-
@ 9c9d2765:16f8c2c2
2025-06-18 08:56:42The wind howled outside like a warning. Rain splashed against the windows of the old countryside mansion as Susan stepped in, clutching her soaked coat.
"Are you sure about this place?" her younger brother, James, asked, eyeing the cobwebbed chandelier.
"It belonged to our grandmother. We have to clear it out before it’s sold," Susan replied, though her voice lacked confidence.
They hadn’t visited the estate in over ten years. Not since their grandmother’s mysterious disappearance.
As they explored, they reached a narrow hallway that ended at a crooked staircase descending into the basement.
"Nope," James said, stepping back. "I’m not going down there."
"Don't be ridiculous." Susan forced a smile. "It’s just a basement."
But as she pulled the chain to light the way, the bulb flickered and a whisper rode the cold draft:
“Susan...”
She froze. "Did you hear that?"
"What?" James asked, already halfway back toward the kitchen.
"My name. Someone said my name."
James laughed nervously. "It’s an old house. It creaks."
But Susan wasn’t convinced. She took a breath and stepped down the stairs, one creaking step at a time.
The basement was filled with antiques, trunks, and one large wardrobe. She walked toward it, and the whisper came again louder.
"Susan... don’t forget."
She yanked open the wardrobe and gasped.
Inside was a broken mirror, its cracks forming a spider web of reflections. Taped to the mirror was a faded photo: her grandmother standing in front of this very mirror looking terrified.
Behind the photo, a small note was pinned.
If you found this, it means I failed to stop him. The man under the stairs is not a man at all. Don't trust the whisper. It's how he gets in. Burn the wardrobe. Don't look in the mirror.
"James!" she screamed, panic rising. "Get down here now!"
"What's going on?" he shouted as he clattered down.
She showed him the note.
He read it and chuckled. "Come on, this is... old people paranoia."
The mirror’s surface shimmered. Susan stepped back.
James tilted his head. "It’s just a mir"
A hand shot out from the reflection and gripped his wrist.
He screamed.
"Get it off me!"
Susan grabbed a rusted poker from the floor and struck the mirror. It cracked further but the hand tightened.
James’s eyes turned glassy. He whispered:
“Don’t forget… like she did.”
Susan’s heart pounded. She turned, grabbed a bottle of lighter fluid from a shelf, and doused the wardrobe.
"I’m sorry." She struck a match.
The fire consumed the wood fast, the mirror howling like an animal. James collapsed.
When he opened his eyes, he gasped for air.
"What… what just happened?"
James held him close. "We’re leaving. Now."
They ran from the house. Behind them, the mansion glowed in eerie orange as the basement burned away the secrets.
Moral:
Silence doesn’t kill secrets. It feeds them.
-
@ 7f6db517:a4931eda
2025-06-18 08:01:56I often hear "bitcoin doesn't interest me, I'm not a finance person."
Ironically, the beauty of sound money is you don't have to be. In the current system you're expected to manage a diversified investment portfolio or pay someone to do it. Bitcoin will make that optional.
— ODELL (@ODELL) September 16, 2018
At first glance bitcoin often appears overwhelming to newcomers. It is incredibly easy to get bogged down in the details of how it works or different ways to use it. Enthusiasts, such as myself, often enjoy going down the deep rabbit hole of the potential of bitcoin, possible pitfalls and theoretical scenarios, power user techniques, and the developer ecosystem. If your first touch point with bitcoin is that type of content then it is only natural to be overwhelmed. While it is important that we have a thriving community of bitcoiners dedicated to these complicated tasks - the true beauty of bitcoin lies in its simplicity. Bitcoin is simply better money. It is the best money we have ever had.
Life is complicated. Life is hard. Life is full of responsibility and surprises. Bitcoin allows us to focus on our lives while relying on a money that is simple. A money that is not controlled by any individual, company, or government. A money that cannot be easily seized or blocked. A money that cannot be devalued at will by a handful of corrupt bureaucrat who live hundreds of miles from us. A money that can be easily saved and should increase in purchasing power over time without having to learn how to "build a diversified stock portfolio" or hire someone to do it for us.
Bitcoin enables all of us to focus on our lives - our friends and family - doing what we love with the short time we have on this earth. Time is scarce. Life is complicated. Bitcoin is the most simple aspect of our complicated lives. If we spend our scarce time working then we should be able to easily save that accrued value for future generations without watching the news or understanding complicated financial markets. Bitcoin makes this possible for anyone.
Yesterday was Mother's Day. Raising a human is complicated. It is hard, it requires immense personal responsibility, it requires critical thinking, but mothers figure it out, because it is worth it. Using and saving bitcoin is simple - simply install an app on your phone. Every mother can do it. Every person can do it.
Life is complicated. Life is beautiful. Bitcoin is simple.
If you found this post helpful support my work with bitcoin.
-
@ eb0157af:77ab6c55
2025-06-18 08:01:36A new study by Kraken reveals how cryptocurrency investors perceive security as the main challenge in self-managing their digital assets.
According to The Block, a recent survey conducted by crypto exchange Kraken found that nearly half of respondents consider themselves the primary risk factor for their own crypto security. The research, which surveyed 789 participants, highlights that 48% of users see their own actions as the greatest threat to their investments in digital assets, surpassing concerns about external theft or fraud.
Kraken’s report underlines how personal responsibility in security management forces users to take full control of their digital funds. However, the study suggests that this autonomy can also become a source of anxiety for many investors.
Nick Percoco, Chief Security Officer at Kraken, commented on the findings, noting that “a lack of confidence in personal crypto security is capping the growth of the industry.” According to Percoco, unlocking the full potential of cryptocurrencies will require users to embrace self-custody and consistently invest in strong security habits.
Technologies to strengthen security
Despite the concerns highlighted in the study, 31% of participants expressed optimism about future technologies that could improve crypto security. Among the most promising solutions identified:
- advanced biometric systems for user authentication;
- multi-factor authentication to secure wallet access;
- AI-based fraud detection systems to prevent attacks.
Data and case studies
Kraken’s research emerges in a context where security threats remain a pressing reality. FBI data shows that in 2024, nearly 150,000 reports of crypto-related internet fraud resulted in $9.3 billion in losses. Older users, particularly those over 60, proved especially vulnerable, accounting for $3 billion in crypto-related financial fraud losses on their own.
The post Kraken study: 48% of users fear themselves in managing and securing their funds appeared first on Atlas21.
-
@ 2769f6ba:8dac44e4
2025-06-03 06:53:38You may want to believe that the world works like a video game, where you can press the pause button, come back three months later and everything will be waiting for you exactly as you left it. But real life doesn’t work like that. The difference is that in the video game you are in control, whereas in real life you are not. Maybe you want to believe that the worst is over, but this is just getting started. Supply chains are breaking down and the economy is starting to collapse. To make it clear, “the economy” is not something abstract; it’s real people losing their jobs, their businesses, their incomes and their homes. Your authoritarian fantasies will just make it worse for you and others until you cannot handle it anymore and you accept reality and surrender to it. I get that you are afraid, and that’s OK. But to hold your fellow human beings hostage because you are afraid is not OK. It’s getting to the point where if you still support lockdowns, mandatory vaccines, mandatory tracking, mandatory testing or mandatory anything you have blood on your hands. History will not judge you kindly.
Then there are those of you who want to believe that the bailouts and the “universal basic income” will make the problems disappear. For example, I read Charles Eisenstein in his otherwise excellent piece The Coronation come up with all this UBI nonsense. You probably realize that if you grab a piece of paper and write “$1,000,000” on it with a marker pen of your favorite color, you don’t become magically rich. But you still want to believe that if the government does exactly the same thing, your problems will go away. On the one hand, even if you are not fully aware of it, you realize that the government and its satellite corporations are abusing you and sucking your blood more and more every day. Yet on the other hand, you keep begging your very abusers that are trying to deprive you from earning an honest living for yourself to give you a measly monthly UBI check in the hopes that it will magically make you feel good and solve your problems.
Aside from the fact that printing money cannot solve the issue the governments themselves have created in the first place with their mandatory lockdowns: maybe you expect that you can control your masters, or that they will benevolently give you the UBI check with no strings attached. Of course not: receiving the check will likely be tied to being a “good law-abiding citizen” (a.k.a. obedient slave); something like the social credit system they have in China. You will end up completely disempowered and depending on the government to even feed yourself and have shelter. I find it quite infuriating and sad that any “spiritual teacher” would want that for you and that you fall for it.
Consider this:
The issue is not the coronavirus itself. The virus is just revealing the cracks in the system.
You are not a victim. You always have the power. Not the power to start a “revolution”, mind you, which just consists in replacing the old abusers with new ones. As Buckminster Fuller said: “You never change things by fighting the existing reality. To change something, build a new model that makes the existing model obsolete.”
You have the power to walk away from this dying system of nation-state governments and fiat “money” and into the nascent paradigm of cryptocurrencies and decentralized governance. But first you have to question and confront the beliefs you have accepted as “reality”. It’s hard, I know, but unavoidable. So, the sooner you begin, the better for yourself and for humanity. Do you want to be free or do you just want to have a “fair” master?
-
@ 2769f6ba:8dac44e4
2025-06-03 06:46:33I am feeling that the issue runs deeper. Science has been hijacked by the state, so I find the post-truth thing as a meme that rejects the corruption of science. Unfortunately, those hippies are throwing the baby with the bathwater in the process. But I see legitimate issues that need to be acknowledged if we want to reach out to those post-truth hippies.
For example, in my opinion:
The issue is not with 5G, but with this:
- Not wanting to be “bathed” 24/7 in waves of higher frequency (3 to 30 GHz). I understand the fear and skepticism on this.
- The push towards so-called “smart cities”, which are more like surveillance-cities. Granted, those technologies will bring benefits, but I see an issue with a top-down planned system controlled by the state and its contractors rather than a more organic system, with participation from many actors and little central planning. Of course, politicians and “experts” are always trying to link together smart-cities with 5G as if they must go together.
- The state is appropriating the radio spectrum and renting most of it to its cronies from the telecom companies, while it only leaves tiny scraps for open use by the population.
The issue is not with vaccines, but with this:
- pushing forced vaccination under the guise of “science”.
- an ever-growing list of both mandatory and “recommended” vaccines, some of them for diseases that are just an inconvenience and definitely not life-threatening.
I feel it must be acknowledged that the state has hijacked science, in the same way that the church has always hijacked spirituality. So, just telling those hippies that they have to trust science because facts and because the “experts” say so, won’t cut it anymore. A different approach is needed.
-
@ 9c9d2765:16f8c2c2
2025-06-18 07:49:32Jennifer checked into the CUBANA Hotel just after midnight. Her reservation was for Room 21 but the receptionist, a frail woman with shaking hands, handed her a different key.
“Room 39,” she said quietly. “It’s better.”
Jennifer hesitated. “But I booked”
“Trust me,” the woman interrupted, not meeting her eyes. “Don’t go near Room 21 tonight.”
Chilled by her tone, Jennifer took the key.
As she walked through the long corridor, dimly lit and lined with dusty paintings, she passed Room 21. Its door was slightly ajar. A draft whispered from it, carrying the faint sound of piano music, though no one had checked in for days.
Jennifer entered Room 39 and locked the door behind her.
That night, she couldn’t sleep. The music continued soft, broken, sorrowful. She finally crept into the hallway. The corridor was darker now. Room 21’s door had swung open wide.
Drawn by a strange force, Jennifer stepped inside.
The room was pristine. An old piano stood in the corner, keys moving on their own. On the wall hung a photo of a young couple, one of them was her.
It was a photo she'd never taken.
On the piano was a letter:
To Jennifer, If you are reading this, you’ve come searching for answers. Room 21 holds what you lost. Your memories, your truth. You left them here seven years ago when you fled. But the past doesn’t stay buried. Tonight, you must choose to remember or keep running.
Jennifer turned and saw the mirror. In it, her reflection wore a wedding dress... bloodstained.
Moral: What we fear most is often the key to the truth we need most.
-
@ b7274d28:c99628cb
2025-05-28 01:11:43In this second installment of The Android Elite Setup tutorial series, we will cover installing the nostr:npub10r8xl2njyepcw2zwv3a6dyufj4e4ajx86hz6v4ehu4gnpupxxp7stjt2p8 on your #Android device and browsing for apps you may be interested in trying out.
Since the #Zapstore is a direct competitor to the Google Play Store, you're not going to be able to find and install it from there like you may be used to with other apps. Instead, you will need to install it directly from the developer's GitHub page. This is not a complicated process, but it is outside the normal flow of searching on the Play Store, tapping install, and you're done.
Installation
From any web browser on your Android phone, navigate to the Zapstore GitHub Releases page and the most recent version will be listed at the top of the page. The .apk file for you to download and install will be listed in the "Assets."
Tap the .apk to download it, and you should get a notification when the download has completed, with a prompt to open the file.
You will likely be presented with a prompt warning you that your phone currently isn't allowed to install applications from "unknown sources." Anywhere other than the Play Store is considered an "unknown source" by default. However, you can manually allow installation from unknown sources in the settings, which the prompt gives you the option to do.
In the settings page that opens, toggle it to allow installation from this source, and you should be prompted to install the application. If you aren't, simply go to your web browser's downloads and tap on the .apk file again, or go into your file browser app and you should find the .apk in your Downloads folder.
If the application doesn't open automatically after install, you will find it in your app drawer.
Home Page
Right at the top of the home page in the Zapstore is the search bar. You can use it to find a specific app you know is available in the Zapstore.
There are quite a lot of open source apps available, and more being added all the time. Most are added by the Zapstore developer, nostr:npub1wf4pufsucer5va8g9p0rj5dnhvfeh6d8w0g6eayaep5dhps6rsgs43dgh9, but some are added by the app developers themselves, especially Nostr apps. All of the applications we will be installing through the Zapstore have been added by their developers and are cryptographically signed, so you know that what you download is what the developer actually released.
The next section is for app discovery. There are curated app collections to peruse for ideas about what you may want to install. As you can see, all of the other apps we will be installing are listed in nostr:npub1wf4pufsucer5va8g9p0rj5dnhvfeh6d8w0g6eayaep5dhps6rsgs43dgh9's "Nostr" collection.
In future releases of the Zapstore, users will be able to create their own app collections.
The last section of the home page is a chronological list of the latest releases. This includes both new apps added to the Zapstore and recently updated apps. The list of recent releases on its own can be a great resource for discovering apps you may not have heard of before.
Installed Apps
The next page of the app, accessed by the icon in the bottom-center of the screen that looks like a clock with an arrow circling it, shows all apps you have installed that are available in the Zapstore. It's also where you will find apps you have previously installed that are ready to be updated. This page is pretty sparse on my test profile, since I only have the Zapstore itself installed, so here is a look at it on my main profile:
The "Disabled Apps" at the top are usually applications that were installed via the Play Store or some other means, but are also available in the Zapstore. You may be surprised to see that some of the apps you already have installed on your device are also available on the Zapstore. However, to manage their updates though the Zapstore, you would need to uninstall the app and reinstall it from the Zapstore instead. I only recommend doing this for applications that are added to the Zapstore by their developers, or you may encounter a significant delay between a new update being released for the app and when that update is available on the Zapstore.
Tap on one of your apps in the list to see whether the app is added by the developer, or by the Zapstore. This takes you to the application's page, and you may see a warning at the top if the app was not installed through the Zapstore.
Scroll down the page a bit and you will see who signed the release that is available on the Zapstore.
In the case of Primal, even though the developer is on Nostr, they are not signing their own releases to the Zapstore yet. This means there will likely be a delay between Primal releasing an update and that update being available on the Zapstore.
Settings
The last page of the app is the settings page, found by tapping the cog at the bottom right.
Here you can send the Zapstore developer feedback directly (if you are logged in), connect a Lightning wallet using Nostr Wallet Connect, delete your local cache, and view some system information.
We will be adding a connection to our nostr:npub1h2qfjpnxau9k7ja9qkf50043xfpfy8j5v60xsqryef64y44puwnq28w8ch wallet in part 5 of this tutorial series.
For the time being, we are all set with the Zapstore and ready for the next stage of our journey.
Continue to Part 3: Amber Signer. Nostr link: nostr:naddr1qqxnzde5xuengdeexcmnvv3eqgstwf6d9r37nqalwgxmfd9p9gclt3l0yc3jp5zuyhkfqjy6extz3jcrqsqqqa28qy2hwumn8ghj7un9d3shjtnyv9kh2uewd9hj7qg6waehxw309aex2mrp0yhxyunfva58gcn0d36zumn9wss80nug
-
@ 4ba8e86d:89d32de4
2025-06-17 17:55:10DTails é uma ferramenta que facilita a inclusão de aplicativos em imagens de sistemas live baseados em Debian, como o Tails. Com ela, você pode personalizar sua imagem adicionando os softwares que realmente precisa — tudo de forma simples, transparente e sob seu controle total.
⚠️ DTails não é uma distribuição. É uma ferramenta de remasterização de imagens live.
Ela permite incluir softwares como:
✅ SimpleX Chat ✅ Clientes Nostr Web (Snort & Iris) ✅ Sparrow Wallet ✅ Feather Wallet ✅ Cake Wallet ✅ RoboSats ✅ Bisq ✅ BIP39 (Ian Coleman) ✅ SeedTool ... e muito mais. https://image.nostr.build/b0bb1f0da5a9a8fee42eacbddb156fc3558f4c3804575d55eeefbe6870ac223e.jpg
Importante: os binários originais dos aplicativos não são modificados, garantindo total transparência e permitindo a verificação de hashes a qualquer momento.
👨💻 Desenvolvido por: nostr:npub1dtmp3wrkyqafghjgwyk88mxvulfncc9lg6ppv4laet5cun66jtwqqpgte6
GitHub: https://github.com/DesobedienteTecnologico/dtails?tab=readme-ov-file
🎯 Controle total do que será instalado
Com o DTails, você escolhe exatamente o que deseja incluir na imagem personalizada. Se não marcar um aplicativo, ele não será adicionado, mesmo que esteja disponível. Isso significa: privacidade, leveza e controle absoluto.
https://image.nostr.build/b0bb1f0da5a9a8fee42eacbddb156fc3558f4c3804575d55eeefbe6870ac223e.jpg https://image.nostr.build/b70ed11ad2ce0f14fd01d62c08998dc18e3f27733c8d7e968f3459846fb81baf.jpg https://image.nostr.build/4f5a904218c1ea6538be5b3f764eefda95edd8f88b2f42ac46b9ae420b35e6f6.jpg
⚙️ Começando com o DTails
📦 Requisitos de pacotes
Antes de tudo, instale os seguintes pacotes no Debian:
``` sudo apt-get install genisoimage parted squashfs-tools syslinux-utils build-essential python3-tk python3-pil.imagetk python3-pyudev
```
🛠 Passo a passo
1 Clone o repositório:
``` git clone https://github.com/DesobedienteTecnologico/dtails cd dtails
```
2 Inicie a interface gráfica com sudo:
``` sudo ./dtails.py
```
Por que usar sudo? É necessário para montar arquivos .iso ou .img e utilizar ferramentas essenciais do sistema.
💿 Selecione a imagem Tails que deseja modificar
https://nostr.download/e3143dcd72ab6dcc86228be04d53131ccf33d599a5f7f2f1a5c0d193557dac6b.jpg
📥 Adicione ou remova pacotes
1 Marque os aplicativos desejados. 2 Clique Buildld para gerar sua imagem personalizada. https://image.nostr.build/5c4db03fe33cd53d06845074d03888a3ca89c3e29b2dc1afed4d9d181489b771.png
Você pode acompanhar todo o processo diretamente no terminal. https://nostr.download/1d959f4be4de9fbb666ada870afee4a922fb5e96ef296c4408058ec33cd657a8.jpg
💽 .ISO vs .IMG — Qual escolher?
| Formato | Persistência | Observações | | ------- | ---------------------- | ----------------------------------------------- | | .iso | ❌ Não tem persistência | Gera o arquivo DTails.iso na pasta do projeto | | .img | ✅ Suporta persistência | Permite gravar diretamente em um pendrive |
https://nostr.download/587fa3956df47a38b169619f63c559928e6410c3dd0d99361770a8716b3691f6.jpg https://nostr.download/40c7c5badba765968a1004ebc67c63a28b9ae3b5801addb02166b071f970659f.jpg
vídeo
https://www.youtube.com/live/QABz-GOeQ68?si=eYX-AHsolbp_OmAm
-
@ 2769f6ba:8dac44e4
2025-06-03 06:38:13To be blunt, people want “authority” to exist because they themselves are immature cowards. They want an all-powerful entity to impose their will upon others. This takes different forms in different varieties of political advocacy, but the basic motivation is always the same. The “liberal” for example, resents reality. He does not want a world in which suffering and injustice are possible. But instead of doing what He can as a human being, he wants a “Government” to do it for him. He wants some magical entity to make sure that everyone, himself included, is fed, housed, and taken care of, no matter how lazy or irresponsible they are. Instead of trusting human beings to take care of each other, he wants a super human ”authority” to guarantee housing, food, health care, and all sorts of other things, for everyone. He wants it so badly that he refuses to accept the obvious truth that no such guarantee is ever possible, and that if mere mortals do not take care of themselves and each other, nothing else will take care of them.
“The Most Dangerous Superstition” – Larken Rose, pg. 124
-
@ c1e9ab3a:9cb56b43
2025-06-01 13:54:061. Introduction
Over the last 250 years the world’s appetite for energy has soared along an unmistakably exponential trajectory, transforming societies and economies alike. After a half‑century of relative deceleration, a new mix of technological, demographic and political forces now hints at an impending catch‑up phase that could push demand back onto its centuries‑long growth curve. This post knits together the history, the numbers and the newest policy signals to explore what that rebound might look like—and how Gen‑4 nuclear power could meet it.
2. The Long Exponential: 1750 – 1975
Early industrialisation replaced muscle, wood and water with coal‑fired steam, pushing global primary energy use from a few exajoules per year in 1750 to roughly 60 EJ by 1900 and 250 EJ by 1975. Over that span aggregate consumption doubled roughly every 25–35 years, equivalent to a long‑run compound growth rate of ~3 % yr‑¹. Per‑capita use climbed even faster in industrialised economies as factories, railways and electric lighting spread.
3. 1975 – 2025: The Great Slowdown
3.1 Efficiency & Structural Change
• Oil shocks (1973, 1979) and volatile prices pushed OECD economies to squeeze more GDP from each joule.
• Services displaced heavy industry in rich countries, trimming energy intensity.
• Refrigerators, motors and vehicles became dramatically more efficient.3.2 Policy & Technology
• The Inflation Reduction Act (U.S.) now layers zero‑emission production credits and technology‑neutral tax incentives on top of existing nuclear PTCs citeturn1search0turn1search2.
• The EU’s Net‑Zero Industry Act aims to streamline siting and finance for “net‑zero technologies”, explicitly naming advanced nuclear citeturn0search1.3.3 Result
Global primary energy in 2024 stands near 600 EJ (≈ 167 000 TWh)—still growing, but the line has flattened versus the pre‑1975 exponential.
4. Population & Per‑Capita Demand
World population tripled between 1950 and today, yet total energy use grew roughly six‑fold. The imbalance reflects rising living standards and electrification. Looking ahead, the UN projects population to plateau near 10.4 billion in the 2080s, but per‑capita demand is poised to climb as the Global South industrialises.
5. The Policy Pivot of 2023‑2025
| Region | Signal | Year | Implication | |--------|--------|------|-------------| | COP 28 Declaration | 20+ nations pledge to triple nuclear capacity by 2050 | 2023 | High‑level political cover for rapid nuclear build‑out citeturn0search2 | | Europe | Post‑crisis sentiment shifts; blackout in Iberia re‑opens nuclear debate | 2025 | Spain, Germany, Switzerland and others revisit phase‑outs citeturn0news63 | | United States | TVA submits first SMR construction permit; NRC advances BWRX‑300 review | 2025 | Regulatory pathway for fleet deployment citeturn1search9turn1search1 | | Global Strategy Report | “Six Dimensions for Success” playbook for new nuclear entrants | 2025 | Practical roadmap for emerging economies citeturn0search0 | | U.S. Congress | Proposed cuts to DOE loan office threaten build‑out pace | 2025 | Finance bottleneck remains a risk citeturn1news28 |
6. The Catch‑Up Scenario
Suppose the recent 50‑year pause ends in 2025, and total energy demand returns to a midpoint historical doubling period of 12.5 years (the average of the 10–15 year rebound window).
6.1 Consumption Trajectory
| Year | Doublings since 2024 | Demand (TWh) | |------|----------------------|--------------| | 2024 | 0 | 167 000 | | 2037 | 1 | 334 000 | | 2050 | 2 | 668 000 | | 2062 | 3 | 1 336 000 |
(Table ignores efficiency gains from electrification for a conservative, supply‑side sizing.)
7. Nuclear‑Only Supply Model
7.1 Reactor Math
- 1 GWᵉ Gen‑4 reactor → 8.76 TWh yr‑¹ at 100 % capacity factor.
- 2062 requirement: 1 336 000 TWh yr‑¹ → ≈ 152 500 reactors in steady state.
- Build rate (2025‑2062, linear deployment):
152 500 ÷ 38 years ≈ 4 000 reactors per year globally.
(Down from the earlier 5 000 yr‑¹ estimate because the deployment window now stretches 38 years instead of 30.)
7.2 Policy Benchmarks
- COP 28 triple target translates to +780 GW (if baseline 2020 ≈ 390 GW). That is <100 1 GW units per year—two orders of magnitude lower than the theoretical catch‑up requirement, highlighting just how aggressive our thought experiment is.
7.3 Distributed vs Grid‑Centric
Small Modular Reactors (300 MW class) can be sited on retiring coal plants, using existing grid interconnects and cooling, vastly reducing new transmission needs. Ultra‑large “gigawatt corridors” become optional rather than mandatory, though meshed regional grids still improve resilience and market liquidity.
8. Challenges & Unknowns
- Finance: Even with IRA‑style credits, first‑of‑a‑kind Gen‑4 builds carry high cost of capital.
- Supply Chain: 4 000 reactors a year means a reactor‑grade steel output roughly 20× today’s level.
- Waste & Public Trust: Advanced reactors can burn actinides, but geologic repositories remain essential.
- Workforce: Nuclear engineers, welders and regulators are already in short supply.
- Competing Technologies: Cheap renewables + storage and prospective fusion could displace part of the projected load.
9. Conclusions
Recent policy shifts—from Europe’s Net‑Zero Industry Act to the COP 28 nuclear declaration—signal that governments once again see nuclear energy as indispensable to deep decarbonisation. Yet meeting an exponential catch‑up in demand would require deployment rates an order of magnitude beyond today’s commitments, testing manufacturing capacity, finance and political resolve.
Whether the future follows the modest path now embedded in policy or the steeper curve sketched here, two convictions stand out:
- Electrification will dominate new energy demand.
- Scalable, dispatchable low‑carbon generation—likely including large fleets of Gen‑4 fission plants—must fill much of that gap if net‑zero targets are to remain credible.
Last updated 1 June 2025.
-
@ dfa02707:41ca50e3
2025-06-17 07:01:47Contribute to keep No Bullshit Bitcoin news going.
-
Version 1.3 of Bitcoin Safe introduces a redesigned interactive chart, quick receive feature, updated icons, a mempool preview window, support for Child Pays For Parent (CPFP) and testnet4, preconfigured testnet demo wallets, as well as various bug fixes and improvements.
-
Upcoming updates for Bitcoin Safe include Compact Block Filters.
"Compact Block Filters increase the network privacy dramatically, since you're not asking an electrum server to give you your transactions. They are a little slower than electrum servers. For a savings wallet like Bitcoin Safe this should be OK," writes the project's developer Andreas Griffin.
- Learn more about the current and upcoming features of Bitcoin Safe wallet here.
What's new in v1.3
- Redesign of Chart, Quick Receive, Icons, and Mempool Preview (by @design-rrr).
- Interactive chart. Clicking on it now jumps to transaction, and selected transactions are now highlighted.
- Speed up transactions with Child Pays For Parent (CPFP).
- BDK 1.2 (upgraded from 0.32).
- Testnet4 support.
- Preconfigured Testnet demo wallets.
- Cluster unconfirmed transactions so that parents/children are next to each other.
- Customizable columns for all tables (optional view: Txid, Address index, and more)
- Bug fixes and other improvements.
Announcement / Archive
Blog Post / Archive
GitHub Repo
Website -
-
@ 7f6db517:a4931eda
2025-06-18 07:01:44The former seems to have found solid product market fit. Expect significant volume, adoption, and usage going forward.
The latter's future remains to be seen. Dependence on Tor, which has had massive reliability issues, and lack of strong privacy guarantees put it at risk.
— ODELL (@ODELL) October 27, 2022
The Basics
- Lightning is a protocol that enables cheap and fast native bitcoin transactions.
- At the core of the protocol is the ability for bitcoin users to create a payment channel with another user.
- These payment channels enable users to make many bitcoin transactions between each other with only two on-chain bitcoin transactions: the channel open transaction and the channel close transaction.
- Essentially lightning is a protocol for interoperable batched bitcoin transactions.
- It is expected that on chain bitcoin transaction fees will increase with adoption and the ability to easily batch transactions will save users significant money.
- As these lightning transactions are processed, liquidity flows from one side of a channel to the other side, on chain transactions are signed by both parties but not broadcasted to update this balance.
- Lightning is designed to be trust minimized, either party in a payment channel can close the channel at any time and their bitcoin will be settled on chain without trusting the other party.
There is no 'Lightning Network'
- Many people refer to the aggregate of all lightning channels as 'The Lightning Network' but this is a false premise.
- There are many lightning channels between many different users and funds can flow across interconnected channels as long as there is a route through peers.
- If a lightning transaction requires multiple hops it will flow through multiple interconnected channels, adjusting the balance of all channels along the route, and paying lightning transaction fees that are set by each node on the route.
Example: You have a channel with Bob. Bob has a channel with Charlie. You can pay Charlie through your channel with Bob and Bob's channel with User C.
- As a result, it is not guaranteed that every lightning user can pay every other lightning user, they must have a route of interconnected channels between sender and receiver.
Lightning in Practice
- Lightning has already found product market fit and usage as an interconnected payment protocol between large professional custodians.
- They are able to easily manage channels and liquidity between each other without trust using this interoperable protocol.
- Lightning payments between large custodians are fast and easy. End users do not have to run their own node or manage their channels and liquidity. These payments rarely fail due to professional management of custodial nodes.
- The tradeoff is one inherent to custodians and other trusted third parties. Custodial wallets can steal funds and compromise user privacy.
Sovereign Lightning
- Trusted third parties are security holes.
- Users must run their own node and manage their own channels in order to use lightning without trusting a third party. This remains the single largest friction point for sovereign lightning usage: the mental burden of actively running a lightning node and associated liquidity management.
- Bitcoin development prioritizes node accessibility so cost to self host your own node is low but if a node is run at home or office, Tor or a VPN is recommended to mask your IP address: otherwise it is visible to the entire network and represents a privacy risk.
- This privacy risk is heightened due to the potential for certain governments to go after sovereign lightning users and compel them to shutdown their nodes. If their IP Address is exposed they are easier to target.
- Fortunately the tools to run and manage nodes continue to get easier but it is important to understand that this will always be a friction point when compared to custodial services.
The Potential Fracture of Lightning
- Any lightning user can choose which users are allowed to open channels with them.
- One potential is that professional custodians only peer with other professional custodians.
- We already see nodes like those run by CashApp only have channels open with other regulated counterparties. This could be due to performance goals, liability reduction, or regulatory pressure.
- Fortunately some of their peers are connected to non-regulated parties so payments to and from sovereign lightning users are still successfully processed by CashApp but this may not always be the case going forward.
Summary
- Many people refer to the aggregate of all lightning channels as 'The Lightning Network' but this is a false premise. There is no singular 'Lightning Network' but rather many payment channels between distinct peers, some connected with each other and some not.
- Lightning as an interoperable payment protocol between professional custodians seems to have found solid product market fit. Expect significant volume, adoption, and usage going forward.
- Lightning as a robust sovereign payment protocol has yet to be battle tested. Heavy reliance on Tor, which has had massive reliability issues, the friction of active liquidity management, significant on chain fee burden for small amounts, interactivity constraints on mobile, and lack of strong privacy guarantees put it at risk.
If you have never used lightning before, use this guide to get started on your phone.
If you found this post helpful support my work with bitcoin.
-
@ 9be0be0e:c3cbb81e
2023-09-28 07:41:35I’m not sure if nostr:npub180cvv07tjdrrgpa0j7j7tmnyl2yr6yr7l8j4s3evf6u64th6gkwsyjh6w6 had a Web of Trust in mind when designing nostr and its use of public contact lists but I think it’s very important to nostr’s future.
Technically there is no need to publish a follow list, if a nostr client wants to show a feed of follows it just needs a list of contacts, this list does not need to exist in public or on relays, but the fact that it does is what makes the Web of Trust work.
Accidental
The only other Web of Trust that I know of is PGP’s Web of Trust, it is only used by IT and security people, which is also the reason why it is unusable for most people. It leaves no room for error because security has the highest priority in those circles.
But on nostr the Web of Trust is a side effect of just following people. You press Follow a few times and you are accidentally building a Web of Trust without even knowing it. It might not be perfect, but that’s also why it works, because it is so simple, like nostr itself.
Attempts to “fix” or improve the Web of Trust should be made with that simplicity in mind. Creating new lists with granularity of people you really trust, partially trust, don’t trust at all etc are all great, but this will make it possible for it to end up like PGP. Nostr’s Web of Trust works precisely because people don’t have to think about it.
There is also this idea that likes, reposts or any signal that can be made by users are useless because they can be gamed, but they can only be gamed if you don’t use a Web of Trust.
Web of Trust fixes almost everything
nostr:note1a8nq7kdqgr20dnvzmhv2a6quy8vx3l56pfzjlly3jv2u2l55exhs84cev8
Web of Trust fixes spam, bots, abuse of trending/hot algorithms
Zaps were supposed to fix the problem of gaming/abusing likes or reposts, but Web of Trust fixes it better. Zaps are useful for sending value, so let’s use it to send actual value. 1 sat zaps are not much different from Like-spam and considering the technical overhead required for zaps and possibility for timeouts and failures it’s actually worse.
So, Web of Trust Makes Likes Great Again, and with that you can make algorithms that are useful to the individual instead of the advertisers or platforms.
Example of a most basic Web of Trust filter (follows + follows of follows)
Nostur uses follows + follows of follows to filter spam and bots, and it uses likes and reposts from follows uniquely ranked to create Hot and Gallery feeds.
Another example is nostr:npub1yxprsscnjw2e6myxz73mmzvnqw5kvzd5ffjya9ecjypc5l0gvgksh8qud4‘s https://oddbean.com, a community website where the content of the community is based on the administrator’s follows, the algorithm is incredibly simple and transparent, and it wouldn’t be possible if nostr did not have an accidental Web of Trust:
Challenges
Now there are still some challenges to be solved, new users being onboarded won’t have a Web of Trust yet, maybe we could give them training wheels, a preloaded Web of Trust until they followed enough people to use their own.
Also, new users don’t exist in anyone else’s Web of Trust yet, so they won’t be seen until someone follows them. This is not a good new user experience.
You also might miss someone’s post because they are not in your Web of Trust yet.
These are all challenges and I will keep exploring solutions for these.
-
@ dd664d5e:5633d319
2024-06-21 19:11:51Finding Catholics and Catholic-friendly content on Nostr
Obvious Catholics being obvious
nostr:npub1m4ny6hjqzepn4rxknuq94c2gpqzr29ufkkw7ttcxyak7v43n6vvsajc2jl
nostr:npub1k92qsr95jcumkpu6dffurkvwwycwa2euvx4fthv78ru7gqqz0nrs2ngfwd
nostr:npub1wqfzz2p880wq0tumuae9lfwyhs8uz35xd0kr34zrvrwyh3kvrzuskcqsyn
nostr:npub1ecdlntvjzexlyfale2egzvvncc8tgqsaxkl5hw7xlgjv2cxs705s9qs735
nostr:npub1rcr8h76csgzhdhea4a7tq5w5gydcpg9clgf0cffu6z45rnc6yp5sj7cfuz
nostr:npub1fyd0awkakq4aap70ual7mtlszjle9krffgwnsrkyua2frzmysd8qjj8gvg
nostr:npub1q0fe26apcqeeyqnlre29fqu7ysx0ucm5ly637md3zlvy2xcfsm3s0lsv4r
nostr:npub1dvdcmtp5llrp63jdlmhspe9gffsyu9ew7cu3ld3f9y7k79nxzjxqf4d4rm
nostr:npub1paxyej8f8fh57ny0fr5w2mzp9can9nkcmeu5jaerv68mhrah7t8s795ky6
nostr:npub1tvw3h5xqnuc2aq5zelxp3dy58sz7x9u8e6enkxywmrz70cg2j2zqjes44n
nostr:npub13tahtl9pjw9u5ycruqk84k6sfmkyljsr7y2pc4s840ctlm73fxeq3j6e08
nostr:npub1w4jkwspqn9svwnlrw0nfg0u2yx4cj6yfmp53ya4xp7r24k7gly4qaq30zp
Other good Christian follows
nostr:npub1hqy4zwnvsdmlml4tpgp0kgrruxamfcwpgm4g3q2tr3d2ut3kuxusx73psm
nostr:npub1cpstx8lzhwctunfe80rugz5qsj9ztw8surec9j6mf8phha68dj6qhm8j5e
nostr:npub1ak5kewf6anwkrt0qc8ua907ljkn7wm83e2ycyrpcumjvaf2upszs8r0gwg
nostr:npub1mt8x8vqvgtnwq97sphgep2fjswrqqtl4j7uyr667lyw7fuwwsjgs5mm7cz
nostr:npub1q6ya7kz84rfnw6yjmg5kyttuplwpauv43a9ug3cajztx4g0v48eqhtt3sh
nostr:npub1356t6fpjysx9vdchfg7mryv83w4pcye6a3eeke9zvsje7s2tuv4s4k805u
nostr:npub1kun5628raxpm7usdkj62z2337hr77f3ryrg9cf0vjpyf4jvk9r9smv3lhe
nostr:npub1qf6gsfapq94rj0rcptkpm9sergacmuwrjlgfx5gznjajtvkcx3psfhx6k5
nostr:npub1ll99fcrclkvgff696u8tq9vupw9fulfc8fysdf6gfwp7hassrh2sktxszt
nostr:npub1zy37ecnhpvx4lmxh4spd0898sxdj0ag8m64s9yq499zaxlg7qrqq8c53q6
nostr:npub1rtlqca8r6auyaw5n5h3l5422dm4sry5dzfee4696fqe8s6qgudks7djtfs
nostr:npub1jlrs53pkdfjnts29kveljul2sm0actt6n8dxrrzqcersttvcuv3qdjynqn
nostr:npub18zqmath26txwfhc70af8axk7pftjre9x7cf0lxkg92nvj2cpfgts8va790
Christian follow list
An exhaustive list of Christians is maintained by nostr:npub1mt8x8vqvgtnwq97sphgep2fjswrqqtl4j7uyr667lyw7fuwwsjgs5mm7cz. Just look at his list on https://listr.lol/
Catholic community
You can also join the community, to reach other catholics (usable on #Nostrudel #Coracle #Amethyst and #Satellite): nostr:naddr1qvzqqqyx7cpzqqnd3dl8hnptg9agfugwmdcmgfl7wcrfjpgfpv28ksq6dnmqc0e8qqyyxct5dphkc6trmu6k9l
Christian topic relay
And always make sure to use the #catholic hashtag, to get onto the top-specific christpill relay (add it to your relay list: wss://christpill.nostr1.com/).
Hope that helps! 😊
-
@ c1e9ab3a:9cb56b43
2025-05-18 04:14:48Abstract
This document proposes a novel architecture that decouples the peer-to-peer (P2P) communication layer from the Bitcoin protocol and replaces or augments it with the Nostr protocol. The goal is to improve censorship resistance, performance, modularity, and maintainability by migrating transaction propagation and block distribution to the Nostr relay network.
Introduction
Bitcoin’s current architecture relies heavily on its P2P network to propagate transactions and blocks. While robust, it has limitations in terms of flexibility, scalability, and censorship resistance in certain environments. Nostr, a decentralized event-publishing protocol, offers a multi-star topology and a censorship-resistant infrastructure for message relay.
This proposal outlines how Bitcoin communication could be ported to Nostr while maintaining consensus and verification through standard Bitcoin clients.
Motivation
- Enhanced Censorship Resistance: Nostr’s architecture enables better relay redundancy and obfuscation of transaction origin.
- Simplified Lightweight Nodes: Removing the full P2P stack allows for lightweight nodes that only verify blockchain data and communicate over Nostr.
- Architectural Modularity: Clean separation between validation and communication enables easier auditing, upgrades, and parallel innovation.
- Faster Propagation: Nostr’s multi-star network may provide faster propagation of transactions and blocks compared to the mesh-like Bitcoin P2P network.
Architecture Overview
Components
-
Bitcoin Minimal Node (BMN):
- Verifies blockchain and block validity.
- Maintains UTXO set and handles mempool logic.
- Connects to Nostr relays instead of P2P Bitcoin peers.
-
Bridge Node:
- Bridges Bitcoin P2P traffic to and from Nostr relays.
- Posts new transactions and blocks to Nostr.
- Downloads mempool content and block headers from Nostr.
-
Nostr Relays:
- Accept Bitcoin-specific event kinds (transactions and blocks).
- Store mempool entries and block messages.
- Optionally broadcast fee estimation summaries and tipsets.
Event Format
Proposed reserved Nostr
kind
numbers for Bitcoin content (NIP/BIP TBD):| Nostr Kind | Purpose | |------------|------------------------| | 210000 | Bitcoin Transaction | | 210001 | Bitcoin Block Header | | 210002 | Bitcoin Block | | 210003 | Mempool Fee Estimates | | 210004 | Filter/UTXO summary |
Transaction Lifecycle
- Wallet creates a Bitcoin transaction.
- Wallet sends it to a set of configured Nostr relays.
- Relays accept and cache the transaction (based on fee policies).
- Mining nodes or bridge nodes fetch mempool contents from Nostr.
- Once mined, a block is submitted over Nostr.
- Nodes confirm inclusion and update their UTXO set.
Security Considerations
- Sybil Resistance: Consensus remains based on proof-of-work. The communication path (Nostr) is not involved in consensus.
- Relay Discoverability: Optionally bootstrap via DNS, Bitcoin P2P, or signed relay lists.
- Spam Protection: Relay-side policy, rate limiting, proof-of-work challenges, or Lightning payments.
- Block Authenticity: Nodes must verify all received blocks and reject invalid chains.
Compatibility and Migration
- Fully compatible with current Bitcoin consensus rules.
- Bridge nodes preserve interoperability with legacy full nodes.
- Nodes can run in hybrid mode, fetching from both P2P and Nostr.
Future Work
- Integration with watch-only wallets and SPV clients using verified headers via Nostr.
- Use of Nostr’s social graph for partial trust assumptions and relay reputation.
- Dynamic relay discovery using Nostr itself (relay list events).
Conclusion
This proposal lays out a new architecture for Bitcoin communication using Nostr to replace or augment the P2P network. This improves decentralization, censorship resistance, modularity, and speed, while preserving consensus integrity. It encourages innovation by enabling smaller, purpose-built Bitcoin nodes and offloading networking complexity.
This document may become both a Bitcoin Improvement Proposal (BIP-XXX) and a Nostr Improvement Proposal (NIP-XXX). Event kind range reserved: 210000–219999.
-
@ dfa02707:41ca50e3
2025-06-17 06:01:51Contribute to keep No Bullshit Bitcoin news going.
- The latest firmware updates for COLDCARD devices introduce two major features: COLDCARD Co-sign (CCC) and Key Teleport between two COLDCARD Q devices using QR codes and/or NFC with a website.
What's new
- COLDCARD Co-Sign: When CCC is enabled, a second seed called the Spending Policy Key (Key C) is added to the device. This seed works with the device's Main Seed and one or more additional XPUBs (Backup Keys) to form 2-of-N multisig wallets.
- The spending policy functions like a hardware security module (HSM), enforcing rules such as magnitude and velocity limits, address whitelisting, and 2FA authentication to protect funds while maintaining flexibility and control, and is enforced each time the Spending Policy Key is used for signing.
- When spending conditions are met, the COLDCARD signs the partially signed bitcoin transaction (PSBT) with the Main Seed and Spending Policy Key for fund access. Once configured, the Spending Policy Key is required to view or change the policy, and violations are denied without explanation.
"You can override the spending policy at any time by signing with either a Backup Key and the Main Seed or two Backup Keys, depending on the number of keys (N) in the multisig."
-
A step-by-step guide for setting up CCC is available here.
-
Key Teleport for Q devices allows users to securely transfer sensitive data such as seed phrases (words, xprv), secure notes and passwords, and PSBTs for multisig. It uses QR codes or NFC, along with a helper website, to ensure reliable transmission, keeping your sensitive data protected throughout the process.
- For more technical details, see the protocol spec.
"After you sign a multisig PSBT, you have option to “Key Teleport” the PSBT file to any one of the other signers in the wallet. We already have a shared pubkey with them, so the process is simple and does not require any action on their part in advance. Plus, starting in this firmware release, COLDCARD can finalize multisig transactions, so the last signer can publish the signed transaction via PushTX (NFC tap) to get it on the blockchain directly."
- Multisig transactions are finalized when sufficiently signed. It streamlines the use of PushTX with multisig wallets.
- Signing artifacts re-export to various media. Users are now provided with the capability to export signing products, like transactions or PSBTs, to alternative media rather than the original source. For example, if a PSBT is received through a QR code, it can be signed and saved onto an SD card if needed.
- Multisig export files are signed now. Public keys are encoded as P2PKH address for all multisg signature exports. Learn more about it here.
- NFC export usability upgrade: NFC keeps exporting until CANCEL/X is pressed.
- Added Bitcoin Safe option to Export Wallet.
- 10% performance improvement in USB upload speed for large files.
- Q: Always choose the biggest possible display size for QR.
Fixes
- Do not allow change Main PIN to same value already used as Trick PIN, even if Trick PIN is hidden.
- Fix stuck progress bar under
Receiving...
after a USB communications failure. - Showing derivation path in Address Explorer for root key (m) showed double slash (//).
- Can restore developer backup with custom password other than 12 words format.
- Virtual Disk auto mode ignores already signed PSBTs (with “-signed” in file name).
- Virtual Disk auto mode stuck on “Reading…” screen sometimes.
- Finalization of foreign inputs from partial signatures. Thanks Christian Uebber!
- Temporary seed from COLDCARD backup failed to load stored multisig wallets.
Destroy Seed
also removes all Trick PINs from SE2.Lock Down Seed
requires pressing confirm key (4) to execute.- Q only: Only BBQr is allowed to export Coldcard, Core, and pretty descriptor.
-
@ eb0157af:77ab6c55
2025-06-18 07:01:24VanEck analyst Matthew Sigel warns of growing risks for Bitcoin treasury companies as their stock prices approach NAV.
Matthew Sigel, Head of Digital Assets Research at VanEck, has sounded the alarm for companies that have adopted Bitcoin-based treasury strategies.
No public BTC treasury company has traded below its Bitcoin NAV for a sustained period.
But at least one is now approaching parity.
As some of these companies raise capital through large at-the-market (ATM) programs to buy BTC, a risk is emerging: If the stock trades at or near…
— matthew sigel, recovering CFA (@matthew_sigel) June 16, 2025
In a post on X, Sigel highlighted an emerging issue in the sector of companies holding Bitcoin treasuries. Until now, no public company with a Bitcoin treasury has ever traded below its own Net Asset Value (NAV) for extended periods. The NAV represents the net value of a company’s assets (such as bitcoin and cash) minus its liabilities, divided by the number of outstanding shares — essentially indicating the real value of each share based on the company’s holdings. However, at least one of these companies (Semler Scientific) is now dangerously approaching breakeven.
The core of the issue lies in the capital-raising mechanism. Many of these companies rely on large-scale at-the-market (ATM) programs to acquire bitcoin, but when the stock price nears the NAV, this strategy can shift from creating value to destroying it.
The risk for shareholders
Under normal market conditions, companies like Semler Scientific and Strategy trade at a premium to the value of the bitcoin they hold. This means investors are willing to pay more for the company’s stock than the simple value of its bitcoin treasury.
However, when a company’s stock price approaches or falls below its NAV, the situation becomes problematic, according to Sigel. Issuing new shares at these levels not only dilutes the value for existing shareholders but can also become extractive, as management continues to raise capital while benefiting more than shareholders.
Proposed solutions
Sigel suggested several measures for companies pursuing Bitcoin treasury strategies. His recommendations include implementing preventive safeguards while stock premiums still exist. Notably, he proposes announcing a pause in ATM issuances if the stock trades below 0.95 times NAV for ten or more consecutive trading days. Additionally, Sigel advises prioritizing buybacks when bitcoin appreciates but the company’s equity does not reflect that increase.
Lessons from Bitcoin miners’ past
The VanEck analyst pointed out that similar situations have occurred in the Bitcoin mining sector, marked by persistent equity issuances and disproportionate executive compensation. To avoid repeating those mistakes, Sigel suggests that executive pay should be tied to growth in NAV per share, not the size of the Bitcoin position or the total number of outstanding shares.
Sigel concluded:
“Once you are trading at NAV, shareholder dilution is no longer strategic. It is extractive. Boards and shareholders should act with discipline now, while they still have the benefit of optionality.”
The post Bitcoin treasury: VanEck sounds the alarm for companies in the danger zone appeared first on Atlas21.
-
@ 9ca447d2:fbf5a36d
2025-06-18 07:01:04In its latest bitcoin acquisition act, Japanese investment firm Metaplanet has hit its target of 10,000 Bitcoin (BTC) – a goal it set for 2025 but achieved in just six months.
Simon Gerovich on X
With this latest purchase of 1,112 BTC worth approximately $117.2 million, the company has now surpassed U.S.-based giant Coinbase, which holds around 9,267 BTC, and is now the 9th largest public bitcoin holder in the world. CEO Simon Gerovich announced:
“Metaplanet has acquired 1,112 BTC for ~$117.2 million at ~$105,435 per bitcoin and has achieved BTC Yield of 266.1% YTD 2025. As of 6/16/2025, we hold 10,000 BTC acquired for ~$947 million at ~$94,697 per bitcoin.”
Metaplanet is now the 9th largest corporate bitcoin holder — BitcoinTreasuries
Metaplanet started buying bitcoin in April 2024. Since then it has built its treasury through a series of purchases. The company’s bitcoin-first strategy includes raising capital through bonds and equity to fund more bitcoin buying.
Just before hitting 10,000 BTC, the Japanese firm announced the issuance of $210 million in zero-interest bonds. These bonds, the 18th Series, were issued to EVO FUND and mature on December 12, 2025. The company said these funds will be used to buy more bitcoin.
This latest purchase was part of the “210 Million Plan” which has helped Metaplanet raise huge sums to buy more bitcoin.
As part of this plan, the company also did a ¥770.9 billion (~$5.4 billion) equity raise through the issuance of 555 million moving strike warrants, the largest ever public capital raise for bitcoin in Asia.
