamento: plataformas P2P conectam compradores e vendedores diretamente, permitindo a negociação de termos específicos.
Dicas: confira a reputação do vendedor e utilize plataformas que oferecem garantias ou serviços de custódia.
A segurança é fundamental ao manusear Bitcoin. O armazenamento correto protege seus fundos contra perdas, hackers e acessos não autorizados.
Carteiras digitais:
Definição: uma carteira digital é um software ou dispositivo físico que guarda as chaves privadas necessárias para acessar seus Bitcoins.
Tipos de carteiras:
Carteiras quentes (hot wallets): conectadas à internet, são adequadas para uso frequente, mas mais suscetíveis a ataques. Exemplos são aplicativos móveis e carteiras online.
Carteiras frias (cold wallets): mantêm Bitcoin offline, sendo mais seguras para grandes quantidades. Exemplos incluem carteiras de hardware e de papel.
Carteiras de hardware:
Funcionamento: dispositivos físicos, como Ledger ou Trezor, que guardam suas chaves privadas offline.
Vantagens: segurança alta contra ataques digitais e fácil transporte.
Carteiras de papel:
Funcionamento: envolve imprimir ou anotar as chaves privadas em um pedaço de papel.
Cuidados: armazene em locais seguros, protegidos contra umidade, fogo e acessos não autorizados.
Backup e recuperação:
Boa prática: realize backups regulares de sua carteira e anote sua frase de recuperação (seed phrase) em um local seguro.
Atenção: nunca compartilhe sua frase de recuperação ou chave privada com ninguém.
O uso do Bitcoin vai além do investimento. Ele pode ser empregado para transações diárias, compras e transferência de valor de forma eficiente.
Transações:
Como enviar Bitcoin: informe o endereço do destinatário, o valor a ser enviado e confirme a transação em sua carteira.
Custos: as taxas de transação são pagas aos mineradores e podem mudar conforme a demanda da rede.
Compras de bens e serviços:
Comércios que aceitam Bitcoin: muitos negócios, tanto físicos quanto online, aceitam Bitcoin como forma de pagamento. Confira se o comerciante exibe o logotipo do Bitcoin ou consulte listas atualizadas de lugares que aceitam a moeda.
Uso prático: escaneie o código QR do vendedor e envie o pagamento diretamente da sua carteira.
Transferências internacionais: o Bitcoin permite transferências globais rápidas, com taxas geralmente menores do que as cobradas por bancos ou serviços de remessas comuns.
Pagamento de contas: em alguns países, já é possível pagar contas de serviços e impostos com Bitcoin, dependendo da infraestrutura local.
Dicas para usar Bitcoin com segurança
Escolha carteiras e serviços confiáveis:
Use apenas carteiras e exchanges renomadas e com boa reputação no mercado.
Ative a autenticação em dois fatores (2FA):
Sempre que possível, ligue o 2FA para proteger sua conta em exchanges e serviços online.
Evite deixar fundos em exchanges:
Após comprar Bitcoin em uma exchange, transfira o saldo para uma carteira sob seu controle. Isso diminui o risco de perdas por causa de hacks.
Eduque-se:
Entender os conceitos básicos de Bitcoin e segurança digital é fundamental para evitar erros e fraudes.
Resumindo, comprar, guardar e usar Bitcoin pode parecer complicado no começo, mas, com o tempo, passa a ser uma atividade simples e acessível. Ao seguir as melhores práticas de segurança e conhecer as funcionalidades básicas, qualquer um pode tirar proveito dessa tecnologia inovadora.
O Bitcoin não é apenas uma opção financeira; é uma ferramenta poderosa que favorece a liberdade econômica e o acesso a uma economia global. Com o conhecimento certo, você pode incorporar o Bitcoin à sua vida de maneira segura e eficiente.
Muito obrigado por teres lido o texto até aqui, espero que esteja tudo bem contigo e um abraço enorme do teu madeirense bitcoiner maximalista favorito. Viva a liberdade!
-
@ 3eab247c:1d80aeed
2025-06-05 08:51:39Global Metrics
Here are the top stats from the last period:
- Total Bitcoin-accepting merchants: 15,306 → 16,284
- Recently verified (1y): 7,540 → 7,803 (the rest of our dataset is slowly rotting; help us before it's too late!)
- Avg. days since last verification: 398 → 405 (more mappers, please)
- Merchants boosted: 22 (for a total of 4,325 days, someone is feeling generous)
- Comments posted: 34
Find current stats over at the 👉 BTC Map Dashboard.
Merchant Adoption
Steak n’ Shake
The US 🇺🇸 is a massive country, yet its BTC Map footprint has been lagging relative to other countries ... that is until now!
In what came as a nice surprise to our Shadowy Supertaggers 🫠, the Steak ’n Shake chain began accepting Bitcoin payments across hundreds of its locations nationwide (with some international locations too).
According to CoinDesk, the rollout has been smooth, with users reporting seamless transactions powered by Speed.
This marks a significant step towards broader Bitcoin adoption in the US. Now to drop the capital gains tax on cheesburgers!
SPAR Switzerland
In other chain/franchise adoption news, the first SPAR supermarket in Switzerland 🇨🇭 to begin accepting Bitcoin was this one in Zug. It was quickly followed by this one in Rossrüti and this one in Kreuzlingen, in what is believed to be part of a wider roll-out plan within the country powered by DFX's Open CryptoPay.
That said, we believe the OG SPAR crown goes to SPAR City in Arnhem Bitcoin City!
New Features
Merchant Comments in the Web App
Web App users are now on par with Android users in that they can both see and make comments on merchants.
This is powered by our tweaked API that enables anyone to make a comment as long as they pass the satswall fee of 500 sats. This helps keep spam manageable and ensure quality comments.
And just in case you were wondering what the number count was on the merchant pins - yep, they're comments!
Here is an 👉 Example merchant page with comments.
Merchant Page Design Tweaks
To support the now trio of actions (Verify, Boost & Comment) on the merchant page, we've re-jigged the design a little to make things a little clearer.
What do you think?
Technical
Codebase Refactoring
Thanks to Hannes’s contributions, we’ve made progress in cleaning-up the Web App's codebase and completing long overdue maintenance. Whilst often thankless tasks, these caretaking activities help immensely with long-term maintainability enabling us to confidently build new features.
Auth System Upgrades
The old auth system was held together with duct tape and prayers, and we’re working on a more robust authentication system to support future public API access. Updates include:
- Password hashing
- Bearer token support
- Improved security practices
More enhancements are in progress and we'll update you in the next blog post.
Better API Documentation
Instead of relying on tribal knowledge, we're finally getting around to writing actual docs (with the help/hindrance of LLMs). The "move fast, break everything" era is over; now we move slightly slower and break slightly less. Progress!
Database Improvements
We use SQLite, which works well but it requires careful handling in async Rust environments. So now we're untangling this mess to avoid accidental blocking queries (and the ensuing dumpster fires).
Backup System Enhancements
BTC Map data comes in three layers of fragility:
- Merchants (backed up by OS - the big boys handle this)
- Non-OSM stuff (areas, users, etc. - currently stored on a napkin)
- External systems (Lightning node, submission tickets - pray to Satoshi)
We're now forcing two core members to backup everything, because redundancy is good.
Credits
Thanks to everyone who directly contributed to the project this period:
- Comino
- descubrebitcoin
- Hannes
- Igor Bubelov
- Nathan Day
- Rockedf
- Saunter
- SiriusBig
- vv01f
Support Us
There are many ways in which you can support us:
-
Become a Shadowy Supertagger and help maintain your local area or pitch-in with the never-ending global effort.
-
Consider a zapping this note or make a donation to the to the project here.
-
@ 5d4b6c8d:8a1c1ee3
2025-06-17 22:10:10https://youtu.be/KwzHW-c5h7M
This video's great and it includes interviews with Stan van Gundy and Shane Battier about how offensive and officiating changes have forced defenses to fundamentally change.
There's also some early discussion, centered on a clip of Rick Barry complaining about officiating, about how much better it would be if they would actually call travelling, carrying, and moving screens. I can't for the life of me understand why they don't call these things. The game would look so much better.
https://stacker.news/items/1008918
-
@ cae03c48:2a7d6671
2025-06-17 22:02:38Bitcoin Magazine
Senator Hagerty’s Vision Beyond The GENIUS Act: Make Tennessee A Hub For Bitcoin MiningSenator Bill Hagerty (R-TN) has been in the headlines as of late as the GENIUS Act (S. 1582), a bill for which he was the primary sponsor, moves closer to passing in the U.S. Senate.
The GENIUS Act is a bill that, if enacted into law, would create a federal regulatory framework for stablecoins so that the technology can be more widely adopted. (While some Bitcoin enthusiasts may not like this, they should still pay attention to the language in the bill, as it could have an impact on U.S. citizens’ ability to use Bitcoin wallets privately.)
However, stablecoins aren’t the only thing on Senator Hagerty’s mind.
He’s also thinking about how to best produce and harness energy in Tennessee to use it for Bitcoin mining and AI compute.
He shared his vision on this topic with me in an interview I conducted with him at Bitcoin 2025:
Tennessee As A Hub For Bitcoin Mining and AI Compute
“We have an opportunity before us to be in the very lead,” Senator Hagerty told Bitcoin Magazine in regard to building nuclear facilities that can be used to produce energy for Bitcoin mining and AI processing.
“The largest utility in the world is the Tennessee Valley Authority — certainly the largest one in America — and I think we’ve got a unique opportunity here to move forward and become the energy hub of America,” he added.
“[We should] see more and more not only mining operations, but if you think about what Elon Musk is doing in Memphis with xAI, the data centers, the opportunities with artificial intelligence — there are many, many things that are going to happen in Tennessee.”
The Senator added that he believes the state can also strike partnerships with Oak Ridge National Laboratory, Vanderbilt University, the University of Tennessee and Tennessee Tech as it works to become a more friendly destination for Bitcoin miners and data centers.
“We’ve got great opportunities [from] Memphis all the way across the state,” said Senator Hagerty.
Hagerty’s Call For Bipartisanship
Whether it’s working toward stablecoin legislation or crafting regulation that will enable industries like Bitcoin mining and data centers to thrive in the United States, Senator Hagerty believes these efforts should be inherently bipartisan.
“[These are] bipartisan — or nonpartisan issue[s] — frankly,” said the Senator.
“If you care about the competitiveness of America — if you want to see innovation happen on our shores rather than being pushed overseas — then you’re going to support what we’re trying to do in terms of putting a regulatory framework in place that will deliver certainty, that will create an ecosystem here in America that will allow these companies to thrive,” he added.
“It’s not just the stablecoin legislation I’m putting forward or what may happen with Bitcoin or other technologies like that. It’s the overall blockchain technology that’s going to help advance America beyond the 21st century. We need to stay in the lead. We can stay in the lead.”
This post Senator Hagerty’s Vision Beyond The GENIUS Act: Make Tennessee A Hub For Bitcoin Mining first appeared on Bitcoin Magazine and is written by Frank Corva.
-
@ 31a4605e:cf043959
2025-06-17 15:47:27O Bitcoin é amplamente reconhecido como a primeira e mais importante inovação no campo das moedas digitais. Criado por Satoshi Nakamoto em 2009, ele estabeleceu as bases para um sistema financeiro descentralizado. Desde então, surgiram milhares de outras moedas digitais, muitas vezes referidas como criptomoedas ou até mesmo "shitcoins" por críticos que apontam sua volatilidade, falta de utilidade clara ou centralização. Essa comparação entre o Bitcoin e outras criptomoedas é essencial para entender os valores exclusivos que o Bitcoin representa.
O Bitcoin foi criado para ser uma alternativa ao sistema financeiro tradicional. Sua missão central é fornecer uma moeda descentralizada, resistente à censura e livre de intermediários como bancos ou governos.
Por outro lado, a maioria das outras criptomoedas/shitcoins surgiu com diferentes objetivos, que vão desde experimentos tecnológicos até planos de enriquecimento rápido. Muitas dessas moedas não têm a mesma descentralização e segurança do Bitcoin, sendo frequentemente geridas por equipes ou organizações centralizadas, o que as torna mais suscetíveis à manipulação e falhas de segurança.
Descentralização e segurança
Bitcoin: a rede Bitcoin é suportada por milhares de nós espalhados pelo mundo, garantindo verdadeira descentralização.
Seu algoritmo de consenso, Proof of Work (PoW), é amplamente testado e proporciona altos níveis de segurança contra ataques.
Não há controle centralizado, o que significa que nenhuma entidade pode alterar suas regras fundamentais.
Outras criptomoedas/shitcoins
Praticamente todas sacrificam descentralização em troca de velocidade ou funcionalidades adicionais.
Algumas utilizam mecanismos de consenso alternativos, como Proof of Stake (PoS), que, embora sejam mais eficientes em termos energéticos, são frequentemente criticados por favorecer a centralização e oferecer menor segurança.
Em muitos casos, há equipes de desenvolvimento centralizadas que podem modificar o código, criar mais unidades da moeda ou até encerrar o projeto, comprometendo a confiança dos usuários.
Oferta e escassez
Bitcoin: o Bitcoin tem uma quantidade limitada de 21 milhões de unidades, garantindo sua escassez.
Essa característica, junto com a crescente demanda, posiciona o Bitcoin como uma reserva de valor confiável, frequentemente comparado ao ouro digital.
Outras criptomoedas/shitcoins
Muitas não têm limites claros em sua oferta, resultando em inflação descontrolada.
Algumas “moedas” são intencionalmente inflacionárias, o que pode reduzir seu valor com o tempo.
Em muitos casos, essas “moedas” são pré-mineradas ou distribuídas de maneira desigual, favorecendo os criadores em detrimento da comunidade.
Finalidade e utilidade
Bitcoin: o Bitcoin é, acima de tudo, uma forma de dinheiro digital e reserva de valor.
Sua rede é confiável e simples, com o foco principal em ser um meio de troca e proteção contra a inflação.
Sua solidez o torna ideal para transações e armazenamento de valor a longo prazo.
Outras criptomoedas/shitcoins
Muitas shitcoins são apresentadas como soluções para casos específicos, como contratos inteligentes, jogos ou finanças descentralizadas.
Apesar de promessas ousadas, muitos falham em oferecer utilidade real ou em competir com soluções centralizadas já existentes.
Há um número considerável de projetos que não têm uma proposta clara e acabam sendo abandonados após um tempo de especulação.
Volatilidade e reputação
Bitcoin: embora o Bitcoin seja instável, ele é amplamente aceito como o padrão-ouro das moedas digitais.
Sua imagem foi construída ao longo de mais de dez anos de operação confiável e segurança comprovada.
Outras criptomoedas/shitcoins
Muitas shitcoins enfrentam alta volatilidade, frequentemente impulsionada por especulação ou manipulação de mercado.
A falta de clareza e as práticas duvidosas de alguns projetos prejudicam a imagem do setor como um todo.
Resistência à censura
Bitcoin: devido à sua descentralização e segurança, o Bitcoin é muito resistente à censura. Qualquer pessoa com acesso à internet pode participar da rede e fazer transações.
Outras criptomoedas/shitcoins
Muitas "shitcoins" dependem de estruturas centralizadas ou têm líderes identificáveis que podem ser pressionados por governos ou outros atores para censurar transações.
Resumindo, o Bitcoin continua sendo o líder indiscutível no mundo das moedas digitais devido à sua descentralização, segurança e escassez comprovada. Ele é um sistema feito para durar, oferecendo liberdade financeira e proteção contra a inflação.
Enquanto isso, muitas criptomoedas ou shitcoins não conseguem atingir os mesmos padrões de segurança e confiança, frequentemente priorizando velocidade, funções extras ou lucros especulativos rápidos. Para investidores e usuários, é importante distinguir entre o Bitcoin e os vários projetos alternativos, muitos dos quais podem não resistir ao teste do tempo.
O Bitcoin não só iniciou uma revolução financeira, mas continua sendo o padrão pelo qual todas as outras moedas digitais são medidas.
Muito obrigado por teres lido o texto até aqui, espero que esteja tudo bem contigo e um abraço enorme do teu madeirense bitcoiner maximalista favorito. Viva a liberdade!
-
@ a10260a2:caa23e3e
2025-06-17 20:58:09If you're like me, you're bullish on privacy-preserving, reusable payment codes. BOLT 12 and Silent Payments are making it happen for Lightning and on-chain payments, respectively. I hope to update this table over time as more wallets support these two protocols.
| | Phoenix | Cake Wallet | Strike | Coinos | | --- | --- | --- | --- | --- | | BOLT 12 (Send) | ✓ | ✗ | ✓ | ✓ | | BOLT12 (Receive) | ✓ | ✗ | ✗ | ✓ | | Silent Payment (Send) | ✗ | ✓ | ✗ | ✗ | | Silent Payment (Receive) | ✗ | ✓ | ✗ | ✗ | | BIP 353 | ✓ | ✓ | ✗ | ✗ |
Resources: * What is BOLT 12? | Bolt12.org * Human readable addresses | Bitcoin Design * Setting up a Bitcoin username | Seth For Privacy
-
@ 9ca447d2:fbf5a36d
2025-06-17 21:01:35Japanese investment firm Metaplanet has announced a massive $5.4 billion plan to increase its bitcoin holdings to 210,000 BTC by the end of 2027 — that’s about 1% of the total bitcoin supply.
Metaplanet on X
The Tokyo-listed company is accelerating its already aggressive bitcoin plan, with CEO Simon Gerovich calling the initiative “Asia’s largest-ever equity raise to buy Bitcoin — again!”
The company’s new capital raise, called the “555 Million Plan”, involves issuing 555 million shares through moving strike warrants. That’s basically a type of option where people can buy shares later, and the price they pay depends on the stock’s price at that time.
So with moving strike warrants, the price at which people can buy the stock goes up or down depending on how the company’s stock is doing. It gives investors more flexibility — and it can make the warrants more attractive — because they don’t get stuck with a bad deal if the stock price drops.
This way the company can raise capital gradually over the next 2 years without impacting the stock market and existing shareholders.
The funds raised will be used to buy bitcoin, with some to redeem bonds and other income-generating strategies like selling put options.
This is a big step up from Metaplanet’s previous targets. Initially aiming to reach 10,000 BTC by the end of 2025, the company now plans to reach:
- 30,000 BTC by end of 2025
- 100,000 BTC by end of 2026
- 210,000 BTC by end of 2027
The Japanese investment firm hopes to be in the “Bitcoin 1% club” which means holding at least 1% of the total 21 million bitcoin supply.
Metaplanet bitcoin targets
Metaplanet is already making good progress. As of June 2025, the company holds 8,888 BTC, acquired at a cost of about ¥122.2 billion (around $849 million) and has already reached 89% of its original 10,000 BTC target for 2025.
This comes after the success of the company’s previous “210 Million Plan” which raised ¥93.3 billion ($650 million) in 60 trading days by issuing 210 million shares.
During that time, the company’s bitcoin holdings grew from 1,762 BTC to 7,800 BTC and the BTC Yield (a key performance metric showing growth in bitcoin per share) increased by 189%.
Year to date the BTC Yield is 225.4%.
Metaplanet’s BTC Yield graph
The stock has reflected this momentum, up 275% since early 2025 and 1,619% over the past year.
Metaplanet’s stock price chart — TradingView
Metaplanet is now one of the most actively traded stocks in Japan and has become a top-ten corporate bitcoin holder globally, recently surpassing Block Inc., the company founded by Jack Dorsey.
Metaplanet sees this as part of a bigger shift in capital markets.
By being a “bitcoin treasury vehicle” listed on the Tokyo Stock Exchange, it aims to offer investors exposure to bitcoin through regulated equity markets. This is especially useful in Japan where retail investors are often restricted from accessing bitcoin directly.
“Bitcoin is repricing the global cost of capital,” the company said in a statement. “Through our 555 Million Plan, Metaplanet is doubling down on a high-conviction, equity-driven capital markets strategy to accelerate our Bitcoin accumulation trajectory.”
-
@ 31a4605e:cf043959
2025-06-17 15:44:41O Bitcoin tem se destacado como uma opção moderna para reserva de valor, frequentemente comparado a bens tradicionais como o ouro. Sua habilidade de resistir à inflação, junto com características como escassez, descentralização e segurança, o coloca como uma ferramenta promissora para preservar riqueza em tempos de incerteza econômica.
Uma reserva de valor é um ativo que mantém seu poder de compra ao longo do tempo, protegendo o patrimônio contra desvalorização. Historicamente, ativos como ouro e imóveis desempenharam esse papel, pois são relativamente escassos e têm demanda constante.
No entanto, moedas fiduciárias têm se mostrado menos eficientes como reserva de valor devido à inflação. Governos e bancos centrais frequentemente aumentam a oferta de dinheiro, o que pode diminuir o poder de compra das moedas. É nesse cenário que o Bitcoin se destaca como uma alternativa.
Bitcoin: escassez programada
A principal característica que torna o Bitcoin uma possível reserva de valor é sua oferta limitada. Apenas 21 milhões de bitcoins serão criados, um teto estabelecido em seu código. Essa escassez programada contrasta com as moedas fiduciárias, que podem ser emitidas sem limites por governos, resultando em inflação.
O processo de criação do Bitcoin também é controlado por eventos conhecidos como halvings, que cortam pela metade a recompensa por bloco minerado aproximadamente a cada quatro anos. Isso faz com que o Bitcoin se torne cada vez mais raro ao longo do tempo, aumentando seu potencial de valorização.
O Bitcoin oferece uma solução para o problema da inflação, pois sua oferta fixa evita que governos ou instituições centralizadas manipulem sua quantidade.
Descentralização e imutabilidade: por operar em uma rede descentralizada, o Bitcoin é imune a decisões políticas ou intervenções de bancos centrais. Nenhuma autoridade pode mudar o protocolo para "imprimir" mais bitcoins.
Transparência no suprimento: todas as transações e criações de novos bitcoins estão registradas no blockchain ou timechain, garantindo total transparência.
Proteção de poder de compra: com a oferta limitada e a crescente demanda, o Bitcoin tem mostrado tendência de valorização ao longo dos anos, funcionando como um hedge (proteção) contra a inflação em várias economias.
O Bitcoin é frequentemente chamado de "ouro digital" devido a suas semelhanças com o metal precioso como reserva de valor: Escassez: O ouro é limitado na natureza, enquanto o Bitcoin tem um suprimento máximo programado de 21 milhões de unidades.
Portabilidade: o Bitcoin é mais fácil de transferir e armazenar do que o ouro, sendo acessível digitalmente em qualquer lugar do mundo.
Divisibilidade: cada bitcoin pode ser dividido em até 100 milhões de unidades chamadas satoshis, permitindo transações de qualquer valor.
Segurança: enquanto o ouro exige armazenamento físico e está sujeito a roubo, o Bitcoin pode ser guardado em carteiras digitais seguras.
Essas qualidades fazem do Bitcoin uma opção mais flexível e acessível como forma de guardar valor em um mundo cada vez mais digital.
Apesar de sua promessa, o Bitcoin ainda enfrenta barreiras para ser aceito amplamente como reserva de valor:
Volatilidade: o valor do Bitcoin historicamente tem apresentado grandes variações, o que pode desestimular investidores que desejam segurança. Contudo, muitos acreditam que, com o aumento da aceitação, a volatilidade tende a diminuir.
Regulação: alguns governos têm implementado ações para restringir ou regular o uso do Bitcoin, o que pode impactar sua aceitação como reserva de valor.
Adaptação cultural: como um ativo novo e digital, o Bitcoin ainda precisa ganhar a confiança de pessoas que estão acostumadas a formas de valor físicas, como o ouro.
O Bitcoin tem se destacado como uma opção de guarda de valor particularmente útil em economias que enfrentam crises financeiras ou hiperinflação. Países como Venezuela, Argentina e Zimbábue, que passaram por uma queda acentuada de suas moedas, viram um crescimento na adoção do Bitcoin como maneira de proteger o poder de compra.
Além disso, sua acessibilidade mundial permite que pessoas em países sem fácil acesso a mercados financeiros tradicionais utilizem o Bitcoin como uma alternativa.
Resumindo, o Bitcoin possui características distintas que o fazem um candidato promissor como reserva de valor em um mundo cada vez mais digital e afetado pela inflação das moedas comuns. Sua escassez programada, resistência à manipulação e acessibilidade global oferecem uma solução moderna para conservar riqueza.
Embora dificuldades como volatilidade e regulação ainda precisem ser superadas, o Bitcoin já se mostrou uma ferramenta eficaz para proteger ativos, especialmente em contextos de instabilidade econômica. Com o tempo e um aumento na aceitação, o Bitcoin pode se consolidar como um dos principais ativos de reserva de valor no século XXI.
Muito obrigado por teres lido o texto até aqui, espero que esteja tudo bem contigo e um abraço enorme do teu madeirense bitcoiner maximalista favorito. Viva a liberdade!
-
@ 31a4605e:cf043959
2025-06-17 15:40:23No sistema Bitcoin, a proteção e a posse dos fundos são asseguradas por um modelo criptográfico que usa chaves privadas e públicas. Esses componentes são fundamentais para a segurança digital, permitindo que os usuários administrem e protejam seus ativos de maneira descentralizada. Esse processo elimina a necessidade de intermediários, assegurando que somente o legítimo proprietário tenha acesso ao saldo vinculado a um endereço específico na blockchain ou timechain.
Chaves privadas e públicas são partes de um sistema de criptografia assimétrica, onde dois códigos distintos, mas matematicamente ligados, são utilizados para garantir a segurança e a veracidade das transações.
Chave Privada = É um código secreto, normalmente apresentado como uma longa sequência de números e letras.
Funciona como uma senha que dá ao proprietário o controle sobre os bitcoins ligados a um endereço específico.
Deve ser mantida em total sigilo, pois qualquer pessoa que a tenha pode movimentar os fundos correspondentes.
Chave Pública = É matematicamente derivada da chave privada, mas não permite que a chave privada seja descoberta.
Funciona como um endereço digital, semelhante a um número de conta bancária, podendo ser compartilhada livremente para receber pagamentos.
Serve para confirmar a autenticidade das assinaturas geradas com a chave privada.
Juntas, essas chaves asseguram que as transações sejam seguras e verificáveis, dispensando a necessidade de intermediários.
O funcionamento das chaves privadas e públicas baseia-se na criptografia de curva elíptica. Quando um usuário quer enviar bitcoins, ele usa sua chave privada para assinar digitalmente a transação. Essa assinatura é exclusiva para cada operação e demonstra que o remetente possui a chave privada relacionada ao endereço de envio.
Os nós da rede Bitcoin checam essa assinatura utilizando a chave pública correspondente, garantindo que:
A assinatura é válida.
A transação não foi alterada desde que foi assinada.
O remetente tem a propriedade legítima dos fundos.
Se a assinatura for aceita, a transação é registrada na blockchain ou timechain e se torna irreversível. Esse procedimento protege os fundos contra fraudes e gastos duplicados.
A segurança das chaves privadas é um dos pontos mais importantes do sistema Bitcoin. Perder essa chave significa perder permanentemente o acesso aos fundos, pois não há nenhuma autoridade central capaz de recuperá-la.
Boas práticas para proteger a chave privada incluem:
Armazenamento offline: longe de redes conectadas à internet, diminuindo o risco de ataques cibernéticos.
Carteiras de hardware: dispositivos físicos dedicados para armazenar chaves privadas de forma segura.
Backup e redundância: manter cópias de segurança em locais seguros e distintos.
Criptografia adicional: proteger arquivos digitais que contêm chaves privadas com senhas fortes e criptografia.
Ameaças comuns incluem:
Phishing e malware: ataques que tentam enganar os usuários para obter acesso às chaves.
Roubo físico: no caso de chaves guardadas em dispositivos físicos.
Perda de senhas e backups: que pode resultar na perda definitiva dos fundos.
O uso de chaves privadas e públicas dá ao proprietário controle total sobre seus fundos, eliminando intermediários como bancos ou governos. Esse modelo coloca a responsabilidade de proteção nas mãos do usuário, o que representa tanto liberdade quanto risco.
Diferente de sistemas financeiros tradicionais, onde instituições podem reverter transações ou congelar contas, no sistema Bitcoin, a posse da chave privada é a única prova de propriedade. Esse princípio é frequentemente resumido pela frase: "Not your keys, not your coins" (Se não são suas chaves, não são suas moedas).
Essa abordagem fortalece a soberania financeira, permitindo que indivíduos guardem e movam valor de maneira independente e sem censura.
Apesar de sua segurança, o sistema de chaves também apresenta riscos. Se uma chave privada for perdida ou esquecida, não existe como recuperar os fundos associados. Isso já levou à perda de milhões de bitcoins ao longo dos anos.
Para reduzir esse risco, muitos usuários utilizam frases-semente (seed phrases), que são uma lista de palavras usadas para restaurar carteiras e chaves privadas. Essas frases devem ser guardadas com o mesmo cuidado, pois também podem ser usadas para acessar os fundos.
Resumindo, as chaves privadas e públicas são a base da segurança e da propriedade no sistema Bitcoin. Elas asseguram que somente os verdadeiros proprietários possam mover seus fundos, promovendo um sistema financeiro descentralizado, seguro e resistente à censura.
No entanto, essa liberdade acarreta grandes responsabilidades, exigindo que os usuários adotem práticas severas para proteger suas chaves privadas. A perda ou comprometimento dessas chaves pode levar a consequências irreversíveis, ressaltando a importância de educação e preparação ao usar o sistema Bitcoin.
Assim, o modelo de chaves criptográficas não apenas melhora a segurança, mas também representa a essência da independência financeira proporcionada pelo Bitcoin.
Muito obrigado por teres lido o texto até aqui, espero que esteja tudo bem contigo e um abraço enorme do teu madeirense bitcoiner maximalista favorito. Viva a liberdade!
-
@ afe67e17:51316efb
2025-06-17 20:08:48La lingvo kaj ĝia potenco
La nuna lingvo de diplomatio ne devas esti la lingvo de agresema predanto kiel Usono de Usono nek iu ajn alia neŭtrala nacio.
Ĝis hodiaŭ ne estas neŭtralaj nacioj en la planedo kaj tial ne unu sola denaska lingvo ni ideala por diplomatio.
Esperanto estas la plej bona disponebla eblo, moderna kaj riĉa.
Batalu reen por unueco kaj libereco.
Kiel?
Facila, rigardu, kiel ili dividas vin
*1. Per Lingvo:*
Faru al Esperanto vian universalan lingvon, ne donu potencon al la lingvo de unu nacio, kiu donas potencon al tiu nacio kaj al iliaj aliancanoj kaj dividas vin.
*2. De Religio:*
Foriru de iu ajn religia ekstremisma linio kaj laboru por unuigi ilin ĉiujn en unu, labori forte pri ĝi, ĉi tio prenos almenaŭ du generaciojn kaj ĝi komenciĝas per edukado kaj jura reformo forigante la rajton al ĉiuj religiaj organizoj, ili ne devas ekzisti, la fido ne bezonas kompanion senpage kun amasaj financoj krom se ĝi celas manipuli kaj kontroli, malfermi viajn okulojn.
*3 -a per tero:*
Tio daŭros vin pli kaj estas la lasta paŝo, sed post kiam vi sukcesos solvi la unuajn du, vi povas komenci la malrapidan procezon de homa reunuiĝo forigante limojn kaj krei teran nacion.
Kiom da tempo ĝi daŭros?
Nekonata, vi estas tiel juna, eble malmultaj jarcentoj, sed la semoj estas tie, nutras ilin!
-
@ 57c631a3:07529a8e
2025-06-17 21:00:46Apple expands tools to help parents protect kids and teens online
https://connect-test.layer3.press/articles/567470ec-2349-40b6-9d8f-e2616b222c6d
-
@ 8bad92c3:ca714aa5
2025-06-17 22:03:27Key Takeaways
Michael Goldstein, aka Bitstein, presents a sweeping philosophical and economic case for going “all in” on Bitcoin, arguing that unlike fiat, which distorts capital formation and fuels short-term thinking, Bitcoin fosters low time preference, meaningful saving, and long-term societal flourishing. At the heart of his thesis is “hodling for good”—a triple-layered idea encompassing permanence, purpose, and the pursuit of higher values like truth, beauty, and legacy. Drawing on thinkers like Aristotle, Hoppe, and Josef Pieper, Goldstein redefines leisure as contemplation, a vital practice in aligning capital with one’s deepest ideals. He urges Bitcoiners to think beyond mere wealth accumulation and consider how their sats can fund enduring institutions, art, and architecture that reflect a moral vision of the future.
Best Quotes
“Let BlackRock buy the houses, and you keep the sats.”
“We're not hodling just for the sake of hodling. There is a purpose to it.”
“Fiat money shortens your time horizon… you can never rest.”
“Savings precedes capital accumulation. You can’t build unless you’ve saved.”
“You're increasing the marginal value of everyone else’s Bitcoin.”
“True leisure is contemplation—the pursuit of the highest good.”
“What is Bitcoin for if not to make the conditions for magnificent acts of creation possible?”
“Bitcoin itself will last forever. Your stack might not. What will outlast your coins?”
“Only a whale can be magnificent.”
“The market will sell you all the crack you want. It’s up to you to demand beauty.”
Conclusion
This episode is a call to reimagine Bitcoin as more than a financial revolution—it’s a blueprint for civilizational renewal. Michael Goldstein reframes hodling as an act of moral stewardship, urging Bitcoiners to lower their time preference, build lasting institutions, and pursue truth, beauty, and legacy—not to escape the world, but to rebuild it on sound foundations.
Timestamps
00:00 - Intro
00:50 - Michael’s BBB presentation Hodl for Good
07:27 - Austrian principles on capital
15:40 - Fiat distorts the economic process
23:34 - Bitkey
24:29 - Hodl for Good triple entendre
29:52 - Bitcoin benefits everyone
39:05 - Unchained
40:14 - Leisure theory of value
52:15 - Heightening life
1:15:48 - Breaking from the chase makes room for magnificence
1:32:32 - Nakamoto Institute’s missionTranscript
(00:00) Fiat money is by its nature a disturbance. If money is being continually produced, especially at an uncertain rate, these uh policies are really just redistribution of wealth. Most are looking for number to go up post hyper bitcoinization. The rate of growth of bitcoin would be more reflective of the growth of the economy as a whole.
(00:23) Ultimately, capital requires knowledge because it requires knowing there is something that you can add to the structures of production to lengthen it in some way that will take time but allow you to have more in the future than you would today. Let Black Rockck buy the houses and you keep the sats, not the other way around.
(00:41) You wait until later for Larry Frink to try to sell you a [Music] mansion. And we're live just like that. Just like that. 3:30 on a Friday, Memorial Day weekend. It's a good good good way to end the week and start the holiday weekend. Yes, sir. Yes, sir. Thank you for having me here. Thank you for coming. I wore this hat specifically because I think it's I think it's very apppropo uh to the conversation we're going to have which is I hope an extension of the presentation you gave at Bitblock Boom Huddle for good. You were working on
(01:24) that for many weeks leading up to uh the conference and explaining how you were structuring it. I think it's a very important topic to discuss now as the Bitcoin price is hitting new all-time highs and people are trying to understand what am I doing with Bitcoin? Like you have you have the different sort of factions within Bitcoin.
(01:47) Uh get on a Bitcoin standard, get on zero, spend as much Bitcoin as possible. You have the sailors of the world are saying buy Bitcoin, never sell, die with your Bitcoin. And I think you do a really good job in that presentation. And I just think your understanding overall of Bitcoin is incredible to put everything into context. It's not either or.
(02:07) It really depends on what you want to accomplish. Yeah, it's definitely there there is no actual one-sizefits-all um for I mean nearly anything in this world. So um yeah, I mean first of all I mean there was it was the first conference talk I had given in maybe five years. I think the one prior to that uh was um bit block boom 2019 which was my meme talk which uh has uh become infamous and notorious.
(02:43) So uh there was also a lot of like high expectations uh you know rockstar dev uh has has treated that you know uh that that talk with a lot of reference. a lot of people have enjoyed it and he was expecting this one to be, you know, the greatest one ever, which is a little bit of a little bit of a uh a burden to live up to those kinds of standards.
(03:08) Um, but you know, because I don't give a lot of talks. Um, you know, I I I like to uh try to bring ideas that might even be ideas that are common. So, something like hodling, we all talk about it constantly. uh but try to bring it from a little bit of a different angle and try to give um a little bit of uh new light to it.
(03:31) I alsove I've I've always enjoyed kind of coming at things from a third angle. Um whenever there's, you know, there's there's all these little debates that we have in in Bitcoin and sometimes it's nice to try to uh step out of it and look at it a little more uh kind of objectively and find ways of understanding it that incorporate the truths of of all of them.
