-
@ 6b9da920:7841cc6e
2023-11-25 18:06:20My first zig program
Hello, nostr!
, getting relay info fromrelay.damus.io
. Took me 2 nights LOL.```rust const std = @import("std"); const Client = @import("std").http.Client;
pub fn main() !void { var client = Client{ .allocator = std.heap.page_allocator };
const url = "https://relay.damus.io"; var option = std.http.Client.FetchOptions{ .location = std.http.Client.FetchOptions.Location{ .url = url }, }; try option.headers.append("Accept", "application/nostr+json"); const res = try client.fetch(std.heap.page_allocator, option);
const status = res.status; const body = res.body;
std.debug.print("Status code: {}\n", .{status}); std.debug.print("Status code: {?s}\n", .{body}); }
Output:
bash ➜ zig run main.zig Status code: http.Status.ok Status code: {"contact":"jb55@jb55.com","description":"Damus strfry relay","name":"damus.io ","pubkey":"32e1827635450ebb3c5a7d12c1f8e7b2b514439ac10a67eef3d9fd9c5c68e245","software":"git+https://github.com/hoytech/strfry.git","supported_nips":[1,2,4,9,11,12,16,20,22,28,33,40],"version":"0.9.6-7-g7196547"} ```Why?
If nostr a fundation for free(dom) software and society? If yes, as long as we are still running on platforms that centralized entities controls, we are not truly there.
The web, is mostly just Chrome and some Safari. It's a nice way to bootstrap our ecosystem. But, to be truly free, we need to build our very own application runtime / end user platform.
Going native/ system programming language is key.
There is Gossip, the native application written in Rust. But that's pretty much it.
We need strong system level programming / system software in nostr. Maybe not me, but we need it.
-
@ fc9e003b:05f52e8c
2023-11-25 17:36:40Par rapport à ma présentation du B-Only 2023 (https://b-only.org/index.php/speakers/), une distribution spatiale analogue à celles des systèmes numériques distribués à faible coût d'entrée (noeuds Bitcoin, noeuds Monero, noeuds Tor, imprimante 3D et Fablabs) serait celle de l'industrialisation. Dans la pratique elle est assez proche de celle du protestantisme mais prend en compte une centralisation dans le bassin parisien (jacobinisme...) et un développement de la Bretagne (les transports et communications modernes l'excluent moins j'imagine).
Sources :
https://tools.rino.io/network/ https://coveragemap.net/heatmap/ https://carto.rfflabs.fr/#search https://lewebpedagogique.com/sevfromet/3e-g2-les-espaces-productifs-francais/ Le musée du desert, Cévennes
-
@ 7a265dd2:f1a4745c
2023-11-25 16:09:49Bitcoin community, I have a question. Is Bitcoin effectively fungible? Or is it possible to mark some units, and does that harm fungibility?
bitcoin
fungibility
Comunidad de Bitcoin, tengo una pregunta. ¿Es el Bitcoin efectivamente fungible? ¿O es posible marcar algunas unidades, y eso perjudica la fungibilidad?
bitcoin
fungibilidad
Communauté Bitcoin, j'ai une question. Le Bitcoin est-il effectivement fongible? Ou est-il possible de marquer certaines unités, et cela nuit-il à la fongibilité?
bitcoin
fongibilité
-
@ df47809c:1a3a0ee5
2023-11-25 15:16:25Chef's notes
Beef and Broccol.
Quick and easy meal.
Details
- ⏲️ Prep time: 15
- 🍳 Cook time: 15
- 🍽️ Servings: 4
Ingredients
- 1/3 up oyster sauce
- 2 tsp toasted sesame oil
- 1/3 cup sherry
- 1tsp soy sauce
- 1 tsp white sugar
- 1 tsp cornstarch
- 3/4 pound beef round steak, cut into /8 in. thick strips
- 3 tbs avocado oil
- 1 clove garlic
Directions
- whisk liquids together with cornstarch and sugar until sugar is disolved.
- Heat avocado oil inwok ober mediuhigh heat, stri in ginger and garlic for 1 minute. then remove and discard. stir in broccoli and toss and stir in the hot oil until bright green and almost tender, 5-7 minutes. Remove broccoli from the wok and set aside.
- Pour a little more oil into the wok if needed and stir and toss the beef with the marinade until the sauce forms a layer of glaze on the beef, and the meat is no longer pink. about 5 minutes. Return the cooked broccoli into the wok, and sir until he meat and broccoli are heated through, about 3 minutes.
-
@ 9ecbb0e7:06ab7c09
2023-11-25 14:22:33Un grupo de madres cubanas, con hijos pacientes de enfermedades graves, se manifestó frente a las oficinas del Ministerio de Salud Pública de La Habana para exigir a las autoridades comunistas una solución inmediata a sus respectivos casos.
Acompañadas por la activista Diasniurka Salcedo Verdecia, estas mujeres, además de exigir la correcta atención médica para sus hijos, también solicitaron visas humanitarias para trasladarlos a otro país, en caso de que el sistema de salud pública de la Isla no pueda atenderlos.
Un funcionario del Ministerio las interceptó en la entrada y les prometió que las atendería sin darles más detalles. Publicaciones en redes sociales del activista Magdiel Jorge Castro y la periodista Mónica Baro Sánchez muestran a las mujeres decidas a no moverse hasta ser tomadas en cuenta.
Además, exigen la liberación de las mujeres que han sido detenidas recientemente por alzar sus voces en busca de atención médica para sus hijos. “Me cansé de que tantas madres me comuniquen la situación de sus hijos y no sean debidamente atendidas, no nos vamos a mover hasta que seamos atendidas, y que las madres que acaban de detener sean liberadas y vengan con nosotros, a reclamar el derecho a una atención”, dijo Salcedo Verdecia.
Este hecho es parte de las diferentes manifestaciones que han realizado madres cubanas en los últimos meses a causa de temas diversos. Las más recientes ocurrieron en Maisí, Guantánamo, y en La Habana, donde mujeres con sus hijos protestaron por falta de agua potable. En ambos casos fueron intimidadas por agentes de la Seguridad del Estado y horas después recibieron agua mediante camiones cisternas.
-
@ 8fb140b4:f948000c
2023-11-21 21:37:48Embarking on the journey of operating your own Lightning node on the Bitcoin Layer 2 network is more than just a tech-savvy endeavor; it's a step into a realm of financial autonomy and cutting-edge innovation. By running a node, you become a vital part of a revolutionary movement that's reshaping how we think about money and digital transactions. This role not only offers a unique perspective on blockchain technology but also places you at the heart of a community dedicated to decentralization and network resilience. Beyond the technicalities, it's about embracing a new era of digital finance, where you contribute directly to the network's security, efficiency, and growth, all while gaining personal satisfaction and potentially lucrative rewards.
In essence, running your own Lightning node is a powerful way to engage with the forefront of blockchain technology, assert financial independence, and contribute to a more decentralized and efficient Bitcoin network. It's an adventure that offers both personal and communal benefits, from gaining in-depth tech knowledge to earning a place in the evolving landscape of cryptocurrency.
Running your own Lightning node for the Bitcoin Layer 2 network can be an empowering and beneficial endeavor. Here are 10 reasons why you might consider taking on this task:
-
Direct Contribution to Decentralization: Operating a node is a direct action towards decentralizing the Bitcoin network, crucial for its security and resistance to control or censorship by any single entity.
-
Financial Autonomy: Owning a node gives you complete control over your financial transactions on the network, free from reliance on third-party services, which can be subject to fees, restrictions, or outages.
-
Advanced Network Participation: As a node operator, you're not just a passive participant but an active player in shaping the network, influencing its efficiency and scalability through direct involvement.
-
Potential for Higher Revenue: With strategic management and optimal channel funding, your node can become a preferred route for transactions, potentially increasing the routing fees you can earn.
-
Cutting-Edge Technological Engagement: Running a node puts you at the forefront of blockchain and bitcoin technology, offering insights into future developments and innovations.
-
Strengthened Network Security: Each new node adds to the robustness of the Bitcoin network, making it more resilient against attacks and failures, thus contributing to the overall security of the ecosystem.
-
Personalized Fee Structures: You have the flexibility to set your own fee policies, which can balance earning potential with the service you provide to the network.
-
Empowerment Through Knowledge: The process of setting up and managing a node provides deep learning opportunities, empowering you with knowledge that can be applied in various areas of blockchain and fintech.
-
Boosting Transaction Capacity: By running a node, you help to increase the overall capacity of the Lightning Network, enabling more transactions to be processed quickly and at lower costs.
-
Community Leadership and Reputation: As an active node operator, you gain recognition within the Bitcoin community, which can lead to collaborative opportunities and a position of thought leadership in the space.
These reasons demonstrate the impactful and transformative nature of running a Lightning node, appealing to those who are deeply invested in the principles of bitcoin and wish to actively shape its future. Jump aboard, and embrace the journey toward full independence. 🐶🐾🫡🚀🚀🚀
-
-
@ 8fb140b4:f948000c
2023-11-21 00:46:59Venturing into the dynamic world of bitcoin's layer 2 networks, particularly the lightning network, can seem like an exciting frontier for tech enthusiasts and cryptocurrency aficionados. however, the decision to run your own lightning node is not one to be taken lightly. While the allure of contributing to the bitcoin ecosystem and potentially earning transaction fees is strong, there are significant considerations that should temper the enthusiasm of would-be node operators. From the intricate technicalities to unexpected challenges, here are 10 compelling reasons why running your own lightning node might not be the electrifying experience you anticipated.
Running your own lightning node for the bitcoin layer 2 network can be a complex and demanding task. Here are 10 reasons why you might choose not to:
-
Technical complexity: setting up and managing a lightning node requires a good understanding of blockchain technology and network management, which can be overwhelming for beginners.
-
Security risks: running a node means you're responsible for securing it against potential cyber attacks, which requires constant vigilance and technical expertise.
-
Resource intensive: a lightning node requires continuous internet connection and sufficient hardware resources, which can be costly in terms of electricity and equipment.
-
Liquidity requirements: to facilitate transactions, you need to lock up a significant amount of bitcoin in your channels, which might not be ideal if you prefer liquidity.
-
Maintenance efforts: regular maintenance and updates are necessary to keep the node running smoothly, which can be time-consuming.
-
Limited privacy: operating a node might expose some of your transaction details or ip address, potentially compromising privacy.
-
Slow ROI: the financial return on operating a lightning node can be slow and uncertain, especially if the network fees are low.
-
Network complexity: understanding and managing channel capacities, routing, and fees can be complicated and require continuous learning and adaptation.
-
Scalability issues: as the network grows, managing a node can become increasingly challenging, with more channels and transactions to handle.
-
Downtime risks: if your node goes offline, you might miss out on transaction fees or, worse, risk losing funds in channels due to outdated channel states.
These reasons reflect the challenges and responsibilities that come with running your own lightning node and may discourage some individuals, especially those with limited technical background or resources. If you are still up for a challenge, thank you for supporting the network! 🐶🐾🫡🙏🏻
-
-
@ 8fb140b4:f948000c
2023-11-18 23:28:31Chef's notes
Serving these two dishes together will create a delightful centerpiece for your Thanksgiving meal, offering a perfect blend of traditional flavors with a homemade touch.
Details
- ⏲️ Prep time: 30 min
- 🍳 Cook time: 1 - 2 hours
- 🍽️ Servings: 4-6
Ingredients
- 1 whole turkey (about 12-14 lbs), thawed and ready to cook
- 1 cup unsalted butter, softened
- 2 tablespoons fresh thyme, chopped
- 2 tablespoons fresh rosemary, chopped
- 2 tablespoons fresh sage, chopped
- Salt and freshly ground black pepper
- 1 onion, quartered
- 1 lemon, halved
- 2-3 cloves of garlic
- Apple and Sage Stuffing
- 1 loaf of crusty bread, cut into cubes
- 2 apples, cored and chopped
- 1 onion, diced
- 2 stalks celery, diced
- 3 cloves garlic, minced
- 1/4 cup fresh sage, chopped
- 1/2 cup unsalted butter
- 2 cups chicken broth
- Salt and pepper, to taste
Directions
- Preheat the Oven: Set your oven to 325°F (165°C).
- Prepare the Herb Butter: Mix the softened butter with the chopped thyme, rosemary, and sage. Season with salt and pepper.
- Prepare the Turkey: Remove any giblets from the turkey and pat it dry. Loosen the skin and spread a generous amount of herb butter under and over the skin.
- Add Aromatics: Inside the turkey cavity, place the quartered onion, lemon halves, and garlic cloves.
- Roast: Place the turkey in a roasting pan. Tent with aluminum foil and roast. A general guideline is about 15 minutes per pound, or until the internal temperature reaches 165°F (74°C) at the thickest part of the thigh.
- Rest and Serve: Let the turkey rest for at least 20 minutes before carving.
- Next: Apple and Sage Stuffing
- Dry the Bread: Spread the bread cubes on a baking sheet and let them dry overnight, or toast them in the oven.
- Cook the Vegetables: In a large skillet, melt the butter and cook the onion, celery, and garlic until soft.
- Combine Ingredients: Add the apples, sage, and bread cubes to the skillet. Stir in the chicken broth until the mixture is moist. Season with salt and pepper.
- Bake: Transfer the stuffing to a baking dish and bake at 350°F (175°C) for about 30-40 minutes, until golden brown on top.
-
@ 5c8a5765:4fc5edee
2023-11-22 22:38:03Read in english: Session removed PFS, we're doomed!!1
Автор: Кот Иван
Опубликовано также в IPFS!•••
PFS (Perfect forward secrecy) — это система, позволяющая в случае взлома одного ключа шифрования выдать лишь часть сообщений, но защитить другие части. Делается это простым образом: ключ шифрования переодически меняется. Из-за того, что Session убрал PFS, в случае взлома одного ключа хакеру станут доступны все ваши переписки. Разработчики Session лаконично возразили на это, что взлом ключа возможен лишь при физическом доступе к девайсу (а в этом случае сообщения можно прочесть и просто так) [0]. Насколько они правы?TL;DR: Они охуенно правы, но им стоит побеспокоиться о квантовых компьютерах.
•••
Давайте разберемся.
Протокол Session генерирует каждой учетной записи долгосрочную пару ключей X25519 (секретный и публичный) [1]. Секретный ключ X25519 состоит из 32 байтов (256 битов), или строку из 64 символов, которые включают в себя только цифры и буквы верхнего регистра [2][3].
Пример приватного ключа:
193FC8C3A73782DA18B238915C941CEF5E985DB388C881BD3C0E9EF496894A19
Предположим, что разработчики Session неправы, и попробуем посчитать, сколько времени займёт процесс взлома фразы, состоящего из 64 букв и цифр.
Количество всех возможных комбинаций любой строки вычисляется так [4]:
(Количество возможных символов)^(Длинна пароля)
В случае, если мы используем 26 букв английского алфавита и десять цифр (включая ноль), получается 36 вариантов символа. Длинна — как мы уже выяснили — 64. Наше уравнение — 36 в степени 64.
36^64 = 4.01199E+99
Следовательно, у ключа шифрования Session есть 4 011 199 000 000 000 000 000 000 000 000 000 000 000 000 000 000 000 000 000 000 000 000 000 000 000 000 000 000 000 000 000 000 000 000 возможных комбинаций. Цифру ещё можно выразить как 10^99*4, 12.3 Q (кветто) [5] или 4 дуотригинтиллиона. Для сравнения, это больше (примерно на 4 квинтиллиона), чем количество атомов в наблюдаемой вселенной (по оценкам — от 10^79 до 10^81) [6][7].
Для краткости, в будущем я буду обращаться к этому числу как к 12.3 Q, хотя его вполне можно было бы и назвать "число-пиздец". Так вот, теперь нам предстоит выяснить, как быстро компьютер сможет взломать пароль, если количество его комбинаций — 12.3 Q. Сайт Betterbuys [8] провел небольшое расследование этого вопроса и предложил, ссылаясь на источники, следующие схемы:
Эффективные ядра: 1/((1-Эффективность)+(Эффективность/Кол-во ядер)) — (мы предположим, что процессов посвящает 99% операций взлому пароля, поэтому эффективностью будет 0.99)
GFLOPS процессора: Частота процессора * Эффективные ядра
Количество операций в секунду: GFLOPS/Константа шифрования (расчитана на типичный компьютер 2015 года)
Время в секундах: x секунд = Комбинации/(количество операций в секунду)
Каков результат всех этих вычислений? Если заставить один компьютер 2015 года на процессоре Core i5-6600K взламывать ваш секретный ключ, у него займет это 3.5411902245474E+52 секунд — или 4 000 000 000 000 000 000 000 000 000 000 000 000 000 000 000 000 лет.А шанс случайно подобрать ключ — меньше 0.0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003%.
Но что если компьютер будет не один?
Что если именно тебя атакует владелец ботнета, или хакерская группировка, или правительство со сверхкомпьютером? Ну, даже если мы подключим все существующие в мире компьютеры, включая ваш, ко взлому вашего ключа, на это всё равно уйдет уйма времени. Например, в 2015 году их было 2 миллиарда (2 000 000 000 000 000 000 000 000 000 000 000 000 000 лет взлома); но
даже если к 2023 мы изобрели в тысячу раз больше компьютеров, чем было (тысяча миллиардов), и все они (до музейных экспонатов) приобрели в два раза более сильный процессор, чем i5-6600K , у нас всё ещё остается 1 000 000 000 000 000 000 000 000 000 000 000 000 лет на взлом.Но что насчёт более вовременных методов взлома?
Здесь разработчики не соврали: современные методы взлома отметаются тем, как Session скрывает ваши метаданные. Когда сгенерированный Session ключ не связан с вами — это исключает индивидуальную атаку; когда пароль случаен, это исключает атаку со словарём [10]; когда пароль неизвестен даже вам самим, это исключает фишинговую атаку [10]; когда пароль длиннее 20-30 символов, это исключает атаку радужными базами [10]. Session также устойчиво противостоит MITM [10], Sybil и DRDoS-атакам.
Но что насчёт квантовых компьютеров?
Система шифрования, используемая Session (elliptic-curve cryptography [11]), действительно, уязвима перед квантовым компьютером, использующим алгоритм Шора [12]. Как скоро квантовый компьютер сможет взломать пароль с 12.3 Q комбинаций?
Согласно одним данным, всего за час, но при наличии от 20 [13] до 317 [14] миллионов кубитов (известный нам опубликованный лимит кубитов на сегодня — 433 кубита [15]). Согласно другим — уже с сегодняшним компьютером, но за 67 миллионов лет [16]. Согласно третьим — квантовый компьютер вообще едва ли сможет взламывать пароли: например из-за того, что компьютер должен быть достаточно стабильным для долгого взлома, или он должен иметь доступ к паролю (нужно взломать систему и получить напр. хеш пароля, ибо проверять состояние кубитов через интернет-запросы невозможно).
Тем не менее, из всех поднятых вопросов лишь квантовые компьютеры действительно представляют возможную опасность в будущем.
В конце концов, даже если вам удастся взломать 256-битный ключ, без доступа к девайсу вы сможете восстановить диалоги лишь за последние 14 дней (а также читать дальнейшие диалоги с этого момента), потому что сообщения старше этого срока перманентно удаляются с серверов [17].Выводы
- То, что Session отказался от PFS, никак не компромитирует вашу безопасность*.
- Знатокам кибербезопасности, продолжающим по сей день кричать про PFS как главную уязвимость Session, стоит прежде всего попробовать отгадать или подобрать мою любимую цифру — она где-то в диапазоне между 1 и 4 011 199 000 000 000 000 000 000 000 000 000 000 000 000 000 000 000 000 000 000 000 000 000 000 000 000 000 000 000 000 000 000 000 000.
- Тем не менее, Session нужно обратить внимание на потенциальную грядущую опасность квантовых компьютеров.
- В какой-то момент Sesson должен начать переход на новый метод шифрования, устойчивый против квантовых алгоритмов.
*Когда количество нулей в вероятности (0,00..01) выше сотни, вероятность можно округлять до нуля.
•••
Источники:
[0] https://getsession.org/faq#session-pfs
[1] https://getsession.org/blog/session-protocol-technical-information
[2] https://crypto.stackexchange.com/questions/80601/what-is-the-key-length-of-shared-secret-by-curve-25519-ecdh
[3] https://medium.com/asecuritysite-when-bob-met-alice/having-your-crypto-handshaking-cake-and-eating-it-x25519-or-kyber-why-not-have-both-18b90f90dbbd
[4] https://www.betterbuys.com/estimating-password-cracking-times/
[5] https://en.wikipedia.org/wiki/Metric_prefix
[6] https://en.wikipedia.org/wiki/Observable_universe#Matter_content
[7] https://www.universetoday.com/36302/atoms-in-the-universe/
[8] https://www.betterbuys.com/estimating-password-cracking-times/
[9] https://www.worldometers.info/computers/
[10] https://stytch.com/blog/top-10-password-cracking-techniques/
[11] https://en.m.wikipedia.org/wiki/Elliptic-curve_cryptography
[12] https://en.m.wikipedia.org/wiki/Shor%27s_algorithm
[13] https://arxiv.org/pdf/1905.09749.pdf
[14] https://doi.org/10.1116/5.0073075
[15] https://spectrum.ieee.org/ibm-condor
[16] Sumanta Chatterjee (https://qr.ae/pKkcrh) states that the speed of password calculation can be found by the following formula: (number of password combinations)/(number of operations per second) = x seconds, where number of operations per second is calculated as follows: (number of petaFLOPS of a quantum computer)petaFLOPS, where 1 petaFLOSP equals 10^15 or 2^50 (https://en.wikipedia.org/wiki/FLOPS). According to TOP500 (https://top500.org/lists/top500/list/2022/11/), as of January 2023, the most powerful computer had a peak performance of 1685.65 petaFLOPS. So 12.3 Q/(1685.652^50) = 2.11394040995172541e+81 seconds = 66,988,000 years.
[17] https://getsession.org/blog/self-deleting-messages -
@ 8fb140b4:f948000c
2023-11-13 07:55:20Hey there, train enthusiasts! let's chat about one of the most impressive rail systems in the world - japan's trains. when you think of japanese trains, the first image that probably pops into your mind is the sleek, futuristic shinkansen, also known as the bullet train. these high-speed trains are not just a symbol of modern technology; they're a testament to japan's commitment to efficiency and punctuality. it's not an exaggeration to say that japanese trains are famous for being precisely on time. if a train is five minutes late, it's often considered a significant delay!
but it's not just the shinkansen that deserves praise. japan's entire railway network, from city subways to rural train lines, is incredibly well-organized. the trains are clean, comfortable, and surprisingly quiet, making even a regular commute a pleasant experience. what's more impressive is the frequency of these trains. in major cities like tokyo and osaka, you rarely have to wait more than a few minutes for a train, reducing the stress of travel and making commuting more predictable.
and let's not forget the level of service! train staff in japan are known for their politeness and helpfulness. whether you're a tourist struggling with your luggage or a local needing directions, there's always someone to help. plus, the stations themselves are marvels - clean, well-signed, and packed with amenities like shops and restaurants. in short, japan's trains aren't just a mode of transportation; they're an experience, reflecting the country's dedication to quality, punctuality, and customer service. so, next time you're in japan, hop on a train and enjoy the ride - it's an adventure in itself! 🚆🌸🐶🐾🫂
-
@ 9ecbb0e7:06ab7c09
2023-11-25 14:15:59Según diferentes reportes en redes sociales, un joven cubano, identificado como Luis Yerandi, de 20 años, fue víctima de un ataque mortal a las afueras de la casa de la Música de Galiano. Este incidente se suma a otros hechos similares que han levantado preocupaciones sobre el creciente nivel de violencia en La Habana.
El fatal acontecimiento tuvo lugar durante un altercado fuera del popular lugar de celebraciones. Según la cuenta de Facebook Reinier Abel Williams Noticias, el muchacho perdió la vida a causa de una puñalada.
“Para los que piensan que estas cosas pasan por estar en el ambiente, no les quito razón porque en ocasiones es así, pero la realidad es que La Habana se está convirtiendo en un salvaje oeste”, agregó el internauta.
Asimismo, añadió: “yo vivo en la calle Monte y casi a diario se escuchan gritos en pleno día por ajustes de cuenta y arrebatos, en ocasiones he salido corriendo porque mis hijos están afuera y le he pasado por arriba a la sangre de otros, los que son de la zona saben que no miento”.
El cibernauta también lamentó que ante ese tipo de hechos no se vea patrullando a los agentes de la Policía Nacional Revolucionaria (PNR). “Ya ningún horario es bueno para salir a la calle, que Dios nos proteja”, comentó Reinier Abel al recordar la publicación de una madre cubana sobre la violencia en la Isla.
-
@ 8fb140b4:f948000c
2023-11-10 12:00:40Intro
Nostrasia 2023, a vibrant unconference, was hosted in two bustling Asian cities: Hong Kong and Tokyo, Japan. Nostriches from around the world flocked to these destinations, eager to immerse themselves in local culture, savor the cuisine, and most importantly, enjoy each other's company in person. Tokyo's event, buzzing with energy, took place in Shibuya, a district renowned for its lively nightlife and abundance of bars, clubs, and restaurants. As is tradition with Nostr events, the atmosphere was charged with excitement, symbolized by the abundant purple and orange hues.
https://v.nostr.build/k7qV.mp4
Preparations
The journey to Nostrasia began right after Nostrica, with meticulous planning to ensure the perfect venue. It was a challenge to find a location that was both spacious and accessible, offering affordable accommodation options nearby. Our diligent volunteers in Japan scoured venues in Tokyo and Yokohama before selecting the ideal spot in Shibuya.
In the days leading up to the event, volunteers, both local and from afar, gathered at the venue. Their mission: to set up everything from audio-visual equipment to stages and decorations, ensuring a warm welcome for attendees on November 1st at 9:00 AM. Despite the time crunch, the spirit of cooperation and friendliness prevailed, making the preparation phase smooth and enjoyable.
Even amidst the busy setup, there was time for breaks and socialization, keeping everyone energized and focused on the mission at hand.
Day 1 (The Beginning)
No day at Nostrasia could start without a caffeine kick or a beverage of choice. The first day witnessed a steady influx of nostriches, filling the venue with excitement and anticipation.
The day offered a mix of activities: some attendees engaged in the presentations, others relaxed in the family-friendly area, and there were even recreational spaces for all ages to enjoy, including model train setups.
The setup was designed to welcome nostriches of all stripes, whether young or old, tech-savvy or not. It was a space where everyone could feel comfortable and included.
The day culminated in a grand welcome party, complete with drinks, MAGURO (Yellowfin tuna), and karaoke.
https://v.nostr.build/Mqqa.mp4
Day 2
Following a late night, the second day of the conference started a bit later, accommodating the nocturnal adventures of the attendees. The day was packed with fascinating talks, workshops, and plenty of opportunities for meet-ups and hugs.
https://v.nostr.build/q3RM.mp4
An interesting discovery for me was the concept of air replies, a novel and visually engaging way to interact on social media.
Day 3 (Final)
The final day, starting late due to the previous night's festivities, was filled with a diverse range of presentations. Topics varied from non-technical perspectives on Nostr to in-depth technical workshops and discussions. #footstr
The day was brimming with a variety of presentations in both halls of the conference center. These ranged from insightful talks about Nostr from a non-technical perspective to more in-depth technical workshops and discussions.
https://v.nostr.build/R98n.mp4 https://v.nostr.build/o5Xl.mp4 https://v.nostr.build/4A6W.mp4
The event concluded with heartfelt closing remarks from the organizers, filled with gratitude and appreciation for everyone's participation and effort.
Outro
Nostrasia 2023 was a resounding success, marked by a warm, friendly atmosphere that pervaded the entire event. While some had to depart immediately after, many stayed on to explore the wonders of Japan, carrying with them memories of an unforgettable gathering. The end. 🐶🐾🫡🫂
Footnotes
- For the list of notes published about the event, use #nostrasia hashtag.
- For the official Nostrasia profile, visit @npub1nstrcu63lzpjkz94djajuz2evrgu2psd66cwgc0gz0c0qazezx0q9urg5l
- Detailed conference schedule
- Official Webside
Other pictures and videos taken before, during, and after the event
-
@ a012dc82:6458a70d
2023-11-25 05:59:20Table Of Content
-
ZeroSync's Vision for Bitcoin
-
The Privacy Advantage
-
ZeroSync's Journey and Support
-
Bitcoin's Resistance to Change
-
The Future: Bitcoin Simplicity
-
Conclusion
-
FAQ
A Swiss non-profit, ZeroSync, is at the forefront of a groundbreaking initiative, working on the world's first zero-knowledge light client for Bitcoin. This significant advancement is aimed at integrating zero-knowledge proofs into the most valuable cryptocurrency network.