The market is responding well to the firm’s strategy. On the day of the announcement, its stock rose 22% to close at 1,895 yen. Year-to-date, Metaplanet’s stock is up 430%, outperforming many major Japanese companies.
Metaplanet’s performance is also supported by its proprietary metric called “BTC Yield”—a measure of the increase in BTC holdings relative to the company’s fully diluted shares. BTC Yield is 266.1% YTD and is creating shareholder value.
With the 2025 goal achieved, Metaplanet is going even bigger. The company is now targeting 210,000 BTC by the end of 2027 which is 1% of the total bitcoin supply. To do that, they need to buy 200,000 more BTC in the next 18 months.
The phases of the new targets include accumulation of 30,000 BTC by the end of 2025, and 100,000 BTC by the end of 2026.
Metaplanet is on the same path as Strategy, the U.S. company led by Michael Saylor that started corporate bitcoin accumulation.
Metaplanet’s big moves come as more companies worldwide are adding bitcoin to their corporate treasury.
Over 150 public companies now hold over 800,000+ BTC, worth over $100 billion. Recent additions include Mercurity Fintech Holding and K33, both of which have announced new bitcoin-focused initiatives.
-
@ c1e9ab3a:9cb56b43
2025-05-01 17:29:18High-Level Overview
Bitcoin developers are currently debating a proposed change to how Bitcoin Core handles the
OP_RETURN
opcode — a mechanism that allows users to insert small amounts of data into the blockchain. Specifically, the controversy revolves around removing built-in filters that limit how much data can be stored using this feature (currently capped at 80 bytes).Summary of Both Sides
Position A: Remove OP_RETURN Filters
Advocates: nostr:npub1ej493cmun8y9h3082spg5uvt63jgtewneve526g7e2urca2afrxqm3ndrm, nostr:npub12rv5lskctqxxs2c8rf2zlzc7xx3qpvzs3w4etgemauy9thegr43sf485vg, nostr:npub17u5dneh8qjp43ecfxr6u5e9sjamsmxyuekrg2nlxrrk6nj9rsyrqywt4tp, others
Arguments: - Ineffectiveness of filters: Filters are easily bypassed and do not stop spam effectively. - Code simplification: Removing arbitrary limits reduces code complexity. - Permissionless innovation: Enables new use cases like cross-chain bridges and timestamping without protocol-level barriers. - Economic regulation: Fees should determine what data gets added to the blockchain, not protocol rules.
Position B: Keep OP_RETURN Filters
Advocates: nostr:npub1lh273a4wpkup00stw8dzqjvvrqrfdrv2v3v4t8pynuezlfe5vjnsnaa9nk, nostr:npub1s33sw6y2p8kpz2t8avz5feu2n6yvfr6swykrnm2frletd7spnt5qew252p, nostr:npub1wnlu28xrq9gv77dkevck6ws4euej4v568rlvn66gf2c428tdrptqq3n3wr, others
Arguments: - Historical intent: Satoshi included filters to keep Bitcoin focused on monetary transactions. - Resource protection: Helps prevent blockchain bloat and abuse from non-financial uses. - Network preservation: Protects the network from being overwhelmed by low-value or malicious data. - Social governance: Maintains conservative changes to ensure long-term robustness.
Strengths and Weaknesses
Strengths of Removing Filters
- Encourages decentralized innovation.
- Simplifies development and maintenance.
- Maintains ideological purity of a permissionless system.
Weaknesses of Removing Filters
- Opens the door to increased non-financial data and potential spam.
- May dilute Bitcoin’s core purpose as sound money.
- Risks short-term exploitation before economic filters adapt.
Strengths of Keeping Filters
- Preserves Bitcoin’s identity and original purpose.
- Provides a simple protective mechanism against abuse.
- Aligns with conservative development philosophy of Bitcoin Core.
Weaknesses of Keeping Filters
- Encourages central decision-making on allowed use cases.
- Leads to workarounds that may be less efficient or obscure.
- Discourages novel but legitimate applications.
Long-Term Consequences
If Filters Are Removed
- Positive: Potential boom in new applications, better interoperability, cleaner architecture.
- Negative: Risk of increased blockchain size, more bandwidth/storage costs, spam wars.
If Filters Are Retained
- Positive: Preserves monetary focus and operational discipline.
- Negative: Alienates developers seeking broader use cases, may ossify the protocol.
Conclusion
The debate highlights a core philosophical split in Bitcoin: whether it should remain a narrow monetary system or evolve into a broader data layer for decentralized applications. Both paths carry risks and tradeoffs. The outcome will shape not just Bitcoin's technical direction but its social contract and future role in the broader crypto ecosystem.
-
@ 1f79058c:eb86e1cb
2025-05-26 08:28:06I think we should agree on an HTML element for pointing to the Nostr representation of a document/URL on the Web. We could use the existing one for link relations for example:
html <link rel="alternate" type="application/nostr+json" href="nostr:naddr1qvzqqqr4..." title="This article on Nostr" />
This would be useful in multiple ways:
- Nostr clients, when fetching meta/preview information for a URL that is linked in a note, can detect that there's a Nostr representation of the content, and then render it in Nostr-native ways (whatever that may be depending on the client)
- User agents, usually a browser or browser extension, when opening a URL on the Web, can offer opening the alternative representation of a page in a Nostr client. And/or they could offer to follow the author's pubkey on Nostr. And/or they could offer to zap the content.
- When publishing a new article, authors can share their preferred Web URL everywhere, without having to consider if the reader knows about or uses Nostr at all. However, if a Nostr user finds the Web version of an article outside of Nostr, they can now easily jump to the Nostr version of it.
- Existing Web publications can retroactively create Nostr versions of their content and easily link the Nostr articles on all of their existing article pages without having to add prominent Nostr links everywhere.
There are probably more use cases, like Nostr search engines and whatnot. If you can think of something interesting, please tell me.
Update: I came up with another interesting use case, which is adding alternate links to RSS and Atom feeds.
Proof of concept
In order to show one way in which this could be used, I have created a small Web Extension called Nostr Links, which will discover alternate Nostr links on the pages you visit.
If it finds one or more links, it will show a purple Nostr icon in the address bar, which you can click to open the list of links. It's similar to e.g. the Feed Preview extension, and also to what the Tor Browser does when it discovers an Onion-Location for the page you're looking at:
The links in this popup menu will be
web+nostr:
links, because browsers currently do not allow web apps or extensions to handle unprefixednostr:
links. (I hope someone is working on getting those on par withipfs:
etc.)Following such a link will either open your default Nostr Web app, if you have already configured one, or it will ask you which Web app to open the link with.
Caveat emptor: At the time of writing, my personal default Web app, noStrudel, needs a new release for the links to find the content.
Try it now
Have a look at the source code and/or download the extension (currently only for Firefox).
I have added alternate Nostr links to the Web pages of profiles and long-form content on the Kosmos relay's domain. It's probably the only place on the Web, which will trigger the extension right now.
You can look at this very post to find an alternate link for example.
Update: A certain fiatjaf has added the element to his personal website, which is built entirely from Nostr articles. Multiple other devs also expressed their intent to implement.
Update 2: There is now a pull request for documenting this approach in two existing NIPs. Your feedback is welcome there.
-
@ 5ea46480:450da5bd
2025-06-18 08:31:11When considering the concept of "smart clients and dumb relays," it is crucial to clearly define what "smart" and "dumb" represent in this context. The term "dumb" does not imply that relays lack control, complexity, or sophisticated policies regarding storage and distribution. Relays actively select what information to store, how long they store it, and under what conditions they provide access. Their decisions may differ significantly, allowing specialization that enriches the ecosystem.
Instead, the "dumb" attribute specifically describes the simplicity and universality of queries that relays support. Dumb relays provide a standardized interface rather than specialized queries serving individual client needs. This simplicity ensures interoperability; a client can interact with any relay without compatibility issues. The client side is "smart," equipped with all the logic necessary for determining what data to request, where to find it, how to interpret and present it. The client is responsible for the complexity and specificity of interactions.
This paradigm achieves clear separation; relays generalize data delivery, while clients handle intelligent interpretation and functionality. As a result, users remain free to switch between different clients, confident that basic connections remain intact across a diverse relay landscape. Differences in relay behavior—such as acceptance criteria or data availability—do not compromise this fundamental interoperability. Rather, its the interoperability that allows relays freedom from any obligation to represent a global network viewpoint.
Therefore, maintaining a simple relay query interface preserves interoperability, encourages client diversity, and allows relays to specialize according to their own preferences and policies. This setup captures the complementary principles behind smart clients and dumb relays.
-
@ 866e0139:6a9334e5
2025-06-18 06:09:20Autor: Mathias Bröckers. Dieser Beitrag wurde mit dem Pareto-Client geschrieben und erschien zuerst auf dem Blog des Autors. Sie finden alle Texte der Friedenstaube und weitere Texte zum Thema Frieden hier.**
Die neuesten Pareto-Artikel finden Sie in unserem Telegram-Kanal.
Die neuesten Artikel der Friedenstaube gibt es jetzt auch im eigenen Friedenstaube-Telegram-Kanal.
Im September 2001 fiel dem gerade pensionierten Vier-Sterne-General Wesley Clark, der bis 2000 die NATO-Streitkräfte in Europa befehligt hatte, der Unterkiefer nach unten, als er kurz nach den Anschlägen das Pentagon besuchte und ein alter Kollege aus dem »Joint Chiefs Of Staff« ihn in sein Zimmer zog:
»Ich habe gerade diesen Merkzettel aus dem Büro des Verteidigungsministers bekommen, und hier steht, wir werden sieben Länder angreifen und deren Regierungen innerhalb von fünf Jahren stürzen. Wir werden mit dem Irak beginnen und dann nehmen wir uns Syrien, Libanon, Libyen, Somalia, den Sudan und den Iran vor, sieben Länder in fünf Jahren.«
Dass der ehrgeizige Zeitplan durchaus ins Stocken geraten könnte, hatte Bushs Vize Dick Cheney mit seiner Ankündigung klar gemacht, dass „dieser Krieg länger als eine Generation dauern wird“. 9/11 hatte dem neo-konservativen „Project New American Century“ (PNAC) das „katalysierende Ereignis“ geliefert, das dieser Think-Tank mit vielen Mitgliedern der Bush-Regierung 1999 als erforderlich angesehen hatte, um massive militärische Aufrüstung für eine globale „Full Spectrum Dominance“ durchzusetzen.
Nach dem Abhandenkommen des Großfeinds Sowjetunion drohten dem militärisch-industriellen Komplex erhebliche Umsatzeinbußen, die ohne eine neue Großbedrohung nicht wettzumachen waren. Bushs massive Aufrüstung bis 2009 wurde dann von seinen Nachfolgern noch einmal verdoppelt. Diese Anstrengungen im sogenannten „War On Terror“ haben seitdem Millionen Menschen das Leben gekostet oder in die Flucht getrieben und zahlreiche Länder verwüstet. Mit der Bombardierung des Iran am Wochenende nun wurde das “Sahnehäubchen” in diesem Eroberungsplan des US-Imperiums in Angriff genommen.
Dabei werden wie im Krieg gegen Irak angebliche “Massenvernichtungswaffen” als Begründung propagiert, die freilich in Teheran genauso wenig vorhanden sind wie 2002/2003 in Bagdad. Was Englands Tony Blair seinerzeit aber nicht von der Behauptung abhielt, sie könnten “in 45 Minuten” London erreichen und Europa erfolgreich zur Unterstützung des Kriegs zu treiben. So wie Israels Netanyahu und die US-Neocons seit 30 Jahren erzählen, dass iranische Atomwaffen in 3 Jahren…/3 Monaten/…3 Tagen einsatzbereit wären und man das Land deshalb “präventiv” angreifen müsse. Dazu schreibt der Nahost-Korrespondent und Pulitzer-Preisträger Chris Hedges :
"Warum also in den Krieg mit dem Iran ziehen? Warum aus einem Atomabkommen aussteigen, gegen das der Iran nicht verstoßen hat? Warum eine Regierung dämonisieren, die der Todfeind der Taliban ist, zusammen mit anderen Takfiri-Gruppen, einschließlich Al-Qaida und Islamischer Staat in der Levante (ISIL)? Warum eine Region weiter destabilisieren, die bereits gefährlich instabil ist?Die Generäle, Politiker, Geheimdienste, Neocons, Waffenhersteller, so genannten Experten, prominenten Experten und israelischen Lobbyisten wollen nicht die Schuld für zwei Jahrzehnte militärischer Fiaskos auf sich nehmen. Sie brauchen einen Sündenbock. Das ist der Iran.
Die demütigenden Niederlagen in Afghanistan und im Irak, die gescheiterten Staaten Syrien und Libyen, die Ausbreitung extremistischer Gruppen und Milizen, von denen viele ursprünglich von den USA ausgebildet und bewaffnet wurden, sowie die anhaltenden weltweiten Terroranschläge, müssen die Schuld eines anderen sein.Das Chaos und die Instabilität, die wir vor allem im Irak und in Afghanistan ausgelöst haben, haben dazu geführt, dass der Iran das dominierende Land in der Region ist. Washington hat seinen Erzfeind gestärkt. Es hat keine Ahnung, wie es das rückgängig machen kann, außer es anzugreifen.
Das Völkerrecht und die Rechte von fast 90 Millionen Menschen im Iran werden ignoriert, genauso wie die Rechte der Menschen in Afghanistan, Irak, Libyen, Jemen und Syrien ignoriert wurden. Die Iraner sehen die Vereinigten Staaten nicht als Verbündete oder Befreier an, egal was sie von ihrer Führung halten. Sie wollen nicht angegriffen oder besetzt werden. Sie werden Widerstand leisten. Und die USA und Israel werden dafür bezahlen."
Der Zahltag ist schon gekommen, die ersten Wohngebiete in Tel Aviv sehen bereits aus wie in Gaza, auch in vielen anderen Städten schlugen Raketen ein, der viel gepriesene “Iron Dome”, Israels Luftabwehrschild, ist ein Papiertiger und gegen die iranischen Raketen weitgehend machtlos, wie der Einschlag von zwei hypersonischen Raketen in einem Kraftwerk in Haifa zeigt. Die am Freitag vermutlich per Sabotage ausgeschaltete iranische Luftabwehr war nach 8 Stunden wieder in Takt und meldete den Abschuss von mittlerweile drei israelischen F-35-Jets. Über Teheran war es in der Nacht zum Montag weitgehend ruhig, während es in Israel überall Drohnen und Bomben hagelte und der iranische Revolutionsrat mitteilte, dass diese Angriffe unvermindert weitergehen werden. Da der Iran über 20.000 Cruise Missiles verfügt ist das keine leere Drohung. Auch wenn Israel mit seinem unprovozierten Angriff weiterhin großen Schaden im Iran anrichten kann, sind die Gegenschläge weitaus effektiver, denn der Iran ist fast so groß wie ganz West-Europa, Israel inklusive der besetzten Gebiete hingegen kaum größer als Hessen. Und so geht der große zionistische Jammer schon nach drei Tagen los, fliegender Kostümwechsel vom Täter zum Opfer, vom Völkermörder zum Unschuldslamm, nach bewährter Dramaturgie: “There`s No Business Like Shoa-Business”.\ \ Wie weit sich Donald Trump weiter in das Drama hineinziehen lässt, ist im Moment noch unklar. Aktuell könnte er sich noch mit der Ausrede “Ich habe Bibi davor gewarnt anzugreifen, aber er wollte nicht hören” aus der Affäre ziehen, wenn aber jetzt US-Flugzeugträger und NATO-Tankflugzeuge anrücken, um Israels Angriffskrieg zu unterstützen, ist es sein Krieg. Und der zweite, den er militärisch nicht gewinnen kann. Die tapferen Houthis im Jemen konnten die USS “Eisenhower” mit ihren Drohnen nur aus dem Roten Meer verjagen, die iranische “Fattah-2” indessen könnte solch ein Dickschiff mit einem Schlag versenken. Und dann?
USA und NATOstan haben keine zwei Millionen Truppen für eine Invasion des Iran parat und Israel kann seine “Samson-Option” – einen Nuklearschlag – nur um dem Preis des eigenen Untergangs wählen, denn Pakistan hat für diesen Fall bereits zugesichert, dem iranischen Nachbarn mit einem nuklearen Gegenschlag beizustehen. Also bleibt nur, einen regime change mit Raketen auf die Zivilbevölkerung Teherans herbei zu bomben – wie in Beirut versucht, allerdings mit dem Unterschied, dass man es aufgrund der iranischen Verteidigungs-und Angriffsfähigkeit mit einem Gegner auf Augenhöhe zu tun hat, der zudem mit Russland und China zwei Supermächte im Rücken hat. Und einem Abnutzungskrieg weitaus gelassener entgegensehen kann als Israel, das weiter auf Teheran feuert und weiter von iranischen Raketen getroffen wird.
https://x.com/jacksonhinklle/status/1934355463920873736
Kann Trump wie gegen Russland “bis zum letzten Ukrainer” nun im nächsten Proxy-Krieg bis zum letzten Israeli kämpfen lassen, ohne aktiv einzugreifen? Oder hat er die vor der Pensionierung stehende USS Nimitz Richtung Israel geschickt, um sie als Protagonisten für ein neues Pearl Harbor zum Abschuss freizugeben – durch Israel für eine “false flag”? – und dann TV-gerecht in einen “full blown war” gegen ein “Terrorregime” mit “Massenvernichtungswaffen” einzusteigen?\ Wo Psychopathen agieren, wie der fanatische Führer eines Schurkenstaats und der schizoide “Heute Will Ich Frieden/Morgen Will Ich Krieg”-Rumpelstilzchen-Herrscher eines niedergehenden Imperiums, sind rationale Prognosen schwierig. Iran scheint, ähnlich wie Russland, auf die Provokation nicht mit einem Donnerschlag zu reagieren, sondern mit fortgesetzten Nadelstichen auf Demilitarisierung des Gegners zu setzen – denn es ist nur eine Frage von Tagen oder Wochen, bis diesem die Abwehrraketen ausgehen. Was Netanjahu heute den Bürgern Teherans empfahl – sich gegen ihre Regierung zu erheben – wird ihm dann eher selbst geschehen, und auch Trump kann einen weiteren ungewinnbaren Krieg politisch nicht überleben.
Das Jahrtausende alte persische Reich gilt historisch als Friedhof der Imperien, seit Alexander dem Großen haben sich alle Kolonisatoren die Zähne daran ausgebissen, das Volk der Perser zu unterwerfen. Zuletzt hatte es das anglo-amerikanische Imperium 1953 versucht, als man den demokratischen Präsidenten durch den Marionetten-Diktator Reza Pahlevi ersetzte, der aber 1979 (samt BP, Chevron & Co.) von der islamischen Revolution wieder verjagt wurde. Seit damit der Ölreichtum des Landes wieder der Bevölkerung zu Gute kommt stehen die politischen und religiösen Führer ganz oben auf den Abschusslisten von CIA, MI6 und Mossad, Regime change im Iran ist seit 30 Jahren der feuchte Traum der US-Neocons, von denen einige wie “The Onion” meldet, nach Israels Überraschungsangriff wegen Dauererrektion im Krankenhaus behandelt werden mussten. Wenn der wahnsinnige Traum aber mit der Realität kollidiert und eskaliert – mit einem Hiroshima hoch x im Mittleren Osten – wird Persien einmal mehr zum Friedhof für imperiale Eroberer.
DIE FRIEDENSTAUBE FLIEGT AUCH IN IHR POSTFACH!
Hier können Sie die Friedenstaube abonnieren und bekommen die Artikel zugesandt, vorerst für alle kostenfrei, wir starten gänzlich ohne Paywall. (Die Bezahlabos fangen erst zu laufen an, wenn ein Monetarisierungskonzept für die Inhalte steht). Sie wollen der Genossenschaft beitreten oder uns unterstützen? Mehr Infos hier oder am Ende des Textes.
Sie schreiben und haben etwas zum Frieden zu sagen? Melden Sie sich gerne: friedenstaube@pareto.space
Der “Shock & Awe”-Überaschungsangriff Israels hat nicht dazu geführt, dass die Iraner gegen ihre Regierung aufstehen oder gar den im Exil lebenden Sohn des Ex-Diktators Pahlevi als Marionette zurück wünschen, sondern im Gegenteil zu allgemeiner Unterstützung der Bevölkerung; geschockt und erschrocken sind dagegen die Israelis über die permanent einschlagenden Raketen. Bei den ersten Gegenschlägen hatte der Iran noch eher altes Material zum Einsatz gebracht, von dem ein großer Teil von der Luftverteidigung abgefangen werden konnte, am Dienstag aber schlugen bereits 5 Raketen in Tel Aviv ein, am helllichten Tag, auch das Mossad Hauptquartier scheint getroffen worden zu sein.
Und was empfiehlt der Schizo-Commander in Chief? Teheran (12 Mio. Einwohner) evakuieren! Denn: “Iran cannot have a nuclear weapon!” Dass Iran solche Waffen gar nicht hat und auch nicht produziert, hatte Geheimdienstdirektorin Tulsi Gabbard zuletzt Ende März bekannt gegeben, was Generalisimo Donald jetzt aber vergessen hat und zusammen mit Herodes 2.0 aka “Bibi Satanjahu” im Heiligen Land auf dem Highway To Hell durchstartet…
Mathias Bröckers, Jahrgang 1954, ist Autor und freier Journalist. Er gehörte zur Gründergeneration der taz, war dort bis 1991 Kultur- und Wissenschaftsredakteur und veröffentlichte seit 1980 rund 600 Beiträge für verschiedene Tageszeitungen, Wochen- und Monatszeitschriften, vor allem in den Bereichen Kultur, Wissenschaft und Politik. Neben seiner weiteren Tätigkeit als Rundfunkautor veröffentlichte Mathias Bröckers zahlreiche Bücher. Besonders bekannt wurden seine internationalen Bestseller „Die Wiederentdeckung der Nutzpflanze Hanf“ (1993), „Verschwörungen, Verschwörungstheorien und die Geheimnisse des 11.9.“ (2002) und „Wir sind immer die Guten – Ansichten eines Putinverstehers“ (2016, mit Paul Schreyer) sowie "Mythos 9/11 - Die Bilanz eines Jahrhundertverbrechens" (2021). Mathias Bröckers lebt in Berlin und Zürich und bloggt auf broeckers.com.
Sein aktuelles Buch "Inspiration, Konspiration, Evolution – Gesammelte Essays und Berichte aus dem Überall" – hier im Handel.
LASSEN SIE DER FRIEDENSTAUBE FLÜGEL WACHSEN!
Hier können Sie die Friedenstaube abonnieren und bekommen die Artikel zugesandt.
Schon jetzt können Sie uns unterstützen:
- Für 50 CHF/EURO bekommen Sie ein Jahresabo der Friedenstaube.
- Für 120 CHF/EURO bekommen Sie ein Jahresabo und ein T-Shirt/Hoodie mit der Friedenstaube.
- Für 500 CHF/EURO werden Sie Förderer und bekommen ein lebenslanges Abo sowie ein T-Shirt/Hoodie mit der Friedenstaube.
- Ab 1000 CHF werden Sie Genossenschafter der Friedenstaube mit Stimmrecht (und bekommen lebenslanges Abo, T-Shirt/Hoodie).
Für Einzahlungen in CHF (Betreff: Friedenstaube):
Für Einzahlungen in Euro:
Milosz Matuschek
IBAN DE 53710520500000814137
BYLADEM1TST
Sparkasse Traunstein-Trostberg
Betreff: Friedenstaube
Wenn Sie auf anderem Wege beitragen wollen, schreiben Sie die Friedenstaube an: friedenstaube@pareto.space
Sie sind noch nicht auf Nostr and wollen die volle Erfahrung machen (liken, kommentieren etc.)? Zappen können Sie den Autor auch ohne Nostr-Profil! Erstellen Sie sich einen Account auf Start. Weitere Onboarding-Leitfäden gibt es im Pareto-Wiki.
-
@ c1e9ab3a:9cb56b43
2025-04-14 21:20:08In an age where culture often precedes policy, a subtle yet potent mechanism may be at play in the shaping of American perspectives on gun ownership. Rather than directly challenging the Second Amendment through legislation alone, a more insidious strategy may involve reshaping the cultural and social norms surrounding firearms—by conditioning the population, starting at its most impressionable point: the public school system.
The Cultural Lever of Language
Unlike Orwell's 1984, where language is controlled by removing words from the lexicon, this modern approach may hinge instead on instilling fear around specific words or topics—guns, firearms, and self-defense among them. The goal is not to erase the language but to embed a taboo so deep that people voluntarily avoid these terms out of social self-preservation. Children, teachers, and parents begin to internalize a fear of even mentioning weapons, not because the words are illegal, but because the cultural consequences are severe.
The Role of Teachers in Social Programming
Teachers, particularly in primary and middle schools, serve not only as educational authorities but also as social regulators. The frequent argument against homeschooling—that children will not be "properly socialized"—reveals an implicit understanding that schools play a critical role in setting behavioral norms. Children learn what is acceptable not just academically but socially. Rules, discipline, and behavioral expectations are laid down by teachers, often reinforced through peer pressure and institutional authority.
This places teachers in a unique position of influence. If fear is instilled in these educators—fear that one of their students could become the next school shooter—their response is likely to lean toward overcorrection. That overcorrection may manifest as a total intolerance for any conversation about weapons, regardless of the context. Innocent remarks or imaginative stories from young children are interpreted as red flags, triggering intervention from administrators and warnings to parents.
Fear as a Policy Catalyst
School shootings, such as the one at Columbine, serve as the fulcrum for this fear-based conditioning. Each highly publicized tragedy becomes a national spectacle, not only for mourning but also for cementing the idea that any child could become a threat. Media cycles perpetuate this narrative with relentless coverage and emotional appeals, ensuring that each incident becomes embedded in the public consciousness.
The side effect of this focus is the generation of copycat behavior, which, in turn, justifies further media attention and tighter controls. Schools install security systems, metal detectors, and armed guards—not simply to stop violence, but to serve as a daily reminder to children and staff alike: guns are dangerous, ubiquitous, and potentially present at any moment. This daily ritual reinforces the idea that the very discussion of firearms is a precursor to violence.
Policy and Practice: The Zero-Tolerance Feedback Loop
Federal and district-level policies begin to reflect this cultural shift. A child mentioning a gun in class—even in a non-threatening or imaginative context—is flagged for intervention. Zero-tolerance rules leave no room for context or intent. Teachers and administrators, fearing for their careers or safety, comply eagerly with these guidelines, interpreting them as moral obligations rather than bureaucratic policies.
The result is a generation of students conditioned to associate firearms with social ostracism, disciplinary action, and latent danger. The Second Amendment, once seen as a cultural cornerstone of American liberty and self-reliance, is transformed into an artifact of suspicion and anxiety.
Long-Term Consequences: A Nation Re-Socialized
Over time, this fear-based reshaping of discourse creates adults who not only avoid discussing guns but view them as morally reprehensible. Their aversion is not grounded in legal logic or political philosophy, but in deeply embedded emotional programming begun in early childhood. The cultural weight against firearms becomes so great that even those inclined to support gun rights feel the need to self-censor.
As fewer people grow up discussing, learning about, or responsibly handling firearms, the social understanding of the Second Amendment erodes. Without cultural reinforcement, its value becomes abstract and its defenders marginalized. In this way, the right to bear arms is not abolished by law—it is dismantled by language, fear, and the subtle recalibration of social norms.
Conclusion
This theoretical strategy does not require a single change to the Constitution. It relies instead on the long game of cultural transformation, beginning with the youngest minds and reinforced by fear-driven policy and media narratives. The outcome is a society that views the Second Amendment not as a safeguard of liberty, but as an anachronism too dangerous to mention.
By controlling the language through social consequences and fear, a nation can be taught not just to disarm, but to believe it chose to do so freely. That, perhaps, is the most powerful form of control of all.
-
@ 7f6db517:a4931eda
2025-06-18 06:01:43Bank run on every crypto bank then bank run on every "real" bank.
— ODELL (@ODELL) December 14, 2022
The four main banks of bitcoin and “crypto” are Signature, Prime Trust, Silvergate, and Silicon Valley Bank. Prime Trust does not custody funds themselves but rather maintains deposit accounts at BMO Harris Bank, Cross River, Lexicon Bank, MVB Bank, and Signature Bank. Silvergate and Silicon Valley Bank have already stopped withdrawals. More banks will go down before the chaos stops. None of them have sufficient reserves to meet withdrawals.
Bitcoin gives us all the ability to opt out of a system that has massive layers of counterparty risk built in, years of cheap money and broken incentives have layered risk on top of risk throughout the entire global economy. If you thought the FTX bank run was painful to watch, I have bad news for you: every major bank in the world is fractional reserve. Bitcoin held in self custody is unique in its lack of counterparty risk, as global market chaos unwinds this will become much more obvious.
The rules of bitcoin are extremely hard to change by design. Anyone can access the network directly without a trusted third party by using their own node. Owning more bitcoin does not give you more control over the network with all participants on equal footing.
Bitcoin is:
- money that is not controlled by a company or government
- money that can be spent or saved without permission
- money that is provably scarce and should increase in purchasing power with adoptionBitcoin is money without trust. Whether you are a nation state, corporation, or an individual, you can use bitcoin to spend or save without permission. Social media will accelerate the already deteriorating trust in our institutions and as this trust continues to crumble the value of trust minimized money will become obvious. As adoption increases so should the purchasing power of bitcoin.
A quick note on "stablecoins," such as USDC - it is important to remember that they rely on trusted custodians. They have the same risk as funds held directly in bank accounts with additional counterparty risk on top. The trusted custodians can be pressured by gov, exit scam, or caught up in fraud. Funds can and will be frozen at will. This is a distinctly different trust model than bitcoin, which is a native bearer token that does not rely on any centralized entity or custodian.
Most bitcoin exchanges have exposure to these failing banks. Expect more chaos and confusion as this all unwinds. Withdraw any bitcoin to your own wallet ASAP.
Simple Self Custody Guide: https://werunbtc.com/muun
More Secure Cold Storage Guide: https://werunbtc.com/coldcard
If you found this post helpful support my work with bitcoin.
-
@ 1f79058c:eb86e1cb
2025-04-26 13:53:50I'm currently using this bash script to publish long-form content from local Markdown files to Nostr relays.
It requires all of
yq
,jq
, andnak
to be installed.Usage
Create a signed Nostr event and print it to the console:
bash markdown_to_nostr.sh article-filename.md
Create a Nostr event and publish it to one or more relays:
bash markdown_to_nostr.sh article-filename.md ws://localhost:7777 wss://nostr.kosmos.org
Markdown format
You can specify your metadata as YAML in a Front Matter header. Here's an example file:
```markdown
title: "Good Morning" summary: "It's a beautiful day" image: https://example.com/i/beautiful-day.jpg date: 2025-04-24T15:00:00Z tags: gm, poetry published: false
In the blue sky just a few specks of gray
In the evening of a beautiful day
Though last night it rained and more rain on the way
And that more rain is needed 'twould be fair to say.— Francis Duggan ```
The metadata keys are mostly self-explanatory. Note:
- All keys except for
title
are optional date
, if present, will be set as thepublished_at
date.- If
published
is set totrue
, it will publish a kind 30023 event, otherwise a kind 30024 (draft) - The
d
tag (widely used as URL slug for the article) will be the filename without the.md
extension
- All keys except for
-
@ eb0157af:77ab6c55
2025-06-18 05:01:12The banking giant is exploring an expansion of its blockchain services, focusing on digital payments and currencies.
JPMorgan Chase has filed a new trademark application for the name “JPMD.” The filing was submitted on June 15 to the United States Patent and Trademark Office (USPTO).
The application, filed by JPMorgan Chase Bank, N.A., covers a broad range of services related to digital assets and blockchain technology. These include the issuance of digital currencies, electronic payment processing, and financial custody services — all of which suggest a possible new stablecoin initiative for JPMorgan.
Experience with JPM Coin
This move wouldn’t be JPMorgan’s first foray into blockchain-based finance. The bank already operates JPM Coin, a dollar-pegged stablecoin used to enable instant transactions between institutional clients. The token runs on Quorum, a private blockchain network developed in-house by JPMorgan and based on Ethereum’s technology.
The registration of the JPMD trademark comes as JPMorgan and other major U.S. banks are considering a collaborative stablecoin project through their jointly owned entities: Early Warning Services and The Clearing House.
Similarly, corporations like Walmart and Amazon are mulling the creation of their own stablecoins.
The post JPMorgan files trademark for ‘JPMD’: a new stablecoin on the horizon for the American bank appeared first on Atlas21.
-
@ c1e9ab3a:9cb56b43
2025-04-10 02:55:11The United States is on the cusp of a historic technological renaissance, often referred to as the Fourth Industrial Revolution. Artificial intelligence, automation, advanced robotics, quantum computing, biotechnology, and clean manufacturing are converging into a seismic shift that will redefine how we live, work, and relate to one another. But there's a critical catch: this transformation depends entirely on the availability of stable, abundant, and inexpensive electricity.
Why Electricity is the Keystone of Innovation
Let’s start with something basic but often overlooked. Every industrial revolution has had an energy driver:
- The First rode the steam engine, powered by coal.
- The Second was electrified through centralized power plants.
- The Third harnessed computing and the internet.
- The Fourth will demand energy on a scale and reliability never seen before.
Imagine a city where thousands of small factories run 24/7 with robotics and AI doing precision manufacturing. Imagine a national network of autonomous vehicles, delivery drones, urban vertical farms, and high-bandwidth communication systems. All of this requires uninterrupted and inexpensive power.
Without it? Costs balloon. Innovation stalls. Investment leaves. And America risks becoming a second-tier economic power in a multipolar world.
So here’s the thesis: If we want to lead the Fourth Industrial Revolution, we must first lead in energy. And nuclear — specifically Gen IV Small Modular Reactors (SMRs) — must be part of that leadership.
The Nuclear Case: Clean, Scalable, Strategic
Let’s debunk the myth: nuclear is not the boogeyman of the 1970s. It’s one of the safest, cleanest, and most energy-dense sources we have.
But traditional nuclear has problems:
- Too expensive to build.
- Too long to license.
- Too bespoke and complex.
Enter Gen IV SMRs:
- Factory-built and transportable.
- Passively safe with walk-away safety designs.
- Scalable in 50–300 MWe increments.
- Ideal for remote areas, industrial parks, and military bases.
But even SMRs will struggle under the current regulatory, economic, and manufacturing ecosystem. To unlock their potential, we need a new national approach.
The Argument for National Strategy
Let’s paint a vision:
SMRs deployed at military bases across the country, secured by trained personnel, powering critical infrastructure, and feeding clean, carbon-free power back into surrounding communities.
SMRs operated by public chartered utilities—not for Wall Street profits, but for stability, security, and public good.
SMRs manufactured by a competitive ecosystem of certified vendors, just like aircraft or medical devices, with standard parts and rapid regulatory approval.
This isn't science fiction. It's a plausible, powerful model. Here’s how we do it.
Step 1: Treat SMRs as a National Security Asset
Why does the Department of Defense spend billions to secure oil convoys and build fuel depots across the world, but not invest in nuclear microgrids that would make forward bases self-sufficient for decades?
Nuclear power is inherently a strategic asset:
- Immune to price shocks.
- Hard to sabotage.
- Decades of stable power from a small footprint.
It’s time to reframe SMRs from an energy project to a national security platform. That changes everything.
Step 2: Create Public-Chartered Operating Companies
We don’t need another corporate monopoly or Wall Street scheme. Instead, let’s charter SMR utilities the way we chartered the TVA or the Postal Service:
- Low-margin, mission-oriented.
- Publicly accountable.
- Able to sign long-term contracts with DOD, DOE, or regional utilities.
These organizations won’t chase quarterly profits. They’ll chase uptime, grid stability, and national resilience.
Step 3: Build a Competitive SMR Industry Like Aerospace
Imagine multiple manufacturers building SMRs to common, certified standards. Components sourced from a wide supplier base. Designs evolving year over year, with upgrades like software and avionics do.
This is how we build:
- Safer reactors
- Cheaper units
- Modular designs
- A real export industry
Airplanes are safe, affordable, and efficient because of scale and standardization. We can do the same with reactors.
Step 4: Anchor SMRs to the Coming Fourth Industrial Revolution
AI, robotics, and distributed manufacturing don’t need fossil fuels. They need cheap, clean, continuous electricity.
- AI datacenters
- Robotic agriculture
- Carbon-free steel and cement
- Direct air capture
- Electric industrial transport
SMRs enable this future. And they decentralize power, both literally and economically. That means jobs in every region, not just coastal tech hubs.
Step 5: Pair Energy Sovereignty with Economic Reform
Here’s the big leap: what if this new energy architecture was tied to a transparent, auditable, and sovereign monetary system?
- Public utilities priced in a new digital dollar.
- Trade policy balanced by low-carbon energy exports.
- Public accounting verified with open ledgers.
This is not just national security. It’s monetary resilience.
The world is moving to multi-polar trade systems. Energy exports and energy reliability will define economic influence. If America leads with SMRs, we lead the conversation.
Conclusion: A Moral and Strategic Imperative
We can either:
- Let outdated fears and bureaucracy stall the future, or...
- Build the infrastructure for clean, secure, and sovereign prosperity.
We have the designs.
We have the talent.
We have the need.What we need now is will.
The Fourth Industrial Revolution will either be powered by us—or by someone else. Let’s make sure America leads. And let’s do it with SMRs, public charter, competitive industry, and national purpose.
It’s time.
This is a call to engineers, legislators, veterans, economists, and every American who believes in building again. SMRs are not just about power. They are about sovereignty, security, and shared prosperity.
Further reading:
nostr:naddr1qqgrjv33xenx2drpve3kxvrp8quxgqgcwaehxw309anxjmr5v4ezumn0wd68ytnhd9hx2tczyrq7n2e62632km9yh6l5f6nykt76gzkxxy0gs6agddr9y95uk445xqcyqqq823cdzc99s
-
@ c1e9ab3a:9cb56b43
2025-06-15 00:36:391. Introduction
The 21st century is marked by a rare confluence of demographic, technological, and monetary regime shifts. As birth rates fall below replacement levels across advanced and many emerging economies, global population growth slows and begins to reverse. At the same time, automation, AI, and robotics are increasing productivity at an accelerating pace. Simultaneously, trust in central banks and fiat currencies is waning, giving rise to calls for a return to hard currencies (e.g., gold, Bitcoin) and decentralized monetary systems.
These trends pose stark challenges to existing economic theories and institutions. This paper explores their implications through two opposing lenses: Keynesian economics and Austrian (Misesian) economics.
2. The Keynesian Reaction: Deflation, Demand Collapse, and the Paradox of Thrift
2.1. Demand-Side Fragility in a Shrinking Population
Keynesian theory is rooted in the principle that aggregate demand drives output and employment. A declining population implies a falling consumption base, which directly reduces aggregate demand. Combined with increased longevity, this trend leads to a larger retired population disinclined to spend, creating persistent demand shortfalls.
2.2. Technological Unemployment and Reduced Income Velocity
Rapid productivity gains from AI and robotics may displace large segments of labor, leading to unemployment or underemployment. With fewer wage earners and heightened uncertainty, consumption slows further. Even if goods become cheaper, widespread income insecurity constrains the ability to buy them.
2.3. The Paradox of Thrift
In times of uncertainty, both individuals and businesses tend to save more. Keynes argued that if everyone saves, aggregate demand collapses because one person’s spending is another’s income. Thus, increased saving leads to lower incomes, which reduces saving in aggregate—a self-reinforcing contraction.
2.4. Retreat from Fiat and Central Banking: A Catastrophic Constraint
Abandoning fiat currency and central banking removes the government’s ability to perform countercyclical policy. Interest rates cannot be lowered below zero; money supply cannot be expanded to fill demand gaps. In such a regime, deflation becomes chronic, debt burdens rise in real terms, and recovery mechanisms are neutered.
Conclusion (Keynesian):
The combined effect of declining population, rising productivity, and a hard money transition is catastrophic. It leads to a deflationary spiral, mass unemployment, debt crises, and secular stagnation unless aggressively offset by expansive fiscal and monetary policy—tools unavailable in a hard currency system.
3. The Misesian Rebuttal: Market Coordination and the Natural Order of Decline
3.1. Savings as Capital Formation
Mises and the Austrian School reject the paradox of thrift. Savings are not lost demand; they are deferred consumption that funds capital investment. Increased saving, in a free market, lowers interest rates and reallocates resources toward longer-term, higher-order production.
3.2. Deflation as a Signal of Progress
Falling prices due to productivity gains are not a crisis but a benefit. Consumers gain real wealth. Entrepreneurs adjust cost structures. As long as wages and prices are flexible, deflation reflects abundance, not failure.
3.3. Population Decline as Economic Recalibration
A shrinking population reduces demand, yes—but it also reduces the labor supply. Wages rise in real terms. Capital intensity per worker increases. There is no systemic unemployment if labor markets are free and responsive.
3.4. Hard Currency as Restoration of Market Coordination
Transitioning to a hard currency purges fiat-induced malinvestment and restores the price mechanism. With no artificial credit expansion, capital is allocated based on real savings. Booms and busts are mitigated, and long-term planning becomes reliable.
Conclusion (Misesian):
There is no crisis. A hard currency, high-productivity, low-population economy stabilizes at a new equilibrium of lower consumption, higher capital intensity, and rising real wealth. Deflation is natural. Savings are the seed of future prosperity. Government interference, not market adaptation, is the threat.
4. Final Synthesis
The Keynesian and Misesian views diverge on first principles: Keynes sees demand shortfalls and rigidities requiring top-down correction, while Mises sees market-coordinated adaptation as sufficient and self-correcting. As the 21st century evolves, this ideological conflict will shape whether the transition leads to depression or renewal.
References
- Keynes, J.M. The General Theory of Employment, Interest and Money
- Mises, L. Human Action
- Hayek, F.A. Prices and Production
- Böhm-Bawerk, E. Capital and Interest
- Friedman, M. A Program for Monetary Stability
-
@ dd664d5e:5633d319
2025-06-14 07:24:03The importance of being lindy
I've been thinking about what Vitor said about #Amethyst living on extended time. And thinking. And doing a bit more thinking...
It's a valid point. Why does Amethyst (or, analog, #Damus) still exist? Why is it as popular as it is? Shouldn't they be quickly washed-away by power-funded corporate offerings or highly-polished, blackbox-coded apps?
Because a lot of people trust them to read the code, that's why. The same way that they trust Michael to read it and they trust me to test it. And, perhaps more importantly, they trust us to not deliver corrupted code. Intentionally, or inadvertently.
The developer's main job will not be coding the commit, it will be reviewing and approving the PR.
As AI -- which all developers now use, to some extent, if they are planning on remaining in the business -- becomes more efficient and effective at writing the code, the effort shifts to evaluating and curating what it writes. That makes software code a commodity, and commodities are rated according to brand.
Most of us don't want to make our own shampoo, for instance. Rather, we go to the store and select the brand that we're used to. We have learned, over the years, that this brand won't kill us and does the job we expect it to do. Offloading the decision of Which shampoo? to a brand is worth some of our time and money, which is why strong, reliable brands can charge a premium and are difficult to dislodge.
Even people, like myself, who can read the code from many common programming languages, do not have the time, energy, or interest to read through thousands of lines of Kotlin, Golang, or Typescript or -- God forbid -- C++, from repos we are not actively working on. And asking AI to analyze the code for you leaves you trusting the AI to have a conscience and be virtuous, and may you have fun with that.
The software is no longer the brand. The feature set alone isn't enough. And the manner in which it is written, or the tools it was written with, are largely irrelevant. The thing that matters most is Who approved this version?
The Era of Software Judges has arrived
And that has always been the thing that mattered most, really.
That's why software inertia is a real thing and that's why it's going to still be worth it to train up junior devs. Those devs will be trained up to be moral actors, specializing in reviewing and testing code and confirming its adherance to the project's ethical standards. Because those standards aren't universal; they're nuanced and edge cases will need to be carefully weighed and judged and evaluated and analysed. It will not be enough to add Don't be evil. to the command prompt and call it a day.
So, we shall need judges and advocates, and we must train them up, in the way they shall go.
-
@ dfa02707:41ca50e3
2025-06-15 23:02:35Good morning (good night?)! The No Bullshit Bitcoin news feed is now available on Moody's Dashboard! A huge shoutout to sir Clark Moody for integrating our feed.
Headlines
- Spiral welcomes Ben Carman. The developer will work on the LDK server and a new SDK designed to simplify the onboarding process for new self-custodial Bitcoin users.
- The Bitcoin Dev Kit Foundation announced new corporate members for 2025, including AnchorWatch, CleanSpark, and Proton Foundation. The annual dues from these corporate members fund the small team of open-source developers responsible for maintaining the core BDK libraries and related free and open-source software (FOSS) projects.
- Strategy increases Bitcoin holdings to 538,200 BTC. In the latest purchase, the company has spent more than $555M to buy 6,556 coins through proceeds of two at-the-market stock offering programs.
- Spar supermarket experiments with Bitcoin payments in Zug, Switzerland. The store has introduced a new payment method powered by the Lightning Network. The implementation was facilitated by DFX Swiss, a service that supports seamless conversions between bitcoin and legacy currencies.
- The Bank for International Settlements (BIS) wants to contain 'crypto' risks. A report titled "Cryptocurrencies and Decentralised Finance: Functions and Financial Stability Implications" calls for expanding research into "how new forms of central bank money, capital controls, and taxation policies can counter the risks of widespread crypto adoption while still fostering technological innovation."
- "Global Implications of Scam Centres, Underground Banking, and Illicit Online Marketplaces in Southeast Asia." According to the United Nations Office on Drugs and Crime (UNODC) report, criminal organizations from East and Southeast Asia are swiftly extending their global reach. These groups are moving beyond traditional scams and trafficking, creating sophisticated online networks that include unlicensed cryptocurrency exchanges, encrypted communication platforms, and stablecoins, fueling a massive fraud economy on an industrial scale.
- Slovenia is considering a 25% capital gains tax on Bitcoin profits for individuals. The Ministry of Finance has proposed legislation to impose this tax on gains from cryptocurrency transactions, though exchanging one cryptocurrency for another would remain exempt. At present, individual 'crypto' traders in Slovenia are not taxed.
- Circle, BitGo, Coinbase, and Paxos plan to apply for U.S. bank charters or licenses. According to a report in The Wall Street Journal, major crypto companies are planning to apply for U.S. bank charters or licenses. These firms are pursuing limited licenses that would permit them to issue stablecoins, as the U.S. Congress deliberates on legislation mandating licensing for stablecoin issuers.
"Established banks, like Bank of America, are hoping to amend the current drafts of [stablecoin] legislation in such a way that nonbanks are more heavily restricted from issuing stablecoins," people familiar with the matter told The Block.
- Charles Schwab to launch spot Bitcoin trading by 2026. The financial investment firm, managing over $10 trillion in assets, has revealed plans to introduce spot Bitcoin trading for its clients within the next year.
Use the tools
- Bitcoin Safe v1.2.3 expands QR SignMessage compatibility for all QR-UR-compatible hardware signers (SpecterDIY, KeyStone, Passport, Jade; already supported COLDCARD Q). It also adds the ability to import wallets via QR, ensuring compatibility with Keystone's latest firmware (2.0.6), alongside other improvements.
- Minibits v0.2.2-beta, an ecash wallet for Android devices, packages many changes to align the project with the planned iOS app release. New features and improvements include the ability to lock ecash to a receiver's pubkey, faster confirmations of ecash minting and payments thanks to WebSockets, UI-related fixes, and more.
- Zeus v0.11.0-alpha1 introduces Cashu wallets tied to embedded LND wallets. Navigate to Settings > Ecash to enable it. Other wallet types can still sweep funds from Cashu tokens. Zeus Pay now supports Cashu address types in Zaplocker, Cashu, and NWC modes.
- LNDg v1.10.0, an advanced web interface designed for analyzing Lightning Network Daemon (LND) data and automating node management tasks, introduces performance improvements, adds a new metrics page for unprofitable and stuck channels, and displays warnings for batch openings. The Profit and Loss Chart has been updated to include on-chain costs. Advanced settings have been added for users who would like their channel database size to be read remotely (the default remains local). Additionally, the AutoFees tool now uses aggregated pubkey metrics for multiple channels with the same peer.
- Nunchuk Desktop v1.9.45 release brings the latest bug fixes and improvements.
- Blockstream Green iOS v4.1.8 has renamed L-BTC to LBTC, and improves translations of notifications, login time, and background payments.
- Blockstream Green Android v4.1.8 has added language preference in App Settings and enables an Android data backup option for disaster recovery. Additionally, it fixes issues with Jade entry point PIN timeout and Trezor passphrase input.
- Torq v2.2.2, an advanced Lightning node management software designed to handle large nodes with over 1000 channels, fixes bugs that caused channel balance to not be updated in some cases and channel "peer total local balance" not getting updated.
- Stack Wallet v2.1.12, a multicoin wallet by Cypher Stack, fixes an issue with Xelis introduced in the latest release for Windows.
- ESP-Miner-NerdQAxePlus v1.0.29.1, a forked version from the NerdAxe miner that was modified for use on the NerdQAxe+, is now available.
- Zark enables sending sats to an npub using Bark.
- Erk is a novel variation of the Ark protocol that completely removes the need for user interactivity in rounds, addressing one of Ark's key limitations: the requirement for users to come online before their VTXOs expire.
- Aegis v0.1.1 is now available. It is a Nostr event signer app for iOS devices.
- Nostash is a NIP-07 Nostr signing extension for Safari. It is a fork of Nostore and is maintained by Terry Yiu. Available on iOS TestFlight.
- Amber v3.2.8, a Nostr event signer for Android, delivers the latest fixes and improvements.
- Nostur v1.20.0, a Nostr client for iOS, adds
-
@ 3bf0c63f:aefa459d
2025-04-25 19:26:48Redistributing Git with Nostr
Every time someone tries to "decentralize" Git -- like many projects tried in the past to do it with BitTorrent, IPFS, ScuttleButt or custom p2p protocols -- there is always a lurking comment: "but Git is already distributed!", and then the discussion proceeds to mention some facts about how Git supports multiple remotes and its magic syncing and merging abilities and so on.
Turns out all that is true, Git is indeed all that powerful, and yet GitHub is the big central hub that hosts basically all Git repositories in the giant world of open-source. There are some crazy people that host their stuff elsewhere, but these projects end up not being found by many people, and even when they do they suffer from lack of contributions.
Because everybody has a GitHub account it's easy to open a pull request to a repository of a project you're using if it's on GitHub (to be fair I think it's very annoying to have to clone the repository, then add it as a remote locally, push to it, then go on the web UI and click to open a pull request, then that cloned repository lurks forever in your profile unless you go through 16 screens to delete it -- but people in general seem to think it's easy).
It's much harder to do it on some random other server where some project might be hosted, because now you have to add 4 more even more annoying steps: create an account; pick a password; confirm an email address; setup SSH keys for pushing. (And I'm not even mentioning the basic impossibility of offering
push
access to external unknown contributors to people who want to host their own simple homemade Git server.)At this point some may argue that we could all have accounts on GitLab, or Codeberg or wherever else, then those steps are removed. Besides not being a practical strategy this pseudo solution misses the point of being decentralized (or distributed, who knows) entirely: it's far from the ideal to force everybody to have the double of account management and SSH setup work in order to have the open-source world controlled by two shady companies instead of one.