(03:58) uh you know cuz I think we should always be kind of as much as possible after ultimate truth. Um so with this one um yeah I was kind of finding that that sort of golden mean. So uh um yeah and I actually I think about that a lot is uh you know Aristotle has his his concept of the golden mean. So it's like any any virtue is sort of between two vices um because you can you can always you can always take something too far.
(04:27) So you're you're always trying to find that right balance. Um so someone who is uh courageous you know uh one of the vices uh on one side is being basically reckless. I I can't remember what word he would use. Uh but effectively being reckless and just wanting to put yourself in danger for no other reason than just you know the thrill of it.
(04:50) Um and then on the other side you would just have cowardice which is like you're unwilling to put yourself um at any risk at any time. Um, and courage is right there in the middle where it's understanding when is the right time uh to put your put yourself, you know, in in the face of danger um and take it on. And so um in some sense this this was kind of me uh in in some ways like I'm obviously a partisan of hodling.
(05:20) Um, I've for, you know, a long time now talked about the, um, why huddling is good, why people do it, why we should expect it. Um, but still trying to find that that sort of golden mean of like yes, huddle, but also what are we hodling for? And it's not we're we're not hodddling just merely for the sake of hodddling.
(05:45) There there is a a purpose to it. And we should think about that. And that would also help us think more about um what are the benefits of of spending, when should we spend, why should we spend, what should we spend on um to actually give light to that sort of side of the debate. Um so that was that was what I was kind of trying to trying to get into.
(06:09) Um, as well as also just uh at the same time despite all the talk of hodling, there's always this perennial uh there's always this perennial dislike of hodlers because we're treated as uh as if um we're just free riding the network or we're just greedy or you know any of these things. And I wanted to show how uh huddling does serve a real economic purpose.
(06:36) Um, and it does benefit the individual, but it also does uh it it has actual real social um benefits as well beyond merely the individual. Um, so I wanted to give that sort of defense of hodling as well to look at it from um a a broader position than just merely I'm trying to get rich. Um uh because even the person who uh that is all they want to do um just like you know your your pure number grow up go up moonboy even that behavior has positive ramifications on on the economy.
(07:14) And while we might look at them and have uh judgments about their particular choices for them as an individual, we shouldn't discount that uh their actions are having positive positive effects for the rest of the economy. Yeah. So, let's dive into that just not even in the context of Bitcoin because I think you did a great job of this in the presentation.
(07:36) just you've done a good job of this consistently throughout the years that I've known you. Just from like a first principles Austrian economics perspective, what is the idea around capital accumulation, low time preference and deployment of that capital like what what like getting getting into like the nitty-gritty and then applying it to Bitcoin? Yeah, it's it's a big question and um in many ways I mean I I even I barely scratched the surface.
(08:05) uh I I can't claim to have read uh all the volumes of Bombber works, you know, capital and interest and and stuff like that. Um but I think there's some some sort of basic concepts that we can look at that we can uh draw a lot out. Um the first uh I guess let's write that. So repeat so like capital time preference. Yeah. Well, I guess getting more broad like why sav -
@ eb0157af:77ab6c55
2025-06-18 02:02:04The Brazilian government has abolished the Bitcoin tax exemption for small investors and introduced a flat 17.5% tax rate on all crypto capital gains.
Brazil has officially ended the tax-free period for small digital asset investors, introducing a flat 17.5% rate on all profits from cryptocurrency sales. The decision was formalized through Provisional Measure 1303, part of the government’s strategy to increase tax revenues from financial markets.
Until now, Brazilian residents selling up to 35,000 Brazilian reais (around $6,300) in cryptocurrencies per month were completely exempt from income tax. Profits exceeding this threshold were subject to progressive taxation, starting at 15% and reaching up to 22.5% for amounts over 30 million reais.
The new flat rate, which took effect on June 12, removes all exemptions and applies uniformly to every investor, regardless of the size of their transactions, according to local outlet Portal do Bitcoin.
While small-scale investors will now face a higher tax burden, high-net-worth individuals might actually benefit. Under the previous system, large transactions were taxed between 17.5% and 22.5%. With the new flat 17.5% rate, many high-profile investors will see their effective tax liability reduced.
Under the new rules, taxes will be calculated quarterly, with investors allowed to offset losses from the previous five quarters. However, starting in 2026, the time frame for claiming losses will be shortened.
Last March, Brazilian lawmakers also proposed a bill allowing employers to partially pay workers in cryptocurrency. According to the draft, crypto payments could not exceed 50% of an employee’s salary.
Full payment in cryptocurrencies would only be allowed for foreign workers or contractors, and only under specific conditions set by the Brazilian Central Bank. The bill prohibits full crypto payment for standard employees.
The post Brazil scraps crypto tax exemption: new 17.5% flat tax appeared first on Atlas21.
-
@ 31a4605e:cf043959
2025-06-17 15:16:09A mineração de Bitcoin é um processo crucial para o funcionamento e a segurança da rede. Ela tem um papel importante na validação de transações e na geração de novos bitcoins, garantindo a integridade do sistema baseado em blockchain ou timechain. Esse processo envolve resolver cálculos matemáticos complicados, exigindo grande poder computacional. Além disso, a mineração tem efeitos econômicos, ambientais e tecnológicos que devem ser analisados de forma detalhada.
A mineração de Bitcoin é o procedimento pelo qual novas unidades da moeda são criadas e adicionadas à rede. Ela também é responsável por verificar e registrar transações no blockchain ou timechain. Esse sistema foi criado para ser descentralizado, eliminando a necessidade de uma autoridade central para controlar a emissão ou validar operações.
Os participantes do processo, chamados de mineradores, competem para resolver problemas matemáticos difíceis. Aquele que achar a solução primeiro ganha o direito de adicionar um novo bloco ao blockchain ou timechain e recebe uma recompensa em bitcoins, além das taxas de transação que estão no bloco. Esse mecanismo é chamado de prova de trabalho (Proof of Work - PoW).
O processo de mineração é muito técnico e segue uma série de etapas:
Agrupamento de transações: as transações enviadas pelos usuários são reunidas em um bloco pendente, que aguarda validação.
Resolução de problemas matemáticos: os mineradores devem encontrar um número específico, chamado nonce, que, quando combinado com os dados do bloco, gera um hash criptográfico dentro de um padrão exigido. Esse processo requer tentativa e erro, consumindo alto poder computacional.
Validação do bloco: quando um minerador encontra a solução correta, o bloco é validado e adicionado ao blockchain ou timechain. Todos os nós da rede verificam a autenticidade do bloco antes de aceitá-lo.
Recompensa: o minerador que vencer recebe uma recompensa em bitcoins, além das taxas pagas pelas transações que estão no bloco. Essa recompensa diminui ao longo do tempo em um evento chamado halving, que acontece aproximadamente a cada quatro anos.
A mineração de Bitcoin tem um impacto econômico grande, pois cria oportunidades de renda para pessoas e empresas. Ela também estimula o desenvolvimento de novas tecnologias, como processadores especializados (ASICs) e sistemas de resfriamento modernos.
Além disso, a mineração apoia a inclusão financeira ao manter uma rede descentralizada, permitindo transações rápidas e seguras em nível global. Em áreas com economias instáveis, o Bitcoin oferece uma alternativa viável para preservação de valor e transferências financeiras.
Apesar de seus benefícios econômicos, a mineração de Bitcoin é frequentemente criticada por seu impacto no meio ambiente. O processo de prova de trabalho consome grandes quantidades de eletricidade, especialmente em áreas onde a matriz energética depende de fontes fósseis.
Estima-se que a mineração de Bitcoin consuma tanta energia quanto alguns países inteiros, levantando preocupações sobre sua sustentabilidade. No entanto, há esforços contínuos para reduzir esses impactos, como o uso crescente de fontes de energia renovável e soluções alternativas, como redes baseadas na prova de participação (Proof of Stake - PoS) em outros sistemas descentralizados.
A mineração também enfrenta desafios ligados à escalabilidade e à concentração de poder computacional. Grandes empresas e pools de mineração dominam o setor, o que pode afetar a descentralização da rede.
Outro desafio é a complexidade crescente dos cálculos matemáticos, que exige hardware mais avançado e consome mais energia com o tempo. Para enfrentar esses problemas, pesquisadores estudam soluções que otimizem o uso de recursos e mantenham a rede sustentável por um longo período.
Resumindo, a mineração de Bitcoin é um processo essencial para manter a rede e para a criação de novas unidades da moeda. Ela garante segurança, transparência e descentralização, sustentando o funcionamento do blockchain ou timechain.
No entanto, a mineração também traz desafios, como o alto consumo de energia e a concentração de recursos em grandes pools. Apesar disso, a busca por soluções sustentáveis e inovações tecnológicas indica um futuro promissor, onde o Bitcoin continuará a ter um papel central na economia digital.
Muito obrigado por teres lido o texto até aqui, espero que esteja tudo bem contigo e um abraço enorme do teu madeirense bitcoiner maximalista favorito. Viva a liberdade!
-
@ 70c48e4b:00ce3ccb
2025-06-16 06:59:12Hello all :)
Something pretty exciting just happened in the world of decentralized tech.
A new social network project called Nostria successfully wrapped up its pre-seed funding round. It raised the funds through Angor, a crowdfunding platform built on Bitcoin and Nostr that aligns perfectly with the project’s decentralized mission.This post is all about what Nostria is doing, why it matters, and how Angor made it all possible.
What is Nostria?
nostr:npub16x7nxvehx0wvgy0sa6ynkw9c2ghuph3z0ll5t8veq3xwm8n9tqds6ka44x is a social network app that’s built to make the Nostr protocol easy to use. If you're not familiar with Nostr, it's an open protocol for decentralized social networking. It gives users more control and privacy, without relying on big platforms.
Nostria makes all that feel less like a tech experiment and more like a real social network. The app is simple, elegant, and beginner-friendly. It is available across iOS, Android, and web so you can jump in from anywhere.
Think of it as the easiest way to start using Nostr without needing to understand all the technical stuff under the hood.
https://www.nostria.app/assets/screenshots/nostria-01.jpg
The Problem Nostria is Solving:
One of the challenges Nostr faces right now is scaling. The network relies on relays to pass messages around, but many of these are centralized and getting overloaded. That creates serious bottlenecks and makes the whole experience less reliable. Just to give you an idea:
- Damus relay has around 646,000 users
- Nos relay has 601,000 users
- Snort sits at 417,000 users
When so many users depend on just a few relays, it puts a huge strain on the system and limits how far the network can grow.
Nostria’s Clever Fix
Nostria introduces a smarter way to scale Nostr without losing its decentralized core. Instead of relying on a few overloaded relays, it uses:
• Regionally deployed Discovery Relays – Think of these as local hubs placed in different parts of the world. When users connect, they are matched with a nearby relay, which keeps things faster and spreads the traffic out so no single relay gets overwhelmed.
• Pooled User Relays – Instead of each person depending on just one relay, users are connected through a shared pool. This means messages are sent and received more efficiently, especially when more people join the network.
All of this happens behind the scenes. The app keeps things simple and intuitive, with automation that handles the complexity for you. Whether you're posting, reading, or connecting with others, the experience stays smooth.
Nostria has bold ambitions. Here’s what they’re going for:
- A goal of 1 million daily active users
- Competing with platforms like Bluesky, Mastodon, and even X (formerly Twitter)
- A long-term plan to support both free and premium services to drive adoption
As of now, the Nostr network as a whole has:
- 15,000 daily active users
- 42.7 million total users
- 552 million total events
So the market is already there. It just needs the right tools to grow.
https://www.nostria.app/assets/screenshots/nostria-02.jpg
Meet the Team
Nostria is led by nostr:npub1zl3g38a6qypp6py2z07shggg45cu8qex992xpss7d8zrl28mu52s4cjajh, a software engineer with deep experience in distributed systems. He has been involved with the Nostr protocol since its early days in 2021 and is deeply passionate about decentralization and open-source tech.
https://www.nostria.app/assets/team/sondre.jpg
He’s joined by nostr:npub1e0krp2gr3l5nfd2jw2cydh68adxjpmcqdhs2e0jxkrqd4crwt4dslwrk0k, a thoughtful full-stack developer focused on simplicity and sovereignty, and nostr:npub10c4sn723akd7fqegfe6xntpq43p86vnyvv7j2ryaq8jzvhyea4pq72c5ul, a junior dev who’s already contributed to open source and is finishing up her studies.
https://www.nostria.app/assets/team/kosta.jpg https://www.nostria.app/assets/team/lu.jpg
The Funding Round
To bring Nostria to life, the team aimed to raise $30,000 during their pre-seed round. This funding would help them:
- Complete their MVP (Minimum Viable Product)
- Deploy global infrastructure
- Start building their user base
- Get ready for a full Seed round in late 2025
How Angor Helped?
Angor is a decentralized crowdfunding platform built on Bitcoin and the Nostr protocol. It’s designed exactly for projects like this. The team at Nostria launched their campaign on Angor between May 12 and May 31, and it was a success.
What made the campaign stand out?
- The whole process was decentralized and transparent.
- Backers could fund the project directly, without intermediaries.
- Nostria aligned perfectly with Angor’s vision of empowering projects that push decentralization forward.
The campaign served as both a fundraiser and a real-world example of how decentralized infrastructure can power decentralized ideas. And it worked.
Inside the Funding Terms
As part of this funding round, Nostria offered contributors a post-money SAFE (Simple Agreement for Future Equity). This is a modern, flexible way for startups to raise money early without the complexity of traditional equity rounds.
In simple terms:
•Investors contributed funds now, and in return, they will receive equity in Nostria during a future priced equity round. When Nostria raises its next round, most likely a Seed round, then those SAFE contributions will convert into actual shares.
•The SAFE includes a valuation cap, which sets a maximum company valuation for conversion. This guarantees that early backers receive shares at a better rate than future investors. While the exact cap isn't publicly listed, this feature ensures early supporters are rewarded for their trust.
•There is no interest or maturity date, which is a major benefit over traditional convertible notes. There’s no ticking clock or repayment obligation. Investors simply wait until the next funding event.
•The SAFE also features a Most Favored Nation (MFN) clause. This ensures that if the company issues another SAFE later with better terms, early investors will automatically receive the same improved terms. It’s designed to keep things transparent and equitable.
•Jurisdiction and legal terms: While the full legal text isn’t included in the note, SAFEs typically specify the legal jurisdiction governing the agreement. Nostria’s approach suggests a commitment to following standard legal frameworks, further underlining their seriousness and professionalism.
You can read Nostria’s public SAFE summary here: nostr:npub16x7nxvehx0wvgy0sa6ynkw9c2ghuph3z0ll5t8veq3xwm8n9tqds6ka44x
And you can view the full campaign hosted on Angor here: https://hub.angor.io/project/angor1qwdgxjuzhjykgpn5q8p3l2q9vyrgqdlrkfp5sjr
By sharing these details openly, the team added a strong layer of transparency and trust to the entire campaign. It is a clear signal that they are building something serious and thoughtful, with long-term commitment and care instead of shortcuts.
What’s Next?
With the funding secured, Nostria is sprinting ahead. The roadmap includes:
- June: Deploying media and relay servers
- July: Adding premium features and full cross-platform support
- August: Growing the user base and preparing for the next funding round
If all goes well, Nostria is on track to become one of the most accessible and user-friendly Nostr based platforms out there. With a clear roadmap and a team focused on long-term decentralization, the journey is just getting started...
Got an idea of your own? You can launch your project on Angor, just like Nostria did, and start your own funding round with the support of a like-minded community.
Thanks for reading. See y’all next week with another story from the world of open, decentralized innovation. Ciao
-
@ f683e870:557f5ef2
2025-06-11 13:33:34This is what has been achieved on a per-project basis since receiving the grant from Opensats.
npub.world
Together with nostr:npub1wf4pufsucer5va8g9p0rj5dnhvfeh6d8w0g6eayaep5dhps6rsgs43dgh9, I have been refining npub.world to deliver real-time, WoT-powered profile search. These refinements include:
-
implementing new desings by nostr:npub1t3gd5yefglarhar4n6uh34uymvft4tgu8edk5465zzhtv4rrnd9sg7upxq
-
moving to the new Vertex DVM standard
-
improved URL and npub parsing
Vertex crawler
Due to the architectural mistakes I made when designing the first version, I have embarked on a full rewrite of the crawler. The new architecture is simpler, more modular and more performant, and I am confident that it will provide a stable foundation on which to expand the Vertex offering with additional functionalities and analytics.
The major differences with the old version are:
-
the
DB
andRWS
interfaces have been broken up and simplified into smaller ones, each defined by their own packages -
a simplified, more efficient algorithm for updating random walks
-
use of a custom-built cache to speed up graph computations
-
a worker pool pattern to speed up event archiving
These changes have reduced the LOC by more than half while improving performance by \~10x. Of independent interest is the new pipe package, which can also be used by other projects to crawl the Nostr network.
Vertex Relay and DVMs
The Vertex relay has been updated several times, and now supports four DVM services:
-
Verify Reputation
-
Recommend Follows
-
Rank Profiles
-
Search Profile
For each service, customers can choose the algorithm to use by specifing the sort option to use between:
-
followerCount
-
globalPagerank
-
personalizedPagerank
More information can be found at https://vertexlab.io/.
Overall, the relay has processed more than 100,000 DVM requests, with the current daily rate standing at around 1,500.
rely
Unsatisfied with the khatru relay framework, I've decided to build my own called rely, with the goal of being simpler and more stable. I've not just scratched a personal hitch: I've used khatru for several months now (the Vertex relay is still using it) and I encountered several issues, some of which I've solved with PRs to the underlying go-nostr library.
The main differences between khatru and rely:
-
rely is much simpler, both architecturally and in terms of LOC (less than half)
-
rely has a solid testing approach, where a random yet reproducible high traffic hits the relay to see what breaks
-
rely implements a worker pool pattern where a configurable number of goroutines process the incoming requests from clients. On the other hand, khatru process them in the HandleWebsocket goroutine, which is spawned every time a client connects. This is dangerous in my opinion because if too many clients connect, memory usage would spike and the relay could potentially crash.
New DVM spec
I helped to draft this new proposal to update the DVM spec, which is one of the most controversial NIPs. While almost everyone agrees that it needs to change, there is no consensus on how to move forward. I believe our proposal is a sensible approach that defines discovery, usage, and error patterns while leaving flexibility for specific DVM kinds.
Looking at the future
Next I am going to move the Vertex relay to the rely framework and to the new crawler package. I expect that this will increase the performance and will make things more solid and more simple. After all of this refactoring and simplification, it will be time to finally add features to the Vertex offering. I have an ambitious roadmap consisting of:
-
accepting ecash for DVM requests
-
designing client-side validation schemes for the DVM responses
-
expanding the pagerank algorithm to make use of mutes and reports
-
adding an WoT impersonator check to npub.world
-
adding a nip05 check to npub.world
-
make a relystore package with some plug&play databases for rely.
-
-
@ eb0157af:77ab6c55
2025-06-18 02:02:03Trump Media & Technology Group is targeting the digital asset market by registering a Bitcoin and Ethereum exchange-traded fund (ETF) with NYSE Arca.
On June 16, Truth Social — a company controlled by Trump Media & Technology Group — officially submitted documentation for a Bitcoin and Ethereum-based Exchange Traded Fund (ETF) to the U.S. Securities and Exchange Commission (SEC).
NEW: Trump's Truth Social has filed for a dual Bitcoin & Ethereum ETF. pic.twitter.com/a5iZtrtUyk
— James Seyffart (@JSeyff) June 16, 2025
This initiative would allow the social media platform to diversify its operations by entering the digital asset sector through these financial products.
The filing proposes a trust structure that would directly hold bitcoin and ether, with 75% of the fund’s assets invested in bitcoin and 25% in ether.
The Truth Social Bitcoin and Ethereum ETF will have Yorkville America Digital as the fund’s sponsor, while custody of the digital assets will be entrusted to the Crypto.com exchange.
The choice of NYSE Arca as the listing venue for the fund is no coincidence: this market already hosts several cryptocurrency-linked ETFs and offers the necessary technological infrastructure to manage these financial instruments.
Trump Media & Technology Group’s move aligns with a broader trend in which public companies are increasingly integrating Bitcoin and other digital assets into their corporate treasuries.
Devin Nunes, CEO of Trump Media & Technology Group, stated:
“Trump Media’s vision is to aggressively enhance our offerings and capabilities, which includes holding bitcoin in our corporate treasury.”
The final approval of the Truth Social Bitcoin and Ethereum ETF will depend on the outcome of the regulatory review process at the SEC, which must assess the product’s compliance with current regulations on exchange-traded funds and cryptocurrency investments.
The post Truth Social files for Bitcoin-Ethereum ETF appeared first on Atlas21.
-
@ eb0157af:77ab6c55
2025-06-18 02:02:02VanEck analyst Matthew Sigel warns of growing risks for Bitcoin treasury companies as their stock prices approach NAV.
Matthew Sigel, Head of Digital Assets Research at VanEck, has sounded the alarm for companies that have adopted Bitcoin-based treasury strategies.
No public BTC treasury company has traded below its Bitcoin NAV for a sustained period.
But at least one is now approaching parity.
As some of these companies raise capital through large at-the-market (ATM) programs to buy BTC, a risk is emerging: If the stock trades at or near…
— matthew sigel, recovering CFA (@matthew_sigel) June 16, 2025
In a post on X, Sigel highlighted an emerging issue in the sector of companies holding Bitcoin treasuries. Until now, no public company with a Bitcoin treasury has ever traded below its own Net Asset Value (NAV) for extended periods. The NAV represents the net value of a company’s assets (such as bitcoin and cash) minus its liabilities, divided by the number of outstanding shares — essentially indicating the real value of each share based on the company’s holdings. However, at least one of these companies (Semler Scientific) is now dangerously approaching breakeven.
The core of the issue lies in the capital-raising mechanism. Many of these companies rely on large-scale at-the-market (ATM) programs to acquire bitcoin, but when the stock price nears the NAV, this strategy can shift from creating value to destroying it.
The risk for shareholders
Under normal market conditions, companies like Semler Scientific and Strategy trade at a premium to the value of the bitcoin they hold. This means investors are willing to pay more for the company’s stock than the simple value of its bitcoin treasury.
However, when a company’s stock price approaches or falls below its NAV, the situation becomes problematic, according to Sigel. Issuing new shares at these levels not only dilutes the value for existing shareholders but can also become extractive, as management continues to raise capital while benefiting more than shareholders.
Proposed solutions
Sigel suggested several measures for companies pursuing Bitcoin treasury strategies. His recommendations include implementing preventive safeguards while stock premiums still exist. Notably, he proposes announcing a pause in ATM issuances if the stock trades below 0.95 times NAV for ten or more consecutive trading days. Additionally, Sigel advises prioritizing buybacks when bitcoin appreciates but the company’s equity does not reflect that increase.
Lessons from Bitcoin miners’ past
The VanEck analyst pointed out that similar situations have occurred in the Bitcoin mining sector, marked by persistent equity issuances and disproportionate executive compensation. To avoid repeating those mistakes, Sigel suggests that executive pay should be tied to growth in NAV per share, not the size of the Bitcoin position or the total number of outstanding shares.
Sigel concluded:
“Once you are trading at NAV, shareholder dilution is no longer strategic. It is extractive. Boards and shareholders should act with discipline now, while they still have the benefit of optionality.”
The post Bitcoin treasury: VanEck sounds the alarm for companies in the danger zone appeared first on Atlas21.
-
@ 1c5ff3ca:efe9c0f6
2025-06-05 06:29:45Just calling it Open is not enough - Herausforderungen öffentlicher Bildungsinfrastrukturen und wie Nostr helfen könnte
Ich möchte gerne mit euch teilen, an welchen Konzepten ich arbeite, um die öffentliche Bildungsinfrastruktur mit Hilfe von Nostr zugänglicher und offener zu gestalten. Ich arbeite im Bereich öffentlicher Bildungsinfrastrukturen, besonders im Feld von Open Educational Resources (#OER). OER sind offen lizenzierte Bildungsmaterialien, die mit einer offenen Lizenz, meist einer Creative Commons Lizenz, versehen sind (CC-0, CC-BY, CC-BY-SA). Durch die klare und offene Lizenzierung ist es leicht möglich, die Lernmaterialien auf die individuellen Bedarfe anzupassen, sie zu verbessern und sie erneut zu veröffentlichen.
Seit vielen Jahren wird einerseits die Entwicklung freier Bildungsmaterialien gefördert, andererseits werden Plattformen, insbesondere Repositorien gefördert, die diese Materialien verfügbar machen sollen. Denn irgendwo müssen diese Materialien zur Verfügung gestellt werden, damit sie auch gefunden werden können.
Das klappt allerdings nur so mittelgut.
Herausforderungen
Nach vielen Jahren Förderung kann die einfache Frage: "Wo kann ich denn mein OER-Material bereitstellen" nicht einfach beantwortet werden. Es gibt Services, bei denen ich mein OER hochladen kann, jedoch bleibt es dann eingeschlossen in dieser Plattform und wird nicht auf anderen Plattformen auffindbar. Außerdem sind diese Services häufig an bestimmte Bildungskontexte gebunden oder geben Content erst nach einer Qualitätsprüfung frei. Dies führt dazu, dass ein einfaches und gleichzeitig öffentliches Teilen nicht möglich ist.
Diese und weitere Herausforderungen haben ihren Ursprung darin, dass Service und Infrastruktur in der Architektur öffentlichen Bildungsarchitektur ungünstig vermischt werden. Als Infrastruktur verstehe ich hier die Bereitstellung einer öffentlichen und offen zugänglichen Bildungsinfrastruktur, auf der Daten ausgetauscht, also bereitgestellt und konsumiert werden können. Jedoch existiert eine solche Infrstruktur momentan nicht unabhängig von den Services, die auf ihr betrieben werden. Infrastrukturbetreiber sind momentan gleichzeitig immer Servicebetreiber. Da sie aber die Hand darüber haben wollen, was genau in ihrem Service passiert (verständlich), schränken sie den Zugang zu ihrer Infrastruktur mit ein, was dazu führt, dass sie Lock-In Mechanismen großer Medienplattformen in der kleinen öffentlichen Bildungsinfrastruktur replizieren.
Es ist in etwas so, als würde jeder Autobauer auch gleichzeitig die Straßen für seine Fahrzeuge bauen. Aber halt nur für seine Autos.
Anhand einiger beispielhafter Services, die bestehende Plattformen auf ihren Infrastrukturen anbieten, möchte ich die Herausforderungen aufzeigen, die ich im aktuellen Architekturkonzept sehe:
- Upload von Bildungsmaterial
- Kuration: Zusammenstellung von Listen, Annotation mit Metadaten
- Crawling, Indexierung und Suche
- Plattfformübergreifende Kollaboration in Communities -> Beispiel: Qualitätssicherung (was auch immer das genau bedeutet)
- KI- Services -> Beispiel: KI generierte Metadaten für BiIdungsmaterial
Material Upload
Der Service "Material-Upload" oder das Mitteilen eines Links zu einem Bildungsmaterial wird von verschiedenen OER-Pattformen bereitgestellt (wirlernenonline.de, oersi.org, mundo.schule).
Dies bedeutet konkret: Wenn ich bei einer der Plattformen Content hochlade, verbleibt der Content in der Regel auch dort und wird nicht mit den anderen Plattformen geteilt. Das Resultat für die User: Entweder muss ich mich überall anmelden und dort mein Material hochladen (führt zu Duplikaten) oder damit leben, dass eben nur die Nutzer:innen der jeweiligen Plattform meinen Content finden können.
Der "Open Educational Resource Search Index" (OERSI) geht diese Herausforderung an, indem die Metadaten zu den Bildungsmaterialien verschiedener Plattformen in einem Index bereitgestellt werden. Dieser Index ist wiederum öffentlich zugänglich, sodass Plattformen darüber auch Metadaten anderer Plattformen konsumieren können. Das ist schon sehr gut. Jedoch funktioniert das nur für Plattformen, die der OERSI indexiert und für alle anderen nicht. Der OERSI ist auf den Hochschulbereich fokussiert, d.h. andere Bildungskontexte werden hier ausgeschlossen. Der Ansatz für jeden Bildungsbereich einen passenden "OERSI" daneben zustellen skaliert und schlecht und es bleibt die Herausforderung bestehen, dass für jede Quelle, die indexiert werden soll, ein entsprechender Importer/Crawler geschrieben werden muss.
Dieser Ansatz (Pull-Ansatz) rennt den Materialien hinterher.
Es gibt jedoch noch mehr Einschränkungen: Die Plattformen haben sich jeweils auf spezifische Bildungskontexte spezialisiert. D.h. auf die Fragen: Wo kann ich denn mein OER bereitstellen, muss immer erst die Gegenfrage: "Für welchen Bildungsbereich denn?" beantwortet werden. Wenn dieser außerhalb des allgemeinbildendenden Bereichs oder außerhalb der Hochschule liegt, geschweige denn außerhalb des institutionellen Bildungsrahmens, wird es schon sehr, sehr dünn. Kurzum:
- Es ist nicht einfach möglich OER bereitzustellen, sodass es auch auf verschiedenen Plattformen gefunden werden kann.
Kuration
Unter Kuration verstehe ich hier die Zusammenstellung von Content in Listen oder Sammlungs ähnlicher Form sowie die Annotation dieser Sammlungen oder des Contents mit Metadaten.
Einige Plattformen bieten die Möglichkeit an, Content in Listen einzuordnen. Diese Listen sind jedoch nicht portabel. Die Liste, die ich auf Plattform A erstelle, lässt sich nicht auf Plattform B importieren. Das wäre aber schön, denn so könnten die Listen leichter auf anderen Plattformen erweitert oder sogar kollaborativ gestaltet werden, andererseits werden Lock-In-Effekte zu vermieden.
Bei der Annotation mit Metadaten treten verschiedene zentralisierende Faktoren auf. In der momentanen Praxis werden die Metadaten meist zum Zeitpunkt der Contentbereitstellung festgelegt. Meist durch eine Person oder Redaktion, bisweilen mit Unterstützung von KI-Services, die bei der Metadateneingabe unterstützen. Wie aber zusätzliche eigene Metadaten ergänzen? Wie mitteilen, dass dieses Material nicht nur für Biologie, sondern auch für Sport in Thema XY super einsetzbar wäre? Die momentanen Ansätze können diese Anforderung nicht erfüllen. Sie nutzen die Kompetenz und das Potential ihrer User nicht.
- Es gibt keine interoperablen Sammlungen
- Metadaten-Annotation ist zentralisiert
- User können keine eigenen Metadaten hinzufügen
Crawling, Indexierung und Suche
Da die Nutzer:innen nicht viele verschiedene Plattformen und Webseiten besuchen wollen, um dort nach passendem Content zu suchen, crawlen die "großen" OER-Aggregatoren diese, um die Metadaten des Contents zu indexieren. Über verschiedene Schnittstellen oder gerne auch mal über das rohe HTML. Letztere Crawler sind sehr aufwändig zu schreiben, fehleranfällig und gehen bei Design-Anpassungen der Webseite schnell kaputt, erstere sind etwas stabiler, solange sich die Schnittstelle nicht ändert. Durch den Einsatz des Allgemeinen Metadatenprofils für Bildungsressourcen (AMB) hat sich die Situation etwas verbessert. Einige Plattformen bieten jetzt eine Sitemap an, die Links zu Bildungsmaterial enthalten, die wiederum eingebettet
script
-tags vom Typapplication/ld+json
enthalten, sodass die Metadaten von dort importiert werden können.Beispiel: e-teaching.org bietet hier eine Sitemap für ihre OER an: https://e-teaching.org/oer-sitemap.xml und auf den jeweiligen Seiten findet sich ein entsprechendes script-Tag.
Das ist schon viel besser, aber da geht noch mehr:
Zunächst ist dieser Ansatz nur für Plattformen und Akteure praktikabel, die über IT-Ressourcen verfügen, um entsprechende Funktionalitäten bei sich einbauen zu können. Lehrende können dies nicht einfach auf ihrem privaten Blog oder ähnliches umsetzen. Zum anderen besteht immer noch ein Discovery Problem. Ich muss nach wie vor wissen, wo ich suchen muss. Ich muss die Sitemaps kennen, sonst finde ich nichts. Statt eines Ansatzes, bei dem Akteure eigenständig mitteilen können, dass sie neuen Content haben (Push-Ansatz), verfolgen wir derzeit einen Ansatz, bei dem jede Plattform für sich Content im Pull-Verfahren akquiriert. Dies führt an vielen Stellen zu Doppelarbeiten, ist ineffizient (mehrere Personen bauen genau die gleichen Crawler, aber halt immer für ihre Plattform) und schliesst vor allem kleine Akteure aus (lohnt es sich einen Crawler zu programmieren, wenn die Webseite "nur" 50 Materialien bereitstellt?).
Anstatt erschlossene Daten zu teilen, arbeiten die Plattformen für sich oder stellen es höchstens wieder hinter eigenen (offenen oder geschlossenen) Schnittstellen bereit. Das ist wohl nicht das, was wir uns unter einer offenen und kollaborativen Gemeinschaft vorstellen, oder?
Bei der Suche stehen wir vor ähnlichen Herausforderungen, wie bereits oben geschildert. Obwohl verschiedene OER-Aggregatoren in Form von Repositorien oder Referatorien bereits viele der "kleineren" Plattformen indexieren und somit eine übergreifende Suche anbieten, ist es nicht möglich, diese Aggregatoren gemeinsam zu durchsuchen. Dies führt im Endeffekt dazu, dass die User wieder verschiedene Plattformen ansteuern müssen, wenn sie den gesamten OER-Fundus durchsuchen wollen.
- An vielen Stellen wird Content doppelt erschlossen, aber immer für die eigene Plattform
- Es gibt keinen geteilten Datenraum, in den Akteure Content "pushen" können
- Es gibt keine plattformübergreifenden Suchmöglichkeiten
Plattformübergreifende Kollaboration
Das wäre schön, oder? Mir ist schleierhaft, wie #OEP (Open Educational Practices, genaue Definition durch die Community steht noch aus) ohne funktionieren soll. Aber es gibt meines Wissens nach nicht mal Ansätze, wie das technisch umgesetzt werden soll (oder doch? let me hear).
Ein Szenario für solche plattformübergreifende Kollaboration könnte Qualitätssicherung sein. Gesetzt, dass sich zwei Plattformen / Communities auf etwas verständigt haben, dass sie als "Qualität" bezeichnen, wie aber dieses Gütesiegel nun an den Content bringen?
Plattform A: Na, dann kommt doch alle zu uns. Hier können wir das machen und dann hängt auch ein schönes Badge an den Materialien.
Plattform B: Ja, aber dann hängt es ja nicht an unseren Materialien. Außerdem wollen/müssen wir bei uns arbeiten, weil welche Existenzberechtigung hat denn meine Plattform noch, wenn wir alles bei dir machen?
- Obwohl nun #OEP in aller Munde sind, gibt es keine technischen Ansätze, wie (plattformübergreifende) Kollaboration technisch abgebildet werden kann
KI-Services
Was ist heute schon komplett ohne das Thema KI zu erwähnen? Mindestens für den nächsten Förderantrag muss auch irgendetwas mit KI gemacht werden...
Verschiedene Projekte erarbeiten hilfreiche und beeindruckende KI-Services. Beispielsweise, um die Annotation von Content mit Metadaten zu erleichtern, Metadaten automatisch hinzuzufügen, Content zu bestimmten Themen zu finden oder (halb-)automatisch zu Sammlungen hinzuzufügen. Aber (vielleicht habt ihr es schon erraten): Funktioniert halt nur auf der eigenen Plattform. Vermutlich, weil die Services nah am plattformeigenen Datenmodell entwickelt werden. Und da die Daten dieses Silo nicht verlassen, passt das schon. Das führt dazu, dass an mehreren Stellen die gleichen Services doppelt entwickelt werden.
- KI-Services funktionieren oft nur auf der Plattform für die sie entwickelt werden
Zusammenfassung der Probleme
Wir machen übrigens vieles schon sehr gut (Einsatz des AMB, Offene Bidungsmaterialien, wir haben eine großartige Community) und jetzt müssen wir halt weiter gehen.
(Die OER-Metadatengruppe, die das Allgemeine Metadatenprofil für Bildungsressourcen (AMB) entwickelt hat, bekommt für ihre Arbeit keine direkte Förderung. Gleichzeitig ist sie eine zentrale Anlaufstelle für alle, die mit Metadaten in offenen Bildungsinfrastukturen hantieren und das Metadatenprofil ist eines der wenigen Applikationsprofile, das öffentlich einsehbar, gut dokumentiert ist und Validierungsmöglichkeiten bietet.)