ZeroSync's Vision for Bitcoin
ZeroSync's verifier for Bitcoin's block headers paves the way for the creation of a zk proof-based light client. This is a monumental step in their vision of permissionless innovation, as explained by project lead Robin Linus. The immediate application of such a light client could be to operate a Bitcoin full node on devices as compact as mobile phones. Furthermore, ZeroSync envisions a second-layer protocol over Bitcoin that can introduce tokens, like stablecoins, to the Bitcoin network. This would also lead to a substantial increase in throughput, up to 20 to 50 times, without necessitating any forks.
The Privacy Advantage
One of the standout features of this solution is its ability to process around 100 transactions on the base layer. Additionally, it offers unparalleled privacy. Transactions can be encrypted, both in terms of amounts and transaction graphs, providing privacy levels on par with cryptocurrencies like Zcash. Interestingly, this privacy feature is a natural outcome of the protocol's utilization of STARKs, a proving system developed by StarkWare, rather than an intentional design element.
ZeroSync's Journey and Support
ZeroSync's endeavors have garnered support in the form of grants from Geometry Research in 2022 and StarkWare more recently. Their pioneering work marks the first attempt to employ StarkWare's Cairo programming language outside the Ethereum ecosystem. While a soft fork would be essential for the trustless bitcoin bridging on the envisioned layer-2 network, the network can still support features like token transfers where transaction fees are paid in stablecoins, eliminating the need for Bitcoin.
Bitcoin's Resistance to Change
Bitcoin's design inherently resists change, demanding consensus from Core developers and almost unanimous agreement from full node operators, including miners. The last soft fork, Taproot, which took place in 2021, was years in the making and was only activated after over 90% of node operators gave their approval. Linus emphasizes the importance of some changes, especially the integration of a zk proof verifier on Bitcoin. ZeroSync aims to play a pivotal role in determining the most viable approach and actively participates in the community to drive this vision forward.
The Future: Bitcoin Simplicity
Zero-knowledge proof technology is still nascent, with various proof systems available, each with its own set of trade-offs. Reaching a consensus on a single system is challenging. However, Linus anticipates that the Simplicity programming language, introduced by Blockstream about half a decade ago, might offer a solution. Described as "Bitcoin's last soft fork," Simplicity could significantly enhance Bitcoin's scripting capabilities. The adoption of Simplicity would provide zk proof teams with the flexibility to choose their preferred proof system, eliminating debates over which verifier to activate.
Conclusion
The advancements spearheaded by ZeroSync have the potential to usher in a new era for the Bitcoin network. By integrating zero-knowledge proofs, Bitcoin can achieve heightened levels of privacy and security, ensuring that transaction details remain confidential while still being verifiable. This not only enhances user trust but also positions Bitcoin as a more versatile and adaptable cryptocurrency. Furthermore, the potential adoption of the Simplicity programming language could be a game-changer. It promises to amplify Bitcoin's scripting capabilities, paving the way for more sophisticated applications and functionalities on the network.
FAQ
What is ZeroSync? ZeroSync is a Swiss non-profit working on the world's first zero-knowledge light client for Bitcoin.
What are zero-knowledge proofs? Zero-knowledge proofs are cryptographic methods that allow one party to prove to another that a statement is true without revealing any specific information about the statement itself.
How can ZeroSync benefit Bitcoin? ZeroSync aims to introduce a zk proof-based light client, enabling operations like running a Bitcoin full node on mobile devices and increasing transaction throughput without requiring forks.
What is the significance of STARKs in ZeroSync's protocol? STARKs, developed by StarkWare, are used in ZeroSync's protocol, providing enhanced transaction privacy as a natural outcome.
What is the Simplicity programming language? Introduced by Blockstream, Simplicity is a smart contract language that could significantly enhance Bitcoin's scripting capabilities, potentially being the last soft fork for Bitcoin.
That's all for today, see ya tomorrow
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co
Youtube: @croxroadnews
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ 44dc1c2d:31c74f0b
2023-11-15 19:16:12Chef's notes
So practically all recipes call for you to peel your potatoes. While it does make for a nice looking gnocchi, you can absolutely leave the skins on it, if you like a more rustic looking gnocchi. I do this when I feel lazy all the time and it still turns out great.
When incorporating the eggs and flour, having a spatula or a bread tool is really helpful here.
When you're at the stage of boiling your made Gnocchi, you will know they are done when they float to the top of the pot.
Details
- 🍳 Cook time: 1 hour
Ingredients
- 2 pounds of starchy potatoes, (IE 2 large russets)
- 1/4 cup egg, (lightly beaten)
- scant 1 cup of unbleached all-purpose flour
- fine grain sea salt
Directions
- Fill a large pot with cold water. Salt the water, peel then cut potatoes. Bring the water to boil and cook tell potatos are tender and mashable
- Remove potatoes from the water, drain and mash until there are no noticeable lumps.
- Let the potatoes cool spread out across your work surface for ten or fifteen minutes. Long enough that the egg won't cook when it is incorporated into the potatoes.
- Pull the potatoes into a soft mound. Drizzle with the beaten egg and sprinkle 3/4 cup of the flour across the top.
- After the flour and the egg is incorporated into the potato, gently kneed the dough
- The dough should be moist but not sticky. It should feel almost billowy.
- Cut it into 8 pieces. Gently roll each 1/8th of dough into a snake-shaped log, roughly the thickness of your thumb. Use a knife to cut pieces every 3/4-inch. Dust with a bit more flour.
- So this next bit is optional you dont need to do this but it mkae for better looking gnocchi.
- To shape the gnocchi hold a fork in one hand and place a gnocchi pillow against the tines of the fork cut ends out.
- With confidence and an assertive (but very light) touch, use your thumb and press in and down the length of the fork. The gnocchi should curl into a slight "C" shape, their backs will capture the impression of the tines as tiny ridges (good for catching sauce later). Set each gnocchi aside, dust with a bit more flour if needed, until you are ready to boil them.
- Boil the Gnocchi and Serve
-
@ 8fb140b4:f948000c
2023-11-02 01:13:01Testing a brand new YakiHonne native client for iOS. Smooth as butter (not penis butter 🤣🍆🧈) with great visual experience and intuitive navigation. Amazing work by the team behind it! * lists * work
Bold text work!
Images could have used nostr.build instead of raw S3 from us-east-1 region.
Very impressive! You can even save the draft and continue later, before posting the long-form note!
🐶🐾🤯🤯🤯🫂💜
-
@ 44dc1c2d:31c74f0b
2023-11-15 18:48:12Chef's notes
Not a lot of notes here. This recipe is pretty straight forward. I have used half-and-half instead of whole milk in the past, and it turns out great. Low and slow here is the key.
What I mean by a sauce catching pasta is anything with a lot of surface area for the sauce. IE angle hair is not a good idea to use here.
Details
- ⏲️ Prep time: 10 ish min
- 🍳 Cook time: 2 1/2 hours
Ingredients
- 1 medium onion, chopped
- 1 celery stalk, chopped
- 1 small carrot, peeled, chopped
- 3 Tbsp. extra-virgin olive oil
- 1 lb. ground beef chuck
- Kosher salt
- 3 oz. thinly sliced pancetta, finely chopped
- 1 cup dry white wine
- ⅓ cup tomato paste
- 1 bay leaf
- Pinch of finely grated nutmeg
- 2 cups (or more) chicken stock
- 1 cup whole milk
- 2 oz. finely grated Parmesan (about ½ cup), plus more for serving
- Some form of pasta to serve with tagliatelle or pappardelle. really any "sauce catching" pasta will do.
Directions
- Pulse onion, celery, and carrot in a food processor until very finely chopped. Transfer to a small bowl.
- Heat oil in a Dutch oven or other large pot over medium. Break beef into small clumps (about 1½") and add to pot; season lightly with salt. Cook, stirring occasionally but not breaking meat apart, until beef is lightly browned but not crisp, 6–8 minutes
- Wipe out pot. Cook pancetta in pot over medium heat, stirring occasionally, until pancetta has released some of its fat and is crisp, 6–8 minutes.
- Add onion mixture to pot and cook, stirring occasionally, until vegetables are very soft and beginning to stick to surface, 6–8 minutes.
- Return beef to pot and pour in wine. Reduce heat to medium-low and cook, smashing down on beef with a wooden spoon, until wine is evaporated, surface of pot is almost dry, and meat is finely ground, 12–15 minutes.
- Add tomato paste, bay leaf, and nutmeg and cook, stirring occasionally and still pressing down on meat, until tomato paste is slightly darkened, about 5 minutes.
- Pour stock and milk into pot; add a pinch of salt. Reduce heat to the lowest setting and cook, uncovered and stirring occasionally, until meat is very, very tender, 2–2½ hours.
- There shouldn’t be any rapid bubbles at this stage. Instead, the sauce should release the occasional small bubble or two. When finished, the sauce should have the texture of and look like a sloppy joe mixture.
- If the liquid reduces before the meat is completely tender, add an extra ½ cup stock and continue cooking. Discard bay leaf. Taste sauce and adjust seasoning with salt; keep warm.
- Cook pasta in a large pot of boiling salted water. If using fresh pasta, cook about 3 minutes. If using dry, cook until very al dente, about 2 minutes less than package directions.
- Using tongs, transfer pasta to pot with sauce. Add 1 cup pasta cooking liquid and ½ cup Parmesan. Increase heat to medium, bring to a simmer, and cook, tossing constantly, until pasta is al dente and liquid is slightly thickened, about 2 minutes.
- Transfer pasta to a platter and top with more Parmesan. Do Ahead: Sauce can be made 4 days ahead. Cover and chill.
-
@ 58537364:705b4b85
2023-11-25 05:14:37ความสุขทางโลก ลัทธิสุขนิยมยกย่อง แต่ลัทธิทรมานตนประณาม หากไม่มองว่ากามสุขเป็นพรจากพระผู้เป็นเจ้า คนก็มักมองว่ากามสุขเป็นเครื่องลวงล่อของซาตาน ในเรื่องนี้พระพุทธศาสนาเลือกเดินสายกลาง โดยสอนว่าเราควรทำความเข้าใจกามสุขให้แจ่มแจ้ง ทั้งในแง่เสน่ห์เย้ายวน ข้อจำกัดและข้อบกพร่องทั้งหลาย
เพื่อให้เข้าใจกามสุขอย่างแจ่มแจ้ง เราอาจตั้งคำถามดังนี้: กามสุขสนองตอบความต้องการทางจิตใจแบบใดได้บ้าง และไม่อาจตอบสนองความต้องการแบบใดได้ เพราะเหตุใด
ความต้องการในส่วนที่กามสุขไม่อาจตอบสนองได้ เราควรปฏิบัติอย่างไร
เราหลงเพลิดเพลินและยึดติดในกามสุขมากเพียงใด และกามสุขมีอิทธิพลเหนือจิตใจเราเพียงใด
เราเคยทำหรือพูดสิ่งที่ไม่ถูกต้องเนื่องด้วยปรารถนาในกามสุขหรือไม่
เราเคยเบียดเบียนผู้อื่นเนื่องด้วยปรารถนาในกามสุขหรือไม่
บ่อยครั้งเพียงใดที่สุขทางโลกสร้างความผิดหวังให้เรา
ความคาดหวังมีผลกระทบอย่างไรต่อความสุขทางโลก การทำอะไรซ้ำๆ และความเคยชินส่งผลต่อความสุขทางโลกอย่างไร
เรารู้สึกอย่างไร ยามไม่ได้กามสุขที่เราปรารถนา
กามสุขมีความเกี่ยวข้องกับความซึมเศร้าหรือไม่ กับความวิตกกังวลด้วยหรือไม่
เรารู้สึกอย่างไร เมื่อนึกถึงอนาคตว่า จะต้องพลัดพรากจากสุขทางโลก เนื่องด้วยความเจ็บไข้ ความแก่ และความตาย
การพลัดพรากจากความสุขทางโลกรู้สึกอย่างไรบ้าง
เราตั้งคำถามได้มากมาย และยังตั้งคำถามได้มากไปกว่านี้
หลักสำคัญ คือ ยิ่งเห็นชัดแจ้งในกามสุข เราจะยิ่งเกิดปัญญาและเข้าถึงความสงบมากขึ้นธรรมะคำสอน โดย พระอาจารย์ชยสาโร แปลถอดความ โดย ปิยสีโลภิกขุ
-
@ 2edbcea6:40558884
2023-10-30 14:06:48Happy Sunday #Nostr !
Here’s your #NostrTechWeekly newsletter brought to you by nostr:npub19mduaf5569jx9xz555jcx3v06mvktvtpu0zgk47n4lcpjsz43zzqhj6vzk written by nostr:npub1r3fwhjpx2njy87f9qxmapjn9neutwh7aeww95e03drkfg45cey4qgl7ex2
The #NostrTechWeekly is a weekly newsletter focused on the more technical happenings in the nostr-verse.
Let’s dive in!
Recent Upgrades to Nostr (AKA NIPs)
1) (Proposed) NIP 96: File Storage Integration
As a reminder NIP 96 proposes a standard way for third party service providers to offer file storage for Nostr users. Standardization allows files to stay off relays but still be relatively cross compatible if users want to have files attached to notes show up in any Nostr client. It was initially implemented a few weeks ago with the Nostur and Coracle clients utilizing the open source Nostrcheck server by nostr:npub138s5hey76qrnm2pmv7p8nnffhfddsm8sqzm285dyc0wy4f8a6qkqtzx624
NIP 96 seems to be getting momentum; now the Nostur client has added integrated nostr.build file storage in a NIP 96 compatible way giving users more options! I hope it gets merged soon 💪
2) (Proposed) Update to NIP 72: Community Posts
This proposed update to Moderated Communities would allow clients to support using event kinds other than 1. Right now, posting on moderated communities (akin to subreddits) makes it so that all posts show up without context on most Nostr clients. Kind 1 events are like tweets, but posts in moderated communities are posted in a context that’s missing on clients like Damus or Amethyst.
This proposal would encourage moderated communities to publish using a different set of event kinds so the posts only show up in clients intended for moderated communities. It continues to gain momentum. nostr:npub180cvv07tjdrrgpa0j7j7tmnyl2yr6yr7l8j4s3evf6u64th6gkwsyjh6w6 opened and closed a proposed change similar to this as this newsletter was being written, and instead threw some support onto this proposal.
This change would be reverse compatible with current Moderated Communities but still allow for cleaner feeds on clients based on their intended content focus.
Author: vivganes
Notable Projects
Zapple Pay’s lightning-based subscriptions ♻️
The team at Mutiny Wallet’s work on Zapple Pay has helped keep the flow of zaps unblocked since Apple’s capricious decisions to force Damus to disable Zaps. Now they’ve introduced “auto zapping” which is the ability to set up recurring payments (like subscriptions) in a self-sovereign way.
Zaps are great to show support, lightning-gated content is going to be helpful for content creators too, but unlocking subscriptions can truly help content creators make a living on Nostr denominated in the hardest money on Earth. This could be game changing as we’ll discuss later 😉
Authors: nostr:npub1u8lnhlw5usp3t9vmpz60ejpyt649z33hu82wc2hpv6m5xdqmuxhs46turz nostr:npub1t0nyg64g5vwprva52wlcmt7fkdr07v5dr7s35raq9g0xgc0k4xcsedjgqv & Paul Miller
Highlighter 2.0 📝
If you’re unfamiliar Highlighter is “A nostr client for your most valuable information. Your reading. Your notes. Your thoughts. A place to discover thoughtful, timeless content.” and nostr:npub1l2vyh47mk2p0qlsku7hg0vn29faehy9hy34ygaclpn66ukqp3afqutajft continues to improve it rapidly.
This latest release improves many aspects, mostly focused on making it THE best way to read, highlight, label, and save content that’s meaningful to you.
On top of that nostr:npub1l2vyh47mk2p0qlsku7hg0vn29faehy9hy34ygaclpn66ukqp3afqutajft has been improving the ability to make money as a content creator via an integration to “subscribe” to support Nostr content creators like you would on Patreon, as well as split zaps for content published via Highlighter.
If you’re not at least using Highlighter to discover content, you’re missing out. In my experience It is the highest concentration of content created by deep thinkers on the internet.
Latest conversations: Nostr adoption via content creators
Nostr’s main feature right now is that it is freedom tech. So far that hasn’t been enough of a draw for mass Nostr adoption.
We can keep building existing apps on Nostr but we’ll need something truly differentiated for people to rip and replace their content consumption habits with the ones run on Nostr.
We have some unique offerings (beyond censorship resistance) in emerging tech like Highlighter, DVMs, and Zaps. Based on what we’ve seen this week, I believe the next million monthly active users will be driven by content creators moving to Nostr.
Helping creators make money
Creators tend to flock to where they can make the most money. This is true of content creators and creators of software.
The fact that Apple apps make far more money than Android ones (despite Android dominating the smartphone market) explains why there are so many iPhone only apps.
Video creators and streamers move between Youtube and Twitch based on who is going to offer them the better income (viewership * take home rate).
If we can provide platforms where creators get to keep more of their money, it could be a game changer.
Locked into platforms
Content platforms provide two things: audience aggregation and payment aggregation.
Payments: The revenue per view of a youtube video is calculable and theoretically Youtube could pay creators their cut of the revenue per view. That isn’t practical because of transaction fees, they’d be larger than the actual transaction.
That’s why platforms serve as payment aggregators between the advertisers, themselves and the creators; settling accounts on a regular basis in amounts that make sense given the payments infrastructure available to them (credit cards and ACH).
Audience aggregation: Audiences go where creators are, but creators go where their audience is; the relationship is complicated. Sometimes individual creators have enough power to make or break a platform, but for platforms as big as Youtube that becomes much harder.
Take the example of Spotify and Joe Rogan. That move was worth it in terms of cash for Rogan, and it put Spotify on the map as a podcasting platform. It didn’t really hurt Youtube a whole lot.
The main advantage of using a content platform like Youtube, TikTok, etc is that the audience is there, you “just” need to capture them. The trade off is that you have very little power to set your price.
Audience non-portability: If a creator decides to switch from Youtube to Twitch, their followers don’t automatically port over. Creators with strong followings have an ok time when switching but not everyone has that luxury.
This leads to a power imbalance between creators and platforms. Platforms can strike down any creator they want; even though, without creators, these platforms would be nothing. In the absence of a better solution we’re stuck in this disadvantageous equilibrium.
Freeing creators with Nostr and Bitcoin
If Nostr + Bitcoin could offer creators ready-to-go solutions that would let creators keep significantly more of their revenue. It just has to be a big enough difference that people make the switch even when Bitcoin and Nostr are unfamiliar to them.
The magic combo of capabilities on Nostr would be: Nostr-based versions of all the usual apps for content consumption, as long as they’re high enough quality to not deter users. Content management tools that are familiar and quality enough for content creators. This would need to include robust file storage and streaming for content (text, video, audio, etc) Payment infrastructure in the apps (via Lightning) that have low fees and support the structures that are relevant for the content type (pay per article, pay per view, streaming sats as you listen, subscriptions, etc) Lowest-common-denominator Nostr onboarding. Imagine an end-to-end encrypted Nostr key custodian, so users that are intimidated by keypairs could have a familiar login with email and password.
In this world, new Nostr users that were asked to join by their favorite creator may never interact with the most common clients on Nostr today. They may set up a Nostr user via some “Login with Nostr” solution and then they only interact with the Nostr versions of Twitch, Youtube, Substack, etc.
If the switch is painless for users and creators and the creators make more money, it’s a no-brainer for creators to try out. If it works for them, more will come.
Taylor Swift and Grimes are good people to aim for. Both have enough autonomy to experiment with any platform they want, and both have fought to maximize artists’ take home pay. Can you imagine if we could get every Swiftie on Nostr’s version of Spotify?
Why hasn’t this happened yet?
This sounds like “value for value” right? Many talented builders and creators have attempted to crack the “value for value” nut, but something hasn’t clicked yet for mass adoption. The missing link, in my opinion, is the lack of audience portability and how that affects payments.
Value for value (streaming sats for podcasts, or paying to unlock one article at a time) requires some storage of who bought access to the content. Otherwise if you switch devices the content platform won’t know you already purchased access. Without Nostr that means signing up for that particular content app and it’s a high bar to start paying for content.
With Nostr, you can login using your Nostr keys and purchase access on any Nostr-based app, using any Lightning wallet, and that access can be attached to your Nostr pub key. It lowers the barrier for users to start paying, which means content creators capture more value.
For some kinds of content, I think all the legos are there for a creator-friendly platforms. With the recent Mutiny wallet announcement of lightning-based subscriptions, there’s no reason not to build a Nostr-based Patreon or Substack. I’ve also seen some work on ways to Zap to unlock content, making the dream of “pay per article” possible.
The last piece missing for a truly seamless on-ramp would be one of these end-to-end encrypted Nostr key custodians. That way clients could offer a “login with Nostr” button and lower the barrier for new users even further.
The race to zero take rate
Nostr naturally combats monopolies (at least for clients at this point). The reason that platforms like Youtube and Twitch have a 20-60% take rate is because they’re monopolistic. They sit on their thrones because no one has yet solved the issue of audience aggregation and portability. Nostr breaks that model.
Once creators use Nostr-based platforms, they can switch at nearly no cost. The content is theirs, and the followers are universal, so they can move to a different platform that has a lower take rate without risking their income. They don’t even have to switch platforms at all if their content is stored and unlocked via events on the Nostr Relays themselves, since those are universal across all Nostr clients.
Ideally there would be third parties that host big files (PDFs, Videos, Audio, etc) which creators pay directly. Then these content clients are simply user interfaces for users to upload and consume content. Hell, even logging in is solved by the Nostr protocol itself, and maybe another third-party login provider). The scope of what these platforms need to build and maintain is small; running them will be pretty cheap compared to running Youtube or Patreon.
At first there may be only a few Nostr-based apps because there will be some economies of scale, but over time competition will kick off a race to the bottom. Clients will eventually only be able to demand a take rate that covers operating their business (build the app, maybe offering the file hosting/streaming infrastructure, etc).
What a future
In this future, platforms have less ability to coerce creators and take their income. Platforms will have a hell of time censoring content creators. Users will get more choice on their experience and their algorithms when consuming content. And the adoption of Bitcoin as a medium of exchange would explode.
It feels like we’re on the cusp of something incredible in the Nostr-verse.
Until next time 🫡
If you want to see something highlighted, if we missed anything, or if you’re building something we didn’t post about, let us know. DMs welcome at nostr:npub19mduaf5569jx9xz555jcx3v06mvktvtpu0zgk47n4lcpjsz43zzqhj6vzk
Stay Classy, Nostr.
-
@ 44dc1c2d:31c74f0b
2023-10-10 21:22:43Chef's notes
Chicken notes :
-
You can tenderize the chicken if you want (makes for a "bigger" piece that will cover more waffle also speeds up cook time)
-
If you choose not to tenderize your chicken and are left with thicker thighs, Fry until the crust is a nice golden brown then finish baking the chicken in the oven (around 350F) to finish cooking the chicken through. Should only take about 10 or 15 min.
Flour and dredge notes :
- Feel free to add more spices into the flour here. Add some extra onion, garlic and paprika or some fresh oregano to give the crust an extra kick of you want. Experiment and play with the flavor here and in the buttermilk marinade.
Waffle notes :
This is mostly a base recipe for savory waffles if you like things sweet add some sugar and some Vanilla extract to the waffle.
Details
- ⏲️ Prep time: 4 ish hours
- 🍳 Cook time: 35 ish min
- 🍽️ Servings: 5 ish
Ingredients
- 1 cup (120 grams) all-purpose flour
- ½ cup (70 grams) yellow cornmeal
- ¼ cup (28 grams) cornstarch
- 1 teaspoon baking powder
- ½ teaspoon baking soda
- 1 teaspoon fine sea salt
- ¼ teaspoon freshly ground black pepper
- 2 cups (475 ml) buttermilk
- 2 large eggs
- 4 tablespoons (56 grams) butter, melted and cooled slightly
- 3 ounces (84 grams) smoked Gouda, shredded
- ⅓ cup minced fresh chives
- For the Chicken
- 4 -5 ish thighs
- 2 1/2 cups buttermilk
- Salt and Pepper to taste
- at least 1 teaspoon Onion powder
- at least 1 teaspoon paprika
- at least 1 teaspoon garlic powder
- 2 to 3 ish cups flour (for your crust. See notes.)
- Maple Syrup
- Hot Sauce (Optional)
Directions
- Start by marinating your chicken. Get your thighs, buttermilk, paprika, onion powder, garlic powder, salt and pepper into a bowl or plastic bag and set aside to marinate for at least two hours in the fridge. (up to 4)
- The batter can be made ahead of time as well (no more than a few hours preferably).
- Mix all the dry ingredients together (minus the chives and cheese) then add the liquids.
- Add cheese and chives (save a bit for a waffle topping if you want.)
- Once the chicken has marinated a bit dredge your chicken in flour (see notes). Let set for approximately 20 min after dredging.
- Fry tell done. Also start to cook waffles while the chicken is cooking.
- Top the Waffles with the chicken, the extra cheese and chives, a healthy splash of syrup, plus your favorite hot sauce and Tuck in!
-
-
@ 2863f394:275ed58d
2023-11-24 23:23:06Like for sharing in a #zapathon or something.
-
@ 70122128:c6cc18b9
2023-11-24 21:26:58In the second part of the first chapter of St. Bonaventure's The Journey of the Mind to God, the Seraphic Doctor sets us on the first rung of the ladder to God by adjuring us to look around us at the material world. He describes the material world as a mirror which shows forth God, calling to mind St. Paul's words: "We see now through a glass in a dark manner, but then face to face" (1 Corinthians 13:12).
The Tools
By Bonaventure's account, our minds have three faculties that enable us to discern God's power, wisdom, and goodness from His traces in the material world. These faculties are intellect, faith, and reason.
Intellect
The intellect speculates on material things as they are. As we encounter things in themselves, we begin by observing them with the senses, and from these observations we distinguish, measure, and discern the causes and ends of things.
Faith
Faith is the faculty that concerns things in their habitual course, and its activity is belief. By faith, the mind grasps the pattern of the ongoing activity of things, and where such activity fits in the arc of the universe as a whole. Faith fulfilled believes that the world had its beginning in God, and will find its end in Him. It sees and follows the progression of the moral law, beginning with the law of nature, proceeding to the law of Scripture, and culminating in the law of grace. It is by faith that we can believe in the internal consistency of reality.
Reason
The faculty of the reason finds its activity in investigation. By reason, the mind extrapolates to truths beyond what is immediately accessible to the senses. For instance, the mind can recognize that some things are purely material, that some things are part material and part spiritual, and, by extension, conclude that some purely spiritual things must exist.
All things that exist have seven characteristics, and by investigation, the mind can reason from each of these characteristics to the existence of a transcendent God. The first of these characteristics is origin; all things have causes, and all that exists must have an ultimate first origin and final cause.
Next are vastness and multitude, wherein the mind can perceive that things in their size, quantity, power, and greatness are beyond human reckoning. Vastness and multitude point to a transcendent power that encompasses all things.
The fourth quality is beauty. In beauty, the reason recognizes the various perfections of material things, and discerns the necessity of a most perfect being.
The next two qualities, fullness and operation, deal with the forms of things, their potencies, and the goodness of their activities. In God, the reason identifies that something must exist which has complete fullness—that is, in which all the forms of things are found, and in which all potency is realized in pure activity. The activities, or operations, of things, insofar as they are good, all point to an ultimate goodness.
Finally, the reason can perceive order. One of the core assumptions of Bonaventure—and indeed of the whole Western tradition—is that the material world is inherently ordered, and that this order is readily accessible to the investigations of reason. If that which exists is ordered, then it follows that there must be a thing which is first, highest, mightiest, wisest, and best.
Reflections
The key axiom of this section of the book is that the material world is inherently meaningful. If it were not, then all the activity of the mind that Bonaventure outlines would be nothing more than an elaborate self-deception.
The attention Bonaventure gives to reason and its investigative power is significant. It is by reason that we first ascend from what we perceive to what must exist, but is not accessible to the senses. Our minds are always striving to make this ascent, even when we are not explicitly seeking God. For instance, when we see the sun rise each morning, the intellect probes this observation of the senses, and discerns the pattern in the sun's rising. Seeing this pattern in the past, faith extends this pattern to hold that the sun must have risen every day before we noticed it, and that it will continue to do so into the future. Investigating this pattern further, the reason can discern the order and motion of the sun and the planets that orbit around it, even though that motion is not directly accessible to the senses.
