-
@ bcea2b98:7ccef3c9
2023-07-28 13:48:57The book "Softwar: A Novel Theory on Power Projection and the National Strategic Significance of Bitcoin" by Jason P. Lowery offers an extensive exploration of Bitcoin through the lens of strategic and cybersecurity, as opposed to a purely fiscal one. It presents a novel theoretical paradigm for assessing the potential strategic national implications of Bitcoin, viewed as an electro-cyber defense technology as opposed to a decentralized electronic cash system.
The following are some pivotal arguments and possible inaccuracies from the standpoint of a Bitcoin developer:
Proof-of-work
The proposition that Bitcoin, via its proof-of-work protocol, can be perceived as an electro-cyber security framework allowing for the exertion of tangible power in the digital domain. Lowery posits that Bitcoin equips individuals with the capacity to enforce severe physical consequences (represented in wattage) on adversarial entities attempting to exploit them via software. This viewpoint conceptualizes Bitcoin as a mechanism for power projection, enabling individuals to establish and maintain an untrusting, permissionless, egalitarian, and decentralized dominion over bits of information, provided they have the will and capability to wield physical power to safeguard it (Page 245).
-
The critique here, though, points out that this is an intriguing perspective; the primary purpose of Bitcoin is to operate as a decentralized digital currency. The power projection elucidated by the author is an ancillary outcome of Bitcoin's decentralization and inherent security, rather than its primary intent. The function of Bitcoin's proof-of-work algorithm is to fortify the network against double-spending and other forms of attack, not to project power in a geopolitical context.
-
The book also proposes that Bitcoin could upheave human power-based dominance hierarchies from their foundational roots (Page 374). While it's undeniable that Bitcoin has the potential to disrupt conventional financial systems and power structures, it was not designed to be an instrument for power projection in the same way that military or economic resources are. Bitcoin is a tool for financial sovereignty and privacy, not a weapon for geopolitical power struggles.
-
The book seems to equate the physical power utilized in Bitcoin's proof-of-work algorithm (i.e., the energy expended to mine Bitcoin) with the notion of power projection in a geopolitical environment. While it's true that Bitcoin mining demands substantial energy resources, it is distinctly different from the concept of power projection, which usually involves employing military or economic force to influence the actions and behavior of other nations.
Bits and Value
The book asserts that the bits within Bitcoin can symbolize any kind of valuable data that individuals desire it to represent, including but not confined to financial information (Page 375). It further implies that once we have deduced how to keep financial bits of data physically secure against attack, we have in essence figured out how to protect all types of information from physical attack (Page 34).
-
While it is indeed factual that Bitcoin's blockchain can be employed to store and transmit non-financial data, it's crucial to understand that this is not its primary function. Bitcoin was developed as a peer-to-peer electronic cash system, with the primary objective of facilitating financial transactions without necessitating a trusted third party. The data that Bitcoin primarily processes is transaction data, i.e., detailing who transferred how much Bitcoin to whom.
-
The capability to store non-financial data on the Bitcoin blockchain is more of an unintended consequence of its design rather than a fundamental feature. This is accomplished by utilizing specific fields in the transaction data to store arbitrary data, but this practice is generally discouraged because it can result in blockchain bloat. The Bitcoin blockchain is not intended to function as a general-purpose data storage system, and employing it as such can induce inefficiencies.
-
Storing non-financial data on the Bitcoin blockchain does not offer any additional security advantages over storing financial data. The security of the Bitcoin blockchain is derived from its decentralized, proof-of-work consensus mechanism, which ensures that no single entity can control or manipulate the transaction history. This security extends equally to all data housed on the blockchain, whether it's financial or non-financial.
Strangler Pattern
The book suggests that Bitcoin could serve as a "strangler pattern" replacement of our legacy internet infrastructure with a modern architecture that isn’t as clearly susceptible to systemic exploitation and abuse (Page 376). The book further intimates that Bitcoin could operate as the preeminent mechanism employed by digital-age societies to map or anchor elements of the old internet version to the revamped version of the internet (Page 322).
-
While Bitcoin indeed introduces a new, decentralized paradigm for financial transactions and data storage, it isn't designed to supplant the entire internet infrastructure. The internet is an extensive and multifaceted system supporting a wide variety of applications and services, from email and web browsing to video streaming and cloud computing. In contrast, Bitcoin is a specific application that operates on the internet, designed to enable peer-to-peer financial transactions.
-
The claim made by the book appears to conflate the concept of a decentralized financial system (which Bitcoin offers) with the idea of a decentralized internet (which is a much broader and more intricate concept). While there are projects and technologies aiming to foster a more decentralized internet (such as InterPlanetary File System (IPFS) and various blockchain-based "Web 3.0" initiatives), Bitcoin is not one of them.
-
The book's suggestion that Bitcoin could serve as the dominant mechanism for tying the legacy internet to a new version of the internet is speculative and isn't substantiated by current technological realities. While it's true that blockchain technology (the underlying technology of Bitcoin) has potential applications in areas like decentralized identity systems and domain name systems, these are still largely experimental and have not been widely adopted yet.
Kinetic Power
The book propososes that Bitcoin could significantly transform the way humans vie for control over valued resources, effectively resetting the global balance of power in a manner akin to the profound changes brought about by full-scale kinetic world wars (Page 376). The author further proposes that Bitcoin could revolutionize the perception of physical confrontation in the digital-age society (Page 370). Moreover, it's implied that global adoption of an electro-cyber form of physical power competition, facilitated by proof-of-work technologies like Bitcoin, could lead to the genesis of a completely novel form of polity (Page 385).
-
It is undeniable that Bitcoin holds the potential to disrupt conventional financial systems and power structures. However, juxtaposing its impact to the scale and consequences of world wars is hyperbolic and speculative. World wars resulted in massive loss of human lives, extensive destruction, and substantial shifts in geopolitical boundaries and power structures. In contrast, Bitcoin is a digital currency that operates on a decentralized network. While it can indeed influence financial systems and potentially disrupt some power structures, particularly those related to finance and banking, it is incapable of causing physical destruction or loss of life.
-
The book suggests that Bitcoin could spawn a completely new form of polity is speculative and isn't supported by current realities. Although Bitcoin and other cryptocurrencies can indeed influence how people transact and store value, they don't intrinsically alter the fundamental nature of societal organization or governance. They may contribute to shifts in power dynamics, particularly in the financial sector, but they do not supplant the need for traditional forms of governance and societal organization.
-
The book also seems to conflate the concept of power competition in a geopolitical context with the concept of power competition in the context of Bitcoin mining. Bitcoin mining does involve a form of competition, as miners compete to solve complex mathematical problems to add new blocks to the blockchain and receive Bitcoin rewards. However, this is far from the concept of power competition in a geopolitical context, which involves nations competing for resources, influence, and dominance on the global stage.
Projecting Power
The book asserts that Bitcoin, through its proof-of-work technology, could help society secure itself against systemic exploitation of computer networks (Page 378). The author argues that Bitcoin could empower individuals to physically secure their digital information, by projecting physical power in, from, and through cyberspace to impose severe physical costs on those who exploit our computing systems (Page 347). The author further speculates that national adoption of Bitcoin could be conceptualized as the employment of an electro-cyber militia to safeguard and defend a nation’s valuable digital information (Page 360).
-
While it's true that Bitcoin and other cryptocurrencies can provide a level of security and privacy not available in traditional financial systems, it's crucial to underscore that they also introduce new vulnerabilities and potential for misuse. Bitcoin transactions are irreversible, which can make them appealing for fraudulent activities. Bitcoin wallets can be lost or stolen if not adequately secured. The security of the Bitcoin network itself hinges on its decentralized nature and the computational power required to alter the blockchain, but individual users are still susceptible to scams and hacking.
-
The book's suggestion that Bitcoin could serve as a form of "electro-cyber militia" is speculative and not universally accepted within the Bitcoin community. Although Bitcoin does offer a method for individuals to secure their financial transactions against interference from third parties, it is not designed to shield against all forms of cyber exploitation or to serve as a form of national defense.
-
In conclusion, Softwar presents an unconventional viewpoint on Bitcoin's potential influence on national strategic security, proffering that Bitcoin could serve as an effective tool for power projection, system defense, and even societal reorganization. However, these propositions, while intriguing, often veer towards the speculative and seem to be somewhat misaligned with the predominant understanding of Bitcoin's primary purpose and functionality within the field of computer science.
-
While this book undoubtedly offers a unique and thought-provoking perspective on Bitcoin's wider implications, it is crucial to approach these theories with a discerning and critical eye. It is always beneficial to juxtapose such theories with the broader consensus within the Bitcoin development and computer science communities, to gain a more rounded understanding of this remarkable technology. Ultimately, Bitcoin continues to evolve and its full potential, while yet to be fully realized, remains a subject of intense debate and exploration within the computer science community.
-
-
@ 75656740:dbc8f92a
2023-07-21 18:18:41"Who do you say that I am?"
In Matthew 16 Jesus cut to the heart of what defines identity. First he asked what other people said about him, then he asked what the disciples thought, finally he gave his own take by agreeing with the disciples. In trying to understand who someone is, we have three and only three possible sources of information.
- Who they tell us they are.
- Who others say about them.
- What we observe for ourselves.
Putting these three together constitutes identity. Identity is always unique for each connection in the social graph. Who you are to me is always different than who you are to anyone else. As such identity is largely out of our direct control. We can influence others perception of ourselves by comporting ourselves in a certain way, but we cannot compel it.
With this in mind, it is imperative to build protocols that mirror this reality as closely as possible. The problem is largely one of UI. How can we simultaneously display all three aspects of identity in a clear and uncluttered way?
The default has always been to just display an individual's claim to identity. Each user gets to choose a name and an avatar. This generally works in small communities with low rates of change both in who the members are and in how they present themselves. In these cases, each user can keep a mental map of what to expect from each name and avatar. "Oh that is just keyHammer24 doing his thing." Note that even if KeyHammer24 decides to change their nickname the mental map in the other users won't change instantly, if ever.
This falls apart in larger communities, where each user cannot maintain a mental model of who is who. Impersonation and collisions become a problem, so we add some "What others say about them" information such as blue check-marks or what "what we observe for ourselves" information like pet-names in a phone contact list or a note that we follow that account.
I don't personally have a final solution for this, I only know that we should be collecting and displaying all three sources of information from the outset. Perhaps we could do something like... * Default to showing a users preferred identifiers, but switch to the avatar and handle we self-assign them on hover. * Display a percentage of confidence that we know who the person is and that they are presenting themselves as who we expect them to be. You probably aren't the Elon Musk that I expect if you recently had different names / aren't the one I follow / none of my network follows / have been reported as misleading. * Reserve check-marks for keys that each user has signed in person. Only we can be the arbiter of who gets a check-mark in our own feed. * Maintain a list of past aliases along with a "Community Notes" like description of an account brought up by clicking on a ⓘ icon. * Have a full pet-names override.
I think Nostr already have much of this built into the protocol, it just needs to be standardized into the interface of various application. This is something on which I am very interested in hearing other ideas.
A note on anonymity
Real world identities should always be preferred. It allows for building real relationships and treating each other with real world respect. The real you is far more fascinating than a curated persona. Real identities should also never be enforced at a protocol level. Some people will be in real circumstances that preclude honest engagement without threat to their safety.
If you found this engaging I also wrote about why Social Network companies have an unsolvable problem here. and why we have to design for finite reach here
-
@ b3590d02:0f2b1ae4
2023-07-06 18:44:20Verification: tweet
Badge implications:
- an account that joined Twitter in 2010 or earlier
- an account with fewer than 10,000 followers
Twitter user tweetious profile information:
- Joined in 2008
- Follower count: 699
- Following count: 529
-
@ 7f5c2b4e:a818d75d
2023-07-05 13:49:49This translation of the nostr:naddr1qqxnzd3cxserxdpsxverzwp4qgs87hptfey2p607ef36g6cnekuzfz05qgpe34s2ypc2j6x24qvdwhgrqsqqqa28zcj37a was prepared by nostr:npub138s5hey76qrnm2pmv7p8nnffhfddsm8sqzm285dyc0wy4f8a6qkqtzx624
Habla es una plataforma basada en Nostr que te permite crear y gestionar notas de nostr de formato largo (long-form posts). Se podría comparar con Medium, pero Habla es mucho más que eso. Habla es superior a las plataformas tradicionales de blogs porque está construida sobre Nostr. Es interoperable con una plétora de otras aplicaciones Nostr, lo que hace que la experiencia del usuario sea fluida y más atractiva. Además, gracias a la Lightning Network, tu aportación -si los lectores la consideran valiosa- puede y será recompensada al instante con el mejor dinero que la humanidad ha visto jamás: bitcoin.
¿Qué es Nostr?
Nostr es una nueva forma de comunicarse online que ofrece un montón de ventajas a sus usuarios. Es gratis para todo el mundo; no necesitas un documento de identidad ni ningún otro tipo de verificación por parte de terceros para empezar a conectarte, relacionarte con personas afines y hacer crecer la comunidad que te rodea. Nostr suele confundirse con una plataforma de redes sociales, pero es mucho más que eso. Te animamos a que consultes los recursos de Nostr reunidos aquí para darte cuenta de la magnitud potencial de esta herramienta.
¿Cómo inicio sesión en Habla?
Para empezar a escribir en Habla, simplemente crea una cuenta Habla/Nostr e inicia sesión. Sigue estos unos sencillos pasos para registrarte, empezar a compartir valor y recibir valor de vuelta.
¿Cómo gano sats con Habla?
Habla te permite recibir valor directamente de tus lectores. No se requiere cuenta bancaria o identificación. Simplemente conecta tu dirección Lightning a tu cuenta Habla / Nostr y recibe fondos directamente en tu monedero - sin terceras partes, sin esperar retiros, sin agobios. Sigue estos sencillos pasos para hacerlo.
¿Por qué publicar en Habla es diferente?
El protocolo Nostr es superligero, lo que introduce algunas peculiaridades en cómo deben comportarse las aplicaciones basadas en Nostr. No entraremos en detalles técnicos, pero la diferencia más obvia que notarás como creador de contenido es que tendrás que usar un formato de texto diferente y, posiblemente, inusual mientras redactas tus posts. Pero no temas; Habla proporciona herramientas que hacen este proceso fácil e intuitivo. Aquí hay un video rápido de nostr:npub1wkljx5c6a8uccc5etws8ry0y3r4dgavh2dcav0tal4rtmcdl4z2sfu5u0t que explica lo básico de publicar con Habla (la guía fue hecha antes del rediseño, pero sigue siendo útil):
https://nostr.build/p/nb9474.mp4
Habla (y muchas otras aplicaciones Nostr) utiliza un formato bien establecido, que se llama Markdown. Existe desde hace casi una década y es compatible con la mayoría de las aplicaciones que utilizas a diario. La razón por la que puede que no hayas oído hablar de Markdown es porque las aplicaciones tradicionales suelen ocultarlo al usuario, y nosotros estamos trabajando para hacerlo también. Puedes encontrar más información sobre Markdown aquí.
¿Dónde se almacena mi contenido?
Las plataformas de blog tradicionales almacenan tus contenidos en sus propios servidores. Es un enfoque cómodo y (solía ser) sólido, pero conlleva riesgos críticos. Dejar los frutos de tu trabajo en manos de una sola parte significa que tienen el control total sobre tu contenido. Nostr lo soluciona. Cada vez que publicas algo, tu contenido se transmite a numerosos relés para su posterior almacenamiento y redistribución. Si algún operador de relé bloquea tu publicación o se niega a redistribuirla, tus lectores pueden recurrir a otros relés y acceder a tu contenido (no te preocupes si esto suena complicado; todo sucede bajo cuerda). Esto garantiza que nunca te silencien. Dicho esto, Habla no gestiona su propio relé; hemos decidido concentrarnos en lo que mejor sabemos hacer -construir una plataforma de blogs intuitiva, eficiente y fácil de usar que recompensa- y dejar el almacenamiento y distribución de contenidos a los profesionales en ese campo.
¿Cómo publico?
Habla te proporciona todas las herramientas necesarias para producir posts ricos y que destaquen. Prepara tu artículo, formatea tu texto con la ayuda de las herramientas designadas, añade medios y previsualiza los resultados antes de publicar. Todo lo que necesitas está al alcance de tu mano, y la plataforma es cada día mejor y más amigable.
¿Quién puede leer mis mensajes en Habla?
Cualquier persona en Internet puede leer tus posts. Sin embargo, si a tus lectores les gustaría interactuar con tu trabajo - ya sea siguiéndote / comentando / devolviéndote valor - deben crear una cuenta en Nostr. Te animamos a que ayudes a tus seguidores a introducirse en Nostr para hacer crecer una comunidad próspera y alcanzar nuevas cotas. Esta guía rápida te ayudará a ti y a tus compañeros a empezar.
Este FAQ es un trabajo en curso, y evolucionará a medida que Habla y Nostr se conviertan en herramientas aún más potentes. Por favor, dame tu opinión para que pueda mejorarla.
-
@ bcea2b98:7ccef3c9
2023-07-28 13:37:09Nym's review of Software:
The book "Softwar: A Novel Theory on Power Projection and the National Strategic Significance of Bitcoin" by Jason P. Lowery offers an extensive exploration of Bitcoin through the lens of strategic and cybersecurity, as opposed to a purely fiscal one. It presents a novel theoretical paradigm for assessing the potential strategic national implications of Bitcoin, viewed as an electro-cyber defense technology as opposed to a decentralized electronic cash system.
The following are some pivotal arguments and possible inaccuracies from the standpoint of a Bitcoin developer:
- The proposition that Bitcoin, via its proof-of-work protocol, can be perceived as an electro-cyber security framework allowing for the exertion of tangible power in the digital domain. Lowery posits that Bitcoin equips individuals with the capacity to enforce severe physical consequences (represented in wattage) on adversarial entities attempting to exploit them via software. This viewpoint conceptualizes Bitcoin as a mechanism for power projection, enabling individuals to establish and maintain an untrusting, permissionless, egalitarian, and decentralized dominion over bits of information, provided they have the will and capability to wield physical power to safeguard it (Page 245).
The critique here, though, points out that this is an intriguing perspective; the primary purpose of Bitcoin is to operate as a decentralized digital currency. The power projection elucidated by the author is an ancillary outcome of Bitcoin's decentralization and inherent security, rather than its primary intent. The function of Bitcoin's proof-of-work algorithm is to fortify the network against double-spending and other forms of attack, not to project power in a geopolitical context.
The book also proposes that Bitcoin could upheave human power-based dominance hierarchies from their foundational roots (Page 374). While it's undeniable that Bitcoin has the potential to disrupt conventional financial systems and power structures, it was not designed to be an instrument for power projection in the same way that military or economic resources are. Bitcoin is a tool for financial sovereignty and privacy, not a weapon for geopolitical power struggles.
The book seems to equate the physical power utilized in Bitcoin's proof-of-work algorithm (i.e., the energy expended to mine Bitcoin) with the notion of power projection in a geopolitical environment. While it's true that Bitcoin mining demands substantial energy resources, it is distinctly different from the concept of power projection, which usually involves employing military or economic force to influence the actions and behavior of other nations.
- The book asserts that the bits within Bitcoin can symbolize any kind of valuable data that individuals desire it to represent, including but not confined to financial information (Page 375). It further implies that once we have deduced how to keep financial bits of data physically secure against attack, we have in essence figured out how to protect all types of information from physical attack (Page 34).
While it is indeed factual that Bitcoin's blockchain can be employed to store and transmit non-financial data, it's crucial to understand that this is not its primary function. Bitcoin was developed as a peer-to-peer electronic cash system, with the primary objective of facilitating financial transactions without necessitating a trusted third party. The data that Bitcoin primarily processes is transaction data, i.e., detailing who transferred how much Bitcoin to whom.
The capability to store non-financial data on the Bitcoin blockchain is more of an unintended consequence of its design rather than a fundamental feature. This is accomplished by utilizing specific fields in the transaction data to store arbitrary data, but this practice is generally discouraged because it can result in blockchain bloat. The Bitcoin blockchain is not intended to function as a general-purpose data storage system, and employing it as such can induce inefficiencies.
Storing non-financial data on the Bitcoin blockchain does not offer any additional security advantages over storing financial data. The security of the Bitcoin blockchain is derived from its decentralized, proof-of-work consensus mechanism, which ensures that no single entity can control or manipulate the transaction history. This security extends equally to all data housed on the blockchain, whether it's financial or non-financial.
- The book suggests that Bitcoin could serve as a "strangler pattern" replacement of our legacy internet infrastructure with a modern architecture that isn’t as clearly susceptible to systemic exploitation and abuse (Page 376). The book further intimates that Bitcoin could operate as the preeminent mechanism employed by digital-age societies to map or anchor elements of the old internet version to the revamped version of the internet (Page 322).
While Bitcoin indeed introduces a new, decentralized paradigm for financial transactions and data storage, it isn't designed to supplant the entire internet infrastructure. The internet is an extensive and multifaceted system supporting a wide variety of applications and services, from email and web browsing to video streaming and cloud computing. In contrast, Bitcoin is a specific application that operates on the internet, designed to enable peer-to-peer financial transactions.
The claim made by the book appears to conflate the concept of a decentralized financial system (which Bitcoin offers) with the idea of a decentralized internet (which is a much broader and more intricate concept). While there are projects and technologies aiming to foster a more decentralized internet (such as InterPlanetary File System (IPFS) and various blockchain-based "Web 3.0" initiatives), Bitcoin is not one of them.
Additionally, the book's suggestion that Bitcoin could serve as the dominant mechanism for tying the legacy internet to a new version of the internet is speculative and isn't substantiated by current technological realities. While it's true that blockchain technology (the underlying technology of Bitcoin) has potential applications in areas like decentralized identity systems and domain name systems, these are still largely experimental and have not been widely adopted yet.
- The book propososes that Bitcoin could significantly transform the way humans vie for control over valued resources, effectively resetting the global balance of power in a manner akin to the profound changes brought about by full-scale kinetic world wars (Page 376). The author further proposes that Bitcoin could revolutionize the perception of physical confrontation in the digital-age society (Page 370). Moreover, it's implied that global adoption of an electro-cyber form of physical power competition, facilitated by proof-of-work technologies like Bitcoin, could lead to the genesis of a completely novel form of polity (Page 385).
It is undeniable that Bitcoin holds the potential to disrupt conventional financial systems and power structures. However, juxtaposing its impact to the scale and consequences of world wars is hyperbolic and speculative. World wars resulted in massive loss of human lives, extensive destruction, and substantial shifts in geopolitical boundaries and power structures. In contrast, Bitcoin is a digital currency that operates on a decentralized network. While it can indeed influence financial systems and potentially disrupt some power structures, particularly those related to finance and banking, it is incapable of causing physical destruction or loss of life.
The book suggests that Bitcoin could spawn a completely new form of polity is speculative and isn't supported by current realities. Although Bitcoin and other cryptocurrencies can indeed influence how people transact and store value, they don't intrinsically alter the fundamental nature of societal organization or governance. They may contribute to shifts in power dynamics, particularly in the financial sector, but they do not supplant the need for traditional forms of governance and societal organization.
The book also seems to conflate the concept of power competition in a geopolitical context with the concept of power competition in the context of Bitcoin mining. Bitcoin mining does involve a form of competition, as miners compete to solve complex mathematical problems to add new blocks to the blockchain and receive Bitcoin rewards. However, this is far from the concept of power competition in a geopolitical context, which involves nations competing for resources, influence, and dominance on the global stage.
- The book asserts that Bitcoin, through its proof-of-work technology, could help society secure itself against systemic exploitation of computer networks (Page 378). The author argues that Bitcoin could empower individuals to physically secure their digital information, by projecting physical power in, from, and through cyberspace to impose severe physical costs on those who exploit our computing systems (Page 347). The author further speculates that national adoption of Bitcoin could be conceptualized as the employment of an electro-cyber militia to safeguard and defend a nation’s valuable digital information (Page 360).
While it's true that Bitcoin and other cryptocurrencies can provide a level of security and privacy not available in traditional financial systems, it's crucial to underscore that they also introduce new vulnerabilities and potential for misuse. Bitcoin transactions are irreversible, which can make them appealing for fraudulent activities. Bitcoin wallets can be lost or stolen if not adequately secured. The security of the Bitcoin network itself hinges on its decentralized nature and the computational power required to alter the blockchain, but individual users are still susceptible to scams and hacking.
The book's suggestion that Bitcoin could serve as a form of "electro-cyber militia" is speculative and not universally accepted within the Bitcoin community. Although Bitcoin does offer a method for individuals to secure their financial transactions against interference from third parties, it is not designed to shield against all forms of cyber exploitation or to serve as a form of national defense.
In conclusion, Softwar presents an unconventional viewpoint on Bitcoin's potential influence on national strategic security, proffering that Bitcoin could serve as an effective tool for power projection, system defense, and even societal reorganization. However, these propositions, while intriguing, often veer towards the speculative and seem to be somewhat misaligned with the predominant understanding of Bitcoin's primary purpose and functionality within the field of computer science.
While this book undoubtedly offers a unique and thought-provoking perspective on Bitcoin's wider implications, it is crucial to approach these theories with a discerning and critical eye. It is always beneficial to juxtapose such theories with the broader consensus within the Bitcoin development and computer science communities, to gain a more rounded understanding of this remarkable technology. Ultimately, Bitcoin continues to evolve and its full potential, while yet to be fully realized, remains a subject of intense debate and exploration within the computer science community.
-
@ 97c70a44:ad98e322
2023-06-29 15:33:30First, a product announcement.
Coracle now supports connection multiplexing, which can reduce bandwidth usage by over 90% depending on how many relays you use. It's opt-in for now, but you can set it up by going to Settings and entering
wss://multiplextr.coracle.social
as your "Multiplextr URL".You can check out the source code and self-host the library using this link. If you're a dev and want to add client support for multiplextr, the library I built to support this use case might be of use.
Now, on to your regularly scheduled blog post.
The above announcement isn't irrelevant to what I want to talk about in this post, which is (broadly) the question of "how can Nostr remain decentralized and still support advanced functionality?"
This is probably the most common question articulated among devs and enthusiasts - is search centralizing? What about recommendation engines? COUNT? Analytics? The answer is yes, and responses range from "it'll be fine" to "nostr is already captured".
For my part, I'm not sure if this problem can be solved. Already we have a browser wars dynamic emerging among clients, and business models based on proprietary services and advertising have been publicly considered. For the record, I don't think conventional business models are necessarily bad. The world works this way for a reason and Nostr isn't going to change that by default.
Nevertheless, I want to see a new internet emerge where my attention belongs to me, and I'm not beholden to massive companies who don't give a rip about me. As a result, much of the work I've put into Coracle hasn't gone into fun features, but into things I think will help realize the vision of Nostr. This gives me FOMO as I watch others' progress, but if I don't stay focused on my vision for Nostr, what am I even doing?
I should be clear that this is not a judgment on the motivations of others, building for fun and profit is just as legitimate as building to idealistically realize the best of all Nostrs. However, I would say that it is every developer's duty to keep in mind that what we're trying to accomplish here is not a web2 clone.
Two, and only two options
With all that said, let's get into the meat of the problem. There's a false dichotomy floating around out there that we have two options for adding server-side functionality to the nostr ecosystem. Option 1: pack all required functionality into relays, eliminating the "dumb relay" model, and making it extremely difficult to run a relay. Option 2: keep relays dumb and the protocol minimal, allowing indexers, search engines, and recommendation services (which I'll collectively call "extensions" here) to profit by solving advanced use cases.
Both alternatives are obviously deficient. Relays need to be something hobbyists can run; requiring relays to fold in a recommendation engine or search index makes that much harder, and for every feature required, proprietary solutions will be able to build a bigger moat.
On the other hand, proprietary extensions will not bother to interoperate. This will result in an app-store-like landscape of competing extensions, which will redirect developer and user attention away from relays to extensions. If nostr is to succeed, relays must remain an important first-class concept. Aggregators and indexers that gloss over the differences between relays destroy much of the value an individual relay has to offer.
In either case, some components of the network will become too sophisticated for a layman to deploy. The only alternative is for a few professionals to take up the slack and grow their service as a business. But I think there's a way to squeeze between the horns of the dilemma.
It's all about routing
It seems to me that most people prefer the "extension" model of scaling functionality of Nostr as a pragmatic, market-driven alternative to the impossibility of requiring all relays to support all possible features. And I agree, the folks developing and operating more sophisticated tools should be compensated for their hard work.
The real problem with this approach is that not that extensions are competitive and specialized, but that they obscure the importance of relays by becoming gatekeepers for data by providing additional functionality. If a client or user has to select a search engine and ask it to return results for a given relay, they have given that search engine control over their results, when their trust really should be placed in the relay itself.
(I will say as an aside, that there are scenarios when the gatekeeper approach does make sense, like when a user wants to "bring his own algorithm". But this should be something a user can opt-in to, not a default requirement for accessing the underlying protocol.)
Here's my proposal: instead of requiring users to trust some non-standard extension to make decisions for them, flip the script and make relays the gatekeepers instead. With this approach, the addition of a single feature can open the door for relays to support any extension at no additional cost.
One of the most exciting aspects of Nostr is the redundancy relays provide. With Nostr, you don't need to trust a single entity to store your data for you! Why should you trust a single gatekeeper to route you to that data? Relays don't need to provide search or recommendations or indexing functionality directly, they can simply send you to a third-party extension they deem trustworthy.
This approach allows extensions to piggy-back on the trust already endowed in relays by end users. By allowing relays that are already aligned with end users to broker connections with extensions, they form a circuit breaker for delegated trust. This is more convenient for end users, and makes it easier to switch extensions if needed, since relay operators are more likely to have their finger on the pulse than end users.
It also enables cleaner business relationships. Instead of asking clients to create custom integrations with particular extensions leading to vendor lock-in, an extension provider can implement a common interface and sell to relays instead by offering to index their particular data set.
With this model, relays have the flexibility to either provide their own advanced functionality or delegate it to someone else, reducing the functionality gap that would otherwise emerge with thick relays without removing the ability for extension service providers to run a business, all the while keeping users and clients focused on interacting with relay operators rather than non-standard extensions.
Making it happen
The difficulty with this of course is that add-on services need to be identifiable based on functionality, and they must be interoperable. This means that their functionality must be described by some protocol (whether the core Nostr protocol or an addition to it), rather than by proprietary extensions. There will be extensions that are too complex or special-purpose to fit into this model, or for whom interoperability doesn't matter. That's ok. But for the rest, the work of specifying extensions will pay off in the long run.
This routing layer might take a variety of forms - I've already proposed an addition to to NIP 11 for service recommendations. Clients would look up what add-ons their relays recommend, then follow those recommendations to find a service that supports their requirements.
It also occurs to me having written my multiplexer relay this week (and here we come full circle) that it would be trivially easy for relays to proxy certain types of requests. So for example, a relay might fulfill REQs itself, but pass SEARCH requests on to a third-party extension and relay the result to the end user.
In either case though, a well-behaved client could get all the functionality desired, for all of the data required, without compomising the brilliant trust model fiatjaf came up with.
Conclusion
I think this is a very important problem to solve, and I think relay-sponsored extension recommendations/routing is a very good way to do it. So, please comment with criticisms! And if you agree with me, and want to see something like this become the standard, comment on my pull request.
-
@ 9e915942:f8133dec
2023-07-28 10:19:02I find myself spending more and more time on nostr, a decentralized social networking protocol. Here’s why.
The problem (as if you didn't already know)
I’ve long been frustrated with social media platforms. They have the same incentives - increase time on site - primarily because of the ad model for revenue.
This model incentivizes them to collect as much data as possible about their users.
It incentivizes them to develop algorithms that drive “engagement,” which just means clicks and attention.
It incentivizes tribalism.
It incentivizes binary thinking (us/them, black/white, with us or against us, etc.).
To increase followers and reach, users are incentivized to play into the algorithm, creating a positive feedback loop - outrageous posts amplified by the algo incentivizes similar posts.
Social media companies can use the algorithm to promote perspectives they support and down rank perspectives they disagree with.
Governments and intelligence agencies are increasingly pressuring social media companies to do their bidding.
CEOs of these companies have an incredible amount of power to control speech, as we’re seeing with Elon.
I could go on. My point is that we need something different. Something that is built around different incentives. Something that makes it difficult to censor speech and users simply because they have an unpopular viewpoint. Something that a government or CEO can't simply turn off.
Enter nostr
Nostr appears to fix many of these things at the protocol level. (To understand this, consider email. Email is built on a protocol. Countless “clients” can leverage this protocol. I can use Gmail, you can use Yahoo mail, and we can still communicate with each other. The same is true for Nostr, except not only can we still communicate using different clients, we can use our username with any client. It would be like getting sick of Gmail and switching to Yahoo mail, but all of your emails come with you.)
Nostr also allows for a “value for value” incentive model, thanks to the bitcoin lightning network integration. Instead of users trying to optimize their posts to suit the algorithm, they can be rewarded directly for quality content.
Imagine a Twitter or Facebook experience in which you can send micropayments directly to a user for a quality post.
They generate value for you, so you directly compensate them accordingly. Value for value, cutting out the need for the advertising model.
Maybe you only send a few pennies, but maybe that's all the user would get from an ad being seen. But this process fundamentally changes the revenue model, cutting out the advertising in the middle.
Maybe nostr won’t work. Maybe it won’t be able to scale. Maybe value for value won't turn out to be a powerful enough incentive model. Maybe we won’t be able o break the network effects of the current platforms. I can think of numerous ways in which Nostr could potentially fail.
But I’m tired of being stuck in perverse incentive hell.
Confronted by the uncertainty of the future and the clearly negative direction so many things are trending, I am going to do what I can to participate in and build the world I want to inhabit. The world I want my kids to live in.
This is why I Bitcoin. This is why I Moral Courage. This is why poured my guts into designing an elective called Critical Thinking. And now, this is why I Nostr.
I want social media. The world needs social media. But I can’t in good conscience continue to participate on these platforms when there may (finally) be an alternative that fixes the incentives.
I’m not deleting my accounts (yet). But I’ll be spending less time on them.
I’ve been on Nostr since early January. If you want help trying it out, let me know. There’s great info about getting started on Nostr here.
The client I use on iOS is Damus.
On the web I use Primal.
Follow me: z_cress@nostrverified.com or npub1n6g4js374378t90rrh4jyeqaqf537ce0qygu79u4r5mgf7qn8hkqk3watk
This post originally appeared on blogstack.io, a nostr client similar to Medium.
-
@ 5ada3677:7c21c9db
2023-07-28 09:35:06小城,最好還是老城,便有趣而且有味,宜逛,亦宜居。
Bilbao畢爾巴鄂,西班牙北方的珠玉小城,剛巧,便是如此的佳美之地,富裕安詳,亦古亦新,一派與世無爭的鬆和糯,人稱西班牙的小瑞士。
小城的清晨,三步一間五步再一間,小小的咖啡舖和麵包房,7:30就熱氣騰騰紛紛開門,堪比上海延慶路口的大餅油條舖。煮咖啡給你、遞新鮮麵包給你的,大多是精神抖擻朝氣蓬勃的老阿姨老爺叔。這一點,比京都優秀得多,京都基本上十點半以前,只有星巴克麥當勞會理你。
晨起步去老城,食早餐。Bilbao是14世紀古城,600年歷史,不算很長,狠是狠在一切宛然都在,600年歷歷在目地在那裡,這就夠你歎為觀止,一邊散步一邊啊啊啊不絕如縷了。
古城的廣場,宏闊堅實,此地當年的不可一世,可以想見。廊道裡密密麻麻開著一圈小館子,坐下吃咖啡,再吃兩件清早剛剛做起來的點心Pintxo,彷彿香港人清早茶樓裡的一盅兩件,小館子裡亦備有三四種免費報紙,供你以古老的方式瞭解國內外大事小事。坐在晨光裡,與600年同在,滋味是很厚很不錯的。
左右隔桌的食客,皆是本地人,不太有遊客。兩位老婦人,一對老閨蜜,一個食甜奶油麵包,一個食火腿奶酪麵包,姐妹們食得涇渭分明,身材倒是沒有很大的差距,正常的老婦人的微胖樣子。食甜奶油麵包的老婦人,剖開麵包,拿餐刀刮走一半甜奶油,只食剩下的一半甜奶油。坐輪椅的老人亦常見,自己一個人默默駕駛著萬能的輪椅,來吃咖啡喂鴿子會老朋友。
食飽早餐,晃晃老城。麻煩的是,城中百年老店比比皆是,要是每一間百年老店都推門進去看一眼,那簡直是要寸步難行的了。
包子帶我去看一間手工做傘的百年老店,立在街角,很小一個舖子。進門,是鋪天蓋地的傘,每一柄傘,皆婷婷玉立,漂亮得如同一襲華美的旗袍。我像個鄉下人,立在店堂裡長吁短嘆。
女主人請我們母子去後面的作坊白相,年深日久的工作台上,累累的歲月痕跡,包漿燦然,無語沉默。滿牆的工具,以及桌面上一厚摞古典音樂唱片。女主人打開一柄又一柄傘,講給我們聽,傘骨是碳纖維的,所以很輕。碳纖維的自行車我見過,碳纖維的傘,我是第一次見識到。百年老店的時髦,超出了我的想像。問女主人,這麼美的傘面,是哪裡來的呢?女主人講,義大利來的,專門的設計師設計的。怪不得品味高華得讓人尖叫。女主人講了很多傘的小知識給我們聽,比如,各種場合用各種不同的傘;比如,一柄好傘,講究是講究在哪些細節裡。然後憂心忡忡了一下,你說,今後的天氣,會不會雨越下越少、傘越來越不需要了?我趕緊安慰她,不會不會,我剛從梅雨淋漓的上海來,你可以去上海開分店。女主人另一個憂心,是她的兩個兒子,都沒有學做傘。你有一個兒子,我有兩個,可惜兩個都沒有學家族手藝,一個兒子在交響樂團拉琴,另一個在做社會工作。怪不得工作台上一大摞的古典音樂唱片。這個舖子,傳了三代人了,現在,政府也在幫忙找繼承人。
如此一柄傘,售價大約在600元人民幣左右。
一個清晨,吃了一盅兩件、看了百年老店、學了一堆傘知識。赴一座小城,需要很多的光陰,以及很好的腳力。
小城Bilbao的七月,正午攝氏二十四度的涼爽,日落遲至夜晚八九點的長日永晝。
這個就是巴斯克人的little darling,早餐和午後點心的人見人愛,小甜奶油麵包,像上海人的甜大餅
以上圖片來自下面這本書
下面是Bilbao老城百年傘舖的照片
夏日拾珠系列在這裡
nostr:naddr1qqxnzd3exqenjvpc8q6nxvfhqyt8wumn8ghj7un9d3shjtnwdaehgu3wvfskueqzypdd5dnhrpllqf9re6ne06y7rnytd8mqnxjq56u0v3xnkqnuy8yakqcyqqq823c83ac7g
nostr:naddr1qqxnzd3exqenjvfjx5ur2wpeqyt8wumn8ghj7un9d3shjtnwdaehgu3wvfskueqzypdd5dnhrpllqf9re6ne06y7rnytd8mqnxjq56u0v3xnkqnuy8yakqcyqqq823c8mrqrm
nostr:naddr1qqxnzd3exqenjvf4x5ervd33qyt8wumn8ghj7un9d3shjtnwdaehgu3wvfskueqzypdd5dnhrpllqf9re6ne06y7rnytd8mqnxjq56u0v3xnkqnuy8yakqcyqqq823cdqaveh
nostr:naddr1qqxnzd3exqenjvfcxscnqd3nqyt8wumn8ghj7un9d3shjtnwdaehgu3wvfskueqzypdd5dnhrpllqf9re6ne06y7rnytd8mqnxjq56u0v3xnkqnuy8yakqcyqqq823czmjr4k
nostr:naddr1qqxnzd3exqenjv33xqunjwphqyt8wumn8ghj7un9d3shjtnwdaehgu3wvfskueqzypdd5dnhrpllqf9re6ne06y7rnytd8mqnxjq56u0v3xnkqnuy8yakqcyqqq823c0ggymy
nostr:naddr1qqxnzd3exq6nxdfkxv6rqdp5qyt8wumn8ghj7un9d3shjtnwdaehgu3wvfskueqzypdd5dnhrpllqf9re6ne06y7rnytd8mqnxjq56u0v3xnkqnuy8yakqcyqqq823c42u6cr
nostr:naddr1qqxnzd3exq6nxdfexqerzdejqyt8wumn8ghj7un9d3shjtnwdaehgu3wvfskueqzypdd5dnhrpllqf9re6ne06y7rnytd8mqnxjq56u0v3xnkqnuy8yakqcyqqq823cawzeyh -
@ 5ada3677:7c21c9db
2023-07-28 09:22:42西班牙北部的巴斯克自治區的首府,vitoria gasteiz,今天是傳統節日,萬人空巷,感人肺腑。
滿街是穿著傳統節日服飾的巴斯克男女,小朋友們都是從頭打扮到腳。
包子跟我說,《黃帝內經》上講的,美其食,任其服,樂其俗,此時此刻都齊了。
850年歷史的古都,1813年威靈頓公爵曾經在此擊潰了拿破崙,這個雕塑,就是在紀念這宗偉業。
古都的摩登,也歷歷可見。
這些攝人心魄的雄偉氣概,圖片難以言喻,身臨其境,滋味完全不同。
如今,此地是一個人口不過20多萬的小城。
從Bilbao坐車過去,50分鐘車程,一路風景如畫,青山蒼翠欲滴,牧場綿延如歌。沒有堵車,沒有氣喘吁吁的貨櫃大車成陣。晚上八點離開Vitoria,回到家剛好九點,天邊還有一抹彤雲未退盡,感慨萬千的古都一日。
夏日拾珠系列在這裡
nostr:naddr1qqxnzd3exqenjvpc8q6nxvfhqyt8wumn8ghj7un9d3shjtnwdaehgu3wvfskueqzypdd5dnhrpllqf9re6ne06y7rnytd8mqnxjq56u0v3xnkqnuy8yakqcyqqq823c83ac7g
nostr:naddr1qqxnzd3exqenjvfjx5ur2wpeqyt8wumn8ghj7un9d3shjtnwdaehgu3wvfskueqzypdd5dnhrpllqf9re6ne06y7rnytd8mqnxjq56u0v3xnkqnuy8yakqcyqqq823c8mrqrm
nostr:naddr1qqxnzd3exqenjvf4x5ervd33qyt8wumn8ghj7un9d3shjtnwdaehgu3wvfskueqzypdd5dnhrpllqf9re6ne06y7rnytd8mqnxjq56u0v3xnkqnuy8yakqcyqqq823cdqaveh
nostr:naddr1qqxnzd3exqenjvfcxscnqd3nqyt8wumn8ghj7un9d3shjtnwdaehgu3wvfskueqzypdd5dnhrpllqf9re6ne06y7rnytd8mqnxjq56u0v3xnkqnuy8yakqcyqqq823czmjr4k
nostr:naddr1qqxnzd3exqenjv33xqunjwphqyt8wumn8ghj7un9d3shjtnwdaehgu3wvfskueqzypdd5dnhrpllqf9re6ne06y7rnytd8mqnxjq56u0v3xnkqnuy8yakqcyqqq823c0ggymy
nostr:naddr1qqxnzd3exq6nxdfkxv6rqdp5qyt8wumn8ghj7un9d3shjtnwdaehgu3wvfskueqzypdd5dnhrpllqf9re6ne06y7rnytd8mqnxjq56u0v3xnkqnuy8yakqcyqqq823c42u6cr -
@ 1c52ebc8:5698c92a
2023-07-28 06:22:57This is me testing what habla.news's editor will support in terms of native nostr ideas
Event for random note of mine nostr:nevent1qqsrdthgka83ffupw98jf98xupq0eumsh603793aq8nujyjwh9065acpr4mhxue69uhkummnw3ezucnfw33k76twv4ezuum0vd5kzmp0qyghwumn8ghj7mn0wd68ytnhd9hx2tcl8ar76
At a user's npub nostr:npub1r3fwhjpx2njy87f9qxmapjn9neutwh7aeww95e03drkfg45cey4qgl7ex2
Apologies for any spam. Checking what this looks like in various clients.
-
@ 5ada3677:7c21c9db
2023-07-28 09:24:37徽菜品粹,於巨鹿路899號,那個洋樓林立的著名大院子裡,靜靜開一間新館子,治盧州菜。
盧州菜是徽菜五個支脈裡的一支,以合肥菜為底子,格局是徽菜裡的官府菜,文人氣息濃厚,滋味柔淡一點徽菜的沖,亦不淪陷到南人的軟甜無度裡,獨標一幟,非常別致。
上海吃客有福,於舊租界的維多利亞小樓裡,得以領略醬香富饒、回味深厚的盧州菜。如果被當代文豪、名優們頻頻寫入日記筆記裡,再過幾十年翻翻故紙,恐怕大有我們如今翻閱魯迅日記、梁實秋小品、張愛玲散文以及馬連良回憶錄的情狀,口水洶湧氾濫。
禪衣素方,以腐衣交疊壓制,成方磚塊,點鮮椒醬與XO醬,於馥郁豆香裡,層疊醬香,一方入口,十分滿足。
徽菜代表作,除了刀板香,還有錢串,以五花肉融醬料醃製、風乾、熏烤,一路古法手段,瘦者不老,肥者不膩,是徽人過年必備,曬製時候形狀彷彿銅錢,所以討個口彩,錢串。
品粹的招牌之一,肥西老母雞湯,每次上桌都顛倒眾生不已,無非雞好、山泉水好,足火三個小時的耐心。說說是容易的,每次都好到食客驚艷,背後自然是無窮的精控。做一天好人好事不難,難的是做一輩子好人好事。每次飲到品粹的絕色雞湯,都在心裡致敬不已。
紅燒菜,中國人都是愛不釋手的,海外華人思鄉最慘烈,也是這一口紅燒。以前讀小澤征爾的自傳,寫他早年離開日本,遠赴歐美學藝術,窮哈哈的留學生,最渴望的,是家裡郵寄一點梅子乾和味噌來。中國人思念醬油湯淘飯,日本人思念味噌湯,都是胃裡的酸鹼度在作怪。
回來說紅燒,紅燒菜裡的天花板,是紅燒甲魚大概沒有人會反對。品粹的紅燒甲魚,真是輝煌之作,甲魚選得上乘,紅燒燒得正確。食剩的甲魚湯汁,回鍋炒個飯,涓滴不浪費,多好。
李鴻章大雜燴,是打遍天下很能打的名菜,華洋通吃,人見人愛,全世界唐人街廣受歡迎的名餚。品粹治得精,參、鮑、菌熔於一燴,十分過癮,堪稱徽版佛跳牆。
將軍菜乾燉紅燒肉,根底是盧州菜裡的官府扣肉,將軍菜是安徽一味山野菜,炸過之後,與五花豬肉一起,瓦罐慢燉三個鐘,上桌顫顫抖抖,腴美無匹,饞煞老饕。
這些年,一些上海食客並不熟悉的菜系,頻頻在我城響亮起來,台州菜是一種,徽菜也是其一。這些菜系的蓬勃,跟默默深耕的領軍人物有莫大的關係。品粹徽菜的主理人陳政師傅,多年尋訪徽州各地,熟透支支脈脈,每季都有精彩菜單,十分了得。
品粹這家新店,品粹近安,有滋有味於巨鹿路。
-
@ 5ada3677:7c21c9db
2023-07-28 09:17:02傍晚散步去Bilbao的美術館,一棟嚴整清俊的老房子,離家七、八分鐘的步程,每天開到晚上八點,這個時間表,非常西班牙。 入門氣概非凡,空間奢侈,通體白色大理石的台階,華美無比。廳堂內種種雕塑,星辰散落,水平實在是高,無論是雕塑本身,還是陳列手段,都高度舒服。
Bilbao街頭,雕塑比比皆是,隨便捏捏,都是活龍活現深入靈魂的佳品,這個東西,實在是玩不過人家。
一間展廳裡,有西班牙名畫家Joaquin Sorolla 的幾幅作品,非常眩目,光影出神入化,深得印象派真傳,旁邊幾幅素描小稿,了了幾筆,隨便搨搨,神得不得了,一舉看呆過去。
孤陋寡聞,第一次看見這位畫家的作品,回家一邊吃晚飯,一邊猛烈學習。
1863年至1923年的西班牙畫家,活了六十歲,非常多產,存世有2000件作品。兩歲時候父母染霍亂雙亡,被姨夫收留扶養長大,姨夫是鎖匠,跟美術毫無淵源。這位Sorolla是在巴黎學藝成功,學得印象派精髓,一路順風順水,他的作品曾經在美國十分熱賣,至今收藏他作品最多的,除了馬德里的Sorolla美術館,就是美國的兩間博物館,聖路易斯和芝加哥。
這幅《母親》,太贊了。畫家藝高膽大,下筆雋永,太厲害。
下面這幅是他非常拿手的題材,海灘嬉戲,不用說,好得不得了。
再下面一幅,亦好,是他的孩子們。
這兩幅是太太的畫像和自畫像,
再來兩幅。
下次去馬德里,要去看看他的故居做成的美術館。
今晚美術館裡的一件裝置,空靈優雅,靜悄悄,飄在屋裡。
包子回家路上問我,覺得美術館如何,我說很享受。美術館本身的建築非常妥貼,像個美術館的樣子。展品不多,但是很精,特別是佈展空靈,沒有物擠物的緊迫,也沒有人擠人的困苦,如此才是一個像樣美術館的格局。
美術館最珍貴的,不是展品,是氣息。
我們還在堆積展品的階段,拎幾個如雷貫耳的大畫家,就得意非凡大排長隊了,離開談論氣息,還很遠。
再來一幅。
家門口的美術館,晚飯前過去走走看看,惜福。
夏日拾珠系列在這裡
nostr:naddr1qqxnzd3exqenjvpc8q6nxvfhqyt8wumn8ghj7un9d3shjtnwdaehgu3wvfskueqzypdd5dnhrpllqf9re6ne06y7rnytd8mqnxjq56u0v3xnkqnuy8yakqcyqqq823c83ac7g
nostr:naddr1qqxnzd3exqenjvfjx5ur2wpeqyt8wumn8ghj7un9d3shjtnwdaehgu3wvfskueqzypdd5dnhrpllqf9re6ne06y7rnytd8mqnxjq56u0v3xnkqnuy8yakqcyqqq823c8mrqrm
nostr:naddr1qqxnzd3exqenjvf4x5ervd33qyt8wumn8ghj7un9d3shjtnwdaehgu3wvfskueqzypdd5dnhrpllqf9re6ne06y7rnytd8mqnxjq56u0v3xnkqnuy8yakqcyqqq823cdqaveh
nostr:naddr1qqxnzd3exqenjvfcxscnqd3nqyt8wumn8ghj7un9d3shjtnwdaehgu3wvfskueqzypdd5dnhrpllqf9re6ne06y7rnytd8mqnxjq56u0v3xnkqnuy8yakqcyqqq823czmjr4k
nostr:naddr1qqxnzd3exqenjv33xqunjwphqyt8wumn8ghj7un9d3shjtnwdaehgu3wvfskueqzypdd5dnhrpllqf9re6ne06y7rnytd8mqnxjq56u0v3xnkqnuy8yakqcyqqq823c0ggymy -
@ f821179b:ed4fd022
2023-07-28 04:01:31Damus is specifically an iOS application, not a web client. As it stands, it's the most favored method for accessing Nostr and beginning your exploration. Damus never ceases to improve, enhancing its application with each successive update. The zaps once coursed freely via Damus, but Apple Inc.'s intervention disrupted this flow, causing a noticable dip in the number of zaps.
Just in case you're not in the know, Apple issued a stern warning to the makers of the popular iOS app 'Damus.' The tech giant threatened to expel the app from their App Store unless the 'zaps' functionality, associated with posted notes, was removed. The rationale provided was vaguely along the lines of 'a requirement for Apple Pay integration.' Consequently, Damus took the requisite steps, adjusting the app to ensure its continued availability to the wider audience on the App Store.
t didn't take long for the ingenious minds populating the Nostr community to devise a workaround that didn't "violate" any of Apple's "policies." Hence, ZapplePay was born. This astute website enables users to link their GetAlby wallet to their Nostr accounts, which in turn provides a seamless ability to zap anyone from any Nostr client using their favorite emoji as the trigger. If you're interested in learning more about ZapplePay and how to set it up, take a look at this YEGHRO blog post for a comprehensive, yet easy-to-follow guide.
With that, the flow of zaps is back, reaching new heights. If you're a fan of data and statistics, Nostr.Band is a great resource for a visual take on what's going on in the Nostr network. Just hit their 'Stats' tab.
The brilliant minds behind Nostr have thus far tackled every obstacle thrown their way. I, for one, am curious and eager to see what challenge they will conquer next.
Stay calm and Zap on.
-
@ a012dc82:6458a70d
2023-07-28 02:47:10Discover the truth about Bitcoin's future: Will it soar to new heights or face a devastating downfall? Uncover the numbers that reveal the potential of the Bull Run or the possibility of a bust.
Table Of Content
- Bitcoin's Past Successes and Failures: An Overview
- Factors Influencing Bitcoin's Future
- Conclusion
- FAQ
Bitcoin, the first decentralized cryptocurrency, has taken the financial world by storm. Its volatility and potential for massive gains have captivated investors and enthusiasts alike. However, as with any investment, there are always questions surrounding its future. Is Bitcoin heading for another bull run, or is it on the verge of a catastrophic bust? In this article, we will delve into the numbers and trends to shed light on the potential future of Bitcoin.
Bitcoin Future Bitcoin's Past Successes and Failures: An Overview
To understand Bitcoin's future, it's essential to examine its past. Bitcoin's journey has been marked by tremendous highs and devastating lows, making it a rollercoaster ride for investors. Let's take a closer look at its historical performance.
The Early Years: Bitcoin's Humble Beginnings
In 2009, Bitcoin emerged as a concept, and its initial value was next to nothing. However, over time, its popularity grew, and by 2010, it gained some value. In May 2010, a historic moment occurred when Laszlo Hanyecz famously purchased two pizzas for 10,000 Bitcoins. Little did anyone know that those Bitcoins would be worth millions in the future.
The 2017 Bull Run: Bitcoin's Rise to Prominence
The year 2017 witnessed an unprecedented surge in Bitcoin's value, attracting global attention. Bitcoin's price skyrocketed from around $1,000 in January to nearly $20,000 in December. This massive growth sparked a frenzy among investors, leading to widespread adoption and media coverage.
The 2018 Bubble Burst: Bitcoin's Steep Decline
However, the euphoria didn't last long. In 2018, the cryptocurrency market experienced a significant crash, with Bitcoin's value plummeting to around $3,000 by the end of the year. This sharp decline shook investors' confidence and raised doubts about the long-term viability of Bitcoin.
Bitcoin Future Factors Influencing Bitcoin's Future
Bitcoin's future is shaped by various factors that impact its price, adoption, and overall market sentiment. Understanding these factors is crucial for predicting its future trajectory.
Market Adoption and Regulatory Developments
The widespread adoption of Bitcoin by businesses and individuals significantly impacts its value. As more companies accept Bitcoin as a form of payment and governments establish favorable regulatory frameworks, Bitcoin's future looks promising. However, regulatory challenges and negative news can hinder its growth.
Technological Advancements and Innovation
Bitcoin's future is intrinsically linked to technological advancements and innovation within the cryptocurrency space. The development of scaling solutions, improved security measures, and enhanced user experience can propel Bitcoin to new heights.
Global Economic Conditions
Bitcoin's value is closely tied to global economic conditions. During times of economic uncertainty, such as political instability or inflationary pressures, Bitcoin often emerges as a safe haven asset. Conversely, stable economic conditions may dampen its growth potential.
Investor Sentiment and Speculation
The speculative nature of Bitcoin makes investor sentiment a significant driver of its price fluctuations. Positive news, endorsements from influential figures, or large-scale institutional investments can fuel optimism and trigger a bull run. On the other hand, negative sentiment can lead to a bearish market.
Bitcoin Future
Conclusion
While predicting Bitcoin's future with absolute certainty is impossible, analyzing historical trends and considering various factors can provide valuable insights. Bitcoin's path has been filled with remarkable highs and gut-wrenching lows, making it an intriguing investment option. As always, investors should exercise caution, diversify their portfolios, and stay updated with the latest developments in the cryptocurrency space.
FAQ
Is investing in Bitcoin still profitable?
While Bitcoin has experienced significant price volatility, many investors have made substantial profits.
What caused the 2018 Bitcoin crash?
The 2018 Bitcoin crash was influenced by a combination of factors, including regulatory uncertainties, a decline in market sentiment, and the bursting of the speculative bubble that had formed in the previous year.
Can Bitcoin replace traditional currencies?
Bitcoin's potential to replace traditional currencies remains a subject of debate. While it offers benefits such as decentralization and borderless transactions, challenges related to scalability, regulatory hurdles, and public acceptance need to be overcome.
What role do institutional investors play in Bitcoin's future?
Institutional investors, such as hedge funds and asset management firms, have started to show interest in Bitcoin. Their participation can bring stability, liquidity, and increased mainstream adoption, positively impacting Bitcoin's future.
That's all for today, see ya tomorrow
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Twitter: @croxroadnews
Instagram: @croxroadnews.co
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
@ cc8d072e:a6a026cb
2023-06-04 13:15:43欢迎来到Nostr
以下是使您的 Nostr 之旅更顺畅的几个步骤
本指南适用于: * 英语 原作者 nostr:npub10awzknjg5r5lajnr53438ndcyjylgqsrnrtq5grs495v42qc6awsj45ys7 * 法语 感谢 nostr:npub1nftkhktqglvcsj5n4wetkpzxpy4e5x78wwj9y9p70ar9u5u8wh6qsxmzqs * 俄语
你好,Nostrich同胞!
Nostr 是一种全新的模式,有几个步骤可以让您的加入流程更加顺畅,体验更加丰富。
👋欢迎
由于您正在阅读本文,因此可以安全地假设您已经通过下载应用程序加入了 Nostr 您可能正在使用移动设备(例如 Damus、Amethyst,Plebstr) 或Nostr网络客户端(例如 snort.social、Nostrgram、Iris)。 对于新手来说,按照您选择的应用程序建议的步骤进行操作非常重要——欢迎程序提供了所有基础知识,您不必做更多的调整除非您真的很需要。 如果您偶然发现这篇文章,但还没有 Nostr“帐户”,您可以按照这个简单的分步指南 作者是nostr:npub1cly0v30agkcfq40mdsndzjrn0tt76ykaan0q6ny80wy034qedpjsqwamhz --
npub1cly0v30agk cfq40mdsndzjrn0tt76ykaan0q6ny80wy034qedpjsqwamhz
。
🤙玩得开心
Nostr 的建立是为了确保人们可以在此过程中建立联系、被听到发声并从中获得乐趣。 这就是重点(很明显,有很多严肃的用例,例如作为自由斗士和告密者的工具,但这值得单独写一篇文章),所以如果你觉得使用过程有任何负担,请联系更有经验的Nostriches,我们很乐意提供帮助。 与Nostr互动一点也不难,但与传统平台相比它有一些特点,所以你完全被允许(并鼓励)提出问题。 这是一份 非官方 的 Nostr 大使名单,他们很乐意帮助您加入: nostr:naddr1qqg5ummnw3ezqstdvfshxumpv3hhyuczypl4c26wfzswnlk2vwjxky7dhqjgnaqzqwvdvz3qwz5k3j4grrt46qcyqqq82vgwv96yu 名单上的所有nostriches都获得了 Nostr Ambassador 徽章,方便您查找、验证和关注它们
## ⚡️ 启用 Zaps Zaps 是加入 Nostr 后人们可能会注意到的第一个区别。 它们允许 Nostr 用户立即发送价值并支持创建有用和有趣的内容。 这要归功于比特币和闪电网络。 这些去中心化的支付协议让你可以立即发送一些 sats(比特币网络上的最小单位),就像在传统社交媒体平台上给某人的帖子点赞一样容易。 我们称此模型为 Value-4-Value,您可以在此处找到有关此最终货币化模型的更多信息:https://dergigi.com/value/ 查看由nostr:npub18ams6ewn5aj2n3wt2qawzglx9mr4nzksxhvrdc4gzrecw7n5tvjqctp424创建的这篇笔记,nostr:note154j3vn6eqaz43va0v99fclhkdp8xf0c7l07ye9aapgl29a6dusfslg8g7g 这是对 zaps 的一个很好的介绍: 即使您不认为自己是内容创建者,您也应该启用 Zaps——人们会发现您的一些笔记很有价值,并且可能想给您发送一些 sats。 开始在 Nostr onley 上获得价值的最简单方法需要几个步骤:
0 为您的移动设备下载 Wallet of Santoshi^1(可能是比特币和闪电网络新手的最佳选择)^2 1 点击“接收” 2 点击您在屏幕上看到的 Lightning 地址(看起来像电子邮件地址的字符串)将其复制到剪贴板。
3 将复制的地址粘贴到您的 Nostr 客户端的相应字段中(该字段可能会显示“比特币闪电地址”、“LN 地址”或任何类似内容,具体取决于您使用的应用程序)。
📫 获取 Nostr 地址
Nostr 地址,通常被 Nostr OG 称为“NIP-05 标识符”,看起来像一封电子邮件,并且: 🔍 帮助您使您的帐户易于发现和分享 ✔️ 证明您是人类 --- 这是 Nostr 地址的示例:Tony@nostr.21ideas.org
它很容易记住并随后粘贴到任何 Nostr 应用程序中以找到相应的用户。
要获得 Nostr 地址,您可以使用免费服务,例如 Nostr Check(由 nostr:npub138s5hey76qrnm2pmv7p8nnffhfddsm8sqzm285dyc0wy4f8a6qkqtzx624)或付费服务,例如 Nostr Plebs 了解有关此方法的更多信息。
🙇♀️ 学习基础知识
在后台,Nostr 与传统社交平台有很大不同,因此对它的内容有一个基本的了解对任何新手来说都是有益的。 请不要误会,我并不是建议您学习编程语言或协议的技术细节。 我的意思是看到更大的图景并理解 Nostr 和 Twitter / Medium / Reddit 之间的区别会有很大帮助。 例如,没有密码和登录名,取而代之的是私钥和公钥。 我不会深入探讨,因为有一些详尽的资源可以帮助您理解 Nostr。 由 nostr:npub12gu8c6uee3p243gez6cgk76362admlqe72aq3kp2fppjsjwmm7eqj9fle6 和 💜 准备的在这个组织整齐的登陆页面 收集了所有值得您关注的内容
上述资源提供的信息也将帮助您保护您的 Nostr 密钥(即您的帐户),因此请务必查看。
🤝 建立连接
与才华横溢的[^3]人建立联系的能力使 Nostr 与众不同。 在这里,每个人都可以发表意见,没有人会被排除在外。 有几种简单的方法可以在 Nostr 上找到有趣的人: * 查找您在 Twitter 上关注的人:https://www.nostr.directory/ 是一个很好的工具。 * 关注您信任的人:访问与您有共同兴趣的人的个人资料,查看他们关注的人的列表并与他们联系。
* 访问全球订阅源:每个 Nostr 客户端(一个 Nostr 应用程序,如果你愿意这样说的话)都有一个选项卡,可以让你切换到全球订阅源,它汇总了所有 Nostr 用户的所有笔记。 只需关注您感兴趣的人(不过请耐心等待——您可能会遇到大量垃圾邮件)。
🗺️探索
上面提到的 5 个步骤是一个很好的开始,它将极大地改善您的体验,但还有更多的东西有待发现和享受! Nostr 不是 Twitter 的替代品,它的可能性仅受想象力的限制。
查看有趣且有用的 Nostr 项目列表: * https://nostrapps.com/ Nostr 应用列表 * https://nostrplebs.com/ – 获取您的 NIP-05 和其他 Nostr 功能(付费) * https://nostrcheck.me/ – Nostr 地址、媒体上传、中继 * https://nostr.build/ – 上传和管理媒体(以及更多) * https://nostr.band/ – Nostr 网络和用户信息 * https://zaplife.lol/ – zapping统计 * https://nostrit.com/ – 定时发送帖子 * https://nostrnests.com/ – Twitter 空间 2.0 * https://nostryfied.online/ - 备份您的 Nostr 信息 * https://www.wavman.app/ Nostr 音乐播放器 ---
📻 中继
熟悉 Nostr 后,请务必查看我关于 Nostr 中继的快速指南:https://lnshort.it/nostr-relays。 这不是您旅程开始时要担心的话题,但在以后深入研究绝对重要。
📱 手机上的 Nostr
在移动设备上流畅的 Nostr 体验是可行的。 本指南将帮助您在智能手机上的 Nostr Web 应用程序中无缝登录、发帖、zap 等:https://lnshort.it/nostr-mobile
感谢阅读,我们在兔子洞的另一边见 nostr:npub10awzknjg5r5lajnr53438ndcyjylgqsrnrtq5grs495v42qc6awsj45ys7
发现这篇文章有价值吗 Zap⚡ 21ideas@getalby.com 关注:
npub10awzknjg5r5lajnr53438ndcyjylgqsrnrtq5grs495v42qc6awsj45ys7
查看我的项目 https://bitcal.21ideas.org/about/
[^3]:nostr:npub1fl7pr0azlpgk469u034lsgn46dvwguz9g339p03dpetp9cs5pq5qxzeknp 是其中一个Nostrich,他设计了本指南的封面上使用的徽标
译者: Sherry, 数据科学|软件工程|nossence|nostr.hk|组织过一些nostr meetup|写一些文章来将nostr带到每个人身边
Zap⚡ spang@getalby.com 关注:
npub1ejxswthae3nkljavznmv66p9ahp4wmj4adux525htmsrff4qym9sz2t3tv
-
@ 97c70a44:ad98e322
2023-06-01 13:46:54I think I cracked the code on private groups.