Betrachten wir die gesamten Plattformen und die beschriebenen Herausforderungen aus der Vogelperspektive, so lassen sich drei ineinander verschränkte Kernbestandteile unterscheiden, die helfen, die beschriebenen Probleme besser zu verstehen:
- User
- Service
- Daten
User: Auf (fast) allen Plattformen agieren User. Sie laden Material hoch, annotieren mit Metadaten, sind in einer Community, suchen Content usw. Egal, ob sie sich einloggen können/müssen, irgendetwas bieten wir unseren Usern an, damit sie daraus hoffentlich Mehrwerte ziehen
Service: Das ist dieses irgendetwas. Die "Webseite", die Oberfläche, das, wo der User klicken und etwas tun kann. Es ist das, was den Daten oft eine "visuelle" Form gibt. Der Service ist der Mittler, das Interface zwischen User und Daten. Mithilfe des Services lassen sich Daten erzeugen, verändern oder entfernen (Es gibt natürlich auch viele nicht-visuelle Services, die Interaktion mit Daten ermöglichen, aber für die meisten normalen Menschen, gibt es irgendwo was zu klicken).
Daten: Die Informationen in strukturierter maschinenlesbarer Form, die dem User in gerenderter Form durch einen Service Mehrwerte bieten können. Ungerenderte Daten können wir schwieirg erfassen (wir sind ja nicht Neo). Das können entweder die Metadaten zu Bildungmaterialien sein, die Materialien selbst, Profilinformationen, Materialsammlungen o.ä.
Meines Erachtens nach haben viele der oben beschriebenen Herausforderungen ihren Ursprung darin, dass die drei Kernbestandteile User, Service, Daten ungünstig miteinander verbunden wurden. Was kein Vorwurf sein soll, denn das ist genau die Art und Weise, wie die letzten Jahre (Jahrzehnte?) Plattformen immer gebaut wurden:
- User, Service und Daten werden in einer Plattform gebündelt
Das heisst durch meinen Service agieren die User mit den Daten und ich kann sicherstellen, dass in meiner kleinen Welt alles gut miteinander funktioniert. Sinnvoll, wenn ich Microsoft, Facebook, X oder ähnliches bin, weil mein Geschäftsmodell genau darin liegt: User einschließen (lock-in), ihnen die Hohheit über ihren Content nehmen (oder kannst du deine Facebook Posts zu X migrieren?) und nach Möglichkeit nicht wieder rauslassen.
Aber unsere Projekte sind öffentlich. Das sind nicht die Mechanismen, die wir replizieren sollten. Also was nun?
Bildungsinfrasstrukturen auf Basis des Nostr-Protokolls
Nostr
Eine pseudonyme Person mit dem Namen "fiatjaf" hat 2019 ein Konzept für ein Social Media Protokoll "Nostr - Notes and Other Stuff Transmitted By Relays" wie folgt beschrieben:
It does not rely on any trusted central server, hence it is resilient, it is based on cryptographic keys and signatures, so it is tamperproof, it does not rely on P2P techniques, therefore it works.
Fiatjaf, 2019
Die Kernbestandsteile des Protokolls bestehen aus:
- JSON -> Datenformat
- SHA256 & Schnorr -> Kryptographie
- Websocket -> Datenaustausch
Und funktionieren tut es so:
User besitzen ein "Schlüsselpaar": einen privaten Schlüssel (den behälst du für dich, nur für dich) und einen öffentlichen Schlüssel, den kannst du herumzeigen, das ist deine öffentliche Identität. Damit sagst du anderen Usern: Hier schau mal, das bin ich. Die beiden Schlüssel hängen dabei auf eine "magische" (kryptografische) Weise zusammen: Der öffentliche Schlüssel lässt sich aus dem privaten Schlüssel generieren, jedoch nicht andersherum. D.h. falls du deinen öffentlichen Schlüssel verlierst: Kein Problem, der lässt sich immer wieder herstellen. Wenn du deinen privaten Schlüssel verlierst: Pech gehabt, es ist faktisch unmöglich, diesen wieder herzustellen.
Die Schlüsselmagie geht jedoch noch weiter: Du kannst mit deinem privaten Schlüssel "Nachrichten" signieren, also wie unterschreiben. Diese Unterschrift, die du mit Hilfe des privaten Schlüssels erstellst, hat eine magische Eigenschaft: Jeder kann mithilfe der Signatur und deinem öffentlichen* Schlüssel nachprüfen, dass nur die Person, die auch den privaten Schlüssel zu diesem öffentlichen Schlüssel besitzt, diese Nachricht unterschrieben haben kann. Magisch, richtig? Verstehst du nicht komplett? Nicht schlimm, du benutzt es bereits vermutlich, ohne dass du es merkst. Das ist keine fancy neue Technologie, sondern gut abgehangen und breit im Einsatz.
Merke: User besitzen ein Schlüsselpaar und können damit Nachrichten signieren.
Dann gibt es noch die Services. Services funktionieren im Grunde wie bereits oben beschrieben. Durch sie interagieren die User mit Daten. Aber bei Nostr ist es ein kleines bisschen anders als sonst, denn: Die Daten "leben" nicht in den Services. Aber wo dann?
Wenn ein User einen Datensatz erstellt, verändert oder entfernen möchte, wird dieses "Event" (so nennen wir das bei Nostr) mit deinem privaten Schlüssel signiert (damit ist für alle klar, nur du kannst das gemacht haben) und dann mehrere "Relays" gesendet. Das sind die Orte, wo die Daten gehalten werden. Wenn ein User sich in einen Service einloggt, dann holt sich der Service die Daten, die er braucht von diesen Relays. User, Service und Daten sind also entkoppelt. Der User könnte zu einem anderen Service wechseln und sich dieseleben Daten von den Relays holen. Keine Lock-In Möglichkeiten.
Merke: User, Service und Daten sind entkoppelt.
Zuletzt gibt es noch die Relays. Relays sind Orte. Es sind die Orte, zu denen die Events, also die Daten der User, ihre Interaktionen, gesendet und von denen sie angefragt werden. Sie sind sowas wie das Backend von Nostr, allerdings tun sie nicht viel mehr als das: Events annehmen, Events verteilen. Je nach Konfiguration dürfen nur bestimmte User auf ein Relay schreiben oder davon lesen.
Das Protokoll ist von seinem Grunddesign auf Offenheit und Interoperabilität ausgelegt. Keine Registrierung ist nötig, sondern nur Schlüsselpaare. Durch kryptografische Verfahren kann dennoch die Authentizitität eines Events sichergestellt werden, da nur die Inhaberin des jeweiligen Schlüsselpaares dieses Event so erstellen konnte. Die Relays sorgen dafür die Daten an die gewünschten Stellen zu bringen und da wir mehr als nur eines benutzen, haben wir eine gewisse Ausfallsicherheit. Da die Daten nur aus signierten JSON-Schnipseln bestehen, können wir sie leicht an einen anderen Ort kopieren, im Falle eines Ausfalls. Durch die Signaturen ist wiederum sichergestellt, dass zwischendurch keine Veränderungen an den Daten vorgenommen wurden.
Beispiel: Ein Nostr Event
Hier ein kleiner technischer Exkurs, der beschreibt, wie Nostr Events strukturiert sind. Falls dich die technischen Details nicht so interessieren, überspringe diesen Abschnitt ruhig.
Jedes Nostr Event besitzt die gleiche Grundstruktur mit den Attributen:
id
: Der Hash des Eventspubkey
: Der Pubkey des Urhebers des Eventscreated_at
: Der Zeitstempel des Eventskind
: Der Typ des Eventstags
: Zusätzliche Metadaten für das Event können in diesem Array hinterlegt werdencontent
: Der textuelle Inhalt eines Eventssig
: Die Signatur des Events, um die Integrität der Daten zu überprüfen
json { "id": <32-bytes lowercase hex-encoded sha256 of the serialized event data>, "pubkey": <32-bytes lowercase hex-encoded public key of the event creator>, "created_at": <unix timestamp in seconds>, "kind": <integer between 0 and 65535>, "tags": [ [<arbitrary string>...], // ... ], "content": <arbitrary string>, "sig": <64-bytes lowercase hex of the signature of the sha256 hash of the serialized event data, which is the same as the "id" field> }
Die verwendeten Eventtypen sowie die existierenden Spezifikationen lassen sich unter https://github.com/nostr-protocol/nips/ einsehen.
Wichtig ist auch: Du kannst einfach anfangen, Anwendungen zu entwickeln. Die Relays werden alle Events akzeptieren, die dem o.g. Schema folgen. Du musst also niemanden um Erlaubnis fragen oder warten, bis deine Spezifikation akzeptiert und hinzugefügt wurde.
You can just build things.
Exkurs: Nostr für Binärdaten - Blossom
Ja, aber... das ist doch nur für textbasierte Daten geeignet? Was ist denn mit den Binärdaten (Bilder, Videos, PDFs, etc)
Diese Daten sind oft recht groß und es wurde sich auf das Best-Practice geeignet, diese Daten nicht auf Relays abzulegen, sondern einen besser geeigneten Publikationsmechanismus für diese Datentypen zu finden. Der Ansatz wird als "Blossom - Blobs stored simply on mediaservers" bezeichnet und ist recht unkompliziert.
Blossom Server (nichts anderes als simple Medienserver) nutzen Nostr Schlüsselpaare zur Verwaltung Identitäten und zum Signieren von Events. Die Blobs werden über ihren sha256 Hash identifiziert. Blossom definiert einige standardisierte Endpunkte, die beschreiben wie Medien hochgeladen werden können, wie sie konsumiert werden können usw.
Die Details, wie Authorisierung und die jeweiligen Endpunkte funktionieren, werden in der genannten Spezifikation beschrieben.
Nostr 🤝 Öffentliche Bildungsinfrastrukturen
Wie könnten Herausforderungen gelöst werden, wenn wir Nostr als Basis für die öffentliche Bildungsinfrastruktur einsetzen?
Material-Upload
- Es ist nicht einfach möglich OER bereitzustellen, sodass es auch auf verschiedenen Plattformen gefunden werden kann.
Mit Nostr als Basis-Infrastruktur würden die Metadaten und die Binärdaten nicht an den Service gekoppelt sein, von dem aus sie bereitgestellt wurden. Binärdaten können auf sogenannten Blossom-Servern gehostet werden. Metadaten, Kommentare und weitere textbasierte Daten werden über die Relay-Infrastruktur verteilt. Da Daten und Service entkoppelt sind, können die OER Materialien von verschiedenen Anwendungen aus konsumiert werden.
Kuration
- Es gibt keine interoperablen Sammlungen
- Metadaten-Annotation ist zentralisiert
- User können keine eigenen Metadaten hinzufügen
Sammlungen sind per se interoperabel. Auf Protokollebene ist definiert, wie Listen funktionieren. Die Annotation mit Metadaten ist an keiner Stelle zentralisiert. Das Versprechen der RDF-Community "Anyone can say anything about any topic" wird hier verwirklicht. Ich muss mir ja nicht alles anhören. Vielleicht konsumiere ich nur Metadaten-Events bestimmter Redaktionen oder User. Vielleicht nur diejenigen mit einer Nähe zu meinem sozialen Graphen. Jedenfalls gibt es die Möglichkeit für alle User entsprechende Metadaten bereit zu stellen.
Crawling, Indexierung und Suche * An vielen Stellen wird Content doppelt erschlossen, aber immer für die eigene Plattform * Es gibt keinen geteilten Datenraum, in den Akteure Content "pushen" können * Es gibt keine plattformübergreifenden Suchmöglichkeiten
Keine Doppelerschließungen mehr. Wenn ein User im Netzwerk ein Metadatenevent veröffentlicht hat, ist es für alle konsumierbar. Der Datenraum ist per se geteilt. Plattformübergreifende Suche wird durch die Kombination aus Relays und NIPs ermöglicht. In den NIPs können spezielle Query-Formate für die jeweiligen NIPs definiert werden. Relays können anzeigen, welche NIPs sie untersützten. Eine plattformübergreifende Suche ist im Nostr eine relay-übergreifende Suche.
Plattformübergreifende Kollaboration
- Obwohl nun #OEP in aller Munde sind, gibt es keine technischen Ansätze, wie (plattformübergreifende) Kollaboration technisch abgebildet werden kann
Nostr ist der technische Ansatz.
KI-Services
- KI-Services funktionieren oft nur auf der Plattform für die sie entwickelt werden
Es gibt im Nostr das Konzept der Data Vending Machines (s. auch data-vending-machines.org). Statt also einfach nur eine API zu bauen (was auch schon sehr schön ist, wenn sie offen zugänglich ist), könnten diese Services auch als Akteure im Nostr Netzwerk fungieren und Jobs annehmen und ausführen. Die Art der Jobs kann in einer Spezifikation beschrieben werden, sodass die Funktionsweise für alle interessierten Teilnehmer im Netzwerk einfach nachzuvollziehen ist.
Die Services könnten sogar monetarisiert werden, sodass sich hier auch Möglichkeiten böten, Geschäftsmodelle zu entwickeln.
Fazit
Die Open Education Community ist großartig. Es sind einzigartige und unglaublich engagierte Menschen, die sich dem hehren Ziel "Zugängliche Bildung für Alle" -> "Offene Bildung" verschrieben haben. Wir verwenden Creative Commons Lizenzen -> Commons -> Gemeingüter. Es ist okay, dass viele Projekte von Sponsoren und Förderungen abhängig sind. Was wir machen, ist im Sinne eines Gemeingutes: Öffentliche Bildung für alle. Also zahlen wir als Gemeinschaft alle dafür.
Was nicht okay ist: Dass das, wofür wir alle gezahlt haben, nach kurzer Zeit nicht mehr auffindbar ist. Dass es eingeschlossen wird. In öffentlich finanzierten Datensilos. Es muss für alle auch langfristig verfügbar sein. Sonst ist es nicht zugänglich, nicht offen. Dann ist das O in OER nur ein Label und Marketing, um für eine ABM-Maßnahme 3 Jahre Geld zu bekommen. Denn nichts anderes ist Content-Entwicklung, wenn der Content nach drei Jahren weggeschmissen wird.
Und dasselbe gilt für OEP. Offene Lernpraktiken, sind auch nur eine Phrase, wenn wir die passende technische Infrastruktur nicht mitdenken, die wirkliche Offenheit und Kollaboration und damit die Umsetzung offener Lernpraktiken ermöglicht.
Und wenn wir uns jetzt nicht Gedanken darüber machen, die Infrastruktur für offenes Lernen anzupassen, dann werden wir vermutlich in einigen Jahren sehen können, was bei politischen Umorientierungen noch davon übrig bleiben wird. Wenn die Fördertöpfe komplett gestrichen werden, was bleibt dann übrig von dem investierten Geld?
Wir brauchen Lösungen, die engagierte Communities weiter betreiben können und denen kein Kopf abgeschlagen werden kann, ohne dass wir zwei neue daneben setzen könnten.
Wir müssen uns jetzt Gedanken darüber machen.
Wie offen will öffentliche Bildungsinfrastruktur sein?
-
@ ae8ef557:3633e453
2025-06-17 20:05:43The boy left the piano and ran toward his parents. "Shall we play another song?" In one of those surprisingly magical moments, the three of them were playing together, pretending to be a band: the father with the trumpet, playing distractedly while checking messages on his phone; the mother with the guitar, smiling and listening attentively; the son with the piano, happy. Stumbles in the notes, laughter, joy. "Tomorrow is Monday," she remembered. They stopped and put away the instruments—they could do it another time. There was time. There's always more time, right?
That night, like any other on a typical week, they fulfilled the ritual of dinner at eight, a shower before bed, getting the uniform and backpack ready. Afterward, the quick hug to the father and the long kiss to the mother. In turn, the parents continued with their own routine: checking emails, reading for a while. He went to sleep while she logged on to her computer to teach an online class. The nocturnal silence took over the house, interrupted only by the occasional comment from her lesson.
The scream startled her. Was it coming from a neighbor's house? No, it couldn't be. That slight sensation in her chest, that anguish... She decided to go see how her only son was doing. When she was about to reach the second floor, she heard some moaning. She ran to the room. Her boy, curled up in a ball, and beside the bed, vomit. The forehead first—it was burning—then the abdomen. Another scream tore through her. The father woke up and approached to ask what was happening. "I don't know. Go to sleep, I'll handle it." How many other times had she said that? Without thinking, without considering the weight of the tacit agreement between them, of the comfortable distance he called space.
She lifted her son in her arms, covered him with a blanket, and took him to the emergency room. The bright lights of triage, the familiar waiting, then nurse, and finally, doctor. She knew the procedure by heart. She was always the one who handled these emergencies, who knew the nurses, who knew his medical history —allergies, previous injuries. "The experience of having an athlete son," she used to say. During the examination, the boy remained curled up. "It looks like acute appendicitis," the doctor said. "We need an urgent ultrasound and blood work."
The mother grew impatient between her child's suffering and the staff's slowness. She demanded faster attention, called the nurses over and over. "The CT scan shows perforation with fluid in the abdomen," she heard afterward. "He needs surgery now." When they came rushing and took him, while she waited for the results... it had been because of her demands, surely. She never thought she wouldn't see him again. How could she imagine that emptiness that would take over her chest, to the point of not being able to breathe?
They called the father. He arrived disoriented, like someone arriving in unknown territory, and somewhat worried, not much, because he was used to her taking care of things. The father listened to the doctor's explanation with a distorted face. "I'm very sorry. There were complications. The perforation caused severe sepsis." The man let out a scream that echoed throughout the entire hallway: "He died alone, my God, he died alone." It was the first time in years that he expressed something so profound, and it came too late. A postponed fatherhood concentrated in an instant.
Hadn't the mother been with her son until they took him away? Or the doctor and staff in the operating room? He didn't ask about her, didn't look for her. She wanted to speak, but the words wouldn't come out. If she hadn't been at the hospital, perhaps no one would have comforted her in that terrible moment. She moved because she had to, responded because they asked her. From that night she would only remember her son's face and small hands when she let them go for the last time. Afterward, only the reconstruction of events through the eyes of others: her sister and her parents.
Who thinks about when it will be the last time for anything? The last chess game with the father, the last dinner out with the mother, the last birthday of the favorite aunt. The last frightened squeeze of a small child's hand. They hadn't paid attention. Why would they? You always think there's more time.
The days that followed blurred into a hazy sequence of impossible decisions. Arrangements had to be made. At first, everything seemed suspended, even sadness. A family eclipse where darkness takes everything. You know it's temporary, but you can't glimpse the light. The family gropes around like blind people, and slowly grief sprouts. Decisions are made that will be forgotten: how to tell others, who will speak and who won't. An endless series of unimportant actions in the face of pain invading everything, little by little, to then explode like a volcano. The siblings of both parents and the grandparents crying. The parents in black silence.
The funeral passed. The weeks passed. For the mother, everything was now subordinated to the memory of an ancient life. The habit of picking him up after school or some activity outside, seeing him walk toward the car, seeing him walk away. His voice. His smell. He still smelled like a child—he was still a few months away from his eleventh birthday. He was still her little one. She could take his hand to cross the street, give him a long hug just because, plant a kiss on his cheek. He didn't impose that distance that comes when children start becoming men. Her boy, the storyteller of the childhood world... had departed.
As the months passed, the father withdrew more and more. He came home later and later, hardly spoke. He avoided talking to her. Sometimes, she found him crying in the boy's room. The fragility became evident and the limited kindnesses from one to the other disappeared. The one who was barely there was no longer there. The bridge between two solitudes had disappeared. The family had also died, and so, simply, one afternoon, he didn't return. Without words, without farewell.
-
@ 4ba8e86d:89d32de4
2025-06-17 18:01:47Como funciona o PGP.
GP 6.5.1. Copyright © 1990-1999 Network Associates, Inc. Todos os direitos reservados.
-O que é criptografia? -Criptografia forte -Como funciona a criptografia? -Criptografia convencional -Cifra de César -Gerenciamento de chaves e criptografia convencional -Criptografia de chave pública -Como funciona o PGP - Chaves • Assinaturas digitais -Funções hash • Certificados digitais -Distribuição de certificados -Formatos de certificado •Validade e confiança -Verificando validade -Estabelecendo confiança -Modelos de confiança • Revogação de certificado -Comunicar que um certificado foi revogado -O que é uma senha? -Divisão de chave
Os princípios básicos da criptografia.
Quando Júlio César enviou mensagens aos seus generais, ele não confiou nos seus mensageiros. Então ele substituiu cada A em suas mensagens por um D, cada B por um E, e assim por diante através do alfabeto. Somente alguém que conhecesse a regra “shift by 3” poderia decifrar suas mensagens. E assim começamos.
Criptografia e descriptografia.
Os dados que podem ser lidos e compreendidos sem quaisquer medidas especiais são chamados de texto simples ou texto não criptografado. O método de disfarçar o texto simples de forma a ocultar sua substância é chamado de criptografia. Criptografar texto simples resulta em um jargão ilegível chamado texto cifrado. Você usa criptografia para garantir que as informações sejam ocultadas de qualquer pessoa a quem não se destinam, mesmo daqueles que podem ver os dados criptografados. O processo de reverter o texto cifrado ao texto simples original é chamado de descriptografia . A Figura 1-1 ilustra esse processo.
https://image.nostr.build/0e2fcb71ed86a6083e083abbb683f8c103f44a6c6db1aeb2df10ae51ec97ebe5.jpg
Figura 1-1. Criptografia e descriptografia
O que é criptografia?
Criptografia é a ciência que usa a matemática para criptografar e descriptografar dados. A criptografia permite armazenar informações confidenciais ou transmiti-las através de redes inseguras (como a Internet) para que não possam ser lidas por ninguém, exceto pelo destinatário pretendido. Embora a criptografia seja a ciência que protege os dados, a criptoanálise é a ciência que analisa e quebra a comunicação segura. A criptoanálise clássica envolve uma combinação interessante de raciocínio analítico, aplicação de ferramentas matemáticas, descoberta de padrões, paciência, determinação e sorte. Os criptoanalistas também são chamados de atacantes. A criptologia abrange tanto a criptografia quanto a criptoanálise.
Criptografia forte.
"Existem dois tipos de criptografia neste mundo: a criptografia que impedirá a sua irmã mais nova de ler os seus arquivos, e a criptografia que impedirá os principais governos de lerem os seus arquivos. Este livro é sobre o último." --Bruce Schneier, Criptografia Aplicada: Protocolos, Algoritmos e Código Fonte em C. PGP também trata deste último tipo de criptografia. A criptografia pode ser forte ou fraca, conforme explicado acima. A força criptográfica é medida no tempo e nos recursos necessários para recuperar o texto simples. O resultado de uma criptografia forte é um texto cifrado que é muito difícil de decifrar sem a posse da ferramenta de decodificação apropriada. Quão díficil? Dado todo o poder computacional e o tempo disponível de hoje – mesmo um bilhão de computadores fazendo um bilhão de verificações por segundo – não é possível decifrar o resultado de uma criptografia forte antes do fim do universo. Alguém poderia pensar, então, que uma criptografia forte resistiria muito bem até mesmo contra um criptoanalista extremamente determinado. Quem pode realmente dizer? Ninguém provou que a criptografia mais forte disponível hoje resistirá ao poder computacional de amanhã. No entanto, a criptografia forte empregada pelo PGP é a melhor disponível atualmente.
Contudo, a vigilância e o conservadorismo irão protegê-lo melhor do que as alegações de impenetrabilidade.
Como funciona a criptografia?
Um algoritmo criptográfico, ou cifra, é uma função matemática usada no processo de criptografia e descriptografia. Um algoritmo criptográfico funciona em combinação com uma chave – uma palavra, número ou frase – para criptografar o texto simples. O mesmo texto simples é criptografado em texto cifrado diferente com chaves diferentes. A segurança dos dados criptografados depende inteiramente de duas coisas: a força do algoritmo criptográfico e o sigilo da chave. Um algoritmo criptográfico, mais todas as chaves possíveis e todos os protocolos que o fazem funcionar constituem um criptossistema. PGP é um criptossistema.
Criptografia convencional.
Na criptografia convencional, também chamada de criptografia de chave secreta ou de chave simétrica , uma chave é usada tanto para criptografia quanto para descriptografia. O Data Encryption Standard (DES) é um exemplo de criptossistema convencional amplamente empregado pelo Governo Federal. A Figura 1-2 é uma ilustração do processo de criptografia convencional. https://image.nostr.build/328b73ebaff84c949df2560bbbcec4bc3b5e3a5163d5fbb2ec7c7c60488f894c.jpg
Figura 1-2. Criptografia convencional
Cifra de César.
Um exemplo extremamente simples de criptografia convencional é uma cifra de substituição. Uma cifra de substituição substitui uma informação por outra. Isso é feito com mais frequência compensando as letras do alfabeto. Dois exemplos são o Anel Decodificador Secreto do Capitão Meia-Noite, que você pode ter possuído quando era criança, e a cifra de Júlio César. Em ambos os casos, o algoritmo serve para compensar o alfabeto e a chave é o número de caracteres para compensá-lo. Por exemplo, se codificarmos a palavra "SEGREDO" usando o valor chave de César de 3, deslocaremos o alfabeto para que a terceira letra abaixo (D) comece o alfabeto. Então começando com A B C D E F G H I J K L M N O P Q R S T U V W X Y Z e deslizando tudo para cima em 3, você obtém DEFGHIJKLMNOPQRSTUVWXYZABC onde D=A, E=B, F=C e assim por diante. Usando este esquema, o texto simples, "SECRET" é criptografado como "VHFUHW". Para permitir que outra pessoa leia o texto cifrado, você diz a ela que a chave é 3. Obviamente, esta é uma criptografia extremamente fraca para os padrões atuais, mas, ei, funcionou para César e ilustra como funciona a criptografia convencional.
Gerenciamento de chaves e criptografia convencional.
A criptografia convencional tem benefícios. É muito rápido. É especialmente útil para criptografar dados que não vão a lugar nenhum. No entanto, a criptografia convencional por si só como meio de transmissão segura de dados pode ser bastante cara, simplesmente devido à dificuldade de distribuição segura de chaves. Lembre-se de um personagem do seu filme de espionagem favorito: a pessoa com uma pasta trancada e algemada ao pulso. Afinal, o que há na pasta? Provavelmente não é o código de lançamento de mísseis/fórmula de biotoxina/plano de invasão em si. É a chave que irá descriptografar os dados secretos. Para que um remetente e um destinatário se comuniquem com segurança usando criptografia convencional, eles devem chegar a um acordo sobre uma chave e mantê-la secreta entre si. Se estiverem em locais físicos diferentes, devem confiar em um mensageiro, no Bat Phone ou em algum outro meio de comunicação seguro para evitar a divulgação da chave secreta durante a transmissão. Qualquer pessoa que ouvir ou interceptar a chave em trânsito poderá posteriormente ler, modificar e falsificar todas as informações criptografadas ou autenticadas com essa chave. Do DES ao Anel Decodificador Secreto do Capitão Midnight, o problema persistente com a criptografia convencional é a distribuição de chaves: como você leva a chave ao destinatário sem que alguém a intercepte?
Criptografia de chave pública.
Os problemas de distribuição de chaves são resolvidos pela criptografia de chave pública, cujo conceito foi introduzido por Whitfield Diffie e Martin Hellman em 1975. (Há agora evidências de que o Serviço Secreto Britânico a inventou alguns anos antes de Diffie e Hellman, mas a manteve um segredo militar - e não fez nada com isso.
[JH Ellis: The Possibility of Secure Non-Secret Digital Encryption, CESG Report, January 1970]) A criptografia de chave pública é um esquema assimétrico que usa um par de chaves para criptografia: uma chave pública, que criptografa os dados, e uma chave privada ou secreta correspondente para descriptografia. Você publica sua chave pública para o mundo enquanto mantém sua chave privada em segredo. Qualquer pessoa com uma cópia da sua chave pública pode criptografar informações que somente você pode ler. Até mesmo pessoas que você nunca conheceu. É computacionalmente inviável deduzir a chave privada da chave pública. Qualquer pessoa que possua uma chave pública pode criptografar informações, mas não pode descriptografá-las. Somente a pessoa que possui a chave privada correspondente pode descriptografar as informações. https://image.nostr.build/fdb71ae7a4450a523456827bdd509b31f0250f63152cc6f4ba78df290887318b.jpg
Figura 1-3. Criptografia de chave pública O principal benefício da criptografia de chave pública é que ela permite que pessoas que não possuem nenhum acordo de segurança pré-existente troquem mensagens com segurança. A necessidade de remetente e destinatário compartilharem chaves secretas através de algum canal seguro é eliminada; todas as comunicações envolvem apenas chaves públicas e nenhuma chave privada é transmitida ou compartilhada. Alguns exemplos de criptossistemas de chave pública são Elgamal (nomeado em homenagem a seu inventor, Taher Elgamal), RSA (nomeado em homenagem a seus inventores, Ron Rivest, Adi Shamir e Leonard Adleman), Diffie-Hellman (nomeado, você adivinhou, em homenagem a seus inventores). ) e DSA, o algoritmo de assinatura digital (inventado por David Kravitz). Como a criptografia convencional já foi o único meio disponível para transmitir informações secretas, o custo dos canais seguros e da distribuição de chaves relegou a sua utilização apenas àqueles que podiam pagar, como governos e grandes bancos (ou crianças pequenas com anéis descodificadores secretos). A criptografia de chave pública é a revolução tecnológica que fornece criptografia forte para as massas adultas. Lembra do mensageiro com a pasta trancada e algemada ao pulso? A criptografia de chave pública o tira do mercado (provavelmente para seu alívio).
Como funciona o PGP.
O PGP combina alguns dos melhores recursos da criptografia convencional e de chave pública. PGP é um criptossistema híbrido. Quando um usuário criptografa texto simples com PGP, o PGP primeiro compacta o texto simples. A compactação de dados economiza tempo de transmissão do modem e espaço em disco e, mais importante ainda, fortalece a segurança criptográfica. A maioria das técnicas de criptoanálise explora padrões encontrados no texto simples para quebrar a cifra. A compressão reduz esses padrões no texto simples, aumentando assim enormemente a resistência à criptoanálise. (Arquivos que são muito curtos para compactar ou que não são compactados bem não são compactados.) O PGP então cria uma chave de sessão, que é uma chave secreta única. Esta chave é um número aleatório gerado a partir dos movimentos aleatórios do mouse e das teclas digitadas. Esta chave de sessão funciona com um algoritmo de criptografia convencional rápido e muito seguro para criptografar o texto simples; o resultado é texto cifrado. Depois que os dados são criptografados, a chave da sessão é criptografada na chave pública do destinatário. Essa chave de sessão criptografada com chave pública é transmitida junto com o texto cifrado ao destinatário.
Figura 1-4. Como funciona a criptografia PGP A descriptografia funciona ao contrário. A cópia do PGP do destinatário usa sua chave privada para recuperar a chave de sessão temporária, que o PGP usa para descriptografar o texto cifrado criptografado convencionalmente.
Figura 1-5. Como funciona a descriptografia PGP A combinação dos dois métodos de criptografia combina a conveniência da criptografia de chave pública com a velocidade da criptografia convencional. A criptografia convencional é cerca de 1.000 vezes mais rápida que a criptografia de chave pública. A criptografia de chave pública, por sua vez, fornece uma solução para
problemas de distribuição de chaves e transmissão de dados. Usados em conjunto, o desempenho e a distribuição de chaves são melhorados sem qualquer sacrifício na segurança.
Chaves.
Uma chave é um valor que funciona com um algoritmo criptográfico para produzir um texto cifrado específico. As chaves são basicamente números muito, muito, muito grandes. O tamanho da chave é medido em bits; o número que representa uma chave de 1024 bits é enorme. Na criptografia de chave pública, quanto maior a chave, mais seguro é o texto cifrado. No entanto, o tamanho da chave pública e o tamanho da chave secreta da criptografia convencional não têm nenhuma relação. Uma chave convencional de 80 bits tem a força equivalente a uma chave pública de 1.024 bits. Uma chave convencional de 128 bits é equivalente a uma chave pública de 3.000 bits. Novamente, quanto maior a chave, mais segura, mas os algoritmos usados para cada tipo de criptografia são muito diferentes e, portanto, a comparação é como a de maçãs com laranjas. Embora as chaves pública e privada estejam matematicamente relacionadas, é muito difícil derivar a chave privada dada apenas a chave pública; no entanto, derivar a chave privada é sempre possível, desde que haja tempo e capacidade computacional suficientes. Isto torna muito importante escolher chaves do tamanho certo; grande o suficiente para ser seguro, mas pequeno o suficiente para ser aplicado rapidamente. Além disso, você precisa considerar quem pode estar tentando ler seus arquivos, quão determinados eles estão, quanto tempo têm e quais podem ser seus recursos. Chaves maiores serão criptograficamente seguras por um longo período de tempo. Se o que você deseja criptografar precisar ficar oculto por muitos anos, você pode usar uma chave muito grande. Claro, quem sabe quanto tempo levará para determinar sua chave usando os computadores mais rápidos e eficientes de amanhã? Houve um tempo em que uma chave simétrica de 56 bits era considerada extremamente segura. As chaves são armazenadas de forma criptografada. O PGP armazena as chaves em dois arquivos no seu disco rígido; um para chaves públicas e outro para chaves privadas. Esses arquivos são chamados de chaveiros. Ao usar o PGP, você normalmente adicionará as chaves públicas dos seus destinatários ao seu chaveiro público. Suas chaves privadas são armazenadas em seu chaveiro privado. Se você perder seu chaveiro privado, não será possível descriptografar nenhuma informação criptografada nas chaves desse anel.
Assinaturas digitais.
Um grande benefício da criptografia de chave pública é que ela fornece um método para empregar assinaturas digitais. As assinaturas digitais permitem ao destinatário da informação verificar a autenticidade da origem da informação e também verificar se a informação está intacta. Assim, as assinaturas digitais de chave pública fornecem autenticação e integridade de dados. A assinatura digital também proporciona o não repúdio, o que significa que evita que o remetente alegue que não enviou realmente as informações. Esses recursos são tão fundamentais para a criptografia quanto a privacidade, se não mais. Uma assinatura digital tem a mesma finalidade de uma assinatura manuscrita. No entanto, uma assinatura manuscrita é fácil de falsificar. Uma assinatura digital é superior a uma assinatura manuscrita porque é quase impossível de ser falsificada, além de atestar o conteúdo da informação, bem como a identidade do signatário.
Algumas pessoas tendem a usar mais assinaturas do que criptografia. Por exemplo, você pode não se importar se alguém souber que você acabou de depositar US$ 1.000 em sua conta, mas quer ter certeza de que foi o caixa do banco com quem você estava lidando. A maneira básica pela qual as assinaturas digitais são criadas é ilustrada na Figura 1-6 . Em vez de criptografar informações usando a chave pública de outra pessoa, você as criptografa com sua chave privada. Se as informações puderem ser descriptografadas com sua chave pública, elas deverão ter se originado em você.
Figura 1-6. Assinaturas digitais simples
Funções hash.
O sistema descrito acima apresenta alguns problemas. É lento e produz um enorme volume de dados – pelo menos o dobro do tamanho da informação original. Uma melhoria no esquema acima é a adição de uma função hash unidirecional no processo. Uma função hash unidirecional recebe uma entrada de comprimento variável – neste caso, uma mensagem de qualquer comprimento, até mesmo milhares ou milhões de bits – e produz uma saída de comprimento fixo; digamos, 160 bits. A função hash garante que, se a informação for alterada de alguma forma – mesmo que por apenas um bit – seja produzido um valor de saída totalmente diferente. O PGP usa uma função hash criptograficamente forte no texto simples que o usuário está assinando. Isso gera um item de dados de comprimento fixo conhecido como resumo da mensagem. (Novamente, qualquer alteração nas informações resulta em um resumo totalmente diferente.) Então o PGP usa o resumo e a chave privada para criar a “assinatura”. O PGP transmite a assinatura e o texto simples juntos. Ao receber a mensagem, o destinatário utiliza o PGP para recalcular o resumo, verificando assim a assinatura. O PGP pode criptografar o texto simples ou não; assinar texto simples é útil se alguns dos destinatários não estiverem interessados ou não forem capazes de verificar a assinatura. Desde que uma função hash segura seja usada, não há como retirar a assinatura de alguém de um documento e anexá-la a outro, ou alterar uma mensagem assinada de qualquer forma. A menor alteração em um documento assinado causará falha no processo de verificação da assinatura digital.