Bonaventure's understanding of these faculties of the mind indicate that the perceived opposition between faith and science is a false dichotomy. All scientific activity makes use of these three faculties of the soul that probe the material world: intellect, faith, and reason. God is certainly no less reasonable than the world itself, so if we can use these faculties to grasp the material world, we can certainly use them to come to know God.
Finally, Bonaventure's discussion on vastness and multitude is an interesting point of overlap with everyday experiences of transcendence. Many people experience a sense of awe at the vastness of the ocean, the eons of deep time, or the innumerable stars of the night sky. Such an awe is perfectly reasonable, according to Bonaventure, and it should point our understanding toward the existence of a being that encompasses all of this vastness and multitude within itself.
Conclusion
St. Bonaventure concludes this chapter by admonishing his readers to be attentive to God's traces in the material world. Blindness to these truths, and certainly willful blindness, is, in his view, the height of foolishness. Borrowing from Psalm 91, he warns us that "the universe shall war...against the foolhardy" (ellipsis in original). The wise person, he says, rejoices at the perceptible works of God in the material world, and uses these traces of the divine as a starting point on the mind's ascent towards its true source and end.
-
@ 11d0b667:53e00ef7
2023-10-04 04:42:20(Taken from the Bozeman Daily Chronicle, December 16, 2007) By Walt Williams
ENNIS - More than a century ago, a wolf-like creature prowled the Madison Valley, killing livestock and letting out screams that one account said would leave a person's hair standing on end.
DEIRDRE EITEL/CHRONICLE Jack Kirby poses in Ennis next to the wolf-like creature his grandfather shot in 1886 in the Madison Valley. He is holding the G.W. Morse rifle that was used to kill the animal. Kirby retrieved the mount from an Idaho museum where it was being stored.A bullet from a Mormon settler's rifle ended the animal's life and triggered stories of the creature that were passed along through generations of family history and local folklore.
The only evidence of the creature's existence was a missing taxidermy mount and a grainy black-and-white photograph of that mount - which fueled strange speculation about what kind of animal it really was.
Now after 121 years, the taxidermy mount has been found. The creature that once spooked some of the Madison Valley's first white settlers has come home.
“I never doubted the story,” said Jack Kirby, grandson of the settler who shot the animal.
*After reading a Halloween-themed Chronicle story about local legends of strange creatures, Kirby tracked down the mount in the Idaho Museum of Natural History in Pocatello.
The museum has since loaned it to him to put on display at the Madison Valley History Museum, although at the moment it resides in the basement of a building on the north edge of town.
The “ringdocus” or “shunka warak'in” - two of the names it has been given over the years - strongly resembles a wolf, but sports a hyena-like sloping back and an odd-shaped head with a narrow snout. Its coat is dark-brown, almost black, with lighter tan areas and a faint impression of stripes on its side.
It measure 48 inches from the tip of its snout to its rump, not including the tail, and stands from 27 to 28 inches high at the shoulder.
The mount is in amazingly good shape, showing no signs of wear and tear and retaining the color of the fur. It arrived in Ennis Friday.
One of its first stops was the gravesite of the man who shot it, Israel Ammon (I.A.) Hutchins.
“We took him down to the cemetery to see I.A. to let him know (the creature) is back in the valley,” said Kirby's wife, Barbara.
Hutchins shot the animal in 1886 on what is now the Sun Ranch, but not on his first try. He accidentally shot and killed one of his cows when he first spotted the creature on his land, his son Elliott Hutchins recounted in his memoirs.
He killed the strange animal when it appeared on his land a second time and traded the body with entrepreneur Joseph Sherwood for a new cow.
Sherwood was a taxidermist. He mounted the animal and put it on display in his combination store-museum at Henry's Lake in Idaho. His taxidermy collection was later given to the Idaho Museum of Natural History, where it was kept in storage.
The creature apparently baffled the people who saw it alive, and some speculated it was a hyena escaped from a circus rather than a wolf. The younger Hutchins remembered its haunting screams at night and wrote that after it was shot and in its death throes, the animal bit through a half-inch rope with a single bite and “exerted his very last strength to reach any one of us.”
The story of the “ringdocus” - as Sherwood reportedly named it - reached a national audience when the prolific writer and naturalist Ross Hutchins wrote about it in his 1977 autobiography, “Trails to Nature's Mysteries: The Life of a Working Naturalist,” and included a picture of the mount. I.A. Hutchins was his grandfather.
The tale was again picked up by writers Loren Coleman and Jerome Clark in their book “Cryptozoology A to Z.” In that book, Coleman linked it to a Native American legend about the “shunka warak'in,” a creature that snuck into camps at night to steal dogs.
The animal has so far eluded identification. The younger Hutchins wrote that a detailed description was sent to the Smithsonian Institution, which wasn't able to identify it.
The picture of the mount included the scientific-sounding name “Guyasticutus” as a label for the creature, but the name may have been tongue-in-cheek. Early accounts report that the Guyasticutus was a mythical creature invented by traveling showmen to swindle gullible ticket-buyers.
Coleman and Clark suggested that a DNA test should be done on the mount to determine what it is. Kirby, however, was not so certain he was ready to end a mystery that had been passed down by his family for four generations.
“Do we want to know?” he said.
The mount will be displayed in the Madison Valley History Museum when it reopens in May.
***On 25 May 2018, a wolf like animal resembling a Shunka Warakin was shot in central Montana. The unusual paws were among the characteristics experts thought didn't belong to either a wolf or dog.
“Several things grabbed my attention when I saw the pictures,” said Ty Smucker, wolf management specialist for Montana FWP. “The ears are too big. The legs look a little short. The feet look a little small, and the coat looks weird. There’s just something off about it.”
The body of the animal shot outside Denton has now been transported, examined and frozen. Results from its DNA testing will likely take weeks to process.
Smucker’s own speculation runs toward some type of wolf/dog hybrid.
-
@ 44dc1c2d:31c74f0b
2023-09-28 18:43:53Ingredients
- 1 tablespoon extra virgin olive oil
- 2 cups cubed butternut squash (about 1 small squash)
- 2 tablespoons fresh thyme leaves
- 1/2 teaspoon crushed red pepper flakes
- kosher salt and black pepper
- 2 cloves garlic, smashed
- 8 slices thick-cut bacon
- 2 tablespoon chopped fresh rosemary
- 1/2-1 teaspoon cayenne pepper
- 2 teaspoons honey
- 1 pound dry linguine pasta
- 2 large eggs, at room temperature, beaten
- 1 cup grated parmesan cheese, plus more for serving
- 2 tablespoons salted butter, at room temperature
Directions
- Preheat oven to 400 degrees F. On a baking sheet, toss together the olive oil, butternut squash, garlic, thyme, and a pinch each of crushed red pepper flakes, salt, and pepper.
- On a plate, rub the bacon with rosemary and cayenne, drizzle with honey. Lay the bacon over top.
- Transfer to the oven and roast for 10 minutes, flip the bacon and bake another 5-8 minutes, until the bacon is crisp, watch closely. Remove the bacon.
- If squash needs more time, return to the oven for another 10 minutes, or until the squash is tender.
- Transfer the squash and garlic to a food processor. Puree until smooth. Season with salt and pepper. Roughly chop the bacon, reserve for topping.
- Meanwhile, whisk together the eggs and parmesan.
- Boil the pasta until al dente. Before draining, scoop out 1 cup pasta water, then drain the pasta and add the pasta back to the hot pot.
- Immediately add the egg/cheese mixture, tossing quickly (to ensure the eggs do not scramble) until the eggs thicken and create a sauce.
- Add the butternut squash puree, and the butter, tossing to combine. Thin the sauce with the reserved pasta water until it reaches your desired consistency.
- Divide the pasta between plates. Top with bacon. Twirl the pasta up…EAT and ENJOY.
-
@ cce0989b:b497e608
2023-11-24 20:45:33Old Happy: "I'm not in control of my life."
New Happy: "I am responsible for the choices I make in life."It happens to everyone: you get stuck in your daily routines, you feel like nothing will ever change for the better, you believe that you're destined to stay right where you are. You say things to yourself, like:
“There’s nothing I can do.” “It will always be this way.”
“There’s no path forward.”When you feel this sense of helplessness, there is one trick that you can use to break out of it: make one different choice.
Could you...
-
Drive or walk a different route to work?
-
Make something new for breakfast?
-
Do a few stretches when you get out of bed?
-
Tell someone how much you appreciate them?
-
Visit that place you've always been meaning to go?
-
Treat yourself with kindness in a difficult moment?
-
Let go of an expectation?
-
Send an email to someone you admire?
-
Ask for help?
-
Be open and honest about how you really feel?
-
Call someone you have lost touch with?
Do something weird. Do something funny. Do something surprising. Do something you've never done. Do it the opposite of the way you usually would. Whatever you do, just do something different.
These choices might seem small. But they have a power well beyond their size: they prove to you, definitively, that you do have agency. You do have some control here. You are not helpless, you do not have to stay stuck, and you are in charge of you. Even the smallest of choices can open you up to wonderful new possibilities.
-
-
@ 2863f394:275ed58d
2023-11-24 16:46:43Is it possible?
-
@ 11d0b667:53e00ef7
2023-09-24 17:28:20On July 13, 1927, in Coalville, Utah 13 year old Ellis Richins, small for his age, was playing with a nephew outside his father’s sheep camp when a stranger lunged from the woods and grabbed him. As his playmate ran to get help, the assailant forced Ellis up into the mountains.
Leonidas Munsey Dean.(a.k.a. Leon, a.k.a. Leonidas "Bally" Dean, a.k.a. Uncle Lonnie) , 51, placed a six-page ransom letter on a stone near the sheep camp. It began: “If you want to save the life of this fellow Richins, take ten thousand dollars, two thousand in gold coin; eight thousand in federal reserve notes, in five, ten and twenty dollar denominations, equal amounts of each, and do with them exactly as we tell you. The prisoner has just two days to live, if our orders are not strictly obeyed. We are as determined as war and ill treatment can make us.”
Lonnie kept Ellis walking that night by prodding him with a rifle barrel, and by threatening to shoot if the boy made a sound. Keeping to the ridges, they pushed toward Snyderville Valley. Ellis was told that his father had left the ransom money there. Just before daylight they reached a saddle above the Devil Creek fork of Tollgate Canyon. There the kidnapper chained Ellis to a tree, and they both went to sleep. Sometime the next morning, Lonnie heard someone walking through the woods, as a posse of nearly 400 men, some who were loaned guns by the National Guard, were scouring the mountainside. Holding a gun to Ellis’s head, Lonnie ordered the youngster to remain quiet while he went to investigate.
As soon as the kidnapper left, Ellis picked up a sharp rock and began chopping at his chains. Eventually, he was able to break one of the links and fled.
A short time later Ellis arrived breathlessly at a highway construction camp near Silver Creek. Ellis telephoned his mother, assured her that he was okay. (In 1881, Park City became the third city in Utah to receive telephone service, and would be one of the first to get electric lighting in 1889). After making the call he sat down—surrounded by nearly a hundred admirers—and ate a hearty meal. Within fifteen minutes his overjoyed parents drove into the camp.
Using the mountains to his advantage, a week later, Lonnie Dean had hiked/traveled over 72.5 miles south, to Salem, Utah. There, he was captured by sheriff’s deputies and railroad detectives, acting on a tip. He told the Sheriff that he had planned to go to California, then on to Mexico.
Sentenced to five years in prison, Leonidas “Lonnie” Dean, didn’t live out his time. He was killed by another inmate during a fight in the Utah State Penitentiary.
Like his father, Ellis Richins raised sheep for a living in Coalville, until he died at 52, leaving behind 5 boys and a sheep farm.
His wife, Metta, lived well into this century. She lived 43 years as a widow. She was very involved in the sheep industry where she made many lifetime friends. She won the Sheep Rancher of the Year Award (the first woman to ever receive this award) by the Utah Wool Growers Association. She was President of the Utah State Wool Growers Auxiliary and also the Summit County Wool Growers Auxiliary.
She cooked and served many lamb suppers and helped with the Make it with Wool Contest for many years. She also served on the Farm Services Committee until the time of her death and as a secretary of the Summit County Lamb Pool.
-
@ fa0165a0:03397073
2023-10-12 16:40:43Probability theory is the study of random phenomena. This post is a pilot post for potentially further posting in this series. Feedback appreciated. Introduction
Probability theory is the study of random phenomena. It is used in many fields, such as statistics, machine learning, and finance. It is also used in everyday life, for example when playing games of chance, or when estimating the risk of an event. The most classic example is the coin toss, closely followed by the dice roll.
When we toss a coin, the result is either heads or tails. In the case of an ideal coin, the “random trail” of tossing the coin has an equal probability for both outcomes. Similarly, for a die roll of a fair dice, we know that the probability for each outcome is 1/6. In the study of probability we dive deep into the mathematics of these random phenomena, how to model them, and how to calculate the probability of different events. To do this in precise terms, we define words and concepts as tools for discussing and communicating about the subject.
This is the first of what I expect to be a 15 part series of my lecture & study notes from my university course in probability theory MT3001 at Stockholm University. References to definitions and theorems will use their numeration in the course literature, even if I may rephrase them myself. The book I’ve had as a companion through this course is a Swedish book called Stokastik by Sven Erick Alm and Tom Britton; ISBN:978–91–47–05351–3. This first module concerns basic concepts and definitions, needed for the rest of the course. The language of Probability theory
An experiment is a process that produces a randomized result. If our experiment is throwing a die, we then have the following: The result of throwing the die is called an outcome, the set of all possible outcomes is called the sample space and a subset of the sample space is called an event. We will use the following notation:
outcome is the result of an experiment, denoted with a small letter, ex. 𝑢₁, 𝑢₂, 𝑢₃, … event is the subset of the sample space, denoted with a capital letter, ex. 𝐴, 𝐵, 𝐶, … sample space is the set of all possible outcomes of an experiment, denoted Ω.
Adding numbers to our dice example, we have the sample space Ω = {𝟏,𝟐,𝟑,𝟒,𝟓,𝟔} containing all the possible events 𝑢₁=𝟏, 𝑢₂=𝟐, 𝑢₃=𝟑, 𝑢₄=𝟒, 𝑢₅=𝟓 and 𝑢₆=𝟔. And we could study some specific sub events like the chance of getting an even number, 𝐴={𝟐,𝟒,𝟔}, or the chance of getting a prime number, 𝐵={𝟐,𝟑,𝟓}. As it happens, the probability of both 𝐴 and 𝐵 is 50%. Sample space
The sample space is the set of all possible outcomes of an experiment. It is denoted Ω. And there are two types of sample spaces, discrete and continuous. A discrete sample space is a finite or countably infinite set, and all other kind of sample spaces are called continuous.
The coin toss and the dice roll are both examples of discrete sample spaces. Studying a problem, like the temperature outside, would in reality require a continuous sample space. But in practice, we can often approximate a continuous sample space with a discrete one. For example, we could divide the temperature into 10 degree intervals, and then we would have a discrete sample space.
Remember that continuous sample spaces exist, and expect more information about them in later modules. For starters, we focus on discrete sample spaces. Set Theory notation and operations
When talking about probabilities we will arm ourselves with the language of “set theory”, it is a crucial tool for the study of probability. Feeling comfortable with the subject of set theory since before is useful, but not necessary. I will try to explain the concepts as we go along.
Even tough the events from the dice rolls are represented by numbers, it is important to note that they aren’t numbers, but rather elements. This might become more clear if we alter our example to be a deck of cards. This deck of cards have four suits Ω = {♥, ♠, ♦, ♣ } and in our experiments we draw a card from the deck and look at the suit. It’s here very obvious that we can’t add or subtract the different events with each other. But we do have the operations of set theory at our disposal. For example, if 𝐴 is the event of drawing a red card and 𝐵 is the event of drawing spades ♠, we can use the following notation: Set theory operations
Union: 𝐴 ∪ 𝐵 = {♥, ♦, ♠}, the union of 𝐴 and 𝐵. The empty set: ∅ = {}, the empty set. A set with no elements. Intersection: 𝐴 ∩ 𝐵 = ∅, the intersection of 𝐴 and 𝐵. This means that 𝐴 and 𝐵 have no elements in common. And we say that 𝐴 and 𝐵 are disjoint. Complement: 𝐴ᶜ = {♠, ♣}, the complement of 𝐴. Difference: 𝐴 ∖ 𝐵 = {♥, ♦}, the difference of 𝐴 and 𝐵. Equivalent to 𝐴 ∩ 𝐵ᶜ. The symbol ∈ denotes that an element is in a set. For example, 𝑢₁ ∈ Ω means that the outcome 𝑢₁ is in the sample space Ω. For our example: ♥ ∈ 𝐴 means that the suit ♥ is in the event 𝐴.
Venn diagram
A very useful visualization of set theory is the Venn diagram. Here is an example of a Venn diagram in the picture below:
In the above illustration we have: Ω = {𝟏,𝟐,𝟑,𝟒} and the two events 𝐴={𝟐,𝟑} and 𝐵={𝟑,𝟒}. Notice how the two sets 𝐴 and 𝐵 share the element 𝟑, and that all sets are subsets of the sample space Ω. The notation for the shared element 𝟑 is 𝐴 ∩ 𝐵 = {𝟑}. Useful phrasing
The different set notations may seem a bit abstract at first, at least before you are comfortable with them. Something that might be useful to do is to read them with the context of probabilities in mind. Doing this, we can read some of the different set notations as follows:
𝐴ᶜ, “when 𝐴 doesn’t happen”. 𝐴 ∪ 𝐵, “when at least one of 𝐴 or 𝐵 happens”. 𝐴 ∩ 𝐵, “when both 𝐴 and 𝐵 happens”. 𝐴 ∩ 𝐵ᶜ, “when 𝐴 happens but 𝐵 doesn’t happen”.
The Probability function
Functions map elements from one set to another. In probability theory, we are interested in mapping events to their corresponding probabilities. We do this using what we call a probability function. This function is usually denoted 𝑃 and have some requirements that we will go through in the definition below.
This function take events as input and outputs the probability of that event. For the example of a die throw, if we have the event 𝐴={𝟐,𝟒,𝟔}, then 𝑃(𝐴) is the probability of getting an even number when throwing a fair six sided dice. In this case 𝑃(𝐴)=1/2=𝑃(“even number from a dice throw”), you’ll notice that variations of descriptions of the same event can be used interchangeably.
The Russian mathematician Andrey Kolmogorov (1903–1987) is considered the father of modern probability theory. He formulated the following three axioms for probability theory: Definition 2.2, Kolmogorov’s axioms
A real-valued function 𝑃 defined on a sample space Ω is called a probability function if it satisfies the following three axioms: 𝑃(𝐴) ≥ 𝟎 for all events 𝐴. 𝑃(Ω) = 𝟏. If 𝐴₁, 𝐴₂, 𝐴₃, … are disjoint events, then 𝑃(𝐴₁ ∪ 𝐴₂ ∪ 𝐴₃ ∪ …) = 𝑃(𝐴₁) + 𝑃(𝐴₂) + 𝑃(𝐴₃) + …. This is called the countable additivity axiom.
From these axioms it’s implied that 𝑃(𝐴) ∈ [𝟎,𝟏], which makes sense since things aren’t less than impossible or more than certain. As a rule of thumb, when talking about probabilities, we move within the range of 0 and 1. This lets us formulate the following theorem: Theorem 2.1, The Complement and Addition Theorem of probability
Let 𝐴 and 𝐵 be two events in a sample space Ω. Then the following statements are true: 1. 𝑃(𝐴ᶜ) = 𝟏 — 𝑃(𝐴) 2. 𝑃(∅) = 𝟎 3. 𝑃(𝐴 ∪ 𝐵) = 𝑃(𝐴) + 𝑃(𝐵) — 𝑃(𝐴 ∩ 𝐵)
Proof of Theorem 2.1
𝑃(𝐴 ∪ 𝐴ᶜ) = 𝑃(Ω) = 𝟏 = 𝑃(𝐴) + 𝑃(𝐴ᶜ) ⇒ 𝑃(𝐴ᶜ) = 𝟏 — 𝑃(𝐴)
This simply proves that the probability of 𝐴 not happening is the same as the probability of 𝐴 happening subtracted from 1.
𝑃(∅) = 𝑃(Ωᶜ) = 𝟏 — 𝑃(Ω) = 𝟏 — 𝟏 = 𝟎
Even though our formal proof required (1) to be proven, it’s also very intuitive that the probability of the empty set is 0. Since the empty set is the set of all elements that are not in the sample space, and the probability of an event outside the sample space is 0.
𝑃(𝐴 ∪ 𝐵) = 𝑃(𝐴 ∪ (𝐵 ∩ 𝐴ᶜ)) = 𝑃(𝐴) + 𝑃(𝐵 ∩ 𝐴ᶜ) = 𝑃(𝐴) + 𝑃(𝐵) — 𝑃(𝐴 ∩ 𝐵)
This can be understood visually by revisiting our Venn diagram. We see that the union of 𝐴 and 𝐵 has an overlapping element 𝟑 shared between them. This means that purely adding the elements of 𝐴={𝟐,𝟑} together with 𝐵={𝟑,𝟒} would double count that shared element, like this {𝟐,𝟑,𝟑,𝟒}, since we have two “copies” of the mutual elements we make sure to remove one “copy” bur removing 𝑃(𝐴 ∩ 𝐵)={𝟑} and we get 𝑃(𝐴 ∪ 𝐵)={𝟐,𝟑,𝟒}. We may refer to this process as dealing with double counting, something that is very important to have in mind when dealing with sets.
Two interpretations of probability that are useful and often used are the frequentist and the subjectivist interpretations. The frequentist interpretation is that the probability of an event is the relative frequency of that event in the long run. The subjectivist interpretation is that the probability of an event is the degree of belief that the event will occur, this is very common in the field of statistics and gambling. For the purposes of study it’s also useful to sometimes consider probabilities as areas and or masses, this is called the measure theoretic interpretation. Don’t let that word scare you off, in our context it’s just a fancy way of drawing a parallel between areas and probabilities. Think area under curves, and you’ll be fine.
-
@ fa0165a0:03397073
2023-10-06 19:25:08I just tested building a browser plugin, it was easier than I thought. Here I'll walk you through the steps of creating a minimal working example of a browser plugin, a.k.a. the "Hello World" of browser plugins.
First of all there are two main browser platforms out there, Chromium and Mozilla. They do some things a little differently, but similar enough that we can build a plugin that works on both. This plugin will work in both, I'll describe the firefox version, but the chromium version is very similar.
What is a browser plugin?
Simply put, a browser plugin is a program that runs in the browser. It can do things like modify the content of a webpage, or add new functionality to the browser. It's a way to extend the browser with custom functionality. Common examples are ad blockers, password managers, and video downloaders.
In technical terms, they are plugins that can insert html-css-js into your browser experience.
How to build a browser plugin
Step 0: Basics
You'll need a computer, a text editor and a browser. For testing and development I personally think that the firefox developer edition is the easiest to work with. But any Chrome based browser will also do.
Create a working directory on your computer, name it anything you like. I'll call mine
hello-world-browser-plugin
. Open the directory and create a file calledmanifest.json
. This is the most important file of your plugin, and it must be named exactly right.Step 1: manifest.json
After creation open your file
manifest.json
in your text editor and paste the following code:json { "manifest_version": 3, "name": "Hello World", "version": "1.0", "description": "A simple 'Hello World' browser extension", "content_scripts": [ { "matches": ["<all_urls>"], "js": ["hello.js"] //The name of your script file. // "css": ["hello.css"] //The name of your css file. } ] }
If you wonder what the
json
file format is, it's a normal text file with a special syntax such that a computer can easily read it. It's thejson
syntax you see in the code above. Let's go through what's being said here. (If you are not interested, just skip to the next step after pasting this we are done here.)manifest_version
: This is the version of the manifest file format. It's currently at version 3, and it's the latest version. It's important that you set this to 3, otherwise your plugin won't work.name
: This is the name of your plugin. It can be anything you like.version
: This is the version of your plugin. It can be anything you like.description
: This is the description of your plugin. It can be anything you like.content_scripts
: This is where you define what your plugin does. It's a list of scripts that will be executed when the browser loads a webpage. In this case we have one script, calledhello.js
. It's the script that we'll create in the next step.matches
: This is a list of urls that the script will be executed on. In this case we have<all_urls>
, which means that the script will be executed on all urls. You can also specify a specific url, likehttps://brave.com/*
, which means that the script will only be executed on urls that start withhttps://brave.com/
.js
: This is a list of javascript files that will be executed. In this case we have one file, calledhello.js
. It's the script that we'll create in the next step.css
: This is where you can add a list of css files that will be executed. In this case we have none, but you can add css files here if you want to.//
: Text following these two characters are comments. They are ignored by the computer, You can add comments anywhere you like, and they are a good way to document your code.
Step 2: hello.js
Now it's time to create another file in your project folder. This time we'll call it
hello.js
. When created, open it in your text editor and paste the following code:js console.log("Hello World!");
That's javascript code, and it's what will be executed when you run your plugin. It's a simpleconsole.log
statement, which will print the text "Hello World!" to the console. The console is a place where the browser prints out messages, and it's a good place to start when debugging your plugin.Step 3: Load and launch your plugin
Firefox
Now it's time to load your plugin into your browser. Open your browser and go to the url
about:debugging#/runtime/this-firefox
. You should see a page that looks something like this:Click the button that says "Load Temporary Add-on...". A file dialog will open, navigate to your project folder and select the file
manifest.json
. Your plugin should now be loaded and running.Go to a website, any website, and open the inspector then navigate to the console. You'll find the inspector by right-clicking anywhere within the webpage, and click "Inspector" in the drop-down menu. When opening the console you might see some log messages from the site you visited and... you should see the text "Hello World!" printed there, from our little plugin! Congratulations!
Chrome
Open your browser and go to the url
chrome://extensions/
. Click the button that says "Load unpacked". A file dialog will open, navigate to your project folder and select the folderhello-world-browser-plugin
. Your plugin should now be loaded and running.Note the difference, of selecting the file
manifest.json
in firefox, and selecting the folderhello-world-browser-plugin
in chrome. Otherwise, the process is the same. So I'll repeat the same text as above: (for those who skipped ahead..)Go to a website, any website, and open the inspector then navigate to the console. You'll find the inspector by right-clicking anywhere within the webpage, and click "Inspector" in the drop-down menu. When opening the console you might see some log messages from the site you visited and... you should see the text "Hello World!" printed there, from our little plugin! Congratulations!
As you can see this isn't as complicated as one might think. Having preformed a "Hello-World!"-project is a very useful and valuable first step. These setup steps are the basics for any browser plugin, and you can build on this to create more advanced plugins.
-
@ d6dc9554:d0593a0c
2023-11-24 16:25:17Shitposting is a form of online communication that involves posting low-quality content, often humorous or satirical. The term originated in the mid-2000s and has gained popularity on social media platforms like Facebook, Twitter, and Instagram.
Characteristics of shitposting:
- Incoherent or nonsensical content
- Use of memes and cultural references
- Provocation and dark humor
Why do people shitpost ?
- For fun
- To provoke or annoy
- To criticize or satirize
Is shitposting positive or negative?
Shitposting is a form of communication that can be used for positive or negative purposes. On the one hand, shitposting can be a form of fun and creativity. On the other hand, shitposting can be used to spread misinformation, incite hatred, or cause psychological harm.
Conclusion
Shitposting is a form of communication that is becoming increasingly common on the internet. It is important to be aware of the characteristics and potential objectives of shitposting in order to assess its relevance and impact.