Instead of relying on relays to implement access control as in this PR, we could combine the Gift Wrap proposal with @PABLOF7z's nsec bunker to create private groups with easy administration and moderation!
Gift wrap fixes DM metadata leakage by using a temporary private key to send a DM to a recipient. The recipient decrypts the wrapper to find a regular nostr event inside. This could be another kind 4 as in the proposal, or anything else. Which means you can send kind 1's or anything else in a wrapped event.
Now suppose you had a pubkey that you wanted to represent a group instead of a person. Put its nsec in a (modified) nsec bunker, and now you can allow other people than yourself to request signatures. A shared private key! Anyone who has access to this nsec bunker could also de-crypt any gift wrapped note sent to it. Relay-free read access control!
There are lots of ways you could manage this access list, but I think a compelling one would be to create a NIP 51 list (public or private!) of group members and set up the nsec bunker to authenticate using that list. Boom, dynamic member lists!
You could also create a NIP 51 list for admins, and pre-configure which event kinds each list is allowed to post using the group's nsec. So maybe members could only publish wrapped kind-1's, but admins could publish wrapped kind-0's (you can now zap a group!), kind 9's for moderation, updated member and moderator lists, normal kind 1's for public information about the group, etc.
Gift wrap would support:
- Leak-free DMs
- Fully private groups
- Public-read groups (nsec bunker would allow for admin, but everyone would publish regular instead of wrapped events).
- Organizations and other shared accounts, with role-based authorization (list/kind mappings)!
Of course, no clients currently support this kind of thing, but support would not be hard to add, and it creates an entirely new set of affordances with two very simple applications of the core protocol.
There are a few drawbacks I can think of, of course. Gift wrap makes it harder to search notes by tag. You could:
- Leave all tags off (other than for DM recipient as in the proposal)
- Selectively keep tags that aren't revealing of identity
- Encrypt tag values. When a client wants to query a tag, it must encrypt the value using the same pubkey and include that in the filter. This, I think, is ok for the group use case above.
There are also a number of proposals in the works to fix NIP 04 DMs which are apparently broken from a cryptographic standpoint, so implementing this should probably wait until that stuff is sorted out. But it should be possible however that ends up materializing.
So am I nuts? Or is this a galaxy brain solution?
-
@ 76c71aae:3e29cafa
2023-05-30 21:59:50Joining a new digital community can be an exhilarating and empowering experience. This has been observed on numerous occasions when people join new platforms such as Nostr, BlueSky, Farcaster, Post.news, Tribel, and many others, as well as older social media platforms such as blogs, Usenet, LiveJournal, Xanga, AOL, Flickr, Facebook, Instagram, and TikTok.
Initially, these spaces create an idealistic environment where individuals are eager to connect, share, and participate in a virtual gathering that resembles a festival. However, it is worth examining what it is about these new social spaces that generates such a euphoric atmosphere, and whether it is feasible to sustain this utopian sentiment as communities expand and develop.
The Magic of Connection:
Joining a new digital community can be a transformative experience. In her book "Paradise Built in Hell," Rebecca Solnit argues that when people are taken out of their familiar routines and confronted with real human needs, the best aspects of human nature come to the forefront. This disproves the negative assumption that humans are inherently selfish and demonstrates our natural ability to empathize and connect with one another. The sense of community and collaboration that we feel in emerging social spaces, patticipatory festivals such as 'Burningman', are a great example of this phenomenon.
Utopias Form Where They Shouldn’t Exist:
The concept of "Paradise Built in Hell" becomes evident during natural and economic disasters. I personally witnessed this idea during Argentina's economic crisis in the early 2000s. Despite the difficulties, people came together and collaborated in new ways to support each other, as the collapsing economy demanded it. This same phenomenon is observed following earthquakes and other natural disasters, where people often speak of those days with a magical, almost reverential tone.
Rebecca Solnit argues that "Disaster is when the shackles of conventional belief and role fall away and the possibilities open up; people rise to the occasion or sink to the level of their fears and prejudices." In these challenging moments, we see the true nature of humanity: our ability to show compassion, resilience, and unity in the face of adversity.
Social Media and All Digital Spaces Have Physical Analogues:
The similarities between digital and physical communities are rooted in the fact that each has its own distinct set of unspoken rules and social norms. Just as we know to be quiet in a library, loud at a concert, social at a cocktail party, and anti-social on the subway, we also understand the unique dynamics of different digital platforms. Twitter resembles a bustling dive bar, Instagram an art gallery, TikTok an amusement park hall of mirrors, and Facebook a community hall rented for a retirement party. Every new digital space has its analogues in the physical world because human interaction remains consistent, even if the medium differs. As we navigate the ever-changing landscape of digital communities, we are reminded of our innate ability to adapt, connect, and thrive in the face of adversity. This adaptability empowers us to form new connections and rediscover the power of community, whether in the digital or physical realm.
The Small Community Paradox:
To maintain the utopian atmosphere of new digital communities, one effective approach is to keep them small or create numerous smaller sub-communities. In these sub-communities, people can engage in the social labor of connection and conflict resolution.
It is important to note, however, that this approach may conflict with the network effect principle. This principle states that each new member joining the community increases its overall value for all participants. As communities grow and the network effect takes hold, the utopian feeling may often fade, giving way to sub-tribes and conflict.
Nevertheless, with a confident approach, the community can adapt and navigate these challenges to foster a positive environment for all members.
The Fleeting Nature of Utopia:
The fleeting utopian sensation experienced within new digital communities is inevitable. Although it is not the design or coding of platforms such as BlueSky, Nostr, Mastodon, or Scuttlebutt that generates this feeling of euphoria, it is instead the human dynamics of joining something novel and building a community that cultivates this enchanting ambiance. Hakim Bey's concept of Temporary Autonomous Zones (TAZs) endorses this notion, demonstrating how short-lived spaces of freedom and interaction can emerge within established social structures. As communities expand and progress, the real challenge lies in sustaining the initial energy and sense of connection that made them so desirable in the first place.
Parallel to Protests and Uprisings:
This utopian sentiment is not limited to digital communities; it is also present during times of revolution, protests, and uprisings. There is a profoundly human element to the sense of love, connection, solidarity, and community that arises during these moments.
The most impactful moments of my life have been when I participated in protests that were met with repression. These protests ranged from tree-sits to protect old-growth redwoods in the forests where I grew up, to large convergences of the anti-globalization and anti-war movements, to Occupy's reclamation of public spaces, and to recent Black Lives Matter protests. All of these protests were scenes of anguish, repression, and, in some cases, violence, especially from the police. However, they were also places where I experienced the most love, connection, humanity, and common purpose. We were all individuals, together, living and breathing solidarity.
Cultivating and Sustaining Utopian Energy:
To preserve the utopian essence of new digital communities as they grow, one approach is to foster a culture of empathy, connection, and inclusiveness from the very beginning. Prioritizing these values and actively engaging in conflict resolution can help communities maintain that special feeling.
Another way to preserve the utopian essence of digital communities is to focus on building tools for the construction and maintenance of these digital public spaces. Unlike corporate social media platforms that only provide an illusion of public space while actually being privately owned, like a shopping mall, we need to create spaces that are community-controlled and collectively owned as a commons with confidence.
Understanding the Commons:
The concept of the commons offers a compelling alternative to traditional models of state or private ownership. Elinor Ostrom, the first woman to win the Nobel Prize in Economics, conducted extensive research on this topic, and her findings are truly remarkable. Through her work, she proved that commons can be effectively managed and maintained, debunking the misguided belief that these resources are doomed to fail and end in tragedy.
Designing for Digital Commons:
To design digital commons, we must prioritize transparency, decentralization, and participatory governance. By empowering users to make decisions about the direction and rules of their digital communities, we ensure that the spaces remain truly public and that the needs and desires of the community are at the forefront.
Open-source technology and decentralized protocols can play a vital role in the development of these digital commons. By allowing users to maintain control over their data and ensuring that no single entity has a monopoly over the platform, we create an environment that fosters collaboration, creativity, and innovation.
The Characteristics of a Well-Functioning Digital Commons:
- Clearly defined boundaries: Members and their rights are easily identifiable, and access to the shared digital resources is well-regulated.
- Proportional equivalence between benefits and costs: Users contribute to the commons according to their capabilities, and benefits are distributed fairly among members.
- Collective decision-making: Users have a say in shaping the rules and policies that govern their digital communities, promoting a sense of ownership and accountability.
- Monitoring: Transparent systems are in place to track the usage and management of shared resources, ensuring that members adhere to established rules.
- Graduated sanctions: Penalties for rule violations are proportional and escalate based on the severity and frequency of the transgressions.
- Conflict resolution mechanisms: Efficient and fair processes are in place to address disputes among members, promoting harmony and trust within the community.
- Minimal recognition of rights to organize: Users have the autonomy to self-organize and make decisions about their digital commons without excessive interference from external authorities.
- Nested enterprises: Digital commons are organized into multiple, interconnected layers of governance, with smaller communities operating within the context of larger ones, fostering collaboration and coordination.
By incorporating these principles into the design of digital commons, we can create spaces that are robust, sustainable, and equitable. This, in turn, fosters innovation, collaboration, and genuine community engagement.
Developing Community-Driven Tools:
To create and maintain digital public spaces, we need tools that empower communities to effectively manage their digital commons. These tools should facilitate communication, conflict resolution, and decision-making while promoting inclusiveness, empathy, and shared values. By empowering communities to shape their digital spaces and collaboratively resolve issues, we can help preserve the utopian essence that initially attracted people to these platforms.
Adapting to Growth and Change:
As digital communities continue to grow, it's crucial to acknowledge that their needs and challenges will inevitably change over time. To maintain a utopian atmosphere, we must be willing to adapt and consistently improve the tools and processes that sustain these digital public spaces. By promoting continuous feedback and collaboration among community members, we can ensure that the platform remains responsive to the needs of its users, fostering an environment of connection and belonging with conviction.
Conclusion:
Joining a new digital community can be a thrilling experience, but maintaining that sense of euphoria as the community grows can be difficult. To achieve this, we must design and construct digital commons that prioritize community control, collective ownership, and participatory governance. With the appropriate tools and a dedication to adapting to the evolving needs of the community, we can create spaces that continue to foster the magic of connection even as they transform. In doing so, we can nurture and sustain the utopian energy that makes these digital spaces so unique.
Post Script:
Since the completion of this essay, Bluesky has evolved from its initial utopian stage to a phase grappling with context, norms, and scalability. With an increasing user base, the once agreed-upon behavioral norms began to crumble. The initial playfulness, while staying within the community's value constraints, took a disturbing turn when individuals started posting racist and homophobic content. The situation deteriorated rapidly, escalating to the point of issuing death threats. Inspired by the "Nazi bar" parable, the community demanded urgent action to outline acceptable behavior and remove those who couldn't comply.
Bluesky, currently hosted on a single server, possesses the capability to enforce a unified set of community guidelines and terms of service. The creators of Bluesky, much like any other social media platform's developers, aimed for a laissez-faire approach. However, they eventually had to revise the terms of service and ban the trolls. This action was chaotic and resulted in significant loss of trust and goodwill.
Additionally, this did not aid the community in establishing governance for the burgeoning social media commons. Protocols such as Bluesky, Nostr, DSNP, Scuttlebutt, Farcaster, and Lens are not designed to operate in isolation. Among these, only ActivityPub and Mastodon have successfully implemented a model to manage abuse and community moderation at scale. Nonetheless, potential solutions are under development. I've personally contributed to proposals for specifications, codes, and norms on Nostr and know that Bluesky's team is making similar strides.
It is essential that the user community actively participate in this process. The Design Justice movement provides a valuable blueprint and strategies for achieving this. By applying principles of co-design and design justice, we can collaboratively build solutions. The stakes are too high to leave this endeavor to a small group of technologists alone.
-
@ f91574e5:7cd79295
2023-05-05 00:43:01Sí, seguramente el título te parece extraño, sobre todo porque acostumbras a leerme en otro tipo de nichos. Descuida, hace un tiempo me parecía extraño también, pero más pudo la curiosidad, esa misma que te trajo hoy a leer este post.
Te diré las siete razones que me llevan a querer dedicarme a partir de este momento a adentrarme en Bitcoin, compartir lo que aprendo y educar en el camino. ¿Me sigues?
1. Temática más coherente con mis principios y valores
Como freelancer, busco siempre formas de trabajar que se alineen con mis principios y valores. Después de escribir sobre blogging y negocios online durante varios años y de prestar servicios de redacción para terceros en diferentes nichos, he decidido retomar mi “side project” (proyecto alterno) con una temática diferente, una que se ajuste más a lo que soy actualmente.
En tal sentido, hoy me siento atraído por la idea de explorar el Bitcoin, así como por su impacto en el mundo actual y en distintas áreas de la vida, no solo la económica. Por tanto, creo firmemente en que puede ser una herramienta valiosa para crear una sociedad más justa, transparente y segura.
Bitcoin es un protocolo descentralizado que permite transacciones persona a persona (peer-to-peer) sin necesidad de intermediarios financieros, y de forma segura y eficiente. Su criptomoneda nativa, bitcoin, se vale de la tecnología Blockchain como base subyacente, evitando ser controlada por parte de gobiernos e instituciones financieras centralizadas, algo que no sé a ti, pero a mi me parece fascinante.
Por ende, y luego de elegir al Bitcoin como nicho de mercado, espero compartir mi pasión y conocimiento sobre esta herramienta y ayudar a otros a comprender su potencial para cambiar el mundo y, ¿por qué no?, cambiarnos a nosotros mismos. También considero que, al enfocarme en esta temática, podré dedicarme a un nicho en el que realmente creo, el cual me apasiona.
2. Crítico frente a la propuesta
A medida que aprenda más sobre el Bitcoin y su funcionamiento, siento que puedo ser más crítico acerca de su utilidad en el mundo real. Y es que a través de la investigación y la experiencia práctica, pienso que somos capaces de evaluar mejor los beneficios y los riesgos del proyecto y su criptomoneda, así como tomar decisiones informadas sobre su uso.
Por otra parte, al ser más críticos acerca del Bitcoin, podemos identificar sus limitaciones y áreas de mejora, y trabajar para abordar estos problemas. Por ejemplo, si identificamos preocupaciones sobre la seguridad de las billeteras de Bitcoin, quizás queramos investigar y contribuir a desarrollar soluciones en pro de mejorar la seguridad de las transacciones, por citar solo un caso.
3. Curiosidad: motor de aprendizaje
La curiosidad es un motor poderoso para aprender sobre el Bitcoin. Estoy interesado y motivado por aprender más acerca de su potencial, por lo que busco siempre información y recursos que me permitan conocer más el proyecto. Es así, ¿no?
Además, dicha curiosidad puede llevarnos a explorar diferentes aspectos del protocolo, como su historia, su impacto en la economía y la sociedad e, incluso, su relación con otros proyectos y sus criptomonedas. Tengo una mente abierta y curiosa, por lo que busco ampliar mi conocimiento y comprensión al respecto, para servirte de guía una vez decidas adentrarte.
Ten en cuenta algo adicional: Las ganas de aprender también nos llevan a hacer preguntas importantes y desafiar ideas preconcebidas sobre el Bitcoin. Al cuestionar y examinar diferentes perspectivas, podemos llegar a mejores conclusiones sobre el mismo. En eso ando…
4. Más le conoces, más le proteges
Es importante conocer y comprender cómo funciona Bitcoin para ayudar a protegerlo y garantizar su correcto desarrollo. Estando al día con las actualizaciones y cambios en su software, seremos capaces de evaluar mejor su impacto y utilidad.
Además, en la medida de nuestras posibilidades, y conociendo los detalles del trabajo de los desarrolladores de Bitcoin, podemos hacer preguntas importantes y cruciales, procesar la información y presentar conclusiones precisas y actualizadas a la comunidad. Asimismo, participar en discusiones y debates, y colaborar en proyectos relacionados con el mismo.
Por último, tener más conocimiento sobre el Bitcoin nos permite estar mejor preparados para aprovechar las oportunidades que ofrece. Por ejemplo, identificar el mejor momento para invertir en el activo y tomar mejores decisiones sobre cómo hacerlo.
5. Educas
Al educar a otros sobre el Bitcoin, se difunde el conocimiento y la experiencia, y se fomenta su adopción. Asimismo, reitero, compartir información precisa y actualizada sobre el proyecto, ayuda a otros a comprender su funcionamiento, beneficios y potencial.
Esta formación sobre el Bitcoin, nos permite contribuir a que otros eviten errores costosos y riesgos asociados con su uso, de manera responsable y segura, así como fomentar la innovación y el desarrollo en la industria.
Finalmente, cuando inspiramos a otros a aprender más sobre el Bitcoin y su tecnología subyacente, podemos promover la creación de nuevas soluciones y servicios que puedan mejorar la experiencia de usuario.
6. Protección ante estafas, engaños o manipulación
Ya lo hemos destacado, pero vale la pena enfatizar: Tener un conocimiento profundo sobre el protocolo y su forma de operar es una herramienta poderosa para protegerse ante estafas, engaños o manipulación en el mundo del Bitcoin, ya que permite identificar señales de alerta y tomar medidas para evitar caer en trampas comunes, como los esquemas Ponzi o las ofertas de inversión del tipo "demasiado buenas para ser verdad".
Asimismo, seremos capaces de protegernos contra la manipulación del mercado y las noticias falsas que pueden afectar el precio del Bitcoin, así como aprender a identificar fuentes confiables de información que nos permitan salvaguardar nuestras inversiones y transacciones.
Otro punto a destacar, como lo adelanto en el ejemplo de la sección 2, es que podemos aprender sobre las mejores prácticas de seguridad y privacidad para proteger nuestras billeteras y claves privadas, y evitar caer en estafas de phishing o malware.
7. Divulgar conocimiento, acto de responsabilidad social
Divulgar conocimiento sobre el Bitcoin es un acto de responsabilidad social, ya que puede ayudar a más personas a comprender su filosofía, esencia y razón de ser.
Además, contribuimos a reducir la brecha de conocimiento y acceso a la tecnología en la sociedad. Al hacer que el Bitcoin sea más accesible y comprensible para más personas, ayudamos a promover una alternativa en cuanto a inclusión financiera y la igualdad de oportunidades.
También, es posible que inspirar a más personas a aprender sobre el Bitcoin y su tecnología subyacente, sirva para fomentar la creación de nuevas soluciones y servicios que puedan mejorar la experiencia de los usuarios de Bitcoin.
Conclusión
Espero que te haya quedado claro el por qué deseo escribir sobre Bitcoin en la actualidad, una temática más acorde con mis principios y valores, con lo que soy y defiendo: la libertad de poder vivir tu vida según tus términos.
Y es que a través de las siete razones que acabas de leer, estoy plenamente convencido de que el conocimiento del Bitcoin es fundamental para comprender su potencial y protegerse contra los riesgos asociados con su uso. Aprendiendo más sobre el Bitcoin, podemos estar mejor equipados para aprovechar sus oportunidades y contribuir a su desarrollo.
Espero que esta publicación introductoria te haya inspirado a aprender más sobre el Bitcoin y a contribuir al crecimiento e innovación en la industria.
-
@ 9ecbb0e7:06ab7c09
2023-07-28 01:54:12En horas de la madrugada de este 27 de julio, un incendio de grandes proporciones destruyó el complejo turístico estatal Pio Cua en Jagüey Grande, Matanzas. Según una nota publicada por la Asamblea Municipal del Poder Popular en ese territorio, el origen de las llamas fue una sobrecarga eléctrica, aunque peritos del Ministerio del Interior (Minint) investigan a fondo lo sucedido.
“Las fuerzas especializadas del Minint de conjunto con las máximas autoridades del municipio y los trabajadores de la institución, lograron controlar el incendio, sin daños a vidas humanas”, afirma la nota, pero los percances a la infraestructura fueron irreversibles.
En redes sociales circulan múltiples videos que muestran las llamas devorando la estructura de madera y el techo de guano de la discoteca, el restaurante y la cafetería, locales que integraban el complejo turístico.
El restaurante Pio Cua, ubicado en el kilómetro 4 de la carretera a Playa Larga, tenía una capacidad para 200 personas y estaba especializado en comida internacional. Según el portal del ciudadano de Matanzas, “la construcción de madera garantizaba un ambiente agradable con una cómoda terraza ambientada con plantas naturales ideal para un descanso”.
La falla eléctrica se produjo al restablecerse la energía eléctrica luego de un largo apagón. Al parecer, los equipos electrónicos no tenían protección y a través de ellos comenzó a extenderse el fuego.
-
@ 9ecbb0e7:06ab7c09
2023-07-28 01:45:35El cubano Osvel Pérez Mantilla se llevó una inesperada respuesta al presentar una petición de asilo en Luisiana, donde estuvo dos años detenido por ingresar de manera irregular a Estados Unidos.
“En Cuba no hay dictadura”, expresó el juez a cargo de su caso, quien finalmente le negó la protección entregándole la orden de deportación final conocida como I-220B. A un par de años de esta situación, Pérez Mantilla vive en Miami con el miedo de ser repatriado tras reanudarse los vuelos de este tipo.
Al compartir su caso al periodista Mario J. Pentón, el antillano expresó que teme ser detenido cuando se presente a las oficinas del Servicio de Control de Inmigración y Aduanas (ICE, por sus siglas en inglés) para renovar su permiso de estadía en EEUU.
“Llevo días sin dormir, pensando en lo que podría pasar con mi esposa y la vida que he hecho en este país”, agregó, al señalar que ha ejercido dos trabajos en territorio estadounidense para poder salir adelante.
Asimismo, sostuvo: “me voy a presentar a las oficinas y espero que no me vaya a suceder lo peor, no quiero que me suceda y me lleven a la dictadura, esto me está afectando mucho en lo personal”.
La orden de deportación final se entrega a personas que perdieron sus casos ante un juez, cuando defendieron su solicitud de asilo u otras aplicaciones que presentaron para permanecer en EEUU.
En las últimas semanas, decenas de cubanos con ese documento terminaron detenidos cuando asistieron a las sedes del ICE para dar cumplimiento a citas de rutina. Algunos fueron liberados, pero sin tener una permanencia segura en el país.
Desde el mes de abril, la administración de Joe Biden ha realizado cuatro vuelos de deportación hacia la Mayor de las Antillas. Estos trayectos permanecieron suspendidos a causa de la pandemia y se reanudaron tras un acuerdo migratorio entre Washington y La Habana.
En el último viaje iba un cubano identificado como Sergio Pérez, quien dejó en EEUU a su hijo de 10 años. La madre de este menor reside en Cuba, mientras que en Miami se encuentran dos tías, quienes no tienen la custodia legal.
Al menos unas 258 personas oriundas de la Isla han sido devueltas por medio de los vuelos de repatriación. Todos estos migrantes ingresaron por la frontera con México o navegaron en embarcaciones improvisadas hasta Florida. Luego de ser procesados, se les permitió permanecer en EEUU, pero con dicha orden.
-
@ 9ecbb0e7:06ab7c09
2023-07-28 01:43:25El subsecretario de Seguridad Nacional, Blas Nuñez-Neto, ofreció una conferencia de prensa sobre la marcha del programa de parole humanitario que la administración demócrata de Joe Biden mantiene en vigor para cubanos, nicaragüenses, haitianos y venezolanos.
Una de las preguntas que recibió de parte de periodistas invitados fue ¿por qué el gobierno de EEUU admite en el programa parole a represores y funcionarios vinculados a los regímenes totalitarios de Cuba, Nicaragua y Venezuela?
De acuerdo con Blas Nuñez-Neto, las aplicaciones para la visa humanitaria que examina el Servicio de Ciudadanía e Inmigración (USCIS) y la Oficina de Aduanas y Protección Fronteriza (CBP) pasan por filtros del Departamento de Seguridad Nacional. Cada candidato a ser beneficiados con el parole es buscado en las bases de datos de Seguridad Nacional y Seguridad Pública y si están en los récord no se dejan entrar, confirmó el subsecretario en un audio difundido por el periodista cubano Mario J. Pentón.
Luego la respuesta a la pregunta es evidente: si los represores no están en las bases de datos, que son como especie de “listas negras”, no habrá razones para impedir su entrada a EEUU por medio del parole humanitario, que es en la actualidad la vía más expedita para emigrar legalmente a territorio estadounidense.
Los regímenes totalitarios de Cuba, Nicaragua y Venezuela se caracterizan por contar con un gran entramado de represores y funcionarios que por unas prebendas sirven de vasallos de sus propios compatriotas. En el caso cubano han surgido muchas historias de este tipo de personajes, que en aunque en pequeña escala, se cansaron de reprimir a los vecinos de su cuadra y su barrio. Ellos también hacen mucho daño y contribuyen a que el sistema comunista siga en pie; sin embargo, nunca están circulados en las listas negras de EEUU.
En cambio, el Departamento de Estado suele colocar en esas bases de datos a altos cargos militares cubanos que nunca por su posición dentro de la cúpula de poder de Cuba van a solicitar una visa humanitaria. Sin embargo, sus familiares sí salen conferencia de la Isla para mantener y controlar los múltiples negocios que tienen en el extranjero.
De momento, con las herramientas que hay para otorgar el parole humanitario no es de extrañar que sigan entrando a EEUU represores, castristas, funcionarios del Partido Comunista y demás personas asociadas al régimen. ¿Usted que propondría para solucionar este problema?
-
@ 9ecbb0e7:06ab7c09
2023-07-28 01:40:23El gobierno de Estados Unidos confirmó la deportación acelerada hacia México de alrededor de 4.000 migrantes cubanos, nicaragüense, venezolanos y haitianos tras intento de cruzar la frontera desde que se puso fin al Título 42, según informó el periodista Mario J. Pentón.
De acuerdo con declaraciones de Blas Nuñez-Neto, subsecretario de Seguridad Nacional estadounidense, desde el 12 de mayo a la fecha con la colaboración de las autoridades mexicanas, EEUU ha expulsado a 85.000 migrantes de 115 países que intentaron cruzar sin autorización la frontera sur del país.
Todos los expulsados se van con una prohibición de participar en vías legales de migración a EEUU durante los próximos cinco años. Además, si son reincidentes en cruces ilegales, pueden ser enjuiciados judicialmente.
Según el Nuñez-Neto, la política migratoria de la administración de Joe Biden ha funcionado, pues los registros muestran una evidente caída en los encuentros de migrantes que tienen las autoridades fronterizas. El subsecretario insistió en que la frontera de EEUU no están ni estarán abiertas a la migración ilegal.
Además del parole humanitario, los ciudadanos de Cuba, Nicaragua, Venezuela y Haití que se sientan con la posibilidad de pedir asilo en EEUU, lo pueden hacer ante un oficial de Aduanas y Protección Fronteriza (CBP, por sus siglas en inglés) en la frontera.
Sin embargo, esa entrevista debe ser planificada por medio de la aplicación CBP One que ofrece 1.450 citas al día a lo largo de ocho puntos de control distribuidos en los más de 3.000 kilómetros de línea divisoria entre México y EEUU.
Hasta el 23 de junio, CBP One había atendido a más de 49.000 ciudadanos extranjeros en los puertos de entrada y se les dio el derecho a presentar su caso de asilo, según los criterios de admisibilidad que estipula el Título 8 de la ley migratoria que sustituyó al Título 42.
Solo los migrantes que se encuentren en el centro o norte de México pueden entrar a la aplicación CBP One para agendar su cita siguiendo un proceso de solo dos pasos que ha sido simplificado. Por ejemplo, pueden solicitar citas en cualquier momento durante un período de 23 horas y, si se les asigna una cita, tendrán 23 horas adicionales para confirmarla.
-
@ 82341f88:fbfbe6a2
2023-04-11 19:36:53There’s a lot of conversation around the #TwitterFiles. Here’s my take, and thoughts on how to fix the issues identified.
I’ll start with the principles I’ve come to believe…based on everything I’ve learned and experienced through my past actions as a Twitter co-founder and lead:
- Social media must be resilient to corporate and government control.
- Only the original author may remove content they produce.
- Moderation is best implemented by algorithmic choice.
The Twitter when I led it and the Twitter of today do not meet any of these principles. This is my fault alone, as I completely gave up pushing for them when an activist entered our stock in 2020. I no longer had hope of achieving any of it as a public company with no defense mechanisms (lack of dual-class shares being a key one). I planned my exit at that moment knowing I was no longer right for the company.
The biggest mistake I made was continuing to invest in building tools for us to manage the public conversation, versus building tools for the people using Twitter to easily manage it for themselves. This burdened the company with too much power, and opened us to significant outside pressure (such as advertising budgets). I generally think companies have become far too powerful, and that became completely clear to me with our suspension of Trump’s account. As I’ve said before, we did the right thing for the public company business at the time, but the wrong thing for the internet and society. Much more about this here: https://twitter.com/jack/status/1349510769268850690
I continue to believe there was no ill intent or hidden agendas, and everyone acted according to the best information we had at the time. Of course mistakes were made. But if we had focused more on tools for the people using the service rather than tools for us, and moved much faster towards absolute transparency, we probably wouldn’t be in this situation of needing a fresh reset (which I am supportive of). Again, I own all of this and our actions, and all I can do is work to make it right.
Back to the principles. Of course governments want to shape and control the public conversation, and will use every method at their disposal to do so, including the media. And the power a corporation wields to do the same is only growing. It’s critical that the people have tools to resist this, and that those tools are ultimately owned by the people. Allowing a government or a few corporations to own the public conversation is a path towards centralized control.
I’m a strong believer that any content produced by someone for the internet should be permanent until the original author chooses to delete it. It should be always available and addressable. Content takedowns and suspensions should not be possible. Doing so complicates important context, learning, and enforcement of illegal activity. There are significant issues with this stance of course, but starting with this principle will allow for far better solutions than we have today. The internet is trending towards a world were storage is “free” and infinite, which places all the actual value on how to discover and see content.
Which brings me to the last principle: moderation. I don’t believe a centralized system can do content moderation globally. It can only be done through ranking and relevance algorithms, the more localized the better. But instead of a company or government building and controlling these solely, people should be able to build and choose from algorithms that best match their criteria, or not have to use any at all. A “follow” action should always deliver every bit of content from the corresponding account, and the algorithms should be able to comb through everything else through a relevance lens that an individual determines. There’s a default “G-rated” algorithm, and then there’s everything else one can imagine.
The only way I know of to truly live up to these 3 principles is a free and open protocol for social media, that is not owned by a single company or group of companies, and is resilient to corporate and government influence. The problem today is that we have companies who own both the protocol and discovery of content. Which ultimately puts one person in charge of what’s available and seen, or not. This is by definition a single point of failure, no matter how great the person, and over time will fracture the public conversation, and may lead to more control by governments and corporations around the world.
I believe many companies can build a phenomenal business off an open protocol. For proof, look at both the web and email. The biggest problem with these models however is that the discovery mechanisms are far too proprietary and fixed instead of open or extendable. Companies can build many profitable services that complement rather than lock down how we access this massive collection of conversation. There is no need to own or host it themselves.
Many of you won’t trust this solution just because it’s me stating it. I get it, but that’s exactly the point. Trusting any one individual with this comes with compromises, not to mention being way too heavy a burden for the individual. It has to be something akin to what bitcoin has shown to be possible. If you want proof of this, get out of the US and European bubble of the bitcoin price fluctuations and learn how real people are using it for censorship resistance in Africa and Central/South America.
I do still wish for Twitter, and every company, to become uncomfortably transparent in all their actions, and I wish I forced more of that years ago. I do believe absolute transparency builds trust. As for the files, I wish they were released Wikileaks-style, with many more eyes and interpretations to consider. And along with that, commitments of transparency for present and future actions. I’m hopeful all of this will happen. There’s nothing to hide…only a lot to learn from. The current attacks on my former colleagues could be dangerous and doesn’t solve anything. If you want to blame, direct it at me and my actions, or lack thereof.
As far as the free and open social media protocol goes, there are many competing projects: @bluesky is one with the AT Protocol, nostr another, Mastodon yet another, Matrix yet another…and there will be many more. One will have a chance at becoming a standard like HTTP or SMTP. This isn’t about a “decentralized Twitter.” This is a focused and urgent push for a foundational core technology standard to make social media a native part of the internet. I believe this is critical both to Twitter’s future, and the public conversation’s ability to truly serve the people, which helps hold governments and corporations accountable. And hopefully makes it all a lot more fun and informative again.
💸🛠️🌐 To accelerate open internet and protocol work, I’m going to open a new category of #startsmall grants: “open internet development.” It will start with a focus of giving cash and equity grants to engineering teams working on social media and private communication protocols, bitcoin, and a web-only mobile OS. I’ll make some grants next week, starting with $1mm/yr to Signal. Please let me know other great candidates for this money.
-
@ 9ecbb0e7:06ab7c09
2023-07-28 01:38:45Después de que Rusia inaugurara en enero de 2022 un observatorio astronómico adjunto al Instituto de Geofísica y Astronomía (IGA) de La Habana, nuevos proyectos en esa dirección acaban de ser anunciados por la prensa de Moscú.
De acuerdo con el sitio oficial Sputnik, entidades de ambos países prevén la instalación de otros dos telescopios rusos en la Isla: uno de 25 centímetros y otro de un metro de diámetro, este último reflector, "que contribuirían a la observación de objetos más débiles" que planetas y estrellas, precisa la nota.
Según un amplio reporte desde La Habana, el observatorio del IGA será trasladado en el futuro al Valle de Picadura, ubicado al sur de Canasí, casi en los límites entre Mayabeque y Matanzas, zona "provista de condiciones de cielo oscuro y pocas precipitaciones, en comparación con otras regiones del país", comenta Antonio Alonso, ingeniero en Telecomunicaciones y especialista del instituto cubano.
El reporte no menciona que esa ubicación coloca al observatorio justo frente a la península de Florida, donde existen objetivos militares claves de EEUU, como el Comando Sur.
Los expertos cubanos califican estas instalaciones como "prioridades dentro de la colaboración bilateral" ruso-cubana, ahora que los lazos estratégicos se estrechan.
De acuerdo con Sputnik, desde la nueva ubicación del observatorio los expertos rusos valoran la posibilidad de hacer estudios de fuentes radioastronómicas y de otra índole, sin precisar cuáles.
Asimismo, agrega el reporte, el observatorio posee una estación para el registro de las condiciones meteorológicas y un sistema de recepción de satélites de posicionamiento global ruso GLONASS.
"Si tenemos en cuenta la distancia entre esta estación receptora y las ubicadas en Rusia, podemos concretar numerosos estudios, desde el aumento de la precisión de este sistema hasta la percepción sobre movimientos de la corteza terrestre", asegura Alonso.
El observatorio cuenta con un astrógrafo, tipo de telescopio utilizado para tomar fotos astronómicas, que es uno de los dispositivos aportados por Rusia mediante convenios firmados con los institutos de Astronomía Aplicada (IPA) y de Astronomía (INASAN), ambos de la Academia de Ciencias de Rusia, además de financiados por Moscú.
Ese telescopio permite la obtención de imágenes de gran campo que abarcan una numerosa cantidad de objetos, si bien el trabajo hasta la fecha radica fundamentalmente en la observación de estrellas variables de rotación rápida y de asteroides, asegura el reporte.
En sus declaraciones, Alonso reconoce que los astrónomos cubanos "mantienen continua comunicación con los expertos rusos, durante las visitas que ellos realizan" a la Isla, "para el impulso de proyectos conjuntos asociados a la investigación de los objetos astronómicos luminosos".
"La posibilidad de colaboración es amplia y diversa. Esto es la primera vez que se hace en Cuba. Transitamos de instrumentos bastante antiguos hasta esta posibilidad de incorporar tecnología moderna. El telescopio está equipado con un carrusel de filtros fotométrico que favorece la obtención de imágenes del fondo del cielo en distintos rangos de frecuencias luminosas", especifica.
De igual manera, subraya el ingeniero, el telescopio cuenta con una cámara CCD de 4096 x 4096 píxeles, acondicionada para la reducción del ruido térmico y el registro de imágenes muy débiles, y una montura automatizada que contribuye a su orientación precisa y al rastreo del movimiento sideral de las estrellas, como consecuencia de la rotación de la Tierra. Las fotografías obtenidas en este proceso poseen una alta calidad.
El reporte de Sputnik asegura que la colaboración internacional en el IGA se extiende además a la cooperación con el Instituto de Geofísica de la Universidad Nacional Autónoma de México (UNAM), para el estudio de la ionosfera, campo magnético, clima espacial y paleomagnetismo; intercambios con el Instituto de Hidráulica de Cantabria, en España, en el campo de las afectaciones como consecuencia del cambio climático; así como proyectos con los países de la Comunidad del Caribe (CARICOM); y con el Instituto del Ambiente de Estocolmo, en Suecia, para temas de agua y saneamiento, bioeconomía y economía circular.
Pero llama la atención un elemento presuntamente menor en el reporte: según el medio ruso, existe un memorándum de entendimiento con China, que está interesada en la instalación en Cuba de un telescopio propio, así como del sistema de posicionamiento por satélite BeiDou, que complementaría el trabajo del GLONASS ruso ya operativo en la Isla.
El BeiDou está operativo desde 2020 y otorga cobertura global a China con su propio sistema de navegación, el BDS, lo que le permite, al igual que Rusia con el GLONASS, o Europa, con el Galileo, obtener independencia del Sistema de Posicionamiento Global, o GPS, de EEUU.
Con 30 satélites en órbita y una inversión de 10.000 millones de dólares, el BDS promete una mejor y más precisa cobertura de navegación global que el GPS, según Pekín. Su diseño original estuvo a cargo del Ejército del gigante asiático.
El proyecto de emplazar estas tecnologías chinas en Cuba se da a conocer poco después del intercambio de acusaciones entre Washington, Pekín y La Habana acerca de la existencia desde hace varios años de un centro de espionaje chino en una base militar al sur de la capital cubana y de planes para montar un centro de entrenamiento militar en la Isla.
No obstante, el observatorio astronómico ruso que ya funciona en Cuba parece todo menos un centro de espionaje. Ello, si se obvia que a su inauguración en 2022 asistió, según la propia prensa oficial cubana, Vitaly Grechukha, quien estuvo registrado en la dirección de la sede central de la Inteligencia Militar (GRU) antes de ir a Cuba, donde trabaja en la Embajada de Rusia bajo la cobertura de secretario de la sede diplomática.
Grechukha, parte de una red de decenas de agentes del GRU y del Servicio de Inteligencia Exterior (SVR) del Kremlin que operan desde Cuba un centro de espionaje que habría servido a Moscú para dar seguimiento a las operaciones de vigilancia sobre EEUU que hasta hace dos décadas hacía la base de espionaje de Lourdes, fue mencionado en un amplio reportaje sobre esa trama de espías denunciada por The Insider, revista especializada en periodismo de investigación, verificación de hechos y análisis político con sede en Riga, Letonia.
Además de operativos del GRU y el SVR, en La Habana estarían expertos rusos en ciencia de cohetes, tecnología informática y matemáticas, todos transferidos en secreto a Cuba para ¿usar tecnología de espionaje y ubicación de objetivos de interés militar en EEUU?
Si bien el centro de espionaje de Lourdes, que entre 1967 y 2001 estuvo ubicado en la zona donde hoy funciona la Universidad de las Ciencias Informáticas (UCI), en las afuera de La Habana, dejó de estar operativo en su forma original, ¿qué mejor tapadera para ejecutar operaciones de espionaje que un observatorio astronómico?
The Insider recordó en su reporte que al menos desde 2014 existen rumores de que la estación de espionaje rusa en Cuba habría sido reactivada, ahora con menos visibilidad y un equipo de menores dimensiones.
Si a todo lo anterior se suma la entrada al escenario de un actor como China, el régimen de Cuba podría estar brindando su territorio para operaciones demasiado sensibles para el vecino del norte. Ello, mientras su sociedad civil permanece ajena a lo que se cuece entre bambalinas.
-
@ 49edd28f:90fb6d51
2021-11-07 16:58:53We Went Back #1
https://www.youtube.com/watch?v=sxj1H86J88U
-
@ 9ecbb0e7:06ab7c09
2023-07-28 01:37:17Ángel Cuenca, histórico dirigente independentista y soberanista de Islas Canarias, falleció en Santiago de Cuba hace casi dos semanas y su cuerpo aún no ha podido ser enviado a España, denunciaron sus familiares a la prensa del archipiélago.
De acuerdo con el diario El Día, de Tenerife, el hermano del fallecido, el arqueólogo Julio Cuenca, aseguró que el deceso del activista ocurrió en Santiago de Cuba el 16 de julio a causa de un infarto, pero la familia en Canarias no fue avisada sino nueve días después, el martes 25.
Según el familiar, la comunicación entre Cuba y la familia en España ha corrido a cargo de la Embajada de Madrid en La Habana, pero el cadáver permanece en la morgue del Hospital Clínico de Santiago de Cuba.
"Santiago está medio paralizado, porque es fiesta nacional por la conmemoración del asalto a Moncada", explicó Julio Cuenca.
"En el momento del fallecimiento estaba solo, aunque tenía su documentación", añadió.
Según el hermano del fallecido, el activista canario pasó los últimos años entre Puerto Rico, Venezuela y Cuba, aunque era en el último país donde permanecía más tiempo "porque allí se sentía muy cómodo". Asimismo, el fallecido tenía una casa en La Habana.
"No tenemos todos los datos del protocolo que hay que cumplir. Todo se está haciendo a través de la Embajada de España", insistió Cuenca.
De acuerdo con El Día, el activista fallecido, que además era músico, estaba en Santiago de Cuba como asistente a la edición 42 del Festival del Caribe, y pensaba asistir a los actos oficiales del régimen cubano por el aniversario 70 del asalto al Cuartel Moncada, organizado por Fidel Castro.
Ingeniero agrónomo de profesión, Ángel Cuenca apenas ejerció el oficio, pues desde joven intervino en movimientos y organizaciones históricas vinculadas al independentismo y soberanismo canario, como el Congreso Nacional de Canarias (CNC), Frepic Awañak, de Tenerife, o Siete Estrellas Verdes.
Además, asesoró al expresidente del Gobierno canario Lorenzo Olarte en una iniciativa para que Canarias adquiriese el estatus de Estado Libre Asociado, lo que le llevó a estar afiliado al Centro Canario Nacionalista (CCN).
En las elecciones autonómicas del pasado 28 de mayo en España encabezó la lista del movimiento Reunir Canarias al Parlamento de esa región autónoma española, pero apenas obtuvo votos para su candidatura.
-
@ 9ecbb0e7:06ab7c09
2023-07-28 01:35:29Un juez de inmigración de Florida decidió que el destacado activista del exilio cubano en EEUU Ramón Saúl Sánchez, dirigente de la organización Movimiento Democracia, no será deportado a Cuba.
El exiliado, quien lleva refugiado en Estados Unidos desde 1967, podrá permanecer en ese país bajo el amparo de la Convención de Ginebra contra la Tortura, a la que, según sus abogados, se acogería en caso de que las autoridades insistan en enviarlo de regreso a la Isla.
Asimismo, según el reporte de Telemundo 51, el opositor al régimen cubano podrá además solicitar su residencia permanente.
La Habana acusa a Sánchez de terrorismo, algo que él niega tajantemente. El régimen de la Isla lo ha acusado por organizar las denominadas Flotillas de la libertad, caravanas de barcos que han navegado hasta el límite de las aguas internacionales con las de Cuba para solidarizarse con los cubanos de la Isla y exigir la libertad del país.
De acuerdo con el exiliado, quien podría haber llegado al final de un largo proceso legal ante las autoridades migratorias, su situación tiene por origen las presiones de la dictadura cubana.
"Ya tengo orden de deportación", había dicho Sánchez, de 65 años. Posteriormente, indicó que esa orden no podía ser ejecutada hasta que un juez diera la autorización.
La defensa de Sánchez argumentó, indicó el reporte, que este llegó a Estados Unidos como refugiado político en 1967 en los llamados Vuelos de la libertad y que corre peligro de ser torturado en su país si es devuelto.
También reiteró su petición de residencia en EEUU, que dos veces le ha sido denegada.
Una petición en la plataforma Change.org denominada "Por favor, ayúdenos a parar la deportación de Ramón Saúl Sánchez" cuenta con más de 20.000 firmas, que serían enviadas al Gobierno de Joe Biden para que interceda en el caso.
La activista Vanessa Alonso, promotora de la campaña, indica en la introducción de la petición que "si el Gobierno de los Estados Unidos lo envía de regreso a Cuba, finalmente pasará el resto de su vida en una prisión cubana".
"Ramón Saúl Sánchez es una persona muy respetada. Un orgullo de la comunidad cubana, que continúa luchando por la libertad y la democracia de Cuba. Llegó a nuestro país en 1967 y ha defendido los derechos humanos en nombre del pueblo cubano durante más de cinco décadas", subraya.
-
@ 92294577:49af776d
2023-07-28 01:30:19Privacy and security go hand in hand, as complementary and user-valued properties for Bitcoin. At Blockstream, we have been at the forefront of developing a range of methods to improve privacy for Bitcoin users, from wallet best practices in Green and Jade to developing MuSig2 and Confidential Transactions (CT).
Fully unlinkable transactions, capable of shielding both the amount and transaction graph, have become increasingly of interest since Bitcoin’s inception. While cryptocurrencies like Monero and ZCash have achieved enhanced privacy with ring signatures and SNARKs, neither has enabled full anonymity with support for multiple asset types. Before full anonymity can be taken up, a crucial step lies in the advancement of Bulletproofs++ (BP++). This improvement aims to enhance the efficiency of confidential transactions while preserving its current multi-asset support without the need for a trusted setup.
Bulletproofs++ is a new, more efficient discrete log-based signature execution system, enabling us to improve the space efficiency of confidential transactions. Confidential transactions enable users to retain the privacy of their transaction amount, ensuring that the net flow of funds in a transaction is zero. To prevent secret inflation and “negative” outflow, confidential transaction protocols use range proofs to prove that each output amount falls within a positive range.
Early Privacy Preserving Protocols: Confidential Transactions
The current CT protocol deployed on Liquid uses Borromean Ring signatures for range proofs and Confidential Assets to support multiple asset types. This is one of the earliest deployed privacy preserving transaction protocols, and traces its roots directly to Greg Maxwell’s earliest work on zero-knowledge proofs and Bitcoin. Since then, zero-knowledge proofs have experienced an unprecedented level of development. Blockstream continues to play an active role in the broader zero-knowledge proof research ecosystem, in particular in the development of Bulletproofs (BP). BP was a landmark construction as it was the first to achieve concretely small proof sizes without a trusted setup.
Bulletproofs++: Compactness and Efficiency Improvement
The ability to store, transact and verify transactions cheaply is essential for any blockchain application. Naturally, we want any proof system used for private transactions to be as small and efficient to verify as possible, to limit the amount of data stored on the blockchain. BP++’s 64-bit range proof size is only 416 bytes, which is 39% smaller than BP and 10 times smaller than current Liquid range proofs. The reduced proof sizes would reduce the transaction fees and node storage requirements. On a regular commodity laptop, verification and proving of BP++ range proofs are about four times faster than BP, making BP++ more efficient for blockchain verification. Each BP++ range proof is about the size of seven Schnorr signatures and can be verified in the time it takes to verify 20 Schnorr signatures. Through BP++, we will bring all the improvements of BP and these additional improvements to Liquid.
In current Liquid CTs and BPs range proofs, we prove a value lies in a range by proving knowledge of the bits of the value. For example, to prove a value lies in [0, 2^64 -1] we would prove knowledge of 64 bits. Bulletproofs++ allows us to use larger bases, which reduces the number of digits we need to represent a number. For example, a value in [0, 2^64 - 1] can be represented using only 16 hex digits, a 4x reduction compared to bits. This is made possible using a novel technique called the reciprocal argument, which can implement a lookup argument. The reciprocal argument when instantiated as lookup is also known as the log derivative lookup argument.
Multiple Asset Support and The Reciprocal Argument
The reciprocal argument is a technique used within the Bulletproofs++ protocol to enable support for multiple assets in the same transaction. It essentially allows different types of tokens to participate in the transaction while keeping the types of all inputs and outputs private. The idea can be explained by using an analogy of a table inside a zero-knowledge proof.
We can think of the reciprocal argument as a way to use a table inside a zero-knowledge proof; given an index and an amount we can add or subtract that amount from the table at that index. Each input and each output of a transaction has a type and an amount. To check that all the amounts of each type balance, we will go through each input and add the amount to the table at the index given by the type. Then, we will go through each output and remove the amount from the table at the index given by its type. The transaction balances only if all the entries of the table are zero.
In pseudo code:
```
Start with empty table
T = {}
Add all the inputs
for (v, t) in I: T[t] += v
Remove all the outputs
for (v, t) in O: T[t] -= v
Check all the amounts in the table are zero
for (t, v) = T.items(): assert(v == 0) ```
A Bulletproofs++ Implementation
Currently, we have merged the first of two PRs into libsecp256k1zkp implementing the norm argument. This builds on BP’s inner product argument and is the underlying primitive that gives BP++ their small size. Next, we'll merge the second PR that supports range proofs. After that, we will implement support for multiple assets and the necessary proofs to privately migrate existing assets to the BP++ asset format. Implementing in libsecp256k1zkp allows us to take advantage of the state-of-the-art performance of libsecp and easily deploy on Liquid.
Longer term, using the new flexibility of BP++ and some research directions at Blockstream, we see a path to robustly private transactions on Liquid, and potentially Bitcoin, which can also provide unlinkability between transactions and shield amounts (and shield types of assets in Liquid).
Unlinkable transaction protocols are at the cutting edge of zero-knowledge proof research, especially when implemented without a trusted setup. BP++ will form the confidential core of a multi-asset, unlinkable transaction protocol for Liquid.
In addition to the CT core, which will use the techniques developed in BP++, unlinkable transactions require proving much more complex statements. This area is still under active research.
Privacy has always been an important part of the Bitcoin ethos; money requires fungibility and fungibility requires privacy. Our goal is to bring this privacy to the Bitcoin ecosystem, with BP++ as the first step. Targeting Simplicity for an implementation of BP++ will allow any project that supports Simplicity to integrate and interoperate with BP++.
To learn more, read the latest version of the “Bulletproofs++: Next Generation Confidential Transactions via Reciprocal Set Membership Arguments” paper, currently hosted and freely available on the IACR eprint archive, and review our work-in-progress implementation on GitHub.
-
@ d266da53:7224d834
2023-07-28 03:11:05ByBit Fintech Ltd v Ho Kai Xin and others [2023] SGHC 199
General Division of the High Court — Originating Claim No 320 of 2022 (Summonses Nos 910 and 1526 of 2023) Philip Jeyaretnam J 5 May, 24 July 2023 25 July 2023 Judgment reserved.
Philip Jeyaretnam J:
Introduction
- This case concerns a crypto asset called Tether which is an example of what has been described as a stablecoin. By this it is meant that its issuer represents that it backs each stablecoin issued with an equivalent value in fiat currency or other reserves. The issuer typically offers terms of service under which verified holders of the stablecoin have the right to redeem it with the issuer for fiat currency. This link to a fiat currency, in this case the United States Dollar, is reflected in the name by which Tether is commonly referred to, namely USDT, standing for United States Dollar Tether. I will adopt this acronym in this judgment.
- In this application, ByBit Fintech Limited (“ByBit”) seeks summary judgment against the first defendant, one Ms Ho Kai Xin (“Ms Ho”). The claim against her is that in breach of her employment contract, she abused her position to transfer quantities of USDT to “Addresses” secretly owned and controlled by her, as well as a quantity of fiat currency to her own bank account. The main relief sought is a declaration that Ms Ho holds both the USDT and the fiat currency on trust for ByBit. ByBit accordingly seeks an order for the return of the same or of its traceable proceeds, or for payment of a sum equivalent in value.
- The courts in Singapore and elsewhere have in granting interlocutory injunctions recognised that there is at least a serious question to be tried or a good arguable case that crypto assets are property capable of being held on trust. In so doing, it has not been necessary to determine whether such crypto assets are things in action or are instead a novel type of intangible property. To grant judgment and finally declare a trust, this court must go further and decide that the crypto assets in question, here USDT, are indeed property capable of being held on trust and, if so, what type of property they are.
- In this case, I find that USDT, which may be transferred from one holder to another cryptographically without the assistance of the legal system, nonetheless are choses in action. In this judgment, I mostly use the phrase things in action, which means the same as choses in action. While the fact that USDT also carries with it the right to redeem an equivalent in United States Dollars from Tether Limited, a company incorporated in the British Virgin Islands (“BVI”), makes it look more like traditionally recognised things in action, I do not consider that this feature is necessary for a crypto asset to be classed as a thing in action. Like any other thing in action, USDT is capable of being held on trust.
- I further hold that ByBit has established its case for summary judgment, and accordingly grant the declarations sought on the basis of institutional constructive trust.
- I now explain my reasons for these conclusions.
Background
- ByBit, a Seychellois company, owns a namesake cryptocurrency exchange. ByBit remunerates its employees with traditional currency, cryptocurrency, or a mixture of both. WeChain Fintech Pte Ltd (“WeChain”), a Singapore incorporated company, provides payroll services for ByBit and related entities. Ms Ho was employed by WeChain and was responsible for the payroll processing of ByBit’s employees.
- As part of her duties, Ms Ho maintained Microsoft Excel spreadsheets which tracked the cash and cryptocurrency payments due to ByBit’s employees each month (respectively, the “Fiat Excel Files” and “Cryptocurrency Excel Files”). The Cryptocurrency Excel Files list the “Address” designated by ByBit’s employees for the receipt of cryptocurrency payments. An “Address” can be understood as an encrypted digital “folder” which can “receive” and “store” cryptocurrency. Each Address takes the form of a unique string of alpha numerals. A corresponding “Private Key” is required to access and authorise transfers between Addresses. These Private Keys are in turn stored in “Wallets”, which can thus be understood as the means of interfacing with cryptocurrency. Wallets which are hosted online by a service provider, usually a cryptocurrency exchange, are known as “Custodial Wallets”. Custodial Wallets usually take the form of an application with a user interface. Offline Wallets are known as “Self-Custodial Wallets” and may range from a simple piece of paper inscribed with the Private Key or complex encryption software restricting access to the Private Key. In short, access to a Wallet grants access to the stored Private Keys which provide control over an Address and thus the cryptocurrency stored therein. ByBit’s employees could and did regularly change their designated Address by communicating a new Address to Ms Ho, who would then update the Cryptocurrency Excel Files. Ms Ho was singularly responsible for updating the Cryptocurrency Excel Files and was the only person with access, save that the Cryptocurrency Excel Files would be submitted to her direct superior, Ms Casandra Teo, for approval each month.
- On 7 September 2022, ByBit discovered that eight unusual cryptocurrency payments had been made (the “Anomalous Transactions”) between 31 May 2022 and 31 August 2022, involving large payments of USDT into four Addresses, which I will refer to for simplicity as Address 1, 2, 3 and 4. In total, 4,209,720 USDT had been transferred (the “Crypto Asset”). USDT is so named because its value is tethered to the US dollar and each USDT grants a holder who is a “verified customer” of its issuer, Tether Limited, a contractual right to redeem their USDT for US dollars. The Anomalous Transactions were compiled into an Excel spreadsheet (the “Reconciliation Excel File”), and Ms Ho was tasked with accounting for the discrepancies. Ms Ho initially attributed the Anomalous Transactions to inadvertent mistakes or technical errors and offered to calculate the amounts required to be clawed back from ByBit’s employees.
- Between 9 to 22 September 2022, Ms Ho remained unable to provide any explanation for the Anomalous Transactions. When asked why payments to different employees were made to the same Address, Address 1, Ms Ho suggested that she had made an inadvertent mistake. Ms Ho continued to provide status updates in the Reconciliation Excel File, characterising the Anomalous Transactions as amounts “overpaid” to ByBit’s employees.
- On 27 September 2022, ByBit contacted one of the supposed recipients of the Anomalous Transactions. 1,300,000 USDT had been paid to Address 1 in his name. However, according to ByBit, that employee denied ever designating an Address as he had only ever been remunerated with traditional currency and did not know who owned Address 1. ByBit’s internal investigations revealed that Ms Ho’s work email had sent to itself an email containing Address 1 on 19 May 2022. Ms Ho’s work email had also received an email containing all four Addresses on 29 August 2022, this time originating from Ms Ho’s personal email. These emails had to be recovered by ByBit as they had been deleted.
- ByBit also discovered that Ms Ho had caused $117,238.46 (the “Fiat Asset”) to be paid into her personal bank account in May 2022. It is undisputed that Ms Ho is not entitled to the Fiat Asset and Ms Ho expressly accepts that she holds the Fiat Asset on trust for ByBit. However, Ms Ho has to date not taken any steps to return the Fiat Asset.
- ByBit interviewed Ms Ho on 29 September 2022 and 4 October 2022. In the first meeting, Ms Ho claimed that she was unable to recall the details of the Anomalous Transactions. In the second meeting, Ms Ho was confronted with the fruits of ByBit’s investigations. Ms Ho told ByBit that she did not own the Wallets associated with the four Addresses, which belonged to her maternal cousin, and that she did not have access to them. Ms Ho said that it was her cousin who had proposed that she assist in transferring cryptocurrency to him and that she possessed closed circuit surveillance footage recording him carrying out the Anomalous Transactions in her house. Ms Ho confessed that she had become involved in the scheme some three months prior to the interview and told ByBit that she preferred that a police report be made as she did not possess the Crypto Asset. After the interview, Ms Ho refused to sign an acknowledgment on a single page statement recording what transpired. Nevertheless, it is undisputed that Ms Ho made these representations to ByBit. Thereafter, Ms Ho ceased contact with ByBit and WeChain and failed to attend follow up interviews.
- ByBit commenced this action on 12 October 2022. ByBit succeeded in obtaining several items of interim relief, including a worldwide freezing order against Ms Ho and a proprietary injunction in respect of the cryptocurrency in the four Addresses (ie, the Crypto Asset) and the Fiat Asset in Ms Ho’s bank account. Ms Ho was personally served with the Originating Claim and the orders on 18 October 2022. On 31 October 2022, Ms Ho disclosed by affidavit that the Wallets associated with the four Addresses were owned by one Mr Jason Teo (“Jason”), her maternal cousin. Ms Ho averred that she did not have access to any of the Wallets, that she had deleted her text conversation history with Jason prior to the service of the orders, and that she no longer had the closed-circuit surveillance footage as recordings older than seven days were automatically deleted. Ms Ho filed her defence on 11 November 2022 and took out a third-party notice against Jason.
- Ms Ho fully accepts that the Crypto Asset belongs to ByBit and that she is not entitled to the same. The core of Ms Ho’s defence is that Jason stole the Crypto Asset from ByBit without her knowledge. She did not receive or benefit from them as the Wallets associated with the four Addresses are owned and controlled by Jason alone. Her case is that from May 2022, she had asked Jason to assist in checking the Cryptocurrency Excel Files on “numerous occasions” when Jason visited her home. Jason had thereafter accessed her work laptop without her knowledge or consent, which Ms Ho only discovered after reviewing her home’s closed-circuit surveillance footage when ByBit drew her attention to the Anomalous Transactions. She then confronted Jason, who admitted that he had intentionally substituted the designated Address of several ByBit employees with the four Addresses. Despite repeated requests, Jason has refused to return the Crypto Asset. Ms Ho’s position is that she remained unaware of the cause of the Anomalous Transactions on 9 September 2022, which was well over seven days after the last Anomalous Transaction (dated 31 August 2022). No explanation is provided for how Ms Ho was able to view the incriminating footage.