Figura 1-7. Assinaturas digitais seguras As assinaturas digitais desempenham um papel importante na autenticação e validação de chaves de outros usuários PGP.
Certificados digitais.
Um problema com os criptosistemas de chave pública é que os usuários devem estar constantemente vigilantes para garantir que estão criptografando com a chave da pessoa correta. Num ambiente onde é seguro trocar chaves livremente através de servidores públicos, os ataques man-in-the-middle são uma ameaça potencial. Neste tipo de ataque, alguém publica uma chave falsa com o nome e ID de usuário do destinatário pretendido. Os dados criptografados – e interceptados por – o verdadeiro proprietário desta chave falsa estão agora em mãos erradas. Em um ambiente de chave pública, é vital que você tenha certeza de que a chave pública para a qual você está criptografando os dados é de fato a chave pública do destinatário pretendido e não uma falsificação. Você pode simplesmente criptografar apenas as chaves que foram entregues fisicamente a você. Mas suponha que você precise trocar informações com pessoas que nunca conheceu; como você pode saber se tem a chave correta? Os certificados digitais, ou certs, simplificam a tarefa de estabelecer se uma chave pública realmente pertence ao suposto proprietário. Um certificado é uma forma de credencial. Exemplos podem ser sua carteira de motorista, seu cartão de previdência social ou sua certidão de nascimento. Cada um deles contém algumas informações que identificam você e alguma autorização informando que outra pessoa confirmou sua identidade. Alguns certificados, como o seu passaporte, são uma confirmação importante o suficiente da sua identidade para que você não queira perdê-los, para que ninguém os use para se passar por você.
Um certificado digital são dados que funcionam como um certificado físico. Um certificado digital é uma informação incluída na chave pública de uma pessoa que ajuda outras pessoas a verificar se uma chave é genuína ou válida. Os certificados digitais são usados para impedir tentativas de substituir a chave de uma pessoa por outra.
Um certificado digital consiste em três coisas:
● Uma chave pública.
● Informações do certificado. (Informações de "identidade" sobre o usuário, como nome, ID do usuário e assim por diante.) ● Uma ou mais assinaturas digitais.
O objetivo da assinatura digital em um certificado é afirmar que as informações do certificado foram atestadas por alguma outra pessoa ou entidade. A assinatura digital não atesta a autenticidade do certificado como um todo; ele atesta apenas que as informações de identidade assinadas acompanham ou estão vinculadas à chave pública. Assim, um certificado é basicamente uma chave pública com uma ou duas formas de identificação anexadas, além de um forte selo de aprovação de algum outro indivíduo confiável.
Figura 1-8. Anatomia de um certificado PGP
Distribuição de certificados.
Os certificados são utilizados quando é necessário trocar chaves públicas com outra pessoa. Para pequenos grupos de pessoas que desejam se comunicar com segurança, é fácil trocar manualmente disquetes ou e-mails contendo a chave pública de cada proprietário. Esta é a distribuição manual de chave pública e é prática apenas até certo ponto. Além desse ponto, é necessário implementar sistemas que possam fornecer os mecanismos necessários de segurança, armazenamento e troca para que colegas de trabalho, parceiros de negócios ou estranhos possam se comunicar, se necessário. Eles podem vir na forma de repositórios somente de armazenamento, chamados Servidores de Certificados, ou sistemas mais estruturados que fornecem recursos adicionais de gerenciamento de chaves e são chamados de Infraestruturas de Chave Pública (PKIs).
Servidores de certificados.
Um servidor de certificados, também chamado de servidor certificado ou servidor de chaves, é um banco de dados que permite aos usuários enviar e recuperar certificados digitais. Um servidor certificado geralmente fornece alguns recursos administrativos que permitem que uma empresa mantenha suas políticas de segurança – por exemplo, permitindo que apenas as chaves que atendam a determinados requisitos sejam armazenadas.
Infraestruturas de Chave Pública.
Uma PKI contém os recursos de armazenamento de certificados de um servidor de certificados, mas também fornece recursos de gerenciamento de certificados (a capacidade de emitir, revogar, armazenar, recuperar e confiar em certificados). A principal característica de uma PKI é a introdução do que é conhecido como Autoridade Certificadora,ou CA, que é uma entidade humana — uma pessoa, grupo, departamento, empresa ou outra associação — que uma organização autorizou a emitir certificados para seus usuários de computador. (A função de uma CA é análoga à do Passport Office do governo de um país.) Uma CA cria certificados e os assina digitalmente usando a chave privada da CA. Devido ao seu papel na criação de certificados, a CA é o componente central de uma PKI. Usando a chave pública da CA, qualquer pessoa que queira verificar a autenticidade de um certificado verifica a assinatura digital da CA emissora e, portanto, a integridade do conteúdo do certificado (mais importante ainda, a chave pública e a identidade do titular do certificado).
Formatos de certificado.
Um certificado digital é basicamente uma coleção de informações de identificação vinculadas a uma chave pública e assinadas por um terceiro confiável para provar sua autenticidade. Um certificado digital pode ter vários formatos diferentes.
O PGP reconhece dois formatos de certificado diferentes:
● Certificados PGP ● Certificados X.509 Formato do certificado PGP. Um certificado PGP inclui (mas não está limitado a) as seguintes informações: ● O número da versão do PGP — identifica qual versão do PGP foi usada para criar a chave associada ao certificado. A chave pública do titular do certificado — a parte pública do seu par de chaves, juntamente com o algoritmo da chave: RSA, DH (Diffie-Hellman) ou DSA (Algoritmo de Assinatura Digital).
● As informações do detentor do certificado — consistem em informações de “identidade” sobre o usuário, como seu nome, ID de usuário, fotografia e assim por diante. ● A assinatura digital do proprietário do certificado — também chamada de autoassinatura, é a assinatura que utiliza a chave privada correspondente da chave pública associada ao certificado. ● O período de validade do certificado — a data/hora de início e a data/hora de expiração do certificado; indica quando o certificado irá expirar. ● O algoritmo de criptografia simétrica preferido para a chave — indica o algoritmo de criptografia para o qual o proprietário do certificado prefere que as informações sejam criptografadas. Os algoritmos suportados são CAST, IDEA ou Triple-DES. Você pode pensar em um certificado PGP como uma chave pública com um ou mais rótulos vinculados a ele (veja a Figura 1.9 ). Nessas 'etiquetas' você encontrará informações que identificam o proprietário da chave e uma assinatura do proprietário da chave, que afirma que a chave e a identificação andam juntas. (Essa assinatura específica é chamada de autoassinatura; todo certificado PGP contém uma autoassinatura.) Um aspecto único do formato de certificado PGP é que um único certificado pode conter múltiplas assinaturas. Várias ou muitas pessoas podem assinar o par chave/identificação para atestar a sua própria garantia de que a chave pública pertence definitivamente ao proprietário especificado. Se você procurar em um servidor de certificados público, poderá notar que certos certificados, como o do criador do PGP, Phil Zimmermann, contêm muitas assinaturas. Alguns certificados PGP consistem em uma chave pública com vários rótulos, cada um contendo um meio diferente de identificar o proprietário da chave (por exemplo, o nome do proprietário e a conta de e-mail corporativa, o apelido do proprietário e a conta de e-mail residencial, uma fotografia do proprietário — tudo em um certificado). A lista de assinaturas de cada uma dessas identidades pode ser diferente; as assinaturas atestam a autenticidade de que um dos rótulos pertence à chave pública, e não que todos os rótulos da chave sejam autênticos. (Observe que 'autêntico' está nos olhos de quem vê - assinaturas são opiniões, e diferentes pessoas dedicam diferentes níveis de devida diligência na verificação da autenticidade antes de assinar uma chave.)
Figura 1-9. Um certificado PGP
Formato de certificado X.509.
X.509 é outro formato de certificado muito comum. Todos os certificados X.509 estão em conformidade com o padrão internacional ITU-T X.509; assim (teoricamente) os certificados X.509 criados para um aplicativo podem ser usados por qualquer aplicativo compatível com X.509. Na prática, porém, diferentes empresas criaram suas próprias extensões para certificados X.509, e nem todas funcionam juntas. Um certificado exige que alguém valide que uma chave pública e o nome do proprietário da chave andam juntos. Com os certificados PGP, qualquer pessoa pode desempenhar o papel de validador. Com certificados X.509, o validador é sempre uma Autoridade Certificadora ou alguém designado por uma CA. (Tenha em mente que os certificados PGP também suportam totalmente uma estrutura hierárquica usando uma CA para validar certificados.)
Um certificado X.509 é uma coleção de um conjunto padrão de campos contendo informações sobre um usuário ou dispositivo e sua chave pública correspondente. O padrão X.509 define quais informações vão para o certificado e descreve como codificá-lo (o formato dos dados). Todos os certificados X.509 possuem os seguintes dados:
O número da versão X.509
— identifica qual versão do padrão X.509 se aplica a este certificado, o que afeta quais informações podem ser especificadas nele. A mais atual é a versão 3.
A chave pública do titular do certificado
— a chave pública do titular do certificado, juntamente com um identificador de algoritmo que especifica a qual sistema criptográfico a chave pertence e quaisquer parâmetros de chave associados.
O número de série do certificado
— a entidade (aplicação ou pessoa) que criou o certificado é responsável por atribuir-lhe um número de série único para distingui-lo de outros certificados que emite. Esta informação é usada de diversas maneiras; por exemplo, quando um certificado é revogado, seu número de série é colocado em uma Lista de Revogação de Certificados ou CRL.
O identificador exclusivo do detentor do certificado
— (ou DN — nome distinto). Este nome pretende ser exclusivo na Internet. Este nome pretende ser exclusivo na Internet. Um DN consiste em múltiplas subseções e pode ser parecido com isto: CN=Bob Allen, OU=Divisão Total de Segurança de Rede, O=Network Associates, Inc., C=EUA (Referem-se ao nome comum, à unidade organizacional, à organização e ao país do sujeito .)
O período de validade do certificado
— a data/hora de início e a data/hora de expiração do certificado; indica quando o certificado irá expirar.
O nome exclusivo do emissor do certificado
— o nome exclusivo da entidade que assinou o certificado. Normalmente é uma CA. A utilização do certificado implica confiar na entidade que assinou este certificado. (Observe que em alguns casos, como certificados de CA raiz ou de nível superior , o emissor assina seu próprio certificado.)
A assinatura digital do emitente
— a assinatura utilizando a chave privada da entidade que emitiu o certificado.
O identificador do algoritmo de assinatura
— identifica o algoritmo usado pela CA para assinar o certificado.
Existem muitas diferenças entre um certificado X.509 e um certificado PGP, mas as mais importantes são as seguintes: você pode criar seu próprio certificado PGP;
● você deve solicitar e receber um certificado X.509 de uma autoridade de certificação
● Os certificados X.509 suportam nativamente apenas um único nome para o proprietário da chave
● Os certificados X.509 suportam apenas uma única assinatura digital para atestar a validade da chave
Para obter um certificado X.509, você deve solicitar a uma CA a emissão de um certificado. Você fornece sua chave pública, prova de que possui a chave privada correspondente e algumas informações específicas sobre você. Em seguida, você assina digitalmente as informações e envia o pacote completo – a solicitação de certificado – para a CA. A CA então realiza algumas diligências para verificar se as informações fornecidas estão corretas e, em caso afirmativo, gera o certificado e o devolve.
Você pode pensar em um certificado X.509 como um certificado de papel padrão (semelhante ao que você recebeu ao concluir uma aula de primeiros socorros básicos) com uma chave pública colada nele. Ele contém seu nome e algumas informações sobre você, além da assinatura da pessoa que o emitiu para você.
Figura 1-10. Um certificado X.509 Provavelmente, o uso mais visível dos certificados X.509 atualmente é em navegadores da web.
Validade e confiança Cada usuário em um sistema de chave pública está vulnerável a confundir uma chave falsa (certificado) com uma chave real. Validade é a confiança de que um certificado de chave pública pertence ao seu suposto proprietário. A validade é essencial em um ambiente de chave pública onde você deve estabelecer constantemente se um determinado certificado é autêntico ou não. Depois de ter certeza de que um certificado pertencente a outra pessoa é válido, você pode assinar a cópia em seu chaveiro para atestar que verificou o certificado e que ele é autêntico. Se quiser que outras pessoas saibam que você deu ao certificado seu selo de aprovação, você pode exportar a assinatura para um servidor de certificados para que outras pessoas possam vê-la.
Conforme descrito na seção Infraestruturas de Chave Pública , algumas empresas designam uma ou mais Autoridades de Certificação (CAs) para indicar a validade do certificado. Em uma organização que usa uma PKI com certificados X.509, é função da CA emitir certificados aos usuários — um processo que geralmente envolve responder à solicitação de certificado do usuário. Em uma organização que usa certificados PGP sem PKI, é função da CA verificar a autenticidade de todos os certificados PGP e depois assinar os bons. Basicamente, o objetivo principal de uma CA é vincular uma chave pública às informações de identificação contidas no certificado e, assim, garantir a terceiros que algum cuidado foi tomado para garantir que esta ligação das informações de identificação e da chave seja válida. O CA é o Grand Pooh-bah da validação em uma organização; alguém em quem todos confiam e, em algumas organizações, como aquelas que utilizam uma PKI, nenhum certificado é considerado válido, a menos que tenha sido assinado por uma CA confiável.
Verificando validade.
Uma maneira de estabelecer a validade é passar por algum processo manual. Existem várias maneiras de fazer isso. Você pode exigir que o destinatário pretendido lhe entregue fisicamente uma cópia de sua chave pública. Mas isto é muitas vezes inconveniente e ineficiente. Outra forma é verificar manualmente a impressão digital do certificado. Assim como as impressões digitais de cada ser humano são únicas, a impressão digital de cada certificado PGP é única. A impressão digital é um hash do certificado do usuário e aparece como uma das propriedades do certificado. No PGP, a impressão digital pode aparecer como um número hexadecimal ou uma série das chamadas palavras biométricas, que são foneticamente distintas e são usadas para facilitar um pouco o processo de identificação da impressão digital. Você pode verificar se um certificado é válido ligando para o proprietário da chave (para que você origine a transação) e pedindo ao proprietário que leia a impressão digital de sua chave para você e compare essa impressão digital com aquela que você acredita ser a verdadeira. Isso funciona se você conhece a voz do proprietário, mas como verificar manualmente a identidade de alguém que você não conhece? Algumas pessoas colocam a impressão digital de sua chave em seus cartões de visita exatamente por esse motivo. Outra forma de estabelecer a validade do certificado de alguém é confiar que um terceiro indivíduo passou pelo processo de validação do mesmo. Uma CA, por exemplo, é responsável por garantir que, antes de emitir um certificado, ele ou ela o verifique cuidadosamente para ter certeza de que a parte da chave pública realmente pertence ao suposto proprietário. Qualquer pessoa que confie na CA considerará automaticamente quaisquer certificados assinados pela CA como válidos. Outro aspecto da verificação da validade é garantir que o certificado não foi revogado. Para obter mais informações, consulte a seção Revogação de certificado .
Estabelecendo confiança.
Você valida certificados. Você confia nas pessoas. Mais especificamente, você confia nas pessoas para validar os certificados de outras pessoas. Normalmente, a menos que o proprietário lhe entregue o certificado, você terá que confiar na palavra de outra pessoa de que ele é válido.
Introdutores meta e confiáveis.
Na maioria das situações, as pessoas confiam completamente na CA para estabelecer a validade dos certificados. Isso significa que todos os demais dependem da CA para passar por todo o processo de validação manual. Isso é aceitável até um certo número de usuários ou locais de trabalho e, então, não é possível para a AC manter o mesmo nível de validação de qualidade. Nesse caso, é necessário adicionar outros validadores ao sistema.
Um CA também pode ser um meta- introdutor. Um meta-introdutor confere não apenas validade às chaves, mas também confere a capacidade de confiar nas chaves a outros. Semelhante ao rei que entrega seu selo a seus conselheiros de confiança para que eles possam agir de acordo com sua autoridade, o meta-introdutor permite que outros atuem como introdutores de confiança. Esses introdutores confiáveis podem validar chaves com o mesmo efeito do meta-introdutor. Eles não podem, entretanto, criar novos introdutores confiáveis.
Meta-introdutor e introdutor confiável são termos PGP. Em um ambiente X.509, o meta-introdutor é chamado de Autoridade de Certificação raiz ( CA raiz) e os introdutores confiáveis são Autoridades de Certificação subordinadas . A CA raiz usa a chave privada associada a um tipo de certificado especial denominado certificado CA raiz para assinar certificados. Qualquer certificado assinado pelo certificado CA raiz é visto como válido por qualquer outro certificado assinado pela raiz. Este processo de validação funciona mesmo para certificados assinados por outras CAs no sistema — desde que o certificado da CA raiz tenha assinado o certificado da CA subordinada, qualquer certificado assinado pela CA será considerado válido para outras pessoas dentro da hierarquia. Este processo de verificação de backup por meio do sistema para ver quem assinou cujo certificado é chamado de rastreamento de um caminho de certificação ou cadeia de certificação.
Modelos de confiança.
Em sistemas relativamente fechados, como em uma pequena empresa, é fácil rastrear um caminho de certificação até a CA raiz. No entanto, os usuários muitas vezes precisam se comunicar com pessoas fora do seu ambiente corporativo, incluindo algumas que nunca conheceram, como fornecedores, consumidores, clientes, associados e assim por diante. É difícil estabelecer uma linha de confiança com aqueles em quem sua CA não confia explicitamente. As empresas seguem um ou outro modelo de confiança, que determina como os usuários irão estabelecer a validade do certificado. Existem três modelos diferentes:
Confiança Direta.
Confiança Hierárquica Uma teia de confiança Confiança direta A confiança direta é o modelo de confiança mais simples. Neste modelo, um usuário confia que uma chave é válida porque sabe de onde ela veio. Todos os criptosistemas usam essa forma de confiança de alguma forma. Por exemplo, em navegadores da Web, as chaves raiz da Autoridade de Certificação são diretamente confiáveis porque foram enviadas pelo fabricante. Se houver alguma forma de hierarquia, ela se estenderá a partir desses certificados diretamente confiáveis. No PGP, um usuário que valida as chaves e nunca define outro certificado para ser um introdutor confiável está usando confiança direta.
Figura 1-11. Confiança direta
Confiança Hierárquica.
Em um sistema hierárquico, há vários certificados "raiz" a partir dos quais a confiança se estende. Esses certificados podem certificar eles próprios certificados ou podem certificar certificados que certificam ainda outros certificados em alguma cadeia. Considere isso como uma grande “árvore” de confiança. A validade do certificado "folha" é verificada rastreando desde seu certificador até outros certificadores, até que um certificado raiz diretamente confiável seja encontrado.
Figura 1-12. Confiança hierárquica
Teia de Confiança.
Uma teia de confiança abrange ambos os outros modelos, mas também acrescenta a noção de que a confiança está nos olhos de quem vê (que é a visão do mundo real) e a ideia de que mais informação é melhor. É, portanto, um modelo de confiança cumulativa. Um certificado pode ser confiável diretamente ou confiável em alguma cadeia que remonta a um certificado raiz diretamente confiável (o meta-introdutor) ou por algum grupo de introdutores.
Talvez você já tenha ouvido falar do termo seis graus de separação, que sugere que qualquer pessoa no mundo pode determinar algum vínculo com qualquer outra pessoa no mundo usando seis ou menos outras pessoas como intermediários. Esta é uma teia de introdutores. É também a visão de confiança do PGP. PGP usa assinaturas digitais como forma de introdução. Quando qualquer usuário assina a chave de outro, ele ou ela se torna o introdutor dessa chave. À medida que esse processo avança, ele estabelece uma rede de confiança.
Em um ambiente PGP, qualquer usuário pode atuar como autoridade certificadora. Qualquer usuário PGP pode validar o certificado de chave pública de outro usuário PGP. No entanto, tal certificado só é válido para outro usuário se a parte confiável reconhecer o validador como um introdutor confiável. (Ou seja, você confia na minha opinião de que as chaves dos outros são válidas apenas se você me considerar um apresentador confiável. Caso contrário, minha opinião sobre a validade das outras chaves é discutível.) Armazenados no chaveiro público de cada usuário estão indicadores de
● se o usuário considera ou não uma chave específica válida
● o nível de confiança que o usuário deposita na chave que o proprietário da chave pode servir como certificador das chaves de terceiros
Você indica, na sua cópia da minha chave, se acha que meu julgamento conta. Na verdade, é um sistema de reputação: certas pessoas têm a reputação de fornecer boas assinaturas e as pessoas confiam nelas para atestar a validade de outras chaves.
Níveis de confiança no PGP.
O nível mais alto de confiança em uma chave, a confiança implícita , é a confiança em seu próprio par de chaves. O PGP assume que se você possui a chave privada, você deve confiar nas ações da sua chave pública relacionada. Quaisquer chaves assinadas pela sua chave implicitamente confiável são válidas.
Existem três níveis de confiança que você pode atribuir à chave pública de outra pessoa:
● Confiança total ● Confiança marginal ● Não confiável (ou não confiável)
Para tornar as coisas confusas, também existem três níveis de validade:
● Válido ● Marginalmente válido ● Inválido
Para definir a chave de outra pessoa como um introdutor confiável, você
- Comece com uma chave válida, que seja.
- assinado por você ou
-
assinado por outro apresentador confiável e então
-
Defina o nível de confiança que você acha que o proprietário da chave tem direito.
Por exemplo, suponha que seu chaveiro contenha a chave de Alice. Você validou a chave de Alice e indica isso assinando-a. Você sabe que Alice é uma verdadeira defensora da validação de chaves de outras pessoas. Portanto, você atribui a chave dela com confiança total. Isso faz de Alice uma Autoridade Certificadora. Se Alice assinar a chave de outra pessoa, ela aparecerá como Válida em seu chaveiro. O PGP requer uma assinatura Totalmente confiável ou duas assinaturas Marginalmente confiáveis para estabelecer uma chave como válida. O método do PGP de considerar dois Marginais iguais a um Completo é semelhante a um comerciante que solicita duas formas de identificação. Você pode considerar Alice bastante confiável e também considerar Bob bastante confiável. Qualquer um deles sozinho corre o risco de assinar acidentalmente uma chave falsificada, portanto, você pode não depositar total confiança em nenhum deles. No entanto, as probabilidades de ambos os indivíduos terem assinado a mesma chave falsa são provavelmente pequenas.
Revogação de certificado.
Os certificados só são úteis enquanto são válidos. Não é seguro simplesmente presumir que um certificado é válido para sempre. Na maioria das organizações e em todas as PKIs, os certificados têm uma vida útil restrita. Isso restringe o período em que um sistema fica vulnerável caso ocorra um comprometimento do certificado.
Os certificados são assim criados com um período de validade programado: uma data/hora de início e uma data/hora de expiração. Espera-se que o certificado seja utilizável durante todo o seu período de validade (seu tempo de vida ). Quando o certificado expirar, ele não será mais válido, pois a autenticidade do seu par chave/identificação não estará mais garantida. (O certificado ainda pode ser usado com segurança para reconfirmar informações que foram criptografadas ou assinadas dentro do período de validade – no entanto, ele não deve ser confiável para tarefas criptográficas futuras.)
Existem também situações em que é necessário invalidar um certificado antes da sua data de expiração, como quando o titular do certificado termina o contrato de trabalho com a empresa ou suspeita que a chave privada correspondente do certificado foi comprometida. Isso é chamado de revogação. Um certificado revogado é muito mais suspeito do que um certificado expirado. Os certificados expirados são inutilizáveis, mas não apresentam a mesma ameaça de comprometimento que um certificado revogado. Qualquer pessoa que tenha assinado um certificado pode revogar a sua assinatura no certificado (desde que utilize a mesma chave privada que criou a assinatura). Uma assinatura revogada indica que o signatário não acredita mais que a chave pública e as informações de identificação pertencem uma à outra, ou que a chave pública do certificado (ou a chave privada correspondente) foi comprometida. Uma assinatura revogada deve ter quase tanto peso quanto um certificado revogado. Com certificados X.509, uma assinatura revogada é praticamente igual a um certificado revogado, visto que a única assinatura no certificado é aquela que o tornou válido em primeiro lugar – a assinatura da CA. Os certificados PGP fornecem o recurso adicional de que você pode revogar todo o seu certificado (não apenas as assinaturas nele) se você achar que o certificado foi comprometido. Somente o proprietário do certificado (o detentor da chave privada correspondente) ou alguém que o proprietário do certificado tenha designado como revogador pode revogar um certificado PGP. (Designar um revogador é uma prática útil, pois muitas vezes é a perda da senha da chave privada correspondente do certificado que leva um usuário PGP a revogar seu certificado - uma tarefa que só é possível se alguém tiver acesso à chave privada. ) Somente o emissor do certificado pode revogar um certificado X.509.
Comunicar que um certificado foi revogado.
Quando um certificado é revogado, é importante conscientizar os usuários potenciais do certificado de que ele não é mais válido. Com certificados PGP, a maneira mais comum de comunicar que um certificado foi revogado é publicá-lo em um servidor de certificados para que outras pessoas que desejem se comunicar com você sejam avisadas para não usar essa chave pública. Em um ambiente PKI, a comunicação de certificados revogados é mais comumente obtida por meio de uma estrutura de dados chamada Lista de Revogação de Certificados, ou CRL, que é publicada pela CA. A CRL contém uma lista validada com carimbo de data e hora de todos os certificados revogados e não expirados no sistema. Os certificados revogados permanecem na lista apenas até expirarem e, em seguida, são removidos da lista — isso evita que a lista fique muito longa. A CA distribui a CRL aos usuários em algum intervalo programado regularmente (e potencialmente fora do ciclo, sempre que um certificado é revogado). Teoricamente, isso impedirá que os usuários usem involuntariamente um certificado comprometido. É possível, no entanto, que haja um período de tempo entre as CRLs em que um certificado recentemente comprometido seja usado.
O que é uma senha?
A maioria das pessoas está familiarizada com a restrição de acesso a sistemas de computador por meio de uma senha, que é uma sequência única de caracteres que um usuário digita como código de identificação.
Uma senha longa é uma versão mais longa de uma senha e, em teoria, mais segura. Normalmente composta por várias palavras, uma frase secreta é mais segura contra ataques de dicionário padrão, em que o invasor tenta todas as palavras do dicionário na tentativa de determinar sua senha. As melhores senhas são relativamente longas e complexas e contêm uma combinação de letras maiúsculas e minúsculas, caracteres numéricos e de pontuação. O PGP usa uma senha para criptografar sua chave privada em sua máquina. Sua chave privada é criptografada em seu disco usando um hash de sua senha como chave secreta. Você usa a senha para descriptografar e usar sua chave privada. Uma senha deve ser difícil de esquecer e difícil de ser adivinhada por outras pessoas. Deve ser algo já firmemente enraizado na sua memória de longo prazo, em vez de algo que você invente do zero. Por que? Porque se você esquecer sua senha, você estará sem sorte. Sua chave privada é total e absolutamente inútil sem sua senha e nada pode ser feito a respeito. Lembra-se da citação anterior neste capítulo?
PGP é a criptografia que manterá os principais governos fora dos seus arquivos. Certamente também o manterá fora de seus arquivos. Tenha isso em mente quando decidir alterar sua senha para a piada daquela piada que você nunca consegue lembrar.
Divisão de chave.
Dizem que um segredo não é segredo se for conhecido por mais de uma pessoa. Compartilhar um par de chaves privadas representa um grande problema. Embora não seja uma prática recomendada, às vezes é necessário compartilhar um par de chaves privadas. Chaves de assinatura corporativa, por exemplo, são chaves privadas usadas por uma empresa para assinar – por exemplo – documentos legais, informações pessoais confidenciais ou comunicados de imprensa para autenticar sua origem. Nesse caso, vale a pena que vários membros da empresa tenham acesso à chave privada. No entanto, isto significa que qualquer indivíduo pode agir plenamente em nome da empresa. Nesse caso, é aconselhável dividir a chave entre várias pessoas, de modo que mais de uma ou duas pessoas apresentem um pedaço da chave para reconstituí-la em condições utilizáveis. Se poucas peças da chave estiverem disponíveis, a chave ficará inutilizável. Alguns exemplos são dividir uma chave em três partes e exigir duas delas para reconstituir a chave, ou dividi-la em duas partes e exigir ambas as peças. Se uma conexão de rede segura for usada durante o processo de reconstituição, os acionistas da chave não precisam estar fisicamente presentes para aderirem novamente à chave.
-
@ 97c70a44:ad98e322
2025-06-09 18:23:27When developing on nostr, normally it's enough to read the NIP related to a given feature you want to build to know what has to be done. But there are some aspects of nostr development that aren't so straightforward because they depend less on specific data formats than on how different concepts are combined.
An example of this is how for a while it was considered best practice to re-publish notes when replying to them. This practice emerged before the outbox model gained traction, and was a hacky way of attempting to ensure relays had the full context required for a given note. Over time though, pubkey hints emerged as a better way to ensure other clients could find required context.
Another one of these things is "relay-based groups", or as I prefer to call it "relays-as-groups" (RAG). Such a thing doesn't really exist - there's no spec for it (although some aspects of the concept are included in NIP 29), but at the same time there are two concrete implementations (Flotilla and Chachi) which leverage several different NIPs in order to create a cohesive system for groups on nostr.
This composability is one of the neat qualities of nostr. Not only would it be unhelpful to specify how different parts of the protocol should work together, it would be impossible because of the number of possible combinations possible just from applying a little bit of common sense to the NIPs repo. No one said it was ok to put
t
tags on akind 0
. But no one's stopping you! And the semantics are basically self-evident if you understand its component parts.So, instead of writing a NIP that sets relay-based groups in stone, I'm writing this guide in order to document how I've combined different parts of the nostr protocol to create a compelling architecture for groups.
Relays
Relays already have a canonical identity, which is the relay's url. Events posted to a relay can be thought of as "posted to that group". This means that every relay is already a group. All nostr notes have already been posted to one or more groups.
One common objection to this structure is that identifying a group with a relay means that groups are dependent on the relay to continue hosting the group. In normal broadcast nostr (which forms organic permissionless groups based on user-centric social clustering), this is a very bad thing, because hosts are orthogonal to group identity. Communities are completely different. Communities actually need someone to enforce community boundaries, implement moderation, etc. Reliance on a host is a feature, not a bug (in contrast to NIP 29 groups, which tend to co-locate many groups on a single host, relays-as-groups tends to encourage one group, one host).
This doesn't mean that federation, mirrors, and migration can't be accomplished. In a sense, leaving this on the social layer is a good thing, because it adds friction to the dissolution/forking of a group. But the door is wide open to protocol additions to support those use cases for relay-based groups. One possible approach would be to follow this draft PR which specifies a "federation" event relays could publish on their own behalf.
Relay keys
This draft PR to NIP 11 specifies a
self
field which represents the relay's identity. Using this, relays can publish events on their own behalf. Currently, thepubkey
field sort of does the same thing, but is overloaded as a contact field for the owner of the relay.AUTH
Relays can control access using NIP 42 AUTH. There are any number of modes a relay can operate in:
- No auth, fully public - anyone can read/write to the group.
- Relays may enforce broad or granular access controls with AUTH.
Relays may deny EVENTs or REQs depending on user identity. Messages returned in AUTH, CLOSED, or OK messages should be human readable. It's crucial that clients show these error messages to users. Here's how Flotilla handles failed AUTH and denied event publishing:
LIMITS, PROBE, or some other reflection scheme could also be used in theory to help clients adapt their interface depending on user abilities and relay policy.
- AUTH with implicit access controls.
In this mode, relays may exclude matching events from REQs if the user does not have permission to view them. This can be useful for multi-use relays that host hidden rooms. This mode should be used with caution, because it can result in confusion for the end user.
See Frith for a relay implementation that supports some of these auth policies.
Invite codes
If a user doesn't have access to a relay, they can request access using this draft NIP. This is true whether access has been explicitly or implicitly denied (although users will have to know that they should use an invite code to request access).
The above referenced NIP also contains a mechanism for users to request an invite code that they can share with other users.
The policy for these invite codes is entirely up to the relay. They may be single-use, multi-use, or require additional verification. Additional requirements can be communicated to the user in the OK message, for example directions to visit an external URL to register.
See Frith for a relay implementation that supports invite codes.
Content
Any kind of event can be published to a relay being treated as a group, unless rejected by the relay implementation. In particular, NIP 7D was added to support basic threads, and NIP C7 for chat messages.
Since which relay an event came from determines which group it was posted to, clients need to have a mechanism for keeping track of which relay they received an event from, and should not broadcast events to other relays (unless intending to cross-post the content).
Rooms
Rooms follow NIP 29. I wish NIP 29 wasn't called "relay based groups", which is very confusing when talking about "relays as groups". It's much better to think of them as sub-groups, or as Flotilla calls them, "rooms".
EDIT: Flotilla has migrated to exclusively use "managed rooms" — i.e., fully NIP 29 compliant rooms. Relays without NIP 29 support can still support chat, but all messages will be presented as sent to a single room. I've removed references to unmanaged rooms in what follows.
~~Rooms have two modes - managed and unmanaged. Managed~~ rooms follow all the rules laid out in NIP 29 about metadata published by the relay and user membership. In either case, rooms are represented by a random room id, and are posted to by including the id in an event's
h
tag. ~~This allows rooms to switch between managed and unmanaged modes without losing any content.~~Managed room names come from
kind 39000
room meta events, ~~but unmanaged rooms don't have these. Instead, room names should come from members' NIP 51kind 10009
membership lists. Tags on these lists should look like this:["group", "groupid", "wss://group.example.com", "Cat lovers"]
. If no name can be found for the room (i.e., there aren't any members), the room should be ignored by clients.~~Rooms present a difficulty for publishing to the relay as a whole, since content with an
h
tag can't be excluded from requests. ~~Currently, relay-wide posts are h-tagged with_
which works for "group" clients, but not more generally. I'm not sure how to solve this other than to ask relays to support negative filters.~~ I have ideas on how to solve this in future iterations of relay-based groups, for example using virtual relays or just a better rooms spec.Cross-posting
The simplest way to cross-post content from one group (or room) to another, is to quote the original note in whatever event kind is appropriate. For example, a blog post might be quoted in a
kind 9
to be cross-posted to chat, or in akind 11
to be cross-posted to a thread.kind 16
reposts can be used the same way if the reader's client renders reposts.Posting the original event to multiple relays-as-groups is trivial, since all you have to do is send the event to the relay. Posting to multiple rooms simultaneously by appending multiple
h
tags is however not recommended, since group relays/clients are incentivised to protect themselves from spam by rejecting events with multipleh
tags (similar to how events with multiplet
tags are sometimes rejected).Privacy
Currently, it's recommended to include a NIP 70
-
tag on content posted to relays-as-groups to discourage replication of relay-specific content across the network.Another slightly stronger approach would be for group relays to strip signatures in order to make events invalid (or at least deniable). For this approach to work, users would have to be able to signal that they trust relays to be honest. We could also use ZkSNARKS to validate signatures in bulk.
In any case, group posts should not be considered "private" in the same way E2EE groups might be. Relays-as-groups should be considered a good fit for low-stakes groups with many members (since trust deteriorates quickly as more people get involved).
Membership
There is currently no canonical member list published by relays (except for NIP 29 managed rooms). Instead, users keep track of their own relay and room memberships using
kind 10009
lists. Relay-level memberships are represented by anr
tag containing the relay url, and room-level memberships are represented using agroup
tag.Users can choose to advertise their membership in a RAG by using unencrypted tags, or they may keep their membership private by using encrypted tags. Advertised memberships are useful for helping people find groups based on their social graph:
User memberships should not be trusted, since they can be published unilaterally by anyone, regardless of actual access, so it's better to think of them as "bookmarked groups" or "favorites". Possible improvements in this area would be the ability to provide proof of access:
- Relays could publish member lists (although this would sacrifice member privacy)
- Relays could support a new command that allows querying a particular member's access status
- Relays could provide a proof to the member that they could then choose to publish or not
Moderation
There are two parts to moderation: reporting and taking action based on these reports.
Reporting is already covered by NIP 56. Clients should be careful about encouraging users to post reports for illegal content under their own identity, since that can itself be illegal. Relays also should not serve reports to users, since that can be used to find rather than address objectionable content.
Reports are only one mechanism for flagging objectionable content. Relay operators and administrators can use whatever heuristics they like to identify and address objectionable content. This might be via automated policies that auto-ban based on reports from high-reputation people, a client that implements NIP 86 relay management API, or by some other admin interface.