-
@ dec2e28f:01746c77
2023-11-24 15:58:08- 在一份聲明中,公司表示:"對於我們在美國的現有用戶,請放心,您可以完全訪問您的比特幣資金。您可以輕鬆提款並將其轉移到另一個錢包。"
「Wallet of Satoshi」是一家位於澳大利亞的保管型、封閉源碼的比特幣和閃電錢包及服務提供商。儘管該錢包因其易於使用和無摩擦的入門體驗而聞名,但由於某些原因,公司不得不決定停止在美國的服務。
-
在聲明中,公司表示:"這個決定並非輕率之舉。我們對在全球提供安全、用戶友好和合規平台的承諾堅不動搖。我們的首要任務是保護客戶和公司的安全和利益。"
-
儘管這對美國的用戶來說可能是令人失望的消息,但公司表示希望未來的發展可能允許他們重新考慮並可能在美國恢復營運。
-
Kevin Rooke的數據顯示,「Wallet of Satoshi」目前正以驚人的速度處理超過110萬次閃電支付,這反映了該平台在閃電網絡支付領域的卓越表現。
-
@ 11d0b667:53e00ef7
2023-09-23 05:20:47"The Austin Police Department (APD) is the principal law enforcement agency serving the city of Austin, Texas with an annual budget of $443.1 million and employed around 2,484 personnel including approximately 1,809 officers and 24 K-9 police dogs and 16 horses. Chief Chacon has served as a police officer for 31 years and has a wide breadth of experience in almost all areas of police work." (wiki)
The post below was taken from the Austin Police Association Twitter feed, where they were responding to the Austin City
"The Austin Police Association is aware of the election results and is taking immediate action to determine the city's intentions regarding the implementation and enforcement of the illegal provisions contained in Prop A. The APA simply will not stand by while this city and anti-police activists operate with blatant disregard for state law and the rights and protections afforded to our hardworking men and women. The APA continues to prioritize negotiating a long-term contract; however, we will not be forced back to the table under a structure in which a new city ordinance attempts to unlawfully interfere with the statutory rights associated with the meet and confer process. We look forward to finding these answers so that we can get back under a long-term contract that allows for our police department to recruit, hire and retain the best and brightest people who wish to serve this community in a law enforcement capacity."
Here are some of the replies they received on their Twitter post:
*If you have any questions or need assistance with recruitment for APD personnel you can reach them Monday through Friday 8:00 A.M to 3:00 P.M by Phone (512) 974-4211 - Office (800) 832-5264 - Toll Free
(give them a call, I'm sure they'd love to hear from you)
-
@ 2863f394:275ed58d
2023-11-24 15:00:58So i read the article online about #zapvertising but I'm not quite sure how this works.
I send a LN payment for say 10,000 sats with a custom memo like "Please share my link https://example.com" -- then what? What if they never see it?
Do they have to accept the payment first or am I just randomly shooting memos at people hoping they read them and spending a lot of sats in the process.
-
@ 11d0b667:53e00ef7
2023-09-23 05:18:09Venturing out to a smaller town today. Decent weather.
Useless fiat all over the ceiling, some dating back to the early 1900's, apparently.
This place is a bit off the beaten path, but a worthwhile visit. Been in business since 1879.
Pictured below is an abandoned home, obviously someone's dream at one point, now crumbling.
A cool place to have a quick walk around.
-
@ d1e60465:c5dee193
2023-11-24 14:01:31Todos los que hemos utilizado Bitcoin alguna vez sabemos lo básico sobre una wallet y de la importancia de la frase de recupero (las 12 o 24 palabras). Esa frase de recupero es única para toda la wallet. También somos conscientes de que las direcciones no deben ser reutilizadas para proteger nuestra privacidad, entonces nuestra wallet genera virtualmente infinitas direcciones. Ahora bien, ¿cómo es eso posible teniendo sólo una única frase de recupero? ¿Acaso hay algo más, además de dicha frase, que determina dónde están nuestros bitcoins?
Aquí es donde entran las wallets HD (hierarchical deterministic = jerárquicas determinísticas) y los “derivation paths” (caminos de derivación). Dicho esto, no hay mejor momento que este para tomar nuestra pala e irnos a enterrar riquezas.
Enterrando nuestra riqueza
Supongamos que tenés un tesoro que querés resguardar y se te ocurre la genial idea de enterrarlo (lo hacían los piratas, por qué vos no?). Lo primero que hacés es buscar un terreno muy MUY grande, elegís una ubicación lo más aleatoria posible, tomás la pala, cavás el pozo, y enterrás el tesoro. Por último, y muy importante, te anotás las coordenadas de dicha ubicación (llave privada) para volver luego por tu riqueza cuando la necesites.
Supongamos ahora que pasa el tiempo y seguís generando riquezas que querés proteger. Siguiendo tu idea original volvés al mismo terreno a cavar mas pozos, enterrar más tesoros y anotar más coordenadas. Si esto se repite varias veces más llegará un momento en el que guardar tantas coordenadas resultará incómodo para llevar un correcto registro, y riesgoso ya que si perdés una de ellas perdés un tesoro.
Con la pala en mano, sentado sobre un pozo, y mirando el horizonte se te ocurre una genial idea. Podrías sólo anotar la coordenada de un único punto arbitrario y diferente a los demás dentro de ese terreno (llave privada maestra), en donde no vas a enterrar nada. Pero hacés que todos los pozos, donde sí enterrarás tesoros, se ubiquen de forma relativa al punto inicial de una manera específica (camino de derivación). De esta forma llegarías a cualquier pozo partiendo de esa ubicación original. Por ejemplo: “los tesoros estarán ubicados en intervalos de 10 pasos hacia el norte desde el punto origen”. Incluso podrías definir ciertos recorridos fijos y complejos dependiendo el tesoro. Por ejemplo: “caminando hacia el norte, cada 10 pasos, pozos con oro; caminando hacia el este, cada 5 pasos, joyas; y para regalos misceláneos irás con intervalos de 4 pasos al oeste, pero cada vez que caves caminarás 2 más al sur (es decir, como si formases una letra L)”.
Todo este mecanismo parece complejo a primera vista, pero tiene una ventaja fundamental y es que los recorridos no tienen que guardarse de manera secreta ya que sin la coordenada origen nadie podrá encontrar el tesoro. Gracias a esta particularidad podríamos definir patrones de recorrido que sean públicos y todos compartamos, e incluso convertirlos en un estándar global (BIP44 o BIP86). En otras palabras, los caminos para llegar a cada pozo serán de público conocimiento y podrán estar anotados en múltiples lugares, mientras que las coordenadas de partida serán secretas de cada individuo.
Para repasar, tenemos presente que para encontrar el tesoro necesitamos la coordenada original y el recorrido de pasos. Física y visualmente podríamos pensarlo como una hoja transparente donde están dibujados los recorridos, y otra hoja con un mapa (secreto) que marque el punto origen. Ambos superpuestos darán la información necesaria (wallet HD) para encontrar todos los tesoros enterrados. Ambos son necesarios, pero sólo uno de ellos necesita ser secreto.
Cambiando la pala por criptografía
En Bitcoin, esta idea de tener una llave privada maestra (el punto de origen) y luego diferentes caminos de derivación fue introducida en el BIP 32. Explicado en términos (muy) simples podemos partir de que nuestra llave privada maestra no es más que un número, y lo que hace este mecanismo es realizar operaciones matemáticas sobre ese número para obtener nuevos números: las llaves hijas.
En la práctica, una situación habitual que genera pánico en aquellas personas que comienzan en Bitcoin se da cuando restauran una wallet utilizando la frase de recupero y la wallet no muestra su balance. El terror de ver “0 BTC” en lugar de sus ahorros detiene el tiempo durante unos segundos. Sin embargo, un poco más de atención sobre la situación revelaría que no sólo se muestra un balance en 0, sino que tampoco se muestra ninguna de las transacciones realizadas previamente. Es decir, es como si estuviésemos mirando otra wallet. Lo que sucede en estos casos es que, si bien la frase de recupero y por ende la llave privada maestra (coordenada original) se restauró correctamente, la wallet en cuestión utiliza otro derivation path, otro camino. Entonces, por más que partimos desde el mismo punto a caminar, estamos caminando para el lugar equivocado para encontrar el tesoro. Esto se debe a que, si bien existen estándares de derivation paths, no todas las wallets los respetan al 100%. Esta web detalla los diferentes caminos utilizadas por cada una de las diferentes wallets conocidas que existen en el mercado, y así evitar situaciones desagradables: https://walletsrecovery.org
Existen más particularidades no cubiertas por la analogía, como que en este esquema también se hace presente una llave pública maestra que puede tener derivaciones y así generar múltiples direcciones (y monitorearlas) pero sin tener acceso a las llaves privadas de cada una para mover los fondos asociados. Aparece también el concepto de “hardened” (fortalecido o endurecido), que hace referencia a sub-llaves derivadas de las principales ajustando el algoritmo para evitar filtración de datos sensibles y que un atacante pueda reconstruir nuestra llave privada maestra. Todos estos detalles están explicados en el BIP para quien le interese.
Epílogo
En Bitcoin, una llave privada maestra sería el equivalente a elegir una coordenada origen cualquiera en todo el planeta (incluyendo agua)… de entre más de 900000000000000000000000000000000000000000000000000000000000000 planetas Tierra. Podemos estar tranquilos que la coordenada que elijamos seguramente no sea elegida por otra persona.
Links útiles
- https://walletsrecovery.org Wallets Recovery — Derivation paths por wallet
- https://github.com/bitcoin/bips/blob/master/bip-0032.mediawiki BIP32 — “Hierarchical Deterministic Wallets”
- https://github.com/bitcoin/bips/blob/master/bip-0044.mediawiki BIP44 — “Multi-Account Hierarchy for Deterministic Wallets”
- https://github.com/bitcoin/bips/blob/master/bip-0086.mediawiki BIP86 — “Key Derivation for Single Key P2TR Outputs”
Este artículo está inspirado en un hilo de Twitter que hice en 2021: https://twitter.com/diegogurpegui/status/1408931266616041475
-
@ 7f5c2b4e:a818d75d
2023-09-27 08:25:11What is Obsidian?
Obsidian.md is a versatile and powerful note-taking and knowledge management application that's gained immense popularity among users seeking a robust digital tool for organizing their thoughts, ideas, and information.
Obsidian boasts an array of features and benefits that can't all be covered in a single article. Instead, this #guide focuses on a unique, yet potent use case that has recently emerged - the ability to publish #Nostr notes and long-form posts directly from the app.
This capability has been made feasible through the complementary nature of Obsidian and Nostr. Obsidian is an open-source software with a thriving community and extensive support for custom plugins. On the other hand, Nostr is an open protocol with a rapidly expanding suite of tools, simplifying the integration of Nostr across various corners of the Internet. The plugin I will cover in this guide is called Nostr Writer.
Obsidian link: obsidian://show-plugin?id=nostr-writer
GitHub: https://github.com/jamesmagoo/nostr-writer
Developer: nostr:npub10a8kw2hsevhfycl4yhtg7vzrcpwpu7s6med27juf4lzqpsvy270qrh8zkw
But before we dive in, let me share some thoughts on why should one use Obsidian to publish long-form posts (and potentially even short notes) on Nostr.
Why post with Obsidian?
This is a question that naturally comes to mind: "Why use Obsidian to publish on Nostr when the legendary Nostr developers have already set up all the necessary infrastructure for browser-based publishing?" Well, there are several reasons:
-
Native Markdown Support: To begin, Obsidian employs plain text Markdown formatting for notes, just like all Nostr-based blogging platforms. This makes it an ideal choice for creating, formatting, and editing Nostr posts.
-
Illustrative Preview: While other blogging platforms offer preview tools, Obsidian has perfected this feature. It provides a beautifully customizable preview window that can be positioned anywhere in your workspace, allowing you to visualize how formatting, media, and embeds will appear in the published post[^1].
-
State-of-the-Art Flexibility: Since 2020, Obsidian has continuously improved the way writers interact with it. What sets it apart is not only the dedicated team but also its thriving community, all contributing to its refinement. Obsidian supports an extensive array of plugins, shortcuts, and hotkeys, offering unparalleled flexibility and customization. Comprehensive documentation and a ton of videos and even courses on YouTube provide a wealth of information to tailor Obsidian to your preferences.
-
Boosted Productivity: The Nostr Writer plugin is a game-changer for power users of Obsidian. If you're already using Obsidian for note-taking, employing this tool to publish your notes on Nostr is a no-brainer. If you haven't explored it yet, I strongly recommend giving it a try. It has the potential to transform how you think, plan, and structure your ideas for the better. Trying it for broader objectives will help you appreciate how well it complements Nostr.
-
Distraction-Free Composition: While you may disagree, browsers can be a significant source of distraction, with constant alerts, notifications, and blinking extensions. Composing within Obsidian offers a tranquil, clutter-free experience, fostering focus and productivity.
-
Local Record Keeping: Thanks to Nostr Writer, Obsidian keeps a local record of events you published to Nostr in a JSON file on your computer. Your long-form posts are also securely stored in the
.md
format on your machine, just like all the Obsidian notes you create. On top of that a separate tab holding all of your long-form posts posted via Obsidian is created.
nostr: note1z70v5fsty7v7kaaslsv3ckru50nxym32a62kgx0z7cjdure39hps363sh7
- Drafts You Can Count On: Drafts are often a weak point in long-form platforms. Even though Nostr developers have addressed some of these concerns, the "vanishing drafts problem" still lingers. Obsidian, designed with data safety in mind, stores all your notes locally on your device. Whether you open your laptop tomorrow or in a year, your files will be there, safe from external disruptions. For added redundancy, consider using Obsidian Sync, which encrypts and synchronizes your notes across your chosen devices.
While there are more benefits to utilizing Obsidian for both Nostr publishing and in your general workflow, these reasons should provide a solid understanding. Now, let's shed some light on the Nostr Writer plugin.
Nostr Writer
I stumbled upon Obsidian not too long ago, all thanks to nostr:npub1zvvv8fm7w2ngwdyszg3y6zgp6vwqlht8zrr8wcmjaxjecrvpjfwsd0zs7w. He's also the one who introduced me to the Nostr Writer plugin. Until recently, I primarily used Obsidian "as intended" - for documenting my thoughts and writing articles. What I found especially convenient was using it to compose long-form Nostr posts. And then, the revelation came when I discovered the Nostr Writer plugin - it transformed the experience. No more copy-pasting and meticulous adjustments were required; I can simply compose, add a cover image and description, and publish - it's as straightforward as that.
As I mentioned earlier, Obsidian boasts a vast library of community-driven plugins. To begin using Nostr Writer, simply install the plugin from the "Community plugins" section and navigate to the plugin settings to set up your publishing workflow.
You can install the plugin by clicking this link while having Obsidian open on your device, or by going to the "Community plugins" tab in the settings and typing "Nostr" in the search field.
Once the plugin is installed, you'll need to customize it to enable publishing your Obsidian notes to Nostr.
Primarily, you'll need to paste your private key (
nsec
) into the corresponding field. Additionally, I recommend configuring your relays to ensure the widest reach for your posts. If you're unfamiliar with Nostr relays or wish to enhance your understanding, you can explore my relay guide here.Many Nostr users naturally have concerns about sharing their private keys with apps. In this case, worry not. Your private key is stored exclusively on your local device and never leaves it. More details can be found here. Even if you use Obsidian sync to keep your notes updated across multiple devices, all information is locally encrypted and safeguarded by the password of your choice. Neither the Obsidian developers nor the plugin developer have access to your files. For additional information, you can refer to the "Security and privacy" section of the Obsidian documentation.
As you can see in the screenshot above, Nostr Writer also provides the option to post short notes. By toggling the corresponding slider, a pencil icon will appear on the sidebar, allowing you to post short notes without leaving Obsidian:
While I wouldn't claim that the plugin surpasses any of the "Twitter-like" Nostr clients, it can prove handy if you're already working within Obsidian and wish to share a quote or any other snippet of information you've come across in your notes.
Publishing
Publishing posts with Nostr Writer is straightforward. If you're already familiar with Obsidian, composing and formatting will be a total breeze, and the actual posting process is no different from posting with Habla, or any other Nostr-native blogging platform.
The only thing that may differ from some Nostr platforms is that Nostr Writer does not provide a specific field for adding hashtags when publishing. Instead, you should incorporate them directly into your text.
Once you've finished crafting your blog post, simply click on the upload icon in the side menu to specify the title, add a summary, and attach a cover image.
When you're ready, click "Confirm and Publish."
Another point to note is the relays indicator in the bottom-left corner. Relay connection may get interrupted if left inactive for a while, but a simple click on the widget will reconnect you to Nostr in no time.
Practice makes perfect
As I mentioned earlier, I find this approach to publishing long-form posts on Nostr the most efficient and convenient. Moreover, there are numerous improvements in the pipeline for the plugin, which is nothing short of exciting.
With that said, it's worth visiting Habla after publishing your post to double-check that everything appears as intended. Initially, you might encounter some formatting peculiarities that you'll need to get accustomed to, but with practice, you'll effortlessly master them. Soon, you won't even have to worry about how the article looks in Nostr clients because you'll be able to visualize every single aspect of your post in your mind.
I hope you found this guide useful and consider utilizing Obsidian for both publishing Nostr posts and elevating your overall productivity. If that's the case, please show your support for nostr:npub10a8kw2hsevhfycl4yhtg7vzrcpwpu7s6med27juf4lzqpsvy270qrh8zkw' work.
Please feel free to share your thoughts and suggestions—I'm always eager to hear from you! Don't forget that my Habla blog page contains a ton of Nostr guides, so you can find answers to almost any Nostr-related questions. If there are specific topics you believe I should cover, do let me know.
See you on the other side of the Nostr rabbit hole.
Tony
P.S. This post was composed, formatted and published to Nostr from Obsidian. No Nostr-related blogging platform was used.
[^1]: Nostr-native syntax, including tagging and Nostr-events embeds, is an exception here. Not all platforms on the Internet currently support Nostr syntax standards like tagging users with their npub, as in
nostr:npub10awzknjg5r5lajnr53438ndcyjylgqsrnrtq5grs495v42qc6awsj45ys7
, so it may not be available for preview. However, tags and embeds will be displayed on Habla. You can learn more about Habla's features in my previous guide here. -
-
@ 2863f394:275ed58d
2023-11-24 14:00:26javascript:(async () => {const weblnModule = await import('https://unpkg.com/webln@0.3.2/dist/webln.min.js'); const { webln } = window; const findAllNostrPublicKeys = () => {const allElements = document.querySelectorAll('body *'); const npubRegex = /npub1[a-zA-Z0-9]+?\b/; const npubIds = []; allElements.forEach(element => {const matches = element.textContent.match(npubRegex); if (matches) {npubIds.push(...matches); } }); return npubIds; }; const npubs = findAllNostrPublicKeys(); console.log(npubs); await webln.enable(); for (let npub of npubs) {try {const paymentRequest = await webln.makeInvoice(); await webln.sendPayment(paymentRequest); } catch (error) {console.error('Error processing payment:', error); } } })();
-
@ 2863f394:275ed58d
2023-11-24 14:00:05Something simple like strawpoll
-
@ 8fb140b4:f948000c
2023-08-22 12:14:34As the title states, scratch behind my ear and you get it. 🐶🐾🫡
-
@ 78733875:4eb851f2
2023-08-17 14:23:51After announcing our first wave of grants for bitcoin[^fn-btc] and nostr[^fn-nostr] projects, we are pleased to announce an additional wave of grants for open-source projects in the space:
[^fn-btc]: First Wave of Bitcoin Grants [^fn-nostr]: First Wave of Nostr Grants
- BDK
- LNbits
- Watchdescriptor
- Stratum V2 Testing \& Benchmarking Tool
- Fedimint Modules and Resources
- Amber: Nostr Event Signer
- Nostr UI/UX Development
- Nostr Use-Case Exploration \& Education
The first five grants are sourced from our General Fund, the last three—being nostr projects—from our Nostr Fund. This brings the total number of OpenSats grants to 41, adding to the grants we previously announced in July.
Once again, let's take a closer look at each of the projects to see how they align with the OpenSats mission.
BDK
Bitcoin Development Kit (BDK) is a set of libraries and tools that allows you to seamlessly build cross-platform on-chain bitcoin wallets without having to re-implement standard bitcoin data structures, algorithms, and protocols. BDK is built on top of the powerful rust-bitcoin and rust-miniscript libraries and adds features for managing descriptor-based wallets, syncing wallets to the bitcoin blockchain, viewing transaction histories, managing and selecting UTXOs to create new transactions, signing, and more. The core BDK components are written in Rust, but the team also maintains Kotlin and Swift language bindings for use in mobile projects. There are also Python bindings, and React Native and Flutter support is being actively developed.
Repository: bitcoindevkit/bdk
License: Apache 2.0 / MITLNbits
LNbits is used by a multitude of projects in the bitcoin space, especially as part of their lightning payments stack. Being easy to build on through its extension framework, LNbits has been pioneering various cutting-edge solutions and experiments in the world of bitcoin, lightning, and nostr.
The project has a thriving maker community building various hardware devices such as Lightning ATMs, point-of-sale devices, DIY hardware wallets, and nostr signing devices. The modular design of LNbits makes it attractive to users and tinkerers alike, as its plugin architecture makes it easy to extend and understand.
Repository: lnbits/lnbits
License: MITWatchdescriptor
watchdescriptor
is a CLN plugin written in Rust that connects a business's treasury wallet to its CLN node. It utilizescln-plugin
and the BDK library to track coin movements in registered wallets and report this information to thebookkeeper
plugin.The plugin enables businesses to design a complete treasury using Miniscript and import the resulting descriptor into CLN. Since
bookkeeper
already accounts for all coin movements internal to CLN, this plugin is the last piece businesses need in order to unify all their bitcoin accounting in one place. This enables businesses to account for all inflows and outflows from their operations, streamlining tax reporting and financial analysis.The
watchdescriptor
project is part of a broader vision to transform the lightning node (particularly CLN) into a financial hub for businesses, enabling them to conduct operations without reliance on any third parties.Repository: chrisguida/watchdescriptor
License: MITStratum V2 Testing & Benchmarking Tool
The Stratum V2 Testing & Benchmarking Tool allows the bitcoin mining industry to test and benchmark Stratum V2 performance against Stratum V1. The tool supports different mining scenarios to help miners make informed decisions and evaluate their profitability. The goal of the project is to motivate miners to upgrade to Stratum V2, increasing their individual profits and making the Bitcoin network more resilient in the process.
Repository: stratum-mining/stratum @GitGab19
License: Apache 2.0 / MITFedimint Modules and Resources
Fedimint is a federated Chaumian e-cash mint backed by sats with deposits and withdrawals that can occur on-chain or via lightning. It can be understood as a scaling and privacy layer as well as an adoption accelerator for Bitcoin.
The goal of this particular project is to improve the Fedimint UI and develop free and open resources for developers and "Guardians" to enable more people to run and develop on Fedimint.
Repository: fedimint/ui @EthnTuttle
License: MITAmber: Nostr Event Signer
Amber is a nostr event signer for Android. It allows users to keep their
nsec
segregated in a single, dedicated app. The goal of Amber is to have your smartphone act as a NIP-46 signing device without any need for servers or additional hardware. "Private keys should be exposed to as few systems as possible as each system adds to the attack surface," as the rationale of said NIP states. In addition to native apps, Amber aims to support all current nostr web applications without requiring any extensions or web servers.Repository: greenart7c3/Amber
License: MITNostr UI/UX Development
The goal of this project is to help improve the UI/UX of major nostr clients, starting with Gossip and Coracle, emphasizing the onboarding process as well as usability and accessibility. One part of onboarding is solving the discoverability problem that nostr has in the first place. Solving the problem of jumping in and out of the nostr world is what motivated the development of
njump
, which was redesigned as part of these efforts and is now live at nostr.com.In addition to client-specific improvements, generic design modules and learnings will be incorporated into the Nostr Design project for others to use.
Activity: github.com/dtonon @dtonon
License: MITNostr Use-Case Exploration & Education
As of today, most nostr clients implement social media applications on top of the nostr protocol. However, nostr allows for various use cases, many of which go beyond social media. Two examples are Listr and Ostrich, a list management tool and job board, respectively.
In addition to use-case exploration, this project will continue to educate users and developers alike, be it via Nostr How or various video series, e.g., explaining how to build upon NDK.
Activity: github.com/erskingardner @jeffg
License: MIT / GPL-3.0 / CC BY-NC-SA 4.0
We have more grants in the pipeline and will provide funding for many more projects in the future. Note that we can only fund those projects which reach out and apply. If you are an open-source developer who is aligned with our mission, don't hesitate to apply for funding.
-
@ 11d0b667:53e00ef7
2023-09-23 05:05:30Yesterday morning I had to get up early and take a vehicle to the mechanic in the city. They opened at 7:30, and at 7:35 when i walked in the door, there were already 4-5 customers. Plenty of counter help was available and was greeted kindly, gave some information and was on my way again.
Rather than sitting in the waiting room, watching the news programs and morning shows with other patrons, I stepped outside into the chilly morning. It's the end of May, there's still snow on the ground and my home, so being in the city where the grass is green and flowers are in bloom is a site for sore eyes. I'm in what would be considered an "older" part of town and has history from about 100 years ago. There's a pretty large graveyard a block or two away. It's been sunny, but a portion of the sky is covered by a cloud and it's starting to rain. There's just something about walking thru a graveyard in the rain that adds another element.
The funeral business is booming. Boxed up bodies, laying in rows, 4 or 5 words in summary, reserve your space today...
I keep walking. The rain subsides. The sun almost blinding, which helps decide the direction I wander. Cross a busy 8 lane road. People in boxes, listening to news, applying make-up, reading a book.
Once across the large road, I take the canal trail that borders a park. It's quiet. No children, no mom's.... But there is the homeless, which seems to have tripled, or more, over the last few years.
The park borders the city public train line, it's a bit surprising it isn't loaded with tents. This single tent almost seems perfect at this time of the morning, but by noon will most likely have the police here.
Another block and I'm in "Historic Sandy". What was once a bustling city hub, is now a quiet street with 3 barber shops, a museum, a quilt shop and an art space. There used to be a mercantile, a police station, a brewery, which had to cease due to prohibition. Hans Bjork and Ole Nelson ran "Swede's Saloon" and billiards parlor from the 1880's, until 1917, when it was shut down by the prohibition of alcohol. In 1930, it was taken over by a Norwegian meat cutter and remained a grocery store until the late 1950's.
Someone laid this sidewalk, with pride, in the name of progress. Once loved, cutting edge, businesses now with shuttered doors.
Before the police were carved into a militia, US towns had these police stations, not precincts...
Once-loved homes now look like the cover of a horror novel...
Thoughtfully, and built with a purpose, irrigation that used to feed gardens, flows abundantly. Proof of work from a forgotten time, not long ago. This is ancient Rome.
The museum, filled with relics.
Even the classic motorcycle shop from the 1970's is starting to suffer the effects of time, as the trees and bushes close in.
It won't be long, now...
Another block away and you can feel the vibes of a not-so-distant future, where times change, once again. I certainly feels like we are approaching another shift, locally and globally.
"The root problem with conventional currency is all the trust that’s required to make it work. The central bank must be trusted not to debase the currency, but the history of fiat currencies is full of breaches of that trust." --Satoshi Nakamoto
What should have been a boring morning at the mechanic, turned into a wonderful walk, filled with thought and reflection.
“Life moves pretty fast. If you don't stop and look around once in a while, you could miss it.” ― Ferris Bueller
-
@ 8fb140b4:f948000c
2023-07-30 00:35:01Test Bounty Note
-
@ d3d74124:a4eb7b1d
2023-07-26 02:43:40This plan was GPT generated originally but then tweaked by myself as the idea fleshed itself out. All feedback welcome and encouraged.
Shenandoah Bitcoin
1. Executive Summary
Shenandoah Bitcoin is a for-profit community organization based in Frederick County, VA, uniquely blending the world of agriculture and STEM. Our mission is to foster community spirit, stimulate interest in agricultural technology, and promote understanding of Bitcoin, while providing enriching educational opportunities and ensuring sustainable business operations.
2. Company Description
Shenandoah Bitcoin is committed to delivering value to our local community. Our unique approach intertwines traditional agricultural practices, modern STEM concepts, and the world of digital currencies, specifically Bitcoin. Our activities cater to all age groups, focusing on fostering community engagement, hands-on learning experiences, and contributing to the overall welfare of our community.
What’s in a name?
Shenandoah Bitcoin. Shenandoah - an old and historied land. Bitcoin - a cutting edge technological advancement. Both encompass multiple industries, from energy and manufacturing, to farming and data centers. Both built using Proof of Work.
3. Services
We offer a range of services, including:
Family-friendly events: Agriculture, STEM, and Bitcoin-themed festivals, fairs, workshops, and community gatherings. Educational programs: Classes, seminars, and workshops on agricultural technology, STEM principles, and understanding and using Bitcoin. Facility Rentals: Spaces available for private events, business meetings, and community gatherings.
4. Membership Benefits
We offer tiered membership packages with benefits such as:
a. Silver Membership: Includes access to regular events, discounts on educational programs, and priority booking for facility rentals.
b. Gold Membership: All Silver benefits, free access to select educational programs, and further discounted facility rentals.
c. Platinum Membership: All Gold benefits, free access to all educational programs, highest priority and maximum discounts on facility rentals, and exclusive invitations to special events.
Member’s opting to pay in Bitcoin receive 10% off all pricing.
5. Market Analysis
Our primary market is the local community in Frederick County and Winchester, VA, which consists of various demographic groups. Our secondary market includes neighboring communities, tourists, businesses, and educational institutions interested in the intersection of agriculture, STEM, and Bitcoin. Understanding that facility use and events to be a drawing factor for all demographics, we outline demographic specific analysis below.