- Dissatisfied with Ms Ho’s disclosure, ByBit sought and obtained on 7 December 2022 orders for more extensive disclosure against Ms Ho and a number of third-parties, including her father and husband. This was because ByBit had discovered that Ms Ho had made several substantial purchases from July 2022 onwards, including a freehold penthouse apartment with her husband, a brand new car, and several Louis Vuitton products. Notably, despite initially denying ownership of any real property, Ms Ho subsequently explained that she had acquired the freehold penthouse using moneys earned from cryptocurrency trading on MetaMask and crypto.com. This was contrary to her previous claim that her MetaMask account was entirely unused. Ms Ho did not provide her MetaMask and crypto.com Address nor furnish accounts statements for transactions. According to Ms Ho, she lost access to her crypto.com account because it was registered to her personal email, which has since become disabled for reasons unknown. Similarly, she could not access her MetaMask account as she had purchased a brand new handphone in October 2022 and was unable to access the necessary passcode from her previous device. I also note that contrary to the disclosure order, Ms Ho initially failed to disclose all her assets, such as her bank accounts, which required ByBit to carry out a further round of questioning.
- Simultaneously, Ms Ho applied for and obtained permission to effect substituted service on Jason. Curiously, Ms Ho averred in her supporting affidavit that it was Jason who had deleted their text conversation history after she informed him that she had been served the Originating Claim. Jason has not made an appearance in these proceedings.
- On 30 March 2023, ByBit took out this application for summary judgment. Ms Ho did not file any affidavit disputing the application pursuant to O 9 r 17(3) of the Rules of Court 2021. On 18 April 2023, prior to the hearing, Ms Ho took over the conduct of her own defence. Ms Ho did not attend any of the hearings before me and did not file submissions.
- For completeness, ByBit also applied to amend their claim and to put in further submissions, which I directed to be filed by 19 May 2023. ByBit had originally pleaded that Ms Ho held the Crypto Asset and Fiat Asset on remedial constructive trust. ByBit therefore sought the amendment in order to run an alternative argument premised on institutional constructive trust. I granted Ms Ho leave to file submissions in respect of the amendment and granted an extension for her to file submissions in respect of summary judgment by 26 May 2023. As before, Ms Ho neglected to file any submissions and did not oppose the amendment application.
- ByBit submitted that the amendments were merely clarificatory and did not introduce any new facts. The pleadings already specified that Ms Ho wrongfully caused the Anomalous Transactions and Ms Ho’s defence would not be affected by the amendments. Instead, the amendments enabled the real issue in controversy to be determined and no prejudice would be caused to Ms Ho that could be compensated by costs.
- I agreed that the proposed amendments were clarificatory in nature, and that adding the alternative legal conclusion of institutional constructive trust on the basis of the already pleaded facts enabled the real controversy to be fully and finally determined. Accordingly, on 30 June 2023 I allowed the amendments, and proceeded with the application for summary judgment on the basis of ByBit’s Statement of Claim (Amendment No. 2), which was filed on 5 July 2023.
The parties’ cases
Ms Ho’s case
- As stated, Ms Ho’s case is essentially that the blame should fall solely on Jason (see above at [15]). From the affidavits, it appears that Ms Ho claims that she has no means of identifying Jason and does not know his personal details or residential address. Additionally, Ms Ho believes that it was Jason who accessed her work and personal email, sent, and then deleted, the emails stating the four Addresses (see above at [11]). Jason did this without her authorisation and Ms Ho denies deleting the emails. Furthermore, Ms Ho claims that she had lied to ByBit when she implicated herself during the interview on 4 October 2022 (see above at [13]). According to Ms Ho, ByBit had sternly warned her of the criminality of her conduct and badgered her by insisting that she was responsible for the Anomalous Transactions. Ms Ho had responded as she did out of a desire to protect Jason, with whom she was close, and also because Ms Ho was in a rush to leave to care for her unwell two-year-old son. On account of her son’s illness, she refused to sign the single page acknowledgement after the interview, as she did not have time to review its contents, and refused to attend the follow up interviews.
- As for the Fiat Asset, Ms Ho suggests that she had accidentally entered her own data in place of another employee’s when preparing the Fiat Excel Files, resulting in a mistaken payment.
ByBit’s case
- ByBit submits that it is entitled to summary judgment pursuant to O 9 r 17(1)(a) of the Rules of Court 2021 as it has proven a prima facie case and Ms Ho has no defence to the claim. ByBit’s submissions focus on the Crypto Asset, as Ms Ho accepts that she holds the Fiat Asset on trust for ByBit.
- First, ByBit submits that “Jason” is an outright fabrication. Ms Ho has no evidence supporting Jason’s existence and her version of events is inherently implausible. Contemporaneous with the Anomalous Transactions, Ms Ho also engaged in a suspicious luxury spending spree. Ms Ho had spent approximately $362,000 on the new car and $30,000 on the Louis Vuitton products, and abruptly cancelled her existing Built-to-Order HDB Flat to purchase a penthouse valued at approximately $3.7m. Furthermore, ByBit obtained disclosure of incriminating information from the service provider of the Wallet associated with Address 1. This revealed that Ms Ho owns the Wallet and included details such as Ms Ho’s identity card and even a self-portrait, which were provided by her as part of the account registration process. Disclosed transaction records also match the Anomalous Transactions flowing into Address 1, and amounts transferred on certain dates appear to show that the USDT transferred into Address 2 and Address 3 were shortly thereafter transferred into Address 1. This proves that Ms Ho owns and controls the Wallet associated with Address 1 and likely owns and controls the Wallets associated with the other Addresses.
- Second, ByBit submits that the Crypto Asset is comprised of choses in action and is therefore property capable of being the subject matter of a trust. This is because USDT grants a verified customer of Tether Limited the contractual right to redeem USDT for an equivalent value in fiat currency. ByBit submits that Address 3 is associated with a Self-Custodial Wallet, meaning that Ms Ho has direct access to the relevant Private Key and therefore direct control over Address 3 and the USDT therein, which can be held on trust as a chose in action. For Address 1, 2, and 4, these are associated with Custodial Wallets. In the case of Custodial Wallets, access to the Private Keys is kept by the service provider rather than the user of the Custodial Wallet. Instead, the user of the Custodial Wallet is contractually entitled to instruct the service provider to transfer cryptocurrency between Addresses. ByBit likens this to a bank account, where the cryptocurrency balance stated in the Custodial Wallet (equivalent to an account balance) is a chose in action against the service provider (equivalent to the bank). The relevant property is therefore also a chose in action, being the right to instruct the service provider in respect of the credit balance of USDT.
- Third, ByBit submits that Ms Ho holds the Crypto Asset and Fiat Asset as constructive trustee, or alternatively, that Ms Ho was unjustly enriched in the sum of the Crypto Asset and Fiat Asset. ByBit submits that Ms Ho acquired the Crypto Asset by fraud, as she manipulated the Cryptocurrency Excel Files and thereby wrongfully caused ByBit to pay the Crypto Asset into the four Addresses controlled by Ms Ho, thereby giving rise to an institutional constructive trust. Alternatively, ByBit submits that a remedial constructive trust should be recognised in the circumstances as there has been fraud or wrongdoing and Ms Ho’s conscience has been affected. Accordingly, ByBit submits that I should grant a tracing order as Ms Ho has transacted the Crypto Asset and Fiat Asset in breach of the freezing order. For the backstop claim in unjust enrichment, ByBit relies on the unjust factor of mistake of fact, namely that ByBit was misled into believing that cryptocurrency payments were due and payable to its employees at the four Addresses. ByBit therefore submits it is entitled to restitution of the value of the Crypto Asset.
Issues to be determined
- The issues in this matter are twofold: (a) whether USDT is property capable of being held on trust; and (b) whether ByBit is entitled to summary judgment.
Issue 1: USDT is property capable of being held on trust
- Crypto assets, notwithstanding their novelty, have not only been transferred for value but also when held by companies appear on their balance sheets, as the accounting profession develops standards for how to value and report them. The Monetary Authority of Singapore (“MAS”) has recently issued a consultation paper on proposed amendments to the payment services regulations that will implement segregation and custody requirements for digital payment tokens: MAS, “Response to Public Consultation on Proposed Regulatory Measures for Digital Payment Token Services” published on 3 July 2023. These proposed amendments reflect the reality that it is possible in practice to identify and segregate such digital assets, and hence support the view that it should be legally possible to hold them on trust.
- Moreover, general recognition has been given to cryptocurrency as property in the Rules of Court. In Order 22 of the Rules of Court 2021, which deals with the enforcement of judgments and orders, O 22 r 1(1) defines “movable property” to include “cash, debt, deposits of money, bonds, shares or other securities, membership in clubs or societies, and cryptocurrency or other digital currency” [emphasis added]. Cryptocurrency has thus been expressly recognised as a form of property capable of being the subject matter of an enforcement order. Although the drafters of the Rules of Court 2021 did not specify a precise method for carrying out such an enforcement order (see the Civil Justice Commission Report (29 December 2017) (Chairperson: Justice Tay Yong Kwang)), I observe in passing that the procedures for serving a notice of seizure on the persons or entities having possession or control of movable property (O 22 r 6(4)(b) of the Rules of Court 2021) or on the persons or entities which register the ownership of intangible movable property (O 22 r 6(4)(g) of the Rules of Court 2021) are logically extendable to cryptocurrency or other digital currency.
- Crypto assets are not classed as physical assets because we cannot possess them in the way we can possess objects like cars or jewellery. They do not have a fixed physical identity. Yet, crypto assets do manifest themselves in the physical world, albeit in a way that humans are unable to perceive. The combination of Private Key with Public Key unlocks the previous cryptographic lock and in turn locks the unspent transaction output of the crypto asset to the holder’s public Address on the blockchain. Professor Kelvin Low suggests that the right that the holder of the Private Key has by virtue of holding the Private Key is “properly conceptualised as a narrow right to have the unspent transaction output (UTXO) of a cryptoasset locked to a holder’s public address on a blockchain”: see Kelvin FK Low, “Trusts of Cryptoassets” (2021) 34(4) Trust Law International 191. This physical manifestation at the level of digital bits and bytes is not permanent, and changes with every transaction. Nonetheless, we identify what is going on as a particular digital token, somewhat like how we give a name to a river even though the water contained within its banks is constantly changing.
- While some people are sceptical of the value of crypto assets, it is worth keeping in mind that value is not inherent in an object. While we speak of expensive materials, with gold being more valuable than wood, this is a judgment made by an aggregate of human minds. It is also a judgment that varies with circumstances. A wooden chair that can float is more valuable on a ship that is sinking than a golden throne would be.
- This description of crypto assets shows that they can be defined and identified by modern humans, such that they can be traded and valued as holdings. They certainly meet Lord Wilberforce’s oft-quoted dictum in National Provincial Bank v Ainsworth [1965] 1 AC 1175 at 1248:
Before a right or an interest can be admitted into the category of property, or of a right affecting property, it must be definable, identifiable by third parties, capable in its nature of assumption by third parties, and have some degree of permanence or stability.
- The next question is whether USDT can be classed in the category of things in action. The argument that crypto assets should not be classified as things in action rests on the origin of this category as rights enforceable by action (in the sense of litigation in court) against persons, such as the right to be paid money or debts, or contractual rights. There is no individual counterparty to the crypto holder’s right. But over time the category of things in action has expanded to include documents of title to incorporeal rights of property, and ultimately incorporeal rights themselves such as copyrights: see W.S. Holdsworth, “The History of the Treatment of ‘Choses’ in Action by the Common Law” (1920) 33(8) Harvard Law Review 997. As Holdsworth noted at 998 in the introduction to his authoritative essay:
It is clear that the diversity of the things included under the category of choses in action must lead to a diversity in the legal incidents of various classes of choses in action. In fact their legal incidents do differ very widely; for, being different in themselves, they have necessarily been treated differently both by the courts and by the legislature. It is impossible to treat fully of the law of choses in action in general; and the various classes of choses in action are usually treated, not under this one general category, but under the separate branches of law to which they more properly belong. If we want to know the law, for instance, as to bills and notes, or shares, or copyright, or patents, we should not think of looking for it in a treatise on choses in action, but rather in books on mercantile law, company law, or in special treatises devoted to these particular things.
- Holdsworth’s historical survey demonstrates the diversity of incorporeal property that has been classed as things in action. This diversity suggests that the category of things in action is broad, flexible, and not closed. It is these features that both explain and justify Fry LJ’s oft-cited dictum in Colonial Bank v Whinney (1885) 30 Ch D 261 at 285, that: “All personal things are either in possession or action. The law knows no tertium quid between the two.”
- My conclusion is therefore that the holder of a crypto asset has in principle an incorporeal right of property recognisable by the common law as a thing in action and so enforceable in court. While it might be said that this conclusion has an element of circularity in that it could also be said that the right to enforce in court is what makes it a thing in action, this type of reasoning is not strikingly different from how the law approaches other social constructs, such as money. It is only because people generally accept the exchange value of shells or beads or differently printed paper notes that they become currency. Money is accepted by virtue of a collective act of mutual faith. This is reflected in Lord Mansfield’s famous observation in Miller v Race (1758) 1 Burr 452 at 457, that what is treated as money “by the general consent of mankind” is given “the credit and currency of money to all intents and purposes”.
- ByBit also relies on the current terms of service for USDT which provide for a contractual right of redemption. Clause 3 includes the following provision concerning this right of redemption:
Tether issues and redeems Tether Tokens. Tether Tokens may be used, kept, or exchanged online wherever parties are willing to accept Tether Tokens. Tether Tokens are 100% backed by Tether's Reserves. Tether Tokens are denominated in a range of Fiat. For example, if you purchase EURT, your Tether Tokens are 1-to-1 pegged to Euros. If you cause to be issued EURT 100.00, Tether holds Reserves valued at €100.00 to back those Tether Tokens. The composition of the Reserves used to back Tether Tokens is within the sole control and at the sole and absolute discretion of Tether. Tether Tokens are backed by Tether's Reserves, including Fiat, but Tether Tokens are not Fiat themselves. Tether will not issue Tether Tokens for consideration consisting of the Digital Tokens (for example, bitcoin); only money will be accepted upon issuance. In order to cause Tether Tokens to be issued or redeemed directly by Tether, you must be a verified customer of Tether. No exceptions will be made to this provision. The right to have Tether Tokens redeemed or issued is a contractual right personal to you. Tether reserves the right to delay the redemption or withdrawal of Tether Tokens if such delay is necessitated by the illiquidity or unavailability or loss of any Reserves held by Tether to back the Tether Tokens, and Tether reserves the right to redeem Tether Tokens by in-kind redemptions of securities and other assets held in the Reserves. Tether makes no representations or warranties about whether Tether Tokens that may be traded on the Site may be traded on the Site at any point in the future, if at all.
- The terms of service are governed by BVI law. ByBit tendered a legal opinion from a BVI-qualified counsel, Mr Sam Goodman, opining that under BVI law a holder of USDT who is a “verified customer” of Tether Limited has a contractual right to redeem USDT which may be enforced by way of suit against Tether Limited. ByBit relies on this in support of its contention that USDT is a thing in action.
- In my analysis, this feature of USDT may constitute an additional thing in action that the holder of a USDT may have, but its presence is not necessary to my conclusion that the right represented by the USDT is itself a thing in action.
Issue 2: ByBit is entitled to summary judgment
- ByBit submits that it has established a prima facie case, having already surmounted the hurdle of proving a good arguable case for the purposes of securing the worldwide freezing order. Conversely, Ms Ho cannot establish a fair or reasonable probability of a real or bona fide defence.
Jason does not exist
- I accept on a balance of probabilities the inference that ByBit seeks to draw from the totality of the evidence that Jason does not exist (or at any rate did not play the role asserted for him by Ms Ho). The evidence is indeed compelling that Ms Ho fraudulently transferred the Crypto Asset and the Fiat Asset to herself. As outlined in [25] above, there is the direct evidence that Ms Ho owns the Wallet associated with Address 1 as well as the circumstantial evidence of her unexplained spending spree. Taking advantage of her employment with WeChain which was engaged to handle ByBit’s payroll and abusing the trust reposed in her, Ms Ho manipulated the Cryptocurrency Excel Files to steal the Crypto Asset and the Fiat Asset. Constructive trust
- An institutional constructive trust arises over stolen assets at time of the theft, and the remedy of tracing in equity is available in respect of stolen assets. As Lord Browne-Wilkinson noted in Westdeutsche Landesbank Girozentrale v Islington London Borough Council [1996] 1 AC 669 at 716:
I agree that the stolen moneys are traceable in equity. But the proprietary interest which equity is enforcing in such circumstances arises under a constructive, not a resulting, trust. Although it is difficult to find clear authority for the proposition, when property is obtained by fraud equity imposes a constructive trust on the fraudulent recipient: the property is recoverable and traceable in equity. Thus, an infant who has obtained property by fraud is bound in equity to restore it: Stocks v. Wilson [1913] 2 K.B. 235, 244; R. Leslie Ltd. v. Sheill [1914] 3 K.B. 607. Moneys stolen from a bank account can be traced in equity: Bankers Trust Co. v. Shapira [1980] 1 W.L.R. 1274, 1282C-E. See also McCormick v. Grogan (1869) L.R. 4 H.L. 82, 97.
- I should also add that the constructive trust may operate even if Ms Ho mixed the USDT with other USDT in the balances of the respective online Custodial Wallets, or the Fiat Asset with other money in her bank account: Foskett v McKeown [2001] 1 AC 102.
- Given my findings on the facts, I declare a constructive trust over the Crypto Asset and the Fiat Asset. ByBit is the legal and beneficial owner of the Crypto Assets. In view of my grant of relief on the basis of institutional constructive trust, I need not deal with the alternative bases of remedial constructive trust and unjust enrichment.
- ByBit following its investigations has sought a mix of proprietary and personal orders, which I now grant, as follows:
(a) A declaration of constructive trust over the Crypto Asset and Fiat Asset; (b) An order that Ms Ho does forthwith pay to ByBit the sum of USD 647,880 (being the value of the Crypto Assets in Wallets 3 and 4); and (c) An order that Ms Ho does forthwith pay to ByBit the sum of SGD 117,238.46 (the Fiat Asset); (d) An order that Ms Ho does forthwith transfer all sums remaining in Wallet 1 to ByBit, up to the sum of USD 3,561,840 (being the value of the Crypto Assets transferred to Wallets 1 and 2); (e) In respect of the remainder of the Crypto Assets transferred to Wallets 1 and 2 (being USD 3,561,840 worth of USDT) after deducting the amount transferred in (d) above (the “Remainder Sum”): (i) An order that Ms Ho give an account of the Remainder Sum, or such money or funds representing the value of the Remainder Sum as have been possessed or received by her or by any person on their behalf or to their order; (ii) A tracing order in respect of the Remainder Sum, or any part thereof, for ByBit to trace and recover the assets or the proceeds thereof into which the aforesaid properties have been converted, if any; (iii) An order for payment by Ms Ho to ByBit of all sums found to be due to ByBit on the taking of the account.
- I also award interest at the standard rate of 5.33% per annum on the sums payable under [45(b)] and [45(c)] above from the dates the assets in question were transferred by Ms Ho until date of judgment.
Conclusion
- Having granted ByBit summary judgment against Ms Ho, I also award costs in favour of ByBit in the amount of $45,000.00 (which takes into account the legal novelty of the issues argued as well as the work done in seeking interim relief for which costs were in the cause) and disbursements of $11,500.00. Philip Jeyaretnam Judge of the High Court
Quek Wen Jiang Gerard, Kyle Gabriel Peters, Ling Ying Ming Daniel, Mato Kotwani and Chua Ze Xuan (PDLegal LLC) for the claimant;
The first to sixth defendants absent and unrepresented.
By: Link:https://www.elitigation.sg/gd/s/2023_SGHC_199
-
@ 1e52c554:21771908
2023-07-27 17:32:48``` Was It My Worship?
Did loving thee all the way to worship Open new roads to thy inconstant way? Or did my loyalty to your courtship Send thee astray looking for some more play?
I am deaf to those rumors of talent That speak of thorns for roses to be good And anger in my heart remains silent For my manners never learnt to be rude.
I find a lure in crowns that seem harder When between many I have to decide As the thought of having to go further Does make my goals look safer inside.
But, did not I travel far to find thee When thy best charms thou lit for me to see?
*** ```
Analysis of Sonnet 79 by Francisco Luis Arroyave Tabares
Sonnet 79 by Francisco Luis Arroyave Tabares is a poignant exploration of love, loyalty, and the pain of unrequited affection. The sonnet follows the traditional Shakespearean sonnet structure, with three quatrains and a concluding couplet, and a rhyme scheme of ABABCDCDEFEFGG.
The first quatrain introduces the speaker's deep affection for the beloved, questioning whether his intense love and loyalty have inadvertently pushed the beloved away. The speaker wonders if his devotion has been too overwhelming, leading the beloved to seek less intense relationships elsewhere.
In the second quatrain, the speaker dismisses rumors about the beloved's character, refusing to believe in their negative traits. He maintains his polite demeanor, even in the face of potential betrayal, suggesting a deep-rooted respect and love for the beloved.
The third quatrain introduces a metaphor of crowns, possibly symbolizing other potential lovers or opportunities. The speaker finds these "harder" crowns more attractive, perhaps because they represent a challenge or a chance to move on from the beloved. However, the speaker also acknowledges the comfort of familiar goals, hinting at his reluctance to let go of his feelings for the beloved.
The concluding couplet brings the sonnet full circle, reminding the reader of the speaker's journey to find the beloved and the allure of the beloved's charms. Despite the pain and uncertainty, the speaker remains captivated by the beloved, suggesting a love that endures despite its unrequited nature.
Overall, Sonnet 79 is a complex exploration of unrequited love, loyalty, and the struggle between moving on and holding onto deep-seated affection. It showcases Arroyave Tabares's skill in using traditional sonnet structure to convey complex emotional states.
Rhyme Scheme Analysis
Sonnet 79 by Francisco Luis Arroyave Tabares follows the traditional Shakespearean sonnet structure, which includes a rhyme scheme of ABABCDCDEFEFGG. Let's break down the sonnet line by line to analyze the rhyme scheme in detail:
- Did loving thee all the way to worship (A)
- Open new roads to thy inconstant way? (B)
- Or did my loyalty to your courtship (A)
- Send thee astray looking for some more play? (B)
In the first quatrain, the end words "worship" and "courtship" rhyme with each other, forming the 'A' rhyme. The words "way" and "play" rhyme with each other, forming the 'B' rhyme.
- I am deaf to those rumors of talent (C)
- That speak of thorns for roses to be good (D)
- And anger in my heart remains silent (C)
- For my manners never learnt to be rude. (D)
In the second quatrain, the end words "talent" and "silent" rhyme with each other, forming the 'C' rhyme. The words "good" and "rude" rhyme with each other, forming the 'D' rhyme.
- I find a lure in crowns that seem harder (E)
- When between many I have to decide (F)
- As the thought of having to go further (E)
- Does make my goals look safer inside. (F)
In the third quatrain, the end words "harder" and "further" rhyme with each other, forming the 'E' rhyme. The words "decide" and "inside" rhyme with each other, forming the 'F' rhyme.
- But, did not I travel far to find thee (G)
- When thy best charms thou lit for me to see? (G)
In the final couplet, the end words "thee" and "see" rhyme with each other, forming the 'G' rhyme. This couplet provides a summarizing thought or a twist to the sonnet.
This detailed analysis of the rhyme scheme shows how the poet has adhered to the traditional structure of the Shakespearean sonnet, using the rhyme to enhance the rhythm and flow of the poem, and to emphasize key ideas and emotions.
Additional Aspects of Analysis
While we've covered the general theme, structure, and rhyme scheme of Sonnet 79 by Francisco Luis Arroyave Tabares, there are still several aspects that can be further analyzed:
-
Imagery: The sonnet is rich in imagery that enhances its emotional depth. For instance, the "new roads" in the first quatrain can be seen as a metaphor for the beloved's exploration of new relationships, while the "rumors of talent" in the second quatrain could symbolize the whispers of the beloved's infidelity or unkindness. The "crowns" in the third quatrain could represent other potential lovers or opportunities, and the "travel far" in the final couplet suggests the speaker's long and arduous emotional journey.
-
Tone: The tone of the sonnet is one of melancholy and introspection. The speaker seems to be wrestling with his feelings of love and loyalty, even in the face of potential betrayal. This tone is consistent throughout the sonnet, creating a poignant and emotionally resonant reading experience.
-
Meter: Like most traditional sonnets, Sonnet 79 is written in iambic pentameter, which means each line consists of five pairs of unstressed and stressed syllables. This gives the sonnet a rhythmic quality that enhances its musicality and emotional impact.
-
Volta: In a traditional sonnet, there's usually a volta, or turn, where the poem's argument takes a new direction. In Sonnet 79, the volta can be seen in the final couplet, where the speaker reflects on his journey to find the beloved and the allure of the beloved's charms. This shift in focus from questioning and introspection to reflection provides a poignant conclusion to the sonnet.
-
Language and Diction: The sonnet uses formal and somewhat archaic language, including words like "thee" and "thou," which adds to its traditional feel. The diction is carefully chosen to convey the speaker's deep emotions and to fit the sonnet's rhyme and meter.
-
Symbolism: The sonnet uses symbols to convey deeper meanings. For instance, the "thorns for roses" could symbolize the pain hidden beneath the beauty of love, while the "crowns" could represent the rewards of overcoming challenges or the allure of new opportunities.
By analyzing these aspects, we can gain a deeper understanding of Sonnet 79 and appreciate the skill and artistry of Francisco Luis Arroyave Tabares.
(GPT4)
Count the syllables of each line of the poem
(www.howmanysyllables.com)
``` Was It My Worship?
10 Did loving thee all the way to worship 10 Open new roads to thy inconstant way? 10 Or did my loyalty to your courtship 10 Send thee astray looking for some more play?
10 I am deaf to those rumors of talent 10 That speak of thorns for roses to be good 10 And anger in my heart remains silent 10 For my manners never learnt to be rude.
10 I find a lure in crowns that seem harder 10 When between many I have to decide 10 As the thought of having to go further 10 Does make my goals look safer inside.
10 But, did not I travel far to find thee 9 When thy best charms thou lit for me to see?
*** ```
poetry #sonnet #art #poems #poem #nostr #nostrart #artist #artnotai #artonnostr #artstr #zapathon #literature #books #original #poet #poets #author #grownostr #poetstr #iambicpentameter #pleb #plebchain #lovestr #love
Sonnets For The Twenty First Century And A Circadian Musical Written By Francisco Luis Arroyave Tabares (1984-1987)
Analyzed by GPT4 and www.howmanysyllables.com Image by leonardo.ai
-
@ 46205202:5f2056a6
2023-07-27 16:08:51 -
@ a012dc82:6458a70d
2023-07-27 15:29:13Table Of Content
*Whales and Sharks: The Big Players in the Crypto Ocean
*June's Close: A Bullish Signal
*Data-Driven Predictions: The Role of Crypto Intelligence
*Whale Holdings: Keeping the Selling Pressure at Bay
*Historical Trends: July as a Profitable Month
*Conclusion
*FAQ
The cryptocurrency market is a dynamic and rapidly evolving space, with Bitcoin (BTC) at its forefront. One of the key factors influencing the market's trajectory is the activity of large-scale investors, often referred to as 'whales' and 'sharks.' These entities hold substantial volumes of digital assets, and their investment decisions can significantly sway market trends. Recently, these influential players have been doubling down on their Bitcoin investments, particularly as June 2023 drew to a close with BTC valued at an impressive $30,469. This article aims to explore this trend in detail, examining the potential implications for Bitcoin's future and the broader cryptocurrency market.
Whales and Sharks: The Big Players in the Crypto Ocean
In the vast and diverse ocean of cryptocurrencies, whales and sharks are the entities that hold large volumes of digital assets. Their actions, whether buying or selling, often have a substantial impact on the market, influencing price trends and investor sentiment. Over the past seven weeks, these large wallet investors have shown a strong appetite for Bitcoin, accumulating an impressive 154,500 BTC. The pace of this accumulation has notably picked up in the last two weeks. These investors have been capitalizing on market dips to increase their holdings, a strategy often referred to as 'buying the dip.' This trend suggests a strong confidence in Bitcoin's potential and could have significant implications for its future price trajectory.
June's Close: A Bullish Signal
June 2023 proved to be a significant month for Bitcoin, with the cryptocurrency closing at $30,469. This figure represents the highest monthly close for Bitcoin in the past thirteen months, a noteworthy milestone given the asset's volatility. This bullish signal has sparked optimism among investors and analysts alike, fueling a thesis for a potential recovery and upward trend for Bitcoin in the coming months. If this prediction holds true, it could mark a turning point for Bitcoin, potentially leading to increased investor interest and further price appreciation.
Data-Driven Predictions: The Role of Crypto Intelligence
In the complex and often opaque world of cryptocurrencies, crypto intelligence platforms like Santiment play a crucial role. These platforms track and analyze market trends, providing valuable insights into the behavior of large-scale investors and the overall market dynamics. According to Santiment's data, Bitcoin's whale and shark addresses accumulated a staggering 154,500 BTC within a seven-week period between April 2023 and the time of writing. The acceleration of Bitcoin accumulation in the past two weeks suggests a strong confidence in the asset's potential for recovery. This data-driven insight provides a valuable perspective on the market sentiment and could be a key indicator of Bitcoin's future performance.
Whale Holdings: Keeping the Selling Pressure at Bay
One of the intriguing aspects of the Bitcoin market is the concentration of holdings among whales. Bitcoin whale wallets, those holding between 10 and 10,000 tokens, now control 67% of the total supply of the asset. This concentration of holdings can be seen as a positive sign for Bitcoin. By holding onto a significant portion of the supply, whales reduce the selling pressure on the asset. This can create a more stable environment for price growth, as it reduces the likelihood of sudden price drops due to large-scale sell-offs. This dynamic could increase the potential for a recovery in Bitcoin's price and contribute to its long-term stability.
Historical Trends: July as a Profitable Month
Historical trends can often provide valuable insights into potential future market trends. For Bitcoin, the month of July has consistently proven to be profitable for holders over the last three years. This trend, coupled with the recent surge in whale accumulation, suggests that Bitcoin's price may recover from recent market fluctuations. These include the impact of the SEC's crackdown on crypto exchanges and increased regulatory scrutiny. If this trend continues, July could once again prove to be a profitable month for Bitcoin investors, potentially marking the start of a new upward trend.
Conclusion
The recent actions of Bitcoin whales and sharks, coupled with historical trends and market data, paint a promising picture for Bitcoin's future. The significant accumulation of BTC, the highest monthly close in over a year, and the potential for a profitable July all point towards a positive outlook for the asset. However, as with all investments, these trends should not be taken as definitive predictions. Market dynamics are subject to change, and investors should always conduct thorough research and consider various factors before making investment decisions. The world of cryptocurrencies is as exciting as it is unpredictable, and the actions of Bitcoin whales and sharks will continue to be a critical aspect to watch in the unfolding narrative of this digital asset.
FAQ
Who are Bitcoin whales and sharks? Bitcoin whales and sharks are large-scale investors who hold substantial volumes of Bitcoin. Their investment activities can significantly influence market trends.
What has been the recent trend among Bitcoin whales and sharks? Over the past seven weeks, Bitcoin whales and sharks have doubled down on their investments, accumulating 154,500 BTC, especially as June ended with BTC valued at $30,469.
What does June's closing value signify for Bitcoin? June 2023 closed with Bitcoin valued at $30,469, the highest monthly close in the past thirteen months. This has sparked optimism for a potential recovery and upward trend for Bitcoin.
What percentage of Bitcoin's total supply do whale wallets control? Bitcoin whale wallets, those holding between 10 and 10,000 tokens, now control 67% of the total supply of the asset.
That's all for today, see ya tomorrow
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Twitter: @croxroadnews
Instagram: @croxroadnews.co
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
@ e6ce6154:275e3444
2023-07-27 14:12:49Este artigo foi censurado pelo estado e fomos obrigados a deletá-lo após ameaça de homens armados virem nos visitar e agredir nossa vida e propriedade.
Isto é mais uma prova que os autoproclamados antirracistas são piores que os racistas.
https://rothbardbrasil.com/pelo-direito-de-ser-racista-fascista-machista-e-homofobico
Segue artigo na íntegra. 👇
Sem dúvida, a escalada autoritária do totalitarismo cultural progressista nos últimos anos tem sido sumariamente deletéria e prejudicial para a liberdade de expressão. Como seria de se esperar, a cada dia que passa o autoritarismo progressista continua a se expandir de maneira irrefreável, prejudicando a liberdade dos indivíduos de formas cada vez mais deploráveis e contundentes.
Com a ascensão da tirania politicamente correta e sua invasão a todos os terrenos culturais, o autoritarismo progressista foi se alastrando e consolidando sua hegemonia em determinados segmentos. Com a eventual eclosão e a expansão da opressiva e despótica cultura do cancelamento — uma progênie inevitável do totalitarismo progressista —, todas as pessoas que manifestam opiniões, crenças ou posicionamentos que não estão alinhados com as pautas universitárias da moda tornam-se um alvo.
Há algumas semanas, vimos a enorme repercussão causada pelo caso envolvendo o jogador profissional de vôlei Maurício Sousa, que foi cancelado pelo simples fato de ter emitido sua opinião pessoal sobre um personagem de história em quadrinhos, Jon Kent, o novo Superman, que é bissexual. Maurício Sousa reprovou a conduta sexual do personagem, o que é um direito pessoal inalienável que ele tem. Ele não é obrigado a gostar ou aprovar a bissexualidade. Como qualquer pessoa, ele tem o direito pleno de criticar tudo aquilo que ele não gosta. No entanto, pelo simples fato de emitir a sua opinião pessoal, Maurício Sousa foi acusado de homofobia e teve seu contrato rescindido, sendo desligado do Minas Tênis Clube.
Lamentavelmente, Maurício Sousa não foi o primeiro e nem será o último indivíduo a sofrer com a opressiva e autoritária cultura do cancelamento. Como uma tirania cultural que está em plena ascensão e usufrui de um amplo apoio do establishment, essa nova forma de totalitarismo cultural colorido e festivo está se impondo de formas e maneiras bastante contundentes em praticamente todas as esferas da sociedade contemporânea. Sua intenção é relegar ao ostracismo todos aqueles que não se curvam ao totalitarismo progressista, criminalizando opiniões e crenças que divergem do culto à libertinagem hedonista pós-moderna. Oculto por trás de todo esse ativismo autoritário, o que temos de fato é uma profunda hostilidade por padrões morais tradicionalistas, cristãos e conservadores.
No entanto, é fundamental entendermos uma questão imperativa, que explica em partes o conflito aqui criado — todos os progressistas contemporâneos são crias oriundas do direito positivo. Por essa razão, eles jamais entenderão de forma pragmática e objetiva conceitos como criminalidade, direitos de propriedade, agressão e liberdade de expressão pela perspectiva do jusnaturalismo, que é manifestamente o direito em seu estado mais puro, correto, ético e equilibrado.
Pela ótica jusnaturalista, uma opinião é uma opinião. Ponto final. E absolutamente ninguém deve ser preso, cancelado, sabotado ou boicotado por expressar uma opinião particular sobre qualquer assunto. Palavras não agridem ninguém, portanto jamais poderiam ser consideradas um crime em si. Apenas deveriam ser tipificados como crimes agressões de caráter objetivo, como roubo, sequestro, fraude, extorsão, estupro e infrações similares, que representam uma ameaça direta à integridade física da vítima, ou que busquem subtrair alguma posse empregando a violência.
Infelizmente, a geração floquinho de neve — terrivelmente histérica, egocêntrica e sensível — fica profundamente ofendida e consternada sempre que alguém defende posicionamentos contrários à religião progressista. Por essa razão, os guerreiros da justiça social sinceramente acreditam que o papai-estado deve censurar todas as opiniões que eles não gostam de ouvir, assim como deve também criar leis para encarcerar todos aqueles que falam ou escrevem coisas que desagradam a militância.
Como a geração floquinho de neve foi criada para acreditar que todas as suas vontades pessoais e disposições ideológicas devem ser sumariamente atendidas pelo papai-estado, eles embarcaram em uma cruzada moral que pretende erradicar todas as coisas que são ofensivas à ideologia progressista; só assim eles poderão deflagrar na Terra o seu tão sonhado paraíso hedonista e igualitário, de inimaginável esplendor e felicidade.
Em virtude do seu comportamento intrinsecamente despótico, autoritário e egocêntrico, acaba sendo inevitável que militantes progressistas problematizem tudo aquilo que os desagrada.
Como são criaturas inúteis destituídas de ocupação real e verdadeiro sentido na vida, sendo oprimidas unicamente na sua própria imaginação, militantes progressistas precisam constantemente inventar novos vilões para serem combatidos.
Partindo dessa perspectiva, é natural para a militância que absolutamente tudo que exista no mundo e que não se enquadra com as regras autoritárias e restritivas da religião progressista seja encarado como um problema. Para a geração floquinho de neve, o capitalismo é um problema. O fascismo é um problema. A iniciativa privada é um problema. O homem branco, tradicionalista, conservador e heterossexual é um problema. A desigualdade é um problema. A liberdade é um problema. Monteiro Lobato é um problema (sim, até mesmo o renomado ícone da literatura brasileira, autor — entre outros títulos — de Urupês, foi vítima da cultura do cancelamento, acusado de ser racista e eugenista).
Para a esquerda, praticamente tudo é um problema. Na mentalidade da militância progressista, tudo é motivo para reclamação. Foi em função desse comportamento histérico, histriônico e infantil que o famoso pensador conservador-libertário americano P. J. O’Rourke afirmou que “o esquerdismo é uma filosofia de pirralhos chorões”. O que é uma verdade absoluta e irrefutável em todos os sentidos.
De fato, todas as filosofias de esquerda de forma geral são idealizações utópicas e infantis de um mundo perfeito. Enquanto o mundo não se transformar naquela colorida e vibrante utopia que é apresentada pela cartilha socialista padrão, militantes continuarão a reclamar contra tudo o que existe no mundo de forma agressiva, visceral e beligerante. Evidentemente, eles não vão fazer absolutamente nada de positivo ou construtivo para que o mundo se transforme no gracioso paraíso que eles tanto desejam ver consolidado, mas eles continuarão a berrar e vociferar muito em sua busca incessante pela utopia, marcando presença em passeatas inúteis ou combatendo o fascismo imaginário nas redes sociais.
Sem dúvida, estamos muito perto de ver leis absurdas e estúpidas sendo implementadas, para agradar a militância da terra colorida do assistencialismo eterno onde nada é escasso e tudo cai do céu. Em breve, você não poderá usar calças pretas, pois elas serão consideradas peças de vestuário excessivamente heterossexuais. Apenas calças amarelas ou coloridas serão permitidas. Você também terá que tingir de cor-de-rosa uma mecha do seu cabelo; pois preservar o seu cabelo na sua cor natural é heteronormativo demais da sua parte, sendo portanto um componente demasiadamente opressor da sociedade.
Você também não poderá ver filmes de guerra ou de ação, apenas comédias românticas, pois certos gêneros de filmes exaltam a violência do patriarcado e isso impede o mundo de se tornar uma graciosa festa colorida de fraternidades universitárias ungidas por pôneis resplandecentes, hedonismo infinito, vadiagem universitária e autogratificação psicodélica, que certamente são elementos indispensáveis para se produzir o paraíso na Terra.
Sabemos perfeitamente, no entanto, que dentre as atitudes “opressivas” que a militância progressista mais se empenha em combater, estão o racismo, o fascismo, o machismo e a homofobia. No entanto, é fundamental entender que ser racista, fascista, machista ou homofóbico não são crimes em si. Na prática, todos esses elementos são apenas traços de personalidade; e eles não podem ser pura e simplesmente criminalizados porque ideólogos e militantes progressistas iluminados não gostam deles.
Tanto pela ética quanto pela ótica jusnaturalista, é facilmente compreensível entender que esses traços de personalidade não podem ser criminalizados ou proibidos simplesmente porque integrantes de uma ideologia não tem nenhuma apreciação ou simpatia por eles. Da mesma forma, nenhum desses traços de personalidade representa em si um perigo para a sociedade, pelo simples fato de existir. Por incrível que pareça, até mesmo o machismo, o racismo, o fascismo e a homofobia merecem a devida apologia.
Mas vamos analisar cada um desses tópicos separadamente para entender isso melhor.
Racismo
Quando falamos no Japão, normalmente não fazemos nenhuma associação da sociedade japonesa com o racismo. No entanto, é incontestável o fato de que a sociedade japonesa pode ser considerada uma das sociedades mais racistas do mundo. E a verdade é que não há absolutamente nada de errado com isso.
Aproximadamente 97% da população do Japão é nativa; apenas 3% do componente populacional é constituído por estrangeiros (a população do Japão é estimada em aproximadamente 126 milhões de habitantes). Isso faz a sociedade japonesa ser uma das mais homogêneas do mundo. As autoridades japonesas reconhecidamente dificultam processos de seleção e aplicação a estrangeiros que desejam se tornar residentes. E a maioria dos japoneses aprova essa decisão.
Diversos estabelecimentos comerciais como hotéis, bares e restaurantes por todo o país tem placas na entrada que dizem “somente para japoneses” e a maioria destes estabelecimentos se recusa ostensivamente a atender ou aceitar clientes estrangeiros, não importa quão ricos ou abastados sejam.
Na Terra do Sol Nascente, a hostilidade e a desconfiança natural para com estrangeiros é tão grande que até mesmo indivíduos que nascem em algum outro país, mas são filhos de pais japoneses, não são considerados cidadãos plenamente japoneses.
Se estes indivíduos decidem sair do seu país de origem para se estabelecer no Japão — mesmo tendo descendência nipônica legítima e inquestionável —, eles enfrentarão uma discriminação social considerável, especialmente se não dominarem o idioma japonês de forma impecável. Esse fato mostra que a discriminação é uma parte tão indissociável quanto elementar da sociedade japonesa, e ela está tão profundamente arraigada à cultura nipônica que é praticamente impossível alterá-la ou atenuá-la por qualquer motivo.
A verdade é que — quando falamos de um país como o Japão — nem todos os discursos politicamente corretos do mundo, nem a histeria progressista ocidental mais inflamada poderão algum dia modificar, extirpar ou sequer atenuar o componente racista da cultura nipônica. E isso é consequência de uma questão tão simples quanto primordial: discriminar faz parte da natureza humana, sendo tanto um direito individual quanto um elemento cultural inerente à muitas nações do mundo. Os japoneses não tem problema algum em admitir ou institucionalizar o seu preconceito, justamente pelo fato de que a ideologia politicamente correta não tem no oriente a força e a presença que tem no ocidente.
E é fundamental enfatizar que, sendo de natureza pacífica — ou seja, não violando nem agredindo terceiros —, a discriminação é um recurso natural dos seres humanos, que está diretamente associada a questões como familiaridade e segurança.
Absolutamente ninguém deve ser forçado a apreciar ou integrar-se a raças, etnias, pessoas ou tribos que não lhe transmitem sentimentos de segurança ou familiaridade. Integração forçada é o verdadeiro crime, e isso diversos países europeus — principalmente os escandinavos (países que lideram o ranking de submissão à ideologia politicamente correta) — aprenderam da pior forma possível.
A integração forçada com imigrantes islâmicos resultou em ondas de assassinato, estupro e violência inimagináveis para diversos países europeus, até então civilizados, que a imprensa ocidental politicamente correta e a militância progressista estão permanentemente tentando esconder, porque não desejam que o ocidente descubra como a agenda “humanitária” de integração forçada dos povos muçulmanos em países do Velho Mundo resultou em algumas das piores chacinas e tragédias na história recente da Europa.
Ou seja, ao discriminarem estrangeiros, os japoneses estão apenas se protegendo e lutando para preservar sua nação como um ambiente cultural, étnico e social que lhe é seguro e familiar, assim se opondo a mudanças bruscas, indesejadas e antinaturais, que poderiam comprometer a estabilidade social do país.
A discriminação — sendo de natureza pacífica —, é benévola, salutar e indubitavelmente ajuda a manter a estabilidade social da comunidade. Toda e qualquer forma de integração forçada deve ser repudiada com veemência, pois, mais cedo ou mais tarde, ela irá subverter a ordem social vigente, e sempre será acompanhada de deploráveis e dramáticos resultados.
Para citar novamente os países escandinavos, a Suécia é um excelente exemplo do que não fazer. Tendo seguido o caminho contrário ao da discriminação racional praticada pela sociedade japonesa, atualmente a sociedade sueca — além de afundar de forma consistente na lama da libertinagem, da decadência e da deterioração progressista — sofre em demasia com os imigrantes muçulmanos, que foram deixados praticamente livres para matar, saquear, esquartejar e estuprar quem eles quiserem. Hoje, eles são praticamente intocáveis, visto que denunciá-los, desmoralizá-los ou acusá-los de qualquer crime é uma atitude politicamente incorreta e altamente reprovada pelo establishment progressista. A elite socialista sueca jamais se atreve a acusá-los de qualquer crime, pois temem ser classificados como xenófobos e intolerantes. Ou seja, a desgraça da Europa, sobretudo dos países escandinavos, foi não ter oferecido nenhuma resistência à ideologia progressista politicamente correta. Hoje, eles são totalmente submissos a ela.
O exemplo do Japão mostra, portanto — para além de qualquer dúvida —, a importância ética e prática da discriminação, que é perfeitamente aceitável e natural, sendo uma tendência inerente aos seres humanos, e portanto intrínseca a determinados comportamentos, sociedades e culturas.
Indo ainda mais longe nessa questão, devemos entender que na verdade todos nós discriminamos, e não existe absolutamente nada de errado nisso. Discriminar pessoas faz parte da natureza humana e quem se recusa a admitir esse fato é um hipócrita. Mulheres discriminam homens na hora de selecionar um parceiro; elas avaliam diversos quesitos, como altura, aparência, status social, condição financeira e carisma. E dentre suas opções, elas sempre escolherão o homem mais atraente, másculo e viril, em detrimento de todos os baixinhos, calvos, carentes, frágeis e inibidos que possam estar disponíveis. Da mesma forma, homens sempre terão preferência por mulheres jovens, atraentes e delicadas, em detrimento de todas as feministas de meia-idade, acima do peso, de cabelo pintado, que são mães solteiras e militantes socialistas. A própria militância progressista discrimina pessoas de forma virulenta e intransigente, como fica evidente no tratamento que dispensam a mulheres bolsonaristas e a negros de direita.
A verdade é que — não importa o nível de histeria da militância progressista — a discriminação é inerente à condição humana e um direito natural inalienável de todos. É parte indissociável da natureza humana e qualquer pessoa pode e deve exercer esse direito sempre que desejar. Não existe absolutamente nada de errado em discriminar pessoas. O problema real é a ideologia progressista e o autoritarismo politicamente correto, movimentos tirânicos que não respeitam o direito das pessoas de discriminar.
Fascismo
Quando falamos de fascismo, precisamos entender que, para a esquerda política, o fascismo é compreendido como um conceito completamente divorciado do seu significado original. Para um militante de esquerda, fascista é todo aquele que defende posicionamentos contrários ao progressismo, não se referindo necessariamente a um fascista clássico.
Mas, seja como for, é necessário entender que — como qualquer ideologia política — até mesmo o fascismo clássico tem o direito de existir e ocupar o seu devido lugar; portanto, fascistas não devem ser arbitrariamente censurados, apesar de defenderem conceitos que representam uma completa antítese de tudo aquilo que é valioso para os entusiastas da liberdade.
Em um país como o Brasil, onde socialistas e comunistas tem total liberdade para se expressar, defender suas ideologias e até mesmo formar partidos políticos, não faz absolutamente o menor sentido que fascistas — e até mesmo nazistas assumidos — sofram qualquer tipo de discriminação. Embora socialistas e comunistas se sintam moralmente superiores aos fascistas (ou a qualquer outra filosofia política ou escola de pensamento), sabemos perfeitamente que o seu senso de superioridade é fruto de uma pueril romantização universitária da sua própria ideologia. A história mostra efetivamente que o socialismo clássico e o comunismo causaram muito mais destruição do que o fascismo.
Portanto, se socialistas e comunistas tem total liberdade para se expressar, não existe a menor razão para que fascistas não usufruam dessa mesma liberdade.
É claro, nesse ponto, seremos invariavelmente confrontados por um oportuno dilema — o famoso paradoxo da intolerância, de Karl Popper. Até que ponto uma sociedade livre e tolerante deve tolerar a intolerância (inerente a ideologias totalitárias)?
As leis de propriedade privada resolveriam isso em uma sociedade livre. O mais importante a levarmos em consideração no atual contexto, no entanto — ao defender ou criticar uma determinada ideologia, filosofia ou escola de pensamento —, é entender que, seja ela qual for, ela tem o direito de existir. E todas as pessoas que a defendem tem o direito de defendê-la, da mesma maneira que todos os seus detratores tem o direito de criticá-la.
Essa é uma forte razão para jamais apoiarmos a censura. Muito pelo contrário, devemos repudiar com veemência e intransigência toda e qualquer forma de censura, especialmente a estatal.
Existem duas fortes razões para isso:
A primeira delas é a volatilidade da censura (especialmente a estatal). A censura oficial do governo, depois que é implementada, torna-se absolutamente incontrolável. Hoje, ela pode estar apontada para um grupo de pessoas cujas ideias divergem das suas. Mas amanhã, ela pode estar apontada justamente para as ideias que você defende. É fundamental, portanto, compreendermos que a censura estatal é incontrolável. Sob qualquer ponto de vista, é muito mais vantajoso que exista uma vasta pluralidade de ideias conflitantes na sociedade competindo entre si, do que o estado decidir que ideias podem ser difundidas ou não.
Além do mais, libertários e anarcocapitalistas não podem nunca esperar qualquer tipo de simpatia por parte das autoridades governamentais. Para o estado, seria infinitamente mais prático e vantajoso criminalizar o libertarianismo e o anarcocapitalismo — sob a alegação de que são filosofias perigosas difundidas por extremistas radicais que ameaçam o estado democrático de direito — do que o fascismo ou qualquer outra ideologia centralizada em governos burocráticos e onipotentes. Portanto, defender a censura, especialmente a estatal, representa sempre um perigo para o próprio indivíduo, que mais cedo ou mais tarde poderá ver a censura oficial do sistema se voltar contra ele.
Outra razão pela qual libertários jamais devem defender a censura, é porque — ao contrário dos estatistas — não é coerente que defensores da liberdade se comportem como se o estado fosse o seu papai e o governo fosse a sua mamãe. Não devemos terceirizar nossas próprias responsabilidades, tampouco devemos nos comportar como adultos infantilizados. Assumimos a responsabilidade de combater todas as ideologias e filosofias que agridem a liberdade e os seres humanos. Não procuramos políticos ou burocratas para executar essa tarefa por nós.
Portanto, se você ver um fascista sendo censurado nas redes sociais ou em qualquer outro lugar, assuma suas dores. Sinta-se compelido a defendê-lo, mostre aos seus detratores que ele tem todo direito de se expressar, como qualquer pessoa. Você não tem obrigação de concordar com ele ou apreciar as ideias que ele defende. Mas silenciar arbitrariamente qualquer pessoa não é uma pauta que honra a liberdade.
Se você não gosta de estado, planejamento central, burocracia, impostos, tarifas, políticas coletivistas, nacionalistas e desenvolvimentistas, mostre com argumentos coesos e convincentes porque a liberdade e o livre mercado são superiores a todos esses conceitos. Mas repudie a censura com intransigência e mordacidade.
Em primeiro lugar, porque você aprecia e defende a liberdade de expressão para todas as pessoas. E em segundo lugar, por entender perfeitamente que — se a censura eventualmente se tornar uma política de estado vigente entre a sociedade — é mais provável que ela atinja primeiro os defensores da liberdade do que os defensores do estado.
Machismo
Muitos elementos do comportamento masculino que hoje são atacados com virulência e considerados machistas pelo movimento progressista são na verdade manifestações naturais intrínsecas ao homem, que nossos avôs cultivaram ao longo de suas vidas sem serem recriminados por isso. Com a ascensão do feminismo, do progressismo e a eventual problematização do sexo masculino, o antagonismo militante dos principais líderes da revolução sexual da contracultura passou a naturalmente condenar todos os atributos genuinamente masculinos, por considerá-los símbolos de opressão e dominação social.
Apesar do Brasil ser uma sociedade liberal ultra-progressista, onde o estado protege mais as mulheres do que as crianças — afinal, a cada semana novas leis são implementadas concedendo inúmeros privilégios e benefícios às mulheres, aos quais elas jamais teriam direito em uma sociedade genuinamente machista e patriarcal —, a esquerda política persiste em tentar difundir a fantasia da opressão masculina e o mito de que vivemos em uma sociedade machista e patriarcal.
Como sempre, a realidade mostra um cenário muito diferente daquilo que é pregado pela militância da terra da fantasia. O Brasil atual não tem absolutamente nada de machista ou patriarcal. No Brasil, mulheres podem votar, podem ocupar posições de poder e autoridade tanto na esfera pública quanto em companhias privadas, podem se candidatar a cargos políticos, podem ser vereadoras, deputadas, governadoras, podem ser proprietárias do próprio negócio, podem se divorciar, podem dirigir, podem comprar armas, podem andar de biquíni nas praias, podem usar saias extremamente curtas, podem ver programas de televisão sobre sexo voltados única e exclusivamente para o público feminino, podem se casar com outras mulheres, podem ser promíscuas, podem consumir bebidas alcoólicas ao ponto da embriaguez, e podem fazer praticamente tudo aquilo que elas desejarem. No Brasil do século XXI, as mulheres são genuinamente livres para fazer as próprias escolhas em praticamente todos os aspectos de suas vidas. O que mostra efetivamente que a tal opressão do patriarcado não existe.
O liberalismo social extremo do qual as mulheres usufruem no Brasil atual — e que poderíamos estender a toda a sociedade contemporânea ocidental — é suficiente para desmantelar completamente a fábula feminista da sociedade patriarcal machista e opressora, que existe única e exclusivamente no mundinho de fantasias ideológicas da esquerda progressista.
Tão importante quanto, é fundamental compreender que nenhum homem é obrigado a levar o feminismo a sério ou considerá-lo um movimento social e político legítimo. Para um homem, ser considerado machista ou até mesmo assumir-se como um não deveria ser um problema. O progressismo e o feminismo — com o seu nefasto hábito de demonizar os homens, bem como todos os elementos inerentes ao comportamento e a cultura masculina — é que são o verdadeiro problema, conforme tentam modificar o homem para transformá-lo em algo que ele não é nem deveria ser: uma criatura dócil, passiva e submissa, que é comandada por ideologias hostis e antinaturais, que não respeitam a hierarquia de uma ordem social milenar e condições inerentes à própria natureza humana. Com o seu hábito de tentar modificar tudo através de leis e decretos, o feminismo e o progressismo mostram efetivamente que o seu real objetivo é criminalizar a masculinidade.
A verdade é que — usufruindo de um nível elevado de liberdades — não existe praticamente nada que a mulher brasileira do século XXI não possa fazer. Adicionalmente, o governo dá as mulheres uma quantidade tão avassaladora de vantagens, privilégios e benefícios, que está ficando cada vez mais difícil para elas encontrarem razões válidas para reclamarem da vida. Se o projeto de lei que pretende fornecer um auxílio mensal de mil e duzentos reais para mães solteiras for aprovado pelo senado, muitas mulheres que tem filhos não precisarão nem mesmo trabalhar para ter sustento. E tantas outras procurarão engravidar, para ter direito a receber uma mesada mensal do governo até o seu filho completar a maioridade.
O que a militância colorida da terra da fantasia convenientemente ignora — pois a realidade nunca corresponde ao seu conto de fadas ideológico — é que o mundo de uma forma geral continua sendo muito mais implacável com os homens do que é com as mulheres. No Brasil, a esmagadora maioria dos suicídios é praticada por homens, a maioria das vítimas de homicídio são homens e de cada quatro moradores de rua, três são homens. Mas é evidente que uma sociedade liberal ultra-progressista não se importa com os homens, pois ela não é influenciada por fatos concretos ou pela realidade. Seu objetivo é simplesmente atender as disposições de uma agenda ideológica, não importa quão divorciadas da realidade elas são.
O nível exacerbado de liberdades sociais e privilégios governamentais dos quais as mulheres brasileiras usufruem é suficiente para destruir a fantasiosa fábula da sociedade machista, opressora e patriarcal. Se as mulheres brasileiras não estão felizes, a culpa definitivamente não é dos homens. Se a vasta profusão de liberdades, privilégios e benefícios da sociedade ocidental não as deixa plenamente saciadas e satisfeitas, elas podem sempre mudar de ares e tentar uma vida mais abnegada e espartana em países como Irã, Paquistão ou Afeganistão. Quem sabe assim elas não se sentirão melhores e mais realizadas?
Homofobia
Quando falamos em homofobia, entramos em uma categoria muito parecida com a do racismo: o direito de discriminação é totalmente válido. Absolutamente ninguém deve ser obrigado a aceitar homossexuais ou considerar o homossexualismo como algo normal. Sendo cristão, não existe nem sequer a mais vaga possibilidade de que algum dia eu venha a aceitar o homossexualismo como algo natural. O homossexualismo se qualifica como um grave desvio de conduta e um pecado contra o Criador.
A Bíblia proíbe terminantemente conduta sexual imoral, o que — além do homossexualismo — inclui adultério, fornicação, incesto e bestialidade, entre outras formas igualmente pérfidas de degradação.
Segue abaixo três passagens bíblicas que proíbem terminantemente a conduta homossexual:
“Não te deitarás com um homem como se deita com uma mulher. Isso é abominável!” (Levítico 18:22 — King James Atualizada)
“Se um homem se deitar com outro homem, como se deita com mulher, ambos terão praticado abominação; certamente serão mortos; o seu sangue estará sobre eles.” (Levítico 20:13 — João Ferreira de Almeida Atualizada)
“O quê! Não sabeis que os injustos não herdarão o reino de Deus? Não sejais desencaminhados. Nem fornicadores, nem idólatras, nem adúlteros, nem homens mantidos para propósitos desnaturais, nem homens que se deitam com homens, nem ladrões, nem gananciosos, nem beberrões, nem injuriadores, nem extorsores herdarão o reino de Deus.” (1 Coríntios 6:9,10 —Tradução do Novo Mundo das Escrituras Sagradas com Referências)
Se você não é religioso, pode simplesmente levar em consideração o argumento do respeito pela ordem natural. A ordem natural é incondicional e incisiva com relação a uma questão: o complemento de tudo o que existe é o seu oposto, não o seu igual. O complemento do dia é a noite, o complemento da luz é a escuridão, o complemento da água, que é líquida, é a terra, que é sólida. E como sabemos o complemento do macho — de sua respectiva espécie — é a fêmea.
Portanto, o complemento do homem, o macho da espécie humana, é naturalmente a mulher, a fêmea da espécie humana. Um homem e uma mulher podem naturalmente se reproduzir, porque são um complemento biológico natural. Por outro lado, um homem e outro homem são incapazes de se reproduzir, assim como uma mulher e outra mulher.
Infelizmente, o mundo atual está longe de aceitar como plenamente estabelecida a ordem natural pelo simples fato dela existir, visto que tentam subvertê-la a qualquer custo, não importa o malabarismo intelectual que tenham que fazer para justificar os seus pontos de vista distorcidos e antinaturais. A libertinagem irrefreável e a imoralidade bestial do mundo contemporâneo pós-moderno não reconhecem nenhum tipo de limite. Quem tenta restabelecer princípios morais salutares é imediatamente considerado um vilão retrógrado e repressivo, sendo ativamente demonizado pela militância do hedonismo, da luxúria e da licenciosidade desenfreada e sem limites.
Definitivamente, fazer a apologia da moralidade, do autocontrole e do autodomínio não faz nenhum sucesso na Sodoma e Gomorra global dos dias atuais. O que faz sucesso é lacração, devassidão, promiscuidade e prazeres carnais vazios. O famoso escritor e filósofo francês Albert Camus expressou uma verdade contundente quando disse: “Uma só frase lhe bastará para definir o homem moderno — fornicava e lia jornais”.
Qualquer indivíduo tem o direito inalienável de discriminar ativamente homossexuais, pelo direito que ele julgar mais pertinente no seu caso. A objeção de consciência para qualquer situação é um direito natural dos indivíduos. Há alguns anos, um caso que aconteceu nos Estados Unidos ganhou enorme repercussão internacional, quando o confeiteiro Jack Phillips se recusou a fazer um bolo de casamento para o “casal” homossexual Dave Mullins e Charlie Craig.
Uma representação dos direitos civis do estado do Colorado abriu um inquérito contra o confeiteiro, alegando que ele deveria ser obrigado a atender todos os clientes, independente da orientação sexual, raça ou crença. Preste atenção nas palavras usadas — ele deveria ser obrigado a atender.
Como se recusou bravamente a ceder, o caso foi parar invariavelmente na Suprema Corte, que decidiu por sete a dois em favor de Jack Phillips, sob a alegação de que obrigar o confeiteiro a atender o “casal” homossexual era uma violação nefasta dos seus princípios religiosos. Felizmente, esse foi um caso em que a liberdade prevaleceu sobre a tirania progressista.
Evidentemente, homossexuais não devem ser agredidos, ofendidos, internados em clínicas contra a sua vontade, nem devem ser constrangidos em suas liberdades pelo fato de serem homossexuais. O que eles precisam entender é que a liberdade é uma via de mão dupla. Eles podem ter liberdade para adotar a conduta que desejarem e fazer o que quiserem (contanto que não agridam ninguém), mas da mesma forma, é fundamental respeitar e preservar a liberdade de terceiros que desejam rejeitá-los pacificamente, pelo motivo que for.
Afinal, ninguém tem a menor obrigação de aceitá-los, atendê-los ou sequer pensar que uma união estável entre duas pessoas do mesmo sexo — incapaz de gerar descendentes, e, portanto, antinatural — deva ser considerado um matrimônio de verdade. Absolutamente nenhuma pessoa, ideia, movimento, crença ou ideologia usufrui de plena unanimidade no mundo. Por que o homossexualismo deveria ter tal privilégio?
Homossexuais não são portadores de uma verdade definitiva, absoluta e indiscutível, que está acima da humanidade. São seres humanos comuns que — na melhor das hipóteses —, levam um estilo de vida que pode ser considerado “alternativo”, e absolutamente ninguém tem a obrigação de considerar esse estilo de vida normal ou aceitável. A única obrigação das pessoas é não interferir, e isso não implica uma obrigação em aceitar.
Discriminar homossexuais (assim como pessoas de qualquer outro grupo, raça, religião, nacionalidade ou etnia) é um direito natural por parte de todos aqueles que desejam exercer esse direito. E isso nem o direito positivo nem a militância progressista poderão algum dia alterar ou subverter. O direito natural e a inclinação inerente dos seres humanos em atender às suas próprias disposições é simplesmente imutável e faz parte do seu conjunto de necessidades.