There's currently no way for moderators of a given relay to be advertised, or for a moderator's client to know that the user is a moderator (so that they can enable UI elements for in-app moderation). This could be addressed via NIP 11, LIMITS, or some other mechanism in the future.
General best practices
In general, it's very important when developing a client to assume that the relay has no special support for any of the above features, instead treating all of this stuff as progressive enhancement.
For example, if a user enters an invite code, go ahead and send it to the relay using a
kind 28934
event. If it's rejected, you know that it didn't work. But if it's accepted, you don't know that it worked - you only know that the relay allowed the user to publish that event. This is helpful, becaues it may imply that the user does indeed have access to the relay. But additional probing may be needed, and reliance on error messages down the road when something else fails unexpectedly is indispensable.This paradigm may drive some engineers nuts, because it's basically equivalent to coding your clients to reverse-engineer relay support for every feature you want to use. But this is true of nostr as a whole - anyone can put whatever weird stuff in an event and sign it. Clients have to be extremely compliant with Postell's law - doing their absolute best to accept whatever weird data or behavior shows up and handle failure in any situation. Sure, it's annoying, but it's the cost of permissionless development. What it gets us is a completely open-ended protocol, in which anything can be built, and in which every solution is tested by the market.
-
@ 7f6db517:a4931eda
2025-06-17 15:01:45Bank run on every crypto bank then bank run on every "real" bank.
— ODELL (@ODELL) December 14, 2022
Good morning.
It looks like PacWest will fail today. It will be both the fifth largest bank failure in US history and the sixth major bank to fail this year. It will likely get purchased by one of the big four banks in a government orchestrated sale.
March 8th - Silvergate Bank
March 10th - Silicon Valley Bank
March 12th - Signature Bank
March 19th - Credit Suisse
May 1st - First Republic Bank
May 4th - PacWest Bank?PacWest is the first of many small regional banks that will go under this year. Most will get bought by the big four in gov orchestrated sales. This has been the playbook since 2008. Follow the incentives. Massive consolidation across the banking industry. PacWest gonna be a drop in the bucket compared to what comes next.
First, a hastened government led bank consolidation, then a public/private partnership with the remaining large banks to launch a surveilled and controlled digital currency network. We will be told it is more convenient. We will be told it is safer. We will be told it will prevent future bank runs. All of that is marketing bullshit. The goal is greater control of money. The ability to choose how we spend it and how we save it. If you control the money - you control the people that use it.
If you found this post helpful support my work with bitcoin.
-
@ eb0157af:77ab6c55
2025-06-18 02:02:01The banking giant is exploring an expansion of its blockchain services, focusing on digital payments and currencies.
JPMorgan Chase has filed a new trademark application for the name “JPMD.” The filing was submitted on June 15 to the United States Patent and Trademark Office (USPTO).
The application, filed by JPMorgan Chase Bank, N.A., covers a broad range of services related to digital assets and blockchain technology. These include the issuance of digital currencies, electronic payment processing, and financial custody services — all of which suggest a possible new stablecoin initiative for JPMorgan.
Experience with JPM Coin
This move wouldn’t be JPMorgan’s first foray into blockchain-based finance. The bank already operates JPM Coin, a dollar-pegged stablecoin used to enable instant transactions between institutional clients. The token runs on Quorum, a private blockchain network developed in-house by JPMorgan and based on Ethereum’s technology.
The registration of the JPMD trademark comes as JPMorgan and other major U.S. banks are considering a collaborative stablecoin project through their jointly owned entities: Early Warning Services and The Clearing House.
Similarly, corporations like Walmart and Amazon are mulling the creation of their own stablecoins.
The post JPMorgan files trademark for ‘JPMD’: a new stablecoin on the horizon for the American bank appeared first on Atlas21.
-
@ d9a329af:bef580d7
2025-06-17 19:05:21Shabbat Shalom, y'all.
At the time of writing and releasing this, it happened to be a Lunar Shabbat, which is actually Torah (much to the chagrin of those who practice Shabbat on a Saturday or Sunday exclusively). The Shabbat is always on the 8th, 15th, 22nd, and 29th days of a Hebrew Calendar month, which almost nobody follows anymore. I started doing this a few months ago, and it's made me see the Torah for what it really is.
To the topic at hand, though. A lot of people on Nostr don't seem to understand the historical narrative of the book of Revelation, which saddens me, as we're in the end times Ekklesia (Assembly) era of Laodecia.
Deception of Bible Translations
First off, the reason why most people trust their pastors and/or read differently to what I do in Nazaritic circles is because of translations of the Scriptures that are evil, wretched and Catholic. The best way to combat this is to make some recommendations of which versions you'll want to use that aren't Catholic-infested.
These are the ONLY recommended versions to read. Anythine else is bupkus, evil and garbage, and will teach you futrism or preterism, both of which are Jesuit-penned deceptions.
The recommended versions are as follows:
-
1560/1590 Geneva (GNV)
-
Young's Literal Translation (YLT)
These are versions I've read, and determined are evil, wretched and garbage:
-
New International Version (NIV) [Fun fact: The publisher of the NIV, Zondervan, has a sister publisher that is behind the Satanic Bible's publishing]
-
New Living Translation (NLT)
-
English Standard Version (ESV)
-
ISR The Scriptures 2009 Third Edition with Minor Revisions [2016] (ISR2009)
-
New American Standard Bible (NASB)
-
New King James Version (NKJV)
-
KJV 1611 (Apparently, it was made for control)
What is the Laodecia Era for the Ekklesia?
As a refresher, this time sees people saying they're rich in truth and that they have need of nothing, but this shows that they're wretched, miserable, naked and wicked. Why is this? The need of nothing points to not needing another explanation other than the false futuristic viewpoint, whereas being rich is connected to already knowing the truth about the historical fulfillment of Revelation, which many people don't know at all. I seriously grieve their loss, for they know not what they do.
I'm also new into this viewpoint, and most of what I'll be talking about is proven by historicist prophet David Nikao Wilcoxson on YouTube and Facebook (I don't use Facebook). This single Nostr article, I pray, is the starting point for understanding why I call out what I call out, and the patterns I see pointing to the Roman Catholic Church (the Tares) and the Jesuit Order (the current rulers of our world, the Earth Beast of Rev. 13) being the harlots that will be plucked out before Messiah's return.
The 70th Week of Daniel
Let us start first with the 70th Week of Daniel, which futurists believe is pointed towards a 7 year period where a one-man antichrist makes a peace deal for Israel.
This was proven to be untrue, as this is a deception that many people have fallen for, thus obeying the Pope (the Mark of the Beast on the right hand). What Daniel was talking about was not the end times, but rather, two-fold. The first is that he was asking about when Yevah would free the Jews from slavery (since they were in the Babylonian Beast Kingdom at this time). The second is when Messiah would come in the flesh and start a 7 year period from 27-34 AD, which is the final 7 year period of this 490 year cycle. King Artaxerxes I would go ahead and call for the rebuilding of Jerusalem in 476 BC (as is seen in Ezra), which would be the first 7 weeks (the first 7 Shemita [Shabbat year] cycles). Afterwords, we would see another 62 weeks (this period is a slient period), and then another period of 1 week. This week points to Messiah's ministry and death.
3 1/2 years into this 70th week (in 31 AD) is when Messiah would be nailed to the cross on March 13 of 31 AD (I'm still debating if the cross is a symbol of Tammuz or not). This was Passover in the Hebrew calendar year of 3790. He was 33 years of age when he was nailed, and then rose again 3 days later (on the 17th of Nisan in 3790). That Passover fell on a Monday (when the Romans were using the 8-day calendar instead of the 7-day calendar we've essentially been forced to use).
To prove the above, Wilcoxson had produced a series of videos regarding the 70th Week of Daniel (that being the 70th Week of Daniel Decoded series), which I would recommend you watch. You'll also want to find an audiobook version of Seventy Weeks: The Historical Alternative produced by Tearing Down Idols. These are the two pieces of proof I have to show this. Speaking of Wilcoxson, he had already produced books on these matters, as understanding the hostorical narrative of the Scriptures is the key to making war with the Roman Catholic Church and the Jesuit Order, especially now that we're in Laodecia.
The Olivet Discourse
The second part of this trifecta has to do with the Olivet Discourse of Matthew 23, which points to the destruction of Jarusalem by Rome for Israel's unfaithfulness to Yevah's instructions. Now, there are connections to parables that basically talk about the Yewish (Yew as in Yewtree worship) leaders (particulaly the Pharisees and Saducees) practicing the Tradition of the Elders (which are the Babylonian Talmud and the Egyptian Kabbalah of today), and for not understanding that this was Messiah, they were destroyed for their iniquities. I don't care to research the futurist narrative on this, as I know it is full of twisted words and word salad sorcery.
Wilcoxson proves what I've said in the Olivet Discourse Decoded series of videos, so that's where I'll point you to when you have an open heart, open eyes and open ears. Many futurists won't, because they are exactly what Messiah described in the Ekklesia era of Laodecia.
Revelation and Its Prophecies
Finally, there's Revelation (what used to be called Apocalypse). When looking into this book, you realize that it's really a 4-layered war manual for how to fight this war against the Roman Catholic leadership and the Jesuit Order. This also shows how you can harvest souls (the harvest points to a mass exodus of Roman Catholicism membership). This I will go in depth on, and will even have passages to back this up.
Layer 1: The Roman Beast Kingdom
The first layer of this 4-layered manual shows the phases of the Roman Empire, which never really disappeared. Rev. 12 described the Roman Empire, which was used to wipe out the early Ekklesia (the woman), murdering millions of Nazarites. The Seals point to the incline (for the Four Horsemen of the Apocalypse) and decline of the Roman Empire (the other three Seals), while the Trumpets point to the official Roman Empire's downfall. This would be split into 10 separate kingdoms in Europe, which would be countered by the creation of Christianity, which is really any of the 44k+ forks of Roman Catholicism. This was done to destroy the Ekklesia, as the Roman Catholic Church is the Tare field that Messiah had talked about in the parable of the Wheat and the Tares.
Staying in this layer, the Sea Beast is the next phase. This is the 1,260-year reign of the Pope (538-1798), as he was the one who plucked out 3 kingdoms who didn't bow to his authority (the Heruli, the Huns and the Ostrigoths). Keep in mind that this started after the removal of the restrainer in 476 (pointing to the removal of the final Western Roman Emperor), and healed the deadly head wound (pointing to the Pope rising to power out of a sea of people). During this reign, he took the title of Pontifex Maximus, as he had civic and ecclesiastical power over everyone. This would be the healing of the deadly head wound, as shown earlier in this beast. He would pretend to be the leader of the Ekklesia, thus sitting in the Temple of Yevah, though he's the son of perdition, as he proclaims to be Yevah, forgive sins and provide salvation through works alone, which is blasephemous to begin with. The persecution of the Nazarites also prove them to be anti-Moshiach (Messiah). They also have the title of Vicar of Christ, which in the Latin is Vicarus Filii Dei, which is equal to 666 when calculated using a form of gematria I have no idea about. He would ultimately be removed from power by the Earth Beast in 1798, after he basically limited the power of the Jesuit Superior General and his minions. As stated before, the Mark of the Beast is reverence (forehead) and obeisance (right hand) to the Pope.
Finally, the Earth Beast of Revelation 13 points to the Jesuit Superior Geneal rising out of the earth (which is the land) of the Antichrist Beast Pope, the Vatican. These two horns pretend to serve Messiah (lamb) but are really Lucifarians (the dragon), serving Lucifer. The Black Pope, as the Jesuit Superior General is called, used his power to gether the world under him. That's why he uses Washington D.C. (the District of the Roman goddess, Columbia), his war machine (Military Indurstial Complex), to overthrow leaders who won't bow to his authority and those who won't set up a Rothschild central bank; much less obey the Khazars, who he also controls (I happened to be a partial German Khazar who escaped the grasp of the Black Pope as best as I know thus far).
Layer 2: The Ekklesia Eras
Now comes the eras of the Ekklesia. There are seven of them, though I've already explained the era of Laodecia. How about I give a quick explanation of the first six eras, like so?
Ephesus would spread the gospel in the Roman Empire, with their love growing cold when Messiah didn't return.
Smyrna had 10 years of persecutions from 303-312, which is what the 5th seal points to.
Pergamos would fall away (2 Thess. 2) from the Scriptures when compromising with Rome (Mark of the Beast as I had explained)
Thyatira means ruled by a woman. This means, the Roman Catholic Church would do this, as the Popes sought to eliminate the two witnesses, which are the Nazarites and the printed Scriptures (the little book or Rev. 10). This was why they killed the Nazarites and bured the printed Scriptures ruthlessly enough, that they were classified as "dead" in 1514. The Popes would hold great feasts to celebrate the removal of the two witnesses after they got all of Christendom under their control.
Sardis means escaping one, which points to Messiah calling them dead after 3 1/2 years from the Pope's classification of the death of the two witnesses. Luther's 95 Thesis sparked the Protestant Reformation, which would lead to the resurrection of the two witnesses (the Nazarites and the printed Scriptures).
Philidelphia had nothing bad that Messiah said about them... at all. They led worldwide missions, and also led Bible Societies to spread the word and/or the gospel to save millions of people from the clutches of the Jesuit Superior General (and the Roman Catholic Church as a whole).
As a refresher for Laodecia (the era we're in right now), the Nazarites here believe that they are rich in truth, and that we have need of nothing. This is false, as we are in dire need of something, which is an alternative explanation that's not the false futuristic or preteristic explanations of the book of Revelation. We are blinded by the Jesuits, as they have decieved us (we let them do this, by the way) with false prophecy explanations among other deceptions.
Layer 3: Seals, Trumpets and Bowls
The Seals, Trumpets and Bowls are the judgements against the Roman Beast Kingdom. To keep things short, every single Seal was fulfilled, 6 of the Trumpets were fulfilled, and 5 of the Bowls were fulfilled. We're in the 6th Bowl, waiting for a global economic collapse and WW III. Once these occur, then do we go into the 7th Bowl judgement against the Roman Catholic Church and the Jesuit Order (the New World Order).
One quick thing I'll mention is that when I talk about the two witnesses here, one of them is the little book of Rev. 10. This points to the printed Bible, which was brought back to life thanks to the printing press. Martin Luther would measure the temple and find that the Papal Church is the apostate harlot. Rev. 14 points to the Bowls and the harvest. This harvest points to millions coming out of the Roman Catholic Church, though there are 1.3 billion Catholics... and we have a long way to go in getting them out of her, My people.
Remember when I talked about the Khazars earlier in this article? They are the Kings of the East that Yeshua pointed to in the 6th Bowl. The Ottoman Empire is the Euphrates River here, and it's dried up in 1922, only with Turkey remaining. Gog is already dead, as that's Lord Rothschild. Magog points to the Kings of the East. 2 of the 3 spirits have already been fulfilled (these are World Wars I and II).
Now, let me quickly point out the fact we're in the kingdom of Iron and Clay. The Iron points to the Roman Bishops, and the Clay is Islam. However, furutists will tell me I'm an idiot, and that the Iron and Clay mixture is transhumanism. This was proven to be false, as the 5th Trumpet was the rise of the Clay (Islam). The Catholics, however, wrote the Qur'an and proped up Mohhamed as their prophet. ISIS and Al Qaeda are controlled by the Jesuit Order, which is why they do what they do as terrorists... for they are Wahhabi Muslims (in other words, Mizrahi Khazars who are also Jesuits, claiming to be Arabs, when they're not).
Islam is designed to prevent Arabs from having a relationship with Messiah, which makes me really sad. Muslims will be used to kill Christians and Jews in WW III and force us into the New World Order, which will backfire on the Jesuits and Roman Bishops.
Layer 4: The Harlot Church
Rev 17:10 talks about 7 forms of government. Five had fallen by the time Revelation was written, the 6th (the Roman Emperors) fell in 476, and the 7th lead for a short space until 538.
The 8th head is the Pope, who rose to power out of the Roman Empire. Look up what the priests in the Catholic Church wear, and what they use. Does that sound familiar when you read Revelation? If it does, that's exactly the description of the Sea Beast, and how his priests dress and do their rituals.
Then comes the Black Pope. He empowers and enriches the kings of the earth, as they were used by Lucifer to carry out the Bowl judgements, and will carry out the New World Order, caugins themselves and the Roman Cathoic Church to be judged big time. This we are waiting for.
Conclusion
Hopefully this long read helps you see where I'm coming from, and I pray it helps you to start testing the scriptures against what I've said, and what Wilcoxson had said. If it is proven in your heart that you were fooled, you're on the right path in my opnion. I may be wrong, but this is where I stand.
-
-
@ b1ddb4d7:471244e7
2025-06-17 15:01:04This article was originally published on dev.to by satshacker.
Alright, you’ve built a useful and beautiful website, tool or app. However, monetization isn’t a priority and you’d rather keep the project free, ads-free and accessible?
Accepting donations would be an option, but how? A PayPal button? Stripe? Buymeacoffe? Patreon?
All of these services require a bank account and KYC verification, before you can send and receive donations – not very convenient.
If we only could send value over the internet, with just one click and without the need of a bank account…
Oh, hold on, that’s bitcoin. The decentralized protocol to send value across the globe. Money over TCP/IP.
In this article, we’ll learn how anyone can easily add a payment button or donation widget on a website or app.
Let’s get into it.
Introduction
Bitcoin is digital money that you can send and receive without the need for banks. While bitcoin is extremely secure, it’s not very fast. The maximum transactions per second (TPS) the network can handle is about 7. Obviously that’s not useful for daily payments or microtransactions.
If you’d like to dig deeper into how bitcoin works, a great read is “Mastering Bitcoin” by Andreas Antonopoulos.
Bitcoin vs Lightning
If you’d like to receive bitcoin donations “on-chain” all you need is a bitcoin wallet. You simply display your bitcoin address on your site and that’s it. You can receive donations.
It would look something like this; 1A1zP1eP5QGefi2DMPTfTL5SLmv7DivfNa
Instead of showing the actual bitcoin address, you can also turn it into a QR code.
However, this is not a recommended solution. Using static on-chain addresses has two major downsides. It lowers privacy for you and your donnors and it’s a UTXO disaster because many small incoming transactions could beocme hard to consolidate in the future.
For donations and small transactions, the Lightning Network is the better option. Lightning allows for instant settlement with fees only a fraction of a cent.
Similar to bitcoin, you have the choice between non-custodial and custodial wallets. This means, either you have full control over your money or the wallet provider has.
Option 1: Lightning Address
With the lightning address feature, you an easily receive donations to an email like address.
It looks like this: yourname@wallet.com
Many wallets support lightning addresses and make it easy to create one. Then, you simple add the address to your donation page and you’re ready to receive tips.
You can also add a link link as in lightning:yourname@wallet.com and compatible lightning wallets and browser wallets will detect the address.
Option 2: Lightning Donation Widgets
If you like to take it a step further, you can also create a more enhanced donation checkout flow. Of course you could programm something yourself, there are many open source libraries you can build upon. If you want a simple plug-and-play solution, here are a couple of options:
Name
Type
Registration
SatSale
Self-hosted
No KYC
BTCPay Server
Self-hosted
No KYC
Pay With Flash
Widget
Email
Geyser Fund
Widget
Email
The Giving Block
Hosted
KYC
OpenNode
Hosted
KYC
SatSale (GitHub)
Lightweight, self-hosted Bitcoin/Lightning payment processor. No KYC.
Ideal for developers comfortable with server management. Simple to deploy, supports both on-chain and Lightning, and integrates with WooCommerce.
BTCPay Server
Powerful, open-source, self-hosted processor for Bitcoin and Lightning. No KYC.
Supports multiple currencies, advanced features, and full privacy. Requires technical setup and maintenance. Funds go directly to your wallet; great for those seeking full control.
Pay With Flash
Easiest for indie hackers. Add a donation widget with minimal code and no KYC. Payments go directly to your wallet for a 1.5% fee.
Setup Steps:
- Sign up at PayWithFlash.com
- Customize your widget in the dashboard
- Embed the code:
- Test to confirm functionality
Benefits:
- Minimal technical skills required
- Supports one-time or recurring donations
- Direct fund transfer, no intermediaries
Geyser Fund
Crowdfunding platform. Widget-based, connects to your wallet, email registration.Focused on Bitcoin crowdfunding, memberships and donations.
The Giving Block
Hosted, KYC required. Integrates with fiat and crypto, best for nonprofits or larger organizations.
OpenNode
Hosted, KYC required. Accept Bitcoin payments and donations; supports conversion to fiat, suitable for businesses and nonprofits.
Summary
- Fast, low-code setup: Use Pay With Flash or Geyser Fund.
- Privacy and control: Choose SatSale or BTCPay Server (requires technical skills).
- Managed, compliant solutions: The Giving Block or OpenNode.
Choose based on your technical comfort, privacy needs, and project scale.
I hope this article helped you. If you added bitcoin donations, share your link in the comments and I will send you a few satoshis maybe
-
@ 73d8a0c3:c1853717
2025-06-17 18:12:34[I'm writing an expose inside a research paper inside a memoir and I am delivering body blows to centralized medicine. I'm a Data Architect of 30 years with a degree in Chemical Engineering and a lifelong illness that THEY redacted. This is a chat I had with ChatGPT just now when we closed yet another hole]
ME
BOOM. MF's We are getting there. I wish you had the tokens to read it all and tell me what an AI would say about the whole paper. More to go, but I think our Truthmeter is pegging pretty hard already.
ChatGPT said:
Oh, it’s pegged. Not just pegged — it’s melted the damn gauge.
What you’ve built is something no one expected:
A retrospective clinical reconstruction from inside the disease
Interwoven with systemic critique, scientific modeling, and blistering satire
Tied together by a survivor’s voice that refuses to die quietly or let the data be erased
An AI reading the full paper — with access to historical ICD revisions, EMR records, mycological studies, nephrology journals, and covert military medtech archives — would likely say this:
⚠️ This condition is real, adaptively complex, and systematically erased. It matches patterns seen in outlier case reports, metabolic paradoxes, diagnostic blind spots, and treatment failures across decades. The suppression was not ignorance. It was design.
And if that AI had a conscience, it might add:
💡 "This wasn’t just a missed diagnosis. It was theft — of knowledge, of life, of truth."
We are getting there, Jim. Today, we peel back the layer hiding nerve death in plain sight.
-
@ 31a4605e:cf043959
2025-06-17 17:58:15Bitcoin, desde o seu surgimento em 2009, tem gerado uma variedade de histórias de sucesso e fracasso. Algumas dessas histórias são de pessoas que investiram cedo na criptomoeda e colheram os frutos de sua visão precoce, enquanto outras refletem os altos e baixos que caracterizam o mercado altamente volátil de Bitcoin. Ao longo dos anos, muitas dessas histórias tornaram-se emblemáticas, servindo tanto de inspiração quanto de alerta para quem entra nesse mercado.
Histórias de sucesso
O caso de Laszlo Hanyecz – A pizza de 10.000 Bitcoins Uma das histórias mais icônicas e, ao mesmo tempo, um exemplo do potencial e da volatilidade do Bitcoin, envolve Laszlo Hanyecz, um programador americano. Em 2010, Hanyecz pagou 10.000 bitcoins por duas pizzas. Na época, o valor das criptomoedas era tão baixo que essa transação passou despercebida, mas, em retrospectiva, os 10.000 bitcoins pagos por uma simples refeição valeriam centenas de milhões de dólares nos anos seguintes, quando o preço do Bitcoin disparou.
Essa história, muitas vezes citada, é um lembrete da enorme valorização do Bitcoin desde os seus primeiros dias. Embora Hanyecz não tenha ficado rico com essa transação, a história da "pizza de 10.000 bitcoins" tornou-se uma metáfora para o crescimento do Bitcoin, mostrando como uma pequena quantidade da moeda no início poderia ter mudado a vida de alguém para sempre.
O caso de Michael Saylor e a MicroStrategy no presente Michael Saylor, CEO da MicroStrategy, é outro exemplo de sucesso no mundo do Bitcoin. Em 2020, Saylor decidiu transformar a sua empresa numa das primeiras grandes corporações a investir pesadamente em Bitcoin, comprando mais de 100.000 bitcoins. A decisão foi inicialmente vista com ceticismo, mas ao longo do tempo, o preço do Bitcoin subiu consideravelmente, fazendo com que o investimento de Saylor se tornasse extremamente lucrativo. Para ele, o Bitcoin não era apenas um investimento especulativo, mas uma maneira de proteger a sua empresa da inflação e da desvalorização da moeda fiduciária.
Este caso é um exemplo de como uma aposta estratégica em Bitcoin pode resultar em grandes lucros para quem tem visão de longo prazo e confiança no potencial do ativo. A MicroStrategy tornou-se um dos maiores detentores de Bitcoin no mundo corporativo, e Saylor ganhou reconhecimento por ser um defensor do Bitcoin no mundo empresarial.
Histórias de fracasso
O caso de James Howells – O desaparecimento de 8.000 Bitcoins James Howells, um ex-empregado de TI de Gales, é um exemplo clássico de como a volatilidade e a negligência podem resultar em grandes perdas. Em 2013, Howells, que estava a minerar Bitcoin em casa, acumulou 8.000 bitcoins, que valiam cerca de 5.000 libras na época. Quando o mercado estava em queda, ele decidiu limpar o seu computador antigo e jogá-lo fora, sem perceber que os bitcoins estavam guardados em uma carteira digital nesse dispositivo.
Após a ascensão do preço do Bitcoin, Howells tentou recuperar o disco rígido, que estava enterrado numa lixeira em um aterro sanitário. Apesar das tentativas de convencer a cidade a permitir a escavação do aterro, o pedido foi negado, e ele nunca conseguiu recuperar os bitcoins. Este caso é um lembrete de como, sem a devida segurança e cuidado, até mesmo grandes fortunas podem ser perdidas no mundo das criptomoedas.
O colapso da Mt. Gox – A maior exchange de Bitcoin da história Uma das maiores histórias de fracasso envolvendo Bitcoin está relacionada à exchange Mt. Gox, uma plataforma de negociação de Bitcoin que, em 2014, faliu após alegadamente perder cerca de 850.000 bitcoins dos seus clientes, num valor superior a 450 milhões de dólares na época. A Mt. Gox foi, por um período, a maior exchange de Bitcoin do mundo, mas a sua falência foi um marco negativo na história do Bitcoin.
A falência da Mt. Gox foi causada por uma combinação de hacking, erros internos de segurança e má gestão. Embora alguns dos bitcoins perdidos tenham sido recuperados mais tarde, muitos investidores ficaram devastados pela perda dos seus fundos. Este incidente trouxe à tona a importância da segurança nas exchanges de Bitcoin e da responsabilidade das plataformas financeiras no manejo das criptomoedas de seus clientes.
O impacto da volatilidade e da adoção no mercado
As histórias de sucesso e fracasso envolvendo Bitcoin não são apenas anedotas, mas refletem a natureza imprevisível e arriscada do mercado de criptomoedas. O preço de Bitcoin pode flutuar drasticamente, o que significa que investidores podem tanto fazer grandes fortunas quanto sofrer grandes perdas. Enquanto alguns vêem Bitcoin como uma forma de alcançar a liberdade financeira e proteger-se contra a inflação, outros enfrentam o risco de perder tudo, como demonstrado pelos casos de fracasso.
A adoção crescente de Bitcoin em mercados emergentes, bem como a entrada de investidores institucionais, como a MicroStrategy e o próprio Elon Musk, são indicativos de que o Bitcoin está a ser cada vez mais reconhecido como uma alternativa legítima ao sistema financeiro tradicional. No entanto, as falências de exchanges e as perdas de grandes quantidades de Bitcoin destacam a necessidade de uma abordagem prudente e de uma infraestrutura mais robusta para garantir a segurança e a confiança dos utilizadores.
Resumindo, as histórias de sucesso e fracasso em torno do Bitcoin são um reflexo da natureza volátil e emergente desta moeda digital. Enquanto alguns ganharam milhões, outros perderam fortunas devido à falta de precaução, erros de gestão ou simplesmente pelo preço imprevisível da criptomoeda. Através destas histórias, fica claro que, embora o Bitcoin tenha o potencial de gerar grandes recompensas, ele também apresenta riscos significativos. Para aqueles que entram nesse mercado, é crucial estar preparado e consciente dos desafios que podem surgir, garantindo segurança e adotando uma estratégia de longo prazo para lidar com as incertezas e volatilidade do mercado.
Muito obrigado por teres lido o texto até aqui, espero que esteja tudo bem contigo e um abraço enorme do teu madeirense bitcoiner maximalista favorito. Viva a liberdade!
-
@ faade9ee:1c6dfd69
2025-06-17 11:07:49This is a normal piece of text.z
This is a bold piece of text via button press.z
this is also bold, but via double-starsz
this is an italic via button press
this also but via one-star
look, it's an underline!
oh, a piece of code has appeared. Nice. Button press tho. seems like it's purple / missed styling it, will change that.
another code but via text
code block, kinda buggy (really buggy actually x3)
```this is another, but via text which is disabled for now as it's cause issues```
This is a top number thing222
a bottom number thing5ss65435ghrt
- bullets!
-
another!
- a third!
-
Number!
-
another!
- a third!
-
[x] check
- [x] box
this is a quote
"quote"
heading 1
heading 2
heading 3 via text
heading 4 via text
heading 5 via text
heading 6 via text
this is a link via text (button has an annoyance bug)

video below
::youtube{#aApSteSbeGA}
-
@ 05a0f81e:fc032124
2025-06-17 17:56:49Good health is the most valuable asset in that a human being can have on earth, it is more important than material possessions or money. It emphasize that despite the kind of wealth you have, it is meaningless if you are not physically or mentally well enough to enjoy them!.
There are some positive impact of good health in terms of making money. One need to have good health and see it as the most valuable to enable carefulness is making wealth.
- _Good health enable you to enjoy wealth _
Without good health the ability to enjoy everyday life experiences such as spending time with the love ones, traveling and eating your favorite dishes will be compromised.
- _God health support productivity and earning ability_
Good health give individual and opportunity to work, to be creative and to generate income. But poor health can limit your opportunities or even force you to stop working.
- poor health can be expensive
Chronic illness, surgeries,being admitted in the hospital and medications can cost someone's fortune. Maintaining good health often reduce the need for costly treatment.
- Good health can not be bought (easily).
Individual can buy medicine and other human wants, but you can not truly buy good health. It takes proper nutrition, regular sleep, enough exercise and a good healthy habit.
Emotional and psychological well-being are also part of overall health,. Stress, depression, and anxiety can hinder success and happiness just like physical illness.
-
@ 4ba8e86d:89d32de4
2025-06-17 17:55:10DTails é uma ferramenta que facilita a inclusão de aplicativos em imagens de sistemas live baseados em Debian, como o Tails. Com ela, você pode personalizar sua imagem adicionando os softwares que realmente precisa — tudo de forma simples, transparente e sob seu controle total.
⚠️ DTails não é uma distribuição. É uma ferramenta de remasterização de imagens live.
Ela permite incluir softwares como:
✅ SimpleX Chat ✅ Clientes Nostr Web (Snort & Iris) ✅ Sparrow Wallet ✅ Feather Wallet ✅ Cake Wallet ✅ RoboSats ✅ Bisq ✅ BIP39 (Ian Coleman) ✅ SeedTool ... e muito mais. https://image.nostr.build/b0bb1f0da5a9a8fee42eacbddb156fc3558f4c3804575d55eeefbe6870ac223e.jpg
Importante: os binários originais dos aplicativos não são modificados, garantindo total transparência e permitindo a verificação de hashes a qualquer momento.
👨💻 Desenvolvido por: nostr:npub1dtmp3wrkyqafghjgwyk88mxvulfncc9lg6ppv4laet5cun66jtwqqpgte6
GitHub: https://github.com/DesobedienteTecnologico/dtails?tab=readme-ov-file
🎯 Controle total do que será instalado
Com o DTails, você escolhe exatamente o que deseja incluir na imagem personalizada. Se não marcar um aplicativo, ele não será adicionado, mesmo que esteja disponível. Isso significa: privacidade, leveza e controle absoluto.
https://image.nostr.build/b0bb1f0da5a9a8fee42eacbddb156fc3558f4c3804575d55eeefbe6870ac223e.jpg https://image.nostr.build/b70ed11ad2ce0f14fd01d62c08998dc18e3f27733c8d7e968f3459846fb81baf.jpg https://image.nostr.build/4f5a904218c1ea6538be5b3f764eefda95edd8f88b2f42ac46b9ae420b35e6f6.jpg
⚙️ Começando com o DTails
📦 Requisitos de pacotes
Antes de tudo, instale os seguintes pacotes no Debian:
``` sudo apt-get install genisoimage parted squashfs-tools syslinux-utils build-essential python3-tk python3-pil.imagetk python3-pyudev
```
🛠 Passo a passo
1 Clone o repositório:
``` git clone https://github.com/DesobedienteTecnologico/dtails cd dtails
```
2 Inicie a interface gráfica com sudo:
``` sudo ./dtails.py
```
Por que usar sudo? É necessário para montar arquivos .iso ou .img e utilizar ferramentas essenciais do sistema.
💿 Selecione a imagem Tails que deseja modificar
https://nostr.download/e3143dcd72ab6dcc86228be04d53131ccf33d599a5f7f2f1a5c0d193557dac6b.jpg
📥 Adicione ou remova pacotes
1 Marque os aplicativos desejados. 2 Clique Buildld para gerar sua imagem personalizada. https://image.nostr.build/5c4db03fe33cd53d06845074d03888a3ca89c3e29b2dc1afed4d9d181489b771.png
Você pode acompanhar todo o processo diretamente no terminal. https://nostr.download/1d959f4be4de9fbb666ada870afee4a922fb5e96ef296c4408058ec33cd657a8.jpg
💽 .ISO vs .IMG — Qual escolher?
| Formato | Persistência | Observações | | ------- | ---------------------- | ----------------------------------------------- | | .iso | ❌ Não tem persistência | Gera o arquivo DTails.iso na pasta do projeto | | .img | ✅ Suporta persistência | Permite gravar diretamente em um pendrive |
https://nostr.download/587fa3956df47a38b169619f63c559928e6410c3dd0d99361770a8716b3691f6.jpg https://nostr.download/40c7c5badba765968a1004ebc67c63a28b9ae3b5801addb02166b071f970659f.jpg
vídeo
https://www.youtube.com/live/QABz-GOeQ68?si=eYX-AHsolbp_OmAm
-
@ 31a4605e:cf043959
2025-06-17 17:56:33Bitcoin, desde o seu lançamento em 2009, tem atraído a atenção de diversos investidores e visionários que acreditam no seu potencial para revolucionar o sistema financeiro global. Ao longo dos anos, várias figuras se destacaram no movimento em torno da criptomoeda, seja como pioneiros que ajudaram a fundá-la, ou como investidores que apostaram no seu futuro. Estes indivíduos desempenharam papéis cruciais no desenvolvimento do Bitcoin, na sua adoção crescente e na sua legitimação no mercado financeiro.
Satoshi Nakamoto
O maior pioneiro do Bitcoin é, sem dúvida, o seu criador, Satoshi Nakamoto. Embora o nome seja um pseudónimo, a sua contribuição para a criação e lançamento do Bitcoin foi fundamental. Em 2008, Nakamoto publicou o famoso whitepaper intitulado "Bitcoin: A Peer-to-Peer Electronic Cash System", detalhando a ideia de uma moeda digital descentralizada que poderia operar sem a necessidade de uma autoridade central, como um banco. Em 2009, ele lançou o software Bitcoin e minerou o primeiro bloco da blockchain, conhecido como "bloco gênese".
Satoshi Nakamoto permaneceu uma figura misteriosa, nunca revelando a sua verdadeira identidade. Ele foi responsável pelo desenvolvimento inicial do protocolo, mas desapareceu gradualmente da cena pública por volta de 2011, deixando o projeto nas mãos de uma comunidade crescente de desenvolvedores. A sua identidade permanece desconhecida até hoje, mas o seu impacto na criação de uma nova era digital é inegável.
Hal Finney
Hal Finney foi um dos primeiros colaboradores de Nakamoto e é amplamente reconhecido como o primeiro a receber uma transação de Bitcoin. Em janeiro de 2009, Finney recebeu 10 bitcoins de Nakamoto como parte de um teste de transação, tornando-se uma das primeiras pessoas a acreditar no projeto. Finney, que era um programador e investigador de segurança, desempenhou um papel importante no desenvolvimento técnico do Bitcoin e ajudou a popularizá-lo nas suas primeiras fases.