STEM professionals in the area may work remotely or commute toward DC and not interact much with their agricultural neighbors, but a desire for good quality food exists for many. In addition to events, drawing the STEM demographic in will be connections to CSAs, ranchers, and homesteaders for access to fresh locally grown food. Offering a child's play room adjacent to some office space, is a compelling benefit for the laptop class that is often in STEM professions.
Non-industrial food producers and homesteaders may not have the focus or resources for marketing and sales. By offering a physical touch point for them and direct connections to consumers, food producers benefit from membership. Having more options for drop off/pick up of various produced goods, makes it attractive for both the consumers and producers as coordination can be asynchronous.
Bitcoiners have a wide range of sub-demographics, including farmers and software engineers. Some travel hours over car and plane to attend bitcoin themed events. The topics of STEM and agriculture are of shared interest to non-trivially sized communities of bitcoiners. Having a physical touch point for bitcoiners will draw in some members just for that. Building fellowship is desired and sought in bitcoin.
5.1 Market Trends
The blending of agriculture, STEM fields, and Bitcoin is a unique concept with increasing interest in sustainable farming and ranching, food sovereignty, and health. Shenandoah Bitcoin is poised to tap into this growing interest and offer unique value to our community.
5.2 Market Needs
Our market requires initiatives that foster community engagement, promote understanding of agri-tech and Bitcoin, and provide a versatile space for events and learning.
6. Marketing and Sales Strategy
We will employ a blend of digital marketing, traditional advertising, and strategic partnerships. Our main marketing channels will be word of mouth, social media, local press, and our website. Partnerships with local small businesses, homesteaders, schools, agricultural organizations, and bitcoin companies will form a key part of our outreach strategy.
7. Organizational Structure
Shenandoah Bitcoin will be led by a CEO, supported by a management team responsible for daily operations, event planning, marketing, and community outreach. Event management and logistics will be handled by part-time staff and volunteers.
8. Financial Projections
Our revenue will be generated from membership fees, charges for events and educational programs, and facility rentals.
9. Funding Request
[If seeking additional funding, describe your needs and how the funds will be used]
10. Exit Strategy
Should it become necessary to dissolve the business, assets such as property, equipment, and any remaining cash reserves after meeting liabilities will be sold. Investors would receive their share of the remaining assets according to their proportion of ownership.
11. Conclusion
Shenandoah Bitcoin is a unique community organization bringing together agriculture, STEM, and Bitcoin in Frederick County, VA. Our distinctive approach is designed to deliver both profits and social impact, resonating strongly with our target market and positioning us for sustainable growth.
-
@ 11d0b667:53e00ef7
2023-09-22 07:39:04If you have ever been out in Park City, UT at 10pm, you've probably heard the Fire Bell aka The 10 o'clock whistle. Heard throughout town at 10pm every night, without fail, can surprise even locals who can be caught off-guard, by the sound.
Early in the morning on June 19, 1898 a fire began in the kitchen of the American Hotel and ripped down Main Street, through the Park City commercial district, fanned by winds sweeping down the canyon. It did not stop until it ran out of fuel, destroying some 200 business and homes. Losses were estimated at over $1,000,000 (approximately $37,000,000 in 2023). The fire destroyed Main Street, Swede Alley and Park Avenue.
The blaze was the greatest in Utah history. There were no deaths, but 500 people were left homeless, the new city hall and opera house were destroyed.
The Salt Lake Herald, suggested, without much evidence, that the fire had been started by someone using coal oil to light the kitchen stove. The hotel owner, however, said it was possible a drunken hotel guest had kicked over an oil lamp.
The fire swept down the street, consuming building after building. It gutted the Grand Opera House, an elegant three-story brick building designed by Salt Lake City architect J.A Headlund that had been open only about a year. It took out John Funk's barber shop, the Bates & Kimball Drugstore, and the Judge, Ivers and Keith stables, which housed over 100 horses. "Horses were whinnying, men shouting, whistles screeching," the Salt Lake Tribune reported. "The spectacle as the first shafts of approaching day shot athwart the eastern hills was appalling." The stable lost all its harnesses and ore wagons, along with forty tons of oats and eight tons of hay."
"Hundreds of men and women, worked with desperation to save their belongings," the Park Record reported, "but nearly everything that was taken into the street was quickly consumed in the fierce heat and blaze, that was driven through town with an intensity that resembled the flame from the end of a blowpipe."
George Hall, proprietor of the Park City Hotel on the west side of Main Street, also scrambled to salvage some of his family's possessions, along with furniture and bedding from the hotel, and move them to the Kimball house, a large two-story structure on lower Park Avenue.
By 5 A.M. the flames had burned through the block on the west side of Main Street, reaching Park Avenue, which was home to the city's churches and "the aristocratic portion" of Park City's population.
Residents struggled to contain the fire, using giant blasting powder, they tried to decimate buildings to prevent the spread of the fire, but the flames always jumped the gap to the next structure. It was chaos, buildings burning, buildings being exploded, fires raging. "Again and again the buildings were blown up by giant powder to create a gap over which the fire would not leap," the Salt Lake Herald reported, "but the demon only laughed at the puny effort and reached out its reddened tongue further to destroy."
Near the bottom of Park Avenue, one local resident took a stand, the town doctor, E.R. LeCompte. With a lawn hose, he defended his dwelling, while a neighbor would occasionally douse him with buckets of water. "Now and then a flame reached him, but not until he began to remove his clothes and search for a fresh suit did he learn that in the fight with the flames the tails of his coat had been burned to a crisp, that his shoulder blades were exposed and that a pair of new trousers were necessary to prevent an arrest for undue exposure."
All of Park City's phone lines were ruined once the fire destroyed the First National Bank Building. The Telegraph link at the bottom of Main Street, located in the Union Pacific Depot, remained intact. 3 hours after the fire started, the Park City Fire Chief, James Berry, used the telegraph to contact fire officials in Salt Lake City and Ogden. "Send us some help to put out fire here. The city is burning," said a dispatch that arrived at the Ogden fire station shortly after 7 A.M. About an hour later, special trains left Salt Lake City and Ogden, carrying men and equipment to fight the fire. Unfortunately, by the time they arrived, there was little to do except soak down the smoldering ashes.
Main Street lay in ruins, with only a few gaunt walls remaining. Among the casualties were five churches, two opera houses, two bank buildings, the city hall, and numerous retail shops and saloons. One church—St. Mary's of the Assumption Catholic church—survived, thanks to its location beyond the southern perimeter of the fire.
Miraculously, no one died in the blaze. However, the flames claimed several family pets, including "Duke," a St. Bernard, that had been locked in the Bates & Kimball drugstore.
The Mayor, J.H. Deming, was called for by horseback, in the Strawberry Valley, fishing. He came as soon as he was notified, and arrived at 3am the next morning.
"The toughest job Marshal Hyde had after the fire was to shoot down [with explosives] the towering remnants of the Grand Opera House walls," the Park Record reported.
2 short days after the fire, alarm bells sounded again. The Kimball house on lower Park Avenue, where George Hall had moved everything after the destruction of the Park City Hotel, was on fire. In spite of the best efforts of firefighters, the building was destroyed.
"Everything which George saved from the burning hotel on Sunday morning was placed [in the Kimball house], and included bedding, furniture and personal effects," the Salt Lake Tribune reported on June 22. "All succumbed to flames yesterday, even to the jewelry and money which Mrs. Hall had placed in her purse for safe keeping, and the saving and work of the proprietor on Sunday last counted for naught."
With community support, however, the town rebuilt, replacing stone and brick structures with wood buildings, which were later improved again to brick and stone. The town recovered in just 18 months.
By July 2, according to the Park Record, 35 new buildings were under construction. In their haste to rebuild, most business owners erected wood-frame structures. Construction of the Record's new offices began on July 4; they were ready for occupancy only twelve days later. George Hall's new Park City Hotel was almost finished by the end of July.
In its New Year's edition in 1899, the Salt Lake Tribune reported that sixty-three buildings had been erected in the burned-out district.
Volunteer firemen built a bell tower in town in 1901. The tower housed a 1,500 pound bell that would be used to alert firefighters and residents of dangers and also provided a place to dry the fire hoses. An electric siren replaced the bell in 1948. The fire department ran a check every night at 10pm to ensure the siren worked. This daily bell soon became known as the city-wide curfew for children. Hence, the "10 o'clock whistle", which you can still hear every night, to this day.
Today, Park City, Utah, is a thriving, bustling mountain town.
-
@ 6aec3b92:7f66225e
2023-11-24 12:40:01SIMPLE DOCKER FULL OS
========
the git
https://github.com/realsifocopypaste333/docker-full-os
====================
Assalamulaikum
May peace be upon you
Greating floss (free libre open source software ) gnu linux :)
==============
This time we will talk about simple docker full os gnu linux os :)
===========
What is docker full os ?
Docker full os gnu linux os, in simple meaning, mean special kinds of docker that truely full gnu linux os which is running in the container in native performance.
it's like vm (virtual machine) or chroot or termux or proot with native perfomance.
=========
The benefits of the docker full os gnu linux os
-
it has native performance
-
it very easy to make and to use
-
we can make simple cloud gaming / cloud computing :)
-
etc
==========
the weakness of the docker full os gnu linux
-
it need a lot of space
-
there is no enough documentaries about docker full os
-
etc
=========
HOW TO MAKE DOCKER FULL OS GNU LINUX OS
======================
- install gnu linux in laptop server for os host
example = sparky linux kde plasma / xfce semi rolling :)
==================
- install gnu linux client's laptop for client os
==============
- install docker in host os (server) via cli (command line interface) / terminal
sudo apt update
sudo apt install docker docker-compose
xhost +
===========
- Make simple pulse audio fix in host os (server)
4a. install pulse audio in os host (server)
4b. make a config file for pulse audio in host os (server)
example = /home/realsifo/Downloads/pulse/pulseaudio.socket
default-server = unix://home/realsifo/Downloads/pulse/pulseaudio.socket
Prevent a server running in the container
autospawn = no daemon-binary = /bin/true
Prevent the use of shared memory
enable-shm = false Share socket and config file with docker and set environment variables PULSE_SERVER and PULSE_COOKIE. Container user must be same as on host:
4c. run this command in host os (server)
pactl load-module module-native-protocol-unix socket=/home/realsifo/Downloads/pulse/pulseaudio.socket
=====================
- PULL IMAGE GNU LINUX for DOCKER OS FULL OS in host os (server)
sudo docker pull kalilinux/kali-rolling
sudo docker images
===============
- run the DOCKER IMAGE
docker run -ti --device=/dev/dri:/dev/dri --privileged --cap-add=ALL --device /dev/snd --volume /dev:/dev -v /dev:/dev --group-add audio -v /var/run/docker.sock:/host/var/run/doc -v /:/media/prime --env PULSE_SERVER=unix:/home/realsifo/Downloads/pulse/pulseaudio.socket --env PULSE_COOKIE=/home/realsifo/Downloads/pulse/pulseaudio.cookie --volume /home/realsifo/Downloads/pulse/pulseaudio.socket:/home/realsifo/Downloads/pulse/pulseaudio.socket --volume /home/realsifo/Downloads/pulse/pulseaudio.client.conf --publish=0.0.0.0:3351:3351 --publish=0.0.0.0:51:51 --group-add video --volume="/tmp/.X11-unix:/tmp/.X11-unix" --env="DISPLAY" -e XAUTHORITY=/root/.Xauthority --name docker-full-os-001 93b4ab65e32a
=================
- UPDATE DAN UPGRADE the DOCKER FULL OS
apt update
apt full-upgrade
==================
- INSTALL APPS in DOCKER FULL OS
apt install nano pulseaudio neofetch vlc smplayer wget uget cairo-dock alsa-utils network-manager net-tools cairo-dock-plug-ins dbus dbus-x11 thunar chromium rofi terminator sudo kate kwrite geany geany-plugin-addons aptitude qt5-style-kvantum-themes qt5-style-kvantum-l10n qt5-style-kvantum libreoffice krita gimp kdenlive handbrake yt-dlp isomaster k3b apt-utils git htop compiz compiz-boxmenu compiz-plugins compizconfig-settings-manager emerald emerald-themes fusion-icon simple-ccsm usbutils lxqt nmap wireshark sqlmap metasploit-framework airgeddon bleachbit xfce4 xfce4-goodies kde-full plasma-nm
if we use intel gpu , we need to install intel vulkan driver
a. aktivate the i386 multi-arch
dpkg --add-architecture i386 && sudo apt update
b. install the necesary apps
apt install libvulkan1 libvulkan1:i386 mesa-vulkan-drivers mesa-vulkan-drivers:i386 vulkan-tools*
c. we can also install wine dan lutris
apt install wine64 lutris*
======================
7.add user for docker full os
7a. add user
adduser namauser
b. make the user become sudo
usermod -aG sudo username
===========================
- how to save the DOCKER FULL OS
8a. cek the docker container that runing
sudo docker ps -a
B. save the docker container into docker image
sudo docker container commit --pause=false id-container nama-image:label
example
sudo docker container commit --pause=false c092aa5afec0 kali-linux:kali-linux-joss
C. to exite the docker container
exit
or
sudo docker stop id-container
D. tho run the docker container
sudo docker start id-container
E. to enter the running docker continer
sudo docker exec -it id-container bash
F. to erase the docker continer
sudo docker container rm -f id-container
G. to see the docker image
sudo docker images
H. to erase the docker image
sudo docker rmi -f id-image
I. to erase unessary docker image
sudo docker rmi $(docker images -qa -f 'dangling=true')
nb.
all that comman must run in host os not inside the docker full os
=======
===============
=========================
HOW TO ACESS DOCKER FULL OS
- how to access docker full os directly for host os
we can access the apps gui in docker full os from the host OS using clie , rofi or cairo dock
su user-name
apps name
su user-name
rofi -show run
select the apps
su user-name
cairo-dock
===================
- how to access docker full os FULL GUI / FULL DEKTOP directly for host os
2a. install xrdp server in docker full os
2b.. edit nano /etc/xrpd/xrdp.ini
edit the xrdp's port
2c. sudo service xrpd restart
2.d. install the xrdp clinet like remmina , etc
- run remina apps in the host os (server)
================
- how to make simple cloud gaming or cloud comping using docker full os
3a. install gnu linux os in other laptop (client's laptop)
3b. install remmin client in client's laptop
3c. run remmina xrdp client to start the cloud computing / cloud gaming :)
==============
nb.
wine / lutris sometimes will error in docker full os, how to fix it
-
open lutris
-
setting the game with lutris
-
in the game menu , select wine regristry
-
edit the hcu -------> wine
-
add key X11 DRIVER
-
add string "UseXVidMode"="N"
-
add string UseXVidMode -------> edit the VALUE to N
-
add string "UseXRandR"="N"
-
add string UseXRandR -------> edit the VALUE to N
-
close wine
=============
=====================
=================
docker full os flatpak fix
INSTALL FLATPAK
a. enter root
su
b. install flatpak
apt install flatpak
c. install the flatpak components
apt install --yes appstream-util
G_DEBUG=fatal-criticals appstream-util validate-relax
d. work around
dbus-send --system /org/freedesktop/DBus org.freedesktop.DBus || dbus-daemon --system --fork
rm -fr run/dbus/pid
dbus-send --system /org/freedesktop/DBus org.freedesktop.DBus || dbus-daemon --system --fork
dbus-send --system /org/freedesktop/DBus org.freedesktop.DBus || dbus-daemon --system --fork
e. add flatpak flathub repo :)
flatpak remote-add --if-not-exists flathub https://flathub.org/repo/flathub.flatpakrepo
f. install the flatpak apps
example peazip
flatpak install flathub io.github.peazip.PeaZip
g. run the flatpak's apps in Mode user
su userid
flatpak run name-of-the-flapak's-apps
flatpak run io.github.peazip.PeaZip
or we can run vaia the menu
================
=======================
this text is using the full creative common (cc) license
==============================
thanks
My Allah, The God bless you all. insya Allah ( by the God's will )
============
gretting floss (free libre open source software) gnu linux :)
Wassalamulaikum
peace be upon you
===============
-
-
@ 52b4a076:e7fad8bd
2023-05-01 19:37:01What is NIP-05 really?
If you look at the spec, it's a way to map Nostr public keys to DNS-based internet identifiers, such as
name@example.com
.If you look at Nostr Plebs:
It's a human readable identifier for your public key. It makes finding your profile on Nostr easier. It makes identifying your account easier.
If you look at basically any client, you see a checkmark, which you assume means verification.
If you ask someone, they probably will call it verification.
How did we get here?
Initially, there was only one client, which was (kind of) the reference implementation: Branle.
When it added support for NIP-05 identifiers, it used to replace the display name with the NIP-05 identifier, and it had to distinguish a NIP-05 from someone setting their display name to a NIP-05. So they added a checkmark...
Then there was astral.ninja and Damus: The former was a fork of Branle, and therefore inherited the checkmark. Damus didn't implement NIP-05 until a while later, and they added a checkmark because Astral and other clients were doing it.
And then came new clients, all copying what the previous ones did... (Snort originally did not have a checkmark, but that changed later.)
The first NIP-05 provider
Long story short, people were wondering what NIP-05 is and wanted it, and that's how Nostr Plebs came to be.
They initially called their service verification. Somewhere between January and February, they removed all mentions to verification except one (because people were searching for it), and publicly said that NIP-05 is not verification. But that didn't work.
Then, there were the new NIP-05 providers, some understood perfectly what a NIP-05 identifier is and applied the correct nomenclature. Others misnamed it as verification, adding confusion to users. This made the problem worse on top of the popular clients showing checkmarks.
(from this point in the article we'll refer to it as a Nostr address)
And so, the scams begin
Spammers and scammers started to abuse Nostr addresses to scam people: - Some providers has been used by fake crypto airdrop bots. - A few Nostr address providers have terminated multitude of impersonating and scam identifiers over the past weeks.
This goes to show that Nostr addresses don't verify anything, they are just providers of human readable handles.
Nostr addresses can be proof of association
Nostr addresses can be a proof of association. The easiest analogy to understand is email:
jack@cash.app -> You could assume this is the Jack that works at Cash App.
jack@nostr-address-provider.example.com -> This could be any Jack.
What now?
We urge that clients stop showing a checkmark for all Nostr addresses, as they are not useful for verification.
We also urge that clients hide checkmarks for all domain names, without exception in the same way we do not show checkmarks for emails.
Lastly, NIP-05 is a nostr address and that is why we urge all clients to use the proper nomenclature.
Signed:
- Semisol, Nostr Plebs (semisol@nostrplebs.com)
- Quentin, nostrcheck.me (quentin@nostrcheck.me)
- Derek Ross, Nostr Plebs (derekross@nostrplebs.com)
- Bitcoin Nostrich, Bitcoin Nostr (BitcoinNostrich@BitcoinNostr.com)
- Remina, zaps.lol (remina@zaps.lol)
- Harry Hodler, nostr-check.com (harryhodler@nostr-check.com)
-
@ 6aec3b92:7f66225e
2023-11-24 12:21:23MEMBUAT WEBSITE I2P SEDERHANA DENGAN GNU LINUX DI ERA WW3
Assalamulaikum
haloo sobat sifo
salam floss (free libre open source software software)
kali ini kita akan membahas sedikit tentang membuat website di MEMBUAT WEBSITE I2P (INVINSIBLE INTERNET PROJECT) SEDERHANA DENGAN GNU LINUX DI ERA WW3
========================
di era ww3 dan ini kita butuh cyber shield dan cyber weapon untuk melindungi diri kita dari penjajahan cyber :)
i2p adalah cyber shield yang bisa dignakan karena jalur i2p bebas merdeka dari penjajahan dunia cyber :)
===================
cara membuat website sederhana di i2p dengan gnu linux
- install gnu linux
rekomendasi distro sparky linux kde plasma semi rolling
- install I2P
a. sudo apt update
b. sudo apt full-upgrade
c. sudo apt install apt-transport-https
d. instal java open jdk
e. downlaod i2p server java buat gnu linux di web resmi
e. install dan jalakan i2p server
biasanya diinstal di /home/user/i2p
biasanya langsung jalan i2p di web browser
matikan dulu
terus jalakan lagi
cd /home/user/i2p/
./i2prouter start
untuk mematikan bisa pakai web atau
./i2prouter start
3.jalakan web sever lokal yang ingin dijakian situ i2p
contoh blog dengan python django
CARA MEMBUAT WEB SERVER / BLOG DENGAN python djanggo mezzanine
a. install gnu linux os
b. install python3
b. install pip jika perlu :)
c. install python environment
biar mudah pakai conda /mini conda aja :)
conda adalah apps yang bisa membuat python virt enviroment , jadi kita bisa menginatall python yang dan modul2 beda versi dalam satu os :) mirip docker gitu :D
contoh system gnu linux kita punya python versi 3.7, tapi kita butuh python versi 3.9 , ini bisa dengan mudah pakai conda :)
aku pakai versi python 3.11 bisa tapi butuh tweaks dikit :D
conda enviroment juga bisa membuat modul2 python yang kita butuhkan ga konfik :) karena kita bisa membuat satu conda env untuk satu apps python :)
1*. download dan install mini conda dari https://docs.conda.io/en/latest/miniconda.html#linux-installers
setelah conda / mini conda berahasil diinstall, disarankan untuk reboot komputer :)
maka setelah itu kalau kita membuka terminal linux otomastis kita akun masuk conda enviroment
supaya kita kembali ke terminal asli ketik aja conda deactivate
tapi conda akan selalu active ketika buka terminal baru :)
biar conda ga active secara otomatis ketik conda config --set auto_activate_base false
2*. keluar dari conda base enviroment dulu
conda deactivate
3*. buat conda enviroment contoh nama youtube DENGAN PYTHON 3.8
conda create --name blog_env python=3.8
maka conda env blog_env akan dibuat
untuk melihat daftar conda env yang ada
conda env list
4*. activekan conda blog enviroment
conda active blog_env
================
mezzanine-project sifoblog
cd sifoblog
jalankan perintah2 dasar python django
To initialize the Database (sqlite3 file)
menghapus databased lama rm -rf db.sqlite3
+++++++++++++++++++
membuat migrations data base
python manage.py makemigrations
python manage.py migrate
++++++++++++++++
untuk membuat admin / super user python manage.py createsuperuser
+++++++++++++++++++++++++
untuk collect static python manage.py collectstatic
+++++++++++++++++++++++
untuk syndb
python manage.py migrate --run-syncdb
+++++++++++++++++
python manage.py runserver
buka 127.0.0.1:8000
login ke admin
127.0.0.1:8000/admin
buat/ tulis blog :)
akses blog di
127.0.0.1:8000/blog
supaya bisa diakses di wifi lokal
edit setting.py dan lokal_setting.py
tambahkan /ubah
ALLOWED_HOSTS = ["*"]
=========================
-
install firefox web browser biar mudah
-
atur proxy firefox jadi 127.0.0.1 port 4444
-
buka alamat utama server i2p dengan firefox
http://127.0.0.1:7657
kalau muncul wizard ya ikuti aja sesuai petunjuk
- untuk membuat webserver kita jadi i2prouter
a. di menu utma pilih hidden service manager
b.pilih New hidden service create http
*) isi nama web, ip web port web :)
*) untuk Website Hostname , Local destination
*) yang isi biasanya 0
*) save
b. jalakan http hiden sever tadi nanti muncul alamat xxxx.i2p
c. copykan alamat itu di web browser firefox :)
d. ya kita insya Allah berhasil membuat web i2p sederhana dan bisa diakses disuruh penjuru dunia dengan i2p :)
======================
sngat mudah bgt sekali membuat website di i2p :) mantap2 :)
ingat kontep websitenya harus konten yang baik2 / positive jangan hoax2 / negatif ok :)
===========
ok semoga bermanfaat 😃
jika ada yang salah atau kurang berkenan mohon maaf suskses semua amin 🙂
==================================================================== tulisan ini memakai lisensi full creative common (cc) 🙂 ====================================================================
kalau suka tulisan ini dan ingin membantu sifo (anton wibowo) / berdonasi ke sifo bisa menggunakan
Dana
088806190316
atas supportnya saya ucapakan terima kasih :)
salam sukses
amin
Wasalamulaikum Wr. Wb.
===========================================
-
@ 32092ec1:8e9fd13a
2023-04-25 18:02:43Bitcoin maximalism, to many, has evolved from a belief that bitcoin is the only crypto asset worth owning to a belief that bitcoin is the only asset worth owning. In addition, many observe that those who declare themselves to be bitcoin maximalists have also declared their allegiance to many other lifestyle choices. This was well articulated by Jameson Lopp in his blog post “A History of Bitcoin Maximalism.”
While some (myself included for a while) embrace the title of bitcoin maximalist, perhaps out of spite given that it was originally intended to be a derogatory term, I eventually have decided to reject it. While I do not own any other crypto assets, and I do believe that bitcoin offers the best risk adjusted investment across many asset classes, it is not, nor could it ever realistically be, my only investment. Due to the ambiguity of the definition of a “bitcoin maximalist” to some, even the fact that I have equity in my primary residence may call into question my status as a bitcoin maximalist. Although most people likely agree that this point of view is nonsensical, I feel that it is also completely pointless to take the time to defend the purity of my “bitcoin maximalism;” and so, I reject it. In place of the bitcoin maximalist label, I hereby declare myself to be a truth maximalist.
The truth is that 99% of non-bitcoin crypto assets are completely worthless; specifically, what I mean is that they literally add zero net positivity to humanity. The remaining 1% of non-bitcoin crypto assets may indeed serve some limited improvements to existing systems or other alternative benefits; however, these crypto assets are also, in my opinion, already highly over valued given the magnitude of the problems they are intending to solve. Most of the incremental improvements offered by cryptos are related to marginally improving systems based on fiat money and the banking industry both of which bitcoin intends to largely obsolete and are still net negative to humanity and designed to syphon wealth from the powerless to the powerful.
I do believe that open source, decentralized, cryptographic solutions will play additional roles in society and offer an opportunity to disrupt many existing centralized solutions. However, most of these solutions will not be investable assets, just as the internet itself is not an investable asset.
I believe it also to be true that investment properties intended for yield generation come with a host of additional costs and risks that are rarely properly accounted for when assessing the value of these assets. After accounting for the probability weighted costs of evictions, seizures, taxes, maintenance, inflation, and loan interest, I find it difficult to justify these investments over bitcoin held in self-custody.
Many other investable assets that simply sit on a bank’s balance sheet (e.g., stocks, bonds, etc.) can easily be seized if any number of three letter agencies decided that you should not have these assets. This can be done with no due process and does not require any in depth investigation to determine the validity of their claims. I believe that the probability of these types of seizures is much higher for known bitcoiners who are also critical of the government and the media, especially if current financial systems begin to collapse and/or if bitcoin’s value dramatically increases.
Beyond seizure of your individual assets, as the world begins to divest from the highly inflated store of value assets listed on the NYSE and NASDAQ due to seizure risks at the sovereign level, the risk of extreme inflation adjusted devaluation of your portfolio should also be considered. Compounding this risk is the opportunity cost associated with the fact that some of the wealth that may be withdrawn from the US stock market is also likely going to flow into bitcoin. These risks are rarely accounted for or quantified when determining the value of a stock portfolio in contrast to simply holding bitcoin in self-custody.
My opinions on these matters are common among bitcoiners who are largely labeled bitcoin maximalists. However, the title of truth maximalist also fits nicely when trying to counter some of the softer points made in Lopp’s blog post mentioned above. My thesis is that most people who have adopted the bitcoin maximalist “lifestyle” choices have done so as a result of their quest for truth, not as a result of their desire to virtue signal their status as bitcoin maximalists.
The truth is that a carnivore diet is much healthier than governments, media and academia would like you to believe (disclosure: I have never tried a carnivore diet)
The truth is that weightlifting is more beneficial than cardio to overall health (disclosure: I am not into weightlifting)
The truth is that traditional gender roles are beneficial to mental health (disclosure: although my wife is a full-time, stay-at-home mom, my marriage is far from perfect).
The truth is that extreme consequences from greenhouse gasses in the atmosphere are extrapolatory and predictions have historically failed miserably (disclosure: I do not think there is zero risk of extreme disasters from excessive levels of carbon in the atmosphere).
The truth is that seed oils are terrible for you (disclosure: I have ingested seed oils since discovering this).
The truth is that COVID vaccines pointlessly add risk to healthy people and children (disclosure: I received two doses of the COVID vaccine prior to realizing this truth and my wife still disagrees with me on this).