Conclusão
A militância progressista é absurdamente autoritária, e todas as suas estratégias e disposições ideológicas mostram que ela está em uma guerra permanente contra a ordem natural, contra a liberdade e principalmente contra o homem branco, cristão, conservador e tradicionalista — possivelmente, aquilo que ela mais odeia e despreza.
Nós não podemos, no entanto, ceder ou dar espaço para a agenda progressista, tampouco pensar em considerar como sendo normais todas as pautas abusivas e tirânicas que a militância pretende estabelecer como sendo perfeitamente razoáveis e aceitáveis, quer a sociedade aceite isso ou não. Afinal, conforme formos cedendo, o progressismo tirânico e totalitário tende a ganhar cada vez mais espaço.
Quanto mais espaço o progressismo conquistar, mais corroída será a liberdade e mais impulso ganhará o totalitarismo. Com isso, a cultura do cancelamento vai acabar com carreiras, profissões e com o sustento de muitas pessoas, pelo simples fato de que elas discordam das pautas universitárias da moda.
A história mostra perfeitamente que quanto mais liberdade uma sociedade tem, mais progresso ela atinge. Por outro lado, quanto mais autoritária ela for, mais retrocessos ela sofrerá. O autoritarismo se combate com liberdade, desafiando as pautas de todos aqueles que persistem em implementar a tirania na sociedade. O politicamente correto é o nazismo dos costumes, que pretende subverter a moral através de uma cultura de vigilância policial despótica e autoritária, para que toda a sociedade seja subjugada pela agenda totalitária progressista.
Pois quanto a nós, precisamos continuar travando o bom combate em nome da liberdade. E isso inclui reconhecer que ideologias, hábitos e costumes de que não gostamos tem o direito de existir e até mesmo de serem defendidos.
-
@ 4bda8a0e:f0aaec7e
2023-07-27 08:31:19Benefit of Self-Recording 3: Discovering versatility
Some self-insights can't be deduced through introspection in the armchair. They can only be discovered through observation while acting in the world. One thing you might discover through self-recording is that you are more versatile than you thought.
What may have been holding you back are abstract and context-free descriptions of yourself. We often describe ourselves in terms such as "I am" followed by "messy", "smart", "lazy", "undisciplined" or whatever it may be. Self-recording can expose some of these self-perceptions as inaccurate – or too vague to be true or false.
Any self-perception needs to be backed by concrete observations. Suppose someone wants to be more "assertive". This doesn't specify what to change. Only assertive behaviors can be changed; for example, saying "no" to certain requests. Patience is another example. Patience itself can't be trained. What can be trained is how long someone is willing to wait for a large reward, than a smaller reward in a shorter time. The next step is to note the context in which the behavior of interest occurs (or fails to occur). It's unlikely that you have problems saying "no" everywhere, to everyone, and every time. There are probably specific people, with specific requests, in certain environments, where you struggle with saying "no". Similarly, you may be used to waiting a long time for good things in some situations, but not in others.
Careful attention to concrete examples and context helps you identify things that can be changed. It can also end up making a mockery of any personality test you may have taken. Abstract and context-free self-descriptions are at best over-simplifications. At worst, they are fictions (which some people use to torture themselves on a daily basis).
Merely trying to remember the exact behavior and context is not a good strategy. Memory is selective, deteriorates with time, and can be influenced by our mood. Sometimes we even unconsciously fill in the blanks based on background expectations. When recalling images from a road trip in New Zealand, I've caught myself 'remembering' the car being on the right-hand side of the road. New Zealanders drive on the left-hand side. This false memory is likely due to having grown up with cars driving on the right side. Negative self-conceptions may also rush in to fill the gaps where you don't remember the context that might explain your behavior. For example, procrastination might be explained away as "lack of self-discipline". These fictions deprive you of the opportunity to analyze the incentives and constraints that were present at the time.
-
@ 338aedd4:eca97fff
2023-07-27 08:13:11This is a brief description of structural limitations that are stunting the internet’s music market, as well as what is needed to overcome them. This article explains the motivation behind the proposal for an open protocol for streaming (OPS) described here: https://github.com/ymilkessa/ops0
You are welcome to reach me to share your thoughts: iris.to/yoftinator
The existing music market
The current music market on the internet is what I will call the “platform model.” In this model, the market is composed of streaming platforms, each of which functions like an isolated marketplace.
Each streaming platform does all of the following under one roof.
- Hosting content from artists.
- Making all the business decisions in their marketplace.
This includes setting subscription prices, running advertisements, and negotiating on shares of revenue with artists and record labels. - Generating revenue from users and advertisers.
- Curating content for users, such as running the recommendation algorithms.
- Running the standard client application. These become the primary interface with which users listen to music.
- Serving client APIs. These allow for alternate user interfaces and use cases, but still function similarly to client applications in all other respects.
Limitations
The music market is highly inflexible under the platform model:
- Artists have little say on the price of their work. They can only sit back and wait on how much revenue the streaming platforms have managed to gather, and negotiate on what portion of that goes to them.
- The only business models or experiences available are the ones that the streaming platforms have decided to provide. For instance, I cannot subscribe to a single artist for a lower cost. Neither can I purchase “100 plays of Ed Shareen.” None of the streaming platforms have offered such deals. And the artists have no avenue for making such business models happen.
- If you want to try new business models, you would need to build a whole new streaming platform from scratch and get artists to onboard onto your platform. Hence the cost of building new user experiences is needlessly high.
In short this system is actually holding back artists, users and developers from extracting more utility out of the internet.
Successes
Despite its limitations, the platform model has so far gained dominance for two reasons.
- Streaming platforms have been largely successful with IP protection. Artists are now making money on the internet and not just being ripped off by it.
- The business model employed by these platforms has so far garnered the most revenue that the music industry has ever gained (although it is still unclear how profitable the platforms themselves are, or how sustainable their business would be moving forward).
Explaining the platform model
Digital rights management is at the core of why the industry has gravitated to this model. As it turns out, this is the only feasible arrangement with which these services can protect artists’ IP, which is a crucial part of their business. By controlling both how music is streamed from servers and how it is decrypted on users’ devices, these companies can make it difficult for people to steal music off of their platform. But as a consequence, the same platforms need to handle practically every aspect of their own marketplace.
Note that the web APIs of these platforms do not impact this arrangement since they also have to be equally restrictive. For instance, only premium subscribers of Apple Music or Spotify can be the end users of any application that utilizes the respective API.
The Alternative: An Open Market Model
A much better alternative is one where artists and listeners can transact in whatever terms they choose with no barriers to making their transactions happen.
Here are the requirements that an open market model should satisfy.
- Users are not fragmented across disjoint platforms. Instead, there is a standard protocol for streaming which is not limited to any one platform and which anyone can use to purchase and listen to music.
- New business models and use cases can be built with minimal friction. Developers can simply follow predetermined specifications on how to pay for and access music for their applications.
- It should have an effective mechanism for IP protection. Otherwise, this market would not be viable and would fall apart.
Requirements 1 and 2 are easily solvable by using a decentralized network like Nostr. My OPS proposal is a solution to requirement 3 and would make the open market model possible. Feel free to inspect the protocol: https://github.com/ymilkessa/ops0
-
@ 32dc4f25:f95ddcce
2023-07-27 11:56:04In Nostr, "smart clients and dumb servers" refers to a communication model or architecture where the clients (smart clients) have higher logic capability and autonomy, while the servers (dumb servers) have lower logic capability and passive execution.
Welcome read more of my articles form decentralized long content platform-- yakihonne.com
Smart clients refer to client applications or devices that possess higher intelligence and processing power. They can make autonomous decisions and perform specific tasks, including handling business logic, processing data, communicating, and coordinating interactions with other services. In Nostr, smart clients play an active role, responsible for controlling the communication flow, processing data and protocols, and executing necessary business logic.
Dumb servers, on the other hand, refer to servers with lower intelligence and passive execution capability. They are designed to perform basic data storage and transmission functions without handling complex business logic or decision-making. In Nostr, dumb servers act as passive recipients, receiving and transmitting data based on instructions from smart clients but not participating in active decision-making or coordination.
The concept of smart clients and dumb servers in Nostr aims to achieve a distributed and decentralized communication model. Smart clients take charge of managing the communication flow and business logic, reducing reliance on centralized servers and the risk of single points of failure. At the same time, the passive execution capability of dumb servers makes the system more scalable and flexible, allowing more services and nodes to join the communication network.
In summary, the smart clients and dumb servers model in Nostr provides a flexible, scalable, and decentralized communication architecture by decentralizing decision-making and logic to the clients and restricting servers to basic data storage and transmission functions.
Smart clients and dumb servers are the core idea in microservices
The tech development space is dominated by mantras — sayings that make sense in context but are repeated away from their original source. These expressions may carry meaning for the initiated but are often seen as complicated jargon to others. One such concept is “smart endpoints and dumb pipes.” Accredited to Martin Fowler, the idea is helpful to consider when designing microservices architectures.
The basic premise of “smart endpoints and dumb pipes” is that microservices should carry their own communication logic (the “endpoints”), and the carrier superstructure that transmits these messages (the “pipes”) should have as light a structure as possible. Why is this so? What’s the justification, and what’s the background upon which this conversation on pipes and endpoints exists?
Below, we’ll attempt to clarify what the saying means. We’ll look at where it came from, how it applies to microservice development, and see why it’s a helpful expression for modern software architects to understand.
The Problem of the Monolith
We’ve talked at length about both monoliths and microservices, but it bears significant importance to this discussion, so we will again define them.
Understanding Monolith
The traditional approach to development is often referred to by a singular term — the monolith. Monolithic development adopts a centralized data storage and response. A holdover from the era of mainframes and clients, the basic idea is to create a vertical stack wherein everything is located and guided by a single, all-powerful system. This non-distributed approach meant that everything existed in one body. Software applications were self-contained and non-modular, with requests being handled by a singular entity.
Often, these solutions were purpose-built, with many organizations utilizing a monolith due to their startup phases being singularly focused. This resulted in APIs that were non-modular, specific in intent and purpose to the point of rejecting extensibility and scalability in favor of stability and a functional response.
There are some strengths to this kind of approach. First, it’s often cheaper to engage with at the start. Building something to do one thing — and only one thing — is often more affordable than building a system that allows for many things. In such a monolithic approach, the service is a one-to-one relationship — the server owns the data, how it’s transmitted, and how it’s serviced, making a clear communication pathway.
Unfortunately, this means that monoliths are heavily siloed, lacking a malleable underlying codebase. Alterations or replacements carry an enormous cost in both time and resources. This can result in a sort of code paralysis just due to the sheer weight of the system. It can also result in a high cost to develop, maintain, and run. As a monolith grows larger, it remains constrained to its original design, incurring ever-growing expenses to add new components. This results in late-stage development that carries massive deployment burdens and slower release schedules.
Understanding Microservices
Microservices were designed to solve this problem. In essence, the microservice paradigm represents a sea change from isolated singular monoliths to a collection of smaller, single-purpose services that work in concert. With each service doing a specific thing, the idea is that those services would then work together to facilitate the core function.
This shift from non-distributed to distributed, from centralized to decentralized, delivers significant benefits. First, the system becomes much more scalable. An application can slot in new services or change existing ones without adverse end-user experience changes. Iteration does not freeze new development, as you’re changing a small part of the greater subset. You can compare this to changing clothes — if your entire outfit was all sewn together, as in a monolith, you would be unable to change your jacket or put on a hat without a huge effort. A microservice allows you to, metaphorically speaking, change hats or jackets at will. This is possible because the individual parts are only connected by necessity, not enforcement.
This also means microservices do not carry with them the problem of siloing. With components architected as microservices, the overall system can change, mold itself, and adapt to circumstances without affecting any other part. Business logic can be represented on the node with the closest affinity to its function, rather than being centralized into a singular node of control.
This system does introduce additional complexity, as we’ll cover below, yet the benefits are so substantial that many software architects have adopted it whole-heartedly.
The Solution: Smart or Dumb Pipes?
While microservices fix many of the issues of the monolith, some unique problems arise. Microservices don’t isolate everything into a single vertical silo, which is great — systems can be spread across multiple nodes and instances, creating a lot of variability in resource location. This also, unfortunately, creates some communication complexity. Think about it this way — imagine you are trying to do a group project, but instead of everyone sitting at the same conference table, you are all several miles apart. This would introduce significant communication barriers, even while introducing more extensibility and scalability to your group.
Microservices face this exact problem when it comes to facilitating inter-microservice communication. How do you solve that communication problem? There are really only two options: either you create smart pipes, or you create smart endpoints.
You could solve the microservices communication problem by creating smart pipes, and many implementations have employed this solution. An excellent example of this type, the Enterprise Service Bus, allows for the logic and processing governing communication to be placed in a singular system, a facilitation center, to make communication stable and efficient. However, the problem with doing this is that you’ve created a vertical system of centralization — while the entities doing the work are decentralized, all communication is centralized to this ESB, resulting in a sort of quasi-monolithic approach.
While an ESB is not itself bad — and to put a finer point, not necessarily a monolithic approach — taking it too far can certainly lead to a lot of the same issues incurred with a monolithic strategy.
Smart Endpoints and Dumb Pipes
A great solution is to go the other way. Instead of making your pipes smart, make your endpoints smart! In this system, you’re shifting the paradigm away from the idea of a communications bus and closer towards self-sufficient nodes. In essence, you are taking that business logic, communication logic, and general governance away from the communication node and are instead placing it firmly in the entities doing the talking.
The core idea of “smart endpoints and dumb pipes” is that the microservices, when designed correctly, don’t need a bus to govern this communication. The services themselves can govern the logical breakout of communication without going through an intermediary. If the User Service needs to talk to the Authentication Service, for instance, all the logic for how that works can be held by those entities — including a third entity may increase governance and control, but it may be antithesis to the microservice solution.
Martin Fowler’s coined this concept in his commentary on microservices. In it, he stated as thus:
“The microservice community favours an alternative approach: smart endpoints and dumb pipes. Applications built from microservices aim to be as decoupled and as cohesive as possible – they own their own domain logic and act more as filters in the classical Unix sense – receiving a request, applying logic as appropriate and producing a response. These are choreographed using simple RESTish protocols rather than complex protocols such as WS-Choreography or BPEL or orchestration by a central tool.”
To be clear, this doesn’t mean that no logic is located within the communication systems. The point is where the bulk of that logic resides. It’s one thing to have the “pipes” holding onto basic logic for managing asynchronous communication. Still, it’s a whole secondary thing to have them hold the complete logic for all communication and governance internally. Not only is it highly inefficient, but it may also be ineffective in actually facilitating communication. Lightweight logic systems can, in fact, be useful. Again, from the same commentary from Martin Fowler:
“The second approach in common use is messaging over a lightweight message bus. The infrastructure chosen is typically dumb (dumb as in acts as a message router only) – simple implementations such as RabbitMQ or ZeroMQ don’t do much more than provide a reliable asynchronous fabric – the smarts still live in the endpoints that are producing and consuming messages; in the services.”
This is really a solution that is more concerned with removing blockers than demanding a particular approach. The beauty of microservices lies in the freedom to adapt and change for different circumstances — adopting the concept of “smart endpoints and dumb pipes” simply allows that change and adaptation to be more fluid and independent of the communication controls and protocols more typical of centralized systems.
Conclusion
The best way to think about “smart endpoints and dumb pipes” is to think about where the logic exists. When you create dumb endpoints and smart pipes, you depend on the pipes for everything. You depend on the pipes to know where the data is coming from, where it’s going, and how it should be transmitted. You have centralized all communication power into a system of organization and governance. That’s not necessarily a bad thing in all cases — in secure data situations, you may very well need such a system — but it’s only truly appropriate in a handful of situations.
“Smart endpoints and dumb pipes” is an inversion of this principle. The microservices know what they’re doing, and if that’s true, why should you need to control their communication? If you’ve built out a robust microservice ecosystem, then you should be able to let them communicate over a system that is minimally controlling, with minimal logic built-in for core functions.
What do you think about this concept? Let us know below!
-
@ a4a6b584:1e05b95b
2023-07-27 01:23:03"For it is written, As I live, saith the Lord, every knee shall bow to me, and every tongue shall confess to God. So then every one of us shall give account of himself to God." Romans 14:11-12
Though God has always had a people, the New Testament Church started with Christ and His disciples and was empowered at Pentecost. Historically, there has always been a remnant of people who adhered to the truth of God's Word for their faith and practice. I am convinced that the very same body of truth which was once delivered must be contended for in every generation.
In every generation from Christ and His disciples to this present moment, there have been holy adherents to the truth of God's Word. This witness of history is a witness in their blood. I am a Baptist by conviction. I was not "Baptist-born." I became and remain a Baptist because of what I have discovered in the Word of God.
The Lord Jesus Christ left His church doctrine and ordinances. The ordinances are baptism and the Lord's Supper. These are the things He ordered us to do. They picture His death and remind us of Him and His return. He also left us a body of doctrine. This involves our belief and teaching. Our doctrine distinguishes us. It is all from the Bible.
No one can be forced to become a Baptist. Our records show that baptism was always administered to professing believers. Hence, we refer to baptism as believers' baptism.
Baptists are gospel-preaching people. They preached the gospel to me. The Lord Jesus said to the first-century church, "But ye shall receive power, after that the Holy Ghost is come upon you: and ye shall be witnesses unto me both in Jerusalem, and in all Judea, and in Samaria, and unto the uttermost part of the earth ,, (Acts I :8). I am grateful to God to be a Baptist. I consider this to be New Testament Christianity. It is my joy to serve as the pastor of an independent Baptist church, preaching and teaching God's Word.
A Baptist recognizes the autonomy of the local church. There is no such thing as "The Baptist Church." The only Baptist headquarters that exists is in the local assembly of baptized believers. There are only local Baptist churches. \
When we say that the Bible is our sole authority, we are speaking of all the scriptures, the whole and its parts. We should preach the whole counsel of God. In the Bible we find the gospel-the death, burial, and resurrection of Jesus Christ. We should proclaim the gospel because Jesus Christ said that we are to take the gospel message to every creature. When we open the sixty-six books of the Bible, we find more than the gospel. Of course, that scarlet thread of redemption runs through all the Bible, but the whole counsel of God must be proclaimed.
The Bible says in Romans 14:11-12, ''For it is written, As I live, saith the Lord, every knee shall bow to me, and every tongue shall confess to God. So then every one of us shall give account of himself to God. " Each human being must answer personally to God.
In our nation we hear people talk about religious tolerance. Religious tolerance is something created by government. It is a "gift" from government. Religious tolerance is something man has made. Soul liberty is something God established when He created us. We find a clear teaching of this in His Word. Soul liberty is a gift from God! God's Word says in Galatians 5:1, "Stand fast therefore in the liberty wherewith Christ hath made us free, and be not entangled again with the yoke of bondage."
Soul liberty does not rest upon the legal documents of our nation-it is rooted in the Word of God. This individual freedom of the soul is inherent in man's nature as God created him. Man is responsible for his choices, but he is free to choose. This conviction is at the core of Baptist beliefs.
This powerful declaration about our Baptist position was made by J.D. Freeman in 1905:
Our demand has been not simply for religious toleration, but religious liberty; not sufferance merely, but freedom; and that not for ourselves alone, but for all men. We did not stumble upon this doctrine. It inheres in the very essence of our belief. Christ is Lord of all.. .. The conscience is the servant only of God, and is not subject to the will of man. This truth has indestructible life. Crucify it and the third day it will rise again. Bury it in the sepulcher and the stone will be rolled away, while the keepers become as dead men .... Steadfastly refusing to bend our necks under the yoke of bondage, we have scrupulously withheld our hands from imposing that yoke upon others .... Of martyr blood our hands are clean. We have never invoked the sword of temporal power to aid the sword of the Spirit. We have never passed an ordinance inflicting a civic disability on any man because of his religious views, be he Protestant or Papist, Jew, or Turk, or infidel. In this regard there is no blot on our escutcheon (family crest).
Remember that, when we are talking about individual soul liberty and the relationship of the church and the state, in America the Constitution does not place the church over the state or the state over the church. Most importantly, Scripture places them side by side, each operating independently of the other. This means there is freedom in the church and freedom in the state. Each is sovereign within the sphere of the authority God has given to each of them (Matthew 22:21).
Read carefully this statement made by Charles Spurgeon, the famous English preacher, concerning Baptist people:
We believe that the Baptists are the original Christians. We did not commence our existence at the Reformation, we were reformers before Luther or Calvin were born; we never came from the Church of Rome, for we were never in it, but we have an unbroken line up to the apostles themselves. We have always existed from the very days of Christ, and our principles, sometimes veiled and forgotten, like a river which may travel underground for a little season, have always had honest and holy adherents. Persecuted alike by Romanists and Protestants of almost every sect, yet there has never existed a government holding Baptist principles which persecuted others; nor, I believe, any body of Baptists ever held it to be right to put the consciences of others under the control of man. We have ever been ready to suffer, as our martyrologies will prove, but we are not ready to accept any help from the State, to prostitute the purity of the Bride of Christ to any alliance with overnment, and we wil never make the Church, although the Queen, the despot over the consciences of men.
The New Park Street Pulpit, Volume VII · Page 225
This a marvelous statement about Baptist beliefs. I am rather troubled when I see so many people who claim to be Baptists who do not understand why they are Baptists. We should be able to defend our position and do it biblically. lf we are people who know and love the Lord and His Word and if the Bible is our sole authority for faith and practice, then we have no reason to be ashamed of the position we take. May God not only help us to take this position, but to take it with holy boldness and cotnpassion. May He help us to be able to take His Word in hand and heart and defend what we believe to a lost and dying world.
So much of what we have to enjoy in our country can be credited to Baptist people. Any honest student of American history will agree that the Virginia Baptists were almost solely responsible for the First Amendment being added to our Constitution providing the freedom to worship God as our conscience dictates.
We have a country that has been so influenced that we do not believe it is right to exercise any control or coercion of any kind over the souls of men. Where did this conviction come from? We find it in the Bible, but someone imparted it to the Founding Fathers. It became the law of the land, and it should remain the law of the land. We need to understand it. It comes out of the clear teaching of God's Word concerning the subject of soul liberty.
There are many historic places there where people were martyred for their faith, giving their lives for what they believed. The religious persecution came as a result of the laws of the land. Although many Baptists have been martyred, you will never find Baptist people persecuting anyone anywhere for his faith, no matter what his faith may be.
There are many denominations that teach the Scriptures are the infallible Word of God, God is the creator of heaven and earth, man is a fallen creature and must be redeemed by the blood of Christ, salvation is the free offer of eternal Iife to those who receive it and eternal helI awaits those who reject it, the Lord's Day is a day of worship, and the only time for man to be made right with God is in this lifetime. There are certainly other commonly held teachings, but there are certain Baptist distinctive. Often an acrostic using the word BAPTISTS is used to represent these Baptist distinctive.
-
B is for biblical authority. The Bible is the sole authority for our faith and practice.
-
A for the autonomy of the local church. Every church we find in the New Testament was a self-governing church with only Christ as the head.
-
P represents the priesthood of believers and the access we have to God through Jesus Christ.
-
T for the two church officers-pastors and deacons. We find these officers in the New Testament.
-
I for individual soul liberty. Most people, when asked, say that the sole authority of the Scripture in our faith and practice is the single, most important distinctive of our faith. However, if we did not have individual soul liberty, we could not come to the convictions we have on all other matters.
-
S for a saved church membership.
Personal Accountability to God
Renowned Baptist leader, Dr. E.Y. Mullins, summarized our Baptist position in these words. He wrote:
The biblical significance of the Baptist is the right of private interpretation of and obedience to the Scriptures. The significance of the Baptist in relation to the individual is soul freedom. The ecclesiastical significance of the Baptist is a regenerated church membership and the equality and priesthood of believers. The political significance of the Baptist is the separation of church and state. But as comprehending all the above particulars, as a great and aggressive force in Christian history, as distinguished from all others and standing entirely alone, the doctrine of the soul's competency in religion under God is the distinctive significance of the Baptists.
We find this accountability in the opening verses of God's Word. When God created man, He created man capable of giving a personal account of himself to God. God did not create puppets; He created people. He gave man the right to choose. That is why we find the man Adam choosing to sin and to disobey God in Genesis chapter three. Of his own volition he chose to sin and disobey God. Genesis I :27 says, "So God created man in his own image, in the image of God created he him; male and female created he them. " We were made in God's image, and when God made us in His image, He made us with the ability to choose.
It is not right to try to force one's religion or belief upon another individual. This does not mean, however, that he can be a Christian by believing anything he wishes to believe, because Jesus Christ said that there is only one way to heaven. He said in John 14:6, "I am the way, the truth, and the life: no man cometh unto the Father, but by me." He is the only way to God. The only way of salvation is the Lord Jesus Christ.
In this age of tolerance, people say that nothing is really wrong. The same people who say that any way of believing is right will not accept the truth that one belief can be the only way that is right. You may believe anything you choose, but God has declared that there is only one way to Him and that is through His Son, Jesus Christ. He is the only way of salvation- that is why He suffered and died for our sins. The only way to know God is through His Son, the Lord Jesus Christ.
Someone is certain to ask, "Who are you to declare that everyone else's religion is wrong?" We are saying that everyone ~as ~ right to choose his own way, but God has clearly taught us in His Word that there is only one way to Him. The Lord Jesus says in John 10:9, "I am the door: by me if any man enter in, he shall be saved, and shall go in and out, and find pasture."
No human being is going to live on this earth without being sinned against by others. Many children are sinned against greatly by their own parents. However, we cannot go through life blaming others for the person we are, because God has made us in such a way that we have an individual accountability to God. This comes out of our soul liberty and our right to choose and respond to things in a way that God would have us espond to them. God has made us in His image. Again, He did not make us puppets or robots; He made us people, created in His image with the ability to choose our own way.
Remember, "For it is written, As I live, saith the Lord, every knee shall bow to me, and every tongue shall confess to God. So then every one of us shall give account of himself to God" (Romans 14:11- 12). We are responsible because we have direct access to God. God has given us the Word of God, the Holy Spirit, and access to the Throne by the merit of Jesus Christ. We, therefore? must answer personally to God at the judgment seat because God communicates to us directly.
People do not like to be held personally accountable for their actions. The truth of the Word of God is that every individual is personally accountable to God. In other words, you are going to meet God in judgment some day. I am going to meet God in judgment some day. All of us are going to stand before the Lord some day and answer to Him. We are individually accountable to God. Since the state cannot answer for us to God, it has no right to dictate our conscience.
We live in a country where there are many false religions. As Baptist people, we defend the right of anyone in our land to worship as he sees fit to worship. This is unheard of in most of the world. If a man is a Moslem, I do not agree with his Islamic religion, but I defend his right to worship as he sees fit to worship. The teaching of the Catholic Church declares that salvation comes through Mary, but this is not the teaching of the Bible. We zealously proclaim the truth, but we must also defend the right of people to worship as they choose to worship. Why? Because individual soul liberty is a gift from God to every human being.
Since the Bible teaches individual soul liberty and personal accountability to God, then it is a truth that will endure to all generations. To be sure, Baptists believe the Bible is the sole authority for faith and practice (II Timothy 3:16-17; Matthew 15:9; I John 2:20, 21 , 27) and the Bible clearly teaches that no church or government or power on earth has the right to bind a man's conscience. The individual is personally accountable to God. Hence, we reject the teaching of infant baptism and all doctrine that recognizes people as members of a church before they give evidence of personal repentance toward God and faith in the Lord Jesus Christ.
The famous Baptist, John Bunyan is the man who gave us Pilgrim's Progress. This wonderful book was planned during Bunyan's prison experience and written when he was released. The trial of John Bunyan took place on October 3, 1660. John Bunyan spent twelve years in jail for his convictions about individual soul liberty, failure to attend the Church of England, and for preaching the Word of God. During his trial, Bunyan stood before Judge Wingate who was interested in hearing John Bunyan state his case. Judge Wingate said, "In that case, then, this court would be profoundly interested in your response to them."
Part of John Bunyan's response follows:
Thank you, My 'lord. And may I say that I am grateful for the opportunity to respond. Firstly, the depositions speak the truth. I have never attended services in the Church of England, nor do I intend ever to do so. Secondly, it is no secret that I preach the Word of God whenever, wherever, and to whomever He pleases to grant me opportunity to do so. Having said that, My 'lord, there is a weightier issue that I am constrained to address. I have no choice but to acknowledge my awareness of the law which I am accused of transgressing. Likewise, I have no choice but to confess my auilt in my transgression of it. As true as these things are, I must affirm that I neiher regret breaking the law, nor repent of having broken it. Further, I must warn you that I have no intention in future of conforming to it. It is, on its face, an unjust law, a law against which honorable men cannot shrink from protesting. In truth, My 'lord, it violates an infinitely higher law- the right of every man to seek God in his own way, unhindered by any temporal power. That, My 'lord, is my response.
Remember that Bunyan was responding as to why he would not do all that he was doing for God within the confines of the Church of England. The transcription goes on to say:
Judge Wingate: This court would remind you, sir, that we are not here to debate the merits of the law. We are here to determine if you are, in fact, guilty of violating it. John Bunyan: Perhaps, My 'lord, that is why you are here, but it is most certainly not why I am here. I am here because you compel me to be here. All I ask is to be left alone to preach and to teach as God directs me. As, however, I must be here, I cannot fail to use these circumstances to speak against what I know to be an unjust and odious edict. Judge Wingate: Let me understand you. You are arguing that every man has a right, given him by Almighty God, to seek the Deity in his own way, even if he chooses without the benefit of the English Church? John Bunyan: That is precisely what I am arguing, My 'lord. Or without benefit of any church. Judge Wingate: Do you know what you are saying? What of Papist and Quakers? What of pagan Mohammedans? Have these the right to seek God in their own misguided way? John Bunyan: Even these, My 'lord. Judge Wingate: May I ask if you are articularly sympathetic to the views of these or other such deviant religious societies? John Bunyan: I am not, My 'lord. Judge Wingate: Yet, you affirm a God-given right to hold any alien religious doctrine that appeals to the warped minds of men? John Bunyan: I do, My'lord. Judge Wingate: I find your views impossible of belief And what of those who, if left to their own devices, would have no interest in things heavenly? Have they the right to be allowed to continue unmolested in their error? John Bunyan: It is my fervent belief that they do, My'lord. Judge Wingate: And on what basis, might r ask. can you make such rash affirmations? John Bunyan: On the basis, My 'lord, that a man's religious views- or lack of them- are matters between his conscience and his God, and are not the business of the Crown, the Parliament, or even, with all due respect, My 'lord, of this court. However much I may be in disagreement with another man's sincerely held religious beliefs, neither I nor any other may disallo his right to hold those beliefs. No man's right in these affairs are . secure if every other man's rights are not equally secure.
I do not know of anyone who could have expressed the whole idea of soul liberty in the words of man any more clearly than Bunyan stated in 1660. Every man can seek God as he pleases. This means that we cannot force our religious faith or teaching on anyone. It means clearly that no one can be coerced into being a Baptist and believing what we believe. It means that we can do no arm-twisting, or anything of that sort, to make anyone believe what we believe. Every man has been created by God with the ability to choose to follow God or to follow some other god.
Personal accountability to God is a distinctive of our faith. It is something we believe, and out of this distinctive come other distinctives that we identify with as Baptist people.
The Priesthood of Every Believer
The priesthood of the believer means that every believer can go to God through the merit of Jesus Christ. Christ and Christ alone is the only way to God. All of us who have trusted Christ as Saviour enjoy the glorious privilege of the priesthood of the believer and can access God through the merits of our Lord and Saviour Jesus Christ.
The Bible says in I Timothy 2: 1-6,
I exhort therefore, that, first of all, supplications, prayers, intercessions, and giving of thanks, be made for all men,· for kings, and for all that are in authority; that we may lead a quiet and peaceable life in all godliness and honesty. For this is good and acceptable in the sight of God our Saviour,· who will have all men to be saved, and to come unto the knowledge of the truth. For there is one God, and one mediator between God and men, the man Christ Jesus; who gave himself a ransom for all, to be testified in due time.
Take special note of verse five, "For there is one God, and one mediator between God and men, the man Christ Jesus."
Any man, anywhere in this world can go to God through the Lord Jesus Christ.
1 Peter 2:9 says, "But ye are a chosen generation, a royal pn~ • thood , an . holy nation, a peculiar people; that ye should. shew forth the praises of hzm who hath called you out of darkness into his marvellous light. "
Christians have access to God. You can personally talk to God. You can take your needs to the Lord. Whatever your needs are, you can take those needs to the Lord. You, as an individual Christian, can go to God through the Lord Jesus Christ, your High Priest who "ever liveth to make intercession" for you (Hebrews 7:25).
We have no merit of our own. We do not accumulate merit. People may make reference to a time of meritorious service someone has rendered, but we cannot build up "good works" that get us through to God. Each day, we must come before God as needy sinners approaching Him through the finished work of Christ and Christ alone.
The Bible teaches the personal accountability of every human being to God. We cannot force our religion on anyone or make anyone a believer. We cannot force someone to be a Christian. Think of how wrong it is to take babies and allow them later in life to think they have become Christians by an act of infant baptism. Yes, they have a right to practice infant baptism, but we do not believe this is biblical because faith cannot be forced or coerced.
There are places in the world where the state is under a religion. There are places in the world where religion is under the state-the state exercises control over the faith of people. This is not taught in the Bible. Then, there are countries like ours where the church and the state operate side by side.
Throughout history, people who have identified with Baptist distinctives have stood as guardians of religious liberty. At the heart of this liberty is what we refer to as ndividual soul liberty. I am grateful to be a Baptist.
The Power of Influence Where does this teaching of the priesthood of every believer and our personal accountability to God lead us? It leads us to realize the importance of the power of influence. This is the tool God has given us. I want to give you an Old Testament example to illustrate the matter of influence.
Judges 21 :25 tells us, "In those days there was no king in Israel: every man did that which was right in his own eyes."
In the days of the judges, every man did what was right in his own eyes with no fixed point of reference.
God's Word continues to describe this time of judges in Ruth 1:1, ''Now it came to pass in the days when the judges ruled, that there was a famine in the land. " God begins to tell us about a man named Elimelech, his wife Naomi, and his sons. He brings us to the beautiful love story of Ruth and Boaz. God tells us that at the same time in which the judges ruled, when there was anarchy in the land, this beautiful love stor of Boaz and Ruth took place.
This story gives us interesting insight on the responsibility of the Christian and the church. In the midst of everything that is going on, we are to share the beautiful love story of the Lord Jesus Christ and His bride. We need to tell people about the Saviour.
The same truth is found throughout the Word of God. Philippians 2:15 states, "That ye may be blameless and harmless, the sons of God, without rebuke, in the midst of a crooked and perverse nation, among whom ye shine as lights in the world. "
We are "in the midst ofa crooked and p erverse nation." This is why the Lord Jesus said in Matthew 5:16, "Let your light so shine before men, that they may see your good works, and glorify your Father which is in heaven. " Let your light shine!
The more a church becomes like the world, the less influence it is going to have in the world. Preaching ceases, and churches only have diolauges. Singing that is sacred is taken out and the worlds music comes in. All revrence is gone. What so many are attempting to do in order to build up their ministry is actualy what will cause the demise of their ministry. We will never make a difference without being willing to be differnt, Being different is not the goal. Christ is the goal, and He makes us different.
Remember, we cannot force people to become Christians or force our faith on people. It is not right to attempt to violate another man's will; he must choose of his own volition to trust Christ or reject Christ. When we understand this, then we understand the powerful tool of influence. We must live Holy Spirit-filled, godly lives and be what God wants us to be. We must be lights in a dark world as we live in the midst of a crooked generation. The only tool we have to use is influence, not force. As we separate ourselves to God and live godly lives, only then do we have a testimony.
Separation to God and from the world is not the enemy of evangelism; it cais the essential of evangelism. There can be no evangelism without separation to God and from the world because we have no other tool to use. We cannot force people to believe what we believe to be the truth. They must choose of their own will. We must so identify with the Lord Jesus in His beauty, glory, and holiness that He will be lifted up, and people will come to Him
The more a church becomes like the world, the less influence it is going to have in the world. Preaching ceases, and churches only have dialogue. Singing that is sacred is taken out, and the world's music comes in. All reverence is gone. What so many are attempting to do in order to build up their ministry is actually what will cause the demise of their ministry. We will never make a difference without being willing to be different. It is Christ who makes us different. Being different is not the goal. Christ is the goal, and He makes us different.
Remember, we cannot force people to become Christians or force our faith on people. It is not right to attempt to violate another man's will; he must choose of his own volition to trust Christ or reject Christ. When we understand this, then we understand the powerful tool of influence. We must live Holy Spirit-filled, godly lives and be what God wants us to be. We must be lights in a dark world as we live in the midst of a crooked generation. The only tool we have to use is influence, not force. As we separate ourselves to God and live godly lives, only then do we have a testimony.
Separation to God and from the world is not the enemy of evangelism; it is the essential of evangelism. There can be no evangelism without separation to God and from the world because we have no other tool to use. We cannot force people to believe what we believe to be the truth. They must choose of their own will. We must so identify with the Lord Jesus in His beauty, glory, and holiness that He will be lifted up, and people will come to Him.
As this world becomes increasingly worse, the more off-thewall and ridiculous we will appear to an unbelieving world. The temptation will come again and again for us to simply cave in.
When one finds people with sincerely held Baptist distinctives, he finds those people have a passion for going in the power of the Holy Spirit, obeying Christ, preaching the gospel to every creature. I am grateful to God to say, "I am a Baptist."
Baptists know it is because of what we find in the Bible about soul freedom, personal accountability, and the priesthood of every believer that we must use the power of Spirit-filled influence to win the lost to Christ. If we disobey Christ by conforming to the world, we lose our influence.
May the Lord help us to be unashamed to bear His reproach and be identified with our Lord Jesus Christ.
The Way of Salvation
Do you know for sure that if you died today you would go to Heaven?
1. Realize that God loves you
God loves you and has a plan for your life. "For God so loved the world, that he gave His only begotten Son, that whosoever believeth in him, should not perish but have everlasting life" (John 3:16 ).
2. The Bible says that all men are sinners
Our sins have separated us from God. "For all have sinned, and come short of the glory of God" (Romans 3:23). God made man in His own image. He gave man the ability to choose right from wrong. We choose to sin. Our sins separate us from God.
3. God's word also says that sin must be paid for
"For the wages of sin is death" (Romans 6:23 ). Wages means payment. The payment of our sin is death and hell, separation from God forever. If we continue in our sin, we shall die without Christ and be without God forever.
4. The good news is that Christ paid for our sins
All our sins were laid on Christ on the cross. He paid our sin debt for us. The Lord Jesus Christ died on the cross, and He arose from the dead. He is alive forevermore. "But God commendeth his love toward us, in that, while we were yet sinners, Christ died for us" (Romans 5:8).
5. We must personally pray and recieve Christ by faith as our saviour
The Bible says, "For whosoever shall call upon the name of the Lord shall be saved" (Romans 10:13 ).
Lets review for a moment
- Realize That God Loves You - John 3: 1
- All are sinners - Romans 3:21
- Sin Must Be Paid For - Romans 6:23
- Christ paid for our sins - Romans 5:8
- We Must Personally Pray and Receive Christ as Our Saviour - Romans 10:13
- Pray and recieve Christ as your saviour
Lord, I know that I am a sinner. If I died today I would not go to heaven. Forgive my sins and be my Saviour. Help me live for You from this day forward. In Jesus' name, Amen.
The Bible says, "For whosoever shall call upon the name of the Lord shall be saved" (Romans 10:13 ).
~navluc-latmes
-
-
@ 57fe4c4a:c3a0271f
2023-07-27 00:26:34👥 Authors: moonsettler ( nostr:npub1nt4g4lddyzlky5q9m93tfa6fqpjmhsvnyfkjfsdqf33s8ax7jcmswjd2m3 )
📅 Messages Date: 2023-07-26
✉️ Message Count: 1
📚 Total Characters in Messages: 3532
Messages Summaries
✉️ Message by moonsettler on 26/07/2023: The sender is discussing a protocol that incorporates 2FA authentication and blind signing, but there are concerns about potential attacks.
Follow nostr:npub15g7m7mrveqlpfnpa7njke3ccghmpryyqsn87vg8g8eqvqmxd60gqmx08lk for full threads
-
@ 57fe4c4a:c3a0271f
2023-07-27 00:26:34📝 Summary: The author suggests a solution to the blinding problem in a signature protocol and asks for feedback. Tom Trevethan approves of the scheme, stating that it effectively blinds the challenge without modifying the aggregated pubkey. He also mentions that the receiver of a statecoin would need to verify signatures and transactions.
👥 Authors: • Tom Trevethan ( nostr:npub1axshsyxsl3vasj4z9549rvwdvhjmh52fw0ayj3ghtmdezx8cnuxqlwyw7n ) • moonsettler ( nostr:npub1nt4g4lddyzlky5q9m93tfa6fqpjmhsvnyfkjfsdqf33s8ax7jcmswjd2m3 )
📅 Messages Date: 2023-07-26
✉️ Message Count: 2
📚 Total Characters in Messages: 2418
Messages Summaries
✉️ Message by moonsettler on 26/07/2023: The author proposes a solution to the blinding issue in a signature protocol and seeks feedback on its correctness.
✉️ Message by Tom Trevethan on 26/07/2023: The scheme for blinding the challenge works well and doesn't require modifying the aggregated pubkey. The receiver of a statecoin would verify the signatures and transactions.
Follow nostr:npub15g7m7mrveqlpfnpa7njke3ccghmpryyqsn87vg8g8eqvqmxd60gqmx08lk for full threads
-
@ 5ada3677:7c21c9db
2023-07-26 17:24:33今天歐洲萬人空巷的大件事,是環法自行車賽抵達終點,巴黎的凱旋門。從7月1日開賽,拚到今天,整整23天,終於結束賽事,暫時分出今年的勝負。
看到選手們的車流,浩浩蕩蕩穿越盧浮宮、凱旋門、榮軍院、協和廣場等等巴黎地標,無數人喝彩接力,一座華城為之封鎖讓路,真真熱淚盈眶不已。
今年環法開賽第一站,很巧,是在Bilbao。包子講,他的房東太太提前一個禮拜就提醒他,7月1日開賽,會封城,記得安排好自己。
開賽在Bilbao的古根海姆美術館門前
環法歷史悠久,而且歷久彌新,年年萬人空巷,是絕美的賽事,我們母子追看那麼多年,今年是第一次,在歐洲沒有時差地看了直播。
環法的官網上,每日選手們比賽的路線,有非常詳細的說明,甚至還告訴你,如果你自己騎這一段,要注意些什麼,等等。
看完官網,讀後感是:人生苦短,一輩子好像無論如何不夠用的苦。
歷年環法的海報
我們母子一邊看今天環法的直播,一邊一起做飯。燉了牛尾清湯,做手工麵條。這裡的牛尾非常優秀、麵粉非常優秀,看包子壓麵用足力氣,不禁感嘆,從前沒有機械化,做麵包真是一件重體力活。包子說,古羅馬的時候,做麵包是奴隸的工作。戰俘淪為奴隸,羅馬人就把他們送去西西里做麵包。
Bilbao景致
Bilbao的咖啡館,很妖嬈,冬天供應熱湯,家家不同,湯譜貼在牆上,進門可以不吃咖啡直接吃湯,像廣東人一樣,一笑。
Bilbao的點心Pintxo
今天的圖片都來自環法
夏日拾珠系列在這裡
nostr:naddr1qqxnzd3exqenjvpc8q6nxvfhqyt8wumn8ghj7un9d3shjtnwdaehgu3wvfskueqzypdd5dnhrpllqf9re6ne06y7rnytd8mqnxjq56u0v3xnkqnuy8yakqcyqqq823c83ac7g
nostr:naddr1qqxnzd3exqenjvfjx5ur2wpeqyt8wumn8ghj7un9d3shjtnwdaehgu3wvfskueqzypdd5dnhrpllqf9re6ne06y7rnytd8mqnxjq56u0v3xnkqnuy8yakqcyqqq823c8mrqrm
nostr:naddr1qqxnzd3exqenjvf4x5ervd33qyt8wumn8ghj7un9d3shjtnwdaehgu3wvfskueqzypdd5dnhrpllqf9re6ne06y7rnytd8mqnxjq56u0v3xnkqnuy8yakqcyqqq823cdqaveh
nostr:naddr1qqxnzd3exqenjvfcxscnqd3nqyt8wumn8ghj7un9d3shjtnwdaehgu3wvfskueqzypdd5dnhrpllqf9re6ne06y7rnytd8mqnxjq56u0v3xnkqnuy8yakqcyqqq823czmjr4k -
@ 9ecbb0e7:06ab7c09
2023-07-27 12:50:14El Servicio Sismológico Nacional de Cuba (SSNC) informó sobre una situación sísmica que calificó de “anómala”, tras registrarse en un lapso de poco más de cuatro horas un total de 255 temblores -ninguno perceptible- con magnitudes entre 0,4 y 3,2 grados en la escala de Richter.
Los temblores fueron reportados en la madrugada del 26 de julio a unos 26 kilómetros al sur del municipio Moa, en los límites de las provincias de Holguín y Guantánamo, según precisó el parte diario del SSNC, adscrito al Centro de Investigaciones Sismológicas (CENAIS).
De acuerdo con la información difundida, el comportamiento telúrico se registró entre la 1:52 am y las 6:00 am (hora local), en la zona de Moa-Purial.
Además de ese enjambre de temblores en la misma localización.
El séptimo y más reciente temblor de tierra perceptible en Cuba se reportó el pasado 6 de junio.
Se trató de un sismo de magnitud 4,9 grados, con epicentro en la localidad suroriental de Caimanera, en Guantánamo, que también se sintió en municipios de Santiago de Cuba.
La mayor actividad sísmica en Cuba se registra en la zona oriental y está relacionada con una falla situada en el límite de la placa de Norteamérica, a la cual pertenece la isla, y otra de la vecina isla La Española, territorio compartido por Haití y República Dominicana.
El año pasado se registraron 13 sismos perceptibles en Cuba, casi todos en las provincias orientales.
La isla está ubicada en una región en la que confluyen diferentes sistemas de fallas tectónicas donde las últimas décadas se han registrado terremotos de gran magnitud.
Entre ellos destacan uno del 25 de mayo de 1992, de magnitud 6,9, que se sintió en la mitad oriental del país. Otro, de magnitud de 7,1, tuvo lugar el 28 de enero de 2020, aunque ese estuvo localizado en las inmediaciones de las Islas Caimán, se sintió en toda Cuba.
-
@ 5ada3677:7c21c9db
2023-07-26 17:21:29傍晚6:30,想去海邊走走。
坐地鐵30分鐘,到了海邊,Bilbao地區著名的富裕小鎮Getxo,好像翻譯成「哥喬」。
小鎮依山傍海,海岸線綿長,景致美不勝收。此地是老牌富裕小鎮,古建築雄渾壯麗,林立城中。一部分是教堂,一部分是市政廳,還有一部分是當地古老家族的宮殿。古老到什麼程度?12世紀就成名成家,差不多是我們的南宋。
好像無法想像,南宋的豪宅們,依然林立於杭州城中。
一個黃昏,海邊走走,山上走走,滿地玩得盡興的小朋友,以及夕陽餘暉裡,默默對坐的中年夫婦,衣著鮮美,氣概非凡,比比皆是。
好像不用花很多力氣和很多錢,跑去阿瑪爾菲人擠人了,以後。
替補球員們
路過一個公共足球場,立著看一會兒人家業餘球隊踢球。旁邊三五成群的小朋友席地而坐,所謂熏陶,就是這樣子的吧。
Getxo跟Bilbao差不多,從前也是因為鋼鐵工業和航海業而富裕,西班牙的鋼鐵,大多集中在此地附近,是工業革命時期的重鎮。至今,工業革命時期積累的巨大財富,依然歷歷可見。這也是Bilbao能夠成功完成城市轉型的一個根本原因吧,說到底,還是富裕二字。
離開小鎮的時候,天色仍然明媚,而晚間的Jazz已開喉歌詠,海風吹拂裡,默默聽了幾曲。真真是,長夜未央,美貌佳人紅燈坐。
坐地鐵回家,到家剛好晚飯時間。
夏日拾珠系列在這裡
nostr:naddr1qqxnzd3exqenjvpc8q6nxvfhqyt8wumn8ghj7un9d3shjtnwdaehgu3wvfskueqzypdd5dnhrpllqf9re6ne06y7rnytd8mqnxjq56u0v3xnkqnuy8yakqcyqqq823c83ac7g
nostr:naddr1qqxnzd3exqenjvfjx5ur2wpeqyt8wumn8ghj7un9d3shjtnwdaehgu3wvfskueqzypdd5dnhrpllqf9re6ne06y7rnytd8mqnxjq56u0v3xnkqnuy8yakqcyqqq823c8mrqrm
nostr:naddr1qqxnzd3exqenjvf4x5ervd33qyt8wumn8ghj7un9d3shjtnwdaehgu3wvfskueqzypdd5dnhrpllqf9re6ne06y7rnytd8mqnxjq56u0v3xnkqnuy8yakqcyqqq823cdqaveh -
@ 9ecbb0e7:06ab7c09
2023-07-27 12:45:53LA HABANA, Cuba. – “¿Ahí vive alguien?”, me preguntó con asombro hace años un amigo italiano que llegaba de visita a Cuba por primera y única vez. En uno de sus paseos, no demasiado alejado de la ruta de todo turista primerizo, había asomado las narices en un solar de La Habana. Hacía el calor insoportable de los veranos de aquí. La lluvia del día anterior, unida a todas las pasadas, aún era visible en la humedad de las paredes y molestamente percibida en el enjambre de fetidez que hoy es el “aroma” inconfundible de la ciudad.
Para este amigo, en aquel momento muy joven, que había llegado a Cuba creyendo en cuanto de lindo había escuchado sobre los “grandes logros de la Revolución Cubana”, no era posible que, en la tierra de su ídolo Fidel Castro, no solo existiera algo así tan feo como la cuartería que había visitado por casualidad sino que ese fuese el verdadero “sello distintivo” de un país donde, a pesar de alardear de guerras en África, un viaje al cosmos, de planes quinquenales en la era soviética, de contingentes que construían pedraplenes, hoteles e instalaciones deportivas para unos Juegos Panamericanos en pleno “Período Especial”, no había sido capaz de resolver el asunto de la vivienda para los trabajadores.
Y rápido fue el paso del asombro a la decepción total cuando al día siguiente hizo otros varios “descubrimientos”, como que aquellos lugares miserables no estaban habitados exclusivamente por “marginales” y “desechos de la sociedad” —como algún “ilustre” anfitrión de la Unión de Jóvenes Comunistas quiso hacerle creer—, sino que eran además el hogar de médicos, artistas, incluso de arquitectos e ingenieros para quienes las habilidades de salvar vidas y crear maravillas del ingenio humano jamás les habían sido suficientes para agenciarse un espacio familiar o personal decoroso.
También descubrió por esos días, invitado por el hijo de algún alto dirigente del Partido Comunista a una casona de Miramar, que los principales artífices de la Revolución Cubana, al igual que la mayoría de las figuras más prominentes en el poder, ni siquiera vivían en barrios o bloques de viviendas creados después de enero de 1959 por ellos mismos sino que, simplemente, se habían mudado al día siguiente a las mansiones de esa “burguesía” que decían detestar y combatir, y hasta en algunos casos usaban sus muebles, utensilios, adornos y actitudes de clase de esos que debieron huir y hasta sufrir vejaciones, prisión o expropiación (e igual todo a la vez), obligados por un cambio político supuestamente “en favor de los humildes”.
En muy pocos días, y con apenas veintitantos años de edad, este amigo extranjero concluyó lo que incluso a muchos cubanos y cubanas les ha tomado demasiado tiempo descubrir: que la Revolución no es otra cosa que un largo y tortuoso proceso de sucesivos engaños y desengaños, y que por tantas ilusiones que ha robado y aniquilado, tantos proyectos de vida truncados, debería ser llamada “roboilusión”, que fue precisamente la palabra que usó, hace poco más de 20 años atrás, mientras me explicaba por qué no regresaría jamás a Cuba.
Hace unos días, mientras miraba junto a otro amigo la escena de la película The Mother (de 2023, interpretada por Jennifer López en el papel principal), que intenta recrear (desde algún lugar de Gran Canaria) el ambiente de La Habana en el presente, con las calles sucias, solares mugrientos y edificios deteriorados, comentábamos lo muy poco logrado que fue el intento, aun cuando en el uniforme escolar de unos niños que pasan y la breve discusión de un botero al que le han chocado el “almendrón”, se nota el esfuerzo que hizo la directora del filme por captar nuestra atmósfera “enrarecida” y “exótica”.
Pero, olvidando incluso el cliché de que algo tan feo solo puede ser habitado por “marginales” —entre ¡cajas de naranjas y de pomos leche! en las esquinas (totalmente increíble), entre autos demasiado modernos para la vetustez general que nos agobia, más otros miles de desaciertos—, los edificios en ruina y los solares de la película, bien deprimentes pero fuertes y sin “estática milagrosa”, ni siquiera se acercan a la triste realidad que exhiben los de acá, que son en su mayoría un peligro para la vida de quienes lo habitan.
Viendo el fracaso decepcionante de la escena es que recordé la decepción del amigo italiano, surgida de la contemplación de ese elemento de nuestro “paisaje cotidiano” que a veces, de tan ordinario, dejamos de ver y que son nuestras propias viviendas, nuestras ciudades en ruinas como indudable expresión de un engaño. Elementos a veces tan increíblemente inhumanos, bestiales, que resulta muy difícil para alguien ajeno aceptar que habitemos ahí y que, aun así, muchos todavía no alcancen el desengaño.
-
@ 5ada3677:7c21c9db
2023-07-26 17:17:00Bilbao是西班牙北方小城,居然在此地邂逅上海老友,伊是匆匆過客,僅停兩夜,一路從里昂、巴黎、巴塞羅那、聖薩巴斯提安來,馬不停蹄經馬德里回上海。我們在上海也多年不見了,竟然在這裡碰頭。
一起食個午飯,於當地的小館子,夫妻老婆店,做得很不錯的菜,煎得滾燙滑嫩的omelet,以及極清甜柔潤的狗鱈魚,一點點鹽,一切檸檬淋漓汁水,入口清俊雅麗,完美。
老友很驚奇,包子為何會選擇Bilbao居住?歐洲屈指可數的宜居城市,Bilbao絕對名列前三甲。老友說,我是研究城市轉型的,在攻讀這個課題的博士學位,才知道Bilbao的,包子你是怎麼選到這裡的呢?
我們伴飯的話題,就變成了宜居城市和城市轉型。
1878年的煙紙店
包子講了幾句。
在經歷了英國的蘇格蘭和荷蘭的阿姆斯特丹之後,想找一處溫暖的、陽光充沛的地方,Bilbao四季氣候宜人,有山有海,七月天氣,15至25攝氏度的氣溫,不需要空調,沒有大汗淋灕。
西班牙的大城市,馬德里酷熱,巴塞羅那遊客擁擾,而且生活成本比較貴。就不考慮了。
Bilbao是出名的美食之地,遠勝很多歐洲名城,食物非常便宜,便宜到我這個上海寧咬牙切齒的地步。老友剛從巴黎來,對比巴黎和Bilbao的食物價格、外食價格,也是感嘆不已。
Bilbao特產的鱈魚,賣鱈魚的店,漂亮得像賣珠寶的店
Bilbao沒有交通堵車這件事情,37萬人口的城市,上班族每天上下班往返,花在路上的全部時間,是35分鐘,地鐵票只有兩毛五分錢,城際巴士或者火車,也只有五毛錢,實在是便宜得嚇死人。
街頭的書報亭
老爺叔拉的手風琴,曲子是Bilbao當地足球隊的隊歌,家喻戶曉的名曲
路人甲乙丙
Bilbao最讓我感動,是滿街活蹦亂跳的小朋友,任何時間段出門,都可以見到大群大群的小朋友,在追逐嬉戲,尖叫瘋跑,玩耍得忘情。城中一等黃金地段,處處是孩子們的大型玩具,肌肉結實的小傢伙們,或爬或吊或蕩在玩具上,常常讓我駐足看呆過去。
我已經很久很久,沒有遇見這樣古老的童年了。
跟著而來的,是滿街的童裝店、玩具店,這裡的咖啡館兼售酒精,小朋友們都隨便進出,大人飲酒,小朋友吃果汁或者跟店家要一杯免費白水,法律不囉嗦,市民們自治就好了。
舊書店,去的時候沒有開門,告示上寫,9月3日之前,不收購舊書。大概老闆避暑去了。
我問老友,格麼,你研究了這麼多歐洲城市,除了Bilbao,還有那裡是比較看得上的宜居城市?
老友答,義大利的博洛尼亞。
我們一起笑呵呵的是,那些世界最宜居城市榜單,經常上榜的名城,比如維也納、哥本哈根、蘇黎世,這些城,怎麼會選上榜的?氣候糟糕、食物糟糕、生活成本昂貴,等等。
所以,榜單這個東西,聽聽就好,當它是真的,就不必了,世界宜居城市榜單也好,世界大學排名也好,米其林也好。到了這個年紀,我已經不需要榜單,來幫助我審美判斷了,謝謝天。
夏日拾珠系列在這裡
nostr:naddr1qqxnzd3exqenjvpc8q6nxvfhqyt8wumn8ghj7un9d3shjtnwdaehgu3wvfskueqzypdd5dnhrpllqf9re6ne06y7rnytd8mqnxjq56u0v3xnkqnuy8yakqcyqqq823c83ac7g
nostr:naddr1qqxnzd3exqenjvfjx5ur2wpeqyt8wumn8ghj7un9d3shjtnwdaehgu3wvfskueqzypdd5dnhrpllqf9re6ne06y7rnytd8mqnxjq56u0v3xnkqnuy8yakqcyqqq823c8mrqrm -
@ 9ecbb0e7:06ab7c09
2023-07-27 12:42:12Sendos operativos policiales se reportan en las últimas horas en La Habana y Holguín, donde los agentes del orden han decomisado mercancías, mayormente alimentos, a cubanos que se dedicaban a comercializarlos mediante publicaciones de ventas en las redes sociales.
Las redadas llegan días después de que el presidente de la Asamblea Nacional del Poder Popular (ANPP), Esteban Lazo, dijera en televisión que la medida más efectiva contra los infractores era el “decomiso”.
Por ejemplo, según el perfil de Facebook ‘Un Cubano Fiel’, una de las cuentas que utiliza el Ministerio del Interior (Minint) para divulgar información oficiosa, a un ciudadano identificado como Víctor le fueron ocupados en su casa del barrio Cayo Hueso, en La Habana, numerosos galones de aceite de cocina.
NOTICIAS DE CUBA Operativos policiales en La Habana y Holguín terminan en decomisos tras la amenaza de Lazo
Los implicados supuestamente desviaron alimentos de empresas estatales Foto del avatar
By
Periódico Cubano Published on 26 julio, 2023
Share Tweet Comment
Operativos policiales en La Habana y Holguín decomisan mercancías después de la amenaza de Lazo
Al decir de ‘Un Cubano Fiel’, en estos momentos se investiga “la cadena delictiva a la que está vinculado”, pues se sospecha que los implicados no actuaron solos. (Foto: Un Cubano Fiel – Facebook)
Sendos operativos policiales se reportan en las últimas horas en La Habana y Holguín, donde los agentes del orden han decomisado mercancías, mayormente alimentos, a cubanos que se dedicaban a comercializarlos mediante publicaciones de ventas en las redes sociales.
Las redadas llegan días después de que el presidente de la Asamblea Nacional del Poder Popular (ANPP), Esteban Lazo, dijera en televisión que la medida más efectiva contra los infractores era el “decomiso”.
Por ejemplo, según el perfil de Facebook ‘Un Cubano Fiel’, una de las cuentas que utiliza el Ministerio del Interior (Minint) para divulgar información oficiosa, a un ciudadano identificado como Víctor le fueron ocupados en su casa del barrio Cayo Hueso, en La Habana, numerosos galones de aceite de cocina.
“En Marqués González entre Virtudes y Concordia, Cayo Hueso, Centro Habana, la policía realizó un registro en la casa de Víctor y le ocuparon gran cantidad de aceite comestible en diferentes envases”, refiere la publicación, que adjunta imágenes, evidentemente todas tomadas por la policía.
En otro momento, se asegura que le decomisaron también 28.000 pesos cubanos (CUP), aunque en medio de la galopante inflación que hay en la economía nacional, con una extrema devaluación del peso, esa suma equivale aproximadamente a solo 125 dólares.
Los detalles sobre el origen de la mercancía se desconocen, pero en Cuba no existen fábricas que producen aceite de cocina. El punto de origen puede ser la fábrica de envasar aceite que está en el municipio de Regla. Hasta allí entra la materia prima a granel que se importa por la vía marítima y luego la fraccionan en diferentes formatos, desde medio litro hasta un galón, tanto en pomos plásticos como en bolsas.
El otro operativo policial fue sobre Michaels, un comprador de un hotel en la zona turística de Guardalavaca, al norte de Holguín. El hombre fue detenido cuando se trasladaba a La Habana cargado de mercancía.
Al oficiar un registro en su casa se le decomisó “una gran cantidad de productos, entre ellos; ron y cervezas de varias marcas reconocidas internacionalmente, cárnicos de alta calidad, queso y latas de pintura”, refiere la misma fuente.
Al decir de ‘Un Cubano Fiel’, en estos momentos se investiga “la cadena delictiva a la que está vinculado”, pues se sospecha que en el desvío de recursos no actuó solo.
Algunos cubanos se preguntaron en las redes sociales si la policía ya hizo un registro similar en las casas del administrador, del almacenero y del gerente del hotel donde trabajaba el comercial, que fue atrapado con “las manos en la masa”.
-
@ 6e0a1f48:c9f444e5
2023-07-27 12:39:44The importance of building freedom tools
In a time where censorship and limitation of individual freedoms seem increasingly intense, it is necessary to understand the importance of building tools that favor freedom of expression and free access to information. The ability to freely express our opinions and seek knowledge without restrictions is a fundamental pillar of a democratic and healthy society. In this article, we will explore the need to nurture the creation of such tools in order to ensure the flourishing of freedom in the current world.
Threats to freedom of expression
Currently, we witness the concerning trend of censorship and restriction of dissenting voices. In many circles, ideas contrary to the status quo have been silenced and banned. Such a scenario undermines diversity of thought and creates an environment where only perspectives aligned with dominant currents can be freely expressed. Censorship, in any form, is a worrying demonstration of authoritarianism and can lead to a stagnant and non-progressive society.