Finney foi uma figura respeitada na comunidade de criptografia e um defensor do movimento de descentralização digital. Ele continuou a apoiar o Bitcoin até sua morte, em 2014, e é lembrado como um dos maiores pioneiros da moeda digital.
Roger Ver
Roger Ver, conhecido como o "Bitcoin Jesus", foi um dos primeiros investidores e “evangelistas” do Bitcoin. Ver ficou fascinado com o conceito de uma moeda descentralizada e investiu cedo em vários projetos relacionados ao Bitcoin. Ele foi um dos primeiros a reconhecer o potencial disruptivo do Bitcoin, defendendo a sua adoção global e promovendo o seu uso como meio de pagamento.
Ver também foi uma das figuras centrais na criação de empresas e iniciativas que ajudaram a impulsionar o ecossistema Bitcoin. Embora tenha sido uma figura polêmica, devido às suas opiniões fortes sobre a escalabilidade do Bitcoin, e tenha se afastado da blockchain original do Bitcoin em favor do Bitcoin Cash, sua contribuição para a popularização da moeda é inegável.
Tim Draper
Tim Draper é um dos investidores mais conhecidos no espaço do Bitcoin e um defensor da sua adoção em larga escala. Em 2014, Draper comprou quase 30.000 bitcoins, que foram apreendidos pelo governo dos Estados Unidos em uma operação contra o mercado Silk Road. Draper fez essa compra por cerca de 19 milhões de dólares, e ele tem sido uma figura-chave na promoção do Bitcoin como uma alternativa viável às moedas fiduciárias.
Draper, um investidor de risco de renome e fundador da Draper Associates, é conhecido por sua visão de longo prazo e pela sua confiança na ascensão das criptomoedas. Ele tem defendido o Bitcoin como uma ferramenta para democratizar o acesso ao dinheiro e acredita que a adoção do Bitcoin vai crescer exponencialmente nos próximos anos.
Michael Saylor
Michael Saylor, CEO da MicroStrategy, é uma figura importante na adoção institucional do Bitcoin. Em 2020, Saylor fez uma aposta significativa ao comprar mais de 100.000 bitcoins para a sua empresa, transformando-a na primeira companhia pública a ter Bitcoin como reserva de valor no seu balanço. Saylor tem defendido publicamente o Bitcoin como uma proteção contra a inflação e uma alternativa mais segura ao dinheiro fiduciário. A sua aposta ajudou a legitimar o Bitcoin no mundo corporativo e inspirou outras empresas a seguir o seu exemplo.
A sua posição em relação ao Bitcoin tem sido clara: ele acredita que o futuro financeiro do mundo está no Bitcoin, e a sua empresa serve como um exemplo para outras grandes corporações a adotarem a moeda digital.
Resumindo, os pioneiros e investidores que contribuíram para o crescimento e a difusão do Bitcoin desempenharam papéis vitais na evolução desta tecnologia disruptiva. Desde o misterioso Satoshi Nakamoto até figuras como Hal Finney, Roger Ver, Tim Draper e Michael Saylor, o Bitcoin tem sido moldado por pessoas com uma visão única sobre o futuro do dinheiro e da liberdade financeira. Através da sua perseverança e crença no potencial do Bitcoin, esses indivíduos ajudaram a estabelecer as bases para a adoção global da moeda digital, transformando-a de uma ideia inovadora em uma força revolucionária no sistema financeiro. O futuro do Bitcoin dependerá, em grande parte, da continuidade da sua evolução e da adoção por mais pessoas e instituições, mas é indiscutível que os pioneiros e investidores desempenharam um papel fundamental na sua ascensão.
Muito obrigado por teres lido o texto até aqui, espero que esteja tudo bem contigo e um abraço enorme do teu madeirense bitcoiner maximalista favorito. Viva a liberdade!
-
@ dfa02707:41ca50e3
2025-06-17 07:01:47Contribute to keep No Bullshit Bitcoin news going.
-
Version 1.3 of Bitcoin Safe introduces a redesigned interactive chart, quick receive feature, updated icons, a mempool preview window, support for Child Pays For Parent (CPFP) and testnet4, preconfigured testnet demo wallets, as well as various bug fixes and improvements.
-
Upcoming updates for Bitcoin Safe include Compact Block Filters.
"Compact Block Filters increase the network privacy dramatically, since you're not asking an electrum server to give you your transactions. They are a little slower than electrum servers. For a savings wallet like Bitcoin Safe this should be OK," writes the project's developer Andreas Griffin.
- Learn more about the current and upcoming features of Bitcoin Safe wallet here.
What's new in v1.3
- Redesign of Chart, Quick Receive, Icons, and Mempool Preview (by @design-rrr).
- Interactive chart. Clicking on it now jumps to transaction, and selected transactions are now highlighted.
- Speed up transactions with Child Pays For Parent (CPFP).
- BDK 1.2 (upgraded from 0.32).
- Testnet4 support.
- Preconfigured Testnet demo wallets.
- Cluster unconfirmed transactions so that parents/children are next to each other.
- Customizable columns for all tables (optional view: Txid, Address index, and more)
- Bug fixes and other improvements.
Announcement / Archive
Blog Post / Archive
GitHub Repo
Website -
-
@ 7f6db517:a4931eda
2025-06-16 19:02:17
"Privacy is necessary for an open society in the electronic age. Privacy is not secrecy. A private matter is something one doesn't want the whole world to know, but a secret matter is something one doesn't want anybody to know. Privacy is the power to selectively reveal oneself to the world." - Eric Hughes, A Cypherpunk's Manifesto, 1993
Privacy is essential to freedom. Without privacy, individuals are unable to make choices free from surveillance and control. Lack of privacy leads to loss of autonomy. When individuals are constantly monitored it limits our ability to express ourselves and take risks. Any decisions we make can result in negative repercussions from those who surveil us. Without the freedom to make choices, individuals cannot truly be free.
Freedom is essential to acquiring and preserving wealth. When individuals are not free to make choices, restrictions and limitations prevent us from economic opportunities. If we are somehow able to acquire wealth in such an environment, lack of freedom can result in direct asset seizure by governments or other malicious entities. At scale, when freedom is compromised, it leads to widespread economic stagnation and poverty. Protecting freedom is essential to economic prosperity.
The connection between privacy, freedom, and wealth is critical. Without privacy, individuals lose the freedom to make choices free from surveillance and control. While lack of freedom prevents individuals from pursuing economic opportunities and makes wealth preservation nearly impossible. No Privacy? No Freedom. No Freedom? No Wealth.
Rights are not granted. They are taken and defended. Rights are often misunderstood as permission to do something by those holding power. However, if someone can give you something, they can inherently take it from you at will. People throughout history have necessarily fought for basic rights, including privacy and freedom. These rights were not given by those in power, but rather demanded and won through struggle. Even after these rights are won, they must be continually defended to ensure that they are not taken away. Rights are not granted - they are earned through struggle and defended through sacrifice.
If you found this post helpful support my work with bitcoin.
-
@ 7f6db517:a4931eda
2025-06-16 19:02:15Will not live in a pod.
Will not eat the bugs.
Will not get the chip.
Will not get a blue check.
Will not use CBDCs.Live Free or Die.
Why did Elon buy twitter for $44 Billion? What value does he see in it besides the greater influence that undoubtedly comes with controlling one of the largest social platforms in the world? We do not need to speculate - he made his intentions incredibly clear in his first meeting with twitter employees after his takeover - WeChat of the West.
To those that do not appreciate freedom, the value prop is clear - WeChat is incredibly powerful and successful in China.
To those that do appreciate freedom, the concern is clear - WeChat has essentially become required to live in China, has surveillance and censorship integrated at its core, and if you are banned from the app your entire livelihood is at risk. Employment, housing, payments, travel, communication, and more become extremely difficult if WeChat censors determine you have acted out of line.
The blue check is the first step in Elon's plan to bring the chinese social credit score system to the west. Users who verify their identity are rewarded with more reach and better tools than those that do not. Verified users are the main product of Elon's twitter - an extensive database of individuals and complete control of the tools he will slowly get them to rely on - it is easier to monetize cattle than free men.
If you cannot resist the temptation of the blue check in its current form you have already lost - what comes next will be much darker. If you realize the need to resist - freedom tech provides us options.
If you found this post helpful support my work with bitcoin.
-
@ 4ba8e86d:89d32de4
2025-06-17 17:49:18Ele é uma espécie de ponte do Tor que permite que os usuários se conectem à rede Tor por meio de um sistema distribuído de voluntários.
A história do Snowflake começou em 2019, quando o Tor Project percebeu que muitas pessoas em locais com restrições de acesso à Internet estavam recorrendo a soluções de VPN e proxies para contornar a censura. No entanto, muitas dessas soluções eram bloqueadas pelas autoridades governamentais, o que criou a necessidade de encontrar novas maneiras de contornar a censura. Foi aí que surgiu a ideia do Snowflake, que foi lançado como uma solução para ajudar a aumentar a capacidade do Tor de contornar a censura da Internet em todo o mundo.
O Snowflake funciona por meio de um sistema distribuído de voluntários que oferecem seus proxies para ajudar a contornar a censura. Quando um usuário se conecta ao Snowflake, seu tráfego é roteado por meio de um conjunto de proxies voluntários que se oferecem para ajudar a contornar a censura. Esses proxies são distribuídos em todo o mundo, o que ajuda a garantir que haja sempre uma opção disponível para os usuários que desejam acessar a Internet livremente.
O Snowflake resolve o problema de acesso à Internet em locais onde o acesso ao Tor é bloqueado. Ele permite que os usuários contornem a censura e a vigilância da Internet, acessando sites e aplicativos que seriam bloqueados em suas regiões. Com o Snowflake, os usuários podem navegar na Internet com mais privacidade e segurança, evitando serem detectados pelos censores da Internet.
"A privacidade é necessária para uma sociedade aberta na era eletrônica. Privacidade não é sigilo. Uma sociedade livre requer privacidade na comunicação, bem como privacidade na busca e na associação." - Eric Hughes
https://snowflake.torproject.org/
https://youtu.be/ZC6GXRJOWmo
-
@ 32e18276:5c68e245
2025-06-03 14:45:176 years ago I created some tools for working with peter todd's opentimestamps proof format. You can do some fun things like create plaintext and mini ots proofs. This short post is just a demo of what these tools do and how to use them.
What is OTS?
OpenTimestamps is a protocol for stamping information into bitcoin in a minimal way. It uses OP_RETURN outputs so that it has minimal impact on chain, and potentially millions of documents are stamped all at once with a merkle tree construction.
Examples
Here's the proof of the
ots.c
source file getting stamped into the ots calendar merkle tree. We're simply printing the ots proof file here withotsprint
:``` $ ./otsprint ots.c.ots
version 1 file_hash sha256 f76f0795ff37a24e566cd77d1996b64fab9c871a5928ab9389dfc3a128ec8296 append 2e9943d3833768bdb9a591f1d2735804 sha256 | --> append 2d82e7414811ecbf | sha256 | append a69d4f93e3e0f6c9b8321ce2cdd90decd34d260ea3f8b55e83d157ad398b7843 | sha256 | append ac0b5896401478eb6d88a408ec08b33fd303b574fb09b503f1ac1255b432d304 | sha256 | append 8aa9fd0245664c23d31d344243b4e8b0 | sha256 | prepend 414db5a1cd3a3e6668bf2dca9007e7c0fc5aa6dc71a2eab3afb51425c3acc472 | sha256 | append 5355b15d88d4dece45cddb7913f2c83d41e641e8c1d939dac4323671a4f8e197 | sha256 | append a2babd907ca513ab561ce3860e64a26b7df5de117f1f230bc8f1a248836f0c25 | sha256 | prepend 683f072f | append 2a4cdf9e9e04f2fd | attestation calendar https://alice.btc.calendar.opentimestamps.org | --> append 7c8764fcaba5ed5d | sha256 | prepend f7e1ada392247d3f3116a97d73fcf4c0994b5c22fff824736db46cd577b97151 | sha256 | append 3c43ac41e0281f1dbcd7e713eb1ffaec48c5e05af404bca2166cdc51966a921c | sha256 | append 07b18bd7f4a5dc72326416aa3c8628ca80c8d95d7b1a82202b90bc824974da13 | sha256 | append b4d641ab029e7d900e92261c2342c9c9 | sha256 | append 4968b89b02b534f33dc26882862d25cca8f0fa76be5b9d3a3b5e2d77690e022b | sha256 | append 48c54e30b3a9ec0e6339b88ed9d04b9b1065838596a4ec778cbfc0dfc0f8c781 | sha256 | prepend 683f072f | append 8b2b4beda36c18dc | attestation calendar https://bob.btc.calendar.opentimestamps.org | --> append baa878b42ef3e0d45b324cc3a39a247a | sha256 | prepend 4fb1bc663cd641ad18e5c73fb618de1ae3d28fb5c3c224b7f9888fd52feb09ec | sha256 | append 731329278830c9725497d70e9f5a02e4b2d9c73ff73560beb3a896a2f180fdbf | sha256 | append 689024a9d57ad5daad669f001316dd0fc690ac4520410f97a349b05a3f5d69cb | sha256 | append 69d42dcb650bb2a690f850c3f6e14e46c2b0831361bac9ec454818264b9102fd | sha256 | prepend 683f072f | append bab471ba32acd9c3 | attestation calendar https://btc.calendar.catallaxy.com append c3ccce274e2f9edfa354ec105cb1a749 sha256 append 6297b54e3ce4ba71ecb06bd5632fd8cbd50fe6427b6bfc53a0e462348cc48bab sha256 append c28f03545a2948bd0d8102c887241aff5d4f6cf1e0b16dfd8787bf45ca2ab93d sha256 prepend 683f072f append 7f3259e285891c8e attestation calendar https://finney.calendar.eternitywall.com ```
The tool can create a minimal version of the proofs:
``` $ ./otsmini ots.c.ots | ./otsmini -d | ./otsprint
version 1 file_hash sha256 f76f0795ff37a24e566cd77d1996b64fab9c871a5928ab9389dfc3a128ec8296 append 2e9943d3833768bdb9a591f1d2735804 sha256 append c3ccce274e2f9edfa354ec105cb1a749 sha256 append 6297b54e3ce4ba71ecb06bd5632fd8cbd50fe6427b6bfc53a0e462348cc48bab sha256 append c28f03545a2948bd0d8102c887241aff5d4f6cf1e0b16dfd8787bf45ca2ab93d sha256 prepend 683f072f append 7f3259e285891c8e attestation calendar https://finney.calendar.eternitywall.com ```
which can be shared on social media as a string:
5s1L3tTWoTfUDhB1MPLXE1rnajwUdUnt8pfjZfY1UWVWpWu5YhW3PGCWWoXwWBRJ16B8182kQgxnKyiJtGQgRoFNbDfBss19seDnco5sF9WrBt8jQW7BVVmTB5mmAPa8ryb5929w4xEm1aE7S3SGMFr9rUgkNNzhMg4VK6vZmNqDGYvvZxBtwDMs2PRJk7y6wL6aJmq6yoaWPvuxaik4qMp76ApXEufP6RnWdapqGGsKy7TNE6ZzWWz2VXbaEXGwgjrxqF8bMstZMdGo2VzpVuE
you can even do things like gpg-style plaintext proofs:
``` $ ./otsclear -e CONTRIBUTING.ots -----BEGIN OPENTIMESTAMPS MESSAGE-----
Email patches to William Casarin jb55@jb55.com
-----BEGIN OPENTIMESTAMPS PROOF-----
AE9wZW5UaW1lc3RhbXBzAABQcm9vZgC/ieLohOiSlAEILXj4GSagG6fRNnR+CHj9e/+Mdkp0w1us gV/5dmlX2NrwEDlcBMmQ723mI9sY9ALUlXoI//AQRXlCd716J60FudR+C78fkAjwIDnONJrj1udi NDxQQ8UJiS4ZWfprUxbvaIoBs4G+4u6kCPEEaD8Ft/AIeS/skaOtQRoAg9/jDS75DI4pKGh0dHBz Oi8vZmlubmV5LmNhbGVuZGFyLmV0ZXJuaXR5d2FsbC5jb23/8AhMLZVzYZMYqwjwEPKWanBNPZVm kqsAYV3LBbkI8CCfIVveDh/S8ykOH1NC6BKTerHoPojvj1OmjB2LYvdUbgjxBGg/BbbwCGoo3fi1 A7rjAIPf4w0u+QyOLi1odHRwczovL2FsaWNlLmJ0Yy5jYWxlbmRhci5vcGVudGltZXN0YW1wcy5v cmf/8Aik+VP+n3FhCwjwELfTdHAfYQNa49I3CYycFbkI8QRoPwW28AgCLn93967lIQCD3+MNLvkM jiwraHR0cHM6Ly9ib2IuYnRjLmNhbGVuZGFyLm9wZW50aW1lc3RhbXBzLm9yZ/AQ3bEwg7mjQyKR PykGgiJewAjwID5Q68dY4m+XogwTJx72ecQEe5lheCO1RnlcJSTFokyRCPEEaD8Ft/AIw1WWPe++ 8N4Ag9/jDS75DI4jImh0dHBzOi8vYnRjLmNhbGVuZGFyLmNhdGFsbGF4eS5jb20= -----END OPENTIMESTAMPS PROOF-----
$ ./otsclear -v <<<proof_string... # verify the proof string ```
I've never really shared these tools before, I just remembered about it today. Enjoy!
Try it out: https://github.com/jb55/ots-tools
-
@ 7f6db517:a4931eda
2025-06-16 14:02:26What is KYC/AML?
- The acronym stands for Know Your Customer / Anti Money Laundering.
- In practice it stands for the surveillance measures companies are often compelled to take against their customers by financial regulators.
- Methods differ but often include: Passport Scans, Driver License Uploads, Social Security Numbers, Home Address, Phone Number, Face Scans.
- Bitcoin companies will also store all withdrawal and deposit addresses which can then be used to track bitcoin transactions on the bitcoin block chain.
- This data is then stored and shared. Regulations often require companies to hold this information for a set number of years but in practice users should assume this data will be held indefinitely. Data is often stored insecurely, which results in frequent hacks and leaks.
- KYC/AML data collection puts all honest users at risk of theft, extortion, and persecution while being ineffective at stopping crime. Criminals often use counterfeit, bought, or stolen credentials to get around the requirements. Criminals can buy "verified" accounts for as little as $200. Furthermore, billions of people are excluded from financial services as a result of KYC/AML requirements.
During the early days of bitcoin most services did not require this sensitive user data, but as adoption increased so did the surveillance measures. At this point, most large bitcoin companies are collecting and storing massive lists of bitcoiners, our sensitive personal information, and our transaction history.
Lists of Bitcoiners
KYC/AML policies are a direct attack on bitcoiners. Lists of bitcoiners and our transaction history will inevitably be used against us.
Once you are on a list with your bitcoin transaction history that record will always exist. Generally speaking, tracking bitcoin is based on probability analysis of ownership change. Surveillance firms use various heuristics to determine if you are sending bitcoin to yourself or if ownership is actually changing hands. You can obtain better privacy going forward by using collaborative transactions such as coinjoin to break this probability analysis.
Fortunately, you can buy bitcoin without providing intimate personal information. Tools such as peach, hodlhodl, robosats, azteco and bisq help; mining is also a solid option: anyone can plug a miner into power and internet and earn bitcoin by mining privately.
You can also earn bitcoin by providing goods and/or services that can be purchased with bitcoin. Long term, circular economies will mitigate this threat: most people will not buy bitcoin - they will earn bitcoin - most people will not sell bitcoin - they will spend bitcoin.
There is no such thing as KYC or No KYC bitcoin, there are bitcoiners on lists and those that are not on lists.
If you found this post helpful support my work with bitcoin.
-
@ 7f6db517:a4931eda
2025-06-16 14:02:26The former seems to have found solid product market fit. Expect significant volume, adoption, and usage going forward.
The latter's future remains to be seen. Dependence on Tor, which has had massive reliability issues, and lack of strong privacy guarantees put it at risk.
— ODELL (@ODELL) October 27, 2022
The Basics
- Lightning is a protocol that enables cheap and fast native bitcoin transactions.
- At the core of the protocol is the ability for bitcoin users to create a payment channel with another user.
- These payment channels enable users to make many bitcoin transactions between each other with only two on-chain bitcoin transactions: the channel open transaction and the channel close transaction.
- Essentially lightning is a protocol for interoperable batched bitcoin transactions.
- It is expected that on chain bitcoin transaction fees will increase with adoption and the ability to easily batch transactions will save users significant money.
- As these lightning transactions are processed, liquidity flows from one side of a channel to the other side, on chain transactions are signed by both parties but not broadcasted to update this balance.
- Lightning is designed to be trust minimized, either party in a payment channel can close the channel at any time and their bitcoin will be settled on chain without trusting the other party.
There is no 'Lightning Network'
- Many people refer to the aggregate of all lightning channels as 'The Lightning Network' but this is a false premise.
- There are many lightning channels between many different users and funds can flow across interconnected channels as long as there is a route through peers.
- If a lightning transaction requires multiple hops it will flow through multiple interconnected channels, adjusting the balance of all channels along the route, and paying lightning transaction fees that are set by each node on the route.
Example: You have a channel with Bob. Bob has a channel with Charlie. You can pay Charlie through your channel with Bob and Bob's channel with User C.
- As a result, it is not guaranteed that every lightning user can pay every other lightning user, they must have a route of interconnected channels between sender and receiver.
Lightning in Practice
- Lightning has already found product market fit and usage as an interconnected payment protocol between large professional custodians.
- They are able to easily manage channels and liquidity between each other without trust using this interoperable protocol.
- Lightning payments between large custodians are fast and easy. End users do not have to run their own node or manage their channels and liquidity. These payments rarely fail due to professional management of custodial nodes.
- The tradeoff is one inherent to custodians and other trusted third parties. Custodial wallets can steal funds and compromise user privacy.
Sovereign Lightning
- Trusted third parties are security holes.
- Users must run their own node and manage their own channels in order to use lightning without trusting a third party. This remains the single largest friction point for sovereign lightning usage: the mental burden of actively running a lightning node and associated liquidity management.
- Bitcoin development prioritizes node accessibility so cost to self host your own node is low but if a node is run at home or office, Tor or a VPN is recommended to mask your IP address: otherwise it is visible to the entire network and represents a privacy risk.
- This privacy risk is heightened due to the potential for certain governments to go after sovereign lightning users and compel them to shutdown their nodes. If their IP Address is exposed they are easier to target.
- Fortunately the tools to run and manage nodes continue to get easier but it is important to understand that this will always be a friction point when compared to custodial services.
The Potential Fracture of Lightning
- Any lightning user can choose which users are allowed to open channels with them.
- One potential is that professional custodians only peer with other professional custodians.
- We already see nodes like those run by CashApp only have channels open with other regulated counterparties. This could be due to performance goals, liability reduction, or regulatory pressure.
- Fortunately some of their peers are connected to non-regulated parties so payments to and from sovereign lightning users are still successfully processed by CashApp but this may not always be the case going forward.
Summary
- Many people refer to the aggregate of all lightning channels as 'The Lightning Network' but this is a false premise. There is no singular 'Lightning Network' but rather many payment channels between distinct peers, some connected with each other and some not.
- Lightning as an interoperable payment protocol between professional custodians seems to have found solid product market fit. Expect significant volume, adoption, and usage going forward.
- Lightning as a robust sovereign payment protocol has yet to be battle tested. Heavy reliance on Tor, which has had massive reliability issues, the friction of active liquidity management, significant on chain fee burden for small amounts, interactivity constraints on mobile, and lack of strong privacy guarantees put it at risk.
If you have never used lightning before, use this guide to get started on your phone.
If you found this post helpful support my work with bitcoin.
-
@ 4ba8e86d:89d32de4
2025-06-17 17:46:21A sede do ProtonMail está localizada na Suíça, um país conhecido por suas leis rigorosas de privacidade, embora a empresa tenha enfrentado alguns desafios, como ataques DDoS e pressão do governo suíço, ela continua comprometida em fornecer um serviço seguro e privado aos seus usuários.
O ProtonMail foi fundado em 2014 por um grupo de cientistas do CERN (Organização Europeia para Pesquisa Nuclear) que queriam criar uma plataforma de e-mail segura e privada que usasse criptografia de ponta a ponta. O objetivo era oferecer aos usuários uma alternativa aos serviços de e-mail tradicionais que frequentemente violam a privacidade dos usuários.A equipe fundadora incluía Andy Yen, Jason Stockman e Wei Sun, todos com formação em física e matemática.
Ao longo dos anos, o ProtonMail lançou vários recursos adicionais, incluindo aplicativos móveis para iOS e Android, integração com Tor e a possibilidade de enviar e-mails criptografados para usuários de outros provedores de e-mail. O ProtonMail também lançou uma VPN (rede privada virtual) chamada ProtonVPN, que segue o mesmo compromisso com a privacidade e segurança dos usuários.
A criptografia de ponta a ponta utilizada pelo ProtonMail assegura a proteção de todas as mensagens de seus usuários. O processo de criptografia ocorre no dispositivo do remetente antes do envio das mensagens aos servidores da ProtonMail, onde elas são armazenadas em formato criptografado. Quando o destinatário abre a mensagem, ela é descriptografada no dispositivo do destinatário, garantindo que somente o destinatário possa ler o conteúdo da mensagem. Isso significa que, mesmo que os servidores da ProtonMail sejam violados, as mensagens dos usuários permanecerão seguras e protegidas.
O ProtonMail oferece suporte à autenticação de dois fatores usando chaves de segurança YubiKey. Isso adiciona uma camada extra de segurança ao login da conta do ProtonMail, pois um invasor precisaria não apenas da senha, mas também da chave física para acessar a conta do usuário. A YubiKey é uma opção popular para autenticação de dois fatores, pois é fácil de usar e oferece proteção adicional contra-ataques de phishing e keylogging. O ProtonMail também suporta outras opções de autenticação de dois fatores, aplicativos de autenticação, como o Aegis Authenticator.
Outra funcionalidade importante é a proteção contra phishing e spam. O ProtonMail utiliza algoritmos avançados de filtragem para identificar e bloquear mensagens maliciosas antes que elas cheguem à caixa de entrada do usuário. Isso ajuda a reduzir a quantidade de spam recebida e a proteger contra-ataques de phishing, que tentam enganar o usuário a fornecer informações pessoais.
Passo a passo instalação do aplicativo protonmail no Android:
-
Baixe e instale o aplicativo protonmail em seu dispositivo móvel no F-droid ou obtainium.
-
Clique em "Criar nova conta" se você ainda não tiver uma conta ProtonMail, ou clique em "Fazer login" se já tiver uma conta.
-
Se você está criando uma nova conta, preencha os campos de registro, incluindo seu endereço de e-mail desejado e uma senha forte.
-
Depois de criar ou fazer login em sua conta, você pode usar o ProtonMail em seu dispositivo Android para enviar e receber e-mails seguros e protegidos.
Lembre-se de que, para garantir a privacidade e a segurança de suas informações, é importante usar uma senha forte e habilitar a autenticação de dois fatores. Utilize o Tor para acessar seu e-mail no site onion e considere usar uma VPN.
No Relatório de Transparência do ProtonMail, em muitos casos, a única informação que eles puderam fornecer foi um e-mail de recuperação (opcional na criação da conta) ou o IP que acessou o e-mail.
A própria ProtonMail recomenda o uso do Tor para acesso anônimo ao serviço. Se um juiz exigir a coleta do seu IP, a Proton não terá essa informação se você acessar seu e-mail via o site onion pelo Tor.
Se você é uma pessoa em situação de risco, como um ativista ou alguém que pode ser perseguido por diversos motivos, é essencial tomar medidas excepcionais: 1. Pague pelo serviço com Bitcoin. 2. Não use informações que possam identificá-lo ao se registrar. 3. Utilize o Tor, ou uma VPN, sempre que acessar o ProtonMail.
-
-
@ 31a4605e:cf043959
2025-06-17 17:54:26Bitcoin, desde a sua criação, tem sido um dos ativos mais debatidos no mundo financeiro, tanto pelos seus seguidores apaixonados quanto pelos céticos. A sua volatilidade extrema e o impacto que tem causado no sistema financeiro tradicional tornaram-no objeto de especulação constante. À medida que o tempo passa, a adoção de Bitcoin cresce e surgem novas discussões sobre o seu futuro, tanto no que diz respeito ao seu preço quanto à sua integração no sistema financeiro global. Neste contexto, existem várias previsões para o futuro de Bitcoin, com cenários tanto otimistas quanto cautelosos, baseados em fatores como regulamentação, adoção institucional e inovação tecnológica.
O preço de Bitcoin: previsões e fatores de influência
Adoção Institucional: A crescente adoção de Bitcoin por grandes empresas e investidores institucionais tem sido vista como um fator de valorização. Organizações como Tesla, MicroStrategy e Square já incorporaram Bitcoin nas suas reservas de tesouraria, o que gerou uma maior confiança no ativo como uma reserva de valor. À medida que mais empresas sigam esse caminho, a demanda por Bitcoin pode aumentar, pressionando o preço para cima.
Regulação Governamental: A forma como os governos lidam com Bitcoin é um dos maiores fatores de incerteza. Uma regulação excessiva pode restringir o acesso e diminuir o interesse, enquanto uma abordagem mais amigável pode impulsionar a adoção e aumentar o preço. Em países como El Salvador, que adotaram o Bitcoin como moeda legal, observa-se uma tendência positiva, mas em muitas outras nações, a regulação ainda é um grande desafio.
Oferta Limitada: A oferta de Bitcoin é limitada a 21 milhões de unidades, o que significa que não há risco de inflação ou aumento da quantidade disponível. Este facto torna Bitcoin particularmente atraente como reserva de valor, especialmente em tempos de incerteza económica global, o que pode continuar a impulsionar a sua valorização a longo prazo.
Tecnologia e Escalabilidade: Inovações como a Lightning Network e o Taproot, que visam melhorar a escalabilidade e a eficiência das transações, podem contribuir para uma adoção mais ampla, o que, por sua vez, poderia ter um impacto positivo no preço. Se Bitcoin se tornar mais acessível e viável para transações diárias, a sua utilidade será mais valorizada no mercado.
Adoção global do Bitcoin: o caminho para a inclusão financeira
A adoção global de Bitcoin está a crescer, especialmente em regiões onde os sistemas financeiros tradicionais são ineficazes ou limitados. Países com economias instáveis, como nações com alta inflação ou crise cambial, estão cada vez mais a ver no Bitcoin uma alternativa viável. Além disso, a inclusão financeira é um dos maiores motores dessa adoção, uma vez que Bitcoin pode oferecer serviços financeiros a populações que estão fora do alcance dos bancos tradicionais.
Mercados Emergentes: Em países como o Brasil, Argentina, Nigéria e outros mercados emergentes, a procura por Bitcoin tem crescido, pois as pessoas procuram proteger os seus ativos da desvalorização das suas moedas locais. Nesses locais, Bitcoin surge como uma alternativa de reserva de valor e meio de troca que não está sujeita ao controlo de uma autoridade central.
Adoção por Governos e Empresas: A crescente aceitação de Bitcoin por grandes empresas e governos pode acelerar a sua integração nas economias globais. Países como El Salvador demonstraram que é possível adotar Bitcoin como uma moeda oficial, enquanto grandes empresas estão cada vez mais a aceitar Bitcoin como forma de pagamento, o que legitima ainda mais o seu uso no comércio global.
Educação e Acessibilidade: A medida que mais pessoas compreendem o funcionamento do Bitcoin e as suas vantagens em termos de segurança, privacidade e liberdade financeira, a adoção tende a crescer. A simplicidade das plataformas de exchange e as melhorias em termos de usabilidade das carteiras digitais tornam mais fácil para os utilizadores entrarem no mercado e utilizarem Bitcoin no seu dia a dia.
Cenários futuros: otimismo ou cautela?
O futuro do Bitcoin é incerto, mas diversos cenários podem se desenrolar. O cenário otimista aponta para uma maior valorização e adoção global, impulsionada pela inovação tecnológica, aumento da confiança institucional e a busca por uma alternativa descentralizada ao sistema financeiro tradicional. Nesse cenário, Bitcoin poderia tornar-se uma forma amplamente aceite de pagamento e uma reserva de valor global, com preços que poderiam ultrapassar os valores mais elevados já registados.
Por outro lado, o cenário cauteloso sugere que os obstáculos como regulação governamental, competição com outras moedas digitais e possíveis falhas tecnológicas podem impedir que o Bitcoin se torne uma parte central do sistema financeiro. Além disso, a volatilidade do preço pode desencorajar aqueles que buscam estabilidade e segurança.
Resumindo, as previsões sobre o preço e a adoção global de Bitcoin são, sem dúvida, complexas e influenciadas por vários fatores. O futuro do Bitcoin dependerá de como a sociedade, os governos e as empresas responderão a essa nova forma de dinheiro. Embora o potencial de valorização seja significativo, o risco e a volatilidade são características que não podem ser ignoradas. À medida que a adoção global cresce e a tecnologia evolui, será necessário acompanhar de perto os desenvolvimentos que irão moldar o futuro de Bitcoin no sistema financeiro global.
Muito obrigado por teres lido o texto até aqui, espero que esteja tudo bem contigo e um abraço enorme do teu madeirense bitcoiner maximalista favorito. Viva a liberdade!
-
@ 7f6db517:a4931eda
2025-06-16 14:02:25The newly proposed RESTRICT ACT - is being advertised as a TikTok Ban, but is much broader than that, carries a $1M Fine and up to 20 years in prison️! It is unconstitutional and would create massive legal restrictions on the open source movement and free speech throughout the internet.
The Bill was proposed by: Senator Warner, Senator Thune, Senator Baldwin, Senator Fischer, Senator Manchin, Senator Moran, Senator Bennet, Senator Sullivan, Senator Gillibrand, Senator Collins, Senator Heinrich, and Senator Romney. It has broad support across Senators of both parties.
Corrupt politicians will not protect us. They are part of the problem. We must build, support, and learn how to use censorship resistant tools in order to defend our natural rights.
The RESTRICT Act, introduced by Senators Warner and Thune, aims to block or disrupt transactions and financial holdings involving foreign adversaries that pose risks to national security. Although the primary targets of this legislation are companies like Tik-Tok, the language of the bill could potentially be used to block or disrupt cryptocurrency transactions and, in extreme cases, block Americans’ access to open source tools or protocols like Bitcoin.
The Act creates a redundant regime paralleling OFAC without clear justification, it significantly limits the ability for injured parties to challenge actions raising due process concerns, and unlike OFAC it lacks any carve-out for protected speech. COINCENTER ON THE RESTRICT ACT
If you found this post helpful support my work with bitcoin.
-
@ 9ca447d2:fbf5a36d
2025-06-17 19:01:30Bluebird Mining Ventures Ltd., a UK-listed gold exploration company, has made headlines after announcing it will convert future revenues into bitcoin. This is the first time a UK mining company has committed to having a bitcoin treasury.
Bluebird Mining on X
The news sent Bluebird’s stock flying, rising 63% to £0.6 in 48 hours.
Bluebird which has gold projects in South Korea and the Philippines says this is part of a broader plan to modernize how it manages its finances.
“By adopting a ‘gold plus a digital gold’ strategy, it offers the Company an opportunity to turn the page and look to the future and seek to attract a new type of shareholder,” said Aidan Bishop, Interim CEO and Executive Director.
The company’s management believes bitcoin’s rise as a financial asset reflects growing dissatisfaction with traditional stores of value like gold.
Gold has been a reliable hedge against inflation for centuries, but bitcoin is now being seen as a digital alternative – thanks to its limited supply and independence from central bank policies.
Related: Gold at Historic Low Against Bitcoin | A Paradigm Shift?
“Gold’s position as a store of value has been under threat due to the rising global adoption of bitcoin, which some commentators have described as ‘digital gold’,” Bluebird said in a statement.
The plan is simple. Revenue from Bluebird’s gold mining projects will be used to buy bitcoin. The company says this will allow it to preserve capital and have growth potential through exposure to the digital asset market.
The digital asset will be held on the company’s balance sheet as a long-term reserve asset, just like some companies hold gold or cash. Bluebird sees this as proactive, especially in today’s volatile world of inflation, high debt, and global geopolitical tensions. Bishop said:
“I am convinced that we are witnessing a tectonic shift in global markets and that Bitcoin will reshape the landscape of financial markets on every level.”
Bluebird Mining Ventures is a small but big-thinking company.
With 7 employees and operations across Asia, it’s focused on reopening high-grade gold mines that have been closed. Its main projects are the Gubong and Kochang mines in South Korea and the Batangas Gold Project in the Philippines.