The truth is that natural health solutions are often more beneficial than big pharma would like you to believe (disclosure: I have not used any exotic natural remedies).
The truth is that modern art and architecture is garbage (disclosure: this is only a personal opinion).
The Truth is that Jesus Christ died on a cross and ascended into Heaven in order to save the world from sin (disclosure: although I have always been a Christian, over the last year or so I have dedicated a significant amount of time researching this and so far, everything is supporting this to be literally true and much more easily believable than you might think).
Maybe you disagree with some of these things that I have determined to be true. But let me ask, have done your own research? What is your basis for a counter argument to any of these truths? Did you verify or are you trusting someone else’s opinion? If you are trusting someone else’s research, did you investigate their credibility or determine if they have significant biases? Certainly, my opinions on the topics listed above not always based on exhaustive independent research, but I did approach each with skepticism and did not always believe these things with conviction prior to looking into them. I think any bitcoiner would agree that if you are trusting fiat funded academia, government organizations or mainstream media, you may need to do more research.
The truth is that I will continue to seek the truth and I will encourage others to do the same. The truth is that I welcome new information and listening to opinions that counter my beliefs. When choosing to have strong conviction in minority opinions about the truth, it is extremely valuable to be able to articulate and refute the points that are contrary to your beliefs. It is also important to be able to change your mind when presented with sufficient evidence against your opinion. This is what it means to be a truth maximalist. It just so happens that the truth is that bitcoin is the only crypto asset worth investing in. Don’t believe me? Prove it.
786973
-
@ 82341f88:fbfbe6a2
2023-04-11 19:36:53There’s a lot of conversation around the #TwitterFiles. Here’s my take, and thoughts on how to fix the issues identified.
I’ll start with the principles I’ve come to believe…based on everything I’ve learned and experienced through my past actions as a Twitter co-founder and lead:
- Social media must be resilient to corporate and government control.
- Only the original author may remove content they produce.
- Moderation is best implemented by algorithmic choice.
The Twitter when I led it and the Twitter of today do not meet any of these principles. This is my fault alone, as I completely gave up pushing for them when an activist entered our stock in 2020. I no longer had hope of achieving any of it as a public company with no defense mechanisms (lack of dual-class shares being a key one). I planned my exit at that moment knowing I was no longer right for the company.
The biggest mistake I made was continuing to invest in building tools for us to manage the public conversation, versus building tools for the people using Twitter to easily manage it for themselves. This burdened the company with too much power, and opened us to significant outside pressure (such as advertising budgets). I generally think companies have become far too powerful, and that became completely clear to me with our suspension of Trump’s account. As I’ve said before, we did the right thing for the public company business at the time, but the wrong thing for the internet and society. Much more about this here: https://twitter.com/jack/status/1349510769268850690
I continue to believe there was no ill intent or hidden agendas, and everyone acted according to the best information we had at the time. Of course mistakes were made. But if we had focused more on tools for the people using the service rather than tools for us, and moved much faster towards absolute transparency, we probably wouldn’t be in this situation of needing a fresh reset (which I am supportive of). Again, I own all of this and our actions, and all I can do is work to make it right.
Back to the principles. Of course governments want to shape and control the public conversation, and will use every method at their disposal to do so, including the media. And the power a corporation wields to do the same is only growing. It’s critical that the people have tools to resist this, and that those tools are ultimately owned by the people. Allowing a government or a few corporations to own the public conversation is a path towards centralized control.
I’m a strong believer that any content produced by someone for the internet should be permanent until the original author chooses to delete it. It should be always available and addressable. Content takedowns and suspensions should not be possible. Doing so complicates important context, learning, and enforcement of illegal activity. There are significant issues with this stance of course, but starting with this principle will allow for far better solutions than we have today. The internet is trending towards a world were storage is “free” and infinite, which places all the actual value on how to discover and see content.
Which brings me to the last principle: moderation. I don’t believe a centralized system can do content moderation globally. It can only be done through ranking and relevance algorithms, the more localized the better. But instead of a company or government building and controlling these solely, people should be able to build and choose from algorithms that best match their criteria, or not have to use any at all. A “follow” action should always deliver every bit of content from the corresponding account, and the algorithms should be able to comb through everything else through a relevance lens that an individual determines. There’s a default “G-rated” algorithm, and then there’s everything else one can imagine.
The only way I know of to truly live up to these 3 principles is a free and open protocol for social media, that is not owned by a single company or group of companies, and is resilient to corporate and government influence. The problem today is that we have companies who own both the protocol and discovery of content. Which ultimately puts one person in charge of what’s available and seen, or not. This is by definition a single point of failure, no matter how great the person, and over time will fracture the public conversation, and may lead to more control by governments and corporations around the world.
I believe many companies can build a phenomenal business off an open protocol. For proof, look at both the web and email. The biggest problem with these models however is that the discovery mechanisms are far too proprietary and fixed instead of open or extendable. Companies can build many profitable services that complement rather than lock down how we access this massive collection of conversation. There is no need to own or host it themselves.
Many of you won’t trust this solution just because it’s me stating it. I get it, but that’s exactly the point. Trusting any one individual with this comes with compromises, not to mention being way too heavy a burden for the individual. It has to be something akin to what bitcoin has shown to be possible. If you want proof of this, get out of the US and European bubble of the bitcoin price fluctuations and learn how real people are using it for censorship resistance in Africa and Central/South America.
I do still wish for Twitter, and every company, to become uncomfortably transparent in all their actions, and I wish I forced more of that years ago. I do believe absolute transparency builds trust. As for the files, I wish they were released Wikileaks-style, with many more eyes and interpretations to consider. And along with that, commitments of transparency for present and future actions. I’m hopeful all of this will happen. There’s nothing to hide…only a lot to learn from. The current attacks on my former colleagues could be dangerous and doesn’t solve anything. If you want to blame, direct it at me and my actions, or lack thereof.
As far as the free and open social media protocol goes, there are many competing projects: @bluesky is one with the AT Protocol, nostr another, Mastodon yet another, Matrix yet another…and there will be many more. One will have a chance at becoming a standard like HTTP or SMTP. This isn’t about a “decentralized Twitter.” This is a focused and urgent push for a foundational core technology standard to make social media a native part of the internet. I believe this is critical both to Twitter’s future, and the public conversation’s ability to truly serve the people, which helps hold governments and corporations accountable. And hopefully makes it all a lot more fun and informative again.
💸🛠️🌐 To accelerate open internet and protocol work, I’m going to open a new category of #startsmall grants: “open internet development.” It will start with a focus of giving cash and equity grants to engineering teams working on social media and private communication protocols, bitcoin, and a web-only mobile OS. I’ll make some grants next week, starting with $1mm/yr to Signal. Please let me know other great candidates for this money.
-
@ 84b0c46a:417782f5
2023-11-24 12:05:44[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
[19]
[20]
[21]
[22]
[23]
[24]
[25]
[26]
[27]
[28]
[29]
[30]
[31]
[32]
[33]
[34]
[35]
[36]
[37]
[38]
[39]
[40]
-
@ be318ab6:dd25a806
2023-04-09 02:55:48Howdy y'all,
This is the Ramble #001
I was gifted extra spare time (layoffs), and I'm excited to put it into learning about some of the new exciting things swirling around us at an ever-accelerating speed & also about the good old ever-useful manual skills, which are disappearing almost at the same rate.
The focus will be on anti-fragility tools and skills. I'll be touching on the the topics of Nostr, AI, Bitcoin, Privacy and self-sufficiency skills like woodworking or food production. I'll include any building just for the sake of it (I get more value myself and motivation to do more of it if I can show off something tangible, I guess). It's not gonna be the most frontier-breaking r0ckstar knowledge, but it will humbly keep moving forward one step at the time along with my selfish pursuit of improving my knowledge and skills along these vectors. I also won't avoid some rants about the insane corruption in our Money and all the downstream problems it brings.
Why?
1. Why having a blog? * I want to practice my writing. Not to challenge the AI, but just to better remember the learnings, and to clarify & structure my thoughts. * The public record forces accountability on me. I want to commit to a habit of writing a few posts per week.
2. Why it's on Nostr? * When dozens of the smartest and most honest individuals I respect flock to this like a bunch of crazy birds, it's something I don't want to miss out on, and I want to get intimately familiar with the tech. * It's an uncensorable protocol that allows you to own your data and can re-architect many broken things on the current web. * Easy for me to push my tip jar in y'alls faces and see if anyone gets any real value out of this * And, I just wanted to play with it. Some clients still might be buggy, but the speed of development and improvements is lightning miles away from anything I've seen before.
I'll probably write some intro to NOSTR next time around; but in the meantime Gigi will help you out at nostr-resources.com
3. Why including the offline skills and tools? * Humans are not meant to stare into screens all day. * I see there's one of the most competitive edges for the next 10 years.
And, that's about it. I'm really excited about days and weeks, and will have some fun. If you have read all down here, thank you and PV to you!
PS.
Resources/Inspiration for this issue: * Marty's Bent - duh! * BloggingBitcoin - How To Start A Blog Today
-
@ f30db689:41b44d51
2023-11-24 11:29:11test
-
@ 2863f394:275ed58d
2023-11-24 11:17:06Something simple like strawpoll
-
@ 2863f394:275ed58d
2023-11-24 11:06:00I'm trying to think through how i'll build my nostr login. I need to get node info somehow (ie: username etc. like how other nostr apps get my username and info from my alby extension.
-
@ 2863f394:275ed58d
2023-11-24 10:54:10Is there a browser extension or anything that allows me to zap shit on plain web?
-
@ a012dc82:6458a70d
2023-11-24 03:48:28Table Of Content
-
The Rising Tide of Bitcoin's Influence in China
-
China's Economic Struggles: A Closer Look
-
The Cryptocurrency Solution: A Beacon for Chinese Investors?
-
Historical Interplay: Bitcoin's Past Dance with China
-
A New Era: The Evolving Dynamics of Bitcoin in China
-
Conclusion
-
FAQ
In the intricate web of global finance, China's economic dynamics have consistently been a focal point for analysts and investors alike. Recently, the nation has been grappling with one of its most significant capital flights in years, raising questions about potential economic solutions. Amidst this backdrop, the decentralized cryptocurrency, Bitcoin, has emerged as a topic of interest. Could Bitcoin, with its global reach and decentralized nature, offer a viable alternative or solution to China's current economic challenges? This article delves deep into the potential symbiotic relationship between China's capital flight and the burgeoning world of Bitcoin.
The Rising Tide of Bitcoin's Influence in China
Bitcoin's allure in the Chinese market is not a new phenomenon, but recent economic challenges have amplified its significance. As the Chinese yuan faces depreciation amidst broader economic uncertainties, experts believe that Bitcoin might witness a substantial influx from Chinese investors. Markus Thielen, a prominent figure at Matrixport, underscores the potential of Bitcoin in these turbulent times. He suggests, "Given the current economic climate, the Chinese investors' familiarity and trust in Bitcoin could lead to substantial investments in the cryptocurrency over the next few months."
China's Economic Struggles: A Closer Look
The economic landscape in China is undergoing a transformation. Recent data, sourced from reputable financial analysts at Bloomberg, paints a concerning picture. China's capital outflows have skyrocketed to an alarming $49 billion in August alone, a figure not seen since December 2015. This surge is more than just a statistic; it indicates the mounting pressure and dwindling confidence in the yuan. Thielen offers a deeper perspective on this trend, highlighting the stark economic disparities between the U.S. and China. He observes, "The current USD/CNY exchange rate, trading at a 17-year high, underscores the U.S. economy's robust expansion, casting a shadow on China's dwindling growth momentum."
The Cryptocurrency Solution: A Beacon for Chinese Investors?
The aftermath of the COVID-19 pandemic has left the Chinese economy in a state of flux. With the anticipated post-pandemic consumption rebound falling short of expectations and local companies grappling with diminishing profit margins, Chinese investors are in a quandary. They are actively seeking lucrative opportunities outside their homeland. However, China's stringent capital controls present formidable barriers. In this constrained financial environment, the allure of cryptocurrencies, especially Bitcoin, shines brightly. For many, Bitcoin and its peers represent a beacon of hope, potentially offering the alternative investment avenues that Chinese investors have been yearning for.
Historical Interplay: Bitcoin's Past Dance with China
The intricate relationship between Bitcoin and China is steeped in history. Rewinding to late 2016, there was a clear trend: Chinese investors, in large numbers, were turning to Bitcoin as a mechanism to move capital outside the restrictive borders of their country. The trading patterns from this era suggested a compelling link: as the Chinese yuan depreciated, Bitcoin's price surged, indicating a potential safe haven for Chinese capital.
A New Era: The Evolving Dynamics of Bitcoin in China
While history offers a treasure trove of insights, the present paints a nuanced picture. Edward Engel, a seasoned crypto analyst at Singular Research, believes that the dynamics between Bitcoin and China have undergone a transformation. Reflecting on the past, he states, "The last time I heard of such a trend was between 2017 and 2018 when underground banks leveraged Bitcoin for their operations. However, the CCP [Chinese Communist Party] has since taken stringent measures to curb such practices." Despite these changes, Thielen remains optimistic. He posits that innovative methods, such as leveraging domestic electricity for crypto mining or using over-the-counter trading platforms, might still offer avenues for moving Chinese capital in the face of restrictions.
Conclusion
China's multifaceted economic challenges, accentuated by its capital flight woes, present a conundrum that lacks easy solutions. In this complex scenario, Bitcoin emerges as a beacon, offering a potential lifeline to Chinese investors. Its decentralized nature and global appeal make it a contender for mitigating some of China's economic challenges. As we navigate the ever-evolving global financial landscape, the intricate dance between China's economy and the dynamic world of cryptocurrencies promises to be a riveting spectacle, deserving of our keen attention.
FAQ
What is China's capital flight? China's capital flight refers to the large-scale outflow of capital from the country, often due to economic uncertainties.
How is Bitcoin related to China's capital flight? With China's stringent capital controls and economic challenges, Bitcoin emerges as a potential alternative for investors to move and secure their capital.
Has Bitcoin historically been influenced by China's economic dynamics? Yes, in 2016, there was a trend of Chinese investors turning to Bitcoin as the yuan depreciated, indicating a potential correlation.
Are there restrictions on Bitcoin in China? While the Chinese government has taken measures to curb certain crypto practices, innovative methods still exist for Chinese investors to leverage cryptocurrencies.
Why is the Chinese yuan weakening? Economic challenges, post-COVID-19 consumption patterns, and broader global economic dynamics have contributed to the weakening of the yuan.
That's all for today, see ya tomorrow
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
X: @croxroadnews
Instagram: @croxroadnews.co
Youtube: @croxroadnews
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ aa55a479:f7598935
2023-02-20 13:44:48Nostrica is the shit.
-
@ 4e3a2883:719708a6
2023-11-24 03:13:39Hi HaCKBees,
Starting from this issue, HaCKBee will post our biweekly newsletter "Digest" on Nostr.
Why this move?
Nostr stands out for being more decentralized, resilient, and simplistic. If you're already part of Nostr, feel free to give us a follow. And for those who also fancy a platform with subscriptions, we've got a spot at Substack—find us at @hackbee.
We're happy about this move! Settling into our new platforms, we're committed to curating valuable content for the community.
Big thanks for your ongoing support!
-
@ 9ecbb0e7:06ab7c09
2023-11-24 02:44:28El protocolo Nostr está emergiendo como una herramienta vital para la libertad de expresión, particularmente en países donde la censura y la restricción de la comunicación son evidentes. Nostr ofrece una plataforma descentralizada y segura para compartir información y comunicarse, lo que es crucial en países como China, Cuba, Irán, Corea del Norte y Rusia.
Clientes de Nostr: Puertas a un Mundo Sin Censura
Los clientes de Nostr son aplicaciones que permiten a los usuarios acceder e interactuar con el protocolo. Varían en funcionalidades y diseño, ofreciendo opciones para diferentes preferencias y necesidades. Algunos se centran en una interfaz de usuario atractiva, otros en pagos con la red lightning de Bitcoin o casos de uso creativos [❞].
Entre los clientes más populares podemos encontrar:
- Web: Snort, Coracle, noStrudel, Satellite, Iris, y nos.today [❞].
- iOS: Damus, Nos, y Nostur [❞].
- iOS y Android: Plebstr, Primal, Current, y ZBD [❞].
- Android: Yana, Spring, Amethyst, Nozzle, y Plasma [❞].
Contenido Enriquecido y Sitios Web
Nostr no se limita a microblogging. Existen clientes y sitios web que permiten la publicación de contenido en formatos más enriquecidos, como:
- Zap.stream: Una plataforma de transmisión de video en vivo [❞].
- Yakihonne y Habla.news: Aplicaciones para leer y escribir artículos de formato largo [❞].
- Wikistr: Un reemplazo descentralizado para Wikipedia en etapa inicial [❞].
Cubanoticias.info: Un Ejemplo de Resistencia Informativa
Un ejemplo destacado es cubanoticias.info, un sitio dedicado a cubrir la realidad cubana, enfocándose en temas como Derechos Humanos y Libertad de Expresión. Este sitio es un ejemplo de cómo Nostr puede ser utilizado para contrarrestar la narrativa de medios controlados por el estado en regímenes Totalitarios. [❞].
BlogStr: Creando Contenido Móvil en Nostr
Para los interesados en crear sus propios artículos o notas a través de una aplicación móvil, BlogStr, actualmente en desarrollo y disponible en Playstore, ofrece una opción accesible y eficiente para que puedas publicar y administrar post para blogging en la red de nostr.
Conclusión
Nostr se posiciona como una herramienta de comunicación crucial en entornos donde la libertad de expresión está amenazada. Su estructura descentralizada y la variedad de clientes y sitios web especializados facilitan el intercambio de información y opiniones de manera segura y anónima, brindando una vía de expresión y resistencia contra la censura gubernamental.
-
@ 634bd19e:2247da9b
2023-02-15 08:00:45かけるのこれ? 日本語入力の取り扱いイベントがおかしいw
-
@ 93161535:1fc6d488
2023-11-23 23:42:0680s Camcorder shows my room and my day (at-home dumpster diving)
I taped me showing my room in great detail. I also taped my day and something actually interesting happened somehow. I'm very easily amused, though. Please leave a comment.
https://videos.icum.to/w/k6sA9Z4ChCZohcw1uUcDpo
-
@ bcea2b98:7ccef3c9
2023-11-23 23:20:03Channel Influence Efficiency (CIE) in the Lightning Network
Introduction
The Lightning Network's topology and connectivity impact its performance. While metrics like channel count and node centrality offer insights, they miss a key aspect: the efficiency of influence exerted by nodes. Channel Influence Efficiency (CIE) fills this gap by evaluating how effectively a node utilizes its channels to contribute to the network's connectivity.
Methodology
-
CIE Calculation: For a node, CIE is calculated as the ratio of its percentage share in network connectivity to its total number of channels. Mathematically, CIE = (Node's Connectivity %) / (Number of Channels).
-
Data Collection: Data on node connectivity and channel count can be sourced from Lightning Network explorers or APIs.
-
Analysis Framework: CIE is analyzed across various tiers of nodes (top 1, top 100, top 1000) to understand distribution patterns.
Network Connectivity (NC) Calculation Formula
NC = λ × (L × U × Q × C × R × N)
Where: - NC = Network Connectivity. - λ = Normalization factor to scale the result within a meaningful range. - L = Liquidity Score, representing the total liquidity available in the node's channels. - U = Uptime Score, reflecting the reliability of the node (e.g., a percentage of time the node is online). - Q = Quality of Connections Score, indicating the strategic importance of the node's connections (e.g., connections to key nodes). - C = Channel Capacity Score, measuring the total capacity of the node's channels. - R = Routing Efficiency Score, denoting the node's efficiency in routing transactions (considering factors like latency and path optimality). - N = Network Centrality Score, indicating the node's centrality within the network structure.
Utilizing the data from 1ML's Lightning Network statistics, we can calculate an example of network connectivity for a hypothetical node using the proposed formula. For simplicity, we'll assume each factor (liquidity score, uptime score, etc.) is represented on a scale of 0 to 1.
Given Data from 1ML: - Network Capacity: 5,368.61 BTC - Average Node Capacity: 0.367 BTC - Average Channel Capacity: 0.086 BTC - Average Node Age: 830.8 days - Average Channel Age: 454.8 days - Average Channels per Node: 8.52 - Tor Onion Service Nodes: 10,550 nodes - Median Base Fee: 0.632160 sat - Median Fee Rate: 0.000050 sat/sat
Example Calculations
Hypothetical Node 1 Data:
- Liquidity Score (L): Assuming our node's capacity is at 75th percentile, L = 0.75.
- Uptime Score (U): Assuming an uptime of 95%, U = 0.95.
- Quality of Connections Score (Q): If our node is connected to key nodes, Q = 0.8.
- Channel Capacity Score (C): Assuming channel capacity at 75th percentile, C = 0.75.
- Routing Efficiency Score (R): Assuming high routing efficiency, R = 0.9.
- Network Centrality Score (N): If the node is moderately central, N = 0.6.
Network Connectivity (NC) Calculation:
Assuming a normalization factor λ = 1, the NC for our hypothetical node would be: NC = 1 × (0.75 × 0.95 × 0.8 × 0.75 × 0.9 × 0.6) NC = 0.22815
This calculated value (0.22815) represents the node's overall connectivity in the network, taking into account various factors like liquidity, uptime, and efficiency. A higher value would indicate a more influential and well-connected node in the network.
For another example, let's calculate the network connectivity for a different type of node in the Lightning Network, perhaps one that is newer or less central:
Hypothetical Node 2 Data:
- Liquidity Score (L): For a newer node with lower capacity, L = 0.25.
- Uptime Score (U): If this node has good reliability, but not perfect: U = 0.85.
- Quality of Connections Score (Q): With less strategic connections, Q = 0.5.
- Channel Capacity Score (C): Assuming it's around the 25th percentile: C = 0.25.
- Routing Efficiency Score (R): For a moderately efficient node: R = 0.7.
- Network Centrality Score (N): As a less central node: N = 0.4.
Network Connectivity (NC) Calculation:
Using the same normalization factor λ = 1, the NC for this hypothetical node would be: NC = 1 × (0.25 × 0.85 × 0.5 × 0.25 × 0.7 × 0.4) NC = 0.014875
This calculated value (0.014875) indicates a relatively lower overall connectivity for this node, reflective of its newer status, lower capacity, and less central position in the network. This node might focus on improving its strategic connections and increasing its capacity to enhance its role in the network.
Example
- Strategic Connector (Node A)
- Math: 50 channels, 5% network connectivity.
- CIE Calculation: 5% / 50 = 0.1% per channel.
-
Interpretation: Exhibits high efficiency in network influence relative to its channel count, indicating strategic channel connections and a pivotal role in network transactions.
-
Broad Networker (Node B)
- Math: 100 channels, 5% network connectivity.
- CIE Calculation: 5% / 100 = 0.05% per channel.
-
Interpretation: Maintains many channels but is less efficient in leveraging them, indicating a wider reach but less strategic placement.
-
Efficient Hub (Node C)
- Math: 20 channels, 10% network connectivity.
- CIE Calculation: 10% / 20 = 0.5% per channel.
-
Interpretation: Demonstrates exceptional efficiency, likely connected to key network hubs.
-
Sparse Influencer (Node D)
- Math: 200 channels, 1% network connectivity.
- CIE Calculation: 1% / 200 = 0.005% per channel.
-
Interpretation: Has many connections but limited influence, possibly indicating ineffective channels.
-
Average Intermediary (Node E)
- Math: 100 channels, 2% network connectivity.
- CIE Calculation: 2% / 100 = 0.02% per channel.
-
Interpretation: Represents an average efficiency level, maintaining a balance in channel count and connectivity impact.
-
Dense Networker (Node F)
- Math: 300 channels, 15% network connectivity.
- CIE Calculation: 15% / 300 = 0.05% per channel.
-
Interpretation: Despite a high channel count, the node's influence per channel is moderate, suggesting potential for optimizing its network position.
-
Minor Player (Node G)
- Math: 10 channels, 0.2% network connectivity.
- CIE Calculation: 0.2% / 10 = 0.02% per channel.
-
Interpretation: With a low channel count and influence, this node reflects smaller or newer entities in the network.
-
Strategic Influencer (Node H)
- Math: 50 channels, 20% network connectivity.
- CIE Calculation: 20% / 50 = 0.4% per channel.
- Interpretation: Shows high strategic connectivity, indicating fewer but highly effective connections to major nodes.
Interpretation:
- Strategic Connector (Node A)
-
With a CIE of 0.1% per channel, Node A demonstrates high efficiency in network influence relative to its channel count. This suggests that Node A has strategically established channels, making it a pivotal connector in the network's transaction flow.
-
Broad Networker (Node B)
-
Node B, with a CIE of 0.05% per channel, maintains a larger number of channels but doesn't leverage them as effectively as a Strategic Connector. This indicates a broad but less strategic network reach, suggesting potential for optimization.
-
Efficient Hub (Node C)
-
The high CIE of 0.5% per channel for Node C indicates exceptional efficiency, likely due to connections with key network hubs. This node serves as a central hub for transactions, demonstrating the importance of strategic channel placement.
-
Sparse Influencer (Node D)
-
Node D, with a CIE of 0.005% per channel, represents a node with many connections but limited influence. This could indicate a spread of redundant or less effective channels, highlighting the need for more strategic connectivity.
-
Average Intermediary (Node E)
-
With a CIE of 0.02% per channel, Node E strikes a balance between channel count and influence. This reflects an average level of efficiency, serving as a reliable intermediary in the network.
-
Dense Networker (Node F)
-
Node F, having a CIE of 0.05% per channel, suggests a high number of channels but only moderate influence per channel. This points to the potential for better optimizing its network position to maximize influence.
-
Minor Player (Node G)
-
The CIE of 0.02% per channel for Node G indicates a node with limited influence and a low channel count. This type of node often represents smaller or newer players in the network.
-
Strategic Influencer (Node H)
- Node H, with a CIE of 0.4% per channel, demonstrates a highly strategic use of connectivity. With fewer but highly effective connections, this node is likely linked to several major nodes, enhancing its role in network efficiency.
Findings and Discussion
The examination of Channel Influence Efficiency (CIE) across various nodes in the Lightning Network, now categorized with specific roles, yields several key findings and opens up new avenues for discussion:
- Strategic Placement and Efficiency
-
Nodes like the Strategic Connector (Node A) and the Strategic Influencer (Node H) highlight the importance of not just the quantity, but the quality of connections. Their high CIE values suggest that strategic placement of channels can significantly enhance a node's influence in the network.
-
The Role of Broad and Dense Networkers
-
Broad Networkers (Node B) and Dense Networkers (Node F), despite their extensive channel networks, exhibit moderate CIE values. This suggests that an overemphasis on expanding channel count without strategic planning may not always translate into increased network influence.
-
Average Intermediaries as Network Stabilizers
-
Average Intermediaries (Node E) demonstrate a balance in channel count and influence. These nodes potentially contribute to the stability and resilience of the network by maintaining a consistent level of connectivity.
-
Identifying and Supporting Minor Players
-
The Minor Player (Node G) category, with its lower CIE, draws attention to smaller or emerging nodes in the network. Understanding their challenges and potential can guide strategies to support their growth and integration into the network.
-
Potential for Optimization
-
The variance in CIE among different nodes suggests room for optimization. Nodes can look towards the strategies employed by those with higher CIE values to improve their own connectivity and influence.
-
Risk Assessment and Management
-
Sparse Influencers (Node D) with many connections but limited influence may present risks, such as bottlenecks or points of failure. Assessing nodes for their CIE can aid in identifying and mitigating these risks.
-
Network Evolution and Adaptation
- Tracking changes in CIE over time can provide insights into how the Lightning Network evolves. Shifts in the CIE of various nodes could indicate emerging trends, adaptation strategies, or evolving challenges within the network.
Future Work
The introduction of Channel Influence Efficiency (CIE) and the categorization of nodes into roles like Strategic Connectors and Efficient Hubs open several avenues for future research and development in the Lightning Network. The following areas represent key opportunities for further exploration:
- Development of Real-Time CIE Tracking Tools
-
Creating tools that provide real-time analysis of CIE for nodes in the Lightning Network can offer ongoing insights into network dynamics and efficiency. These tools could be invaluable for nodes in optimizing their connections and assessing their network influence.
-
Impact of CIE on Network Scalability
-
Studying how variations in CIE affect the scalability and robustness of the Lightning Network can provide insights into how the network can grow while maintaining efficiency and stability.