What we want is to give every person the opportunity to host their own Git server without being ostracized. at the same time we must recognize that most people won't want to host their own servers (not even most open-source programmers!) and give everybody the ability to host their stuff on multi-tenant servers (such as GitHub) too. Importantly, though, if we allow for a random person to have a standalone Git server on a standalone server they host themselves on their wood cabin that also means any new hosting company can show up and start offering Git hosting, with or without new cool features, charging high or low or zero, and be immediately competing against GitHub or GitLab, i.e. we must remove the network-effect centralization pressure.
External contributions
The first problem we have to solve is: how can Bob contribute to Alice's repository without having an account on Alice's server?
SourceHut has reminded GitHub users that Git has always had this (for most) arcane
git send-email
command that is the original way to send patches, using an once-open protocol.Turns out Nostr acts as a quite powerful email replacement and can be used to send text content just like email, therefore patches are a very good fit for Nostr event contents.
Once you get used to it and the proper UIs (or CLIs) are built sending and applying patches to and from others becomes a much easier flow than the intense clickops mixed with terminal copypasting that is interacting with GitHub (you have to clone the repository on GitHub, then update the remote URL in your local directory, then create a branch and then go back and turn that branch into a Pull Request, it's quite tiresome) that many people already dislike so much they went out of their way to build many GitHub CLI tools just so they could comment on issues and approve pull requests from their terminal.
Replacing GitHub features
Aside from being the "hub" that people use to send patches to other people's code (because no one can do the email flow anymore, justifiably), GitHub also has 3 other big features that are not directly related to Git, but that make its network-effect harder to overcome. Luckily Nostr can be used to create a new environment in which these same features are implemented in a more decentralized and healthy way.
Issues: bug reports, feature requests and general discussions
Since the "Issues" GitHub feature is just a bunch of text comments it should be very obvious that Nostr is a perfect fit for it.
I will not even mention the fact that Nostr is much better at threading comments than GitHub (which doesn't do it at all), which can generate much more productive and organized discussions (and you can opt out if you want).
Search
I use GitHub search all the time to find libraries and projects that may do something that I need, and it returns good results almost always. So if people migrated out to other code hosting providers wouldn't we lose it?
The fact is that even though we think everybody is on GitHub that is a globalist falsehood. Some projects are not on GitHub, and if we use only GitHub for search those will be missed. So even if we didn't have a Nostr Git alternative it would still be necessary to create a search engine that incorporated GitLab, Codeberg, SourceHut and whatnot.
Turns out on Nostr we can make that quite easy by not forcing anyone to integrate custom APIs or hardcoding Git provider URLs: each repository can make itself available by publishing an "announcement" event with a brief description and one or more Git URLs. That makes it easy for a search engine to index them -- and even automatically download the code and index the code (or index just README files or whatever) without a centralized platform ever having to be involved.
The relays where such announcements will be available play a role, of course, but that isn't a bad role: each announcement can be in multiple relays known for storing "public good" projects, some relays may curate only projects known to be very good according to some standards, other relays may allow any kind of garbage, which wouldn't make them good for a search engine to rely upon, but would still be useful in case one knows the exact thing (and from whom) they're searching for (the same is valid for all Nostr content, by the way, and that's where it's censorship-resistance comes from).
Continuous integration
GitHub Actions are a very hardly subsidized free-compute-for-all-paid-by-Microsoft feature, but one that isn't hard to replace at all. In fact there exists today many companies offering the same kind of service out there -- although they are mostly targeting businesses and not open-source projects, before GitHub Actions was introduced there were also many that were heavily used by open-source projects.
One problem is that these services are still heavily tied to GitHub today, they require a GitHub login, sometimes BitBucket and GitLab and whatnot, and do not allow one to paste an arbitrary Git server URL, but that isn't a thing that is very hard to change anyway, or to start from scratch. All we need are services that offer the CI/CD flows, perhaps using the same framework of GitHub Actions (although I would prefer to not use that messy garbage), and charge some few satoshis for it.
It may be the case that all the current services only support the big Git hosting platforms because they rely on their proprietary APIs, most notably the webhooks dispatched when a repository is updated, to trigger the jobs. It doesn't have to be said that Nostr can also solve that problem very easily.
-
@ dfa02707:41ca50e3
2025-06-15 23:02:32- This version introduces the Soroban P2P network, enabling Dojo to relay transactions to the Bitcoin network and share others' transactions to break the heuristic linking relaying nodes to transaction creators.
- Additionally, Dojo admins can now manage API keys in DMT with labels, status, and expiration, ideal for community Dojo providers like Dojobay. New API endpoints, including "/services" exposing Explorer, Soroban, and Indexer, have been added to aid wallet developers.
- Other maintenance updates include Bitcoin Core, Tor, Fulcrum, Node.js, plus an updated ban-knots script to disconnect inbound Knots nodes.
"I want to thank all the contributors. This again shows the power of true Free Software. I also want to thank everyone who donated to help Dojo development going. I truly appreciate it," said Still Dojo Coder.
What's new
- Soroban P2P network. For MyDojo (Docker setup) users, Soroban will be automatically installed as part of their Dojo. This integration allows Dojo to utilize the Soroban P2P network for various upcoming features and applications.
- PandoTx. PandoTx serves as a transaction transport layer. When your wallet sends a transaction to Dojo, it is relayed to a random Soroban node, which then forwards it to the Bitcoin network. It also enables your Soroban node to receive and relay transactions from others to the Bitcoin network and is designed to disrupt the assumption that a node relaying a transaction is closely linked to the person who initiated it.
- Pushing transactions through Soroban can be deactivated by setting
NODE_PANDOTX_PUSH=off
indocker-node.conf
. - Processing incoming transactions from Soroban network can be deactivated by setting
NODE_PANDOTX_PROCESS=off
indocker-node.conf
.
- Pushing transactions through Soroban can be deactivated by setting
- API key management has been introduced to address the growing number of people offering their Dojos to the community. Dojo admins can now access a new API management tab in their DMT, where they can create unlimited API keys, assign labels for easy identification, and set expiration dates for each key. This allows admins to avoid sharing their main API key and instead distribute specific keys to selected parties.
- New API endpoints. Several new API endpoints have been added to help API consumers develop features on Dojo more efficiently:
- New:
/latest-block
- returns data about latest block/txout/:txid/:index
- returns unspent output data/support/services
- returns info about services that Dojo exposes
- Updated:
/tx/:txid
- endpoint has been updated to return raw transaction with parameter?rawHex=1
- The new
/support/services
endpoint replaces the deprecatedexplorer
field in the Dojo pairing payload. Although still present, API consumers should use this endpoint for explorer and other pairing data.
- New:
Other changes
- Updated ban script to disconnect inbound Knots nodes.
- Updated Fulcrum to v1.12.0.
- Regenerate Fulcrum certificate if expired.
- Check if transaction already exists in pushTx.
- Bump BTC-RPC Explorer.
- Bump Tor to v0.4.8.16, bump Snowflake.
- Updated Bitcoin Core to v29.0.
- Removed unnecessary middleware.
- Fixed DB update mechanism, added api_keys table.
- Add an option to use blocksdir config for bitcoin blocks directory.
- Removed deprecated configuration.
- Updated Node.js dependencies.
- Reconfigured container dependencies.
- Fix Snowflake git URL.
- Fix log path for testnet4.
- Use prebuilt addrindexrs binaries.
- Add instructions to migrate blockchain/fulcrum.
- Added pull policies.
Learn how to set up and use your own Bitcoin privacy node with Dojo here.
-
@ 93bfc86d:fc8e91f5
2025-06-18 05:56:59라이트닝 네트워크
풀 노드가 비트코인 네트워크의 분산화 속성을 강화한다면 온-체인 위에 올려질 다중 레이어들은 비트코인의 확장성을 강화한다. 이러한 제2레이어에는 대표적으로 라이트닝 네트워크가 있다.
라이트닝 네트워크 백서는 조셉 푼Joseph Poon과 타데우스 드리야Thaddeus Dryja가 공동 저술했으며, 2016년 1월 14일에 처음 공개되었다. 라이트닝 네트워크 백서의 제목은 「비트코인 라이트닝 네트워크: 확장 가능한 오프-체인 즉시 결제」이다.
라이트닝 네트워크는 백서 이름대로 현재까지 비트코인의 확장성 강화에 핵심적인 역할을 하고 있다. 라이트닝 네트워크는 채널을 만들고, 유동성을 공급하며, 결제를 중개하는 수많은 자발적인 라이트닝 노드가 있기 때문에 작동된다.
단순히 라이트닝 지갑 수탁 서비스—스트라이크, 월렛 오브 사토시, 블링크, 피닉스 등—를 이용하는 것과 직접 라이트닝 노드를 운영하는 것에는 매우 큰 차이가 있다. 수탁 서비스 이용자들은 라이트닝 지갑 기업이 이미 열어놓은 채널을 이용해 결제를 주고받지만 라이트닝 노드 운영자는 직접 채널을 열고 닫으며, 때로는 타인의 결제를 중개하고, 수수료를 직접 설정하며 전체 라이트닝 네트워크의 일부가 된다.
라이트닝 채널의 원리
라이트닝 네트워크의 원리를 이해하려면 먼저 채널이라는 개념을 이해해야 한다. 두 라이트닝 노드가 채널을 열면, 그들은 여러 번의 결제를 오프-체인 상에서 빠르고 저렴하게 주고받을 수 있다. 채널을 열 때는 온-체인 거래를 통해 자금을 예치해야 한다.
만약 앨리스와 밥이 자주 결제를 하는 사이라고 해보자. 둘의 거래를 매번 온-체인에 기록하는 것은 번거로운 일이다. 온-체인 거래는 정산 관점에서는 매우 빠르지만, 결제 관점에서는 느리기 때문이다. 일상적인 소액 결제를 하는데 결제할 때마다 10분 정도를 기다려야 하고, 700 SATS 정도의 수수료를 매번 내야 한다고 생각해 보자. 매우 불편한 일일 것이다. 라이트닝 네트워크에서 채널을 개설할 때만 온-체인에 거래를 기록하고, 이후에 일어나는 자잘한 거래는 온-체인에 기록하지 않고 보관해 두다가 채널을 닫을 때 최종 거래 결과만을 기록하면 매우 저렴하고 빠르게 거래할 수 있다.
채널은 쉽게 말해 ‘공동 금고’라고 생각하면 쉽다. 앨리스와 밥의 공동 금고에 총 20만 SATS가 있고, 앨리스와 밥은 이 금고에서 각각 10만 SATS의 청구권이 있는 상태라고 해보자. 앨리스가 밥의 카페에서 5,000 SATS짜리 커피를 3번 사 마셨다면 앨리스의 최종 청구권은 85,000 SATS로 변하고, 밥의 최종 청구권은 115,000 SATS로 변하는 것이다. 이렇게 거래하면 앨리스와 밥 사이에서 일어났던 수많은 거래가 실행되기 위해 한 번의 최종 거래 결과만을 메인 네트워크에 전송하면 되므로, 1회 거래당 거래 수수료는 매우 저렴해진다. 라이트닝 네트워크는 채널을 개설할 때, 채널을 종료할 때 총 2번만 온-체인에서 수수료를 지불한다.
라이트닝 네트워크의 놀라운 점은 직접 채널을 열지 않은 다른 대상과도 거래가 가능하다는 것이다. 만약 앨리스가 밥과 채널을 개설하고, 밥이 캐롤과 채널을 개설했다고 해보자. 앨리스는 캐롤과 직접적인 채널이 개설되어 있지 않다. 이 상황에서 앨리스가 캐롤에게 돈 10,000 SATS를 보내고 싶다면 어떻게 해야 할까? 앨리스가 밥에게 돈 10,000 SATS를 보내고, 밥이 10,000 SATS를 캐롤에게 보내면 된다. 이러한 거래는 당연히 공동 금고에 있는 금액 청구권으로 하는 것이다. 그리고 앨리스가 캐롤에게 돈을 보내는데 밥이 매개해 줬으므로 앨리스는 밥에게 적정한 수수료를 지급하면 된다. 5 SATS를 수수료로 지급하고 싶다면 밥에게 10,005 SATS를 보내고, 밥은 캐롤에게 10,000 SATS를 보내면 된다. 그러면 앨리스는 거래의 중간 매개자인 밥에게 5 SATS를 보낸 셈이 된다.
밥은 중간 매개 역할을 하면서 수수료를 챙겼다. 이렇게 송금 경로 중 중간에 지나가는 각 노드를 홉hop이라고 부른다. 기존에는 거래의 중개를 누가 맡았는가? 은행과 같은 금융기관이 독점했다. 라이트닝 네트워크는 기존 금융 시스템의 중앙화된 중개자 역할을 개인들에게 분산시킨 혁신적인 모델이다. 누구나 채널을 개설하고 다른 사람들과 거래할 수 있으며, 중개 역할을 하면서 수수료를 받을 수도 있다. 기존에는 중개자가 되기 위해서 거대한 자본이 필요했으며, 정부의 허락을 받아야만 은행업을 할 수 있었다. 기존 은행이 커다란 중앙 금고를 두고 은행 직원들이 모든 거래를 처리하고 기록했다면, 라이트닝 네트워크는 개인들이 서로 작은 금고를 만들어 거래하고 필요한 경우 중간 경로를 통해 서로 연결되는 방식이다. 이는 은행의 권한이 개인들에게 분산된 것과 같다.
참고로 앨리스나 캐롤은 중개자인 밥을 신뢰할 필요는 없다. 밥이 앨리스에게서 확실히 돈을 받으려면 캐롤이 밥에게서 돈을 가져갈 때 공개되는 데이터(해시값의 평문)가 있어야만 한다. 즉, 밥이 캐롤에게 돈을 확실히 보내야만 밥은 앨리스에게 받은 돈을 가져갈 수 있다.
라이트닝 네트워크에서는 노드들의 역할이 중요하다. 많은 노드들이 채널을 열어야 더 빠르고 다양한 경로가 열릴 수 있고, 수수료 경쟁이 일어나 엄청나게 낮은 수수료로도 거래할 수 있다. 기존 비트코인 시스템은 수수료를 내는 사람들끼리 경쟁했다. 더 높은 수수료를 내지 않으면 느린 속도를 감내할 수밖에 없었다. 그런데 라이트닝 네트워크에서는 수수료를 받는 사람들끼리 경쟁한다.
인바운드 유동성과 아웃바운드 유동성
앞의 비유적인 예시로 돌아가 보자. 밥과 앨리스가 공동 금고를 만들 때 10만 SATS씩 금고에 넣었다. 이런 경우 앨리스와 밥은 서로에게 라이트닝 네트워크상에서 비트코인을 보낼 수 있다. 이제 앨리스 입장에서만 보자. 앨리스는 공동 금고에 10만 SATS를 보냈다. 이렇게 앨리스가 보낸 10만 SATS를 ‘아웃바운드 유동성’이라고 한다. 그리고 밥이 앨리스 자신과 개설한 채널(공동 금고)에 보낸 10만 SATS는 ‘인바운드 유동성’이라고 한다. 정리하면 자기가 라이트닝 채널에 보낸 비트코인 금액을 아웃바운드 유동성이라고 하며, 상대방이 라이트닝 채널에 보낸 비트코인 금액을 인바운드 유동성이라고 한다.
앨리스가 처음에 밥과 채널을 개설하는 상황을 생각해 보자. 채널을 개설한 앨리스가 공동 금고(채널)에 10만 SATS의 돈을 보냈다. 공동 금고에는 10만 SATS가 들어있지만, 이것은 모두 앨리스가 청구할 수 있는 상태다. 이런 상태에서는 오프-체인에서 앨리스가 밥에게 돈을 보낼 수는 있지만, 앨리스가 밥에게 돈을 받을 수는 없다. 즉 지금은 앨리스에게 아웃바운드 유동성만 있고, 인바운드 유동성은 없다. 인바운드 유동성이 없으면 돈을 상대한테 받을 수가 없다.
유동성에 대한 좋은 예시가 있다. 빨대 양 끝에 풍선이 달려있다고 생각하는 것이다. 내가 돈을 보내 채널을 개설하면 내 쪽의 풍선만 빵빵한 상태다. 상대측의 풍선에는 공기가 전혀 없다. 따라서 상대 풍선으로부터 내 풍선으로 공기가 이동할 수가 없다. 내 풍선에서 상대 풍선으로만 공기가 이동할 수 있다.
유동성 관리는 라이트닝 채널을 운영할 때 매우 중요한 문제다. 만약 라이트닝 노드를 운영하고, 이를 통해 결제를 받는다면 인바운드 유동성이 말라버렸을 때 결제를 받을 수가 없기 때문이다. 따라서 채널 개설, 라우팅을 통한 유동성 이동, 리밸런싱 서비스 사용 등의 다양한 방법으로 유동성을 확보하고 조정해야 한다.
협력적 종료와 비협력적 종료, CSV, 페널티
앨리스와 밥이 채널을 개설한 상황을 생각해 보자. 앨리스와 밥 각각 10만 SATS의 청구권이 있었는데 앨리스가 밥의 카페에서 5,000원 커피를 3번 사 마신 경우를 생각해 보자. 이제 앨리스의 금액이 85,000 SATS, 밥의 금액이 115,000 SATS가 적힌 장부가 있을 것이다. 앨리스와 밥이 둘 다 채널 종료에 합의하면 채널의 최종 장부 거래가 온-체인에 기록되는 즉시(블록에 실려 컨펌되는 즉시) 둘은 채널에 있던 자금을 돌려받는다. 공동 금고(돼지저금통)를 깨는 것이다. 이런 종료를 ‘협력 적 종료’라고 한다.
자, 앨리스에게 악마 맬러리의 망령이 들었다고 생각해 보자. 앨리스는 밥 몰래 오프-체인의 장부를 온-체인에 제출하고 채널을 종료하고 싶다. 그러면 앨리스는 굳이 자신이 85,000 SATS를 받을 수 있는 장부를 제출하지 않고 10만 SATS를 받을 수 있는 이전 장부를 온-체인에 제출하려고 하지 않을까? 이런 상황을 ‘비협력적 종료’라고 한다.
비협력적 종료는 꼭 앨리스처럼 악의를 품고 하는 것뿐만 아니라 여러 상황이 있을 수 있다. 예를 들면 상대 노드가 오랫동안 연결이 안 되어 채널을 유지할 수 없는 경우 내 쪽에서 채널을 강제 종료할 수 있다. 이런 비협력적 종료 상황에서는 누군가가 배신을 하고 최신 장부를 제출하지 않고 자신에게 이득이 되는 이전 장부를 제출할 가능성이 있다.
그래서 비협력적 종료 상황에서는 자금을 바로 돌려받을 수가 없다. 비협력적 종료 상황에서 자금은 CSV, CheckSequenceVerify라는 상대 시간 잠금으로 묶인다. 무슨 뜻이냐면 거래가 온-체인에 제출된 시점으로부터 통상 1,000블록 간 잠긴다. 1,000블록이면 대략 일주일이다. 즉, 비협력적 종료를 하면 자금을 받기 위해서 일주일을 기다려야 한다.
그럼 비협력적 종료를 할 때 왜 일정 기간을 기다리게 했을까? 만약 상대가 최신이 아닌 자신에게 이득이 되는 이전 장부를 제출하는 경우 페널티를 줄 시간이 필요하기 때문이다. 이 페널티는 채널 자금 몰수다. 오프-체인에서 서로 장부를 교환할 때는 자신이 가져갈 수 있는 금액이 적혀있는 장부만 교환하는 것이 아니다. 상대방이 이전 거래를 제출할 경우 내가 채널에 있는 모든 금액을 몰수할 수 있는 페널티 거래도 교환한다. 처음에 A 상태가 있었다고 해보자. B 상태가 진행되어 B 상태가 적혀있는 거래가 적혀있는 장부를 교환할 때 A 장부 제출에 대한 페널티 장부도 교환하는 것이다.
다시 돌아와서 앨리스가 85,000 SATS를 받을 수 있는 장부가 아니라 100,000 SATS를 받을 수 있는 이전 거래를 온-체인에 제출했다고 해보자. 앨리스는 일주일간 자금을 가져갈 수 없다. 밥이 만약 페널티 거래를 제출하면 밥은 채널에 있던 앨리스의 몫 85,000 SATS 모두를 즉시 압수할 수 있다.
라이트닝 노드의 유형
라이트닝 노드는 다양한 기준에 따라 다양하게 분류할 수 있다. 유동성이 이동하는 방식에 따라 분류한 라이트닝 노드의 몇 가지 유형을 살펴보자.
드레인 노드drain node는 유동성이 한쪽으로만 흐르는 노드를 말하는데, 주로 자금을 빨아들이는 노드를 말한다. 만약 비트코인 결제를 받기만 하는 상점이라면 채널의 유동성이 주로 그 상점으로 빨려 들어갈 것이다. 이런 드레인 노드는 시간이 지나면 모든 유동성이 상점의 노드 쪽으로 쏠려버리기 때문에 유동성을 관리하지 않으면 더 이상 결제를 받을 수 없게 된다. 그래서 이런 노드는 리밸런싱(인바운드 유동성과 아웃바운드 유동성의 균형을 맞추는 것)을 통해 유동성을 관리하는 것이 특히 중요하다. 리밸런싱을 하는 방법은 온-체인과 연계해 유동성 방향을 바꾸거나 순환 경로를 만들어 리밸런싱하는 방법 등이 있다. 만약 거래소 노드와 채널이 개설되어 있다면 거래소 노드로 비트코인을 보내고, 거래소에서 온-체인으로 비트코인을 빼는 간단한 방법도 있다.
라우팅 노드routing node는 주로 중간에서 결제를 라우팅하는 노드를 말한다. 이들은 거래를 중개하면서 수수료 수익을 얻는 것을 목표로 한다. 이런 노드를 운영하려면 노드가 항상 온라인 상태로 잘 연결되어 있어야 하고 수수료도 잘 관리해야 한다. 수수료가 너무 높으면 경로에서 제외되고, 수수료가 너무 낮으면 드레인 노드에게 유동성이 다 빨릴 수 있기 때문이다. 또한 다수의 채널을 열고, 다양한 다른 노드와 연결을 하여 네트워크 내에서 경로로 자주 선택되도록 전략을 짜야 한다.
거래소나 지갑 회사 노드도 있다. 이들은 자신들의 서비스 사용자들을 위해 여러 채널을 개설하고 대규모 유동성을 보유하고 있다. 이런 노드와 채널을 개설하면 인바운드 유동성 확보가 쉬워진다. 따라서 이런 노드들은 주로 입구 역할을 하며, 많은 노드와 연결되어 있으므로 허브 역할을 하기도 한다.
라이트닝 노드를 운영할 때는 어떤 목적으로 운영할 것인지 꼭 생각해 보는 것이 좋다. 만약 비트코인으로 결제를 받기 위한 것이라면 인바운드 유동성을 많이 확보해 놓아야 할 것이다. 거꾸로 비트코인 결제 매장 등에 가서 일상적인 결제를 하거나, 라이트닝 네트워크를 이용한 P2P 거래로 비트코인을 판매할 것이라면 주로 아웃바운드 유동성을 확보하면 되니 상대적으로 유동성 관리가 쉽다. 유동성이 마르면 채널을 종료하고 다시 열기만 하면 자동으로 아웃바운드 유동성이 확보되기 때문이다. 수수료 수익을 보고 라우팅 노드를 운영하고 싶다면 상당히 많은 경험과 지식이 필요하니 신중하게 결정하는 것이 좋다.
라이트닝 노드를 직접 돌리는 것은 간단하지만은 않지만 여전히 매력적이다. 라이트닝 수탁 서비스를 이용하는 경우 해당 서비스 운영자를 신뢰해야 하는 문제가 생기기 때문에 KYC나 자금 동결 등의 문제로부터 완전히 자유롭지 않다. 하지만 라이트닝 네트워크에 직접 참여하면 신뢰받는 제3자 없이 비트코인의 확장성을 경험할 수 있다.
-
@ 93bfc86d:fc8e91f5
2025-06-18 05:48:12다무스 앱 설치 및 개인키-공개키 쌍 생성
아이폰과 같은 iOS 기기나 맥OS에서는 다무스Damus를 사용하는 것도 좋다. 다무스에서는 자신이 사용하는 라이트닝 지갑을 이용해 잽을 날리는 것이 가능하다.
먼저 앱을 설치해보자. 앱스토어에 'Damus' 또는 'Damus nostr'를 검색하고 앱을 다운로드 받는다. 이미 노스터 개인키인 nsec이 있다면 [Sign In]을 선택하고, 새 계정을 만들 거라면 [Create Account]를 누른다. 필자는 [Create Account]를 눌러 새 키 쌍을 생성해보겠다.
'Name'에 닉네임을 적고 [Next]를 누른다.
[저장하기]를 누르면 키 쌍을 아이폰 암호 앱에 저장할 수 있다. 원하지 않는다면 [Not now]를 눌러 넘어가면 된다.
메인 화면에 들어오면 왼쪽 상단 프로필 모양의 원을 누른다. 그 다음 [설정]을 누른다.
[키]룰 눌러 들어가면 개인키 nsec을 볼 수 있다. [보기]를 눌러 종이에 적는 등 물리적으로 백업하거나, 복사 버튼을 눌러 암호화된 파일로 저장할 수 있다.
다른 사람들에게 npub 알려주기
누군가에게 자신의 노스터 계정을 알려줄 때는 노스터 공개키인 npub을 알려주면 된다. 다무스 메인 화면에서 좌측 상단 원 모양의 프로필을 누른 뒤, 프로필 오른쪽에 있는 QR코드 모양의 버튼을 누른다. 그러면 QR코드가 나오는데, 이 화면을 보여주거나 캡처해서 상대방에게 공유하면 된다.
혹은 [프로필]을 눌러 자신의 프로필 화면으로 들어가고, 아이디 밑에 있는 npub을 복사해 상대방에게 보내주면 된다.
팔로우 추가
처음에는 다무스 운영자의 계정만 팔로우가 되어있을 것이다. 다른 계정들을 팔로우하는 방법을 알아보자.
하단 탭에서 돋보기 모양의 버튼을 눌러 검색 창으로 진입한다. 검색 창에 상대방이 공유한 npub을 붙여넣으면 그 사람의 프로필이 뜰 것이다.
예를 들어 필자의 공개키는 아래와 같다.
npub1jwlusmv555g5ytdwxeds6k3e8u9dgyf75fscznc2eqpemlywj86st0nf2k
필자의 계정을 팔로우하는 과정을 알아보자. 검색창에 npub을 붙여넣고 프로필이 나오면 프로필을 누른다. 다음에 나오는 화면에서 오른쪽의 [팔로우] 버튼을 누르면 필자를 팔로우할 수 있다. 혹은 그 아래에 있는 [팔로우] 또는 [팔로워] 목록을 보고 마음에 드는 프로필을 찾아 들어가 팔로우를 할 수 있다. 이런 방식으로 관심이 있는 계정을 팔로우하면 피드에 글이 뜨기 시작한다.
잽 받기 위한 라이트닝 주소 연결
잽을 받으려면 프로필에 라이트닝 주소를 연결해놓아야 한다. 좌측 상단 원 모양의 프로필을 누르고 [프로필]에 들어간다. 그 다음 [수정하기]를 누른다. 여기서 닉네임을 설정할 수 있다. 스크롤을 아래로 내려서 '비트코인 라이트닝 팁' 필드로 내려간다.
여기에 라이트닝 주소를 입력하고, [저장하기]를 누른다. 프로필 옆에 번개 표시가 뜬 것을 볼 수 있다. 번개 표시가 뜨면 다른 사람들이 나에게 잽을 보낼 수 있다.
다른 사람에게 잽 보내기
받기만 하는 사람이 되는 것은 유쾌하지 않다. 이번에는 다무스에서 잽을 보내는 방법에 대해 알아보자.
좌측 상단 원 모양의 프로필을 누르고 [설정]에 들어간다. 그 다음 [잽]을 누른다.
여기서 [지갑 선택 창 보기] 토글을 켜면 잽을 보낼 때마다 어떤 지갑에서 보낼지 선택할 수 있다. 그 아래 '기본 지갑 선택하기' 옆의 [기기 기본 앱]을 눌러 자신이 사용하고 있는 지갑 앱을 선택할 수 있다.
아래에서 '잽 기본 Sats 수량'을 설정할 수도 있다.
이렇게 설정했으면 이제 설정 창에서 빠져나오자. 잽을 날리고 싶은 프로필이나 포스트에 간다. 거기서 번개 모양의 버튼을 누른다. 그러면 잽을 보내는 창이 뜰 것이다. 금액을 설정하고 [사용자에게 잽 날리기]를 누른다. 그러면 설정한대로 어떤 지갑을 통해 보낼지 선택하는 창이 나온다. 필자는 스트라이크 앱을 통해 진행해보겠다.
스트라이크를 열지 물어보는 창이 나오면 [열기]를 누르고, 스트라이크에서는 [Bitcoin]을 선택한다.
이어서 [Confirm]을 누르고 [Ok]를 누르면 상대방에게 잽이 날아간다.
-
@ c1e9ab3a:9cb56b43
2025-03-10 21:56:07Introduction
Throughout human history, the pyramids of Egypt have fascinated scholars, archaeologists, and engineers alike. Traditionally thought of as tombs for pharaohs or religious monuments, alternative theories have speculated that the pyramids may have served advanced technological functions. One such hypothesis suggests that the pyramids acted as large-scale nitrogen fertilizer generators, designed to transform arid desert landscapes into fertile land.
This paper explores the feasibility of such a system by examining how a pyramid could integrate thermal convection, electrolysis, and a self-regulating breeder reactor to sustain nitrogen fixation processes. We will calculate the total power requirements and estimate the longevity of a breeder reactor housed within the structure.
The Pyramid’s Function as a Nitrogen Fertilizer Generator
The hypothesized system involves several key processes:
- Heat and Convection: A fissile material core located in the King's Chamber would generate heat, creating convection currents throughout the pyramid.
- Electrolysis and Hydrogen Production: Water sourced from subterranean channels would undergo electrolysis, splitting into hydrogen and oxygen due to electrical and thermal energy.
- Nitrogen Fixation: The generated hydrogen would react with atmospheric nitrogen (N₂) to produce ammonia (NH₃), a vital component of nitrogen-based fertilizers.
Power Requirements for Continuous Operation
To maintain the pyramid’s core at approximately 450°C, sufficient to drive nitrogen fixation, we estimate a steady-state power requirement of 23.9 gigawatts (GW).
Total Energy Required Over 10,000 Years
Given continuous operation over 10,000 years, the total energy demand can be calculated as:
[ \text{Total time} = 10,000 \times 365.25 \times 24 \times 3600 \text{ seconds} ]
[ \text{Total time} = 3.16 \times 10^{11} \text{ seconds} ]
[ \text{Total energy} = 23.9 \text{ GW} \times 3.16 \times 10^{11} \text{ s} ]
[ \approx 7.55 \times 10^{21} \text{ J} ]
Using a Self-Regulating Breeder Reactor
A breeder reactor could sustain this power requirement by generating more fissile material than it consumes. This reduces the need for frequent refueling.
Pebble Bed Reactor Design
- Self-Regulation: The reactor would use passive cooling and fuel expansion to self-regulate temperature.
- Breeding Process: The reactor would convert thorium-232 into uranium-233, creating a sustainable fuel cycle.
Fissile Material Requirements
Each kilogram of fissile material releases approximately 80 terajoules (TJ) (or 8 × 10^{13} J/kg). Given a 35% efficiency rate, the usable energy per kilogram is:
[ \text{Usable energy per kg} = 8 \times 10^{13} \times 0.35 = 2.8 \times 10^{13} \text{ J/kg} ]
[ \text{Fissile material required} = \frac{7.55 \times 10^{21}}{2.8 \times 10^{13}} ]
[ \approx 2.7 \times 10^{8} \text{ kg} = 270,000 \text{ tons} ]
Impact of a Breeding Ratio
If the reactor operates at a breeding ratio of 1.3, the total fissile material requirement would be reduced to:
[ \frac{270,000}{1.3} \approx 208,000 \text{ tons} ]
Reactor Size and Fuel Replenishment
Assuming a pebble bed reactor housed in the King’s Chamber (~318 cubic meters), the fuel cycle could be sustained with minimal refueling. With a breeding ratio of 1.3, the reactor could theoretically operate for 10,000 years with occasional replenishment of lost material due to inefficiencies.
Managing Scaling in the Steam Generation System
To ensure long-term efficiency, the water supply must be conditioned to prevent mineral scaling. Several strategies could be implemented:
1. Natural Water Softening Using Limestone
- Passing river water through limestone beds could help precipitate out calcium bicarbonate, reducing hardness before entering the steam system.
2. Chemical Additives for Scaling Prevention
- Chelating Agents: Compounds such as citric acid or tannins could be introduced to bind calcium and magnesium ions.
- Phosphate Compounds: These interfere with crystal formation, preventing scale adhesion.
3. Superheating and Pre-Evaporation
- Pre-Evaporation: Water exposed to extreme heat before entering the system would allow minerals to precipitate out before reaching the reactor.
- Superheated Steam: Ensuring only pure vapor enters the steam cycle would prevent mineral buildup.
- Electrolysis of Superheated Steam: Using multi-million volt electrostatic fields to ionize and separate minerals before they enter the steam system.
4. Electrostatic Control for Scaling Mitigation
- The pyramid’s hypothesized high-voltage environment could ionize water molecules, helping to prevent mineral deposits.
Conclusion
If the Great Pyramid were designed as a self-regulating nitrogen fertilizer generator, it would require a continuous 23.9 GW energy supply, which could be met by a breeder reactor housed within its core. With a breeding ratio of 1.3, an initial load of 208,000 tons of fissile material would sustain operations for 10,000 years with minimal refueling.
Additionally, advanced water treatment techniques, including limestone filtration, chemical additives, and electrostatic control, could ensure long-term efficiency by mitigating scaling issues.
While this remains a speculative hypothesis, it presents a fascinating intersection of energy production, water treatment, and environmental engineering as a means to terraform the ancient world.
-
@ c1e9ab3a:9cb56b43
2025-03-09 20:13:44Introduction
Since the mid-1990s, American media has fractured into two distinct and increasingly isolated ecosystems, each with its own Overton window of acceptable discourse. Once upon a time, Americans of different political leanings shared a common set of facts, even if they interpreted them differently. Today, they don’t even agree on what the facts are—or who has the authority to define them.
This divide stems from a deeper philosophical rift in how each side determines truth and legitimacy. The institutional left derives its authority from the expert class—academics, think tanks, scientific consensus, and mainstream media. The populist right, on the other hand, finds its authority in traditional belief systems—religion, historical precedent, and what many call "common sense." As these two moral and epistemological frameworks drift further apart, the result is not just political division but the emergence of two separate cultural nations sharing the same geographic space.
The Battle of Epistemologies: Experts vs. Tradition
The left-leaning camp sees scientific consensus, peer-reviewed research, and institutional expertise as the gold standard of truth. Universities, media organizations, and policy think tanks function as arbiters of knowledge, shaping the moral and political beliefs of those who trust them. From this perspective, governance should be guided by data-driven decisions, often favoring progressive change and bureaucratic administration over democratic populism.
The right-leaning camp is skeptical of these institutions, viewing them as ideologically captured and detached from real-world concerns. Instead, they look to religion, historical wisdom, and traditional social structures as more reliable sources of truth. To them, the "expert class" is not an impartial source of knowledge but a self-reinforcing elite that justifies its own power while dismissing dissenters as uneducated or morally deficient.
This fundamental disagreement over the source of moral and factual authority means that political debates today are rarely about policy alone. They are battles over legitimacy itself. One side sees resistance to climate policies as "anti-science," while the other sees aggressive climate mandates as an elite power grab. One side views traditional gender roles as oppressive, while the other sees rapid changes in gender norms as unnatural and destabilizing. Each group believes the other is not just wrong, but dangerous.
The Consequences of Non-Overlapping Overton Windows
As these worldviews diverge, so do their respective Overton windows—the range of ideas considered acceptable for public discourse. There is little overlap left. What is considered self-evident truth in one camp is often seen as heresy or misinformation in the other. The result is:
- Epistemic Closure – Each side has its own trusted media sources, and cross-exposure is minimal. The left dismisses right-wing media as conspiracy-driven, while the right views mainstream media as corrupt propaganda. Both believe the other is being systematically misled.
- Moralization of Politics – Since truth itself is contested, policy debates become existential battles. Disagreements over issues like immigration, education, or healthcare are no longer just about governance but about moral purity versus moral corruption.
- Cultural and Political Balkanization – Without a shared understanding of reality, compromise becomes impossible. Americans increasingly consume separate news, live in ideologically homogeneous communities, and even speak different political languages.
Conclusion: Two Nations on One Land
A country can survive disagreements, but can it survive when its people no longer share a common source of truth? Historically, such deep societal fractures have led to secession, authoritarianism, or violent conflict. The United States has managed to avoid these extremes so far, but the trendline is clear: as long as each camp continues reinforcing its own epistemology while rejecting the other's as illegitimate, the divide will only grow.
The question is no longer whether America is divided—it is whether these two cultures can continue to coexist under a single political system. Can anything bridge the gap between institutional authority and traditional wisdom? Or are we witnessing the slow but inevitable unraveling of a once-unified nation into two separate moral and epistemic realities?
-
@ eb0157af:77ab6c55
2025-06-18 01:02:06Carl Rickertsen completely exits his position in Strategy as insiders sell $864 million worth of stock.
As reported by Protos, Carl Rickertsen, a member of Strategy’s board of directors, has fully liquidated his entire shareholding for over $10 million.
Rickertsen’s decision to completely exit his Strategy position marks a sharp shift from his previous investment stance. In 2022, the executive had shown confidence in the company by investing $700,000 in MSTR shares.
On June 13, 2022, Rickertsen purchased $608,000 worth of MSTR stock at $152 per share. Since then, the stock has rallied 152%. However, by 2023, the director had already sold half of his 4,000-share position.
Rickertsen’s approach to managing his holdings has become increasingly aggressive in recent years. Since joining the board in 2019, he has adopted a strategy of immediately liquidating any stock options received.
One example of this tactic occurred on June 2, when he acquired and sold 26,390 MSTR shares on the same day.
As of June 5 this year, Rickertsen reported zero vested Strategy shares, marking the end of his equity involvement with the company.
Rickertsen’s situation is not an isolated case within Strategy. Data from the Securities and Exchange Commission (SEC) reveals a controversial picture. According to information gathered by secform4.com, over the past five years, total insider sales have exceeded purchases by $864 million. This imbalance in insider transactions could raise questions about executives’ confidence in the company’s future.
The post Strategy director liquidates all his MSTR shares appeared first on Atlas21.
-
@ c1e9ab3a:9cb56b43
2025-02-25 22:49:38Election Authority (EA) Platform
1.1 EA Administration Interface (Web-Based)
- Purpose: Gives authorized personnel (e.g., election officials) a user-friendly way to administer the election.
- Key Tasks:
- Voter Registration Oversight: Mark which voters have proven their identity (via in-person KYC or some legal process).
- Blind Signature Issuance: Approve or deny blind signature requests from registered voters (each corresponding to one ephemeral key).
- Tracking Voter Slots: Keep a minimal registry of who is allowed one ephemeral key signature, and mark it “used” once a signature is issued.
- Election Configuration: Set start/end times, provide encryption parameters (public keys), manage threshold cryptography setup.
- Monitor Tallying: After the election, collaborate with trustees to decrypt final results and release them.
1.2 EA Backend Services
- Blind Signature Service:
- An API endpoint or internal module that receives a blinded ephemeral key from a voter, checks if they are authorized (one signature per voter), and returns the blind-signed result.
-
Typically requires secure storage of the EA’s blind signing private key.
-
Voter Roll Database:
- Stores minimal info: “Voter #12345 is authorized to request one ephemeral key signature,” plus status flags.
-
Does not store ephemeral keys themselves (to preserve anonymity).
-
(Optional) Mix-Net or Homomorphic Tally Service:
- Coordinates with trustees for threshold decryption or re-encryption.
- Alternatively, a separate “Tally Authority” service can handle this.
2. Auditor Interface
2.1 Auditor Web-Based Portal
- Purpose: Allows independent auditors (or the public) to:
- Fetch All Ballots from the relays (or from an aggregator).
- Verify Proofs: Check each ballot’s signature, blind signature from the EA, OTS proof, zero-knowledge proofs, etc.
- Check Double-Usage: Confirm that each ephemeral key is used only once (or final re-vote is the only valid instance).
-
Observe Tally Process: Possibly see partial decryptions or shuffle steps, verify the final result matches the posted ballots.
-
Key Tasks:
- Provide a dashboard showing the election’s real-time status or final results, after cryptographic verification.
- Offer open data downloads so third parties can run independent checks.
2.2 (Optional) Trustee Dashboard
- If the election uses threshold cryptography (multiple parties must decrypt), each trustee (candidate rep, official, etc.) might have an interface for:
- Uploading partial decryption shares or re-encryption proofs.
- Checking that other trustees did their steps correctly (zero-knowledge proofs for correct shuffling, etc.).
3. Voter Application
3.1 Voter Client (Mobile App or Web Interface)
-
Purpose: The main tool voters use to participate—before, during, and after the election.
-
Functionalities:
- Registration Linking:
- Voter goes in-person to an election office or uses an online KYC process.
- Voter obtains or confirms their long-term (“KYC-bound”) key. The client can store it securely (or the voter just logs in to a “voter account”).
- Ephemeral Key Generation:
- Create an ephemeral key pair ((nsec_e, npub_e)) locally.
- Blind (\npub_e) and send it to the EA for signing.
- Unblind the returned signature.
- Store (\npub_e) + EA’s signature for use during voting.
- Ballot Composition:
- Display candidates/offices to the voter.
- Let them select choices.
- Possibly generate zero-knowledge proofs (ZKPs) behind the scenes to confirm “exactly one choice per race.”
- Encryption & OTS Timestamp:
- Encrypt the ballot under the election’s public (threshold) key or produce a format suitable for a mix-net.
- Obtain an OpenTimestamps proof for the ballot’s hash.
- Publish Ballot:
- Sign the entire “timestamped ballot” with the ephemeral key.
- Include the EA’s blind signature on (\npub_e).
- Post to the Nostr relays (or any chosen decentralized channel).
- Re-Voting:
- If the user needs to change their vote, the client repeats the encryption + OTS step, publishes a new ballot with a strictly later OTS anchor.
- Verification:
- After the election, the voter can check that their final ballot is present in the tally set.
3.2 Local Storage / Security
- The app must securely store:
- Ephemeral private key ((nsec_e)) until voting is complete.
- Potential backup/recovery mechanism if the phone is lost.
- Blind signature from the EA on (\npub_e).
- Potentially uses hardware security modules (HSM) or secure enclaves on the device.
4. Nostr Relays (or Equivalent Decentralized Layer)
- Purpose: Store and replicate voter-submitted ballots (events).
- Key Properties:
- Redundancy: Voters can post to multiple relays to mitigate censorship or downtime.
- Public Accessibility: Auditors, the EA, and the public can fetch all events to verify or tally.
- Event Filtering: By design, watchers can filter events with certain tags, e.g. “election: 2025 County Race,” ensuring they gather all ballots.
5. Threshold Cryptography Setup
5.1 Multi-Seg (Multi-Party) Key Generation
- Participants: Possibly the EA + major candidates + accredited observers.
- Process: A Distributed Key Generation (DKG) protocol that yields a single public encryption key.
- Private Key Shares: Each trustee holds a piece of the decryption key; no single party can decrypt alone.
5.2 Decryption / Tally Mechanism
- Homomorphic Approach:
- Ballots are additively encrypted.
- Summation of ciphertexts is done publicly.
- Trustees provide partial decryptions for the final sum.
- Mix-Net Approach:
- Ballots are collected.
- Multiple servers shuffle and re-encrypt them (each trustee verifies correctness).
- Final set is decrypted, but the link to each ephemeral key is lost.
5.3 Trustee Interfaces
- Separate or integrated into the auditor interface—each trustee logs in and provides their partial key share for decrypting the final result.
- Possibly combined with ZK proofs to confirm correct partial decryption or shuffling.
6. OpenTimestamps (OTS) or External Time Anchor
6.1 Aggregator Service
- Purpose: Receives a hash from the voter’s app, anchors it into a blockchain or alternative time-stamping system.
- Result: Returns a proof object that can later be used by any auditor to confirm the time/block height at which the hash was included.
6.2 Verifier Interface
- Could be part of the auditor tool or the voter client.
- Checks that each ballot’s OTS proof is valid and references a block/time prior to the election’s closing.
7. Registration Process (In-Person or Hybrid)
- Voter presents ID physically at a polling station or a designated office (or an online KYC approach, if legally allowed).
- EA official:
- Confirms identity.
- Links the voter to a “voter record” (Voter #12345).
- Authorizes them for “1 ephemeral key blind-sign.”
- Voter obtains or logs into the voter client:
- The app or website might show “You are now cleared to request a blind signature from the EA.”
- Voter later (or immediately) generates the ephemeral key and requests the blind signature.
8. Putting It All Together (High-Level Flow)
- Key Setup
- The EA + trustees run a DKG to produce the election public key.
- Voter Registration
- Voter is validated (ID check).
- Marked as eligible in the EA database.
- Blind-Signed Ephemeral Key
- Voter’s client generates a key, blinds (\npub_e), obtains EA’s signature, unblinds.
- Voting
- Voter composes ballot, encrypts with the election public key.
- Gets OTS proof for the ballot hash.
- Voter’s ephemeral key signs the entire package (including EA’s signature on (\npub_e)).
- Publishes to Nostr.
- Re-Voting (Optional)
- Same ephemeral key, new OTS timestamp.
- Final ballot is whichever has the latest valid timestamp before closing.
- Close of Election & Tally
- EA announces closing.
- Tally software (admin + auditors) collects ballots from Nostr, discards invalid duplicates.
- Threshold decryption or mix-net to reveal final counts.
- Publish final results and let auditors verify everything.
9. Summary of Major Components
Below is a succinct list:
- EA Admin Platform
- Web UI for officials (registration, blind signature issuing, final tally management).
- Backend DB for voter records & authorized ephemeral keys.
- Auditor/Trustee Platforms
- Web interface for verifying ballots, partial decryption, and final results.
- Voter Application (Mobile / Web)
- Generating ephemeral keys, getting blind-signed, casting encrypted ballots, re-voting, verifying included ballots.
- Nostr Relays (Decentralized Storage)
- Where ballots (events) are published, replicated, and fetched for final tally.
- Threshold Cryptography System
- Multi-party DKG for the election key.
- Protocols or services for partial decryption, mix-net, or homomorphic summation.
- OpenTimestamps Aggregator
- Service that returns a blockchain-anchored timestamp proof for each ballot’s hash.
Additional Implementation Considerations
- Security Hardening:
- Using hardware security modules (HSM) for the EA’s blind-signing key, for trustee shares, etc.
- Scalability:
- Handling large numbers of concurrent voters, large data flows to relays.
- User Experience:
- Minimizing cryptographic complexity for non-technical voters.
- Legal and Procedural:
- Compliance with local laws for in-person ID checks, mandatory paper backups (if any), etc.
Final Note
While each functional block can be designed and deployed independently (e.g., multiple aggregator services, multiple relays, separate tally servers), the key to a successful system is interoperability and careful orchestration of these components—ensuring strong security, a straightforward voter experience, and transparent auditing.
nostr:naddr1qqxnzde5xq6nzv348yunvv35qy28wue69uhnzv3h9cczuvpwxyargwpk8yhsygxpax4n544z4dk2f04lgn4xfvha5s9vvvg73p46s66x2gtfedttgvpsgqqqw4rs0rcnsu
-
@ 472f440f:5669301e
2025-06-18 04:25:57Marty's Bent
via Dr. Eli David
The case for a neutral, permissionless monetary protocol has never been stronger. The incumbent financial system is a permissioned wall garden that is susceptible to a tax. When you're using this system, you don't own your money. Your money doesn't really even exist. What you have is a claim to be able to ask your bank to give you your money or move it somewhere that you desire. Not only is it a permissioned wall garden, but it is an insecure permissioned wall garden that is susceptible to attacks from nefarious actors.
This was made very clear earlier today when Sepah Bank in Iran was the subject of a cyber attack that led to all of its databases being erased and their ATMs being deemed non-functional. Sepah Bank customers have been unable to withdraw cash. And many are warning Iranian citizens to withdraw as much cash as possible from any ATM outside of Sepah Bank's network that is working. Because there is a high likelihood that other banks and ATM networks will be targeted.
Bitcoin is a digital bearer instrument that you can custody yourself using either a software or hardware wallet. The network is operated by an army of geographically distributed nodes that maintain the rules and ensure that anybody trying to transact within the network is doing so within the rules that are set forth. Bitcoin is a push system, not a pull system. It is extremely hard to attack in the way that Sepah Bank was attacked earlier today.
I think it's important to note the way in which Sepah Bank was attacked and highlight that it is starkly different from the types of attacks or shortcomings from the financial system that we've seen over the years.
One of the events that caused a rush to Bitcoin over a decade ago was the banking crisis in Cyprus. We've seen hyperinflationary events in countries like Lebanon and Turkey that have rendered their currencies defunct. In the case of Lebanon, the central bank simply came out and said that people were not going to have access to their money and gave Lebanese citizens an overnight haircut on their savings. We've seen countries like India and Nigeria mess with their physical bills, forcing their citizens to exchange smaller denominations for larger denominations, causing massive disruptions in the process.
We've seen the United States government and its allies freeze the treasury assets of its enemies and they move towards a more multipolar monetary order over the last five years. We've seen the Canadian government freeze the bank accounts of protesters fighting for bodily autonomy. We've seen Operation Chokepoint 1.0 and 2.0. Here in the United States, the government directly targeted industries and businesses within those industries by either overtly preventing them from accessing bank accounts or covertly making it as hard as possible to access bank accounts.
On top of all this, obviously, we have the constant drumbeat of currency debasement across the world, even here in the United States, where the Federal Reserve and Federal Government are expanding the monetary base and going further into debt, ultimately destroying the purchasing power of the dollar at an increasing rate over time.
However, this type of cyber attack on a bank is unique, at least from what I can recall. The ability of nefarious actors to access bank databases and erase them is something new and something that should not be taken lightly. If Iranian hacking capabilities are as sufficient and capable as we are led to believe, it's not hard to imagine that we could see some retaliatory actions from the Iranian regime to counteract the attack on their banking system.
I don't want to incite alarm in any of you, but I think it is important to highlight that this new attack vector is definitely a step towards financial nihilism that could put hundreds of millions, if not billions of people in harm's way, in the sense that they could wake up one morning and be told that the bank does not have access to the records of their cuck buck IOUs. If something like this were to happen, I'm sure anyone who isn't holding Bitcoin in a wallet that they control will really wish they were. Being able to access your money is a vital part of being able to live you life. The thought of that ability being taken away because of a hacking war that breaks out is extremely unnerving.
As I said at the top of this letter, the case for a neutral, permissionless, distributed monetary system with a native currency that is finite is clearer than it ever has been, at least for me. It is imperative that you and anyone that you care about holds Bitcoin in self-custody to inoculate yourselves from these very real risks that are only going to increase from here on out.