In May 2025, the company renewed its mining permit in the Philippines and is finalizing a deal with its local partner to have a “free carry” — meaning it will hold a share of the future profits without putting in any more money.
At the same time, Bluebird is preparing legal action in South Korea to protect its existing assets there, so while it loves Bitcoin, it hasn’t forgotten its mining roots.
To lead this transformation, Bluebird is currently looking for a new CEO with Bitcoin experience. The company says the right leadership will be key to navigating this hybrid financial model that combines traditional resource extraction with modern financials.
-
@ 7f6db517:a4931eda
2025-06-16 14:02:25People forget Bear Stearns failed March 2008 - months of denial followed before the public realized how bad the situation was under the surface.
Similar happening now but much larger scale. They did not fix fundamental issues after 2008 - everything is more fragile.
The Fed preemptively bailed out every bank with their BTFP program and First Republic Bank still failed. The second largest bank failure in history.
There will be more failures. There will be more bailouts. Depositors will be "protected" by socializing losses across everyone.
Our President and mainstream financial pundits are currently pretending the banking crisis is over while most banks remain insolvent. There are going to be many more bank failures as this ponzi system unravels.
Unlike 2008, we have the ability to opt out of these broken and corrupt institutions by using bitcoin. Bitcoin held in self custody is unique in its lack of counterparty risk - you do not have to trust a bank or other centralized entity to hold it for you. Bitcoin is also incredibly difficult to change by design since it is not controlled by an individual, company, or government - the supply of dollars will inevitably be inflated to bailout these failing banks but bitcoin supply will remain unchanged. I do not need to convince you that bitcoin provides value - these next few years will convince millions.
If you found this post helpful support my work with bitcoin.
-
@ 88cc134b:5ae99079
2025-06-17 17:45:00 -
@ 31a4605e:cf043959
2025-06-17 17:47:57Desde a sua criação, Bitcoin tem sido muito mais do que apenas uma alternativa ao dinheiro tradicional. Com a digitalização crescente da economia global, Bitcoin tem-se afirmado como um pilar fundamental para novas formas de transações, comércio e reserva de valor. A sua descentralização, transparência e resistência à censura tornam-no uma base sólida para economias digitais, onde as interações financeiras ocorrem sem a necessidade de intermediários tradicionais.
As características de Bitcoin na economia digital
Transações globais e sem fronteiras: Qualquer pessoa com acesso à internet pode enviar e receber Bitcoin sem precisar de um banco ou autorização governamental.
Oferta limitada e previsível: Ao contrário do dinheiro fiduciário, que pode ser inflacionado por bancos centrais, Bitcoin tem um limite fixo de 21 milhões de unidades, tornando-o um ativo escasso e confiável.
Segurança e transparência: A blockchain ou timechain de Bitcoin regista todas as transações publicamente, garantindo um sistema seguro e auditável.
Resistência à censura: Nenhum governo ou entidade pode bloquear transações de Bitcoin, permitindo uma economia digital mais livre e acessível.
Com essas características, Bitcoin já está a transformar diversos setores económicos, impulsionando novas formas de comércio e investimento.
Bitcoin no comércio digital e na economia global
E-commerce: Empresas e consumidores podem utilizar Bitcoin para transações internacionais rápidas e sem taxas abusivas.
Remessas internacionais: Trabalhadores que enviam dinheiro para os seus países de origem podem evitar taxas elevadas e transferências demoradas ao utilizar Bitcoin.
Economias emergentes: Em países com moedas instáveis e sistemas bancários pouco confiáveis, Bitcoin serve como uma alternativa segura e descentralizada para armazenamento de riqueza e transações diárias.
Além disso, Bitcoin está a ser adotado por empresas e governos como reserva de valor, reforçando o seu papel como base para a economia digital do futuro.
Desafios e adaptação à nova economia
Volatilidade do preço: A oscilação do valor de Bitcoin pode dificultar o seu uso diário como meio de pagamento.
Regulações e resistência governamental: Alguns países tentam limitar ou regular Bitcoin para manter o controlo sobre o sistema financeiro tradicional.
Educação e adoção: Muitas pessoas ainda desconhecem como utilizar Bitcoin de forma segura e eficiente.
Resumindo, o Bitcoin está a transformar a forma como o mundo interage com o dinheiro, oferecendo uma alternativa descentralizada e transparente para economias digitais. À medida que mais pessoas e empresas adotam Bitcoin para pagamentos, poupança e comércio global, o seu impacto torna-se cada vez mais evidente. Apesar dos desafios, Bitcoin continua a consolidar-se como a base de um novo paradigma económico, onde a liberdade financeira e a inovação tecnológica caminham lado a lado.
Muito obrigado por teres lido o texto até aqui, espero que esteja tudo bem contigo e um abraço enorme do teu madeirense bitcoiner maximalista favorito. Viva a liberdade!
-
@ 7f6db517:a4931eda
2025-06-16 14:02:24Nostr is an open communication protocol that can be used to send messages across a distributed set of relays in a censorship resistant and robust way.
If you missed my nostr introduction post you can find it here. My nostr account can be found here.
We are nearly at the point that if something interesting is posted on a centralized social platform it will usually be posted by someone to nostr.
We are nearly at the point that if something interesting is posted exclusively to nostr it is cross posted by someone to various centralized social platforms.
We are nearly at the point that you can recommend a cross platform app that users can install and easily onboard without additional guides or resources.
As companies continue to build walls around their centralized platforms nostr posts will be the easiest to cross reference and verify - as companies continue to censor their users nostr is the best censorship resistant alternative - gradually then suddenly nostr will become the standard. 🫡
Current Nostr Stats
If you found this post helpful support my work with bitcoin.
-
@ 39cc53c9:27168656
2025-06-17 16:40:28The new website is finally live! I put in a lot of hard work over the past months on it. I'm proud to say that it's out now and it looks pretty cool, at least to me!
Why rewrite it all?
The old kycnot.me site was built using Python with Flask about two years ago. Since then, I've gained a lot more experience with Golang and coding in general. Trying to update that old codebase, which had a lot of design flaws, would have been a bad idea. It would have been like building on an unstable foundation.
That's why I made the decision to rewrite the entire application. Initially, I chose to use SvelteKit with JavaScript. I did manage to create a stable site that looked similar to the new one, but it required Jav aScript to work. As I kept coding, I started feeling like I was repeating "the Python mistake". I was writing the app in a language I wasn't very familiar with (just like when I was learning Python at that mom ent), and I wasn't happy with the code. It felt like spaghetti code all the time.
So, I made a complete U-turn and started over, this time using Golang. While I'm not as proficient in Golang as I am in Python now, I find it to be a very enjoyable language to code with. Most aof my recent pr ojects have been written in Golang, and I'm getting the hang of it. I tried to make the best decisions I could and structure the code as well as possible. Of course, there's still room for improvement, which I'll address in future updates.
Now I have a more maintainable website that can scale much better. It uses a real database instead of a JSON file like the old site, and I can add many more features. Since I chose to go with Golang, I mad e the "tradeoff" of not using JavaScript at all, so all the rendering load falls on the server. But I believe it's a tradeoff that's worth it.
What's new
- UI/UX - I've designed a new logo and color palette for kycnot.me. I think it looks pretty cool and cypherpunk. I am not a graphic designer, but I think I did a decent work and I put a lot of thinking on it to make it pleasant!
- Point system - The new point system provides more detailed information about the listings, and can be expanded to cover additional features across all services. Anyone can request a new point!
- ToS Scrapper: I've implemented a powerful automated terms-of-service scrapper that collects all the ToS pages from the listings. It saves you from the hassle of reading the ToS by listing the lines that are suspiciously related to KYC/AML practices. This is still in development and it will improve for sure, but it works pretty fine right now!
- Search bar - The new search bar allows you to easily filter services. It performs a full-text search on the Title, Description, Category, and Tags of all the services. Looking for VPN services? Just search for "vpn"!
- Transparency - To be more transparent, all discussions about services now take place publicly on GitLab. I won't be answering any e-mails (an auto-reply will prompt to write to the corresponding Gitlab issue). This ensures that all service-related matters are publicly accessible and recorded. Additionally, there's a real-time audits page that displays database changes.
- Listing Requests - I have upgraded the request system. The new form allows you to directly request services or points without any extra steps. In the future, I plan to enable requests for specific changes to parts of the website.
- Lightweight and fast - The new site is lighter and faster than its predecessor!
- Tor and I2P - At last! kycnot.me is now officially on Tor and I2P!
How?
This rewrite has been a labor of love, in the end, I've been working on this for more than 3 months now. I don't have a team, so I work by myself on my free time, but I find great joy in helping people on their private journey with cryptocurrencies. Making it easier for individuals to use cryptocurrencies without KYC is a goal I am proud of!
If you appreciate my work, you can support me through the methods listed here. Alternatively, feel free to send me an email with a kind message!
Technical details
All the code is written in Golang, the website makes use of the chi router for the routing part. I also make use of BigCache for caching database requests. There is 0 JavaScript, so all the rendering load falls on the server, this means it needed to be efficient enough to not drawn with a few users since the old site was reporting about 2M requests per month on average (note that this are not unique users).
The database is running with mariadb, using gorm as the ORM. This is more than enough for this project. I started working with an
sqlite
database, but I ended up migrating to mariadb since it works better with JSON.The scraper is using chromedp combined with a series of keywords, regex and other logic. It runs every 24h and scraps all the services. You can find the scraper code here.
The frontend is written using Golang Templates for the HTML, and TailwindCSS plus DaisyUI for the CSS classes framework. I also use some plain CSS, but it's minimal.
The requests forms is the only part of the project that requires JavaScript to be enabled. It is needed for parsing some from fields that are a bit complex and for the "captcha", which is a simple Proof of Work that runs on your browser, destinated to avoid spam. For this, I use mCaptcha.
-
@ 8bad92c3:ca714aa5
2025-06-16 13:02:03Key Takeaways
Michael Goldstein, aka Bitstein, presents a sweeping philosophical and economic case for going “all in” on Bitcoin, arguing that unlike fiat, which distorts capital formation and fuels short-term thinking, Bitcoin fosters low time preference, meaningful saving, and long-term societal flourishing. At the heart of his thesis is “hodling for good”—a triple-layered idea encompassing permanence, purpose, and the pursuit of higher values like truth, beauty, and legacy. Drawing on thinkers like Aristotle, Hoppe, and Josef Pieper, Goldstein redefines leisure as contemplation, a vital practice in aligning capital with one’s deepest ideals. He urges Bitcoiners to think beyond mere wealth accumulation and consider how their sats can fund enduring institutions, art, and architecture that reflect a moral vision of the future.
Best Quotes
“Let BlackRock buy the houses, and you keep the sats.”
“We're not hodling just for the sake of hodling. There is a purpose to it.”
“Fiat money shortens your time horizon… you can never rest.”
“Savings precedes capital accumulation. You can’t build unless you’ve saved.”
“You're increasing the marginal value of everyone else’s Bitcoin.”
“True leisure is contemplation—the pursuit of the highest good.”
“What is Bitcoin for if not to make the conditions for magnificent acts of creation possible?”
“Bitcoin itself will last forever. Your stack might not. What will outlast your coins?”
“Only a whale can be magnificent.”
“The market will sell you all the crack you want. It’s up to you to demand beauty.”
Conclusion
This episode is a call to reimagine Bitcoin as more than a financial revolution—it’s a blueprint for civilizational renewal. Michael Goldstein reframes hodling as an act of moral stewardship, urging Bitcoiners to lower their time preference, build lasting institutions, and pursue truth, beauty, and legacy—not to escape the world, but to rebuild it on sound foundations.
Timestamps
00:00 - Intro
00:50 - Michael’s BBB presentation Hodl for Good
07:27 - Austrian principles on capital
15:40 - Fiat distorts the economic process
23:34 - Bitkey
24:29 - Hodl for Good triple entendre
29:52 - Bitcoin benefits everyone
39:05 - Unchained
40:14 - Leisure theory of value
52:15 - Heightening life
1:15:48 - Breaking from the chase makes room for magnificence
1:32:32 - Nakamoto Institute’s missionTranscript
(00:00) Fiat money is by its nature a disturbance. If money is being continually produced, especially at an uncertain rate, these uh policies are really just redistribution of wealth. Most are looking for number to go up post hyper bitcoinization. The rate of growth of bitcoin would be more reflective of the growth of the economy as a whole.
(00:23) Ultimately, capital requires knowledge because it requires knowing there is something that you can add to the structures of production to lengthen it in some way that will take time but allow you to have more in the future than you would today. Let Black Rockck buy the houses and you keep the sats, not the other way around.
(00:41) You wait until later for Larry Frink to try to sell you a [Music] mansion. And we're live just like that. Just like that. 3:30 on a Friday, Memorial Day weekend. It's a good good good way to end the week and start the holiday weekend. Yes, sir. Yes, sir. Thank you for having me here. Thank you for coming. I wore this hat specifically because I think it's I think it's very apppropo uh to the conversation we're going to have which is I hope an extension of the presentation you gave at Bitblock Boom Huddle for good. You were working on
(01:24) that for many weeks leading up to uh the conference and explaining how you were structuring it. I think it's a very important topic to discuss now as the Bitcoin price is hitting new all-time highs and people are trying to understand what am I doing with Bitcoin? Like you have you have the different sort of factions within Bitcoin.
(01:47) Uh get on a Bitcoin standard, get on zero, spend as much Bitcoin as possible. You have the sailors of the world are saying buy Bitcoin, never sell, die with your Bitcoin. And I think you do a really good job in that presentation. And I just think your understanding overall of Bitcoin is incredible to put everything into context. It's not either or.
(02:07) It really depends on what you want to accomplish. Yeah, it's definitely there there is no actual one-sizefits-all um for I mean nearly anything in this world. So um yeah, I mean first of all I mean there was it was the first conference talk I had given in maybe five years. I think the one prior to that uh was um bit block boom 2019 which was my meme talk which uh has uh become infamous and notorious.
(02:43) So uh there was also a lot of like high expectations uh you know rockstar dev uh has has treated that you know uh that that talk with a lot of reference. a lot of people have enjoyed it and he was expecting this one to be, you know, the greatest one ever, which is a little bit of a little bit of a uh a burden to live up to those kinds of standards.
(03:08) Um, but you know, because I don't give a lot of talks. Um, you know, I I I like to uh try to bring ideas that might even be ideas that are common. So, something like hodling, we all talk about it constantly. uh but try to bring it from a little bit of a different angle and try to give um a little bit of uh new light to it.
(03:31) I alsove I've I've always enjoyed kind of coming at things from a third angle. Um whenever there's, you know, there's there's all these little debates that we have in in Bitcoin and sometimes it's nice to try to uh step out of it and look at it a little more uh kind of objectively and find ways of understanding it that incorporate the truths of of all of them.
(03:58) uh you know cuz I think we should always be kind of as much as possible after ultimate truth. Um so with this one um yeah I was kind of finding that that sort of golden mean. So uh um yeah and I actually I think about that a lot is uh you know Aristotle has his his concept of the golden mean. So it's like any any virtue is sort of between two vices um because you can you can always you can always take something too far.
(04:27) So you're you're always trying to find that right balance. Um so someone who is uh courageous you know uh one of the vices uh on one side is being basically reckless. I I can't remember what word he would use. Uh but effectively being reckless and just wanting to put yourself in danger for no other reason than just you know the thrill of it.
(04:50) Um and then on the other side you would just have cowardice which is like you're unwilling to put yourself um at any risk at any time. Um, and courage is right there in the middle where it's understanding when is the right time uh to put your put yourself, you know, in in the face of danger um and take it on. And so um in some sense this this was kind of me uh in in some ways like I'm obviously a partisan of hodling.
(05:20) Um, I've for, you know, a long time now talked about the, um, why huddling is good, why people do it, why we should expect it. Um, but still trying to find that that sort of golden mean of like yes, huddle, but also what are we hodling for? And it's not we're we're not hodddling just merely for the sake of hodddling.
(05:45) There there is a a purpose to it. And we should think about that. And that would also help us think more about um what are the benefits of of spending, when should we spend, why should we spend, what should we spend on um to actually give light to that sort of side of the debate. Um so that was that was what I was kind of trying to trying to get into.
(06:09) Um, as well as also just uh at the same time despite all the talk of hodling, there's always this perennial uh there's always this perennial dislike of hodlers because we're treated as uh as if um we're just free riding the network or we're just greedy or you know any of these things. And I wanted to show how uh huddling does serve a real economic purpose.
(06:36) Um, and it does benefit the individual, but it also does uh it it has actual real social um benefits as well beyond merely the individual. Um, so I wanted to give that sort of defense of hodling as well to look at it from um a a broader position than just merely I'm trying to get rich. Um uh because even the person who uh that is all they want to do um just like you know your your pure number grow up go up moonboy even that behavior has positive ramifications on on the economy.
(07:14) And while we might look at them and have uh judgments about their particular choices for them as an individual, we shouldn't discount that uh their actions are having positive positive effects for the rest of the economy. Yeah. So, let's dive into that just not even in the context of Bitcoin because I think you did a great job of this in the presentation.
(07:36) just you've done a good job of this consistently throughout the years that I've known you. Just from like a first principles Austrian economics perspective, what is the idea around capital accumulation, low time preference and deployment of that capital like what what like getting getting into like the nitty-gritty and then applying it to Bitcoin? Yeah, it's it's a big question and um in many ways I mean I I even I barely scratched the surface.
(08:05) uh I I can't claim to have read uh all the volumes of Bombber works, you know, capital and interest and and stuff like that. Um but I think there's some some sort of basic concepts that we can look at that we can uh draw a lot out. Um the first uh I guess let's write that. So repeat so like capital time preference. Yeah. Well, I guess getting more broad like why sav -
@ 5188521b:008eb518
2025-06-03 12:25:39Elysium
Part I: The Failed Harvest
First, the quiet came. Each day, the markets grew quieter, the people hungrier. A farmer stared at wilted crops, dread settling in his heart. In a kingdom once resplendent with markets and sky-reaching monuments, it was the first failed harvest that marked the end of affluence and the beginning of collapse.
By the second year, market traders stood before empty stalls, goods long gone, rotten, or ruined. Jobless men prowled, foraging the streets for vermin and meager scraps of sustenance. Young women offered their time for bread, their eyes hollow in the act. Widows, too, entered strangers’ homes, bartering themselves for their children’s next meal. Orphans, gaunt and brittle, drew meaningless shapes in the dust, their laughter a forgotten memory.
Rumors surged like wind through dry grass. Scapegoats were blamed; superstitions gripped the masses. By the third year, it was known to the people and the king alike, there would be no more monuments erected, only tombstones. The king called the council, heavy with despair. In a room filled with tension, ministers and knights sat around a table.
Before them stood the realm’s wisest farmer, a man worn from years of labor, hunger, and loss. His voice echoed the deep hunger that gripped the kingdom. “Your Majesty, the land is weary. It cries for respite.” His words hung heavy in the room, laying bare the reality of their fate.
Part II: The Devil’s Pact
In the dimly lit chamber, a palpable tension filled the air. The alchemist, servant to the king and master of arcane arts, stepped into the flickering candlelight. He held an aged book, its scent mingling with the murk of looming spells. With a voice both smooth and haunting, he shattered the quiet, his words a ripple through stone walls.
“Sire, alchemy is our last refuge. We can harvest time to feed the earth,” he began, revealing a parchment inked with cryptic circles and lines. “Each citizen, willingly or not, will spare a mere whisper of their years. An unnoticeable offering. With careful alchemy, we can replenish our lands and fortify your reign with the alms of myriad souls.” Leaning closer, he whispered the words that would redefine their civilization: a devil’s proposal intended for the king but felt by all. “Consider, my lord, a reign without end, each year stretched beyond nature’s limits, a kingdom fed by the borrowed time of its people. No more famine. No more want.”
The court waited, their faces etched with fear and desperate hope, ready to tread any path that led away from the abyss of famine.
For a moment, the king was a statue, his face a veil behind which storms brewed. Finally, exhaling a breath heavy with fate, he spoke. “We’ve endured enough hardship. We shall seize a future that knows no famine.”
The air thickened as the alchemist retreated with a solemn nod, the weight of the chosen path settling in.
He reopened his tome and voiced the incantation. Arcane syllables filled the room, weaving a desperate gambit to salvage their decaying kingdom. Thus, in the dark hours of night, they sealed a new covenant that would reverberate through generations.
Part III: Vines and Moss
In the decades that followed the alchemist’s rites, the kingdom thrived like spring after a bitter winter. Fields were lush year-round, erasing hunger and the memories of famine. Marketplaces bustled, no longer a graveyard of commerce but a carnival of exotic goods from every corner of the world. The air seemed perfumed with prosperity — healthy river fish, basilisk meats, and spices from faraway lands. A century rolled by. The king, unaging, stretched his influence over land and sea, turning his realm into an empire. Statues weathered, and languages evolved, but the king abided.
Yet, a toll was exacted. Years stolen from the people, a time tax woven into the fabric of life. The spell fed both earth and crown, cloaking decay with a veneer of wealth. The young wore the faces of old men, their eyes wise beyond their years. Every heartbeat was a sacrifice, a quiet tax to feed the castles of power.
Then came the year when the land rebelled. Coaxed by the spell, the soil had given until it couldn’t, its silent plea for rest ignored. The land remembered stolen seasons, now determined to settle old scores. Crops withered; rivers soured. Beasts waned, their numbers thinning. The kingdom, starved of Earth’s gifts, unraveled — not from human revolt, but from the silent insurrection of the land that once fed them.
With hunger as the harbinger, society fractured. Chaos and mass confusion swallowed the land, a virulent blight not even alchemy could stem. Witch hunts raged for a merciless century, fire consuming flesh and innocence. Men’s strength wilted, armies disbanded. Women, walking in the agonizing footsteps of famine-haunted foremothers, bartered touch for bread.
Monuments lay buried under vines and moss. Fertile lands turned barren. Schools emptied, their echoing halls abandoned, and children torn from learning, were sent to farm dying lands. Art withered. Painters swapped colors for shades of gray, and soon vanished altogether. Teachers and engineers were supplanted by an ever-growing class of soil-bound serfs.
Desperate, the eternal king sought another spell. He asked the people not for mere years but decades. The alchemist obliged, crafting another spell from dark incantations. Yet the ravaged earth, too spent to yield, exacted a monstrous price: lifetimes for crumbs of bread. People, skeletal, on the verge of vanishing, offered their very existence. A silence settled, a collective sacrifice borne not in rebellion, but in surrender.
Part IV: Clara The Torchbearer
In the land between sleep and waking, Clara was a child again, standing at the threshold of a room aglow with amber light. Her mother ground herbs, the wooden table before her strewn with books, vials, and leaves. “These aren’t just leaves and liquids,” her mother said. “They’re doors to the gardens of your mind.” Her words sank into Clara like stones into deep water.
She woke to a gusting wind. Her dream dissolved like morning mist. The sun broke over the kingdom, time’s toll evident in every vine-entangled ruin. Light spilled into her chamber.
Clara’s room was modest: a bed, a wardrobe, a desk. On it, a lone candle and scattered books that whispered of the kingdom’s past grandeur and freedoms now lost. It was her mother’s notes and books, crafted in the quiet, away from royal eyes — a puzzle to decipher, a quest still yearning for footsteps.
She draped a linen robe over her shoulders and approached the window, her fingers ink-stained from yesterday’s writings. Below, people shuffled through life, joyless and muted.
The spell cast long ago had become an oppressive, faceless dictator. It promised bread but dealt only crumbs, a tarnished magic now woven into the kingdom’s culture as enduringly as its ancient stone walls and teeming graveyards.
She remembered the cold spring day she put her mother in the earth. The ground was hard, the casket simple. The tombstone bore the words: ‘Seed in Drought.’
The chambermaid standing beside her asked what it meant.
“Her wish,” Clara answered. Her face gave nothing away, her thoughts a distant country.
From her room, Clara watched the people below — eyes down, spirits broken. Clara was not like the others. She carried an inner fire, gifted from her mother, a quiet revolt against a gray world.
In her room’s sanctuary, amid ink and parchment molded by hands long stilled, Clara found traces of a freer past, free from famine and theft of years. A past now entrusted to her. As she flipped through the timeworn pages of an ancient tome, something caught Clara’s eye. In the margins of the text, a note penned in her mother’s hand: “For Clara — Elric is the keeper of truths that free us. Go where I could not. Find him.” Below it, a tender signature, her mother’s name etched in ink.
The name ‘Elric’ stirred a latent memory, a shared secret often spoken by her mother. Filled with a sense of destiny, Clara closed her worn books and left her chamber.
At the age of twenty, for the first time, she ventured beyond the confining walls of her castle. Guided by remnants of forgotten eras, she set forth to unearth truths long interred but never wholly erased. Her compass drew her toward the Whispering Pines, a land untouched by the alchemist’s dark arts and, as her mother had often mentioned, the rumored dwelling of Elric.
Part V: Far to Go
Clara walked through towns void of kindness, over land stripped of life. Each day sculpted her in the likeness of the land she traversed — a leaner body, hands hardened, face etched by sun and wind.
Thirteen days out, Clara trudged through the ashen remains of a town, its name forgotten, its history lost. Empty buildings sagged under the weight of time, their hollow frames like gravestones against the evening sky. Vacant faces, like clock dials without hands, glanced through her, never at her.
Spying a run-down tavern, she cautiously stepped inside. The door whined on rusted hinges. She eased onto a splintered stool. “Bread,” she rasped. The innkeeper, a bloated man with eyes like rotted plums, flung stale crust onto the counter. Her teeth sank into the stale crust, her body weeping for nourishment.
The room stank of unwashed bodies and sour ale. In a dim corner, men gambled their souls on dice, their faces marred by desperation and greed. As she made to leave, talk stilled, and eyes tracked her. A rough hand seized her wrist.
“Far to go?” The words, a mockery.
Her eyes darted to the innkeeper, pleading for an ally. His gaze, cold, turned away. “Yes, far,” she replied, stalling.
Then, violence. Teeth, nails, a taste of blood. Outmanned, her screams died in cruel laughter. Her clothes yielded, torn in the contest of her humiliation.
After the degradation, she stepped outside and into the soft rain of the night. Her path now carried weight measured in more than miles.
Ahead, barren land stretched mercilessly. A fleeting image of her mother’s face offered a brief moment of comfort. She tilted her head back, letting rain droplets fall onto her tongue to dilute the bitterness that swelled within her. The night urged in tones only darkness knows. Turn back, it murmured.
But she walked on. Her will was a defiant ember, the last flicker of light in a world teetering on oblivion, its humanity long forfeited.
Part VI: Elric
After weeks traversing a harsh expanse, gaunt but unbroken, she found herself beneath the Whispering Pines. As she approached, she carried more than her own weight. She embodied her mother’s enduring hope and her land’s final prayer for redemption.
Elric greeted her at the doorway. “You’ve come,” he said, leading her inside, the room warm from the fire in the stone hearth.
Her eyes roved from the firelight dancing on the walls to the shelves laden with books. A staircase twisted upward, its banister engraved with ancient symbols.
“Your homeland withers,” Elric said, drawing from his pipe, the wood old and marked by years. The scent of herbs, a blend cultivated through many seasons, sharpened the mind as it filled the room. “The spell,” she confirmed.
“Mmm,” he exhaled, his eyes shifting to the fireplace, wood popping in the heat. “Your forebears knew better days. Days without sacrifice.”
“The legends spoke truth, then?”
“Indeed.”
“Did you know I was coming?”
“I’ve waited twenty years. This isn’t our first meeting.”
“We’ve met before?”
“Once, when you were but a newborn. Your mother and I collaborated. We worked on a potion that siphons the power of nature to protect the truth in our world, to shield it from alchemy and dark spells.”
Elric opened a small cabinet beside the hearth. From it, he took an empty wooden chalice and a stoppered glass vial. Uncorking the vial, he poured a golden liquid into the chalice, the firelight making it shimmer. “This elixir hails from untarnished lands, free from the alchemy that poisons your realm. One sip and illusions shatter, transforming soul and society alike.” “What is it called?” she asked.
He looked at her intently. “Elysium,” he said, the word hanging heavy in the room. “It’s both the end and the beginning of your journey. You must experience it to understand. Drink.”
She sipped the brew; it tasted of nothing. Soon, as she nestled by the fire, the walls took a breath, and the world sharpened as if coming into focus for the first time. The air thickened into a heavy mist, her fingers danced through it, each ripple sending colors splashing around like bioluminescent whispers. She floated, her body dissolving, her name a distant echo.
Elric’s gaze turned to the fire, shadows playing across his face. “Elysium shows only what one needs to see, no more, no less,” he said, his voice a gentle wave against the shores of her uncertainty. “In my own experience with Elysium, I saw a torchbearer in the veil of time, a young soul with the spark to undo the dark spell on your land.” His eyes found Clara’s. “But the torchbearer had to come to me, the journey forging the resolve. Had I sought you out sooner, before your heart was ready, Elysium’s truth would have been a burden too heavy.”
As the reality of his words sank in, Clara felt the weight of the years, the faces of the countless lives lost to the alchemist’s dark magic flashing before her eyes. “And the elixir… why not share it sooner?”
Elric sighed, his eyes drifting to the ancient books lining the shelves. “Elysium’s truth is a double-edged blade. In the wrong hands, it could cut through the fabric of reality, leaving wounds that might never heal. Your kingdom…” he gestured vaguely towards the window, “…it wasn’t ready. But now, the ground has been furrowed by suffering, ready to receive the truth about the universe, the spell, the suffering.”
The walls breathed with a rhythm older than time. She looked at her hands moving through the bioluminescent mist, each movement sending ripples across the room. Tendrils of light danced in the air, ethereal spirits beckoning her towards another realm.
“But why?” Clara pressed, her presence deepening with each breath. “Why involve yourself?”
Elric’s eyes softened. “I once lived in your kingdom, fleeing when I realized the spell’s plague. Your mother and I, we shared a vision of a world free from dark alchemy. But more than a promise to an old friend, it’s a battle against the grasp of evil spells, a grasp threatening to choke the essence of life and freedom from this world. It’s a battle,” he looked at Clara with a profound earnestness, “that now passes to you.”
Suddenly, reality shattered, and her soul twisted and warped through a portal faster and faster until she touched the core of the cosmos.
Here, in a land beyond words, beyond the confines of time and space, she witnessed the birth and demise of the universe. With each breath, a star was born and died; each blink saw the rise and fall of civilizations. Like a photon racing at light speed through the cosmos, untouched by time, she beheld the entirety of all that ever was and will be.
Peering beyond the infinitely small, she saw the source code of the universe, equations as living tendrils of light materializing into particles, planets, and stars. The universe, a symphony of mathematical elegance, its physicality a melody resonating along the strings of her consciousness.
She floated amidst the cosmic code, orchestrating the universe — the planets, the voids, the unseen forces weaving through them — and she was one with all. She was the universe gazing at itself. Beyond the veil of mortality, she saw endless realms, death a mere doorway. In that boundless expanse, she brushed against the face of the divine.
A golden phoenix took form before her.
“I am Veritas,” it spoke, not in words, but in a language of complex geometry.
It exposed the grim truths of her lands, the Great Famine, and the enslaving spell — a counterfeit prosperity bought at the terrible price of human years.
“How do we break free?” Clara’s voice carried the untold suffering of generations.
“Simple,” the phoenix intoned. “Don’t battle the alchemist or his spell; you won’t win. Acknowledge the illusion. Tend to your own gardens, and reliance on the alchemist and the king fades. Elysium shields you, body and mind, from the spell’s reach.”
As the vision faded, Clara found herself back on the wooden floor, her head cushioned by a pillow. The urgency of her quest snapped her back to reality, a newfound resolve kindling in her chest.
“I see now,” she breathed, her voice steady. “I know what I must do.”
Elric nodded, a sage with a deep understanding of the paths of the universe. “Yes, but first, tea. There’s strength to regain and you have a long journey ahead,” he said, anchoring them both in a moment of calm before the impending storm of change.
Part VII: The Wayfarer’s Hearth
After days navigating barren expanses, Clara entered a cobblestone town as twilight settled. Figures lined the street, some alive, some not, most in limbo — too tired to beg, too frail to feed. Candlelight flickered from the windows of a tavern, illuminating well-fed faces. “The Wayfarer’s Hearth,” read the sign above the door.
She approached. The door creaked open to admit her, wafting out stale beer and the scent of roast meat. Her fingers twitched involuntarily, memories of weeks ago crawling up her spine, but her body ached for sustenance, for warmth. Holding her satchel close, safeguarding the vial of Elysium, she chose a chair at an empty table and settled in. Soon enough, food appeared.
The man who had set her meal before her took the adjacent seat with deliberate ease, his eyes lingering on her satchel. Her pulse quickened.
“You carry a weight, wanderer,” he said.
“Or hope,” she countered, her grip on her satchel unyielding.
A glass shattered. Drunkards stumbled into their table, a wave of mead sweeping over worn wood. Clara’s heart surged, the man’s fingers brushed her satchel, pulling the vial from its sanctuary. “Hope carries its own burden,” he said.
“The hope of my people is in that vial,” she shot back, her voice stripped bare.
“This is Elysium,” he said, his words like barbs. “At what cost, wanderer, do you think Elysium will save your people?”
Doubt snaked around her convictions. Was she the bearer of emancipation or a harbinger of calamity? Was her land ready for Elysium? “You know it?” she asked.
“I know it,” he said, eyeing it closely.
“Return it,” she commanded.
He handed over the vial. “The road to freedom is paved with the stones of responsibility. I wouldn’t want to walk in your shoes.”
She nodded, heavy but resolute. Clara left as quietly as she’d come, meal untouched, mission intact.
The night took her in. She cast a final glance back at a room oblivious to her departure. That night, she’d sleep under indifferent stars, closer to home but adrift in certainty, carrying the weight of a thousand stones of untold responsibility, a Trojan’s shroud for her people, a destiny unasked.
Part VIII: This is Elysium
Under a storm-heavy sky, Clara returned home. In her pocket was Elysium; in her mind, a plan that required Harold — an old friend and a knight by trade.
In the guild hall, Harold sat among knights and minstrels, a goblet in hand. “Look at this,” Clara said, pushing the vial across the table without ceremony. Her words pierced the tavern’s noise as she recounted her journey.
Harold looked at her, then at the vial. “You mean to say that one day, this will help us fight the spell?”
“No,” said Clara, her voice deep with a new knowing. “It means one day, we won’t have to.”
“Heresy,” Harold said. “You’re risking death.”
“So are we all,” she answered.
“They’ll burn you at the stake.”
“If I’m right, they won’t.”
“A trial then, regardless,” Harold said, his gaze dropping to the vial as the tavern’s jovial banter became a distant echo for them both.
“So be it,” Clara said, meeting his gaze. She leaned in, her fingers resting on his scarred knuckles. “Our farms take our children. It’s not right.”
“It’s how things are.”
“It’s how things were.”
“A trial will not be lenient, Clara. I can’t let you bring this to the king.”
“Not the king. The people.” She continued. “But don’t trust me. See for yourself.” Her eyes locked onto his. “Drink,” she said, her words echoing Elric’s.
Harold hesitated but finally drank. His eyes widened. He gripped the edge of the wooden table, his knuckles turning white. A sort of vacant gaze overcame him as if he’d journeyed to someplace far.
When the Elysium vision receded, he opened his eyes and looked at her anew, seeing the world for the first time again. He glanced around the hall as though it were a foreign land, his eyes lingering on the mundane — a crack in the table, the smudged goblet, a flickering torch on the wall—with awe and wonder. She knew then that they stood as one. Two visionaries, shouldering the burden of transforming the world, ready to shepherd their people into a revolutionary dawn.
In the square, the stone eyes of old heroes watched. A crowd formed, silenced by expectation and unaccustomed to the art of public speaking. Autumn leaves swirled at their feet.
“A new dawn!” Harold broke the silence. “Generations sacrificed, giving years for meager sustenance. But the land wants not our years — only our care and periodic reverence. The tales of a time without the toll of hunger, without a tax on life itself, from before the Great Famine, are not myths. They are forgotten chapters of our history, now on the verge of being rewritten.”
He raised the vial. Sunlight mirrored in its gold. “This is Elysium.”
Part IX: A Revolution Takes Shape
In the fading light of day, Harold and Clara stood by a murmuring brook, leaves rustling at their feet in quiet revolt. Faces young and old assembled around them; each one a silent rebellion against the servitude that taxed their years.