-
Strategies for Enhancing CIE of Nodes
-
Research into strategies that nodes can employ to improve their CIE, especially for those categorized as Sparse Influencers or Minor Players, would be valuable. This could include analysis of optimal channel formation, network positioning, and connection strategies.
-
CIE's Role in Predictive Modeling
-
Utilizing CIE in predictive modeling to forecast network changes, potential bottlenecks, or points of failure could enhance proactive network management and strategic planning.
-
CIE Influence on Transaction Routing Algorithms
-
Exploring how CIE can be integrated into transaction routing algorithms to optimize efficiency and reduce transaction costs could be a significant advancement.
-
CIE-Based Network Health Indicators
- Developing network health indicators based on CIE distributions can offer a quick and effective way to assess the overall state and performance of the Lightning Network.
-
-
@ 93161535:1fc6d488
2023-11-23 23:16:43Turkey Song by Ashley Jones
I finished the lyrics to Turkey Song. The turkey is a Swiss army knife because I thought they looked like turkiez.
Lay ya down
spread ya legs
suddenly im hit with the smell of heggs
Spicy chinese meal
Is that turkey that I smeeeeel
Burgerking fast food deal
Baby those farts are made of steeeel
Oh HO
Oh NNO
Sniffy sniffy wiffy
Givin me a stiffy
Please sir I would like some more
id lieeeee cheat and steal
just to make your asshole my next meal
And if you blind folded me
I could tell that you ate cottage cheese
yeah yeah uh yeaaahahaha
are you lactose intoleradnt
cause your asshole smells worse than my apartment
But baby I dont caare
give a vet ptsd
with your chemical warfare
https://videos.icum.to/w/87BzLiNGN2p8uHsj1WjHn4
-
@ 9ecbb0e7:06ab7c09
2023-11-23 23:07:33Los seis médicos del Hospital Carlos Manuel de Céspedes en Bayamo, Granma, llevados a juicio por la muerte de un paciente fueron sentenciados a dos y tres años de prisión, informó el doctor exiliado Alexander Jesús Figueredo Izaguirre.
Según una publicación en Facebook del galeno, la fiscalía dictaminó dos años de prisión para cinco médicos y tres años para el Dr. Ristian Solano.
El miércoles en ese hospital se celebró el juicio a puertas cerradas donde acusaron a los médicos de negligencia en el caso de un paciente que falleció durante una cirugía.
Figueredo Izaguirre dijo conocer detalles del caso y explicó que los médicos debieron someter al hombre –que llegó a emergencias herido tras un grave accidente de moto– a una cirugía a pesar de que en el hospital no contaban con recursos esenciales como material de sutura, sondas de levine, y el tomógrafo estaba defectuoso.
El doctor explicó que pese a intentarlo, el paciente murió. Sin embargo, al parecer el fallecido era un “peje gordo”, lo que desató la acusación de negligencia médica.
En otra publicación el galeno cubano denunció que una comisión de Manzanillo había propuesto dos años de privación de libertad para cada uno de los médicos –dos mujeres y cuatro hombres– a los que identificó como Rafael José Sánchez Vázquez; Yoandra Quesada Labrada, Ristian Solano; Elizabeth Silvera; William Pérez Ramírez y Henrry Rosales Pompa.
No es la primera vez en las últimas semanas que Figueredo Izaguirre se hace eco de la crisis de insumos en el hospital de Bayamo.
A comienzos de octubre, médicos del Hospital Provincial Carlos Manuel de Céspedes enviaron una carta al doctor exiliado para denunciar la terrible situación que enfrenta ese centro de salud y sus pacientes por la falta de recursos esenciales: vendajes, suturas, sondas de levine, tubos endotraqueales y otros elementos fundamentales para hacer frente a urgencias médicas.
Desde 2020 los profesionales de la salud trabajan bajo un estrés tan fuerte que muchos han decidido abandonar sus puestos, emigrar fuera del país o escapar a otros sectores donde reciben mejores salarios. En algunas provincia se agudizó la crisis de los servicios de salud desde hace tres años, en medio de la crisis del coronavirus.
Solo en 2022, según fuentes oficiales, más de 12 médicos abandonaron el Sistema de Salud Pública de Cuba. También dejaron su trabajo en ese sector 7,414 enfermeros, 3,246 estomatólogos y 4,579 técnicos.
Figueredo Izaguirre llamó a los colegas del sector a defender a los condenados, y a mirarse en esa misma situación. Hace algunas semanas el pueblo de Sola, en el municipio Sierra de Cubitas, en Camagüey, salió a las calles a exigir justicia para un destacado médico de su comunidad que fue acusado de negligencia y está encarcelado.
El doctor Reniel Felipe Peña Yermat, con una destacada trayectoria como galeno, misiones de colaboración internacional, experiencia en la dirección de instituciones de salud, admirado por sus colegas y pacientes, se enfrenta a una pena de varios años de prisión bajo acusación de cometer negligencia médica.
Los pobladores defienden la inocencia del médico y ante las masivas protestas el Ministerio de Salud Pública se comprometió a revisar el caso.
-
@ be42c83a:5780d33a
2023-11-23 23:07:28Bull Bitcoin is built by Canadians for Canadians. It's one of the most secure, feature-rich places you can buy or sell Bitcoin in Canada.
Table of Contents:
- What You Need
- Sign Up Process
- Funding
- Fees
- Buying Bitcoin
- Withdrawing Bitcoin
- Bylls
- Bitcoin Support
- Bitcoin Prime
- Recurring Buys
- L-CAD
- Why Bull Bitcoin?
- Privacy
- Referral Code
What you need:
- Canadian Bank Account - To fund or withdraw dollars to your Bull Bitcoin Account your bank account must match your name.
- Bitcoin Wallet —Bull Bitcoin is a broker what this means is when you buy Bitcoin it’s sent directly to you. At no point does the Bitcoin you bought stay on a trading platform or an account in your name.
- ID — This is necessary to purchase $1000 or more with Bull Bitcoin.
Sign Up Process
5 things you need to verify in order to buy Bitcoin with Canadian dollars with your bank.
- Email.
- Phone Number
- Address
- Occupation
- Date of Birth
To complete verification you can choose instant verification or opt out of the instant verification by uploading a document that has a matching address to your name.
Bull Bitcoin allows for $1000 cash purchases at all Canadian post offices without verification of your address, name, and date of birth.
Funding:
There are no fees to send money via e-transfer, bank transfer, or wire transfer.
When you send a $1000 you receive a $1000.
3 ways to fund Canadian dollars:
- E-transfer
- Wire transfer
- Desjardins transfer
Fees:
Purchasing fees: Bull Bitcoins Live Fee Calculator
Purchasing fees are higher than typical exchanges at around 2%
However, fees on Bull Bitcoin for depositing and withdrawing are free. Many exchanges in Canada have high hidden fees for this.
Buying Bitcoin:
You can purchase:
- Bitcoin
- Liquid BTC
- Liquid CAD
- Bitcoin via the Lightning Network
Step 1: Fund Your Account
Step 2: Choose what you want to purchase
Step 3: Paste in your receiving address
Step 4: Create Bitcoin Buy Order
Step 5: Confirm Bitcoin Purchase.
Your bitcoin will be put into a batch transaction and sent with other transactions. This can take several hours to receive your bitcoin.
You can opt out of this by purchasing an express transaction to hit the next block.
Bylls
Bylls is a payment processor where you can pay any bill, individual or business with Bitcoin.
The Bitcoin is converted to dollars and paid by Bull Bitcoin.
Bitcoin Support
Bitcoinsupport.com owned by Bull Bitcoin, offers free guides or paid one-on-one support.
Bull Bitcoin Prime
Get Prime VIP support directly from Bull Bitcoin with unlimited transaction volumes.
Dollar Cost Averaging
Recurring buys are also possible on Bull Bitcoin this is called dollar cost averaging.
Helping you neutralize price volatility and overall risks with one giant large transaction.
Money is sent to Bull Bitcoin and held in their possession until it's converted to bitcoin. You can set up to purchase hourly, daily, weekly, or monthly.
L-CAD
Liquid-Cad (L-CAD) is a project of Blockstream, this is essentially a way to hold Canadian dollars on Bitcoin.
This is a better option than your typical stablecoin. L-CAD is a side chain that’s basically an IOU that is in a federation with Blockstream & Bull Bitcoin.
Why Bull Bitcoin
-
Bull Bitcoin has been running since 2013 building on bitcoin only, they have no outside funding or venture capital.
-
They are Bitcoin only. This perfectly optimizes them for Bitcoin.
Allowing them to implement features that exchanges don't have, including:
- Non-custodial
- Lightning Network purchases
- Free withdrawals
- Choose to opt-out of transaction batching
- Change addresses in your DCA
Privacy
Privacy on Bull Bitcoin is probably one of the best you’re going to find of any company that sells bitcoin.
They say right on their website that they “believe in maximizing your privacy”
Verification is less intrusive than other apps you can buy bitcoin in Canada.
Bitcoin payments to them are coin-joined.
These means when selling your Bitcoin, it’s mixed with other transactions, erasing the probability of tying it back to you.
Many other exchanges work with chain surveillance companies. Helping them get into jurisdictions and get funding to operate, not Bull Bitcoin!
Referral Code:
Get $20 when you make your first purchase on Bull Bitcoin when you make your first $100 purchase.
https://www.bullbitcoin.com/mission/dhoneysett
-
@ 9ecbb0e7:06ab7c09
2023-11-23 23:02:30El cadáver de una recién nacida prematura fue encontrado este miércoles en estado de putrefacción en un arroyo de aguas albañales en el consejo popular Cristino Naranjo, en el municipio holguinero de Cacocum, según informó en redes sociales el perfil oficialista Realidad desde Holguín.
Precisaron que el cuerpo -al que la citada fuente dio el tratamiento de "feto femenino pretérmino"- tenía en el momento de la salida del vientre materno de 29 a 32 semanas.
"El feto no nació vivo, saliendo del vientre materno entre 29 y 36 horas antes de ser encontrado según estimaciones", añadió Realidades desde Holguín aludiendo al criterio de Medicina Legal.
Al cadáver de la criatura le faltaba la cabeza, sobrecogedor dato que el medio oficialista explicó diciendo que "fue comida por peces depredadores" de la zona, algo que aseguran que fue constatado por especialistas en el lugar.
"Nadie está preparado para comprender este tipo de actitudes y hasta los responsables se llegará más temprano que tarde", concluyó la nota, que añadió que autoridades del Ministerio del Interior (MININT) indagan sobre lo sucedido, aunque no ofrecieron otros detalles sobre la investigación en curso.
Más allá de que el citado medio oficialista hizo hincapié en que la bebé nació muerta. Valga aclarar que con los avances en la perinatología en las últimas décadas ha disminuido de forma notable la edad gestacional en la que un feto se considera viable.
Actualmente un prematuro puede sobrevivir a partir de las 22 semanas de gestación, ello en términos de supervivencia neta, sin determinar posibles secuelas, que suelen registrarse sobre todo en los casos en que el nacimiento tiene lugar por debajo de las 30 semanas.
-
@ 9ecbb0e7:06ab7c09
2023-11-23 22:59:25Un joven de apenas 18 años, conocido como “El Bolito”, fue asesinado en el municipio de Cruces, ubicado en la provincia de Cienfuegos, cuando era parte de una carrera ilegal de caballos en una zona rural.
Según el reporte del medio oficialista La Proa del Centro, el homicidio ocurrió en un área de la antigua central “Ramón Balboa” al término de una de las carreras, cuando la víctima se involucró en una discusión con su hermano gemelo, conocido como “Nany”, y otra persona.
En un intento por arrebatarle el machete al agresor, “El Bolito”, cuyo nombre real no fue divulgado, recibió una estocada mortal. Este joven, de piel negra y procedente de una familia humilde, se convirtió así en una víctima más de la violencia que azota a la Isla.
El dolor de los padres, completamente desconsolados en la funeraria, ha conmovido a la comunidad de La Trocha, sitio donde residía el joven ultimado. Beatriz Acosta, una allegada a la familia, se expresó en el apartado de comentarios de la publicación en Facebook del medio, solicitando respeto y compasión por la familia en duelo. Subrayó la importancia de las palabras de la madre del muchacho, quien siempre instó a sus hijos a cuidarse mutuamente.
-
@ 9ecbb0e7:06ab7c09
2023-11-23 22:55:59Como parte de los desgarradores hechos delictivos en Cuba, un padre terminó siendo víctima de un brutal asesinato ocurrido en su propio hogar, ubicado en la oriental provincia de Santiago de Cuba.
Liset Cabrera, hija del difunto, publicó en su cuenta de Facebook una fuerte denuncia para demostrar su tristeza ante la pérdida de su padre, y su desesperación por encontrar justicia en este crimen que ha destruido a su familia.
“Hoy estoy haciendo esta publicación porque estaba buscando el momento para hacerla, aunque aún no encuentro palabras para desahogarme”, compartió Cabrera, manifestando su profundo dolor y el vacío dejado por la muerte del progenitor.
La hija dijo que los presuntos responsables del crimen en más de 20 ocasiones hirieron al padre con un machete, hasta dejarlo sin vida. La usuaria también compartió fotografías de los dos jóvenes sospechosos.
“Pido justicia al gobierno de Cuba, que hagan lo que tienen que hacer, cómo puede ser posible que esto esté sucediendo, que nadie tenga tranquilidad en su propia casa, que nadie pueda caminar por miedo a que lo maten”, enfatizó la mujer en su testimonio.
Cabrera también expresó fuertes palabras contra la ineficiente acción del gobierno para disminuir la delincuencia en el país. “Díaz-Canel, mira en lo que tú has convertido todo un país en desgracia y miseria”, agregó, además de lamentar que los delincuentes lastimen a personas inocentes.
Junto a las expresiones de condolencias hacia la hija, usuarios también pidieron que se ayude a viralizar la publicación en búsqueda de justicia. “Es muy necesario que todas las personas compartan esta publicación sean o no amigos, es triste que sigan muriendo personas inocentes y ancianos. El gobierno debe de dar sanciones ejemplares ante estos horrendos crímenes, que requieren medidas drásticas”, comentó Alfredo Cardero.
“Pido justicia al gobierno de Cuba, que hagan lo que tienen que hacer, cómo puede ser posible que esto esté sucediendo, que nadie tenga tranquilidad en su propia casa, que nadie pueda caminar por miedo a que lo maten”, enfatizó la mujer en su testimonio.
Cabrera también expresó fuertes palabras contra la ineficiente acción del gobierno para disminuir la delincuencia en el país. “Díaz-Canel, mira en lo que tú has convertido todo un país en desgracia y miseria”, agregó, además de lamentar que los delincuentes lastimen a personas inocentes.
Junto a las expresiones de condolencias hacia la hija, usuarios también pidieron que se ayude a viralizar la publicación en búsqueda de justicia. “Es muy necesario que todas las personas compartan esta publicación sean o no amigos, es triste que sigan muriendo personas inocentes y ancianos. El gobierno debe de dar sanciones ejemplares ante estos horrendos crímenes, que requieren medidas drásticas”, comentó Alfredo Cardero.
Cuba se encuentra actualmente en una situación crítica ante un incremento alarmante de actividades delictivas en todas sus provincias. Este escenario se ha exacerbado debido a la ausencia de medidas efectivas por parte de las autoridades, lo cual ha permitido que el ambiente de violencia se propague sin control.
La falta de políticas de seguridad eficientes, combinada con una creciente desigualdad económica y social, ha creado un caldo de cultivo para el aumento de la criminalidad. Desde robos y asaltos hasta crímenes más graves, como el reciente asesinato en Santiago de Cuba, la población se encuentra en un estado constante de incertidumbre y miedo, cuestionando la capacidad del gobierno para garantizar su seguridad.
-
@ 9ecbb0e7:06ab7c09
2023-11-23 22:52:48Donald Trump, presidente número 45 de Estados Unidos, tiene entre sus planes realizar un viaje a Buenos Aires, Argentina, para reunirse con el mandatario electo de este país, Javier Milei, informó la oficina del político sudamericano.
Se desconoce si este encuentro será antes, durante o después de la toma de posesión del argentino, programada para el próximo 10 de diciembre. En un comunicado también se dijo que el aspirante a la candidatura presidencial republicana llamó al abanderado de la coalición La Libertad Avanza.
“El presidente electo recibió anoche una llamada del expresidente de Estados Unidos, Donald Trump, quien lo felicitó y señaló que su triunfo por amplio margen en las elecciones del pasado domingo tuvo un gran impacto a escala global”, dijo la oficina de Milei.
Tras confirmarse la victoria del economista en la segunda vuelta de la elección presidencial argentina, Trump lo celebró parafraseando su lema de campaña: Make Argentina great again (vas a hacer que Argentina vuelva a ser grande).
A principios de este año, Milei elogió a Trump en una entrevista con el expresentador de Fox News, Tucker Carlson. “Trump debe continuar con su lucha contra el socialismo, porque es uno de los pocos que entendió plenamente que la batalla es contra el socialismo, que la batalla es contra los estatistas”.
Respecto a la administración de Joe Biden, la Casa Blanca emitió un comunicado sobre los temas que los demócratas desean trabajar con el sudamericano. “Estados Unidos y Argentina tiene una fuerte relación en cuestiones económicas, en cooperación regional y multilateral, y en prioridades compartidas, incluida la defensa de la protección de los derechos humanos, abordar la inseguridad alimentaria e invertir en energía limpia”.
Milei derrotó al candidato oficialista e izquierdista Sergio Massa, quien era el abanderado del partido Frente Renovador. Los resultados finales fueron un 55.69% de los votos a favor del presidente electo y un 44.30% para su contrincante.
El economista recibió el respaldo de la mayoría de los argentinos por proponer posturas económicas liberales, con el objetivo de solucionar la crisis económica y la inflación que ha azotado al país en los últimos meses.
Milei intentará la reducción del Estado, privatización de empresas públicas deficitarias, eliminación del Banco Central y una reforma monetaria para permitir el comercio en la moneda que deseen los argentinos, lo cual permitiría el uso del dólar estadounidense en el país. Asimismo, aboga por una reducción de impuestos y flexibilizar el mercado laboral.
-
@ 9ecbb0e7:06ab7c09
2023-11-23 22:45:12Según datos del Ministerio de Educación (MES), solo el 50.4% de los aspirantes logró aprobar los tres exámenes, marcando una disminución significativa con respecto al año anterior. La asignatura de Matemáticas tuvo un preocupante 52.7% de aprobados, mientras que Español alcanzó el 92.1% e Historia el 76.4%.
El director de Ingreso y Ubicación Laboral del MES, René Sánchez Díaz, atribuyó estos resultados a varios factores, incluyendo el impacto continuo de la pandemia de COVID-19 en los estudiantes, las dificultades en la fuerza laboral docente y las limitaciones en la formación y atención a los estudiantes.
Pese a no demostrar los conocimientos suficientes para enfrentar un nivel académico más exigente como lo es la Educación Superior, el régimen cubano asegura que tiene plazas para todos los desaprobados. El envejecimiento poblacional y el éxodo masivo de jóvenes en edad laboral hace que haya que echar mano de todo el que esté disponible para recibir una formación docente y posteriormente incorporarlos al mundo laboral con ciertas capacidades, aunque no sean las óptimas.
En ese sentido, desde el MES aclaran que hasta la fecha se han asignado 25.205 plazas, la mayoría en carreras de ciencias naturales, sociales, económicas; mientras que las pedagógicas, técnicas de la salud y agropecuarias tienen menos demanda por parte de los estudiantes.
El próximo curso tendrá solo 30 semanas de clases
Por si fuera poco, los estudiantes que ingresarán a las universidades con pésimas notas en los exámenes, incluso aquellos que desaprobaron, tendrán menos semanas de clases en la Educación Superior.
Según el MES, en el calendario escolar para el próximo curso, que comenzará el 15 de febrero, tendrá solo 30 semanas de clases. Después de más de tres años de la llegada de la pandemia de coronavirus al país, el período lectivo aún no se recupera de los rezagos.
Deysi Fraga Cedré, directora general de Pregrado del MES, explicó que las universidades tendrán la flexibilidad de reprogramar asignaturas. Para el año académico 2024-2025, se prevé un calendario más extenso con 42 semanas lectivas para estudiantes de primer año y 38 para continuantes. Los estudiantes de primer año comenzarán el 16 de septiembre, después de las pruebas de ingreso de mayo, y los continuantes regresarán el 14 de octubre.
-
@ cce0989b:b497e608
2023-11-23 19:58:12Gratitude is easy when life is going well. But when life is hard, it can often feel impossible to see a single thing that is going right — and that's exactly why it's so important that we try our best to do so.
I know what you're thinking: gratitude, now, when life feels so difficult and people are struggling so much and the world is so unceasingly cruel?
Yes. Gratitude, even now.
Where to begin?
With realizing what gratitude actually is. Gratitude is the choice to look around at how others have helped you, a recognition that reminds you that you are not alone in this world. Other people have contributed so much to your life in countless ways, and you are the constant beneficiary of their talents, their heart, and their courage. Gratitude is not about what you do for yourself — it's about what others have done for you. It makes you realize that you are connected to others.
And with recognizing what gratitude is not. Gratitude is not toxic positivity. You do not have to deny what is really challenging and painful in your life; gratitude just asks that you also spend a moment looking for what is really beautiful and good, too. It makes you realize that, even amidst the pain you are feeling, there is something good here, too.
When someone realizes that 1) they are not alone in the world, and 2) their suffering can exist alongside their joy, it changes them in two key ways.
First, it makes them more resilient — something that's been observed even in traumatic situations:
-
Veterans who develop post-traumatic stress disorder (PTSD) have lower gratitude levels than those who do not
-
Breast cancer patients who wrote a gratitude diary every day for two weeks were able to function more effectively, felt more supported, and were better able to use effective coping strategies than those who did not
-
Police officers post-Hurricane Katrina who were more grateful experienced lower levels of depression
-
Americans after 9/11 who were more grateful experienced less overall psychological distress
-
People who recover from traumatic experiences are able to do so in large part by finding some positive benefit from the experience
Second, it makes them more compassionate. Gratitude makes people want to help others. They see that they have enough and want to make sure others have enough, too. This inner change has the power to transform our communities, workplaces, and our world into peaceful environments, where we make our own contributions and celebrate what others share, too.
Today, I hope you'll take a moment to reflect on something you're grateful for — knowing that this small act has the power to start changing you and changing the world for the better.
-
-
@ 21b41910:91f41a5e
2023-11-23 19:18:50Details
- 🍳 Cook time: 4 hours
- 🍽️ Servings: 8-12 persons
Ingredients
- 4 pounds of potatoes, chopped (or 2 Quarts home canned)
- 1 Stick of Grass Fed Organic Butter (4 oz)
- 1 Chicken Bouillon Cube
- 1/2 Cup Water
- 1 Tablespoon Salt
- 1/2 Teaspoon Black Pepper
- 1 Tablespoon Garlic (Minced, or use a Papa Johns Garlic Sauce)
- 4 to 8 ounce shredded cheese
- 1 1/2 cups milk
- 1 cup sour cream
Directions
- If using fresh potatoes, peel, cube and boil in a pot for 10 minutes.
- Stir together potatoes, chicken bouillon cube, water, salt and pepper in crockpot
- Set crockpot on high setting for 4 hours
- Every 30 minutes to an hour, stir
- At 3 hours cooking...
- Mash up contents in slow cooker
- Add stick of butter
- Add shredded cheese and stir
- At 4 hours cooking...
- Add 1 1/2 cups of warmed milk
- Warm 1 1/2 cups of milk and add to slow cooker
- Add 1 cup of sour cream to slow cooker
- Mix and mash together, taste, adding additional black pepper or salt as needed
-
@ df3d362a:3c765ec9
2023-11-23 15:29:10Everyone knows what a “wallet” is, and everyone knows it’s an imperfect metaphor for bitcoin. Some bitcoin wallets — like pieces of paper — offer less than the real thing. Others offer far more: multi-platform interoperability, extraterrestrial-grade encryption, a slick UI, fiat on and off-ramps, point of sale, etc.
lipa is pushing the boundaries of what users can expect, what we can do with bitcoin, and what we can reasonably call a “wallet.” One reason that lipa can afford to experiment and push those boundaries is because the Lightning backend is built on the Breez SDK. They can flip and twirl on the trapeze of peer-to-peer bitcoin transactions because we’ve built the rigging and checked the safety net.
Taking lipa from an Idea to Disruption
Adrian, Bastian, and Patrick decided back in 2020 to start a crypto business, quickly realizing that bitcoin is the only practical and ethical option. They value financial freedom and fair payments above all else. Founders after my own heart.
After playing with the idea of building node-management software, they saw an open niche: there was a lack of user-friendly solutions for businesses to accept and use bitcoin in their day-to-day operations. So they built one. This was a good start, but they soon encountered a dilemma many of us have faced: for bitcoin to be attractive to businesses, they need customers who want to spend it; and for bitcoin to be attractive to customers, they need businesses willing to accept it.
In order to promote bitcoin adoption, they were going to have to work the problem from both ends. Ergo, they built a user-friendly consumer “wallet.” But this is no ordinary send-and-receive, store-your-recovery-phrase-carefully bitcoin app. It’s designed to solve bitcoin’s problems by solving businesses’ problems by solving users’ problems.
For example, there are millions of bitcoin users out there, each able to transact with the others. If you’re visiting any major city, you can bet there are several thousand other bitcoiners near you. But how do you find them if you want to spend your bitcoin on a book, a beer, or a burger? For businesses, it’s the same but reversed: how do customers looking to spend their bitcoin find you?
lipa has solved this common conundrum by including BTC Map in the app, which indicates the locations of bitcoin businesses. They took all the mystery out of finding Schelling points. Wanna find something? Use their map. Simple.
lipa is also working on a bitcoin debit card, a bitcoin IBAN, and connecting lnurl addresses to phone numbers, which would obviate invoices. Watching crypto bros “speedrun all of financial history from scratch” is hilarious. But that’s not what lipa is doing. Instead of replicating fiat’s errors, they’re importing some standard, innocuous fiat tech that will lower barriers to entry and help onboard the masses.
lipa calls this UX marvel a “wallet,” but that’s like John von Neumann calling himself a number cruncher. They are reconceptualizing the utility of bitcoin. And they’re doing it transparently, without taking custody of users’ funds.
The Stronger the Foundation, the Higher You Can Build
The reason lipa can reach these heights and nail these experiments is because the Lightning backend runs on the Breez SDK. When lipa decided to develop a consumer app, they immediately opted for an SDK. Lightning is complex, and building a Lightning app from scratch would mean fewer resources available to optimize the UX.
They started evaluating different solutions, but their biggest challenge was liquidity and channel management. They actually started creating a custom LSP solution based on Breez’s lspd, until we met at a conference and they shared their experience. I told them about the Breez SDK we were about to release, which was going to include channel and liquidity management, free choice of LSPs, and open-source code.
Guess which SDK they’re using? Their experience went from “challenging” to “super easy.” Those are direct quotes from the lipa team. Here’s the secret: just as lipa focuses unerringly on the UX, so do we. It’s just that their developers are our users.
And just like bitcoin gets stronger when users and businesses can find each other, lipa is helping us improve our SDK just as our SDK is helping them build such a brilliant app. They tell us what functions and APIs they would like to see, so we know what to work on next. And they and their users have some great ideas. For example, they’ve mentioned splicing, asynchronous payments, and local routing. We’ve considered adding all of those, but only through talking to the developers implementing the SDK can we assess which should have priority.
It’s been a big year for Breez. We’re doing things we’ve never done before, we’ve come a long way, and we’ve met some great partners who are helping us along. But as with bitcoin, this is still just the beginning.
-
@ 63fe6318:330504ed
2023-11-23 14:52:05v0.1.23
Added
- DeepL translate api (Automatic for PRO subscribers)
- Add nostr:nprofile1qqsydl97xpj74udw0qg5vkfyujyjxd3l706jd0t0w0turp93d0vvungfgfewr to contributors
- Proxy LN address type enabled on Nostr Address settings pages
- Infinite scrol on notifications page
- Default 0.5% ZapPool rate for Snort donation address
- Collect relay metrics in
@snort/system
for better relay selection algo in Outbox Model (NIP-65) - New sign up / login flow!