Eliminate the trusted third party risks that exist in your life. Use Bitcoin as your money and use it correctly by holding it in self-custody.
Why 5% Interest Rates Won't Trigger The Next Market Crash
Guest Mel Mattison challenges the prevailing fear around rising interest rates, arguing that markets have developed immunity to higher yields. Unlike 2023's sharp selloff when the 10-year hit 5%, Mattison believes equities and Bitcoin can now absorb these levels because they signal stronger growth expectations ahead. He emphasizes that the pace of rate increases matters more than absolute levels, and notes that markets have had time to adjust. With oil trading at just $65 per barrel—a fraction of its inflation-adjusted 2008 peak of over $200—the deflationary pressure from cheap energy provides a crucial buffer.
> "It's not just what the rate we get to, it's how fast we get there." - Mel Mattison
Mattison's most compelling argument centers on AI-driven productivity gains enabling companies to maintain margins despite higher borrowing costs. As I've witnessed firsthand implementing AI tools at TFTC, what once required hiring multiple employees can now be handled by one person with the right automation. This productivity revolution means traditional rate sensitivity models may no longer apply.
Check out the full podcast here for more on institutional Bitcoin adoption, resistance money warnings, and bipartisan coalition building.
Headlines of the Day
Davis Commodities Puts 40% of $30M Into Bitcoin - via X
Ukraine Bill Adds Bitcoin to National Reserves - via X
Vinanz Raises £3.58M to Expand Bitcoin Mining - via X
Get our new STACK SATS hat - via tftcmerch.io
Bitcoin’s Next Parabolic Move: Could Liquidity Lead the Way?
Is bitcoin’s next parabolic move starting? Global liquidity and business cycle indicators suggest it may be.
Read the latest report from Unchained and TechDev, analyzing how global M2 liquidity and the copper/gold ratio—two historically reliable macro indicators—are aligning once again to signal that a new bitcoin bull market may soon begin.
Ten31, the largest bitcoin-focused investor, has deployed $150.00M across 30+ companies through three funds. I am a Managing Partner at Ten31 and am very proud of the work we are doing. Learn more at ten31.vc/invest.
Final thought...
The joy of a 5-year old riding a bike for the first time is something that should be protected at all costs.
*Download our free browser extension, Opportunity Cost: *<https://www.opportunitycost.app/> start thinking in SATS today.
*Get this newsletter sent to your inbox daily: *https://www.tftc.io/bitcoin-brief/
Subscribe to our YouTube channels and follow us on Nostr and X:
-
@ 9ca447d2:fbf5a36d
2025-06-18 04:02:01Paris, France – June 6, 2025 — Bitcoin payment gateway startup Flash, just announced a new partnership with the “Bitcoin Only Brewery”, marking the first-ever beverage company to leverage Lightning payments.
Flash enables Bitcoin Only Brewery to offer its “BOB” beer with, no-KYC (Know Your Customer) delivery across Europe, priced at 19,500 sats (~$18) for the 4-pack, shipping included.
The cans feature colorful Bitcoin artwork while the contents promise a hazy pale ale: “Each 33cl can contains a smooth, creamy mouthfeel, hazy appearance and refreshing Pale Ale at 5% ABV,” reads the product description.
Pierre Corbin, Co-Founder of Flash, commented:
“Currently, bitcoin is used more as a store of value but usage for payments is picking up. Thanks to new innovation on Lightning, bitcoin is ready to go mainstream for e-commerce sales.”
Flash, launched its 2.0 version in March 2025 with the goal to provide the easiest bitcoin payment gateway for businesses worldwide. The platform is non-custodial and can enable both digital and physical shops to accept bitcoin by connecting their own wallets to Flash.
By leveraging the scalability of the Lightning Network, Flash ensures instant, low-cost transactions, addressing on-chain Bitcoin bottlenecks like high fees and long wait times.
For businesses interested in adopting Bitcoin payments, Flash offers a straightforward onboarding process, low fees, and robust support for both digital and physical goods. To learn more, visit paywithflash.com.
Media Contact:
Pierre Corbin
Co-Founder, Flash
Email: press@paywithflash.com
Website: paywithflash.comAbout Flash
Flash is the easiest Bitcoin payment gateway for businesses to accept payments. Supporting both digital and physical enterprises, Flash leverages the Lightning Network to enable fast, low-cost Bitcoin transactions. Launched in its 2.0 version in March 2025, Flash is at the forefront of driving Bitcoin adoption in e-commerce.
About Bitcoin Only Brewery
Bitcoin Only Brewery (@Drink_B0B) is a pioneering beverage company dedicated to the Bitcoin ethos, offering high-quality beers payable exclusively in Bitcoin. With a commitment to personal privacy, the brewery delivers across Europe with no-KYC requirements.
-
@ dfa02707:41ca50e3
2025-06-15 17:02:37Contribute to keep No Bullshit Bitcoin news going.
This update brings key enhancements for clarity and usability:
- Recent Blocks View: Added to the Send tab and inspired by Mempool's visualization, it displays the last 2 blocks and the estimated next block to help choose fee rates.
- Camera System Overhaul: Features a new library for higher resolution detection and mouse-scroll zoom support when available.
- Vector-Based Images: All app images are now vectorized and theme-aware, enhancing contrast, especially in dark mode.
- Tor & P2A Updates: Upgraded internal Tor and improved support for pay-to-anchor (P2A) outputs.
- Linux Package Rename: For Linux users, Sparrow has been renamed to sparrowwallet (or sparrowserver); in some cases, the original sparrow package may need manual removal.
- Additional updates include showing total payments in multi-payment transaction diagrams, better handling of long labels, and other UI enhancements.
- Sparrow v2.2.1 is a bug fix release that addresses missing UUID issue when starting Tor on recent macOS versions, icons for external sources in Settings and Recent Blocks view, repackaged
.deb
installs to use older gzip instead of zstd compression, and removed display of median fee rate where fee rates source is set to Server.
Learn how to get started with Sparrow wallet:
Release notes (v2.2.0)
- Added Recent Blocks view to Send tab.
- Converted all bitmapped images to theme aware SVG format for all wallet models and dialogs.
- Support send and display of pay to anchor (P2A) outputs.
- Renamed
sparrow
package tosparrowwallet
andsparrowserver
on Linux. - Switched camera library to openpnp-capture.
- Support FHD (1920 x 1080) and UHD4k (3840 x 2160) capture resolutions.
- Support camera zoom with mouse scroll where possible.
- In the Download Verifier, prefer verifying the dropped file over the default file where the file is not in the manifest.
- Show a warning (with an option to disable the check) when importing a wallet with a derivation path matching another script type.
- In Cormorant, avoid calling the
listwalletdir
RPC on initialization due to a potentially slow response on Windows. - Avoid server address resolution for public servers.
- Assume server address is non local for resolution failures where a proxy is configured.
- Added a tooltip to indicate truncated labels in table cells.
- Dynamically truncate input and output labels in the tree on a transaction tab, and add tooltips if necessary.
- Improved tooltips for wallet tabs and transaction diagrams with long labels.
- Show the address where available on input and output tooltips in transaction tab tree.
- Show the total amount sent in payments in the transaction diagram when constructing multiple payment transactions.
- Reset preferred table column widths on adjustment to improve handling after window resizing.
- Added accessible text to improve screen reader navigation on seed entry.
- Made Wallet Summary table grow horizontally with dialog sizing.
- Reduced tooltip show delay to 200ms.
- Show transaction diagram fee percentage as less than 0.01% rather than 0.00%.
- Optimized and reduced Electrum server RPC calls.
- Upgraded Bouncy Castle, PGPainless and Logback libraries.
- Upgraded internal Tor to v0.4.8.16.
- Bug fix: Fixed issue with random ordering of keystore origins on labels import.
- Bug fix: Fixed non-zero account script type detection when signing a message on Trezor devices.
- Bug fix: Fixed issue parsing remote Coldcard xpub encoded on a different network.
- Bug fix: Fixed inclusion of fees on wallet label exports.
- Bug fix: Increase Trezor device libusb timeout.
Linux users: Note that the
sparrow
package has been renamed tosparrowwallet
orsparrowserver
, and in some cases you may need to manually uninstall the originalsparrow
package. Look in the/opt
folder to ensure you have the new name, and the original is removed.What's new in v2.2.1
- Updated Tor library to fix missing UUID issue when starting Tor on recent macOS versions.
- Repackaged
.deb
installs to use older gzip instead of zstd compression. - Removed display of median fee rate where fee rates source is set to Server.
- Added icons for external sources in Settings and Recent Blocks view
- Bug fix: Fixed issue in Recent Blocks view when switching fee rates source
- Bug fix: Fixed NPE on null fee returned from server
-
@ 3bf0c63f:aefa459d
2025-04-25 18:55:52Report of how the money Jack donated to the cause in December 2022 has been misused so far.
Bounties given
March 2025
- Dhalsim: 1,110,540 - Work on Nostr wiki data processing
February 2025
- BOUNTY* NullKotlinDev: 950,480 - Twine RSS reader Nostr integration
- Dhalsim: 2,094,584 - Work on Hypothes.is Nostr fork
- Constant, Biz and J: 11,700,588 - Nostr Special Forces
January 2025
- Constant, Biz and J: 11,610,987 - Nostr Special Forces
- BOUNTY* NullKotlinDev: 843,840 - Feeder RSS reader Nostr integration
- BOUNTY* NullKotlinDev: 797,500 - ReadYou RSS reader Nostr integration
December 2024
- BOUNTY* tijl: 1,679,500 - Nostr integration into RSS readers yarr and miniflux
- Constant, Biz and J: 10,736,166 - Nostr Special Forces
- Thereza: 1,020,000 - Podcast outreach initiative
November 2024
- Constant, Biz and J: 5,422,464 - Nostr Special Forces
October 2024
- Nostrdam: 300,000 - hackathon prize
- Svetski: 5,000,000 - Latin America Nostr events contribution
- Quentin: 5,000,000 - nostrcheck.me
June 2024
- Darashi: 5,000,000 - maintaining nos.today, searchnos, search.nos.today and other experiments
- Toshiya: 5,000,000 - keeping the NIPs repo clean and other stuff
May 2024
- James: 3,500,000 - https://github.com/jamesmagoo/nostr-writer
- Yakihonne: 5,000,000 - spreading the word in Asia
- Dashu: 9,000,000 - https://github.com/haorendashu/nostrmo
February 2024
- Viktor: 5,000,000 - https://github.com/viktorvsk/saltivka and https://github.com/viktorvsk/knowstr
- Eric T: 5,000,000 - https://github.com/tcheeric/nostr-java
- Semisol: 5,000,000 - https://relay.noswhere.com/ and https://hist.nostr.land relays
- Sebastian: 5,000,000 - Drupal stuff and nostr-php work
- tijl: 5,000,000 - Cloudron, Yunohost and Fraidycat attempts
- Null Kotlin Dev: 5,000,000 - AntennaPod attempt
December 2023
- hzrd: 5,000,000 - Nostrudel
- awayuki: 5,000,000 - NOSTOPUS illustrations
- bera: 5,000,000 - getwired.app
- Chris: 5,000,000 - resolvr.io
- NoGood: 10,000,000 - nostrexplained.com stories
October 2023
- SnowCait: 5,000,000 - https://nostter.vercel.app/ and other tools
- Shaun: 10,000,000 - https://yakihonne.com/, events and work on Nostr awareness
- Derek Ross: 10,000,000 - spreading the word around the world
- fmar: 5,000,000 - https://github.com/frnandu/yana
- The Nostr Report: 2,500,000 - curating stuff
- james magoo: 2,500,000 - the Obsidian plugin: https://github.com/jamesmagoo/nostr-writer
August 2023
- Paul Miller: 5,000,000 - JS libraries and cryptography-related work
- BOUNTY tijl: 5,000,000 - https://github.com/github-tijlxyz/wikinostr
- gzuus: 5,000,000 - https://nostree.me/
July 2023
- syusui-s: 5,000,000 - rabbit, a tweetdeck-like Nostr client: https://syusui-s.github.io/rabbit/
- kojira: 5,000,000 - Nostr fanzine, Nostr discussion groups in Japan, hardware experiments
- darashi: 5,000,000 - https://github.com/darashi/nos.today, https://github.com/darashi/searchnos, https://github.com/darashi/murasaki
- jeff g: 5,000,000 - https://nostr.how and https://listr.lol, plus other contributions
- cloud fodder: 5,000,000 - https://nostr1.com (open-source)
- utxo.one: 5,000,000 - https://relaying.io (open-source)
- Max DeMarco: 10,269,507 - https://www.youtube.com/watch?v=aA-jiiepOrE
- BOUNTY optout21: 1,000,000 - https://github.com/optout21/nip41-proto0 (proposed nip41 CLI)
- BOUNTY Leo: 1,000,000 - https://github.com/leo-lox/camelus (an old relay thing I forgot exactly)
June 2023
- BOUNTY: Sepher: 2,000,000 - a webapp for making lists of anything: https://pinstr.app/
- BOUNTY: Kieran: 10,000,000 - implement gossip algorithm on Snort, implement all the other nice things: manual relay selection, following hints etc.
- Mattn: 5,000,000 - a myriad of projects and contributions to Nostr projects: https://github.com/search?q=owner%3Amattn+nostr&type=code
- BOUNTY: lynn: 2,000,000 - a simple and clean git nostr CLI written in Go, compatible with William's original git-nostr-tools; and implement threaded comments on https://github.com/fiatjaf/nocomment.
- Jack Chakany: 5,000,000 - https://github.com/jacany/nblog
- BOUNTY: Dan: 2,000,000 - https://metadata.nostr.com/
April 2023
- BOUNTY: Blake Jakopovic: 590,000 - event deleter tool, NIP dependency organization
- BOUNTY: koalasat: 1,000,000 - display relays
- BOUNTY: Mike Dilger: 4,000,000 - display relays, follow event hints (Gossip)
- BOUNTY: kaiwolfram: 5,000,000 - display relays, follow event hints, choose relays to publish (Nozzle)
- Daniele Tonon: 3,000,000 - Gossip
- bu5hm4nn: 3,000,000 - Gossip
- BOUNTY: hodlbod: 4,000,000 - display relays, follow event hints
March 2023
- Doug Hoyte: 5,000,000 sats - https://github.com/hoytech/strfry
- Alex Gleason: 5,000,000 sats - https://gitlab.com/soapbox-pub/mostr
- verbiricha: 5,000,000 sats - https://badges.page/, https://habla.news/
- talvasconcelos: 5,000,000 sats - https://migrate.nostr.com, https://read.nostr.com, https://write.nostr.com/
- BOUNTY: Gossip model: 5,000,000 - https://camelus.app/
- BOUNTY: Gossip model: 5,000,000 - https://github.com/kaiwolfram/Nozzle
- BOUNTY: Bounty Manager: 5,000,000 - https://nostrbounties.com/
February 2023
- styppo: 5,000,000 sats - https://hamstr.to/
- sandwich: 5,000,000 sats - https://nostr.watch/
- BOUNTY: Relay-centric client designs: 5,000,000 sats https://bountsr.org/design/2023/01/26/relay-based-design.html
- BOUNTY: Gossip model on https://coracle.social/: 5,000,000 sats
- Nostrovia Podcast: 3,000,000 sats - https://nostrovia.org/
- BOUNTY: Nostr-Desk / Monstr: 5,000,000 sats - https://github.com/alemmens/monstr
- Mike Dilger: 5,000,000 sats - https://github.com/mikedilger/gossip
January 2023
- ismyhc: 5,000,000 sats - https://github.com/Galaxoid-Labs/Seer
- Martti Malmi: 5,000,000 sats - https://iris.to/
- Carlos Autonomous: 5,000,000 sats - https://github.com/BrightonBTC/bija
- Koala Sat: 5,000,000 - https://github.com/KoalaSat/nostros
- Vitor Pamplona: 5,000,000 - https://github.com/vitorpamplona/amethyst
- Cameri: 5,000,000 - https://github.com/Cameri/nostream
December 2022
- William Casarin: 7 BTC - splitting the fund
- pseudozach: 5,000,000 sats - https://nostr.directory/
- Sondre Bjellas: 5,000,000 sats - https://notes.blockcore.net/
- Null Dev: 5,000,000 sats - https://github.com/KotlinGeekDev/Nosky
- Blake Jakopovic: 5,000,000 sats - https://github.com/blakejakopovic/nostcat, https://github.com/blakejakopovic/nostreq and https://github.com/blakejakopovic/NostrEventPlayground
-
@ 57c631a3:07529a8e
2025-06-18 06:30:47Introducing: Reader Stories — A New Page for Your Journey
https://connect-test.layer3.press/articles/1acb1809-49c3-4559-902b-01909d49c50f
-
@ e1cde248:609c13b0
2025-06-18 05:06:16ผมเพิ่งตัดสินใจลบแอปโซเชียลมีเดียทั้งหมดออกจากโทรศัพท์
ใน feed เต็มไปด้วยบัญชีขยะ\ content ที่ถูกยัดมาให้ดู ทั้งที่เราไม่ได้ติดตาม และไม่ได้อยากเห็น\ Bot, AI-generated content, clickbait, ข่าวดราม่าที่ออกแบบมาเพื่อกวนประสาทโดยเฉพาะ
ทั้งหมดนี้ไม่ได้ถูกสร้างมาเพื่อให้เรา “เข้าใจโลก”\ แต่มาเพื่อให้เรา อยู่บนแพลตฟอร์มให้นานที่สุด
แล้วเราก็หลอกตัวเองว่า\ “เรากำลังติดตามโลกอยู่นะ”\ “เรากำลังเชื่อมต่อกับผู้คน”
แต่ความจริงคือ...\ ยิ่งมีดราม่า ยิ่งมีความขัดแย้ง — แพลตฟอร์มยิ่งรวย\ และเรายิ่งพัง
เราได้อะไร?\ ได้ความเหนื่อยล้าแบบไม่รู้ที่มา\ สมาธิสั้นลง หงุดหงิดง่ายขึ้น\ และบางทีก็เศร้า...โดยไม่รู้ว่าทำไม
AI ที่อยู่เบื้องหลัง algorithm พวกนี้\ ฉลาดพอจะกำหนดได้ว่า\ “วันนี้คุณควรจะรู้สึกยังไง”
คุณอาจไม่ได้อยากรู้สึกแย่\ ไม่ได้อยากเปรียบเทียบตัวเองกับใคร\ แต่พอไถไปเรื่อย ๆ มันก็เกิดขึ้น\ แบบไม่รู้ตัว
มันซึมลึก\ มันกัดกินจิตใจ\ ช้า ๆ เงียบ ๆ และต่อเนื่อง
ผมนึกถึงโรคอัลไซเมอร์\ โรคที่ค่อย ๆ ลบตัวตนของคนออกไปทีละนิด\ สำหรับผม... มันน่ากลัวกว่ามะเร็งอีกนะ\ และถ้าจะพูดตรง ๆ ความตายอาจจะยังดีกว่าด้วยซ้ำ
แล้วถ้าคิดดูดี ๆ\ การเสพ content แบบไร้สติ\ การโดนรบกวนทุกวินาทีบนหน้าจอ\ มันก็คือ “การเร่งเวลา” ให้ตัวเราค่อย ๆ หายไป
เราอาจยังไม่แก่พอเป็นอัลไซเมอร์\ แต่ถ้า “ใจ” เราเริ่มลืมว่าเราเป็นใคร\ รู้สึกยังไง\ และอยากมีชีวิตแบบไหน...
มันก็ไม่ต่างกันเท่าไหร่หรอก
ตอนนี้เรายังเลือกได้\ ว่าจะปล่อยให้เทคโนโลยีขับเคลื่อนชีวิต\ หรือจะกลับมาเป็น “คนขับ” เองอีกครั้ง
-
@ eb0157af:77ab6c55
2025-06-18 03:01:36A new study by Kraken reveals how cryptocurrency investors perceive security as the main challenge in self-managing their digital assets.
According to The Block, a recent survey conducted by crypto exchange Kraken found that nearly half of respondents consider themselves the primary risk factor for their own crypto security. The research, which surveyed 789 participants, highlights that 48% of users see their own actions as the greatest threat to their investments in digital assets, surpassing concerns about external theft or fraud.
Kraken’s report underlines how personal responsibility in security management forces users to take full control of their digital funds. However, the study suggests that this autonomy can also become a source of anxiety for many investors.
Nick Percoco, Chief Security Officer at Kraken, commented on the findings, noting that “a lack of confidence in personal crypto security is capping the growth of the industry.” According to Percoco, unlocking the full potential of cryptocurrencies will require users to embrace self-custody and consistently invest in strong security habits.
Technologies to strengthen security
Despite the concerns highlighted in the study, 31% of participants expressed optimism about future technologies that could improve crypto security. Among the most promising solutions identified:
- advanced biometric systems for user authentication;
- multi-factor authentication to secure wallet access;
- AI-based fraud detection systems to prevent attacks.
Data and case studies
Kraken’s research emerges in a context where security threats remain a pressing reality. FBI data shows that in 2024, nearly 150,000 reports of crypto-related internet fraud resulted in $9.3 billion in losses. Older users, particularly those over 60, proved especially vulnerable, accounting for $3 billion in crypto-related financial fraud losses on their own.
The post Kraken study: 48% of users fear themselves in managing and securing their funds appeared first on Atlas21.
-
@ 3bf0c63f:aefa459d
2025-02-22 17:05:13P2Panda and the super-peer curse
Recently was suggested to me that https://p2panda.org/ was a great protocol and that maybe Nostr wouldn't be necessary if we could just use that. After making the blind remark that p2p doesn't work I was pointed to https://github.com/p2panda/aquadoggo which acts as a "node" in some ways similar to a "relay", and it all looks somewhat well, cool, maybe they're into something:
Then I realized that Aquadoggo isn't really a relay, it is more like an "app server". There are still no relays in the Nostr sense in p2panda, the base of communication is still p2p between "nodes", and, as Aquadoggo's readme say, it could be run both as a client and as a server. In other words, we could easily have an "Nostr Aquadoggo" that abstracts all communication with relays, relay selection, event and tag parsing and signatures then stores filtered, ordered, indexed data locally: it is just a Nostr client.
That you can put one of these in a server doesn't change that fact that it will be still a client -- and that underlings behind it consuming its API will be controlled, censored, mislead and tricked. This design that requires trust in one single server from a dumb client in exchange for massaged, sorted, filtered, ordered data is seen not only in p2panda, but it's also a fundamental part of the design in many of the supposed decentralized protocols out there, including Bluesky, Farcaster and Pubky. It has also found its way even into RSS, with feed aggregators, and into IRC with bouncers. It can also be seen being experimented with inside Nostr, with ZBD Social, Primal, Ditto, Satlantis and others I forgot, and even behind the ideas of some pseudo-relays like Bostr and filter.nostr.wine (although I'm not sure). Notably, though, this design is not a part of SSB or Mastodon and these two weren't ever corrupted by it as far as I know.
In any case, should we accept that such architecture will eventually find its way into Nostr and completely dominate it? If I believed the answer was "yes" I would immediately declare Nostr a failed experiment, but I don't. As the main author of one such experiment (ZBD Social), I still think this architecture isn't necessarily bad as long as it's limited and restricted to certain circumstances, but it does pose a risk of Nostr becoming almost as bad as Bluesky, so the path has to be threaded carefully.
Ultimately, though, what all these protocols are trying to achieve by injecting these dangerous super-peers into their architecture is the reliability that pure p2p cannot provide, along with filtering and discovery features. And Nostr's multi-relay architecture, as cumbersome and weird as it is, represents a very different approach to solving the same problems, one that none of these other protocols can even begin to consider emulating, and I believe we have to accept that, embrace it and lean on it more.
We can go there by having whitelisted relays as communities, relays that enforce group rules automatically, relays that provide fulltext search, relays that provide AI-based personalized custom feeds, relays that filter out reply spam or harassment (or enforce blocks at the server-side), relays that restrict reads to a certain selected group, relays that perform curation and make valuable content reemerge from the abyss of the ongoing stream; and of course clients that surface all these different types of relays and their features.
Why is this complex madness better than the super-peer architecture? Because, well, even though custom relays give us all these cool weird features, The basic Nostr feature of being able to follow anyone you want and not giving a super-peer the power to break that link between follower and followed, i.e. the outbox model, is still the most basic function of relays.
-
@ c1e9ab3a:9cb56b43
2025-02-25 19:49:281. Introduction
Modern election systems must balance privacy (no one sees how individuals vote) with public verifiability (everyone can confirm the correctness of the tally). Achieving this in a decentralized, tamper-resistant manner remains a challenge. Nostr (a lightweight protocol for censorship-resistant communication) offers a promising platform for distributing and archiving election data (ballots) without relying on a single central server.
This paper presents a design where:
- Each voter generates a new ephemeral Nostr keypair for an election.
- The election authority (EA) blind-signs this ephemeral public key (npub) to prove the voter is authorized, without revealing which voter owns which ephemeral key.
- Voters cast encrypted ballots to Nostr relays, each carrying an OpenTimestamps proof to confirm the ballot’s time anchor.
- Re-voting is allowed: a voter can replace a previously cast ballot by publishing a new ballot with a newer timestamp.
- Only the latest valid ballot (per ephemeral key) is counted.
We combine well-known cryptographic primitives—blind signatures, homomorphic or mix-net encryption, threshold key management, and time anchoring—into an end-to-end system that preserves anonymity, assures correctness, and prevents double-voting.
2. Roles and Components
2.1 Voters
- Long-Term (“KYC-bound”) Key: Each voter has some identity-verified Nostr public key used only for official communication with the EA (not for voting).
- Ephemeral Voting Key: For each election, the voter locally generates a new Nostr keypair ((nsec_e, npub_e)).
- This is the “one-time” identity used to sign ballots.
- The EA never learns the real identity behind (\npub_e) because of blinding.
2.2 Election Authority (EA)
- Maintains the official voter registry: who is entitled to vote.
- Blind-Signs each valid voter’s ephemeral public key to authorize exactly one ephemeral key per voter.
- Publishes a minimal voter roll: e.g., “Voter #12345 has been issued a valid ephemeral key,” without revealing which ephemeral key.
2.3 Nostr Relays
- Decentralized servers that store and forward events.
- Voters post their ballots to relays, which replicate them.
- No single relay is critical; the same ballot can be posted to multiple relays for redundancy.
2.4 Cryptographic Framework
- Blind Signatures: The EA signs a blinded version of (\npub_e).
- Homomorphic or Mix-Net Encryption: Ensures the content of each ballot remains private; only aggregate results or a shuffled set are ever decrypted.
- Threshold / General Access Structure: Multiple trustees (EA plus candidate representatives, for example) must collaborate to produce a final decryption.
- OpenTimestamps (OTS): Attaches a verifiable timestamp proof to each ballot, anchoring it to a blockchain or other tamper-resistant time reference.
3. Protocol Lifecycle
This section walks through voter registration, ephemeral key authorization, casting (and re-casting) ballots, and finally the tally.
3.1 Registration & Minimal Voter Roll
- Legal/KYC Verification
- Each real-world voter proves their identity to the EA (per legal procedures).
-
The EA records that the voter is eligible to cast one ballot, referencing their long-term identity key ((\npub_{\mathrm{KYC}})).
-
Issue Authorization “Slot”
- The EA’s voter roll notes “this person can receive exactly one blind signature for an ephemeral key.”
- The roll does not store an ephemeral key—just notes that it can be requested.
3.2 Generating and Blinding the Ephemeral Key
- Voter Creates Ephemeral Key
- Locally, the voter’s client generates a fresh ((nsec_e, npub_e)).
- Blinding
-
The client blinds (\npub_e) to produce (\npub_{e,\mathrm{blinded}}). This ensures the EA cannot learn the real (\npub_e).
-
Blind Signature Request
- The voter, using their KYC-bound key ((\npub_{\mathrm{KYC}})), sends (\npub_{e,\mathrm{blinded}}) to the EA (perhaps via a secure direct message or a “giftwrapped DM”).
- The EA checks that this voter has not already been issued a blind signature.
-
If authorized, the EA signs (\npub_{e,\mathrm{blinded}}) with its private key and returns the blinded signature.
-
Unblinding
- The voter’s client unblinds the signature, obtaining a valid signature on (\npub_e).
-
Now (\npub_e) is a blinded ephemeral public key that the EA has effectively “authorized,” without knowing which voter it belongs to.
-
Roll Update
- The EA updates its minimal roll to note that “Voter #12345 received a signature,” but does not publish (\npub_e).
3.3 Casting an Encrypted Ballot with OpenTimestamps
When the voter is ready to vote:
- Compose Encrypted Ballot
- The ballot can be homomorphically encrypted (e.g., with Paillier or ElGamal) or structured for a mix-net.
-
Optionally include Zero-Knowledge Proofs (ZKPs) showing the ballot is valid (one candidate per race, etc.).
-
Obtain OTS Timestamp
- The voter’s client computes a hash (H) of the ballot data (ciphertext + ZKPs).
- The client sends (H) to an OpenTimestamps aggregator.
-
The aggregator returns a timestamp proof verifying that “this hash was seen at or before block/time (T).”
-
Create a “Timestamped Ballot” Payload
-
Combine:
- Encrypted ballot data.
- OTS proof for the hash of the ballot.
- EA’s signature on (\npub_e) (the blind-signed ephemeral key).
- A final signature by the voter’s ephemeral key ((nsec_e)) over the entire package.
-
Publish to Nostr
- The voter posts the complete “timestamped ballot” event to one or more relays.
- Observers see “an event from ephemeral key (\npub_e), with an OTS proof and the EA’s blind signature,” but cannot identify the real voter or see the vote’s contents.
3.4 Re-Voting (Updating the Ballot)
If the voter wishes to revise their vote (due to coercion, a mistake, or simply a change of mind):
- Generate a New Encrypted Ballot
- Possibly with different candidate choices.
- Obtain a New OTS Proof
- The new ballot has a fresh hash (H').
- The OTS aggregator provides a new proof anchored at a later block/time than the old one.
- Publish the Updated Ballot
- Again, sign with (\npub_e).
- Relays store both ballots, but the newer OTS timestamp shows which ballot is “final.”
Rule: The final vote for ephemeral key (\npub_e) is determined by the ballot with the highest valid OTS proof prior to the election’s closing.
3.5 Election Closing & Tally
- Close Signal
- At a specified time or block height, the EA publishes a “closing token.”
-
Any ballot with an OTS anchor referencing a time/block after the closing is invalid.
-
Collect Final Ballots
- Observers (or official tally software) gather the latest valid ballot from each ephemeral key.
-
They confirm the OTS proofs are valid and that no ephemeral key posted two different ballots with the same timestamp.
-
Decryption / Summation
- If homomorphic, the system sums the encrypted votes and uses a threshold of trustees to decrypt the aggregate.
- If a mix-net, the ballots are shuffled and partially decrypted, also requiring multiple trustees.
-
In either case, individual votes remain hidden, but the final counts are revealed.
-
Public Audit
- Anyone can fetch all ballots from the Nostr relays, verify OTS proofs, check the EA’s blind signature, and confirm no ephemeral key was used twice.
- The final totals can be recomputed from the publicly available data.
4. Ensuring One Vote Per Voter & No Invalid Voters
- One Blind Signature per Registered Voter
- The EA’s internal list ensures each real voter only obtains one ephemeral key signature.
- Blind Signature
- Ensures an unauthorized ephemeral key cannot pass validation (forging the EA’s signature is cryptographically infeasible).
- Public Ledger of Ballots
- Because each ballot references an EA-signed key, any ballot with a fake or duplicate signature is easily spotted.
5. Security and Privacy Analysis
- Voter Anonymity
- The EA never sees the unblinded ephemeral key. It cannot link (\npub_e) to a specific person.
-
Observers only see “some ephemeral key posted a ballot,” not the real identity of the voter.
-
Ballot Secrecy
- Homomorphic Encryption or Mix-Net: no one can decrypt an individual ballot; only aggregated or shuffled results are revealed.
-
The ephemeral key used for signing does not decrypt the ballot—the election’s threshold key does, after the election.
-
Verifiable Timestamping
- OpenTimestamps ensures each ballot’s time anchor cannot be forged or backdated.
-
Re-voting is transparent: a later OTS proof overrides earlier ones from the same ephemeral key.
-
Preventing Double Voting
- Each ephemeral key is unique and authorized once.
-
Re-voting by the same key overwrites the old ballot but does not increase the total count.
-
Protection Against Coercion
- Because the voter can re-cast until the deadline, a coerced vote can be replaced privately.
-
No receipts (individual decryption) are possible—only the final aggregated tally is revealed.
-
Threshold / Multi-Party Control
- Multiple trustees must collaborate to decrypt final results, preventing a single entity from tampering or prematurely viewing partial tallies.
6. Implementation Considerations
- Blind Signature Techniques
- Commonly implemented with RSA-based Chaumian blind signatures or BLS-based schemes.
-
Must ensure no link between (\npub_{e,\mathrm{blinded}}) and (\npub_e).
-
OpenTimestamps Scalability
- If millions of voters are posting ballots simultaneously, multiple timestamp aggregators or batch anchoring might be needed.
-
Verification logic on the client side or by public auditors must confirm each OTS proof’s integrity.
-
Relay Coordination
- The system must ensure no single relay can censor ballots. Voters may publish to multiple relays.
-
Tally fetchers cross-verify events from different relays.
-
Ease of Use
-
The user interface must hide the complexity of ephemeral key generation, blind signing, and OTS proof retrieval—making it as simple as possible for non-technical voters.
-
Legal Framework
-
If law requires publicly listing which voters have cast a ballot, you might track “Voter #12345 used their ephemeral key” without revealing the ephemeral key. Or you omit that if secrecy about who voted is desired.
-
Closing Time Edge Cases
- The system uses a block/time anchor from OTS. Slight unpredictability in block generation might require a small buffer around the official close. This is a policy choice.
7. Conclusion
We propose an election system that leverages Nostr for decentralizing ballot publication, blinded ephemeral keys for robust voter anonymity, homomorphic/mix-net encryption for ballot secrecy, threshold cryptography for collaborative final decryption, OpenTimestamps for tamper-proof time anchoring, and re-voting to combat coercion.
Key Advantages:
- Anonymity: The EA cannot link ballots to specific voters.
- One Voter, One Credential: Strict enforcement through blind signatures.
- Verifiable Ordering: OTS ensures each ballot has a unique, provable time anchor.
- Updatability: Voters can correct or override coerced ballots by posting a newer one before closing.
- Decentralized Audit: Anyone can fetch ballots from Nostr, verify the EA’s signatures and OTS proofs, and confirm the threshold-decrypted results match the posted ballots.
Such a design shows promise for secure, privacy-preserving digital elections, though real-world deployment will require careful policy, legal, and usability considerations. By combining cryptography with decentralized relays and an external timestamp anchor, the system can uphold both individual privacy and publicly auditable correctness.
-
@ eb0157af:77ab6c55
2025-06-18 02:02:07Carl Rickertsen completely exits his position in Strategy as insiders sell $864 million worth of stock.
As reported by Protos, Carl Rickertsen, a member of Strategy’s board of directors, has fully liquidated his entire shareholding for over $10 million.
Rickertsen’s decision to completely exit his Strategy position marks a sharp shift from his previous investment stance. In 2022, the executive had shown confidence in the company by investing $700,000 in MSTR shares.
On June 13, 2022, Rickertsen purchased $608,000 worth of MSTR stock at $152 per share. Since then, the stock has rallied 152%. However, by 2023, the director had already sold half of his 4,000-share position.
Rickertsen’s approach to managing his holdings has become increasingly aggressive in recent years. Since joining the board in 2019, he has adopted a strategy of immediately liquidating any stock options received.
One example of this tactic occurred on June 2, when he acquired and sold 26,390 MSTR shares on the same day.
As of June 5 this year, Rickertsen reported zero vested Strategy shares, marking the end of his equity involvement with the company.
Rickertsen’s situation is not an isolated case within Strategy. Data from the Securities and Exchange Commission (SEC) reveals a controversial picture. According to information gathered by secform4.com, over the past five years, total insider sales have exceeded purchases by $864 million. This imbalance in insider transactions could raise questions about executives’ confidence in the company’s future.
The post Strategy director liquidates all his MSTR shares appeared first on Atlas21.
-
@ 97c70a44:ad98e322
2025-06-09 18:23:27When developing on nostr, normally it's enough to read the NIP related to a given feature you want to build to know what has to be done. But there are some aspects of nostr development that aren't so straightforward because they depend less on specific data formats than on how different concepts are combined.
An example of this is how for a while it was considered best practice to re-publish notes when replying to them. This practice emerged before the outbox model gained traction, and was a hacky way of attempting to ensure relays had the full context required for a given note. Over time though, pubkey hints emerged as a better way to ensure other clients could find required context.
Another one of these things is "relay-based groups", or as I prefer to call it "relays-as-groups" (RAG). Such a thing doesn't really exist - there's no spec for it (although some aspects of the concept are included in NIP 29), but at the same time there are two concrete implementations (Flotilla and Chachi) which leverage several different NIPs in order to create a cohesive system for groups on nostr.
This composability is one of the neat qualities of nostr. Not only would it be unhelpful to specify how different parts of the protocol should work together, it would be impossible because of the number of possible combinations possible just from applying a little bit of common sense to the NIPs repo. No one said it was ok to put
t
tags on akind 0
. But no one's stopping you! And the semantics are basically self-evident if you understand its component parts.So, instead of writing a NIP that sets relay-based groups in stone, I'm writing this guide in order to document how I've combined different parts of the nostr protocol to create a compelling architecture for groups.
Relays
Relays already have a canonical identity, which is the relay's url. Events posted to a relay can be thought of as "posted to that group". This means that every relay is already a group. All nostr notes have already been posted to one or more groups.
One common objection to this structure is that identifying a group with a relay means that groups are dependent on the relay to continue hosting the group. In normal broadcast nostr (which forms organic permissionless groups based on user-centric social clustering), this is a very bad thing, because hosts are orthogonal to group identity. Communities are completely different. Communities actually need someone to enforce community boundaries, implement moderation, etc. Reliance on a host is a feature, not a bug (in contrast to NIP 29 groups, which tend to co-locate many groups on a single host, relays-as-groups tends to encourage one group, one host).
This doesn't mean that federation, mirrors, and migration can't be accomplished. In a sense, leaving this on the social layer is a good thing, because it adds friction to the dissolution/forking of a group. But the door is wide open to protocol additions to support those use cases for relay-based groups. One possible approach would be to follow this draft PR which specifies a "federation" event relays could publish on their own behalf.
Relay keys
This draft PR to NIP 11 specifies a
self
field which represents the relay's identity. Using this, relays can publish events on their own behalf. Currently, thepubkey
field sort of does the same thing, but is overloaded as a contact field for the owner of the relay.AUTH
Relays can control access using NIP 42 AUTH. There are any number of modes a relay can operate in:
- No auth, fully public - anyone can read/write to the group.
- Relays may enforce broad or granular access controls with AUTH.
Relays may deny EVENTs or REQs depending on user identity. Messages returned in AUTH, CLOSED, or OK messages should be human readable. It's crucial that clients show these error messages to users. Here's how Flotilla handles failed AUTH and denied event publishing:
LIMITS, PROBE, or some other reflection scheme could also be used in theory to help clients adapt their interface depending on user abilities and relay policy.
- AUTH with implicit access controls.
In this mode, relays may exclude matching events from REQs if the user does not have permission to view them. This can be useful for multi-use relays that host hidden rooms. This mode should be used with caution, because it can result in confusion for the end user.
See Frith for a relay implementation that supports some of these auth policies.
Invite codes
If a user doesn't have access to a relay, they can request access using this draft NIP. This is true whether access has been explicitly or implicitly denied (although users will have to know that they should use an invite code to request access).
The above referenced NIP also contains a mechanism for users to request an invite code that they can share with other users.
The policy for these invite codes is entirely up to the relay. They may be single-use, multi-use, or require additional verification. Additional requirements can be communicated to the user in the OK message, for example directions to visit an external URL to register.
See Frith for a relay implementation that supports invite codes.
Content
Any kind of event can be published to a relay being treated as a group, unless rejected by the relay implementation. In particular, NIP 7D was added to support basic threads, and NIP C7 for chat messages.
Since which relay an event came from determines which group it was posted to, clients need to have a mechanism for keeping track of which relay they received an event from, and should not broadcast events to other relays (unless intending to cross-post the content).
Rooms
Rooms follow NIP 29. I wish NIP 29 wasn't called "relay based groups", which is very confusing when talking about "relays as groups". It's much better to think of them as sub-groups, or as Flotilla calls them, "rooms".
EDIT: Flotilla has migrated to exclusively use "managed rooms" — i.e., fully NIP 29 compliant rooms. Relays without NIP 29 support can still support chat, but all messages will be presented as sent to a single room. I've removed references to unmanaged rooms in what follows.
~~Rooms have two modes - managed and unmanaged. Managed~~ rooms follow all the rules laid out in NIP 29 about metadata published by the relay and user membership. In either case, rooms are represented by a random room id, and are posted to by including the id in an event's
h
tag. ~~This allows rooms to switch between managed and unmanaged modes without losing any content.~~Managed room names come from
kind 39000
room meta events, ~~but unmanaged rooms don't have these. Instead, room names should come from members' NIP 51kind 10009
membership lists. Tags on these lists should look like this:["group", "groupid", "wss://group.example.com", "Cat lovers"]
. If no name can be found for the room (i.e., there aren't any members), the room should be ignored by clients.~~Rooms present a difficulty for publishing to the relay as a whole, since content with an
h
tag can't be excluded from requests. ~~Currently, relay-wide posts are h-tagged with_
which works for "group" clients, but not more generally. I'm not sure how to solve this other than to ask relays to support negative filters.~~ I have ideas on how to solve this in future iterations of relay-based groups, for example using virtual relays or just a better rooms spec.Cross-posting
The simplest way to cross-post content from one group (or room) to another, is to quote the original note in whatever event kind is appropriate. For example, a blog post might be quoted in a
kind 9
to be cross-posted to chat, or in akind 11
to be cross-posted to a thread.kind 16
reposts can be used the same way if the reader's client renders reposts.Posting the original event to multiple relays-as-groups is trivial, since all you have to do is send the event to the relay. Posting to multiple rooms simultaneously by appending multiple
h
tags is however not recommended, since group relays/clients are incentivised to protect themselves from spam by rejecting events with multipleh
tags (similar to how events with multiplet
tags are sometimes rejected).Privacy
Currently, it's recommended to include a NIP 70
-
tag on content posted to relays-as-groups to discourage replication of relay-specific content across the network.Another slightly stronger approach would be for group relays to strip signatures in order to make events invalid (or at least deniable). For this approach to work, users would have to be able to signal that they trust relays to be honest. We could also use ZkSNARKS to validate signatures in bulk.
In any case, group posts should not be considered "private" in the same way E2EE groups might be. Relays-as-groups should be considered a good fit for low-stakes groups with many members (since trust deteriorates quickly as more people get involved).
Membership
There is currently no canonical member list published by relays (except for NIP 29 managed rooms). Instead, users keep track of their own relay and room memberships using
kind 10009
lists. Relay-level memberships are represented by anr
tag containing the relay url, and room-level memberships are represented using agroup
tag.Users can choose to advertise their membership in a RAG by using unencrypted tags, or they may keep their membership private by using encrypted tags. Advertised memberships are useful for helping people find groups based on their social graph:
User memberships should not be trusted, since they can be published unilaterally by anyone, regardless of actual access, so it's better to think of them as "bookmarked groups" or "favorites". Possible improvements in this area would be the ability to provide proof of access:
- Relays could publish member lists (although this would sacrifice member privacy)
- Relays could support a new command that allows querying a particular member's access status
- Relays could provide a proof to the member that they could then choose to publish or not
Moderation
There are two parts to moderation: reporting and taking action based on these reports.
Reporting is already covered by NIP 56. Clients should be careful about encouraging users to post reports for illegal content under their own identity, since that can itself be illegal. Relays also should not serve reports to users, since that can be used to find rather than address objectionable content.
Reports are only one mechanism for flagging objectionable content. Relay operators and administrators can use whatever heuristics they like to identify and address objectionable content. This might be via automated policies that auto-ban based on reports from high-reputation people, a client that implements NIP 86 relay management API, or by some other admin interface.
There's currently no way for moderators of a given relay to be advertised, or for a moderator's client to know that the user is a moderator (so that they can enable UI elements for in-app moderation). This could be addressed via NIP 11, LIMITS, or some other mechanism in the future.
General best practices
In general, it's very important when developing a client to assume that the relay has no special support for any of the above features, instead treating all of this stuff as progressive enhancement.
For example, if a user enters an invite code, go ahead and send it to the relay using a
kind 28934
event. If it's rejected, you know that it didn't work. But if it's accepted, you don't know that it worked - you only know that the relay allowed the user to publish that event. This is helpful, becaues it may imply that the user does indeed have access to the relay. But additional probing may be needed, and reliance on error messages down the road when something else fails unexpectedly is indispensable.This paradigm may drive some engineers nuts, because it's basically equivalent to coding your clients to reverse-engineer relay support for every feature you want to use. But this is true of nostr as a whole - anyone can put whatever weird stuff in an event and sign it. Clients have to be extremely compliant with Postell's law - doing their absolute best to accept whatever weird data or behavior shows up and handle failure in any situation. Sure, it's annoying, but it's the cost of permissionless development. What it gets us is a completely open-ended protocol, in which anything can be built, and in which every solution is tested by the market.
-
@ eb0157af:77ab6c55
2025-06-18 01:02:02A new study by Kraken reveals how cryptocurrency investors perceive security as the main challenge in self-managing their digital assets.
According to The Block, a recent survey conducted by crypto exchange Kraken found that nearly half of respondents consider themselves the primary risk factor for their own crypto security. The research, which surveyed 789 participants, highlights that 48% of users see their own actions as the greatest threat to their investments in digital assets, surpassing concerns about external theft or fraud.
Kraken’s report underlines how personal responsibility in security management forces users to take full control of their digital funds. However, the study suggests that this autonomy can also become a source of anxiety for many investors.
Nick Percoco, Chief Security Officer at Kraken, commented on the findings, noting that “a lack of confidence in personal crypto security is capping the growth of the industry.” According to Percoco, unlocking the full potential of cryptocurrencies will require users to embrace self-custody and consistently invest in strong security habits.
Technologies to strengthen security
Despite the concerns highlighted in the study, 31% of participants expressed optimism about future technologies that could improve crypto security. Among the most promising solutions identified:
- advanced biometric systems for user authentication;
- multi-factor authentication to secure wallet access;
- AI-based fraud detection systems to prevent attacks.
Data and case studies
Kraken’s research emerges in a context where security threats remain a pressing reality. FBI data shows that in 2024, nearly 150,000 reports of crypto-related internet fraud resulted in $9.3 billion in losses. Older users, particularly those over 60, proved especially vulnerable, accounting for $3 billion in crypto-related financial fraud losses on their own.
The post Kraken study: 48% of users fear themselves in managing and securing their funds appeared first on Atlas21.
-
@ eb0157af:77ab6c55
2025-06-18 00:02:25The banking giant is exploring an expansion of its blockchain services, focusing on digital payments and currencies.
JPMorgan Chase has filed a new trademark application for the name “JPMD.” The filing was submitted on June 15 to the United States Patent and Trademark Office (USPTO).
The application, filed by JPMorgan Chase Bank, N.A., covers a broad range of services related to digital assets and blockchain technology. These include the issuance of digital currencies, electronic payment processing, and financial custody services — all of which suggest a possible new stablecoin initiative for JPMorgan.
Experience with JPM Coin
This move wouldn’t be JPMorgan’s first foray into blockchain-based finance. The bank already operates JPM Coin, a dollar-pegged stablecoin used to enable instant transactions between institutional clients. The token runs on Quorum, a private blockchain network developed in-house by JPMorgan and based on Ethereum’s technology.
The registration of the JPMD trademark comes as JPMorgan and other major U.S. banks are considering a collaborative stablecoin project through their jointly owned entities: Early Warning Services and The Clearing House.
Similarly, corporations like Walmart and Amazon are mulling the creation of their own stablecoins.
The post JPMorgan files trademark for ‘JPMD’: a new stablecoin on the horizon for the American bank appeared first on Atlas21.
-
@ eb0157af:77ab6c55
2025-06-18 00:02:24A new study by Kraken reveals how cryptocurrency investors perceive security as the main challenge in self-managing their digital assets.
According to The Block, a recent survey conducted by crypto exchange Kraken found that nearly half of respondents consider themselves the primary risk factor for their own crypto security. The research, which surveyed 789 participants, highlights that 48% of users see their own actions as the greatest threat to their investments in digital assets, surpassing concerns about external theft or fraud.
Kraken’s report underlines how personal responsibility in security management forces users to take full control of their digital funds. However, the study suggests that this autonomy can also become a source of anxiety for many investors.
Nick Percoco, Chief Security Officer at Kraken, commented on the findings, noting that “a lack of confidence in personal crypto security is capping the growth of the industry.” According to Percoco, unlocking the full potential of cryptocurrencies will require users to embrace self-custody and consistently invest in strong security habits.
Technologies to strengthen security
Despite the concerns highlighted in the study, 31% of participants expressed optimism about future technologies that could improve crypto security. Among the most promising solutions identified:
- advanced biometric systems for user authentication;
- multi-factor authentication to secure wallet access;
- AI-based fraud detection systems to prevent attacks.
Data and case studies
Kraken’s research emerges in a context where security threats remain a pressing reality. FBI data shows that in 2024, nearly 150,000 reports of crypto-related internet fraud resulted in $9.3 billion in losses. Older users, particularly those over 60, proved especially vulnerable, accounting for $3 billion in crypto-related financial fraud losses on their own.
The post Kraken study: 48% of users fear themselves in managing and securing their funds appeared first on Atlas21.
-
@ b7274d28:c99628cb
2025-06-18 00:01:01Tired of dealing with spam? You're not alone. Here is a guide to picking relays that are good at keeping spam out, without sacrificing your own reach.
If you just want to skip to the relay suggestions, scroll to the sections titled "The Setup." There is one for users of Haven and one for those who aren't running their own relay at all.
Client Selection
"Wait, I thought this was a guide about selecting relays, not clients."
Yes, it is. But what relays you choose doesn't matter if you are using a client that does not read from your chosen relays, or that hard-codes problematic relays as fallbacks in addition to the relays you selected in an effort to "help you."
Additionally, some clients have settings that can help make up for poor relay selection using client-side spam mitigation methods. This includes clients like Coracle, Damus, Amethyst, and Nostur. Some may do so via web-of-trust (WoT) filters, so you only see notes and replies from those within your broader social circle, while others will automatically hide notes that those you follow have reported as spam or scams.
Coracle is a great client for dealing with spam, so long as you have gone into your "Content Settings" and set the "Minimum WoT Score" to at least 1. This means you will only see posts from users followed by at least one of the npubs you follow.
Damus also employs WoT, but it appears to be just for notifications, so you only receive notifications for those you follow and those they follow, or "friends of friends," as Damus put's it. This can be accessed by toggling it on in your notification tab at the top right, where you see the icon of the person with a check mark.
Nostur has WoT filters for downloading media turned on by default and also uses WoT to filter spam by default. Even better, if you use multiple npubs, you can filter using the WoT of your main npub, while logged into your alternate npubs.