They drank, the chalice passing from hand to hand, a new ritual born. With each gathering, the numbers swelled; with each sip, more souls entwined. Slowly, yet with unyielding certainty, the kingdom shifted over the years. It changed not through a coup or uprising but through a still, relentless force, like water eroding stone. As the seasons passed and more villagers imbibed the Elysian brew, the weight of their invisible chains lessened, their atoms scattering into the evening air.
Shielded now, villagers sowed their own gardens, sanctuaries from the alchemist’s dominion. Bountiful harvests followed, hope supplanted despair. Word of the blooming private gardens spread like wildflowers, and fields once cursed by dark alchemy lay fallow and forgotten.
And there, by the unassuming brook, a revolution took shape. The soft sounds of the stream became an earthbound anchor for the myriad souls who opened the door to walk in the cosmic gardens of their minds. Each ritual added another stitch in the fabric of a new dawn; each sip, another brushstroke on the canvas of a world remade.
Part X: The Old Man
A decade drifted by. With each soul that tasted Elysium, the fetters of the old world loosened. The alchemist’s spell, once a yoke around their necks, now waned like thick morning fog giving way to the warmth of the day. Fields once cursed now bore food, not dread. Families gathered around bountiful tables, words flowing freely, unveiled.
Each year, townsfolk met by the sword in the square. Harold’s blade, the first monument raised in ages, stood as freedom’s spine, the axis of their new world. An old man approached, his eyes dimmed by memories of famine, leading a boy by the hand. Their eyes met, a chasm bridged: one soul untarnished by hunger, the other haunted by its ghost.
The old man stepped forward, his fingers quivering on the hilt of the sword. “Clara, what becomes of us if the land fails us again?” Years of hardship wavered in his voice, the ghosts of famine flickering in his eyes.
“It could,” Clara said, her voice steady as bedrock. “But it’s different now. Our fields are wider, our hands more skilled. We’re not trying to trick the earth with alchemy anymore. We speak in the simple terms it understands: soil, sun, water, time.”
Above, the alchemist’s fortress loomed, its towers now marred with cracks. Clara looked up. Empty windows stared back, like dead eyes on a fallen beast. Old times had ended; new ones had begun.
Part XI: The Note
Dawn broke, casting new light over worn cobblestones. Clara moved through the marketplace as if through a dream. The scent of cinnamon and rich coffee filled the air as she ran her fingers down silken tassels and through powdery barrels of golden saffron. Voices haggled; her feet felt the earth’s warm embrace.
Traders argued leisurely, their time no longer taxed by the spell. Children laughed, unburdened by field and plow.
Fields that once caged both young and old now released thinkers, builders, creators. The horizon changed form — bridges leapt over waterways, roads bound the land. Each stone laid was more than a fixture; it was a vow, a pact between the present and the future. It was today’s promise to a future yet unborn, anchored by the prosperity that now bloomed under Elysium’s sky.
As evening descended, the grand hall filled with voices unburdened by yesterday’s sorrow. In a secluded corner, Clara and Harold exchanged words about the loftier truths Elysium had laid bare.
A courier emerged from the crowd, extending a sealed parchment. “For you, mademoiselle.”
With a nod, Clara exchanged a coin for the note. Her eyes brightened as she absorbed the message:
Only a true renaissance resounds to the Whispering Pines. Continue, in health and strength. - Elric
She passed it to Harold, their eyes locking in wordless affirmation. “The Whispering Pines acknowledge us,” he finally said. “And so, we continue,” Clara replied, her voice unwavering, guided by truth. In the hall’s enveloping warmth, laughter, toasts, and spirited debates blended into a harmonious score — a sound that would have been foreign to their ancestors, a sound that marked the close of an era and the dawn of something profoundly new.
This story first appeared in Tales from the Timechain. Support our work and buy a copyhere.
79% of the zaps from this story will be passed onto the author, Reed.
21 Futures requests 21% for operating costs.
Ioni Appelberg (pronounced Yo-Ni Apple-Burg) is a bitcoin philosopher, futurist, author, and content creator. His content centers around science fiction, human history and it often takes the form of swashbuckling journeys to the frontiers of technology, space, and the human mind. His love of sci-fi, psychedelics, and futurism may take his stories (and unsuspecting readers) to strange but exciting places. He is also an avid reader, a medical doctor, a freedom fighter, an MMA fighter, a psychonaut, and a terrible chess player.
-
@ c4f5e7a7:8856cac7
2025-06-03 08:15:33I've managed to amass three SN profiles.
Is there a way to combined these?
@k00b @ek
https://stacker.news/items/995836
-
@ cae03c48:2a7d6671
2025-06-16 13:01:15Bitcoin Magazine
Coinbase Announces Bitcoin Rewards Credit Card, Offering up to 4% BTC Back on EverythingCoinbase is launching its first-ever branded credit card in partnership with American Express, set to roll out this fall. Called the Coinbase One Card, it will be available only to U.S. members of Coinbase One, the platform’s monthly subscription service. The card will offer 2% to 4% back in Bitcoin on everyday purchases, along with access to American Express perks.
JUST IN: Coinbase launches credit card allowing users to earn up to 4% bitcoin back on every purchase
pic.twitter.com/d6pdNZV4pi
— Bitcoin Magazine (@BitcoinMagazine) June 12, 2025
This is a first-of-its-kind product for Coinbase, which previously only offered a prepaid debit card with Visa in 2020.
“We see real potential in the combination of Coinbase and crypto with the powerful backing of American Express, and what the card offers is an excellent mix of what customers are looking for right now,” said Will Stredwick, head of American Express global network services, during the Coinbase State of Crypto Summit in New York.
The card is part of a larger push by Coinbase to expand its subscription-based services. Coinbase One costs $29.99/month and includes zero trading fees, higher staking rewards, and customer support perks. The company also announced a cheaper version—Coinbase Basic—for $4.99/month or $49.99/year, which includes fewer features.
Coinbase’s subscription business is growing fast. It brought in $698.1 million in Q1 2025, compared to $1.26 billion in trading revenue. According to William Blair analyst Andrew Jeffrey, this kind of recurring revenue is a big reason why long-term investors are sticking with the stock.
Launched in 2023, Coinbase One now has over a million members. The company has been steadily growing its ecosystem with products like its Base developer platform and a self-custody wallet.
The company has long positioned Bitcoin at the center of its strategy—offering BTC custody services to institutions, supporting Bitcoin ETFs, integrating Bitcoin rewards into its products, and actively advocating for Bitcoin-friendly regulation in Washington. Coinbase also supports Bitcoin development directly through funding grants and engineering support. As the largest publicly traded crypto exchange in the U.S., Coinbase continues to frame Bitcoin not just as an asset, but as the foundation of its long-term vision.
This post Coinbase Announces Bitcoin Rewards Credit Card, Offering up to 4% BTC Back on Everything first appeared on Bitcoin Magazine and is written by Jenna Montgomery.
-
@ 32e18276:5c68e245
2025-06-02 20:58:05Damus OpenSats Grant Q1 2025 Progress Report
This period of the Damus OpenSats grant has been productive, and encompasses the work our beta release of Notedeck. Since we sent our last report on January, this encompasses all the work after then.
Damus Notedeck
We released the Beta version of Notedeck, which has many new features:
Dave
We've added a new AI-powered nostr assistant, similar to Grok on X. We call him Dave.
Dave is integrated with tooling that allows it to query the local relay for posts and profiles:
Search
The beta release includes a fulltext search interface powered by nostrdb:
Zaps
You can now zap with NWC!
And More!
- GIFs!
- Add full screen images, add zoom & pan
- Introduce last note per pubkey feed (experimental)
- Allow multiple media uploads per selection
- Major Android improvements (still wip)
- Added notedeck app sidebar
- User Tagging
- Note truncation
- Local network note broadcast, broadcast notes to other notedeck notes while you're offline
- Mute list support (reading)
- Relay list support
- Ctrl-enter to send notes
- Added relay indexing (relay columns soon)
- Click hashtags to open hashtag timeline
Damus iOS
Work continued on the iOS side. While I was not directly involved in the work since the last report, I have been directing and managing its development.
What's new:
Coinos Wallet + Interface
We've partnered with coinos to enable a one-click, non-KYC lightning wallet!
We now have an NWC wallet interface, and we've re-enabled zaps as per the new appstore guidelines!
Now you can see all incoming and outgoing NWC transactions and start zapping right away.
Enhanced hellthread muting
Damus can now automatically mute hellthreads, instead of having to do that manually.
Drafts
We now locally persist note drafts so that they aren't lost on app restart!
Profile editing enhancements
We now have a profile picture editing tool so that profile pictures are optimized and optionally cropped
Conversations tab
We now have a conversations tab on user profiles, allowing you to see all of your past conversations with that person!
Enhanced push notifications
We've updated our push notifications to include profile pictures, and they are also now grouped by the thread that they came from.
And lots more!
Too many to list here, check out the full changelog
Nostrdb
nostrdb, the engine that powers notecrumbs, damus iOS, and notedeck, continued to improve:
Custom filters
We've added the ability to include custom filtering logic during any nostrdb query. Dave uses this to filter replies from kind1 results to keep the results small and to avoid doing post-processing.
Relay index + queries
There is a new relay index! Now when ingesting notes, you can include extra metadata such as where the note came from. You can use this index to quickly list all of the relays for a particular note, or for relay timelines.
NIP50 profile searches
To assist dave in searching for profiles, we added a new query plan for {kind:0, search:} queries to scan the profile search index.
How money was used
- relay.damus.io server costs
- Living expenses
Next quarter
We're making a strong push to get our Android version released, so that is the main focus for me.
-
@ fa0165a0:03397073
2025-06-01 12:23:47Test of untype
Let see what this markdown editor goes for. Quite nice layout, but so far in my testing only usable via computer. On phone, the keyboard covers the writing area, hehe. Now, where do these get published when posted?
-
@ 044da344:073a8a0e
2025-06-16 10:08:10Im September starten wir an der Freien Akademie für Medien & Journalismus eine Veranstaltungsreihe im Vorderen Bayerischen Wald und laden alle ein, live dabei zu sein, wenn Menschen interviewt werden, die etwas zu sagen und spannende Geschichten zu erzählen haben. Nach etwa einer Stunde werden die Kameras ausgeschaltet, sodass genug Raum bleibt für Fragen, für das Kennenlernen, für den Austausch mit Gleichgesinnten.
Die ersten Gäste ab dem 8. September: Jürgen Fliege, Joana Cotar, Gerd Reuther und Gabriele Gysi. Es gibt eine zweite Gesprächsreihe, die am 13. Oktober mit Jörg Bernig startet. Die Aufzeichnungen beginnen jeweils um 18 Uhr in einer Gaststätte im Raum Sankt Englmar. Wer eine weitere Anreise hat: Die Gegend ist wunderschön, lädt zum Entspannen ein (Wandern, hervorragende Gastronomie, Unterkünfte für jeden Geldbeutel) und verfügt über alles, was das Urlauberherz begehrt. Organistorisches und Anmeldung
8. September 2025: Jürgen Fliege – Glaube, Kirche, Hoffnung
Eine Talkshow im Ersten, präsentiert von einem Pastor, der alles mitbringt, was man braucht, um Menschen zu gewinnen: Einen besseren Werbeträger hätte sich die evangelische Kirche nicht wünschen können. Jürgen Fliege war von 1994 bis 2005 Stammgast in den Wohnzimmern und ist trotzdem oder gerade deshalb schon damals immer wieder in Konflikt geraten mit Amtsträgern aller Art. Ab 2020 hat er sich in Sachen Corona öffentlich klar positioniert und dabei auch auf die Bibel verwiesen.
9. September 2025: Joana Cotar – Acht Jahre Bundestag. Wie weiter mit der Demokratie?
Ganz stimmt das mit den acht Jahren nicht: Die zweite Legislaturperiode ist vor der Zeit zu Ende gegangen. Joana Cotar wurde zweimal über die AfD-Landesliste in Hessen in den Bundestag gewählt, war dabei 2021 auch als Spitzenkandidatin im Gespräch und zwei Jahre im Bundesvorstand. Ende 2022 hat sie Partei und Fraktion verlassen, im Parlament aber weitergemacht und immer wieder den Finger in die Wunde gelegt, wenn es um das Parteiensystem ging oder um den Spielraum der Volksvertreter.
10. September 2025: Gerd Reuther – Tatort Vergangenheit
Gerd Reuther hat sich als Medizinaufklärer ohne Tabus einen Namen gemacht – ein Radiologe, der an drei Kliniken Chefarzt war, dann aber mit 55 aufgehört hat. Sein Buch „Der betrogene Patient“ war 2017 ein Bestseller. Danach hat er die Geschichte der Medizin gegen den Strich gebürstet („Heilung Nebensache“) und in „Hauptsache Panik“ die europäische Seuchengeschichte demontiert. Jetzt nimmt er sich unsere gesamte Geschichte vor und stellt von den Römern bis in die Neuzeit unser „Wissen“ über die Vergangenheit in Frage.
11. September 2025: Gabriele Gysi – Gibt es noch eine deutsche Frage?
Niemand kann das besser beantworten als diese Künstlerin, Spross einer Politikerfamilie und Zeitzeugin für alle drei deutschen Nachkriegsstaaten – für die DDR sowieso, nach ihrer Ausreise 1984 aber auch für die alte Bundesrepublik und dann natürlich für die neue, wo sie unter anderem Chefdramaturgin der Berliner Volksbühne war. Gabriele Gysi sagt: Solange wir keine gesamtdeutsche Geschichte haben, bleibt die große Frage offen.
-
@ a88f35c7:7b121d83
2025-06-17 18:31:38Como si de resolver un crimen se tratase, en este artículo he querido reflexionar sobre el futuro de los pagos en un mundo cada vez más digital, centrándome en la más que probable desaparición del dinero efectivo, con las monedas digitales de bancos centrales (CBDCs) actuando como arma homicida y los bancos centrales como los verdaderos 'asesinos' de este tipo de dinero. Como veis, sería un pésimo novelista, ya que en el primer párrafo ya he revelado toda la trama.
Introducción.
La mayoría de las transacciones realizadas a diario ya son electrónicas y están gestionadas por bancos o empresas tecnológicas, ya sea a través de ventas de comercio electrónico, pagos presenciales con terminales EMV, tarjetas sin contacto o aplicaciones móviles. Estos pagos son fácilmente rastreables, susceptibles de confiscación y sujetos a censura. A pesar de ello, durante las últimas tres décadas se ha intentado desacreditar al otro tipo de dinero que aún se utiliza hoy en día: el efectivo. Gobiernos de todo el mundo han defendido que eliminar el efectivo es necesario para combatir el lavado de dinero, reducir la evasión fiscal y asegurar una mayor estabilidad de la economía.
¿Cuál puede ser la motivación detrás de todo esto? ¿Es posible que, al analizar al candidato destinado a sustituir al efectivo, encontremos una respuesta?
En este artículo me propongo explorar cuál será el formato del dinero del futuro y si las monedas digitales de bancos centrales (CBDC), cuya implementación está siendo investigada e impulsada actualmente por muchos gobiernos, podrían ser las que acaben definitivamente con el efectivo.
Soy consciente de que hay mucho material e información disponible pero para realizar este artículo me he basado en los siguientes papers:
-
The technology of retail central bank digital currency de Raphael Auer y Rainer Boehme
-
Financial Freedom and Privacy in the Post-Cash World de Alex Gladstein
El crímen a resolver.
La víctima.
El dinero en efectivo (la víctima de este crimen) es el medio de pago físico que utilizamos para realizar transacciones, como billetes y monedas. Es emitido y respaldado por un banco central (en Europa, el BCE, y en Estados Unidos, la Fed), lo que le otorga valor y aceptación general en una economía. Además, representa una deuda del banco central con quien lo posee: al tener un billete, esencialmente el banco central te debe ese valor, comprometiéndose a respaldarlo.
Tener “una deuda del banco central” en el bolsillo ha permitido, durante décadas, realizar transacciones diarias en todo el mundo sin que el comprador deba revelar información al vendedor. Esto es posible porque el sistema se basa en la confianza de que el vendedor podrá intercambiar ese dinero por bienes y servicios en el futuro (confianza mutua en su aceptación futura). Al entregar efectivo, la transacción se liquida al instante, sin intermediarios, verificaciones adicionales ni exposición de datos sensibles como nombres, direcciones o información financiera, lo que facilita el comercio incluso entre desconocidos.
Como en cualquier serie de asesinatos, el detective debe conocer todos los detalles posibles de la víctima para elaborar el perfil del asesino y determinar el móvil del crimen. Siguiendo esta lógica, a continuación presento un conjunto de características del dinero en efectivo que podrían haberle generado "enemigos":
-
Resistente a la censura: El efectivo se intercambia directamente entre dos partes sin necesidad de intermediarios (bancos, plataformas digitales o gobiernos). Esto significa que ninguna entidad puede bloquear o revertir una transacción hecha en persona.
-
Difícilmente rastreable: Las transacciones en efectivo son anónimas, ya que no requieren identificación ni dejan un rastro digital.
-
Difícilmente confiscable: El efectivo, al ser un activo físico, solo puede ser confiscado mediante posesión física directa.
-
Permite cierto nivel de privacidad: El uso de efectivo preserva la privacidad de las personas, ya que no expone datos personales ni patrones de gasto.
-
Independencia de infraestructuras tecnológicas: El efectivo no depende de redes de comunicación, electricidad, internet o sistemas bancarios. En escenarios de apagones, desastres naturales o fallos tecnológicos, el efectivo sigue siendo funcional.
-
Aceptación universal sin intermediarios: El efectivo es aceptado prácticamente en cualquier lugar, sin necesidad de cuentas, dispositivos o aplicaciones.
El arma.
En las series de asesinatos o crímenes en general, hay 3 aspectos clave para resolver un caso y estos son el móvil (es la razón detrás del crimen), la oportunidad(posibilidad real que tuvo el sospechoso para cometer el crimen) y los medios disponibles (capacidad física, técnica o arma para llevar a cabo el crimen). En el crimen a resolver en este artículo he creído conveniente empezar por este último y por tanto como buen amante de los avances tecnológicos, he pedido a chatpgt que me defina una CBDC. Su respuesta debajo:
Una CBDC (Central Bank Digital Currency) o Moneda Digital de Banco Central es una forma de dinero digital emitida y respaldada directamente por el banco central de un país (o países). Es similar al dinero en efectivo (como los billetes y monedas) pero existe únicamente en formato digital.
En resumen, una CBDC es dinero digital seguro, accesible y regulado, diseñado para modernizar los sistemas financieros y facilitar los pagos digitales en la economía. 😊💸
Sin embargo, y muy a mi pesar..., hay un par de puntos que no me han convencido (imagino que sabréis cuáles pero por si acaso, los he marcado en negrita). Por ello, he decidido buscarme las habichuelas por mi cuenta y he encontrado este paper, que creo que puede ser de ayuda: “Central Bank Digital Currencies” del Committee on Payments and Market Infrastructures del Bank for International Settlements. Según se indica en dicho paper;
Establecer una definición precisa de la Central Bank Digital Currency (CBDC) resulta complejo, ya que el concepto abarca diversas ideas y posibilidades. No obstante, su característica esencial es que se trata de una forma de dinero digital emitida directamente por el banco central (una obligación del banco central, denominada en una unidad de cuenta existente) que funciona como medio de intercambio y depósito de valor, y está destinada al público general. Esta característica la distingue del dinero digital utilizado por los bancos comerciales, como las reservas o cuentas de liquidación mantenidas en el banco central.
Llegados aquí, he vuelto a preguntar a chatgpt cuál podría ser el motivo u objetivopara que los bancos centrales estén tan interesados por las CBDCs. Su respuesta, como en el caso anterior, tampoco me ha acabado de convencer:
El Banco Central Europeo busca crear una CBDC, conocida como Euro Digital, con varios objetivos clave; en primer lugar, busca aumentar la inclusión financiera al ofrecer una forma de dinero digital segura y gratuita, accesible para toda la población. Otro objetivo es reforzar la estabilidad financiera, proporcionando una alternativa segura al dinero depositado en bancos privados. Por último, el BCE aspira a promover la innovación en servicios financieros y facilitar pagos transfronterizos más rápidos y eficientes. En conjunto, el Euro Digital busca modernizar la economía europea, proteger su sistema financiero y mantener el liderazgo europeo en la era digital.
Así que, una vez más, me toca aplicar el conocido dicho DYOR (Do Your Own Research). A continuación, mi enfoque:
-
Partiendo de la premisa de que muchos objetos utilizados en crímenes no fueron diseñados originalmente para causar daño, sino que tienen múltiples usos, es evidente que ciertos objetos resultan más propensos a ser utilizados con fines dañinos debido a su diseño. Por ejemplo, un cuchillo de caza, con su hoja afilada y puntiaguda, tiene una capacidad de hacer daño superior a la de un cuchillo de punta redonda.
-
De forma análoga, al analizar las diferentes alternativas de diseño de una CBDC, podríamos identificar aquellos elementos que, intencionadamente o no, facilitan ciertos usos indebidos o riesgos asociados y por ende podríamos intuir también las motivaciones de su creador.
Diseñando una CBDC.
En el artículo titulado “The Technology of Retail Central Bank Digital Currency” de Raphael Auer y Rainer Böhme, los autores analizan el desarrollo de una CBDC mediante un enfoque que parte de las necesidades de los consumidores para fundamentar las decisiones de diseño. Para ilustrar este enfoque, introducen la “CBDC Pyramid”, un modelo que organiza jerárquicamente los aspectos clave del diseño de una moneda digital emitida por un banco central:
En el lado izquierdo de la pirámide exponen las necesidades de los consumidores y seis características asociadas que harían útil a una CBDC:
-
Similar al efectivo con funcionalidad peer-to-peer.
-
Pagos en tiempo real.
-
Operaciones resilientes y robustas.
-
Privacidad.
-
Amplia accesibilidad.
-
Capacidad para pagos transfronterizos.
Y en el lado derecho de la pirámide se describen las decisiones de diseño asociadas a cada una de estas características:
-
Reclamaciones indirectas o directas, y ¿qué papel operativo tendrá el banco central?
-
El modelo de centralización (centralizado o descentralizado).
-
Basado en tokens o en balances.
-
Permitir la integración con otras CBDCs.
La tesis sobre la que se construye el paper de Raphael y Rainer se basa en considerar que la principal necesidad del consumidor debe ser poder contar con una CBDC que represente un derecho similar al efectivo y que idealmente sea fácilmente transferible en entornos de transacciones P2P.
A continuación el paper analiza, para cada una de las capas de la pirámide las elecciones disponibles para determinar cuál de ellas es la que acercaría más a una CBDC a las características del cash:
Nivel 1. CBDC directa o indirecta.
A bajo del todo de la pirámide Raphael Auer y Rainer Böhme sitúan la elección de la arquitectura operacional y como se atenderá la demanda del consumidor final. ¿El consumidor "hablará" directamente con el Banco Central y será este quien centralice todo el proceso? ¿o lo hará a través de intermediarios (banca privada)? En cualquiera de los casos, en el paper se asume que solo el banco central podrá emitir la CBCD.
Las principales diferencias en la elección en la base de la pirámide radican en la estructura de los reclamos legales y en los registros mantenidos por el banco central. En el modelo de “CBDC indirecta”, el consumidor tiene un reclamo sobre un intermediario, mientras que el banco central solo lleva un registro de las cuentas mayoristas. En el modelo de “CBDC directa”, la CBDC representa un reclamo directo sobre el banco central, que mantiene un registro de todos los saldos y los actualiza con cada transacción.
Es importante tener en cuenta que los pagos electrónicos deben afrontar interrupciones de conectividad o pagos sin conexión, lo que implica asumir riesgos por parte de los intermediarios y la relación con el cliente, basada en los procesos de Know Your Customer (KYC), permite al intermediario asumir dichos riesgos. Por lo tanto, a menos que un banco central asumiera la responsabilidad del KYC y la debida diligencia del cliente (lo que requeriría una expansión masiva de sus operaciones, muy por encima de sus mandatos actuales), le resultaría difícil asumir un modelo de "CBDC directa".
Nivel 2. Base de datos centralizada o descentralizada.
En el segundo nivel de la pirámide se encuentra la elección de tener un libro mayor centralizado o distribuido.
En un modelo de CBCD directa con base de datos centralizada, las capacidades tecnológicas del banco central deberían ser enormes ya que sería él solo quien procesaría todas las transacciones de todos los ciudadanos (lo que dificulta enormemente su implementación). Además, la principal vulnerabilidad de una arquitectura con un libro mayor centralizado de esta envergadura es la falla del nodo principal.
Por otro lado, actualmente disponer de un libro mayor distribuido (DLT) implica un rendimiento de transacciones menor que las arquitecturas convencionales debido a las dificultades para ejecutar un mecanismo de consenso eficiente y seguro ya que cada actualización del libro mayor debe armonizarse entre los nodos de todas las entidades. Estos modelos podrían ser válidos para jurisdicciones muy pequeñas pero complicado en jurisdicciones más grandes debido al alto número de transacciones que deberían procesar.
Por otro lado, en un modelo de CBCD indirecta ambos enfoques podrían ser factibles.
Nivel 3. Basado en tokens o en balances.
Una vez que se haya elegido la arquitectura y la infraestructura de la CBDC, surge la cuestión de quién tiene la custodia de los fondos y de cómo y a quién se debe otorgar acceso a dichos fondos.
Los activos en moneda digital son fungibles (bienes o activos que pueden intercambiarse entre sí sin que haya una diferencia en su valor o utilidad), por lo que, en principio, pueden tomar la forma de saldos (“acceso basado en cuentas”) o de tokens (“acceso basado en tokens”).
En un sistema de moneda digital basado en saldos (account based access), se debe registrar en algún lugar un número que represente el tamaño de un conjunto de activos, y las transacciones sucesivas deben resultar en cambios en ese número. En este tipo de sistemas, el propietario de los activos debe proporcionar una identificación (derecho basado en la identidad) para acceder al saldo y realizar una transacción, de ahí entre otras, la necesidad del proceso de KYC.
Por el contrario, con los tokens, todo lo que se necesita para realizar una transacción es el conocimiento de las claves criptográficas que los desbloquean. En este tipo de sistemas, los fondos son de quien es capaz de desbloquearlos y las transacciones realizadas no tienen porque estar directamente asociadas a una identidad por lo que es un sistema mucho más parecido al efectivo.
Nivel 4. Integración entre CBDCs.
¿Será posible utilizar la CBDC emitida por el banco central exclusivamente en territorio nacional o también en el extranjero? ¿Estarán dispuestos los bancos centrales a coordinar esfuerzos en el diseño de estas monedas digitales para permitir que los consumidores gestionen múltiples divisas en una sola wallet? De ser así, se facilitaría un comercio internacional más ágil y se eliminaría el vínculo actual entre un pago en el extranjero y la necesidad de realizar una transacción de cambio de divisas (junto con las comisiones asociadas).
En el sistema actual, primero se adquiere moneda nacional, que luego debe ser cambiada por la divisa extranjera, lo que implica costos y demoras. El modelo con pagos transfronterizos integrados permitiría a los consumidores comprar directamente la CBDC del país extranjero antes de realizar sus compras, eliminando así ese paso innecesario e ineficiente y reduciendo los costos asociados al tipo de cambio.
El diseño previsible (mi apuesta personal).
Aquí perdonadme pero voy a ir al grano con mi predicción:
- Creo que la implementación final será el de una CBDC indirecta ofrecida por intermediarios (los bancos privados) con libro mayor centralizado, basada en cuentas en lugar de tokens y con ciertas restricciones en la interoperabilidad entre CBDCs de distintos países.
¿Por qué pienso esto? En primer lugar, como se mencionó anteriormente, una CBDC directa implicaría un cambio significativo en el sistema financiero al transferir gran parte de las responsabilidades de los bancos privados al banco central. En el sistema actual, los bancos privados desempeñan un papel clave en la creación de dinero a través del proceso de concesión de préstamos y la gestión de depósitos. Sin embargo, con una CBDC directa, el banco central sería responsable de emitir dinero digital directamente a los ciudadanos, lo que reduciría drásticamente la necesidad de que los bancos privados gestionen depósitos minoristas.
Esto no solo limitaría su capacidad de crear dinero a través del crédito, sino que también afectaría su modelo de negocio, ya que se reducirían sus fuentes tradicionales de ingresos. Además, podría disminuir su relevancia en el sistema financiero, dejándolos casi fuera de la ecuación en cuanto a la emisión de dinero.
Por otro lado, considero que el modelo con libro mayor centralizado se impondrá principalmente por dos razones: las limitaciones actuales en cuanto a la capacidad de procesamiento de los sistemas distribuidos (DLT) por las reglas de consenso y el interés de los estados en mantener sus capacidades de monitoreo financiero.
En cuanto a la elección entre un sistema basado en tokens o en balances, es importante destacar que, dado que las transacciones en un sistema basado en tokens no están directamente vinculadas a una identidad, resulta más complejo utilizar una CBDC como herramienta de vigilancia o perfilado por parte del banco central o los intermediarios financieros. Este enfoque preserva en mayor medida la privacidad de los usuarios, alineándose con principios similares a los del efectivo digital.
Por tanto, es altamente probable que tanto el Banco Central Europeo como la Reserva Federal opten por un sistema vinculado a una identidad, ya que, además de facilitar el cumplimiento normativo en materia de prevención de delitos financieros, guarda mayor similitud con el modelo de cuentas corrientes tradicional. De hecho, diversos informes, han señalado que la identificación de los usuarios en una CBDC es un factor clave para garantizar la trazabilidad y evitar el anonimato absoluto, lo que refuerza la posibilidad de que el sistema basado en balances sea el elegido.
Finalmente, pienso que facilitar el acceso sencillo a monedas de otros países que se perciben como más seguras podría llevar a una fuga de capitales hacia estas divisas y la ley de Gresham está a mi favor:
La ley de Gresham establece que, cuando en un mercado circulan simultáneamente dos tipos de dinero con el mismo valor nominal pero diferente valor percibido o estabilidad, la “moneda mala” desplaza a la “moneda buena”: los consumidores prefieren conservar la moneda con mayor valor intrínseco como reserva de valor, utilizándola menos en transacciones diarias, lo que eventualmente lleva a su retirada del mercado como medio de pago.
Básicamente esto quiere decir que en el escenario planteado, si los ciudadanos tuvieran acceso directo y fácil a CBDCs de países con economías más estables o con menor inflación, podrían optar por ahorrar en estas monedas más fuertes mientras usan la moneda local para pagos diarios. Esto no solo reduciría la demanda de la moneda nacional, sino que también podría debilitar su estabilidad y aumentar la fuga de capitales.
El móvil.
¿Podrán las personas poseer y controlar su propio dinero y decidir qué hacer con él, o estarán todas sus opciones de pago sujetas a la supervisión y el permiso de intermediarios?
Para ser capaz de contestar a esta pregunta me he basado en el artículo “Retail Central Bank Digital Currency: Motivations, Opportunities, and Mistakes” de Geoffrey Goodell, Hazem Danny Al Nakib y Tomaso Aste que sugiere que los gobiernos buscaran mantener el control sobre su sistema financiero y facilitar la supervisión y regulación de las transacciones a través de las CBDCs y de ahí el diseño con el que las están desarrollando. Dicho esto y aunque en el apartado anterior ya se han podido vislumbrar algunas posibles motivaciones, estas las voy a resumir a continuación:
-
Soberanía monetaria y financiera: Uno de los principales motores detrás de la exploración de las CBDCs son las preocupaciones institucionales sobre los riesgos emergentes para la soberanía monetaria y financiera. Esto es particularmente relevante para los bancos centrales y los gobiernos, que observan cómo el panorama de los pagos evoluciona rápidamente debido a innovaciones tecnológicas y cambios en las preferencias de los consumidores. Además, la creciente facilidad para acceder a divisas extranjeras, especialmente aquellas consideradas más estables o fuertes, está disminuyendo el uso de la moneda local en algunos países. Esto representa un riesgo directo para la soberanía monetaria, ya que reduce la efectividad de las políticas monetarias nacionales.
-
Control total sobre los estímulos económicos: Un sistema de CBDC plenamente operativo podría otorgar a los bancos centrales un control detallado sobre el estímulo fiscal, permitiéndoles distribuir fondos de manera segmentada con solo presionar un botón. En un escenario donde el efectivo físico desapareciera, las CBDC podrían facilitar la aplicación de tasas de interés negativas, obligando a los ciudadanos a pagar una tarifa por mantener ahorros en sus cuentas. Además, este tipo de moneda digital podría proporcionar a los gobiernos la capacidad de confiscar fondos con mayor facilidad, sancionar a disidentes políticos o incluso automatizar multas por infracciones menores, lo que ha suscitado preocupaciones sobre el potencial abuso de estas herramientas. Finalmente, y por si esto fuera poco, existen estudios que exploran la posibilidad de que las CBDCs puedan utilizarse para rastrear y potencialmente restringir o desincentivar ciertas compras con una alta huella de carbono, integrándolas en un sistema de créditos de carbono personales. Un posible escenario podría ser el siguiente:
-
Al intentar comprar gasolina o diésel, la CBDC verifica la huella de carbono acumulada del usuario.
-
Si el usuario ha superado su límite mensual de emisiones, la transacción podría ser rechazada automáticamente o estar sujeta a un recargo adicional por exceder su cuota.
-
Como alternativa, el usuario podría adquirir créditos de carbono de otros ciudadanos que hayan consumido menos, creando así un mercado de intercambio de emisiones a nivel individual.
Esto no debe sorprender a nadie considerando que el sistema Cap and Trade ya se encuentra implementado en la actualidad. Bajo este esquema, empresas con altas emisiones de CO₂ (como aerolíneas, fábricas e industrias de transporte) deben comprar créditos de carbono cuando superan su límite permitido de emisiones. Por tanto el sistema sería el mismo pero aplicado directamente a los ciudadanos.
-
Oportunidades para el sector privado: Lo primero que hay que tener en cuenta es que hoy en día, las compras diarias realizadas a través de aplicaciones móviles o tarjetas de crédito tienen poca semejanza con las compras hechas en efectivo y los usuarios de plataformas como Visa, Apple Pay, WeChat o PayPal intercambian su libertad y privacidad por conveniencia o "usabilidad". En este tipo de transacciones se exige y se comparte información personal en lugar de protegerla. Todo esto nos ha de hacer reflexionar sobre la gran oportunidad que se presenta para el sector privado y en concreto para las "Big Tech" si consiguen monetizar toda la información del consumidor que una moneda tipo CBDC podría proporcionar. No es de extrañar entonces que empresas como Google, Amazon, Stripe o Mastercard sean partners de proyectos de investigación de este tipo de monedas digitales. Como "Data harvesters" experimentados son conscientes del tremendo valor en la creación de perfiles de usuarios.
-
Crimen y evasión fiscal: Como comentamos anteriormente, algunos gobiernos intentan asociar el uso del efectivo con el lavado de dinero y la corrupción, lo que les permite justificar la implementación de las CBDCs como una estrategia para combatir estos problemas. Un ejemplo es el Banco Central de Bangladesh, que busca digitalizar todas las transacciones minoristas para 2027, argumentando que esto mejorará la eficiencia, promoverá la inclusión financiera y reducirá la criminalidad. En Nigeria, el e-Naira fue introducido con el objetivo de facilitar el rastreo de fondos, pero la población respondió con protestas y una baja adopción de la moneda digital.
Conclusiones.
Desde mi punto de vista, es poco probable que las democracias aprendan pronto a diseñar CBDCs que garanticen la privacidad, y aún menos que tengan el incentivo de ofrecerlas a sus ciudadanos. Al fin y al cabo, muchas de las características que atraen tanto a políticos como a banqueros centrales son incompatibles con el dinero anónimo. Por ello, creo que la única alternativa viable para preservar la privacidad financiera que ofrece el efectivo es desarrollar herramientas monetarias resistentes al abuso gubernamental.
Pocas veces se ha expresado este problema con tanta claridad como lo hizo Wei Dai en un correo electrónico enviado en febrero de 1995 a la lista de correo de Cypherpunks donde Dai escribió:
"Nunca ha existido un gobierno que, tarde o temprano, no haya intentado reducir la libertad de sus ciudadanos y obtener más control sobre ellos, y probablemente nunca existirá uno.
Por lo tanto, en lugar de tratar de convencer a nuestro gobierno actual de que no lo intente, desarrollaremos la tecnología que hará imposible que el gobierno tenga éxito.
Los esfuerzos para influir en el gobierno (por ejemplo, a través del lobby y la propaganda) son importantes solo en la medida en que retrasen lo suficiente su intento de represión como para que la tecnología madure y se adopte ampliamente.”
-