- Topics / Mute words on sign up for easier onboarding
- Drag & Drop for uploads on note creator - nostr:nprofile1qqs8tchhwf5smv3r2g0vkswz58c837uu456x59m3dh380gtrhqzydeqz4wlka
- Mixin topics (hashtags) into timeline feed
- Language specific trending posts
- Show following info for hashtags
- Sync preferences to network (
NIP-78
support) - Trending hashtags page
- Note creator hashtag input
- Top trending hashtags on note creator
- Social Graph - nostr:nprofile1qqsy2ga7trfetvd3j65m3jptqw9k39wtq2mg85xz2w542p5dhg06e5qpr9mhxue69uhhyetvv9ujuumwdae8gtnnda3kjctv9uh8am0r
- New users relay list based off "close" relays
NIP-96
support for nostr native image/file uploaders- Write replies/reactions to
p
tagged users read relays (Outbox model) - Sync joined public chats (
NIP-28
) usingPublicChatList
kind10_005
Changed
- Read/Write relays only on kind
10_002
(NIP-65) - Removed
nostr.watch
code for adding new users to random relays - Render kind
10_002
on profile relays tab @snort/system
using eventemitter3 for triggering events- Use latest
NIP-51
spec (Bookmarks/Interests/NIP-28
PublicChatList) nreq
support (Demo)- Write profile/relays to blasters
@snort/system
automated outbox model (automatic fetching of relay metadata)
Fixes
- Upgrade ephermal connection to non-ephemeral
- Remove relay tag from zaps (Some zap services dont support it)
- Fix zap parsing for goals
- Remove extra chars from quoted events to fix loading (
's
etc) - CSS Fixes for profile card on light theme
- Zap counting on replacable events
NIP-28
chats loading- Overflowing modal UI
- Live stream widget layout with long titles
- Notifications marker has returned from its long slumber
-
@ 6b9da920:7841cc6e
2023-11-23 14:11:16Below are the exact response I get from GPT4 when asking questions about https://github.com/BlowaterNostr/nostr.ts
It will be interesting to also release a copilot for
nostr.ts
To implement a reply to a Direct Message (DM) in Nostr protocols, you would typically create a new event that references the original event and is also encrypted so that only the intended recipient can read it. Here's an outline of how you could implement this:
-
Identify the Original Message: You need the original event ID that you're replying to. This ID can be found as the
id
attribute of theNostrEvent
object. -
Compose a Reply: Present the user with an interface to compose their reply.
-
Add Reference to Original Message: When the new message (event) is created, include a tag in the
tags
field that references the original message's ID. In Nostr, referencing an event typically uses a tag in the format["e", "<event_id>"]
. -
Encrypt the Reply: Encrypt the content of the reply using the recipient's public key so that only they can decrypt and read it. In Nostr, DMs are kind
4
, and the content must be encrypted. -
Publish the Event: Sign the new event with the sender's private key and publish it to the relays.
Here is a TypeScript implementation based on your files:
```typescript import { NostrKind, NostrEvent, TagEvent } from "./nostr.ts"; import { prepareEncryptedNostrEvent } from "./event.ts"; import { InMemoryAccountContext } from "./nostr.ts"; import { ConnectionPool } from "./relay-pool.ts"; import { PrivateKey } from "./key.ts";
/* * Send a reply to a direct message in Nostr * @param senderPrivateKey - Sender's private key. * @param originalEvent - The original event to which we are replying. * @param replyContent - The content of the reply. * @param recipientPubKey - The recipient's public key, used to encrypt the message. * @param relayPool - Instance of ConnectionPool to send the event. / async function replyToDM( senderPrivateKey: string, originalEvent: NostrEvent, replyContent: string, recipientPubKey: string, relayPool: ConnectionPool ): Promise
{ // Instantiate your account context with your private key const senderAccountContext = InMemoryAccountContext.FromString(senderPrivateKey); if (senderAccountContext instanceof Error) { return senderAccountContext; }
// Create the reference to the original message's ID const referenceToOriginal: TagEvent = ["e", originalEvent.id];
// Prepare the encrypted event const replyEventResult = await prepareEncryptedNostrEvent(senderAccountContext, { encryptKey: recipientPubKey, // The recipient's public key for encryption kind: NostrKind.DIRECT_MESSAGE, content: replyContent, tags: [referenceToOriginal], // Include the reference to the original event });
if (replyEventResult instanceof Error) { return replyEventResult; }
// Use the relay pool to publish the event to the network const err = await relayPool.sendEvent(replyEventResult); if (err instanceof Error) { return err; } } ```
Usage:
To reply to a message, you should already have an instance of
ConnectionPool
that handles your connection to Nostr relays, the private key object of the sender, the public key of the recipient, the content of the reply, and the original message object:``typescript const senderPrivateKey = 'your-private-key'; const originalMessage = { /*...*/ }; // Original message object (
NostrEvent`) const replyContent = 'Your reply message here'; const recipientPublicKey = 'recipient-public-key';// Existing instance of ConnectionPool connected to Nostr relays const relayPool = new ConnectionPool();
// Then call the function to send a reply await replyToDM(senderPrivateKey, originalMessage, replyContent, recipientPublicKey, relayPool); ```
Ensure you handle the potential errors that may occur during these operations. This function should carry out all necessary tasks to format and send a direct message reply in the Nostr network.
-
-
@ de496884:72617b81
2023-11-23 13:52:37Hola nostriches. Hoy vengo a comentarles un poco acerca de una reflexión que hice a partir de una experiencia en una parada de guaguas. Esa larga espera a veces es iluminadora y como soy investigador social, estoy atento a los estados de opinión de las personas que me rodean. A veces los comentarios y conversaciones son joyitas.
Mi criterio es el siguiente: los valores no se pierden, simplemente se modifica la escala de valores en dependencia de las circunstancias y vivencias. Se trata de que hasta las personas delincuentes o criminales tienen su propia escala de valores que tiene que ver con su entorno. Así para un ladrón por ejemplo, robar para alimentar a su familia, o para mantener a su hijo por nacer, es suficiente razón honorable para hacerlo, es un fin visto como benevolente desde su percepción matizada por un contexto.
Por tanto los valores se distorsionan, se modifican, pero no se pierden. Están en dependencia de las condiciones materiales, la experiencia personal, la educación, el entorno en el que se desarrolla la persona. Partiendo de aquí es pertinente decir que actualmente los valores se han distorsionado, pero no por un factor aislado, sino que se trata de un fenómeno multidimensional, donde tanto la escuela, como la familia, como la economía, como la comunidad, influyen de manera notable.
Pero en última instancia el factor con más peso lo tienen las condiciones socioeconómicas que a su vez, inciden en la educación. La educación es la encargada de ir delante del desarrollo de las personas y guiarlo. Pero la educación no se limita solamente al ámbito escolar, sino a la educación en la familia, en la comunidad como entorno circundante de los infantes. ¿Por qué esto también está fallando? Pues resulta que desde los 90 con la caída del campo socialista, en nuestro país se comenzó a vivir un proceso degenerativo de valores que no ha parado hasta hoy, ya que la economía se vio seriamente afectada, lo que provocó carencias y necesidades básicas insatisfechas.
En las sociedades de postguerra estudiadas a partir de la WWII se ha podido comprobar que las personas tienden a darle más importancia a lo más carente. Así cuando se alcanza el desarrollo adecuado que permita la satisfacción material, se dará más importancia a la calidad. O sea, se va de la cantidad a la calidad, y así luego es que piensa en elementos como el medio ambiente, o los valores.
Volviendo al caso Cuba, los valores se fueron distorsionando condicionados por las carencias materiales, y así se dio más importancia al tener que al ser, y resulta que los padres y abuelos de hoy, eran los niños y jóvenes de aquel entonces. Y aquí está la pieza que encaja perfectamente en el rompecabezas de por qué antes a pesar de haber «menos educación» habían valores. Sencillamente es una relación dialéctica en la que cada elemento condiciona al otro.
Además, de más está decir lo insuficiente que es la educación actualmente en Cuba, pues no cumple ni de lejos con su objetivo principal, lo cual tiene que ver también con las condiciones de la educación, que genera insatisfacciones, falta de implicación de los maestros, insuficiente formación debido a las dinámicas aceleradas de docencia para llenar vacíos profesionales y demás. Por tanto, es deficiente esa transmisión de valores que coincidan con los valores macro de una sociedad determinada, se produce una ruptura.
Así tanto la economía, como la escuela, como la familia, como la comunidad, condicionan la actual alteración en la escala de valores de la sociedad cubana, pero siempre en última instancia la escala de valores va a estar determinada por las condiciones socioeconómicas del contexto.
Espero que hayas llegado hasta aquí y que mi reflexión te haya ayudado -o al menos interesado- para ver la realidad con otros lentes. Recuerda que mi intención nunca será imponer un criterio, sino dar luces sobre cuestiones que pueden que pasen inadvertidas. Así que sin más les invito a comentar qué creen sobre lo que hablo. Hasta la próxima, ¡nos vemos en Nostr!
........................................
English version
Hello nostriches. Today I come to tell you a little about a reflection I made from an experience at a bus stop. That long wait is sometimes enlightening and as I am a social researcher, I am attentive to the states of opinion of the people around me. Sometimes the comments and conversations are little gems.
It turns out that some time ago while I was at the bus stop there were four people debating the reason why values have been lost in Cuba today. Some pointed to the economic factor, others to school education and others to family education. One of the most used arguments was that nowadays anyone he is a bachelor or have an university degree, and therefore the family was responsible. Another strong argument was the lack of education in the country, which causes deviant behavior.
My criterion is the following: values are not lost, simply the scale of values is modified depending on the circumstances and experiences. It is that even delinquents or criminals have their own scale of values that has to do with their environment. Thus, for a thief, for example, stealing to feed his family, or to support his unborn child, is enough honorable reason to do it, it is an end seen as benevolent from his perception nuanced by a context.
Therefore values are distorted, modified, but not lost. They depend on material conditions, personal experience, education, and the environment in which the person develops. From this point of view, it is pertinent to say that values are currently distorted, but not because of an isolated factor, but because it is a multidimensional phenomenon, where the school, the family, the economy and the community all have a significant influence.
Ultimately, however, the most important factor is socioeconomic conditions, which in turn have an impact on education. Education is in charge of leading and guiding people's development. But education is not only limited to the school environment, but also to education in the family, in the community as the surrounding environment of infants. Why is this also failing? Well, it turns out that since the 90's with the fall of the socialist camp, our country began to live a degenerative process of values that has not stopped until today, since the economy was seriously affected, which caused shortages and unsatisfied basic needs.
In the post-war societies studied since WWII, it has been proven that people tend to give more importance to what is most lacking. Thus, when adequate development is achieved that allows material satisfaction, more importance will be given to quality. That is to say, we go from quantity to quality, and then we think about elements such as the environment or values.
Returning to the case of Cuba, values were distorted conditioned by material deficiencies, and thus more importance was given to having than to being, and it turns out that the parents and grandparents of today were the children and young people of that time. And here is the piece that fits perfectly in the puzzle of why there were values in the past, in spite of having "less education". It is simply a dialectical relationship in which each element conditions the other.
Furthermore, it goes without saying how insufficient education is currently in Cuba, since it does not even come close to fulfilling its main objective, which also has to do with the conditions of education, which generates dissatisfaction, lack of involvement of teachers, insufficient training due to the accelerated dynamics of teaching to fill professional gaps and so on. Therefore, the transmission of values that coincide with the macro values of a given society is deficient, there is a rupture.
Thus, the economy, the school, the family and the community condition the current alteration in the scale of values in Cuban society, but ultimately the scale of values will always be determined by the socioeconomic conditions of the context.
I hope that you have reached this point and that my reflection has helped you -or at least interested you- to see reality with other lenses. Remember that my intention will never be to impose a criterion, but to shed light on issues that may go unnoticed. So without further ado, I invite you to comment on what you think about what I am talking about. Until next time, see you at Nostr!
Créditos / Credits
Imágenes utilizadas / Images used:
Imágenes de mi propiedad generadas con IA / Images of my property generated with AI: - Bing Image Creator - BlueWillow
Traducción / Translation:
DeepL
-
@ 58537364:705b4b85
2023-11-23 12:39:09คนเรามักจะเห็นคุณค่าของสิ่งใด ส่วนใหญ่ก็ใน ๒ สถานการณ์คือ หนึ่ง ตอนที่ยังไม่ได้มา หรือ สอง ตอนที่เสียไปแล้ว
อันนี้มันเป็นโศกนาฏกรรม ที่เกิดขึ้นกับผู้คนจำนวนมาก การที่คนเรามีสิ่งดีๆ แต่ว่าเราไม่เห็นคุณค่า เพราะว่าเรามองออกไปนอกตัว ไปเห็นแต่สิ่งที่ตัวเองไม่มี อยากจะได้มา
คล้ายๆ กับเรื่อง หมาคาบเนื้อในนิทานอีสป ตอนเด็กๆ เราคงจำได้ มีหมาตัวหนึ่งคาบเนื้อมา เนื้อชิ้นใหญ่เลย มันดีใจมากแล้วมันก็วิ่งไปยังที่ที่ มันจะได้กินเนื้ออย่างมีความสุข มีช่วงหนึ่งก็ต้องเดินข้ามสะพาน มันก็ชะโงกหน้าไปมองที่ลำธารหรือลำคลอง
ก็เห็นเงาตัวเอง เงานั่นมันก็ใหญ่ แล้วมันก็พบว่าในเงานั้น เนื้อในเงามันใหญ่กว่าเนื้อที่ตัวเองคาบ มันอยากได้เนื้อก้อนนั้นมากเลย เพราะว่ามันเป็นก้อนที่ใหญ่กว่า
มันก็เลยอ้าปาก เพื่อที่จะไปงับเนื้อในเงานั้น พอมันอ้าปาก ก็ปรากฏว่าเนื้อในปาก ก็หลุดตกลงแม่น้ำ แล้วเนื้อในเงานั้นก็หายไป เป็นอันว่าหมดเลย อดทั้ง 2 อย่าง .
ฉะนั้น คนเราถ้าหากเรา กลับมาเห็นคุณค่าของสิ่งที่เรามีอยู่ เราจะมีความสุขได้ง่าย อาจจะไม่ใช่สิ่งของ อาจจะไม่ใช่ผู้คน แต่อาจจะเป็นสุขภาพของเรา
อาจจะได้แก่ ลมหายใจของเรา ที่ยังหายใจได้ปกติ รวมถึงการที่ เรายังเดินเหินไปไหนมาไหนได้ การที่เรายังมองเห็น การที่เรายังได้ยิน
หลายคนมีสิ่งนี้อยู่ในตัว แต่กลับไม่เห็นค่า และไม่รู้สึกว่าตัวเองโชคดี กลับไปมองว่า ฉันยังไม่มีโน่นยังไม่มีนี่ ไม่มีบ้าน ไม่มีรถ ไม่มีเงิน
รู้สึกว่าทุกข์ระทมเหลือเกิน
ทำไมฉันจึงลำบากแบบนี้ ทั้งที่ตัวเองก็มีสิ่งดีๆ ในตัว สุขภาพ ความปกติสุข อิสรภาพที่เดินไปไหนมาไหนได้
แต่กลับไม่เห็นค่า เพราะว่ามัวแต่ไปสนใจสิ่งที่ตัวเองยังไม่มี
ซึ่งเป็นอนาคต
ถ้าเราหันกลับมาเห็นคุณค่าของสิ่งที่เรามีอยู่ แล้วก็ไม่ไปพะวงหรือให้ความสนใจกับสิ่งที่ยังไม่มี เราจะมีความสุขได้ง่าย อันนี้คือ ความหมายหนึ่งของการทำปัจจุบันให้ดีที่สุด
…
การทำปัจจุบันให้ดีที่สุด พระอาจารย์ไพศาล วิสาโล
-
@ 2863f394:275ed58d
2023-11-23 11:49:40I have traditional username/password registration form but I want to integrate nostr. I'm pretty sure I can figure out how to interact with the browser extension but where I'm unclear is would I get user information back from that call so I can create an account in my database?
How would that work exactly if I want to support both nostr logins and traditional logins?
I'm using javascript/node btw.
-
@ 2863f394:275ed58d
2023-11-23 11:15:41...but use it to train AI models instead of mine bitcoin?
-
@ 2863f394:275ed58d
2023-11-23 11:12:07I have two channels, one with 1M+ sats and one with 500k sats, I want to do a circular rebalance becuase for some reason my zap address isn't receiving. I was told I have to rebalance the liquidity.
The problem (btcpayserver and RTL) is that when I do circular rebalance and enter an amount (say 50k) the peer is required field goes empty. I can't select anything.
Does anyone know how to solve?
-
@ 1d6a020c:6e9cf203
2023-11-23 10:31:37Chef's notes
Use fresh garlic for this recipe.
If you are in a hurry, this can be done in 14 days, but for the full effect, leave it in there for 30 days. Don't leave the garlic in the oil for more than 30 days. As tempting as it may be, the garlic will eventually go bad.
If your garlic looks rotten at any point during the recipe, it will have likely contaminated the entire batch of oil. The garlic will be soft and oil-filled at the end of the recipe, but there shouldn't be any black sections or foul smells.
You can use the garlic solids in another recipe when this one is finished, as long as it's consumed right away (so, not another batch of garlic infused olive oil).
Details
- ⏲️ Prep time: 30 days
- 🍳 Cook time: 0
Ingredients
- Olive oil
- 5 cloves garlic, peeled
Directions
- Put the garlic into the bottle of olive oil. Leave a little head room (air gap) at the top to accomidate expansion
- Shake it daily for 30 days
- Pour the oil into another vessle, straining out the garlic
-
@ 4e3a2883:719708a6
2023-11-23 09:58:38New Strategy Game Idea from Nervos Community Members
Nervos.Land is an online strategy game that merges the potential of the CKB blockchain with the capabilities of the Unity engine. By seamlessly integrating transactions with NFTs, players can authentically own, trade, and interact with in-game assets. Ready for a sneak peek? Explore the world of nervos.land now.
Feel free to share your thoughts on Nervos Talk. Your input shapes the evolution of CKB‘s future gaming universe!
Nervos Community Tidbits
- Neuron has released v0.111.1. This version has activated the built-in CKB light client protocol, empowering the wallet to seamlessly transition to the CKB mainnet. Users now can experience a more efficient and streamlined synchronization, enhancing their overall experience with Neuron.
- d.id exhibited at the AI Zone of CIIE and has forged a strategic collaboration with the Bank of China. This partnership leverages decentralized identity technology to bolster identity infrastructure and community development, contributing to the realization of a digital smart city.
- Stay informed on the future potential of the Passkey Wallet with JoyID.
- On November 20, 2023, at 1 : 23 : 47 AM GMT+08:00, a milestone was reached - the first halving of Nervos CKB. With this halving, $CKB inflation rate reduced from 7.92% to substantially lower than 3.77%. This also resulted in a daily mining output decrease to 5.75 million CKB. Nervos Network has curated a range of activities to celebrate the halving, including:
- Halving Party: CKB 1st halving
- CKB Halving: Video
- Halving Countdown Websites: CKBDapps, NervosHalving
- To mark the Nervos halving milestone, Nervape hosted Halve Ape Blast, where participants enjoyed crafting their unique and personalized Halve Nervape avatars. All 900 cells have been swiftly claimed.
💡Crypto Insights
Timeout Trees: Creating Lighting Network by Covenant
TLDR: Timeout Trees offers a potential solution to the issue of opening and closing massive amounts of channels, without introducing the problem of non-cooperative closes ruining the use of the factory for other users.
Enabling Trustless BTC Cross-Chain Transactions
TLDR: Using an MPC secure with just one honest participant, generate a mint Bitcoin address with the secret key witness encrypted under a proof that the wrapped token was burned.
Payjoin: The Alternative for Bitcoin?
Payjoin tackles Bitcoin's privacy issues, providing solutions for scaling and cost efficiency. Future updates may allow offline transactions, eliminating the current requirement for recipients to be online.
Deciphering the Future: What Lies Ahead for Programmable Cryptography?
Zero-knowledge (ZK) is just a fraction of the ever-evolving landscape of cryptographic techniques. This article aims to provide a high-level exploration of programmable cryptography beyond the familiar realm of ZK, showing that what lies beyond is more potent, private, and complex than the average cryptography enthusiast might realize.
📖 Top Reads on Blockchain
A History of Bitcoin Maximalism
As BRC 20 is gaining popularity, a retrospective examination of Bitcoin Maximalism (BTC Maxi) seems particularly relevant. This article traces the origin, variations, and associated cautions of BTC Maxi. Originating from BitcoinTalk's defense against altcoins, BTC Maxi took a toxic turn in 2015, evolving into an exclusive culture under the influence of Mircea Popescu and ultimately leading to a fork from Bitcoin Core. The author advocates for a balanced, non-toxic BTC Maxi, emphasizing BTC's role as a robust, integrity-ensured database.
Unveiling the Driving Force: Why Developers Migrated from Bitcoin to Ethereum
The article revisits a series of discussions sparked by a Dapp protocol named Counterparty in 2014, and explores why Dapp developers now favor Ethereum over Bitcoin. It reveals that it was not transaction fees or EVM's superiority that drove devs to Ethereum, but rather a lack of interest in these features within the Bitcoin community. Community culture and concerns about the misuse of transaction data when interacting with Dapps have pushed many Dapp developers away from the Bitcoin community. Indeed, community culture has the power to shape the blockchain ecosystem.
Why I Wrote PGP
Tracing back to the creation of PGP (Pretty Good Privacy) holds exceptional significance today regarding our right to digital privacy. Philip R. Zimmermann, who created PGP and almost went to jail for it, argues that, “the only way to hold the line on privacy in the information age is strong cryptography”. The US Government’s encryption policy proposal “key escrow" in 1993 made him realize that to counter the unsettling trend in the government to outlaw cryptography, one effective approach is to maximize its use while it's still legal. As strong cryptography gains popularity, attempts to criminalize it become more challenging.
-
@ dec2e28f:01746c77
2023-11-23 07:58:55- F2Pool的聯合創始人Chun(satofishi)在回應x0B10C的交易審查報告時宣布,將暫時禁用交易過濾補丁,直到社區在這個問題上達成更全面的共識。
一個抗審查的系統必須被設計成在協議層面抵抗審查,而不是依賴每個參與者的自覺行動和克制審查。互聯網和TCP/IP在這方面失敗了。比特幣應該從這個失敗中吸取教訓 ," 他在另一篇貼文中表示。
-
@ dec2e28f:01746c77
2023-11-23 07:45:11- 礦池觀察器 (miningpool-observer)專案的RSS訂閱最近報告稱,有六筆OFAC制裁的交易在區塊中消失了," 0xB10C 在 stacker.news 上表示。
- 其中一筆交易尚未傳播到礦池,另一筆被其他交易所替代,然而,另外四筆交易很可能被F2Pool過濾了。"
- 由於我們只看到來自單一OFAC制裁地址3PKiHs4GY4rFg8dpppNVPXGPqMX6K2cBML的交易缺失,我們無法確定F2Pool是否過濾了這個單一地址還是所有OFAC制裁的地址。" 在一篇博客文章中如是說。
-
這是我第一次看到礦池過濾OFAC制裁的交易。我不清楚為什麼一個來自亞洲的礦池會成為第一個遵守美國制裁的礦池," 開發者補充道。
-
@ 52921e1f:1c37981b
2023-11-23 06:50:27Introduction
Financial freedom and liberty have long been cherished principles in the United States, enshrined in the Constitution to protect citizens from government intrusion into their economic affairs. However, over the years, a series of major anti-money laundering (AML) legislations, often initiated in the wake of crises, have curtailed these freedoms. This post will provide a chronological overview of the key AML legislations and their impact on the average American's financial freedom and liberty, while also examining the intrusive regulations surrounding AML and the risks to private data security. It will conclude by highlighting the need to push back against lawmakers and bureaucrats who continue to impede these liberties.
Bank Secrecy Act (1970) The Bank Secrecy Act was enacted to combat money laundering by requiring financial institutions to report transactions exceeding $10,000 and keep records on cash transactions. Its impact on average Americans has been increased scrutiny of their financial transactions and a loss of privacy. What’s especially concerning is that $10,000 in 1970, inflation adjusted, is equivalent to $77,536 today, but the reporting requirement is still $10,000, thereby making it more intrusive each year with inflation.
Money Laundering Control Act (1986) This legislation made money laundering a federal crime and allowed for civil and criminal forfeiture of assets involved in money laundering. It expanded the government's power to investigate and seize assets, infringing upon individuals' property rights and financial privacy.
Anti-Drug Abuse Act of 1988 As a response to the drug epidemic, this Act introduced measures to trace the flow of illicit drug money, such as mandatory reporting of large cash transactions. While well-intentioned, these measures further restricted financial privacy.
Annunzio-Wylie Anti-Money Laundering Act (1992) This Act imposed enhanced AML requirements on banks and required them to implement Know Your Customer (KYC) procedures. While aimed at curbing financial crime, these regulations put average Americans' personal information at risk of data breaches.
Money Laundering Suppression Act (1994) This legislation reinforced AML measures, such as reporting suspicious transactions, and required banks to develop AML programs. It expanded government surveillance, further reducing financial freedom.
Money Laundering and Financial Crimes Strategy Act (1998) The Act broadened the scope of financial crimes and reinforced the government's power to monitor transactions, further eroding financial privacy and liberty.
USA PATRIOT Act (2001) In response to the 9/11 attacks, the USA PATRIOT Act introduced sweeping surveillance measures that included expanded AML provisions. While intended for national security, it significantly encroached upon individual freedoms, leading to serious concerns about government overreach.
Intelligence Reform & Terrorism Prevention Act of 2004 This legislation amended the USA PATRIOT Act, maintaining its surveillance provisions. The impact on financial freedom and privacy was a continued erosion of liberties.
USA FREEDOM Act Introduced in 2015, the USA FREEDOM Act aimed to curb some of the surveillance excesses in the USA PATRIOT Act, but it retained many provisions and eventually expired in 2020, leaving concerns about government surveillance largely unaddressed.
Inflation Reduction Act This 2023 legislation mandated more stringent cryptocurrency transaction reporting, potentially leading to increased government intrusion into the financial affairs of those involved in cryptocurrency transactions. The IRS implementation of this mandate was discussed in more detail in my recent post here:
https://bitcoinfortress.substack.com/p/the-irs-digital-asset-transaction
Recent Bureaucratic Meddling The Financial Crimes Enforcement Network (FinCEN) was created in 1990 to support federal, state, local, and international law enforcement by analyzing the information required under the Bank Secrecy Act. Recently, FinCEN released for public comment a proposal regarding coin mixing. This demonstrates an ongoing bureaucratic push to further control and regulate financial transactions, potentially infringing upon the privacy of individuals. For more on this, check out my recent post here:
https://bitcoinfortress.substack.com/p/the-fincen-proposal-and-its-constitutional
And then there’s yesterday’s headline where the Authoritarian State once again cracks down on “financing terrorism” while the real criminals are in charge of the fiat system:
https://www.reuters.com/markets/us/us-authorities-set-unveil-settlement-with-binance-source-2023-11-21/
Conclusion
The United States has witnessed a gradual erosion of financial freedom and liberty due to a series of anti-money laundering legislations, often initiated in response to crises. These measures have led to increased government surveillance, data breaches, and a loss of financial privacy and most importantly, freedom, for average Americans.
Despite this extensive legal framework, criminals and terrorists continue to find ways to evade the system and maintain / expand their funding, drawing into question its effectiveness and whether the trade offs of “safety” for financial freedom and liberty are even worth it. Furthermore, the majority of illicit funding (similar to the vast majority of legal commerce) still relies on fiat currency, not cryptocurrencies, undermining the argument for increased regulation in this area.
In light of these challenges to financial freedom and liberty, it is essential for citizens to push back against lawmakers and bureaucrats who propose new legislation or rulemaking that infringes upon these core freedoms. In addition, we should be pushing for a repeal of this legislation, going all the way back to the Bank Secrecy Act as has been suggested by Coincenter. Striking a balance between security and individual liberties is essential to maintaining the principles upon which the United States was founded and avoiding a dystopic future.
https://www.coincenter.org/its-time-to-have-the-conversation-is-the-bank-secrecy-act-unconstitutional/
Not financial or legal advice, for entertainment only, do your own homework. I hope you find this post useful as you chart your personal financial course and Build a Bitcoin Fortress in 2023.
Thanks for supporting my work. Always remember: freedom, health and positivity!
Please also check out my Bitcoin Fortress Podcast on YouTube here and on all your favorite streaming platforms. I do a weekly Bitcoin news update every week on current items of interest to the Bitcoin community, usually 30 to 60 minutes depending on the number of topics to cover. Please check it out if you haven’t already. Also now on Fountain, where you can earn Bitcoin just for listening to your favorite podcasts.
Follow me on Nostr:
npub122fpu8lwu2eu2zfmrymcfed9tfgeray5quj78jm6zavj78phnqdsu3v4h5
-
@ d40e8ae7:a70f258a
2023-11-23 06:42:17fuck you!