Building freedom tools
In the face of this panorama, it is crucial to prioritize the development of tools that facilitate free expression and free access to information. Through these tools, people will be able to share ideas, discuss relevant issues, and expand the horizons of knowledge. By building platforms that allow different perspectives to be heard, we will be strengthening the pillars of freedom and encouraging an environment of critical thinking.
The need to expand access to information
Another fundamental point is to ensure free access to information. In a world where data and knowledge are increasingly valuable, restricting access only to certain groups or filtering information according to particular interests is dangerous for society as a whole. Unrestricted and unmanipulated access to quality information is essential for informed decision-making, whether on a personal, professional, or political level.
Empowering individuals
Building freedom tools is not only a matter of technology but also of empowering individuals. By giving people the necessary tools to express themselves freely and access relevant information, we are empowering them to make informed decisions, contribute to public discourse, and actively participate in the construction of a more just and inclusive society.
Conclusion
Therefore, it is more useful than ever to envision the development of tools as if they have already been banned, as this gives us greater resilience than waiting for the system to accept them. As we already know, centralized construction leads to companies having the weakness of having to respond to the state if it disagrees with what is being done, and thus they will not be able to centrally address these needs.
In summary, in the face of a context where freedom of expression and free access to information face significant threats, it is imperative to build freedom tools that promote a healthy environment for diversity of ideas. Empowering individuals and nurturing the creation of platforms that facilitate the free sharing of information is essential for the preservation of democratic values and the continuous pursuit of progress. Understanding the importance of such tools makes us reflect on our role as defenders of freedom in an increasingly connected and globalized society.
Build as if you had already been banned!
-
@ 5ada3677:7c21c9db
2023-07-26 17:11:29黃昏出門散步,Bilbao 夏季日照很長,長日永晝,很多店鋪營業到晚上八、九點,黃昏五、六點,人們都在公園裡休憩,小館子裡緩緩飲一杯,滿街的孩子們成群呼嘯,這種生氣勃勃,我好像久久久違了。
剛會走路的小朋友,已經在凌空抽射了,驚嘆號。那位給小朋友們供應肥皂泡的老爺叔,其實是乞食者。這麼歡樂的乞食者,真真開闊了我的眼界和胸襟。
櫥窗裡和櫥窗外,色彩一一都繽紛,品味沒話講。歐洲旅行,博物館美術館固然好看值得看,路人甲乙丙丁,也很好看值得看。
在路邊吃一杯咖啡,飽看各色人等,回家寫個短篇小說,絕對綽綽有餘。
想順手買點火腿回去吃,看見路邊的火腿店鋪,就順腳進去了。我的天,小小的店堂裡,在播莫札特的《魔笛》,那種輝煌燦爛,一下子,弄得我立刻吃不消起來。輾轉反側,原地團團轉,以及熱淚盈眶。
老闆是位文靜的老爺叔,聽完一段,我跟他買火腿,請他推薦最好的。老闆於莫札特的華麗詠嘆調裡,跟我講,火腿買回去,開封的時候,拿熱水泡半分鐘,如此最美味。
付了錢,我請他允許我拍點照片,他請我隨意拍。問我喜歡不喜歡莫札特,問包子在Bilbao快樂不快樂、有沒有朋友。我拍到店堂裡的豆子們,老爺叔不好意思地跟我說,啊呀啊呀,通常我是把豆子們放在門口比較好看的,今晚因為等一下要去參加唱歌考試,就提早收進來了。
我的天,怪不得我們在火腿店裡邂逅了莫札特的《魔笛》。
回家路上,包子跟我感慨萬千,一個賣火腿的老爺叔,這麼好的修養啊。
夏日拾珠系列在這裡
nostr:naddr1qqxnzd3exqenjvpc8q6nxvfhqyt8wumn8ghj7un9d3shjtnwdaehgu3wvfskueqzypdd5dnhrpllqf9re6ne06y7rnytd8mqnxjq56u0v3xnkqnuy8yakqcyqqq823c83ac7g
-
@ 6e0a1f48:c9f444e5
2023-07-27 12:39:40A Importância de Construir Ferramentas de Liberdade
Em uma época onde a censura e a limitação das liberdades individuais parecem cada vez mais intensas, é necessário compreender a importância de construir ferramentas que favoreçam a liberdade de expressão e o livre acesso à informação. A capacidade de expressar livremente nossas opiniões e buscar conhecimento sem restrições é um pilar fundamental de uma sociedade democrática e saudável. Neste artigo, exploraremos a necessidade de nutrir a criação de tais ferramentas, a fim de garantir o florescimento da liberdade no mundo atual.
Ameaças à Liberdade de Expressão
Atualmente, testemunhamos a preocupante tendência de censura e restrição das vozes dissidentes. Em muitos círculos, ideias contrárias ao status quo têm sido silenciadas e banidas. Tal cenário mina a diversidade de pensamento e cria um ambiente onde apenas perspectivas alinhadas com as correntes dominantes podem ser expressas livremente. A censura, em qualquer forma, é uma demonstração preocupante de autoritarismo e pode conduzir a uma sociedade estagnada e sem progresso.
Construindo Ferramentas de Liberdade
Diante deste panorama, é crucial priorizar o desenvolvimento de ferramentas que facilitem a livre expressão e o livre acesso à informação. Por meio dessas ferramentas, as pessoas poderão compartilhar ideias, discutir questões relevantes e expandir os horizontes do conhecimento. Ao construir plataformas que permitam que diferentes perspectivas sejam ouvidas, estaremos fortalecendo os pilares da liberdade e incentivando um ambiente de pensamento crítico.
A Necessidade de Ampliar o Acesso à Informação
Outro ponto fundamental é garantir o livre acesso à informação. Em um mundo onde dados e conhecimento são cada vez mais valiosos, restringir seu acesso apenas a determinados grupos ou filtrar informações de acordo com interesses particulares é perigoso para a sociedade como um todo. O acesso irrestrito e sem manipulações a informações de qualidade é essencial para que decisões informadas possam ser tomadas, seja em âmbito pessoal, profissional ou político.
Empoderando os Indivíduos
Construir ferramentas de liberdade não é apenas uma questão de tecnologia, mas também de empoderamento dos indivíduos. Ao dar às pessoas as ferramentas necessárias para se expressarem livremente e acessarem informações relevantes, estamos capacitando-as a tomar decisões informadas, contribuir para o debate público e participar ativamente na construção de uma sociedade mais justa e inclusiva.
Conclusão
Por tudo isto é mais util que nunca formar uma visão de desenvolvimento das ferramentas como se as mesmas já tivessem sido banidas, isto nos dá uma resiliencia muito maior do que se estivermos á espera que o sistema aceite as mesmas. Como já é sabido de todos nós a construção centralizada leva a que as empresas tenham o ponto fraco de ter que responder ao estado caso ele não concorde com o que está a ser feito, e com isso não conseguirão centralizadamente responder a essas necessidades.
Em resumo, diante de um contexto onde a liberdade de expressão e o livre acesso à informação enfrentam ameaças significativas, é imperativo construir ferramentas de liberdade que promovam um ambiente saudável para a diversidade de ideias. Empoderar os indivíduos e nutrir a criação de plataformas que facilitem o livre compartilhamento de informações é essencial para a preservação de valores democráticos e a busca contínua do progresso. Compreender a importância de tais ferramentas nos faz refletir sobre nosso papel como defensores da liberdade em uma sociedade cada vez mais conectada e globalizada.
Constroi como se já tivesses banido!
-
@ 5ada3677:7c21c9db
2023-07-26 17:04:59七月,離開梅雨愁城的上海,辛辛苦苦一趟萬里飛行,抵達西班牙北方小城,Bilbao畢爾巴鄂。
四年未到歐洲,別來無恙的甘甜涼爽,以及密密切切的喜悅隨時隨地。
Bilbao以一座古根海姆美術館名動四海,1997年這座古根海姆建成,當年的遊客數,一下子,從前一年的25000人,狂飆至將近一百萬。舉目當今,以一座美術館響亮一座中世紀古城的案例,Bilbao可算得是全球第一名,這座小城,屢獲各種最優城市獎,是聯合國的經典城市案例,從一個垂垂老矣的工業城市,成功轉型為金融、能源、設計、旅遊、藝術、美食集大成的西班牙小瑞士,是很多至今仍在辛苦掙扎的工業城市,望塵莫及的優等生。
Bilbao擁有600年輝煌歷史,並非只有一個古根海姆,後面慢慢講它的身世來歷。
有意思的是,一年一百萬遊客湧入Bilbao,這座人口不足40萬的小城,竟然沒有淪陷成花枝招展輕浮躁動的旅遊城市,當地人依然我行我素,過著悠揚疏鬆的日子。原因很簡單,九成九的遊客,到此地來,兩個旅遊目的地,看一個古根海姆,逛一逛老城區;住一夜,或者不住一夜,就去下一個城市了。遊客們並沒有影響到當地人的起居習慣,亦沒有侵犯到當地人的紅塵裡。這一點,非常有意思。
街頭閒步,低頭抬頭,漂亮建築此起彼伏,從氣勢驚人的哥特式、巴洛克式,一直到簡潔實用的包豪斯式,樣樣俱全,西班牙特有的、柔和了阿拉伯味道的摩爾風格的建築,亦比比皆是,優雅鮮美,震撼人心。
建築的好,是一種十分具體的好,日日夜夜走過路過,影響了城中民眾半輩子的審美性格,能有多少東西,一年影響你300次的呢?華美建築的那種崇高、清華、致遠,皆不是語言能夠企及的。
所以,我們似乎可以體諒武康大樓前面朝朝暮暮洶湧的人潮,他們和她們,像一夜覺了醒,突然驚覺了武和康的巨大的美。
於古根海姆背面的角落裡,遇見騎行的一家人,這位路人甲老阿姨,還上前要求擺拍一楨🌿
這間摩爾風格的百年老店,食一餐三道菜的午餐,僅僅150元人民幣,讓我長噓短嘆了久久🌿
-
@ 5ada3677:7c21c9db
2023-07-26 16:53:22溽暑的夜晚,撩開紛紛雨幕,步去巨鹿路的玉芝蘭,食一席夏日川菜,雲朵一樣輕渺婉轉的川菜。是夜,玉芝蘭的主理人蘭桂均師傅,從成都來。
揮汗入座,玉芝蘭於森森的小樓裡,裊裊娜娜。泡一道冷萃茶來飲,龍井桂花雪梨冰茶,萃了漫漫四個小時,240分鐘的整幅耐心,彌足珍貴。茶湯傾入香檳杯中,極清,極冽,極香遠,於冰清玉潔裡搖曳人心,真是魅惑以及高級的。
開胃涼菜,捧上來玉芝蘭的招牌,熊貓攢盒,六個小碟子,呈現了川菜的各種妖冶滋味,從宮保到怪味,一應俱全。川菜的拿手好戲,便是於這些繽紛的滋味裡紛披穿梭,游刃有餘,弄出層巒疊嶂的水墨皴來。除了四川人,其他人大致做不來如此的跳脫靈動。最後一味清口,是一小碟雲南的甜筍。入口峻猛,收口秀甜,一只攢盒,滿分之作。蘭師傅說,這只盒子裡的開胃菜,今晚最辣最麻的味道都在這裡了,後面我們會越食越澹泊,越食越本真。
過中,是蘭師傅的絕活,川西一絕,坐杠大刀金絲麵。這七個字真是美,吃麵之前先吃字,一碗麵的芳名,如一句煉過字的詩,嚴絲合縫,字字妥貼。今晚的麵湯,是純素菌子湯,取小金鮮松茸、四川的乾羊肚菌和福建的乾紅菇共冶一爐,以菌子湯的香,配金絲麵的細,真是才子邂逅佳人,絕配。
白牛肝土雞燉花膠,土雞是靈魂,蘭師傅親手拎了四只好雞,從成都搭飛機來到巨鹿路,熬得的濃稠湯底,有天香,無化學塑料氣,添上白牛肝和花膠,真真矜貴可喜。蘭師傅說,白牛肝和花膠易得,而好雞不易得。這道菜寫上菜單,蘭師傅就有點睡不穩覺,擔心覓不到好雞,如何治得成好菜。
鴛鴦鮑魚,像是鮑魚的比較文學教科書,一個碟子裡,分列了鮮鮑與乾鮑各半切,旁襯一口撈汁的白米飯。這幅格局,有點像日本菜裡,食鰻魚飯,一半白燒一半紅燒,燕環肥瘦,安享一個人的默默選美。而廚家將鮮鮑與乾鮑,分別呈現在各自最好的狀態裡,自然是考究功夫的。
冷吃麻婆豆腐,像麻婆豆腐的一種慕斯版本,豆香濃郁,麻婆妖嬈。這是一個西學為體、中學為用的碟子,中國人追求和爭論了一個世紀的難題,此時此刻,在蘭師傅的碟子裡,完美和諧了。天下大同,原來是如此美味的一件好人好事。
蘭師傅今晚我是初見,伊人走入來,我是一個驚奇不已,蘭師傅很像一個人,像汪曾祺先生,是汪曾祺先生的細皮嫩肉版,蘭師傅比汪曾祺先生骨骼更細緻俊秀一個度到一點五個度。汪先生江蘇高郵人,蘭師傅四川成都人,川和揚,一向緊密不分家。而蘭師傅的一口四川話,娓娓道來,真是好聽的。蘭師傅當晚頻頻說到的一個關鍵字,鮮,四川話說來,是炫的平聲,蘭師傅說好鮮啊,聽起來是好炫啊,平聲的炫,聽入耳,糯糯的,無火氣,真絢爛。
聽蘭師傅講了一會兒他在成都賣得響當當的江湖名菜,豆渣豬手。豬手燉得恰如其分,一大盆,下面墊滿豆渣,吸了飽飽的滷汁,下飯極香。三言兩語,讓我想起了張愛玲小姐青睞有加的一碗好菜,豆腐渣炒紅燒肉汁,張氏筆法寫來,豆渣累累結成細小的一球球,像碎肉。蘭師傅的菜,蘭師傅的容顏,跟兩代文學家奇妙的合轍,是當晚非常意外的欣喜。
這一晚的川菜,輕靈、悠揚、如詩如歌,沒有濃重調味料的狂轟濫炸,食來十分熨貼安詳。曾經想過,年過半百之後,就不食猛如虎的川菜了,今晚邂逅了蘭師傅雲朵般輕渺的川菜,讓我完全改變了想法。
圖片來自亞楠小姐
-
@ 9ecbb0e7:06ab7c09
2023-07-27 12:31:56El miércoles 26 de julio fallecieron cuatro personas en Sancti Spíritus cuando un camión, desprovisto de barandas, intentó cruzar el río Yayabo que estaba crecido por las intensas lluvias y fueron arrastradas por la corriente, según un reporte del diario oficialista Escambray.
Un informe preliminar del Ministerio del Interior (Minint) en la provincia señala que el chofer del camión particular fue imprudente al intentar atravesar el puente de la comunidad Las Tosas y como resultado de la fuerza del río perdió el control del vehículo que fue arrastrado aguas abajo.
En el camión iban 10 personas de una misma familia. Entre los fallecidos hay dos menores de edad de 4 y 15 años, respectivamente. Los otros dos muertos fueron un hombre de 49 años y una mujer de 61. Además, hay otros dos infantes, una niña de 9 años y un varón de 8 que están internados en el Hospital Pediátrico Provincial recibiendo atención sanitaria.
El intendente del Gobierno municipal de Sancti Spíritus, Jaile Rabelo Orellana, se pronunció ante los medios oficiales, asegurando que las autoridades del Partido y el Gobierno local se dirigieron rápidamente al lugar de los hechos para apoyar en las labores de rescate, en colaboración con los vecinos y las fuerzas del Ministerio del Interior.
El río Yayabo es afluente del Río Zaza y su nacimiento se localiza a una altura de 520 metros sobre el nivel del mar en el municipio de Fomento, justo en las estribaciones del Escambray, en una zona cercana a Caballete de Casa. En su recorrido atraviesa la ciudad de Sancti Spíritus y le da el sobrenombre de la ciudad del Yayabo antes de verter sus aguas en la presa Zaza. Accidentes en Cuba
Según los reportes más actualizados en el primer semestre del 2023, Cuba ha registrado más de 3.600 accidentes de tránsito, con 290 personas fallecidas y más de 2.800 heridas.
De acuerdo con datos proporcionados por el jefe del Órgano Especializado de Tránsito de la Dirección General de la Policía Nacional Revolucionaria (PNR), el coronel Roberto Rodríguez Fernández, el “factor humano” es responsable del 90% de los accidentes. El restante 10% se atribuye a malas condiciones de la vía y desperfectos mecánicos.
Las edades más afectadas son entre 46 y 55 años, y los conductores jóvenes entre 21 y 35 años también están involucrados en un 22% de los accidentes. La mayoría de los siniestros ocurren en zonas urbanas y áreas residenciales, siendo Pinar del Río y Villa Clara las provincias más afectadas.
El horario más crítico es entre las 3 p.m. y las 6 p.m., y los peatones son especialmente vulnerables, con un alto índice de mortalidad en caso de atropello.
-
@ 884f5d1d:1ed306f6
2023-07-26 15:45:24Sed ut perspiciatis unde omnis iste natus error sit voluptatem accusantium doloremque laudantium, totam rem aperiam, eaque ipsa quae ab illo inventore veritatis et quasi architecto beatae vitae dicta sunt explicabo. Nemo enim ipsam voluptatem quia voluptas sit aspernatur aut odit aut fugit, sed quia consequuntur magni dolores eos qui ratione voluptatem sequi nesciunt. Neque porro quisquam est, qui dolorem ipsum quia dolor sit amet, consectetur, adipisci velit, sed quia non numquam eius modi tempora incidunt ut labore et dolore magnam aliquam quaerat voluptatem. Ut enim ad minima veniam, quis nostrum exercitationem ullam corporis suscipit
eprehenderit qui in ea voluptate velit esse quam nihil molestiae consequatur, vel illum qui dolorem eum fugiat quo voluptas nulla pariatur? At vero eos et accusamus et iusto odio dignissimos ducimus qui blanditiis praesentium voluptatum deleniti atque corrupti quos dolores et quas molestias excepturi sint occaecati cupiditate non provident, similique sunt in culpa qui officia deserunt mollitia animi, id est laborum et dolorum fuga. Et harum quidem rerum facilis est et expedita distinctio. Nam libero tempore, cum soluta nobis est eligendi optio cumque nihil impedit quo minus id quod maxime placeat facere
-
@ ca843451:fa3b4c1a
2023-07-26 14:09:30In the mid-20th century, a distinctive and futuristic architectural style emerged in the United States, capturing the imagination of a generation. Googie architecture, also known as "Structural Expressionism," brought a sense of excitement and innovation to everyday life. Inspired by the advancements of modern technology, Googie buildings showcased bold designs that incorporated elements of cars, jets, and the Space Age. While often associated with roadside structures such as coffee shops, gas stations, and drive-in theaters, Googie architecture made a lasting impact on the architectural landscape.
Origins and Key Characteristics of Googie Architecture
Googie architecture gained popularity from 1945 to 1970 and was heavily influenced by the optimism and progress of the post-World War II era. Its name was derived from Googies Coffee Shop, a small but influential coffee house on the Sunset Strip in Los Angeles, designed by John Lautner, a student of renowned architect Frank Lloyd Wright. The style's defining features included eye-catching rooflines, starbursts, upward-pitched roofs, and large plate glass windows.
Alan Hess, an authority on Googie architecture, notes that these buildings were designed to be seen by motorists traveling at high speeds, with their shapes and interiors reflecting this purpose. Googie architecture embraced modern engineering principles, such as cantilevers, hyperbolic paraboloids, broad trusses, and catenary curves. Its ultramodern aesthetics aimed to capture the excitement of the future and create memorable visual experiences.
Googie Architecture's Impact and Spread
Despite its initial popularity, Googie architecture faced criticism from traditional architectural critics, who did not always view it as a serious style. This lack of recognition and appreciation led to the demolition of many iconic Googie buildings. However, Googie architecture should not be dismissed, as it adhered to the fundamental principle of modern architecture: form follows function.
The style's emphasis on form and function made it particularly suitable for everyday structures such as coffee shops, gas stations, car washes, and drive-in theaters. It brought modern design and innovation to the daily lives of Americans, injecting a sense of excitement and novelty into the built environment. Googie architecture's influence extended beyond California, spreading to other parts of the country, including New Jersey.
Noteworthy Examples of Googie Architecture
While many significant Googie buildings have been lost to demolition, several notable examples still stand today. One of the most iconic is the Centre Pompidou in Paris, designed by Renzo Piano and Richard Rogers. This cultural center showcases the characteristic exterior display of structural elements, with pipes and tubes visible on the building's facade. The Centre Pompidou exemplifies Googie architecture's ability to create visually striking and functional spaces.
In Chicago, the John Hancock Center stands tall as a testament to Fazlur Rahman Khan's architectural prowess. Its X-braced exterior emphasizes the tubular core structure, showcasing the influence of Structural Expressionism. The Gherkin, officially known as 30 St Mary Axe, in London, combines Googie architecture with elements of Neo-Futurism, resulting in a distinctive skyscraper that has become an iconic landmark in the city.
Another significant Googie building is the Lloyd's Building in London, designed by Richard Rogers. Its Bowellism style, characterized by the external display of structural elements, demonstrates the architectural innovation that Googie brought to everyday structures. The HSBC Building in Hong Kong is another remarkable example, with its unique design featuring diagonal bracing visible from the facade, providing both structural support and aesthetic appeal.
Preserving Googie Architecture and its Legacy
Despite the challenges faced by Googie architecture, efforts are being made to preserve and celebrate its legacy. The Wildwoods Shore Resort Historic District in New Jersey offers a glimpse into the retro-futuristic aesthetic of Googie architecture, with numerous examples of buildings that embody the style. Additionally, the "Welcome to Fabulous Las Vegas" sign in Nevada, while not a building itself, has become an enduring symbol of Googie architecture and its association with the excitement of the city.
To fully appreciate the significance of Googie architecture, it is essential to recognize its role in bringing modern design to everyday life. Googie buildings were not merely frivolous roadside attractions; they represented a serious example of modern architecture. By integrating technological advancements, bold forms, and functional design, Googie architecture left an indelible mark on the architectural landscape of the mid-20th century.
As we look to the future, it is crucial to preserve and cherish the remaining Googie buildings, as they serve as a reminder of the optimism and innovation of the post-war era. These structures continue to inspire architects and designers, ensuring that the spirit of Googie architecture lives on in contemporary architectural practices.
Googie architecture, with its futuristic and innovative designs, captured the imagination of a generation. From coffee shops to gas stations, these everyday structures showcased the excitement and progress of the post-World War II era. While often dismissed by traditional architectural critics, Googie architecture adhered to the principles of modern design, emphasizing form follows function.
Though many notable Googie buildings have been lost to demolition, several remarkable examples still stand today. The Centre Pompidou in Paris, the John Hancock Center in Chicago, the Gherkin in London, the Lloyd's Building in London, and the HSBC Building in Hong Kong are just a few examples of the enduring legacy of Googie architecture.
By preserving and celebrating Googie architecture, we can honor its impact on the architectural landscape and recognize its contribution to the built environment. These buildings serve as a reminder of the optimism and innovation of the mid-20th century, inspiring future generations of architects and designers to push the boundaries of architectural expression. Let us appreciate and cherish the unique and visionary world of Googie architecture.
-
@ d3d74124:a4eb7b1d
2023-07-26 02:43:40This plan was GPT generated originally but then tweaked by myself as the idea fleshed itself out. All feedback welcome and encouraged.
Shenandoah Bitcoin
1. Executive Summary
Shenandoah Bitcoin is a for-profit community organization based in Frederick County, VA, uniquely blending the world of agriculture and STEM. Our mission is to foster community spirit, stimulate interest in agricultural technology, and promote understanding of Bitcoin, while providing enriching educational opportunities and ensuring sustainable business operations.
2. Company Description
Shenandoah Bitcoin is committed to delivering value to our local community. Our unique approach intertwines traditional agricultural practices, modern STEM concepts, and the world of digital currencies, specifically Bitcoin. Our activities cater to all age groups, focusing on fostering community engagement, hands-on learning experiences, and contributing to the overall welfare of our community.
What’s in a name?
Shenandoah Bitcoin. Shenandoah - an old and historied land. Bitcoin - a cutting edge technological advancement. Both encompass multiple industries, from energy and manufacturing, to farming and data centers. Both built using Proof of Work.
3. Services
We offer a range of services, including:
Family-friendly events: Agriculture, STEM, and Bitcoin-themed festivals, fairs, workshops, and community gatherings. Educational programs: Classes, seminars, and workshops on agricultural technology, STEM principles, and understanding and using Bitcoin. Facility Rentals: Spaces available for private events, business meetings, and community gatherings.
4. Membership Benefits
We offer tiered membership packages with benefits such as:
a. Silver Membership: Includes access to regular events, discounts on educational programs, and priority booking for facility rentals.
b. Gold Membership: All Silver benefits, free access to select educational programs, and further discounted facility rentals.
c. Platinum Membership: All Gold benefits, free access to all educational programs, highest priority and maximum discounts on facility rentals, and exclusive invitations to special events.
Member’s opting to pay in Bitcoin receive 10% off all pricing.
5. Market Analysis
Our primary market is the local community in Frederick County and Winchester, VA, which consists of various demographic groups. Our secondary market includes neighboring communities, tourists, businesses, and educational institutions interested in the intersection of agriculture, STEM, and Bitcoin. Understanding that facility use and events to be a drawing factor for all demographics, we outline demographic specific analysis below.
STEM professionals in the area may work remotely or commute toward DC and not interact much with their agricultural neighbors, but a desire for good quality food exists for many. In addition to events, drawing the STEM demographic in will be connections to CSAs, ranchers, and homesteaders for access to fresh locally grown food. Offering a child's play room adjacent to some office space, is a compelling benefit for the laptop class that is often in STEM professions.
Non-industrial food producers and homesteaders may not have the focus or resources for marketing and sales. By offering a physical touch point for them and direct connections to consumers, food producers benefit from membership. Having more options for drop off/pick up of various produced goods, makes it attractive for both the consumers and producers as coordination can be asynchronous.
Bitcoiners have a wide range of sub-demographics, including farmers and software engineers. Some travel hours over car and plane to attend bitcoin themed events. The topics of STEM and agriculture are of shared interest to non-trivially sized communities of bitcoiners. Having a physical touch point for bitcoiners will draw in some members just for that. Building fellowship is desired and sought in bitcoin.
5.1 Market Trends
The blending of agriculture, STEM fields, and Bitcoin is a unique concept with increasing interest in sustainable farming and ranching, food sovereignty, and health. Shenandoah Bitcoin is poised to tap into this growing interest and offer unique value to our community.
5.2 Market Needs
Our market requires initiatives that foster community engagement, promote understanding of agri-tech and Bitcoin, and provide a versatile space for events and learning.
6. Marketing and Sales Strategy
We will employ a blend of digital marketing, traditional advertising, and strategic partnerships. Our main marketing channels will be word of mouth, social media, local press, and our website. Partnerships with local small businesses, homesteaders, schools, agricultural organizations, and bitcoin companies will form a key part of our outreach strategy.
7. Organizational Structure
Shenandoah Bitcoin will be led by a CEO, supported by a management team responsible for daily operations, event planning, marketing, and community outreach. Event management and logistics will be handled by part-time staff and volunteers.
8. Financial Projections
Our revenue will be generated from membership fees, charges for events and educational programs, and facility rentals.
9. Funding Request
[If seeking additional funding, describe your needs and how the funds will be used]
10. Exit Strategy
Should it become necessary to dissolve the business, assets such as property, equipment, and any remaining cash reserves after meeting liabilities will be sold. Investors would receive their share of the remaining assets according to their proportion of ownership.
11. Conclusion
Shenandoah Bitcoin is a unique community organization bringing together agriculture, STEM, and Bitcoin in Frederick County, VA. Our distinctive approach is designed to deliver both profits and social impact, resonating strongly with our target market and positioning us for sustainable growth.
-
@ a4a6b584:1e05b95b
2023-07-25 23:44:42Introducing Box Chain - a decentralized logistics network enabling private, secure package delivery through Nostr identities, zero-knowledge proofs, and a dynamic driver marketplace.
Identity Verification
A cornerstone of Box Chain's functionality and security is its identity verification system. Drawing on the principles of decentralization and privacy, it eschews traditional identifiers for a unique, cryptographic solution built on the Nostr protocol.
When a new user wishes to join the Box Chain network, they begin by generating a unique cryptographic identity. This identity is derived through complex algorithms, creating a unique key pair consisting of a public and a private key. The public key serves as the user's identity within the network, available to all participants. The private key remains with the user, a secret piece of information used to sign transactions and interactions, proving their identity.
Unlike many centralized systems, Box Chain does not require any form of real-world identification for this process. This is crucial for a few reasons. First, it ensures the privacy of all participants by not requiring them to disclose sensitive personal information. Second, it allows Box Chain to operate independently of any jurisdiction, enhancing its universal applicability.
Once their identity is established, participants engage in the network, accepting and fulfilling delivery tasks. Each successful delivery, confirmed by the receiver, contributes to the participant's reputation score. This reputation score is publicly linked to their identity and serves as a measure of their reliability and performance.
A critical aspect of mitigating potential identity fraud is the stake requirement. Each participant, before they can accept a delivery task, is required to stake a certain amount of Bitcoin. This acts as a form of collateral, held in escrow until the successful completion of the delivery. The staked amount is forfeited in case of fraudulent activities or non-delivery, creating a strong financial disincentive against dishonest behavior.
Overall, the identity verification system in Box Chain, built on unique cryptographic identities, a reputation score system, and the staking mechanism, provides a robust framework to ensure reliability and trust in a decentralized, borderless context. It significantly mitigates the risks of identity fraud, further strengthening Box Chain's promise of secure, efficient, and private package delivery.
Zero-Knowledge Proof Shipping Information
Box Chain's unique approach to preserving privacy while ensuring accurate delivery relies heavily on the concept of Zero-Knowledge Proofs (ZKPs). This cryptographic principle allows for the verification of information without revealing the information itself.
When a package is set for delivery, the sender provides the recipient's address. This address is immediately subjected to cryptographic transformation - the details are processed and turned into a form that is impossible to understand without a specific decryption key. This transformation process is designed to ensure maximum privacy - the original address remains known only to the sender and, eventually, the recipient.
In this transformed state, the address can still be verified for its validity without revealing its actual content. This is where ZKPs come into play. The sender, by leveraging ZKPs, can prove to the Box Chain system that they possess a valid address without needing to reveal the specifics of that address. This protects the privacy of the recipient by ensuring their address isn't openly visible on the system.
For the delivery process, the route is broken down into relay points, each assigned a particular driver. This relay-based system plays a significant role in preserving privacy and ensuring package safety. Instead of providing the entire route to each driver, they only receive the location of the next relay point. This is accomplished by giving them a cryptographic key which, when applied to the encrypted route data, reveals only the necessary information - the location of the next relay driver.
This way, the sender's address and recipient's final address remain as private as possible. Moreover, it enables the package to be securely handed off from one relay driver to the next, each having access to only the information necessary for their leg of the journey.
It's important to note that this process, while extremely secure, can take a longer time due to its relay nature and the cryptographic processes involved. There may also be a need to introduce a timeout mechanism for each leg of the journey to ensure drivers complete their part in a reasonable timeframe.
By incorporating ZKPs and a relay-based delivery system, Box Chain is able to provide a level of privacy and security that is rare in the logistics world, striking a balance between efficiency and privacy.
Delivery Confirmation
One of the key aspects of ensuring the success and trustworthiness of Box Chain's decentralized package delivery service is the process of delivery confirmation. To make this process as secure, transparent, and reliable as possible, Box Chain implements a multi-signature approach that leverages the power of cryptography.
When a delivery is made, it is not enough to simply leave the package at the prescribed location. Confirmation of delivery is critical to ensure the transaction is closed and the delivery person can receive their payment. This is where the multi-signature approach comes into play.
In essence, a multi-signature approach means that more than one party needs to provide a digital signature to confirm the transaction. For Box Chain, this involves both the receiving party and the delivery person. After the delivery person leaves the package at the prescribed location, they would use their private cryptographic key to sign a confirmation of delivery. The recipient, upon receiving the package, would do the same.
These digital signatures are securely generated using each party's private key and are incredibly difficult, if not impossible, to forge. This means that when both signatures are provided, the system can be confident that the package was delivered and received successfully.
As a further layer of security and accuracy, Box Chain incorporates geolocation confirmation into its delivery confirmation process. This means that when the delivery person signs the confirmation of delivery, their geographic location is checked against the intended delivery location. If the two locations match within an acceptable margin of error, this acts as another layer of proof that the delivery was made successfully.
This process ensures that delivery confirmations are not only secure but are also indisputable. It provides a significant level of trust and reliability, both for the sender and receiver, but also for the delivery people who are looking to receive their payments.
Furthermore, it aligns with the principles of decentralization and privacy, leveraging the power of cryptography and blockchain technology to provide a secure, transparent, and effective service. This approach positions Box Chain as a pioneer in combining the gig economy with the blockchain technology, providing a unique and secure package delivery solution.
Package Security
Guaranteeing the security of packages throughout transit is fundamental to Box Chain's service offering. To accomplish this, Box Chain utilizes a unique stake system that incentivizes delivery drivers to handle packages with the utmost care.
When a sender initiates a delivery, they specify the value of the package being shipped. This value is used to determine the stake amount that the delivery person must deposit to accept the delivery task. The stake functions as a form of shipping insurance, held in escrow by the Box Chain system until successful completion of the delivery.
The stake amount set by the sender is commensurate with the value of the package, allowing the sender to decide how much insurance they deem appropriate for their shipment. Higher-value packages may necessitate a larger stake, serving to reassure the sender that the delivery person has a significant financial incentive to ensure the safe delivery of the package.
In the event that a package is lost or damaged, the stake acts as a safety net for the sender. The staked amount is forfeited by the delivery driver and is transferred to the sender as compensation for their loss.
This system not only provides reassurance to the sender, but also gives a powerful incentive for delivery drivers to handle the packages with care. By having their own funds at risk, delivery drivers are likely to go the extra mile to ensure packages are safely delivered to their destination.
Further enhancing the security of the package, Box Chain uses a multi-signature approach during the relay handoff process. The current delivery driver and the next relay driver must both provide a digital signature to confirm the handoff. This ensures that responsibility for the package is officially transferred from one party to the next in a secure and verifiable manner. This "chain" of signatures creates an auditable trail that adds another layer of security and trust to the process.
Through the combination of a stake system and multi-signature handoff confirmation, Box Chain provides a comprehensive security solution that ensures packages are not only delivered efficiently but are also safeguarded throughout their transit journey.
Routing Algorithm and Pricing Mechanism
The efficiency and economic fairness of Box Chain's service hinge significantly on its innovative routing algorithm and pricing mechanism. This system is designed to ensure a smooth journey for each package, while also ensuring that delivery drivers are fairly compensated for their work.
The journey of a package begins with the sender specifying the destination and offering a starting payment for delivery. This payment information is propagated to the network, along with the package's destination, where potential delivery drivers can view it. However, unlike traditional package delivery services, the journey and price aren't fixed from the onset. Instead, Box Chain employs a dynamic, decentralized, and market-driven approach to optimize routing and pricing.
The total journey is divided into smaller legs, each of which can be undertaken by different delivery drivers. The starting payment offered by the sender is not a flat rate for the whole journey but is instead used as an initial bid for each leg of the journey. This bid is then doubled, and the network waits for a delivery driver to accept the offer. If no one accepts, the bid continues to increase in increments, creating an auction-like environment.
This system allows the real-time market dynamics to determine the cost of delivery. Factors such as distance, package weight, or even current traffic conditions can influence how much a delivery driver is willing to accept for a leg of the journey. If a leg of the journey is particularly difficult or inconvenient, the price will naturally rise until it reaches a level that a delivery driver deems worthwhile.
By allowing the drivers themselves to choose which jobs to accept based on their own assessment of the work's value, Box Chain creates a fair, flexible, and dynamic market where compensation is closely tied to the effort and resources required to complete a delivery. This is akin to how the Tor network or the Lightning Network operates, but instead of data packets being routed and priced, Box Chain is doing this with physical packages in the real world.
Such a system not only incentivizes delivery drivers to participate but also ensures the service remains adaptable and resilient to changing conditions and demands. This represents a novel and intelligent use of blockchain technology to disrupt the traditional gig economy model, placing the power in the hands of the individual drivers and fostering a more equitable and efficient market.
Incentive for Participation
Box Chain's unique approach to package delivery provides a plethora of compelling incentives for individuals to participate in the network as delivery drivers. By offering the potential for higher earnings through a competitive and dynamic bidding system, Box Chain encourages active participation and healthy competition within its network.
Upon initiating a package delivery, the sender offers a starting bid for each leg of the journey. This bid is then escalated through the network, doubling with each round until a delivery driver accepts the task. This mechanism presents delivery drivers with the opportunity to earn more for their services, especially in cases where the journey is long or complex.
However, the competitive aspect of the bidding system also helps regulate the pricing. Although prices might be high initially, as more delivery drivers join the network and competition increases, the bid required to win a delivery job is likely to decrease. This dynamic balance ensures a fair market price for delivery services while also enabling delivery drivers to optimize their earnings.
Furthermore, Box Chain's reputation system, based on the Nostr protocol, provides an additional layer of incentive for delivery drivers. The reputation of each driver is tracked and publicly displayed, allowing senders to gauge the reliability and efficiency of their potential couriers. As drivers successfully complete deliveries and earn positive feedback, their reputation score increases.
This reputation score can play a pivotal role in the Box Chain economy. Drivers with higher reputation scores may demand higher bids for their services, reflecting their proven track record of successful deliveries. Alternatively, the system could grant priority in the bidding process to drivers with higher reputation scores. This not only incentivizes good performance and reliability but also helps to foster trust within the network.
Overall, Box Chain's combination of a competitive bidding system and a reputation-based incentive structure encourages active participation and ensures a high standard of service. By aligning economic incentives with high-quality service delivery, Box Chain empowers its participants while also ensuring a satisfying experience for its users.
Here is an additional section covering dispute resolution and failed delivery handling that could be added:
Dispute Resolution and Failed Deliveries
For a decentralized network like Box Chain, dispute resolution and handling of failed deliveries present unique challenges. To address these in alignment with its principles, Box Chain implements an arbitration-based system and a dual-stake mechanism.
In case deliveries fail due to recipients being unavailable or refusing, both the sender and recipient are required to stake funds as collateral. If the delivery cannot be completed, the stakes are forfeited and awarded to the delivery driver as compensation for their time and effort. This creates a disincentive for recipients failing to receive packages and ensures drivers are paid for their work.
For disputes between senders, recipients and drivers, Box Chain leverages a decentralized arbitration system built on the Nostr protocol. Independent arbitrators stake their own funds and adjudicate disputes based on review of evidence from both parties. Their incentive is a small percentage of the transaction amount.
The arbitration process involves submission of dispute details, review of evidence, ruling based on policies, and appeals handled by additional arbitrators if required. A majority ruling wins the appeal. This system, relying on staked incentives and the wisdom of the crowd, enables fair dispute resolution aligned with Box Chain's ethos.
By combining reciprocal stakes and decentralized arbitration, Box Chain is able to provide robust recourse around failed deliveries and disputes while retaining its principles of decentralization, privacy, and aligned incentives. These mechanisms strengthen the system and instill further user trust and satisfaction.
Bitcoin + Nostr = <3
The combination of Bitcoin and Nostr represents a powerful and synergistic integration of decentralized technologies. Bitcoin provides a secure, transparent and decentralized means of value transfer, while Nostr offers a decentralized protocol for creating and managing digital identities and data. Together, they can enable truly decentralized and privacy-preserving applications, like Box Chain, that have the potential to disrupt traditional business models and empower individuals around the world. The future looks promising with such advanced and transformative technologies working hand in hand.
Read more from Adam Malin at habitus.blog.
Adam Malin
You can find me on Twitter or on Nostr at
npub15jnttpymeytm80hatjqcvhhqhzrhx6gxp8pq0wn93rhnu8s9h9dsha32lx
value4value Did you find any value from this article? Click here to send me a tip!
-
@ 6b40efd8:b9dad5f5
2023-07-25 09:41:16Hoy, coincidiendo con la resaca de las elecciones, me he dado cuenta que el banco me ha bloqueado la cuenta bancaria, por segunda vez y sin previo aviso, impidiéndome recibir ingresos y pagos de mis clientes desde la semana pasada. Me he enterado al ver que no me había recibido ninguno de los pagos previstos. Según el Banco Santander, el bloqueo se debe a la falta de la firma de un documento, el FIOC (Formulario de Información Obligatoria del Cliente), una especie de KYC más profundo y recurrente. Tras la firma por tercera vez del documento, parece que ya me van a desbloquear la cuenta, pero todavía tengo que esperar, al menos, 48 horas para recibir mi dinero. Desde luego la sensación de no disponer de tu propio dinero es impotencia y rabia a partes iguales. El resultado directo es que te das de frente con la cruda realidad una vez más, el dinero en el Banco, no es tu dinero.
Después de estos dos hechos, en principio sin mucha relación entre ellos, he encontrado disfrutando de una serenidad absoluta. Ahora me siento todavía más seguro de que todo paso hacia conseguir ser completamente independiente del Estado, y sus redes clientelares, es un paso imprescindible y el único camino que nos acerca a la libertad. Tras estos hechos viene a mi mente una simple reflexión. Cuando hablamos de libertad, ¿tiene algún sentido ponerle precio? ¿Podemos pensar que es cara o barata?
Yo lo tengo claro ¿Y tú?
-
@ f821179b:ed4fd022
2023-07-24 18:39:53Primal.net is a bit new so it’s still a work in progress but is quickly becoming one of my favorite clients. It took some time before they were able to implement “zaps”, and their direct message feature is still being developed. However, everything that is currently functional works very well. It has become my go-to web client because I find it reliable. If I want to check my latest notifications, Primal is now my first choice—it was Iris previously—as it often shows me notifications that other clients miss for some reason. I assume this discrepancy is relay-related.
Primal offers several interesting features worth exploring. For example, their in-depth statistics tab shows useful information about what’s trending across Nostr, which accounts are receiving the most zaps, which notes are getting the most attention, the total number of users on the network, the total number of reactions, and so on. You can find all of this under their ‘Explore’ tab. Viewing these statistics provides a fascinating insight into the ecosystem.
Custom feeds are another great feature that Primal offers on their client. You can see what's popular and trending in multiple different ways. For example, do you want to know which accounts are getting the most zaps? There's a custom feed for that. Interested in seeing what someone else's feed looks like? You can visit their profile and create a custom feed for yourself. Curious about what's trending across your network, including your followers and those you follow, as well as those they follow? There's a custom feed for that as well. You can even follow hashtags or specific keywords if you prefer, and turn them into a custom feed. The level of customization and the way your media is presented to you is clearly a key area of focus for the Primal team.
Primal has recently released the beta version of its iOS app. It’s not yet available on the App Store. However, if you’re interested in trying it out, you can visit https://primal.net/downloads After signing up and downloading “TestFlight”, you’ll be able to take the app for a test run or “flight,” if you will. One aspect that immediately stood out to me when first using the app was their excellently implemented Zaps integration. Primal guides you through the process of linking your GetAlby account with the app, facilitating frictionless zapping and creating a seamless experience. I find myself using the Primal app as frequently as I use Damus. Currently, these two apps are my go-to options for iOS.
I'm eagerly anticipating how Primal will evolve and grow as they refine and perfect their client.
-
@ 5b8a50e6:bf7c189e
2023-07-24 16:34:17#260—The SEC signals appeal
Welcome to Yaka Stuff, our weekly newsletter that covers news, industry perspectives, and updates from the Hard Yaka ecosystem. Check out our last report here (https://hardyaka.substack.com/p/259crypto-isnt-inherently-a-security).
This week:
-
The SEC signals appeal
-
Everything SEC v. Ripple
-
How Threads threatens the Fediverse
-
This week in digital money
-
Ecosystem updates
-
Stuff happens
1. The SEC signals appeal
This was expected. Here’s the WSJ (https://www.wsj.com/livecoverage/stock-market-today-dow-jones-07-21-2023/card/sec-says-xrp-ruling-was-wrong-signals-it-will-appeal-oCqi2N05kHNT7MqOkDev):
The Securities and Exchange Commission said Friday that a federal judge erred when she ruled against the agency in a landmark crypto case last week, and signaled that it will appeal the decision.
…
The SEC wrote Friday that the judge hearing Kwon's case shouldn't look to the Ripple case as precedent. Torres's decision "adds baseless requirements" to the test for when an asset is a security, the SEC said. The agency intends to seek "further review," which would likely mean an appeal.
Torres's decision appears to conflict with a basic principle of federal investor protection law: that retail investors should get more protection than sophisticated ones. Torres found that only Ripple's sales to institutional investors required SEC regulation; its sales to individual investors via exchanges didn't.
The SEC's lawyers wrote that the reasoning "is impossible to reconcile with all of these fundamental securities laws principles."
Ripple CEO Brad Garlinghouse responded via tweet (https://twitter.com/bgarlinghouse/status/1682869087511416832) (or are they X’s now?):
An important topic has come up about protecting retail. The SEC created this mess by proclaiming it was the cop on the crypto beat when it had no legal jurisdiction Where’s that gotten us? Consumers left holding the bag in bankruptcy court while the SEC holds press conferences.
It’s absurd to blame a Judge for faithfully applying the law. We all know legislation – not more regulation by enforcement – is the only way forward to provide clear rules and protect retail. Glad to see more members of Congress like @RepRitchie, @PatrickMcHenry champion this.
2. Everything SEC v. Ripple
Elsewhere:
-
SEC's Gensler 'Disappointed' by Part of Ripple's XRP Judgement, Still Assessing Opinion (https://www.coindesk.com/policy/2023/07/17/secs-gensler-disappointed-by-part-of-ripples-xrp-judgement-still-assessing-opinion/)
-
Watch—SEC Chair Gary Gensler’s comments at NPC Headliner Luncheon (https://www.youtube.com/watch?v=xR4l5F8fLRU)
-
Ripple says U.S. banks will want to use XRP cryptocurrency after partial victory in SEC fight (https://www.cnbc.com/2023/07/17/ripple-hopes-judge-ruling-in-sec-case-will-lead-to-us-banks-using-xrp.html)
-
Lyra Finance tweets link to discussion for proposal to list XRP option markets on Lyra (https://twitter.com/lyrafinance/status/1679651846644985859)
-
Ripple has cracked the SEC's exterior — sit back and watch it crumble (https://blockworks.co/news/ripple-sec-gensler-securities)
-
US regulatory clarity has begun in court after Ripple win: CFTC commissioner (https://cointelegraph.com/news/us-regulatory-clarity-begun-ripple-court-ruling-cftc-pham)
-
CFTC's Pham Wants to Regulate Crypto in a Holistic Way (https://www.bloomberg.com/news/videos/2023-07-17/cftc-s-pham-wants-to-regulate-crypto-in-a-holistic-way-video)
-
Crypto court victory reignites power struggle with Gensler's SEC (https://www.politico.com/news/2023/07/14/crypto-court-victory-reignites-power-struggle-with-genslers-sec-00106342)
-
Christmas in July. Court in Ripple case delivers split verdict hailed as victory by Ripple (https://login.tabbgroup.com/login?service=https://tabbforum.com/wp-login.php?redirect_to=https%3A%2F%2Ftabbforum.com%2Fopinions%2Fchristmas-in-july-court-in-ripple-case-delivers-split-verdict-hailed-as-victory-by-ripple%2F)
-
XRP Futures Set Open Interest Record High for 2023 (https://www.coindesk.com/markets/2023/07/19/xrp-futures-set-open-interest-record-high-for-2023/)
-
Congressman Torres Tells SEC Chairman to End Crypto ‘Crusade’ After Ripple Ruling (https://decrypt.co/149079/end-sec-crusade-rep-ritchie-torres-annalisa-torres-doctrine)
-
GOP Lawmakers Suggest Gensler's SEC Is Gaming News Cycle to Thwart Crypto Legislation (https://www.coindesk.com/policy/2023/07/19/gop-lawmakers-suggest-genslers-sec-is-gaming-news-cycle-to-thwart-crypto-legislation/)
-
SEC Chair Gensler Cites 'Wild West' of Crypto in Case to Increase Agency's Budget (https://www.coindesk.com/policy/2023/07/19/sec-chair-gensler-cites-wild-west-of-crypto-in-case-to-increase-agencys-budget/)
-
Eleanor Terrett, Fox Business reporter, tweets copy of order for Ripple and SEC to meet for settlement (https://twitter.com/EleanorTerrett/status/1681032363873124357)
-
SEC said to be slow-walking assistance requested for US crypto market bill (https://www.theblock.co/post/240688/sec-said-to-be-slow-walking-assistance-requested-for-us-crypto-market-bill)
-
SEC’s Gary Gensler believes AI can strengthen its enforcement regime (https://cointelegraph.com/news/sec-gary-gensler-ripple-ai-strengthen-enforcement-regime)
-
Watch—Yahoo Finance shares video interview on Twitter with Gary Gensler talking AI (https://twitter.com/yahoofinance/status/1681023180591321088?s=46&t=Q6y1ZcdYN2jN_3juK1YIKw)
3. How Threads threatens the Fediverse
(https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21f03695-9308-4ceb-bb2c-bbb17723560a_2494x1201.jpeg)
In its Threads announcement (https://about.fb.com/news/2023/07/introducing-threads-new-app-text-sharing/), Meta promised to make its new Twitter competitor compatible with interoperable open protocols:
Soon, we are planning to make Threads compatible with ActivityPub, the open social networking protocol established by the World Wide Web Consortium (https://www.w3.org/TR/activitypub/) (W3C), the body responsible for the open standards that power the modern web. This would make Threads interoperable with other apps that also support the ActivityPub protocol, such as Mastodon and WordPress – allowing new types of connections that are simply not possible on most social apps today. Other platforms including Tumblr have shared plans to support the ActivityPub protocol in the future.
We’re committed to giving you more control over your audience on Threads – our plan is to work with ActivityPub to provide you the option to stop using Threads and transfer your content to another service. Our vision is that people using compatible apps will be able to follow and interact with people on Threads without having a Threads account, and vice versa, ushering in a new era of diverse and interconnected networks. If you have a public profile on Threads, this means your posts would be accessible from other apps, allowing you to reach new people with no added effort. If you have a private profile, you’d be able to approve users on Threads who want to follow you and interact with your content, similar to your experience on Instagram.
For the Fediverse, this could be their black swan moment.
Here’s Wired (https://www.wired.com/story/metas-threads-could-make-or-break-the-fediverse/):
Meta’s embrace of ActivityPub, used by apps including the Twitter-like Mastodon, was bound to be a little awkward. The constellation of small apps and personal servers that currently use the protocol, known as the Fediverse, is marked by an ethos of sharing and openness, not profit-seeking or user bases denominated in the billions.
ActivityPub is designed to allow users of different apps to not only interact and view each others’ content, but also move their digital identity from one service to another. Mastodon, the largest app in the Fediverse, is open source and run by a nonprofit, and smaller Fediverse apps like PeerTube and Lemmy are often held up as a repudiation of the closed nature of services such as YouTube or Reddit. Corporations like Meta are typically held up as the enemy. No surprise that, despite appeals from ActivityPub leaders for civility when Meta arrived on the listserv, some couldn’t hold their tongue.
Weeks-old Threads already dwarfs the Fediverse, which has been around for more than a decade and recently peaked at about 4 million active monthly users. Some Fediverse fans see that imbalance as a win: Suddenly, the network could become many times more relevant. Others consider that view naive and expect Meta’s size to push the small world of apps built on ActivityPub in undesirable directions. Some have circulated a pact to preemptively block content from Threads’ servers from appearing on their own.
“The Fediverse community has been jolted into motion—due to fear and loathing of Meta, and also excitement,” says Dmitri Zagidulin, a developer who leads the World Wide Web Consortium (W3C) group responsible for discussing the future of ActivityPub. The prospect of Meta joining the decentralized movement has people trying to spiff up their projects and prepare for the spotlight. “There are furious meetings. Grants being applied for. Pull requests. Pushes for better security, better user experience. Better everything,” he says.
But the relationship status? It’s complicated:
How Meta decides to implement ActivityPub in Threads will help determine the outcome of what could be the Fediverse’s big bang. “It’s not plug-and-play,” says Ernst. The company will have to choose how closely to allow Threads users to integrate with other Fediverse servers. That includes deciding how easily users can migrate their accounts and networks to other services, and whether to provide support such as tools that redirect followers to a user’s new home. Meta’s leaders will also have to decide what kinds of Threads content will be broadcast out into the Fediverse—including, potentially, the role of ads—and how users outside of Threads will be able to see or interact with it on their own platforms. Meta did not respond to a request for comment.
…
Meta executives told staffers last week that ActivityPub integration “is a long way off,” according to The Verge (https://www.theverge.com/2023/7/14/23795138/whats-next-for-instagram-threads-twitter). There’s a history of large platforms being quick to announce their interest in the protocol but slower to implement any integration, Zagidulin says, pointing to Tumblr’s as-yet-unrealized announcement last year of ActivityPub integration. Meta itself has a fickle history with open protocols. A decade ago, the company briefly embraced XMPP (https://www.wired.com/2008/05/facebook-chat-to-start-jabbering/), an interoperable messaging protocol, along with competitors like Microsoft. But the effort was quickly abandoned.
The reality is that Threads will likely have more pressing priorities in the short term. Despite being the fastest growing platform of all time, engagement has already fallen off a cliff, according to the WSJ (https://www.wsj.com/articles/threads-user-engagement-continues-to-drop-adding-urgency-for-new-features-8ed2f384):
For a second week in a row, the number of daily active users declined on Threads, falling to 13 million, down about 70% from a July 7 peak, according to estimates from market intelligence firm Sensor Tower.
The average time users spend on the iOS and Android apps has also decreased to four minutes from 19 minutes. The average time spent for Android users in the U.S. dropped to five minutes from a peak of 21 minutes on launch day, according to SimilarWeb, a digital data and analytics company.
Twitter’s daily active users remain steady at about 200 million, and average time spent is at 30 minutes a day, according to Sensor Tower estimates.
Elsewhere:
-
Elon Musk Changes Twitter Logo to an X (https://www.nytimes.com/2023/07/23/business/elon-musk-twitter-logo.html)
-
Twitter Still Cash Flow Negative, Musk Says (https://www.theinformation.com/briefings/twitter-still-cash-flow-negative-musk-says)
-
Bluesky is under fire for allowing usernames with racial slurs (https://techcrunch.com/2023/07/17/bluesky-racial-slurs-banned-list-usernames/)
4. This week in digital money
-
FedNow Service has no relation with CBDCs, Federal Reserve clarifies (https://cointelegraph.com/news/federal-reserve-service-not-related-to-cbdcs)
-
Federal Reserve tweets Q&A about FedNow and CBDCs (https://twitter.com/federalreserve/status/1681714825896787972?s=20)Wholesale CBDC Would Improve Cross-Border Payments, French Central Bank Tests Show (https://www.coindesk.com/policy/2023/07/21/wholesale-cbdc-would-improve-cross-border-payments-french-central-bank-tests-show/)
-
The Banque de France publishes a second report to share lessons learned from its wholesale CBDC experiments using distributed ledger technologies (https://www.banque-france.fr/en/communique-de-presse/banque-de-france-publishes-second-report-share-lessons-learned-its-wholesale-cbdc-experiments-using)
-
Financial Stability Board Calls for Tougher Global Crypto Rules After Year of Turmoil (https://www.coindesk.com/policy/2023/07/17/financial-stability-board-calls-for-tougher-global-crypto-rules-after-year-of-turmoil/)
-
Senior House Republican, Democrat talk up need for stablecoins law (https://www.theblock.co/post/240077/senior-house-republican-democrat-talk-up-need-for-stablecoins-law)
-
Coinbase CEO Brian Armstrong to Meet House Democrats About Crypto Legislation (https://www.coindesk.com/policy/2023/07/18/coinbase-ceo-brian-armstrong-to-meet-house-democrats-about-crypto-legislation-bloomberg/)
-
The US Dollar Is Under Threat, Says Circle CEO in Warning to Congress (https://decrypt.co/148498/the-us-dollar-is-under-threat-says-circle-ceo-in-warning-to-congress)
-
RFK Jr. Vows to Back Dollar With Bitcoin, Exempt BTC from Taxes (https://www.coindesk.com/policy/2023/07/19/us-presidential-candidate-rfk-jr-vows-to-exempt-crypto-from-capital-gains-tax-if-elected/)
-
FSB finalises global regulatory framework for crypto-asset activities (https://www.fsb.org/2023/07/fsb-finalises-global-regulatory-framework-for-crypto-asset-activities/)
-
FSB: High-level Recommendations for the Regulation, Supervision and Oversight of Global Stablecoin Arrangements (https://www.fsb.org/wp-content/uploads/P170723-3.pdf)
-
New U.S. Senate Bill Wants to Regulate DeFi Like a Bank (https://www.coindesk.com/policy/2023/07/19/new-us-senate-bill-wants-to-regulate-defi-like-banks/)
-
U.S. House Republicans Introduce Crypto Oversight Bill With Changes From June Draft (https://www.coindesk.com/policy/2023/07/20/us-house-republicans-introduce-crypto-oversight-bill-to-protect-investors/)
-
Tokenized U.S. Treasurys Surpass $600M as Crypto Investors Capture TradFi Yield (https://www.coindesk.com/markets/2023/07/11/tokenized-us-treasurys-surpass-600m-as-crypto-investors-capture-tradfi-yield/)
-
Via Sam Ostler—Societe Generale obtains France's first crypto licence (https://www.reuters.com/business/finance/societe-generale-obtains-frances-first-crypto-licence-2023-07-19/?utm_source=www.doodhwala.xyz&utm_medium=newsletter&utm_campaign=vitalik-wants-crypto-email)
5. Ecosystem updates
Check out Astra’s new site (https://astrafi.com/)!
The all-in-one platform for lightning-fast payments
Designed for product teams that want to embed payments, Astra’s API helps you process transfers between bank accounts and cards — faster than ever before.
6. Stuff happens
-
Via Sam Ostler—Long Take: Growing financial engagement with messaging in Coinbase Wallet, Venmo, and the super apps (https://lex.substack.com/p/long-take-growing-financial-engagement?utm_source=substack&utm_medium=email)
-
Google Tests A.I. Tool That Is Able to Write News Articles (https://www.nytimes.com/2023/07/19/business/google-artificial-intelligence-news-articles.html)
-
Markets Appear Convinced the Fed Can Pull Off a Soft Landing (https://www.wsj.com/articles/markets-appear-convinced-the-fed-can-pull-off-a-soft-landing-700a40dd)
-
Private Company Valuations Show Signs of Recovery (https://www.institutionalinvestor.com/article/2bx6g61a11hl4qmx375s0/portfolio/private-company-valuations-show-signs-of-recovery)
-
Chainlink's Interoperability Protocol, Connecting Blockchains to ‘Bank Chains,’ Goes Live (https://www.coindesk.com/tech/2023/07/17/chainlinks-interoperability-protocol-connecting-blockchains-to-bank-chains-goes-live/)
-
"Zero Cost'' Majority Attacks on Permissionless Blockchains (https://www.nber.org/papers/w31473)
-
Regional Banks Battle for Deposits With Tougher US Rules Looming (https://www.bloomberg.com/news/articles/2023-07-17/regional-banks-battle-for-deposits-with-tougher-us-rules-looming)
-
Via Sam Ostler—The Fog of (Deposits) War (https://workweek.com/2023/07/21/the-fog-of-deposit-war/)
-
Branches Make Bank Runs Harder (https://www.bloomberg.com/opinion/articles/2023-07-17/branches-make-bank-runs-harder)
-
Crypto’s New Favorite Bank Is Reluctant to Accept the Title (https://www.bloomberg.com/news/articles/2023-07-17/after-ftx-and-silvergate-customers-bank-cubi-becomes-crypto-s-favorite-bank#xj4y7vzkg)
-
US law enforcement seizes tens of millions from Deltec-tied accounts (https://www.theblock.co/post/240303/us-law-enforcement-seizes-tens-of-millions-from-deltec-tied-accounts)
-
Banking customers have "woken up," Citizens CEO says (https://www.axios.com/2023/07/20/banking-deposits-citizens-interest)
-
Crypto CEO sizes up the next bull (https://www.axios.com/newsletters/axios-crypto-9b4ca537-0edf-454a-9bbf-f9d44bdc102c.html)
-
SEC Accepts Valkyrie Bitcoin ETF Proposal for Official Review (https://decrypt.co/148969/sec-accepts-valkyrie-bitcoin-etf-proposal-for-official-review)
-
Binance Lays Off Over 1,000 Employees (https://www.wsj.com/articles/binance-lays-off-over-1-000-employees-d59ff6ad)
-
Gnosis launches Visa card that lets you spend self-custody crypto in Europe, soon US and Hong Kong (https://techcrunch.com/2023/07/17/gnosis-has-a-visa-card-that-lets-you-spend-self-custodial-crypto-in-europe-soon-us-and-hong-kong/)
-
Visa, Mastercard Hit With Antitrust Suit Over Credit Card Fees (https://news.bloomberglaw.com/antitrust/visa-mastercard-hit-with-antitrust-suit-over-credit-card-fees-1)
-
Hollywood’s Angry Creators Show Why Web3 Is Needed (https://www.coindesk.com/consensus-magazine/2023/07/14/hollywoods-angry-creators-show-why-web3-is-needed/)
https://hardyaka.substack.com/p/260the-sec-signals-appeal
-
-
@ fa0165a0:03397073
2023-07-24 10:19:27Below is an easy-to-read list of keyboard shortcuts and commands to navigate your Linux computer efficiently: (Note that some variations between systems may apply)
General Shortcuts: Open Terminal: Ctrl + Alt + T Close current application: Alt + F4 Switch between open applications: Alt + Tab Logout from current session: Ctrl + Alt + Del Navigating the File System: Open File Manager (Nautilus): Super (Windows key) + E Move back in directory: Alt + Left Arrow Move forward in directory: Alt + Right Arrow Go to Home directory: Ctrl + H Go to Desktop: Ctrl + D Open a folder or file: Enter Rename a file or folder: F2 Copy selected item: Ctrl + C Cut selected item: Ctrl + X Paste copied/cut item: Ctrl + V Delete selected item: Delete Create a new folder: Ctrl + Shift + N Navigating Applications: Switch between open windows of the same application: Alt + ` Close the current window: Ctrl + W Minimize the current window: Ctrl + M Maximize/Restore the current window: Ctrl + Super + Up Arrow / Down Arrow Navigating Web Browsers (e.g., Firefox, Chrome): Open a new tab: Ctrl + T Close the current tab: Ctrl + W Switch to the next tab: Ctrl + Tab Switch to the previous tab: Ctrl + Shift + Tab Open a link in a new tab: Ctrl + Left Click Go back in the browser history: Alt + Left Arrow Go forward in the browser history: Alt + Right Arrow System Controls: Lock the screen: Ctrl + Alt + L Open the system menu (context menu): Menu key (or Right-click key) or Shift + F10 Open the Run Command prompt: Alt + F2
These shortcuts may vary slightly depending on the Linux distribution and desktop environment you are using. Experiment with these shortcuts to navigate your Linux system faster and more efficiently without relying on the mouse.