Jumble recently added WoT filtering specifically for interactions. When you load a thread in Jumble, a shield icon will appear near the top right of the page, in line with the tabs for Replies and Quotes. Toggle it on, so the shield is green with a check mark and you will only see replies from those you follow and those your follows follow.
Amethyst does not yet have WoT based filtering built into the client, but it can hide notes that have been reported as spam, scams, impersonation, etc, by those you follow. This is not the most effective way to combat spam, though, since most users aren't often using the report feature. Hopefully we will see WoT filtering as an option in a future update.
Primal's apps do not read from any of your selected relays, but rather from their caching server alone. That said, they have a spam filter that is turned on by default so you see relatively little spam, regardless of which relays you use.
For this guide, I recommend using Amethyst for updating your relays, if you possibly can. The reason for this is because Amethyst has the most robust settings for being able to update all of your various relay lists.
Relay Lists Explained
Contrary to what you might think, there is not a single relay list for each user that is stored in a single note, because you can have relays that are used for only one purpose, and not for any other. Each of those purposes for which you might use a particular relay has its own list. That way a Nostr client can tell which relays you want to use for each separate purpose.
While this can make things less approachable for the user, it also means users don't have to rely on clients to hard code appropriate relays for each of these use-cases. If your client doesn't let you edit each of these relay lists, chances are they are using a set of relays for that purpose that the developer chose instead of you.
Public Outbox/Inbox Relays
This list of relays is found in your kind 10002 note, if you have one. If you don't have one, there won't be any relays shown for these categories in Amethyst. Other clients may fallback to showing you relays from a different list.
This list is intended to be used for Nostr clients to implement the "outbox model" to fetch notes from whatever relays they were written to, even if they aren't in the requesting user's relay list. This solves the issue of needing to share relays with those you follow in order to see their notes, allowing Nostr to remain decentralized.
Your "outbox" relays are the ones you write to, or at least the ones you want other users to know that you write to. When you add a relay here, it's like advertising to everyone, "If you want to see my public-facing notes, look for them on these relays."
Your "inbox" relays are the ones you read from. On this part of your list you are advertising, "If you want me to see your replies, comments, reactions, and zaps, then send them to these relays." These relays are massively important for reducing the amount of spam you see. If you have relays listed here that anyone can post to for free, you will almost certainly see a lot of spam in your replies, unless you have WoT filters turned on in your Nostr client.
DM Inbox Relays
This list is found in your kind 10050 note, if you have one, and is a list of relays where you want others to send you Direct Messages. Ideally, you will use a relay or two here that supports AUTH, so that it will only allow direct messages to be retrieved by the user they are addressed to.
What happens if you put a relay in here that doesn't support AUTH, so it allows anyone to retrieve your DMs? Not much. Anyone who wants to will just be able to see the encrypted content of the message, and depending on the type of DM they will see the identity of the receiver and perhaps also the sender. They will not be able to decrypt what was actually said in the messages. It's better if they cannot retrieve even that much, though.
Private Relays
This list is found in your 10013 note, if you have one. This is intended for listing a relay that you run yourself and that only you can access, as it will house notes that other users should not be able to see at all, such as eCash tokens and draft notes.
Search Relays
This list is found in your 10007 note, if you have one, and is used to search for notes or users who may not be using the same relays as you. It is good to use relays here that aggregate notes from other relays automatically, and which support NIP-50 for search capability.
Local Relays
This section is for any relays running on the local device, such as Citrine. Because the relays themselves are local, this list is local, as well, and is not saved to any note kind that is saved to your relays like the above lists.
General Relays
This list is found in the "content" tag of your kind 3 note, which is also where all of the npubs you follow are stored. As such, this note is commonly known as your follow list, rather than as a relay list. However, some clients, such as Amethyst, do make use of this list, and others use it as a fallback if they can't find a kind 10002.
If you are an Amethyst user most of the time, then I would recommend using this list to fill in any gaps that you may have from only writing to a few outbox relays, or only reading from a few inbox relays. It's a good place to put an aggregator relay, for instance, so long as that relay has good spam filtering, or a blastr relay, so those who don't yet use a client that supports the outbox model will still likely see your notes.
If you do not generally use Amethyst, then I would recommend you mirror your public inbox/outbox relays here, in case you use a client that cannot find your 10002 list. Relays that are only for outbox should be added as write only, those only for inbox should be added as read only, and those you use for both outbox and inbox should be both read and write.
The Setup (Haven Users)
If you are running your own set of Haven relays, here is the setup I would recommend:
Public Outbox (kind 10002)
Maximum of 4 relays.
- Your Haven outbox relay (Remember to add some public relays to your blastr)
- A paid relay of your choice (List available in "Paid Relays" section)
- A public relay, such as relay.damus.io, relay.primal.net, or nos.lol
Public Inbox (kind 10002)
Maximum of 4 relays.
- Your Haven inbox relay: [RelayAddress]/inbox
- A paid relay of your choice (can be same as outbox)
- A WoT relay of your choice (available in "WoT Relays" section)
- Optional additional WoT relay
DM Inbox
Maximum of 3 relays.
- Your Haven "chat" relay: [RelayAddress]/chat
- An alternate AUTH relay, such as inbox.nostr.wine(paid), nostr.land(paid), or auth.nostr1.com(free).
Private Relays
Maximum of 3 relays.
- Your Haven private relay: [RelayAddress]/private
Search Relays
Maximum of 4 relays.
- wss://nostr.wine (even if you don't pay to write to it)
- wss://relay.nostr.band
- wss://relay.noswhere.com
- wss://search.nos.today
Local Relays
- Your Citrine IP:Port, if you run Citrine.
General Relays
Assuming you use Amethyst on a regular basis, I recommend the following:
- A couple additional WoT relays set to read only.
- An aggregator relay that has good spam filtering, such as wss://aggr.nostr.land(payment required) and/or wss://nostr.wine(paid for write, but can read for free).
The Setup (Not Running Haven)
If you are not running your own set of Haven relays, I would highly recommend you learn how and do so. However, if you decide against it, here is a setup that should suffice:
Public Outbox (kind 10002)
Maximum of 4 relays.
- A paid relay of your choice (List available in "Paid Relays" section)
- A large public relay, such as relay.damus.io, relay.primal.net, or nos.lol
- An additional public relay, but a smaller one, or one-time-payment paid relay.
Public Inbox (kind 10002)
Maximum of 4 relays.
- A paid relay of your choice (can be same as outbox)
- wss://nostr.wine - Even if you don't pay for it, you can read from it.
- A WoT relay of your choice (available in "WoT Relays" section)
- Optional additional WoT relay
DM Inbox
Maximum of 3 relays.
- A paid AUTH relay, such as inbox.nostr.wine or nostr.land.
- An alternate AUTH relay, such as auth.nostr1.com(free).
Private Relays
Maximum of 3 relays.
- A private relay you run on your Umbrel or Start9, or that is hosted for you on relay.tools.
Search Relays
Maximum of 4 relays.
- wss://nostr.wine (even if you don't pay to write to it)
- wss://relay.nostr.band
- wss://relay.noswhere.com
- wss://search.nos.today
Local Relays
- Your Citrine IP:Port, if you run Citrine.
General Relays
Assuming you use Amethyst on a regular basis, I recommend the following:
- A couple additional WoT relays set to read only.
- An aggregator relay that has good spam filtering, such as wss://aggr.nostr.land(payment required).
- A blastr relay, such as filter.nostr.wine(paid), or...
- A few additional public relays set to write only.
Paid Relays
There are a ton of other paid relays out there that can be found via nostr.watch. The above listed options are simply the most popular with the largest feature-sets.
WoT Relays
These relays will only accept notes from npubs that are within the relay owner's WoT. I have provided a Jumble.social address for each relay so you can peruse the feed for yourself to see if you want to use it.
- wss://wot.utxo.one - Jumble Feed
- wss://nostrelites.org - Jumble Feed
- wss://wot.nostr.party - Jumble Feed
- wss://wot.sovbit.host - Jumble Feed
- wss://wot.girino.org - Jumble Feed
- wss://relay.lnau.net - Jumble Feed
- wss://wot.siamstr.com - Jumble Feed
- wss://relay.lexingtonbitcoin.org - Jumble Feed
- wss://wot.azzamo.net - Jumble Feed
- wss://wot.swarmstr.com - Jumble Feed
- wss://zap.watch - Jumble Feed
- wss://satsage.xyz - Jumble Feed
- wss://wons.calva.dev - Jumble Feed
- wss://wot.zacoos.com - Jumble Feed
- wss://wot.shaving.kiwi - Jumble Feed
- wss://wot.tealeaf.dev - Jumble Feed
- wss://wot.nostr.net - Jumble Feed
- wss://relay.goodmorningbitcoin.com - Jumble Feed
- wss://wot.sudocarlos.com - Jumble Feed
-
@ eb0157af:77ab6c55
2025-06-17 23:02:57Carl Rickertsen completely exits his position in Strategy as insiders sell $864 million worth of stock.
As reported by Protos, Carl Rickertsen, a member of Strategy’s board of directors, has fully liquidated his entire shareholding for over $10 million.
Rickertsen’s decision to completely exit his Strategy position marks a sharp shift from his previous investment stance. In 2022, the executive had shown confidence in the company by investing $700,000 in MSTR shares.
On June 13, 2022, Rickertsen purchased $608,000 worth of MSTR stock at $152 per share. Since then, the stock has rallied 152%. However, by 2023, the director had already sold half of his 4,000-share position.
Rickertsen’s approach to managing his holdings has become increasingly aggressive in recent years. Since joining the board in 2019, he has adopted a strategy of immediately liquidating any stock options received.
One example of this tactic occurred on June 2, when he acquired and sold 26,390 MSTR shares on the same day.
As of June 5 this year, Rickertsen reported zero vested Strategy shares, marking the end of his equity involvement with the company.
Rickertsen’s situation is not an isolated case within Strategy. Data from the Securities and Exchange Commission (SEC) reveals a controversial picture. According to information gathered by secform4.com, over the past five years, total insider sales have exceeded purchases by $864 million. This imbalance in insider transactions could raise questions about executives’ confidence in the company’s future.
The post Strategy director liquidates all his MSTR shares appeared first on Atlas21.
-
@ eb0157af:77ab6c55
2025-06-18 00:02:31Carl Rickertsen completely exits his position in Strategy as insiders sell $864 million worth of stock.
As reported by Protos, Carl Rickertsen, a member of Strategy’s board of directors, has fully liquidated his entire shareholding for over $10 million.
Rickertsen’s decision to completely exit his Strategy position marks a sharp shift from his previous investment stance. In 2022, the executive had shown confidence in the company by investing $700,000 in MSTR shares.
On June 13, 2022, Rickertsen purchased $608,000 worth of MSTR stock at $152 per share. Since then, the stock has rallied 152%. However, by 2023, the director had already sold half of his 4,000-share position.
Rickertsen’s approach to managing his holdings has become increasingly aggressive in recent years. Since joining the board in 2019, he has adopted a strategy of immediately liquidating any stock options received.
One example of this tactic occurred on June 2, when he acquired and sold 26,390 MSTR shares on the same day.
As of June 5 this year, Rickertsen reported zero vested Strategy shares, marking the end of his equity involvement with the company.
Rickertsen’s situation is not an isolated case within Strategy. Data from the Securities and Exchange Commission (SEC) reveals a controversial picture. According to information gathered by secform4.com, over the past five years, total insider sales have exceeded purchases by $864 million. This imbalance in insider transactions could raise questions about executives’ confidence in the company’s future.
The post Strategy director liquidates all his MSTR shares appeared first on Atlas21.
-
@ 3bf0c63f:aefa459d
2025-02-22 15:07:57document.characterSet
and another meaningless example of flexibility destroying protocolsI always knew of at least two standardized ways browsers used to determine the charset of a given webpage document: the
Content-Type
header and the<meta charset>
tag. These are widely understood, teached and documented specs that a lot of developers assume are being followed because they're "web standards".Turns out there are a lot of pages on the internet that declare themselves as UTF-8 but are actually using other types of encoding (here's an example), and just by looking at the headers and meta tags you would think they are actually UTF-8, since they render correctly on Chromium and Firefox.
But the actual truth is that browsers actually ignore these headers completely and use their own internal heuristics to determine the actual charset. And they expose their internal result in the DOM property
document.characterSet
."Oh, that's great! Technology is awesome, they've fixed a problem!", you may think. But the actual result of that is:
- developers never learn that they're wrongly declaring "UTF-8" when their content is actually "windows-1252" because they never see their page being rendered wrongly;
- the actual spec is now that browsers should correctly guess a page encoding instead of just following what is written;
- people are fooled and continue to teach, learn (and write) the falsehood of these useless HTTP headers and
<meta>
tags not knowing they are completely wrong. - new browsers coming to the space have to first learn that this is a thing, which is not obvious nor written anywhere, then they must implement it, because if they follow the spec people will think it is their fault that some broken pages are rendered with broken characters on this new browser;
- barriers to entry are higher, the protocol continues to centralize more and more;
- other people trying to read these HTML pages for whatever reason, from any software that isn't Google Chrome or Mozilla Firefox, will have the same problem and will have to learn everything and come up with their own charset detection mechanism, this again closes the content of webpages to being more and more restricted to the walled garden of existing browser vendors.
I think we can all agree these are not good outcomes.
In the end of things, this is just a very small example, but "the web" protocol has thousands of such small examples, and they add up.
Also, arguably the spec should have been "browsers must do their own charset detection" since the beginning, but that's irrelevant. The fact is that it wasn't (and still isn't, the specs weren't updated as far as I know), and here's again another undeniable example of how being flexible can bloat a protocol.
-
@ 31a4605e:cf043959
2025-06-17 17:35:10Desde a sua criação em 2008, Bitcoin tem sido visto como um desafio direto ao sistema bancário tradicional. Desenvolvido como uma alternativa descentralizada ao dinheiro fiduciário, Bitcoin oferece uma forma de armazenar e transferir valor sem depender de bancos, governos ou outras instituições financeiras. Essa característica faz com que seja considerado um símbolo de resistência contra um sistema financeiro que, ao longo do tempo, tem sido marcado por crises, manipulações e restrições impostas aos cidadãos.
Crise financeira de 2008 e o nascimento de Bitcoin
Bitcoin surgiu em resposta à crise financeira de 2008, um colapso que revelou as falhas do sistema bancário global. Bancos centrais imprimiram grandes quantidades de dinheiro para resgatar instituições financeiras irresponsáveis, enquanto milhões de pessoas perderam as suas casas, poupanças e empregos. Nesse contexto, Bitcoin foi criado como um sistema financeiro alternativo, onde não existe uma entidade central com o poder de manipular a economia em benefício próprio.
No primeiro bloco da blockchain ou timechain de Bitcoin, Satoshi Nakamoto incluiu a seguinte mensagem:
"The Times 03/Jan/2009 Chancellor on brink of second bailout for banks."
Essa frase, retirada de uma manchete de jornal da época, simboliza a intenção de Bitcoin de oferecer um sistema financeiro fora do controlo dos bancos e dos governos.
Principais razões pelas quais Bitcoin resiste ao sistema bancário
Descentralização: Ao contrário do dinheiro emitido por bancos centrais, Bitcoin não pode ser criado ou controlado por nenhuma entidade específica. A rede de utilizadores valida as transações de forma transparente e independente.
Oferta limitada: Enquanto os bancos centrais podem imprimir dinheiro sem limites, causando inflação e desvalorização da moeda, Bitcoin tem uma oferta fixa de 21 milhões de unidades, tornando-o resistente à depreciação artificial.
Impossibilidade de censura: Bancos podem bloquear contas e impedir transações a qualquer momento. Com Bitcoin, qualquer pessoa pode enviar e receber fundos sem pedir permissão a terceiros.
Autocustódia: Em vez de confiar os seus fundos a um banco, os utilizadores de Bitcoin podem armazenar as suas próprias moedas, sem risco de congelamento de contas ou falências bancárias.
Conflito entre bancos e Bitcoin
Ataques mediáticos: Grandes instituições financeiras frequentemente classificam Bitcoin como arriscado, volátil ou inútil, tentando desincentivar a sua adoção.
Regulação e repressão: Alguns governos, influenciados pelo setor bancário, têm criado restrições ao uso de Bitcoin, dificultando a sua compra e venda.
Criação de alternativas centralizadas: Muitos bancos centrais estão a desenvolver moedas digitais (CBDCs) que mantêm o controlo do dinheiro digital, mas sem oferecer a liberdade e a descentralização de Bitcoin.
Resumindo, o Bitcoin não é apenas uma moeda digital, mas um movimento de resistência contra um sistema financeiro que falhou repetidamente em proteger o cidadão comum. Ao oferecer uma alternativa descentralizada, transparente e resistente à censura, Bitcoin representa a liberdade financeira e desafia o monopólio dos bancos sobre o dinheiro. Enquanto o sistema bancário tradicional continuar a impor restrições e a controlar o fluxo de capital, Bitcoin permanecerá como um símbolo de independência e soberania financeira.
Muito obrigado por teres lido o texto até aqui, espero que esteja tudo bem contigo e um abraço enorme do teu madeirense bitcoiner maximalista favorito. Viva a liberdade!
-
@ b1ddb4d7:471244e7
2025-06-18 05:00:51The Coinbase Lightning Network is Coinbase’s implementation of Bitcoin’s Lightning Network technology, launched in partnership with Lightspark in April 2024. This innovative solution allows users to send, receive, and pay with bitcoin instantly and cheaply directly from their Coinbase accounts.
Think of the Coinbase Lightning Network as the express lane of bitcoin transactions. While regular bitcoin transfers can take 10-60 minutes and cost several dollars in fees, Lightning Network transactions on Coinbase complete in seconds with fees typically under a cent.
Key Benefits of Coinbase Lightning Network:
- Instant transfers: Transactions complete in seconds, not hours
- Ultra-low fees: 0.2% processing fee vs. traditional network fees
- Global reach: Send bitcoin anywhere in the world instantly
- Cost efficiency: 20 times cheaper than traditional credit card fees
Coinbase Lightning Network vs Regular Bitcoin Transfers
Understanding the difference between Coinbase Lightning Network and regular bitcoin transfers is crucial for choosing the right method:
Feature
Coinbase Lightning Network
Regular Bitcoin Transfer
Speed
Instant (seconds)
10-60 minutes
Fees
0.2% + minimal network fee
$5-50+ depending on network
Best for
Small to medium amounts
Large amounts, long-term storage
Availability
24/7 instant
Subject to network congestion
The Coinbase Lightning Network processes transactions “off-chain,” creating payment channels that settle later on the main Bitcoin blockchain, resulting in dramatically faster and cheaper transactions.
How to Send Bitcoin Using Coinbase Lightning Network
Sending Bitcoin through Coinbase’s Lightning option is incredibly straightforward. Follow these step-by-step instructions:
Step 1: Access Your Coinbase Account
- Sign in to your Coinbase account via web browser or mobile app
- Ensure you have bitcoin (BTC) in your account balance
- Navigate to your portfolio and locate your bitcoin holdings
Step 2: Initiate the Lightning Transfer
- Click “Transfer” then select “Send crypto”
- Choose bitcoin (BTC) as your asset
- Enter the amount you wish to send
- Select Lightning Network as your transfer method
Step 3: Add Recipient Information
- Obtain the Lightning Network invoice from your recipient
- Paste the invoice into the recipient field
- The Coinbase Lightning Network will automatically detect and validate the invoice
- Review the transaction details carefully
Step 4: Complete the Transaction
- Verify the amount and recipient information
- Click “Send” to initiate the transfer
- Your Coinbase Lightning Network transaction will complete within seconds
- Both you and the recipient will receive confirmation notifications
How to Receive Bitcoin via Coinbase Lightning Network
Receiving Bitcoin through Coinbase’s Lightning option requires generating a Lightning invoice. Here’s your complete guide:
Step 1: Generate a Lightning Invoice
- Log into your Coinbase account
- Navigate to “Transfer” then “Receive crypto”
- Select Bitcoin (BTC) as the asset you wish to receive
- Choose “Lightning Network” as your receiving method
Step 2: Create Your Invoice
- Enter the specific amount you want to receive (required for Lightning)
- Add an optional description or memo
- Click “Generate Invoice”
- Your Lightning Network invoice will appear as both a QR code and text string
Step 3: Share Your Invoice
- Copy the Lightning invoice text or share the QR code
- Send this information to the person sending you Bitcoin
- Remember: Lightning invoices expire after 72 hours
- Generate a new invoice if the original expires
Step 4: Receive Your Bitcoin
- Once the sender pays your invoice, you’ll receive instant notification
- The bitcoin will appear in your Coinbase account immediately
- No waiting for blockchain confirmations required with Coinbase Lightning Network
Coinbase Lightning Network Fees and Limits
Understanding the fee structure of Coinbase Lightning Network helps you make informed decisions:
- Processing Fee: 0.2% of the transfer amount
- Network Fee: Minimal (typically fractions of a cent)
- Minimum Amount: Varies by region, typically $0.1- 5
- Maximum Amount: Subject to your account limits and Lightning Network capacity
The Coinbase Lightning Network offers significant savings compared to traditional bitcoin transfers, especially for smaller amounts under $1,000.
Troubleshooting Common Coinbase Lightning Network Issues
Even with the user-friendly Coinbase Lightning Network, you might encounter some challenges:
Invoice Expired Error
- Solution: Generate a fresh Lightning invoice
- Prevention: Complete transactions promptly after generating invoices
Transaction Failed
- Cause: Insufficient Lightning Network liquidity or routing issues
- Solution: Try again in a few minutes or use smaller amounts
Can’t Find Lightning Option
- Check: Ensure Lightning is available in your region
- Verify: Update your Coinbase app to the latest version
Address Whitelist Issues
- Problem: Lightning invoices may not work with address whitelisting enabled
- Solution: Temporarily disable whitelisting or contact Coinbase support
The Coinbase Lightning Network transforms bitcoin from a store of value into a practical, everyday payment method. With instant transactions, minimal fees, and user-friendly implementation, it’s never been easier to send and receive bitcoin.
-
@ 472f440f:5669301e
2025-06-11 04:37:33Marty's Bent
Sup, freaks? Your Uncle Marty did a little vibe coding a couple months ago and that vibe coding project has turned into an actual product that is live in the Google Chrome web store and will soon to be live in the Firefox add-on store as well. It's called Opportunity Cost and it is an extension that enables you to price the internet in Bitcoin.
Opportunity Cost – See Prices in Bitcoin Instantly
Check it out!
This whole process has been extremely rewarding to me for many reasons. The first of which is that I've had many ideas in the past to launch a product focused on bitcoin education that simply never left my brain because I never felt comfortable paying a developer to go out and build a product that I wasn't sure would ultimately get product market fit.
Due to the advancements of AI, particularly ChatGPT and Replit, I was able to spend a few hours on a Saturday vibe coding a prototype for Opportunity Cost. It worked. I side loaded it into Chrome and Firefox, tested it out for a few days and decided, "Hey, I think this is something that's worthwhile and should be built."
Backtracking just a little bit, the initial idea for this app was to create an AR application that would enable you to take pictures of goods in the real world and have their prices automatically converted to bitcoin so that you could weigh the opportunity cost of whether or not you actually wanted to buy that good or decide to save in bitcoin instead. With the help of Justin Moon from the Human Rights Foundation and Anthony Ronning from OpenSecret and Maple AI, I was pointed in the right direction of vibe coding tools I could use to build a simple MVP. I took their advice, built the MVP, and demoed it at the Bitcoin Park Austin weekly AI meetup in mid-April.
The next week, I was talking with a friend, Luke Thomas, about the idea and during our conversation he made a simple quip, "You should make a Chrome extension. I really want a Chrome extension that does this." And that's what sent me down the vibe coding rabbit hole that Saturday which led to the prototype.
After I was comfortable with and confident in the prototype, I found a young hungry developer by the name of Moses on Nostr, I reached out to him, told him my idea, showed him the prototype and asked if he thought he could finish the application for me. He luckily agreed to do so and within a couple of weeks we had a fully functioning app that was officially launched today. We're about 12 hours into the launch and I must say that I'm pleasantly surprised with the reception from the broader Bitcoin community. It seems like something that people are happy exists and I feel extremely happy that people see some value in this particular application.
Now that you have the backstory, let's get into why I think something like Opportunity Cost should exist. As someone who's been writing a newsletter and producing podcasts about bitcoin for eight years in an attempt to educate individuals from around the world about what bitcoin is, why it's important, and how they can leverage it, I've become convinced that a lot of the work that needs to be done still exists at the top of the funnel. You can scream at people. You can grab them by the shoulders. You can shake them. You can remind them at Thanksgiving that if they had listened to your advice during any Thanksgiving in the previous years they would be better off financially. But at the end of the day most people don't listen. They need to see things. Seeing things for yourself is a much more effective teaching mechanism than be lectured to by someone else.
My hope with Opportunity Cost is that it catches the eye of some bitcoin skeptics or individuals who may be on the cusp of falling down the bitcoin rabbit hole and they see the extension as a way to dip their toes into bitcoin to get a better understanding of the world by pricing the goods and services they purchase on a day-to-day month-to-month and year-to-year basis in bitcoin without having to download a wallet or set up an exchange account. The tippy top of the bitcoin marketing funnel.
That is not all though. I think Opportunity Cost can serve individuals at both ends of the funnel. That's why it's pretty exciting to me. It's as valuable to the person who is bitcoin curious and looking to get a better understanding as it is to the hardcore bitcoiner living on a bitcoin standard who is trying to get access to better tools that enable him to get a better grasp of their spending in bitcoin terms.
Lastly, after playing around with it for a few days after I built the prototype, I realized that it has incredible memetic potential. Being able to take a screenshot of goods that people are buying on a day-to-day basis, pricing them in bitcoin and then sharing them on social media is very powerful. Everything from houses to junk items on Amazon to the salaries of pro athletes to your everyday necessities. Seeing the value of those things in bitcoin really makes you think.
One day while I was testing the app, I tried to see how quickly I could find goods on the internet that cumulatively eclipsed the 21 million supply cap limit of bitcoin. To my surprise, even though I've been in bitcoin for 12 years now, it did not take me that long. The opportunity cost of everything I buy on a day-to-day basis becomes very clear when using the extension. What's even clearer is the fact that Bitcoin is completely mispriced at current levels. There is so much winning ahead of us.
Also, it's probably important to note that the extension is open source. You can check out our GitHub page here. Submit pull requests. Suggest changes to the app.
We've also tried to make Opportunity Cost as privacy preserving as possible. Everything within the extension happens in your browser. The only external data that we're providing is the bitcoin to fiat price conversion at any given point in time. We're not data harvesting the web pages you're browsing or the items you're looking at. We're not collecting data and sending it to third party marketers. We want to align ourselves with the open and permissionless nature of bitcoin while also preserving our users' privacy. We're not trying to monetize this in that way. Though, I will say that I'm thinking of ways to monetize Opportunity Cost if it does gain significant traction, but I promise it will be in a way that respects your privacy and is as unobtrusive as possible. We'll see how it goes.
Thank you for coming to my TED talk. Please download and use the extension. Let us know what you think.
Headlines of the Day
Saylor Says Bitcoin Is Perfect Money to Jordan Peterson - via X
Trump Won't Sell Tesla Despite Musk-Bessent Heated Exchange - via X
Bitcoin Gains Traction in Kenya's Largest Slum Kibera - via X
Get our new STACK SATS hat - via tftcmerch.io
Bitcoin’s Next Parabolic Move: Could Liquidity Lead the Way?
Is bitcoin’s next parabolic move starting? Global liquidity and business cycle indicators suggest it may be.
Read the latest report from Unchained and TechDev, analyzing how global M2 liquidity and the copper/gold ratio—two historically reliable macro indicators—are aligning once again to signal that a new bitcoin bull market may soon begin.
Ten31, the largest bitcoin-focused investor, has deployed $150.00M across 30+ companies through three funds. I am a Managing Partner at Ten31 and am very proud of the work we are doing. Learn more at ten31.vc/invest.
Final thought...
East Coast aesthetics over everything.
*Download our free browser extension, Opportunity Cost: *<<https://www.opportunitycost.app/>> start thinking in SATS today.
*Get this newsletter sent to your inbox daily: *https://www.tftc.io/bitcoin-brief/
Subscribe to our YouTube channels and follow us on Nostr and X:
-
@ 97c70a44:ad98e322
2025-06-06 20:48:33Vibe coding is taking the nostr developer community by storm. While it's all very exciting and interesting, I think it's important to pump the brakes a little - not in order to stop the vehicle, but to try to keep us from flying off the road as we approach this curve.
In this note Pablo is subtweeting something I said to him recently (although I'm sure he's heard it from other quarters as well):
nostr:nevent1qvzqqqqqqypzp75cf0tahv5z7plpdeaws7ex52nmnwgtwfr2g3m37r844evqrr6jqy2hwumn8ghj7un9d3shjtnyv9kh2uewd9hj7qghwaehxw309aex2mrp0yh8qunfd4skctnwv46z7qg6waehxw309ac8junpd45kgtnxd9shg6npvchxxmmd9uqzq0z48d4ttzzkupswnkyt5a2xfkhxl3hyavnxjujwn5k2k529aearwtecp4
There is a naive, curmudgeonly case for simply "not doing AI". I think the intuition is a good one, but the subject is obviously more complicated - not doing it, either on an individual or a collective level, is just not an option. I recently read Tools for Conviviality by Ivan Illich, which I think can help us here. For Illich, the best kind of tool is one which serves "politically interrelated individuals rather than managers".
This is obviously a core value for bitcoiners. And I think the talks given at the Oslo Freedom Forum this year present a compelling case for adoption of LLMs for the purposes of 1. using them for good, and 2. developing them further so that they don't get captured by corporations and governments. Illich calls both the telephone and print "almost ideally convivial". I would add the internet, cryptography, and LLMs to this list, because each one allows individuals to work cooperatively within communities to embody their values in their work.
But this is only half the story. Illich also points out how "the manipulative nature of institutions... have put these ideally convivial tools at the service of more [managerial dominance]."
Preventing the subversion and capture of our tools is not just a matter of who uses what, and for which ends. It also requires an awareness of the environment that the use of the tool (whether for virtuous or vicious ends) creates, which in turn forms the abilities, values, and desires of those who inhabit the environment.
The natural tendency of LLMs is to foster ignorance, dependence, and detachment from reality. This is not the fault of the tool itself, but that of humans' tendency to trade liberty for convenience. Nevertheless, the inherent values of a given tool naturally gives rise to an environment through use: the tool changes the world that the tool user lives in. This in turn indoctrinates the user into the internal logic of the tool, shaping their thinking, blinding them to the tool's influence, and neutering their ability to work in ways not endorsed by the structure of the tool-defined environment.
The result of this is that people are formed by their tools, becoming their slaves. We often talk about LLM misalignment, but the same is true of humans. Unreflective use of a tool creates people who are misaligned with their own interests. This is what I mean when I say that AI use is anti-human. I mean it in the same way that all unreflective tool use is anti-human. See Wendell Berry for an evaluation of industrial agriculture along the same lines.
What I'm not claiming is that a minority of high agency individuals can't use the technology for virtuous ends. In fact, I think that is an essential part of the solution. Tool use can be good. But tools that bring their users into dependence on complex industry and catechize their users into a particular system should be approached with extra caution. The plow was a convivial tool, and so were early tractors. Self-driving John Deere monstrosities are a straightforward extension of the earlier form of the technology, but are self-evidently an instrument of debt slavery, chemical dependency, industrial centralization, and degradation of the land. This over-extension of a given tool can occur regardless of the intentions of the user. As Illich says:
There is a form of malfunction in which growth does not yet tend toward the destruction of life, yet renders a tool antagonistic to its specific aims. Tools, in other words, have an optimal, a tolerable, and a negative range.
The initial form of a tool is almost always beneficial, because tools are made by humans for human ends. But as the scale of the tool grows, its logic gets more widely and forcibly applied. The solution to the anti-human tendencies of any technology is an understanding of scale. To prevent the overrun of the internal logic of a given tool and its creation of an environment hostile to human flourishing, we need to impose limits on scale.
Tools that require time periods or spaces or energies much beyond the order of corresponding natural scales are dysfunctional.
My problem with LLMs is:
- Not their imitation of human idioms, but their subversion of them and the resulting adoption of robotic idioms by humans
- Not the access they grant to information, but their ability to obscure accurate or relevant information
- Not their elimination of menial work, but its increase (Bullshit Jobs)
- Not their ability to take away jobs, but their ability to take away the meaning found in good work
- Not their ability to confer power to the user, but their ability to confer power to their owner which can be used to exploit the user
- Not their ability to solve problems mechanistically, but the extension of their mechanistic value system to human life
- Not their explicit promise of productivity, but the environment they implicitly create in which productivity depends on their use
- Not the conversations they are able to participate in, but the relationships they displace
All of these dysfunctions come from the over-application of the technology in evaluating and executing the fundamentally human task of living. AI work is the same kind of thing as an AI girlfriend, because work is not only for the creation of value (although that's an essential part of it), but also for the exercise of human agency in the world. In other words, tools must be tools, not masters. This is a problem of scale - when tool use is extended beyond its appropriate domain, it becomes what Illich calls a "radical monopoly" (the domination of a single paradigm over all of human life).
So the important question when dealing with any emergent technology becomes: how can we set limits such that the use of the technology is naturally confined to its appropriate scale?
Here are some considerations:
- Teach people how to use the technology well (e.g. cite sources when doing research, use context files instead of fighting the prompt, know when to ask questions rather than generate code)
- Create and use open source and self-hosted models and tools (MCP, stacks, tenex). Refuse to pay for closed or third-party hosted models and tools.
- Recognize the dependencies of the tool itself, for example GPU availability, and diversify the industrial sources to reduce fragility and dependence.
- Create models with built-in limits. The big companies have attempted this (resulting in Japanese Vikings), but the best-case effect is a top-down imposition of corporate values onto individuals. But the idea isn't inherently bad - a coding model that refuses to generate code in response to vague prompts, or which asks clarifying questions is an example. Or a home assistant that recognized childrens' voices and refuses to interact.
- Divert the productivity gains to human enrichment. Without mundane work to do, novice lawyers, coders, and accountants don't have an opportunity to hone their skills. But their learning could be subsidized by the bots in order to bring them up to a level that continues to be useful.
- Don't become a slave to the bots. Know when not to use it. Talk to real people. Write real code, poetry, novels, scripts. Do your own research. Learn by experience. Make your own stuff. Take a break from reviewing code to write some. Be independent, impossible to control. Don't underestimate the value to your soul of good work.
- Resist both monopoly and "radical monopoly". Both naturally collapse over time, but by cultivating an appreciation of the goodness of hand-crafted goods, non-synthetic entertainment, embodied relationship, and a balance between mobility and place, we can relegate new, threatening technologies to their correct role in society.
I think in all of this is implicit the idea of technological determinism, that productivity is power, and if you don't adapt you die. I reject this as an artifact of darwinism and materialism. The world is far more complex and full of grace than we think.
The idea that productivity creates wealth is, as we all know, bunk. GDP continues to go up, but ungrounded metrics don't reflect anything about the reality of human flourishing. We have to return to a qualitative understanding of life as whole, and contextualize quantitative tools and metrics within that framework.
Finally, don't believe the hype. Even if AI delivers everything it promises, conservatism in changing our ways of life will decelerate the rate of change society is subjected to and allow time for reflection and proper use of the tool. Curmudgeons are as valuable as technologists. There will be no jobspocalypse if there is sufficient political will to value human good over mere productivity. It's ok to pump the breaks.
-
@ df478568:2a951e67
2025-06-17 21:37:10It can already be used for pay-to-send e-mail. The send dialog is resizable and you can enter as long of a message as you like. It's sent directly when it connects. The recipient double-clicks on the transaction to see the full message. If someone famous is getting more e-mail than they can read, but would still like to have a way for fans to contact them, they could set up Bitcoin and give out the IP address on their website. "Send X bitcoins to my priority hotline at this IP and I'll read the message personally." -- Satoshi Nakamoto, January 17, 2009
"It might make sense just to get some in case it catches on. If enough people think the same way, that becomes a self-fulfilling prophecy. Once it gets bootstrapped, there are so many applications if you could effortlessly pay a few cents to a website as easily as dropping coins in a vending machine." -- Satoshi Nakamoto, January 17, 2009
"Forgot to add the good part about micropayments. While I don't think Bitcoin is practical for smaller micropayments right now, it will eventually be as storage and bandwidth costs continue to fall. If Bitcoin catches on on a big scale, it may already be the case by that time. Another way they can become more practical is if I implement client-only mode and the number of network nodes consolidates into a smaller number of professional server farms. Whatever size micropayments you need will eventually be practical. I think in 5 or 10 years, the bandwidth and storage will seem trivial." -- Satoshi Nakamoto, August 10, 2010
"It can already be used for pay-to-send e-mail. The send dialog is resizable and you can enter as long of a message as you like. It's sent directly when it connects. The recipient double-clicks on the transaction to see the full message. If someone famous is getting more e-mail than they can read, but would still like to have a way for fans to contact them, they could set up Bitcoin and give out the IP address on their website. "Send X bitcoins to my priority hotline at this IP and I'll read the message personally." -- Satoshi Nakamoto, January 17, 2009
"It might make sense just to get some in case it catches on. If enough people think the same way, that becomes a self-fulfilling prophecy. Once it gets bootstrapped, there are so many applications if you could effortlessly pay a few cents to a website as easily as dropping coins in a vending machine." -- Satoshi Nakamoto, January 17, 2009
"Forgot to add the good part about micropayments. While I don't think Bitcoin is practical for smaller micropayments right now, it will eventually be as storage and bandwidth costs continue to fall. If Bitcoin catches on on a big scale, it may already be the case by that time. Another way they can become more practical is if I implement client-only mode and the number of network nodes consolidates into a smaller number of professional server farms. Whatever size micropayments you need will eventually be practical. I think in 5 or 10 years, the bandwidth and storage will seem trivial." -- Satoshi Nakamoto, August 10, 2010
Bitcoin Is Winning Fast AF
I began writing about using the lightning network about 150,000 blocks ago because I got tired of hearing that bitcoin can't make more than 7 transactions a minute. That was true 565,000 blocks ago, but is no longer true since the inception of the lightning network. For example:
- We sent 4,187 bitcoin payments over an 8-hour period at Bitcoin 2025, a Guinness Book of World Record winning achievement.
- Nostr is the biggest bitcoin circular economy in the world.
- Shake N Steak, a U.S.-based Hamburger franchise, accepts bitcoin over the Lightning Network at all of its locations.
- We can pay our credit cards with fractions of bitcoin (sats).
- We can use bitcoin over the lightning network to pay AI agents to do vibe coding using tools like Stacks and Goose.
- Bitcoin Helped Secure An Election In A County In Georgia.
I pay for Protonmail with bitcoin on-chain.
I can also use this email to send it to other people who do the same. I've only done this once to test it out, but it works. This is not new. The time chain uses Hashcash (with a double SHA256 algorithm instead of SHA1) for its famous proof-of-work. Hashcash was originally intended to prevent spam. Now you can use bitcoin to do the same.
I ran the numbers. Our world record is an average of 8.72 bitcoin transactions per second. This is just in one place, but bitcoin is a global monetary network. Bitcoin over the lightning network makes it possible to send value at the speed of light, anywhere in the world.
We won a world record. We are winning. We use money that we know works better than gold.
"If you don't believe me or don't get it, I don't have time to try to convince you, sorry." -- Satoshi Nakamoto
☮️ nostr:npub1marc26z8nh3xkj5rcx7ufkatvx6ueqhp5vfw9v5teq26z254renshtf3g0
Zap This Blog would like to think The Nakamoto Institute for making it easy to find these awsome Satoshi quotes. If you like this article, please Zap The Nakamoto Institute!
-
@ 93bfc86d:fc8e91f5
2025-06-18 04:59:05노스터를 처음 시작하는 사용자라면 자신의 상황에 따라 어떤 앱을 사용할지 선택할 수 있다.
만약 라이트닝 노드를 직접 운영하고 있다면 아이폰 사용자는 다무스Damus, 안드로이드 사용자는 애머시스트Amethyst, 데스크탑 웹 브라우저에서는 스노트Snort 등의 앱을 추천한다. NWC를 통한 연결로 자신의 라이트닝 노드에서 잽Zap을 보낼 수 있기 때문이다.
만약 라이트닝 노드를 운영하지 않고, 노스터를 처음 이용한다면 프라이멀Primal 앱 사용을 추천한다. 프라이멀 앱은 앱 내에서 자체적으로 라이트닝 지갑을 이용할 수 있기 때문에 잽을 주고 받기가 더욱 쉽다. 그러나 분명히 인지해야 할 사실은 프라이멀에서 사용하는 지갑은 수탁 라이트닝 서비스이므로 거래소와 같은 위험 수준이 있다. 월렛오브사토시나 스트라이크와 비슷하다고 생각하면 된다.
이제 프라이멀 앱 사용 방법에 대해 알아보자.
앱 설치 및 개인키-공개키 쌍 생성
앱스토어 또는 구글 플레이스토어에서 'Primal'을 검색하고 앱을 다운로드 받는다.
이전에 노스터를 사용한 적 없다면 [Create Account]를 누른다. 만약 이전에 노스터를 사용한 적이 있어서 노스터 개인키인 nsec이 있다면 [Sign In]을 눌러 nsec을 입력하고 로그인할 수도 있다.
[Display Name]에 닉네임을 입력하고 [Next]를 누른다.
관심사를 선택하라는 창이 나온다. 그런데 여기서 관심사를 선택하면 자신이 팔로우를 원치 않는 계정들까지 전부 팔로우가 된다. 따라서 일단 [art]만 선택한 뒤 [Next]를 누른다. 뒤에서 해제할 것이다.
다음 화면으로 넘어가면 [Customize follows now]를 선택하고, [Next]를 누른다.
앞에서 말한 것처럼 모든 관심사를 끌 것이다. 'ART' 옆에 있는 [unfollow all]를 누르고, 아래에 있는 [Next]를 누른다.
[Create Account Now] → [Continue] → [I'll do this later]를 누른다.
그러면 개인키-공개키 쌍이 생성된 것이다. 노스터는 다른 중앙집중화된 SNS 플랫폼들과 달리 비트코인처럼 개인키-공개키 쌍을 만들면 그게 자신의 계정이 된다. 개인키는 nsec이라 하며, 공개키는 npub이라 한다. 따라서 개인키인 nsec을 백업해놓는 것은 매우 중요하다.
왼쪽 상단의 프로필 사진을 터치한다. 그 다음 [SETTINGS] → [Keys]에 들어간다.
'PRIVATE KEY' 옆에 나오는 [show key]를 누르면 개인키가 보인다. [Copy private key]를 눌러 개인키를 메모 앱 등에 암호화된 상태로 저장해놓거나, 종이에다가 잘 적는 등의 물리적인 백업을 해놓자.
다른 사람들에게 npub 알려주기
누군가에게 자신의 계정을 알려줄 때는 자신의 노스터 공개키인 npub을 알려주면 된다. 프라이멀에서 먼저 좌측 상단 프로필 모양을 누른다. 그러면 닉네임 옆에 QR코드 모양이 있다. 이 QR코드 모양을 터치한다. 그러면 QR코드가 나오는데, 이 QR코드를 캡처해서 상대방에게 보여주거나, 그 밑에 있는 npub 우측의 복사 버튼을 눌러 상대방에게 보내주면 된다.
팔로우 추가
처음에는 아무런 글도 안 나타날 것이다. 팔로우하고 있는 계정이 없기 때문이다. 오른쪽 상단 검색 버튼을 누른다. 여기에 자신이 팔로우하고 싶은 계정의 공개키 npub을 붙여넣으면 사람이 뜰 것이다.
예를 들어 필자의 공개키는 아래와 같다.
npub1jwlusmv555g5ytdwxeds6k3e8u9dgyf75fscznc2eqpemlywj86st0nf2k
필자의 계정을 팔로우하는 과정을 알아보자. 검색창에 npub을 붙여넣고 프로필이 나오면 프로필을 누른다. 다음에 나오는 화면에서 오른쪽의 [follow] 버튼을 누르면 필자를 팔로우할 수 있다. 혹은 그 아래에 있는 팔로잉(following), 팔로워(followers) 목록을 보고 마음에 드는 프로필을 찾아 들어가 팔로우를 할 수 있다. 이런 방식으로 관심이 있는 계정을 팔로우하면 피드에 글이 뜨기 시작한다.
잽을 위한 지갑 추가
프라이멀에서는 자체적인 라이트닝 지갑을 추가하고, 거기에 비트코인을 보낸 뒤 잽을 보낼 수 있다.
먼저 하단 탭 가운데에 있는 번개 모양의 버튼을 누른다. 그 다음 [Activate Wallet Now]를 누른다.
다른 라이트닝 수탁 서비스들처럼 기본 정보를 받는다. 'first name'에는 성을 제외한 이름, 'last name'에는 성, 'your email address'에는 이메일 주소, 'your date of birth'에는 생년월일, 'country of residence'에는 거주 지역을 적는다. 이때 다른 것들은 실제 정보와 상이하게 적더라도 이메일만큼은 제대로 적어야 한다. 바로 뒤에 이메일 인증을 해야 하기 때문이다. 여타 라이트닝 수탁 서비스들과 마찬가지로, 이러한 수탁 서비스들은 언제나 동결 위험이 있다. 따라서 이러한 상황들에 대비해 정보를 제대로 적을지, 상이하게 적을지는 당신의 자유이며, 당신이 책임져야 한다.
잘 입력하고 [Next]를 누르면 입력했던 이메일로 확인 코드가 온다. 이메일에서 코드를 확인한다. 만약 이메일이 보이지 않는다면 스팸메일함에 메일이 있는 것은 아닌지 확인하자.
이메일에서 확인했던 코드를 프라이멀 앱 화면에 입력하고 [Finish]를 누른다.
그러면 어떤 이메일 주소처럼 생긴 주소가 나온다. 이것이 프라이멀에서 생성한 라이트닝 지갑의 라이트닝 주소다. 아래 [Close]를 누른다.
성공적으로 지갑이 생성되었다. [RECEIVE]를 누르면 라이트닝 주소와 그에 해당하는 QR코드가 보여진다. COPY를 눌러 이 라이트닝 주소로 비트코인을 보내거나, [ADD DETAILS]를 통해 인보이스를 발행하여 비트코인을 보낼 수 있다. 프라이멀 지갑에 비트코인을 보내 잔액이 생기면 잽을 보낼 수 있다.
-
@ 4c96d763:80c3ee30
2025-06-17 20:20:24Changes
Fernando López Guevara (2):
- fix: skip blurring for user's own images
- fix(search): make input background gray in light mode
William Casarin (24):
- clippy: fix large enum.
- clippy: fix large enum.
- scroll: simple fix
- note: cleanup wide/standard implementation
- android: hover post button when narrow
- fix note response regression
- nix: emulator
- log: less verbose unknown id logging
- chrome: collapsible side panel
- dave: small cleanup
- dave: add chrome toggle button
- chrome: extract method to function
- chrome: extract more non-methods
- Initial tab bar
- chrome: hook up toolbar actions
- toolbar: process actions
- nix: add $ANDROID_JAR helper to shell
- add input context menu helper
- thread: enable selectable text in threads
- universe: add full tabs
- android: fix build
- dave: initial android fixes
- android: arboard clipboard support
- android: add initial ci
alltheseas (1):
- Update README.md with deepwiki badge (#875)
kernelkind (1):
- bugfix: txn failed
pushed to notedeck:refs/heads/master
-
@ cae03c48:2a7d6671
2025-06-17 22:01:57Bitcoin Magazine
Flash Releases Free Bitcoin Invoicing Tool with No Fees, KYC, or CustodyFlash, a Bitcoin payment platform, just announced it has launched Flash Invoicing, a completely free, non-custodial, and KYC-free Bitcoin invoicing tool. Designed for freelancers, the platform allows users to send professional invoices without platform fees, identity checks, or third party custody.
According to Deel, a crypto payments company for freelancers, Bitcoin is the most used cryptocurrency in the world for payments. Despite this growth, many freelancers continue to use basic methods such as pasting Bitcoin addresses into PDFs or emails. Some rely on custodial platforms that deduct fees or require identity verification, which can affect both earnings and data privacy.
“We’ve seen too many people paste BTC addresses into documents and call it invoicing,” said the CEO of Flash Pierre Corbin. “It’s messy. It’s risky. And it’s time for something better.”
Flash Invoicing Features:
- 0% platform fees: no subscriptions or commission
- Non-custodial: Bitcoin goes straight to the user’s wallet
- No KYC: users maintain full privacy
- Professional output: branded PDFs and secure payment links
- Integrated dashboard: manage payments, clients, and revenue
- Works with Flash ecosystem: including Stores, Donations, Paywalls, and POS
Many Bitcoin invoicing tools charge a percentage per transaction or require a subscription. As a result, freelancers often lose part of their income simply to issue an invoice and receive payment. Flash is aiming to solve this issue.
“Freelancers work hard enough. The last thing they need is a platform skimming off their earnings,” said Corbin. “That’s why we dropped our fee from 1.5% to 0% — and launched the first invoicing tool that’s truly free, without compromising on privacy or control.”
Flash Invoicing allows users to accept Bitcoin payments without relinquishing control, privacy, or revenue. It is integrated with the broader Flash suite, enabling users to manage invoicing alongside features such as setting up stores, receiving donations, or gating premium content.
“As a freelancer myself, I love using the Flash invoicing feature,” stated a freelancer & Flash user. ”It keeps all my clients in one place, allows me to easily edit invoices and track payments. Much more professional than sending a lightning address in the footer of a PDF invoice.”
This post Flash Releases Free Bitcoin Invoicing Tool with No Fees, KYC, or Custody first appeared on Bitcoin Magazine and is written by Oscar Zarraga Perez.
-
@ dbe0605a:f8fd5b2c
2025-02-17 06:42:38Originally posted on Nostr: https://highlighter.com/a/naddr1qvzqqqr4gupzpklqvpdfcuch9wkh2gary7erd4275jmrf6qw0z5sz0dhj8u06kevqyvhwumn8ghj7urjv4kkjatd9ec8y6tdv9kzumn9wshszxrhwden5te0ve5kcar9wghxummnw3ezuamfdejj7qgwwaehxw309ahx7uewd3hkctcpz4mhxue69uhhyetvv9ujuerpd46hxtnfduhszythwden5te0dehhxarj9emkjmn99uqzqjn0d9hz6argv5k57ur9dck5y6t5vdhkjm3df4shqtt5xduxz6tsrdmw7l
I care deeply about bitcoin adoption and ability to use bitcoin with all features of money — saving, spending, earning. We're entering an age where more and more people realise "hodl never spend" meme is hindering bitcoin adoption. More and more of use want to use bitcoin in everyday life, because we're living on it and because it's superior in every aspect. It's also incredibly fun to use it for payments.
For money to thrive, it needs to circulate. Spending bitcoin orangepills merchants, their families and people around them — with each bitcoiner coming to a shop and paying with bitcoin, it's a point of contact that can trigger a train of though that later may fruit into action — "Why are they so interested in bitcoin, what's actually so special about it?" "Hmm, maybe this time I will not exchange it for fiat immediately?"