Since websites are such an important interface for the information of today, I have here appended the list with some navigational hotkeys for web browsers (e.g., Firefox, Chrome) on Linux:
General Navigation: Scroll down: Spacebar Scroll up: Shift + Spacebar Scroll horizontally: Hold Shift and scroll with the mouse wheel or arrow keys Go to the top of the page: Home Go to the bottom of the page: End Refresh the page: F5 or Ctrl + R Stop loading the page: Esc Link and Page Navigation: Move focus to the next link or interactive element: Tab Move focus to the previous link or interactive element: Shift + Tab Activate/follow a link or button: Enter Open link in a new tab: Ctrl + Enter (Cmd + Enter on macOS) Open link in a new background tab: Ctrl + Shift + Enter (Cmd + Shift + Enter on macOS) Open link in a new window: Shift + Enter Go back to the previous page: Backspace or Alt + Left Arrow Go forward to the next page: Alt + Right Arrow Searching: Find text on the page: Ctrl + F Find next occurrence: Ctrl + G Find previous occurrence: Ctrl + Shift + G Tab Management: Open a new tab: Ctrl + T Close the current tab: Ctrl + W Reopen the last closed tab: Ctrl + Shift + T Switch to the next tab: Ctrl + Tab Switch to the previous tab: Ctrl + Shift + Tab Switch to a specific tab (numbered from left to right): Ctrl + [1-8] Switch to the last tab: Ctrl + 9 Form Interaction: Move to the next form field: Tab Move to the previous form field: Shift + Tab Check/uncheck checkboxes and radio buttons: Spacebar Select an option from a dropdown menu: Enter, then arrow keys to navigate options Miscellaneous: Open the browser's menu: Alt (sometimes F10) Open the address bar (omnibox): Ctrl + L or Alt + D
Remember, the accessibility of websites can vary, and some sites might have different keyboard navigation implementations. In some cases, you may need to enable keyboard navigation in the browser's settings or extensions. Additionally, browser updates might introduce changes to keyboard shortcuts, so it's always good to check the latest documentation or help resources for your specific browser version.
But I hope this helps as an tldr and getting started with navigating your laptop the ways pro role.
Version controlled over at github gist.
-
@ c8df6ae8:22293a06
2023-07-24 04:30:59The Kennedy administration will begin to back the US dollar with real, finite assets such as gold, silver, platinum and Bitcoin, which is the world's hardest liquid asset, to strengthen the US dollar and guarantee its continued success as the global reserve currency.
— Robert F. Kennedy Jr.Welcome to the latest issue of the Bitcoin For Families newsletter. This issue covers the potential implications of a Bitcoin backed US dollar.
What are the implications of a Bitcoin backed US dollar?
On July 19th, presidential candidate Robert Kennedy Jr gave a speech at a PAC event where he declared the plans of his administration to, at least partially, back the US dollar with gold, silver, platinum and Bitcoin.
You can watch the whole 10 minutes speech here:
What could happen if RFK Jr. does get elected and goes forward with this promise? Let’s look at some scenarios.
What will the RFK administration do?
RFK Jr. said he would back 1% of the treasury bills (T-Bills) issued by the treasury with gold, silver, platinum and Bitcoin.
T-Bills are short-term securities issued by the government with a maturity rate of 4, 8,13, 17, 26 or 52 weeks. The interest rate is set based on the offers done by those bidding on the auction. For example, a recent auction of 26 week T-Bills closed with an interest rate of 5.25%.
Let’s assume that Bitcoin is priced at $32,000 US dollars and that you buy a 26 weeks T-Bill worth $100 and backed by Bitcoin. This would mean that the US government must have possession of 312,500 satoshi (0.00312500 BTC) to back this T-Bill and you should have the option to exchange the T-Bill for that amount of Bitcoin at the end of the 26 weeks.
What would happen if after 26 weeks, the US dollar became weaker than Bitcoin and the exchange rate is now $34,000? Now you only need 294,118 satoshis to back the $100 T-Bill and since the US government had set aside 312,500 satoshi, then all is good.
What would happen if after 26 weeks, the US dollar became stronger than Bitcoin and the exchange rate is now $28,000? Now you need 357,143 satoshi to back the T-Bill and since the US government had set aside 312,500 satoshi, they would need to purchase 44,643 more satoshi to continue to back the T-Bill.
I doubt the US government will be willing to take this exchange rate risk with its debt obligations.
Therefore, the most likely scenario is that the US government sets a fixed exchange rate for the maturity life of the T-Bill. Maybe equal to the exchange rate at the time of the auction.
This means that after 26 weeks you could exchange your T-Bill for 312,500 satoshi no matter what the actual exchange rate is at that point.
What will this do to the price of Bitcoin or the US dollar?
-
The US dollar will get stronger when compared against other fiat currencies not backed by anything:
The US government will send a very strong signal to the world that Bitcoin is the new gold and a very valid store of value. The world’s hardest liquid asset.
Therefore, backing the US dollar with Bitcoin will make the US dollar stronger when compared with other fiat currencies.
-
The US dollar will get weaker when compared against Bitcoin:
The demand for Bitcoin by the US government will put upward pressure on the exchange rate for Bitcoin against all fiat currencies, including the US dollar.
-
A continued policy of expanding the amount of T-Bills backed by Bitcoin will only exacerbate this process, making the US dollar stronger against other countries currencies and driving the price of Bitcoin up both against the US dollar and by extension other fiat currencies (which by definition are now weaker than the US dollar).
What will investors do?
Investors will demand either the same or maybe even lower interest rates for Bitcoin backed T-Bills with the assumption that the Bitcoin amount backing the T-Bill will be worth more after 26 weeks.
The scenario where investors demand higher interest rates because they believe that Bitcoin will get weaker is unlikely since, even if this happens, the T-Bills are denominated in US dollars and investors won’t be forced to redeem the T-Bill for Bitcoin at the end of the 26 weeks.
What will other countries do?
At first, other countries will just watch and see.
But the upward pressure on the price of Bitcoin will make a US T-Bill more attractive than its European Central Bank equivalent causing the Euro to lose value compared against the US dollar.
The same applies to any other fiat currency (not backed by anything).
Other countries will be forced to back some of their short-term debt with Bitcoin to avoid having to pay higher interest rates to counteract the higher attractiveness of the US T-Bill.
The consolidation of Bitcoin as store of value
If all countries start using Bitcoin to back their debt, that will consolidate Bitcoin as the best store of value.
Bitcoin has to first settle as a store of value before it can be used as a medium of exchange and unit of account (what is commonly known as hyperbitcoinization). This possible action by the US government might well be the linchpin that triggers the hyperbitcoinization.
If the other countries do nothing, the US dollar will cement itself as the global reserve currency and the hyperbitcoinization will still happen, just a bit slower since there will be no demand from other treasuries.
Notable notes
nostr:note1dgh2ga7q397huzfcf9ah06ptvcxxwcmfx5yhctw0rh4t6ylvud4s0nrn75
Recommendations
Max DeMarco
Max is the creator of a great documentary about social media and why we need Nostr.
Watch the documentary here:
You can follow Max here.
Bitcoin Therapy 🧠
Level up your Bitcoin knowledge in 3 minutes...every Sunday
Check it out here.
What did you think of today's newsletter?
Your feedback helps me create the best newsletter possible for you.
Please leave a comment and checkout comments from other subscribers and readers. I love hearing from the Bitcoin For Families community ❤️ 🙏🏻
Buy Bitcoin with Swan
If you want to buy Bitcoin, I highly recommend using Swan. They are a Bitcoin only business that is focused on self-custody and educating their users. It's where I buy my Bitcoin.
Use this link to receive $10 free to get you started.
See you again next week! — Alejandro
This newsletter is for educational purposes. It does not represent financial advice. Do your own research before buying Bitcoin.
-
-
@ 1bc70a01:24f6a411
2023-07-23 12:11:45This is an old but timeless post I wrote on October 26, 2022.
90% of startups fail. That's the statistic.
It feels true to me. Judging by startup Twitter it seems most startups disappear before the 2 year mark. Some, much sooner.
Most people imagine the startup journey to be like this:
People think you can go from idea to a shipped product fast. After launch it's all happy times and success. We fool ourselves into believing this because we must. Otherwise, it's hard to start.
In reality, it's something like this:
50% quit at the idea stage. I'm making rough calls, not an exact science.
Ideas are easy, but acting is hard. Most people will just stop at the idea. Some may look into it, register a domain (you know who you are 👀) and stop there.
Those who undertake the journey will build for 3-5 days and see some other "better" idea. This is called the shiny object syndrome. Sixty percent of people will quit at the shiny object and start working on something else. Of course, they'll register a domain first!
Ignored the shiny object? Good for you! This is where it starts getting tough.
80% will quit before the "project" is finished. The last 20% of the project feels so close, yet so far away that you wonder if you've made the wrong decision all along. Doubt creeps in. You start thinking - "why bother?" and "this is not going to work out, it was a dumb idea".
The heroic few will get through the grind stage and finish their project. This is where they will call themselves a startup - but they are still a project.
In a great anticipating to the "launch", many founders will fall from the pedestal soon after. Launches are a non-event for most projects. Lucky few gain customers and traction, but the vast majority will disappear in the coming weeks.
That leaves us with the 20% crusaders. The tough bastards who will not give up immediately after the launch. They'll keep pushing. And pushing... and pushing. Until they meet a wall of despair.
The wall of despair makes everything seem hopeless. You've tried. You keep trying. But, nothing happens.
This idea has no legs. This was all a giant mistake! Shut it all down. Go back to your regular job. This was never meant to be.
Sadly, this is just the point where things start getting interesting. But, our hero (or actually 90% of them) give up for good.
For most, this will be around the year 1 mark. For some year 2 or even 3 if they pivoted a few times. It's really hard to keep going at this point.
The glorious few - the supposed 10% (I actually think it's about 2%) start seeing traction. All the pain and the agony of getting to this point is finally worth it.
From here, things can take as long as 1 year, all the way up to 5 years+ to see meaningful growth that pays all the bills and then some.
Startups are a helluva ride. Only the toughest survive. But, it doesn't end there.
Even 50% of successful startups will seize to exist just before year 5. The remain half may make it to year 9, but even the vast majority of those will disappear before the decade's end. Only about 30% of the 10% successful startups make it past one decade.
But none of this matters! If you are a new founder reading this, you know you're the exception. You will succeed! You were chosen.
I joke, but, don't give up. I believe in you. What's the downside in doing so?
-
@ 82fa3b0c:8f50d0f5
2023-07-23 08:42:26On the night of Saturday, July 22nd (U.S. time), Twitter's owner, Elon Musk, tweeted a vote to "change the platform color from the current blue to black." He later tweeted, "And soon, we'll bid farewell to the Twitter brand, and gradually to all the birds as well."
"If an excellent X logo is posted tonight, we'll unveil it to the world tomorrow," he added.
Following this tweet, numerous users have posted their designs for the "X" logo.
Musk later tweeted things like "Deus X" (Deus Ex?) and "We shouldn't make appliances too 'smart'," making the logo change tweet seem like a passing whim on a Saturday night.
In April, he temporarily changed Twitter's logo to a Shiba Inu dog, only to revert it shortly after.
At the time of completing the Twitter acquisition, Musk had tweeted, "Acquiring Twitter facilitates the construction of the X app." This suggests that there's a possibility of renaming Twitter to the "X" brand. Articles speculating such possibilities have been scattered around. What's worth recalling here is Elon Musk's ambition, X.com. He might not be looking to rebrand Twitter, but perhaps replace Twitter with a super-app named "X." Twitter has become deeply embedded in our daily lives, and when something goes wrong with Twitter, we're quick to blame "someone." People complain about centralized power structures when faced with account suspensions or censorship. Today, Elon simply tweeted "侘寂."
Let's remember when Jack stepped down from the CEO position of Twitter, his one-word tweet was "I love Twitter." Perhaps the Twitter we've known and loved may come to an end tonight. Did he tweet "侘寂" mourning the end of Twitter? It would be sad to see that future, but this might be the shining moment for Nostr. However, just like Twitter scaled up during the Arab Spring, protocols that spread due to conflicts might truly embody "侘寂."
-
@ 5fd693e6:bf6061bb
2023-07-22 22:18:17WHAT IS NOSTR ADDRESS
Nostr Address = NIP 05 identifier NIP = a Nostr Implementation Possible
“Mapping Nostr keys to DNS-based internet identifiers”
it Maps your PubKey to URLYou should first read the actual NIP 05 spec, hopefully the following can make sense of that for end users.
a Nostr Address is how you create a readable unique handle. anyone can be @dave and there can be multiple @dave's on nostr, only one person can be dave@dave.com
In some cases, it’s an added layer of verification. If your Nostr Address ID is @stephenasmith@espn.com that’s a pretty strong indicator that this is the real Stephen A Smith, the only way to accomplish this is to have access to edit espn.com.
Personally, I use a similar handle across the web, and wanted to vanity my nip in the same fashion, just like on legacy new media, I am the only one who will have this name.
My philosophy here is, you own your own private key for NOSTR, so why have an address that’s a po box?
If you aren’t ready to pay for a domain or hosting, github offers you the chance to learn how to do this without spending money. BenGWeeks has written this guide Using GitHub Pages for NIP-05 Identifiers.
This results in his nostr address being Ben@BenGWeeks.github.io This is a great free way to set up a nostr address if you are ok with having github.io in your identifier. (Don’t miss steps 3-6 in his guide, you have to Deploy it as Static HTML.)
There is nothing wrong with supporting a NIP 05 provider services, or choosing someone kind enough to add you to theirs for free. This might serve your purposes just fine. Since we are all here learning this new protocol, I think it’s nice to learn or revisit publishing with the Hypertext Transfer Protocol (HTTP).
LET’S GET STARTED
You are going to create a webpage with a file path that looks like this: https://example.com/.well-known/nostr.json https://bengweeks.gihub.io/.well-known/nostr.json
STEP 1: Create /.well-know/nostr.json/
on github:
add file > create new file > name it /.well-know/nostr.json/ this will create both a folder and a file named nostr.json
on a self hosted server:
your hosting provider most likely has a file editor that can accomplish creating folders and files and provides a text editor. If you did this on github first, you can download these files and upload them to your new host.
Copy the following to the newly create nostr.json file
{ "names": { "bob": "b0635d6a9851d3aed0cd6c495b282167acf761729078d975fc341b22650b07b9" } }
Replace “bob” with your name and replace the long string of characters with the hex version of your pubkey (convert your npub key at damus.io/key)
DOMAIN AS AN IDENTIFIER
My username is yunginternet and my domain is yunginter.net and I wanted my Nostr Address to be @yunginter.net not zach@yunginter.net so you replace the name with an underscore.
My nostr.json file looks like:
{ "names": { "_": "5fd693e61a7969ecf5c11dbf5ce20aedac1cea71721755b037955994bf6061bb" } }
This results in my Nostr Address identifier being: _@yunginter.net
When I go to metadata.nostr.com/ or another client that allows me to edit my Nostr Address (they might still call it NIP 05 identifer) I will enter: _@yunginter.net
However, one should “expect Nostr clients to show and treat that as just @yunginter.net for all purposes.”
I like this because as on legacy new media, it just has one at sign in the identifier, instead of users having to type @bob@bob.com which looks like an email, both to human readers and operating systems, not a handle like @yunginter.net
STEP 2: CORS
You have to turn on CORS for your site. CORS stands for Cross-Origin Resource Sharing. This makes the json “get”-able.
CORS ON GITHUB PAGES
If you are following this tutorial from ben, Github.io pages have CORS enabled by default.
CORS ON A SELF-HOSTED WEBSITE
I tried to set up github with a custom domain pointing at github, and that seemed to not pass the allow access file. I still wanted my custom domain so I went to move my github page to a hosting provider.
In addition to registering a domain, you will also have to rent or set up web hosting, and maintain an SSL cert.
Fundamentally you need to add this to a .htaccess file: I didn’t have a .htaccess file, so my hosting provider had me create one in their file browser in the root directory of my site.
Header set Access-Control-Allow-Origin "*"
It needs to be formatted based on the type of web server.
It’s easier to just ask your hosting provider “how do i properly add CORS to a .htaccess file” than to figure out how their server software wants it formatted. You can search their documentation or simply reach out to their customer support.
How this is formatted depends on the type of web server software your hosting provider is running, mine suggested i do it like the following because they are running apache:
<IfModule mod_headers.c> Header set Access-Control-Allow-Origin "*" </IfModule>
But yours might suggest you do it like the following because they are running jetty:
This is why it’s just easier to reach out to them.
<filter> <filter-name>cross-origin</filter-name> <filter-class>org.eclipse.jetty.servlets.CrossOriginFilter</filter-class> </filter> <filter-mapping> <filter-name>cross-origin</filter-name> <url-pattern>/*</url-pattern> </filter-mapping>
Once you save your .htaccess file you should be good to go.
STEP 3: UPDATE METADATA
Visit your https://example.com/.well-known/nostr.json page If you see this CORS json viewer like on this page you are all set.
Head to a client that allows you to input your Nostr Address (NIP 05 identifier) in your profile and you’re all set.
-
@ 5afa711a:eae0d7b8
2023-07-22 21:35:11Prompted by recent discussions about the issue of obesity in the EU and the US, as well as personal reflections on the problem, I've decided to offer my two cents coming from a biochemical, anthropological and medical perspective.
tl;dr People in developed countries are obese due to modern diets that don't align with human evolution. Grains are harmful to humans. The only effective diets for long-term weight loss are the vegetarian and a paleo-ketogenic diet (PKD). The PKD, or carnivore diet, is superior and better suited to human evolution.
Firstly, a brief overview of epidemiology and the obesity issue. The proportion of overweight adults in the EU varied in 2019 between 37 % in Italy and 58 % in Croatia for women, and between 53 % in France and 73 % in Croatia for men. The prevalence of obesity and overweight individuals is consistently increasing worldwide, along with rates of type 2 diabetes (DM2) and cardiovascular diseases. Cardiovascular diseases (CVDs) are the number one cause of death globally, with diabetes, arterial hypertension, obesity, and smoking being the main contributing factors. Other factors, such as physical inactivity and hyperlipidemia, also play a role but to a lesser extent. Smoking rates are declining, making diabetes and obesity the most significant health problems in modern society (arterial hypertension being a complication of diabetes). Both type 2 diabetes (DM2) and obesity are consequences of modern dietary patterns, and they are mutually connected.
So, how do we address the obesity problem? First, let's talk about the Randle Cycle. It is a biochemical concept in human physiology where cells preferentially utilize fats in the presence of excess fat and inhibit glucose consumption, while in the presence of excess glucose, they preferentially utilize glucose and inhibit fat consumption. The worst thing for the human body is a diet rich in both glucose and fat because it leads to simultaneous fat storage and inhibition of glucose transporters, preventing glucose entry into cells. Elevated insulin levels, which fail to decrease blood glucose levels, lead to insulin resistance (i.e. DM2), and also contribute to obesity due to fat storage. Moreover, this excess fat accumulates as visceral or deep fat, which is hormonally active and negatively affects human health.
Foods that are simultaneously rich in fats and carbohydrates naturally occur only in breast milk. However, throughout history, humans became adept at combining these two macronutrients, which is evident in most junk foods and unhealthy diets today. It's not even necessary for them to be chemically combined in the same mass; one only needs to look at a typical household lunch plate. Lunch typically means a combination of a fatty meat portion and some rich source of carbohydrates, usually bread, potatoes, and/or pasta. This is often followed by dessert, such as ice cream or cake, which again combines fats and carbohydrates.
Now, let's address the caloric method of counting calories (Calories in, Calories out, i.e., CICO). A calorie is a unit of energy released by burning food in a calorimeter. It means that a piece of wood and a piece of meat can have the same number of calories. Calories are a unit imported into human physiology from physics and should never signify more than a simple approximation of the energy value of food because our body is not a closed thermodynamic system or a furnace. You can lose a lot of weight by counting calories (I have in the past), but in the long run, it always leads to a nutritional deficit, and you are in a perpetual battle with hunger, constantly mentally keeping track of how many calories each food has. This is an inferior approach to nutrition because it's not sustainable in the long term and reduces quality of life.
If you follow the biochemical reality of human physiology, i.e., the Randle Cycle, you'll see that you have two choices: either consume carbohydrates with minimal fat or consume fats with minimal carbohydrates. It's time for some anthropology. It's simply not true that humans are omnivores, as we were taught in schools. For the last 10,000 years, humans were omnivorous because we adopted a sedentary lifestyle and started doing agriculture. For 300,000 years before that however, we were hunters-gatherers, and our diet was predominantly composed of meat. The plant matter we gathered consisted mostly of fibrous substances with little sugar, occasionally supplemented by feasts when we had access to honey and berries. It's worth noting that modern fruits and vegetables are completely different from ancient varieties and contain significantly more sugar. Just look at the wild variations of today's fruits to understand the conditions our ancestors lived in. Wherever the remains of hunters and farmers are found together, we see that hunters were on average taller, had perfect dentition (no cavities), and lacked arthritic bone changes (since they weren't plowing the ground all day). From a health perspective, the agricultural revolution was a catastrophe for humanity. We depleted all large game and started farming.
Enter grains. Grains are a type of grass that humans domesticated at the beginning of the agricultural revolution. People never consumed them before that time. In short, grains are not suitable for human consumption, and the standard food pyramid has caused significant harm to the human race by including this type of food as its foundation. If there's one thing you take away from my post, it's that grains are the most unhealthy food that people can eat, but which make up 70% of all consumed human calories. Like all plants, but with grains even more so, they contain antinutrients, are generally poor in other nutrients in general, and contain a type of starch that is rapidly absorbed into the bloodstream. Technically, it's better to eat a teaspoon of white sugar than a slice of bread if you're diabetic. Wheat is in a particular category of its own since it contains psychoactive substances. People are literally addicted to bread; just try to give up this food for a few days, and you'll probably understand why it's so challenging. Grains have no place in any "balanced" diet, and their presence on the plate should be 0%. Therefore, the number one advice for weight loss and improving health is complete elimination of grains and fast-food junk from your diet.
Considering that humans are evolutionarily closer to carnivores than omnivores and especially herbivores, I believe that the optimal choice for a healthier diet is the paleo-ketogenic diet (PKD), also called the carnivore diet. You can also opt for a vegetarian diet, consuming lean meat (protein needs to come from somewhere, and plant-based proteins are inferior to animal proteins), with predominantly fruits and vegetables, but you need to be aware that you eventually will develop a severe deficiency in certain nutrients. You'll need to supplement your diet with iron, vitamin B12, and other substances. As I mentioned earlier, plants are generally less nutritious than meat, and you need to eat a larger volume of plants to extract enough nutrients from them. However, these nutrients are a) of lesser quality and less bioavailable than animal variants, and b) are typically accompanied by a large amount of anti-nutrients such as lectins and similar molecules, which block the absorption of other nutrients (e.g. having green salad with chicken breast reduces the nutritional value of the chicken).
If you decide to try PKD, please consult your doctor first. I'm not sure how it would affect people who are already burdened with CVD, but from personal experience, I can tell you that I lost 15 kg in 2 months and feel better than ever before. I monitor my blood parameters every 3 months, but I'm not interested in going back to my old diet and obsessively counting calories. If you have excess weight and are otherwise healthy, give it a try; it might change your life as it did for me.
-
@ 8fb140b4:f948000c
2023-07-22 09:39:48Intro
This short tutorial will help you set up your own Nostr Wallet Connect (NWC) on your own LND Node that is not using Umbrel. If you are a user of Umbrel, you should use their version of NWC.
Requirements
You need to have a working installation of LND with established channels and connectivity to the internet. NWC in itself is fairly light and will not consume a lot of resources. You will also want to ensure that you have a working installation of Docker, since we will use a docker image to run NWC.
- Working installation of LND (and all of its required components)
- Docker (with Docker compose)
Installation
For the purpose of this tutorial, we will assume that you have your lnd/bitcoind running under user bitcoin with home directory /home/bitcoin. We will also assume that you already have a running installation of Docker (or docker.io).
Prepare and verify
git version - we will need git to get the latest version of NWC. docker version - should execute successfully and show the currently installed version of Docker. docker compose version - same as before, but the version will be different. ss -tupln | grep 10009- should produce the following output: tcp LISTEN 0 4096 0.0.0.0:10009 0.0.0.0: tcp LISTEN 0 4096 [::]:10009 [::]:**
For things to work correctly, your Docker should be version 20.10.0 or later. If you have an older version, consider installing a new one using instructions here: https://docs.docker.com/engine/install/
Create folders & download NWC
In the home directory of your LND/bitcoind user, create a new folder, e.g., "nwc" mkdir /home/bitcoin/nwc. Change to that directory cd /home/bitcoin/nwc and clone the NWC repository: git clone https://github.com/getAlby/nostr-wallet-connect.git
Creating the Docker image
In this step, we will create a Docker image that you will use to run NWC.
- Change directory to
nostr-wallet-connect
:cd nostr-wallet-connect
- Run command to build Docker image:
docker build -t nwc:$(date +'%Y%m%d%H%M') -t nwc:latest .
(there is a dot at the end) - The last line of the output (after a few minutes) should look like
=> => naming to docker.io/library/nwc:latest
nwc:latest
is the name of the Docker image with a tag which you should note for use later.
Creating docker-compose.yml and necessary data directories
- Let's create a directory that will hold your non-volatile data (DB):
mkdir data
- In
docker-compose.yml
file, there are fields that you want to replace (<> comments) and port “4321” that you want to make sure is open (check withss -tupln | grep 4321
which should return nothing). - Create
docker-compose.yml
file with the following content, and make sure to update fields that have <> comment:
version: "3.8" services: nwc: image: nwc:latest volumes: - ./data:/data - ~/.lnd:/lnd:ro ports: - "4321:8080" extra_hosts: - "localhost:host-gateway" environment: NOSTR_PRIVKEY: <use "openssl rand -hex 32" to generate a fresh key and place it inside ""> LN_BACKEND_TYPE: "LND" LND_ADDRESS: localhost:10009 LND_CERT_FILE: "/lnd/tls.cert" LND_MACAROON_FILE: "/lnd/data/chain/bitcoin/mainnet/admin.macaroon" DATABASE_URI: "/data/nostr-wallet-connect.db" COOKIE_SECRET: <use "openssl rand -hex 32" to generate fresh secret and place it inside ""> PORT: 8080 restart: always stop_grace_period: 1m
Starting and testing
Now that you have everything ready, it is time to start the container and test.
- While you are in the
nwc
directory (important), execute the following command and check the log output,docker compose up
- You should see container logs while it is starting, and it should not exit if everything went well.
- At this point, you should be able to go to
http://<ip of the host where nwc is running>:4321
and get to the interface of NWC - To stop the test run of NWC, simply press
Ctrl-C
, and it will shut the container down. - To start NWC permanently, you should execute
docker compose up -d
, “-d” tells Docker to detach from the session. - To check currently running NWC logs, execute
docker compose logs
to run it in tail mode add-f
to the end. - To stop the container, execute
docker compose down
That's all, just follow the instructions in the web interface to get started.
Updating
As with any software, you should expect fixes and updates that you would need to perform periodically. You could automate this, but it falls outside of the scope of this tutorial. Since we already have all of the necessary configuration in place, the update execution is fairly simple.
- Change directory to the clone of the git repository,
cd /home/bitcoin/nwc/nostr-wallet-connect
- Run command to build Docker image:
docker build -t nwc:$(date +'%Y%m%d%H%M') -t nwc:latest .
(there is a dot at the end) - Change directory back one level
cd ..
- Restart (stop and start) the docker compose config
docker compose down && docker compose up -d
- Done! Optionally you may want to check the logs:
docker compose logs
-
@ b12b632c:d9e1ff79
2023-07-21 19:45:20I love testing every new self hosted app and I can say that Nostr "world" is really good regarding self hosting stuff.
Today I tested a Nostr relay named Strfry.
Strfry is really simple to setup and support a lot's of Nostr NIPs.
Here is the list of what it is able to do :
- Supports most applicable NIPs: 1, 2, 4, 9, 11, 12, 15, 16, 20, 22, 28, 33, 40
- No external database required: All data is stored locally on the filesystem in LMDB
- Hot reloading of config file: No server restart needed for many config param changes
- Zero downtime restarts, for upgrading binary without impacting users
- Websocket compression: permessage-deflate with optional sliding window, when supported by clients
- Built-in support for real-time streaming (up/down/both) events from remote relays, and bulk import/export of events from/to jsonl files
- negentropy-based set reconcilliation for efficient syncing with remote relays
Installation with docker compose (v2)
Spoiler : you need to have a computer with more than 1 (v)Core / 2GB of RAM to build the docker image locally. If not, this below might crash your computer during docker image build. You may need to use a prebuilt strfry docker image.
I assume you've read my first article on Managing domain with Nginx Proxy Manager because I will use the NPM docker compose stack to publish strfry Nostr relay. Without the initial NPM configuration done, it may not work as expected. I'll use the same docker-compose.yml file and folder.
Get back in the "npm-stack" folder :
cd npm-stack
Cloning the strfry github repo locally :
git clone https://github.com/hoytech/strfry.git
Modify the docker-compose file to locate the strfry configuration data outside of the folder repo directory to avoid mistake during futures upgrades (CTRL + X, S & ENTER to quit and save modifications) :
nano docker-compose.yml
You don't have to insert the Nginx Proxy Manager part, you should already have it into the file. If not, check here. You should only have to add the strfry part.
``` version: '3.8' services: # should already be present into the docker-compose.yml app: image: 'jc21/nginx-proxy-manager:latest' restart: unless-stopped ports: # These ports are in format
: - '80:80' # Public HTTP Port - '443:443' # Public HTTPS Port - '81:81' # Admin Web Port # Add any other Stream port you want to expose # - '21:21' # FTP # Uncomment the next line if you uncomment anything in the section # environment: # Uncomment this if you want to change the location of # the SQLite DB file within the container # DB_SQLITE_FILE: "/data/database.sqlite" # Uncomment this if IPv6 is not enabled on your host # DISABLE_IPV6: 'true' volumes: - ./nginxproxymanager/data:/data - ./nginxproxymanager/letsencrypt:/etc/letsencrypt
strfry-nostr-relay: container_name: strfry build: ./strfry volumes: - ./strfry-data/strfry.conf:/etc/strfry.conf - ./strfry-data/strfry-db:/app/strfry-db
ports is commented by NPM will access through docker internal network
no need to expose strfry port directly to the internet
ports:
- "7777:7777"
```
Before starting the container, we need to customize the strfry configuration file "strfry.conf". We'll copy the strfry configuration file and place it into the "strfry-data" folder to modify it with our own settings :
mkdir strfry-data && cp strfry/strfry.conf strfry-data/
And modify the strfry.conf file with your own settings :
nano strfry-data/strfry.conf
You can modify all the settings you need but the basics settings are :
- bind = "127.0.0.1" --> bind = "0.0.0.0" --> otherwise NPM won't be able to contact the strfry service
-
name = "strfry default" --> name of your nostr relay
-
description = "This is a strfry instance." --> your nostr relay description
-
pubkey = "" --> your pubkey in hex format. You can use the Damu's tool to generate your hex key from your npub key : https://damus.io/key/
-
contact = "" --> your email
``` relay { # Interface to listen on. Use 0.0.0.0 to listen on all interfaces (restart required) bind = "127.0.0.1"
# Port to open for the nostr websocket protocol (restart required) port = 7777 # Set OS-limit on maximum number of open files/sockets (if 0, don't attempt to set) (restart required) nofiles = 1000000 # HTTP header that contains the client's real IP, before reverse proxying (ie x-real-ip) (MUST be all lower-case) realIpHeader = "" info { # NIP-11: Name of this server. Short/descriptive (< 30 characters) name = "strfry default" # NIP-11: Detailed information about relay, free-form description = "This is a strfry instance." # NIP-11: Administrative nostr pubkey, for contact purposes pubkey = "" # NIP-11: Alternative administrative contact (email, website, etc) contact = "" }
```
You can now start the docker strfry docker container :
docker compose up -d
This command will take a bit of time because it will build the strfry docker image locally before starting the container. If your VPS doesn't have lot's of (v)CPU/RAM, it could fail (nothing happening during the docker image build). My VPS has 1 vCore / 2GB of RAM and died few seconds after the build beginning.
If it's the case, you can use prebuilt strfry docker image available on the Docker hub : https://hub.docker.com/search?q=strfry&sort=updated_at&order=desc
That said, otherwise, you should see this :
``` user@vps:~/npm-stack$ docker compose up -d [+] Building 202.4s (15/15) FINISHED
=> [internal] load build definition from Dockerfile 0.2s => => transferring dockerfile: 724B 0.0s => [internal] load .dockerignore 0.3s => => transferring context: 2B 0.0s => [internal] load metadata for docker.io/library/ubuntu:jammy 0.0s => [build 1/7] FROM docker.io/library/ubuntu:jammy 0.4s => [internal] load build context 0.9s => => transferring context: 825.64kB 0.2s => [runner 2/4] WORKDIR /app 1.3s => [build 2/7] WORKDIR /build 1.5s => [runner 3/4] RUN apt update && apt install -y --no-install-recommends liblmdb0 libflatbuffers1 libsecp256k1-0 libb2-1 libzstd1 && rm -rf /var/lib/apt/lists/* 12.4s => [build 3/7] RUN apt update && apt install -y --no-install-recommends git g++ make pkg-config libtool ca-certificates libyaml-perl libtemplate-perl libregexp-grammars-perl libssl-dev zlib1g-dev l 55.5s => [build 4/7] COPY . . 0.9s => [build 5/7] RUN git submodule update --init 2.6s => [build 6/7] RUN make setup-golpe 10.8s => [build 7/7] RUN make -j4 126.8s => [runner 4/4] COPY --from=build /build/strfry strfry 1.3s => exporting to image 0.8s => => exporting layers 0.8s => => writing image sha256:1d346bf343e3bb63da2e4c70521a8350b35a02742dd52b12b131557e96ca7d05 0.0s => => naming to docker.io/library/docker-compose_strfry-nostr-relay 0.0sUse 'docker scan' to run Snyk tests against images to find vulnerabilities and learn how to fix them
[+] Running 02/02
⠿ Container strfry Started 11.0s ⠿ Container npm-stack-app-1 Running ```You can check if everything is OK with strfry container by checking the container logs :
user@vps:~/npm-stack$ docker logs strfry date time ( uptime ) [ thread name/id ] v| 2023-07-21 19:26:58.514 ( 0.039s) [main thread ]INFO| arguments: /app/strfry relay 2023-07-21 19:26:58.514 ( 0.039s) [main thread ]INFO| Current dir: /app 2023-07-21 19:26:58.514 ( 0.039s) [main thread ]INFO| stderr verbosity: 0 2023-07-21 19:26:58.514 ( 0.039s) [main thread ]INFO| ----------------------------------- 2023-07-21 19:26:58.514 ( 0.039s) [main thread ]INFO| CONFIG: Loading config from file: /etc/strfry.conf 2023-07-21 19:26:58.529 ( 0.054s) [main thread ]INFO| CONFIG: successfully installed 2023-07-21 19:26:58.533 ( 0.058s) [Websocket ]INFO| Started websocket server on 0.0.0.0:7777
Now, we have to create the subdomain where strfry Nostr relay will be accessible. You need to connect to your Nginx Proxy Manager admin UI and create a new proxy host with these settings :
"Details" tab (Websockets support is mandatory!, you can replace "strfry" by whatever you like, for instance : mybeautifulrelay.yourdomain.tld)
"Details" tab:
"SSL" tab:
And click on "Save"
If everything is OK, when you go to https://strfry.yourdomain.tld you should see :
To verify if strfry is working properly, you can test it with the (really useful!) website https://nostr.watch. You have to insert your relay URL into the nostr.watch URL like this : https://nostr.watch/relay/strfry.yourdomain.tld
You should see this :
If you are seeing your server as online, readable and writable, you made it ! You can add your Nostr strfry server to your Nostr prefered relay and begin to publish notes ! 🎇
Future work:
Once done, strfry will work like a charm but you may need to have more work to update strfry in the near future. I'm currently working on a bash script that will :
- Updatethe "strfry" folder,
- Backup the "strfry.conf" file,
- Download the latest "strfry.conf" from strfry github repo,
- Inject old configuration settings into the new "strfry.conf" file,
- Compose again the stack (rebuilding the image to get the latest code updates),
- etc.
Tell me if you need the script!
Voilààààà
See you soon in another Fractalized story!
-
@ bcea2b98:7ccef3c9
2023-07-21 17:11:23The Bitcoin Improvement Proposal (BIP) 17 is a proposal to add a new opcode to Bitcoin's scripting system, and it also proposes a new 'standard' transaction type that uses this opcode. Here, I will explain each part of this proposal in simple terms.
BIP17 proposes the opcode
OP_CHECKHASHVERIFY
for the Bitcoin scripting system. An opcode is a type of operation that can be performed by a machine (in this case, the Bitcoin network). The opcode that BIP17 is proposing,OP_CHECKHASHVERIFY
, is a function that checks if the hash of the previous script matches the item at the top of the stack.The reason for introducing this opcode is to enable what is known as "pay-to-script-hash" transactions. These types of transactions allow the receiver of bitcoins to specify the transaction type needed to re-spend them, essentially shifting the responsibility of defining the conditions to redeem a transaction from the sender to the receiver.
The benefit of this is that it allows a sender to fund any arbitrary transaction, no matter how complicated, by using a fixed-length 20-byte hash. This makes it easier to handle in various interfaces, such as QR codes or copy-pasting.
The proposed opcode
OP_CHECKHASHVERIFY
works as follows:- It hashes the end of the previous script, starting from the last evaluated
OP_CODESEPARATOR
. - It then compares this hash with the item on top of the stack.
- If the hashes match, it proceeds with the script; if they don't match, the script fails immediately.
The new standard transaction type is defined as follows:
[20-byte-hash-value] OP_CHECKHASHVERIFY OP_DROP
This transaction type is redeemed by a standard scriptSig:
...signatures... OP_CODESEPARATOR {script}
The proposal also gives an example of how this might look for a one-signature-required transaction and a 2-of-3 multi-signature transaction.
The author of BIP17 believes this proposal would minimize changes needed to the existing infrastructure that sends funds to Bitcoin addresses, which would in turn allow for quicker adoption of multi-signature transactions.
Regarding backward compatibility, this BIP is not compatible with older implementations, and it might lead to a blockchain split if not handled carefully. The proposal includes a method for determining miner support for this BIP and a plan for a graceful upgrade if there is sufficient support.
- It hashes the end of the previous script, starting from the last evaluated
-
@ 5b8a50e6:bf7c189e
2023-07-21 16:47:49The Weekend #150—The problem with CBDCs
(https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbad54c3e-b351-4c32-9980-81e48edb57c3_3891x2506.jpeg)
Let’s start with some numbers from the Atlantic Council (https://www.atlanticcouncil.org/cbdctracker/):
130 countries, representing 98 percent of global GDP, are exploring a CBDC. In May 2020, only 35 countries were considering a CBDC. A new high of 64 countries are in an advanced phase of exploration (development, pilot, or launch).
…
19 of the G20 countries are now in the advanced stage of CBDC development. Of those, 9 countries are already in pilot. Nearly every G20 country has made significant progress and invested new resources in these projects over the past six months.
That there’s a consensus around the need for upgraded digital money shouldn’t be surprising. Faster, cheaper, and more inclusive payments are directly correlated with economic growth. Meanwhile, our legacy systems for money and payments are antiquated—slow, expensive, and in many cases, exclusive.
Then you have cryptocurrencies and stablecoins already demonstrating the potential forreal-time digital value out in the wild.
Naturally, countries are going to explore their own options. But while some are a bit ahead on the CBDC development front than others, it doesn’t appear that they’ve achieved the results they may have been hoping for—at least so far.
Here’s Chris Skinner (https://thefinanser.com/2023/07/why-cbdcs-fail-a-lack-of-trust-in-authorities) (via Greg Kidd):
For example, China ran a PoC of the eYuan during the 2022 Winter Olympics in Beijing but the adoption, by summer 2023, has been disappointing. They even gave away millions of dollars in digital yuan in several cities, such as Beijing and Shenzhen, encouraging citizens to use the virtual money but it did not succeed. Transactions using the currency totalled just 100 billion yuan ($14.5 billion) by the end of August 2022. Compare that with Alipay, one of two major payments apps (the other is WeChat Pay) in China, whose app was processing app $1.6 trillion each month on average — more than a thousand times the digital yuan’s monthly transaction volume at that time.
The same happened in Nigeria. Nigeria’s released their CBDC, the eNaira, in 2022 to widespread interest. However, as of October 2022, it barely had any usage within a country full of crypto-curious investors, and this has meant that there are views it will need to be redesigned and relaunched.
In fact, to put this in context, Nigeria has a shortage in the supply of Naira paper notes[2] and yet people don’t want to use the eNaira and, instead, prefer cryptocurrencies. With a total cryptocurrency transaction volume amounting to USD$400 million, Nigeria ranks third after the United States and Russia in their use of such currencies and, according to a 2020 online survey by Statista, 32% of participating Nigerians used cryptocurrencies, the highest proportion of any country in the world.
What’s the problem?
We’ve often discussed the overarching issue of society’s growing trust deficit. That it extends to institutions, according to Skinner (https://thefinanser.com/2023/07/why-cbdcs-fail-a-lack-of-trust-in-authorities), is why live CBDC projects haven’t experienced greater user adoption. In the context of emerging economies, that deficit only widens:
Because Nigerians enjoy trading and make over a million cryptocurrency transactions per month (figures as of 2020)[3][i] but, more than this, many African nations don’t trust governments or government issued currencies. Just look at Zimbabwe as an example or, on a wider horizon, Venezuela. It is why El Salvador and the Central African Republic adopted bitcoin as legal tender.[4] Another reason is that citizens are learning they can move money freely and easily, with no fees or intermediaries, across borders and peer-to-peer, in real-time. These are the major advantages of decentralised money.
Meanwhile, central banks, governments and regulators still try to encourage more adoption of CBDCs. For example, the Jamaican government introduced two incentive programmes in March 2023 to encourage Jamaicans to sign up for their CBDC, the JAM-DEX. Yet, once again, this was in response to disappointing adoption after the launch of JAM-DEX in summer 2022.
For example, once launched, the Jamaican government ran a consumer incentive to reward the first 100,000 Jamaicans who signed up for the JAM-DEX with a J$2,500 (USD$16) deposit. However, only 36,000 people took advantage of the scheme, and so it was extended to people who didn’t have bank accounts and simplified the KYC process. It still didn’t succeed.
These illustrations of centralised versus decentralised currencies clearly delineate between trust in the government and trust in the network. It appears today that, particularly in nations with unstable economies and rife corruption of those who are in power, that the citizens would prefer control of their money through a democratic network than a dictatorial machine.
That trust deficit isn’t just confined to emerging economies. Earlier this week, Presidential hopeful Ron Desantis promised to ban CBDCs if he were to be elected.
Here’s Coindesk (https://www.coindesk.com/policy/2023/07/17/ron-desantis-promises-to-ban-cbdcs-if-elected-president/):
“Done, dead, not happening in this country,” said DeSantis at the Family Leadership Summit in Iowa last Friday. “If I am the president, on day one, we will nix central bank digital currency.”
DeSantis has been an outspoken critic of CDBDs for allowing “government-sanctioned surveillance,” and in March signed a bill to prohibit the use of a national CBDC as money within Florida.
As for the broader subject of crypto, he’s been far more supportive, previously calling its use a question of civil liberty and describing bitcoin (BTC) as a “threat to the current regime.”
Central bank digital currencies, which are a tokenized form of a country’s fiat currency issued by the government, are becoming a growing wedge between political sides in the U.S., with the GOP, broadly speaking, not in favor, and the Democrats so far mostly silent on the subject.
As it stands, the U.S. is currently the odd man out among G7 central banks when it comes to CBDC development. That’s less worrying when you consider that pretty much all relevant stablecoins are denominated in U.S. dollars.
Elsewhere in digital money, here’s Calvin Burrows:
Russia and South Korea announce CBDC plans
-
Russia announced they will begin testing a digital Ruble CBDC in August. Russia’s higher legislative body passed a bill that gave legal authority to the CBDC, but President Vladimir Putin still needs to sign it before it becomes official.
-
From Decrypt: (https://decrypt.co/149238/russia-to-start-testing-digital-ruble-cbdc-in-august-barring-putins-veto) “Under the bill, Russians will be able to make payments and transfers from their digital wallets that would be within the central bank's platform or one of the partner banks that it will be working with. However, the CBDC can only be used for payments or transfers—not lending or deposits, according to the central bank.”
-
South Korea’s central bank published a report (https://t.co/kinzzxnMqT) that said they’re preparing for a future with a CBDC. From Cointelegraph: (https://cointelegraph.com/news/south-korea-central-bank-charts-future-payment-systems-cbdc) “The BOK will step up CBDC research, with plans to look at CBDC-based tokenized deposits and expand the scope of the research with the banks and the clearings institute.”
China gives an update on the digital yuan
-
Yi Gang, China’s central bank governor, said the country’s CBDC has been used in $250 billion worth of transactions since it was introduced in January 2022, but circulation and adoption of the digital currency remain low.
-
From Cointelegraph: (https://cointelegraph.com/news/china-cbdc-transaction-volume-nears-two-trillion-yuan) “He claimed around $2.3 billion, or 16.5 billion digital yuan, was in circulation at the end of June, which only represents 0.16% of China’s monetary supply, according to a July 19 Reuters report. (https://www.reuters.com/markets/asia/chinas-digital-yuan-transactions-seeing-strong-momentum-says-cbank-gov-yi-2023-07-19/) The digital yuan’s adoption is still minimal relative to China’s 1.4 billion strong population, so far mostly being used for domestic retail payments (https://cointelegraph.com/news/crypto-friendly-dbs-bank-launches-digital-yuan-payment-tool) aside from a few trials in Hong Kong.”
USDC gets a boost
-
Bitso (https://bitso.com/), a Latin American crypto firm, announced an integration with the Stellar Network (https://stellar.org/) in an effort to boost international USDC payments.
-
From CoinDesk: (https://www.coindesk.com/business/2023/07/19/latin-american-crypto-firm-bitso-joins-stellar-network-to-boost-international-usdc-payments/) “The company said in a statement that it developed a solution in partnership with the Stellar Development Foundation to enable businesses around the world to transact in USDC to Argentina, Colombia and Mexico, where Bitso has a direct connection to local banking systems.”
https://hardyaka.substack.com/p/the-weekend-150the-problem-with-cbdcs
-
-
@ b12b632c:d9e1ff79
2023-07-21 14:19:38Self hosting web applications comes quickly with the need to deal with HTTPS protocol and SSL certificates. The time where web applications was published over the 80/TCP port without any encryption is totally over. Now we have Let's Encrypt and other free certification authority that lets us play web applications with, at least, the basic minimum security required.
Second part of web self hosting stuff that is really useful is the web proxifycation.
It's possible to have multiple web applications accessible through HTTPS but as we can't use the some port (spoiler: we can) we are forced to have ugly URL as https://mybeautifudomain.tld:8443.
This is where Nginx Proxy Manager (NPM) comes to help us.
NPM, as gateway, will listen on the 443 https port and based on the subdomain you want to reach, it will redirect the network flow to the NPM differents declared backend ports. NPM will also request HTTPS cert for you and let you know when the certificate expires, really useful.
We'll now install NPM with docker compose (v2) and you'll see, it's very easy.
You can find the official NPM setup instructions here.
But before we absolutely need to do something. You need to connect to the registrar where you bought your domain name and go into the zone DNS section.You have to create a A record poing to your VPS IP. That will allow NPM to request SSL certificates for your domain and subdomains.
Create a new folder for the NPM docker stack :
mkdir npm-stack && cd npm-stack
Create a new docker-compose.yml :
nano docker-compose.yml
Paste this content into it (CTRL + X ; Y & ENTER to save/quit) :
``` version: '3.8' services: app: image: 'jc21/nginx-proxy-manager:latest' restart: unless-stopped ports: # These ports are in format
: - '80:80' # Public HTTP Port - '443:443' # Public HTTPS Port - '81:81' # Admin Web Port # Add any other Stream port you want to expose # - '21:21' # FTP # Uncomment the next line if you uncomment anything in the section # environment: # Uncomment this if you want to change the location of # the SQLite DB file within the container # DB_SQLITE_FILE: "/data/database.sqlite" # Uncomment this if IPv6 is not enabled on your host # DISABLE_IPV6: 'true' volumes: - ./nginxproxymanager/data:/data - ./nginxproxymanager/letsencrypt:/etc/letsencrypt
```
You'll not believe but it's done. NPM docker compose configuration is done.
To start Nginx Proxy Manager with docker compose, you just have to :
docker compose up -d
You'll see :
user@vps:~/tutorials/npm-stack$ docker compose up -d [+] Running 2/2 ✔ Network npm-stack_default Created ✔ Container npm-stack-app-1 Started
You can check if NPM container is started by doing this command :
docker ps
You'll see :
user@vps:~/tutorials/npm-stack$ docker ps CONTAINER ID IMAGE COMMAND CREATED STATUS PORTS NAMES 7bc5ea8ac9c8 jc21/nginx-proxy-manager:latest "/init" About a minute ago Up About a minute 0.0.0.0:80-81->80-81/tcp, :::80-81->80-81/tcp, 0.0.0.0:443->443/tcp, :::443->443/tcp npm-stack-app-1
If the command show "Up X minutes" for the npm-stack-app-1, you're good to go! You can access to the NPM admin UI by going to http://YourIPAddress:81.You shoud see :
The default NPM login/password are : admin@example.com/changeme .If the login succeed, you should see a popup asking to edit your user by changing your email password :
And your password :
Click on "Save" to finish the login. To verify if NPM is able to request SSL certificates for you, create first a subdomain for the NPM admin UI : Click on "Hosts" and "Proxy Hosts" :
Followed by "Add Proxy Host"
If you want to access the NPM admin UI with https://admin.yourdomain.tld, please set all the parameters like this (I won't explain each parameters) :
Details tab :
SSL tab :
And click on "Save".
NPM will request the SSL certificate "admin.yourdomain.tld" for you.
If you have an erreor message "Internal Error" it's probably because your domaine DNS zone is not configured with an A DNS record pointing to your VPS IP.
Otherwise you should see (my domain is hidden) :
Clicking on the "Source" URL link "admin.yourdomain.tld" will open a pop-up and, surprise, you should see the NPM admin UI with the URL "https://admin.yourdomain.tld" !
If yes, bravo, everything is OK ! 🎇
You know now how to have a subdomain of your domain redirecting to a container web app. In the next blog post, you'll see how to setup a Nostr relay with NPM ;)
Voilààààà
See you soon in another Fractalized story!
-
@ 1bc70a01:24f6a411
2023-07-21 12:03:38The concept of value of value is one where information yearns to flow freely, transactions should be voluntary, unlimited and direct. In V4V model, people pay what something is worth to them.
Sounds great. On paper. There are some issues…
Free sucks
At least, that’s the perception. People don’t assign much value to free. Ask anyone who has ever ran any business and has not suggested a value for a product or service and they’ll tell you that they earned far less than when charging for the thing.
It’s true, some people will give a lot, some a little, and most none. Most - none. None.
Pricing is Signal
Pricing is a signal of desirability and quality. Of course, it is often incorrect and people manipulate pricing all the time. But for the most part, people don’t see much value in free. Unless a recommended price is offered, people will usually pay nothing. This is not a great model to thrive on if you spend years of your life acquiring knowledge and turning it into products that nobody ultimately buys. I have very personal experience with free. I’ve created and sold digital products and ran many pricing experiments myself. The highest priced products usually generated the most revenue. Surprise! The middle cost product (same product, just priced less) decimated the revenue stream. When set to 0 (even with a suggested minimum price), I generated almost no revenue at all.
None of this is surprising. Pricing acts as a psychological anchor. “You get what you pay for” is ingrained in our brains whether we think about it or not.
People are clueless
The issue with price is that most people don’t have a clue what anything is worth. The only time people have any rough idea of what they should pay for something is when they have already purchased that thing in the past. But, introduce something they have never before purchased and they won’t have a single clue about what to pay. Take for example a set of professional photos of you and your family. Unless you’ve been to a photo studio in the last 5 years, you probably won’t have a single clue what that package of photos is worth. Does that mean the product is worthless? Of course not, but people don’t know what to pay.
In a value for value model, the absence of price makes it super difficult to determine the value of anything. You may take some social cues from previous payments from other people, but this could backfire for the content creator.
Suppose I created a UI framework that saved developers hundreds of hours. In theory, I should be able to charge at least a few hours’ worth of value for this product. If the developer’s time is valued at $100/hour, a $200 price for a product that saves you $2000 worth of time seems very justifiable. Not only do you get to use it once, but you can re-use the product for ALL future projects and employment.
Now, remove the price and see what people pay. Absolutely nothing. You may have a few people who pay $200 voluntarily, but it’s highly unlikely The vast majority will pay nothing, and some may “tip” in the 5-$60 range. Anything that approaches a $100 mark is seen as a purchase. Hey, I don’t make the rules, I just see what other founders have figured out long ago and combine with my own observations. Don’t kill the messenger.
Free is Expensive
If I am accurate in my assessment and recall my personal experiences accurately, then the majority of people who consume your value will do so for free. When that content is a product, you may end up spending a lot of time on supporting the thing that is not generating any revenue. You don’t want to be rude and ignore people so you’ll probably spend your valuable time answering questions and helping them troubleshoot issues. All of that time adds up. Startup founders who offer free tiers or near free tiers of services learn very quickly that free customers are the most painful and demanding. You are basically forced to charge just to avoid dealing with demanding people who expect everything for nothing.
Free is Noise
Price is not just a request for value, but it acts as a feedback signal for future content. If you have no idea what people are paying for, it’s difficult to know if what you create is worth anything. A situation where the vast majority of your content is consumed for free yield a lot of noise.
Well, why not focus on the people who pay? You certainly could, but it ends up being a tiny fraction of the sample size you could have had if you actually charged something up front.
Lack of forecasting
Businesses rely on predictible revenue. Forecasting is necessary for all sorts of decisions if you work with anyone but yourself. It helps with purchasing decision (expenses) and with planning of future products. Value for value makes it impossible to know what your revenue will be next month as you just have no idea if everyone pays nothing or a lot.
V4V could make you uncompetitive
In a model where one person charges a fixed price and the other is relying on the good will of the people to "see the value" in their work, the person with predictible revenue will most likely win out in a competitive environment - enabling them to get ahead of you and your business. They will have an easier time planning further content / products and hiring people to scale the business even further.
It’s not all hopeless
That’s not to say that I don’t like the idea of value for value. Of course I only want people to pay if they find the thing useful. The issue is that people may not know the thing is useful until they’ve already acquired it. At that point who is going back to pay for the thing they already got for free? Few to none.
Value for value may work. For some.
I’m not saying value for value doesn’t work sometimes, for some people. It is entirely possible that a person earns a living on v4v transactions. However, I think for that to be true there may be other factors at play such as social standing, personal brand, influence, likability, status within a community. The vast majority of creators do not fall into this category and will just struggle.
I’m cautiously optimistic about V4V and hope it works out at scale. But as it stands, I have not seen much evidence that it actually pays the bills. Yes, there has been some support for podcasts on Fountain, but it is unclear whether it is just as or more significant than traditional transaction model.
“Information is not scarce” is irrelevant
There’s some notion that information yearns to be free and cannot be scarce by nature. I think this may be a false argument from the start. When we purchase digital things, we are not paying for scarcity - it’s totally irrelevant. We pay for the experience and the feeling we get from that thing. In fact, the same is probably true for physical products (with the added benefit of personal sustenance). I don’t go into the grocery store to buy a dinner and fork over the money because it’s scarce. I pay because I’m hungry. There’s utility and there’s pleasure and fulfillment. If I’m having a dinner with friends, there’s also fun. Unless I am totally misunderstanding the argument, I’m not sure how it applies.
In Summary
- Value 4 value may work at scale, but remains to be seen
- It could be great fun money but not serious enough to pay the bills (for most of us)
- Sounds good on paper but we humans have our own ways of thinking about value and what it's worth
- May work well for people who build a personal brand or have status in a community
As always I look forward to your thoughts. Let me know if I’m overlooking something or should consider some point of view in more depth.
-
@ 72f97555:e0870ff3
2023-07-21 04:20:44We’ve watched them come and go: social networking attempts like Mastodon (Activity Pub), Blue Sky, and recently, Threads. They’ve begun to follow what feels very much like a pattern. First basic functionality is built out, then there’s a crisis of some sort on mainstream social media, then there’s a population explosion on the new social network, people quickly become disillusioned, then a population collapse. It can be very tempting, while watching these networks explode their user bases into the millions overnight, to wish for that for ourselves on Nostr. I do not. In fact, I believe this sudden explosive growth is partially responsible for the inevitable decline and collapse of these attempted “replacements” for any of the big corporately owned networks. Social networks don’t fail due to technology issues - they fail because of social issues.
Culture Matters
When people exodus a media platform en masse, they bring their culture with them. Their expectations of the types of content they want to interact with, the ways they intend to behave, and the ways they engage with others. These patterns are influenced by two factors in mainstream social: moderation, and tradition. - Moderation forms the culture in a top-down way, by establishing the limits of what kind of content will be acceptable on the platform. Platforms with relatively loose moderation policies will tend to attract people that diverge from established norms of behavior, more than those who typically conform. - Tradition also informs culture in unique ways for each platform - the things that are easiest to find, provoke an emotional response, and are easy to share tend to dominate. - Functionality also plays a role, albeit a lesser one, but one that tends to form the unique humor of a platform. Reddit is a fine example of this with its long threads of puns, each one building on the previous post. Hell threads on other platforms are another example. The problem arises because new platforms rarely meet the expectations of another culture formed on another platform. Functionality will be different in subtle but important ways, and the early adopters of the new platform will be interested in different topics. This is very true on Nostr, where posts are rewarded specifically for quality - a metric that is very difficult to quantify, but any long-time user can identify - and an overabundant quantity of posts is more likely to get you muted than followed.
Assimilation Matters
When users slowly trickle their way into a new platform, they are more inclined to ask questions, and attempt to understand the existing culture. They are the “new kid on the block” and will be more apt to seek feedback if they truly desire to achieve any sort of success. They then add the unique qualities of their personality to this information, and contribute something new to the culture, while still being a part of it. When a large group of users joins all at once, they bring their own connections with them. When the group joining dwarfs the existing user base, they have less motivation to seek advice on how to best utilize the platform to its fullest potential, expecting that they will be able to continue connecting and communicating with their existing contacts in the same way they always have. This will inevitably lead to frustration when the new platform does not provide them with the same success that they had on the former platform - leading to the inevitable conclusion that the “new Twitter (or Facebook, Instagram, et al.)” is not as good as the old one. And so we watch the tides of users go in and out, leaving old platforms in frustration for new ones, only to become equally frustrated with their inability to communicate and reach an audience as effectively as they used to, and returning to the old platform, or seeking yet greener pastures.
Stability Matters
Sudden growth causes sudden problems. Both Mastodon and Blue Sky encountered major issues that they were not prepared to handle, and handled badly. Mastodon operators found themselves facing enormous hosting bills, and Blue Sky faces serious obstacles in keeping their promises to provide a “safe” environment with the influx of new users. A slow, steady growth model allows the operators of services to face problems in a more measured way, and to build out both infrastructure and content tools to allow users to have a pleasant experience. It is less likely to take an otherwise major contributor to a project, and make them “tap out” due to rising costs, frustrated users, and a constant crisis mindset. Nostr is a distributed network, and has amazing potential for horizontal scaling. Even if one in ten-thousand users who onboards onto Nostr decides to run a relay, the network will be in good shape. Content distribution can be handled in a large number of ways - it isn’t tied fundamentally to the protocol itself - which allows many different providers to be used, and new ways of handling content to be built. But creating those relay operators and content hosts out of newbies takes time. A truly educated relay admin capable of handling the job of maintaining a secure and reliable relay takes weeks or days at best, assuming they are already familiar with similar tasks. Adding 10 million users overnight - the way Threads did - is likely to swamp existing providers before new providers have time to step in a fill the gap. Which would also have the effect of chilling user experience. There is a lot of new terminology and capability to take in when joining Nostr. For the mainstream person, they are going to have to learn about: cryptographic keys, Nostr Addresses (NIP-05), Lightning Wallets, Zaps and by proxy Bitcoin, and eventually Lists, Relay Management, Paid Relays, how to find content, moderate their own feed, and more. Right now, Nostr is doing an excellent job of answering those questions and educating users on the new terminology and techniques because the flow is small and steady with a few bursts.
The Tortoise and The Hare
I truly believe that the success of Nostr will be in no small part because it is growing steadily instead of all at once. Every user onboarded correctly adds to the army of people ready to help welcome the next little wave of people who learn about the decentralized and censorship resistant qualities of Nostr. These individuals are also given the time to become part of a kinder social group than is typically found on social media, and learn to truly become productive and successful as true Nostriches rather than just transplants from another place.
And that is truly the magic isn’t it? People don’t just move to Nostr, they become Nostriches. They become part of a real community, and they belong with us. We take refugees from other social media sites, and don’t leave them refugees. I think that’s beautiful and worth slowing down to do.
I don’t look to the short term for Nostr - I’m bullish for Nostr in the long haul. We are building to still be here after the others have already burnt themselves away. It reminds me of my home country:
“Give me your tired, your poor, your huddled masses yearning to breathe free, the wretched refuse of your teeming shore. Send these, the homeless, tempest-tossed to me, I lift my lamp beside the golden door!”