Global merchant adoption grows, every day new business around the world decide to start accepting bitcoin payments. Circular economies are blooming on all continents, where people live in a new, experimental, orange coin paradigm. Companies and projects like Blink, Bitcoin Jungle, Plan B, Orange Pill App do an amazing job in facilitating this — providing great wallets, tools & services for merchants, and finally onboarding merchants themself. They also often support circular economies financially or in other ways. This is very valuable and makes the road to hyperbitcoinization a tad shorter.
But there is one thing those companies are doing wrong — they're using their own, proprietary maps that display only merchants using their own wallets or POS software. I'd like to now list a few reasons why those great projects should migrate their maps into an open source, bitcoin map that is BTC Map.
Open source, stupid
BTCmap is open source, built on OpenStreetMaps, open to both developers contributions but also for map taggers (called shadowy supertaggers). Anyone can contribute, even If you don't code. Anyone can verify merchants or add new merchants to the map. BTC Map team developed a neat system of verifications that just works better than anything before or any alternative maps today.
Many apps, one map
BTC Map is integrated inside a dozen of wallets and apps, to name a few: Wallet of Satoshi, Coinos, Bitlocal, Fedi or Aqua. It's a public good that any bitcoin product can use and grow it's network effect.
Uniting mappers' work
BTC Map does not discriminate bitcoin merchants, that means all the merchants from proprietary maps are being mapped by taggers to BTC Map. By mapping on a closed source, proprietary map, the same merchant is mapped two times, usually by two different people — it's duplicating the same work without any bringing any benefit to both projects. Using BTC Map also brings you way more people verifying If those merchants actually still accept bitcoin, making it easier to have an up-to-date database of actual adoption.
More bitcoin spent at your merchants
When you have a business focused on spending bitcoin and onboarding merchants, you want as much bitcoin spent there as possible. If a bitcoiner coming to the area does not use your own map but some other map, they can be completely unaware that they can let their sats flow to your merchants. If we all use one merchants database, this problem disappears and more sats will flow. Why wouldn't you want your merchants displayed in dozens of other apps, completely for free?
OpenStreetMap map is just better
Take a look at the image above: It's La Pirraya, a small sleepy island town in El Salvador with a circular economy being facilitated by Bitcoin Beach. Even though Blink has many more merchants compared to BTC Map, when I visited it a few months ago I could find them. Not because they do not exist, but because the map does not show any roads and it was very hard to locate them in a dense network of narrow streets of La Pirraya. BTC Map allows you to turn multiple versions of satellite maps views, making it way easier to find your point of interest. Pins also indicate what kind of business it is, where in Blink all the pins are the same and you need to click each to find out what it is. Even then not always it's clear, since Blink only displays names, while BTC Map tells you type of the merchant, and very often shows you working hours, phone numbers, website, social links, etc.
Excellent community tools
BTC Map is focusing providing tools for communities to maintain their merchants map. Each community has it's own page with own links to community website or socials, displays a list of all the merchants, shows community stats, displays merchants that were not verified for a long time, and more. It even allows to "boost" merchants to make them more visible on the map and on the list. It's perfect tooling both for communities and businesses onboarding merchants to their software.
Easy integration & configuration
Integrating BTC Map on your website or app is easy. It's just a few lines of code of iframe to embed the map, but you can also use BTC Map API for more custom integration. Do you to display, eg. you can display only merchants from your community? No problem, you can do that. Since it's all open source, you can configure it in many ways that will suit your needs.
Kudos
I'd like to thank projects that understood all above and integrated BTC Map already. Those are Coinos, Wallet of Satoshi, Pouch, Bolt Card, BitLocal, Fedi, Decouvre Bitcoin, Osmo, Bitcoin Rocks!, Lipa, Spirit of Satoshi, Blockstream, Satlantis, Aqua Wallet and Adopting Bitcoin
Encouragement & an offer
I'll end that with encouragement to projects that use their own maps, but haven't embraced BTC Map yet. Those are Blink, Bitcoin Jungle, Plan B, Osmo, Athena, Orange Pill App, Inbitcoin (I probably missed some, tag them!). You are doing great work, but let's join forces and paint the world orange together!
From here I would like to offer help in tagging your merchants on BTC Map. Just reach me out, and me and other supertaggers will do the work.
Let the sats flow!
originally posted at https://stacker.news/items/888088
-
@ 4ba8e86d:89d32de4
2025-06-17 17:21:45A sede do ProtonMail está localizada na Suíça, um país conhecido por suas leis rigorosas de privacidade, embora a empresa tenha enfrentado alguns desafios, como ataques DDoS e pressão do governo suíço, ela continua comprometida em fornecer um serviço seguro e privado aos seus usuários.
O ProtonMail foi fundado em 2014 por um grupo de cientistas do CERN (Organização Europeia para Pesquisa Nuclear) que queriam criar uma plataforma de e-mail segura e privada que usasse criptografia de ponta a ponta. O objetivo era oferecer aos usuários uma alternativa aos serviços de e-mail tradicionais que frequentemente violam a privacidade dos usuários.A equipe fundadora incluía Andy Yen, Jason Stockman e Wei Sun, todos com formação em física e matemática.
Ao longo dos anos, o ProtonMail lançou vários recursos adicionais, incluindo aplicativos móveis para iOS e Android, integração com Tor e a possibilidade de enviar e-mails criptografados para usuários de outros provedores de e-mail. O ProtonMail também lançou uma VPN (rede privada virtual) chamada ProtonVPN, que segue o mesmo compromisso com a privacidade e segurança dos usuários.
A criptografia de ponta a ponta utilizada pelo ProtonMail assegura a proteção de todas as mensagens de seus usuários. O processo de criptografia ocorre no dispositivo do remetente antes do envio das mensagens aos servidores da ProtonMail, onde elas são armazenadas em formato criptografado. Quando o destinatário abre a mensagem, ela é descriptografada no dispositivo do destinatário, garantindo que somente o destinatário possa ler o conteúdo da mensagem. Isso significa que, mesmo que os servidores da ProtonMail sejam violados, as mensagens dos usuários permanecerão seguras e protegidas.
O ProtonMail oferece suporte à autenticação de dois fatores usando chaves de segurança YubiKey. Isso adiciona uma camada extra de segurança ao login da conta do ProtonMail, pois um invasor precisaria não apenas da senha, mas também da chave física para acessar a conta do usuário. A YubiKey é uma opção popular para autenticação de dois fatores, pois é fácil de usar e oferece proteção adicional contra-ataques de phishing e keylogging. O ProtonMail também suporta outras opções de autenticação de dois fatores, aplicativos de autenticação, como o Aegis Authenticator.
Outra funcionalidade importante é a proteção contra phishing e spam. O ProtonMail utiliza algoritmos avançados de filtragem para identificar e bloquear mensagens maliciosas antes que elas cheguem à caixa de entrada do usuário. Isso ajuda a reduzir a quantidade de spam recebida e a proteger contra-ataques de phishing, que tentam enganar o usuário a fornecer informações pessoais.
Passo a passo instalação do aplicativo protonmail no Android:
-
Baixe e instale o aplicativo protonmail em seu dispositivo móvel no F-droid ou obtainium.
-
Clique em "Criar nova conta" se você ainda não tiver uma conta ProtonMail, ou clique em "Fazer login" se já tiver uma conta.
-
Se você está criando uma nova conta, preencha os campos de registro, incluindo seu endereço de e-mail desejado e uma senha forte.
-
Depois de criar ou fazer login em sua conta, você pode usar o ProtonMail em seu dispositivo Android para enviar e receber e-mails seguros e protegidos.
Lembre-se de que, para garantir a privacidade e a segurança de suas informações, é importante usar uma senha forte e habilitar a autenticação de dois fatores. Utilize o Tor para acessar seu e-mail no site onion e considere usar uma VPN.
No Relatório de Transparência do ProtonMail, em muitos casos, a única informação que eles puderam fornecer foi um e-mail de recuperação (opcional na criação da conta) ou o IP que acessou o e-mail.
A própria ProtonMail recomenda o uso do Tor para acesso anônimo ao serviço. Se um juiz exigir a coleta do seu IP, a Proton não terá essa informação se você acessar seu e-mail via o site onion pelo Tor.
Se você é uma pessoa em situação de risco, como um ativista ou alguém que pode ser perseguido por diversos motivos, é essencial tomar medidas excepcionais: 1. Pague pelo serviço com Bitcoin. 2. Não use informações que possam identificá-lo ao se registrar. 3. Utilize o Tor, ou uma VPN, sempre que acessar o ProtonMail.
-
-
@ c631e267:c2b78d3e
2025-06-06 18:54:04Willst du den Charakter eines Menschen kennenlernen, \ so gib ihm Macht. \ Abraham Lincoln
Vermutlich war Friedrich Merz erleichtert nach seinem Besuch beim US-Präsidenten im Oval Office. Dem Bundeskanzler kam zwar neben der Wortgewalt Donald Trumps eher eine Statistenrolle in der Medienrunde zu, aber es hätte natürlich viel schlimmer kommen können. Deswegen hatte er sich wohl vorher Ratschläge geholt, wie man hört unter anderem vom ukrainischen Präsidenten Wolodymyr Selenskyj. Offiziell gab der deutsche Regierungschef sogar an, «außerordentlich zufrieden» mit seinem Antrittsbesuch zu sein.
Dabei gibt es aktuell doch mehr Differenzen als Gemeinsamkeiten. Zu den Themen, mit denen es eine sehr unterschiedliche Umgehensweise hier und dort gibt, gehört die Gesundheit. Trumps Gesundheitsminister, Robert F. Kennedy Jr., kritisiert zum Beispiel, die meisten US-Universitäten würden den Studenten zu wenig über die Bedeutung gesunder Ernährung beibringen. Im Vordergrund der medizinischen Ausbildung stünde zu sehr die Behandlung der Menschen mit Medikamenten. Daher plant er, den Fakultäten die Bundesmittel zu streichen, wenn sie ihren Studenten keine Ernährungskurse anbieten.
Der oft als Verschwörungstheoretiker diffamierte RFK Jr. ist auch Teil des wachsenden Widerstands gegen Geoengineering-Aktivitäten. Die Manipulation von Wetter und Klima beispielsweise durch das Freisetzen von Chemikalien in die Atmosphäre kann kaum gesund sein und soll daher mit Louisiana jetzt in einem weiteren US-Bundesstaat verboten werden. Kennedy hatte derartige Maßnahmen auch schon als ein Verbrechen bezeichnet, das es zu stoppen gelte.
Indes ist der deutsche Beitrag in diesem Kontext, dass Ex-Gesundheitsminister und Covid-Impfpflicht-Befürworter Karl Lauterbach jetzt zum Klimaexperten mutiert. Laut Spiegel soll er Mitglied einer Kommission für Klima und Gesundheit bei der Weltgesundheitsorganisation werden, angeblich unentgeltlich. Vermutlich möchte die WHO im Sinne ihrer One-Health-Initiative mit solcher Lobbyarbeit für «Klimaschutz als Teil des Gesundheitsschutzes» ihren globalen Führungsanspruch untermauern.
Das Thema «Corona» ist im Übrigen noch lange nicht erledigt und das Narrativ bekommt weitere Risse. Nachdem Kennedy in den USA den Covid-«Impfstoff» für gesunde Kinder und schwangere Frauen aus dem empfohlenen Impfplan gestrichen hat, ist eine CDC-Beraterin zurückgetreten, die die Gen-Injektionen für Schwangere gefördert hatte. Auch die australische Regierung hat ihre Impfempfehlungen aktualisiert. Sie räumt jetzt ein, dass der Nutzen des «Impfstoffs» die Schäden für gesunde Jugendliche nicht überwiegt.
Gleichzeitig berichten Medien von einer neuen, anhaltenden «Covid-19-Welle» in China. Es gebe Befürchtungen, dass es zu erneuten Lockdowns und anderen drastischen Maßnahmen kommen könnte, obwohl sich die «Infektionen» laut den Gesundheitsbehörden auf einem Abwärtstrend befinden. In einigen Schulen seien Schüler isoliert und unter Quarantäne gestellt worden.
Isolierung, Überwachung und Kontrolle sind ebenfalls ein höchst ungesundes Erbe der «Coronazeit». Die weltweit vielfach eingeführten digitalen «Impfpässe» wurden als Instrument benutzt, um Kampagnen für digitale Identitäten zu fördern und die entsprechenden Systeme aufzubauen. Gerade hat auch Griechenland mit der Einführung seiner «Personal Citizen Number» den Grundstein für ein einheitliches digitales ID-System gelegt.
Derweil schlagen Datenschützer Alarm wegen des Tracking-Potenzials der sogenannten «Phone Home»-Funktion vieler digitaler Ausweise. Dieses «Feature», bei dem im Hintergrund jedesmal der Aussteller kontaktiert wird, um eine Angabe zu überprüfen, werde ganz leise in der Gesellschaft eingeführt, warnen sie. Das gebe den Regierungen den Vorgeschmack auf eine Macht, die sie kaum jemals wieder loslassen würden. Dagegen hilft nur eins: wachsam sein, hinterfragen und im Zweifel «Nein» sagen, anstatt auf eine vermeintliche Bequemlichkeit hereinzufallen.
[Titelbild: Pixabay]
Dieser Beitrag wurde mit dem Pareto-Client geschrieben und ist zuerst auf Transition News erschienen.
-
@ 65912a7a:5dc638bf
2025-02-09 20:34:15I didn’t set out to become an enemy of the world’s richest man, but I seem to have managed it all the same. Until this moment, I’ve resisted describing my falling out with Elon Musk in much detail, but as the man’s cultural influence has metastasized—and he continues to spread lies about me on the social media platform that he owns (Twitter/X)—it seems only appropriate to set the record straight. I know that it annoys many in my audience to see me defend myself against attacks that they recognize to be spurious, but they might, nevertheless, find the details of what happened with Elon interesting.
Of all the remarkable people I’ve met, Elon is probably the most likely to remain a world-historical figure—despite his best efforts to become a clown. He is also the most likely to squander his ample opportunities to live a happy life, ruin his reputation and most important relationships, and produce lasting harm across the globe. None of this was obvious to me when we first met, and I have been quite amazed at Elon’s evolution, both as a man and as an avatar of chaos. The friend I remember did not seem to hunger for public attention. But his engagement with Twitter/X transformed him—to a degree seldom seen outside of Marvel movies or Greek mythology. If Elon is still the man I knew, I can only conclude that I never really knew him.
When we first met, Elon wasn’t especially rich or famous. In fact, I recall him teetering on the brink of bankruptcy around 2008, while risking the last of his previous fortune to make payroll at Tesla. At the time, he was living off loans from his friends Larry and Sergey. Once Elon became truly famous, and his personal wealth achieved escape velocity, I was among the first friends he called to discuss his growing security concerns. I put him in touch with Gavin de Becker, who provided his first bodyguards, and recommended other changes to his life. We also went shooting on at least two occasions with Scott Reitz, the finest firearms instructor I’ve ever met. It is an ugly irony that Elon’s repeated targeting of me on Twitter/X has increased my own security concerns. He understands this, of course, but does not seem to care.
So how did we fall out? Let this be a cautionary tale for any of Elon’s friends who might be tempted to tell the great man something he doesn’t want to hear:
(1.) When the SARS-CoV-2 virus first invaded our lives in March of 2020, Elon began tweeting in ways that I feared would harm his reputation. I also worried that his tweets might exacerbate the coming public-health emergency. Italy had already fallen off a cliff, and Elon shared the following opinion with his tens of millions of fans :
the coronavirus panic is dumb
As a concerned friend, I sent him a private text:
Hey, brother— I really think you need to walk back your coronavirus tweet. I know there’s a way to parse it that makes sense (“panic” is always dumb), but I fear that’s not the way most people are reading it. You have an enormous platform, and much of the world looks to you as an authority on all things technical. Coronavirus is a very big deal, and if we don’t get our act together, we’re going to look just like Italy very soon. If you want to turn some engineers loose on the problem, now would be a good time for a breakthrough in the production of ventilators...
(2.) Elon’s response was, I believe, the first discordant note ever struck in our friendship:
Sam, you of all people should not be concerned about this.
He included a link to a page on the CDC website, indicating that Covid was not even among the top 100 causes of death in the United States. This was a patently silly point to make in the first days of a pandemic.
We continued exchanging texts for at least two hours. If I hadn’t known that I was communicating with Elon Musk, I would have thought I was debating someone who lacked any understanding of basic scientific and mathematical concepts, like exponential curves.
(3.) Elon and I didn’t converge on a common view of epidemiology over the course of those two hours, but we hit upon a fun compromise: A wager. Elon bet me $1 million dollars (to be given to charity) against a bottle of fancy tequila ($1000) that we wouldn’t see as many as 35,000 cases of Covid in the United States (cases, not deaths). The terms of the bet reflected what was, in his estimation, the near certainty (1000 to 1) that he was right. Having already heard credible estimates that there could be 1 million deaths from Covid in the U.S. over the next 12-18 months (these estimates proved fairly accurate), I thought the terms of the bet ridiculous—and quite unfair to Elon. I offered to spot him two orders of magnitude: I was confident that we’d soon have 3.5 million cases of Covid in the U.S. Elon accused me of having lost my mind and insisted that we stick with a ceiling of 35,000.
(4.) We communicated sporadically by text over the next couple of weeks, while the number of reported cases grew. Ominously, Elon dismissed the next batch of data reported by the CDC as merely presumptive—while confirmed cases of Covid, on his account, remained elusive.
(5.) A few weeks later, when the CDC website finally reported 35,000 deaths from Covid in the U.S. and 600,000 cases, I sent Elon the following text:
Is (35,000 deaths + 600,000 cases) > 35,000 cases?
(6.) This text appears to have ended our friendship. Elon never responded, and it was not long before he began maligning me on Twitter for a variety of imaginary offenses. For my part, I eventually started complaining about the startling erosion of his integrity on my podcast, without providing any detail about what had transpired between us.
(7.) At the end of 2022, I abandoned Twitter/X altogether, having recognized the poisonous effect that it had on my life—but also, in large part, because of what I saw it doing to Elon. I’ve been away from the platform for over two years, and yet Elon still attacks me. Occasionally a friend will tell me that I’m trending there, and the reasons for this are never good. As recently as this week, Elon repeated a defamatory charge about my being a “hypocrite” for writing a book in defense of honesty and then encouraging people to lie to keep Donald Trump out of the White House. Not only have I never advocated lying to defeat Trump (despite what that misleading clip from the Triggernometry podcast might suggest to naive viewers), I’ve taken great pains to defend Trump from the most damaging lie ever told about him. Elon knows this, because we communicated about the offending clip when it first appeared on Twitter/X. However, he simply does not care that he is defaming a former friend to hundreds of millions of people—many of whom are mentally unstable. On this occasion, he even tagged the incoming president of the United States.
All of this remains socially and professionally awkward, because Elon and I still have many friends in common. Which suggests the terms of another wager that I would happily make, if such a thing were possible—and I would accept 1000 to 1 odds in Elon’s favor:
I bet that anyone who knows us both knows that I am telling the truth.
Everyone close to Elon must recognize how unethical he has become, and yet they remain silent. Their complicity is understandable, but it is depressing all the same. These otherwise serious and compassionate people know that when Elon attacks private citizens on Twitter/X—falsely accusing them of crimes or corruption, celebrating their misfortunes—he is often causing tangible harm in their lives. It’s probably still true to say that social media “isn’t real life,” until thousands of lunatics learn your home address.
A final absurdity in my case, is that several of the controversial issues that Elon has hurled himself at of late—and even attacked me over—are ones we agree about. We seem to be in near total alignment on immigration and the problems at the southern border of the U.S. We also share the same concerns about what he calls “the woke mind virus.” And we fully agree about the manifest evil of the so-called “grooming-gangs scandal” in the U.K. The problem with Elon, is that he makes no effort to get his facts straight when discussing any of these topics, and he regularly promotes lies and conspiracy theories manufactured by known bad actors, at scale. (And if grooming were really one of his concerns, it’s strange that he couldn’t find anything wrong with Matt Gaetz.)
Elon and I even agree about the foundational importance of free speech. It’s just that his approach to safeguarding it—amplifying the influence of psychopaths and psychotics, while deplatforming real journalists and his own critics; or savaging the reputations of democratic leaders, while never saying a harsh word about the Chinese Communist Party—is not something I can support. The man claims to have principles, but he appears to have only moods and impulses.
Any dispassionate observer of Elon’s behavior on Twitter/X can see that there is something seriously wrong with his moral compass, if not his perception of reality. There is simply no excuse for a person with his talents, resources, and opportunities to create so much pointless noise. The callousness and narcissism conveyed by his antics should be impossible for his real friends to ignore—but they appear to keep silent, perhaps for fear of losing access to his orbit of influence.
Of course, none of this is to deny that the tens of thousands of brilliant engineers Elon employs are accomplishing extraordinary things. He really is the greatest entrepreneur of our generation. And because of the businesses he’s built, he will likely become the world’s first trillionaire—perhaps very soon. Since the election of Donald Trump in November, Elon’s wealth has grown by around $200 billion. That’s nearly $3 billion a day (and over $100 million an hour). Such astonishing access to resources gives Elon the chance—and many would argue the responsibility—to solve enormous problems in our world.
So why spend time spreading lies on X?
-
@ eb0157af:77ab6c55
2025-06-17 22:03:15The banking giant is exploring an expansion of its blockchain services, focusing on digital payments and currencies.
JPMorgan Chase has filed a new trademark application for the name “JPMD.” The filing was submitted on June 15 to the United States Patent and Trademark Office (USPTO).
The application, filed by JPMorgan Chase Bank, N.A., covers a broad range of services related to digital assets and blockchain technology. These include the issuance of digital currencies, electronic payment processing, and financial custody services — all of which suggest a possible new stablecoin initiative for JPMorgan.
Experience with JPM Coin
This move wouldn’t be JPMorgan’s first foray into blockchain-based finance. The bank already operates JPM Coin, a dollar-pegged stablecoin used to enable instant transactions between institutional clients. The token runs on Quorum, a private blockchain network developed in-house by JPMorgan and based on Ethereum’s technology.
The registration of the JPMD trademark comes as JPMorgan and other major U.S. banks are considering a collaborative stablecoin project through their jointly owned entities: Early Warning Services and The Clearing House.
Similarly, corporations like Walmart and Amazon are mulling the creation of their own stablecoins.
The post JPMorgan files trademark for ‘JPMD’: a new stablecoin on the horizon for the American bank appeared first on Atlas21.
-
@ 0155373a:ba3e1bed
2025-01-09 00:01:05Imagine an internet where you don’t need a big Internet Service Provider (ISP) to stay connected—an internet powered by the people, for the people. Decentralized internet is no longer a far-fetched idea; it's becoming a reality through community-driven networks. These networks rely on individuals within a community to act as "nodes," connecting their neighbors to the web and bypassing traditional ISPs.
What is Decentralized Internet?
Decentralized internet refers to a system where control over connectivity and access is distributed among individuals or local organizations rather than being concentrated in large ISPs. Instead of paying a single company for access, people in a community collaborate to build and maintain the network themselves.
How Does It Work?
- Mesh Networks: Each participant (or node) in the network connects to nearby nodes, creating a web of connectivity. This eliminates the need for a central ISP.
- Hardware: Nodes are powered by simple devices like routers or small computers running specialized software.
- Peer-to-Peer Sharing: Data flows through multiple nodes in the network, ensuring redundancy and reliability.
- Backbone Connection: Some networks may still rely on a single connection to a traditional ISP for broader internet access, but others can connect to decentralized backbone providers or satellites.
Benefits of Decentralized Internet
- Affordable Access: By cutting out traditional ISPs, communities can lower the cost of internet access.
- Empowerment: Communities gain control over their own connectivity and data, reducing reliance on corporations.
- Resilience: Decentralized networks are less prone to outages since they don’t depend on a single point of failure.
- Privacy: With less reliance on ISPs, there’s less risk of surveillance and data tracking.
- Inclusivity: Remote or underserved areas can establish connectivity without waiting for ISPs to expand their infrastructure.
Real-World Examples
- Guifi.net: A community network in Spain that has thousands of nodes providing internet to rural areas.
- NYC Mesh: A grassroots effort in New York City to create an affordable, community-owned internet.
- Althea: A project enabling neighbors to share internet bandwidth and earn income for participating in the network.
How to Get Started
- Educate Yourself: Research mesh network technologies like OpenWRT, LibreMesh, or BATMAN.
- Form a Group: Collaborate with neighbors or community organizations to pool resources.
- Get the Hardware: Invest in routers and antennas that support mesh networking.
- Set Up Nodes: Position nodes strategically to ensure strong connections across the community.
- Collaborate: Join forces with regional or global decentralized internet initiatives for support and knowledge sharing.
The Future of Decentralized Internet
As internet access becomes increasingly vital, decentralized networks present a way to bridge the digital divide and democratize connectivity. By building these systems, communities can take charge of their digital futures and ensure that no one is left behind.
Together, we can create an internet that is truly open, accessible, and resilient. The power lies in our hands—let’s connect, one node at a time.
-
@ 32e18276:5c68e245
2025-06-03 14:45:176 years ago I created some tools for working with peter todd's opentimestamps proof format. You can do some fun things like create plaintext and mini ots proofs. This short post is just a demo of what these tools do and how to use them.
What is OTS?
OpenTimestamps is a protocol for stamping information into bitcoin in a minimal way. It uses OP_RETURN outputs so that it has minimal impact on chain, and potentially millions of documents are stamped all at once with a merkle tree construction.
Examples
Here's the proof of the
ots.c
source file getting stamped into the ots calendar merkle tree. We're simply printing the ots proof file here withotsprint
:``` $ ./otsprint ots.c.ots
version 1 file_hash sha256 f76f0795ff37a24e566cd77d1996b64fab9c871a5928ab9389dfc3a128ec8296 append 2e9943d3833768bdb9a591f1d2735804 sha256 | --> append 2d82e7414811ecbf | sha256 | append a69d4f93e3e0f6c9b8321ce2cdd90decd34d260ea3f8b55e83d157ad398b7843 | sha256 | append ac0b5896401478eb6d88a408ec08b33fd303b574fb09b503f1ac1255b432d304 | sha256 | append 8aa9fd0245664c23d31d344243b4e8b0 | sha256 | prepend 414db5a1cd3a3e6668bf2dca9007e7c0fc5aa6dc71a2eab3afb51425c3acc472 | sha256 | append 5355b15d88d4dece45cddb7913f2c83d41e641e8c1d939dac4323671a4f8e197 | sha256 | append a2babd907ca513ab561ce3860e64a26b7df5de117f1f230bc8f1a248836f0c25 | sha256 | prepend 683f072f | append 2a4cdf9e9e04f2fd | attestation calendar https://alice.btc.calendar.opentimestamps.org | --> append 7c8764fcaba5ed5d | sha256 | prepend f7e1ada392247d3f3116a97d73fcf4c0994b5c22fff824736db46cd577b97151 | sha256 | append 3c43ac41e0281f1dbcd7e713eb1ffaec48c5e05af404bca2166cdc51966a921c | sha256 | append 07b18bd7f4a5dc72326416aa3c8628ca80c8d95d7b1a82202b90bc824974da13 | sha256 | append b4d641ab029e7d900e92261c2342c9c9 | sha256 | append 4968b89b02b534f33dc26882862d25cca8f0fa76be5b9d3a3b5e2d77690e022b | sha256 | append 48c54e30b3a9ec0e6339b88ed9d04b9b1065838596a4ec778cbfc0dfc0f8c781 | sha256 | prepend 683f072f | append 8b2b4beda36c18dc | attestation calendar https://bob.btc.calendar.opentimestamps.org | --> append baa878b42ef3e0d45b324cc3a39a247a | sha256 | prepend 4fb1bc663cd641ad18e5c73fb618de1ae3d28fb5c3c224b7f9888fd52feb09ec | sha256 | append 731329278830c9725497d70e9f5a02e4b2d9c73ff73560beb3a896a2f180fdbf | sha256 | append 689024a9d57ad5daad669f001316dd0fc690ac4520410f97a349b05a3f5d69cb | sha256 | append 69d42dcb650bb2a690f850c3f6e14e46c2b0831361bac9ec454818264b9102fd | sha256 | prepend 683f072f | append bab471ba32acd9c3 | attestation calendar https://btc.calendar.catallaxy.com append c3ccce274e2f9edfa354ec105cb1a749 sha256 append 6297b54e3ce4ba71ecb06bd5632fd8cbd50fe6427b6bfc53a0e462348cc48bab sha256 append c28f03545a2948bd0d8102c887241aff5d4f6cf1e0b16dfd8787bf45ca2ab93d sha256 prepend 683f072f append 7f3259e285891c8e attestation calendar https://finney.calendar.eternitywall.com ```
The tool can create a minimal version of the proofs:
``` $ ./otsmini ots.c.ots | ./otsmini -d | ./otsprint
version 1 file_hash sha256 f76f0795ff37a24e566cd77d1996b64fab9c871a5928ab9389dfc3a128ec8296 append 2e9943d3833768bdb9a591f1d2735804 sha256 append c3ccce274e2f9edfa354ec105cb1a749 sha256 append 6297b54e3ce4ba71ecb06bd5632fd8cbd50fe6427b6bfc53a0e462348cc48bab sha256 append c28f03545a2948bd0d8102c887241aff5d4f6cf1e0b16dfd8787bf45ca2ab93d sha256 prepend 683f072f append 7f3259e285891c8e attestation calendar https://finney.calendar.eternitywall.com ```
which can be shared on social media as a string:
5s1L3tTWoTfUDhB1MPLXE1rnajwUdUnt8pfjZfY1UWVWpWu5YhW3PGCWWoXwWBRJ16B8182kQgxnKyiJtGQgRoFNbDfBss19seDnco5sF9WrBt8jQW7BVVmTB5mmAPa8ryb5929w4xEm1aE7S3SGMFr9rUgkNNzhMg4VK6vZmNqDGYvvZxBtwDMs2PRJk7y6wL6aJmq6yoaWPvuxaik4qMp76ApXEufP6RnWdapqGGsKy7TNE6ZzWWz2VXbaEXGwgjrxqF8bMstZMdGo2VzpVuE
you can even do things like gpg-style plaintext proofs:
``` $ ./otsclear -e CONTRIBUTING.ots -----BEGIN OPENTIMESTAMPS MESSAGE-----
Email patches to William Casarin jb55@jb55.com
-----BEGIN OPENTIMESTAMPS PROOF-----
AE9wZW5UaW1lc3RhbXBzAABQcm9vZgC/ieLohOiSlAEILXj4GSagG6fRNnR+CHj9e/+Mdkp0w1us gV/5dmlX2NrwEDlcBMmQ723mI9sY9ALUlXoI//AQRXlCd716J60FudR+C78fkAjwIDnONJrj1udi NDxQQ8UJiS4ZWfprUxbvaIoBs4G+4u6kCPEEaD8Ft/AIeS/skaOtQRoAg9/jDS75DI4pKGh0dHBz Oi8vZmlubmV5LmNhbGVuZGFyLmV0ZXJuaXR5d2FsbC5jb23/8AhMLZVzYZMYqwjwEPKWanBNPZVm kqsAYV3LBbkI8CCfIVveDh/S8ykOH1NC6BKTerHoPojvj1OmjB2LYvdUbgjxBGg/BbbwCGoo3fi1 A7rjAIPf4w0u+QyOLi1odHRwczovL2FsaWNlLmJ0Yy5jYWxlbmRhci5vcGVudGltZXN0YW1wcy5v cmf/8Aik+VP+n3FhCwjwELfTdHAfYQNa49I3CYycFbkI8QRoPwW28AgCLn93967lIQCD3+MNLvkM jiwraHR0cHM6Ly9ib2IuYnRjLmNhbGVuZGFyLm9wZW50aW1lc3RhbXBzLm9yZ/AQ3bEwg7mjQyKR PykGgiJewAjwID5Q68dY4m+XogwTJx72ecQEe5lheCO1RnlcJSTFokyRCPEEaD8Ft/AIw1WWPe++ 8N4Ag9/jDS75DI4jImh0dHBzOi8vYnRjLmNhbGVuZGFyLmNhdGFsbGF4eS5jb20= -----END OPENTIMESTAMPS PROOF-----
$ ./otsclear -v <<<proof_string... # verify the proof string ```
I've never really shared these tools before, I just remembered about it today. Enjoy!
Try it out: https://github.com/jb55/ots-tools
-
@ 47750177:8969e41a
2025-01-09 12:00:0028.1 Release Notes
Bitcoin Core version 28.1 is now available from:
This release includes new features, various bug fixes and performance improvements, as well as updated translations.
Please report bugs using the issue tracker at GitHub:
https://github.com/bitcoin/bitcoin/issues
To receive security and update notifications, please subscribe to:
https://bitcoincore.org/en/list/announcements/join/
How to Upgrade
If you are running an older version, shut it down. Wait until it has completely shut down (which might take a few minutes in some cases), then run the installer (on Windows) or just copy over
/Applications/Bitcoin-Qt
(on macOS) orbitcoind
/bitcoin-qt
(on Linux).Upgrading directly from a version of Bitcoin Core that has reached its EOL is possible, but it might take some time if the data directory needs to be migrated. Old wallet versions of Bitcoin Core are generally supported.
Running Bitcoin Core binaries on macOS requires self signing.
cd /path/to/bitcoin-28.x/bin xattr -d com.apple.quarantine bitcoin-cli bitcoin-qt bitcoin-tx bitcoin-util bitcoin-wallet bitcoind test_bitcoin codesign -s - bitcoin-cli bitcoin-qt bitcoin-tx bitcoin-util bitcoin-wallet bitcoind test_bitcoin
Compatibility
Bitcoin Core is supported and extensively tested on operating systems using the Linux Kernel 3.17+, macOS 11.0+, and Windows 7 and newer. Bitcoin Core should also work on most other UNIX-like systems but is not as frequently tested on them. It is not recommended to use Bitcoin Core on unsupported systems.
Notable changes
P2P
- When the
-port
configuration option is used, the default onion listening port will now be derived to be that port + 1 instead of being set to a fixed value (8334 on mainnet). This re-allows setups with multiple local nodes using different-port
and not using-bind
, which would lead to a startup failure in v28.0 due to a port collision.
Note that a
HiddenServicePort
manually configured intorrc
may need adjustment if used in connection with the-port
option. For example, if you are using-port=5555
with a non-standard value and not using-bind=...=onion
, previously Bitcoin Core would listen for incoming Tor connections on127.0.0.1:8334
. Now it would listen on127.0.0.1:5556
(-port
plus one). If you configured the hidden service manually in torrc now you have to change it fromHiddenServicePort 8333 127.0.0.1:8334
toHiddenServicePort 8333 127.0.0.1:5556
, or configure bitcoind with-bind=127.0.0.1:8334=onion
to get the previous behavior. (#31223) - #30568 addrman: change internal id counting to int64_tKey
-
31166 key: clear out secret data in DecodeExtKey
Build
-
31013 depends: For mingw cross compile use
-gcc-posix
to prevent library conflict -
31502 depends: Fix CXXFLAGS on NetBSD
Test
-
31016 test: add missing sync to feature_fee_estimation.py
-
31448 fuzz: add cstdlib to FuzzedDataProvider
-
31419 test: fix MIN macro redefinition
-
31563 rpc: Extend scope of validation mutex in generateblock
Doc
-
31007 doc: add testnet4 section header for config file
CI
-
30961 ci: add LLVM_SYMBOLIZER_PATH to Valgrind fuzz job
Misc
-
31267 refactor: Drop deprecated space in
operator""_mst
-
31431 util: use explicit cast in MultiIntBitSet::Fill()
Credits
Thanks to everyone who directly contributed to this release:
- fanquake
- Hennadii Stepanov
- laanwj
- MarcoFalke
- Martin Zumsande
- Marnix
- Sebastian Falbesoner
As well as to everyone that helped with translations on Transifex.
- When the
-
@ a5ee4475:2ca75401
2025-06-06 15:30:41[EM ATUALIZAÇÃO]
vacina #saude #politica #manipulacao #mundial #genocidio #pandemia #conspiracao
"Aqueles que não conseguem lembrar o passado estão condenados a repeti-lo." - George Satayana
Este artigo reúne algumas menções e evidências mais antigas que vim registrando durante alguns anos em relação a Covid-19, vacinas obrigatórias e a ação de agências de governo, fundações, políticos, mídia tradicional, celebridades, influenciadores, cientistas, redes sociais e laboratórios, em envolvimento com genocídio e restrições de liberdades em escala mundial causado por decisões em várias esferas relativas ao covid e as vacinas obrigatórias em geral.
Porém, alguns links podem não estar mais disponíveis, foram que ainda faltam ser registradas muitas informações já divulgadas nos últimos anos e que muitos não tiveram contato pela escassez de meios para a obtenção dessas informações de forma organizada.
Portanto, o presente artigo ainda passará por atualizações de conteúdo e formatação. Logo, se possível, ajudem sugerindo complementos ou alterações, ou com doações.
Noções iniciais:
- O termo 'Coronavírus' (COVID) é na verdade um nome genérico para vários vírus de gripes já comuns, dado para o tipo corona (com uma "coroa", 'espetos' ao redor dele), o Sars-Cov-2 (que passou a ser chamado erroneamente só de Covid), é só um deles.
- SARS-CoV-2 é que é nome do vírus. Ele que causa a doença Covid-19;
- O coronavírus SARS-CoV-2 é o segundo tipo de SARS-CoV documentado, o primeiro ocorreu entre 2002 e 2003, se originando também da China e também dito como tendo origem animal;
- SARS (Severe Acute Respiratory Syndrome) - Síndrome Respiratória Aguda Grave (SRAG) é a uma doença respiratória viral, relatada ser de origem zoonótica (animal), causada pelos coronavírus SARS-CoV (2002) e SARS-CoV-2 (2019), ambos de origem chinesa;
1. Vacinas Obrigatórias em Geral
23/01/2025 - [Pesquisa] Vacinas nos EUA causando autismo em crianças https://publichealthpolicyjournal.com/vaccination-and-neurodevelopmental-disorders-a-study-of-nine-year-old-children-enrolled-in-medicaid/
- O CDC admite que 98 milhões de pessoas receberam o vírus do câncer através da vacina da Poliomielite https://medicinanews.com.br/frente/frente_1/o-cdc-admite-que-98-milhoes-de-pessoas-receberam-o-virus-do-cancer-atraves-da-vacina-poliomielite/
"O CDC (Os Centros de Controle e Prevenção de Doenças dos Estados Unidos) removeu rapidamente uma página do seu site, que estava em cache no Google, como você pode ver logo abaixo, admitindo que mais de 98 milhões de americanos receberam uma ou mais doses de vacina contra pólio dentro de 8 período entre 1955 e 1963, quando uma proporção da vacina foi contaminada com um poliomavírus causador de câncer chamado SV40."
Fonte original da imagem: https://preventdisease.com/images13/CDC_Polio.png [indisponível] - A imagem foi trocada por outra de menor qualidade e em outro link, mas eu já tinha a imagem original salva.
Imagem arquivada em: https://web.archive.org/web/20201203231640/
27/02/2021 - Por que o Japão demorou para vacinar, mesmo com Olimpíada se aproximando https://www.cnnbrasil.com.br/internacional/2021/02/27/por-que-o-japao-demorou-para-vacinar-mesmo-com-olimpiada-se-aproximando
"Desconfiança da população japonesa em relação a vacinas, ligada a casos ocorridos no passado, está entre razões que atrasaram imunização no país.
A resistência à vacina do Japão remonta à década de 1970, quando duas crianças morreram dentro de 24 horas após receberem a vacina combinada contra difteria, tétano e coqueluche (coqueluche). A vacina foi temporariamente suspensa, mas a confiança já havia sido abalada. Por vários anos, as taxas de vacinação infantil caíram, levando a um aumento nos casos de tosse convulsa.
No final dos anos 1980, houve outro susto com a introdução da vacina tripla contra sarampo, caxumba e rubéola produzida no Japão. As primeiras versões do imunizante foram associadas à meningite asséptica, ou inchaço das membranas ao redor do cérebro e da medula espinhal. O problema foi rastreado até o componente caxumba da vacina tripla, o que levou a uma ação judicial e a indenização por danos pesados.
O Instituto Nacional de Ciências da Saúde interrompeu a dose combinada em 1993 e a substituiu por vacinas individuais. Após o escândalo, Shibuya disse que o governo japonês se tornou "ciente dos riscos" e seu programa nacional de vacinação tornou-se voluntário.
O Dr. Yuho Horikoshi, especialista em doenças infecciosas, diz que os processos levaram a uma "lacuna de vacinação", em que nenhuma vacina foi aprovada no Japão por cerca de 15 anos.
Mais recentemente, em 2013, o Japão adicionou a vacina contra o papilomavírus humano (HPV) ao calendário nacional para proteger as meninas contra o vírus sexualmente transmissível, que é conhecido por causar câncer cervical. No entanto, vídeos de meninas supostamente sofrendo de reações adversas começaram a circular no YouTube, levando o governo a retirá-los da programação nacional."
2. PRIMEIRAS OCORRÊNCIAS PREDITIVAS AO COVID-19
2002 - Síndrome respiratória aguda grave (SARS) Brenda L. Tesini (setembro de 2018). Síndrome respiratória aguda grave (SARS) [indisponível]. Manual Merck. Consultado em 23 de janeiro de 2020, citado no Wikipedia
SARS - Wikipédia: "A SARS [doença do vírus SARS-CoV] foi detectada pela primeira vez no fim de 2002 na China. Entre 2002 e 2003, um surto da doença resultou em mais de 8 000 casos e cerca de 800 mortes em todo o mundo."
2010 - Fundação Rockfeller, Lockstep. https://www.rockefellerfoundation.org/wp-content/uploads/Annual-Report-2010-1.pdf
Neste PDF da fundação Rockfeller, em seu próprio site, a fundação deixou claro o seu envolvimento em casos de ‘contenção’ de pandemias juntamente com a USAID (agência americana com nome ambíguo, como formalmente ‘United States Agency for International Development’, mas soando como ‘US Socorre’, mas sendo um braço do governo democrata que financiava interferências políticas diretas em vários países, como em intervenções no Brasil ), inclusive em relacionadas ao SARS, o mesmo sintoma dos coronavírus Sars-Cov e Sars-Cov-2 (o vírus propagado em 2019) e que causa o COVID-19.
Segundo eles:
“Integração entre Regiões e Países
A Fundação Rockefeler investiu US$ 22 milhões em sua Iniciativa de Redes de Vigilância de Doenças para ajudar a conter a disseminação de doenças infecciosas e pandemias, fortalecendo os sistemas nacionais, regionais e globais de vigilância e resposta a doenças. Dois programas-chave da Rockefeler — a Rede de Vigilância de Doenças da Bacia do Mekong e a Rede Integrada de Vigilância de Doenças da África Oriental — conectaram e capacitaram profissionais de saúde, epidemiologistas e autoridades de saúde pública em toda a região, levando a um aumento de seis vezes nos locais de vigilância de doenças transfronteiriças somente nos últimos três anos. Em 2010, a Rockefeler expandiu a bem-sucedida campanha transdisciplinar One Health, que a USAID e o Banco Asiático de Desenvolvimento adotaram como modelos. One Health refere-se à integração da ciência médica e veterinária para combater essas novas variedades de doenças zoonóticas que se movem e sofrem mutações rapidamente de animais para humanos. Essas colaborações criaram e fortaleceram uma rede regional crítica de saúde pública, enquanto as lições aprendidas foram exportadas entre disciplinas e países. Além de fortalecer os laços globais em saúde pública, a Rockefeler ajudou a elevar o nível de especialização e treinamento em campo. O Programa de Treinamento em Epidemiologia de Campo coloca graduados nos mais altos escalões do governo no Laos e no Vietnã, enquanto as bolsas da Rockefeler transformaram as ferramentas disponíveis para os médicos, permitindo-lhes utilizar o poder da internet para se comunicar e monitorar eventos, compreender contextos locais e analisar novos problemas. Finalmente, estamos aplicando ferramentas do século XXI para combater os desafios de saúde do século XXI.”
Julho de 2012 - Revista Mundo Estranho - Epidemias Citado em: https://super.abril.com.br/especiais/epidemia-o-risco-invisivel/
Página do site ME salva em Imagem no Voidcat
Houve uma ‘coincidência’, a revista Mundo Estranho em julho de 2012, entrevistou o até então doutorando em virologia, Átila Iamarino (do canal Nerdologia no Youtube - O mesmo cientista que fez diversas propagandas das vacinas no Brasil), para descrever um possível cenário de propagação de uma epidemia viral, a revista descreve com grande precisão os eventos de 2020, mas apontando o oposto da China, em que, na realidade, sua economia cresceu vertiginosamente.
Segundo eles:
“ 1 – A Ásia é o ponto de partida. Após várias mutações, um novo vírus surge hospedado em morcegos. As fezes que eles soltam no ar infectam guaxinins. Dos mercados da China, esses animais são levados vivos para serem abatidos em restaurantes. Estressados, eles arranham e mordem os cozinheiros, espalhando o vírus.
2 – O vírus adquire a capacidade de ser transmitido de homem para homem por via aérea – forma mais fácil de contágio. Além disso, o contágio se dá antes mesmo de o enfermo apresentar os sintomas. Assim, em média, o doente infecta cinco pessoas antes de ter febre, vômito, diarreia, desidratação e falta de ar.
3 – O governo chinês envia uma comissão para avaliar a doença misteriosa que acomete alguns vilarejos. A equipe volta sem resultados e não considera o surto alarmante até que três pesquisadores adoecem e um deles morre. A China não informa a Organização Mundial da Saúde (OMS) para não demonstrar fragilidade.
4 – Os sintomas são comuns e a doença só chama a atenção quando muita gente começa a morrer na mesma região. Ainda assim, demora para que médicos e enfermeiros percebam a ineficiência de antibióticos na cura – o que exclui a maioria das bactérias como agente causador. Testes com vírus comuns também dão negativo.
5 – O governo isola comunidades em que há focos da doença. Ninguém entra nas cidades e nenhum doente pode sair. Mas, como a misteriosa enfermidade demora quatro dias para mostrar seus sintomas, muitos doentes saem dos vilarejos sem saber que estão infectados, alastrando a epidemia.
6 – Doentes viajam de avião para grandes cidades, como Hong Kong. O fervilhante centro comercial, que atrai gente do mundo todo, é um polo de contágio e disseminação. Sem imaginar o risco que correm, pessoas são contaminadas e, ao voltar para seu local de origem, carregam o vírus para todos os continentes.
7 – Com a doença já fora de controle, começa uma corrida entre laboratórios e cientistas de grandes universidades para descobrir o agente causador. Mesmo com o vírus isolado, as vacinas demoram para ser feitas em larga escala, tornando impossível o atendimento à demanda mundial.
8 – Os países se isolam, mantendo esquemas de quarentena. Aeroportos são fechados e o turismo mundial cai a quase zero. A China sofre as piores consequências, com o fluxo de empresários para Hong Kong suspenso – gerando prejuízos de bilhões de dólares – e com o boicote a produtos alimentícios vindos da Ásia.
9 – Além dos 10% de casos letais, os milhões de doentes precisam de atendimento médico. Enquanto hospitais e cemitérios estão lotados, escolas, indústrias e comércio ficam paralisados por falta de profissionais. O transporte público também para e os trabalhadores que podem passam a trabalhar em casa.
10 – Nas nações pobres, quase 20% da população morre – e outros milhões são vitimados mesmo em países ricos. Parte dessa mortalidade ocorre por causa da doença, mas outro fator determinante é a crise financeira global. A produção de alimentos cai por falta de mão de obra.
Fontes: A História e Suas Epidemias e Pandemias – A Humanidade em Risco, de Stefan Cunha Ujvari; Pragas e Epidemias – Histórias de Doenças Infecciosas, de Antonio Carlos de Castro Toledo Jr. Consultoria: Stefan Ujvari Cunha, infectologista do Hospital Alemão Oswaldo Cruz; Paolo Zanotto, professor de virologia do Instituto de Ciências Biológicas (ICB) da USP; Átila Iamarino, doutorando em HIV-1 no ICB da USP. “
3. PRIMEIROS INDÍCIOS
10/2019 - Evento 201 - Durante os Jogos Militares Internacionais na China https://www.centerforhealthsecurity.org/event201/
Promovido por: - Bill & Melinda Gates Foundation - John Hopkins Institute - Fórum econômico mundial
"O evento simula a liberação de um coronavírus novo do tipo zoonótico transmitido por morcegos para porcos e por fim para humanos. Eventualmente ele se torna muito transmissível entre humanos levando a uma pandemia severa. O vírus é muito parecido com o vírus da SARS, mas se transmite muito mais facilmente entre pessoas devido a sintomas muito mais leves destas."
Também mencionado por: Jornal Estadão
Sobre o "Movimento antivacina"
05/12/2017 - Movimento antivacina: como surgiu e quais consequências ele pode trazer? https://www.uol.com.br/universa/noticias/redacao/2017/12/05/o-que-o-movimento-antivacina-pode-causar.htm?cmpid=copiaecola
23/03/2019 - "Instagram bloqueia hashtags e conteúdo antivacinação" https://canaltech.com.br/redes-sociais/instagram-bloqueia-hashtags-e-conteudo-antivacinacao-135411/
23/05/2021 - Novos dados sobre pesquisadores de Wuhan aumentam debate sobre origens da Covid https://www.cnnbrasil.com.br/saude/novos-dados-sobre-pesquisadores-de-wuhan-aumentam-debate-sobre-origens-da-covid/
"A China relatou à Organização Mundial da Saúde que o primeiro paciente com sintomas semelhantes aos de Covid-19 foi registrado em Wuhan em 8 de dezembro de 2019"
01/02/2020 - O que aconteceu desde que o novo coronavírus foi descoberto na China https://exame.com/ciencia/o-que-aconteceu-desde-que-o-novo-coronavirus-foi-descoberto-na-china/
"O primeiro alerta foi recebido pela Organização Mundial da Saúde (OMS) em 31 de dezembro de 2019"
15/09/2020 - YouTube diz que vai remover vídeos com mentiras sobre vacina contra COVID-19 https://gizmodo.uol.com.br/youtube-remover-videos-mentiras-vacina-covid-19/
"O YouTube anunciou na quarta-feira (14) que estenderá as regras atuais sobre mentiras, propaganda e teorias da conspiração sobre a pandemia do coronavírus para incluir desinformação sobre as vacinas contra a doença.
De acordo com a Reuters, a gigante do vídeo diz que agora vai proibir conteúdos sobre vacinas contra o coronavírus que contradizem “o consenso de especialistas das autoridades de saúde locais ou da OMS”, como afirmações falsas de que a vacina é um pretexto para colocar chips de rastreamento nas pessoas ou que irá matar ou esterilizar quem tomar."
*07/01/2021 - YouTube vai punir canais que promovem mentiras sobre eleições – incluindo os de Trump https://olhardigital.com.br/2021/01/07/noticias/youtube-vai-punir-canais-que-promovem-mentiras-sobre-eleicoes-incluindo-os-de-trump/
"O YouTube anunciou que vai punir canais que promovem mentiras sobre as eleições, removendo sumariamente qualquer vídeo que contenha desinformação e, ao mesmo tempo, advertindo com um “strike” o canal que o veicular. A medida já está valendo e a primeira “vítima” é ninguém menos que o ex-presidente americano, Donald Trump.
A medida não é exatamente nova, mas foi novamente comunicada e reforçada pelo YouTube na quarta-feira (6), após os eventos de invasão do Capitólio, em Washington, onde o presidente eleito Joe Biden participava da cerimônia que confirmava a sua vitória nas eleições de novembro de 2020. A ocasião ficou marcada pela tentativa de invasão de correligionários de Trump, que entraram no edifício em oposição à nomeação do novo presidente. Uma mulher acabou sendo morta pela polícia que protegia o local.
O ex-presidente Donald Trump teve vídeos banidos de seu canal no YouTube após os eventos de ontem (6) no capitólio."
4. FIGURAS CENTRAIS
Bill Gates
- Bill Gates diz 'não' a abrir patentes de vacinas https://www.frontliner.com.br/bill-gates-diz-nao-a-abrir-patentes-de-vacinas/
"Bill Gates, um dos homens mais ricos do mundo, cuja fundação tem participação na farmacêutica alemã CureVac, produtora de vacina mRNA para prevenção de covid-19, disse não acreditar que a propriedade intelectual tenha algo a ver com o longo esforço global para controlar a pandemia."
João Doria - Governo de São Paulo
26/07/2017 - João Dória vai a China conhecer drones para ampliar segurança eletrônica na capital paulista https://jc.ne10.uol.com.br/blogs/jamildo/2017/07/26/joao-doria-vai-china-conhecer-drones-para-ampliar-seguranca-eletronica-na-capital-paulista/
02/08/2019 - Governo de SP fará Missão China para ampliar cooperação e atrair investimentos https://www.saopaulo.sp.gov.br/spnoticias/governo-de-sao-paulo-detalha-objetivos-da-missao-china/
20/11/2019 - Doria se encontra com chineses das gigantes CREC e CRCC e oferece concessões de rodovia, metrô e ferrovia https://diariodotransporte.com.br/2019/11/20/doria-se-encontra-com-chineses-das-gigantes-crec-e-crcc-e-oferece-concessoes-de-rodovia-metro-e-ferrovia/
25/01/2020 - "Chineses serão agressivos" nas privatizações em SP até 2022, afirma Dória https://noticias.uol.com.br/colunas/jamil-chade/2020/01/25/entrevista-joao-doria-privatizacoes-sao-paulo-china.htm
O governador de São Paulo, João Doria, afirma que vai acelerar os programas de desestatização no estado em 2020 e acredita que concessões e vendas poderão permitir uma arrecadação de pelo menos R$ 40 bilhões. Nesse processo, o governador avalia que a China deve atuar de forma agressiva e que aprofundará sua posição de maior parceira comercial do estado, se distanciando de americanos e argentinos.
29/06/2020 - Doria estabelece multa para quem estiver sem máscara na rua em SP https://veja.abril.com.br/saude/doria-estabelece-multa-para-quem-estiver-sem-mascara-na-rua/
24/12/2020 - Doria é flagrado sem máscara e fazendo compras em Miami https://pleno.news/brasil/politica-nacional/doria-e-flagrado-sem-mascara-e-fazendo-compras-em-miami.html
"Foto do governador de São Paulo sem o item de proteção viralizou nas redes"
07/06/2021 - Doria é criticado na internet por tomar sol sem máscara em hotel no Rio https://vejasp.abril.com.br/cidades/doria-e-criticado-na-internet-por-tomar-sol-sem-mascara-em-hotel-no-rio/
30/09/2020 - Governo de SP assina contrato com Sinovac e prevê vacina para dezembro https://agenciabrasil.ebc.com.br/saude/noticia/2020-09/governo-de-sp-assina-contrato-com-sinovac-e-preve-vacina-para-dezembro
O governador de São Paulo, João Doria, e o vice-presidente da laboratório chinês Sinovac, Weining Meng, assinaram hoje (30), um contrato que prevê o fornecimento de 46 milhões de doses da vacina CoronaVac para o governo paulista até dezembro deste ano.
O contrato também prevê a transferência tecnológica da vacina da Sinovac para o Instituto Butantan, o que significa que, o instituto brasileiro poderá começar a fabricar doses dessa vacina contra o novo coronavírus. O valor do contrato, segundo o governador João Doria é de US$ 90 milhões.
20/10/2020 - Coronavac terá mais de 90% de eficácia, afirmam integrantes do governo paulista https://www.cnnbrasil.com.br/saude/2020/12/20/coronavac-tera-mais-de-90-de-eficacia-afirmam-integrantes-do-governo
24/10/2020 - Não esperamos 90% de eficácia da Coronavac’, diz secretário de saúde de SP https://www.cnnbrasil.com.br/saude/2020/12/24/nao-esperamos-90-de-eficacia-da-coronavac-diz-secretario-de-saude-de-sp
07/01/2021 - Vacina do Butantan: eficácia é de 78% em casos leves e 100% em graves https://www.cnnbrasil.com.br/saude/2021/01/07/vacina-do-butantan-eficacia-e-de-78-em-casos-leves-e-100-em-graves
09/01/2021 - Não é hora de sermos tão cientistas como estamos sendo agora https://g1.globo.com/sp/sao-paulo/video/nao-e-hora-de-sermos-tao-cientistas-como-estamos-sendo-agora-diz-secretario-de-saude-de-sp-9166405.ghtml
10/01/2021 - Dados da Coronavac relatados à Anvisa não estão claros, diz médico https://www.cnnbrasil.com.br/saude/2021/01/10/dados-da-coronavac-relatados-a-anvisa-nao-estao-claros-diz-medico
"O diretor do Laboratório de Imunologia do Incor, Jorge Kalil, reforçou que faltaram informações sobre a Coronavac nos dados divulgados à Anvisa"
12/01/2021 - New Brazil data shows disappointing 50,4% efficacy for China’s Coronavac vaccine [Novos dados do Brasil mostram eficácia decepcionante de 50,4% para a vacina CoronaVac da China] https://www.reuters.com/article/us-health-coronavirus-brazil-coronavirus/new-brazil-data-shows-disappointing-504-efficacy-for-chinas-coronavac-vaccine-idUSKBN29H2CE
13/01/2021 - Eficácia da Coronavac: 50,38%, 78% ou 100%? https://blogs.oglobo.globo.com/lauro-jardim/post/5038-78-ou-100.html
“De acordo com interlocutores que participaram tanto do anúncio de ontem como da semana passada, quem pressionou para que os dados de 78% e 100% fossem liberados foi João Dória.”
07/05/2021 - Covid-19: Doria toma primeira dose da vacina CoronaVac https://veja.abril.com.br/saude/covid-19-doria-toma-primeira-dose-da-vacina-coronavac/
04/06/2021 - Doria é vacinado com a segunda dose da CoronaVac em São Paulo https://noticias.uol.com.br/politica/ultimas-noticias/2021/06/04/doria-e-vacinado-com-a-segunda-dose-da-coronavac-em-sao-paulo.htm
15/07/2021 - Doria testa positivo para a Covid-19 pela 2ª vez https://www.correiobraziliense.com.br/politica/2021/07/4937833-doria-testa-positivo-para-covid-19-pela-segunda-vez.html
"Governador de São Paulo já havia sido diagnosticado com a doença no ano passado. Ele diz que, apesar da infecção, se sente bem, o que atribui ao fato de ter sido vacinado com duas doses da Coronavac"
06/08/2021 - CPI recebe investigação contra Doria por compra de máscara sem licitação https://www.conexaopoder.com.br/nacional/cpi-recebe-investigacao-contra-doria-por-compra-de-mascara-sem-licitacao/150827
"Empresa teria usado o nome de Alexandre Frota para vender máscaras ao governo de SP. Doria nega informação"
Renan Filho
(filho do Renan Calheiros)
25/07/2019 - Governador Renan Filho vai à China em busca de investimentos para o estado https://www.tnh1.com.br/videos/vid/governador-renan-filho-vai-a-china-em-busca-de-investimentos-para-o-estado/
20/03/2020 - Governadores do NE consultam China e pedem material para tratar covid-19 https://noticias.uol.com.br/saude/ultimas-noticias/redacao/2020/03/20/governadores-do-ne-consultam-china-e-pedem-material-para-tratar-covid-19.htm
5. Narrativas, restrições e proibições
17/12/2020 - STF decide que vacina contra a covid pode ser obrigatória, mas não forçada https://noticias.uol.com.br/saude/ultimas-noticias/redacao/2020/12/17/stf-julga-vacinacao-obrigatoria.htm?cmpid=copiaecola
"O STF (Supremo Tribunal Federal) decidiu, em julgamento hoje, que o Estado pode determinar a obrigatoriedade da vacinação contra a covid-19. Porém fica proibido o uso da força para exigir a vacinação, ainda que possam ser aplicadas restrições a direitos de quem recusar a imunização.
Dez ministros foram favoráveis a obrigatoriedade da vacinação, que poderá ser determinada pelo governo federal, estados ou municípios. As penalidades a quem não cumprir a obrigação deverão ser definidas em lei."
27/07/2021 - Saiba que países estão adotando 'passaporte da vacina' para suspender restrições https://www.cnnbrasil.com.br/internacional/2021/07/27/saiba-que-paises-estao-adotando-passaporte-da-vacina-para-suspender-restricoes
" - Israel - Uniao Europeia - Áustria - Dinamarca - Eslovênia - França - Grécia - Irlanda - Itália - Letônia - Lituânia - Luxemburgo - Holanda - Portugal - Japão - Coreia do sul"
18/06/2021 - O que é o passaporte da vacina que Bolsonaro quer vetar? https://noticias.uol.com.br/politica/ultimas-noticias/2021/06/18/uol-explica-o-que-e-o-passaporte-da-vacina-que-opoe-bolsonaro-e-damares.htm
"O Brasil poderá ter um certificado de imunização futuramente. Aprovado no Senado na semana passada, o "passaporte da vacina", como é chamado, prevê identificar pessoas vacinadas para que entrem em locais públicos ou privados com possíveis restrições."
6. Vacinas
Alegações iniciais
- CoronaVac, Oxford e Pfizer: veja diferenças entre as vacinas contra covid noticias.uol.com.br/saude/ultimas-noticias/redacao/2021/05/11/diferencas-vacinas-covid-brasil.htm
" - CoronaVac (Butantan/Sinovac - Chinesa) Com virus inativo 50,38% de eficácia 2 doses
-
Covishield - 'AstraZeneca' (Fiocruz/Astrazenica/Oxford - Britânica) Com virus não replicante 67% de eficácia 2 doses
-
ComiRNAty - 'Pfizer' (Pfizer - Americana / BioNTech - Alemã) Com RNA mensageiro 96% de eficácia 2 doses"
Riscos diretos
15/06/2021 - Trombose após vacinação com AstraZeneca: Quais os sintomas e como se deve atuar? https://www.istoedinheiro.com.br/trombose-apos-vacinacao-com-astrazeneca-quais-os-sintomas-e-como-se-deve-atuar/
"Agências europeias estão reticentes com a vacina da AstraZeneca. Ela chegou a ser desaconselhada a pessoas com idade inferior a 60 anos, e um alto funcionário da Agência Europeia de Medicamentos declarou que era melhor deixar de administrar a vacina deste laboratório em qualquer idade quando há alternativas disponíveis, devido aos relatos de trombose após a primeira dose, apesar de raros."
11/05/2021 - CoronaVac, Oxford e Pfizer: veja diferenças entre as vacinas contra covid https://noticias.uol.com.br/saude/ultimas-noticias/redacao/2021/05/11/diferencas-vacinas-covid-brasil.htm
"Na terça-feira (12), o Ministério da Saúde determinou a suspensão da aplicação da vacina de Oxford/AstraZeneca para gestantes e puérperas com comorbidades. A decisão segue recomendação da Anvisa, que apura a morte de uma grávida de 35 anos que tomou o imunizante e teve um AVC (acidente vascular cerebral)."
30/07/2021 - Pfizer representa o mesmo risco de trombose que a Astrazeneca, aponta levantamento https://panoramafarmaceutico.com.br/pfizer-representa-o-mesmo-risco-de-trombose-que-a-astrazeneca-aponta-levantamento/
7. CRIMES
Crimes da Pfizer
18/11/2020 Não listado no google - Os Crimes documentados da produtora de vacinas de Covid - Pfizer [INGLÊS] https://www.dmlawfirm.com/crimes-of-covid-vaccine-maker-pfizer-well-documented/
"A velocidade com que a vacina Covid da Pfizer foi produzida, a ausência de estudos em animais, testes de controle randomizados e outros testes e procedimentos padrão usuais para um novo medicamento são, no mínimo, preocupantes. Além disso, todos os fabricantes de vacinas Covid receberam imunidade legal para quaisquer ferimentos ou mortes que possam causar. Se essas vacinas são tão seguras quanto promovidas, por que seus fabricantes precisam de imunidade geral?"
"A Pfizer, uma empresa farmacêutica que parece ter ganhado na loteria para produzir a primeira vacina Covid-19, está atualmente lutando contra centenas de ações judiciais sobre o Zantac, um popular medicamento contra azia. Os processos da Zantac afirmam que a droga popular pode estar contaminada com uma substância cancerígena chamada N-nitrosodimetilamina (NDMA). Os processos Zantac são em aberto e em andamento, já que a farmacêutica está lutando contra eles; mas a Pfizer, sabemos, cometeu vários crimes ou transgressões pelos quais foi punida nos últimos anos. As falhas da empresa estão bem documentadas e vale a pena revisá-las neste momento crítico da história da humanidade, enquanto todos nós buscamos respostas."
A Pfizer recebeu a maior multa da história dos Estados Unidos como parte de um acordo judicial de US $ 2,3 bilhões com promotores federais por promover medicamentos erroneamente (Bextra, Celebrex) e pagar propinas a médicos complacentes. A Pfizer se confessou culpada de falsificar a marca do analgésico Bextra, promovendo o medicamento para usos para os quais não foi aprovado.
Na década de 1990, a Pfizer estava envolvida em válvulas cardíacas defeituosas que causaram a morte de mais de 100 pessoas. A Pfizer enganou deliberadamente os reguladores sobre os perigos. A empresa concordou em pagar US $ 10,75 milhões para acertar as acusações do departamento de justiça por enganar reguladores.
A Pfizer pagou mais de US $ 60 milhões para resolver um processo sobre o Rezulin, um medicamento para diabetes que causou a morte de pacientes de insuficiência hepática aguda.
No Reino Unido, a Pfizer foi multada em quase € 90 milhões por sobrecarregar o NHS, o Serviço Nacional de Saúde. A Pfizer cobrou do contribuinte um adicional de € 48 milhões por ano, pelo que deveria custar € 2 milhões por ano.
A Pfizer concordou em pagar US $ 430 milhões em 2004 para resolver acusações criminais de que havia subornado médicos para prescrever seu medicamento para epilepsia Neurontin para indicações para as quais não foi aprovado. Em 2011, um júri concluiu que a Pfizer cometeu fraude em sua comercialização do medicamento Neurontin. A Pfizer concordou em pagar $ 142,1 milhões para liquidar as despesas.
A Pfizer revelou que pagou quase 4.500 médicos e outros profissionais médicos cerca de US $ 20 milhões por falar em nome da Pfizer.
Em 2012, a Comissão de Valores Mobiliários dos Estados Unidos - anunciou que havia chegado a um acordo de US $ 45 milhões com a Pfizer para resolver acusações de que suas subsidiárias haviam subornado médicos e outros profissionais de saúde no exterior para aumentar as vendas no exterior.
A Pfizer foi processada em um tribunal federal dos Estados Unidos por usar crianças nigerianas como cobaias humanas, sem o consentimento dos pais das crianças. A Pfizer pagou US $ 75 milhões para entrar em acordo no tribunal nigeriano pelo uso de um antibiótico experimental, o Trovan, nas crianças. A empresa pagou um valor adicional não divulgado nos Estados Unidos para liquidar as despesas aqui. A Pfizer violou o direito internacional, incluindo a Convenção de Nuremberg estabelecida após a Segunda Guerra Mundial, devido aos experimentos nazistas em prisioneiros relutantes.
Em meio a críticas generalizadas de roubar os países pobres em busca de drogas, a Pfizer prometeu dar US $ 50 milhões para um medicamento para a AIDS para a África do Sul. Mais tarde, no entanto, a Pfizer falhou em honrar essa promessa.
- Pfizer contract leaked!
[Contrato da Pfizer vazado]
http://sanjeev.sabhlokcity.com/Misc/LEXO-KONTRATEN-E-PLOTE.pdf
Segundo o contrato "o produto não deve ser serializado":
"5.5 Reconhecimento do comprador.
O Comprador reconhece que a Vacina e os materiais relacionados à Vacina, e seus componentes e materiais constituintes estão sendo desenvolvidos rapidamente devido às circunstâncias de emergência da pandemia de COVID-19 e continuarão a ser estudados após o fornecimento da Vacina ao Comprador nos termos deste Contrato. O Comprador reconhece ainda que os efeitos de longo prazo e eficácia da Vacina não são atualmente conhecidos e que pode haver efeitos adversos da Vacina que não são atualmente conhecidos. Além disso, na medida do aplicável, o Comprador reconhece que o Produto não deve ser serializado."
Crimes da AstraZeneca
21/06/2003 - AstraZeneca se declara culpada no esquema de médico de câncer https://www.nytimes.com/2003/06/21/business/astrazeneca-pleads-guilty-in-cancer-medicine-scheme.html
"A AstraZeneca, a grande empresa farmacêutica, se declarou culpada hoje de uma acusação de crime de fraude no sistema de saúde e concordou em pagar $ 355 milhões para resolver as acusações criminais e civis de que se envolveu em um esquema nacional para comercializar ilegalmente um medicamento contra o câncer de próstata.
O governo disse que os funcionários da empresa deram incentivos financeiros ilegais a cerca de 400 médicos em todo o país para persuadi-los a prescrever o medicamento Zoladex. Esses incentivos incluíram milhares de amostras grátis de Zoladex [...]"
27/04/2010 - Farmacêutica gigante AstraZeneca pagará US $ 520 milhões pelo marketing de medicamentos off-label https://www.justice.gov/opa/pr/pharmaceutical-giant-astrazeneca-pay-520-million-label-drug-marketing
"AstraZeneca LP e AstraZeneca Pharmaceuticals LP vão pagar $ 520 milhões para resolver as alegações de que a AstraZeneca comercializou ilegalmente o medicamento antipsicótico Seroquel para usos não aprovados como seguros e eficazes pela Food and Drug Administration (FDA), os Departamentos de Justiça e Saúde e Serviços Humanos A Equipe de Ação de Fiscalização de Fraudes em Saúde (HEAT) anunciou hoje. Esses usos não aprovados também são conhecidos como usos "off-label" porque não estão incluídos no rótulo do medicamento aprovado pela FDA."
- List of largest pharmaceutical settlements [Lista dos maiores acordos farmaceuticos] https://en.m.wikipedia.org/wiki/List_of_largest_pharmaceutical_settlements
8. CIENTISTAS
- Máscara Provoca Insuficiência Respiratória E Contaminação Microbiana… [Canal deletado] https://youtube.com/watch?v=eHu-pydSvDI
Não lembro mais a quem pertencia, mas provavelmente era de um médico falando do assunto. Creio ter sido do Dr. Paulo Sato, por essa temática ter sido abordada por ele, mas ao abrir o site aparece somente:
"Este vídeo foi removido por violar as diretrizes da comunidade do YouTube"
Dr. Paulo Sato
- USAR ou NÃO USAR a CUECA do seu governador no rosto https://fb.watch/7NPP_7rS5S/ https://www.facebook.com/AdoniasSoaresBR/videos/1347904292291481/ Adonias Soares entrevista ao Dr. Paulo Sato sobre as máscaras, em que é simulado o efeito da respiração prolongada das máscaras no organismo com o uso de águas de torneira, natural, gaseificada (com gás carbônico) e antioxidante, em que a com gás carbônico (PH 4 - Ácido) representa o organismo humano, e na prática representa lesão corporal e iniciação de doenças.
Dr. Kary Mullis
(Criador do teste PCR)
- PCR nas palavras do seu inventor - Dr. Kary Mullis (legendado) https://www.youtube.com/watch?v=W1O52uTygk8
"Qualquer um pode testar positivo para quase qualquer coisa com um teste de PCR, se você executá-lo por tempo suficiente… Com PCR, se voce fizer isso bem, você pode encontrar quase tudo em qualquer pessoa… Isso não te diz que você está doente."
- Kary Mullis DESTRUYE a Anthony Fauci lbry://@CapitalistChile#0/Kary-Mullis---Fauci#5
"Ele [...] não entende de medicina e não deveria estar onde está. A maioria dos que estão acima são só administrativos e não têm nem ideia do que ocorre aqui em baixo e essas pessoas tem uma agenda que não é a que gostaríamos que tivessem, dado que somos nós os que pagamos a eles para que cuidem da nossa saúde. Têm uma agenda pessoal."
Dra. Li-Meng Yan
- Dra. Li-Meng Yan: O vírus foi criado em laboratório com um objetivo: Causar dano. https://youtu.be/pSXp3CZnvOc
Dr. Joe Roseman
- Cientista Phd Dr Joe Roseman faz seríssimas advertencias sobre a picada https://youtu.be/0PIXVFqJ_h8
Dr. Robert Malone
- As vacinas podem estar causando ADE - Dr. Robert Malone https://odysee.com/@AkashaComunidad:f/Las_vacunas_pueden_estar_causando_ADE_magnificaci%C3%B3n_mediada_por:f lbry://@Información.#b/Drrm#9
Dr. Robert Malone, um dos três inventores da tecnologia de RNAm que se usa de forma farmacêutica. No vídeo fala sobre os efeitos de ADE (realce dependente de anticorpos) que estão ocorrendo com as vacinas. Nas palavras do Dr. Malone, já não é somente uma hipótese, mas baseada nos conhecimentos gerados nas provas e ensaios pré clínicos, com as vacinas contra o primeiro vírus da SARS.
Dr. Luc Montagnier
- Dr. Luc Montagnier, virologista, prêmio Nobel de medicina, um dos descobridores do vírus HIV, afirma: "a vacinação em massa está criando as novas variantes' (@medicospelavida , telegram)
CASOS DOCUMENTADOS
13/09/2021 - 13 de setembro de 2021 - Carta aberta ao Ministro da Saúde por Arlene Ferrari Graf, mãe de Bruno Oscar Graf https://telegra.ph/Carta-aberta-ao-Ministro-da-Sa%C3%BAde-09-13
Também em: Gazeta do Povo
O texto de uma mãe discorrendo sobre o filho dela, Bruno Oscar Graf, ter ANTI-HEPARINA PF4 AUTO-IMUNE e ter vindo a falecer por reação à vacina.
11/05/2021 - Rio notifica morte de grávida vacinada com imunizante Oxford https://www.terra.com.br/noticias/coronavirus/rio-notifica-morte-de-gravida-vacinada-com-imunizante-oxford,415b9b0c49169427ac2f90ae3765c057e9suy3qn.html
"Vítima não apresentava histórico de doença circulatória nem sofria de nenhuma doença viral; relação será investigada"
13/08/2021 - Cruzeiro com 4.336 pessoas tem 27 contaminados com Covid-19 em Belize https://paranaportal.uol.com.br/geral/cruzeiro-com-4-336-pessoas-tem-27-contaminados-com-covid-19-em-belize/amp/
"Segundo um comunicado do Conselho de Turismo de Belize emitido na quarta-feira (11), 26 contaminados são da tripulação e um é passageiro. A maioria é assintomática e os 27 estão vacinados."
9. ALEGAÇÕES DIRETAS
09/2021 - Setembro de 2021 - BOMBA: Ex-membro do Partido Comunista da China revela que o primeiro surto da Covid foi “intencional” https://terrabrasilnoticias.com/2021/09/bomba-ex-membro-do-partido-comunista-da-china-revela-que-o-primeiro-surto-da-covid-foi-intencional/
01/03/2023 - 1 de Março de 2023 - O chefe do FBI, Christopher Wray, diz que vazamento de laboratório na China é muito provável https://www.bbc.com/news/world-us-canada-64806903
26/12/2024 - 26 de Dezembro 2024 - FBI ‘não tem permissão para informar Biden’ sobre a teoria de vazamento de laboratório da Covid https://www.thetimes.com/world/us-world/article/fbi-not-allowed-to-brief-biden-on-covid-lab-leak-theory-8df9mr997
O FBI concluiu com "confiança moderada" que a COVID-19 pode ter sido criada em laboratório, com base em parte na análise genômica conduzida por cientistas do Centro Nacional de Inteligência Médica.
-
@ cae03c48:2a7d6671
2025-06-06 15:00:57Bitcoin Magazine
President Trump’s Truth Social Files S-1 Form For Bitcoin ETFToday, Trump Media and Technology Group Corp. (Nasdaq, NYSE Texas: DJT) filed with the US Securities and Exchange Commission (SEC) a Form S-1 for their upcoming Truth Social Bitcoin ETF.
The ETF, which will hold bitcoin directly, is designed to track the bitcoin’s price performance.
“Truth Social Bitcoin ETF, B.T. is a Nevada business trust that issues beneficial interests in its net assets,” stated the Form S-1. “The assets of the Trust consist primarily of bitcoin held by a custodian on behalf of the Trust. The Trust seeks to reflect generally the performance of the price of bitcoin.”
The ETF is sponsored by Yorkville America Digital, LLC and will trade under NYSE Arca. The Trust’s assets primarily consist of bitcoin held by Foris DAX Trust Company, LLC, the designated bitcoin custodian. Crypto.com will act as the ETF’s prime execution agent and liquidity provider.
“Shares will be offered to the public from time to time at varying prices that will reflect the price of bitcoin and the trading price of the Shares on New York Stock Exchange Arca, Inc. at the time of the offer,” mentioned the Form S-1.
While the ETF offers investors a regulated avenue for bitcoin exposure, the Trust warned of several risks related to digital assets:
- Loss, theft, or compromise of private keys could result in permanent loss of bitcoin.
- Bitcoin’s reliance on blockchain and Internet technologies makes it vulnerable to disruptions and cyber threats.
- Environmental and regulatory pressures tied to high electricity use in bitcoin mining could impact market stability.
- Potential forks or protocol failures in the Bitcoin Network may lead to volatility and uncertainty in asset value.
Last week, during an interview at the 2025 Bitcoin Conference, Donald Trump Jr. announced that TMTG and Truth Social were forming a Bitcoin treasury with $2.5 billion. “We’re seriously on crypto—we’re seriously on Bitcoin,” said Trump Jr. “We’re in three major deals. I believe we’re at the beginning of what will be the future of finance. And the opportunity is massive.”
The day after that interview, Eric Trump and Donald Trump Jr., joined by American Bitcoin Executive Chairman and Board Member Mike Ho, CEO Matt Prusak, and Altcoin Daily founder Aaron Arnold, discussed the future of Bitcoin.
“The whole system is broken and now all of the sudden you have crypto which solves all the problems,” commented Eric Trump. “It makes everything cheaper, it makes everything faster, it makes it safer, it makes it more transparent. It makes the whole system more functional.“
“Everybody wants Bitcoin. Everybody is buying Bitcoin,” Eric added.
This post President Trump’s Truth Social Files S-1 Form For Bitcoin ETF first appeared on Bitcoin Magazine and is written by Oscar Zarraga Perez.
-
@ 4ba8e86d:89d32de4
2025-06-17 17:46:21A sede do ProtonMail está localizada na Suíça, um país conhecido por suas leis rigorosas de privacidade, embora a empresa tenha enfrentado alguns desafios, como ataques DDoS e pressão do governo suíço, ela continua comprometida em fornecer um serviço seguro e privado aos seus usuários.
O ProtonMail foi fundado em 2014 por um grupo de cientistas do CERN (Organização Europeia para Pesquisa Nuclear) que queriam criar uma plataforma de e-mail segura e privada que usasse criptografia de ponta a ponta. O objetivo era oferecer aos usuários uma alternativa aos serviços de e-mail tradicionais que frequentemente violam a privacidade dos usuários.A equipe fundadora incluía Andy Yen, Jason Stockman e Wei Sun, todos com formação em física e matemática.
Ao longo dos anos, o ProtonMail lançou vários recursos adicionais, incluindo aplicativos móveis para iOS e Android, integração com Tor e a possibilidade de enviar e-mails criptografados para usuários de outros provedores de e-mail. O ProtonMail também lançou uma VPN (rede privada virtual) chamada ProtonVPN, que segue o mesmo compromisso com a privacidade e segurança dos usuários.
A criptografia de ponta a ponta utilizada pelo ProtonMail assegura a proteção de todas as mensagens de seus usuários. O processo de criptografia ocorre no dispositivo do remetente antes do envio das mensagens aos servidores da ProtonMail, onde elas são armazenadas em formato criptografado. Quando o destinatário abre a mensagem, ela é descriptografada no dispositivo do destinatário, garantindo que somente o destinatário possa ler o conteúdo da mensagem. Isso significa que, mesmo que os servidores da ProtonMail sejam violados, as mensagens dos usuários permanecerão seguras e protegidas.
O ProtonMail oferece suporte à autenticação de dois fatores usando chaves de segurança YubiKey. Isso adiciona uma camada extra de segurança ao login da conta do ProtonMail, pois um invasor precisaria não apenas da senha, mas também da chave física para acessar a conta do usuário. A YubiKey é uma opção popular para autenticação de dois fatores, pois é fácil de usar e oferece proteção adicional contra-ataques de phishing e keylogging. O ProtonMail também suporta outras opções de autenticação de dois fatores, aplicativos de autenticação, como o Aegis Authenticator.
Outra funcionalidade importante é a proteção contra phishing e spam. O ProtonMail utiliza algoritmos avançados de filtragem para identificar e bloquear mensagens maliciosas antes que elas cheguem à caixa de entrada do usuário. Isso ajuda a reduzir a quantidade de spam recebida e a proteger contra-ataques de phishing, que tentam enganar o usuário a fornecer informações pessoais.
Passo a passo instalação do aplicativo protonmail no Android:
-
Baixe e instale o aplicativo protonmail em seu dispositivo móvel no F-droid ou obtainium.
-
Clique em "Criar nova conta" se você ainda não tiver uma conta ProtonMail, ou clique em "Fazer login" se já tiver uma conta.
-
Se você está criando uma nova conta, preencha os campos de registro, incluindo seu endereço de e-mail desejado e uma senha forte.
-
Depois de criar ou fazer login em sua conta, você pode usar o ProtonMail em seu dispositivo Android para enviar e receber e-mails seguros e protegidos.
Lembre-se de que, para garantir a privacidade e a segurança de suas informações, é importante usar uma senha forte e habilitar a autenticação de dois fatores. Utilize o Tor para acessar seu e-mail no site onion e considere usar uma VPN.
No Relatório de Transparência do ProtonMail, em muitos casos, a única informação que eles puderam fornecer foi um e-mail de recuperação (opcional na criação da conta) ou o IP que acessou o e-mail.
A própria ProtonMail recomenda o uso do Tor para acesso anônimo ao serviço. Se um juiz exigir a coleta do seu IP, a Proton não terá essa informação se você acessar seu e-mail via o site onion pelo Tor.
Se você é uma pessoa em situação de risco, como um ativista ou alguém que pode ser perseguido por diversos motivos, é essencial tomar medidas excepcionais: 1. Pague pelo serviço com Bitcoin. 2. Não use informações que possam identificá-lo ao se registrar. 3. Utilize o Tor, ou uma VPN, sempre que acessar o ProtonMail.
-
-
@ dfa02707:41ca50e3
2025-06-17 21:01:55- This version introduces the Soroban P2P network, enabling Dojo to relay transactions to the Bitcoin network and share others' transactions to break the heuristic linking relaying nodes to transaction creators.
- Additionally, Dojo admins can now manage API keys in DMT with labels, status, and expiration, ideal for community Dojo providers like Dojobay. New API endpoints, including "/services" exposing Explorer, Soroban, and Indexer, have been added to aid wallet developers.
- Other maintenance updates include Bitcoin Core, Tor, Fulcrum, Node.js, plus an updated ban-knots script to disconnect inbound Knots nodes.
"I want to thank all the contributors. This again shows the power of true Free Software. I also want to thank everyone who donated to help Dojo development going. I truly appreciate it," said Still Dojo Coder.
What's new
- Soroban P2P network. For MyDojo (Docker setup) users, Soroban will be automatically installed as part of their Dojo. This integration allows Dojo to utilize the Soroban P2P network for various upcoming features and applications.
- PandoTx. PandoTx serves as a transaction transport layer. When your wallet sends a transaction to Dojo, it is relayed to a random Soroban node, which then forwards it to the Bitcoin network. It also enables your Soroban node to receive and relay transactions from others to the Bitcoin network and is designed to disrupt the assumption that a node relaying a transaction is closely linked to the person who initiated it.
- Pushing transactions through Soroban can be deactivated by setting
NODE_PANDOTX_PUSH=off
indocker-node.conf
. - Processing incoming transactions from Soroban network can be deactivated by setting
NODE_PANDOTX_PROCESS=off
indocker-node.conf
.
- Pushing transactions through Soroban can be deactivated by setting
- API key management has been introduced to address the growing number of people offering their Dojos to the community. Dojo admins can now access a new API management tab in their DMT, where they can create unlimited API keys, assign labels for easy identification, and set expiration dates for each key. This allows admins to avoid sharing their main API key and instead distribute specific keys to selected parties.
- New API endpoints. Several new API endpoints have been added to help API consumers develop features on Dojo more efficiently:
- New:
/latest-block
- returns data about latest block/txout/:txid/:index
- returns unspent output data/support/services
- returns info about services that Dojo exposes
- Updated:
/tx/:txid
- endpoint has been updated to return raw transaction with parameter?rawHex=1
- The new
/support/services
endpoint replaces the deprecatedexplorer
field in the Dojo pairing payload. Although still present, API consumers should use this endpoint for explorer and other pairing data.
- New:
Other changes
- Updated ban script to disconnect inbound Knots nodes.
- Updated Fulcrum to v1.12.0.
- Regenerate Fulcrum certificate if expired.
- Check if transaction already exists in pushTx.
- Bump BTC-RPC Explorer.
- Bump Tor to v0.4.8.16, bump Snowflake.
- Updated Bitcoin Core to v29.0.
- Removed unnecessary middleware.
- Fixed DB update mechanism, added api_keys table.
- Add an option to use blocksdir config for bitcoin blocks directory.
- Removed deprecated configuration.
- Updated Node.js dependencies.
- Reconfigured container dependencies.
- Fix Snowflake git URL.
- Fix log path for testnet4.
- Use prebuilt addrindexrs binaries.
- Add instructions to migrate blockchain/fulcrum.
- Added pull policies.
Learn how to set up and use your own Bitcoin privacy node with Dojo here.
-
@ 31a4605e:cf043959
2025-06-17 17:31:08Milhões de pessoas em todo o mundo ainda não têm acesso a serviços bancários básicos, seja por falta de infraestrutura, requisitos burocráticos ou instabilidade económica nos seus países. Bitcoin surge como uma solução inovadora para este problema, permitindo que qualquer pessoa com acesso à internet tenha controlo sobre o seu dinheiro, sem depender de bancos ou governos. Ao oferecer um sistema financeiro aberto e acessível, Bitcoin torna-se uma ferramenta poderosa para a inclusão financeira global.
O problema da exclusão financeira
Em muitos países em desenvolvimento, grande parte da população não possui conta bancária. Isto pode acontecer por diversas razões, como:
Falta de acesso a bancos: Muitas comunidades, especialmente em áreas rurais, não têm instituições financeiras próximas.
Exigências burocráticas: Alguns bancos exigem documentação específica ou um histórico de crédito que muitas pessoas não conseguem fornecer.
Custos elevados: As taxas bancárias podem ser proibitivas para quem ganha pouco dinheiro.
Instabilidade económica e política: Em países com alta inflação ou governos instáveis, os bancos podem não ser uma opção segura para guardar dinheiro.
Estas dificuldades deixam milhões de pessoas à margem do sistema financeiro, impossibilitadas de poupar, investir ou realizar transações de forma eficiente.
Bitcoin como alternativa
Bitcoin resolve muitos dos problemas da exclusão financeira ao oferecer um sistema acessível e descentralizado. Com Bitcoin, qualquer pessoa com um telemóvel e acesso à internet pode armazenar e transferir dinheiro sem necessidade de um banco. Entre as principais vantagens estão:
Acessibilidade global: Bitcoin pode ser usado em qualquer lugar do mundo, independentemente da localização do utilizador.
Sem necessidade de intermediários: Diferente dos bancos, que impõem taxas e regras, Bitcoin permite transações diretas entre pessoas.
Baixo custo para transferências internacionais: Enviar dinheiro para outro país pode ser caro e demorado com os métodos tradicionais, enquanto Bitcoin oferece uma alternativa mais rápida e acessível.
Proteção contra a inflação: Em países com moedas instáveis, Bitcoin pode ser usado como reserva de valor, protegendo o poder de compra da população.
Casos de uso na inclusão financeira
Bitcoin já tem sido utilizado para promover a inclusão financeira em diversas partes do mundo. Alguns exemplos incluem:
África e América Latina: Em países como Nigéria, Venezuela e Argentina, onde a inflação é elevada e o acesso a dólares é limitado, muitas pessoas usam Bitcoin para preservar o seu dinheiro e realizar transações internacionais.
Remessas internacionais: Trabalhadores que enviam dinheiro para as suas famílias no estrangeiro evitam as elevadas taxas das empresas de transferências tradicionais ao utilizarem Bitcoin.
Microeconomia digital: Pequenos comerciantes e freelancers que não têm acesso a contas bancárias podem receber pagamentos em Bitcoin de forma direta e segura.
Desafios da inclusão financeira com Bitcoin
Apesar das suas vantagens, a adoção de Bitcoin como ferramenta de inclusão financeira ainda enfrenta alguns desafios, tais como:
Acesso à internet: Muitas regiões pobres ainda não têm uma infraestrutura digital adequada.
Educação financeira: Para que mais pessoas utilizem Bitcoin, é necessário maior conhecimento sobre a tecnologia e as melhores práticas de segurança.
Volatilidade do preço: As oscilações de valor podem dificultar o uso de Bitcoin no dia a dia, especialmente em países onde as pessoas vivem com rendimentos instáveis.
Resumindo, o Bitcoin oferece uma solução viável para milhões de pessoas excluídas do sistema financeiro tradicional. Ao proporcionar acesso global, transações baratas e segurança contra a inflação, torna-se um instrumento poderoso para promover a inclusão financeira. No entanto, para que o seu potencial seja totalmente aproveitado, é essencial investir na educação digital e expandir a infraestrutura tecnológica, permitindo que mais pessoas tenham autonomia financeira através de Bitcoin.
Muito obrigado por teres lido o texto até aqui, espero que esteja tudo bem contigo e um abraço enorme do teu madeirense bitcoiner maximalista favorito. Viva a liberdade!
-
@ cae03c48:2a7d6671
2025-06-17 17:00:54Bitcoin Magazine
Flash Releases Free Bitcoin Invoicing Tool with No Fees, KYC, or CustodyFlash, a Bitcoin payment platform, just announced it has launched Flash Invoicing, a completely free, non-custodial, and KYC-free Bitcoin invoicing tool. Designed for freelancers, the platform allows users to send professional invoices without platform fees, identity checks, or third party custody.
According to Deel, a crypto payments company for freelancers, Bitcoin is the most used cryptocurrency in the world for payments. Despite this growth, many freelancers continue to use basic methods such as pasting Bitcoin addresses into PDFs or emails. Some rely on custodial platforms that deduct fees or require identity verification, which can affect both earnings and data privacy.
“We’ve seen too many people paste BTC addresses into documents and call it invoicing,” said the CEO of Flash Pierre Corbin. “It’s messy. It’s risky. And it’s time for something better.”
Flash Invoicing Features:
- 0% platform fees: no subscriptions or commission
- Non-custodial: Bitcoin goes straight to the user’s wallet
- No KYC: users maintain full privacy
- Professional output: branded PDFs and secure payment links
- Integrated dashboard: manage payments, clients, and revenue
- Works with Flash ecosystem: including Stores, Donations, Paywalls, and POS
Many Bitcoin invoicing tools charge a percentage per transaction or require a subscription. As a result, freelancers often lose part of their income simply to issue an invoice and receive payment. Flash is aiming to solve this issue.
“Freelancers work hard enough. The last thing they need is a platform skimming off their earnings,” said Corbin. “That’s why we dropped our fee from 1.5% to 0% — and launched the first invoicing tool that’s truly free, without compromising on privacy or control.”
Flash Invoicing allows users to accept Bitcoin payments without relinquishing control, privacy, or revenue. It is integrated with the broader Flash suite, enabling users to manage invoicing alongside features such as setting up stores, receiving donations, or gating premium content.
“As a freelancer myself, I love using the Flash invoicing feature,” stated a freelancer & Flash user. ”It keeps all my clients in one place, allows me to easily edit invoices and track payments. Much more professional than sending a lightning address in the footer of a PDF invoice.”
This post Flash Releases Free Bitcoin Invoicing Tool with No Fees, KYC, or Custody first appeared on Bitcoin Magazine and is written by Oscar Zarraga Perez.
-
@ 65912a7a:5dc638bf
2024-12-08 05:33:02Chef's notes
This is my late partner's award winning Cajun rice & beans recipe. It's an updated take on the traditional Cajun comfort food.
Chef Darin was a classically trained chef who spent 30+ years in the kitchen perfecting his recipes, and delivering authentic Cajun and Creole food to his patrons. This is a 5-star dish that will earn the respect of the most discerning Cajun afficionado. You won't be disappointed.
I suggest making this recipe exactly as directed the first time, and then make whatever adjustments you want for future batches. Also, don't cheap out on the Andouille. No Johnsonville or Hillshire Farms. Chef Aidelle's is a good choice, as is Silva's from Whole Foods. They cost a few extra bucks, but it's absolutely worth it.
Details
- ⏲️ Prep time: 30 min
- 🍳 Cook time: 3 hours
- 🍽️ Servings: 12
Ingredients
- 16oz small red beans, dry
- 2 cups long grain white rice
- 14-16oz andouille sausage, sliced
- 8oz ham, cubed
- 1 large yellow onion, chopped
- 1 green bell pepper, chopped
- 2-3 stalks celery, chopped
- 2 tbsp garlic (12 cloves), minced
- 7 cups water
- ¼ cup olive oil
- 2 large bay leaves
- 1 tbsp parsley, dried
- 1 tsp thyme, dried
- 1 tsp Cajun seasoning
- ½ tsp cayenne pepper, dried
- ¼ tsp sage, rubbed
- 1½ tsp salt (more or less to taste)
Directions
- Soak beans in a large pot of water overnight.
- Heat oil in a large stockpot over medium heat. Cook onion, bell pepper, celery, garlic in olive oil for 3 to 4 minutes (until onion is translucent).
- Add beans, bay leaves, parsley, thyme, salt, MSG, Cajun seasoning, cayenne pepper, Sage, and water. Stir, bring to a boil, and then reduce heat to medium-low (btwn 2-3). Cover and simmer for 2½ hours.
- Remove bay leaves. Mash some of the beans. Stir Andouille and ham into beans, and simmer uncovered for an additional 30 minutes.
- Meanwhile, prepare the rice. Bring water and rice to a boil in a saucepan. Reduce heat, cover, and simmer for 20 minutes.
- Serve beans over steamed white rice.
-
@ 3eab247c:1d80aeed
2025-06-05 08:51:39Global Metrics
Here are the top stats from the last period:
- Total Bitcoin-accepting merchants: 15,306 → 16,284
- Recently verified (1y): 7,540 → 7,803 (the rest of our dataset is slowly rotting; help us before it's too late!)
- Avg. days since last verification: 398 → 405 (more mappers, please)
- Merchants boosted: 22 (for a total of 4,325 days, someone is feeling generous)
- Comments posted: 34
Find current stats over at the 👉 BTC Map Dashboard.
Merchant Adoption
Steak n’ Shake
The US 🇺🇸 is a massive country, yet its BTC Map footprint has been lagging relative to other countries ... that is until now!
In what came as a nice surprise to our Shadowy Supertaggers 🫠, the Steak ’n Shake chain began accepting Bitcoin payments across hundreds of its locations nationwide (with some international locations too).
According to CoinDesk, the rollout has been smooth, with users reporting seamless transactions powered by Speed.
This marks a significant step towards broader Bitcoin adoption in the US. Now to drop the capital gains tax on cheesburgers!
SPAR Switzerland
In other chain/franchise adoption news, the first SPAR supermarket in Switzerland 🇨🇭 to begin accepting Bitcoin was this one in Zug. It was quickly followed by this one in Rossrüti and this one in Kreuzlingen, in what is believed to be part of a wider roll-out plan within the country powered by DFX's Open CryptoPay.
That said, we believe the OG SPAR crown goes to SPAR City in Arnhem Bitcoin City!
New Features
Merchant Comments in the Web App
Web App users are now on par with Android users in that they can both see and make comments on merchants.
This is powered by our tweaked API that enables anyone to make a comment as long as they pass the satswall fee of 500 sats. This helps keep spam manageable and ensure quality comments.
And just in case you were wondering what the number count was on the merchant pins - yep, they're comments!
Here is an 👉 Example merchant page with comments.
Merchant Page Design Tweaks
To support the now trio of actions (Verify, Boost & Comment) on the merchant page, we've re-jigged the design a little to make things a little clearer.
What do you think?
Technical
Codebase Refactoring
Thanks to Hannes’s contributions, we’ve made progress in cleaning-up the Web App's codebase and completing long overdue maintenance. Whilst often thankless tasks, these caretaking activities help immensely with long-term maintainability enabling us to confidently build new features.
Auth System Upgrades
The old auth system was held together with duct tape and prayers, and we’re working on a more robust authentication system to support future public API access. Updates include:
- Password hashing
- Bearer token support
- Improved security practices
More enhancements are in progress and we'll update you in the next blog post.
Better API Documentation
Instead of relying on tribal knowledge, we're finally getting around to writing actual docs (with the help/hindrance of LLMs). The "move fast, break everything" era is over; now we move slightly slower and break slightly less. Progress!
Database Improvements
We use SQLite, which works well but it requires careful handling in async Rust environments. So now we're untangling this mess to avoid accidental blocking queries (and the ensuing dumpster fires).
Backup System Enhancements
BTC Map data comes in three layers of fragility:
- Merchants (backed up by OS - the big boys handle this)
- Non-OSM stuff (areas, users, etc. - currently stored on a napkin)
- External systems (Lightning node, submission tickets - pray to Satoshi)
We're now forcing two core members to backup everything, because redundancy is good.
Credits
Thanks to everyone who directly contributed to the project this period:
- Comino
- descubrebitcoin
- Hannes
- Igor Bubelov
- Nathan Day
- Rockedf
- Saunter
- SiriusBig
- vv01f
Support Us
There are many ways in which you can support us:
-
Become a Shadowy Supertagger and help maintain your local area or pitch-in with the never-ending global effort.
-
Consider a zapping this note or make a donation to the to the project here.
-
@ 31a4605e:cf043959
2025-06-17 17:51:52Com a crescente digitalização do dinheiro, os governos de vários países começaram a desenvolver moedas digitais de banco central (CBDCs - Central Bank Digital Currencies) como resposta à popularização de Bitcoin. Enquanto Bitcoin representa um sistema financeiro descentralizado e resistente à censura, as CBDCs são versões digitais das moedas fiduciárias, controladas diretamente pelos bancos centrais. Essa concorrência pode moldar o futuro do dinheiro e definir o equilíbrio entre liberdade financeira e controlo estatal.
Diferenças fundamentais entre Bitcoin e CBDCs
Bitcoin e as CBDCs diferem em praticamente todos os aspetos fundamentais:
Centralização vs. Descentralização: Bitcoin opera numa rede descentralizada, onde nenhum governo ou entidade pode alterar as regras ou censurar transações. Já as CBDCs são emitidas e controladas pelos bancos centrais, permitindo um maior controlo sobre a circulação e utilização do dinheiro.
Oferta limitada vs. Inflação controlada: Bitcoin tem uma oferta fixa de 21 milhões de unidades, tornando-se um ativo escasso e deflacionário. As CBDCs, por outro lado, podem ser criadas sem limites, como acontece com as moedas fiduciárias tradicionais, sujeitas a políticas monetárias inflacionárias.
Privacidade vs. Monitorização: Bitcoin permite transações pseudónimas, garantindo um certo nível de privacidade financeira. As CBDCs, no entanto, podem ser programadas para permitir o rastreamento total de cada transação, facilitando a supervisão governamental e, potencialmente, o controlo sobre o que os cidadãos podem ou não gastar.
Resistência à censura vs. Controlo estatal: Bitcoin permite que qualquer pessoa realize transações sem depender de aprovação de terceiros. As CBDCs, por serem centralizadas, podem ser usadas pelos governos para restringir transações indesejadas ou mesmo confiscar fundos com um simples comando digital.
O que os governos pretendem com as CBDCs?
A introdução das CBDCs tem sido vendida com argumentos como:
Maior eficiência nas transações financeiras, eliminando intermediários e reduzindo custos bancários.
Facilidade na implementação de políticas económicas, como estímulos diretos à população ou tributação automatizada.
Combate a atividades ilegais, dado que as transações podem ser rastreadas em tempo real.
No entanto, muitas destas justificações levantam preocupações sobre a perda de privacidade financeira e o aumento do poder dos governos sobre o sistema monetário.
Bitcoin como alternativa às CBDCs
A ascensão das CBDCs pode fortalecer a posição de Bitcoin como alternativa de dinheiro verdadeiramente livre. À medida que os cidadãos percebem os riscos de um sistema financeiro 100% controlado pelo Estado, a procura por um ativo descentralizado e resistente à censura pode crescer.
Proteção contra o controlo estatal: Bitcoin permite que os utilizadores mantenham total soberania sobre o seu dinheiro, sem o risco de bloqueios arbitrários ou confiscações.
Preservação da privacidade financeira: Ao contrário das CBDCs, que podem monitorizar todas as transações, Bitcoin oferece um grau de anonimato que protege os indivíduos da vigilância excessiva.
Reserva de valor contra a inflação: Enquanto os governos podem emitir CBDCs indefinidamente, Bitcoin mantém a sua escassez garantida, tornando-se um refúgio contra políticas monetárias irresponsáveis.
Resumindo, a competição entre Bitcoin e as CBDCs será uma das maiores batalhas financeiras do futuro. Enquanto os governos tentam consolidar o seu controlo através de moedas digitais centralizadas, Bitcoin continua a ser a principal alternativa para aqueles que procuram independência financeira e proteção contra a vigilância estatal. A escolha entre um sistema financeiro livre e um sistema monitorizado e controlado poderá definir o rumo da economia digital nas próximas décadas.
Muito obrigado por teres lido o texto até aqui, espero que esteja tudo bem contigo e um abraço enorme do teu madeirense bitcoiner maximalista favorito. Viva a liberdade!