-
@ 72f97555:e0870ff3
2023-07-21 04:18:38We’ve watched them come and go: social networking attempts like Mastodon (Activity Pub), Blue Sky, and recently, Threads. They’ve begun to follow what feels very much like a pattern. First basic functionality is built out, then there’s a crisis of some sort on mainstream social media, then there’s a population explosion on the new social network, people quickly become disillusioned, then a population collapse. It can be very tempting, while watching these networks explode their user bases into the millions overnight, to wish for that for ourselves on Nostr. I do not. In fact, I believe this sudden explosive growth is partially responsible for the inevitable decline and collapse of these attempted “replacements” for any of the big corporately owned networks. Social networks don’t fail due to technology issues - they fail because of social issues.
Culture Matters
When people exodus a media platform en masse, they bring their culture with them. Their expectations of the types of content they want to interact with, the ways they intend to behave, and the ways they engage with others. These patterns are influenced by two factors in mainstream social: moderation, and tradition. - Moderation forms the culture in a top-down way, by establishing the limits of what kind of content will be acceptable on the platform. Platforms with relatively loose moderation policies will tend to attract people that diverge from established norms of behavior, more than those who typically conform. - Tradition also informs culture in unique ways for each platform - the things that are easiest to find, provoke an emotional response, and are easy to share tend to dominate. - Functionality also plays a role, albeit a lesser one, but one that tends to form the unique humor of a platform. Reddit is a fine example of this with its long threads of puns, each one building on the previous post. Hell threads on other platforms are another example. The problem arises because new platforms rarely meet the expectations of another culture formed on another platform. Functionality will be different in subtle but important ways, and the early adopters of the new platform will be interested in different topics. This is very true on Nostr, where posts are rewarded specifically for quality - a metric that is very difficult to quantify, but any long-time user can identify - and an overabundant quantity of posts is more likely to get you muted than followed.
Assimilation Matters
When users slowly trickle their way into a new platform, they are more inclined to ask questions, and attempt to understand the existing culture. They are the “new kid on the block” and will be more apt to seek feedback if they truly desire to achieve any sort of success. They then add the unique qualities of their personality to this information, and contribute something new to the culture, while still being a part of it. When a large group of users joins all at once, they bring their own connections with them. When the group joining dwarfs the existing user base, they have less motivation to seek advice on how to best utilize the platform to its fullest potential, expecting that they will be able to continue connecting and communicating with their existing contacts in the same way they always have. This will inevitably lead to frustration when the new platform does not provide them with the same success that they had on the former platform - leading to the inevitable conclusion that the “new Twitter (or Facebook, Instagram, et al.)” is not as good as the old one. And so we watch the tides of users go in and out, leaving old platforms in frustration for new ones, only to become equally frustrated with their inability to communicate and reach an audience as effectively as they used to, and returning to the old platform, or seeking yet greener pastures.
Stability Matters
Sudden growth causes sudden problems. Both Mastodon and Blue Sky encountered major issues that they were not prepared to handle, and handled badly. Mastodon operators found themselves facing enormous hosting bills, and Blue Sky faces serious obstacles in keeping their promises to provide a “safe” environment with the influx of new users. A slow, steady growth model allows the operators of services to face problems in a more measured way, and to build out both infrastructure and content tools to allow users to have a pleasant experience. It is less likely to take an otherwise major contributor to a project, and make them “tap out” due to rising costs, frustrated users, and a constant crisis mindset. Nostr is a distributed network, and has amazing potential for horizontal scaling. Even if one in ten-thousand users who onboards onto Nostr decides to run a relay, the network will be in good shape. Content distribution can be handled in a large number of ways - it isn’t tied fundamentally to the protocol itself - which allows many different providers to be used, and new ways of handling content to be built. But creating those relay operators and content hosts out of newbies takes time. A truly educated relay admin capable of handling the job of maintaining a secure and reliable relay takes weeks or days at best, assuming they are already familiar with similar tasks. Adding 10 million users overnight - the way Threads did - is likely to swamp existing providers before new providers have time to step in a fill the gap. Which would also have the effect of chilling user experience. There is a lot of new terminology and capability to take in when joining Nostr. For the mainstream person, they are going to have to learn about: cryptographic keys, Nostr Addresses (NIP-05), Lightning Wallets, Zaps and by proxy Bitcoin, and eventually Lists, Relay Management, Paid Relays, how to find content, moderate their own feed, and more. Right now, Nostr is doing an excellent job of answering those questions and educating users on the new terminology and techniques because the flow is small and steady with a few bursts.
The Tortoise and The Hare
I truly believe that the success of Nostr will be in no small part because it is growing steadily instead of all at once. Every user onboarded correctly adds to the army of people ready to help welcome the next little wave of people who learn about the decentralized and censorship resistant qualities of Nostr. These individuals are also given the time to become part of a kinder social group than is typically found on social media, and learn to truly become productive and successful as true Nostriches rather than just transplants from another place.
And that is truly the magic isn’t it? People don’t just move to Nostr, they become Nostriches. They become part of a real community, and they belong with us. We take refugees from other social media sites, and don’t leave them refugees. I think that’s beautiful and worth slowing down to do.
I don’t look to the short term for Nostr - I’m bullish for Nostr in the long haul. We are building to still be here after the others have already burnt themselves away. It reminds me of my home country:
“Give me your tired, your poor, your huddled masses yearning to breathe free, the wretched refuse of your teeming shore. Send these, the homeless, tempest-tossed to me, I lift my lamp beside the golden door!”
~ TheSameCat
-
@ a4a6b584:1e05b95b
2023-07-21 01:51:34Is light really a constant? In this blog post by Adam Malin we theorize about redshift caused not by expanding space, but by changes in zero point energy field over cosmic time
I was inspired to write this post after reading a paper written in 2010 by Barry Setterfield called Zero Point Energy and the Redshift. If you want a very deep dive into this concept, I recommend you check it out. Here is the link.
I recently read an intriguing paper that puts forth an alternative explanation for the redshift we observe from distant galaxies. This paper, published in 2010 by Barry Setterfield, proposes that redshift may be caused by changes over time in the zero point energy (ZPE) field permeating space, rather than cosmic expansion. In this post, I'll summarize the key points of this theory and how it challenges the conventional framework.
An important distinction arises between Stochastic Electrodynamics (SED) and the more mainstream Quantum Electrodynamics (QED) framework. SED models the zero point field as a real, random electromagnetic field that interacts with matter, possessing observable physical effects. In contrast, QED considers virtual particles and zero point energy as mathematical constructs that do not directly impact physical systems. The zero point energy discussed in this proposed mechanism builds upon the SED perspective of modeling the quantum vacuum as a dynamic background field that can exchange energy with matter. SED provides a means to quantitatively analyze the redshift effects hypothetically caused by changes in the zero point field over cosmic time.
The standard model of cosmology attributes redshift to the Doppler effect - light from distant galaxies is stretched to longer wavelengths due to those galaxies receding away from us as space expands. Setterfield's paper argues that the data actually better supports a model where the speed of light was higher in the early universe and has decayed over time. This would cause older light from farther galaxies to be progressively more redshifted as it travels through space and time.
Setterfield cites historical measurements of the speed of light by scientists like R.T. Birge that showed systematic decreases over time, contrary to our modern assumption of constancy. He argues that while experimental improvements have reduced uncertainties, residual trends remain even in recent high-precision measurements.
A key part of Setterfield's proposed mechanism is that the ZPE interacts with subatomic particles to give them mass and stabilize atomic orbits. As the ZPE has increased in strength over cosmic history, it has caused a contraction in electron orbits within atoms. This results in electron transitions emitting bluer light over time. Thus, looking out into space is looking back to earlier epochs with weaker ZPE and redder light.
This theory raises some thought-provoking questions. For instance, have we misinterpreted redshift as definitive evidence for an expanding universe? Might a static universe with slowing clocks account for observations we attribute to dark matter and dark energy? However, changing existing scientific paradigms is extremely challenging. Let's examine some potential counterarguments:
- The constancy of the speed of light is a fundamental pillar of modern physics backed by extensive experimental verification. This theory would require overturning tremendous empirical support. Setterfield argues that Lorentz and others kept an open mind to variations in c early on. While unexpected, new evidence could prompt another evolution in perspective.
- The current Lambda-CDM cosmological model based on general relativity matches a wide array of observations and predicts phenomena like the cosmic microwave background. But it also has issues like the need for speculative dark matter and dark energy. An alternate cosmology with varying c may provide a simpler unifying explanation.
- Astrophysical observations like supernova brightness curves seem to confirm expanding space. But these interpretations assume constancy of c and other principles that this hypothesis challenges. The cosmic microwave background, for instance, could potentially be re-interpreted as a cosmological redshift of earlier light.
Read more from Adam Malin at habitus.blog.
Adam Malin
You can find me on Twitter or on Nostr at
npub15jnttpymeytm80hatjqcvhhqhzrhx6gxp8pq0wn93rhnu8s9h9dsha32lx
value4value Did you find any value from this article? Click here to send me a tip!
-
@ a4a6b584:1e05b95b
2023-07-21 01:44:57The French sociologist and philosopher Jean Baudrillard offered profound critiques of modern society, technology, media and consumer culture through his work. Often associated with postmodernism and post-structuralism, Baudrillard challenged established notions of truth, reality and the power dynamics between humans and the systems they create.
In this blog post, we'll explore some of Baudrillard's most notable concepts and theories to understand his influential perspectives on the contemporary world.
Simulacra and Simulation
One of Baudrillard's most well-known works is "Simulacra and Simulation." In the book, Baudrillard argues that our society has replaced reality and meaning with symbols, images and signs that he calls “simulacra.”
He believed human experience is now a simulation of reality rather than reality itself. Unlike simple imitations or distortions of reality, simulacra have no connection to any tangible reality. They are mere representations that come to define our perception of existence.
To illustrate this concept, Baudrillard outlined three “orders” of simulacra:
-
First Order: Copies or imitations that maintain a clear link to the original, like photographs.
-
Second Order: Distortions of reality that mask the absence of an original, like heavily edited advertising images.
-
Third Order: Simulations with no original referent that become “hyperreal,” like video game worlds.
Per Baudrillard, much of postmodern culture is made up of third-order simulacra. Media representations and simulations hold more meaning than reality, creating a “hyperreality” driven by consumerism and spectacle.
Hyperreality
Building on his theory of simulacra, Baudrillard introduced the concept of “hyperreality” to describe how representations and simulations have come to replace and blur boundaries with reality.
In hyperreality, the lines between real life and fictional worlds become seamless. Media, technology and advertising dominate our perception of reality, constructing a simulated world that appears more real and appealing than actual reality.
For example, the carefully curated lives presented on social media often appear more significant than people’s daily lived experiences. Additionally, idealized representations of reality presented in movies, TV and advertising shape our expectations in ways that real life cannot match.
According to Baudrillard, we increasingly interact with these fabricated representations and hyperreal signs over direct experiences of reality. The simulations and models come to define, mediate and construct our understanding of the world.
Consumer Society
In “The Consumer Society,” Baudrillard argues that traditional institutions like family, work and religion are losing significance to the prevailing values and rituals of consumerism.
Rather than simply meeting needs, consumption has become a defining way of life, shaping identities and social belonging. Non-essential consumer goods and experiences drive the quest for happiness, novelty and status.
Baudrillard notes that consumer society fosters a constant pressure to consume more through an endless pursuit of new products, trends and experiences. This “treadmill of consumption” fuels perpetual dissatisfaction and desire.
Additionally, he highlights how objects take on symbolic value and meaning within consumer culture. A luxury car, for example, denotes wealth and status beyond its functional utility.
Overall, Baudrillard presents a critical perspective on consumerism, showing how it has come to dominate modern society on psychological and cultural levels beyond simple economic exchange.
Symbolic Exchange
In contrast to the materialistic values of consumer society, Baudrillard proposes the concept of “symbolic exchange” based on the exchange of meanings rather than commodities.
He suggests symbolic exchange has more power than material transactions in structuring society. However, modern culture has lost touch with the traditional symbolic exchanges around fundamental existential themes like mortality.
By marginalizing death and pursuing endless progress, Baudrillard argues that society loses balance and restraint. This denial leads to excessive consumption and constant pursuit of unattainable fulfillment.
Fatal Strategies
Baudrillard’s theory of “fatal strategies” contends that various systems like technology and consumerism can take on lives of their own and turn against their creators.
Through proliferation and exaggeration, these systems exceed human control and impose their own logic and consequences. For instance, while meant to be tools serving human needs, technologies can shape behavior and exert control in unanticipated ways.
Baudrillard saw this reversal, where the object dominates the subject who created it, as an impending “fatal” danger of various systems reaching a state of autonomous excess.
This provides a cautionary perspective on modern society’s faith in perpetual progress through technology and constant economic growth.
Conclusion
Through groundbreaking theories like simulation, hyperreality and symbolic exchange, Jean Baudrillard provided deep critiques of modern society, consumer culture, media and technology. His work dismantles assumptions about reality, history and human agency vs. systemic control.
Baudrillard prompts critical reflection about the cultural, psychological and philosophical implications of postmodern society. His lasting influence encourages re-examining our relationships with consumerism, technology and media to navigate the complex intricacies of the contemporary world.
Read more from Adam Malin at habitus.blog.
Adam Malin
You can find me on Twitter or on Nostr at
npub15jnttpymeytm80hatjqcvhhqhzrhx6gxp8pq0wn93rhnu8s9h9dsha32lx
value4value Did you find any value from this article? Click here to send me a tip!
-
-
@ 57fe4c4a:c3a0271f
2023-07-27 00:26:32📝 Summary: A version of 2-of-2 Schnorr Musig2 is being implemented for statechains, with the server fully blinded. Concerns are raised about the vulnerability of the scheme's single
R
per party. The discussion revolves around the security of blind MuSig schemes, potential attacks on nonces and challenges, and the need for proof of knowledge of signing keys. Alternative approaches for blind Schnorr signatures are proposed.👥 Authors: • Andrew Poelstra ( nostr:npub1ae27kq6z802dkqw4ey4dgdx493szm8dpmcm76d7vt0ma9gf6fj4svz5t04 ) • AdamISZ ( nostr:npub1nv7tjpn2g8tvt8qfq5ccyl00ucfcu98ch998sq4g5xp65vy6fc4sykqw2t ) • Erik Aronesty ( nostr:npub1y22yec0znyzw8qndy5qn5c2wgejkj0k9zsqra7kvrd6cd6896z4qm5taj0 ) • Tom Trevethan ( nostr:npub1axshsyxsl3vasj4z9549rvwdvhjmh52fw0ayj3ghtmdezx8cnuxqlwyw7n ) • ZmnSCPxj ( nostr:npub1g5zswf6y48f7fy90jf3tlcuwdmjn8znhzaa4vkmtxaeskca8hpss23ms3l ) • Jonas Nick ( nostr:npub1at3pav59gkeqz9kegzqhk2v4j4r435x42ytf23pxs8crt74tuc8s2y3z5a )
📅 Messages Date Range: 2023-07-24 to 2023-07-26
✉️ Message Count: 20
📚 Total Characters in Messages: 58102
Messages Summaries
✉️ Message by Tom Trevethan on 24/07/2023: A version of 2-of-2 Schnorr Musig2 is being implemented for statechains, where the server is fully blinded and does not learn certain information. The security relies on the server reporting the number of partial signatures generated and verifying the signatures client-side. The protocol operates by generating private and public keys, aggregating the public keys, generating nonces, computing challenges, and creating the final signature. In the case of blinding for party 1, key aggregation and nonce aggregation are performed by party 2, and party 1 does not learn the final signature or the message being signed.
✉️ Message by ZmnSCPxj on 24/07/2023: MuSig2 requires multiple
R
points, preventing certain attacks. The recipient questions if the scheme's singleR
per party is vulnerable.✉️ Message by Erik Aronesty on 24/07/2023: The text discusses the implementation of a version of 2-of-2 Schnorr Musig2 for statechains, where the server is fully blinded. The security relies on the server reporting the number of partial signatures generated and verifying the full set of signatures client-side. The protocol involves generating private and public keys, aggregating the public keys, and signing a message using nonces.
✉️ Message by Jonas Nick on 24/07/2023: The text discusses concerns about the proposed scheme for blind music and suggests an alternative approach that may be worth exploring.
✉️ Message by Erik Aronesty on 24/07/2023: The email discusses the potential vulnerabilities of a proposed scheme and suggests an alternative approach that may be worth exploring.
✉️ Message by Jonas Nick on 24/07/2023: The meaning and connection between "posk" and the attack remains unclear and undefined.
✉️ Message by Jonas Nick on 24/07/2023: Party 1 is unable to determine the final value of (R, s1+s2) or m, but a blinding step may be missing, allowing the server to scan the blockchain for signatures and compute corresponding hashes to check for a match.
✉️ Message by Tom Trevethan on 24/07/2023: The current statechain protocol requires the sender to sign the statechain with their public key, preventing rogue key attacks and ensuring server cooperation for spending.
✉️ Message by Tom Trevethan on 24/07/2023: The sender acknowledges that the full scheme should have multiple nonces and compute b, but it doesn't change the approach to blinding.
✉️ Message by AdamISZ on 24/07/2023: Wagner's attack is discussed in the conversation, and it is suggested that using the 3rd round of MuSig1 can help avoid it. There are also discussions about blind signing schemes and the need for proof of a well-formed signing request.
✉️ Message by Erik Aronesty on 25/07/2023: The discussion is about the security of the blind MuSig scheme and the potential vulnerabilities it may have.
✉️ Message by Tom Trevethan on 25/07/2023: The v=2 nonces signing protocol of musig2 prevents the Wagner attack. The challenge value c must be blinded from the server to prevent signature determination.
✉️ Message by Erik Aronesty on 26/07/2023: The author suggests that whenever a public key is transmitted, it should come with a "proof of secret key" to prevent vulnerabilities.
✉️ Message by Andrew Poelstra on 26/07/2023: POSK (proof of secret key) is not a perfect solution for preventing rogue key attacks and has logistical difficulties in implementation.
✉️ Message by Jonas Nick on 26/07/2023: Attacks on nonces and challenges cannot be prevented by proving knowledge of the signing key (proof of possession, PoP).
✉️ Message by Tom Trevethan on 26/07/2023: Proving knowledge of the r values used in generating each R can prevent the Wagner attack, not signing or secret keys.
✉️ Message by Erik Aronesty on 26/07/2023: The email discusses attacks on nonces and challenges in cryptography and the need for proof of knowledge of signing keys to prevent them.
✉️ Message by Tom Trevethan on 24/07/2023: The sender is discussing with Jonas the need for a method to blind the value of c in order to prevent the server from learning the value of m.
✉️ Message by Jonas Nick on 26/07/2023: Blind Schnorr signatures can solve the issue of blinding, but not the problem of client-controlled forged signatures. Recent work proposes alternative approaches for blind Schnorr signatures.
✉️ Message by AdamISZ on 26/07/2023: The protocol described in the text is an interesting idea for incorporating 2FA authentication into blind signing. However, there may be vulnerabilities in the protocol that need to be addressed.
Follow nostr:npub15g7m7mrveqlpfnpa7njke3ccghmpryyqsn87vg8g8eqvqmxd60gqmx08lk for full threads
-
@ 57fe4c4a:c3a0271f
2023-07-27 00:22:35📝 Summary: Blinded paths in the Lightning Network may harm privacy and decentralization by allowing only "compliant" nodes to access destinations. This could result in routing through regulated hubs, affecting payment reliability and sender privacy. Concerns arise that lightning "chain analysis" firms could influence businesses to adopt this approach, further compromising privacy.
👥 Authors: • Bastien TEINTURIER ( nostr:npub17fjkngg0s0mfx4uhhz6n4puhflwvrhn2h5c78vdr5xda4mvqx89swntr0s ) • Ben Carman ( nostr:npub17lts233cksw942zaqq8kkkgrc8hn9pfzgdyrce28nrf2vx49q7wq3c7hwm )
📅 Messages Date Range: 2023-07-25 to 2023-07-26
✉️ Message Count: 2
📚 Total Characters in Messages: 6270
Messages Summaries
✉️ Message by Ben Carman on 25/07/2023: Blinded paths in the Lightning Network can have a downside for privacy and decentralization, as they can enforce that only "compliant" nodes can reach a destination. This could lead to routing only through large regulated hubs, hurting payment reliability and sender side privacy. There is concern that lightning "chain analysis" companies could pressure businesses into implementing this.
✉️ Message by Bastien TEINTURIER on 26/07/2023: Blinded paths in the Lightning Network can potentially lead to a loss of privacy and decentralization. They could enforce that payments only go through "compliant" nodes, bypassing smaller routing nodes. This could also compromise sender-side privacy.
Follow nostr:npub1j3t00t9hv042ktszhk8xpnchma60x5kz4etemnslrhf9e9wavywqf94gll for full threads
-
@ a4a6b584:1e05b95b
2023-07-21 01:22:42A comprehensive exploration of Metamodernism, its principles and influences across art, design, music, politics, and technology. This piece delves into how Metamodernism paves the way for a future that harmonizes grand narratives and individual nuances, and how it could shape the cultural, economic, and digital landscape of the future.
Introduction
Welcome to the metamodern era. A time where we find ourselves caught in the flux of digital revolution, cultural shifts, and a rekindling of grand narratives, all while still
As an artist, I find myself standing at the crossroads of these cultural and technological shifts, with Metamodernism serving as my compass. I'd like to share my thoughts, experiences, and observations on what Metamodernism is, and how I believe it will shape our future.
This journey began as an exploration into the potential future of graphic design, taking cues from an evolving cultural paradigm. I quickly realized that Metamodernism was not just about creating compelling visual narratives, but it had potential to influence every aspect of our lives, from politics and technology to our individual experiences and collective narratives.
Metamodernism, in essence, is about balancing the best of what came before – the grand narratives and optimism of modernism, and the skepticism and relativism of postmodernism – while forging ahead to create a new, coherent cultural reality.
So let's embark on this journey together to understand the metamodern era and its impact on our culture, our technology, and our art. Let's delve into Metamodernism.
Understanding Postmodernism and Metamodernism
To appreciate the metamodern, we must first unpack the concept of postmodernism. Rooted in skepticism, postmodernism came into being as a reaction to modernism’s perceived failures. Where modernism sought universality, believing in grand narratives and objective truths, postmodernism reveled in fragmentation and the subjective nature of reality. It questioned our institutions, our ideologies, and our grand narratives, challenging the very structure upon which our society was built.
However, as we moved deeper into the postmodern era, a palpable sense of fatigue began to set in. The endless questioning, the constant fragmentation, and the cynical deconstruction of everything began to take a toll. While postmodernism provided valuable insights into the limitations of modernist thinking, it also left us feeling disconnected and adrift in a sea of relativism and irony.
This is where Metamodernism steps in. As the cultural pendulum swings back from the fragmentation of postmodernism, it does not return us to the naive grand narratives of modernism. Instead, Metamodernism synthesizes these seemingly contradictory ideologies, embracing both the skepticism of the postmodern and the optimism of the modern.
In essence, Metamodernism is a search for meaning and unity that still acknowledges and respects the complexity of individual experience. It recognizes the value in both grand narratives and personal stories, aspiring to create a more cohesive cultural discourse.
The metamodern era is a new dawn that challenges us to be both skeptical and hopeful, to engage in dialogue and debate, and to harness the opportunities that lie ahead. It's not about choosing between the grand narrative and the individual, but rather finding a way to harmoniously integrate both.
Metamodernism in Politics
In recent years, we've seen political movements around the world that embody the elements of Metamodernism. On one hand, there's a call for a return to grand narratives and nostalgia for perceived better times, while on the other, there's a desire to dissolve hierarchical structures and traditional norms in favor of individual freedom and recognition.
A case in point is the political era marked by the rise of Donald Trump in the United States. Trump's slogan, "Make America Great Again," was a nod to the modernist ideal of a grand narrative - a return to American exceptionalism. It was an appeal to a past time when things were, as perceived by some, better.
Meanwhile, reactions on the left have taken a different trajectory. Movements to decentralize power, break down traditional norms, and encourage more individual subjectivity echoing postmodern sentiments.
Metamodernism enables us to interpret these political movements from a fresh perspective. It does not discard the grand narrative nor does it plunge into fragmentation. Instead, it presents a narrative of balance and synthesis, oscillating between the modernist and postmodernist perspectives, and offering a way forward that is nuanced, respectful of individual experiences, and yet oriented toward a shared goal for the culture and people.
In the realm of politics, the metamodern era isn't about swinging to one extreme or another. Instead, it suggests a way to reconcile the polarity and move forward, synthesizing the best of both perspectives into a more nuanced, inclusive future. This is the metamodern political landscape, complex and dynamic, where grand narratives and individual stories coexist and inform one another.
The Metamodernist Canvas in Graphic Design
Now, let's look at the impact of Metamodernism on graphic design, a realm where I live and breathe every day. Here, Metamodernism offers a fresh perspective, providing a way to express the complexity of the world we live in and creating a narrative that is both universal and individual.
Traditional graphic design was about simplicity and clarity. It was built on the modernist principles of functionalism and minimalism, where form follows function. Postmodern design, however, sought to question these principles, embracing complexity, contradiction, and the power of the image.
As a graphic designer in the metamodern era, I find myself torn between these two extremes. On one hand, I appreciate the clarity and simplicity of modernist design. On the other, I am captivated by the dynamism and complexity of postmodern aesthetics.
The solution, I believe, lies in the synthesis offered by Metamodernism. Metamodernist design does not reject the past, but rather builds on it. It blends the simplicity of modern design with the vibrancy of postmodern aesthetics, creating something that is both familiar and fresh.
The Metamodernist canvas is a space where contrasting ideas can coexist and inform each other. It is a space where the universal and the individual intersect, creating narratives that resonate on multiple levels. It is a space where design can play a role in building a more cohesive and well integrated society.
The challenge for designers in the metamodern era is to create designs that reflect this complexity and nuance, designs that speak to both the individual and the collective, designs that challenge, inspire, and unite. It's a tall order, but it's a challenge that, as designers, we are ready and excited to embrace.
Liminal Spaces and the Visual Language of Metamodernism
A pivotal concept within the Metamodernist philosophy is that of the "liminal space" - an in-between space, where transformation occurs. These spaces, often associated with uncertainty, dislocation, and transition, have become particularly poignant in recent times as we grappled with the global impact of COVID-19.
Within this context, we've all had a shared experience of liminality. Offices, parks, and public spaces - once bustling with activity - suddenly became eerily quiet and deserted. These images have since been ingrained in our collective memory, symbolizing a profound shift in our way of life.
From a visual perspective, these liminal spaces offer a unique canvas to create Metamodernist narratives. Picture a 3D render of an empty office space, serving as a backdrop for a fusion of past and future aesthetics, where classical works of art - subtly altered - coexist with modern elements. Consider the emotional impact of a low-resolution Mona Lisa or a melting clock a la Salvador Dalí set against the familiar concrete reality of the modern workspace.
This use of liminal space is not just a stylistic choice. It's a nod to our shared experiences, an acknowledgment of the transitions we are going through as a society. It's a way of showing that while we live in an era of immense change and uncertainty, we are also capable of creating new narratives, of finding beauty in the unfamiliar, and of moving forward together.
The challenge in Metamodernist design is to create a visual language that resonates with our collective experiences, that brings together the past and the future, the familiar and the strange, and that stimulates thought, dialogue, and connection. And that, I believe, is where the true power of Metamodernist design lies.
Metamodernism in Art, Music, and Memes
Just as in politics and graphic design, Metamodernism manifests itself in various facets of culture, from art and music to internet memes. This wide-ranging influence attests to the universality of Metamodernist thinking and its ability to encompass and unify diverse aspects of human experience.
In visual arts, consider Banksy's elusive street art, which often blends irony and sincerity, public space and private sentiment, modern graffiti techniques and traditional painting styles. In music, take the example of Kanye West's album "Jesus is King," which fuses gospel traditions with hip-hop sensibilities, blurring the line between secular and religious, the mainstream and the fringe.
Meanwhile, the internet meme culture, characterized by its oscillation between irony and sincerity, absurdity and poignancy, chaos and order, is perhaps one of the most profound expressions of Metamodernism. Memes like "This is fine," a dog calmly sitting in a burning room, epitomize the Metamodernist spirit by acknowledging the complexities and contradictions of modern life while also seeking to find humor and connection within them.
Even the trend of remixing adult rap with kids shows can be seen as Metamodernist. It juxtaposes the mature themes of rap music with the innocence of children's entertainment, resulting in a work that is both familiar and disorienting, humorous and thought-provoking.
In all these instances, Metamodernist works draw from the past and present, high culture and popular culture, the sacred and the profane, to create experiences that are multilayered, dynamic, and rich in meaning. They acknowledge the complexity and diversity of human experience, yet also aspire to forge connections, provoke thought, and inspire change.
The Rise of Bitcoin and Metamodernist Economics
The rise of Bitcoin - the world's first decentralized digital currency - is a prime example of Metamodernist influence in economics. Bitcoin incorporates elements from both modernist and postmodernist economic theories, yet transcends them by creating a novel economic system that has never been seen before.
On one hand, Bitcoin harks back to the modernist ideal of hard money. It revives the principles of scarcity and predictability that underpinned the gold standard, a system that many believe led to stable, prosperous economies. On the other hand, Bitcoin's design is rooted in postmodern principles of decentralization and disintermediation, disrupting traditional economic hierarchies and structures.
But Bitcoin isn't just a fusion of modern and postmodern economics. It goes a step further by incorporating elements of Metamodernist thinking. Bitcoin's design encourages a sincere, cooperative approach to economic interaction. Its transparent, tamper-proof ledger (blockchain) promotes trust and collaboration, discourages deceit, and enables all participants, no matter how big or small, to verify transactions independently.
Moreover, Bitcoin is a grand narrative in itself - a vision of a world where economic power is not concentrated in the hands of a few, but distributed among many. At the same time, it acknowledges the individuality and diversity of its participants. Each Bitcoin user has a unique address and can transact freely with anyone in the world, without the need for a middleman.
Bitcoin's rise offers a glimpse into what a Metamodernist economic system might look like - one that combines the best aspects of modern and postmodern economics, while also adding a new layer of trust, cooperation, and individual freedom.
The Impact of Urbit and Metamodernist Computing
Urbit symbolizes a compelling manifestation of Metamodernist ideology within the realm of technology. This unique operating system revolutionizes the individual's interaction with the digital world, intrinsically mirroring the principles of Metamodernism.
In contrast to the postmodern complexities that plague the current internet – a web characterized by surveillance capitalism, privacy invasion, and data centralization – Urbit leans towards a modernist vision. It champions the idea of the internet as a streamlined, intuitive tool, but concurrently it envisions something unprecedented: a digital landscape where each user not only owns but is also the infrastructure of their digital identity and data.
The design philosophy of Urbit embodies a characteristic Metamodernist oscillation, as it traverses between elements of the past and the future, the familiar and the uncharted. It embraces the modernist simplicity reminiscent of early computing while concurrently advancing a futuristic concept of a personal server for every individual, in which they possess full sovereignty over their digital existence.
Urbit’s operating system and its unique programming language, Nock and Hoon, employ a Kelvin versioning system. This system is designed to decrement towards zero instead of incrementing upwards, epitomizing the modernist pursuit of perfection and simplicity. Once the protocol reaches zero, it signifies that an ideal state has been achieved, and no further changes will be required. This, in essence, represents the modernist grand narrative embedded within Urbit's design.
In the wider narrative of Metamodernism, Urbit symbolizes a decentralized, user-centric digital future. It recognizes the individuality of each user and emphasizes their control over their digital persona and interactions.
The promise of a completely decentralized internet is a vision still in progress. Regardless, it offers crucial insights into how Metamodernist principles could potentially shape our digital future. It paints a picture of an equilibrium between grand narratives and individual nuances, encapsulating a collective digital aspiration, as well as personal digital realities.
Moving Towards a Metamodernist Future
The common thread running through the Metamodernist era is the simultaneous embrace of grand narratives and personal experiences, the oscillation between modernist and postmodernist ideals, and the sincere pursuit of a better future.
However, moving towards a Metamodernist future is not without challenges. The danger lies in taking Metamodernist principles to an extreme, where the balance between irony and sincerity, grand narratives and individual nuances, can be lost. It's vital to avoid the pitfalls of dogmatism and extremism that plagued previous cultural eras.
For instance, an overemphasis on grand narratives can lead to totalitarian tendencies, while an excessive focus on individual nuances can result in cultural fragmentation. Metamodernism's strength lies in its ability to reconcile these extremes, fostering a sense of shared purpose while acknowledging individual experiences and perspectives.
Similarly, the interplay of irony and sincerity, often seen in Metamodernist works, should not tip over into either pure cynicism or naive earnestness. The goal should be to create a dialectic, a conversation, a fusion that creates a new, more complex understanding.
As we move towards this future, we can use the tools at our disposal – from graphic design and art, to music, memes, Bitcoin, and Urbit – to explore and shape this Metamodernist narrative. By consciously adopting Metamodernist principles, we can construct a culture that is at once reflective of our individual experiences and representative of our collective aspirations. In doing so, we can pave the way for a future that truly encapsulates the complexity, diversity, and richness of the human experience.
A Future Infused with Metamodernism
Metamodernism offers a comprehensive cultural lens through which we can understand, critique, and navigate our world. It provides a potential pathway to a future where our grand collective narratives coexist harmoniously with our nuanced individual experiences.
In the creative world, artists and designers can become the torchbearers of this movement, integrating Metamodernist principles into their work. They can leverage the power of nostalgia, sincerity, irony, and innovation to create works that resonate with the complexities of the human condition, reflecting both shared experiences and personal journeys.
In the world of technology and economics, Metamodernist principles illuminate the path to a more decentralized, user-centric digital future, as embodied by Bitcoin and Urbit. These platforms highlight the value of individual autonomy within a collective system, creating a new narrative of economic and digital empowerment.
In the political realm, Metamodernism can help create a dialogue that is both encompassing and respectful of diverse perspectives. It advocates for a new kind of political discourse that eschews extreme polarization in favor of a nuanced conversation that acknowledges the complexities of our world.
In essence, the potential of Metamodernism lies in its capacity to weave a compelling tapestry of our collective human experience – one that is vibrant, complex, and teeming with diverse narratives. By understanding and embracing the principles of Metamodernism, we can co-create a future that truly reflects the dynamic interplay of our shared narratives and individual nuances.
In this promising future, we can all become active participants in the Metamodernist narrative, shaping a world that values both the grandeur of our collective dreams and the authenticity of our individual experiences. The future is not just something we move towards; it is something we actively create. And Metamodernism provides a powerful blueprint for this creation.
Read more from Adam Malin at habitus.blog.
Adam Malin
You can find me on Twitter or on Nostr at
npub15jnttpymeytm80hatjqcvhhqhzrhx6gxp8pq0wn93rhnu8s9h9dsha32lx
value4value Did you find any value from this article? Click here to send me a tip!
-
@ 0e649f32:8a33b33b
2023-07-26 22:42:14Fite 4 Liberty is a place for lovers of Liberty to hear about amazing people in the Liberty Movement and what they are working on. With a mix of updates, interviews, and live shows; there's a little something for everybody!Twice a week David Fite sits down with Politicians, Entrepreneurs, and Activists to discuss the ways they are "Fite-ing" for Liberty and how others can do the same.
David Fite Vice President at Kraften Capital Political Consultant and Entrepreneur fighting to make people’s lives easier whether that’s through simplified laws, low cost financial services, or entheogen access. Cedarville University Business Administration and Management, General
Richard Blank is an Entrepreneur and CEO of Costa Rica's Call Center who built his company and wealth from the ground up. He joins the Fite to talk about financial independence and how it is the truest form of freedom we can experience today.
Richard’s vision quest journey is filled with twists and turns. When he was 27 years old, he relocated to Costa Rica to train employees for one of the larger call centers in San Jose. With a mix of motivational public speaking style backed by tactful and appropriate rhetoric, Richard shared his knowledge and trained over 10 000 bilingual telemarketers.
Richard Blank has the largest collection of restored American Pinball machines and antique Rockola Jukeboxes in Central America making gamification a strong part of CCC culture. Richard Blank is the Chief Executive Officer for Costa Rica’s Call Center since 2008.
Mr. Richard Blank holds a bachelors degree in Communication and Spanish from the University of Arizona and a certificate of language proficiency from the University of Sevilla, Spain. A Keynote speaker for Philadelphia's Abington High School 68th National Honors Society induction ceremony. In addition, inducted into the 2023 Hall of Fame for Business. Giving back to Abington Senior High School is very important to Mr. Blank. As such, he endows a scholarship each year for students that plan on majoring in a world language at the university level.
Costa Rica’s Call Center (CCC) is a state of the art BPO telemarketing outsource company located in the capital city of San Jose, Costa Rica. Our main focus has been, and will always be to personally train each and every Central America call center agent so that we may offer the highest quality of outbound and inbound telemarketing solutions and bilingual customer service to small and medium sized international companies, entrepreneurs as well as fortune 500 companies.
https://costaricascallcenter.com/en/outbound-bpo-campaigns/
RichardBlank #CostaRica #CallCenter #Outsourcing #Telemarketing #BPO #Sales #Entrepreneur #B2B #Business #Podcast #Leadgeneration #Appointmentsetting #fite4libertypodcast
-
@ 884f5d1d:1ed306f6
2023-07-26 21:00:46Sed ut perspiciatis unde omnis iste natus error sit voluptatem accusantium doloremque laudantium, totam rem aperiam, eaque ipsa quae ab illo inventore veritatis et quasi architecto beatae vitae dicta sunt explicabo. Nemo enim ipsam voluptatem quia voluptas sit aspernatur aut odit aut fugit, sed quia consequuntur magni dolores eos qui ratione voluptatem sequi nesciunt. Neque porro quisquam est, qui dolorem ipsum quia dolor sit amet, consectetur, adipisci velit, sed quia non numquam eius modi tempora incidunt ut labore et dolore magnam aliquam quaerat voluptatem. Ut enim ad minima veniam, quis nostrum exercitationem ullam corporis suscipit
eprehenderit qui in ea voluptate velit esse quam nihil molestiae consequatur, vel illum qui dolorem eum fugiat quo voluptas nulla pariatur? At vero eos et accusamus et iusto odio dignissimos ducimus qui blanditiis praesentium voluptatum deleniti atque corrupti quos dolores et quas molestias excepturi sint occaecati cupiditate non provident, similique sunt in culpa qui officia deserunt mollitia animi, id est laborum et dolorum fuga. Et harum quidem rerum facilis est et expedita distinctio. Nam libero tempore, cum soluta nobis est eligendi optio cumque nihil impedit quo minus id quod maxime placeat facere
-
@ 648c0f53:96de86a6
2023-07-26 20:39:43You're at your computer, browsing, writing, networking, gaming, or whatever it is you do.
A notification in your lower right corner of the screen informs you that your PC is finally eligible to install the latest Windows 11 build, and it is also free! That's great - no need to pay those 80 bucks for something that, let's be honest, you searched for product keys on sketchy websites. Yeah yeah, you got a virus by clicking on that phantom download button, but who cares, Avast took care of that. But now that problem no longer arises since you didn't pay money to Microsoft for Windows 11!
As you revel in the new shiny UI, centered buttons, and Microsoft Office suite at your fingertips, you start to question the security of it all. But you can feel something is wrong. Is it okay to run your favorite software wallet or companion app for your hardware wallet on an OS that you know was made by Microsoft? How secure is it? Can someone detect me when I'm writing down my private keys into my wallet? Is something monitoring my connections? Do they know to whom I send my sats to? Is it sate to store personal informations and documents on this PC?
In the depths of your mind, the big "why" lingers: why didn't I pay for this? Yeah, why didn't you pay for it? Then you think of a mantra:
Oh, so is Windows 11 free because Microsoft wants a capillary diffusion of this OS? Why? Why not gain profit from it? What is their intention? I don't trust such a gigantic and powerful company that has the political reach that Microsoft has.
Bitcoiners taught me another cool mantra:
As you dive deeper, seeking transparency, you head to Microsoft's GitHub page to inspect Windows source code But to your disappointment, the treasure trove of information remains undiscovered. Microsoft does not publish their beloved product's source code.
This isn't right.
Alright, you're now fed up, you are bitcoiner goddammit! You require that key components of your digital life, like the OS, should be free, freely available and free.
An old memory in the back of your mind surfaces in front of you. Some weird IT guy at you old job talked to you about some weird stuff, this ~~Linux~~ GNU/Linux. He said it is FOSS and everybody can contribute. It was 2006, all this tech mambo-jumbo was not your strong suit. You somewhat read about Linux, but what the hell is FOSS, what's a GNU and why would you care? To be fair now you know about private keys, public keys, UTXOs, ~~hardware wallets~~ signing devices! You also now know about nsec, npub, relays and NIPS! All the weirdest stuff! It's time man, you are now the weird guy, embrace the weirdness, you finally decided to approach Linux!
...to be continued...
-
@ b12b632c:d9e1ff79
2023-07-20 20:12:39Self hosting web applications comes quickly with the need to deal with HTTPS protocol and SSL certificates. The time where web applications was published over the 80/TCP port without any encryption is totally over. Now we have Let's Encrypt and other free certification authority that lets us play web applications with, at least, the basic minimum security required.
Second part of web self hosting stuff that is really useful is the web proxifycation.
It's possible to have multiple web applications accessible through HTTPS but as we can't use the some port (spoiler: we can) we are forced to have ugly URL as https://mybeautifudomain.tld:8443.
This is where Nginx Proxy Manager (NPM) comes to help us.
NPM, as gateway, will listen on the 443 https port and based on the subdomain you want to reach, it will redirect the network flow to the NPM differents declared backend ports. NPM will also request HTTPS cert for you and let you know when the certificate expires, really useful.
We'll now install NPM with docker compose (v2) and you'll see, it's very easy.
You can find the official NPM setup instructions here.
But before we absolutely need to do something. You need to connect to the registrar where you bought your domain name and go into the zone DNS section.You have to create a A record poing to your VPS IP. That will allow NPM to request SSL certificates for your domain and subdomains.
Create a new folder for the NPM docker stack :
mkdir npm-stack && cd npm-stack
Create a new docker-compose.yml :
nano docker-compose.yml
Paste this content into it (CTRL + X ; Y & ENTER to save/quit) :
``` version: '3.8' services: app: image: 'jc21/nginx-proxy-manager:latest' restart: unless-stopped ports: # These ports are in format
: - '80:80' # Public HTTP Port - '443:443' # Public HTTPS Port - '81:81' # Admin Web Port # Add any other Stream port you want to expose # - '21:21' # FTP # Uncomment the next line if you uncomment anything in the section # environment: # Uncomment this if you want to change the location of # the SQLite DB file within the container # DB_SQLITE_FILE: "/data/database.sqlite" # Uncomment this if IPv6 is not enabled on your host # DISABLE_IPV6: 'true' volumes: - ./nginxproxymanager/data:/data - ./nginxproxymanager/letsencrypt:/etc/letsencrypt
```
You'll not believe but it's done. NPM docker compose configuration is done.
To start Nginx Proxy Manager with docker compose, you just have to :
docker compose up -d
You'll see :
user@vps:~/tutorials/npm-stack$ docker compose up -d [+] Running 2/2 ✔ Network npm-stack_default Created ✔ Container npm-stack-app-1 Started
You can check if NPM container is started by doing this command :
docker ps
You'll see :
user@vps:~/tutorials/npm-stack$ docker ps CONTAINER ID IMAGE COMMAND CREATED STATUS PORTS NAMES 7bc5ea8ac9c8 jc21/nginx-proxy-manager:latest "/init" About a minute ago Up About a minute 0.0.0.0:80-81->80-81/tcp, :::80-81->80-81/tcp, 0.0.0.0:443->443/tcp, :::443->443/tcp npm-stack-app-1
If the command show "Up X minutes" for the npm-stack-app-1, you're good to go! You can access to the NPM admin UI by going to http://YourIPAddress:81.You shoud see :
The default NPM login/password are : admin@example.com/changeme .If the login succeed, you should see a popup asking to edit your user by changing your email password :
And your password :
Click on "Save" to finish the login. To verify if NPM is able to request SSL certificates for you, create first a subdomain for the NPM admin UI : Click on "Hosts" and "Proxy Hosts" :
Followed by "Add Proxy Host"
If you want to access the NPM admin UI with https://admin.yourdomain.tld, please set all the parameters like this (I won't explain each parameters) :
Details tab :
SSL tab :
And click on "Save".
NPM will request the SSL certificate "admin.yourdomain.tld" for you.
If you have an erreor message "Internal Error" it's probably because your domaine DNS zone is not configured with an A DNS record pointing to your VPS IP.
Otherwise you should see (my domain is hidden) :
Clicking on the "Source" URL link "admin.yourdomain.tld" will open a pop-up and, surprise, you should see the NPM admin UI with the URL "https://admin.yourdomain.tld" !
If yes, bravo, everything is OK ! 🎇
You know now how to have a subdomain of your domain redirecting to a container web app. In the next blog post, you'll see how to setup a Nostr relay with NPM ;)
Voilààààà
See you soon in another Fractalized story!
-
@ 6e0a1f48:c9f444e5
2023-07-26 20:08:13Today, I will address the glorious revolution of cryptocurrencies and how, in an unexpected turn of events, the individual finally triumphed over the traditional financial sector.
The evolution of money is, in all respects, a tortuous narrative of the struggle for power and control. The poor common citizen, no matter what the era, has always been on the sidelines, a slave to the economy and financial forces. However, friends, the human saga is anything but predictable, and from time to time, a David arises to slay a Goliath.
Our ancestors, primitive dreamers, traded goods and services in an unbalanced dance called barter. Men often had to crush their spines to find a fair balance, a feat rarely achieved. But times were changing and with the invention of coins, a bit of dignity was restored. But, more was needed.
I will not bore you with the complex sequence of events that brought us here. I will get straight to the point. Coins, banknotes, checks, credit cards, were all progressive steps on the path of financial evolution. But 2009 came around, and a silent revolution began to unfold: Bitcoin emerged.
My emphasis, ladies and gentlemen, is not so much on the cryptocurrency itself, but on the idea behind it. The idea that, despite the unparalleled power of major financial institutions and governments, the individual could regain control. In its rawest form, Bitcoin and subsequent cryptocurrencies represent a challenge to conventional narratives of monetary control, restoring power to the people. Its decentralized nature signifies not just freedom, but also responsibility.
In this new financial world, you are your own bank. No one else controls your money. Ensure that your private keys are safe, and you will have total autonomy over your finances.
Isn't this the kind of freedom that our ancestors dreamed of? Wasn't this the fight they fought, the right to have complete control over their own efforts and earnings? I would say so. Bitcoin and other cryptocurrencies represent a threat to the status quo and may well be the potential tool for a truly free society. But, as we must remember, with great power comes great responsibility.
It is up to us all to never forget the reasons for this invention, this idea, this utopia, and to protect and propagate its message.
-
@ bcea2b98:7ccef3c9
2023-07-20 18:13:11Atop a majestic mountain called Mt. Gox, a tale unfolded that would forever be etched in the history of cryptocurrency. This is the story of a legendary exchange, a hub of digital treasures, and the challenges it faced along the way.
In the early days of Bitcoin, when the world was just beginning to grasp the concept of digital currencies, a passionate entrepreneur named Jed McCaleb founded a platform called Mt. Gox. Located high above the clouds on the slopes of Mt. Gox, the exchange quickly became the center of the Bitcoin universe.
Bitcoin enthusiasts from all corners of the globe flocked to Mt. Gox, eager to trade, buy, and sell their digital coins. It became a bustling marketplace, a hub of innovation, and a symbol of the emerging cryptocurrency ecosystem.
As the popularity of Bitcoin skyrocketed, so did the demand for Mt. Gox's services. The exchange handled an immense volume of transactions, becoming the largest Bitcoin exchange in the world. Its name echoed throughout the digital realm, synonymous with the promise and potential of the cryptocurrency revolution.
However, as with any great tale, challenges arose. In 2011, a cyber attack targeted Mt. Gox, leading to the theft of a substantial number of Bitcoins. This event served as a wake-up call, revealing vulnerabilities within the exchange and prompting the need for heightened security measures.
The incident didn't dampen the spirit of Mt. Gox. The team worked tirelessly to recover from the attack, implementing new security protocols and earning back the trust of its users. Mt. Gox emerged stronger than ever, serving as a beacon of stability in the ever-evolving cryptocurrency landscape.
But the story of Mt. Gox took an unexpected turn. In 2014, another significant blow struck the exchange. It was discovered that a substantial number of Bitcoins were missing from Mt. Gox's vaults. The magnitude of the loss sent shockwaves throughout the cryptocurrency community and shook the foundations of the industry.
As the truth emerged, it became clear that Mt. Gox faced insurmountable financial challenges. The exchange was forced to declare bankruptcy, leaving its users devastated and questioning the future of digital currencies.
Yet, amidst the chaos, the story of Mt. Gox served as a catalyst for change and resilience in the cryptocurrency world. It brought to light the need for enhanced security practices, regulatory oversight, and a renewed commitment to building trustworthy platforms for the exchange of digital assets.
Over time, the lessons learned from Mt. Gox's history paved the way for greater transparency, improved infrastructure, and the emergence of more secure cryptocurrency exchanges. It became a cautionary tale, reminding the industry of the importance of accountability, investor protection, and responsible innovation.
Today, as we reflect on the history of Mt. Gox, we see a story of both triumph and adversity. It stands as a reminder that the cryptocurrency landscape is still in its early stages, evolving and maturing with each passing day.
So, dear listener, let the tale of Mt. Gox serve as a lesson in resilience and growth. As the cryptocurrency world continues to advance, let us navigate the digital landscape with caution, learn from the past, and work towards a future where innovation and security walk hand in hand.
-
@ 6e0a1f48:c9f444e5
2023-07-26 20:08:05Hoje, vou abordar a gloriosa revolução das criptomoedas e como, em uma volta inusitada dos eventos, o indivíduo finalmente levou a melhor sobre o setor financeiro tradicional.
A evolução do dinheiro é, em tudo, uma narrativa tortuosa da luta pelo poder e controle. O pobre cidadão comum, não importa qual era a época, sempre encontrou-se às margens, escravo da economia e das forças financeiras. Mas amigos, a saga humana é tudo menos previsível, e de tempos em tempos, um David surge para abater um Golias.
Nossos ancestrais, sonhadores primitivos, trocavam bens e serviços em uma dança desequilibrada chamada escambo. Muitas vezes, os homens tinham que amassar a espinha para encontrar um justo equilíbrio, o que raramente acontecia. Mas os tempos estavam mudando e, com a invenção das moedas, um pouco de dignidade foi restaurada. Mas era necessário mais.
Não vou aborrecer você com a sequência complexa dos eventos que nos trouxe até aqui. Vou direto ao assunto. Moedas, papel-moeda, cheques, cartões de crédito, todos foram passos progressivos no caminho da evolução financeira. Mas veio 2009, e uma revolução silenciosa começou a se desenrolar: o Bitcoin surgiu.
Minha ênfase, senhoras e senhores, não é tanto na criptomoeda em si, mas na ideia por trás dela. A ideia de que, apesar do poder sem paralelo das grandes instituições financeiras e governamentais, o indivíduo poderia retomar o controle. Na sua forma mais crua, o Bitcoin e as criptomoedas subsequentes apresentam uma afronta às narrativas típicas do controle monetário, restaurando o poder ao povo. Sua natureza descentralizada não significa apenas liberdade, mas também responsabilidade.
Nesse novo mundo financeiro, você é seu próprio banco. Ninguém controla seu dinheiro além de você. Se assegure que suas chaves privadas estão seguras, e você terá total autonomia sobre suas finanças.
Não é este o ideal de liberdade que nossos antepassados sonharam? Não foi essa a luta pela qual eles lutaram, o direito de ter controle total sobre seus próprios esforços e ganhos? Eu diria que sim. O Bitcoin e outras criptomoedas apresentam uma ameaça ao status quo e podem ser a ferramenta potencial para uma sociedade verdadeiramente livre. Mas, como temos que lembrar, com grande poder vem grande responsabilidade.
Cabe-nos a todos nunca esquecer o porquê desta invenção, desta ideia, desta utopia, e protejer e propagar a sua mensagem.
-
@ 0d97beae:c5274a14
2023-07-20 11:36:34testing
-
@ 5afa711a:eae0d7b8
2023-07-26 19:37:56A year and a half ago, I started noticing my belly was getting out of control. I then stepped on a scale and it showed 113 kg (250 lbs). I felt contempt for myself, I had never let myself go this much before. I was always struggling with my weight, but looking back, I think a lot of people were just projecting their own self-hatred onto me, which lead me to thinking of myself as just the fat guy, but that's a different topic altogether.
So I decided to do something. I pulled myself up by my bootstraps, got out my notebook (a physical one, call me old fashioned) and started weighing every food article I intended to eat like a maniac.
This is the CICO (Calories In, Calories Out) method. I had once lost 15 kg (33 lbs) back when I was younger with this method, in a span of 3 months or so. It was pure agony, and I immediately went back to eating crap once I reached my target weight. Now I figured it was time to do the same thing again... for like the 10th time in the last 5-6 years. Every time I attempted to lose weight with CICO, I ended up losing a couple kilos, only to quit the diet and return to not counting calories, and even gaining weight. I would feel hunger, tiredness, and just weird counting calories of every food I wanted to eat. I completely disregarded the qualitative properties of food, I genuinely believed 200 calories of a sandwich was equal to 200 calories of cooked pork. Anyway, this time, I was good enough at guesstimations and battling hunger to lose 8 kilos (18 lbs) in a year, eating ice cream, sandwiches, breakfast cereal and (a lot of) pizza.
In April 2023 I was just about to give up. I did not want to live like this. Imagine eating cereal before work, getting hungry at 10 AM and rushing to the bakery to buy a calzone. A calzone is 1000 calories, and my breakfast usually had 300 calories (of cereal or a sandwich). Add cups of coffee to this (around 50 kcal each) and you get to 1450 - 1500 kcal by noon, which meant that I could eat one small meal for the rest of the day, which meant that I would go to bed feeling hunger pangs.
On top of the sheer ineffectiveness of the approach, I started feeling very tired during the day, my libido was low, and I felt a kind of brain fog for months. I had to drink 3-4 cups of coffee just to function normally. Since I actually am a doctor, I decided to do some blood tests, and they turned out fine, aside from a vitamin D defficiency which did not explain my symptoms. Thyroid was fine, kidney function was fine, no diabetes, no signs of infection or any reason of concern for something more serious. I accepted to just feel like crap for months, justifying the exchange of fatigue for (moderate) weight loss.
By April I had read the book 'Wheat Belly' by William Davis, and realized that grains, and wheat especially, was basically poison. I knew the food pyramid was ridiculous, and no kind of grain should be a part of any human meal. I decided to cut out grain products from my diet. This did not go too well because I still believed animal fat and meat was unhealthy because it causes heart disease, colon cancer, hypertension, gout, chronic kidney disease and kidney stones... right? Right? This is Physiology 101, Biochem 202, Internal medicine, this is what we were taught. So, if I couldn't eat fat, and I couldn't eat grains, what could I eat? The answer was not much, so I failed and basically ate croissants and sandwiches regularly.
I then read Paul Saladino's book 'The Carnivore Code,' which I recommend everyone should read, even though the author reversed his position somewhat since then, and is incorrect in recommending people eat honey. After reading the book, I felt skeptical, but decided to try it out out of sheer desperation. I then just couldn't stop losing weight, and had lost 15 kg (33 lbs) in 2 months. I couldn't believe it. I had no issues of hunger. The biggest issue was the carb cravings, diarrhoea and great thirst, which all went away the first week of going carnivore. I still get the occasional carb craving, but I feel better than ever before - I am no longer fatigued, libido is great, I have no hunger issues. I am simply not interested in giving up the diet, and I have developed a serious dose of skepticism about all the things I was taught in medical school about nutrition, which was not much anyway.
So, if you are struggling with weight loss, I can strongly recommend the Carnivore diet. Hell, I started this blog on nostr of all places, because I feel like I need to shout it from the rooftops. I would have never discovered this without bitcoin, which has completely changed me as a person. As bitcoiners, remember :"Don't trust, verify." Read the literature and come to your own conclusions. Once you do, I am confident you will come to the same conclusion as I.
-
@ 4044176c:b3f3c23c
2023-07-20 06:53:16It can be tempting to disable your webcam on a video call, especially on days when you look like a hot mess. For Teams users, Microsoft is introducing a new AI-powered beauty feature that’s designed to “make people’s lives a little easier.” On Wednesday, Microsoft announced a new set of “virtual makeup” filters — similar to the appearance-altering effects seen across social media platforms, like TikTok’s Bold Glamour feature — coming to Microsoft Teams, courtesy of the cosmetics giant Maybelline.
The Maybelline Beauty app will provide Teams users with 12 unique looks at launch, with options to select from various blurring effects and digital makeup color options. Each look will provide a breakdown of the real-world Maybelline products and shades being replicated by the filter so that users can recreate the makeup on their actual faces. Companies often use these virtual “try-on” experiences to promote their real-world products, but a corporate workplace software is an unusual place to see Maybelline encouraging users to get out their wallets and “explore different makeup looks.”
It’s not clear if any of these users in Microsoft’s press imagery are “wearing” one of the Maybelline makeup filters, but you can see how the options will appear in the app. Image: Microsoft
The AI tech powering the virtual makeup filters is provided by Modiface, an augmented reality company focused on the beauty industry. Modiface’s tech is one of the most popular offerings for virtual makeup “try-on” experiences and has been used by various cosmetics companies like Sephora and Estée Lauder. Maybellines’s parent company, L’Oreal, jumped on that popularity back in 2018, acquiring Modiface for an undisclosed sum.
The filters have also been developed in collaboration with the Geena Davis Institute — a nonprofit public data organization focused on improving inclusion and diversity within media — to ensure the virtual makeup looks will be suitable for a “broad and diverse population.”
“Whether you are working in-person or virtually, feeling good about yourself can help put your best foot forward,” said Trisha Ayyagari, global brand president of Maybelline New York, in Maybelline’s press release. “That’s why we partnered with Microsoft Teams to develop virtual makeup looks — now even on the busiest day, you can put makeup on with just a click.”
Enterprise users can find the new virtual makeup offerings under the “video effects” tab in Microsoft Teams
The new feature is rolling out to global Microsoft Teams Enterprise customers starting today and can be located under the “Video Effects” tab within the Teams meeting settings. We’ve asked Microsoft if the filters will also be available to users on the free Microsoft Teams tier and will update this story if we hear back.
It’s a little strange to think that beauty filters have a place in more professional communication apps outside of the social media sphere. There’s plenty of evidence to suggest that filters designed to improve or otherwise manipulate your appearance may be harmful to mental health because of the unrealistic expectations they set for our body image. And while these AR / AI filter effects were once easily identifiable because they became distorted when the user’s face was obstructed, recent advancements like TikTok’s infamous “Bold Glamour” effect are much harder to detect.
The potential risk to our self-esteem hasn’t deterred folks from wanting to use these beauty filters in work-related applications, however. Other video conferencing platforms like Zoom already include some limited beauty effects, such as eyebrow and lipstick filters. The Maybelline Beauty app in Teams provides more options and customization, which may be more tempting to play around with — especially if they look natural enough to avoid standing out among your colleagues for all the wrong reasons.
By: Jess Weatherbed Link:https://www.theverge.com/2023/7/19/23800648/microsoft-teams-maybelline-ai-beauty-filter-virtual-makeup
-
@ 4044176c:b3f3c23c
2023-07-20 06:50:48Tesla says it has started production of its Dojo supercomputer to train its fleet of autonomous vehicles.
In its second quarter earnings report for 2023, the company outlined “four main technology pillars” needed to “solve vehicle autonomy at scale: extremely large real-world dataset, neural net training, vehicle hardware and vehicle software.”
“We are developing each of these pillars in-house,” the company said in its report. “This month, we are taking a step towards faster and cheaper neural net training with the start of production of our Dojo training computer.”
Image: Tesla The automaker already has a large Nvidia GPU-based supercomputer that is one of the most powerful in the world, but the new Dojo custom-built computer is using chips designed by Tesla. In 2019, Tesla CEO Elon Musk gave this “super powerful training computer” a name: Dojo.
Previously, Musk has claimed that Dojo will be capable of an exaflop, or 1 quintillion (1018) floating-point operations per second. That is an incredible amount of power. “To match what a one exaFLOP computer system can do in just one second, you’d have to perform one calculation every second for 31,688,765,000 years,” Network World wrote.
At Tesla’s AI Day in 2021, Dojo was still a work in progress. Executives revealed its first chip and training tiles, which would eventually develop into a full Dojo cluster or “exapod.” Tesla said it will combine 2 x 3 tiles in a tray and two trays in a computer cabinet for over 100 petaflops per cabinet. In a 10-cabinet system, Tesla’s Dojo exapod will break the barrier of the exaflop of compute.
A year later, at AI Day 2022, Tesla unveiled some progress on Dojo, including having a full system tray. At the time, the automaker spoke about having a full cluster by early 2023 — though now it looks like it will likely be early 2024.
Developing...
By:Andrew J. Hawkins Link:https://www.theverge.com/2023/7/19/23800854/tesla-driverless-dojo-supercomputers-production
-
@ 4ac847f3:16dc6c5a
2023-07-26 19:15:07🐦💼 Twitter (agora X) CEO Linda Yaccarino afirma que o uso está em 'alta recorde' em memorando para a equipe 💼🐦
Em um cenário em constante evolução das redes sociais, o Twitter, agora conhecido como X, continua a se destacar como uma plataforma líder, mantendo sua posição como um dos principais canais de comunicação e interação online em todo o mundo. Recentemente, a CEO do Twitter, Linda Yaccarino, enviou um memorando empolgante para sua equipe, no qual afirmava que o uso da plataforma estava atingindo níveis nunca antes vistos.
Descubra mais detalhes sobre essa emocionante notícia aqui: Leia mais
-
@ 4ac847f3:16dc6c5a
2023-07-26 19:10:24🔒 SimpleLogin: Uma Ferramenta Poderosa para Proteger sua Privacidade Online 🔒
No mundo digital em constante expansão, a privacidade e a segurança online tornaram-se questões primordiais para usuários em todas as partes do globo. Com o aumento de ataques cibernéticos e o rastreamento constante de nossas atividades na web, a busca por soluções eficazes para proteger nossa privacidade tem se tornado cada vez mais crucial.
Nesse contexto, o SimpleLogin surge como uma ferramenta poderosa e abrangente para salvaguardar nossos dados pessoais e manter nossa identidade online protegida. Essa plataforma oferece uma maneira fácil de criar aliases de e-mail, o que permite que os usuários protejam suas informações ao se cadastrar em sites ou serviços online. Ao usar aliases em vez de seus endereços de e-mail reais, os usuários podem evitar o rastreamento de suas atividades e reduzir o spam em suas caixas de entrada.
Além disso, o SimpleLogin também protege contra vazamentos de dados, fornecendo alertas em tempo real sempre que um dos serviços associados ao seu alias de e-mail sofre uma violação de segurança.
Com sua interface simples e intuitiva, o SimpleLogin é acessível a todos, independentemente do nível de conhecimento técnico. Ele é compatível com diversos clientes de e-mail e pode ser facilmente integrado aos navegadores mais populares.
Se você está preocupado com sua privacidade online e deseja proteger sua identidade digital, o SimpleLogin é definitivamente uma solução a ser considerada.
Leia mais sobre essa poderosa ferramenta de privacidade em: https://technewsbr.substack.com/p/simplelogin
-
@ 4044176c:b3f3c23c
2023-07-20 06:48:54IMAGE: Thank You Fantasy Pictures — Pixabay
I have the impression we’re going to be seeing more news like this: the Associated Press (AP) has signed a partnership deal with Open AI, the parent company of ChatGPT, that will give the US news agency access toOpenAI’s technology and products, while OpenAI’s algorithms will be trained with the vast archive of news texts generated by the agency since 1985.
In 2014, AP announced a ground-breaking partnership with Automated Insights to use algorithms to generate news such as summaries of financial results or sports reports, which allowed it to significantly extend its coverage. Meanwhile, Bloomberg uses this type of technology in approximately one third of its news output. AP already provides daily news in English, German, Dutch, French and Spanish, using sophisticated translation technologies capable of maintaining a certain style, and that has put many translators out of work.
For OpenAI, using AP news stories to train its generative algorithms provides it with guarantees of veracity, an important issue, if we see more successful lawsuits issued against companies that create generative algorithms by artists, writers, comedians or image banks like Getty Images. At a time when it is becoming harder to obtain quality data to train algorithms, agreements like this will be key, given that constantly reusing the same material risks creating a negative feedback loop.
The timing is important: as the technology companies creating generative algorithms search for data to train them with, companies in all types of industries are considering whether they should train their own algorithms using their own data, or whether they should wait to use the data created by those technology companies. The outcome of these decisions will shape the next stage of technology, which could return to being dominated by a few companies or, hopefully, be a more democratic and multifaceted model, with a wide variety of inputs, and helping develop open source tools.
Until now, practically all the companies working on generative algorithms have simply acquired information from the web through scraping, the legality of which has been questioned by some of the owners of this information. Web scraping is undoubtedly a controversial approach: while many defend the legality of capturing information that has been made public on the web, other cases have been described as abusive. The agreement signed between AP and OpenAI marks an important precedent in this regard, and quite possibly, a change in the evolution of this strategic issue.
By:Enrique Dans Link:https://medium.com/enrique-dans/the-search-is-on-for-reliable-data-to-train-generative-algorithms-fb395f5eaab0
-
@ d266da53:7224d834
2023-07-20 06:46:31Introduction:
In the rapidly evolving landscape of blockchain and decentralized technologies, Zero-Knowledge (zk) proofs have emerged as a transformative force, offering a revolutionary approach to privacy and data integrity. As we stand at the threshold of a new era in zk-based technology, this article explores the boundless potential and the remarkable impact zk-based solutions are poised to bring to the digital realm.
The Power of Zero-Knowledge Proofs:
At its core, Zero-Knowledge proofs empower parties to validate the truth of a statement without revealing any underlying information. This cryptographic technique offers an elegant way to enhance privacy, ensuring data confidentiality, and fostering trust between parties, without the need to disclose sensitive details.
Enhancing Blockchain Scalability and Efficiency:
One of the most significant challenges facing the blockchain industry today is scalability. The application of zk-based protocols, such as zk-SNARKs (Zero-Knowledge Succinct Non-Interactive Arguments of Knowledge), holds the key to unlocking unprecedented scalability. By reducing the computational overhead required for verifying transactions, zk-SNARKs pave the way for faster, more efficient, and scalable blockchain networks.
Privacy-Preserving Smart Contracts:
Traditional smart contracts on public blockchains operate transparently, exposing sensitive information to all network participants. With zk-based technology, privacy is no longer a luxury. Zero-Knowledge proofs enable the creation of privacy-preserving smart contracts, ensuring that transaction details, contract terms, and private data remain confidential between the relevant parties while still being verifiable on the blockchain.
Secure Data Sharing and Collaboration:
In today’s interconnected world, data sharing is vital for innovation and progress. However, concerns about data breaches and unauthorized access have plagued enterprises and individuals alike. zk-based solutions present an opportunity to redefine data sharing paradigms. By employing Zero-Knowledge proofs, organizations can securely collaborate, share insights, and leverage collective intelligence without compromising sensitive data.
Revolutionizing Identity Management:
The conventional approach to identity management relies heavily on centralized databases, exposing personal information to potential cyber threats. With zk-based identity solutions, individuals gain control over their identity data while selectively revealing specific attributes without divulging their complete identity. This promises a new era of self-sovereign identity, where user privacy and security are paramount.
Democratizing Financial Services:
The world’s unbanked population faces significant challenges in accessing financial services. zk-based technologies offer a gateway to financial inclusion by enabling secure and private transactions without the need for traditional banking infrastructure. This has the potential to uplift millions by providing access to a global and decentralized financial system.
Conclusion:
As we venture into the future, Zero-Knowledge-based technology emerges as a transformative force, shaping the digital landscape with unparalleled privacy, security, and efficiency. From revolutionizing blockchain scalability to redefining data sharing and empowering individuals with self-sovereign identity, zk-based solutions are set to redefine the boundaries of what’s possible in the digital realm.
However, with great promise comes the responsibility of ensuring responsible adoption and addressing potential challenges. As the zk-based technology ecosystem matures, collaborative efforts from researchers, developers, and policymakers will be crucial in unlocking its full potential while safeguarding user rights and ensuring ethical practices.
As we embrace the future of zk-based technology, let us embark on this journey with a commitment to building a more secure, private, and inclusive digital world for generations to come.
By:Traeyo Sopo Link:https://medium.com/@maniabroo003/unveiling-the-future-of-zero-knowledge-zk-based-technology-ffac443e7a1
-
@ 4ac847f3:16dc6c5a
2023-07-26 18:56:49🚨🔒 Operação de Halving da Polícia Federal bloqueia mais de R$ 130 milhões em crimes envolvendo criptoativos! 🚓💰
A Polícia Federal (PF), em parceria com o Ministério Público Federal (MPF), realizou uma operação impactante na manhã de sexta-feira, 21 de julho. A empresa Braiscompany foi o alvo da ação, que resultou no bloqueio de mais de R$ 130 milhões em crimes relacionados a criptoativos. Denominada "Operação de Halving", essa ação teve como objetivo combater atividades ilícitas que utilizavam criptomoedas no Brasil.
Saiba mais detalhes sobre a operação e suas implicações no cenário de criptoativos lendo a notícia completa: https://technewsbr.substack.com/p/operacao-de-halving-da-policia-federal
-
@ d266da53:7224d834
2023-07-20 06:43:40Imagine you’re a magician performing at the world’s most prestigious magic show…
…You’ve got a trick so mind-blowing that it leaves the audience in awe every time. This trick is your secret, your edge, and naturally, you don’t want to reveal how it’s done.
But what if you could prove to your audience that your trick is legit without revealing the secret behind it?
That, my friends, is the magic of Zero-Knowledge Proofs (ZKPs), a fascinating (but complex) concept in the world of blockchain and cryptography.
The Hard and Difficult Learning Curve
ZKPs are like the Rubik’s Cube of cryptography: intriguing, colorful, and incredibly hard to solve if you don’t know the method.
The learning curve can be hard, even for tech veterans. You have to grapple with complex mathematical concepts such as quadratic residues, elliptic curves, and the intricacies of cryptographic protocols.
"These protocols are essential in ensuring the confidentiality, integrity, and authenticity of information, and are used in a wide range of applications, including online banking, e-commerce, and secure communication."
It’s like trying to understand quantum physics while learning Mandarin — both incredibly complex and challenging in their own right.
Time-Consuming to Build
Building a ZKP system isn’t a walk in the park. It’s more like constructing a spaceship. It requires meticulous planning, careful execution, and regular fine-tuning. Each part of the process — from conceptualizing the proof system to implementing the cryptographic protocols — is akin to solving a piece of an intricate puzzle.
Let’s take Zcash, for instance, a cryptocurrency that uses ZKPs for ensuring transactional privacy. It took years of research and development by some of the brightest minds in cryptography to bring Zcash to life. Even after its launch, the team behind Zcash continues to work on improving the efficiency and security of their ZKP system.
"In Zcash, zk-SNARKs are used to prove that a transaction is valid without revealing any information about the sender, receiver, or transaction amount. This is achieved by creating a proof that the transaction is valid and that the sender has enough funds to complete the transaction, without revealing any of the details of the transaction itself."
Hard to Find Specialist Devs
Finding a ZKP specialist is like finding a needle in a haystack. They’re incredibly rare because the field is new, complex, and continuously evolving. It’s not something that can be mastered over a weekend coding bootcamp or by reading a few articles online. It requires a deep understanding of mathematics, cryptography, and computer science.
Even tech giants find it challenging to hire specialists in this field. This scarcity of talent is a significant roadblock for companies looking to incorporate ZKPs into their systems.
Other Technical Aspects
There are other considerations too. For instance, ZKPs are computationally intensive. They require significant processing power and can slow down systems if not implemented correctly. It’s like trying to run a high-end video game on an old computer — things are bound to get sluggish.
Moreover, while ZKPs can enhance privacy by keeping information hidden, they also raise new challenges in terms of data accountability and system transparency. For example, in a ZKP-based voting system, while your vote would remain secret, verifying the total count becomes tricky.
But…
In the future (maybe sooner), we could see them being used in various sectors such as healthcare for secure patient records, in voting systems for maintaining voter privacy or even in social networks for data security.
By:Leandro Pereira (Sciammarella) Link:https://medium.com/@Sciammarella/zks-are-awesome-but-31d713a8511f
-
@ 4ac847f3:16dc6c5a
2023-07-26 18:52:43🌿📢 A Fundação Nacional dos Povos Indígenas (Funai) emitiu um comunicado importante rejeitando categoricamente a tokenização de créditos de carbono em terras indígenas. O órgão alertou os povos indígenas sobre as 'falsas promessas' dessa prática, que tem se tornado cada vez mais popular no contexto das questões ambientais e das mudanças climáticas.
A decisão da Funai veio após uma análise detalhada dos possíveis impactos e riscos associados a esse modelo. A fundação defende a preservação dos direitos e interesses dos povos indígenas, destacando que o uso de tokens de crédito de carbono pode trazer consequências negativas para as comunidades indígenas e para o meio ambiente.
É fundamental estar ciente dessas questões e acompanhar as decisões relacionadas ao meio ambiente para garantir um futuro mais sustentável para todos. Para ler a notícia completa, acesse: Link para a notícia
-
@ 4ac847f3:16dc6c5a
2023-07-26 18:46:08🎉🎶 Festa eletrônica em Belo Horizonte apresentará o primeiro 'cartão em blockchain' do Brasil! 🇧🇷🔗
Uma emocionante novidade aguarda a cena da música eletrônica brasileira! O país está prestes a dar um salto inovador com o lançamento do primeiro Clube de Benefícios que utilizará a tecnologia blockchain para garantir acesso a vantagens e benefícios exclusivos. O anúncio desse projeto revolucionário foi feito durante a festa Red Room, realizada em Belo Horizonte no dia 21 de julho de 2023.
O uso do blockchain promete maior segurança e transparência no acesso aos benefícios, proporcionando aos amantes da música eletrônica uma experiência única e memorável. Com essa tecnologia, os participantes poderão desfrutar de vantagens exclusivas e inéditas, elevando a experiência da festa a um novo patamar.
Essa iniciativa pioneira coloca o Brasil na vanguarda da indústria de eventos, mostrando que o país está pronto para abraçar e explorar as possibilidades da tecnologia blockchain. O futuro da música eletrônica no Brasil parece ainda mais promissor com essa evolução empolgante!
Quer saber mais sobre essa empolgante novidade no mundo da música eletrônica? Acesse a matéria completa aqui: https://technewsbr.substack.com/p/festa-eletronica-em-belo-horizonte
-
@ d266da53:7224d834
2023-07-20 06:40:50The level of abstraction of almost all ZK-related tech info is currently either too technical or too generic, which, to me feels, is translated from online articles and videos and directly into offline discussions on events and meetups, making this whole topic quite unperceptive for non-computer-science people in web3, like myself.
I assume I’m not the only one here so let me try to challenge this.
Disclaimers:
- I’m not an engineer so I will focus more on the WHYs that I’d understood mainly from discussions with my colleagues and other smart people I met in meetings and events. The HOWs … let’s keep them to tech guys (for now).
- I try but not necessarily are super correct with definitions. If you are a computer scientist and you see bullshit, let me know:). I promise not to be too defensive.
- The article is quite big. But, bear with me. If you’re the target audience (TA), it’ll be worth it.
The problem (if you feel the same, you are TA)
I read this maybe a dozen times by now that ZKs allow you to prove the fact of the statement without revealing the statement itself — with all those fancy examples, featuring Sherlock Holmes proving the color of the ball to a color-blinded Watson, Ali Baba cave, etc., but (unsurprisingly) this doesn’t really get you close to an understanding of the real applicability of the technology today and — what’s important for tech entrepreneurs — applicability tomorrow.
AI-generated picture based on input “Sherlock Holmes and Ali Baba not revealing their secrets” 😄
Then you hear about Snarks, Starks, Rollups, ZK-EVMs and while everyone seems to speak in plain English, you still get confused even more.
When you try to delve deeper, you get stuck in things such as in the figure below…
The abstraction level in-between I found only in private discussions and on Ethereum.org. You can think of this article as an aggregation of the two + a bit of my vision of this technology.
Pre-context (how my puzzles fit into a picture)
I recently got around this article that assumes that sometime soon ZKPs would help understand with total certainty which exact AI model you use if, for example, you pay for ChatGBT 4 and want to ensure it’s not the 3rd version that you talk to.
In general, it speculates on the idea that ZKps will help verify any API we consume. This caught my particular attention, making me think that web3 without ZKps is something like web2 without HTTPS. Wow, right?
After that, I had a conversation with my colleague, who worked in traditional banking for 20 years. He switched to DEFi lately and then built with us a decentralized banking software that’s 100% on EVM smart contracts (with basic lending and borrowing). In this conversation, he mentioned that while a bank that is 100% on smart contracts sounds like (and is) a great idea, compared to a traditional, centralized bank, it is still like comparing a nuclear power plant to a potbelly stove. If you’re interested, here he had written why as well as some ZK tech visionary for future banking.
Noteworthy, both the nuclear power plant (centralized bank with enormous regulations and procedures) and the potbelly stove (decentralized bank with basic but decentralized and uncensored lendings/borrowings) have different use cases, meaning one is not worse than the other, they’re just different.
The point is, you will ALWAYS have a trilemma between decentralization, scalability, and security. Good life and technology are always about sacrificing nice-to-haves for the must-haves, right?
And what is the must-have in web3? Total decentralization? To me, it sounds too populistic… I believe the must-have is the data provenance in EVERY digital accounting system (whether blockchain-based or not, whether centralized or decentralized), namely integrity, and authenticity of data/logic. Not ensuring those two properties in your API, platform, service, and website will be like using HTTP today (some still do by the way).
Maybe, the cornerstone of partially solving the trilemma may well be the ZK-tech itself. For now, let’s just reflect on this idea and finally figure out what ZKPs actually are…
Tip: Split all ZKp use cases into two categories
The ones solving the privacy problem The ones solving the scalability problem (especially mind-blowing to me…)
ZKps solving privacy problems
Ignore this section if you already spent your hours browsing ZKPs for privacy.
Imagine there’s something you don’t want to share with somebody but still prove your point. Here are 3 examples, which I use as constructions in mind when grasping ZKPs for privacy.
- Age verification As an example, in California and other US states, Uber/Lyft passengers below 18 should be accompanied by someone who’s over 18, and at one moment those apps started asking the age of users, and some of them became frustrated about it (see below).
https://www.reddit.com/r/Lyft/comments/8jhn1d/why_is_lyft_suddenly_asking_me_to_verify_my_age/
Not everyone abides so decent drivers have to check the passengers’ age themselves, which is kind of weird and frustrating for the drivers as well.
To this point, ZKPs are great for use cases when you have a platform that does certain business activity and that became somewhat regulated by the government but its users are resistant to sharing personal information to obey this regulation. In order not to lose users in such a case, ZKps could be used in order to prove the point (e.g., I’m over 18) without revealing the details (exact age).
-
Whitelisting Another example is proving you are “on the list” without revealing who exactly from the list you are. Imagine your Bitcoin address is whitelisted to use a certain online service, but you don’t want anyone (even the service that grants you access) to know which exact address you are, except for the fact that it’s in the whitelist. I know this still sounds a bit generic, but hopefully enough to get the construction of the use case and its applicability.
-
Anonymous reporting (this one’s my favorite) I personally met one guy at the event who built this amazing platform in healthcare that uses ZKp to allow patients with incurable diseases, such as cancer, to share their unique disease reports so that researchers could investigate and create a cure that’s more specific to a particular case. The problem that ZKp solves here is proving the report is authentic (provided by the real patient) while not revealing the patient’s identity (not everyone wants to share their case and identity in order not to be prone to potential discrimination).
Here’s a link to the platform if you want to check it out — https://amrit.ai/. Their CEO, Ashwin Rathod, made a very big impression on me by targeting a very exact problem after his uncle died from cancer. He’s one of the people who sparked my interest in this technology.
ZK proofs, -Snarks, -Starks, -Rollups, ZK-EVM… Plain english, pleaaaase
In the figure below you can see approximately how I compose, let’s call it, a map of ZK tech solving scalability.
ZK-proof is the foundation on top of which everything else sits. Its goal is usually this generic definition that you’d probably read a dozen times. No surprise it uses cryptographic protocols (the hows, as agreed, let’s keep to cryptographers and mathematicians for now).
ZK-starks and ZK-snarks are specific types of ZK-proofs that are intended for almost the same goal but they are just more efficient (makes sense when your computational resources are limited). I don’t want to delve deeper as it’s not the goal of this article. For more information, check out this article on Ethereum.org — I find it quite well-articulating.
ZK-Rollups. Rollups are layer-2 solutions, aimed to scale Ethereum (and other L1s). Not all rollups use zero-knowledge proofs, but those that do are called ZK-rollups. This video is easy-going and really helped me understand what are rollups and why they need zk.
ZK-EVMs are the same ZK-Rollups but aimed to be more EVM-compatible than the general ones (meaning, with some assumptions, that they support whatever EVM/solidity support). In fact, it is claimed they are fully compatible. Remember, this tech is just appearing while I write these words and while you read them. Everything is still unclear but that’s what drives, right?
To conclude, ZK proofs, in general, are aimed at solving the privacy problem, and the rest (Snarks, Starks, Rollups, ZKEVM) are different types, applications, and technological tools aimed more at solving scalability. This is what brings me to my main point (find the meme below).
ZK Snarks (and co) are not used to hide the statement!
Now I’m going to be a little bit speculative but, as stated — change my mind.
I do think it’s a bad idea to say that the scalability-focused ZK tech is used to hide the details of the statement. The claim is correct but the narrative, I believe, is wrong as it makes newbies like me hard to connect the dots.
Evolution of scalability-solving problem (briefly)
You can ignore this section if you immediately understand the figure below.
L1 blockchains cannot (and don’t need to) spend their computational resources to validate all the transactions and initialize all the smart contracts, which is why engineers came up with L2s that process and validate transactions on themselves, meaning outside of L1s, and from time to time they timestamp their blockchain state to L1s.
L2s solved scalability but decreased security because TRXs are validated on less decentralized and less censorship-resistant L2s, which are easier to manipulate.
Now, rollups look like a better solution, where transactions are batched together off-chain but verified (with some assumptions) on-chain on L1. Again, not all rollups use zero-knowledge proofs.
For example, Optimistic Rollups are designed based on the idea which to me sounds similar to the taxation system in the US. It is assumed you pay taxes (i.e., upload correct transactions on-chain which spend existing coins), but if someone comes to you and finds out you play tricks, you will be punished. In terms of protocol, it means that before transactions become final on L1, validators randomly challenge some of them for validity. If someone uploaded a batch of transactions where some are incorrect, the portion of their stake will be taken away. The concept is clear. Not totally secure but it works, just like the taxes in the US 😄.
Then the ZK-rollups came to solve both the security and scalability problem (with some assumptions), and here’s where it gets extremely interesting, making me rethink the whole idea of the future architecture of financial (and not only) systems. Let me disclaim though that this tech is still young and in active development, meaning:
-
not everything that’s claimed can be done can actually be done today;
-
there are still lots of audits to do before this tech will be used at full commercial scale.
ZK-rollups also batch and process transactions off-chain but they use ZK to produce the so-called validity proofs of those transactions, which are then verified by L1. It means that we (almost) don’t spend L1’s computational resources on transaction validation while ensuring they are backed by L1’s security.
Sounds as crazy as if someone would have come up with a political structure that is as qualitative in decision-making as democracy and as fast as totalitarianism. Insane!
Example to understand ZKps for scalability
Thanks to numerous discussions I had with my engineer and cryptographer colleagues, we’ve figured out an example that I use in my mind as a construction to perceive all ZK-for-scalability use cases.
Imagine a method the goal of which is to calculate the average number among the set of numbers (see figure below).
Now, this may sound non-sense for now but only for the sake of example, imagine every time you use the method (i.e., provide some input and expect an appropriate output), you want to verify it calculates the average number correctly while you not having to:
-
review the code of the method each time you call it;
-
spend your own brain (or external calculator) “resources” to double-check that the calculation is indeed correct.
Imagine now that the method has done its work. It took 2, 1, 3 as an input and provided output 2. What ZKP does is that it allows anyone to ensure that:
- The output (2) has indeed been generated using the method (getAverage) and not any other one;
- The output (2) has indeed been generated based on input (2, 1, 3) and not any other one.
This means that if you audit the method just once before using it, you will be able to afterward call it and be totally sure that you keep using the same code (i.e., it has not been tampered with, it is authentic).
Now think for a second what it means. You ensure authenticity of logic but not with smart contracts, outside of any blockchain, outside of consensus. The code is initialized somewhere else, but you will still know that one (input) was definitely processed by the other (method) and the third (output) was formed as a result.
Noteworthy, you won’t even see the input, the output, and the method. They will all be hashed (see figure below).
Of course in our example not revealing the input, output and method doesn’t make sense as we are the ones who provided the input and received an output (just like it doesn’t matter to consciously hide transaction details from L1).
So it’s not really about “zero knowledge” (i.e., not revealing the statement). It’s about, if I may, “zero-resources” (i.e., not spending resources).
Just like in this example, we don’t want to spend our brain capacity to doublecheck the method, L1 does not need to spend its computational power to verify off-chain transactions.
Just like we don’t want to audit the code every time we call the method, L1 does not need to initialize the smart contracts on itself.
The problem that’s solved here for both L1 and us is not about privacy. It’s totally about scalability (not spending valuable resources) while maintaining the integrity and authenticity of data.
What does this really mean?
Coming back from where we started, I can imagine a future, where writing code that’s not compatible with ZKs will be poor tone just like building websites that still use HTTP instead of HTTPS.
Why? Because it would mean that for clients of your code (aka service, method, API, etc.), there will be no way to ensure with 100% that they actually consume what you tell them they do.
So I believe ZK-EVM is just the very first step, and we will keep seeing new technology frameworks that make other VMs compatible with ZKps (see figure below).
Important to note. Obviously, ZKps are not a panacea for achieving total data provenance just like blockchain isn’t. In both cases whatever you ensure provenance about has to be trusted/checked initially. In the case of ZKps, it’s an initial audit of the code that’s later checked via validity proofs. In the case of blockchain, it’s oracles (which you presumably trust) that input data from the real world into the blockchain.
There is just one main question for which I still haven’t found an answer (if you know and made it up until the end of this article, please DM me or comment) — is there certain complexity of code the validity of which ZKps wouldn’t ever be able to verify (is there are red line we cannot cross)? Obviously, it’s an early technology and a lot has to be invested into R&D (I get it), but is it right to assume that potentially there is no limit to the logic complexity that the technology can validity-prove?
If the last assumption is true, then I can imagine a future, where EVERY decent app is:
- ZKp-compatible
- Hence integrated with L1
- Hence will have validity proof checkmarks for their users
Hence we have a situation, where regular users benefit from blockchain
but it’s deeply under the hood. For the user, everything will work exactly like it does in web2 but with a validity proof checkmark in their UI (which gives additional guarantees of authenticity). Maybe this is where enterprises finally really meet blockchain.
What do you think?
By:Bogdan Grehovodov Link:https://medium.com/@grehovodovbo/guide-to-understanding-guides-on-zero-knowledge-proofs-9ec4e8c4dff2
-
@ 4d444439:7ed2458b
2023-07-20 06:31:39Can Norway’s Engineering Talent be Redirected toward Space Exploration?
Norway, known for its rich offshore oil industry and engineering prowess, has a unique opportunity to redirect its expertise toward the emerging field of space exploration technology. As the global demand for renewable energy sources rises and the world shifts towards sustainable practices, it becomes imperative for Norway to diversify its engineering talent and explore new frontiers. In this post, I will delve into how the Norwegian offshore oil industry can effectively channel its skills and knowledge toward the fascinating realm of space exploration.
1. Transferring Technical Expertise
The Norwegian offshore oil industry has fostered a highly skilled workforce with a deep understanding of complex engineering challenges. This expertise can seamlessly translate into the realm of space exploration, which requires similar skill sets such as mechanical engineering, fluid dynamics, and material sciences. Engineers experienced in designing and maintaining offshore oil platforms possess valuable knowledge in areas such as structural integrity, remote sensing, and environmental sustainability. By capitalizing on this expertise, Norway can actively contribute to space exploration endeavors.
2. Deepening Collaboration
Norway is renowned for its collaborative approach to innovation. Leveraging this collaborative spirit, the Norwegian offshore oil industry can establish partnerships with space agencies, aerospace companies, and research institutions to foster knowledge exchange and joint projects. Engaging in collaborative efforts will enable the sharing of best practices, technological advancements, and the transfer of engineering talent between industries. This cross-pollination of ideas will prove invaluable in propelling space exploration technology forward.
3. Adapting Technologies
Many technologies used in the Norwegian offshore oil industry have direct applications in space exploration. For instance, the sophisticated remote monitoring systems utilized in offshore oil platforms can be adapted to monitor and control space missions remotely. Furthermore, the knowledge gained from developing offshore platforms in harsh environments can inform the design of habitats and infrastructure required for long-duration space missions. By adapting existing technologies and methodologies, Norway can significantly contribute to the advancement of space exploration technology.
4. Sustainable Solutions
Norway has long been at the forefront of sustainable practices, and this commitment can extend to space exploration. By leveraging its experience in offshore renewable energy projects, such as wind farms and hydroelectric power, Norway can contribute to the development of sustainable solutions for space missions. This includes advancements in energy-efficient propulsion systems, harnessing solar power in space, and creating closed-loop life support systems. Integrating sustainable practices into space exploration technology will not only benefit future missions but also contribute to a greener and more sustainable space industry.
5. Fostering Education and Research
To ensure a sustainable transition from the offshore oil industry to space exploration technology, Norway must prioritize education and research in relevant fields. This can be achieved by establishing dedicated programs, scholarships, and research grants that specifically encourage engineers and scientists to pursue space-related studies. Collaborative research projects between universities, research institutions, and industry stakeholders can also drive innovation and facilitate knowledge transfer.
The Norwegian offshore oil industry possesses a wealth of engineering talent that can be channeled toward space exploration technology. By leveraging their technical expertise, fostering collaboration, adapting existing technologies, promoting sustainability, and investing in education and research, Norway can play a significant role in shaping the future of space exploration. Embracing this transition not only expands Norway’s industrial capabilities but also positions the country as a global leader in both sustainable energy and cutting-edge space technology. The possibilities are endless, and with the right initiatives and investments, Norway can embark on a new chapter of engineering excellence in the pursuit of exploring the vastness of space.
By:Christian Bjelland Link:https://medium.com/@christianbjelland/from-offshore-to-offworld-1c0d58b3f6af
-
@ 4d444439:7ed2458b
2023-07-20 06:29:33Photo by Graham Holtshausen on Unsplash
This article is written with the intent of promviding ‘points to ponder,’ such as hypothetical ‘What if’ situations.
What happens when you apply a sudden brake while driving
While riding as a passenger inside a car speeding at 40 miles per hour, we can comfortably sip coffee, talk on the phone, talk to others, listen to music, and engage in other activities.
But all of a sudden, if you hit the brakes while driving at 10, 15, 30, or even 40 miles an hour, one can imagine how forcefully the passengers lunge forward, making everyone uncomfortable.
No one wants to be the passenger in those situations, right?
Now imagine this ….
How fast do you think we are traveling while residing on Earth?
Photo by NASA on Unsplash
Let us explore.
We know that our planet Earth takes 24 hours to make one full rotation around its axis. At the same, the Earth takes 365 days to revolve around the Sun.
That means, all of the living beings, humans included, residing on this beautiful planet, are also rotating and revolving at the same time. We are like the passengers riding on Earth, while it is rotating around its axis.
Photo by ActionVance on Unsplash
Let us compute how fast we are traveling in space:
The total distance around the surface of the Earth at the equator, or the circumference of the Earth, is 24,901 miles (40,075 kilometers).
Earth completes one full rotation around its axis every 24 hours.
If we divide the distance by 24 hours, we get approximately 1037 miles per hour.
Therefore, Earth is rotating at about 1037 miles per hour.
That means humans and all living beings standing on this planet are also rotating at approximately 1037 miles per hour.
Photo by NASA on Unsplash
Next, as we all know, Earth revolves around the sun every 365 days a year. Earth travels 584 million miles, or 940 million km in 365 days.
Simple speed calculation
If we divide the distance of 584 million miles by 365 days, we get 1.6 million miles per day in one day. That means Earth travels, 1.6 million miles in space in one day.
If we divide 1.6 million miles per day by 24 hours, we get 66,666 miles per hour.
When Earth is revolving around the Sun, it is hurtling through space at 67,000 mph.
Effectively, we humans and all other living beings are rotating at 1037 miles per hour, and the same traveling through space at 67,000 miles per hour.
Photo by NASA on Unsplash
If that is not enough, our planetary system, which includes the Earth and Sun, belongs to the Milky Way galaxy.
The Milky Way galaxy is traveling at 1.3 million miles per hour.
Now, imagine this:
What would happen if the Earth suddenly stops rotating?
This is equivalent to applying sudden brakes while traveling at 1,000 miles per hour.
What would happen if the Earth stops revolving?
This is equivalent to applying brakes while traveling at 67,000 miles per hour.
Finally,
What would happen if the Milky Way galaxy suddenly stops?
Can we even imagine applying sudden brakes while traveling at 1.3 million miles per hour?
I understand these will never come to pass in our lifetime. But based on these interesting facts, we can imagine “what if” scenarios.
As we say, this will never happen, but these are some of the points to ponder.
If you find this interesting, please leave a comment. Thanks.
By:Raghavendra S Rao Link:https://medium.com/illumination/how-fast-are-we-traveling-in-space-7ef8366e9827
-
@ 4d444439:7ed2458b
2023-07-20 06:25:52Photo by SpaceX on Unsplash
How will space industries evolve by 2050? I hired artificial intelligence (GPT4) to make predictions about the future of space, space travel, and space industries.
Step into the future as we unveil the mind-blowing space trends that will reshape the way we explore and utilize the cosmos in 2050.
Brace yourself for an adventure that will leave you in awe, as we investigate the cutting-edge technologies, astonishing discoveries, and extraordinary space adventures awaiting us just beyond the horizon.
Hold on tight as we soar through the atmosphere, defying gravity and igniting your imagination with ideas that will spark conversations around the globe.
From mind-boggling propulsion systems to extra-terrestrial life, space tourism revolutions to asteroid mining bonanzas, get ready to witness a universe of possibilities that will captivate your senses.
Together, we will uncover the thrilling trends that push the very limits of our understanding, inspiring and engaging humanity to embrace the boundless opportunities that lie among the stars.
Get ready to witness the future that will have the world buzzing.
You will see my prompts, and the responses below.
Prompt 1:
Space trends in 2050. Mind-blowing listicle.
Response 1: Space in 2050
Photo by NASA on Unsplash
10 Mind-Blowing Space Trends in 2050 The year 2050 is anticipated to be a significant turning point for space exploration and technology. With remarkable advancements being made in various fields, our understanding and utilization of space are expected to reach unprecedented heights. In this listicle, we will explore ten mind-blowing space trends that could shape the future of human space exploration, colonization, and scientific discoveries.
1. Mars Colonization:
By 2050, humanity may have achieved the significant milestone of establishing permanent human settlements on Mars. Technological progress in areas such as transportation, life support systems, and infrastructure development will enable us to conquer the Red Planet.
2. Lunar Mining:
The moon will play a crucial role in resource extraction. Lunar mining operations will be established, exploiting valuable elements including Helium-3 for fusion energy, rare minerals, and water ice that could aid in sustainability efforts and fuel deep space missions.
3. Interplanetary Travel:
As technologies advance, manned missions will explore outer planets and their moons, such as Europa (Jupiter’s moon) and Titan (Saturn’s moon). These missions will inspire awe as we discover potential signs of life or unlock secrets hidden beneath their icy surfaces.
4. Asteroid Mining:
Industrial mining operations, propelled by resource scarcity on Earth, will intensify. Asteroids are rich in precious metals, rare minerals, and water, making them essential for future space endeavors, including colonization efforts and deep space exploration.
5. Space Tourism:
With decreasing costs and improved technologies, space tourism will enter a new era. Wealthy individuals will have the opportunity to experience orbital hotels, Lunar and Martian resorts, and even journeys to exotic locations within our solar system, like the rings of Saturn.
6. Space-based Energy:
In 2050, the concept of space-based solar power could become a reality. Vast solar arrays in Earth’s orbit would capture the sun’s energy, which could be transmitted back to Earth via microwaves or lasers, providing a clean and nearly limitless energy source.
7. Quantum Communication:
Slowly surpassing traditional radio communication, quantum communication using entangled particles will allow near-instantaneous and secure data transfer over interplanetary distances. This breakthrough will revolutionize deep space exploration and facilitate communication between far-flung colonies.
8. Robotics and Artificial Intelligence:
Sophisticated autonomous robots, equipped with advanced AI systems, will fulfill a wide range of roles in space. They will assist astronauts in tasks, construct and maintain infrastructures on other celestial bodies, and venture into dangerous environments, aiding scientific exploration and colonization efforts.
9. Planetary Geo-engineering:
With the increase in space colonization, scientists will develop techniques to terraform celestial bodies, modifying atmospheres and environments to support Earth-like conditions. This pioneering venture may make Mars or other distant worlds habitable for humans.
10. Space Debris Management:
As space activities intensify, managing space debris will be paramount. Innovative cleanup technologies and regulations will aim to prevent collisions, ensuring the sustainability of space exploration and maintaining the orbital health of Earth and other celestial bodies.
Conclusion:
The year 2050 holds immense potential for extraordinary advancements in space exploration and technology. Exciting innovations, such as Mars colonization, interplanetary travel, and space tourism, will redefine our relationship with the cosmos. Moreover, developments in fields like robotic assistance, quantum communication, and space-based energy will propel our understanding of the universe to new heights. As we move forward, it is crucial to prioritize sustainability and responsible exploration to ensure a bright future for humanity beyond our home planet.
Prompt 2:
Space travel and exploration trends of 2050. Mind-blowing listicle. 2000 words.
Response 2: Space Travel and Exploration Trends in 2050
Photo by NASA on Unsplash
10 Mind-Blowing Space Travel and Exploration Trends of 2050 The year 2050 promises to be an exciting time for space travel and exploration, with ground-breaking technologies and ambitious missions set to redefine our understanding of the universe. In this mind-blowing listicle, we will explore ten trends that will shape space travel and exploration in 2050, from advanced propulsion systems to extraterrestrial colonization.
1. Hypersonic Spaceplanes:
Imagine boarding a passenger spaceplane that can reach speeds of Mach 20, enabling passengers to travel from Earth to the International Space Station (ISS) in a fraction of the time it currently takes. By 2050, hypersonic spaceplanes utilizing innovative propulsion systems, such as scramjets and combined-cycle engines, are expected to revolutionize space travel.
2. Space Elevators:
The concept of a space elevator, once considered science fiction, could become a reality in 2050. Essentially a cable stretching from the Earth’s surface well into space, a space elevator would provide a cost-effective and energy-efficient means of transporting goods, equipment, and even humans into Earth orbit.
3. Interstellar Missions:
By 2050, humanity may be on the cusp of launching unmanned interstellar missions, seeking to explore neighboring star systems. Groundbreaking advancements in propulsion technology, such as fusion or antimatter propulsion systems, could enable us to send spacecraft on journeys that surpass our solar system’s boundaries.
4. Exoplanet Exploration:
With increasingly powerful space telescopes, by 2050, we will have a deeper understanding of distant exoplanets. Telescope arrays, like the James Webb Space Telescope, will not only help detect potentially habitable exoplanets but also analyze their atmospheres for signs of life, bringing us closer to answering the age-old question: “Are we alone in the universe?”
5. Artificial Intelligence (AI) and Robotics:
Advancements in AI and robotics will play a crucial role in space exploration. By 2050, sophisticated AI systems will accompany astronauts on missions, allowing for autonomous decision-making and assisting with complex tasks. Robots will be capable of conducting experiments, repairs, and exploratory missions in harsh and remote environments.
6. Quantum Computing for Deep Space Navigation:
Quantum computing’s immense processing power will enable highly accurate and real-time navigation during deep space missions. In 2050, quantum computers onboard spacecraft will help calculate complex trajectories, ensuring precise and efficient journeys across vast interplanetary distances.
7. Lunar and Martian Bases:
By 2050, it is highly likely that humanity will have established permanent bases on the Moon and Mars. Lunar and Martian colonies will serve as stepping-stones for further exploration, enabling astronauts to conduct research, utilize local resources, and learn to adapt to the challenges of living in harsh extraterrestrial environments.
8. Space Mining:
As we venture further into space, asteroid mining will become a vital industry. By 2050, mining operations on asteroids could supply us with valuable resources, including rare earth elements, precious metals, and water. These resources will fuel further space exploration, construction, and facilitate sustainable long-duration missions away from Earth.
9. Bioengineering for Extended Space Travel:
In order to explore more distant destinations, like Mars and beyond, bioengineering techniques will be employed to develop innovative solutions for extended human space travel. By 2050, advancements in genetic engineering, cellular reprogramming, and biotechnology will enhance human resilience, immunity, and adaptability to prolonged space missions.
10. Extraterrestrial Life Discovery:
One of the most mind-blowing possibilities of space exploration in 2050 is the discovery of extraterrestrial life. Whether it be microbial life on Mars, subsurface ocean worlds like Europa or Enceladus, or the detection of complex organic molecules in distant planetary systems, this breakthrough would revolutionize our understanding of life’s ubiquity in the universe.
Conclusion:
The year 2050 holds immense potential for awe-inspiring advancements in space travel and exploration. From hypersonic spaceplanes to interstellar missions and the possibility of discovering extraterrestrial life, our understanding of the universe will expand beyond imagination. As we push the boundaries of exploration, it is crucial to prioritize responsible mission planning, sustainability, and international cooperation to ensure a prosperous and enlightened future for humanity in the vast cosmos.
Prompt 3:
Space industry trends of 2050. Include all space related industries. Mind-blowing listicle. 2000 words.
Response 3: Space Industry Trends of 2050
Photo by SpaceX on Unsplash
10 Mind-Blowing Space Industry Trends of 2050 The space industry is poised for astounding growth and innovation in the coming decades. By 2050, space-related industries will not only encompass space exploration and satellite technology but also a wide range of sectors that rely on space-based data and resources. In this mind-blowing listicle, we will explore ten trends that will define the space industry in 2050, from commercial space travel to space agriculture.
1. Commercial Space Travel:
By 2050, commercial space travel will have become a thriving industry, offering ordinary citizens the opportunity to venture beyond Earth’s atmosphere. Spaceships will become more affordable, and companies like SpaceX and Virgin Galactic will conduct regular suborbital and orbital flights, allowing individuals to experience the awe-inspiring wonder of space firsthand.
2. Satellite Mega-constellations:
Mega-constellations of small satellites will revolutionize Earth’s connectivity. By 2050, companies like SpaceX’s Starlink, OneWeb, and Amazon’s Project Kuiper will deploy thousands of low Earth orbit satellites, providing global broadband internet coverage, enabling remote areas to access high-speed internet and advancing fields like telemedicine, education, and agriculture.
3. Space-Based Energy Harvesting:
To meet the growing energy needs of Earth, space-based energy harvesting could become a prominent industry by 2050. Enormous solar arrays in Earth’s orbit, absorbing the sun’s energy, will transmit it back to our planet in the form of microwaves or lasers, providing a clean and virtually unlimited source of power.
4. Asteroid Mining:
The abundance of valuable resources on asteroids will drive the development of asteroid mining operations in 2050. Precious metals, rare elements, and water found on asteroids will be harvested to meet demand on Earth and sustain space exploration efforts, including the construction of habitats, further missions, and fuel for spaceships.
5. Space Tourism:
As commercial space travel takes off, space tourism will flourish, offering unforgettable experiences to adventure-seeking travelers. By 2050, space hotels, lunar resorts, and even trips to previously unexplored locations within our solar system, such as Saturn’s rings, could be within the realm of possibility for affluent individuals.
6. Space-based Manufacturing:
The unique environment of space provides an ideal setting for manufacturing high-value goods. By 2050, we will witness the emergence of space-based manufacturing facilities, producing advanced materials, pharmaceuticals, and microgravity-dependent products that cannot be made efficiently or effectively on Earth.
7. Space Agriculture:
As we strive for self-sufficiency in space colonies and for sustainable agriculture on Earth, space-based agriculture will become a significant industry. By 2050, advancements in vertical farming, hydroponics, and the utilization of artificial intelligence will enable the cultivation of crops in space habitats, contributing to food security efforts both on and off the planet.
8. Lunar and Martian Infrastructure Development:
In 2050, human settlements on the Moon and Mars will create a thriving industry focused on infrastructure development. Companies specializing in 3D printing, construction, and habitat design will lead the way, developing state-of-the-art structures, transportation systems, and technologies to support the colonization and sustainable habitation of these extraterrestrial environments.
9. Space Debris Management:
As space activities intensify, the issue of space debris will require innovative solutions. By 2050, companies specializing in space debris removal, such as Astroscale and ClearSpace, will play a vital role in maintaining the orbital cleanliness of Earth and safeguarding space infrastructure from the risks posed by space debris.
10. Space Science and Research:
In 2050, space science and research will remain at the forefront of the space industry. Cutting-edge technologies and advancements in fields like astrophysics, exoplanet research, astrobiology, and gravitational wave detection will expand our understanding of the cosmos and potentially bring us closer to solving some of the universe’s greatest mysteries.
Conclusion:
The space industry of 2050 holds immense potential for awe-inspiring innovation across various sectors. From commercial space travel and satellite mega-constellations to asteroid mining and space-based agriculture, the utilization of space resources and technologies will transform numerous industries on Earth and beyond. As we navigate this extraordinary future, it is crucial to prioritize sustainability, responsible exploration, and international cooperation to ensure that humanity’s ventures into space benefit us all and lead to a prosperous and enlightened future.
Prompt 4:
How do people interact with space in 2050? How do they travel to space? How do they explore space? Write an ethnographic account of how people interact with space, explore space, or have space in their lives in 2050. Feel free to use storytelling and creative writing. 2000 words.
Response 4: Space in Everyday Life in 2050
Photo by NASA on Unsplash
A Journey Through the Stars: Interacting with Space in 2050 Step into the year 2050, where humanity’s fascination with space has evolved into an integral part of our daily lives. In this ethnographic account, we embark on a journey to explore how people interact with space, travel to the stars, and immerse themselves in the wonders of the cosmos.
Part I: Everyday Space
A gentle hum fills the air as I enter the bustling streets of a city adorned with sleek, modern architecture. Everywhere I turn, I see holographic displays showcasing real-time space observations, allowing people to stargaze while walking through the urban landscape. It’s apparent that space has become an inseparable part of our culture.
In the Orbiter Lounge, a popular gathering spot, people sip cosmic-themed cocktails and engage in animated discussions about the latest discoveries. Virtual reality headsets transport them to the surface of Mars or the depths of a distant galaxy, bringing the wonders of the universe to life with stunning detail.
Part II: Personal Space Travel
As the sun sets, I make my way to the Spaceport, where travelers prepare for their personal space journeys. The spaceport teems with an air of excitement and anticipation. The days of long and arduous pre-flight preparations are a thing of the past; in 2050, space travel has become a routine affair.
My attention is drawn to a family boarding a sleek, luxurious spacecraft. They are embarking on a week-long vacation to a private space habitat orbiting Earth. Elite travel companies now offer a range of celestial adventures, from weekend getaways to lunar resorts, to longer excursions to space hotels near Mars.
Inside the spacecraft, I find myself in awe of the panoramic windows, revealing Earth’s curvature and the mesmerizing tapestry of stars beyond. People lounge in zero-gravity areas, savoring the freedom of floating in a weightless environment. New propulsion technologies, such as advanced ion drives and antimatter engines, ensure a smooth and efficient journey through the cosmos.
Part III: Exploring the Frontier
As our spacecraft docks at a space habitat orbiting Mars, I witness the pioneering spirit that drives humanity’s hunger for exploration. Teams of scientists explore the red planet’s surface, seeking signs of past or present life. Advanced rovers autonomously traverse rugged terrains, collecting samples and transmitting data back to eager researchers on Earth.
I find myself amidst a group of astronauts prepping for a daring mission. They are embarking on a year-long journey to Europa, Jupiter’s moon, to explore its subsurface oceans. The excitement is palpable as they suit up in sleek, next-generation spacesuits engineered for maximum mobility and protection.
Once on Europa, they deploy autonomous underwater drones to delve into the icy depths, searching for signs of alien life. The information they gather contributes to our ever-growing understanding of the universe and fuels the dreams of future generations.
Conclusion: Eternally Bound with Space
As my journey concludes, I reflect upon the profound impact space has on humanity in 2050. Far from being an abstract and distant concept, space has intimately woven into our lives. It engages our senses, inspires our imaginations, and drives us forward in our quest for knowledge and exploration.
In this future world, space is not just a scientific frontier, but a playground for adventurers, a landscape for artists, and a canvas for dreamers. As we forge ahead, it is a reminder that, no matter how far we venture, we are forever bound to the stars, forever entwined with the vastness of space.
Prompt 5:
What are the most surprising space trends in 2050? Write an investigative and journalistic account of these trends. Include all space related trends. 2000 words.
Response 5: Surprising Space Trends of 2050
Photo by Aldebaran S on Unsplash
Unveiling the Surprising Space Trends of 2050: An Investigative Account Welcome to an immersive journey into the world of space exploration and technology, delving into the most surprising trends that emerged in 2050. In this investigative journalistic account, we will uncover the groundbreaking advancements and unexpected developments that have reshaped humanity’s relationship with space.
Part I: Interstellar Propulsion Breakthrough
In 2050, scientists and engineers made a significant leap forward in interstellar propulsion. With the unveiling of the Quantum Entanglement Drive (QED), a revolutionary technology that utilizes the mind-boggling phenomenon of quantum entanglement, interstellar travel became a plausible reality. The QED allows ships to instantaneously transport themselves across vast distances, surpassing the limitations of traditional propulsion systems and opening up a new era of exploration and colonization.
Part II: Extraterrestrial Life Confirmation
The search for extraterrestrial life took a decisive turn in 2050. After years of speculation and tantalizing hints, scientists confirmed the existence of microbial life on Mars. Groundbreaking experiments conducted by rovers and sample return missions unveiled the presence of ancient microorganisms hidden beneath the planet’s surface. This discovery ignited a renewed enthusiasm for future Mars missions and sparked debates on the implications of finding even more complex forms of life in our celestial neighborhood.
Part III: Lunar Tourism Revolution
The lunar landscape became an unexpected playground for tourism in 2050. The advent of advanced lunar transportation systems, made possible by electromagnetic launch systems, reduced the cost and complexity of reaching the Moon. This accessibility opened doors for lunar tourism, with thousands of adventurous travelers venturing to the Earth’s natural satellite. Lunar resorts provided breathtaking views, lunar golf courses, and even lunar zip lines, creating an industry that no one could have predicted just a few decades earlier.
Part IV: AI Inhabited Space Stations
The year 2050 witnessed a significant shift in space station operations as artificial intelligence (AI) became the primary occupants on many stations. Advanced AI systems were designed to not only carry out routine tasks but also engage in complex decision-making processes. These AI-run space stations enabled efficient resource management, autonomous scientific research, and even sophisticated extravehicular activities. As AI continued to evolve, the ethical implications of highly intelligent and autonomous AI existence in space became a topic of intense debate.
Part V: Space Agriculture Revolution
In an effort to achieve self-sustainability and overcome resource limitations, space agriculture experienced a remarkable revolution in 2050. Scientists and engineers developed advanced techniques for cultivating food within the confines of space habitats and on distant worlds. Genetic modifications allowed plants to thrive under unique extraterrestrial conditions while multilayered hydroponic systems maximized crop yields. This breakthrough in space agriculture not only provided sustenance for space explorers but also contributed to efforts addressing food security challenges on Earth.
Part VI: Space Art and Creativity
The year 2050 witnessed an extraordinary fusion of the arts and space exploration. Space captured the imagination of artists, poets, and musicians, leading to a renaissance of space-themed artworks that blurred the boundaries between science and aesthetics. Innovations, such as zero-gravity painting techniques, holographic musical performances, and immersive virtual reality exhibitions, allowed people on Earth to experience the wonder of space in entirely new ways. This artistic movement united humanity through a shared sense of awe and encouraged a deeper appreciation for the cosmos.
The Unforeseen Expansions of the Space Frontier
The surprises that unfolded in the space industry during 2050 exceeded even the wildest imaginations. From astonishing propulsion breakthroughs to confirmation of extraterrestrial life and the revolution of lunar tourism, humanity stepped into uncharted territories with audacity and courage. As AI became companions in space and space agriculture conquered the challenges of sustenance, our understanding of what is possible expanded beyond the limits of our former selves. The fusion of art and space ignited a creative revolution, imprinting the essence of human expression onto the celestial canvas.
The trends of 2050 revealed the transformative power of space exploration, not only in pushing the boundaries of science and technology but also in capturing our collective human spirit. As we look to the future, the lessons learned from these surprising developments will serve as inspiration for further innovations, driving us towards a more connected, enlightened, and awe-inspiring universe.
Prompt 6:
What are the space travel, space exploration, and space tourism trends in 2050? Write an investigative and journalistic account of these trends. 2000 words.
Response 6: Space Exploration Trends of 2050
Photo by Greg Rakozy on Unsplash
Unleashing the Future: Investigating Space Travel, Exploration, and Tourism Trends in 2050
In this investigative journalistic account, we delve into the extraordinary world of space travel, exploration, and tourism in the year 2050, unraveling the trends that have revolutionized our understanding of the cosmos. From ground-breaking propulsion technologies to awe-inspiring exploratory missions and thrilling space tourism destinations, humanity finds itself at the edge of a new frontier.
Part I: Interstellar Voyages — The Quantum Leap
In 2050, a remarkable breakthrough in interstellar propulsion technology took the world by storm. Scientists unveiled the Quantum Warp Drive (QWD), an invention that harnessed the principles of quantum mechanics to traverse vast cosmic distances in a fraction of the time. Utilizing a hybrid fusion-antimatter propulsion system and manipulating subatomic particles through quantum entanglement, the QWD rendered interstellar travel a reality. Humanity unleashed its imagination, setting forth on unprecedented voyages to neighboring star systems and opening up the potential for extraterrestrial exploration and colonization.
Part II: Boundary-Pushing Exploratory Missions
2050 marked the zenith of exploratory missions, as humanity ventured further into the cosmic expanse. A consortium of international space agencies united to establish the Interstellar Exploration Initiative (IEI), an ambitious program aimed at opening new frontiers and unraveling the mysteries of the universe.
One of their highlights was the Europa Maelstrom Mission, a joint endeavor by NASA, ESA, and Roscosmos. A crewed mission was launched to investigate Jupiter’s icy moon, Europa, renowned for its potential subsurface oceans harboring signs of extra-terrestrial life. The mission deployed a state-of-the-art submersible capable of navigating its treacherous underwater terrain, unveiling a wealth of information about the moon’s potentially habitable environments.
Part III: Unveiling the Secrets of Exoplanets
By 2050, the hunt for exoplanets had transcended expectations: scientists unraveled mysteries within tantalizingly habitable zones. The Giant Magellan Telescope, boasting unmatched resolution, revealed a treasure trove of planets with conditions amenable to life. A landmark discovery was Gliese 581g, an exoplanet orbiting a red dwarf star, enticing scientists with the possibility of a habitable world beyond our solar system.
NASA’s projected flagship mission, the Starfinder Telescope, was unveiled in 2050, promising to revolutionize the search for exoplanetary life. Armed with sophisticated instruments capable of capturing biosignatures, it would enable us to detect signs of life, including the presence of oxygen and methane in distant atmospheres, bringing us one step closer to answering the tantalizing question, “Are we alone in the universe?”
Part IV: The Revolution of Space Tourism
Space tourism experienced an unparalleled boom in 2050, captivating thrill-seekers and adventurous individuals yearning for the ultimate escape. One of the most coveted destinations was the Lunar Sky Plaza, a commercial spaceport established on the Moon’s surface. From launching pads nestled amidst lunar landscapes, tourists journeyed to orbital luxury hotels, evoking unparalleled views of Earth and the cosmos.
Richard Branson’s Virgin Galactic gained momentum in 2050 with the launch of the Venus Escapade, a 14-day journey to the fiery planet. Participants experienced breathtaking flybys, offering glimpses into Venus’s turbulent atmosphere and unveiling a previously unexplored frontier of the solar system.
Part V: Sustainable Space Travel Initiatives
In 2050, societal concerns over environmental sustainability infiltrated the realm of space travel. The industry was transformed by newly developed propulsion systems focused on efficiency and reduced carbon emissions. Solar and ion propulsion technologies became widely adopted, prioritizing clean energy and sustainable practices in space travel.
Part VI: Collaborative Space Missions
The spirit of collaboration prevailed in 2050 as nations united in pioneering joint missions. The International Lunar Outpost, executed through a multinational partnership, combined technologies and knowledge to establish a sustainable lunar base. This collaborative effort not only fostered scientific progress but also enhanced diplomacy, promoting unity and peaceful cooperation amidst humanity’s greatest endeavors.
Conclusion: The Dawn of a New Age
The trends observed in space travel, exploration, and tourism in 2050 set the stage for an era of unparalleled discovery and human achievement. From the Quantum Warp Drive opening interstellar pathways to the Europa Maelstrom Mission unveiling the enigmatic secrets of Jupiter’s moon, humanity continues to push the boundaries of exploration.
The flourishing space tourism industry empowered individuals to embark on awe-inspiring journeys, igniting the sparks of imagination and passion for the cosmos. Collaborative missions fostered unity among nations, creating a synergy that propelled humanity toward a future where the boundaries of the imaginable continue to expand.
In the dawn of this new age, humanity’s persistent pursuit of knowledge, overarching our differences, showcases our capacity for wonder, collaboration, and the indomitable spirit that propels us forward. The trends of 2050 reaffirm our shared destiny as cosmic citizens, forever bound by our desire to explore, understand, and reach for the stars.
Prompt 7:
What are the asteroid mining and space mining trends in 2050? Write an investigative and journalistic account of these trends. Give numbers, estimates and predictions. 2000 words.
Response 7: Space Mining Trends of 2050
Photo by Bryan Goff on Unsplash
Unveiling the Expanding Cosmos: Investigating Asteroid and Space Mining Trends in 2050
In this investigative journalistic account, we delve into the thrilling world of asteroid and space mining, exploring the trends and predictions that have reshaped the industry in 2050. From unlocking the wealth of resources hidden within celestial bodies to revolutionizing space exploration and fueling the future of humanity, these trends offer a glimpse into the exciting potential of mining beyond Earth.
Part I: The Rise of Asteroid Mining
2050 marked a significant turning point in the field of asteroid mining, as advancements in technology and growing resource scarcity on Earth spurred exponential growth in this groundbreaking industry.
1. Growing Interest and Investments:
As the demand for rare minerals and resources surged, a multitude of companies focused on asteroid mining emerged, attracting billions of dollars in investments. Prominent players such as Planetary Resources and Deep Space Industries, along with newly-formed asteroid mining consortiums, set ambitious targets to tap into the vast potential of space mining.
2. Geological Surveys and Mapping:
Sophisticated probes and satellites were deployed to conduct extensive geological surveys of asteroids. These missions allowed scientists and engineers to identify key targets rich in valuable resources, such as platinum group metals, rare earth elements, and water ice.
3. Mining Operations Commence:
By 2050, the first mining operations had commenced on select asteroids. Automated and remotely operated mining spacecraft were deployed equipped with state-of-the-art mining equipment and machinery, capable of extracting and processing resources within low-gravity and vacuum environments.
Part II: Resource Extraction and Utilization
In 2050, asteroid and space mining activities extended beyond resource extraction alone. Companies and research institutions pioneered innovative techniques for resource utilization, opening new avenues for space exploration and colonization.
1. In-Situ Resource Utilization (ISRU):
Mining operations established the foundations for infrastructure development in space. Water extracted from asteroids was utilized for life support systems, propellant production, and fueling spacecraft within the Earth-Moon vicinity or beyond, reducing reliance on costly resupply missions from Earth.
2. Construction Materials and Manufacturing:
Mining asteroids offered a bounty of construction materials. Lunar and Martian bases, as well as extraterrestrial habitats, were constructed using asteroid-based materials, reducing costs and ensuring long-term sustainability. Advanced manufacturing techniques, such as 3D printing, facilitated the construction of intricate structures, including spacecraft components and habitats, directly utilizing asteroid-mined metals and composite materials.
3. Energy and Power Generation:
Asteroids proved instrumental in providing the necessary resources for energy generation in space. Utilizing precious metals and rare-earth elements mined from asteroids, companies pioneered the development of advanced solar panels, nuclear reactors, or even fusion-based power plants. These advancements enabled self-sufficient power generation in space, supporting long-duration missions and space habitats.
Part III: Impacts on Earth’s Economy and Resource Scarcity
The impacts of asteroid and space mining greatly influenced Earth’s economy and resource availability in 2050.
1. Economic Opportunities:
Asteroid mining created a burgeoning industry, presenting substantial economic opportunities for companies, governments, and entrepreneurs. Estimates suggested that by 2050, the value of mined resources from asteroids surpassed several trillion dollars. Profits were reinvested into further space exploration, infrastructure development, and technological advancements.
2. Resource Scarcity Mitigation:
The extraction of rare minerals and precious resources from asteroids played a vital role in mitigating resource scarcity challenges on Earth. The increased availability of platinum group metals, critical minerals, or rare earth elements helped fuel various industries, including electronics, renewable energy, and advanced manufacturing. Moreover, the abundance of water ice was harnessed for agriculture, life support systems, and crucially, the production of rocket propellant.
3. Environmental Considerations and Regulations:
With the boom in asteroid mining, concerns emerged regarding environmental impacts and responsible resource extraction. Governments, international organizations, and mining companies worked together to implement strict regulations to ensure sustainable practices in resource extraction and minimize potential risks to celestial bodies and future space missions.
Conclusion: Pioneering the Extraterrestrial Frontier
The trends observed in asteroid and space mining in 2050 unveiled a new era of economic opportunities, scientific advancements, and futuristic potential. The mining of resources within asteroids delivered valuable materials to fuel space exploration, colonization efforts, and industries on Earth. As we moved closer to unlocking the vast potential of celestial bodies, cautionary steps were taken to implement sustainable practices and ethical considerations.
The rise of asteroid mining transformed humanity’s relationship with the cosmos, signaling a future where space resources became critical for sustaining our civilization and fueling the advancements necessary for our continued exploration of the universe. As we venture forward, the lessons learned from the trends of 2050 illuminate the potential for a future where the riches of space are intertwined with the prosperity and advancements of humankind.
Which response or space trends did you like most? Why? Share in comments below.
By:Fahri Karakas Link:https://medium.com/predict/unveiling-the-mind-blowing-space-trends-of-2050-an-investigative-adventure-into-the-future-of-b241ac480cf
-
@ 630c0b5b:0654d4f7
2023-07-20 06:22:46Det enklaste sättet att börja är genom att säga "du kommer förmodligen inte tro på mig varför bitcoin är värdefullt, men du kan börja med att ta emot 10 kr över lightning".
Sen är det nog smart att förklara bitcoin som en råvara med en absolut begränsad mängd, som några människor ser värde i. Jämför det med börsindex och visa prisutvecklingen. De flesta vill bara ha en lättsmält introduktion utan ord som hyperinflation.
Använd enkla ord som alla förstår. Säg att råvaran utvinns genom att någon väljer att sälja sin energi för att få bitcoin i ersättning.
Poängtera att mining är kopplingen mellan den digitala- och fysiska världen. Utan den kopplingen kan inte en digital produkt rättfärdiga ett ekonomiskt värde som består över tid.
Säg att råvarans ägande sköts genom en databas, där det står att Kalle har skickat pengar till Adam.
Säg att alla databaser är värdelösa för att historiken kan ändras av någon, men att bitcoins databas inte går att ändra för att det krävs energi att försöka göra det.
Säg att bitcoins databas är som en excel-lista där varje rad är fastbränd för evigt och att det som ger bitcoin ett värde är att det inte går att ändra något.
Säg att din och min dator verifierar alla transaktioner och att ingen kan ändra regeln om maximalt 21 miljoner BTC för att din och min dator vägrar acceptera nya regler. Förklara att alla datorer tillsammans stärker nätverket genom att upprätthålla regelverket. Jämför denna decentralisering med plankton i havet; varken bitcoins nätverk eller plankton går att förstöra.
På frågan om övrig crypto så säger du att all annan crypto är som ett google kalkylark som kan ändras av någon, så ingen kan garantera något ägandeskap. Hänvisa även till Howey-testet och reglering i USA.
Säg att bitcoin är spekulation och att det finns en uppsida men att det är upp till var och en att bedöma nedsida. Köp ska bara göras med lång tidshorizont. Bedömd risk kontrolleras med liten size.
Fokusera på att använda bitcoin med mobilen under introduktionen. Skicka och ta emot över lightning. Förklara hur du själv tänkte från början och vilka steg du tog på vägen och vilka misstag du gjorde.