-
@ 31a4605e:cf043959
2025-06-17 15:22:49A rede Bitcoin é formada por uma infraestrutura descentralizada feita de dispositivos chamados nós. Esses nós têm um papel crucial na validação, verificação e manutenção do sistema, assegurando a segurança e a integridade do blockchain ou timechain. Ao contrário dos sistemas tradicionais, onde uma autoridade central controla as operações, a rede Bitcoin requer a colaboração de milhares de nós pelo mundo, promovendo descentralização e transparência.
Na rede Bitcoin, um nó é qualquer computador que está conectado ao sistema e participa do armazenamento, validação ou distribuição de informações. Esses dispositivos rodam o software do Bitcoin e podem operar em diferentes níveis de participação, desde tarefas básicas de transmissão de dados até a validação total de transações e blocos.
Existem dois tipos principais de nós:
Nós completos (full nodes):
Armazenam uma cópia total do blockchain ou timechain.
Validam e verificam todas as transações e blocos de acordo com as regras do protocolo.
Asseguram a segurança da rede ao rejeitar transações inválidas ou tentativas de fraude.
Nós leves (light nodes):
Armazenam somente partes do blockchain ou timechain, não a estrutura inteira.
Confiam em nós completos para obter dados sobre o histórico de transações.
São mais rápidos e menos exigentes em termos de recursos, mas dependem de terceiros para validação completa.
Os nós conferem se as transações enviadas seguem as regras do protocolo, como assinaturas digitais válidas e ausência de gastos duplos.
Somente transações válidas são enviadas para outros nós e incluídas no próximo bloco.
Os nós completos mantêm uma cópia atualizada de todo o histórico de transações da rede, garantindo integridade e transparência e se houver discrepâncias, os nós seguem a cadeia mais longa e válida, evitando manipulações.
Os nós transmitem informações de transações e blocos para outros nós na rede. Esse processo assegura que todos os participantes estejam sincronizados e atualizados.
Como a rede Bitcoin é composta por milhares de nós independentes, é quase impossível que um único agente controle ou modifique o sistema.
Os nós também protegem contra ataques ao validar informações e barrar tentativas de fraudes.
Os nós completos são muito importantes, pois atuam como auditores independentes. Eles não precisam de terceiros e podem verificar todo o histórico de transações diretamente.
Ao manterem uma cópia completa do blockchain ou timechain, esses nós permitem que qualquer pessoa valide transações sem depender de intermediários, promovendo clareza e liberdade financeira.
Além disso, os nós completos:
Reforçam a resistência à censura: Nenhum governo ou entidade pode excluir ou alterar dados registrados no sistema.
Preservam a descentralização: Quanto mais nós completos existirem, mais segura e forte será a rede.
Aumentam a confiança no sistema: Os usuários podem confirmar de forma independente se as regras estão sendo seguidas.
Apesar de seu valor, operar um nó completo pode ser difícil, pois exige espaço de armazenamento, processamento e largura de banda. À medida que o blockchain ou timechain cresce, os requisitos técnicos aumentam, o que pode dificultar a participação de usuários comuns.
Para resolver esse problema, a comunidade busca sempre soluções, como melhorias no software e aumento na escalabilidade, para facilitar o acesso à rede sem prejudicar a segurança.
Resumindo, os nós são a base da rede Bitcoin, desempenhando funções importantes na validação, verificação e distribuição de transações. Eles garantem a descentralização e a segurança do sistema, permitindo que os participantes operem de forma confiável sem depender de intermediários.
Particularmente, os nós completos têm um papel crucial na proteção da integridade do blockchain ou timechain, tornando a rede Bitcoin resistente a censura e manipulação.
Embora operar um nó possa exigir recursos técnicos, seu efeito na preservação da liberdade financeira e na confiança do sistema é inestimável. Assim, os nós continuam sendo elementos essenciais para o sucesso e a durabilidade do Bitcoin.
Muito obrigado por teres lido o texto até aqui, espero que esteja tudo bem contigo e um abraço enorme do teu madeirense bitcoiner maximalista favorito. Viva a liberdade!
-
@ 3bf0c63f:aefa459d
2024-12-06 20:37:26início
"Vocês vêem? Vêem a história? Vêem alguma coisa? Me parece que estou tentando lhes contar um sonho -- fazendo uma tentativa inútil, porque nenhum relato de sonho pode transmitir a sensação de sonho, aquela mistura de absurdo, surpresa e espanto numa excitação de revolta tentando se impôr, aquela noção de ser tomado pelo incompreensível que é da própria essência dos sonhos..."
Ele ficou em silêncio por alguns instantes.
"... Não, é impossível; é impossível transmitir a sensação viva de qualquer época determinada de nossa existência -- aquela que constitui a sua verdade, o seu significado, a sua essência sutil e contundente. É impossível. Vivemos, como sonhamos -- sozinhos..."
- Livros mencionados por Olavo de Carvalho
- Antiga homepage Olavo de Carvalho
- Bitcoin explicado de um jeito correto e inteligível
- Reclamações
-
@ 31a4605e:cf043959
2025-06-17 17:49:53Desde a sua criação, Bitcoin tem sido um ativo revolucionário, desafiando o sistema financeiro tradicional e propondo uma nova forma de dinheiro descentralizado. No entanto, o seu futuro ainda é incerto e gera intensos debates. Entre os cenários possíveis, dois extremos destacam-se: a hiperbitcoinização, onde Bitcoin se torna a moeda dominante na economia global, ou a obsolescência, caso a rede perca relevância e seja substituída por outras soluções.
Hiperbitcoinização: o mundo adota Bitcoin como padrão monetário
Perda de confiança nas moedas fiduciárias: Com a impressão excessiva de dinheiro por bancos centrais, muitas economias enfrentam inflação descontrolada. Bitcoin, com a sua oferta limitada de 21 milhões de unidades, apresenta-se como uma alternativa mais confiável.
Adoção crescente por empresas e governos: Alguns países já começaram a integrar Bitcoin na sua economia, aceitando-o para pagamentos e reserva de valor. Se essa tendência continuar, a legitimidade de Bitcoin como moeda global aumentará.
Facilidade de transações globais: Bitcoin permite transferências internacionais rápidas e baratas, eliminando a necessidade de intermediários financeiros e reduzindo custos operacionais.
Avanços tecnológicos: Melhorias na escalabilidade, como a Lightning Network, podem tornar Bitcoin mais eficiente para uso diário, facilitando sua adoção em massa.
Se a hiperbitcoinização acontecer, o mundo pode testemunhar uma mudança radical no sistema financeiro, com maior descentralização, resistência à censura e uma economia baseada em dinheiro sólido e previsível.
Obsolescência: Bitcoin perde relevância e É substituído
Regulações governamentais restritivas: Se grandes potências económicas impuserem regulações severas sobre Bitcoin, a adoção pode ser dificultada, reduzindo sua utilidade.
Falhas tecnológicas ou falta de inovação: Apesar da sua segurança e descentralização, Bitcoin pode enfrentar dificuldades para escalar de forma eficiente. Se soluções melhores surgirem e forem amplamente aceites, Bitcoin pode perder a sua posição de liderança.
Concorrência com alternativas mais rápidas e eficientes: Se outras formas de dinheiro digital conseguirem superar Bitcoin em termos de escalabilidade e usabilidade, a rede pode ver a sua adoção diminuir.
Falta de incentivos para os mineradores: Como a emissão de novos Bitcoins diminui a cada halving, os mineradores dependerão cada vez mais das taxas de transação. Se essas taxas não forem suficientes para sustentar a segurança da rede, pode haver um risco para a sua viabilidade a longo prazo.
Resumindo, o futuro do Bitcoin pode seguir diferentes caminhos, dependendo de fatores como inovação, adoção global e resistência a desafios externos. A hiperbitcoinização representaria uma revolução económica, com um sistema monetário descentralizado e resistente à inflação. No entanto, a obsolescência continua a ser um risco, caso a rede não consiga adaptar-se às exigências futuras. Independentemente do desfecho, Bitcoin já deixou a sua marca na história financeira, abrindo caminho para uma nova era de dinheiro digital e liberdade económica.
Muito obrigado por teres lido o texto até aqui, espero que esteja tudo bem contigo e um abraço enorme do teu madeirense bitcoiner maximalista favorito. Viva a liberdade!
-
@ 32e18276:5c68e245
2025-06-02 20:58:05Damus OpenSats Grant Q1 2025 Progress Report
This period of the Damus OpenSats grant has been productive, and encompasses the work our beta release of Notedeck. Since we sent our last report on January, this encompasses all the work after then.
Damus Notedeck
We released the Beta version of Notedeck, which has many new features:
Dave
We've added a new AI-powered nostr assistant, similar to Grok on X. We call him Dave.
Dave is integrated with tooling that allows it to query the local relay for posts and profiles:
Search
The beta release includes a fulltext search interface powered by nostrdb:
Zaps
You can now zap with NWC!
And More!
- GIFs!
- Add full screen images, add zoom & pan
- Introduce last note per pubkey feed (experimental)
- Allow multiple media uploads per selection
- Major Android improvements (still wip)
- Added notedeck app sidebar
- User Tagging
- Note truncation
- Local network note broadcast, broadcast notes to other notedeck notes while you're offline
- Mute list support (reading)
- Relay list support
- Ctrl-enter to send notes
- Added relay indexing (relay columns soon)
- Click hashtags to open hashtag timeline
Damus iOS
Work continued on the iOS side. While I was not directly involved in the work since the last report, I have been directing and managing its development.
What's new:
Coinos Wallet + Interface
We've partnered with coinos to enable a one-click, non-KYC lightning wallet!
We now have an NWC wallet interface, and we've re-enabled zaps as per the new appstore guidelines!
Now you can see all incoming and outgoing NWC transactions and start zapping right away.
Enhanced hellthread muting
Damus can now automatically mute hellthreads, instead of having to do that manually.
Drafts
We now locally persist note drafts so that they aren't lost on app restart!
Profile editing enhancements
We now have a profile picture editing tool so that profile pictures are optimized and optionally cropped
Conversations tab
We now have a conversations tab on user profiles, allowing you to see all of your past conversations with that person!
Enhanced push notifications
We've updated our push notifications to include profile pictures, and they are also now grouped by the thread that they came from.
And lots more!
Too many to list here, check out the full changelog
Nostrdb
nostrdb, the engine that powers notecrumbs, damus iOS, and notedeck, continued to improve:
Custom filters
We've added the ability to include custom filtering logic during any nostrdb query. Dave uses this to filter replies from kind1 results to keep the results small and to avoid doing post-processing.
Relay index + queries
There is a new relay index! Now when ingesting notes, you can include extra metadata such as where the note came from. You can use this index to quickly list all of the relays for a particular note, or for relay timelines.
NIP50 profile searches
To assist dave in searching for profiles, we added a new query plan for {kind:0, search:} queries to scan the profile search index.
How money was used
- relay.damus.io server costs
- Living expenses
Next quarter
We're making a strong push to get our Android version released, so that is the main focus for me.
-
@ 2b998b04:86727e47
2025-05-22 02:45:34I recently released my first open-source tool:\ 👉 nostr-signal-filter
It fetches and formats your latest top-level Nostr note or long-form article, cleans up any embedded links using TinyURL, and outputs a clean version ready for reposting to:
-
LinkedIn
-
Facebook
-
X / Twitter
⚙️ Built for Simplicity
The stack is intentionally minimal:
-
Python + WebSockets + Bech32
-
TinyURL API for link shortening
-
Dockerized CLI usage:
bash
CopyEdit
docker run --rm -e PUBKEY=npub1yourpubkeyhere nostr-fetcher > latest.md
From idea to working repo took under 3 hours — including debugging, Docker tweaks, README cleanup, and tagging a clean release.\ \ This most certainly would have taken much longer if I had done this all without ChatGPTs' help.\ \ 🖼️ Example Output (
latest.md
)text
CopyEdit
🕒 2025-05-20 22:24:17 📄 Note (originally posted on Nostr/primal.net) --- 🚨 New long-form drop: AI Isn’t Magic. It’s Engineering. How I use ChatGPT like any other tool in the stack — with iteration, discernment, and real output. Read it here: https://tinyurl.com/ynv7jq6g ⚡ Zaps appreciated if it resonates. --- 🔗 View on Nostr: https://tinyurl.com/yobvaxkx
🧪 Where I Used It
- ✅ Facebook: clean rendering with preview ->
- ✅ X/Twitter: teaser + link (had to truncate for character limit) ->
https://x.com/AndyGStanton/status/1925045477172773136
🙌 Try It Yourself
If you're publishing on Nostr but still sharing on legacy platforms:
👉 github.com/andrewgstanton/nostr-signal-filter
-
Clean output
-
Easy to run
-
Portable via Docker
All it needs is your
npub
.
⚡ Zap Me If You Found This Useful
If this tool saved you time — or if it sparked ideas for your own Nostr publishing stack —\ send a zap my way. I’m always looking to connect with other creators who value signal > noise.
🔗 Zap on Primal -> https://primal.net/andrewgstanton
🔭 Next Features (I’d Love Help With)
-
Archive all notes + articles (not just the latest 50) to
archive.md
-
Function to shorten links in any text block
-
Output
post.md
for any given Nostr event ID (not just latest) -
Optional API integration to post directly to LinkedIn or X
Built with ChatGPT’s help.\ Iterated. Published. Cross-posted.\ That’s proof of work.
-
-
@ 31a4605e:cf043959
2025-06-17 17:29:01Desde a sua criação, Bitcoin tem sido associado à ideia de liberdade financeira e individual. Diferente do dinheiro tradicional, controlado por governos e bancos centrais, Bitcoin permite que qualquer pessoa no mundo transacione e armazene valor sem depender de intermediários. Essa característica torna-se especialmente relevante em contextos de instabilidade económica, censura financeira e falta de acesso ao sistema bancário.
Bitcoin como ferramenta de autonomia financeira
A principal promessa de Bitcoin é devolver às pessoas o controlo sobre o seu próprio dinheiro. No sistema financeiro tradicional, os bancos e governos têm o poder de congelar contas, restringir transações e desvalorizar moedas através da impressão excessiva de dinheiro. Com Bitcoin, cada utilizador tem total posse dos seus fundos, desde que armazene as suas chaves privadas de forma segura. Isso significa que ninguém pode confiscar ou bloquear o acesso ao seu dinheiro.
Além disso, Bitcoin permite transações internacionais rápidas e baratas, sem depender de bancos ou plataformas de pagamento centralizadas. Em países onde as transferências internacionais são burocráticas e caras, Bitcoin representa uma alternativa eficiente e acessível.
Proteção contra a censura e o controlo estatal
Governos e instituições financeiras podem restringir o acesso ao dinheiro por motivos políticos ou económicos. Em regimes autoritários, dissidentes e jornalistas frequentemente enfrentam bloqueios financeiros como forma de repressão. Bitcoin oferece uma solução para esse problema, pois a sua rede descentralizada impede que qualquer entidade tenha controlo total sobre as transações.
Isto já foi demonstrado em diversos casos ao redor do mundo. Em momentos de crise, quando governos impõem restrições a saques bancários ou impõem limites às remessas de dinheiro, Bitcoin tem sido usado para contornar essas barreiras e garantir que as pessoas possam manter a sua liberdade financeira.
Desafios e responsabilidades da liberdade financeira
Embora Bitcoin ofereça mais liberdade individual, também exige maior responsabilidade por parte do utilizador. Diferente de uma conta bancária, onde um cliente pode recuperar o acesso à sua conta com um simples pedido, em Bitcoin a posse das chaves privadas é essencial. Se um utilizador perde as suas chaves, perde o acesso aos seus fundos para sempre.
Além disso, a volatilidade do preço de Bitcoin pode representar um desafio para quem pretende utilizá-lo como reserva de valor no curto prazo. No entanto, essa característica é compensada pelo seu modelo deflacionário, que protege a poupança a longo prazo contra a desvalorização causada pela inflação das moedas fiduciárias.
Resumindo, o Bitcoin representa uma revolução na forma como as pessoas gerem e protegem o seu dinheiro. Ao permitir transações livres de intermediários e resistir à censura financeira, Bitcoin fortalece a liberdade individual e oferece uma alternativa viável a sistemas financeiros centralizados e controlados por governos. No entanto, essa liberdade vem acompanhada da necessidade de maior responsabilidade, uma vez que cada utilizador é o único responsável pela segurança dos seus fundos. Para aqueles que valorizam a soberania financeira, Bitcoin é uma ferramenta poderosa que pode redefinir o conceito de dinheiro e autonomia pessoal no mundo moderno.
Muito obrigado por teres lido o texto até aqui, espero que esteja tudo bem contigo e um abraço enorme do teu madeirense bitcoiner maximalista favorito. Viva a liberdade!
-
@ 31a4605e:cf043959
2025-06-17 15:19:29A mineração de Bitcoin é um processo crucial para o funcionamento e a segurança da rede. Ela tem um papel importante na validação de transações e na geração de novos bitcoins, garantindo a integridade do sistema baseado em blockchain ou timechain. Esse processo envolve resolver cálculos matemáticos complicados, exigindo grande poder computacional. Além disso, a mineração tem efeitos econômicos, ambientais e tecnológicos que devem ser analisados de forma detalhada.
A mineração de Bitcoin é o procedimento pelo qual novas unidades da moeda são criadas e adicionadas à rede. Ela também é responsável por verificar e registrar transações no blockchain ou timechain. Esse sistema foi criado para ser descentralizado, eliminando a necessidade de uma autoridade central para controlar a emissão ou validar operações.
Os participantes do processo, chamados de mineradores, competem para resolver problemas matemáticos difíceis. Aquele que achar a solução primeiro ganha o direito de adicionar um novo bloco ao blockchain ou timechain e recebe uma recompensa em bitcoins, além das taxas de transação que estão no bloco. Esse mecanismo é chamado de prova de trabalho (Proof of Work - PoW).
O processo de mineração é muito técnico e segue uma série de etapas:
Agrupamento de transações: as transações enviadas pelos usuários são reunidas em um bloco pendente, que aguarda validação.
Resolução de problemas matemáticos: os mineradores devem encontrar um número específico, chamado nonce, que, quando combinado com os dados do bloco, gera um hash criptográfico dentro de um padrão exigido. Esse processo requer tentativa e erro, consumindo alto poder computacional.
Validação do bloco: quando um minerador encontra a solução correta, o bloco é validado e adicionado ao blockchain ou timechain. Todos os nós da rede verificam a autenticidade do bloco antes de aceitá-lo.
Recompensa: o minerador que vencer recebe uma recompensa em bitcoins, além das taxas pagas pelas transações que estão no bloco. Essa recompensa diminui ao longo do tempo em um evento chamado halving, que acontece aproximadamente a cada quatro anos.
A mineração de Bitcoin tem um impacto econômico grande, pois cria oportunidades de renda para pessoas e empresas. Ela também estimula o desenvolvimento de novas tecnologias, como processadores especializados (ASICs) e sistemas de resfriamento modernos.
Além disso, a mineração apoia a inclusão financeira ao manter uma rede descentralizada, permitindo transações rápidas e seguras em nível global. Em áreas com economias instáveis, o Bitcoin oferece uma alternativa viável para preservação de valor e transferências financeiras.
Apesar de seus benefícios econômicos, a mineração de Bitcoin é frequentemente criticada por seu impacto no meio ambiente. O processo de prova de trabalho consome grandes quantidades de eletricidade, especialmente em áreas onde a matriz energética depende de fontes fósseis.
Estima-se que a mineração de Bitcoin consuma tanta energia quanto alguns países inteiros, levantando preocupações sobre sua sustentabilidade. No entanto, há esforços contínuos para reduzir esses impactos, como o uso crescente de fontes de energia renovável e soluções alternativas, como redes baseadas na prova de participação (Proof of Stake - PoS) em outros sistemas descentralizados.
A mineração também enfrenta desafios ligados à escalabilidade e à concentração de poder computacional. Grandes empresas e pools de mineração dominam o setor, o que pode afetar a descentralização da rede.
Outro desafio é a complexidade crescente dos cálculos matemáticos, que exige hardware mais avançado e consome mais energia com o tempo. Para enfrentar esses problemas, pesquisadores estudam soluções que otimizem o uso de recursos e mantenham a rede sustentável por um longo período.
Resumindo, a mineração de Bitcoin é um processo essencial para manter a rede e para a criação de novas unidades da moeda. Ela garante segurança, transparência e descentralização, sustentando o funcionamento do blockchain ou timechain.
No entanto, a mineração também traz desafios, como o alto consumo de energia e a concentração de recursos em grandes pools. Apesar disso, a busca por soluções sustentáveis e inovações tecnológicas indica um futuro promissor, onde o Bitcoin continuará a ter um papel central na economia digital.
Muito obrigado por teres lido o texto até aqui, espero que esteja tudo bem contigo e um abraço enorme do teu madeirense bitcoiner maximalista favorito. Viva a liberdade!
-
@ e1cde248:609c13b0
2025-06-18 05:04:18ผมเพิ่งตัดสินใจลบแอปโซเชียลมีเดียทั้งหมดออกจากโทรศัพท์
ใน feed เต็มไปด้วยบัญชีขยะ\ content ที่ถูกยัดมาให้ดู ทั้งที่เราไม่ได้ติดตาม และไม่ได้อยากเห็น\ Bot, AI-generated content, clickbait, ข่าวดราม่าที่ออกแบบมาเพื่อกวนประสาทโดยเฉพาะ
ทั้งหมดนี้ไม่ได้ถูกสร้างมาเพื่อให้เรา “เข้าใจโลก”\ แต่มาเพื่อให้เรา อยู่บนแพลตฟอร์มให้นานที่สุด
แล้วเราก็หลอกตัวเองว่า\ “เรากำลังติดตามโลกอยู่นะ”\ “เรากำลังเชื่อมต่อกับผู้คน”
แต่ความจริงคือ...\ ยิ่งมีดราม่า ยิ่งมีความขัดแย้ง — แพลตฟอร์มยิ่งรวย\ และเรายิ่งพัง
เราได้อะไร?\ ได้ความเหนื่อยล้าแบบไม่รู้ที่มา\ สมาธิสั้นลง หงุดหงิดง่ายขึ้น\ และบางทีก็เศร้า...โดยไม่รู้ว่าทำไม
AI ที่อยู่เบื้องหลัง algorithm พวกนี้\ ฉลาดพอจะกำหนดได้ว่า\ “วันนี้คุณควรจะรู้สึกยังไง”
คุณอาจไม่ได้อยากรู้สึกแย่\ ไม่ได้อยากเปรียบเทียบตัวเองกับใคร\ แต่พอไถไปเรื่อย ๆ มันก็เกิดขึ้น\ แบบไม่รู้ตัว
มันซึมลึก\ มันกัดกินจิตใจ\ ช้า ๆ เงียบ ๆ และต่อเนื่อง
ผมนึกถึงโรคอัลไซเมอร์\ โรคที่ค่อย ๆ ลบตัวตนของคนออกไปทีละนิด\ สำหรับผม... มันน่ากลัวกว่ามะเร็งอีกนะ\ และถ้าจะพูดตรง ๆ ความตายอาจจะยังดีกว่าด้วยซ้ำ
แล้วถ้าคิดดูดี ๆ\ การเสพ content แบบไร้สติ\ การโดนรบกวนทุกวินาทีบนหน้าจอ\ มันก็คือ “การเร่งเวลา” ให้ตัวเราค่อย ๆ หายไป
เราอาจยังไม่แก่พอเป็นอัลไซเมอร์\ แต่ถ้า “ใจ” เราเริ่มลืมว่าเราเป็นใคร\ รู้สึกยังไง\ และอยากมีชีวิตแบบไหน...
มันก็ไม่ต่างกันเท่าไหร่หรอก
ตอนนี้เรายังเลือกได้\ ว่าจะปล่อยให้เทคโนโลยีขับเคลื่อนชีวิต\ หรือจะกลับมาเป็น “คนขับ” เองอีกครั้ง
-
@ 31a4605e:cf043959
2025-06-17 17:33:02Bitcoin tem vindo a desempenhar um papel cada vez mais relevante em protestos e movimentos sociais em todo o mundo. Graças à sua natureza descentralizada, resistente à censura e independente do controlo governamental, Bitcoin tornou-se uma ferramenta valiosa para ativistas, organizações e cidadãos que lutam contra regimes opressivos ou sistemas financeiros restritivos.
Bitcoin como alternativa ao sistema financeiro tradicional
Nos últimos anos, governos e instituições bancárias têm utilizado restrições financeiras como uma forma de repressão política. Contas bancárias congeladas, doações bloqueadas e limitações a transações são algumas das estratégias utilizadas para enfraquecer movimentos sociais e protestos. Bitcoin oferece uma alternativa, permitindo que fundos sejam transferidos e armazenados sem a interferência de bancos ou governos.
Uma das principais vantagens de Bitcoin nestes contextos é a sua resistência à censura. Enquanto contas bancárias podem ser encerradas e serviços de pagamento centralizados podem ser pressionados a bloquear transações, Bitcoin funciona numa rede descentralizada, onde ninguém pode impedir que um utilizador envie ou receba fundos.
Exemplos do uso do Bitcoin em protestos
Hong Kong (2019-2020): Durante os protestos pró-democracia, ativistas enfrentaram restrições financeiras ao tentarem organizar manifestações e campanhas. Muitos recorreram a Bitcoin para evitar o rastreamento do governo chinês e garantir financiamento para as suas ações.
Canadá (2022): O movimento dos camionistas que protestavam contra restrições governamentais viu as suas contas bancárias congeladas. Como alternativa, doações em Bitcoin foram utilizadas para contornar a repressão financeira.
Bielorrússia (2020): Após as eleições presidenciais contestadas, manifestantes usaram Bitcoin para financiar atividades e ajudar aqueles que perderam os seus empregos devido à repressão estatal.
Nigéria (2020): Durante os protestos contra a brutalidade policial, conhecidos como #EndSARS, doações internacionais para os manifestantes foram bloqueadas. Bitcoin tornou-se um dos principais meios de financiamento do movimento.
Desafios do uso do Bitcoin em movimentos sociais
Educação e acessibilidade: Muitos ainda desconhecem como utilizar Bitcoin de forma segura e eficiente. A falta de conhecimento pode dificultar a sua adoção em larga escala.
Segurança digital: Movimentos sociais muitas vezes operam sob vigilância intensa. Se as medidas de segurança adequadas não forem seguidas, os fundos podem ser comprometidos.
Volatilidade: O preço de Bitcoin pode variar significativamente num curto período, o que pode afetar o valor das doações e dos fundos arrecadados.
Resumindo, o Bitcoin tem demonstrado ser uma ferramenta essencial para a resistência contra a censura financeira e a repressão governamental. Ao permitir que movimentos sociais e ativistas financiem as suas causas sem depender de intermediários, Bitcoin fortalece a luta pela liberdade e pela justiça. No entanto, a adoção eficaz da tecnologia exige conhecimento, segurança e adaptação às suas características únicas. À medida que mais pessoas aprendem a utilizar Bitcoin, o seu papel nos protestos e movimentos sociais continuará a crescer, reforçando a importância da soberania financeira na luta por direitos e liberdades.
Muito obrigado por teres lido o texto até aqui, espero que esteja tudo bem contigo e um abraço enorme do teu madeirense bitcoiner maximalista favorito. Viva a liberdade!
-
@ 3bf0c63f:aefa459d
2024-11-07 14:56:17The case against edits
Direct edits are a centralizing force on Nostr, a slippery slope that should not be accepted.
Edits are fine in other, more specialized event kinds, but the
kind:1
space shouldn't be compromised with such a push towards centralization, becausekind:1
is the public square of Nostr, where all focus should be on decentralization and censorship-resistance.- Why?
Edits introduce too much complexity. If edits are widespread, all clients now have to download dozens of extra events at the same time while users are browsing a big feed of notes which are already coming from dozens of different relays using complicated outbox-model-based querying, then for each event they have to open yet another subscription to these relays -- or perform some other complicated batching of subscriptions which then requires more complexity on the event handling side and then when associating these edits with the original events. I can only imagine this will hurt apps performance, but it definitely raises the barrier to entry and thus necessarily decreases Nostr decentralization.
Some clients may be implemneted in way such that they download tons of events and then store them in a local databases, from which they then construct the feed that users see. Such clients may make edits potentially easier to deal with -- but this is hardly an answer to the point above, since such clients are already more complex to implement in the first place.
- What do you have against complex clients?
The point is not to say that all clients should be simple, but that it should be simple to write a client -- or at least as simple as physically possible.
You may not be thinking about it, but if you believe in the promise of Nostr then we should expect to see Nostr feeds in many other contexts other than on a big super app in a phone -- we should see Nostr notes being referenced from and injected in unrelated webpages, unrelated apps, hardware devices, comment sections and so on. All these micro-clients will have to implement some complicated edit-fetching logic now?
- But aren't we already fetching likes and zaps and other things, why not fetch edits too?
Likes, zaps and other similar things are optional. It's perfectly fine to use Nostr without seeing likes and/or zaps -- and, believe me, it does happen quite a lot. The point is basically that likes or zaps don't affect the content of the main post at all, while edits do.
- But edits are optional!
No, they are not optional. If edits become widespread they necessarily become mandatory. Any client that doesn't implement edits will be displaying false information to its users and their experience will be completely broken.
- That's fine, as people will just move to clients that support edits!
Exactly, that is what I expect to happen too, and this is why I am saying edits are a centralizing force that we should be fighting against, not embracing.
If you understand that edits are a centralizing force, then you must automatically agree that they aren't a desirable feature, given that if you are reading this now, with Nostr being so small, there is a 100% chance you care about decentralization and you're not just some kind of lazy influencer that is only doing this for money.
- All other social networks support editing!
This is not true at all. Bluesky has 10x more users than Nostr and doesn't support edits. Instagram doesn't support editing pictures after they're posted, and doesn't support editing comments. Tiktok doesn't support editing videos or comments after they're posted. YouTube doesn't support editing videos after they're posted. Most famously, email, the most widely used and widespread "social app" out there, does not support edits of any kind. Twitter didn't support edits for the first 15 years of its life, and, although some people complained, it didn't hurt the platform at all -- arguably it benefitted it.
If edits are such a straightforward feature to add that won't hurt performance, that won't introduce complexity, and also that is such an essential feature users could never live without them, then why don't these centralized platforms have edits on everything already? There must be something there.
- Eventually someone will implement edits anyway, so why bother to oppose edits now?
Once Nostr becomes big enough, maybe it will be already shielded from such centralizing forces by its sheer volume of users and quantity of clients, maybe not, we will see. All I'm saying is that we shouldn't just push for bad things now just because of a potential future in which they might come.
- The market will decide what is better.
The market has decided for Facebook, Instagram, Twitter and TikTok. If we were to follow what the market had decided we wouldn't be here, and you wouldn't be reading this post.
- OK, you have convinced me, edits are not good for the protocol. But what do we do about the users who just want to fix their typos?
There are many ways. The annotations spec, for example, provides a simple way to append things to a note without being a full-blown edit, and they fall back gracefully to normal replies in clients that don't implement the full annotations spec.
Eventually we could have annotations that are expressed in form of simple (human-readable?) diffs that can be applied directly to the post, but fall back, again, to comments.
Besides these, a very simple idea that wasn't tried yet on Nostr yet is the idea that has been tried for emails and seems to work very well: delaying a post after the "submit" button is clicked and giving the user the opportunity to cancel and edit it again before it is actually posted.
Ultimately, if edits are so necessary, then maybe we could come up with a way to implement edits that is truly optional and falls back cleanly for clients that don't support them directly and don't hurt the protocol very much. Let's think about it and not rush towards defeat.
-
@ 4ba8e86d:89d32de4
2025-06-17 17:47:48O protocolo Matrix é um sistema de comunicação descentralizado de código aberto que fornece uma plataforma para mensageiros descentralizados. O Element foi lançado em 2014 como uma implementação do protocolo Matrix, originalmente conhecido como Riot.im , A ideia do Element nasceu quando Matthew Hodgson e Amandine Le Pape, dois desenvolvedores de software, decidiram criar uma plataforma de comunicação aberta e segura, que permitisse aos usuários terem total controle sobre suas informações. Eles acreditavam que a internet deveria ser um lugar onde as pessoas pudessem se comunicar livremente, sem se preocupar com a privacidade de suas informações.
O Element é um aplicativo de chat gratuito e de código aberto disponível em várias plataformas, incluindo desktop, web e aplicativos móveis. Ele oferece criptografia de ponta a ponta, o que significa que as mensagens são protegidas e só podem ser lidas pelo remetente e pelo destinatário. Além disso, o Element é descentralizado, o que significa que ele não é controlado por uma única entidade, mas sim por uma rede global de servidores.
O Element é amplamente utilizado por indivíduos e empresas que desejam ter uma comunicação segura e privada. É frequentemente usado por equipes de projetos, organizações sem fins lucrativos e grupos ativistas que precisam compartilhar informações confidenciais e se comunicar de forma segura. O Element também é conhecido por seu recurso de salas públicas, que permite que os usuários se juntem a grupos de discussão sobre vários tópicos de interesse.
Uma das principais vantagens do Element é sua arquitetura descentralizada. Ao contrário das plataformas de mensagens convencionais que centralizam os dados em seus próprios servidores, o Element utiliza uma rede descentralizada, distribuindo as informações em diversos servidores espalhados pelo mundo. Isso significa que os dados dos usuários são menos suscetíveis a ataques cibernéticos e invasões, já que não são centralizados em um único ponto vulnerável.
Para usar o Element, normalmente os usuários precisam se registrar em um servidor Matrix. Existem várias opções disponíveis, incluindo servidores públicos e privados. No entanto, outra opção é criar um servidor próprio para usar o Element.
O Element também utiliza criptografia de ponta a ponta para proteger as mensagens e arquivos trocados entre os usuários. Isso significa que apenas o remetente e o destinatário das mensagens podem ler o conteúdo, garantindo que as informações permaneçam seguras e privadas.
Outra vantagem do Element é sua ampla variedade de recursos, incluindo videochamadas criptografadas, compartilhamento de tela e integração com outros serviços, como calendários e aplicativos de produtividade. Isso torna o Element uma plataforma completa de comunicação e colaboração, adequada para uso pessoal e empresarial.
O Element também é fácil de usar e possui uma interface intuitiva e personalizável. Os usuários podem personalizar a aparência do aplicativo e acessar diferentes configurações e recursos com apenas alguns cliques.
https://element.io/
https://github.com/vector-im/element-android
-
@ e5cfb5dc:0039f130
2025-06-17 11:11:30はりまメンタルクリニック:GIDの大手そう。丸の内線ならパムくんちが近い。
わらびメンタルクリニック:GIDの大手そう?公式サイトには影もかたちも
ナグモクリニック:SRS手術までしてるところ。GID精神科外来が月1第1木曜日だけ?
狭山メンタルクリニック:距離・時間的にはまま近い。サイトの記述が思想的にちょとあやしげ。新患受付がだいぶ先。GIDは専門外か?
川島領診療所:オンライン診療あり!強迫性障害や美容皮膚科をやっている。雰囲気よさそうなところ。GIDは専門外か?
Jこころのクリニック:電車いっぽんなので楽。GIDは専門外か?
ハッピースマイルクリニック:オンライン診療あり!GIDは専門外か?
-
@ 31a4605e:cf043959
2025-06-17 17:27:05Desde a sua criação, Bitcoin tem sido visto tanto como uma inovação financeira quanto como uma ameaça ao controlo governamental sobre a economia. Como uma moeda descentralizada, Bitcoin opera fora do sistema financeiro tradicional, desafiando a autoridade dos bancos centrais e dos governos que regulam a emissão e circulação do dinheiro. Essa característica tem levado a diversos conflitos entre governos e a crescente adoção de Bitcoin por indivíduos e empresas.
Razões para a oposição governamental
Perda de controlo monetário: Os governos controlam a economia através da emissão de moeda fiduciária e da definição de políticas monetárias. Como Bitcoin tem uma oferta fixa e não pode ser manipulado, isso reduz a influência governamental sobre a economia.
Dificuldade na tributação e fiscalização: A natureza descentralizada de Bitcoin dificulta a cobrança de impostos e o rastreamento de transações, tornando mais difícil para os governos garantir a conformidade fiscal.
Concorrência com moedas digitais estatais (CBDCs): Muitos países estão a desenvolver moedas digitais de banco central (CBDCs), que oferecem maior controlo sobre as transações financeiras. Bitcoin representa uma alternativa descentralizada, o que pode ameaçar a adoção dessas moedas estatais.
Preocupações com crimes financeiros: Alguns governos argumentam que Bitcoin pode ser usado para lavagem de dinheiro e financiamento ilícito, apesar de ser mais rastreável do que o dinheiro físico devido à transparência da blockchain ou timechain.
Exemplos de conflitos entre governos e Bitcoin
El Salvador: Foi o primeiro país a tornar Bitcoin moeda legal em 2021. Essa decisão gerou reações negativas de instituições financeiras internacionais, como o FMI, que alertou para riscos económicos e tentou pressionar o país a reverter a sua decisão.
China: Em 2021, a China proibiu a mineração e o uso de Bitcoin, citando preocupações ambientais e riscos financeiros. Apesar da proibição, muitos utilizadores chineses continuam a usar Bitcoin de forma descentralizada.
Estados Unidos: Embora Bitcoin seja legal nos EUA, o governo tem aumentado a regulamentação sobre exchanges e mineradores, tentando exercer maior controlo sobre a rede.
União Europeia: A UE tem imposto regulamentos rigorosos sobre Bitcoin, como exigências de identificação para transações, mas não proibiu a sua utilização.
O futuro da adoção do Bitcoin
Apesar da resistência de alguns governos, Bitcoin continua a ser adotado por indivíduos e empresas como uma alternativa financeira segura. Em países com economias instáveis, Bitcoin tem sido uma ferramenta essencial para proteger a riqueza contra a inflação e restrições bancárias.
A tentativa de controlo governamental pode dificultar a adoção de Bitcoin em algumas regiões, mas não impedirá o seu crescimento global. Como uma rede descentralizada, Bitcoin não pode ser banido completamente, e a sua utilidade como reserva de valor e meio de troca continuará a atrair utilizadores em todo o mundo.
Resumindo, os conflitos entre governos e a adoção de Bitcoin refletem o choque entre um sistema financeiro centralizado e uma tecnologia descentralizada que devolve o controlo do dinheiro aos indivíduos. Embora alguns governos tentem restringir o seu uso, Bitcoin continua a crescer e a provar a sua resistência, tornando-se cada vez mais uma opção viável para aqueles que procuram liberdade financeira.
Muito obrigado por teres lido o texto até aqui, espero que esteja tudo bem contigo e um abraço enorme do teu madeirense bitcoiner maximalista favorito. Viva a liberdade!
-
@ 65912a7a:5dc638bf
2024-11-22 21:37:16Details
- ⏲️ Prep time: 5 min
- 🍳 Cook time: 30 min
- 🍽️ Servings: 12
Ingredients
- 12-14oz fresh cranberries
- 1⅓ cup packed brown sugar
- 1 cup raisins
- 1 orange, peeled & chopped
- 1 cup water
Directions
- Using medium sauce pan, simmer cranberries and water for 5-6 min. Cranberries will start to pop.
- Add brown sugar, raisins, and chopped orange to the berries.
- Bring to a simmer and continue to cook for 20 min. Stir often to prevent sticking. Remove from heat.
- Let set until room temp. Mixture will thicken as it cools.
- Put in a covered container and keep refrigerated. Lasts for about 2 weeks.
-
@ 31a4605e:cf043959
2025-06-17 17:46:15Desde a sua criação, Bitcoin tem sido um marco na revolução do dinheiro digital, mas a sua evolução não parou no conceito inicial de transações descentralizadas. Ao longo dos anos, novas soluções tecnológicas foram desenvolvidas para expandir as suas capacidades, tornando-o mais eficiente e versátil. Entre essas inovações, destacam-se os smart contracts e a Lightning Network, que permitem aumentar a funcionalidade e escalabilidade da rede, garantindo um sistema mais rápido, barato e acessível.
Smart contracts no Bitcoin
Os smart contracts (contratos inteligentes) são programas que executam automaticamente determinadas ações quando certas condições pré-definidas são cumpridas. Embora o conceito seja mais comummente associado a outras redes, Bitcoin também suporta contratos inteligentes, especialmente através de atualizações como o Taproot.
Os smart contracts em Bitcoin permitem funcionalidades como:
Pagamentos condicionais: Transações que só são concluídas se determinadas regras forem cumpridas, como assinaturas múltiplas ou prazos específicos.
Gestão avançada de fundos: Utilização de carteiras multi-assinatura, onde diferentes partes precisam aprovar uma transação antes de ser processada.
Maior privacidade: Com a atualização Taproot, os smart contracts podem ser mais eficientes e indistinguíveis das transações normais, melhorando a privacidade da rede.
Embora os contratos inteligentes em Bitcoin sejam mais simples do que em outras redes, essa simplicidade é uma vantagem, pois mantém a segurança e robustez da rede, evitando vulnerabilidades complexas.
Lightning Network: escalabilidade e transações instantâneas
Um dos maiores desafios enfrentados por Bitcoin é a escalabilidade. Como a rede original foi desenhada para priorizar segurança e descentralização, a velocidade das transações pode ser limitada em períodos de alta procura. Para resolver esse problema, foi criada a Lightning Network, uma solução de segunda camada que permite transações quase instantâneas e com taxas extremamente baixas.
A Lightning Network funciona criando canais de pagamento entre utilizadores, permitindo que realizem várias transações fora da blockchain ou timechain principal de Bitcoin, registando apenas o saldo final na rede principal. Algumas vantagens incluem:
Velocidade: Transações são concluídas em milissegundos, tornando Bitcoin mais adequado para pagamentos diários.
Taxas baixas: Como as transações ocorrem fora da blockchain ou timechain principal, as taxas são mínimas, permitindo microtransações viáveis.
Descongestionamento da rede: Ao transferir grande parte das transações para a Lightning Network, a rede principal de Bitcoin torna-se mais eficiente e menos sobrecarregada.
Resumindo, o Bitcoin continua a evoluir tecnologicamente para se adaptar às necessidades de um sistema financeiro global. Os smart contracts aumentam as suas funcionalidades, permitindo maior flexibilidade e segurança nas transações. A Lightning Network melhora a escalabilidade, tornando Bitcoin mais rápido e eficiente para pagamentos do dia a dia. Com estas inovações, Bitcoin mantém-se na vanguarda da revolução financeira, demonstrando que, apesar das limitações iniciais, continua a adaptar-se e a crescer como um sistema monetário verdadeiramente descentralizado e global.
Muito obrigado por teres lido o texto até aqui, espero que esteja tudo bem contigo e um abraço enorme do teu madeirense bitcoiner maximalista favorito. Viva a liberdade!
-
@ 04c915da:3dfbecc9
2025-05-16 18:06:46Bitcoin has always been rooted in freedom and resistance to authority. I get that many of you are conflicted about the US Government stacking but by design we cannot stop anyone from using bitcoin. Many have asked me for my thoughts on the matter, so let’s rip it.
Concern
One of the most glaring issues with the strategic bitcoin reserve is its foundation, built on stolen bitcoin. For those of us who value private property this is an obvious betrayal of our core principles. Rather than proof of work, the bitcoin that seeds this reserve has been taken by force. The US Government should return the bitcoin stolen from Bitfinex and the Silk Road.
Using stolen bitcoin for the reserve creates a perverse incentive. If governments see bitcoin as a valuable asset, they will ramp up efforts to confiscate more bitcoin. The precedent is a major concern, and I stand strongly against it, but it should be also noted that governments were already seizing coin before the reserve so this is not really a change in policy.
Ideally all seized bitcoin should be burned, by law. This would align incentives properly and make it less likely for the government to actively increase coin seizures. Due to the truly scarce properties of bitcoin, all burned bitcoin helps existing holders through increased purchasing power regardless. This change would be unlikely but those of us in policy circles should push for it regardless. It would be best case scenario for American bitcoiners and would create a strong foundation for the next century of American leadership.
Optimism
The entire point of bitcoin is that we can spend or save it without permission. That said, it is a massive benefit to not have one of the strongest governments in human history actively trying to ruin our lives.
Since the beginning, bitcoiners have faced horrible regulatory trends. KYC, surveillance, and legal cases have made using bitcoin and building bitcoin businesses incredibly difficult. It is incredibly important to note that over the past year that trend has reversed for the first time in a decade. A strategic bitcoin reserve is a key driver of this shift. By holding bitcoin, the strongest government in the world has signaled that it is not just a fringe technology but rather truly valuable, legitimate, and worth stacking.
This alignment of incentives changes everything. The US Government stacking proves bitcoin’s worth. The resulting purchasing power appreciation helps all of us who are holding coin and as bitcoin succeeds our government receives direct benefit. A beautiful positive feedback loop.
Realism
We are trending in the right direction. A strategic bitcoin reserve is a sign that the state sees bitcoin as an asset worth embracing rather than destroying. That said, there is a lot of work left to be done. We cannot be lulled into complacency, the time to push forward is now, and we cannot take our foot off the gas. We have a seat at the table for the first time ever. Let's make it worth it.
We must protect the right to free usage of bitcoin and other digital technologies. Freedom in the digital age must be taken and defended, through both technical and political avenues. Multiple privacy focused developers are facing long jail sentences for building tools that protect our freedom. These cases are not just legal battles. They are attacks on the soul of bitcoin. We need to rally behind them, fight for their freedom, and ensure the ethos of bitcoin survives this new era of government interest. The strategic reserve is a step in the right direction, but it is up to us to hold the line and shape the future.
-
@ 47750177:8969e41a
2024-11-04 12:00:0027.2 Release Notes
Bitcoin Core version 27.2 is now available from:
This release includes various bug fixes and performance improvements, as well as updated translations.
Please report bugs using the issue tracker at GitHub:
https://github.com/bitcoin/bitcoin/issues
To receive security and update notifications, please subscribe to:
https://bitcoincore.org/en/list/announcements/join/
How to Upgrade
If you are running an older version, shut it down. Wait until it has completely shut down (which might take a few minutes in some cases), then run the installer (on Windows) or just copy over
/Applications/Bitcoin-Qt
(on macOS) orbitcoind
/bitcoin-qt
(on Linux).Upgrading directly from a version of Bitcoin Core that has reached its EOL is possible, but it might take some time if the data directory needs to be migrated. Old wallet versions of Bitcoin Core are generally supported.
Compatibility
Bitcoin Core is supported and extensively tested on operating systems using the Linux Kernel 3.17+, macOS 11.0+, and Windows 7 and newer. Bitcoin Core should also work on most other Unix-like systems but is not as frequently tested on them. It is not recommended to use Bitcoin Core on unsupported systems.
Notable changes
P2P
-
30394 net: fix race condition in self-connect detection
Init
-
30435 init: change shutdown order of load block thread and scheduler
RPC
-
30357 Fix cases of calls to FillPSBT errantly returning complete=true
PSBT
-
29855 psbt: Check non witness utxo outpoint early
Test
-
30552 test: fix constructor of msg_tx
Doc
-
30504 doc: use proper doxygen formatting for CTxMemPool::cs
Build
-
30283 upnp: fix build with miniupnpc 2.2.8
-
30633 Fixes for GCC 15 compatibility
CI
-
30193 ci: move ASan job to GitHub Actions from Cirrus CI
-
30299 ci: remove unused bcc variable from workflow
Credits
Thanks to everyone who directly contributed to this release:
- Ava Chow
- Cory Fields
- Martin Zumsande
- Matt Whitlock
- Max Edwards
- Sebastian Falbesoner
- Vasil Dimov
- willcl-ark
As well as to everyone that helped with translations on Transifex.
-
-
@ 3bf0c63f:aefa459d
2024-10-31 16:08:50Anglicismos estúpidos no português contemporâneo
Palavras e expressões que ninguém deveria usar porque não têm o sentido que as pessoas acham que têm, são apenas aportuguesamentos de palavras inglesas que por nuances da história têm um sentido ligeiramente diferente em inglês.
Cada erro é acompanhado também de uma sugestão de como corrigi-lo.
Palavras que existem em português com sentido diferente
- submissão (de trabalhos): envio, apresentação
- disrupção: perturbação
- assumir: considerar, pressupor, presumir
- realizar: perceber
- endereçar: tratar de
- suporte (ao cliente): atendimento
- suportar (uma idéia, um projeto): apoiar, financiar
- suportar (uma função, recurso, característica): oferecer, ser compatível com
- literacia: instrução, alfabetização
- convoluto: complicado.
- acurácia: precisão.
- resiliência: resistência.
Aportuguesamentos desnecessários
- estartar: iniciar, começar
- treidar: negociar, especular
Expressões
- "não é sobre...": "não se trata de..."
Ver também
-
@ 1739d937:3e3136ef
2024-10-29 16:57:08This update marks a major milestone for the project. I know, with certainty, that MLS messaging over Nostr is going to work. That might sound a little crazy after so many months working on the project, and I was pretty confident, but until you’ve got running code, it’s all conjecture.
Late last week, I released a video of a working prototype of White Noise that shows the full flow; creating groups, inviting other users to join those groups, accepting invites, and sending messages back-and-forth. I’m thrilled that I’ve gotten this far but also appalled that it’s taken so long and disgusted at the state of the code in the app (I’ve been told I have unrelenting standards 😅).
If you missed the video last week...
nostr:note125cuk0zetc7sshw52v5zaq9apq3rq7e2x587tr2c96t7z7sjs59svwv0fj
What's Next?
In this update, I want to cover a few things about how I'm planning to proceed and how I’m splitting code out of the app into libraries that will help other developers implement MLS messaging in their own Nostr clients.
First off, many of you know that I've been building White Noise as a Rust app using the Tauri framework. The OpenMLS implementation is also written in Rust (with bindings for many other languages). So, when you hear me talking about library code, think Rust crates for now.
The first library, called openmls-nostr, is an extension/abstraction on top of the openmls implementation of the MLS spec that helps Nostr clients interact more easily with that implementation in a way that feels native to Nostr. Mostly this will be helping developers interact with MLS primitives and ensure that they’re creating, validating, and serializing these objects in the right way at the right times.
The second isn’t a new library as a big contribution to the already excellent rust-nostr library from nostr:npub1drvpzev3syqt0kjrls50050uzf25gehpz9vgdw08hvex7e0vgfeq0eseet. The methods that will go in rust-nostr are highly abstracted and based specifically on the requirements of NIP-104. Mostly this will be helping developers to take those MLS primitives and publish or query them as Nostr events at the right times and to/from the right relays.
Most of this code was originally written directly in the White Noise library so this week I've started to pull code for both of those libraries out and move it to its new home. While I’ve been at it, I've been writing some tests and trying to document things.
An unfortunate offshoot of this is that the usable builds of White Noise are going to take a touch longer. I promise it’s still a very high priority but at this point I need to clean a few things up based on what I've learned thus far.
Another thing that is slowing down release is that; behind the scenes of the dev work, I’ve been battling with Apple for nearly 2 months now to get a proper developer team set up so that we can publish the app via TestFlight for MacOS and iOS. I’ve also been recently learning the intricacies of Android publishing (oh my dear god there are so many devices, OS versions, etc.).
With that in mind, if you know anyone who can help get me up to speed on CI/CD, release pipelines, and multi-platform distribution please hit me up. I would love to learn more and hopefully shortcut some of the pain.
Thanks again so much for all the support over the last few months! It means a lot to me and is a huge part of what is keeping me going on this. 🙏